Skip to content

Commit 3bca8d4

Browse files
committed
Change names of HMAC feature to HASH
1 parent 76fc194 commit 3bca8d4

File tree

7 files changed

+162
-160
lines changed

7 files changed

+162
-160
lines changed

CHANGES

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
29 Oct 2012 - 2.7.1
22
-------------------
33

4+
* Changed "Encryption" name of directives and options related to hmac feature to "Hash".
5+
46
* Added a better random bytes generator using apr_generate_random_bytes() to create
57
the HMAC key.
68

apache2/apache2_config.c

Lines changed: 58 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ void *create_directory_config(apr_pool_t *mp, char *path)
6767

6868
dcfg->rule_inheritance = NOT_SET;
6969
dcfg->rule_exceptions = apr_array_make(mp, 16, sizeof(rule_exception *));
70-
dcfg->encryption_method = apr_array_make(mp, 16, sizeof(encryption_method *));
70+
dcfg->hash_method = apr_array_make(mp, 16, sizeof(hash_method *));
7171

7272
/* audit log variables */
7373
dcfg->auditlog_flag = NOT_SET;
@@ -139,8 +139,8 @@ void *create_directory_config(apr_pool_t *mp, char *path)
139139
dcfg->crypto_key_len = NOT_SET;
140140
dcfg->crypto_key_add = NOT_SET;
141141
dcfg->crypto_param_name = NOT_SET_P;
142-
dcfg->encryption_is_enabled = NOT_SET;
143-
dcfg->encryption_enforcement = NOT_SET;
142+
dcfg->hash_is_enabled = NOT_SET;
143+
dcfg->hash_enforcement = NOT_SET;
144144
dcfg->crypto_hash_href_rx = NOT_SET;
145145
dcfg->crypto_hash_faction_rx = NOT_SET;
146146
dcfg->crypto_hash_location_rx = NOT_SET;
@@ -446,8 +446,8 @@ void *merge_directory_configs(apr_pool_t *mp, void *_parent, void *_child)
446446
merged->rule_exceptions = apr_array_append(mp, parent->rule_exceptions,
447447
child->rule_exceptions);
448448

449-
merged->encryption_method = apr_array_append(mp, parent->encryption_method,
450-
child->encryption_method);
449+
merged->hash_method = apr_array_append(mp, parent->hash_method,
450+
child->hash_method);
451451

452452
/* audit log variables */
453453
merged->auditlog_flag = (child->auditlog_flag == NOT_SET
@@ -552,7 +552,7 @@ void *merge_directory_configs(apr_pool_t *mp, void *_parent, void *_child)
552552
merged->col_timeout = (child->col_timeout == NOT_SET
553553
? parent->col_timeout : child->col_timeout);
554554

555-
/* Encryption */
555+
/* Hash */
556556
merged->crypto_key = (child->crypto_key == NOT_SET_P
557557
? parent->crypto_key : child->crypto_key);
558558
merged->crypto_key_len = (child->crypto_key_len == NOT_SET
@@ -561,10 +561,10 @@ void *merge_directory_configs(apr_pool_t *mp, void *_parent, void *_child)
561561
? parent->crypto_key_add : child->crypto_key_add);
562562
merged->crypto_param_name = (child->crypto_param_name == NOT_SET_P
563563
? parent->crypto_param_name : child->crypto_param_name);
564-
merged->encryption_is_enabled = (child->encryption_is_enabled == NOT_SET
565-
? parent->encryption_is_enabled : child->encryption_is_enabled);
566-
merged->encryption_enforcement = (child->encryption_enforcement == NOT_SET
567-
? parent->encryption_enforcement : child->encryption_enforcement);
564+
merged->hash_is_enabled = (child->hash_is_enabled == NOT_SET
565+
? parent->hash_is_enabled : child->hash_is_enabled);
566+
merged->hash_enforcement = (child->hash_enforcement == NOT_SET
567+
? parent->hash_enforcement : child->hash_enforcement);
568568
merged->crypto_hash_href_rx = (child->crypto_hash_href_rx == NOT_SET
569569
? parent->crypto_hash_href_rx : child->crypto_hash_href_rx);
570570
merged->crypto_hash_faction_rx = (child->crypto_hash_faction_rx == NOT_SET
@@ -687,13 +687,13 @@ void init_directory_config(directory_config *dcfg)
687687

