/curl/include/curl/ |
H A D | websockets.h | 56 size_t *recv,
|
/curl/tests/ |
H A D | negtelnetserver.py | 88 data = neg.recv(4*1024) 110 self.request.recv(4*1024) 129 def recv(self, bytes): member in Negotiator 142 data = self.tcp.recv(bytes)
|
H A D | dictserver.py | 84 data = self.request.recv(1024).strip()
|
/curl/tests/data/ |
H A D | test556 | 31 send and recv HTTP
|
H A D | test1517 | 12 # This test checks to make sure curl can call recv() without failing after a
|
H A D | test1538 | 116 e81: Socket not ready for send/recv
|
/curl/docs/libcurl/ |
H A D | libcurl-env-dbg.md | 32 The percentage of recv() calls that should be answered with a EAGAIN at random. 37 The maximum data that shall be received from the network in one recv() call. 38 For TCP/UNIX sockets. This is applied to every recv. 40 Example: **CURL_DBG_SOCK_RMAX=400** means recv buffer size is limited to a
|
H A D | curl_ws_recv.md | 28 size_t *recv, const struct curl_ws_frame **meta); 36 **buffer**, but not more than **buflen** bytes. *recv* is set to the
|
H A D | libcurl-ws.md | 98 2. Using CURLOPT_CONNECT_ONLY(3) and use the WebSocket recv/send
|
/curl/lib/ |
H A D | curl_memory.h | 69 #undef recv
|
H A D | memdebug.h | 127 #undef recv 128 #define recv(a,b,c,d) curl_dbg_recv(a,b,c,d, __LINE__, __FILE__) macro
|
H A D | openldap.c | 190 Curl_recv *recv; /* For stacking SSL handler */ member 467 return conn->proto.ldapc->recv != NULL; in ssl_installed() 485 li->recv = conn->recv[FIRSTSOCKET]; in oldap_ssl_connect() 830 conn->recv[FIRSTSOCKET] = oldap_recv; in oldap_connecting() 1171 ret = (li->recv)(data, FIRSTSOCKET, buf, len, &err); in ldapsb_tls_read()
|
H A D | curl_setup_once.h | 161 #define sread(x,y,z) (ssize_t)recv((RECV_TYPE_ARG1)(x), \
|
H A D | curl_rtmp.c | 261 conn->recv[FIRSTSOCKET] = rtmp_recv; in rtmp_connect()
|
H A D | memdebug.c | 343 rc = recv(sockfd, buf, len, flags); in curl_dbg_recv()
|
H A D | krb5.c | 893 conn->recv[FIRSTSOCKET] = sec_recv; in choose_mech() 895 conn->recv[SECONDARYSOCKET] = sec_recv; in choose_mech()
|
H A D | urldata.h | 846 Curl_recv *recv[2]; member
|
H A D | cfilters.c | 855 nread = data->conn->recv[sockindex](data, sockindex, buf, blen, &result); in Curl_conn_recv()
|
/curl/tests/server/ |
H A D | socksd.c | 378 rc = recv(fd, (char *)buffer, sizeof(buffer), 0); in sockit() 425 rc = recv(fd, (char *)buffer, sizeof(buffer), 0); in sockit() 484 rc = recv(fd, (char *)buffer, sizeof(buffer), 0); in sockit() 653 nread = recv(cp->clientfd, buffer, sizeof(buffer), 0); in tunnel() 666 nread = recv(cp->remotefd, buffer, sizeof(buffer), 0); in tunnel()
|
/curl/tests/http/ |
H A D | test_11_unix.py | 75 c.recv(16)
|
/curl/ |
H A D | acinclude.m4 | 615 dnl Test if the socket recv() function is available, 622 AC_MSG_CHECKING([for recv]) 641 recv(0, 0, 0, 0); 653 [Define to 1 if you have the recv function.]) 656 AC_MSG_ERROR([Unable to link function recv])
|
/curl/lib/vssh/ |
H A D | libssh2.c | 3162 Curl_recv *backup = conn->recv[0]; in ssh_tls_recv() 3169 conn->recv[0] = ssh->tls_recv; in ssh_tls_recv() 3171 conn->recv[0] = backup; in ssh_tls_recv() 3312 sshc->tls_recv = conn->recv[FIRSTSOCKET]; in ssh_connect() 3318 conn->recv[FIRSTSOCKET] = scp_recv; in ssh_connect() 3322 conn->recv[FIRSTSOCKET] = sftp_recv; in ssh_connect()
|
H A D | wolfssh.c | 382 conn->recv[FIRSTSOCKET] = wscp_recv; in wssh_connect() 386 conn->recv[FIRSTSOCKET] = wsftp_recv; in wssh_connect()
|
/curl/.github/scripts/ |
H A D | spellcheck.words | 672 recv
|
/curl/docs/ |
H A D | KNOWN_BUGS | 108 17.4 HTTP/2 + TLS spends a lot of time in recv 611 17.4 HTTP/2 + TLS spends a lot of time in recv
|