/external/curl/lib/vtls/ |
D | schannel.c | 110 infof(data, "schannel: SSL/TLS connection with %s port %hu (step 1/3)\n", in schannel_connect_step1() 116 infof(data, "schannel: re-using existing credential handle\n"); in schannel_connect_step1() 134 infof(data, "schannel: checking server certificate revocation\n"); in schannel_connect_step1() 140 infof(data, "schannel: disable server certificate revocation checks\n"); in schannel_connect_step1() 145 infof(data, "schannel: verifyhost setting prevents Schannel from " in schannel_connect_step1() 210 infof(data, "schannel: using IP address, SNI is not supported by OS.\n"); in schannel_connect_step1() 255 infof(data, "schannel: sending initial handshake data: " in schannel_connect_step1() 268 infof(data, "schannel: sent initial handshake data: " in schannel_connect_step1() 301 infof(data, "schannel: SSL/TLS connection with %s port %hu (step 2/3)\n", in schannel_connect_step2() 360 infof(data, "schannel: failed to receive handshake, " in schannel_connect_step2() [all …]
|
D | axtls.c | 191 infof(data, "error reading ca cert file %s \n", in connect_prep() 198 infof(data, "found certificates in %s\n", data->set.ssl.CAfile); in connect_prep() 217 infof(data, "successfully read cert file %s \n", in connect_prep() 241 infof(data, "successfully read key file %s \n", in connect_prep() 264 infof (data, "SSL re-using session ID\n"); in connect_prep() 304 infof(data, "\t server certificate verification SKIPPED\n"); in connect_finish() 326 infof(data, "\tComparing subject alt name DNS with hostname: %s <-> %s\n", in connect_finish() 344 infof(data, "\tsubjectAltName(s) do not match %s\n", in connect_finish() 358 infof(data, "unable to obtain common name from peer certificate"); in connect_finish() 370 infof(data, "\tcommon name \"%s\" does not match \"%s\"\n", in connect_finish() [all …]
|
D | gtls.c | 224 infof(data, "%s\n", data->state.buffer); in showtime() 330 infof(data, "gnutls_handshake() warning: %s\n", strerr); in handshake() 430 infof(data, "Using TLS-SRP username: %s\n", data->set.ssl.username); in gtls_connect_step1() 461 infof(data, "error reading ca cert file %s (%s)\n", in gtls_connect_step1() 467 infof(data, "found %d certificates in %s\n", in gtls_connect_step1() 478 infof(data, "error reading ca cert file %s (%s)\n", in gtls_connect_step1() 484 infof(data, "found %d certificates in %s\n", in gtls_connect_step1() 500 infof(data, "found %d CRL in %s\n", in gtls_connect_step1() 521 infof(data, "WARNING: failed to configure server name indication (SNI) " in gtls_connect_step1() 619 infof(data, "This GnuTLS does not support SRP\n"); in gtls_connect_step1() [all …]
|
D | openssl.c | 255 infof(data, "libcurl is now using a weak random seed!\n"); in ossl_seed() 836 infof(data, "set default crypto engine '%s'\n", in Curl_ossl_set_engine_default() 942 infof(data, "SSL_ERROR_WANT_READ\n"); in Curl_ossl_shutdown() 946 infof(data, "SSL_ERROR_WANT_WRITE\n"); in Curl_ossl_shutdown() 976 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN\n"); in Curl_ossl_shutdown() 979 infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN\n"); in Curl_ossl_shutdown() 982 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|" in Curl_ossl_shutdown() 1172 infof(data, "\t subjectAltName: %s matched\n", conn->host.dispname); in verifyhost() 1176 infof(data, "\t subjectAltName does not match %s\n", conn->host.dispname); in verifyhost() 1258 infof(data, "\t common name: %s (matched)\n", peer_CN); in verifyhost() [all …]
