Displaying 4 results from an estimated 4 matches for "mech_init_auth_client_reply".
2004 Jul 22
1
[PATCH] add LOGIN authentication mechanism
...auth_request->pool, data, data_size);
+
+ if (!mech_is_valid_username(auth_request->user)) {
+ if (verbose) {
+ i_info("login(%s): invalid username",
+ get_log_prefix(auth_request));
+ }
+ mech_auth_finish(auth_request, NULL, 0, FALSE);
+ return TRUE;
+ }
+
+ mech_init_auth_client_reply(&reply);
+ reply.id = auth_request->id;
+ reply.result = AUTH_CLIENT_RESULT_CONTINUE;
+
+ reply.reply_idx = 0;
+ reply.data_size = strlen(prompt2);
+ callback(&reply, prompt2, auth_request->conn);
+ } else {
+ char *pass = p_strndup(unsafe_data_stack_pool, data, data_size);
+
+...
2004 Aug 09
1
[PATCH] RPA authentication mechanism
...ken2(auth, t_strconcat(service, "@",
+ my_hostname, NULL), &token2_size);
+
+ auth->service_ucs2be = ucs2be_str(auth->pool, service,
+ &auth->service_len);
+ auth->realm_ucs2be = ucs2be_str(auth->pool, my_hostname,
+ &auth->realm_len);
+
+ mech_init_auth_client_reply(&reply);
+ reply.id = auth_request->id;
+ reply.result = AUTH_CLIENT_RESULT_CONTINUE;
+
+ reply.reply_idx = 0;
+ reply.data_size = token2_size;
+ callback(&reply, token2, auth_request->conn);
+
+ auth->phase = 1;
+
+ return TRUE;
+}
+
+static int
+mech_rpa_auth_phase2(struct auth_r...
2004 Oct 07
0
[PATCH] fix NTLM2 endianness buglet
...ate_challenge(auth->pool, request,
&message_size);
- auth->ntlm2_negotiated = message->flags & NTLMSSP_NEGOTIATE_NTLM2;
+ auth->ntlm2_negotiated =
+ read_le32(&message->flags) & NTLMSSP_NEGOTIATE_NTLM2;
auth->challenge = message->challenge;
mech_init_auth_client_reply(&reply);
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: <http://dovecot.org/pipermail/dovecot/attachments/20041007/c536aa95/attachment-0001.bin>
2004 Sep 30
1
[PATCH] NTLM2 support
..._SIZE) == 0;
@@ -145,6 +154,7 @@ mech_ntlm_auth_continue(struct auth_requ
message = ntlmssp_create_challenge(auth->pool, request,
&message_size);
+ auth->ntlm2_negotiated = message->flags & NTLMSSP_NEGOTIATE_NTLM2;
auth->challenge = message->challenge;
mech_init_auth_client_reply(&reply);
diff -urpNX /usr/share/dontdiff dovecot-1.0-test46.vanilla/src/lib-ntlm/ntlm-encrypt.c dovecot-1.0-test46/src/lib-ntlm/ntlm-encrypt.c
--- dovecot-1.0-test46.vanilla/src/lib-ntlm/ntlm-encrypt.c 2004-09-22 23:52:09.000000000 +0400
+++ dovecot-1.0-test46/src/lib-ntlm/ntlm-encrypt.c 2004-0...