@@ -545,14 +545,14 @@ static sl_status_t sli_si91x_send_http_client_request(sl_http_client_method_type
545545 if (request -> host_name != NULL && request -> ip_address != request -> host_name ) {
546546
547547 sl_si91x_socket_type_length_value_t * tls_sni = (sl_si91x_socket_type_length_value_t * )malloc (
548- sizeof (sl_si91x_socket_type_length_value_t ) + sl_strlen ((char * )request -> host_name ));
548+ sizeof (sl_si91x_socket_type_length_value_t ) + strlen ((char * )request -> host_name ));
549549 if (tls_sni == NULL ) {
550550 free (http_client_request );
551551 return SL_STATUS_ALLOCATION_FAILED ;
552552 }
553553 tls_sni -> type = SL_SI91X_TLS_EXTENSION_SNI_TYPE ;
554554
555- tls_sni -> length = sl_strlen ((char * )(request -> host_name ));
555+ tls_sni -> length = strlen ((char * )(request -> host_name ));
556556 memcpy (tls_sni -> value , request -> host_name , tls_sni -> length );
557557 status = sli_si91x_set_sni_for_embedded_socket (tls_sni );
558558 free (tls_sni );
@@ -590,7 +590,7 @@ static sl_status_t sli_si91x_send_http_client_request(sl_http_client_method_type
590590
591591 // Check for HTTP_V_1.1 and Empty host name and fill IP address
592592 if (client_internal -> configuration .http_version == SL_HTTP_V_1_1
593- && (request -> host_name == NULL || sl_strlen ((char * )request -> host_name ) == 0 )) {
593+ && (request -> host_name == NULL || strlen ((char * )request -> host_name ) == 0 )) {
594594 http_buffer_offset += snprintf ((char * )(http_client_request -> buffer + http_buffer_offset ),
595595 SLI_SI91X_HTTP_BUFFER_LEN - http_buffer_offset ,
596596 "%s" ,
@@ -640,7 +640,7 @@ static sl_status_t sli_si91x_send_http_client_request(sl_http_client_method_type
640640 // Copy total data length into buffer
641641 uint8_t temp_str [TEMP_STR_SIZE ] = { 0 };
642642 convert_itoa (request -> body_length , temp_str );
643- size_t temp_str_len = sl_strnlen ((char * )temp_str , TEMP_STR_SIZE + 1 );
643+ size_t temp_str_len = strnlen ((char * )temp_str , TEMP_STR_SIZE + 1 );
644644 memcpy (http_client_request -> buffer + http_buffer_offset , temp_str , temp_str_len );
645645 http_buffer_offset += temp_str_len ;
646646 } else {
@@ -652,7 +652,7 @@ static sl_status_t sli_si91x_send_http_client_request(sl_http_client_method_type
652652
653653 // Check if request buffer is overflowed or resource length is overflowed
654654 if (http_buffer_offset > SLI_SI91X_HTTP_BUFFER_LEN
655- || sl_strnlen ((char * )request -> resource , SLI_SI91X_MAX_HTTP_URL_SIZE + 1 ) > SLI_SI91X_MAX_HTTP_URL_SIZE ) {
655+ || strnlen ((char * )request -> resource , SLI_SI91X_MAX_HTTP_URL_SIZE + 1 ) > SLI_SI91X_MAX_HTTP_URL_SIZE ) {
656656 free (http_client_request );
657657 return SL_STATUS_HAS_OVERFLOWED ;
658658 }
@@ -1034,7 +1034,7 @@ sl_status_t sl_http_client_write_chunked_data(const sl_http_client_t *client,
10341034 }
10351035
10361036 // Check for invalid data length
1037- if ((data_length == 0 ) && (sl_strlen ((char * )data ) == 0 )) {
1037+ if ((data_length == 0 ) && (strlen ((char * )data ) == 0 )) {
10381038 return SL_STATUS_INVALID_PARAMETER ;
10391039 }
10401040
0 commit comments