Displaying 6 results from an estimated 6 matches for "mech_nam".
Did you mean:
mech_name
2004 Dec 09
1
Help needed with debugging auth command
Hi guys,
OK, so I am trying to find out why the POP3 AUTH / IMAP AUTHORIZE
command is not doing what it is supposed to (not sure if it just for me
or what). I am getting as far as:
sasl-server.c - line 123 - mech = auth_client_find_mech(auth_client,
mech_name);
auth_client_find_mech is in auth-client.c which is where I am getting lost.
My guess is we are not returning back to sasl-server.c since we don't
get an SASL auth or an 'Unsupported' error.
If I try 'PLAIN' as the auth method as the parameter then it tries to
login with n...
2009 Jan 15
3
Enforcing STARTTLS for all mechs while disabling imaps
Hi all,
Is there a way to enforce STARTTLS for all connections, regardless their
authentication mechanism? disable_plaintext_auth only takes care of the auth
conversation, but I would like to have all communication encrypted.
As far as I can see, this would only be possible when using imaps and
disabling imap. However, I would like to have the other way around;
disabling imaps and using imap for
2020 Aug 14
0
2.3.11.3 on 32bit platforms
...est_case *test_case = &tests[running_test];
const struct mech_module *mech = test_case->mech;
struct auth_request *request;
- const char *testname = t_strdup_printf("auth mech %s %d/%lu",
+ const char *testname = t_strdup_printf("auth mech %s %d/%zu",
mech->mech_name,
running_test+1,
N_ELEMENTS(tests));
2004 Jan 01
1
[PATCH] Add winbind-backed NTLMSSP support to Cyrus-SASL
...- if (text->out_buf) utils->free(text->out_buf);
+ struct ntlm_context *context =
+ (struct ntlm_context *)conn_context;
+
+ ntlm_kill_helper(context);
- utils->free(text);
+ return;
}
static sasl_server_plug_t ntlm_server_plugins[] =
{
{
- "NTLM", /* mech_name */
+ "NTLM", /* mech_name */
0, /* max_ssf */
- SASL_SEC_NOPLAINTEXT
- | SASL_SEC_NOANONYMOUS, /* security_flags */
- SASL_FEAT_WANT_CLIENT_FIRST, /* features */
+ SASL_SEC_NOANONYMOUS
+ | SASL_SEC_NOPLAINTEXT, /* security_flags */
+ SASL_FEAT_WANT_CLIENT_FIRST, /* features */...
2006 Feb 27
2
Bug in Kerberos support for openssh.
...input_name,
output_name)
OM_uint32 * minor_status;
gss_name_t input_name;
gss_name_t * output_name;
{
gss_union_name_t union_name;
union_name = (gss_union_name_t) input_name;
*output_name = union_name->mech_name;
return 0;
}
and then hacked gss-serv.c to have this:
#if 0
/* FIXME(eric) - this is the wrong type for this type of
* lookup.
*/
if ((ctx->major = gss_export_name(&ctx->minor, ctx->client,
&ename))) {
ssh_gss...
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...skip_password_check") == 0) {
- i_assert(request->master_user != NULL);
+ i_assert(request->master_user != NULL ||
+ request->submit_user != NULL); /* APPLE - urlauth */
request->skip_password_check = TRUE;
} else if (strcmp(key, "mech") == 0)
request->mech_name = p_strdup(request->pool, value);
@@ -303,15 +315,27 @@
result == PASSDB_RESULT_OK);
}
-static bool auth_request_master_lookup_finish(struct auth_request *request)
+static bool auth_request_master_lookup_finish(struct auth_request *request,
+ bool submit) /* APPLE - urlauth...