]> git.pld-linux.org Git - packages/apache.git/commitdiff
- update to new apr functions
authorArkadiusz Miśkiewicz <arekm@maven.pl>
Sat, 13 Sep 2003 21:04:43 +0000 (21:04 +0000)
committercvs2git <feedback@pld-linux.org>
Sun, 24 Jun 2012 12:13:13 +0000 (12:13 +0000)
Changed files:
    apache-new-apr.patch -> 1.1

apache-new-apr.patch [new file with mode: 0644]

diff --git a/apache-new-apr.patch b/apache-new-apr.patch
new file mode 100644 (file)
index 0000000..2043691
--- /dev/null
@@ -0,0 +1,1090 @@
+diff -urN httpd-2.0.47.org/include/ap_compat.h httpd-2.0.47/include/ap_compat.h
+--- httpd-2.0.47.org/include/ap_compat.h       2003-09-13 14:18:37.000000000 +0200
++++ httpd-2.0.47/include/ap_compat.h   2003-09-13 22:36:19.000000000 +0200
+@@ -1,9 +1,6 @@
+ #ifndef AP_COMPAT_H
+ #define AP_COMPAT_H
+-/* Drag in apu (and therefore apr) renamed symbols */
+-#include "apu_compat.h"
+-
+ /* redefine 1.3.x symbols to the new symbol names */
+ #define MODULE_VAR_EXPORT    AP_MODULE_DECLARE_DATA
+diff -urN httpd-2.0.47.org/modules/arch/netware/mod_netware.c httpd-2.0.47/modules/arch/netware/mod_netware.c
+--- httpd-2.0.47.org/modules/arch/netware/mod_netware.c        2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/arch/netware/mod_netware.c    2003-09-13 22:41:53.000000000 +0200
+@@ -170,7 +170,7 @@
+     *ptr = '\0';
+     /* Figure out what the extension is so that we can matche it. */
+-    ext = strrchr(apr_filename_of_pathname(cmd_only), '.');
++    ext = strrchr(apr_filepath_name_get(cmd_only), '.');
+     /* If there isn't an extension then give it an empty string */
+     if (!ext) {
+diff -urN httpd-2.0.47.org/modules/arch/win32/mod_win32.c httpd-2.0.47/modules/arch/win32/mod_win32.c
+--- httpd-2.0.47.org/modules/arch/win32/mod_win32.c    2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/arch/win32/mod_win32.c        2003-09-13 22:41:53.000000000 +0200
+@@ -447,7 +447,7 @@
+      * win32 parsing here, therefore the final extension is the only one
+      * we will consider.
+      */
+-    ext = strrchr(apr_filename_of_pathname(*cmd), '.');
++    ext = strrchr(apr_filepath_name_get(*cmd), '.');
+     
+     /* If the file has an extension and it is not .com and not .exe and
+      * we've been instructed to search the registry, then do so.
+diff -urN httpd-2.0.47.org/modules/cache/mod_file_cache.c httpd-2.0.47/modules/cache/mod_file_cache.c
+--- httpd-2.0.47.org/modules/cache/mod_file_cache.c    2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/cache/mod_file_cache.c        2003-09-13 22:55:50.000000000 +0200
+@@ -314,7 +314,7 @@
+     apr_mmap_t *mm;
+     apr_bucket_brigade *bb = apr_brigade_create(r->pool, c->bucket_alloc);
+-    apr_mmap_dup(&mm, file->mm, r->pool, 0);
++    apr_mmap_dup(&mm, file->mm, r->pool);
+     b = apr_bucket_mmap_create(mm, 0, (apr_size_t)file->finfo.size,
+                                c->bucket_alloc);
+     APR_BRIGADE_INSERT_TAIL(bb, b);
+diff -urN httpd-2.0.47.org/modules/dav/fs/lock.c httpd-2.0.47/modules/dav/fs/lock.c
+--- httpd-2.0.47.org/modules/dav/fs/lock.c     2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/dav/fs/lock.c 2003-09-13 22:52:08.000000000 +0200
+@@ -671,7 +671,7 @@
+                     apr_status_t rv;
+                   /* if we don't see the file, then it's a locknull */
+-                    rv = apr_lstat(&finfo, fname, APR_FINFO_MIN, p);
++                    rv = apr_stat(&finfo, fname, APR_FINFO_MIN, p);
+                   if (rv != APR_SUCCESS && rv != APR_INCOMPLETE) {
+                       if ((err = dav_fs_remove_locknull_member(p, fname, &buf)) != NULL) {
+                             /* ### push a higher-level description? */
+diff -urN httpd-2.0.47.org/modules/dav/fs/repos.c httpd-2.0.47/modules/dav/fs/repos.c
+--- httpd-2.0.47.org/modules/dav/fs/repos.c    2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/dav/fs/repos.c        2003-09-13 22:52:08.000000000 +0200
+@@ -1490,7 +1490,7 @@
+         /* ### Optimize me, dirent can give us what we need! */
+-        status = apr_lstat(&fsctx->info1.finfo, fsctx->path1.buf, 
++        status = apr_stat(&fsctx->info1.finfo, fsctx->path1.buf, 
+                            APR_FINFO_NORM, pool);
+         if (status != APR_SUCCESS && status != APR_INCOMPLETE) {
+             /* woah! where'd it go? */
+diff -urN httpd-2.0.47.org/modules/experimental/mod_mem_cache.c httpd-2.0.47/modules/experimental/mod_mem_cache.c
+--- httpd-2.0.47.org/modules/experimental/mod_mem_cache.c      2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/experimental/mod_mem_cache.c  2003-09-13 22:50:47.000000000 +0200
+@@ -949,7 +949,7 @@
+             if (rv != APR_SUCCESS) {
+                 return rv;
+             }
+-            apr_file_unset_inherit(tmpfile);
++            apr_file_inherit_unset(tmpfile);
+             apr_os_file_get(&(mobj->fd), tmpfile);
+             /* Open for business */
+diff -urN httpd-2.0.47.org/modules/filters/mod_include.c httpd-2.0.47/modules/filters/mod_include.c
+--- httpd-2.0.47.org/modules/filters/mod_include.c     2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/filters/mod_include.c 2003-09-13 22:41:52.000000000 +0200
+@@ -192,7 +192,7 @@
+         val = ap_ht_time(r->pool, r->finfo.mtime, conf->default_time_fmt, 0);
+     }
+     else if (!strcasecmp(var, "USER_NAME")) {
+-        if (apr_get_username(&val, r->finfo.user, r->pool) != APR_SUCCESS) {
++        if (apr_uid_name_get(&val, r->finfo.user, r->pool) != APR_SUCCESS) {
+             val = "<unknown>";
+         }
+     }
+diff -urN httpd-2.0.47.org/modules/generators/mod_autoindex.c httpd-2.0.47/modules/generators/mod_autoindex.c
+--- httpd-2.0.47.org/modules/generators/mod_autoindex.c        2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/generators/mod_autoindex.c    2003-09-13 22:23:20.000000000 +0200
+@@ -812,7 +812,7 @@
+  */
+ #ifdef CASE_BLIND_FILESYSTEM
+-#define MATCH_FLAGS FNM_CASE_BLIND
++#define MATCH_FLAGS APR_FNM_CASE_BLIND
+ #else
+ #define MATCH_FLAGS 0
+ #endif
+@@ -1298,7 +1298,7 @@
+ #ifndef CASE_BLIND_FILESYSTEM
+     if (pattern && (apr_fnmatch(pattern, dirent->name,
+-                                FNM_NOESCAPE | FNM_PERIOD)
++                                APR_FNM_NOESCAPE | APR_FNM_PERIOD)
+                         != APR_SUCCESS))
+         return (NULL);
+ #else  /* !CASE_BLIND_FILESYSTEM */
+@@ -1308,7 +1308,7 @@
+          * reliably - so we have to granularise at the OS level.
