Lines Matching defs:sslconn

35 static void ssl_configure_env(request_rec *r, SSLConnRec *sslconn);
49 SSLConnRec *sslconn;
75 sslconn = myConnConfig(conn);
76 ssl = sslconn->ssl;
122 SSLConnRec *sslconn;
140 sslconn = myConnConfig(r->connection);
141 if (!sslconn) {
145 if (sslconn->non_ssl_request == NON_SSL_SET_ERROR_MSG) {
154 sslconn->non_ssl_request = NON_SSL_OK;
163 ssl = sslconn->ssl;
211 || (mySrvConfig(sslconn->server))->strict_sni_vhost_check
251 if (sslconn->shutdown_type == SSL_SHUTDOWN_TYPE_UNSET) {
252 ssl_configure_env(r, sslconn);
263 static void ssl_configure_env(request_rec *r, SSLConnRec *sslconn)
269 sslconn->shutdown_type = SSL_SHUTDOWN_TYPE_STANDARD;
283 sslconn->shutdown_type = SSL_SHUTDOWN_TYPE_UNCLEAN;
286 sslconn->shutdown_type = SSL_SHUTDOWN_TYPE_ACCURATE;
302 SSLConnRec *sslconn = myConnConfig(r->connection);
303 SSL *ssl = sslconn ? sslconn->ssl : NULL;
304 server_rec *handshakeserver = sslconn ? sslconn->server : NULL;
528 n = (sslconn->verify_depth != UNSET) ?
529 sslconn->verify_depth :
532 sslconn->verify_depth = (dc->nVerifyDepth != UNSET) ?
534 if (sslconn->verify_depth < n) {
642 sslconn->verify_info = "GENEROUS";
811 sslconn->reneg_state = RENEG_ALLOW;
839 sslconn->reneg_state = RENEG_REJECT;
855 if (sslconn->client_cert) {
856 X509_free(sslconn->client_cert);
858 sslconn->client_cert = cert;
859 sslconn->client_dn = NULL;
989 SSLConnRec *sslconn = myConnConfig(r->connection);
1045 && sslconn && sslconn->ssl && sslconn->client_cert) ||
1051 if (!sslconn->client_dn) {
1052 X509_NAME *name = X509_get_subject_name(sslconn->client_cert);
1054 sslconn->client_dn = apr_pstrdup(r->connection->pool, cp);
1069 user = (char *)sslconn->client_dn;
1159 SSLConnRec *sslconn = myConnConfig(r->connection);
1174 if (sc->enabled == SSL_ENABLED_OPTIONAL && !(sslconn && sslconn->ssl)
1183 if (!(((sc->enabled == SSL_ENABLED_TRUE) || (sc->enabled == SSL_ENABLED_OPTIONAL)) && sslconn && (ssl = sslconn->ssl))) {
1202 modssl_var_extract_dns(env, sslconn->ssl, r->pool);
1203 modssl_var_extract_san_entries(env, sslconn->ssl, r->pool);
1259 SSLConnRec *sslconn = myConnConfig(r->connection);
1260 SSL *ssl = sslconn ? sslconn->ssl : NULL;
1288 SSLConnRec *sslconn = myConnConfig(r->connection);
1289 SSL *ssl = sslconn ? sslconn->ssl : NULL;
1294 if (sslconn->verify_error == NULL &&
1295 sslconn->verify_info == NULL &&
1393 SSLConnRec *sslconn = myConnConfig(conn);
1394 modssl_ctx_t *mctx = myCtxConfig(sslconn, sc);
1439 sslconn->verify_info = "GENEROUS";
1499 if (sslconn->client_cert) {
1500 X509_free(sslconn->client_cert);
1501 sslconn->client_cert = NULL;
1503 sslconn->client_dn = NULL;
1504 sslconn->verify_error = X509_verify_cert_error_string(errnum);
1525 sslconn->verify_error = X509_verify_cert_error_string(errnum);
2111 SSLConnRec *sslconn = myConnConfig(c);
2112 modssl_ctx_t *mctx = myCtxConfig(sslconn, sc);
2221 SSLConnRec *sslconn = myConnConfig(c);
2224 modssl_ctx_t *mctx = myCtxConfig(sslconn, sc);
2260 if (sslconn->alpn_proposefns != NULL) {
2266 for (i = 0; i < sslconn->alpn_proposefns->nelts; i++) {
2268 APR_ARRAY_IDX(sslconn->alpn_proposefns, i,
2322 SSLConnRec *sslconn = myConnConfig(c);
2335 if (c == NULL || sslconn->npn_advertfns == NULL) {
2342 for (i = 0; i < sslconn->npn_advertfns->nelts; i++) {
2344 APR_ARRAY_IDX(sslconn->npn_advertfns, i, ssl_npn_advertise_protos);