[Pkg-fedora-ds-maintainers] [libapache2-mod-nss] 63/156: 196070

Timo Aaltonen tjaalton-guest at moszumanska.debian.org
Wed Jul 2 13:55:29 UTC 2014


This is an automated email from the git hooks/post-receive script.

tjaalton-guest pushed a commit to branch master
in repository libapache2-mod-nss.

commit 77378f6c823c49d01f7a46667a1dc8c8458f9d97
Author: rcritten <>
Date:   Tue Jun 20 20:25:20 2006 +0000

    196070
    
    Fix compilation warnings
---
 mod_nss.c            |  4 ++--
 mod_nss.h            |  1 +
 nss_engine_config.c  |  4 +++-
 nss_engine_init.c    |  7 +++----
 nss_engine_pphrase.c | 10 +++++-----
 5 files changed, 14 insertions(+), 12 deletions(-)

diff --git a/mod_nss.c b/mod_nss.c
index 531fbe4..b7b9e24 100644
--- a/mod_nss.c
+++ b/mod_nss.c
@@ -224,7 +224,7 @@ SECStatus NSSBadCertHandler(void *arg, PRFileDesc * socket)
                 if (rv != SECSuccess) {
                     char *remote = CERT_GetCommonName(&peerCert->subject);
                     ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL,
-                        "SSL Proxy: Possible man-in-the-middle attack. The remove server is %s, we expected %s", remote, c->remote_host, rv);
+                        "SSL Proxy: Possible man-in-the-middle attack. The remove server is %s, we expected %s", remote, c->remote_host);
                     PORT_Free(remote);
                 }
             } else {
@@ -234,7 +234,7 @@ SECStatus NSSBadCertHandler(void *arg, PRFileDesc * socket)
             break;
         default:
             ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL,
-                "Bad remote server certificate.", err);
+                "Bad remote server certificate: %d", err);
             nss_log_nss_error(APLOG_MARK, APLOG_ERR, NULL);
             break;
     }
diff --git a/mod_nss.h b/mod_nss.h
index d484ea2..c777c4d 100644
--- a/mod_nss.h
+++ b/mod_nss.h
@@ -439,6 +439,7 @@ apr_file_t  *nss_util_ppopen(server_rec *, apr_pool_t *, const char *,
 void         nss_util_ppclose(server_rec *, apr_pool_t *, apr_file_t *);
 char        *nss_util_readfilter(server_rec *, apr_pool_t *, const char *,
                                  const char * const *);
+int nss_rand_seed(server_rec *s, apr_pool_t *p, ssl_rsctx_t nCtx, char *prefix);
 
 /* Pass Phrase Handling */
 SECStatus nss_Init_Tokens(server_rec *s);
diff --git a/nss_engine_config.c b/nss_engine_config.c
index 1865054..597bb62 100644
--- a/nss_engine_config.c
+++ b/nss_engine_config.c
@@ -383,7 +383,7 @@ const char *nss_cmd_NSSVerifyClient(cmd_parms *cmd,
 {
     SSLDirConfigRec *dc = (SSLDirConfigRec *)dcfg;
     SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
-    nss_verify_t mode;
+    nss_verify_t mode = SSL_CVERIFY_UNSET;
     const char *err;
 
     if ((err = nss_cmd_verify_parse(cmd, arg, &mode))) {
@@ -451,6 +451,8 @@ const char *nss_cmd_NSSProxyProtocol(cmd_parms *cmd,
     SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
 
     sc->proxy->auth.protocols = arg;
+
+    return NULL;
 }
 
 const char *nss_cmd_NSSProxyCipherSuite(cmd_parms *cmd,
diff --git a/nss_engine_init.c b/nss_engine_init.c
index a49f53b..60cc250 100644
--- a/nss_engine_init.c
+++ b/nss_engine_init.c
@@ -19,6 +19,8 @@
 #include "secmod.h"
 #include "sslerr.h"
 #include "pk11func.h"
+#include "ocsp.h"
+#include "keyhi.h"
 
 static SECStatus ownBadCertHandler(void *arg, PRFileDesc * socket);
 static SECStatus ownHandshakeCallback(PRFileDesc * socket, void *arg);
@@ -902,11 +904,8 @@ static void nss_init_server_certs(server_rec *s,
                                   apr_pool_t *ptemp,
                                   modnss_ctx_t *mctx)
 {
-    SECCertTimeValidity certtimestatus;
     SECStatus secstatus;
 
-    PK11SlotInfo* slot = NULL;
-
     /*
      * Get own certificate and private key.
      */
@@ -1066,7 +1065,7 @@ SECStatus ownBadCertHandler(void *arg, PRFileDesc * socket)
     switch (err) {
         default:
             ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL,
-                "Bad remote server certificate.", err);
+                "Bad remote server certificate: %d", err);
             nss_log_nss_error(APLOG_MARK, APLOG_ERR, NULL);
             return SECFailure;
             break;
diff --git a/nss_engine_pphrase.c b/nss_engine_pphrase.c
index da6bffb..c835d03 100644
--- a/nss_engine_pphrase.c
+++ b/nss_engine_pphrase.c
@@ -24,7 +24,7 @@ typedef struct {
 
 static char * nss_password_prompt(PK11SlotInfo *slot, PRBool retry, void *arg);
 static char * nss_no_password(PK11SlotInfo *slot, PRBool retry, void *arg);
-static unsigned char * nss_get_password(FILE *input, FILE *output, PK11SlotInfo *slot, PRBool (*ok)(unsigned char *), pphrase_arg_t * parg);
+static char * nss_get_password(FILE *input, FILE *output, PK11SlotInfo *slot, PRBool (*ok)(unsigned char *), pphrase_arg_t * parg);
 static PRBool nss_check_password(unsigned char *cp);
 static void echoOff(int fd);
 static void echoOn(int fd);
@@ -139,8 +139,8 @@ static char * nss_password_prompt(PK11SlotInfo *slot, PRBool retry, void *arg)
         memset(buf, 0, sizeof(buf));
         rv = apr_file_read(parg->mc->proc.out, buf, &nBytes);
 
-        if (rv = APR_SUCCESS)
-           res = atoi(buf);
+        if (rv == APR_SUCCESS)
+            res = atoi(buf);
         if (rv != APR_SUCCESS ||
            (res != PIN_SUCCESS && res != PIN_INCORRECTPW)) {
             ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL,
@@ -192,7 +192,7 @@ static char * nss_no_password(PK11SlotInfo *slot, PRBool retry, void *arg)
  * twiddling with the tty. Alternatively, if the file password.conf
  * exists then it may be used to store the token password(s).
  */
-static unsigned char *nss_get_password(FILE *input, FILE *output,
+static char *nss_get_password(FILE *input, FILE *output,
                                        PK11SlotInfo *slot,
                                        PRBool (*ok)(unsigned char *),
                                        pphrase_arg_t *parg)
@@ -298,7 +298,7 @@ static unsigned char *nss_get_password(FILE *input, FILE *output,
             fprintf(output, "non-alphabetic characters\n");
             continue; 
         }
-        return (unsigned char*) PORT_Strdup((char*)phrase);
+        return (char*) PORT_Strdup((char*)phrase);
     }
 }
 

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-fedora-ds/libapache2-mod-nss.git



More information about the Pkg-fedora-ds-maintainers mailing list