/dports/mail/exim-ldap2/exim-4.95/src/ |
H A D | tls-gnu.c | 214 uschar *peerdn; member 674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state() 2220 state->peerdn = NULL; in peer_status() 2346 state->peerdn = dn_buf; in peer_status() 2386 if (rc != OK || !state->peerdn) in verify_certificate() 2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
|
H A D | tls-openssl.c | 2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument 2793 tlsp->peerdn = NULL; in peer_cert() 2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert() 2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert() 2808 tlsp->peerdn = string_copy(peerdn); in peer_cert() 3057 static uschar peerdn[256]; in tls_server_start() local 3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start() 3723 static uschar peerdn[256]; in tls_client_start() local 4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
|
H A D | spool_out.c | 272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
|
/dports/mail/exim-postgresql/exim-4.95/src/ |
H A D | tls-gnu.c | 214 uschar *peerdn; member 674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state() 2220 state->peerdn = NULL; in peer_status() 2346 state->peerdn = dn_buf; in peer_status() 2386 if (rc != OK || !state->peerdn) in verify_certificate() 2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
|
H A D | tls-openssl.c | 2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument 2793 tlsp->peerdn = NULL; in peer_cert() 2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert() 2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert() 2808 tlsp->peerdn = string_copy(peerdn); in peer_cert() 3057 static uschar peerdn[256]; in tls_server_start() local 3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start() 3723 static uschar peerdn[256]; in tls_client_start() local 4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
|
H A D | spool_out.c | 272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
|
/dports/mail/exim-mysql/exim-4.95/src/ |
H A D | tls-gnu.c | 214 uschar *peerdn; member 674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state() 2220 state->peerdn = NULL; in peer_status() 2346 state->peerdn = dn_buf; in peer_status() 2386 if (rc != OK || !state->peerdn) in verify_certificate() 2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
|
H A D | tls-openssl.c | 2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument 2793 tlsp->peerdn = NULL; in peer_cert() 2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert() 2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert() 2808 tlsp->peerdn = string_copy(peerdn); in peer_cert() 3057 static uschar peerdn[256]; in tls_server_start() local 3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start() 3723 static uschar peerdn[256]; in tls_client_start() local 4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
|
H A D | spool_out.c | 272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
|
/dports/mail/exim-monitor/exim-4.95/src/ |
H A D | tls-gnu.c | 214 uschar *peerdn; member 674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state() 2220 state->peerdn = NULL; in peer_status() 2346 state->peerdn = dn_buf; in peer_status() 2386 if (rc != OK || !state->peerdn) in verify_certificate() 2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
|
H A D | tls-openssl.c | 2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument 2793 tlsp->peerdn = NULL; in peer_cert() 2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert() 2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert() 2808 tlsp->peerdn = string_copy(peerdn); in peer_cert() 3057 static uschar peerdn[256]; in tls_server_start() local 3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start() 3723 static uschar peerdn[256]; in tls_client_start() local 4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
|
H A D | spool_out.c | 272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
|
/dports/mail/exim/exim-4.95/src/ |
H A D | tls-gnu.c | 214 uschar *peerdn; member 674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state() 2220 state->peerdn = NULL; in peer_status() 2346 state->peerdn = dn_buf; in peer_status() 2386 if (rc != OK || !state->peerdn) in verify_certificate() 2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
|
H A D | tls-openssl.c | 2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument 2793 tlsp->peerdn = NULL; in peer_cert() 2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert() 2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert() 2808 tlsp->peerdn = string_copy(peerdn); in peer_cert() 3057 static uschar peerdn[256]; in tls_server_start() local 3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start() 3723 static uschar peerdn[256]; in tls_client_start() local 4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
|
H A D | spool_out.c | 272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
|
/dports/mail/exim-sa-exim/exim-4.95/src/ |
H A D | tls-gnu.c | 214 uschar *peerdn; member 674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state() 2220 state->peerdn = NULL; in peer_status() 2346 state->peerdn = dn_buf; in peer_status() 2386 if (rc != OK || !state->peerdn) in verify_certificate() 2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
|
H A D | tls-openssl.c | 2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument 2793 tlsp->peerdn = NULL; in peer_cert() 2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert() 2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert() 2808 tlsp->peerdn = string_copy(peerdn); in peer_cert() 3057 static uschar peerdn[256]; in tls_server_start() local 3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start() 3723 static uschar peerdn[256]; in tls_client_start() local 4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
|
H A D | spool_out.c | 272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
|
/dports/mail/exim-sqlite/exim-4.95/src/ |
H A D | tls-gnu.c | 214 uschar *peerdn; member 674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state() 2220 state->peerdn = NULL; in peer_status() 2346 state->peerdn = dn_buf; in peer_status() 2386 if (rc != OK || !state->peerdn) in verify_certificate() 2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate() 2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
|
H A D | tls-openssl.c | 2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument 2793 tlsp->peerdn = NULL; in peer_cert() 2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert() 2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert() 2808 tlsp->peerdn = string_copy(peerdn); in peer_cert() 3057 static uschar peerdn[256]; in tls_server_start() local 3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start() 3723 static uschar peerdn[256]; in tls_client_start() local 4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
|
H A D | spool_out.c | 272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
|
/dports/mail/exim-monitor/exim-4.95/doc/cve-2019-15846/ |
H A D | qualys.mbx | 38 - It is used for peerdn and sni in src/spool_in.c; but peerdn is used
|
/dports/mail/exim-sqlite/exim-4.95/doc/cve-2019-15846/ |
H A D | qualys.mbx | 38 - It is used for peerdn and sni in src/spool_in.c; but peerdn is used
|
/dports/mail/exim-postgresql/exim-4.95/doc/cve-2019-15846/ |
H A D | qualys.mbx | 38 - It is used for peerdn and sni in src/spool_in.c; but peerdn is used
|
/dports/mail/exim/exim-4.95/doc/cve-2019-15846/ |
H A D | qualys.mbx | 38 - It is used for peerdn and sni in src/spool_in.c; but peerdn is used
|