1 /* Licensed to the Apache Software Foundation (ASF) under one or more
2 * contributor license agreements. See the NOTICE file distributed with
3 * this work for additional information regarding copyright ownership.
4 * The ASF licenses this file to You under the Apache License, Version 2.0
5 * (the "License"); you may not use this file except in compliance with
6 * the License. You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
18 * _ __ ___ ___ __| | ___ ___| | mod_ssl
19 * | '_ ` _ \ / _ \ / _` | / __/ __| | Apache Interface to OpenSSL
20 * | | | | | | (_) | (_| | \__ \__ \ |
21 * |_| |_| |_|\___/ \__,_|___|___/___/_|
26 /* ``The Apache Group: a collection
27 of talented individuals who are
28 trying to perfect the art of
29 never finishing something.''
35 * Optionally enable the experimental stuff, but allow the user to
36 * override the decision which experimental parts are included by using
37 * CFLAGS="-DSSL_EXPERIMENTAL_xxxx_IGNORE".
39 #ifdef SSL_EXPERIMENTAL
41 #ifndef SSL_EXPERIMENTAL_ENGINE_IGNORE
42 #define SSL_EXPERIMENTAL_ENGINE
45 #endif /* SSL_EXPERIMENTAL */
48 * Power up our brain...
53 #include "http_config.h"
54 #include "http_core.h"
56 #include "http_main.h"
57 #include "http_connection.h"
58 #include "http_request.h"
59 #include "http_protocol.h"
60 #include "util_script.h"
61 #include "util_filter.h"
64 #include "apr_strings.h"
65 #define APR_WANT_STRFUNC
67 #include "apr_tables.h"
69 #include "apr_fnmatch.h"
70 #include "apr_strings.h"
74 #include "apr_global_mutex.h"
75 #include "apr_optional.h"
77 #define MOD_SSL_VERSION AP_SERVER_BASEREVISION
90 #else /* !HAVE_SSLC (implicit HAVE_OPENSSL) */
99 #ifdef SSL_EXPERIMENTAL_ENGINE
102 #ifdef HAVE_SSL_X509V3_H
106 #endif /* !HAVE_SSLC (implicit HAVE_OPENSSL) */
109 /* mod_ssl headers */
110 #include "ssl_toolkit_compat.h"
111 #include "ssl_expr.h"
112 #include "ssl_util_ssl.h"
113 #include "ssl_util_table.h"
115 /* The #ifdef macros are only defined AFTER including the above
116 * therefore we cannot include these system files at the top :-(
118 #if APR_HAVE_SYS_TIME_H
119 #include <sys/time.h>
121 #if APR_HAVE_UNISTD_H
122 #include <unistd.h> /* needed for STDIN_FILENO et.al., at least on FreeBSD */
126 * Provide reasonable default for some defines
132 #define TRUE (!FALSE)
135 #define PFALSE ((void *)FALSE)
138 #define PTRUE ((void *)TRUE)
148 #define RAND_MAX INT_MAX
152 * Provide reasonable defines for some types
155 #define BOOL unsigned int
158 #define UCHAR unsigned char
162 * Provide useful shorthands
164 #define strEQ(s1,s2) (strcmp(s1,s2) == 0)
165 #define strNE(s1,s2) (strcmp(s1,s2) != 0)
166 #define strEQn(s1,s2,n) (strncmp(s1,s2,n) == 0)
167 #define strNEn(s1,s2,n) (strncmp(s1,s2,n) != 0)
169 #define strcEQ(s1,s2) (strcasecmp(s1,s2) == 0)
170 #define strcNE(s1,s2) (strcasecmp(s1,s2) != 0)
