.\" Man page generated from reStructuredText. . . .nr rst2man-indent-level 0 . .de1 rstReportMargin \\$1 \\n[an-margin] level \\n[rst2man-indent-level] level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] - \\n[rst2man-indent0] \\n[rst2man-indent1] \\n[rst2man-indent2] .. .de1 INDENT .\" .rstReportMargin pre: . RS \\$1 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] . nr rst2man-indent-level +1 .\" .rstReportMargin post: .. .de UNINDENT . RE .\" indent \\n[an-margin] .\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] .nr rst2man-indent-level -1 .\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] .in \\n[rst2man-indent\\n[rst2man-indent-level]]u .. .TH "SASL_CLIENT_NEW" "3" "2022-02-22" "2.1.28" "Cyrus SASL" .SH NAME sasl_client_new \- Cyrus SASL documentation .SH SYNOPSIS .sp .nf #include int sasl_client_new(const char *service, const char *serverFQDN, const char *iplocalport, const char *ipremoteport, const sasl_callback_t *prompt_supp, unsigned flags, sasl_conn_t ** pconn); .fi .SH DESCRIPTION .INDENT 0.0 .TP .B int sasl_client_new(const char *service, .TP .B const char *serverFQDN, .TP .B const char *iplocalport, .TP .B const char *ipremoteport, .TP .B const sasl_callback_t *prompt_supp, .TP .B unsigned flags, .TP .B sasl_conn_t ** pconn); \fBsasl_client_new()\fP creates a new SASL context. This context will be used for all SASL calls for one connection. It handles both authentication and integrity/encryption layers after authentication. .INDENT 7.0 .TP .B Parameters .INDENT 7.0 .IP \(bu 2 \fBservice\fP – the registered name of the service (usually the protocol name) using SASL (e.g. “imap”). .IP \(bu 2 \fBserverFQDN\fP – the fully qualified domain name of the server (e.g. “serverhost.example.com”). .IP \(bu 2 \fBiplocalport\fP – the IP and port of the local side of the connection, or NULL. If iplocalport is NULL it will disable mechanisms that require IP address information. This string must be in one of the following formats: “a.b.c.d;port” (IPv4), “e:f:g:h:i:j:k:l;port” (IPv6), or “e:f:g:h:i:j:a.b.c.d;port” (IPv6) .IP \(bu 2 \fBipremoteport\fP – the IP and port of the remote side of the connection, or NULL (see iplocalport) .IP \(bu 2 \fBprompt_supp\fP – a list of client interactions supported that is unique to this connection. If this parameter is NULL the global callbacks (specified in sasl_client_init(3)) will be used. See sasl_callbacks(3) for more information. .IP \(bu 2 \fBflags\fP – are connection flags (see below) .IP \(bu 2 \fBpconn\fP – the connection context allocated by the library. This structure will be used for all future SASL calls for this connection. .UNINDENT .UNINDENT .UNINDENT .SS Connection Flags .sp Flags that may be passed to \fBsasl_client_new()\fP: .INDENT 0.0 .IP \(bu 2 \fISASL_SUCCESS_DATA\fP: The protocol supports a server‐last send .IP \(bu 2 .INDENT 2.0 .TP .B \fISASL_NEED_PROXY\fP: Force the use of a mechanism that supports an authorization id that is not the authentication id. .UNINDENT .UNINDENT .SH RETURN VALUE .sp SASL callback functions should return SASL return codes. See sasl.h for a complete list. \fBSASL_OK\fP indicates success. .sp The following return codes indicate errors and should either be handled or the authentication session should be quit: .INDENT 0.0 .IP \(bu 2 \fBSASL_NOMECH\fP: No mechanism meets requested properties .IP \(bu 2 \fBSASL_BADPARAM\fP: Error in config file .IP \(bu 2 \fBSASL_NOMEM\fP: Not enough memory to complete operation .UNINDENT .SH SEE ALSO .sp \fI\%RFC 4422\fP,:saslman:\fIsasl(3)\fP, sasl_callbacks(3), sasl_client_init(3), sasl_client_start(3), sasl_client_step(3), sasl_setprop(3) .SH AUTHOR The Cyrus Team .SH COPYRIGHT 1993-2022, The Cyrus Team .\" Generated by docutils manpage writer. .