/curl/tests/unit/ |
H A D | unit1614.c | 42 bool match; member 48 bool match; member 135 bool match = Curl_cidr4_match(list4[i].a, list4[i].n, list4[i].bits); variable 136 if(match != list4[i].match) { 139 list4[i].match ? "": "not "); 145 bool match = Curl_cidr6_match(list6[i].a, list6[i].n, list6[i].bits); variable 146 if(match != list6[i].match) { 149 list6[i].match ? "": "not "); 155 bool match = Curl_check_noproxy(list[i].a, list[i].n); variable 156 if(match != list[i].match) { [all …]
|
H A D | unit1397.c | 42 bool match; member 102 if(tests[i].match != Curl_cert_hostcheck(tests[i].pattern, 112 tests[i].match ? "NOT ": "");
|
/curl/tests/http/ |
H A D | test_15_tracing.py | 59 m = re.match(r'^\[0-[0x]] .+', line) 72 m = re.match(r'^([0-9:.]+) \[0-[0x]] .+', line) 86 m = re.match(r'^([0-9:.]+) \[0-[0x]] .+', line) 89 m = re.match(r'^([0-9:.]+) \[0-[0x]] . \[TCP].+', line) 105 m = re.match(r'^\[0-[0x]] .+', line) 108 m = re.match(r'^\[0-[0x]] . \[TCP].+', line)
|
H A D | test_19_shutdown.py | 101 if re.match(r'.*CCACHE\] shutdown #\d+, done=1', line)] 124 if re.match(r'.*CCACHE\] shutdown #\d+, done=1', line)] 149 if re.match(r'.*CCACHE\] closing #\d+', line)] 153 if re.match(r'.*socket cb: socket \d+ REMOVED', line)] 174 if re.match(r'.*CCACHE\] shutdown #\d+, done=1', line)]
|
/curl/lib/vtls/ |
H A D | hostcheck.c | 127 bool Curl_cert_hostcheck(const char *match, size_t matchlen, in Curl_cert_hostcheck() argument 130 if(match && *match && hostname && *hostname) in Curl_cert_hostcheck() 131 return hostmatch(hostname, hostlen, match, matchlen); in Curl_cert_hostcheck()
|
/curl/lib/ |
H A D | noproxy.c | 177 bool match = FALSE; in Curl_check_noproxy() local 208 match = strncasecompare(token, name, namelen); in Curl_check_noproxy() 211 match = (name[namelen - tokenlen - 1] == '.') && in Curl_check_noproxy() 240 match = Curl_cidr6_match(name, check, bits); in Curl_check_noproxy() 242 match = Curl_cidr4_match(name, check, bits); in Curl_check_noproxy() 246 if(match) in Curl_check_noproxy()
|
H A D | strcase.c | 190 int match = 0; in Curl_timestrcmp() local 195 match |= a[i]^b[i]; in Curl_timestrcmp() 203 return match; in Curl_timestrcmp()
|
H A D | url.c | 1152 if(match->want_ntlm_http || match->want_proxy_ntlm_http) { in url_match_conn() 1157 match->found = conn; in url_match_conn() 1198 match->found = conn; in url_match_conn() 1206 if(match->found) { in url_match_result() 1209 Curl_attach_connection(match->data, match->found); in url_match_result() 1212 else if(match->seen_single_use_conn && !match->seen_multiplex_conn) { in url_match_result() 1218 else if(match->seen_pending_conn && match->data->set.pipewait) { in url_match_result() 1219 infof(match->data, in url_match_result() 1248 memset(&match, 0, sizeof(match)); in ConnectionExists() 1249 match.data = data; in ConnectionExists() [all …]
|
H A D | parsedate.c | 325 goto match; in match_time() 330 goto match; in match_time() 335 match: in match_time()
|
/curl/scripts/ |
H A D | schemetable.c | 117 int match = 0; in showtable() local 126 match = 1; in showtable() 131 if(!match) { in showtable()
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_CHUNK_END_FUNCTION.md | 17 CURLOPT_CHUNK_END_FUNCTION - callback after a transfer with FTP wildcard match 32 Pass a pointer to your callback function, which should match the prototype
|
H A D | CURLOPT_FNMATCH_FUNCTION.md | 18 CURLOPT_FNMATCH_FUNCTION - wildcard match callback 35 Pass a pointer to your callback function, which should match the prototype
|
H A D | CURLOPT_KRBLEVEL.md | 30 this also enables kerberos awareness. This is a string that should match one 32 string is set but does not match one of these, 'private' is used. Set the
|
H A D | CURLOPT_SSH_KEYFUNCTION.md | 36 CURLKHMATCH_OK, /* match */ 52 enum curl_khmatch match, 61 Pass a pointer to your callback function, which should match the prototype 125 enum curl_khmatch match,
|
H A D | CURLOPT_HTTP200ALIASES.md | 42 assumed to match HTTP 1.0 when an alias match.
|
/curl/tests/data/ |
H A D | test1912 | 19 Cross validate that gcc-typecheck macros match the option types.
|
H A D | test2048 | 26 pinnedpubkey no-match must fail even when insecure
|
H A D | test3000 | 35 HTTPS GET to localhost, first subject alt name matches, CN does not match
|
H A D | test3001 | 35 HTTPS GET to localhost, last subject alt name matches, CN does not match
|
H A D | test3023 | 35 HTTPS GET to localhost, first subject alt name matches, CN does not match (Schannel variant)
|
H A D | test3024 | 35 HTTPS GET to localhost, last subject alt name matches, CN does not match (Schannel variant)
|
/curl/docs/cmdline-opts/ |
H A D | interface.md | 26 Interface name. If the provided name does not match an existing interface, 38 If the provided name does not match an existing interface, curl returns with
|
H A D | noproxy.md | 22 example, `local.com` would match `local.com`, `local.com:80`, and 33 `192.168.0.0/16` would match all addresses starting with `192.168`.
|
H A D | hostpubmd5.md | 21 connection with the host unless the checksums match.
|
H A D | hostpubsha256.md | 20 public key. Curl refuses the connection with the host unless the hashes match.
|