/third_party/curl/lib/vtls/ |
H A D | gtls.c | 175 infof(data, "%s", str); in showtime() 288 infof(data, "gnutls_handshake() warning: %s", strerr); in handshake() 438 infof(data, "Using TLS-SRP username: %s", config->username); in gtls_client_init() 464 infof(data, "error reading native ca store (%s), continuing anyway", in gtls_client_init() 467 infof(data, "found %d certificates in native ca store", rc); in gtls_client_init() 482 infof(data, "error reading ca cert file %s (%s)%s", in gtls_client_init() 491 infof(data, "found %d certificates in %s", rc, config->CAfile); in gtls_client_init() 500 infof(data, "error reading ca cert file %s (%s)%s", in gtls_client_init() 509 infof(data, "found %d certificates in %s", rc, config->CApath); in gtls_client_init() 524 infof(dat in gtls_client_init() [all...] |
H A D | schannel.c | 135 * #define infof(x, y, ...) printf(y, __VA_ARGS__) 484 DEBUGF(infof(data, "schannel: disabled server certificate revocation " in schannel_acquire_credential_handle() 491 DEBUGF(infof(data, "schannel: ignore revocation offline errors")); in schannel_acquire_credential_handle() 496 DEBUGF(infof(data, in schannel_acquire_credential_handle() 504 DEBUGF(infof(data, in schannel_acquire_credential_handle() 510 DEBUGF(infof(data, "schannel: verifyhost setting prevents Schannel from " in schannel_acquire_credential_handle() 518 infof(data, "schannel: disabled automatic use of client certificate"); in schannel_acquire_credential_handle() 521 infof(data, "schannel: enabled automatic use of client certificate"); in schannel_acquire_credential_handle() 990 infof(data, "schannel: WARNING: This version of Schannel may " in schannel_acquire_credential_handle() 1072 DEBUGF(infof(dat in schannel_connect_step1() [all...] |
H A D | wolfssl.c | 401 infof(data, "wolfSSL <3.3.0 cannot be configured to use TLS 1.0-1.2, " in wolfssl_connect_step1() 493 infof(data, "Cipher selection: %s", ciphers); in wolfssl_connect_step1() 521 infof(data, "error importing native CA store, continuing anyway"); in wolfssl_connect_step1() 525 infof(data, "successfully imported native CA store"); in wolfssl_connect_step1() 536 infof(data, "error importing CA certificate blob, continuing anyway"); in wolfssl_connect_step1() 545 infof(data, "successfully imported CA certificate blob"); in wolfssl_connect_step1() 570 infof(data, "error setting certificate verify locations," in wolfssl_connect_step1() 576 infof(data, "successfully set certificate verify locations:"); in wolfssl_connect_step1() 578 infof(data, " CAfile: %s", ssl_cafile ? ssl_cafile : "none"); in wolfssl_connect_step1() 579 infof(dat in wolfssl_connect_step1() [all...] |
H A D | openssl.c | 518 infof(data, " Unable to load public key"); in Curl_ossl_certchain() 1047 infof(data, "libcurl is now using a weak random seed"); in ossl_seed() 1843 infof(data, "set default crypto engine '%s'", in ossl_set_engine_default() 2001 infof(data, "SSL_ERROR_WANT_READ"); in ossl_shutdown() 2005 infof(data, "SSL_ERROR_WANT_WRITE"); in ossl_shutdown() 2037 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN"); in ossl_shutdown() 2040 infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN"); in ossl_shutdown() 2043 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|" in ossl_shutdown() 2104 infof(data, " subjectAltName: host \"%s\" matched cert's \"%s\"", in subj_alt_hostcheck() 2227 infof(dat in Curl_ossl_verifyhost() [all...] |
