- INSTALL-CMAKE.md: add missing periods, text fixes.
- md4, md5: sync variables names.
- curl_trc: sync an argument type.
- docs/examples: sync debug/trace function copies, constify, tidy-ups.
- replace commented code with `#if 0`.
- drop redundant parenthesis (macro values, `return`, around single
variables, function calls).
- fix indentation, apply clang-format in places.
Closes #20481
{
(void)argc;
argv[0][0] = ' ';
- return (argv[0][0] == ' ')?0:1;
+ return (argv[0][0] == ' ') ? 0 : 1;
}" HAVE_WRITABLE_ARGV)
endif()
## Feature detection variables
-By default this CMake build script detects the version of some dependencies
-using `check_symbol_exists`. Those checks do not work in the case that both
+By default the curl CMake build script detects the version of some dependencies
+using `check_symbol_exists()`. Those checks do not work in the case that both
CURL and its dependency are included as sub-projects in a larger build using
`FetchContent`. To support that case, additional variables may be defined by
the parent project, ideally in the "extra" find package redirect file:
- `curl-examples`: Build examples
Individual targets: `curl-example-<name>`,
where <name> is the .c filename without extension.
-- `curl-examples-build`: Build examples quickly but without the ability to run them (for build tests)
-- `curl-man`: Build man pages (built by default unless disabled)
-- `curl_uninstall`: Uninstall curl
-- `curl-completion-fish`: Build shell completions for fish (built by default if enabled)
-- `curl-completion-zsh`: Build shell completions for zsh (built by default if enabled)
-- `curl-ca-bundle`: Build the CA bundle via `scripts/mk-ca-bundle.pl`
-- `curl-ca-firefox`: Build the CA bundle via `scripts/firefox-db2pem.sh`
+- `curl-examples-build`: Build examples quickly but without the ability to run them. (for build tests)
+- `curl-man`: Build man pages. (built by default unless disabled)
+- `curl_uninstall`: Uninstall curl.
+- `curl-completion-fish`: Build shell completions for fish. (built by default if enabled)
+- `curl-completion-zsh`: Build shell completions for zsh. (built by default if enabled)
+- `curl-ca-bundle`: Build the CA bundle via `scripts/mk-ca-bundle.pl`.
+- `curl-ca-firefox`: Build the CA bundle via `scripts/firefox-db2pem.sh`.
- `curl-lint`: Run lint checks.
- `curl-listcats`: Generate help category constants for `src/tool_help.h` from documentation.
- `curl-listhelp`: Generate `src/tool_listhelp.c` from documentation.
}
#endif /* AF_INET6 */
-static curl_socket_t opensocket(void *clientp,
- curlsocktype purpose,
+static curl_socket_t opensocket(void *clientp, curlsocktype purpose,
struct curl_sockaddr *address)
{
/* filter the address */
char trace_ascii; /* 1 or 0 */
};
-static void dump(const char *text, FILE *stream, unsigned char *ptr,
+static void dump(const char *text, const unsigned char *ptr,
size_t size, char nohex)
{
size_t i;
/* without the hex output, we can fit more on screen */
width = 0x40;
- fprintf(stream, "%s, %10.10lu bytes (0x%8.8lx)\n",
+ fprintf(stderr, "%s, %10.10lu bytes (0x%8.8lx)\n",
text, (unsigned long)size, (unsigned long)size);
for(i = 0; i < size; i += width) {
- fprintf(stream, "%4.4lx: ", (unsigned long)i);
+ fprintf(stderr, "%4.4lx: ", (unsigned long)i);
if(!nohex) {
/* hex not disabled, show it */
for(c = 0; c < width; c++)
if(i + c < size)
- fprintf(stream, "%02x ", ptr[i + c]);
+ fprintf(stderr, "%02x ", ptr[i + c]);
else
- fputs(" ", stream);
+ fputs(" ", stderr);
}
for(c = 0; (c < width) && (i + c < size); c++) {
i += (c + 2 - width);
break;
}
- fprintf(stream, "%c",
+ fprintf(stderr, "%c",
(ptr[i + c] >= 0x20) && (ptr[i + c] < 0x80) ? ptr[i + c] : '.');
/* check again for 0D0A, to avoid an extra \n if it is at width */
if(nohex && (i + c + 2 < size) && ptr[i + c + 1] == 0x0D &&
break;
}
}
- fputc('\n', stream); /* newline */
+ fputc('\n', stderr); /* newline */
}
- fflush(stream);
}
static int my_trace(CURL *curl, curl_infotype type,
return 0;
}
- dump(text, stderr, (unsigned char *)data, size, config->trace_ascii);
+ dump(text, (const unsigned char *)data, size, config->trace_ascii);
return 0;
}
curl_easy_setopt(curl, CURLOPT_CHUNK_DATA, &data);
curl_easy_setopt(curl, CURLOPT_WRITEDATA, &data);
- /* curl_easy_setopt(curl, CURLOPT_VERBOSE, 1L); */
+#if 0
+ curl_easy_setopt(curl, CURLOPT_VERBOSE, 1L);
+#endif
/* set a URL containing wildcard pattern (only in the last part) */
if(argc == 2)
int main(void)
{
- char ftpurl[] = "ftp://ftp.example.com/gnu/binutils/binutils-2.19.1.tar.bz2";
+ static const char ftpurl[] =
+ "ftp://ftp.example.com/gnu/binutils/binutils-2.19.1.tar.bz2";
CURL *curl;
CURLcode result;
long filetime = -1;
curl_easy_setopt(curl, CURLOPT_HEADERFUNCTION, throw_away);
curl_easy_setopt(curl, CURLOPT_HEADER, 0L);
/* Switch on full protocol/debug output */
- /* curl_easy_setopt(curl, CURLOPT_VERBOSE, 1L); */
+#if 0
+ curl_easy_setopt(curl, CURLOPT_VERBOSE, 1L);
+#endif
result = curl_easy_perform(curl);
struct GlobalInfo *g = (struct GlobalInfo *)data;
CURLMcode mresult;
- mresult = curl_multi_socket_action(g->multi,
- CURL_SOCKET_TIMEOUT, 0, &g->still_running);
+ mresult = curl_multi_socket_action(g->multi, CURL_SOCKET_TIMEOUT, 0,
+ &g->still_running);
mcode_or_die("timer_cb: curl_multi_socket_action", mresult);
check_multi_info(g);
return FALSE;
}
else {
buf = g_malloc(BUF_SIZE + 1);
- while(TRUE) {
+ for(;;) {
buf[BUF_SIZE] = '\0';
g_io_channel_read_chars(ch, buf, BUF_SIZE, &len, &err);
if(len) {
(void)fd;
(void)kind;
- mresult = curl_multi_socket_action(g->multi,
- CURL_SOCKET_TIMEOUT, 0, &g->still_running);
+ mresult = curl_multi_socket_action(g->multi, CURL_SOCKET_TIMEOUT, 0,
+ &g->still_running);
mcode_or_die("timer_cb: curl_multi_socket_action", mresult);
check_multi_info(g);
}
int num;
};
-static void dump(const char *text, int num, unsigned char *ptr,
+static void dump(const char *text, int num, const unsigned char *ptr,
size_t size, char nohex)
{
size_t i;
return 0;
}
- dump(text, num, (unsigned char *)data, size, 1);
+ dump(text, num, (const unsigned char *)data, size, 1);
return 0;
}
