| /dovecot/src/auth/ |
| H A D | mech-plain-common.c | 9 struct auth_request *request) 13 auth_request_success(request, "", 0); 16 auth_request_internal_failure(request); 19 auth_request_fail(request); 8 plain_verify_callback(enum passdb_result result, struct auth_request *request) argument
|
| H A D | mech-anonymous.c | 7 mech_anonymous_auth_continue(struct auth_request *request, argument 10 i_assert(*request->set->anonymous_username != '\0'); 12 if (request->set->verbose) { 15 request->user = 17 auth_request_log_info(request, AUTH_SUBSYS_MECH, "login"); 20 request->user = p_strdup(request->pool, 21 request->set->anonymous_username); 23 request->passdb_success = TRUE; 24 auth_request_success(request, "", 29 struct auth_request *request; local [all...] |
| H A D | mech-external.c | 9 mech_external_auth_continue(struct auth_request *request, argument 15 if (request->user == NULL) { 16 auth_request_log_info(request, AUTH_SUBSYS_MECH, 18 auth_request_fail(request); 24 if (!auth_request_set_username(request, "", &error)) { 25 auth_request_log_info(request, AUTH_SUBSYS_MECH, 27 auth_request_fail(request); 32 !auth_request_set_login_username(request, authzid, &error)) { 34 auth_request_log_info(request, AUTH_SUBSYS_MECH, 36 auth_request_fail(request); 45 struct auth_request *request; local [all...] |
| H A D | mech-otp-skey-common.c | 38 struct otp_auth_request *request = local 41 if (!request->lock) 45 request->lock = FALSE;
|
| H A D | passdb-sia.c | 33 local_sia_verify_plain(struct auth_request *request, const char *password, argument 38 auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup"); 42 (char *)request->user, NULL, NULL, NULL, 44 auth_request_log_password_mismatch(request, AUTH_SUBSYS_DB); 45 callback(PASSDB_RESULT_PASSWORD_MISMATCH, request); 47 callback(PASSDB_RESULT_OK, request);
|
| H A D | auth-request-stats.c | 11 #include "auth-request.h" 12 #include "auth-request-stats.h" 19 struct auth_stats *auth_request_stats_get(struct auth_request *request) argument 21 if (request->stats == NULL) 22 request->stats = stats_alloc(request->pool); 23 return stats_fill_ptr(request->stats, auth_stats_item); 26 void auth_request_stats_add_tempfail(struct auth_request *request) argument 28 struct auth_stats *stats = auth_request_stats_get(request); 33 void auth_request_stats_send(struct auth_request *request) argument [all...] |
| H A D | mech-login.c | 17 mech_login_auth_continue(struct auth_request *request, argument 23 if (request->user == NULL) { 26 if (!auth_request_set_username(request, username, &error)) { 27 auth_request_log_info(request, AUTH_SUBSYS_MECH, "%s", error); 28 auth_request_fail(request); 32 auth_request_handler_reply_continue(request, prompt2, 36 auth_request_verify_plain(request, pass, plain_verify_callback); 42 mech_login_auth_initial(struct auth_request *request, argument 48 auth_request_handler_reply_continue(request, prompt1, 51 mech_login_auth_continue(request, dat 57 struct auth_request *request; local [all...] |
| H A D | mech-plain.c | 10 mech_plain_auth_continue(struct auth_request *request, argument 44 auth_request_log_info(request, AUTH_SUBSYS_MECH, "invalid input"); 45 auth_request_fail(request); 46 } else if (!auth_request_set_username(request, authenid, &error)) { 48 auth_request_log_info(request, AUTH_SUBSYS_MECH, "%s", error); 49 auth_request_fail(request); 51 !auth_request_set_login_username(request, authid, &error)) { 53 auth_request_log_info(request, AUTH_SUBSYS_MECH, 55 auth_request_fail(request); 57 auth_request_verify_plain(request, pas 68 struct auth_request *request; local [all...] |
| H A D | passdb-bsdauth.c | 17 bsdauth_verify_plain(struct auth_request *request, const char *password, argument 24 auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup"); 26 switch (i_getpwnam(request->user, &pw)) { 28 auth_request_log_error(request, AUTH_SUBSYS_DB, 30 callback(PASSDB_RESULT_INTERNAL_FAILURE, request); 33 auth_request_log_unknown_user(request, AUTH_SUBSYS_DB); 34 callback(PASSDB_RESULT_USER_UNKNOWN, request); 39 type = t_strdup_printf("auth-%s", request->service); 40 result = auth_userokay(request->user, NULL, t_strdup_noconst(type), 47 auth_request_log_password_mismatch(request, AUTH_SUBSYS_D [all...] |
| H A D | mech-dovecot-token.c | 12 mech_dovecot_token_auth_continue(struct auth_request *request, argument 44 auth_request_log_info(request, AUTH_SUBSYS_MECH, "invalid input"); 45 auth_request_fail(request); 46 } else if (!auth_request_set_username(request, username, &error)) { 48 auth_request_log_info(request, AUTH_SUBSYS_MECH, "%s", error); 49 auth_request_fail(request); 52 auth_token_get(service, pid, request->user, session_id); 56 request->passdb_success = TRUE; 57 auth_request_set_field(request, "userdb_client_service", service, ""); 58 auth_request_success(request, NUL 71 struct auth_request *request; local [all...] |