|
D | polarssl.c | 114 infof(data, "%s", line); in polarssl_debug() 276 infof(data, "PolarSSL: Connecting to %s:%d\n", in polarssl_connect_step1() 296 infof(data, "PolarSSL: Forced min. SSL Version to be SSLv3\n"); in polarssl_connect_step1() 303 infof(data, "PolarSSL: Forced min. SSL Version to be TLS 1.0\n"); in polarssl_connect_step1() 310 infof(data, "PolarSSL: Forced min. SSL Version to be TLS 1.1\n"); in polarssl_connect_step1() 317 infof(data, "PolarSSL: Forced min. SSL Version to be TLS 1.2\n"); in polarssl_connect_step1() 333 infof(data, "PolarSSL re-using session\n"); in polarssl_connect_step1() 352 infof(data, "WARNING: failed to configure " in polarssl_connect_step1() 364 infof(data, "ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID); in polarssl_connect_step1() 369 infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1); in polarssl_connect_step1() [all …]
|
D | nss.c | 328 infof(data, "warning: certificate file name \"%s\" handled as nickname; " in dup_nickname() 675 infof(conn->data, "skipping SSL peer certificate verification\n"); in nss_auth_cert_hook() 702 infof(conn->data, "ALPN/NPN, server did not agree to a protocol\n"); in HandshakeCallback() 706 infof(conn->data, "ALPN, server accepted to use %.*s\n", buflen, buf); in HandshakeCallback() 710 infof(conn->data, "NPN, server accepted to use %.*s\n", buflen, buf); in HandshakeCallback() 781 infof(data, "Trying TLS False Start\n"); in CanFalseStartCallback() 799 infof(data, "\tsubject: %s\n", subject); in display_cert_info() 804 infof(data, "\tstart date: %s\n", timeString); in display_cert_info() 807 infof(data, "\texpire date: %s\n", timeString); in display_cert_info() 808 infof(data, "\tcommon name: %s\n", common_name); in display_cert_info() [all …]
|
D | cyassl.c | 126 infof(data, "CyaSSL <3.3.0 cannot be configured to use TLS 1.0-1.2, " in cyassl_connect_step1() 210 infof(data, "error setting certificate verify locations," in cyassl_connect_step1() 216 infof(data, "successfully set certificate verify locations:\n"); in cyassl_connect_step1() 218 infof(data, in cyassl_connect_step1() 269 infof(data, "WARNING: failed to configure server name indication (SNI) " in cyassl_connect_step1() 313 infof (data, "SSL re-using session ID\n"); in cyassl_connect_step1() 379 infof(data, in cyassl_connect_step2() 395 infof(data, "CA signer not available for verification, " in cyassl_connect_step2() 446 infof(data, "SSL connected\n"); in cyassl_connect_step2() 470 infof(data, "old SSL session ID is stale, removing\n"); in cyassl_connect_step3()
|
D | darwinssl.c | 1188 infof(data, "WARNING: SSL: CURLOPT_SSLKEY is ignored by Secure " 1202 infof(data, "WARNING: SSL: Certificate type not set, assuming " 1206 infof(data, "WARNING: SSL: The Security framework only supports " 1232 infof(data, "Client certificate: %s\n", cert_summary_c); 1348 infof(data, "WARNING: SSL: SSLSetPeerDomainName() failed: OSStatus %d\n", 1357 infof(data, "WARNING: using IP address, SNI is being disabled by " 1480 infof(data, "SSL re-using session ID\n"); 1923 infof(data, "SSL 2.0 connection using %s\n", 1927 infof(data, "SSL 3.0 connection using %s\n", 1931 infof(data, "TLS 1.0 connection using %s\n", [all …]
|
/external/curl/lib/ |
