Wraps auth_request_success().
switch (result) {
case PASSDB_RESULT_OK:
if (verify_credentials(request, credentials, size))
- auth_request_success(auth_request, "", 0);
+ sasl_server_request_success(auth_request, "", 0);
else
auth_request_fail(auth_request);
break;
str_equals_timing_almost_safe(auth_token, valid_token)) {
request->passdb_success = TRUE;
auth_request_set_field(request, "userdb_client_service", service, "");
- auth_request_success(request, NULL, 0);
+ sasl_server_request_success(request, NULL, 0);
} else {
auth_request_fail(request);
}
request->set->anonymous_username);
request->passdb_success = TRUE;
- auth_request_success(request, "", 0);
+ sasl_server_request_success(request, "", 0);
}
static struct auth_request *mech_anonymous_auth_new(void)
return;
}
- auth_request_success(auth_request, "", 0);
+ sasl_server_request_success(auth_request, "", 0);
}
static bool
}
}
- auth_request_success(auth_request, request->rspauth,
- strlen(request->rspauth));
+ sasl_server_request_success(auth_request, request->rspauth,
+ strlen(request->rspauth));
}
static bool parse_next(char **data, char **key, char **value)
}
if (mech_gssapi_userok(request, auth_request->fields.user) == 0)
- auth_request_success(auth_request, NULL, 0);
+ sasl_server_request_success(auth_request, NULL, 0);
else
auth_request_fail(auth_request);
}
container_of(request, struct oauth2_auth_request, request);
i_assert(oauth2_req->verifying_token);
- auth_request_success(request, "", 0);
+ sasl_server_request_success(request, "", 0);
}
void sasl_server_oauth2_request_fail(
auth_request);
if (success)
- auth_request_success(auth_request, "", 0);
+ sasl_server_request_success(auth_request, "", 0);
else {
auth_request_internal_failure(auth_request);
otp_unlock(request);
{
switch (result) {
case PASSDB_RESULT_OK:
- auth_request_success(request, "", 0);
+ sasl_server_request_success(request, "", 0);
break;
case PASSDB_RESULT_INTERNAL_FAILURE:
auth_request_internal_failure(request);
return;
}
- auth_request_success(auth_request, output, output_len);
+ sasl_server_request_success(auth_request, output, output_len);
}
struct auth_request *
buffer_t *buf;
buf = t_base64_decode_str(token[1]);
- auth_request_success(&request->auth_request,
- buf->data, buf->used);
+ sasl_server_request_success(&request->auth_request,
+ buf->data, buf->used);
} else {
- auth_request_success(&request->auth_request, "", 0);
+ sasl_server_request_success(&request->auth_request,
+ "", 0);
}
return HR_OK;
} else if (strcmp(token[0], "BH") == 0) {
void sasl_server_request_output(struct auth_request *request,
const void *data, size_t data_size);
+void sasl_server_request_success(struct auth_request *request,
+ const void *data, size_t data_size);
#endif
};
auth_sasl_request_output(request, &output);
}
+
+void sasl_server_request_success(struct auth_request *request,
+ const void *data, size_t data_size)
+{
+ const struct sasl_server_output output = {
+ .status = SASL_SERVER_OUTPUT_SUCCESS,
+ .data = data,
+ .data_size = data_size,
+ };
+ auth_sasl_request_output(request, &output);
+}