@@ -67,7 +67,7 @@ void *create_directory_config(apr_pool_t *mp, char *path)
67
67
68
68
dcfg -> rule_inheritance = NOT_SET ;
69
69
dcfg -> rule_exceptions = apr_array_make (mp , 16 , sizeof (rule_exception * ));
70
- dcfg -> encryption_method = apr_array_make (mp , 16 , sizeof (encryption_method * ));
70
+ dcfg -> hash_method = apr_array_make (mp , 16 , sizeof (hash_method * ));
71
71
72
72
/* audit log variables */
73
73
dcfg -> auditlog_flag = NOT_SET ;
@@ -139,8 +139,8 @@ void *create_directory_config(apr_pool_t *mp, char *path)
139
139
dcfg -> crypto_key_len = NOT_SET ;
140
140
dcfg -> crypto_key_add = NOT_SET ;
141
141
dcfg -> crypto_param_name = NOT_SET_P ;
142
- dcfg -> encryption_is_enabled = NOT_SET ;
143
- dcfg -> encryption_enforcement = NOT_SET ;
142
+ dcfg -> hash_is_enabled = NOT_SET ;
143
+ dcfg -> hash_enforcement = NOT_SET ;
144
144
dcfg -> crypto_hash_href_rx = NOT_SET ;
145
145
dcfg -> crypto_hash_faction_rx = NOT_SET ;
146
146
dcfg -> crypto_hash_location_rx = NOT_SET ;
@@ -446,8 +446,8 @@ void *merge_directory_configs(apr_pool_t *mp, void *_parent, void *_child)
446
446
merged -> rule_exceptions = apr_array_append (mp , parent -> rule_exceptions ,
447
447
child -> rule_exceptions );
448
448
449
- merged -> encryption_method = apr_array_append (mp , parent -> encryption_method ,
450
- child -> encryption_method );
449
+ merged -> hash_method = apr_array_append (mp , parent -> hash_method ,
450
+ child -> hash_method );
451
451
452
452
/* audit log variables */
453
453
merged -> auditlog_flag = (child -> auditlog_flag == NOT_SET
@@ -552,7 +552,7 @@ void *merge_directory_configs(apr_pool_t *mp, void *_parent, void *_child)
552
552
merged -> col_timeout = (child -> col_timeout == NOT_SET
553
553
? parent -> col_timeout : child -> col_timeout );
554
554
555
- /* Encryption */
555
+ /* Hash */
556
556
merged -> crypto_key = (child -> crypto_key == NOT_SET_P
557
557
? parent -> crypto_key : child -> crypto_key );
558
558
merged -> crypto_key_len = (child -> crypto_key_len == NOT_SET
@@ -561,10 +561,10 @@ void *merge_directory_configs(apr_pool_t *mp, void *_parent, void *_child)
561
561
? parent -> crypto_key_add : child -> crypto_key_add );
562
562
merged -> crypto_param_name = (child -> crypto_param_name == NOT_SET_P
563
563
? parent -> crypto_param_name : child -> crypto_param_name );
564
- merged -> encryption_is_enabled = (child -> encryption_is_enabled == NOT_SET
565
- ? parent -> encryption_is_enabled : child -> encryption_is_enabled );
566
- merged -> encryption_enforcement = (child -> encryption_enforcement == NOT_SET
567
- ? parent -> encryption_enforcement : child -> encryption_enforcement );
564
+ merged -> hash_is_enabled = (child -> hash_is_enabled == NOT_SET
565
+ ? parent -> hash_is_enabled : child -> hash_is_enabled );
566
+ merged -> hash_enforcement = (child -> hash_enforcement == NOT_SET
567
+ ? parent -> hash_enforcement : child -> hash_enforcement );
568
568
merged -> crypto_hash_href_rx = (child -> crypto_hash_href_rx == NOT_SET
569
569
? parent -> crypto_hash_href_rx : child -> crypto_hash_href_rx );
570
570
merged -> crypto_hash_faction_rx = (child -> crypto_hash_faction_rx == NOT_SET
@@ -687,13 +687,13 @@ void init_directory_config(directory_config *dcfg)
687
687
688
688
if (dcfg -> col_timeout == NOT_SET ) dcfg -> col_timeout = 3600 ;
689
689
690
- /* Encryption */
