Home
last modified time | relevance | path

Searched refs:response (Results 1 – 25 of 279) sorted by relevance

12345678910>>...12

/curl/lib/vauth/
H A Dcram.c67 char *response; in Curl_auth_create_cram_md5_message() local
85 response = aprintf( in Curl_auth_create_cram_md5_message()
90 if(!response) in Curl_auth_create_cram_md5_message()
93 Curl_bufref_set(out, response, strlen(response), curl_free); in Curl_auth_create_cram_md5_message()
H A Ddigest.c482 if(!response) in Curl_auth_create_digest_md5_message()
486 Curl_bufref_set(out, response, strlen(response), curl_free); in Curl_auth_create_digest_md5_message()
903 if(!response) in auth_create_digest_http_message()
912 free(response); in auth_create_digest_http_message()
916 free(response); in auth_create_digest_http_message()
921 response = tmp; in auth_create_digest_http_message()
927 free(response); in auth_create_digest_http_message()
931 response = tmp; in auth_create_digest_http_message()
937 free(response); in auth_create_digest_http_message()
941 response = tmp; in auth_create_digest_http_message()
[all …]
H A Dgsasl.c104 char *response; in Curl_auth_gsasl_token() local
109 &response, &outlen); in Curl_auth_gsasl_token()
115 Curl_bufref_set(out, response, outlen, gsasl_free); in Curl_auth_gsasl_token()
/curl/docs/cmdline-opts/
H A Dfail.md21 Fail with error code 22 and with no response body output at all for HTTP
22 transfers returning HTTP response codes at 400 or greater.
26 HTTP response code. This command line option prevents curl from outputting
28 consider HTTP response codes to indicate failure.
34 response codes slip through, especially when authentication is involved
35 (response codes 401 and 407).
H A Dhttp0.9.md21 Accept an HTTP version 0.9 response.
23 HTTP/0.9 is a response without headers and therefore you can also connect with
24 this to non-HTTP servers and still get a response since curl simply
H A Dshow-headers.md6 Help: Show response headers in output
20 Show response headers in the output. HTTP response headers can include things
24 This option makes the response headers get saved in the same stream/output as
H A Dcert-status.md22 response, if the response suggests that the server certificate has been
23 revoked, or no response at all is received, the verification fails.
H A Dsasl-ir.md5 Help: Initial response in SASL authentication
17 Enable initial response in SASL authentication.
H A Ddoh-cert-status.md23 response, if the response suggests that the server certificate has been
24 revoked, or no response at all is received, the verification fails.
H A Dlocation.md21 location (indicated with a Location: header and a 3XX response code), this
33 following request with a GET if the HTTP response was 301, 302, or 303. If the
34 response code was any other 3xx code, curl resends the following request using
37 You can tell curl to not change POST requests to GET after a 30x response by
H A Dretry.md21 a timeout, an FTP 4xx response code or an HTTP 408, 429, 500, 502, 503 or 504
22 response code.
30 curl complies with the Retry-After: response header if one was present to know
/curl/tests/data/
H A Dtest10036 huge response
14 # a ~17000 bytes response string to CWD to make sure the ftp parser deals
27 FTP with excessively large server command response line
H A Dtest202717 first 401 response (as the data400 gives). libcurl will instead consider the
18 new response just as a duplicate and it sends another and detects the auth
19 problem on the second 401 response!
202 …rname="testuser", realm="testrealm", nonce="1", uri="/%TESTNUMBER0100", response="f7fd60eefaff5225…
207 …rname="testuser", realm="testrealm", nonce="2", uri="/%TESTNUMBER0200", response="785ca3ef511999f7…
216 …rname="testuser", realm="testrealm", nonce="4", uri="/%TESTNUMBER0300", response="4c735d2360fd6848…
221 …rname="testuser", realm="testrealm", nonce="5", uri="/%TESTNUMBER0400", response="f5906785511fb60a…
226 …rname="testuser", realm="testrealm", nonce="5", uri="/%TESTNUMBER0400", response="f5906785511fb60a…
231 …rname="testuser", realm="testrealm", nonce="7", uri="/%TESTNUMBER0500", response="8ef4d935fd964a46…
H A Dtest148030 HTTP Continue response without final response
H A Dtest11155 HTTP 1xx response code
33 HTTP GET with unexpected 1xx response
H A Dtest148417 HEAD response with content
35 HTTP HEAD with response body to ignore
/curl/docs/libcurl/opts/
H A DCURLOPT_HTTP09_ALLOWED.md17 CURLOPT_HTTP09_ALLOWED - allow HTTP/0.9 response
31 An HTTP/0.9 response is a server response entirely without headers and only a
32 body. You can connect to lots of random TCP services and still get a response
H A DCURLINFO_HTTP_CONNECTCODE.md18 CURLINFO_HTTP_CONNECTCODE - get the CONNECT response code
30 Pass a pointer to a long to receive the last received HTTP proxy response code
31 to a CONNECT request. The returned value is zero if no such response code was
53 printf("The CONNECT response code: %03ld\n", code);
H A DCURLOPT_FAILONERROR.md18 CURLOPT_FAILONERROR - request failure on HTTP response \>= 400
35 response codes slip through, especially when authentication is involved
36 (response codes 401 and 407).
39 detected, like when a "100-continue" is received as a response to a POST/PUT
63 /* an HTTP response error problem */
H A DCURLINFO_RESPONSE_CODE.md21 CURLINFO_RESPONSE_CODE - get the last response code
34 (OpenLDAP only) response code. This option was previously known as
36 no server response code has been received.
38 Note that a proxy's CONNECT response should be read with
H A DCURLOPT_EXPECT_100_TIMEOUT_MS.md17 CURLOPT_EXPECT_100_TIMEOUT_MS - timeout for Expect: 100-continue response
31 server response with the HTTP status 100 (Continue), 417 (Expectation Failed)
33 header. If this times out before a response is received, the request body is
H A DCURLOPT_FTP_SKIP_PASV_IP.md17 CURLOPT_FTP_SKIP_PASV_IP - ignore the IP address in the PASV response
30 address the server suggests in its 227-response to libcurl's PASV command when
33 number from the 227-response.
58 /* please ignore the IP in the PASV response */
H A DCURLOPT_SUPPRESS_CONNECT_HEADERS.md18 CURLOPT_SUPPRESS_CONNECT_HEADERS - suppress proxy CONNECT response headers
31 suppress proxy CONNECT response headers from the user callback functions
34 Proxy CONNECT response headers can complicate header processing since it is
57 However by enabling this option the CONNECT response headers are suppressed,
/curl/lib/
H A Dhttp_digest.c79 char *response; in Curl_output_digest() local
162 path, digest, &response, &len); in Curl_output_digest()
169 response); in Curl_output_digest()
170 free(response); in Curl_output_digest()
/curl/tests/server/
H A Dsocksd.c313 unsigned char response[256 + 16]; in socks4() local
342 response[1] = cd; /* result */ in socks4()
351 loghex(response, rc); in socks4()
366 unsigned char response[2*256 + 16]; in sockit() local
415 response[1] = config.responsemethod; in sockit()
422 loghex(response, rc); in sockit()
471 response[0] = 1; in sockit()
472 response[1] = login ? 0 : 1; in sockit()
479 loghex(response, rc); in sockit()
607 response[SOCKS5_REP] = rep; in sockit()
[all …]

Completed in 30 milliseconds

12345678910>>...12