httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 52210] Add TLS Next Protocol Negotiation (NPN) support to mod_ssl
Date Wed, 11 Apr 2012 22:43:00 GMT
https://issues.apache.org/bugzilla/show_bug.cgi?id=52210

--- Comment #7 from Anders Kaseorg <andersk@mit.edu> 2012-04-11 22:43:00 UTC ---
It’s not safe to const char ** to const unsigned char **, but it is safe to
cast const unsigned char * to const char * (because a specific exemption in the
strict aliasing rules allows any type of object to be accessed through a
pointer to a character type).  So do this instead:

const unsigned char *next_proto = NULL;
SSL_get0_next_proto_negotiated(inctx->ssl, &next_proto, &next_proto_len);
ssl_run_npn_proto_negotiated_hook(f->c, (const char *)next_proto,
next_proto_len);

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message