H A D | schannel_verify.c | 210 infof(data, in add_certs_data_to_store() 215 infof(data, in add_certs_data_to_store() 434 infof(data, "schannel: Empty DNS name."); in cert_get_name_string() 544 infof(data, in Curl_verify_host() 553 infof(data, in Curl_verify_host() 638 infof(data, "schannel: reusing certificate store from cache"); in Curl_verify_certificate()
|
/third_party/curl/lib/ |
H A D | telnet.c | 275 infof(data, "%s IAC %s", direction, CURL_TELCMD(option)); in printoption() 277 infof(data, "%s IAC %d", direction, option); in printoption() 294 infof(data, "%s %s %s", direction, fmt, opt); in printoption() 296 infof(data, "%s %s %d", direction, fmt, option); in printoption() 299 infof(data, "%s %d %d", direction, cmd, option); in printoption() 673 infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT"); in printsub() 681 infof(data, "(terminated by "); in printsub() 683 infof(data, "%s ", CURL_TELOPT(i)); in printsub() 685 infof(data, "%s ", CURL_TELCMD(i)); in printsub() 687 infof(dat in printsub() [all...] |
H A D | curl_range.c | 58 DEBUGF(infof(data, "RANGE %" CURL_FORMAT_CURL_OFF_T " to end of file", in Curl_range() 65 DEBUGF(infof(data, "RANGE the last %" CURL_FORMAT_CURL_OFF_T " bytes", in Curl_range() 82 DEBUGF(infof(data, "RANGE from %" CURL_FORMAT_CURL_OFF_T in Curl_range() 86 DEBUGF(infof(data, "range-download from %" CURL_FORMAT_CURL_OFF_T in Curl_range()
|
H A D | transfer.c | 178 infof(data, in Curl_fillreadbuffer() 202 infof(data, "Successfully compiled trailers."); in Curl_fillreadbuffer() 350 infof(data, "Signaling end of chunked upload after trailers."); in Curl_fillreadbuffer() 357 infof(data, in Curl_fillreadbuffer() 397 infof(data, in Curl_meets_timecondition() 405 infof(data, in Curl_meets_timecondition() 445 DEBUGF(infof(data, "readwrite_data: we're done")); in Curl_xfer_recv_resp() 523 DEBUGF(infof(data, "nread == 0, stream closed, bailing")); in readwrite_data() 525 DEBUGF(infof(data, "nread <= 0, server closed connection, bailing")); in readwrite_data() 561 infof(dat in readwrite_data() [all...] |
H A D | ftp.c | 281 infof(data, "Connection accepted from server"); in AcceptServerConnect() 375 infof(data, "Checking for server connect"); in ReceivedServerConnect() 385 infof(data, "There is negative response in cache while serv connect"); in ReceivedServerConnect() 406 infof(data, "Ready to accept data connection from server"); in ReceivedServerConnect() 414 infof(data, "Ctrl conn has data while waiting for data conn"); in ReceivedServerConnect() 441 DEBUGF(infof(data, "ftp InitiateTransfer()")); in InitiateTransfer() 489 infof(data, "Preparing for accepting server on data port"); in AllowServerConnect() 524 DEBUGF(infof(data, "ftp AllowServerConnect() -> %d", result)); in AllowServerConnect() 596 infof(data, "We got a 421 - timeout"); in ftp_readresp() 772 infof(dat in _ftp_state() [all...] |
