Searched refs:maxlen (Results 1 - 8 of 8) sorted by relevance

/httpd/modules/ssl/
H A Dssl_util_ssl.c225 * to maxlen characters (specify a maxlen of 0 for no length limit)
227 char *SSL_X509_NAME_to_string(apr_pool_t *p, X509_NAME *dn, int maxlen) argument
238 result = apr_palloc(p, (maxlen > 0) ? maxlen+1 : len+1);
239 if (maxlen > 0 && maxlen < len) {
240 len = BIO_read(bio, result, maxlen);
241 if (maxlen > 2) {
243 apr_snprintf(result + maxlen
[all...]
H A Dssl_engine_io.c1807 int ssl_io_buffer_fill(request_rec *r, apr_size_t maxlen) argument
1825 "%" APR_SIZE_T_FMT " bytes", maxlen);
1881 if (total > maxlen) {
1884 ") for SSL buffer", maxlen);
H A Dssl_private.h872 int ssl_io_buffer_fill(request_rec *r, apr_size_t maxlen);
/httpd/include/
H A Dutil_fcgi.h216 * @param maxlen The maximum buffer size allowable, capped at
231 apr_size_t maxlen,
H A Dutil_varbuf.h163 * @param maxlen The maximum string length to append to vb, 0 for unlimited
176 apr_size_t maxlen);
H A Dhttpd.h1771 * @return The len of the escaped string (always < maxlen)
1979 * @param maxlen the maximum string length to return, 0 for unlimited
1986 apr_size_t maxlen);
/httpd/server/
H A Dutil_fcgi.c117 apr_size_t maxlen,
125 if (maxlen > AP_FCGI_MAX_CONTENT_LEN) {
126 maxlen = AP_FCGI_MAX_CONTENT_LEN;
167 if (envlen > maxlen) {
H A Dutil.c384 ap_regmatch_t pmatch[], apr_size_t maxlen)
397 if (maxlen > 0 && len >= maxlen)
429 if (len >= maxlen && maxlen > 0)
488 apr_size_t maxlen)
491 pmatch, maxlen);
2942 apr_size_t maxlen)
2944 return regsub_core(NULL, NULL, vb, input, source, nmatch, pmatch, maxlen);
381 regsub_core(apr_pool_t *p, char **result, struct ap_varbuf *vb, const char *input, const char *source, apr_size_t nmatch, ap_regmatch_t pmatch[], apr_size_t maxlen) argument

Completed in 41 milliseconds