/third_party/libwebsockets/minimal-examples/api-tests/api-test-cose/ |
D | sign.c | 704 lwsl_notice("%s: key import fail\n", __func__); in test_cose_sign() 711 lwsl_notice("%s: sign_val_create fail\n", __func__); in test_cose_sign() 718 lwsl_notice("%s: sign_val_chunk failed\n", __func__); in test_cose_sign() 744 lwsl_notice("%s: sign_val_create fail\n", __func__); in test_cose_sign() 751 lwsl_notice("%s: sign_val_chunk failed\n", __func__); in test_cose_sign() 774 lwsl_notice("%s: key import fail\n", __func__); in test_cose_sign() 783 lwsl_notice("%s: sign_val_create fail\n", __func__); in test_cose_sign() 790 lwsl_notice("%s: sign_val_chunk failed\n", __func__); in test_cose_sign() 813 lwsl_notice("%s: key import fail\n", __func__); in test_cose_sign() 822 lwsl_notice("%s: sign_val_create fail\n", __func__); in test_cose_sign() [all …]
|
/third_party/libwebsockets/test-apps/ |
D | test-client.c | 138 lwsl_notice("dumb: LWS_CALLBACK_CLOSED\n"); in callback_dumb_increment() 173 lwsl_notice("denied deflate-stream extension\n"); in callback_dumb_increment() 183 lwsl_notice("lws_http_client_http_response %d\n", in callback_dumb_increment() 188 lwsl_notice(" Peer Cert CN : %s\n", ci.ns.name); in callback_dumb_increment() 192 lwsl_notice(" Peer Cert issuer : %s\n", ci.ns.name); in callback_dumb_increment() 197 lwsl_notice(" Peer Cert Valid from: %s", in callback_dumb_increment() 200 lwsl_notice(" Peer Cert Valid from: %s", in callback_dumb_increment() 206 lwsl_notice(" Peer Cert Valid to : %s", in callback_dumb_increment() 209 lwsl_notice(" Peer Cert Valid to : %s", in callback_dumb_increment() 214 lwsl_notice(" Peer Cert usage bits: 0x%x\n", ci.usage); in callback_dumb_increment() [all …]
|
D | test-sshd.c | 214 lwsl_notice("dropping...\n"); in ssh_ops_rx() 227 lwsl_notice("dropping...\n"); in ssh_ops_rx() 266 lwsl_notice("%s: %d\n", __func__, fd); in ssh_ops_set_server_key() 301 lwsl_notice("OOM 1\n"); in ssh_ops_is_pubkey_authorized() 308 lwsl_notice("type is not ssh-rsa\n"); in ssh_ops_is_pubkey_authorized() 314 lwsl_notice("lead-in string does not match %s\n", type); in ssh_ops_is_pubkey_authorized() 320 lwsl_notice("missing space at end of lead-in\n"); in ssh_ops_is_pubkey_authorized() 328 lwsl_notice("OOM 2\n"); in ssh_ops_is_pubkey_authorized() 335 lwsl_notice("key too big\n"); in ssh_ops_is_pubkey_authorized() 340 lwsl_notice("peer_len %d bigger than decoded len %d\n", in ssh_ops_is_pubkey_authorized() [all …]
|
D | test-lecp.c | 64 lwsl_notice("%s%s: path %s match %d statckp %d\r\n", buf, in cb() 116 lwsl_notice("%s \r\n", buf); in cb() 124 lwsl_notice("%sParsing Completed (LEJPCB_COMPLETE)\n", buf); in cb() 127 lwsl_notice("%spath: '%s' (LEJPCB_PAIR_NAME)\n", buf, ctx->path); in cb() 130 lwsl_notice("LECPCB_TAG_START: %llu\r\n", (unsigned long long)ctx->item.u.u64); in cb() 146 lwsl_notice("libwebsockets-test-lecp (C) 2017 - 2021 andy@warmcat.com\n"); in main() 147 lwsl_notice(" usage: cat my.cbor | libwebsockets-test-lecp\n\n"); in main() 164 lwsl_notice("okay (%d)\n", m); in main()
