Searched refs:filter (Results 1 – 18 of 18) sorted by relevance
/curl/docs/examples/ |
H A D | block_ip.c | 187 if(filter) { in free_connection_filter() 189 free(filter); in free_connection_filter() 270 if(filter->verbose) { in opensocket() 279 if(filter->verbose) { in opensocket() 299 filter = (struct connection_filter *)calloc(1, sizeof(*filter)); in main() 300 if(!filter) in main() 318 filter->list = ip_list_append(filter->list, "98.137.11.164"); in main() 319 filter->list = ip_list_append(filter->list, "127.0.0.0/8"); in main() 321 filter->list = ip_list_append(filter->list, "::1"); in main() 329 filter->verbose = TRUE; in main() [all …]
|
/curl/.github/scripts/ |
H A D | cmp-config.pl | 94 sub filter { subroutine 120 print O filter($d);
|
/curl/tests/data/ |
H A D | test2600 | 23 connection filter connect/destroy unit tests
|
/curl/scripts/ |
H A D | cmakelint.sh | 50 --filter=-whitespace/indent,-convention/filename,-package/stdargs,-readability/wonkycase
|
H A D | contributors.sh | 78 sed -f ./docs/THANKS-filter | \
|
H A D | contrithanks.sh | 71 sed -f ./docs/THANKS-filter | \
|
/curl/docs/cmdline-opts/ |
H A D | request-target.md | 25 filter or other safe guards. That includes white space and control characters.
|
H A D | request.md | 23 filter or other safe guards. That includes white space and control characters.
|
H A D | header.md | 44 you. curl passes on the verbatim string you give it without any filter or
|
/curl/tests/ |
H A D | processhelp.pm | 139 my $filter = "PID eq $pid"; 141 my $result = `tasklist -fi \"$filter\" 2>nul`;
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_REQUEST_TARGET.md | 34 libcurl passes on the verbatim string in its request without any filter or
|
H A D | CURLOPT_CUSTOMREQUEST.md | 41 libcurl passes on the verbatim string in its request without any filter or
|
H A D | CURLOPT_HTTPHEADER.md | 58 strings you give it, without any filter or other safe guards. That includes
|
/curl/packages/OS400/ |
H A D | os400sys.c | 580 Curl_ldap_search_s_a(void *ld, char *base, int scope, char *filter, in Curl_ldap_search_s_a() argument 607 if(filter && status == LDAP_SUCCESS) { in Curl_ldap_search_s_a() 608 i = strlen(filter); in Curl_ldap_search_s_a() 614 QadrtConvertA2E(efilter, filter, i, i); in Curl_ldap_search_s_a()
|
/curl/lib/ |
H A D | ldap.c | 981 char *filter = p; in _ldap_url_parse2() local 985 LDAP_TRACE(("filter '%s'\n", filter)); in _ldap_url_parse2() 988 result = Curl_urldecode(filter, 0, &unescaped, NULL, REJECT_ZERO); in _ldap_url_parse2()
|
/curl/m4/ |
H A D | curl-wolfssl.m4 | 149 dnl if this symbol is present, we can make use of BIO filter chains
|
/curl/docs/libcurl/ |
H A D | libcurl-security.md | 188 Some users might be tempted to filter access to local resources or similar 200 somehow by an attacker would all bypass a naive filter and could allow access 268 When first realizing this, the curl team tried to filter out such attempts in 318 Maybe just let the user provide data for parts of it? Or maybe filter input to
|
/curl/.github/ |
H A D | labeler.yml | 418 docs/THANKS-filter,\
|
Completed in 28 milliseconds