mod_ssl for apache 1.3.39

mod_ssl for apache 1.3.39

am 10.09.2007 14:42:22 von Pascal Nobus

Does anyone know that a new version of mod_ssl is under construction for
use with apache 1.3.39?
I tried to compile Apache-1.3.39 with mod_ssl for 1.3.37 but that kills
apache...

best regards,
Pascal
____________________________________________________________ __________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List modssl-users@modssl.org
Automated List Manager majordomo@modssl.org

Re: mod_ssl for apache 1.3.39

am 10.09.2007 15:08:20 von Jim Jagielski

Some of the patches in eapi.patch do not apply cleanly and are
rejected. This means that, unless you hand apply them, the
patch isn't complete and you core dump when mod_ssl is trying
to hook.

Pascal Nobus wrote:
>
> Does anyone know that a new version of mod_ssl is under construction for
> use with apache 1.3.39?
> I tried to compile Apache-1.3.39 with mod_ssl for 1.3.37 but that kills
> apache...
>
> best regards,
> Pascal
> ____________________________________________________________ __________
> Apache Interface to OpenSSL (mod_ssl) www.modssl.org
> User Support Mailing List modssl-users@modssl.org
> Automated List Manager majordomo@modssl.org
>


--
============================================================ ===============
Jim Jagielski [|] jim@jaguNET.com [|] http://www.jaguNET.com/
"If you can dodge a wrench, you can dodge a ball."
____________________________________________________________ __________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List modssl-users@modssl.org
Automated List Manager majordomo@modssl.org

Re: mod_ssl for apache 1.3.39

am 10.09.2007 21:31:08 von fischerdk

This is a multi-part message in MIME format.
--------------080207030205060002070408
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

I patched the EAPI patch to apply cleanly to 1.3.39. This should work
until a version is rolled for 1.3.39.

Cheers,

Doug

--------------080207030205060002070408
Content-Type: text/plain; x-mac-type="0"; x-mac-creator="0";
name="mod_ssl-2.8.28-1.3.39.patch"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;
filename="mod_ssl-2.8.28-1.3.39.patch"

diff -PurN mod_ssl-2.8.28-1.3.37/pkg.eapi/eapi.patch mod_ssl-2.8.28-1.3.39/pkg.eapi/eapi.patch
--- mod_ssl-2.8.28-1.3.37/pkg.eapi/eapi.patch 2007-09-10 13:31:38.000000000 -0400
+++ mod_ssl-2.8.28-1.3.39/pkg.eapi/eapi.patch 2007-09-10 13:36:27.000000000 -0400
@@ -1132,7 +1132,7 @@

/*
* The max child slot ever assigned, preserved across restarts. Necessary
-@@ -436,6 +439,30 @@
+@@ -471,6 +474,30 @@
}
}

@@ -1163,7 +1163,7 @@
#ifndef NETWARE
static APACHE_TLS int volatile exit_after_unblock = 0;
#endif
-@@ -1551,6 +1578,9 @@
+@@ -1588,6 +1615,9 @@
}

ap_bsetflag(save_req->connection->client, B_EOUT, 1);
@@ -1173,7 +1173,7 @@
ap_bclose(save_req->connection->client);

if (!ap_standalone)
-@@ -1559,6 +1589,9 @@
+@@ -1596,6 +1626,9 @@
}
else { /* abort the connection */
ap_bsetflag(current_conn->client, B_EOUT, 1);
@@ -1183,7 +1183,7 @@
ap_bclose(current_conn->client);
current_conn->aborted = 1;
}
-@@ -1880,10 +1913,16 @@
+@@ -1915,10 +1948,16 @@
/* Send any leftover data to the client, but never try to again */

if (ap_bflush(r->connection->client) == -1) {
@@ -1200,7 +1200,7 @@
ap_bsetflag(r->connection->client, B_EOUT, 1);

/* Close our half of the connection --- send the client a FIN */
-@@ -2582,6 +2621,9 @@
+@@ -2617,6 +2656,9 @@
/* Clear the pool - including any registered cleanups */
ap_destroy_pool(pglobal);
#endif
@@ -1210,7 +1210,7 @@
exit(code);
}

-@@ -3655,6 +3697,24 @@
+@@ -3711,6 +3753,24 @@
conn->remote_addr = *remaddr;
conn->remote_ip = ap_pstrdup(conn->pool,
inet_ntoa(conn->remote_addr.sin_addr));
@@ -1235,7 +1235,7 @@

return conn;
}
-@@ -4165,6 +4225,15 @@
+@@ -4221,6 +4281,15 @@
printf("Server's Module Magic Number: %u:%u\n",
MODULE_MAGIC_NUMBER_MAJOR, MODULE_MAGIC_NUMBER_MINOR);
printf("Server compiled with....\n");
@@ -1251,10 +1251,10 @@
#ifdef TPF
show_os_specific_compile_settings();
#endif
-@@ -4339,6 +4408,22 @@
- ap_server_pre_read_config = ap_make_array(pcommands, 1, sizeof(char *));
+@@ -4396,6 +4465,22 @@
ap_server_post_read_config = ap_make_array(pcommands, 1, sizeof(char *));
ap_server_config_defines = ap_make_array(pcommands, 1, sizeof(char *));
+ pid_table = ap_make_table(pglobal, HARD_SERVER_LIMIT);
+
+#ifdef EAPI
+ ap_hook_init();
@@ -1274,7 +1274,7 @@
}

