}
if (SSL_X509_getCN(ptemp, cert, &cn)) {
- int fnm_flags = FNM_PERIOD|FNM_CASE_BLIND;
+ int fnm_flags = APR_FNM_PERIOD|APR_FNM_CASE_BLIND;
if (apr_fnmatch_test(cn) &&
(apr_fnmatch(cn, s->server_hostname,
- fnm_flags) == FNM_NOMATCH))
+ fnm_flags) == APR_FNM_NOMATCH))
{
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s,
"%s server certificate wildcard CommonName (CN) `%s' "
SSLModConfigRec *mc = myModConfig(s);
apr_pool_t *p;
- apr_pool_sub_make(&p, mc->pPool, NULL);
+ apr_pool_create_ex(&p, mc->pPool, NULL, NULL);
if (p != NULL) {
/* the correct way */
unlink(apr_pstrcat(p, mc->szSessionCacheDataFile, SSL_DBM_FILE_SUFFIX_DIR, NULL));
ssl_mutex_on(s);
for (;;) {
/* allocate the key array in a memory sub pool */
- apr_pool_sub_make(&p, mc->pPool, NULL);
+ apr_pool_create_ex(&p, mc->pPool, NULL, NULL);
if (p == NULL)
break;
if ((keylist = apr_palloc(p, sizeof(dbmkey)*KEYMAX)) == NULL) {