ACLStrategised<X509 *> ACLCertificate::UserRegistryEntry_(new ACLCertificateData (Ssl::GetX509UserAttribute, "*"), ACLCertificateStrategy::Instance(), "user_cert");
ACL::Prototype ACLCertificate::CARegistryProtoype(&ACLCertificate::CARegistryEntry_, "ca_cert");
ACLStrategised<X509 *> ACLCertificate::CARegistryEntry_(new ACLCertificateData (Ssl::GetX509CAAttribute, "*"), ACLCertificateStrategy::Instance(), "ca_cert");
-ACL::Prototype ACLServerCertificate::X509FingerprintRegistryProtoype(&ACLServerCertificate::X509FingerprintRegistryEntry_, "server_ssl_cert_fingerprint");
-ACLStrategised<X509 *> ACLServerCertificate::X509FingerprintRegistryEntry_(new ACLCertificateData(Ssl::GetX509Fingerprint, "-sha1", true), ACLServerCertificateStrategy::Instance(), "server_ssl_cert_fingerprint");
+ACL::Prototype ACLServerCertificate::X509FingerprintRegistryProtoype(&ACLServerCertificate::X509FingerprintRegistryEntry_, "server_cert_fingerprint");
+ACLStrategised<X509 *> ACLServerCertificate::X509FingerprintRegistryEntry_(new ACLCertificateData(Ssl::GetX509Fingerprint, "-sha1", true), ACLServerCertificateStrategy::Instance(), "server_cert_fingerprint");
#endif
#if USE_SQUID_EUI
return 0;
char const *value = sslAttributeCall(cert, attribute);
- debugs(28, 6, HERE << (attribute ? attribute : "value") << "=" << value);
+ debugs(28, 6, (attribute ? attribute : "value") << "=" << value);
if (value == NULL)
return 0;
if (attributeIsOptional)
return;
- debugs(28, DBG_CRITICAL, "required attribute argument missing");
+ debugs(28, DBG_CRITICAL, "FATAL: required attribute argument missing");
self_destruct();
}
}
if (!valid) {
- debugs(28, DBG_CRITICAL, "Unknown option. Supported option(s) are: " << validAttributesStr);
+ debugs(28, DBG_CRITICAL, "FATAL: Unknown option. Supported option(s) are: " << validAttributesStr);
self_destruct();
}
/* an acl must use consistent attributes in all config lines */
if (attribute) {
if (strcasecmp(newAttribute, attribute) != 0) {
- debugs(28, DBG_CRITICAL, "An acl must use consistent attributes in all config lines (" << newAttribute << "!=" << attribute << ").");
+ debugs(28, DBG_CRITICAL, "FATAL: An acl must use consistent attributes in all config lines (" << newAttribute << "!=" << attribute << ").");
self_destruct();
}
} else
/*
- * $Id$
- *
*/
#include "squid.h"
#include "acl/ServerCertificate.h"
#include "acl/Checklist.h"
#include "acl/CertificateData.h"
-#include "fde.h"
#include "client_side.h"
+#include "fde.h"
#include "ssl/ServerBump.h"
-
int
-ACLServerCertificateStrategy::match (ACLData<MatchType> * &data, ACLFilledChecklist *checklist)
+ACLServerCertificateStrategy::match(ACLData<MatchType> * &data, ACLFilledChecklist *checklist)
{
X509 *cert = NULL;
if (checklist->serverCert.get())
/*
- * $Id$
*/
#ifndef SQUID_ACLSERVERCERTIFICATE_H
/// \ingroup ACLAPI
class ACLServerCertificateStrategy : public ACLStrategy<X509 *>
{
-
public:
virtual int match (ACLData<MatchType> * &, ACLFilledChecklist *);
static ACLServerCertificateStrategy *Instance();
void parse();
bool empty() const;
virtual ACLData<char const *> *clone() const;
- /// Insert custom values
+ /// Insert a string data value
void insert(const char *);
SplayNode<char *> *values;
# NOTE: The ssl_error ACL is only supported with sslproxy_cert_error,
# sslproxy_cert_sign, and sslproxy_cert_adapt options.
- acl aclname server_ssl_cert_fingerprint [-sha1] fingerprint
+ acl aclname server_cert_fingerprint [-sha1] fingerprint
# match against server SSL certificate fingerprint [fast]
#
# The fingerprint is the digest of the DER encoded version