Lines Matching refs:set
173 /* Free all dynamic strings stored in the data->set substructure. */
178 Curl_safefree(data->set.str[i]);
182 Curl_safefree(data->set.blobs[j]);
196 Curl_mime_cleanpart(&data->set.mimepost);
287 Curl_altsvc_save(data, data->asi, data->set.str[STRING_ALTSVC]);
289 Curl_hsts_save(data, data->hsts, data->set.str[STRING_HSTS]);
357 struct UserDefined *set = &data->set;
360 set->out = stdout; /* default output to stdout */
361 set->in_set = stdin; /* default input from stdin */
362 set->err = stderr; /* default stderr to stderr */
365 set->fwrite_func = (curl_write_callback)fwrite;
368 set->fread_func_set = (curl_read_callback)fread;
369 set->is_fread_set = 0;
371 set->seek_func = ZERO_NULL;
372 set->seek_client = ZERO_NULL;
374 set->filesize = -1; /* we don't know the size */
375 set->postfieldsize = -1; /* unknown size */
376 set->maxredirs = 30; /* sensible default */
378 set->method = HTTPREQ_GET; /* Default HTTP request */
380 set->rtspreq = RTSPREQ_OPTIONS; /* Default RTSP request */
383 set->ftp_use_epsv = TRUE; /* FTP defaults to EPSV operations */
384 set->ftp_use_eprt = TRUE; /* FTP defaults to EPRT operations */
385 set->ftp_use_pret = FALSE; /* mainly useful for drftpd servers */
386 set->ftp_filemethod = FTPFILE_MULTICWD;
387 set->ftp_skip_ip = TRUE; /* skip PASV IP by default */
389 set->dns_cache_timeout = 60; /* Timeout every 60 seconds by default */
392 set->general_ssl.max_ssl_sessions = 5;
394 set->general_ssl.ca_cache_timeout = 24 * 60 * 60;
396 set->httpauth = CURLAUTH_BASIC; /* defaults to basic */
399 set->proxyport = 0;
400 set->proxytype = CURLPROXY_HTTP; /* defaults to HTTP proxy */
401 set->proxyauth = CURLAUTH_BASIC; /* defaults to basic */
403 set->socks5auth = CURLAUTH_BASIC | CURLAUTH_GSSAPI;
407 set->hide_progress = TRUE; /* CURLOPT_NOPROGRESS changes these */
409 Curl_mime_initpart(&set->mimepost);
413 set->doh_verifyhost = TRUE;
414 set->doh_verifypeer = TRUE;
418 set->ssh_auth_types = CURLSSH_AUTH_DEFAULT;
419 set->new_directory_perms = 0755; /* Default permissions */
422 set->new_file_perms = 0644; /* Default permissions */
423 set->allowed_protocols = (curl_prot_t) CURLPROTO_ALL;
424 set->redir_protocols = CURLPROTO_HTTP | CURLPROTO_HTTPS | CURLPROTO_FTP |
432 set->socks5_gssapi_nec = FALSE;
445 result = Curl_setstropt(&set->str[STRING_SSL_CAFILE], CURL_CA_BUNDLE);
449 result = Curl_setstropt(&set->str[STRING_SSL_CAFILE_PROXY],
455 result = Curl_setstropt(&set->str[STRING_SSL_CAPATH], CURL_CA_PATH);
459 result = Curl_setstropt(&set->str[STRING_SSL_CAPATH_PROXY], CURL_CA_PATH);
466 set->wildcard_enabled = FALSE;
467 set->chunk_bgn = ZERO_NULL;
468 set->chunk_end = ZERO_NULL;
469 set->fnmatch = ZERO_NULL;
471 set->tcp_keepalive = FALSE;
472 set->tcp_keepintvl = 60;
473 set->tcp_keepidle = 60;
474 set->tcp_fastopen = FALSE;
475 set->tcp_nodelay = TRUE;
476 set->ssl_enable_alpn = TRUE;
477 set->expect_100_timeout = 1000L; /* Wait for a second by default. */
478 set->sep_headers = TRUE; /* separated header lists by default */
479 set->buffer_size = READBUFFER_SIZE;
480 set->upload_buffer_size = UPLOADBUFFER_DEFAULT;
481 set->happy_eyeballs_timeout = CURL_HET_DEFAULT;
482 set->upkeep_interval_ms = CURL_UPKEEP_INTERVAL_DEFAULT;
483 set->maxconnects = DEFAULT_CONNCACHE_SIZE; /* for easy handles */
484 set->maxage_conn = 118;
485 set->maxlifetime_conn = 0;
486 set->http09_allowed = FALSE;
488 set->httpwant = CURL_HTTP_VERSION_2TLS
490 set->httpwant = CURL_HTTP_VERSION_1_1
494 memset(&set->priority, 0, sizeof(set->priority));
496 set->quick_exit = 0L;
503 * @param curl is a pointer to a sessionhandle pointer that gets set by this
672 /* This is set if protocol-specific cleanups should be made */
756 if(idletime > data->set.maxage_conn) {
765 if(data->set.maxlifetime_conn && lifetime > data->set.maxlifetime_conn) {
919 * The force_reuse flag is set if the connection must be used.