H A D | hostip.c | 311 infof(data, "Hostname in DNS cache was stale, zapped"); in fetch_addr() 337 infof(data, "Hostname in DNS cache doesn't have needed family, zapped"); in fetch_addr() 416 infof(data, "Shuffling %i addresses", num_addrs); in Curl_shuffle_addr() 715 infof(data, "Hostname %s was found in DNS cache", hostname); in Curl_resolv() 983 infof(data, "timeout on name lookup is not supported"); in Curl_resolv_timeout() 1131 infof(data, "Bad syntax CURLOPT_RESOLVE removal entry '%s'", in Curl_loadhostpairs() 1215 infof(data, "Ignoring resolve address '%s', missing IPv6 support.", in Curl_loadhostpairs() 1223 infof(data, "Resolve address '%s' found illegal", address); in Curl_loadhostpairs() 1259 infof(data, "RESOLVE %.*s:%d - old addresses discarded", in Curl_loadhostpairs() 1293 infof(dat in Curl_loadhostpairs() [all...] |
H A D | ws.c | 117 infof(data, "WS-DEC: %s [%s%s]", msg, in ws_dec_info() 123 infof(data, "WS-DEC: %s [%s%s](%d/%d)", msg, in ws_dec_info() 129 infof(data, "WS-DEC: %s [%s%s payload=%" CURL_FORMAT_CURL_OFF_T in ws_dec_info() 280 /* infof(data, "WS-DEC: passed %zd bytes payload, %" in ws_dec_pass_payload() 308 infof(data, "WS: decode error %d", (int)result); in ws_dec_pass() 402 infof(data, "WS: auto-respond to PING with a PONG"); in ws_cw_dec_next() 444 infof(data, "WS: error adding data to buffer %d", result); in ws_cw_write() 462 infof(data, "WS: decode error %d", (int)result); in ws_cw_write() 468 infof(data, "WS: decode ending with %zd frame bytes remaining", in ws_cw_write() 490 infof(dat in ws_enc_info() [all...] |
H A D | socks.c | 203 infof(data, in socksstate() 300 infof(data, "SOCKS4%s: connecting to HTTP proxy %s port %d", in do_SOCKS4() 303 infof(data, "SOCKS4 communication to %s:%d", in do_SOCKS4() 331 infof(data, "SOCKS4 non-blocking resolve of %s", sx->hostname); in do_SOCKS4() 351 infof(data, "Hostname '%s' was found", sx->hostname); in do_SOCKS4() 389 infof(data, "SOCKS4 connect to IPv4 %s (locally resolved)", buf); in do_SOCKS4() 515 infof(data, "SOCKS4%s request granted.", protocol4a?"a":""); in do_SOCKS4() 597 infof(data, "SOCKS5: connecting to HTTP proxy %s port %d", in do_SOCKS5() 608 infof(data, in do_SOCKS5() 822 infof(dat in do_SOCKS5() [all...] |
H A D | tftp.c | 241 infof(state->data, in tftp_set_timeouts() 329 infof(data, "got option=(%s) value=(%s)", option, value); in tftp_parse_option_ack() 360 infof(data, "%s (%d) %s (%d)", "blksize parsed from OACK", in tftp_parse_option_ack() 367 infof(data, "%s (%ld)", "tsize parsed from OACK", tsize); in tftp_parse_option_ack() 401 infof(data, "%s", "Connected for transmit"); in tftp_connect_for_tx() 417 infof(data, "%s", "Connected for receive"); in tftp_connect_for_rx() 600 infof(data, "Received last DATA packet block %d again.", rblock); in tftp_rx() 604 infof(data, in tftp_rx() 656 infof(data, in tftp_rx() 728 infof(dat in tftp_tx() [all...] |
H A D | cf-h1-proxy.c | 133 infof(data, "allocate connect buffer"); in tunnel_init() 177 infof(data, "CONNECT phase completed"); in h1_tunnel_go_state() 233 infof(data, "Establish HTTP proxy tunnel to %s", req->authority); in start_CONNECT() 318 infof(data, "Ignoring Content-Length in CONNECT %03d response", in on_resp_header() 334 infof(data, "Ignoring Transfer-Encoding in " in on_resp_header() 340 infof(data, "CONNECT responded chunked"); in on_resp_header() 408 infof(data, "Proxy CONNECT connection closed"); in recv_CONNECT_resp() 442 infof(data, "chunk reading DONE"); in recv_CONNECT_resp() 491 infof(data, "Ignore %" CURL_FORMAT_CURL_OFF_T in recv_CONNECT_resp() 495 infof(dat in recv_CONNECT_resp() [all...] |