+          */
+     if (pattern && (apr_fnmatch(pattern, dirent->name,
+-                                FNM_NOESCAPE | FNM_PERIOD | FNM_CASE_BLIND)
++                                APR_FNM_NOESCAPE | APR_FNM_PERIOD | APR_FNM_CASE_BLIND)
+                         != APR_SUCCESS))
+         return (NULL);
+ #endif /* !CASE_BLIND_FILESYSTEM */
+diff -urN httpd-2.0.47.org/modules/generators/mod_cgi.c httpd-2.0.47/modules/generators/mod_cgi.c
+--- httpd-2.0.47.org/modules/generators/mod_cgi.c      2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/generators/mod_cgi.c  2003-09-13 22:41:52.000000000 +0200
+@@ -491,7 +491,7 @@
+             /* Bad things happened. Everyone should have cleaned up. */
+             ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_TOCLIENT, rc, r,
+                           "couldn't create child process: %d: %s", rc,
+-                          apr_filename_of_pathname(r->filename));
++                          apr_filepath_name_get(r->filename));
+         }
+         else {
+             apr_pool_note_subprocess(p, procnew, APR_KILL_AFTER_TIMEOUT);
+@@ -616,7 +616,7 @@
+         return DECLINED;
+     }
+-    argv0 = apr_filename_of_pathname(r->filename);
++    argv0 = apr_filepath_name_get(r->filename);
+     nph = !(strncmp(argv0, "nph-", 4));
+     conf = ap_get_module_config(r->server->module_config, &cgi_module);
+diff -urN httpd-2.0.47.org/modules/generators/mod_cgid.c httpd-2.0.47/modules/generators/mod_cgid.c
+--- httpd-2.0.47.org/modules/generators/mod_cgid.c     2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/generators/mod_cgid.c 2003-09-13 22:41:52.000000000 +0200
+@@ -766,7 +766,7 @@
+                  */
+                 ap_log_error(APLOG_MARK, APLOG_ERR, rc, r->server,
+                              "couldn't create child process: %d: %s", rc, 
+-                             apr_filename_of_pathname(r->filename));
++                             apr_filepath_name_get(r->filename));
+             }
+             else {
+                 apr_hash_set(script_hash, &cgid_req.conn_id, sizeof(cgid_req.conn_id), 
+diff -urN httpd-2.0.47.org/modules/mappers/mod_negotiation.c httpd-2.0.47/modules/mappers/mod_negotiation.c
+--- httpd-2.0.47.org/modules/mappers/mod_negotiation.c 2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/mappers/mod_negotiation.c     2003-09-13 22:41:53.000000000 +0200
+@@ -1002,7 +1002,7 @@
+                      break;
+                 }
+                 mime_info.bytes = len;
+-                mime_info.file_name = apr_filename_of_pathname(rr->filename);
++                mime_info.file_name = apr_filepath_name_get(rr->filename);
+             }
+         }
+         else {
+diff -urN httpd-2.0.47.org/modules/mappers/mod_rewrite.c httpd-2.0.47/modules/mappers/mod_rewrite.c
+--- httpd-2.0.47.org/modules/mappers/mod_rewrite.c     2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/mappers/mod_rewrite.c 2003-09-13 22:52:08.000000000 +0200
+@@ -2285,7 +2285,7 @@
+     }
+     else if (strcmp(p->pattern, "-l") == 0) {
+ #if !defined(OS2)
+-        if (apr_lstat(&sb, input, APR_FINFO_MIN, r->pool) == APR_SUCCESS) {
++        if (apr_stat(&sb, input, APR_FINFO_MIN, r->pool) == APR_SUCCESS) {
+             if (sb.filetype == APR_LNK) {
+                 rc = 1;
+             }
+@@ -2912,7 +2912,7 @@
+         user[j] = '\0';
+         /* lookup username in systems passwd file */
+-        if (apr_get_home_directory(&homedir, user, r->pool) == APR_SUCCESS) {
++        if (apr_uid_homepath_get(&homedir, user, r->pool) == APR_SUCCESS) {
+             /* ok, user was found, so expand the ~user string */
+             if (uri[i] != '\0') {
+                 /* ~user/anything...  has to be expanded */
+@@ -3913,13 +3913,13 @@
+     else if (strcasecmp(var, "SCRIPT_USER") == 0) {
+         result = "<unknown>";
+         if (r->finfo.valid & APR_FINFO_USER) {
+-            apr_get_username((char **)&result, r->finfo.user, r->pool);
++            apr_uid_name_get((char **)&result, r->finfo.user, r->pool);
+         }
+     }
+     else if (strcasecmp(var, "SCRIPT_GROUP") == 0) {
+         result = "<unknown>";
+         if (r->finfo.valid & APR_FINFO_GROUP) {
+-            apr_group_name_get((char **)&result, r->finfo.group, r->pool);
++            apr_gid_name_get((char **)&result, r->finfo.group, r->pool);
+         }
+     }
+diff -urN httpd-2.0.47.org/modules/mappers/mod_userdir.c httpd-2.0.47/modules/mappers/mod_userdir.c
+--- httpd-2.0.47.org/modules/mappers/mod_userdir.c     2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/mappers/mod_userdir.c 2003-09-13 22:41:53.000000000 +0200
+@@ -325,7 +325,7 @@
+ #if APR_HAS_USER
+             char *homedir;
+-            if (apr_get_home_directory(&homedir, w, r->pool) == APR_SUCCESS) {
++            if (apr_uid_homepath_get(&homedir, w, r->pool) == APR_SUCCESS) {
+                 filename = apr_pstrcat(r->pool, homedir, "/", userdir, NULL);
+             }
+ #else
+@@ -376,7 +376,7 @@
+         return NULL;
+     }
+-    if (apr_get_userid(&ugid->uid, &ugid->gid, username, r->pool) != APR_SUCCESS) {
++    if (apr_uid_get(&ugid->uid, &ugid->gid, username, r->pool) != APR_SUCCESS) {
+         return NULL;
+     }
+diff -urN httpd-2.0.47.org/modules/proxy/proxy_connect.c httpd-2.0.47/modules/proxy/proxy_connect.c
+--- httpd-2.0.47.org/modules/proxy/proxy_connect.c     2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/proxy/proxy_connect.c 2003-09-13 22:41:53.000000000 +0200
+@@ -267,10 +267,10 @@
+                    "proxy: CONNECT: sending the CONNECT request to the remote proxy");
+         nbytes = apr_snprintf(buffer, sizeof(buffer),
+                             "CONNECT %s HTTP/1.0" CRLF, r->uri);
+-        apr_send(sock, buffer, &nbytes);
++        apr_socket_send(sock, buffer, &nbytes);
+         nbytes = apr_snprintf(buffer, sizeof(buffer),
+                             "Proxy-agent: %s" CRLF CRLF, ap_get_server_version());
+-        apr_send(sock, buffer, &nbytes);
++        apr_socket_send(sock, buffer, &nbytes);
+     }
+     else {
+         ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
+@@ -278,11 +278,11 @@
+         nbytes = apr_snprintf(buffer, sizeof(buffer),
+                             "HTTP/1.0 200 Connection Established" CRLF);
+         ap_xlate_proto_to_ascii(buffer, nbytes);
+-        apr_send(client_socket, buffer, &nbytes);
++        apr_socket_send(client_socket, buffer, &nbytes);
+         nbytes = apr_snprintf(buffer, sizeof(buffer),
+                             "Proxy-agent: %s" CRLF CRLF, ap_get_server_version());
+         ap_xlate_proto_to_ascii(buffer, nbytes);
+-        apr_send(client_socket, buffer, &nbytes);
++        apr_socket_send(client_socket, buffer, &nbytes);
+ #if 0
+         /* This is safer code, but it doesn't work yet.  I'm leaving it 
+          * here so that I can fix it later.
