/netbsd-src/external/ibm-public/postfix/dist/src/tls/ |
H A D | tls_proxy_context_scan.c | 74 TLS_SESS_STATE *tls_context in tls_proxy_context_scan() local 75 = (TLS_SESS_STATE *) mymalloc(sizeof(*tls_context));; in tls_proxy_context_scan() 99 memset(tls_context, 0, sizeof(*tls_context)); in tls_proxy_context_scan() 106 &tls_context->level), in tls_proxy_context_scan() 108 &tls_context->peer_status), in tls_proxy_context_scan() 112 &tls_context->cipher_usebits), in tls_proxy_context_scan() 114 &tls_context->cipher_algbits), in tls_proxy_context_scan() 117 RECV_ATTR_INT(TLS_ATTR_KEX_BITS, &tls_context->kex_bits), in tls_proxy_context_scan() 120 RECV_ATTR_INT(TLS_ATTR_CLNT_SIG_BITS, &tls_context->clnt_sig_bits), in tls_proxy_context_scan() 124 RECV_ATTR_INT(TLS_ATTR_SRVR_SIG_BITS, &tls_context->srvr_sig_bits), in tls_proxy_context_scan() [all …]
|
H A D | tls_proxy_clnt.c | 289 TLS_SESS_STATE *tls_context = 0; in tls_proxy_context_receive() local 292 RECV_ATTR_FUNC(tls_proxy_context_scan, (void *) &tls_context), in tls_proxy_context_receive() 294 if (tls_context) in tls_proxy_context_receive() 295 tls_proxy_context_free(tls_context); in tls_proxy_context_receive() 298 return (tls_context); in tls_proxy_context_receive()
|
/netbsd-src/external/ibm-public/postfix/dist/src/smtp/ |
H A D | smtp_session.c | 189 session->tls_context = 0; in smtp_session_alloc() 206 if (session->tls_context) { in smtp_session_free() 209 tls_proxy_context_free(session->tls_context); in smtp_session_free() 212 var_smtp_starttls_tmout, 0, session->tls_context); in smtp_session_free() 305 || (session->tls_context in smtp_session_passivate() 308 (void *) session->tls_context), in smtp_session_passivate() 341 TLS_SESS_STATE *tls_context = 0; in smtp_session_activate() local 345 if (tls_context) \ in smtp_session_activate() 346 tls_proxy_context_free(tls_context); \ in smtp_session_activate() 379 (void *) &tls_context), in smtp_session_activate() [all …]
|
H A D | smtp_sasl_proto.c | 155 if (session->tls_context == 0) in smtp_sasl_helo_login() 158 else if (TLS_CERT_IS_MATCHED(session->tls_context)) in smtp_sasl_helo_login()
|
H A D | smtp.h | 379 TLS_SESS_STATE *tls_context; /* TLS library session state */ member 512 (session->tls_context == 0 \ 518 (session->tls_context != 0 \
|
H A D | smtp_proto.c | 1001 session->tls_context = 0; in smtp_start_tls() 1027 session->tls_context = tls_proxy_context_receive(session->stream); in smtp_start_tls() 1028 if (session->tls_context) { in smtp_start_tls() 1031 session->tls_context); in smtp_start_tls() 1049 session->tls_context = in smtp_start_tls() 1079 if (session->tls_context == 0) { in smtp_start_tls() 1127 if (TLS_MUST_MATCH(session->tls_context->level)) in smtp_start_tls() 1128 if (!TLS_CERT_IS_MATCHED(session->tls_context)) in smtp_start_tls()
|
/netbsd-src/external/ibm-public/postfix/dist/src/smtpd/ |
H A D | smtpd_milter.c | 127 #define IF_ENCRYPTED(x) (state->tls_context ? (x) : 0) in smtpd_milter_eval() 128 #define IF_TRUSTED(x) (TLS_CERT_IS_TRUSTED(state->tls_context) ? (x) : 0) in smtpd_milter_eval() 131 return (IF_ENCRYPTED(state->tls_context->protocol)); in smtpd_milter_eval() 133 return (IF_ENCRYPTED(state->tls_context->cipher_name)); in smtpd_milter_eval() 135 if (state->tls_context == 0) in smtpd_milter_eval() 138 IF_ENCRYPTED(state->tls_context->cipher_usebits)); in smtpd_milter_eval() 142 return (IF_TRUSTED(state->tls_context->peer_CN)); in smtpd_milter_eval() 144 return (IF_TRUSTED(state->tls_context->issuer_CN)); in smtpd_milter_eval()
|
