/third_party/curl/lib/vtls/ |
H A D | schannel_verify.c | 133 failf(data, in add_certs_data_to_store() 161 failf(data, in add_certs_data_to_store() 174 failf(data, in add_certs_data_to_store() 190 failf(data, in add_certs_data_to_store() 238 failf(data, in add_certs_file_to_store() 260 failf(data, in add_certs_file_to_store() 270 failf(data, in add_certs_file_to_store() 279 failf(data, in add_certs_file_to_store() 300 failf(data, in add_certs_file_to_store() 386 failf(dat in cert_get_name_string() [all...] |
H A D | sectransp.c | 1000 failf(data, "SSL: invalid CA certificate subject"); in CopyCertSubject() 1010 failf(data, "SSL: out of memory"); in CopyCertSubject() 1020 failf(data, "SSL: invalid CA certificate subject"); in CopyCertSubject() 1028 failf(data, "SSL: couldn't allocate %zu bytes of memory", cbuf_size); in CopyCertSubject() 1392 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 1398 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 1430 failf(data, "Your version of the OS does not support TLSv1.3"); in set_ssl_version_min_max() 1438 failf(data, "Secure Transport: cannot set SSL protocol"); in set_ssl_version_min_max() 1490 failf(data, "SSL: SSLGetNumberSupportedCiphers() failed: OSStatus %d", in sectransp_set_default_ciphers() 1496 failf(dat in sectransp_set_default_ciphers() [all...] |
H A D | mbedtls.c | 307 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 312 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 349 failf(data, "Not supported SSL version"); in mbed_connect_step1() 361 failf(data, "mbedtls_ctr_drbg_seed returned (-0x%04X) %s", in mbed_connect_step1() 373 failf(data, "mbedtls_ctr_drbg_seed returned (-0x%04X) %s", in mbed_connect_step1() 395 failf(data, "Error importing ca cert blob - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 407 failf(data, "Error reading ca cert file %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 412 failf(data, "mbedtls: functions that use the filesystem not built in"); in mbed_connect_step1() 423 failf(data, "Error reading ca cert path %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 430 failf(dat in mbed_connect_step1() [all...] |
H A D | wolfssl.c | 389 failf(data, "wolfSSL does not support to set maximum SSL/TLS version"); in wolfssl_connect_step1() 412 failf(data, "wolfSSL does not support TLS 1.0"); in wolfssl_connect_step1() 421 failf(data, "wolfSSL does not support TLS 1.1"); in wolfssl_connect_step1() 430 failf(data, "wolfSSL does not support TLS 1.2"); in wolfssl_connect_step1() 440 failf(data, "wolfSSL: TLS 1.3 is not yet supported"); in wolfssl_connect_step1() 444 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in wolfssl_connect_step1() 449 failf(data, "SSL: couldn't create a method"); in wolfssl_connect_step1() 458 failf(data, "SSL: couldn't create a context"); in wolfssl_connect_step1() 479 failf(data, "SSL: couldn't set the minimum protocol version"); in wolfssl_connect_step1() 490 failf(dat in wolfssl_connect_step1() [all...] |
H A D | openssl.c | 1002 failf(data, "Insufficient randomness"); in ossl_seed() 1304 failf(data, in cert_stuff() 1325 failf(data, in cert_stuff() 1361 failf(data, "ssl engine does not support loading certificates"); in cert_stuff() 1368 failf(data, "ssl engine cannot load client cert with id" in cert_stuff() 1376 failf(data, "ssl engine didn't initialized the certificate " in cert_stuff() 1382 failf(data, "unable to set client certificate [%s]", in cert_stuff() 1390 failf(data, "crypto engine not set, can't load certificate"); in cert_stuff() 1396 failf(data, "file type ENG for certificate not implemented"); in cert_stuff() 1409 failf(dat in cert_stuff() [all...] |
