* Define IDs for the temporary RSA keys and DH params
*/
-#define SSL_TKPIDX_RSA512 (0)
-#define SSL_TKPIDX_RSA1024 (1)
-#define SSL_TKPIDX_DH512 (2)
-#define SSL_TKPIDX_DH1024 (3)
-#define SSL_TKPIDX_MAX (4)
+#define SSL_TMP_KEY_RSA_512 (0)
+#define SSL_TMP_KEY_RSA_1024 (1)
+#define SSL_TMP_KEY_DH_512 (2)
+#define SSL_TMP_KEY_DH_1024 (3)
+#define SSL_TMP_KEY_MAX (4)
/*
* Define the SSL options
apr_lock_t *pMutex;
apr_array_header_t *aRandSeed;
apr_hash_t *tVHostKeys;
- void *pTmpKeys[SSL_TKPIDX_MAX];
+ void *pTmpKeys[SSL_TMP_KEY_MAX];
apr_hash_t *tPublicCert;
apr_hash_t *tPrivateKey;
#ifdef SSL_EXPERIMENTAL_ENGINE
}
#define MODSSL_TMP_KEYS_FREE(mc, type) \
- MODSSL_TMP_KEY_FREE(mc, type, SSL_TKPIDX_##type##512); \
- MODSSL_TMP_KEY_FREE(mc, type, SSL_TKPIDX_##type##1024)
+ MODSSL_TMP_KEY_FREE(mc, type, SSL_TMP_KEY_##type##_512); \
+ MODSSL_TMP_KEY_FREE(mc, type, SSL_TMP_KEY_##type##_1024)
static void ssl_tmp_keys_free(server_rec *s)
{
"Init: Generating temporary RSA private keys (512/1024 bits)");
/* generate 512 bit RSA key */
- if (!(mc->pTmpKeys[SSL_TKPIDX_RSA512] =
+ if (!(mc->pTmpKeys[SSL_TMP_KEY_RSA_512] =
RSA_generate_key(512, RSA_F4, NULL, NULL)))
{
ssl_log(s, SSL_LOG_ERROR,
}
/* generate 1024 bit RSA key */
- if (!(mc->pTmpKeys[SSL_TKPIDX_RSA1024] =
+ if (!(mc->pTmpKeys[SSL_TMP_KEY_RSA_1024] =
RSA_generate_key(1024, RSA_F4, NULL, NULL)))
{
ssl_log(s, SSL_LOG_ERROR,
"DH parameters (512/1024 bits)");
/* generate 512 bit DH param */
- if (!(mc->pTmpKeys[SSL_TKPIDX_DH512] =
+ if (!(mc->pTmpKeys[SSL_TMP_KEY_DH_512] =
ssl_dh_GetTmpParam(512)))
{
ssl_log(s, SSL_LOG_ERROR,
}
/* generate 1024 bit DH param */
- if (!(mc->pTmpKeys[SSL_TKPIDX_DH1024] =
+ if (!(mc->pTmpKeys[SSL_TMP_KEY_DH_1024] =
ssl_dh_GetTmpParam(1024)))
{
ssl_log(s, SSL_LOG_ERROR,
if (export) {
/* It's because an export cipher is used */
if (keylen == 512) {
- rsa = (RSA *)mc->pTmpKeys[SSL_TKPIDX_RSA512];
+ rsa = (RSA *)mc->pTmpKeys[SSL_TMP_KEY_RSA_512];
}
else if (keylen == 1024) {
- rsa = (RSA *)mc->pTmpKeys[SSL_TKPIDX_RSA1024];
+ rsa = (RSA *)mc->pTmpKeys[SSL_TMP_KEY_RSA_1024];
}
else {
/* it's too expensive to generate on-the-fly, so keep 1024bit */
- rsa = (RSA *)mc->pTmpKeys[SSL_TKPIDX_RSA1024];
+ rsa = (RSA *)mc->pTmpKeys[SSL_TMP_KEY_RSA_1024];
}
}
else {
/* It's because a sign-only certificate situation exists */
- rsa = (RSA *)mc->pTmpKeys[SSL_TKPIDX_RSA1024];
+ rsa = (RSA *)mc->pTmpKeys[SSL_TMP_KEY_RSA_1024];
}
return rsa;
if (export) {
/* It's because an export cipher is used */
if (keylen == 512) {
- dh = (DH *)mc->pTmpKeys[SSL_TKPIDX_DH512];
+ dh = (DH *)mc->pTmpKeys[SSL_TMP_KEY_DH_512];
}
else if (keylen == 1024) {
- dh = (DH *)mc->pTmpKeys[SSL_TKPIDX_DH1024];
+ dh = (DH *)mc->pTmpKeys[SSL_TMP_KEY_DH_1024];
}
else {
/* it's too expensive to generate on-the-fly, so keep 1024bit */
- dh = (DH *)mc->pTmpKeys[SSL_TKPIDX_DH1024];
+ dh = (DH *)mc->pTmpKeys[SSL_TMP_KEY_DH_1024];
}
}
else {
/* It's because a sign-only certificate situation exists */
- dh = (DH *)mc->pTmpKeys[SSL_TKPIDX_DH1024];
+ dh = (DH *)mc->pTmpKeys[SSL_TMP_KEY_DH_1024];
}
return dh;