/httpd/modules/cache/ |
H A D | cache_disk_common.h | 39 #define AP_TEMPFILE_BASELEN strlen(AP_TEMPFILE_BASE) 40 #define AP_TEMPFILE_NAMELEN strlen(AP_TEMPFILE_BASE AP_TEMPFILE_SUFFIX)
|
/httpd/include/ |
H A D | util_varbuf.h | 59 apr_size_t strlen; member in struct:ap_varbuf 85 * be reallocated and the first vb->strlen + 1 bytes of memory will be copied 86 * to the new location. If vb->strlen == AP_VARBUF_UNKNOWN, the whole buffer 109 * Concatenate a string to an ap_varbuf. vb->strlen determines where 110 * the string is appended in the buffer. If vb->strlen == AP_VARBUF_UNKNOWN, 116 * @note vb->strlen will be set to the length of the new string 133 * @note ap_varbuf_pdup() uses vb->strlen to determine how much memory to 136 * @note If vb->strlen equals AP_VARBUF_UNKNOWN, it will be set to 137 * strlen(vb->buf). 149 * @note vb->strlen wil [all...] |
/httpd/modules/filters/ |
H A D | mod_include.h | 50 strlen((ctx)->error_str), (ctx)->pool, \
|
H A D | mod_proxy_html.c | 231 s_to = strlen(subs); 232 len = strlen(ctx->buf); 255 s_from = strlen(m->from.c); 256 s_to = strlen(m->to); 262 len = strlen(ctx->buf); 282 AP_fwrite(ctx, ctx->buf, strlen(ctx->buf), 1); 334 pappend(ctx, chars, strlen(chars)); 339 AP_fwrite(ctx, chars, strlen(chars), 1); 465 pappend(ctx, a[1], strlen(a[1])+1); 510 s_to = strlen(sub [all...] |
H A D | mod_substitute.c | 150 vb.strlen = 0; 158 apr_size_t repl_len = strlen(script->replacement); 173 if (vb.strlen + len + repl_len > cfg->max_line_length) 250 if (vb.strlen + regm[0].rm_so >= cfg->max_line_length) 258 cfg->max_line_length - vb.strlen); 274 repl_len = strlen(repl); 633 nscript->patlen = strlen(from); 642 nscript->replen = strlen(to);
|
/httpd/modules/lua/ |
H A D | lua_passwd.c | 100 /* XXX out >= 28 + strlen(sha1) chars - fixed len SHA */ 101 apr_sha1_base64(pw, strlen(pw), ctx->out); 132 if (strlen(pw) > 8) { 140 memset(truncpw, '\0', strlen(pw)); 174 memset(pw, '\0', strlen(pw));
|
/httpd/server/ |
H A D | util_regex.c | 160 newl = strlen(*newpattern); 168 diffsz += strlen(subs) - strlen(remainder); 172 subs = apr_palloc(pool, strlen(pattern) + 1 + diffsz);
|
H A D | util.c | 248 || strncmp(newpath, ourdir, strlen(newpath)) != 0) { 396 len = strlen(src); 436 if (vb->strlen == AP_VARBUF_UNKNOWN) 437 vb->strlen = strlen(vb->buf); 438 ap_varbuf_grow(vb, vb->strlen + len); 439 dst = vb->buf + vb->strlen; 440 vb->strlen += len; 734 apr_size_t len = strlen(*line); 1004 cp += strlen(c [all...] |
H A D | apreq_module_cgi.c | 103 long p = (long)strlen(str); 167 start += strlen(type); 177 start += strlen(name); 183 start += strlen(label); 194 start += strlen(defval); 221 start = buf[plevel] + strlen(buf[plevel]); 226 start += strlen(buf[plevel + 1]); 274 key += 5; /* strlen("HTTP_") */ 518 p = apreq_cookie_make(handle->pool, name, strlen(name), val, strlen(va [all...] |
H A D | apreq_cookie.c | 440 char *f = format + strlen(format); 458 f += strlen(f); \ 473 f += strlen(f); 478 f += strlen(f); 490 f += strlen(f); 501 f += strlen (f); \ 512 f += strlen(f); 517 f += strlen(f);
|
H A D | util_fcgi.c | 145 keylen = strlen(elts[i].key); 156 vallen = strlen(elts[i].val); 205 keylen = strlen(elts[i].key); 229 vallen = strlen(elts[i].val);
|
H A D | util_ebcdic.c | 104 len = strlen(s);
|
/httpd/modules/core/ |
H A D | mod_so.c | 235 preload_name = modp->name + strlen("mod_"); 236 preload_len = strlen(preload_name) - 2; 238 if (strlen(modname) <= strlen("_module")) { 241 thismod_len = strlen(modname) - strlen("_module");
|
H A D | mod_macro.c | 245 size_t ltabi = strlen(tab[i]); 263 size_t ltabj = strlen(tab[j]); 340 int lbuf = strlen(buf), 341 lname = strlen(name), 342 lrepl = strlen(replacement), 397 size_t lfound = strlen(tab[i]); 438 ptr += strlen(rtab[whichone]); 601 0 : strlen(tab[ml->index]); 675 0 : strlen(((char **) ls->contents->elts)[0]);
