TLS: add variables for the IETF standard name for the connection ciphersuite
[exim.git] / src / src / globals.h
... / ...
CommitLineData
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
5/* Copyright (c) University of Cambridge 1995 - 2018 */
6/* See the file NOTICE for conditions of use and distribution. */
7
8/* Almost all the global variables are defined together in this one header, so
9that they are easy to find. However, those that are visible during the
10compilation of the local_scan() function are defined separately in the
11local_scan.h header file. */
12
13/* First put any specials that are required for some operating systems. */
14
15#ifdef NEED_H_ERRNO
16extern int h_errno;
17#endif
18
19/* We need to be careful about width of int and atomicity in signal handlers,
20especially with the rise of 64-bit systems breaking older assumptions. But
21sig_atomic_t comes from signal.h so can't go into mytypes.h without including
22signal support in local_scan, which seems precipitous. */
23typedef volatile sig_atomic_t SIGNAL_BOOL;
24
25/* Now things that are present only when configured. */
26
27#ifdef EXIM_PERL
28extern uschar *opt_perl_startup; /* Startup code for Perl interpreter */
29extern BOOL opt_perl_at_start; /* Start Perl interpreter at start */
30extern BOOL opt_perl_started; /* Set once interpreter started */
31extern BOOL opt_perl_taintmode; /* Enable taint mode in Perl */
32#endif
33
34#ifdef EXPAND_DLFUNC
35extern tree_node *dlobj_anchor; /* Tree of dynamically-loaded objects */
36#endif
37
38#ifdef LOOKUP_IBASE
39extern uschar *ibase_servers;
40#endif
41
42#ifdef LOOKUP_LDAP
43extern uschar *eldap_ca_cert_dir; /* Directory with CA certificates */
44extern uschar *eldap_ca_cert_file; /* CA certificate file */
45extern uschar *eldap_cert_file; /* Certificate file */
46extern uschar *eldap_cert_key; /* Certificate key file */
47extern uschar *eldap_cipher_suite; /* Allowed cipher suite */
48extern uschar *eldap_default_servers; /* List of default servers */
49extern uschar *eldap_require_cert; /* Peer certificate checking strategy */
50extern BOOL eldap_start_tls; /* Use STARTTLS */
51extern int eldap_version; /* LDAP version */
52#endif
53
54#ifdef LOOKUP_MYSQL
55extern uschar *mysql_servers; /* List of servers and connect info */
56#endif
57
58#ifdef LOOKUP_ORACLE
59extern uschar *oracle_servers; /* List of servers and connect info */
60#endif
61
62#ifdef LOOKUP_PGSQL
63extern uschar *pgsql_servers; /* List of servers and connect info */
64#endif
65
66#ifdef LOOKUP_REDIS
67extern uschar *redis_servers; /* List of servers and connect info */
68#endif
69
70#ifdef LOOKUP_SQLITE
71extern int sqlite_lock_timeout; /* Internal lock waiting timeout */
72#endif
73
74#ifdef SUPPORT_MOVE_FROZEN_MESSAGES
75extern BOOL move_frozen_messages; /* Get them out of the normal directory */
76#endif
77
78/* These variables are outside the #ifdef because it keeps the code less
79cluttered in several places (e.g. during logging) if we can always refer to
80them. Also, the tls_ variables are now always visible. */
81
82typedef struct {
83 client_conn_ctx active; /* fd/socket when in a TLS session, and ptr to TLS context */
84 int bits; /* bits used in TLS session */
85 BOOL certificate_verified; /* Client certificate verified */
86#ifdef SUPPORT_DANE
87 BOOL dane_verified; /* ... via DANE */
88 int tlsa_usage; /* TLSA record(s) usage */
89#endif
90 uschar *cipher; /* Cipher used */
91 const uschar *cipher_stdname; /* Cipher used, RFC version */
92
93 BOOL on_connect; /* For older MTAs that don't STARTTLS */
94 uschar *on_connect_ports; /* Ports always tls-on-connect */
95 void *ourcert; /* Certificate we presented, binary */
96 void *peercert; /* Certificate of peer, binary */
97 uschar *peerdn; /* DN from peer */
98 uschar *sni; /* Server Name Indication */
99 enum {
100 OCSP_NOT_REQ=0, /* not requested */
101 OCSP_NOT_RESP, /* no response to request */
102 OCSP_VFY_NOT_TRIED, /* response not verified */
103 OCSP_FAILED, /* verify failed */
104 OCSP_VFIED /* verified */
105 } ocsp; /* Stapled OCSP status */
106} tls_support;
107extern tls_support tls_in;
108extern tls_support tls_out;
109
110#ifdef SUPPORT_TLS
111extern BOOL gnutls_compat_mode; /* Less security, more compatibility */
112extern BOOL gnutls_allow_auto_pkcs11; /* Let GnuTLS autoload PKCS11 modules */
113extern uschar *openssl_options; /* OpenSSL compatibility options */
114extern const pcre *regex_STARTTLS; /* For recognizing STARTTLS settings */
115extern uschar *tls_certificate; /* Certificate file */
116extern uschar *tls_channelbinding_b64; /* string of base64 channel binding */
117extern uschar *tls_crl; /* CRL File */
118extern int tls_dh_max_bits; /* don't accept higher lib suggestions */
119extern uschar *tls_dhparam; /* DH param file */
120extern uschar *tls_eccurve; /* EC curve */
121# ifndef DISABLE_OCSP
122extern uschar *tls_ocsp_file; /* OCSP stapling proof file */
123# endif
124extern uschar *tls_privatekey; /* Private key file */
125# ifdef EXPERIMENTAL_REQUIRETLS
126extern uschar tls_requiretls; /* REQUIRETLS active for this message */
127extern uschar *tls_advertise_requiretls; /* hosts for which REQUIRETLS adv */
128extern const pcre *regex_REQUIRETLS; /* for recognising the command */
129# endif
130extern BOOL tls_remember_esmtp; /* For YAEB */
131extern uschar *tls_require_ciphers; /* So some can be avoided */
132extern uschar *tls_try_verify_hosts; /* Optional client verification */
133extern uschar *tls_verify_certificates;/* Path for certificates to check */
134extern uschar *tls_verify_hosts; /* Mandatory client verification */
135#endif
136extern uschar *tls_advertise_hosts; /* host for which TLS is advertised */
137
138extern uschar *dsn_envid; /* DSN envid string */
139extern int dsn_ret; /* DSN ret type*/
140extern const pcre *regex_DSN; /* For recognizing DSN settings */
141extern uschar *dsn_advertise_hosts; /* host for which TLS is advertised */
142
143/* Input-reading functions for messages, so we can use special ones for
144incoming TCP/IP. */
145
146extern int (*lwr_receive_getc)(unsigned);
147extern uschar * (*lwr_receive_getbuf)(unsigned *);
148extern int (*lwr_receive_ungetc)(int);
149extern int (*receive_getc)(unsigned);
150extern uschar * (*receive_getbuf)(unsigned *);
151extern void (*receive_get_cache)(void);
152extern int (*receive_ungetc)(int);
153extern int (*receive_feof)(void);
154extern int (*receive_ferror)(void);
155extern BOOL (*receive_smtp_buffered)(void);
156
157
158/* For clearing, saving, restoring address expansion variables. We have to have
159the size of this vector set explicitly, because it is referenced from more than
160one module. */
161
162extern const uschar **address_expansions[ADDRESS_EXPANSIONS_COUNT];
163
164/* Flags for which we don't need an address ever so can use a bitfield */
165
166extern struct global_flags {
167 BOOL acl_temp_details :1; /* TRUE to give details for 4xx error */
168 BOOL active_local_from_check :1; /* For adding Sender: (switchable) */
169 BOOL active_local_sender_retain :1; /* For keeping Sender: (switchable) */
170 BOOL address_test_mode :1; /* True for -bt */
171 BOOL admin_user :1; /* True if caller can do admin */
172 BOOL allow_auth_unadvertised :1; /* As it says */
173 BOOL allow_unqualified_recipient :1; /* For local messages */ /* As it says */
174 BOOL allow_unqualified_sender :1; /* Reset for SMTP */ /* Ditto */
175 BOOL authentication_local :1; /* TRUE if non-smtp (implicit authentication) */
