This avoids conflict between GnuTLS's built-in SSLKEYLOG and our hack
for OpenSSL. This would be important for instances which run
DNS-over-TLS using built-in GnuTLS
and at the same time DNS-over-HTTPS using lua-http (based on OpenSSL).
if (keylog_file_fd >= 0)
return;
- const char *filename = getenv("SSLKEYLOGFILE");
+ const char *filename = getenv("OPENSSLKEYLOGFILE");
if (filename) {
keylog_file_fd = open(filename, O_WRONLY | O_APPEND | O_CREAT, 0644);
if (keylog_file_fd >= 0 && lseek(keylog_file_fd, 0, SEEK_END) == 0) {