You've already forked lazarus-ccr
git-svn-id: https://svn.code.sf.net/p/lazarus-ccr/svn@25 8e941d3f-bd1b-0410-a28a-d453659cc2b4
176 lines
7.3 KiB
PHP
176 lines
7.3 KiB
PHP
{ Licensed to the Apache Software Foundation (ASF) under one or more
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
* this work for additional information regarding copyright ownership.
|
|
* The ASF licenses this file to You under the Apache License, Version 2.0
|
|
* (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
}
|
|
|
|
{
|
|
* The ap_vsnprintf/ap_snprintf functions are based on, and used with the
|
|
* permission of, the SIO stdio-replacement strx_* functions by Panos
|
|
* Tsirigotis <panos@alumni.cs.colorado.edu> for xinetd.
|
|
}
|
|
|
|
function ap_cpystrn(param1: PChar; const param2: PChar; param3: size_t): PChar;
|
|
{$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|
|
{int ap_slack(int, int);
|
|
int ap_execle(const char *, const char *, ...);
|
|
int ap_execve(const char *, char * const argv[], char * const envp[]); }
|
|
|
|
//function ap_getpass(const prompt: PChar; pwbuf: PChar; bufsiz: size_t): cint;
|
|
// {$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|
|
//{$ifndef ap_strtol}
|
|
//function ap_strtol(const nptr: PChar; endptr: PPChar; base: cint): clong;
|
|
// {$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
//{$endif}
|
|
|
|
{ small utility macros to make things easier to read }
|
|
|
|
{.$ifdef WIN32
|
|
#define ap_killpg(x, y)
|
|
#else
|
|
#ifdef NO_KILLPG
|
|
#define ap_killpg(x, y) (kill (-(x), (y)))
|
|
#else
|
|
#define ap_killpg(x, y) (killpg ((x), (y)))
|
|
#endif
|
|
#endif} { WIN32 }
|
|
|
|
{ ap_vformatter() is a generic printf-style formatting routine
|
|
* with some extensions. The extensions are:
|
|
*
|
|
* %pA takes a struct in_addr *, and prints it as a.b.c.d
|
|
* %pI takes a struct sockaddr_in * and prints it as a.b.c.d:port
|
|
* %pp takes a void * and outputs it in hex
|
|
*
|
|
* The %p hacks are to force gcc's printf warning code to skip
|
|
* over a pointer argument without complaining. This does
|
|
* mean that the ANSI-style %p (output a void * in hex format) won't
|
|
* work as expected at all, but that seems to be a fair trade-off
|
|
* for the increased robustness of having printf-warnings work.
|
|
*
|
|
* Additionally, ap_vformatter allows for arbitrary output methods
|
|
* using the ap_vformatter_buff and flush_func.
|
|
*
|
|
* The ap_vformatter_buff has two elements curpos and endpos.
|
|
* curpos is where ap_vformatter will write the next byte of output.
|
|
* It proceeds writing output to curpos, and updating curpos, until
|
|
* either the end of output is reached, or curpos == endpos (i.e. the
|
|
* buffer is full).
|
|
*
|
|
* If the end of output is reached, ap_vformatter returns the
|
|
* number of bytes written.
|
|
*
|
|
* When the buffer is full, the flush_func is called. The flush_func
|
|
* can return -1 to indicate that no further output should be attempted,
|
|
* and ap_vformatter will return immediately with -1. Otherwise
|
|
* the flush_func should flush the buffer in whatever manner is
|
|
* appropriate, re-initialize curpos and endpos, and return 0.
|
|
*
|
|
* Note that flush_func is only invoked as a result of attempting to
|
|
* write another byte at curpos when curpos >= endpos. So for
|
|
* example, it's possible when the output exactly matches the buffer
|
|
* space available that curpos == endpos will be true when
|
|
* ap_vformatter returns.
