Lines Matching defs:needle

709                    const struct proxy_info *needle)
711 if((data->proxytype == needle->proxytype) &&
712 (data->port == needle->port) &&
713 strcasecompare(data->host.name, needle->host.name))
721 const struct proxy_info *needle)
723 if(!proxy_info_matches(data, needle))
732 if(Curl_timestrcmp(data->user, needle->user) ||
733 Curl_timestrcmp(data->passwd, needle->passwd))
911 * Given one filled in connection struct (named needle), this function should
923 struct connectdata *needle,
937 (needle->handler->protocol & PROTO_FAMILY_HTTP));
939 bool wantProxyNTLMhttp = (needle->bits.proxy_user_passwd &&
942 (needle->handler->protocol & PROTO_FAMILY_HTTP)));
949 (needle->handler->protocol & CURLPROTO_HTTP);
957 bundle = Curl_conncache_find_bundle(data, needle, data->state.conn_cache);
969 if(IsMultiplexingPossible(data, needle)) {
1046 if(needle->unix_domain_socket) {
1049 if(strcmp(needle->unix_domain_socket, check->unix_domain_socket))
1051 if(needle->bits.abstract_unix_socket !=
1059 if((needle->handler->flags&PROTOPT_SSL) !=
1063 needle->handler->protocol || !check->bits.tls_upgraded)
1067 if(needle->bits.conn_to_host != check->bits.conn_to_host)
1072 if(needle->bits.conn_to_port != check->bits.conn_to_port)
1078 if(needle->bits.httpproxy != check->bits.httpproxy ||
1079 needle->bits.socksproxy != check->bits.socksproxy)
1082 if(needle->bits.socksproxy &&
1083 !socks_proxy_info_matches(&needle->socks_proxy,
1087 if(needle->bits.httpproxy) {
1088 if(needle->bits.tunnel_proxy != check->bits.tunnel_proxy)
1091 if(!proxy_info_matches(&needle->http_proxy, &check->http_proxy))
1094 if(IS_HTTPS_PROXY(needle->http_proxy.proxytype)) {
1096 if(needle->http_proxy.proxytype != check->http_proxy.proxytype)
1123 if(needle->localdev || needle->localport) {
1135 if((check->localport != needle->localport) ||
1136 (check->localportrange != needle->localportrange) ||
1137 (needle->localdev &&
1138 (!check->localdev || strcmp(check->localdev, needle->localdev))))
1142 if(!(needle->handler->flags & PROTOPT_CREDSPERREQUEST)) {
1145 if(Curl_timestrcmp(needle->user, check->user) ||
1146 Curl_timestrcmp(needle->passwd, check->passwd) ||
1147 Curl_timestrcmp(needle->sasl_authzid, check->sasl_authzid) ||
1148 Curl_timestrcmp(needle->oauth_bearer, check->oauth_bearer)) {
1156 if(needle->gssapi_delegation != check->gssapi_delegation)
1161 if((needle->handler->protocol & PROTO_FAMILY_HTTP) &&
1168 else if(get_protocol_family(needle->handler) & PROTO_FAMILY_SSH) {
1169 if(!ssh_config_matches(needle, check))
1174 else if(get_protocol_family(needle->handler) & PROTO_FAMILY_FTP) {
1176 if(Curl_timestrcmp(needle->proto.ftpc.account,
1178 Curl_timestrcmp(needle->proto.ftpc.alternative_to_user,
1180 (needle->proto.ftpc.use_ssl != check->proto.ftpc.use_ssl) ||
1181 (needle->proto.ftpc.ccc != check->proto.ftpc.ccc))
1188 if((needle->handler->flags&PROTOPT_SSL)
1190 || !needle->bits.httpproxy || needle->bits.tunnel_proxy
1195 if(!strcasecompare(needle->handler->scheme, check->handler->scheme) &&
1197 needle->handler->protocol || !check->bits.tls_upgraded))
1200 /* If needle has "conn_to_*" set, check must match this */
1201 if((needle->bits.conn_to_host && !strcasecompare(
1202 needle->conn_to_host.name, check->conn_to_host.name)) ||
1203 (needle->bits.conn_to_port &&
1204 needle->conn_to_port != check->conn_to_port))
1208 if(!strcasecompare(needle->host.name, check->host.name) ||
1209 needle->remote_port != check->remote_port)
1213 if((needle->handler->flags & PROTOPT_SSL) &&
1230 if(Curl_timestrcmp(needle->user, check->user) ||
1231 Curl_timestrcmp(needle->passwd, check->passwd)) {
1253 if(Curl_timestrcmp(needle->http_proxy.user,
1255 Curl_timestrcmp(needle->http_proxy.passwd,