/curl/lib/ |
H A D | strdup.c | 72 size_t length = wcslen(src); in Curl_wcsdup() local 74 if(length > (SIZE_T_MAX / sizeof(wchar_t)) - 1) in Curl_wcsdup() 77 return (wchar_t *)Curl_memdup(src, (length + 1) * sizeof(wchar_t)); in Curl_wcsdup() 91 void *Curl_memdup(const void *src, size_t length) in Curl_memdup() argument 93 void *buffer = malloc(length); in Curl_memdup() 97 memcpy(buffer, src, length); in Curl_memdup() 112 void *Curl_memdup0(const char *src, size_t length) in Curl_memdup0() argument 114 char *buf = malloc(length + 1); in Curl_memdup0() 117 memcpy(buf, src, length); in Curl_memdup0() 118 buf[length] = 0; in Curl_memdup0()
|
H A D | escape.c | 50 char *curl_unescape(const char *string, int length) in curl_unescape() argument 52 return curl_easy_unescape(NULL, string, length, NULL); in curl_unescape() 61 size_t length; in curl_easy_escape() local 68 length = (inlength ? (size_t)inlength : strlen(string)); in curl_easy_escape() 69 if(!length) in curl_easy_escape() 72 Curl_dyn_init(&d, length * 3 + 1); in curl_easy_escape() 74 while(length--) { in curl_easy_escape() 133 alloc = (length ? length : strlen(string)); in Curl_urldecode() 182 int length, int *olen) in curl_easy_unescape() argument 186 if(string && (length >= 0)) { in curl_easy_unescape() [all …]
|
H A D | sha256.c | 121 unsigned int length) in my_sha256_update() argument 148 sha256_update(ctx, length, data); in my_sha256_update() 203 (void) CC_SHA256_Update(ctx, data, length); in my_sha256_update() 250 unsigned long length = 0; in my_sha256_final() local 253 if(length == CURL_SHA256_DIGEST_LENGTH) in my_sha256_final() 310 unsigned long long length; member 312 unsigned __int64 length; 398 md->length = 0; in my_sha256_init() 466 md->length += md->curlen * 8; in my_sha256_final() 489 WPA_PUT_BE64(md->buf + 56, md->length); in my_sha256_final() [all …]
|
H A D | socks_gssapi.c | 142 service.length = serviceptr_length; in Curl_SOCKS5_gssapi_negotiate() 155 service.length = serviceptr_length + in Curl_SOCKS5_gssapi_negotiate() 201 if(gss_send_token.length) { in Curl_SOCKS5_gssapi_negotiate() 275 gss_recv_token.length = us_length; in Curl_SOCKS5_gssapi_negotiate() 332 user[gss_send_token.length] = '\0'; in Curl_SOCKS5_gssapi_negotiate() 391 gss_send_token.length = 1; in Curl_SOCKS5_gssapi_negotiate() 472 gss_recv_token.length = us_length; in Curl_SOCKS5_gssapi_negotiate() 502 if(gss_w_token.length != 1) { in Curl_SOCKS5_gssapi_negotiate() 504 gss_w_token.length); in Curl_SOCKS5_gssapi_negotiate() 514 if(gss_recv_token.length != 1) { in Curl_SOCKS5_gssapi_negotiate() [all …]
|
H A D | rand.c | 71 CURLcode Curl_win32_random(unsigned char *entropy, size_t length) in Curl_win32_random() argument 73 memset(entropy, 0, length); in Curl_win32_random() 76 if(BCryptGenRandom(NULL, entropy, (ULONG)length, in Curl_win32_random() 89 if(!CryptGenRandom(hCryptProv, (DWORD)length, entropy)) { in Curl_win32_random() 107 size_t length) /* always 4, size of int */ in weak_random() argument 110 DEBUGASSERT(length == sizeof(int)); in weak_random() 116 CURLcode result = Curl_win32_random(entropy, length); in weak_random() 125 memcpy(entropy, &r, length); in weak_random() 144 memcpy(entropy, &rnd, length); in weak_random()
|
