Home
last modified time | relevance | path

Searched refs:status (Results 1 – 25 of 89) sorted by relevance

1234

/curl/lib/vauth/
H A Dntlm_sspi.c55 SECURITY_STATUS status; in Curl_auth_is_ntlm_supported() local
62 if(status == SEC_E_OK) { in Curl_auth_is_ntlm_supported()
66 return (status == SEC_E_OK); in Curl_auth_is_ntlm_supported()
98 SECURITY_STATUS status; in Curl_auth_create_ntlm_type1_message() local
108 if(status != SEC_E_OK) { in Curl_auth_create_ntlm_type1_message()
149 if(status != SEC_E_OK) in Curl_auth_create_ntlm_type1_message()
181 else if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) in Curl_auth_create_ntlm_type1_message()
254 SECURITY_STATUS status; in Curl_auth_create_ntlm_type3_message() local
290 if(status == SEC_E_OK) { in Curl_auth_create_ntlm_type3_message()
316 if(status != SEC_E_OK) { in Curl_auth_create_ntlm_type3_message()
[all …]
H A Dspnego_sspi.c57 SECURITY_STATUS status; in Curl_auth_is_spnego_supported() local
65 if(status == SEC_E_OK) { in Curl_auth_is_spnego_supported()
70 return (status == SEC_E_OK); in Curl_auth_is_spnego_supported()
134 if(nego->status != SEC_E_OK) { in Curl_auth_decode_spnego_message()
171 nego->status = (DWORD) in Curl_auth_decode_spnego_message()
177 if(nego->status != SEC_E_OK) in Curl_auth_decode_spnego_message()
226 if(nego->status == SEC_E_OK) { in Curl_auth_decode_spnego_message()
245 nego->status = in Curl_auth_decode_spnego_message()
259 if(GSS_ERROR(nego->status)) { in Curl_auth_decode_spnego_message()
274 if(GSS_ERROR(nego->status)) { in Curl_auth_decode_spnego_message()
[all …]
H A Ddigest_sspi.c60 SECURITY_STATUS status; in Curl_auth_is_digest_supported() local
63 status = in Curl_auth_is_digest_supported()
68 if(status == SEC_E_OK) { in Curl_auth_is_digest_supported()
112 SECURITY_STATUS status; in Curl_auth_create_digest_md5_message() local
123 status = in Curl_auth_create_digest_md5_message()
126 if(status != SEC_E_OK) { in Curl_auth_create_digest_md5_message()
171 if(status != SEC_E_OK) { in Curl_auth_create_digest_md5_message()
203 else if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) { in Curl_auth_create_digest_md5_message()
410 SECURITY_STATUS status; in Curl_auth_create_digest_http_message() local
415 status = in Curl_auth_create_digest_http_message()
[all …]
H A Dkrb5_sspi.c55 SECURITY_STATUS status; in Curl_auth_is_gssapi_supported() local
63 if(status == SEC_E_OK) { in Curl_auth_is_gssapi_supported()
67 return (status == SEC_E_OK); in Curl_auth_is_gssapi_supported()
108 SECURITY_STATUS status; in Curl_auth_create_gssapi_user_message() local
124 if(status != SEC_E_OK) { in Curl_auth_create_gssapi_user_message()
167 if(status != SEC_E_OK) in Curl_auth_create_gssapi_user_message()
214 if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) in Curl_auth_create_gssapi_user_message()
272 SECURITY_STATUS status; in Curl_auth_create_gssapi_security_message() local
292 if(status != SEC_E_OK) in Curl_auth_create_gssapi_security_message()
308 if(status != SEC_E_OK) { in Curl_auth_create_gssapi_security_message()
[all …]
