Wraps auth_request_internal_failure().
sasl_server_request_failure(auth_request);
break;
case PASSDB_RESULT_INTERNAL_FAILURE:
- auth_request_internal_failure(auth_request);
+ sasl_server_request_internal_failure(auth_request);
break;
default:
sasl_server_request_failure(auth_request);
verify_credentials(auth_request, credentials, size);
break;
case PASSDB_RESULT_INTERNAL_FAILURE:
- auth_request_internal_failure(auth_request);
+ sasl_server_request_internal_failure(auth_request);
break;
default:
sasl_server_request_failure(auth_request);
verify_credentials(auth_request, credentials, size);
break;
case PASSDB_RESULT_INTERNAL_FAILURE:
- auth_request_internal_failure(auth_request);
+ sasl_server_request_internal_failure(auth_request);
break;
default:
sasl_server_request_failure(auth_request);
now the k5principals field will have been filled in. */
switch (result) {
case PASSDB_RESULT_INTERNAL_FAILURE:
- auth_request_internal_failure(auth_request);
+ sasl_server_request_internal_failure(auth_request);
return;
case PASSDB_RESULT_USER_DISABLED:
case PASSDB_RESULT_PASS_EXPIRED:
/* User is explicitly disabled, don't allow it to log in */
- auth_request_fail(auth_request);
+ sasl_server_request_failure(auth_request);
return;
case PASSDB_RESULT_NEXT:
case PASSDB_RESULT_SCHEME_NOT_AVAILABLE:
if (mech_gssapi_userok(request, auth_request->fields.user) == 0)
sasl_server_request_success(auth_request, NULL, 0);
else
- auth_request_fail(auth_request);
+ sasl_server_request_failure(auth_request);
}
static int
i_unreached();
}
if (ret < 0)
- auth_request_fail(auth_request);
+ sasl_server_request_failure(auth_request);
}
static void
obtain_service_credentials(request, &request->service_cred);
if (GSS_ERROR(major_status) != 0) {
- auth_request_internal_failure(auth_request);
+ sasl_server_request_internal_failure(auth_request);
return;
}
request->authn_name = GSS_C_NO_NAME;
struct auth_request *request = &oauth2_req->request;
if (failure == NULL) {
- auth_request_internal_failure(request);
+ sasl_server_request_internal_failure(request);
return;
}
otp_send_challenge(request, credentials, size);
break;
case PASSDB_RESULT_INTERNAL_FAILURE:
- auth_request_internal_failure(auth_request);
+ sasl_server_request_internal_failure(auth_request);
break;
default:
sasl_server_request_failure(auth_request);
if (success)
sasl_server_request_success(auth_request, "", 0);
else {
- auth_request_internal_failure(auth_request);
+ sasl_server_request_internal_failure(auth_request);
otp_unlock(request);
}
sasl_server_request_success(request, "", 0);
break;
case PASSDB_RESULT_INTERNAL_FAILURE:
- auth_request_internal_failure(request);
+ sasl_server_request_internal_failure(request);
break;
default:
sasl_server_request_failure(request);
sasl_server_request_output(auth_request, output, output_len);
break;
case PASSDB_RESULT_INTERNAL_FAILURE:
- auth_request_internal_failure(auth_request);
+ sasl_server_request_internal_failure(auth_request);
break;
default:
sasl_server_request_failure(auth_request);
void sasl_server_request_failure_with_reply(struct auth_request *request,
const void *data, size_t data_size);
void sasl_server_request_failure(struct auth_request *request);
+void sasl_server_request_internal_failure(struct auth_request *request);
#endif
auth_sasl_request_output(request, &output);
}
-void sasl_server_request_failure_with_reply(struct auth_request *request,
- const void *data, size_t data_size)
+static void
+sasl_server_request_failure_common(struct auth_request *request,
+ enum sasl_server_output_status status,
+ const void *data, size_t data_size)
{
const struct sasl_server_output output = {
- .status = SASL_SERVER_OUTPUT_FAILURE,
+ .status = status,
.data = data,
.data_size = data_size,
};
auth_sasl_request_output(request, &output);
}
+void sasl_server_request_failure_with_reply(struct auth_request *request,
+ const void *data, size_t data_size)
+{
+ sasl_server_request_failure_common(request, SASL_SERVER_OUTPUT_FAILURE,
+ data, data_size);
+}
+
void sasl_server_request_failure(struct auth_request *request)
{
- sasl_server_request_failure_with_reply(request, "", 0);
+ sasl_server_request_failure_common(request, SASL_SERVER_OUTPUT_FAILURE,
+ "", 0);
+}
+
+void sasl_server_request_internal_failure(struct auth_request *request)
+{
+ sasl_server_request_failure_common(request,
+ SASL_SERVER_OUTPUT_INTERNAL_FAILURE,
+ "", 0);
}