Lines Matching defs:data

50 static int check_gss_err(struct Curl_easy *data,
99 failf(data, "GSS-API error: %s failed: %s", function, buf);
107 struct Curl_easy *data)
128 const char *serviceptr = data->set.str[STRING_PROXY_SERVICE_NAME] ?
129 data->set.str[STRING_PROXY_SERVICE_NAME] : "rcmd";
166 if(check_gss_err(data, gss_major_status,
168 failf(data, "Failed to create service name.");
178 gss_major_status = Curl_gss_init_sec_context(data,
191 if(check_gss_err(data, gss_major_status,
197 failf(data, "Failed to initial GSS-API token.");
207 nwritten = Curl_conn_cf_send(cf->next, data, (char *)socksreq, 4, &code);
209 failf(data, "Failed to send GSS-API authentication request.");
217 nwritten = Curl_conn_cf_send(cf->next, data,
221 failf(data, "Failed to send GSS-API authentication token.");
246 result = Curl_blockread_all(cf, data, (char *)socksreq, 4, &actualread);
248 failf(data, "Failed to receive GSS-API authentication response.");
256 failf(data, "User was rejected by the SOCKS5 server (%d %d).",
264 failf(data, "Invalid GSS-API authentication response type (%d %d).",
277 failf(data,
285 result = Curl_blockread_all(cf, data, (char *)gss_recv_token.value,
289 failf(data, "Failed to receive GSS-API authentication token.");
305 if(check_gss_err(data, gss_major_status,
309 failf(data, "Failed to determine user name.");
314 if(check_gss_err(data, gss_major_status,
319 failf(data, "Failed to determine user name.");
334 infof(data, "SOCKS5 server authenticated user %s with GSS-API.",user);
342 gss_enc = 0; /* no data protection */
350 infof(data, "SOCKS5 server supports GSS-API %s data protection.",
352 /* force for the moment to no data protection */
384 if(data->set.socks5_gssapi_nec) {
400 if(check_gss_err(data, gss_major_status, gss_minor_status, "gss_wrap")) {
404 failf(data, "Failed to wrap GSS-API encryption value into token.");
413 nwritten = Curl_conn_cf_send(cf->next, data, (char *)socksreq, 4, &code);
415 failf(data, "Failed to send GSS-API encryption request.");
421 if(data->set.socks5_gssapi_nec) {
423 nwritten = Curl_conn_cf_send(cf->next, data, (char *)socksreq, 1, &code);
425 failf(data, "Failed to send GSS-API encryption type.");
431 nwritten = Curl_conn_cf_send(cf->next, data,
435 failf(data, "Failed to send GSS-API encryption type.");
443 result = Curl_blockread_all(cf, data, (char *)socksreq, 4, &actualread);
445 failf(data, "Failed to receive GSS-API encryption response.");
452 failf(data, "User was rejected by the SOCKS5 server (%d %d).",
459 failf(data, "Invalid GSS-API encryption response type (%d %d).",
474 result = Curl_blockread_all(cf, data, (char *)gss_recv_token.value,
478 failf(data, "Failed to receive GSS-API encryptrion type.");
484 if(!data->set.socks5_gssapi_nec) {
489 if(check_gss_err(data, gss_major_status, gss_minor_status, "gss_unwrap")) {
493 failf(data, "Failed to unwrap GSS-API encryption value into token.");
499 failf(data, "Invalid GSS-API encryption response length (%zu).",
511 failf(data, "Invalid GSS-API encryption response length (%zu).",
524 infof(data, "SOCKS5 access with%s protection granted.",
525 (socksreq[0] == 0)?"out GSS-API data":