/external/curl/lib/ |
D | ws.c | 156 infof(data, "Received 101, switch to WebSocket; mask %02x%02x%02x%02x", in Curl_ws_accept() 163 infof(data, "%zu bytes websocket payload", nread); in Curl_ws_accept() 225 infof(data, "WS: plen == %u, EAGAIN", (int)inlen); in ws_decode() 231 infof(data, "WS:%d received FIN bit %u", __LINE__, (int)fin); in ws_decode() 237 infof(data, "WS: received OPCODE CONT"); in ws_decode() 240 infof(data, "WS: received OPCODE TEXT"); in ws_decode() 244 infof(data, "WS: received OPCODE BINARY"); in ws_decode() 248 infof(data, "WS: received OPCODE CLOSE"); in ws_decode() 252 infof(data, "WS: received OPCODE PING"); in ws_decode() 256 infof(data, "WS: received OPCODE PONG"); in ws_decode() [all …]
|
D | telnet.c | 273 infof(data, "%s IAC %s", direction, CURL_TELCMD(option)); in printoption() 275 infof(data, "%s IAC %d", direction, option); in printoption() 292 infof(data, "%s %s %s", direction, fmt, opt); in printoption() 294 infof(data, "%s %s %d", direction, fmt, option); in printoption() 297 infof(data, "%s %d %d", direction, cmd, option); in printoption() 671 infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT"); in printsub() 679 infof(data, "(terminated by "); in printsub() 681 infof(data, "%s ", CURL_TELOPT(i)); in printsub() 683 infof(data, "%s ", CURL_TELCMD(i)); in printsub() 685 infof(data, "%u ", i); in printsub() [all …]
|
D | curl_range.c | 58 DEBUGF(infof(data, "RANGE %" CURL_FORMAT_CURL_OFF_T " to end of file", in Curl_range() 65 DEBUGF(infof(data, "RANGE the last %" CURL_FORMAT_CURL_OFF_T " bytes", in Curl_range() 82 DEBUGF(infof(data, "RANGE from %" CURL_FORMAT_CURL_OFF_T in Curl_range() 86 DEBUGF(infof(data, "range-download from %" CURL_FORMAT_CURL_OFF_T in Curl_range()
|
D | transfer.c | 180 infof(data, in Curl_fillreadbuffer() 204 infof(data, "Successfully compiled trailers."); in Curl_fillreadbuffer() 346 infof(data, "Signaling end of chunked upload after trailers."); in Curl_fillreadbuffer() 353 infof(data, in Curl_fillreadbuffer() 393 infof(data, in Curl_meets_timecondition() 401 infof(data, in Curl_meets_timecondition() 475 DEBUGF(infof(data, DMSG(data, "readwrite_data: we're done"))); in readwrite_data() 497 DEBUGF(infof(data, "nread == 0, stream closed, bailing")); in readwrite_data() 499 DEBUGF(infof(data, "nread <= 0, server closed connection, bailing")); in readwrite_data() 539 infof(data, in readwrite_data() [all …]
|
D | ftp.c | 283 infof(data, "Connection accepted from server"); in AcceptServerConnect() 376 infof(data, "Checking for server connect"); in ReceivedServerConnect() 386 infof(data, "There is negative response in cache while serv connect"); in ReceivedServerConnect() 404 infof(data, "Ready to accept data connection from server"); in ReceivedServerConnect() 408 infof(data, "Ctrl conn has data while waiting for data conn"); in ReceivedServerConnect() 438 DEBUGF(infof(data, "ftp InitiateTransfer()")); in InitiateTransfer() 486 infof(data, "Preparing for accepting server on data port"); in AllowServerConnect() 521 DEBUGF(infof(data, "ftp AllowServerConnect() -> %d", result)); in AllowServerConnect() 593 infof(data, "We got a 421 - timeout"); in ftp_readresp() 769 infof(data, "FTP %p (line %d) state change from %s to %s", in _state() [all …]
|
