Searched refs:valid (Results 1 – 25 of 103) sorted by relevance
12345
/curl/src/ |
H A D | tool_writeout.c | 158 bool valid = false; in writeTime() local 167 valid = true; in writeTime() 173 if(valid) { in writeTime() 403 if(valid) { in writeString() 433 valid = true; in writeLong() 439 valid = true; in writeLong() 443 valid = true; in writeLong() 447 valid = true; in writeLong() 461 if(valid) { in writeLong() 492 valid = true; in writeOffset() [all …]
|
/curl/lib/vauth/ |
H A D | vauth.c | 131 bool valid = FALSE; in Curl_auth_user_contains_domain() local 137 valid = (p != NULL && p > user && p < user + strlen(user) - 1 ? TRUE : in Curl_auth_user_contains_domain() 144 valid = TRUE; in Curl_auth_user_contains_domain() 147 return valid; in Curl_auth_user_contains_domain()
|
/curl/tests/data/ |
H A D | test606 | 19 …bkey %LOGDIR/server/curl_client_key.pub -u not-a-valid-user: sftp://%HOSTIP:%SSHPORT%SSH_PWD/not-a…
|
H A D | test607 | 19 …bkey %LOGDIR/server/curl_client_key.pub -u not-a-valid-user: scp://%HOSTIP:%SSHPORT%SSH_PWD/not-a-…
|
H A D | test649 | 33 …il-rcpt recipient@example.com --mail-from sender@example.com -F '=This is valid;encoder=7bit' -F "… 64 This is valid
|
H A D | test629 | 19 -u not-a-valid-user: scp://%HOSTIP:%SSHPORT%SSH_PWD/irrelevant-file --insecure
|
H A D | test628 | 19 -u not-a-valid-user: sftp://%HOSTIP:%SSHPORT%SSH_PWD/irrelevant-file --insecure
|
H A D | test113 | 21 FTP download, failed login: USER not valid
|
H A D | test604 | 19 …erver/curl_client_key.pub -u %USER: sftp://%HOSTIP:%SSHPORT%SSH_PWD/not-a-valid-file-moooo --insec…
|
H A D | test605 | 19 …server/curl_client_key.pub -u %USER: scp://%HOSTIP:%SSHPORT%SSH_PWD/not-a-valid-file-moooo --insec…
|
H A D | test114 | 21 FTP download, failed login: PASS not valid
|
H A D | test656 | 19 …erver/curl_client_key.pub -u %USER: sftp://%HOSTIP:%SSHPORT%SSH_PWD/not-a-valid-file-moooo --insec…
|
H A D | test1120 | 34 # Strip all valid kinds of PORT and EPRT that curl can send
|
H A D | test538 | 27 FTP multi-interface download, failed login: PASS not valid
|
H A D | test1063 | 28 # This range value is 2**32+7, which will be truncated to the valid value 7
|
H A D | test808 | 18 * OK [UIDVALIDITY 3857529045] UIDs valid
|
H A D | test620 | 19 …rl_client_key.pub -u %USER: sftp://%HOSTIP:%SSHPORT%SSH_PWD/%LOGDIR/not-a-valid-file-moooo sftp://…
|
H A D | test621 | 19 …url_client_key.pub -u %USER: scp://%HOSTIP:%SSHPORT%SSH_PWD/%LOGDIR/not-a-valid-file-moooo scp://%…
|
H A D | test2201 | 26 MQTT PUBLISH with user and password valid
|
/curl/scripts/ |
H A D | mk-ca-bundle.pl | 439 my $valid = 0; 468 $valid = 0; 510 $valid = 0; 513 $valid = 1; 519 elsif(!$valid) { 589 $valid = 0;
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_HTTP200ALIASES.md | 29 Pass a pointer to a linked list of *aliases* to be treated as valid HTTP 200 34 treated as a valid HTTP header line such as "HTTP/1.0 200 OK". 36 The linked list should be a fully valid list of struct curl_slist structs, and
|
H A D | CURLOPT_SSL_CIPHER_LIST.md | 45 For OpenSSL and GnuTLS valid examples of cipher lists include **RC4-SHA**, 49 For WolfSSL, valid examples of cipher lists include **ECDHE-RSA-RC4-SHA**, 52 For mbedTLS and BearSSL, valid examples of cipher lists include
|
H A D | CURLOPT_PROXY_SSL_CIPHER_LIST.md | 46 For OpenSSL and GnuTLS valid examples of cipher lists include **RC4-SHA**, 50 For WolfSSL, valid examples of cipher lists include **ECDHE-RSA-RC4-SHA**, 53 For mbedTLS and BearSSL, valid examples of cipher lists include
|
/curl/m4/ |
H A D | xc-translit.m4 | 44 dnl example [*+], [*], and [+] are valid 'extra' args. 68 dnl example [*+], [*], and [+] are valid 'extra' args. 100 dnl example [*+], [*], and [+] are valid 'extra' args. 130 dnl example [*+], [*], and [+] are valid 'extra' args.
|
/curl/docs/cmdline-opts/ |
H A D | ciphers.md | 22 specify valid ciphers. Read up on SSL cipher list details on this URL:
|
Completed in 40 milliseconds
12345