diff options
author | Gilles Chehade <gilles@cvs.openbsd.org> | 2015-11-30 12:49:36 +0000 |
---|---|---|
committer | Gilles Chehade <gilles@cvs.openbsd.org> | 2015-11-30 12:49:36 +0000 |
commit | 44bafd3cd0498b45435435c61b53131c961ff884 (patch) | |
tree | 31021d25514056388c7da34b8c4596206dfb24e6 | |
parent | 8694b8525a8d34282f33caf682028ba9a7735347 (diff) |
mechanical rename of some IMSG constants
ok sunil@, ok jung@
-rw-r--r-- | usr.sbin/smtpd/lka.c | 30 | ||||
-rw-r--r-- | usr.sbin/smtpd/mta.c | 6 | ||||
-rw-r--r-- | usr.sbin/smtpd/mta_session.c | 14 | ||||
-rw-r--r-- | usr.sbin/smtpd/pony.c | 10 | ||||
-rw-r--r-- | usr.sbin/smtpd/smtp.c | 6 | ||||
-rw-r--r-- | usr.sbin/smtpd/smtp_session.c | 16 | ||||
-rw-r--r-- | usr.sbin/smtpd/smtpd.c | 18 | ||||
-rw-r--r-- | usr.sbin/smtpd/smtpd.h | 18 |
8 files changed, 59 insertions, 59 deletions
diff --git a/usr.sbin/smtpd/lka.c b/usr.sbin/smtpd/lka.c index a712e8fa4a5..9e70351e7fc 100644 --- a/usr.sbin/smtpd/lka.c +++ b/usr.sbin/smtpd/lka.c @@ -1,4 +1,4 @@ -/* $OpenBSD: lka.c,v 1.178 2015/10/14 22:01:43 gilles Exp $ */ +/* $OpenBSD: lka.c,v 1.179 2015/11/30 12:49:35 gilles Exp $ */ /* * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org> @@ -120,7 +120,7 @@ lka_imsg(struct mproc *p, struct imsg *imsg) m_close(p); return; - case IMSG_SMTP_SSL_INIT: + case IMSG_SMTP_TLS_INIT: req_ca_cert = imsg->data; resp_ca_cert.reqid = req_ca_cert->reqid; @@ -129,7 +129,7 @@ lka_imsg(struct mproc *p, struct imsg *imsg) pki = dict_get(env->sc_pki_dict, buf); if (pki == NULL) { resp_ca_cert.status = CA_FAIL; - m_compose(p, IMSG_SMTP_SSL_INIT, 0, 0, -1, &resp_ca_cert, + m_compose(p, IMSG_SMTP_TLS_INIT, 0, 0, -1, &resp_ca_cert, sizeof(resp_ca_cert)); return; } @@ -139,10 +139,10 @@ lka_imsg(struct mproc *p, struct imsg *imsg) iov[0].iov_len = sizeof(resp_ca_cert); iov[1].iov_base = pki->pki_cert; iov[1].iov_len = pki->pki_cert_len; - m_composev(p, IMSG_SMTP_SSL_INIT, 0, 0, -1, iov, nitems(iov)); + m_composev(p, IMSG_SMTP_TLS_INIT, 0, 0, -1, iov, nitems(iov)); return; - case IMSG_SMTP_SSL_VERIFY_CERT: + case IMSG_SMTP_TLS_VERIFY_CERT: req_ca_vrfy_smtp = xmemdup(imsg->data, sizeof *req_ca_vrfy_smtp, "lka:ca_vrfy"); req_ca_vrfy_smtp->cert = xmemdup((char *)imsg->data + sizeof *req_ca_vrfy_smtp, req_ca_vrfy_smtp->cert_len, "lka:ca_vrfy"); @@ -152,7 +152,7 @@ lka_imsg(struct mproc *p, struct imsg *imsg) sizeof (off_t), "lka:ca_vrfy"); return; - case