Lines Matching refs:BIT
236 BIT(eof_flag);
273 BIT(is_ip_address); /* if hostname is an IPv4|6 address */
296 BIT(verifypeer); /* set TRUE if this is desired */
297 BIT(verifyhost); /* set TRUE if CN/SAN must match hostname */
298 BIT(verifystatus); /* set TRUE if certificate status must be checked */
299 BIT(sessionid); /* cache session IDs or not */
312 BIT(certinfo); /* gather lots of certificate info */
313 BIT(falsestart);
314 BIT(enable_beast); /* allow this flaw for interoperability's sake */
315 BIT(no_revoke); /* disable SSL certificate revocation checks */
316 BIT(no_partialchain); /* don't accept partial certificate chains */
317 BIT(revoke_best_effort); /* ignore SSL revocation offline/missing revocation
319 BIT(native_ca_store); /* use the native ca store of operating system */
320 BIT(auto_client_cert); /* automatically locate and use a client
366 BIT(stale); /* set true for re-negotiation */
367 BIT(userhash);
475 BIT(noauthpersist);
476 BIT(havenoauthpersist);
477 BIT(havenegdata);
478 BIT(havemultiplerequests);
493 BIT(httpproxy); /* if set, this transfer is done through an HTTP proxy */
494 BIT(socksproxy); /* if set, this transfer is done through a socks proxy */
495 BIT(proxy_user_passwd); /* user+password for the proxy? */
496 BIT(tunnel_proxy); /* if CONNECT is used to "tunnel" through the proxy.
500 BIT(proxy_connect_closed); /* TRUE if a proxy disconnected the connection
503 BIT(proxy); /* if set, this transfer is done through a proxy - any type */
506 BIT(close); /* if set, we close the connection after this request */
507 BIT(reuse); /* if set, this is a reused connection */
508 BIT(altused); /* this is an alt-svc "redirect" */
509 BIT(conn_to_host); /* if set, this connection has a "connect to host"
511 BIT(conn_to_port); /* if set, this connection has a "connect to port"
513 BIT(ipv6_ip); /* we communicate with a remote site specified with pure IPv6
515 BIT(ipv6); /* we communicate with a site using an IPv6 address */
516 BIT(do_more); /* this is set TRUE if the ->curl_do_more() function is
518 BIT(protoconnstart);/* the protocol layer has STARTED its operation after
520 BIT(retry); /* this connection is about to get closed and then
522 BIT(authneg); /* TRUE when the auth phase has started, which means
527 BIT(ftp_use_epsv); /* As set with CURLOPT_FTP_USE_EPSV, but if we find out
530 BIT(ftp_use_eprt); /* As set with CURLOPT_FTP_USE_EPRT, but if we find out
533 BIT(ftp_use_data_ssl); /* Enabled SSL for the data connection */
534 BIT(ftp_use_control_ssl); /* Enabled SSL for the control connection */
537 BIT(netrc); /* name+password provided by netrc */
539 BIT(bound); /* set true if bind() has already been done on this socket/
541 BIT(multiplex); /* connection is multiplexed */
542 BIT(tcp_fastopen); /* use TCP Fast Open */
543 BIT(tls_enable_alpn); /* TLS ALPN extension? */
545 BIT(doh);
548 BIT(abstract_unix_socket);
550 BIT(tls_upgraded);
551 BIT(sock_accepted); /* TRUE if the SECONDARYSOCKET was created with
553 BIT(parallel_connect); /* set TRUE when a parallel connect attempt has
598 BIT(done); /* set TRUE when the lookup is complete */
734 BIT(header); /* incoming data has HTTP header */
735 BIT(content_range); /* set TRUE if Content-Range: was found */
736 BIT(download_done); /* set to TRUE when download is complete */
737 BIT(eos_written); /* iff EOS has been written to client */
738 BIT(upload_done); /* set to TRUE when doing chunked transfer-encoding
740 BIT(ignorebody); /* we read a response-body but we ignore it! */
741 BIT(http_bodyless); /* HTTP response status code is between 100 and 199,
743 BIT(chunk); /* if set, this is a chunked transfer-encoding */
744 BIT(ignore_cl); /* ignore content-length */
745 BIT(upload_chunky); /* set TRUE if we are doing chunked transfer-encoding
747 BIT(getheader); /* TRUE if header parsing is wanted */
748 BIT(forbidchunk); /* used only to explicitly forbid chunk-upload for
751 BIT(no_body); /* the response has no body */
977 BIT(sec_complete); /* if Kerberos is enabled for this connection */
1159 BIT(timecond); /* set to TRUE if the time condition didn't match, which
1208 BIT(callback); /* set when progress callback is used */
1209 BIT(is_t_startransfer_set);
1234 BIT(done); /* TRUE when the auth phase is done and ready to do the
1236 BIT(multipass); /* TRUE if this is not yet authenticated but within the
1238 BIT(iestyle); /* TRUE if digest should be done IE-style or FALSE if it
1262 BIT(exclusive);
1275 BIT(paused_body); /* if PAUSE happened before/during BODY write */
1391 BIT(prev_block_had_trailing_cr);
1476 BIT(conncache_lock);
1481 BIT(multi_owned_by_easy);
1483 BIT(this_is_a_follow); /* this is a followed Location: request */
1484 BIT(refused_stream); /* this was refused, try again */
