Lines Matching defs:header

189  * if proxy headers are not available, then it will lookup into http header
193 * not, as it then might check a different header list. Provide the header
220 * given HTTP header line and return a strdupped copy. Returns NULL in
221 * case of allocation failure. Returns an empty string if the header value
224 char *Curl_copy_header_value(const char *header)
230 /* Find the end of the header name */
231 while(*header && (*header != ':'))
232 ++header;
234 if(*header)
236 ++header;
239 start = header;
267 * http_output_basic() sets up an Authorization: header (or the proxy version)
331 * http_output_bearer() sets up an Authorization: header
645 * Output the correct authentication header depending on the auth type
834 /* Send proxy authentication header if needed */
1027 infof(data, "Ignoring duplicate digest auth header.");
1036 * incoming data from this header in case we are going to use
1235 * Curl_buffer_send() sends a header buffer and frees all associated
1236 * memory. Body data may be appended to the header data if desired.
1267 isn't body is header */
1366 /* how much of the header that was sent */
1373 /* there was body data sent beyond the initial header part, pass that on
1410 /* this much data is remaining header: */
1434 /* no remaining header data */
1447 * Returns TRUE if 'headerline' contains the 'header' with given 'content'.
1452 const char *header, /* header keyword _with_ colon */
1457 /* RFC2616, section 4.2 says: "Each header field consists of a name followed
1467 DEBUGASSERT(header);
1470 if(!strncasecompare(headerline, header, hlen))
1471 return FALSE; /* doesn't start with header */
1473 /* pass the header */
1480 /* find the end of the header line */
1542 * a chance to be set back to true when we output the next auth header */
1616 /* check and possibly add an Expect: header */
1686 infof(handle, "Malformatted trailing header, skipping trailer");
1752 * 1. setting only 'name:' to suppress a header from being sent
1753 * 2. setting only 'name;' to send an empty (illegal) header
1767 /* quirk #1, suppress this header */
1775 /* neither : nor ; in provided header value. We seem
1786 /* quirk #2, send an empty header */
1799 /* a Host: header was sent already, don't pass on any custom Host:
1800 header as that will produce *two* in the same request! */
1804 /* this header (extended by formdata.c) is sent later */
1808 /* this header is sent later */
1827 /* be careful of sending this potentially sensitive header to
1933 /* we require a colon for this to be a true header */
1945 /* a Host: header was sent already, don't pass on any custom Host:
1946 header as that will produce *two* in the same request! */
1950 /* this header (extended by formdata.c) is sent later */
1954 /* this header is sent later */
1973 /* be careful of sending this potentially sensitive header to
2044 /* A custom header was specified; it will be sent instead. */
2048 /* The If-Modified-Since header family should have their times set in
2129 it might have been used in the proxy connect, but if we have got a header
2161 /* If we have a given custom Host: header, we extract the host name in
2163 custom Host: header if this is NOT a redirect, as setting Host: in the
2544 /* we allow replacing this header if not during auth negotiation,
2613 /* we allow replacing this header if not during auth negotiation,
2640 then append the post data to the HTTP request header. This limit
2796 size_t clen = 8; /* hold the size of the generated Cookie: header */
2808 infof(data, "Restricted outgoing cookies due to header size, "
2907 * a Range: header that will be passed along. We need to "fast forward"
3048 /* When we are to insert a TE: header in the request, we must also insert
3049 TE in a Connection: header, so we need to merge the custom provided
3050 Connection: header and prevent the original to get sent. Note that if
3051 the user has inserted his/her own TE: header we don't do this magic
3064 /* Create the (updated) Connection: header */
3204 /* make sure the header buffer is reset - if there are leftovers from a
3437 * Curl_http_header() parses a single response header.
3444 /* Check for Content-Length: header lines to get size */
3470 /* check for Content-Type: header lines to get the MIME-type */
3594 JavaWebServer/1.1.1 obviously sends the header this way!
3671 infof(data, "Negotiate: noauthpersist -> %d, header part: %s",
3709 /* If enabled, the header is incoming and this is over HTTPS */
3723 infof(data, "Illegal STS header skipped");
3726 infof(data, "Parsed STS header fine (%zu entries)",
3732 /* If enabled, the header is incoming and this is over HTTPS */
3779 * This code executes as part of processing the header. As a
3819 * terminated by the first empty line after the header
3829 * empty line after the header fields. */
3843 call to the user's header callback, so that a valid content length can be
3866 const char *header = Curl_dyn_ptr(&data->state.headerb);
3868 char *ptr = memchr(header, 0x00, hlen);
3871 failf(data, "Nul byte in header");
3875 /* the first "header" is the status-line and it has no colon */
3877 if(((header[0] == ' ') || (header[0] == '\t')) && k->headerline > 2)
3881 ptr = memchr(header, ':', hlen);
3920 * Read any HTTP header lines from the server and pass them to the client app.
3933 /* header line within buffer loop */
3943 /* Not a complete header line within buffer, append the data to
3951 /* check if this looks like a protocol header */
3958 /* this is not the beginning of a protocol first header line */
3959 k->header = FALSE;
3972 /* decrease the size of the remaining (supposed) header line */
3983 * We now have a FULL header line in 'headerb'.
3987 /* the first read header */
3993 /* this is not the beginning of a protocol first header line */
3998 k->header = FALSE;
4010 /* Zero-length header line means end of headers! */
4026 * back into the header-parsing state!
4028 k->header = TRUE;
4029 k->headerline = 0; /* restart the header line counter */
4047 k->header = TRUE;
4048 k->headerline = 0; /* restart the header line counter */
4057 k->header = FALSE; /* no more header to parse! */
4066 k->header = FALSE; /* no more header to parse! */
4078 k->header = TRUE;
4079 k->headerline = 0; /* restart the header line counter */
4089 k->header = FALSE; /* no more header to parse! */
4106 if(!k->header) {
4143 /* now, only output this if the header AND body are requested:
4219 header */
4270 if(!k->header) {
4293 goto out; /* exit header line loop */
4296 /* We continue reading headers, reset the line-based header */
4318 /* This is the first header, it MUST be the error code line
4411 compare header line against list of aliases
4459 k->header = FALSE; /* this is not a header line */
4473 * End of header-checks. Write them to the client.
4495 /* We might have reached the end of the header part here, but
4496 there might be a non-header part left in the end of the read
4499 if(!k->header && !leftover_body) {
4515 if(!data->req.header) {
4523 if(!result && !data->req.header) {
4529 * to be a header, only happens if we allow for
4558 /* either all was consumed in header parsing, or we have data left
4560 DEBUGASSERT(!blen || !data->req.header);
4561 if(!data->req.header && (blen || is_eos)) {
4562 /* BODY data after header been parsed, write and consume */
4857 infof(data, "set pseudo header %s to %s", HTTP_PSEUDO_SCHEME, scheme);