SASL_NOLOG
if (ret == SASL_BADAUTH) sasl_seterror(conn, SASL_NOLOG,
if (ret == SASL_BADAUTH) sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn, SASL_NOLOG, "authentication failed");
sasl_seterror(conn, SASL_NOLOG, "Unable to find a callback: %d", callbackid);
sasl_seterror(conn, SASL_NOLOG,
if(conn) sasl_seterror( (conn), SASL_NOLOG, \
sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn, SASL_NOLOG, gettext("too weak"));
sasl_seterror(conn, SASL_NOLOG, "too weak");
sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn, SASL_NOLOG, gettext("checkpass failed"));
sasl_seterror(conn, SASL_NOLOG, "checkpass failed");
sasl_seterror(conn, SASL_NOLOG, "no plaintext password verifier?");
sasl_seterror(conn, SASL_NOLOG,
if(!(flags & SASL_NOLOG)) {
if(!(flags & SASL_NOLOG)) {
text->utils->seterror(text->utils->conn, SASL_NOLOG,
text->utils->seterror(text->utils->conn, SASL_NOLOG, "GSSAPI Failure: gss_accept_sec_context");