176
177 BOOL background_daemon :1; /* Set FALSE to keep in foreground */
178
179 BOOL chunking_offered :1;
180 BOOL config_changed :1; /* True if -C used */
181 BOOL continue_more :1; /* Flag more addresses waiting */
182
183 BOOL daemon_listen :1; /* True if listening required */
184 BOOL debug_daemon :1; /* Debug the daemon process only */
185 BOOL deliver_firsttime :1; /* True for first delivery attempt */
186 BOOL deliver_force :1; /* TRUE if delivery was forced */
187 BOOL deliver_freeze :1; /* TRUE if delivery is frozen */
188 BOOL deliver_force_thaw :1; /* TRUE to force thaw in queue run */
189 BOOL deliver_manual_thaw :1; /* TRUE if manually thawed */
190 BOOL deliver_selectstring_regex :1; /* String is regex */
191 BOOL deliver_selectstring_sender_regex :1; /* String is regex */
192 BOOL disable_callout_flush :1; /* Don't flush before callouts */
193 BOOL disable_delay_flush :1; /* Don't flush before "delay" in ACL */
194 BOOL disable_logging :1; /* Disables log writing when TRUE */
195#ifndef DISABLE_DKIM
196 BOOL dkim_disable_verify :1; /* Set via ACL control statement. When set, DKIM verification is disabled for the current message */
197#endif
198#ifdef EXPERIMENTAL_DMARC
199 BOOL dmarc_has_been_checked :1; /* Global variable to check if test has been called yet */
200 BOOL dmarc_disable_verify :1; /* Set via ACL control statement. When set, DMARC verification is disabled for the current message */
201 BOOL dmarc_enable_forensic :1; /* Set via ACL control statement. When set, DMARC forensic reports are enabled for the current message */
202#endif
203 BOOL dont_deliver :1; /* TRUE for -N option */
204 BOOL dot_ends :1; /* TRUE if "." ends non-SMTP input */
205
206 BOOL enable_dollar_recipients :1; /* Make $recipients available */
207 BOOL expand_string_forcedfail :1; /* TRUE if failure was "expected" */
208
209 BOOL filter_running :1; /* TRUE while running a filter */
210
211 BOOL header_rewritten :1; /* TRUE if header changed by router */
212 BOOL helo_verified :1; /* True if HELO verified */
213 BOOL helo_verify_failed :1; /* True if attempt failed */
214 BOOL host_checking_callout :1; /* TRUE if real callout wanted */
215 BOOL host_find_failed_syntax :1; /* DNS syntax check failure */
216
217 BOOL inetd_wait_mode :1; /* Whether running in inetd wait mode */
218 BOOL is_inetd :1; /* True for inetd calls */
219
220 BOOL local_error_message :1; /* True if handling one of these */
221 BOOL log_testing_mode :1; /* TRUE in various testing modes */
222
223#ifdef WITH_CONTENT_SCAN
224 BOOL no_mbox_unspool :1; /* don't unlink files in /scan directory */
225#endif
226 BOOL no_multiline_responses :1; /* For broken clients */
227
228 BOOL parse_allow_group :1; /* Allow group syntax */
229 BOOL parse_found_group :1; /* In the middle of a group */
230 BOOL pipelining_enable :1; /* As it says */
231#if defined(SUPPORT_PROXY) || defined(SUPPORT_SOCKS)
232 BOOL proxy_session_failed :1; /* TRUE if required proxy negotiation failed */
233#endif
234
235 BOOL queue_2stage :1; /* Run queue in 2-stage manner */
236 BOOL queue_only_policy :1; /* ACL or local_scan wants queue_only */
237 BOOL queue_run_first_delivery :1; /* If TRUE, first deliveries only */
238 BOOL queue_run_force :1; /* TRUE to force during queue run */
239 BOOL queue_run_local :1; /* Local deliveries only in queue run */
240 BOOL queue_running :1; /* TRUE for queue running process and */
241 BOOL queue_smtp :1; /* Disable all immediate SMTP (-odqs)*/
242
243 BOOL really_exim :1; /* FALSE in utilities */
244 BOOL receive_call_bombout :1; /* Flag for crashing log */
245 BOOL recipients_discarded :1; /* By an ACL */
246 BOOL running_in_test_harness :1; /*TRUE when running_status is patched */
247
248 BOOL search_find_defer :1; /* Set TRUE if lookup deferred */
249 BOOL sender_address_forced :1; /* Set by -f */
250 BOOL sender_host_notsocket :1; /* Set for -bs and -bS */
251 BOOL sender_host_unknown :1; /* TRUE for -bs and -bS except inetd */
252 BOOL sender_local :1; /* TRUE for local senders */
253 BOOL sender_name_forced :1; /* Set by -F */
254 BOOL sender_set_untrusted :1; /* Sender set by untrusted caller */
255 BOOL smtp_authenticated :1; /* Sending client has authenticated */
256#ifdef EXPERIMENTAL_PIPE_CONNECT
257 BOOL smtp_in_early_pipe_advertised :1; /* server advertised PIPE_CONNECT */
258 BOOL smtp_in_early_pipe_no_auth :1; /* too many authenticator names */
259 BOOL smtp_in_early_pipe_used :1; /* client did send early data */
260#endif
261 BOOL smtp_in_pipelining_advertised :1; /* server advertised PIPELINING */
262 BOOL smtp_in_pipelining_used :1; /* server noted client using PIPELINING */
263 BOOL spool_file_wireformat :1; /* current -D file has CRLF rather than NL */
264 BOOL submission_mode :1; /* Can be forced from ACL */
265 BOOL suppress_local_fixups :1; /* Can be forced from ACL */
266 BOOL suppress_local_fixups_default :1; /* former is reset to this; override with -G */
267 BOOL synchronous_delivery :1; /* TRUE if -odi is set */
268 BOOL system_filtering :1; /* TRUE when running system filter */
269
270 BOOL tcp_fastopen_ok :1; /* appears to be supported by kernel */
271 BOOL tcp_in_fastopen :1; /* conn usefully used fastopen */
272 BOOL tcp_in_fastopen_data :1; /* fastopen carried data */
273 BOOL tcp_in_fastopen_logged :1; /* one-time logging */
274 BOOL tcp_out_fastopen_logged :1; /* one-time logging */
275 BOOL timestamps_utc :1; /* Use UTC for all times */
276 BOOL transport_filter_timed_out :1; /* True if it did */
277 BOOL trusted_caller :1; /* Caller is trusted */
278 BOOL trusted_config :1; /* Configuration file is trusted */
279} f;
280
281
282/* General global variables */
283
284extern BOOL accept_8bitmime; /* Allow *BITMIME incoming */
285extern uschar *add_environment; /* List of environment variables to add */
286extern header_line *acl_added_headers; /* Headers added by an ACL */
287extern tree_node *acl_anchor; /* Tree of named ACLs */
288extern uschar *acl_arg[9]; /* Argument to ACL call */
289extern int acl_narg; /* Number of arguments to ACL call */
290extern int acl_level; /* Nesting depth and debug indent */
291extern uschar *acl_not_smtp; /* ACL run for non-SMTP messages */
292#ifdef WITH_CONTENT_SCAN
293extern uschar *acl_not_smtp_mime; /* For MIME parts of ditto */
294#endif
295extern uschar *acl_not_smtp_start; /* ACL run at the beginning of a non-SMTP session */
296extern uschar *acl_removed_headers; /* Headers deleted by an ACL */
297extern uschar *acl_smtp_auth; /* ACL run for AUTH */
298extern uschar *acl_smtp_connect; /* ACL run on SMTP connection */
299extern uschar *acl_smtp_data; /* ACL run after DATA received */
300#ifndef DISABLE_PRDR
301extern uschar *acl_smtp_data_prdr; /* ACL run after DATA received if in PRDR mode*/
302const extern pcre *regex_PRDR; /* For recognizing PRDR settings */
303#endif
304#ifndef DISABLE_DKIM
305extern uschar *acl_smtp_dkim; /* ACL run for DKIM signatures / domains */
306#endif
307extern uschar *acl_smtp_etrn; /* ACL run for ETRN */
308extern uschar *acl_smtp_expn; /* ACL run for EXPN */
309extern uschar *acl_smtp_helo; /* ACL run for HELO/EHLO */
310extern uschar *acl_smtp_mail; /* ACL run for MAIL */
311extern uschar *acl_smtp_mailauth; /* ACL run for MAIL AUTH */
312#ifdef WITH_CONTENT_SCAN
313extern uschar *acl_smtp_mime; /* ACL run after DATA, before acl_smtp_data, for each MIME part */
314#endif
315extern uschar *acl_smtp_notquit; /* ACL run for disconnects */