|
D | test-lejp.c | 64 lwsl_notice("%s (%s)\r\n", buf, in cb() 74 lwsl_notice("%sParsing Completed (LEJPCB_COMPLETE)\n", buf); in cb() 77 lwsl_notice("%spath: '%s' (LEJPCB_PAIR_NAME)\n", buf, ctx->path); in cb() 81 lwsl_notice("%s%s: path %s match %d statckp %d\r\n", buf, reason_names[(unsigned int) in cb() 97 lwsl_notice("libwebsockets-test-lejp (C) 2017 - 2018 andy@warmcat.com\n"); in main() 98 lwsl_notice(" usage: cat my.json | libwebsockets-test-lejp\n\n"); in main() 115 lwsl_notice("okay (%d)\n", m); in main()
|
/third_party/libwebsockets/plugins/acme-client/ |
D | protocol_lws_acme_client.c | 151 lwsl_notice("%s: ca connection received, key_auth %s\n", in callback_chall_http01() 155 lwsl_notice("%s: add status failed\n", __func__); in callback_chall_http01() 163 lwsl_notice("%s: add content_type failed\n", __func__); in callback_chall_http01() 169 lwsl_notice("%s: add content_length failed\n", in callback_chall_http01() 178 lwsl_notice("%s: add content_dispo failed\n", __func__); in callback_chall_http01() 183 lwsl_notice("%s: finalize http header failed\n", in callback_chall_http01() 193 lwsl_notice("%s: len %d\n", __func__, lws_ptr_diff(p, start)); in callback_chall_http01() 237 lwsl_notice("%s: malloc %d failed\n", __func__, n); in jws_create_packet() 258 lwsl_notice("failed to export jwk\n"); in jws_create_packet() 276 lwsl_notice("%s: failed to encode protected\n", __func__); in jws_create_packet() [all …]
|
/third_party/libwebsockets/minimal-examples/http-client/minimal-http-client-certinfo/ |
D | minimal-http-client-certinfo.c | 44 lwsl_notice("lws_http_client_http_response %d\n", status); in callback_http() 48 lwsl_notice(" Peer Cert CN : %s\n", ci->ns.name); in callback_http() 52 lwsl_notice(" Peer Cert issuer : %s\n", ci->ns.name); in callback_http() 57 lwsl_notice(" Peer Cert Valid from: %s", in callback_http() 60 lwsl_notice(" Peer Cert Valid from: %s", in callback_http() 66 lwsl_notice(" Peer Cert Valid to : %s", in callback_http() 69 lwsl_notice(" Peer Cert Valid to : %s", in callback_http() 74 lwsl_notice(" Peer Cert usage bits: 0x%x\n", ci->usage); in callback_http() 78 lwsl_notice(" Peer Cert public key:\n"); in callback_http() 84 lwsl_notice(" AUTHORITY_KEY_ID\n"); in callback_http() [all …]
|
/third_party/libwebsockets/minimal-examples/api-tests/api-test-lws_struct-json/ |
D | test2.c | 139 lwsl_notice("%s: id1 '%s'\n", __func__, c->id1); in t2_config_dump() 140 lwsl_notice("%s: arg1 '%s'\n", __func__, c->arg1); in t2_config_dump() 141 lwsl_notice("%s: ssid '%s'\n", __func__, c->ssid); in t2_config_dump() 143 lwsl_notice("%s: freq %d\n", __func__, c->frequency); in t2_config_dump() 144 lwsl_notice("%s: arg2 %llu\n", __func__, c->arg2); in t2_config_dump() 145 lwsl_notice("%s: priority %d\n", __func__, c->priority); in t2_config_dump() 147 lwsl_notice("%s: key1: %s, key2: %s\n", __func__, in t2_config_dump() 157 lwsl_notice("%s: number of configs: %d\n", __func__, in t2_configs_dump() 177 lwsl_notice("%s: start \n", __func__); in test2() 186 lwsl_notice("%s: lejp_parse %d\n", __func__, n); in test2()
