/external/curl/lib/vtls/ |
D | schannel.c | 439 DEBUGF(infof(data, in schannel_connect_step1() 447 infof(data, "schannel: Windows version is old and may not be able to " in schannel_connect_step1() 501 DEBUGF(infof(data, "schannel: re-using existing credential handle\n")); in schannel_connect_step1() 505 DEBUGF(infof(data, in schannel_connect_step1() 530 DEBUGF(infof(data, "schannel: disabled server certificate revocation " in schannel_connect_step1() 535 DEBUGF(infof(data, in schannel_connect_step1() 543 DEBUGF(infof(data, in schannel_connect_step1() 549 DEBUGF(infof(data, "schannel: verifyhost setting prevents Schannel from " in schannel_connect_step1() 714 infof(data, "schannel: using IP address, SNI is not supported by OS.\n"); in schannel_connect_step1() 746 infof(data, "schannel: ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID); in schannel_connect_step1() [all …]
|
D | gtls.c | 241 infof(data, "%s\n", str); in showtime() 350 infof(data, "gnutls_handshake() warning: %s\n", strerr); in handshake() 584 infof(data, "Using TLS-SRP username: %s\n", SSL_SET_OPTION(username)); in gtls_connect_step1() 614 infof(data, "error reading ca cert file %s (%s)\n", in gtls_connect_step1() 620 infof(data, "found %d certificates in %s\n", rc, in gtls_connect_step1() 631 infof(data, "error reading ca cert file %s (%s)\n", in gtls_connect_step1() 637 infof(data, "found %d certificates in %s\n", in gtls_connect_step1() 661 infof(data, "found %d CRL in %s\n", in gtls_connect_step1() 689 infof(data, "WARNING: failed to configure server name indication (SNI) " in gtls_connect_step1() 795 infof(data, "This GnuTLS does not support SRP\n"); in gtls_connect_step1() [all …]
|
D | cyassl.c | 174 infof(data, "CyaSSL <3.3.0 cannot be configured to use TLS 1.0-1.2, " in cyassl_connect_step1() 268 infof(data, "Cipher selection: %s\n", ciphers); in cyassl_connect_step1() 290 infof(data, "error setting certificate verify locations," in cyassl_connect_step1() 296 infof(data, "successfully set certificate verify locations:\n"); in cyassl_connect_step1() 298 infof(data, in cyassl_connect_step1() 352 infof(data, "WARNING: failed to configure server name indication (SNI) " in cyassl_connect_step1() 398 infof(data, "ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID); in cyassl_connect_step1() 403 infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1); in cyassl_connect_step1() 429 infof(data, "SSL re-using session ID\n"); in cyassl_connect_step1() 504 infof(data, in cyassl_connect_step2() [all …]
|
D | nss.c | 403 infof(data, "warning: certificate file name \"%s\" handled as nickname; " in dup_nickname() 791 infof(conn->data, "skipping SSL peer certificate verification\n"); in nss_auth_cert_hook() 823 infof(conn->data, "ALPN/NPN, server did not agree to a protocol\n"); in HandshakeCallback() 827 infof(conn->data, "ALPN, server accepted to use %.*s\n", buflen, buf); in HandshakeCallback() 831 infof(conn->data, "NPN, server accepted to use %.*s\n", buflen, buf); in HandshakeCallback() 902 infof(data, "Trying TLS False Start\n"); in CanFalseStartCallback() 920 infof(data, "\tsubject: %s\n", subject); in display_cert_info() 925 infof(data, "\tstart date: %s\n", timeString); in display_cert_info() 928 infof(data, "\texpire date: %s\n", timeString); in display_cert_info() 929 infof(data, "\tcommon name: %s\n", common_name); in display_cert_info() [all …]
|
