Lines Matching refs:params

234     /* copy of utils from the params structures */
2450 get_server_realm(sasl_server_params_t * params,
2454 if (params->user_realm != NULL) {
2455 if(params->user_realm[0] != '\0') {
2456 *realm = (char *) params->user_realm;
2460 params->utils->log(params->utils->conn, SASL_LOG_ERR,
2463 params->utils->seterror(params->utils->conn, 0,
2468 } else if (params->serverFQDN != NULL) {
2469 *realm = (char *) params->serverFQDN;
2472 params->utils->log(params->utils->conn, SASL_LOG_ERR,
2475 params->utils->seterror(params->utils->conn, 0,
3956 sasl_client_params_t *params,
3997 digesturi = params->utils->malloc(strlen(params->service) + 1 +
3998 strlen(params->serverFQDN) + 1 +
4006 strcpy((char *) digesturi, params->service);
4008 strcat((char *) digesturi, params->serverFQDN);
4010 * strcat (digesturi, "/"); strcat (digesturi, params->serverFQDN);
4016 params->utils,
4045 result =_plug_buf_alloc(params->utils, &(text->out_buf),
4052 if (add_to_challenge(params->utils,
4060 if (add_to_challenge(params->utils,
4072 if (add_to_challenge(params->utils,
4078 if (add_to_challenge(params->utils,
4085 if (add_to_challenge(params->utils,
4091 if (add_to_challenge(params->utils,
4098 if (add_to_challenge(params->utils,
4108 if (params->props.maxbufsize) {
4109 snprintf(maxbufstr, sizeof(maxbufstr), "%d", params->props.maxbufsize);
4110 if (add_to_challenge(params->utils,
4115 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4118 SETERROR(params->utils,
4126 if (add_to_challenge(params->utils,
4134 if (add_to_challenge(params->utils,
4140 if (add_to_challenge(params->utils,
4179 text->utils = params->utils;
4182 params->props.maxbufsize ? params->props.maxbufsize : DEFAULT_BUFSIZE;
4192 create_layer_keys(text, params->utils, text->HA1, nbits,
4201 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4215 if (digesturi) params->utils->free(digesturi);
4216 if (response) params->utils->free(response);
4222 sasl_client_params_t *params,
4244 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4247 params->utils->seterror(params->utils->conn, 0,
4253 in_start = in = params->utils->malloc(serverinlen + 1);
4262 text->cnonce = create_nonce(params->utils);
4265 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4268 params->utils->seterror(params->utils->conn, 0,
4284 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4287 params->utils->seterror(params->utils->conn, 0, "Parse error");
4297 realms = params->utils->malloc(sizeof(char *) * (nrealm + 1));
4299 realms = params->utils->realloc(realms,
4307 _plug_strdup(params->utils, value, &realms[nrealm-1], NULL);
4310 _plug_strdup(params->utils, value, (char **) &text->nonce,
4327 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4338 params->utils->seterror(params->utils->conn, 0,
4341 params->utils->seterror(params->utils->conn, 0,
4367 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4377 _plug_free_secret(params->utils, &ctext->password);
4392 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4396 params->utils->seterror(params->utils->conn, 0,
4403 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4406 params->utils->seterror(params->utils->conn, 0,
4414 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4418 params->utils->seterror(params->utils->conn, 0,
4428 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4431 params->utils->seterror(params->utils->conn, 0,
4444 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4447 params->utils->seterror(params->utils->conn, 0,
4458 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4461 params->utils->seterror(params->utils->conn, 0,
4468 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4476 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4479 params->utils->seterror(params->utils->conn, 0,
4489 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4492 params->utils->seterror(params->utils->conn, 0,
4500 external = params->external_ssf;
4503 if (params->props.maxbufsize == 0) {
4507 if (params->props.max_ssf > external) {
4508 limit = params->props.max_ssf - external;
4512 if (params->props.min_ssf > external) {
4513 musthave = params->props.min_ssf - external;
4548 params->utils->seterror(params->utils->conn, 0,
4551 params->utils->seterror(params->utils->conn, 0,
4576 params->utils->seterror(params->utils->conn, 0,
4579 params->utils->seterror(params->utils->conn, 0,
4587 params->utils->seterror(params->utils->conn, 0,
4590 params->utils->seterror(params->utils->conn, 0,
4602 if (in_start) params->utils->free(in_start);
4609 params->utils->free(realms[lup]);
