Fix compiler warnings when using openssl-dev 1.0.0+

Review: https://reviewboard.asterisk.org/r/1016/


git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/1.6.2@295440 65c4cc65-6c06-0410-ace0-fbb531ad65f3
1.6.2
Paul Belanger 15 years ago
parent 4fc933a2b7
commit 952edec236

@ -153,7 +153,7 @@ struct aji_client {
#ifdef HAVE_OPENSSL #ifdef HAVE_OPENSSL
SSL_CTX *ssl_context; SSL_CTX *ssl_context;
SSL *ssl_session; SSL *ssl_session;
SSL_METHOD *ssl_method; const SSL_METHOD *ssl_method;
unsigned int stream_flags; unsigned int stream_flags;
#endif /* HAVE_OPENSSL */ #endif /* HAVE_OPENSSL */
enum aji_state state; enum aji_state state;

@ -618,40 +618,45 @@ static int aji_tls_handshake(struct aji_client *client)
{ {
int ret; int ret;
int sock; int sock;
ast_debug(1, "Starting TLS handshake\n"); ast_debug(1, "Starting TLS handshake\n");
/* Choose an SSL/TLS protocol version, create SSL_CTX */ /* Choose an SSL/TLS protocol version, create SSL_CTX */
client->ssl_method = SSLv3_method(); client->ssl_method = SSLv3_method();
client->ssl_context = SSL_CTX_new(client->ssl_method); client->ssl_context = SSL_CTX_new((SSL_METHOD *) client->ssl_method);
if (!client->ssl_context) if (!client->ssl_context) {
return IKS_NET_TLSFAIL; return IKS_NET_TLSFAIL;
}
/* Create new SSL session */ /* Create new SSL session */
client->ssl_session = SSL_new(client->ssl_context); client->ssl_session = SSL_new(client->ssl_context);
if (!client->ssl_session) if (!client->ssl_session) {
return IKS_NET_TLSFAIL; return IKS_NET_TLSFAIL;
}
/* Enforce TLS on our XMPP connection */ /* Enforce TLS on our XMPP connection */
sock = iks_fd(client->p); sock = iks_fd(client->p);
ret = SSL_set_fd(client->ssl_session, sock); ret = SSL_set_fd(client->ssl_session, sock);
if (!ret) if (!ret) {
return IKS_NET_TLSFAIL; return IKS_NET_TLSFAIL;
}
/* Perform SSL handshake */ /* Perform SSL handshake */
ret = SSL_connect(client->ssl_session); ret = SSL_connect(client->ssl_session);
if (!ret) if (!ret) {
return IKS_NET_TLSFAIL; return IKS_NET_TLSFAIL;
}
client->stream_flags &= (~TRY_SECURE); client->stream_flags &= (~TRY_SECURE);
client->stream_flags |= SECURE; client->stream_flags |= SECURE;
/* Sent over the established TLS connection */ /* Sent over the established TLS connection */
ret = aji_send_header(client, client->jid->server); ret = aji_send_header(client, client->jid->server);
if (ret != IKS_OK) if (ret != IKS_OK) {
return IKS_NET_TLSFAIL; return IKS_NET_TLSFAIL;
}
ast_debug(1, "TLS started with server\n"); ast_debug(1, "TLS started with server\n");
return IKS_OK; return IKS_OK;
} }

Loading…
Cancel
Save