libmicrohttpd

HTTP/1.x server C library (MHD 1.x, stable)
Log | Files | Refs | Submodules | README | LICENSE

commit ef7fe75ff225665f2dbea1bc773d9ce3862a2866
parent a90ba78c016404a02eb9c81a9fd82694e00b10fb
Author: Christian Grothoff <christian@grothoff.org>
Date:   Tue, 11 Oct 2016 16:09:17 +0000

deprecate USE_SSL for USE_TLS, rename in code

Diffstat:
Mdoc/examples/tlsauthentication.c | 2+-
Msrc/examples/benchmark_https.c | 2+-
Msrc/examples/demo_https.c | 2+-
Msrc/examples/https_fileserver_example.c | 2+-
Msrc/include/microhttpd.h | 2+-
Msrc/microhttpd/connection.c | 2+-
Msrc/microhttpd/daemon.c | 56++++++++++++++++++++++++++++----------------------------
Msrc/microhttpd/response.c | 6+++---
Msrc/testcurl/https/test_empty_response.c | 2+-
Msrc/testcurl/https/test_https_get.c | 4++--
Msrc/testcurl/https/test_https_get_parallel.c | 8++++----
Msrc/testcurl/https/test_https_get_parallel_threads.c | 4++--
Msrc/testcurl/https/test_https_get_select.c | 2+-
Msrc/testcurl/https/test_https_multi_daemon.c | 4++--
Msrc/testcurl/https/test_https_session_info.c | 2+-
Msrc/testcurl/https/test_https_sni.c | 2+-
Msrc/testcurl/https/test_https_time_out.c | 2+-
Msrc/testcurl/https/test_tls_authentication.c | 2+-
Msrc/testcurl/https/test_tls_extensions.c | 2+-
Msrc/testcurl/https/test_tls_options.c | 2+-
20 files changed, 55 insertions(+), 55 deletions(-)

diff --git a/doc/examples/tlsauthentication.c b/doc/examples/tlsauthentication.c @@ -250,7 +250,7 @@ main () } daemon = - MHD_start_daemon (MHD_USE_SELECT_INTERNALLY | MHD_USE_SSL, PORT, NULL, + MHD_start_daemon (MHD_USE_SELECT_INTERNALLY | MHD_USE_TLS, PORT, NULL, NULL, &answer_to_connection, NULL, MHD_OPTION_HTTPS_MEM_KEY, key_pem, MHD_OPTION_HTTPS_MEM_CERT, cert_pem, MHD_OPTION_END); diff --git a/src/examples/benchmark_https.c b/src/examples/benchmark_https.c @@ -180,7 +180,7 @@ main (int argc, char *const *argv) response = MHD_create_response_from_buffer (strlen (PAGE), (void *) PAGE, MHD_RESPMEM_PERSISTENT); - d = MHD_start_daemon (MHD_USE_SELECT_INTERNALLY | MHD_USE_SSL + d = MHD_start_daemon (MHD_USE_SELECT_INTERNALLY | MHD_USE_TLS #ifdef EPOLL_SUPPORT | MHD_USE_EPOLL | MHD_USE_EPOLL_TURBO #endif diff --git a/src/examples/demo_https.c b/src/examples/demo_https.c @@ -932,7 +932,7 @@ main (int argc, char *const *argv) MHD_RESPMEM_PERSISTENT); mark_as_html (internal_error_response); update_directory (); - d = MHD_start_daemon (MHD_USE_SELECT_INTERNALLY | MHD_USE_DEBUG | MHD_USE_SSL + d = MHD_start_daemon (MHD_USE_SELECT_INTERNALLY | MHD_USE_DEBUG | MHD_USE_TLS #ifdef EPOLL_SUPPORT | MHD_USE_EPOLL #endif diff --git a/src/examples/https_fileserver_example.c b/src/examples/https_fileserver_example.c @@ -192,7 +192,7 @@ main (int argc, char *const *argv) /* gcry_control(GCRYCTL_ENABLE_QUICK_RANDOM, 0); */ TLS_daemon = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_DEBUG | - MHD_USE_SSL, atoi (argv[1]), NULL, NULL, &http_ahc, + MHD_USE_TLS, atoi (argv[1]), NULL, NULL, &http_ahc, NULL, MHD_OPTION_CONNECTION_TIMEOUT, 256, MHD_OPTION_HTTPS_MEM_KEY, key_pem, MHD_OPTION_HTTPS_MEM_CERT, cert_pem, diff --git a/src/include/microhttpd.h b/src/include/microhttpd.h @@ -2757,7 +2757,7 @@ enum MHD_FEATURE /** * Get whether HTTPS is supported. If supported then flag - * #MHD_USE_SSL