summaryrefslogtreecommitdiffstats
path: root/runtime/nsd_gtls.h
diff options
context:
space:
mode:
authorRainer Gerhards <rgerhards@adiscon.com>2008-05-27 09:46:30 +0200
committerRainer Gerhards <rgerhards@adiscon.com>2008-05-27 09:46:30 +0200
commitae387d6900c02ba655bd970c8053103a1b3f1dcd (patch)
treed76b5362bbfb7febbb36ab7f9332c429479b6346 /runtime/nsd_gtls.h
parent331a6442021405ecc0704fc11adb42178c917e67 (diff)
downloadrsyslog-ae387d6900c02ba655bd970c8053103a1b3f1dcd.tar.gz
rsyslog-ae387d6900c02ba655bd970c8053103a1b3f1dcd.tar.xz
rsyslog-ae387d6900c02ba655bd970c8053103a1b3f1dcd.zip
client now provides cert even if it is not signed by one of the server's trusted CAs (gtls)
Diffstat (limited to 'runtime/nsd_gtls.h')
-rw-r--r--runtime/nsd_gtls.h6
1 files changed, 5 insertions, 1 deletions
diff --git a/runtime/nsd_gtls.h b/runtime/nsd_gtls.h
index a88e34fc..bbd650a2 100644
--- a/runtime/nsd_gtls.h
+++ b/runtime/nsd_gtls.h
@@ -54,7 +54,11 @@ struct nsd_gtls_s {
int bReportAuthErr; /* only the first auth error is to be reported, this var triggers it. Initially, it is
* set to 1 and changed to 0 after the first report. It is changed back to 1 after
* one successful authentication. */
- permittedPeers_t *pPermPeers; /* permitted senders */
+ permittedPeers_t *pPermPeers; /* permitted peers */
+ gnutls_x509_crt ourCert; /**< our certificate, if in client mode (unused in server mode) */
+ gnutls_x509_privkey ourKey; /**< our private key, if in client mode (unused in server mode) */
+ short bOurCertIsInit; /**< 1 if our certificate is initialized and must be deinit on destruction */
+ short bOurKeyIsInit; /**< 1 if our private key is initialized and must be deinit on destruction */
};
/* interface is defined in nsd.h, we just implement it! */