Home
last modified time | relevance | path

Searched refs:failf (Results 1 - 25 of 68) sorted by relevance

123

/third_party/curl/lib/vtls/
H A Dschannel_verify.c133 failf(data, in add_certs_data_to_store()
161 failf(data, in add_certs_data_to_store()
174 failf(data, in add_certs_data_to_store()
190 failf(data, in add_certs_data_to_store()
238 failf(data, in add_certs_file_to_store()
260 failf(data, in add_certs_file_to_store()
270 failf(data, in add_certs_file_to_store()
279 failf(data, in add_certs_file_to_store()
300 failf(data, in add_certs_file_to_store()
386 failf(dat in cert_get_name_string()
[all...]
H A Dsectransp.c1000 failf(data, "SSL: invalid CA certificate subject"); in CopyCertSubject()
1010 failf(data, "SSL: out of memory"); in CopyCertSubject()
1020 failf(data, "SSL: invalid CA certificate subject"); in CopyCertSubject()
1028 failf(data, "SSL: couldn't allocate %zu bytes of memory", cbuf_size); in CopyCertSubject()
1392 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max()
1398 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max()
1430 failf(data, "Your version of the OS does not support TLSv1.3"); in set_ssl_version_min_max()
1438 failf(data, "Secure Transport: cannot set SSL protocol"); in set_ssl_version_min_max()
1490 failf(data, "SSL: SSLGetNumberSupportedCiphers() failed: OSStatus %d", in sectransp_set_default_ciphers()
1496 failf(dat in sectransp_set_default_ciphers()
[all...]
H A Dmbedtls.c307 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max()
312 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max()
349 failf(data, "Not supported SSL version"); in mbed_connect_step1()
361 failf(data, "mbedtls_ctr_drbg_seed returned (-0x%04X) %s", in mbed_connect_step1()
373 failf(data, "mbedtls_ctr_drbg_seed returned (-0x%04X) %s", in mbed_connect_step1()
395 failf(data, "Error importing ca cert blob - mbedTLS: (-0x%04X) %s", in mbed_connect_step1()
407 failf(data, "Error reading ca cert file %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1()
412 failf(data, "mbedtls: functions that use the filesystem not built in"); in mbed_connect_step1()
423 failf(data, "Error reading ca cert path %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1()
430 failf(dat in mbed_connect_step1()
[all...]
H A Dwolfssl.c389 failf(data, "wolfSSL does not support to set maximum SSL/TLS version"); in wolfssl_connect_step1()
412 failf(data, "wolfSSL does not support TLS 1.0"); in wolfssl_connect_step1()
421 failf(data, "wolfSSL does not support TLS 1.1"); in wolfssl_connect_step1()
430 failf(data, "wolfSSL does not support TLS 1.2"); in wolfssl_connect_step1()
440 failf(data, "wolfSSL: TLS 1.3 is not yet supported"); in wolfssl_connect_step1()
444 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in wolfssl_connect_step1()
449 failf(data, "SSL: couldn't create a method"); in wolfssl_connect_step1()
458 failf(data, "SSL: couldn't create a context"); in wolfssl_connect_step1()
479 failf(data, "SSL: couldn't set the minimum protocol version"); in wolfssl_connect_step1()
490 failf(dat in wolfssl_connect_step1()
[all...]
H A Dopenssl.c1002 failf(data, "Insufficient randomness"); in ossl_seed()
1304 failf(data, in cert_stuff()
1325 failf(data, in cert_stuff()
1361 failf(data, "ssl engine does not support loading certificates"); in cert_stuff()
1368 failf(data, "ssl engine cannot load client cert with id" in cert_stuff()
1376 failf(data, "ssl engine didn't initialized the certificate " in cert_stuff()
1382 failf(data, "unable to set client certificate [%s]", in cert_stuff()
1390 failf(data, "crypto engine not set, can't load certificate"); in cert_stuff()
1396 failf(data, "file type ENG for certificate not implemented"); in cert_stuff()
1409 failf(dat in cert_stuff()
[all...]
