gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r7547 - in libmicrohttpd: . src/daemon src/daemon/https/ope


From: gnunet
Subject: [GNUnet-SVN] r7547 - in libmicrohttpd: . src/daemon src/daemon/https/openpgp src/daemon/https/tls src/daemon/https/x509 src/testcurl src/testcurl/https
Date: Tue, 12 Aug 2008 17:24:46 -0600 (MDT)

Author: lv-426
Date: 2008-08-12 17:24:46 -0600 (Tue, 12 Aug 2008)
New Revision: 7547

Modified:
   libmicrohttpd/configure.ac
   libmicrohttpd/src/daemon/daemon.c
   libmicrohttpd/src/daemon/https/openpgp/gnutls_ia.c
   libmicrohttpd/src/daemon/https/tls/auth_anon.c
   libmicrohttpd/src/daemon/https/tls/auth_anon.h
   libmicrohttpd/src/daemon/https/tls/auth_cert.c
   libmicrohttpd/src/daemon/https/tls/auth_cert.h
   libmicrohttpd/src/daemon/https/tls/auth_dh_common.c
   libmicrohttpd/src/daemon/https/tls/auth_dh_common.h
   libmicrohttpd/src/daemon/https/tls/auth_dhe.c
   libmicrohttpd/src/daemon/https/tls/auth_rsa.c
   libmicrohttpd/src/daemon/https/tls/ext_cert_type.c
   libmicrohttpd/src/daemon/https/tls/ext_inner_application.c
   libmicrohttpd/src/daemon/https/tls/ext_max_record.c
   libmicrohttpd/src/daemon/https/tls/ext_oprfi.c
   libmicrohttpd/src/daemon/https/tls/ext_server_name.c
   libmicrohttpd/src/daemon/https/tls/gnutls_alert.c
   libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c
   libmicrohttpd/src/daemon/https/tls/gnutls_auth.c
   libmicrohttpd/src/daemon/https/tls/gnutls_cert.c
   libmicrohttpd/src/daemon/https/tls/gnutls_constate.c
   libmicrohttpd/src/daemon/https/tls/gnutls_errors.c
   libmicrohttpd/src/daemon/https/tls/gnutls_errors.h
   libmicrohttpd/src/daemon/https/tls/gnutls_extensions.c
   libmicrohttpd/src/daemon/https/tls/gnutls_global.c
   libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c
   libmicrohttpd/src/daemon/https/tls/gnutls_handshake.h
   libmicrohttpd/src/daemon/https/tls/gnutls_mpi.c
   libmicrohttpd/src/daemon/https/tls/gnutls_pk.c
   libmicrohttpd/src/daemon/https/tls/gnutls_priority.c
   libmicrohttpd/src/daemon/https/tls/gnutls_session.c
   libmicrohttpd/src/daemon/https/tls/gnutls_session_pack.c
   libmicrohttpd/src/daemon/https/tls/gnutls_session_pack.h
   libmicrohttpd/src/daemon/https/tls/gnutls_state.c
   libmicrohttpd/src/daemon/https/tls/gnutls_ui.c
   libmicrohttpd/src/daemon/https/x509/common.c
   libmicrohttpd/src/daemon/https/x509/crl.c
   libmicrohttpd/src/daemon/https/x509/crl_write.c
   libmicrohttpd/src/daemon/https/x509/crq.c
   libmicrohttpd/src/daemon/https/x509/dn.c
   libmicrohttpd/src/daemon/https/x509/extensions.c
   libmicrohttpd/src/daemon/https/x509/mpi.c
   libmicrohttpd/src/daemon/https/x509/pkcs12.c
   libmicrohttpd/src/daemon/https/x509/pkcs12_bag.c
   libmicrohttpd/src/daemon/https/x509/pkcs7.c
   libmicrohttpd/src/daemon/https/x509/privkey_pkcs8.c
   libmicrohttpd/src/daemon/https/x509/sign.c
   libmicrohttpd/src/daemon/https/x509/x509.c
   libmicrohttpd/src/daemon/https/x509/x509_privkey.c
   libmicrohttpd/src/daemon/https/x509/x509_verify.c
   libmicrohttpd/src/daemon/https/x509/x509_write.c
   libmicrohttpd/src/testcurl/daemon_options_test.c
   libmicrohttpd/src/testcurl/https/Makefile.am
   libmicrohttpd/src/testcurl/https/tls_daemon_options_test.c
Log:
TLS client side code builds builds according to added MHD_DEBUG_TLS 
configuration option

Modified: libmicrohttpd/configure.ac
===================================================================
--- libmicrohttpd/configure.ac  2008-08-12 19:51:15 UTC (rev 7546)
+++ libmicrohttpd/configure.ac  2008-08-12 23:24:46 UTC (rev 7547)
@@ -130,12 +130,11 @@
 AC_DEFINE_UNQUOTED([MHD_REQ_CURL_OPENSSL_VERSION], 
"$MHD_REQ_CURL_OPENSSL_VERSION", [required cURL SSL version to run tests])
 AC_DEFINE_UNQUOTED([MHD_REQ_CURL_GNUTLS_VERSION], 
"$MHD_REQ_CURL_GNUTLS_VERSION", [gnuTLS lib version - used in conjunction with 
cURL])
 
-
 # large file support (> 4 GB)
 AC_SYS_LARGEFILE
 AC_FUNC_FSEEKO
 
-# optional: have error messages?
+# optional: have error messages ?
 AC_MSG_CHECKING(--enable-messages argument)
 AC_ARG_ENABLE(messages,
    [AS_HELP_STRING([--enable-messages],
@@ -148,6 +147,24 @@
  AC_DEFINE([HAVE_MESSAGES],[1],[Include error messages])
 fi
 
+# optional: compile TLS client side code [only for test running] ?
+AC_MSG_CHECKING(--enable-client-side argument)
+AC_ARG_ENABLE(client-side,
+   [AS_HELP_STRING([--enable-client-side],
+               [Compile client side code])],
+   [enable_client_side=$enableval],
+   [enable_client_side="no"])
+AC_MSG_RESULT($enable_client_side)
+if test "$enable_client_side" = "no"
+then
+ AC_DEFINE([MHD_DEBUG_TLS],[0],[Compile client side code. This will enable 
running some test cases.])
+ MSG_CLIENT_SIDE="disabled. running some test cases won't be possible"
+else
+ AC_DEFINE([MHD_DEBUG_TLS],[1],[Compile client side code. This will enable 
running some test cases.])
+ MSG_CLIENT_SIDE="enabled" 
+fi
+AM_CONDITIONAL(MHD_DEBUG_TLS, test "$enable_client_side" != "no")
+
 # optional: have zzuf, socat?
 AC_CHECK_PROG([HAVE_ZZUF],[zzuf], 1, 0)
 AC_CHECK_PROG([HAVE_SOCAT],[socat], 1, 0)
@@ -207,7 +224,7 @@
    [AS_HELP_STRING([--enable-OpenPGP],
                [enable OpenPGP support (default is no)])],
    [enable_openpgp=$enableval],
-   [enable_openpgp="yes"])
+   [enable_openpgp="no"])
 AC_MSG_RESULT($enable_openpgp)
 if test "$enable_openpgp" = "yes"
 then
@@ -320,17 +337,18 @@
 AC_MSG_NOTICE([Configured to build curl/libcurl:
   Configuration Summery:
   
-  os:              ${host_os}
-  target dir:      ${prefix}
-  messages:        ${enable_messages}
-  HTTPS support:   ${enable_HTTPS}     
-  TLS support:     ${enable_TLS}
-  SSLv3 support:   ${enable_SSL}
-  OpenGPG support: ${enable_openpgp}
-  x509 support:    ${enable_x509}
-  libgcrypt:       ${MSG_GCRYPT}
+  os:                ${host_os}
+  target dir:        ${prefix}
+  messages:          ${enable_messages}
+  HTTPS support:     ${enable_HTTPS}   
+  TLS support:       ${enable_TLS}
+  SSLv3 support:     ${enable_SSL}
+  OpenGPG support:   ${enable_openpgp}
+  x509 support:      ${enable_x509}
+  libgcrypt:         ${MSG_GCRYPT}
   
   # Testing
-  libcurl:         ${MSG_CURL}         
+  libcurl:           ${MSG_CURL}
+  client code dep.:  ${MSG_CLIENT_SIDE}                
 ])
 

Modified: libmicrohttpd/src/daemon/daemon.c
===================================================================
--- libmicrohttpd/src/daemon/daemon.c   2008-08-12 19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/daemon.c   2008-08-12 23:24:46 UTC (rev 7547)
@@ -109,12 +109,12 @@
 #if HAVE_MESSAGES
       MHD_DLOG (daemon, "Failed to load certificate\n");
 #endif
-      return MHD_NO;
+      return -1;
     }
 }
 
 /* initialize security aspects of the HTTPS daemon */
-int
+static int
 MHD_TLS_init (struct MHD_Daemon *daemon)
 {
   int ret;
@@ -129,24 +129,21 @@
          }
       MHD_gnutls_dh_params_generate2 (daemon->dh_params, 1024);
       MHD_gnutls_anon_set_server_dh_params (daemon->anon_cred, 
daemon->dh_params);
-      break;
+      return 0;
     case MHD_GNUTLS_CRD_CERTIFICATE:
       ret = MHD_gnutls_certificate_allocate_credentials (&daemon->x509_cred) ;
       if (ret != 0) {
                return GNUTLS_E_MEMORY_ERROR;
          }
-      if ((ret = MHD_init_daemon_certificate (daemon)) != 0)
-        return ret;
+      return MHD_init_daemon_certificate (daemon);
     default:
 #if HAVE_MESSAGES
       MHD_DLOG (daemon,
                 "Error: no daemon credentials type found. f: %s, l: %d\n",
                 __FUNCTION__, __LINE__);
 #endif
-      break;
+      return -1;
     }
-
-  return MHD_NO;
 }
 
 inline static int
@@ -1028,7 +1025,7 @@
 
 #if HTTPS_SUPPORT
   /* initialize HTTPS daemon certificate aspects & send / recv functions */
-  if (options & MHD_USE_SSL && MHD_TLS_init (retVal) != 0)
+  if ((options & MHD_USE_SSL) && MHD_TLS_init (retVal))
     {
 #if HAVE_MESSAGES
       MHD_DLOG (retVal, "Failed to initialize HTTPS daemon\n");

Modified: libmicrohttpd/src/daemon/https/openpgp/gnutls_ia.c
===================================================================
--- libmicrohttpd/src/daemon/https/openpgp/gnutls_ia.c  2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/openpgp/gnutls_ia.c  2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -9,12 +9,12 @@
  * it under the terms of the GNU General Public License as published by
  * the Free Software Foundation, either version 3 of the License, or
  * (at your option) any later version.
- *               
+ *
  * GNUTLS-EXTRA is distributed in the hope that it will be useful,
  * but WITHOUT ANY WARRANTY; without even the implied warranty of
  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  * GNU General Public License for more details.
- *                               
+ *
  * You should have received a copy of the GNU General Public License
  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
  */
@@ -448,10 +448,6 @@
   return len;
 }
 
-/* XXX rewrite the following two functions as state machines, to
-   handle EAGAIN/EINTERRUPTED?  just add more problems to callers,
-   though.  */
-
 int
 _gnutls_ia_client_handshake (mhd_gtls_session_t session)
 {
@@ -617,7 +613,7 @@
   if (!ext->gnutls_ia_allowskip || !MHD_gtls_session_is_resumed (session))
     return 1;
 
-  /* If we're resuming and we and the peer both allow skipping on resumption: 
+  /* If we're resuming and we and the peer both allow skipping on resumption:
    * don't do IA */
 
   return !ext->gnutls_ia_peer_allowskip;

Modified: libmicrohttpd/src/daemon/https/tls/auth_anon.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_anon.c      2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/auth_anon.c      2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -40,15 +40,15 @@
 #include <gnutls_state.h>
 #include <auth_dh_common.h>
 
-static int gen_anon_server_kx (mhd_gtls_session_t, opaque **);
-static int proc_anon_client_kx (mhd_gtls_session_t, opaque *, size_t);
+static int mhd_gtls_gen_anon_server_kx (mhd_gtls_session_t, opaque **);
+static int mhd_gtls_proc_anon_client_kx (mhd_gtls_session_t, opaque *, size_t);
 static int mhd_gtls_proc_anon_server_kx (mhd_gtls_session_t, opaque *, size_t);
 
-const mhd_gtls_mod_auth_st anon_auth_struct = {
+const mhd_gtls_mod_auth_st mhd_gtls_anon_auth_struct = {
   "ANON",
   NULL,
   NULL,
-  gen_anon_server_kx,
+  mhd_gtls_gen_anon_server_kx,
   mhd_gtls_gen_dh_common_client_kx,      /* this can be shared */
   NULL,
   NULL,
@@ -56,13 +56,13 @@
   NULL,
   NULL,                         /* certificate */
   mhd_gtls_proc_anon_server_kx,
-  proc_anon_client_kx,
+  mhd_gtls_proc_anon_client_kx,
   NULL,
   NULL
 };
 
 static int
-gen_anon_server_kx (mhd_gtls_session_t session, opaque ** data)
+mhd_gtls_gen_anon_server_kx (mhd_gtls_session_t session, opaque ** data)
 {
   mpi_t g, p;
   const mpi_t *mpis;
@@ -111,7 +111,7 @@
 
 
 static int
-proc_anon_client_kx (mhd_gtls_session_t session, opaque * data,
+mhd_gtls_proc_anon_client_kx (mhd_gtls_session_t session, opaque * data,
                      size_t _data_size)
 {
   mhd_gtls_anon_server_credentials_t cred;