688688
if (dcfg->col_timeout == NOT_SET) dcfg->col_timeout = 3600;
689689

690-
/* Encryption */
690+
/* Hash */
691691
if (dcfg->crypto_key == NOT_SET_P) dcfg->crypto_key = getkey(dcfg->mp);
692692
if (dcfg->crypto_key_len == NOT_SET) dcfg->crypto_key_len = strlen(dcfg->crypto_key);
693-
if (dcfg->crypto_key_add == NOT_SET) dcfg->crypto_key_add = ENCRYPTION_KEYONLY;
693+
if (dcfg->crypto_key_add == NOT_SET) dcfg->crypto_key_add = HASH_KEYONLY;
694694
if (dcfg->crypto_param_name == NOT_SET_P) dcfg->crypto_param_name = "crypt";
695-
if (dcfg->encryption_is_enabled == NOT_SET) dcfg->encryption_is_enabled = ENCRYPTION_DISABLED;
696-
if (dcfg->encryption_enforcement == NOT_SET) dcfg->encryption_enforcement = ENCRYPTION_DISABLED;
695+
if (dcfg->hash_is_enabled == NOT_SET) dcfg->hash_is_enabled = HASH_DISABLED;
696+
if (dcfg->hash_enforcement == NOT_SET) dcfg->hash_enforcement = HASH_DISABLED;
697697
if (dcfg->crypto_hash_href_rx == NOT_SET) dcfg->crypto_hash_href_rx = 0;
698698
if (dcfg->crypto_hash_faction_rx == NOT_SET) dcfg->crypto_hash_faction_rx = 0;
699699
if (dcfg->crypto_hash_location_rx == NOT_SET) dcfg->crypto_hash_location_rx = 0;
@@ -2255,7 +2255,7 @@ static const char *cmd_sensor_id(cmd_parms *cmd, void *_dcfg, const char *p1)
22552255

22562256

22572257
/**
2258-
* \brief Add SecEncryption configuration option
2258+
* \brief Add SecHash configuration option
22592259
*
22602260
* \param cmd Pointer to configuration data
22612261
* \param _dcfg Pointer to directory configuration
@@ -2264,34 +2264,34 @@ static const char *cmd_sensor_id(cmd_parms *cmd, void *_dcfg, const char *p1)
22642264
* \retval NULL On failure
22652265
* \retval apr_psprintf On Success
22662266
*/
2267-
static const char *cmd_encryption_engine(cmd_parms *cmd, void *_dcfg, const char *p1)
2267+
static const char *cmd_hash_engine(cmd_parms *cmd, void *_dcfg, const char *p1)
22682268
{
22692269
directory_config *dcfg = (directory_config *)_dcfg;
22702270
if (dcfg == NULL) return NULL;
22712271

22722272
if (strcasecmp(p1, "on") == 0) {
2273-
dcfg->encryption_is_enabled = ENCRYPTION_ENABLED;
2274-
dcfg->encryption_enforcement = ENCRYPTION_ENABLED;
2273+
dcfg->hash_is_enabled = HASH_ENABLED;
2274+
dcfg->hash_enforcement = HASH_ENABLED;
22752275
}
22762276
else if (strcasecmp(p1, "off") == 0) {
2277-
dcfg->encryption_is_enabled = ENCRYPTION_DISABLED;
2278-
dcfg->encryption_enforcement = ENCRYPTION_DISABLED;
2277+
dcfg->hash_is_enabled = HASH_DISABLED;
2278+
dcfg->hash_enforcement = HASH_DISABLED;
22792279
}
22802280
else return apr_psprintf(cmd->pool, "ModSecurity: Invalid value for SecRuleEngine: %s", p1);
22812281

