Compare commits

..

No commits in common. "c3646294f566e889af2eb1b4a8f1cf254eb02a73" and "b9dc169917c499e88fd0ecda7f1180f57ed883a2" have entirely different histories.

3 changed files with 10 additions and 5 deletions

View file

@ -33,8 +33,7 @@
#define CYTOPLASM_VERSION_BETA 0 #define CYTOPLASM_VERSION_BETA 0
#define CYTOPLASM_VERSION_STABLE (!CYTOPLASM_VERSION_ALPHA && !CYTOPLASM_VERSION_BETA) #define CYTOPLASM_VERSION_STABLE (!CYTOPLASM_VERSION_ALPHA && !CYTOPLASM_VERSION_BETA)
#define XSTRINGIFY(x) #x #define STRINGIFY(x) #x
#define STRINGIFY(x) XSTRINGIFY(x)
/*** /***
* @Nm Cytoplasm * @Nm Cytoplasm

View file

@ -621,7 +621,7 @@ HttpParseHeaders(Stream * fp)
strncpy(headerValue, headerPtr, len); strncpy(headerValue, headerPtr, len);
Free(HashMapSet(headers, headerKey, headerValue)); HashMapSet(headers, headerKey, headerValue);
Free(headerKey); Free(headerKey);
} }

View file

@ -71,6 +71,14 @@ TlsInitClient(int fd, const char *serverName)
OpenSSLCookie *cookie; OpenSSLCookie *cookie;
char errorStr[256]; char errorStr[256];
/*
* TODO: Seems odd that this isn't needed to make the
* connection... we should figure out how to verify the
* certificate matches the server we think we're
* connecting to.
*/
(void) serverName;
cookie = Malloc(sizeof(OpenSSLCookie)); cookie = Malloc(sizeof(OpenSSLCookie));
if (!cookie) if (!cookie)
{ {
@ -81,14 +89,12 @@ TlsInitClient(int fd, const char *serverName)
cookie->method = TLS_client_method(); cookie->method = TLS_client_method();
cookie->ctx = SSL_CTX_new(cookie->method); cookie->ctx = SSL_CTX_new(cookie->method);
cookie->fd = fd;
if (!cookie->ctx) if (!cookie->ctx)
{ {
goto error; goto error;
} }
cookie->ssl = SSL_new(cookie->ctx); cookie->ssl = SSL_new(cookie->ctx);
SSL_set_tlsext_host_name(cookie->ssl, serverName);
if (!cookie->ssl) if (!cookie->ssl)
{ {
goto error; goto error;