/httpd/modules/mappers/ |
H A D | mod_rewrite.h | 35 typedef char *(rewrite_mapfunc_t)(request_rec *r, char *key);
|
H A D | mod_rewrite.c | 991 static void set_cache_value(const char *name, apr_time_t t, char *key, argument 1028 * We need to copy the key and the value into OUR pool, 1032 apr_pstrdup(map->pool, key), APR_HASH_KEY_STRING, 1043 static char *get_cache_value(const char *name, apr_time_t t, char *key, argument 1063 val = apr_hash_get(map->entries, key, APR_HASH_KEY_STRING); 1107 * General Note: key is already a fresh string, created (expanded) just 1108 * for the purpose to be passed in here. So one can modify key itself. 1111 static char *rewrite_mapfunc_toupper(request_rec *r, char *key) argument 1113 ap_str_toupper(key); 1115 return key; 1118 rewrite_mapfunc_tolower(request_rec *r, char *key) argument 1125 rewrite_mapfunc_escape(request_rec *r, char *key) argument 1130 rewrite_mapfunc_unescape(request_rec *r, char *key) argument 1272 lookup_map_txtfile(request_rec *r, const char *file, char *key) argument 1332 lookup_map_dbmfile(request_rec *r, const char *file, const char *dbmtype, char *key) argument 1363 lookup_map_dbd(request_rec *r, char *key, const char *label) argument 1413 lookup_map_program(request_rec *r, apr_file_t *fpin, apr_file_t *fpout, char *key) argument 1580 lookup_map(request_rec *r, char *name, char *key) argument 2335 char *key; local 3200 cmd_parseflagfield(apr_pool_t *p, void *cfg, char *key, const char *(*parse)(apr_pool_t *, void *, char *, char *)) argument 3256 cmd_rewritecond_setflag(apr_pool_t *p, void *_cfg, char *key, char *val) argument 3456 cmd_rewriterule_setflag(apr_pool_t *p, void *_cfg, char *key, char *val) argument [all...] |
/httpd/include/ |
H A D | ap_regkey.h | 58 * Win32 Only: Open the specified registry key. 59 * @param newkey The opened registry key 60 * @param parentkey The open registry key of the parent, or one of 70 * @param keyname The path of the key relative to the parent key 73 * APR_READ open key for reading 74 * APR_WRITE open key for writing 75 * APR_CREATE create the key if it doesn't exist 76 * APR_EXCL return error if APR_CREATE and key exists 87 * Win32 Only: Close the registry key opene 90 AP_DECLARE(apr_status_t) ap_regkey_close(ap_regkey_t *key); variable [all...] |
/httpd/modules/lua/ |
H A D | lua_apr.c | 41 const char *key = luaL_checkstring(L, 2); local 57 key, t->n); 58 apr_table_set(t->t, key, replacement); 61 apr_table_set(t->t, key, val); 69 const char *key = luaL_checkstring(L, 2); local 70 const char *val = apr_table_get(t->t, key);
|
/httpd/server/ |
H A D | apreq_module.c | 24 APREQ_DECLARE(apreq_param_t *)apreq_param(apreq_handle_t *req, const char *key) argument 26 apreq_param_t *param = apreq_args_get(req, key); 28 return apreq_body_get(req, key);
|
H A D | util_script.c | 117 if (!elts[i].key) { 120 env[j] = apr_pstrcat(p, elts[i].key, "=", elts[i].val, NULL); 170 if (!hdrs[i].key) { 179 if (!strcasecmp(hdrs[i].key, "Content-type")) { 182 else if (!strcasecmp(hdrs[i].key, "Content-length")) { 191 else if (!strcasecmp(hdrs[i].key, "Authorization") 192 || !strcasecmp(hdrs[i].key, "Proxy-Authorization")) { 194 add_unless_null(e, http2env(r, hdrs[i].key), hdrs[i].val); 199 add_unless_null(e, http2env(r, hdrs[i].key), hdrs[i].val); 407 static int set_cookie_doo_doo(void *v, const char *key, cons argument 823 char *key; local [all...] |
