diff options
Diffstat (limited to 'modules/aaa')
-rw-r--r-- | modules/aaa/mod_access.c | 6 | ||||
-rw-r--r-- | modules/aaa/mod_auth.c | 8 | ||||
-rw-r--r-- | modules/aaa/mod_auth_db.c | 2 | ||||
-rw-r--r-- | modules/aaa/mod_auth_dbm.c | 2 | ||||
-rw-r--r-- | modules/aaa/mod_auth_digest.c | 58 |
5 files changed, 38 insertions, 38 deletions
diff --git a/modules/aaa/mod_access.c b/modules/aaa/mod_access.c index 1e19955e2a..10ddd77e93 100644 --- a/modules/aaa/mod_access.c +++ b/modules/aaa/mod_access.c @@ -127,8 +127,8 @@ static void *create_access_dir_config(apr_pool_t *p, char *dummy) for (i = 0; i < METHODS; ++i) conf->order[i] = DENY_THEN_ALLOW; - conf->allows = apr_make_array(p, 1, sizeof(allowdeny)); - conf->denys = apr_make_array(p, 1, sizeof(allowdeny)); + conf->allows = apr_array_make(p, 1, sizeof(allowdeny)); + conf->denys = apr_array_make(p, 1, sizeof(allowdeny)); return (void *) conf; } @@ -172,7 +172,7 @@ static const char *allow_cmd(cmd_parms *cmd, void *dv, const char *from, if (strcasecmp(from, "from")) return "allow and deny must be followed by 'from'"; - a = (allowdeny *) apr_push_array(cmd->info ? d->allows : d->denys); + a = (allowdeny *) apr_array_push(cmd->info ? d->allows : d->denys); a->x.from = where; a->limited = cmd->limited; diff --git a/modules/aaa/mod_auth.c b/modules/aaa/mod_auth.c index e3b61afa32..9cd7c526bd 100644 --- a/modules/aaa/mod_auth.c +++ b/modules/aaa/mod_auth.c @@ -153,7 +153,7 @@ static char *get_pw(request_rec *r, char *user, char *auth_pwfile) static apr_table_t *groups_for_user(apr_pool_t *p, char *user, char *grpfile) { configfile_t *f; - apr_table_t *grps = apr_make_table(p, 15); + apr_table_t *grps = apr_table_make(p, 15); apr_pool_t *sp; char l[MAX_STRING_LEN]; const char *group_name, *ll, *w; @@ -165,7 +165,7 @@ static apr_table_t *groups_for_user(apr_pool_t *p, char *user, char *grpfile) return NULL; } - apr_create_pool(&sp, p); + apr_pool_create(&sp, p); while (!(ap_cfg_getline(l, MAX_STRING_LEN, f))) { if ((l[0] == '#') || (!l[0])) @@ -184,7 +184,7 @@ static apr_table_t *groups_for_user(apr_pool_t *p, char *user, char *grpfile) } } ap_cfg_closefile(f); - apr_destroy_pool(sp); + apr_pool_destroy(sp); return grps; } @@ -225,7 +225,7 @@ static int authenticate_basic_user(request_rec *r) ap_note_basic_auth_failure(r); return HTTP_UNAUTHORIZED; } - invalid_pw = apr_validate_password(sent_pw, real_pw); + invalid_pw = apr_password_validate(sent_pw, real_pw); if (invalid_pw != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r, "user %s: authentication failure for \"%s\": " diff --git a/modules/aaa/mod_auth_db.c b/modules/aaa/mod_auth_db.c index d755c8b3c3..efde731acd 100644 --- a/modules/aaa/mod_auth_db.c +++ b/modules/aaa/mod_auth_db.c @@ -319,7 +319,7 @@ static int db_authenticate_basic_user(request_rec *r) *colon_pw = '\0'; } - invalid_pw = apr_validate_password(sent_pw, real_pw); + invalid_pw = apr_password_validate(sent_pw, real_pw); if (invalid_pw != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r, diff --git a/modules/aaa/mod_auth_dbm.c b/modules/aaa/mod_auth_dbm.c index e8edb73491..a6bd82a484 100644 --- a/modules/aaa/mod_auth_dbm.c +++ b/modules/aaa/mod_auth_dbm.c @@ -259,7 +259,7 @@ static int dbm_authenticate_basic_user(request_rec *r) if (colon_pw) { *colon_pw = '\0'; } - invalid_pw = apr_validate_password(sent_pw, real_pw); + invalid_pw = apr_password_validate(sent_pw, real_pw); if (invalid_pw != APR_SUCCESS) { ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, 0, r, "DBM user %s: authentication failure for \"%s\": " diff --git a/modules/aaa/mod_auth_digest.c b/modules/aaa/mod_auth_digest.c index 