| H A D | passdb-blocking.c | 13 auth_worker_reply_parse_args(struct auth_request *request, argument 17 request->passdb_password = p_strdup(request->pool, *args); 21 auth_request_set_fields(request, args, NULL); 25 passdb_blocking_auth_worker_reply_parse(struct auth_request *request, const char *reply) argument 35 auth_request_set_field(request, "user", args[1], NULL); 36 auth_worker_reply_parse_args(request, args + 2); 43 auth_request_set_field(request, "user", args[1], NULL); 44 auth_worker_reply_parse_args(request, args + 1); 62 auth_request_set_field(request, "use 79 struct auth_request *request = context; local 88 passdb_blocking_verify_plain(struct auth_request *request) argument 105 struct auth_request *request = context; local 128 passdb_blocking_lookup_credentials(struct auth_request *request) argument 146 struct auth_request *request = context; local 155 passdb_blocking_set_credentials(struct auth_request *request, const char *new_credentials) argument [all...] |
| H A D | passdb-oauth2.c | 15 struct auth_request *request) 18 auth_request_log_error(request, AUTH_SUBSYS_DB, "oauth2 failed: %s", 21 auth_request_log_info(request, AUTH_SUBSYS_DB, "oauth2 failed: %s", 23 req->verify_callback(result, request); 24 auth_request_unref(&request); 28 oauth2_verify_plain(struct auth_request *request, const char *password, argument 32 (struct oauth2_passdb_module *)request->passdb->passdb; 34 p_new(request->pool, struct db_oauth2_request, 1); 35 req->pool = request->pool; 38 auth_request_ref(request); 13 oauth2_verify_plain_continue(struct db_oauth2_request *req, enum passdb_result result, const char *error, struct auth_request *request) argument [all...] |
| H A D | passdb-passwd.c | 15 passwd_lookup(struct auth_request *request, struct passwd *pw_r) argument 17 auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup"); 19 switch (i_getpwnam(request->user, pw_r)) { 21 auth_request_log_error(request, AUTH_SUBSYS_DB, 25 auth_request_log_unknown_user(request, AUTH_SUBSYS_DB); 30 auth_request_log_info(request, AUTH_SUBSYS_DB, 36 auth_request_set_field(request, "password", pw_r->pw_passwd, 42 passwd_verify_plain(struct auth_request *request, const char *password, argument 49 res = passwd_lookup(request, &pw); 51 callback(res, request); 73 passwd_lookup_credentials(struct auth_request *request, lookup_credentials_callback_t *callback) argument [all...] |
| H A D | passdb-shadow.c | 16 shadow_lookup(struct auth_request *request, struct spwd **spw_r) argument 18 auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup"); 20 *spw_r = getspnam(request->user); 22 auth_request_log_unknown_user(request, AUTH_SUBSYS_DB); 27 auth_request_log_info(request, AUTH_SUBSYS_DB, 33 auth_request_set_field(request, "password", (*spw_r)->sp_pwdp, 39 shadow_verify_plain(struct auth_request *request, const char *password, argument 46 res = shadow_lookup(request, &spw); 48 callback(res, request); 53 ret = auth_request_password_verify(request, passwor 71 shadow_lookup_credentials(struct auth_request *request, lookup_credentials_callback_t *callback) argument [all...] |
| H A D | test-mock.c | 24 static void passdb_mock_verify_plain(struct auth_request *request, const char *password ATTR_UNUSED, argument 27 callback(PASSDB_RESULT_OK, request);
|
| H A D | userdb-checkpassword.c | 16 userdb_checkpassword_callback(struct auth_request *request, argument 25 callback(USERDB_RESULT_INTERNAL_FAILURE, request); 28 callback(USERDB_RESULT_USER_UNKNOWN, request); 34 auth_request_set_field_keyvalue(request, 37 callback(USERDB_RESULT_OK, request); 43 checkpassword_lookup(struct auth_request *request, userdb_callback_t *callback) argument 45 struct userdb_module *_module = request->userdb->userdb; 49 db_checkpassword_call(module->db, request, NULL,
|
| H A D | mech-apop.c | 32 static bool verify_credentials(struct apop_auth_request *request, argument 39 md5_update(&ctx, request->challenge, strlen(request->challenge)); 43 return mem_equals_timing_safe(digest, request->response_digest, 16); 51 struct apop_auth_request *request = local 56 if (verify_credentials(request, credentials, size)) 74 struct apop_auth_request *request = local 97 request->challenge = p_strdup_until(request->pool, data, tmp); 119 memcpy(request 151 struct apop_auth_request *request; local [all...] |