H A D | curl_sha512_256.c | 151 size_t length) in Curl_sha512_256_update() argument 155 if(!EVP_DigestUpdate(*ctx, data, length)) in Curl_sha512_256_update() 238 size_t length) in Curl_sha512_256_update() argument 633 size_t length) in MHDx_sha512_256_update() argument 642 if(0 == length) in MHDx_sha512_256_update() 648 ctx->count += length; in MHDx_sha512_256_update() 649 if(length > ctx->count) in MHDx_sha512_256_update() 656 if(length >= bytes_left) { in MHDx_sha512_256_update() 663 length -= bytes_left; in MHDx_sha512_256_update() 674 length -= CURL_SHA512_256_BLOCK_SIZE; in MHDx_sha512_256_update() [all …]
|
H A D | krb5.c | 147 enc.length = len; in krb5_decode() 153 len = curlx_uztosi(dec.length); in krb5_decode() 172 dec.length = (size_t)length; in krb5_encode() 183 *to = malloc(enc.length); in krb5_encode() 299 if(output_buffer.length) { in krb5_auth() 340 _gssresp.length = 0; in krb5_auth() 678 len = length; in sec_write() 679 while(length) { in sec_write() 680 if(length < (size_t)len) in sec_write() 681 len = length; in sec_write() [all …]
|
H A D | pingpong.c | 336 size_t length = nl - line + 1; in Curl_pp_readresp() local 342 Curl_debug(data, CURLINFO_HEADER_IN, line, length); in Curl_pp_readresp() 348 result = Curl_client_write(data, CLIENTWRITE_INFO, line, length); in Curl_pp_readresp() 352 if(pp->endofresp(data, conn, line, length, code)) { in Curl_pp_readresp() 357 pp->nfinal = length; in Curl_pp_readresp() 358 if(Curl_dyn_len(&pp->recvbuf) > length) in Curl_pp_readresp() 359 pp->overflow = Curl_dyn_len(&pp->recvbuf) - length; in Curl_pp_readresp() 367 if(Curl_dyn_len(&pp->recvbuf) > length) in Curl_pp_readresp() 369 Curl_dyn_tail((&pp->recvbuf), Curl_dyn_len(&pp->recvbuf) - length); in Curl_pp_readresp()
|
H A D | curl_gssapi.c | 109 if(maj_stat == GSS_S_COMPLETE && status_string.length > 0) { in display_gss_error() 110 if(GSS_LOG_BUFFER_LEN > len + status_string.length + 3) { in display_gss_error() 112 "%.*s. ", (int)status_string.length, in display_gss_error()
|
H A D | curl_des.h | 36 void Curl_des_set_odd_parity(unsigned char *bytes, size_t length);
|
/curl/lib/vauth/ |
H A D | spnego_gssapi.c | 116 spn_token.length = strlen(spn); in Curl_auth_decode_spnego_message() 150 input_token.length = chlglen; in Curl_auth_decode_spnego_message() 156 chan.application_data.length = nego->channel_binding_data.leng; in Curl_auth_decode_spnego_message() 187 if(!output_token.value || !output_token.length) { in Curl_auth_decode_spnego_message() 195 if(nego->output_token.length && nego->output_token.value) in Curl_auth_decode_spnego_message() 227 nego->output_token.length, in Curl_auth_create_spnego_message() 233 nego->output_token.length = 0; in Curl_auth_create_spnego_message() 241 nego->output_token.length = 0; in Curl_auth_create_spnego_message() 273 nego->output_token.length = 0; in Curl_auth_cleanup_spnego()
|
H A D | krb5_gssapi.c | 109 spn_token.length = strlen(spn); in Curl_auth_create_gssapi_user_message() 132 input_token.length = Curl_bufref_len(chlg); in Curl_auth_create_gssapi_user_message() 156 if(output_token.value && output_token.length) { in Curl_auth_create_gssapi_user_message() 157 result = Curl_bufref_memdup(out, output_token.value, output_token.length); in Curl_auth_create_gssapi_user_message() 209 input_token.length = Curl_bufref_len(chlg); in Curl_auth_create_gssapi_security_message() 221 if(output_token.length != 4) { in Curl_auth_create_gssapi_security_message() 273 input_token.length = messagelen; in Curl_auth_create_gssapi_security_message() 287 result = Curl_bufref_memdup(out, output_token.value, output_token.length); in Curl_auth_create_gssapi_security_message()