+@@ -336,7 +336,7 @@
+ /*            ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
+                              "proxy: CONNECT: sock was set");*/
+                 nbytes = sizeof(buffer);
+-                if (apr_recv(sock, buffer, &nbytes) == APR_SUCCESS) {
++                if (apr_socket_recv(sock, buffer, &nbytes) == APR_SUCCESS) {
+                     o = 0;
+                     i = nbytes;
+                     while(i > 0)
+@@ -348,7 +348,7 @@
+      * if ((nbytes = ap_rwrite(buffer + o, nbytes, r)) < 0)
+      * rbb
+      */
+-                        if (apr_send(client_socket, buffer + o, &nbytes) != APR_SUCCESS)
++                        if (apr_socket_send(client_socket, buffer + o, &nbytes) != APR_SUCCESS)
+                           break;
+                         o += nbytes;
+                         i -= nbytes;
+@@ -366,13 +366,13 @@
+ /*            ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
+                              "proxy: CONNECT: client was set");*/
+                 nbytes = sizeof(buffer);
+-                if (apr_recv(client_socket, buffer, &nbytes) == APR_SUCCESS) {
++                if (apr_socket_recv(client_socket, buffer, &nbytes) == APR_SUCCESS) {
+                     o = 0;
+                     i = nbytes;
+                     while(i > 0)
+                     {
+                       nbytes = i;
+-                      if (apr_send(sock, buffer + o, &nbytes) != APR_SUCCESS)
++                      if (apr_socket_send(sock, buffer + o, &nbytes) != APR_SUCCESS)
+                           break;
+                         o += nbytes;
+                         i -= nbytes;
+diff -urN httpd-2.0.47.org/modules/proxy/proxy_ftp.c httpd-2.0.47/modules/proxy/proxy_ftp.c
+--- httpd-2.0.47.org/modules/proxy/proxy_ftp.c 2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/proxy/proxy_ftp.c     2003-09-13 22:41:53.000000000 +0200
+@@ -954,7 +954,7 @@
+         int failed = 1;
+         while (connect_addr) {
+-          if ((rv = apr_socket_create(&sock, connect_addr->family, SOCK_STREAM, r->pool)) != APR_SUCCESS) {
++          if ((rv = apr_socket_create(&sock, connect_addr->family, SOCK_STREAM, 0, r->pool)) != APR_SUCCESS) {
+               ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+                             "proxy: FTP: error creating socket");
+                 connect_addr = connect_addr->next;
+@@ -993,7 +993,7 @@
+                          connect_addr->family, connect_addr, connectname);
+             /* make the connection out of the socket */
+-            rv = apr_connect(sock, connect_addr);
++            rv = apr_socket_connect(sock, connect_addr);
+             /* if an error occurred, loop round and try again */
+             if (rv != APR_SUCCESS) {
+@@ -1272,7 +1272,7 @@
+                        "proxy: FTP: EPSV contacting remote host on port %d",
+                              data_port);
+-                if ((rv = apr_socket_create(&data_sock, connect_addr->family, SOCK_STREAM, r->pool)) != APR_SUCCESS) {
++                if ((rv = apr_socket_create(&data_sock, connect_addr->family, SOCK_STREAM, 0, r->pool)) != APR_SUCCESS) {
+                     ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+                                   "proxy: FTP: error creating EPSV socket");
+                     return HTTP_INTERNAL_SERVER_ERROR;
+@@ -1291,7 +1291,7 @@
+                 apr_socket_addr_get(&data_addr, APR_REMOTE, sock);
+                 apr_sockaddr_ip_get(&data_ip, data_addr);
+                 apr_sockaddr_info_get(&epsv_addr, data_ip, connect_addr->family, data_port, 0, p);
+-                rv = apr_connect(data_sock, epsv_addr);
++                rv = apr_socket_connect(data_sock, epsv_addr);
+                 if (rv != APR_SUCCESS) {
+                     ap_log_error(APLOG_MARK, APLOG_ERR, rv, r->server,
+                                  "proxy: FTP: EPSV attempt to connect to %pI failed - Firewall/NAT?", epsv_addr);
+@@ -1359,7 +1359,7 @@
+                           "proxy: FTP: PASV contacting host %d.%d.%d.%d:%d",
+                              h3, h2, h1, h0, pasvport);
+-                if ((rv = apr_socket_create(&data_sock, connect_addr->family, SOCK_STREAM, r->pool)) != APR_SUCCESS) {
++                if ((rv = apr_socket_create(&data_sock, connect_addr->family, SOCK_STREAM, 0, r->pool)) != APR_SUCCESS) {
+                     ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+                                   "proxy: error creating PASV socket");
+                     return HTTP_INTERNAL_SERVER_ERROR;
+@@ -1376,7 +1376,7 @@
+                 /* make the connection */
+                 apr_sockaddr_info_get(&pasv_addr, apr_psprintf(p, "%d.%d.%d.%d", h3, h2, h1, h0), connect_addr->family, pasvport, 0, p);
+-                rv = apr_connect(data_sock, pasv_addr);
++                rv = apr_socket_connect(data_sock, pasv_addr);
+                 if (rv != APR_SUCCESS) {
+                     ap_log_error(APLOG_MARK, APLOG_ERR, rv, r->server,
+                                  "proxy: FTP: PASV attempt to connect to %pI failed - Firewall/NAT?", pasv_addr);
+@@ -1402,7 +1402,7 @@
+         apr_port_t local_port;
+         unsigned int h0, h1, h2, h3, p0, p1;
+-        if ((rv = apr_socket_create(&local_sock, connect_addr->family, SOCK_STREAM, r->pool)) != APR_SUCCESS) {
++        if ((rv = apr_socket_create(&local_sock, connect_addr->family, SOCK_STREAM, 0, r->pool)) != APR_SUCCESS) {
+             ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+                           "proxy: FTP: error creating local socket");
+             return HTTP_INTERNAL_SERVER_ERROR;
+@@ -1422,14 +1422,14 @@
+         apr_sockaddr_info_get(&local_addr, local_ip, APR_UNSPEC, local_port, 0, r->pool);
+-        if ((rv = apr_bind(local_sock, local_addr)) != APR_SUCCESS) {
++        if ((rv = apr_socket_bind(local_sock, local_addr)) != APR_SUCCESS) {
+             ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+             "proxy: FTP: error binding to ftp data socket %pI", local_addr);
+             return HTTP_INTERNAL_SERVER_ERROR;
+         }
+         /* only need a short queue */
+-        if ((rv = apr_listen(local_sock, 2)) != APR_SUCCESS) {
++        if ((rv = apr_socket_listen(local_sock, 2)) != APR_SUCCESS) {
+             ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+                           "proxy: FTP: error listening to ftp data socket %pI", local_addr);
+             return HTTP_INTERNAL_SERVER_ERROR;
+@@ -1766,7 +1766,7 @@
+     /* wait for connection */
