You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by Brian Behlendorf <br...@hyperreal.com> on 1996/10/31 01:09:39 UTC

cvs commit: apache/src mod_digest.c

brian       96/10/30 16:09:38

  Modified:    src       mod_digest.c
  Log:
  Cleaned up -wall messages related to constification.
  
  Revision  Changes    Path
  1.9       +7 -5      apache/src/mod_digest.c
  
  Index: mod_digest.c
  ===================================================================
  RCS file: /export/home/cvs/apache/src/mod_digest.c,v
  retrieving revision 1.8
  retrieving revision 1.9
  diff -C3 -r1.8 -r1.9
  *** mod_digest.c	1996/10/08 22:19:24	1.8
  --- mod_digest.c	1996/10/31 00:09:37	1.9
  ***************
  *** 50,56 ****
     *
     */
    
  ! /* $Id: mod_digest.c,v 1.8 1996/10/08 22:19:24 brian Exp $ */
    
    /*
     * mod_digest: MD5 digest authentication
  --- 50,56 ----
     *
     */
    
  ! /* $Id: mod_digest.c,v 1.9 1996/10/31 00:09:37 brian Exp $ */
    
    /*
     * mod_digest: MD5 digest authentication
  ***************
  *** 84,90 ****
        return pcalloc (p, sizeof(digest_config_rec));
    }
    
  ! char *set_digest_slot (cmd_parms *cmd, void *offset, char *f, char *t)
    {
        if (t && strcmp(t, "standard"))
    	return pstrcat(cmd->pool, "Invalid auth file type: ",  t, NULL);
  --- 84,90 ----
        return pcalloc (p, sizeof(digest_config_rec));
    }
    
  ! const char *set_digest_slot (cmd_parms *cmd, void *offset, char *f, char *t)
    {
        if (t && strcmp(t, "standard"))
    	return pstrcat(cmd->pool, "Invalid auth file type: ",  t, NULL);
  ***************
  *** 104,110 ****
    {
        FILE *f;
        char l[MAX_STRING_LEN];
  !     char *rpw, *w, *x;
    
        if(!(f=pfopen(r->pool, auth_pwfile, "r"))) {
            log_reason ("Could not open password file", auth_pwfile, r);
  --- 104,111 ----
    {
        FILE *f;
        char l[MAX_STRING_LEN];
  !     const char *rpw;
  !     char *w, *x;
    
        if(!(f=pfopen(r->pool, auth_pwfile, "r"))) {
            log_reason ("Could not open password file", auth_pwfile, r);
  ***************
  *** 128,134 ****
    /* Parse the Authorization header, if it exists */
    
    int get_digest_rec(request_rec *r, digest_header_rec *response) {
  !   char *auth_line = table_get(r->headers_in, "Authorization");
      int l;
      int s = 0, vk = 0, vv = 0;
      char *t, *key, *value;
  --- 129,135 ----
    /* Parse the Authorization header, if it exists */
    
    int get_digest_rec(request_rec *r, digest_header_rec *response) {
  !   const char *auth_line = table_get(r->headers_in, "Authorization");
      int l;
      int s = 0, vk = 0, vv = 0;
      char *t, *key, *value;
  ***************
  *** 300,306 ****
        int m = r->method_number;
        int method_restricted = 0;    
        register int x;
  !     char *t, *w;
        array_header *reqs_arr;
        require_line *reqs;
    
  --- 301,308 ----
        int m = r->method_number;
        int method_restricted = 0;    
        register int x;
  !     const char *t;
  !     char *w;
        array_header *reqs_arr;
        require_line *reqs;