sasl-server.c revision 7839797af86d5536124c67f09ede30df08cf678a
c8296ac1ed68ed5c5168de545b76f9b27fc76d35Timo Sirainen/* Copyright (c) 2002-2010 Dovecot authors, see the included COPYING file */
c8296ac1ed68ed5c5168de545b76f9b27fc76d35Timo Sirainen "Maximum number of connections from user+IP exceeded " \
c8296ac1ed68ed5c5168de545b76f9b27fc76d35Timo Sirainen "(mail_max_userip_connections=%u)"
c8296ac1ed68ed5c5168de545b76f9b27fc76d35Timo Sirainen unsigned char cookie[MASTER_AUTH_COOKIE_SIZE];
c8296ac1ed68ed5c5168de545b76f9b27fc76d35Timo Sirainensasl_server_get_advertised_mechs(struct client *client, unsigned int *count_r)
c8296ac1ed68ed5c5168de545b76f9b27fc76d35Timo Sirainen unsigned int i, j, count;
c8296ac1ed68ed5c5168de545b76f9b27fc76d35Timo Sirainen mech = auth_client_get_available_mechs(auth_client, &count);
c8296ac1ed68ed5c5168de545b76f9b27fc76d35Timo Sirainen ret_mech = t_new(struct auth_mech_desc, count);
c8296ac1ed68ed5c5168de545b76f9b27fc76d35Timo Sirainen for (i = j = 0; i < count; i++) {
*count_r = j;
return ret_mech;
static enum auth_request_flags
return auth_flags;
case MASTER_AUTH_STATUS_OK:
const unsigned char *data;
const char *errmsg;
bool nologin;
switch (status) {
case AUTH_REQUEST_STATUS_OK:
if (nologin) {
case AUTH_REQUEST_STATUS_FAIL:
const char *initial_resp_base64,
const char *auth_name =