22822282
return NULL;
22832283
}
22842284

22852285
/**
2286-
* \brief Add SecEncryptionPram configuration option
2286+
* \brief Add SecHashPram configuration option
22872287
*
22882288
* \param cmd Pointer to configuration data
22892289
* \param _dcfg Pointer to directory configuration
22902290
* \param p1 Pointer to configuration option
22912291
*
22922292
* \retval NULL On success
22932293
*/
2294-
static const char *cmd_encryption_param(cmd_parms *cmd, void *_dcfg, const char *p1)
2294+
static const char *cmd_hash_param(cmd_parms *cmd, void *_dcfg, const char *p1)
22952295
{
22962296
directory_config *dcfg = (directory_config *)_dcfg;
22972297

@@ -2304,7 +2304,7 @@ static const char *cmd_encryption_param(cmd_parms *cmd, void *_dcfg, const char
23042304
}
23052305

23062306
/**
2307-
* \brief Add SecEncryptionKey configuration option
2307+
* \brief Add SecHashKey configuration option
23082308
*
23092309
* \param cmd Pointer to configuration data
23102310
* \param _dcfg Pointer to directory configuration
@@ -2313,7 +2313,7 @@ static const char *cmd_encryption_param(cmd_parms *cmd, void *_dcfg, const char
23132313
*
23142314
* \retval NULL On success
23152315
*/
2316-
static const char *cmd_encryption_key(cmd_parms *cmd, void *_dcfg, const char *_p1, const char *_p2)
2316+
static const char *cmd_hash_key(cmd_parms *cmd, void *_dcfg, const char *_p1, const char *_p2)
23172317
{
23182318
directory_config *dcfg = (directory_config *)_dcfg;
23192319
char *p1 = NULL;
@@ -2335,17 +2335,17 @@ static const char *cmd_encryption_key(cmd_parms *cmd, void *_dcfg, const char *_
23352335
return NULL;
23362336
} else {
23372337
if (strcasecmp(_p2, "KeyOnly") == 0)
2338-
dcfg->crypto_key_add = ENCRYPTION_KEYONLY;
2338+
dcfg->crypto_key_add = HASH_KEYONLY;
23392339
else if (strcasecmp(_p2, "SessionID") == 0)
2340-
dcfg->crypto_key_add = ENCRYPTION_SESSIONID;
2340+
dcfg->crypto_key_add = HASH_SESSIONID;
23412341
else if (strcasecmp(_p2, "RemoteIP") == 0)
2342-
dcfg->crypto_key_add = ENCRYPTION_REMOTEIP;
2342+
dcfg->crypto_key_add = HASH_REMOTEIP;
23432343
}
23442344
return NULL;
23452345
}
23462346

23472347
/**
2348-
* \brief Add SecEncryptionMethodPm configuration option
2348+
* \brief Add SecHashMethodPm configuration option
23492349
*
23502350
* \param cmd Pointer to configuration data
23512351
* \param _dcfg Pointer to directory configuration
@@ -2355,11 +2355,11 @@ static const char *cmd_encryption_key(cmd_parms *cmd, void *_dcfg, const char *_
23552355
* \retval NULL On failure
23562356
* \retval apr_psprintf On Success
23572357
*/
2358-
static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
2358+
static const char *cmd_hash_method_pm(cmd_parms *cmd, void *_dcfg,
23592359
const char *p1, const char *p2)
23602360
{
23612361
directory_config *dcfg = (directory_config *)_dcfg;
2362-
rule_exception *re = apr_pcalloc(cmd->pool, sizeof(encryption_method));
2362+
rule_exception *re = apr_pcalloc(cmd->pool, sizeof(hash_method));
23632363
const char *_p2 = apr_pstrdup(cmd->pool, p2);
23642364
ACMP *p = NULL;
23652365
const char *phrase = NULL;
@@ -2385,7 +2385,7 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
23852385
acmp_prepare(p);
23862386

