mod_ssl for apache 1.3.39

2007-09-10 Thread Pascal Nobus
Does anyone know that a new version of mod_ssl is under construction for
use with apache 1.3.39?
I tried to compile Apache-1.3.39 with mod_ssl for 1.3.37 but that kills
apache...

best regards,
Pascal
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  modssl-users@modssl.org
Automated List Manager[EMAIL PROTECTED]


Christa A. Packer/consolidated is out of the office.

2007-09-10 Thread Christa . Packer

I will be out of the office starting  09/07/2007 and will not return until
09/17/2007.

I will be out of the office for the next few days.  I will get back to you
when I return

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  modssl-users@modssl.org
Automated List Manager[EMAIL PROTECTED]


Re: mod_ssl for apache 1.3.39

2007-09-10 Thread Jim Jagielski
Some of the patches in eapi.patch do not apply cleanly and are
rejected. This means that, unless you hand apply them, the
patch isn't complete and you core dump when mod_ssl is trying
to hook.

Pascal Nobus wrote:
 
 Does anyone know that a new version of mod_ssl is under construction for
 use with apache 1.3.39?
 I tried to compile Apache-1.3.39 with mod_ssl for 1.3.37 but that kills
 apache...
 
 best regards,
 Pascal
 __
 Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
 User Support Mailing List  modssl-users@modssl.org
 Automated List Manager[EMAIL PROTECTED]
 


-- 
===
   Jim Jagielski   [|]   [EMAIL PROTECTED]   [|]   http://www.jaguNET.com/
If you can dodge a wrench, you can dodge a ball.
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  modssl-users@modssl.org
Automated List Manager[EMAIL PROTECTED]


Re: mod_ssl for apache 1.3.39

2007-09-10 Thread Douglas K. Fischer
I patched the EAPI patch to apply cleanly to 1.3.39. This should work
until a version is rolled for 1.3.39.

Cheers,

Doug
diff -PurN mod_ssl-2.8.28-1.3.37/pkg.eapi/eapi.patch 
mod_ssl-2.8.28-1.3.39/pkg.eapi/eapi.patch
--- mod_ssl-2.8.28-1.3.37/pkg.eapi/eapi.patch   2007-09-10 13:31:38.0 
-0400
+++ mod_ssl-2.8.28-1.3.39/pkg.eapi/eapi.patch   2007-09-10 13:36:27.0 
-0400
@@ -1132,7 +1132,7 @@
  
  /*
   * The max child slot ever assigned, preserved across restarts.  Necessary
-@@ -436,6 +439,30 @@
+@@ -471,6 +474,30 @@
  }
  }
  
@@ -1163,7 +1163,7 @@
  #ifndef NETWARE
  static APACHE_TLS int volatile exit_after_unblock = 0;
  #endif
-@@ -1551,6 +1578,9 @@
+@@ -1588,6 +1615,9 @@
}
  
ap_bsetflag(save_req-connection-client, B_EOUT, 1);
@@ -1173,7 +1173,7 @@
ap_bclose(save_req-connection-client);

if (!ap_standalone)
-@@ -1559,6 +1589,9 @@
+@@ -1596,6 +1626,9 @@
  }
  else {/* abort the connection */
ap_bsetflag(current_conn-client, B_EOUT, 1);
@@ -1183,7 +1183,7 @@
ap_bclose(current_conn-client);
current_conn-aborted = 1;
  }
-@@ -1880,10 +1913,16 @@
+@@ -1915,10 +1948,16 @@
  /* Send any leftover data to the client, but never try to again */
  
  if (ap_bflush(r-connection-client) == -1) {
@@ -1200,7 +1200,7 @@
  ap_bsetflag(r-connection-client, B_EOUT, 1);
  
  /* Close our half of the connection --- send the client a FIN */
-@@ -2582,6 +2621,9 @@
+@@ -2617,6 +2656,9 @@
  /* Clear the pool - including any registered cleanups */
  ap_destroy_pool(pglobal);
  #endif
@@ -1210,7 +1210,7 @@
  exit(code);
  }
  
