summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDaniel Atallah <datallah@pidgin.im>2014-11-05 00:07:54 -0500
committerDaniel Atallah <datallah@pidgin.im>2014-11-05 00:07:54 -0500
commit81b8a037092881cdf83c07276177280fd38fb84e (patch)
tree8fbe86cd52698c483468f8b8d4fa71e668f83291
parent2d5d235232f7b4f28cb2f95823ca4ca7b9ad408f (diff)
downloadpidgin-81b8a037092881cdf83c07276177280fd38fb84e.tar.gz
Fix building with NSS 3.10.8 (which is what squeeze has and is probably the oldest we need to worry about)
-rw-r--r--libpurple/plugins/ssl/ssl-nss.c14
1 files changed, 9 insertions, 5 deletions
diff --git a/libpurple/plugins/ssl/ssl-nss.c b/libpurple/plugins/ssl/ssl-nss.c
index 5749f19217..85335e8a04 100644
--- a/libpurple/plugins/ssl/ssl-nss.c
+++ b/libpurple/plugins/ssl/ssl-nss.c
@@ -150,18 +150,20 @@ static void ssl_nss_log_ciphers(void) {
rv = SSL_CipherPrefGetDefault(suite, &enabled);
if (rv != SECSuccess) {
- err = PR_GetError();
+ gchar *error_txt = get_error_text();
purple_debug_warning("nss",
"SSL_CipherPrefGetDefault didn't like value 0x%04x: %s\n",
- suite, PORT_ErrorToString(err));
+ suite, error_txt);
+ g_free(error_txt);
continue;
}
rv = SSL_GetCipherSuiteInfo(suite, &info, (int)(sizeof info));
if (rv != SECSuccess) {
- err = PR_GetError();
+ gchar *error_txt = get_error_text();
purple_debug_warning("nss",
"SSL_GetCipherSuiteInfo didn't like value 0x%04x: %s\n",
- suite, PORT_ErrorToString(err));
+ suite, error_txt);
+ g_free(error_txt);
continue;
}
purple_debug_info("nss", "Cipher - %s: %s\n",
@@ -179,7 +181,7 @@ ssl_nss_init_nss(void)
PR_Init(PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1);
NSS_NoDB_Init(".");
-#if (NSS_VMAJOR == 3 && (NSS_VMINOR < 15 || (NSS_VMINOR == 15 && NSS_VMICRO < 2)))
+#if (NSS_VMAJOR == 3 && (NSS_VMINOR < 15 || (NSS_VMINOR == 15 && NSS_VPATCH < 2)))
NSS_SetDomesticPolicy();
#endif /* NSS < 3.15.2 */
@@ -1128,7 +1130,9 @@ static void x509_verify_cert(PurpleCertificateVerificationRequest *vrq, PurpleCe
case SEC_ERROR_CA_CERT_INVALID:
case SEC_ERROR_EXPIRED_ISSUER_CERTIFICATE:
case SEC_ERROR_UNTRUSTED_CERT:
+#ifdef SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED
case SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED:
+#endif
if (!self_signed) {
*flags |= PURPLE_CERTIFICATE_INVALID_CHAIN;
}