/PHP-5.4/sapi/fpm/fpm/ |
H A D | fastcgi.c | 292 req->out_pos = req->out_buf; in fcgi_init_request() 510 req->out_pos = req->out_buf; in fcgi_read_request() 689 ret = safe_read(req, str, req->in_len); in fcgi_read() 701 if (safe_read(req, buf, req->in_pad) != req->in_pad) { in fcgi_read() 730 if ((force || !req->keep) && req->fd >= 0) { in fcgi_close() 794 req->fd = req->listen_socket; 909 req->out_hdr = (fcgi_header*) req->out_pos; 920 …req->out_pos += fcgi_make_header(req->out_hdr, (fcgi_request_type)req->out_hdr->type, req->id, len… 931 len = req->out_pos - req->out_buf; 950 req->out_pos = req->out_buf; [all …]
|
H A D | fastcgi.h | 117 void fcgi_init_request(fcgi_request *req, int listen_socket); 118 int fcgi_accept_request(fcgi_request *req); 119 int fcgi_finish_request(fcgi_request *req, int force_close); 123 void fcgi_close(fcgi_request *req, int force, int destroy); 125 char* fcgi_getenv(fcgi_request *req, const char* var, int var_len); 126 char* fcgi_putenv(fcgi_request *req, char* var, int var_len, char* val); 128 int fcgi_read(fcgi_request *req, char *str, int len); 130 ssize_t fcgi_write(fcgi_request *req, fcgi_request_type type, const char *str, int len); 131 int fcgi_flush(fcgi_request *req, int close);
|
/PHP-5.4/sapi/cgi/ |
H A D | fastcgi.c | 753 req->out_pos = req->out_buf; in fcgi_init_request() 892 req->out_pos = req->out_buf; in fcgi_read_request() 926 if (req->keep && req->tcp && !req->nodelay) { in fcgi_read_request() 1080 if (safe_read(req, buf, req->in_pad) != req->in_pad) { in fcgi_read() 1176 req->fd = req->listen_socket; 1305 …req->out_pos += fcgi_make_header(req->out_hdr, (fcgi_request_type)req->out_hdr->type, req->id, len… 1316 len = req->out_pos - req->out_buf; 1335 req->out_pos = req->out_buf; 1354 limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf); 1364 limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf); [all …]
|
H A D | fastcgi.h | 122 void fcgi_destroy_request(fcgi_request *req); 123 int fcgi_accept_request(fcgi_request *req); 124 int fcgi_finish_request(fcgi_request *req, int force_close); 126 char* fcgi_getenv(fcgi_request *req, const char* var, int var_len); 127 char* fcgi_putenv(fcgi_request *req, char* var, int var_len, char* val); 128 char* fcgi_quick_getenv(fcgi_request *req, const char* var, int var_len, unsigned int hash_value); 129 char* fcgi_quick_putenv(fcgi_request *req, char* var, int var_len, unsigned int hash_value, char* v… 130 void fcgi_loadenv(fcgi_request *req, fcgi_apply_func load_func, zval *array TSRMLS_DC); 132 int fcgi_read(fcgi_request *req, char *str, int len); 134 int fcgi_write(fcgi_request *req, fcgi_request_type type, const char *str, int len); [all …]
|
/PHP-5.4/sapi/tux/ |
H A D | php_tux.c | 41 user_req_t *req; member 94 TG(req)->bytes_sent += n; in sapi_tux_ub_write() 167 TG(req)->objectlen = count_bytes; in sapi_tux_read_post() 168 TG(req)->object_addr = buffer; in sapi_tux_read_post() 174 return TG(req)->objectlen; in sapi_tux_read_post() 184 return TG(req)->cookies; in sapi_tux_read_cookies() 230 if (TG(req)->field[0]) { \ in sapi_tux_register_variables() 391 tux_closed_conn(req->sock); in TUXAPI_handle_events() 395 TG(req) = req; in TUXAPI_handle_events() 404 return tux(TG(tux_action), req); in TUXAPI_handle_events() [all …]
|
/PHP-5.4/ext/recode/ |
H A D | recode.c | 150 char *req, *str; in PHP_FUNCTION() local 152 …if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", &req, &req_len, &str, &str_len) == FAIL… in PHP_FUNCTION() 163 if (!recode_scan_request(request, req)) { in PHP_FUNCTION() 164 php_error_docref(NULL TSRMLS_CC, E_WARNING, "Illegal recode request '%s'", req); in PHP_FUNCTION() 189 char *req; in PHP_FUNCTION() local 195 …if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "srr", &req, &req_len, &input, &output) == FA… in PHP_FUNCTION() 216 if (!recode_scan_request(request, req)) { in PHP_FUNCTION() 217 php_error_docref(NULL TSRMLS_CC, E_WARNING, "Illegal recode request '%s'", req); in PHP_FUNCTION()
|
/PHP-5.4/ext/openssl/ |
