gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r7592 - in libmicrohttpd/src: daemon daemon/https daemon/ht


From: gnunet
Subject: [GNUnet-SVN] r7592 - in libmicrohttpd/src: daemon daemon/https daemon/https/tls daemon/https/x509 include testcurl testcurl/https
Date: Sun, 24 Aug 2008 11:53:49 -0600 (MDT)

Author: grothoff
Date: 2008-08-24 11:53:48 -0600 (Sun, 24 Aug 2008)
New Revision: 7592

Modified:
   libmicrohttpd/src/daemon/connection.c
   libmicrohttpd/src/daemon/connection_https.c
   libmicrohttpd/src/daemon/daemon.c
   libmicrohttpd/src/daemon/https/gnutls.h
   libmicrohttpd/src/daemon/https/tls/auth_cert.c
   libmicrohttpd/src/daemon/https/tls/auth_cert.h
   libmicrohttpd/src/daemon/https/tls/auth_rsa.c
   libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c
   libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.h
   libmicrohttpd/src/daemon/https/tls/gnutls_auth.c
   libmicrohttpd/src/daemon/https/tls/gnutls_auth_int.h
   libmicrohttpd/src/daemon/https/tls/gnutls_cert.c
   libmicrohttpd/src/daemon/https/tls/gnutls_cert.h
   libmicrohttpd/src/daemon/https/tls/gnutls_cipher.c
   libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.c
   libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.h
   libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.c
   libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.h
   libmicrohttpd/src/daemon/https/tls/gnutls_constate.c
   libmicrohttpd/src/daemon/https/tls/gnutls_constate.h
   libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c
   libmicrohttpd/src/daemon/https/tls/gnutls_handshake.h
   libmicrohttpd/src/daemon/https/tls/gnutls_hash_int.c
   libmicrohttpd/src/daemon/https/tls/gnutls_hash_int.h
   libmicrohttpd/src/daemon/https/tls/gnutls_int.h
   libmicrohttpd/src/daemon/https/tls/gnutls_priority.c
   libmicrohttpd/src/daemon/https/tls/gnutls_record.c
   libmicrohttpd/src/daemon/https/tls/gnutls_sig.c
   libmicrohttpd/src/daemon/https/tls/gnutls_sig.h
   libmicrohttpd/src/daemon/https/tls/gnutls_state.c
   libmicrohttpd/src/daemon/https/tls/gnutls_state.h
   libmicrohttpd/src/daemon/https/tls/gnutls_ui.c
   libmicrohttpd/src/daemon/https/tls/gnutls_x509.c
   libmicrohttpd/src/daemon/https/tls/gnutls_x509.h
   libmicrohttpd/src/daemon/https/x509/common.c
   libmicrohttpd/src/daemon/https/x509/common.h
   libmicrohttpd/src/daemon/https/x509/crl_write.c
   libmicrohttpd/src/daemon/https/x509/crq.c
   libmicrohttpd/src/daemon/https/x509/mpi.c
   libmicrohttpd/src/daemon/https/x509/mpi.h
   libmicrohttpd/src/daemon/https/x509/privkey_pkcs8.c
   libmicrohttpd/src/daemon/https/x509/sign.c
   libmicrohttpd/src/daemon/https/x509/sign.h
   libmicrohttpd/src/daemon/https/x509/x509.c
   libmicrohttpd/src/daemon/https/x509/x509.h
   libmicrohttpd/src/daemon/https/x509/x509_privkey.c
   libmicrohttpd/src/daemon/https/x509/x509_verify.c
   libmicrohttpd/src/daemon/https/x509/x509_write.c
   libmicrohttpd/src/daemon/internal.h
   libmicrohttpd/src/include/microhttpd.h
   libmicrohttpd/src/testcurl/daemon_options_test.c
   libmicrohttpd/src/testcurl/https/Makefile.am
Log:
renaming enums to have MHD_ prefix always, removing a few redundant values

Modified: libmicrohttpd/src/daemon/connection.c
===================================================================
--- libmicrohttpd/src/daemon/connection.c       2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/daemon/connection.c       2008-08-24 17:53:48 UTC (rev 
7592)
@@ -590,10 +590,7 @@
   while (pos != NULL)
     {
       if (pos->kind == kind)
-        {
-          SPRINTF (&data[off], "%s: %s\r\n", pos->header, pos->value);
-          off += strlen (pos->header) + strlen (pos->value) + 4;
-        }
+       off += SPRINTF (&data[off], "%s: %s\r\n", pos->header, pos->value);     
   
       pos = pos->next;
     }
   if (connection->state == MHD_CONNECTION_FOOTERS_RECEIVED)
@@ -601,7 +598,7 @@
       strcpy (&data[off], date);
       off += strlen (date);
     }
-  sprintf (&data[off], "\r\n");
+  memcpy (&data[off], "\r\n", 2);
   off += 2;
   if (off != size)
     abort ();

Modified: libmicrohttpd/src/daemon/connection_https.c
===================================================================
--- libmicrohttpd/src/daemon/connection_https.c 2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/daemon/connection_https.c 2008-08-24 17:53:48 UTC (rev 
7592)
@@ -45,46 +45,41 @@
 int MHD_connection_handle_idle (struct MHD_Connection *connection);
 
 /**
- * retrieve session info
+ * Obtain information about the given connection.
  *
- * @param connection: from which to retrieve data
- * @return: an appropriate 'union MHD_SessionInfo' with the requested 
connection data or 'null_info' in an invalid request has been received.
+ * @param connection what connection to get information about
+ * @param infoType what information is desired?
+ * @param ... depends on infoType
+ * @return NULL if this information is not available
+ *         (or if the infoType is unknown)
  */
-union MHD_SessionInfo
-MHD_get_session_info ( struct MHD_Connection * connection, enum MHD_InfoType 
infoType)
+const union MHD_ConnectionInfo *
+MHD_get_connection_info (struct MHD_Connection * connection,
+                        enum MHD_InfoType infoType,
+                        ...)
 {
-  /* return NULL if this isn't a SSL/TLS type connection */
   if (connection->tls_session == NULL)
-    {
-      /* TODO clean */
-      return (union MHD_SessionInfo) 0;
-    }
+    return NULL;
   switch (infoType)
     {
 #if HTTPS_SUPPORT
     case MHS_INFO_CIPHER_ALGO:
-      return (union MHD_SessionInfo) 
connection->tls_session->security_parameters.
-        read_bulk_cipher_algorithm;
+      return 
&connection->tls_session->security_parameters.read_bulk_cipher_algorithm;
     case MHD_INFO_KX_ALGO:
-      return (union MHD_SessionInfo) 
connection->tls_session->security_parameters.
-        kx_algorithm;
+      return &connection->tls_session->security_parameters.kx_algorithm;
     case MHD_INFO_CREDENTIALS_TYPE:
-      return (union MHD_SessionInfo) 
connection->tls_session->key->cred->algorithm;
+      return &connection->tls_session->key->cred->algorithm;
     case MHD_INFO_MAC_ALGO:
-      return (union MHD_SessionInfo) 
connection->tls_session->security_parameters.
-        read_mac_algorithm;
+      return &connection->tls_session->security_parameters.read_mac_algorithm;
     case MHD_INFO_COMPRESSION_METHOD:
-      return (union MHD_SessionInfo) 
connection->tls_session->security_parameters.
-        read_compression_algorithm;
+      return 
&connection->tls_session->security_parameters.read_compression_algorithm;
     case MHD_INFO_PROTOCOL:
-      return (union MHD_SessionInfo) 
connection->tls_session->security_parameters.
-        version;
+      return &connection->tls_session->security_parameters.version;
     case MHD_INFO_CERT_TYPE:
-      return (union MHD_SessionInfo) 
connection->tls_session->security_parameters.
-        cert_type;
+      return &connection->tls_session->security_parameters.cert_type;
 #endif
     };
-  return (union MHD_SessionInfo) 0;
+  return NULL;
 }
 
 /**

Modified: libmicrohttpd/src/daemon/daemon.c
===================================================================
--- libmicrohttpd/src/daemon/daemon.c   2008-08-24 16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/daemon.c   2008-08-24 17:53:48 UTC (rev 7592)
@@ -74,8 +74,6 @@
 #if HAVE_MESSAGES
           MHD_DLOG (daemon, "Missing X.509 certificate file\n");
 #endif
-          free (daemon);
-          CLOSE (daemon->socket_fd);
           return -1;
         }
 
@@ -84,8 +82,6 @@
 #if HAVE_MESSAGES
           MHD_DLOG (daemon, "Missing X.509 key file\n");
 #endif
-          free (daemon);
-          CLOSE (daemon->socket_fd);
           return -1;
         }
       return MHD_gnutls_certificate_set_x509_key_file (daemon->x509_cred,
@@ -132,9 +128,8 @@
       return 0;
     case MHD_GNUTLS_CRD_CERTIFICATE:
       ret = MHD_gnutls_certificate_allocate_credentials (&daemon->x509_cred) ;
-      if (ret != 0) {
-               return GNUTLS_E_MEMORY_ERROR;
-         }
+      if (ret != 0) 
+       return GNUTLS_E_MEMORY_ERROR;   
       return MHD_init_daemon_certificate (daemon);
     default:
 #if HAVE_MESSAGES
@@ -780,6 +775,17 @@
   return NULL;
 }
 
+/**
+ * Start a webserver on the given port.
+ *
+ * @param port port to bind to
+ * @param apc callback to call to check which clients
+ *        will be allowed to connect
+ * @param apc_cls extra argument to apc
+ * @param dh default handler for all URIs
+ * @param dh_cls extra argument to dh
+ * @return NULL on error, handle to daemon on success
+ */
 struct MHD_Daemon *
 MHD_start_daemon (unsigned int options,
                   unsigned short port,
@@ -790,9 +796,7 @@
   struct MHD_Daemon *ret;
   va_list ap;
 
-  /* initializes argument pointer */
   va_start (ap, dh_cls);
-
   ret = MHD_start_daemon_va (options, port, apc, apc_cls, dh, dh_cls, ap);
   va_end (ap);
   return ret;
@@ -834,12 +838,8 @@
 
   /* allocate the mhd daemon */
   retVal = malloc (sizeof (struct MHD_Daemon));
-
   if (retVal == NULL)
-    {
-      CLOSE (socket_fd);
-      return NULL;
-    }
+    return NULL;    
 
   /* set default daemon values */
   memset (retVal, 0, sizeof (struct MHD_Daemon));
@@ -891,7 +891,7 @@
           retVal->per_ip_connection_limit = va_arg (ap, unsigned int);
           break;
         case  MHD_OPTION_SOCK_ADDR:
-          servaddr = va_arg (ap, struct sockaddr *);
+          servaddr = va_arg (ap, struct sockaddr *);    
           break;
 #if HTTPS_SUPPORT
         case MHD_OPTION_PROTOCOL_VERSION:
@@ -931,13 +931,14 @@
           if (opt > MHD_HTTPS_OPTION_START && opt < MHD_HTTPS_OPTION_END)
             {
               fprintf (stderr,
-                       "Error: HTTPS option %d passed to non HTTPS daemon\n",
+                       "MHD HTTPS option %d passed to MHD compiled without 
HTTPS support\n",
                        opt);
             }
           else
             {
               fprintf (stderr,
-                       "Invalid MHD_OPTION argument! (Did you terminate the 
list with MHD_OPTION_END?)\n");
+                       "Invalid option %d! (Did you terminate the list with 
MHD_OPTION_END?)\n",
+                      opt);
             }
 #endif
           abort ();
@@ -954,6 +955,7 @@
       if ((options & MHD_USE_DEBUG) != 0)
         fprintf (stderr, "Call to socket failed: %s\n", STRERROR (errno));
 #endif
+      free(retVal);
       return NULL;
     }
   if ((SETSOCKOPT (socket_fd,
@@ -967,33 +969,32 @@
     }
 
   /* check for user supplied sockaddr */
-  if (servaddr) {
-         if (options & MHD_USE_IPv6){
-                 addrlen = sizeof (struct sockaddr_in6);
-         }
-         else{
-                 addrlen = sizeof (struct sockaddr_in);
-         }
-  }
-  else if ((options & MHD_USE_IPv6) != 0)
+  if ((options & MHD_USE_IPv6) != 0)
     {
-      memset (&servaddr6, 0, sizeof (struct sockaddr_in6));
-      servaddr6.sin6_family = AF_INET6;
-      servaddr6.sin6_port = htons (port);
-      servaddr = (struct sockaddr *) &servaddr6;
       addrlen = sizeof (struct sockaddr_in6);
     }
   else
     {
-      memset (&servaddr4, 0, sizeof (struct sockaddr_in));
-      servaddr4.sin_family = AF_INET;
-      servaddr4.sin_port = htons (port);
-      servaddr = (struct sockaddr *) &servaddr4;
       addrlen = sizeof (struct sockaddr_in);
     }
-
+  if (NULL == servaddr)
+    {
+      if ((options & MHD_USE_IPv6) != 0)
+       {
+         memset (&servaddr6, 0, sizeof (struct sockaddr_in6));
+         servaddr6.sin6_family = AF_INET6;
+         servaddr6.sin6_port = htons (port);
+         servaddr = (struct sockaddr *) &servaddr6;
+       }
+      else
+       {
+         memset (&servaddr4, 0, sizeof (struct sockaddr_in));
+         servaddr4.sin_family = AF_INET;
+         servaddr4.sin_port = htons (port);
+         servaddr = (struct sockaddr *) &servaddr4;
+       }
+    }
   retVal->socket_fd = socket_fd;
-
   if (BIND (socket_fd, servaddr, addrlen) < 0)
     {
 #if HAVE_MESSAGES
@@ -1002,6 +1003,7 @@
                  "Failed to bind to port %u: %s\n", port, STRERROR (errno));
 #endif
       CLOSE (socket_fd);
+      free(retVal);
       return NULL;
     }
 
@@ -1014,6 +1016,7 @@
                  "Failed to listen for connections: %s\n", STRERROR (errno));
 #endif
       CLOSE (socket_fd);
+      free(retVal);
       return NULL;
     }
 
@@ -1024,40 +1027,29 @@
 #if HAVE_MESSAGES
       MHD_DLOG (retVal, "Failed to initialize HTTPS daemon\n");
 #endif
+      CLOSE (socket_fd);
       free (retVal);
       return NULL;
     }
 #endif
-  if (((0 != (options & MHD_USE_THREAD_PER_CONNECTION)) || (0 != (options
-                                                                  &
-                                                                  
MHD_USE_SELECT_INTERNALLY)))
+  if (((0 != (options & MHD_USE_THREAD_PER_CONNECTION)) || 
+       (0 != (options & MHD_USE_SELECT_INTERNALLY)))
       && (0 !=
           pthread_create (&retVal->pid, NULL, &MHD_select_thread, retVal)))
     {
 #if HAVE_MESSAGES
-      MHD_DLOG (retVal, "Failed to create listen thread: %s\n",
+      MHD_DLOG (retVal, 
+               "Failed to create listen thread: %s\n",
                 STRERROR (errno));
 #endif
       free (retVal);
       CLOSE (socket_fd);
       return NULL;
-    }
-
+    }  
   return retVal;
 }
 
 /**
- * Start a webserver on the given port.
- *
- * @param port port to bind to
- * @param apc callback to call to check which clients
- *        will be allowed to connect
- * @param apc_cls extra argument to apc
- * @param dh default handler for all URIs
- * @param dh_cls extra argument to dh
- * @return NULL on error, handle to daemon on success
- */
-/**
  * Shutdown an http daemon.
  */
 void

Modified: libmicrohttpd/src/daemon/https/gnutls.h
===================================================================
--- libmicrohttpd/src/daemon/https/gnutls.h     2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/daemon/https/gnutls.h     2008-08-24 17:53:48 UTC (rev 
7592)
@@ -233,40 +233,40 @@
   int MHD_gnutls_alert_send_appropriate (mhd_gtls_session_t session, int err);
   const char * MHD_gnutls_alert_get_name (gnutls_alert_description_t alert);
 
-//  gnutls_cipher_algorithm_t gnutls_cipher_get (mhd_gtls_session_t session);
-//  gnutls_kx_algorithm_t gnutls_kx_get (mhd_gtls_session_t session);
-//  gnutls_mac_algorithm_t gnutls_mac_get (mhd_gtls_session_t session);
-//  gnutls_compression_method_t gnutls_compression_get (mhd_gtls_session_t
+//  enum MHD_GNUTLS_CipherAlgorithm gnutls_cipher_get (mhd_gtls_session_t 
session);
+//  enum MHD_GNUTLS_KeyExchangeAlgorithm gnutls_kx_get (mhd_gtls_session_t 
session);
+//  enum MHD_GNUTLS_HashAlgorithm gnutls_mac_get (mhd_gtls_session_t session);
+//  enum MHD_GNUTLS_CompressionMethod gnutls_compression_get 
(mhd_gtls_session_t
 //                                                      session);
-//  gnutls_certificate_type_t gnutls_certificate_type_get (mhd_gtls_session_t
+//  enum MHD_GNUTLS_CertificateType gnutls_certificate_type_get 
(mhd_gtls_session_t
 //                                                         session);
 
-  size_t MHD_gnutls_cipher_get_key_size (gnutls_cipher_algorithm_t algorithm);
-  size_t MHD_gnutls_mac_get_key_size (gnutls_mac_algorithm_t algorithm);
+  size_t MHD_gnutls_cipher_get_key_size (enum MHD_GNUTLS_CipherAlgorithm 
algorithm);
+  size_t MHD_gnutls_mac_get_key_size (enum MHD_GNUTLS_HashAlgorithm algorithm);
 
 /* the name of the specified algorithms */
-  const char * MHD_gnutls_cipher_get_name (gnutls_cipher_algorithm_t 
algorithm);
-  const char * MHD_gnutls_mac_get_name (gnutls_mac_algorithm_t algorithm);
-  const char * MHD_gnutls_compression_get_name (gnutls_compression_method_t
+  const char * MHD_gnutls_cipher_get_name (enum MHD_GNUTLS_CipherAlgorithm 
algorithm);
+  const char * MHD_gnutls_mac_get_name (enum MHD_GNUTLS_HashAlgorithm 
algorithm);
+  const char * MHD_gnutls_compression_get_name (enum 
MHD_GNUTLS_CompressionMethod
                                            algorithm);
-  const char * MHD_gnutls_kx_get_name (gnutls_kx_algorithm_t algorithm);
-  const char * MHD_gnutls_certificate_type_get_name (gnutls_certificate_type_t
+  const char * MHD_gnutls_kx_get_name (enum MHD_GNUTLS_KeyExchangeAlgorithm 
algorithm);
+  const char * MHD_gnutls_certificate_type_get_name (enum 
MHD_GNUTLS_CertificateType
                                                 type);
 
-  gnutls_mac_algorithm_t MHD_gtls_mac_get_id (const char *name);
-  gnutls_compression_method_t MHD_gtls_compression_get_id (const char *name);
-  gnutls_cipher_algorithm_t MHD_gtls_cipher_get_id (const char *name);
-  gnutls_kx_algorithm_t MHD_gtls_kx_get_id (const char *name);
-  gnutls_protocol_t MHD_gtls_protocol_get_id (const char *name);
-  gnutls_certificate_type_t MHD_gtls_certificate_type_get_id (const char 
*name);
+  enum MHD_GNUTLS_HashAlgorithm MHD_gtls_mac_get_id (const char *name);
+  enum MHD_GNUTLS_CompressionMethod MHD_gtls_compression_get_id (const char 
*name);
+  enum MHD_GNUTLS_CipherAlgorithm MHD_gtls_cipher_get_id (const char *name);
+  enum MHD_GNUTLS_KeyExchangeAlgorithm MHD_gtls_kx_get_id (const char *name);
+  enum MHD_GNUTLS_Protocol MHD_gtls_protocol_get_id (const char *name);
+  enum MHD_GNUTLS_CertificateType MHD_gtls_certificate_type_get_id (const char 
*name);
 
