debugs(3, DBG_PARSE_NOTE(1), "WARNING: Overwriting flags=" << sslFlags << " with " << SBuf(token + 6));
}
sslFlags = SBuf(token + 6);
- parsedFlags = Security::ParseFlags(sslFlags);
+ parsedFlags = parseFlags();
} else if (strncmp(token, "domain=", 7) == 0) {
sslDomain = SBuf(token + 7);
} else {
return op;
}
+/**
+ * Parses the TLS flags squid.conf parameter
+ */
long
-Security::ParseFlags(const SBuf &flags)
+Security::PeerOptions::parseFlags()
{
- if (flags.isEmpty())
+ if (sslFlags.isEmpty())
return 0;
static struct {
{ SBuf(), 0 }
};
- ::Parser::Tokenizer tok(flags);
+ ::Parser::Tokenizer tok(sslFlags);
static const CharacterSet delims("Flag-delimiter", ":,");
long fl = 0;
private:
long parseOptions();
+ long parseFlags();
public:
SBuf certFile; ///< path of file containing PEM format X509 certificate
/// configuration options for DIRECT server access
extern PeerOptions ProxyOutgoingConfig;
-/**
- * Parses the TLS flags squid.conf parameter
- */
-long ParseFlags(const SBuf &);
-
} // namespace Security
// parse the tls_outgoing_options directive
void Security::PeerOptions::updateTlsVersionLimits() STUB
void Security::PeerOptions::dumpCfg(Packable*, char const*) const STUB
long Security::PeerOptions::parseOptions() STUB_RETVAL(0)
+long Security::PeerOptions::parseFlags() STUB_RETVAL(0)
void parse_securePeerOptions(Security::PeerOptions *) STUB
-long Security::ParseFlags(const SBuf &) STUB_RETVAL(0)