static FILE *out_download;
-static void dump(const char *text, unsigned char *ptr, size_t size, char nohex)
+static void dump(const char *text, const unsigned char *ptr,
+ size_t size, char nohex)
{
size_t i;
size_t c;
return 0;
}
- dump(text, (unsigned char *)data, size, 1);
+ dump(text, (const unsigned char *)data, size, 1);
return 0;
}
(void)tzp;
if(tp) {
/* Offset between 1601-01-01 and 1970-01-01 in 100 nanosec units */
-#define WIN32_FT_OFFSET (116444736000000000)
+#define WIN32_FT_OFFSET 116444736000000000
union {
CURL_TYPEOF_CURL_OFF_T ns100; /* time since 1 Jan 1601 in 100ns units */
FILETIME ft;
return 0;
}
- dump(text, num, (unsigned char *)data, size, 1);
+ dump(text, num, (const unsigned char *)data, size, 1);
return 0;
}
#include <curl/curl.h>
-#define TRUE 1
-
-static void dump(const char *text, FILE *stream, const unsigned char *ptr,
+static void dump(const char *text, const unsigned char *ptr,
size_t size, char nohex)
{
size_t i;
/* without the hex output, we can fit more on screen */
width = 0x40;
- fprintf(stream, "%s, %10.10lu bytes (0x%8.8lx)\n",
+ fprintf(stderr, "%s, %10.10lu bytes (0x%8.8lx)\n",
text, (unsigned long)size, (unsigned long)size);
for(i = 0; i < size; i += width) {
- fprintf(stream, "%4.4lx: ", (unsigned long)i);
+ fprintf(stderr, "%4.4lx: ", (unsigned long)i);
if(!nohex) {
/* hex not disabled, show it */
for(c = 0; c < width; c++)
if(i + c < size)
- fprintf(stream, "%02x ", ptr[i + c]);
+ fprintf(stderr, "%02x ", ptr[i + c]);
else
- fputs(" ", stream);
+ fputs(" ", stderr);
}
for(c = 0; (c < width) && (i + c < size); c++) {
i += (c + 2 - width);
break;
}
- fprintf(stream, "%c",
+ fprintf(stderr, "%c",
(ptr[i + c] >= 0x20) && (ptr[i + c] < 0x80) ? ptr[i + c] : '.');
/* check again for 0D0A, to avoid an extra \n if it is at width */
if(nohex && (i + c + 2 < size) && ptr[i + c + 1] == 0x0D &&
break;
}
}
- fputc('\n', stream); /* newline */
+ fputc('\n', stderr); /* newline */
}
- fflush(stream);
}
static int my_trace(CURL *curl, curl_infotype type,
- unsigned char *data, size_t size,
- void *userp)
+ char *data, size_t size, void *userp)
{
const char *text;
return 0;
}
- dump(text, stderr, data, size, TRUE);
+ dump(text, (const unsigned char *)data, size, 1);
return 0;
}
do {
nsent = 0;
result = curl_easy_send(curl, request + nsent_total,
- request_len - nsent_total, &nsent);
+ request_len - nsent_total, &nsent);
nsent_total += nsent;
if(result == CURLE_AGAIN && !wait_on_socket(sockfd, 0, 60000L)) {
result = curl_easy_perform(curl);
if(CURLE_OK == result) {
result = curl_easy_getinfo(curl, CURLINFO_CONTENT_LENGTH_DOWNLOAD_T,
- &remoteFileSizeByte);
+ &remoteFileSizeByte);
if(result)
return -1;
printf("filesize: %" CURL_FORMAT_CURL_OFF_T "\n", remoteFileSizeByte);
gtk_widget_destroy(progress_bar);
/* [Un]Comment this out to kill the program rather than pushing close. */
- /* gtk_main_quit(); */
+#if 0
+ gtk_main_quit();
+#endif
return NULL;
}
/*
* Telnet option defines. Add more here if in need.
*/
-#define CURL_TELOPT_BINARY 0 /* binary 8-bit data */
-#define CURL_TELOPT_ECHO 1 /* just echo! */
-#define CURL_TELOPT_SGA 3 /* Suppress Go Ahead */
-#define CURL_TELOPT_EXOPL 255 /* EXtended OPtions List */
-#define CURL_TELOPT_TTYPE 24 /* Terminal TYPE */
-#define CURL_TELOPT_NAWS 31 /* Negotiate About Window Size */
-#define CURL_TELOPT_XDISPLOC 35 /* X DISPlay LOCation */
-
+#define CURL_TELOPT_BINARY 0 /* binary 8-bit data */
+#define CURL_TELOPT_ECHO 1 /* just echo! */
+#define CURL_TELOPT_SGA 3 /* Suppress Go Ahead */
+#define CURL_TELOPT_EXOPL 255 /* EXtended OPtions List */
+#define CURL_TELOPT_TTYPE 24 /* Terminal TYPE */
+#define CURL_TELOPT_NAWS 31 /* Negotiate About Window Size */
+#define CURL_TELOPT_XDISPLOC 35 /* X DISPlay LOCation */
#define CURL_TELOPT_NEW_ENVIRON 39 /* NEW ENVIRONment variables */
#define CURL_NEW_ENV_VAR 0
#define CURL_NEW_ENV_VALUE 1
"TERM SPEED", "LFLOW", "LINEMODE", "XDISPLOC",
"OLD-ENVIRON", "AUTHENTICATION", "ENCRYPT", "NEW-ENVIRON"
};
-#define CURL_TELOPT(x) telnetoptions[x]
+#define CURL_TELOPT(x) telnetoptions[x]
#else
-#define CURL_TELOPT(x) ""
+#define CURL_TELOPT(x) ""
#endif
#define CURL_TELOPT_MAXIMUM CURL_TELOPT_NEW_ENVIRON
#define CURL_TELQUAL_INFO 2
#define CURL_TELQUAL_NAME 3
-#define CURL_TELCMD_OK(x) (((unsigned int)(x) >= CURL_TELCMD_MINIMUM) && \
- ((unsigned int)(x) <= CURL_TELCMD_MAXIMUM))
+#define CURL_TELCMD_OK(x) \
+ (((unsigned int)(x) >= CURL_TELCMD_MINIMUM) && \
+ ((unsigned int)(x) <= CURL_TELCMD_MAXIMUM))
#ifdef CURLVERBOSE
-#define CURL_TELCMD(x) telnetcmds[(x) - CURL_TELCMD_MINIMUM]
+#define CURL_TELCMD(x) telnetcmds[(x) - CURL_TELCMD_MINIMUM]
#else
-#define CURL_TELCMD(x) ""
+#define CURL_TELCMD(x) ""
#endif
#endif /* CURL_DISABLE_TELNET */
(ares->happy_eyeballs_dns_time.tv_sec ||
ares->happy_eyeballs_dns_time.tv_usec) &&
(curlx_ptimediff_ms(Curl_pgrs_now(data),
- &ares->happy_eyeballs_dns_time) >=
+ &ares->happy_eyeballs_dns_time) >=
HAPPY_EYEBALLS_DNS_TIMEOUT)) {
/* Remember that the EXPIRE_HAPPY_EYEBALLS_DNS timer is no longer
running. */
ares->ares_status = ARES_ENOTFOUND;
ares->result = CURLE_OK;
-#if defined(CURLVERBOSE) && \
- ARES_VERSION >= 0x011800 /* >= v1.24.0 */
+#if defined(CURLVERBOSE) && ARES_VERSION >= 0x011800 /* >= v1.24.0 */
if(CURL_TRC_DNS_is_verbose(data)) {
char *csv = ares_get_servers_csv(ares->channel);
CURL_TRC_DNS(data, "asyn-ares: servers=%s", csv);
int pf = PF_INET;
memset(&hints, 0, sizeof(hints));
#ifdef CURLRES_IPV6
- if((ip_version != CURL_IPRESOLVE_V4) &&
- Curl_ipv6works(data)) {
+ if((ip_version != CURL_IPRESOLVE_V4) && Curl_ipv6works(data)) {
/* The stack seems to be IPv6-enabled */
if(ip_version == CURL_IPRESOLVE_V6)
pf = PF_INET6;
if(cf) {
struct Curl_easy *data = CF_DATA_CURRENT(cf);
CURLcode result;
- result = Curl_conn_cf_send(cf->next, data, buf, buflen,
- FALSE, pnwritten);
+ result = Curl_conn_cf_send(cf->next, data, buf, buflen, FALSE, pnwritten);
CURL_TRC_CF(data, cf, "[0] nw_out_writer(len=%zu) -> %d, %zu",
buflen, result, *pnwritten);
return result;
if(!nwritten)
return NGHTTP2_ERR_WOULDBLOCK;
- return (nwritten > SSIZE_MAX) ?
