ssl_var_register();
ssl_ext_register();
ssl_io_register();
-#if defined(SSL_VENDOR) && defined(SSL_VENDOR_OBJS)
- ssl_vendor_register();
-#endif
}
return;
}
ssl_var_unregister();
ssl_ext_unregister();
ssl_io_unregister();
-#if defined(SSL_VENDOR) && defined(SSL_VENDOR_OBJS)
- ssl_vendor_unregister();
-#endif
}
return;
}
(void)memset(mc->pTmpKeys, 0, SSL_TKPIDX_MAX*sizeof(void *));
-#ifdef SSL_VENDOR
- mc->ctx = ap_ctx_new(pPool);
- ap_hook_use("ap::mod_ssl::vendor::config_global_create",
- AP_HOOK_SIG2(void,ptr), AP_HOOK_MODE_ALL, mc);
-#endif
-
/*
* And push it into Apache's global context
*/
(void)memset(sc->pPublicCert, 0, SSL_AIDX_MAX*sizeof(X509 *));
(void)memset(sc->pPrivateKey, 0, SSL_AIDX_MAX*sizeof(EVP_PKEY *));
-#ifdef SSL_VENDOR
- sc->ctx = ap_ctx_new(p);
- ap_hook_use("ap::mod_ssl::vendor::config_server_create",
- AP_HOOK_SIG4(void,ptr,ptr,ptr), AP_HOOK_MODE_ALL,
- p, s, sc);
-#endif
-
return sc;
}
cfgMerge(pPrivateKey[i], NULL);
}
-#ifdef SSL_VENDOR
- cfgMergeCtx(ctx);
- ap_hook_use("ap::mod_ssl::vendor::config_server_merge",
- AP_HOOK_SIG5(void,ptr,ptr,ptr,ptr), AP_HOOK_MODE_ALL,
- p, base, add, new);
-#endif
-
#ifdef SSL_EXPERIMENTAL_PROXY
cfgMergeInt(nProxyVerifyDepth);
cfgMergeString(szProxyCACertificatePath);
dc->szCACertificateFile = NULL;
#endif
-#ifdef SSL_VENDOR
- dc->ctx = ap_ctx_new(p);
- ap_hook_use("ap::mod_ssl::vendor::config_perdir_create",
- AP_HOOK_SIG4(void,ptr,ptr,ptr), AP_HOOK_MODE_ALL,
- p, dir, dc);
-#endif
-
return dc;
}
cfgMergeString(szCACertificateFile);
#endif
-#ifdef SSL_VENDOR
- cfgMergeCtx(ctx);
- ap_hook_use("ap::mod_ssl::vendor::config_perdir_merge",
- AP_HOOK_SIG5(void,ptr,ptr,ptr,ptr), AP_HOOK_MODE_ALL,
- p, base, add, new);
-#endif
-
return new;
}
#ifndef WIN32
mc->nMutexMode = SSL_MUTEXMODE_FILE;
mc->szMutexFile = ap_psprintf(mc->pPool, "%s.%lu",
- ssl_util_server_root_relative(cmd->pool, "mutex", arg+5),
+ ap_server_root_relative(cmd->pool, "mutex", arg+5),
(unsigned long)getpid());
#else
return "SSLMutex: Lockfiles not available on this platform";
}
else if (strlen(arg) > 5 && strEQn(arg, "exec:", 5)) {
sc->nPassPhraseDialogType = SSL_PPTYPE_FILTER;
- sc->szPassPhraseDialogPath = ssl_util_server_root_relative(cmd->pool, "dialog", arg+5);
+ sc->szPassPhraseDialogPath = ap_server_root_relative(cmd->pool, "dialog", arg+5);
if (!ssl_util_path_check(SSL_PCM_EXISTS, sc->szPassPhraseDialogPath))
return ap_pstrcat(cmd->pool, "SSLPassPhraseDialog: file '",
sc->szPassPhraseDialogPath, "' not exists", NULL);
"invalid context: `", arg1, "'");
if (strlen(arg2) > 5 && strEQn(arg2, "file:", 5)) {
pRS->nSrc = SSL_RSSRC_FILE;
- pRS->cpPath = ap_pstrdup(mc->pPool, ssl_util_server_root_relative(cmd->pool, "random", arg2+5));
+ pRS->cpPath = ap_pstrdup(mc->pPool, ap_server_root_relative(cmd->pool, "random", arg2+5));
}
else if (strlen(arg2) > 5 && strEQn(arg2, "exec:", 5)) {
pRS->nSrc = SSL_RSSRC_EXEC;
- pRS->cpPath = ap_pstrdup(mc->pPool, ssl_util_server_root_relative(cmd->pool, "random", arg2+5));
