Home
last modified time | relevance | path

Searched refs:BIT (Results 1 – 25 of 46) sorted by relevance

12

/curl/lib/
H A Drequest.h125 BIT(header); /* incoming data has HTTP header */
129 BIT(content_range); /* set TRUE if Content-Range: was found */
130 BIT(download_done); /* set to TRUE when download is complete */
131 BIT(eos_written); /* iff EOS has been written to client */
132 BIT(eos_read); /* iff EOS has been read from the client */
133 BIT(eos_sent); /* iff EOS has been sent to the server */
143 BIT(ignore_cl); /* ignore content-length */
146 BIT(getheader); /* TRUE if header parsing is wanted */
147 BIT(no_body); /* the response has no body */
152 BIT(sendbuf_init); /* sendbuf is initialized */
[all …]
H A Durldata.h250 BIT(eof_flag);
305 BIT(falsestart);
347 BIT(userhash);
448 BIT(noauthpersist);
450 BIT(havenegdata);
512 BIT(doh);
517 BIT(tls_upgraded);
1112 BIT(exclusive);
1333 BIT(use_range);
1339 BIT(cookie_engine);
[all …]
H A Dsmtp.h63 BIT(rcpt_had_ok); /* Whether any of RCPT TO commands (depends on
65 BIT(trailing_crlf); /* Specifies if the trailing CRLF is present */
75 BIT(ssldone); /* Is connect() over SSL done? */
76 BIT(tls_supported); /* StartTLS capability supported by server */
77 BIT(size_supported); /* If server supports SIZE extension according to
79 BIT(utf8_supported); /* If server supports SMTPUTF8 extension according
81 BIT(auth_supported); /* AUTH capability supported by server */
H A Dmultihandle.h177 BIT(multiplexing); /* multiplexing wanted */
178 BIT(recheckstate); /* see Curl_multi_connchanged */
179 BIT(in_callback); /* true while executing a callback */
181 BIT(ssl_seeded);
183 BIT(dead); /* a callback returned error, everything needs to crash and
185 BIT(xfer_buf_borrowed); /* xfer_buf is currently being borrowed */
186 BIT(xfer_ulbuf_borrowed); /* xfer_ulbuf is currently being borrowed */
187 BIT(xfer_sockbuf_borrowed); /* xfer_sockbuf is currently being borrowed */
189 BIT(warned); /* true after user warned of DEBUGBUILD */
H A Dimap.h83 BIT(ssldone); /* Is connect() over SSL done? */
84 BIT(preauth); /* Is this connection PREAUTH? */
85 BIT(tls_supported); /* StartTLS capability supported by server */
86 BIT(login_disabled); /* LOGIN command disabled by server */
87 BIT(ir_supported); /* Initial response supported by server */
H A Dcookie.h42 BIT(tailmatch); /* tail-match the domain name */
43 BIT(secure); /* the 'secure' keyword was used */
44 BIT(livecookie); /* updated from a server, not a stored file */
45 BIT(httponly); /* the httponly directive is present */
46 BIT(prefix_secure); /* secure prefix is set */
47 BIT(prefix_host); /* host prefix is set */
H A Dftp.h151 BIT(ftp_trying_alternative);
152 BIT(dont_check); /* Set to TRUE to prevent the final (post-transfer)
155 BIT(ctl_valid); /* Tells Curl_ftp_quit() whether or not to do anything. If
158 BIT(cwddone); /* if it has been determined that the proper CWD combo
160 BIT(cwdfail); /* set TRUE if a CWD command fails, as then we must prevent
162 BIT(wait_data_conn); /* this is set TRUE if data connection is waited */
H A Dpop3.h73 BIT(ssldone); /* Is connect() over SSL done? */
74 BIT(tls_supported); /* StartTLS capability supported by server */
H A Dcurl_sasl.h128 BIT(resetprefs); /* For URL auth option parsing. */
129 BIT(mutual_auth); /* Mutual authentication enabled (GSSAPI only) */
130 BIT(force_ir); /* Protocol always supports initial response */
H A Drtsp.h55 BIT(in_header);
H A Dnetrc.h34 BIT(loaded);
H A Dhttp_chunks.h100 BIT(ignore_body); /* never write response body data */
H A Dcurl_setup_once.h249 #define BIT(x) bool x macro
252 #define BIT(x) bit x:1 macro
H A Dselect.h118 BIT(allocated_pfds);
H A Dconncache.h62 BIT(locked);
H A Dsendf.c232 BIT(started_response);
612 BIT(seen_eos);
613 BIT(errored);
614 BIT(has_used_cb);
615 BIT(is_paused);
931 BIT(read_eos); /* we read an EOS from the next reader */
932 BIT(eos); /* we have returned an EOS */
933 BIT(prev_cr); /* the last byte was a CR */
H A Dhttp2.c145 BIT(initialized);
146 BIT(via_h1_upgrade);
147 BIT(conn_closed);
148 BIT(rcvd_goaway);
149 BIT(sent_goaway);
150 BIT(enable_push);
151 BIT(nw_out_blocked);
217 BIT(resp_hds_complete); /* we have a complete, final response */
218 BIT(closed); /* TRUE on stream close */
219 BIT(reset); /* TRUE on stream reset */
[all …]
H A Dcw-out.c105 BIT(paused);
106 BIT(errored);
/curl/lib/vtls/
H A Dwolfssl.h46 BIT(x509_store_setup); /* x509 store has been set up */
47 BIT(shutting_down); /* TLS is being shut down */
H A Dopenssl.h54 BIT(x509_store_setup); /* x509 store has been set up */
55 BIT(reused_session); /* session-ID was reused for this */
H A Dgtls.h57 BIT(trust_setup); /* x509 anchors + CRLs have been set up */
72 BIT(sent_shutdown);
H A Dvtls_int.h125 BIT(use_alpn); /* if ALPN shall be used in handshake */
126 BIT(peer_closed); /* peer has closed connection */
H A Dschannel_int.h163 BIT(sent_shutdown);
/curl/lib/vquic/
H A Dvquic_int.h52 BIT(got_first_byte); /* if first byte was received */
53 BIT(no_gso); /* do not use gso on sending */
H A Dcurl_quiche.c102 BIT(initialized);
103 BIT(goaway); /* got GOAWAY from server */
104 BIT(x509_store_setup); /* if x509 store has been set up */
105 BIT(shutdown_started); /* queued shutdown packets */
174 BIT(opened); /* TRUE after stream has been opened */
175 BIT(closed); /* TRUE on stream close */
176 BIT(reset); /* TRUE on stream reset */
177 BIT(send_closed); /* stream is locally closed */
178 BIT(resp_hds_complete); /* final response has been received */
179 BIT(resp_got_header); /* TRUE when h3 stream has recvd some HEADER */
[all …]

Completed in 76 milliseconds

12