|
/third_party/libwebsockets/minimal-examples/api-tests/api-test-jose/ |
D | jwk.c | 272 lwsl_notice("%s: key type %d\n", __func__, s->kty); in key_import_callback() 288 lwsl_notice("Failed to decode JWK test key\n"); in test_jwk() 299 lwsl_notice("Failed at A.2\n"); in test_jwk() 310 lwsl_notice("Failed at A.3\n"); in test_jwk() 320 lwsl_notice("Failed at B\n"); in test_jwk() 331 lwsl_notice("Failed at B\n"); in test_jwk() 339 lwsl_notice("%s: selftest OK\n", __func__); in test_jwk()
|
D | jws.c | 94 lwsl_notice("%s: selftest OK\n", __func__); in test_jws_none() 149 lwsl_notice("Failed to decode JWK test key\n"); in test_jws_HS256() 203 lwsl_notice("%s: confirm sig failed\n", __func__); in test_jws_HS256() 213 lwsl_notice("%s: selftest OK\n", __func__); in test_jws_HS256() 299 lwsl_notice("%s: 2.2: Failed to read JWK key\n", __func__); in test_jws_RS256() 313 lwsl_notice("%s: 2.2: confirm rsa sig failed\n", __func__); in test_jws_RS256() 319 lwsl_notice("%s: lws_jws_b64_compact_map failed\n", __func__); in test_jws_RS256() 333 lwsl_notice("%s: lws_jws_b64_compact_map failed\n", __func__); in test_jws_RS256() 352 lwsl_notice("%s: 2.2: confirm rsa sig failed\n", __func__); in test_jws_RS256() 360 lwsl_notice("%s: selftest OK\n", __func__); in test_jws_RS256() [all …]
|
D | jwe.c | 80 lwsl_notice("%s: Failed to decode JWK test key\n", __func__); in test_jwe_a1() 121 lwsl_notice("%s: Failed to decode JWK test key\n", __func__); in test_jwe_a1() 149 lwsl_notice("%s: Not enough temp space for ptext\n", __func__); in test_jwe_a1() 196 lwsl_notice("%s: Failed to decode JWK test key\n", __func__); in test_jwe_a1() 215 lwsl_notice("%s: selftest OK\n", __func__); in test_jwe_a1() 296 lwsl_notice("%s: Failed to decode JWK test key\n", __func__); in test_jwe_a2() 335 lwsl_notice("%s: selftest OK\n", __func__); in test_jwe_a2() 504 lwsl_notice("%s: Failed to decode JWK test key\n", __func__); in test_jwe_ra_ptext_1024() 515 lwsl_notice("%s: Not enough temp space for ptext\n", __func__); in test_jwe_ra_ptext_1024() 525 lwsl_notice("%s: Not enough temp space for EKEY\n", __func__); in test_jwe_ra_ptext_1024() [all …]
|
/third_party/libwebsockets/plugins/ |
D | protocol_lws_raw_test.c | 149 lwsl_notice("FIFO %s created\n", vhd->fifo_path); in callback_raw_test() 177 lwsl_notice("LWS_CALLBACK_RAW_ADOPT_FILE\n"); in callback_raw_test() 182 lwsl_notice("LWS_CALLBACK_RAW_RX_FILE\n"); in callback_raw_test() 215 lwsl_notice("LWS_CALLBACK_RAW_CLOSE_FILE\n"); in callback_raw_test() 228 lwsl_notice("FIFO %s reopened\n", vhd->fifo_path); in callback_raw_test() 240 lwsl_notice("LWS_CALLBACK_RAW_WRITEABLE_FILE\n"); in callback_raw_test() 248 lwsl_notice("LWS_CALLBACK_RAW_ADOPT\n"); in callback_raw_test() 252 lwsl_notice("LWS_CALLBACK_RAW_RX %ld\n", (long)len); in callback_raw_test() 261 lwsl_notice("LWS_CALLBACK_RAW_CLOSE\n"); in callback_raw_test() 265 lwsl_notice("LWS_CALLBACK_RAW_WRITEABLE\n"); in callback_raw_test()