+ return (nwritten > SSIZE_MAX) ?
NGHTTP2_ERR_CALLBACK_FAILURE : (ssize_t)nwritten;
}
next_expire_ms = Curl_timeleft_ms(data);
if(next_expire_ms < 0) {
failf(data, "Connection timeout after %" FMT_OFF_T " ms",
- curlx_ptimediff_ms(Curl_pgrs_now(data),
- &data->progress.t_startsingle));
+ curlx_ptimediff_ms(Curl_pgrs_now(data),
+ &data->progress.t_startsingle));
return CURLE_OPERATION_TIMEDOUT;
}
*/
/* Default define to enable threaded asynchronous DNS lookups. */
-#if !defined(USE_SYNC_DNS) && !defined(USE_ARES) && \
- !defined(USE_THREADS_WIN32)
+#if !defined(USE_SYNC_DNS) && !defined(USE_ARES) && !defined(USE_THREADS_WIN32)
# define USE_THREADS_WIN32 1
#endif
} \
} while(0)
-#define CPOOL_UNLOCK(c,d) \
+#define CPOOL_UNLOCK(c, d) \
do { \
if(c) { \
DEBUGASSERT((c)->locked); \
*/
#define MAX_DATE_LENGTH 80
-#define COOKIE_NAME 0
-#define COOKIE_VALUE 1
+#define COOKIE_NAME 0
+#define COOKIE_VALUE 1
#define COOKIE_DOMAIN 2
-#define COOKIE_PATH 3
+#define COOKIE_PATH 3
#define COOKIE_PIECES 4 /* the list above */
* dereference it.
*/
DEBUGF(infof(data, "PSL check set-cookie '%s' for domain=%s in %s",
- co->name, co->domain, domain));
+ co->name, co->domain, domain));
if(data && (domain && co->domain && !Curl_host_is_ipnum(co->domain))) {
bool acceptable = FALSE;
char lcase[256];
(void)co;
(void)domain;
DEBUGF(infof(data, "NO PSL to check set-cookie '%s' for domain=%s in %s",
- co->name, co->domain, domain));
+ co->name, co->domain, domain));
#endif
return FALSE;
}
/* Add the connection to our shutdown list for non-blocking shutdown
* during multi processing. */
- if(max_total > 0 && (max_total <=
- (conns_in_pool + Curl_llist_count(&cshutdn->list)))) {
+ if(max_total > 0 &&
+ (max_total <= (conns_in_pool + Curl_llist_count(&cshutdn->list)))) {
CURL_TRC_M(data, "[SHUTDOWN] discarding oldest shutdown connection "
"due to connection limit of %zu", max_total);
cshutdn_destroy_oldest(cshutdn, data, NULL);
}
#endif
-#if defined(CURL_MEMDEBUG) && defined(HAVE_GETADDRINFO) && \
+#if defined(CURL_MEMDEBUG) && defined(HAVE_GETADDRINFO) && \
defined(HAVE_FREEADDRINFO)
/*
* curl_dbg_freeaddrinfo()
***************************************************************************/
#include "curl_setup.h"
-#if !defined(CURL_DISABLE_COOKIES) || !defined(CURL_DISABLE_ALTSVC) || \
+#if !defined(CURL_DISABLE_COOKIES) || !defined(CURL_DISABLE_ALTSVC) || \
!defined(CURL_DISABLE_HSTS)
#include "urldata.h"
***************************************************************************/
#include "curl_setup.h"
-#if !defined(CURL_DISABLE_COOKIES) || !defined(CURL_DISABLE_ALTSVC) || \
+#if !defined(CURL_DISABLE_COOKIES) || !defined(CURL_DISABLE_ALTSVC) || \
!defined(CURL_DISABLE_HSTS) || !defined(CURL_DISABLE_NETRC)
#include "curl_get_line.h"
-#define appendnl(b) curlx_dyn_addn(buf, "\n", 1)
+#define appendnl(b) curlx_dyn_addn(buf, "\n", 1)
/*
* Curl_get_line() returns only complete whole lines that end with newline.
# define DES_set_key_unchecked wolfSSL_DES_set_key_unchecked
# define DES_ecb_encrypt wolfSSL_DES_ecb_encrypt
# define DESKEY(x) ((WOLFSSL_DES_key_schedule *)(x))
-
-# if defined(LIBWOLFSSL_VERSION_HEX) && \
- (LIBWOLFSSL_VERSION_HEX >= 0x05007006)
+# if defined(LIBWOLFSSL_VERSION_HEX) && LIBWOLFSSL_VERSION_HEX >= 0x05007006
# define DES_ENCRYPT WC_DES_ENCRYPT
# define DES_DECRYPT WC_DES_DECRYPT
# endif
-
# else
# define DESKEY(x) &x
# endif
des_encrypt(&des, 8, results + 8, plaintext);
setup_des_key(keys + 14, &des);
des_encrypt(&des, 8, results + 16, plaintext);
-#elif defined(USE_MBEDTLS_DES) || defined(USE_OS400CRYPTO) || \
+#elif defined(USE_MBEDTLS_DES) || defined(USE_OS400CRYPTO) || \
defined(USE_WIN32_CRYPTO)
encrypt_des(plaintext, results, keys);
encrypt_des(plaintext, results + 8, keys + 7);
des_encrypt(&des, 8, lmbuffer, magic);
setup_des_key(pw + 7, &des);
des_encrypt(&des, 8, lmbuffer + 8, magic);
-#elif defined(USE_MBEDTLS_DES) || defined(USE_OS400CRYPTO) || \
+#elif defined(USE_MBEDTLS_DES) || defined(USE_OS400CRYPTO) || \
defined(USE_WIN32_CRYPTO)
encrypt_des(magic, lmbuffer, pw);
encrypt_des(magic, lmbuffer + 8, pw + 7);
/* Macro to strip 'const' without triggering a compiler warning.
