diff options
author | Edward Rudd | 2004-03-04 05:43:20 +0000 |
---|---|---|
committer | Edward Rudd | 2004-03-04 05:43:20 +0000 |
commit | a3d0fadb9bbc2a70cac6d46b768822b1875a1811 (patch) | |
tree | ae2bacfddb668305470829347009c35f243f8871 /mod_log_sql_ssl.c | |
parent | ec60974ca79594150b33692683b2d8bb800a896f (diff) |
removed all #ifdef DEBUG
Diffstat (limited to 'mod_log_sql_ssl.c')
-rw-r--r-- | mod_log_sql_ssl.c | 14 |
1 files changed, 4 insertions, 10 deletions
diff --git a/mod_log_sql_ssl.c b/mod_log_sql_ssl.c index 2bdb37b..fd68a7d 100644 --- a/mod_log_sql_ssl.c +++ b/mod_log_sql_ssl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $Id: mod_log_sql_ssl.c,v 1.5 2004/02/29 23:36:18 urkle Exp $ */ | 1 | /* $Id: mod_log_sql_ssl.c,v 1.6 2004/03/04 05:43:20 urkle Exp $ */ |
2 | /* mod_log_sql_ssl */ | 2 | /* mod_log_sql_ssl */ |
3 | 3 | ||
4 | #if defined(WITH_APACHE20) | 4 | #if defined(WITH_APACHE20) |
@@ -37,9 +37,7 @@ static const char *extract_ssl_keysize(request_rec *r, char *a) | |||
37 | if (TEST_SSL(r) != NULL) | 37 | if (TEST_SSL(r) != NULL) |
38 | { | 38 | { |
39 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER_USEKEYSIZE"); | 39 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER_USEKEYSIZE"); |
40 | #ifdef DEBUG | 40 | log_error(APLOG_MARK,APLOG_DEBUG,0,r->server,"SSL_KEYSIZE: %s", result); |
41 | log_error(APLOG_MARK,APLOG_DEBUG,0,r->server,"SSL_KEYSIZE: %s", result); | ||
42 | #endif | ||
43 | if (result != NULL && result[0] == '\0') | 41 | if (result != NULL && result[0] == '\0') |
44 | result = NULL; | 42 | result = NULL; |
45 | return result; | 43 | return result; |
@@ -54,9 +52,7 @@ static const char *extract_ssl_maxkeysize(request_rec *r, char *a) | |||
54 | if (TEST_SSL(r) != NULL) | 52 | if (TEST_SSL(r) != NULL) |
55 | { | 53 | { |
56 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER_ALGKEYSIZE"); | 54 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER_ALGKEYSIZE"); |
57 | #ifdef DEBUG | 55 | log_error(APLOG_MARK,APLOG_DEBUG,0,r->server,"SSL_ALGKEYSIZE: %s", result); |
58 | log_error(APLOG_MARK,APLOG_DEBUG,0,r->server,"SSL_ALGKEYSIZE: %s", result); | ||
59 | #endif | ||
60 | if (result != NULL && result[0] == '\0') | 56 | if (result != NULL && result[0] == '\0') |
61 | result = NULL; | 57 | result = NULL; |
62 | return result; | 58 | return result; |
@@ -71,9 +67,7 @@ static const char *extract_ssl_cipher(request_rec *r, char *a) | |||
71 | if (TEST_SSL(r) != NULL) | 67 | if (TEST_SSL(r) != NULL) |
72 | { | 68 | { |
73 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER"); | 69 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER"); |
74 | #ifdef DEBUG | 70 | log_error(APLOG_MARK,APLOG_DEBUG,0,r->server,"SSL_CIPHER: %s", result); |
75 | log_error(APLOG_MARK,APLOG_DEBUG,0,r->server,"SSL_CIPHER: %s", result); | ||
76 | #endif | ||
77 | if (result != NULL && result[0] == '\0') | 71 | if (result != NULL && result[0] == '\0') |
78 | result = NULL; | 72 | result = NULL; |
79 | return result; | 73 | return result; |