/external/curl/lib/vauth/ |
D | digest.c | 232 if(strcasecompare(token, DIGEST_QOP_VALUE_STRING_AUTH)) in auth_digest_get_qop_values() 234 else if(strcasecompare(token, DIGEST_QOP_VALUE_STRING_AUTH_INT)) in auth_digest_get_qop_values() 236 else if(strcasecompare(token, DIGEST_QOP_VALUE_STRING_AUTH_CONF)) in auth_digest_get_qop_values() 547 if(strcasecompare(value, "nonce")) { in Curl_auth_decode_digest_http_message() 553 else if(strcasecompare(value, "stale")) { in Curl_auth_decode_digest_http_message() 554 if(strcasecompare(content, "true")) { in Curl_auth_decode_digest_http_message() 559 else if(strcasecompare(value, "realm")) { in Curl_auth_decode_digest_http_message() 565 else if(strcasecompare(value, "opaque")) { in Curl_auth_decode_digest_http_message() 571 else if(strcasecompare(value, "qop")) { in Curl_auth_decode_digest_http_message() 581 if(strcasecompare(token, DIGEST_QOP_VALUE_STRING_AUTH)) { in Curl_auth_decode_digest_http_message() [all …]
|
D | digest_sspi.c | 280 if(strcasecompare(value, "realm")) { in Curl_override_sspi_http_realm() 355 if(strcasecompare(value, "stale") && in Curl_auth_decode_digest_http_message() 356 strcasecompare(content, "true")) { in Curl_auth_decode_digest_http_message()
|
/external/curl/lib/ |
D | netrc.c | 141 if(strcasecompare("machine", tok)) { in Curl_parsenetrc() 148 else if(strcasecompare("default", tok)) { in Curl_parsenetrc() 154 if(strcasecompare(host, tok)) { in Curl_parsenetrc() 167 state_our_login = strcasecompare(login, tok); in Curl_parsenetrc() 199 else if(strcasecompare("login", tok)) in Curl_parsenetrc() 201 else if(strcasecompare("password", tok)) in Curl_parsenetrc() 203 else if(strcasecompare("machine", tok)) { in Curl_parsenetrc()
|
D | altsvc.c | 53 if(strcasecompare(name, "h1")) in alpn2alpnid() 55 if(strcasecompare(name, "h2")) in alpn2alpnid() 57 if(strcasecompare(name, "h2c")) in alpn2alpnid() 59 if(strcasecompare(name, "h3")) in alpn2alpnid() 371 strcasecompare(srchost, as->srchost)) { in altsvc_flush() 427 if(strcasecompare(alpnbuf, "clear")) { in Curl_altsvc_parse() 453 if(strcasecompare("ma", option)) in Curl_altsvc_parse() 455 else if(strcasecompare("persist", option) && (num == 1)) in Curl_altsvc_parse() 559 strcasecompare(as->srchost, srchost) && in Curl_altsvc_lookup()
|
D | hostcheck.c | 85 return strcasecompare(pattern, hostname) ? in hostmatch() 106 return strcasecompare(pattern, hostname) ? in hostmatch() 111 !strcasecompare(pattern_label_end, hostname_label_end)) in hostmatch()
|
D | cookie.c | 125 if(!strcasecompare(cooke_domain, hostname + hostname_len-cookie_domain_len)) in tailmatch() 409 return !strchr(domain, '.') && !strcasecompare(domain, "localhost"); in bad_domain() 568 if(strcasecompare("secure", name)) { in Curl_cookie_add() 577 else if(strcasecompare("httponly", name)) in Curl_cookie_add() 585 else if(strcasecompare("path", name)) { in Curl_cookie_add() 598 else if(strcasecompare("domain", name)) { in Curl_cookie_add() 640 else if(strcasecompare("version", name)) { in Curl_cookie_add() 647 else if(strcasecompare("max-age", name)) { in Curl_cookie_add() 663 else if(strcasecompare("expires", name)) { in Curl_cookie_add() 831 co->tailmatch = strcasecompare(ptr, "TRUE")?TRUE:FALSE; in Curl_cookie_add() [all …]
|
D | imap.c | 279 (!strcasecompare(imap->custom, "STORE") || in imap_endofresp() 281 !strcasecompare(imap->custom, "SELECT") && in imap_endofresp() 282 !strcasecompare(imap->custom, "EXAMINE") && in imap_endofresp() 283 !strcasecompare(imap->custom, "SEARCH") && in imap_endofresp() 284 !strcasecompare(imap->custom, "EXPUNGE") && in imap_endofresp() 285 !strcasecompare(imap->custom, "LSUB") && in imap_endofresp() 286 !strcasecompare(imap->custom, "UID") && in imap_endofresp() 287 !strcasecompare(imap->custom, "NOOP"))) in imap_endofresp() 1076 !strcasecompare(imap->uidvalidity, imapc->mailbox_uidvalidity)) { in imap_state_select_resp() 1550 strcasecompare(imap->mailbox, imapc->mailbox) && in imap_perform() [all …]
|
D | ldap.c | 343 (strcasecompare(data->set.ssl.cert_type, "DER"))) in Curl_ldap() 384 (!strcasecompare(data->set.ssl.cert_type, "PEM"))) { in Curl_ldap() 779 if(strcasecompare(p, "one")) in str2scope() 781 if(strcasecompare(p, "onetree")) in str2scope() 783 if(strcasecompare(p, "base")) in str2scope() 785 if(strcasecompare(p, "sub")) in str2scope() 787 if(strcasecompare(p, "subtree")) in str2scope()
|
