Home
last modified time | relevance | path

Searched refs:infof (Results 1 – 25 of 60) sorted by relevance

123

/external/curl/lib/vtls/
Dschannel.c129 infof(data, "schannel: SSL/TLS connection with %s port %hu (step 1/3)\n", in schannel_connect_step1()
151 infof(data, "schannel: re-using existing credential handle\n"); in schannel_connect_step1()
155 infof(data, "schannel: incremented credential handle refcount = %d\n", in schannel_connect_step1()
183 infof(data, "schannel: disabled server certificate revocation " in schannel_connect_step1()
186 infof(data, "schannel: checking server certificate revocation\n"); in schannel_connect_step1()
192 infof(data, "schannel: disabled server certificate revocation checks\n"); in schannel_connect_step1()
197 infof(data, "schannel: verifyhost setting prevents Schannel from " in schannel_connect_step1()
269 infof(data, "schannel: using IP address, SNI is not supported by OS.\n"); in schannel_connect_step1()
301 infof(data, "schannel: ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID); in schannel_connect_step1()
308 infof(data, "schannel: ALPN, offering %s\n", ALPN_HTTP_1_1); in schannel_connect_step1()
[all …]
Daxtls.c189 infof(data, "error reading ca cert file %s \n", in connect_prep()
196 infof(data, "found certificates in %s\n", SSL_CONN_CONFIG(CAfile)); in connect_prep()
215 infof(data, "successfully read cert file %s \n", in connect_prep()
239 infof(data, "successfully read key file %s \n", in connect_prep()
268 infof (data, "SSL re-using session ID\n"); in connect_prep()
313 infof(data, "\t server certificate verification SKIPPED\n"); in connect_finish()
335 infof(data, "\tComparing subject alt name DNS with hostname: %s <-> %s\n", in connect_finish()
352 infof(data, "\tsubjectAltName(s) do not match %s\n", dispname); in connect_finish()
365 infof(data, "unable to obtain common name from peer certificate"); in connect_finish()
377 infof(data, "\tcommon name \"%s\" does not match \"%s\"\n", in connect_finish()
[all …]
Dgtls.c235 infof(data, "%s\n", data->state.buffer); in showtime()
342 infof(data, "gnutls_handshake() warning: %s\n", strerr); in handshake()
445 infof(data, "Using TLS-SRP username: %s\n", SSL_SET_OPTION(username)); in gtls_connect_step1()
476 infof(data, "error reading ca cert file %s (%s)\n", in gtls_connect_step1()
482 infof(data, "found %d certificates in %s\n", rc, in gtls_connect_step1()
493 infof(data, "error reading ca cert file %s (%s)\n", in gtls_connect_step1()
499 infof(data, "found %d certificates in %s\n", in gtls_connect_step1()
523 infof(data, "found %d CRL in %s\n", in gtls_connect_step1()
544 infof(data, "WARNING: failed to configure server name indication (SNI) " in gtls_connect_step1()
650 infof(data, "This GnuTLS does not support SRP\n"); in gtls_connect_step1()
[all …]
Dcyassl.c159 infof(data, "CyaSSL <3.3.0 cannot be configured to use TLS 1.0-1.2, " in cyassl_connect_step1()
251 infof(data, "error setting certificate verify locations," in cyassl_connect_step1()
257 infof(data, "successfully set certificate verify locations:\n"); in cyassl_connect_step1()
259 infof(data, in cyassl_connect_step1()
313 infof(data, "WARNING: failed to configure server name indication (SNI) " in cyassl_connect_step1()
369 infof(data, "ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID); in cyassl_connect_step1()
374 infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1); in cyassl_connect_step1()
400 infof (data, "SSL re-using session ID\n"); in cyassl_connect_step1()
472 infof(data, in cyassl_connect_step2()
