/* Client is required to send CAPABILITY after STARTTLS, so the
capability resp-code workaround checks only pre-STARTTLS
CAPABILITY commands. */
- if (!client->starttls)
+ if (!client->connection_used_starttls)
imap_client->client_ignores_capability_resp_code = TRUE;
client_send_raw(client, t_strconcat(
"* CAPABILITY ", get_capability(client), "\r\n", NULL));
client->connection_secured = TRUE;
client->end_client_tls_secured = TRUE;
- if (client->starttls) {
+ if (client->connection_used_starttls) {
io_remove(&client->io);
if (!client_does_custom_io(client)) {
client->io = io_add_istream(client->input,
static void client_start_tls(struct client *client)
{
- client->starttls = TRUE;
+ client->connection_used_starttls = TRUE;
if (client_init_ssl(client) < 0) {
client_notify_disconnect(client,
CLIENT_DISCONNECT_INTERNAL_ERROR,
bool input_blocked:1;
bool login_success:1;
bool no_extra_disconnect_reason:1;
- bool starttls:1;
/* Client/proxy connection is using TLS. Dovecot has terminated the
TLS connection (not haproxy). */
bool connection_tls_secured:1;
+ /* connection_tls_secured=TRUE was started via STARTTLS command. */
+ bool connection_used_starttls:1;
/* HAProxy terminated the TLS connection. */
bool haproxy_terminated_tls:1;
/* Connection from the previous hop (client, proxy, haproxy) is
struct submission_client *subm_client = conn_ctx;
struct client *client = &subm_client->common;
- client->starttls = TRUE;
+ client->connection_used_starttls = TRUE;
if (client_init_ssl(client) < 0) {
client_notify_disconnect(client,
CLIENT_DISCONNECT_INTERNAL_ERROR,