316extern uschar *acl_smtp_predata; /* ACL run for DATA command */
317extern uschar *acl_smtp_quit; /* ACL run for QUIT */
318extern uschar *acl_smtp_rcpt; /* ACL run for RCPT */
319extern uschar *acl_smtp_starttls; /* ACL run for STARTTLS */
320extern uschar *acl_smtp_vrfy; /* ACL run for VRFY */
321extern tree_node *acl_var_c; /* ACL connection variables */
322extern tree_node *acl_var_m; /* ACL message variables */
323extern uschar *acl_verify_message; /* User message for verify failure */
324extern string_item *acl_warn_logged; /* Logged lines */
325extern uschar *acl_wherecodes[]; /* Response codes for ACL fails */
326extern uschar *acl_wherenames[]; /* Names for messages */
327extern address_item *addr_duplicate; /* Duplicate address list */
328extern address_item address_defaults; /* Default data for address item */
329extern uschar *address_file; /* Name of file when delivering to one */
330extern uschar *address_pipe; /* Pipe command when delivering to one */
331extern tree_node *addresslist_anchor; /* Tree of defined address lists */
332extern int addresslist_count; /* Number defined */
333extern gid_t *admin_groups; /* List of admin groups */
334extern BOOL allow_domain_literals; /* As it says */
335extern BOOL allow_mx_to_ip; /* Allow MX records to -> ip address */
336#ifdef EXPERIMENTAL_ARC
337struct arc_set *arc_received; /* highest ARC instance evaluation struct */
338extern int arc_received_instance; /* highest ARC instance number in headers */
339extern int arc_oldest_pass; /* lowest passing instance number in headers */
340extern const uschar *arc_state; /* verification state */
341extern const uschar *arc_state_reason;
342#endif
343extern BOOL allow_utf8_domains; /* For experimenting */
344extern uschar *authenticated_fail_id; /* ID that failed authentication */
345extern uschar *authenticated_id; /* ID that was authenticated */
346extern uschar *authenticated_sender; /* From AUTH on MAIL */
347extern BOOL authentication_failed; /* TRUE if AUTH was tried and failed */
348extern uschar *auth_advertise_hosts; /* Only advertise to these */
349extern auth_info auths_available[]; /* Vector of available auth mechanisms */
350extern auth_instance *auths; /* Chain of instantiated auths */
351extern auth_instance auth_defaults; /* Default values */
352extern uschar *auth_defer_msg; /* Error message for log */
353extern uschar *auth_defer_user_msg; /* Error message for user */
354extern uschar *auth_vars[]; /* $authn variables */
355extern int auto_thaw; /* Auto-thaw interval */
356#ifdef WITH_CONTENT_SCAN
357extern int av_failed; /* TRUE if the AV process failed */
358extern uschar *av_scanner; /* AntiVirus scanner to use for the malware condition */
359#endif
360
361extern uschar *base62_chars; /* Table of base-62 characters */
362extern uschar *bi_command; /* Command for -bi option */
363extern uschar *big_buffer; /* Used for various temp things */
364extern int big_buffer_size; /* Current size (can expand) */
365#ifdef EXPERIMENTAL_BRIGHTMAIL
366extern uschar *bmi_alt_location; /* expansion variable that contains the alternate location for the rcpt (available during routing) */
367extern uschar *bmi_base64_tracker_verdict; /* expansion variable with base-64 encoded OLD verdict string (available during routing) */
368extern uschar *bmi_base64_verdict; /* expansion variable with base-64 encoded verdict string (available during routing) */
369extern uschar *bmi_config_file; /* Brightmail config file */
370extern int bmi_deliver; /* Flag that determines if the message should be delivered to the rcpt (available during routing) */
371extern int bmi_run; /* Flag that determines if message should be run through Brightmail server */
372extern uschar *bmi_verdicts; /* BASE64-encoded verdicts with recipient lists */
373#endif
374extern int bsmtp_transaction_linecount; /* Start of last transaction */
375extern int body_8bitmime; /* sender declared BODY= ; 7=7BIT, 8=8BITMIME */
376extern uschar *bounce_message_file; /* Template file */
377extern uschar *bounce_message_text; /* One-liner */
378extern uschar *bounce_recipient; /* When writing an errmsg */
379extern BOOL bounce_return_body; /* Include body in returned message */
380extern int bounce_return_linesize_limit; /* Max line length in return */
381extern BOOL bounce_return_message; /* Include message in bounce */
382extern int bounce_return_size_limit; /* Max amount to return */
383extern uschar *bounce_sender_authentication; /* AUTH address for bounces */
384
385extern uschar *callout_address; /* Address used for a malware/spamd/verify etc. callout */
386extern int callout_cache_domain_positive_expire; /* Time for positive domain callout cache records to expire */
387extern int callout_cache_domain_negative_expire; /* Time for negative domain callout cache records to expire */
388extern int callout_cache_positive_expire; /* Time for positive callout cache records to expire */
389extern int callout_cache_negative_expire; /* Time for negative callout cache records to expire */
390extern uschar *callout_random_local_part; /* Local part to be used to check if server called will accept any local part */
391extern uschar *check_dns_names_pattern;/* Regex for syntax check */
392extern int check_log_inodes; /* Minimum for message acceptance */
393extern int_eximarith_t check_log_space; /* Minimum for message acceptance */
394extern BOOL check_rfc2047_length; /* Check RFC 2047 encoded string length */
395extern int check_spool_inodes; /* Minimum for message acceptance */
396extern int_eximarith_t check_spool_space; /* Minimum for message acceptance */
397extern uschar *chunking_advertise_hosts; /* RFC 3030 CHUNKING */
398extern unsigned chunking_datasize;
399extern unsigned chunking_data_left;
400extern chunking_state_t chunking_state;
401extern uschar *client_authenticator; /* Authenticator name used for smtp delivery */
402extern uschar *client_authenticated_id; /* "login" name used for SMTP AUTH */
403extern uschar *client_authenticated_sender; /* AUTH option to SMTP MAIL FROM (not yet used) */
404extern int clmacro_count; /* Number of command line macros */
405extern uschar *clmacros[]; /* Copy of them, for re-exec */
406extern BOOL commandline_checks_require_admin; /* belt and braces for insecure setups */
407extern int connection_max_messages;/* Max down one SMTP connection */
408extern FILE *config_file; /* Configuration file */
409extern const uschar *config_filename; /* Configuration file name */
410extern gid_t config_gid; /* Additional group owner */
411extern int config_lineno; /* Line number */
412extern uschar *config_main_filelist; /* List of possible config files */
413extern uschar *config_main_filename; /* File name actually used */
414extern uschar *config_main_directory; /* Directory where the main config file was found */
415extern uid_t config_uid; /* Additional owner */
416extern uschar *continue_proxy_cipher; /* TLS cipher for proxied continued delivery */
417extern uschar *continue_hostname; /* Host for continued delivery */
418extern uschar *continue_host_address; /* IP address for ditto */
419extern int continue_sequence; /* Sequence num for continued delivery */
420extern uschar *continue_transport; /* Transport for continued delivery */
421
422extern uschar *csa_status; /* Client SMTP Authorization result */
423
424typedef struct {
425 unsigned callout_hold_only:1; /* Conn is only for verify callout */
426 unsigned delivery:1; /* When to attempt */
