Searched refs:encoded (Results 1 - 13 of 13) sorted by relevance

/httpd/modules/filters/
H A Dmod_data.c134 /* buffer big enough for 8000 encoded bytes (6000 raw bytes) and terminator */
136 char encoded[((sizeof(ctx->overflow)) / 3) * 4 + 1]; local
145 len = apr_base64_encode_binary(encoded, ctx->overflow,
147 apr_brigade_write(ctx->bb, NULL, NULL, encoded, len - 1);
202 len = apr_base64_encode_binary(encoded, ctx->overflow,
204 apr_brigade_write(ctx->bb, NULL, NULL, encoded, len - 1);
/httpd/modules/session/
H A Dmod_session_cookie.c68 if (z->encoded && z->encoded[0]) {
69 ap_cookie_write(r, conf->name, z->encoded, conf->name_attrs,
81 if (z->encoded && z->encoded[0]) {
82 ap_cookie_write2(r, conf->name2, z->encoded, conf->name2_attrs,
159 zz->encoded = val;
H A Dmod_session_crypto.c345 char *encoded = NULL; local
351 if (dconf->passphrases_set && z->encoded && *z->encoded) {
353 res = encrypt_string(r, f, dconf, z->encoded, &encoded);
359 z->encoded = encoded;
376 char *encoded = NULL; local
382 if ((dconf->passphrases_set) && z->encoded && *z->encoded) {
[all...]
H A Dmod_session.c352 z->encoded = buffer;
369 * Name / value pairs that are not encoded properly are ignored.
378 char *encoded, *pair; local
382 if (!z->encoded) {
387 encoded = apr_pstrdup(r->pool, z->encoded);
388 pair = apr_strtok(encoded, sep, &last);
409 z->encoded = NULL;
461 z->encoded = override;
516 if (z->encoded) {
[all...]
H A Dmod_session.h89 const char *encoded; /* the encoded version of the key value pairs */ member in struct:__anon308
146 * In the default implementation, the key value pairs are encoded using
159 * In the default implementation, the key value pairs are encoded using
H A Dmod_session_dbd.c239 zz->encoded = val;
428 if (z->encoded && z->encoded[0]) {
429 ret = dbd_save(r, oldkey, newkey, z->encoded, z->expiry);
461 ret = dbd_save(r, r->user, r->user, z->encoded, z->expiry);
/httpd/include/
H A Dutil_cookies.h51 const char *encoded; member in struct:__anon42
/httpd/server/
H A Dutil_cookies.c202 if (v->encoded) {
203 if (strcmp(v->encoded, trim + len)) {
207 v->encoded = apr_pstrdup(v->r->pool, trim + len);
250 v.encoded = NULL;
271 *val = v.encoded;
H A Dlog.c767 char *encoded; local
801 encoded = apr_palloc(r ? r->pool : c->pool, len);
802 apr_base64_encode(encoded, (char *)&id, sizeof(id));
805 encoded[len - 2] = '\0';
807 *idstring = encoded;
H A Dutil.c903 * Since MS configuration files are all protecting utf-8 encoded
1774 /* reserve (do not decode) encoded slashes */
1785 * don't get mangled. Where does that leave encoded '&' ?
2319 char *encoded; local
2322 encoded = (char *) apr_palloc(p, 1 + apr_base64_encode_len(l));
2323 l = apr_base64_encode(encoded, string, l);
2324 encoded[l] = '\0'; /* make binary sequence into string */
2326 return encoded;
/httpd/modules/ssl/
H A Dssl_scache.c118 unsigned char encoded[MODSSL_SESSION_MAX_DER], *ptr; local
124 if (len > sizeof encoded) {
130 ptr = encoded;
138 expiry, encoded, len, p);
/httpd/modules/lua/
H A Dlua_request.c821 char *encoded; local
830 encoded = apr_palloc(r->pool, encoded_len);
831 encoded_len = apr_base64_encode(encoded, plain, plain_len);
832 if (encoded_len > 0 && encoded[encoded_len - 1] == '\0')
834 lua_pushlstring(L, encoded, encoded_len);
845 const char *encoded; local
852 encoded = lua_tolstring(L, 2, &encoded_len);
853 decoded_len = apr_base64_decode_len(encoded);
856 decoded_len = apr_base64_decode(plain, encoded);
866 * lua_ap_unescape; r:unescape(string) - Unescapes an URL-encoded strin
2143 char *encoded; local
[all...]
/httpd/modules/cache/
H A Dmod_socache_shmcb.c481 unsigned char *encoded,
499 if (shmcb_subcache_store(s, header, subcache, encoded,
478 socache_shmcb_store(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, apr_time_t expiry, unsigned char *encoded, unsigned int len_encoded, apr_pool_t *p) argument

Completed in 64 milliseconds