/third_party/curl/lib/ |
D | socks.c | 309 failf(data, "SOCKS4 connection to %s not supported", hostname); in Curl_SOCKS4() 312 failf(data, "Failed to resolve \"%s\" for SOCKS4 connect.", in Curl_SOCKS4() 328 failf(data, "Too long SOCKS proxy user name, can't use!"); in Curl_SOCKS4() 354 failf(data, "SOCKS4: too long host name"); in Curl_SOCKS4() 369 failf(data, "Failed to send SOCKS4 connect request."); in Curl_SOCKS4() 390 failf(data, "SOCKS4: Failed receiving connect request ack: %s", in Curl_SOCKS4() 396 failf(data, "connection to proxy closed"); in Curl_SOCKS4() 432 failf(data, in Curl_SOCKS4() 443 failf(data, in Curl_SOCKS4() 451 failf(data, in Curl_SOCKS4() [all …]
|
D | socks_gssapi.c | 95 failf(data, "GSS-API error: %s failed: %s", function, buf); in check_gss_err() 165 failf(data, "Failed to create service name."); in Curl_SOCKS5_gssapi_negotiate() 194 failf(data, "Failed to initial GSS-API token."); in Curl_SOCKS5_gssapi_negotiate() 206 failf(data, "Failed to send GSS-API authentication request."); in Curl_SOCKS5_gssapi_negotiate() 218 failf(data, "Failed to send GSS-API authentication token."); in Curl_SOCKS5_gssapi_negotiate() 245 failf(data, "Failed to receive GSS-API authentication response."); in Curl_SOCKS5_gssapi_negotiate() 253 failf(data, "User was rejected by the SOCKS5 server (%d %d).", in Curl_SOCKS5_gssapi_negotiate() 261 failf(data, "Invalid GSS-API authentication response type (%d %d).", in Curl_SOCKS5_gssapi_negotiate() 274 failf(data, in Curl_SOCKS5_gssapi_negotiate() 286 failf(data, "Failed to receive GSS-API authentication token."); in Curl_SOCKS5_gssapi_negotiate() [all …]
|
D | non-ascii.c | 93 failf(data, in Curl_convert_to_network() 115 failf(data, in Curl_convert_to_network() 131 failf(data, in Curl_convert_to_network() 137 failf(data, "CURLOPT_CONV_TO_NETWORK_FUNCTION callback required"); in Curl_convert_to_network() 159 failf(data, in Curl_convert_from_network() 181 failf(data, in Curl_convert_from_network() 197 failf(data, in Curl_convert_from_network() 203 failf(data, "CURLOPT_CONV_FROM_NETWORK_FUNCTION callback required"); in Curl_convert_from_network() 225 failf(data, in Curl_convert_from_utf8() 248 failf(data, in Curl_convert_from_utf8() [all …]
|
D | socks_sspi.c | 55 failf(data, "SSPI error: %s failed: %s", function, in check_sspi_err() 150 failf(data, "Failed to acquire credentials."); in Curl_SOCKS5_gssapi_negotiate() 197 failf(data, "Failed to initialise security context."); in Curl_SOCKS5_gssapi_negotiate() 209 failf(data, "Failed to send SSPI authentication request."); in Curl_SOCKS5_gssapi_negotiate() 223 failf(data, "Failed to send SSPI authentication token."); in Curl_SOCKS5_gssapi_negotiate() 263 failf(data, "Failed to receive SSPI authentication response."); in Curl_SOCKS5_gssapi_negotiate() 272 failf(data, "User was rejected by the SOCKS5 server (%u %u).", in Curl_SOCKS5_gssapi_negotiate() 281 failf(data, "Invalid SSPI authentication response type (%u %u).", in Curl_SOCKS5_gssapi_negotiate() 305 failf(data, "Failed to receive SSPI authentication token."); in Curl_SOCKS5_gssapi_negotiate() 327 failf(data, "Failed to determine user name."); in Curl_SOCKS5_gssapi_negotiate() [all …]
|
D | c-hyper.c | 78 failf(data, "Couldn't make the read hyper_context_waker"); in Curl_hyper_recv() 84 failf(data, "Curl_read failed"); in Curl_hyper_recv() 105 failf(data, "Couldn't make the write hyper_context_waker"); in Curl_hyper_send() 111 failf(data, "Curl_write failed"); in Curl_hyper_send() 130 failf(data, "Too long response header"); in hyper_each_header() 354 failf(data, "Hyper: [%d] %.*s", (int)code, (int)errlen, errbuf); in Curl_hyper_stream() 380 failf(data, "hyperstream: couldn't get response"); in Curl_hyper_stream() 396 failf(data, "hyperstream: couldn't get response headers"); in Curl_hyper_stream() 409 failf(data, "hyperstream: couldn't pass blank header"); in Curl_hyper_stream() 423 failf(data, "hyperstream: couldn't get response body"); in Curl_hyper_stream() [all …]
