SSL_CMD_SRV(ProxyCipherSuite, TAKE1,
"SSL Proxy: colon-delimited list of permitted SSL ciphers "
"(`XXX:...:XXX' - see manual)")
- SSL_CMD_SRV(ProxyVerify, FLAG,
+ SSL_CMD_SRV(ProxyVerify, TAKE1,
"SSL Proxy: whether to verify the remote certificate "
"(`on' or `off')")
SSL_CMD_SRV(ProxyVerifyDepth, TAKE1,
const char *ssl_cmd_SSLProxyProtocol(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLProxyCipherSuite(cmd_parms *, void *, const char *);
-const char *ssl_cmd_SSLProxyVerify(cmd_parms *, void *, int);
+const char *ssl_cmd_SSLProxyVerify(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLProxyVerifyDepth(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLProxyCACertificatePath(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLProxyCACertificateFile(cmd_parms *, void *, const char *);
{
SSLDirConfigRec *dc = (SSLDirConfigRec *)dcfg;
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
- ssl_verify_t id;
+ ssl_verify_t mode;
const char *err;
- if ((err = ssl_cmd_verify_parse(cmd, arg, &id))) {
+ if ((err = ssl_cmd_verify_parse(cmd, arg, &mode))) {
return err;
}
if (cmd->path) {
- dc->nVerifyClient = id;
+ dc->nVerifyClient = mode;
}
else {
- sc->server->auth.verify_mode = id;
+ sc->server->auth.verify_mode = mode;
}
return NULL;
const char *ssl_cmd_SSLProxyVerify(cmd_parms *cmd,
void *dcfg,
- int flag)
+ const char *arg)
{
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
+ ssl_verify_t mode;
+ const char *err;
+
+ if ((err = ssl_cmd_verify_parse(cmd, arg, &id))) {
+ return err;
+ }
- sc->proxy->auth.verify_mode = flag ? TRUE : FALSE;
+ sc->proxy->auth.verify_mode = mode;
return NULL;
}