Use it for APIs that do not or cannot support the const qualifier. */
#ifdef HAVE_UINTPTR_T
-# define CURL_UNCONST(p) ((void *)(uintptr_t)(const void *)(p))
+#define CURL_UNCONST(p) ((void *)(uintptr_t)(const void *)(p))
#else
-# define CURL_UNCONST(p) ((void *)(p)) /* Fall back to simple cast */
+#define CURL_UNCONST(p) ((void *)(p)) /* Fall back to simple cast */
#endif
#ifdef USE_SCHANNEL
*/
#ifdef USE_WINSOCK
#define SOCKERRNO ((int)WSAGetLastError())
-#define SET_SOCKERRNO(x) (WSASetLastError((int)(x)))
+#define SET_SOCKERRNO(x) WSASetLastError((int)(x))
#else
-#define SOCKERRNO (errno)
+#define SOCKERRNO errno
#define SET_SOCKERRNO(x) (errno = (x))
#endif
#define CURL_GOOD_SHARE 0x7e117a1e
#define GOOD_SHARE_HANDLE(x) ((x) && (x)->magic == CURL_GOOD_SHARE)
-#define CURL_SHARE_KEEP_CONNECT(s) \
- ((s) && ((s)->specifier & (1 << CURL_LOCK_DATA_CONNECT)))
+#define CURL_SHARE_KEEP_CONNECT(s) \
+ ((s) && ((s)->specifier & (1 << CURL_LOCK_DATA_CONNECT)))
/* this struct is libcurl-private, do not export details */
struct Curl_share {
}
}
-static void trc_apply_level_by_category(int category, int lvl)
+static void trc_apply_level_by_category(unsigned int category, int lvl)
{
size_t i;
if(!pollrc) {
/* timeout! */
ev->ms = 0;
- /* curl_mfprintf(stderr, "call curl_multi_socket_action(TIMEOUT)\n"); */
+#if 0
+ curl_mfprintf(stderr, "call curl_multi_socket_action(TIMEOUT)\n");
+#endif
mresult = curl_multi_socket_action(multi, CURL_SOCKET_TIMEOUT, 0,
&ev->running_handles);
}
goto fail;
result = canon_path(data->state.up.path, strlen(data->state.up.path),
- &canonical_path,
- should_urlencode(&service));
+ &canonical_path,
+ should_urlencode(&service));
if(result)
goto fail;
result = CURLE_OUT_OF_MEMORY;
DEBUGASSERT(!imapc->ssldone);
result = Curl_conn_connect(data, FIRSTSOCKET, FALSE, &ssldone);
DEBUGF(infof(data, "imap_perform_upgrade_tls, connect -> %d, %d",
- result, ssldone));
+ result, ssldone));
if(!result && ssldone) {
imapc->ssldone = ssldone;
/* perform CAPA now, changes imapc->state out of IMAP_UPGRADETLS */
/* Prepare the mime data if some. */
if(IS_MIME_POST(data)) {
curl_mimepart *postp = data->set.mimepostp;
+
/* Use the whole structure as data. */
postp->flags &= ~(unsigned int)MIME_BODY_ONLY;
return CC_MD4_Init(ctx);
}
-static void MD4_Update(MD4_CTX *ctx, const void *data, unsigned long size)
+static void MD4_Update(MD4_CTX *ctx, const void *input, unsigned long len)
{
- (void)CC_MD4_Update(ctx, data, (CC_LONG)size);
+ (void)CC_MD4_Update(ctx, input, (CC_LONG)len);
}
-static void MD4_Final(unsigned char *result, MD4_CTX *ctx)
+static void MD4_Final(unsigned char *digest, MD4_CTX *ctx)
{
- (void)CC_MD4_Final(result, ctx);
+ (void)CC_MD4_Final(digest, ctx);
}
#elif defined(USE_WIN32_CRYPTO)
return 1;
}
-static void MD4_Update(MD4_CTX *ctx, const void *data, unsigned long size)
+static void MD4_Update(MD4_CTX *ctx, const void *input, unsigned long len)
{
- CryptHashData(ctx->hHash, (const BYTE *)data, (unsigned int)size, 0);
+ CryptHashData(ctx->hHash, (const BYTE *)input, (unsigned int)len, 0);
}
-static void MD4_Final(unsigned char *result, MD4_CTX *ctx)
+static void MD4_Final(unsigned char *digest, MD4_CTX *ctx)
{
unsigned long length = 0;
CryptGetHashParam(ctx->hHash, HP_HASHVAL, NULL, &length, 0);
if(length == MD4_DIGEST_LENGTH)
- CryptGetHashParam(ctx->hHash, HP_HASHVAL, result, &length, 0);
+ CryptGetHashParam(ctx->hHash, HP_HASHVAL, digest, &length, 0);
if(ctx->hHash)
CryptDestroyHash(ctx->hHash);
return 1;
}
-static void MD4_Update(MD4_CTX *ctx, const void *data, unsigned long size)
+static void MD4_Update(MD4_CTX *ctx, const void *input, unsigned long len)
{
- md4_update(ctx, size, data);
+ md4_update(ctx, len, input);
}
-static void MD4_Final(unsigned char *result, MD4_CTX *ctx)
+static void MD4_Final(unsigned char *digest, MD4_CTX *ctx)
{
- md4_digest(ctx, MD4_DIGEST_SIZE, result);
+ md4_digest(ctx, MD4_DIGEST_SIZE, digest);
}
#else
* the bit counters. There are no alignment requirements.