D | tftp.c | 243 infof(state->data, in tftp_set_timeouts() 331 infof(data, "got option=(%s) value=(%s)", option, value); in tftp_parse_option_ack() 362 infof(data, "%s (%d) %s (%d)", "blksize parsed from OACK", in tftp_parse_option_ack() 369 infof(data, "%s (%ld)", "tsize parsed from OACK", tsize); in tftp_parse_option_ack() 403 infof(data, "%s", "Connected for transmit"); in tftp_connect_for_tx() 419 infof(data, "%s", "Connected for receive"); in tftp_connect_for_rx() 602 infof(data, "Received last DATA packet block %d again.", rblock); in tftp_rx() 606 infof(data, in tftp_rx() 658 infof(data, in tftp_rx() 730 infof(data, "Received ACK for block %d, expecting %d", in tftp_tx() [all …]
|
D | socks.c | 194 infof(data, in socksstate() 294 infof(data, "SOCKS4%s: connecting to HTTP proxy %s port %d", in do_SOCKS4() 297 infof(data, "SOCKS4 communication to %s:%d", in do_SOCKS4() 325 infof(data, "SOCKS4 non-blocking resolve of %s", sx->hostname); in do_SOCKS4() 345 infof(data, "Hostname '%s' was found", sx->hostname); in do_SOCKS4() 382 infof(data, "SOCKS4 connect to IPv4 %s (locally resolved)", buf); in do_SOCKS4() 503 infof(data, "SOCKS4%s request granted.", protocol4a?"a":""); in do_SOCKS4() 586 infof(data, "SOCKS5: connecting to HTTP proxy %s port %d", in do_SOCKS5() 591 infof(data, "SOCKS5: server resolving disabled for hostnames of " in do_SOCKS5() 597 infof(data, in do_SOCKS5() [all …]
|
D | curl_log.h | 42 #define infof(...) Curl_nop_stmt macro 44 #define infof(x...) Curl_nop_stmt macro 51 #define infof Curl_infof macro
|
D | krb5.c | 264 infof(data, "Trying against %s", output_buffer.value); in krb5_auth() 291 infof(data, "Error creating security context"); in krb5_auth() 302 infof(data, "base64-encoding: %s", curl_easy_strerror(result)); in krb5_auth() 327 infof(data, "Server didn't accept auth data"); in krb5_auth() 635 infof(data, "Send: %s%s", prot_level == PROT_PRIVATE?enc:mic, in do_sec_send() 742 infof(data, "Trying to change the protection level after the" in sec_set_protection_level() 821 infof(data, "Failed initialization for %s. Skipping it.", in choose_mech() 827 infof(data, "Trying mechanism %s...", mech->name); in choose_mech() 835 infof(data, "Mechanism %s is not supported by the server (server " in choose_mech() 839 infof(data, "Mechanism %s was rejected by the server (server returned " in choose_mech() [all …]
|
D | http.c | 558 infof(data, "Rewind stream before next send"); in http_perhapsrewind() 568 infof(data, "NTLM send, close instead of sending %" in http_perhapsrewind() 586 infof(data, "Rewind stream before next send"); in http_perhapsrewind() 596 infof(data, "NEGOTIATE send, close instead of sending %" in http_perhapsrewind() 613 infof(data, "Please rewind output before next send"); in http_perhapsrewind() 652 infof(data, "Forcing HTTP/1.1 for NTLM"); in Curl_http_auth_act() 813 infof(data, "%s auth using %s with user '%s'", in output_auth_headers() 820 infof(data, "Server auth using %s with user '%s'", in output_auth_headers() 1051 infof(data, "Authentication problem. Ignoring this."); in Curl_http_input_auth() 1058 infof(data, "Authentication problem. Ignoring this."); in Curl_http_input_auth() [all …]
|
