/curl/lib/vauth/ |
H A D | cleartext.c | 71 size_t plen; in Curl_auth_create_plain_message() local 75 plen = strlen(passwd); in Curl_auth_create_plain_message() 79 (plen > (SIZE_T_MAX/2 - 2))) in Curl_auth_create_plain_message() 81 plainlen = zlen + clen + plen + 2; in Curl_auth_create_plain_message() 93 memcpy(plainauth + zlen + clen + 2, passwd, plen); in Curl_auth_create_plain_message()
|
/curl/lib/ |
H A D | bufq.c | 135 const unsigned char **pbuf, size_t *plen) in chunk_peek() argument 139 *plen = chunk->w_offset - chunk->r_offset; in chunk_peek() 143 const unsigned char **pbuf, size_t *plen) in chunk_peek_at() argument 148 *plen = chunk->w_offset - offset; in chunk_peek_at() 534 const unsigned char **pbuf, size_t *plen) in Curl_bufq_peek() argument 540 chunk_peek(q->head, pbuf, plen); in Curl_bufq_peek() 544 *plen = 0; in Curl_bufq_peek() 549 const unsigned char **pbuf, size_t *plen) in Curl_bufq_peek_at() argument 563 chunk_peek_at(c, offset, pbuf, plen); in Curl_bufq_peek_at() 567 *plen = 0; in Curl_bufq_peek_at()
|
H A D | mqtt.c | 172 static int add_passwd(const char *passwd, const size_t plen, in add_passwd() argument 177 if(plen > 0xffff) in add_passwd() 184 pkt[start] = (char)((plen >> 8) & 0xFF); in add_passwd() 185 pkt[start + 1] = (char)(plen & 0xFF); in add_passwd() 186 memcpy(&pkt[start + 2], passwd, plen); in add_passwd() 273 const size_t plen = strlen(passwd); in mqtt_connect() local 275 payloadlen = ulen + plen + MQTT_CLIENTID_LEN + 2; in mqtt_connect() 280 if(plen) in mqtt_connect() 329 if(plen) { in mqtt_connect() 330 rc = add_passwd(passwd, plen, packet, start_pwd, remain_pos); in mqtt_connect() [all …]
|
H A D | doh.c | 1177 uint16_t pcode = 0, plen = 0; in doh_resp_decode_httpsrr() local 1214 if(!plen) in doh_resp_decode_httpsrr() 1216 lhrr->ipv4hints = Curl_memdup(cp, plen); in doh_resp_decode_httpsrr() 1219 lhrr->ipv4hints_len = (size_t)plen; in doh_resp_decode_httpsrr() 1222 if(!plen) in doh_resp_decode_httpsrr() 1227 lhrr->echconfiglist_len = (size_t)plen; in doh_resp_decode_httpsrr() 1230 if(!plen) in doh_resp_decode_httpsrr() 1235 lhrr->ipv6hints_len = (size_t)plen; in doh_resp_decode_httpsrr() 1237 if(plen > 0 && plen <= remaining) { in doh_resp_decode_httpsrr() 1238 cp += plen; in doh_resp_decode_httpsrr() [all …]
|
H A D | bufq.h | 213 const unsigned char **pbuf, size_t *plen); 216 const unsigned char **pbuf, size_t *plen);
|
H A D | openldap.c | 942 const char *prefix, size_t plen, in client_write() argument 951 if(!len && plen && prefix[plen - 1] == ' ') in client_write() 952 plen--; in client_write() 953 result = Curl_client_write(data, CLIENTWRITE_BODY, (char *) prefix, plen); in client_write()
|
H A D | hostip.c | 661 size_t plen = strlen(part); in tailmatch() local 663 if(plen > flen) in tailmatch() 665 return strncasecompare(part, &full[flen - plen], plen); in tailmatch()
|
H A D | rtsp.c | 515 size_t plen = strlen(data->set.postfields); in rtsp_do() local 516 req_clen = (curl_off_t)plen; in rtsp_do() 517 result = Curl_creader_set_buf(data, data->set.postfields, plen); in rtsp_do()
|
H A D | socks.c | 411 size_t plen = strlen(sx->proxy_user); in do_SOCKS4() local 412 if(plen > 255) { in do_SOCKS4() 420 memcpy(socksreq + 8, sx->proxy_user, plen + 1); in do_SOCKS4()
|
H A D | urlapi.c | 1775 size_t plen = strlen(part); in curl_url_set() local 1777 if((plen > MAX_SCHEME_LEN) || (plen < 1)) in curl_url_set() 1787 while(--plen) { in curl_url_set()
|
H A D | cf-socket.c | 2060 curl_socklen_t plen; in cf_tcp_set_accepted_remote_ip() local 2064 plen = sizeof(ssrem); in cf_tcp_set_accepted_remote_ip() 2065 memset(&ssrem, 0, plen); in cf_tcp_set_accepted_remote_ip() 2066 if(getpeername(ctx->sock, (struct sockaddr*) &ssrem, &plen)) { in cf_tcp_set_accepted_remote_ip() 2072 if(!Curl_addr2string((struct sockaddr*)&ssrem, plen, in cf_tcp_set_accepted_remote_ip()
|
H A D | setopt.c | 2655 size_t plen = 0; in setopt_cptr() local 2661 plen = strlen(ptr); in setopt_cptr() 2662 if(plen > CURL_MAX_INPUT_LENGTH) { in setopt_cptr() 2679 else if(plen > 5 && !strncmp(ptr, "ecl:", 4)) { in setopt_cptr() 2685 else if(plen > 4 && !strncmp(ptr, "pn:", 3)) { in setopt_cptr()
|
H A D | url.c | 2573 size_t plen; local 2590 plen = (psep ? 2604 pbuf = Curl_memdup0(&psep[1], plen);
|
/curl/tests/server/ |
H A D | socksd.c | 443 unsigned char plen; in sockit() local 458 plen = buffer[SOCKS5_ULEN + ulen + 1]; in sockit() 459 if(rc < 3 + ulen + plen) { in sockit() 460 logmsg("Too short packet for ulen %d plen %d: %zd", ulen, plen, rc); in sockit() 464 (plen != strlen(config.password)) || in sockit() 466 memcmp(&buffer[SOCKS5_UNAME + ulen + 1], config.password, plen)) { in sockit()
|
/curl/lib/vtls/ |
H A D | vtls.c | 2255 size_t i, plen = proto ? strlen(proto) : 0; in Curl_alpn_contains_proto() local 2256 for(i = 0; spec && plen && i < spec->count; ++i) { in Curl_alpn_contains_proto() 2258 if((slen == plen) && !memcmp(proto, spec->entries[i], plen)) in Curl_alpn_contains_proto()
|