171 #define strcEQn(s1,s2,n) (strncasecmp(s1,s2,n) == 0)
172 #define strcNEn(s1,s2,n) (strncasecmp(s1,s2,n) != 0)
174 #define strIsEmpty(s) (s == NULL || s[0] == NUL)
176 #define myConnConfig(c) \
177 (SSLConnRec *)ap_get_module_config(c->conn_config, &ssl_module)
178 #define myCtxConfig(sslconn, sc) (sslconn->is_proxy ? sc->proxy : sc->server)
179 #define myConnConfigSet(c, val) \
180 ap_set_module_config(c->conn_config, &ssl_module, val)
181 #define mySrvConfig(srv) (SSLSrvConfigRec *)ap_get_module_config(srv->module_config, &ssl_module)
182 #define myDirConfig(req) (SSLDirConfigRec *)ap_get_module_config(req->per_dir_config, &ssl_module)
183 #define myModConfig(srv) (mySrvConfig((srv)))->mc
185 #define myCtxVarSet(mc,num,val) mc->rCtx.pV##num = val
186 #define myCtxVarGet(mc,num,type) (type)(mc->rCtx.pV##num)
189 * Defaults for the configuration
191 #ifndef SSL_SESSION_CACHE_TIMEOUT
192 #define SSL_SESSION_CACHE_TIMEOUT 300
196 * Support for MM library
198 #define SSL_MM_FILE_MODE ( APR_UREAD | APR_UWRITE | APR_GREAD | APR_WREAD )
201 * Support for DBM library
203 #define SSL_DBM_FILE_MODE ( APR_UREAD | APR_UWRITE | APR_GREAD | APR_WREAD )
205 #if !defined(SSL_DBM_FILE_SUFFIX_DIR) && !defined(SSL_DBM_FILE_SUFFIX_PAG)
206 #if defined(DBM_SUFFIX)
207 #define SSL_DBM_FILE_SUFFIX_DIR DBM_SUFFIX
208 #define SSL_DBM_FILE_SUFFIX_PAG DBM_SUFFIX
209 #elif defined(__FreeBSD__) || (defined(DB_LOCK) && defined(DB_SHMEM))
210 #define SSL_DBM_FILE_SUFFIX_DIR ".db"
211 #define SSL_DBM_FILE_SUFFIX_PAG ".db"
213 #define SSL_DBM_FILE_SUFFIX_DIR ".dir"
214 #define SSL_DBM_FILE_SUFFIX_PAG ".pag"
219 * Define the certificate algorithm types
222 typedef int ssl_algo_t;
224 #define SSL_ALGO_UNKNOWN (0)
225 #define SSL_ALGO_RSA (1<<0)
226 #define SSL_ALGO_DSA (1<<1)
227 #define SSL_ALGO_ALL (SSL_ALGO_RSA|SSL_ALGO_DSA)
229 #define SSL_AIDX_RSA (0)
230 #define SSL_AIDX_DSA (1)
231 #define SSL_AIDX_MAX (2)
235 * Define IDs for the temporary RSA keys and DH params
238 #define SSL_TMP_KEY_RSA_512 (0)
239 #define SSL_TMP_KEY_RSA_1024 (1)
240 #define SSL_TMP_KEY_DH_512 (2)
241 #define SSL_TMP_KEY_DH_1024 (3)
242 #define SSL_TMP_KEY_MAX (4)
245 * Define the SSL options
247 #define SSL_OPT_NONE (0)
248 #define SSL_OPT_RELSET (1<<0)
249 #define SSL_OPT_STDENVVARS (1<<1)
250 #define SSL_OPT_COMPATENVVARS (1<<2)
251 #define SSL_OPT_EXPORTCERTDATA (1<<3)
252 #define SSL_OPT_FAKEBASICAUTH (1<<4)
253 #define SSL_OPT_STRICTREQUIRE (1<<5)
254 #define SSL_OPT_OPTRENEGOTIATE (1<<6)
255 #define SSL_OPT_ALL (SSL_OPT_STDENVVARS|SSL_OPT_COMPATENVVAR|SSL_OPT_EXPORTCERTDATA|SSL_OPT_FAKEBASICAUTH|SSL_OPT_STRICTREQUIRE|SSL_OPT_OPTRENEGOTIATE)
256 typedef int ssl_opt_t;
259 * Define the SSL Protocol options
261 #define SSL_PROTOCOL_NONE (0)
262 #define SSL_PROTOCOL_SSLV2 (1<<0)
263 #define SSL_PROTOCOL_SSLV3 (1<<1)
264 #define SSL_PROTOCOL_TLSV1 (1<<2)
