};
typedef std::list<Entry *> Queue;
typedef typename std::list<Entry *>::iterator QueueIterator;
-
+
/// key:queue_item mapping for fast lookups by key
typedef std::map<std::string, QueueIterator> Map;
typedef typename Map::iterator MapIterator;
typedef std::pair<std::string, QueueIterator> MapPair;
-
LruMap(int ttl, size_t size);
~LruMap();
/// Search for an entry, and return a pointer
private:
LruMap(LruMap<EntryValue, EntryCost> const &);
LruMap<EntryValue, EntryCost> & operator = (LruMap<EntryValue, EntryCost> const &);
-
+
bool expired(Entry &e);
void trim();
void touch(const MapIterator &i);
index.push_front(*(i->second));
index.erase(i->second);
i->second = index.begin();
-
+
LruMap::Entry *e = *i->second;
if (e && expired(*e)) {
bool
LruMap<EntryValue, EntryCost>::del(LruMap::MapIterator const &i)
{
- if (i != storage.end()) {
+ if (i != storage.end()) {
delete *(i->second);
index.erase(i->second);
storage.erase(i);
void
LruMap<EntryValue, EntryCost>::trim()
{
- while(memLimit() > 0 && size() >= memLimit()) {
+ while (memLimit() > 0 && size() >= memLimit()) {
LruMap::QueueIterator i = index.end();
--i;
if (i != index.end()) {
wordlistDestroy(&ssl_crt_validator->cmdline);
delete ssl_crt_validator;
ssl_crt_validator = NULL;
-
+
// CertValidationHelper::HelperCache is a static member, it is not good policy to
- // reset it here. Will work because the current Ssl::CertValidationHelper is
+ // reset it here. Will work because the current Ssl::CertValidationHelper is
// always the same static object.
delete HelperCache;
HelperCache = NULL;
debugs(83, DBG_IMPORTANT, "\"ssl_crtvd\" helper error response: " << reply.other().content());
validationResponse->resultCode = HelperReply::BrokenHelper;
} else if (replyMsg.parse(reply.other().content(), reply.other().contentSize()) != Ssl::CrtdMessage::OK ||
- !replyMsg.parseResponse(*validationResponse, peerCerts, error) ) {
+ !replyMsg.parseResponse(*validationResponse, peerCerts, error) ) {
debugs(83, DBG_IMPORTANT, "WARNING: Reply from ssl_crtvd for " << " is incorrect");
debugs(83, DBG_IMPORTANT, "Certificate cannot be validated. ssl_crtvd response: " << replyMsg.getBody());
validationResponse->resultCode = HelperReply::BrokenHelper;
- }
- else
+ } else
validationResponse->resultCode = reply.result;
crtdvdData->callback(crtdvdData->data, *validationResponse);
if (Ssl::CertValidationHelper::HelperCache &&
- (validationResponse->resultCode == HelperReply::Okay || validationResponse->resultCode == HelperReply::Error)) {
+ (validationResponse->resultCode == HelperReply::Okay || validationResponse->resultCode == HelperReply::Error)) {
Ssl::CertValidationHelper::HelperCache->add(crtdvdData->query.c_str(), validationResponse);
} else
delete validationResponse;
Ssl::CertValidationResponse const*validationResponse;
if (CertValidationHelper::HelperCache &&
- (validationResponse = CertValidationHelper::HelperCache->get(crtdvdData->query.c_str()))) {
+ (validationResponse = CertValidationHelper::HelperCache->get(crtdvdData->query.c_str()))) {
callback(data, *validationResponse);
cbdataReferenceDone(crtdvdData->data);
SSL_free(crtdvdData->ssl);