summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--nss_engine_cipher.c1
-rw-r--r--nss_engine_init.c10
2 files changed, 5 insertions, 6 deletions
diff --git a/nss_engine_cipher.c b/nss_engine_cipher.c
index 258150a..5ea1f53 100644
--- a/nss_engine_cipher.c
+++ b/nss_engine_cipher.c
@@ -233,7 +233,6 @@ static int parse_openssl_ciphers(server_rec *s, char *ciphers, PRBool cipher_lis
* So we need to disable all the NULL ciphers too.
*/
int mask = SSL_aNULL | SSL_eNULL;
- PRBool enabled;
found = PR_TRUE;
for (i=0; i < ciphernum; i++) {
if (cipher_list[i] != -1)
diff --git a/nss_engine_init.c b/nss_engine_init.c
index 5ed277a..75a0b8b 100644
--- a/nss_engine_init.c
+++ b/nss_engine_init.c
@@ -16,6 +16,7 @@
#include "mod_nss.h"
#include "nss_engine_cipher.h"
#include "apr_thread_proc.h"
+#include "apr_strings.h"
#include "mpm_common.h"
#if AP_SERVER_MINORVERSION_NUMBER <= 2
#include "ap_mpm.h"
@@ -184,8 +185,8 @@ static void nss_init_SSLLibrary(server_rec *base_server, apr_pool_t *p)
nss_log_nss_error(APLOG_MARK, APLOG_ERR, base_server);
apr_snprintf(keypath, 1024, "%s/key3.db", mc->pCertificateDatabase);
- if (rv = apr_stat(&finfo, keypath, APR_FINFO_PROT | APR_FINFO_OWNER, p)
- == APR_SUCCESS) {
+ if ((rv = apr_stat(&finfo, keypath, APR_FINFO_PROT | APR_FINFO_OWNER,
+ p)) == APR_SUCCESS) {
if (((user_id == finfo.user) &&
(!(finfo.protection & APR_FPROT_UREAD))) ||
((gid == finfo.group) &&
@@ -373,7 +374,7 @@ int nss_init_Module(apr_pool_t *p, apr_pool_t *plog,
sc->vhost_id_len = strlen(sc->vhost_id);
if (sc->sni && sc->server->nickname != NULL && sc->vhost_id != NULL) {
- split_vhost_id = apr_strtok(sc->vhost_id, ":", &last1);
+ split_vhost_id = apr_strtok((char *)sc->vhost_id, ":", &last1);
ap_str_tolower(split_vhost_id);
addHashVhostNick(split_vhost_id, (char *)sc->server->nickname);
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s,
@@ -1091,7 +1092,6 @@ static void nss_init_certificate(server_rec *s, const char *nickname,
int sni,
const CERTCertList* clist)
{
- SSLModConfigRec *mc = myModConfig(s);
SECCertTimeValidity certtimestatus;
SECStatus secstatus;
@@ -1188,7 +1188,7 @@ static void nss_init_certificate(server_rec *s, const char *nickname,
ap_str_tolower(wild_name[j]);
addHashVhostNick(wild_name[j], (char *)nickname);
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s,
- "SNI wildcard: %s -> %s", wild_name[i], nickname);
+ "SNI wildcard: %s -> %s", wild_name[j], nickname);
}
}