/httpd/support/ |
H A D | checkgid.c | 47 int main(int argc, char *argv[]) argument 61 arg = argv[i]; 81 fprintf(stderr, "%s: group '%s' not found\n", argv[0], arg); 94 fprintf(stderr, "%s: invalid group '%s'\n", argv[0], arg); 95 perror(argv[0]);
|
H A D | fcgistarter.c | 56 int main(int argc, const char * const argv[]) argument 72 apr_app_initialize(&argc, &argv, NULL); 78 rv = apr_getopt_init(&gopt, pool, argc, argv);
|
H A D | httxt2dbm.c | 175 int main(int argc, const char *const argv[]) argument 185 apr_app_initialize(&argc, &argv, NULL); 196 shortname = apr_filepath_name_get(argv[0]); 203 rv = apr_getopt_init(&opt, pool, argc, argv);
|
H A D | logresolve.c | 131 int main(int argc, const char * const argv[]) argument 146 if (apr_app_initialize(&argc, &argv, NULL) != APR_SUCCESS) { 152 shortname = apr_filepath_name_get(argv[0]); 159 apr_getopt_init(&o, pool, argc, argv);
|
H A D | suexec.c | 285 int main(int argc, char *argv[]) argument 322 && (! strcmp(argv[1], "-V")) 367 target_uname = argv[1]; 368 target_gname = argv[2]; 369 cmd = argv[3]; 682 ap_execve(cmd, &argv[3], environ); 685 execv(cmd, &argv[3]);
|
H A D | htdbm.c | 311 int main(int argc, const char * const argv[]) argument 327 apr_app_initialize(&argc, &argv, NULL); 336 rv = apr_getopt_init(&state, pool, argc, argv); 394 h->filename = apr_pstrdup(h->ctx.pool, argv[i++]); 403 h->username = apr_pstrdup(pool, argv[i++]); 408 h->ctx.passwd = apr_pstrdup(pool, argv[i++]); 418 h->comment = apr_pstrdup(pool, argv[i++]);
|
H A D | htdigest.c | 186 int main(int argc, const char * const argv[]) argument 200 apr_app_initialize(&argc, &argv, NULL); 216 if (strcmp(argv[1], "-c")) 218 rv = apr_file_open(&f, argv[2], APR_WRITE | APR_CREATE, 222 argv[2], &rv); 225 apr_cpystrn(user, argv[4], sizeof(user)); 226 apr_cpystrn(realm, argv[3], sizeof(realm)); 238 argv[0]); 248 if (apr_file_open(&f, argv[1], APR_READ, APR_OS_DEFAULT, cntxt) != APR_SUCCESS) { 250 "Could not open passwd file %s for reading.\n", argv[ [all...] |
H A D | htpasswd.c | 159 static void check_args(int argc, const char *const argv[], argument 172 rv = apr_getopt_init(&state, pool, argc, argv); 194 apr_file_printf(errfile, "%s: %s" NL, argv[0], ctx->errstr); 207 argv[0]); 224 if (strlen(argv[i]) > (APR_PATH_MAX - 1)) { 225 apr_file_printf(errfile, "%s: filename too long" NL, argv[0]); 228 *pwfilename = apr_pstrdup(pool, argv[i++]); 230 if (strlen(argv[i]) > (MAX_STRING_LEN - 1)) { 232 argv[0], MAX_STRING_LEN - 1); 235 *user = apr_pstrdup(pool, argv[ 274 main(int argc, const char * const argv[]) argument [all...] |
H A D | firehose.c | 157 static void help(const char *argv, const char * header, const char *footer, argument 163 printf(header, argv); 650 int main(int argc, const char * const argv[]) argument 661 if (APR_SUCCESS != (status = apr_app_initialize(&argc, &argv, NULL))) { 686 apr_getopt_init(&opt, pool, argc, argv); 730 version(argv[0]); 734 help(argv[0], HELP_HEADER, HELP_FOOTER, cmdline_opts); 752 filter->prefix = opt->argv[opt->ind]; 753 filter->len = strlen(opt->argv[opt->ind]); 754 apr_hash_set(file->filters, opt->argv[op [all...] |
/httpd/server/ |
H A D | gen_test_char.c | 56 int main(int argc, char *argv[]) argument
|
H A D | main.c | 277 * short_name is a pointer into argv, so remains valid. 298 static process_rec *init_process(int *argc, const char * const * *argv) argument 305 stat = apr_app_initialize(argc, argv, NULL); 325 ctimebuff, stat, (*argv)[0], failed); 345 process->argv = *argv; 346 process->short_name = apr_filepath_name_get((*argv)[0]); 352 const char *bin = process->argv[0]; 460 int main(int argc, const char * const argv[]) argument 482 process = init_process(&argc, &argv); [all...] |
H A D | listen.c | 958 int argc, char *const argv[]) 978 rv = apr_parse_addr_port(&host, &scope_id, &port, argv[0], cmd->pool); 1004 proto = apr_pstrdup(cmd->pool, argv[1]); 957 ap_set_listener(cmd_parms *cmd, void *dummy, int argc, char *const argv[]) argument
|
/httpd/test/ |