   /* list supported algorithms */
-  const gnutls_cipher_algorithm_t * MHD_gtls_cipher_list (void);
-  const gnutls_mac_algorithm_t * MHD_gtls_mac_list (void);
-  const gnutls_compression_method_t * MHD_gtls_compression_list (void);
-  const gnutls_protocol_t * MHD_gtls_protocol_list (void);
-  const gnutls_certificate_type_t * MHD_gtls_certificate_type_list (void);
-  const gnutls_kx_algorithm_t * MHD_gtls_kx_list (void);
+  const enum MHD_GNUTLS_CipherAlgorithm * MHD_gtls_cipher_list (void);
+  const enum MHD_GNUTLS_HashAlgorithm * MHD_gtls_mac_list (void);
+  const enum MHD_GNUTLS_CompressionMethod * MHD_gtls_compression_list (void);
+  const enum MHD_GNUTLS_Protocol * MHD_gtls_protocol_list (void);
+  const enum MHD_GNUTLS_CertificateType * MHD_gtls_certificate_type_list 
(void);
+  const enum MHD_GNUTLS_KeyExchangeAlgorithm * MHD_gtls_kx_list (void);
 
   /* error functions */
   int MHD_gtls_error_is_fatal (int error);
@@ -372,9 +372,9 @@
                                   const char *priority, const char **err_pos);
 
 /* get the currently used protocol version */
-  gnutls_protocol_t MHD_gnutls_protocol_get_version (mhd_gtls_session_t 
session);
+  enum MHD_GNUTLS_Protocol MHD_gnutls_protocol_get_version (mhd_gtls_session_t 
session);
 
-  const char * MHD_gnutls_protocol_get_name (gnutls_protocol_t version);
+  const char * MHD_gnutls_protocol_get_name (enum MHD_GNUTLS_Protocol version);
 
 /*
  * get/set session
@@ -415,7 +415,7 @@
  * cred is a structure defined by the kx algorithm
  */
   int MHD_gnutls_credentials_set (mhd_gtls_session_t session,
-                              gnutls_credentials_type_t type, void *cred);
+                              enum MHD_GNUTLS_CredentialsType type, void 
*cred);
 
 /* Credential structures - used in MHD_gnutls_credentials_set(); */
   struct mhd_gtls_certificate_credentials_st;
@@ -634,7 +634,7 @@
 /*
  * this function returns the hash of the given data.
  */
-  int MHD_gnutls_fingerprint (gnutls_digest_algorithm_t algo,
+  int MHD_gnutls_fingerprint (enum MHD_GNUTLS_HashAlgorithm algo,
                           const gnutls_datum_t * data, void *result,
                           size_t * result_size);
 
@@ -789,7 +789,7 @@
 
   typedef struct gnutls_retr_st
   {
-    gnutls_certificate_type_t type;
+    enum MHD_GNUTLS_CertificateType type;
     union cert
     {
       gnutls_x509_crt_t *x509;
@@ -810,7 +810,7 @@
                                                            req_ca_rdn,
                                                            int nreqs,
                                                            const
-                                                           
gnutls_pk_algorithm_t
+                                                           enum 
MHD_GNUTLS_PublicKeyAlgorithm
                                                            * pk_algos,
                                                            int
                                                            pk_algos_length,
@@ -822,10 +822,10 @@
   /*
    * Functions that allow auth_info_t structures handling
    */
-  gnutls_credentials_type_t MHD_gtls_auth_get_type (mhd_gtls_session_t 
session);
-    gnutls_credentials_type_t
+  enum MHD_GNUTLS_CredentialsType MHD_gtls_auth_get_type (mhd_gtls_session_t 
session);
+    enum MHD_GNUTLS_CredentialsType
     MHD_gtls_auth_server_get_type (mhd_gtls_session_t session);
-    gnutls_credentials_type_t
+    enum MHD_GNUTLS_CredentialsType
     MHD_gtls_auth_client_get_type (mhd_gtls_session_t session);
 
   /*
@@ -852,7 +852,7 @@
   /* External signing callback.  Experimental. */
   typedef int (*gnutls_sign_func) (mhd_gtls_session_t session,
                                    void *userdata,
-                                   gnutls_certificate_type_t cert_type,
+                                   enum MHD_GNUTLS_CertificateType cert_type,
                                    const gnutls_datum_t * cert,
                                    const gnutls_datum_t * hash,
                                    gnutls_datum_t * signature);

Modified: libmicrohttpd/src/daemon/https/tls/auth_cert.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_cert.c      2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/auth_cert.c      2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -113,9 +113,9 @@
  * -1 otherwise.
  */
 inline static int
-_gnutls_check_pk_algo_in_list (const gnutls_pk_algorithm_t *
+_gnutls_check_pk_algo_in_list (const enum MHD_GNUTLS_PublicKeyAlgorithm *
                                pk_algos, int pk_algos_length,
-                               gnutls_pk_algorithm_t algo_to_check)
+                               enum MHD_GNUTLS_PublicKeyAlgorithm 
algo_to_check)
 {
   int i;
   for (i = 0; i < pk_algos_length; i++)
@@ -185,7 +185,7 @@
 static int
 _find_x509_cert (const mhd_gtls_cert_credentials_t cred,
                  opaque * _data, size_t _data_size,
-                 const gnutls_pk_algorithm_t * pk_algos,
+                 const enum MHD_GNUTLS_PublicKeyAlgorithm * pk_algos,
                  int pk_algos_length, int *indx)
 {
   unsigned size;
@@ -348,14 +348,14 @@
 call_get_cert_callback (mhd_gtls_session_t session,
                         gnutls_datum_t * issuers_dn,
                         int issuers_dn_length,
-                        gnutls_pk_algorithm_t * pk_algos, int pk_algos_length)
+                        enum MHD_GNUTLS_PublicKeyAlgorithm * pk_algos, int 
pk_algos_length)
 {
   unsigned i;
   gnutls_cert *local_certs = NULL;
   gnutls_privkey *local_key = NULL;
   gnutls_retr_st st;
   int ret;
-  gnutls_certificate_type_t type = gnutls_certificate_type_get (session);
+  enum MHD_GNUTLS_CertificateType type = gnutls_certificate_type_get (session);
   mhd_gtls_cert_credentials_t cred;
 
   cred = (mhd_gtls_cert_credentials_t)
@@ -443,7 +443,7 @@
 static int
 _select_client_cert (mhd_gtls_session_t session,
                      opaque * _data, size_t _data_size,
-                     gnutls_pk_algorithm_t * pk_algos, int pk_algos_length)
+                     enum MHD_GNUTLS_PublicKeyAlgorithm * pk_algos, int 
pk_algos_length)
 {
   int result;
   int indx = -1;
@@ -793,7 +793,7 @@
 } CertificateSigType;
 
 /* Checks if we support the given signature algorithm 
- * (RSA or DSA). Returns the corresponding gnutls_pk_algorithm_t
+ * (RSA or DSA). Returns the corresponding enum MHD_GNUTLS_PublicKeyAlgorithm
  * if true;
  */
 inline static int
@@ -818,9 +818,9 @@
   cert_auth_info_t info;
   ssize_t dsize;
   int i, j;
-  gnutls_pk_algorithm_t pk_algos[MAX_SIGN_ALGOS];
+  enum MHD_GNUTLS_PublicKeyAlgorithm pk_algos[MAX_SIGN_ALGOS];
   int pk_algos_length;
-  gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session);
+  enum MHD_GNUTLS_Protocol ver = MHD_gnutls_protocol_get_version (session);
 
   cred = (mhd_gtls_cert_credentials_t)
     mhd_gtls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
@@ -1014,7 +1014,7 @@
   mhd_gtls_cert_credentials_t cred;
   int size;
   opaque *pdata;
-  gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session);
+  enum MHD_GNUTLS_Protocol ver = MHD_gnutls_protocol_get_version (session);
 
   /* Now we need to generate the RDN sequence. This is
    * already in the CERTIFICATE_CRED structure, to improve
@@ -1029,7 +1029,7 @@
       return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
     }
 
-  size = CERTTYPE_SIZE + 2;     /* 2 for gnutls_certificate_type_t + 2 for 
size of rdn_seq 
+  size = CERTTYPE_SIZE + 2;     /* 2 for enum MHD_GNUTLS_CertificateType + 2 
for size of rdn_seq 
                                  */
 
   if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509 &&
@@ -1248,7 +1248,7 @@
  */
 int
 mhd_gtls_server_select_cert (mhd_gtls_session_t session,
-                            gnutls_pk_algorithm_t requested_algo)
+                            enum MHD_GNUTLS_PublicKeyAlgorithm requested_algo)
 {
   unsigned i;
   int idx, ret;

Modified: libmicrohttpd/src/daemon/https/tls/auth_cert.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_cert.h      2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/auth_cert.h      2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -141,7 +141,7 @@
                               gnutls_privkey ** apr_pkey);
 
 int mhd_gtls_server_select_cert (struct MHD_gtls_session_int *,
-                               gnutls_pk_algorithm_t);
+                               enum MHD_GNUTLS_PublicKeyAlgorithm);
 void mhd_gtls_selected_certs_deinit (mhd_gtls_session_t session);
 void mhd_gtls_selected_certs_set (mhd_gtls_session_t session,
                                 gnutls_cert * certs, int ncerts,

Modified: libmicrohttpd/src/daemon/https/tls/auth_rsa.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/auth_rsa.c       2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/auth_rsa.c       2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -325,7 +325,7 @@
   mpi_t params[MAX_PUBLIC_PARAMS_SIZE];
   int params_len = MAX_PUBLIC_PARAMS_SIZE;
   int ret, i;
-  gnutls_protocol_t ver;
+  enum MHD_GNUTLS_Protocol ver;
 
   if (auth == NULL)
     {

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c      2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c      2008-08-24 
17:53:48 UTC (rev 7592)
@@ -35,9 +35,9 @@
  */
 typedef struct
 {
-  gnutls_kx_algorithm_t algorithm;
-  gnutls_credentials_type_t client_type;
-  gnutls_credentials_type_t server_type;        /* The type of credentials a 
server
+  enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm;
+  enum MHD_GNUTLS_CredentialsType client_type;
+  enum MHD_GNUTLS_CredentialsType server_type;        /* The type of 
credentials a server
                                                  * needs to set */
 } gnutls_cred_map;
 
@@ -84,8 +84,8 @@
 /* KX mappings to PK algorithms */
 typedef struct
 {
-  gnutls_kx_algorithm_t kx_algorithm;
-  gnutls_pk_algorithm_t pk_algorithm;
+  enum MHD_GNUTLS_KeyExchangeAlgorithm kx_algorithm;
+  enum MHD_GNUTLS_PublicKeyAlgorithm pk_algorithm;
   enum encipher_type encipher_type;     /* CIPHER_ENCRYPT if this algorithm is 
to be used
                                          * for encryption, CIPHER_SIGN if 
signature only,
                                          * CIPHER_IGN if this does not apply 
at all.
@@ -130,7 +130,7 @@
 typedef struct
 {
   const char *name;
-  gnutls_protocol_t id;         /* gnutls internal version number */
+  enum MHD_GNUTLS_Protocol id;         /* gnutls internal version number */
   int major;                    /* defined by the protocol */
   int minor;                    /* defined by the protocol */
   int supported;                /* 0 not supported, > 0 is supported */
@@ -165,7 +165,7 @@
 };
 
 /* Keep the contents of this struct the same as the previous one. */
-static const gnutls_protocol_t mhd_gtls_supported_protocols[] = { 
MHD_GNUTLS_SSL3,
+static const enum MHD_GNUTLS_Protocol mhd_gtls_supported_protocols[] = { 
MHD_GNUTLS_SSL3,
   MHD_GNUTLS_TLS1_0,
   MHD_GNUTLS_TLS1_1,
   MHD_GNUTLS_TLS1_2,
@@ -182,7 +182,7 @@
 struct gnutls_cipher_entry
 {
   const char *name;
-  gnutls_cipher_algorithm_t id;
+  enum MHD_GNUTLS_CipherAlgorithm id;
   uint16_t blocksize;
   uint16_t keysize;
   cipher_type_t block;
@@ -271,7 +271,7 @@
 };
 
 /* Keep the contents of this struct the same as the previous one. */
-static const gnutls_cipher_algorithm_t mhd_gtls_supported_ciphers[] =
+static const enum MHD_GNUTLS_CipherAlgorithm mhd_gtls_supported_ciphers[] =
   { MHD_GNUTLS_CIPHER_AES_256_CBC,
   MHD_GNUTLS_CIPHER_AES_128_CBC,
   MHD_GNUTLS_CIPHER_3DES_CBC,
@@ -298,7 +298,7 @@
 {
   const char *name;
   const char *oid;
-  gnutls_mac_algorithm_t id;
+  enum MHD_GNUTLS_HashAlgorithm id;
   size_t key_size;              /* in case of mac */
 };
 typedef struct gnutls_hash_entry gnutls_hash_entry;
@@ -327,7 +327,7 @@
 };
 
 /* Keep the contents of this struct the same as the previous one. */
-static const gnutls_mac_algorithm_t mhd_gtls_supported_macs[] = { 
MHD_GNUTLS_MAC_SHA1,
+static const enum MHD_GNUTLS_HashAlgorithm mhd_gtls_supported_macs[] = { 
MHD_GNUTLS_MAC_SHA1,
   MHD_GNUTLS_MAC_MD5,
   MHD_GNUTLS_MAC_SHA256,
   MHD_GNUTLS_MAC_NULL,
@@ -364,7 +364,7 @@
    0}
 };
 
-static const gnutls_compression_method_t mhd_gtls_supported_compressions[] = {
+static const enum MHD_GNUTLS_CompressionMethod 
mhd_gtls_supported_compressions[] = {
 #ifdef HAVE_LIBZ
   MHD_GNUTLS_COMP_DEFLATE,
 #endif
@@ -395,7 +395,7 @@
 typedef struct mhd_gtls_kx_algo_entry
 {
   const char *name;
-  gnutls_kx_algorithm_t algorithm;
+  enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm;
   mhd_gtls_mod_auth_st *auth_struct;
   int needs_dh_params;
   int needs_rsa_params;
@@ -444,7 +444,7 @@
 };
 
 /* Keep the contents of this struct the same as the previous one. */
-static const gnutls_kx_algorithm_t mhd_gtls_supported_kxs[] = {
+static const enum MHD_GNUTLS_KeyExchangeAlgorithm mhd_gtls_supported_kxs[] = {
 #ifdef ENABLE_ANON
   MHD_GNUTLS_KX_ANON_DH,
 #endif
@@ -479,10 +479,10 @@
 {
   const char *name;
   cipher_suite_st id;
-  gnutls_cipher_algorithm_t block_algorithm;
-  gnutls_kx_algorithm_t kx_algorithm;
-  gnutls_mac_algorithm_t mac_algorithm;
-  gnutls_protocol_t version;    /* this cipher suite is supported
+  enum MHD_GNUTLS_CipherAlgorithm block_algorithm;
+  enum MHD_GNUTLS_KeyExchangeAlgorithm kx_algorithm;
+  enum MHD_GNUTLS_HashAlgorithm mac_algorithm;
+  enum MHD_GNUTLS_Protocol version;    /* this cipher suite is supported
                                  * from 'version' and above;
                                  */
 } mhd_gtls_cipher_suite_entry;
@@ -763,7 +763,7 @@
 
 int
 mhd_gtls_mac_priority (mhd_gtls_session_t session,
-                      gnutls_mac_algorithm_t algorithm)
+                      enum MHD_GNUTLS_HashAlgorithm algorithm)
 {                               /* actually returns the priority */
   unsigned int i;
   for (i = 0; i < session->internals.priorities.mac.num_algorithms; i++)
@@ -782,7 +782,7 @@
  * algorithm, or %NULL.
  **/
 const char *
-MHD_gnutls_mac_get_name (gnutls_mac_algorithm_t algorithm)
+MHD_gnutls_mac_get_name (enum MHD_GNUTLS_HashAlgorithm algorithm)
 {
   const char *ret = NULL;
 
@@ -796,14 +796,14 @@
  * MHD_gtls_mac_get_id - Returns the gnutls id of the specified in string 
algorithm
  * @algorithm: is a MAC algorithm name
  *
- * Returns: an %gnutls_mac_algorithm_tid of the specified in a string
+ * Returns: an %enum MHD_GNUTLS_HashAlgorithmid of the specified in a string
  * MAC algorithm, or %GNUTLS_MAC_UNKNOWN on failures.  The names are
  * compared in a case insensitive way.
  **/
-gnutls_mac_algorithm_t
+enum MHD_GNUTLS_HashAlgorithm
 MHD_gtls_mac_get_id (const char *name)
 {
-  gnutls_mac_algorithm_t ret = MHD_GNUTLS_MAC_UNKNOWN;
+  enum MHD_GNUTLS_HashAlgorithm ret = MHD_GNUTLS_MAC_UNKNOWN;
 
   GNUTLS_HASH_LOOP (if (strcasecmp (p->name, name) == 0) ret = p->id)
     ;
@@ -820,7 +820,7 @@
  *
  **/
 size_t
-MHD_gnutls_mac_get_key_size (gnutls_mac_algorithm_t algorithm)
+MHD_gnutls_mac_get_key_size (enum MHD_GNUTLS_HashAlgorithm algorithm)
 {
   size_t ret = 0;
 
@@ -838,17 +838,17 @@
  * example, MD2 is not supported as a cipher suite, but is supported
  * for other purposes (e.g., X.509 signature verification or similar).
  *
- * Returns: Return a zero-terminated list of %gnutls_mac_algorithm_t
+ * Returns: Return a zero-terminated list of %enum MHD_GNUTLS_HashAlgorithm
  * integers indicating the available MACs.
  **/
-const gnutls_mac_algorithm_t *
+const enum MHD_GNUTLS_HashAlgorithm *
 MHD_gtls_mac_list (void)
 {
   return mhd_gtls_supported_macs;
 }
 
 const char *
-mhd_gtls_x509_mac_to_oid (gnutls_mac_algorithm_t algorithm)
+mhd_gtls_x509_mac_to_oid (enum MHD_GNUTLS_HashAlgorithm algorithm)
 {
   const char *ret = NULL;
 
@@ -858,10 +858,10 @@
   return ret;
 }
 
-gnutls_mac_algorithm_t
+enum MHD_GNUTLS_HashAlgorithm
 mhd_gtls_x509_oid2mac_algorithm (const char *oid)
 {
-  gnutls_mac_algorithm_t ret = 0;
+  enum MHD_GNUTLS_HashAlgorithm ret = 0;
 
   GNUTLS_HASH_LOOP (if (p->oid && strcmp (oid, p->oid) == 0)
                     {
@@ -875,7 +875,7 @@
 }
 
 int
-mhd_gnutls_mac_is_ok (gnutls_mac_algorithm_t algorithm)
+mhd_gnutls_mac_is_ok (enum MHD_GNUTLS_HashAlgorithm algorithm)
 {
   ssize_t ret = -1;
   GNUTLS_HASH_ALG_LOOP (ret = p->id);
@@ -889,7 +889,7 @@
 /* Compression Functions */
 int
 mhd_gtls_compression_priority (mhd_gtls_session_t session,
-                              gnutls_compression_method_t algorithm)
+                              enum MHD_GNUTLS_CompressionMethod algorithm)
 {                               /* actually returns the priority */
   unsigned int i;
   for (i = 0; i < session->internals.priorities.compression.num_algorithms; 
i++)
@@ -908,7 +908,7 @@
  * specified compression algorithm, or %NULL.
  **/
 const char *
-MHD_gnutls_compression_get_name (gnutls_compression_method_t algorithm)
+MHD_gnutls_compression_get_name (enum MHD_GNUTLS_CompressionMethod algorithm)
 {
   const char *ret = NULL;
 
@@ -928,10 +928,10 @@
  * %GNUTLS_COMP_UNKNOWN on error.
  *
  **/
-gnutls_compression_method_t
+enum MHD_GNUTLS_CompressionMethod
 MHD_gtls_compression_get_id (const char *name)
 {
-  gnutls_compression_method_t ret = MHD_GNUTLS_COMP_UNKNOWN;
+  enum MHD_GNUTLS_CompressionMethod ret = MHD_GNUTLS_COMP_UNKNOWN;
 
   GNUTLS_COMPRESSION_LOOP (if
                            (strcasecmp
@@ -949,10 +949,10 @@
  * compression, you must link to libgnutls-extra and call
  * gnutls_global_init_extra().
  *
- * Returns: a zero-terminated list of %gnutls_compression_method_t
+ * Returns: a zero-terminated list of %enum MHD_GNUTLS_CompressionMethod
  * integers indicating the available compression methods.
  **/
-const gnutls_compression_method_t *
+const enum MHD_GNUTLS_CompressionMethod *
 MHD_gtls_compression_list (void)
 {
   return mhd_gtls_supported_compressions;
@@ -960,7 +960,7 @@
 
