diff options
author | rcritten <> | 2007-10-18 18:26:21 +0000 |
---|---|---|
committer | rcritten <> | 2007-10-18 18:26:21 +0000 |
commit | 0c14c8a219244408ac4d4402a55d9c178fcf705c (patch) | |
tree | 529ff83fa940f5656dd4e828f56cfebe140f5aab /mod_nss.c | |
parent | 4aa4a80f1758caed8bfa43a286a4c08645c9523d (diff) | |
download | mod_nss-0c14c8a219244408ac4d4402a55d9c178fcf705c.tar.gz mod_nss-0c14c8a219244408ac4d4402a55d9c178fcf705c.tar.xz mod_nss-0c14c8a219244408ac4d4402a55d9c178fcf705c.zip |
If mod_ssl isn't loaded then register the hooks to mod_proxy so we can
do at least secure proxy in front of an unsecure host.
Diffstat (limited to 'mod_nss.c')
-rw-r--r-- | mod_nss.c | 14 |
1 files changed, 14 insertions, 0 deletions
@@ -200,6 +200,10 @@ int nss_proxy_enable(conn_rec *c) return 1; } +int ssl_proxy_enable(conn_rec *c) { + return nss_proxy_enable(c); +} + int nss_engine_disable(conn_rec *c) { SSLSrvConfigRec *sc = mySrvConfig(c->base_server); @@ -217,6 +221,10 @@ int nss_engine_disable(conn_rec *c) return 1; } +int ssl_engine_disable(conn_rec *c) { + return nss_engine_disable(c); +} + /* Callback for an incoming certificate that is not valid */ SECStatus NSSBadCertHandler(void *arg, PRFileDesc * socket) @@ -430,6 +438,12 @@ static void nss_register_hooks(apr_pool_t *p) APR_REGISTER_OPTIONAL_FN(nss_proxy_enable); APR_REGISTER_OPTIONAL_FN(nss_engine_disable); + + /* If mod_ssl is not loaded then mod_nss can work with mod_proxy */ + if (APR_RETRIEVE_OPTIONAL_FN(ssl_proxy_enable) == NULL) + APR_REGISTER_OPTIONAL_FN(ssl_proxy_enable); + if (APR_RETRIEVE_OPTIONAL_FN(ssl_engine_disable) == NULL) + APR_REGISTER_OPTIONAL_FN(ssl_engine_disable); } module AP_MODULE_DECLARE_DATA nss_module = { |