Searched defs:length (Results 1 - 22 of 22) sorted by relevance

/httpd/modules/proxy/
H A Dajp_link.c25 apr_size_t length; local
29 length = msg->len;
33 apr_size_t written = length;
41 length -= written;
43 } while (length);
52 apr_size_t length = len; local
58 status = apr_socket_recv(sock, (char *)(buf + rdlen), &length);
67 rdlen += length;
68 length = len - rdlen;
103 "of length
[all...]
H A Dmod_proxy_scgi.c156 b->length = (apr_size_t)(-1);
228 static int sendall(proxy_conn_rec *conn, const char *buf, apr_size_t length, argument
234 while (length > 0) {
235 written = length;
246 length -= written;
/httpd/server/
H A Dutil_md5.c53 AP_DECLARE(char *) ap_md5_binary(apr_pool_t *p, const unsigned char *buf, int length) argument
67 apr_md5_update(&my_md5, buf, (unsigned int)length);
H A Dutil_pcre.c91 apr_size_t length, addlength; local
95 length = strlen(message) + 1;
102 if (addlength > 0 && errbuf_size >= length + addlength)
109 return length + addlength;
H A Dcore_filters.c58 * Remove all zero length buckets from the brigade.
64 if (e->length == 0 && !APR_BUCKET_IS_METADATA(e)) { \
272 /* Check for the availability of buckets with known length */
273 if (e->length != -1) {
274 len += e->length;
493 if (bucket->length == (apr_size_t)-1) {
502 bytes_in_brigade += bucket->length;
504 non_file_bytes_in_brigade += bucket->length;
676 (bucket->length >= AP_MIN_SENDFILE_BYTES)) {
700 apr_size_t length; local
[all...]
H A Dutil.c1146 * len is the length of the item excluding any beginning whitespace.
1216 /* Find the beginning and maximum length of the list item so that
2006 apr_size_t length, escapes = 0; local
2020 /* Compute the length of the input string, including NULL */
2021 length = s - (const unsigned char *)str + 1;
2025 return apr_pmemdup(p, str, length);
2029 ret = apr_palloc(p, length + 3 * escapes);
2362 * Look through the input string, jogging the length of the output
2547 * strings with a maximum length of HUGE_STRING_LEN, and the
2644 if (bucket->length
[all...]
/httpd/modules/aaa/
H A Dmod_auth_basic.c253 int length; local
279 length = apr_base64_decode(decoded_line, auth_line);
281 decoded_line[length] = '\0';
/httpd/modules/filters/
H A Dmod_request.c91 /* fail fast if the content length exceeds keep body */
113 "Requested content-length of %" APR_OFF_T_FMT
127 /* get the brigade from upstream, and read it in to get its length */
133 /* does the length take us over the limit? */
140 "Requested content-length of %" APR_OFF_T_FMT
182 apr_off_t length = 0; local
188 apr_brigade_length(kept_body, 1, &length);
189 apr_table_setn(r->headers_in, "Content-Length", apr_off_t_toa(r->pool, length));
253 * a known length, but just to be sure, this takes
H A Dsed1.c697 int length; local
740 length = apr_snprintf(sz, sizeof(sz), "%d", (int) eval->lnum);
741 rv = wline(eval, sz, length);
H A Dmod_proxy_html.c158 static void pcharacters(void *ctxt, const xmlChar *uchars, int length) argument
164 for (begin=i=0; i<length; i++) {
311 static void pcdata(void *ctxt, const xmlChar *uchars, int length) argument
316 pappend(ctx, chars, length);
322 AP_fwrite(ctx, chars, length, 0);
H A Dmod_include.c189 apr_size_t directive_len; /* length of the current directive name */
498 /* maximum length of any ISO-LATIN-1 HTML entity name. */
571 /* wrong length */
744 apr_size_t length, int leave_name)
753 /* sanity check, out && !length is not supported */
754 ap_assert(out && length);
757 eout = out + length - 1;
766 apr_cpystrn(out, in, length);
769 ret = apr_pstrmemdup(ctx->pool, in, (length && length <
743 ap_ssi_parse_string(include_ctx_t *ctx, const char *in, char *out, apr_size_t length, int leave_name) argument
[all...]