690
+ /* Hash */
691
691
if (dcfg -> crypto_key == NOT_SET_P ) dcfg -> crypto_key = getkey (dcfg -> mp );
692
692
if (dcfg -> crypto_key_len == NOT_SET ) dcfg -> crypto_key_len = strlen (dcfg -> crypto_key );
693
- if (dcfg -> crypto_key_add == NOT_SET ) dcfg -> crypto_key_add = ENCRYPTION_KEYONLY ;
693
+ if (dcfg -> crypto_key_add == NOT_SET ) dcfg -> crypto_key_add = HASH_KEYONLY ;
694
694
if (dcfg -> crypto_param_name == NOT_SET_P ) dcfg -> crypto_param_name = "crypt" ;
695
- if (dcfg -> encryption_is_enabled == NOT_SET ) dcfg -> encryption_is_enabled = ENCRYPTION_DISABLED ;
696
- if (dcfg -> encryption_enforcement == NOT_SET ) dcfg -> encryption_enforcement = ENCRYPTION_DISABLED ;
695
+ if (dcfg -> hash_is_enabled == NOT_SET ) dcfg -> hash_is_enabled = HASH_DISABLED ;
696
+ if (dcfg -> hash_enforcement == NOT_SET ) dcfg -> hash_enforcement = HASH_DISABLED ;
697
697
if (dcfg -> crypto_hash_href_rx == NOT_SET ) dcfg -> crypto_hash_href_rx = 0 ;
698
698
if (dcfg -> crypto_hash_faction_rx == NOT_SET ) dcfg -> crypto_hash_faction_rx = 0 ;
699
699
if (dcfg -> crypto_hash_location_rx == NOT_SET ) dcfg -> crypto_hash_location_rx = 0 ;
@@ -2255,7 +2255,7 @@ static const char *cmd_sensor_id(cmd_parms *cmd, void *_dcfg, const char *p1)
2255
2255
2256
2256
2257
2257
/**
2258
- * \brief Add SecEncryption configuration option
2258
+ * \brief Add SecHash configuration option
2259
2259
*
2260
2260
* \param cmd Pointer to configuration data
2261
2261
* \param _dcfg Pointer to directory configuration
@@ -2264,34 +2264,34 @@ static const char *cmd_sensor_id(cmd_parms *cmd, void *_dcfg, const char *p1)
2264
2264
* \retval NULL On failure
2265
2265
* \retval apr_psprintf On Success
2266
2266
*/
2267
- static const char * cmd_encryption_engine (cmd_parms * cmd , void * _dcfg , const char * p1 )
2267
+ static const char * cmd_hash_engine (cmd_parms * cmd , void * _dcfg , const char * p1 )
2268
2268
{
2269
2269
directory_config * dcfg = (directory_config * )_dcfg ;
2270
2270
if (dcfg == NULL ) return NULL ;
2271
2271
2272
2272
if (strcasecmp (p1 , "on" ) == 0 ) {
2273
- dcfg -> encryption_is_enabled = ENCRYPTION_ENABLED ;
2274
- dcfg -> encryption_enforcement = ENCRYPTION_ENABLED ;
2273
+ dcfg -> hash_is_enabled = HASH_ENABLED ;
2274
+ dcfg -> hash_enforcement = HASH_ENABLED ;
2275
2275
}
2276
2276
else if (strcasecmp (p1 , "off" ) == 0 ) {
2277
- dcfg -> encryption_is_enabled = ENCRYPTION_DISABLED ;
2278
- dcfg -> encryption_enforcement = ENCRYPTION_DISABLED ;
2277
+ dcfg -> hash_is_enabled = HASH_DISABLED ;
2278
+ dcfg -> hash_enforcement = HASH_DISABLED ;
2279
2279
}
2280
2280
else return apr_psprintf (cmd -> pool , "ModSecurity: Invalid value for SecRuleEngine: %s" , p1 );
2281
2281
2282
2282
return NULL ;
2283
2283
}
2284
2284
2285
2285
/**
2286
- * \brief Add SecEncryptionPram configuration option
2286
+ * \brief Add SecHashPram configuration option
2287
2287
*
2288
2288
* \param cmd Pointer to configuration data
2289
2289
* \param _dcfg Pointer to directory configuration
2290
2290
* \param p1 Pointer to configuration option
2291
2291
*
2292
2292
* \retval NULL On success
2293
2293
*/
2294
- static const char * cmd_encryption_param (cmd_parms * cmd , void * _dcfg , const char * p1 )
2294
+ static const char * cmd_hash_param (cmd_parms * cmd , void * _dcfg , const char * p1 )
2295
2295
{
2296
2296
