Lines Matching +full:- +full:- +full:without +full:- +full:ntlm +full:- +full:auth
20 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
23 * SPDX-License-Identifier: curl
157 /* return the count of bytes sent, or -1 on error */
164 /* return the count of bytes read, or -1 on error */
191 #include "c-hyper.h"
192 #include "cf-socket.h"
234 (((x) && ((x)->magic == CURLEASY_MAGIC_NUMBER))? TRUE: \
238 ((x) && ((x)->magic == CURLEASY_MAGIC_NUMBER))
242 /* Types needed for krb5-ftp connections */
276 /* SSL backend-specific data; declared differently by each SSL backend */
359 int conn_to_port; /* remote port for the connection (may be -1) */
369 /* Struct used for Digest challenge-response authentication */
388 BIT(stale); /* set true for re-negotiation */
428 /* Struct used for SCRAM-SHA-1 authentication */
437 /* Struct used for NTLM challenge-response authentication */
460 void *target_info; /* TargetInfo received in the ntlm type-2 message */
499 #define CONN_IS_PROXIED(x) x->bits.proxy
511 This is implicit when SSL-protocols are used through
515 in a CONNECT request with auth, so that
517 BIT(proxy); /* if set, this transfer is done through a proxy - any type */
522 BIT(altused); /* this is an alt-svc "redirect" */
530 BIT(do_more); /* this is set TRUE if the ->curl_do_more() function is
531 supposed to be called, after ->curl_do() */
535 re-attempted at another connection. */
569 char *encalloc; /* allocated IDN-encoded version of the name */
593 * This is used in HTTP for 'Expect: 100-continue' waiting. */
601 (((data)->req.keepon & KEEP_SENDBITS) == KEEP_SEND)
604 (((data)->req.keepon & KEEP_RECVBITS) == KEEP_RECV)
612 void *resolver; /* resolver state, if it is used in the URL state -
634 /* Explicit values for first two symbols so as to match hard-coded
640 /* Space here for (possibly build-specific) additional slot definitions */
676 /* This function *MAY* be set to a protocol-dependent function that is run
680 * should call the ->connecting() function until it is.
709 /* This function *MAY* be set to a protocol-dependent function that is run
741 curl_prot_t protocol; /* See CURLPROTO_* - this needs to be the single
744 non-TLS name of the protocol this is */
753 /* some protocols will have to call the underlying functions without regard to
769 #define PROTOPT_PROXY_AS_HTTP (1<<11) /* allow this non-HTTP scheme over a
819 other easy handle without careful consideration (== only for
821 #define CONN_INUSE(c) ((c)->easyq.size)
871 struct ConnectBits bits; /* various state-flags for this connection */
900 #if defined(USE_KERBEROS5) /* Consider moving some of the above GSS-API */
906 /*************** Request - specific items ************/
924 struct ntlmdata ntlm; /* NTLM differs from other authentication schemes member
927 struct ntlmdata proxyntlm; /* NTLM data for proxy */
934 struct negotiatedata negotiate; /* state data for host Negotiate auth */
935 struct negotiatedata proxyneg; /* state data for proxy Negotiate auth */
989 that subsequent bound-requested connections aren't accidentally reusing
1021 ((c)->bits.socksproxy ? (c)->socks_proxy.host.dispname : \
1022 (c)->bits.httpproxy ? (c)->http_proxy.host.dispname : \
1023 (c)->bits.conn_to_host ? (c)->conn_to_host.dispname : \
1024 (c)->host.dispname)
1027 (c)->bits.conn_to_host ? (c)->conn_to_host.dispname : \
1028 (c)->host.dispname
1041 time_t filetime; /* If requested, this is might get set. Set to -1 if the
1044 unsigned long proxyauthavail; /* what proxy auth types were announced */
1045 unsigned long httpauthavail; /* what host auth types were announced */
1049 curl_off_t retry_after; /* info from Retry-After: header */
1056 session handle without disturbing information which is still alive, and
1137 struct auth { struct
1143 BIT(done); /* TRUE when the auth phase is done and ready to do the argument
1146 auth multipass negotiation */
1147 BIT(iestyle); /* TRUE if digest should be done IE-style or FALSE if it
1182 EXPIRE_HAPPY_EYEBALLS_DNS, /* See asyn-ares.c */
1231 curl_off_t lastconnect_id; /* The last connection, -1 if undefined */
1256 /* storage for the previous bag^H^H^HSIGPIPE signal handler :-) */
1260 struct digestdata digest; /* state data for host Digest auth */
1261 struct digestdata proxydigest; /* state data for proxy Digest auth */
1263 struct auth authhost; /* auth details for host */
1264 struct auth authproxy; /* auth details for proxy */
1281 /* do FTP line-end conversions on most platforms */
1300 curl_off_t infilesize; /* size of file to upload, -1 means unknown.