+     if (use_port) {
+         for (;;) {
+-            rv = apr_accept(&data_sock, local_sock, r->pool);
++            rv = apr_socket_accept(&data_sock, local_sock, r->pool);
+             if (rv == APR_EINTR) {
+                 continue;
+             }
+diff -urN httpd-2.0.47.org/modules/proxy/proxy_http.c httpd-2.0.47/modules/proxy/proxy_http.c
+--- httpd-2.0.47.org/modules/proxy/proxy_http.c        2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/proxy/proxy_http.c    2003-09-13 22:41:53.000000000 +0200
+@@ -330,7 +330,7 @@
+         apr_socket_timeout_get(p_conn->sock, &current_timeout);
+         /* set no timeout */
+         apr_socket_timeout_set(p_conn->sock, 0);
+-        socket_status = apr_recv(p_conn->sock, test_buffer, &buffer_len);
++        socket_status = apr_socket_recv(p_conn->sock, test_buffer, &buffer_len);
+         /* put back old timeout */
+         apr_socket_timeout_set(p_conn->sock, current_timeout);
+         if ( APR_STATUS_IS_EOF(socket_status) ) {
+diff -urN httpd-2.0.47.org/modules/proxy/proxy_util.c httpd-2.0.47/modules/proxy/proxy_util.c
+--- httpd-2.0.47.org/modules/proxy/proxy_util.c        2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/proxy/proxy_util.c    2003-09-13 22:41:53.000000000 +0200
+@@ -1167,7 +1167,7 @@
+     
+     while (backend_addr && !connected) {
+         if ((rv = apr_socket_create(newsock, backend_addr->family,
+-                                    SOCK_STREAM, p)) != APR_SUCCESS) {
++                                    SOCK_STREAM, 0, p)) != APR_SUCCESS) {
+             loglevel = backend_addr->next ? APLOG_DEBUG : APLOG_ERR;
+             ap_log_error(APLOG_MARK, loglevel, rv, s,
+                          "proxy: %s: error creating fam %d socket for target %s",
+@@ -1205,7 +1205,7 @@
+                      proxy_function, backend_addr->family, backend_name);
+         /* make the connection out of the socket */
+-        rv = apr_connect(*newsock, backend_addr);
++        rv = apr_socket_connect(*newsock, backend_addr);
+         /* if an error occurred, loop round and try again */
+         if (rv != APR_SUCCESS) {
+diff -urN httpd-2.0.47.org/modules/ssl/ssl_engine_init.c httpd-2.0.47/modules/ssl/ssl_engine_init.c
+--- httpd-2.0.47.org/modules/ssl/ssl_engine_init.c     2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/modules/ssl/ssl_engine_init.c 2003-09-13 22:23:10.000000000 +0200
+@@ -855,11 +855,11 @@
+     }
+     if (SSL_X509_getCN(ptemp, cert, &cn)) {
+-        int fnm_flags = FNM_PERIOD|FNM_CASE_BLIND;
++        int fnm_flags = APR_FNM_PERIOD|APR_FNM_CASE_BLIND;
+         if (apr_fnmatch_test(cn) &&
+             (apr_fnmatch(cn, s->server_hostname,
+-                         fnm_flags) == FNM_NOMATCH))
++                         fnm_flags) == APR_FNM_NOMATCH))
+         {
+             ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s,
+                          "%s server certificate wildcard CommonName (CN) `%s' "
+diff -urN httpd-2.0.47.org/os/beos/beosd.c httpd-2.0.47/os/beos/beosd.c
+--- httpd-2.0.47.org/os/beos/beosd.c   2003-09-13 14:18:32.000000000 +0200
++++ httpd-2.0.47/os/beos/beosd.c       2003-09-13 22:41:54.000000000 +0200
+@@ -119,7 +119,7 @@
+     apr_status_t status;
+     int sockdes;
+-    status = apr_accept(&csd, lr->sd, ptrans);
++    status = apr_socket_accept(&csd, lr->sd, ptrans);
+     if (status == APR_SUCCESS) { 
+         *accepted = csd;
+         apr_os_sock_get(&sockdes, csd);
+@@ -195,13 +195,13 @@
+              * occur in mobile IP.
+              */
+             ap_log_error(APLOG_MARK, APLOG_EMERG, status, ap_server_conf,
+-                         "apr_accept: giving up.");
++                         "apr_socket_accept: giving up.");
+             return APR_EGENERAL;
+ #endif /*ENETDOWN*/
+         default:
+             ap_log_error(APLOG_MARK, APLOG_ERR, status, ap_server_conf,
+-                         "apr_accept: (client socket)");
++                         "apr_socket_accept: (client socket)");
+             return APR_EGENERAL;
+     }
+     return status;
+diff -urN httpd-2.0.47.org/os/unix/unixd.c httpd-2.0.47/os/unix/unixd.c
+--- httpd-2.0.47.org/os/unix/unixd.c   2003-09-13 14:18:32.000000000 +0200
++++ httpd-2.0.47/os/unix/unixd.c       2003-09-13 22:41:54.000000000 +0200
+@@ -469,7 +469,7 @@
+     int sockdes;
+     *accepted = NULL;
+-    status = apr_accept(&csd, lr->sd, ptrans);
++    status = apr_socket_accept(&csd, lr->sd, ptrans);
+     if (status == APR_SUCCESS) { 
+         *accepted = csd;
+         apr_os_sock_get(&sockdes, csd);
+@@ -573,7 +573,7 @@
+              * occur in mobile IP.
+              */
+             ap_log_error(APLOG_MARK, APLOG_EMERG, status, ap_server_conf,
+-                         "apr_accept: giving up.");
++                         "apr_socket_accept: giving up.");
+             return APR_EGENERAL;
+ #endif /*ENETDOWN*/
+@@ -590,7 +590,7 @@
+ #else
+         default:
+             ap_log_error(APLOG_MARK, APLOG_ERR, status, ap_server_conf,
+-                         "apr_accept: (client socket)");
++                         "apr_socket_accept: (client socket)");
+             return APR_EGENERAL;
+ #endif
+     }
+diff -urN httpd-2.0.47.org/server/config.c httpd-2.0.47/server/config.c
+--- httpd-2.0.47.org/server/config.c   2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/config.c       2003-09-13 22:52:08.000000000 +0200
+@@ -1460,7 +1460,7 @@
+     if ((ap_server_pre_read_config->nelts
+         || ap_server_post_read_config->nelts)
+         && !(strcmp(fname, ap_server_root_relative(p, SERVER_CONFIG_FILE)))) {
+-        if (apr_lstat(&finfo, fname, APR_FINFO_TYPE, p) != APR_SUCCESS)
++        if (apr_stat(&finfo, fname, APR_FINFO_TYPE, p) != APR_SUCCESS)
+             return;
+     }
+@@ -1521,7 +1521,7 @@
+                 && strcmp(dirent.name, "..")
+                 && (!ispatt ||
+                     apr_fnmatch(pattern, dirent.name, 
+-                                FNM_PERIOD) == APR_SUCCESS)) {
++                                APR_FNM_PERIOD) == APR_SUCCESS)) {
+                 fnew = (fnames *) apr_array_push(candidates);
+                 fnew->fname = ap_make_full_path(p, path, dirent.name);
+             }
+diff -urN httpd-2.0.47.org/server/connection.c httpd-2.0.47/server/connection.c
+--- httpd-2.0.47.org/server/connection.c       2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/connection.c   2003-09-13 22:41:51.000000000 +0200
+@@ -167,7 +167,7 @@
+     /* Shut down the socket for write, which will send a FIN
+      * to the peer.