D | openssl.c | 531 infof(data, "libcurl is now using a weak random seed!\n"); in Curl_ossl_seed() 1231 infof(data, "set default crypto engine '%s'\n", in Curl_ossl_set_engine_default() 1340 infof(data, "SSL_ERROR_WANT_READ\n"); in Curl_ossl_shutdown() 1344 infof(data, "SSL_ERROR_WANT_WRITE\n"); in Curl_ossl_shutdown() 1376 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN\n"); in Curl_ossl_shutdown() 1379 infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN\n"); in Curl_ossl_shutdown() 1382 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|" in Curl_ossl_shutdown() 1449 infof(data, in subj_alt_hostcheck() 1469 infof(data, " subjectAltName: host \"%s\" matched cert's \"%s\"\n", 1586 infof(data, in verifyhost() [all …]
|
D | mbedtls.c | 131 infof(data, "%s", line); in mbed_debug() 376 infof(data, "mbedTLS: Connecting to %s:%ld\n", hostname, port); in mbed_connect_step1() 403 infof(data, "mbedTLS: Set min SSL version to TLS 1.0\n"); in mbed_connect_step1() 410 infof(data, "mbedTLS: Set SSL version to SSLv3\n"); in mbed_connect_step1() 461 infof(data, "mbedTLS re-using session\n"); in mbed_connect_step1() 499 infof(data, "ALPN, offering %s\n", *p); in mbed_connect_step1() 571 infof(data, "mbedTLS: Handshake complete, cipher is %s\n", in mbed_connect_step2() 607 infof(data, "Dumping cert info:\n%s\n", buffer); in mbed_connect_step2() 609 infof(data, "Unable to dump certificate information.\n"); in mbed_connect_step2() 670 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2() [all …]
|
D | polarssl.c | 141 infof(data, "%s", line); in polarssl_debug() 340 infof(data, "PolarSSL: Connecting to %s:%d\n", hostname, port); in polarssl_connect_step1() 358 infof(data, "PolarSSL: Forced min. SSL Version to be SSLv3\n"); in polarssl_connect_step1() 398 infof(data, "PolarSSL re-using session\n"); in polarssl_connect_step1() 427 infof(data, "ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID); in polarssl_connect_step1() 432 infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1); in polarssl_connect_step1() 489 infof(data, "PolarSSL: Handshake complete, cipher is %s\n", in polarssl_connect_step2() 518 infof(data, "Dumping cert info:\n%s\n", buffer); in polarssl_connect_step2() 581 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in polarssl_connect_step2() 595 infof(data, "ALPN, server did not agree to a protocol\n"); in polarssl_connect_step2() [all …]
|
D | mesalink.c | 157 infof(data, in mesalink_connect_step1() 162 infof(data, "successfully set certificate verify locations:\n"); in mesalink_connect_step1() 164 infof(data, in mesalink_connect_step1() 179 infof(data, "Cipher selection: %s\n", ciphers); in mesalink_connect_step1() 241 infof(data, "SSL re-using session ID\n"); in mesalink_connect_step1() 293 infof(data, in mesalink_connect_step2() 322 infof(data, "old SSL session ID is stale, removing\n"); in mesalink_connect_step3()
|
D | sectransp.c | 1588 infof(data, "ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID); 1593 infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1); 1600 infof(data, "WARNING: failed to set ALPN protocols; OSStatus %d\n", 1608 infof(data, "WARNING: SSL: CURLOPT_SSLKEY is ignored by Secure " 1622 infof(data, "WARNING: SSL: Certificate type not set, assuming " 1626 infof(data, "WARNING: SSL: The Security framework only supports " 1646 infof(data, "Client certificate: %s\n", certp); 1766 infof(data, "WARNING: SSL: SSLSetPeerDomainName() failed: OSStatus %d\n", 1775 infof(data, "WARNING: using IP address, SNI is being disabled by " 1780 infof(data, "WARNING: disabling hostname validation also disables SNI.\n"); [all …]
|
/external/curl/lib/ |