H A D | apreq_param.c | 191 static int param_push(void *data, const char *key, const char *val) argument 202 const char *key) 209 apr_table_do(param_push, arr, t, key, NULL); 215 const char *key, 218 apr_array_header_t *arr = apreq_params_as_array(p, t, key); 233 static int upload_push(void *data, const char *key, const char *val) argument 252 static int upload_set(void *data, const char *key, const char *val) argument 200 apreq_params_as_array(apr_pool_t *p, const apr_table_t *t, const char *key) argument 213 apreq_params_as_string(apr_pool_t *p, const apr_table_t *t, const char *key, apreq_join_t mode) argument
|
/httpd/modules/dav/lock/ |
H A D | locks.c | 71 * char[] key] 72 * The key is to the collection lock that resulted in this indirect lock 124 * inherited from. A lock provider may also define a key to the 125 * inherited lock, for fast datbase lookup. The key is opaque outside 131 apr_datum_t key; member in struct:dav_lock_indirect 152 + sizeof(int) + (a)->key.dsize) 190 apr_datum_t key; /* key into the lock database */ member in struct:dav_lock_private 231 static dav_lock *dav_generic_alloc_lock(dav_lockdb *lockdb, apr_datum_t key, argument 239 comb->priv.key 402 apr_datum_t key; local 433 dav_generic_save_lock_record(dav_lockdb *lockdb, apr_datum_t key, dav_lock_discovery *direct, dav_lock_indirect *indirect) argument 551 dav_generic_load_lock_record(dav_lockdb *lockdb, apr_datum_t key, int add_method, dav_lock_discovery **direct, dav_lock_indirect **indirect) argument 772 apr_datum_t key; local 789 apr_datum_t key; local 868 apr_datum_t key; local 930 apr_datum_t key; local 962 apr_datum_t key; local 1038 apr_datum_t key; local 1110 apr_datum_t key; local [all...] |
/httpd/modules/dav/fs/ |
H A D | dbm.c | 62 apr_datum_t iter; /* iteration key */ 192 dav_error * dav_dbm_fetch(dav_db *db, apr_datum_t key, apr_datum_t *pvalue) argument 196 if (!key.dptr) { 197 /* no key could be created (namespace not known) => no value */ 201 status = apr_dbm_fetch(db->file, key, pvalue); 207 dav_error * dav_dbm_store(dav_db *db, apr_datum_t key, apr_datum_t value) argument 209 apr_status_t status = apr_dbm_store(db->file, key, value); 214 dav_error * dav_dbm_delete(dav_db *db, apr_datum_t key) argument 216 apr_status_t status = apr_dbm_delete(db->file, key); 221 int dav_dbm_exists(dav_db *db, apr_datum_t key) argument 288 apr_datum_t key; member in struct:dav_deadprop_rollback 307 apr_datum_t key = { 0 }; local 392 apr_datum_t key; local 486 apr_datum_t key; local 543 apr_datum_t key = dav_build_key(db, name); local 614 apr_datum_t key = dav_build_key(db, name); local 636 apr_datum_t key = dav_build_key(db, name); local 642 apr_datum_t key = dav_build_key(db, name); local 720 apr_datum_t key; local [all...] |
H A D | repos.h | 60 dav_error * dav_dbm_delete(dav_db *db, apr_datum_t key); 61 dav_error * dav_dbm_store(dav_db *db, apr_datum_t key, apr_datum_t value); 62 dav_error * dav_dbm_fetch(dav_db *db, apr_datum_t key, apr_datum_t *pvalue); 64 int dav_dbm_exists(dav_db *db, apr_datum_t key);
|
H A D | lock.c | 70 ** char[] key] 71 ** The key is to the collection lock that resulted in this indirect lock 135 * inherited from. A lock provider may also define a key to the 136 * inherited lock, for fast datbase lookup. The key is opaque outside 142 apr_datum_t key; member in struct:dav_lock_indirect 163 + sizeof((a)->key.dsize) + (a)->key.dsize) 200 apr_datum_t key; /* key into the lock database */ member in struct:dav_lock_private 216 static dav_lock *dav_fs_alloc_lock(dav_lockdb *lockdb, apr_datum_t key, argument 384 apr_datum_t key; local 414 dav_fs_save_lock_record(dav_lockdb *lockdb, apr_datum_t key, dav_lock_discovery *direct, dav_lock_indirect *indirect) argument 521 dav_fs_load_lock_record(dav_lockdb *lockdb, apr_datum_t key, int add_method, dav_lock_discovery **direct, dav_lock_indirect **indirect) argument 978 apr_datum_t key; local 997 apr_datum_t key; local 1075 apr_datum_t key; local 1137 apr_datum_t key; local 1169 apr_datum_t key; local 1252 apr_datum_t key; local 1342 apr_datum_t key; local [all...] |