H A Dgtls.c236 failf(data, "SSL connection timeout"); in handshake()
254 failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO); in handshake()
262 failf(data, "SSL connection timeout at %ld", (long)timeout_ms); in handshake()
302 failf(data, "gnutls_handshake() failed: %s", strerr); in handshake()
398 failf(data, "GnuTLS: cannot set ssl protocol"); in set_ssl_version_min_max()
423 failf(data, "GnuTLS does not support SSLv2"); in gtls_client_init()
432 failf(data, "gnutls_cert_all_cred() failed: %s", gnutls_strerror(rc)); in gtls_client_init()
442 failf(data, "gnutls_srp_allocate_client_cred() failed: %s", in gtls_client_init()
451 failf(data, "gnutls_srp_set_client_cred() failed: %s", in gtls_client_init()
519 failf(dat in gtls_client_init()
[all...]
H A Dschannel.c136 * #define failf(x, y, ...) printf(y, __VA_ARGS__)
215 failf(data, "schannel: TLS 1.3 not supported on Windows prior to 11"); in schannel_set_ssl_version_min_max()
538 failf(data, "SSL versions not supported"); in schannel_acquire_credential_handle()
541 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in schannel_acquire_credential_handle()
576 failf(data, "schannel: Failed to get certificate location" in schannel_acquire_credential_handle()
586 failf(data, "schannel: certificate format compatibility error " in schannel_acquire_credential_handle()
623 failf(data, "schannel: Failed to read cert file %s", in schannel_acquire_credential_handle()
664 failf(data, "schannel: Failed to import cert file %s, " in schannel_acquire_credential_handle()
668 failf(data, "schannel: Failed to import cert file %s, " in schannel_acquire_credential_handle()
679 failf(dat in schannel_acquire_credential_handle()
[all...]
H A Drustls.c147 failf(data, "reading from socket: %s", in tls_recv_more()
158 failf(data, "rustls_connection_process_new_packets: %.*s", in tls_recv_more()
217 failf(data, "rustls: peer closed TCP connection " in cr_recv()
228 failf(data, "rustls_connection_read: %.*s", (int)errorlen, errorbuf); in cr_recv()
304 failf(data, "rustls_connection_write: %.*s", (int)errorlen, errorbuf); in cr_send()
309 failf(data, "rustls_connection_write: EOF"); in cr_send()
326 failf(data, "writing to socket: %s", in cr_send()
332 failf(data, "EOF in swrite"); in cr_send()
424 failf(data, "rustls: failed to parse trusted certificates from blob"); in cr_init_backend()
434 failf(dat in cr_init_backend()
[all...]
H A Dbearssl.c571 failf(data, "BearSSL: no supported cipher in list"); in bearssl_set_selected_ciphers()
603 failf(data, "BearSSL does not support SSLv2"); in bearssl_connect_step1()
606 failf(data, "BearSSL does not support SSLv3"); in bearssl_connect_step1()
626 failf(data, "BearSSL: unknown CURLOPT_SSLVERSION"); in bearssl_connect_step1()
640 failf(data, "error importing CA certificate blob"); in bearssl_connect_step1()
654 failf(data, "error setting certificate verify locations." in bearssl_connect_step1()
712 failf(data, "BearSSL: " in bearssl_connect_step1()
720 failf(data, "Failed to set SNI"); in bearssl_connect_step1()
734 failf(data, "BearSSL: error signaled by ssl ctx callback"); in bearssl_connect_step1()
794 failf(dat in bearssl_run_until()
[all...]
/third_party/curl/lib/
H A Dsocks_gssapi.c99 failf(data, "GSS-API error: %s failed: %s", function, buf); in check_gss_err()
168 failf(data, "Failed to create service name."); in Curl_SOCKS5_gssapi_negotiate()
197 failf(data, "Failed to initial GSS-API token."); in Curl_SOCKS5_gssapi_negotiate()
209 failf(data, "Failed to send GSS-API authentication request."); in Curl_SOCKS5_gssapi_negotiate()
221 failf(data, "Failed to send GSS-API authentication token."); in Curl_SOCKS5_gssapi_negotiate()
248 failf(data, "Failed to receive GSS-API authentication response."); in Curl_SOCKS5_gssapi_negotiate()
256 failf(data, "User was rejected by the SOCKS5 server (%d %d).", in Curl_SOCKS5_gssapi_negotiate()
264 failf(data, "Invalid GSS-API authentication response type (%d %d).", in Curl_SOCKS5_gssapi_negotiate()
277 failf(data, in Curl_SOCKS5_gssapi_negotiate()
289 failf(dat in Curl_SOCKS5_gssapi_negotiate()
[all...]
