Lines Matching defs:header

102     char *cookies;          ///< holds newline (\n) delimited Set-Cookie header field values (without the "Set-Cookie: " field name)
152 { "user_agent", "override User-Agent header", OFFSET(user_agent), AV_OPT_TYPE_STRING, { .str = DEFAULT_USER_AGENT }, 0, 0, D },
153 { "referer", "override referer header", OFFSET(referer), AV_OPT_TYPE_STRING, { .str = NULL }, 0, 0, D },
166 { "send_expect_100", "Force sending an Expect: 100-continue header for POST", OFFSET(send_expect_100), AV_OPT_TYPE_BOOL, { .i64 = -1 }, -1, 1, E },
601 av_log(h, AV_LOG_TRACE, "HTTP reply header: \n%s----\n", message);
709 "No trailing CRLF found in HTTP header. Adding it.\n");
868 // the header at all if this is the case).
875 // Concat all Icy- header lines
1088 /* end of header */
1230 * Create a string containing cookie values for use as a HTTP cookie header
1240 // cookie strings will look like Set-Cookie header field values. Multiple
1321 static inline int has_header(const char *str, const char *header)
1323 /* header + 2 to skip over CRLF prefix. (make sure you have one!) */
1326 return av_stristart(str, header + 2, NULL) || av_stristr(str, header);
1344 av_log(h, AV_LOG_TRACE, "header='%s'\n", line);
1413 /* send http header */
1440 * WWW-Authenticate header, or an 100 continue if no auth actually
1465 // Note: we send the Range header on purpose, even when we're probing,
1536 /* Pretend that it did work. We didn't read any header yet, since
1544 /* wait for header */
1775 /* The metadata packet is variable sized. It has a 1 byte header
2098 * HTTP header. If tunneling a protocol where the server starts