Lines Matching defs:check
789 /* The check for a dead socket makes sense only if the connection isn't in
794 /* avoid check if already too old */
799 connection. Use it to check if the connection is dead. */
992 struct connectdata *check = curr->ptr;
993 /* Get next node now. We might remove a dead `check` connection which
998 * check connections to that proxy and not to the actual remote server.
1000 if(check->connect_only || check->bits.close)
1005 && data->set.ipver != check->ip_version) {
1014 !check->primary_ip[0])
1018 if(CONN_INUSE(check)) {
1020 /* transfer can't be multiplexed and check is in use */
1024 /* Could multiplex, but not when check belongs to another multi */
1025 struct Curl_llist_element *e = check->easyq.head;
1032 if(!Curl_conn_is_connected(check, FIRSTSOCKET)) {
1036 " isn't open enough, can't reuse", check->connection_id);
1040 /* `check` is connected. if it is in use and does not support multiplex,
1042 if(!check->bits.multiplex && CONN_INUSE(check))
1047 if(!check->unix_domain_socket)
1049 if(strcmp(needle->unix_domain_socket, check->unix_domain_socket))
1052 check->bits.abstract_unix_socket)
1055 else if(check->unix_domain_socket)
1060 (check->handler->flags&PROTOPT_SSL))
1062 if(get_protocol_family(check->handler) !=
1063 needle->handler->protocol || !check->bits.tls_upgraded)
1067 if(needle->bits.conn_to_host != check->bits.conn_to_host)
1072 if(needle->bits.conn_to_port != check->bits.conn_to_port)
1078 if(needle->bits.httpproxy != check->bits.httpproxy ||
1079 needle->bits.socksproxy != check->bits.socksproxy)
1084 &check->socks_proxy))
1088 if(needle->bits.tunnel_proxy != check->bits.tunnel_proxy)
1091 if(!proxy_info_matches(&needle->http_proxy, &check->http_proxy))
1096 if(needle->http_proxy.proxytype != check->http_proxy.proxytype)
1099 if(!Curl_ssl_conn_config_match(data, check, TRUE)) {
1103 check->connection_id));
1112 if(h2upgrade && !check->httpversion && canmultiplex) {
1135 if((check->localport != needle->localport) ||
1136 (check->localportrange != needle->localportrange) ||
1138 (!check->localdev || strcmp(check->localdev, needle->localdev))))
1145 if(Curl_timestrcmp(needle->user, check->user) ||
1146 Curl_timestrcmp(needle->passwd, check->passwd) ||
1147 Curl_timestrcmp(needle->sasl_authzid, check->sasl_authzid) ||
1148 Curl_timestrcmp(needle->oauth_bearer, check->oauth_bearer)) {
1155 and auth method, but this check takes precaution before efficiency */
1156 if(needle->gssapi_delegation != check->gssapi_delegation)
1160 * than the HTTP version of the check connection, continue looking */
1162 (((check->httpversion >= 20) &&
1164 || ((check->httpversion >= 30) &&
1169 if(!ssh_config_matches(needle, check))
1177 check->proto.ftpc.account) ||
1179 check->proto.ftpc.alternative_to_user) ||
1180 (needle->proto.ftpc.use_ssl != check->proto.ftpc.use_ssl) ||
1181 (needle->proto.ftpc.ccc != check->proto.ftpc.ccc))
1195 if(!strcasecompare(needle->handler->scheme, check->handler->scheme) &&
1196 (get_protocol_family(check->handler) !=
1197 needle->handler->protocol || !check->bits.tls_upgraded))
1200 /* If needle has "conn_to_*" set, check must match this */
1202 needle->conn_to_host.name, check->conn_to_host.name)) ||
1204 needle->conn_to_port != check->conn_to_port))
1208 if(!strcasecompare(needle->host.name, check->host.name) ||
1209 needle->remote_port != check->remote_port)
1212 /* If talking TLS, check needs to use the same SSL options. */
1214 !Curl_ssl_conn_config_match(data, check, FALSE)) {
1218 check->connection_id));
1224 /* If we are looking for an HTTP+NTLM connection, check if this is
1230 if(Curl_timestrcmp(needle->user, check->user) ||
1231 Curl_timestrcmp(needle->passwd, check->passwd)) {
1235 if(check->http_ntlm_state == NTLMSTATE_NONE)
1236 chosen = check;
1240 else if(check->http_ntlm_state != NTLMSTATE_NONE) {
1248 /* Both check->http_proxy.user and check->http_proxy.passwd can be
1250 if(!check->http_proxy.user || !check->http_proxy.passwd)
1254 check->http_proxy.user) ||
1256 check->http_proxy.passwd))
1259 else if(check->proxy_ntlm_state != NTLMSTATE_NONE) {
1269 chosen = check;
1272 (check->http_ntlm_state != NTLMSTATE_NONE)) ||
1274 (check->proxy_ntlm_state != NTLMSTATE_NONE))) {
1284 if(CONN_INUSE(check)) {
1286 DEBUGASSERT(check->bits.multiplex);
1288 if(CONN_INUSE(check) >=
1291 ", skip (%zu)", CONN_INUSE(check));
1294 if(CONN_INUSE(check) >=
1295 Curl_conn_get_max_concurrent(data, check, FIRSTSOCKET)) {
1297 CONN_INUSE(check));
1303 else if(extract_if_dead(check, data)) {
1305 Curl_disconnect(data, check, TRUE);
1310 chosen = check;
1459 2. check how small the table gets
1677 /* it is allowed for "normal" request, now do an extra check if this is
2051 /* we check for -1 here since if proxy was detected already, this
2090 /* If proxy was not specified, we check for default proxy environment
2102 * the first to check for.)
2114 /* Now, build <protocol>_proxy and check for such a one to use */
2995 /* check whether the URL's hostname matches */
3020 /* check whether the URL's port matches */
3111 /* with h2 support, check that first */
3590 /* this is supposed to be the connect function so we better at least check