SSL_CTX_set_min_proto_version(ctx->ssl_ctx, min_protocol);
}
- /* Client can ignore an empty ssl_client_cert, but server will fail
+ /* Client can ignore an empty ssl_client_cert_file, but server will fail
if ssl_cert_file is empty. */
if (set->cert.cert.content != NULL &&
(set->cert.cert.content[0] != '\0' || !ctx->client_ctx) &&
DEF(STR, ssl_client_ca),
DEF(STR, ssl_client_ca_file),
DEF(STR, ssl_client_ca_dir),
- DEF(STR, ssl_client_cert),
- DEF(STR, ssl_client_key),
+ DEF(FILE, ssl_client_cert_file),
+ DEF(FILE, ssl_client_key_file),
DEF(STR, ssl_cipher_list),
DEF(STR, ssl_cipher_suites),
.ssl_client_ca = "",
.ssl_client_ca_file = "",
.ssl_client_ca_dir = "",
- .ssl_client_cert = "",
- .ssl_client_key = "",
+ .ssl_client_cert_file = "",
+ .ssl_client_key_file = "",
.ssl_cipher_list = "ALL:!kRSA:!SRP:!kDHd:!DSS:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!MD5:!PSK:!RC4:!ADH:!LOW@STRENGTH",
.ssl_cipher_suites = "", /* Use TLS library provided value */
set->ca = ssl_set->ssl_client_ca;
set->ca_file = ssl_set->ssl_client_ca_file;
set->ca_dir = ssl_set->ssl_client_ca_dir;
- set->cert.cert.content = ssl_set->ssl_client_cert;
- set->cert.key.content = ssl_set->ssl_client_key;
+ settings_file_get(ssl_set->ssl_client_cert_file,
+ set->pool, &set->cert.cert);
+ settings_file_get(ssl_set->ssl_client_key_file,
+ set->pool, &set->cert.key);
set->verify_remote_cert = ssl_set->ssl_client_require_valid_cert;
set->allow_invalid_cert = !set->verify_remote_cert;
/* client-side CRL checking not supported currently */
const char *ssl_client_ca;
const char *ssl_client_ca_file;
const char *ssl_client_ca_dir;
- const char *ssl_client_cert;
- const char *ssl_client_key;
+ const char *ssl_client_cert_file;
+ const char *ssl_client_key_file;
const char *ssl_cipher_list;
const char *ssl_cipher_suites;