427 unsigned defer_pass:1; /* Pass 4xx to caller rather than spooling */
428 unsigned is_tls:1; /* Conn has TLS active */
429 client_conn_ctx cctx; /* Open connection */
430 int nrcpt; /* Count of addresses */
431 uschar * transport; /* Name of transport */
432 uschar * interface; /* (address of) */
433 uschar * snd_ip; /* sending_ip_address */
434 int snd_port; /* sending_port */
435 unsigned peer_options; /* smtp_peer_options */
436 host_item host; /* Host used */
437 address_item addr; /* (Chain of) addresses */
438} cut_t;
439extern cut_t cutthrough; /* Deliver-concurrently */
440
441extern uschar *daemon_smtp_port; /* Can be a list of ports */
442extern int daemon_startup_retries; /* Number of times to retry */
443extern int daemon_startup_sleep; /* Sleep between retries */
444
445#ifdef EXPERIMENTAL_DCC
446extern BOOL dcc_direct_add_header; /* directly add header */
447extern uschar *dcc_header; /* dcc header */
448extern uschar *dcc_result; /* dcc result */
449extern uschar *dccifd_address; /* address of the dccifd daemon */
450extern uschar *dccifd_options; /* options for the dccifd daemon */
451#endif
452
453extern int debug_fd; /* The fd for debug_file */
454extern FILE *debug_file; /* Where to write debugging info */
455extern int debug_notall[]; /* Debug options excluded from +all */
456extern bit_table debug_options[]; /* Table of debug options */
457extern int debug_options_count; /* Size of table */
458extern BOOL debug_store; /* Do extra checks on store_reset */
459extern int delay_warning[]; /* Times between warnings */
460extern uschar *delay_warning_condition; /* Condition string for warnings */
461extern BOOL delivery_date_remove; /* Remove delivery-date headers */
462
463extern uschar *deliver_address_data; /* Arbitrary data for an address */
464extern int deliver_datafile; /* FD for data part of message */
465extern const uschar *deliver_domain; /* The local domain for delivery */
466extern uschar *deliver_domain_data; /* From domain lookup */
467extern const uschar *deliver_domain_orig; /* The original local domain for delivery */
468extern const uschar *deliver_domain_parent; /* The parent domain for delivery */
469extern BOOL deliver_drop_privilege; /* TRUE for unprivileged delivery */
470extern time_t deliver_frozen_at; /* Time of freezing */
471extern uschar *deliver_home; /* Home directory for pipes */
472extern const uschar *deliver_host; /* (First) host for routed local deliveries */
473 /* Remote host for filter */
474extern const uschar *deliver_host_address; /* Address for remote delivery filter */
475extern int deliver_host_port; /* Address for remote delivery filter */
476extern uschar *deliver_in_buffer; /* Buffer for copying file */
477extern ino_t deliver_inode; /* Inode for appendfile */
478extern uschar *deliver_localpart; /* The local part for delivery */
479extern uschar *deliver_localpart_data; /* From local part lookup */
480extern uschar *deliver_localpart_orig; /* The original local part for delivery */
481extern uschar *deliver_localpart_parent; /* The parent local part for delivery */
482extern uschar *deliver_localpart_prefix; /* The stripped prefix, if any */
483extern uschar *deliver_localpart_suffix; /* The stripped suffix, if any */
484extern uschar *deliver_out_buffer; /* Buffer for copying file */
485extern int deliver_queue_load_max; /* Different value for queue running */
486extern address_item *deliver_recipients; /* Current set of addresses */
487extern uschar *deliver_selectstring; /* For selecting by recipient */
488extern uschar *deliver_selectstring_sender; /* For selecting by sender */
489#ifdef ENABLE_DISABLE_FSYNC
490extern BOOL disable_fsync; /* Not for normal use */
491#endif
492extern BOOL disable_ipv6; /* Don't do any IPv6 things */
493
494#ifndef DISABLE_DKIM
495extern unsigned dkim_collect_input; /* Runtime count of dkim signtures; tracks whether SMTP input is fed to DKIM validation */
496extern uschar *dkim_cur_signer; /* Expansion variable, holds the current "signer" domain or identity during a acl_smtp_dkim run */
497extern int dkim_key_length; /* Expansion variable, length of signing key in bits */
498extern void *dkim_signatures; /* Actually a (pdkim_signature *) but most files do not need to know */
499extern uschar *dkim_signers; /* Expansion variable, holds colon-separated list of domains and identities that have signed a message */
500extern uschar *dkim_signing_domain; /* Expansion variable, domain used for signing a message. */
501extern uschar *dkim_signing_selector; /* Expansion variable, selector used for signing a message. */
502extern uschar *dkim_verify_overall; /* First successful domain verified, or null */
503extern uschar *dkim_verify_signers; /* Colon-separated list of domains for each of which we call the DKIM ACL */
504extern uschar *dkim_verify_status; /* result for this signature */
505extern uschar *dkim_verify_reason; /* result for this signature */
506#endif
507#ifdef EXPERIMENTAL_DMARC
508extern uschar *dmarc_domain_policy; /* Expansion for declared policy of used domain */
509extern uschar *dmarc_forensic_sender; /* Set sender address for forensic reports */
510extern uschar *dmarc_history_file; /* Expansion variable, file to store dmarc results */
511extern uschar *dmarc_status; /* Expansion variable, one word value */
512extern uschar *dmarc_status_text; /* Expansion variable, human readable value */
513extern uschar *dmarc_tld_file; /* Mozilla TLDs text file */
514extern uschar *dmarc_used_domain; /* Expansion variable, domain libopendmarc chose for DMARC policy lookup */
515#endif
516
517extern uschar *dns_again_means_nonexist; /* Domains that are badly set up */
518extern int dns_csa_search_limit; /* How deep to search for CSA SRV records */
519extern BOOL dns_csa_use_reverse; /* Check CSA in reverse DNS? (non-standard) */
520extern int dns_cname_loops; /* Follow CNAMEs returned by resolver to this depth */
521extern uschar *dns_ipv4_lookup; /* For these domains, don't look for AAAA (or A6) */
522#ifdef SUPPORT_DANE
523extern int dns_dane_ok; /* Ok to use DANE when checking TLS authenticity */
524#endif
525extern int dns_retrans; /* Retransmission time setting */
526extern int dns_retry; /* Number of retries */
527extern int dns_dnssec_ok; /* When constructing DNS query, set DO flag */
528extern uschar *dns_trust_aa; /* DNSSEC trust AA as AD */
529extern int dns_use_edns0; /* Coerce EDNS0 support on/off in resolver. */
530extern uschar *dnslist_domain; /* DNS (black) list domain */
531extern uschar *dnslist_matched; /* DNS (black) list matched key */
532extern uschar *dnslist_text; /* DNS (black) list text message */
533extern uschar *dnslist_value; /* DNS (black) list IP address */
534extern tree_node *domainlist_anchor; /* Tree of defined domain lists */
535extern int domainlist_count; /* Number defined */
536
537/* This option is now a no-opt, retained for compatibility */
538extern BOOL drop_cr; /* For broken local MUAs */
539
540extern uschar *dsn_from; /* From: string for DSNs */
541
542extern BOOL envelope_to_remove; /* Remove envelope_to_headers */
543extern int errno_quota; /* Quota errno in this OS */
544extern int error_handling; /* Error handling style */
545extern uschar *errors_copy; /* For taking copies of errors */
546extern uschar *errors_reply_to; /* Reply-to for error messages */
547extern int errors_sender_rc; /* Return after message to sender*/
548
549#ifndef DISABLE_EVENT
550extern uschar *event_action; /* expansion for delivery events */