Modified: libmicrohttpd/src/daemon/https/tls/auth_anon.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_anon.h      2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/auth_anon.h      2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -42,7 +42,7 @@
 
 typedef struct mhd_gtls_anon_auth_info_st
 {
-  dh_info_st dh;
+  mhd_gtls_dh_info_st dh;
 } * mhd_anon_auth_info_t;
 
 typedef struct mhd_gtls_anon_auth_info_st anon_auth_info_st;

Modified: libmicrohttpd/src/daemon/https/tls/auth_cert.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_cert.c      2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/auth_cert.c      2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -147,7 +147,7 @@
        (_gnutls_get_pkix (), "PKIX1.Certificate", &dn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&dn, cert->raw.data, cert->raw.size, NULL);
@@ -156,7 +156,7 @@
       /* couldn't decode DER */
       gnutls_assert ();
       asn1_delete_structure (&dn);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding_startEnd (dn, cert->raw.data, cert->raw.size,
@@ -167,7 +167,7 @@
       /* couldn't decode DER */
       gnutls_assert ();
       asn1_delete_structure (&dn);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
   asn1_delete_structure (&dn);
 
@@ -613,7 +613,7 @@
  */
 
 int
-_gnutls_gen_x509_crt (mhd_gtls_session_t session, opaque ** data)
+mhd_gtls_gen_x509_crt (mhd_gtls_session_t session, opaque ** data)
 {
   int ret, i;
   opaque *pdata;
@@ -671,7 +671,7 @@
 { PGP_KEY_FINGERPRINT, PGP_KEY };
 
 int
-_gnutls_gen_openpgp_certificate (mhd_gtls_session_t session, opaque ** data)
+mhd_gtls_gen_openpgp_certificate (mhd_gtls_session_t session, opaque ** data)
 {
   int ret;
   opaque *pdata;
@@ -720,7 +720,7 @@
 }
 
 int
-_gnutls_gen_openpgp_certificate_fpr (mhd_gtls_session_t session, opaque ** 
data)
+mhd_gtls_gen_openpgp_certificate_fpr (mhd_gtls_session_t session, opaque ** 
data)
 {
   int ret, packet_size;
   size_t fpr_size;
@@ -745,7 +745,7 @@
   if (apr_cert_list_length > 0 && apr_cert_list[0].version == 4)
     packet_size += 20 + 1;
   else                          /* empty certificate case */
-    return _gnutls_gen_openpgp_certificate (session, data);
+    return mhd_gtls_gen_openpgp_certificate (session, data);
 
   (*data) = gnutls_malloc (packet_size);
   pdata = (*data);
@@ -793,12 +793,12 @@
     {
     case MHD_GNUTLS_CRT_OPENPGP:
       if (mhd_gtls_openpgp_send_fingerprint (session) == 0)
-        return _gnutls_gen_openpgp_certificate (session, data);
+        return mhd_gtls_gen_openpgp_certificate (session, data);
       else
-        return _gnutls_gen_openpgp_certificate_fpr (session, data);
+        return mhd_gtls_gen_openpgp_certificate_fpr (session, data);
 
     case MHD_GNUTLS_CRT_X509:
-      return _gnutls_gen_x509_crt (session, data);
+      return mhd_gtls_gen_x509_crt (session, data);
 
     default:
       gnutls_assert ();
@@ -812,9 +812,9 @@
   switch (session->security_parameters.cert_type)
     {
     case MHD_GNUTLS_CRT_OPENPGP:
-      return _gnutls_gen_openpgp_certificate (session, data);
+      return mhd_gtls_gen_openpgp_certificate (session, data);
     case MHD_GNUTLS_CRT_X509:
-      return _gnutls_gen_x509_crt (session, data);
+      return mhd_gtls_gen_x509_crt (session, data);
     default:
       gnutls_assert ();
       return GNUTLS_E_INTERNAL_ERROR;
@@ -826,7 +826,7 @@
 
 #define CLEAR_CERTS for(x=0;x<peer_certificate_list_size;x++) 
mhd_gtls_gcert_deinit(&peer_certificate_list[x])
 int
-_gnutls_proc_x509_server_certificate (mhd_gtls_session_t session,
+mhd_gtls_proc_x509_server_certificate (mhd_gtls_session_t session,
                                       opaque * data, size_t data_size)
 {
   int size, len, ret;
@@ -968,7 +968,7 @@
 
 #define CLEAR_CERTS for(x=0;x<peer_certificate_list_size;x++) 
mhd_gtls_gcert_deinit(&peer_certificate_list[x])
 int
-_gnutls_proc_openpgp_server_certificate (mhd_gtls_session_t session,
+mhd_gtls_proc_openpgp_server_certificate (mhd_gtls_session_t session,
                                          opaque * data, size_t data_size)
 {
   int size, ret, len;
@@ -1153,10 +1153,10 @@
   switch (session->security_parameters.cert_type)
     {
     case MHD_GNUTLS_CRT_OPENPGP:
-      return _gnutls_proc_openpgp_server_certificate (session,
+      return mhd_gtls_proc_openpgp_server_certificate (session,
                                                       data, data_size);
     case MHD_GNUTLS_CRT_X509:
-      return _gnutls_proc_x509_server_certificate (session, data, data_size);
+      return mhd_gtls_proc_x509_server_certificate (session, data, data_size);
     default:
       gnutls_assert ();
       return GNUTLS_E_INTERNAL_ERROR;

Modified: libmicrohttpd/src/daemon/https/tls/auth_cert.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_cert.h      2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/auth_cert.h      2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -98,7 +98,7 @@
 
   gnutls_certificate_client_retrieve_function *client_get_cert_callback;
   gnutls_certificate_server_retrieve_function *server_get_cert_callback;
-} certificate_credentials_st;
+} mhd_gtls_cert_credentials_st;
 
 typedef struct mhd_gtls_rsa_info_st
 {
@@ -115,14 +115,14 @@
   /* These (dh/rsa) are just copies from the credentials_t structure.
    * They must be freed.
    */
-  dh_info_st dh;
+  mhd_gtls_dh_info_st dh;
   rsa_info_st rsa_export;
 
   gnutls_datum_t *raw_certificate_list;        /* holds the raw certificate of 
the
                                         * peer.
                                         */
   unsigned int ncerts;         /* holds the size of the list above */
-} *cert_auth_info_t;
+} * cert_auth_info_t;
 
 typedef struct mhd_gtls_cert_auth_info_st cert_auth_info_st;
 

Modified: libmicrohttpd/src/daemon/https/tls/auth_dh_common.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_dh_common.c 2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/auth_dh_common.c 2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -39,10 +39,10 @@
 #include <auth_dh_common.h>
 #include <gnutls_algorithms.h>
 
-/* Frees the dh_info_st structure.
+/* Frees the mhd_gtls_dh_info_st structure.
  */
 void
-mhd_gtls_free_dh_info (dh_info_st * dh)
+mhd_gtls_free_dh_info (mhd_gtls_dh_info_st * dh)
 {
   dh->secret_bits = 0;
   _gnutls_free_datum (&dh->prime);

Modified: libmicrohttpd/src/daemon/https/tls/auth_dh_common.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_dh_common.h 2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/auth_dh_common.h 2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -32,9 +32,9 @@
   gnutls_datum_t prime;
   gnutls_datum_t generator;
   gnutls_datum_t public_key;
-} dh_info_st;
+} mhd_gtls_dh_info_st;
 
-void mhd_gtls_free_dh_info (dh_info_st * dh);
+void mhd_gtls_free_dh_info (mhd_gtls_dh_info_st * dh);
 int mhd_gtls_gen_dh_common_client_kx (mhd_gtls_session_t, opaque **);
 int mhd_gtls_proc_dh_common_client_kx (mhd_gtls_session_t session,
                                      opaque * data, size_t _data_size,

Modified: libmicrohttpd/src/daemon/https/tls/auth_dhe.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_dhe.c       2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/auth_dhe.c       2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -43,7 +43,7 @@
 static int proc_dhe_server_kx (mhd_gtls_session_t, opaque *, size_t);
 static int proc_dhe_client_kx (mhd_gtls_session_t, opaque *, size_t);
 
-const mhd_gtls_mod_auth_st dhe_rsa_auth_struct = {
+const mhd_gtls_mod_auth_st mhd_gtls_dhe_rsa_auth_struct = {
   "DHE_RSA",
   mhd_gtls_gen_cert_server_certificate,
   mhd_gtls_gen_cert_client_certificate,
@@ -60,7 +60,7 @@
   mhd_gtls_proc_cert_cert_req    /* proc server cert request */
 };
 
-const mhd_gtls_mod_auth_st dhe_dss_auth_struct = {
+const mhd_gtls_mod_auth_st mhd_gtls_dhe_dss_auth_struct = {
   "DHE_DSS",
   mhd_gtls_gen_cert_server_certificate,
   mhd_gtls_gen_cert_client_certificate,

Modified: libmicrohttpd/src/daemon/https/tls/auth_rsa.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_rsa.c       2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/auth_rsa.c       2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -45,7 +45,7 @@
 int _gnutls_gen_rsa_client_kx (mhd_gtls_session_t, opaque **);
 int _gnutls_proc_rsa_client_kx (mhd_gtls_session_t, opaque *, size_t);
 
-const mhd_gtls_mod_auth_st rsa_auth_struct = {
+const mhd_gtls_mod_auth_st mhd_gtls_rsa_auth_struct = {
   "RSA",
   mhd_gtls_gen_cert_server_certificate,
   mhd_gtls_gen_cert_client_certificate,

Modified: libmicrohttpd/src/daemon/https/tls/ext_cert_type.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/ext_cert_type.c  2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/ext_cert_type.c  2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -52,6 +52,7 @@
   int new_type = -1, ret, i;
   ssize_t data_size = _data_size;
 
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
       if (data_size > 0)
@@ -82,6 +83,7 @@
         }
     }
   else
+#endif
     {                           /* SERVER SIDE - we must check if the sent 
cert type is the right one
                                  */
       if (data_size > 1)
@@ -147,6 +149,7 @@
   unsigned len, i;
 
   /* this function sends the client extension data (dnsname) */
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
 
@@ -186,6 +189,7 @@
 
     }
   else
+#endif
     {                           /* server side */
       if (session->security_parameters.cert_type != DEFAULT_CERT_TYPE)
         {

Modified: libmicrohttpd/src/daemon/https/tls/ext_inner_application.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/ext_inner_application.c  2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/ext_inner_application.c  2008-08-12 
23:24:46 UTC (rev 7547)
@@ -73,7 +73,7 @@
 
   /* Set ext->gnutls_ia_enable depending on whether we have a TLS/IA
      credential in the session. */
-
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
       gnutls_ia_client_credentials_t cred = (gnutls_ia_client_credentials_t)
@@ -83,6 +83,7 @@
         ext->gnutls_ia_enable = 1;
     }
   else
+#endif
     {
       gnutls_ia_server_credentials_t cred = (gnutls_ia_server_credentials_t)
         mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_IA, NULL);
@@ -114,6 +115,7 @@
 
   *data = YES;
 
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
 
@@ -123,6 +125,7 @@
         *data = NO;
     }
   else
+#endif
     {
 
       /* Server: value follows local setting and client's setting, but only

Modified: libmicrohttpd/src/daemon/https/tls/ext_max_record.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/ext_max_record.c 2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/ext_max_record.c 2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -30,7 +30,7 @@
 #include "gnutls_num.h"
 #include <ext_max_record.h>
 
-/* 
+/*
  * In case of a server: if a MAX_RECORD_SIZE extension type is received then 
it stores
  * into the session the new value. The server may use 
gnutls_get_max_record_size(),
  * in order to access it.
@@ -66,7 +66,7 @@
         }
     }
   else
-    {                           /* CLIENT SIDE - we must check if the sent 
record size is the right one 
+    {                           /* CLIENT SIDE - we must check if the sent 
record size is the right one
                                  */
       if (data_size > 0)
         {
@@ -107,6 +107,7 @@
 {
   uint16_t len;
   /* this function sends the client extension data (dnsname) */
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
 
@@ -127,6 +128,7 @@
 
     }
   else
+#endif
     {                           /* server side */
 
       if (session->security_parameters.max_record_recv_size !=

Modified: libmicrohttpd/src/daemon/https/tls/ext_oprfi.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/ext_oprfi.c      2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/ext_oprfi.c      2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -114,9 +114,11 @@
 mhd_gtls_oprfi_recv_params (mhd_gtls_session_t session,
                            const opaque * data, size_t data_size)
 {
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     return oprfi_recv_client (session, data, data_size);
   else
+#endif
     return oprfi_recv_server (session, data, data_size);
 }
 