265 #define SSL_PROTOCOL_ALL (SSL_PROTOCOL_SSLV2|SSL_PROTOCOL_SSLV3|SSL_PROTOCOL_TLSV1)
266 typedef int ssl_proto_t;
269 * Define the SSL verify levels
272 SSL_CVERIFY_UNSET = UNSET,
273 SSL_CVERIFY_NONE = 0,
274 SSL_CVERIFY_OPTIONAL = 1,
275 SSL_CVERIFY_REQUIRE = 2,
276 SSL_CVERIFY_OPTIONAL_NO_CA = 3
279 #define SSL_VERIFY_PEER_STRICT \
280 (SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT)
282 #ifndef X509_V_ERR_CERT_UNTRUSTED
283 #define X509_V_ERR_CERT_UNTRUSTED 27
286 #define ssl_verify_error_is_optional(errnum) \
287 ((errnum == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT) \
288 || (errnum == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN) \
289 || (errnum == X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY) \
290 || (errnum == X509_V_ERR_CERT_UNTRUSTED) \
291 || (errnum == X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE))
294 * Define the SSL pass phrase dialog types
297 SSL_PPTYPE_UNSET = UNSET,
298 SSL_PPTYPE_BUILTIN = 0,
299 SSL_PPTYPE_FILTER = 1,
304 * Define the Path Checking modes
306 #define SSL_PCM_EXISTS 1
307 #define SSL_PCM_ISREG 2
308 #define SSL_PCM_ISDIR 4
309 #define SSL_PCM_ISNONZERO 8
310 typedef unsigned int ssl_pathcheck_t;
313 * Define the SSL session cache modes and structures
316 SSL_SCMODE_UNSET = UNSET,
319 SSL_SCMODE_SHMHT = 2,
324 * Define the SSL mutex modes
327 SSL_MUTEXMODE_UNSET = UNSET,
328 SSL_MUTEXMODE_NONE = 0,
329 SSL_MUTEXMODE_USED = 1
333 * Define the SSL requirement structure
341 * Define the SSL random number generator seeding source
344 SSL_RSCTX_STARTUP = 1,
345 SSL_RSCTX_CONNECT = 2
348 SSL_RSSRC_BUILTIN = 1,
361 * Define the structure of an ASN.1 anything
365 unsigned char *cpData;
366 apr_time_t source_mtime;
370 * Define the mod_ssl per-module configuration structure
371 * (i.e. the global configuration for each httpd process)
375 SSL_SHUTDOWN_TYPE_UNSET,
376 SSL_SHUTDOWN_TYPE_STANDARD,
377 SSL_SHUTDOWN_TYPE_UNCLEAN,
378 SSL_SHUTDOWN_TYPE_ACCURATE
379 } ssl_shutdown_type_e;
383 const char *client_dn;
385 ssl_shutdown_type_e shutdown_type;
386 const char *verify_info;
387 const char *verify_error;
393 /* Track the handshake/renegotiation state for the connection so
394 * that all client-initiated renegotiations can be rejected, as a
395 * partial fix for CVE-2009-3555. */
397 RENEG_INIT = 0, /* Before initial handshake */
398 RENEG_REJECT, /* After initial handshake; any client-initiated
399 * renegotiation should be rejected */
400 RENEG_ALLOW, /* A server-initated renegotiation is taking
401 * place (as dictated by configuration) */
402 RENEG_ABORT /* Renegotiation initiated by client, abort the
411 int nSessionCacheMode;
412 char *szSessionCacheDataFile;
413 int nSessionCacheDataSize;
414 apr_shm_t *pSessionCacheDataMM;
415 apr_rmm_t *pSessionCacheDataRMM;
416 apr_table_t *tSessionCacheDataTable;
417 ssl_mutexmode_t nMutexMode;