+ pRS->cpPath = ap_pstrdup(mc->pPool, ap_server_root_relative(cmd->pool, "random", arg2+5));
}
#if SSL_LIBRARY_VERSION >= 0x00905100
else if (strlen(arg2) > 4 && strEQn(arg2, "egd:", 4)) {
pRS->nSrc = SSL_RSSRC_EGD;
- pRS->cpPath = ap_pstrdup(mc->pPool, ssl_util_server_root_relative(cmd->pool, "random", arg2+4));
+ pRS->cpPath = ap_pstrdup(mc->pPool, ap_server_root_relative(cmd->pool, "random", arg2+4));
}
#endif
else if (strcEQ(arg2, "builtin")) {
}
else {
pRS->nSrc = SSL_RSSRC_FILE;
- pRS->cpPath = ap_pstrdup(mc->pPool, ssl_util_server_root_relative(cmd->pool, "random", arg2));
+ pRS->cpPath = ap_pstrdup(mc->pPool, ap_server_root_relative(cmd->pool, "random", arg2));
}
if (pRS->nSrc != SSL_RSSRC_BUILTIN)
if (!ssl_util_path_check(SSL_PCM_EXISTS, pRS->cpPath))
char *cpPath;
int i;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISREG|SSL_PCM_ISNONZERO, cpPath))
return ap_pstrcat(cmd->pool, "SSLCertificateFile: file '",
cpPath, "' not exists or empty", NULL);
char *cpPath;
int i;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISREG|SSL_PCM_ISNONZERO, cpPath))
return ap_pstrcat(cmd->pool, "SSLCertificateKeyFile: file '",
cpPath, "' not exists or empty", NULL);
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISREG|SSL_PCM_ISNONZERO, cpPath))
return ap_pstrcat(cmd->pool, "SSLCertificateChainFile: file '",
cpPath, "' not exists or empty", NULL);
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISDIR, cpPath))
return ap_pstrcat(cmd->pool, "SSLCACertificatePath: directory '",
cpPath, "' not exists", NULL);
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISREG|SSL_PCM_ISNONZERO, cpPath))
return ap_pstrcat(cmd->pool, "SSLCACertificateFile: file '",
cpPath, "' not exists or empty", NULL);
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISDIR, cpPath))
return ap_pstrcat(cmd->pool, "SSLCARecocationPath: directory '",
cpPath, "' not exists", NULL);
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISREG|SSL_PCM_ISNONZERO, cpPath))
return ap_pstrcat(cmd->pool, "SSLCARevocationFile: file '",
cpPath, "' not exists or empty", NULL);
else if (strlen(arg) > 4 && strcEQn(arg, "dbm:", 4)) {
mc->nSessionCacheMode = SSL_SCMODE_DBM;
mc->szSessionCacheDataFile = ap_pstrdup(mc->pPool,
- ssl_util_server_root_relative(cmd->pool, "scache", arg+4));
+ ap_server_root_relative(cmd->pool, "scache", arg+4));
}
else if ( (strlen(arg) > 4 && strcEQn(arg, "shm:", 4))
|| (strlen(arg) > 6 && strcEQn(arg, "shmht:", 6))) {
mc->nSessionCacheMode = SSL_SCMODE_SHMHT;
cp = strchr(arg, ':');
mc->szSessionCacheDataFile = ap_pstrdup(mc->pPool,
- ssl_util_server_root_relative(cmd->pool, "scache", cp+1));
+ ap_server_root_relative(cmd->pool, "scache", cp+1));
mc->tSessionCacheDataTable = NULL;
mc->nSessionCacheDataSize = 1024*512; /* 512KB */
if ((cp = strchr(mc->szSessionCacheDataFile, '(')) != NULL) {
}
}
else
-#ifdef SSL_VENDOR
- if (!ap_hook_use("ap::mod_ssl::vendor::cmd_sslsessioncache",
- AP_HOOK_SIG4(void,ptr,ptr,ptr), AP_HOOK_MODE_ALL,
- cmd, arg, mc))
-#endif
