Lines Matching defs:len
407 eb.len = 0;
410 buffered, eb.len);
411 if (eb.len == LWS_SSL_CAPABLE_MORE_SERVICE)
413 if (buffered < 0 || eb.len < 0) {
417 if (!eb.len)
420 n = eb.len;
427 m = eb.len - n;
452 * eb.len -= m;
754 _WSI_TOKEN_CLIENT_METHOD]].len = 3;
1303 lws_http_basic_auth_gen(const char *user, const char *pw, char *buf, size_t len)
1308 if (len < 6 + ((4 * (n + m + 1)) / 3) + 1)
1317 lws_b64_encode_string(b, (int)n, buf + 6, (int)len - 6);
1318 buf[len - 1] = '\0';
1326 lws_http_client_read(struct lws *wsi, char **buf, int *len)
1333 * If the caller provided a non-NULL *buf and nonzero *len, we should
1334 * use that as the buffer for the read action, limititing it to *len
1341 eb.len = *len;
1345 *len = 0;
1352 // lwsl_notice("%s: eb.len %d ENTRY chunk remaining %d\n", __func__, eb.len,
1381 if (eb.len <= 0)
1384 *len = eb.len;
1392 //lwsl_notice("%s: len %d SPIN chunk remaining %d\n", __func__, *len,
1394 while (wsi->chunked && (wsi->chunk_parser != ELCP_CONTENT) && *len) {
1417 // wsi->chunk_remaining, *len);
1430 lwsl_hexdump_err(*buf, (unsigned int)*len);
1452 lwsl_hexdump_err(*buf, (unsigned int)*len);
1463 lwsl_hexdump_err(*buf, (unsigned int)*len);
1469 (*len)--;
1476 (*len)--;
1484 wsi->http.rx_content_remain < (unsigned int)*len)
1487 n = *len;
1524 *len -= n;
1529 // wsi->chunk_remaining, *len);
1533 //eb.len -= n;
1538 if (wsi->chunked && *len)
1563 // lwsl_warn("%s: on way out, consuming %d / %d\n", __func__, consumed, eb.len);