/httpd/modules/proxy/ |
H A D | ajp_link.c | 25 apr_size_t length; local 29 length = msg->len; 33 apr_size_t written = length; 41 length -= written; 43 } while (length); 52 apr_size_t length = len; local 58 status = apr_socket_recv(sock, (char *)(buf + rdlen), &length); 67 rdlen += length; 68 length = len - rdlen; 103 "of length [all...] |
H A D | mod_proxy_scgi.c | 156 b->length = (apr_size_t)(-1); 228 static int sendall(proxy_conn_rec *conn, const char *buf, apr_size_t length, argument 234 while (length > 0) { 235 written = length; 246 length -= written;
|
/httpd/server/ |
H A D | util_md5.c | 53 AP_DECLARE(char *) ap_md5_binary(apr_pool_t *p, const unsigned char *buf, int length) argument 67 apr_md5_update(&my_md5, buf, (unsigned int)length);
|
H A D | util_pcre.c | 91 apr_size_t length, addlength; local 95 length = strlen(message) + 1; 102 if (addlength > 0 && errbuf_size >= length + addlength) 109 return length + addlength;
|
H A D | core_filters.c | 58 * Remove all zero length buckets from the brigade. 64 if (e->length == 0 && !APR_BUCKET_IS_METADATA(e)) { \ 272 /* Check for the availability of buckets with known length */ 273 if (e->length != -1) { 274 len += e->length; 493 if (bucket->length == (apr_size_t)-1) { 502 bytes_in_brigade += bucket->length; 504 non_file_bytes_in_brigade += bucket->length; 676 (bucket->length >= AP_MIN_SENDFILE_BYTES)) { 700 apr_size_t length; local [all...] |
H A D | util.c | 1146 * len is the length of the item excluding any beginning whitespace. 1216 /* Find the beginning and maximum length of the list item so that 2006 apr_size_t length, escapes = 0; local 2020 /* Compute the length of the input string, including NULL */ 2021 length = s - (const unsigned char *)str + 1; 2025 return apr_pmemdup(p, str, length); 2029 ret = apr_palloc(p, length + 3 * escapes); 2362 * Look through the input string, jogging the length of the output 2547 * strings with a maximum length of HUGE_STRING_LEN, and the 2644 if (bucket->length [all...] |
/httpd/modules/aaa/ |
H A D | mod_auth_basic.c | 253 int length; local 279 length = apr_base64_decode(decoded_line, auth_line); 281 decoded_line[length] = '\0';
|
/httpd/modules/filters/ |
H A D | mod_request.c | 91 /* fail fast if the content length exceeds keep body */ 113 "Requested content-length of %" APR_OFF_T_FMT 127 /* get the brigade from upstream, and read it in to get its length */ 133 /* does the length take us over the limit? */ 140 "Requested content-length of %" APR_OFF_T_FMT 182 apr_off_t length = 0; local 188 apr_brigade_length(kept_body, 1, &length); 189 apr_table_setn(r->headers_in, "Content-Length", apr_off_t_toa(r->pool, length)); 253 * a known length, but just to be sure, this takes
|
H A D | sed1.c | 697 int length; local 740 length = apr_snprintf(sz, sizeof(sz), "%d", (int) eval->lnum); 741 rv = wline(eval, sz, length);
|
H A D | mod_proxy_html.c | 158 static void pcharacters(void *ctxt, const xmlChar *uchars, int length) argument 164 for (begin=i=0; i<length; i++) { 311 static void pcdata(void *ctxt, const xmlChar *uchars, int length) argument 316 pappend(ctx, chars, length); 322 AP_fwrite(ctx, chars, length, 0);
|
H A D | mod_include.c | 189 apr_size_t directive_len; /* length of the current directive name */ 498 /* maximum length of any ISO-LATIN-1 HTML entity name. */ 571 /* wrong length */ 744 apr_size_t length, int leave_name) 753 /* sanity check, out && !length is not supported */ 754 ap_assert(out && length); 757 eout = out + length - 1; 766 apr_cpystrn(out, in, length); 769 ret = apr_pstrmemdup(ctx->pool, in, (length && length < 743 ap_ssi_parse_string(include_ctx_t *ctx, const char *in, char *out, apr_size_t length, int leave_name) argument [all...] |
/httpd/modules/loggers/ |
H A D | mod_logio.c | 184 apr_off_t length; local 190 apr_brigade_length (bb, 0, &length); 192 if (length > 0) 193 cf->bytes_in += length;
|
/httpd/modules/ssl/ |
H A D | ssl_engine_pphrase.c | 141 long int length; local 359 length = i2d_PrivateKey(pPrivateKey, NULL); 360 ucp = ssl_asn1_table_set(mc->tPrivateKey, key_id, length); 429 static int pipe_get_passwd_cb(char *buf, int length, char *prompt, int verify) 437 rc = apr_file_gets(buf, length, readtty); 441 memset(buf, 0, length); 599 * And return its length to OpenSSL...
