On Mon, Jun 06, 2016 at 16:09:00 +0100, Daniel Berrange wrote: > Add support for a "tls_priority" URI parameter in remote > driver URIs. eg > > qemu+tls://localhost/session?tls_priority=NORMAL:-VERS-SSL3.0 > > Signed-off-by: Daniel P. Berrange <berra...@redhat.com> > --- > docs/remote.html.in | 13 +++++++++++++ > src/remote/remote_driver.c | 5 ++++- > 2 files changed, 17 insertions(+), 1 deletion(-)
[...] > diff --git a/src/remote/remote_driver.c b/src/remote/remote_driver.c > index 219cf47..5f02169 100644 > --- a/src/remote/remote_driver.c > +++ b/src/remote/remote_driver.c [...] > @@ -774,6 +775,7 @@ doRemoteOpen(virConnectPtr conn, > EXTRACT_URI_ARG_STR("pkipath", pkipath); > EXTRACT_URI_ARG_STR("known_hosts", knownHosts); > EXTRACT_URI_ARG_STR("known_hosts_verify", knownHostsVerify); > + EXTRACT_URI_ARG_STR("tls_priority", tls_priority); This copies the string from the URI. > > EXTRACT_URI_ARG_BOOL("no_sanity", sanity); > EXTRACT_URI_ARG_BOOL("no_verify", verify); > @@ -845,12 +847,13 @@ doRemoteOpen(virConnectPtr conn, > #ifdef WITH_GNUTLS > priv->tls = virNetTLSContextNewClientPath(pkipath, > geteuid() != 0 ? true : > false, > - NULL, > + tls_priority, > sanity, verify); > if (!priv->tls) > goto failed; > priv->is_secure = 1; > #else > + (void)tls_priority; > (void)sanity; > (void)verify; > virReportError(VIR_ERR_INVALID_ARG, "%s", So tls_priority is leaked in doRemoteOpen. ACK with the above fixed. -- libvir-list mailing list libvir-list@redhat.com https://www.redhat.com/mailman/listinfo/libvir-list