/curl/lib/vauth/ |
H A D | ntlm_sspi.c | 55 SECURITY_STATUS status; in Curl_auth_is_ntlm_supported() local 62 if(status == SEC_E_OK) { in Curl_auth_is_ntlm_supported() 98 SECURITY_STATUS status; in Curl_auth_create_ntlm_type1_message() local 108 if(status != SEC_E_OK) { in Curl_auth_create_ntlm_type1_message() 149 if(status != SEC_E_OK) in Curl_auth_create_ntlm_type1_message() 176 if(status == SEC_I_COMPLETE_NEEDED || in Curl_auth_create_ntlm_type1_message() 181 else if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) in Curl_auth_create_ntlm_type1_message() 254 SECURITY_STATUS status; in Curl_auth_create_ntlm_type3_message() local 290 if(status == SEC_E_OK) { in Curl_auth_create_ntlm_type3_message() 316 if(status != SEC_E_OK) { in Curl_auth_create_ntlm_type3_message() [all …]
|
H A D | spnego_sspi.c | 57 SECURITY_STATUS status; in Curl_auth_is_spnego_supported() local 65 if(status == SEC_E_OK) { in Curl_auth_is_spnego_supported() 70 return (status == SEC_E_OK ? TRUE : FALSE); in Curl_auth_is_spnego_supported() 134 if(nego->status != SEC_E_OK) { in Curl_auth_decode_spnego_message() 171 nego->status = (DWORD) in Curl_auth_decode_spnego_message() 177 if(nego->status != SEC_E_OK) in Curl_auth_decode_spnego_message() 226 if(nego->status == SEC_E_OK) { in Curl_auth_decode_spnego_message() 259 if(GSS_ERROR(nego->status)) { in Curl_auth_decode_spnego_message() 270 if(nego->status == SEC_I_COMPLETE_NEEDED || in Curl_auth_decode_spnego_message() 274 if(GSS_ERROR(nego->status)) { in Curl_auth_decode_spnego_message() [all …]
|
H A D | krb5_sspi.c | 55 SECURITY_STATUS status; in Curl_auth_is_gssapi_supported() local 63 if(status == SEC_E_OK) { in Curl_auth_is_gssapi_supported() 108 SECURITY_STATUS status; in Curl_auth_create_gssapi_user_message() local 124 if(status != SEC_E_OK) { in Curl_auth_create_gssapi_user_message() 167 if(status != SEC_E_OK) in Curl_auth_create_gssapi_user_message() 211 if(status == SEC_E_INSUFFICIENT_MEMORY) in Curl_auth_create_gssapi_user_message() 214 if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) in Curl_auth_create_gssapi_user_message() 272 SECURITY_STATUS status; in Curl_auth_create_gssapi_security_message() local 292 if(status != SEC_E_OK) in Curl_auth_create_gssapi_security_message() 308 if(status != SEC_E_OK) { in Curl_auth_create_gssapi_security_message() [all …]
|
H A D | digest_sspi.c | 60 SECURITY_STATUS status; in Curl_auth_is_digest_supported() local 67 if(status == SEC_E_OK) { in Curl_auth_is_digest_supported() 111 SECURITY_STATUS status; in Curl_auth_create_digest_md5_message() local 124 if(status != SEC_E_OK) { in Curl_auth_create_digest_md5_message() 169 if(status != SEC_E_OK) { in Curl_auth_create_digest_md5_message() 201 else if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) { in Curl_auth_create_digest_md5_message() 408 SECURITY_STATUS status; in Curl_auth_create_digest_http_message() local 415 if(status != SEC_E_OK) { in Curl_auth_create_digest_http_message() 467 if(status == SEC_E_OK) in Curl_auth_create_digest_http_message() 471 (long)status); in Curl_auth_create_digest_http_message() [all …]
|
