Searched refs:payload (Results 1 – 23 of 23) sorted by relevance
/curl/tests/data/ |
H A D | test1309 | 1452 removed payload 0[0] 1454 removed payload 39[0] 1455 removed payload 49[0] 1456 removed payload 49[1] 1457 removed payload 59[0] 1458 removed payload 59[1] 1459 removed payload 59[2] 1460 removed payload 98[0] 1461 removed payload 98[1] 1462 removed payload 98[2] [all …]
|
H A D | test1193 | 26 MQTT PUBLISH 2k payload 29 mqtt://%HOSTIP:%MQTTPORT/%TESTNUMBER -d @%LOGDIR/payload%TESTNUMBER 31 <file name="%LOGDIR/payload%TESTNUMBER">
|
H A D | test2307 | 9 # Sends a PING with overlong payload 39 WebSockets, overlong PING payload
|
H A D | test1199 | 30 MQTT PUBLISH empty payload, no topic
|
H A D | test1198 | 30 MQTT PUBLISH empty payload, single space topic
|
H A D | test1917 | 33 MQTT PUBLISH with CURLOPT_POST set (no payload)
|
H A D | test1956 | 46 HTTP AWS_SIGV4 with X-Xxx-Content-Sha256 of empty payload
|
H A D | test1957 | 46 HTTP AWS_SIGV4 with X-Xxx-Content-Sha256 of arbitrary payload
|
H A D | test1958 | 46 HTTP AWS_SIGV4 with X-Xxx-Content-Sha256 of arbitrary payload with whitespace
|
H A D | test1129 | 33 # we use skip to make the test server never read the full payload off
|
H A D | test1131 | 33 # We use skip to make the test server never read the full payload off
|
H A D | test1130 | 33 # We use skip to make the test server never read the full payload off
|
H A D | test571 | 5 # 1) giving an evil payload (with $)
|
/curl/tests/http/clients/ |
H A D | ws-pingpong.c | 100 static CURLcode pingpong(CURL *curl, const char *payload) in pingpong() argument 105 res = ping(curl, payload); in pingpong() 110 res = recv_pong(curl, payload); in pingpong() 140 const char *url, *payload; in main() local 147 payload = argv[2]; in main() 162 res = pingpong(curl, payload); in main()
|
/curl/tests/http/ |
H A D | test_20_websockets.py | 88 payload = 125 * "x" 93 r = client.run(args=[url, payload]) 98 payload = 127 * "x" 103 r = client.run(args=[url, payload])
|
/curl/lib/ |
H A D | splay.h | 55 void Curl_splayset(struct Curl_tree *node, void *payload);
|
H A D | splay.c | 287 void Curl_splayset(struct Curl_tree *node, void *payload) in Curl_splayset() argument 290 node->ptr = payload; in Curl_splayset()
|
H A D | mqtt.c | 516 char *payload = data->set.postfields; in mqtt_publish() local 527 if(!payload) { in mqtt_publish() 532 payloadlen = strlen(payload); in mqtt_publish() 558 memcpy(&pkt[i], payload, payloadlen); in mqtt_publish()
|
/curl/docs/libcurl/opts/ |
H A D | CURLINFO_SIZE_DOWNLOAD_T.md | 35 again for each new transfer. This counts actual payload data, what's also
|
H A D | CURLINFO_SIZE_DOWNLOAD.md | 34 for each new transfer. This counts actual payload data, what's also commonly
|
H A D | CURLOPT_AWS_SIGV4.md | 112 A sha256 checksum of the request payload is used as input to the signature 119 not already present. For s3 requests with unknown payload, this header takes
|
/curl/docs/libcurl/ |
H A D | curl_ws_send.md | 36 number of payload bytes in that memory area. 38 *sent* is returned as the number of payload bytes actually sent.
|
/curl/tests/server/ |
H A D | mqttd.c | 392 char *topic, char *payload, size_t payloadlen) in publish() argument 432 memcpy(&packet[payloadindex], payload, payloadlen); in publish()
|
Completed in 40 milliseconds