Home
last modified time | relevance | path

Searched refs:failf (Results 1 – 25 of 64) sorted by relevance

123

/external/curl/lib/vtls/
Dsectransp.c953 failf(data, "SSL: invalid CA certificate subject"); in CopyCertSubject()
963 failf(data, "SSL: out of memory"); in CopyCertSubject()
973 failf(data, "SSL: invalid CA certificate subject"); in CopyCertSubject()
981 failf(data, "SSL: couldn't allocate %zu bytes of memory", cbuf_size); in CopyCertSubject()
1339 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max()
1345 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max()
1377 failf(data, "Your version of the OS does not support TLSv1.3"); in set_ssl_version_min_max()
1385 failf(data, "Secure Transport: cannot set SSL protocol"); in set_ssl_version_min_max()
1430 failf(data, "SSL: couldn't create a context!");
1441 failf(data, "SSL: couldn't create a context: OSStatus %d", err);
[all …]
Dschannel_verify.c100 failf(data, in add_certs_to_store()
122 failf(data, in add_certs_to_store()
132 failf(data, in add_certs_to_store()
141 failf(data, in add_certs_to_store()
163 failf(data, in add_certs_to_store()
198 failf(data, in add_certs_to_store()
226 failf(data, in add_certs_to_store()
239 failf(data, in add_certs_to_store()
255 failf(data, in add_certs_to_store()
346 failf(data, "schannel: Null certificate context."); in cert_get_name_string()
[all …]
Dmesalink.c112 failf(data, "MesaLink does not support to set maximum SSL/TLS version"); in mesalink_connect_step1()
121 failf(data, "MesaLink does not support SSL 3.0, TLS 1.0, or TLS 1.1"); in mesalink_connect_step1()
131 failf(data, "MesaLink does not support SSLv2"); in mesalink_connect_step1()
134 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in mesalink_connect_step1()
139 failf(data, "SSL: couldn't create a method!"); in mesalink_connect_step1()
148 failf(data, "SSL: couldn't create a context!"); in mesalink_connect_step1()
160 failf(data, in mesalink_connect_step1()
188 failf(data, "unable to use client certificate (no key or wrong pass" in mesalink_connect_step1()
196 failf(data, "unable to set private key"); in mesalink_connect_step1()
209 failf(data, "failed setting cipher list: %s", ciphers); in mesalink_connect_step1()
[all …]
Dwolfssl.c240 failf(data, "wolfSSL does not support to set maximum SSL/TLS version"); in wolfssl_connect_step1()
263 failf(data, "wolfSSL does not support TLS 1.0"); in wolfssl_connect_step1()
281 failf(data, "wolfSSL: TLS 1.3 is not yet supported"); in wolfssl_connect_step1()
289 failf(data, "wolfSSL does not support SSLv3"); in wolfssl_connect_step1()
294 failf(data, "wolfSSL does not support SSLv2"); in wolfssl_connect_step1()
297 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in wolfssl_connect_step1()
302 failf(data, "SSL: couldn't create a method!"); in wolfssl_connect_step1()
311 failf(data, "SSL: couldn't create a context!"); in wolfssl_connect_step1()
332 failf(data, "SSL: couldn't set the minimum protocol version"); in wolfssl_connect_step1()
342 failf(data, "failed setting cipher list: %s", ciphers); in wolfssl_connect_step1()
[all …]
Dmbedtls.c226 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max()
231 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max()
269 failf(data, "mbedTLS does not support SSLv2"); in mbed_connect_step1()
283 failf(data, "Failed - mbedTLS: ctr_drbg_init returned (-0x%04X) %s\n", in mbed_connect_step1()
296 failf(data, "Failed - mbedTLS: ctr_drbg_init returned (-0x%04X) %s\n", in mbed_connect_step1()
311 failf(data, "Error reading ca cert file %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1()
326 failf(data, "Error reading ca cert path %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1()
344 failf(data, "Error reading client cert file %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1()
365 failf(data, "Error reading private key %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1()