H A D | http.c | 493 infof(data, "Rewind stream before next send"); in http_perhapsrewind() 503 infof(data, "NTLM send, close instead of sending %" in http_perhapsrewind() 521 infof(data, "Rewind stream before next send"); in http_perhapsrewind() 531 infof(data, "NEGOTIATE send, close instead of sending %" in http_perhapsrewind() 548 infof(data, "Please rewind output before next send"); in http_perhapsrewind() 587 infof(data, "Forcing HTTP/1.1 for NTLM"); in Curl_http_auth_act() 752 infof(data, "%s auth using %s with user '%s'", in output_auth_headers() 760 infof(data, "Server auth using %s with user '%s'", in output_auth_headers() 1009 infof(data, "Authentication problem. Ignoring this."); in Curl_http_input_auth() 1016 infof(dat in Curl_http_input_auth() [all...] |
H A D | krb5.c | 266 infof(data, "Trying against %s", (char *)output_buffer.value); in krb5_auth() 293 infof(data, "Error creating security context"); in krb5_auth() 304 infof(data, "base64-encoding: %s", curl_easy_strerror(result)); in krb5_auth() 332 infof(data, "Server didn't accept auth data"); in krb5_auth() 642 infof(data, "Send: %s%s", prot_level == PROT_PRIVATE?enc:mic, in do_sec_send() 749 infof(data, "Trying to change the protection level after the" in sec_set_protection_level() 831 infof(data, "Failed initialization for %s. Skipping it.", in choose_mech() 837 infof(data, "Trying mechanism %s...", mech->name); in choose_mech() 845 infof(data, "Mechanism %s is not supported by the server (server " in choose_mech() 849 infof(dat in choose_mech() [all...] |
H A D | url.c | 561 infof(data, "Closing connection"); in conn_shutdown() 640 DEBUGF(infof(data, "Curl_disconnect(conn #%" in Curl_disconnect() 648 DEBUGF(infof(data, "Curl_disconnect when inuse: %zu", CONN_INUSE(conn))); in Curl_disconnect() 757 infof(data, "Too old connection (%" CURL_FORMAT_TIMEDIFF_T in conn_maxage() 766 infof(data, in conn_maxage() 832 infof(data, "Connection %" CURL_FORMAT_CURL_OFF_T " seems to be dead", in extract_if_dead() 962 infof(data, "Found bundle for host: %p [%s]", in ConnectionExists() 972 infof(data, "Server doesn't support multiplex yet, wait"); in ConnectionExists() 977 infof(data, "Server doesn't support multiplex (yet)"); in ConnectionExists() 983 infof(dat in ConnectionExists() [all...] |
H A D | c-hyper.c | 83 DEBUGF(infof(data, "Curl_hyper_recv(%zu)", buflen)); in Curl_hyper_recv() 87 DEBUGF(infof(data, "Curl_hyper_recv(%zu) -> EAGAIN", buflen)); in Curl_hyper_recv() 101 DEBUGF(infof(data, "Curl_hyper_recv(%zu) -> %zd", buflen, nread)); in Curl_hyper_recv() 113 DEBUGF(infof(data, "Curl_hyper_send(%zu)", buflen)); in Curl_hyper_send() 118 DEBUGF(infof(data, "Curl_hyper_send(%zu) -> EAGAIN", buflen)); in Curl_hyper_send() 133 DEBUGF(infof(data, "Curl_hyper_send(%zu) -> %zd", buflen, nwrote)); in Curl_hyper_send() 215 infof(data, "Connection closed while negotiating NTLM"); in hyper_body_chunk() 241 infof(data, "Return early from hyper_body_chunk"); in hyper_body_chunk() 363 infof(data, "Done waiting for 100-continue"); in Curl_hyper_stream() 397 infof(dat in Curl_hyper_stream() [all...] |
H A D | curl_trc.h | 74 #define infof(data, ...) \ macro 82 #define infof Curl_infof macro
|
H A D | http_ntlm.c | 105 infof(data, "NTLM auth restarted"); in Curl_input_ntlm() 109 infof(data, "NTLM handshake rejected"); in Curl_input_ntlm() 115 infof(data, "NTLM handshake failure (internal error)"); in Curl_input_ntlm()
|
/third_party/curl/lib/vssh/ |