 /* return the tls number of the specified algorithm */
 int
-mhd_gtls_compression_get_num (gnutls_compression_method_t algorithm)
+mhd_gtls_compression_get_num (enum MHD_GNUTLS_CompressionMethod algorithm)
 {
   int ret = -1;
 
@@ -971,7 +971,7 @@
 }
 
 int
-mhd_gtls_compression_get_wbits (gnutls_compression_method_t algorithm)
+mhd_gtls_compression_get_wbits (enum MHD_GNUTLS_CompressionMethod algorithm)
 {
   int ret = -1;
   /* avoid prefix */
@@ -980,7 +980,7 @@
 }
 
 int
-mhd_gtls_compression_get_mem_level (gnutls_compression_method_t algorithm)
+mhd_gtls_compression_get_mem_level (enum MHD_GNUTLS_CompressionMethod 
algorithm)
 {
   int ret = -1;
   /* avoid prefix */
@@ -989,7 +989,7 @@
 }
 
 int
-mhd_gtls_compression_get_comp_level (gnutls_compression_method_t algorithm)
+mhd_gtls_compression_get_comp_level (enum MHD_GNUTLS_CompressionMethod 
algorithm)
 {
   int ret = -1;
   /* avoid prefix */
@@ -1000,10 +1000,10 @@
 /* returns the gnutls internal ID of the TLS compression
  * method num
  */
-gnutls_compression_method_t
+enum MHD_GNUTLS_CompressionMethod
 mhd_gtls_compression_get_id (int num)
 {
-  gnutls_compression_method_t ret = -1;
+  enum MHD_GNUTLS_CompressionMethod ret = -1;
 
   /* avoid prefix */
   GNUTLS_COMPRESSION_ALG_LOOP_NUM (ret = p->id);
@@ -1012,7 +1012,7 @@
 }
 
 int
-mhd_gtls_compression_is_ok (gnutls_compression_method_t algorithm)
+mhd_gtls_compression_is_ok (enum MHD_GNUTLS_CompressionMethod algorithm)
 {
   ssize_t ret = -1;
   GNUTLS_COMPRESSION_ALG_LOOP (ret = p->id);
@@ -1025,7 +1025,7 @@
 
 /* CIPHER functions */
 int
-mhd_gtls_cipher_get_block_size (gnutls_cipher_algorithm_t algorithm)
+mhd_gtls_cipher_get_block_size (enum MHD_GNUTLS_CipherAlgorithm algorithm)
 {
   size_t ret = 0;
   GNUTLS_ALG_LOOP (ret = p->blocksize);
@@ -1036,7 +1036,7 @@
 /* returns the priority */
 int
 mhd_gtls_cipher_priority (mhd_gtls_session_t session,
-                         gnutls_cipher_algorithm_t algorithm)
+                         enum MHD_GNUTLS_CipherAlgorithm algorithm)
 {
   unsigned int i;
   for (i = 0; i < session->internals.priorities.cipher.num_algorithms; i++)
@@ -1048,7 +1048,7 @@
 }
 
 int
-mhd_gtls_cipher_is_block (gnutls_cipher_algorithm_t algorithm)
+mhd_gtls_cipher_is_block (enum MHD_GNUTLS_CipherAlgorithm algorithm)
 {
   size_t ret = 0;
 
@@ -1065,7 +1065,7 @@
  *   the given cipher is invalid.
  **/
 size_t
-MHD_gnutls_cipher_get_key_size (gnutls_cipher_algorithm_t algorithm)
+MHD_gnutls_cipher_get_key_size (enum MHD_GNUTLS_CipherAlgorithm algorithm)
 {                               /* In bytes */
   size_t ret = 0;
   GNUTLS_ALG_LOOP (ret = p->keysize);
@@ -1074,7 +1074,7 @@
 }
 
 int
-mhd_gtls_cipher_get_iv_size (gnutls_cipher_algorithm_t algorithm)
+mhd_gtls_cipher_get_iv_size (enum MHD_GNUTLS_CipherAlgorithm algorithm)
 {                               /* In bytes */
   size_t ret = 0;
   GNUTLS_ALG_LOOP (ret = p->iv);
@@ -1083,7 +1083,7 @@
 }
 
 int
-mhd_gtls_cipher_get_export_flag (gnutls_cipher_algorithm_t algorithm)
+mhd_gtls_cipher_get_export_flag (enum MHD_GNUTLS_CipherAlgorithm algorithm)
 {                               /* In bytes */
   size_t ret = 0;
   GNUTLS_ALG_LOOP (ret = p->export_flag);
@@ -1099,7 +1099,7 @@
  *   specified cipher, or %NULL.
  **/
 const char *
-MHD_gnutls_cipher_get_name (gnutls_cipher_algorithm_t algorithm)
+MHD_gnutls_cipher_get_name (enum MHD_GNUTLS_CipherAlgorithm algorithm)
 {
   const char *ret = NULL;
 
@@ -1119,10 +1119,10 @@
  * on error.
  *
  **/
-gnutls_cipher_algorithm_t
+enum MHD_GNUTLS_CipherAlgorithm
 MHD_gtls_cipher_get_id (const char *name)
 {
-  gnutls_cipher_algorithm_t ret = MHD_GNUTLS_CIPHER_UNKNOWN;
+  enum MHD_GNUTLS_CipherAlgorithm ret = MHD_GNUTLS_CIPHER_UNKNOWN;
 
   GNUTLS_LOOP (if (strcasecmp (p->name, name) == 0) ret = p->id)
     ;
@@ -1138,18 +1138,18 @@
  * example, DES is not supported as a cipher suite, but is supported
  * for other purposes (e.g., PKCS#8 or similar).
  *
- * Returns: a zero-terminated list of %gnutls_cipher_algorithm_t
+ * Returns: a zero-terminated list of %enum MHD_GNUTLS_CipherAlgorithm
  * integers indicating the available ciphers.
  *
  **/
-const gnutls_cipher_algorithm_t *
+const enum MHD_GNUTLS_CipherAlgorithm *
 MHD_gtls_cipher_list (void)
 {
   return mhd_gtls_supported_ciphers;
 }
 
 int
-mhd_gtls_cipher_is_ok (gnutls_cipher_algorithm_t algorithm)
+mhd_gtls_cipher_is_ok (enum MHD_GNUTLS_CipherAlgorithm algorithm)
 {
   ssize_t ret = -1;
   GNUTLS_ALG_LOOP (ret = p->id);
@@ -1162,7 +1162,7 @@
 
 /* Key EXCHANGE functions */
 mhd_gtls_mod_auth_st *
-mhd_gtls_kx_auth_struct (gnutls_kx_algorithm_t algorithm)
+mhd_gtls_kx_auth_struct (enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm)
 {
   mhd_gtls_mod_auth_st *ret = NULL;
   GNUTLS_KX_ALG_LOOP (ret = p->auth_struct);
@@ -1172,7 +1172,7 @@
 
 int
 mhd_gtls_kx_priority (mhd_gtls_session_t session,
-                     gnutls_kx_algorithm_t algorithm)
+                     enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm)
 {
   unsigned int i;
   for (i = 0; i < session->internals.priorities.kx.num_algorithms; i++)
@@ -1191,7 +1191,7 @@
  * specified key exchange algorithm, or %NULL.
  **/
 const char *
-MHD_gnutls_kx_get_name (gnutls_kx_algorithm_t algorithm)
+MHD_gnutls_kx_get_name (enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm)
 {
   const char *ret = NULL;
 
@@ -1210,10 +1210,10 @@
  * Returns: an id of the specified KX algorithm, or
  * %GNUTLS_KX_UNKNOWN on error.
  **/
-gnutls_kx_algorithm_t
+enum MHD_GNUTLS_KeyExchangeAlgorithm
 MHD_gtls_kx_get_id (const char *name)
 {
-  gnutls_cipher_algorithm_t ret = MHD_GNUTLS_KX_UNKNOWN;
+  enum MHD_GNUTLS_CipherAlgorithm ret = MHD_GNUTLS_KX_UNKNOWN;
 
   GNUTLS_KX_LOOP (if (strcasecmp (p->name, name) == 0) ret = p->algorithm)
     ;
@@ -1226,17 +1226,17 @@
  *
  * Get a list of supported key exchange algorithms.
  *
- * Returns: a zero-terminated list of %gnutls_kx_algorithm_t integers
+ * Returns: a zero-terminated list of %enum MHD_GNUTLS_KeyExchangeAlgorithm 
integers
  * indicating the available key exchange algorithms.
  **/
-const gnutls_kx_algorithm_t *
+const enum MHD_GNUTLS_KeyExchangeAlgorithm *
 MHD_gtls_kx_list (void)
 {
   return mhd_gtls_supported_kxs;
 }
 
 int
-mhd_gtls_kx_is_ok (gnutls_kx_algorithm_t algorithm)
+mhd_gtls_kx_is_ok (enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm)
 {
   ssize_t ret = -1;
   GNUTLS_KX_ALG_LOOP (ret = p->algorithm);
@@ -1248,7 +1248,7 @@
 }
 
 int
-mhd_gtls_kx_needs_rsa_params (gnutls_kx_algorithm_t algorithm)
+mhd_gtls_kx_needs_rsa_params (enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm)
 {
   ssize_t ret = 0;
   GNUTLS_KX_ALG_LOOP (ret = p->needs_rsa_params);
@@ -1256,7 +1256,7 @@
 }
 
 int
-mhd_gtls_kx_needs_dh_params (gnutls_kx_algorithm_t algorithm)
+mhd_gtls_kx_needs_dh_params (enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm)
 {
   ssize_t ret = 0;
   GNUTLS_KX_ALG_LOOP (ret = p->needs_dh_params);
@@ -1265,7 +1265,7 @@
 
 /* Version */
 int
-mhd_gtls_version_priority (mhd_gtls_session_t session, gnutls_protocol_t 
version)
+mhd_gtls_version_priority (mhd_gtls_session_t session, enum 
MHD_GNUTLS_Protocol version)
 {                               /* actually returns the priority */
   unsigned int i;
 
@@ -1283,7 +1283,7 @@
   return -1;
 }
 
-gnutls_protocol_t
+enum MHD_GNUTLS_Protocol
 mhd_gtls_version_lowest (mhd_gtls_session_t session)
 {                               /* returns the lowest version supported */
   unsigned int i, min = 0xff;
@@ -1305,7 +1305,7 @@
   return min;
 }
 
-gnutls_protocol_t
+enum MHD_GNUTLS_Protocol
 mhd_gtls_version_max (mhd_gtls_session_t session)
 {                               /* returns the maximum version supported */
   unsigned int i, max = 0x00;
@@ -1335,7 +1335,7 @@
  * version (e.g., "TLS 1.0"), or %NULL.
  **/
 const char *
-MHD_gnutls_protocol_get_name (gnutls_protocol_t version)
+MHD_gnutls_protocol_get_name (enum MHD_GNUTLS_Protocol version)
 {
   const char *ret = NULL;
 
@@ -1353,10 +1353,10 @@
  * Returns: an id of the specified protocol, or
  * %GNUTLS_VERSION_UNKNOWN on error.
  **/
-gnutls_protocol_t
+enum MHD_GNUTLS_Protocol
 MHD_gtls_protocol_get_id (const char *name)
 {
-  gnutls_protocol_t ret = MHD_GNUTLS_VERSION_UNKNOWN;
+  enum MHD_GNUTLS_Protocol ret = MHD_GNUTLS_VERSION_UNKNOWN;
 
   GNUTLS_VERSION_LOOP (if (strcasecmp (p->name, name) == 0) ret = p->id)
     ;
@@ -1369,18 +1369,18 @@
  *
  * Get a list of supported protocols, e.g. SSL 3.0, TLS 1.0 etc.
  *
- * Returns: a zero-terminated list of %gnutls_protocol_t integers
+ * Returns: a zero-terminated list of %enum MHD_GNUTLS_Protocol integers
  * indicating the available protocols.
  *
  **/
-const gnutls_protocol_t *
+const enum MHD_GNUTLS_Protocol *
 MHD_gtls_protocol_list (void)
 {
   return mhd_gtls_supported_protocols;
 }
 
 int
-mhd_gtls_version_get_minor (gnutls_protocol_t version)
+mhd_gtls_version_get_minor (enum MHD_GNUTLS_Protocol version)
 {
   int ret = -1;
 
@@ -1388,7 +1388,7 @@
   return ret;
 }
 
-gnutls_protocol_t
+enum MHD_GNUTLS_Protocol
 mhd_gtls_version_get (int major, int minor)
 {
   int ret = -1;
@@ -1400,7 +1400,7 @@
 }
 
 int
-mhd_gtls_version_get_major (gnutls_protocol_t version)
+mhd_gtls_version_get_major (enum MHD_GNUTLS_Protocol version)
 {
   int ret = -1;
 
@@ -1412,7 +1412,7 @@
 
 int
 mhd_gtls_version_is_supported (mhd_gtls_session_t session,
-                              const gnutls_protocol_t version)
+                              const enum MHD_GNUTLS_Protocol version)
 {
   int ret = 0;
 
@@ -1427,10 +1427,10 @@
 }
 
 /* Type to KX mappings */
-gnutls_kx_algorithm_t
-mhd_gtls_map_kx_get_kx (gnutls_credentials_type_t type, int server)
+enum MHD_GNUTLS_KeyExchangeAlgorithm
+mhd_gtls_map_kx_get_kx (enum MHD_GNUTLS_CredentialsType type, int server)
 {
-  gnutls_kx_algorithm_t ret = -1;
+  enum MHD_GNUTLS_KeyExchangeAlgorithm ret = -1;
 
   if (server)
     {
@@ -1443,10 +1443,10 @@
   return ret;
 }
 
-gnutls_credentials_type_t
-mhd_gtls_map_kx_get_cred (gnutls_kx_algorithm_t algorithm, int server)
+enum MHD_GNUTLS_CredentialsType
+mhd_gtls_map_kx_get_cred (enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm, int 
server)
 {
-  gnutls_credentials_type_t ret = -1;
+  enum MHD_GNUTLS_CredentialsType ret = -1;
   if (server)
     {
       GNUTLS_KX_MAP_LOOP (if (p->algorithm == algorithm) ret = p->server_type)
@@ -1462,7 +1462,7 @@
 }
 
 /* Cipher Suite's functions */
-gnutls_cipher_algorithm_t
+enum MHD_GNUTLS_CipherAlgorithm
 mhd_gtls_cipher_suite_get_cipher_algo (const cipher_suite_st * suite)
 {
   int ret = 0;
@@ -1470,7 +1470,7 @@
   return ret;
 }
 
-gnutls_protocol_t
+enum MHD_GNUTLS_Protocol
 mhd_gtls_cipher_suite_get_version (const cipher_suite_st * suite)
 {
   int ret = 0;
@@ -1478,7 +1478,7 @@
   return ret;
 }
 
-gnutls_kx_algorithm_t
+enum MHD_GNUTLS_KeyExchangeAlgorithm
 mhd_gtls_cipher_suite_get_kx_algo (const cipher_suite_st * suite)
 {
   int ret = 0;
@@ -1488,7 +1488,7 @@
 
 }
 
-gnutls_mac_algorithm_t
+enum MHD_GNUTLS_HashAlgorithm
 mhd_gtls_cipher_suite_get_mac_algo (const cipher_suite_st * suite)
 {                               /* In bytes */
   int ret = 0;
@@ -1613,17 +1613,17 @@
 _gnutls_compare_algo (mhd_gtls_session_t session,
                       const void *i_A1, const void *i_A2)
 {
-  gnutls_kx_algorithm_t kA1 =
+  enum MHD_GNUTLS_KeyExchangeAlgorithm kA1 =
     mhd_gtls_cipher_suite_get_kx_algo ((const cipher_suite_st *) i_A1);
-  gnutls_kx_algorithm_t kA2 =
+  enum MHD_GNUTLS_KeyExchangeAlgorithm kA2 =
     mhd_gtls_cipher_suite_get_kx_algo ((const cipher_suite_st *) i_A2);
-  gnutls_cipher_algorithm_t cA1 =
+  enum MHD_GNUTLS_CipherAlgorithm cA1 =
     mhd_gtls_cipher_suite_get_cipher_algo ((const cipher_suite_st *) i_A1);
-  gnutls_cipher_algorithm_t cA2 =
+  enum MHD_GNUTLS_CipherAlgorithm cA2 =
     mhd_gtls_cipher_suite_get_cipher_algo ((const cipher_suite_st *) i_A2);
-  gnutls_mac_algorithm_t mA1 =
+  enum MHD_GNUTLS_HashAlgorithm mA1 =
     mhd_gtls_cipher_suite_get_mac_algo ((const cipher_suite_st *) i_A1);
-  gnutls_mac_algorithm_t mA2 =
+  enum MHD_GNUTLS_HashAlgorithm mA2 =
     mhd_gtls_cipher_suite_get_mac_algo ((const cipher_suite_st *) i_A2);
 
   int p1 = (mhd_gtls_kx_priority (session, kA1) + 1) * 64;
@@ -1717,7 +1717,7 @@
   unsigned int count = CIPHER_SUITES_COUNT;
   cipher_suite_st *tmp_ciphers;
   cipher_suite_st *ciphers;
-  gnutls_protocol_t version;
+  enum MHD_GNUTLS_Protocol version;
 
   if (count == 0)
     {
@@ -1860,7 +1860,7 @@
  * specified certificate type.
  **/
 const char *
-MHD_gnutls_certificate_type_get_name (gnutls_certificate_type_t type)
+MHD_gnutls_certificate_type_get_name (enum MHD_GNUTLS_CertificateType type)
 {
   const char *ret = NULL;
 
@@ -1878,17 +1878,17 @@
  * Returns: an id of the specified in a string certificate type, or
  * %GNUTLS_CRT_UNKNOWN on error.
  **/
-gnutls_certificate_type_t
+enum MHD_GNUTLS_CertificateType
 MHD_gtls_certificate_type_get_id (const char *name)
 {
-  gnutls_certificate_type_t ret = MHD_GNUTLS_CRT_UNKNOWN;
+  enum MHD_GNUTLS_CertificateType ret = MHD_GNUTLS_CRT_UNKNOWN;
 
   if (strcasecmp (name, "X.509") == 0 || strcasecmp (name, "X509") == 0)
     return MHD_GNUTLS_CRT_X509;
   return ret;
 }
 
-static const gnutls_certificate_type_t mhd_gtls_supported_certificate_types[] =
+static const enum MHD_GNUTLS_CertificateType 
mhd_gtls_supported_certificate_types[] =
   { MHD_GNUTLS_CRT_X509,
   0
 };
@@ -1898,23 +1898,23 @@
  *
  * Get a list of certificate types.
  *
- * Returns: a zero-terminated list of %gnutls_certificate_type_t
+ * Returns: a zero-terminated list of %enum MHD_GNUTLS_CertificateType
  * integers indicating the available certificate types.
  *
  **/
-const gnutls_certificate_type_t *
+const enum MHD_GNUTLS_CertificateType *
 MHD_gtls_certificate_type_list (void)
 {
   return mhd_gtls_supported_certificate_types;
 }
 
-/* returns the gnutls_pk_algorithm_t which is compatible with
- * the given gnutls_kx_algorithm_t.
+/* returns the enum MHD_GNUTLS_PublicKeyAlgorithm which is compatible with
+ * the given enum MHD_GNUTLS_KeyExchangeAlgorithm.
  */
-gnutls_pk_algorithm_t
-mhd_gtls_map_pk_get_pk (gnutls_kx_algorithm_t kx_algorithm)
+enum MHD_GNUTLS_PublicKeyAlgorithm
+mhd_gtls_map_pk_get_pk (enum MHD_GNUTLS_KeyExchangeAlgorithm kx_algorithm)
 {
-  gnutls_pk_algorithm_t ret = -1;
+  enum MHD_GNUTLS_PublicKeyAlgorithm ret = -1;
 