@@ -194,9 +196,6 @@
 mhd_gtls_oprfi_send_params (mhd_gtls_session_t session,
                            opaque * data, size_t data_size)
 {
-  if (session->security_parameters.entity == GNUTLS_CLIENT)
-    return oprfi_send_client (session, data, data_size);
-  else
     return oprfi_send_server (session, data, data_size);
 }
 

Modified: libmicrohttpd/src/daemon/https/tls/ext_server_name.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/ext_server_name.c        2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/ext_server_name.c        2008-08-12 
23:24:46 UTC (rev 7547)
@@ -28,7 +28,7 @@
 #include "gnutls_num.h"
 #include <ext_server_name.h>
 
-/* 
+/*
  * In case of a server: if a NAME_DNS extension type is received then it stores
  * into the session the value of NAME_DNS. The server may use 
gnutls_ext_get_server_name(),
  * in order to access it.
@@ -133,34 +133,34 @@
   ssize_t data_size = _data_size;
   int total_size = 0;
 
-  /* this function sends the client extension data (dnsname) 
-   */
+  /* this function sends the client extension data (dnsname) */
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
 
       if (session->security_parameters.extensions.server_names_size == 0)
         return 0;
 
-      /* uint16_t 
+      /* uint16_t
        */
       total_size = 2;
       for (i = 0;
            i < session->security_parameters.extensions.server_names_size; i++)
         {
-          /* count the total size 
+          /* count the total size
            */
           len =
             session->security_parameters.extensions.server_names[i].
             name_length;
 
-          /* uint8_t + uint16_t + size 
+          /* uint8_t + uint16_t + size
            */
           total_size += 1 + 2 + len;
         }
 
       p = data;
 
-      /* UINT16: write total size of all names 
+      /* UINT16: write total size of all names
        */
       DECR_LENGTH_RET (data_size, 2, GNUTLS_E_SHORT_MEMORY_BUFFER);
       mhd_gtls_write_uint16 (total_size - 2, p);
@@ -205,7 +205,7 @@
             }
         }
     }
-
+#endif
   return total_size;
 }
 
@@ -238,13 +238,13 @@
                         unsigned int *type, unsigned int indx)
 {
   char *_data = data;
-
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
       gnutls_assert ();
       return GNUTLS_E_INVALID_REQUEST;
     }
-
+#endif
   if (indx + 1 > session->security_parameters.extensions.server_names_size)
     {
       return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE;
@@ -284,13 +284,13 @@
   * @name: is a string that contains the server name.
   * @name_length: holds the length of name
   *
-  * This function is to be used by clients that want to inform 
+  * This function is to be used by clients that want to inform
   * (via a TLS extension mechanism) the server of the name they
   * connected to. This should be used by clients that connect
   * to servers that do virtual hosting.
   *
   * The value of @name depends on the @ind type. In case of GNUTLS_NAME_DNS,
-  * an ASCII or UTF-8 null terminated string, without the trailing dot, is 
expected. 
+  * an ASCII or UTF-8 null terminated string, without the trailing dot, is 
expected.
   * IPv4 or IPv6 addresses are not permitted.
   *
   **/

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_alert.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_alert.c   2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_alert.c   2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -33,7 +33,7 @@
   const char *desc;
 } gnutls_alert_entry;
 
-static const gnutls_alert_entry sup_alerts[] = {
+static const gnutls_alert_entry mhd_gtls_sup_alerts[] = {
   {GNUTLS_A_CLOSE_NOTIFY, "Close notify"},
   {GNUTLS_A_UNEXPECTED_MESSAGE, "Unexpected message"},
   {GNUTLS_A_BAD_RECORD_MAC, "Bad record MAC"},
@@ -73,7 +73,7 @@
 
 #define GNUTLS_ALERT_LOOP(b) \
         const gnutls_alert_entry *p; \
-                for(p = sup_alerts; p->desc != NULL; p++) { b ; }
+                for(p = mhd_gtls_sup_alerts; p->desc != NULL; p++) { b ; }
 
 #define GNUTLS_ALERT_ID_LOOP(a) \
                         GNUTLS_ALERT_LOOP( if(p->alert == alert) { a; break; })

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c      2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c      2008-08-12 
23:24:46 UTC (rev 7547)
@@ -41,7 +41,7 @@
                                                  * needs to set */
 } gnutls_cred_map;
 
-static const gnutls_cred_map cred_mappings[] = {
+static const gnutls_cred_map mhd_gtls_cred_mappings[] = {
   {MHD_GNUTLS_KX_ANON_DH,
    MHD_GNUTLS_CRD_ANON,
    MHD_GNUTLS_CRD_ANON},
@@ -73,7 +73,7 @@
 
 #define GNUTLS_KX_MAP_LOOP(b) \
         const gnutls_cred_map *p; \
-                for(p = cred_mappings; p->algorithm != 0; p++) { b ; }
+                for(p = mhd_gtls_cred_mappings; p->algorithm != 0; p++) { b ; }
 
 #define GNUTLS_KX_MAP_ALG_LOOP_SERVER(a) \
                         GNUTLS_KX_MAP_LOOP( if(p->server_type == type) { a; 
break; })
@@ -100,7 +100,7 @@
  * RSA algorithm in the certificate then we can
  * use GNUTLS_KX_RSA or GNUTLS_KX_DHE_RSA.
  */
-static const gnutls_pk_map pk_mappings[] = {
+static const gnutls_pk_map mhd_gtls_pk_mappings[] = {
   {MHD_GNUTLS_KX_RSA,
    MHD_GNUTLS_PK_RSA,
    CIPHER_ENCRYPT},
@@ -120,7 +120,7 @@
 
 #define GNUTLS_PK_MAP_LOOP(b) \
         const gnutls_pk_map *p; \
-                for(p = pk_mappings; p->kx_algorithm != 0; p++) { b }
+                for(p = mhd_gtls_pk_mappings; p->kx_algorithm != 0; p++) { b }
 
 #define GNUTLS_PK_MAP_ALG_LOOP(a) \
                         GNUTLS_PK_MAP_LOOP( if(p->kx_algorithm == 
kx_algorithm) { a; break; })
@@ -136,7 +136,7 @@
   int supported;                /* 0 not supported, > 0 is supported */
 } gnutls_version_entry;
 
-static const gnutls_version_entry sup_versions[] = {
+static const gnutls_version_entry mhd_gtls_sup_versions[] = {
   {"SSL3.0",
    MHD_GNUTLS_SSL3,
    3,
@@ -165,7 +165,7 @@
 };
 
 /* Keep the contents of this struct the same as the previous one. */
-static const gnutls_protocol_t supported_protocols[] = { MHD_GNUTLS_SSL3,
+static const gnutls_protocol_t mhd_gtls_supported_protocols[] = { 
MHD_GNUTLS_SSL3,
   MHD_GNUTLS_TLS1_0,
   MHD_GNUTLS_TLS1_1,
   MHD_GNUTLS_TLS1_2,
@@ -174,7 +174,7 @@
 
 #define GNUTLS_VERSION_LOOP(b) \
         const gnutls_version_entry *p; \
-                for(p = sup_versions; p->name != NULL; p++) { b ; }
+                for(p = mhd_gtls_sup_versions; p->name != NULL; p++) { b ; }
 
 #define GNUTLS_VERSION_ALG_LOOP(a) \
                         GNUTLS_VERSION_LOOP( if(p->id == version) { a; break; 
})
@@ -196,7 +196,7 @@
  * View first: "The order of encryption and authentication for
  * protecting communications" by Hugo Krawczyk - CRYPTO 2001
  */
-static const gnutls_cipher_entry algorithms[] = {
+static const gnutls_cipher_entry mhd_gtls_algorithms[] = {
   {"AES-256-CBC",
    MHD_GNUTLS_CIPHER_AES_256_CBC,
    16,
@@ -271,7 +271,7 @@
 };
 
 /* Keep the contents of this struct the same as the previous one. */
-static const gnutls_cipher_algorithm_t supported_ciphers[] =
+static const gnutls_cipher_algorithm_t mhd_gtls_supported_ciphers[] =
   { MHD_GNUTLS_CIPHER_AES_256_CBC,
   MHD_GNUTLS_CIPHER_AES_128_CBC,
   MHD_GNUTLS_CIPHER_3DES_CBC,
@@ -289,7 +289,7 @@
 
 #define GNUTLS_LOOP(b) \
         const gnutls_cipher_entry *p; \
-                for(p = algorithms; p->name != NULL; p++) { b ; }
+                for(p = mhd_gtls_algorithms; p->name != NULL; p++) { b ; }
 
 #define GNUTLS_ALG_LOOP(a) \
                         GNUTLS_LOOP( if(p->id == algorithm) { a; break; } )
@@ -303,7 +303,7 @@
 };
 typedef struct gnutls_hash_entry gnutls_hash_entry;
 
-static const gnutls_hash_entry hash_algorithms[] = {
+static const gnutls_hash_entry mhd_gtls_hash_algorithms[] = {
   {"SHA1",
    HASH_OID_SHA1,
    MHD_GNUTLS_MAC_SHA1,
@@ -327,7 +327,7 @@
 };
 
 /* Keep the contents of this struct the same as the previous one. */
-static const gnutls_mac_algorithm_t supported_macs[] = { MHD_GNUTLS_MAC_SHA1,
+static const gnutls_mac_algorithm_t mhd_gtls_supported_macs[] = { 
MHD_GNUTLS_MAC_SHA1,
   MHD_GNUTLS_MAC_MD5,
   MHD_GNUTLS_MAC_SHA256,
   MHD_GNUTLS_MAC_NULL,
@@ -336,7 +336,7 @@
 
 #define GNUTLS_HASH_LOOP(b) \
         const gnutls_hash_entry *p; \
-                for(p = hash_algorithms; p->name != NULL; p++) { b ; }
+                for(p = mhd_gtls_hash_algorithms; p->name != NULL; p++) { b ; }
 
 #define GNUTLS_HASH_ALG_LOOP(a) \
                         GNUTLS_HASH_LOOP( if(p->id == algorithm) { a; break; } 
)
@@ -364,7 +364,7 @@
    0}
 };
 
-static const gnutls_compression_method_t supported_compressions[] = {
+static const gnutls_compression_method_t mhd_gtls_supported_compressions[] = {
 #ifdef HAVE_LIBZ
   MHD_GNUTLS_COMP_DEFLATE,
 #endif
@@ -381,11 +381,11 @@
                         GNUTLS_COMPRESSION_LOOP( if(p->num == num) { a; break; 
} )
 
 /* Key Exchange Section */
-extern mhd_gtls_mod_auth_st rsa_auth_struct;
+extern mhd_gtls_mod_auth_st mhd_gtls_rsa_auth_struct;
 extern mhd_gtls_mod_auth_st rsa_export_auth_struct;
-extern mhd_gtls_mod_auth_st dhe_rsa_auth_struct;
-extern mhd_gtls_mod_auth_st dhe_dss_auth_struct;
-extern mhd_gtls_mod_auth_st anon_auth_struct;
+extern mhd_gtls_mod_auth_st mhd_gtls_dhe_rsa_auth_struct;
+extern mhd_gtls_mod_auth_st mhd_gtls_dhe_dss_auth_struct;
+extern mhd_gtls_mod_auth_st mhd_gtls_anon_auth_struct;
 extern mhd_gtls_mod_auth_st srp_auth_struct;
 extern mhd_gtls_mod_auth_st psk_auth_struct;
 extern mhd_gtls_mod_auth_st dhe_psk_auth_struct;
@@ -403,11 +403,11 @@
 
 static const mhd_gtls_kx_algo_entry_t mhd_gtls_kx_algorithms[] = {
 #ifdef ENABLE_ANON
-  {"ANON-DH", MHD_GNUTLS_KX_ANON_DH, &anon_auth_struct, 1, 0},
+  {"ANON-DH", MHD_GNUTLS_KX_ANON_DH, &mhd_gtls_anon_auth_struct, 1, 0},
 #endif
   {"RSA",
    MHD_GNUTLS_KX_RSA,
-   &rsa_auth_struct,
+   &mhd_gtls_rsa_auth_struct,
    0,
    0},
   {"RSA-EXPORT",
@@ -417,12 +417,12 @@
    1 /* needs RSA params */ },
   {"DHE-RSA",
    MHD_GNUTLS_KX_DHE_RSA,
-   &dhe_rsa_auth_struct,
+   &mhd_gtls_dhe_rsa_auth_struct,
    1,
    0},
   {"DHE-DSS",
    MHD_GNUTLS_KX_DHE_DSS,
-   &dhe_dss_auth_struct,
+   &mhd_gtls_dhe_dss_auth_struct,
    1,
    0},
 
@@ -444,7 +444,7 @@
 };
 
 /* Keep the contents of this struct the same as the previous one. */
-static const gnutls_kx_algorithm_t supported_kxs[] = {
+static const gnutls_kx_algorithm_t mhd_gtls_supported_kxs[] = {
 #ifdef ENABLE_ANON
   MHD_GNUTLS_KX_ANON_DH,
 #endif
@@ -485,7 +485,7 @@
   gnutls_protocol_t version;    /* this cipher suite is supported
                                  * from 'version' and above;
                                  */
-} gnutls_cipher_suite_entry;
+} mhd_gtls_cipher_suite_entry;
 