#ifndef MULTITHREAD
-@@ -4835,6 +4920,9 @@
+@@ -4892,6 +4977,9 @@

ap_sync_scoreboard_image();
if (ap_scoreboard_image->global.running_generation != ap_my_generation) {
@@ -1284,7 +1284,7 @@
ap_bclose(conn_io);
clean_child_exit(0);
}
-@@ -4863,6 +4951,9 @@
+@@ -4920,6 +5008,9 @@
*/

#ifdef NO_LINGCLOSE
@@ -1294,7 +1294,7 @@
ap_bclose(conn_io); /* just close it */
#else
if (r && r->connection
-@@ -4873,6 +4964,9 @@
+@@ -4930,6 +5021,9 @@
lingering_close(r);
}
else {
@@ -1304,7 +1304,7 @@
ap_bsetflag(conn_io, B_EOUT, 1);
ap_bclose(conn_io);
}
-@@ -5656,16 +5750,31 @@
+@@ -5730,16 +5824,31 @@
usage(argv[0]);
}
}
@@ -1336,7 +1336,7 @@
}

child_timeouts = !ap_standalone || one_process;
-@@ -5813,6 +5922,10 @@
+@@ -5887,6 +5996,10 @@
ap_destroy_pool(r->pool);
}

@@ -1347,7 +1347,7 @@
ap_bclose(cio);
}
exit(0);
-@@ -6189,6 +6302,9 @@
+@@ -6263,6 +6376,9 @@
ap_kill_cleanups_for_socket(ptrans, csd);

#ifdef NO_LINGCLOSE
@@ -1357,7 +1357,7 @@
ap_bclose(conn_io); /* just close it */
#else
if (r && r->connection
-@@ -6199,6 +6315,9 @@
+@@ -6273,6 +6389,9 @@
lingering_close(r);
}
else {
@@ -1367,7 +1367,7 @@
ap_bsetflag(conn_io, B_EOUT, 1);
ap_bclose(conn_io);
}
-@@ -7774,6 +7893,10 @@
+@@ -7848,6 +7967,10 @@
if (!conf_specified)
ap_cpystrn(ap_server_confname, SERVER_CONFIG_FILE, sizeof(ap_server_confname));

@@ -1378,7 +1378,7 @@
if (!ap_os_is_path_absolute(ap_server_confname))
ap_cpystrn(ap_server_confname,
ap_server_root_relative(pcommands, ap_server_confname),
-@@ -7814,6 +7937,9 @@
+@@ -7888,6 +8011,9 @@
#else /* ndef WIN32 */
server_conf = ap_read_config(pconf, ptrans, ap_server_confname);
#endif
@@ -1598,26 +1598,29 @@
Index: src/modules/standard/mod_status.c
--- src/modules/standard/mod_status.c 28 Jul 2006 13:55:27 -0000 1.1.1.17
+++ src/modules/standard/mod_status.c 28 Jul 2006 13:56:29 -0000 1.14
-@@ -652,12 +678,23 @@
+@@ -653,6 +653,18 @@
ap_rprintf(r,
"??..reading.. \n\n");
else
+#ifndef NO_PRETTYPRINT
-+ ap_rprintf(r,
-+ "%s"
-+ "%s"
-+ "%s"
-+ "\n\n",
-+ score_record.client,
-+ vhost ? vhost->server_hostname : "(unavailable)",
-+ ap_escape_html(r->pool, score_record.request));
++ ap_rprintf(r,
++ "%s"
++ "%s"
++ "%s"
++ "\n\n",
++ score_record.client,
++ vhost ? vhost->server_hostname : "(unavailable)",
++ ap_escape_html(r->pool,
++ ap_escape_logitem(r->pool, score_record.request)));
+#else
++
ap_rprintf(r,
"%s%s%s\n\n",
ap_escape_html(r->pool, score_record.client),
- vhost ? ap_escape_html(r->pool,
+@@ -660,6 +672,7 @@
vhost->server_hostname) : "(unavailable)",
- ap_escape_html(r->pool, score_record.request));
+ ap_escape_html(r->pool,
+ ap_escape_logitem(r->pool, score_record.request)));
+#endif
} /* no_table_report */
} /* !short_report */
diff -PurN mod_ssl-2.8.28-1.3.37/pkg.sslmod/libssl.version mod_ssl-2.8.28-1.3.39/pkg.sslmod/libssl.version
--- mod_ssl-2.8.28-1.3.37/pkg.sslmod/libssl.version 2006-07-28 09:56:52.000000000 -0400
+++ mod_ssl-2.8.28-1.3.39/pkg.sslmod/libssl.version 2007-09-10 13:35:39.000000000 -0400
@@ -1 +1 @@
-mod_ssl/2.8.28-1.3.37
+mod_ssl/2.8.28-1.3.39

--------------080207030205060002070408--
____________________________________________________________ __________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List modssl-users@modssl.org
Automated List Manager majordomo@modssl.org