H A Dspnego_gssapi.c100 if(nego->context && nego->status == GSS_S_COMPLETE) { in Curl_auth_decode_spnego_message()
176 nego->status = major_status; in Curl_auth_decode_spnego_message()
284 nego->status = 0; in Curl_auth_cleanup_spnego()
/curl/docs/cmdline-opts/
H A Ddoh-cert-status.md4 Long: doh-cert-status
5 Help: Verify DoH server cert status OCSP-staple
12 - --doh-cert-status --doh-url https://doh.example $URL
15 # `--doh-cert-status`
17 Same as --cert-status but used for DoH (DNS-over-HTTPS).
19 Verifies the status of the DoH servers' certificate by using the Certificate
H A Dcert-status.md4 Long: cert-status
7 Help: Verify server cert status OCSP-staple
13 - --cert-status $URL
16 # `--cert-status`
18 Verify the status of the server certificate by using the Certificate Status
/curl/lib/
H A Dhostasyn.c67 int status, in Curl_addrinfo_callback() argument
73 data->state.async.status = status; in Curl_addrinfo_callback()
75 if(CURL_ASYNC_SUCCESS == status) { in Curl_addrinfo_callback()
H A Dsocks_sspi.c50 SECURITY_STATUS status, in check_sspi_err() argument
53 if(status != SEC_E_OK && in check_sspi_err()
54 status != SEC_I_COMPLETE_AND_CONTINUE && in check_sspi_err()
55 status != SEC_I_COMPLETE_NEEDED && in check_sspi_err()
56 status != SEC_I_CONTINUE_NEEDED) { in check_sspi_err()
76 SECURITY_STATUS status; in Curl_SOCKS5_gssapi_negotiate() local
142 status = Curl_pSecFn->AcquireCredentialsHandle(NULL, in Curl_SOCKS5_gssapi_negotiate()
253 if(status != SEC_I_CONTINUE_NEEDED) in Curl_SOCKS5_gssapi_negotiate()
434 status = Curl_pSecFn->EncryptMessage(&sspi_context, in Curl_SOCKS5_gssapi_negotiate()
438 if(check_sspi_err(data, status, "EncryptMessage")) { in Curl_SOCKS5_gssapi_negotiate()
[all …]
H A Dasyn-ares.c176 int status; in Curl_resolver_init() local
198 if(status != ARES_SUCCESS) { in Curl_resolver_init()
199 if(status == ARES_ENOMEM) in Curl_resolver_init()
563 int status, in query_completed_cb() argument
576 if(ARES_EDESTRUCTION == status) in query_completed_cb()
585 if(CURL_ASYNC_SUCCESS == status) { in query_completed_cb()
593 res->last_status = status; in query_completed_cb()
608 && (status == ARES_SUCCESS || status == ARES_ENOTFOUND)) { in query_completed_cb()
733 static void addrinfo_cb(void *arg, int status, int timeouts, in addrinfo_cb() argument
739 if(ARES_SUCCESS == status) { in addrinfo_cb()
[all …]
H A Dhttp_negotiate.c222 if(neg_ctx->status == GSS_S_COMPLETE || in Curl_output_negotiate()
223 neg_ctx->status == GSS_S_CONTINUE_NEEDED) { in Curl_output_negotiate()
228 if(neg_ctx->status == SEC_E_OK || in Curl_output_negotiate()
229 neg_ctx->status == SEC_I_CONTINUE_NEEDED) { in Curl_output_negotiate()
H A Dcurl_gssapi.c95 static size_t display_gss_error(OM_uint32 status, int type, in display_gss_error() argument
104 status, in display_gss_error()
H A Dcurl_rtmp.c284 static CURLcode rtmp_done(struct Curl_easy *data, CURLcode status, in rtmp_done() argument
288 (void)status; /* unused */ in rtmp_done()
320 if(r->m_read.status == RTMP_READ_COMPLETE || in rtmp_recv()
321 r->m_read.status == RTMP_READ_EOF) { in rtmp_recv()
/curl/packages/vms/
H A Dreport_openssl_version.c77 int status; in main() local