|
H A D | ssl_util.c | 147 long int length) 158 if (asn1->nData != length) { 169 asn1->nData = length; 171 asn1->cpData = ap_malloc(length); 145 ssl_asn1_table_set(apr_hash_t *table, const char *key, long int length) argument
|
H A D | ssl_engine_io.c | 302 int length; member in struct:__anon318 324 * any of this data and we need to remember the length. 335 if (!buffer->length) { 339 if (buffer->length > inl) { 343 buffer->length -= inl; 347 memmove(in, buffer->value, buffer->length); 348 inl = buffer->length; 350 buffer->length = 0; 359 buffer->length = inl; 421 if (consume >= b->length) { 786 int length; local [all...] |
H A D | ssl_engine_kernel.c | 662 || (apr_table_get(r->headers_in, "content-length") 663 && strcmp(apr_table_get(r->headers_in, "content-length"), "0"))) 1359 * Adjust the DH parameter length according to the size of the 2213 * The client protocol list is serialized as length byte followed by ascii 2314 * string in wire format -- a sequence of length-prefixed strings -- indicating 2353 * by its length. First, calculate how long that string will be. */ 2357 unsigned int length = strlen(string); local 2358 /* If the protocol name is too long (the length must fit in one byte), 2360 if (length > 255) { 2362 "SSL NPN protocol name too long (length 2384 apr_size_t length = strlen(string); local [all...] |
/httpd/modules/session/ |
H A D | mod_session.c | 311 int length = strlen(slider); local 312 slider += length; 313 if (length) { 342 int length = 0; local 348 identity_count, &length, z->entries, NULL); 349 buffer = apr_pcalloc(r->pool, length + 1); 629 "length of time for which a session should be valid. Zero to disable"),
|
/httpd/modules/cache/ |
H A D | mod_cache_disk.c | 51 * entity name (dobj->name) [length is in disk_cache_info_t->name_len] 1146 apr_size_t length, written; local 1181 rv = apr_bucket_read(e, &str, &length, APR_BLOCK_READ); 1194 if (!length) { 1225 rv = apr_file_write_full(dobj->data.tempfd, str, length, &written); 1250 dobj->offset -= length;
|
H A D | mod_cache_socache.c | 56 * entity name (sobj->name) [length is in cache_socache_info_t->name_len] 972 apr_size_t length; local 1007 rv = apr_bucket_read(e, &str, &length, APR_BLOCK_READ); 1021 if (!length) { 1025 sobj->file_size += length; 1052 sobj->offset -= length;
|
/httpd/modules/core/ |
H A D | mod_macro.c | 558 int length; /* cached length of the current line */ member in struct:__anon96 587 while (ml->char_index >= ml->length) { 600 ml->length = ml->index >= ml->contents->nelts ? 653 ml->char_index = ml->length; 674 ls->length = ls->contents->nelts < 1 ?
|
/httpd/modules/lua/ |
H A D | lua_request.c | 245 apr_off_t length = r->remaining; local 248 if (maxsize != 0 && length > maxsize) { 251 *rbuf = (const char *) apr_pcalloc(r->pool, (apr_size_t) (length + 1)); 252 *size = length; 254 if ((rpos + len_read) > length) { 255 rsize = length - rpos; 287 apr_off_t length = r->remaining; local 289 *size = length; 293 if ((rpos + len_read) > length) 294 rsize = (apr_size_t) length [all...] |
/httpd/support/ |
H A D | ab.c | 234 apr_size_t length; /* Content-Length value used for keep-alive */ member in struct:connection 276 int nolength = 0; /* Accept variable document length */ 286 apr_size_t postlen = 0; /* length of data to be POSTed */ 317 apr_size_t doclen = 0; /* the length the document should be */ 326 int err_length = 0; /* requests failed due to response length */ 342 /* global request (and its length) */ 1418 * let the length check catch any response errors 1582 /* handle NCSA, which sends Content-length: */ 1584 cl = strstr(c->cbuff, "Content-length:"); 1588 c->length [all...] |