|
D | tftp.c | 213 failf(state->data, "Connection time-out"); in tftp_set_timeouts() 324 failf(data, "Malformed ACK packet, rejecting"); in tftp_parse_option_ack() 336 failf(data, "invalid blocksize value in OACK packet"); in tftp_parse_option_ack() 340 failf(data, "%s (%d)", "blksize is larger than max supported", in tftp_parse_option_ack() 345 failf(data, "%s (%d)", "blksize is smaller than min supported", in tftp_parse_option_ack() 353 failf(data, "%s (%ld)", in tftp_parse_option_ack() 372 failf(data, "invalid tsize -:%s:- value in OACK packet", value); in tftp_parse_option_ack() 472 failf(data, "TFTP file name too long"); in tftp_send_first() 520 failf(data, "TFTP buffer too small for options"); in tftp_send_first() 534 failf(data, "%s", Curl_strerror(SOCKERRNO, buffer, sizeof(buffer))); in tftp_send_first() [all …]
|
D | http_proxy.c | 342 failf(data, "Failed sending CONNECT to proxy"); in CONNECT() 354 failf(data, "Proxy CONNECT aborted due to timeout"); in CONNECT() 425 failf(data, "Proxy CONNECT aborted"); in CONNECT() 466 failf(data, "CONNECT response too large!"); in CONNECT() 681 failf(data, "Received HTTP code %d from proxy after CONNECT", in CONNECT() 740 failf(data, "Couldn't create hyper IO"); in CONNECT() 755 failf(data, "Couldn't create hyper executor"); in CONNECT() 762 failf(data, "Couldn't create hyper client options"); in CONNECT() 772 failf(data, "Couldn't create hyper client handshake"); in CONNECT() 779 failf(data, "Couldn't hyper_executor_push the handshake"); in CONNECT() [all …]
|
D | rtsp.c | 227 failf(data, in rtsp_done() 275 failf(data, "Got invalid RTSP request"); in rtsp_do() 316 failf(data, "Got invalid RTSP request: RTSPREQ_LAST"); in rtsp_do() 329 failf(data, "Refusing to issue an RTSP request [%s] without a session ID.", in rtsp_do() 356 failf(data, in rtsp_do() 436 failf(data, "CSeq cannot be set as a custom header."); in rtsp_do() 440 failf(data, "Session ID cannot be set as a custom header."); in rtsp_do() 581 failf(data, "Failed sending RTSP request"); in rtsp_do() 658 failf(data, "Got an error writing an RTP packet"); in rtsp_rtp_readwrite() 734 failf(data, "Cannot write a 0 size RTP packet."); in rtp_client_write() [all …]
|
D | ldap.c | 309 failf(data, "LDAP local: %s", ldap_err2string(rc)); in ldap_do() 353 failf(data, "LDAP local: ldapssl_client_init %s", ldap_err2string(rc)); in ldap_do() 364 failf(data, "LDAP local: ERROR %s CA cert not set!", in ldap_do() 374 failf(data, "LDAP local: ERROR setting %s CA cert: %s", in ldap_do() 386 failf(data, "LDAP local: ERROR setting cert verify mode: %s", in ldap_do() 393 failf(data, "LDAP local: Cannot connect to %s:%ld", in ldap_do() 403 failf(data, "LDAP local: ERROR OpenLDAP only supports PEM cert-type!"); in ldap_do() 408 failf(data, "LDAP local: ERROR PEM CA cert not set!"); in ldap_do() 415 failf(data, "LDAP local: ERROR setting PEM CA cert: %s", in ldap_do() 427 failf(data, "LDAP local: ERROR setting cert verify mode: %s", in ldap_do() [all …]
|
D | ftp.c | 289 failf(data, "Error accept()ing server connect"); in AcceptServerConnect() 386 failf(data, "Accept timeout occurred while waiting server connect"); in ReceivedServerConnect() 404 failf(data, "Error while waiting for server connect"); in ReceivedServerConnect() 498 failf(data, "Accept timeout occurred while waiting server connect"); in AllowServerConnect() 645 failf(data, "FTP response timeout"); in Curl_GetFTPResponse() 678 failf(data, "FTP response aborted due to select/poll error: %d", in Curl_GetFTPResponse() 1061 failf(data, "getsockname() failed: %s", in ftp_state_use_port() 1096 failf(data, "failed to resolve the address provided to PORT: %s", host); in ftp_state_use_port() 1117 failf(data, "socket failure: %s", in ftp_state_use_port() 1147 failf(data, "getsockname() failed: %s", in ftp_state_use_port() [all …]
