Searched refs:SASL_BADPROT (Results 1 – 12 of 12) sorted by relevance
209 if (CHAR64(c1) == -1) return SASL_BADPROT; in sasl_decode64()211 if (CHAR64(c2) == -1) return SASL_BADPROT; in sasl_decode64()213 if (c3 != '=' && CHAR64(c3) == -1) return SASL_BADPROT; in sasl_decode64()215 if (c4 != '=' && CHAR64(c4) == -1) return SASL_BADPROT; in sasl_decode64()315 return SASL_BADPROT; in sasl_utf8verify()321 if (seqlen == 1) return SASL_BADPROT; /* this shouldn't happen here */ in sasl_utf8verify()322 if (seqlen > 6) return SASL_BADPROT; /* illegal */ in sasl_utf8verify()326 return SASL_BADPROT; /* needed an appropriate octet */ in sasl_utf8verify()328 if ((str[++i] & 0xC0) != 0xF0) return SASL_BADPROT; /* needed a 10 octet */ in sasl_utf8verify()
113 return SASL_BADPROT; in external_server_mech_step()292 return SASL_BADPROT; in external_client_mech_step()295 return SASL_BADPROT; in external_client_mech_step()
334 return SASL_BADPROT;344 return SASL_BADPROT;
886 if(!plug->auxprop_lookup) return SASL_BADPROT; in _sasl_auxprop_add_plugin()893 return SASL_BADPROT; in _sasl_auxprop_add_plugin()
472 return SASL_BADPROT;1862 result = SASL_BADPROT;1990 ret = SASL_BADPROT;2504 RETURN(conn,SASL_BADPROT);
278 return SASL_BADPROT;1066 result = SASL_BADPROT;
790 if(conn->type != SASL_CONN_SERVER) result = SASL_BADPROT; in sasl_getprop()930 result = SASL_BADPROT; in sasl_setprop()1136 case SASL_BADPROT: s = gettext("bad protocol / cancel"); in sasl_errstring()1224 case SASL_BADPROT: return "bad protocol / cancel"; in sasl_errstring()
149 return SASL_BADPROT; in login_server_mech_step()186 return SASL_BADPROT; in login_server_mech_step()445 return SASL_BADPROT; in login_client_mech_step()471 return SASL_BADPROT; in login_client_mech_step()
128 return SASL_BADPROT; in plain_server_mech_step()144 return SASL_BADPROT; in plain_server_mech_step()162 return SASL_BADPROT; in plain_server_mech_step()
209 return SASL_BADPROT; in crammd5_server_mech_step1()277 return SASL_BADPROT; in crammd5_server_mech_step2()435 return SASL_BADPROT; in crammd5_server_mech_step()616 return SASL_BADPROT; in crammd5_client_mech_step()
191 #define SASL_BADPROT -5 /* bad protocol / cancel */ macro
3595 if (clientinlen > 4096) return SASL_BADPROT;5059 if (serverinlen > 2048) return SASL_BADPROT;