directory_config * dcfg = (directory_config * )_dcfg ;
2297
2297
@@ -2304,7 +2304,7 @@ static const char *cmd_encryption_param(cmd_parms *cmd, void *_dcfg, const char
2304
2304
}
2305
2305
2306
2306
/**
2307
- * \brief Add SecEncryptionKey configuration option
2307
+ * \brief Add SecHashKey configuration option
2308
2308
*
2309
2309
* \param cmd Pointer to configuration data
2310
2310
* \param _dcfg Pointer to directory configuration
@@ -2313,7 +2313,7 @@ static const char *cmd_encryption_param(cmd_parms *cmd, void *_dcfg, const char
2313
2313
*
2314
2314
* \retval NULL On success
2315
2315
*/
2316
- static const char * cmd_encryption_key (cmd_parms * cmd , void * _dcfg , const char * _p1 , const char * _p2 )
2316
+ static const char * cmd_hash_key (cmd_parms * cmd , void * _dcfg , const char * _p1 , const char * _p2 )
2317
2317
{
2318
2318
directory_config * dcfg = (directory_config * )_dcfg ;
2319
2319
char * p1 = NULL ;
@@ -2335,17 +2335,17 @@ static const char *cmd_encryption_key(cmd_parms *cmd, void *_dcfg, const char *_
2335
2335
return NULL ;
2336
2336
} else {
2337
2337
if (strcasecmp (_p2 , "KeyOnly" ) == 0 )
2338
- dcfg -> crypto_key_add = ENCRYPTION_KEYONLY ;
2338
+ dcfg -> crypto_key_add = HASH_KEYONLY ;
2339
2339
else if (strcasecmp (_p2 , "SessionID" ) == 0 )
2340
- dcfg -> crypto_key_add = ENCRYPTION_SESSIONID ;
2340
+ dcfg -> crypto_key_add = HASH_SESSIONID ;
2341
2341
else if (strcasecmp (_p2 , "RemoteIP" ) == 0 )
2342
- dcfg -> crypto_key_add = ENCRYPTION_REMOTEIP ;
2342
+ dcfg -> crypto_key_add = HASH_REMOTEIP ;
2343
2343
}
2344
2344
return NULL ;
2345
2345
}
2346
2346
2347
2347
/**
2348
- * \brief Add SecEncryptionMethodPm configuration option
2348
+ * \brief Add SecHashMethodPm configuration option
2349
2349
*
2350
2350
* \param cmd Pointer to configuration data
2351
2351
* \param _dcfg Pointer to directory configuration
@@ -2355,11 +2355,11 @@ static const char *cmd_encryption_key(cmd_parms *cmd, void *_dcfg, const char *_
2355
2355
* \retval NULL On failure
2356
2356
* \retval apr_psprintf On Success
2357
2357
*/
2358
- static const char * cmd_encryption_method_pm (cmd_parms * cmd , void * _dcfg ,
2358
+ static const char * cmd_hash_method_pm (cmd_parms * cmd , void * _dcfg ,
2359
2359
const char * p1 , const char * p2 )
2360
2360
{
2361
2361
directory_config * dcfg = (directory_config * )_dcfg ;
2362
- rule_exception * re = apr_pcalloc (cmd -> pool , sizeof (encryption_method ));
2362
+ rule_exception * re = apr_pcalloc (cmd -> pool , sizeof (hash_method ));
2363
2363
const char * _p2 = apr_pstrdup (cmd -> pool , p2 );
2364
2364
ACMP * p = NULL ;
2365
2365
const char * phrase = NULL ;
@@ -2385,7 +2385,7 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
2385
2385
acmp_prepare (p );
2386
2386
2387
2387
if (strcasecmp (p1 , "HashHref" ) == 0 ) {
2388
- re -> type = ENCRYPTION_URL_HREF_HASH_PM ;
2388
+ re -> type = HASH_URL_HREF_HASH_PM ;
2389
2389
re -> param = _p2 ;
2390
2390
re -> param_data = (void * )p ;
2391
2391
if (re -> param_data == NULL ) {
@@ -2394,7 +2394,7 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
2394
2394
dcfg -> crypto_hash_href_pm = 1 ;
2395
2395
}
2396
2396
else if (strcasecmp (p1 , "HashFormAction" ) == 0 ) {
2397
- re -> type = ENCRYPTION_URL_FACTION_HASH_PM ;
2397
+ re -> type = HASH_URL_FACTION_HASH_PM ;
2398
2398
re -> param = _p2 ;
2399
2399
