Home | History | Annotate | Download | only in qemu

Lines Matching full:sasl

136             return "vencrypt+tls+sasl";
138 return "vencrypt+x509+sasl";
146 return "sasl";
171 if (client->sasl.conn &&
172 client->sasl.username)
173 monitor_printf(mon, " username: %s\n", client->sasl.username);
959 * be the raw data, or may have already been encoded by SASL.
964 * both SASL, and this TLS layer. It is highly unlikely in practice
965 * though, since SASL encryption will typically be a no-op if TLS
995 * using any SASL SSF encryption layers. Will write as much data
1010 vs->sasl.waitWriteSSF);
1012 if (vs->sasl.conn &&
1013 vs->sasl.runSSF &&
1014 vs->sasl.waitWriteSSF) {
1015 ret = vnc_client_write_buf(vs, vs->output.buffer, vs->sasl.waitWriteSSF);
1017 vs->sasl.waitWriteSSF -= ret;
1038 * SASL SSF layers are enabled (thus requiring encryption calls)
1046 if (vs->sasl.conn &&
1047 vs->sasl.runSSF &&
1048 !vs->sasl.waitWriteSSF)
1064 * be the raw data, or may need to be further decoded by SASL.
1069 * both SASL, and this TLS layer. It is highly unlikely in practice
1070 * though, since SASL encryption will typically be a no-op if TLS
1100 * when not using any SASL SSF encryption layers. Will read as much
1123 * SASL SSF layers are enabled (thus requiring decryption calls)
1131 if (vs->sasl.conn && vs->sasl.runSSF)
1980 VNC_DEBUG("Accept SASL auth\n");
2193 int sasl = 0;
2217 } else if (strncmp(options, "sasl", 4) == 0) {
2218 sasl = 1; /* Require SASL auth */
2267 if (acl && sasl) {
2268 if (!(vs->sasl.acl = qemu_acl_init("vnc.username"))) {
2280 * - sasl (encrypt, good auth *IF* using Kerberos via GSSAPI)
2283 * - tls + sasl (encrypt, weak anonymous creds, good auth)
2286 * - tls + x509 + sasl (encrypt, good x509 creds, good auth)
2311 } else if (sasl) {
2316 VNC_DEBUG("Initializing VNC server with x509 SASL auth\n");
2319 VNC_DEBUG("Initializing VNC server with TLS SASL auth\n");
2324 VNC_DEBUG("Initializing VNC server with SASL auth\n");
2354 fprintf(stderr, "Failed to initialize SASL auth %s",