/curl/lib/ |
H A D | mprintf.c | 154 unsigned int flags; member 227 unsigned int flags; in parsefmt() local 264 flags = 0; in parsefmt() 429 flags |= FLAGS_ALT; in parsefmt() 554 optr->flags = flags; in parsefmt() 692 unsigned int flags = optr->flags; in formatf() local 824 if(is_neg || (flags & FLAGS_SHOWSIGN) || (flags & FLAGS_SPACE)) in formatf() 827 if(!(flags & FLAGS_LEFT) && !(flags & FLAGS_PAD_NIL)) in formatf() 846 if(!(flags & FLAGS_LEFT) && (flags & FLAGS_PAD_NIL)) in formatf() 887 if(flags & FLAGS_ALT) in formatf() [all …]
|
H A D | nonblock.c | 51 int flags; in curlx_nonblock() local 52 flags = sfcntl(sockfd, F_GETFL, 0); in curlx_nonblock() 54 return sfcntl(sockfd, F_SETFL, flags | O_NONBLOCK); in curlx_nonblock() 55 return sfcntl(sockfd, F_SETFL, flags & (~O_NONBLOCK)); in curlx_nonblock() 60 int flags = nonblock ? 1 : 0; in curlx_nonblock() 61 return ioctl(sockfd, FIONBIO, &flags); in curlx_nonblock() 66 unsigned long flags = nonblock ? 1UL : 0UL; in curlx_nonblock() 67 return ioctlsocket(sockfd, FIONBIO, &flags); in curlx_nonblock() 72 long flags = nonblock ? 1L : 0L; in curlx_nonblock() 73 return IoctlSocket(sockfd, FIONBIO, (char *)&flags); in curlx_nonblock()
|
H A D | formdata.c | 73 long flags, in AddHttpPost() argument 98 post->flags = flags | CURL_HTTPPOST_LARGE; in AddHttpPost() 144 form_info->flags = HTTPPOST_FILENAME; in AddFormInfo() 424 current_form->flags |= HTTPPOST_CALLBACK; in FormAdd() 560 (form->flags & HTTPPOST_BUFFER) && in FormAdd() 569 if(((form->flags & HTTPPOST_FILENAME) || in FormAdd() 570 (form->flags & HTTPPOST_BUFFER)) && in FormAdd() 600 if(!(form->flags & HTTPPOST_PTRNAME) && in FormAdd() 760 if(!(form->flags & HTTPPOST_PTRNAME)) in curl_formfree() 762 if(!(form->flags & in curl_formfree() [all …]
|
H A D | urlapi.c | 477 if(flags & CURLU_DISALLOW_USER) { in parse_hostname_login() 1016 result = junkscan(url, &urllen, flags); in parseurl() 1174 if(flags & CURLU_DEFAULT_SCHEME) in parseurl() 1228 else if(flags & CURLU_NO_AUTHORITY) { in parseurl() 1247 if(flags & CURLU_URLENCODE) { in parseurl() 1274 if(flags & CURLU_URLENCODE) { in parseurl() 1324 else if(flags & CURLU_URLENCODE) in parseurl() 1328 if(!(flags & CURLU_PATH_AS_IS)) { in parseurl() 1361 result = parseurl(url, &tmpurl, flags); in parseurl_and_replace() 1428 (void)flags; in curl_url_get() [all …]
|
H A D | idn.c | 40 #define IDN2_LOOKUP(name, host, flags) \ argument 41 idn2_lookup_u8((const uint8_t *)name, (uint8_t **)host, flags) 43 #define IDN2_LOOKUP(name, host, flags) \ argument 44 idn2_lookup_ul((const char *)name, (char **)host, flags) 220 int flags = IDN2_NFC_INPUT in idn_decode() local 228 int rc = IDN2_LOOKUP(input, &decoded, flags); in idn_decode()
|
