summaryrefslogtreecommitdiff
path: root/vio
diff options
context:
space:
mode:
authorMichael Widenius <monty@askmonty.org>2011-11-30 22:57:18 +0200
committerMichael Widenius <monty@askmonty.org>2011-11-30 22:57:18 +0200
commitefcfb195e3fc4a2b87bfcb9ad136d46b9961f49e (patch)
tree9eb3b78e20ecf4bd9e5cd587db50d51c1f06d336 /vio
parenta7f87effa57f6486c23bf5b340c8474a635dcf71 (diff)
parent6378bdbf47af72b2f899853586faa5a2d2f0fee1 (diff)
downloadmariadb-git-efcfb195e3fc4a2b87bfcb9ad136d46b9961f49e.tar.gz
Merge with 5.1
Diffstat (limited to 'vio')
-rw-r--r--vio/viosocket.c12
-rw-r--r--vio/viosslfactories.c6
2 files changed, 12 insertions, 6 deletions
diff --git a/vio/viosocket.c b/vio/viosocket.c
index 7f1ef718d96..478b5dc03bd 100644
--- a/vio/viosocket.c
+++ b/vio/viosocket.c
@@ -396,7 +396,9 @@ my_bool vio_poll_read(Vio *vio,uint timeout)
void vio_timeout(Vio *vio, uint which, uint timeout)
{
#if defined(SO_SNDTIMEO) && defined(SO_RCVTIMEO)
+#ifndef DBUG_OFF
int r;
+#endif
DBUG_ENTER("vio_timeout");
{
@@ -410,10 +412,12 @@ void vio_timeout(Vio *vio, uint which, uint timeout)
wait_timeout.tv_usec= 0;
#endif
- r= setsockopt(vio->sd, SOL_SOCKET, which ? SO_SNDTIMEO : SO_RCVTIMEO,
- IF_WIN(const char*, const void*)&wait_timeout,
- sizeof(wait_timeout));
-
+#ifndef DBUG_OFF
+ r=
+#endif
+ setsockopt(vio->sd, SOL_SOCKET, which ? SO_SNDTIMEO : SO_RCVTIMEO,
+ IF_WIN(const char*, const void*)&wait_timeout,
+ sizeof(wait_timeout));
}
#ifndef DBUG_OFF
diff --git a/vio/viosslfactories.c b/vio/viosslfactories.c
index 3c0c2f3a7ec..31863a0830f 100644
--- a/vio/viosslfactories.c
+++ b/vio/viosslfactories.c
@@ -300,7 +300,8 @@ new_VioSSLConnectorFd(const char *key_file, const char *cert_file,
verify= SSL_VERIFY_NONE;
if (!(ssl_fd= new_VioSSLFd(key_file, cert_file, ca_file,
- ca_path, cipher, TLSv1_client_method(), &dummy)))
+ ca_path, cipher,
+ (SSL_METHOD*) TLSv1_client_method(), &dummy)))
{
return 0;
}
@@ -322,7 +323,8 @@ new_VioSSLAcceptorFd(const char *key_file, const char *cert_file,
struct st_VioSSLFd *ssl_fd;
int verify= SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE;
if (!(ssl_fd= new_VioSSLFd(key_file, cert_file, ca_file,
- ca_path, cipher, TLSv1_server_method(), error)))
+ ca_path, cipher,
+ (SSL_METHOD*) TLSv1_server_method(), error)))
{
return 0;
}