23872387
if (strcasecmp(p1, "HashHref") == 0) {
2388-
re->type = ENCRYPTION_URL_HREF_HASH_PM;
2388+
re->type = HASH_URL_HREF_HASH_PM;
23892389
re->param = _p2;
23902390
re->param_data = (void *)p;
23912391
if (re->param_data == NULL) {
@@ -2394,7 +2394,7 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
23942394
dcfg->crypto_hash_href_pm = 1;
23952395
}
23962396
else if (strcasecmp(p1, "HashFormAction") == 0) {
2397-
re->type = ENCRYPTION_URL_FACTION_HASH_PM;
2397+
re->type = HASH_URL_FACTION_HASH_PM;
23982398
re->param = _p2;
23992399
re->param_data = (void *)p;
24002400
if (re->param_data == NULL) {
@@ -2403,7 +2403,7 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
24032403
dcfg->crypto_hash_faction_pm = 1;
24042404
}
24052405
else if (strcasecmp(p1, "HashLocation") == 0) {
2406-
re->type = ENCRYPTION_URL_LOCATION_HASH_PM;
2406+
re->type = HASH_URL_LOCATION_HASH_PM;
24072407
re->param = _p2;
24082408
re->param_data = (void *)p;
24092409
if (re->param_data == NULL) {
@@ -2412,7 +2412,7 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
24122412
dcfg->crypto_hash_location_pm = 1;
24132413
}
24142414
else if (strcasecmp(p1, "HashIframeSrc") == 0) {
2415-
re->type = ENCRYPTION_URL_IFRAMESRC_HASH_PM;
2415+
re->type = HASH_URL_IFRAMESRC_HASH_PM;
24162416
re->param = _p2;
24172417
re->param_data = (void *)p;
24182418
if (re->param_data == NULL) {
@@ -2421,7 +2421,7 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
24212421
dcfg->crypto_hash_iframesrc_pm = 1;
24222422
}
24232423
else if (strcasecmp(p1, "HashFrameSrc") == 0) {
2424-
re->type = ENCRYPTION_URL_FRAMESRC_HASH_PM;
2424+
re->type = HASH_URL_FRAMESRC_HASH_PM;
24252425
re->param = _p2;
24262426
re->param_data = (void *)p;
24272427
if (re->param_data == NULL) {
@@ -2430,13 +2430,13 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
24302430
dcfg->crypto_hash_framesrc_pm = 1;
24312431
}
24322432

2433-
*(encryption_method **)apr_array_push(dcfg->encryption_method) = re;
2433+
*(hash_method **)apr_array_push(dcfg->hash_method) = re;
24342434

24352435
return NULL;
24362436
}
24372437

24382438
/**
2439-
* \brief Add SecEncryptionMethodRx configuration option
2439+
* \brief Add SecHashMethodRx configuration option
24402440
*
24412441
* \param cmd Pointer to configuration data
24422442
* \param _dcfg Pointer to directory configuration
@@ -2446,16 +2446,16 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
24462446
* \retval NULL On failure
24472447
* \retval apr_psprintf On Success
24482448
*/
2449-
static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
2449+
static const char *cmd_hash_method_rx(cmd_parms *cmd, void *_dcfg,
24502450
const char *p1, const char *p2)
24512451
{
24522452
directory_config *dcfg = (directory_config *)_dcfg;
2453-
rule_exception *re = apr_pcalloc(cmd->pool, sizeof(encryption_method));
2453+
rule_exception *re = apr_pcalloc(cmd->pool, sizeof(hash_method));
24542454
const char *_p2 = apr_pstrdup(cmd->pool, p2);
24552455
if (dcfg == NULL) return NULL;
24562456