|
/third_party/curl/lib/vtls/ |
D | sectransp.c | 1025 failf(data, "SSL: invalid CA certificate subject"); in CopyCertSubject() 1035 failf(data, "SSL: out of memory"); in CopyCertSubject() 1045 failf(data, "SSL: invalid CA certificate subject"); in CopyCertSubject() 1053 failf(data, "SSL: couldn't allocate %zu bytes of memory", cbuf_size); in CopyCertSubject() 1413 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 1419 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 1451 failf(data, "Your version of the OS does not support TLSv1.3"); in set_ssl_version_min_max() 1459 failf(data, "Secure Transport: cannot set SSL protocol"); in set_ssl_version_min_max() 1510 failf(data, "SSL: SSLGetNumberSupportedCiphers() failed: OSStatus %d", in sectransp_set_default_ciphers() 1516 failf(data, "SSL: Failed to allocate memory for all ciphers"); in sectransp_set_default_ciphers() [all …]
|
D | schannel_verify.c | 129 failf(data, in add_certs_data_to_store() 157 failf(data, in add_certs_data_to_store() 170 failf(data, in add_certs_data_to_store() 186 failf(data, in add_certs_data_to_store() 234 failf(data, in add_certs_file_to_store() 256 failf(data, in add_certs_file_to_store() 266 failf(data, in add_certs_file_to_store() 275 failf(data, in add_certs_file_to_store() 297 failf(data, in add_certs_file_to_store() 384 failf(data, "schannel: Null certificate context."); in cert_get_name_string() [all …]
|
D | mesalink.c | 111 failf(data, "MesaLink does not support to set maximum SSL/TLS version"); in mesalink_connect_step1() 120 failf(data, "MesaLink does not support SSL 3.0, TLS 1.0, or TLS 1.1"); in mesalink_connect_step1() 130 failf(data, "MesaLink does not support SSLv2"); in mesalink_connect_step1() 133 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in mesalink_connect_step1() 138 failf(data, "SSL: couldn't create a method!"); in mesalink_connect_step1() 147 failf(data, "SSL: couldn't create a context!"); in mesalink_connect_step1() 159 failf(data, in mesalink_connect_step1() 187 failf(data, "unable to use client certificate (no key or wrong pass" in mesalink_connect_step1() 195 failf(data, "unable to set private key"); in mesalink_connect_step1() 208 failf(data, "failed setting cipher list: %s", ciphers); in mesalink_connect_step1() [all …]
|
D | wolfssl.c | 229 failf(data, "wolfSSL does not support to set maximum SSL/TLS version"); in wolfssl_connect_step1() 252 failf(data, "wolfSSL does not support TLS 1.0"); in wolfssl_connect_step1() 261 failf(data, "wolfSSL does not support TLS 1.1"); in wolfssl_connect_step1() 275 failf(data, "wolfSSL: TLS 1.3 is not yet supported"); in wolfssl_connect_step1() 279 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in wolfssl_connect_step1() 284 failf(data, "SSL: couldn't create a method!"); in wolfssl_connect_step1() 293 failf(data, "SSL: couldn't create a context!"); in wolfssl_connect_step1() 314 failf(data, "SSL: couldn't set the minimum protocol version"); in wolfssl_connect_step1() 324 failf(data, "failed setting cipher list: %s", ciphers); in wolfssl_connect_step1() 338 failf(data, "error setting certificate verify locations:" in wolfssl_connect_step1() [all …]
|
D | mbedtls.c | 230 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 235 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 266 failf(data, "Not supported SSL version"); in mbed_connect_step1() 278 failf(data, "Failed - mbedTLS: ctr_drbg_init returned (-0x%04X) %s", in mbed_connect_step1() 289 failf(data, "Failed - mbedTLS: ctr_drbg_init returned (-0x%04X) %s", in mbed_connect_step1() 302 failf(data, "Error reading ca cert file %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 315 failf(data, "Error reading ca cert path %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 331 failf(data, "Error reading client cert file %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 346 failf(data, "Error reading private key %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 362 failf(data, "Error reading private key %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() [all …]
