Searched defs:request (Results 1 - 25 of 86) sorted by relevance

1234

/dovecot/src/auth/
H A Dmech-plain-common.c9 struct auth_request *request)
13 auth_request_success(request, "", 0);
16 auth_request_internal_failure(request);
19 auth_request_fail(request);
8 plain_verify_callback(enum passdb_result result, struct auth_request *request) argument
H A Dmech-anonymous.c7 mech_anonymous_auth_continue(struct auth_request *request, argument
10 i_assert(*request->set->anonymous_username != '\0');
12 if (request->set->verbose) {
15 request->user =
17 auth_request_log_info(request, AUTH_SUBSYS_MECH, "login");
20 request->user = p_strdup(request->pool,
21 request->set->anonymous_username);
23 request->passdb_success = TRUE;
24 auth_request_success(request, "",
29 struct auth_request *request; local
[all...]
H A Dmech-external.c9 mech_external_auth_continue(struct auth_request *request, argument
15 if (request->user == NULL) {
16 auth_request_log_info(request, AUTH_SUBSYS_MECH,
18 auth_request_fail(request);
24 if (!auth_request_set_username(request, "", &error)) {
25 auth_request_log_info(request, AUTH_SUBSYS_MECH,
27 auth_request_fail(request);
32 !auth_request_set_login_username(request, authzid, &error)) {
34 auth_request_log_info(request, AUTH_SUBSYS_MECH,
36 auth_request_fail(request);
45 struct auth_request *request; local
[all...]
H A Dmech-otp-skey-common.c38 struct otp_auth_request *request = local
41 if (!request->lock)
45 request->lock = FALSE;
H A Dpassdb-sia.c33 local_sia_verify_plain(struct auth_request *request, const char *password, argument
38 auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup");
42 (char *)request->user, NULL, NULL, NULL,
44 auth_request_log_password_mismatch(request, AUTH_SUBSYS_DB);
45 callback(PASSDB_RESULT_PASSWORD_MISMATCH, request);
47 callback(PASSDB_RESULT_OK, request);
H A Dauth-request-stats.c11 #include "auth-request.h"
12 #include "auth-request-stats.h"
19 struct auth_stats *auth_request_stats_get(struct auth_request *request) argument
21 if (request->stats == NULL)
22 request->stats = stats_alloc(request->pool);
23 return stats_fill_ptr(request->stats, auth_stats_item);
26 void auth_request_stats_add_tempfail(struct auth_request *request) argument
28 struct auth_stats *stats = auth_request_stats_get(request);
33 void auth_request_stats_send(struct auth_request *request) argument
[all...]
H A Dmech-login.c17 mech_login_auth_continue(struct auth_request *request, argument
23 if (request->user == NULL) {
26 if (!auth_request_set_username(request, username, &error)) {
27 auth_request_log_info(request, AUTH_SUBSYS_MECH, "%s", error);
28 auth_request_fail(request);
32 auth_request_handler_reply_continue(request, prompt2,
36 auth_request_verify_plain(request, pass, plain_verify_callback);
42 mech_login_auth_initial(struct auth_request *request, argument
48 auth_request_handler_reply_continue(request, prompt1,
51 mech_login_auth_continue(request, dat
57 struct auth_request *request; local
[all...]
H A Dmech-plain.c10 mech_plain_auth_continue(struct auth_request *request, argument
44 auth_request_log_info(request, AUTH_SUBSYS_MECH, "invalid input");
45 auth_request_fail(request);
46 } else if (!auth_request_set_username(request, authenid, &error)) {
48 auth_request_log_info(request, AUTH_SUBSYS_MECH, "%s", error);
49 auth_request_fail(request);
51 !auth_request_set_login_username(request, authid, &error)) {
53 auth_request_log_info(request, AUTH_SUBSYS_MECH,
55 auth_request_fail(request);
57 auth_request_verify_plain(request, pas
68 struct auth_request *request; local
[all...]
H A Dpassdb-bsdauth.c17 bsdauth_verify_plain(struct auth_request *request, const char *password, argument
24 auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup");
26 switch (i_getpwnam(request->user, &pw)) {
28 auth_request_log_error(request, AUTH_SUBSYS_DB,
30 callback(PASSDB_RESULT_INTERNAL_FAILURE, request);
33 auth_request_log_unknown_user(request, AUTH_SUBSYS_DB);
34 callback(PASSDB_RESULT_USER_UNKNOWN, request);
39 type = t_strdup_printf("auth-%s", request->service);
40 result = auth_userokay(request->user, NULL, t_strdup_noconst(type),
47 auth_request_log_password_mismatch(request, AUTH_SUBSYS_D
[all...]
H A Dmech-dovecot-token.c12 mech_dovecot_token_auth_continue(struct auth_request *request, argument
44 auth_request_log_info(request, AUTH_SUBSYS_MECH, "invalid input");
45 auth_request_fail(request);
46 } else if (!auth_request_set_username(request, username, &error)) {
48 auth_request_log_info(request, AUTH_SUBSYS_MECH, "%s", error);
49 auth_request_fail(request);
52 auth_token_get(service, pid, request->user, session_id);
56 request->passdb_success = TRUE;
57 auth_request_set_field(request, "userdb_client_service", service, "");
58 auth_request_success(request, NUL
71 struct auth_request *request; local
[all...]