 /* RSA with NULL cipher and MD5 MAC
  * for test purposes.
@@ -581,9 +581,9 @@
 #define GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA1 { 0x00,0x45 }
 #define GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA1 { 0x00,0x88 }
 
-#define CIPHER_SUITES_COUNT 
sizeof(cs_algorithms)/sizeof(gnutls_cipher_suite_entry)-1
+#define CIPHER_SUITES_COUNT 
sizeof(mhd_gtls_cs_algorithms)/sizeof(mhd_gtls_cipher_suite_entry)-1
 
-static const gnutls_cipher_suite_entry cs_algorithms[] = {
+static const mhd_gtls_cipher_suite_entry mhd_gtls_cs_algorithms[] = {
   /* ANON_DH */
   GNUTLS_CIPHER_SUITE_ENTRY (GNUTLS_ANON_DH_ARCFOUR_MD5,
                              MHD_GNUTLS_CIPHER_ARCFOUR_128,
@@ -753,8 +753,8 @@
 };
 
 #define GNUTLS_CIPHER_SUITE_LOOP(b) \
-        const gnutls_cipher_suite_entry *p; \
-                for(p = cs_algorithms; p->name != NULL; p++) { b ; }
+        const mhd_gtls_cipher_suite_entry *p; \
+                for(p = mhd_gtls_cs_algorithms; p->name != NULL; p++) { b ; }
 
 #define GNUTLS_CIPHER_SUITE_ALG_LOOP(a) \
                         GNUTLS_CIPHER_SUITE_LOOP( if( (p->id.suite[0] == 
suite->suite[0]) && (p->id.suite[1] == suite->suite[1])) { a; break; } )
@@ -844,7 +844,7 @@
 const gnutls_mac_algorithm_t *
 MHD_gtls_mac_list (void)
 {
-  return supported_macs;
+  return mhd_gtls_supported_macs;
 }
 
 const char *
@@ -955,7 +955,7 @@
 const gnutls_compression_method_t *
 MHD_gtls_compression_list (void)
 {
-  return supported_compressions;
+  return mhd_gtls_supported_compressions;
 }
 
 /* return the tls number of the specified algorithm */
@@ -1145,7 +1145,7 @@
 const gnutls_cipher_algorithm_t *
 MHD_gtls_cipher_list (void)
 {
-  return supported_ciphers;
+  return mhd_gtls_supported_ciphers;
 }
 
 int
@@ -1232,7 +1232,7 @@
 const gnutls_kx_algorithm_t *
 MHD_gtls_kx_list (void)
 {
-  return supported_kxs;
+  return mhd_gtls_supported_kxs;
 }
 
 int
@@ -1376,7 +1376,7 @@
 const gnutls_protocol_t *
 MHD_gtls_protocol_list (void)
 {
-  return supported_protocols;
+  return mhd_gtls_supported_protocols;
 }
 
 int
@@ -1739,7 +1739,7 @@
 
   for (i = 0; i < count; i++)
     {
-      memcpy (&tmp_ciphers[i], &cs_algorithms[i].id,
+      memcpy (&tmp_ciphers[i], &mhd_gtls_cs_algorithms[i].id,
               sizeof (cipher_suite_st));
     }
 
@@ -1894,7 +1894,7 @@
   return ret;
 }
 
-static const gnutls_certificate_type_t supported_certificate_types[] =
+static const gnutls_certificate_type_t mhd_gtls_supported_certificate_types[] =
   { MHD_GNUTLS_CRT_X509,
   MHD_GNUTLS_CRT_OPENPGP,
   0
@@ -1914,7 +1914,7 @@
 const gnutls_certificate_type_t *
 MHD_gtls_certificate_type_list (void)
 {
-  return supported_certificate_types;
+  return mhd_gtls_supported_certificate_types;
 }
 
 /* returns the gnutls_pk_algorithm_t which is compatible with
@@ -1953,7 +1953,7 @@
 };
 typedef struct gnutls_sign_entry gnutls_sign_entry;
 
-static const gnutls_sign_entry sign_algorithms[] = {
+static const gnutls_sign_entry mhd_gtls_sign_algorithms[] = {
   {"RSA-SHA",
    SIG_RSA_SHA1_OID,
    GNUTLS_SIGN_RSA_SHA1,
@@ -1989,7 +1989,7 @@
 #define GNUTLS_SIGN_LOOP(b) \
   do {                                                                \
     const gnutls_sign_entry *p;                                               \
-    for(p = sign_algorithms; p->name != NULL; p++) { b ; }            \
+    for(p = mhd_gtls_sign_algorithms; p->name != NULL; p++) { b ; }           \
   } while (0)
 
 #define GNUTLS_SIGN_ALG_LOOP(a) \
@@ -2053,7 +2053,7 @@
 };
 typedef struct gnutls_pk_entry gnutls_pk_entry;
 
-static const gnutls_pk_entry pk_algorithms[] = {
+static const gnutls_pk_entry mhd_gtls_pk_algorithms[] = {
   {"RSA",
    PK_PKIX1_RSA_OID,
    MHD_GNUTLS_PK_RSA},
@@ -2074,7 +2074,7 @@
   gnutls_pk_algorithm_t ret = MHD_GNUTLS_PK_UNKNOWN;
   const gnutls_pk_entry *p;
 
-  for (p = pk_algorithms; p->name != NULL; p++)
+  for (p = mhd_gtls_pk_algorithms; p->name != NULL; p++)
     if (strcmp (p->oid, oid) == 0)
       {
         ret = p->id;
@@ -2090,7 +2090,7 @@
   const char *ret = NULL;
   const gnutls_pk_entry *p;
 
-  for (p = pk_algorithms; p->name != NULL; p++)
+  for (p = mhd_gtls_pk_algorithms; p->name != NULL; p++)
     if (p->id == algorithm)
       {
         ret = p->oid;

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_auth.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_auth.c    2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_auth.c    2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -286,7 +286,7 @@
 void
 mhd_gtls_free_auth_info (mhd_gtls_session_t session)
 {
-  dh_info_st *dh_info;
+  mhd_gtls_dh_info_st *dh_info;
   rsa_info_st *rsa_info;
 
   if (session == NULL || session->key == NULL)

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_cert.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_cert.c    2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_cert.c    2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -216,7 +216,7 @@
 MHD_gnutls_certificate_allocate_credentials (mhd_gtls_cert_credentials_t *
                                          res)
 {
-  *res = gnutls_calloc (1, sizeof (certificate_credentials_st));
+  *res = gnutls_calloc (1, sizeof (mhd_gtls_cert_credentials_st));
 
   if (*res == NULL)
     return GNUTLS_E_MEMORY_ERROR;

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_constate.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_constate.c        2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_constate.c        2008-08-12 
23:24:46 UTC (rev 7547)
@@ -50,7 +50,7 @@
 #define EXPORT_FINAL_KEY_SIZE 16
 
 /* This function is to be called after handshake, when master_secret,
- *  client_random and server_random have been initialized. 
+ *  client_random and server_random have been initialized.
  * This function creates the keys and stores them into pending session.
  * (session->cipher_specs)
  */
@@ -475,7 +475,7 @@
 {
   int ret;
 
-/* Setup the master secret 
+/* Setup the master secret
  */
   if ((ret = mhd_gtls_generate_master (session, 0), 0) < 0)
     {
@@ -621,7 +621,7 @@
         }
 
       break;
-
+#if MHD_DEBUG_TLS
     case GNUTLS_CLIENT:
       session->connection_state.read_cipher_state =
         mhd_gtls_cipher_init (session->security_parameters.
@@ -657,7 +657,7 @@
         }
 
       break;
-
+#endif
     default:                   /* this check is useless */
       gnutls_assert ();
       return GNUTLS_E_INTERNAL_ERROR;
@@ -815,7 +815,7 @@
 
 
       break;
-
+#if MHD_DEBUG_TLS
     case GNUTLS_CLIENT:
       session->connection_state.write_cipher_state =
         mhd_gtls_cipher_init (session->security_parameters.
@@ -850,7 +850,7 @@
         }
 
       break;
-
+#endif
     default:
       gnutls_assert ();
       return GNUTLS_E_INTERNAL_ERROR;
@@ -870,7 +870,7 @@
   return 0;
 }
 
-/* Sets the specified cipher into the pending session 
+/* Sets the specified cipher into the pending session
  */
 int
 mhd_gtls_set_read_cipher (mhd_gtls_session_t session,
@@ -925,7 +925,7 @@
 }
 
 
-/* Sets the specified algorithm into pending compression session 
+/* Sets the specified algorithm into pending compression session
  */
 int
 mhd_gtls_set_read_compression (mhd_gtls_session_t session,
@@ -963,7 +963,7 @@
 
 }
 
-/* Sets the specified kx algorithm into pending session 
+/* Sets the specified kx algorithm into pending session
  */
 int
 mhd_gtls_set_kx (mhd_gtls_session_t session, gnutls_kx_algorithm_t algo)

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_errors.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_errors.c  2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_errors.c  2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -48,7 +48,7 @@
 };
 typedef struct gnutls_error_entry gnutls_error_entry;
 
-static const gnutls_error_entry error_algorithms[] = {
+static const gnutls_error_entry mhd_gtls_error_algorithms[] = {
   /* "Short Description", Error code define, critical (0,1) -- 1 in most cases 
*/
   ERROR_ENTRY (N_("Success."), GNUTLS_E_SUCCESS, 0),
   ERROR_ENTRY (N_("Could not negotiate a supported cipher suite."),
@@ -255,7 +255,7 @@
 
 #define GNUTLS_ERROR_LOOP(b) \
         const gnutls_error_entry *p; \
-                for(p = error_algorithms; p->desc != NULL; p++) { b ; }
+                for(p = mhd_gtls_error_algorithms; p->desc != NULL; p++) { b ; 
}
 
 #define GNUTLS_ERROR_ALG_LOOP(a) \
                         GNUTLS_ERROR_LOOP( if(p->number == error) { a; break; 
} )
@@ -348,7 +348,7 @@
 }
 
 int
-_gnutls_asn2err (int asn_err)
+mhd_gtls_asn2err (int asn_err)
 {
   switch (asn_err)
     {
@@ -390,7 +390,7 @@
  * caller provided function
  */
 void
-_gnutls_log (int level, const char *fmt, ...)
+mhd_gtls_log (int level, const char *fmt, ...)
 {
   va_list args;
   char str[MAX_LOG_SIZE];

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_errors.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_errors.h  2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_errors.h  2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -36,17 +36,17 @@
 # define gnutls_assert()
 #endif
 
-int _gnutls_asn2err (int asn_err);
-void _gnutls_log (int, const char *fmt, ...);
+int mhd_gtls_asn2err (int asn_err);
+void mhd_gtls_log (int, const char *fmt, ...);
 
 extern int _gnutls_log_level;
 
 #ifdef C99_MACROS
 #define LEVEL(l, ...) if (_gnutls_log_level >= l || _gnutls_log_level > 9) \
-       _gnutls_log( l, __VA_ARGS__)
+       mhd_gtls_log( l, __VA_ARGS__)
 
 #define LEVEL_EQ(l, ...) if (_gnutls_log_level == l || _gnutls_log_level > 9) \
-       _gnutls_log( l, __VA_ARGS__)
+       mhd_gtls_log( l, __VA_ARGS__)
 
 # define _gnutls_debug_log(...) LEVEL(2, __VA_ARGS__)
 # define _gnutls_handshake_log(...) LEVEL(3, __VA_ARGS__)

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_extensions.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_extensions.c      2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_extensions.c      2008-08-12 
23:24:46 UTC (rev 7547)
@@ -119,12 +119,13 @@
   return ret;
 }
 
-/* Checks if the extension we just received is one of the 
+/* Checks if the extension we just received is one of the
  * requested ones. Otherwise it's a fatal error.
  */
 static int
 _gnutls_extension_list_check (mhd_gtls_session_t session, uint16_t type)
 {
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
       int i;
@@ -135,7 +136,7 @@
         }
       return GNUTLS_E_RECEIVED_ILLEGAL_EXTENSION;
     }
-
+#endif
   return 0;
 }
 
@@ -153,7 +154,6 @@
 
 #ifdef DEBUG
   int i;
-
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     for (i = 0; i < session->internals.extensions_sent_size; i++)
       {
@@ -217,7 +217,7 @@
 static void
 _gnutls_extension_list_add (mhd_gtls_session_t session, uint16_t type)
 {
-
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
       if (session->internals.extensions_sent_size < MAX_EXT_TYPES)
@@ -231,6 +231,7 @@
           _gnutls_debug_log ("extensions: Increase MAX_EXT_TYPES\n");
         }
     }
+#endif
 }
 
 int

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_global.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_global.c  2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_global.c  2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -159,7 +159,7 @@
 _gnutls_gcry_log_handler (void *dummy, int level,
                           const char *fmt, va_list list)
 {
-  _gnutls_log (level, fmt, list);
+  mhd_gtls_log (level, fmt, list);
 }
 #endif
 
@@ -288,7 +288,7 @@
   res = asn1_array2tree (pkix_asn1_tab, &_gnutls_pkix1_asn, NULL);
   if (res != ASN1_SUCCESS)
     {
-      result = _gnutls_asn2err (res);
+      result = mhd_gtls_asn2err (res);
       return result;
     }
 
