else
((sasl_client_conn_t *)conn)->cparams->gss_creds = (void *)value;
break;
- case SASL_CHANNEL_BINDINGS: {
- struct sasl_channel_bindings *cb = (struct sasl_channel_bindings *)value;
-
- if (conn->type == SASL_CONN_SERVER) {
- ((sasl_server_conn_t *)conn)->sparams->chanbindingstype = cb->type;
- ((sasl_server_conn_t *)conn)->sparams->chanbindingscrit = cb->critical;
- ((sasl_server_conn_t *)conn)->sparams->chanbindingsdata = cb->data;
- ((sasl_server_conn_t *)conn)->sparams->chanbindingslen = cb->len;
- } else {
- ((sasl_client_conn_t *)conn)->cparams->chanbindingstype = cb->type;
- ((sasl_client_conn_t *)conn)->cparams->chanbindingscrit = cb->critical;
- ((sasl_client_conn_t *)conn)->cparams->chanbindingsdata = cb->data;
- ((sasl_client_conn_t *)conn)->cparams->chanbindingslen = cb->len;
- }
+ case SASL_CHANNEL_BINDING: {
+ const struct sasl_channel_binding *cb = (const struct sasl_channel_binding *)value;
+
+ if (conn->type == SASL_CONN_SERVER)
+ ((sasl_server_conn_t *)conn)->sparams->cbinding = cb;
+ else
+ ((sasl_client_conn_t *)conn)->cparams->cbinding = cb;
break;
}
default:
case SASL_NOCHANGE: return "requested change was not needed";
case SASL_WEAKPASS: return "passphrase is too weak for security policy";
case SASL_NOUSERPASS: return "user supplied passwords are not permitted";
+ case SASL_BADBINDING: return "channel binding failure";
default: return "undefined error!";
}
PARAMERROR(conn);
}
+int _sasl_is_equal_mech(const char *req_mech,
+ const char *plug_mech,
+ int *plus)
+{
+ size_t len = strlen(req_mech);
+ size_t n;
+
+ if (len > 5 &&
+ strcasecmp(&req_mech[len - 5], "-PLUS") == 0) {
+ n = len - 5;
+ *plus = 1;
+ } else {
+ n = len;
+ *plus = 0;
+ }
+
+ return (strncasecmp(req_mech, plug_mech, n) == 0);
+}
#ifndef WIN32
static char *