Home
last modified time | relevance | path

Searched refs:tls_context (Results 1 – 17 of 17) sorted by relevance

/netbsd-src/external/ibm-public/postfix/dist/src/tls/
H A Dtls_proxy_context_scan.c74 TLS_SESS_STATE *tls_context in tls_proxy_context_scan() local
75 = (TLS_SESS_STATE *) mymalloc(sizeof(*tls_context));; in tls_proxy_context_scan()
99 memset(tls_context, 0, sizeof(*tls_context)); in tls_proxy_context_scan()
106 &tls_context->level), in tls_proxy_context_scan()
108 &tls_context->peer_status), in tls_proxy_context_scan()
112 &tls_context->cipher_usebits), in tls_proxy_context_scan()
114 &tls_context->cipher_algbits), in tls_proxy_context_scan()
117 RECV_ATTR_INT(TLS_ATTR_KEX_BITS, &tls_context->kex_bits), in tls_proxy_context_scan()
120 RECV_ATTR_INT(TLS_ATTR_CLNT_SIG_BITS, &tls_context->clnt_sig_bits), in tls_proxy_context_scan()
124 RECV_ATTR_INT(TLS_ATTR_SRVR_SIG_BITS, &tls_context->srvr_sig_bits), in tls_proxy_context_scan()
[all …]
H A Dtls_proxy_clnt.c289 TLS_SESS_STATE *tls_context = 0; in tls_proxy_context_receive() local
292 RECV_ATTR_FUNC(tls_proxy_context_scan, (void *) &tls_context), in tls_proxy_context_receive()
294 if (tls_context) in tls_proxy_context_receive()
295 tls_proxy_context_free(tls_context); in tls_proxy_context_receive()
298 return (tls_context); in tls_proxy_context_receive()
/netbsd-src/external/ibm-public/postfix/dist/src/smtp/
H A Dsmtp_session.c189 session->tls_context = 0; in smtp_session_alloc()
206 if (session->tls_context) { in smtp_session_free()
209 tls_proxy_context_free(session->tls_context); in smtp_session_free()
212 var_smtp_starttls_tmout, 0, session->tls_context); in smtp_session_free()
305 || (session->tls_context in smtp_session_passivate()
308 (void *) session->tls_context), in smtp_session_passivate()
341 TLS_SESS_STATE *tls_context = 0; in smtp_session_activate() local
345 if (tls_context) \ in smtp_session_activate()
346 tls_proxy_context_free(tls_context); \ in smtp_session_activate()
379 (void *) &tls_context), in smtp_session_activate()
[all …]
H A Dsmtp_sasl_proto.c155 if (session->tls_context == 0) in smtp_sasl_helo_login()
158 else if (TLS_CERT_IS_MATCHED(session->tls_context)) in smtp_sasl_helo_login()
H A Dsmtp.h379 TLS_SESS_STATE *tls_context; /* TLS library session state */ member
512 (session->tls_context == 0 \
518 (session->tls_context != 0 \
H A Dsmtp_proto.c1001 session->tls_context = 0; in smtp_start_tls()
1027 session->tls_context = tls_proxy_context_receive(session->stream); in smtp_start_tls()
1028 if (session->tls_context) { in smtp_start_tls()
1031 session->tls_context); in smtp_start_tls()
1049 session->tls_context = in smtp_start_tls()
1079 if (session->tls_context == 0) { in smtp_start_tls()
1127 if (TLS_MUST_MATCH(session->tls_context->level)) in smtp_start_tls()
1128 if (!TLS_CERT_IS_MATCHED(session->tls_context)) in smtp_start_tls()
/netbsd-src/external/ibm-public/postfix/dist/src/smtpd/
H A Dsmtpd_milter.c127 #define IF_ENCRYPTED(x) (state->tls_context ? (x) : 0) in smtpd_milter_eval()
128 #define IF_TRUSTED(x) (TLS_CERT_IS_TRUSTED(state->tls_context) ? (x) : 0) in smtpd_milter_eval()
131 return (IF_ENCRYPTED(state->tls_context->protocol)); in smtpd_milter_eval()
133 return (IF_ENCRYPTED(state->tls_context->cipher_name)); in smtpd_milter_eval()
135 if (state->tls_context == 0) in smtpd_milter_eval()
138 IF_ENCRYPTED(state->tls_context->cipher_usebits)); in smtpd_milter_eval()
142 return (IF_TRUSTED(state->tls_context->peer_CN)); in smtpd_milter_eval()
144 return (IF_TRUSTED(state->tls_context->issuer_CN)); in smtpd_milter_eval()
H A Dsmtpd.c1987 if (var_smtpd_use_tls && (!state->tls_context)) in ehlo_cmd()
