Home
last modified time | relevance | path

Searched refs:flags (Results 1 – 25 of 133) sorted by relevance

123456

/curl/lib/
H A Dmprintf.c154 unsigned int flags; member
227 unsigned int flags; in parsefmt() local
264 flags = 0; in parsefmt()
429 flags |= FLAGS_ALT; in parsefmt()
554 optr->flags = flags; in parsefmt()
692 unsigned int flags = optr->flags; in formatf() local
824 if(is_neg || (flags & FLAGS_SHOWSIGN) || (flags & FLAGS_SPACE)) in formatf()
827 if(!(flags & FLAGS_LEFT) && !(flags & FLAGS_PAD_NIL)) in formatf()
846 if(!(flags & FLAGS_LEFT) && (flags & FLAGS_PAD_NIL)) in formatf()
887 if(flags & FLAGS_ALT) in formatf()
[all …]
H A Dnonblock.c51 int flags; in curlx_nonblock() local
52 flags = sfcntl(sockfd, F_GETFL, 0); in curlx_nonblock()
54 return sfcntl(sockfd, F_SETFL, flags | O_NONBLOCK); in curlx_nonblock()
55 return sfcntl(sockfd, F_SETFL, flags & (~O_NONBLOCK)); in curlx_nonblock()
60 int flags = nonblock ? 1 : 0; in curlx_nonblock()
61 return ioctl(sockfd, FIONBIO, &flags); in curlx_nonblock()
66 unsigned long flags = nonblock ? 1UL : 0UL; in curlx_nonblock()
67 return ioctlsocket(sockfd, FIONBIO, &flags); in curlx_nonblock()
72 long flags = nonblock ? 1L : 0L; in curlx_nonblock()
73 return IoctlSocket(sockfd, FIONBIO, (char *)&flags); in curlx_nonblock()
H A Dformdata.c73 long flags, in AddHttpPost() argument
98 post->flags = flags | CURL_HTTPPOST_LARGE; in AddHttpPost()
144 form_info->flags = HTTPPOST_FILENAME; in AddFormInfo()
424 current_form->flags |= HTTPPOST_CALLBACK; in FormAdd()
560 (form->flags & HTTPPOST_BUFFER) && in FormAdd()
569 if(((form->flags & HTTPPOST_FILENAME) || in FormAdd()
570 (form->flags & HTTPPOST_BUFFER)) && in FormAdd()
600 if(!(form->flags & HTTPPOST_PTRNAME) && in FormAdd()
760 if(!(form->flags & HTTPPOST_PTRNAME)) in curl_formfree()
762 if(!(form->flags & in curl_formfree()
[all …]
H A Durlapi.c477 if(flags & CURLU_DISALLOW_USER) { in parse_hostname_login()
1016 result = junkscan(url, &urllen, flags); in parseurl()
1174 if(flags & CURLU_DEFAULT_SCHEME) in parseurl()
1228 else if(flags & CURLU_NO_AUTHORITY) { in parseurl()
1247 if(flags & CURLU_URLENCODE) { in parseurl()
1274 if(flags & CURLU_URLENCODE) { in parseurl()
1324 else if(flags & CURLU_URLENCODE) in parseurl()
1328 if(!(flags & CURLU_PATH_AS_IS)) { in parseurl()
1361 result = parseurl(url, &tmpurl, flags); in parseurl_and_replace()
1428 (void)flags; in curl_url_get()
[all …]
H A Didn.c40 #define IDN2_LOOKUP(name, host, flags) \ argument
41 idn2_lookup_u8((const uint8_t *)name, (uint8_t **)host, flags)
43 #define IDN2_LOOKUP(name, host, flags) \ argument
44 idn2_lookup_ul((const char *)name, (char **)host, flags)
220 int flags = IDN2_NFC_INPUT in idn_decode() local
228 int rc = IDN2_LOOKUP(input, &decoded, flags); in idn_decode()
H A Dprogress.c141 if(!(data->progress.flags & PGRS_HIDE) && in Curl_pgrsDone()
368 data->progress.flags |= PGRS_DL_SIZE_KNOWN; in Curl_pgrsSetDownloadSize()
372 data->progress.flags &= ~PGRS_DL_SIZE_KNOWN; in Curl_pgrsSetDownloadSize()
380 data->progress.flags |= PGRS_UL_SIZE_KNOWN; in Curl_pgrsSetUploadSize()