   GNUTLS_PK_MAP_ALG_LOOP (ret = p->pk_algorithm) return ret;
 }
@@ -1925,7 +1925,7 @@
  * ex. GNUTLS_KX_RSA requires a certificate able to encrypt... so returns 
CIPHER_ENCRYPT.
  */
 enum encipher_type
-mhd_gtls_kx_encipher_type (gnutls_kx_algorithm_t kx_algorithm)
+mhd_gtls_kx_encipher_type (enum MHD_GNUTLS_KeyExchangeAlgorithm kx_algorithm)
 {
   int ret = CIPHER_IGN;
   GNUTLS_PK_MAP_ALG_LOOP (ret = p->encipher_type) return ret;
@@ -1939,8 +1939,8 @@
   const char *name;
   const char *oid;
   gnutls_sign_algorithm_t id;
-  gnutls_pk_algorithm_t pk;
-  gnutls_mac_algorithm_t mac;
+  enum MHD_GNUTLS_PublicKeyAlgorithm pk;
+  enum MHD_GNUTLS_HashAlgorithm mac;
 };
 typedef struct gnutls_sign_entry gnutls_sign_entry;
 
@@ -2005,7 +2005,7 @@
 }
 
 gnutls_sign_algorithm_t
-mhd_gtls_x509_pk_to_sign (gnutls_pk_algorithm_t pk, gnutls_mac_algorithm_t mac)
+mhd_gtls_x509_pk_to_sign (enum MHD_GNUTLS_PublicKeyAlgorithm pk, enum 
MHD_GNUTLS_HashAlgorithm mac)
 {
   gnutls_sign_algorithm_t ret = 0;
 
@@ -2020,8 +2020,8 @@
 }
 
 const char *
-mhd_gtls_x509_sign_to_oid (gnutls_pk_algorithm_t pk,
-                          gnutls_mac_algorithm_t mac)
+mhd_gtls_x509_sign_to_oid (enum MHD_GNUTLS_PublicKeyAlgorithm pk,
+                          enum MHD_GNUTLS_HashAlgorithm mac)
 {
   gnutls_sign_algorithm_t sign;
   const char *ret = NULL;
@@ -2040,7 +2040,7 @@
 {
   const char *name;
   const char *oid;
-  gnutls_pk_algorithm_t id;
+  enum MHD_GNUTLS_PublicKeyAlgorithm id;
 };
 typedef struct gnutls_pk_entry gnutls_pk_entry;
 
@@ -2059,10 +2059,10 @@
    0}
 };
 
-gnutls_pk_algorithm_t
+enum MHD_GNUTLS_PublicKeyAlgorithm
 mhd_gtls_x509_oid2pk_algorithm (const char *oid)
 {
-  gnutls_pk_algorithm_t ret = MHD_GNUTLS_PK_UNKNOWN;
+  enum MHD_GNUTLS_PublicKeyAlgorithm ret = MHD_GNUTLS_PK_UNKNOWN;
   const gnutls_pk_entry *p;
 
   for (p = mhd_gtls_pk_algorithms; p->name != NULL; p++)
@@ -2076,7 +2076,7 @@
 }
 
 const char *
-mhd_gtls_x509_pk_to_oid (gnutls_pk_algorithm_t algorithm)
+mhd_gtls_x509_pk_to_oid (enum MHD_GNUTLS_PublicKeyAlgorithm algorithm)
 {
   const char *ret = NULL;
   const gnutls_pk_entry *p;

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.h      2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.h      2008-08-24 
17:53:48 UTC (rev 7592)
@@ -28,20 +28,20 @@
 #include "gnutls_auth.h"
 
 /* Functions for version handling. */
-gnutls_protocol_t mhd_gtls_version_lowest (mhd_gtls_session_t session);
-gnutls_protocol_t mhd_gtls_version_max (mhd_gtls_session_t session);
+enum MHD_GNUTLS_Protocol mhd_gtls_version_lowest (mhd_gtls_session_t session);
+enum MHD_GNUTLS_Protocol mhd_gtls_version_max (mhd_gtls_session_t session);
 int mhd_gtls_version_priority (mhd_gtls_session_t session,
-                             gnutls_protocol_t version);
+                             enum MHD_GNUTLS_Protocol version);
 int mhd_gtls_version_is_supported (mhd_gtls_session_t session,
-                                 const gnutls_protocol_t version);
-int mhd_gtls_version_get_major (gnutls_protocol_t ver);
-int mhd_gtls_version_get_minor (gnutls_protocol_t ver);
-gnutls_protocol_t mhd_gtls_version_get (int major, int minor);
+                                 const enum MHD_GNUTLS_Protocol version);
+int mhd_gtls_version_get_major (enum MHD_GNUTLS_Protocol ver);
+int mhd_gtls_version_get_minor (enum MHD_GNUTLS_Protocol ver);
+enum MHD_GNUTLS_Protocol mhd_gtls_version_get (int major, int minor);
 
 /* Functions for MACs. */
-int mhd_gnutls_mac_is_ok (gnutls_mac_algorithm_t algorithm);
-gnutls_mac_algorithm_t mhd_gtls_x509_oid2mac_algorithm (const char *oid);
-const char * mhd_gtls_x509_mac_to_oid (gnutls_mac_algorithm_t mac);
+int mhd_gnutls_mac_is_ok (enum MHD_GNUTLS_HashAlgorithm algorithm);
+enum MHD_GNUTLS_HashAlgorithm mhd_gtls_x509_oid2mac_algorithm (const char 
*oid);
+const char * mhd_gtls_x509_mac_to_oid (enum MHD_GNUTLS_HashAlgorithm mac);
 
 /* Functions for cipher suites. */
 int mhd_gtls_supported_ciphersuites (mhd_gtls_session_t session,
@@ -51,62 +51,62 @@
 int mhd_gtls_supported_compression_methods (mhd_gtls_session_t session,
                                           uint8_t ** comp);
 const char * mhd_gtls_cipher_suite_get_name (cipher_suite_st * algorithm);
-gnutls_cipher_algorithm_t mhd_gtls_cipher_suite_get_cipher_algo (const
+enum MHD_GNUTLS_CipherAlgorithm mhd_gtls_cipher_suite_get_cipher_algo (const
                                                                cipher_suite_st
                                                                * algorithm);
-gnutls_kx_algorithm_t mhd_gtls_cipher_suite_get_kx_algo (const cipher_suite_st
+enum MHD_GNUTLS_KeyExchangeAlgorithm mhd_gtls_cipher_suite_get_kx_algo (const 
cipher_suite_st
                                                        * algorithm);
-gnutls_mac_algorithm_t mhd_gtls_cipher_suite_get_mac_algo (const
+enum MHD_GNUTLS_HashAlgorithm mhd_gtls_cipher_suite_get_mac_algo (const
                                                          cipher_suite_st *
                                                          algorithm);
-gnutls_protocol_t mhd_gtls_cipher_suite_get_version (const cipher_suite_st *
+enum MHD_GNUTLS_Protocol mhd_gtls_cipher_suite_get_version (const 
cipher_suite_st *
                                                    algorithm);
 cipher_suite_st mhd_gtls_cipher_suite_get_suite_name (cipher_suite_st *
                                                     algorithm);
 
 /* Functions for ciphers. */
-int mhd_gtls_cipher_get_block_size (gnutls_cipher_algorithm_t algorithm);
-int mhd_gtls_cipher_is_block (gnutls_cipher_algorithm_t algorithm);
-int mhd_gtls_cipher_is_ok (gnutls_cipher_algorithm_t algorithm);
-int mhd_gtls_cipher_get_iv_size (gnutls_cipher_algorithm_t algorithm);
-int mhd_gtls_cipher_get_export_flag (gnutls_cipher_algorithm_t algorithm);
+int mhd_gtls_cipher_get_block_size (enum MHD_GNUTLS_CipherAlgorithm algorithm);
+int mhd_gtls_cipher_is_block (enum MHD_GNUTLS_CipherAlgorithm algorithm);
+int mhd_gtls_cipher_is_ok (enum MHD_GNUTLS_CipherAlgorithm algorithm);
+int mhd_gtls_cipher_get_iv_size (enum MHD_GNUTLS_CipherAlgorithm algorithm);
+int mhd_gtls_cipher_get_export_flag (enum MHD_GNUTLS_CipherAlgorithm 
algorithm);
 
 /* Functions for key exchange. */
-int mhd_gtls_kx_needs_dh_params (gnutls_kx_algorithm_t algorithm);
-int mhd_gtls_kx_needs_rsa_params (gnutls_kx_algorithm_t algorithm);
-mhd_gtls_mod_auth_st * mhd_gtls_kx_auth_struct (gnutls_kx_algorithm_t 
algorithm);
-int mhd_gtls_kx_is_ok (gnutls_kx_algorithm_t algorithm);
+int mhd_gtls_kx_needs_dh_params (enum MHD_GNUTLS_KeyExchangeAlgorithm 
algorithm);
+int mhd_gtls_kx_needs_rsa_params (enum MHD_GNUTLS_KeyExchangeAlgorithm 
algorithm);
+mhd_gtls_mod_auth_st * mhd_gtls_kx_auth_struct (enum 
MHD_GNUTLS_KeyExchangeAlgorithm algorithm);
+int mhd_gtls_kx_is_ok (enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm);
 
 /* Functions for compression. */
-int mhd_gtls_compression_is_ok (gnutls_compression_method_t algorithm);
-int mhd_gtls_compression_get_num (gnutls_compression_method_t algorithm);
-gnutls_compression_method_t mhd_gtls_compression_get_id (int num);
-int mhd_gtls_compression_get_mem_level (gnutls_compression_method_t algorithm);
-int mhd_gtls_compression_get_comp_level (gnutls_compression_method_t
+int mhd_gtls_compression_is_ok (enum MHD_GNUTLS_CompressionMethod algorithm);
+int mhd_gtls_compression_get_num (enum MHD_GNUTLS_CompressionMethod algorithm);
+enum MHD_GNUTLS_CompressionMethod mhd_gtls_compression_get_id (int num);
+int mhd_gtls_compression_get_mem_level (enum MHD_GNUTLS_CompressionMethod 
algorithm);
+int mhd_gtls_compression_get_comp_level (enum MHD_GNUTLS_CompressionMethod
                                        algorithm);
-int mhd_gtls_compression_get_wbits (gnutls_compression_method_t algorithm);
+int mhd_gtls_compression_get_wbits (enum MHD_GNUTLS_CompressionMethod 
algorithm);
 
 /* Type to KX mappings. */
-gnutls_kx_algorithm_t mhd_gtls_map_kx_get_kx (gnutls_credentials_type_t type,
+enum MHD_GNUTLS_KeyExchangeAlgorithm mhd_gtls_map_kx_get_kx (enum 
MHD_GNUTLS_CredentialsType type,
                                             int server);
-gnutls_credentials_type_t mhd_gtls_map_kx_get_cred (gnutls_kx_algorithm_t
+enum MHD_GNUTLS_CredentialsType mhd_gtls_map_kx_get_cred (enum 
MHD_GNUTLS_KeyExchangeAlgorithm
                                                   algorithm, int server);
 
 /* KX to PK mapping. */
-gnutls_pk_algorithm_t mhd_gtls_map_pk_get_pk (gnutls_kx_algorithm_t
+enum MHD_GNUTLS_PublicKeyAlgorithm mhd_gtls_map_pk_get_pk (enum 
MHD_GNUTLS_KeyExchangeAlgorithm
                                             kx_algorithm);
-gnutls_pk_algorithm_t mhd_gtls_x509_oid2pk_algorithm (const char *oid);
-const char * mhd_gtls_x509_pk_to_oid (gnutls_pk_algorithm_t pk);
+enum MHD_GNUTLS_PublicKeyAlgorithm mhd_gtls_x509_oid2pk_algorithm (const char 
*oid);
+const char * mhd_gtls_x509_pk_to_oid (enum MHD_GNUTLS_PublicKeyAlgorithm pk);
 
 enum encipher_type
 { CIPHER_ENCRYPT = 0, CIPHER_SIGN = 1, CIPHER_IGN };
 
-enum encipher_type mhd_gtls_kx_encipher_type (gnutls_kx_algorithm_t algorithm);
+enum encipher_type mhd_gtls_kx_encipher_type (enum 
MHD_GNUTLS_KeyExchangeAlgorithm algorithm);
 
 struct mhd_gtls_compression_entry
 {
   const char *name;
-  gnutls_compression_method_t id;
+  enum MHD_GNUTLS_CompressionMethod id;
   int num;                     /* the number reserved in TLS for the specific 
compression method */
 
   /* used in zlib compressor */
@@ -118,24 +118,24 @@
 
 /* Functions for sign algorithms. */
 gnutls_sign_algorithm_t mhd_gtls_x509_oid2sign_algorithm (const char *oid);
-gnutls_sign_algorithm_t mhd_gtls_x509_pk_to_sign (gnutls_pk_algorithm_t pk,
-                                                gnutls_mac_algorithm_t mac);
-const char * mhd_gtls_x509_sign_to_oid (gnutls_pk_algorithm_t,
-                                     gnutls_mac_algorithm_t mac);
+gnutls_sign_algorithm_t mhd_gtls_x509_pk_to_sign (enum 
MHD_GNUTLS_PublicKeyAlgorithm pk,
+                                                enum MHD_GNUTLS_HashAlgorithm 
mac);
+const char * mhd_gtls_x509_sign_to_oid (enum MHD_GNUTLS_PublicKeyAlgorithm,
+                                     enum MHD_GNUTLS_HashAlgorithm mac);
 
 int mhd_gtls_mac_priority (mhd_gtls_session_t session,
-                         gnutls_mac_algorithm_t algorithm);
+                         enum MHD_GNUTLS_HashAlgorithm algorithm);
 int mhd_gtls_cipher_priority (mhd_gtls_session_t session,
-                            gnutls_cipher_algorithm_t algorithm);
+                            enum MHD_GNUTLS_CipherAlgorithm algorithm);
 int mhd_gtls_kx_priority (mhd_gtls_session_t session,
-                        gnutls_kx_algorithm_t algorithm);
+                        enum MHD_GNUTLS_KeyExchangeAlgorithm algorithm);
 int mhd_gtls_compression_priority (mhd_gtls_session_t session,
-                                 gnutls_compression_method_t algorithm);
+                                 enum MHD_GNUTLS_CompressionMethod algorithm);
 
-gnutls_mac_algorithm_t MHD_gtls_mac_get_id (const char* name);
-gnutls_cipher_algorithm_t MHD_gtls_cipher_get_id (const char* name);
-gnutls_kx_algorithm_t MHD_gtls_kx_get_id (const char* name);
-gnutls_protocol_t MHD_gtls_protocol_get_id (const char* name);
-gnutls_certificate_type_t MHD_gtls_certificate_type_get_id (const char* name);
+enum MHD_GNUTLS_HashAlgorithm MHD_gtls_mac_get_id (const char* name);
+enum MHD_GNUTLS_CipherAlgorithm MHD_gtls_cipher_get_id (const char* name);
+enum MHD_GNUTLS_KeyExchangeAlgorithm MHD_gtls_kx_get_id (const char* name);
+enum MHD_GNUTLS_Protocol MHD_gtls_protocol_get_id (const char* name);
+enum MHD_GNUTLS_CertificateType MHD_gtls_certificate_type_get_id (const char* 
name);
 
 #endif

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_auth.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_auth.c    2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_auth.c    2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -91,7 +91,7 @@
   **/
 int
 MHD_gnutls_credentials_set (mhd_gtls_session_t session,
-                        gnutls_credentials_type_t type, void *cred)
+                        enum MHD_GNUTLS_CredentialsType type, void *cred)
 {
   auth_cred_st *ccred = NULL, *pcred = NULL;
   int exists = 0;
@@ -160,7 +160,7 @@
   * Eg. for CERTIFICATE ciphersuites (key exchange algorithms: KX_RSA, 
KX_DHE_RSA),
   * the same function are to be used to access the authentication data.
   **/
-gnutls_credentials_type_t
+enum MHD_GNUTLS_CredentialsType
 MHD_gtls_auth_get_type (mhd_gtls_session_t session)
 {
 /* This is not the credentials we must set, but the authentication data
@@ -183,7 +183,7 @@
   * to access authentication data.
   * 
   **/
-gnutls_credentials_type_t
+enum MHD_GNUTLS_CredentialsType
 MHD_gtls_auth_server_get_type (mhd_gtls_session_t session)
 {
   return
@@ -201,7 +201,7 @@
   * to access authentication data.
   * 
   **/
-gnutls_credentials_type_t
+enum MHD_GNUTLS_CredentialsType
 MHD_gtls_auth_client_get_type (mhd_gtls_session_t session)
 {
   return
@@ -217,7 +217,7 @@
  */
 const void *
 mhd_gtls_get_kx_cred (mhd_gtls_session_t session,
-                     gnutls_kx_algorithm_t algo, int *err)
+                     enum MHD_GNUTLS_KeyExchangeAlgorithm algo, int *err)
 {
   int server = session->security_parameters.entity == GNUTLS_SERVER ? 1 : 0;
 
@@ -226,7 +226,7 @@
 }
 
 const void *
-mhd_gtls_get_cred (mhd_gtls_key_st key, gnutls_credentials_type_t type, int 
*err)
+mhd_gtls_get_cred (mhd_gtls_key_st key, enum MHD_GNUTLS_CredentialsType type, 
int *err)
 {
   const void *retval = NULL;
   int _err = -1;
@@ -354,7 +354,7 @@
  */
 int
 mhd_gtls_auth_info_set (mhd_gtls_session_t session,
-                       gnutls_credentials_type_t type, int size,
+                       enum MHD_GNUTLS_CredentialsType type, int size,
                        int allow_change)
 {
   if (session->key->auth_info == NULL)

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_auth_int.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_auth_int.h        2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_auth_int.h        2008-08-24 
17:53:48 UTC (rev 7592)
@@ -23,10 +23,10 @@
  */
 
 const void * mhd_gtls_get_cred (mhd_gtls_key_st key,
-                             gnutls_credentials_type_t kx, int *err);
+                             enum MHD_GNUTLS_CredentialsType kx, int *err);
 const void * mhd_gtls_get_kx_cred (mhd_gtls_session_t session,
-                                gnutls_kx_algorithm_t algo, int *err);
+                                enum MHD_GNUTLS_KeyExchangeAlgorithm algo, int 
*err);
 void * mhd_gtls_get_auth_info (mhd_gtls_session_t session);
 int mhd_gtls_auth_info_set (mhd_gtls_session_t session,
-                          gnutls_credentials_type_t type, int size,
+                          enum MHD_GNUTLS_CredentialsType type, int size,
                           int allow_change);

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_cert.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_cert.c    2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_cert.c    2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -232,12 +232,12 @@
  */
 int
 mhd_gtls_selected_cert_supported_kx (mhd_gtls_session_t session,
-                                    gnutls_kx_algorithm_t ** alg,
+                                    enum MHD_GNUTLS_KeyExchangeAlgorithm ** 
alg,
                                     int *alg_size)
 {
-  gnutls_kx_algorithm_t kx;
-  gnutls_pk_algorithm_t pk;
-  gnutls_kx_algorithm_t kxlist[MAX_ALGOS];
+  enum MHD_GNUTLS_KeyExchangeAlgorithm kx;
+  enum MHD_GNUTLS_PublicKeyAlgorithm pk;
+  enum MHD_GNUTLS_KeyExchangeAlgorithm kxlist[MAX_ALGOS];
   gnutls_cert *cert;
   int i;
 
@@ -271,13 +271,13 @@
       return GNUTLS_E_INVALID_REQUEST;
     }
 
-  *alg = gnutls_calloc (1, sizeof (gnutls_kx_algorithm_t) * i);
+  *alg = gnutls_calloc (1, sizeof (enum MHD_GNUTLS_KeyExchangeAlgorithm) * i);
   if (*alg == NULL)
     return GNUTLS_E_MEMORY_ERROR;
 
   *alg_size = i;
 
-  memcpy (*alg, kxlist, i * sizeof (gnutls_kx_algorithm_t));
+  memcpy (*alg, kxlist, i * sizeof (enum MHD_GNUTLS_KeyExchangeAlgorithm));
 
   return 0;
 }
@@ -311,7 +311,7 @@
   * to be used in the handshake.
   * The callback's function prototype is:
   * int (*callback)(mhd_gtls_session_t, const gnutls_datum_t* req_ca_dn, int 
nreqs,
-  * const gnutls_pk_algorithm_t* pk_algos, int pk_algos_length, 
gnutls_retr_st* st);
+  * const enum MHD_GNUTLS_PublicKeyAlgorithm* pk_algos, int pk_algos_length, 
gnutls_retr_st* st);
   *
   * @req_ca_cert is only used in X.509 certificates.
   * Contains a list with the CA names that the server considers trusted.
@@ -598,7 +598,7 @@
 
 int
 mhd_gtls_raw_cert_to_gcert (gnutls_cert * gcert,
-                           gnutls_certificate_type_t type,
+                           enum MHD_GNUTLS_CertificateType type,
                            const gnutls_datum_t * raw_cert,
                            int flags /* OR of ConvFlags */ )
 {
@@ -614,7 +614,7 @@
 
 int
 mhd_gtls_raw_privkey_to_gkey (gnutls_privkey * key,
-                             gnutls_certificate_type_t type,
+                             enum MHD_GNUTLS_CertificateType type,
                              const gnutls_datum_t * raw_key,
                              int key_enc /* DER or PEM */ )
 {
@@ -780,7 +780,7 @@
  *
  * typedef int (*gnutls_sign_func) (mhd_gtls_session_t session,
  *                                  void *userdata,
- *                                  gnutls_certificate_type_t cert_type,
+ *                                  enum MHD_GNUTLS_CertificateType cert_type,
  *                                  const gnutls_datum_t * cert,
  *                                  const gnutls_datum_t * hash,
  *                                  gnutls_datum_t * signature);

