]> git.ipfire.org Git - thirdparty/apache/httpd.git/commitdiff
mod_ssl: follow up to r1877397: fix SSL_OP_NO_RENEGOT*I*ATION typo.
authorYann Ylavic <ylavic@apache.org>
Fri, 15 May 2020 21:14:36 +0000 (21:14 +0000)
committerYann Ylavic <ylavic@apache.org>
Fri, 15 May 2020 21:14:36 +0000 (21:14 +0000)
Should work better now :)

git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1877795 13f79535-47bb-0310-9956-ffa450edef68

modules/ssl/ssl_engine_kernel.c
modules/ssl/ssl_private.h
modules/ssl/ssl_util_ssl.c

index 924fe77b6463373dccd25c5febc30db33271b829..d2a8011294eb7ffda4843d628168b1b51b6c93d7 100644 (file)
@@ -2264,7 +2264,7 @@ static void log_tracing_state(const SSL *ssl, conn_rec *c,
 /*
  * This callback function is executed while OpenSSL processes the SSL
  * handshake and does SSL record layer stuff.  It's used to trap
- * client-initiated renegotiations (where SSL_OP_NO_RENEGOTATION is
+ * client-initiated renegotiations (where SSL_OP_NO_RENEGOTIATION is
  * not available), and for dumping everything to the log.
  */
 void ssl_callback_Info(const SSL *ssl, int where, int rc)
@@ -2277,12 +2277,12 @@ void ssl_callback_Info(const SSL *ssl, int where, int rc)
         return;
     }
 
-#ifndef SSL_OP_NO_RENEGOTATION
+#ifndef SSL_OP_NO_RENEGOTIATION
     /* With OpenSSL < 1.1.1 (implying TLS v1.2 or earlier), this
      * callback is used to block client-initiated renegotiation.  With
      * TLSv1.3 it is unnecessary since renegotiation is forbidden at
      * protocol level.  Otherwise (TLSv1.2 with OpenSSL >=1.1.1),
-     * SSL_OP_NO_RENEGOTATION is used to block renegotiation. */
+     * SSL_OP_NO_RENEGOTIATION is used to block renegotiation. */
     {
         SSLConnRec *sslconn;
 
index e7df7b4d888b55fc10c293dd6a79688d82d45473..8723207d21fc9444ca65dec3754d7b291bf19a18 100644 (file)
@@ -546,10 +546,10 @@ typedef struct {
         NON_SSL_SET_ERROR_MSG  /* Need to set the error message */
     } non_ssl_request;
 
-#ifndef SSL_OP_NO_RENEGOTATION
+#ifndef SSL_OP_NO_RENEGOTIATION
     /* For OpenSSL < 1.1.1, track the handshake/renegotiation state
      * for the connection to block client-initiated renegotiations.
-     * For OpenSSL >=1.1.1, the SSL_OP_NO_RENEGOTATION flag is used in
+     * For OpenSSL >=1.1.1, the SSL_OP_NO_RENEGOTIATION flag is used in
      * the SSL * options state with equivalent effect. */
     modssl_reneg_state reneg_state;
 #endif
index ef18f5e1f56ca9b7ea5c19d70e6bdcc73710adb2..2209ef44b27471be7c190067bfc5c9ca9a05344d 100644 (file)
@@ -514,13 +514,13 @@ char *modssl_SSL_SESSION_id2sz(IDCONST unsigned char *id, int idlen,
 
 void modssl_set_reneg_state(SSLConnRec *sslconn, modssl_reneg_state state)
 {
-#ifdef SSL_OP_NO_RENEGOTATION
+#ifdef SSL_OP_NO_RENEGOTIATION
     switch (state) {
     case RENEG_ALLOW:
-        SSL_clear_options(sslconn->ssl, SSL_OP_NO_RENEGOTATION);
+        SSL_clear_options(sslconn->ssl, SSL_OP_NO_RENEGOTIATION);
         break;
     default:
-        SSL_set_options(sslconn->ssl, SSL_OP_NO_RENEGOTATION);
+        SSL_set_options(sslconn->ssl, SSL_OP_NO_RENEGOTIATION);
         break;
     }
 #else