summaryrefslogtreecommitdiff
path: root/security/p5-Authen-CyrusSASL/files/patch-CyrusSASL.pm
blob: 9c67c8bcd7ffb82d555704a5ccbfa815a26f25c9 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
--- Authen/CyrusSASL.pm.orig	Mon Sep 24 15:41:30 2001
+++ Authen/CyrusSASL.pm	Fri Aug 26 13:34:21 2005
@@ -76,10 +76,13 @@
 }
 
 sub check_pwd {
-	my ($self, $name, $pwd) = @_;
+	my ($self, $name, $pwd, $service, $realm) = @_;
 	my ($req, $res, $sh);
 
-	$req = "$name\0$pwd\0";
+	$service = "imap" unless defined ($service);
+	$realm = "" unless defined ($realm);
+
+	$req = sprintf ("\0%c%s\0%c%s\0%c%s\0%c%s", length $name, $name, length $pwd, $pwd, length $service, $service, length $realm, $realm);
 	$res = ' ' x 1024;
 
 	# send request
@@ -93,7 +96,7 @@
 	# sock->recv does not work
 	#$self->{'sock'}->recv ($res, 1024, 0) or return SASL_FAIL;
 
-	if (substr($res, 0, 2) ne 'OK') {
+	if (substr($res, 2, 2) ne 'OK') {
 	  $! = substr($res, 3);
 	  return SASL_BADAUTH;
 	}
@@ -113,10 +116,10 @@
   use Authen::CyrusSASL;
   
   $p = new Authen::CyrusSASL(Type => SASL_AUTHD, Dir => '/var/run/saslauthd');
-  print "check=", $r->check_pwd('username', 'userpass'), "\n";
+  print "check=", $r->check_pwd('username', 'userpass', 'service', 'realm'), "\n";
 
   $p = new Authen::CyrusSASL(Type => SASL_PWCHECK, Dir => '/var/run/pwcheck');
-  print "check=", $r->check_pwd('username', 'userpass'), "\n";
+  print "check=", $r->check_pwd('username', 'userpass', 'service', 'realm'), "\n";
 
 =head1 DESCRIPTION
 
@@ -154,7 +157,7 @@
 
 =over 4
 
-=item check_pwd ( USERNAME, PASSWORD )
+=item check_pwd ( USERNAME, PASSWORD, SERVICE, REALM )
 
 Checks with the SASL server if the specified C<PASSWORD> is valid for user 
 C<USERNAME>. It returns SASL_OK if the C<PASSWORD> is correct,