|
/curl/tests/libtest/ |
H A D | stub_gssapi.c | 94 size_t length = APPROX_TOKEN_LEN * 3 / 4; in gss_init_sec_context() local 128 output_token->length = 0; in gss_init_sec_context() 131 if(input_token && input_token->length) { in gss_init_sec_context() 212 token = malloc(length); in gss_init_sec_context() 225 if(used >= length) { in gss_init_sec_context() 233 memset(token + used, 'A', length - used); in gss_init_sec_context() 238 output_token->length = length; in gss_init_sec_context() 270 if(buffer && buffer->length) { in gss_release_buffer() 272 buffer->length = 0; in gss_release_buffer() 335 status_string->length = 0; in gss_display_status() [all …]
|
/curl/tests/data/ |
H A D | test1137 | 7 --ignore-content-length 31 FTP RETR --ignore-content-length 34 ftp://%HOSTIP:%FTPPORT/%TESTNUMBER --ignore-content-length
|
H A D | test1537 | 40 escape -1 length: (nil) 41 unescape -1 length: (nil) 2017
|
H A D | test269 | 36 HTTP --ignore-content-length 39 http://%HOSTIP:%HTTPPORT/%TESTNUMBER --ignore-content-length
|
H A D | test2403 | 56 content-length: 6 64 "content-length":["6"],
|
H A D | test2503 | 55 content-length: 6 62 "content-length":["6"],
|
/curl/docs/examples/ |
H A D | htmltitle.cpp | 169 int length) in handleCharacters() argument 172 context->title.append(reinterpret_cast<char *>(chars), length); in handleCharacters() 181 int length) in Characters() argument 185 handleCharacters(context, chars, length); in Characters() 194 int length) in cdata() argument 198 handleCharacters(context, chars, length); in cdata()
|
/curl/tests/server/ |
H A D | getpart.c | 74 size_t length = 1; in line_length() local 77 length++; in line_length() 86 length--; in line_length() 89 return length; in line_length() 110 static int readline(char **buffer, size_t *bufsize, size_t *length, in readline() argument 129 *length = offset + line_length(*buffer + offset, bytestoread); in readline() 130 if(*(*buffer + *length - 1) == '\n') in readline() 132 offset = *length; in readline() 133 if(*length < *bufsize - 1) in readline()
|
/curl/docs/cmdline-opts/ |
H A D | ignore-content-length.md | 4 Long: ignore-content-length 13 - --ignore-content-length $URL 16 # `--ignore-content-length`
|
/curl/packages/OS400/rpg-examples/ |
H A D | SIMPLE2 | 40 dcl-s urllen int(10); // URL length 89 * Get the length of right-trimmed string 95 length uns(10) value; 100 len = %scan(X'00': string: 1: length); // Limit to zero-terminated string 102 len = length + 1;
|
H A D | SIMPLE1 | 39 d urllen s 10u 0 URL length 90 * Get the length of right-trimmed string 96 d length 10u 0 value 100 c eval len = %scan(X'00': string: 1: length) Limit 0-terminated 102 c eval len = length + 1
|
H A D | HTTPPOST | 41 d inputlen s 10u 0 User input length 111 * Get the length of right-trimmed string 117 d length 10u 0 value 121 len = %scan(X'00': string: 1: length); // Limit to zero-terminated string 123 len = length + 1;
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_IGNORE_CONTENT_LENGTH.md | 18 CURLOPT_IGNORE_CONTENT_LENGTH - ignore content length 35 incorrect content length for files over 2 gigabytes. If this option is used, 60 /* we know the server is silly, ignore content-length */
|