auth-server-connection.c revision bf05bf725add3686bdb1cb2723208b1562596d17
baf6671fd3847865da9b64dc8f8be85d81304840Daniel Lezcano/* Copyright (c) 2003-2009 Dovecot authors, see the included COPYING file */
4019712d198a7d50b08b326ade17f5ff1666efbbStéphane Graber#define AUTH_SERVER_CONN_MAX_LINE_LENGTH AUTH_CLIENT_MAX_LINE_LENGTH
4019712d198a7d50b08b326ade17f5ff1666efbbStéphane Graberauth_server_connection_disconnect(struct auth_server_connection *conn);
d1de19abd0067f38bc08a4a3357de701a4e5571ddlezcanoauth_server_input_mech(struct auth_server_connection *conn,
d1de19abd0067f38bc08a4a3357de701a4e5571ddlezcano const char *const *args)
8a67a2b2eaf28033962a432c214bd3303c29c54cdlezcano i_error("BUG: Authentication server already sent handshake");
d1de19abd0067f38bc08a4a3357de701a4e5571ddlezcano i_error("BUG: Authentication server sent broken MECH line");
6a85cf91247b7dd9c3faeddceca8dacb96d02cd6Stéphane Graber mech_desc.name = p_strdup(conn->pool, args[0]);
aa8d013ec5b09cd1cd904173d6234ef126eb2126Peter Simons else if (strcmp(*args, "forward-secrecy") == 0)
7822022c4c72cee06905b540b89b653491d6f6b2Stéphane Graber mech_desc.flags |= MECH_SEC_FORWARD_SECRECY;
8b8b04f80adf21480c25deb1aae263049ddd6754dlezcano array_append(&conn->available_auth_mechs, &mech_desc, 1);
const char *const *args)
const char *const *args)
const char *const *args)
unsigned int id;
const char *const *args)
const char *const *args)
const char *const *args)
const char *line)
const char *const *args;
const char *line;
int ret;
T_BEGIN {
} T_END;
if (ret < 0) {
struct auth_server_connection *
return conn;
const char *handshake;
int fd;
FALSE);
unsigned int id;
if (id == 0) {
return id;