H A D | progress.c | 141 if(!(data->progress.flags & PGRS_HIDE) && in Curl_pgrsDone() 368 data->progress.flags |= PGRS_DL_SIZE_KNOWN; in Curl_pgrsSetDownloadSize() 372 data->progress.flags &= ~PGRS_DL_SIZE_KNOWN; in Curl_pgrsSetDownloadSize() 380 data->progress.flags |= PGRS_UL_SIZE_KNOWN; in Curl_pgrsSetUploadSize() 384 data->progress.flags &= ~PGRS_UL_SIZE_KNOWN; in Curl_pgrsSetUploadSize() 492 if(!(data->progress.flags & PGRS_HEADERS_OUT)) { in progress_meter() 507 if((data->progress.flags & PGRS_UL_SIZE_KNOWN) && in progress_meter() 520 if((data->progress.flags & PGRS_DL_SIZE_KNOWN) && in progress_meter() 543 ((data->progress.flags & PGRS_UL_SIZE_KNOWN)? in progress_meter() 545 ((data->progress.flags & PGRS_DL_SIZE_KNOWN)? in progress_meter() [all …]
|
H A D | setup-os400.h | 60 int flags); 122 extern int Curl_os400_sendto(int sd, char *buffer, int buflen, int flags, 124 extern int Curl_os400_recvfrom(int sd, char *buffer, int buflen, int flags,
|
H A D | ws.c | 65 int flags; member 95 return WS_FRAMES[i].flags; in ws_frame_op2flags() 100 static unsigned char ws_frame_flags2op(int flags) in ws_frame_flags2op() argument 104 if(WS_FRAMES[i].flags & flags) in ws_frame_flags2op() 350 ws->frame.flags = frame_flags; in update_meta() 537 unsigned int flags, in ws_enc_write_head() argument 563 opcode = ws_frame_flags2op(flags); in ws_enc_write_head() 570 if(!(flags & CURLWS_CONT)) { in ws_enc_write_head() 1080 if(fragsize || flags) { in curl_ws_send() 1115 if(flags & CURLWS_OFFSET) { in curl_ws_send() [all …]
|
/curl/lib/vauth/ |
H A D | ntlm.c | 72 if(flags & NTLMFLAG_NEGOTIATE_OEM) in ntlm_print_flags() 76 if(flags & (1<<3)) in ntlm_print_flags() 88 if(flags & (1<<10)) in ntlm_print_flags() 116 if(flags & (1<<24)) in ntlm_print_flags() 118 if(flags & (1<<25)) in ntlm_print_flags() 120 if(flags & (1<<26)) in ntlm_print_flags() 122 if(flags & (1<<27)) in ntlm_print_flags() 124 if(flags & (1<<28)) in ntlm_print_flags() 130 if(flags & NTLMFLAG_NEGOTIATE_56) in ntlm_print_flags() 275 ntlm->flags = 0; in Curl_auth_decode_ntlm_type2_message() [all …]
|
/curl/tests/libtest/ |
H A D | lib1156.c | 46 unsigned int flags; /* ORed flags as above. */ member 93 replyselector = (p->flags & F_CONTENTRANGE)? 1: 0; in onetest() 94 if(p->flags & F_HTTP416) in onetest() 108 (p->flags & F_RESUME)? "yes": "no", in onetest() 109 (p->flags & F_FAIL)? "yes": "no", in onetest() 110 (p->flags & F_HTTP416)? "yes": "no", in onetest() 111 (p->flags & F_CONTENTRANGE)? "yes": "no", in onetest() 115 if(hasbody && (p->flags & F_IGNOREBODY)) { in onetest() 118 (p->flags & F_RESUME)? "yes": "no", in onetest() 119 (p->flags & F_FAIL)? "yes": "no", in onetest() [all …]
|
H A D | lib2304.c | 48 if(meta->flags & CURLWS_PONG) { in recv_pong() 62 meta->flags); in recv_pong() 80 meta->flags); in recv_any()
|
/curl/tests/ |
H A D | servers.pm | 1153 my $flags = ""; 1235 my $flags = ""; 1296 my $flags = ""; 1363 my $flags = ""; 1440 my $flags = ""; 1503 my $flags = ""; 1579 my $flags = ""; 1650 my $flags = ""; 1726 my $flags = ""; 1806 my $flags = ""; [all …]
|
H A D | http-server.pl | 60 my $flags = ""; 174 $flags .= "--pidfile \"$pidfile\" ". 179 $flags .= "--gopher " if($gopher); 180 $flags .= "--connect $connect " if($connect); 181 $flags .= "--keepalive $keepalive_secs " if($keepalive_secs); 183 $flags .= "--unix-socket '$unix_socket' "; 185 $flags .= "--ipv$ipvnum --port $port "; 187 $flags .= "--srcdir \"$srcdir\""; 190 print STDERR "RUN: server/sws".exe_ext('SRV')." $flags\n"; 194 exec("exec server/sws".exe_ext('SRV')." $flags");
