new->file_handler_mode = apr_table_make(p, 10);
new->extra_env_vars = apr_table_make(p, 10);
- apr_table_set(new->file_type_handlers, "NLM", "OS");
+ apr_table_setn(new->file_type_handlers, "NLM", "OS");
return new;
}
if (!isSecure(r) && !isSecureUpgraded(r))
return DECLINED;
- apr_table_set(r->subprocess_env, "HTTPS", "on");
+ apr_table_setn(r->subprocess_env, "HTTPS", "on");
return DECLINED;
}
int ssl_proxy_enable(conn_rec *c)
{
- apr_table_set(c->notes, "nwconv-ssl", "Y");
+ apr_table_setn(c->notes, "nwconv-ssl", "Y");
return 1;
}
/* make sure we don't stomp on a previous warning */
if ((warn_head == NULL) ||
((warn_head != NULL) && (ap_strstr_c(warn_head, "110") == NULL))) {
- apr_table_merge(h->resp_hdrs, "Warning",
- "110 Response is stale");
+ apr_table_mergen(h->resp_hdrs, "Warning",
+ "110 Response is stale");
}
}
*/
if ((warn_head == NULL) ||
((warn_head != NULL) && (ap_strstr_c(warn_head, "113") == NULL))) {
- apr_table_merge(h->resp_hdrs, "Warning",
- "113 Heuristic expiration");
+ apr_table_mergen(h->resp_hdrs, "Warning",
+ "113 Heuristic expiration");
}
}
return 1; /* Cache object is fresh (enough) */
warn_head = apr_table_get(h->resp_hdrs, "Warning");
if ((warn_head == NULL) ||
((warn_head != NULL) && (ap_strstr_c(warn_head, "110") == NULL))) {
- apr_table_merge(h->resp_hdrs, "Warning",
- "110 Response is stale");
+ apr_table_mergen(h->resp_hdrs, "Warning",
+ "110 Response is stale");
}
return 1;
if (apr_table_get(r->subprocess_env, "force-no-vary") != NULL) {
apr_table_unset(r->headers_out, "Vary");
r->proto_num = HTTP_VERSION(1,0);
- apr_table_set(r->subprocess_env, "force-response-1.0", "1");
+ apr_table_setn(r->subprocess_env, "force-response-1.0", "1");
}
else {
fixup_vary(r);
* ensure that mod_proxy_http does the correct thing
* regarding the Connection header in the request.
*/
- apr_table_set(r->subprocess_env, "proxy-nokeepalive", "1");
+ apr_table_setn(r->subprocess_env, "proxy-nokeepalive", "1");
}
}
else if (r->proxyreq == PROXYREQ_REVERSE) {
* ensure that mod_proxy_http does the correct thing
* regarding the Connection header in the request.
*/
- apr_table_set(r->subprocess_env, "proxy-nokeepalive", "1");
+ apr_table_setn(r->subprocess_env, "proxy-nokeepalive", "1");
}
}
}
ssl_log_ssl_error(SSLLOG_MARK, APLOG_INFO, server);
/* ensure that the SSL structures etc are freed, etc: */
ssl_filter_io_shutdown(filter_ctx, c, 1);
- apr_table_set(c->notes, "SSL_connect_rv", "err");
+ apr_table_setn(c->notes, "SSL_connect_rv", "err");
return MODSSL_ERROR_BAD_GATEWAY;
}
}
/* ensure that the SSL structures etc are freed, etc: */
ssl_filter_io_shutdown(filter_ctx, c, 1);
- apr_table_set(c->notes, "SSL_connect_rv", "err");
+ apr_table_setn(c->notes, "SSL_connect_rv", "err");
return HTTP_BAD_GATEWAY;
}
X509_free(cert);
hostname, hostname_note);
/* ensure that the SSL structures etc are freed, etc: */
ssl_filter_io_shutdown(filter_ctx, c, 1);
- apr_table_set(c->notes, "SSL_connect_rv", "err");
+ apr_table_setn(c->notes, "SSL_connect_rv", "err");
return HTTP_BAD_GATEWAY;
}
}
- apr_table_set(c->notes, "SSL_connect_rv", "ok");
+ apr_table_setn(c->notes, "SSL_connect_rv", "ok");
return APR_SUCCESS;
}