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_cert.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_cert.h    2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_cert.h    2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -61,7 +61,7 @@
                                         */
   int params_size;             /* holds the size of MPI params */
 
-  gnutls_pk_algorithm_t subject_pk_algorithm;
+  enum MHD_GNUTLS_PublicKeyAlgorithm subject_pk_algorithm;
 
   unsigned int key_usage;      /* bits from KEY_* 
                                 */
@@ -69,7 +69,7 @@
   unsigned int version;
   /* holds the type (PGP, X509)
    */
-  gnutls_certificate_type_t cert_type;
+  enum MHD_GNUTLS_CertificateType cert_type;
 
   gnutls_datum_t raw;
 
@@ -95,7 +95,7 @@
    */
   int params_size;             /* holds the number of params */
 
-  gnutls_pk_algorithm_t pk_algorithm;
+  enum MHD_GNUTLS_PublicKeyAlgorithm pk_algorithm;
 } gnutls_privkey;
 
 struct MHD_gtls_session_int;   /* because mhd_gtls_session_t is not defined 
when this file is included */
@@ -117,15 +117,15 @@
 void mhd_gtls_gcert_deinit (gnutls_cert * cert);
 
 int mhd_gtls_selected_cert_supported_kx (struct MHD_gtls_session_int *session,
-                                       gnutls_kx_algorithm_t ** alg,
+                                       enum MHD_GNUTLS_KeyExchangeAlgorithm ** 
alg,
                                        int *alg_size);
 
 int mhd_gtls_raw_cert_to_gcert (gnutls_cert * gcert,
-                              gnutls_certificate_type_t type,
+                              enum MHD_GNUTLS_CertificateType type,
                               const gnutls_datum_t * raw_cert,
                               int flags /* OR of ConvFlags */ );
 int mhd_gtls_raw_privkey_to_gkey (gnutls_privkey * key,
-                                gnutls_certificate_type_t type,
+                                enum MHD_GNUTLS_CertificateType type,
                                 const gnutls_datum_t * raw_key,
                                 int key_enc /* DER or PEM */ );
 

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_cipher.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_cipher.c  2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_cipher.c  2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -194,7 +194,7 @@
 }
 
 inline static mac_hd_t
-mac_init (gnutls_mac_algorithm_t mac, opaque * secret, int secret_size,
+mac_init (enum MHD_GNUTLS_HashAlgorithm mac, opaque * secret, int secret_size,
           int ver)
 {
   mac_hd_t td;
@@ -304,7 +304,7 @@
   int hash_size =
     mhd_gnutls_hash_get_algo_len (session->security_parameters.
                                write_mac_algorithm);
-  gnutls_protocol_t ver;
+  enum MHD_GNUTLS_Protocol ver;
   int blocksize =
     mhd_gtls_cipher_get_block_size (session->security_parameters.
                                    write_bulk_cipher_algorithm);
@@ -429,7 +429,7 @@
   uint16_t blocksize;
   int ret, i, pad_failed = 0;
   uint8_t major, minor;
-  gnutls_protocol_t ver;
+  enum MHD_GNUTLS_Protocol ver;
   int hash_size =
     mhd_gnutls_hash_get_algo_len (session->security_parameters.
                                read_mac_algorithm);

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.c      2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.c      2008-08-24 
17:53:48 UTC (rev 7592)
@@ -28,7 +28,7 @@
 #include <gnutls_datum.h>
 
 cipher_hd_t
-mhd_gtls_cipher_init (gnutls_cipher_algorithm_t cipher,
+mhd_gtls_cipher_init (enum MHD_GNUTLS_CipherAlgorithm cipher,
                      const gnutls_datum_t * key, const gnutls_datum_t * iv)
 {
   cipher_hd_t ret = NULL;

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.h      2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.h      2008-08-24 
17:53:48 UTC (rev 7592)
@@ -29,7 +29,7 @@
 #define GNUTLS_CIPHER_FAILED NULL
 
 // TODO gc_cipher_handle -> void * x3
-void * mhd_gtls_cipher_init(gnutls_cipher_algorithm_t cipher,
+void * mhd_gtls_cipher_init(enum MHD_GNUTLS_CipherAlgorithm cipher,
                                      const gnutls_datum_t * key,
                                      const gnutls_datum_t * iv);
 

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.c    2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.c    2008-08-24 
17:53:48 UTC (rev 7592)
@@ -31,7 +31,7 @@
  * decompress.
  */
 comp_hd_t
-mhd_gtls_comp_init (gnutls_compression_method_t method, int d)
+mhd_gtls_comp_init (enum MHD_GNUTLS_CompressionMethod method, int d)
 {
   comp_hd_t ret;
 

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.h    2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.h    2008-08-24 
17:53:48 UTC (rev 7592)
@@ -34,10 +34,10 @@
 typedef struct comp_hd_t_STRUCT
 {
   void *handle;
-  gnutls_compression_method_t algo;
+  enum MHD_GNUTLS_CompressionMethod algo;
 } *comp_hd_t;
 
-comp_hd_t mhd_gtls_comp_init (gnutls_compression_method_t, int d);
+comp_hd_t mhd_gtls_comp_init (enum MHD_GNUTLS_CompressionMethod, int d);
 void mhd_gtls_comp_deinit (comp_hd_t handle, int d);
 
 int mhd_gtls_decompress (comp_hd_t handle, opaque * compressed,

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_constate.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_constate.c        2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_constate.c        2008-08-24 
17:53:48 UTC (rev 7592)
@@ -390,8 +390,8 @@
   int hash_size;
   int IV_size;
   int key_size, export_flag;
-  gnutls_cipher_algorithm_t algo;
-  gnutls_mac_algorithm_t mac_algo;
+  enum MHD_GNUTLS_CipherAlgorithm algo;
+  enum MHD_GNUTLS_HashAlgorithm mac_algo;
 
   mac_algo = session->security_parameters.read_mac_algorithm;
   algo = session->security_parameters.read_bulk_cipher_algorithm;
@@ -411,8 +411,8 @@
   int hash_size;
   int IV_size;
   int key_size, export_flag;
-  gnutls_cipher_algorithm_t algo;
-  gnutls_mac_algorithm_t mac_algo;
+  enum MHD_GNUTLS_CipherAlgorithm algo;
+  enum MHD_GNUTLS_HashAlgorithm mac_algo;
 
   mac_algo = session->security_parameters.write_mac_algorithm;
   algo = session->security_parameters.write_bulk_cipher_algorithm;
@@ -874,7 +874,7 @@
  */
 int
 mhd_gtls_set_read_cipher (mhd_gtls_session_t session,
-                         gnutls_cipher_algorithm_t algo)
+                         enum MHD_GNUTLS_CipherAlgorithm algo)
 {
 
   if (mhd_gtls_cipher_is_ok (algo) == 0)
@@ -900,7 +900,7 @@
 
 int
 mhd_gtls_set_write_cipher (mhd_gtls_session_t session,
-                          gnutls_cipher_algorithm_t algo)
+                          enum MHD_GNUTLS_CipherAlgorithm algo)
 {
 
   if (mhd_gtls_cipher_is_ok (algo) == 0)
@@ -929,7 +929,7 @@
  */
 int
 mhd_gtls_set_read_compression (mhd_gtls_session_t session,
-                              gnutls_compression_method_t algo)
+                              enum MHD_GNUTLS_CompressionMethod algo)
 {
 
   if (mhd_gtls_compression_is_ok (algo) == 0)
@@ -947,7 +947,7 @@
 
 int
 mhd_gtls_set_write_compression (mhd_gtls_session_t session,
-                               gnutls_compression_method_t algo)
+                               enum MHD_GNUTLS_CompressionMethod algo)
 {
 
   if (mhd_gtls_compression_is_ok (algo) == 0)
@@ -966,7 +966,7 @@
 /* Sets the specified kx algorithm into pending session
  */
 int
-mhd_gtls_set_kx (mhd_gtls_session_t session, gnutls_kx_algorithm_t algo)
+mhd_gtls_set_kx (mhd_gtls_session_t session, enum 
MHD_GNUTLS_KeyExchangeAlgorithm algo)
 {
 
   if (mhd_gtls_kx_is_ok (algo) == 0)
@@ -991,7 +991,7 @@
 
 /* Sets the specified mac algorithm into pending session */
 int
-mhd_gtls_set_read_mac (mhd_gtls_session_t session, gnutls_mac_algorithm_t algo)
+mhd_gtls_set_read_mac (mhd_gtls_session_t session, enum 
MHD_GNUTLS_HashAlgorithm algo)
 {
 
   if (mhd_gnutls_mac_is_ok (algo) == 0)
@@ -1015,7 +1015,7 @@
 }
 
 int
-mhd_gtls_set_write_mac (mhd_gtls_session_t session, gnutls_mac_algorithm_t 
algo)
+mhd_gtls_set_write_mac (mhd_gtls_session_t session, enum 
MHD_GNUTLS_HashAlgorithm algo)
 {
 
   if (mhd_gnutls_mac_is_ok (algo) == 0)

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_constate.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_constate.h        2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_constate.h        2008-08-24 
17:53:48 UTC (rev 7592)
@@ -26,15 +26,15 @@
 int mhd_gtls_read_connection_state_init (mhd_gtls_session_t session);
 int mhd_gtls_write_connection_state_init (mhd_gtls_session_t session);
 int mhd_gtls_set_write_cipher (mhd_gtls_session_t session,
-                             gnutls_cipher_algorithm_t algo);
+                             enum MHD_GNUTLS_CipherAlgorithm algo);
 int mhd_gtls_set_write_mac (mhd_gtls_session_t session,
-                          gnutls_mac_algorithm_t algo);
+                          enum MHD_GNUTLS_HashAlgorithm algo);
 int mhd_gtls_set_read_cipher (mhd_gtls_session_t session,
-                            gnutls_cipher_algorithm_t algo);
+                            enum MHD_GNUTLS_CipherAlgorithm algo);
 int mhd_gtls_set_read_mac (mhd_gtls_session_t session,
-                         gnutls_mac_algorithm_t algo);
+                         enum MHD_GNUTLS_HashAlgorithm algo);
 int mhd_gtls_set_read_compression (mhd_gtls_session_t session,
-                                 gnutls_compression_method_t algo);
+                                 enum MHD_GNUTLS_CompressionMethod algo);
 int mhd_gtls_set_write_compression (mhd_gtls_session_t session,
-                                  gnutls_compression_method_t algo);
-int mhd_gtls_set_kx (mhd_gtls_session_t session, gnutls_kx_algorithm_t algo);
+                                  enum MHD_GNUTLS_CompressionMethod algo);
+int mhd_gtls_set_kx (mhd_gtls_session_t session, enum 
MHD_GNUTLS_KeyExchangeAlgorithm algo);

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c       2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c       2008-08-24 
17:53:48 UTC (rev 7592)
@@ -195,7 +195,7 @@
   const char *mesg;
   mac_hd_t td_md5 = NULL;
   mac_hd_t td_sha;
-  gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session);
+  enum MHD_GNUTLS_Protocol ver = MHD_gnutls_protocol_get_version (session);
 
   if (ver < MHD_GNUTLS_TLS1_2)
     {
@@ -271,7 +271,7 @@
  */
 int
 mhd_gtls_negotiate_version (mhd_gtls_session_t session,
-                           gnutls_protocol_t adv_version)
+                           enum MHD_GNUTLS_Protocol adv_version)
 {
   int ret;
 
@@ -302,7 +302,7 @@
 
 int
 mhd_gtls_user_hello_func (mhd_gtls_session_t session,
-                         gnutls_protocol_t adv_version)
+                         enum MHD_GNUTLS_Protocol adv_version)
 {
   int ret;
 
@@ -339,7 +339,7 @@
   uint8_t session_id_len;
   int pos = 0, ret = 0;
   uint16_t suite_size, comp_size;
-  gnutls_protocol_t adv_version;
+  enum MHD_GNUTLS_Protocol adv_version;
   int neg_version;
   int len = datalen;
   opaque rnd[TLS_RANDOM_SIZE], *suite_ptr, *comp_ptr;
@@ -637,8 +637,8 @@
                                               data, int datalen)
 {
   int j;
-  gnutls_pk_algorithm_t algo = GNUTLS_PK_NONE, prev_algo = 0;
-  gnutls_kx_algorithm_t kx;
+  enum MHD_GNUTLS_PublicKeyAlgorithm algo = GNUTLS_PK_NONE, prev_algo = 0;
+  enum MHD_GNUTLS_KeyExchangeAlgorithm kx;
   cipher_suite_st cs;
 
   if (datalen % 2 != 0)
@@ -676,7 +676,7 @@
   int x, i, j;
   cipher_suite_st *ciphers, cs;
   int retval, err;
-  gnutls_pk_algorithm_t pk_algo;        /* will hold the pk algorithms
+  enum MHD_GNUTLS_PublicKeyAlgorithm pk_algo;        /* will hold the pk 
algorithms
                                          * supported by the peer.
                                          */
 
@@ -811,7 +811,7 @@
     }
 
   memset (&session->internals.compression_method, 0,
-          sizeof (gnutls_compression_method_t));
+          sizeof (enum MHD_GNUTLS_CompressionMethod));
 
   for (j = 0; j < datalen; j++)
     {
@@ -819,7 +819,7 @@
         {
           if (comps[i] == data[j])
             {
-              gnutls_compression_method_t method =
+              enum MHD_GNUTLS_CompressionMethod method =
                 mhd_gtls_compression_get_id (comps[i]);
 
               session->internals.compression_method = method;
@@ -1454,7 +1454,7 @@
   uint8_t session_id_len = 0;
   int pos = 0;
   int ret = 0;
-  gnutls_protocol_t version;
+  enum MHD_GNUTLS_Protocol version;
   int len = datalen;
 
   if (datalen < 38)
@@ -1672,7 +1672,7 @@
   int pos = 0;
   int datalen = 0, ret = 0;
   opaque rnd[TLS_RANDOM_SIZE];
-  gnutls_protocol_t hver;
+  enum MHD_GNUTLS_Protocol hver;
   opaque extdata[MAX_EXT_DATA_LENGTH];
 
   opaque *SessionID =
@@ -2700,8 +2700,8 @@
  */
 inline static int
 check_server_params (mhd_gtls_session_t session,
-                     gnutls_kx_algorithm_t kx,
-                     gnutls_kx_algorithm_t * alg, int alg_size)
+                     enum MHD_GNUTLS_KeyExchangeAlgorithm kx,
+                     enum MHD_GNUTLS_KeyExchangeAlgorithm * alg, int alg_size)
 {
   int cred_type;
   mhd_gtls_dh_params_t dh_params = NULL;
@@ -2818,16 +2818,16 @@
 mhd_gtls_remove_unwanted_ciphersuites (mhd_gtls_session_t session,
                                       cipher_suite_st ** cipherSuites,
                                       int numCipherSuites,
-                                      gnutls_pk_algorithm_t requested_pk_algo)
+                                      enum MHD_GNUTLS_PublicKeyAlgorithm 
requested_pk_algo)
 {
 
   int ret = 0;
   cipher_suite_st *newSuite, cs;
   int newSuiteSize = 0, i;
   mhd_gtls_cert_credentials_t cert_cred;
-  gnutls_kx_algorithm_t kx;
+  enum MHD_GNUTLS_KeyExchangeAlgorithm kx;
   int server = session->security_parameters.entity == GNUTLS_SERVER ? 1 : 0;
-  gnutls_kx_algorithm_t *alg = NULL;
+  enum MHD_GNUTLS_KeyExchangeAlgorithm *alg = NULL;
   int alg_size = 0;
 
   /* if we should use a specific certificate,
@@ -2959,13 +2959,13 @@
 }
 
 void
-mhd_gtls_set_adv_version (mhd_gtls_session_t session, gnutls_protocol_t ver)
+mhd_gtls_set_adv_version (mhd_gtls_session_t session, enum MHD_GNUTLS_Protocol 
ver)
 {
   set_adv_version (session, mhd_gtls_version_get_major (ver),
                    mhd_gtls_version_get_minor (ver));
 }
 
-gnutls_protocol_t
+enum MHD_GNUTLS_Protocol
 mhd_gtls_get_adv_version (mhd_gtls_session_t session)
 {
   return mhd_gtls_version_get (_gnutls_get_adv_version_major (session),

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_handshake.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_handshake.h       2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_handshake.h       2008-08-24 
17:53:48 UTC (rev 7592)
@@ -44,13 +44,13 @@
 int mhd_gtls_remove_unwanted_ciphersuites (mhd_gtls_session_t session,
                                          cipher_suite_st ** cipherSuites,
                                          int numCipherSuites,
-                                         gnutls_pk_algorithm_t);
+                                         enum MHD_GNUTLS_PublicKeyAlgorithm);
 int mhd_gtls_find_pk_algos_in_ciphersuites (opaque * data, int datalen);
 int mhd_gtls_server_select_suite (mhd_gtls_session_t session, opaque * data,
                                 int datalen);
 
-int mhd_gtls_negotiate_version( mhd_gtls_session_t session, gnutls_protocol_t 
adv_version);
-int mhd_gtls_user_hello_func( mhd_gtls_session_t, gnutls_protocol_t 
adv_version);
+int mhd_gtls_negotiate_version( mhd_gtls_session_t session, enum 
MHD_GNUTLS_Protocol adv_version);
+int mhd_gtls_user_hello_func( mhd_gtls_session_t, enum MHD_GNUTLS_Protocol 
adv_version);
 
 #if MHD_DEBUG_TLS
 int mhd_gtls_handshake_client (mhd_gtls_session_t session);

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_hash_int.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_hash_int.c        2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_hash_int.c        2008-08-24 
17:53:48 UTC (rev 7592)
@@ -31,7 +31,7 @@
 #include <gnutls_errors.h>
 
 static inline Gc_hash
-_gnutls_mac2gc (gnutls_mac_algorithm_t mac)
+_gnutls_mac2gc (enum MHD_GNUTLS_HashAlgorithm mac)
 {
   switch (mac)
     {
@@ -55,7 +55,7 @@
 }
 
 GNUTLS_HASH_HANDLE
-mhd_gtls_hash_init (gnutls_mac_algorithm_t algorithm)
+mhd_gtls_hash_init (enum MHD_GNUTLS_HashAlgorithm algorithm)
 {
   mac_hd_t ret;
   int result;
@@ -81,7 +81,7 @@
 }
 
 int
-mhd_gnutls_hash_get_algo_len (gnutls_mac_algorithm_t algorithm)
+mhd_gnutls_hash_get_algo_len (enum MHD_GNUTLS_HashAlgorithm algorithm)
 {
   int ret;
 
@@ -144,7 +144,7 @@
 
 
 mac_hd_t
-mhd_gtls_hmac_init (gnutls_mac_algorithm_t algorithm,
+mhd_gtls_hmac_init (enum MHD_GNUTLS_HashAlgorithm algorithm,
                    const void *key, int keylen)
 {
   mac_hd_t ret;
@@ -189,7 +189,7 @@
 }
 
 inline static int
-get_padsize (gnutls_mac_algorithm_t algorithm)
+get_padsize (enum MHD_GNUTLS_HashAlgorithm algorithm)
 {
   switch (algorithm)
     {
@@ -203,7 +203,7 @@
 }
 
 mac_hd_t
-mhd_gnutls_mac_init_ssl3 (gnutls_mac_algorithm_t algorithm, void *key,
+mhd_gnutls_mac_init_ssl3 (enum MHD_GNUTLS_HashAlgorithm algorithm, void *key,
                        int keylen)
 {
   mac_hd_t ret;

