X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;f=src%2Fsrc%2Ftls.c;h=0625c48b84d93dda9c3f08aa852b9a4b876f3385;hb=bb7b9411e1b4f95418bed7b35035186e261063a6;hp=04d8eaba45830692d04c3023663dd5d3e76eea1e;hpb=059ec3d9952740285fb1ebf47961b8aca2eb1b4a;p=exim.git diff --git a/src/src/tls.c b/src/src/tls.c index 04d8eaba4..0625c48b8 100644 --- a/src/src/tls.c +++ b/src/src/tls.c @@ -1,10 +1,8 @@ -/* $Cambridge: exim/src/src/tls.c,v 1.1 2004/10/07 10:39:01 ph10 Exp $ */ - /************************************************* * Exim - an Internet mail transport agent * *************************************************/ -/* Copyright (c) University of Cambridge 1995 - 2004 */ +/* Copyright (c) University of Cambridge 1995 - 2012 */ /* See the file NOTICE for conditions of use and distribution. */ /* This module provides TLS (aka SSL) support for Exim. The code for OpenSSL is @@ -32,16 +30,21 @@ static void dummy(int x) { dummy(x-1); } #else /* Static variables that are used for buffering data by both sets of -functions and the common functions below. */ +functions and the common functions below. +We're moving away from this; GnuTLS is already using a state, which +can switch, so we can do TLS callouts during ACLs. */ +static const int ssl_xfer_buffer_size = 4096; +#ifndef USE_GNUTLS static uschar *ssl_xfer_buffer = NULL; -static int ssl_xfer_buffer_size = 4096; static int ssl_xfer_buffer_lwm = 0; static int ssl_xfer_buffer_hwm = 0; static int ssl_xfer_eof = 0; static int ssl_xfer_error = 0; +#endif +uschar *tls_channelbinding_b64 = NULL; /************************************************* @@ -60,11 +63,11 @@ Returns: TRUE if OK; result may still be NULL after forced failure */ static BOOL -expand_check(uschar *s, uschar *name, uschar **result) +expand_check(const uschar *s, const uschar *name, uschar **result) { if (s == NULL) *result = NULL; else { - *result = expand_string(s); + *result = expand_string(US s); /* need to clean up const some more */ if (*result == NULL && !expand_string_forcedfail) { log_write(0, LOG_MAIN|LOG_PANIC, "expansion of %s failed: %s", name, @@ -82,6 +85,13 @@ return TRUE; #ifdef USE_GNUTLS #include "tls-gnu.c" + +#define ssl_xfer_buffer (state_server.xfer_buffer) +#define ssl_xfer_buffer_lwm (state_server.xfer_buffer_lwm) +#define ssl_xfer_buffer_hwm (state_server.xfer_buffer_hwm) +#define ssl_xfer_eof (state_server.xfer_eof) +#define ssl_xfer_error (state_server.xfer_error) + #else #include "tls-openssl.c" #endif @@ -94,6 +104,7 @@ return TRUE; /* Puts a character back in the input buffer. Only ever called once. +Only used by the server-side TLS. Arguments: ch the character @@ -115,6 +126,7 @@ return ch; *************************************************/ /* Tests for a previous EOF +Only used by the server-side TLS. Arguments: none Returns: non-zero if the eof flag is set @@ -134,6 +146,7 @@ return ssl_xfer_eof; /* Tests for a previous read error, and returns with errno restored to what it was when the error was detected. +Only used by the server-side TLS. >>>>> Hmm. Errno not handled yet. Where do we get it from? >>>>> @@ -147,6 +160,25 @@ tls_ferror(void) return ssl_xfer_error; } + +/************************************************* +* TLS version of smtp_buffered * +*************************************************/ + +/* Tests for unused chars in the TLS input buffer. +Only used by the server-side TLS. + +Arguments: none +Returns: TRUE/FALSE +*/ + +BOOL +tls_smtp_buffered(void) +{ +return ssl_xfer_buffer_lwm < ssl_xfer_buffer_hwm; +} + + #endif /* SUPPORT_TLS */ /* End of tls.c */