#ifndef MOD_SSL_H
#define MOD_SSL_H 1
-#if 0 /* XXX */
-
-/*
- * Check whether Extended API (EAPI) is enabled
- */
-#ifndef EAPI
-#error "mod_ssl requires Extended API (EAPI)"
-#endif
-
/*
* Optionally enable the experimental stuff, but allow the user to
* override the decision which experimental parts are included by using
* CFLAGS="-DSSL_EXPERIMENTAL_xxxx_IGNORE".
*/
+#if 0 /* XXX */
#ifdef SSL_EXPERIMENTAL
#ifndef SSL_EXPERIMENTAL_PERDIRCA_IGNORE
#define SSL_EXPERIMENTAL_PERDIRCA
#endif
#endif
#endif /* SSL_EXPERIMENTAL */
+#endif /* XXX */
/*
* Power up our brain...
#include "ap_config.h"
#include "httpd.h"
#include "http_config.h"
-#include "http_conf_globals.h"
#include "http_protocol.h"
#include "http_request.h"
#include "http_main.h"
#include "http_log.h"
#include "scoreboard.h"
#include "util_md5.h"
-#include "fnmatch.h"
+#include "apr_fnmatch.h"
#undef CORE_PRIVATE
/* mod_ssl headers */
+#if 0 /* XXX */
#include "ssl_expr.h"
#include "ssl_util_ssl.h"
#include "ssl_util_table.h"
+#endif /* XXX */
/*
* Provide reasonable default for some defines
#define strIsEmpty(s) (s == NULL || s[0] == NUL)
+#if 0 /* XXX */
#define cfgMerge(el,unset) new->el = add->el == unset ? base->el : add->el
#define cfgMergeArray(el) new->el = ap_append_arrays(p, add->el, base->el)
#define cfgMergeTable(el) new->el = ap_overlay_tables(p, add->el, base->el)
#define myCtxVarSet(mc,num,val) mc->rCtx.pV##num = val
#define myCtxVarGet(mc,num,type) (type)(mc->rCtx.pV##num)
+#endif /* XXX */
#define AP_ALL_CMD(name, args, desc) \
{ "SSL"#name, ssl_cmd_SSL##name, NULL, RSRC_CONF|OR_AUTHCFG, args, desc },
#define AP_END_CMD \
{ NULL }
+#if 0 /* XXX */
/*
* SSL Logging
*/
* (i.e. the local configuration for all <Directory>
* and .htaccess contexts)
*/
+#endif /* XXX */
typedef struct {
+#if 0 /* XXX */
BOOL bSSLRequired;
array_header *aRequirement;
ssl_opt_t nOptions;
#ifdef SSL_VENDOR
ap_ctx *ctx;
#endif
+#endif /* XXX */
} SSLDirConfigRec;
+#if 0 /* XXX */
/*
* function prototypes
void *ssl_config_server_merge(pool *, void *, void *);
void *ssl_config_perdir_create(pool *, char *);
void *ssl_config_perdir_merge(pool *, void *, void *);
+#endif /* XXX */
const char *ssl_cmd_SSLMutex(cmd_parms *, char *, char *);
const char *ssl_cmd_SSLPassPhraseDialog(cmd_parms *, char *, char *);
const char *ssl_cmd_SSLCryptoDevice(cmd_parms *, char *, char *);
const char *ssl_cmd_SSLProxyMachineCertificatePath(cmd_parms *, char *, char *);
const char *ssl_cmd_SSLProxyMachineCertificateFile(cmd_parms *, char *, char *);
#endif
+#if 0 /* XXX */
/* module initialization */
void ssl_init_Module(server_rec *, pool *);
/* ``Damned if you do,
damned if you don't.''
-- Unknown */
-#if 0 /* XXX */
-
#include "mod_ssl.h"
+#if 0 /* XXX */
+
/* _________________________________________________________________
**
** Support for Global Configuration
#endif
}
+#endif /* XXX */
+
/*
* Configuration functions for particular directives
*/
const char *ssl_cmd_SSLMutex(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
const char *err;
SSLModConfigRec *mc = myModConfig();
}
else
return "SSLMutex: Invalid argument";
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLPassPhraseDialog(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
const char *err;
}
else
return "SSLPassPhraseDialog: Invalid argument";
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLCryptoDevice(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLModConfigRec *mc = myModConfig();
const char *err;
ENGINE *e;
}
else
return "SSLCryptoDevice: Invalid argument";
+#endif /* XXX */
return NULL;
}
#endif
const char *ssl_cmd_SSLRandomSeed(
cmd_parms *cmd, char *struct_ptr, char *arg1, char *arg2, char *arg3)
{
+#if 0 /* XXX */
SSLModConfigRec *mc = myModConfig();
const char *err;
ssl_randseed_t *pRS;
if (pRS->nBytes < 0)
return "SSLRandomSeed: invalid number of bytes specified";
}
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLEngine(
cmd_parms *cmd, char *struct_ptr, int flag)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
sc->bEnabled = (flag ? TRUE : FALSE);
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLCipherSuite(
cmd_parms *cmd, SSLDirConfigRec *dc, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
if (cmd->path == NULL || dc == NULL)
sc->szCipherSuite = arg;
else
dc->szCipherSuite = arg;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLCertificateFile(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
int i;
"different certificates per virtual host allowed",
SSL_AIDX_MAX);
sc->szPublicCertFile[i] = cpPath;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLCertificateKeyFile(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
int i;
"different private keys per virtual host allowed",
SSL_AIDX_MAX);
sc->szPrivateKeyFile[i] = cpPath;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLCertificateChainFile(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
return ap_pstrcat(cmd->pool, "SSLCertificateChainFile: file '",
cpPath, "' not exists or empty", NULL);
sc->szCertificateChain = cpPath;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLCACertificatePath(
cmd_parms *cmd, SSLDirConfigRec *dc, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
#else
sc->szCACertificatePath = cpPath;
#endif
