Lines Matching refs:SASL_OK

521      * Returns SASL_OK on success, SASL_BUFOVER if result won't fit
524 (char *) base64buf, base64len, NULL) != SASL_OK) {
545 if(ret != SASL_OK) return ret;
561 return SASL_OK;
788 return SASL_OK;
822 return SASL_OK;
862 return SASL_OK;
912 return SASL_OK;
949 return SASL_OK;
980 return SASL_OK;
1140 return SASL_OK;
1161 return SASL_OK;
1185 return SASL_OK;
1249 * Returns SASL_OK on success - any other return indicates failure.
1385 return SASL_OK;
1511 return SASL_OK;
1552 return SASL_OK;
1606 return SASL_OK;
1646 return SASL_OK;
1721 return SASL_OK;
1751 if (ret != SASL_OK) return ret;
1769 if(ret != SASL_OK) return ret;
1812 return SASL_OK;
1868 return SASL_OK;
1886 return SASL_OK;
1901 if (result != SASL_OK)
1910 if (result!=SASL_OK)
1940 if(result != SASL_OK) return result;
1987 return SASL_OK;
2028 if (ret != SASL_OK) return ret;
2042 if(ret != SASL_OK) return ret;
2081 return SASL_OK;
2100 if(ret != SASL_OK) return ret;
2125 return SASL_OK;
2137 if (result != SASL_OK)
2159 if (result != SASL_OK)
2167 return SASL_OK;
2217 return SASL_OK;
2233 return SASL_OK;
2242 if (result != SASL_OK)
2248 return SASL_OK;
2481 return SASL_OK;
2532 return SASL_OK;
2554 return SASL_OK;
2582 if(result != SASL_OK) return result;
2658 if(result != SASL_OK) {
2663 if(result != SASL_OK) return result;
2673 TRUE) != SASL_OK) {
2695 (unsigned char *) qop, TRUE) != SASL_OK) {
2715 TRUE) != SASL_OK) {
2733 "stale", (unsigned char *)"true", FALSE) != SASL_OK) {
2738 "stale", "true", FALSE) != SASL_OK) {
2757 (unsigned char *) maxbufstr, FALSE) != SASL_OK) {
2773 (unsigned char *) charset, FALSE) != SASL_OK) {
2799 (unsigned char *) "md5-sess", FALSE)!=SASL_OK) {
2921 if (htoi((unsigned char *) value, &noncecount) != SASL_OK) {
3068 if (sparams->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
3154 if(result != SASL_OK) {
3168 if (result != SASL_OK) {
3187 if (result != SASL_OK) {
3462 if ((result = text->cipher_init(text, enckey, deckey)) != SASL_OK) {
3470 if (text->cipher_init(text, enckey, deckey) != SASL_OK) {
3499 if(result != SASL_OK) {
3515 result = SASL_OK;
3519 sparams->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
3523 case SASL_OK:
3631 oparams) == SASL_OK) {
3632 return SASL_OK;
3733 if ((ret = uef_init(utils)) != SASL_OK)
3795 return SASL_OK;
4048 if (result != SASL_OK) goto FreeAllocatedMem;
4055 TRUE) != SASL_OK) {
4064 TRUE) != SASL_OK) {
4066 "authzid", (char *) oparams->user, TRUE) != SASL_OK) {
4074 "nonce", text->nonce, TRUE) != SASL_OK) {
4080 "cnonce", text->cnonce, TRUE) != SASL_OK) {
4087 "nc", (unsigned char *) ncvalue, FALSE) != SASL_OK) {
4093 "qop", (unsigned char *) qop, FALSE) != SASL_OK) {
4102 TRUE) != SASL_OK) {
4113 FALSE) != SASL_OK) {
4129 FALSE) != SASL_OK) {
4136 "digest-uri", digesturi, TRUE) != SASL_OK) {
4143 FALSE) != SASL_OK) {
4200 if((result = text->cipher_init(text, enckey, deckey)) != SASL_OK) {
4212 result = SASL_OK;
4227 int result = SASL_OK;
4604 if (result != SASL_OK && realms) {
4624 int result = SASL_OK;
4627 int user_result = SASL_OK;
4628 int auth_result = SASL_OK;
4629 int pass_result = SASL_OK;
4636 if ((auth_result != SASL_OK) && (auth_result != SASL_INTERACT)) {
4645 if ((user_result != SASL_OK) && (user_result != SASL_INTERACT)) {
4654 if ((pass_result != SASL_OK) && (pass_result != SASL_INTERACT)) {
4665 realm_result = SASL_OK;
4676 if ((realm_result != SASL_OK) && (realm_result != SASL_INTERACT)) {
4746 if (result == SASL_OK) return SASL_INTERACT;
4760 if (result != SASL_OK) return result;
4765 if (result != SASL_OK) return result;
4795 return SASL_OK;
4816 if (result != SASL_OK) return result;
4820 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
4869 if (result != SASL_OK) return result;
4904 if (result != SASL_OK) goto FreeAllocatedMem;
4918 if (result != SASL_OK) goto FreeAllocatedMem;
4926 if (result != SASL_OK) goto FreeAllocatedMem;
5005 result = SASL_OK;
5017 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
5020 case SASL_OK:
5084 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
5120 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
5220 if ((ret = uef_init(utils)) != SASL_OK)
5267 return SASL_OK;
5349 return SASL_OK;
5364 return (SASL_OK);
5378 got_rc4 = getSlotID(utils, CKM_RC4, &rc4_slot_id) == SASL_OK;
5382 got_des = getSlotID(utils, CKM_DES_CBC, &des_slot_id) == SASL_OK;
5386 got_3des = getSlotID(utils, CKM_DES3_CBC, &des3_slot_id) == SASL_OK;
5427 return (SASL_OK);