From: Amos Jeffries Date: Fri, 16 Sep 2011 10:53:09 +0000 (-0600) Subject: Updated OpenSSL 1.0.0 version checks. X-Git-Tag: SQUID_3_1_16~11 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=19afe2b21f745bb6be64caa7830e0fab598d15f1;p=thirdparty%2Fsquid.git Updated OpenSSL 1.0.0 version checks. LHASH_LHASH and PSTRING are only screwed up in 1.0.0d and later. --- diff --git a/src/ssl/certificate_db.cc b/src/ssl/certificate_db.cc index 582a1f6eab..9cc0f33ebb 100644 --- a/src/ssl/certificate_db.cc +++ b/src/ssl/certificate_db.cc @@ -394,7 +394,7 @@ void Ssl::CertificateDb::load() corrupt = true; // Create indexes in db. -#if OPENSSL_VERSION_NUMBER > 0x10000000L +#if OPENSSL_VERSION_NUMBER >= 0x1000004fL if (!corrupt && !TXT_DB_create_index(temp_db.get(), cnlSerial, NULL, LHASH_HASH_FN(index_serial), LHASH_COMP_FN(index_serial))) corrupt = true; @@ -434,7 +434,7 @@ bool Ssl::CertificateDb::deleteInvalidCertificate() return false; bool removed_one = false; -#if OPENSSL_VERSION_NUMBER > 0x10000000L +#if OPENSSL_VERSION_NUMBER >= 0x1000004fL for (int i = 0; i < sk_OPENSSL_PSTRING_num(db.get()->data); i++) { const char ** current_row = ((const char **)sk_OPENSSL_PSTRING_value(db.get()->data, i)); #else @@ -445,7 +445,7 @@ bool Ssl::CertificateDb::deleteInvalidCertificate() if (!sslDateIsInTheFuture(current_row[cnlExp_date])) { std::string filename(cert_full + "/" + current_row[cnlSerial] + ".pem"); FileLocker cert_locker(filename); -#if OPENSSL_VERSION_NUMBER > 0x10000000L +#if OPENSSL_VERSION_NUMBER >= 0x1000004fL sk_OPENSSL_PSTRING_delete(db.get()->data, i); #else sk_delete(db.get()->data, i); @@ -467,14 +467,14 @@ bool Ssl::CertificateDb::deleteOldestCertificate() if (!db) return false; -#if OPENSSL_VERSION_NUMBER > 0x10000000L +#if OPENSSL_VERSION_NUMBER >= 0x1000004fL if (sk_OPENSSL_PSTRING_num(db.get()->data) == 0) #else if (sk_num(db.get()->data) == 0) #endif return false; -#if OPENSSL_VERSION_NUMBER > 0x10000000L +#if OPENSSL_VERSION_NUMBER >= 0x1000004fL const char **row = (const char **)sk_OPENSSL_PSTRING_value(db.get()->data, 0); #else const char **row = (const char **)sk_value(db.get()->data, 0); @@ -482,7 +482,7 @@ bool Ssl::CertificateDb::deleteOldestCertificate() std::string filename(cert_full + "/" + row[cnlSerial] + ".pem"); FileLocker cert_locker(filename); -#if OPENSSL_VERSION_NUMBER > 0x10000000L +#if OPENSSL_VERSION_NUMBER >= 0x1000004fL sk_OPENSSL_PSTRING_delete(db.get()->data, 0); #else sk_delete(db.get()->data, 0); @@ -499,7 +499,7 @@ bool Ssl::CertificateDb::deleteByHostname(std::string const & host) if (!db) return false; -#if OPENSSL_VERSION_NUMBER > 0x10000000L +#if OPENSSL_VERSION_NUMBER >= 0x1000004fL for (int i = 0; i < sk_OPENSSL_PSTRING_num(db.get()->data); i++) { const char ** current_row = ((const char **)sk_OPENSSL_PSTRING_value(db.get()->data, i)); #else @@ -509,7 +509,7 @@ bool Ssl::CertificateDb::deleteByHostname(std::string const & host) if (host == current_row[cnlName]) { std::string filename(cert_full + "/" + current_row[cnlSerial] + ".pem"); FileLocker cert_locker(filename); -#if OPENSSL_VERSION_NUMBER > 0x10000000L +#if OPENSSL_VERSION_NUMBER >= 0x1000004fL sk_OPENSSL_PSTRING_delete(db.get()->data, i); #else sk_delete(db.get()->data, i);