diff options
author | Michael Tänzer <neo@nhng.de> | 2011-04-05 23:29:41 +0200 |
---|---|---|
committer | Michael Tänzer <neo@nhng.de> | 2011-04-05 23:29:41 +0200 |
commit | e2cad28b9dd071297b047b726c5d197f4af7c144 (patch) | |
tree | d8670219e8a7a1d500510a5e683f588f2d626b88 /includes | |
parent | f6ba93d49740847c50158598ae10335e03ba1f0b (diff) | |
download | cacert-devel-e2cad28b9dd071297b047b726c5d197f4af7c144.tar.gz cacert-devel-e2cad28b9dd071297b047b726c5d197f4af7c144.tar.xz cacert-devel-e2cad28b9dd071297b047b726c5d197f4af7c144.zip |
#918: PHP needs a variable, can't pass NULL by reference
#918: "Weak keys in certificates"
Signed-off-by: Michael Tänzer <neo@nhng.de>
Diffstat (limited to 'includes')
-rw-r--r-- | includes/account_stuff.php | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/includes/account_stuff.php b/includes/account_stuff.php index e9d26cc..fd480b3 100644 --- a/includes/account_stuff.php +++ b/includes/account_stuff.php @@ -332,7 +332,7 @@ function hideall() { /* Check for the debian OpenSSL vulnerability */ $csr = escapeshellarg($csr); - exec("echo $csr | openssl-vulnkey -q -", NULL, $debianVuln); + exec("echo $csr | openssl-vulnkey -q -", $dummy, $debianVuln); if ($debianVuln === -1) { return sprintf(_("The keys you use have very likely been ". @@ -406,7 +406,7 @@ function hideall() { $keysize = escapeshellarg($keysize); $modulus = escapeshellarg($modulus); - exec("openssl-vulnkey -q -b $keysize -m $modulus", NULL, + exec("openssl-vulnkey -q -b $keysize -m $modulus", $dummy, $debianVuln); if ($debianVuln === -1) { |