D | hostip.c | 295 infof(data, "Hostname in DNS cache was stale, zapped"); in fetch_addr() 321 infof(data, "Hostname in DNS cache doesn't have needed family, zapped"); in fetch_addr() 387 infof(data, "Shuffling %i addresses", num_addrs); in Curl_shuffle_addr() 668 infof(data, "Hostname %s was found in DNS cache", hostname); in Curl_resolv() 944 infof(data, "timeout on name lookup is not supported"); in Curl_resolv_timeout() 1090 infof(data, "Bad syntax CURLOPT_RESOLVE removal entry '%s'", in Curl_loadhostpairs() 1174 infof(data, "Ignoring resolve address '%s', missing IPv6 support.", in Curl_loadhostpairs() 1182 infof(data, "Resolve address '%s' found illegal", address); in Curl_loadhostpairs() 1218 infof(data, "RESOLVE %.*s:%d is - old addresses discarded", in Curl_loadhostpairs() 1251 infof(data, "Added %.*s:%d:%s to DNS cache%s", in Curl_loadhostpairs() [all …]
|
/external/curl/lib/vtls/ |
D | gtls.c | 171 infof(data, "%s", str); in showtime() 283 infof(data, "gnutls_handshake() warning: %s", strerr); in handshake() 438 infof(data, "Using TLS-SRP username: %s", config->username); in gtls_client_init() 467 infof(data, "error reading ca cert file %s (%s)", in gtls_client_init() 475 infof(data, "found %d certificates in %s", rc, config->CAfile); in gtls_client_init() 484 infof(data, "error reading ca cert file %s (%s)", in gtls_client_init() 492 infof(data, "found %d certificates in %s", rc, config->CApath); in gtls_client_init() 514 infof(data, "found %d CRL in %s", rc, config->CRLfile); in gtls_client_init() 594 infof(data, "This GnuTLS does not support SRP"); in gtls_client_init() 599 infof(data, "GnuTLS ciphers: %s", prioritylist); in gtls_client_init() [all …]
|
D | schannel.c | 519 DEBUGF(infof(data, "schannel: disabled server certificate revocation " in schannel_acquire_credential_handle() 526 DEBUGF(infof(data, "schannel: ignore revocation offline errors")); in schannel_acquire_credential_handle() 531 DEBUGF(infof(data, in schannel_acquire_credential_handle() 539 DEBUGF(infof(data, in schannel_acquire_credential_handle() 545 DEBUGF(infof(data, "schannel: verifyhost setting prevents Schannel from " in schannel_acquire_credential_handle() 553 infof(data, "schannel: disabled automatic use of client certificate"); in schannel_acquire_credential_handle() 556 infof(data, "schannel: enabled automatic use of client certificate"); in schannel_acquire_credential_handle() 1098 DEBUGF(infof(data, in schannel_connect_step1() 1106 infof(data, "schannel: Windows version is old and may not be able to " in schannel_connect_step1() 1160 DEBUGF(infof(data, "schannel: re-using existing credential handle")); in schannel_connect_step1() [all …]
|
D | nss.c | 439 infof(data, "WARNING: certificate file name \"%s\" handled as nickname; " in dup_nickname() 840 infof(data, "skipping SSL peer certificate verification"); in nss_auth_cert_hook() 943 infof(data, "Trying TLS False Start"); in CanFalseStartCallback() 961 infof(data, "subject: %s", subject); in display_cert_info() 966 infof(data, " start date: %s", timeString); in display_cert_info() 969 infof(data, " expire date: %s", timeString); in display_cert_info() 970 infof(data, " common name: %s", common_name); in display_cert_info() 971 infof(data, " issuer: %s", issuer); in display_cert_info() 996 infof(data, "SSL connection using %s", suite.cipherSuiteName); in display_conn_info() 1002 infof(data, "Server certificate:"); in display_conn_info() [all …]
|