488 infof(data, "CA signer not available for verification, " in cyassl_connect_step2()
[all …]
Dmbedtls.c116 infof(data, "%s", line); in mbed_debug()
300 infof(data, "mbedTLS: Connecting to %s:%d\n", hostname, port); in mbed_connect_step1()
327 infof(data, "mbedTLS: Set min SSL version to TLS 1.0\n"); in mbed_connect_step1()
334 infof(data, "mbedTLS: Set SSL version to SSLv3\n"); in mbed_connect_step1()
341 infof(data, "mbedTLS: Set SSL version to TLS 1.0\n"); in mbed_connect_step1()
348 infof(data, "mbedTLS: Set SSL version to TLS 1.1\n"); in mbed_connect_step1()
355 infof(data, "mbedTLS: Set SSL version to TLS 1.2\n"); in mbed_connect_step1()
389 infof(data, "mbedTLS re-using session\n"); in mbed_connect_step1()
427 infof(data, "ALPN, offering %s\n", *p); in mbed_connect_step1()
486 infof(data, "mbedTLS: Handshake complete, cipher is %s\n", in mbed_connect_step2()
[all …]
Dnss.c351 infof(data, "warning: certificate file name \"%s\" handled as nickname; " in dup_nickname()
711 infof(conn->data, "skipping SSL peer certificate verification\n"); in nss_auth_cert_hook()
743 infof(conn->data, "ALPN/NPN, server did not agree to a protocol\n"); in HandshakeCallback()
747 infof(conn->data, "ALPN, server accepted to use %.*s\n", buflen, buf); in HandshakeCallback()
751 infof(conn->data, "NPN, server accepted to use %.*s\n", buflen, buf); in HandshakeCallback()
822 infof(data, "Trying TLS False Start\n"); in CanFalseStartCallback()
840 infof(data, "\tsubject: %s\n", subject); in display_cert_info()
845 infof(data, "\tstart date: %s\n", timeString); in display_cert_info()
848 infof(data, "\texpire date: %s\n", timeString); in display_cert_info()
849 infof(data, "\tcommon name: %s\n", common_name); in display_cert_info()
[all …]
Dpolarssl.c129 infof(data, "%s", line); in polarssl_debug()
269 infof(data, "PolarSSL: Connecting to %s:%d\n", hostname, port); in polarssl_connect_step1()
287 infof(data, "PolarSSL: Forced min. SSL Version to be SSLv3\n"); in polarssl_connect_step1()
294 infof(data, "PolarSSL: Forced min. SSL Version to be TLS 1.0\n"); in polarssl_connect_step1()
301 infof(data, "PolarSSL: Forced min. SSL Version to be TLS 1.1\n"); in polarssl_connect_step1()
308 infof(data, "PolarSSL: Forced min. SSL Version to be TLS 1.2\n"); in polarssl_connect_step1()
341 infof(data, "PolarSSL re-using session\n"); in polarssl_connect_step1()
370 infof(data, "ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID); in polarssl_connect_step1()
375 infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1); in polarssl_connect_step1()
428 infof(data, "PolarSSL: Handshake complete, cipher is %s\n", in polarssl_connect_step2()
[all …]
Dopenssl.c261 infof(data, "libcurl is now using a weak random seed!\n"); in Curl_ossl_seed()
864 infof(data, "set default crypto engine '%s'\n", in Curl_ossl_set_engine_default()
974 infof(data, "SSL_ERROR_WANT_READ\n"); in Curl_ossl_shutdown()
978 infof(data, "SSL_ERROR_WANT_WRITE\n"); in Curl_ossl_shutdown()
1008 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN\n"); in Curl_ossl_shutdown()
1011 infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN\n"); in Curl_ossl_shutdown()
1014 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|" in Curl_ossl_shutdown()
1161 infof(data, in verifyhost()
1172 infof(data, in verifyhost()
1190 infof(data, " subjectAltName does not match %s\n", dispname); in verifyhost()
[all …]
Ddarwinssl.c1245 infof(data, "WARNING: SSL: CURLOPT_SSLKEY is ignored by Secure "
1259 infof(data, "WARNING: SSL: Certificate type not set, assuming "
1263 infof(data, "WARNING: SSL: The Security framework only supports "
