Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

curlmopt_pipelining_server_bl(3) [mojave man page]

CURLMOPT_PIPELINING_SERVER_BL(3)			     curl_multi_setopt options				  CURLMOPT_PIPELINING_SERVER_BL(3)

NAME
CURLMOPT_PIPELINING_SERVER_BL - pipelining server blacklist SYNOPSIS
#include <curl/curl.h> CURLMcode curl_multi_setopt(CURLM *handle, CURLMOPT_PIPELINING_SERVER_BL, char **servers); DESCRIPTION
Pass a servers array of char *, ending with a NULL entry. This is a list of server types prefixes (in the Server: HTTP header) that are blacklisted from pipelining, i.e server types that are known to not support HTTP pipelining. The array is copied by libcurl. Note that the comparison matches if the Server: header begins with the string in the blacklist, i.e "Server: Ninja 1.2.3" and "Server: Ninja 1.4.0" can both be blacklisted by having "Ninja" in the backlist. Pass a NULL pointer to clear the blacklist. DEFAULT
The default value is NULL, which means that there is no blacklist. PROTOCOLS
EXAMPLE
server_blacklist[] = { "Microsoft-IIS/6.0", "nginx/0.8.54", NULL }; curl_multi_setopt(m, CURLMOPT_PIPELINING_SERVER_BL, server_blacklist); AVAILABILITY
Added in 7.30.0 RETURN VALUE
Returns CURLM_OK if the option is supported, and CURLM_UNKNOWN_OPTION if not. SEE ALSO
CURLMOPT_PIPELINING(3), CURLMOPT_PIPELINING_SITE_BL(3), libcurl 7.54.0 February 03, 2016 CURLMOPT_PIPELINING_SERVER_BL(3)

Check Out this Related Man Page

CURLMOPT_PIPELINING_SITE_BL(3)				     curl_multi_setopt options				    CURLMOPT_PIPELINING_SITE_BL(3)

NAME
CURLMOPT_PIPELINING_SITE_BL - pipelining host blacklist SYNOPSIS
#include <curl/curl.h> CURLMcode curl_multi_setopt(CURLM *handle, CURLMOPT_PIPELINING_SITE_BL, char **hosts); DESCRIPTION
Pass a hosts array of char *, ending with a NULL entry. This is a list of sites that are blacklisted from pipelining, i.e sites that are known to not support HTTP pipelining. The array is copied by libcurl. Pass a NULL pointer to clear the blacklist. DEFAULT
The default value is NULL, which means that there is no blacklist. PROTOCOLS
HTTP(S) EXAMPLE
site_blacklist[] = { "www.haxx.se", "www.example.com:1234", NULL }; curl_multi_setopt(m, CURLMOPT_PIPELINING_SITE_BL, site_blacklist); AVAILABILITY
Added in 7.30.0 RETURN VALUE
Returns CURLM_OK if the option is supported, and CURLM_UNKNOWN_OPTION if not. SEE ALSO
CURLMOPT_PIPELINING(3), CURLMOPT_PIPELINING_SERVER_BL(3), libcurl 7.54.0 February 03, 2016 CURLMOPT_PIPELINING_SITE_BL(3)
Man Page

4 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

redirect connection

I have two UX servers ( eg. Server A , Server B ) , the users use Netterm as emulator to telnet to connect to these servers , each server have assigned a dedicated IP address ( eg. Server A --> 192.168.1.1 , Server B --> 192.168.1.2 ) , now if a user want to connect Server A , he need to telnet to... (1 Reply)
Discussion started by: ust
1 Replies

2. Shell Programming and Scripting

Creating Report file with 'vlookup' kind of structure in shell

Hi, I have some files in the following structure. File_a.txt Field_1 Pass Field_2 Pass Field_3 Pass File_b.txt Field_1 Pass Field_2 Fail Field_3 Pass File_c.txt Field_1 Fail Field_2 Pass Field_3 Pass (2 Replies)
Discussion started by: vikaskm
2 Replies

3. Shell Programming and Scripting

Search string at a particular position in a file

Hi, i have a text file as : abc 0 1 Pass hjk 1 1 Pass bhk 0 0 Fail jjh 8 2 Pass nkji 0 1 Pass Now I want to check that if 1st column is jjh , then , store the value of 3rd string of that line in a variable. Hence, 2... (8 Replies)
Discussion started by: Anamika08
8 Replies

4. Open Source

Block ip csf

Hi I want to ip Unlike the rules of conduct For 15 minutes to be blacklisted Which part should I change settings file With special thanks (2 Replies)
Discussion started by: mnnn
2 Replies