551extern uschar *event_data; /* event data */
552extern int event_defer_errno; /* error number set when a remote delivery is deferred with a host error */
553extern const uschar *event_name; /* event classification */
554#endif
555
556extern gid_t exim_gid; /* To be used with exim_uid */
557extern BOOL exim_gid_set; /* TRUE if exim_gid set */
558extern uschar *exim_path; /* Path to exec exim */
559extern const uschar *exim_sieve_extension_list[]; /* list of sieve extensions */
560extern uid_t exim_uid; /* Non-root uid for exim */
561extern BOOL exim_uid_set; /* TRUE if exim_uid set */
562extern int expand_level; /* Nesting depth; indent for debug */
563extern int expand_forbid; /* RDO flags for forbidding things */
564extern int expand_nlength[]; /* Lengths of numbered strings */
565extern int expand_nmax; /* Max numerical value */
566extern uschar *expand_nstring[]; /* Numbered strings */
567extern BOOL extract_addresses_remove_arguments; /* Controls -t behaviour */
568extern uschar *extra_local_interfaces; /* Local, non-listen interfaces */
569
570extern int fake_response; /* Fake FAIL or DEFER response to data */
571extern uschar *fake_response_text; /* User defined message for the above. Default is in globals.c. */
572extern int filter_n[FILTER_VARIABLE_COUNT]; /* filter variables */
573extern int filter_sn[FILTER_VARIABLE_COUNT]; /* variables set by system filter */
574extern int filter_test; /* Filter test type */
575extern uschar *filter_test_sfile; /* System filter test file */
576extern uschar *filter_test_ufile; /* User filter test file */
577extern uschar *filter_thisaddress; /* For address looping */
578extern int finduser_retries; /* Retry count for getpwnam() */
579extern uid_t fixed_never_users[]; /* Can't be overridden */
580extern uschar *freeze_tell; /* Message on (some) freezings */
581extern uschar *freeze_tell_config; /* The configured setting */
582extern uschar *fudged_queue_times; /* For use in test harness */
583
584extern uschar *gecos_name; /* To be expanded when pattern matches */
585extern uschar *gecos_pattern; /* Pattern to match */
586extern rewrite_rule *global_rewrite_rules; /* Chain of rewriting rules */
587
588extern volatile sig_atomic_t had_command_timeout; /* Alarm sighandler called */
589extern volatile sig_atomic_t had_command_sigterm; /* TERM sighandler called */
590extern volatile sig_atomic_t had_data_timeout; /* Alarm sighandler called */
591extern volatile sig_atomic_t had_data_sigint; /* TERM/INT sighandler called */
592extern int header_insert_maxlen; /* Max for inserting headers */
593extern int header_maxsize; /* Max total length for header */
594extern int header_line_maxsize; /* Max for an individual line */
595extern header_name header_names[]; /* Table of header names */
596extern int header_names_size; /* Number of entries */
597extern uschar *helo_accept_junk_hosts; /* Allowed to use junk arg */
598extern uschar *helo_allow_chars; /* Rogue chars to allow in HELO/EHLO */
599extern uschar *helo_lookup_domains; /* If these given, lookup host name */
600extern uschar *helo_try_verify_hosts; /* Soft check HELO argument for these */
601extern uschar *helo_verify_hosts; /* Hard check HELO argument for these */
602extern const uschar *hex_digits; /* Used in several places */
603extern uschar *hold_domains; /* Hold up deliveries to these */
604extern uschar *host_data; /* Obtained from lookup in ACL */
605extern uschar *host_lookup; /* For which IP addresses are always looked up */
606extern BOOL host_lookup_deferred; /* TRUE if lookup deferred */
607extern BOOL host_lookup_failed; /* TRUE if lookup failed */
608extern uschar *host_lookup_order; /* Order of host lookup types */
609extern uschar *host_lookup_msg; /* Text for why it failed */
610extern int host_number; /* For sharing spools */
611extern uschar *host_number_string; /* For expanding */
612extern uschar *host_reject_connection; /* Reject these hosts */
613extern tree_node *hostlist_anchor; /* Tree of defined host lists */
614extern int hostlist_count; /* Number defined */
615extern uschar *hosts_connection_nolog; /* Limits the logging option */
616extern uschar *hosts_treat_as_local; /* For routing */
617
618extern int ignore_bounce_errors_after; /* Keep them for this time. */
619extern BOOL ignore_fromline_local; /* Local SMTP ignore fromline */
620extern uschar *ignore_fromline_hosts; /* Hosts permitted to send "From " */
621extern int inetd_wait_timeout; /* Timeout for inetd wait mode */
622extern uschar *initial_cwd; /* The directory we where in at startup */
623extern uschar *iterate_item; /* Item from iterate list */
624
625extern int journal_fd; /* Fd for journal file */
626
627extern uschar *keep_environment; /* Whitelist for environment variables */
628extern int keep_malformed; /* Time to keep malformed messages */
629
630extern uschar *eldap_dn; /* Where LDAP DNs are left */
631extern int load_average; /* Most recently read load average */
632extern BOOL local_from_check; /* For adding Sender: (global value) */
633extern uschar *local_from_prefix; /* Permitted prefixes */
634extern uschar *local_from_suffix; /* Permitted suffixes */
635extern uschar *local_interfaces; /* For forcing specific interfaces */
636#ifdef HAVE_LOCAL_SCAN
637extern uschar *local_scan_data; /* Text returned by local_scan() */
638extern optionlist local_scan_options[];/* Option list for local_scan() */
639extern int local_scan_options_count; /* Size of the list */
640extern int local_scan_timeout; /* Timeout for local_scan() */
641#endif
642extern BOOL local_sender_retain; /* Retain Sender: (with no From: check) */
643extern gid_t local_user_gid; /* As it says; may be set in routers */
644extern uid_t local_user_uid; /* As it says; may be set in routers */
645extern tree_node *localpartlist_anchor;/* Tree of defined localpart lists */
646extern int localpartlist_count; /* Number defined */
647extern uschar *log_buffer; /* For constructing log entries */
648extern int log_default[]; /* Initialization list for log_selector */
649extern uschar *log_file_path; /* If unset, use default */
650extern int log_notall[]; /* Log options excluded from +all */
651extern bit_table log_options[]; /* Table of options */
652extern int log_options_count; /* Size of table */
653extern int log_reject_target; /* Target log for ACL rejections */
654extern unsigned int log_selector[]; /* Bit map of logging options */
655extern uschar *log_selector_string; /* As supplied in the config */
656extern FILE *log_stderr; /* Copy of stderr for log use, or NULL */
657extern BOOL log_timezone; /* TRUE to include the timezone in log lines */
658extern uschar *login_sender_address; /* The actual sender address */
659extern lookup_info **lookup_list; /* Array of pointers to available lookups */
660extern int lookup_list_count; /* Number of entries in the list */
661extern uschar *lookup_dnssec_authenticated; /* AD status of dns lookup */
662extern int lookup_open_max; /* Max lookup files to cache */
663extern uschar *lookup_value; /* Value looked up from file */
664
665extern macro_item *macros; /* Configuration macros */
666extern macro_item *macros_user; /* Non-builtin configuration macros */
667extern macro_item *mlast; /* Last item in macro list */
668extern uschar *mailstore_basename; /* For mailstore deliveries */
669#ifdef WITH_CONTENT_SCAN
670extern uschar *malware_name; /* Name of virus or malware ("W32/Klez-H") */
671#endif
