Lines Matching refs:path
67 static SANITIZEcode truncate_dryrun(const char *path,
80 Sanitize a file or path name.
97 SANITIZE_ALLOW_PATH: Allow path separators and colons.
98 Without this flag path separators and colons are sanitized.
102 in a UNC prefixed path.
105 Without this flag if the sanitized filename or path will be too long an error
106 occurs. With this flag the filename --and not any other parts of the path-- may
132 /* UNC prefixed path \\ (eg \\?\C:\foo) */
141 does not discount the path information therefore we shouldn't use it. */
162 /* Skip the literal path prefix \\?\ */
239 Test if truncating a path to a file will leave at least a single character in
259 SANITIZE_ERR_OK: Good -- 'path' can be truncated
260 SANITIZE_ERR_INVALID_PATH: Bad -- 'path' cannot be truncated
263 SANITIZEcode truncate_dryrun(const char *path, const size_t truncate_pos)
267 if(!path)
270 len = strlen(path);
278 if(strpbrk(&path[truncate_pos - 1], "\\/:"))
283 const char *p = &path[truncate_pos - 1];
288 } while(p != path && *p != '\\' && *p != '/');
305 that some path information may pass through. For example drive letter names
453 that some path information may pass through. For example drive letter names
675 char *path; /* points to stack allocated buffer */
685 path = buffer;
687 path = mod.szExePath;
689 temp = curl_slist_append(slist, path);