*/
static const void *my_md4_body(MD4_CTX *ctx,
- const void *data, unsigned long size)
+ const void *input, unsigned long size)
{
const unsigned char *ptr;
uint32_t a, b, c, d;
- ptr = (const unsigned char *)data;
+ ptr = (const unsigned char *)input;
a = ctx->a;
b = ctx->b;
ctx->lo = 0;
ctx->hi = 0;
+
return 1;
}
-static void MD4_Update(MD4_CTX *ctx, const void *data, unsigned long size)
+static void MD4_Update(MD4_CTX *ctx, const void *input, unsigned long len)
{
uint32_t saved_lo;
unsigned long used;
saved_lo = ctx->lo;
- ctx->lo = (saved_lo + size) & 0x1fffffff;
+ ctx->lo = (saved_lo + len) & 0x1fffffff;
if(ctx->lo < saved_lo)
ctx->hi++;
- ctx->hi += (uint32_t)size >> 29;
+ ctx->hi += (uint32_t)len >> 29;
used = saved_lo & 0x3f;
if(used) {
unsigned long available = 64 - used;
- if(size < available) {
- memcpy(&ctx->buffer[used], data, size);
+ if(len < available) {
+ memcpy(&ctx->buffer[used], input, len);
return;
}
- memcpy(&ctx->buffer[used], data, available);
- data = (const unsigned char *)data + available;
- size -= available;
+ memcpy(&ctx->buffer[used], input, available);
+ input = (const unsigned char *)input + available;
+ len -= available;
my_md4_body(ctx, ctx->buffer, 64);
}
- if(size >= 64) {
- data = my_md4_body(ctx, data, size & ~(unsigned long)0x3f);
- size &= 0x3f;
+ if(len >= 64) {
+ input = my_md4_body(ctx, input, len & ~(unsigned long)0x3f);
+ len &= 0x3f;
}
- memcpy(ctx->buffer, data, size);
+ memcpy(ctx->buffer, input, len);
}
-static void MD4_Final(unsigned char *result, MD4_CTX *ctx)
+static void MD4_Final(unsigned char *digest, MD4_CTX *ctx)
{
unsigned long used, available;
my_md4_body(ctx, ctx->buffer, 64);
- result[0] = curlx_ultouc((ctx->a) & 0xff);
- result[1] = curlx_ultouc((ctx->a >> 8) & 0xff);
- result[2] = curlx_ultouc((ctx->a >> 16) & 0xff);
- result[3] = curlx_ultouc(ctx->a >> 24);
- result[4] = curlx_ultouc((ctx->b) & 0xff);
- result[5] = curlx_ultouc((ctx->b >> 8) & 0xff);
- result[6] = curlx_ultouc((ctx->b >> 16) & 0xff);
- result[7] = curlx_ultouc(ctx->b >> 24);
- result[8] = curlx_ultouc((ctx->c) & 0xff);
- result[9] = curlx_ultouc((ctx->c >> 8) & 0xff);
- result[10] = curlx_ultouc((ctx->c >> 16) & 0xff);
- result[11] = curlx_ultouc(ctx->c >> 24);
- result[12] = curlx_ultouc((ctx->d) & 0xff);
- result[13] = curlx_ultouc((ctx->d >> 8) & 0xff);
- result[14] = curlx_ultouc((ctx->d >> 16) & 0xff);
- result[15] = curlx_ultouc(ctx->d >> 24);
+ digest[0] = curlx_ultouc((ctx->a) & 0xff);
+ digest[1] = curlx_ultouc((ctx->a >> 8) & 0xff);
+ digest[2] = curlx_ultouc((ctx->a >> 16) & 0xff);
+ digest[3] = curlx_ultouc(ctx->a >> 24);
+ digest[4] = curlx_ultouc((ctx->b) & 0xff);
+ digest[5] = curlx_ultouc((ctx->b >> 8) & 0xff);
+ digest[6] = curlx_ultouc((ctx->b >> 16) & 0xff);
+ digest[7] = curlx_ultouc(ctx->b >> 24);
+ digest[8] = curlx_ultouc((ctx->c) & 0xff);
+ digest[9] = curlx_ultouc((ctx->c >> 8) & 0xff);
+ digest[10] = curlx_ultouc((ctx->c >> 16) & 0xff);
+ digest[11] = curlx_ultouc(ctx->c >> 24);
+ digest[12] = curlx_ultouc((ctx->d) & 0xff);
+ digest[13] = curlx_ultouc((ctx->d >> 8) & 0xff);
+ digest[14] = curlx_ultouc((ctx->d >> 16) & 0xff);
+ digest[15] = curlx_ultouc(ctx->d >> 24);
memset(ctx, 0, sizeof(*ctx));
}
#endif /* CRYPTO LIBS */
-CURLcode Curl_md4it(unsigned char *output, const unsigned char *input,
- const size_t len)
+CURLcode Curl_md4it(unsigned char *output,
+ const unsigned char *input, const size_t len)
{
MD4_CTX ctx;
}
static void my_md5_update(void *ctx,
- const unsigned char *input,
- unsigned int inputLen)
+ const unsigned char *input, unsigned int len)
{
- md5_update(ctx, inputLen, input);
+ md5_update(ctx, len, input);
}
static void my_md5_final(unsigned char *digest, void *ctx)
}
static void my_md5_update(void *ctx,
- const unsigned char *input,
- unsigned int len)
+ const unsigned char *input, unsigned int len)
{
(void)MD5_Update(ctx, input, len);
}
}
static void my_md5_update(void *ctx,
- const unsigned char *input,
- unsigned int len)
+ const unsigned char *input, unsigned int len)
{
(void)wolfSSL_MD5_Update(ctx, input, len);
}
}
static void my_md5_update(void *ctx,
- const unsigned char *data,
- unsigned int length)
+ const unsigned char *input, unsigned int len)
{
- (void)psa_hash_update(ctx, data, length);
+ (void)psa_hash_update(ctx, input, len);
}
static void my_md5_final(unsigned char *digest, void *ctx)
}
static void my_md5_update(void *ctx,
- const unsigned char *input,
- unsigned int inputLen)
+ const unsigned char *input, unsigned int len)
{
- CC_MD5_Update(ctx, input, inputLen);
+ CC_MD5_Update(ctx, input, len);
}
static void my_md5_final(unsigned char *digest, void *ctx)
}
static void my_md5_update(void *in,
- const unsigned char *input,
- unsigned int inputLen)
+ const unsigned char *input, unsigned int len)
{
my_md5_ctx *ctx = in;
- CryptHashData(ctx->hHash, (const BYTE *)input, inputLen, 0);
+ CryptHashData(ctx->hHash, (const BYTE *)input, len, 0);
}
static void my_md5_final(unsigned char *digest, void *in)
return CURLE_OK;
}
-static void my_md5_update(void *in, const unsigned char *data,
- unsigned int size)
+static void my_md5_update(void *in,
+ const unsigned char *input, unsigned int len)
{
uint32_t saved_lo;
unsigned int used;
my_md5_ctx *ctx = (my_md5_ctx *)in;
saved_lo = ctx->lo;
- ctx->lo = (saved_lo + size) & 0x1fffffff;
+ ctx->lo = (saved_lo + len) & 0x1fffffff;
if(ctx->lo < saved_lo)
ctx->hi++;
- ctx->hi += (uint32_t)size >> 29;
+ ctx->hi += (uint32_t)len >> 29;
used = saved_lo & 0x3f;
if(used) {
unsigned int available = 64 - used;
- if(size < available) {
- memcpy(&ctx->buffer[used], data, size);
+ if(len < available) {
+ memcpy(&ctx->buffer[used], input, len);
return;
}
- memcpy(&ctx->buffer[used], data, available);
- data = (const unsigned char *)data + available;
- size -= available;
+ memcpy(&ctx->buffer[used], input, available);
+ input = (const unsigned char *)input + available;
+ len -= available;
my_md5_body(ctx, ctx->buffer, 64);
}
- if(size >= 64) {