|
/httpd/support/ |
H A D | passwd_common.c | 56 int written, count = strlen(buf); 160 memset(ctx->passwd, '\0', strlen(ctx->passwd)); 202 /* XXX out >= 28 + strlen(sha1) chars - fixed len SHA */ 203 apr_sha1_base64(pw, strlen(pw), ctx->out); 237 if (strlen(pw) > 8) { 244 memset(truncpw, '\0', strlen(pw)); 277 memset(pw, '\0', strlen(pw));
|
H A D | htdbm.c | 163 key.dsize = strlen(htdbm->username); 167 val.dsize = strlen(htdbm->ctx.passwd); 173 val.dsize += (strlen(htdbm->comment) + 1); 183 key.dsize = strlen(htdbm->username); 197 key.dsize = strlen(htdbm->username); 265 if (!htdbm->username || (strlen(htdbm->username) > 64) || (strlen(htdbm->username) < 1)) {
|
/httpd/os/win32/ |
H A D | ap_regkey.c | 77 apr_size_t keylen = strlen(keyname) + 1; 139 apr_size_t keylen = strlen(keyname) + 1; 194 apr_size_t valuelen = strlen(valuename) + 1; 293 apr_size_t size = strlen(value) + 1; 300 apr_size_t valuelen = strlen(valuename) + 1; 356 apr_size_t valuelen = strlen(valuename) + 1; 415 apr_size_t valuelen = strlen(valuename) + 1; 470 apr_size_t valuelen = strlen(valuename) + 1; 548 bufsize += strlen(elts[i]) + 1; 558 apr_size_t eltsize = strlen(elt [all...] |
/httpd/modules/proxy/ |
H A D | ajp_msg.c | 24 #define AJP_MSG_DUMP_PREFIX_LENGTH strlen("XXXX ") 26 strlen("XX .")) + \ 28 strlen(" - ") + 1) 56 bl = strlen(err) + 3 * (strlen(" XXX=") + 20) + 1 + 66 current = *buf + strlen(*buf); 338 len = strlen(value);
|
/httpd/modules/http/ |
H A D | byterange_filter.c | 496 ap_xlate_proto_to_ascii(bound_head, strlen(bound_head)); 528 e = apr_bucket_pool_create(bound_head, strlen(bound_head), 534 ap_xlate_proto_to_ascii(ts, strlen(ts)); 535 e = apr_bucket_pool_create(ts, strlen(ts), r->pool, 566 ap_xlate_proto_to_ascii(end, strlen(end)); 567 e = apr_bucket_pool_create(end, strlen(end), r->pool, c->bucket_alloc);
|
/httpd/modules/ssl/ |
H A D | ssl_engine_vars.c | 249 else if (strlen(var) > 5 && strcEQn(var, "HTTP:", 5)) 304 else if (strlen(var) > 4 && strcEQn(var, "ENV:", 4)) { 318 if (strlen(var) > 4 && strcEQn(var, "SSL_", 4) 333 if (strlen(var) > 12 && strcEQn(var, "SSL_VERSION_", 12)) 378 else if (strlen(var) > 4 && strcEQn(var, "ENV:", 4)) { 402 if (strlen(var) > 8 && strcEQn(var, "VERSION_", 8)) { 432 else if (ssl != NULL && strlen(var) >= 6 && strcEQn(var, "CIPHER", 6)) { 435 else if (ssl != NULL && strlen(var) > 18 && strcEQn(var, "CLIENT_CERT_CHAIN_", 18)) { 445 else if (ssl != NULL && strlen(var) > 7 && strcEQn(var, "CLIENT_", 7)) { 451 else if (ssl != NULL && strlen(va [all...] |
/httpd/modules/aaa/ |
H A D | mod_authn_dbm.c | 101 key.dsize = strlen(key.dptr); 103 key.dsize = strlen(key.dptr) + 1;
|
/httpd/modules/metadata/ |
H A D | mod_version.c | 91 ep = version_string + strlen(version_string); 197 endp = arg2 + strlen(arg2);
|
H A D | mod_remoteip.c | 297 eos = parse_remote + strlen(parse_remote) - 1; 304 *(remote + strlen(remote)) = ','; 325 *(remote + strlen(remote)) = ','; 362 *(remote + strlen(remote)) = ',';
|
/httpd/modules/arch/win32/ |
H A D | mod_isapi.c | 509 len += strlen(elts[i].key) + strlen(elts[i].val) + 3; 522 buf_data += strlen(elts[i].key); 525 buf_data += strlen(elts[i].val); 546 len += strlen(elts[i].key) + strlen(elts[i].val) + 4; 557 buf_data += strlen(elts[i].key); 561 buf_data += strlen(elts[i].val); 574 len = strlen(result); 654 statlen = strlen(sta [all...] |
/httpd/modules/mappers/ |
H A D | mod_speling.c | 255 urlen = strlen(r->uri); 256 pglen = strlen(postgood); 276 dotloc = strlen(bad); 344 entloc = strlen(dirent.name);
|