| /dovecot/src/imap/ |
| H A D | cmd-genurlauth.c | 12 string_t *response; local 23 response = t_str_new(1024); 24 str_append(response, "* GENURLAUTH"); 46 str_append_c(response, ' '); 47 imap_append_astring(response, url); 50 client_send_line(cmd->client, str_c(response));
|
| H A D | cmd-urlfetch.c | 179 string_t *response = t_str_new(256); local 182 str_append(response, "* URLFETCH "); 183 imap_append_astring(response, reply->url); 189 str_printfa(response, " {%"PRIuUOFF_T"}", reply->size); 190 client_send_line(cmd->client, str_c(response)); 198 str_append(response, " ("); 201 str_append(response, "BODYPARTSTRUCTURE ("); 202 str_append(response, reply->bodypartstruct); 203 str_append_c(response, ')'); 209 str_append_c(response, ' '); 272 string_t *response = t_str_new(128); local [all...] |
| /dovecot/src/lib-oauth2/ |
| H A D | oauth2-introspect.c | 40 oauth2_introspect_response(const struct http_response *response, argument 43 if (response->status / 100 != 2) { 44 oauth2_introspect_continue(req, FALSE, response->reason); 46 if (response->payload == NULL) { 47 oauth2_introspect_continue(req, FALSE, "Missing response body"); 51 req->is = response->payload;
|
| H A D | oauth2-refresh.c | 80 oauth2_refresh_response(const struct http_response *response, argument 83 if (response->status / 100 != 2) { 84 oauth2_refresh_continue(req, FALSE, response->reason); 86 if (response->payload == NULL) { 87 oauth2_refresh_continue(req, FALSE, "Missing response body"); 91 req->is = response->payload;
|
| H A D | oauth2-token-validate.c | 62 oauth2_token_validate_response(const struct http_response *response, argument 65 unsigned int status_1 = response->status / 100; 68 oauth2_token_validate_continue(req, FALSE, response->reason); 76 if (response->payload == NULL) { 80 req->is = response->payload;
|
| /dovecot/src/submission-login/ |
| H A D | client-authenticate.c | 106 This response to the AUTH command indicates that the 116 such a response, it MUST reject the AUTH command by sending 123 If the server cannot [BASE64] decode any client response, it 164 5.5.4 enhanced response code. */ 185 If the client uses an initial-response argument to the AUTH 215 This response to the AUTH command indicates that the 226 const char *response) 231 if (strcmp(response, "*") == 0) { 236 client_auth_respond(client, response); 224 cmd_auth_continue(void *conn_ctx, struct smtp_server_cmd_ctx *cmd ATTR_UNUSED, const char *response) argument
|
| /dovecot/src/lib-ntlm/ |
| H A D | ntlm-encrypt.c | 89 unsigned char response[NTLMSSP_RESPONSE_SIZE]) 97 deshash(response, des_hash, challenge); 98 deshash(response + 8, des_hash + 7, challenge); 99 deshash(response + 16, des_hash + 14, challenge); 108 unsigned char response[NTLMSSP_RESPONSE_SIZE]) 118 ntlmssp_v1_response(hash, session_hash, response); 126 unsigned char response[NTLMSSP_V2_RESPONSE_SIZE]) 136 hmac_final(&ctx, response); 87 ntlmssp_v1_response(const unsigned char *hash, const unsigned char *challenge, unsigned char response[NTLMSSP_RESPONSE_SIZE]) argument 105 ntlmssp2_response(const unsigned char *hash, const unsigned char *server_challenge, const unsigned char *client_challenge, unsigned char response[NTLMSSP_RESPONSE_SIZE]) argument 122 ntlmssp_v2_response(const char *user, const char *target, const unsigned char *hash_v1, const unsigned char *challenge, const unsigned char *blob, size_t blob_size, unsigned char response[NTLMSSP_V2_RESPONSE_SIZE]) argument
|
| H A D | ntlm-message.c | 230 bool ntlmssp_check_response(const struct ntlmssp_response *response, argument 234 *error = "response too short"; 238 if (read_le64(&response->magic) != NTLMSSP_MAGIC) { 243 if (read_le32(&response->type) != NTLMSSP_MSG_TYPE3) { 248 if (!ntlmssp_check_buffer(&response->lm_response, data_size, error) || 249 !ntlmssp_check_buffer(&response->ntlm_response, data_size, error) || 250 !ntlmssp_check_buffer(&response->domain, data_size, error) || 251 !ntlmssp_check_buffer(&response->user, data_size, error) || 252 !ntlmssp_check_buffer(&response->workstation, data_size, error))
