comparison src/dnsbl.h @ 326:5e4b5540c8cc

allow multiple dkim signers in authentication results
author Carl Byington <carl@five-ten-sg.com>
date Sun, 18 Dec 2016 16:51:33 -0800
parents 9f8411f3919c
children f4ca91f49cb6
comparison
equal deleted inserted replaced
325:28b6e0d97c5b 326:5e4b5540c8cc
40 // message specific data 40 // message specific data
41 const char *mailaddr; // envelope from value 41 const char *mailaddr; // envelope from value
42 const char *fromaddr; // header from value, set by mlfi_header() 42 const char *fromaddr; // header from value, set by mlfi_header()
43 int header_count; // count of headers already seen 43 int header_count; // count of headers already seen
44 bool dkim_ok; // ok to proceed with dkim checking 44 bool dkim_ok; // ok to proceed with dkim checking
45 const char *dkim_signer; // non null if message was validly signed 45 string_set dkim_signers; // non empty if message was validly signed, set of signers
46 const char *queueid; // sendmail queue id 46 const char *queueid; // sendmail queue id
47 const char *authenticated; // client authenticated? if so, suppress all dnsbl checks, but check rate limits 47 const char *authenticated; // client authenticated? if so, suppress all dnsbl checks, but check rate limits
48 const char *client_name; // fully qualified host name of the smtp client xxx [ip.ad.dr.es] (may be forged) 48 const char *client_name; // fully qualified host name of the smtp client xxx [ip.ad.dr.es] (may be forged)
49 char *client_dns_name; // fully qualified host name of the smtp client xxx 49 char *client_dns_name; // fully qualified host name of the smtp client xxx
50 bool client_dns_forged; // rdns mismatch 50 bool client_dns_forged; // rdns mismatch