return(4);
}
BIO_set_close(newssl->rbio, BIO_NOCLOSE);
- bits =
- SSL_CIPHER_get_bits(SSL_get_current_cipher(newssl),
- &alg_bits);
+ bits = SSL_CIPHER_get_bits(SSL_get_current_cipher(newssl), &alg_bits);
lprintf(5, "SSL/TLS using %s on %s (%d of %d bits)\n",
SSL_CIPHER_get_name(SSL_get_current_cipher(newssl)),
SSL_CIPHER_get_version(SSL_get_current_cipher(newssl)),
*/
void serv_puts(char *string)
{
- char buf[SIZ];
-
#ifdef SERV_TRACE
lprintf(9, "%3d<%s\n", WC->serv_sock, string);
#endif
- sprintf(buf, "%s\n", string);
- serv_write(buf, strlen(buf));
+ serv_write(string, strlen(string));
+ serv_write("\n", 1);
}
}
/* If the client sent a nonce that is incorrect, kill the request. */
- if (!strcasecmp(request_method, "POST")) {
+ if (strlen(bstr("nonce")) > 0) {
lprintf(9, "Comparing supplied nonce %s to session nonce %ld\n",
bstr("nonce"), WC->nonce);
if (atoi(bstr("nonce")) != WC->nonce) {