Home
last modified time | relevance | path

Searched refs:infof (Results 1 – 25 of 78) sorted by relevance

1234

/external/curl/lib/
Dws.c156 infof(data, "Received 101, switch to WebSocket; mask %02x%02x%02x%02x", in Curl_ws_accept()
163 infof(data, "%zu bytes websocket payload", nread); in Curl_ws_accept()
225 infof(data, "WS: plen == %u, EAGAIN", (int)inlen); in ws_decode()
231 infof(data, "WS:%d received FIN bit %u", __LINE__, (int)fin); in ws_decode()
237 infof(data, "WS: received OPCODE CONT"); in ws_decode()
240 infof(data, "WS: received OPCODE TEXT"); in ws_decode()
244 infof(data, "WS: received OPCODE BINARY"); in ws_decode()
248 infof(data, "WS: received OPCODE CLOSE"); in ws_decode()
252 infof(data, "WS: received OPCODE PING"); in ws_decode()
256 infof(data, "WS: received OPCODE PONG"); in ws_decode()
[all …]
Dtelnet.c273 infof(data, "%s IAC %s", direction, CURL_TELCMD(option)); in printoption()
275 infof(data, "%s IAC %d", direction, option); in printoption()
292 infof(data, "%s %s %s", direction, fmt, opt); in printoption()
294 infof(data, "%s %s %d", direction, fmt, option); in printoption()
297 infof(data, "%s %d %d", direction, cmd, option); in printoption()
671 infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT"); in printsub()
679 infof(data, "(terminated by "); in printsub()
681 infof(data, "%s ", CURL_TELOPT(i)); in printsub()
683 infof(data, "%s ", CURL_TELCMD(i)); in printsub()
685 infof(data, "%u ", i); in printsub()
[all …]
Dcurl_range.c58 DEBUGF(infof(data, "RANGE %" CURL_FORMAT_CURL_OFF_T " to end of file", in Curl_range()
65 DEBUGF(infof(data, "RANGE the last %" CURL_FORMAT_CURL_OFF_T " bytes", in Curl_range()
82 DEBUGF(infof(data, "RANGE from %" CURL_FORMAT_CURL_OFF_T in Curl_range()
86 DEBUGF(infof(data, "range-download from %" CURL_FORMAT_CURL_OFF_T in Curl_range()
Dtransfer.c180 infof(data, in Curl_fillreadbuffer()
204 infof(data, "Successfully compiled trailers."); in Curl_fillreadbuffer()
346 infof(data, "Signaling end of chunked upload after trailers."); in Curl_fillreadbuffer()
353 infof(data, in Curl_fillreadbuffer()
393 infof(data, in Curl_meets_timecondition()
401 infof(data, in Curl_meets_timecondition()
475 DEBUGF(infof(data, DMSG(data, "readwrite_data: we're done"))); in readwrite_data()
497 DEBUGF(infof(data, "nread == 0, stream closed, bailing")); in readwrite_data()
499 DEBUGF(infof(data, "nread <= 0, server closed connection, bailing")); in readwrite_data()
539 infof(data, in readwrite_data()
[all …]
Dftp.c283 infof(data, "Connection accepted from server"); in AcceptServerConnect()
376 infof(data, "Checking for server connect"); in ReceivedServerConnect()
386 infof(data, "There is negative response in cache while serv connect"); in ReceivedServerConnect()
404 infof(data, "Ready to accept data connection from server"); in ReceivedServerConnect()
408 infof(data, "Ctrl conn has data while waiting for data conn"); in ReceivedServerConnect()
438 DEBUGF(infof(data, "ftp InitiateTransfer()")); in InitiateTransfer()
486 infof(data, "Preparing for accepting server on data port"); in AllowServerConnect()
521 DEBUGF(infof(data, "ftp AllowServerConnect() -> %d", result)); in AllowServerConnect()
593 infof(data, "We got a 421 - timeout"); in ftp_readresp()
769 infof(data, "FTP %p (line %d) state change from %s to %s", in _state()
