Lines Matching refs:arg

452                                         const char *arg)
456 int arglen = strlen(arg);
462 if (strcEQ(arg, "builtin")) {
466 else if ((arglen > 5) && strEQn(arg, "exec:", 5)) {
469 ap_server_root_relative(cmd->pool, arg+5);
473 arg+5, NULL);
486 else if ((arglen > 1) && (arg[0] == '|')) {
488 sc->server->pphrase_dialog_path = arg + 1;
500 const char *arg)
510 if (strcEQ(arg, "builtin")) {
513 else if ((e = ENGINE_by_id(arg))) {
514 mc->szCryptoDevice = arg;
621 const char *ssl_cmd_SSLEngine(cmd_parms *cmd, void *dcfg, const char *arg)
625 if (!strcasecmp(arg, "On")) {
629 else if (!strcasecmp(arg, "Off")) {
633 else if (!strcasecmp(arg, "Optional")) {
666 const char *arg)
672 arg = apr_pstrcat(cmd->pool, "!aNULL:!eNULL:!EXP:", arg, NULL);
675 dc->szCipherSuite = arg;
678 sc->server->auth.cipher_suite = arg;
797 const char *arg)
802 if ((err = ssl_cmd_check_file(cmd, &arg))) {
807 apr_pstrdup(cmd->pool, arg);
814 const char *arg)
819 if ((err = ssl_cmd_check_file(cmd, &arg))) {
824 apr_pstrdup(cmd->pool, arg);
831 const char *arg)
842 if ((err = ssl_cmd_check_file(cmd, &arg))) {
846 sc->server->cert_chain = arg;
854 const char *arg)
859 if ((err = ssl_cmd_check_file(cmd, &arg))) {
863 sc->server->ticket_key->file_path = arg;
874 const char *arg)
880 if ((err = ssl_cmd_check_dir(cmd, &arg))) {
889 sc->server->auth.ca_cert_path = arg;
896 const char *arg)
902 if ((err = ssl_cmd_check_file(cmd, &arg))) {
911 sc->server->auth.ca_cert_file = arg;
917 const char *arg)
922 if ((err = ssl_cmd_check_dir(cmd, &arg))) {
926 sc->server->pks->ca_name_path = arg;
932 const char *arg)
937 if ((err = ssl_cmd_check_file(cmd, &arg))) {
941 sc->server->pks->ca_name_file = arg;
948 const char *arg)
953 if ((err = ssl_cmd_check_dir(cmd, &arg))) {
957 sc->server->crl_path = arg;
964 const char *arg)
969 if ((err = ssl_cmd_check_file(cmd, &arg))) {
973 sc->server->crl_file = arg;
979 const char *arg,
982 if (strcEQ(arg, "none")) {
985 else if (strcEQ(arg, "leaf")) {
988 else if (strcEQ(arg, "chain")) {
993 ": Invalid argument '", arg, "'",
1002 const char *arg)
1006 return ssl_cmd_crlcheck_parse(cmd, arg, &sc->server->crl_check_mode);
1010 const char *arg,
1013 if (strcEQ(arg, "none") || strcEQ(arg, "off")) {
1016 else if (strcEQ(arg, "optional")) {
1019 else if (strcEQ(arg, "require") || strcEQ(arg, "on")) {
1022 else if (strcEQ(arg, "optional_no_ca")) {
1027 ": Invalid argument '", arg, "'",
1036 const char *arg)
1043 if ((err = ssl_cmd_verify_parse(cmd, arg, &mode))) {
1058 const char *arg,
1061 if ((*depth = atoi(arg)) >= 0) {
1066 ": Invalid argument '", arg, "'",
1072 const char *arg)
1079 if ((err = ssl_cmd_verify_depth_parse(cmd, arg, &depth))) {
1095 const char *arg)
1113 if (strcEQ(arg, "none")) {
1116 else if (strcEQ(arg, "nonenotnull")) {
1125 sep = ap_strchr_c(arg, ':');
1127 name = apr_pstrmemdup(cmd->pool, arg, sep - arg);
1131 name = arg;
1171 const char *arg)
1175 sc->session_cache_timeout = atoi(arg);
1186 const char *arg)
1193 while (*arg) {
1194 w = ap_getword_conf(cmd->temp_pool, &arg);
1260 const char *arg)
