@@ -545,14 +545,14 @@ static sl_status_t sli_si91x_send_http_client_request(sl_http_client_method_type
545
545
if (request -> host_name != NULL && request -> ip_address != request -> host_name ) {
546
546
547
547
sl_si91x_socket_type_length_value_t * tls_sni = (sl_si91x_socket_type_length_value_t * )malloc (
548
- sizeof (sl_si91x_socket_type_length_value_t ) + sl_strlen ((char * )request -> host_name ));
548
+ sizeof (sl_si91x_socket_type_length_value_t ) + strlen ((char * )request -> host_name ));
549
549
if (tls_sni == NULL ) {
550
550
free (http_client_request );
551
551
return SL_STATUS_ALLOCATION_FAILED ;
552
552
}
553
553
tls_sni -> type = SL_SI91X_TLS_EXTENSION_SNI_TYPE ;
554
554
555
- tls_sni -> length = sl_strlen ((char * )(request -> host_name ));
555
+ tls_sni -> length = strlen ((char * )(request -> host_name ));
556
556
memcpy (tls_sni -> value , request -> host_name , tls_sni -> length );
557
557
status = sli_si91x_set_sni_for_embedded_socket (tls_sni );
558
558
free (tls_sni );
@@ -590,7 +590,7 @@ static sl_status_t sli_si91x_send_http_client_request(sl_http_client_method_type
590
590
591
591
// Check for HTTP_V_1.1 and Empty host name and fill IP address
592
592
if (client_internal -> configuration .http_version == SL_HTTP_V_1_1
593
- && (request -> host_name == NULL || sl_strlen ((char * )request -> host_name ) == 0 )) {
593
+ && (request -> host_name == NULL || strlen ((char * )request -> host_name ) == 0 )) {
594
594
http_buffer_offset += snprintf ((char * )(http_client_request -> buffer + http_buffer_offset ),
595
595
SLI_SI91X_HTTP_BUFFER_LEN - http_buffer_offset ,
596
596
"%s" ,
@@ -640,7 +640,7 @@ static sl_status_t sli_si91x_send_http_client_request(sl_http_client_method_type
640
640
// Copy total data length into buffer
641
641
uint8_t temp_str [TEMP_STR_SIZE ] = { 0 };
642
642
convert_itoa (request -> body_length , temp_str );
643
- size_t temp_str_len = sl_strnlen ((char * )temp_str , TEMP_STR_SIZE + 1 );
643
+ size_t temp_str_len = strnlen ((char * )temp_str , TEMP_STR_SIZE + 1 );
644
644
memcpy (http_client_request -> buffer + http_buffer_offset , temp_str , temp_str_len );
645
645
http_buffer_offset += temp_str_len ;
646
646
} else {
@@ -652,7 +652,7 @@ static sl_status_t sli_si91x_send_http_client_request(sl_http_client_method_type
652
652
653
653
// Check if request buffer is overflowed or resource length is overflowed
654
654
if (http_buffer_offset > SLI_SI91X_HTTP_BUFFER_LEN
655
- || sl_strnlen ((char * )request -> resource , SLI_SI91X_MAX_HTTP_URL_SIZE + 1 ) > SLI_SI91X_MAX_HTTP_URL_SIZE ) {
655
+ || strnlen ((char * )request -> resource , SLI_SI91X_MAX_HTTP_URL_SIZE + 1 ) > SLI_SI91X_MAX_HTTP_URL_SIZE ) {
656
656
free (http_client_request );
657
657
return SL_STATUS_HAS_OVERFLOWED ;
658
658
}
@@ -1034,7 +1034,7 @@ sl_status_t sl_http_client_write_chunked_data(const sl_http_client_t *client,
1034
1034
}
1035
1035
1036
1036
// Check for invalid data length
1037
- if ((data_length == 0 ) && (sl_strlen ((char * )data ) == 0 )) {
1037
+ if ((data_length == 0 ) && (strlen ((char * )data ) == 0 )) {
1038
1038
return SL_STATUS_INVALID_PARAMETER ;
1039
1039
}
1040
1040
0 commit comments