IMSG_SMTP_SSL_VERIFY_CHAIN: + case IMSG_SMTP_TLS_VERIFY_CHAIN: if (req_ca_vrfy_smtp == NULL) fatalx("lka:ca_vrfy: chain without a certificate"); req_ca_vrfy_chain = imsg->data; @@ -162,7 +162,7 @@ lka_imsg(struct mproc *p, struct imsg *imsg) req_ca_vrfy_smtp->chain_offset++; return; - case IMSG_SMTP_SSL_VERIFY: + case IMSG_SMTP_TLS_VERIFY: if (req_ca_vrfy_smtp == NULL) fatalx("lka:ca_vrfy: verify without a certificate"); @@ -176,7 +176,7 @@ lka_imsg(struct mproc *p, struct imsg *imsg) else resp_ca_vrfy.status = CA_OK; - m_compose(p, IMSG_SMTP_SSL_VERIFY, 0, 0, -1, &resp_ca_vrfy, + m_compose(p, IMSG_SMTP_TLS_VERIFY, 0, 0, -1, &resp_ca_vrfy, sizeof resp_ca_vrfy); for (i = 0; i < req_ca_vrfy_smtp->n_chain; ++i) @@ -240,7 +240,7 @@ lka_imsg(struct mproc *p, struct imsg *imsg) if (p->proc == PROC_PONY) { switch (imsg->hdr.type) { - case IMSG_MTA_SSL_INIT: + case IMSG_MTA_TLS_INIT: req_ca_cert = imsg->data; resp_ca_cert.reqid = req_ca_cert->reqid; @@ -249,7 +249,7 @@ lka_imsg(struct mproc *p, struct imsg *imsg) pki = dict_get(env->sc_pki_dict, buf); if (pki == NULL) { resp_ca_cert.status = CA_FAIL; - m_compose(p, IMSG_MTA_SSL_INIT, 0, 0, -1, &resp_ca_cert, + m_compose(p, IMSG_MTA_TLS_INIT, 0, 0, -1, &resp_ca_cert, sizeof(resp_ca_cert)); return; } @@ -259,10 +259,10 @@ lka_imsg(struct mproc *p, struct imsg *imsg) iov[0].iov_len = sizeof(resp_ca_cert); iov[1].iov_base = pki->pki_cert; iov[1].iov_len = pki->pki_cert_len; - m_composev(p, IMSG_MTA_SSL_INIT, 0, 0, -1, iov, nitems(iov)); + m_composev(p, IMSG_MTA_TLS_INIT, 0, 0, -1, iov, nitems(iov)); return; - case IMSG_MTA_SSL_VERIFY_CERT: + case IMSG_MTA_TLS_VERIFY_CERT: req_ca_vrfy_mta = xmemdup(imsg->data, sizeof *req_ca_vrfy_mta, "lka:ca_vrfy"); req_ca_vrfy_mta->cert = xmemdup((char *)imsg->data + sizeof *req_ca_vrfy_mta, req_ca_vrfy_mta->cert_len, "lka:ca_vrfy"); @@ -272,7 +272,7 @@ lka_imsg(struct mproc *p, struct imsg *imsg) sizeof (off_t), "lka:ca_vrfy"); return; - case IMSG_MTA_SSL_VERIFY_CHAIN: + case IMSG_MTA_TLS_VERIFY_CHAIN: if (req_ca_vrfy_mta == NULL) fatalx("lka:ca_vrfy: verify without a certificate"); @@ -283,7 +283,7 @@ lka_imsg(struct mproc *p, struct imsg *imsg) req_ca_vrfy_mta->chain_offset++; return; - case IMSG_MTA_SSL_VERIFY: + case IMSG_MTA_TLS_VERIFY: if (req_ca_vrfy_mta == NULL) fatalx("lka:ca_vrfy: verify without a certificate"); @@ -298,7 +298,7 @@ lka_imsg(struct mproc *p, struct