Lines Matching defs:var
42 static char *ssl_var_lookup_ssl(apr_pool_t *p, conn_rec *c, request_rec *r, char *var);
43 static char *ssl_var_lookup_ssl_cert(apr_pool_t *p, request_rec *r, X509 *xs, char *var);
44 static char *ssl_var_lookup_ssl_cert_dn(apr_pool_t *p, X509_NAME *xsname, char *var);
45 static char *ssl_var_lookup_ssl_cert_san(apr_pool_t *p, X509 *xs, char *var);
49 static char *ssl_var_lookup_ssl_cert_chain(apr_pool_t *p, STACK_OF(X509) *sk, char *var);
53 static char *ssl_var_lookup_ssl_cipher(apr_pool_t *p, conn_rec *c, char *var);
55 static char *ssl_var_lookup_ssl_version(apr_pool_t *p, char *var);
146 char *var = (char *)data;
149 return sslconn ? ssl_var_lookup_ssl(ctx->p, ctx->c, ctx->r, var) : NULL;
206 char *ssl_var_lookup(apr_pool_t *p, server_rec *s, conn_rec *c, request_rec *r, char *var)
232 switch (var[0]) {
235 if (strcEQ(var, "HTTP_USER_AGENT"))
237 else if (strcEQ(var, "HTTP_REFERER"))
239 else if (strcEQ(var, "HTTP_COOKIE"))
241 else if (strcEQ(var, "HTTP_FORWARDED"))
243 else if (strcEQ(var, "HTTP_HOST"))
245 else if (strcEQ(var, "HTTP_PROXY_CONNECTION"))
247 else if (strcEQ(var, "HTTP_ACCEPT"))
249 else if (strlen(var) > 5 && strcEQn(var, "HTTP:", 5))
251 result = apr_table_get(r->headers_in, var+5);
256 if (strcEQ(var, "REQUEST_METHOD"))
258 else if (strcEQ(var, "REQUEST_SCHEME"))
260 else if (strcEQ(var, "REQUEST_URI"))
262 else if (strcEQ(var, "REQUEST_FILENAME"))
264 else if (strcEQ(var, "REMOTE_ADDR"))
266 else if (strcEQ(var, "REMOTE_HOST"))
269 else if (strcEQ(var, "REMOTE_IDENT"))
271 else if (strcEQ(var, "REMOTE_USER"))
277 if (strcEQn(var, "SSL", 3)) break; /* shortcut common case */
279 if (strcEQ(var, "SERVER_ADMIN"))
281 else if (strcEQ(var, "SERVER_NAME"))
283 else if (strcEQ(var, "SERVER_PORT"))
285 else if (strcEQ(var, "SERVER_PROTOCOL"))
287 else if (strcEQ(var, "SCRIPT_FILENAME"))
292 if (strcEQ(var, "PATH_INFO"))
294 else if (strcEQ(var, "QUERY_STRING"))
296 else if (strcEQ(var, "IS_SUBREQ"))
298 else if (strcEQ(var, "DOCUMENT_ROOT"))
300 else if (strcEQ(var, "AUTH_TYPE"))
302 else if (strcEQ(var, "THE_REQUEST"))
304 else if (strlen(var) > 4 && strcEQn(var, "ENV:", 4)) {
305 result = apr_table_get(r->notes, var+4);
307 result = apr_table_get(r->subprocess_env, var+4);
318 if (strlen(var) > 4 && strcEQn(var, "SSL_", 4)
320 result = ssl_var_lookup_ssl(p, c, r, var+4);
321 else if (strcEQ(var, "HTTPS")) {
333 if (strlen(var) > 12 && strcEQn(var, "SSL_VERSION_", 12))
334 result = ssl_var_lookup_ssl_version(p, var+12);
335 else if (strcEQ(var, "SERVER_SOFTWARE"))
337 else if (strcEQ(var, "API_VERSION")) {
341 else if (strcEQ(var, "TIME_YEAR")) {
351 else if (strcEQ(var, "TIME_MON")) {
354 else if (strcEQ(var, "TIME_DAY")) {
357 else if (strcEQ(var, "TIME_HOUR")) {
360 else if (strcEQ(var, "TIME_MIN")) {
363 else if (strcEQ(var, "TIME_SEC")) {
366 else if (strcEQ(var, "TIME_WDAY")) {
369 else if (strcEQ(var, "TIME")) {
378 else if (strlen(var) > 4 && strcEQn(var, "ENV:", 4)) {
379 result = getenv(var+4);
391 char *var)
402 if (strlen(var) > 8 && strcEQn(var, "VERSION_", 8)) {
