Home
last modified time | relevance | path

Searched refs:filter (Results 1 – 18 of 18) sorted by relevance

/curl/docs/examples/
H A Dblock_ip.c187 if(filter) { in free_connection_filter()
189 free(filter); in free_connection_filter()
270 if(filter->verbose) { in opensocket()
279 if(filter->verbose) { in opensocket()
299 filter = (struct connection_filter *)calloc(1, sizeof(*filter)); in main()
300 if(!filter) in main()
318 filter->list = ip_list_append(filter->list, "98.137.11.164"); in main()
319 filter->list = ip_list_append(filter->list, "127.0.0.0/8"); in main()
321 filter->list = ip_list_append(filter->list, "::1"); in main()
329 filter->verbose = TRUE; in main()
[all …]
/curl/.github/scripts/
H A Dcmp-config.pl94 sub filter { subroutine
120 print O filter($d);
/curl/tests/data/
H A Dtest260023 connection filter connect/destroy unit tests
/curl/scripts/
H A Dcmakelint.sh50 --filter=-whitespace/indent,-convention/filename,-package/stdargs,-readability/wonkycase
H A Dcontributors.sh78 sed -f ./docs/THANKS-filter | \
H A Dcontrithanks.sh71 sed -f ./docs/THANKS-filter | \
/curl/docs/cmdline-opts/
H A Drequest-target.md25 filter or other safe guards. That includes white space and control characters.
H A Drequest.md23 filter or other safe guards. That includes white space and control characters.
H A Dheader.md44 you. curl passes on the verbatim string you give it without any filter or
/curl/tests/
H A Dprocesshelp.pm139 my $filter = "PID eq $pid";
141 my $result = `tasklist -fi \"$filter\" 2>nul`;
/curl/docs/libcurl/opts/
H A DCURLOPT_REQUEST_TARGET.md34 libcurl passes on the verbatim string in its request without any filter or
H A DCURLOPT_CUSTOMREQUEST.md41 libcurl passes on the verbatim string in its request without any filter or
H A DCURLOPT_HTTPHEADER.md58 strings you give it, without any filter or other safe guards. That includes
/curl/packages/OS400/
H A Dos400sys.c580 Curl_ldap_search_s_a(void *ld, char *base, int scope, char *filter, in Curl_ldap_search_s_a() argument
607 if(filter && status == LDAP_SUCCESS) { in Curl_ldap_search_s_a()
608 i = strlen(filter); in Curl_ldap_search_s_a()
614 QadrtConvertA2E(efilter, filter, i, i); in Curl_ldap_search_s_a()
/curl/lib/
H A Dldap.c981 char *filter = p; in _ldap_url_parse2() local
985 LDAP_TRACE(("filter '%s'\n", filter)); in _ldap_url_parse2()
988 result = Curl_urldecode(filter, 0, &unescaped, NULL, REJECT_ZERO); in _ldap_url_parse2()
/curl/m4/
H A Dcurl-wolfssl.m4149 dnl if this symbol is present, we can make use of BIO filter chains
/curl/docs/libcurl/
H A Dlibcurl-security.md188 Some users might be tempted to filter access to local resources or similar
200 somehow by an attacker would all bypass a naive filter and could allow access
268 When first realizing this, the curl team tried to filter out such attempts in
318 Maybe just let the user provide data for parts of it? Or maybe filter input to
/curl/.github/
H A Dlabeler.yml418 docs/THANKS-filter,\

Completed in 28 milliseconds