dgaudet     99/06/24 18:17:01

  Modified:    mpm/src/main http_protocol.c
  Log:
  random futzing around
  
  Revision  Changes    Path
  1.7       +9 -9      apache-2.0/mpm/src/main/http_protocol.c
  
  Index: http_protocol.c
  ===================================================================
  RCS file: /home/cvs/apache-2.0/mpm/src/main/http_protocol.c,v
  retrieving revision 1.6
  retrieving revision 1.7
  diff -u -r1.6 -r1.7
  --- http_protocol.c   1999/06/24 07:29:31     1.6
  +++ http_protocol.c   1999/06/25 01:16:57     1.7
  @@ -1364,15 +1364,15 @@
    * It is more expensive to check the User-Agent than it is to just add the
    * bytes, so we haven't used the BrowserMatch feature here.
    */
  -static void terminate_header(BUFF *client)
  +static void terminate_header(request_rec *r)
   {
       long int bs;
   
  -    ap_bgetopt(client, BO_BYTECT, &bs);
  +    ap_bgetopt(r->connection->client, BO_BYTECT, &bs);
       if (bs >= 255 && bs <= 257)
  -        ap_bputs("X-Pad: avoid browser bug\015\012", client);
  +        ap_rputs("X-Pad: avoid browser bug\015\012", r);
   
  -    ap_bputs("\015\012", client);  /* Send the terminating empty line */
  +    ap_rputs("\015\012", r);  /* Send the terminating empty line */
   }
   
   /* Build the Allow field-value from the request handler method mask.
  @@ -1440,7 +1440,7 @@
       ap_table_do((int (*) (void *, const char *, const char *)) 
ap_send_header_field,
                (void *) r, r->headers_out, NULL);
   
  -    terminate_header(r->connection->client);
  +    terminate_header(r);
   
       ap_bsetopt(r->connection->client, BO_BYTECT, &zero);
   
  @@ -1544,7 +1544,7 @@
       ap_table_do((int (*) (void *, const char *, const char *)) 
ap_send_header_field,
                (void *) r, r->headers_out, NULL);
   
  -    terminate_header(r->connection->client);
  +    terminate_header(r);
   
   
       ap_bsetopt(r->connection->client, BO_BYTECT, &zero);
  @@ -2186,7 +2186,7 @@
       int n;
   
       if (r->connection->aborted)
  -        return -1;
  +        return EOF;
   
       n = ap_bwrite(r->connection->client, buf, nbyte);
       if (n < 0) {
  @@ -2196,7 +2196,7 @@
               ap_bsetflag(r->connection->client, B_EOUT, 1);
               r->connection->aborted = 1;
           }
  -        return -1;
  +        return EOF;
       }
       SET_BYTES_SENT(r);
       return n;
  @@ -2344,7 +2344,7 @@
                       "Proxy-Authenticate",
                       NULL);
   
  -        terminate_header(r->connection->client);
  +        terminate_header(r);
   
           return;
       }
  
  
  

Reply via email to