commit 734ef13490282e65ecc35b281bac4c43b0404a9c
parent 92b179d6a198d16de341af6b2fa66324e8916123
Author: Christian Grothoff <christian@grothoff.org>
Date: Sun, 24 Aug 2008 19:16:20 +0000
fix
Diffstat:
3 files changed, 21 insertions(+), 21 deletions(-)
diff --git a/src/daemon/connection_https.c b/src/daemon/connection_https.c
@@ -57,25 +57,25 @@ MHD_get_connection_info (struct MHD_Connection *connection,
switch (infoType)
{
#if HTTPS_SUPPORT
- case MHD_SESSION_INFO_CIPHER_ALGO:
+ case MHD_CONNECTION_INFO_CIPHER_ALGO:
return (const union MHD_ConnectionInfo *) &connection->
tls_session->security_parameters.read_bulk_cipher_algorithm;
- case MHD_SESSION_INFO_KX_ALGO:
+ case MHD_CONNECTION_INFO_KX_ALGO:
return (const union MHD_ConnectionInfo *) &connection->
tls_session->security_parameters.kx_algorithm;
- case MHD_SESSION_INFO_CREDENTIALS_TYPE:
+ case MHD_CONNECTION_INFO_CREDENTIALS_TYPE:
return (const union MHD_ConnectionInfo *) &connection->
tls_session->key->cred->algorithm;
- case MHD_SESSION_INFO_MAC_ALGO:
+ case MHD_CONNECTION_INFO_MAC_ALGO:
return (const union MHD_ConnectionInfo *) &connection->
tls_session->security_parameters.read_mac_algorithm;
- case MHD_SESSION_INFO_COMPRESSION_METHOD:
+ case MHD_CONNECTION_INFO_COMPRESSION_METHOD:
return (const union MHD_ConnectionInfo *) &connection->
tls_session->security_parameters.read_compression_algorithm;
- case MHD_SESSION_INFO_PROTOCOL:
+ case MHD_CONNECTION_INFO_PROTOCOL:
return (const union MHD_ConnectionInfo *) &connection->
tls_session->security_parameters.version;
- case MHD_SESSION_INFO_CERT_TYPE:
+ case MHD_CONNECTION_INFO_CERT_TYPE:
return (const union MHD_ConnectionInfo *) &connection->
tls_session->security_parameters.cert_type;
#endif
diff --git a/src/include/microhttpd.h b/src/include/microhttpd.h
@@ -681,43 +681,43 @@ enum MHD_ConnectionInfoType
* What cipher algorithm is being used.
* Takes no extra arguments.
*/
- MHD_SESSION_INFO_CIPHER_ALGO,
+ MHD_CONNECTION_INFO_CIPHER_ALGO,
/**
* What key exchange algorithm is being used.
* Takes no extra arguments.
*/
- MHD_SESSION_INFO_KX_ALGO,
+ MHD_CONNECTION_INFO_KX_ALGO,
/**
*
* Takes no extra arguments.
*/
- MHD_SESSION_INFO_CREDENTIALS_TYPE,
+ MHD_CONNECTION_INFO_CREDENTIALS_TYPE,
/**
*
* Takes no extra arguments.
*/
- MHD_SESSION_INFO_MAC_ALGO,
+ MHD_CONNECTION_INFO_MAC_ALGO,
/**
* What compression method is being used.
* Takes no extra arguments.
*/
- MHD_SESSION_INFO_COMPRESSION_METHOD,
+ MHD_CONNECTION_INFO_COMPRESSION_METHOD,
/**
*
* Takes no extra arguments.
*/
- MHD_SESSION_INFO_PROTOCOL,
+ MHD_CONNECTION_INFO_PROTOCOL,
/**
*
* Takes no extra arguments.
*/
- MHD_SESSION_INFO_CERT_TYPE
+ MHD_CONNECTION_INFO_CERT_TYPE
};
/**
diff --git a/src/testcurl/https/mhds_session_info_test.c b/src/testcurl/https/mhds_session_info_test.c
@@ -69,7 +69,7 @@ query_session_ahc (void *cls, struct MHD_Connection *connection,
int ret;
/* assert actual connection cipher is the one negotiated */
- if (MHD_get_session_info (connection, MHD_INFO_CIPHER_ALGO)->cipher_algorithm
+ if (MHD_get_session_info (connection, MHD_CONNECTION_INFO_CIPHER_ALGO)->cipher_algorithm
!= MHD_GNUTLS_CIPHER_AES_256_CBC)
{
fprintf (stderr, "Error: requested cipher mismatch. %s\n",
@@ -77,7 +77,7 @@ query_session_ahc (void *cls, struct MHD_Connection *connection,
return -1;
}
- if (MHD_get_session_info (connection, MHD_INFO_KX_ALGO)->kx_algorithm !=
+ if (MHD_get_session_info (connection, MHD_CONNECTION_INFO_KX_ALGO)->kx_algorithm !=
MHD_GNUTLS_KX_RSA)
{
fprintf (stderr, "Error: requested key exchange mismatch. %s\n",
@@ -85,7 +85,7 @@ query_session_ahc (void *cls, struct MHD_Connection *connection,
return -1;
}
- if (MHD_get_session_info (connection, MHD_INFO_MAC_ALGO)->mac_algorithm !=
+ if (MHD_get_session_info (connection, MHD_CONNECTION_INFO_MAC_ALGO)->mac_algorithm !=
MHD_GNUTLS_MAC_SHA1)
{
fprintf (stderr, "Error: requested mac algorithm mismatch. %s\n",
@@ -95,7 +95,7 @@ query_session_ahc (void *cls, struct MHD_Connection *connection,
if (MHD_get_session_info
(connection,
- MHD_INFO_COMPRESSION_METHOD)->compression_method !=
+ MHD_CONNECTION_INFO_COMPRESSION_METHOD)->compression_method !=
MHD_GNUTLS_COMP_NULL)
{
fprintf (stderr, "Error: requested compression mismatch. %s\n",
@@ -103,7 +103,7 @@ query_session_ahc (void *cls, struct MHD_Connection *connection,
return -1;
}
- if (MHD_get_session_info (connection, MHD_INFO_PROTOCOL)->protocol !=
+ if (MHD_get_session_info (connection, MHD_CONNECTION_INFO_PROTOCOL)->protocol !=
MHD_GNUTLS_SSL3)
{
fprintf (stderr, "Error: requested compression mismatch. %s\n",
@@ -111,7 +111,7 @@ query_session_ahc (void *cls, struct MHD_Connection *connection,
return -1;
}
- if (MHD_get_session_info (connection, MHD_INFO_CERT_TYPE)->certificate_type
+ if (MHD_get_session_info (connection, MHD_CONNECTION_INFO_CERT_TYPE)->certificate_type
!= MHD_GNUTLS_CRT_X509)
{
fprintf (stderr, "Error: requested certificate mismatch. %s\n",
@@ -121,7 +121,7 @@ query_session_ahc (void *cls, struct MHD_Connection *connection,
if (MHD_get_session_info
(connection,
- MHD_INFO_CREDENTIALS_TYPE)->credentials_type !=
+ MHD_CONNECTION_INFO_CREDENTIALS_TYPE)->credentials_type !=
MHD_GNUTLS_CRD_CERTIFICATE)
{
fprintf (stderr, "Error: requested certificate mismatch. %s\n",