client-common.h revision 2dfd08e8aa16dfcc975d8a62bc8d20b2ef849d71
#ifndef CLIENT_COMMON_H
#define CLIENT_COMMON_H
#include "net.h"
#include "login-proxy.h"
#include "sasl-server.h"
#include "master-login.h" /* for LOGIN_MAX_SESSION_ID_LEN */
#define LOGIN_MAX_SESSION_ID_LEN 64
#define LOGIN_MAX_MASTER_PREFIX_LEN 128
/* max. size of input buffer. this means:
IMAP: Max. length of command's all parameters. SASL-IR is read into
a separate larger buffer.
POP3: Max. length of a command line (spec says 512 would be enough)
*/
#define LOGIN_MAX_INBUF_SIZE \
/* max. size of output buffer. if it gets full, the client is disconnected.
SASL authentication gives the largest output. */
#define LOGIN_MAX_OUTBUF_SIZE 4096
/* Max. length of SASL authentication buffer. */
#define LOGIN_MAX_AUTH_BUF_SIZE 8192
/* Disconnect client after this many milliseconds if it hasn't managed
to log in yet. */
#define AUTH_SERVER_WAITING_MSG \
"Waiting for authentication process to respond.."
#define AUTH_MASTER_WAITING_MSG \
"Waiting for authentication master process to respond.."
struct master_service_connection;
enum client_disconnect_reason {
};
enum client_auth_result {
};
struct client_auth_reply {
const char *master_user, *reason;
/* for proxying */
unsigned int port;
unsigned int proxy_timeout_msecs;
unsigned int proxy_refresh_secs;
unsigned int proxy:1;
unsigned int proxy_nopipelining:1;
unsigned int temp:1;
unsigned int nologin:1;
unsigned int authz_failure:1;
};
struct client_vfuncs {
const char *text);
enum client_auth_result result,
const struct client_auth_reply *reply,
const char *text);
};
struct client {
struct client_vfuncs v;
int refcount;
unsigned int local_port, remote_port;
unsigned int real_local_port, real_remote_port;
const struct login_settings *set;
const struct master_service_ssl_settings *ssl_set;
const char *session_id, *listener_name;
int fd;
struct timeout *to_auth_waiting;
struct timeout *to_disconnect;
unsigned char *master_data_prefix;
unsigned int master_data_prefix_len;
struct login_proxy *login_proxy;
const struct dsasl_client_mech *proxy_mech;
struct dsasl_client *proxy_sasl_client;
unsigned int proxy_state;
unsigned int proxy_ttl;
char *auth_mech_name;
struct auth_client_request *auth_request;
const char *sasl_final_resp;
const char *const *auth_passdb_args;
unsigned int master_auth_id;
unsigned int master_tag;
unsigned int bad_counter;
unsigned int auth_attempts, auth_successes;
unsigned int destroyed:1;
unsigned int input_blocked:1;
unsigned int login_success:1;
unsigned int starttls:1;
unsigned int tls:1;
unsigned int secured:1;
unsigned int trusted:1;
unsigned int ssl_servername_settings_read:1;
unsigned int authenticating:1;
unsigned int auth_tried_disabled_plaintext:1;
unsigned int auth_tried_unsupported_mech:1;
unsigned int auth_try_aborted:1;
unsigned int auth_initializing:1;
unsigned int auth_process_comm_fail:1;
unsigned int proxy_auth_failed:1;
unsigned int proxy_nopipelining:1;
unsigned int auth_waiting:1;
unsigned int auth_user_disabled:1;
unsigned int auth_pass_expired:1;
unsigned int notified_auth_ready:1;
unsigned int notified_disconnect:1;
/* ... */
};
struct client *
const struct master_service_connection *conn,
const struct login_settings *set,
const struct master_service_ssl_settings *ssl_set,
void **other_sets);
unsigned int clients_get_count(void) ATTR_PURE;
const char *text);
const char *init_resp);
void clients_notify_auth_connected(void);
void client_destroy_oldest(void);
void clients_destroy_all(void);
void clients_destroy_all_reason(const char *reason);
#endif