382 failf(data, "Error reading CRL file %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1()
[all …]
Dopenssl.c732 failf(data, in cert_stuff()
752 failf(data, in cert_stuff()
787 failf(data, "ssl engine does not support loading certificates"); in cert_stuff()
794 failf(data, "ssl engine cannot load client cert with id" in cert_stuff()
802 failf(data, "ssl engine didn't initialized the certificate " in cert_stuff()
808 failf(data, "unable to set client certificate"); in cert_stuff()
815 failf(data, "crypto engine not set, can't load certificate"); in cert_stuff()
821 failf(data, "file type ENG for certificate not implemented"); in cert_stuff()
834 failf(data, in cert_stuff()
843 failf(data, "could not open PKCS12 file '%s'", cert_file); in cert_stuff()
[all …]
Dgtls.c223 failf(data, "SSL connection timeout"); in handshake()
241 failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO); in handshake()
249 failf(data, "SSL connection timeout at %ld", (long)timeout_ms); in handshake()
289 failf(data, "gnutls_handshake() failed: %s", strerr); in handshake()
377 failf(data, "GnuTLS: cannot set ssl protocol"); in set_ssl_version_min_max()
417 failf(data, "GnuTLS does not support SSLv2"); in gtls_connect_step1()
426 failf(data, "gnutls_cert_all_cred() failed: %s", gnutls_strerror(rc)); in gtls_connect_step1()
437 failf(data, "gnutls_srp_allocate_client_cred() failed: %s", in gtls_connect_step1()
446 failf(data, "gnutls_srp_set_client_cred() failed: %s", in gtls_connect_step1()
506 failf(data, "error reading crl file %s (%s)", in gtls_connect_step1()
[all …]
Dschannel.c190 failf(data, "schannel: TLS 1.3 is not yet supported"); in set_ssl_version_min_max()
477 failf(data, "schannel: this version of Windows is too old to support " in schannel_connect_step1()
486 failf(data, "schannel: CA cert support not built in"); in schannel_connect_step1()
578 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in schannel_connect_step1()
585 failf(data, "Unable to set ciphers to passed via SSL_CONN_CONFIG"); in schannel_connect_step1()
622 failf(data, "schannel: Failed to get certificate location" in schannel_connect_step1()
632 failf(data, "schannel: certificate format compatibility error " in schannel_connect_step1()
669 failf(data, "schannel: Failed to read cert file %s", in schannel_connect_step1()
703 failf(data, "schannel: Failed to import cert file %s, " in schannel_connect_step1()
707 failf(data, "schannel: Failed to import cert file %s, " in schannel_connect_step1()
[all …]
Dgskit.c209 failf(data, "%s I/O error: %s", procname, strerror(errno)); in gskit_status()
214 failf(data, "%s: %s", procname, gsk_strerror(rc)); in gskit_status()
230 failf(data, "gsk_attribute_set_enum() I/O error: %s", strerror(errno)); in set_enum()
236 failf(data, "gsk_attribute_set_enum(): %s", gsk_strerror(rc)); in set_enum()
252 failf(data, "gsk_attribute_set_buffer() I/O error: %s", strerror(errno)); in set_buffer()
258 failf(data, "gsk_attribute_set_buffer(): %s", gsk_strerror(rc)); in set_buffer()
274 failf(data, "gsk_attribute_set_numeric_value() I/O error: %s", in set_numeric()
278 failf(data, "gsk_attribute_set_numeric_value(): %s", gsk_strerror(rc)); in set_numeric()
294 failf(data, "gsk_attribute_set_callback() I/O error: %s", strerror(errno)); in set_callback()
297 failf(data, "gsk_attribute_set_callback(): %s", gsk_strerror(rc)); in set_callback()
[all …]
Dbearssl.c321 failf(data, "BearSSL does not support SSLv2"); in bearssl_connect_step1()
324 failf(data, "BearSSL does not support SSLv3"); in bearssl_connect_step1()
344 failf(data, "BearSSL: unknown CURLOPT_SSLVERSION"); in bearssl_connect_step1()
352 failf(data, "error setting certificate verify locations:\n" in bearssl_connect_step1()
416 failf(data, "BearSSL: " in bearssl_connect_step1()
453 failf(data, "SSL: connection closed during handshake"); in bearssl_run_until()
458 failf(data, "SSL: X.509 verification: " in bearssl_run_until()
