/external/curl/lib/vtls/ |
D | sectransp.c | 953 failf(data, "SSL: invalid CA certificate subject"); in CopyCertSubject() 963 failf(data, "SSL: out of memory"); in CopyCertSubject() 973 failf(data, "SSL: invalid CA certificate subject"); in CopyCertSubject() 981 failf(data, "SSL: couldn't allocate %zu bytes of memory", cbuf_size); in CopyCertSubject() 1339 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 1345 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 1377 failf(data, "Your version of the OS does not support TLSv1.3"); in set_ssl_version_min_max() 1385 failf(data, "Secure Transport: cannot set SSL protocol"); in set_ssl_version_min_max() 1430 failf(data, "SSL: couldn't create a context!"); 1441 failf(data, "SSL: couldn't create a context: OSStatus %d", err); [all …]
|
D | schannel_verify.c | 100 failf(data, in add_certs_to_store() 122 failf(data, in add_certs_to_store() 132 failf(data, in add_certs_to_store() 141 failf(data, in add_certs_to_store() 163 failf(data, in add_certs_to_store() 198 failf(data, in add_certs_to_store() 226 failf(data, in add_certs_to_store() 239 failf(data, in add_certs_to_store() 255 failf(data, in add_certs_to_store() 346 failf(data, "schannel: Null certificate context."); in cert_get_name_string() [all …]
|
D | mesalink.c | 112 failf(data, "MesaLink does not support to set maximum SSL/TLS version"); in mesalink_connect_step1() 121 failf(data, "MesaLink does not support SSL 3.0, TLS 1.0, or TLS 1.1"); in mesalink_connect_step1() 131 failf(data, "MesaLink does not support SSLv2"); in mesalink_connect_step1() 134 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in mesalink_connect_step1() 139 failf(data, "SSL: couldn't create a method!"); in mesalink_connect_step1() 148 failf(data, "SSL: couldn't create a context!"); in mesalink_connect_step1() 160 failf(data, in mesalink_connect_step1() 188 failf(data, "unable to use client certificate (no key or wrong pass" in mesalink_connect_step1() 196 failf(data, "unable to set private key"); in mesalink_connect_step1() 209 failf(data, "failed setting cipher list: %s", ciphers); in mesalink_connect_step1() [all …]
|
D | wolfssl.c | 240 failf(data, "wolfSSL does not support to set maximum SSL/TLS version"); in wolfssl_connect_step1() 263 failf(data, "wolfSSL does not support TLS 1.0"); in wolfssl_connect_step1() 281 failf(data, "wolfSSL: TLS 1.3 is not yet supported"); in wolfssl_connect_step1() 289 failf(data, "wolfSSL does not support SSLv3"); in wolfssl_connect_step1() 294 failf(data, "wolfSSL does not support SSLv2"); in wolfssl_connect_step1() 297 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in wolfssl_connect_step1() 302 failf(data, "SSL: couldn't create a method!"); in wolfssl_connect_step1() 311 failf(data, "SSL: couldn't create a context!"); in wolfssl_connect_step1() 332 failf(data, "SSL: couldn't set the minimum protocol version"); in wolfssl_connect_step1() 342 failf(data, "failed setting cipher list: %s", ciphers); in wolfssl_connect_step1() [all …]
|
D | mbedtls.c | 226 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 231 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION"); in set_ssl_version_min_max() 269 failf(data, "mbedTLS does not support SSLv2"); in mbed_connect_step1() 283 failf(data, "Failed - mbedTLS: ctr_drbg_init returned (-0x%04X) %s\n", in mbed_connect_step1() 296 failf(data, "Failed - mbedTLS: ctr_drbg_init returned (-0x%04X) %s\n", in mbed_connect_step1() 311 failf(data, "Error reading ca cert file %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 326 failf(data, "Error reading ca cert path %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 344 failf(data, "Error reading client cert file %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 365 failf(data, "Error reading private key %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() 382 failf(data, "Error reading CRL file %s - mbedTLS: (-0x%04X) %s", in mbed_connect_step1() [all …]
