/curl/tests/ |
H A D | dictserver.py | 138 handler = ClosingFileHandler(options.logfile) 139 handler.setFormatter(formatter) 140 handler.setLevel(logging.DEBUG) 141 root_logger.addHandler(handler)
|
H A D | negtelnetserver.py | 321 handler = ClosingFileHandler(options.logfile) 322 handler.setFormatter(formatter) 323 handler.setLevel(logging.DEBUG) 324 root_logger.addHandler(handler)
|
H A D | smbserver.py | 413 handler = ClosingFileHandler(options.logfile) 414 handler.setFormatter(formatter) 415 handler.setLevel(logging.DEBUG) 416 root_logger.addHandler(handler)
|
/curl/lib/ |
H A D | url.c | 821 if(conn->handler->connection_check) { in Curl_conn_upkeep() 961 if((needle->handler->flags&PROTOPT_SSL) != in url_match_conn() 962 (conn->handler->flags&PROTOPT_SSL)) in url_match_conn() 964 if(get_protocol_family(conn->handler) != in url_match_conn() 1076 if((needle->handler->flags&PROTOPT_SSL) in url_match_conn() 1083 if(!strcasecompare(needle->handler->scheme, conn->handler->scheme) && in url_match_conn() 1084 (get_protocol_family(conn->handler) != in url_match_conn() 1640 conn->handler = conn->given = p; in findprotocol() 1994 p = conn->handler; 3529 DEBUGASSERT(conn->handler->connect_it); [all …]
|
H A D | transfer.c | 121 if(conn->handler->protocol&PROTO_FAMILY_FTP) in data_pending() 126 return conn->handler->protocol&(CURLPROTO_SCP|CURLPROTO_SFTP) || in data_pending() 717 !(conn->handler->protocol&(PROTO_FAMILY_HTTP|CURLPROTO_RTSP))) in Curl_retry_request() 722 (!data->req.no_body || (conn->handler->protocol & PROTO_FAMILY_HTTP)) in Curl_retry_request() 874 if(data->conn->handler->write_resp) { in Curl_xfer_write_resp() 877 result = data->conn->handler->write_resp(data, buf, blen, is_eos); in Curl_xfer_write_resp() 903 if(data->conn->handler->write_resp_hd) { in Curl_xfer_write_resp_hd() 906 return data->conn->handler->write_resp_hd(data, hd0, hdlen, is_eos); in Curl_xfer_write_resp_hd()
|
H A D | multi.c | 730 if(conn->handler->done) in multi_done() 952 if(conn->handler && conn->handler->attach) in Curl_attach_connection() 980 if(conn->handler->proto_getsock) in protocol_getsock() 996 if(conn->handler->domore_getsock) in domore_getsock() 1011 if(conn->handler->doing_getsock) in doing_getsock() 1640 DEBUGASSERT(conn->handler); 1642 if(conn->handler->do_it) 1664 if(conn->handler->do_more) 1753 if(conn && conn->handler->doing) { 1786 if(!conn->handler->connecting) [all …]
|
H A D | http_negotiate.c | 112 if(conn->handler->flags & PROTOPT_SSL) { in Curl_input_negotiate()
|
H A D | http.c | 1699 data->state.first_remote_protocol = conn->handler->protocol; in Curl_http_host() 2259 conn->handler->protocol&(CURLPROTO_HTTPS|CURLPROTO_WSS) || in Curl_http_cookies() 2686 if(!(conn->handler->flags&PROTOPT_SSL) && in Curl_http() 2792 if(conn->handler->protocol & CURLPROTO_RTSP) in checkprotoprefix() 2832 ((data->conn->handler->flags & PROTOPT_SSL) || in Curl_http_header() 3082 conn->handler->protocol&(CURLPROTO_HTTPS|CURLPROTO_WSS) || in Curl_http_header() 3098 ((conn->handler->flags & PROTOPT_SSL) || in Curl_http_header() 3170 if(conn->handler->protocol & CURLPROTO_RTSP) { in Curl_http_header() 3492 !(conn->handler->protocol & CURLPROTO_RTSP) && in http_on_response() 3708 if(data->conn->handler->protocol & PROTO_FAMILY_HTTP) { in http_rw_hd() [all …]
