Return-Path: Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: (qmail 52443 invoked from network); 6 Jul 2005 13:06:45 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 6 Jul 2005 13:06:45 -0000 Received: (qmail 88314 invoked by uid 500); 6 Jul 2005 13:06:37 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 88277 invoked by uid 500); 6 Jul 2005 13:06:37 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 88264 invoked by uid 99); 6 Jul 2005 13:06:37 -0000 Received: from asf.osuosl.org (HELO asf.osuosl.org) (140.211.166.49) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 06 Jul 2005 06:06:37 -0700 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests= X-Spam-Check-By: apache.org Received-SPF: pass (asf.osuosl.org: local policy) Received: from [209.133.199.10] (HELO jimsys.jagunet.com) (209.133.199.10) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 06 Jul 2005 06:06:37 -0700 Received: from [127.0.0.1] (localhost [127.0.0.1]) by jimsys.jagunet.com (Postfix) with ESMTP id 1EB2D5F32EA for ; Wed, 6 Jul 2005 09:06:33 -0400 (EDT) Mime-Version: 1.0 (Apple Message framework v730) In-Reply-To: <6.2.1.2.2.20050705224755.0c763060@pop3.rowe-clan.net> References: <6.2.1.2.2.20050705223346.0befdd30@pop3.rowe-clan.net> <6.2.1.2.2.20050705224755.0c763060@pop3.rowe-clan.net> Content-Type: text/plain; charset=US-ASCII; format=flowed Message-Id: Content-Transfer-Encoding: 7bit From: Jim Jagielski Subject: Re: [Patch 1.3] Strict proxy C-L / T-E conformance Date: Wed, 6 Jul 2005 09:06:32 -0400 To: dev@httpd.apache.org X-Mailer: Apple Mail (2.730) X-Virus-Checked: Checked by ClamAV on apache.org X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N + char *len_end; + c->len = ap_strtol(content_length, *len_end, 10); - if (c->len < 0) { - ap_kill_timeout(r); - return ap_proxyerror(r, HTTP_BAD_GATEWAY, ap_pstrcat(r->pool, - "Invalid Content-Length from remote server", - NULL)); + if ((c->len < 0) || *len_end) { Oops... Should be: c->len = ap_strtol(content_length, &len_end, 10); and if ((c->len < 0) || (len_end && *len_end)) I think.. :)