418 apr_lockmech_e nMutexMech;
419 const char *szMutexFile;
420 apr_global_mutex_t *pMutex;
421 apr_array_header_t *aRandSeed;
422 apr_hash_t *tVHostKeys;
423 void *pTmpKeys[SSL_TMP_KEY_MAX];
424 apr_hash_t *tPublicCert;
425 apr_hash_t *tPrivateKey;
426 #ifdef SSL_EXPERIMENTAL_ENGINE
427 char *szCryptoDevice;
430 void *pV1, *pV2, *pV3, *pV4, *pV5, *pV6, *pV7, *pV8, *pV9, *pV10;
434 /* public cert/private key */
437 * server only has 1-2 certs/keys
440 const char *cert_files[SSL_AIDX_MAX];
441 const char *key_files[SSL_AIDX_MAX];
442 X509 *certs[SSL_AIDX_MAX];
443 EVP_PKEY *keys[SSL_AIDX_MAX];
444 } modssl_pk_server_t;
447 /* proxy can have any number of cert/key pairs */
448 const char *cert_file;
449 const char *cert_path;
450 STACK_OF(X509_INFO) *certs;
453 /* stuff related to authentication that can also be per-dir */
455 /* known/trusted CAs */
456 const char *ca_cert_path;
457 const char *ca_cert_file;
459 const char *cipher_suite;
461 /* for client or downstream server authentication */
463 ssl_verify_t verify_mode;
466 typedef struct SSLSrvConfigRec SSLSrvConfigRec;
469 SSLSrvConfigRec *sc; /* pointer back to server config */
472 /* we are one or the other */
473 modssl_pk_server_t *pks;
474 modssl_pk_proxy_t *pkp;
476 ssl_proto_t protocol;
478 /* config for handling encrypted keys */
479 ssl_pphrase_t pphrase_dialog_type;
480 const char *pphrase_dialog_path;
482 const char *cert_chain;
484 /* certificate revocation list */
485 const char *crl_path;
486 const char *crl_file;
489 modssl_auth_ctx_t auth;
492 struct SSLSrvConfigRec {
496 const char *vhost_id;
498 int session_cache_timeout;
500 modssl_ctx_t *server;
505 * Define the mod_ssl per-directory configuration structure
506 * (i.e. the local configuration for all <Directory>
507 * and .htaccess contexts)
511 apr_array_header_t *aRequirement;
513 ssl_opt_t nOptionsAdd;
514 ssl_opt_t nOptionsDel;
515 const char *szCipherSuite;
516 ssl_verify_t nVerifyClient;
518 const char *szCACertificatePath;
519 const char *szCACertificateFile;
520 const char *szUserName;
524 * function prototypes
527 /* API glue structures */
528 extern module AP_MODULE_DECLARE_DATA ssl_module;
531 extern const char ssl_valid_ssl_mutex_string[];
533 /* configuration handling */
534 SSLModConfigRec *ssl_config_global_create(server_rec *);
535 void ssl_config_global_fix(SSLModConfigRec *);
536 BOOL ssl_config_global_isfixed(SSLModConfigRec *);
537 void *ssl_config_server_create(apr_pool_t *, server_rec *);
538 void *ssl_config_server_merge(apr_pool_t *, void *, void *);
539 void *ssl_config_perdir_create(apr_pool_t *, char *);
540 void *ssl_config_perdir_merge(apr_pool_t *, void *, void *);
541 const char *ssl_cmd_SSLMutex(cmd_parms *, void *, const char *);
542 const char *ssl_cmd_SSLPassPhraseDialog(cmd_parms *, void *, const char *);
