summaryrefslogtreecommitdiff
path: root/www/bozohttpd/files/patch-bozohttpd.c
blob: c2d52f91fd3373eb5a0e6d89d30229b46070a680 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
--- bozohttpd.c.orig	2021-02-14 09:40:33 UTC
+++ bozohttpd.c
@@ -2174,22 +2174,22 @@ http_errors_long(int code)
 	return (help);
 }
 
-#ifndef NO_BLOCKLIST_SUPPORT
-static struct blocklist *blstate;
+#ifndef NO_BLACKLIST_SUPPORT
+static struct blacklist *blstate;
 
 void
 pfilter_notify(const int what, const int code)
 {
 
 	if (blstate == NULL)
-		blstate = blocklist_open();
+		blstate = blacklist_open();
 
 	if (blstate == NULL)
 		return;
 
-	(void)blocklist_r(blstate, what, 0, http_errors_short(code));
+	(void)blacklist_r(blstate, what, 0, http_errors_short(code));
 }
-#endif /* !NO_BLOCKLIST_SUPPORT */
+#endif /* !NO_BLACKLIST_SUPPORT */
 
 /* the follow functions and variables are used in handling HTTP errors */
 int
@@ -2294,18 +2294,18 @@ bozo_http_error(bozohttpd_t *httpd, int code, bozo_htt
 		bozo_printf(httpd, "%s", httpd->errorbuf);
 	bozo_flush(httpd, stdout);
 
-#ifndef NO_BLOCKLIST_SUPPORT
+#ifndef NO_BLACKLIST_SUPPORT
 	switch(code) {
 
 	case 401:
-		pfilter_notify(BLOCKLIST_AUTH_FAIL, code);
+		pfilter_notify(BLACKLIST_AUTH_FAIL, code);
 		break;
 
 	case 403:
-		pfilter_notify(BLOCKLIST_ABUSIVE_BEHAVIOR, code);
+		pfilter_notify(BLACKLIST_ABUSIVE_BEHAVIOR, code);
 		break;
 	}
-#endif /* !NO_BLOCKLIST_SUPPORT */
+#endif /* !NO_BLACKLIST_SUPPORT */
 
 	return code;
 }