]> git.ipfire.org Git - thirdparty/squid.git/commitdiff
Fixed some little bugs introduced with latest SSL update.
authorserassio <>
Sun, 20 Mar 2005 02:43:39 +0000 (02:43 +0000)
committerserassio <>
Sun, 20 Mar 2005 02:43:39 +0000 (02:43 +0000)
src/client_side.cc
src/external_acl.cc
src/ssl_support.cc

index 9f75e715229a4e378d41d52a18aceeea3aa10f48..405032c5e405be619cdc5ebbc851383243b16a5d 100644 (file)
@@ -1,6 +1,6 @@
 
 /*
- * $Id: client_side.cc,v 1.683 2005/03/18 16:06:10 hno Exp $
+ * $Id: client_side.cc,v 1.684 2005/03/19 19:43:39 serassio Exp $
  *
  * DEBUG: section 33    Client-side Routines
  * AUTHOR: Duane Wessels
@@ -2954,7 +2954,7 @@ clientNegotiateSSL(int fd, void *data)
             /* Write out the SSL session details.. actually the call below, but
              * OpenSSL headers do strange typecasts confusing GCC.. */
             /* PEM_write_SSL_SESSION(debug_log, SSL_get_session(ssl)); */
-            PEM_ASN1_write(i2d_SSL_SESSION, PEM_STRING_SSL_SESSION, debug_log, (char *)SSL_get_session(ssl), NULL,NULL,0,NULL,NULL);
+            PEM_ASN1_write((int(*)())i2d_SSL_SESSION, PEM_STRING_SSL_SESSION, debug_log, (char *)SSL_get_session(ssl), NULL,NULL,0,NULL,NULL);
             /* Note: This does not automatically fflush the log file.. */
         }
 
index 47daa43e67c0640fcfaec11982133d526c21df75..99b21e69815794293c5ec5ebefb3fc43b763c1c6 100644 (file)
@@ -1,6 +1,6 @@
 
 /*
- * $Id: external_acl.cc,v 1.60 2005/03/18 17:17:51 hno Exp $
+ * $Id: external_acl.cc,v 1.61 2005/03/19 19:43:39 serassio Exp $
  *
  * DEBUG: section 82    External ACL
  * AUTHOR: Henrik Nordstrom, MARA Systems AB
@@ -344,9 +344,9 @@ parse_externalAclHelper(external_acl ** list)
 #if USE_SSL
 
         else if (strcmp(token, "%USER_CERT") == 0)
-            format->type = EXT_ACL_USER_CERT_RAW;
+            format->type = _external_acl_format::EXT_ACL_USER_CERT_RAW;
         else if (strcmp(token, "%USER_CERTCHAIN") == 0)
-            format->type = EXT_ACL_USER_CERTCHAIN_RAW;
+            format->type = _external_acl_format::EXT_ACL_USER_CERTCHAIN_RAW;
         else if (strncmp(token, "%USER_CERT_", 11)) {
             format->type = _external_acl_format::EXT_ACL_USER_CERT;
             format->header = xstrdup(token + 11);
index 3ed990580fee8735f98dcef1e781241626fd4c4e..1af63af4480f33aa2cd7b33ec3c4562ccd0b15a0 100644 (file)
@@ -1,6 +1,6 @@
 
 /*
- * $Id: ssl_support.cc,v 1.30 2005/03/18 17:17:51 hno Exp $
+ * $Id: ssl_support.cc,v 1.31 2005/03/19 19:43:39 serassio Exp $
  *
  * AUTHOR: Benno Rice
  * DEBUG: section 83    SSL accelerator support
@@ -581,7 +581,7 @@ sslCreateServerContext(const char *certfile, const char *keyfile, int version, c
     SSL_CTX_set_options(sslContext, ssl_parse_options(options));
 
     if (context && *context) {
-        SSL_CTX_set_session_id_context(sslContext, context, strlen(context));
+        SSL_CTX_set_session_id_context(sslContext, (const unsigned char *)context, strlen(context));
     }
 
     if (fl & SSL_FLAG_NO_SESSION_REUSE) {