Skip to content
  1. Nov 01, 2002
  2. Oct 29, 2002
  3. Oct 27, 2002
  4. Oct 25, 2002
  5. Oct 22, 2002
  6. Oct 17, 2002
  7. Oct 14, 2002
  8. Oct 11, 2002
  9. Oct 01, 2002
  10. Sep 30, 2002
  11. Sep 28, 2002
  12. Sep 15, 2002
  13. Aug 21, 2002
  14. Jul 31, 2002
  15. Jul 17, 2002
  16. Jul 08, 2002
  17. Jun 30, 2002
  18. Jun 28, 2002
    • Justin Erenkrantz's avatar
      Add a filter_init function to the filters so that a filter can execute · a205c87a
      Justin Erenkrantz authored
      arbitrary code before the handlers are invoked.
      
      This resolves an issue with incorrect 304s on If-Modified-Since mod_include
      requests since ap_meets_conditions() is not aware that this is a dynamic
      request and it is not possible to satisfy 304 for these requests (unless
      xbithack full is on, of course).  When mod_include runs as a filter, it is
      too late to set any flag since the handler is responsible for calling
      ap_meets_conditions(), which it should do before generating any data.
      
      If a module doesn't need to run such arbitrary code, it can just pass NULL
      as the argument and all is well.
      
      PR:	9673
      Reviewed by:	Ryan Bloom and others
      
      
      git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk/modules/ssl@95906 13f79535-47bb-0310-9956-ffa450edef68
      a205c87a
  19. Jun 21, 2002
  20. Jun 17, 2002
    • William A. Rowe Jr's avatar
      · 974e2b8b
      William A. Rowe Jr authored
        These emits occur mainline, outside of the pphrase_callback, so we never
        opened readtty or writetty.  But they are absolute failures, nothing the
        user could do to deal with them.  They are logged in the ssl vhost's error
        log.
      
        In this case, I forgot my SSLCertificateKeyFile, so the server never
        tried the callback.  writetty wasn't initialized, so we segfaulted.
      
        This segfault is due to misconfig, not to the dialog with the user.
        This is the easiest fix (easier to read, too), but we shouldn't need
        to worry too much that the release is tagged.  If we retag, fine, then
        grab it, but it only addresses a config problem.
      
      
      git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk/modules/ssl@95734 13f79535-47bb-0310-9956-ffa450edef68
      974e2b8b
  21. Jun 11, 2002
  22. Jun 07, 2002
  23. Jun 06, 2002
  24. Jun 05, 2002
  25. Jun 04, 2002
  26. May 30, 2002
    • Cliff Woolley's avatar
      This definitely gets the award for least useful error message of the month. · 6d223f5f
      Cliff Woolley authored
      Not only should it just say "can't do that on win32," which is after all
      the bottom line, it was spitting out openssl error messages which were
      totally useless.  Eg:
      
      [30/May/2002 17:31:17 05760] [error] Init: PassPhraseDialog BuiltIn not
      supported in server private key from file
      F:/Apache/Apache2/conf/ssl/secure.key (OpenSSL library error follows)
      [30/May/2002 17:31:17 05760] [error] OpenSSL: error:0D084069:asn1
      encoding routines:d2i_ASN1_SET:bad tag
      [30/May/2002 17:31:17 05760] [error] OpenSSL: error:0D09D082:asn1
      encoding routines:d2i_RSAPrivateKey:parsing
      [30/May/2002 17:31:17 05760] [error] OpenSSL: error:0D09B00D:asn1
      encoding routines:d2i_PrivateKey:ASN1 lib
      
      Which is essentially saying "OpenSSL couldn't read your private key because
      it was encrypted, and we can't get the passphrase the way you asked us to
      on this platform."
      
      
      Brought to my attention by the inquiry of:  Chris Hsiang <chsiang@ivivos.com>
      
      
      git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk/modules/ssl@95415 13f79535-47bb-0310-9956-ffa450edef68
      6d223f5f
    • William A. Rowe Jr's avatar
      · fce0f7ec
      William A. Rowe Jr authored
        Based on DougM's feedback to the list...
      
      
      git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk/modules/ssl@95408 13f79535-47bb-0310-9956-ffa450edef68
      fce0f7ec