diff options
author | Roger Dingledine <arma@torproject.org> | 2008-02-24 00:35:20 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2008-02-24 00:35:20 +0000 |
commit | a0bc80bbf86eea190bb4c980c8d00561b858b79c (patch) | |
tree | 479ce41a0a66ed5cfd4d3d1811931fca515aaedf | |
parent | 31f72a3d8007096a59f8eb6be51c37d4c829c334 (diff) | |
download | tor-a0bc80bbf86eea190bb4c980c8d00561b858b79c.tar.gz tor-a0bc80bbf86eea190bb4c980c8d00561b858b79c.zip |
<weasel> tortls.c: In function `tor_tls_client_is_using_v2_ciphers':
<weasel> tortls.c:634: warning: passing arg 1 of `SSL_get_session' discards
qualifiers from pointer target type
Nick, see if you like this patch.
svn:r13690
-rw-r--r-- | src/common/tortls.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/common/tortls.c b/src/common/tortls.c index f33986a1e5..c57daebf78 100644 --- a/src/common/tortls.c +++ b/src/common/tortls.c @@ -631,7 +631,7 @@ tor_tls_client_is_using_v2_ciphers(const SSL *ssl, const char *address) SSL_SESSION *session; /* If we reached this point, we just got a client hello. See if there is * a cipher list. */ - if (!(session = SSL_get_session(ssl))) { + if (!(session = SSL_get_session((SSL *)ssl))) { log_warn(LD_NET, "No session on TLS?"); return 0; } |