24572457
if (strcasecmp(p1, "HashHref") == 0) {
2458-
re->type = ENCRYPTION_URL_HREF_HASH_RX;
2458+
re->type = HASH_URL_HREF_HASH_RX;
24592459
re->param = _p2;
24602460
re->param_data = msc_pregcomp(cmd->pool, p2, 0, NULL, NULL);
24612461
if (re->param_data == NULL) {
@@ -2464,7 +2464,7 @@ static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
24642464
dcfg->crypto_hash_href_rx = 1;
24652465
}
24662466
else if (strcasecmp(p1, "HashFormAction") == 0) {
2467-
re->type = ENCRYPTION_URL_FACTION_HASH_RX;
2467+
re->type = HASH_URL_FACTION_HASH_RX;
24682468
re->param = _p2;
24692469
re->param_data = msc_pregcomp(cmd->pool, p2, 0, NULL, NULL);
24702470
if (re->param_data == NULL) {
@@ -2473,7 +2473,7 @@ static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
24732473
dcfg->crypto_hash_faction_rx = 1;
24742474
}
24752475
else if (strcasecmp(p1, "HashLocation") == 0) {
2476-
re->type = ENCRYPTION_URL_LOCATION_HASH_RX;
2476+
re->type = HASH_URL_LOCATION_HASH_RX;
24772477
re->param = _p2;
24782478
re->param_data = msc_pregcomp(cmd->pool, p2, 0, NULL, NULL);
24792479
if (re->param_data == NULL) {
@@ -2482,7 +2482,7 @@ static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
24822482
dcfg->crypto_hash_location_rx = 1;
24832483
}
24842484
else if (strcasecmp(p1, "HashIframeSrc") == 0) {
2485-
re->type = ENCRYPTION_URL_IFRAMESRC_HASH_RX;
2485+
re->type = HASH_URL_IFRAMESRC_HASH_RX;
24862486
re->param = _p2;
24872487
re->param_data = msc_pregcomp(cmd->pool, p2, 0, NULL, NULL);
24882488
if (re->param_data == NULL) {
@@ -2491,7 +2491,7 @@ static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
24912491
dcfg->crypto_hash_iframesrc_rx = 1;
24922492
}
24932493
else if (strcasecmp(p1, "HashFrameSrc") == 0) {
2494-
re->type = ENCRYPTION_URL_FRAMESRC_HASH_RX;
2494+
re->type = HASH_URL_FRAMESRC_HASH_RX;
24952495
re->param = _p2;
24962496
re->param_data = msc_pregcomp(cmd->pool, p2, 0, NULL, NULL);
24972497
if (re->param_data == NULL) {
@@ -2500,7 +2500,7 @@ static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
25002500
dcfg->crypto_hash_framesrc_rx = 1;
25012501
}
25022502

2503-
*(encryption_method **)apr_array_push(dcfg->encryption_method) = re;
2503+
*(hash_method **)apr_array_push(dcfg->hash_method) = re;
25042504

25052505
return NULL;
25062506
}
@@ -3203,19 +3203,19 @@ const command_rec module_directives[] = {
32033203
),
32043204

32053205
AP_INIT_TAKE2 (
3206-
"SecEncryptionMethodPm",
3207-
cmd_encryption_method_pm,
3206+
"SecHashMethodPm",
3207+
cmd_hash_method_pm,
32083208
NULL,
32093209
CMD_SCOPE_ANY,
3210-
"Encryption method and pattern"
3210+
"Hash method and pattern"
32113211
),
32123212

32133213
AP_INIT_TAKE2 (
3214-
"SecEncryptionMethodRx",
3215-
cmd_encryption_method_rx,
3214+
"SecHashMethodRx",
3215+
cmd_hash_method_rx,
32163216
NULL,
32173217
CMD_SCOPE_ANY,
3218-
"Encryption method and regex"
3218+
"Hash method and regex"
32193219
),
32203220

32213221
AP_INIT_TAKE2 (
@@ -3324,27 +3324,27 @@ const command_rec module_directives[] = {
33243324
),
33253325

33263326
AP_INIT_TAKE1 (
3327-
"SecEncryptionEngine",
3328-
cmd_encryption_engine,
3327+
"SecHashEngine",
3328+
cmd_hash_engine,
33293329
NULL,
33303330
CMD_SCOPE_ANY,
33313331
"On or Off"
33323332
),
33333333

33343334
AP_INIT_TAKE2 (
3335-
"SecEncryptionKey",
3336-
cmd_encryption_key,
3335+
"SecHashKey",
3336+
cmd_hash_key,
33373337
NULL,
33383338
CMD_SCOPE_ANY,
33393339
"Set Encrytion key"
33403340
),
33413341

33423342
AP_INIT_TAKE1 (
3343-
"SecEncryptionParam",
3344-
cmd_encryption_param,
3343+
"SecHashParam",
3344+
cmd_hash_param,
33453345
NULL,
33463346
CMD_SCOPE_ANY,
3347-
"Set Encryption parameter"
3347+
"Set Hash parameter"
33483348
),
33493349

33503350
{ NULL }

0 commit comments

Comments
 (0)