Lines Matching refs:proxy

400   set->proxytype = CURLPROXY_HTTP; /* defaults to HTTP proxy */
402 /* SOCKS5 proxy auth defaults to username/password + GSS-API */
589 Curl_safefree(conn->http_proxy.host.rawalloc); /* http proxy name buffer */
590 Curl_safefree(conn->socks_proxy.host.rawalloc); /* socks proxy name buffer */
997 /* Note that if we use an HTTP proxy in normal mode (no tunneling), we
998 * check connections to that proxy and not to the actual remote server.
1098 /* match SSL config to proxy */
1102 " has different SSL proxy parameters, can't reuse",
1187 * not talking to a HTTP proxy OR using a tunnel through a proxy */
1379 /* note that these two proxy bits are now just on what looks to be
1381 conn->bits.proxy = (data->set.str[STRING_PROXY] &&
1383 conn->bits.httpproxy = (conn->bits.proxy &&
1388 conn->bits.socksproxy = (conn->bits.proxy &&
1392 conn->bits.proxy = TRUE;
2030 * This MUST get called after proxy magic has been figured out.
2051 /* we check for -1 here since if proxy was detected already, this
2052 was very likely already set to the proxy port */
2081 * Detect what (if any) proxy to use. Remember that this selects a host
2088 char *proxy = NULL;
2090 /* If proxy was not specified, we check for default proxy environment
2099 * all proxy variables)
2121 /* read the protocol proxy: */
2122 proxy = curl_getenv(proxy_env);
2136 if(!proxy && !strcasecompare("http_proxy", proxy_env)) {
2139 proxy = curl_getenv(proxy_env);
2143 if(!proxy) {
2145 /* websocket proxy fallbacks */
2147 proxy = curl_getenv("http_proxy");
2150 proxy = curl_getenv("https_proxy");
2151 if(!proxy)
2152 proxy = curl_getenv("HTTPS_PROXY");
2154 if(!proxy) {
2157 proxy = curl_getenv(envp); /* default proxy to use */
2158 if(!proxy) {
2160 proxy = curl_getenv(envp);
2166 if(proxy)
2167 infof(data, "Uses proxy env variable %s == '%s'", envp, proxy);
2169 return proxy;
2174 * If this is supposed to use a proxy, we need to figure out the proxy
2176 * that may exist registered to the same proxy host.
2179 struct connectdata *conn, char *proxy,
2204 /* When parsing the proxy, allowing non-supported schemes since we have
2206 uc = curl_url_set(uhp, CURLUPART_URL, proxy,
2235 failf(data, "Unsupported proxy scheme for \'%s\'", proxy);
2241 failf(data, "Unsupported proxy syntax in \'%s\': %s", proxy,
2251 failf(data, "Unsupported proxy \'%s\', libcurl is built without the "
2252 "HTTPS-proxy support.", proxy);
2266 /* Is there a username and password given in this proxy url? */
2305 /* None given in the proxy string, then get the default one if it is
2321 /* now, clone the proxy host name */
2403 /* create_conn helper to parse and init proxy values. to be called after unix
2404 socket init but before any proxy vars are evaluated. */
2408 char *proxy = NULL;
2424 * Detect what (if any) proxy to use
2427 proxy = strdup(data->set.str[STRING_PROXY]);
2428 /* if global proxy is set, this is it */
2429 if(!proxy) {
2438 /* if global socks proxy is set, this is it */
2454 infof(data, "Uses proxy env variable %s == '%s'", p, no_proxy);
2461 Curl_safefree(proxy);
2465 else if(!proxy && !socksproxy)
2466 /* if the host is not in the noproxy list, detect proxy. */
2467 proxy = detect_proxy(data, conn);
2475 /* For the time being do not mix proxy and unix domain sockets. See #1274 */
2476 if(proxy && conn->unix_domain_socket) {
2477 free(proxy);
2478 proxy = NULL;
2482 if(proxy && (!*proxy || (conn->handler->flags & PROTOPT_NONETWORK))) {
2483 free(proxy); /* Don't bother with an empty proxy string or if the
2485 proxy = NULL;
2489 free(socksproxy); /* Don't bother with an empty socks proxy string or if
2495 * If this is supposed to use a proxy, we need to figure out the proxy host
2496 * name, proxy type and port number, so that we can reuse an existing
2497 * connection that may exist registered to the same proxy host.
2499 if(proxy || socksproxy) {
2501 if(proxy) {
2502 result = parse_proxy(data, conn, proxy, ptype);
2503 Curl_safefree(proxy); /* parse_proxy copies the proxy string */
2510 /* parse_proxy copies the socks proxy string */
2518 /* asking for an HTTP proxy is a bit funny when HTTP is disabled... */
2528 /* if not converting to HTTP over the proxy, enforce tunneling */
2535 conn->bits.httpproxy = FALSE; /* not an HTTP proxy */
2541 /* once a socks proxy */
2553 conn->bits.socksproxy = FALSE; /* not a socks proxy */
2559 conn->bits.proxy = conn->bits.httpproxy || conn->bits.socksproxy;
2561 if(!conn->bits.proxy) {
2562 /* we aren't using the proxy after all... */
2563 conn->bits.proxy = FALSE;
2576 free(proxy);
2701 * No matter if we use a proxy or not, we have to figure out the remote
3224 failf(data, "Couldn't resolve proxy '%s'", host->dispname);
3245 /* If not connecting via a proxy, extract the port from the URL, if it is
3304 * Resolve the address of the server or proxy
3313 /* Resolve the name of the server or proxy */
3349 /* use the new proxy user name and proxy password though */
3368 * - we use a proxy (not tunneling). we want to send all requests
3369 * that use the same proxy on this connection.
3488 /* After the unix socket init but before the proxy vars are used, parse and
3489 initialize the proxy vars */
3496 * If the protocol is using SSL and HTTP proxy is used, we set
3529 * IDN-convert the proxy hostnames
3568 * If the "connect to" feature is used with an HTTP proxy,
3578 * we figured out what/if proxy to use.
3668 conn->bits.proxy?"proxy":"host",
3773 infof(data, "NTLM-proxy picked AND auth done set, clear picked");
3800 * Resolve the address of the server or proxy
3837 case of proxy CONNECT failures and we must make sure we don't have it