H A D | openssl.c | 777 #define PHP_SSL_REQ_INIT(req) memset(req, 0, sizeof(*req)) argument 782 req->config_filename, req->var, req->req_config TSRMLS_CC) == FAILURE) return FAILURE 807 req->req_config = CONF_load(NULL, req->config_filename, NULL); in php_openssl_parse_config() 826 CONF_get_string(req->req_config, req->section_name, "default_md")); in php_openssl_parse_config() 830 CONF_get_string(req->req_config, req->section_name, "req_extensions")); in php_openssl_parse_config() 832 CONF_get_number(req->req_config, req->section_name, "default_bits")); in php_openssl_parse_config() 868 req->digest_name = CONF_get_string(req->req_config, req->section_name, "default_md"); in php_openssl_parse_config() 871 req->digest = req->md_alg = EVP_get_digestbyname(req->digest_name); in php_openssl_parse_config() 874 req->md_alg = req->digest = EVP_sha1(); in php_openssl_parse_config() 894 if (req->priv_key) { in php_openssl_dispose_config() [all …]
|
H A D | README | 240 openssl req -new -key /tmp/test.key -out /tmp/test.crt -days 365 -x509
|
/PHP-5.4/sapi/apache_hooks/ |
H A D | sapi_apache.c | 66 zval *req; in apache_php_module_hook() local 81 req = php_apache_request_new(r); in apache_php_module_hook() 82 php_register_variable_ex("request", req, PG(http_globals)[TRACK_VARS_SERVER] TSRMLS_CC); in apache_php_module_hook() 116 zval_dtor(req); in apache_php_module_hook()
|
H A D | php_apache.c | 163 zval *req; in php_apache_request_new() local 172 MAKE_STD_ZVAL(req); in php_apache_request_new() 173 object_init_ex(req, apacherequest_class_entry); in php_apache_request_new() 174 zend_hash_index_update(Z_OBJPROP_P(req), 0, &addr, sizeof(zval *), NULL); in php_apache_request_new() 176 return req; in php_apache_request_new()
|
/PHP-5.4/ext/xmlrpc/tests/ |
H A D | bug51288.phpt | 8 $req = '<?xml version="1.0"?><methodCall></methodCall>'; 9 var_dump(xmlrpc_decode_request($req, $method));
|
H A D | bug47818.phpt | 23 function call($req) { 24 return xmlrpc_server_call_method($this->s, $req, null);
|
H A D | bug50761.phpt | 7 $req = '<?xml version="1.0"?> 30 $res = xmlrpc_server_call_method($server, $req, null);
|
/PHP-5.4/ext/soap/tests/schema/ |
H A D | test_schema.inc | 65 $req = $x->__getlastrequest(); 67 $HTTP_RAW_POST_DATA = $req; 71 echo $req; 74 echo $req;
|
/PHP-5.4/ext/soap/tests/bugs/ |
H A D | bug42183.phpt | 10 $req = <<<EOF 23 $server->handle($req);
|
H A D | bug44882.phpt | 11 public function __doRequest($req, $loc, $act, $ver, $one_way = 0)
|
/PHP-5.4/sapi/cli/ |
H A D | php_cli_server.c | 1284 req->vpath = NULL; in php_cli_server_request_ctor() 1285 req->vpath_len = 0; in php_cli_server_request_ctor() 1288 req->path_info = NULL; in php_cli_server_request_ctor() 1289 req->path_info_len = 0; in php_cli_server_request_ctor() 1293 req->content = NULL; in php_cli_server_request_ctor() 1294 req->content_len = 0; in php_cli_server_request_ctor() 1295 req->ext = NULL; in php_cli_server_request_ctor() 1296 req->ext_len = 0; in php_cli_server_request_ctor() 1305 if (req->vpath) { in php_cli_server_request_dtor() 1311 if (req->path_info) { in php_cli_server_request_dtor() [all …]
|
/PHP-5.4/ext/openssl/tests/ |
H A D | openssl.cnf | 1 [ req ]
|
/PHP-5.4/ext/phar/tests/files/ |
H A D | openssl.cnf | 1 [ req ]
|
/PHP-5.4/ext/ldap/tests/ |
H A D | README | 9 $ openssl req -newkey rsa:1024 -x509 -nodes -out server.pem -keyout server.pem -days 3650
|
/PHP-5.4/ext/xmlrpc/libxmlrpc/ |
H A D | xmlrpc.c | 743 XMLRPC_REQUEST req = XMLRPC_REQUEST_FromXML(in_buf, len, in_options); in XMLRPC_VALUE_FromXML() local 745 if(req) { in XMLRPC_VALUE_FromXML() 746 xResponse = req->io; in XMLRPC_VALUE_FromXML() 747 XMLRPC_RequestFree(req, 0); in XMLRPC_VALUE_FromXML()
|
/PHP-5.4/ext/ldap/ |
H A D | ldap.c | 2442 int _ldap_rebind_proc(LDAP *ldap, const char *url, ber_tag_t req, ber_int_t msgid, void *params) in _ldap_rebind_proc() argument
|
/PHP-5.4/ext/fileinfo/tests/ |
H A D | magic | 17191 0 search/1 package\ req 17192 >0 regex \^package[\ \t]+req Tcl script 17195 >0 regex \^package[\ \t]+req Tcl script
|
/PHP-5.4/ |
H A D | NEWS | 7369 - Implement #36732 (req/x509 extensions support for openssl_csr_new and
|