/curl/lib/vauth/ |
H A D | cram.c | 67 char *response; in Curl_auth_create_cram_md5_message() local 85 response = aprintf( in Curl_auth_create_cram_md5_message() 90 if(!response) in Curl_auth_create_cram_md5_message() 93 Curl_bufref_set(out, response, strlen(response), curl_free); in Curl_auth_create_cram_md5_message()
|
H A D | digest.c | 482 if(!response) in Curl_auth_create_digest_md5_message() 486 Curl_bufref_set(out, response, strlen(response), curl_free); in Curl_auth_create_digest_md5_message() 903 if(!response) in auth_create_digest_http_message() 912 free(response); in auth_create_digest_http_message() 916 free(response); in auth_create_digest_http_message() 921 response = tmp; in auth_create_digest_http_message() 927 free(response); in auth_create_digest_http_message() 931 response = tmp; in auth_create_digest_http_message() 937 free(response); in auth_create_digest_http_message() 941 response = tmp; in auth_create_digest_http_message() [all …]
|
H A D | gsasl.c | 104 char *response; in Curl_auth_gsasl_token() local 109 &response, &outlen); in Curl_auth_gsasl_token() 115 Curl_bufref_set(out, response, outlen, gsasl_free); in Curl_auth_gsasl_token()
|
/curl/docs/cmdline-opts/ |
H A D | fail.md | 21 Fail with error code 22 and with no response body output at all for HTTP 22 transfers returning HTTP response codes at 400 or greater. 26 HTTP response code. This command line option prevents curl from outputting 28 consider HTTP response codes to indicate failure. 34 response codes slip through, especially when authentication is involved 35 (response codes 401 and 407).
|
H A D | http0.9.md | 21 Accept an HTTP version 0.9 response. 23 HTTP/0.9 is a response without headers and therefore you can also connect with 24 this to non-HTTP servers and still get a response since curl simply
|
H A D | show-headers.md | 6 Help: Show response headers in output 20 Show response headers in the output. HTTP response headers can include things 24 This option makes the response headers get saved in the same stream/output as
|
H A D | cert-status.md | 22 response, if the response suggests that the server certificate has been 23 revoked, or no response at all is received, the verification fails.
|
H A D | sasl-ir.md | 5 Help: Initial response in SASL authentication 17 Enable initial response in SASL authentication.
|
H A D | doh-cert-status.md | 23 response, if the response suggests that the server certificate has been 24 revoked, or no response at all is received, the verification fails.
|
H A D | location.md | 21 location (indicated with a Location: header and a 3XX response code), this 33 following request with a GET if the HTTP response was 301, 302, or 303. If the 34 response code was any other 3xx code, curl resends the following request using 37 You can tell curl to not change POST requests to GET after a 30x response by
|
H A D | retry.md | 21 a timeout, an FTP 4xx response code or an HTTP 408, 429, 500, 502, 503 or 504 22 response code. 30 curl complies with the Retry-After: response header if one was present to know
|
/curl/tests/data/ |
H A D | test1003 | 6 huge response 14 # a ~17000 bytes response string to CWD to make sure the ftp parser deals 27 FTP with excessively large server command response line
|
H A D | test2027 | 17 first 401 response (as the data400 gives). libcurl will instead consider the 18 new response just as a duplicate and it sends another and detects the auth 19 problem on the second 401 response! 202 …rname="testuser", realm="testrealm", nonce="1", uri="/%TESTNUMBER0100", response="f7fd60eefaff5225… 207 …rname="testuser", realm="testrealm", nonce="2", uri="/%TESTNUMBER0200", response="785ca3ef511999f7… 216 …rname="testuser", realm="testrealm", nonce="4", uri="/%TESTNUMBER0300", response="4c735d2360fd6848… 221 …rname="testuser", realm="testrealm", nonce="5", uri="/%TESTNUMBER0400", response="f5906785511fb60a… 226 …rname="testuser", realm="testrealm", nonce="5", uri="/%TESTNUMBER0400", response="f5906785511fb60a… 231 …rname="testuser", realm="testrealm", nonce="7", uri="/%TESTNUMBER0500", response="8ef4d935fd964a46…
|
H A D | test1480 | 30 HTTP Continue response without final response
|
H A D | test1115 | 5 HTTP 1xx response code 33 HTTP GET with unexpected 1xx response
|
H A D | test1484 | 17 HEAD response with content 35 HTTP HEAD with response body to ignore
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_HTTP09_ALLOWED.md | 17 CURLOPT_HTTP09_ALLOWED - allow HTTP/0.9 response 31 An HTTP/0.9 response is a server response entirely without headers and only a 32 body. You can connect to lots of random TCP services and still get a response
|
H A D | CURLINFO_HTTP_CONNECTCODE.md | 18 CURLINFO_HTTP_CONNECTCODE - get the CONNECT response code 30 Pass a pointer to a long to receive the last received HTTP proxy response code 31 to a CONNECT request. The returned value is zero if no such response code was 53 printf("The CONNECT response code: %03ld\n", code);
|
H A D | CURLOPT_FAILONERROR.md | 18 CURLOPT_FAILONERROR - request failure on HTTP response \>= 400 35 response codes slip through, especially when authentication is involved 36 (response codes 401 and 407). 39 detected, like when a "100-continue" is received as a response to a POST/PUT 63 /* an HTTP response error problem */
|
H A D | CURLINFO_RESPONSE_CODE.md | 21 CURLINFO_RESPONSE_CODE - get the last response code 34 (OpenLDAP only) response code. This option was previously known as 36 no server response code has been received. 38 Note that a proxy's CONNECT response should be read with
|
H A D | CURLOPT_EXPECT_100_TIMEOUT_MS.md | 17 CURLOPT_EXPECT_100_TIMEOUT_MS - timeout for Expect: 100-continue response 31 server response with the HTTP status 100 (Continue), 417 (Expectation Failed) 33 header. If this times out before a response is received, the request body is
|
H A D | CURLOPT_FTP_SKIP_PASV_IP.md | 17 CURLOPT_FTP_SKIP_PASV_IP - ignore the IP address in the PASV response 30 address the server suggests in its 227-response to libcurl's PASV command when 33 number from the 227-response. 58 /* please ignore the IP in the PASV response */
|
H A D | CURLOPT_SUPPRESS_CONNECT_HEADERS.md | 18 CURLOPT_SUPPRESS_CONNECT_HEADERS - suppress proxy CONNECT response headers 31 suppress proxy CONNECT response headers from the user callback functions 34 Proxy CONNECT response headers can complicate header processing since it is 57 However by enabling this option the CONNECT response headers are suppressed,
|
/curl/lib/ |
H A D | http_digest.c | 79 char *response; in Curl_output_digest() local 162 path, digest, &response, &len); in Curl_output_digest() 169 response); in Curl_output_digest() 170 free(response); in Curl_output_digest()
|
/curl/tests/server/ |
H A D | socksd.c | 313 unsigned char response[256 + 16]; in socks4() local 342 response[1] = cd; /* result */ in socks4() 351 loghex(response, rc); in socks4() 366 unsigned char response[2*256 + 16]; in sockit() local 415 response[1] = config.responsemethod; in sockit() 422 loghex(response, rc); in sockit() 471 response[0] = 1; in sockit() 472 response[1] = login ? 0 : 1; in sockit() 479 loghex(response, rc); in sockit() 607 response[SOCKS5_REP] = rep; in sockit() [all …]
|