re -> param_data = (void * )p ;
2400
2400
if (re -> param_data == NULL ) {
@@ -2403,7 +2403,7 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
2403
2403
dcfg -> crypto_hash_faction_pm = 1 ;
2404
2404
}
2405
2405
else if (strcasecmp (p1 , "HashLocation" ) == 0 ) {
2406
- re -> type = ENCRYPTION_URL_LOCATION_HASH_PM ;
2406
+ re -> type = HASH_URL_LOCATION_HASH_PM ;
2407
2407
re -> param = _p2 ;
2408
2408
re -> param_data = (void * )p ;
2409
2409
if (re -> param_data == NULL ) {
@@ -2412,7 +2412,7 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
2412
2412
dcfg -> crypto_hash_location_pm = 1 ;
2413
2413
}
2414
2414
else if (strcasecmp (p1 , "HashIframeSrc" ) == 0 ) {
2415
- re -> type = ENCRYPTION_URL_IFRAMESRC_HASH_PM ;
2415
+ re -> type = HASH_URL_IFRAMESRC_HASH_PM ;
2416
2416
re -> param = _p2 ;
2417
2417
re -> param_data = (void * )p ;
2418
2418
if (re -> param_data == NULL ) {
@@ -2421,7 +2421,7 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
2421
2421
dcfg -> crypto_hash_iframesrc_pm = 1 ;
2422
2422
}
2423
2423
else if (strcasecmp (p1 , "HashFrameSrc" ) == 0 ) {
2424
- re -> type = ENCRYPTION_URL_FRAMESRC_HASH_PM ;
2424
+ re -> type = HASH_URL_FRAMESRC_HASH_PM ;
2425
2425
re -> param = _p2 ;
2426
2426
re -> param_data = (void * )p ;
2427
2427
if (re -> param_data == NULL ) {
@@ -2430,13 +2430,13 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
2430
2430
dcfg -> crypto_hash_framesrc_pm = 1 ;
2431
2431
}
2432
2432
2433
- * (encryption_method * * )apr_array_push (dcfg -> encryption_method ) = re ;
2433
+ * (hash_method * * )apr_array_push (dcfg -> hash_method ) = re ;
2434
2434
2435
2435
return NULL ;
2436
2436
}
2437
2437
2438
2438
/**
2439
- * \brief Add SecEncryptionMethodRx configuration option
2439
+ * \brief Add SecHashMethodRx configuration option
2440
2440
*
2441
2441
* \param cmd Pointer to configuration data
2442
2442
* \param _dcfg Pointer to directory configuration
@@ -2446,16 +2446,16 @@ static const char *cmd_encryption_method_pm(cmd_parms *cmd, void *_dcfg,
2446
2446
* \retval NULL On failure
2447
2447
* \retval apr_psprintf On Success
2448
2448
*/
2449
- static const char * cmd_encryption_method_rx (cmd_parms * cmd , void * _dcfg ,
2449
+ static const char * cmd_hash_method_rx (cmd_parms * cmd , void * _dcfg ,
2450
2450
const char * p1 , const char * p2 )
2451
2451
{
2452
2452
directory_config * dcfg = (directory_config * )_dcfg ;
2453
- rule_exception * re = apr_pcalloc (cmd -> pool , sizeof (encryption_method ));
2453
+ rule_exception * re = apr_pcalloc (cmd -> pool , sizeof (hash_method ));
2454
2454
const char * _p2 = apr_pstrdup (cmd -> pool , p2 );
2455
2455
if (dcfg == NULL ) return NULL ;
2456
2456
2457
2457
if (strcasecmp (p1 , "HashHref" ) == 0 ) {
2458
- re -> type = ENCRYPTION_URL_HREF_HASH_RX ;
2458
+ re -> type = HASH_URL_HREF_HASH_RX ;
2459
2459
re -> param = _p2 ;
2460
2460
re -> param_data = msc_pregcomp (cmd -> pool , p2 , 0 , NULL , NULL );
2461
2461
if (re -> param_data == NULL ) {
@@ -2464,7 +2464,7 @@ static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
2464
2464
dcfg -> crypto_hash_href_rx = 1 ;
2465
2465
}
2466
2466
else if (strcasecmp (p1 , "HashFormAction" ) == 0 ) {
2467
- re -> type = ENCRYPTION_URL_FACTION_HASH_RX ;
2467
+ re -> type = HASH_URL_FACTION_HASH_RX ;
2468
2468
re -> param = _p2 ;
2469
2469
