X-Git-Url: http://git.madism.org/?a=blobdiff_plain;ds=sidebyside;f=main-postlicyd.c;h=b2ed86dab84116b854f42d9707cc895ddd56d521;hb=6a736221313a18d611bc5e2c49f4fa8b354390f2;hp=0431b95618783f599b32d36f5d76e2e5a24e034c;hpb=36003695aa2db17ee573d951bf19717796271d38;p=apps%2Fpfixtools.git diff --git a/main-postlicyd.c b/main-postlicyd.c index 0431b95..b2ed86d 100644 --- a/main-postlicyd.c +++ b/main-postlicyd.c @@ -84,7 +84,7 @@ typedef struct query_t { const char *size; const char *ccert_subject; const char *ccert_issuer; - const char *ccsert_fingerprint; + const char *ccert_fingerprint; /* postfix 2.3+ */ const char *encryption_protocol; @@ -92,6 +92,9 @@ typedef struct query_t { const char *encryption_keysize; const char *etrn_domain; + /* postfix 2.5+ */ + const char *stress; + const char *eoq; } query_t; @@ -159,11 +162,12 @@ static int postfix_parsejob(query_t *query, char *p) CASE(SIZE, size); CASE(CCERT_SUBJECT, ccert_subject); CASE(CCERT_ISSUER, ccert_issuer); - CASE(CCSERT_FINGERPRINT, ccsert_fingerprint); + CASE(CCERT_FINGERPRINT, ccert_fingerprint); CASE(ENCRYPTION_PROTOCOL, encryption_protocol); CASE(ENCRYPTION_CIPHER, encryption_cipher); CASE(ENCRYPTION_KEYSIZE, encryption_keysize); CASE(ETRN_DOMAIN, etrn_domain); + CASE(STRESS, stress); #undef CASE case PTK_REQUEST: @@ -198,7 +202,7 @@ static int postfix_parsejob(query_t *query, char *p) default: syslog(LOG_WARNING, "unexpected key, skipped: %.*s", klen, k); - break; + continue; } } @@ -210,11 +214,14 @@ __attribute__((format(printf,2,0))) static void policy_answer(server_t *pcy, const char *fmt, ...) { va_list args; + query_t* query = pcy->data; + + buffer_addstr(&pcy->obuf, "action="); va_start(args, fmt); buffer_addvf(&pcy->obuf, fmt, args); va_end(args); buffer_addstr(&pcy->obuf, "\n\n"); - buffer_consume(&pcy->ibuf, ((query_t*)(pcy->data))->eoq - pcy->ibuf.data); + buffer_consume(&pcy->ibuf, query->eoq - pcy->ibuf.data); epoll_modify(pcy->fd, EPOLLIN | EPOLLOUT, pcy); } @@ -228,6 +235,7 @@ static int policy_run(server_t *pcy, void* config) ssize_t search_offs = MAX(0, pcy->ibuf.len - 1); int nb = buffer_read(&pcy->ibuf, pcy->fd, -1); const char *eoq; + query_t* query = pcy->data; if (nb < 0) { if (errno == EAGAIN || errno == EINTR) @@ -246,7 +254,7 @@ static int policy_run(server_t *pcy, void* config) if (postfix_parsejob(pcy->data, pcy->ibuf.data) < 0) return -1; - ((query_t*)pcy->data)->eoq = eoq + strlen("\n\n"); + query->eoq = eoq + strlen("\n\n"); epoll_modify(pcy->fd, 0, pcy); policy_process(pcy); return 0;