* Log this cache operation
*/
if (sc->nLogLevel >= SSL_LOG_TRACE) {
+ char buf[SSL_SESSION_ID_STRING_LEN];
+
ssl_log(s, SSL_LOG_TRACE,
"Inter-Process Session Cache: "
"request=SET status=%s id=%s timeout=%ds (session caching)",
(rc == TRUE ? "OK" : "BAD"),
- SSL_SESSION_id2sz(session_id, session_id_length),
+ SSL_SESSION_id2sz(session_id, session_id_length,
+ buf, sizeof(buf)),
(timeout - time(NULL)));
}
* Log this cache operation
*/
if (sc->nLogLevel >= SSL_LOG_TRACE) {
+ char buf[SSL_SESSION_ID_STRING_LEN];
const char *status = session ? "FOUND" : "MISSED";
const char *re = session ? "reuse" : "renewal";
ssl_log(s, SSL_LOG_TRACE, "Inter-Process Session Cache: "
"request=GET status=%s id=%s (session %s)",
- status, SSL_SESSION_id2sz(id, idlen), re);
+ status,
+ SSL_SESSION_id2sz(id, idlen, buf, sizeof(buf)),
+ re);
}
/*
* Log this cache operation
*/
if (sc->nLogLevel >= SSL_LOG_TRACE) {
+ char buf[SSL_SESSION_ID_STRING_LEN];
ssl_log(s, SSL_LOG_TRACE, "Inter-Process Session Cache: "
"request=REM status=OK id=%s (session dead)",
- SSL_SESSION_id2sz(session_id, session_id_length));
+ SSL_SESSION_id2sz(session_id, session_id_length,
+ buf, sizeof(buf)));
}
return;
** _________________________________________________________________
*/
-char *SSL_SESSION_id2sz(unsigned char *id, int idlen)
+char *SSL_SESSION_id2sz(unsigned char *id, int idlen,
+ char *str, int strsize)
{
- static char str[(SSL_MAX_SSL_SESSION_ID_LENGTH+1)*2];
char *cp;
int n;
cp = str;
for (n = 0; n < idlen && n < SSL_MAX_SSL_SESSION_ID_LENGTH; n++) {
- apr_snprintf(cp, sizeof(str)-(cp-str), "%02X", id[n]);
+ apr_snprintf(cp, strsize - (cp-str), "%02X", id[n]);
cp += 2;
}
*cp = NUL;
*/
#define SSL_SESSION_MAX_DER 1024*10
+/* max length for SSL_SESSION_id2sz */
+#define SSL_SESSION_ID_STRING_LEN \
+ ((SSL_MAX_SSL_SESSION_ID_LENGTH + 1) * 2)
+
/*
* Additional Functions
*/
BOOL SSL_load_CrtAndKeyInfo_path(apr_pool_t *, STACK_OF(X509_INFO) *, char *);
#endif /* SSL_EXPERIMENTAL_PROXY */
int SSL_CTX_use_certificate_chain(SSL_CTX *, char *, int, int (*)(char*,int,int,void*));
-char *SSL_SESSION_id2sz(unsigned char *, int);
+char *SSL_SESSION_id2sz(unsigned char *, int, char *, int);
#endif /* __SSL_UTIL_SSL_H__ */