diff options
| author | 2008-05-09 08:06:27 +0000 | |
|---|---|---|
| committer | 2008-05-09 08:06:27 +0000 | |
| commit | 9b1789d1259b0f268d5ace36fa2be90b65bc1f9e (patch) | |
| tree | 75216415815f99b8841290a971bc742e67f03629 /usr.sbin/httpd/src/modules/ssl/ssl_engine_ext.c | |
| parent | Fix a logic botch around prioinv that resulted in wrong ordering of more (diff) | |
| download | wireguard-openbsd-9b1789d1259b0f268d5ace36fa2be90b65bc1f9e.tar.xz wireguard-openbsd-9b1789d1259b0f268d5ace36fa2be90b65bc1f9e.zip | |
Add support for IPv6 while keeping the default at IPv4 to not break
existing installations. See the documentation for the IPv6 related
configuration.
This changes the module ABI since addresses are now struct addrinfo.
This has been tested by many people and run on production machines
for several months.
feedback many, ok todd
Diffstat (limited to 'usr.sbin/httpd/src/modules/ssl/ssl_engine_ext.c')
| -rw-r--r-- | usr.sbin/httpd/src/modules/ssl/ssl_engine_ext.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/usr.sbin/httpd/src/modules/ssl/ssl_engine_ext.c b/usr.sbin/httpd/src/modules/ssl/ssl_engine_ext.c index 61c63c765a8..944ec338619 100644 --- a/usr.sbin/httpd/src/modules/ssl/ssl_engine_ext.c +++ b/usr.sbin/httpd/src/modules/ssl/ssl_engine_ext.c @@ -218,7 +218,7 @@ static int ssl_ext_mp_handler(request_rec *, void *, char *, char *, int, char static int ssl_ext_mp_set_destport(request_rec *); static char *ssl_ext_mp_new_connection(request_rec *, BUFF *, char *); static void ssl_ext_mp_close_connection(void *); -static int ssl_ext_mp_write_host_header(request_rec *, BUFF *, char *, int, char *); +static int ssl_ext_mp_write_host_header(request_rec *, BUFF *, char *, char *, char *); #ifdef SSL_EXPERIMENTAL_PROXY static void ssl_ext_mp_init(server_rec *, pool *); static int ssl_ext_mp_verify_cb(int, X509_STORE_CTX *); @@ -559,7 +559,7 @@ static void ssl_ext_mp_close_connection(void *_fb) } static int ssl_ext_mp_write_host_header( - request_rec *r, BUFF *fb, char *host, int port, char *portstr) + request_rec *r, BUFF *fb, char *host, char *port, char *portstr) { if (ap_ctx_get(r->ctx, "ssl::proxy::enabled") == PFALSE) return DECLINED; |
