Lines Matching refs:server

85         ssl_log_ssl_error(SSLLOG_MARK, APLOG_ERR, r->server);
121 SSLSrvConfigRec *sc = mySrvConfig(r->server);
148 "server port.<br />\n Instead use the HTTPS scheme to "
194 ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server, APLOGNO(02031)
204 ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server, APLOGNO(02032)
211 || (mySrvConfig(sslconn->server))->strict_sni_vhost_check
218 * server config we used for handshaking or in our current server.
221 ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server, APLOGNO(02033)
227 "which is required to access this server.<br />\n");
239 "%s HTTPS request received for child %ld (server %s)",
245 ssl_util_vhostid(r->pool, r->server));
248 /* SetEnvIf ssl-*-shutdown flags can only be per-server,
301 SSLSrvConfigRec *sc = mySrvConfig(r->server);
304 server_rec *handshakeserver = sslconn ? sslconn->server : NULL;
420 if (dc->szCipherSuite || (r->server != handshakeserver)) {
435 if ((dc->szCipherSuite || sc->server->auth.cipher_suite) &&
438 sc->server->auth.cipher_suite)) {
442 ssl_log_ssl_error(SSLLOG_MARK, APLOG_ERR, r->server);
521 * both the per-server and per-directory contexts). So we cannot ask
530 (mySrvConfig(handshakeserver))->server->auth.verify_depth;
533 dc->nVerifyDepth : sc->server->auth.verify_depth;
556 (sc->server->auth.verify_mode != SSL_CVERIFY_UNSET)) {
563 (sc->server->auth.verify_mode == SSL_CVERIFY_REQUIRE)) {
569 (sc->server->auth.verify_mode == SSL_CVERIFY_OPTIONAL) ||
570 (sc->server->auth.verify_mode == SSL_CVERIFY_OPTIONAL_NO_CA))
610 * (and r->server == handshakeserver). For non-SNI requests,
616 if ((r->server != handshakeserver)
623 (sc1->server->auth.f && \
624 (!sc2->server->auth.f || \
625 strNE(sc1->server->auth.f, sc2->server->auth.f)))
633 "list is only available to clients with TLS server "
761 ssl_log_ssl_error(SSLLOG_MARK, APLOG_ERR, r->server);
797 reneg_support = "server does not";
819 ssl_log_ssl_error(SSLLOG_MARK, APLOG_ERR, r->server);
844 ssl_log_ssl_error(SSLLOG_MARK, APLOG_ERR, r->server);
866 (sc->server->auth.verify_mode != SSL_CVERIFY_NONE)) {
868 (sc->server->auth.verify_mode == SSL_CVERIFY_REQUIRE));
915 char *val = ssl_var_lookup(r->pool, r->server, r->connection,
990 SSLSrvConfigRec *sc = mySrvConfig(r->server);
1060 user = ssl_var_lookup(r->pool, r->server, r->connection,
1160 SSLSrvConfigRec *sc = mySrvConfig(r->server);
1207 val = ssl_var_lookup(r->pool, r->server, r->connection, r, var);
1218 val = ssl_var_lookup(r->pool, r->server, r->connection,
1223 val = ssl_var_lookup(r->pool, r->server, r->connection,
1231 val = ssl_var_lookup(r->pool, r->server, r->connection,
1389 server_rec *s = r ? r->server : mySrvFromConn(conn);
1425 * (this callback doesn't happen in the server context if SSLVerify
1463 if (ok && sc->server->ocsp_enabled == TRUE) {
1580 "downstream server wanted client certificate "
1589 * downstream server didn't send us a list of acceptable CA certs,
1681 * other Apache pre-forked server processes.
1732 * of our other Apache pre-forked server processes.
1781 return; /* on server shutdown Apache is already gone */
1920 * client hello with a server name indication extension ("SNI", cf. RFC 6066).
1951 * "If the server understood the ClientHello extension but
1952 * does not recognize the server name, the server SHOULD take
2027 SSL_CTX *ctx = SSL_set_SSL_CTX(ssl, sc->server->ssl_ctx);
2029 * SSL_set_SSL_CTX() only deals with the server cert,
2065 * Save the found server into our SSLConnRec for later
2068 sslcon->server = s;
2208 * to the server.