|
D | openssl.c | 774 failf(data, in cert_stuff() 794 failf(data, in cert_stuff() 829 failf(data, "ssl engine does not support loading certificates"); in cert_stuff() 836 failf(data, "ssl engine cannot load client cert with id" in cert_stuff() 844 failf(data, "ssl engine didn't initialized the certificate " in cert_stuff() 850 failf(data, "unable to set client certificate"); in cert_stuff() 857 failf(data, "crypto engine not set, can't load certificate"); in cert_stuff() 863 failf(data, "file type ENG for certificate not implemented"); in cert_stuff() 876 failf(data, in cert_stuff() 887 failf(data, in cert_stuff() [all …]
|
D | gtls.c | 217 failf(data, "SSL connection timeout"); in handshake() 235 failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO); in handshake() 243 failf(data, "SSL connection timeout at %ld", (long)timeout_ms); in handshake() 283 failf(data, "gnutls_handshake() failed: %s", strerr); in handshake() 379 failf(data, "GnuTLS: cannot set ssl protocol"); in set_ssl_version_min_max() 420 failf(data, "GnuTLS does not support SSLv2"); in gtls_connect_step1() 429 failf(data, "gnutls_cert_all_cred() failed: %s", gnutls_strerror(rc)); in gtls_connect_step1() 441 failf(data, "gnutls_srp_allocate_client_cred() failed: %s", in gtls_connect_step1() 450 failf(data, "gnutls_srp_set_client_cred() failed: %s", in gtls_connect_step1() 510 failf(data, "error reading crl file %s (%s)", in gtls_connect_step1() [all …]
|
D | schannel.c | 195 failf(data, "schannel: TLS 1.3 is not yet supported"); in set_ssl_version_min_max() 497 failf(data, "SSL versions not supported"); in schannel_acquire_credential_handle() 500 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in schannel_acquire_credential_handle() 508 failf(data, "Unable to set ciphers to passed via SSL_CONN_CONFIG"); in schannel_acquire_credential_handle() 545 failf(data, "schannel: Failed to get certificate location" in schannel_acquire_credential_handle() 555 failf(data, "schannel: certificate format compatibility error " in schannel_acquire_credential_handle() 592 failf(data, "schannel: Failed to read cert file %s", in schannel_acquire_credential_handle() 626 failf(data, "schannel: Failed to import cert file %s, " in schannel_acquire_credential_handle() 630 failf(data, "schannel: Failed to import cert file %s, " in schannel_acquire_credential_handle() 641 failf(data, "schannel: Failed to get certificate from file %s" in schannel_acquire_credential_handle() [all …]
|
D | gskit.c | 211 failf(data, "%s I/O error: %s", procname, strerror(errno)); in gskit_status() 216 failf(data, "%s: %s", procname, gsk_strerror(rc)); in gskit_status() 232 failf(data, "gsk_attribute_set_enum() I/O error: %s", strerror(errno)); in set_enum() 238 failf(data, "gsk_attribute_set_enum(): %s", gsk_strerror(rc)); in set_enum() 254 failf(data, "gsk_attribute_set_buffer() I/O error: %s", strerror(errno)); in set_buffer() 260 failf(data, "gsk_attribute_set_buffer(): %s", gsk_strerror(rc)); in set_buffer() 276 failf(data, "gsk_attribute_set_numeric_value() I/O error: %s", in set_numeric() 280 failf(data, "gsk_attribute_set_numeric_value(): %s", gsk_strerror(rc)); in set_numeric() 296 failf(data, "gsk_attribute_set_callback() I/O error: %s", strerror(errno)); in set_callback() 299 failf(data, "gsk_attribute_set_callback(): %s", gsk_strerror(rc)); in set_callback() [all …]
|