462 failf(data, "SSL: X.509 verification: " in bearssl_run_until()
466 failf(data, "SSL: X.509 verification: " in bearssl_run_until()
494 failf(data, "SSL: EOF without close notify"); in bearssl_run_until()
[all …]
Dnss.c253 failf(data, "%s", PR_ErrorToString(err, PR_LANGUAGE_I_DEFAULT)); in nss_print_error_message()
331 failf(data, "Unknown cipher in list: %s", cipher); in set_ciphers()
346 failf(data, "cipher-suite not supported by NSS: %s", cipherlist[i].name); in set_ciphers()
709 failf(conn->data, "Unable to load client key: Incorrect password"); in display_error()
712 failf(conn->data, "Unable to load certificate %s", filename); in display_error()
732 failf(data, "unable to load client cert: %d (%s)", err, err_name); in cert_stuff()
749 failf(data, "unable to load client key: %d (%s)", err, err_name); in cert_stuff()
782 failf(conn->data, "Invalid OCSP response"); in nss_auth_cert_hook()
787 failf(conn->data, "No OCSP response received"); in nss_auth_cert_hook()
797 failf(conn->data, "Invalid OCSP response"); in nss_auth_cert_hook()
[all …]
/external/curl/lib/
Dsocks.c301 failf(data, "SOCKS4 connection to %s not supported\n", buf); in Curl_SOCKS4()
307 failf(data, "Failed to resolve \"%s\" for SOCKS4 connect.", in Curl_SOCKS4()
322 failf(data, "Too long SOCKS proxy user name, can't use!\n"); in Curl_SOCKS4()
348 failf(data, "SOCKS4: too long host name"); in Curl_SOCKS4()
363 failf(data, "Failed to send SOCKS4 connect request."); in Curl_SOCKS4()
384 failf(data, "SOCKS4: Failed receiving connect request ack: %s", in Curl_SOCKS4()
390 failf(data, "connection to proxy closed"); in Curl_SOCKS4()
426 failf(data, in Curl_SOCKS4()
437 failf(data, in Curl_SOCKS4()
446 failf(data, in Curl_SOCKS4()
[all …]
Dsocks_gssapi.c95 failf(data, "GSS-API error: %s failed:\n%s", function, buf); in check_gss_err()
165 failf(data, "Failed to create service name."); in Curl_SOCKS5_gssapi_negotiate()
194 failf(data, "Failed to initial GSS-API token."); in Curl_SOCKS5_gssapi_negotiate()
206 failf(data, "Failed to send GSS-API authentication request."); in Curl_SOCKS5_gssapi_negotiate()
218 failf(data, "Failed to send GSS-API authentication token."); in Curl_SOCKS5_gssapi_negotiate()
245 failf(data, "Failed to receive GSS-API authentication response."); in Curl_SOCKS5_gssapi_negotiate()
253 failf(data, "User was rejected by the SOCKS5 server (%d %d).", in Curl_SOCKS5_gssapi_negotiate()
261 failf(data, "Invalid GSS-API authentication response type (%d %d).", in Curl_SOCKS5_gssapi_negotiate()
274 failf(data, in Curl_SOCKS5_gssapi_negotiate()
286 failf(data, "Failed to receive GSS-API authentication token."); in Curl_SOCKS5_gssapi_negotiate()
[all …]
Dnon-ascii.c93 failf(data, in Curl_convert_to_network()
115 failf(data, in Curl_convert_to_network()
131 failf(data, in Curl_convert_to_network()
137 failf(data, "CURLOPT_CONV_TO_NETWORK_FUNCTION callback required"); in Curl_convert_to_network()
159 failf(data, in Curl_convert_from_network()
181 failf(data, in Curl_convert_from_network()
197 failf(data, in Curl_convert_from_network()
203 failf(data, "CURLOPT_CONV_FROM_NETWORK_FUNCTION callback required"); in Curl_convert_from_network()
225 failf(data, in Curl_convert_from_utf8()
248 failf(data, in Curl_convert_from_utf8()
[all …]
Dsocks_sspi.c55 failf(conn->data, "SSPI error: %s failed: %s", function, in check_sspi_err()
150 failf(data, "Failed to acquire credentials."); in Curl_SOCKS5_gssapi_negotiate()
197 failf(data, "Failed to initialise security context."); in Curl_SOCKS5_gssapi_negotiate()
209 failf(data, "Failed to send SSPI authentication request."); in Curl_SOCKS5_gssapi_negotiate()
223 failf(data, "Failed to send SSPI authentication token."); in Curl_SOCKS5_gssapi_negotiate()
263 failf(data, "Failed to receive SSPI authentication response."); in Curl_SOCKS5_gssapi_negotiate()
272 failf(data, "User was rejected by the SOCKS5 server (%u %u).", in Curl_SOCKS5_gssapi_negotiate()
