diff options
author | rcritten <> | 2006-06-20 20:25:20 +0000 |
---|---|---|
committer | rcritten <> | 2006-06-20 20:25:20 +0000 |
commit | 77378f6c823c49d01f7a46667a1dc8c8458f9d97 (patch) | |
tree | 7d09e6d6da7b0f8da79a2734ff8526601f46aa26 /mod_nss.c | |
parent | 7eed0dc4bb3c6c1308d164da88aef0c7246b142d (diff) | |
download | mod_nss-77378f6c823c49d01f7a46667a1dc8c8458f9d97.tar.gz mod_nss-77378f6c823c49d01f7a46667a1dc8c8458f9d97.tar.xz mod_nss-77378f6c823c49d01f7a46667a1dc8c8458f9d97.zip |
196070
Fix compilation warnings
Diffstat (limited to 'mod_nss.c')
-rw-r--r-- | mod_nss.c | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -224,7 +224,7 @@ SECStatus NSSBadCertHandler(void *arg, PRFileDesc * socket) if (rv != SECSuccess) { char *remote = CERT_GetCommonName(&peerCert->subject); ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL, - "SSL Proxy: Possible man-in-the-middle attack. The remove server is %s, we expected %s", remote, c->remote_host, rv); + "SSL Proxy: Possible man-in-the-middle attack. The remove server is %s, we expected %s", remote, c->remote_host); PORT_Free(remote); } } else { @@ -234,7 +234,7 @@ SECStatus NSSBadCertHandler(void *arg, PRFileDesc * socket) break; default: ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL, - "Bad remote server certificate.", err); + "Bad remote server certificate: %d", err); nss_log_nss_error(APLOG_MARK, APLOG_ERR, NULL); break; } |