Wraps auth_request_verify_plain().
"login user: %s", error);
sasl_server_request_failure(request);
} else {
- auth_request_verify_plain(
+ sasl_server_request_verify_plain(
request, "", sasl_server_mech_plain_verify_callback);
}
}
sasl_server_request_output(request, prompt2, strlen(prompt2));
} else {
char *pass = p_strndup(unsafe_data_stack_pool, data, data_size);
- auth_request_verify_plain(
+ sasl_server_request_verify_plain(
request, pass, sasl_server_mech_plain_verify_callback);
safe_memset(pass, 0, strlen(pass));
}
"login user: %s", error);
sasl_server_request_failure(request);
} else {
- auth_request_verify_plain(
+ sasl_server_request_verify_plain(
request, pass, sasl_server_mech_plain_verify_callback);
}
void sasl_server_request_failure(struct auth_request *request);
void sasl_server_request_internal_failure(struct auth_request *request);
+void sasl_server_request_verify_plain(
+ struct auth_request *request, const char *password,
+ sasl_server_verify_plain_callback_t *callback);
+
#endif
SASL_SERVER_OUTPUT_INTERNAL_FAILURE,
"", 0);
}
+
+void sasl_server_request_verify_plain(
+ struct auth_request *request, const char *password,
+ sasl_server_verify_plain_callback_t *callback)
+{
+ auth_sasl_request_verify_plain(request, password, callback);
+}
SASL_SERVER_OUTPUT_SUCCESS = 1,
};
+typedef verify_plain_callback_t sasl_server_verify_plain_callback_t;
+
struct sasl_server_output {
enum sasl_server_output_status status;