H A Dsocks_sspi.c58 failf(data, "SSPI error: %s failed: %s", function, in check_sspi_err()
153 failf(data, "Failed to acquire credentials."); in Curl_SOCKS5_gssapi_negotiate()
200 failf(data, "Failed to initialise security context."); in Curl_SOCKS5_gssapi_negotiate()
212 failf(data, "Failed to send SSPI authentication request."); in Curl_SOCKS5_gssapi_negotiate()
227 failf(data, "Failed to send SSPI authentication token."); in Curl_SOCKS5_gssapi_negotiate()
267 failf(data, "Failed to receive SSPI authentication response."); in Curl_SOCKS5_gssapi_negotiate()
276 failf(data, "User was rejected by the SOCKS5 server (%u %u).", in Curl_SOCKS5_gssapi_negotiate()
285 failf(data, "Invalid SSPI authentication response type (%u %u).", in Curl_SOCKS5_gssapi_negotiate()
309 failf(data, "Failed to receive SSPI authentication token."); in Curl_SOCKS5_gssapi_negotiate()
331 failf(dat in Curl_SOCKS5_gssapi_negotiate()
[all...]
H A Dsocks.c227 failf(data, "connection to proxy closed"); in socks_state_send()
230 failf(data, "Failed to send %s: %s", description, in socks_state_send()
258 failf(data, "connection to proxy closed"); in socks_state_recv()
261 failf(data, "SOCKS: Failed receiving %s: %s", description, in socks_state_recv()
394 failf(data, "SOCKS4 connection to %s not supported", sx->hostname); in do_SOCKS4()
397 failf(data, "Failed to resolve \"%s\" for SOCKS4 connect.", in do_SOCKS4()
416 failf(data, "Too long SOCKS proxy user name"); in do_SOCKS4()
443 failf(data, "SOCKS4: too long host name"); in do_SOCKS4()
507 failf(data, in do_SOCKS4()
518 failf(dat in do_SOCKS4()
[all...]
H A Dc-hyper.c92 failf(data, "Couldn't make the read hyper_context_waker"); in Curl_hyper_recv()
98 failf(data, "Curl_read failed"); in Curl_hyper_recv()
124 failf(data, "Couldn't make the write hyper_context_waker"); in Curl_hyper_send()
130 failf(data, "Curl_write failed"); in Curl_hyper_send()
150 failf(data, "Too long response header"); in hyper_each_header()
327 failf(data, "hyperstream: couldn't pass blank header"); in empty_header()
403 failf(data, "Hyper: [%d] %.*s", (int)code, (int)errlen, errbuf); in Curl_hyper_stream()
456 failf(data, "hyperstream: couldn't get response"); in Curl_hyper_stream()
479 failf(data, "hyperstream: couldn't get response headers"); in Curl_hyper_stream()
506 failf(dat in Curl_hyper_stream()
[all...]
H A Dcf-h1-proxy.c120 failf(data, "%s cannot be done over CONNECT", cf->conn->handler->scheme); in tunnel_init()
244 failf(data, "Failed sending CONNECT to proxy"); in start_CONNECT()
281 failf(data, "Failed sending CONNECT to proxy"); in send_CONNECT()
412 failf(data, "Proxy CONNECT aborted"); in recv_CONNECT_resp()
450 failf(data, "CONNECT response too large"); in recv_CONNECT_resp()
591 failf(data, "Couldn't create hyper IO"); in start_CONNECT()
607 failf(data, "Couldn't create hyper executor"); in start_CONNECT()
615 failf(data, "Couldn't create hyper client options"); in start_CONNECT()
628 failf(data, "Couldn't create hyper client handshake"); in start_CONNECT()
636 failf(dat in start_CONNECT()
[all...]
