Remove verify_remote_cert, as it's always TRUE now.
Set allow_invalid_cert to TRUE if verification is
not required.
}
ssl_set.prefer_server_ciphers = TRUE;
ssl_set.allow_invalid_cert = db->set.tls_allow_invalid_cert;
- ssl_set.verify_remote_cert = !ssl_set.allow_invalid_cert;
ssl_set.verbose = db->set.debug;
ssl_set.verbose_invalid_cert = db->set.debug;
http_set.ssl = &ssl_set;
i_zero(&ssl_set);
ssl_set.ca_dir = mail_set->ssl_client_ca_dir;
ssl_set.ca_file = mail_set->ssl_client_ca_file;
- ssl_set.verify_remote_cert = TRUE;
ssl_set.crypto_device = mail_set->ssl_crypto_device;
return ssl_iostream_context_init_client(&ssl_set, &ctx->ssl_ctx, error_r);
return 0;
i_zero(&ssl_set);
- ssl_set.verify_remote_cert = TRUE;
ssl_set.verbose_invalid_cert = TRUE;
if (io_stream_create_ssl_client(conn->server->ssl_ctx,
i_zero(&ssl_set);
if (!conn->client->set.ssl->allow_invalid_cert) {
ssl_set.verbose_invalid_cert = TRUE;
- ssl_set.verify_remote_cert = TRUE;
}
if (conn->client->set.debug)
i_zero(&ssl_set);
ssl_set.ca_dir = set->ssl_ca_dir;
ssl_set.ca_file = set->ssl_ca_file;
- ssl_set.verify_remote_cert = set->ssl_verify;
+ ssl_set.allow_invalid_cert = !set->ssl_verify;
ssl_set.crypto_device = set->ssl_crypto_device;
if (ssl_iostream_context_init_client(&ssl_set, &client->ssl_ctx,
i_zero(&ssl_set);
if (conn->client->set.ssl_verify) {
ssl_set.verbose_invalid_cert = TRUE;
- ssl_set.verify_remote_cert = TRUE;
+ } else {
+ ssl_set.allow_invalid_cert = TRUE;
}
if (conn->client->set.debug)
i_zero(&ssl_set);
ssl_set.ca_dir = set->ssl_ca_dir;
ssl_set.ca_file = set->ssl_ca_file;
- ssl_set.verify_remote_cert = set->ssl_verify;
+ ssl_set.allow_invald_cert = !set->ssl_verify;
ssl_set.crypto_device = set->ssl_crypto_device;
if (ssl_iostream_context_init_client(&ssl_set, &client->ssl_ctx,
i_zero(&ssl_set);
if (client->set.ssl_verify) {
ssl_set.verbose_invalid_cert = TRUE;
- ssl_set.verify_remote_cert = TRUE;
+ } else {
+ ssl_set.allow_invalid_cert = TRUE;
}
if (client->set.debug)