384 data->progress.flags &= ~PGRS_UL_SIZE_KNOWN; in Curl_pgrsSetUploadSize()
492 if(!(data->progress.flags & PGRS_HEADERS_OUT)) { in progress_meter()
507 if((data->progress.flags & PGRS_UL_SIZE_KNOWN) && in progress_meter()
520 if((data->progress.flags & PGRS_DL_SIZE_KNOWN) && in progress_meter()
543 ((data->progress.flags & PGRS_UL_SIZE_KNOWN)? in progress_meter()
545 ((data->progress.flags & PGRS_DL_SIZE_KNOWN)? in progress_meter()
[all …]
H A Dsetup-os400.h60 int flags);
122 extern int Curl_os400_sendto(int sd, char *buffer, int buflen, int flags,
124 extern int Curl_os400_recvfrom(int sd, char *buffer, int buflen, int flags,
H A Dws.c65 int flags; member
95 return WS_FRAMES[i].flags; in ws_frame_op2flags()
100 static unsigned char ws_frame_flags2op(int flags) in ws_frame_flags2op() argument
104 if(WS_FRAMES[i].flags & flags) in ws_frame_flags2op()
350 ws->frame.flags = frame_flags; in update_meta()
537 unsigned int flags, in ws_enc_write_head() argument
563 opcode = ws_frame_flags2op(flags); in ws_enc_write_head()
570 if(!(flags & CURLWS_CONT)) { in ws_enc_write_head()
1080 if(fragsize || flags) { in curl_ws_send()
1115 if(flags & CURLWS_OFFSET) { in curl_ws_send()
[all …]
/curl/lib/vauth/
H A Dntlm.c72 if(flags & NTLMFLAG_NEGOTIATE_OEM) in ntlm_print_flags()
76 if(flags & (1<<3)) in ntlm_print_flags()
88 if(flags & (1<<10)) in ntlm_print_flags()
116 if(flags & (1<<24)) in ntlm_print_flags()
118 if(flags & (1<<25)) in ntlm_print_flags()
120 if(flags & (1<<26)) in ntlm_print_flags()
122 if(flags & (1<<27)) in ntlm_print_flags()
124 if(flags & (1<<28)) in ntlm_print_flags()
130 if(flags & NTLMFLAG_NEGOTIATE_56) in ntlm_print_flags()
275 ntlm->flags = 0; in Curl_auth_decode_ntlm_type2_message()
[all …]
/curl/tests/libtest/
H A Dlib1156.c46 unsigned int flags; /* ORed flags as above. */ member
93 replyselector = (p->flags & F_CONTENTRANGE)? 1: 0; in onetest()
94 if(p->flags & F_HTTP416) in onetest()
108 (p->flags & F_RESUME)? "yes": "no", in onetest()
109 (p->flags & F_FAIL)? "yes": "no", in onetest()
110 (p->flags & F_HTTP416)? "yes": "no", in onetest()
111 (p->flags & F_CONTENTRANGE)? "yes": "no", in onetest()
115 if(hasbody && (p->flags & F_IGNOREBODY)) { in onetest()
118 (p->flags & F_RESUME)? "yes": "no", in onetest()
119 (p->flags & F_FAIL)? "yes": "no", in onetest()
[all …]
H A Dlib2304.c48 if(meta->flags & CURLWS_PONG) { in recv_pong()
62 meta->flags); in recv_pong()
80 meta->flags); in recv_any()
/curl/tests/
H A Dservers.pm1153 my $flags = "";
1235 my $flags = "";
1296 my $flags = "";
1363 my $flags = "";
1440 my $flags = "";
1503 my $flags = "";
1579 my $flags = "";
1650 my $flags = "";
1726 my $flags = "";
1806 my $flags = "";
[all …]
H A Dhttp-server.pl60 my $flags = "";
174 $flags .= "--pidfile \"$pidfile\" ".
179 $flags .= "--gopher " if($gopher);
180 $flags .= "--connect $connect " if($connect);
181 $flags .= "--keepalive $keepalive_secs " if($keepalive_secs);
183 $flags .= "--unix-socket '$unix_socket' ";
185 $flags .= "--ipv$ipvnum --port $port ";
187 $flags .= "--srcdir \"$srcdir\"";