@@ -296,7 +296,7 @@
   if (res != ASN1_SUCCESS)
     {
       asn1_delete_structure (&_gnutls_pkix1_asn);
-      result = _gnutls_asn2err (res);
+      result = mhd_gtls_asn2err (res);
       return result;
     }
 

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c       2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c       2008-08-12 
23:24:46 UTC (rev 7547)
@@ -58,7 +58,7 @@
 #define TRUE 1
 #define FALSE 0
 
-int _gnutls_server_select_comp_method (mhd_gtls_session_t session,
+static int _gnutls_server_select_comp_method (mhd_gtls_session_t session,
                                        opaque * data, int datalen);
 
 
@@ -186,7 +186,7 @@
 #define SERVER_MSG "server finished"
 #define CLIENT_MSG "client finished"
 #define TLS_MSG_LEN 15
-int
+static int
 _gnutls_finished (mhd_gtls_session_t session, int type, void *ret)
 {
   const int siz = TLS_MSG_LEN;
@@ -332,7 +332,7 @@
  * or version 2.0 client hello (only for compatibility
  * since SSL version 2.0 is not supported).
  */
-int
+static int
 _gnutls_read_client_hello (mhd_gtls_session_t session, opaque * data,
                            int datalen)
 {
@@ -509,7 +509,7 @@
  * and initializing encryption. This is the first encrypted message
  * we send.
  */
-int
+static int
 _gnutls_send_finished (mhd_gtls_session_t session, int again)
 {
   uint8_t data[36];
@@ -562,7 +562,7 @@
 /* This is to be called after sending our finished message. If everything
  * went fine we have negotiated a secure connection
  */
-int
+static int
 _gnutls_recv_finished (mhd_gtls_session_t session)
 {
   uint8_t data[36], *vrfy;
@@ -796,7 +796,7 @@
 
 /* This selects the best supported compression method from the ones provided
  */
-int
+static int
 _gnutls_server_select_comp_method (mhd_gtls_session_t session,
                                    opaque * data, int datalen)
 {
@@ -850,7 +850,7 @@
  * GNUTLS_E_AGAIN or GNUTLS_E_INTERRUPTED, then it must be called again
  * (until it returns ok), with NULL parameters.
  */
-int
+static int
 _gnutls_send_empty_handshake (mhd_gtls_session_t session,
                               gnutls_handshake_description_t type, int again)
 {
@@ -1964,13 +1964,14 @@
 mhd_gtls_send_hello (mhd_gtls_session_t session, int again)
 {
   int ret;
-
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
       ret = _gnutls_send_client_hello (session, again);
 
     }
   else
+#endif
     {                           /* SERVER */
       ret = _gnutls_send_server_hello (session, again);
     }
@@ -1986,7 +1987,7 @@
 mhd_gtls_recv_hello (mhd_gtls_session_t session, opaque * data, int datalen)
 {
   int ret;
-
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
       ret = _gnutls_read_server_hello (session, data, datalen);
@@ -1997,6 +1998,7 @@
         }
     }
   else
+#endif
     {                           /* Server side reading a client hello */
 
       ret = _gnutls_read_client_hello (session, data, datalen);
@@ -2126,7 +2128,7 @@
   return 0;
 }
 
-int
+static int
 _gnutls_send_supplemental (mhd_gtls_session_t session, int again)
 {
   int ret = 0;
@@ -2156,7 +2158,7 @@
   return ret;
 }
 
-int
+static int
 _gnutls_recv_supplemental (mhd_gtls_session_t session)
 {
   uint8_t *data = NULL;
@@ -2223,12 +2225,13 @@
       gnutls_assert ();
       return ret;
     }
-
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
       ret = mhd_gtls_handshake_client (session);
     }
   else
+#endif
     {
       ret = mhd_gtls_handshake_server (session);
     }

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_handshake.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_handshake.h       2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_handshake.h       2008-08-12 
23:24:46 UTC (rev 7547)
@@ -37,7 +37,6 @@
                            Optional optional);
 int mhd_gtls_generate_session_id (opaque * session_id, uint8_t * len);
 int mhd_gtls_handshake_common (mhd_gtls_session_t session);
-int mhd_gtls_handshake_client (mhd_gtls_session_t session);
 int mhd_gtls_handshake_server (mhd_gtls_session_t session);
 void mhd_gtls_set_server_random (mhd_gtls_session_t session, uint8_t * rnd);
 void mhd_gtls_set_client_random (mhd_gtls_session_t session, uint8_t * rnd);
@@ -53,6 +52,10 @@
 int mhd_gtls_negotiate_version( mhd_gtls_session_t session, gnutls_protocol_t 
adv_version);
 int mhd_gtls_user_hello_func( gnutls_session, gnutls_protocol_t adv_version);
 
+#if MHD_DEBUG_TLS
+int mhd_gtls_handshake_client (mhd_gtls_session_t session);
+#endif
+
 #define STATE session->internals.handshake_state
 /* This returns true if we have got there
  * before (and not finished due to an interrupt).

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_mpi.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_mpi.c     2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_mpi.c     2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -206,7 +206,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   tmpstr = gnutls_alloca (tmpstr_size);
@@ -221,7 +221,7 @@
     {
       gnutls_assert ();
       gnutls_afree (tmpstr);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   s_len = tmpstr_size;
@@ -278,7 +278,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_pk.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_pk.c      2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_pk.c      2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -395,7 +395,7 @@
                             &sig)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_write_int (sig, "r", r, 1);
@@ -493,7 +493,7 @@
                             &sig)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&sig, sig_value->data, sig_value->size, NULL);
@@ -501,7 +501,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&sig);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_read_int (sig, "r", r);

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_priority.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_priority.c        2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_priority.c        2008-08-12 
23:24:46 UTC (rev 7547)
@@ -208,30 +208,30 @@
 #endif
 }
 
-static const int protocol_priority[] = { MHD_GNUTLS_TLS1_1,
+static const int mhd_gtls_protocol_priority[] = { MHD_GNUTLS_TLS1_1,
   MHD_GNUTLS_TLS1_0,
   MHD_GNUTLS_SSL3,
   0
 };
 
-static const int cipher_priority_secure256[] =
+static const int mhd_gtls_cipher_priority_secure256[] =
   { MHD_GNUTLS_CIPHER_AES_256_CBC,
   0
 };
 
-static const int kx_priority_secure[] = { MHD_GNUTLS_KX_RSA,
+static const int mhd_gtls_kx_priority_secure[] = { MHD_GNUTLS_KX_RSA,
   0
 };
 
-static const int mac_priority_secure[] = { MHD_GNUTLS_MAC_SHA1,
+static const int mhd_gtls_mac_priority_secure[] = { MHD_GNUTLS_MAC_SHA1,
   0
 };
 
-static int cert_type_priority[] = { MHD_GNUTLS_CRT_X509,
+static int mhd_gtls_cert_type_priority[] = { MHD_GNUTLS_CRT_X509,
   0
 };
 
-static const int comp_priority[] = { MHD_GNUTLS_COMP_NULL,
+static const int mhd_gtls_comp_priority[] = { MHD_GNUTLS_COMP_NULL,
   0
 };
 
@@ -340,12 +340,12 @@
     }
 
   /* set mode to "SECURE256" */
-  _set_priority (&(*priority_cache)->protocol, protocol_priority);
-  _set_priority (&(*priority_cache)->cipher, cipher_priority_secure256);
-  _set_priority (&(*priority_cache)->kx, kx_priority_secure);
-  _set_priority (&(*priority_cache)->mac, mac_priority_secure);
-  _set_priority (&(*priority_cache)->cert_type, cert_type_priority);
-  _set_priority (&(*priority_cache)->compression, comp_priority);
+  _set_priority (&(*priority_cache)->protocol, mhd_gtls_protocol_priority);
+  _set_priority (&(*priority_cache)->cipher, 
mhd_gtls_cipher_priority_secure256);
+  _set_priority (&(*priority_cache)->kx, mhd_gtls_kx_priority_secure);
+  _set_priority (&(*priority_cache)->mac, mhd_gtls_mac_priority_secure);
+  _set_priority (&(*priority_cache)->cert_type, mhd_gtls_cert_type_priority);
+  _set_priority (&(*priority_cache)->compression, mhd_gtls_comp_priority);
 
   (*priority_cache)->no_padding = 0;
   return 0;

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_session.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_session.c 2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_session.c 2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -55,7 +55,7 @@
 //
 //  psession.data = session_data;
 //
-//  ret = _gnutls_session_pack (session, &psession);
+//  ret = mhd_gtls_session_pack (session, &psession);
 //  if (ret < 0)
 //    {
 //      gnutls_assert ();
@@ -106,7 +106,7 @@
 //  if (session->internals.resumable == RESUME_FALSE)
 //    return GNUTLS_E_INVALID_SESSION;
 //
-//  ret = _gnutls_session_pack (session, data);
+//  ret = mhd_gtls_session_pack (session, data);
 //  if (ret < 0)
 //    {
 //      gnutls_assert ();
@@ -190,7 +190,7 @@
 //      gnutls_assert ();
 //      return GNUTLS_E_INVALID_REQUEST;
 //    }
-//  ret = _gnutls_session_unpack (session, &psession);
+//  ret = mhd_gtls_session_unpack (session, &psession);
 //  if (ret < 0)
 //    {
 //      gnutls_assert ();

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_session_pack.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_session_pack.c    2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_session_pack.c    2008-08-12 
23:24:46 UTC (rev 7547)
@@ -227,7 +227,7 @@
  * The data will be in a platform independent format.
  */
 int
-_gnutls_session_pack (mhd_gtls_session_t session,
+mhd_gtls_session_pack (mhd_gtls_session_t session,
                       gnutls_datum_t * packed_session)
 {
   int ret;
@@ -302,7 +302,7 @@
 /* Load session data from a buffer.
  */
 int
-_gnutls_session_unpack (mhd_gtls_session_t session,
+mhd_gtls_session_unpack (mhd_gtls_session_t session,
                         const gnutls_datum_t * packed_session)
 {
   int ret;

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_session_pack.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_session_pack.h    2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_session_pack.h    2008-08-12 
23:24:46 UTC (rev 7547)
@@ -22,7 +22,7 @@
  *
  */
 
-int _gnutls_session_pack (mhd_gtls_session_t session,
+int mhd_gtls_session_pack (mhd_gtls_session_t session,
                          gnutls_datum_t * packed_session);
-int _gnutls_session_unpack (mhd_gtls_session_t session,
+int mhd_gtls_session_unpack (mhd_gtls_session_t session,
                            const gnutls_datum_t * packed_session);

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_state.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_state.c   2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_state.c   2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -429,7 +429,7 @@
 int
 mhd_gtls_dh_set_peer_public (mhd_gtls_session_t session, mpi_t public)
 {
-  dh_info_st *dh;
+  mhd_gtls_dh_info_st *dh;
   int ret;
 
   switch (MHD_gtls_auth_get_type (session))
@@ -540,7 +540,7 @@
 int
 mhd_gtls_dh_set_group (mhd_gtls_session_t session, mpi_t gen, mpi_t prime)
 {
-  dh_info_st *dh;
+  mhd_gtls_dh_info_st *dh;
   int ret;
 
   switch (MHD_gtls_auth_get_type (session))
@@ -1060,6 +1060,7 @@
 int
 MHD_gtls_session_is_resumed (mhd_gtls_session_t session)
 {
+#if MHD_DEBUG_TLS
   if (session->security_parameters.entity == GNUTLS_CLIENT)
     {
       if (session->security_parameters.session_id_size > 0
@@ -1072,6 +1073,7 @@
         return 1;
     }
   else
+#endif
     {
       if (session->internals.resumed == RESUME_TRUE)
         return 1;

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_ui.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_ui.c      2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_ui.c      2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -76,7 +76,7 @@
 MHD_gnutls_dh_get_group (mhd_gtls_session_t session,
                      gnutls_datum_t * raw_gen, gnutls_datum_t * raw_prime)
 {
-  dh_info_st *dh;
+  mhd_gtls_dh_info_st *dh;
   int ret;
   mhd_anon_auth_info_t anon_info;
   cert_auth_info_t cert_info;
@@ -133,7 +133,7 @@
 int
 MHD_gnutls_dh_get_pubkey (mhd_gtls_session_t session, gnutls_datum_t * raw_key)
 {
-  dh_info_st *dh;
+  mhd_gtls_dh_info_st *dh;
   mhd_anon_auth_info_t anon_info;
   cert_auth_info_t cert_info;
   cert_auth_info_t psk_info;
@@ -275,7 +275,7 @@
 int
 MHD_gnutls_dh_get_prime_bits (mhd_gtls_session_t session)
 {
-  dh_info_st *dh;
+  mhd_gtls_dh_info_st *dh;
 
   switch (MHD_gtls_auth_get_type (session))
     {
@@ -342,7 +342,7 @@
 int
 MHD_gnutls_dh_get_peers_public_bits (mhd_gtls_session_t session)
 {
-  dh_info_st *dh;
+  mhd_gtls_dh_info_st *dh;
 
   switch (MHD_gtls_auth_get_type (session))
     {

Modified: libmicrohttpd/src/daemon/https/x509/common.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/common.c        2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/x509/common.c        2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -295,7 +295,7 @@
                                      &tmpasn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if ((result = asn1_der_decoding (&tmpasn, value, value_size, asn1_err))
@@ -304,7 +304,7 @@
       gnutls_assert ();
       _gnutls_x509_log ("asn1_der_decoding: %s:%s\n", str, asn1_err);
       asn1_delete_structure (&tmpasn);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* If this is a choice then we read the choice. Otherwise it
@@ -315,7 +315,7 @@
     {                           /* CHOICE */
       gnutls_assert ();
       asn1_delete_structure (&tmpasn);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (CHOICE == 0)
@@ -352,7 +352,7 @@
           != ASN1_SUCCESS)
         {
           asn1_delete_structure (&tmpasn);
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       asn1_delete_structure (&tmpasn);
@@ -750,7 +750,7 @@
   if ((result = asn1_write_value (c2, name, "utcTime", 1)) < 0)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_gtime2utcTime (tim, str_time, sizeof (str_time));
@@ -767,7 +767,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -820,7 +820,7 @@
               return GNUTLS_E_SHORT_MEMORY_BUFFER;
             }
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       *output_data_size = len;
@@ -906,7 +906,7 @@
                             &c2)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -914,7 +914,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -925,7 +925,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -955,7 +955,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       return result;
     }
 
