Lines Matching refs:TRUE

146     return TRUE;
148 return TRUE;
168 return TRUE;
210 ret = TRUE;
216 ret = TRUE;
444 return TRUE;
483 bool httpheader, /* TRUE if HTTP header-style line */
484 bool noexpire, /* if TRUE, skip remove_expired() */
490 bool secure) /* TRUE if connection is over secure origin */
548 sep = TRUE;
609 badcookie = TRUE;
614 done = TRUE;
616 badcookie = TRUE;
621 badcookie = TRUE;
630 done = TRUE;
638 co->secure = TRUE;
641 badcookie = TRUE;
646 co->httponly = TRUE;
656 badcookie = TRUE; /* out of memory bad */
662 badcookie = TRUE; /* out of memory bad */
698 badcookie = TRUE;
702 co->tailmatch = TRUE; /* we always do that if the domain name was
710 badcookie = TRUE;
801 badcookie = TRUE;
828 badcookie = TRUE; /* out of memory bad */
831 badcookie = TRUE;
865 co->httponly = TRUE;
895 badcookie = TRUE;
899 * flag: A TRUE/FALSE value indicating if all machines within a given
900 * domain can access the variable. Set TRUE when the cookie says
903 co->tailmatch = strcasecompare(ptr, "TRUE")?TRUE:FALSE;
907 if(strcmp("TRUE", ptr) && strcmp("FALSE", ptr)) {
911 badcookie = TRUE;
915 badcookie = TRUE; /* out of memory bad */
923 badcookie = TRUE;
926 badcookie = TRUE;
931 if(strcasecompare(ptr, "TRUE")) {
933 co->secure = TRUE;
935 badcookie = TRUE;
940 badcookie = TRUE;
945 badcookie = TRUE;
957 badcookie = TRUE;
965 badcookie = TRUE;
972 badcookie = TRUE;
1066 matching_domains = TRUE;
1069 matching_domains = TRUE;
1107 replace_old = TRUE;
1110 replace_old = TRUE;
1195 * If 'newsession' is TRUE, discard all "session cookies" on read from file.
1254 headerline = TRUE;
1259 Curl_cookie_add(data, c, headerline, TRUE, lineptr, NULL, NULL, TRUE);
1272 data->state.cookie_engine = TRUE;
1274 c->running = TRUE; /* now, we're running */
1409 if(co->secure?secure:TRUE) {
1608 co->tailmatch?"TRUE":"FALSE",
1610 co->secure?"TRUE":"FALSE",
1643 use_stdout = TRUE;