|
D | openssl.c | 732 failf(data, in cert_stuff() 752 failf(data, in cert_stuff() 787 failf(data, "ssl engine does not support loading certificates"); in cert_stuff() 794 failf(data, "ssl engine cannot load client cert with id" in cert_stuff() 802 failf(data, "ssl engine didn't initialized the certificate " in cert_stuff() 808 failf(data, "unable to set client certificate"); in cert_stuff() 815 failf(data, "crypto engine not set, can't load certificate"); in cert_stuff() 821 failf(data, "file type ENG for certificate not implemented"); in cert_stuff() 834 failf(data, in cert_stuff() 843 failf(data, "could not open PKCS12 file '%s'", cert_file); in cert_stuff() [all …]
|
D | gtls.c | 223 failf(data, "SSL connection timeout"); in handshake() 241 failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO); in handshake() 249 failf(data, "SSL connection timeout at %ld", (long)timeout_ms); in handshake() 289 failf(data, "gnutls_handshake() failed: %s", strerr); in handshake() 377 failf(data, "GnuTLS: cannot set ssl protocol"); in set_ssl_version_min_max() 417 failf(data, "GnuTLS does not support SSLv2"); in gtls_connect_step1() 426 failf(data, "gnutls_cert_all_cred() failed: %s", gnutls_strerror(rc)); in gtls_connect_step1() 437 failf(data, "gnutls_srp_allocate_client_cred() failed: %s", in gtls_connect_step1() 446 failf(data, "gnutls_srp_set_client_cred() failed: %s", in gtls_connect_step1() 506 failf(data, "error reading crl file %s (%s)", in gtls_connect_step1() [all …]
|
D | schannel.c | 190 failf(data, "schannel: TLS 1.3 is not yet supported"); in set_ssl_version_min_max() 477 failf(data, "schannel: this version of Windows is too old to support " in schannel_connect_step1() 486 failf(data, "schannel: CA cert support not built in"); in schannel_connect_step1() 578 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in schannel_connect_step1() 585 failf(data, "Unable to set ciphers to passed via SSL_CONN_CONFIG"); in schannel_connect_step1() 622 failf(data, "schannel: Failed to get certificate location" in schannel_connect_step1() 632 failf(data, "schannel: certificate format compatibility error " in schannel_connect_step1() 669 failf(data, "schannel: Failed to read cert file %s", in schannel_connect_step1() 703 failf(data, "schannel: Failed to import cert file %s, " in schannel_connect_step1() 707 failf(data, "schannel: Failed to import cert file %s, " in schannel_connect_step1() [all …]
|
D | gskit.c | 209 failf(data, "%s I/O error: %s", procname, strerror(errno)); in gskit_status() 214 failf(data, "%s: %s", procname, gsk_strerror(rc)); in gskit_status() 230 failf(data, "gsk_attribute_set_enum() I/O error: %s", strerror(errno)); in set_enum() 236 failf(data, "gsk_attribute_set_enum(): %s", gsk_strerror(rc)); in set_enum() 252 failf(data, "gsk_attribute_set_buffer() I/O error: %s", strerror(errno)); in set_buffer() 258 failf(data, "gsk_attribute_set_buffer(): %s", gsk_strerror(rc)); in set_buffer() 274 failf(data, "gsk_attribute_set_numeric_value() I/O error: %s", in set_numeric() 278 failf(data, "gsk_attribute_set_numeric_value(): %s", gsk_strerror(rc)); in set_numeric() 294 failf(data, "gsk_attribute_set_callback() I/O error: %s", strerror(errno)); in set_callback() 297 failf(data, "gsk_attribute_set_callback(): %s", gsk_strerror(rc)); in set_callback() [all …]
|
D | bearssl.c | 321 failf(data, "BearSSL does not support SSLv2"); in bearssl_connect_step1() 324 failf(data, "BearSSL does not support SSLv3"); in bearssl_connect_step1() 344 failf(data, "BearSSL: unknown CURLOPT_SSLVERSION"); in bearssl_connect_step1() 352 failf(data, "error setting certificate verify locations:\n" in bearssl_connect_step1() 416 failf(data, "BearSSL: " in bearssl_connect_step1() 453 failf(data, "SSL: connection closed during handshake"); in bearssl_run_until() 458 failf(data, "SSL: X.509 verification: " in bearssl_run_until() 462 failf(data, "SSL: X.509 verification: " in bearssl_run_until() 466 failf(data, "SSL: X.509 verification: " in bearssl_run_until() 494 failf(data, "SSL: EOF without close notify"); in bearssl_run_until() [all …]