281 failf(data, "Invalid SSPI authentication response type (%u %u).", in Curl_SOCKS5_gssapi_negotiate()
305 failf(data, "Failed to receive SSPI authentication token."); in Curl_SOCKS5_gssapi_negotiate()
327 failf(data, "Failed to determine user name."); in Curl_SOCKS5_gssapi_negotiate()
[all …]
Dtftp.c213 failf(state->conn->data, "Connection time-out"); in tftp_set_timeouts()
348 failf(data, "Malformed ACK packet, rejecting"); in tftp_parse_option_ack()
360 failf(data, "invalid blocksize value in OACK packet"); in tftp_parse_option_ack()
364 failf(data, "%s (%d)", "blksize is larger than max supported", in tftp_parse_option_ack()
369 failf(data, "%s (%d)", "blksize is smaller than min supported", in tftp_parse_option_ack()
377 failf(data, "%s (%ld)", in tftp_parse_option_ack()
396 failf(data, "invalid tsize -:%s:- value in OACK packet", value); in tftp_parse_option_ack()
496 failf(data, "TFTP file name too long\n"); in tftp_send_first()
544 failf(data, "TFTP buffer too small for options"); in tftp_send_first()
558 failf(data, "%s", Curl_strerror(SOCKERRNO, buffer, sizeof(buffer))); in tftp_send_first()
[all …]
Drtsp.c217 failf(data, in rtsp_done()
265 failf(data, "Got invalid RTSP request"); in rtsp_do()
306 failf(data, "Got invalid RTSP request: RTSPREQ_LAST"); in rtsp_do()
319 failf(data, "Refusing to issue an RTSP request [%s] without a session ID.", in rtsp_do()
346 failf(data, in rtsp_do()
425 failf(data, "CSeq cannot be set as a custom header."); in rtsp_do()
429 failf(data, "Session ID cannot be set as a custom header."); in rtsp_do()
570 failf(data, "Failed sending RTSP request"); in rtsp_do()
647 failf(data, "Got an error writing an RTP packet"); in rtsp_rtp_readwrite()
724 failf(data, "Cannot write a 0 size RTP packet."); in rtp_client_write()
[all …]
Dldap.c306 failf(data, "LDAP local: %s", ldap_err2string(rc)); in Curl_ldap()
350 failf(data, "LDAP local: ldapssl_client_init %s", ldap_err2string(rc)); in Curl_ldap()
361 failf(data, "LDAP local: ERROR %s CA cert not set!", in Curl_ldap()
371 failf(data, "LDAP local: ERROR setting %s CA cert: %s", in Curl_ldap()
383 failf(data, "LDAP local: ERROR setting cert verify mode: %s", in Curl_ldap()
390 failf(data, "LDAP local: Cannot connect to %s:%ld", in Curl_ldap()
400 failf(data, "LDAP local: ERROR OpenLDAP only supports PEM cert-type!"); in Curl_ldap()
405 failf(data, "LDAP local: ERROR PEM CA cert not set!"); in Curl_ldap()
412 failf(data, "LDAP local: ERROR setting PEM CA cert: %s", in Curl_ldap()
424 failf(data, "LDAP local: ERROR setting cert verify mode: %s", in Curl_ldap()
[all …]
Dftp.c279 failf(data, "Error accept()ing server connect"); in AcceptServerConnect()
376 failf(data, "Accept timeout occurred while waiting server connect"); in ReceivedServerConnect()
394 failf(data, "Error while waiting for server connect"); in ReceivedServerConnect()
489 failf(data, "Accept timeout occurred while waiting server connect"); in AllowServerConnect()
634 failf(data, "FTP response timeout"); in Curl_GetFTPResponse()
667 failf(data, "FTP response aborted due to select/poll error: %d", in Curl_GetFTPResponse()
1043 failf(data, "getsockname() failed: %s", in ftp_state_use_port()
1078 failf(data, "failed to resolve the address provided to PORT: %s", host); in ftp_state_use_port()
1099 failf(data, "socket failure: %s", in ftp_state_use_port()
1129 failf(data, "getsockname() failed: %s", in ftp_state_use_port()
[all …]
Dtransfer.c202 failf(data, "operation aborted by trailing headers callback"); in Curl_fillreadbuffer()
249 failf(data, "operation aborted by callback"); in Curl_fillreadbuffer()
260 failf(data, "Read callback asked for PAUSE when not supported!"); in Curl_fillreadbuffer()
277 failf(data, "read function returned funny value"); in Curl_fillreadbuffer()
439 failf(data, "Cannot rewind mime/post data"); in Curl_readrewind()
451 failf(data, "seek callback returned error %d", (int)err); in Curl_readrewind()