- data = my_md5_body(ctx, data, size & ~(unsigned long)0x3f);
- size &= 0x3f;
+ if(len >= 64) {
+ input = my_md5_body(ctx, input, len & ~(unsigned long)0x3f);
+ len &= 0x3f;
}
- memcpy(ctx->buffer, data, size);
+ memcpy(ctx->buffer, input, len);
}
-static void my_md5_final(unsigned char *result, void *in)
+static void my_md5_final(unsigned char *digest, void *in)
{
unsigned int used, available;
my_md5_ctx *ctx = (my_md5_ctx *)in;
my_md5_body(ctx, ctx->buffer, 64);
- result[0] = curlx_ultouc((ctx->a) & 0xff);
- result[1] = curlx_ultouc((ctx->a >> 8) & 0xff);
- result[2] = curlx_ultouc((ctx->a >> 16) & 0xff);
- result[3] = curlx_ultouc(ctx->a >> 24);
- result[4] = curlx_ultouc((ctx->b) & 0xff);
- result[5] = curlx_ultouc((ctx->b >> 8) & 0xff);
- result[6] = curlx_ultouc((ctx->b >> 16) & 0xff);
- result[7] = curlx_ultouc(ctx->b >> 24);
- result[8] = curlx_ultouc((ctx->c) & 0xff);
- result[9] = curlx_ultouc((ctx->c >> 8) & 0xff);
- result[10] = curlx_ultouc((ctx->c >> 16) & 0xff);
- result[11] = curlx_ultouc(ctx->c >> 24);
- result[12] = curlx_ultouc((ctx->d) & 0xff);
- result[13] = curlx_ultouc((ctx->d >> 8) & 0xff);
- result[14] = curlx_ultouc((ctx->d >> 16) & 0xff);
- result[15] = curlx_ultouc(ctx->d >> 24);
+ digest[0] = curlx_ultouc((ctx->a) & 0xff);
+ digest[1] = curlx_ultouc((ctx->a >> 8) & 0xff);
+ digest[2] = curlx_ultouc((ctx->a >> 16) & 0xff);
+ digest[3] = curlx_ultouc(ctx->a >> 24);
+ digest[4] = curlx_ultouc((ctx->b) & 0xff);
+ digest[5] = curlx_ultouc((ctx->b >> 8) & 0xff);
+ digest[6] = curlx_ultouc((ctx->b >> 16) & 0xff);
+ digest[7] = curlx_ultouc(ctx->b >> 24);
+ digest[8] = curlx_ultouc((ctx->c) & 0xff);
+ digest[9] = curlx_ultouc((ctx->c >> 8) & 0xff);
+ digest[10] = curlx_ultouc((ctx->c >> 16) & 0xff);
+ digest[11] = curlx_ultouc(ctx->c >> 24);
+ digest[12] = curlx_ultouc((ctx->d) & 0xff);
+ digest[13] = curlx_ultouc((ctx->d >> 8) & 0xff);
+ digest[14] = curlx_ultouc((ctx->d >> 16) & 0xff);
+ digest[15] = curlx_ultouc(ctx->d >> 24);
memset(ctx, 0, sizeof(*ctx));
}
* @unittest: 1601
* Returns CURLE_OK on success.
*/
-CURLcode Curl_md5it(unsigned char *outbuffer, const unsigned char *input,
- const size_t len)
+CURLcode Curl_md5it(unsigned char *output,
+ const unsigned char *input, const size_t len)
{
CURLcode result;
my_md5_ctx ctx;
result = my_md5_init(&ctx);
if(!result) {
my_md5_update(&ctx, input, curlx_uztoui(len));
- my_md5_final(outbuffer, &ctx);
+ my_md5_final(output, &ctx);
}
return result;
}
}
CURLcode Curl_MD5_update(struct MD5_context *context,
- const unsigned char *data,
- unsigned int len)
+ const unsigned char *input, unsigned int len)
{
- (*context->md5_hash->md5_update_func)(context->md5_hashctx, data, len);
+ (*context->md5_hash->md5_update_func)(context->md5_hashctx, input, len);
return CURLE_OK;
}
DEBUGASSERT(!pop3c->ssldone);
result = Curl_conn_connect(data, FIRSTSOCKET, FALSE, &ssldone);
DEBUGF(infof(data, "pop3_perform_upgrade_tls, connect -> %d, %d",
- result, ssldone));
+ result, ssldone));
if(!result && ssldone) {
pop3c->ssldone = ssldone;
/* perform CAPA now, changes pop3c->state out of POP3_UPGRADETLS */
return result;
if(!Curl_bufq_is_empty(&data->req.sendbuf)) {
DEBUGF(infof(data, "Curl_req_flush(len=%zu) -> EAGAIN",
- Curl_bufq_len(&data->req.sendbuf)));
+ Curl_bufq_len(&data->req.sendbuf)));
return CURLE_AGAIN;
}
}
* just as under Linux (e.g. <sys/socket.h>) and the Winsock headers should
* never be included when __CYGWIN__ is defined.
*/
-
#ifdef _WIN32
# if defined(UNICODE) && !defined(_UNICODE)
# error "UNICODE is defined but _UNICODE is not defined"
* those symbols to compare against, and even those that do may be missing
* newer symbols.
*/
-
#ifndef _WIN32_WINNT_VISTA
#define _WIN32_WINNT_VISTA 0x0600 /* Windows Vista */
#endif
}
*peos = (bool)ctx->eos;
DEBUGF(infof(data, "cr_eob_read(%zu) -> %d, %zd, %d",
- blen, result, *pnread, *peos));
+ blen, result, *pnread, *peos));
return result;
}
DEBUGASSERT(!smtpc->ssldone);
result = Curl_conn_connect(data, FIRSTSOCKET, FALSE, &ssldone);
DEBUGF(infof(data, "smtp_perform_upgrade_tls, connect -> %d, %d",
- result, ssldone));
+ result, ssldone));
if(!result && ssldone) {
smtpc->ssldone = ssldone;
/* perform EHLO now, changes smtp->state out of SMTP_UPGRADETLS */
/* Establish whether we should report SMTPUTF8 to the server for this
mailbox as per RFC-6531 sect. 3.1 point 6 */
- utf8 = (smtpc->utf8_supported) &&
- ((host.encalloc) || (!Curl_is_ASCII_name(address)) ||
- (!Curl_is_ASCII_name(host.name)));
+ utf8 = smtpc->utf8_supported &&
+ (host.encalloc ||
+ !Curl_is_ASCII_name(address) ||
+ !Curl_is_ASCII_name(host.name));
/* Send the VRFY command (Note: The hostname part may be absent when the
host is a local system) */
/* Establish whether we should report SMTPUTF8 to the server for this
mailbox as per RFC-6531 sect. 3.1 point 4 and sect. 3.4 */
- utf8 = (smtpc->utf8_supported) &&
- ((host.encalloc) || (!Curl_is_ASCII_name(address)) ||
- (!Curl_is_ASCII_name(host.name)));
+ utf8 = smtpc->utf8_supported &&
+ (host.encalloc ||
+ !Curl_is_ASCII_name(address) ||
+ !Curl_is_ASCII_name(host.name));
if(host.name) {
from = curl_maprintf("<%s@%s>%s", address, host.name, suffix);
/* Establish whether we should report SMTPUTF8 to the server for this
mailbox as per RFC-6531 sect. 3.1 point 4 and sect. 3.4 */
- if((!utf8) && (smtpc->utf8_supported) &&
- ((host.encalloc) || (!Curl_is_ASCII_name(address)) ||
- (!Curl_is_ASCII_name(host.name))))
+ if(!utf8 && smtpc->utf8_supported &&
+ (host.encalloc ||
+ !Curl_is_ASCII_name(address) ||
+ !Curl_is_ASCII_name(host.name)))
utf8 = TRUE;
if(host.name) {
if(bytestoread && Curl_rlimit_active(&data->progress.dl.rlimit)) {
curl_off_t dl_avail = Curl_rlimit_avail(&data->progress.dl.rlimit,
Curl_pgrs_now(data));
- /* DEBUGF(infof(data, "dl_rlimit, available=%" FMT_OFF_T, dl_avail));
- */
+#if 0
+ DEBUGF(infof(data, "dl_rlimit, available=%" FMT_OFF_T, dl_avail));
+#endif
/* In case of rate limited downloads: if this loop already got
* data and less than 16k is left in the limit, break out.