H A Dpassdb-blocking.c13 auth_worker_reply_parse_args(struct auth_request *request, argument
17 request->passdb_password = p_strdup(request->pool, *args);
21 auth_request_set_fields(request, args, NULL);
25 passdb_blocking_auth_worker_reply_parse(struct auth_request *request, const char *reply) argument
35 auth_request_set_field(request, "user", args[1], NULL);
36 auth_worker_reply_parse_args(request, args + 2);
43 auth_request_set_field(request, "user", args[1], NULL);
44 auth_worker_reply_parse_args(request, args + 1);
62 auth_request_set_field(request, "use
79 struct auth_request *request = context; local
88 passdb_blocking_verify_plain(struct auth_request *request) argument
105 struct auth_request *request = context; local
128 passdb_blocking_lookup_credentials(struct auth_request *request) argument
146 struct auth_request *request = context; local
155 passdb_blocking_set_credentials(struct auth_request *request, const char *new_credentials) argument
[all...]
H A Dpassdb-oauth2.c15 struct auth_request *request)
18 auth_request_log_error(request, AUTH_SUBSYS_DB, "oauth2 failed: %s",
21 auth_request_log_info(request, AUTH_SUBSYS_DB, "oauth2 failed: %s",
23 req->verify_callback(result, request);
24 auth_request_unref(&request);
28 oauth2_verify_plain(struct auth_request *request, const char *password, argument
32 (struct oauth2_passdb_module *)request->passdb->passdb;
34 p_new(request->pool, struct db_oauth2_request, 1);
35 req->pool = request->pool;
38 auth_request_ref(request);
13 oauth2_verify_plain_continue(struct db_oauth2_request *req, enum passdb_result result, const char *error, struct auth_request *request) argument
[all...]
H A Dpassdb-passwd.c15 passwd_lookup(struct auth_request *request, struct passwd *pw_r) argument
17 auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup");
19 switch (i_getpwnam(request->user, pw_r)) {
21 auth_request_log_error(request, AUTH_SUBSYS_DB,
25 auth_request_log_unknown_user(request, AUTH_SUBSYS_DB);
30 auth_request_log_info(request, AUTH_SUBSYS_DB,
36 auth_request_set_field(request, "password", pw_r->pw_passwd,
42 passwd_verify_plain(struct auth_request *request, const char *password, argument
49 res = passwd_lookup(request, &pw);
51 callback(res, request);
73 passwd_lookup_credentials(struct auth_request *request, lookup_credentials_callback_t *callback) argument
[all...]
H A Dpassdb-shadow.c16 shadow_lookup(struct auth_request *request, struct spwd **spw_r) argument
18 auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup");
20 *spw_r = getspnam(request->user);
22 auth_request_log_unknown_user(request, AUTH_SUBSYS_DB);
27 auth_request_log_info(request, AUTH_SUBSYS_DB,
33 auth_request_set_field(request, "password", (*spw_r)->sp_pwdp,
39 shadow_verify_plain(struct auth_request *request, const char *password, argument
46 res = shadow_lookup(request, &spw);
48 callback(res, request);
53 ret = auth_request_password_verify(request, passwor
71 shadow_lookup_credentials(struct auth_request *request, lookup_credentials_callback_t *callback) argument
[all...]
H A Dtest-mock.c24 static void passdb_mock_verify_plain(struct auth_request *request, const char *password ATTR_UNUSED, argument
27 callback(PASSDB_RESULT_OK, request);
H A Duserdb-checkpassword.c16 userdb_checkpassword_callback(struct auth_request *request, argument
25 callback(USERDB_RESULT_INTERNAL_FAILURE, request);
28 callback(USERDB_RESULT_USER_UNKNOWN, request);
34 auth_request_set_field_keyvalue(request,
37 callback(USERDB_RESULT_OK, request);
43 checkpassword_lookup(struct auth_request *request, userdb_callback_t *callback) argument
45 struct userdb_module *_module = request->userdb->userdb;
49 db_checkpassword_call(module->db, request, NULL,
H A Dmech-apop.c32 static bool verify_credentials(struct apop_auth_request *request, argument
39 md5_update(&ctx, request->challenge, strlen(request->challenge));
43 return mem_equals_timing_safe(digest, request->response_digest, 16);
51 struct apop_auth_request *request = local
56 if (verify_credentials(request, credentials, size))
74 struct apop_auth_request *request = local
97 request->challenge = p_strdup_until(request->pool, data, tmp);
119 memcpy(request
151 struct apop_auth_request *request; local
[all...]