H A Dtftp.c214 failf(state->data, "Connection time-out"); in tftp_set_timeouts()
325 failf(data, "Malformed ACK packet, rejecting"); in tftp_parse_option_ack()
337 failf(data, "invalid blocksize value in OACK packet"); in tftp_parse_option_ack()
341 failf(data, "%s (%d)", "blksize is larger than max supported", in tftp_parse_option_ack()
346 failf(data, "%s (%d)", "blksize is smaller than min supported", in tftp_parse_option_ack()
354 failf(data, "%s (%ld)", in tftp_parse_option_ack()
373 failf(data, "invalid tsize -:%s:- value in OACK packet", value); in tftp_parse_option_ack()
473 failf(data, "TFTP file name too long"); in tftp_send_first()
521 failf(data, "TFTP buffer too small for options"); in tftp_send_first()
535 failf(dat in tftp_send_first()
[all...]
H A Dldap.c338 failf(data, "Bad LDAP URL: %s", ldap_err2string(rc)); in ldap_do()
382 failf(data, "LDAP local: ldapssl_client_init %s", ldap_err2string(rc)); in ldap_do()
393 failf(data, "LDAP local: ERROR %s CA cert not set", in ldap_do()
403 failf(data, "LDAP local: ERROR setting %s CA cert: %s", in ldap_do()
415 failf(data, "LDAP local: ERROR setting cert verify mode: %s", in ldap_do()
422 failf(data, "LDAP local: Cannot connect to %s:%u", in ldap_do()
432 failf(data, "LDAP local: ERROR OpenLDAP only supports PEM cert-type"); in ldap_do()
437 failf(data, "LDAP local: ERROR PEM CA cert not set"); in ldap_do()
444 failf(data, "LDAP local: ERROR setting PEM CA cert: %s", in ldap_do()
456 failf(dat in ldap_do()
[all...]
H A Dftp.c278 failf(data, "Error accept()ing server connect"); in AcceptServerConnect()
378 failf(data, "Accept timeout occurred while waiting server connect"); in ReceivedServerConnect()
400 failf(data, "Error while waiting for server connect"); in ReceivedServerConnect()
497 failf(data, "Accept timeout occurred while waiting server connect"); in AllowServerConnect()
646 failf(data, "FTP response timeout"); in Curl_GetFTPResponse()
679 failf(data, "FTP response aborted due to select/poll error: %d", in Curl_GetFTPResponse()
1042 failf(data, "getsockname() failed: %s", in ftp_state_use_port()
1077 failf(data, "failed to resolve the address provided to PORT: %s", host); in ftp_state_use_port()
1093 failf(data, "socket failure: %s", in ftp_state_use_port()
1124 failf(dat in ftp_state_use_port()
[all...]
H A Drtsp.c207 failf(data, in rtsp_done()
267 failf(data, "Got invalid RTSP request"); in rtsp_do()
308 failf(data, "Got invalid RTSP request: RTSPREQ_LAST"); in rtsp_do()
321 failf(data, "Refusing to issue an RTSP request [%s] without a session ID.", in rtsp_do()
348 failf(data, in rtsp_do()
426 failf(data, "CSeq cannot be set as a custom header."); in rtsp_do()
430 failf(data, "Session ID cannot be set as a custom header."); in rtsp_do()
572 failf(data, "Failed sending RTSP request"); in rtsp_do()
873 failf(data, "Cannot write a 0 size RTP packet."); in rtp_client_write()
895 failf(dat in rtp_client_write()
[all...]
H A Dcurl_ntlm_wb.c189 failf(data, "Could not access ntlm_auth: %s errno %d: %s", in ntlm_wb_init()
195 failf(data, "Could not open socket pair. errno %d: %s", in ntlm_wb_init()
204 failf(data, "Could not fork. errno %d: %s", in ntlm_wb_init()
216 failf(data, "Could not redirect child stdin. errno %d: %s", in ntlm_wb_init()
222 failf(data, "Could not redirect child stdout. errno %d: %s", in ntlm_wb_init()
242 failf(data, "Could not execl(). errno %d: %s", in ntlm_wb_init()
/third_party/curl/lib/vssh/
H A Dlibssh.c367 failf(data, in myssh_is_known()
378 failf(data, in myssh_is_known()
705 failf(data, "Failure establishing ssh session"); in myssh_statemach_act()
802 failf(data, "Could not load private key file %s", in myssh_statemach_act()
924 failf(data, "Authentication failure"); in myssh_statemach_act()
952 failf(data, "Failure initializing sftp session: %s", in myssh_statemach_act()
960 failf(data, "Failure initializing sftp session: %s", in myssh_statemach_act()
1050 failf(data, "Attempt to set SFTP stats failed: %s", in myssh_statemach_act()
1069 failf(data, "symlink command failed: %s", in myssh_statemach_act()
1084 failf(dat in myssh_statemach_act()
[all...]
