/curl/lib/vauth/ |
H A D | ntlm_sspi.c | 55 SECURITY_STATUS status; in Curl_auth_is_ntlm_supported() local 62 if(status == SEC_E_OK) { in Curl_auth_is_ntlm_supported() 66 return (status == SEC_E_OK); in Curl_auth_is_ntlm_supported() 98 SECURITY_STATUS status; in Curl_auth_create_ntlm_type1_message() local 108 if(status != SEC_E_OK) { in Curl_auth_create_ntlm_type1_message() 149 if(status != SEC_E_OK) in Curl_auth_create_ntlm_type1_message() 181 else if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) in Curl_auth_create_ntlm_type1_message() 254 SECURITY_STATUS status; in Curl_auth_create_ntlm_type3_message() local 290 if(status == SEC_E_OK) { in Curl_auth_create_ntlm_type3_message() 316 if(status != SEC_E_OK) { in Curl_auth_create_ntlm_type3_message() [all …]
|
H A D | spnego_sspi.c | 57 SECURITY_STATUS status; in Curl_auth_is_spnego_supported() local 65 if(status == SEC_E_OK) { in Curl_auth_is_spnego_supported() 70 return (status == SEC_E_OK); in Curl_auth_is_spnego_supported() 134 if(nego->status != SEC_E_OK) { in Curl_auth_decode_spnego_message() 171 nego->status = (DWORD) in Curl_auth_decode_spnego_message() 177 if(nego->status != SEC_E_OK) in Curl_auth_decode_spnego_message() 226 if(nego->status == SEC_E_OK) { in Curl_auth_decode_spnego_message() 245 nego->status = in Curl_auth_decode_spnego_message() 259 if(GSS_ERROR(nego->status)) { in Curl_auth_decode_spnego_message() 274 if(GSS_ERROR(nego->status)) { in Curl_auth_decode_spnego_message() [all …]
|
H A D | digest_sspi.c | 60 SECURITY_STATUS status; in Curl_auth_is_digest_supported() local 63 status = in Curl_auth_is_digest_supported() 68 if(status == SEC_E_OK) { in Curl_auth_is_digest_supported() 112 SECURITY_STATUS status; in Curl_auth_create_digest_md5_message() local 123 status = in Curl_auth_create_digest_md5_message() 126 if(status != SEC_E_OK) { in Curl_auth_create_digest_md5_message() 171 if(status != SEC_E_OK) { in Curl_auth_create_digest_md5_message() 203 else if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) { in Curl_auth_create_digest_md5_message() 410 SECURITY_STATUS status; in Curl_auth_create_digest_http_message() local 415 status = in Curl_auth_create_digest_http_message() [all …]
|
H A D | krb5_sspi.c | 55 SECURITY_STATUS status; in Curl_auth_is_gssapi_supported() local 63 if(status == SEC_E_OK) { in Curl_auth_is_gssapi_supported() 67 return (status == SEC_E_OK); in Curl_auth_is_gssapi_supported() 108 SECURITY_STATUS status; in Curl_auth_create_gssapi_user_message() local 124 if(status != SEC_E_OK) { in Curl_auth_create_gssapi_user_message() 167 if(status != SEC_E_OK) in Curl_auth_create_gssapi_user_message() 214 if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) in Curl_auth_create_gssapi_user_message() 272 SECURITY_STATUS status; in Curl_auth_create_gssapi_security_message() local 292 if(status != SEC_E_OK) in Curl_auth_create_gssapi_security_message() 308 if(status != SEC_E_OK) { in Curl_auth_create_gssapi_security_message() [all …]
|
H A D | spnego_gssapi.c | 100 if(nego->context && nego->status == GSS_S_COMPLETE) { in Curl_auth_decode_spnego_message() 176 nego->status = major_status; in Curl_auth_decode_spnego_message() 284 nego->status = 0; in Curl_auth_cleanup_spnego()
