/curl/docs/libcurl/opts/ |
H A D | CURLOPT_PROXY_ISSUERCERT_BLOB.md | 35 size) about a memory block with binary data of a CA certificate in PEM 67 size_t filesize; /* size of the data */
|
H A D | CURLOPT_PROGRESSDATA.md | 40 size_t size;
|
H A D | CURLINFO_SIZE_DOWNLOAD_T.md | 51 /* check the size */
|
H A D | CURLOPT_XFERINFODATA.md | 43 size_t size;
|
H A D | CURLOPT_PROGRESSFUNCTION.md | 58 if you only download data, the upload size remains 0). Many times the callback 85 size_t size;
|
H A D | CURLOPT_XFERINFOFUNCTION.md | 54 you only download data, the upload size remains 0). Many times the callback is 81 size_t size;
|
H A D | CURLOPT_DEBUGDATA.md | 44 char *data, size_t size,
|
H A D | CURLINFO_SIZE_DOWNLOAD.md | 54 /* check the size */
|
/curl/tests/libtest/ |
H A D | lib2405.c | 70 static size_t emptyWriteFunc(void *ptr, size_t size, size_t nmemb, in emptyWriteFunc() argument 73 return size * nmemb; in emptyWriteFunc()
|
H A D | lib576.c | 49 printf("Size: %ldB\n", (long)finfo->size); in chunk_bgn()
|
/curl/src/ |
H A D | tool_paramhlp.c | 130 ParameterError file2memory(char **bufp, size_t *size, FILE *file) in file2memory() argument 143 *size = 0; in file2memory() 151 *size = curlx_dyn_len(&dyn); in file2memory() 155 *size = 0; in file2memory()
|
/curl/lib/ |
H A D | conncache.h | 88 int Curl_conncache_init(struct conncache *, size_t size);
|
H A D | ftp.c | 227 size_t *size); 444 size = sizeof(add); in AcceptServerConnect() 2654 size = ftp->downloadsize; in ftp_state_get_resp() 2657 size = data->req.size = data->req.maxdownload; in ftp_state_get_resp() 2666 size); in ftp_state_get_resp() 2670 conn->proto.ftpc.retr_size_saved = size; in ftp_state_get_resp() 3538 if((-1 != data->req.size) && in ftp_done() 3539 (data->req.size != data->req.bytecount) && in ftp_done() 3555 (data->req.size>0)) { in ftp_done() 4029 if(wildcard->filelist.size == 0) { in wc_statemach() [all …]
|
H A D | imap.c | 1150 curl_off_t size = 0; in imap_state_fetch_resp() local 1165 if(!curlx_strtoofft(ptr + 1, &endptr, 10, &size) && in imap_state_fetch_resp() 1172 size); in imap_state_fetch_resp() 1173 Curl_pgrsSetDownloadSize(data, size); in imap_state_fetch_resp() 1185 if(chunk > (size_t)size) in imap_state_fetch_resp() 1187 chunk = (size_t)size; in imap_state_fetch_resp() 1200 " bytes are left for transfer", chunk, size - chunk); in imap_state_fetch_resp() 1215 if(data->req.bytecount == size) in imap_state_fetch_resp() 1220 data->req.maxdownload = size; in imap_state_fetch_resp() 1224 Curl_xfer_setup1(data, CURL_XFER_RECV, size, FALSE); in imap_state_fetch_resp() [all …]
|
H A D | request.h | 61 curl_off_t size; /* -1 if unknown at this point */ member
|
H A D | smb.c | 785 curl_off_t upload_size = data->req.size - data->req.bytecount; in smb_send_write() 1008 data->req.size = data->state.infilesize; in smb_request_state() 1009 Curl_pgrsSetUploadSize(data, data->req.size); in smb_request_state() 1013 data->req.size = smb_swap64(smb_m->end_of_file); in smb_request_state() 1014 if(data->req.size < 0) { in smb_request_state() 1019 Curl_pgrsSetDownloadSize(data, data->req.size); in smb_request_state() 1067 if(data->req.bytecount >= data->req.size) in smb_request_state()