D | http2.c | 165 H2BUGF(infof(conn->data, "HTTP/2 DISCONNECT starts now\n")); in http2_disconnect() 170 H2BUGF(infof(conn->data, "HTTP/2 DISCONNECT done\n")); in http2_disconnect() 214 infof(conn->data, in http2_connisdead() 534 H2BUGF(infof(data, "PUSH_PROMISE received, stream %u!\n", in push_promise() 546 infof(data, "failed to duplicate handle\n"); in push_promise() 554 H2BUGF(infof(data, "Got PUSH_PROMISE, ask application!\n")); in push_promise() 594 infof(data, "failed to add handle to multi\n"); in push_promise() 607 infof(data, "failed to set user_data for stream %d\n", in push_promise() 614 H2BUGF(infof(data, "Got PUSH_PROMISE, ignore it!\n")); in push_promise() 649 H2BUGF(infof(conn->data, "Got SETTINGS\n")); in on_frame_recv() [all …]
|
D | telnet.c | 316 infof(data, "%s IAC %s\n", direction, CURL_TELCMD(option)); in printoption() 318 infof(data, "%s IAC %d\n", direction, option); in printoption() 335 infof(data, "%s %s %s\n", direction, fmt, opt); in printoption() 337 infof(data, "%s %s %d\n", direction, fmt, option); in printoption() 340 infof(data, "%s %d %d\n", direction, cmd, option); in printoption() 714 infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT"); in printsub() 722 infof(data, "(terminated by "); in printsub() 724 infof(data, "%s ", CURL_TELOPT(i)); in printsub() 726 infof(data, "%s ", CURL_TELCMD(i)); in printsub() 728 infof(data, "%u ", i); in printsub() [all …]
|
D | transfer.c | 187 infof(data, in Curl_fillreadbuffer() 213 infof(data, "Successfully compiled trailers.\r\n"); in Curl_fillreadbuffer() 377 infof(data, "Signaling end of chunked upload after trailers.\n"); in Curl_fillreadbuffer() 385 infof(data, in Curl_fillreadbuffer() 463 infof(data, "the ioctl callback returned %d\n", (int)err); in Curl_readrewind() 531 DEBUGF(infof(conn->data, in read_rewind() 551 infof(data, in Curl_meets_timecondition() 559 infof(data, in Curl_meets_timecondition() 634 DEBUGF(infof(data, "readwrite_data: we're done!\n")); in readwrite_data() 656 DEBUGF(infof(data, "nread <= 0, server closed connection, bailing\n")); in readwrite_data() [all …]
|
D | http_proxy.c | 158 infof(conn->data, "allocate connect buffer!\n"); in connect_init() 178 infof(conn->data, "CONNECT phase completed!\n"); in connect_done() 208 infof(data, "Establish HTTP proxy tunnel to %s:%d\n", in CONNECT() 358 infof(data, "Proxy CONNECT connection closed\n"); in CONNECT() 394 infof(data, "chunk reading DONE\n"); in CONNECT() 453 infof(data, "Ignore %" CURL_FORMAT_CURL_OFF_T in CONNECT() 459 infof(data, "Ignore chunked response-body\n"); in CONNECT() 478 infof(data, "chunk reading DONE\n"); in CONNECT() 522 infof(data, "Ignoring Content-Length in CONNECT %03d response\n", in CONNECT() 537 infof(data, "Ignoring Transfer-Encoding in " in CONNECT() [all …]
|
D | ssh.c | 395 infof(conn->data, "SFTP %p state change from %s to %s\n", in state() 504 infof(data, "SSH host check: %d, key: %s\n", keycheck, in ssh_knownhost() 564 infof(data, "Warning adding the known host %s failed!\n", in ssh_knownhost() 574 infof(data, "Warning, writing %s failed!\n", in ssh_knownhost() 603 infof(data, "SSH MD5 fingerprint: %s\n", md5buffer); in ssh_check_fingerprint() 622 infof(data, "MD5 checksum match!\n"); in ssh_check_fingerprint() 712 infof(data, "SSH user accepted with no authentication\n"); in ssh_statemach_act() 725 infof(data, "SSH authentication methods available: %s\n", in ssh_statemach_act() 813 infof(data, "Using SSH public key file '%s'\n", sshc->rsa_pub); in ssh_statemach_act() 814 infof(data, "Using SSH private key file '%s'\n", sshc->rsa); in ssh_statemach_act() [all …]
|
D | curl_range.c | 57 DEBUGF(infof(data, "RANGE %" CURL_FORMAT_CURL_OFF_T " to end of file\n", in Curl_range() 64 DEBUGF(infof(data, "RANGE the last %" CURL_FORMAT_CURL_OFF_T " bytes\n", in Curl_range() 81 DEBUGF(infof(data, "RANGE from %" CURL_FORMAT_CURL_OFF_T in Curl_range() 85 DEBUGF(infof(data, "range-download from %" CURL_FORMAT_CURL_OFF_T in Curl_range()
|