@@ -974,7 +974,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1024,7 +1024,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1047,7 +1047,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1058,7 +1058,7 @@
                                 &c2)) != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -1066,7 +1066,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -1074,7 +1074,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -1124,7 +1124,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -1162,7 +1162,7 @@
                                 &c2)) != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -1170,7 +1170,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -1198,7 +1198,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -1241,7 +1241,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (pk_algorithm == MHD_GNUTLS_PK_RSA)
@@ -1254,7 +1254,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       result = _gnutls_x509_write_rsa_params (params, params_size, &der);
@@ -1275,7 +1275,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
     }
   else
@@ -1308,7 +1308,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   algo = mhd_gtls_x509_oid2pk_algorithm (oid);
@@ -1329,7 +1329,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (len % 8 != 0)
@@ -1356,7 +1356,7 @@
     {
       gnutls_assert ();
       gnutls_free (str);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   len /= 8;
@@ -1410,7 +1410,7 @@
                                        &start, &end);
   if (result != ASN1_SUCCESS)
     {
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       gnutls_assert ();
       goto cleanup;
     }
@@ -1449,7 +1449,7 @@
 
   if (result != ASN1_MEM_ERROR)
     {
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       gnutls_assert ();
       goto cleanup;
     }
@@ -1478,7 +1478,7 @@
 
   if (result != ASN1_SUCCESS)
     {
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       gnutls_assert ();
       goto cleanup;
     }

Modified: libmicrohttpd/src/daemon/https/x509/crl.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/crl.c   2008-08-12 19:51:15 UTC (rev 
7546)
+++ libmicrohttpd/src/daemon/https/x509/crl.c   2008-08-12 23:24:46 UTC (rev 
7547)
@@ -62,7 +62,7 @@
         {
           gnutls_assert ();
           gnutls_free (*crl);
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
       return 0;                 /* success */
     }
@@ -145,7 +145,7 @@
   result = asn1_der_decoding (&crl->crl, _data.data, _data.size, NULL);
   if (result != ASN1_SUCCESS)
     {
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       gnutls_assert ();
       goto cleanup;
     }
@@ -340,7 +340,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (bits % 8 != 0)
@@ -361,7 +361,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -394,7 +394,7 @@
                         &len)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return (int) version[0] + 1;
@@ -523,7 +523,7 @@
       gnutls_assert ();
       if (result == ASN1_ELEMENT_NOT_FOUND)
         return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE;
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (t)
@@ -567,7 +567,7 @@
                             &c2)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result =
@@ -585,7 +585,7 @@
       /* couldn't decode DER */
       gnutls_assert ();
       asn1_delete_structure (&c2);
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -597,7 +597,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 

Modified: libmicrohttpd/src/daemon/https/x509/crl_write.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/crl_write.c     2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/x509/crl_write.c     2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -76,7 +76,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -220,7 +220,7 @@
   if (ret != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (ret);
+      return mhd_gtls_asn2err (ret);
     }
 
   ret =
@@ -230,7 +230,7 @@
   if (ret != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (ret);
+      return mhd_gtls_asn2err (ret);
     }
 
   ret =
@@ -250,7 +250,7 @@
   if (ret != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (ret);
+      return mhd_gtls_asn2err (ret);
     }
 
   return 0;
@@ -295,7 +295,7 @@
   if (ret < 0)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (ret);
+      return mhd_gtls_asn2err (ret);
     }
 
   return 0;

Modified: libmicrohttpd/src/daemon/https/x509/crq.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/crq.c   2008-08-12 19:51:15 UTC (rev 
7546)
+++ libmicrohttpd/src/daemon/https/x509/crq.c   2008-08-12 23:24:46 UTC (rev 
7547)
@@ -65,7 +65,7 @@
         {
           gnutls_assert ();
           gnutls_free (*crq);
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
       return 0;                 /* success */
     }
@@ -155,7 +155,7 @@
   result = asn1_der_decoding (&crq->crq, _data.data, _data.size, NULL);
   if (result != ASN1_SUCCESS)
     {
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       gnutls_assert ();
       goto cleanup;
     }
@@ -330,7 +330,7 @@
       if (result != ASN1_VALUE_NOT_FOUND)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -349,7 +349,7 @@
       else if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -367,7 +367,7 @@
           if (result != ASN1_SUCCESS)
             {
               gnutls_assert ();
-              result = _gnutls_asn2err (result);
+              result = mhd_gtls_asn2err (result);
               goto cleanup;
             }
 
@@ -480,7 +480,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result =
@@ -594,7 +594,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -630,7 +630,7 @@
       if (result == ASN1_ELEMENT_NOT_FOUND)
         return 1;               /* the DEFAULT version */
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return (int) version[0] + 1;
@@ -703,7 +703,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result =
@@ -774,7 +774,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* Step 3. Write the signatureAlgorithm field.

Modified: libmicrohttpd/src/daemon/https/x509/dn.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/dn.c    2008-08-12 19:51:15 UTC (rev 
7546)
+++ libmicrohttpd/src/daemon/https/x509/dn.c    2008-08-12 23:24:46 UTC (rev 
7547)
@@ -141,7 +141,7 @@
       if (result != ASN1_VALUE_NOT_FOUND)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -169,7 +169,7 @@
           if (result != ASN1_VALUE_NOT_FOUND)
             {
               gnutls_assert ();
-              result = _gnutls_asn2err (result);
+              result = mhd_gtls_asn2err (result);
               goto cleanup;
             }
 
@@ -186,7 +186,7 @@
           else if (result != ASN1_SUCCESS)
             {
               gnutls_assert ();
-              result = _gnutls_asn2err (result);
+              result = mhd_gtls_asn2err (result);
               goto cleanup;
             }
 
@@ -211,7 +211,7 @@
           if (result != ASN1_SUCCESS)
             {
               gnutls_assert ();
-              result = _gnutls_asn2err (result);
+              result = mhd_gtls_asn2err (result);
               goto cleanup;
             }
 #define STR_APPEND(y) if ((result=mhd_gtls_string_append_str( &out_str, y)) < 
0) { \
@@ -382,7 +382,7 @@
       if (result != ASN1_VALUE_NOT_FOUND)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -412,7 +412,7 @@
           if (result != ASN1_VALUE_NOT_FOUND)
             {
               gnutls_assert ();
-              result = _gnutls_asn2err (result);
+              result = mhd_gtls_asn2err (result);
               goto cleanup;
             }
 
@@ -429,7 +429,7 @@
           else if (result != ASN1_SUCCESS)
             {
               gnutls_assert ();
-              result = _gnutls_asn2err (result);
+              result = mhd_gtls_asn2err (result);
               goto cleanup;
             }
 
@@ -449,7 +449,7 @@
                   gnutls_assert ();
                   if (result == ASN1_MEM_ERROR)
                     *sizeof_buf = len;
-                  result = _gnutls_asn2err (result);
+                  result = mhd_gtls_asn2err (result);
                   goto cleanup;
                 }
 
@@ -551,7 +551,7 @@
       if (result != ASN1_VALUE_NOT_FOUND)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -581,7 +581,7 @@
           if (result != ASN1_VALUE_NOT_FOUND)
             {
               gnutls_assert ();
-              result = _gnutls_asn2err (result);
+              result = mhd_gtls_asn2err (result);
               goto cleanup;
             }
 
@@ -598,7 +598,7 @@
           else if (result != ASN1_SUCCESS)
             {
               gnutls_assert ();
-              result = _gnutls_asn2err (result);
+              result = mhd_gtls_asn2err (result);
               goto cleanup;
             }
 
@@ -667,7 +667,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   tmp[0] = 0;
@@ -699,7 +699,7 @@
         {
           gnutls_assert ();
           asn1_delete_structure (&c2);
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       mhd_gtls_str_cpy (tmp, sizeof (tmp), string_type);
@@ -710,7 +710,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&c2);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
 
@@ -728,7 +728,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       mhd_gtls_str_cat (tmp, sizeof (tmp), ".?LAST");
@@ -751,7 +751,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -783,7 +783,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       mhd_gtls_str_cat (tmp, sizeof (tmp), ".?LAST");
@@ -794,7 +794,7 @@
   if (result < 0)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* write the type
@@ -806,7 +806,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -841,7 +841,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       return result;
     }
 
@@ -893,7 +893,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   mhd_gtls_str_cpy (asn1_rdn_name, sizeof (asn1_rdn_name), asn1_name);
@@ -905,7 +905,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   mhd_gtls_str_cpy (tmp, sizeof (tmp), asn1_rdn_name);
@@ -917,7 +917,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
 
@@ -987,7 +987,7 @@
                             "PKIX1.Name", &dn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&dn, idn->data, idn->size, NULL);
@@ -996,7 +996,7 @@
       /* couldn't decode DER */
       gnutls_assert ();
       asn1_delete_structure (&dn);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_parse_dn (dn, "rdnSequence", buf, sizeof_buf);
@@ -1042,7 +1042,7 @@
                             "PKIX1.Name", &dn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&dn, idn->data, idn->size, NULL);
@@ -1051,7 +1051,7 @@
       /* couldn't decode DER */
       gnutls_assert ();
       asn1_delete_structure (&dn);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result =
@@ -1094,7 +1094,7 @@
                             "PKIX1.Name", &dn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&dn, idn->data, idn->size, NULL);
@@ -1103,7 +1103,7 @@
       /* couldn't decode DER */
       gnutls_assert ();
       asn1_delete_structure (&dn);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_get_dn_oid (dn, "rdnSequence", indx, buf, sizeof_buf);

Modified: libmicrohttpd/src/daemon/https/x509/extensions.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/extensions.c    2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/x509/extensions.c    2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -96,7 +96,7 @@
           else if (result != ASN1_SUCCESS)
             {
               gnutls_assert ();
-              return _gnutls_asn2err (result);
+              return mhd_gtls_asn2err (result);
             }
 
           /* Handle Extension 
@@ -123,7 +123,7 @@
               else if (result != ASN1_SUCCESS)
                 {
                   gnutls_assert ();
-                  return _gnutls_asn2err (result);
+                  return mhd_gtls_asn2err (result);
                 }
 
               if (str_critical[0] == 'T')
@@ -165,7 +165,7 @@
   else
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 }
 
@@ -220,7 +220,7 @@
           else if (result != ASN1_SUCCESS)
             {
               gnutls_assert ();
-              return _gnutls_asn2err (result);
+              return mhd_gtls_asn2err (result);
             }
 
           /* Handle Extension 
@@ -255,7 +255,7 @@
   else
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 }
 
@@ -277,7 +277,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result =
@@ -286,7 +286,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (critical == 0)
@@ -301,7 +301,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result =
@@ -342,7 +342,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   mhd_gtls_str_cpy (name2, sizeof (name2), name);
@@ -411,7 +411,7 @@
           else if (result != ASN1_SUCCESS)
             {
               gnutls_assert ();
-              return _gnutls_asn2err (result);
+              return mhd_gtls_asn2err (result);
             }
 
           /* Handle Extension 
@@ -436,7 +436,7 @@
   else
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
 
@@ -462,7 +462,7 @@
        (_gnutls_get_pkix (), "PKIX1.KeyUsage", &ext)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&ext, extnValue, extnValueLen, NULL);
@@ -471,7 +471,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&ext);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   len = sizeof (str);
@@ -506,7 +506,7 @@
        (_gnutls_get_pkix (), "PKIX1.BasicConstraints", &ext)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&ext, extnValue, extnValueLen, NULL);
@@ -514,7 +514,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&ext);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (pathLenConstraint)
@@ -527,7 +527,7 @@
         {
           gnutls_assert ();
           asn1_delete_structure (&ext);
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
     }
 
