/httpd/modules/filters/ |
H A D | mod_data.c | 134 /* buffer big enough for 8000 encoded bytes (6000 raw bytes) and terminator */ 136 char encoded[((sizeof(ctx->overflow)) / 3) * 4 + 1]; local 145 len = apr_base64_encode_binary(encoded, ctx->overflow, 147 apr_brigade_write(ctx->bb, NULL, NULL, encoded, len - 1); 202 len = apr_base64_encode_binary(encoded, ctx->overflow, 204 apr_brigade_write(ctx->bb, NULL, NULL, encoded, len - 1);
|
/httpd/modules/session/ |
H A D | mod_session_cookie.c | 68 if (z->encoded && z->encoded[0]) { 69 ap_cookie_write(r, conf->name, z->encoded, conf->name_attrs, 81 if (z->encoded && z->encoded[0]) { 82 ap_cookie_write2(r, conf->name2, z->encoded, conf->name2_attrs, 159 zz->encoded = val;
|
H A D | mod_session_crypto.c | 345 char *encoded = NULL; local 351 if (dconf->passphrases_set && z->encoded && *z->encoded) { 353 res = encrypt_string(r, f, dconf, z->encoded, &encoded); 359 z->encoded = encoded; 376 char *encoded = NULL; local 382 if ((dconf->passphrases_set) && z->encoded && *z->encoded) { [all...] |
H A D | mod_session.c | 352 z->encoded = buffer; 369 * Name / value pairs that are not encoded properly are ignored. 378 char *encoded, *pair; local 382 if (!z->encoded) { 387 encoded = apr_pstrdup(r->pool, z->encoded); 388 pair = apr_strtok(encoded, sep, &last); 409 z->encoded = NULL; 461 z->encoded = override; 516 if (z->encoded) { [all...] |
H A D | mod_session.h | 89 const char *encoded; /* the encoded version of the key value pairs */ member in struct:__anon308 146 * In the default implementation, the key value pairs are encoded using 159 * In the default implementation, the key value pairs are encoded using
|
H A D | mod_session_dbd.c | 239 zz->encoded = val; 428 if (z->encoded && z->encoded[0]) { 429 ret = dbd_save(r, oldkey, newkey, z->encoded, z->expiry); 461 ret = dbd_save(r, r->user, r->user, z->encoded, z->expiry);
|
/httpd/include/ |
H A D | util_cookies.h | 51 const char *encoded; member in struct:__anon42
|
/httpd/server/ |
H A D | util_cookies.c | 202 if (v->encoded) { 203 if (strcmp(v->encoded, trim + len)) { 207 v->encoded = apr_pstrdup(v->r->pool, trim + len); 250 v.encoded = NULL; 271 *val = v.encoded;
|
H A D | log.c | 767 char *encoded; local 801 encoded = apr_palloc(r ? r->pool : c->pool, len); 802 apr_base64_encode(encoded, (char *)&id, sizeof(id)); 805 encoded[len - 2] = '\0'; 807 *idstring = encoded;
|
H A D | util.c | 903 * Since MS configuration files are all protecting utf-8 encoded 1774 /* reserve (do not decode) encoded slashes */ 1785 * don't get mangled. Where does that leave encoded '&' ? 2319 char *encoded; local 2322 encoded = (char *) apr_palloc(p, 1 + apr_base64_encode_len(l)); 2323 l = apr_base64_encode(encoded, string, l); 2324 encoded[l] = '\0'; /* make binary sequence into string */ 2326 return encoded;
|
/httpd/modules/ssl/ |
H A D | ssl_scache.c | 118 unsigned char encoded[MODSSL_SESSION_MAX_DER], *ptr; local 124 if (len > sizeof encoded) { 130 ptr = encoded; 138 expiry, encoded, len, p);
|
/httpd/modules/lua/ |
H A D | lua_request.c | 821 char *encoded; local 830 encoded = apr_palloc(r->pool, encoded_len); 831 encoded_len = apr_base64_encode(encoded, plain, plain_len); 832 if (encoded_len > 0 && encoded[encoded_len - 1] == '\0') 834 lua_pushlstring(L, encoded, encoded_len); 845 const char *encoded; local 852 encoded = lua_tolstring(L, 2, &encoded_len); 853 decoded_len = apr_base64_decode_len(encoded); 856 decoded_len = apr_base64_decode(plain, encoded); 866 * lua_ap_unescape; r:unescape(string) - Unescapes an URL-encoded strin 2143 char *encoded; local [all...] |
/httpd/modules/cache/ |
H A D | mod_socache_shmcb.c | 481 unsigned char *encoded, 499 if (shmcb_subcache_store(s, header, subcache, encoded, 478 socache_shmcb_store(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, apr_time_t expiry, unsigned char *encoded, unsigned int len_encoded, apr_pool_t *p) argument
|