971 if(data->set.pipewait) {
1004 if(data->set.ipver != CURL_IPRESOLVE_WHATEVER
1005 && data->set.ipver != check->ip_version) {
1113 if(data->set.pipewait) {
1200 /* If needle has "conn_to_*" set, check must match this */
1323 if(foundPendingCandidate && data->set.pipewait) {
1325 "Found pending candidate for reuse and CURLOPT_PIPEWAIT is set");
1339 if(data->set.verbose)
1365 connections, so we set this to force-close. Protocols that support
1366 this need to set this to FALSE in their "curl_do" functions. */
1376 conn->http_proxy.proxytype = data->set.proxytype;
1381 conn->bits.proxy = (data->set.str[STRING_PROXY] &&
1382 *data->set.str[STRING_PROXY]) ? TRUE : FALSE;
1391 if(data->set.str[STRING_PRE_PROXY] && *data->set.str[STRING_PRE_PROXY]) {
1398 conn->bits.tunnel_proxy = data->set.tunnel_thru_httpproxy;
1402 conn->bits.ftp_use_epsv = data->set.ftp_use_epsv;
1403 conn->bits.ftp_use_eprt = data->set.ftp_use_eprt;
1405 conn->ip_version = data->set.ipver;
1406 conn->connect_only = data->set.connect_only;
1423 if(data->set.str[STRING_DEVICE]) {
1424 conn->localdev = strdup(data->set.str[STRING_DEVICE]);
1429 conn->localportrange = data->set.localportrange;
1430 conn->localport = data->set.localport;
1435 conn->fclosesocket = data->set.fclosesocket;
1436 conn->closesocket_client = data->set.closesocket_client;
1438 conn->gssapi_delegation = data->set.gssapi_delegation;
1675 (data->set.allowed_protocols & p->protocol)) {
1680 !(data->set.redir_protocols & p->protocol))
1686 /* 'port' and 'remote_port' are set in setup_connection_internals() */
1718 * If the URL was set with an IPv6 numerical address with a zone id part, set
1780 bool use_set_uh = (data->set.uh && !data->state.this_is_a_follow);
1786 uh = data->state.uh = curl_url_dup(data->set.uh);
1795 if(data->set.str[STRING_DEFAULT_PROTOCOL] &&
1797 char *url = aprintf("%s://%s", data->set.str[STRING_DEFAULT_PROTOCOL],
1812 (data->set.disallow_username_in_url ?
1814 (data->set.path_as_is ? CURLU_PATH_AS_IS : 0));
1905 * User name and password set with their own options override the
1906 * credentials possibly set in the URL.
1908 if(!data->set.str[STRING_PASSWORD]) {
1926 if(!data->set.str[STRING_USERNAME]) {
1944 /* no user was set but a password, set a blank user */
1975 (data->set.use_port && data->state.allow_port) ?
1976 data->set.use_port : curlx_ultous(port);
1982 if(data->set.scope_id)
1983 /* Override any scope that was set above. */
1984 conn->scope_id = data->set.scope_id;
1998 s->resume_from = data->set.set_resume_from;
1999 if(s->resume_from || data->set.str[STRING_SET_RANGE]) {
2006 s->range = strdup(data->set.str[STRING_SET_RANGE]);
2052 was very likely already set to the proxy port */
2304 if(data->set.proxyport)
2307 port = (int)data->set.proxyport;
2426 if(data->set.str[STRING_PROXY]) {
2427 proxy = strdup(data->set.str[STRING_PROXY]);
2428 /* if global proxy is set, this is it */
2436 if(data->set.str[STRING_PRE_PROXY]) {
2437 socksproxy = strdup(data->set.str[STRING_PRE_PROXY]);
2438 /* if global socks proxy is set, this is it */
2446 if(!data->set.str[STRING_NOPROXY]) {
2458 if(Curl_check_noproxy(conn->host.name, data->set.str[STRING_NOPROXY] ?
