diff options
author | Edward Rudd | 2004-03-05 00:30:58 +0000 |
---|---|---|
committer | Edward Rudd | 2004-03-05 00:30:58 +0000 |
commit | 6ad58b7d5c5d0ca53ec644021f0108811bceac4a (patch) | |
tree | 5556cfe9eed0c379b875d38eeac556a32f8b5f6d /mod_log_sql_ssl.c | |
parent | a3d0fadb9bbc2a70cac6d46b768822b1875a1811 (diff) |
updated compatability header for Apache 1.3
Changed log_error routing for Apache 1.3 to include APLOG_NOERRNO
re-added quarter second delay between reconnect and query retry.
updated makefile to generate HTML version of docbook docs.
added comments to mod_log_sql_mysql.c
updated documentation about --with-db-inc configure option
Diffstat (limited to 'mod_log_sql_ssl.c')
-rw-r--r-- | mod_log_sql_ssl.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/mod_log_sql_ssl.c b/mod_log_sql_ssl.c index fd68a7d..d65ca79 100644 --- a/mod_log_sql_ssl.c +++ b/mod_log_sql_ssl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $Id: mod_log_sql_ssl.c,v 1.6 2004/03/04 05:43:20 urkle Exp $ */ | 1 | /* $Id: mod_log_sql_ssl.c,v 1.7 2004/03/05 00:30:58 urkle Exp $ */ |
2 | /* mod_log_sql_ssl */ | 2 | /* mod_log_sql_ssl */ |
3 | 3 | ||
4 | #if defined(WITH_APACHE20) | 4 | #if defined(WITH_APACHE20) |
@@ -37,7 +37,7 @@ static const char *extract_ssl_keysize(request_rec *r, char *a) | |||
37 | if (TEST_SSL(r) != NULL) | 37 | if (TEST_SSL(r) != NULL) |
38 | { | 38 | { |
39 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER_USEKEYSIZE"); | 39 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER_USEKEYSIZE"); |
40 | log_error(APLOG_MARK,APLOG_DEBUG,0,r->server,"SSL_KEYSIZE: %s", result); | 40 | log_error(APLOG_MARK,APLOG_DEBUG,r->server,"SSL_KEYSIZE: %s", result); |
41 | if (result != NULL && result[0] == '\0') | 41 | if (result != NULL && result[0] == '\0') |
42 | result = NULL; | 42 | result = NULL; |
43 | return result; | 43 | return result; |
@@ -52,7 +52,7 @@ static const char *extract_ssl_maxkeysize(request_rec *r, char *a) | |||
52 | if (TEST_SSL(r) != NULL) | 52 | if (TEST_SSL(r) != NULL) |
53 | { | 53 | { |
54 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER_ALGKEYSIZE"); | 54 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER_ALGKEYSIZE"); |
55 | log_error(APLOG_MARK,APLOG_DEBUG,0,r->server,"SSL_ALGKEYSIZE: %s", result); | 55 | log_error(APLOG_MARK,APLOG_DEBUG,r->server,"SSL_ALGKEYSIZE: %s", result); |
56 | if (result != NULL && result[0] == '\0') | 56 | if (result != NULL && result[0] == '\0') |
57 | result = NULL; | 57 | result = NULL; |
58 | return result; | 58 | return result; |
@@ -67,7 +67,7 @@ static const char *extract_ssl_cipher(request_rec *r, char *a) | |||
67 | if (TEST_SSL(r) != NULL) | 67 | if (TEST_SSL(r) != NULL) |
68 | { | 68 | { |
69 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER"); | 69 | result = ssl_var_lookup(r->pool, r->server, r->connection, r, "SSL_CIPHER"); |
70 | log_error(APLOG_MARK,APLOG_DEBUG,0,r->server,"SSL_CIPHER: %s", result); | 70 | log_error(APLOG_MARK,APLOG_DEBUG,r->server,"SSL_CIPHER: %s", result); |
71 | if (result != NULL && result[0] == '\0') | 71 | if (result != NULL && result[0] == '\0') |
72 | result = NULL; | 72 | result = NULL; |
73 | return result; | 73 | return result; |