D | rustls.c | 135 failf(data, "reading from socket: %s", strerror(io_error)); in cr_recv() 140 failf(data, "connection closed without TLS close_notify alert"); in cr_recv() 150 failf(data, "%.*s", n, errorbuf); in cr_recv() 167 failf(data, "error in rustls_connection_read"); in cr_recv() 227 failf(data, "error in rustls_connection_write"); in cr_send() 232 failf(data, "EOF in rustls_connection_write"); in cr_send() 247 failf(data, "writing to socket: %s", strerror(io_error)); in cr_send() 252 failf(data, "EOF in swrite"); in cr_send() 329 failf(data, "failed to load trusted certificates"); in cr_init_backend() 341 failf(data, "rustls_client_connection_new: %.*s", errorlen, errorbuf); in cr_init_backend() [all …]
|
D | bearssl.c | 316 failf(data, "BearSSL does not support SSLv2"); in bearssl_connect_step1() 319 failf(data, "BearSSL does not support SSLv3"); in bearssl_connect_step1() 339 failf(data, "BearSSL: unknown CURLOPT_SSLVERSION"); in bearssl_connect_step1() 347 failf(data, "error setting certificate verify locations." in bearssl_connect_step1() 412 failf(data, "BearSSL: " in bearssl_connect_step1() 449 failf(data, "SSL: connection closed during handshake"); in bearssl_run_until() 454 failf(data, "SSL: X.509 verification: " in bearssl_run_until() 458 failf(data, "SSL: X.509 verification: " in bearssl_run_until() 462 failf(data, "SSL: X.509 verification: " in bearssl_run_until() 490 failf(data, "SSL: EOF without close notify"); in bearssl_run_until() [all …]
|
/third_party/curl/lib/vssh/ |
D | libssh.c | 363 failf(data, in myssh_is_known() 374 failf(data, in myssh_is_known() 706 failf(data, "Failure establishing ssh session"); in myssh_statemach_act() 793 failf(data, "Could not load private key file %s", in myssh_statemach_act() 914 failf(data, "Authentication failure"); in myssh_statemach_act() 942 failf(data, "Failure initializing sftp session: %s", in myssh_statemach_act() 951 failf(data, "Failure initializing sftp session: %s", in myssh_statemach_act() 1041 failf(data, "Attempt to set SFTP stats failed: %s", in myssh_statemach_act() 1060 failf(data, "symlink command failed: %s", in myssh_statemach_act() 1075 failf(data, "mkdir command failed: %s", in myssh_statemach_act() [all …]
|
D | libssh2.c | 638 failf(data, in ssh_check_fingerprint() 642 failf(data, in ssh_check_fingerprint() 763 failf(data, "Found host key type RSA1 which is not supported"); in ssh_force_knownhost_key_type() 766 failf(data, "Unknown host key type: %i", in ssh_force_knownhost_key_type() 837 failf(data, "Failure establishing ssh session: %d, %s", rc, err_msg); in ssh_statemach_act() 1184 failf(data, "Authentication failure"); in ssh_statemach_act() 1223 failf(data, "Failure initializing sftp session: %s", err_msg); in ssh_statemach_act() 1366 failf(data, "Syntax error command '%s'. Missing parameter!", in ssh_statemach_act() 1381 failf(data, "Out of memory"); in ssh_statemach_act() 1383 failf(data, "Syntax error: Bad first parameter to '%s'", cmd); in ssh_statemach_act() [all …]
|
D | wolfssh.c | 273 failf(data, "wolfSSH_SFTP_SendWritePacket returned %d", rc); in wsftp_send() 319 failf(data, "wolfSSH_SFTP_SendReadPacket returned %d", rc); in wsftp_recv() 388 failf(data, "No wolfSSH context"); in wssh_connect() 394 failf(data, "No wolfSSH session"); in wssh_connect() 400 failf(data, "wolfSSH failed to set user name"); in wssh_connect() 410 failf(data, "wolfSSH failed to set socket"); in wssh_connect() 496 failf(data, "wolfssh SFTP connect error %d", rc); in wssh_statemach_act() 527 failf(data, "wolfssh SFTP realpath %d", rc); in wssh_statemach_act() 582 failf(data, "Bad file size (%" CURL_FORMAT_CURL_OFF_T ")", size); in wssh_statemach_act() 622 failf(data, "wolfssh SFTP upload open failed: %d", rc); in wssh_statemach_act() [all …]
|
/third_party/curl/lib/vauth/ |
D | gsasl.c | 49 failf(data, "gsasl init: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_is_supported() 74 failf(data, "setting AUTHID failed: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_start() 85 failf(data, "setting PASSWORD failed: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_start() 108 failf(data, "GSASL step: %s\n", gsasl_strerror(res)); in Curl_auth_gsasl_token()
|