re -> param_data = msc_pregcomp (cmd -> pool , p2 , 0 , NULL , NULL );
2470
2470
if (re -> param_data == NULL ) {
@@ -2473,7 +2473,7 @@ static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
2473
2473
dcfg -> crypto_hash_faction_rx = 1 ;
2474
2474
}
2475
2475
else if (strcasecmp (p1 , "HashLocation" ) == 0 ) {
2476
- re -> type = ENCRYPTION_URL_LOCATION_HASH_RX ;
2476
+ re -> type = HASH_URL_LOCATION_HASH_RX ;
2477
2477
re -> param = _p2 ;
2478
2478
re -> param_data = msc_pregcomp (cmd -> pool , p2 , 0 , NULL , NULL );
2479
2479
if (re -> param_data == NULL ) {
@@ -2482,7 +2482,7 @@ static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
2482
2482
dcfg -> crypto_hash_location_rx = 1 ;
2483
2483
}
2484
2484
else if (strcasecmp (p1 , "HashIframeSrc" ) == 0 ) {
2485
- re -> type = ENCRYPTION_URL_IFRAMESRC_HASH_RX ;
2485
+ re -> type = HASH_URL_IFRAMESRC_HASH_RX ;
2486
2486
re -> param = _p2 ;
2487
2487
re -> param_data = msc_pregcomp (cmd -> pool , p2 , 0 , NULL , NULL );
2488
2488
if (re -> param_data == NULL ) {
@@ -2491,7 +2491,7 @@ static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
2491
2491
dcfg -> crypto_hash_iframesrc_rx = 1 ;
2492
2492
}
2493
2493
else if (strcasecmp (p1 , "HashFrameSrc" ) == 0 ) {
2494
- re -> type = ENCRYPTION_URL_FRAMESRC_HASH_RX ;
2494
+ re -> type = HASH_URL_FRAMESRC_HASH_RX ;
2495
2495
re -> param = _p2 ;
2496
2496
re -> param_data = msc_pregcomp (cmd -> pool , p2 , 0 , NULL , NULL );
2497
2497
if (re -> param_data == NULL ) {
@@ -2500,7 +2500,7 @@ static const char *cmd_encryption_method_rx(cmd_parms *cmd, void *_dcfg,
2500
2500
dcfg -> crypto_hash_framesrc_rx = 1 ;
2501
2501
}
2502
2502
2503
- * (encryption_method * * )apr_array_push (dcfg -> encryption_method ) = re ;
2503
+ * (hash_method * * )apr_array_push (dcfg -> hash_method ) = re ;
2504
2504
2505
2505
return NULL ;
2506
2506
}
@@ -3203,19 +3203,19 @@ const command_rec module_directives[] = {
3203
3203
),
3204
3204
3205
3205
AP_INIT_TAKE2 (
3206
- "SecEncryptionMethodPm " ,
3207
- cmd_encryption_method_pm ,
3206
+ "SecHashMethodPm " ,
3207
+ cmd_hash_method_pm ,
3208
3208
NULL ,
3209
3209
CMD_SCOPE_ANY ,
3210
- "Encryption method and pattern"
3210
+ "Hash method and pattern"
3211
3211
),
3212
3212
3213
3213
AP_INIT_TAKE2 (
3214
- "SecEncryptionMethodRx " ,
3215
- cmd_encryption_method_rx ,
3214
+ "SecHashMethodRx " ,
3215
+ cmd_hash_method_rx ,
3216
3216
NULL ,
3217
3217
CMD_SCOPE_ANY ,
3218
- "Encryption method and regex"
3218
+ "Hash method and regex"
3219
3219
),
3220
3220
3221
3221
AP_INIT_TAKE2 (
@@ -3324,27 +3324,27 @@ const command_rec module_directives[] = {
3324
3324
),
3325
3325
3326
3326
AP_INIT_TAKE1 (
3327
- "SecEncryptionEngine " ,
3328
- cmd_encryption_engine ,
3327
+ "SecHashEngine " ,
3328
+ cmd_hash_engine ,
3329
3329
NULL ,
3330
3330
CMD_SCOPE_ANY ,
3331
3331
"On or Off"
3332
3332
),
3333
3333
3334
3334
AP_INIT_TAKE2 (
3335
- "SecEncryptionKey " ,
3336
- cmd_encryption_key ,
3335
+ "SecHashKey " ,
3336
+ cmd_hash_key ,
3337
3337
NULL ,
3338
3338
CMD_SCOPE_ANY ,
3339
3339
"Set Encrytion key"
3340
3340
),
3341
3341
3342
3342
AP_INIT_TAKE1 (
3343
- "SecEncryptionParam " ,
3344
- cmd_encryption_param ,
3343
+ "SecHashParam " ,
3344
+ cmd_hash_param ,
3345
3345
NULL ,
3346
3346
CMD_SCOPE_ANY ,
3347
- "Set Encryption parameter"
3347
+ "Set Hash parameter"
3348
3348
),
3349
3349
3350
3350
{ NULL }
0 commit comments