summaryrefslogtreecommitdiff
blob: 132992b332e41cf81dd6f1132773f7cb3f2e5323 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
diff -Nru qmail-1.03.orig/qmail-smtpd.c qmail-1.03/qmail-smtpd.c
--- qmail-1.03.orig/qmail-smtpd.c	2005-06-06 00:32:59.000000000 +0300
+++ qmail-1.03/qmail-smtpd.c	2005-06-06 08:18:58.051312616 +0300
@@ -1314,6 +1314,11 @@
   stralloc saciphers = {0};
   X509_STORE *store;
   X509_LOOKUP *lookup;
+  const char *servercert;
+
+  /* if set, use servercert selected through SMTP_SERVERCERT env var */
+  servercert = env_get("SMTP_SERVERCERT");
+  if (!servercert) servercert = SERVERCERT;
 
   SSL_library_init();
 
@@ -1321,7 +1326,7 @@
   ctx = SSL_CTX_new(SSLv23_server_method());
   if (!ctx) { tls_err("unable to initialize ctx"); return; }
 
-  if (!SSL_CTX_use_certificate_chain_file(ctx, SERVERCERT))
+  if (!SSL_CTX_use_certificate_chain_file(ctx, servercert))
     { SSL_CTX_free(ctx); tls_err("missing certificate"); return; }
   SSL_CTX_load_verify_locations(ctx, CLIENTCA, NULL);
 
@@ -1343,7 +1348,7 @@
   if (!myssl) { tls_err("unable to initialize ssl"); return; }
 
   /* this will also check whether public and private keys match */
-  if (!SSL_use_RSAPrivateKey_file(myssl, SERVERCERT, SSL_FILETYPE_PEM))
+  if (!SSL_use_RSAPrivateKey_file(myssl, servercert, SSL_FILETYPE_PEM))
     { SSL_free(myssl); tls_err("no valid RSA private key"); return; }
 
   ciphers = env_get("TLSCIPHERS");