Lines Matching refs:response
266 const char *response, in _sasl_auxprop_verify_apop() argument
282 if (!conn || !userstr || !challenge || !response) in _sasl_auxprop_verify_apop()
320 if (!strncasecmp(digeststr, response, 32)) { in _sasl_auxprop_verify_apop()
418 static char response[1024]; in pwcheck_verify_password() local
447 while (start < sizeof(response) - 1) { in pwcheck_verify_password()
448 n = read(s, response+start, sizeof(response) - 1 - start); in pwcheck_verify_password()
455 if (start > 1 && !strncmp(response, "OK", 2)) { in pwcheck_verify_password()
459 response[start] = '\0'; in pwcheck_verify_password()
460 sasl_seterror(conn,0,response); in pwcheck_verify_password()
503 char response[1024]; in saslauthd_verify_password() local
582 arg.rbuf = response; in saslauthd_verify_password()
583 arg.rsize = sizeof(response); in saslauthd_verify_password()
587 if (arg.data_ptr != response || arg.data_size >= sizeof(response)) { in saslauthd_verify_password()
593 response[arg.data_size] = '\0'; in saslauthd_verify_password()
649 count = (int)sizeof(response) < count ? sizeof(response) : count; in saslauthd_verify_password()
650 if (retry_read(s, response, count) < count) { in saslauthd_verify_password()
655 response[count] = '\0'; in saslauthd_verify_password()
661 if (!strncmp(response, "OK", 2)) { in saslauthd_verify_password()