[all …]
Dtftp.c243 infof(state->data, in tftp_set_timeouts()
331 infof(data, "got option=(%s) value=(%s)", option, value); in tftp_parse_option_ack()
362 infof(data, "%s (%d) %s (%d)", "blksize parsed from OACK", in tftp_parse_option_ack()
369 infof(data, "%s (%ld)", "tsize parsed from OACK", tsize); in tftp_parse_option_ack()
403 infof(data, "%s", "Connected for transmit"); in tftp_connect_for_tx()
419 infof(data, "%s", "Connected for receive"); in tftp_connect_for_rx()
602 infof(data, "Received last DATA packet block %d again.", rblock); in tftp_rx()
606 infof(data, in tftp_rx()
658 infof(data, in tftp_rx()
730 infof(data, "Received ACK for block %d, expecting %d", in tftp_tx()
[all …]
Dsocks.c194 infof(data, in socksstate()
294 infof(data, "SOCKS4%s: connecting to HTTP proxy %s port %d", in do_SOCKS4()
297 infof(data, "SOCKS4 communication to %s:%d", in do_SOCKS4()
325 infof(data, "SOCKS4 non-blocking resolve of %s", sx->hostname); in do_SOCKS4()
345 infof(data, "Hostname '%s' was found", sx->hostname); in do_SOCKS4()
382 infof(data, "SOCKS4 connect to IPv4 %s (locally resolved)", buf); in do_SOCKS4()
503 infof(data, "SOCKS4%s request granted.", protocol4a?"a":""); in do_SOCKS4()
586 infof(data, "SOCKS5: connecting to HTTP proxy %s port %d", in do_SOCKS5()
591 infof(data, "SOCKS5: server resolving disabled for hostnames of " in do_SOCKS5()
597 infof(data, in do_SOCKS5()
[all …]
Dcurl_log.h42 #define infof(...) Curl_nop_stmt macro
44 #define infof(x...) Curl_nop_stmt macro
51 #define infof Curl_infof macro
Dkrb5.c264 infof(data, "Trying against %s", output_buffer.value); in krb5_auth()
291 infof(data, "Error creating security context"); in krb5_auth()
302 infof(data, "base64-encoding: %s", curl_easy_strerror(result)); in krb5_auth()
327 infof(data, "Server didn't accept auth data"); in krb5_auth()
635 infof(data, "Send: %s%s", prot_level == PROT_PRIVATE?enc:mic, in do_sec_send()
742 infof(data, "Trying to change the protection level after the" in sec_set_protection_level()
821 infof(data, "Failed initialization for %s. Skipping it.", in choose_mech()
827 infof(data, "Trying mechanism %s...", mech->name); in choose_mech()
835 infof(data, "Mechanism %s is not supported by the server (server " in choose_mech()
839 infof(data, "Mechanism %s was rejected by the server (server returned " in choose_mech()
[all …]
Dhttp.c558 infof(data, "Rewind stream before next send"); in http_perhapsrewind()
568 infof(data, "NTLM send, close instead of sending %" in http_perhapsrewind()
586 infof(data, "Rewind stream before next send"); in http_perhapsrewind()
596 infof(data, "NEGOTIATE send, close instead of sending %" in http_perhapsrewind()
613 infof(data, "Please rewind output before next send"); in http_perhapsrewind()
652 infof(data, "Forcing HTTP/1.1 for NTLM"); in Curl_http_auth_act()
813 infof(data, "%s auth using %s with user '%s'", in output_auth_headers()
820 infof(data, "Server auth using %s with user '%s'", in output_auth_headers()
1051 infof(data, "Authentication problem. Ignoring this."); in Curl_http_input_auth()
1058 infof(data, "Authentication problem. Ignoring this."); in Curl_http_input_auth()
[all …]
Dhostip.c295 infof(data, "Hostname in DNS cache was stale, zapped"); in fetch_addr()
321 infof(data, "Hostname in DNS cache doesn't have needed family, zapped"); in fetch_addr()