|
| /dovecot/src/plugins/fts/ |
| H A D | fts-parser-tika.c | 87 fts_tika_parser_response(const struct http_response *response, argument 92 switch (response->status) { 94 /* read response */ 95 if (response->payload == NULL) 98 i_stream_ref(response->payload); 99 parser->payload = response->payload; 102 case 204: /* empty response */ 108 http_response_get_message(response)); 113 if (response->status / 100 == 5) { 123 http_response_get_message(response)); [all...] |
| /dovecot/src/auth/ |
| H A D | mech-cram-md5.c | 30 char *response; member in struct:cram_auth_request 70 if (!mem_equals_timing_safe(response_hex, request->response, sizeof(digest)*2)) { 87 /* <username> SPACE <response>. Username may contain spaces, so assume 88 the rightmost space is the response separator. */ 91 *error_r = "NULs in response"; 105 request->response =
|
| H A D | mech-ntlm.c | 30 struct ntlmssp_response *response; member in struct:ntlm_auth_request 47 ntlmssp_buffer_length(request->response, lm_response); 48 client_response = ntlmssp_buffer_data(request->response, lm_response); 52 "LM response length is too small"); 93 ntlmssp_buffer_length(request->response, ntlm_response); 94 client_response = ntlmssp_buffer_data(request->response, ntlm_response); 126 ntlmssp_buffer_data(request->response, lm_response); 207 const struct ntlmssp_response *response = local 211 if (!ntlmssp_check_response(response, data_size, &error)) { 213 "invalid NTLM response [all...] |
| H A D | mech-digest-md5.c | 48 unsigned char response[32]; member in struct:digest_auth_request 130 response = 169 /* do it twice, first verify the user's response, the second is 191 /* response */ 210 /* verify response */ 211 if (!mem_equals_timing_safe(response_hex, request->response, 32)) { 419 if (strcmp(key, "response") == 0) { 421 *error = "Invalid response value"; 425 memcpy(request->response, value, 32); 468 response [all...] |
| H A D | mech-rpa.c | 62 * Compute client -> server authentication response. 86 * Compute server -> client authentication response. 290 /* Read user response */ 293 *error = "invalid user response"; 406 /* Server authentication response */ 424 unsigned char response[MD5_RESULTLEN]; local 433 rpa_user_response(request, response); 434 return mem_equals_timing_safe(response, request->user_response, sizeof(response));
|
| H A D | auth-policy.c | 293 "Policy server response was malformed"); 298 "Policy server response JSON parse error: %s", error); 314 "Policy response %d with message: %s", 321 "Policy response %d", context->result); 336 void auth_policy_process_response(const struct http_response *response, argument 341 context->payload = response->payload; 343 if ((response->status / 10) != 20) { 346 http_response_get_message(response)); 352 if (response->payload == NULL) { 362 i_stream_ref(response [all...] |
| /dovecot/src/util/ |
| H A D | script.c | 232 char response[2]; local 234 response[0] = client_exec_script(conn) ? '+' : '-'; 235 response[1] = '\n'; 236 if (write_full(conn->fd, &response, 2) < 0) 237 i_error("write(response) failed: %m");
|
| /dovecot/src/imap-urlauth/ |
| H A D | imap-urlauth-client.c | 204 client_worker_input_line(struct client *client, const char *response) argument 214 if (strcasecmp(response, "OK") != 0) { 250 if (strcasecmp(response, "OK") != 0) { 260 if (strcasecmp(response, "DISCONNECTED") == 0) { 263 } else if (strcasecmp(response, "FINISHED") != 0) { 264 /* unknown response */ 266 "Worker finished with unknown response");
|
| H A D | imap-urlauth-worker.c | 398 string_t *response; local 434 response = t_str_new(256); 435 str_append(response, "OK"); 437 str_append(response, "\thasnuls"); 439 str_append(response, "\tbpstruct="); 440 str_append(response, str_tabescape(bpstruct)); 451 str_append(response, "\t0"); 452 client_send_line(client, "%s", str_c(response)); 461 str_printfa(response, "\t%"PRIuUOFF_T, client->msg_part_size); 462 client_send_line(client, "%s", str_c(response)); [all...] |
| /dovecot/src/lib-http/ |