* We want to stutter a bit to keep in the limit, but too small
if(data->req.download_done && data->req.no_body &&
!data->req.resp_trailer) {
DEBUGF(infof(data, "EAGAIN, download done, no trailer announced, "
- "not waiting for EOS"));
+ "not waiting for EOS"));
blen = 0;
/* continue as if we received the EOS */
}
sshc1 = Curl_conn_meta_get(one, CURL_META_SSH_CONN);
sshc2 = Curl_conn_meta_get(two, CURL_META_SSH_CONN);
- return (sshc1 && sshc2 && Curl_safecmp(sshc1->rsa, sshc2->rsa) &&
- Curl_safecmp(sshc1->rsa_pub, sshc2->rsa_pub));
+ return sshc1 && sshc2 && Curl_safecmp(sshc1->rsa, sshc2->rsa) &&
+ Curl_safecmp(sshc1->rsa_pub, sshc2->rsa_pub);
}
#endif
case 30:
if(!(m->data->state.http_neg.allowed & CURL_HTTP_V3x)) {
DEBUGF(infof(m->data, "not reusing conn #%" CURL_FORMAT_CURL_OFF_T
- ", we do not want h3", conn->connection_id));
+ ", we do not want h3", conn->connection_id));
return FALSE;
}
break;
case 20:
if(!(m->data->state.http_neg.allowed & CURL_HTTP_V2x)) {
DEBUGF(infof(m->data, "not reusing conn #%" CURL_FORMAT_CURL_OFF_T
- ", we do not want h2", conn->connection_id));
+ ", we do not want h2", conn->connection_id));
return FALSE;
}
break;
default:
if(!(m->data->state.http_neg.allowed & CURL_HTTP_V1x)) {
DEBUGF(infof(m->data, "not reusing conn #%" CURL_FORMAT_CURL_OFF_T
- ", we do not want h1", conn->connection_id));
+ ", we do not want h1", conn->connection_id));
return FALSE;
}
break;
}
/* We are in an IMAPS vs IMAP like case. We expect `conn` to have SSL */
if(!Curl_conn_is_ssl(conn, FIRSTSOCKET)) {
- DEBUGF(infof(m->data,
- "Connection #%" FMT_OFF_T " has compatible protocol family, "
- "but no SSL, no match", conn->connection_id));
+ DEBUGF(infof(m->data, "Connection #%" FMT_OFF_T
+ " has compatible protocol family, but no SSL, no match",
+ conn->connection_id));
return FALSE;
}
}
/* If talking TLS, conn needs to use the same SSL options. */
if((m->needle->scheme->flags & PROTOPT_SSL) &&
!Curl_ssl_conn_config_match(m->data, conn, FALSE)) {
- DEBUGF(infof(m->data,
- "Connection #%" FMT_OFF_T
+ DEBUGF(infof(m->data, "Connection #%" FMT_OFF_T
" has different SSL parameters, cannot reuse",
conn->connection_id));
return FALSE;
0, pnwritten);
if(result)
goto out;
-
if(!stream->h1.done) {
/* need more data */
goto out;
#include "../vtls/vtls.h"
/* HTTP/3 error values defined in RFC 9114, ch. 8.1 */
-#define CURL_H3_NO_ERROR (0x0100)
+#define CURL_H3_NO_ERROR 0x0100
#define QUIC_MAX_STREAMS (100)
|N|V|V|V| |
| |1|2|3| |
*/
-#define WSBIT_FIN (0x80)
-#define WSBIT_RSV1 (0x40)
-#define WSBIT_RSV2 (0x20)
-#define WSBIT_RSV3 (0x10)
+#define WSBIT_FIN 0x80
+#define WSBIT_RSV1 0x40
+#define WSBIT_RSV2 0x20
+#define WSBIT_RSV3 0x10
#define WSBIT_RSV_MASK (WSBIT_RSV1 | WSBIT_RSV2 | WSBIT_RSV3)
-#define WSBIT_OPCODE_CONT (0x0)
-#define WSBIT_OPCODE_TEXT (0x1)
-#define WSBIT_OPCODE_BIN (0x2)
-#define WSBIT_OPCODE_CLOSE (0x8)
-#define WSBIT_OPCODE_PING (0x9)
-#define WSBIT_OPCODE_PONG (0xa)
-#define WSBIT_OPCODE_MASK (0xf)
+#define WSBIT_OPCODE_CONT 0x0
+#define WSBIT_OPCODE_TEXT 0x1
+#define WSBIT_OPCODE_BIN 0x2
+#define WSBIT_OPCODE_CLOSE 0x8
+#define WSBIT_OPCODE_PING 0x9
+#define WSBIT_OPCODE_PONG 0xa
+#define WSBIT_OPCODE_MASK 0xf
#define WSBIT_MASK 0x80
}
dec->head_len = 1;
- /* ws_dec_info(dec, data, "seeing opcode"); */
+#if 0
+ ws_dec_info(dec, data, "seeing opcode");
+#endif
continue;
}
else if(dec->head_len == 1) {
Curl_bufq_skip(inraw, 1);
++dec->head_len;
if(dec->head_len < dec->head_total) {
- /* ws_dec_info(dec, data, "decoding head"); */
+#if 0
+ ws_dec_info(dec, data, "decoding head");
+#endif
continue;
}
}
/* Commented here to prevent future bugs: A program or user should */
/* never ever enable DECC$POSIX_STYLE_UID. */
/* It will probably break all code that accesses UIDs */
- /* do_not_set_default("DECC$POSIX_STYLE_UID", TRUE); */
+#if 0
+ do_not_set_default("DECC$POSIX_STYLE_UID", TRUE);
+#endif
}
/* Some boilerplate to force this to be a proper LIB$INITIALIZE section */
#pragma extern_model strict_refdef "LIB$INITIALIZE" nowrt, long, nopic
#else
#pragma extern_model strict_refdef "LIB$INITIALIZE" nowrt, long
-# if __INITIAL_POINTER_SIZE
-# pragma __pointer_size __save
-# pragma __pointer_size 32
-# else
-# pragma __required_pointer_size __save
-# pragma __required_pointer_size 32
-# endif
+# if __INITIAL_POINTER_SIZE
+# pragma __pointer_size __save
+# pragma __pointer_size 32
+# else
+# pragma __required_pointer_size __save
+# pragma __required_pointer_size 32
+# endif
#endif
/* Set our contribution to the LIB$INITIALIZE array */
void (* const iniarray[])(void) = { set_features };
#ifndef __VAX
-# if __INITIAL_POINTER_SIZE
-# pragma __pointer_size __restore
-# else
-# pragma __required_pointer_size __restore
-# endif
+# if __INITIAL_POINTER_SIZE
+# pragma __pointer_size __restore
+# else
+# pragma __required_pointer_size __restore
+# endif
#endif
/*
* get_terminal_columns() returns the number of columns in the current
* terminal. It will return 79 on failure. Also, the number can be big.