@@ -569,7 +569,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_write_value (ext, "cA", str, 1);
@@ -577,14 +577,14 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&ext);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (pathLenConstraint < 0)
     {
       result = asn1_write_value (ext, "pathLenConstraint", NULL, 0);
       if (result < 0)
-        result = _gnutls_asn2err (result);
+        result = mhd_gtls_asn2err (result);
     }
   else
     result = _gnutls_x509_write_uint32 (ext, "pathLenConstraint",
@@ -623,7 +623,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   str[0] = usage & 0xff;
@@ -634,7 +634,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&ext);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_der_encode (ext, "", der_ext, 0);
@@ -663,7 +663,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   switch (type)
@@ -699,7 +699,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   mhd_gtls_str_cat (name, sizeof (name), ".");
@@ -710,7 +710,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&ext);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -732,7 +732,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = write_new_general_name (ext, "", type, data_string);
@@ -771,7 +771,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_write_value (ext, "", id, id_size);
@@ -779,7 +779,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&ext);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_der_encode (ext, "", der_ext, 0);
@@ -810,7 +810,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_write_value (ext, "keyIdentifier", id, id_size);
@@ -818,7 +818,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&ext);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   asn1_write_value (ext, "authorityCertIssuer", NULL, 0);
@@ -863,7 +863,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -871,7 +871,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -881,7 +881,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
     }
@@ -891,7 +891,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
     }
@@ -900,7 +900,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -910,7 +910,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -964,7 +964,7 @@
        (_gnutls_get_pkix (), "PKIX1.ProxyCertInfo", &ext)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&ext, extnValue, extnValueLen, NULL);
@@ -972,7 +972,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&ext);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (pathLenConstraint)
@@ -984,7 +984,7 @@
       else if (result != GNUTLS_E_SUCCESS)
         {
           asn1_delete_structure (&ext);
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
     }
 
@@ -1044,14 +1044,14 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (pathLenConstraint < 0)
     {
       result = asn1_write_value (ext, "pCPathLenConstraint", NULL, 0);
       if (result < 0)
-        result = _gnutls_asn2err (result);
+        result = mhd_gtls_asn2err (result);
     }
   else
     result = _gnutls_x509_write_uint32 (ext, "pCPathLenConstraint",
@@ -1069,7 +1069,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&ext);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_write_value (ext, "proxyPolicy.policy",
@@ -1078,7 +1078,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&ext);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_der_encode (ext, "", der_ext, 0);

Modified: libmicrohttpd/src/daemon/https/x509/mpi.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/mpi.c   2008-08-12 19:51:15 UTC (rev 
7546)
+++ libmicrohttpd/src/daemon/https/x509/mpi.c   2008-08-12 23:24:46 UTC (rev 
7547)
@@ -48,7 +48,7 @@
                             &spk)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&spk, der, dersize, NULL);
@@ -57,7 +57,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&spk);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if ((result = _gnutls_x509_read_int (spk, "modulus", &params[0])) < 0)
@@ -97,7 +97,7 @@
                             &spk)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&spk, der, dersize, NULL);
@@ -106,7 +106,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&spk);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* FIXME: If the parameters are not included in the certificate
@@ -165,7 +165,7 @@
                             &spk)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&spk, der, dersize, NULL);
@@ -174,7 +174,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&spk);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* Read Y */
@@ -183,7 +183,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&spk);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   asn1_delete_structure (&spk);
@@ -296,7 +296,7 @@
                             &spk)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_write_int (spk, "modulus", params[0], 0);
@@ -359,7 +359,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   mhd_gtls_str_cpy (name, sizeof (name), dst_name);
@@ -375,7 +375,7 @@
            * may have been disabled before.
            */
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
     }
 
@@ -410,7 +410,7 @@
                             &spk)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_write_int (spk, "p", params[0], 0);
@@ -475,7 +475,7 @@
                             &spk)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_write_int (spk, "", params[3], 0);
@@ -514,7 +514,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   tmpstr = gnutls_alloca (len);
@@ -530,7 +530,7 @@
     {
       gnutls_assert ();
       gnutls_afree (tmpstr);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (len == 1)
@@ -568,7 +568,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;

Modified: libmicrohttpd/src/daemon/https/x509/pkcs12.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/pkcs12.c        2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/x509/pkcs12.c        2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -59,7 +59,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (strcmp (oid, DATA_OID) != 0)
@@ -89,7 +89,7 @@
         &c2)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -97,7 +97,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -150,7 +150,7 @@
         {
           gnutls_assert ();
           gnutls_free (*pkcs12);
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
       return 0;                 /* success */
     }
@@ -234,7 +234,7 @@
   result = asn1_der_decoding (&pkcs12->pkcs12, _data.data, _data.size, NULL);
   if (result != ASN1_SUCCESS)
     {
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       gnutls_assert ();
       goto cleanup;
     }
@@ -360,7 +360,7 @@
         &c2)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -368,7 +368,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -378,7 +378,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -394,7 +394,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -443,7 +443,7 @@
       if (result != ASN1_SUCCESS && result != ASN1_ELEMENT_NOT_FOUND)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -619,7 +619,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -669,7 +669,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -679,7 +679,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -692,7 +692,7 @@
         &c2)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -777,7 +777,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -788,7 +788,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -803,7 +803,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
     }
@@ -884,7 +884,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -944,7 +944,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -954,7 +954,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -965,7 +965,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1023,7 +1023,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1070,7 +1070,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1108,7 +1108,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       return 0;
@@ -1123,7 +1123,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       mhd_gtls_str_cpy (root, sizeof (root), where);
@@ -1154,7 +1154,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       /* convert name to BMPString
@@ -1224,7 +1224,7 @@
         &c2)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1242,7 +1242,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -1252,7 +1252,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 

Modified: libmicrohttpd/src/daemon/https/x509/pkcs12_bag.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/pkcs12_bag.c    2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/x509/pkcs12_bag.c    2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -185,7 +185,7 @@
                                       &c2)) != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          ret = _gnutls_asn2err (ret);
+          ret = mhd_gtls_asn2err (ret);
           goto cleanup;
         }
 
@@ -193,7 +193,7 @@
       if (ret != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          ret = _gnutls_asn2err (ret);
+          ret = mhd_gtls_asn2err (ret);
           goto cleanup;
         }
 
@@ -212,7 +212,7 @@
                                       &c2)) != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          ret = _gnutls_asn2err (ret);
+          ret = mhd_gtls_asn2err (ret);
           goto cleanup;
         }
 
@@ -220,7 +220,7 @@
       if (ret != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          ret = _gnutls_asn2err (ret);
+          ret = mhd_gtls_asn2err (ret);
           goto cleanup;
         }
 
@@ -258,7 +258,7 @@
                                       &c2)) != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          ret = _gnutls_asn2err (ret);
+          ret = mhd_gtls_asn2err (ret);
           goto cleanup;
         }
 
@@ -266,7 +266,7 @@
       if (ret != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          ret = _gnutls_asn2err (ret);
+          ret = mhd_gtls_asn2err (ret);
           goto cleanup;
         }
 
@@ -285,7 +285,7 @@
                                       &c2)) != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          ret = _gnutls_asn2err (ret);
+          ret = mhd_gtls_asn2err (ret);
           goto cleanup;
         }
 
@@ -293,7 +293,7 @@
       if (ret != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          ret = _gnutls_asn2err (ret);
+          ret = mhd_gtls_asn2err (ret);
           goto cleanup;
         }
 

Modified: libmicrohttpd/src/daemon/https/x509/pkcs7.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/pkcs7.c 2008-08-12 19:51:15 UTC (rev 
7546)
+++ libmicrohttpd/src/daemon/https/x509/pkcs7.c 2008-08-12 23:24:46 UTC (rev 
7547)
@@ -58,7 +58,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (strcmp (oid, SIGNED_DATA_OID) != 0)
@@ -72,7 +72,7 @@
        (_gnutls_get_pkix (), "PKIX1.pkcs-7-SignedData", &c2)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* the Signed-data has been created, so
@@ -83,7 +83,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -99,7 +99,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -114,7 +114,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -164,7 +164,7 @@
         {
           gnutls_assert ();
           gnutls_free (*pkcs7);
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
       return 0;                 /* success */
     }
@@ -244,7 +244,7 @@
   result = asn1_der_decoding (&pkcs7->pkcs7, _data.data, _data.size, NULL);
   if (result != ASN1_SUCCESS)
     {
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       gnutls_assert ();
       goto cleanup;
     }
@@ -316,7 +316,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -332,7 +332,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto cleanup;
         }
 
@@ -458,7 +458,7 @@
         sdata)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -468,7 +468,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -482,7 +482,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -490,7 +490,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -509,7 +509,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -571,7 +571,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -579,7 +579,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -589,7 +589,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -691,7 +691,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -768,7 +768,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -889,7 +889,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -897,7 +897,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -996,7 +996,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 

Modified: libmicrohttpd/src/daemon/https/x509/privkey_pkcs8.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/privkey_pkcs8.c 2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/x509/privkey_pkcs8.c 2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -221,7 +221,7 @@
                             pkey_info)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -231,7 +231,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -243,7 +243,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -254,7 +254,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -275,7 +275,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -285,7 +285,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -296,7 +296,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -314,7 +314,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -348,7 +348,7 @@
                             &pkcs8_asn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -382,7 +382,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -422,7 +422,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -569,7 +569,7 @@
                                 &pbes2_asn)) != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto error;
         }
 
@@ -579,7 +579,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto error;
         }
 
@@ -590,7 +590,7 @@
       if (result < 0)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto error;
         }
 
@@ -598,7 +598,7 @@
       if (result < 0)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto error;
         }
 
@@ -632,7 +632,7 @@
                                 &pbes2_asn)) != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto error;
         }
 
@@ -642,7 +642,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto error;
         }
 
@@ -705,7 +705,7 @@
                             &pkcs8_asn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -713,7 +713,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -747,7 +747,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
   params_len = params_end - params_start + 1;
@@ -923,7 +923,7 @@
                             &pkcs8_asn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -931,7 +931,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -943,7 +943,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -1109,7 +1109,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
   _gnutls_hard_log ("keyDerivationFunc.algorithm: %s\n", oid);
 
@@ -1118,7 +1118,7 @@
       gnutls_assert ();
       _gnutls_x509_log
         ("PKCS #8 key derivation OID '%s' is unsupported.\n", oid);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result =
@@ -1128,7 +1128,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
   params_len = params_end - params_start + 1;
 
@@ -1141,7 +1141,7 @@
                             &pbkdf2_asn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result =
@@ -1150,7 +1150,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -1162,7 +1162,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
   _gnutls_hard_log ("salt.specified.size: %d\n", params->salt_size);
@@ -1216,7 +1216,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
   _gnutls_hard_log ("salt.size: %d\n", params->salt_size);
@@ -1257,7 +1257,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
   _gnutls_hard_log ("salt.size: %d\n", kdf_params->salt_size);
@@ -1342,7 +1342,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
   params_len = params_end - params_start + 1;
 
@@ -1354,7 +1354,7 @@
                             &pbe_asn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result =
@@ -1362,7 +1362,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -1372,7 +1372,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
   _gnutls_hard_log ("IV.size: %d\n", params->iv_size);
@@ -1404,7 +1404,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   data = gnutls_malloc (data_size);
@@ -1418,7 +1418,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -1530,7 +1530,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* Now write the key derivation and the encryption
@@ -1542,14 +1542,14 @@
                             &pbkdf2_asn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_write_value (pbkdf2_asn, "salt", "specified", 1);
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -1561,7 +1561,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
   _gnutls_hard_log ("salt.specified.size: %d\n", kdf_params->salt_size);
@@ -1574,7 +1574,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
   _gnutls_hard_log ("iterationCount: %d\n", kdf_params->iter_count);
@@ -1585,7 +1585,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -1595,7 +1595,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -1647,7 +1647,7 @@
                             &pbe_asn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* read the salt */
@@ -1655,7 +1655,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
   _gnutls_hard_log ("IV.size: %d\n", params->iv_size);
@@ -1814,7 +1814,7 @@
                                 &pbes2_asn)) != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       result = write_pbkdf2_params (pbes2_asn, kdf_params);
@@ -1850,7 +1850,7 @@
                                 &pbes2_asn)) != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          result = _gnutls_asn2err (result);
+          result = mhd_gtls_asn2err (result);
           goto error;
         }
 
@@ -1973,7 +1973,7 @@
                             &pkcs7_asn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -1981,7 +1981,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -1995,7 +1995,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -2015,7 +2015,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
   params_len = params_end - params_start + 1;
@@ -2027,7 +2027,7 @@
   if (result < ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -2078,7 +2078,7 @@
                             &pkcs7_asn)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -2116,7 +2116,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -2158,7 +2158,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -2181,7 +2181,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 
@@ -2189,7 +2189,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto error;
     }
 

Modified: libmicrohttpd/src/daemon/https/x509/sign.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/sign.c  2008-08-12 19:51:15 UTC (rev 
7546)
+++ libmicrohttpd/src/daemon/https/x509/sign.c  2008-08-12 23:24:46 UTC (rev 
7547)
@@ -69,7 +69,7 @@
                                      &dinfo)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_write_value (dinfo, "digestAlgorithm.algorithm", algo, 1);
@@ -77,7 +77,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&dinfo);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* Write an ASN.1 NULL in the parameters field.  This matches RFC
@@ -91,7 +91,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&dinfo);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_write_value (dinfo, "digest", digest->data, digest->size);
@@ -99,7 +99,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&dinfo);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   info->size = 0;
@@ -118,7 +118,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&dinfo);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   asn1_delete_structure (&dinfo);
@@ -242,7 +242,7 @@
     {
       gnutls_assert ();
       gnutls_afree (buf);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   tbs.data = buf;
@@ -285,7 +285,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* Step 1.5. Write the signature stuff in the tbsCertificate.
@@ -323,7 +323,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* Step 3. Move up and write the AlgorithmIdentifier, which is also