2459 data->set.str[STRING_NOPROXY] : no_proxy,
2710 if(data->set.use_port && data->state.allow_port) {
2711 /* if set, we use this instead of the port possibly given in the URL */
2714 conn->remote_port = data->set.use_port;
2736 if(data->set.str[STRING_OPTIONS]) {
2738 *optionsp = strdup(data->set.str[STRING_OPTIONS]);
2744 if(data->set.use_netrc == CURL_NETRC_REQUIRED) {
2749 if(data->set.use_netrc && !data->set.str[STRING_USERNAME]) {
2761 data->set.str[STRING_NETRC_FILE]);
2765 (data->set.str[STRING_NETRC_FILE] ?
2766 data->set.str[STRING_NETRC_FILE] : ".netrc"));
2773 /* set bits.netrc TRUE to remember that we got the name from a .netrc
2784 /* no user was set but a password, set a blank user */
3246 * there, thus overriding any defaults that might have been set above. */
3405 * if this function returns CURLE_OK and *async is set to TRUE, the resolve
3410 * @param in_connect is set to the next connection data pointer
3411 * @param async is set TRUE when an async DNS resolution is pending
3452 /* We must set the return variable as soon as possible, so that our
3461 if(data->set.str[STRING_SASL_AUTHZID]) {
3462 conn->sasl_authzid = strdup(data->set.str[STRING_SASL_AUTHZID]);
3469 if(data->set.str[STRING_BEARER]) {
3470 conn->oauth_bearer = strdup(data->set.str[STRING_BEARER]);
3478 if(data->set.str[STRING_UNIX_SOCKET_PATH]) {
3479 conn->unix_domain_socket = strdup(data->set.str[STRING_UNIX_SOCKET_PATH]);
3484 conn->bits.abstract_unix_socket = data->set.abstract_unix_socket;
3496 * If the protocol is using SSL and HTTP proxy is used, we set
3510 /* Check for overridden login details and set them accordingly so that
3524 result = parse_connect_to_slist(data, conn, data->set.connect_to);
3569 * we set the tunnel_proxy bit.
3628 conn->bits.tcp_fastopen = data->set.tcp_fastopen;
3650 if((data->set.reuse_fresh && !data->state.followlocation) ||
3651 data->set.connect_only)
3683 /* The protocol wants it, so set the bits if enabled in the easy handle
3685 if(data->set.ssl_enable_alpn)
3766 infof(data, "NTLM picked AND auth done set, clear picked");
3773 infof(data, "NTLM-proxy picked AND auth done set, clear picked");
3796 conn->seek_func = data->set.seek_func;
3797 conn->seek_client = data->set.seek_client;
3835 /* set proxy_connect_closed to false unconditionally already here since it
3838 lingering set from a previous invoke */
3846 /* set start time here for timeout purposes in the connect procedure, it
3847 is later set again for the progress meter purpose */
3870 data->req.no_body = data->set.opt_no_body;
3908 * Allow this function to get called with 'conn' set to NULL.
3956 struct Curl_data_prio_node **pnext = &parent->set.priority.children;
3957 struct Curl_data_prio_node *pnode = parent->set.priority.children;
3959 DEBUGASSERT(child->set.priority.parent == parent);
3971 child->set.priority.parent = 0;
3972 child->set.priority.exclusive = FALSE;
3979 if(child->set.priority.parent) {
3980 priority_remove_child(child->set.priority.parent, child);
3992 if(parent->set.priority.children && exclusive) {
3994 struct Curl_data_prio_node *node = parent->set.priority.children;
3996 node->data->set.priority.parent = child;
4000 tail = &child->set.priority.children;
4005 *tail = parent->set.priority.children;
4006 parent->set.priority.children = 0;
4009 tail = &parent->set.priority.children;
4011 (*tail)->data->set.priority.exclusive = FALSE;
4019 child->set.priority.parent = parent;
4020 child->set.priority.exclusive = exclusive;
4029 while(data->set.priority.children) {
4030 struct Curl_easy *tmp = data->set.priority.children->data;
4032 if(data->set.priority.parent)
4033 Curl_data_priority_add_child(data->set.priority.parent, tmp, FALSE);
4036 if(data->set.priority.parent)
4037 priority_remove_child(data->set.priority.parent, data);