| H A D | http-response-parser.c | 9 #include "http-response-parser.h" 165 "Invalid HTTP version in response: %s", 176 ("Expected ' ' after response version, but found %s", 188 _parser->error = "Invalid HTTP status code in response"; 198 ("Expected ' ' after response status code, but found %s", 226 ("Expected line end after response, but found %s", 288 seconds to delay after the response is received. 316 struct http_response *response, const char **error_r) 322 i_zero(response); 324 /* make sure we finished streaming payload from previous response 314 http_response_parse_next(struct http_response_parser *parser, enum http_response_payload_type payload_type, struct http_response *response, const char **error_r) argument [all...] |
| H A D | test-http-client.c | 58 got_request_response(const struct http_response *response, argument 63 if (response->status / 100 != 2) { 64 i_error("HTTP Request failed: %s", response->reason); 70 i_info("DEBUG: REQUEST SUCCEEDED: %s", response->reason); 72 if (response->payload == NULL) { 78 i_stream_ref(response->payload); 79 req->payload = response->payload; 80 req->io = io_add_istream(response->payload, payload_input, req);
|
| H A D | test-http-response-parser.c | 10 #include "http-response-parser.h" 30 /* Valid response tests */ 187 test_begin(t_strdup_printf("http response valid [%d]", i)); 218 /* verify last response only */ 219 test_out(t_strdup_printf("response->status = %d", 223 test_out(t_strdup_printf("response->payload = %s", 227 test_out(t_strdup_printf("response->payload = %s", 249 * Invalid response tests 315 struct http_response response; local 331 test_begin(t_strdup_printf("http response invali 353 struct http_response response; local [all...] |
| H A D | http-server-connection.c | 222 if (req->response == NULL && stream_errno != 0 && 249 if (req->response != NULL && req->response->submitted) 253 /* no response submitted yet */ 256 /* response submitted, but not all payload is necessarily read */ 272 state it is in). this call also triggers sending the next response if 357 && req->response == NULL) { 379 if (req->response != NULL && req->response->submitted) 384 (req->response ! 880 static const char *response = "HTTP/1.1 100 Continue\\r\\n\\r\\n"; local [all...] |
| H A D | http-server-private.h | 33 response is yet submitted */ 35 /* A response is submitted for this request. If not all request payload 39 /* Request is ready for response; a response is submitted and the request 42 /* The response for the request is sent (apart from payload) */ 44 /* Sending response payload to client */ 111 struct http_server_response *response; member in struct:http_server_request
|
| /dovecot/src/login-common/ |
| H A D | client-common-auth.c | 84 "delayed sending initial response (greeting)"); 580 void client_auth_respond(struct client *client, const char *response) argument 584 auth_client_request_continue(client->auth_request, response); 617 client_destroy(client, "Authentication response too large");
|
| /dovecot/src/plugins/push-notification/ |
| H A D | push-notification-driver-ox.c | 275 (const struct http_response *response, struct mail_user *user) 277 switch (response->status / 100) { 283 http_response_get_message(response)); 290 http_response_get_message(response)); 274 push_notification_driver_ox_http_callback(const struct http_response *response, struct mail_user *user) argument
|
| /dovecot/src/plugins/fts-solr/ |
| H A D | solr-connection.c | 193 /* response -> result -> doc */ 196 if (strcmp(name, "response") == 0) 410 solr_connection_select_response(const struct http_response *response, argument 413 if (response->status / 100 != 2) { 415 http_response_get_message(response)); 420 if (response->payload == NULL) { 421 i_error("fts_solr: Lookup failed: Empty response payload"); 426 i_stream_ref(response->payload); 427 conn->payload = response->payload; 428 conn->io = io_add_istream(response 483 solr_connection_update_response(const struct http_response *response, struct solr_connection *conn) argument [all...] |