|
D | nss.c | 253 failf(data, "%s", PR_ErrorToString(err, PR_LANGUAGE_I_DEFAULT)); in nss_print_error_message() 331 failf(data, "Unknown cipher in list: %s", cipher); in set_ciphers() 346 failf(data, "cipher-suite not supported by NSS: %s", cipherlist[i].name); in set_ciphers() 709 failf(conn->data, "Unable to load client key: Incorrect password"); in display_error() 712 failf(conn->data, "Unable to load certificate %s", filename); in display_error() 732 failf(data, "unable to load client cert: %d (%s)", err, err_name); in cert_stuff() 749 failf(data, "unable to load client key: %d (%s)", err, err_name); in cert_stuff() 782 failf(conn->data, "Invalid OCSP response"); in nss_auth_cert_hook() 787 failf(conn->data, "No OCSP response received"); in nss_auth_cert_hook() 797 failf(conn->data, "Invalid OCSP response"); in nss_auth_cert_hook() [all …]
|
/external/curl/lib/ |
D | socks.c | 301 failf(data, "SOCKS4 connection to %s not supported\n", buf); in Curl_SOCKS4() 307 failf(data, "Failed to resolve \"%s\" for SOCKS4 connect.", in Curl_SOCKS4() 322 failf(data, "Too long SOCKS proxy user name, can't use!\n"); in Curl_SOCKS4() 348 failf(data, "SOCKS4: too long host name"); in Curl_SOCKS4() 363 failf(data, "Failed to send SOCKS4 connect request."); in Curl_SOCKS4() 384 failf(data, "SOCKS4: Failed receiving connect request ack: %s", in Curl_SOCKS4() 390 failf(data, "connection to proxy closed"); in Curl_SOCKS4() 426 failf(data, in Curl_SOCKS4() 437 failf(data, in Curl_SOCKS4() 446 failf(data, in Curl_SOCKS4() [all …]
|
D | socks_gssapi.c | 95 failf(data, "GSS-API error: %s failed:\n%s", function, buf); in check_gss_err() 165 failf(data, "Failed to create service name."); in Curl_SOCKS5_gssapi_negotiate() 194 failf(data, "Failed to initial GSS-API token."); in Curl_SOCKS5_gssapi_negotiate() 206 failf(data, "Failed to send GSS-API authentication request."); in Curl_SOCKS5_gssapi_negotiate() 218 failf(data, "Failed to send GSS-API authentication token."); in Curl_SOCKS5_gssapi_negotiate() 245 failf(data, "Failed to receive GSS-API authentication response."); in Curl_SOCKS5_gssapi_negotiate() 253 failf(data, "User was rejected by the SOCKS5 server (%d %d).", in Curl_SOCKS5_gssapi_negotiate() 261 failf(data, "Invalid GSS-API authentication response type (%d %d).", in Curl_SOCKS5_gssapi_negotiate() 274 failf(data, in Curl_SOCKS5_gssapi_negotiate() 286 failf(data, "Failed to receive GSS-API authentication token."); in Curl_SOCKS5_gssapi_negotiate() [all …]
|
D | non-ascii.c | 93 failf(data, in Curl_convert_to_network() 115 failf(data, in Curl_convert_to_network() 131 failf(data, in Curl_convert_to_network() 137 failf(data, "CURLOPT_CONV_TO_NETWORK_FUNCTION callback required"); in Curl_convert_to_network() 159 failf(data, in Curl_convert_from_network() 181 failf(data, in Curl_convert_from_network() 197 failf(data, in Curl_convert_from_network() 203 failf(data, "CURLOPT_CONV_FROM_NETWORK_FUNCTION callback required"); in Curl_convert_from_network() 225 failf(data, in Curl_convert_from_utf8() 248 failf(data, in Curl_convert_from_utf8() [all …]
|
D | socks_sspi.c | 55 failf(conn->data, "SSPI error: %s failed: %s", function, in check_sspi_err() 150 failf(data, "Failed to acquire credentials."); in Curl_SOCKS5_gssapi_negotiate() 197 failf(data, "Failed to initialise security context."); in Curl_SOCKS5_gssapi_negotiate() 209 failf(data, "Failed to send SSPI authentication request."); in Curl_SOCKS5_gssapi_negotiate() 223 failf(data, "Failed to send SSPI authentication token."); in Curl_SOCKS5_gssapi_negotiate() 263 failf(data, "Failed to receive SSPI authentication response."); in Curl_SOCKS5_gssapi_negotiate() 272 failf(data, "User was rejected by the SOCKS5 server (%u %u).", in Curl_SOCKS5_gssapi_negotiate() 281 failf(data, "Invalid SSPI authentication response type (%u %u).", in Curl_SOCKS5_gssapi_negotiate() 305 failf(data, "Failed to receive SSPI authentication token."); in Curl_SOCKS5_gssapi_negotiate() 327 failf(data, "Failed to determine user name."); in Curl_SOCKS5_gssapi_negotiate() [all …]
