SASL_BADPROT
if(!plug->auxprop_lookup) return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
result = SASL_BADPROT;
return SASL_BADPROT;
case SASL_BADPROT: s = gettext("bad protocol / cancel");
case SASL_BADPROT: return "bad protocol / cancel";
if(conn->type != SASL_CONN_SERVER) result = SASL_BADPROT;
result = SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
if (CHAR64(c1) == -1) return SASL_BADPROT;
if (CHAR64(c2) == -1) return SASL_BADPROT;
if (c3 != '=' && CHAR64(c3) == -1) return SASL_BADPROT;
if (c4 != '=' && CHAR64(c4) == -1) return SASL_BADPROT;
return SASL_BADPROT;
if (seqlen == 1) return SASL_BADPROT; /* this shouldn't happen here */
if (seqlen > 6) return SASL_BADPROT; /* illegal */
return SASL_BADPROT; /* needed an appropriate octet */
if ((str[++i] & 0xC0) != 0xF0) return SASL_BADPROT; /* needed a 10 octet */
result = SASL_BADPROT;
ret = SASL_BADPROT;
RETURN(conn,SASL_BADPROT);
return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
if (clientinlen > 4096) return SASL_BADPROT;
if (serverinlen > 2048) return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;
return SASL_BADPROT;