Searched defs:response (Results 1 - 25 of 29) sorted by relevance

12

/dovecot/src/imap/
H A Dcmd-genurlauth.c12 string_t *response; local
23 response = t_str_new(1024);
24 str_append(response, "* GENURLAUTH");
46 str_append_c(response, ' ');
47 imap_append_astring(response, url);
50 client_send_line(cmd->client, str_c(response));
H A Dcmd-urlfetch.c179 string_t *response = t_str_new(256); local
182 str_append(response, "* URLFETCH ");
183 imap_append_astring(response, reply->url);
189 str_printfa(response, " {%"PRIuUOFF_T"}", reply->size);
190 client_send_line(cmd->client, str_c(response));
198 str_append(response, " (");
201 str_append(response, "BODYPARTSTRUCTURE (");
202 str_append(response, reply->bodypartstruct);
203 str_append_c(response, ')');
209 str_append_c(response, ' ');
272 string_t *response = t_str_new(128); local
[all...]
/dovecot/src/lib-oauth2/
H A Doauth2-introspect.c40 oauth2_introspect_response(const struct http_response *response, argument
43 if (response->status / 100 != 2) {
44 oauth2_introspect_continue(req, FALSE, response->reason);
46 if (response->payload == NULL) {
47 oauth2_introspect_continue(req, FALSE, "Missing response body");
51 req->is = response->payload;
H A Doauth2-refresh.c80 oauth2_refresh_response(const struct http_response *response, argument
83 if (response->status / 100 != 2) {
84 oauth2_refresh_continue(req, FALSE, response->reason);
86 if (response->payload == NULL) {
87 oauth2_refresh_continue(req, FALSE, "Missing response body");
91 req->is = response->payload;
H A Doauth2-token-validate.c62 oauth2_token_validate_response(const struct http_response *response, argument
65 unsigned int status_1 = response->status / 100;
68 oauth2_token_validate_continue(req, FALSE, response->reason);
76 if (response->payload == NULL) {
80 req->is = response->payload;
/dovecot/src/submission-login/
H A Dclient-authenticate.c106 This response to the AUTH command indicates that the
116 such a response, it MUST reject the AUTH command by sending
123 If the server cannot [BASE64] decode any client response, it
164 5.5.4 enhanced response code. */
185 If the client uses an initial-response argument to the AUTH
215 This response to the AUTH command indicates that the
226 const char *response)
231 if (strcmp(response, "*") == 0) {
236 client_auth_respond(client, response);
224 cmd_auth_continue(void *conn_ctx, struct smtp_server_cmd_ctx *cmd ATTR_UNUSED, const char *response) argument
/dovecot/src/lib-ntlm/
H A Dntlm-encrypt.c89 unsigned char response[NTLMSSP_RESPONSE_SIZE])
97 deshash(response, des_hash, challenge);
98 deshash(response + 8, des_hash + 7, challenge);
99 deshash(response + 16, des_hash + 14, challenge);
108 unsigned char response[NTLMSSP_RESPONSE_SIZE])
118 ntlmssp_v1_response(hash, session_hash, response);
126 unsigned char response[NTLMSSP_V2_RESPONSE_SIZE])
136 hmac_final(&ctx, response);
87 ntlmssp_v1_response(const unsigned char *hash, const unsigned char *challenge, unsigned char response[NTLMSSP_RESPONSE_SIZE]) argument
105 ntlmssp2_response(const unsigned char *hash, const unsigned char *server_challenge, const unsigned char *client_challenge, unsigned char response[NTLMSSP_RESPONSE_SIZE]) argument
122 ntlmssp_v2_response(const char *user, const char *target, const unsigned char *hash_v1, const unsigned char *challenge, const unsigned char *blob, size_t blob_size, unsigned char response[NTLMSSP_V2_RESPONSE_SIZE]) argument
H A Dntlm-message.c230 bool ntlmssp_check_response(const struct ntlmssp_response *response, argument
234 *error = "response too short";
238 if (read_le64(&response->magic) != NTLMSSP_MAGIC) {
243 if (read_le32(&response->type) != NTLMSSP_MSG_TYPE3) {
248 if (!ntlmssp_check_buffer(&response->lm_response, data_size, error) ||
249 !ntlmssp_check_buffer(&response->ntlm_response, data_size, error) ||
250 !ntlmssp_check_buffer(&response->domain, data_size, error) ||
251 !ntlmssp_check_buffer(&response->user, data_size, error) ||
252 !ntlmssp_check_buffer(&response->workstation, data_size, error))
/dovecot/src/plugins/fts/
H A Dfts-parser-tika.c87 fts_tika_parser_response(const struct http_response *response, argument
92 switch (response->status) {
94 /* read response */
95 if (response->payload == NULL)
98 i_stream_ref(response->payload);
99 parser->payload = response->payload;
102 case 204: /* empty response */
108 http_response_get_message(response));
113 if (response->status / 100 == 5) {
123 http_response_get_message(response));
[all...]