imsg *imsg) else resp_ca_vrfy.status = CA_OK; - m_compose(p, IMSG_MTA_SSL_VERIFY, 0, 0, -1, &resp_ca_vrfy, + m_compose(p, IMSG_MTA_TLS_VERIFY, 0, 0, -1, &resp_ca_vrfy, sizeof resp_ca_vrfy); for (i = 0; i < req_ca_vrfy_mta->n_chain; ++i) diff --git a/usr.sbin/smtpd/mta.c b/usr.sbin/smtpd/mta.c index 538c8c63fb2..2bed1437527 100644 --- a/usr.sbin/smtpd/mta.c +++ b/usr.sbin/smtpd/mta.c @@ -1,4 +1,4 @@ -/* $OpenBSD: mta.c,v 1.193 2015/11/26 08:51:22 tim Exp $ */ +/* $OpenBSD: mta.c,v 1.194 2015/11/30 12:49:35 gilles Exp $ */ /* * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org> @@ -383,11 +383,11 @@ mta_imsg(struct mproc *p, struct imsg *imsg) mta_session_imsg(p, imsg); return; - case IMSG_MTA_SSL_INIT: + case IMSG_MTA_TLS_INIT: mta_session_imsg(p, imsg); return; - case IMSG_MTA_SSL_VERIFY: + case IMSG_MTA_TLS_VERIFY: mta_session_imsg(p, imsg); return; } diff --git a/usr.sbin/smtpd/mta_session.c b/usr.sbin/smtpd/mta_session.c index 96210364d57..93f06197dd5 100644 --- a/usr.sbin/smtpd/mta_session.c +++ b/usr.sbin/smtpd/mta_session.c @@ -1,4 +1,4 @@ -/* $OpenBSD: mta_session.c,v 1.74 2015/10/14 22:01:43 gilles Exp $ */ +/* $OpenBSD: mta_session.c,v 1.75 2015/11/30 12:49:35 gilles Exp $ */ /* * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org> @@ -310,7 +310,7 @@ mta_session_imsg(struct mproc *p, struct imsg *imsg) waitq_run(&h->ptrname, h->ptrname); return; - case IMSG_MTA_SSL_INIT: + case IMSG_MTA_TLS_INIT: resp_ca_cert = imsg->data; s = mta_tree_pop(&wait_ssl_init, resp_ca_cert->reqid); if (s == NULL) @@ -350,7 +350,7 @@ mta_session_imsg(struct mproc *p, struct imsg *imsg) free(resp_ca_cert); return; - case IMSG_MTA_SSL_VERIFY: + case IMSG_MTA_TLS_VERIFY: resp_ca_vrfy = imsg->data; s = mta_tree_pop(&wait_ssl_verify, resp_ca_vrfy->reqid); if (s == NULL) @@ -1512,7 +1512,7 @@ mta_start_tls(struct mta_session *s) req_ca_cert.reqid = s->id; (void)strlcpy(req_ca_cert.name, certname, sizeof req_ca_cert.name); - m_compose(p_lka, IMSG_MTA_SSL_INIT, 0, 0, -1, + m_compose(p_lka, IMSG_MTA_TLS_INIT, 0, 0, -1, &req_ca_cert, sizeof(req_ca_cert)); tree_xset(&wait_ssl_init, s->id, s); s->flags |= MTA_WAIT; @@ -1607,7 +1607,7 @@ mta_verify_certificate(struct mta_session *s) iov[0].iov_len = sizeof(req_ca_vrfy); iov[1].iov_base = cert_der[0]; iov[1].iov_len = cert_len[0]; - m_composev(p_lka, IMSG_MTA_SSL_VERIFY_CERT, 0, 0, -1, + m_composev(p_lka, IMSG_MTA_TLS_VERIFY_CERT, 