H A D | gtls.c | 236 failf(data, "SSL connection timeout"); in handshake() 254 failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO); in handshake() 262 failf(data, "SSL connection timeout at %ld", (long)timeout_ms); in handshake() 302 failf(data, "gnutls_handshake() failed: %s", strerr); in handshake() 398 failf(data, "GnuTLS: cannot set ssl protocol"); in set_ssl_version_min_max() 423 failf(data, "GnuTLS does not support SSLv2"); in gtls_client_init() 432 failf(data, "gnutls_cert_all_cred() failed: %s", gnutls_strerror(rc)); in gtls_client_init() 442 failf(data, "gnutls_srp_allocate_client_cred() failed: %s", in gtls_client_init() 451 failf(data, "gnutls_srp_set_client_cred() failed: %s", in gtls_client_init() 519 failf(dat in gtls_client_init() [all...] |
H A D | schannel.c | 136 * #define failf(x, y, ...) printf(y, __VA_ARGS__) 215 failf(data, "schannel: TLS 1.3 not supported on Windows prior to 11"); in schannel_set_ssl_version_min_max() 538 failf(data, "SSL versions not supported"); in schannel_acquire_credential_handle() 541 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in schannel_acquire_credential_handle() 576 failf(data, "schannel: Failed to get certificate location" in schannel_acquire_credential_handle() 586 failf(data, "schannel: certificate format compatibility error " in schannel_acquire_credential_handle() 623 failf(data, "schannel: Failed to read cert file %s", in schannel_acquire_credential_handle() 664 failf(data, "schannel: Failed to import cert file %s, " in schannel_acquire_credential_handle() 668 failf(data, "schannel: Failed to import cert file %s, " in schannel_acquire_credential_handle() 679 failf(dat in schannel_acquire_credential_handle() [all...] |
H A D | rustls.c | 147 failf(data, "reading from socket: %s", in tls_recv_more() 158 failf(data, "rustls_connection_process_new_packets: %.*s", in tls_recv_more() 217 failf(data, "rustls: peer closed TCP connection " in cr_recv() 228 failf(data, "rustls_connection_read: %.*s", (int)errorlen, errorbuf); in cr_recv() 304 failf(data, "rustls_connection_write: %.*s", (int)errorlen, errorbuf); in cr_send() 309 failf(data, "rustls_connection_write: EOF"); in cr_send() 326 failf(data, "writing to socket: %s", in cr_send() 332 failf(data, "EOF in swrite"); in cr_send() 424 failf(data, "rustls: failed to parse trusted certificates from blob"); in cr_init_backend() 434 failf(dat in cr_init_backend() [all...] |
H A D | bearssl.c | 571 failf(data, "BearSSL: no supported cipher in list"); in bearssl_set_selected_ciphers() 603 failf(data, "BearSSL does not support SSLv2"); in bearssl_connect_step1() 606 failf(data, "BearSSL does not support SSLv3"); in bearssl_connect_step1() 626 failf(data, "BearSSL: unknown CURLOPT_SSLVERSION"); in bearssl_connect_step1() 640 failf(data, "error importing CA certificate blob"); in bearssl_connect_step1() 654 failf(data, "error setting certificate verify locations." in bearssl_connect_step1() 712 failf(data, "BearSSL: " in bearssl_connect_step1() 720 failf(data, "Failed to set SNI"); in bearssl_connect_step1() 734 failf(data, "BearSSL: error signaled by ssl ctx callback"); in bearssl_connect_step1() 794 failf(dat in bearssl_run_until() [all...] |
/third_party/curl/lib/ |
H A D | socks_gssapi.c | 99 failf(data, "GSS-API error: %s failed: %s", function, buf); in check_gss_err() 168 failf(data, "Failed to create service name."); in Curl_SOCKS5_gssapi_negotiate() 197 failf(data, "Failed to initial GSS-API token."); in Curl_SOCKS5_gssapi_negotiate() 209 failf(data, "Failed to send GSS-API authentication request."); in Curl_SOCKS5_gssapi_negotiate() 221 failf(data, "Failed to send GSS-API authentication token."); in Curl_SOCKS5_gssapi_negotiate() 248 failf(data, "Failed to receive GSS-API authentication response."); in Curl_SOCKS5_gssapi_negotiate() 256 failf(data, "User was rejected by the SOCKS5 server (%d %d).", in Curl_SOCKS5_gssapi_negotiate() 264 failf(data, "Invalid GSS-API authentication response type (%d %d).", in Curl_SOCKS5_gssapi_negotiate() 277 failf(data, in Curl_SOCKS5_gssapi_negotiate() 289 failf(dat in Curl_SOCKS5_gssapi_negotiate() [all...] |