|
H A D | connect.c | 970 if(cf->conn->handler->protocol & PROTO_FAMILY_SSH) in cf_he_connect() 1331 && cf->conn->handler->flags & PROTOPT_SSL)) /* we want SSL */ in cf_setup_connect() 1486 DEBUGASSERT(conn->handler); in Curl_conn_setup() 1490 conn->handler->protocol == CURLPROTO_HTTPS) { in Curl_conn_setup()
|
H A D | conncache.c | 837 if(conn->handler && conn->handler->disconnect) { in cpool_run_conn_shutdown_handler() 843 conn->handler->disconnect(data, conn, conn->bits.aborted); in cpool_run_conn_shutdown_handler()
|
H A D | cw-out.c | 229 if(data->conn && data->conn->handler->flags & PROTOPT_NONETWORK) { in cw_out_ptr_flush()
|
H A D | headers.c | 384 if(data->conn && (data->conn->handler->protocol & PROTO_FAMILY_HTTP)) { in Curl_headers_init()
|
H A D | cf-h1-proxy.c | 117 if(cf->conn->handler->flags & PROTOPT_NOTCPPROXY) { in tunnel_init() 118 failf(data, "%s cannot be done over CONNECT", cf->conn->handler->scheme); in tunnel_init()
|
H A D | openldap.c | 540 conn->handler->scheme, in oldap_connect() 574 if(conn->handler->flags & PROTOPT_SSL) in oldap_connect()
|
/curl/lib/vssh/ |
H A D | curl_path.c | 56 if((data->conn->handler->protocol & CURLPROTO_SCP) && in Curl_getworkingpath() 64 else if((data->conn->handler->protocol & CURLPROTO_SFTP) && in Curl_getworkingpath()
|
H A D | wolfssh.c | 381 if(conn->handler->protocol & CURLPROTO_SCP) { in wssh_connect() 423 if(conn->handler->protocol & CURLPROTO_SCP) in wssh_connect() 980 if(conn->handler->protocol & CURLPROTO_SCP) in wssh_do()
|
/curl/lib/vauth/ |
H A D | vauth.c | 161 (data->state.first_remote_protocol == conn->handler->protocol))); in Curl_auth_allowed_to_host()
|
/curl/tests/http/testenv/mod_curltest/ |
H A D | mod_curltest.c | 194 if(strcmp(r->handler, "curltest-echo")) { in curltest_echo_handler() 339 if(strcmp(r->handler, "curltest-tweak")) { in curltest_tweak_handler() 545 if(strcmp(r->handler, "curltest-put")) { in curltest_put_handler() 670 if(strcmp(r->handler, "curltest-1_1-required")) { in curltest_1_1_required() 748 if(strcmp(r->handler, "curltest-sslinfo")) { in curltest_sslinfo_handler()
|
/curl/docs/libcurl/ |
H A D | curl_multi_remove_handle.md | 45 state of it and the internal protocol handler deem it necessary. Otherwise
|
H A D | libcurl-thread.md | 82 the former signal handler while another thread should still ignore it.
|
/curl/tests/server/ |
H A D | util.c | 677 static SIGHANDLER_T set_signal(int signum, SIGHANDLER_T handler, in set_signal() argument 684 sa.sa_handler = handler; in set_signal() 694 SIGHANDLER_T oldhdlr = signal(signum, handler); in set_signal()
|
H A D | tftpd.c | 252 static void mysignal(int sig, void (*handler)(int)); 269 static void mysignal(int sig, void (*handler)(int)) in mysignal() 273 sa.sa_handler = handler; in mysignal()
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_INTERLEAVEFUNCTION.md | 51 request, (e.g. *CURL_RTSPREQ_PAUSE*) then the response handler processes
|
H A D | CURLOPT_HTTPAUTH.md | 99 unconditionally call wait() in its SIGCHLD signal handler to avoid being
|
/curl/lib/vquic/ |
H A D | vquic.c | 711 return ((conn->handler->protocol & PROTO_FAMILY_HTTP) && in Curl_conn_is_http3() 723 if(!(conn->handler->flags & PROTOPT_SSL)) { in Curl_conn_may_http3()
|