/curl/lib/vauth/ |
H A D | cram.c | 67 char *response; in Curl_auth_create_cram_md5_message() local 85 response = aprintf( in Curl_auth_create_cram_md5_message() 90 if(!response) in Curl_auth_create_cram_md5_message() 93 Curl_bufref_set(out, response, strlen(response), curl_free); in Curl_auth_create_cram_md5_message()
|
H A D | digest.c | 482 if(!response) in Curl_auth_create_digest_md5_message() 486 Curl_bufref_set(out, response, strlen(response), curl_free); in Curl_auth_create_digest_md5_message() 903 if(!response) in auth_create_digest_http_message() 912 free(response); in auth_create_digest_http_message() 916 free(response); in auth_create_digest_http_message() 921 response = tmp; in auth_create_digest_http_message() 927 free(response); in auth_create_digest_http_message() 931 response = tmp; in auth_create_digest_http_message() 937 free(response); in auth_create_digest_http_message() 941 response = tmp; in auth_create_digest_http_message() [all …]
|
H A D | gsasl.c | 104 char *response; in Curl_auth_gsasl_token() local 109 &response, &outlen); in Curl_auth_gsasl_token() 115 Curl_bufref_set(out, response, outlen, gsasl_free); in Curl_auth_gsasl_token()
|
/curl/docs/cmdline-opts/ |
H A D | http0.9.md | 21 Accept an HTTP version 0.9 response. 23 HTTP/0.9 is a response without headers and therefore you can also connect with 24 this to non-HTTP servers and still get a response since curl simply
|
H A D | cert-status.md | 22 response, if the response suggests that the server certificate has been 23 revoked, or no response at all is received, the verification fails.
|
H A D | include.md | 6 Help: Include response headers in output 19 Include response headers in the output. HTTP response headers can include
|
H A D | sasl-ir.md | 5 Help: Initial response in SASL authentication 17 Enable initial response in SASL authentication.
|
H A D | doh-cert-status.md | 23 response, if the response suggests that the server certificate has been 24 revoked, or no response at all is received, the verification fails.
|
H A D | location.md | 21 location (indicated with a Location: header and a 3XX response code), this 32 following request with a GET if the HTTP response was 301, 302, or 303. If the 33 response code was any other 3xx code, curl resends the following request using 36 You can tell curl to not change POST requests to GET after a 30x response by
|
H A D | retry.md | 21 a timeout, an FTP 4xx response code or an HTTP 408, 429, 500, 502, 503 or 504 22 response code. 30 curl complies with the Retry-After: response header if one was present to know
|
H A D | retry-all-errors.md | 34 By default curl does not return error for transfers with an HTTP response code 37 not an error. When --retry is used then curl retries on some HTTP response 39 response codes such as 404. If you want to retry on all response codes that
|
/curl/tests/data/ |
H A D | test1003 | 6 huge response 14 # a ~17000 bytes response string to CWD to make sure the ftp parser deals 27 FTP with excessively large server command response line
|
H A D | test1480 | 30 HTTP Continue response without final response
|
H A D | test1115 | 5 HTTP 1xx response code 33 HTTP GET with unexpected 1xx response
|
H A D | test1484 | 17 HEAD response with content 35 HTTP HEAD with response body to ignore
|
H A D | test2027 | 17 first 401 response (as the data400 gives). libcurl will instead consider the 18 new response just as a duplicate and it sends another and detects the auth 19 problem on the second 401 response! 211 …rname="testuser", realm="testrealm", nonce="1", uri="/%TESTNUMBER0100", response="f7fd60eefaff5225… 216 …rname="testuser", realm="testrealm", nonce="2", uri="/%TESTNUMBER0200", response="785ca3ef511999f7… 225 …rname="testuser", realm="testrealm", nonce="4", uri="/%TESTNUMBER0300", response="4c735d2360fd6848… 230 …rname="testuser", realm="testrealm", nonce="5", uri="/%TESTNUMBER0400", response="f5906785511fb60a… 235 …rname="testuser", realm="testrealm", nonce="5", uri="/%TESTNUMBER0400", response="f5906785511fb60a… 240 …rname="testuser", realm="testrealm", nonce="7", uri="/%TESTNUMBER0500", response="8ef4d935fd964a46…
|
/curl/docs/libcurl/opts/ |
H A D | CURLINFO_HTTP_CONNECTCODE.md | 17 CURLINFO_HTTP_CONNECTCODE - get the CONNECT response code 29 Pass a pointer to a long to receive the last received HTTP proxy response code 30 to a CONNECT request. The returned value is zero if no such response code was 50 printf("The CONNECT response code: %03ld\n", code);
|
H A D | CURLOPT_HTTP09_ALLOWED.md | 16 CURLOPT_HTTP09_ALLOWED - allow HTTP/0.9 response 30 An HTTP/0.9 response is a server response entirely without headers and only a 31 body. You can connect to lots of random TCP services and still get a response
|
H A D | CURLOPT_FAILONERROR.md | 17 CURLOPT_FAILONERROR - request failure on HTTP response \>= 400 34 response codes slip through, especially when authentication is involved 35 (response codes 401 and 407). 38 detected, like when a "100-continue" is received as a response to a POST/PUT 60 /* an HTTP response error problem */
|
H A D | CURLINFO_RESPONSE_CODE.md | 20 CURLINFO_RESPONSE_CODE - get the last response code 33 (OpenLDAP only) response code. This option was previously known as 35 no server response code has been received. 37 Note that a proxy's CONNECT response should be read with
|
H A D | CURLOPT_EXPECT_100_TIMEOUT_MS.md | 16 CURLOPT_EXPECT_100_TIMEOUT_MS - timeout for Expect: 100-continue response 30 server response with the HTTP status 100 (Continue), 417 (Expectation Failed) 32 header. If this times out before a response is received, the request body is
|
H A D | CURLOPT_FTP_SKIP_PASV_IP.md | 16 CURLOPT_FTP_SKIP_PASV_IP - ignore the IP address in the PASV response 29 address the server suggests in its 227-response to libcurl's PASV command when 32 number from the 227-response. 55 /* please ignore the IP in the PASV response */
|
H A D | CURLOPT_SUPPRESS_CONNECT_HEADERS.md | 17 CURLOPT_SUPPRESS_CONNECT_HEADERS - suppress proxy CONNECT response headers 30 suppress proxy CONNECT response headers from the user callback functions 33 Proxy CONNECT response headers can complicate header processing since it is 56 However by enabling this option the CONNECT response headers are suppressed,
|
/curl/tests/server/ |
H A D | socksd.c | 316 unsigned char response[256 + 16]; in socks4() local 345 response[1] = cd; /* result */ in socks4() 354 loghex(response, rc); in socks4() 369 unsigned char response[2*256 + 16]; in sockit() local 418 response[1] = config.responsemethod; in sockit() 425 loghex(response, rc); in sockit() 474 response[0] = 1; in sockit() 475 response[1] = login ? 0 : 1; in sockit() 482 loghex(response, rc); in sockit() 610 response[SOCKS5_REP] = rep; in sockit() [all …]
|
/curl/lib/ |
H A D | http_digest.c | 79 char *response; in Curl_output_digest() local 162 path, digest, &response, &len); in Curl_output_digest() 169 response); in Curl_output_digest() 170 free(response); in Curl_output_digest()
|