+      */
+-    if (apr_shutdown(csd, APR_SHUTDOWN_WRITE) != APR_SUCCESS
++    if (apr_socket_shutdown(csd, APR_SHUTDOWN_WRITE) != APR_SUCCESS
+         || c->aborted) {
+         apr_socket_close(csd);
+         return;
+@@ -183,7 +183,7 @@
+     apr_socket_opt_set(csd, APR_INCOMPLETE_READ, 1);
+     while (1) {
+         nbytes = sizeof(dummybuf);
+-        rc = apr_recv(csd, dummybuf, &nbytes);
++        rc = apr_socket_recv(csd, dummybuf, &nbytes);
+         if (rc != APR_SUCCESS || nbytes == 0)
+             break;
+diff -urN httpd-2.0.47.org/server/core.c httpd-2.0.47/server/core.c
+--- httpd-2.0.47.org/server/core.c     2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/core.c 2003-09-13 22:41:51.000000000 +0200
+@@ -2862,7 +2862,7 @@
+     /* XXX handle checking for non-blocking socket */
+     while (bytes_written != len) {
+-        rv = apr_sendv(s, vec + i, nvec - i, &n);
++        rv = apr_socket_sendv(s, vec + i, nvec - i, &n);
+         bytes_written += n;
+         if (rv != APR_SUCCESS)
+             return rv;
+@@ -2870,7 +2870,7 @@
+         *nbytes += n;
+         /* If the write did not complete, adjust the iovecs and issue
+-         * apr_sendv again
++         * apr_socket_sendv again
+          */
+         if (bytes_written < len) {
+             /* Skip over the vectors that have already been written */
+@@ -2925,7 +2925,7 @@
+     do {
+         apr_size_t tmplen = file_bytes_left;
+-        rv = apr_sendfile(c->client_socket, fd, hdtr, &file_offset, &tmplen,
++        rv = apr_socket_sendfile(c->client_socket, fd, hdtr, &file_offset, &tmplen,
+                           flags);
+         *bytes_sent += tmplen;
+         total_bytes_left -= tmplen;
+@@ -3036,7 +3036,7 @@
+         rv = apr_file_read(fd, buffer, &sendlen);
+         while (rv == APR_SUCCESS && sendlen) {
+             bytes_sent = sendlen;
+-            rv = apr_send(c->client_socket, &buffer[o], &bytes_sent);
++            rv = apr_socket_send(c->client_socket, &buffer[o], &bytes_sent);
+             if (rv == APR_SUCCESS) {
+                 sendlen -= bytes_sent; /* sendlen != bytes_sent ==> partial write */
+                 o += bytes_sent;       /* o is where we are in the buffer */
+@@ -4147,7 +4147,7 @@
+                                                        headers              */
+                                      &bytes_sent,   /* how many bytes were
+                                                        sent                 */
+-                                     flags);   /* apr_sendfile flags        */
++                                     flags);   /* apr_socket_sendfile flags        */
+                 if (logio_add_bytes_out && bytes_sent > 0)
+                     logio_add_bytes_out(c, bytes_sent);
+diff -urN httpd-2.0.47.org/server/listen.c httpd-2.0.47/server/listen.c
+--- httpd-2.0.47.org/server/listen.c   2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/listen.c       2003-09-13 22:41:51.000000000 +0200
+@@ -165,7 +165,7 @@
+     ap_sock_disable_nagle(s);
+ #endif
+-    if ((stat = apr_bind(s, server->bind_addr)) != APR_SUCCESS) {
++    if ((stat = apr_socket_bind(s, server->bind_addr)) != APR_SUCCESS) {
+         ap_log_perror(APLOG_MARK, APLOG_STARTUP|APLOG_CRIT, stat, p,
+                       "make_sock: could not bind to address %pI",
+                       server->bind_addr);
+@@ -173,7 +173,7 @@
+         return stat;
+     }
+-    if ((stat = apr_listen(s, ap_listenbacklog)) != APR_SUCCESS) {
++    if ((stat = apr_socket_listen(s, ap_listenbacklog)) != APR_SUCCESS) {
+         ap_log_perror(APLOG_MARK, APLOG_STARTUP|APLOG_ERR, stat, p,
+                       "make_sock: unable to listen for connections "
+                       "on address %pI",
+@@ -250,10 +250,10 @@
+         apr_socket_t *tmp_sock;
+         apr_sockaddr_t *sa;
+-        if ((sock_rv = apr_socket_create(&tmp_sock, APR_INET6, SOCK_STREAM, p)) 
++        if ((sock_rv = apr_socket_create(&tmp_sock, APR_INET6, SOCK_STREAM, 0, p)) 
+             == APR_SUCCESS &&
+             apr_sockaddr_info_get(&sa, NULL, APR_INET6, 0, 0, p) == APR_SUCCESS &&
+-            apr_bind(tmp_sock, sa) == APR_SUCCESS) { 
++            apr_socket_bind(tmp_sock, sa) == APR_SUCCESS) { 
+             default_family = APR_INET6;
+         }
+         else {
+@@ -323,7 +323,7 @@
+     }
+     if ((status = apr_socket_create(&new->sd,
+                                     new->bind_addr->family,
+-                                    SOCK_STREAM, process->pool))
++                                    SOCK_STREAM, 0, process->pool))
+         != APR_SUCCESS) {
+         ap_log_perror(APLOG_MARK, APLOG_CRIT, status, process->pool,
+                       "alloc_listener: failed to get a socket for %s", addr);
+diff -urN httpd-2.0.47.org/server/main.c httpd-2.0.47/server/main.c
+--- httpd-2.0.47.org/server/main.c     2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/main.c 2003-09-13 22:41:51.000000000 +0200
+@@ -281,7 +281,7 @@
+     apr_pool_tag(process->pconf, "pconf");
+     process->argc = argc;
+     process->argv = argv;
+-    process->short_name = apr_filename_of_pathname(argv[0]);
++    process->short_name = apr_filepath_name_get(argv[0]);
+     return process;
+ }
+diff -urN httpd-2.0.47.org/server/mpm/beos/beos.c httpd-2.0.47/server/mpm/beos/beos.c
+--- httpd-2.0.47.org/server/mpm/beos/beos.c    2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/mpm/beos/beos.c        2003-09-13 22:41:52.000000000 +0200
