Fossil SCM

Minor fixes to the previous check-in.

drh 2020-04-27 16:58 trunk
Commit 9f8dc18f702a3490821c2b2807ecba95c0357efbd948c13810d18ba1e193adb3
1 file changed +3 -4
+3 -4
--- src/http_ssl.c
+++ src/http_ssl.c
@@ -236,11 +236,11 @@
236236
** this call is made, any SSL cert that the server provides will
237237
** be accepted. Communication will still be encrypted, but the
238238
** client has no way of knowing whether it is talking to the
239239
** real server or a man-in-the-middle imposter.
240240
*/
241
-int ssl_disable_cert_verification(void){
241
+void ssl_disable_cert_verification(void){
242242
sslNoCertVerify = 1;
243243
}
244244
245245
/*
246246
** Open an SSL connection. The identify of the server is determined
@@ -252,11 +252,10 @@
252252
**
253253
** Return the number of errors.
254254
*/
255255
int ssl_open(UrlData *pUrlData){
256256
X509 *cert;
257
- unsigned long e;
258257
259258
ssl_global_init();
260259
if( pUrlData->useProxy ){
261260
int rc;
262261
char *connStr = mprintf("%s:%d", g.url.name, pUrlData->port);
@@ -448,18 +447,18 @@
448447
}
449448
450449
/*
451450
** Remember zHash as an acceptable certificate for this session only.
452451
*/
453
-LOCAL int ssl_one_time_exception(
452
+LOCAL void ssl_one_time_exception(
454453
UrlData *pUrlData,
455454
const char *zHash
456455
){
457456
fossil_free(sException.zHost);
458457
sException.zHost = fossil_strdup(pUrlData->name);
459458
fossil_free(sException.zHash);
460
- sException.zHost = fossil_strdup(zHash);
459
+ sException.zHash = fossil_strdup(zHash);
461460
}
462461
463462
/*
464463
** Send content out over the SSL connection.
465464
*/
466465
--- src/http_ssl.c
+++ src/http_ssl.c
@@ -236,11 +236,11 @@
236 ** this call is made, any SSL cert that the server provides will
237 ** be accepted. Communication will still be encrypted, but the
238 ** client has no way of knowing whether it is talking to the
239 ** real server or a man-in-the-middle imposter.
240 */
241 int ssl_disable_cert_verification(void){
242 sslNoCertVerify = 1;
243 }
244
245 /*
246 ** Open an SSL connection. The identify of the server is determined
@@ -252,11 +252,10 @@
252 **
253 ** Return the number of errors.
254 */
255 int ssl_open(UrlData *pUrlData){
256 X509 *cert;
257 unsigned long e;
258
259 ssl_global_init();
260 if( pUrlData->useProxy ){
261 int rc;
262 char *connStr = mprintf("%s:%d", g.url.name, pUrlData->port);
@@ -448,18 +447,18 @@
448 }
449
450 /*
451 ** Remember zHash as an acceptable certificate for this session only.
452 */
453 LOCAL int ssl_one_time_exception(
454 UrlData *pUrlData,
455 const char *zHash
456 ){
457 fossil_free(sException.zHost);
458 sException.zHost = fossil_strdup(pUrlData->name);
459 fossil_free(sException.zHash);
460 sException.zHost = fossil_strdup(zHash);
461 }
462
463 /*
464 ** Send content out over the SSL connection.
465 */
466
--- src/http_ssl.c
+++ src/http_ssl.c
@@ -236,11 +236,11 @@
236 ** this call is made, any SSL cert that the server provides will
237 ** be accepted. Communication will still be encrypted, but the
238 ** client has no way of knowing whether it is talking to the
239 ** real server or a man-in-the-middle imposter.
240 */
241 void ssl_disable_cert_verification(void){
242 sslNoCertVerify = 1;
243 }
244
245 /*
246 ** Open an SSL connection. The identify of the server is determined
@@ -252,11 +252,10 @@
252 **
253 ** Return the number of errors.
254 */
255 int ssl_open(UrlData *pUrlData){
256 X509 *cert;
 
257
258 ssl_global_init();
259 if( pUrlData->useProxy ){
260 int rc;
261 char *connStr = mprintf("%s:%d", g.url.name, pUrlData->port);
@@ -448,18 +447,18 @@
447 }
448
449 /*
450 ** Remember zHash as an acceptable certificate for this session only.
451 */
452 LOCAL void ssl_one_time_exception(
453 UrlData *pUrlData,
454 const char *zHash
455 ){
456 fossil_free(sException.zHost);
457 sException.zHost = fossil_strdup(pUrlData->name);
458 fossil_free(sException.zHash);
459 sException.zHash = fossil_strdup(zHash);
460 }
461
462 /*
463 ** Send content out over the SSL connection.
464 */
465

Keyboard Shortcuts

Open search /
Next entry (timeline) j
Previous entry (timeline) k
Open focused entry Enter
Show this help ?
Toggle theme Top nav button