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLCACertificateFile(
cmd_parms *cmd, SSLDirConfigRec *dc, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
#else
sc->szCACertificateFile = cpPath;
#endif
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLCARevocationPath(
cmd_parms *cmd, SSLDirConfigRec *dc, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
return ap_pstrcat(cmd->pool, "SSLCARecocationPath: directory '",
cpPath, "' not exists", NULL);
sc->szCARevocationPath = cpPath;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLCARevocationFile(
cmd_parms *cmd, SSLDirConfigRec *dc, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
return ap_pstrcat(cmd->pool, "SSLCARevocationFile: file '",
cpPath, "' not exists or empty", NULL);
sc->szCARevocationFile = cpPath;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLVerifyClient(
cmd_parms *cmd, SSLDirConfigRec *dc, char *level)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
ssl_verify_t id;
sc->nVerifyClient = id;
else
dc->nVerifyClient = id;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLVerifyDepth(
cmd_parms *cmd, SSLDirConfigRec *dc, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
int d;
sc->nVerifyDepth = d;
else
dc->nVerifyDepth = d;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLSessionCache(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
const char *err;
SSLModConfigRec *mc = myModConfig();
char *cp, *cp2;
cmd, arg, mc))
#endif
return "SSLSessionCache: Invalid argument";
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLSessionCacheTimeout(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
sc->nSessionCacheTimeout = atoi(arg);
if (sc->nSessionCacheTimeout < 0)
return "SSLSessionCacheTimeout: Invalid argument";
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLLog(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
const char *err;
|NOT_IN_LOCATION|NOT_IN_FILES )) != NULL)
return err;
sc->szLogFile = arg;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLLogLevel(
cmd_parms *cmd, char *struct_ptr, char *level)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
const char *err;
sc->nLogLevel = SSL_LOG_DEBUG;
else
return "SSLLogLevel: Invalid argument";
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLOptions(
cmd_parms *cmd, SSLDirConfigRec *dc, const char *cpLine)
{
+#if 0 /* XXX */
ssl_opt_t opt;
int first;
char action;
dc->nOptionsDel = SSL_OPT_NONE;
}
}
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLRequireSSL(
cmd_parms *cmd, SSLDirConfigRec *dc, char *cipher)
{
+#if 0 /* XXX */
dc->bSSLRequired = TRUE;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLRequire(
cmd_parms *cmd, SSLDirConfigRec *dc, char *cpExpr)
{
+#if 0 /* XXX */
ssl_expr *mpExpr;
ssl_require_t *pReqRec;
pReqRec = ap_push_array(dc->aRequirement);
pReqRec->cpExpr = ap_pstrdup(cmd->pool, cpExpr);
pReqRec->mpExpr = mpExpr;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLProtocol(
cmd_parms *cmd, char *struct_ptr, const char *opt)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc;
ssl_proto_t options, thisopt;
char action;
options = thisopt;
}
sc->nProtocol = options;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLProxyProtocol(
cmd_parms *cmd, char *struct_ptr, const char *opt)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc;
ssl_proto_t options, thisopt;
char action;
options = thisopt;
}
sc->nProxyProtocol = options;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLProxyCipherSuite(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
sc->szProxyCipherSuite = arg;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLProxyVerify(
cmd_parms *cmd, char *struct_ptr, int flag)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
sc->bProxyVerify = (flag ? TRUE : FALSE);
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLProxyVerifyDepth(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
int d;
if (d < 0)
return "SSLProxyVerifyDepth: Invalid argument";
sc->nProxyVerifyDepth = d;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLProxyCACertificateFile(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
return ap_pstrcat(cmd->pool, "SSLProxyCACertificateFile: file '",
cpPath, "' not exists or empty", NULL);
sc->szProxyCACertificateFile = cpPath;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLProxyCACertificatePath(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
return ap_pstrcat(cmd->pool, "SSLProxyCACertificatePath: directory '",
cpPath, "' does not exists", NULL);
sc->szProxyCACertificatePath = cpPath;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLProxyMachineCertificateFile(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
return ap_pstrcat(cmd->pool, "SSLProxyMachineCertFile: file '",
cpPath, "' not exists or empty", NULL);
sc->szProxyClientCertificateFile = cpPath;
+#endif /* XXX */
return NULL;
}
const char *ssl_cmd_SSLProxyMachineCertificatePath(
cmd_parms *cmd, char *struct_ptr, char *arg)
{
+#if 0 /* XXX */
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
char *cpPath;
return ap_pstrcat(cmd->pool, "SSLProxyMachineCertPath: directory '",
cpPath, "' does not exists", NULL);
sc->szProxyClientCertificatePath = cpPath;
+#endif /* XXX */
return NULL;
}
#endif /* SSL_EXPERIMENTAL_PROXY */
-#endif /* XXX */
-