+@@ -267,7 +267,7 @@
+     int i = 0;
+     for (i = 0 ; i < ap_max_child_assigned; i++){
+         len = 4;
+-        if (apr_sendto(udp_sock, udp_sa, 0, "die!", &len) != APR_SUCCESS)
++        if (apr_socket_sendto(udp_sock, udp_sa, 0, "die!", &len) != APR_SUCCESS)
+             break;
+     }   
+ }
+@@ -443,7 +443,7 @@
+                     char *tmpbuf = apr_palloc(ptrans, sizeof(char) * 5);
+                     apr_sockaddr_info_get(&rec_sa, "127.0.0.1", APR_UNSPEC, 7772, 0, ptrans);
+                     
+-                    if ((ret = apr_recvfrom(rec_sa, listening_sockets[0], 0, tmpbuf, &len))
++                    if ((ret = apr_socket_recvfrom(rec_sa, listening_sockets[0], 0, tmpbuf, &len))
+                         != APR_SUCCESS){
+                         ap_log_error(APLOG_MARK, APLOG_ERR, ret, NULL, 
+                             "error getting data from UDP!!");
+@@ -483,12 +483,12 @@
+     got_fd:
+         if (!this_worker_should_exit) {
+-            rv = apr_accept(&csd, sd, ptrans);
++            rv = apr_socket_accept(&csd, sd, ptrans);
+             apr_thread_mutex_unlock(accept_mutex);
+             if (rv != APR_SUCCESS) {
+                 ap_log_error(APLOG_MARK, APLOG_ERR, rv, ap_server_conf,
+-                  "apr_accept");
++                  "apr_socket_accept");
+             } else {
+                 process_socket(ptrans, csd, child_slot, bucket_alloc);
+                 requests_this_child--;
+@@ -795,13 +795,13 @@
+             "couldn't create control socket information, shutting down");
+         return 1;
+     }
+-    if (apr_socket_create(&udp_sock, udp_sa->family, SOCK_DGRAM,
++    if (apr_socket_create(&udp_sock, udp_sa->family, SOCK_DGRAM, 0
+                       _pconf) != APR_SUCCESS){
+         ap_log_error(APLOG_MARK, APLOG_ALERT, errno, s,
+             "couldn't create control socket, shutting down");
+         return 1;
+     }
+-    if (apr_bind(udp_sock, udp_sa) != APR_SUCCESS){
++    if (apr_socket_bind(udp_sock, udp_sa) != APR_SUCCESS){
+         ap_log_error(APLOG_MARK, APLOG_ALERT, errno, s,
+             "couldn't bind UDP socket!");
+         return 1;
+diff -urN httpd-2.0.47.org/server/mpm/experimental/perchild/perchild.c httpd-2.0.47/server/mpm/experimental/perchild/perchild.c
+--- httpd-2.0.47.org/server/mpm/experimental/perchild/perchild.c       2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/mpm/experimental/perchild/perchild.c   2003-09-13 22:41:52.000000000 +0200
+@@ -659,7 +659,7 @@
+         char pipe_read_char;
+         apr_size_t n = 1;
+-        ret = apr_recv(lr->sd, &pipe_read_char, &n);
++        ret = apr_socket_recv(lr->sd, &pipe_read_char, &n);
+         if (APR_STATUS_IS_EAGAIN(ret)) {
+             /* It lost the lottery. It must continue to suffer
+              * through a life of servitude. */
+diff -urN httpd-2.0.47.org/server/mpm/mpmt_os2/mpmt_os2.c httpd-2.0.47/server/mpm/mpmt_os2/mpmt_os2.c
+--- httpd-2.0.47.org/server/mpm/mpmt_os2/mpmt_os2.c    2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/mpm/mpmt_os2/mpmt_os2.c        2003-09-13 22:31:15.000000000 +0200
+@@ -182,7 +182,7 @@
+             apr_sockaddr_info_get(&lr->bind_addr, "0.0.0.0", APR_UNSPEC,
+                                   DEFAULT_HTTP_PORT, 0, s->process->pool);
+             apr_socket_create(&lr->sd, lr->bind_addr->family,
+-                              SOCK_STREAM, s->process->pool);
++                              SOCK_STREAM, 0, s->process->pool);
+         }
+         for (lr = ap_listeners; lr; lr = lr->next) {
+diff -urN httpd-2.0.47.org/server/mpm/mpmt_os2/mpmt_os2_child.c httpd-2.0.47/server/mpm/mpmt_os2/mpmt_os2_child.c
+--- httpd-2.0.47.org/server/mpm/mpmt_os2/mpmt_os2_child.c      2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/mpm/mpmt_os2/mpmt_os2_child.c  2003-09-13 22:41:52.000000000 +0200
+@@ -239,7 +239,7 @@
+         worker_args->pconn = pconn;
+         if (num_listeners == 1) {
+-            rv = apr_accept(&worker_args->conn_sd, ap_listeners->sd, pconn);
++            rv = apr_socket_accept(&worker_args->conn_sd, ap_listeners->sd, pconn);
+         } else {
+             rc = DosRequestMutexSem(ap_mpm_accept_mutex, SEM_INDEFINITE_WAIT);
+@@ -287,14 +287,14 @@
+                 }
+                 sd = lr->sd;
+-                rv = apr_accept(&worker_args->conn_sd, sd, pconn);
++                rv = apr_socket_accept(&worker_args->conn_sd, sd, pconn);
+             }
+         }
+         if (rv != APR_SUCCESS) {
+             if (!APR_STATUS_IS_EINTR(rv)) {
+                 ap_log_error(APLOG_MARK, APLOG_ERR, rv, ap_server_conf,
+-                             "apr_accept");
++                             "apr_socket_accept");
+                 clean_child_exit(APEXIT_CHILDFATAL);
+             }
+         } else {
+diff -urN httpd-2.0.47.org/server/mpm/netware/mpm_netware.c httpd-2.0.47/server/mpm/netware/mpm_netware.c
+--- httpd-2.0.47.org/server/mpm/netware/mpm_netware.c  2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/mpm/netware/mpm_netware.c      2003-09-13 22:41:52.000000000 +0200
+@@ -464,7 +464,7 @@
+             wouldblock_retry = MAX_WB_RETRIES;
+             while (wouldblock_retry) {
+-                if ((stat = apr_accept(&csd, sd, ptrans)) == APR_SUCCESS) {
++                if ((stat = apr_socket_accept(&csd, sd, ptrans)) == APR_SUCCESS) {
+                     break;
+                 }
+                 else {
+@@ -526,13 +526,13 @@
+                         * occur in mobile IP.