543 const char *ssl_cmd_SSLCryptoDevice(cmd_parms *, void *, const char *);
544 const char *ssl_cmd_SSLRandomSeed(cmd_parms *, void *, const char *, const char *, const char *);
545 const char *ssl_cmd_SSLEngine(cmd_parms *, void *, int);
546 const char *ssl_cmd_SSLCipherSuite(cmd_parms *, void *, const char *);
547 const char *ssl_cmd_SSLCertificateFile(cmd_parms *, void *, const char *);
548 const char *ssl_cmd_SSLCertificateKeyFile(cmd_parms *, void *, const char *);
549 const char *ssl_cmd_SSLCertificateChainFile(cmd_parms *, void *, const char *);
550 const char *ssl_cmd_SSLCACertificatePath(cmd_parms *, void *, const char *);
551 const char *ssl_cmd_SSLCACertificateFile(cmd_parms *, void *, const char *);
552 const char *ssl_cmd_SSLCARevocationPath(cmd_parms *, void *, const char *);
553 const char *ssl_cmd_SSLCARevocationFile(cmd_parms *, void *, const char *);
554 const char *ssl_cmd_SSLVerifyClient(cmd_parms *, void *, const char *);
555 const char *ssl_cmd_SSLVerifyDepth(cmd_parms *, void *, const char *);
556 const char *ssl_cmd_SSLSessionCache(cmd_parms *, void *, const char *);
557 const char *ssl_cmd_SSLSessionCacheTimeout(cmd_parms *, void *, const char *);
558 const char *ssl_cmd_SSLProtocol(cmd_parms *, void *, const char *);
559 const char *ssl_cmd_SSLOptions(cmd_parms *, void *, const char *);
560 const char *ssl_cmd_SSLRequireSSL(cmd_parms *, void *);
561 const char *ssl_cmd_SSLRequire(cmd_parms *, void *, const char *);
562 const char *ssl_cmd_SSLUserName(cmd_parms *, void *, const char *);
563 const char *ssl_cmd_SSLInsecureRenegotiation(cmd_parms *cmd, void *dcfg, int flag);
565 const char *ssl_cmd_SSLProxyEngine(cmd_parms *cmd, void *dcfg, int flag);
566 const char *ssl_cmd_SSLProxyProtocol(cmd_parms *, void *, const char *);
567 const char *ssl_cmd_SSLProxyCipherSuite(cmd_parms *, void *, const char *);
568 const char *ssl_cmd_SSLProxyVerify(cmd_parms *, void *, const char *);
569 const char *ssl_cmd_SSLProxyVerifyDepth(cmd_parms *, void *, const char *);
570 const char *ssl_cmd_SSLProxyCACertificatePath(cmd_parms *, void *, const char *);
571 const char *ssl_cmd_SSLProxyCACertificateFile(cmd_parms *, void *, const char *);
572 const char *ssl_cmd_SSLProxyCARevocationPath(cmd_parms *, void *, const char *);
573 const char *ssl_cmd_SSLProxyCARevocationFile(cmd_parms *, void *, const char *);
574 const char *ssl_cmd_SSLProxyMachineCertificatePath(cmd_parms *, void *, const char *);
575 const char *ssl_cmd_SSLProxyMachineCertificateFile(cmd_parms *, void *, const char *);
577 /* module initialization */
578 int ssl_init_Module(apr_pool_t *, apr_pool_t *, apr_pool_t *, server_rec *);
579 void ssl_init_Engine(server_rec *, apr_pool_t *);
580 void ssl_init_ConfigureServer(server_rec *, apr_pool_t *, apr_pool_t *, SSLSrvConfigRec *);
581 void ssl_init_CheckServers(server_rec *, apr_pool_t *);