and options #MHD_OPTION_HTTPS_MEM_KEY, + * #MHD_USE_TLS and options #MHD_OPTION_HTTPS_MEM_KEY, * #MHD_OPTION_HTTPS_MEM_CERT, #MHD_OPTION_HTTPS_MEM_TRUST, * #MHD_OPTION_HTTPS_MEM_DHPARAMS, #MHD_OPTION_HTTPS_CRED_TYPE, * #MHD_OPTION_HTTPS_PRIORITIES can be used. diff --git a/src/microhttpd/connection.c b/src/microhttpd/connection.c @@ -595,7 +595,7 @@ try_ready_normal_body (struct MHD_Connection *connection) return MHD_YES; /* response already ready */ #if LINUX if ( (MHD_INVALID_SOCKET != response->fd) && - (0 == (connection->daemon->options & MHD_USE_SSL)) ) + (0 == (connection->daemon->options & MHD_USE_TLS)) ) { /* will use sendfile, no need to bother response crc */ return MHD_YES; diff --git a/src/microhttpd/daemon.c b/src/microhttpd/daemon.c @@ -1133,7 +1133,7 @@ thread_main_connection_upgrade (struct MHD_Connection *con) /* Here, we need to bi-directionally forward until the application tells us that it is done with the socket; */ - if ( (0 != (daemon->options & MHD_USE_SSL)) && + if ( (0 != (daemon->options & MHD_USE_TLS)) && (0 == (daemon->options & MHD_USE_POLL))) { while (MHD_CONNECTION_UPGRADE == con->state) @@ -1193,7 +1193,7 @@ thread_main_connection_upgrade (struct MHD_Connection *con) } } #ifdef HAVE_POLL - else if (0 != (daemon->options & MHD_USE_SSL)) + else if (0 != (daemon->options & MHD_USE_TLS)) { /* use poll() */ const unsigned int timeout = UINT_MAX; @@ -1619,7 +1619,7 @@ send_param_adapter (struct MHD_Connection *connection, i = INT_MAX; /* return value limit */ #endif /* MHD_WINSOCK_SOCKETS */ - if (0 != (connection->daemon->options & MHD_USE_SSL)) + if (0 != (connection->daemon->options & MHD_USE_TLS)) return (ssize_t) send (connection->socket_fd, other, (MHD_SCKT_SEND_SIZE_) i, @@ -1939,7 +1939,7 @@ internal_add_connection (struct MHD_Daemon *daemon, } #if HTTPS_SUPPORT - if (0 != (daemon->options & MHD_USE_SSL)) + if (0 != (daemon->options & MHD_USE_TLS)) { connection->recv_cls = &recv_tls_adapter; connection->send_cls = &send_tls_adapter; @@ -2628,7 +2628,7 @@ MHD_get_timeout (struct MHD_Daemon *daemon, (earliest_deadline > pos->last_activity + pos->connection_timeout) ) earliest_deadline = pos->last_activity + pos->connection_timeout; #if HTTPS_SUPPORT - if ( (0 != (daemon->options & MHD_USE_SSL)) && + if ( (0 != (daemon->options & MHD_USE_TLS)) && (0 != gnutls_record_check_pending (pos->tls_session)) ) earliest_deadline = 0; #endif @@ -2644,7 +2644,7 @@ MHD_get_timeout (struct MHD_Daemon *daemon, (earliest_deadline > pos->last_activity + pos->connection_timeout) ) earliest_deadline = pos->last_activity + pos->connection_timeout; #if HTTPS_SUPPORT - if ( (0 != (daemon->options & MHD_USE_SSL)) && + if ( (0 != (daemon->options & MHD_USE_TLS)) && (0 != gnutls_record_check_pending (pos->tls_session)) ) earliest_deadline = 0; #endif @@ -3955,46 +3955,46 @@ parse_options_va (struct MHD_Daemon *daemon, break; #if HTTPS_SUPPORT case MHD_OPTION_HTTPS_MEM_KEY: - if (0 != (daemon->options & MHD_USE_SSL)) + if (0 != (daemon->options & MHD_USE_TLS)) daemon->https_mem_key = va_arg (ap, const char *); #ifdef HAVE_MESSAGES else MHD_DLOG (daemon, - _("MHD HTTPS option %d passed to MHD but MHD_USE_SSL not set\n"), + _("MHD HTTPS option %d passed to MHD but MHD_USE_TLS not set\n"), opt); #endif