1289 infof(data, "Client certificate: %s\n", cert_summary_c);
1410 infof(data, "WARNING: SSL: SSLSetPeerDomainName() failed: OSStatus %d\n",
1419 infof(data, "WARNING: using IP address, SNI is being disabled by "
1559 infof(data, "SSL re-using session ID\n");
2007 infof(data, "SSL 2.0 connection using %s\n",
2011 infof(data, "SSL 3.0 connection using %s\n",
2015 infof(data, "TLS 1.0 connection using %s\n",
[all …]
/external/curl/lib/
Dhttp2.c122 DEBUGF(infof(conn->data, "HTTP/2 DISCONNECT starts now\n")); in http2_disconnect()
139 DEBUGF(infof(conn->data, "HTTP/2 DISCONNECT done\n")); in http2_disconnect()
376 DEBUGF(infof(data, "PUSH_PROMISE received, stream %u!\n", in push_promise()
388 infof(data, "failed to duplicate handle\n"); in push_promise()
396 DEBUGF(infof(data, "Got PUSH_PROMISE, ask application!\n")); in push_promise()
430 infof(data, "failed to add handle to multi\n"); in push_promise()
441 DEBUGF(infof(data, "Got PUSH_PROMISE, ignore it!\n")); in push_promise()
464 DEBUGF(infof(conn->data, "Got SETTINGS\n")); in on_frame_recv()
471 DEBUGF(infof(conn->data, "MAX_CONCURRENT_STREAMS == %d\n", in on_frame_recv()
473 DEBUGF(infof(conn->data, "ENABLE_PUSH == %s\n", in on_frame_recv()
[all …]
Dtelnet.c317 infof(data, "%s IAC %s\n", direction, CURL_TELCMD(option)); in printoption()
319 infof(data, "%s IAC %d\n", direction, option); in printoption()
333 infof(data, "%s %s %s\n", direction, fmt, opt); in printoption()
335 infof(data, "%s %s %d\n", direction, fmt, option); in printoption()
338 infof(data, "%s %d %d\n", direction, cmd, option); in printoption()
714 infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT"); in printsub()
722 infof(data, "(terminated by "); in printsub()
724 infof(data, "%s ", CURL_TELOPT(i)); in printsub()
726 infof(data, "%s ", CURL_TELCMD(i)); in printsub()
728 infof(data, "%u ", i); in printsub()
[all …]
Dhttp_proxy.c175 infof(data, "Establish HTTP proxy tunnel to %s:%hu\n", in Curl_proxyCONNECT()
292 DEBUGF(infof(data, in Curl_proxyCONNECT()
344 infof(data, "Proxy CONNECT connection closed\n"); in Curl_proxyCONNECT()
386 infof(data, "chunk reading DONE\n"); in Curl_proxyCONNECT()
392 infof(data, "Read %zd bytes of chunk, continue\n", in Curl_proxyCONNECT()
446 infof(data, "Ignore %" CURL_FORMAT_CURL_OFF_T in Curl_proxyCONNECT()
465 infof(data, "%zd bytes of chunk left\n", gotbytes-i); in Curl_proxyCONNECT()
480 infof(data, "chunk reading DONE\n"); in Curl_proxyCONNECT()
487 infof(data, "Read %zd bytes of chunk, continue\n", in Curl_proxyCONNECT()
541 infof(data, "CONNECT responded chunked\n"); in Curl_proxyCONNECT()
[all …]
Dsendf.h35 #define infof(...) Curl_nop_stmt macro
37 #define infof(x...) Curl_nop_stmt macro
39 #define infof (void) macro
44 #define infof Curl_infof macro
Dssh.c402 infof(conn->data, "SFTP %p state change from %s to %s\n", in state()
575 infof(data, "SSH host check: %d, key: %s\n", keycheck, in ssh_knownhost()
633 infof(data, "Warning adding the known host %s failed!\n", in ssh_knownhost()
643 infof(data, "Warning, writing %s failed!\n", in ssh_knownhost()
672 infof(data, "SSH MD5 fingerprint: %s\n", md5buffer); in ssh_check_fingerprint()
692 infof(data, "MD5 checksum match!\n"); in ssh_check_fingerprint()
781 infof(data, "SSH user accepted with no authentication\n"); in ssh_statemach_act()
796 infof(data, "SSH authentication methods available: %s\n", in ssh_statemach_act()
884 infof(data, "Using SSH public key file '%s'\n", sshc->rsa_pub); in ssh_statemach_act()
885 infof(data, "Using SSH private key file '%s'\n", sshc->rsa); in ssh_statemach_act()
[all …]