-@@ -3655,6 +3697,24 @@
+@@ -3711,6 +3753,24 @@
  conn-remote_addr = *remaddr;
  conn-remote_ip = ap_pstrdup(conn-pool,
  inet_ntoa(conn-remote_addr.sin_addr));
@@ -1235,7 +1235,7 @@
  
  return conn;
  }
-@@ -4165,6 +4225,15 @@
+@@ -4221,6 +4281,15 @@
  printf(Server's Module Magic Number: %u:%u\n,
   MODULE_MAGIC_NUMBER_MAJOR, MODULE_MAGIC_NUMBER_MINOR);
  printf(Server compiled with\n);
@@ -1251,10 +1251,10 @@
  #ifdef TPF
  show_os_specific_compile_settings();
  #endif
-@@ -4339,6 +4408,22 @@
- ap_server_pre_read_config  = ap_make_array(pcommands, 1, sizeof(char *));
+@@ -4396,6 +4465,22 @@
  ap_server_post_read_config = ap_make_array(pcommands, 1, sizeof(char *));
  ap_server_config_defines   = ap_make_array(pcommands, 1, sizeof(char *));
+ pid_table  = ap_make_table(pglobal, HARD_SERVER_LIMIT);
 +
 +#ifdef EAPI
 +ap_hook_init();
@@ -1274,7 +1274,7 @@
  }
  
  #ifndef MULTITHREAD
-@@ -4835,6 +4920,9 @@
+@@ -4892,6 +4977,9 @@
  
ap_sync_scoreboard_image();
if (ap_scoreboard_image-global.running_generation != 
ap_my_generation) {
@@ -1284,7 +1284,7 @@
ap_bclose(conn_io);
clean_child_exit(0);
}
-@@ -4863,6 +4951,9 @@
+@@ -4920,6 +5008,9 @@
 */
  
  #ifdef NO_LINGCLOSE
@@ -1294,7 +1294,7 @@
ap_bclose(conn_io); /* just close it */
  #else
if (r  r-connection
-@@ -4873,6 +4964,9 @@
+@@ -4930,6 +5021,9 @@
lingering_close(r);
}
else {
@@ -1304,7 +1304,7 @@
ap_bsetflag(conn_io, B_EOUT, 1);
ap_bclose(conn_io);
}
-@@ -5656,16 +5750,31 @@
+@@ -5730,16 +5824,31 @@
usage(argv[0]);
}
  }
@@ -1336,7 +1336,7 @@
  }
  
  child_timeouts = !ap_standalone || one_process;
-@@ -5813,6 +5922,10 @@
+@@ -5887,6 +5996,10 @@
ap_destroy_pool(r-pool);
}
  
@@ -1347,7 +1347,7 @@
ap_bclose(cio);
  }
  exit(0);
-@@ -6189,6 +6302,9 @@
+@@ -6263,6 +6376,9 @@
ap_kill_cleanups_for_socket(ptrans, csd);
  
  #ifdef NO_LINGCLOSE
@@ -1357,7 +1357,7 @@
ap_bclose(conn_io); /* just close it */
  #else
if (r  r-connection
-@@ -6199,6 +6315,9 @@
+@@ -6273,6 +6389,9 @@
lingering_close(r);
}
else {
@@ -1367,7 +1367,7 @@
ap_bsetflag(conn_io, B_EOUT, 1);
ap_bclose(conn_io);
}
-@@ -7774,6 +7893,10 @@
+@@ -7848,6 +7967,10 @@
  if (!conf_specified)
  ap_cpystrn(ap_server_confname, SERVER_CONFIG_FILE, 
sizeof(ap_server_confname));
  
@@ -1378,7 +1378,7 @@
  if (!ap_os_is_path_absolute(ap_server_confname))
  ap_cpystrn(ap_server_confname,
 ap_server_root_relative(pcommands, ap_server_confname),
-@@ -7814,6 +7937,9 @@
+@@ -7888,6 +8011,9 @@
  #else /* ndef WIN32 */
  server_conf = ap_read_config(pconf, ptrans, ap_server_confname);
  #endif
@@ -1598,26 +1598,29 @@
 Index: src/modules/standard/mod_status.c
 --- src/modules/standard/mod_status.c  28 Jul 2006 13:55:27 -  1.1.1.17
 +++ src/modules/standard/mod_status.c  28 Jul 2006 13:56:29 -  1.14
-@@ -652,12 +678,23 @@
+@@ -653,6 +653,18 @@
ap_rprintf(r,
 

[ANNOUNCE] mod_ssl 2.8.29 for Apache 1.3.39

2007-09-10 Thread Ralf S. Engelschall
Apache 1.3.39 was released recently.
An updated mod_ssl 2.8.29 for Apache 1.3.39 is now available, too.
Find it on: http://www.modssl.org/

   Ralf S. Engelschall
   [EMAIL PROTECTED]
   www.engelschall.com

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
Official Announcement Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]