D | socks.c | 129 infof(conn->data, "SOCKS4%s: connecting to HTTP proxy %s port %d\n", in Curl_SOCKS4() 134 infof(data, "SOCKS4 communication to %s:%d\n", hostname, remote_port); in Curl_SOCKS4() 186 infof(data, "SOCKS4 connect to IPv4 %s (locally resolved)\n", buf); in Curl_SOCKS4() 300 infof(data, "SOCKS4%s request granted.\n", protocol4a?"a":""); in Curl_SOCKS4() 393 infof(conn->data, "SOCKS5: connecting to HTTP proxy %s port %d\n", in Curl_SOCKS5() 398 infof(conn->data, "SOCKS5: server resolving disabled for hostnames of " in Curl_SOCKS5() 432 infof(conn->data, in Curl_SOCKS5() 456 infof(data, "SOCKS5 communication to %s:%d\n", hostname, remote_port); in Curl_SOCKS5() 632 infof(data, "SOCKS5 connect to IPv4 %s (locally resolved)\n", buf); in Curl_SOCKS5() 646 infof(data, "SOCKS5 connect to IPv6 %s (locally resolved)\n", buf); in Curl_SOCKS5() [all …]
|
D | tftp.c | 264 infof(state->conn->data, in tftp_set_timeouts() 352 infof(data, "got option=(%s) value=(%s)\n", option, value); in tftp_parse_option_ack() 383 infof(data, "%s (%d) %s (%d)\n", "blksize parsed from OACK", in tftp_parse_option_ack() 390 infof(data, "%s (%ld)\n", "tsize parsed from OACK", tsize); in tftp_parse_option_ack() 423 infof(data, "%s\n", "Connected for transmit"); in tftp_connect_for_tx() 439 infof(data, "%s\n", "Connected for receive"); in tftp_connect_for_rx() 608 infof(data, "Received last DATA packet block %d again.\n", rblock); in tftp_rx() 612 infof(data, in tftp_rx() 664 infof(data, in tftp_rx() 736 infof(data, "Received ACK for block %d, expecting %d\n", in tftp_tx() [all …]
|
D | connect.c | 117 infof(data, "Failed to set SO_KEEPALIVE on fd %d\n", sockfd); in tcpkeepalive() 132 infof(data, "Failed to set SIO_KEEPALIVE_VALS on fd %d: %d\n", in tcpkeepalive() 141 infof(data, "Failed to set TCP_KEEPIDLE on fd %d\n", sockfd); in tcpkeepalive() 149 infof(data, "Failed to set TCP_KEEPINTVL on fd %d\n", sockfd); in tcpkeepalive() 158 infof(data, "Failed to set TCP_KEEPALIVE on fd %d\n", sockfd); in tcpkeepalive() 335 infof(data, "Local Interface %s is ip %s using address family %i\n", in bindlocal() 368 infof(data, "Name '%s' family %i resolved to '%s' family %i\n", in bindlocal() 455 infof(data, "Local port: %hu\n", port); in bindlocal() 461 infof(data, "Bind to local port %hu failed, trying next\n", port); in bindlocal() 786 infof(data, "After %ldms connect time, move on!\n", in Curl_is_connected() [all …]
|
D | ftp.c | 301 infof(data, "Connection accepted from server\n"); in AcceptServerConnect() 392 infof(data, "Checking for server connect\n"); in ReceivedServerConnect() 402 infof(data, "There is negative response in cache while serv connect\n"); in ReceivedServerConnect() 420 infof(data, "Ready to accept data connection from server\n"); in ReceivedServerConnect() 424 infof(data, "Ctrl conn has data while waiting for data conn\n"); in ReceivedServerConnect() 456 infof(data, "Doing the SSL/TLS handshake on the data stream\n"); in InitiateTransfer() 500 infof(data, "Preparing for accepting server on data port\n"); in AllowServerConnect() 606 infof(data, "We got a 421 - timeout!\n"); in ftp_readresp() 781 infof(conn->data, "FTP %p (line %d) state change from %s to %s\n", in _state() 1142 infof(data, "bind(port=%hu) on non-local address failed: %s\n", port, in ftp_state_use_port() [all …]
|