672extern int max_received_linelength;/* What it says */
673extern int max_username_length; /* For systems with broken getpwnam() */
674extern int message_age; /* In seconds */
675extern uschar *message_body; /* Start of message body for filter */
676extern uschar *message_body_end; /* End of message body for filter */
677extern BOOL message_body_newlines; /* FALSE => remove newlines */
678extern int message_body_size; /* Sic */
679extern int message_body_visible; /* Amount visible in message_body */
680extern int message_ended; /* State of message reading and how ended */
681extern uschar *message_headers; /* When built */
682extern uschar message_id_option[]; /* -E<message-id> for use as option */
683extern uschar *message_id_external; /* External form of following */
684extern uschar *message_id_domain; /* Expanded to form domain-part of message_id */
685extern uschar *message_id_text; /* Expanded to form message_id */
686extern struct timeval message_id_tv; /* Time used to create last message_id */
687extern int message_linecount; /* As it says */
688extern BOOL message_logs; /* TRUE to write message logs */
689extern int message_size; /* Size of message */
690extern uschar *message_size_limit; /* As it says */
691#ifdef SUPPORT_I18N
692extern BOOL message_smtputf8; /* Internationalized mail handling */
693extern int message_utf8_downconvert; /* convert from utf8 */
694const extern pcre *regex_UTF8; /* For recognizing SMTPUTF8 settings */
695#endif
696extern uschar message_subdir[]; /* Subdirectory for messages */
697extern uschar *message_reference; /* Reference for error messages */
698
699/* MIME ACL expandables */
700#ifdef WITH_CONTENT_SCAN
701extern int mime_anomaly_level;
702extern const uschar *mime_anomaly_text;
703extern uschar *mime_boundary;
704extern uschar *mime_charset;
705extern uschar *mime_content_description;
706extern uschar *mime_content_disposition;
707extern uschar *mime_content_id;
708extern unsigned int mime_content_size;
709extern uschar *mime_content_transfer_encoding;
710extern uschar *mime_content_type;
711extern uschar *mime_decoded_filename;
712extern uschar *mime_filename;
713extern int mime_is_multipart;
714extern int mime_is_coverletter;
715extern int mime_is_rfc822;
716extern int mime_part_count;
717#endif
718
719extern BOOL mua_wrapper; /* TRUE when Exim is wrapping an MUA */
720
721extern uid_t *never_users; /* List of uids never to be used */
722#ifdef WITH_CONTENT_SCAN
723#endif
724
725extern const int on; /* For setsockopt */
726extern const int off;
727
728extern optionlist optionlist_auths[]; /* These option lists are made */
729extern int optionlist_auths_size; /* global so that readconf can */
730extern optionlist optionlist_routers[]; /* see them for printing out */
731extern int optionlist_routers_size; /* the options. */
732extern optionlist optionlist_transports[];
733extern int optionlist_transports_size;
734
735extern uid_t original_euid; /* Original effective uid */
736extern gid_t originator_gid; /* Gid of whoever wrote spool file */
737extern uschar *originator_login; /* Login of same */
738extern uschar *originator_name; /* Full name of same */
739extern uid_t originator_uid; /* Uid of ditto */
740extern uschar *override_local_interfaces; /* Value of -oX argument */
741extern uschar *override_pid_file_path; /* Value of -oP argument */
742
743extern uschar *percent_hack_domains; /* Local domains for which '% operates */
744extern uschar *pid_file_path; /* For writing daemon pids */
745#ifdef EXPERIMENTAL_PIPE_CONNECT
746extern uschar *pipe_connect_advertise_hosts; /* for banner/EHLO pipelining */
747#endif
748extern uschar *pipelining_advertise_hosts; /* As it says */
749#ifndef DISABLE_PRDR
750extern BOOL prdr_enable; /* As it says */
751extern BOOL prdr_requested; /* Connecting mail server wants PRDR */
752#endif
753extern BOOL preserve_message_logs; /* Save msglog files */
754extern uschar *primary_hostname; /* Primary name of this computer */
755extern BOOL print_topbitchars; /* Topbit chars are printing chars */
756extern uschar process_info[]; /* For SIGUSR1 output */
757extern int process_info_len;
758extern uschar *process_log_path; /* Alternate path */
759extern BOOL prod_requires_admin; /* TRUE if prodding requires admin */
760
761#if defined(SUPPORT_PROXY) || defined(SUPPORT_SOCKS)
762extern uschar *hosts_proxy; /* Hostlist which (require) use proxy protocol */
763extern uschar *proxy_external_address; /* IP of remote interface of proxy */
764extern int proxy_external_port; /* Port on remote interface of proxy */
765extern uschar *proxy_local_address; /* IP of local interface of proxy */
766extern int proxy_local_port; /* Port on local interface of proxy */
767extern BOOL proxy_session; /* TRUE if receiving mail from valid proxy */
768#endif
769
770extern uschar *prvscheck_address; /* Set during prvscheck expansion item */
771extern uschar *prvscheck_keynum; /* Set during prvscheck expansion item */
772extern uschar *prvscheck_result; /* Set during prvscheck expansion item */
773
774extern const uschar *qualify_domain_recipient; /* Domain to qualify recipients with */
775extern uschar *qualify_domain_sender; /* Domain to qualify senders with */
776extern uschar *queue_domains; /* Queue these domains */
777extern BOOL queue_list_requires_admin; /* TRUE if -bp requires admin */
778 /* immediate children */
779extern pid_t queue_run_pid; /* PID of the queue running process or 0 */
780extern int queue_run_pipe; /* Pipe for synchronizing */
781extern int queue_interval; /* Queue running interval */
782extern uschar *queue_name; /* Name of queue, if nondefault spooling */
783extern BOOL queue_only; /* TRUE to disable immediate delivery */
784extern int queue_only_load; /* Max load before auto-queue */
785extern BOOL queue_only_load_latch; /* Latch queue_only_load TRUE */
786extern uschar *queue_only_file; /* Queue if file exists/not-exists */
787extern BOOL queue_only_override; /* Allow override from command line */
788extern BOOL queue_run_in_order; /* As opposed to random */
789extern uschar *queue_run_max; /* Max queue runners */
790extern uschar *queue_smtp_domains; /* Ditto, for these domains */
791
792extern unsigned int random_seed; /* Seed for random numbers */
793extern tree_node *ratelimiters_cmd; /* Results of command ratelimit checks */
794extern tree_node *ratelimiters_conn; /* Results of connection ratelimit checks */
795extern tree_node *ratelimiters_mail; /* Results of per-mail ratelimit checks */
796extern uschar *raw_active_hostname; /* Pre-expansion */
797extern uschar *raw_sender; /* Before rewriting */
798extern uschar **raw_recipients; /* Before rewriting */
799extern int raw_recipients_count;
800extern int rcpt_count; /* Count of RCPT commands in a message */
801extern int rcpt_fail_count; /* Those that got 5xx */
802extern int rcpt_defer_count; /* Those that got 4xx */
803extern gid_t real_gid; /* Real gid */
804extern uid_t real_uid; /* Real user running program */
805extern int receive_linecount; /* Mainly for BSMTP errors */
806extern int receive_messagecount; /* Mainly for BSMTP errors */
807extern int receive_timeout; /* For non-SMTP acceptance */
808extern int received_count; /* Count of Received: headers */
809extern uschar *received_for; /* For "for" field */
810extern uschar *received_header_text; /* Definition of Received: header */
811extern int received_headers_max; /* Max count of Received: headers */
812extern struct timeval received_time; /* Time the message was received */