H A D | test_limits.c | 80 main(int argc, char *argv[]) argument 94 while ((o = getopt(argc, argv, "t:a:p:n:")) != EOF)
|
H A D | cls.c | 90 int main(int argc, char **argv) argument 110 d = opendir(argv[1]); 123 sprintf(path, "%s/%s", argv[1], s);
|
H A D | time-sem.c | 40 argv[1] is the #children, argv[2] is the #iterations per child 504 void main (int argc, char **argv) argument 520 num_child = atoi (argv[1]); 521 num_iter = atoi (argv[2]);
|
/httpd/modules/aaa/ |
H A D | mod_allowhandlers.c | 88 static const char *set_allowed_handlers(cmd_parms *cmd, void *d, int argc, char *const argv[]) argument 101 if (strcasecmp(argv[i], forbidden_handler) == 0 && conf->op != AH_DENY) 103 if (strcasecmp(argv[i], "all") == 0) { 109 else if (strcasecmp(argv[i], "not") == 0) { 117 apr_table_setn(conf->handlers, argv[i], "1");
|
H A D | mod_allowmethods.c | 107 char *const argv[]) 116 if (strcasecmp("reset", argv[0]) == 0) { 126 m = ap_method_number_of(argv[i]); 129 argv[i], "'", NULL); 106 am_allowmethods(cmd_parms *cmd, void *d, int argc, char *const argv[]) argument
|
/httpd/modules/arch/netware/ |
H A D | mod_netware.c | 97 static apr_status_t ap_cgi_build_command(const char **cmd, const char ***argv, argument 162 apr_tokenize_to_argv(*cmd, (char***)argv, p); 165 *cmd = ap_server_root_relative(p, *argv[0]);
|
/httpd/modules/ssl/ |
H A D | ssl_engine_rand.c | 76 const char **argv = apr_palloc(p, sizeof(char *) * 3); local 80 argv[0] = cmd; 81 argv[1] = apr_itoa(p, pRandSeed->nBytes); 82 argv[2] = NULL; 84 if ((fp = ssl_util_ppopen(s, p, cmd, argv)) == NULL)
|
H A D | ssl_util.c | 64 const char * const *argv) 80 if (apr_proc_create(proc, cmd, argv, NULL, procattr, p) != APR_SUCCESS) 95 const char * const *argv) 103 if ((fp = ssl_util_ppopen(s, p, cmd, argv)) == NULL) 63 ssl_util_ppopen(server_rec *s, apr_pool_t *p, const char *cmd, const char * const *argv) argument 94 ssl_util_readfilter(server_rec *s, apr_pool_t *p, const char *cmd, const char * const *argv) argument
|
/httpd/support/win32/ |
H A D | wintty.c | 82 int main(int argc, char** argv) argument 98 char *arg0 = argv[0]; 101 ++argv; 102 if (**argv == '/' || **argv == '-') { 103 switch (tolower((*argv)[1])) { 125 if (*(argv + 1) && *(argv + 1)[0] != '-') { 126 *(++argv); 127 timeout = atoi(*argv) / 100 [all...] |
/httpd/modules/arch/win32/ |
H A D | mod_win32.c | 369 static apr_status_t ap_cgi_build_command(const char **cmd, const char ***argv, argument 514 *argv = (const char **)(split_argv(p, interpreter, *cmd, 516 *cmd = (*argv)[0];
|
/httpd/modules/filters/ |
H A D | mod_filter.c | 599 int argc, char *const argv[]) 609 name = apr_pstrdup(cmd->temp_pool, argv[0]); 611 memcpy(types, &argv[1], (argc - 1) * sizeof(char *)); 598 filter_bytype(cmd_parms *cmd, void *CFG, int argc, char *const argv[]) argument
|
/httpd/modules/session/ |
H A D | mod_session_crypto.c | 531 char **argv; local 539 if (apr_tokenize_to_argv(arg+5, &argv, cmd->temp_pool) != APR_SUCCESS) { 544 argv[0] = ap_server_root_relative(cmd->temp_pool, argv[0]); 546 if (!argv[0]) { 552 (const char*)argv[0], (const char * const *)argv);
|
/httpd/server/mpm/winnt/ |
H A D | service.c | 376 static void __stdcall service_nt_main_fn_w(DWORD argc, LPWSTR *argv) argument 381 apr_size_t wslen = wcslen(argv[0]) + 1; 385 (void)apr_conv_ucs2_to_utf8(argv[0], &wslen, service_name, &slen); 395 RegisterServiceCtrlHandlerExW(argv[0], service_nt_ctrl, ctx))) 408 * but we have no interest in argv[0] for the mpm_new_argv list. 423 memcpy (cmb_data + mpm_new_argv->nelts, argv + 1, 430 wslen = wcslen(argv[i]) + 1; 433 (void)apr_conv_ucs2_to_utf8(argv[i], &wslen, *(cmb++), &slen); 452 static void __stdcall service_nt_main_fn(DWORD argc, LPSTR *argv) argument 458 mpm_service_set_name(mpm_new_argv->pool, &ignored, argv[ 744 mpm_service_install(apr_pool_t *ptemp, int argc, const char * const * argv, int reconfig) argument 1035 mpm_service_start(apr_pool_t *ptemp, int argc, const char * const * argv) argument [all...] |