Dtransfer.c274 infof(data, "the ioctl callback returned %d\n", (int)err); in Curl_readrewind()
342 DEBUGF(infof(conn->data, in read_rewind()
362 infof(data, in Curl_meets_timecondition()
370 infof(data, in Curl_meets_timecondition()
446 DEBUGF(infof(data, "readwrite_data: we're done!\n")); in readwrite_data()
468 DEBUGF(infof(data, "nread <= 0, server closed connection, bailing\n")); in readwrite_data()
509 infof(data, in readwrite_data()
516 infof(data, in readwrite_data()
561 infof(data, "Ignoring the response-body\n"); in readwrite_data()
570 infof(data, "The entire document is already downloaded"); in readwrite_data()
[all …]
Dconnect.c115 infof(data, "Failed to set SO_KEEPALIVE on fd %d\n", sockfd); in tcpkeepalive()
130 infof(data, "Failed to set SIO_KEEPALIVE_VALS on fd %d: %d\n", in tcpkeepalive()
139 infof(data, "Failed to set TCP_KEEPIDLE on fd %d\n", sockfd); in tcpkeepalive()
147 infof(data, "Failed to set TCP_KEEPINTVL on fd %d\n", sockfd); in tcpkeepalive()
156 infof(data, "Failed to set TCP_KEEPALIVE on fd %d\n", sockfd); in tcpkeepalive()
305 infof(data, "Local Interface %s is ip %s using address family %i\n", in bindlocal()
324 infof(data, "SO_BINDTODEVICE %s failed with errno %d: %s;" in bindlocal()
362 infof(data, "Name '%s' family %i resolved to '%s' family %i\n", in bindlocal()
444 infof(data, "Local port: %hu\n", port); in bindlocal()
450 infof(data, "Bind to local port %hu failed, trying next\n", port); in bindlocal()
[all …]
Dtftp.c263 infof(state->conn->data, in tftp_set_timeouts()
351 infof(data, "got option=(%s) value=(%s)\n", option, value); in tftp_parse_option_ack()
382 infof(data, "%s (%d) %s (%d)\n", "blksize parsed from OACK", in tftp_parse_option_ack()
389 infof(data, "%s (%ld)\n", "tsize parsed from OACK", tsize); in tftp_parse_option_ack()
422 infof(data, "%s\n", "Connected for transmit"); in tftp_connect_for_tx()
438 infof(data, "%s\n", "Connected for receive"); in tftp_connect_for_rx()
599 infof(data, "Received last DATA packet block %d again.\n", rblock); in tftp_rx()
603 infof(data, in tftp_rx()
655 infof(data, in tftp_rx()
727 infof(data, "Received ACK for block %d, expecting %d\n", in tftp_tx()
[all …]
Dsocks.c131 infof(conn->data, "SOCKS4%s: connecting to HTTP proxy %s port %d\n", in Curl_SOCKS4()
136 infof(data, "SOCKS4 communication to %s:%d\n", hostname, remote_port); in Curl_SOCKS4()
188 infof(data, "SOCKS4 connect to IPv4 %s (locally resolved)\n", buf); in Curl_SOCKS4()
301 infof(data, "SOCKS4%s request granted.\n", protocol4a?"a":""); in Curl_SOCKS4()
391 infof(conn->data, "SOCKS5: connecting to HTTP proxy %s port %d\n",
396 infof(conn->data, "SOCKS5: server resolving disabled for hostnames of "
443 infof(data, "SOCKS5 communication to %s:%d\n", hostname, remote_port);
623 infof(data, "SOCKS5 connect to IPv4 %s (locally resolved)\n", buf);
636 infof(data, "SOCKS5 connect to IPv6 %s (locally resolved)\n", buf);
776 infof(data, "SOCKS5 request granted.\n");
Dftp.c351 infof(data, "Connection accepted from server\n"); in AcceptServerConnect()
440 infof(data, "Checking for server connect\n"); in ReceivedServerConnect()
450 infof(data, "There is negative response in cache while serv connect\n"); in ReceivedServerConnect()
468 infof(data, "Ready to accept data connection from server\n"); in ReceivedServerConnect()
472 infof(data, "Ctrl conn has data while waiting for data conn\n"); in ReceivedServerConnect()
505 infof(data, "Doing the SSL/TLS handshake on the data stream\n"); in InitiateTransfer()
554 infof(data, "Preparing for accepting server on data port\n"); in AllowServerConnect()