403 result = ssl_var_lookup_ssl_version(p, var+8);
405 else if (ssl != NULL && strcEQ(var, "PROTOCOL")) {
408 else if (ssl != NULL && strcEQ(var, "SESSION_ID")) {
426 else if(ssl != NULL && strcEQ(var, "SESSION_RESUMED")) {
432 else if (ssl != NULL && strlen(var) >= 6 && strcEQn(var, "CIPHER", 6)) {
433 result = ssl_var_lookup_ssl_cipher(p, c, var+6);
435 else if (ssl != NULL && strlen(var) > 18 && strcEQn(var, "CLIENT_CERT_CHAIN_", 18)) {
437 result = ssl_var_lookup_ssl_cert_chain(p, sk, var+18);
439 else if (ssl != NULL && strcEQ(var, "CLIENT_CERT_RFC4523_CEA")) {
442 else if (ssl != NULL && strcEQ(var, "CLIENT_VERIFY")) {
445 else if (ssl != NULL && strlen(var) > 7 && strcEQn(var, "CLIENT_", 7)) {
447 result = ssl_var_lookup_ssl_cert(p, r, xs, var+7);
451 else if (ssl != NULL && strlen(var) > 7 && strcEQn(var, "SERVER_", 7)) {
453 result = ssl_var_lookup_ssl_cert(p, r, xs, var+7);
459 else if (ssl != NULL && strcEQ(var, "COMPRESS_METHOD")) {
463 else if (ssl != NULL && strcEQ(var, "TLS_SNI")) {
468 else if (ssl != NULL && strcEQ(var, "SECURE_RENEG")) {
476 else if (ssl != NULL && strcEQ(var, "SRP_USER")) {
481 else if (ssl != NULL && strcEQ(var, "SRP_USERINFO")) {
525 char *var)
535 if (strcEQ(var, "M_VERSION")) {
539 else if (strcEQ(var, "M_SERIAL")) {
542 else if (strcEQ(var, "V_START")) {
545 else if (strcEQ(var, "V_END")) {
548 else if (strcEQ(var, "V_REMAIN")) {
552 else if (*var && strcEQ(var+1, "_DN")) {
553 if (*var == 'S')
555 else if (*var == 'I')
562 else if (strlen(var) > 5 && strcEQn(var+1, "_DN_", 4)) {
563 if (*var == 'S')
565 else if (*var == 'I')
569 result = ssl_var_lookup_ssl_cert_dn(p, xsname, var+5);
572 else if (strlen(var) > 4 && strcEQn(var, "SAN_", 4)) {
573 result = ssl_var_lookup_ssl_cert_san(p, xs, var+4);
576 else if (strcEQ(var, "A_SIG")) {
582 else if (strcEQ(var, "A_KEY")) {
588 else if (strcEQ(var, "CERT")) {
624 static char *ssl_var_lookup_ssl_cert_dn(apr_pool_t *p, X509_NAME *xsname, char *var)
632 ptr = strchr(var, '_');
635 varlen = ptr - var;
637 varlen = strlen(var);
643 if (strEQn(var, ssl_var_lookup_ssl_cert_dn_rec[i].name, varlen)
664 static char *ssl_var_lookup_ssl_cert_san(apr_pool_t *p, X509 *xs, char *var)
669 if (strcEQn(var, "Email_", 6)) {
671 var += 6;
673 else if (strcEQn(var, "DNS_", 4)) {
675 var += 4;
681 numlen = strspn(var, "0123456789");
682 if ((numlen < 1) || (numlen > 4) || (numlen != strlen(var)))
685 if (SSL_X509_getSAN(p, xs, type, atoi(var), &entries))
770 static char *ssl_var_lookup_ssl_cert_chain(apr_pool_t *p, STACK_OF(X509) *sk, char *var)
778 if (strspn(var, "0123456789") == strlen(var)) {
779 n = atoi(var);
873 static char *ssl_var_lookup_ssl_cipher(apr_pool_t *p, conn_rec *c, char *var)
887 if (ssl && strEQ(var, "")) {
891 else if (strcEQ(var, "_EXPORT"))
893 else if (strcEQ(var, "_USEKEYSIZE")) {
897 else if (strcEQ(var, "_ALGKEYSIZE")) {
919 static char *ssl_var_lookup_ssl_version(apr_pool_t *p, char *var)
921 if (strEQ(var, "INTERFACE")) {
924 else if (strEQ(var, "LIBRARY_INTERFACE")) {
927 else if (strEQ(var, "LIBRARY")) {