583 *ssl_init_FindCAList(server_rec *, apr_pool_t *, const char *, const char *);
584 void ssl_init_Child(apr_pool_t *, server_rec *);
585 apr_status_t ssl_init_ModuleKill(void *data);
587 /* Apache API hooks */
588 int ssl_hook_Auth(request_rec *);
589 int ssl_hook_UserCheck(request_rec *);
590 int ssl_hook_Access(request_rec *);
591 int ssl_hook_Fixup(request_rec *);
592 int ssl_hook_ReadReq(request_rec *);
594 /* OpenSSL callbacks */
595 RSA *ssl_callback_TmpRSA(SSL *, int, int);
596 DH *ssl_callback_TmpDH(SSL *, int, int);
597 int ssl_callback_SSLVerify(int, X509_STORE_CTX *);
598 int ssl_callback_SSLVerify_CRL(int, X509_STORE_CTX *, conn_rec *);
599 int ssl_callback_proxy_cert(SSL *ssl, MODSSL_CLIENT_CERT_CB_ARG_TYPE **x509, EVP_PKEY **pkey);
600 int ssl_callback_NewSessionCacheEntry(SSL *, SSL_SESSION *);
601 SSL_SESSION *ssl_callback_GetSessionCacheEntry(SSL *, unsigned char *, int, int *);
602 void ssl_callback_DelSessionCacheEntry(SSL_CTX *, SSL_SESSION *);
603 void ssl_callback_Info(MODSSL_INFO_CB_ARG_TYPE, int, int);
605 /* Session Cache Support */
606 void ssl_scache_init(server_rec *, apr_pool_t *);
608 void ssl_scache_status_register(apr_pool_t *p);
610 void ssl_scache_kill(server_rec *);
611 BOOL ssl_scache_store(server_rec *, UCHAR *, int, time_t, SSL_SESSION *);
612 SSL_SESSION *ssl_scache_retrieve(server_rec *, UCHAR *, int);
613 void ssl_scache_remove(server_rec *, UCHAR *, int);
614 void ssl_scache_expire(server_rec *);
615 void ssl_scache_status(server_rec *, apr_pool_t *, void (*)(char *, void *), void *);
616 char *ssl_scache_id2sz(UCHAR *, int);
617 void ssl_scache_dbm_init(server_rec *, apr_pool_t *);
618 void ssl_scache_dbm_kill(server_rec *);
619 BOOL ssl_scache_dbm_store(server_rec *, UCHAR *, int, time_t, SSL_SESSION *);
620 SSL_SESSION *ssl_scache_dbm_retrieve(server_rec *, UCHAR *, int);
621 void ssl_scache_dbm_remove(server_rec *, UCHAR *, int);
622 void ssl_scache_dbm_expire(server_rec *);
623 void ssl_scache_dbm_status(server_rec *, apr_pool_t *, void (*)(char *, void *), void *);
625 void ssl_scache_shmht_init(server_rec *, apr_pool_t *);
626 void ssl_scache_shmht_kill(server_rec *);
627 BOOL ssl_scache_shmht_store(server_rec *, UCHAR *, int, time_t, SSL_SESSION *);
628 SSL_SESSION *ssl_scache_shmht_retrieve(server_rec *, UCHAR *, int);
629 void ssl_scache_shmht_remove(server_rec *, UCHAR *, int);
630 void ssl_scache_shmht_expire(server_rec *);
631 void ssl_scache_shmht_status(server_rec *, apr_pool_t *, void (*)(char *, void *), void *);
633 void ssl_scache_shmcb_init(server_rec *, apr_pool_t *);
634 void ssl_scache_shmcb_kill(server_rec *);
635 BOOL ssl_scache_shmcb_store(server_rec *, UCHAR *, int, time_t, SSL_SESSION *);
636 SSL_SESSION *ssl_scache_shmcb_retrieve(server_rec *, UCHAR *, int);
637 void ssl_scache_shmcb_remove(server_rec *, UCHAR *, int);