387 infof(data, "Shuffling %i addresses", num_addrs); in Curl_shuffle_addr()
668 infof(data, "Hostname %s was found in DNS cache", hostname); in Curl_resolv()
944 infof(data, "timeout on name lookup is not supported"); in Curl_resolv_timeout()
1090 infof(data, "Bad syntax CURLOPT_RESOLVE removal entry '%s'", in Curl_loadhostpairs()
1174 infof(data, "Ignoring resolve address '%s', missing IPv6 support.", in Curl_loadhostpairs()
1182 infof(data, "Resolve address '%s' found illegal", address); in Curl_loadhostpairs()
1218 infof(data, "RESOLVE %.*s:%d is - old addresses discarded", in Curl_loadhostpairs()
1251 infof(data, "Added %.*s:%d:%s to DNS cache%s", in Curl_loadhostpairs()
[all …]
/external/curl/lib/vtls/
Dgtls.c171 infof(data, "%s", str); in showtime()
283 infof(data, "gnutls_handshake() warning: %s", strerr); in handshake()
438 infof(data, "Using TLS-SRP username: %s", config->username); in gtls_client_init()
467 infof(data, "error reading ca cert file %s (%s)", in gtls_client_init()
475 infof(data, "found %d certificates in %s", rc, config->CAfile); in gtls_client_init()
484 infof(data, "error reading ca cert file %s (%s)", in gtls_client_init()
492 infof(data, "found %d certificates in %s", rc, config->CApath); in gtls_client_init()
514 infof(data, "found %d CRL in %s", rc, config->CRLfile); in gtls_client_init()
594 infof(data, "This GnuTLS does not support SRP"); in gtls_client_init()
599 infof(data, "GnuTLS ciphers: %s", prioritylist); in gtls_client_init()
[all …]
Dschannel.c519 DEBUGF(infof(data, "schannel: disabled server certificate revocation " in schannel_acquire_credential_handle()
526 DEBUGF(infof(data, "schannel: ignore revocation offline errors")); in schannel_acquire_credential_handle()
531 DEBUGF(infof(data, in schannel_acquire_credential_handle()
539 DEBUGF(infof(data, in schannel_acquire_credential_handle()
545 DEBUGF(infof(data, "schannel: verifyhost setting prevents Schannel from " in schannel_acquire_credential_handle()
553 infof(data, "schannel: disabled automatic use of client certificate"); in schannel_acquire_credential_handle()
556 infof(data, "schannel: enabled automatic use of client certificate"); in schannel_acquire_credential_handle()
1098 DEBUGF(infof(data, in schannel_connect_step1()
1106 infof(data, "schannel: Windows version is old and may not be able to " in schannel_connect_step1()
1160 DEBUGF(infof(data, "schannel: re-using existing credential handle")); in schannel_connect_step1()
[all …]
Dnss.c439 infof(data, "WARNING: certificate file name \"%s\" handled as nickname; " in dup_nickname()
840 infof(data, "skipping SSL peer certificate verification"); in nss_auth_cert_hook()
943 infof(data, "Trying TLS False Start"); in CanFalseStartCallback()
961 infof(data, "subject: %s", subject); in display_cert_info()
966 infof(data, " start date: %s", timeString); in display_cert_info()
969 infof(data, " expire date: %s", timeString); in display_cert_info()
970 infof(data, " common name: %s", common_name); in display_cert_info()
971 infof(data, " issuer: %s", issuer); in display_cert_info()
996 infof(data, "SSL connection using %s", suite.cipherSuiteName); in display_conn_info()
1002 infof(data, "Server certificate:"); in display_conn_info()
[all …]