D | parsedate.c | 213 if(strcasecompare(check, what[0])) { in checkday() 230 if(strcasecompare(check, what[0])) { in checkmonth() 250 if(strcasecompare(check, what->name)) { in checktz()
|
D | if2ip.c | 119 if(strcasecompare(iface->ifa_name, interf)) { in Curl_if2ip() 167 strcasecompare(iface->ifa_name, interf)) { in Curl_if2ip()
|
D | strcase.h | 35 #define strcasecompare(a,b) Curl_strcasecompare(a,b) macro
|
D | telnet.c | 848 if(strcasecompare(option_keyword, "TTYPE")) { in check_telnet_options() 856 if(strcasecompare(option_keyword, "XDISPLOC")) { in check_telnet_options() 864 if(strcasecompare(option_keyword, "NEW_ENV")) { in check_telnet_options() 876 if(strcasecompare(option_keyword, "WS")) { in check_telnet_options() 889 if(strcasecompare(option_keyword, "BINARY")) { in check_telnet_options()
|
D | x509asn1.c | 183 if(!strcmp(op->numoid, oid) || strcasecompare(op->textoid, oid)) in searchOID() 890 if(strcasecompare(algo, "rsaEncryption")) { in do_pubkey() 919 else if(strcasecompare(algo, "dsa")) { in do_pubkey() 933 else if(strcasecompare(algo, "dhpublicnumber")) { in do_pubkey()
|
D | url.c | 1336 if((strcasecompare(needle->handler->scheme, check->handler->scheme) || in ConnectionExists() 1339 (!needle->bits.conn_to_host || strcasecompare( in ConnectionExists() 1343 strcasecompare(needle->host.name, check->host.name) && in ConnectionExists() 1985 if(strcasecompare(p->scheme, scheme)) in Curl_builtin_scheme() 2132 if(!strcasecompare("file", data->state.up.scheme)) in parseurlandfillconn() 2143 if(!strcasecompare("file", data->state.up.scheme)) in parseurlandfillconn() 2328 if(strcasecompare("*", no_proxy)) { in check_noproxy() 2442 if(!prox && !strcasecompare("http_proxy", proxy_env)) { in detect_proxy() 3776 strcasecompare(conn->conn_to_host.name, conn->host.name)) { in create_conn()
|
D | pipeline.c | 180 if(strcasecompare(site->hostname, conn->host.name) && in Curl_pipeline_site_blacklisted()
|
D | mime.c | 1417 if(strcasecompare(encoding, mep->name)) { in curl_mime_encoder() 1661 if(len1 >= len2 && strcasecompare(nameend - len2, ctts[i].extension)) in Curl_mime_contenttype() 1719 strcasecompare(contenttype, "text/plain")) in Curl_mime_prepare_headers() 1795 if(strcasecompare(contenttype, "multipart/form-data")) in Curl_mime_prepare_headers()
|
D | content_encoding.c | 771 if(!strcasecompare(ce->name, CONTENT_ENCODING_DEFAULT)) in Curl_all_content_encodings() 783 if(!strcasecompare(ce->name, CONTENT_ENCODING_DEFAULT)) { in Curl_all_content_encodings()
|
D | setopt.c | 770 if(strcasecompare(argptr, "ALL")) { in vsetopt() 776 else if(strcasecompare(argptr, "SESS")) { in vsetopt() 782 else if(strcasecompare(argptr, "FLUSH")) { in vsetopt() 786 else if(strcasecompare(argptr, "RELOAD")) { in vsetopt()
|
D | urlapi.c | 658 if(url_has_scheme && strcasecompare(schemebuf, "file")) { in seturl() 1020 if(u->scheme && strcasecompare("file", u->scheme)) { in curl_url_get()
|
D | http.c | 794 strcasecompare(data->state.first_host, conn->host.name)) { in Curl_http_output_auth() 1848 !strcasecompare(data->state.first_host, conn->host.name))) in Curl_add_custom_headers() 2213 strcasecompare(data->state.first_host, conn->host.name))) { in Curl_http() 2312 if(strcasecompare("http", data->state.up.scheme)) { in Curl_http() 2340 if(strcasecompare("ftp", data->state.up.scheme)) { in Curl_http()
|
D | ssh.c | 610 if(!fingerprint || !strcasecompare(md5buffer, pubkey_md5)) { in ssh_check_fingerprint() 1170 if(strcasecompare("pwd", cmd)) { in ssh_statemach_act()
|
/external/curl/lib/vtls/ |
D | vtls.c | 341 if(strcasecompare(name, check->name) && in Curl_ssl_getsessionid() 344 strcasecompare(conn->conn_to_host.name, check->conn_to_host))) && in Curl_ssl_getsessionid() 349 strcasecompare(conn->handler->scheme, check->scheme) && in Curl_ssl_getsessionid() 1293 if(strcasecompare(env, available_backends[i]->info.name)) { in multissl_init() 1317 (name && strcasecompare(name, Curl_ssl->info.name)) ? in curl_global_sslset() 1327 (name && strcasecompare(available_backends[i]->info.name, name))) { in curl_global_sslset()
|
D | cyassl.c | 130 if(strcasecompare(type, "PEM")) in do_file_type() 132 if(strcasecompare(type, "DER")) in do_file_type()
|
D | gtls.c | 378 if(strcasecompare(type, "PEM")) in do_file_type() 380 if(strcasecompare(type, "DER")) in do_file_type()
|
D | openssl.c | 546 if(strcasecompare(type, "PEM")) in do_file_type() 548 if(strcasecompare(type, "DER")) in do_file_type() 550 if(strcasecompare(type, "ENG")) in do_file_type() 552 if(strcasecompare(type, "P12")) in do_file_type()
|