void ssl_asn1_table_unset(apr_hash_t *table,
const char *key);
+const char *ssl_asn1_table_keyfmt(apr_pool_t *p,
+ const char *id,
+ int keytype);
/* Mutex Support */
int ssl_mutex_init(server_rec *, apr_pool_t *);
int ssl_mutex_reinit(server_rec *, apr_pool_t *);
apr_hash_set(table, key, klen, NULL);
}
+static const char *ssl_asn1_key_types[] = {"RSA", "DSA"};
+
+const char *ssl_asn1_table_keyfmt(apr_pool_t *p,
+ const char *id,
+ int keytype)
+{
+ if (keytype >= SSL_AIDX_MAX) {
+ return NULL;
+ }
+
+ return apr_pstrcat(p, id, ":",
+ ssl_asn1_key_types[keytype], NULL);
+}
+
#if APR_HAS_THREADS
/*
* To ensure thread-safetyness in OpenSSL - work in progress