|
D | protocol_client_loopback_test.c | 126 lwsl_notice("client connection to %s:%d with ssl: %d started\n", in callback_client_loopback_test() 136 lwsl_notice("Http part closed\n"); in callback_client_loopback_test() 142 lwsl_notice("server part: LWS_CALLBACK_ESTABLISHED\n"); in callback_client_loopback_test() 153 lwsl_notice("Client connection established\n"); in callback_client_loopback_test() 158 lwsl_notice("Client connection received %ld from server '%s'\n", in callback_client_loopback_test()
|
D | protocol_lws_sshd_demo.c | 261 lwsl_notice("OOM 1\n"); in ssh_ops_is_pubkey_authorized() 268 lwsl_notice("type is not ssh-rsa\n"); in ssh_ops_is_pubkey_authorized() 274 lwsl_notice("lead-in string does not match %s\n", type); in ssh_ops_is_pubkey_authorized() 280 lwsl_notice("missing space at end of lead-in\n"); in ssh_ops_is_pubkey_authorized() 287 lwsl_notice("OOM 2\n"); in ssh_ops_is_pubkey_authorized() 294 lwsl_notice("key too big\n"); in ssh_ops_is_pubkey_authorized() 299 lwsl_notice("peer_len %d bigger than decoded len %d\n", in ssh_ops_is_pubkey_authorized() 359 lwsl_notice("DISCONNECT reason 0x%X, %s (lang %s)\n", reason, desc, in ssh_ops_disconnect_reason() 444 lwsl_notice("can't find lws-ssh-base\n"); in callback_lws_sshd_demo()
|
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-alexa/ |
D | alexa.c | 107 lwsl_notice("%s: est txcr %d\n", __func__, est); in use_buffer_250ms() 110 lwsl_notice(" adding %d\n", MAX_MP3_IN_BUFFERING_BYTES / 4); in use_buffer_250ms() 126 lwsl_notice("%s\n", __func__); in ss_avs_mp3_open() 206 lwsl_notice("%s: preload %d: %d\n", __func__, (int)s, t); in drain_end_cb() 219 lwsl_notice("%s: preloaded EOM\n", __func__); in drain_end_cb() 259 lwsl_notice("%s: len %d, flags %d (est peer txcr %d)\n", __func__, in ss_avs_metadata_rx() 297 lwsl_notice("identified reply...\n"); in ss_avs_metadata_rx() 353 lwsl_notice("%s: SPOOL %d\n", __func__, (int)len); in ss_avs_metadata_rx() 381 lwsl_notice("%s: EOM\n", __func__); in ss_avs_metadata_rx() 404 lwsl_notice("%s: DRAINING: stashing %d: %d %d %d\n", in ss_avs_metadata_rx() [all …]
|
/third_party/libwebsockets/plugins/ssh-base/ |
D | sshd.c | 154 lwsl_notice("get_gen_server_key failed\n"); in offer() 161 lwsl_notice("unable to parse server key: %d\n", n); in offer() 514 lwsl_notice("Failed to delete ch\n"); in ssh_destroy_channel() 568 lwsl_notice("mangled id string\n"); in lws_ssh_parse_plaintext() 596 lwsl_notice("illegal msg size\n"); in lws_ssh_parse_plaintext() 618 lwsl_notice("SSH_MSG_DISCONNECT\n"); in lws_ssh_parse_plaintext() 622 lwsl_notice("SSH_MSG_IGNORE\n"); in lws_ssh_parse_plaintext() 625 lwsl_notice("SSH_MSG_UNIMPLEMENTED\n"); in lws_ssh_parse_plaintext() 628 lwsl_notice("SSH_MSG_DEBUG\n"); in lws_ssh_parse_plaintext() 636 lwsl_notice("SSH_MSG_ACCEPT\n"); in lws_ssh_parse_plaintext() [all …]
|
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-eventlib-foreign/ |