/httpd/support/ |
H A D | dbmmanage.in | 144 my($file,$command,$key,$crypted_pwd,$groups,$comment) = @ARGV; 245 die "Sorry, user `$key' doesn't exist!\n" unless $DB{$key}; 246 $crypted_pwd = (split /:/, $DB{$key}, 3)[0] if $crypted_pwd eq '.'; 247 $groups = (split /:/, $DB{$key}, 3)[1] if !$groups || $groups eq '.'; 248 $comment = (split /:/, $DB{$key}, 3)[2] if !$comment || $comment eq '.'; 260 die "Sorry, user `$key' already exists!\n" if $DB{$key}; 266 $DB{$key} = $crypted_pwd; 268 print "User $key [all...] |
H A D | htdbm.c | 157 apr_datum_t key, val; local 162 key.dptr = htdbm->username; 163 key.dsize = strlen(htdbm->username); 164 if (apr_dbm_exists(htdbm->dbm, key)) 175 return apr_dbm_store(htdbm->dbm, key, val); 180 apr_datum_t key; local 182 key.dptr = htdbm->username; 183 key.dsize = strlen(htdbm->username); 184 if (!apr_dbm_exists(htdbm->dbm, key)) 187 return apr_dbm_delete(htdbm->dbm, key); 192 apr_datum_t key, val; local 214 apr_datum_t key, val; local [all...] |
/httpd/modules/arch/win32/ |
H A D | mod_win32.c | 148 ap_regkey_t *key; local 163 /* Open the key associated with the script filetype extension */ 174 /* Open the key associated with the script filetype extension */ 179 /* Open the key for the script command path by: 181 * 1) the 'named' filetype key for ExecCGI/Command 182 * 2) the extension's type key for ExecCGI/Command 186 * 3) the 'named' filetype key for Open/Command 187 * 4) the extension's type key for Open/Command 191 if ((rv = ap_regkey_open(&key, name_key, execcgi_path, APR_READ, p)) 193 rv = ap_regkey_value_get(&buffer, key, "", [all...] |
/httpd/modules/cache/ |
H A D | cache_storage.c | 50 "cache: Removing url %s from the cache", h->cache_obj->key); 82 "cache: No cache request information available for key" 87 if (!cache->key) { 88 rv = cache_generate_key(r, r->pool, &cache->key); 97 switch (rv = list->provider->create_entity(h, r, cache->key, size, in)) { 116 static int filter_header_do(void *v, const char *key, const char *val) argument 118 if ((*key == 'W' || *key == 'w') && !strcasecmp(key, "Warning") 126 apr_table_addn(v, key, va 130 remove_header_do(void *v, const char *key, const char *val) argument 142 add_header_do(void *v, const char *key, const char *val) argument 429 cache_canonicalise_key(request_rec *r, apr_pool_t* p, const char *uri, apr_uri_t *parsed_uri, const char **key) argument 669 cache_generate_key_default(request_rec *r, apr_pool_t* p, const char **key) argument [all...] |
H A D | mod_cache_socache.c | 43 * Fetch URI key (may contain Format #1 or Format #2) 46 * regenerate key using HeaderName+HeaderValue+.../foo/bar/baz 47 * re-read in key (must be format #2) 83 const char *key; /* On-disk prefix; URI with Vary bits (if present) */ member in struct:cache_socache_object_t 193 apr_size_t key = *slider, colon = 0, len = 0; local 205 if (key == *slider) { 221 + key, len - key), apr_pstrndup(r->pool, 227 key = *slider; 250 if (elts[i].key ! 350 create_entity(cache_handle_t *h, request_rec *r, const char *key, apr_off_t len, apr_bucket_brigade *bb) argument 431 open_entity(cache_handle_t *h, request_rec *r, const char *key) argument [all...] |
H A D | cache_storage.h | 58 const char **key);
|
/httpd/modules/aaa/ |
H A D | mod_authn_dbm.c | 89 apr_datum_t key, val; local 99 key.dptr = (char*)user; 101 key.dsize = strlen(key.dptr); 103 key.dsize = strlen(key.dptr) + 1; 108 if (apr_dbm_fetch(f, key, &val) == APR_SUCCESS && val.dptr) {
|