/httpd/modules/loggers/
H A Dmod_logio.c184 apr_off_t length; local
190 apr_brigade_length (bb, 0, &length);
192 if (length > 0)
193 cf->bytes_in += length;
/httpd/modules/ssl/
H A Dssl_engine_pphrase.c141 long int length; local
359 length = i2d_PrivateKey(pPrivateKey, NULL);
360 ucp = ssl_asn1_table_set(mc->tPrivateKey, key_id, length);
429 static int pipe_get_passwd_cb(char *buf, int length, char *prompt, int verify)
437 rc = apr_file_gets(buf, length, readtty);
441 memset(buf, 0, length);
599 * And return its length to OpenSSL...
H A Dssl_util.c147 long int length)
158 if (asn1->nData != length) {
169 asn1->nData = length;
171 asn1->cpData = ap_malloc(length);
145 ssl_asn1_table_set(apr_hash_t *table, const char *key, long int length) argument
H A Dssl_engine_io.c302 int length; member in struct:__anon318
324 * any of this data and we need to remember the length.
335 if (!buffer->length) {
339 if (buffer->length > inl) {
343 buffer->length -= inl;
347 memmove(in, buffer->value, buffer->length);
348 inl = buffer->length;
350 buffer->length = 0;
359 buffer->length = inl;
421 if (consume >= b->length) {
786 int length; local
[all...]
H A Dssl_engine_kernel.c662 || (apr_table_get(r->headers_in, "content-length")
663 && strcmp(apr_table_get(r->headers_in, "content-length"), "0")))
1359 * Adjust the DH parameter length according to the size of the
2213 * The client protocol list is serialized as length byte followed by ascii
2314 * string in wire format -- a sequence of length-prefixed strings -- indicating
2353 * by its length. First, calculate how long that string will be. */
2357 unsigned int length = strlen(string); local
2358 /* If the protocol name is too long (the length must fit in one byte),
2360 if (length > 255) {
2362 "SSL NPN protocol name too long (length
2384 apr_size_t length = strlen(string); local
[all...]
/httpd/modules/session/
H A Dmod_session.c311 int length = strlen(slider); local
312 slider += length;
313 if (length) {
342 int length = 0; local
348 identity_count, &length, z->entries, NULL);
349 buffer = apr_pcalloc(r->pool, length + 1);
629 "length of time for which a session should be valid. Zero to disable"),
/httpd/modules/cache/
H A Dmod_cache_disk.c51 * entity name (dobj->name) [length is in disk_cache_info_t->name_len]
1146 apr_size_t length, written; local
1181 rv = apr_bucket_read(e, &str, &length, APR_BLOCK_READ);
1194 if (!length) {
1225 rv = apr_file_write_full(dobj->data.tempfd, str, length, &written);
1250 dobj->offset -= length;
H A Dmod_cache_socache.c56 * entity name (sobj->name) [length is in cache_socache_info_t->name_len]
972 apr_size_t length; local
1007 rv = apr_bucket_read(e, &str, &length, APR_BLOCK_READ);
1021 if (!length) {
1025 sobj->file_size += length;
1052 sobj->offset -= length;
/httpd/modules/core/
H A Dmod_macro.c558 int length; /* cached length of the current line */ member in struct:__anon96
587 while (ml->char_index >= ml->length) {
600 ml->length = ml->index >= ml->contents->nelts ?
653 ml->char_index = ml->length;
674 ls->length = ls->contents->nelts < 1 ?
/httpd/modules/lua/
H A Dlua_request.c245 apr_off_t length = r->remaining; local
248 if (maxsize != 0 && length > maxsize) {
251 *rbuf = (const char *) apr_pcalloc(r->pool, (apr_size_t) (length + 1));
252 *size = length;
254 if ((rpos + len_read) > length) {
255 rsize = length - rpos;
287 apr_off_t length = r->remaining; local
289 *size = length;
293 if ((rpos + len_read) > length)
294 rsize = (apr_size_t) length
[all...]
/httpd/support/
H A Dab.c234 apr_size_t length; /* Content-Length value used for keep-alive */ member in struct:connection
276 int nolength = 0; /* Accept variable document length */
286 apr_size_t postlen = 0; /* length of data to be POSTed */
317 apr_size_t doclen = 0; /* the length the document should be */
326 int err_length = 0; /* requests failed due to response length */
342 /* global request (and its length) */
1418 * let the length check catch any response errors
1582 /* handle NCSA, which sends Content-length: */
1584 cl = strstr(c->cbuff, "Content-length:");
1588 c->length
[all...]

Completed in 297 milliseconds