*/
-
unsigned int get_terminal_columns(void)
{
unsigned int width = 0;
# ifdef S_IFCHR
# define S_ISCHR(m) (((m) & S_IFMT) == S_IFCHR)
# else
-# define S_ISCHR(m) (0) /* cannot tell if file is a device */
+# define S_ISCHR(m) 0 /* cannot tell if file is a device */
# endif
#endif
/* detect e2 80 80 - e2 80 ff */
static bool has_leading_unicode(const unsigned char *arg)
{
- return ((arg[0] == 0xe2) && (arg[1] == 0x80) && (arg[2] & 0x80));
+ return (arg[0] == 0xe2) && (arg[1] == 0x80) && (arg[2] & 0x80);
}
/* the longest command line option, excluding the leading -- */
}
err = getparameter(orig_opt, nextarg, &passarg, config,
- CONFIG_MAX_LEVELS);
+ CONFIG_MAX_LEVELS);
unicodefree(CURL_UNCONST(nextarg));
config = global->last;
static bool has_trailing_slash(const char *input)
{
size_t len = strlen(input);
- return (len && input[len - 1] == '/');
+ return len && input[len - 1] == '/';
}
static char *ipfs_gateway(void)
if(!uploadfile)
return TRUE; /* download */
if(checkprefix("http://", url) || checkprefix("https://", url))
- return TRUE; /* HTTP(S) upload */
+ return TRUE; /* HTTP(S) upload */
return FALSE; /* non-HTTP upload, probably no output should be expected */
}
/* all value flags contained in rest */
rest &= ~nv->value; /* remove bits handled here */
result = easysrc_addf(&easysrc_code, "%s(long)%s%s",
- preamble, nv->name, rest ? " |" : ");");
+ preamble, nv->name, rest ? " |" : ");");
if(!rest || result)
break; /* handled them all */
/* replace with all spaces for continuation line */
/* return TRUE if the error code is "lethal" */
bool setopt_bad(CURLcode result)
{
- return (result && (result != CURLE_NOT_BUILT_IN) &&
- (result != CURLE_UNKNOWN_OPTION));
+ return result &&
+ (result != CURLE_NOT_BUILT_IN) &&
+ (result != CURLE_UNKNOWN_OPTION);
}
if(curlx_dyn_len(&glob->buf)) {
/* we got a literal string, add it as a single-item list */
result = glob_fixed(glob, curlx_dyn_ptr(&glob->buf),
- curlx_dyn_len(&glob->buf));
+ curlx_dyn_len(&glob->buf));
if(!result)
result = add_glob(glob, pos);
curlx_dyn_reset(&glob->buf);
void vms_special_exit(int code, int vms_show);
#undef exit
-#define exit(__code) vms_special_exit((__code), (0))
+#define exit(__code) vms_special_exit(__code, 0)
#define VMS_STS(c, f, e, s) \
(((c & 0xF) << 28) | ((f & 0xFFF) << 16) | ((e & 0x1FFF) < 3) | (s & 7))
curl_share_setopt(share, CURLSHOPT_SHARE, CURL_LOCK_DATA_COOKIE);
curl_share_setopt(share, CURLSHOPT_SHARE, CURL_LOCK_DATA_DNS);
curl_share_setopt(share, CURLSHOPT_SHARE, CURL_LOCK_DATA_SSL_SESSION);
- /* curl_share_setopt(share, CURLSHOPT_SHARE, CURL_LOCK_DATA_CONNECT); */
+#if 0
+ curl_share_setopt(share, CURLSHOPT_SHARE, CURL_LOCK_DATA_CONNECT);
+#endif
curl_share_setopt(share, CURLSHOPT_SHARE, CURL_LOCK_DATA_PSL);
curl_share_setopt(share, CURLSHOPT_SHARE, CURL_LOCK_DATA_HSTS);
{
CURL *curl = (CURL *)clientp;
curl_easy_pause(curl, CURLPAUSE_CONT);
- /* curl_easy_pause(curl, CURLPAUSE_RECV_CONT); */
+#if 0
+ curl_easy_pause(curl, CURLPAUSE_RECV_CONT);
+#endif
}
#endif
return 0;
static CURLcode test_lib1509(const char *URL)
{
- long headerSize;
- CURLcode code;
CURL *curl = NULL;
+ CURLcode code;
CURLcode result = CURLE_OK;
+ long headerSize;
global_init(CURL_GLOBAL_ALL);
/* include headers in the output */
test_setopt(curl, CURLOPT_HEADER, 1L);
+#if 0
/* detect HTTP error codes >= 400 */
- /* test_setopt(curl, CURLOPT_FAILONERROR, 1L); */
+ test_setopt(curl, CURLOPT_FAILONERROR, 1L);
+#endif
/* Perform the request, result will get the return code */
result = curl_easy_perform(curl);
static CURLcode test_lib1556(const char *URL)
{
- CURLcode code;
CURL *curl = NULL;
+ CURLcode code;
CURLcode result = CURLE_OK;
struct headerinfo info = { 0 };
#error "this test requires FD_SETSIZE"
#endif
-#define T518_SAFETY_MARGIN (16)
+#define T518_SAFETY_MARGIN 16
#define NUM_OPEN (FD_SETSIZE + 10)
#define NUM_NEEDED (NUM_OPEN + T518_SAFETY_MARGIN)
#error "this test requires FD_SETSIZE"
#endif
-#define T537_SAFETY_MARGIN (11)
+#define T537_SAFETY_MARGIN 11
#if defined(_WIN32) || defined(MSDOS)
#define DEV_NULL "NUL"
if(message_size - i > RTP_DATA_SIZE) {
if(memcmp(RTP_DATA, data + i, RTP_DATA_SIZE) != 0) {
curl_mprintf("RTP PAYLOAD CORRUPTED [%s]\n", data + i);
- /* return failure; */
+#if 0
+ return failure;
+#endif
}
}
else {
if(memcmp(RTP_DATA, data + i, message_size - i) != 0) {
curl_mprintf("RTP PAYLOAD END CORRUPTED (%d), [%s]\n",
message_size - i, data + i);
- /* return failure; */
+#if 0
+ return failure;
+#endif
}
}
}
clear_advisor_read_lock(loglockfile);
}
- /* logmsg("end of one transfer"); */
+#if 0
+ logmsg("end of one transfer");
+#endif
}
dnsd_cleanup: