unsigned int prev_alarm=0;
struct SessionHandle *data = conn->data;
#endif /* USE_ALARM_TIMEOUT */
-
- int rc = CURLRESOLV_ERROR; /* error by default */
+ int rc;
*entry = NULL;
if(sigsetjmp(curl_jmpenv, 1)) {
/* this is coming from a siglongjmp() after an alarm signal */
failf(data, "name lookup timed out");
- return rc;
+ return CURLRESOLV_ERROR;
}
/*************************************************************
if(result)
return result;
}
+#else
+ (void)request;
+ (void)path;
#endif
if(auth) {
infof(data, "Proxy auth using %s with user '%s'\n",
int test(char *URL)
{
CURL *curl;
- CURLcode res;
+ CURLcode res = CURLE_FAILED_INIT;
int i;
struct curl_slist *headerlist=NULL, *hl;
int main(int argc, char *argv[])
{
int arg=1;
- char *host;
+ const char *host = NULL;
int rc;
while(argc>arg) {
fd_set fds_read;
fd_set fds_write;
fd_set fds_err;
- curl_socket_t sockfd;
- curl_socket_t maxfd;
+ curl_socket_t sockfd = CURL_SOCKET_BAD;
+ curl_socket_t maxfd = CURL_SOCKET_BAD;
ssize_t rc;
ssize_t nread_socket;
ssize_t bytes_written;
ssize_t buffer_len;
- int error;
+ int error = 0;
/* 'buffer' is this excessively large only to be able to support things like
test 1003 which tests exceedingly large server response lines */
static void storerequest(char *reqbuf, ssize_t totalsize)
{
int res;
- int error;
+ int error = 0;
ssize_t written;
ssize_t writeleft;
FILE *dump;
char *reqbuf = req->reqbuf;
ssize_t got = 0;
- char *pipereq;
+ char *pipereq = NULL;
int pipereq_length = 0;
if(req->pipelining) {
bool persistant = TRUE;
bool sendfailure = FALSE;
size_t responsesize;
- int error;
+ int error = 0;
int res;
static char weare[256];
void set_advisor_read_lock(const char *filename)
{
FILE *lockfile;
- int error;
+ int error = 0;
int res;
do {
void clear_advisor_read_lock(const char *filename)
{
- int error;
+ int error = 0;
int res;
do {