mirror of
https://github.com/apache/httpd.git
synced 2025-08-08 15:02:10 +03:00
Layout and compiler warning.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@424735 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
@@ -186,7 +186,7 @@ void ssl_pphrase_Handle(server_rec *s, apr_pool_t *p)
|
||||
* because this file isn't encrypted in any way.
|
||||
*/
|
||||
if (sc->server->pks->cert_files[0] == NULL
|
||||
&& sc->server->pkcs7 == NULL) {
|
||||
&& sc->server->pkcs7 == NULL) {
|
||||
ap_log_error(APLOG_MARK, APLOG_ERR, 0, pServ,
|
||||
"Server should be SSL-aware but has no certificate "
|
||||
"configured [Hint: SSLCertificateFile]");
|
||||
@@ -196,28 +196,31 @@ void ssl_pphrase_Handle(server_rec *s, apr_pool_t *p)
|
||||
algoCert = SSL_ALGO_UNKNOWN;
|
||||
algoKey = SSL_ALGO_UNKNOWN;
|
||||
for (i = 0, j = 0; i < SSL_AIDX_MAX
|
||||
&& (sc->server->pks->cert_files[i] != NULL
|
||||
|| sc->server->pkcs7); i++) {
|
||||
if (sc->server->pkcs7) {
|
||||
STACK_OF(X509) *certs = ssl_read_pkcs7(pServ, sc->server->pkcs7);
|
||||
|
||||
pX509Cert = sk_X509_value(certs, 0);
|
||||
i = SSL_AIDX_MAX;
|
||||
} else {
|
||||
apr_cpystrn(szPath, sc->server->pks->cert_files[i], sizeof(szPath));
|
||||
if ((rv = exists_and_readable(szPath, p, NULL)) != APR_SUCCESS) {
|
||||
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
|
||||
"Init: Can't open server certificate file %s",
|
||||
szPath);
|
||||
ssl_die();
|
||||
}
|
||||
if ((pX509Cert = SSL_read_X509(szPath, NULL, NULL)) == NULL) {
|
||||
ap_log_error(APLOG_MARK, APLOG_ERR, 0, s,
|
||||
"Init: Unable to read server certificate from file %s", szPath);
|
||||
ssl_log_ssl_error(APLOG_MARK, APLOG_ERR, s);
|
||||
ssl_die();
|
||||
}
|
||||
}
|
||||
&& (sc->server->pks->cert_files[i] != NULL
|
||||
|| sc->server->pkcs7); i++) {
|
||||
if (sc->server->pkcs7) {
|
||||
STACK_OF(X509) *certs = ssl_read_pkcs7(pServ,
|
||||
sc->server->pkcs7);
|
||||
pX509Cert = sk_X509_value(certs, 0);
|
||||
i = SSL_AIDX_MAX;
|
||||
} else {
|
||||
apr_cpystrn(szPath, sc->server->pks->cert_files[i],
|
||||
sizeof(szPath));
|
||||
if ((rv = exists_and_readable(szPath, p, NULL))
|
||||
!= APR_SUCCESS) {
|
||||
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
|
||||
"Init: Can't open server certificate file %s",
|
||||
szPath);
|
||||
ssl_die();
|
||||
}
|
||||
if ((pX509Cert = SSL_read_X509(szPath, NULL, NULL)) == NULL) {
|
||||
ap_log_error(APLOG_MARK, APLOG_ERR, 0, s,
|
||||
"Init: Unable to read server certificate from"
|
||||
" file %s", szPath);
|
||||
ssl_log_ssl_error(APLOG_MARK, APLOG_ERR, s);
|
||||
ssl_die();
|
||||
}
|
||||
}
|
||||
/*
|
||||
* check algorithm type of certificate and make
|
||||
* sure only one certificate per type is used.
|
||||
|
Reference in New Issue
Block a user