struct auth_request *auth_request)
{
switch (result) {
- case PASSDB_RESULT_OK:
+ case SASL_PASSDB_RESULT_OK:
verify_credentials(auth_request, credentials, size);
break;
- case PASSDB_RESULT_INTERNAL_FAILURE:
+ case SASL_PASSDB_RESULT_INTERNAL_FAILURE:
sasl_server_request_internal_failure(auth_request);
break;
default:
struct auth_request *auth_request)
{
switch (result) {
- case PASSDB_RESULT_OK:
+ case SASL_PASSDB_RESULT_OK:
verify_credentials(auth_request, credentials, size);
break;
- case PASSDB_RESULT_INTERNAL_FAILURE:
+ case SASL_PASSDB_RESULT_INTERNAL_FAILURE:
sasl_server_request_internal_failure(auth_request);
break;
default:
does not strictly require a passdb. But if a passdb is configured,
now the k5principals field will have been filled in. */
switch (result) {
- case PASSDB_RESULT_INTERNAL_FAILURE:
+ case SASL_PASSDB_RESULT_INTERNAL_FAILURE:
sasl_server_request_internal_failure(auth_request);
return;
- case PASSDB_RESULT_USER_DISABLED:
- case PASSDB_RESULT_PASS_EXPIRED:
+ case SASL_PASSDB_RESULT_USER_DISABLED:
+ case SASL_PASSDB_RESULT_PASS_EXPIRED:
/* User is explicitly disabled, don't allow it to log in */
sasl_server_request_failure(auth_request);
return;
- case PASSDB_RESULT_NEXT:
- case PASSDB_RESULT_SCHEME_NOT_AVAILABLE:
- case PASSDB_RESULT_USER_UNKNOWN:
- case PASSDB_RESULT_PASSWORD_MISMATCH:
- case PASSDB_RESULT_OK:
+ case PASSDB_RESULT_NEXT: /* FIXME: To be removed */
+ case SASL_PASSDB_RESULT_SCHEME_NOT_AVAILABLE:
+ case SASL_PASSDB_RESULT_USER_UNKNOWN:
+ case SASL_PASSDB_RESULT_PASSWORD_MISMATCH:
+ case SASL_PASSDB_RESULT_OK:
break;
}
auth_request);
switch (result) {
- case PASSDB_RESULT_OK:
+ case SASL_PASSDB_RESULT_OK:
otp_send_challenge(request, credentials, size);
break;
- case PASSDB_RESULT_INTERNAL_FAILURE:
+ case SASL_PASSDB_RESULT_INTERNAL_FAILURE:
sasl_server_request_internal_failure(auth_request);
break;
default:
struct auth_request *request)
{
switch (result) {
- case PASSDB_RESULT_OK:
+ case SASL_PASSDB_RESULT_OK:
sasl_server_request_success(request, "", 0);
break;
- case PASSDB_RESULT_INTERNAL_FAILURE:
+ case SASL_PASSDB_RESULT_INTERNAL_FAILURE:
sasl_server_request_internal_failure(request);
break;
default:
bool end;
switch (result) {
- case PASSDB_RESULT_OK:
+ case SASL_PASSDB_RESULT_OK:
if (auth_scram_credentials_parse(key_data->hmethod,
request->password_scheme,
credentials, size,
i_assert(!end);
sasl_server_request_output(auth_request, output, output_len);
break;
- case PASSDB_RESULT_INTERNAL_FAILURE:
+ case SASL_PASSDB_RESULT_INTERNAL_FAILURE:
sasl_server_request_internal_failure(auth_request);
break;
default:
#include "sasl-common.h"
+enum sasl_passdb_result_status {
+ SASL_PASSDB_RESULT_INTERNAL_FAILURE = PASSDB_RESULT_INTERNAL_FAILURE,
+ SASL_PASSDB_RESULT_SCHEME_NOT_AVAILABLE = PASSDB_RESULT_SCHEME_NOT_AVAILABLE,
+
+ SASL_PASSDB_RESULT_USER_UNKNOWN = PASSDB_RESULT_USER_UNKNOWN,
+ SASL_PASSDB_RESULT_USER_DISABLED = PASSDB_RESULT_USER_DISABLED,
+ SASL_PASSDB_RESULT_PASS_EXPIRED = PASSDB_RESULT_PASS_EXPIRED,
+
+ SASL_PASSDB_RESULT_PASSWORD_MISMATCH = PASSDB_RESULT_PASSWORD_MISMATCH,
+ SASL_PASSDB_RESULT_OK = PASSDB_RESULT_OK,
+};
+
enum mech_passdb_need {
/* Mechanism doesn't need a passdb at all */
MECH_PASSDB_NEED_NOTHING = 0,