D | wolfssl.c | 388 infof(data, "wolfSSL <3.3.0 cannot be configured to use TLS 1.0-1.2, " in wolfssl_connect_step1() 474 infof(data, "Cipher selection: %s", ciphers); in wolfssl_connect_step1() 516 infof(data, "error setting certificate verify locations," in wolfssl_connect_step1() 522 infof(data, "successfully set certificate verify locations:"); in wolfssl_connect_step1() 524 infof(data, " CAfile: %s", in wolfssl_connect_step1() 526 infof(data, " CApath: %s", in wolfssl_connect_step1() 634 infof(data, VTLS_INFOF_ALPN_OFFER_1STR, proto.data); in wolfssl_connect_step1() 665 infof(data, "Can't use session ID, going on without"); in wolfssl_connect_step1() 668 infof(data, "SSL re-using session ID"); in wolfssl_connect_step1() 780 infof(data, in wolfssl_connect_step2() [all …]
|
D | x509asn1.c | 935 infof(data, " %s: %s", label, output); in do_pubkey_field() 959 infof(data, " ECC Public Key (%lu bits)", len); in do_pubkey() 993 infof(data, " RSA Public Key (%lu bits)", len); in do_pubkey() 1100 infof(data, "%2d Subject: %s", certnum, ccp); in Curl_extract_certinfo() 1111 infof(data, " Issuer: %s", ccp); in Curl_extract_certinfo() 1130 infof(data, " Version: %u (0x%x)", version + 1, version); in Curl_extract_certinfo() 1139 infof(data, " Serial Number: %s", ccp); in Curl_extract_certinfo() 1152 infof(data, " Signature Algorithm: %s", ccp); in Curl_extract_certinfo() 1164 infof(data, " Start Date: %s", ccp); in Curl_extract_certinfo() 1176 infof(data, " Expire Date: %s", ccp); in Curl_extract_certinfo() [all …]
|
D | openssl.c | 501 infof(data, " Unable to load public key"); in Curl_ossl_certchain() 1039 infof(data, "libcurl is now using a weak random seed"); in ossl_seed() 1835 infof(data, "set default crypto engine '%s'", in ossl_set_engine_default() 1958 infof(data, "SSL_ERROR_WANT_READ"); in ossl_shutdown() 1962 infof(data, "SSL_ERROR_WANT_WRITE"); in ossl_shutdown() 1994 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN"); in ossl_shutdown() 1997 infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN"); in ossl_shutdown() 2000 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|" in ossl_shutdown() 2061 infof(data, " subjectAltName: host \"%s\" matched cert's \"%s\"", in subj_alt_hostcheck() 2206 infof(data, in ossl_verifyhost() [all …]
|
D | rustls.c | 80 infof(data, "rustls_connect: unimplemented"); in cr_connect() 381 infof(data, VTLS_INFOF_ALPN_OFFER_1STR, proto.data); in cr_init_backend() 495 infof(data, "Done handshaking"); in cr_connect_nonblocking() 518 infof(data, "Curl_socket_check: %s would block", in cr_connect_nonblocking() 527 infof(data, "rustls_connection wants us to write_tls."); in cr_connect_nonblocking() 530 infof(data, "writing would block"); in cr_connect_nonblocking() 539 infof(data, "rustls_connection wants us to read_tls."); in cr_connect_nonblocking() 543 infof(data, "reading would block"); in cr_connect_nonblocking()
|
/external/curl/lib/vssh/ |
D | libssh2.c | 387 infof(data, "SFTP %p state change from %s to %s", in state() 535 infof(data, "unsupported key type, can't check knownhosts"); in ssh_knownhost() 563 infof(data, "SSH host check: %d, key: %s", keycheck, in ssh_knownhost() 628 infof(data, "WARNING: adding the known host %s failed", in ssh_knownhost() 639 infof(data, "WARNING: writing %s failed", in ssh_knownhost() 660 infof(data, "SSH MD5 public key: %s", in ssh_check_fingerprint() 662 infof(data, "SSH SHA256 public key: %s", in ssh_check_fingerprint() 713 infof(data, "SSH SHA256 fingerprint: %s", fingerprint_b64); in ssh_check_fingerprint() 743 infof(data, "SHA256 checksum match"); in ssh_check_fingerprint() 760 infof(data, "SSH MD5 fingerprint: %s", md5buffer); in ssh_check_fingerprint() [all …]