|
H A D | krb5.c | 561 size_t size = Curl_dyn_len(&buf->buf); in buffer_read() local 562 if(size - buf->index < len) in buffer_read() 563 len = size - buf->index; in buffer_read() 833 tmp_allocation = realloc(conn->app_data, mech->size); in choose_mech() 835 failf(data, "Failed realloc of size %zu", mech->size); in choose_mech()
|
/curl/lib/vtls/ |
H A D | mbedtls.c | 1027 int size; local 1072 size = mbedtls_pk_write_pubkey_der(&p->MBEDTLS_PRIVATE(pk), pubkey, 1075 size = mbedtls_pk_write_pubkey_der(&p->pk, pubkey, PUB_DER_MAX_BYTES); 1078 if(size <= 0) { 1087 &pubkey[PUB_DER_MAX_BYTES - size], size); 1360 static size_t mbedtls_version(char *buffer, size_t size) argument 1365 return msnprintf(buffer, size, "mbedTLS/%u.%u.%u", version>>24, 1368 return msnprintf(buffer, size, "mbedTLS/%s", MBEDTLS_VERSION_STRING);
|
H A D | openssl.c | 931 DEBUGASSERT(size); in ossl_strerror() 934 len = ossl_version(buf, size); in ossl_strerror() 935 DEBUGASSERT(len < (size - 2)); in ossl_strerror() 936 if(len < (size - 2)) { in ossl_strerror() 938 size -= (len + 2); in ossl_strerror() 947 ERR_error_string_n(error, buf, size); in ossl_strerror() 952 if(strlen(msg) < size) in ossl_strerror() 1678 if((size_t)biomem->length < size) in x509_name_oneline() 1679 size = biomem->length; in x509_name_oneline() 1683 memcpy(buf, biomem->data, size); in x509_name_oneline() [all …]
|
H A D | vtls.c | 844 (void)multissl_version(buffer, size); in Curl_ssl_version() 846 (void)Curl_ssl->version(buffer, size); in Curl_ssl_version() 1080 size_t size, pem_len; in Curl_pin_peer_pubkey() local 1096 size = curlx_sotouz((curl_off_t) filesize); in Curl_pin_peer_pubkey() 1097 if(pubkeylen > size) in Curl_pin_peer_pubkey() 1104 buf = malloc(size + 1); in Curl_pin_peer_pubkey() 1109 if((int) fread(buf, size, 1, fp) != 1) in Curl_pin_peer_pubkey() 1113 if(pubkeylen == size) { in Curl_pin_peer_pubkey() 1123 buf[size] = '\0'; in Curl_pin_peer_pubkey() 1431 if(size) { in multissl_version() [all …]
|
H A D | gtls.c | 228 loaded_file.size = (unsigned int)filelen; in load_file() 1016 if(crandom.size != 32) { in keylog_callback() 1020 Curl_tls_keylog_write(label, crandom.data, secret->data, secret->size); in keylog_callback() 1069 alpns[i].size = slen; in Curl_gtls_ctx_init() 1221 size_t size; in Curl_gtls_verifyserver() local 1281 const char *end = beg + chainp[i].size; in Curl_gtls_verifyserver() 1453 size = sizeof(certname); in Curl_gtls_verifyserver() 1458 &size); in Curl_gtls_verifyserver() 1674 Curl_alpn_set_negotiated(cf, data, proto.data, proto.size); in gtls_verifyserver() 1961 static size_t gtls_version(char *buffer, size_t size) in gtls_version() argument [all …]
|
/curl/docs/libcurl/ |
H A D | curl_ws_send.md | 43 total expected size for the first part, then set the *CURLWS_OFFSET* with 89 expected fragment size in the first call and it needs to be zero in subsequent
|
H A D | curl_escape.md | 36 on **string** to find out the size.
|
H A D | curl_unescape.md | 38 strlen() on **input** to find out the size.
|
/curl/tests/unit/ |
H A D | unit1660.c | 162 printf("Number of entries: %zu\n", h->list.size);
|