/** Multi-purpose flag container, see CSP_FLAG_* above */
unsigned int flags;
+ /** MIME-Type key, see CT_* above */
+ unsigned int content_type;
+
/** Client PC's IP address, as reported by the accept() function.
As a string. */
char *ip_addr_str;
char *client_address;
#endif
- /** MIME-Type key, see CT_* above */
- unsigned int content_type;
-
/** Actions files associated with this client */
struct file_list *actions_list[MAX_AF_FILES];
* Thanks to this flags, we can call function to close both connections
* and we don't have to care about more details.
*/
- int ssl_with_server_is_opened;
- int ssl_with_client_is_opened;
+ short int ssl_with_server_is_opened;
+ short int ssl_with_client_is_opened;
/*
* Server certificate chain of trust including strings with certificates
struct access_control_addr src[1]; /**< Client IP address */
struct access_control_addr dst[1]; /**< Website or parent proxy IP address */
#ifdef HAVE_RFC2553
- int wildcard_dst; /** < dst address is wildcard */
+ short wildcard_dst; /** < dst address is wildcard */
#endif
short action; /**< ACL_PERMIT or ACL_DENY */
#ifdef FEATURE_HTTPS_INSPECTION
/** Password for proxy ca file **/
- char * ca_password;
+ char *ca_password;
/** Directory with files of ca **/
char *ca_directory;
/** Filename of ca certificate **/
- char * ca_cert_file;
+ char *ca_cert_file;
/** Filename of ca key **/
- char * ca_key_file;
+ char *ca_key_file;
/** Directory for saving certificates and keys for each webpage **/
char *certificate_directory;
char *cipher_list;
/** Filename of trusted CAs certificates **/
- char * trusted_cas_file;
+ char *trusted_cas_file;
#endif
};