Dwolfssl.c388 infof(data, "wolfSSL <3.3.0 cannot be configured to use TLS 1.0-1.2, " in wolfssl_connect_step1()
474 infof(data, "Cipher selection: %s", ciphers); in wolfssl_connect_step1()
516 infof(data, "error setting certificate verify locations," in wolfssl_connect_step1()
522 infof(data, "successfully set certificate verify locations:"); in wolfssl_connect_step1()
524 infof(data, " CAfile: %s", in wolfssl_connect_step1()
526 infof(data, " CApath: %s", in wolfssl_connect_step1()
634 infof(data, VTLS_INFOF_ALPN_OFFER_1STR, proto.data); in wolfssl_connect_step1()
665 infof(data, "Can't use session ID, going on without"); in wolfssl_connect_step1()
668 infof(data, "SSL re-using session ID"); in wolfssl_connect_step1()
780 infof(data, in wolfssl_connect_step2()
[all …]
Dx509asn1.c935 infof(data, " %s: %s", label, output); in do_pubkey_field()
959 infof(data, " ECC Public Key (%lu bits)", len); in do_pubkey()
993 infof(data, " RSA Public Key (%lu bits)", len); in do_pubkey()
1100 infof(data, "%2d Subject: %s", certnum, ccp); in Curl_extract_certinfo()
1111 infof(data, " Issuer: %s", ccp); in Curl_extract_certinfo()
1130 infof(data, " Version: %u (0x%x)", version + 1, version); in Curl_extract_certinfo()
1139 infof(data, " Serial Number: %s", ccp); in Curl_extract_certinfo()
1152 infof(data, " Signature Algorithm: %s", ccp); in Curl_extract_certinfo()
1164 infof(data, " Start Date: %s", ccp); in Curl_extract_certinfo()
1176 infof(data, " Expire Date: %s", ccp); in Curl_extract_certinfo()
[all …]
Dopenssl.c501 infof(data, " Unable to load public key"); in Curl_ossl_certchain()
1039 infof(data, "libcurl is now using a weak random seed"); in ossl_seed()
1835 infof(data, "set default crypto engine '%s'", in ossl_set_engine_default()
1958 infof(data, "SSL_ERROR_WANT_READ"); in ossl_shutdown()
1962 infof(data, "SSL_ERROR_WANT_WRITE"); in ossl_shutdown()
1994 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN"); in ossl_shutdown()
1997 infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN"); in ossl_shutdown()
2000 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|" in ossl_shutdown()
2061 infof(data, " subjectAltName: host \"%s\" matched cert's \"%s\"", in subj_alt_hostcheck()
2206 infof(data, in ossl_verifyhost()
[all …]
Drustls.c80 infof(data, "rustls_connect: unimplemented"); in cr_connect()
381 infof(data, VTLS_INFOF_ALPN_OFFER_1STR, proto.data); in cr_init_backend()
495 infof(data, "Done handshaking"); in cr_connect_nonblocking()
518 infof(data, "Curl_socket_check: %s would block", in cr_connect_nonblocking()
527 infof(data, "rustls_connection wants us to write_tls."); in cr_connect_nonblocking()
530 infof(data, "writing would block"); in cr_connect_nonblocking()
539 infof(data, "rustls_connection wants us to read_tls."); in cr_connect_nonblocking()
543 infof(data, "reading would block"); in cr_connect_nonblocking()
/external/curl/lib/vssh/
Dlibssh2.c387 infof(data, "SFTP %p state change from %s to %s", in state()
535 infof(data, "unsupported key type, can't check knownhosts"); in ssh_knownhost()
563 infof(data, "SSH host check: %d, key: %s", keycheck, in ssh_knownhost()
628 infof(data, "WARNING: adding the known host %s failed", in ssh_knownhost()
639 infof(data, "WARNING: writing %s failed", in ssh_knownhost()
660 infof(data, "SSH MD5 public key: %s", in ssh_check_fingerprint()