1271 errstring = ap_expr_parse(cmd->pool, cmd->temp_pool, info, arg, NULL);
1277 require->cpExpr = apr_pstrdup(cmd->pool, arg);
1283 const char *ssl_cmd_SSLRenegBufferSize(cmd_parms *cmd, void *dcfg, const char *arg)
1288 val = atoi(arg);
1291 arg, NULL);
1299 const char *arg,
1306 while (*arg) {
1307 char *w = ap_getword_conf(parms->temp_pool, &arg);
1367 const char *arg)
1372 return ssl_cmd_protocol_parse(cmd, arg, &sc->server->protocol);
1386 const char *arg)
1391 return ssl_cmd_protocol_parse(cmd, arg, &sc->proxy->protocol);
1396 const char *arg)
1401 arg = apr_pstrcat(cmd->pool, "!aNULL:!eNULL:!EXP:", arg, NULL);
1403 sc->proxy->auth.cipher_suite = arg;
1410 const char *arg)
1416 if ((err = ssl_cmd_verify_parse(cmd, arg, &mode))) {
1427 const char *arg)
1433 if ((err = ssl_cmd_verify_depth_parse(cmd, arg, &depth))) {
1444 const char *arg)
1449 if ((err = ssl_cmd_check_file(cmd, &arg))) {
1453 sc->proxy->auth.ca_cert_file = arg;
1460 const char *arg)
1465 if ((err = ssl_cmd_check_dir(cmd, &arg))) {
1469 sc->proxy->auth.ca_cert_path = arg;
1476 const char *arg)
1481 if ((err = ssl_cmd_check_dir(cmd, &arg))) {
1485 sc->proxy->crl_path = arg;
1492 const char *arg)
1497 if ((err = ssl_cmd_check_file(cmd, &arg))) {
1501 sc->proxy->crl_file = arg;
1508 const char *arg)
1512 return ssl_cmd_crlcheck_parse(cmd, arg, &sc->proxy->crl_check_mode);
1517 const char *arg)
1522 if ((err = ssl_cmd_check_file(cmd, &arg))) {
1526 sc->proxy->pkp->cert_file = arg;
1533 const char *arg)
1538 if ((err = ssl_cmd_check_dir(cmd, &arg))) {
1542 sc->proxy->pkp->cert_path = arg;
1549 const char *arg)
1554 if ((err = ssl_cmd_check_file(cmd, &arg))) {
1558 sc->proxy->pkp->ca_cert_file = arg;
1564 const char *arg)
1567 dc->szUserName = arg;
1596 const char *ssl_cmd_SSLOCSPDefaultResponder(cmd_parms *cmd, void *dcfg, const char *arg)
1600 sc->server->ocsp_responder = arg;
1605 const char *ssl_cmd_SSLOCSPResponseTimeSkew(cmd_parms *cmd, void *dcfg, const char *arg)
1608 sc->server->ocsp_resptime_skew = atoi(arg);
1615 const char *ssl_cmd_SSLOCSPResponseMaxAge(cmd_parms *cmd, void *dcfg, const char *arg)
1618 sc->server->ocsp_resp_maxage = atoi(arg);
1625 const char *ssl_cmd_SSLOCSPResponderTimeout(cmd_parms *cmd, void *dcfg, const char *arg)
1628 sc->server->ocsp_responder_timeout = apr_time_from_sec(atoi(arg));
1690 const char *arg)
1700 sep = ap_strchr_c(arg, ':');
1702 name = apr_pstrmemdup(cmd->pool, arg, sep - arg);
1706 name = arg;
1751 const char *arg)
1754 sc->server->stapling_resptime_skew = atoi(arg);
1762 const char *arg)
1765 sc->server->stapling_resp_maxage = atoi(arg);
1773 const char *arg)
1776 sc->server->stapling_cache_timeout = atoi(arg);
1784 const char *arg)
1787 sc->server->stapling_errcache_timeout = atoi(arg);
1811 const char *arg)
1814 sc->server->stapling_responder_timeout = atoi(arg);
1823 const char *arg)
1826 sc->server->stapling_force_url = arg;
1877 const char *arg)
1882 if ((err = ssl_cmd_check_file(cmd, &arg)))
1885 sc->server->srp_vfile = apr_pstrdup(cmd->pool, arg);
1890 const char *arg)
1894 sc->server->srp_unknown_user_seed = apr_pstrdup(cmd->pool, arg);