|
H A D | rtspserver.pl | 53 my $flags = ""; 129 $flags .= "--pidfile \"$pidfile\" ". 133 $flags .= "--ipv$ipvnum --port $port --srcdir \"$srcdir\""; 136 exec("exec server/rtspd".exe_ext('SRV')." $flags");
|
H A D | tftpserver.pl | 54 my $flags = ""; 126 $flags .= "--pidfile \"$pidfile\" ". 130 $flags .= "--ipv$ipvnum --port $port --srcdir \"$srcdir\""; 133 exec("exec server/tftpd".exe_ext('SRV')." $flags");
|
H A D | processhelp.pm | 196 my $flags = $_[1]; 200 if($flags == &WNOHANG) { 210 return waitpid($pid, $flags);
|
/curl/CMake/ |
H A D | CurlTests.c | 50 int flags = 0; in main() local 51 if(0 != fcntl(0, F_SETFL, flags | O_NONBLOCK)) in main() 177 unsigned long flags = ioctlsocket(socket, FIONBIO, &flags); in main() local 213 long flags = 0; in main() local 214 if(0 != IoctlSocket(0, FIONBIO, &flags)) in main() 231 unsigned long flags = 0; in main() local 232 if(0 != ioctlsocket(0, FIONBIO, &flags)) in main() 259 int flags = 0; in main() local 260 if(0 != ioctl(0, FIONBIO, &flags)) in main()
|
/curl/src/ |
H A D | tool_doswin.c | 71 int flags); 114 int flags) in sanitize_file_name() argument 129 if((flags & SANITIZE_ALLOW_PATH)) { in sanitize_file_name() 146 if(!(flags & SANITIZE_ALLOW_TRUNCATE) || in sanitize_file_name() 188 if(!(flags & SANITIZE_ALLOW_PATH) && len) { in sanitize_file_name() 206 sc = msdosify(&p, target, flags); in sanitize_file_name() 219 if(!(flags & SANITIZE_ALLOW_RESERVED)) { in sanitize_file_name() 314 int flags) in msdosify() argument 336 (!(flags & SANITIZE_ALLOW_TRUNCATE) || in msdosify() 483 if((flags & SANITIZE_ALLOW_PATH) && in rename_if_reserved_dos_device_name() [all …]
|
H A D | tool_doswin.h | 44 int flags); 48 int flags); 51 int flags);
|
/curl/tests/unit/ |
H A D | unit1604.c | 47 static char *getflagstr(int flags) in getflagstr() argument 52 ((flags & SANITIZE_ALLOW_COLONS) ? in getflagstr() 54 ((flags & SANITIZE_ALLOW_PATH) ? in getflagstr() 56 ((flags & SANITIZE_ALLOW_RESERVED) ? in getflagstr() 58 ((flags & SANITIZE_ALLOW_TRUNCATE) ? in getflagstr() 81 int flags; member 310 res = sanitize_file_name(&output, data[i].input, data[i].flags); 320 flagstr = getflagstr(data[i].flags);
|
/curl/include/curl/ |
H A D | websockets.h | 33 int flags; /* See the CURLWS_* defines */ member 73 unsigned int flags);
|
H A D | urlapi.h | 133 char **part, unsigned int flags); 141 const char *part, unsigned int flags);
|
/curl/docs/examples/ |
H A D | multi-uv.c | 137 int flags = 0; in curl_perform() local 141 flags |= CURL_CSELECT_IN; in curl_perform() 143 flags |= CURL_CSELECT_OUT; in curl_perform() 147 curl_multi_socket_action(curl_handle, context->sockfd, flags, in curl_perform()
|
H A D | multi-event.c | 127 int flags = 0; in curl_perform() local 131 flags |= CURL_CSELECT_IN; in curl_perform() 133 flags |= CURL_CSELECT_OUT; in curl_perform() 137 curl_multi_socket_action(curl_handle, context->sockfd, flags, in curl_perform()
|
H A D | websocket.c | 55 if(meta->flags & CURLWS_PONG) { in recv_pong() 69 meta->flags); in recv_pong()
|