H A D | libssh2.c | 378 infof(data, "SFTP %p state change from %s to %s", in state() 526 infof(data, "unsupported key type, can't check knownhosts"); in ssh_knownhost() 554 infof(data, "SSH host check: %d, key: %s", keycheck, in ssh_knownhost() 617 infof(data, "WARNING: adding the known host %s failed", in ssh_knownhost() 628 infof(data, "WARNING: writing %s failed", in ssh_knownhost() 649 infof(data, "SSH MD5 public key: %s", in ssh_check_fingerprint() 651 infof(data, "SSH SHA256 public key: %s", in ssh_check_fingerprint() 702 infof(data, "SSH SHA256 fingerprint: %s", fingerprint_b64); in ssh_check_fingerprint() 731 infof(data, "SHA256 checksum match"); in ssh_check_fingerprint() 748 infof(dat in ssh_check_fingerprint() [all...] |
H A D | wolfssh.c | 212 infof(data, "wolfssh %p state change from %s to %s", in state() 281 infof(data, "sent %zu bytes SFTP from offset %" CURL_FORMAT_CURL_OFF_T, in wsftp_send() 352 DEBUGF(infof(data, "wolfssh callback: type %s", in userauth() 473 infof(data, "wolfssh connected"); in wssh_statemach_act() 494 infof(data, "wolfssh SFTP connected"); in wssh_statemach_act() 535 infof(data, "Sending quote commands"); in wssh_statemach_act() 615 infof(data, "wolfssh SFTP open succeeded"); in wssh_statemach_act() 727 infof(data, "wolfssh SFTP open succeeded"); in wssh_statemach_act() 753 infof(data, "wolfssh STAT succeeded"); in wssh_statemach_act() 769 infof(dat in wssh_statemach_act() [all...] |
H A D | libssh.c | 310 infof(data, "SSH %p state change from %s to %s (line %d)", in mystate() 375 infof(data, "SSH MD5 fingerprint: %s", md5buffer); in myssh_is_known() 734 infof(data, "Authenticated with none"); in myssh_statemach_act() 745 infof(data, "SSH authentication methods available: %s%s%s%s", in myssh_statemach_act() 756 infof(data, "Authentication using SSH public key file"); in myssh_statemach_act() 822 infof(data, "Completed public key authentication"); in myssh_statemach_act() 839 infof(data, "Completed public key authentication"); in myssh_statemach_act() 844 infof(data, "Failed public key authentication (rc: %d)", rc); in myssh_statemach_act() 864 infof(data, "Completed gssapi authentication"); in myssh_statemach_act() 889 infof(dat in myssh_statemach_act() [all...] |
/third_party/curl/lib/vauth/ |
H A D | krb5_gssapi.c | 128 infof(data, "GSSAPI handshake failure (empty challenge message)"); in Curl_auth_create_gssapi_user_message() 203 infof(data, "GSSAPI handshake failure (empty security message)"); in Curl_auth_create_gssapi_security_message() 222 infof(data, "GSSAPI handshake failure (invalid security data)"); in Curl_auth_create_gssapi_security_message() 237 infof(data, "GSSAPI handshake failure (invalid security layer)"); in Curl_auth_create_gssapi_security_message()
|
H A D | krb5_sspi.c | 178 infof(data, "GSSAPI handshake failure (empty challenge message)"); in Curl_auth_create_gssapi_user_message() 280 infof(data, "GSSAPI handshake failure (empty security message)"); in Curl_auth_create_gssapi_security_message() 309 infof(data, "GSSAPI handshake failure (empty security message)"); in Curl_auth_create_gssapi_security_message() 315 infof(data, "GSSAPI handshake failure (invalid security data)"); in Curl_auth_create_gssapi_security_message() 330 infof(data, "GSSAPI handshake failure (invalid security layer)"); in Curl_auth_create_gssapi_security_message()
|