0, 0, -1, iov, nitems(iov)); memset(&req_ca_vrfy, 0, sizeof req_ca_vrfy); @@ -1618,14 +1618,14 @@ mta_verify_certificate(struct mta_session *s) req_ca_vrfy.cert_len = cert_len[i+1]; iov[1].iov_base = cert_der[i+1]; iov[1].iov_len = cert_len[i+1]; - m_composev(p_lka, IMSG_MTA_SSL_VERIFY_CHAIN, 0, 0, -1, + m_composev(p_lka, IMSG_MTA_TLS_VERIFY_CHAIN, 0, 0, -1, iov, nitems(iov)); } /* Tell lookup process that it can start verifying, we're done */ memset(&req_ca_vrfy, 0, sizeof req_ca_vrfy); req_ca_vrfy.reqid = s->id; - m_compose(p_lka, IMSG_MTA_SSL_VERIFY, 0, 0, -1, + m_compose(p_lka, IMSG_MTA_TLS_VERIFY, 0, 0, -1, &req_ca_vrfy, sizeof req_ca_vrfy); res = 1; diff --git a/usr.sbin/smtpd/pony.c b/usr.sbin/smtpd/pony.c index ca12d0592b0..b25aed8d912 100644 --- a/usr.sbin/smtpd/pony.c +++ b/usr.sbin/smtpd/pony.c @@ -1,4 +1,4 @@ -/* $OpenBSD: pony.c,v 1.8 2015/10/14 19:39:16 gilles Exp $ */ +/* $OpenBSD: pony.c,v 1.9 2015/11/30 12:49:35 gilles Exp $ */ /* * Copyright (c) 2014 Gilles Chehade <gilles@poolp.org> @@ -77,8 +77,8 @@ pony_imsg(struct mproc *p, struct imsg *imsg) case IMSG_SMTP_EXPAND_RCPT: case IMSG_SMTP_LOOKUP_HELO: case IMSG_SMTP_AUTHENTICATE: - case IMSG_SMTP_SSL_INIT: - case IMSG_SMTP_SSL_VERIFY: + case IMSG_SMTP_TLS_INIT: + case IMSG_SMTP_TLS_VERIFY: case IMSG_SMTP_MESSAGE_COMMIT: case IMSG_SMTP_MESSAGE_CREATE: case IMSG_SMTP_MESSAGE_OPEN: @@ -101,8 +101,8 @@ pony_imsg(struct mproc *p, struct imsg *imsg) case IMSG_MTA_DNS_HOST_END: case IMSG_MTA_DNS_MX_PREFERENCE: case IMSG_MTA_DNS_PTR: - case IMSG_MTA_SSL_INIT: - case IMSG_MTA_SSL_VERIFY: + case IMSG_MTA_TLS_INIT: + case IMSG_MTA_TLS_VERIFY: case IMSG_CTL_RESUME_ROUTE: case IMSG_CTL_MTA_SHOW_HOSTS: case IMSG_CTL_MTA_SHOW_RELAYS: diff --git a/usr.sbin/smtpd/smtp.c b/usr.sbin/smtpd/smtp.c index 93659ac1ea2..3eaa68e59c8 100644 --- a/usr.sbin/smtpd/smtp.c +++ b/usr.sbin/smtpd/smtp.c @@ -1,4 +1,4 @@ -/* $OpenBSD: smtp.c,v 1.143 2015/01/20 17:37:54 deraadt Exp $ */ +/* $OpenBSD: smtp.c,v 1.144 2015/11/30 12:49:35 gilles Exp $ */ /* * Copyright (c) 2008 Gilles Chehade <gilles@poolp.org> @@ -62,8 +62,8 @@ smtp_imsg(struct mproc *p, struct imsg *imsg) case IMSG_SMTP_EXPAND_RCPT: case IMSG_SMTP_LOOKUP_HELO: case IMSG_SMTP_AUTHENTICATE: - case IMSG_SMTP_SSL_INIT: - case IMSG_SMTP_SSL_VERIFY: + case IMSG_SMTP_TLS_INIT: + case IMSG_SMTP_TLS_VERIFY: smtp_session_imsg(p, imsg); return; } diff --git