dgaudet 99/06/24 18:17:01
Modified: mpm/src/main http_protocol.c
Log:
random futzing around
Revision Changes Path
1.7 +9 -9 apache-2.0/mpm/src/main/http_protocol.c
Index: http_protocol.c
===================================================================
RCS file: /home/cvs/apache-2.0/mpm/src/main/http_protocol.c,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- http_protocol.c 1999/06/24 07:29:31 1.6
+++ http_protocol.c 1999/06/25 01:16:57 1.7
@@ -1364,15 +1364,15 @@
* It is more expensive to check the User-Agent than it is to just add the
* bytes, so we haven't used the BrowserMatch feature here.
*/
-static void terminate_header(BUFF *client)
+static void terminate_header(request_rec *r)
{
long int bs;
- ap_bgetopt(client, BO_BYTECT, &bs);
+ ap_bgetopt(r->connection->client, BO_BYTECT, &bs);
if (bs >= 255 && bs <= 257)
- ap_bputs("X-Pad: avoid browser bug\015\012", client);
+ ap_rputs("X-Pad: avoid browser bug\015\012", r);
- ap_bputs("\015\012", client); /* Send the terminating empty line */
+ ap_rputs("\015\012", r); /* Send the terminating empty line */
}
/* Build the Allow field-value from the request handler method mask.
@@ -1440,7 +1440,7 @@
ap_table_do((int (*) (void *, const char *, const char *))
ap_send_header_field,
(void *) r, r->headers_out, NULL);
- terminate_header(r->connection->client);
+ terminate_header(r);
ap_bsetopt(r->connection->client, BO_BYTECT, &zero);
@@ -1544,7 +1544,7 @@
ap_table_do((int (*) (void *, const char *, const char *))
ap_send_header_field,
(void *) r, r->headers_out, NULL);
- terminate_header(r->connection->client);
+ terminate_header(r);
ap_bsetopt(r->connection->client, BO_BYTECT, &zero);
@@ -2186,7 +2186,7 @@
int n;
if (r->connection->aborted)
- return -1;
+ return EOF;
n = ap_bwrite(r->connection->client, buf, nbyte);
if (n < 0) {
@@ -2196,7 +2196,7 @@
ap_bsetflag(r->connection->client, B_EOUT, 1);
r->connection->aborted = 1;
}
- return -1;
+ return EOF;
}
SET_BYTES_SENT(r);
return n;
@@ -2344,7 +2344,7 @@
"Proxy-Authenticate",
NULL);
- terminate_header(r->connection->client);
+ terminate_header(r);
return;
}