Lines Matching refs:response
265 const char *response, in _sasl_auxprop_verify_apop() argument
281 if (!conn || !userstr || !challenge || !response) in _sasl_auxprop_verify_apop()
319 if (!strncasecmp(digeststr, response, 32)) { in _sasl_auxprop_verify_apop()
417 static char response[1024]; in pwcheck_verify_password() local
446 while (start < sizeof(response) - 1) { in pwcheck_verify_password()
447 n = read(s, response+start, sizeof(response) - 1 - start); in pwcheck_verify_password()
454 if (start > 1 && !strncmp(response, "OK", 2)) { in pwcheck_verify_password()
458 response[start] = '\0'; in pwcheck_verify_password()
459 sasl_seterror(conn,0,response); in pwcheck_verify_password()
502 char response[1024]; in saslauthd_verify_password() local
581 arg.rbuf = response; in saslauthd_verify_password()
582 arg.rsize = sizeof(response); in saslauthd_verify_password()
586 if (arg.data_ptr != response || arg.data_size >= sizeof(response)) { in saslauthd_verify_password()
592 response[arg.data_size] = '\0'; in saslauthd_verify_password()
648 count = (int)sizeof(response) < count ? sizeof(response) : count; in saslauthd_verify_password()
649 if (retry_read(s, response, count) < count) { in saslauthd_verify_password()
654 response[count] = '\0'; in saslauthd_verify_password()
660 if (!strncmp(response, "OK", 2)) { in saslauthd_verify_password()