H A D | socks_sspi.c | 58 failf(data, "SSPI error: %s failed: %s", function, in check_sspi_err() 153 failf(data, "Failed to acquire credentials."); in Curl_SOCKS5_gssapi_negotiate() 200 failf(data, "Failed to initialise security context."); in Curl_SOCKS5_gssapi_negotiate() 212 failf(data, "Failed to send SSPI authentication request."); in Curl_SOCKS5_gssapi_negotiate() 227 failf(data, "Failed to send SSPI authentication token."); in Curl_SOCKS5_gssapi_negotiate() 267 failf(data, "Failed to receive SSPI authentication response."); in Curl_SOCKS5_gssapi_negotiate() 276 failf(data, "User was rejected by the SOCKS5 server (%u %u).", in Curl_SOCKS5_gssapi_negotiate() 285 failf(data, "Invalid SSPI authentication response type (%u %u).", in Curl_SOCKS5_gssapi_negotiate() 309 failf(data, "Failed to receive SSPI authentication token."); in Curl_SOCKS5_gssapi_negotiate() 331 failf(dat in Curl_SOCKS5_gssapi_negotiate() [all...] |
H A D | socks.c | 227 failf(data, "connection to proxy closed"); in socks_state_send() 230 failf(data, "Failed to send %s: %s", description, in socks_state_send() 258 failf(data, "connection to proxy closed"); in socks_state_recv() 261 failf(data, "SOCKS: Failed receiving %s: %s", description, in socks_state_recv() 394 failf(data, "SOCKS4 connection to %s not supported", sx->hostname); in do_SOCKS4() 397 failf(data, "Failed to resolve \"%s\" for SOCKS4 connect.", in do_SOCKS4() 416 failf(data, "Too long SOCKS proxy user name"); in do_SOCKS4() 443 failf(data, "SOCKS4: too long host name"); in do_SOCKS4() 507 failf(data, in do_SOCKS4() 518 failf(dat in do_SOCKS4() [all...] |
H A D | c-hyper.c | 92 failf(data, "Couldn't make the read hyper_context_waker"); in Curl_hyper_recv() 98 failf(data, "Curl_read failed"); in Curl_hyper_recv() 124 failf(data, "Couldn't make the write hyper_context_waker"); in Curl_hyper_send() 130 failf(data, "Curl_write failed"); in Curl_hyper_send() 150 failf(data, "Too long response header"); in hyper_each_header() 327 failf(data, "hyperstream: couldn't pass blank header"); in empty_header() 403 failf(data, "Hyper: [%d] %.*s", (int)code, (int)errlen, errbuf); in Curl_hyper_stream() 456 failf(data, "hyperstream: couldn't get response"); in Curl_hyper_stream() 479 failf(data, "hyperstream: couldn't get response headers"); in Curl_hyper_stream() 506 failf(dat in Curl_hyper_stream() [all...] |
H A D | cf-h1-proxy.c | 120 failf(data, "%s cannot be done over CONNECT", cf->conn->handler->scheme); in tunnel_init() 244 failf(data, "Failed sending CONNECT to proxy"); in start_CONNECT() 281 failf(data, "Failed sending CONNECT to proxy"); in send_CONNECT() 412 failf(data, "Proxy CONNECT aborted"); in recv_CONNECT_resp() 450 failf(data, "CONNECT response too large"); in recv_CONNECT_resp() 591 failf(data, "Couldn't create hyper IO"); in start_CONNECT() 607 failf(data, "Couldn't create hyper executor"); in start_CONNECT() 615 failf(data, "Couldn't create hyper client options"); in start_CONNECT() 628 failf(data, "Couldn't create hyper client handshake"); in start_CONNECT() 636 failf(dat in start_CONNECT() [all...] |
