PATCHES ACCEPTED TO BACKPORT FROM TRUNK:
[ start all new proposals below, under PATCHES PROPOSED. ]
- * ssl/ssl_engine_io.c: Fix SSL Protocol hexdumps for EBCDIC systems
- A conversion is required for mod_ssl to display the SSL protocol correctly
- on EBCDIC machines. Backport of rev. 349906
- Trunk version of patch:
- http://svn.apache.org/viewvc?view=rev&revision=349906 from 2005-11-30
- 2.2.x version of patch:
- http://people.apache.org/~martin/ssl_engine_io.c.349906.patch
- +1: martin, rpluem, jim
-
* mod_proxy_http: Don't wait for response body in a HEAD request
PR 41644
http://svn.apache.org/viewvc?view=rev&revision=571002
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, srvr,
"+-------------------------------------------------------------------------+");
for(i = 0 ; i< rows; i++) {
+#if APR_CHARSET_EBCDIC
+ char ebcdic_text[DUMP_WIDTH];
+ /* Determine how many bytes we are going to process in this row. */
+ j = DUMP_WIDTH;
+ if ((i * DUMP_WIDTH + j) > len)
+ j = len % DUMP_WIDTH;
+ if (j == 0) j = DUMP_WIDTH;
+ memcpy(ebcdic_text, (char *)(s) + i * DUMP_WIDTH, j);
+ ap_xlate_proto_from_ascii(ebcdic_text, j);
+#endif
apr_snprintf(tmp, sizeof(tmp), "| %04x: ", i * DUMP_WIDTH);
apr_cpystrn(buf, tmp, sizeof(buf));
for (j = 0; j < DUMP_WIDTH; j++) {
apr_cpystrn(buf+strlen(buf), " ", sizeof(buf)-strlen(buf));
else {
ch = ((unsigned char)*((char *)(s) + i * DUMP_WIDTH + j)) & 0xff;
+#if APR_CHARSET_EBCDIC
+ apr_snprintf(tmp, sizeof(tmp), "%c", ((ch >= 0x20 /*' '*/) && (ch <= 0x7e /*'~'*/)) ? ebcdic_text[j] : '.');
+#else
apr_snprintf(tmp, sizeof(tmp), "%c", ((ch >= ' ') && (ch <= '~')) ? ch : '.');
+#endif
apr_cpystrn(buf+strlen(buf), tmp, sizeof(buf)-strlen(buf));
}
}