Searched refs:passed (Results 76 – 100 of 158) sorted by relevance
1234567
23 # Authorization: Digest line passed-in from the client
16 Authorization: NTLM line passed-in from the client -->
22 # Authorization: Digest line passed-in from the client
25 # Authorization: NTLM line passed-in from the client
26 # Authorization: Digest line passed-in from the client
35 # Authorization: NTLM line passed-in from the client
30 # Authorization: line passed-in from the client
33 sockets, however it should be stressed that the path passed to this function
33 *pointer* is passed in to the respective callback.
17 CURLOPT_WRITEDATA - pointer passed to the write callback
30 libcurl what the expected size of the input file is. This value must be passed
69 sixty seconds passed since the previous connection */
35 just passed through the proxy. Proxies tend to white-list specific port numbers
68 int hostkeycb(void *clientp, /* passed with CURLOPT_SSH_HOSTKEYDATA */
30 buffer in libcurl. It makes libcurl uses a larger buffer that gets passed to
27 a separator and a content specification. The \<data\> part can be passed to
638 curl_off_t passed = 0; in wssh_statemach_act() local648 (data->state.resume_from - passed > in wssh_statemach_act()650 sizeof(scratch) : curlx_sotouz(data->state.resume_from - passed); in wssh_statemach_act()659 passed += actuallyread; in wssh_statemach_act()666 } while(passed < data->state.resume_from); in wssh_statemach_act()
783 curl_off_t passed = 0; in cr_in_resume_from() local793 (offset - passed > (curl_off_t)sizeof(scratch)) ? in cr_in_resume_from()795 curlx_sotouz(offset - passed); in cr_in_resume_from()803 passed += actuallyread; in cr_in_resume_from()808 " bytes from the input", passed); in cr_in_resume_from()811 } while(passed < offset); in cr_in_resume_from()
51 The caller of curl_easy_escape(3) must make sure that the data passed in
54 CURLOT_CBPTR, /* (void * passed as-is to a callback) */
Completed in 49 milliseconds