92 status = LIB$SET_SYMBOL(&symbol_dsc, &value_dsc, &table_type); in main()
93 if(!$VMS_STATUS_SUCCESS(status)) { in main()
94 exit(status); in main()
H A Dcurl_crtl_init.c113 int status; in sys_trnlnm() local
130 status = SYS$TRNLNM(&attr, &table_dsc, &name_dsc, 0, itlst); in sys_trnlnm()
132 if($VMS_STATUS_SUCCESS(status)) { in sys_trnlnm()
139 return status; in sys_trnlnm()
200 int status; in set_features() local
204 status = sys_trnlnm("GNV$UNIX_SHELL", in set_features()
206 if(!$VMS_STATUS_SUCCESS(status)) { in set_features()
H A Dbackup_gnv_curl_src.com48 $ status = ss_abort
109 $ status = $status
125 $ status = $status
/curl/tests/libtest/
H A Dlib1156.c139 int status = 0; in test() local
159 status |= onetest(curl, URL, testparams + i, i); in test()
164 printf("%d\n", status); in test()
165 return (CURLcode)status; in test()
H A Dlib1960.c75 int status; in test() local
109 status = connect(client_fd, (struct sockaddr*)&serv_addr, sizeof(serv_addr)); in test()
110 if(status < 0) { in test()
H A Dstub_gssapi.h32 #define GSS_ERROR(status) (status & 0x80000000) argument
/curl/packages/OS400/
H A Dos400sys.c260 int status; in Curl_getnameinfo_a() local
279 if(!status) { in Curl_getnameinfo_a()
296 return status; in Curl_getnameinfo_a()
306 int status; in Curl_getaddrinfo_a() local
339 return status; in Curl_getaddrinfo_a()
588 int status; in Curl_ldap_search_s_a() local
593 status = LDAP_SUCCESS; in Curl_ldap_search_s_a()
600 status = LDAP_NO_MEMORY; in Curl_ldap_search_s_a()
612 status = LDAP_NO_MEMORY; in Curl_ldap_search_s_a()
642 if(status == LDAP_SUCCESS) in Curl_ldap_search_s_a()
[all …]
/curl/.github/workflows/
H A Dappveyor-status.yml8 status
34 state: (.status | sub("queued"; "pending")
39 description: .status}' \
/curl/tests/http/clients/
H A Dh2-upgrade-extreme.c217 long status = 0; in main() local
220 curl_easy_getinfo(msg->easy_handle, CURLINFO_RESPONSE_CODE, &status); in main()
231 else if(status != 206) { in main()
233 ": wrong http status %ld (expected 206)\n", xfer_id, status); in main()
H A Dtls-session-reuse.c277 long status = 0; in main() local
280 curl_easy_getinfo(msg->easy_handle, CURLINFO_RESPONSE_CODE, &status); in main()
291 else if(status != 200) { in main()
293 ": wrong http status %ld (expected 200)\n", xfer_id, status); in main()
/curl/tests/http/testenv/mod_curltest/
H A Dmod_curltest.c237 r->status = 200; in curltest_echo_handler()
310 r->status != HTTP_OK || in curltest_echo_handler()
441 r->status = http_status; in curltest_tweak_handler()
591 r->status = 200; in curltest_put_handler()
620 r->status = 413; in curltest_put_handler()
637 if(r->status == 413) { in curltest_put_handler()
643 || r->status != HTTP_OK in curltest_put_handler()
681 r->status = 200; in curltest_1_1_required()
713 || r->status != HTTP_OK in curltest_1_1_required()
783 r->status = 200; in curltest_sslinfo_handler()
[all …]
/curl/docs/libcurl/opts/
H A DCURLOPT_SSL_VERIFYSTATUS.md21 CURLOPT_SSL_VERIFYSTATUS - verify the certificate's status
35 This option determines whether libcurl verifies the status of the server cert

Completed in 51 milliseconds

1234