H A D | tftp.c | 214 failf(state->data, "Connection time-out"); in tftp_set_timeouts() 325 failf(data, "Malformed ACK packet, rejecting"); in tftp_parse_option_ack() 337 failf(data, "invalid blocksize value in OACK packet"); in tftp_parse_option_ack() 341 failf(data, "%s (%d)", "blksize is larger than max supported", in tftp_parse_option_ack() 346 failf(data, "%s (%d)", "blksize is smaller than min supported", in tftp_parse_option_ack() 354 failf(data, "%s (%ld)", in tftp_parse_option_ack() 373 failf(data, "invalid tsize -:%s:- value in OACK packet", value); in tftp_parse_option_ack() 473 failf(data, "TFTP file name too long"); in tftp_send_first() 521 failf(data, "TFTP buffer too small for options"); in tftp_send_first() 535 failf(dat in tftp_send_first() [all...] |
H A D | ldap.c | 338 failf(data, "Bad LDAP URL: %s", ldap_err2string(rc)); in ldap_do() 382 failf(data, "LDAP local: ldapssl_client_init %s", ldap_err2string(rc)); in ldap_do() 393 failf(data, "LDAP local: ERROR %s CA cert not set", in ldap_do() 403 failf(data, "LDAP local: ERROR setting %s CA cert: %s", in ldap_do() 415 failf(data, "LDAP local: ERROR setting cert verify mode: %s", in ldap_do() 422 failf(data, "LDAP local: Cannot connect to %s:%u", in ldap_do() 432 failf(data, "LDAP local: ERROR OpenLDAP only supports PEM cert-type"); in ldap_do() 437 failf(data, "LDAP local: ERROR PEM CA cert not set"); in ldap_do() 444 failf(data, "LDAP local: ERROR setting PEM CA cert: %s", in ldap_do() 456 failf(dat in ldap_do() [all...] |
H A D | ftp.c | 278 failf(data, "Error accept()ing server connect"); in AcceptServerConnect() 378 failf(data, "Accept timeout occurred while waiting server connect"); in ReceivedServerConnect() 400 failf(data, "Error while waiting for server connect"); in ReceivedServerConnect() 497 failf(data, "Accept timeout occurred while waiting server connect"); in AllowServerConnect() 646 failf(data, "FTP response timeout"); in Curl_GetFTPResponse() 679 failf(data, "FTP response aborted due to select/poll error: %d", in Curl_GetFTPResponse() 1042 failf(data, "getsockname() failed: %s", in ftp_state_use_port() 1077 failf(data, "failed to resolve the address provided to PORT: %s", host); in ftp_state_use_port() 1093 failf(data, "socket failure: %s", in ftp_state_use_port() 1124 failf(dat in ftp_state_use_port() [all...] |
H A D | rtsp.c | 207 failf(data, in rtsp_done() 267 failf(data, "Got invalid RTSP request"); in rtsp_do() 308 failf(data, "Got invalid RTSP request: RTSPREQ_LAST"); in rtsp_do() 321 failf(data, "Refusing to issue an RTSP request [%s] without a session ID.", in rtsp_do() 348 failf(data, in rtsp_do() 426 failf(data, "CSeq cannot be set as a custom header."); in rtsp_do() 430 failf(data, "Session ID cannot be set as a custom header."); in rtsp_do() 572 failf(data, "Failed sending RTSP request"); in rtsp_do() 873 failf(data, "Cannot write a 0 size RTP packet."); in rtp_client_write() 895 failf(dat in rtp_client_write() [all...] |
H A D | curl_ntlm_wb.c | 189 failf(data, "Could not access ntlm_auth: %s errno %d: %s", in ntlm_wb_init() 195 failf(data, "Could not open socket pair. errno %d: %s", in ntlm_wb_init() 204 failf(data, "Could not fork. errno %d: %s", in ntlm_wb_init() 216 failf(data, "Could not redirect child stdin. errno %d: %s", in ntlm_wb_init() 222 failf(data, "Could not redirect child stdout. errno %d: %s", in ntlm_wb_init() 242 failf(data, "Could not execl(). errno %d: %s", in ntlm_wb_init()
|
/third_party/curl/lib/vssh/ |
H A D | libssh.c | 367 failf(data, in myssh_is_known() 378 failf(data, in myssh_is_known() 705 failf(data, "Failure establishing ssh session"); in myssh_statemach_act() 802 failf(data, "Could not load private key file %s", in myssh_statemach_act() 924 failf(data, "Authentication failure"); in myssh_statemach_act() 952 failf(data, "Failure initializing sftp session: %s", in myssh_statemach_act() 960 failf(data, "Failure initializing sftp session: %s", in myssh_statemach_act() 1050 failf(data, "Attempt to set SFTP stats failed: %s", in myssh_statemach_act() 1069 failf(data, "symlink command failed: %s", in myssh_statemach_act() 1084 failf(dat in myssh_statemach_act() [all...] |
