str_append(str, "\tfinal-resp-ok");
if ((info->flags & AUTH_REQUEST_FLAG_CONN_SECURED) != 0) {
str_append(str, "\tsecured");
- if ((info->flags & AUTH_REQUEST_FLAG_TRANSPORT_SECURITY_TLS) != 0) {
+ if ((info->flags & AUTH_REQUEST_FLAG_CONN_SECURED_TLS) != 0) {
str_append(str, "=tls");
event_add_str(request->event, "transport", "TLS");
} else {
event_add_str(request->event, "transport", "trusted");
}
} else {
- i_assert((info->flags & AUTH_REQUEST_FLAG_TRANSPORT_SECURITY_TLS) == 0);
+ i_assert((info->flags & AUTH_REQUEST_FLAG_CONN_SECURED_TLS) == 0);
event_add_str(request->event, "transport", "insecure");
}
if ((info->flags & AUTH_REQUEST_FLAG_NO_PENALTY) != 0)
AUTH_REQUEST_FLAG_SUPPORT_FINAL_RESP = 0x08,
/* Enable auth_debug=yes logging for this request */
AUTH_REQUEST_FLAG_DEBUG = 0x10,
- /* If TLS was used */
- AUTH_REQUEST_FLAG_TRANSPORT_SECURITY_TLS = 0x20,
+ /* Connection from the previous hop is secured by TLS. */
+ AUTH_REQUEST_FLAG_CONN_SECURED_TLS = 0x20,
};
enum auth_request_status {
ssl_iostream_has_valid_client_cert(client->ssl_iostream))
auth_flags |= AUTH_REQUEST_FLAG_VALID_CLIENT_CERT;
if (client->connection_tls_secured || client->haproxy_terminated_tls)
- auth_flags |= AUTH_REQUEST_FLAG_TRANSPORT_SECURITY_TLS;
+ auth_flags |= AUTH_REQUEST_FLAG_CONN_SECURED_TLS;
if (client->connection_secured)
auth_flags |= AUTH_REQUEST_FLAG_CONN_SECURED;
if (login_binary->sasl_support_final_reply)