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_hash_int.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_hash_int.h        2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_hash_int.h        2008-08-24 
17:53:48 UTC (rev 7592)
@@ -32,7 +32,7 @@
 typedef struct
 {
   gc_hash_handle handle;
-  gnutls_mac_algorithm_t algorithm;
+  enum MHD_GNUTLS_HashAlgorithm algorithm;
   const void *key;
   int keysize;
 } mac_hd_st;
@@ -42,17 +42,17 @@
 #define GNUTLS_HASH_FAILED NULL
 #define GNUTLS_MAC_FAILED NULL
 
-mac_hd_t mhd_gtls_hmac_init (gnutls_mac_algorithm_t algorithm,
+mac_hd_t mhd_gtls_hmac_init (enum MHD_GNUTLS_HashAlgorithm algorithm,
                            const void *key, int keylen);
 
 void mhd_gnutls_hmac_deinit (mac_hd_t handle, void *digest);
 
-mac_hd_t mhd_gnutls_mac_init_ssl3 (gnutls_mac_algorithm_t algorithm, void *key,
+mac_hd_t mhd_gnutls_mac_init_ssl3 (enum MHD_GNUTLS_HashAlgorithm algorithm, 
void *key,
                                int keylen);
 void mhd_gnutls_mac_deinit_ssl3 (mac_hd_t handle, void *digest);
 
-GNUTLS_HASH_HANDLE mhd_gtls_hash_init (gnutls_mac_algorithm_t algorithm);
-int mhd_gnutls_hash_get_algo_len (gnutls_mac_algorithm_t algorithm);
+GNUTLS_HASH_HANDLE mhd_gtls_hash_init (enum MHD_GNUTLS_HashAlgorithm 
algorithm);
+int mhd_gnutls_hash_get_algo_len (enum MHD_GNUTLS_HashAlgorithm algorithm);
 int mhd_gnutls_hash (GNUTLS_HASH_HANDLE handle, const void *text,
                  size_t textlen);
 void mhd_gnutls_hash_deinit (GNUTLS_HASH_HANDLE handle, void *digest);

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_int.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_int.h     2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_int.h     2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -96,7 +96,7 @@
 #define DECR_LENGTH_RET(len, x, RET) do { len-=x; if (len<0) {gnutls_assert(); 
return RET;} } while (0)
 #define DECR_LENGTH_COM(len, x, COM) do { len-=x; if (len<0) {gnutls_assert(); 
COM;} } while (0)
 
-#define HASH2MAC(x) ((gnutls_mac_algorithm_t)x)
+#define HASH2MAC(x) ((enum MHD_GNUTLS_HashAlgorithm)x)
 
 /* TODO rm */
 /* Additional cast to bring void* to a type castable to int. */
@@ -171,8 +171,8 @@
     GNUTLS_INNER_APPLICATION = 24
   } content_type_t;
 
-#define GNUTLS_PK_ANY (gnutls_pk_algorithm_t)-1
-#define GNUTLS_PK_NONE (gnutls_pk_algorithm_t)-2
+#define GNUTLS_PK_ANY (enum MHD_GNUTLS_PublicKeyAlgorithm)-1
+#define GNUTLS_PK_NONE (enum MHD_GNUTLS_PublicKeyAlgorithm)-2
 
 /* STATE (stop) */
 
@@ -182,7 +182,7 @@
 /* Store & Retrieve functions defines:  */
 typedef struct mhd_gtls_auth_cred_st
   {
-    gnutls_credentials_type_t algorithm;
+    enum MHD_GNUTLS_CredentialsType algorithm;
 
     /* the type of credentials depends on algorithm
      */
@@ -217,7 +217,7 @@
      * Rememember that this should be calloced!
      */
     void *auth_info;
-    gnutls_credentials_type_t auth_info_type;
+    enum MHD_GNUTLS_CredentialsType auth_info_type;
     int auth_info_size; /* needed in order to store to db for restoring
      */
     uint8_t crypt_algo;
@@ -316,18 +316,18 @@
 typedef struct
   {
     gnutls_connection_end_t entity;
-    gnutls_kx_algorithm_t kx_algorithm;
+    enum MHD_GNUTLS_KeyExchangeAlgorithm kx_algorithm;
     /* we've got separate write/read bulk/macs because
      * there is a time in handshake where the peer has
      * null cipher and we don't
      */
-    gnutls_cipher_algorithm_t read_bulk_cipher_algorithm;
-    gnutls_mac_algorithm_t read_mac_algorithm;
-    gnutls_compression_method_t read_compression_algorithm;
+    enum MHD_GNUTLS_CipherAlgorithm read_bulk_cipher_algorithm;
+    enum MHD_GNUTLS_HashAlgorithm read_mac_algorithm;
+    enum MHD_GNUTLS_CompressionMethod read_compression_algorithm;
 
-    gnutls_cipher_algorithm_t write_bulk_cipher_algorithm;
-    gnutls_mac_algorithm_t write_mac_algorithm;
-    gnutls_compression_method_t write_compression_algorithm;
+    enum MHD_GNUTLS_CipherAlgorithm write_bulk_cipher_algorithm;
+    enum MHD_GNUTLS_HashAlgorithm write_mac_algorithm;
+    enum MHD_GNUTLS_CompressionMethod write_compression_algorithm;
 
     /* this is the ciphersuite we are going to use
      * moved here from internals in order to be restored
@@ -348,8 +348,8 @@
     uint16_t max_record_send_size;
     uint16_t max_record_recv_size;
     /* holds the negotiated certificate type */
-    gnutls_certificate_type_t cert_type;
-    gnutls_protocol_t version; /* moved here */
+    enum MHD_GNUTLS_CertificateType cert_type;
+    enum MHD_GNUTLS_Protocol version; /* moved here */
     /* For TLS/IA.  XXX: Move to IA credential? */
     opaque inner_secret[TLS_MASTER_SIZE];
   } mhd_gtls_security_param_st;
@@ -465,7 +465,7 @@
     int last_handshake_out;
 
     /* this is the compression method we are going to use */
-    gnutls_compression_method_t compression_method;
+    enum MHD_GNUTLS_CompressionMethod compression_method;
 
     /* priorities */
     struct MHD_gtls_priority_st priorities;
@@ -654,7 +654,7 @@
 
 /* functions */
 void mhd_gtls_set_current_version(mhd_gtls_session_t session,
-                                 gnutls_protocol_t version);
+                                 enum MHD_GNUTLS_Protocol version);
 
 void mhd_gtls_free_auth_info(mhd_gtls_session_t session);
 
@@ -672,7 +672,7 @@
        session->internals.adv_version_minor = minor
 
 void mhd_gtls_set_adv_version(mhd_gtls_session_t,
-                             gnutls_protocol_t);
-gnutls_protocol_t mhd_gtls_get_adv_version(mhd_gtls_session_t);
+                             enum MHD_GNUTLS_Protocol);
+enum MHD_GNUTLS_Protocol mhd_gtls_get_adv_version(mhd_gtls_session_t);
 
 #endif /* GNUTLS_INT_H */

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_priority.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_priority.c        2008-08-24 
16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_priority.c        2008-08-24 
17:53:48 UTC (rev 7592)
@@ -35,7 +35,7 @@
 /**
  * MHD_gnutls_cipher_set_priority - Sets the priority on the ciphers supported 
by gnutls.
  * @session: is a #mhd_gtls_session_t structure.
- * @list: is a 0 terminated list of gnutls_cipher_algorithm_t elements.
+ * @list: is a 0 terminated list of enum MHD_GNUTLS_CipherAlgorithm elements.
  *
  * Sets the priority on the ciphers supported by gnutls.
  * Priority is higher for elements specified before others.
@@ -88,7 +88,7 @@
 /**
  * MHD_gnutls_kx_set_priority - Sets the priority on the key exchange 
algorithms supported by gnutls.
  * @session: is a #mhd_gtls_session_t structure.
- * @list: is a 0 terminated list of gnutls_kx_algorithm_t elements.
+ * @list: is a 0 terminated list of enum MHD_GNUTLS_KeyExchangeAlgorithm 
elements.
  *
  * Sets the priority on the key exchange algorithms supported by gnutls.
  * Priority is higher for elements specified before others.
@@ -109,7 +109,7 @@
 /**
  * MHD_gnutls_mac_set_priority - Sets the priority on the mac algorithms 
supported by gnutls.
  * @session: is a #mhd_gtls_session_t structure.
- * @list: is a 0 terminated list of gnutls_mac_algorithm_t elements.
+ * @list: is a 0 terminated list of enum MHD_GNUTLS_HashAlgorithm elements.
  *
  * Sets the priority on the mac algorithms supported by gnutls.
  * Priority is higher for elements specified before others.
@@ -130,7 +130,7 @@
 /**
  * MHD_gnutls_compression_set_priority - Sets the priority on the compression 
algorithms supported by gnutls.
  * @session: is a #mhd_gtls_session_t structure.
- * @list: is a 0 terminated list of gnutls_compression_method_t elements.
+ * @list: is a 0 terminated list of enum MHD_GNUTLS_CompressionMethod elements.
  *
  * Sets the priority on the compression algorithms supported by gnutls.
  * Priority is higher for elements specified before others.
@@ -155,7 +155,7 @@
 /**
  * MHD_gnutls_protocol_set_priority - Sets the priority on the protocol 
versions supported by gnutls.
  * @session: is a #mhd_gtls_session_t structure.
- * @list: is a 0 terminated list of gnutls_protocol_t elements.
+ * @list: is a 0 terminated list of enum MHD_GNUTLS_Protocol elements.
  *
  * Sets the priority on the protocol versions supported by gnutls.
  * This function actually enables or disables protocols. Newer protocol
@@ -183,7 +183,7 @@
 /**
  * MHD_gnutls_certificate_type_set_priority - Sets the priority on the 
certificate types supported by gnutls.
  * @session: is a #mhd_gtls_session_t structure.
- * @list: is a 0 terminated list of gnutls_certificate_type_t elements.
+ * @list: is a 0 terminated list of enum MHD_GNUTLS_CertificateType elements.
  *
  * Sets the priority on the certificate types supported by gnutls.
  * Priority is higher for elements specified before others.

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_record.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_record.c  2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_record.c  2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -49,7 +49,7 @@
  *
  * Returns: the version of the currently used protocol.
  **/
-gnutls_protocol_t
+enum MHD_GNUTLS_Protocol
 MHD_gnutls_protocol_get_version (mhd_gtls_session_t session)
 {
   return session->security_parameters.version;
@@ -57,7 +57,7 @@
 
 void
 mhd_gtls_set_current_version (mhd_gtls_session_t session,
-                             gnutls_protocol_t version)
+                             enum MHD_GNUTLS_Protocol version)
 {
   session->security_parameters.version = version;
 }
@@ -259,7 +259,7 @@
 copy_record_version (mhd_gtls_session_t session,
                      gnutls_handshake_description_t htype, opaque version[2])
 {
-  gnutls_protocol_t lver;
+  enum MHD_GNUTLS_Protocol lver;
 
   if (htype != GNUTLS_HANDSHAKE_CLIENT_HELLO
       || session->internals.default_record_version[0] == 0)

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_sig.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_sig.c     2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_sig.c     2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -56,7 +56,7 @@
   opaque concat[36];
   mac_hd_t td_md5;
   mac_hd_t td_sha;
-  gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session);
+  enum MHD_GNUTLS_Protocol ver = MHD_gnutls_protocol_get_version (session);
 
   td_sha = mhd_gnutls_hash_copy (session->internals.handshake_mac_handle_sha);
   if (td_sha == NULL)
@@ -128,7 +128,7 @@
   int ret;
   mac_hd_t td_sha;
   opaque concat[36];
-  gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session);
+  enum MHD_GNUTLS_Protocol ver = MHD_gnutls_protocol_get_version (session);
 
   td_sha = mhd_gtls_hash_init (MHD_GNUTLS_MAC_SHA1);
   if (td_sha == NULL)
@@ -204,7 +204,7 @@
  * given data. The output will be allocated and be put in signature.
  */
 int
-mhd_gtls_sign (gnutls_pk_algorithm_t algo,
+mhd_gtls_sign (enum MHD_GNUTLS_PublicKeyAlgorithm algo,
               mpi_t * params,
               int params_size,
               const gnutls_datum_t * data, gnutls_datum_t * signature)
@@ -335,7 +335,7 @@
   mac_hd_t td_md5;
   mac_hd_t td_sha;
   gnutls_datum_t dconcat;
-  gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session);
+  enum MHD_GNUTLS_Protocol ver = MHD_gnutls_protocol_get_version (session);
 
   td_md5 = mhd_gnutls_hash_copy (session->internals.handshake_mac_handle_md5);
   if (td_md5 == NULL)
@@ -402,7 +402,7 @@
   mac_hd_t td_md5 = NULL;
   mac_hd_t td_sha;
   opaque concat[36];
-  gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session);
+  enum MHD_GNUTLS_Protocol ver = MHD_gnutls_protocol_get_version (session);
 
   if (ver < MHD_GNUTLS_TLS1_2)
     {

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_sig.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_sig.h     2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_sig.h     2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -44,7 +44,7 @@
                               const gnutls_datum_t * params,
                               gnutls_datum_t * signature);
 
-int mhd_gtls_sign (gnutls_pk_algorithm_t algo,
+int mhd_gtls_sign (enum MHD_GNUTLS_PublicKeyAlgorithm algo,
                  mpi_t * params, int params_size,
                  const gnutls_datum_t * data, gnutls_datum_t * signature);
 

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_state.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_state.c   2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_state.c   2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -44,7 +44,7 @@
 
 void
 _gnutls_session_cert_type_set (mhd_gtls_session_t session,
-                               gnutls_certificate_type_t ct)
+                               enum MHD_GNUTLS_CertificateType ct)
 {
   session->security_parameters.cert_type = ct;
 }
@@ -55,7 +55,7 @@
  *
  * Returns: the currently used cipher.
  **/
-gnutls_cipher_algorithm_t
+enum MHD_GNUTLS_CipherAlgorithm
 gnutls_cipher_get (mhd_gtls_session_t session)
 {
   return session->security_parameters.read_bulk_cipher_algorithm;
@@ -68,10 +68,10 @@
  * The certificate type is by default X.509, unless it is negotiated
  * as a TLS extension.
  *
- * Returns: the currently used %gnutls_certificate_type_t certificate
+ * Returns: the currently used %enum MHD_GNUTLS_CertificateType certificate
  *   type.
  **/
-gnutls_certificate_type_t
+enum MHD_GNUTLS_CertificateType
 gnutls_certificate_type_get (mhd_gtls_session_t session)
 {
   return session->security_parameters.cert_type;
@@ -83,7 +83,7 @@
  *
  * Returns: the key exchange algorithm used in the last handshake.
  **/
-gnutls_kx_algorithm_t
+enum MHD_GNUTLS_KeyExchangeAlgorithm
 gnutls_kx_get (mhd_gtls_session_t session)
 {
   return session->security_parameters.kx_algorithm;
@@ -95,7 +95,7 @@
  *
  * Returns: the currently used mac algorithm.
  **/
-gnutls_mac_algorithm_t
+enum MHD_GNUTLS_HashAlgorithm
 gnutls_mac_get (mhd_gtls_session_t session)
 {
   return session->security_parameters.read_mac_algorithm;
@@ -107,7 +107,7 @@
  *
  * Returns: the currently used compression method.
  **/
-gnutls_compression_method_t
+enum MHD_GNUTLS_CompressionMethod
 gnutls_compression_get (mhd_gtls_session_t session)
 {
   return session->security_parameters.read_compression_algorithm;
@@ -119,7 +119,7 @@
  */
 int
 mhd_gtls_session_cert_type_supported (mhd_gtls_session_t session,
-                                     gnutls_certificate_type_t cert_type)
+                                     enum MHD_GNUTLS_CertificateType cert_type)
 {
   unsigned i;
   unsigned cert_found = 0;
@@ -656,7 +656,7 @@
 }
 
 inline static int
-_gnutls_cal_PRF_A (gnutls_mac_algorithm_t algorithm,
+_gnutls_cal_PRF_A (enum MHD_GNUTLS_HashAlgorithm algorithm,
                    const void *secret,
                    int secret_size,
                    const void *seed, int seed_size, void *result)
@@ -682,7 +682,7 @@
  * (used in the PRF function)
  */
 static int
-_gnutls_P_hash (gnutls_mac_algorithm_t algorithm,
+_gnutls_P_hash (enum MHD_GNUTLS_HashAlgorithm algorithm,
                 const opaque * secret,
                 int secret_size,
                 const opaque * seed,
@@ -789,7 +789,7 @@
   opaque s_seed[MAX_SEED_SIZE];
   opaque o1[MAX_PRF_BYTES], o2[MAX_PRF_BYTES];
   int result;
-  gnutls_protocol_t ver = MHD_gnutls_protocol_get_version (session);
+  enum MHD_GNUTLS_Protocol ver = MHD_gnutls_protocol_get_version (session);
 
   if (total_bytes > MAX_PRF_BYTES)
     {
@@ -1069,7 +1069,7 @@
 int
 mhd_gtls_session_is_export (mhd_gtls_session_t session)
 {
-  gnutls_cipher_algorithm_t cipher;
+  enum MHD_GNUTLS_CipherAlgorithm cipher;
 
   cipher =
     mhd_gtls_cipher_suite_get_cipher_algo (&session->security_parameters.

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_state.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_state.h   2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_state.h   2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -28,10 +28,10 @@
 #include <gnutls_int.h>
 
 void _gnutls_session_cert_type_set (mhd_gtls_session_t session,
-                                   gnutls_certificate_type_t);
-gnutls_kx_algorithm_t gnutls_kx_get (mhd_gtls_session_t session);
-gnutls_cipher_algorithm_t gnutls_cipher_get (mhd_gtls_session_t session);
-gnutls_certificate_type_t gnutls_certificate_type_get (mhd_gtls_session_t);
+                                   enum MHD_GNUTLS_CertificateType);
+enum MHD_GNUTLS_KeyExchangeAlgorithm gnutls_kx_get (mhd_gtls_session_t 
session);
+enum MHD_GNUTLS_CipherAlgorithm gnutls_cipher_get (mhd_gtls_session_t session);
+enum MHD_GNUTLS_CertificateType gnutls_certificate_type_get 
(mhd_gtls_session_t);
 
 #include <gnutls_auth_int.h>
 
@@ -43,7 +43,7 @@
 #endif
 
 int mhd_gtls_session_cert_type_supported (mhd_gtls_session_t,
-                                        gnutls_certificate_type_t);
+                                        enum MHD_GNUTLS_CertificateType);
 
 int mhd_gtls_dh_set_secret_bits (mhd_gtls_session_t session, unsigned bits);
 

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_ui.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_ui.c      2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_ui.c      2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -489,7 +489,7 @@
  *
  **/
 int
-MHD_gnutls_fingerprint (gnutls_digest_algorithm_t algo,
+MHD_gnutls_fingerprint (enum MHD_GNUTLS_HashAlgorithm algo,
                     const gnutls_datum_t * data,
                     void *result, size_t * result_size)
 {

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_x509.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_x509.c    2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_x509.c    2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -951,11 +951,11 @@
   return 0;
 }
 
-/* Returns 0 if it's ok to use the gnutls_kx_algorithm_t with this
+/* Returns 0 if it's ok to use the enum MHD_GNUTLS_KeyExchangeAlgorithm with 
this
  * certificate (uses the KeyUsage field).
  */
 int
-_gnutls_check_key_usage (const gnutls_cert * cert, gnutls_kx_algorithm_t alg)
+_gnutls_check_key_usage (const gnutls_cert * cert, enum 
MHD_GNUTLS_KeyExchangeAlgorithm alg)
 {
   unsigned int key_usage = 0;
   int encipher_type;

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_x509.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_x509.h    2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_x509.h    2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -37,7 +37,7 @@
 #define PEM_KEY_DSA_SEP "-----BEGIN DSA"
 
 int _gnutls_check_key_usage (const gnutls_cert * cert,
-                            gnutls_kx_algorithm_t alg);
+                            enum MHD_GNUTLS_KeyExchangeAlgorithm alg);
 
 int _gnutls_x509_read_rsa_params (opaque * der, int dersize, mpi_t * params);
 int _gnutls_x509_read_dsa_pubkey (opaque * der, int dersize, mpi_t * params);