|
D | wolfssh.c | 211 infof(data, "wolfssh %p state change from %s to %s", in state() 280 infof(data, "sent %zd bytes SFTP from offset %zd", in wsftp_send() 354 DEBUGF(infof(data, "wolfssh callback: type %s", in userauth() 475 infof(data, "wolfssh connected"); in wssh_statemach_act() 496 infof(data, "wolfssh SFTP connected"); in wssh_statemach_act() 525 infof(data, "wolfssh SFTP realpath succeeded"); in wssh_statemach_act() 543 infof(data, "Sending quote commands"); in wssh_statemach_act() 623 infof(data, "wolfssh SFTP open succeeded"); in wssh_statemach_act() 734 infof(data, "wolfssh SFTP open succeeded"); in wssh_statemach_act() 760 infof(data, "wolfssh STAT succeeded"); in wssh_statemach_act() [all …]
|
D | libssh.c | 318 infof(data, "SSH %p state change from %s to %s (line %d)", in mystate() 383 infof(data, "SSH MD5 fingerprint: %s", md5buffer); in myssh_is_known() 746 infof(data, "Authenticated with none"); in myssh_statemach_act() 758 infof(data, "Authentication using SSH public key file"); in myssh_statemach_act() 824 infof(data, "Completed public key authentication"); in myssh_statemach_act() 841 infof(data, "Completed public key authentication"); in myssh_statemach_act() 846 infof(data, "Failed public key authentication (rc: %d)", rc); in myssh_statemach_act() 866 infof(data, "Completed gssapi authentication"); in myssh_statemach_act() 892 infof(data, "completed keyboard interactive authentication"); in myssh_statemach_act() 915 infof(data, "Completed password authentication"); in myssh_statemach_act() [all …]
|
/external/curl/lib/vauth/ |
D | krb5_gssapi.c | 128 infof(data, "GSSAPI handshake failure (empty challenge message)"); in Curl_auth_create_gssapi_user_message() 203 infof(data, "GSSAPI handshake failure (empty security message)"); in Curl_auth_create_gssapi_security_message() 222 infof(data, "GSSAPI handshake failure (invalid security data)"); in Curl_auth_create_gssapi_security_message() 236 infof(data, "GSSAPI handshake failure (invalid security layer)"); in Curl_auth_create_gssapi_security_message()
|
D | krb5_sspi.c | 178 infof(data, "GSSAPI handshake failure (empty challenge message)"); in Curl_auth_create_gssapi_user_message() 280 infof(data, "GSSAPI handshake failure (empty security message)"); in Curl_auth_create_gssapi_security_message() 309 infof(data, "GSSAPI handshake failure (empty security message)"); in Curl_auth_create_gssapi_security_message() 315 infof(data, "GSSAPI handshake failure (invalid security data)"); in Curl_auth_create_gssapi_security_message() 329 infof(data, "GSSAPI handshake failure (invalid security layer)"); in Curl_auth_create_gssapi_security_message()
|
/external/curl/tests/data/ |
D | test1652 | 5 infof 17 infof
|
/external/tpm2-tss/src/tss2-tcti/ |
D | tctildr-dl.c | 130 TSS2_TCTI_INFO_FUNC infof; in tcti_from_file() local 141 infof = (TSS2_TCTI_INFO_FUNC) dlsym(handle, TSS2_TCTI_INFO_SYMBOL); in tcti_from_file() 142 if (infof == NULL) { in tcti_from_file() 148 r = tcti_from_info(infof, conf, tcti); in tcti_from_file()
|