/httpd/modules/proxy/ |
H A D | ajp_link.c | 25 apr_size_t length; local 29 length = msg->len; 33 apr_size_t written = length; 41 length -= written; 43 } while (length); 52 apr_size_t length = len; local 58 status = apr_socket_recv(sock, (char *)(buf + rdlen), &length); 67 rdlen += length; 68 length = len - rdlen; 103 "of length [all...] |
H A D | mod_proxy_scgi.c | 156 b->length = (apr_size_t)(-1); 228 static int sendall(proxy_conn_rec *conn, const char *buf, apr_size_t length, argument 234 while (length > 0) { 235 written = length; 246 length -= written;
|
/httpd/docs/manual/style/scripts/ |
H A D | prettify.js | 255 for (var i = 0, n = regexs.length; i < n; ++i) { 304 var charsetParts = charSet.substring(1, charSet.length - 1).match( 320 for (var i = inverse ? 1 : 0, n = charsetParts.length; i < n; ++i) { 354 for (var i = 0; i < ranges.length; ++i) { 363 for (var i = 0; i < consolidatedRanges.length; ++i) { 392 var n = parts.length; 423 for (var i = 1; i < capturedGroups.length; ++i) { 455 if (p.length >= 2 && ch0 === '[') { 473 for (var i = 0, n = regexs.length; i < n; ++i) { 533 var length [all...] |
H A D | prettify.min.js | 3 PYTHON_KEYWORDS,RUBY_KEYWORDS,SH_KEYWORDS,CONFIG_KEYWORDS,PHP_KEYWORDS];var C_TYPES=/^(DIR|FILE|vector|(de|priority_)?queue|list|stack|(const_)?iterator|(multi)?(set|map)|bitset|u?(int|float|char|void|const|static|struct)\d*(_t)?\b)|[a-z_]+_rec|cmd_parms\b/;var PR_STRING='str';var PR_KEYWORD='kwd';var PR_COMMENT='com';var PR_TYPE='typ';var PR_LITERAL='lit';var PR_PUNCTUATION='pun';var PR_PLAIN='pln';var PR_TAG='tag';var PR_DECLARATION='dec';var PR_SOURCE='src';var PR_ATTRIB_NAME='atn';var PR_ATTRIB_VALUE='atv';var PR_NOCODE='nocode';var REGEXP_PRECEDER_PATTERN='(?:^^\\.?|[+-]|[!=]=?=?|\\#|%=?|&&?=?|\\(|\\*=?|[+\\-]=|->|\\/=?|::?|<<?=?|>>?>?=?|,|;|\\?|@|\\[|~|{|\\^\\^?=?|\\|\\|?=?|break|case|continue|delete|do|else|finally|instanceof|return|throw|try|typeof)\\s*';function combinePrefixPatterns(regexs){var capturedGroupIndex=0;var needToFoldCase=false;var ignoreCase=false;for(var i=0,n=regexs.length;i<n;++i){var regex=regexs[i];if(regex.ignoreCase){ignoreCase=true;}else if(/[a-z]/i.test(regex.source.replace(/\\u[0-9a-f]{4}|\\x[0-9a-f]{2}|\\[^ux]/gi,''))){needToFoldCase=true;ignoreCase=false;break;}} 8 function caseFoldCharset(charSet){var charsetParts=charSet.substring(1,charSet.length-1).match(new RegExp('\\\\u[0-9A-Fa-f]{4}' 15 for(var i=inverse?1:0,n=charsetParts.length;i<n;++i){var p=charsetParts[i];if(/\\[bdsw]/i.test(p)){out.push(p);}else{var start=decodeEscape(p);var end;if(i+2<n&&'-'===charsetParts[i+1]){end=decodeEscape(charsetParts[i+2]);i+=2;}else{end=start;} 18 ranges.sort(function(a,b){return(a[0]-b[0])||(b[1]-a[1]);});var consolidatedRanges=[];var lastRange=[];for(var i=0;i<ranges.length;++i){var range=ranges[i];if(range[0]<=lastRange[1]+1){lastRange[1]=Math.max(lastRange[1],range[1]);}else{consolidatedRanges.push(lastRange=range);}} 19 for(var i=0;i<consolidatedRanges.length;++i){var range=consolidatedRanges[i];out.push(encodeEscape(range[0]));if(range[1]>range[0]){if(range[1]+1>range[0]){out.push('-');} 31 +')','g'));var n=parts.length;var capturedGroups=[];for(var i=0,groupIndex=0;i<n;++i){var p=parts[i];if(p==='('){++groupIndex;}else if('\\'===p.charAt(0)){var decimalValue=+p.substring(1);if(decimalValue){if(decimalValue<=groupIndex){capturedGroups[decimalValue]=-1;}else{parts[i]=encodeEscape(decimalValue);}}}} 32 for(var i=1;i<capturedGroups.length;++i){if(-1===capturedGroups[i]){capturedGroups[i]=++capturedGroupIndex;}} 35 if(regex.ignoreCase&&needToFoldCase){for(var i=0;i<n;++i){var p=parts[i];var ch0=p.charAt(0);if(p.length>=2&&ch0==='['){parts[i]=caseFoldCharset(p);}else if(ch0!=='\\'){parts[i]=p.replace(/[a-zA-Z]/g,function(ch){var cc=ch.charCodeAt(0);return'['+String.fromCharCode(cc&~32,cc|32)+']';});}}} 37 var rewritten=[];for(var i=0,n=regexs.length;i<n;++i){var regex=regexs[i];if(regex.global||regex.multiline){throw new Error(''+regex);} 40 function extractSourceSpans(node,isPreformatted){var nocode=/(?:^|\s)nocode(?:\s|$)/;var chunks=[];var length [all...] |
/httpd/modules/filters/ |
H A D | mod_include.h | 114 apr_size_t length, int leave_name));
|
H A D | mod_request.c | 91 /* fail fast if the content length exceeds keep body */ 113 "Requested content-length of %" APR_OFF_T_FMT 127 /* get the brigade from upstream, and read it in to get its length */ 133 /* does the length take us over the limit? */ 140 "Requested content-length of %" APR_OFF_T_FMT 182 apr_off_t length = 0; local 188 apr_brigade_length(kept_body, 1, &length); 189 apr_table_setn(r->headers_in, "Content-Length", apr_off_t_toa(r->pool, length)); 253 * a known length, but just to be sure, this takes