662 infof(data, "We got a 421 - timeout!\n"); in ftp_readresp()
838 infof(conn->data, "FTP %p (line %d) state change from %s to %s\n", in _state()
1192 infof(data, "bind(port=%hu) on non-local address failed: %s\n", port, in ftp_state_use_port()
[all …]
Dpipeline.c85 infof(data, "Conn: %ld (%p) Receive pipe weight: (%" in Curl_pipeline_penalized()
149 infof(conn->data, "%p is at send pipe head B!\n", in Curl_move_handle_from_send_to_recv_pipe()
182 infof(handle, "Site %s:%d is pipeline blacklisted\n", in Curl_pipeline_site_blacklisted()
274 infof(handle, "Server %s is blacklisted\n", server_name); in Curl_pipeline_server_blacklisted()
281 DEBUGF(infof(handle, "Server %s is not blacklisted\n", server_name)); in Curl_pipeline_server_blacklisted()
429 infof(data, "- Conn %ld (%p) send_pipe: %zu, recv_pipe: %zu\n",
Dx509asn1.c808 infof(data, " %s: %s\n", label, output); in do_pubkey_field()
841 infof(data, " RSA Public Key (%lu bits)\n", len); in do_pubkey()
911 infof(data, "%2d Subject: %s\n", certnum, ccp); in Curl_extract_certinfo()
921 infof(data, " Issuer: %s\n", ccp); in Curl_extract_certinfo()
936 infof(data, " Version: %lu (0x%lx)\n", version + 1, version); in Curl_extract_certinfo()
945 infof(data, " Serial Number: %s\n", ccp); in Curl_extract_certinfo()
956 infof(data, " Signature Algorithm: %s\n", ccp); in Curl_extract_certinfo()
966 infof(data, " Start Date: %s\n", ccp); in Curl_extract_certinfo()
976 infof(data, " Expire Date: %s\n", ccp); in Curl_extract_certinfo()
987 infof(data, " Public Key Algorithm: %s\n", ccp); in Curl_extract_certinfo()
[all …]
Dhostip.c317 infof(data, "Hostname in DNS cache was stale, zapped\n"); in fetch_addr()
462 infof(data, "Hostname %s was found in DNS cache\n", hostname); in Curl_resolv()
657 infof(conn->data, "timeout on name lookup is not supported\n"); in Curl_resolv_timeout()
792 infof(data, "Couldn't parse CURLOPT_RESOLVE removal entry '%s'!\n", in Curl_loadhostpairs()
826 infof(data, "Couldn't parse CURLOPT_RESOLVE entry '%s'!\n", in Curl_loadhostpairs()
833 infof(data, "Address in '%s' found illegal!\n", hostp->data); in Curl_loadhostpairs()
877 infof(data, "Added %s:%d:%s to DNS cache\n", in Curl_loadhostpairs()
Dsecurity.c316 infof(conn->data, "Send: %s%s\n", prot_level == PROT_PRIVATE?enc:mic, in do_sec_send()
422 infof(conn->data, "Trying to change the protection level after the" in sec_set_protection_level()
498 infof(data, "Failed initialization for %s. Skipping it.\n", in choose_mech()
504 infof(data, "Trying mechanism %s...\n", mech->name); in choose_mech()
513 infof(data, "Mechanism %s is not supported by the server (server " in choose_mech()
517 infof(data, "Mechanism %s was rejected by the server (server returned " in choose_mech()
522 infof(data, "server does not support the security extensions\n"); in choose_mech()
Dhttp_ntlm.c87 infof(conn->data, "NTLM auth restarted\n"); in Curl_input_ntlm()
91 infof(conn->data, "NTLM handshake rejected\n"); in Curl_input_ntlm()
97 infof(conn->data, "NTLM handshake failure (internal error)\n"); in Curl_input_ntlm()
/external/curl/lib/vauth/
Dkrb5_gssapi.c140 infof(data, "GSSAPI handshake failure (empty challenge message)\n"); in Curl_auth_create_gssapi_user_message()
240 infof(data, "GSSAPI handshake failure (empty security message)\n"); in Curl_auth_create_gssapi_security_message()
289 infof(data, "GSSAPI handshake failure (invalid security data)\n"); in Curl_auth_create_gssapi_security_message()
305 infof(data, "GSSAPI handshake failure (invalid security layer)\n"); in Curl_auth_create_gssapi_security_message()

123