Lines Matching refs:sptr
177 char *sptr; in AliasHandleIrcOut() local
195 sptr = (char *)pip; in AliasHandleIrcOut()
196 sptr += hlen; in AliasHandleIrcOut()
202 if (sptr[i] == '\001') in AliasHandleIrcOut()
219 newpacket[iCopy++] = sptr[i++]; /* Copy the CTCP start in AliasHandleIrcOut()
224 if (sptr[i + 0] != 'D') in AliasHandleIrcOut()
226 if (sptr[i + 1] != 'C') in AliasHandleIrcOut()
228 if (sptr[i + 2] != 'C') in AliasHandleIrcOut()
230 if (sptr[i + 3] != ' ') in AliasHandleIrcOut()
246 while (sptr[i] == ' ') { in AliasHandleIrcOut()
254 while (sptr[i] != ' ') { in AliasHandleIrcOut()
255 newpacket[iCopy++] = sptr[i]; in AliasHandleIrcOut()
263 newpacket[iCopy++] = sptr[i++]; in AliasHandleIrcOut()
270 while (sptr[i] == ' ') { in AliasHandleIrcOut()
278 while (sptr[i] != ' ') { in AliasHandleIrcOut()
279 newpacket[iCopy++] = sptr[i]; in AliasHandleIrcOut()
287 newpacket[iCopy++] = sptr[i++]; in AliasHandleIrcOut()
294 while (sptr[i] == ' ') { in AliasHandleIrcOut()
304 while (i < dlen && isdigit(sptr[i])) { in AliasHandleIrcOut()
306 DBprintf(("DCC Address overflow (org_addr == 0x%08lx, next char %c\n", org_addr, sptr[i])); in AliasHandleIrcOut()
310 org_addr += sptr[i++] - '0'; in AliasHandleIrcOut()
313 if (i + 1 >= dlen || sptr[i] != ' ') { in AliasHandleIrcOut()
314 …tf(("Overflow (%d >= %d) or bad character (%02x) terminating IP address\n", i + 1, dlen, sptr[i])); in AliasHandleIrcOut()
322 while (sptr[i] == ' ') { in AliasHandleIrcOut()
331 while (i < dlen && isdigit(sptr[i])) { in AliasHandleIrcOut()
338 org_port += sptr[i++] - '0'; in AliasHandleIrcOut()
341 if (i >= dlen || (sptr[i] != '\001' && sptr[i] != ' ')) { in AliasHandleIrcOut()
418 newpacket[iCopy] = sptr[i]; /* Copy CTCP unchanged */ in AliasHandleIrcOut()
419 if (sptr[i] == '\001') { in AliasHandleIrcOut()
427 newpacket[iCopy] = sptr[i]; /* Copy CTCP unchanged */ in AliasHandleIrcOut()
428 if (sptr[i] == '\001') { in AliasHandleIrcOut()
435 memcpy(sptr + copyat, newpacket, iCopy); in AliasHandleIrcOut()