sslFlags = SBuf(token + 6);
parsedFlags = parseFlags();
} else if (strncmp(token, "no-default-ca", 13) == 0) {
- flags.noDefaultCa = true;
+ flags.tlsDefaultCa = false;
} else if (strncmp(token, "domain=", 7) == 0) {
sslDomain = SBuf(token + 7);
} else if (strncmp(token, "no-npn", 6) == 0) {
if (!sslFlags.isEmpty())
p->appendf(" %sflags=" SQUIDSBUFPH, pfx, SQUIDSBUFPRINT(sslFlags));
- if (flags.noDefaultCa)
+ if (!flags.tlsDefaultCa)
p->appendf(" %sno-default-ca", pfx);
if (!flags.tlsNpn)
fatalf("Unknown TLS flag '" SQUIDSBUFPH "'", SQUIDSBUFPRINT(tok.remaining()));
if (found == SSL_FLAG_NO_DEFAULT_CA) {
debugs(83, DBG_PARSE_NOTE(2), "UPGRADE WARNING: flags=NO_DEFAULT_CA is deprecated. Use tls-no-default-ca instead.");
- flags.noDefaultCa = true;
+ flags.tlDefaultCa = false;
} else
fl |= found;
} while (tok.skipOne(delims));
#endif
}
- if (flags.noDefaultCa)
+ if (!flags.tlsDefaultCa)
return;
#if USE_OPENSSL
/// flags governing Squid internal TLS operations
struct flags_ {
- flags_() : noDefaultCa(false), tlsNpn(true) {}
+ flags_() : tlsDefaultCa(true), tlsNpn(true) {}
- /// do not use the system default Trusted CA when verifying the remote end certificate
- bool noDefaultCa;
+ /// whether to use the system default Trusted CA when verifying the remote end certificate
+ bool tlsDefaultCa;
/// whether to use the TLS NPN extension on these connections
bool tlsNpn;