D | http2.c | 85 DEBUGF(infof(conn->data, "HTTP/2 DISCONNECT starts now\n")); in http2_disconnect() 91 DEBUGF(infof(conn->data, "HTTP/2 DISCONNECT done\n")); in http2_disconnect() 221 DEBUGF(infof(conn->data, "on_frame_recv() header %x stream %x\n", in on_frame_recv() 285 DEBUGF(infof(data_s, "Store %zu bytes headers from stream %u at %p\n", in on_frame_recv() 295 DEBUGF(infof(data_s, "Got PUSH_PROMISE, RST_STREAM it!\n")); in on_frame_recv() 306 DEBUGF(infof(conn->data, "Got SETTINGS for stream %u!\n", stream_id)); in on_frame_recv() 313 DEBUGF(infof(conn->data, "MAX_CONCURRENT_STREAMS == %d\n", in on_frame_recv() 315 DEBUGF(infof(conn->data, "ENABLE_PUSH == %s\n", in on_frame_recv() 319 infof(conn->data, in on_frame_recv() 326 DEBUGF(infof(conn->data, "Got frame type %x for stream %u!\n", in on_frame_recv() [all …]
|
D | http_proxy.c | 121 infof(data, "Establish HTTP proxy tunnel to %s:%hu\n", in Curl_proxyCONNECT() 232 DEBUGF(infof(data, in Curl_proxyCONNECT() 284 infof(data, "Proxy CONNECT connection closed\n"); in Curl_proxyCONNECT() 326 infof(data, "chunk reading DONE\n"); in Curl_proxyCONNECT() 332 infof(data, "Read %zd bytes of chunk, continue\n", in Curl_proxyCONNECT() 386 infof(data, "Ignore %" CURL_FORMAT_CURL_OFF_T in Curl_proxyCONNECT() 405 infof(data, "%zd bytes of chunk left\n", gotbytes-i); in Curl_proxyCONNECT() 420 infof(data, "chunk reading DONE\n"); in Curl_proxyCONNECT() 427 infof(data, "Read %zd bytes of chunk, continue\n", in Curl_proxyCONNECT() 481 infof(data, "CONNECT responded chunked\n"); in Curl_proxyCONNECT() [all …]
|
D | telnet.c | 317 infof(data, "%s IAC %s\n", direction, CURL_TELCMD(option)); in printoption() 319 infof(data, "%s IAC %d\n", direction, option); in printoption() 333 infof(data, "%s %s %s\n", direction, fmt, opt); in printoption() 335 infof(data, "%s %s %d\n", direction, fmt, option); in printoption() 338 infof(data, "%s %d %d\n", direction, cmd, option); in printoption() 714 infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT"); in printsub() 722 infof(data, "(terminated by "); in printsub() 724 infof(data, "%s ", CURL_TELOPT(i)); in printsub() 726 infof(data, "%s ", CURL_TELCMD(i)); in printsub() 728 infof(data, "%u ", i); in printsub() [all …]
|
D | ssh.c | 393 infof(conn->data, "SFTP %p state change from %s to %s\n", in state() 566 infof(data, "SSH host check: %d, key: %s\n", keycheck, in ssh_knownhost() 624 infof(data, "Warning adding the known host %s failed!\n", in ssh_knownhost() 634 infof(data, "Warning, writing %s failed!\n", in ssh_knownhost() 663 infof(data, "SSH MD5 fingerprint: %s\n", md5buffer); in ssh_check_fingerprint() 683 infof(data, "MD5 checksum match!\n"); in ssh_check_fingerprint() 772 infof(data, "SSH user accepted with no authentication\n"); in ssh_statemach_act() 787 infof(data, "SSH authentication methods available: %s\n", in ssh_statemach_act() 872 infof(data, "Using SSH public key file '%s'\n", sshc->rsa_pub); in ssh_statemach_act() 873 infof(data, "Using SSH private key file '%s'\n", sshc->rsa); in ssh_statemach_act() [all …]
|
D | transfer.c | 280 infof(data, "the ioctl callback returned %d\n", (int)err); in Curl_readrewind() 348 DEBUGF(infof(conn->data, in read_rewind() 368 infof(data, in Curl_meets_timecondition() 376 infof(data, in Curl_meets_timecondition() 435 DEBUGF(infof(data, "readwrite_data: we're done!\n")); in readwrite_data() 457 DEBUGF(infof(data, "nread <= 0, server closed connection, bailing\n")); in readwrite_data() 498 infof(data, in readwrite_data() 505 infof(data, in readwrite_data() 543 infof(data, "Ignoring the response-body\n"); in readwrite_data() 552 infof(data, "The entire document is already downloaded"); in readwrite_data() [all …]
|
D | sendf.h | 35 #define infof(...) Curl_nop_stmt macro 37 #define infof(x...) Curl_nop_stmt macro 39 #define infof (void) macro 44 #define infof Curl_infof macro
|
D | connect.c | 114 infof(data, "Failed to set SO_KEEPALIVE on fd %d\n", sockfd); in tcpkeepalive() 129 infof(data, "Failed to set SIO_KEEPALIVE_VALS on fd %d: %d\n", in tcpkeepalive() 138 infof(data, "Failed to set TCP_KEEPIDLE on fd %d\n", sockfd); in tcpkeepalive() 146 infof(data, "Failed to set TCP_KEEPINTVL on fd %d\n", sockfd); in tcpkeepalive() 155 infof(data, "Failed to set TCP_KEEPALIVE on fd %d\n", sockfd); in tcpkeepalive() 304 infof(data, "Local Interface %s is ip %s using address family %i\n", in bindlocal() 323 infof(data, "SO_BINDTODEVICE %s failed with errno %d: %s;" in bindlocal() 361 infof(data, "Name '%s' family %i resolved to '%s' family %i\n", in bindlocal() 443 infof(data, "Local port: %hu\n", port); in bindlocal() 449 infof(data, "Bind to local port %hu failed, trying next\n", port); in bindlocal() [all …]
|
D | tftp.c | 262 infof(state->conn->data, in tftp_set_timeouts() 350 infof(data, "got option=(%s) value=(%s)\n", option, value); in tftp_parse_option_ack() 381 infof(data, "%s (%d) %s (%d)\n", "blksize parsed from OACK", in tftp_parse_option_ack() 388 infof(data, "%s (%ld)\n", "tsize parsed from OACK", tsize); in tftp_parse_option_ack() 421 infof(data, "%s\n", "Connected for transmit"); in tftp_connect_for_tx() 437 infof(data, "%s\n", "Connected for receive"); in tftp_connect_for_rx() 595 infof(data, "Received last DATA packet block %d again.\n", rblock); in tftp_rx() 599 infof(data, in tftp_rx() 651 infof(data, in tftp_rx() 722 infof(data, "Received ACK for block %d, expecting %d\n", in tftp_tx() [all …]
|
D | ftp.c | 342 infof(data, "Connection accepted from server\n"); in AcceptServerConnect() 429 infof(data, "Checking for server connect\n"); in ReceivedServerConnect() 439 infof(data, "There is negative response in cache while serv connect\n"); in ReceivedServerConnect() 457 infof(data, "Ready to accept data connection from server\n"); in ReceivedServerConnect() 461 infof(data, "Ctrl conn has data while waiting for data conn\n"); in ReceivedServerConnect() 494 infof(data, "Doing the SSL/TLS handshake on the data stream\n"); in InitiateTransfer() 543 infof(data, "Preparing for accepting server on data port\n"); in AllowServerConnect() 651 infof(data, "We got a 421 - timeout!\n"); in ftp_readresp() 827 infof(conn->data, "FTP %p (line %d) state change from %s to %s\n", in _state() 1181 infof(data, "bind(port=%hu) on non-local address failed: %s\n", port, in ftp_state_use_port() [all …]
|
D | pipeline.c | 85 infof(data, "Conn: %ld (%p) Receive pipe weight: (%" in Curl_pipeline_penalized() 149 infof(conn->data, "%p is at send pipe head B!\n", in Curl_move_handle_from_send_to_recv_pipe() 182 infof(handle, "Site %s:%d is pipeline blacklisted\n", in Curl_pipeline_site_blacklisted() 274 infof(handle, "Server %s is blacklisted\n", server_name); in Curl_pipeline_server_blacklisted() 281 DEBUGF(infof(handle, "Server %s is not blacklisted\n", server_name)); in Curl_pipeline_server_blacklisted() 423 infof(data, "- Conn %ld (%p) send_pipe: %zu, recv_pipe: %zu\n",
|