|
H A D | mod_ratelimit.c | 249 b->length = 0; 265 b->length = 0;
|
H A D | mod_reflector.c | 92 /* reflect the content length, if present */ 135 if (bucket->length == 0) { 140 * We MUST read because in case we have an unknown-length
|
/httpd/build/ |
H A D | make_var_export.awk | 30 macro = substr($0, length($1)+2)
|
/httpd/server/ |
H A D | eoc_bucket.c | 30 b->length = 0;
|
H A D | util_md5.c | 53 AP_DECLARE(char *) ap_md5_binary(apr_pool_t *p, const unsigned char *buf, int length) argument 67 apr_md5_update(&my_md5, buf, (unsigned int)length);
|
H A D | core_filters.c | 58 * Remove all zero length buckets from the brigade. 64 if (e->length == 0 && !APR_BUCKET_IS_METADATA(e)) { \ 272 /* Check for the availability of buckets with known length */ 273 if (e->length != -1) { 274 len += e->length; 493 if (bucket->length == (apr_size_t)-1) { 502 bytes_in_brigade += bucket->length; 504 non_file_bytes_in_brigade += bucket->length; 676 (bucket->length >= AP_MIN_SENDFILE_BYTES)) { 700 apr_size_t length; local [all...] |
H A D | eor_bucket.c | 53 b->length = 0;
|
H A D | util_pcre.c | 91 apr_size_t length, addlength; local 95 length = strlen(message) + 1; 102 if (addlength > 0 && errbuf_size >= length + addlength) 109 return length + addlength;
|
/httpd/modules/http/ |
H A D | chunk_filter.c | 92 else if (e->length == (apr_size_t)-1) { 120 bytes += e->length;
|
H A D | byterange_filter.c | 316 /* we know that no bucket has undefined length (-1) */ 317 AP_DEBUG_ASSERT(e->length != (apr_size_t)(-1)); 318 elen64 = (apr_uint64_t)e->length; 364 if (end64 - off_last != (apr_uint64_t)e->length) { 434 * unknown length. 438 && e->length != (apr_size_t)-1); 440 clength += e->length; 445 * contain an EOS, or if any of the buckets has an unknown length; 544 * In this case, the content-length filter cannot calculate and 545 * set the content length an [all...] |
/httpd/modules/loggers/ |
H A D | mod_logio.c | 184 apr_off_t length; local 190 apr_brigade_length (bb, 0, &length); 192 if (length > 0) 193 cf->bytes_in += length;
|
/httpd/modules/ssl/ |
H A D | ssl_engine_io.c | 302 int length; member in struct:__anon318 324 * any of this data and we need to remember the length. 335 if (!buffer->length) { 339 if (buffer->length > inl) { 343 buffer->length -= inl; 347 memmove(in, buffer->value, buffer->length); 348 inl = buffer->length; 350 buffer->length = 0; 359 buffer->length = inl; 421 if (consume >= b->length) { 786 int length; local [all...] |
H A D | ssl_engine_pphrase.c | 141 long int length; local 359 length = i2d_PrivateKey(pPrivateKey, NULL); 360 ucp = ssl_asn1_table_set(mc->tPrivateKey, key_id, length); 429 static int pipe_get_passwd_cb(char *buf, int length, char *prompt, int verify) 437 rc = apr_file_gets(buf, length, readtty); 441 memset(buf, 0, length); 599 * And return its length to OpenSSL...
|
H A D | ssl_util.c | 147 long int length) 158 if (asn1->nData != length) { 169 asn1->nData = length; 171 asn1->cpData = ap_malloc(length); 145 ssl_asn1_table_set(apr_hash_t *table, const char *key, long int length) argument
|
/httpd/include/ |
H A D | http_protocol.h | 99 * Also, set content length. 106 * Set the content length for this request 108 * @param length The new content length 110 AP_DECLARE(void) ap_set_content_length(request_rec *r, apr_off_t length); 263 * @param length Amount of data to send 267 apr_size_t length, apr_size_t *nbytes); 275 * @param length The amount of data to send 281 apr_size_t length); 495 * Call this in a loop. It will put data into a buffer and return the length [all...] |
/httpd/modules/session/ |
H A D | mod_session.c | 311 int length = strlen(slider); local 312 slider += length; 313 if (length) { 342 int length = 0; local 348 identity_count, &length, z->entries, NULL); 349 buffer = apr_pcalloc(r->pool, length + 1); 629 "length of time for which a session should be valid. Zero to disable"),
|
/httpd/docs/log-message-tags/ |
H A D | update-log-msg-tags | 118 while (length $msg) {
|
/httpd/modules/core/ |
H A D | mod_macro.c | 558 int length; /* cached length of the current line */ member in struct:__anon96 587 while (ml->char_index >= ml->length) { 600 ml->length = ml->index >= ml->contents->nelts ? 653 ml->char_index = ml->length; 674 ls->length = ls->contents->nelts < 1 ?
|
/httpd/modules/aaa/ |
H A D | mod_auth_basic.c | 253 int length; local 279 length = apr_base64_decode(decoded_line, auth_line); 281 decoded_line[length] = '\0';
|