Home | History | Annotate | Download | only in qemu

Lines Matching full:sasl

142             return "vencrypt+tls+sasl";
144 return "vencrypt+x509+sasl";
152 return "sasl";
177 if (client->sasl.conn &&
178 client->sasl.username)
179 monitor_printf(mon, " username: %s\n", client->sasl.username);
965 * be the raw data, or may have already been encoded by SASL.
970 * both SASL, and this TLS layer. It is highly unlikely in practice
971 * though, since SASL encryption will typically be a no-op if TLS
1001 * using any SASL SSF encryption layers. Will write as much data
1016 vs->sasl.waitWriteSSF);
1018 if (vs->sasl.conn &&
1019 vs->sasl.runSSF &&
1020 vs->sasl.waitWriteSSF) {
1021 ret = vnc_client_write_buf(vs, vs->output.buffer, vs->sasl.waitWriteSSF);
1023 vs->sasl.waitWriteSSF -= ret;
1044 * SASL SSF layers are enabled (thus requiring encryption calls)
1052 if (vs->sasl.conn &&
1053 vs->sasl.runSSF &&
1054 !vs->sasl.waitWriteSSF)
1070 * be the raw data, or may need to be further decoded by SASL.
1075 * both SASL, and this TLS layer. It is highly unlikely in practice
1076 * though, since SASL encryption will typically be a no-op if TLS
1106 * when not using any SASL SSF encryption layers. Will read as much
1129 * SASL SSF layers are enabled (thus requiring decryption calls)
1137 if (vs->sasl.conn && vs->sasl.runSSF)
1986 VNC_DEBUG("Accept SASL auth\n");
2197 int sasl = 0;
2221 } else if (strncmp(options, "sasl", 4) == 0) {
2222 sasl = 1; /* Require SASL auth */
2271 if (acl && sasl) {
2272 if (!(vs->sasl.acl = qemu_acl_init("vnc.username"))) {
2284 * - sasl (encrypt, good auth *IF* using Kerberos via GSSAPI)
2287 * - tls + sasl (encrypt, weak anonymous creds, good auth)
2290 * - tls + x509 + sasl (encrypt, good x509 creds, good auth)
2315 } else if (sasl) {
2320 VNC_DEBUG("Initializing VNC server with x509 SASL auth\n");
2323 VNC_DEBUG("Initializing VNC server with TLS SASL auth\n");
2328 VNC_DEBUG("Initializing VNC server with SASL auth\n");
2358 fprintf(stderr, "Failed to initialize SASL auth %s",