+                         */
+                         ap_log_error(APLOG_MARK, APLOG_EMERG, stat, ap_server_conf,
+-                            "apr_accept: giving up.");
++                            "apr_socket_accept: giving up.");
+                         clean_child_exit(APEXIT_CHILDFATAL, my_worker_num, pthrd, 
+                                          bucket_alloc);
+                 }
+                 else {
+                         ap_log_error(APLOG_MARK, APLOG_ERR, stat, ap_server_conf,
+-                            "apr_accept: (client socket)");
++                            "apr_socket_accept: (client socket)");
+                         clean_child_exit(1, my_worker_num, pthrd, bucket_alloc);
+                 }
+             }
+diff -urN httpd-2.0.47.org/server/mpm/winnt/mpm_winnt.c httpd-2.0.47/server/mpm/winnt/mpm_winnt.c
+--- httpd-2.0.47.org/server/mpm/winnt/mpm_winnt.c      2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/mpm/winnt/mpm_winnt.c  2003-09-13 22:41:52.000000000 +0200
+@@ -1168,10 +1168,10 @@
+     /* WARNING: There is an implict assumption here that the
+      * executable resides in ServerRoot or ServerRoot\bin
+      */
+-    def_server_root = (char *) apr_filename_of_pathname(binpath);
++    def_server_root = (char *) apr_filepath_name_get(binpath);
+     if (def_server_root > binpath) {
+         *(def_server_root - 1) = '\0';
+-        def_server_root = (char *) apr_filename_of_pathname(binpath);
++        def_server_root = (char *) apr_filepath_name_get(binpath);
+         if (!strcasecmp(def_server_root, "bin"))
+             *(def_server_root - 1) = '\0';
+     }
+diff -urN httpd-2.0.47.org/server/mpm/worker/pod.c httpd-2.0.47/server/mpm/worker/pod.c
+--- httpd-2.0.47.org/server/mpm/worker/pod.c   2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/mpm/worker/pod.c       2003-09-13 22:50:47.000000000 +0200
+@@ -77,8 +77,8 @@
+     (*pod)->p = p;
+     
+     /* close these before exec. */
+-    apr_file_unset_inherit((*pod)->pod_in);
+-    apr_file_unset_inherit((*pod)->pod_out);
++    apr_file_inherit_unset((*pod)->pod_in);
++    apr_file_inherit_unset((*pod)->pod_out);
+     return APR_SUCCESS;
+ }
+diff -urN httpd-2.0.47.org/server/mpm_common.c httpd-2.0.47/server/mpm_common.c
+--- httpd-2.0.47.org/server/mpm_common.c       2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/mpm_common.c   2003-09-13 22:50:47.000000000 +0200
+@@ -411,8 +411,8 @@
+                           APR_UNSPEC, ap_listeners->bind_addr->port, 0, p);
+     /* close these before exec. */
+-    apr_file_unset_inherit((*pod)->pod_in);
+-    apr_file_unset_inherit((*pod)->pod_out);
++    apr_file_inherit_unset((*pod)->pod_in);
++    apr_file_inherit_unset((*pod)->pod_out);
+     return APR_SUCCESS;
+ }
+@@ -485,7 +485,7 @@
+         return rv;
+     }
+-    rv = apr_socket_create(&sock, pod->sa->family, SOCK_STREAM, p);
++    rv = apr_socket_create(&sock, pod->sa->family, SOCK_STREAM, 0, p);
+     if (rv != APR_SUCCESS) {
+         ap_log_error(APLOG_MARK, APLOG_WARNING, rv, ap_server_conf,
+                      "get socket to connect to listener");
+@@ -506,7 +506,7 @@
+         return rv;
+     }
+-    rv = apr_connect(sock, pod->sa);
++    rv = apr_socket_connect(sock, pod->sa);
+     if (rv != APR_SUCCESS) {
+         int log_level = APLOG_WARNING;
+diff -urN httpd-2.0.47.org/server/request.c httpd-2.0.47/server/request.c
+--- httpd-2.0.47.org/server/request.c  2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/request.c      2003-09-13 22:52:08.000000000 +0200
+@@ -418,7 +418,7 @@
+      * owner of the symlink, then get the info of the target.
+      */
+     if (!(lfi->valid & APR_FINFO_OWNER)) {
+-        if ((res = apr_lstat(&fi, d, lfi->valid | APR_FINFO_OWNER, p))
++        if ((res = apr_stat(&fi, d, lfi->valid | APR_FINFO_OWNER, p))
+             != APR_SUCCESS) {
+             return HTTP_FORBIDDEN;
+         }
+@@ -429,7 +429,7 @@
+         return HTTP_FORBIDDEN;
+     }
+-    if (apr_compare_users(fi.user, lfi->user) != APR_SUCCESS) {
++    if (apr_uid_compare(fi.user, lfi->user) != APR_SUCCESS) {
+         return HTTP_FORBIDDEN;
+     }
+@@ -806,7 +806,7 @@
+                     && ((entry_core->d_components < seg)
+                      || (entry_core->d_is_fnmatch
+                          ? (apr_fnmatch(entry_core->d, r->filename,
+-                                        FNM_PATHNAME) != APR_SUCCESS)
++                                        APR_FNM_PATHNAME) != APR_SUCCESS)
+                          : (strcmp(r->filename, entry_core->d) != 0)))) {
+                     continue;
+                 }
+@@ -976,13 +976,13 @@
+                 continue;
+             }
+-            /* We choose apr_lstat here, rather that apr_stat, so that we
++            /* We choose apr_stat here, rather that apr_stat, so that we
+              * capture this path object rather than its target.  We will
+              * replace the info with our target's info below.  We especially
+              * want the name of this 'link' object, not the name of its
+              * target, if we are fixing the filename case/resolving aliases.
+              */
+-            rv = apr_lstat(&thisinfo, r->filename,
++            rv = apr_stat(&thisinfo, r->filename,
+                            APR_FINFO_MIN | APR_FINFO_NAME, r->pool);
+             if (APR_STATUS_IS_ENOENT(rv)) {
+@@ -1273,7 +1273,7 @@
+             if (entry_core->r
+                 ? ap_regexec(entry_core->r, r->uri, 0, NULL, 0)
+                 : (entry_core->d_is_fnmatch
+-                   ? apr_fnmatch(entry_core->d, cache->cached, FNM_PATHNAME)
++                   ? apr_fnmatch(entry_core->d, cache->cached, APR_FNM_PATHNAME)
+                    : (strncmp(entry_core->d, cache->cached, len)
+                       || (entry_core->d[len - 1] != '/'
+                           && cache->cached[len] != '/'
+@@ -1422,7 +1422,7 @@
+             if (entry_core->r
+                 ? ap_regexec(entry_core->r, cache->cached , 0, NULL, 0)
+                 : (entry_core->d_is_fnmatch
+-                   ? apr_fnmatch(entry_core->d, cache->cached, FNM_PATHNAME)
++                   ? apr_fnmatch(entry_core->d, cache->cached, APR_FNM_PATHNAME)
+                    : strcmp(entry_core->d, cache->cached))) {
+                 continue;
+             }
+@@ -1715,7 +1715,7 @@
+     if ((dirent->valid & APR_FINFO_MIN) != APR_FINFO_MIN) {
+         /*
+          * apr_dir_read isn't very complete on this platform, so
+-         * we need another apr_lstat (or simply apr_stat if we allow
++         * we need another apr_stat (or simply apr_stat if we allow
+          * all symlinks here.)  If this is an APR_LNK that resolves
+          * to an APR_DIR, then we will rerun everything anyways...
+          * this should be safe.
+@@ -1729,7 +1729,7 @@
+             }
+         }
+         else {
+-            if (((rv = apr_lstat(&rnew->finfo, rnew->filename,
++            if (((rv = apr_stat(&rnew->finfo, rnew->filename,
+                                  APR_FINFO_MIN, rnew->pool)) != APR_SUCCESS)
+                 && (rv != APR_INCOMPLETE)) {
+                 rnew->finfo.filetype = 0;
+@@ -1834,7 +1834,7 @@
+             }
+         }
+         else {
+-            if (((rv = apr_lstat(&rnew->finfo, rnew->filename,
++            if (((rv = apr_stat(&rnew->finfo, rnew->filename,
+                                  APR_FINFO_MIN, rnew->pool)) != APR_SUCCESS)
+                 && (rv != APR_INCOMPLETE)) {
+                 rnew->finfo.filetype = 0;
+diff -urN httpd-2.0.47.org/server/rfc1413.c httpd-2.0.47/server/rfc1413.c
+--- httpd-2.0.47.org/server/rfc1413.c  2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/rfc1413.c      2003-09-13 22:41:51.000000000 +0200
+@@ -141,7 +141,7 @@
+     if ((rv = apr_socket_create(newsock, 
+                                 localsa->family, /* has to match */
+-                                SOCK_STREAM, conn->pool)) != APR_SUCCESS) {
++                                SOCK_STREAM, 0, conn->pool)) != APR_SUCCESS) {
+       ap_log_error(APLOG_MARK, APLOG_CRIT, rv, srv,
+                      "rfc1413: error creating query socket");
+         return rv;
+@@ -164,7 +164,7 @@
+  * addresses from the query socket.