813extern struct timeval received_time_taken; /* Interval the message took to be received */
814extern uschar *recipient_data; /* lookup data for recipients */
815extern uschar *recipient_unqualified_hosts; /* Permitted unqualified recipients */
816extern uschar *recipient_verify_failure; /* What went wrong */
817extern int recipients_list_max; /* Maximum number fitting in list */
818extern int recipients_max; /* Max permitted */
819extern BOOL recipients_max_reject; /* If TRUE, reject whole message */
820extern const pcre *regex_AUTH; /* For recognizing AUTH settings */
821extern const pcre *regex_check_dns_names; /* For DNS name checking */
822extern const pcre *regex_From; /* For recognizing "From_" lines */
823extern const pcre *regex_CHUNKING; /* For recognizing CHUNKING (RFC 3030) */
824extern const pcre *regex_IGNOREQUOTA; /* For recognizing IGNOREQUOTA (LMTP) */
825extern const pcre *regex_PIPELINING; /* For recognizing PIPELINING */
826extern const pcre *regex_SIZE; /* For recognizing SIZE settings */
827#ifdef EXPERIMENTAL_PIPE_CONNECT
828extern const pcre *regex_EARLY_PIPE; /* For recognizing PIPE_CONNCT */
829#endif
830extern const pcre *regex_ismsgid; /* Compiled r.e. for message it */
831extern const pcre *regex_smtp_code; /* For recognizing SMTP codes */
832extern uschar *regex_vars[]; /* $regexN variables */
833#ifdef WHITELIST_D_MACROS
834extern const pcre *regex_whitelisted_macro; /* For -D macro values */
835#endif
836#ifdef WITH_CONTENT_SCAN
837extern uschar *regex_match_string; /* regex that matched a line (regex ACL condition) */
838#endif
839extern int remote_delivery_count; /* Number of remote addresses */
840extern int remote_max_parallel; /* Maximum parallel delivery */
841extern uschar *remote_sort_domains; /* Remote domain sorting order */
842extern retry_config *retries; /* Chain of retry config information */
843extern int retry_data_expire; /* When to expire retry data */
844extern int retry_interval_max; /* Absolute maximum */
845extern int retry_maximum_timeout; /* The maximum timeout */
846extern uschar *return_path; /* Return path for a message */
847extern BOOL return_path_remove; /* Remove return-path headers */
848extern int rewrite_existflags; /* Indicate which headers have rewrites */
849extern uschar *rfc1413_hosts; /* RFC hosts */
850extern int rfc1413_query_timeout; /* Timeout on RFC 1413 calls */
851/* extern BOOL rfc821_domains; */ /* If set, syntax is 821, not 822 => being abolished */
852extern uid_t root_gid; /* The gid for root */
853extern uid_t root_uid; /* The uid for root */
854extern router_info routers_available[];/* Vector of available routers */
855extern router_instance *routers; /* Chain of instantiated routers */
856extern router_instance router_defaults;/* Default values */
857extern uschar *router_name; /* Name of router last started */
858extern ip_address_item *running_interfaces; /* Host's running interfaces */
859extern uschar *running_status; /* Flag string for testing */
860extern int runrc; /* rc from ${run} */
861
862extern uschar *search_error_message; /* Details of lookup problem */
863extern uschar *self_hostname; /* Self host after routing->directors */
864extern unsigned int sender_address_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender */
865extern uschar *sender_address_data; /* address_data from sender verify */
866extern uschar *sender_address_unrewritten; /* Set if rewritten by verify */
867extern uschar *sender_data; /* lookup result for senders */
868extern unsigned int sender_domain_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for sender domain */
869extern uschar *sender_fullhost; /* Sender host name + address */
870extern BOOL sender_helo_dnssec; /* True if HELO verify used DNS and was DNSSEC */
871extern uschar *sender_helo_name; /* Host name from HELO/EHLO */
872extern uschar **sender_host_aliases; /* Points to list of alias names */
873extern uschar *sender_host_auth_pubname; /* Public-name of authentication method */
874extern unsigned int sender_host_cache[(MAX_NAMED_LIST * 2)/32]; /* Cache bits for incoming host */
875extern BOOL sender_host_dnssec; /* true if sender_host_name verified in DNSSEC */
876extern uschar *sender_ident; /* Sender identity via RFC 1413 */
877extern uschar *sender_rate; /* Sender rate computed by ACL */
878extern uschar *sender_rate_limit; /* Configured rate limit */
879extern uschar *sender_rate_period; /* Configured smoothing period */
880extern uschar *sender_rcvhost; /* Host data for Received: */
881extern uschar *sender_unqualified_hosts; /* Permitted unqualified senders */
882extern uschar *sender_verify_failure; /* What went wrong */
883extern address_item *sender_verified_list; /* Saved chain of sender verifies */
884extern address_item *sender_verified_failed; /* The one that caused denial */
885extern uschar *sending_ip_address; /* Address of outgoing (SMTP) interface */
886extern int sending_port; /* Port of outgoing interface */
887extern SIGNAL_BOOL sigalrm_seen; /* Flag for sigalrm_handler */
888extern const uschar *sigalarm_setter; /* For debug, set to callpoint of alarm() */
889extern uschar **sighup_argv; /* Args for re-execing after SIGHUP */
890extern int slow_lookup_log; /* Log DNS lookups taking longer than N millisecs */
891extern int smtp_accept_count; /* Count of connections */
892extern BOOL smtp_accept_keepalive; /* Set keepalive on incoming */
893extern int smtp_accept_max; /* Max SMTP connections */
894extern int smtp_accept_max_nonmail;/* Max non-mail commands in one con */
895extern uschar *smtp_accept_max_nonmail_hosts; /* Limit non-mail cmds from these hosts */
896extern int smtp_accept_max_per_connection; /* Max msgs per connection */
897extern uschar *smtp_accept_max_per_host; /* Max SMTP cons from one IP addr */
898extern int smtp_accept_queue; /* Queue after so many connections */
899extern int smtp_accept_queue_per_connection; /* Queue after so many msgs */
900extern int smtp_accept_reserve; /* Reserve these SMTP connections */
901extern uschar *smtp_active_hostname; /* Hostname for this message */
902extern uschar *smtp_banner; /* Banner string (to be expanded) */
903extern BOOL smtp_check_spool_space; /* TRUE to check SMTP SIZE value */
904extern int smtp_ch_index; /* Index in smtp_connection_had */
905extern uschar *smtp_cmd_argument; /* For all SMTP commands */
906extern uschar *smtp_cmd_buffer; /* SMTP command buffer */
907extern struct timeval smtp_connection_start; /* Start time of SMTP connection */
908extern uschar smtp_connection_had[]; /* Recent SMTP commands */
909extern int smtp_connect_backlog; /* Max backlog permitted */
910extern double smtp_delay_mail; /* Current MAIL delay */
911extern double smtp_delay_rcpt; /* Current RCPT delay */
912extern BOOL smtp_enforce_sync; /* Enforce sync rules */
913extern uschar *smtp_etrn_command; /* Command to run */
914extern BOOL smtp_etrn_serialize; /* Only one at once */
915extern FILE *smtp_in; /* Incoming SMTP input file */
916extern int smtp_load_reserve; /* Only from reserved if load > this */
917extern int smtp_mailcmd_count; /* Count of MAIL commands */
918extern int smtp_max_synprot_errors;/* Max syntax/protocol errors */
919extern int smtp_max_unknown_commands; /* As it says */
920extern uschar *smtp_notquit_reason; /* Global for disconnect reason */
921extern FILE *smtp_out; /* Incoming SMTP output file */
922extern uschar *smtp_ratelimit_hosts; /* Rate limit these hosts */
