sasl_seterror
LIBSASL_API void sasl_seterror(sasl_conn_t *conn, unsigned flags,
sasl_seterror(conn, 0,
sasl_seterror(conn, 0, "desired canon_user plugin %s not found",
sasl_seterror(NULL, 0,
sasl_seterror(conn, 0, "could not perform password lookup");
sasl_seterror(conn, 0, gettext("could not find password"));
sasl_seterror(conn, 0, "could not find password");
if (ret == SASL_BADAUTH) sasl_seterror(conn, SASL_NOLOG,
if (ret == SASL_BADAUTH) sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn,0,"cannot connect to pwcheck server");
sasl_seterror(conn,0,response);
sasl_seterror(conn, 0, "saslauthd request too large");
sasl_seterror(conn, 0, "cannot open door to saslauthd server: %m", errno);
sasl_seterror(conn, 0, "saslauthd sent an overly long response");
sasl_seterror(conn, 0, "cannot create socket for saslauthd: %m", errno);
sasl_seterror(conn, 0, "cannot connect to saslauthd server: %m", errno);
sasl_seterror(conn, 0, "write failed");
sasl_seterror(conn, 0, "size read failed");
sasl_seterror(conn, 0, "bad response from saslauthd");
sasl_seterror(conn, 0, "read failed");
sasl_seterror(conn, SASL_NOLOG, "authentication failed");
sasl_seterror(conn, 0,
sasl_seterror(conn, 0, gettext("No worthy mechs found"));
sasl_seterror(conn, 0, "No worthy mechs found");
sasl_seterror(conn, 0, "Bad IPLOCALPORT value");
sasl_seterror(conn, 0, "Unknown parameter type");
sasl_seterror(conn, 0,
sasl_seterror(conn, 0,
sasl_seterror(conn, SASL_NOLOG, "Unable to find a callback: %d", callbackid);
utils->seterror=&sasl_seterror;
sasl_seterror(conn, 0,
sasl_seterror(conn, 0,
sasl_seterror(conn, 0,
sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn, 0, "Tried to set realm on non-server connection");
sasl_seterror(conn, 0,
sasl_seterror(conn, 0, "Bad IPREMOTEPORT value");
sasl_seterror(sparams->utils->conn,0,
sasl_seterror(sparams->utils->conn,0,"anonymous login not allowed");
if(conn) sasl_seterror( (conn), 0, \
if(conn) sasl_seterror( (conn), SASL_NOLOG, \
if(conn) sasl_seterror( (conn), 0, \
sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn, SASL_NOLOG, gettext("too weak"));
sasl_seterror(conn, SASL_NOLOG, "too weak");
sasl_seterror(conn, 0, "no users in secrets db");
sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn, SASL_NOLOG,
sasl_seterror(conn, 0,
sasl_seterror(conn, 0, gettext("Couldn't find mech %s"), mech);
sasl_seterror(conn, 0, "Couldn't find mech %s", mech);
sasl_seterror(conn, 0,
sasl_seterror(conn, 0,
sasl_seterror(conn, 0,
sasl_seterror(conn, SASL_NOLOG, gettext("checkpass failed"));
sasl_seterror(conn, SASL_NOLOG, "checkpass failed");
sasl_seterror(conn, SASL_NOLOG, "no plaintext password verifier?");
sasl_seterror(conn, 0, gettext("Bad Digest"));
sasl_seterror(conn, 0, "Bad Digest");
sasl_seterror(conn, SASL_NOLOG,