diff --git a/src/vnsw/agent/ovs_tor_agent/ovsdb_client/ovsdb_client_ssl.cc b/src/vnsw/agent/ovs_tor_agent/ovsdb_client/ovsdb_client_ssl.cc index 967f4c009ec..425f4b1967a 100644 --- a/src/vnsw/agent/ovs_tor_agent/ovsdb_client/ovsdb_client_ssl.cc +++ b/src/vnsw/agent/ovs_tor_agent/ovsdb_client/ovsdb_client_ssl.cc @@ -3,6 +3,7 @@ */ #include +#include #include #include @@ -29,13 +30,28 @@ OvsdbClientSsl::OvsdbClientSsl(Agent *agent, TorAgentParam *params, ctx->set_verify_mode((boost::asio::ssl::verify_peer | boost::asio::ssl::verify_fail_if_no_peer_cert), ec); assert(ec.value() == 0); + ctx->use_certificate_chain_file(params->ssl_cert(), ec); - assert(ec.value() == 0); + if (ec.value() != 0) { + LOG(ERROR, "Error : " << ec.message() << ", while using cert file : " + << params->ssl_cert()); + exit(EINVAL); + } + ctx->use_private_key_file(params->ssl_privkey(), boost::asio::ssl::context::pem, ec); - assert(ec.value() == 0); + if (ec.value() != 0) { + LOG(ERROR, "Error : " << ec.message() << ", while using privkey file : " + << params->ssl_privkey()); + exit(EINVAL); + } + ctx->load_verify_file(params->ssl_cacert(), ec); - assert(ec.value() == 0); + if (ec.value() != 0) { + LOG(ERROR, "Error : " << ec.message() << ", while using cacert file : " + << params->ssl_cacert()); + exit(EINVAL); + } } OvsdbClientSsl::~OvsdbClientSsl() {