465 failf(data, "ioctl callback returned error %d", (int)err); in Curl_readrewind()
480 failf(data, "necessary data rewind wasn't possible"); in Curl_readrewind()
743 failf(data, "HTTP server doesn't seem to support " in readwrite_data()
802 failf(data, "Failed reading the chunked-encoded stream"); in readwrite_data()
[all …]
Dopenldap.c189 failf(conn->data, "LDAP local: %s", msg); in ldap_setup_connection()
236 failf(data, "LDAP local: Cannot connect to %s, %s", in ldap_connect()
314 failf(data, "LDAP local: bind ldap_result %s", ldap_err2string(rc)); in ldap_connecting()
324 failf(data, "LDAP local: bind ldap_parse_result %s", ldap_err2string(rc)); in ldap_connecting()
345 failf(data, "LDAP remote: bind failed %s %s", ldap_err2string(rc), in ldap_connecting()
399 failf(conn->data, "LDAP local: %s", msg); in ldap_do()
408 failf(data, "LDAP local: ldap_search_ext %s", ldap_err2string(rc)); in ldap_do()
461 failf(data, "LDAP local: search ldap_result %s", ldap_err2string(rc)); in ldap_recv()
485 failf(data, "LDAP local: search ldap_parse_result %s", in ldap_recv()
490 failf(data, "LDAP remote: search failed %s %s", ldap_err2string(rc), in ldap_recv()
Dcurl_ntlm_wb.c187 failf(data, "Could not access ntlm_auth: %s errno %d: %s", in ntlm_wb_init()
193 failf(data, "Could not open socket pair. errno %d: %s", in ntlm_wb_init()
202 failf(data, "Could not fork. errno %d: %s", in ntlm_wb_init()
214 failf(data, "Could not redirect child stdin. errno %d: %s", in ntlm_wb_init()
220 failf(data, "Could not redirect child stdout. errno %d: %s", in ntlm_wb_init()
240 failf(data, "Could not execl(). errno %d: %s", in ntlm_wb_init()
/external/curl/lib/vssh/
Dlibssh.c357 failf(data, in myssh_is_known()
368 failf(data, in myssh_is_known()
701 failf(data, "Failure establishing ssh session"); in myssh_statemach_act()
782 failf(data, "Could not load private key file %s", in myssh_statemach_act()
901 failf(data, "Authentication failure"); in myssh_statemach_act()
929 failf(data, "Failure initializing sftp session: %s", in myssh_statemach_act()
938 failf(data, "Failure initializing sftp session: %s", in myssh_statemach_act()
1028 failf(data, "Attempt to set SFTP stats failed: %s", in myssh_statemach_act()
1047 failf(data, "symlink command failed: %s", in myssh_statemach_act()
1062 failf(data, "mkdir command failed: %s", in myssh_statemach_act()
[all …]
Dlibssh2.c641 failf(data, in ssh_check_fingerprint()
645 failf(data, in ssh_check_fingerprint()
766 failf(data, "Found host key type RSA1 which is not supported\n"); in ssh_force_knownhost_key_type()
769 failf(data, "Unknown host key type: %i\n", in ssh_force_knownhost_key_type()
841 failf(data, "Failure establishing ssh session: %d, %s", rc, err_msg); in ssh_statemach_act()
1188 failf(data, "Authentication failure"); in ssh_statemach_act()
1227 failf(data, "Failure initializing sftp session: %s", err_msg); in ssh_statemach_act()
1371 failf(data, "Syntax error command '%s'. Missing parameter!", in ssh_statemach_act()
1386 failf(data, "Out of memory"); in ssh_statemach_act()
1388 failf(data, "Syntax error: Bad first parameter to '%s'", cmd); in ssh_statemach_act()
[all …]
Dwolfssh.c265 failf(conn->data, "wolfSSH_SFTP_SendWritePacket returned %d\n", rc); in wsftp_send()
310 failf(conn->data, "wolfSSH_SFTP_SendReadPacket returned %d\n", rc); in wsftp_recv()
377 failf(data, "No wolfSSH context"); in wssh_connect()
383 failf(data, "No wolfSSH session"); in wssh_connect()
389 failf(data, "wolfSSH failed to set user name"); in wssh_connect()
399 failf(data, "wolfSSH failed to set socket"); in wssh_connect()
485 failf(data, "wolfssh SFTP connect error %d", rc); in wssh_statemach_act()
516 failf(data, "wolfssh SFTP realpath %d", rc); in wssh_statemach_act()
571 failf(data, "Bad file size (%" CURL_FORMAT_CURL_OFF_T ")", size); in wssh_statemach_act()
611 failf(data, "wolfssh SFTP upload open failed: %d", rc); in wssh_statemach_act()
[all …]

123