H A Dmech-oauth2.c42 struct auth_request *request)
45 (struct oauth2_auth_request*)request;
50 auth_request_success(request, "", 0);
53 auth_request_internal_failure(request);
57 if (request->mech_password != NULL)
58 request->mech_password = NULL;
59 auth_request_handler_reply_continue(request, error, strlen(error));
66 xoauth2_verify_callback(enum passdb_result result, struct auth_request *request) argument
70 oauth2_verify_callback(result, error, request);
74 oauthbearer_verify_callback(enum passdb_result result, struct auth_request *request) argument
40 oauth2_verify_callback(enum passdb_result result, const char *error, struct auth_request *request) argument
85 mech_xoauth2_auth_continue(struct auth_request *request, const unsigned char *data, size_t data_size) argument
146 mech_oauthbearer_auth_continue(struct auth_request *request, const unsigned char *data, size_t data_size) argument
240 struct oauth2_auth_request *request; local
[all...]
H A Dmech-skey.c22 struct otp_auth_request *request = local
27 &request->state) != 0) {
28 auth_request_log_error(&request->auth_request, AUTH_SUBSYS_MECH,
34 if (request->state.algo != OTP_HASH_MD4) {
35 auth_request_log_error(&request->auth_request, AUTH_SUBSYS_MECH,
41 if (--request->state.seq < 1) {
42 auth_request_log_error(&request->auth_request, AUTH_SUBSYS_MECH,
48 request->lock = otp_try_lock(auth_request);
49 if (!request->lock) {
50 auth_request_log_error(&request
124 struct otp_auth_request *request = local
174 struct otp_auth_request *request; local
[all...]
H A Dmech.c52 void mech_generic_auth_initial(struct auth_request *request, argument
56 auth_request_handler_reply_continue(request, uchar_empty_ptr, 0);
59 request->mech->auth_continue(request, data, data_size);
63 void mech_generic_auth_free(struct auth_request *request) argument
65 pool_unref(&request->pool);
H A Dpassdb-checkpassword.c17 auth_checkpassword_callback(struct auth_request *request, argument
27 callback(PASSDB_RESULT_INTERNAL_FAILURE, request);
30 callback(PASSDB_RESULT_PASSWORD_MISMATCH, request);
39 auth_request_set_field_keyvalue(request,
47 auth_request_set_field(request, "password",
50 auth_request_log_error(request, AUTH_SUBSYS_DB,
54 callback(PASSDB_RESULT_OK, request);
58 checkpassword_verify_plain(struct auth_request *request, const char *password, argument
61 struct passdb_module *_module = request->passdb->passdb;
65 db_checkpassword_call(module->db, request, passwor
70 credentials_checkpassword_callback(struct auth_request *request, enum db_checkpassword_status status, const char *const *extra_fields, lookup_credentials_callback_t *callback) argument
105 checkpassword_lookup_credentials(struct auth_request *request, lookup_credentials_callback_t *callback) argument
[all...]
H A Dpassdb-static.c15 static_save_fields(struct auth_request *request, const char **password_r, argument
19 (struct static_passdb_module *)request->passdb->passdb;
25 auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup");
26 if (passdb_template_export(module->tmpl, request, &error) < 0) {
27 auth_request_log_error(request, AUTH_SUBSYS_DB,
34 request, NULL, password_r, &error) <= 0) {
35 auth_request_log_error(request, AUTH_SUBSYS_DB,
40 } else if (auth_fields_exists(request->extra_fields, "nopassword")) {
43 auth_request_log_info(request, AUTH_SUBSYS_DB,
53 auth_request_set_field(request, "passwor
60 static_verify_plain(struct auth_request *request, const char *password, verify_plain_callback_t *callback) argument
86 static_lookup_credentials(struct auth_request *request, lookup_credentials_callback_t *callback) argument
[all...]
H A Duserdb-blocking.c19 struct auth_request *request = context; local
37 if (username[0] != '\0' && strcmp(request->user, username) != 0)
38 request->user = p_strdup(request->pool, username);
46 auth_fields_import(request->userdb_reply, args, 0);
47 if (auth_fields_exists(request->userdb_reply, "tempfail"))
48 request->userdb_lookup_tempfailed = TRUE;
51 auth_request_userdb_callback(result, request);
52 auth_request_unref(&request);
56 void userdb_blocking_lookup(struct auth_request *request) argument
90 userdb_blocking_iter_init(struct auth_request *request, userdb_iter_callback_t *callback, void *context) argument
[all...]
/dovecot/src/indexer/
H A Dindexer.c16 struct indexer_request *request; member in struct:worker_request
47 struct indexer_request *request)
53 wrequest->request = request;
55 indexer_queue_request_work(request);
56 worker_connection_request(conn, request, wrequest);
62 struct indexer_request *request; local
66 while ((request = indexer_queue_request_peek(queue)) != NULL) {
68 request->username);
72 connection for sending this next request
46 worker_send_request(struct worker_connection *conn, struct indexer_request *request) argument
90 struct worker_request *request = context; local
[all...]
/dovecot/src/util/
H A Dtcpwrap.c33 struct request_info request; local
35 request_init(&request, RQ_DAEMON, daemon_name,
37 fromhost(&request);
39 if (!hosts_access(&request))

Completed in 315 milliseconds

1234