H A D | mod_authn_socache.c | 294 const char *key; local 330 /* first build our key and determine expiry time */ 331 key = construct_key(r, dcfg->context, user, realm); 336 (unsigned char*)key, strlen(key), expiry, 362 /* construct key 373 const char *key; local 381 key = construct_key(r, dcfg->context, user, NULL); 383 (unsigned char*)key, strlen(key), 418 const char *key; local [all...] |
/httpd/os/win32/ |
H A D | ap_regkey.c | 46 static apr_status_t regkey_cleanup(void *key) argument 48 ap_regkey_t *regkey = key; 155 * if subkeys exist when attempting to delete a key. 180 ap_regkey_t *key, 205 rc = RegQueryValueExW(key->hkey, wvalname, 0, &type, NULL, (DWORD *)&size); 215 rc = RegQueryValueExW(key->hkey, wvalname, 0, &type, 251 rc = RegQueryValueEx(key->hkey, valuename, 0, &type, NULL, (DWORD *)&size); 261 rc = RegQueryValueEx(key->hkey, valuename, 0, &type, *result, (DWORD *)&size); 283 AP_DECLARE(apr_status_t) ap_regkey_value_set(ap_regkey_t *key, 323 rc = RegSetValueExW(key [all...] |
/httpd/modules/proxy/ |
H A D | mod_serf.c | 143 static int copy_headers_in(void *vbaton, const char *key, const char *value) argument 151 switch (key[0]) { 154 if (strcasecmp("Accept-Encoding", key) == 0) { 160 if (strcasecmp("Connection", key) == 0) { 166 if (strcasecmp("Host", key) == 0) { 172 if (strcasecmp("Keep-Alive", key) == 0) { 178 if (strcasecmp("TE", key) == 0) { 181 if (strcasecmp("Trailer", key) == 0) { 187 if (strcasecmp("Upgrade", key) == 0) { 195 serf_bucket_headers_setn(hdrs_bkt, key, valu 199 copy_headers_out(void *vbaton, const char *key, const char *value) argument 772 hb_table_check(void *rec, const char *key, const char *value) argument 818 char *key; local 1005 static_table_check(void *rec, const char *key, const char *value) argument [all...] |
H A D | ajp_header.c | 268 if ((sc = sc_for_req_header(elts[i].key)) != UNKNOWN_METHOD) { 277 if (ajp_msg_append_string(msg, elts[i].key)) { 293 i, elts[i].key, elts[i].val); 402 "Error appending the SSL key size"); 426 const char *key = SC_A_SSL_PROTOCOL; local 428 ajp_msg_append_string(msg, key) || 433 key, envvar); 446 const char *key = SC_A_REQ_REMOTE_PORT; local 449 ajp_msg_append_string(msg, key) || 454 key, va 466 const char *key = SC_A_REQ_LOCAL_ADDR; local 532 addit_dammit(void *v, const char *key, const char *val) argument [all...] |
/httpd/modules/ssl/ |
H A D | ssl_util.c | 139 * certain key data needs to survive restarts, 146 const char *key, 149 apr_ssize_t klen = strlen(key); 150 ssl_asn1_t *asn1 = apr_hash_get(table, key, klen); 153 * if a value for this key already exists, 174 apr_hash_set(table, key, klen, asn1); 180 const char *key) 182 return (ssl_asn1_t *)apr_hash_get(table, key, APR_HASH_KEY_STRING); 186 const char *key) 188 apr_ssize_t klen = strlen(key); 145 ssl_asn1_table_set(apr_hash_t *table, const char *key, long int length) argument 179 ssl_asn1_table_get(apr_hash_t *table, const char *key) argument 185 ssl_asn1_table_unset(apr_hash_t *table, const char *key) argument [all...] |
/httpd/modules/dav/main/ |
H A D | liveprop.c | 72 const void *key; local 76 apr_hash_this(idx, &key, NULL, &val); 78 s = apr_psprintf(p, " xmlns:lp%ld=\"%s\"", (long)val, (const char *)key);
|
/httpd/test/ |
H A D | make_sni.sh | 114 # serial with a different pub-key. 127 -keyout ${DIR}/root.key -out ${DIR}/root.pem \ 137 -keyout ${CDIR}/xs-root-1.key -out ${CDIR}/xs-root-1.pem \ 143 -keyout ${CDIR}/xs-root-2.key -out ${CDIR}/xs-root-2.pem \ 164 -keyout ${CDIR}/client-$i.key -out ${CDIR}/client-$i.req -batch \ 170 -CA ${CDIR}/xs-root-$i.pem -CAkey ${CDIR}/xs-root-$i.key \ 177 -inkey ${CDIR}/client-$i.key -in ${CDIR}/client-$i.pem -name "Client $i" \ 251 -keyout ${DIR}/$n.key -out ${DIR}/$n.req -batch \ 257 -CA ${DIR}/root.pem -CAkey ${DIR}/root.key \ 261 # Combine the key an [all...] |