|
/curl/docs/cmdline-opts/ |
H A D | doh-cert-status.md | 4 Long: doh-cert-status 5 Help: Verify DoH server cert status OCSP-staple 12 - --doh-cert-status --doh-url https://doh.example $URL 15 # `--doh-cert-status` 17 Same as --cert-status but used for DoH (DNS-over-HTTPS). 19 Verifies the status of the DoH servers' certificate by using the Certificate
|
H A D | cert-status.md | 4 Long: cert-status 7 Help: Verify server cert status OCSP-staple 13 - --cert-status $URL 16 # `--cert-status` 18 Verify the status of the server certificate by using the Certificate Status
|
/curl/lib/ |
H A D | hostasyn.c | 67 int status, in Curl_addrinfo_callback() argument 73 data->state.async.status = status; in Curl_addrinfo_callback() 75 if(CURL_ASYNC_SUCCESS == status) { in Curl_addrinfo_callback()
|
H A D | socks_sspi.c | 50 SECURITY_STATUS status, in check_sspi_err() argument 53 if(status != SEC_E_OK && in check_sspi_err() 54 status != SEC_I_COMPLETE_AND_CONTINUE && in check_sspi_err() 55 status != SEC_I_COMPLETE_NEEDED && in check_sspi_err() 56 status != SEC_I_CONTINUE_NEEDED) { in check_sspi_err() 76 SECURITY_STATUS status; in Curl_SOCKS5_gssapi_negotiate() local 142 status = Curl_pSecFn->AcquireCredentialsHandle(NULL, in Curl_SOCKS5_gssapi_negotiate() 253 if(status != SEC_I_CONTINUE_NEEDED) in Curl_SOCKS5_gssapi_negotiate() 434 status = Curl_pSecFn->EncryptMessage(&sspi_context, in Curl_SOCKS5_gssapi_negotiate() 438 if(check_sspi_err(data, status, "EncryptMessage")) { in Curl_SOCKS5_gssapi_negotiate() [all …]
|
H A D | asyn-ares.c | 176 int status; in Curl_resolver_init() local 198 if(status != ARES_SUCCESS) { in Curl_resolver_init() 199 if(status == ARES_ENOMEM) in Curl_resolver_init() 563 int status, in query_completed_cb() argument 576 if(ARES_EDESTRUCTION == status) in query_completed_cb() 585 if(CURL_ASYNC_SUCCESS == status) { in query_completed_cb() 593 res->last_status = status; in query_completed_cb() 608 && (status == ARES_SUCCESS || status == ARES_ENOTFOUND)) { in query_completed_cb() 733 static void addrinfo_cb(void *arg, int status, int timeouts, in addrinfo_cb() argument 739 if(ARES_SUCCESS == status) { in addrinfo_cb() [all …]
|
H A D | http_negotiate.c | 222 if(neg_ctx->status == GSS_S_COMPLETE || in Curl_output_negotiate() 223 neg_ctx->status == GSS_S_CONTINUE_NEEDED) { in Curl_output_negotiate() 228 if(neg_ctx->status == SEC_E_OK || in Curl_output_negotiate() 229 neg_ctx->status == SEC_I_CONTINUE_NEEDED) { in Curl_output_negotiate()
|
H A D | curl_gssapi.c | 95 static size_t display_gss_error(OM_uint32 status, int type, in display_gss_error() argument 104 status, in display_gss_error()
|
H A D | curl_rtmp.c | 284 static CURLcode rtmp_done(struct Curl_easy *data, CURLcode status, in rtmp_done() argument 288 (void)status; /* unused */ in rtmp_done() 320 if(r->m_read.status == RTMP_READ_COMPLETE || in rtmp_recv() 321 r->m_read.status == RTMP_READ_EOF) { in rtmp_recv()
|
/curl/packages/vms/ |
H A D | report_openssl_version.c | 77 int status; in main() local 92 status = LIB$SET_SYMBOL(&symbol_dsc, &value_dsc, &table_type); in main() 93 if(!$VMS_STATUS_SUCCESS(status)) { in main() 94 exit(status); in main()