+  */
+-    if ((rv = apr_bind(*newsock, localsa)) != APR_SUCCESS) {
++    if ((rv = apr_socket_bind(*newsock, localsa)) != APR_SUCCESS) {
+       ap_log_error(APLOG_MARK, APLOG_CRIT, rv, srv,
+                      "rfc1413: Error binding query socket to local port");
+         apr_socket_close(*newsock);
+@@ -175,7 +175,7 @@
+  * errors from connect usually imply the remote machine doesn't support
+  * the service; don't log such an error
+  */
+-    if ((rv = apr_connect(*newsock, destsa)) != APR_SUCCESS) {
++    if ((rv = apr_socket_connect(*newsock, destsa)) != APR_SUCCESS) {
+         apr_socket_close(*newsock);
+         return rv;
+     }
+@@ -207,7 +207,7 @@
+     while (i < buflen) {
+         apr_size_t j = strlen(buffer + i);
+         apr_status_t status;
+-      status  = apr_send(sock, buffer+i, &j);
++      status  = apr_socket_send(sock, buffer+i, &j);
+       if (status != APR_SUCCESS) {
+           ap_log_error(APLOG_MARK, APLOG_CRIT, status, srv,
+                        "write: rfc1413: error sending request");
+@@ -233,7 +233,7 @@
+     while((cp = strchr(buffer, '\012')) == NULL && i < sizeof(buffer) - 1) {
+         apr_size_t j = sizeof(buffer) - 1 - i;
+         apr_status_t status;
+-      status = apr_recv(sock, buffer+i, &j);
++      status = apr_socket_recv(sock, buffer+i, &j);
+       if (status != APR_SUCCESS) {
+           ap_log_error(APLOG_MARK, APLOG_CRIT, status, srv,
+                       "read: rfc1413: error reading response");
+diff -urN httpd-2.0.47.org/server/util.c httpd-2.0.47/server/util.c
+--- httpd-2.0.47.org/server/util.c     2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/util.c 2003-09-13 22:52:08.000000000 +0200
+@@ -927,7 +927,7 @@
+     if (finfo.filetype != APR_REG &&
+ #if defined(WIN32) || defined(OS2) || defined(NETWARE)
+-        strcasecmp(apr_filename_of_pathname(name), "nul") != 0) {
++        strcasecmp(apr_filepath_name_get(name), "nul") != 0) {
+ #else
+         strcmp(name, "/dev/null") != 0) {
+ #endif /* WIN32 || OS2 */
+@@ -1851,7 +1851,7 @@
+ {
+     apr_finfo_t finfo;
+-    if (apr_lstat(&finfo, path, APR_FINFO_TYPE, p) != APR_SUCCESS)
++    if (apr_stat(&finfo, path, APR_FINFO_TYPE, p) != APR_SUCCESS)
+         return 0;                /* in error condition, just return no */
+     return (finfo.filetype == APR_DIR);
+diff -urN httpd-2.0.47.org/server/util_script.c httpd-2.0.47/server/util_script.c
+--- httpd-2.0.47.org/server/util_script.c      2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/server/util_script.c  2003-09-13 22:41:51.000000000 +0200
+@@ -458,7 +458,7 @@
+       if ((*getsfunc) (w, MAX_STRING_LEN - 1, getsfunc_data) == 0) {
+           ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_TOCLIENT, 0, r,
+                         "Premature end of script headers: %s", 
+-                          apr_filename_of_pathname(r->filename));
++                          apr_filepath_name_get(r->filename));
+           return HTTP_INTERNAL_SERVER_ERROR;
+       }
+@@ -551,7 +551,7 @@
+           ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_TOCLIENT, 0, r,
+                         "%s: %s", malformed, 
+-                          apr_filename_of_pathname(r->filename));
++                          apr_filepath_name_get(r->filename));
+           return HTTP_INTERNAL_SERVER_ERROR;
+       }
+diff -urN httpd-2.0.47.org/support/ab.c httpd-2.0.47/support/ab.c
+--- httpd-2.0.47.org/support/ab.c      2003-09-13 14:18:35.000000000 +0200
++++ httpd-2.0.47/support/ab.c  2003-09-13 22:41:54.000000000 +0200
+@@ -103,9 +103,9 @@
+    ** Version 2.0.36-dev
+    **    Improvements to concurrent processing:
+    **      - Enabled non-blocking connect()s.
+-   **      - Prevent blocking calls to apr_recv() (thereby allowing AB to
++   **      - Prevent blocking calls to apr_socket_recv() (thereby allowing AB to
+    **        manage its entire set of socket descriptors).
+-   **      - Any error returned from apr_recv() that is not EAGAIN or EOF
++   **      - Any error returned from apr_socket_recv() that is not EAGAIN or EOF
+    **        is now treated as fatal.
+    **      Contributed by Aaron Bannert, April 24, 2002
+    **
+@@ -760,7 +760,7 @@
+         }
+         else
+ #endif
+-      e = apr_send(c->aprsock, request + c->rwrote, &l);
++      e = apr_socket_send(c->aprsock, request + c->rwrote, &l);
+       /*
+        * Bail early on the most common case
+@@ -1242,7 +1242,7 @@
+     apr_pool_create(&c->ctx, cntxt);
+     if ((rv = apr_socket_create(&c->aprsock, destsa->family,
+-                              SOCK_STREAM, c->ctx)) != APR_SUCCESS) {
++                              SOCK_STREAM, 0, c->ctx)) != APR_SUCCESS) {
+       apr_err("socket", rv);
+     }
+     if ((rv = apr_socket_opt_set(c->aprsock, APR_SO_NONBLOCK, 1))
+@@ -1250,7 +1250,7 @@
+         apr_err("socket nonblock", rv);
+     }
+     c->start = apr_time_now();
+-    if ((rv = apr_connect(c->aprsock, destsa)) != APR_SUCCESS) {
++    if ((rv = apr_socket_connect(c->aprsock, destsa)) != APR_SUCCESS) {
+       if (APR_STATUS_IS_EINPROGRESS(rv)) {
+             apr_pollfd_t new_pollfd;
+           c->state = STATE_CONNECTING;
+@@ -1272,7 +1272,7 @@
+           if (bad++ > 10) {
+               fprintf(stderr,
+                       "\nTest aborted after 10 failures\n\n");
+-              apr_err("apr_connect()", rv);
++              apr_err("apr_socket_connect()", rv);
+           }
+           c->state = STATE_UNCONNECTED;
+           start_connect(c);
+@@ -1371,7 +1371,7 @@
+     }
+     else {
+ #endif
+-    status = apr_recv(c->aprsock, buffer, &r);
++    status = apr_socket_recv(c->aprsock, buffer, &r);
+     if (APR_STATUS_IS_EAGAIN(status))
+       return;
+     else if (r == 0 && APR_STATUS_IS_EOF(status)) {
+@@ -1379,12 +1379,12 @@
+       close_connection(c);
+       return;
+     }
+-    /* catch legitimate fatal apr_recv errors */
++    /* catch legitimate fatal apr_socket_recv errors */
+     else if (status != APR_SUCCESS) {
+         err_except++; /* XXX: is this the right error counter? */
+         /* XXX: Should errors here be fatal, or should we allow a
+          * certain number of them before completely failing? -aaron */
+-        apr_err("apr_recv", status);
++        apr_err("apr_socket_recv", status);
+     }
+ #ifdef USE_SSL
+     }
This page took 0.090354 seconds and 4 git commands to generate.