/dovecot/src/auth/
H A Dmech-cram-md5.c30 char *response; member in struct:cram_auth_request
70 if (!mem_equals_timing_safe(response_hex, request->response, sizeof(digest)*2)) {
87 /* <username> SPACE <response>. Username may contain spaces, so assume
88 the rightmost space is the response separator. */
91 *error_r = "NULs in response";
105 request->response =
H A Dmech-ntlm.c30 struct ntlmssp_response *response; member in struct:ntlm_auth_request
47 ntlmssp_buffer_length(request->response, lm_response);
48 client_response = ntlmssp_buffer_data(request->response, lm_response);
52 "LM response length is too small");
93 ntlmssp_buffer_length(request->response, ntlm_response);
94 client_response = ntlmssp_buffer_data(request->response, ntlm_response);
126 ntlmssp_buffer_data(request->response, lm_response);
207 const struct ntlmssp_response *response = local
211 if (!ntlmssp_check_response(response, data_size, &error)) {
213 "invalid NTLM response
[all...]
H A Dmech-digest-md5.c48 unsigned char response[32]; member in struct:digest_auth_request
130 response =
169 /* do it twice, first verify the user's response, the second is
191 /* response */
210 /* verify response */
211 if (!mem_equals_timing_safe(response_hex, request->response, 32)) {
419 if (strcmp(key, "response") == 0) {
421 *error = "Invalid response value";
425 memcpy(request->response, value, 32);
468 response
[all...]
H A Dmech-rpa.c62 * Compute client -> server authentication response.
86 * Compute server -> client authentication response.
290 /* Read user response */
293 *error = "invalid user response";
406 /* Server authentication response */
424 unsigned char response[MD5_RESULTLEN]; local
433 rpa_user_response(request, response);
434 return mem_equals_timing_safe(response, request->user_response, sizeof(response));
H A Dauth-policy.c293 "Policy server response was malformed");
298 "Policy server response JSON parse error: %s", error);
314 "Policy response %d with message: %s",
321 "Policy response %d", context->result);
336 void auth_policy_process_response(const struct http_response *response, argument
341 context->payload = response->payload;
343 if ((response->status / 10) != 20) {
346 http_response_get_message(response));
352 if (response->payload == NULL) {
362 i_stream_ref(response
[all...]
/dovecot/src/util/
H A Dscript.c232 char response[2]; local
234 response[0] = client_exec_script(conn) ? '+' : '-';
235 response[1] = '\n';
236 if (write_full(conn->fd, &response, 2) < 0)
237 i_error("write(response) failed: %m");
/dovecot/src/imap-urlauth/
H A Dimap-urlauth-client.c204 client_worker_input_line(struct client *client, const char *response) argument
214 if (strcasecmp(response, "OK") != 0) {
250 if (strcasecmp(response, "OK") != 0) {
260 if (strcasecmp(response, "DISCONNECTED") == 0) {
263 } else if (strcasecmp(response, "FINISHED") != 0) {
264 /* unknown response */
266 "Worker finished with unknown response");
H A Dimap-urlauth-worker.c398 string_t *response; local
434 response = t_str_new(256);
435 str_append(response, "OK");
437 str_append(response, "\thasnuls");
439 str_append(response, "\tbpstruct=");
440 str_append(response, str_tabescape(bpstruct));
451 str_append(response, "\t0");
452 client_send_line(client, "%s", str_c(response));
461 str_printfa(response, "\t%"PRIuUOFF_T, client->msg_part_size);
462 client_send_line(client, "%s", str_c(response));
[all...]