190 print STDERR "RUN: server/sws".exe_ext('SRV')." $flags\n";
194 exec("exec server/sws".exe_ext('SRV')." $flags");
H A Drtspserver.pl53 my $flags = "";
129 $flags .= "--pidfile \"$pidfile\" ".
133 $flags .= "--ipv$ipvnum --port $port --srcdir \"$srcdir\"";
136 exec("exec server/rtspd".exe_ext('SRV')." $flags");
H A Dtftpserver.pl54 my $flags = "";
126 $flags .= "--pidfile \"$pidfile\" ".
130 $flags .= "--ipv$ipvnum --port $port --srcdir \"$srcdir\"";
133 exec("exec server/tftpd".exe_ext('SRV')." $flags");
H A Dprocesshelp.pm196 my $flags = $_[1];
200 if($flags == &WNOHANG) {
210 return waitpid($pid, $flags);
/curl/CMake/
H A DCurlTests.c50 int flags = 0; in main() local
51 if(0 != fcntl(0, F_SETFL, flags | O_NONBLOCK)) in main()
177 unsigned long flags = ioctlsocket(socket, FIONBIO, &flags); in main() local
213 long flags = 0; in main() local
214 if(0 != IoctlSocket(0, FIONBIO, &flags)) in main()
231 unsigned long flags = 0; in main() local
232 if(0 != ioctlsocket(0, FIONBIO, &flags)) in main()
259 int flags = 0; in main() local
260 if(0 != ioctl(0, FIONBIO, &flags)) in main()
/curl/src/
H A Dtool_doswin.c71 int flags);
114 int flags) in sanitize_file_name() argument
129 if((flags & SANITIZE_ALLOW_PATH)) { in sanitize_file_name()
146 if(!(flags & SANITIZE_ALLOW_TRUNCATE) || in sanitize_file_name()
188 if(!(flags & SANITIZE_ALLOW_PATH) && len) { in sanitize_file_name()
206 sc = msdosify(&p, target, flags); in sanitize_file_name()
219 if(!(flags & SANITIZE_ALLOW_RESERVED)) { in sanitize_file_name()
314 int flags) in msdosify() argument
336 (!(flags & SANITIZE_ALLOW_TRUNCATE) || in msdosify()
483 if((flags & SANITIZE_ALLOW_PATH) && in rename_if_reserved_dos_device_name()
[all …]
H A Dtool_doswin.h44 int flags);
48 int flags);
51 int flags);
/curl/tests/unit/
H A Dunit1604.c47 static char *getflagstr(int flags) in getflagstr() argument
52 ((flags & SANITIZE_ALLOW_COLONS) ? in getflagstr()
54 ((flags & SANITIZE_ALLOW_PATH) ? in getflagstr()
56 ((flags & SANITIZE_ALLOW_RESERVED) ? in getflagstr()
58 ((flags & SANITIZE_ALLOW_TRUNCATE) ? in getflagstr()
81 int flags; member
310 res = sanitize_file_name(&output, data[i].input, data[i].flags);
320 flagstr = getflagstr(data[i].flags);
/curl/include/curl/
H A Dwebsockets.h33 int flags; /* See the CURLWS_* defines */ member
73 unsigned int flags);
H A Durlapi.h133 char **part, unsigned int flags);
141 const char *part, unsigned int flags);
/curl/docs/examples/
H A Dmulti-uv.c137 int flags = 0; in curl_perform() local
141 flags |= CURL_CSELECT_IN; in curl_perform()
143 flags |= CURL_CSELECT_OUT; in curl_perform()
147 curl_multi_socket_action(curl_handle, context->sockfd, flags, in curl_perform()
H A Dmulti-event.c127 int flags = 0; in curl_perform() local
131 flags |= CURL_CSELECT_IN; in curl_perform()
133 flags |= CURL_CSELECT_OUT; in curl_perform()
137 curl_multi_socket_action(curl_handle, context->sockfd, flags, in curl_perform()
H A Dwebsocket.c55 if(meta->flags & CURLWS_PONG) { in recv_pong()
69 meta->flags); in recv_pong()

Completed in 77 milliseconds

123456