H A D | wolfssh.c | 277 failf(data, "wolfSSH_SFTP_SendWritePacket returned %d", rc); in wsftp_send() 323 failf(data, "wolfSSH_SFTP_SendReadPacket returned %d", rc); in wsftp_recv() 389 failf(data, "No wolfSSH context"); in wssh_connect() 395 failf(data, "No wolfSSH session"); in wssh_connect() 401 failf(data, "wolfSSH failed to set user name"); in wssh_connect() 411 failf(data, "wolfSSH failed to set socket"); in wssh_connect() 498 failf(data, "wolfssh SFTP connect error %d", rc); in wssh_statemach_act() 523 failf(data, "wolfssh SFTP realpath %d", rc); in wssh_statemach_act() 578 failf(data, "Bad file size (%" CURL_FORMAT_CURL_OFF_T ")", size); in wssh_statemach_act() 618 failf(dat in wssh_statemach_act() [all...] |
H A D | libssh2.c | 678 failf(data, in ssh_check_fingerprint() 696 failf(data, "sha256 fingerprint could not be encoded"); in ssh_check_fingerprint() 720 failf(data, in ssh_check_fingerprint() 755 failf(data, in ssh_check_fingerprint() 760 failf(data, in ssh_check_fingerprint() 928 failf(data, "Found host key type RSA1 which is not supported"); in ssh_force_knownhost_key_type() 931 failf(data, "Unknown host key type: %i", in ssh_force_knownhost_key_type() 943 failf(data, "libssh2: %s", errmsg); in ssh_force_knownhost_key_type() 1008 failf(data, "Failure establishing ssh session: %d, %s", rc, err_msg); in ssh_statemach_act() 1363 failf(dat in ssh_statemach_act() [all...] |
/third_party/curl/lib/vauth/ |
H A D | gsasl.c | 52 failf(data, "gsasl init: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_is_supported() 77 failf(data, "setting AUTHID failed: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_start() 88 failf(data, "setting PASSWORD failed: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_start() 111 failf(data, "GSASL step: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_token()
|
/third_party/curl/lib/vquic/ |
H A D | vquic.c | 180 failf(data, "sendmsg() returned %zd (errno %d); disable GSO", sent, in do_sendmsg() 187 failf(data, "sendmsg() returned %zd (errno %d)", sent, SOCKERRNO); in do_sendmsg() 210 failf(data, "send() returned %zd (errno %d)", sent, SOCKERRNO); in do_sendmsg() 377 failf(data, "QUIC: connection to %s port %u refused", in recvmmsg_packets() 383 failf(data, "QUIC: recvmsg() unexpectedly returned %d (errno=%d; %s)", in recvmmsg_packets() 447 failf(data, "QUIC: connection to %s port %u refused", in recvmsg_packets() 453 failf(data, "QUIC: recvmsg() unexpectedly returned %zd (errno=%d; %s)", in recvmsg_packets() 507 failf(data, "QUIC: connection to %s port %u refused", in recvfrom_packets() 513 failf(data, "QUIC: recvfrom() unexpectedly returned %zd (errno=%d; %s)", in recvfrom_packets() 655 failf(dat in Curl_conn_may_http3() [all...] |
H A D | vquic-tls.c | 127 failf(data, "failed setting curves list for QUIC: '%s'", curves); in curl_ossl_init_ctx() 137 failf(data, "failed setting QUIC cipher suite: %s", ciphers13); in curl_ossl_init_ctx() 173 failf(data, "error signaled by ssl ctx callback"); in curl_ossl_init_ctx() 232 failf(data, "Failed set SNI"); in curl_ossl_init_ssl() 377 failf(data, "wolfSSL failed to set ciphers: %s", error_buffer); in curl_wssl_init_ctx() 385 failf(data, "wolfSSL failed to set curves"); in curl_wssl_init_ctx() 396 failf(data, "wolfSSL was built without keylog callback"); in curl_wssl_init_ctx() 416 failf(data, "error setting certificate verify locations:" in curl_wssl_init_ctx() 445 failf(data, "error signaled by ssl ctx callback"); in curl_wssl_init_ctx()
|