H A D | spnego_gssapi.c | 98 if(nego->context && nego->status == GSS_S_COMPLETE) { in Curl_auth_decode_spnego_message() 166 nego->status = major_status; in Curl_auth_decode_spnego_message() 274 nego->status = 0; in Curl_auth_cleanup_spnego()
|
/curl/docs/cmdline-opts/ |
H A D | doh-cert-status.md | 4 Long: doh-cert-status 5 Help: Verify DoH server cert status OCSP-staple 12 - --doh-cert-status --doh-url https://doh.example $URL 15 # `--doh-cert-status` 17 Same as --cert-status but used for DoH (DNS-over-HTTPS). 19 Verifies the status of the DoH servers' certificate by using the Certificate
|
H A D | cert-status.md | 4 Long: cert-status 7 Help: Verify server cert status OCSP-staple 13 - --cert-status $URL 16 # `--cert-status` 18 Verify the status of the server certificate by using the Certificate Status
|
/curl/lib/ |
H A D | hostasyn.c | 67 int status, in Curl_addrinfo_callback() argument 73 data->state.async.status = status; in Curl_addrinfo_callback() 75 if(CURL_ASYNC_SUCCESS == status) { in Curl_addrinfo_callback()
|
H A D | socks_sspi.c | 50 SECURITY_STATUS status, in check_sspi_err() argument 53 if(status != SEC_E_OK && in check_sspi_err() 54 status != SEC_I_COMPLETE_AND_CONTINUE && in check_sspi_err() 55 status != SEC_I_COMPLETE_NEEDED && in check_sspi_err() 56 status != SEC_I_CONTINUE_NEEDED) { in check_sspi_err() 76 SECURITY_STATUS status; in Curl_SOCKS5_gssapi_negotiate() local 142 status = s_pSecFn->AcquireCredentialsHandle(NULL, in Curl_SOCKS5_gssapi_negotiate() 252 if(status != SEC_I_CONTINUE_NEEDED) in Curl_SOCKS5_gssapi_negotiate() 432 status = s_pSecFn->EncryptMessage(&sspi_context, in Curl_SOCKS5_gssapi_negotiate() 436 if(check_sspi_err(data, status, "EncryptMessage")) { in Curl_SOCKS5_gssapi_negotiate() [all …]
|
H A D | asyn-ares.c | 176 int status; in Curl_resolver_init() local 198 if(status != ARES_SUCCESS) { in Curl_resolver_init() 199 if(status == ARES_ENOMEM) in Curl_resolver_init() 572 int status, in query_completed_cb() argument 585 if(ARES_EDESTRUCTION == status) in query_completed_cb() 594 if(CURL_ASYNC_SUCCESS == status) { in query_completed_cb() 602 res->last_status = status; in query_completed_cb() 617 && (status == ARES_SUCCESS || status == ARES_ENOTFOUND)) { in query_completed_cb() 742 static void addrinfo_cb(void *arg, int status, int timeouts, in addrinfo_cb() argument 748 if(ARES_SUCCESS == status) { in addrinfo_cb() [all …]
|
H A D | http_negotiate.c | 205 if(neg_ctx->status == GSS_S_COMPLETE || in Curl_output_negotiate() 206 neg_ctx->status == GSS_S_CONTINUE_NEEDED) { in Curl_output_negotiate() 211 if(neg_ctx->status == SEC_E_OK || in Curl_output_negotiate() 212 neg_ctx->status == SEC_I_CONTINUE_NEEDED) { in Curl_output_negotiate()
|
H A D | curl_gssapi.c | 95 static size_t display_gss_error(OM_uint32 status, int type, in display_gss_error() argument 104 status, in display_gss_error()
|
H A D | curl_rtmp.c | 284 static CURLcode rtmp_done(struct Curl_easy *data, CURLcode status, in rtmp_done() argument 288 (void)status; /* unused */ in rtmp_done() 320 if(r->m_read.status == RTMP_READ_COMPLETE || in rtmp_recv() 321 r->m_read.status == RTMP_READ_EOF) { in rtmp_recv()
|
/curl/packages/vms/ |
