version 1.21, 2018/12/10 17:34:22
|
version 1.23, 2018/12/11 15:15:26
|
Line 138 sub PromoteClientSocket {
|
Line 138 sub PromoteClientSocket {
|
$peerdef, |
$peerdef, |
$CRLFile) = @_; |
$CRLFile) = @_; |
|
|
Debug("Client promotion using key: $KeyFile, Cert: $MyCert, CA: $CACert, CRL: $CRLFile, Remote Host: $peer\n"); |
Debug("Client promotion using key: $KeyFile, Cert: $MyCert, CA: $CACert, CRL: $CRLFile, Remote Host: $peer, RemoteDefHost: $peerdef\n"); |
|
|
# To create the ssl socket we need to duplicate the existing |
# To create the ssl socket we need to duplicate the existing |
# socket. Otherwise closing the ssl socket will close the plaintext socket |
# socket. Otherwise closing the ssl socket will close the plaintext socket |
Line 418 sub has_badcert_file {
|
Line 418 sub has_badcert_file {
|
} |
} |
|
|
sub Read_Connect_Config { |
sub Read_Connect_Config { |
my ($secureconf,$perlvarref) = @_; |
my ($secureconf,$perlvarref,$crlcheckedref) = @_; |
return unless (ref($secureconf) eq 'HASH'); |
return unless (ref($secureconf) eq 'HASH'); |
|
|
unless (ref($perlvarref) eq 'HASH') { |
unless (ref($perlvarref) eq 'HASH') { |
$perlvarref = $perlvar; |
$perlvarref = $perlvar; |
} |
} |
|
|
|
# Clear hash of clients in lond for which Certificate Revocation List checked |
|
if (ref($crlcheckedref) eq 'HASH') { |
|
foreach my $key (keys(%{$crlcheckedref})) { |
|
delete($crlcheckedref->{$key}); |
|
} |
|
} |
# Clean out the old table first. |
# Clean out the old table first. |
foreach my $key (keys(%{$secureconf})) { |
foreach my $key (keys(%{$secureconf})) { |
delete($secureconf->{$key}); |
delete($secureconf->{$key}); |