Lines Matching refs:POST

564       if ($meth eq 'POST'
576 # method eq 'POST' && content-type eq 'application/xml'
577 # method eq 'POST' && content-type =~ /multipart\/related.+start=/
580 # In a XForm POST, the QUERY_STRING is parsed normally.
589 if ($meth eq 'POST' && defined($ENV{'CONTENT_TYPE'})) {
663 if ($meth eq 'POST' || $meth eq 'PUT') {
677 # APPENDED to the POST data.
682 # If $meth is not of GET, POST, PUT or HEAD, assume we're
699 if (!$is_xforms && ($meth eq 'POST' || $meth eq 'PUT')
1199 return request_method() eq 'POST';
1335 # whether this was a POST or a GET
1935 # $method -> optional submission method to use (GET or POST)
1963 # $method -> optional submission method to use (GET or POST)
3051 # Returns 'POST', 'GET', 'PUT' or 'HEAD'
3578 $self->cgi_error("400 Bad request (malformed multipart POST)");
3712 $self->cgi_error("400 Bad request (malformed multipart POST)");
4017 die "Malformed multipart POST: data truncated\n" if $self->eof;
4114 # protect against malformed multipart POST operations
4115 die "Malformed multipart POST\n" unless $self->{CHUNKED} || ($start >= 0 || $self->{LENGTH} > 0);
4527 This will parse the input (from both POST and GET methods) and store
5662 =head2 MIXING POST AND URL PARAMETERS
5987 method: POST
6303 (malformed multipart POST)". This error message is designed so that
7494 To test the POST method, you may enable full debugging with the -debug
7664 one of 'POST', 'GET' or 'HEAD'.
7668 Returns the content_type of data submitted in a POST, generally
7824 could attack your site by sending a CGI script a huge POST of many
7825 megabytes. CGI.pm will attempt to read the entire POST into a
7853 on the size of POSTings, in bytes. If CGI.pm detects a POST
7889 An attempt to send a POST larger than $POST_MAX bytes will cause
7893 <param()> for the first time. If the POST was intercepted, then
7894 cgi_error() will return the message "413 POST too large".