[Pkg-fedora-ds-maintainers] [libapache2-mod-nss] 63/156: 196070
Timo Aaltonen
tjaalton-guest at moszumanska.debian.org
Wed Jul 2 13:55:29 UTC 2014
This is an automated email from the git hooks/post-receive script.
tjaalton-guest pushed a commit to branch master
in repository libapache2-mod-nss.
commit 77378f6c823c49d01f7a46667a1dc8c8458f9d97
Author: rcritten <>
Date: Tue Jun 20 20:25:20 2006 +0000
196070
Fix compilation warnings
---
mod_nss.c | 4 ++--
mod_nss.h | 1 +
nss_engine_config.c | 4 +++-
nss_engine_init.c | 7 +++----
nss_engine_pphrase.c | 10 +++++-----
5 files changed, 14 insertions(+), 12 deletions(-)
diff --git a/mod_nss.c b/mod_nss.c
index 531fbe4..b7b9e24 100644
--- a/mod_nss.c
+++ b/mod_nss.c
@@ -224,7 +224,7 @@ SECStatus NSSBadCertHandler(void *arg, PRFileDesc * socket)
if (rv != SECSuccess) {
char *remote = CERT_GetCommonName(&peerCert->subject);
ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL,
- "SSL Proxy: Possible man-in-the-middle attack. The remove server is %s, we expected %s", remote, c->remote_host, rv);
+ "SSL Proxy: Possible man-in-the-middle attack. The remove server is %s, we expected %s", remote, c->remote_host);
PORT_Free(remote);
}
} else {
@@ -234,7 +234,7 @@ SECStatus NSSBadCertHandler(void *arg, PRFileDesc * socket)
break;
default:
ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL,
- "Bad remote server certificate.", err);
+ "Bad remote server certificate: %d", err);
nss_log_nss_error(APLOG_MARK, APLOG_ERR, NULL);
break;
}
diff --git a/mod_nss.h b/mod_nss.h
index d484ea2..c777c4d 100644
--- a/mod_nss.h
+++ b/mod_nss.h
@@ -439,6 +439,7 @@ apr_file_t *nss_util_ppopen(server_rec *, apr_pool_t *, const char *,
void nss_util_ppclose(server_rec *, apr_pool_t *, apr_file_t *);
char *nss_util_readfilter(server_rec *, apr_pool_t *, const char *,
const char * const *);
+int nss_rand_seed(server_rec *s, apr_pool_t *p, ssl_rsctx_t nCtx, char *prefix);
/* Pass Phrase Handling */
SECStatus nss_Init_Tokens(server_rec *s);
diff --git a/nss_engine_config.c b/nss_engine_config.c
index 1865054..597bb62 100644
--- a/nss_engine_config.c
+++ b/nss_engine_config.c
@@ -383,7 +383,7 @@ const char *nss_cmd_NSSVerifyClient(cmd_parms *cmd,
{
SSLDirConfigRec *dc = (SSLDirConfigRec *)dcfg;
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
- nss_verify_t mode;
+ nss_verify_t mode = SSL_CVERIFY_UNSET;
const char *err;
if ((err = nss_cmd_verify_parse(cmd, arg, &mode))) {
@@ -451,6 +451,8 @@ const char *nss_cmd_NSSProxyProtocol(cmd_parms *cmd,
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
sc->proxy->auth.protocols = arg;
+
+ return NULL;
}
const char *nss_cmd_NSSProxyCipherSuite(cmd_parms *cmd,
diff --git a/nss_engine_init.c b/nss_engine_init.c
index a49f53b..60cc250 100644
--- a/nss_engine_init.c
+++ b/nss_engine_init.c
@@ -19,6 +19,8 @@
#include "secmod.h"
#include "sslerr.h"
#include "pk11func.h"
+#include "ocsp.h"
+#include "keyhi.h"
static SECStatus ownBadCertHandler(void *arg, PRFileDesc * socket);
static SECStatus ownHandshakeCallback(PRFileDesc * socket, void *arg);
@@ -902,11 +904,8 @@ static void nss_init_server_certs(server_rec *s,
apr_pool_t *ptemp,
modnss_ctx_t *mctx)
{
- SECCertTimeValidity certtimestatus;
SECStatus secstatus;
- PK11SlotInfo* slot = NULL;
-
/*
* Get own certificate and private key.
*/
@@ -1066,7 +1065,7 @@ SECStatus ownBadCertHandler(void *arg, PRFileDesc * socket)
switch (err) {
default:
ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL,
- "Bad remote server certificate.", err);
+ "Bad remote server certificate: %d", err);
nss_log_nss_error(APLOG_MARK, APLOG_ERR, NULL);
return SECFailure;
break;
diff --git a/nss_engine_pphrase.c b/nss_engine_pphrase.c
index da6bffb..c835d03 100644
--- a/nss_engine_pphrase.c
+++ b/nss_engine_pphrase.c
@@ -24,7 +24,7 @@ typedef struct {
static char * nss_password_prompt(PK11SlotInfo *slot, PRBool retry, void *arg);
static char * nss_no_password(PK11SlotInfo *slot, PRBool retry, void *arg);
-static unsigned char * nss_get_password(FILE *input, FILE *output, PK11SlotInfo *slot, PRBool (*ok)(unsigned char *), pphrase_arg_t * parg);
+static char * nss_get_password(FILE *input, FILE *output, PK11SlotInfo *slot, PRBool (*ok)(unsigned char *), pphrase_arg_t * parg);
static PRBool nss_check_password(unsigned char *cp);
static void echoOff(int fd);
static void echoOn(int fd);
@@ -139,8 +139,8 @@ static char * nss_password_prompt(PK11SlotInfo *slot, PRBool retry, void *arg)
memset(buf, 0, sizeof(buf));
rv = apr_file_read(parg->mc->proc.out, buf, &nBytes);
- if (rv = APR_SUCCESS)
- res = atoi(buf);
+ if (rv == APR_SUCCESS)
+ res = atoi(buf);
if (rv != APR_SUCCESS ||
(res != PIN_SUCCESS && res != PIN_INCORRECTPW)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL,
@@ -192,7 +192,7 @@ static char * nss_no_password(PK11SlotInfo *slot, PRBool retry, void *arg)
* twiddling with the tty. Alternatively, if the file password.conf
* exists then it may be used to store the token password(s).
*/
-static unsigned char *nss_get_password(FILE *input, FILE *output,
+static char *nss_get_password(FILE *input, FILE *output,
PK11SlotInfo *slot,
PRBool (*ok)(unsigned char *),
pphrase_arg_t *parg)
@@ -298,7 +298,7 @@ static unsigned char *nss_get_password(FILE *input, FILE *output,
fprintf(output, "non-alphabetic characters\n");
continue;
}
- return (unsigned char*) PORT_Strdup((char*)phrase);
+ return (char*) PORT_Strdup((char*)phrase);
}
}
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-fedora-ds/libapache2-mod-nss.git
More information about the Pkg-fedora-ds-maintainers
mailing list