/curl/lib/vauth/ |
H A D | cleartext.c | 71 size_t plen; in Curl_auth_create_plain_message() local 75 plen = strlen(passwd); in Curl_auth_create_plain_message() 79 (plen > (SIZE_T_MAX/2 - 2))) in Curl_auth_create_plain_message() 81 plainlen = zlen + clen + plen + 2; in Curl_auth_create_plain_message() 93 memcpy(plainauth + zlen + clen + 2, passwd, plen); in Curl_auth_create_plain_message()
|
/curl/lib/ |
H A D | bufq.c | 135 const unsigned char **pbuf, size_t *plen) in chunk_peek() argument 139 *plen = chunk->w_offset - chunk->r_offset; in chunk_peek() 143 const unsigned char **pbuf, size_t *plen) in chunk_peek_at() argument 148 *plen = chunk->w_offset - offset; in chunk_peek_at() 534 const unsigned char **pbuf, size_t *plen) in Curl_bufq_peek() argument 540 chunk_peek(q->head, pbuf, plen); in Curl_bufq_peek() 544 *plen = 0; in Curl_bufq_peek() 549 const unsigned char **pbuf, size_t *plen) in Curl_bufq_peek_at() argument 563 chunk_peek_at(c, offset, pbuf, plen); in Curl_bufq_peek_at() 567 *plen = 0; in Curl_bufq_peek_at()
|
H A D | mqtt.c | 172 static int add_passwd(const char *passwd, const size_t plen, in add_passwd() argument 177 if(plen > 0xffff) in add_passwd() 184 pkt[start] = (char)((plen >> 8) & 0xFF); in add_passwd() 185 pkt[start + 1] = (char)(plen & 0xFF); in add_passwd() 186 memcpy(&pkt[start + 2], passwd, plen); in add_passwd() 273 const size_t plen = strlen(passwd); in mqtt_connect() local 275 payloadlen = ulen + plen + MQTT_CLIENTID_LEN + 2; in mqtt_connect() 280 if(plen) in mqtt_connect() 329 if(plen) { in mqtt_connect() 330 rc = add_passwd(passwd, plen, packet, start_pwd, remain_pos); in mqtt_connect() [all …]
|
H A D | doh.c | 1179 uint16_t pcode = 0, plen = 0; in doh_resp_decode_httpsrr() local 1216 if(!plen) in doh_resp_decode_httpsrr() 1218 lhrr->ipv4hints = Curl_memdup(cp, plen); in doh_resp_decode_httpsrr() 1221 lhrr->ipv4hints_len = (size_t)plen; in doh_resp_decode_httpsrr() 1224 if(!plen) in doh_resp_decode_httpsrr() 1229 lhrr->echconfiglist_len = (size_t)plen; in doh_resp_decode_httpsrr() 1232 if(!plen) in doh_resp_decode_httpsrr() 1237 lhrr->ipv6hints_len = (size_t)plen; in doh_resp_decode_httpsrr() 1239 if(plen > 0 && plen <= remaining) { in doh_resp_decode_httpsrr() 1240 cp += plen; in doh_resp_decode_httpsrr() [all …]
|
H A D | bufq.h | 213 const unsigned char **pbuf, size_t *plen); 216 const unsigned char **pbuf, size_t *plen);
|
H A D | openldap.c | 957 const char *prefix, size_t plen, in client_write() argument 966 if(!len && plen && prefix[plen - 1] == ' ') in client_write() 967 plen--; in client_write() 968 result = Curl_client_write(data, CLIENTWRITE_BODY, (char *) prefix, plen); in client_write()
|
H A D | hostip.c | 661 size_t plen = strlen(part); in tailmatch() local 663 if(plen > flen) in tailmatch() 665 return strncasecompare(part, &full[flen - plen], plen); in tailmatch()
|
H A D | setopt.c | 3198 size_t plen = 0; in Curl_vsetopt() local 3205 plen = strlen(argptr); in Curl_vsetopt() 3206 if(plen > CURL_MAX_INPUT_LENGTH) { in Curl_vsetopt() 3212 if(plen == 5 && !strcmp(argptr, "false")) in Curl_vsetopt() 3215 else if(plen == 6 && !strcmp(argptr, "grease")) in Curl_vsetopt() 3218 else if(plen == 4 && !strcmp(argptr, "true")) in Curl_vsetopt() 3221 else if(plen == 4 && !strcmp(argptr, "hard")) in Curl_vsetopt() 3224 else if(plen > 5 && !strncmp(argptr, "ecl:", 4)) { in Curl_vsetopt() 3230 else if(plen > 4 && !strncmp(argptr, "pn:", 3)) { in Curl_vsetopt()
|
H A D | rtsp.c | 515 size_t plen = strlen(data->set.postfields); in rtsp_do() local 516 req_clen = (curl_off_t)plen; in rtsp_do() 517 result = Curl_creader_set_buf(data, data->set.postfields, plen); in rtsp_do()
|
H A D | socks.c | 411 size_t plen = strlen(sx->proxy_user); in do_SOCKS4() local 412 if(plen > 255) { in do_SOCKS4() 420 memcpy(socksreq + 8, sx->proxy_user, plen + 1); in do_SOCKS4()
|
H A D | urlapi.c | 1780 size_t plen = strlen(part); in curl_url_set() local 1782 if((plen > MAX_SCHEME_LEN) || (plen < 1)) in curl_url_set() 1792 while(--plen) { in curl_url_set()
|
H A D | cf-socket.c | 2102 curl_socklen_t plen; in set_accepted_remote_ip() local 2106 plen = sizeof(ssrem); in set_accepted_remote_ip() 2107 memset(&ssrem, 0, plen); in set_accepted_remote_ip() 2108 if(getpeername(ctx->sock, (struct sockaddr*) &ssrem, &plen)) { in set_accepted_remote_ip() 2114 if(!Curl_addr2string((struct sockaddr*)&ssrem, plen, in set_accepted_remote_ip()
|
H A D | url.c | 2576 size_t plen; local 2593 plen = (psep ? 2607 pbuf = Curl_memdup0(&psep[1], plen);
|
/curl/tests/server/ |
H A D | socksd.c | 443 unsigned char plen; in sockit() local 458 plen = buffer[SOCKS5_ULEN + ulen + 1]; in sockit() 459 if(rc < 3 + ulen + plen) { in sockit() 460 logmsg("Too short packet for ulen %d plen %d: %zd", ulen, plen, rc); in sockit() 464 (plen != strlen(config.password)) || in sockit() 466 memcmp(&buffer[SOCKS5_UNAME + ulen + 1], config.password, plen)) { in sockit()
|