638 void ssl_scache_shmcb_expire(server_rec *);
639 void ssl_scache_shmcb_status(server_rec *, apr_pool_t *, void (*)(char *, void *), void *);
641 /* Pass Phrase Support */
642 void ssl_pphrase_Handle(server_rec *, apr_pool_t *);
644 /* Diffie-Hellman Parameter Support */
645 DH *ssl_dh_GetTmpParam(int);
646 DH *ssl_dh_GetParamFromFile(char *);
648 unsigned char *ssl_asn1_table_set(apr_hash_t *table,
652 ssl_asn1_t *ssl_asn1_table_get(apr_hash_t *table,
655 void ssl_asn1_table_unset(apr_hash_t *table,
658 const char *ssl_asn1_keystr(int keytype);
660 const char *ssl_asn1_table_keyfmt(apr_pool_t *p,
664 int ssl_mutex_init(server_rec *, apr_pool_t *);
665 int ssl_mutex_reinit(server_rec *, apr_pool_t *);
666 int ssl_mutex_on(server_rec *);
667 int ssl_mutex_off(server_rec *);
669 /* Logfile Support */
671 void ssl_log_ssl_error(const char *, int, int, server_rec *);
674 void ssl_var_register(void);
675 char *ssl_var_lookup(apr_pool_t *, server_rec *, conn_rec *, request_rec *, char *);
676 void ssl_var_log_config_register(apr_pool_t *p);
678 APR_DECLARE_OPTIONAL_FN(char *, ssl_var_lookup,
679 (apr_pool_t *, server_rec *,
680 conn_rec *, request_rec *,
683 /* An optional function which returns non-zero if the given connection
684 * is using SSL/TLS. */
685 APR_DECLARE_OPTIONAL_FN(int, ssl_is_https, (conn_rec *));
688 int ssl_proxy_enable(conn_rec *c);
689 int ssl_engine_disable(conn_rec *c);
691 APR_DECLARE_OPTIONAL_FN(int, ssl_proxy_enable, (conn_rec *));
693 APR_DECLARE_OPTIONAL_FN(int, ssl_engine_disable, (conn_rec *));
696 void ssl_io_filter_init(conn_rec *, SSL *);
697 void ssl_io_filter_register(apr_pool_t *);
698 long ssl_io_data_cb(BIO *, int, MODSSL_BIO_CB_ARG_TYPE *, int, long, long);
700 /* ssl_io_buffer_fill fills the setaside buffering of the HTTP request
701 * to allow an SSL renegotiation to take place. */
702 int ssl_io_buffer_fill(request_rec *r);
705 int ssl_rand_seed(server_rec *, apr_pool_t *, ssl_rsctx_t, char *);
707 /* Utility Functions */
708 char *ssl_util_vhostid(apr_pool_t *, server_rec *);
709 void ssl_util_strupper(char *);
710 void ssl_util_uuencode(char *, const char *, BOOL);
711 void ssl_util_uuencode_binary(unsigned char *, const unsigned char *, int, BOOL);
712 apr_file_t *ssl_util_ppopen(server_rec *, apr_pool_t *, const char *,
713 const char * const *);
714 void ssl_util_ppclose(server_rec *, apr_pool_t *, apr_file_t *);
715 char *ssl_util_readfilter(server_rec *, apr_pool_t *, const char *,
716 const char * const *);
717 BOOL ssl_util_path_check(ssl_pathcheck_t, const char *, apr_pool_t *);
718 ssl_algo_t ssl_util_algotypeof(X509 *, EVP_PKEY *);
719 char *ssl_util_algotypestr(ssl_algo_t);
720 char *ssl_util_ptxtsub(apr_pool_t *, const char *, const char *, char *);
721 void ssl_util_thread_setup(apr_pool_t *);
723 #define APR_SHM_MAXSIZE (64 * 1024 * 1024)
724 #endif /* __MOD_SSL_H__ */