search for: mech_name

Displaying 6 results from an estimated 6 matches for "mech_name".

2004 Dec 09
1
Help needed with debugging auth command
Hi guys, OK, so I am trying to find out why the POP3 AUTH / IMAP AUTHORIZE command is not doing what it is supposed to (not sure if it just for me or what). I am getting as far as: sasl-server.c - line 123 - mech = auth_client_find_mech(auth_client, mech_name); auth_client_find_mech is in auth-client.c which is where I am getting lost. My guess is we are not returning back to sasl-server.c since we don't get an SASL auth or an 'Unsupported' error. If I try 'PLAIN' as the auth method as the parameter then it tries to login with no...
2009 Jan 15
3
Enforcing STARTTLS for all mechs while disabling imaps
Hi all, Is there a way to enforce STARTTLS for all connections, regardless their authentication mechanism? disable_plaintext_auth only takes care of the auth conversation, but I would like to have all communication encrypted. As far as I can see, this would only be possible when using imaps and disabling imap. However, I would like to have the other way around; disabling imaps and using imap for
2020 Aug 14
0
2.3.11.3 on 32bit platforms
...est_case *test_case = &tests[running_test]; const struct mech_module *mech = test_case->mech; struct auth_request *request; - const char *testname = t_strdup_printf("auth mech %s %d/%lu", + const char *testname = t_strdup_printf("auth mech %s %d/%zu", mech->mech_name, running_test+1, N_ELEMENTS(tests));
2004 Jan 01
1
[PATCH] Add winbind-backed NTLMSSP support to Cyrus-SASL
...- if (text->out_buf) utils->free(text->out_buf); + struct ntlm_context *context = + (struct ntlm_context *)conn_context; + + ntlm_kill_helper(context); - utils->free(text); + return; } static sasl_server_plug_t ntlm_server_plugins[] = { { - "NTLM", /* mech_name */ + "NTLM", /* mech_name */ 0, /* max_ssf */ - SASL_SEC_NOPLAINTEXT - | SASL_SEC_NOANONYMOUS, /* security_flags */ - SASL_FEAT_WANT_CLIENT_FIRST, /* features */ + SASL_SEC_NOANONYMOUS + | SASL_SEC_NOPLAINTEXT, /* security_flags */ + SASL_FEAT_WANT_CLIENT_FIRST, /* features */...
2006 Feb 27
2
Bug in Kerberos support for openssh.
...input_name, output_name) OM_uint32 * minor_status; gss_name_t input_name; gss_name_t * output_name; { gss_union_name_t union_name; union_name = (gss_union_name_t) input_name; *output_name = union_name->mech_name; return 0; } and then hacked gss-serv.c to have this: #if 0 /* FIXME(eric) - this is the wrong type for this type of * lookup. */ if ((ctx->major = gss_export_name(&ctx->minor, ctx->client, &ename))) { ssh_gssa...
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...skip_password_check") == 0) { - i_assert(request->master_user != NULL); + i_assert(request->master_user != NULL || + request->submit_user != NULL); /* APPLE - urlauth */ request->skip_password_check = TRUE; } else if (strcmp(key, "mech") == 0) request->mech_name = p_strdup(request->pool, value); @@ -303,15 +315,27 @@ result == PASSDB_RESULT_OK); } -static bool auth_request_master_lookup_finish(struct auth_request *request) +static bool auth_request_master_lookup_finish(struct auth_request *request, + bool submit) /* APPLE - urlauth *...