/dovecot/src/lib-http/
H A Dhttp-response-parser.c9 #include "http-response-parser.h"
165 "Invalid HTTP version in response: %s",
176 ("Expected ' ' after response version, but found %s",
188 _parser->error = "Invalid HTTP status code in response";
198 ("Expected ' ' after response status code, but found %s",
226 ("Expected line end after response, but found %s",
288 seconds to delay after the response is received.
316 struct http_response *response, const char **error_r)
322 i_zero(response);
324 /* make sure we finished streaming payload from previous response
314 http_response_parse_next(struct http_response_parser *parser, enum http_response_payload_type payload_type, struct http_response *response, const char **error_r) argument
[all...]
H A Dtest-http-client.c58 got_request_response(const struct http_response *response, argument
63 if (response->status / 100 != 2) {
64 i_error("HTTP Request failed: %s", response->reason);
70 i_info("DEBUG: REQUEST SUCCEEDED: %s", response->reason);
72 if (response->payload == NULL) {
78 i_stream_ref(response->payload);
79 req->payload = response->payload;
80 req->io = io_add_istream(response->payload, payload_input, req);
H A Dtest-http-response-parser.c10 #include "http-response-parser.h"
30 /* Valid response tests */
187 test_begin(t_strdup_printf("http response valid [%d]", i));
218 /* verify last response only */
219 test_out(t_strdup_printf("response->status = %d",
223 test_out(t_strdup_printf("response->payload = %s",
227 test_out(t_strdup_printf("response->payload = %s",
249 * Invalid response tests
315 struct http_response response; local
331 test_begin(t_strdup_printf("http response invali
353 struct http_response response; local
[all...]
H A Dhttp-server-connection.c222 if (req->response == NULL && stream_errno != 0 &&
249 if (req->response != NULL && req->response->submitted)
253 /* no response submitted yet */
256 /* response submitted, but not all payload is necessarily read */
272 state it is in). this call also triggers sending the next response if
357 && req->response == NULL) {
379 if (req->response != NULL && req->response->submitted)
384 (req->response !
880 static const char *response = "HTTP/1.1 100 Continue\\r\\n\\r\\n"; local
[all...]
H A Dhttp-server-private.h33 response is yet submitted */
35 /* A response is submitted for this request. If not all request payload
39 /* Request is ready for response; a response is submitted and the request
42 /* The response for the request is sent (apart from payload) */
44 /* Sending response payload to client */
111 struct http_server_response *response; member in struct:http_server_request
/dovecot/src/login-common/
H A Dclient-common-auth.c84 "delayed sending initial response (greeting)");
580 void client_auth_respond(struct client *client, const char *response) argument
584 auth_client_request_continue(client->auth_request, response);
617 client_destroy(client, "Authentication response too large");
/dovecot/src/plugins/push-notification/
H A Dpush-notification-driver-ox.c275 (const struct http_response *response, struct mail_user *user)
277 switch (response->status / 100) {
283 http_response_get_message(response));
290 http_response_get_message(response));
274 push_notification_driver_ox_http_callback(const struct http_response *response, struct mail_user *user) argument
/dovecot/src/plugins/fts-solr/
H A Dsolr-connection.c193 /* response -> result -> doc */
196 if (strcmp(name, "response") == 0)
410 solr_connection_select_response(const struct http_response *response, argument
413 if (response->status / 100 != 2) {
415 http_response_get_message(response));
420 if (response->payload == NULL) {
421 i_error("fts_solr: Lookup failed: Empty response payload");
426 i_stream_ref(response->payload);
427 conn->payload = response->payload;
428 conn->io = io_add_istream(response
483 solr_connection_update_response(const struct http_response *response, struct solr_connection *conn) argument
[all...]

Completed in 601 milliseconds

12