Home
last modified time | relevance | path

Searched refs:plen (Results 1 – 14 of 14) sorted by relevance

/curl/lib/vauth/
H A Dcleartext.c71 size_t plen; in Curl_auth_create_plain_message() local
75 plen = strlen(passwd); in Curl_auth_create_plain_message()
79 (plen > (SIZE_T_MAX/2 - 2))) in Curl_auth_create_plain_message()
81 plainlen = zlen + clen + plen + 2; in Curl_auth_create_plain_message()
93 memcpy(plainauth + zlen + clen + 2, passwd, plen); in Curl_auth_create_plain_message()
/curl/lib/
H A Dbufq.c135 const unsigned char **pbuf, size_t *plen) in chunk_peek() argument
139 *plen = chunk->w_offset - chunk->r_offset; in chunk_peek()
143 const unsigned char **pbuf, size_t *plen) in chunk_peek_at() argument
148 *plen = chunk->w_offset - offset; in chunk_peek_at()
534 const unsigned char **pbuf, size_t *plen) in Curl_bufq_peek() argument
540 chunk_peek(q->head, pbuf, plen); in Curl_bufq_peek()
544 *plen = 0; in Curl_bufq_peek()
549 const unsigned char **pbuf, size_t *plen) in Curl_bufq_peek_at() argument
563 chunk_peek_at(c, offset, pbuf, plen); in Curl_bufq_peek_at()
567 *plen = 0; in Curl_bufq_peek_at()
H A Dmqtt.c172 static int add_passwd(const char *passwd, const size_t plen, in add_passwd() argument
177 if(plen > 0xffff) in add_passwd()
184 pkt[start] = (char)((plen >> 8) & 0xFF); in add_passwd()
185 pkt[start + 1] = (char)(plen & 0xFF); in add_passwd()
186 memcpy(&pkt[start + 2], passwd, plen); in add_passwd()
273 const size_t plen = strlen(passwd); in mqtt_connect() local
275 payloadlen = ulen + plen + MQTT_CLIENTID_LEN + 2; in mqtt_connect()
280 if(plen) in mqtt_connect()
329 if(plen) { in mqtt_connect()
330 rc = add_passwd(passwd, plen, packet, start_pwd, remain_pos); in mqtt_connect()
[all …]
H A Ddoh.c1179 uint16_t pcode = 0, plen = 0; in doh_resp_decode_httpsrr() local
1216 if(!plen) in doh_resp_decode_httpsrr()
1218 lhrr->ipv4hints = Curl_memdup(cp, plen); in doh_resp_decode_httpsrr()
1221 lhrr->ipv4hints_len = (size_t)plen; in doh_resp_decode_httpsrr()
1224 if(!plen) in doh_resp_decode_httpsrr()
1229 lhrr->echconfiglist_len = (size_t)plen; in doh_resp_decode_httpsrr()
1232 if(!plen) in doh_resp_decode_httpsrr()
1237 lhrr->ipv6hints_len = (size_t)plen; in doh_resp_decode_httpsrr()
1239 if(plen > 0 && plen <= remaining) { in doh_resp_decode_httpsrr()
1240 cp += plen; in doh_resp_decode_httpsrr()
[all …]
H A Dbufq.h213 const unsigned char **pbuf, size_t *plen);
216 const unsigned char **pbuf, size_t *plen);
H A Dopenldap.c957 const char *prefix, size_t plen, in client_write() argument
966 if(!len && plen && prefix[plen - 1] == ' ') in client_write()
967 plen--; in client_write()
968 result = Curl_client_write(data, CLIENTWRITE_BODY, (char *) prefix, plen); in client_write()
H A Dhostip.c661 size_t plen = strlen(part); in tailmatch() local
663 if(plen > flen) in tailmatch()
665 return strncasecompare(part, &full[flen - plen], plen); in tailmatch()
H A Dsetopt.c3198 size_t plen = 0; in Curl_vsetopt() local
3205 plen = strlen(argptr); in Curl_vsetopt()
3206 if(plen > CURL_MAX_INPUT_LENGTH) { in Curl_vsetopt()
3212 if(plen == 5 && !strcmp(argptr, "false")) in Curl_vsetopt()
3215 else if(plen == 6 && !strcmp(argptr, "grease")) in Curl_vsetopt()
3218 else if(plen == 4 && !strcmp(argptr, "true")) in Curl_vsetopt()
3221 else if(plen == 4 && !strcmp(argptr, "hard")) in Curl_vsetopt()
3224 else if(plen > 5 && !strncmp(argptr, "ecl:", 4)) { in Curl_vsetopt()
3230 else if(plen > 4 && !strncmp(argptr, "pn:", 3)) { in Curl_vsetopt()
H A Drtsp.c515 size_t plen = strlen(data->set.postfields); in rtsp_do() local
516 req_clen = (curl_off_t)plen; in rtsp_do()
517 result = Curl_creader_set_buf(data, data->set.postfields, plen); in rtsp_do()
H A Dsocks.c411 size_t plen = strlen(sx->proxy_user); in do_SOCKS4() local
412 if(plen > 255) { in do_SOCKS4()
420 memcpy(socksreq + 8, sx->proxy_user, plen + 1); in do_SOCKS4()
H A Durlapi.c1780 size_t plen = strlen(part); in curl_url_set() local
1782 if((plen > MAX_SCHEME_LEN) || (plen < 1)) in curl_url_set()
1792 while(--plen) { in curl_url_set()
H A Dcf-socket.c2102 curl_socklen_t plen; in set_accepted_remote_ip() local
2106 plen = sizeof(ssrem); in set_accepted_remote_ip()
2107 memset(&ssrem, 0, plen); in set_accepted_remote_ip()
2108 if(getpeername(ctx->sock, (struct sockaddr*) &ssrem, &plen)) { in set_accepted_remote_ip()
2114 if(!Curl_addr2string((struct sockaddr*)&ssrem, plen, in set_accepted_remote_ip()
H A Durl.c2576 size_t plen; local
2593 plen = (psep ?
2607 pbuf = Curl_memdup0(&psep[1], plen);
/curl/tests/server/
H A Dsocksd.c443 unsigned char plen; in sockit() local
458 plen = buffer[SOCKS5_ULEN + ulen + 1]; in sockit()
459 if(rc < 3 + ulen + plen) { in sockit()
460 logmsg("Too short packet for ulen %d plen %d: %zd", ulen, plen, rc); in sockit()
464 (plen != strlen(config.password)) || in sockit()
466 memcmp(&buffer[SOCKS5_UNAME + ulen + 1], config.password, plen)) { in sockit()

Completed in 83 milliseconds