Home
last modified time | relevance | path

Searched refs:peerdn (Results 1 – 25 of 106) sorted by relevance

12345

/dports/mail/exim-ldap2/exim-4.95/src/
H A Dtls-gnu.c214 uschar *peerdn; member
674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state()
2220 state->peerdn = NULL; in peer_status()
2346 state->peerdn = dn_buf; in peer_status()
2386 if (rc != OK || !state->peerdn) in verify_certificate()
2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
H A Dtls-openssl.c2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument
2793 tlsp->peerdn = NULL; in peer_cert()
2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert()
2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert()
2808 tlsp->peerdn = string_copy(peerdn); in peer_cert()
3057 static uschar peerdn[256]; in tls_server_start() local
3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start()
3723 static uschar peerdn[256]; in tls_client_start() local
4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
H A Dspool_out.c272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
/dports/mail/exim-postgresql/exim-4.95/src/
H A Dtls-gnu.c214 uschar *peerdn; member
674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state()
2220 state->peerdn = NULL; in peer_status()
2346 state->peerdn = dn_buf; in peer_status()
2386 if (rc != OK || !state->peerdn) in verify_certificate()
2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
H A Dtls-openssl.c2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument
2793 tlsp->peerdn = NULL; in peer_cert()
2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert()
2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert()
2808 tlsp->peerdn = string_copy(peerdn); in peer_cert()
3057 static uschar peerdn[256]; in tls_server_start() local
3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start()
3723 static uschar peerdn[256]; in tls_client_start() local
4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
H A Dspool_out.c272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
/dports/mail/exim-mysql/exim-4.95/src/
H A Dtls-gnu.c214 uschar *peerdn; member
674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state()
2220 state->peerdn = NULL; in peer_status()
2346 state->peerdn = dn_buf; in peer_status()
2386 if (rc != OK || !state->peerdn) in verify_certificate()
2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
H A Dtls-openssl.c2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument
2793 tlsp->peerdn = NULL; in peer_cert()
2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert()
2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert()
2808 tlsp->peerdn = string_copy(peerdn); in peer_cert()
3057 static uschar peerdn[256]; in tls_server_start() local
3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start()
3723 static uschar peerdn[256]; in tls_client_start() local
4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
H A Dspool_out.c272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
/dports/mail/exim-monitor/exim-4.95/src/
H A Dtls-gnu.c214 uschar *peerdn; member
674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state()
2220 state->peerdn = NULL; in peer_status()
2346 state->peerdn = dn_buf; in peer_status()
2386 if (rc != OK || !state->peerdn) in verify_certificate()
2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
H A Dtls-openssl.c2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument
2793 tlsp->peerdn = NULL; in peer_cert()
2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert()
2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert()
2808 tlsp->peerdn = string_copy(peerdn); in peer_cert()
3057 static uschar peerdn[256]; in tls_server_start() local
3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start()
3723 static uschar peerdn[256]; in tls_client_start() local
4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
H A Dspool_out.c272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
/dports/mail/exim/exim-4.95/src/
H A Dtls-gnu.c214 uschar *peerdn; member
674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state()
2220 state->peerdn = NULL; in peer_status()
2346 state->peerdn = dn_buf; in peer_status()
2386 if (rc != OK || !state->peerdn) in verify_certificate()
2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
H A Dtls-openssl.c2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument
2793 tlsp->peerdn = NULL; in peer_cert()
2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert()
2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert()
2808 tlsp->peerdn = string_copy(peerdn); in peer_cert()
3057 static uschar peerdn[256]; in tls_server_start() local
3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start()
3723 static uschar peerdn[256]; in tls_client_start() local
4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
H A Dspool_out.c272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
/dports/mail/exim-sa-exim/exim-4.95/src/
H A Dtls-gnu.c214 uschar *peerdn; member
674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state()
2220 state->peerdn = NULL; in peer_status()
2346 state->peerdn = dn_buf; in peer_status()
2386 if (rc != OK || !state->peerdn) in verify_certificate()
2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
H A Dtls-openssl.c2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument
2793 tlsp->peerdn = NULL; in peer_cert()
2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert()
2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert()
2808 tlsp->peerdn = string_copy(peerdn); in peer_cert()
3057 static uschar peerdn[256]; in tls_server_start() local
3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start()
3723 static uschar peerdn[256]; in tls_client_start() local
4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
H A Dspool_out.c272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
/dports/mail/exim-sqlite/exim-4.95/src/
H A Dtls-gnu.c214 uschar *peerdn; member
674 tlsp->peerdn = state->peerdn; in extract_exim_vars_from_tls_state()
2220 state->peerdn = NULL; in peer_status()
2346 state->peerdn = dn_buf; in peer_status()
2386 if (rc != OK || !state->peerdn) in verify_certificate()
2549 *errstr, state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2578 state->peerdn ? state->peerdn : US"<unset>"); in verify_certificate()
2582 state->tlsp->peerdn = state->peerdn; in verify_certificate()
H A Dtls-openssl.c2786 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz) in peer_cert() argument
2793 tlsp->peerdn = NULL; in peer_cert()
2800 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz)) in peer_cert()
2806 peerdn[siz-1] = '\0'; /* paranoia */ in peer_cert()
2808 tlsp->peerdn = string_copy(peerdn); in peer_cert()
3057 static uschar peerdn[256]; in tls_server_start() local
3291 peer_cert(ssl, &tls_in, peerdn, sizeof(peerdn)); in tls_server_start()
3723 static uschar peerdn[256]; in tls_client_start() local
4001 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn)); in tls_client_start()
H A Dspool_out.c272 if (tls_in.peerdn) spool_var_write(fp, US"tls_peerdn", string_printing(tls_in.peerdn)); in spool_write_header()
/dports/mail/exim-monitor/exim-4.95/doc/cve-2019-15846/
H A Dqualys.mbx38 - It is used for peerdn and sni in src/spool_in.c; but peerdn is used
/dports/mail/exim-sqlite/exim-4.95/doc/cve-2019-15846/
H A Dqualys.mbx38 - It is used for peerdn and sni in src/spool_in.c; but peerdn is used
/dports/mail/exim-postgresql/exim-4.95/doc/cve-2019-15846/
H A Dqualys.mbx38 - It is used for peerdn and sni in src/spool_in.c; but peerdn is used
/dports/mail/exim/exim-4.95/doc/cve-2019-15846/
H A Dqualys.mbx38 - It is used for peerdn and sni in src/spool_in.c; but peerdn is used

12345