H A D | report_openssl_version.c | 78 int status; in main() local 93 status = LIB$SET_SYMBOL(&symbol_dsc, &value_dsc, &table_type); in main() 94 if(!$VMS_STATUS_SUCCESS(status)) { in main() 95 exit(status); in main()
|
H A D | curl_crtl_init.c | 114 int status; in sys_trnlnm() local 131 status = SYS$TRNLNM(&attr, &table_dsc, &name_dsc, 0, itlst); in sys_trnlnm() 133 if($VMS_STATUS_SUCCESS(status)) { in sys_trnlnm() 140 return status; in sys_trnlnm() 202 int status; in set_features() local 206 status = sys_trnlnm("GNV$UNIX_SHELL", in set_features() 208 if(!$VMS_STATUS_SUCCESS(status)) { in set_features()
|
H A D | backup_gnv_curl_src.com | 48 $ status = ss_abort 109 $ status = $status 125 $ status = $status
|
/curl/tests/libtest/ |
H A D | lib1156.c | 139 int status = 0; in test() local 159 status |= onetest(curl, URL, params + i, i); in test() 164 printf("%d\n", status); in test() 165 return (CURLcode)status; in test()
|
H A D | lib1960.c | 75 int status; in test() local 109 status = connect(client_fd, (struct sockaddr*)&serv_addr, sizeof(serv_addr)); in test() 110 if(status < 0) { in test()
|
H A D | stub_gssapi.h | 32 #define GSS_ERROR(status) (status & 0x80000000) argument
|
/curl/packages/OS400/ |
H A D | os400sys.c | 260 int status; in Curl_getnameinfo_a() local 279 if(!status) { in Curl_getnameinfo_a() 296 return status; in Curl_getnameinfo_a() 306 int status; in Curl_getaddrinfo_a() local 339 return status; in Curl_getaddrinfo_a() 588 int status; in Curl_ldap_search_s_a() local 593 status = LDAP_SUCCESS; in Curl_ldap_search_s_a() 600 status = LDAP_NO_MEMORY; in Curl_ldap_search_s_a() 612 status = LDAP_NO_MEMORY; in Curl_ldap_search_s_a() 642 if(status == LDAP_SUCCESS) in Curl_ldap_search_s_a() [all …]
|
/curl/.github/workflows/ |
H A D | appveyor-status.yml | 8 status 34 state: (.status | sub("queued"; "pending") 39 description: .status}' \
|
/curl/tests/http/clients/ |
H A D | h2-upgrade-extreme.c | 216 long status = 0; in main() local 219 curl_easy_getinfo(msg->easy_handle, CURLINFO_RESPONSE_CODE, &status); in main() 230 else if(status != 206) { in main() 232 ": wrong http status %ld (expected 206)\n", xfer_id, status); in main()
|
H A D | tls-session-reuse.c | 279 long status = 0; in main() local 282 curl_easy_getinfo(msg->easy_handle, CURLINFO_RESPONSE_CODE, &status); in main() 293 else if(status != 200) { in main() 295 ": wrong http status %ld (expected 200)\n", xfer_id, status); in main()
|
/curl/tests/http/testenv/mod_curltest/ |
H A D | mod_curltest.c | 235 r->status = 200; in curltest_echo_handler() 304 r->status != HTTP_OK || in curltest_echo_handler() 419 r->status = http_status; in curltest_tweak_handler() 472 r->status, c->aborted); in curltest_tweak_handler() 546 r->status = 200; in curltest_put_handler() 587 || r->status != HTTP_OK in curltest_put_handler() 625 r->status = 200; in curltest_1_1_required() 655 || r->status != HTTP_OK in curltest_1_1_required() 725 r->status = 200; in curltest_sslinfo_handler() 766 || r->status != HTTP_OK in curltest_sslinfo_handler()
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_SSL_VERIFYSTATUS.md | 20 CURLOPT_SSL_VERIFYSTATUS - verify the certificate's status 34 This option determines whether libcurl verifies the status of the server cert
|