a/usr.sbin/smtpd/smtp_session.c b/usr.sbin/smtpd/smtp_session.c index 48278eb2995..015c1931171 100644 --- a/usr.sbin/smtpd/smtp_session.c +++ b/usr.sbin/smtpd/smtp_session.c @@ -1,4 +1,4 @@ -/* $OpenBSD: smtp_session.c,v 1.239 2015/11/05 08:55:09 gilles Exp $ */ +/* $OpenBSD: smtp_session.c,v 1.240 2015/11/30 12:49:35 gilles Exp $ */ /* * Copyright (c) 2008 Gilles Chehade <gilles@poolp.org> @@ -806,7 +806,7 @@ smtp_session_imsg(struct mproc *p, struct imsg *imsg) io_reload(&s->io); return; - case IMSG_SMTP_SSL_INIT: + case IMSG_SMTP_TLS_INIT: resp_ca_cert = imsg->data; s = tree_xpop(&wait_ssl_init, resp_ca_cert->reqid); @@ -838,7 +838,7 @@ smtp_session_imsg(struct mproc *p, struct imsg *imsg) free(resp_ca_cert); return; - case IMSG_SMTP_SSL_VERIFY: + case IMSG_SMTP_TLS_VERIFY: resp_ca_vrfy = imsg->data; s = tree_xpop(&wait_ssl_verify, resp_ca_vrfy->reqid); @@ -893,7 +893,7 @@ smtp_mfa_response(struct smtp_session *s, int msg, int status, uint32_t code, else (void)strlcpy(req_ca_cert.name, s->smtpname, sizeof req_ca_cert.name); - m_compose(p_lka, IMSG_SMTP_SSL_INIT, 0, 0, -1, + m_compose(p_lka, IMSG_SMTP_TLS_INIT, 0, 0, -1, &req_ca_cert, sizeof(req_ca_cert)); tree_xset(&wait_ssl_init, s->id, s); return; @@ -1136,7 +1136,7 @@ smtp_io(struct io *io, int evt) else (void)strlcpy(req_ca_cert.name, s->smtpname, sizeof req_ca_cert.name); - m_compose(p_lka, IMSG_SMTP_SSL_INIT, 0, 0, -1, + m_compose(p_lka, IMSG_SMTP_TLS_INIT, 0, 0, -1, &req_ca_cert, sizeof(req_ca_cert)); tree_xset(&wait_ssl_init, s->id, s); break; @@ -2131,7 +2131,7 @@ smtp_verify_certificate(struct smtp_session *s) iov[0].iov_len = sizeof(req_ca_vrfy); iov[1].iov_base = cert_der[0]; iov[1].iov_len = cert_len[0]; - m_composev(p_lka, IMSG_SMTP_SSL_VERIFY_CERT, 0, 0, -1, + m_composev(p_lka, IMSG_SMTP_TLS_VERIFY_CERT, 0, 0, -1, iov, nitems(iov)); memset(&req_ca_vrfy, 0, sizeof req_ca_vrfy); @@ -2142,14 +2142,14 @@ smtp_verify_certificate(struct smtp_session *s) req_ca_vrfy.cert_len = cert_len[i+1]; iov[1].iov_base = cert_der[i+1]; iov[1].iov_len = cert_len[i+1]; - m_composev(p_lka, IMSG_SMTP_SSL_VERIFY_CHAIN, 0, 0, -1, + m_composev(p_lka, IMSG_SMTP_TLS_VERIFY_CHAIN, 0, 0, -1, iov, nitems(iov)); } /* Tell lookup process that it can start verifying, we're done */ memset(&req_ca_vrfy, 0, sizeof req_ca_vrfy); req_ca_vrfy.reqid = s->id; - m_compose(p_lka, IMSG_SMTP_SSL_VERIFY, 0, 0, -1, + m_compose(p_lka, IMSG_SMTP_TLS_VERIFY, 