input.username = username;
input.userdb_fields = extra_fields;
input.session_id = request->session_id;
- if ((flags & LOGIN_REQUEST_FLAG_CONN_SSL_SECURED) != 0)
- input.conn_ssl_secured = TRUE;
+ if ((flags & LOGIN_REQUEST_FLAG_END_CLIENT_SECURED_TLS) != 0)
+ input.end_client_tls_secured = TRUE;
client_parse_imap_login_request(request->data,
request->auth_req.data_size,
enum login_request_flags {
/* Connection has TLS compression enabled */
LOGIN_REQUEST_FLAG_TLS_COMPRESSION = BIT(0),
- /* Connection is secured using SSL specifically */
- LOGIN_REQUEST_FLAG_CONN_SSL_SECURED = BIT(2),
+ /* The end client connection (not just the previous hop proxy
+ connection) is using TLS. */
+ LOGIN_REQUEST_FLAG_END_CLIENT_SECURED_TLS = BIT(2),
/* This login is implicit; no command reply is expected */
LOGIN_REQUEST_FLAG_IMPLICIT = BIT(3),
};
login_req.local_port = 143;
(void)net_addr2ip("10.0.0.211", &login_req.remote_ip);
login_req.remote_port = 45546;
- login_req.flags = LOGIN_REQUEST_FLAG_CONN_SSL_SECURED;
+ login_req.flags = LOGIN_REQUEST_FLAG_END_CLIENT_SECURED_TLS;
ioloop = io_loop_create();
conn_data.remote_ip = &user->input.remote_ip;
conn_data.local_port = user->input.local_port;
conn_data.remote_port = user->input.remote_port;
- conn_data.ssl_secured = user->input.conn_ssl_secured;
+ conn_data.ssl_secured = user->input.end_client_tls_secured;
/* NOTE: if more user initialization is added, add it also to
mail_user_dup() */
bool no_userdb_lookup:1;
/* Enable auth_debug=yes for this lookup */
bool debug:1;
- /* Connection is secured using SSL specifically */
- bool conn_ssl_secured:1;
+ /* The end client connection (not just the previous hop proxy
+ connection) is using TLS. */
+ bool end_client_tls_secured:1;
};
extern struct module *mail_storage_service_modules;
input.remote_ip = client->remote_ip;
input.local_port = client->local_port;
input.remote_port = client->remote_port;
- input.conn_ssl_secured = ssl;
+ input.end_client_tls_secured = ssl;
input.username = "";
if (mail_storage_service_read_settings(storage_service, &input,
input.local_port = client->local_port;
input.remote_port = client->remote_port;
input.session_id = lrcpt->session_id;
- input.conn_ssl_secured =
+ input.end_client_tls_secured =
client->end_client_tls_secured_set ?
client->end_client_tls_secured :
smtp_server_connection_is_ssl_secured(client->conn);
ssl_iostream_get_compression(client->ssl_iostream) != NULL)
req.flags |= LOGIN_REQUEST_FLAG_TLS_COMPRESSION;
if (client->end_client_tls_secured)
- req.flags |= LOGIN_REQUEST_FLAG_CONN_SSL_SECURED;
+ req.flags |= LOGIN_REQUEST_FLAG_END_CLIENT_SECURED_TLS;
if (HAS_ALL_BITS(client->auth_flags, SASL_SERVER_AUTH_FLAG_IMPLICIT))
req.flags |= LOGIN_REQUEST_FLAG_IMPLICIT;
memcpy(req.cookie, anvil_request->cookie, sizeof(req.cookie));
input.username = username;
input.userdb_fields = extra_fields;
input.session_id = login_client->session_id;
- if ((flags & LOGIN_REQUEST_FLAG_CONN_SSL_SECURED) != 0)
- input.conn_ssl_secured = TRUE;
+ if ((flags & LOGIN_REQUEST_FLAG_END_CLIENT_SECURED_TLS) != 0)
+ input.end_client_tls_secured = TRUE;
buffer_create_from_const_data(&input_buf, login_client->data,
login_client->auth_req.data_size);
input.username = username;
input.userdb_fields = extra_fields;
input.session_id = request->session_id;
- if ((flags & LOGIN_REQUEST_FLAG_CONN_SSL_SECURED) != 0)
- input.conn_ssl_secured = TRUE;
+ if ((flags & LOGIN_REQUEST_FLAG_END_CLIENT_SECURED_TLS) != 0)
+ input.end_client_tls_secured = TRUE;
buffer_create_from_const_data(&input_buf, request->data,
request->auth_req.data_size);