Changeset 25dad18 in mod_gnutls


Ignore:
Timestamp:
Dec 10, 2007, 5:49:20 PM (12 years ago)
Author:
Nokis Mavrogiannopoulos <nmav@…>
Branches:
debian/master, debian/stretch-backports, jessie-backports, master, msva, upstream
Children:
619953c
Parents:
c0a2ae1
git-author:
Nikos Mavrogiannopoulos <nmav@…> (12/10/07 17:49:20)
git-committer:
Nokis Mavrogiannopoulos <nmav@…> (12/10/07 17:49:20)
Message:
 
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • README.ENV

    rc0a2ae1 r25dad18  
    2020SSL_CLIENT_S_DN: The distinguished name of client's certificate in RFC2253 format.
    2121SSL_CLIENT_I_DN: The distinguished name of client's issuer certificate in RFC2253 format.
    22 SSL_CLIENT_S_SAN%: These will contain the alternative names of the client certificate
     22SSL_CLIENT_S_AN%: These will contain the alternative names of the client certificate
    2323  (% is a number starting from zero). The values will be prepended by "DNSNAME:",
    2424  "RFC822NAME:" or "URI:" depending on the type. If it is not supported the value
     
    3131SSL_CLIENT_VERIFY:
    3232  whether the client's certificate was verified. (NONE if none was sent, or SUCCESS or FAILED)
    33 SSL_CLIENT_S_TYPE: The certificate type can be X.509 or OPENPGP.
     33SSL_CLIENT_CERT_TYPE: The certificate type can be X.509 or OPENPGP.
    3434
    3535SSL_SERVER_V_START: The activation time of server's certificate.
     
    3737SSL_SERVER_S_DN: The distinguished name of the server's certificate in RFC2253 format.
    3838SSL_SERVER_I_DN: The distinguished name of the server's issuer certificate in RFC2253 format.
    39 SSL_SERVER_S_SAN%: These will contain the alternative names of the server certificate
     39SSL_SERVER_S_AN%: These will contain the alternative names of the server certificate
    4040  (% is a number starting from zero). The values will be prepended by "DNSNAME:",
    4141  "RFC822NAME:" or "URI:" depending on the type. If it is not supported the value
     
    4646SSL_SERVER_A_KEY: The public key algorithm in server's certificate.
    4747SSL_SERVER_CERT: The PEM-encoded server certificate
    48 SSL_SERVER_S_TYPE: The certificate type can be X.509 or OPENPGP.
     48SSL_SERVER_CERT_TYPE: The certificate type can be X.509 or OPENPGP.
    4949
  • src/gnutls_hooks.c

    rc0a2ae1 r25dad18  
    794794
    795795    apr_table_setn(env,
     796       apr_pstrcat(r->pool, MGS_SIDE, "_CERT_TYPE", NULL), "X.509");
     797#ifdef COMPAT
     798    apr_table_setn(env,
    796799       apr_pstrcat(r->pool, MGS_SIDE, "_S_TYPE", NULL), "X.509");
     800#endif
    797801
    798802    tmp =
     
    836840            if (ret == GNUTLS_SAN_DNSNAME) {
    837841                apr_table_setn(env,
    838                        apr_psprintf(r->pool, "%s_S_SAN%u", MGS_SIDE, i),
     842                       apr_psprintf(r->pool, "%s_S_AN%u", MGS_SIDE, i),
    839843                       apr_psprintf(r->pool, "DNSNAME:%s", tmp2));
    840844            } else if (ret == GNUTLS_SAN_RFC822NAME) {
    841845                apr_table_setn(env,
    842                        apr_psprintf(r->pool, "%s_S_SAN%u", MGS_SIDE, i),
     846                       apr_psprintf(r->pool, "%s_S_AN%u", MGS_SIDE, i),
    843847                       apr_psprintf(r->pool, "RFC822NAME:%s", tmp2));
    844848            } else if (ret == GNUTLS_SAN_URI) {
    845849                apr_table_setn(env,
    846                        apr_psprintf(r->pool, "%s_S_SAN%u", MGS_SIDE, i),
     850                       apr_psprintf(r->pool, "%s_S_AN%u", MGS_SIDE, i),
    847851                       apr_psprintf(r->pool, "URI:%s", tmp2));
    848852            } else {
    849853                apr_table_setn(env,
    850                        apr_psprintf(r->pool, "%s_S_SAN%u", MGS_SIDE, i),
     854                       apr_psprintf(r->pool, "%s_S_AN%u", MGS_SIDE, i),
    851855                       "UNSUPPORTED");
    852856            }
Note: See TracChangeset for help on using the changeset viewer.