923extern uschar *smtp_ratelimit_mail; /* Parameters for MAIL limiting */
924extern uschar *smtp_ratelimit_rcpt; /* Parameters for RCPT limiting */
925extern uschar *smtp_read_error; /* Message for SMTP input error */
926extern int smtp_receive_timeout; /* Applies to each received line */
927extern uschar *smtp_receive_timeout_s; /* ... expandable version */
928extern uschar *smtp_reserve_hosts; /* Hosts for reserved slots */
929extern BOOL smtp_return_error_details; /* TRUE to return full info */
930extern int smtp_rlm_base; /* Base interval for MAIL rate limit */
931extern double smtp_rlm_factor; /* Factor for MAIL rate limit */
932extern int smtp_rlm_limit; /* Max delay */
933extern int smtp_rlm_threshold; /* Threshold for RCPT rate limit */
934extern int smtp_rlr_base; /* Base interval for RCPT rate limit */
935extern double smtp_rlr_factor; /* Factor for RCPT rate limit */
936extern int smtp_rlr_limit; /* Max delay */
937extern int smtp_rlr_threshold; /* Threshold for RCPT rate limit */
938extern unsigned smtp_peer_options; /* Global flags for passed connections */
939extern unsigned smtp_peer_options_wrap; /* stacked version hidden by TLS */
940#ifdef SUPPORT_I18N
941extern uschar *smtputf8_advertise_hosts; /* ingress control */
942#endif
943
944#ifdef WITH_CONTENT_SCAN
945extern uschar *spamd_address; /* address for the spamassassin daemon */
946extern uschar *spam_bar; /* the spam "bar" (textual representation of spam_score) */
947extern uschar *spam_report; /* the spamd report (multiline) */
948extern uschar *spam_action; /* the spamd recommended-action */
949extern uschar *spam_score; /* the spam score (float) */
950extern uschar *spam_score_int; /* spam_score * 10 (int) */
951#endif
952#ifdef SUPPORT_SPF
953extern uschar *spf_guess; /* spf best-guess record */
954extern uschar *spf_header_comment; /* spf header comment */
955extern uschar *spf_received; /* Received-SPF: header */
956extern uschar *spf_result; /* spf result in string form */
957extern BOOL spf_result_guessed; /* spf result is of best-guess operation */
958extern uschar *spf_smtp_comment; /* spf comment to include in SMTP reply */
959#endif
960extern BOOL split_spool_directory; /* TRUE to use multiple subdirs */
961extern FILE *spool_data_file; /* handle for -D file */
962extern uschar *spool_directory; /* Name of spool directory */
963extern BOOL spool_wireformat; /* can write wireformat -D files */
964#ifdef EXPERIMENTAL_SRS
965extern uschar *srs_config; /* SRS config secret:max age:hash length:use timestamp:use hash */
966extern uschar *srs_db_address; /* SRS db address */
967extern uschar *srs_db_key; /* SRS db key */
968extern int srs_hashlength; /* SRS hash length */
969extern int srs_hashmin; /* SRS minimum hash length */
970extern int srs_maxage; /* SRS max age */
971extern uschar *srs_orig_sender; /* SRS original sender */
972extern uschar *srs_orig_recipient; /* SRS original recipient */
973extern uschar *srs_recipient; /* SRS recipient */
974extern uschar *srs_secrets; /* SRS secrets list */
975extern uschar *srs_status; /* SRS staus */
976extern BOOL srs_usehash; /* SRS use hash flag */
977extern BOOL srs_usetimestamp; /* SRS use timestamp flag */
978#endif
979extern BOOL strict_acl_vars; /* ACL variables have to be set before being used */
980extern int string_datestamp_offset;/* After insertion by string_format */
981extern int string_datestamp_length;/* After insertion by string_format */
982extern int string_datestamp_type; /* After insertion by string_format */
983extern BOOL strip_excess_angle_brackets; /* Surrounding route-addrs */
984extern BOOL strip_trailing_dot; /* Remove dots at ends of domains */
985extern uschar *submission_domain; /* Domain for submission mode */
986extern uschar *submission_name; /* User name set from ACL */
987extern BOOL syslog_duplication; /* FALSE => no duplicate logging */
988extern int syslog_facility; /* As defined by Syslog.h */
989extern BOOL syslog_pid; /* TRUE if PID on syslogs */
990extern uschar *syslog_processname; /* 'ident' param to openlog() */
991extern BOOL syslog_timestamp; /* TRUE if time on syslogs */
992extern uschar *system_filter; /* Name of system filter file */
993
994extern uschar *system_filter_directory_transport; /* Transports for the */
995extern uschar *system_filter_file_transport; /* system filter */
996extern uschar *system_filter_pipe_transport;
997extern uschar *system_filter_reply_transport;
998
999extern gid_t system_filter_gid; /* Gid for running system filter */
1000extern BOOL system_filter_gid_set; /* TRUE if gid set */
1001extern uid_t system_filter_uid; /* Uid for running system filter */
1002extern BOOL system_filter_uid_set; /* TRUE if uid set */
1003
1004extern blob tcp_fastopen_nodata; /* for zero-data TFO connect requests */
1005extern BOOL tcp_nodelay; /* Controls TCP_NODELAY on daemon */
1006extern tfo_state_t tcp_out_fastopen; /* TCP fast open */
1007#ifdef USE_TCP_WRAPPERS
1008extern uschar *tcp_wrappers_daemon_name; /* tcpwrappers daemon lookup name */
1009#endif
1010extern int test_harness_load_avg; /* For use when testing */
1011extern int thismessage_size_limit; /* Limit for this message */
1012extern int timeout_frozen_after; /* Max time to keep frozen messages */
1013
1014extern uschar *transport_name; /* Name of transport last started */
1015extern int transport_count; /* Count of bytes transported */
1016extern int transport_newlines; /* Accurate count of number of newline chars transported */
1017extern const uschar **transport_filter_argv; /* For on-the-fly filtering */
1018extern int transport_filter_timeout; /* Timeout for same */
1019
1020extern transport_info transports_available[]; /* Vector of available transports */
1021extern transport_instance *transports; /* Chain of instantiated transports */
1022extern transport_instance transport_defaults; /* Default values */
1023
1024extern int transport_write_timeout;/* Set to time out individual writes */
1025
1026extern tree_node *tree_dns_fails; /* Tree of DNS lookup failures */
1027extern tree_node *tree_duplicates; /* Tree of duplicate addresses */
1028extern tree_node *tree_nonrecipients; /* Tree of nonrecipient addresses */
1029extern tree_node *tree_unusable; /* Tree of unusable addresses */
1030
1031extern gid_t *trusted_groups; /* List of trusted groups */
1032extern uid_t *trusted_users; /* List of trusted users */
1033extern uschar *timezone_string; /* Required timezone setting */
1034
1035extern uschar *unknown_login; /* To use when login id unknown */
1036extern uschar *unknown_username; /* Ditto */
1037extern uschar *untrusted_set_sender; /* Let untrusted users set these senders */
1038extern uschar *uucp_from_pattern; /* For recognizing "From " lines */
1039extern uschar *uucp_from_sender; /* For building the sender */
1040
1041extern uschar *warn_message_file; /* Template for warning messages */
1042extern uschar *warnmsg_delay; /* String form of delay time */
1043extern uschar *warnmsg_recipients; /* Recipients of warning message */
1044extern BOOL write_rejectlog; /* Control of reject logging */
1045
1046extern uschar *verify_mode; /* Running a router in verify mode */
1047extern uschar *version_copyright; /* Copyright notice */
1048extern uschar *version_date; /* Date of compilation */
1049extern uschar *version_cnumber; /* Compile number */
1050extern uschar *version_string; /* Version string */
1051
1052extern int warning_count; /* Delay warnings sent for this msg */
1053
1054/* End of globals.h */