Lines Matching refs:result

521      * Returns SASL_OK on success, SASL_BUFOVER if result won't fit
1825 int result;
1898 result = _plug_buf_alloc(text->utils, &text->decode_once_buf,
1901 if (result != SASL_OK)
1902 return result;
1907 result=text->cipher_dec(text,text->buffer,text->size-6,digest,
1910 if (result!=SASL_OK)
1911 return result;
1938 result = _plug_buf_alloc(text->utils, &text->decode_tmp_buf,
1940 if(result != SASL_OK) return result;
2134 int result;
2136 result = create_MAC(text, buf, bufsize - 16, text->rec_seqnum, MAC);
2137 if (result != SASL_OK)
2138 return result;
2156 result = _plug_buf_alloc(text->utils, &text->decode_once_buf,
2159 if (result != SASL_OK)
2160 return result;
2180 int result;
2240 result = check_integrity(text, text->buffer, text->size,
2242 if (result != SASL_OK)
2243 return result;
2390 char *result;
2416 result = utils->malloc(HASHHEXLEN + 1);
2418 if (result == NULL)
2422 memcpy(result, Response, HASHHEXLEN);
2423 result[HASHHEXLEN] = 0;
2446 return result;
2567 int result;
2581 result = get_server_realm(sparams, &realm);
2582 if(result != SASL_OK) return result;
2655 result = _plug_buf_alloc(sparams->utils, &(text->out_buf),
2658 if(result != SASL_OK) {
2660 return result;
2663 if(result != SASL_OK) return result;
2852 int result;
2929 result = SASL_BADAUTH;
2941 result = SASL_FAIL;
2964 result = SASL_BADAUTH;
2984 result = SASL_BADAUTH;
2994 result = SASL_BADAUTH;
3004 result = SASL_BADAUTH;
3023 result = SASL_FAIL;
3060 result = SASL_BADAUTH;
3096 result = SASL_FAIL;
3114 result = SASL_BADAUTH;
3126 result = SASL_BADAUTH;
3137 result = SASL_BADAUTH;
3149 result = SASL_BADAUTH;
3153 result = sparams->utils->prop_request(sparams->propctx, password_request);
3154 if(result != SASL_OK) {
3166 result = sparams->canon_user(sparams->utils->conn,
3168 if (result != SASL_OK) {
3179 result = sparams->canon_user(sparams->utils->conn,
3182 result = sparams->canon_user(sparams->utils->conn,
3187 if (result != SASL_OK) {
3197 result = sparams->utils->prop_getnames(sparams->propctx, password_request,
3199 if (result < 0 ||
3210 result = SASL_NOUSER;
3224 result = SASL_FAIL;
3236 result = SASL_FAIL;
3290 result = SASL_FAIL;
3340 result = SASL_FAIL;
3363 result = SASL_FAIL;
3382 result = SASL_NOMEM;
3395 result = SASL_BADAUTH;
3409 result = SASL_BADAUTH;
3422 result = SASL_BADPARAM;
3431 result = SASL_BADPARAM;
3462 if ((result = text->cipher_init(text, enckey, deckey)) != SASL_OK) {
3497 result = _plug_buf_alloc(sparams->utils, &(text->out_buf),
3499 if(result != SASL_OK) {
3507 result = SASL_FAIL;
3515 result = SASL_OK;
3522 switch (result) {
3584 return result;
3875 char *result;
3916 result = utils->malloc(HASHHEXLEN + 1);
3918 if (result == NULL)
3921 memcpy(result, Response, HASHHEXLEN);
3922 result[HASHHEXLEN] = 0;
3951 return result;
3968 int result;
4001 result = SASL_NOMEM;
4039 result = SASL_NOMEM;
4045 result =_plug_buf_alloc(params->utils, &(text->out_buf),
4048 if (result != SASL_OK) goto FreeAllocatedMem;
4056 result = SASL_FAIL;
4068 result = SASL_FAIL;
4075 result = SASL_FAIL;
4081 result = SASL_FAIL;
4088 result = SASL_FAIL;
4094 result = SASL_FAIL;
4103 result = SASL_FAIL;
4130 result = SASL_FAIL;
4137 result = SASL_FAIL;
4145 result = SASL_FAIL;
4151 result = SASL_FAIL;
4200 if((result = text->cipher_init(text, enckey, deckey)) != SASL_OK) {
4212 result = SASL_OK;
4218 return result;
4227 int result = SASL_OK;
4271 result = SASL_FAIL;
4289 result = SASL_FAIL;
4303 result = SASL_NOMEM;
4336 result = SASL_BADAUTH;
4390 result = SASL_BADAUTH;
4401 result = SASL_BADAUTH;
4412 result = SASL_BADAUTH;
4426 result = SASL_BADAUTH;
4450 result = SASL_FAIL;
4464 result = SASL_FAIL;
4482 result = SASL_FAIL;
4495 result = SASL_FAIL;
4582 result = SASL_FAIL;
4593 result = SASL_TOOWEAK;
4604 if (result != SASL_OK && realms) {
4614 return result;
4624 int result = SASL_OK;
4706 result =
4746 if (result == SASL_OK) return SASL_INTERACT;
4748 return result;
4753 result = params->canon_user(params->utils->conn, authid, 0,
4758 result = params->canon_user(params->utils->conn,
4760 if (result != SASL_OK) return result;
4762 result = params->canon_user(params->utils->conn,
4765 if (result != SASL_OK) return result;
4773 return result;
4809 int result = SASL_FAIL;
4815 result = ask_user_info(ctext, params, NULL, 0, prompt_need, oparams);
4816 if (result != SASL_OK) return result;
4868 result = make_client_response(text, params, oparams);
4869 if (result != SASL_OK) return result;
4889 int result = SASL_FAIL;
4902 result = parse_server_challenge(ctext, params, serverin, serverinlen,
4904 if (result != SASL_OK) goto FreeAllocatedMem;
4916 result = ask_user_info(ctext, params, realms, nrealm,
4918 if (result != SASL_OK) goto FreeAllocatedMem;
4925 result = make_client_response(text, params, oparams);
4926 if (result != SASL_OK) goto FreeAllocatedMem;
4933 result = SASL_CONTINUE;
4946 return result;
4962 int result = SASL_FAIL;
5000 result = SASL_FAIL;
5005 result = SASL_OK;
5019 switch (result) {
5054 return result;