Lines Matching refs:empty

293   if (kms.empty()) {
456 if (!tokens[2].empty()) {
461 if (!tokens[3].empty()) {
466 if (!tokens[4].empty()) {
869 } else if (!param.empty()) {
932 } else if (!param.empty()) {
996 if (protostr.empty()) {
997 LOG(ERROR) << "backend: proto: protocol is empty";
1012 if (valstr.empty()) {
1026 if (valstr.empty()) {
1059 if (val.empty()) {
1061 << "backend: affinity-cookie-name: non empty string is expected";
1117 if (valstr.empty()) {
1132 if (valstr.empty()) {
1133 LOG(ERROR) << "backend: group: empty string is not allowed";
1139 if (valstr.empty()) {
1154 } else if (!param.empty()) {
1181 // This returns at least 1 element (it could be empty string). We
1184 assert(!mapping.empty());
1202 params.affinity.cookie.name.empty()) {
1229 // This effectively makes empty pattern to "/". 2 for '/' and
1263 if (!params.affinity.cookie.path.empty()) {
1290 if (!params.mruby.empty()) {
1291 if (g.mruby_file.empty()) {
1344 if (!params.affinity.cookie.path.empty()) {
1516 if (sct_dir.empty()) {
1517 LOG(ERROR) << "subcert: " << param << ": empty sct-dir";
1524 } else if (!param.empty()) {
1673 if (line.empty() || line[0] == '#') {
1685 LOG(ERROR) << SHRPX_OPT_PSK_SECRETS << ": empty identity at line "
1691 LOG(ERROR) << SHRPX_OPT_PSK_SECRETS << ": empty secret at line "
1740 if (line.empty() || line[0] == '#') {
1752 LOG(ERROR) << SHRPX_OPT_CLIENT_PSK_SECRETS << ": empty identity at line "
1758 LOG(ERROR) << SHRPX_OPT_CLIENT_PSK_SECRETS << ": empty secret at line "
3169 if (passwd.empty()) {
3197 if (!params.sct_dir.empty()) {
3215 if (private_key_file.empty()) {
3223 if (cert_file.empty()) {
3294 // userinfo component is empty string.
3295 if (!uf.empty()) {
3415 if (p.name.empty()) {
4201 if (line.empty() || line[0] == '#') {
4427 if (addr_groups.empty()) {
4443 if (!tlsconf.backend_sni_name.empty()) {
4474 if (!g.mruby_file.empty()) {
4491 if (!config->mruby_file.empty()) {