| H A D | mech-oauth2.c | 42 struct auth_request *request) 45 (struct oauth2_auth_request*)request; 50 auth_request_success(request, "", 0); 53 auth_request_internal_failure(request); 57 if (request->mech_password != NULL) 58 request->mech_password = NULL; 59 auth_request_handler_reply_continue(request, error, strlen(error)); 66 xoauth2_verify_callback(enum passdb_result result, struct auth_request *request) argument 70 oauth2_verify_callback(result, error, request); 74 oauthbearer_verify_callback(enum passdb_result result, struct auth_request *request) argument 40 oauth2_verify_callback(enum passdb_result result, const char *error, struct auth_request *request) argument 85 mech_xoauth2_auth_continue(struct auth_request *request, const unsigned char *data, size_t data_size) argument 146 mech_oauthbearer_auth_continue(struct auth_request *request, const unsigned char *data, size_t data_size) argument 240 struct oauth2_auth_request *request; local [all...] |
| H A D | mech-skey.c | 22 struct otp_auth_request *request = local 27 &request->state) != 0) { 28 auth_request_log_error(&request->auth_request, AUTH_SUBSYS_MECH, 34 if (request->state.algo != OTP_HASH_MD4) { 35 auth_request_log_error(&request->auth_request, AUTH_SUBSYS_MECH, 41 if (--request->state.seq < 1) { 42 auth_request_log_error(&request->auth_request, AUTH_SUBSYS_MECH, 48 request->lock = otp_try_lock(auth_request); 49 if (!request->lock) { 50 auth_request_log_error(&request 124 struct otp_auth_request *request = local 174 struct otp_auth_request *request; local [all...] |
| H A D | mech.c | 52 void mech_generic_auth_initial(struct auth_request *request, argument 56 auth_request_handler_reply_continue(request, uchar_empty_ptr, 0); 59 request->mech->auth_continue(request, data, data_size); 63 void mech_generic_auth_free(struct auth_request *request) argument 65 pool_unref(&request->pool);
|
| H A D | passdb-checkpassword.c | 17 auth_checkpassword_callback(struct auth_request *request, argument 27 callback(PASSDB_RESULT_INTERNAL_FAILURE, request); 30 callback(PASSDB_RESULT_PASSWORD_MISMATCH, request); 39 auth_request_set_field_keyvalue(request, 47 auth_request_set_field(request, "password", 50 auth_request_log_error(request, AUTH_SUBSYS_DB, 54 callback(PASSDB_RESULT_OK, request); 58 checkpassword_verify_plain(struct auth_request *request, const char *password, argument 61 struct passdb_module *_module = request->passdb->passdb; 65 db_checkpassword_call(module->db, request, passwor 70 credentials_checkpassword_callback(struct auth_request *request, enum db_checkpassword_status status, const char *const *extra_fields, lookup_credentials_callback_t *callback) argument 105 checkpassword_lookup_credentials(struct auth_request *request, lookup_credentials_callback_t *callback) argument [all...] |
| H A D | passdb-static.c | 15 static_save_fields(struct auth_request *request, const char **password_r, argument 19 (struct static_passdb_module *)request->passdb->passdb; 25 auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup"); 26 if (passdb_template_export(module->tmpl, request, &error) < 0) { 27 auth_request_log_error(request, AUTH_SUBSYS_DB, 34 request, NULL, password_r, &error) <= 0) { 35 auth_request_log_error(request, AUTH_SUBSYS_DB, 40 } else if (auth_fields_exists(request->extra_fields, "nopassword")) { 43 auth_request_log_info(request, AUTH_SUBSYS_DB, 53 auth_request_set_field(request, "passwor 60 static_verify_plain(struct auth_request *request, const char *password, verify_plain_callback_t *callback) argument 86 static_lookup_credentials(struct auth_request *request, lookup_credentials_callback_t *callback) argument [all...] |
| H A D | userdb-blocking.c | 19 struct auth_request *request = context; local 37 if (username[0] != '\0' && strcmp(request->user, username) != 0) 38 request->user = p_strdup(request->pool, username); 46 auth_fields_import(request->userdb_reply, args, 0); 47 if (auth_fields_exists(request->userdb_reply, "tempfail")) 48 request->userdb_lookup_tempfailed = TRUE; 51 auth_request_userdb_callback(result, request); 52 auth_request_unref(&request); 56 void userdb_blocking_lookup(struct auth_request *request) argument 90 userdb_blocking_iter_init(struct auth_request *request, userdb_iter_callback_t *callback, void *context) argument [all...] |
| /dovecot/src/indexer/ |
| H A D | indexer.c | 16 struct indexer_request *request; member in struct:worker_request 47 struct indexer_request *request) 53 wrequest->request = request; 55 indexer_queue_request_work(request); 56 worker_connection_request(conn, request, wrequest); 62 struct indexer_request *request; local 66 while ((request = indexer_queue_request_peek(queue)) != NULL) { 68 request->username); 72 connection for sending this next request 46 worker_send_request(struct worker_connection *conn, struct indexer_request *request) argument 90 struct worker_request *request = context; local [all...] |
| /dovecot/src/util/ |
| H A D | tcpwrap.c | 33 struct request_info request; local 35 request_init(&request, RQ_DAEMON, daemon_name, 37 fromhost(&request); 39 if (!hosts_access(&request))
|