"login user: %s", error);
auth_request_fail(request);
} else {
- auth_request_verify_plain(request, "",
- plain_verify_callback);
+ auth_request_verify_plain(
+ request, "", sasl_server_mech_plain_verify_callback);
}
}
strlen(prompt2));
} else {
char *pass = p_strndup(unsafe_data_stack_pool, data, data_size);
- auth_request_verify_plain(request, pass, plain_verify_callback);
+ auth_request_verify_plain(
+ request, pass, sasl_server_mech_plain_verify_callback);
safe_memset(pass, 0, strlen(pass));
}
}
#include "sasl-server-protected.h"
#include "sasl-server-mech-plain-common.h"
-void plain_verify_callback(enum passdb_result result,
- struct auth_request *request)
+void sasl_server_mech_plain_verify_callback(enum passdb_result result,
+ struct auth_request *request)
{
switch (result) {
case PASSDB_RESULT_OK:
#ifndef SASL_SERVER_MECH_PLAIN_COMMON_H
#define SASL_SERVER_MECH_PLAIN_COMMON_H
-void plain_verify_callback(enum passdb_result result,
- struct auth_request *request);
+void sasl_server_mech_plain_verify_callback(enum passdb_result result,
+ struct auth_request *request);
#endif
"login user: %s", error);
auth_request_fail(request);
} else {
- auth_request_verify_plain(request, pass,
- plain_verify_callback);
+ auth_request_verify_plain(
+ request, pass, sasl_server_mech_plain_verify_callback);
}
/* make sure it's cleared */