Modified: libmicrohttpd/src/daemon/https/x509/x509.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/x509.c  2008-08-12 19:51:15 UTC (rev 
7546)
+++ libmicrohttpd/src/daemon/https/x509/x509.c  2008-08-12 23:24:46 UTC (rev 
7547)
@@ -63,7 +63,7 @@
     {
       gnutls_assert ();
       gnutls_free (tmp);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   *cert = tmp;
@@ -213,7 +213,7 @@
   result = asn1_der_decoding (&cert->cert, _data.data, _data.size, NULL);
   if (result != ASN1_SUCCESS)
     {
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       gnutls_assert ();
       goto cleanup;
     }
@@ -522,7 +522,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (bits % 8 != 0)
@@ -543,7 +543,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -579,7 +579,7 @@
       if (result == ASN1_ELEMENT_NOT_FOUND)
         return 1;               /* the DEFAULT version */
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return (int) version[0] + 1;
@@ -665,7 +665,7 @@
   if (ret != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (ret);
+      return mhd_gtls_asn2err (ret);
     }
 
   return 0;
@@ -724,7 +724,7 @@
     {
       gnutls_assert ();
       _gnutls_free_datum (&id);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&c2, id.data, id.size, NULL);
@@ -734,7 +734,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&c2);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   len = *ret_size;
@@ -751,7 +751,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -812,7 +812,7 @@
     {
       gnutls_assert ();
       _gnutls_free_datum (&id);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&c2, id.data, id.size, NULL);
@@ -822,7 +822,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&c2);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   len = *ret_size;
@@ -839,7 +839,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -934,7 +934,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   type = _gnutls_x509_san_find_type (choice_type);
@@ -964,7 +964,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       if (othername_oid)
@@ -987,7 +987,7 @@
           if (result != ASN1_SUCCESS)
             {
               gnutls_assert ();
-              return _gnutls_asn2err (result);
+              return mhd_gtls_asn2err (result);
             }
 
           if (len > strlen (XMPP_OID) && strcmp (oid, XMPP_OID) == 0)
@@ -1000,7 +1000,7 @@
               if (result != ASN1_SUCCESS)
                 {
                   gnutls_assert ();
-                  return _gnutls_asn2err (result);
+                  return mhd_gtls_asn2err (result);
                 }
 
               result = asn1_der_decoding (&c2, name, *name_size, NULL);
@@ -1008,7 +1008,7 @@
                 {
                   gnutls_assert ();
                   asn1_delete_structure (&c2);
-                  return _gnutls_asn2err (result);
+                  return mhd_gtls_asn2err (result);
                 }
 
               result = asn1_read_value (c2, "", name, &len);
@@ -1017,7 +1017,7 @@
                 {
                   gnutls_assert ();
                   asn1_delete_structure (&c2);
-                  return _gnutls_asn2err (result);
+                  return mhd_gtls_asn2err (result);
                 }
               asn1_delete_structure (&c2);
             }
@@ -1056,7 +1056,7 @@
       if (result != ASN1_SUCCESS)
         {
           gnutls_assert ();
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       if (is_type_printable (type))
@@ -1121,7 +1121,7 @@
     {
       gnutls_assert ();
       _gnutls_free_datum (&dnsname);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&c2, dnsname.data, dnsname.size, NULL);
@@ -1131,7 +1131,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&c2);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = parse_general_name (c2, "", seq, ret, ret_size, ret_type,
@@ -1620,7 +1620,7 @@
   else if (result < 0)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   snprintf (name, sizeof (name), "tbsCertificate.extensions.?%u.critical",
@@ -1630,7 +1630,7 @@
   if (result < 0)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (critical)
@@ -1691,7 +1691,7 @@
   else if (result < 0)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -1715,7 +1715,7 @@
                             &c2)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_get_signed_data (cert->cert, "tbsCertificate",
@@ -1731,7 +1731,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&c2);
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1741,7 +1741,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1910,7 +1910,7 @@
   if (ret)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (ret);
+      return mhd_gtls_asn2err (ret);
     }
 
   ptr += lenlen;
@@ -1974,7 +1974,7 @@
     {
       gnutls_assert ();
       gnutls_afree (cert_buf);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   tmp.data = cert_buf;
@@ -2146,7 +2146,7 @@
   if (result != ASN1_MEM_ERROR)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   pubkey.data = gnutls_alloca (pubkey.size);
@@ -2162,7 +2162,7 @@
     {
       gnutls_assert ();
       gnutls_afree (pubkey.data);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = MHD_gnutls_fingerprint (MHD_GNUTLS_DIG_SHA1, &pubkey, output_data,
@@ -2404,7 +2404,7 @@
     {
       gnutls_assert ();
       _gnutls_free_datum (&dist_points);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&c2, dist_points.data, dist_points.size, NULL);
@@ -2414,7 +2414,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&c2);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* Return the different names from the first CRLDistr. point.
@@ -2446,7 +2446,7 @@
         {
           gnutls_assert ();
           asn1_delete_structure (&c2);
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
       *reason_flags = reasons[0] | (reasons[1] << 8);
@@ -2514,7 +2514,7 @@
     {
       gnutls_assert ();
       _gnutls_free_datum (&id);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&c2, id.data, id.size, NULL);
@@ -2524,7 +2524,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&c2);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   indx++;
@@ -2546,7 +2546,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;

Modified: libmicrohttpd/src/daemon/https/x509/x509_privkey.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/x509_privkey.c  2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/x509/x509_privkey.c  2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -956,7 +956,7 @@
                             c2)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -966,7 +966,7 @@
       != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -974,7 +974,7 @@
       != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -982,7 +982,7 @@
       != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -990,7 +990,7 @@
       != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -998,7 +998,7 @@
       != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1006,7 +1006,7 @@
       != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1014,7 +1014,7 @@
       != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1022,7 +1022,7 @@
       != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1037,14 +1037,14 @@
                                   NULL, 0)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
   if ((result = asn1_write_value (*c2, "version", &null, 1)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1116,7 +1116,7 @@
                             c2)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1125,28 +1125,28 @@
   if ((result = asn1_write_value (*c2, "p", p_data, size[0])) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
   if ((result = asn1_write_value (*c2, "q", q_data, size[1])) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
   if ((result = asn1_write_value (*c2, "g", g_data, size[2])) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
   if ((result = asn1_write_value (*c2, "Y", y_data, size[3])) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1154,7 +1154,7 @@
        asn1_write_value (*c2, "priv", x_data, size[4])) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 
@@ -1163,7 +1163,7 @@
   if ((result = asn1_write_value (*c2, "version", &null, 1)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      result = _gnutls_asn2err (result);
+      result = mhd_gtls_asn2err (result);
       goto cleanup;
     }
 

Modified: libmicrohttpd/src/daemon/https/x509/x509_verify.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/x509_verify.c   2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/x509/x509_verify.c   2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -478,7 +478,7 @@
                                      &dinfo)) != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = asn1_der_decoding (&dinfo, info->data, info->size, NULL);
@@ -486,7 +486,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&dinfo);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   len = sizeof (str) - 1;
@@ -495,7 +495,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&dinfo);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   *hash = mhd_gtls_x509_oid2mac_algorithm (str);
@@ -529,7 +529,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&dinfo);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   asn1_delete_structure (&dinfo);

Modified: libmicrohttpd/src/daemon/https/x509/x509_write.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/x509_write.c    2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/daemon/https/x509/x509_write.c    2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -151,7 +151,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   if (name && sizeof_name)
@@ -200,7 +200,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -273,7 +273,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result =
@@ -282,7 +282,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   return 0;
@@ -714,7 +714,7 @@
   if (ret != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (ret);
+      return mhd_gtls_asn2err (ret);
     }
 
   return 0;
@@ -1020,7 +1020,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* Check if the extension already exists.
@@ -1039,7 +1039,7 @@
         {
           gnutls_assert ();
           asn1_delete_structure (&c2);
-          return _gnutls_asn2err (result);
+          return mhd_gtls_asn2err (result);
         }
 
     }
@@ -1053,7 +1053,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&c2);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   /* 2. Add the OID.
@@ -1063,7 +1063,7 @@
     {
       gnutls_assert ();
       asn1_delete_structure (&c2);
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_der_encode (c2, "", &der_data, 0);
@@ -1072,7 +1072,7 @@
   if (result != ASN1_SUCCESS)
     {
       gnutls_assert ();
-      return _gnutls_asn2err (result);
+      return mhd_gtls_asn2err (result);
     }
 
   result = _gnutls_x509_crt_set_extension (cert, "2.5.29.37",

Modified: libmicrohttpd/src/testcurl/daemon_options_test.c
===================================================================
--- libmicrohttpd/src/testcurl/daemon_options_test.c    2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/testcurl/daemon_options_test.c    2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -20,7 +20,7 @@
 
 /**
  * @file mhds_get_test.c
- * @brief  Testcase for libmicrohttpd daemon option arguments
+ * @brief  Testcase for libmicrohttpd HTTPS GET operations
  * @author Sagie Amir
  */
 
@@ -67,9 +67,6 @@
   return ret;
 }
 
-/**
- * Test the MHD_OPTION_IP_ADDR along with an IPv4 address
- */
 static int
 test_ipv4_option ()
 {
@@ -85,10 +82,6 @@
        return 0;
 }
 
-/**
- * Test the MHD_OPTION_IP_ADDR along with an IPv6 address
- */
-
 static int
 test_ipv6_option ()
 {

Modified: libmicrohttpd/src/testcurl/https/Makefile.am
===================================================================
--- libmicrohttpd/src/testcurl/https/Makefile.am        2008-08-12 19:51:15 UTC 
(rev 7546)
+++ libmicrohttpd/src/testcurl/https/Makefile.am        2008-08-12 23:24:46 UTC 
(rev 7547)
@@ -10,23 +10,21 @@
 $(LIBCURL_CPPFLAGS)
 
 check_PROGRAMS = \
-tls_session_time_out_test \
-tls_cipher_change_test \
-tls_daemon_options_test \
-tls_alert_test \
-tls_authentication_test \
-mhds_multi_daemon_test \
-mhds_session_info_test 
+  tls_daemon_options_test \
+  tls_authentication_test \
+  mhds_multi_daemon_test \
+  mhds_session_info_test
+
+if MHD_DEBUG_TLS
+  check_PROGRAMS += \
+  tls_session_time_out_test \
+  tls_cipher_change_test \
+  tls_alert_test
+endif  
    
 TESTS = $(check_PROGRAMS)
 
-tls_daemon_options_test_SOURCES = \
-  tls_daemon_options_test.c
-tls_daemon_options_test_LDADD = \
-  $(top_builddir)/src/testcurl/libcurl_version_check.a \
-  $(top_builddir)/src/daemon/libmicrohttpd.la \
-  @LIBCURL@
-
+# cURL independent tests
 tls_session_time_out_test_SOURCES = \
   tls_session_time_out_test.c
 tls_session_time_out_test_LDADD  = \
@@ -45,6 +43,14 @@
   $(top_builddir)/src/testcurl/libcurl_version_check.a \
   $(top_builddir)/src/daemon/libmicrohttpd.la
 
+# cURL dependent tests
+tls_daemon_options_test_SOURCES = \
+  tls_daemon_options_test.c
+tls_daemon_options_test_LDADD = \
+  $(top_builddir)/src/testcurl/libcurl_version_check.a \
+  $(top_builddir)/src/daemon/libmicrohttpd.la \
+  @LIBCURL@
+
 tls_authentication_test_SOURCES = \
   tls_authentication_test.c
 tls_authentication_test_LDADD  = \

Modified: libmicrohttpd/src/testcurl/https/tls_daemon_options_test.c
===================================================================
--- libmicrohttpd/src/testcurl/https/tls_daemon_options_test.c  2008-08-12 
19:51:15 UTC (rev 7546)
+++ libmicrohttpd/src/testcurl/https/tls_daemon_options_test.c  2008-08-12 
23:24:46 UTC (rev 7547)
@@ -469,18 +469,6 @@
                  MHD_OPTION_KX_PRIORITY,
                  kx, MHD_OPTION_END);
 
-
-  /*gnutls_mac_algorithm_t mac[] = {
-     {MHD_GNUTLS_MAC_MD5, 0}, 0};
-     gnutls_mac_algorithm_t * cur_mac;
-
-     for ( cur_mac = &mac[0]; (*cur_mac) != 0; cur_mac++ ){
-     option[0] = MHD_GNUTLS_MAC_SHA1;
-     errorCount +=
-     test_wrap (&test_https_transfer, test_fd, "AES256-SHA",
-     CURL_SSLVERSION_TLSv1, MHD_OPTION_MAC_ALGO, option);
-     } */
-
   if (errorCount != 0)
     fprintf (stderr, "Failed test: %s.\n", argv[0]);
 





reply via email to

[Prev in Thread] Current Thread [Next in Thread]