Lines Matching refs:sasl
1 /* $NetBSD: sasl.c,v 1.4 2025/09/05 21:16:25 christos Exp $ */
19 __RCSID("$NetBSD: sasl.c,v 1.4 2025/09/05 21:16:25 christos Exp $");
40 # include <sasl/sasl.h>
41 # include <sasl/saslplug.h>
43 # include <sasl.h>
61 * built-in SASL implementation
149 Debug( level, "SASL [conn=%ld] %s: %s\n",
243 /* ITS#3846 don't give hashed passwords to SASL */
674 * in cyrus SASL from 2.1.15 to 2.1.16 */
697 /* Convert a SASL authcid or authzid into a DN. Store the DN in an
699 * without interfering with anything else. Also, the SASL username
725 Debug( LDAP_DEBUG_ARGS, "SASL Canonicalize [conn=%ld]: %s=\"%s\"\n",
737 * userPassword of the Binding user already points at SASL, so it
766 * However, SASL frequently gives us an authzID that is just
768 * detect and allow this condition. If SASL calls canonicalize
776 * The SASL EXTERNAL mech is backwards from all the other mechs,
807 Debug( LDAP_DEBUG_ARGS, "SASL Canonicalize [conn=%ld]: %s=\"%s\"\n",
811 /* Not needed any more, SASL has copied it */
849 Debug( LDAP_DEBUG_ARGS, "SASL proxy authorize [conn=%ld]: "
879 Debug( LDAP_DEBUG_TRACE, "SASL Proxy Authorize [conn=%ld]: "
899 Debug( LDAP_DEBUG_TRACE, "SASL Authorize [conn=%ld]: "
911 /* map SASL errors to LDAP resultCode returned by:
967 static struct berval sasl_pwscheme = BER_BVC("{SASL}");
1254 /* stringify the version number, sasl.h doesn't do it for us */
1267 Debug( LDAP_DEBUG_ANY, "slap_sasl_init: SASL library version mismatch:"
1413 /* create new SASL context */
1460 /* built-in SASL implementation */
1500 /* built-in SASL implementation */
1570 /* builtin SASL implementation */
1638 "SASL unavailable on this session" );
1748 /* built-in SASL implementation */
1753 "Internal SASL Error" );
1772 "requested SASL mechanism not supported" );
1776 "SASL not supported" );
1789 return "SASL not supported";
1814 rs->sr_text = "unable to retrieve SASL username";
1871 * on strings passed in directly from SASL. -Howard Chu, Symas Corp.