Modified: libmicrohttpd/src/daemon/https/x509/common.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/common.c        2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/x509/common.c        2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -1215,7 +1215,7 @@
 int
 _gnutls_x509_encode_and_copy_PKI_params (ASN1_TYPE dst,
                                          const char *dst_name,
-                                         gnutls_pk_algorithm_t
+                                         enum MHD_GNUTLS_PublicKeyAlgorithm
                                          pk_algorithm,
                                          mpi_t * params, int params_size)
 {

Modified: libmicrohttpd/src/daemon/https/x509/common.h
===================================================================
--- libmicrohttpd/src/daemon/https/x509/common.h        2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/x509/common.h        2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -112,7 +112,7 @@
 
 int _gnutls_x509_encode_and_copy_PKI_params (ASN1_TYPE dst,
                                             const char *dst_name,
-                                            gnutls_pk_algorithm_t
+                                            enum MHD_GNUTLS_PublicKeyAlgorithm
                                             pk_algorithm, mpi_t * params,
                                             int params_size);
 int _gnutls_asn1_copy_node (ASN1_TYPE * dst, const char *dst_name,

Modified: libmicrohttpd/src/daemon/https/x509/crl_write.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/crl_write.c     2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/x509/crl_write.c     2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -102,7 +102,7 @@
 int
 gnutls_x509_crl_sign2 (gnutls_x509_crl_t crl, gnutls_x509_crt_t issuer,
                        gnutls_x509_privkey_t issuer_key,
-                       gnutls_digest_algorithm_t dig, unsigned int flags)
+                       enum MHD_GNUTLS_HashAlgorithm dig, unsigned int flags)
 {
   int result;
 
@@ -143,7 +143,7 @@
 gnutls_x509_crl_sign (gnutls_x509_crl_t crl, gnutls_x509_crt_t issuer,
                       gnutls_x509_privkey_t issuer_key)
 {
-  return gnutls_x509_crl_sign2 (crl, issuer, issuer_key, MHD_GNUTLS_DIG_SHA1,
+  return gnutls_x509_crl_sign2 (crl, issuer, issuer_key, MHD_GNUTLS_MAC_SHA1,
                                 0);
 }
 

Modified: libmicrohttpd/src/daemon/https/x509/crq.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/crq.c   2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/daemon/https/x509/crq.c   2008-08-24 17:53:48 UTC (rev 
7592)
@@ -740,7 +740,7 @@
   **/
 int
 gnutls_x509_crq_sign2 (gnutls_x509_crq_t crq, gnutls_x509_privkey_t key,
-                       gnutls_digest_algorithm_t dig, unsigned int flags)
+                       enum MHD_GNUTLS_HashAlgorithm dig, unsigned int flags)
 {
   int result;
   gnutls_datum_t signature;
@@ -805,7 +805,7 @@
 int
 gnutls_x509_crq_sign (gnutls_x509_crq_t crq, gnutls_x509_privkey_t key)
 {
-  return gnutls_x509_crq_sign2 (crq, key, MHD_GNUTLS_DIG_SHA1, 0);
+  return gnutls_x509_crq_sign2 (crq, key, MHD_GNUTLS_MAC_SHA1, 0);
 }
 
 /**
@@ -857,7 +857,7 @@
   * For DSA the bits returned are of the public
   * exponent.
   *
-  * Returns a member of the gnutls_pk_algorithm_t enumeration on success,
+  * Returns a member of the enum MHD_GNUTLS_PublicKeyAlgorithm enumeration on 
success,
   * or a negative value on error.
   *
   **/

Modified: libmicrohttpd/src/daemon/https/x509/mpi.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/mpi.c   2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/daemon/https/x509/mpi.c   2008-08-24 17:53:48 UTC (rev 
7592)
@@ -335,8 +335,8 @@
 int
 _gnutls_x509_write_sig_params (ASN1_TYPE dst,
                                const char *dst_name,
-                               gnutls_pk_algorithm_t pk_algorithm,
-                               gnutls_digest_algorithm_t dig,
+                               enum MHD_GNUTLS_PublicKeyAlgorithm pk_algorithm,
+                               enum MHD_GNUTLS_HashAlgorithm dig,
                                mpi_t * params, int params_size)
 {
   int result;

Modified: libmicrohttpd/src/daemon/https/x509/mpi.h
===================================================================
--- libmicrohttpd/src/daemon/https/x509/mpi.h   2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/daemon/https/x509/mpi.h   2008-08-24 17:53:48 UTC (rev 
7592)
@@ -52,6 +52,6 @@
                               uint32_t num);
 
 int _gnutls_x509_write_sig_params (ASN1_TYPE dst, const char *dst_name,
-                                  gnutls_pk_algorithm_t pk_algorithm,
-                                  gnutls_digest_algorithm_t, mpi_t * params,
+                                  enum MHD_GNUTLS_PublicKeyAlgorithm 
pk_algorithm,
+                                  enum MHD_GNUTLS_HashAlgorithm, mpi_t * 
params,
                                   int params_size);

Modified: libmicrohttpd/src/daemon/https/x509/privkey_pkcs8.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/privkey_pkcs8.c 2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/x509/privkey_pkcs8.c 2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -63,7 +63,7 @@
 
 struct pbe_enc_params
 {
-  gnutls_cipher_algorithm_t cipher;
+  enum MHD_GNUTLS_CipherAlgorithm cipher;
   opaque iv[8];
   int iv_size;
 };
@@ -1284,7 +1284,7 @@
 /* Converts an OID to a gnutls cipher type.
  */
 inline static int
-oid2cipher (const char *oid, gnutls_cipher_algorithm_t * algo)
+oid2cipher (const char *oid, enum MHD_GNUTLS_CipherAlgorithm * algo)
 {
 
   *algo = 0;

Modified: libmicrohttpd/src/daemon/https/x509/sign.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/sign.c  2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/daemon/https/x509/sign.c  2008-08-24 17:53:48 UTC (rev 
7592)
@@ -49,14 +49,14 @@
  * structure. The digest info is allocated and stored into the info structure.
  */
 static int
-encode_ber_digest_info (gnutls_digest_algorithm_t hash,
+encode_ber_digest_info (enum MHD_GNUTLS_HashAlgorithm hash,
                         const gnutls_datum_t * digest, gnutls_datum_t * info)
 {
   ASN1_TYPE dinfo = ASN1_TYPE_EMPTY;
   int result;
   const char *algo;
 
-  algo = mhd_gtls_x509_mac_to_oid ((gnutls_mac_algorithm_t) hash);
+  algo = mhd_gtls_x509_mac_to_oid ((enum MHD_GNUTLS_HashAlgorithm) hash);
   if (algo == NULL)
     {
       gnutls_assert ();
@@ -132,7 +132,7 @@
  * params[1] is public key
  */
 static int
-pkcs1_rsa_sign (gnutls_digest_algorithm_t hash, const gnutls_datum_t * text,
+pkcs1_rsa_sign (enum MHD_GNUTLS_HashAlgorithm hash, const gnutls_datum_t * 
text,
                 mpi_t * params, int params_len, gnutls_datum_t * signature)
 {
   int ret;
@@ -186,7 +186,7 @@
  */
 int
 _gnutls_x509_sign (const gnutls_datum_t * tbs,
-                   gnutls_digest_algorithm_t hash,
+                   enum MHD_GNUTLS_HashAlgorithm hash,
                    gnutls_x509_privkey_t signer, gnutls_datum_t * signature)
 {
   int ret;
@@ -217,7 +217,7 @@
  */
 int
 _gnutls_x509_sign_tbs (ASN1_TYPE cert, const char *tbs_name,
-                       gnutls_digest_algorithm_t hash,
+                       enum MHD_GNUTLS_HashAlgorithm hash,
                        gnutls_x509_privkey_t signer,
                        gnutls_datum_t * signature)
 {
@@ -268,7 +268,7 @@
  -*/
 int
 _gnutls_x509_pkix_sign (ASN1_TYPE src, const char *src_name,
-                        gnutls_digest_algorithm_t dig,
+                        enum MHD_GNUTLS_HashAlgorithm dig,
                         gnutls_x509_crt_t issuer,
                         gnutls_x509_privkey_t issuer_key)
 {

Modified: libmicrohttpd/src/daemon/https/x509/sign.h
===================================================================
--- libmicrohttpd/src/daemon/https/x509/sign.h  2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/daemon/https/x509/sign.h  2008-08-24 17:53:48 UTC (rev 
7592)
@@ -23,14 +23,14 @@
  */
 
 int _gnutls_x509_sign (const gnutls_datum_t * tbs,
-                      gnutls_digest_algorithm_t hash,
+                      enum MHD_GNUTLS_HashAlgorithm hash,
                       gnutls_x509_privkey_t signer,
                       gnutls_datum_t * signature);
 int _gnutls_x509_sign_tbs (ASN1_TYPE cert, const char *tbs_name,
-                          gnutls_digest_algorithm_t hash,
+                          enum MHD_GNUTLS_HashAlgorithm hash,
                           gnutls_x509_privkey_t signer,
                           gnutls_datum_t * signature);
 int _gnutls_x509_pkix_sign (ASN1_TYPE src, const char *src_name,
-                           gnutls_digest_algorithm_t,
+                           enum MHD_GNUTLS_HashAlgorithm,
                            gnutls_x509_crt_t issuer,
                            gnutls_x509_privkey_t issuer_key);

Modified: libmicrohttpd/src/daemon/https/x509/x509.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/x509.c  2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/daemon/https/x509/x509.c  2008-08-24 17:53:48 UTC (rev 
7592)
@@ -858,7 +858,7 @@
  * For DSA the bits returned are of the public
  * exponent.
  *
- * Returns a member of the gnutls_pk_algorithm_t enumeration on success,
+ * Returns a member of the enum MHD_GNUTLS_PublicKeyAlgorithm enumeration on 
success,
  * or a negative value on error.
  *
  **/
@@ -1945,7 +1945,7 @@
  **/
 int
 gnutls_x509_crt_get_fingerprint (gnutls_x509_crt_t cert,
-                                 gnutls_digest_algorithm_t algo,
+                                 enum MHD_GNUTLS_HashAlgorithm algo,
                                  void *buf, size_t * sizeof_buf)
 {
   opaque *cert_buf;
@@ -2165,7 +2165,7 @@
       return mhd_gtls_asn2err (result);
     }
 
-  result = MHD_gnutls_fingerprint (MHD_GNUTLS_DIG_SHA1, &pubkey, output_data,
+  result = MHD_gnutls_fingerprint (MHD_GNUTLS_MAC_SHA1, &pubkey, output_data,
                                output_data_size);
 
   gnutls_afree (pubkey.data);

Modified: libmicrohttpd/src/daemon/https/x509/x509.h
===================================================================
--- libmicrohttpd/src/daemon/https/x509/x509.h  2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/daemon/https/x509/x509.h  2008-08-24 17:53:48 UTC (rev 
7592)
@@ -296,7 +296,7 @@
 int gnutls_x509_crt_sign2(gnutls_x509_crt_t crt,
                           gnutls_x509_crt_t issuer,
                           gnutls_x509_privkey_t issuer_key,
-                          gnutls_digest_algorithm_t,
+                          enum MHD_GNUTLS_HashAlgorithm,
                           unsigned int flags);
 int gnutls_x509_crt_set_activation_time(gnutls_x509_crt_t cert,
                                         time_t act_time);
@@ -435,7 +435,7 @@
 int gnutls_x509_crl_sign2(gnutls_x509_crl_t crl,
                           gnutls_x509_crt_t issuer,
                           gnutls_x509_privkey_t issuer_key,
-                          gnutls_digest_algorithm_t,
+                          enum MHD_GNUTLS_HashAlgorithm,
                           unsigned int flags);
 int gnutls_x509_crl_set_this_update(gnutls_x509_crl_t crl,
                                     time_t act_time);
@@ -556,7 +556,7 @@
                                      int crl_list_length);
 
 int gnutls_x509_crt_get_fingerprint(gnutls_x509_crt_t cert,
-                                    gnutls_digest_algorithm_t algo,
+                                    enum MHD_GNUTLS_HashAlgorithm algo,
                                     void *buf,
                                     size_t * sizeof_buf);
 
@@ -631,7 +631,7 @@
                                    size_t * output_data_size);
 
 int gnutls_x509_privkey_generate(gnutls_x509_privkey_t key,
-                                 gnutls_pk_algorithm_t algo,
+                                 enum MHD_GNUTLS_PublicKeyAlgorithm algo,
                                  unsigned int bits,
                                  unsigned int flags);
 
@@ -656,7 +656,7 @@
 /* Signing stuff.
  */
 int gnutls_x509_privkey_sign_data(gnutls_x509_privkey_t key,
-                                  gnutls_digest_algorithm_t digest,
+                                  enum MHD_GNUTLS_HashAlgorithm digest,
                                   unsigned int flags,
                                   const gnutls_datum_t * data,
                                   void *signature,
@@ -710,7 +710,7 @@
                             gnutls_x509_privkey_t key);
 int gnutls_x509_crq_sign2(gnutls_x509_crq_t crq,
                           gnutls_x509_privkey_t key,
-                          gnutls_digest_algorithm_t,
+                          enum MHD_GNUTLS_HashAlgorithm,
                           unsigned int flags);
 int gnutls_x509_crq_sign(gnutls_x509_crq_t crq,
                          gnutls_x509_privkey_t key);
@@ -800,7 +800,7 @@
      */
     int params_size; /* holds the number of params */
 
-    gnutls_pk_algorithm_t pk_algorithm;
+    enum MHD_GNUTLS_PublicKeyAlgorithm pk_algorithm;
 
     int crippled; /* The crippled keys will not use the ASN1_TYPE key.
      * The encoding will only be performed at the export
@@ -887,7 +887,7 @@
 void gnutls_x509_privkey_deinit(gnutls_x509_privkey_t key);
 
 int gnutls_x509_privkey_generate(gnutls_x509_privkey_t key,
-                                 gnutls_pk_algorithm_t algo,
+                                 enum MHD_GNUTLS_PublicKeyAlgorithm algo,
                                  unsigned int bits,
                                  unsigned int flags);
 

Modified: libmicrohttpd/src/daemon/https/x509/x509_privkey.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/x509_privkey.c  2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/x509/x509_privkey.c  2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -552,7 +552,7 @@
  * This function will return the public key algorithm of a private
  * key.
  *
- * Returns a member of the gnutls_pk_algorithm_t enumeration on success,
+ * Returns a member of the enum MHD_GNUTLS_PublicKeyAlgorithm enumeration on 
success,
  * or a negative value on error.
  *
  **/
@@ -1190,7 +1190,7 @@
  **/
 int
 gnutls_x509_privkey_generate (gnutls_x509_privkey_t key,
-                              gnutls_pk_algorithm_t algo,
+                              enum MHD_GNUTLS_PublicKeyAlgorithm algo,
                               unsigned int bits, unsigned int flags)
 {
   int ret, params_len;
@@ -1348,7 +1348,7 @@
  **/
 int
 gnutls_x509_privkey_sign_data (gnutls_x509_privkey_t key,
-                               gnutls_digest_algorithm_t digest,
+                               enum MHD_GNUTLS_HashAlgorithm digest,
                                unsigned int flags,
                                const gnutls_datum_t * data,
                                void *signature, size_t * signature_size)

Modified: libmicrohttpd/src/daemon/https/x509/x509_verify.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/x509_verify.c   2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/x509/x509_verify.c   2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -465,7 +465,7 @@
  */
 static int
 decode_ber_digest_info (const gnutls_datum_t * info,
-                        gnutls_mac_algorithm_t * hash,
+                        enum MHD_GNUTLS_HashAlgorithm * hash,
                         opaque * digest, int *digest_size)
 {
   ASN1_TYPE dinfo = ASN1_TYPE_EMPTY;
@@ -547,7 +547,7 @@
                        const gnutls_datum_t * signature,
                        mpi_t * params, int params_len)
 {
-  gnutls_mac_algorithm_t hash = MHD_GNUTLS_MAC_UNKNOWN;
+  enum MHD_GNUTLS_HashAlgorithm hash = MHD_GNUTLS_MAC_UNKNOWN;
   int ret;
   opaque digest[MAX_HASH_SIZE], md[MAX_HASH_SIZE];
   int digest_size;
@@ -637,7 +637,7 @@
 static int
 verify_sig (const gnutls_datum_t * tbs,
             const gnutls_datum_t * signature,
-            gnutls_pk_algorithm_t pk,
+            enum MHD_GNUTLS_PublicKeyAlgorithm pk,
             mpi_t * issuer_params, int issuer_params_size)
 {
 

Modified: libmicrohttpd/src/daemon/https/x509/x509_write.c
===================================================================
--- libmicrohttpd/src/daemon/https/x509/x509_write.c    2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/daemon/https/x509/x509_write.c    2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -591,7 +591,7 @@
 int
 gnutls_x509_crt_sign2 (gnutls_x509_crt_t crt, gnutls_x509_crt_t issuer,
                        gnutls_x509_privkey_t issuer_key,
-                       gnutls_digest_algorithm_t dig, unsigned int flags)
+                       enum MHD_GNUTLS_HashAlgorithm dig, unsigned int flags)
 {
   int result;
 
@@ -632,7 +632,7 @@
 gnutls_x509_crt_sign (gnutls_x509_crt_t crt, gnutls_x509_crt_t issuer,
                       gnutls_x509_privkey_t issuer_key)
 {
-  return gnutls_x509_crt_sign2 (crt, issuer, issuer_key, MHD_GNUTLS_DIG_SHA1,
+  return gnutls_x509_crt_sign2 (crt, issuer, issuer_key, MHD_GNUTLS_MAC_SHA1,
                                 0);
 }
 

Modified: libmicrohttpd/src/daemon/internal.h
===================================================================
--- libmicrohttpd/src/daemon/internal.h 2008-08-24 16:36:25 UTC (rev 7591)
+++ libmicrohttpd/src/daemon/internal.h 2008-08-24 17:53:48 UTC (rev 7592)
@@ -627,7 +627,7 @@
   unsigned short port;
 
 #if HTTPS_SUPPORT
-  gnutls_credentials_type_t cred_type;
+  enum MHD_GNUTLS_CredentialsType cred_type;
 
   /* server x509 credintials */
   mhd_gtls_cert_credentials_t x509_cred;

Modified: libmicrohttpd/src/include/microhttpd.h
===================================================================
--- libmicrohttpd/src/include/microhttpd.h      2008-08-24 16:36:25 UTC (rev 
7591)
+++ libmicrohttpd/src/include/microhttpd.h      2008-08-24 17:53:48 UTC (rev 
7592)
@@ -343,13 +343,11 @@
 
  /**
   * Bind daemon to the supplied sockaddr. this option should be followed by a
-  * 'struct sockaddr'. Supplying an IPv6 address must be done in conjunction 
with
-  * with the 'MHD_USE_IPv6' option.
+  * 'struct sockaddr *'.  If 'MHD_USE_IPv6' is specified, the 'struct 
sockaddr*'
+  * should point to a 'struct sockaddr_in6', otherwise to a 'struct 
sockaddr_in'.
   */
   MHD_OPTION_SOCK_ADDR = 6,
 
-  MHD_HTTPS_OPTION_START = 7,
-
   /**
    * Filename for the private key (key.pem) to be used by the
    * HTTPS daemon.  This option should be followed by an
@@ -357,7 +355,7 @@
    * not be released until the application terminates.
    * This should be used in conjunction with 'MHD_OPTION_HTTPS_CERT_PATH'.
    */
-  MHD_OPTION_HTTPS_KEY_PATH,
+  MHD_OPTION_HTTPS_KEY_PATH = 7,
 
   /**
    * Filename for the certificate (cert.pem) to be used by the
@@ -366,70 +364,79 @@
    * not be released until the application terminates.
    * This should be used in conjunction with 'MHD_OPTION_HTTPS_KEY_PATH'.
    */
-  MHD_OPTION_HTTPS_CERT_PATH,
+  MHD_OPTION_HTTPS_CERT_PATH = 8,
 
   /**
-     * Memory pointer for the private key (key.pem) to be used by the
-     * HTTPS daemon.  This option should be followed by an
-     * "const char*" argument.
-     * This should be used in conjunction with 'MHD_OPTION_HTTPS_MEM_CERT'.
-     */
-  MHD_OPTION_HTTPS_MEM_KEY,
+   * Memory pointer for the private key (key.pem) to be used by the
+   * HTTPS daemon.  This option should be followed by an
+   * "const char*" argument.
+   * This should be used in conjunction with 'MHD_OPTION_HTTPS_MEM_CERT'.
+   */
+  MHD_OPTION_HTTPS_MEM_KEY = 9,
+  
+  /**
+   * Memory pointer for the certificate (cert.pem) to be used by the
+   * HTTPS daemon.  This option should be followed by an
+   * "const char*" argument.
+   * This should be used in conjunction with 'MHD_OPTION_HTTPS_MEM_KEY'.
+   */
+  MHD_OPTION_HTTPS_MEM_CERT = 10,
 