1485 BIT(errorbuf); /* Set to TRUE if the error buffer is already filled in.
1488 BIT(allow_port); /* Is set.use_port allowed to take effect or not. This
1490 BIT(authproblem); /* TRUE if there's some problem authenticating */
1492 BIT(wildcardmatch); /* enable wildcard matching */
1493 BIT(expect100header); /* TRUE if we added Expect: 100-continue */
1494 BIT(disableexpect); /* TRUE if Expect: is disabled due to a previous
1496 BIT(use_range);
1497 BIT(rangestringalloc); /* the range string is malloc()'ed */
1498 BIT(done); /* set to FALSE when Curl_init_do() is called and set to TRUE
1501 BIT(previouslypending); /* this transfer WAS in the multi->pending queue */
1503 BIT(cookie_engine);
1505 BIT(prefer_ascii); /* ASCII rather than binary */
1507 BIT(list_only); /* list directory contents */
1509 BIT(url_alloc); /* URL string is malloc()'ed */
1510 BIT(referer_alloc); /* referer string is malloc()ed */
1511 BIT(wildcard_resolve); /* Set to true if any resolve change is a wildcard */
1512 BIT(rewindbeforesend);/* TRUE when the sending couldn't be stopped even
1515 BIT(upload); /* upload request */
1516 BIT(internal); /* internal: true if this easy handle was created for
1838 BIT(mail_rcpt_allowfails); /* allow RCPT TO command to fail for some
1847 BIT(mime_formescape);
1849 BIT(is_fread_set); /* has read callback been set to non-NULL? */
1851 BIT(tftp_no_options); /* do not send TFTP options requests */
1853 BIT(sep_headers); /* handle host and proxy headers separately */
1855 BIT(cookiesession); /* new cookie session? */
1857 BIT(crlf); /* convert crlf on ftp upload(?) */
1858 BIT(ssh_compression); /* enable SSH compression */
1863 BIT(quick_exit); /* set 1L when it is okay to leak things (like
1867 BIT(get_filetime); /* get the time and get of the remote file */
1868 BIT(tunnel_thru_httpproxy); /* use CONNECT through an HTTP proxy */
1869 BIT(prefer_ascii); /* ASCII rather than binary */
1870 BIT(remote_append); /* append, not overwrite, on upload */
1872 BIT(list_only); /* list directory */
1875 BIT(ftp_use_port); /* use the FTP PORT command */
1876 BIT(ftp_use_epsv); /* if EPSV is to be attempted or not */
1877 BIT(ftp_use_eprt); /* if EPRT is to be attempted or not */
1878 BIT(ftp_use_pret); /* if PRET is to be used before PASV or not */
1879 BIT(ftp_skip_ip); /* skip the IP address the FTP server passes on to
1881 BIT(wildcard_enabled); /* enable wildcard matching */
1883 BIT(hide_progress); /* don't use the progress meter */
1884 BIT(http_fail_on_error); /* fail on HTTP error codes >= 400 */
1885 BIT(http_keep_sending_on_error); /* for HTTP status codes >= 300 */
1886 BIT(http_follow_location); /* follow HTTP redirects */
1887 BIT(http_transfer_encoding); /* request compressed HTTP transfer-encoding */
1888 BIT(allow_auth_to_other_hosts);
1889 BIT(include_header); /* include received protocol headers in data output */
1890 BIT(http_set_referer); /* is a custom referer used */
1891 BIT(http_auto_referer); /* set "correct" referer when following
1893 BIT(opt_no_body); /* as set with CURLOPT_NOBODY */
1894 BIT(verbose); /* output verbosity */
1895 BIT(krb); /* Kerberos connection requested */
1896 BIT(reuse_forbid); /* forbidden to be reused, close after use */
1897 BIT(reuse_fresh); /* do not reuse an existing connection */
1898 BIT(no_signal); /* do not use any signal/alarm handler */
1899 BIT(tcp_nodelay); /* whether to enable TCP_NODELAY or not */
1900 BIT(ignorecl); /* ignore content length */
1901 BIT(http_te_skip); /* pass the raw body data to the user, even when
1903 BIT(http_ce_skip); /* pass the raw body data to the user, even when
1905 BIT(proxy_transfer_mode); /* set transfer mode (;type=<a|i>) when doing
1908 BIT(socks5_gssapi_nec); /* Flag to support NEC SOCKS5 server */
1910 BIT(sasl_ir); /* Enable/disable SASL initial response */
1911 BIT(tcp_keepalive); /* use TCP keepalives */
1912 BIT(tcp_fastopen); /* use TCP Fast Open */
1913 BIT(ssl_enable_alpn);/* TLS ALPN extension? */
1914 BIT(path_as_is); /* allow dotdots? */
1915 BIT(pipewait); /* wait for multiplex status before starting a new
1917 BIT(suppress_connect_headers); /* suppress proxy CONNECT response headers
1919 BIT(dns_shuffle_addresses); /* whether to shuffle addresses before use */
1920 BIT(haproxyprotocol); /* whether to send HAProxy PROXY protocol v1
1922 BIT(abstract_unix_socket);
1923 BIT(disallow_username_in_url); /* disallow username in url */
1925 BIT(doh); /* DNS-over-HTTPS enabled */
1926 BIT(doh_verifypeer); /* DoH certificate peer verification */
1927 BIT(doh_verifyhost); /* DoH certificate hostname verification */
1928 BIT(doh_verifystatus); /* DoH certificate status verification */
1930 BIT(http09_allowed); /* allow HTTP/0.9 responses */
1932 BIT(ws_raw_mode);