3435 if (var_smtpd_tls_received_header && state->tls_context) { in common_pre_message_handling()
3440 state->tls_context->protocol, in common_pre_message_handling()
3441 state->tls_context->cipher_name, in common_pre_message_handling()
3442 state->tls_context->cipher_usebits, in common_pre_message_handling()
3443 state->tls_context->cipher_algbits); in common_pre_message_handling()
3444 if (state->tls_context->kex_name && *state->tls_context->kex_name) { in common_pre_message_handling()
3448 state->tls_context->kex_name); in common_pre_message_handling()
3449 if (state->tls_context->kex_curve in common_pre_message_handling()
3450 && *state->tls_context->kex_curve) in common_pre_message_handling()
[all …]
H A Dsmtpd_sasl_proto.c187 if (var_smtpd_tls_auth_only && !state->tls_context) { in smtpd_sasl_auth_cmd()
211 if (state->tls_context != 0) in smtpd_sasl_auth_cmd()
H A Dsmtpd_check.c1287 if (state->tls_context == 0) in reject_plaintext_session()
1595 if (!state->tls_context) in permit_tls_clientcerts()
1598 if (TLS_CERT_IS_TRUSTED(state->tls_context) && permit_all_certs) { in permit_tls_clientcerts()
1609 if (TLS_CERT_IS_PRESENT(state->tls_context)) { in permit_tls_clientcerts()
1618 prints[0] = state->tls_context->peer_cert_fprint; in permit_tls_clientcerts()
1619 prints[1] = state->tls_context->peer_pkey_fprint; in permit_tls_clientcerts()
3198 if (TLS_CERT_IS_PRESENT(state->tls_context)) { in check_ccert_access()
3206 match_this = state->tls_context->peer_cert_fprint; in check_ccert_access()
3213 match_this = state->tls_context->peer_pkey_fprint; in check_ccert_access()
3244 state->tls_context->peer_CN, in check_ccert_access()
[all …]
H A Dsmtpd_state.c152 state->tls_context = 0; in smtpd_state_init()
H A Dsmtpd_sasl_glue.c227 tls_flag = state->tls_context != 0; in smtpd_sasl_activate()
H A Dsmtpd.h179 TLS_SESS_STATE *tls_context; /* TLS session state */ member
/netbsd-src/external/ibm-public/postfix/dist/src/tlsproxy/
H A Dtlsproxy.c743 state->tls_context = tls_server_post_accept(state->tls_context); in tlsp_post_handshake()
745 state->tls_context = tls_client_post_connect(state->tls_context, in tlsp_post_handshake()
747 if (state->tls_context == 0) { in tlsp_post_handshake()
764 (void *) state->tls_context), in tlsp_post_handshake()
790 TLS_SESS_STATE *tls_context = state->tls_context; in tlsp_strategy() local
818 ssl_stat = SSL_accept(tls_context->con); in tlsp_strategy()
820 ssl_stat = SSL_connect(tls_context->con); in tlsp_strategy()
822 handshake_err = SSL_get_error(tls_context->con, ssl_stat); in tlsp_strategy()
846 if (!SSL_in_init(tls_context->con) in tlsp_strategy()
847 && (ssl_stat = SSL_shutdown(tls_context->con)) < 0) { in tlsp_strategy()
[all …]
H A Dtlsproxy_state.c119 state->tls_context = 0; in tlsp_state_create()
156 if (state->tls_context) in tlsp_state_free()
157 tls_free_context(state->tls_context); in tlsp_state_free()
H A Dtlsproxy.h42 TLS_SESS_STATE *tls_context; /* libtls state */ member
/netbsd-src/external/ibm-public/postfix/dist/src/posttls-finger/
H A Dposttls-finger.c495 TLS_SESS_STATE *tls_context; /* Session TLS context */ member
714 x509_stack_t *sk = SSL_get_peer_cert_chain(state->tls_context->con); in print_trust_info()
722 if ((sk = state->tls_context->untrusted) != 0) { in print_trust_info()
727 if ((sk = state->tls_context->trusted) != 0) { in print_trust_info()
862 state->tls_context = 0; in starttls()
888 state->tls_context = tls_proxy_context_receive(state->stream); in starttls()
889 if (state->tls_context) { in starttls()
894 state->namaddrport, state->tls_context->peer_CN, in starttls()
895 state->tls_context->issuer_CN, in starttls()
896 state->tls_context->peer_cert_fprint, in starttls()
[all …]