]> git.ipfire.org Git - thirdparty/haproxy.git/commitdiff
BUG/MINOR: httpclient/ssl: use the correct verify constant
authorWilliam Lallemand <wlallemand@haproxy.org>
Thu, 28 Apr 2022 17:35:21 +0000 (19:35 +0200)
committerWilliam Lallemand <wlallemand@haproxy.org>
Thu, 28 Apr 2022 17:35:21 +0000 (19:35 +0200)
The SSL_SERVER_VERIFY_* constants were incorrectly set on the httpclient
server verify. The right constants are SSL_SOCK_VERIFY_* .

This could cause issues when using "httpclient-ssl-verify" or when the
SSL certificates can't be loaded.

No backport needed

src/http_client.c

index 69add1a6e9599b441ecfca50786c701237e6ca93..2b61cf9f74a45a4efe617382c8f2072090a52e0d 100644 (file)
@@ -1164,9 +1164,9 @@ static int httpclient_parse_global_verify(char **args, int section_type, struct
                return -1;
 
        if (strcmp(args[1],"none") == 0)
-               httpclient_ssl_verify = SSL_SERVER_VERIFY_NONE;
+               httpclient_ssl_verify = SSL_SOCK_VERIFY_NONE;
        else if (strcmp(args[1],"required") == 0)
-               httpclient_ssl_verify = SSL_SERVER_VERIFY_REQUIRED;
+               httpclient_ssl_verify = SSL_SOCK_VERIFY_REQUIRED;
        else {
                ha_alert("parsing [%s:%d] : '%s' expects 'none' or 'required' as argument.\n", file, line, args[0]);
                return -1;