720894e2fb..12952786c1 100644 --- a/modules/aaa/mod_auth_digest.c +++ b/modules/aaa/mod_auth_digest.c @@ -139,13 +139,13 @@ void *apr_shm_calloc(apr_shmem_t *shared, apr_size_t size) { apr_status_t apr_shm_free(apr_shmem_t *shared, void *free) { return APR_ENOTIMPL; } -apr_status_t apr_get_shm_name(apr_shmem_t *c, apr_shm_name_t **name) { +apr_status_t apr_shm_name_get(apr_shmem_t *c, apr_shm_name_t **name) { return APR_ENOTIMPL; } -apr_status_t apr_set_shm_name(apr_shmem_t *c, apr_shm_name_t *name) { +apr_status_t apr_shm_name_set(apr_shmem_t *c, apr_shm_name_t *name) { return APR_ENOTIMPL; } -apr_status_t apr_open_shmem(apr_shmem_t *c) { +apr_status_t apr_shm_open(apr_shmem_t *c) { return APR_ENOTIMPL; } apr_status_t apr_shm_avail(apr_shmem_t *c, apr_size_t *avail) { @@ -280,12 +280,12 @@ static apr_status_t cleanup_tables(void *not_used) } if (client_lock) { - apr_destroy_lock(client_lock); + apr_lock_destroy(client_lock); client_lock = NULL; } if (opaque_lock) { - apr_destroy_lock(opaque_lock); + apr_lock_destroy(opaque_lock); opaque_lock = NULL; } @@ -348,7 +348,7 @@ static void initialize_tables(server_rec *s, apr_pool_t *ctx) client_list->num_entries = 0; tmpnam(client_lock_name); - sts = apr_create_lock(&client_lock, APR_READWRITE, APR_LOCKALL, + sts = apr_lock_create(&client_lock, APR_READWRITE, APR_LOCKALL, client_lock_name, ctx); if (sts != APR_SUCCESS) { log_error_and_cleanup("failed to create lock", sts, s); @@ -366,7 +366,7 @@ static void initialize_tables(server_rec *s, apr_pool_t *ctx) *opaque_cntr = 1UL; tmpnam(opaque_lock_name); - sts = apr_create_lock(&opaque_lock, APR_MUTEX, APR_LOCKALL, + sts = apr_lock_create(&opaque_lock, APR_MUTEX, APR_LOCKALL, opaque_lock_name, ctx); if (sts != APR_SUCCESS) { log_error_and_cleanup("failed to create lock", sts, s); @@ -418,7 +418,7 @@ static void initialize_module(apr_pool_t *p, apr_pool_t *plog, * creating a creeping memory leak. */ initialize_tables(s, p); - apr_register_cleanup(p, NULL, cleanup_tables, apr_null_cleanup); + apr_pool_cleanup_register(p, NULL, cleanup_tables, apr_pool_cleanup_null); #endif /* APR_HAS_SHARED_MEMORY */ } @@ -429,9 +429,9 @@ static void initialize_child(apr_pool_t *p, server_rec *s) if (!client_shm) return; - if ((sts = apr_child_init_lock(&client_lock, client_lock_name, p)) + if ((sts = apr_lock_child_init(&client_lock, client_lock_name, p)) != APR_SUCCESS - || (sts = apr_child_init_lock(&opaque_lock, opaque_lock_name, p)) + || (sts = apr_lock_child_init(&opaque_lock, opaque_lock_name, p)) != APR_SUCCESS) { log_error_and_cleanup("failed to create lock", sts, s); return; @@ -475,9 +475,9 @@ static const char *set_realm(cmd_parms *cmd, void *config, const char *realm) * the host:port would be too, but that varies for .htaccess files * and directives outside a virtual host section) */ - apr_SHA1Init(&conf->nonce_ctx); - apr_SHA1Update_binary(&conf->nonce_ctx, secret, sizeof(secret)); - apr_SHA1Update_binary(&conf->nonce_ctx, (const unsigned char *) realm, + apr_sha1_init(&conf->nonce_ctx); + apr_sha1_update_binary(&conf->nonce_ctx, secret, sizeof(secret)); + apr_sha1_update_binary(&conf->nonce_ctx, (const unsigned char *) realm, strlen(realm)); return DECLINE_CMD; @@ -721,7 +721,7 @@ static client_entry *get_client(unsigned long key, const request_rec *r) bucket = key % client_list->tbl_len; entry = client_list->table[bucket]; - apr_lock(client_lock /*, MM_LOCK_RD */); + apr_lock_aquire(client_lock /*, MM_LOCK_RD */); while(entry && key != entry->key) { prev = entry; @@ -734,7 +734,7 @@ static client_entry *get_client(unsigned long key, const request_rec *r) client_list->table[bucket] = entry; } - apr_unlock(client_lock); + apr_lock_release(client_lock); if (entry) ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_DEBUG, 0, r, @@ -798,7 +798,7 @@ static client_entry *add_client(unsigned long key, client_entry *info, bucket = key % client_list->tbl_len; entry = client_list->table[bucket]; - apr_lock(client_lock /*, MM_LOCK_RW */); + apr_lock_aquire(client_lock /*, MM_LOCK_RW */); /* try to allocate a new entry */ @@ -824,7 +824,7 @@ static client_entry *add_client(unsigned long key, client_entry *info, client_list->num_created++; client_list->num_entries++; - apr_unlock(client_lock); + apr_lock_release(client_lock); ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_DEBUG, 0, s, "allocated new client %lu", key); @@ -992,16 +992,16 @@ static void gen_nonce_hash(char *hash, const char *timestr, const char *opaque, memcpy(&ctx, &conf->nonce_ctx, sizeof(ctx)); /* - apr_SHA1Update_binary(&ctx, (const unsigned char *) server->server_hostname, + apr_sha1_update_binary(&ctx, (const unsigned char *) server->server_hostname, strlen(server->server_hostname)); - apr_SHA1Update_binary(&ctx, (const unsigned char *) &server->port, + apr_sha1_update_binary(&ctx, (const unsigned char *) &server->port, sizeof(server->port)); */ - apr_SHA1Update_binary(&ctx, (const unsigned char *) timestr, strlen(timestr)); + apr_sha1_update_binary(&ctx, (const unsigned char *) timestr, strlen(timestr)); if (opaque) - apr_SHA1Update_binary(&ctx, (const unsigned char *) opaque, + apr_sha1_update_binary(&ctx, (const unsigned char *) opaque, strlen(opaque)); - apr_SHA1Final(sha1, &ctx); + apr_sha1_final(sha1, &ctx); for (idx=0; idx<APR_SHA1_DIGESTSIZE; idx++) { *hash++ = hex[sha1[idx] >> 4]; @@ -1031,7 +1031,7 @@ static const char *gen_nonce(apr_pool_t *p, apr_time_t now, const char *opaque, t.time = (*otn_counter)++; else t.time = 42; - len = apr_base64encode_binary(nonce, t.arr, sizeof(t.arr)); + len = apr_base64_encode_binary(nonce, t.arr, sizeof(t.arr)); gen_nonce_hash(nonce+NONCE_TIME_LEN, nonce, opaque, server, conf); return nonce; @@ -1053,9 +1053,9 @@ static client_entry *gen_client(const request_rec *r) if (!opaque_cntr) return NULL; - apr_lock(opaque_lock /*, MM_LOCK_RW */); + apr_lock_aquire(opaque_lock /*, MM_LOCK_RW */); op = (*opaque_cntr)++; - apr_unlock(opaque_lock); + apr_lock_release(opaque_lock); if (!(entry = add_client(op, &new_entry, r->server))) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, @@ -1408,7 +1408,7 @@ static int check_nonce(request_rec *r, digest_header_rec *resp, tmp = resp->nonce[NONCE_TIME_LEN]; resp->nonce[NONCE_TIME_LEN] = '\0'; - len = apr_base64decode_binary(nonce_time.arr, resp->nonce); + len = apr_base64_decode_binary(nonce_time.arr, resp->nonce); gen_nonce_hash(hash, resp->nonce, resp->opaque, r->server, conf); resp->nonce[NONCE_TIME_LEN] = tmp; resp->nonce_time = nonce_time.time; @@ -1768,7 +1768,7 @@ static apr_table_t *groups_for_user(request_rec *r, const char *user, const char *grpfile) { configfile_t *f; - apr_table_t *grps = apr_make_table(r->pool, 15); + apr_table_t *grps = apr_table_make(r->pool, 15); apr_pool_t *sp; char l[MAX_STRING_LEN]; const char *group_name, *ll, *w; @@ -1780,7 +1780,7 @@ static apr_table_t *groups_for_user(request_rec *r, const char *user, return NULL; } - if (apr_create_pool(&sp, r->pool) != APR_SUCCESS) + if (apr_pool_create(&sp, r->pool) != APR_SUCCESS) return NULL; while (!(ap_cfg_getline(l, MAX_STRING_LEN, f))) { @@ -1801,7 +1801,7 @@ static apr_table_t *groups_for_user(request_rec *r, const char *user, } ap_cfg_closefile(f); - apr_destroy_pool(sp); + apr_pool_destroy(sp); return grps; } |