D | x509asn1.c | 798 infof(data, " %s: %s\n", label, output); in do_pubkey_field() 831 infof(data, " RSA Public Key (%lu bits)\n", len); in do_pubkey() 900 infof(data, "%2d Subject: %s\n", certnum, ccp); in Curl_extract_certinfo() 910 infof(data, " Issuer: %s\n", ccp); in Curl_extract_certinfo() 925 infof(data, " Version: %lu (0x%lx)\n", version + 1, version); in Curl_extract_certinfo() 934 infof(data, " Serial Number: %s\n", ccp); in Curl_extract_certinfo() 945 infof(data, " Signature Algorithm: %s\n", ccp); in Curl_extract_certinfo() 955 infof(data, " Start Date: %s\n", ccp); in Curl_extract_certinfo() 965 infof(data, " Expire Date: %s\n", ccp); in Curl_extract_certinfo() 976 infof(data, " Public Key Algorithm: %s\n", ccp); in Curl_extract_certinfo() [all …]
|
D | hostip.c | 317 infof(data, "Hostname in DNS cache was stale, zapped\n"); in fetch_addr() 461 infof(data, "Hostname %s was found in DNS cache\n", hostname); in Curl_resolv() 653 infof(conn->data, "timeout on name lookup is not supported\n"); in Curl_resolv_timeout() 788 infof(data, "Couldn't parse CURLOPT_RESOLVE removal entry '%s'!\n", in Curl_loadhostpairs() 822 infof(data, "Couldn't parse CURLOPT_RESOLVE entry '%s'!\n", in Curl_loadhostpairs() 829 infof(data, "Address in '%s' found illegal!\n", hostp->data); in Curl_loadhostpairs() 873 infof(data, "Added %s:%d:%s to DNS cache\n", in Curl_loadhostpairs()
|
D | security.c | 312 infof(conn->data, "Send: %s%s\n", prot_level == PROT_PRIVATE?enc:mic, in do_sec_send() 418 infof(conn->data, "Trying to change the protection level after the" in sec_set_protection_level() 494 infof(data, "Failed initialization for %s. Skipping it.\n", in choose_mech() 500 infof(data, "Trying mechanism %s...\n", mech->name); in choose_mech() 509 infof(data, "Mechanism %s is not supported by the server (server " in choose_mech() 513 infof(data, "Mechanism %s was rejected by the server (server returned " in choose_mech() 518 infof(data, "server does not support the security extensions\n"); in choose_mech()
|
D | curl_sasl_gssapi.c | 140 infof(data, "GSSAPI handshake failure (empty challenge message)\n"); in Curl_sasl_create_gssapi_user_message() 234 infof(data, "GSSAPI handshake failure (empty security message)\n"); in Curl_sasl_create_gssapi_security_message() 281 infof(data, "GSSAPI handshake failure (invalid security data)\n"); in Curl_sasl_create_gssapi_security_message() 297 infof(data, "GSSAPI handshake failure (invalid security layer)\n"); in Curl_sasl_create_gssapi_security_message()
|
D | curl_gssapi.c | 56 infof(data, "warning: support for CURLGSSAPI_DELEGATION_POLICY_FLAG not " in Curl_gss_init_sec_context() 117 infof(data, "%s\n", buf); in Curl_gss_log_error()
|
D | url.c | 2764 infof(data, "Closing connection %ld\n", conn->connection_id); in Curl_disconnect() 2866 infof(data, "Handle in pipeline: %s\n", data->state.path); 2913 infof(data, "signalPipeClose() found BAAD easy handle\n"); in signalPipeClose() 3041 infof(data, "Connection %ld seems to be dead!\n", conn->connection_id); in disconnect_if_dead() 3135 infof(data, "Found bundle for host %s: %p\n", in ConnectionExists() 3142 infof(data, "Server doesn't support multi-use yet, wait\n"); in ConnectionExists() 3147 infof(data, "Server doesn't support multi-use (yet)\n"); in ConnectionExists() 3199 infof(data, in ConnectionExists() 3210 infof(data, "Connection #%ld isn't open enough, can't reuse\n", in ConnectionExists() 3214 infof(data, in ConnectionExists() [all …]
|
D | socks.c | 132 infof(data, "SOCKS4 communication to %s:%d\n", hostname, remote_port); in Curl_SOCKS4() 187 infof(data, "SOCKS4 connect to %s (locally resolved)\n", buf); in Curl_SOCKS4() 295 infof(data, "SOCKS4%s request granted.\n", protocol4a?"a":""); in Curl_SOCKS4() 385 infof(conn->data, "SOCKS5: server resolving disabled for hostnames of " 609 infof(data, "%d\n", socksreq[len-1]);
|