1303 struct Curl_data_priority priority; /* shallow copy of data->set */
1317 curl_mimepart *formp; /* storage for old API form-posting, allocated on
1369 unsigned char httpwant; /* when non-zero, a specific HTTP version requested
1375 unsigned char select_bits; /* != 0 -> bitmask of socket events for this
1466 STRING_ENCODING, /* Accept-Encoding string */
1486 STRING_USERAGENT, /* User-Agent string */
1503 STRING_SSH_PRIVATE_KEY, /* path to the private key file for auth */
1504 STRING_SSH_PUBLIC_KEY, /* path to the public key file for auth */
1514 STRING_TLSAUTH_USERNAME, /* TLS auth <username> */
1515 STRING_TLSAUTH_PASSWORD, /* TLS auth <password> */
1517 STRING_TLSAUTH_USERNAME_PROXY, /* TLS auth <username> */
1518 STRING_TLSAUTH_PASSWORD_PROXY, /* TLS auth <password> */
1552 /* -- end of null-terminated strings -- */
1556 /* -- below this are pointers to binary data that cannot be strdup'ed. --- */
1560 STRING_LAST /* not used, just an end-of-list marker */
1588 void *writeheader; /* write the header to this if non-NULL */
1592 long maxredirs; /* maximum no. of http(s) redirects to follow, set to -1
1623 curl_prereq_callback fprereq; /* pre-initial request callback */
1624 void *prereq_userp; /* pre-initial request user data */
1646 curl_off_t filesize; /* size of file to upload, -1 means unknown */
1668 unsigned char httpwant; /* when non-zero, a specific HTTP version requested
1674 unsigned short proxyport; /* If non-zero, use this port number by
1685 void *private_data; /* application-private data */
1690 file 0 - whatever, 1 - v2, 2 - v6 */
1694 unsigned char ftpsslauth; /* what AUTH XXX to try: curl_ftpauth */
1703 1 - create directories that don't exist
1704 2 - the same but also allow MKD to fail once
1715 int ssh_auth_types; /* allowed SSH auth types */
1730 void *rtp_out; /* write RTP to this if non-NULL */
1744 /* GSS-API credential delegation, see the documentation of
1776 unsigned char use_ssl; /* if AUTH TLS is to be attempted etc, for FTP or
1783 BIT(is_fread_set); /* has read callback been set to non-NULL? */
1825 BIT(http_transfer_encoding); /* request compressed HTTP transfer-encoding */
1842 transfer-encoded (chunked, compressed) */
1844 content-encoded (chunked, compressed) */
1869 BIT(doh); /* DNS-over-HTTPS enabled */
1884 #define IS_MIME_POST(a) ((a)->set.mimepost.kind != MIMEKIND_NONE)
1913 a non-negative number to distinguish this transfer from
1941 struct Curl_multi *multi; /* if non-NULL, points to the multi handle
1944 struct Curl_multi *multi_easy; /* if non-NULL, points to the multi handle
1951 struct SingleRequest req; /* Request-specific data */
1963 struct altsvcinfo *asi; /* the alt-svc cache */