D | minimal-http-server-eventlib-foreign.c | 64 lwsl_notice("Signal %d caught, exiting...\n", signum); in signal_cb() 271 lwsl_notice("%s: using libuv event loop\n", __func__); in main() 278 lwsl_notice("%s: using libevent loop\n", __func__); in main() 285 lwsl_notice("%s: using libev loop\n", __func__); in main() 292 lwsl_notice("%s: using glib loop\n", __func__); in main() 299 lwsl_notice("%s: using sd-event loop\n", __func__); in main() 306 lwsl_notice("%s: using uloop loop\n", __func__); in main()
|
/third_party/libwebsockets/lib/roles/mqtt/ |
D | mqtt.c | 511 lwsl_notice("%s: server sent non-CONNACK\n", in _lws_mqtt_rx_parser() 525 lwsl_notice("%s: %s: bad flags, 0x%02x mask 0x%02x (len %d)\n", in _lws_mqtt_rx_parser() 560 lwsl_notice("%s: bad vbi\n", __func__); in _lws_mqtt_rx_parser() 573 lwsl_notice("%s: protocol name: %.*s\n", in _lws_mqtt_rx_parser() 581 lwsl_notice("%s: bad protocol name\n", __func__); in _lws_mqtt_rx_parser() 627 lwsl_notice("%s: ka bad vbi\n", __func__); in _lws_mqtt_rx_parser() 651 lwsl_notice("%s: connpr bad vbi\n", __func__); in _lws_mqtt_rx_parser() 672 lwsl_notice("%s: pubrec bad vbi\n", __func__); in _lws_mqtt_rx_parser() 679 lwsl_notice("%s: len breakage 3\n", __func__); in _lws_mqtt_rx_parser() 715 lwsl_notice("%s: len breakage 3\n", __func__); in _lws_mqtt_rx_parser() [all …]
|
/third_party/libwebsockets/minimal-examples/api-tests/api-test-fts/ |
D | main.c | 84 lwsl_notice("Creating index\n"); in main() 189 lwsl_notice("%s: no autocomplete results\n", __func__); in main() 192 lwsl_notice("%s: AC %s: %d agg hits\n", __func__, in main() 199 lwsl_notice("%s: no filepath results\n", __func__); in main() 202 lwsl_notice("%s: %s: (%d lines) %d hits \n", __func__, in main() 210 lwsl_notice(" %d\n", *l++); in main()
|
/third_party/libwebsockets/lib/abstract/transports/ |
D | unit-test.c | 111 lwsl_notice("%s: expected rx return %d, got %d\n", in process_expect() 139 lwsl_notice("%s: %s: created\n", __func__, in unit_test_sequencer_cb() 142 lwsl_notice("%s: %s: abstract client conn failed\n", in unit_test_sequencer_cb() 218 lwsl_notice("%s: UTSEQ_MSG_POST_TX_KICK failed\n", in unit_test_sequencer_cb() 285 lwsl_notice("%s\n", __func__); in lws_atcut_close() 305 lwsl_notice("%s: unexpected tx\n", __func__); in lws_atcut_tx() 313 lwsl_notice("%s: unexpected tx len %zu, expected %zu\n", in lws_atcut_tx() 322 lwsl_notice("%s: tx mismatch (exp / actual)\n", __func__); in lws_atcut_tx() 360 lwsl_notice("%s: unit_test needs LTMI_PEER_V_EXPECT_TEST\n", in lws_atcut_client_conn() 387 lwsl_notice("%s: %s: test '%s': start\n", __func__, abs->ap->name, in lws_atcut_client_conn()
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | mbedtls-server.c | 37 lwsl_notice("no client cert required\n"); in lws_tls_server_client_cert_verify_config() 44 lwsl_notice("%s: vh %s requires client cert %d\n", __func__, vh->name, in lws_tls_server_client_cert_verify_config() 60 lwsl_notice("%s: %s\n", __func__, servername); in lws_mbedtls_sni_cb() 116 lwsl_notice("%s: no usable input\n", __func__); in lws_tls_server_certs_load() 204 lwsl_notice("%s: vh %s: loading CA filepath %s\n", __func__, in lws_tls_server_vhost_backend_init() 230 lwsl_notice("%s: vh %s: mem CA OK\n", __func__, vhost->name); in lws_tls_server_vhost_backend_init() 294 lwsl_notice("%s: vhost has .invalid, " in lws_tls_server_accept() 303 lwsl_notice("%s: client cert CN '%s'\n", in lws_tls_server_accept() 633 lwsl_notice("%s: pk_setup failed\n", __func__); in lws_tls_acme_sni_csr_create() 640 lwsl_notice("%s: failed to generate keys\n", __func__); in lws_tls_acme_sni_csr_create() [all …]
|
/third_party/libwebsockets/minimal-examples/ws-client/minimal-ws-client-spam-tx-rx/ |
D | minimal-ws-client.c | 36 lwsl_notice("%s: connection %s:%d\n", __func__, i.address, i.port); in connect_client() 118 lwsl_notice("server initiated connection close: len = %lu, " in callback() 196 lwsl_notice("Start test clients: %d\n", nclients); in main() 201 lwsl_notice("Connection delay: %d\n", connection_delay); in main() 206 lwsl_notice("Message delay: %d\n", connection_delay); in main() 220 lwsl_notice("%s: exiting service loop. n = %d, interrupted = %d\n", in main()
|
/third_party/libwebsockets/minimal-examples/api-tests/api-test-lws_dsh/ |
D | main.c | 266 lwsl_notice("%s: budget %u\n", __func__, budget); in test5() 288 lwsl_notice("%s: kind 0 alloc %d\n", __func__, (int)size); in test5() 297 lwsl_notice("%s: kind 1 alloc %d\n", __func__, (int)size); in test5() 304 lwsl_notice("%s: kind 0 read %d\n", __func__, (int)size); in test5() 313 lwsl_notice("%s: kind 1 read %d\n", __func__, (int)size); in test5() 321 lwsl_notice("%s: kind 0 read %d\n", __func__, (int)size); in test5() 326 lwsl_notice("%s: kind 1 read %d\n", __func__, (int)size); in test5()
|
/third_party/libwebsockets/minimal-examples/embedded/esp32/esp-wrover-kit/main/ |
D | lws-minimal-esp32.c | 73 lwsl_notice("Completed: PASS\n"); in completion_sul_cb() 96 lwsl_notice("%s: received %u bytes, passing in 10s\n", in myss_rx() 163 lwsl_notice("%s: creating test secure stream\n", __func__); in smd_cb() 198 lwsl_notice("LWS test for Espressif ESP32 WROVER KIT\n"); in app_main() 244 lwsl_notice("%s: exited event loop\n", __func__); in app_main()
|
/third_party/libwebsockets/lib/plat/windows/ |
D | windows-spawn.c | 48 lwsl_notice("%s: reaping spawn after last stdpipe, tries left %d\n", in lws_spawn_sul_reap() 128 lwsl_notice("%s: closing stdwsi %d\n", __func__, n); in lws_spawn_piped_destroy() 162 lwsl_notice("%s: GetExitCodeProcess failed\n", __func__); in lws_spawn_reap() 169 lwsl_notice("%s: still active\n", __func__); in lws_spawn_reap() 195 lwsl_notice("%s: stdwsi alive, not reaping\n", __func__); in lws_spawn_reap() 209 lwsl_notice("%s: process exit 0x%x\n", __func__, lsi.retcode); in lws_spawn_reap() 223 lwsl_notice("%s: completed reap\n", __func__); in lws_spawn_reap() 272 lwsl_notice("%s: stdout pipe errored\n", __func__); in windows_pipe_poll_hack() 280 lwsl_notice("%s: closing stdin from stdout close\n", in windows_pipe_poll_hack() 311 lwsl_notice("%s: stderr pipe errored\n", __func__); in windows_pipe_poll_hack() [all …]
|