Home
last modified time | relevance | path

Searched refs:match (Results 1 – 25 of 100) sorted by relevance

1234

/curl/tests/unit/
H A Dunit1614.c42 bool match; member
48 bool match; member
135 bool match = Curl_cidr4_match(list4[i].a, list4[i].n, list4[i].bits); variable
136 if(match != list4[i].match) {
139 list4[i].match ? "": "not ");
145 bool match = Curl_cidr6_match(list6[i].a, list6[i].n, list6[i].bits); variable
146 if(match != list6[i].match) {
149 list6[i].match ? "": "not ");
155 bool match = Curl_check_noproxy(list[i].a, list[i].n); variable
156 if(match != list[i].match) {
[all …]
H A Dunit1397.c42 bool match; member
102 if(tests[i].match != Curl_cert_hostcheck(tests[i].pattern,
112 tests[i].match ? "NOT ": "");
/curl/tests/http/
H A Dtest_15_tracing.py59 m = re.match(r'^\[0-[0x]] .+', line)
72 m = re.match(r'^([0-9:.]+) \[0-[0x]] .+', line)
86 m = re.match(r'^([0-9:.]+) \[0-[0x]] .+', line)
89 m = re.match(r'^([0-9:.]+) \[0-[0x]] . \[TCP].+', line)
105 m = re.match(r'^\[0-[0x]] .+', line)
108 m = re.match(r'^\[0-[0x]] . \[TCP].+', line)
H A Dtest_19_shutdown.py101 if re.match(r'.*CCACHE\] shutdown #\d+, done=1', line)]
124 if re.match(r'.*CCACHE\] shutdown #\d+, done=1', line)]
149 if re.match(r'.*CCACHE\] closing #\d+', line)]
153 if re.match(r'.*socket cb: socket \d+ REMOVED', line)]
174 if re.match(r'.*CCACHE\] shutdown #\d+, done=1', line)]
/curl/lib/vtls/
H A Dhostcheck.c127 bool Curl_cert_hostcheck(const char *match, size_t matchlen, in Curl_cert_hostcheck() argument
130 if(match && *match && hostname && *hostname) in Curl_cert_hostcheck()
131 return hostmatch(hostname, hostlen, match, matchlen); in Curl_cert_hostcheck()
/curl/lib/
H A Dnoproxy.c177 bool match = FALSE; in Curl_check_noproxy() local
208 match = strncasecompare(token, name, namelen); in Curl_check_noproxy()
211 match = (name[namelen - tokenlen - 1] == '.') && in Curl_check_noproxy()
240 match = Curl_cidr6_match(name, check, bits); in Curl_check_noproxy()
242 match = Curl_cidr4_match(name, check, bits); in Curl_check_noproxy()
246 if(match) in Curl_check_noproxy()
H A Dstrcase.c190 int match = 0; in Curl_timestrcmp() local
195 match |= a[i]^b[i]; in Curl_timestrcmp()
203 return match; in Curl_timestrcmp()
H A Durl.c1152 if(match->want_ntlm_http || match->want_proxy_ntlm_http) { in url_match_conn()
1157 match->found = conn; in url_match_conn()
1198 match->found = conn; in url_match_conn()
1206 if(match->found) { in url_match_result()
1209 Curl_attach_connection(match->data, match->found); in url_match_result()
1212 else if(match->seen_single_use_conn && !match->seen_multiplex_conn) { in url_match_result()
1218 else if(match->seen_pending_conn && match->data->set.pipewait) { in url_match_result()
1219 infof(match->data, in url_match_result()
1248 memset(&match, 0, sizeof(match)); in ConnectionExists()
1249 match.data = data; in ConnectionExists()
[all …]
H A Dparsedate.c325 goto match; in match_time()
330 goto match; in match_time()
335 match: in match_time()
/curl/scripts/
H A Dschemetable.c117 int match = 0; in showtable() local
126 match = 1; in showtable()
131 if(!match) { in showtable()
/curl/docs/libcurl/opts/
H A DCURLOPT_CHUNK_END_FUNCTION.md17 CURLOPT_CHUNK_END_FUNCTION - callback after a transfer with FTP wildcard match
32 Pass a pointer to your callback function, which should match the prototype
H A DCURLOPT_FNMATCH_FUNCTION.md18 CURLOPT_FNMATCH_FUNCTION - wildcard match callback
35 Pass a pointer to your callback function, which should match the prototype
H A DCURLOPT_KRBLEVEL.md30 this also enables kerberos awareness. This is a string that should match one
32 string is set but does not match one of these, 'private' is used. Set the
H A DCURLOPT_SSH_KEYFUNCTION.md36 CURLKHMATCH_OK, /* match */
52 enum curl_khmatch match,
61 Pass a pointer to your callback function, which should match the prototype
125 enum curl_khmatch match,
H A DCURLOPT_HTTP200ALIASES.md42 assumed to match HTTP 1.0 when an alias match.
/curl/tests/data/
H A Dtest191219 Cross validate that gcc-typecheck macros match the option types.
H A Dtest204826 pinnedpubkey no-match must fail even when insecure
H A Dtest300035 HTTPS GET to localhost, first subject alt name matches, CN does not match
H A Dtest300135 HTTPS GET to localhost, last subject alt name matches, CN does not match
H A Dtest302335 HTTPS GET to localhost, first subject alt name matches, CN does not match (Schannel variant)
H A Dtest302435 HTTPS GET to localhost, last subject alt name matches, CN does not match (Schannel variant)
/curl/docs/cmdline-opts/
H A Dinterface.md26 Interface name. If the provided name does not match an existing interface,
38 If the provided name does not match an existing interface, curl returns with
H A Dnoproxy.md22 example, `local.com` would match `local.com`, `local.com:80`, and
33 `192.168.0.0/16` would match all addresses starting with `192.168`.
H A Dhostpubmd5.md21 connection with the host unless the checksums match.
H A Dhostpubsha256.md20 public key. Curl refuses the connection with the host unless the hashes match.

Completed in 33 milliseconds

1234