Lines Matching refs:sptr
173 char *sptr; in AliasHandleIrcOut() local
191 sptr = (char *)pip; in AliasHandleIrcOut()
192 sptr += hlen; in AliasHandleIrcOut()
198 if (sptr[i] == '\001') in AliasHandleIrcOut()
215 newpacket[iCopy++] = sptr[i++]; /* Copy the CTCP start in AliasHandleIrcOut()
220 if (sptr[i + 0] != 'D') in AliasHandleIrcOut()
222 if (sptr[i + 1] != 'C') in AliasHandleIrcOut()
224 if (sptr[i + 2] != 'C') in AliasHandleIrcOut()
226 if (sptr[i + 3] != ' ') in AliasHandleIrcOut()
242 while (sptr[i] == ' ') { in AliasHandleIrcOut()
250 while (sptr[i] != ' ') { in AliasHandleIrcOut()
251 newpacket[iCopy++] = sptr[i]; in AliasHandleIrcOut()
259 newpacket[iCopy++] = sptr[i++]; in AliasHandleIrcOut()
266 while (sptr[i] == ' ') { in AliasHandleIrcOut()
274 while (sptr[i] != ' ') { in AliasHandleIrcOut()
275 newpacket[iCopy++] = sptr[i]; in AliasHandleIrcOut()
283 newpacket[iCopy++] = sptr[i++]; in AliasHandleIrcOut()
290 while (sptr[i] == ' ') { in AliasHandleIrcOut()
300 while (i < dlen && isdigit(sptr[i])) { in AliasHandleIrcOut()
302 DBprintf(("DCC Address overflow (org_addr == 0x%08lx, next char %c\n", org_addr, sptr[i])); in AliasHandleIrcOut()
306 org_addr += sptr[i++] - '0'; in AliasHandleIrcOut()
309 if (i + 1 >= dlen || sptr[i] != ' ') { in AliasHandleIrcOut()
310 …tf(("Overflow (%d >= %d) or bad character (%02x) terminating IP address\n", i + 1, dlen, sptr[i])); in AliasHandleIrcOut()
318 while (sptr[i] == ' ') { in AliasHandleIrcOut()
327 while (i < dlen && isdigit(sptr[i])) { in AliasHandleIrcOut()
334 org_port += sptr[i++] - '0'; in AliasHandleIrcOut()
337 if (i >= dlen || (sptr[i] != '\001' && sptr[i] != ' ')) { in AliasHandleIrcOut()
414 newpacket[iCopy] = sptr[i]; /* Copy CTCP unchanged */ in AliasHandleIrcOut()
415 if (sptr[i] == '\001') { in AliasHandleIrcOut()
423 newpacket[iCopy] = sptr[i]; /* Copy CTCP unchanged */ in AliasHandleIrcOut()
424 if (sptr[i] == '\001') { in AliasHandleIrcOut()
431 memcpy(sptr + copyat, newpacket, iCopy); in AliasHandleIrcOut()