@@ -899,19 +899,19 @@ apr_byte_t oidc_validate_redirect_url(request_rec *r, oidc_cfg_t *c, const char
899899 }
900900 }
901901
902- if ((uri .hostname == NULL ) && (oidc_util_strcasestr (url , "/" ) != url )) {
902+ if ((uri .hostname == NULL ) && (_oidc_strstr (url , "/" ) != url )) {
903903 * err_str = apr_pstrdup (r -> pool , "Malformed URL" );
904904 * err_desc = apr_psprintf (
905905 r -> pool , "No hostname was parsed and it does not seem to be relative, i.e starting with '/': %s" ,
906906 url );
907907 oidc_error (r , "%s: %s" , * err_str , * err_desc );
908908 return FALSE;
909- } else if ((uri .hostname == NULL ) && (oidc_util_strcasestr (url , "//" ) == url )) {
909+ } else if ((uri .hostname == NULL ) && (_oidc_strstr (url , "//" ) == url )) {
910910 * err_str = apr_pstrdup (r -> pool , "Malformed URL" );
911911 * err_desc = apr_psprintf (r -> pool , "No hostname was parsed and starting with '//': %s" , url );
912912 oidc_error (r , "%s: %s" , * err_str , * err_desc );
913913 return FALSE;
914- } else if ((uri .hostname == NULL ) && (oidc_util_strcasestr (url , "/\\" ) == url )) {
914+ } else if ((uri .hostname == NULL ) && (_oidc_strstr (url , "/\\" ) == url )) {
915915 * err_str = apr_pstrdup (r -> pool , "Malformed URL" );
916916 * err_desc = apr_psprintf (r -> pool , "No hostname was parsed and starting with '/\\': %s" , url );
917917 oidc_error (r , "%s: %s" , * err_str , * err_desc );
@@ -1429,7 +1429,7 @@ static int oidc_check_config_openid_openidc(server_rec *s, oidc_cfg_t *c) {
14291429 } else {
14301430 apr_uri_parse (s -> process -> pconf , oidc_cfg_provider_metadata_url_get (oidc_cfg_provider_get (c )),
14311431 & r_uri );
1432- if ((r_uri .scheme == NULL ) || (_oidc_strcmp (r_uri .scheme , "https" ) != 0 )) {
1432+ if ((r_uri .scheme == NULL ) || (_oidc_strnatcasecmp (r_uri .scheme , "https" ) != 0 )) {
14331433 oidc_swarn (s ,
14341434 "the URL scheme (%s) of the configured " OIDCProviderMetadataURL
14351435 " SHOULD be \"https\" for security reasons!" ,
@@ -1448,7 +1448,7 @@ static int oidc_check_config_openid_openidc(server_rec *s, oidc_cfg_t *c) {
14481448
14491449 apr_uri_parse (s -> process -> pconf , oidc_cfg_redirect_uri_get (c ), & r_uri );
14501450 if (!redirect_uri_is_relative ) {
1451- if (_oidc_strcmp (r_uri .scheme , "https" ) != 0 ) {
1451+ if (_oidc_strnatcasecmp (r_uri .scheme , "https" ) != 0 ) {
14521452 oidc_swarn (s ,
14531453 "the URL scheme (%s) of the configured " OIDCRedirectURI
14541454 " SHOULD be \"https\" for security reasons (moreover: some Providers may reject "
@@ -1494,7 +1494,7 @@ static int oidc_check_config_oauth(server_rec *s, oidc_cfg_t *c) {
14941494
14951495 if (oidc_cfg_oauth_metadata_url_get (c ) != NULL ) {
14961496 apr_uri_parse (s -> process -> pconf , oidc_cfg_oauth_metadata_url_get (c ), & r_uri );
1497- if ((r_uri .scheme == NULL ) || (_oidc_strcmp (r_uri .scheme , "https" ) != 0 )) {
1497+ if ((r_uri .scheme == NULL ) || (_oidc_strnatcasecmp (r_uri .scheme , "https" ) != 0 )) {
14981498 oidc_swarn (s ,
14991499 "the URL scheme (%s) of the configured " OIDCOAuthServerMetadataURL
15001500 " SHOULD be \"https\" for security reasons!" ,
0 commit comments