|
H A D | curl_crtl_init.c | 113 int status; in sys_trnlnm() local 130 status = SYS$TRNLNM(&attr, &table_dsc, &name_dsc, 0, itlst); in sys_trnlnm() 132 if($VMS_STATUS_SUCCESS(status)) { in sys_trnlnm() 139 return status; in sys_trnlnm() 200 int status; in set_features() local 204 status = sys_trnlnm("GNV$UNIX_SHELL", in set_features() 206 if(!$VMS_STATUS_SUCCESS(status)) { in set_features()
|
H A D | backup_gnv_curl_src.com | 48 $ status = ss_abort 109 $ status = $status 125 $ status = $status
|
/curl/tests/libtest/ |
H A D | lib1156.c | 139 int status = 0; in test() local 159 status |= onetest(curl, URL, testparams + i, i); in test() 164 printf("%d\n", status); in test() 165 return (CURLcode)status; in test()
|
H A D | lib1960.c | 75 int status; in test() local 109 status = connect(client_fd, (struct sockaddr*)&serv_addr, sizeof(serv_addr)); in test() 110 if(status < 0) { in test()
|
H A D | stub_gssapi.h | 32 #define GSS_ERROR(status) (status & 0x80000000) argument
|
/curl/packages/OS400/ |
H A D | os400sys.c | 260 int status; in Curl_getnameinfo_a() local 279 if(!status) { in Curl_getnameinfo_a() 296 return status; in Curl_getnameinfo_a() 306 int status; in Curl_getaddrinfo_a() local 339 return status; in Curl_getaddrinfo_a() 588 int status; in Curl_ldap_search_s_a() local 593 status = LDAP_SUCCESS; in Curl_ldap_search_s_a() 600 status = LDAP_NO_MEMORY; in Curl_ldap_search_s_a() 612 status = LDAP_NO_MEMORY; in Curl_ldap_search_s_a() 642 if(status == LDAP_SUCCESS) in Curl_ldap_search_s_a() [all …]
|
/curl/.github/workflows/ |
H A D | appveyor-status.yml | 8 status 34 state: (.status | sub("queued"; "pending") 39 description: .status}' \
|
/curl/tests/http/clients/ |
H A D | h2-upgrade-extreme.c | 217 long status = 0; in main() local 220 curl_easy_getinfo(msg->easy_handle, CURLINFO_RESPONSE_CODE, &status); in main() 231 else if(status != 206) { in main() 233 ": wrong http status %ld (expected 206)\n", xfer_id, status); in main()
|
H A D | tls-session-reuse.c | 277 long status = 0; in main() local 280 curl_easy_getinfo(msg->easy_handle, CURLINFO_RESPONSE_CODE, &status); in main() 291 else if(status != 200) { in main() 293 ": wrong http status %ld (expected 200)\n", xfer_id, status); in main()
|
/curl/tests/http/testenv/mod_curltest/ |
H A D | mod_curltest.c | 237 r->status = 200; in curltest_echo_handler() 310 r->status != HTTP_OK || in curltest_echo_handler() 441 r->status = http_status; in curltest_tweak_handler() 591 r->status = 200; in curltest_put_handler() 620 r->status = 413; in curltest_put_handler() 637 if(r->status == 413) { in curltest_put_handler() 643 || r->status != HTTP_OK in curltest_put_handler() 681 r->status = 200; in curltest_1_1_required() 713 || r->status != HTTP_OK in curltest_1_1_required() 783 r->status = 200; in curltest_sslinfo_handler() [all …]
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_SSL_VERIFYSTATUS.md | 21 CURLOPT_SSL_VERIFYSTATUS - verify the certificate's status 35 This option determines whether libcurl verifies the status of the server cert
|