0, 0, -1, &req_ca_vrfy, sizeof req_ca_vrfy); res = 1; diff --git a/usr.sbin/smtpd/smtpd.c b/usr.sbin/smtpd/smtpd.c index f8f47e19969..fa0f37c50e7 100644 --- a/usr.sbin/smtpd/smtpd.c +++ b/usr.sbin/smtpd/smtpd.c @@ -1,4 +1,4 @@ -/* $OpenBSD: smtpd.c,v 1.254 2015/11/05 09:14:31 sunil Exp $ */ +/* $OpenBSD: smtpd.c,v 1.255 2015/11/30 12:49:35 gilles Exp $ */ /* * Copyright (c) 2008 Gilles Chehade <gilles@poolp.org> @@ -1488,10 +1488,10 @@ imsg_to_str(int type) CASE(IMSG_MTA_LOOKUP_HELO); CASE(IMSG_MTA_OPEN_MESSAGE); CASE(IMSG_MTA_SCHEDULE); - CASE(IMSG_MTA_SSL_INIT); - CASE(IMSG_MTA_SSL_VERIFY_CERT); - CASE(IMSG_MTA_SSL_VERIFY_CHAIN); - CASE(IMSG_MTA_SSL_VERIFY); + CASE(IMSG_MTA_TLS_INIT); + CASE(IMSG_MTA_TLS_VERIFY_CERT); + CASE(IMSG_MTA_TLS_VERIFY_CHAIN); + CASE(IMSG_MTA_TLS_VERIFY); CASE(IMSG_SCHED_ENVELOPE_BOUNCE); CASE(IMSG_SCHED_ENVELOPE_DELIVER); @@ -1508,10 +1508,10 @@ imsg_to_str(int type) CASE(IMSG_SMTP_MESSAGE_OPEN); CASE(IMSG_SMTP_EXPAND_RCPT); CASE(IMSG_SMTP_LOOKUP_HELO); - CASE(IMSG_SMTP_SSL_INIT); - CASE(IMSG_SMTP_SSL_VERIFY_CERT); - CASE(IMSG_SMTP_SSL_VERIFY_CHAIN); - CASE(IMSG_SMTP_SSL_VERIFY); + CASE(IMSG_SMTP_TLS_INIT); + CASE(IMSG_SMTP_TLS_VERIFY_CERT); + CASE(IMSG_SMTP_TLS_VERIFY_CHAIN); + CASE(IMSG_SMTP_TLS_VERIFY); CASE(IMSG_SMTP_REQ_CONNECT); CASE(IMSG_SMTP_REQ_HELO); diff --git a/usr.sbin/smtpd/smtpd.h b/usr.sbin/smtpd/smtpd.h index e96df108deb..7a1c85d5f7c 100644 --- a/usr.sbin/smtpd/smtpd.h +++ b/usr.sbin/smtpd/smtpd.h @@ -1,4 +1,4 @@ -/* $OpenBSD: smtpd.h,v 1.486 2015/11/30 12:26:55 sunil Exp $ */ +/* $OpenBSD: smtpd.h,v 1.487 2015/11/30 12:49:35 gilles Exp $ */ /* * Copyright (c) 2008 Gilles Chehade <gilles@poolp.org> @@ -259,10 +259,10 @@ enum imsg_type { IMSG_MTA_LOOKUP_HELO, IMSG_MTA_OPEN_MESSAGE, IMSG_MTA_SCHEDULE, - IMSG_MTA_SSL_INIT, - IMSG_MTA_SSL_VERIFY_CERT, - IMSG_MTA_SSL_VERIFY_CHAIN, - IMSG_MTA_SSL_VERIFY, + IMSG_MTA_TLS_INIT, + IMSG_MTA_TLS_VERIFY_CERT, + IMSG_MTA_TLS_VERIFY_CHAIN, + IMSG_MTA_TLS_VERIFY, IMSG_SCHED_ENVELOPE_BOUNCE, IMSG_SCHED_ENVELOPE_DELIVER, @@ -279,10 +279,10 @@ enum imsg_type { IMSG_SMTP_MESSAGE_OPEN, IMSG_SMTP_EXPAND_RCPT, IMSG_SMTP_LOOKUP_HELO, - IMSG_SMTP_SSL_INIT, - IMSG_SMTP_SSL_VERIFY_CERT, - IMSG_SMTP_SSL_VERIFY_CHAIN, - IMSG_SMTP_SSL_VERIFY, + IMSG_SMTP_TLS_INIT, + IMSG_SMTP_TLS_VERIFY_CERT, + IMSG_SMTP_TLS_VERIFY_CHAIN, + IMSG_SMTP_TLS_VERIFY, IMSG_SMTP_REQ_CONNECT, IMSG_SMTP_REQ_HELO, |