|
D | tftp.c | 213 failf(state->conn->data, "Connection time-out"); in tftp_set_timeouts() 348 failf(data, "Malformed ACK packet, rejecting"); in tftp_parse_option_ack() 360 failf(data, "invalid blocksize value in OACK packet"); in tftp_parse_option_ack() 364 failf(data, "%s (%d)", "blksize is larger than max supported", in tftp_parse_option_ack() 369 failf(data, "%s (%d)", "blksize is smaller than min supported", in tftp_parse_option_ack() 377 failf(data, "%s (%ld)", in tftp_parse_option_ack() 396 failf(data, "invalid tsize -:%s:- value in OACK packet", value); in tftp_parse_option_ack() 496 failf(data, "TFTP file name too long\n"); in tftp_send_first() 544 failf(data, "TFTP buffer too small for options"); in tftp_send_first() 558 failf(data, "%s", Curl_strerror(SOCKERRNO, buffer, sizeof(buffer))); in tftp_send_first() [all …]
|
D | rtsp.c | 217 failf(data, in rtsp_done() 265 failf(data, "Got invalid RTSP request"); in rtsp_do() 306 failf(data, "Got invalid RTSP request: RTSPREQ_LAST"); in rtsp_do() 319 failf(data, "Refusing to issue an RTSP request [%s] without a session ID.", in rtsp_do() 346 failf(data, in rtsp_do() 425 failf(data, "CSeq cannot be set as a custom header."); in rtsp_do() 429 failf(data, "Session ID cannot be set as a custom header."); in rtsp_do() 570 failf(data, "Failed sending RTSP request"); in rtsp_do() 647 failf(data, "Got an error writing an RTP packet"); in rtsp_rtp_readwrite() 724 failf(data, "Cannot write a 0 size RTP packet."); in rtp_client_write() [all …]
|
D | ldap.c | 306 failf(data, "LDAP local: %s", ldap_err2string(rc)); in Curl_ldap() 350 failf(data, "LDAP local: ldapssl_client_init %s", ldap_err2string(rc)); in Curl_ldap() 361 failf(data, "LDAP local: ERROR %s CA cert not set!", in Curl_ldap() 371 failf(data, "LDAP local: ERROR setting %s CA cert: %s", in Curl_ldap() 383 failf(data, "LDAP local: ERROR setting cert verify mode: %s", in Curl_ldap() 390 failf(data, "LDAP local: Cannot connect to %s:%ld", in Curl_ldap() 400 failf(data, "LDAP local: ERROR OpenLDAP only supports PEM cert-type!"); in Curl_ldap() 405 failf(data, "LDAP local: ERROR PEM CA cert not set!"); in Curl_ldap() 412 failf(data, "LDAP local: ERROR setting PEM CA cert: %s", in Curl_ldap() 424 failf(data, "LDAP local: ERROR setting cert verify mode: %s", in Curl_ldap() [all …]
|
D | ftp.c | 279 failf(data, "Error accept()ing server connect"); in AcceptServerConnect() 376 failf(data, "Accept timeout occurred while waiting server connect"); in ReceivedServerConnect() 394 failf(data, "Error while waiting for server connect"); in ReceivedServerConnect() 489 failf(data, "Accept timeout occurred while waiting server connect"); in AllowServerConnect() 634 failf(data, "FTP response timeout"); in Curl_GetFTPResponse() 667 failf(data, "FTP response aborted due to select/poll error: %d", in Curl_GetFTPResponse() 1043 failf(data, "getsockname() failed: %s", in ftp_state_use_port() 1078 failf(data, "failed to resolve the address provided to PORT: %s", host); in ftp_state_use_port() 1099 failf(data, "socket failure: %s", in ftp_state_use_port() 1129 failf(data, "getsockname() failed: %s", in ftp_state_use_port() [all …]
|
D | transfer.c | 202 failf(data, "operation aborted by trailing headers callback"); in Curl_fillreadbuffer() 249 failf(data, "operation aborted by callback"); in Curl_fillreadbuffer() 260 failf(data, "Read callback asked for PAUSE when not supported!"); in Curl_fillreadbuffer() 277 failf(data, "read function returned funny value"); in Curl_fillreadbuffer() 439 failf(data, "Cannot rewind mime/post data"); in Curl_readrewind() 451 failf(data, "seek callback returned error %d", (int)err); in Curl_readrewind() 465 failf(data, "ioctl callback returned error %d", (int)err); in Curl_readrewind() 480 failf(data, "necessary data rewind wasn't possible"); in Curl_readrewind() 743 failf(data, "HTTP server doesn't seem to support " in readwrite_data() 802 failf(data, "Failed reading the chunked-encoded stream"); in readwrite_data() [all …]
