Mercurial > dovecot > original-hg > dovecot-1.2
view src/login-common/ssl-proxy.c @ 9532:00cd9aacd03c HEAD
Updated copyright notices to include year 2010.
author | Timo Sirainen <tss@iki.fi> |
---|---|
date | Mon, 25 Jan 2010 01:18:58 +0200 |
parents | 528f904067d4 |
children | 8ba4253adc9b |
line wrap: on
line source
/* Copyright (c) 2002-2010 Dovecot authors, see the included COPYING file */ #include "lib.h" #include "ssl-proxy.h" bool ssl_initialized = FALSE; #ifndef HAVE_SSL /* no SSL support */ int ssl_proxy_new(int fd ATTR_UNUSED, struct ip_addr *ip ATTR_UNUSED, struct ssl_proxy **proxy_r ATTR_UNUSED) { i_error("Dovecot wasn't built with SSL support"); return -1; } int ssl_proxy_client_new(int fd ATTR_UNUSED, struct ip_addr *ip ATTR_UNUSED, ssl_handshake_callback_t *callback ATTR_UNUSED, void *context ATTR_UNUSED, struct ssl_proxy **proxy_r ATTR_UNUSED) { i_error("Dovecot wasn't built with SSL support"); return -1; } bool ssl_proxy_has_valid_client_cert(const struct ssl_proxy *proxy ATTR_UNUSED) { return FALSE; } bool ssl_proxy_has_broken_client_cert(struct ssl_proxy *proxy ATTR_UNUSED) { return FALSE; } const char *ssl_proxy_get_peer_name(struct ssl_proxy *proxy ATTR_UNUSED) { return NULL; } bool ssl_proxy_is_handshaked(const struct ssl_proxy *proxy ATTR_UNUSED) { return FALSE; } const char *ssl_proxy_get_last_error(const struct ssl_proxy *proxy ATTR_UNUSED) { return NULL; } const char *ssl_proxy_get_security_string(struct ssl_proxy *proxy ATTR_UNUSED) { return ""; } void ssl_proxy_free(struct ssl_proxy *proxy ATTR_UNUSED) {} unsigned int ssl_proxy_get_count(void) { return 0; } void ssl_proxy_init(void) {} void ssl_proxy_deinit(void) {} #endif