   /**
-  * Memory pointer for the certificate (cert.pem) to be used by the
-  * HTTPS daemon.  This option should be followed by an
-  * "const char*" argument.
-  * This should be used in conjunction with 'MHD_OPTION_HTTPS_MEM_KEY'.
-  */
-  MHD_OPTION_HTTPS_MEM_CERT,
-
-  /*
-   * daemon credentials type. either certificate or anonymous,
+   * Daemon credentials type.  Either certificate or anonymous,
    * this option should be followed by one of the values listed in
-   * gnutls_credentials_type_t.
+   * "enum MHD_GNUTLS_CredentialsType".
    */
-  MHD_OPTION_CRED_TYPE,
+  MHD_OPTION_CRED_TYPE = 11,
 
-  /*
-   * SSL/TLS protocol version
+  /**
+   * SSL/TLS protocol version.
    *
-   * Memory pointer to a zero terminated int array representing the
+   * Memory pointer to a zero (MHD_GNUTLS_PROTOCOL_END) terminated 
+   * (const) array of 'enum MHD_GNUTLS_Protocol' values representing the
    * protocol versions to this server should support. Unsupported
-   * requests will be droped by the server.
+   * requests will be droped by the server. 
    */
-  MHD_OPTION_PROTOCOL_VERSION,
+  MHD_OPTION_PROTOCOL_VERSION = 12,
 
-  /*
-   * Memory pointer to a zero terminated int array representing the
-   * cipher priority order to which the HTTPS daemon should adhere.
-   * "const int *" argument.
+  /**
+   * Memory pointer to a zero (MHD_GNUTLS_CIPHER_UNKNOWN) 
+   * terminated (const) array of 'enum MHD_GNUTLS_CipherAlgorithm' 
+   * representing the cipher priority order to which the HTTPS
+   * daemon should adhere.
    */
-  MHD_OPTION_CIPHER_ALGORITHM,
+  MHD_OPTION_CIPHER_ALGORITHM = 13,
 
-  /*
-   * Memory pointer to a zero terminated int array representing the
+  /**
+   * Memory pointer to a zero (MHD_GNUTLS_KX_UNKNOWN)
+   * terminated (const) array of 'MHD_GNUTLS_KeyExchangeAlgorithm' 
representing the
    * key exchange algorithm priority order to which the HTTPS daemon should 
adhere.
-   * "const int *" argument.
    */
-  MHD_OPTION_KX_PRIORITY,
+  MHD_OPTION_KX_PRIORITY = 14,
 
-  /*
-   * used to indicate which type of certificate this server will use,
+  /**
+   * Indicate which type of certificate this server will use,
+   * followed by a value of type 'enum MHD_GNUTLS_CertificateType'.
    */
-  MHD_OPTION_CRET_TYPE,
+  MHD_OPTION_CERT_TYPE = 15,
 
-  /*
-   * mac algorithm used by server
+  /**
+   * Specify the mac algorithm used by server.  
+   * The argument should be of type "enum MHD_GNUTLS_MacAlgorithm"
    */
-  MHD_OPTION_MAC_ALGO,
+  MHD_OPTION_MAC_ALGO = 16,
 
-  /*
-   * compression algorithm used by server
+  /**
+   * Compression algorithm used by server.  Should be followed by an
+   * option of type 'enum MHD_GNUTLS_CompressionMethod'.
    */
-  MHD_OPTION_TLS_COMP_ALGO,
+  MHD_OPTION_TLS_COMP_ALGO = 17,
 
-  MHD_HTTPS_OPTION_END
+  /**
+   * This value is used to indicate the end of the
+   * list of vararg options.
+   */
+  MHD_HTTPS_OPTION_END = -1
 };
 
 /**
@@ -509,23 +516,198 @@
    */
   MHD_REQUEST_TERMINATED_DAEMON_SHUTDOWN = 3,
 
-#if HTTPS_SUPPORT
-    /*
-     * this is the final state of a successfully processed secure connection
-     */
-    MHD_TLS_REQUEST_TERMINATED_COMPLETED_OK,
+  /* FIXME: add TLS-specific error codes,
+     but only those that are useful! */
+  /**
+   * Processing of this secure connection encountered 
+   * an error.
+   */
+  MHD_TLS_REQUEST_TERMINATED_WITH_ERROR,
+  
+  MHD_TLS_REQUEST_TERMINATED_WITH_FATAL_ALERT
 
-    /*
-     * processing of this secure connection encountered an error
-     */
-    /* TODO consider elaborating error cause & registering a error callback */
-    MHD_TLS_REQUEST_TERMINATED_WITH_ERROR,
+};
 
-    MHD_TLS_REQUEST_TERMINATED_WITH_FATAL_ALERT,
-#endif
+/**
+ * Which symmetric cipher should be used by HTTPS?
+ * Note that not all listed algorithms are necessarily
+ * supported by all builds of MHD.
+ */
+enum MHD_GNUTLS_CipherAlgorithm
+{
+  MHD_GNUTLS_CIPHER_UNKNOWN = 0,
+  MHD_GNUTLS_CIPHER_NULL = 1,
+  MHD_GNUTLS_CIPHER_ARCFOUR_128,
+  MHD_GNUTLS_CIPHER_3DES_CBC,
+  MHD_GNUTLS_CIPHER_AES_128_CBC,
+  MHD_GNUTLS_CIPHER_AES_256_CBC,
+  MHD_GNUTLS_CIPHER_ARCFOUR_40,
+  MHD_GNUTLS_CIPHER_CAMELLIA_128_CBC,
+  MHD_GNUTLS_CIPHER_CAMELLIA_256_CBC,
+  MHD_GNUTLS_CIPHER_RC2_40_CBC = 90,
+  MHD_GNUTLS_CIPHER_DES_CBC
+}; // enum MHD_GNUTLS_CipherAlgorithm;
+
+/**
+ * Which public key algorithm should be used
+ * for the key exchange?
+ * Note that not all listed algorithms are necessarily
+ * supported by all builds of MHD.
+ */
+enum MHD_GNUTLS_KeyExchangeAlgorithm
+{
+  MHD_GNUTLS_KX_UNKNOWN = 0,
+  MHD_GNUTLS_KX_RSA = 1,
+  MHD_GNUTLS_KX_DHE_DSS,
+  MHD_GNUTLS_KX_DHE_RSA,
+  MHD_GNUTLS_KX_ANON_DH,
+  MHD_GNUTLS_KX_SRP,
+  MHD_GNUTLS_KX_RSA_EXPORT,
+  MHD_GNUTLS_KX_SRP_RSA,
+  MHD_GNUTLS_KX_SRP_DSS
 };
 
 /**
+ * Server credentials type 
+ */
+enum MHD_GNUTLS_CredentialsType
+{
+  MHD_GNUTLS_CRD_CERTIFICATE = 1,
+  MHD_GNUTLS_CRD_ANON,
+  MHD_GNUTLS_CRD_SRP,
+  MHD_GNUTLS_CRD_PSK,
+  MHD_GNUTLS_CRD_IA
+};
+
+/**
+ * Enumeration of possible cryptographic
+ * hash functions (for MAC and Digest operations).
+ */
+enum MHD_GNUTLS_HashAlgorithm
+{
+  MHD_GNUTLS_MAC_UNKNOWN = 0,
+  MHD_GNUTLS_MAC_NULL = 1,
+  MHD_GNUTLS_MAC_MD5,
+  MHD_GNUTLS_MAC_SHA1,
+  MHD_GNUTLS_MAC_SHA256
+  //GNUTLS_MAC_SHA384,
+  //GNUTLS_MAC_SHA512
+};
+
+/**
+ * Compression methods.
+ */
+enum MHD_GNUTLS_CompressionMethod
+{
+  MHD_GNUTLS_COMP_UNKNOWN = 0,
+  MHD_GNUTLS_COMP_NULL = 1,
+  MHD_GNUTLS_COMP_DEFLATE
+};
+
+/**
+ * SSL/TLS Protocol types.
+ */
+enum MHD_GNUTLS_Protocol
+{
+  MHD_GNUTLS_PROTOCOL_END = 0,
+  MHD_GNUTLS_SSL3 = 1,
+  MHD_GNUTLS_TLS1_0,
+  MHD_GNUTLS_TLS1_1,
+  MHD_GNUTLS_TLS1_2,
+  MHD_GNUTLS_VERSION_UNKNOWN = 0xff
+};
+
+/**
+ * Specify what type of certificate should be used.
+ */
+enum MHD_GNUTLS_CertificateType
+{
+  MHD_GNUTLS_CRT_UNKNOWN = 0,
+  MHD_GNUTLS_CRT_X509 = 1
+};
+
+enum MHD_GNUTLS_PublicKeyAlgorithm
+{
+  MHD_GNUTLS_PK_UNKNOWN = 0,
+  MHD_GNUTLS_PK_RSA = 1
+  //GNUTLS_PK_DSA
+};
+
+/**
+ * Values of this enum are used to specify what
+ * information about a connection is desired.
+ */
+enum MHD_ConnectionInfoType
+{
+  /**
+   * What cipher algorithm is being used.
+   * Takes no extra arguments.
+   */
+  MHD_SESSION_INFO_CIPHER_ALGO,
+
+  /**
+   * What key exchange algorithm is being used.
+   * Takes no extra arguments.
+   */
+  MHD_SESSION_INFO_KX_ALGO,
+
+  /**
+   *
+   * Takes no extra arguments.
+   */
+  MHD_SESSION_INFO_CREDENTIALS_TYPE,
+
+  /**
+   *
+   * Takes no extra arguments.
+   */
+  MHD_SESSION_INFO_MAC_ALGO,
+
+  /**
+   * What compression method is being used.
+   * Takes no extra arguments.
+   */
+  MHD_SESSION_INFO_COMPRESSION_METHOD,
+
+  /**
+   *
+   * Takes no extra arguments.
+   */
+  MHD_SESSION_INFO_PROTOCOL,
+
+  /**
+   *
+   * Takes no extra arguments.
+   */
+  MHD_SESSION_INFO_CERT_TYPE
+};
+
+/**
+ * Values of this enum are used to specify what
+ * information about a deamon is desired.
+ */
+enum MHD_DaemonInfoType
+{
+  /**
+   * Request information about the key size for
+   * a particular cipher algorithm.  The cipher
+   * algorithm should be passed as an extra
+   * argument (of type 'enum MHD_GNUTLS_CipherAlgorithm').
+   */
+  MHD_DAEMON_INFO_KEY_SIZE,
+
+  /**
+   * Request information about the key size for
+   * a particular cipher algorithm.  The cipher
+   * algorithm should be passed as an extra
+   * argument (of type 'enum MHD_GNUTLS_HashAlgorithm').
+   */
+  MHD_DAEMON_INFO_MAC_KEY_SIZE
+};
+
+
+
+/**
  * Handle for the daemon (listening on a socket for HTTP traffic).
  */
 struct MHD_Daemon;
@@ -1004,141 +1186,67 @@
  */
 int MHD_destroy_post_processor (struct MHD_PostProcessor *pp);
 
-/*
- * HTTPS
+
+/**
+ * Information about a connection.
  */
-
-typedef enum MHD_GNUTLS_cipher_algorithm
+union MHD_ConnectionInfo
 {
-  MHD_GNUTLS_CIPHER_UNKNOWN = 0,
-  MHD_GNUTLS_CIPHER_NULL = 1,
-  MHD_GNUTLS_CIPHER_ARCFOUR_128,
-  MHD_GNUTLS_CIPHER_3DES_CBC,
-  MHD_GNUTLS_CIPHER_AES_128_CBC,
-  MHD_GNUTLS_CIPHER_AES_256_CBC,
-  MHD_GNUTLS_CIPHER_ARCFOUR_40,
-  MHD_GNUTLS_CIPHER_CAMELLIA_128_CBC,
-  MHD_GNUTLS_CIPHER_CAMELLIA_256_CBC,
-  MHD_GNUTLS_CIPHER_RC2_40_CBC = 90,
-  MHD_GNUTLS_CIPHER_DES_CBC
-} gnutls_cipher_algorithm_t;
+  enum MHD_GNUTLS_CipherAlgorithm cipher_algorithm;
+  enum MHD_GNUTLS_KeyExchangeAlgorithm kx_algorithm;
+  enum MHD_GNUTLS_CredentialsType credentials_type;
+  enum MHD_GNUTLS_HashAlgorithm mac_algorithm;
+  enum MHD_GNUTLS_CompressionMethod compression_method;
+  enum MHD_GNUTLS_Protocol protocol;
+  enum MHD_GNUTLS_CertificateType certificate_type;
+  enum MHD_GNUTLS_PublicKeyAlgorithm pk_algorithm;
+};
 
-typedef enum
-{
-  MHD_GNUTLS_KX_UNKNOWN = 0,
-  MHD_GNUTLS_KX_RSA = 1,
-  MHD_GNUTLS_KX_DHE_DSS,
-  MHD_GNUTLS_KX_DHE_RSA,
-  MHD_GNUTLS_KX_ANON_DH,
-  MHD_GNUTLS_KX_SRP,
-  MHD_GNUTLS_KX_RSA_EXPORT,
-  MHD_GNUTLS_KX_SRP_RSA,
-  MHD_GNUTLS_KX_SRP_DSS
-} gnutls_kx_algorithm_t;
+/**
+ * Obtain information about the given connection.
+ *
+ * @param connection what connection to get information about
+ * @param infoType what information is desired?
+ * @param ... depends on infoType
+ * @return NULL if this information is not available
+ *         (or if the infoType is unknown)
+ */
+const union MHD_ConnectionInfo *
+MHD_get_connection_info (struct MHD_Connection * connection,
+                        enum MHD_ConnectionInfoType infoType,
+                        ...);
 
-/* server credentials type */
-typedef enum
-{
-  MHD_GNUTLS_CRD_CERTIFICATE = 1,
-  MHD_GNUTLS_CRD_ANON,
-  MHD_GNUTLS_CRD_SRP,
-  MHD_GNUTLS_CRD_PSK,
-  MHD_GNUTLS_CRD_IA
-} gnutls_credentials_type_t;
 
-/* mac algorithm */
-typedef enum
+/**
+ * Information about an MHD daemon.
+ */
+union MHD_DaemonInfo
 {
-  MHD_GNUTLS_MAC_UNKNOWN = 0,
-  MHD_GNUTLS_MAC_NULL = 1,
-  MHD_GNUTLS_MAC_MD5,
-  MHD_GNUTLS_MAC_SHA1,
-  MHD_GNUTLS_MAC_SHA256
-  //GNUTLS_MAC_SHA384,
-  //GNUTLS_MAC_SHA512
-} gnutls_mac_algorithm_t;
+  /**
+   * Size of the key (unit??)
+   */
+  size_t key_size;
 
-  /* The enumerations here should have the same value with
-     gnutls_mac_algorithm_t.
+  /**
+   * Size of the mac key (unit??)
    */
-typedef enum
-{
-  MHD_GNUTLS_DIG_NULL = MHD_GNUTLS_MAC_NULL,
-  MHD_GNUTLS_DIG_MD5 = MHD_GNUTLS_MAC_MD5,
-  MHD_GNUTLS_DIG_SHA1 = MHD_GNUTLS_MAC_SHA1,
-  MHD_GNUTLS_DIG_SHA256 = MHD_GNUTLS_MAC_SHA256
-} gnutls_digest_algorithm_t;
-
-/* compression method */
-typedef enum
-{
-  MHD_GNUTLS_COMP_UNKNOWN = 0,
-  MHD_GNUTLS_COMP_NULL = 1,
-  MHD_GNUTLS_COMP_DEFLATE,
-  MHD_GNUTLS_COMP_LZO               /* only available if gnutls-extra has
-                                   been initialized
-                                 */
-} gnutls_compression_method_t;
-
-/* protocol type */
-typedef enum
-{
-  MHD_GNUTLS_SSL3 = 1,
-  MHD_GNUTLS_TLS1_0,
-  MHD_GNUTLS_TLS1_1,
-  MHD_GNUTLS_TLS1_2,
-  MHD_GNUTLS_VERSION_UNKNOWN = 0xff
-} gnutls_protocol_t;
-
-/* certificate_type */
-typedef enum
-{
-  MHD_GNUTLS_CRT_UNKNOWN = 0,
-  MHD_GNUTLS_CRT_X509 = 1
-} gnutls_certificate_type_t;
-
-typedef enum
-{
-  MHD_GNUTLS_PK_UNKNOWN = 0,
-  MHD_GNUTLS_PK_RSA = 1
-  //GNUTLS_PK_DSA
-} gnutls_pk_algorithm_t;
-
-union MHD_SessionInfo
-{
-  gnutls_cipher_algorithm_t cipher_algorithm;
-  gnutls_kx_algorithm_t kx_algorithm;
-  gnutls_credentials_type_t credentials_type;
-  gnutls_mac_algorithm_t mac_algorithm;
-  gnutls_compression_method_t compression_method;
-  gnutls_protocol_t protocol;
-  gnutls_certificate_type_t certificate_type;
-  gnutls_pk_algorithm_t pk_algorithm;
-  int null_info;
+  size_t mac_key_size;
 };
 
-enum MHD_InfoType
-{
-  MHS_INFO_CIPHER_ALGO,
-  MHD_INFO_KX_ALGO,
-  MHD_INFO_CREDENTIALS_TYPE,
-  MHD_INFO_MAC_ALGO,
-  MHD_INFO_COMPRESSION_METHOD,
-  MHD_INFO_PROTOCOL,
-  MHD_INFO_CERT_TYPE
-};
+/**
+ * Obtain information about the given daemon.
+ *
+ * @param daemon what daemon to get information about
+ * @param infoType what information is desired?
+ * @param ... depends on infoType
+ * @return NULL if this information is not available
+ *         (or if the infoType is unknown)
+ */
+const union MHD_DaemonInfo *
+MHD_get_daemon_info (struct MHD_Daemon * daemon,
+                    enum MHD_DaemonInfoType infoType,
+                    ...);
 
-union MHD_SessionInfo
-MHD_get_session_info ( struct MHD_Connection * connection, enum MHD_InfoType 
infoType);
-
-/* TODO impl */
-size_t MHDS_get_key_size (struct MHD_Daemon *daemon,
-                          gnutls_cipher_algorithm_t algorithm);
-size_t MHDS_get_mac_key_size (struct MHD_Daemon *daemon,
-                              gnutls_mac_algorithm_t algorithm);
-
-
-
 #if 0                           /* keep Emacsens' auto-indent happy */
 {
 #endif

Modified: libmicrohttpd/src/testcurl/daemon_options_test.c
===================================================================
--- libmicrohttpd/src/testcurl/daemon_options_test.c    2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/testcurl/daemon_options_test.c    2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -50,12 +50,9 @@
 test_wrap (char *test_name, int (*test) (void))
 {
   int ret;
-  va_list arg_list;
-  struct MHD_Daemon *d;
 
   fprintf (stdout, "running test: %s ", test_name);
   ret = test ();
-
   if (ret == 0)
     {
       fprintf (stdout, "[pass]\n");

Modified: libmicrohttpd/src/testcurl/https/Makefile.am
===================================================================
--- libmicrohttpd/src/testcurl/https/Makefile.am        2008-08-24 16:36:25 UTC 
(rev 7591)
+++ libmicrohttpd/src/testcurl/https/Makefile.am        2008-08-24 17:53:48 UTC 
(rev 7592)
@@ -21,7 +21,7 @@
   tls_cipher_change_test \
   tls_alert_test
 endif  
-   
+
 TESTS = $(check_PROGRAMS)
 
 # cURL independent tests
@@ -64,7 +64,7 @@
   $(top_builddir)/src/testcurl/libcurl_version_check.a \
   $(top_builddir)/src/daemon/libmicrohttpd.la \
   @LIBCURL@
-  
+
 mhds_multi_daemon_test_SOURCES = \
   mhds_multi_daemon_test.c
 mhds_multi_daemon_test_LDADD  = \





reply via email to

[Prev in Thread] Current Thread [Next in Thread]