Lines Matching defs:ebuf
608 // lwsl_hexdump_notice(ebuf.token, ebuf.len);
613 lwsl_debug("%s: ext says %d / ebuf.len %d\n", __func__,
620 * ebuf may be pointing somewhere completely different
636 lwsl_debug("%s: post ext ret %d, ebuf in %d / out %d\n",
944 struct lws_tokens ebuf;
970 ebuf.token = NULL;
971 ebuf.len = 0;
1089 ebuf.len = (int)lws_buflist_next_segment_len(&wsi->buflist,
1090 &ebuf.token);
1091 if (ebuf.len) {
1092 lwsl_info("draining buflist (len %d)\n", ebuf.len);
1121 ebuf.token = pt->serv_buf;
1123 ebuf.len = (int)wsi->ws->rx_ubuf_alloc;
1125 ebuf.len = (int)wsi->a.context->pt_serv_buf_size;
1127 if ((unsigned int)ebuf.len > wsi->a.context->pt_serv_buf_size)
1128 ebuf.len = (int)wsi->a.context->pt_serv_buf_size;
1130 if ((int)pending > ebuf.len)
1131 pending = (unsigned int)ebuf.len;
1133 ebuf.len = lws_ssl_capable_read(wsi, ebuf.token,
1135 (unsigned int)ebuf.len));
1136 switch (ebuf.len) {
1154 ebuf.len &= 0x7fffffff;
1175 if (ebuf.len > 0) {
1179 n = lws_read_h2(wsi, ebuf.token,
1180 (unsigned int)ebuf.len);
1183 n = lws_read_h1(wsi, ebuf.token,
1184 (unsigned int)ebuf.len);
1191 //lwsl_notice("%s: consuming %d / %d\n", __func__, n, ebuf.len);
1192 if (ebuf.len < 0 ||
1193 lws_buflist_aware_finished_consuming(wsi, &ebuf, n,
1198 ebuf.token = NULL;
1199 ebuf.len = 0;
1380 * coming here with a NULL, zero-length ebuf means just spill pending