break; case MHD_OPTION_HTTPS_KEY_PASSWORD: - if (0 != (daemon->options & MHD_USE_SSL)) + if (0 != (daemon->options & MHD_USE_TLS)) daemon->https_key_password = va_arg (ap, const char *); #ifdef HAVE_MESSAGES else MHD_DLOG (daemon, - _("MHD HTTPS option %d passed to MHD but MHD_USE_SSL not set\n"), + _("MHD HTTPS option %d passed to MHD but MHD_USE_TLS not set\n"), opt); #endif break; case MHD_OPTION_HTTPS_MEM_CERT: - if (0 != (daemon->options & MHD_USE_SSL)) + if (0 != (daemon->options & MHD_USE_TLS)) daemon->https_mem_cert = va_arg (ap, const char *); #ifdef HAVE_MESSAGES else MHD_DLOG (daemon, - _("MHD HTTPS option %d passed to MHD but MHD_USE_SSL not set\n"), + _("MHD HTTPS option %d passed to MHD but MHD_USE_TLS not set\n"), opt); #endif break; case MHD_OPTION_HTTPS_MEM_TRUST: - if (0 != (daemon->options & MHD_USE_SSL)) + if (0 != (daemon->options & MHD_USE_TLS)) daemon->https_mem_trust = va_arg (ap, const char *); #ifdef HAVE_MESSAGES else MHD_DLOG (daemon, - _("MHD HTTPS option %d passed to MHD but MHD_USE_SSL not set\n"), + _("MHD HTTPS option %d passed to MHD but MHD_USE_TLS not set\n"), opt); #endif break; @@ -4003,7 +4003,7 @@ parse_options_va (struct MHD_Daemon *daemon, int); break; case MHD_OPTION_HTTPS_MEM_DHPARAMS: - if (0 != (daemon->options & MHD_USE_SSL)) + if (0 != (daemon->options & MHD_USE_TLS)) { const char *arg = va_arg (ap, const char *); @@ -4036,14 +4036,14 @@ parse_options_va (struct MHD_Daemon *daemon, { #ifdef HAVE_MESSAGES MHD_DLOG (daemon, - _("MHD HTTPS option %d passed to MHD but MHD_USE_SSL not set\n"), + _("MHD HTTPS option %d passed to MHD but MHD_USE_TLS not set\n"), opt); #endif return MHD_NO; } break; case MHD_OPTION_HTTPS_PRIORITIES: - if (0 != (daemon->options & MHD_USE_SSL)) + if (0 != (daemon->options & MHD_USE_TLS)) { gnutls_priority_deinit (daemon->priority_cache); ret = gnutls_priority_init (&daemon->priority_cache, @@ -4070,7 +4070,7 @@ parse_options_va (struct MHD_Daemon *daemon, #endif return MHD_NO; #else - if (0 != (daemon->options & MHD_USE_SSL)) + if (0 != (daemon->options & MHD_USE_TLS)) daemon->cert_callback = va_arg (ap, gnutls_certificate_retrieve_function2 *); break; @@ -4396,7 +4396,7 @@ MHD_start_daemon_va (unsigned int flags, return NULL; #endif #if ! HTTPS_SUPPORT - if (0 != (flags & MHD_USE_SSL)) + if (0 != (flags & MHD_USE_TLS)) return NULL; #endif #ifndef TCP_FASTOPEN @@ -4418,7 +4418,7 @@ MHD_start_daemon_va (unsigned int flags, #endif /* try to open listen socket */ #if HTTPS_SUPPORT - if (0 != (flags & MHD_USE_SSL)) + if (0 != (flags & MHD_USE_TLS)) { gnutls_priority_init (&daemon->priority_cache, "NORMAL", @@ -4488,7 +4488,7 @@ MHD_start_daemon_va (unsigned int flags, daemon->nonce_nc_size = 4; /* tiny */ #endif #if HTTPS_SUPPORT - if (0 != (flags & MHD_USE_SSL)) + if (0 != (flags & MHD_USE_TLS)) { daemon->cred_type = GNUTLS_CRD_CERTIFICATE; } @@ -4500,7 +4500,7 @@ MHD_start_daemon_va (unsigned int flags, ap)) { #if HTTPS_SUPPORT - if ( (0 != (flags & MHD_USE_SSL)) && + if ( (0 != (flags & MHD_USE_TLS)) && (NULL != daemon->priority_cache) ) gnutls_priority_deinit (daemon->priority_cache); #endif @@ -4518,7 +4518,7 @@ MHD_start_daemon_va (unsigned int flags, _("Specified value for NC_SIZE too large\n")); #endif #if HTTPS_SUPPORT - if (0 != (flags & MHD_USE_SSL)) + if (0 != (flags & MHD_USE_TLS)) gnutls_priority_deinit (daemon->priority_cache); #endif free (daemon); @@ -4533,7 +4533,7 @@ MHD_start_daemon_va (unsigned int flags, MHD_strerror_ (errno)); #endif #if HTTPS_SUPPORT - if (0 != (flags & MHD_USE_SSL)) + if (0 != (flags & MHD_USE_TLS)) gnutls_priority_deinit (daemon->priority_cache); #endif free (daemon); @@ -4548,7 +4548,7 @@ MHD_start_daemon_va (unsigned int flags, _("MHD failed to initialize nonce-nc mutex\n")); #endif #if HTTPS_SUPPORT - if (0 != (flags & MHD_USE_SSL)) + if (0 != (flags & MHD_USE_TLS)) gnutls_priority_deinit (daemon->priority_cache); #endif free (daemon->nnc); @@ -4897,7 +4897,7 @@ MHD_start_daemon_va (unsigned int flags, #if HTTPS_SUPPORT /* initialize HTTPS daemon certificate aspects & send / recv functions */ - if ( (0 != (flags & MHD_USE_SSL)) && + if ( (0 != (flags & MHD_USE_TLS)) && (0 != MHD_TLS_init (daemon)) ) { #ifdef HAVE_MESSAGES @@ -5090,7 +5090,7 @@ thread_failed: MHD_mutex_destroy_chk_ (&daemon->nnc_lock); #endif #if HTTPS_SUPPORT - if (0 != (flags & MHD_USE_SSL)) + if (0 != (flags & MHD_USE_TLS)) gnutls_priority_deinit (daemon->priority_cache); #endif if (MHD_ITC_IS_VALID_(daemon->itc)) @@ -5351,7 +5351,7 @@ MHD_stop_daemon (struct MHD_Daemon *daemon) gnutls_dh_params_deinit (daemon->https_mem_dhparams); daemon->have_dhparams = MHD_NO; } - if (0 != (daemon->options & MHD_USE_SSL)) + if (0 != (daemon->options & MHD_USE_TLS)) { gnutls_priority_deinit (daemon->priority_cache); if (daemon->x509_cred) diff --git a/src/microhttpd/response.c b/src/microhttpd/response.c @@ -638,7 +638,7 @@ MHD_upgrade_action (struct MHD_UpgradeResponseHandle *urh, if (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION) ) { #if HTTPS_SUPPORT - if (0 != (daemon->options & MHD_USE_SSL) ) + if (0 != (daemon->options & MHD_USE_TLS) ) { /* signal thread that app is done by shutdown() of 'app' socket */ shutdown (urh->app.socket, @@ -650,7 +650,7 @@ MHD_upgrade_action (struct MHD_UpgradeResponseHandle *urh, return MHD_YES; } #if HTTPS_SUPPORT - if (0 != (daemon->options & MHD_USE_SSL) ) + if (0 != (daemon->options & MHD_USE_TLS) ) { urh->was_closed = MHD_YES; if (MHD_INVALID_SOCKET != urh->app.socket) @@ -712,7 +712,7 @@ MHD_response_execute_upgrade_ (struct MHD_Response *response, rbo = connection->read_buffer_offset; connection->read_buffer_offset = 0; #if HTTPS_SUPPORT - if (0 != (daemon->options & MHD_USE_SSL) ) + if (0 != (daemon->options & MHD_USE_TLS) ) { struct MemoryPool *pool; size_t avail; diff --git a/src/testcurl/https/test_empty_response.c b/src/testcurl/https/test_empty_response.c @@ -80,7 +80,7 @@ testInternalSelectGet () cbc.buf = buf; cbc.size = 2048; cbc.pos = 0; - d = MHD_start_daemon (MHD_USE_DEBUG | MHD_USE_SSL | MHD_USE_SELECT_INTERNALLY, + d = MHD_start_daemon (MHD_USE_DEBUG | MHD_USE_TLS | MHD_USE_SELECT_INTERNALLY, 1082, NULL, NULL, &ahc_echo, "GET", MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, diff --git a/src/testcurl/https/test_https_get.c b/src/testcurl/https/test_https_get.c @@ -46,7 +46,7 @@ test_cipher_option (FILE * test_fd, int ret; struct MHD_Daemon *d; - d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | + d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_TLS | MHD_USE_DEBUG, 4233, NULL, NULL, &http_ahc, NULL, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, @@ -75,7 +75,7 @@ test_secure_get (FILE * test_fd, int ret; struct MHD_Daemon *d; - d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | + d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_TLS | MHD_USE_DEBUG, 4233, NULL, NULL, &http_ahc, NULL, MHD_OPTION_HTTPS_MEM_KEY, srv_signed_key_pem, diff --git a/src/testcurl/https/test_https_get_parallel.c b/src/testcurl/https/test_https_get_parallel.c @@ -151,7 +151,7 @@ main (int argc, char *const *argv) errorCount += test_wrap ("single threaded daemon, single client, epoll", &test_single_client, NULL, - MHD_USE_SELECT_INTERNALLY | MHD_USE_SSL | MHD_USE_DEBUG | MHD_USE_EPOLL, + MHD_USE_SELECT_INTERNALLY | MHD_USE_TLS | MHD_USE_DEBUG | MHD_USE_EPOLL, aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); @@ -159,7 +159,7 @@ main (int argc, char *const *argv) errorCount += test_wrap ("single threaded daemon, single client", &test_single_client, NULL, - MHD_USE_SELECT_INTERNALLY | MHD_USE_SSL | MHD_USE_DEBUG, + MHD_USE_SELECT_INTERNALLY | MHD_USE_TLS | MHD_USE_DEBUG, aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); @@ -167,7 +167,7 @@ main (int argc, char *const *argv) errorCount += test_wrap ("single threaded daemon, parallel clients, epoll", &test_parallel_clients, NULL, - MHD_USE_SELECT_INTERNALLY | MHD_USE_SSL | MHD_USE_DEBUG | MHD_USE_EPOLL, + MHD_USE_SELECT_INTERNALLY | MHD_USE_TLS | MHD_USE_DEBUG | MHD_USE_EPOLL, aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); @@ -175,7 +175,7 @@ main (int argc, char *const *argv) errorCount += test_wrap ("single threaded daemon, parallel clients", &test_parallel_clients, NULL, - MHD_USE_SELECT_INTERNALLY | MHD_USE_SSL | MHD_USE_DEBUG, + MHD_USE_SELECT_INTERNALLY | MHD_USE_TLS | MHD_USE_DEBUG, aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); diff --git a/src/testcurl/https/test_https_get_parallel_threads.c b/src/testcurl/https/test_https_get_parallel_threads.c @@ -170,7 +170,7 @@ main (int argc, char *const *argv) errorCount += test_wrap ("multi threaded daemon, single client", &test_single_client, NULL, - MHD_USE_SSL | MHD_USE_DEBUG | MHD_USE_THREAD_PER_CONNECTION, + MHD_USE_TLS | MHD_USE_DEBUG | MHD_USE_THREAD_PER_CONNECTION, aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); @@ -178,7 +178,7 @@ main (int argc, char *const *argv) errorCount += test_wrap ("multi threaded daemon, parallel client", &test_parallel_clients, NULL, - MHD_USE_SSL | MHD_USE_DEBUG | MHD_USE_THREAD_PER_CONNECTION, + MHD_USE_TLS | MHD_USE_DEBUG | MHD_USE_THREAD_PER_CONNECTION, aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); diff --git a/src/testcurl/https/test_https_get_select.c b/src/testcurl/https/test_https_get_select.c @@ -100,7 +100,7 @@ testExternalGet (int flags) cbc.buf = buf; cbc.size = 2048; cbc.pos = 0; - d = MHD_start_daemon (MHD_USE_DEBUG | MHD_USE_SSL | flags, + d = MHD_start_daemon (MHD_USE_DEBUG | MHD_USE_TLS | flags, 1082, NULL, NULL, &ahc_echo, "GET", MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, diff --git a/src/testcurl/https/test_https_multi_daemon.c b/src/testcurl/https/test_https_multi_daemon.c @@ -50,7 +50,7 @@ test_concurent_daemon_pair (void *cls, struct