Home
last modified time | relevance | path

Searched refs:plen (Results 1 – 15 of 15) sorted by relevance

/curl/lib/vauth/
H A Dcleartext.c71 size_t plen; in Curl_auth_create_plain_message() local
75 plen = strlen(passwd); in Curl_auth_create_plain_message()
79 (plen > (SIZE_T_MAX/2 - 2))) in Curl_auth_create_plain_message()
81 plainlen = zlen + clen + plen + 2; in Curl_auth_create_plain_message()
93 memcpy(plainauth + zlen + clen + 2, passwd, plen); in Curl_auth_create_plain_message()
/curl/lib/
H A Dbufq.c135 const unsigned char **pbuf, size_t *plen) in chunk_peek() argument
139 *plen = chunk->w_offset - chunk->r_offset; in chunk_peek()
143 const unsigned char **pbuf, size_t *plen) in chunk_peek_at() argument
148 *plen = chunk->w_offset - offset; in chunk_peek_at()
534 const unsigned char **pbuf, size_t *plen) in Curl_bufq_peek() argument
540 chunk_peek(q->head, pbuf, plen); in Curl_bufq_peek()
544 *plen = 0; in Curl_bufq_peek()
549 const unsigned char **pbuf, size_t *plen) in Curl_bufq_peek_at() argument
563 chunk_peek_at(c, offset, pbuf, plen); in Curl_bufq_peek_at()
567 *plen = 0; in Curl_bufq_peek_at()
H A Dmqtt.c172 static int add_passwd(const char *passwd, const size_t plen, in add_passwd() argument
177 if(plen > 0xffff) in add_passwd()
184 pkt[start] = (char)((plen >> 8) & 0xFF); in add_passwd()
185 pkt[start + 1] = (char)(plen & 0xFF); in add_passwd()
186 memcpy(&pkt[start + 2], passwd, plen); in add_passwd()
273 const size_t plen = strlen(passwd); in mqtt_connect() local
275 payloadlen = ulen + plen + MQTT_CLIENTID_LEN + 2; in mqtt_connect()
280 if(plen) in mqtt_connect()
329 if(plen) { in mqtt_connect()
330 rc = add_passwd(passwd, plen, packet, start_pwd, remain_pos); in mqtt_connect()
[all …]
H A Ddoh.c1177 uint16_t pcode = 0, plen = 0; in doh_resp_decode_httpsrr() local
1214 if(!plen) in doh_resp_decode_httpsrr()
1216 lhrr->ipv4hints = Curl_memdup(cp, plen); in doh_resp_decode_httpsrr()
1219 lhrr->ipv4hints_len = (size_t)plen; in doh_resp_decode_httpsrr()
1222 if(!plen) in doh_resp_decode_httpsrr()
1227 lhrr->echconfiglist_len = (size_t)plen; in doh_resp_decode_httpsrr()
1230 if(!plen) in doh_resp_decode_httpsrr()
1235 lhrr->ipv6hints_len = (size_t)plen; in doh_resp_decode_httpsrr()
1237 if(plen > 0 && plen <= remaining) { in doh_resp_decode_httpsrr()
1238 cp += plen; in doh_resp_decode_httpsrr()
[all …]
H A Dbufq.h213 const unsigned char **pbuf, size_t *plen);
216 const unsigned char **pbuf, size_t *plen);
H A Dopenldap.c942 const char *prefix, size_t plen, in client_write() argument
951 if(!len && plen && prefix[plen - 1] == ' ') in client_write()
952 plen--; in client_write()
953 result = Curl_client_write(data, CLIENTWRITE_BODY, (char *) prefix, plen); in client_write()
H A Dhostip.c661 size_t plen = strlen(part); in tailmatch() local
663 if(plen > flen) in tailmatch()
665 return strncasecompare(part, &full[flen - plen], plen); in tailmatch()
H A Drtsp.c515 size_t plen = strlen(data->set.postfields); in rtsp_do() local
516 req_clen = (curl_off_t)plen; in rtsp_do()
517 result = Curl_creader_set_buf(data, data->set.postfields, plen); in rtsp_do()
H A Dsocks.c411 size_t plen = strlen(sx->proxy_user); in do_SOCKS4() local
412 if(plen > 255) { in do_SOCKS4()
420 memcpy(socksreq + 8, sx->proxy_user, plen + 1); in do_SOCKS4()
H A Durlapi.c1775 size_t plen = strlen(part); in curl_url_set() local
1777 if((plen > MAX_SCHEME_LEN) || (plen < 1)) in curl_url_set()
1787 while(--plen) { in curl_url_set()
H A Dcf-socket.c2060 curl_socklen_t plen; in cf_tcp_set_accepted_remote_ip() local
2064 plen = sizeof(ssrem); in cf_tcp_set_accepted_remote_ip()
2065 memset(&ssrem, 0, plen); in cf_tcp_set_accepted_remote_ip()
2066 if(getpeername(ctx->sock, (struct sockaddr*) &ssrem, &plen)) { in cf_tcp_set_accepted_remote_ip()
2072 if(!Curl_addr2string((struct sockaddr*)&ssrem, plen, in cf_tcp_set_accepted_remote_ip()
H A Dsetopt.c2655 size_t plen = 0; in setopt_cptr() local
2661 plen = strlen(ptr); in setopt_cptr()
2662 if(plen > CURL_MAX_INPUT_LENGTH) { in setopt_cptr()
2679 else if(plen > 5 && !strncmp(ptr, "ecl:", 4)) { in setopt_cptr()
2685 else if(plen > 4 && !strncmp(ptr, "pn:", 3)) { in setopt_cptr()
H A Durl.c2573 size_t plen; local
2590 plen = (psep ?
2604 pbuf = Curl_memdup0(&psep[1], plen);
/curl/tests/server/
H A Dsocksd.c443 unsigned char plen; in sockit() local
458 plen = buffer[SOCKS5_ULEN + ulen + 1]; in sockit()
459 if(rc < 3 + ulen + plen) { in sockit()
460 logmsg("Too short packet for ulen %d plen %d: %zd", ulen, plen, rc); in sockit()
464 (plen != strlen(config.password)) || in sockit()
466 memcmp(&buffer[SOCKS5_UNAME + ulen + 1], config.password, plen)) { in sockit()
/curl/lib/vtls/
H A Dvtls.c2255 size_t i, plen = proto ? strlen(proto) : 0; in Curl_alpn_contains_proto() local
2256 for(i = 0; spec && plen && i < spec->count; ++i) { in Curl_alpn_contains_proto()
2258 if((slen == plen) && !memcmp(proto, spec->entries[i], plen)) in Curl_alpn_contains_proto()

Completed in 57 milliseconds