662 infof(data, "SSH SHA256 public key: %s", in ssh_check_fingerprint()
713 infof(data, "SSH SHA256 fingerprint: %s", fingerprint_b64); in ssh_check_fingerprint()
743 infof(data, "SHA256 checksum match"); in ssh_check_fingerprint()
760 infof(data, "SSH MD5 fingerprint: %s", md5buffer); in ssh_check_fingerprint()
[all …]
Dwolfssh.c211 infof(data, "wolfssh %p state change from %s to %s", in state()
280 infof(data, "sent %zd bytes SFTP from offset %zd", in wsftp_send()
354 DEBUGF(infof(data, "wolfssh callback: type %s", in userauth()
475 infof(data, "wolfssh connected"); in wssh_statemach_act()
496 infof(data, "wolfssh SFTP connected"); in wssh_statemach_act()
525 infof(data, "wolfssh SFTP realpath succeeded"); in wssh_statemach_act()
543 infof(data, "Sending quote commands"); in wssh_statemach_act()
623 infof(data, "wolfssh SFTP open succeeded"); in wssh_statemach_act()
734 infof(data, "wolfssh SFTP open succeeded"); in wssh_statemach_act()
760 infof(data, "wolfssh STAT succeeded"); in wssh_statemach_act()
[all …]
Dlibssh.c318 infof(data, "SSH %p state change from %s to %s (line %d)", in mystate()
383 infof(data, "SSH MD5 fingerprint: %s", md5buffer); in myssh_is_known()
746 infof(data, "Authenticated with none"); in myssh_statemach_act()
758 infof(data, "Authentication using SSH public key file"); in myssh_statemach_act()
824 infof(data, "Completed public key authentication"); in myssh_statemach_act()
841 infof(data, "Completed public key authentication"); in myssh_statemach_act()
846 infof(data, "Failed public key authentication (rc: %d)", rc); in myssh_statemach_act()
866 infof(data, "Completed gssapi authentication"); in myssh_statemach_act()
892 infof(data, "completed keyboard interactive authentication"); in myssh_statemach_act()
915 infof(data, "Completed password authentication"); in myssh_statemach_act()
[all …]
/external/curl/lib/vauth/
Dkrb5_gssapi.c128 infof(data, "GSSAPI handshake failure (empty challenge message)"); in Curl_auth_create_gssapi_user_message()
203 infof(data, "GSSAPI handshake failure (empty security message)"); in Curl_auth_create_gssapi_security_message()
222 infof(data, "GSSAPI handshake failure (invalid security data)"); in Curl_auth_create_gssapi_security_message()
236 infof(data, "GSSAPI handshake failure (invalid security layer)"); in Curl_auth_create_gssapi_security_message()
Dkrb5_sspi.c178 infof(data, "GSSAPI handshake failure (empty challenge message)"); in Curl_auth_create_gssapi_user_message()
280 infof(data, "GSSAPI handshake failure (empty security message)"); in Curl_auth_create_gssapi_security_message()
309 infof(data, "GSSAPI handshake failure (empty security message)"); in Curl_auth_create_gssapi_security_message()
315 infof(data, "GSSAPI handshake failure (invalid security data)"); in Curl_auth_create_gssapi_security_message()
329 infof(data, "GSSAPI handshake failure (invalid security layer)"); in Curl_auth_create_gssapi_security_message()
/external/curl/tests/data/
Dtest16525 infof
17 infof
/external/tpm2-tss/src/tss2-tcti/
Dtctildr-dl.c130 TSS2_TCTI_INFO_FUNC infof; in tcti_from_file() local
141 infof = (TSS2_TCTI_INFO_FUNC) dlsym(handle, TSS2_TCTI_INFO_SYMBOL); in tcti_from_file()
142 if (infof == NULL) { in tcti_from_file()
148 r = tcti_from_info(infof, conf, tcti); in tcti_from_file()

1234