|
|
*
|
|
* ap_vformatter does not call out to any other code, it is entirely
|
|
* self-contained. This allows the callers to do things which are
|
|
* otherwise "unsafe". For example, ap_psprintf uses the "scratch"
|
|
* space at the unallocated end of a block, and doesn't actually
|
|
* complete the allocation until ap_vformatter returns. ap_psprintf
|
|
* would be completely broken if ap_vformatter were to call anything
|
|
* that used a pool. Similarly http_bprintf() uses the "scratch"
|
|
* space at the end of its output buffer, and doesn't actually note
|
|
* that the space is in use until it either has to flush the buffer
|
|
* or until ap_vformatter returns.
|
|
}
|
|
|
|
type
|
|
ap_vformatter_buff = record
|
|
curpos: PChar;
|
|
endpos: PChar;
|
|
end;
|
|
|
|
Pap_vformatter_buff = ^ap_vformatter_buff;
|
|
|
|
flush_func_t = function (param: Pap_vformatter_buff): cint;
|
|
|
|
function ap_vformatter(flush_func: flush_func_t;
|
|
param2: Pap_vformatter_buff; const fmt: PChar; ap: va_list): cint;
|
|
{$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|
|
{ These are snprintf implementations based on ap_vformatter().
|
|
*
|
|
* Note that various standards and implementations disagree on the return
|
|
* value of snprintf, and side-effects due to %n in the formatting string.
|
|
* ap_snprintf behaves as follows:
|
|
*
|
|
* Process the format string until the entire string is exhausted, or
|
|
* the buffer fills. If the buffer fills then stop processing immediately
|
|
* (so no further %n arguments are processed), and return the buffer
|
|
* length. In all cases the buffer is NUL terminated. The return value
|
|
* is the number of characters placed in the buffer, excluding the
|
|
* terminating NUL. All this implies that, at most, (len-1) characters
|
|
* will be copied over; if the return value is >= len, then truncation
|
|
* occured.
|
|
*
|
|
* In no event does ap_snprintf return a negative number.
|
|
}
|
|
function ap_snprintf(buf: PChar; len: size_t; const format: PChar;
|
|
others: array of const): cint; cdecl; external LibHTTPD;
|
|
|
|
// __attribute__((format(printf,3,4)));
|
|
|
|
function ap_vsnprintf(buf: PChar; len: size_t; const format: PChar; ap: va_list): cint;
|
|
{$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|
|
{ Simple BASE64 encode/decode functions.
|
|
*
|
|
* As we might encode binary strings, hence we require the length of
|
|
* the incoming plain source. And return the length of what we decoded.
|
|
*
|
|
* The decoding function takes any non valid char (i.e. whitespace, \0
|
|
* or anything non A-Z,0-9 etc as terminal.
|
|
*
|
|
* plain strings/binary sequences are not assumed '\0' terminated. Encoded
|
|
* strings are neither. But propably should.
|
|
*
|
|
}
|
|
function ap_base64encode_len(len: cint): cint;
|
|
{$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|
|
function ap_base64encode(coded_dst: PChar; const plain_src: PChar; len_plain_src: cint): cint;
|
|
{$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|
|
function ap_base64encode_binary(coded_dst: PChar; const plain_src: PChar; len_plain_src: cint): cint;
|
|
{$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|
|
|
|
function ap_base64decode_len(const coded_src: PChar): cint;
|
|
{$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|
|
function ap_base64decode(plain_dst: PChar; const coded_src: PChar): cint;
|
|
{$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|
|
function ap_base64decode_binary(plain_dst: PChar; const coded_src: PChar): cint;
|
|
{$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|
|
{ Password validation, as used in AuthType Basic which is able to cope
|
|
* (based on the prefix) with the SHA1, Apache's internal MD5 and (depending
|
|
* on your platform either plain or crypt(3) passwords.
|
|
}
|
|
function ap_validate_password(const passwd, hash: PChar): PChar;
|
|
{$IFDEF WINDOWS} stdcall; {$ELSE} cdecl; {$ENDIF} external LibHTTPD;
|
|
|