D | hostip.c | 326 infof(data, "Hostname in DNS cache was stale, zapped\n"); in fetch_addr() 394 infof(data, "Shuffling %i addresses", num_addrs); in Curl_shuffle_addr() 534 infof(data, "Hostname %s was found in DNS cache\n", hostname); in Curl_resolv() 743 infof(conn->data, "timeout on name lookup is not supported\n"); in Curl_resolv_timeout() 881 infof(data, "Couldn't parse CURLOPT_RESOLVE removal entry '%s'!\n", in Curl_loadhostpairs() 963 infof(data, "Ignoring resolve address '%s', missing IPv6 support.\n", in Curl_loadhostpairs() 971 infof(data, "Resolve address '%s' found illegal!\n", address); in Curl_loadhostpairs() 990 infof(data, "Couldn't parse CURLOPT_RESOLVE entry '%s'!\n", in Curl_loadhostpairs() 1007 infof(data, "RESOLVE %s:%d is - old addresses discarded!\n", in Curl_loadhostpairs() 1035 infof(data, "Added %s:%d:%s to DNS cache\n", in Curl_loadhostpairs() [all …]
|
D | pipeline.c | 84 infof(data, "Conn: %ld (%p) Receive pipe weight: (%" in Curl_pipeline_penalized() 149 infof(conn->data, "%p is at send pipe head B!\n", in Curl_move_handle_from_send_to_recv_pipe() 182 infof(handle, "Site %s:%d is pipeline blacklisted\n", in Curl_pipeline_site_blacklisted() 251 infof(handle, "Server %s is blacklisted\n", server_name); in Curl_pipeline_server_blacklisted() 257 DEBUGF(infof(handle, "Server %s is not blacklisted\n", server_name)); in Curl_pipeline_server_blacklisted() 394 infof(data, "- Conn %ld (%p) send_pipe: %zu, recv_pipe: %zu\n",
|
D | sendf.h | 35 #define infof(...) Curl_nop_stmt macro 37 #define infof(x...) Curl_nop_stmt macro 44 #define infof Curl_infof macro
|
D | x509asn1.c | 868 infof(data, " %s: %s\n", label, output); in do_pubkey_field() 905 infof(data, " RSA Public Key (%lu bits)\n", len); in do_pubkey() 979 infof(data, "%2d Subject: %s\n", certnum, ccp); in Curl_extract_certinfo() 989 infof(data, " Issuer: %s\n", ccp); in Curl_extract_certinfo() 1004 infof(data, " Version: %lu (0x%lx)\n", version + 1, version); in Curl_extract_certinfo() 1013 infof(data, " Serial Number: %s\n", ccp); in Curl_extract_certinfo() 1024 infof(data, " Signature Algorithm: %s\n", ccp); in Curl_extract_certinfo() 1034 infof(data, " Start Date: %s\n", ccp); in Curl_extract_certinfo() 1044 infof(data, " Expire Date: %s\n", ccp); in Curl_extract_certinfo() 1055 infof(data, " Public Key Algorithm: %s\n", ccp); in Curl_extract_certinfo() [all …]
|
D | url.c | 676 infof(conn->data, "Closing connection %ld\n", conn->connection_id); in conn_shutdown() 785 DEBUGF(infof(data, "DISCONNECT without easy handle, ignoring\n")); in Curl_disconnect() 794 DEBUGF(infof(data, "Curl_disconnect when inuse: %zu\n", CONN_INUSE(conn))); in Curl_disconnect() 903 infof(data, "Handle in pipeline: %s\n", data->state.path); 999 infof(data, "Connection %ld seems to be dead!\n", conn->connection_id); in extract_if_dead() 1110 infof(data, "Found bundle for host %s: %p [%s]\n", in ConnectionExists() 1122 infof(data, "Server doesn't support multi-use yet, wait\n"); in ConnectionExists() 1128 infof(data, "Server doesn't support multi-use (yet)\n"); in ConnectionExists() 1134 infof(data, "Could pipeline, but not asked to!\n"); in ConnectionExists() 1139 infof(data, "Could multiplex, but not asked to!\n"); in ConnectionExists() [all …]
|
D | ssh-libssh.c | 298 infof(conn->data, "SSH %p state change from %s to %s (line %d)\n", in mystate() 618 infof(data, "Authenticated with none\n"); in myssh_statemach_act() 629 infof(data, "Authentication using SSH public key file\n"); in myssh_statemach_act() 692 infof(data, "Completed public key authentication\n"); in myssh_statemach_act() 709 infof(data, "Completed public key authentication\n"); in myssh_statemach_act() 714 infof(data, "Failed public key authentication (rc: %d)\n", rc); in myssh_statemach_act() 733 infof(data, "Completed gssapi authentication\n"); in myssh_statemach_act() 759 infof(data, "completed keyboard interactive authentication\n"); in myssh_statemach_act() 781 infof(data, "Completed password authentication\n"); in myssh_statemach_act() 799 infof(data, "Authentication complete\n"); in myssh_statemach_act() [all …]
|