MHD_Daemon *d1; struct MHD_Daemon *d2; - d1 = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | + d1 = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_TLS | MHD_USE_DEBUG, DEAMON_TEST_PORT, NULL, NULL, &http_ahc, NULL, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, @@ -63,7 +63,7 @@ test_concurent_daemon_pair (void *cls, return -1; } - d2 = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | + d2 = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_TLS | MHD_USE_DEBUG, DEAMON_TEST_PORT + 1, NULL, NULL, &http_ahc, NULL, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, diff --git a/src/testcurl/https/test_https_session_info.c b/src/testcurl/https/test_https_session_info.c @@ -107,7 +107,7 @@ test_query_session () gen_test_file_url (url, DEAMON_TEST_PORT); /* setup test */ - d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | + d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_TLS | MHD_USE_DEBUG, DEAMON_TEST_PORT, NULL, NULL, &query_session_ahc, NULL, MHD_OPTION_HTTPS_PRIORITIES, "NORMAL:+ARCFOUR-128", diff --git a/src/testcurl/https/test_https_sni.c b/src/testcurl/https/test_https_sni.c @@ -260,7 +260,7 @@ main (int argc, char *const *argv) } load_keys ("host1", ABS_SRCDIR "/host1.crt", ABS_SRCDIR "/host1.key"); load_keys ("host2", ABS_SRCDIR "/host2.crt", ABS_SRCDIR "/host2.key"); - d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | MHD_USE_DEBUG, + d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_TLS | MHD_USE_DEBUG, 4233, NULL, NULL, &http_ahc, NULL, diff --git a/src/testcurl/https/test_https_time_out.c b/src/testcurl/https/test_https_time_out.c @@ -116,7 +116,7 @@ main (int argc, char *const *argv) gnutls_global_init (); gnutls_global_set_log_level (11); - d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | + d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_TLS | MHD_USE_DEBUG, DEAMON_TEST_PORT, NULL, NULL, &http_dummy_ahc, NULL, MHD_OPTION_CONNECTION_TIMEOUT, TIME_OUT, diff --git a/src/testcurl/https/test_tls_authentication.c b/src/testcurl/https/test_tls_authentication.c @@ -49,7 +49,7 @@ test_secure_get (void * cls, char *cipher_suite, int proto_version) int ret; struct MHD_Daemon *d; - d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | + d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_TLS | MHD_USE_DEBUG, DEAMON_TEST_PORT, NULL, NULL, &http_ahc, NULL, MHD_OPTION_HTTPS_MEM_KEY, srv_signed_key_pem, diff --git a/src/testcurl/https/test_tls_extensions.c b/src/testcurl/https/test_tls_extensions.c @@ -231,7 +231,7 @@ main (int argc, char *const *argv) return -1; } - d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | + d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_TLS | MHD_USE_DEBUG, DEAMON_TEST_PORT, NULL, NULL, &http_ahc, NULL, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, diff --git a/src/testcurl/https/test_tls_options.c b/src/testcurl/https/test_tls_options.c @@ -83,7 +83,7 @@ main (int argc, char *const *argv) unsigned int errorCount = 0; const char *ssl_version; int daemon_flags = - MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | MHD_USE_DEBUG; + MHD_USE_THREAD_PER_CONNECTION | MHD_USE_TLS | MHD_USE_DEBUG; gcry_control (GCRYCTL_DISABLE_SECMEM, 0); gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);