H A Dwolfssh.c277 failf(data, "wolfSSH_SFTP_SendWritePacket returned %d", rc); in wsftp_send()
323 failf(data, "wolfSSH_SFTP_SendReadPacket returned %d", rc); in wsftp_recv()
389 failf(data, "No wolfSSH context"); in wssh_connect()
395 failf(data, "No wolfSSH session"); in wssh_connect()
401 failf(data, "wolfSSH failed to set user name"); in wssh_connect()
411 failf(data, "wolfSSH failed to set socket"); in wssh_connect()
498 failf(data, "wolfssh SFTP connect error %d", rc); in wssh_statemach_act()
523 failf(data, "wolfssh SFTP realpath %d", rc); in wssh_statemach_act()
578 failf(data, "Bad file size (%" CURL_FORMAT_CURL_OFF_T ")", size); in wssh_statemach_act()
618 failf(dat in wssh_statemach_act()
[all...]
H A Dlibssh2.c678 failf(data, in ssh_check_fingerprint()
696 failf(data, "sha256 fingerprint could not be encoded"); in ssh_check_fingerprint()
720 failf(data, in ssh_check_fingerprint()
755 failf(data, in ssh_check_fingerprint()
760 failf(data, in ssh_check_fingerprint()
928 failf(data, "Found host key type RSA1 which is not supported"); in ssh_force_knownhost_key_type()
931 failf(data, "Unknown host key type: %i", in ssh_force_knownhost_key_type()
943 failf(data, "libssh2: %s", errmsg); in ssh_force_knownhost_key_type()
1008 failf(data, "Failure establishing ssh session: %d, %s", rc, err_msg); in ssh_statemach_act()
1363 failf(dat in ssh_statemach_act()
[all...]
/third_party/curl/lib/vauth/
H A Dgsasl.c52 failf(data, "gsasl init: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_is_supported()
77 failf(data, "setting AUTHID failed: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_start()
88 failf(data, "setting PASSWORD failed: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_start()
111 failf(data, "GSASL step: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_token()
/third_party/curl/lib/vquic/
H A Dvquic.c180 failf(data, "sendmsg() returned %zd (errno %d); disable GSO", sent, in do_sendmsg()
187 failf(data, "sendmsg() returned %zd (errno %d)", sent, SOCKERRNO); in do_sendmsg()
210 failf(data, "send() returned %zd (errno %d)", sent, SOCKERRNO); in do_sendmsg()
377 failf(data, "QUIC: connection to %s port %u refused", in recvmmsg_packets()
383 failf(data, "QUIC: recvmsg() unexpectedly returned %d (errno=%d; %s)", in recvmmsg_packets()
447 failf(data, "QUIC: connection to %s port %u refused", in recvmsg_packets()
453 failf(data, "QUIC: recvmsg() unexpectedly returned %zd (errno=%d; %s)", in recvmsg_packets()
507 failf(data, "QUIC: connection to %s port %u refused", in recvfrom_packets()
513 failf(data, "QUIC: recvfrom() unexpectedly returned %zd (errno=%d; %s)", in recvfrom_packets()
655 failf(dat in Curl_conn_may_http3()
[all...]
H A Dvquic-tls.c127 failf(data, "failed setting curves list for QUIC: '%s'", curves); in curl_ossl_init_ctx()
137 failf(data, "failed setting QUIC cipher suite: %s", ciphers13); in curl_ossl_init_ctx()
173 failf(data, "error signaled by ssl ctx callback"); in curl_ossl_init_ctx()
232 failf(data, "Failed set SNI"); in curl_ossl_init_ssl()
377 failf(data, "wolfSSL failed to set ciphers: %s", error_buffer); in curl_wssl_init_ctx()
385 failf(data, "wolfSSL failed to set curves"); in curl_wssl_init_ctx()
396 failf(data, "wolfSSL was built without keylog callback"); in curl_wssl_init_ctx()
416 failf(data, "error setting certificate verify locations:" in curl_wssl_init_ctx()
445 failf(data, "error signaled by ssl ctx callback"); in curl_wssl_init_ctx()

Completed in 32 milliseconds

123