4611 params->utils->free(realms);
4618 sasl_client_params_t *params,
4634 auth_result = _plug_get_authid(params->utils, &authid, prompt_need);
4643 user_result = _plug_get_userid(params->utils, &userid, prompt_need);
4652 pass_result = _plug_get_password(params->utils, &ctext->password,
4668 realm_result = _plug_get_realm(params->utils,
4677 if (params->serverFQDN) {
4678 realm = params->serverFQDN;
4687 params->utils->free(*prompt_need);
4696 if ((realm_result == SASL_INTERACT) && params->serverFQDN) {
4697 realm_chal = params->utils->malloc(3+strlen(params->serverFQDN));
4699 sprintf(realm_chal, "{%s}", params->serverFQDN);
4708 _plug_make_prompts(params->utils, &ctext->h, prompt_need,
4710 convert_prompt(params->utils, &ctext->h,
4715 convert_prompt(params->utils, &ctext->h,
4720 convert_prompt(params->utils, &ctext->h,
4726 convert_prompt(params->utils, &ctext->h,
4728 params->serverFQDN ? params->serverFQDN : NULL);
4730 _plug_make_prompts(params->utils, prompt_need,
4743 params->serverFQDN ? params->serverFQDN : NULL);
4753 result = params->canon_user(params->utils->conn, authid, 0,
4758 result = params->canon_user(params->utils->conn,
4762 result = params->canon_user(params->utils->conn,
4770 _plug_strdup(params->utils, realm, (char **) &text->realm, NULL);
4778 sasl_client_params_t * params,
4784 text = params->utils->malloc(sizeof(client_context_t));
4800 sasl_client_params_t *params,
4812 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4815 result = ask_user_info(ctext, params, NULL, 0, prompt_need, oparams);
4819 val = hash(params->serverFQDN) % text->reauth->size;
4820 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
4823 params->serverFQDN) &&
4827 if (text->realm) params->utils->free(text->realm);
4828 if (text->nonce) params->utils->free(text->nonce);
4829 if (text->cnonce) params->utils->free(text->cnonce);
4832 _plug_strdup(params->utils, text->reauth->e[val].realm,
4835 _plug_strdup(params->utils, (char *)text->reauth->e[val].nonce,
4838 _plug_strdup(params->utils, text->reauth->e[val].nonce,
4843 _plug_strdup(params->utils, (char *)text->reauth->e[val].cnonce,
4846 _plug_strdup(params->utils, text->reauth->e[val].cnonce,
4853 params->utils->mutex_unlock(text->reauth->mutex); /* UNLOCK */
4868 result = make_client_response(text, params, oparams);
4880 sasl_client_params_t *params,
4893 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4896 if (params->props.min_ssf > params->props.max_ssf) {
4902 result = parse_server_challenge(ctext, params, serverin, serverinlen,
4911 params->utils->free(realms);
4916 result = ask_user_info(ctext, params, realms, nrealm,
4925 result = make_client_response(text, params, oparams);
4941 params->utils->free(realms[lup]);
4943 params->utils->free(realms);
4951 sasl_client_params_t *params,
4964 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4968 in_start = in = params->utils->malloc(serverinlen + 1);
4981 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4984 params->utils->seterror(params->utils->conn, 0,
4994 params->utils->seterror(params->utils->conn, 0,
4997 params->utils->seterror(params->utils->conn, 0,
5009 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
5015 params->utils->free(in_start);
5017 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
5018 unsigned val = hash(params->serverFQDN) % text->reauth->size;
5023 clear_reauth_entry(&text->reauth->e[val], CLIENT, params->utils);
5024 _plug_strdup(params->utils, oparams->authid,
5030 _plug_strdup(params->utils, params->serverFQDN,
5045 clear_reauth_entry(&text->reauth->e[val], CLIENT, params->utils);
5051 params->utils->mutex_unlock(text->reauth->mutex); /* UNLOCK */
5059 sasl_client_params_t *params,
5069 unsigned val = hash(params->serverFQDN) % text->reauth->size;
5084 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
5087 params->serverFQDN);
5088 params->utils->mutex_unlock(text->reauth->mutex); /* UNLOCK */
5091 return digestmd5_client_mech_step1(ctext, params,
5109 return digestmd5_client_mech_step3(ctext, params,
5120 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
5121 clear_reauth_entry(&text->reauth->e[val], CLIENT, params->utils);
5123 params->utils->mutex_unlock(text->reauth->mutex); /* UNLOCK */
5126 if (text->realm) params->utils->free(text->realm);
5127 if (text->nonce) params->utils->free(text->nonce);
5128 if (text->cnonce) params->utils->free(text->cnonce);
5138 return digestmd5_client_mech_step2(ctext, params,
5146 params->utils->log(params->utils->conn, SASL_LOG_ERR,
5149 params->utils->log(NULL, SASL_LOG_ERR,