|
D | openldap.c | 189 failf(conn->data, "LDAP local: %s", msg); in ldap_setup_connection() 236 failf(data, "LDAP local: Cannot connect to %s, %s", in ldap_connect() 314 failf(data, "LDAP local: bind ldap_result %s", ldap_err2string(rc)); in ldap_connecting() 324 failf(data, "LDAP local: bind ldap_parse_result %s", ldap_err2string(rc)); in ldap_connecting() 345 failf(data, "LDAP remote: bind failed %s %s", ldap_err2string(rc), in ldap_connecting() 399 failf(conn->data, "LDAP local: %s", msg); in ldap_do() 408 failf(data, "LDAP local: ldap_search_ext %s", ldap_err2string(rc)); in ldap_do() 461 failf(data, "LDAP local: search ldap_result %s", ldap_err2string(rc)); in ldap_recv() 485 failf(data, "LDAP local: search ldap_parse_result %s", in ldap_recv() 490 failf(data, "LDAP remote: search failed %s %s", ldap_err2string(rc), in ldap_recv()
|
D | curl_ntlm_wb.c | 187 failf(data, "Could not access ntlm_auth: %s errno %d: %s", in ntlm_wb_init() 193 failf(data, "Could not open socket pair. errno %d: %s", in ntlm_wb_init() 202 failf(data, "Could not fork. errno %d: %s", in ntlm_wb_init() 214 failf(data, "Could not redirect child stdin. errno %d: %s", in ntlm_wb_init() 220 failf(data, "Could not redirect child stdout. errno %d: %s", in ntlm_wb_init() 240 failf(data, "Could not execl(). errno %d: %s", in ntlm_wb_init()
|
/external/curl/lib/vssh/ |
D | libssh.c | 357 failf(data, in myssh_is_known() 368 failf(data, in myssh_is_known() 701 failf(data, "Failure establishing ssh session"); in myssh_statemach_act() 782 failf(data, "Could not load private key file %s", in myssh_statemach_act() 901 failf(data, "Authentication failure"); in myssh_statemach_act() 929 failf(data, "Failure initializing sftp session: %s", in myssh_statemach_act() 938 failf(data, "Failure initializing sftp session: %s", in myssh_statemach_act() 1028 failf(data, "Attempt to set SFTP stats failed: %s", in myssh_statemach_act() 1047 failf(data, "symlink command failed: %s", in myssh_statemach_act() 1062 failf(data, "mkdir command failed: %s", in myssh_statemach_act() [all …]
|
D | libssh2.c | 641 failf(data, in ssh_check_fingerprint() 645 failf(data, in ssh_check_fingerprint() 766 failf(data, "Found host key type RSA1 which is not supported\n"); in ssh_force_knownhost_key_type() 769 failf(data, "Unknown host key type: %i\n", in ssh_force_knownhost_key_type() 841 failf(data, "Failure establishing ssh session: %d, %s", rc, err_msg); in ssh_statemach_act() 1188 failf(data, "Authentication failure"); in ssh_statemach_act() 1227 failf(data, "Failure initializing sftp session: %s", err_msg); in ssh_statemach_act() 1371 failf(data, "Syntax error command '%s'. Missing parameter!", in ssh_statemach_act() 1386 failf(data, "Out of memory"); in ssh_statemach_act() 1388 failf(data, "Syntax error: Bad first parameter to '%s'", cmd); in ssh_statemach_act() [all …]
|
D | wolfssh.c | 265 failf(conn->data, "wolfSSH_SFTP_SendWritePacket returned %d\n", rc); in wsftp_send() 310 failf(conn->data, "wolfSSH_SFTP_SendReadPacket returned %d\n", rc); in wsftp_recv() 377 failf(data, "No wolfSSH context"); in wssh_connect() 383 failf(data, "No wolfSSH session"); in wssh_connect() 389 failf(data, "wolfSSH failed to set user name"); in wssh_connect() 399 failf(data, "wolfSSH failed to set socket"); in wssh_connect() 485 failf(data, "wolfssh SFTP connect error %d", rc); in wssh_statemach_act() 516 failf(data, "wolfssh SFTP realpath %d", rc); in wssh_statemach_act() 571 failf(data, "Bad file size (%" CURL_FORMAT_CURL_OFF_T ")", size); in wssh_statemach_act() 611 failf(data, "wolfssh SFTP upload open failed: %d", rc); in wssh_statemach_act() [all …]
|