H A D | smtpd.c | 1987 if (var_smtpd_use_tls && (!state->tls_context)) in ehlo_cmd() 3435 if (var_smtpd_tls_received_header && state->tls_context) { in common_pre_message_handling() 3440 state->tls_context->protocol, in common_pre_message_handling() 3441 state->tls_context->cipher_name, in common_pre_message_handling() 3442 state->tls_context->cipher_usebits, in common_pre_message_handling() 3443 state->tls_context->cipher_algbits); in common_pre_message_handling() 3444 if (state->tls_context->kex_name && *state->tls_context->kex_name) { in common_pre_message_handling() 3448 state->tls_context->kex_name); in common_pre_message_handling() 3449 if (state->tls_context->kex_curve in common_pre_message_handling() 3450 && *state->tls_context->kex_curve) in common_pre_message_handling() [all …]
|
H A D | smtpd_sasl_proto.c | 187 if (var_smtpd_tls_auth_only && !state->tls_context) { in smtpd_sasl_auth_cmd() 211 if (state->tls_context != 0) in smtpd_sasl_auth_cmd()
|
H A D | smtpd_check.c | 1287 if (state->tls_context == 0) in reject_plaintext_session() 1595 if (!state->tls_context) in permit_tls_clientcerts() 1598 if (TLS_CERT_IS_TRUSTED(state->tls_context) && permit_all_certs) { in permit_tls_clientcerts() 1609 if (TLS_CERT_IS_PRESENT(state->tls_context)) { in permit_tls_clientcerts() 1618 prints[0] = state->tls_context->peer_cert_fprint; in permit_tls_clientcerts() 1619 prints[1] = state->tls_context->peer_pkey_fprint; in permit_tls_clientcerts() 3198 if (TLS_CERT_IS_PRESENT(state->tls_context)) { in check_ccert_access() 3206 match_this = state->tls_context->peer_cert_fprint; in check_ccert_access() 3213 match_this = state->tls_context->peer_pkey_fprint; in check_ccert_access() 3244 state->tls_context->peer_CN, in check_ccert_access() [all …]
|
H A D | smtpd_state.c | 152 state->tls_context = 0; in smtpd_state_init()
|
H A D | smtpd_sasl_glue.c | 227 tls_flag = state->tls_context != 0; in smtpd_sasl_activate()
|
H A D | smtpd.h | 179 TLS_SESS_STATE *tls_context; /* TLS session state */ member
|
/netbsd-src/external/ibm-public/postfix/dist/src/tlsproxy/ |
H A D | tlsproxy.c | 743 state->tls_context = tls_server_post_accept(state->tls_context); in tlsp_post_handshake() 745 state->tls_context = tls_client_post_connect(state->tls_context, in tlsp_post_handshake() 747 if (state->tls_context == 0) { in tlsp_post_handshake() 764 (void *) state->tls_context), in tlsp_post_handshake() 790 TLS_SESS_STATE *tls_context = state->tls_context; in tlsp_strategy() local 818 ssl_stat = SSL_accept(tls_context->con); in tlsp_strategy() 820 ssl_stat = SSL_connect(tls_context->con); in tlsp_strategy() 822 handshake_err = SSL_get_error(tls_context->con, ssl_stat); in tlsp_strategy() 846 if (!SSL_in_init(tls_context->con) in tlsp_strategy() 847 && (ssl_stat = SSL_shutdown(tls_context->con)) < 0) { in tlsp_strategy() [all …]
|
H A D | tlsproxy_state.c | 119 state->tls_context = 0; in tlsp_state_create() 156 if (state->tls_context) in tlsp_state_free() 157 tls_free_context(state->tls_context); in tlsp_state_free()
|
H A D | tlsproxy.h | 42 TLS_SESS_STATE *tls_context; /* libtls state */ member
|
/netbsd-src/external/ibm-public/postfix/dist/src/posttls-finger/ |
H A D | posttls-finger.c | 495 TLS_SESS_STATE *tls_context; /* Session TLS context */ member 714 x509_stack_t *sk = SSL_get_peer_cert_chain(state->tls_context->con); in print_trust_info() 722 if ((sk = state->tls_context->untrusted) != 0) { in print_trust_info() 727 if ((sk = state->tls_context->trusted) != 0) { in print_trust_info() 862 state->tls_context = 0; in starttls() 888 state->tls_context = tls_proxy_context_receive(state->stream); in starttls() 889 if (state->tls_context) { in starttls() 894 state->namaddrport, state->tls_context->peer_CN, in starttls() 895 state->tls_context->issuer_CN, in starttls() 896 state->tls_context->peer_cert_fprint, in starttls() [all …]
|