HomeSort by: relevance | last modified time | path
    Searched refs:tlsproxy (Results 1 - 12 of 12) sorted by relevancy

  /src/external/ibm-public/postfix/libexec/tlsproxy/
Makefile 7 PROG= tlsproxy
12 SRCS= tlsproxy_state.c tlsproxy.c
  /src/external/ibm-public/postfix/libexec/
Makefile 9 SUBDIR+= postscreen tlsmgr tlsproxy
  /src/external/ibm-public/postfix/man/man8/
Makefile 14 MAN+= postscreen.8 tlsmgr.8 tlsproxy.8
  /src/external/ibm-public/postfix/dist/src/smtpd/
smtpd_state.c 151 state->tlsproxy = 0;
240 if (state->tlsproxy) /* still open after longjmp */
241 vstream_fclose(state->tlsproxy);
smtpd.h 178 VSTREAM *tlsproxy; /* tlsproxy(8) temp. handle */ member in struct:__anon23176
smtpd.c 5205 * This is non-production code, for tlsproxy(8) load testing only. It
5209 * To insert tlsproxy(8) between this process and the SMTP client, we swap
5210 * the file descriptors between the state->tlsproxy and state->client
5214 * As we implement tlsproxy support in the Postfix SMTP client we should
5218 vstream_control(state->tlsproxy, CA_VSTREAM_CTL_DOUBLE, CA_VSTREAM_CTL_END);
5219 vstream_control(state->client, CA_VSTREAM_CTL_SWAP_FD(state->tlsproxy),
5221 (void) vstream_fclose(state->tlsproxy); /* direct-to-client stream! */
5222 state->tlsproxy = 0;
5234 * XXX Maybe it is better to send this information to tlsproxy(8) when
5424 * Note: state->tlsproxy is left open when smtp_flush() calls longjmp()
    [all...]
  /src/external/ibm-public/postfix/dist/src/tlsproxy/
tlsproxy_state.c 9 /* #include <tlsproxy.h>
31 /* The VSTREAM between postscreen(8) and tlsproxy(8).
101 #include <tlsproxy.h>
tlsproxy.c 1 /* $NetBSD: tlsproxy.c,v 1.7 2025/02/25 19:15:51 christos Exp $ */
5 /* tlsproxy 8
436 #include <tlsproxy.h>
586 * tlsproxy(8) runs the OpenSSL code on behalf of postscreen(8), translating
591 * Like postscreen(8), one tlsproxy(8) process services multiple remote SMTP
592 * clients. Unlike postscreen(8), there can be more than one tlsproxy(8)
597 * between tlsproxy(8) and remote SMTP clients, and plaintext traffic
598 * between tlsproxy(8) and postscreen(8). Event-driven plaintext I/O is
608 * Later in the life cycle, tlsproxy(8) has also become an enabler for TLS
776 * Report TLS handshake results to the tlsproxy client
    [all...]
  /src/external/ibm-public/postfix/share/html/
Makefile 17 tlsproxy.8.html trivial-rewrite.8.html verify.8.html virtual.8.html
  /src/external/ibm-public/postfix/dist/src/posttls-finger/
posttls-finger.c 756 VSTREAM *tlsproxy; local
855 tlsproxy =
867 * To insert tlsproxy(8) between this process and the remote SMTP
868 * server, we swap the file descriptors between the tlsproxy and
873 * TODO: the tlsproxy RPCs should return more error detail than a "NO"
876 if (tlsproxy == 0) {
879 vstream_control(tlsproxy,
883 CA_VSTREAM_CTL_SWAP_FD(tlsproxy),
885 (void) vstream_fclose(tlsproxy); /* direct-to-server stream! */
898 * starts talking immediately. The tlsproxy implementation send
    [all...]
  /src/external/ibm-public/postfix/dist/src/smtp/
smtp_proto.c 888 VSTREAM *tlsproxy; local
895 * example, in tlsproxy(8). We then store the proxy file handle in the
986 * The tlsproxy(8) server enforces timeouts that are larger than
987 * those specified by the tlsproxy(8) client. These timeouts are a
988 * safety net for the case that the tlsproxy(8) client fails to
989 * enforce time limits. Normally, the tlsproxy(8) client would time
990 * out and trigger a plaintext event in the tlsproxy(8) server, and
993 * However, the tlsproxy(8) server has no insight into the SMTP
998 * tlsproxy(8) server. Unfortunately, we cannot permit plaintext
1008 tlsproxy
    [all...]
  /src/external/ibm-public/postfix/dist/mantools/
postlink 869 s/[<bB>]*tlsproxy[<\/bB>]*\(8\)/<a href="tlsproxy.8.html">$&<\/a>/g;

Completed in 88 milliseconds