return "SSLSessionCache: Invalid argument";
#endif /* XXX */
return NULL;
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISREG|SSL_PCM_ISNONZERO, cpPath))
return ap_pstrcat(cmd->pool, "SSLProxyCACertificateFile: file '",
cpPath, "' not exists or empty", NULL);
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISDIR, cpPath))
return ap_pstrcat(cmd->pool, "SSLProxyCACertificatePath: directory '",
cpPath, "' does not exists", NULL);
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISREG|SSL_PCM_ISNONZERO, cpPath))
return ap_pstrcat(cmd->pool, "SSLProxyMachineCertFile: file '",
cpPath, "' not exists or empty", NULL);
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
- cpPath = ssl_util_server_root_relative(cmd->pool, "certkey", arg);
+ cpPath = ap_server_root_relative(cmd->pool, "certkey", arg);
if (!ssl_util_path_check(SSL_PCM_EXISTS|SSL_PCM_ISDIR, cpPath))
return ap_pstrcat(cmd->pool, "SSLProxyMachineCertPath: directory '",
cpPath, "' does not exists", NULL);
ssl_scache_shmht_init(s, p);
else if (mc->nSessionCacheMode == SSL_SCMODE_SHMCB)
ssl_scache_shmcb_init(s, p);
-#ifdef SSL_VENDOR
- else
- ap_hook_use("ap::mod_ssl::vendor::scache_init",
- AP_HOOK_SIG3(void,ptr,ptr), AP_HOOK_ALL, s, p);
-#endif
return;
}
ssl_scache_shmht_kill(s);
else if (mc->nSessionCacheMode == SSL_SCMODE_SHMCB)
ssl_scache_shmcb_kill(s);
-#ifdef SSL_VENDOR
- else
- ap_hook_use("ap::mod_ssl::vendor::scache_kill",
- AP_HOOK_SIG2(void,ptr), AP_HOOK_ALL, s);
-#endif
return;
}
rv = ssl_scache_shmht_store(s, id, idlen, expiry, sess);
else if (mc->nSessionCacheMode == SSL_SCMODE_SHMCB)
rv = ssl_scache_shmcb_store(s, id, idlen, expiry, sess);
-#ifdef SSL_VENDOR
- else
- ap_hook_use("ap::mod_ssl::vendor::scache_store",
- AP_HOOK_SIG6(int,ptr,ptr,int,int,ptr), AP_HOOK_ALL,
- (int *)&rv, s, id, idlen, (int)expiry, sess);
-#endif
return rv;
}
sess = ssl_scache_shmht_retrieve(s, id, idlen);
else if (mc->nSessionCacheMode == SSL_SCMODE_SHMCB)
sess = ssl_scache_shmcb_retrieve(s, id, idlen);
-#ifdef SSL_VENDOR
- else
- ap_hook_use("ap::mod_ssl::vendor::scache_retrieve",
- AP_HOOK_SIG4(ptr,ptr,ptr,int), AP_HOOK_ALL,
- &sess, s, id, idlen);
-#endif
return sess;
}
ssl_scache_shmht_remove(s, id, idlen);
else if (mc->nSessionCacheMode == SSL_SCMODE_SHMCB)
ssl_scache_shmcb_remove(s, id, idlen);
-#ifdef SSL_VENDOR
- else
- ap_hook_use("ap::mod_ssl::vendor::scache_remove",
- AP_HOOK_SIG4(void,ptr,ptr,int), AP_HOOK_ALL, s, id, idlen);
-#endif
return;
}
ssl_scache_shmht_status(s, p, func, arg);
else if (mc->nSessionCacheMode == SSL_SCMODE_SHMCB)
ssl_scache_shmcb_status(s, p, func, arg);
-#ifdef SSL_VENDOR
- else
- ap_hook_use("ap::mod_ssl::vendor::scache_status",
- AP_HOOK_SIG5(void,ptr,ptr,ptr,ptr), AP_HOOK_ALL,
- s, p, func, arg);
-#endif
return;
}
ssl_scache_shmht_expire(s);
else if (mc->nSessionCacheMode == SSL_SCMODE_SHMCB)
ssl_scache_shmcb_expire(s);
-#ifdef SSL_VENDOR
- else
- ap_hook_use("ap::mod_ssl::vendor::scache_expire",
- AP_HOOK_SIG2(void,ptr), AP_HOOK_ALL, s);
-#endif
return;
}