Home
last modified time | relevance | path

Searched refs:filter (Results 1 – 17 of 17) sorted by relevance

/curl/.github/scripts/
H A Dcmp-config.pl92 sub filter { subroutine
118 print O filter($d);
/curl/tests/data/
H A Dtest260023 connection filter connect/destroy unit tests
/curl/scripts/
H A Dcmakelint.sh50 --filter=-whitespace/indent,-convention/filename,-package/stdargs
H A Dcontributors.sh78 sed -f ./docs/THANKS-filter | \
H A Dcontrithanks.sh71 sed -f ./docs/THANKS-filter | \
/curl/docs/cmdline-opts/
H A Drequest-target.md25 filter or other safe guards. That includes white space and control characters.
H A Drequest.md23 filter or other safe guards. That includes white space and control characters.
H A Dheader.md44 you. curl passes on the verbatim string you give it without any filter or
/curl/tests/
H A Dprocesshelp.pm139 my $filter = "PID eq $pid";
141 my $result = `tasklist -fi \"$filter\" 2>nul`;
/curl/docs/libcurl/opts/
H A DCURLOPT_REQUEST_TARGET.md34 libcurl passes on the verbatim string in its request without any filter or
H A DCURLOPT_CUSTOMREQUEST.md41 libcurl passes on the verbatim string in its request without any filter or
H A DCURLOPT_HTTPHEADER.md58 strings you give it, without any filter or other safe guards. That includes
/curl/packages/OS400/
H A Dos400sys.c580 Curl_ldap_search_s_a(void *ld, char *base, int scope, char *filter, in Curl_ldap_search_s_a() argument
607 if(filter && status == LDAP_SUCCESS) { in Curl_ldap_search_s_a()
608 i = strlen(filter); in Curl_ldap_search_s_a()
614 QadrtConvertA2E(efilter, filter, i, i); in Curl_ldap_search_s_a()
/curl/lib/
H A Dldap.c1023 char *filter = p; in _ldap_url_parse2() local
1027 LDAP_TRACE(("filter '%s'\n", filter)); in _ldap_url_parse2()
1030 result = Curl_urldecode(filter, 0, &unescaped, NULL, REJECT_ZERO); in _ldap_url_parse2()
/curl/m4/
H A Dcurl-wolfssl.m4150 dnl if this symbol is present, we can make use of BIO filter chains
/curl/docs/libcurl/
H A Dlibcurl-security.md188 Some users might be tempted to filter access to local resources or similar
200 somehow by an attacker would all bypass a naive filter and could allow access
268 When first realizing this, the curl team tried to filter out such attempts in
318 Maybe just let the user provide data for parts of it? Or maybe filter input to
/curl/.github/
H A Dlabeler.yml424 docs/THANKS-filter,\

Completed in 20 milliseconds