HomeSort by relevance Sort by last modified time
    Searched refs:infof (Results 1 - 25 of 56) sorted by null

1 2 3

  /external/curl/lib/
sendf.h 35 #define infof(...) Curl_nop_stmt macro
37 #define infof(x...) Curl_nop_stmt macro
39 #define infof (void) macro
44 #define infof Curl_infof macro
http2.c 119 DEBUGF(infof(conn->data, "HTTP/2 DISCONNECT starts now\n"));
136 DEBUGF(infof(conn->data, "HTTP/2 DISCONNECT done\n"));
371 DEBUGF(infof(data, "PUSH_PROMISE received, stream %u!\n",
383 infof(data, "failed to duplicate handle\n");
391 DEBUGF(infof(data, "Got PUSH_PROMISE, ask application!\n"));
425 infof(data, "failed to add handle to multi\n");
436 DEBUGF(infof(data, "Got PUSH_PROMISE, ignore it!\n"));
459 DEBUGF(infof(conn->data, "Got SETTINGS\n"));
466 DEBUGF(infof(conn->data, "MAX_CONCURRENT_STREAMS == %d\n",
468 DEBUGF(infof(conn->data, "ENABLE_PUSH == %s\n"
    [all...]
http_proxy.c 135 infof(data, "Establish HTTP proxy tunnel to %s:%hu\n",
246 DEBUGF(infof(data,
299 infof(data, "Proxy CONNECT connection closed\n");
341 infof(data, "chunk reading DONE\n");
347 infof(data, "Read %zd bytes of chunk, continue\n",
401 infof(data, "Ignore %" CURL_FORMAT_CURL_OFF_T
420 infof(data, "%zd bytes of chunk left\n", gotbytes-i);
435 infof(data, "chunk reading DONE\n");
442 infof(data, "Read %zd bytes of chunk, continue\n",
496 infof(data, "CONNECT responded chunked\n")
    [all...]
telnet.c 318 infof(data, "%s IAC %s\n", direction, CURL_TELCMD(option));
320 infof(data, "%s IAC %d\n", direction, option);
334 infof(data, "%s %s %s\n", direction, fmt, opt);
336 infof(data, "%s %s %d\n", direction, fmt, option);
339 infof(data, "%s %d %d\n", direction, cmd, option);
715 infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT");
723 infof(data, "(terminated by ");
725 infof(data, "%s ", CURL_TELOPT(i));
727 infof(data, "%s ", CURL_TELCMD(i));
729 infof(data, "%u ", i)
    [all...]
curl_gssapi.c 56 infof(data, "warning: support for CURLGSSAPI_DELEGATION_POLICY_FLAG not "
128 infof(data, "%s%s\n", prefix, buf);
ssh.c 402 infof(conn->data, "SFTP %p state change from %s to %s\n",
575 infof(data, "SSH host check: %d, key: %s\n", keycheck,
633 infof(data, "Warning adding the known host %s failed!\n",
643 infof(data, "Warning, writing %s failed!\n",
672 infof(data, "SSH MD5 fingerprint: %s\n", md5buffer);
692 infof(data, "MD5 checksum match!\n");
781 infof(data, "SSH user accepted with no authentication\n");
796 infof(data, "SSH authentication methods available: %s\n",
884 infof(data, "Using SSH public key file '%s'\n", sshc->rsa_pub);
885 infof(data, "Using SSH private key file '%s'\n", sshc->rsa)
    [all...]
tftp.c 262 infof(state->conn->data,
350 infof(data, "got option=(%s) value=(%s)\n", option, value);
381 infof(data, "%s (%d) %s (%d)\n", "blksize parsed from OACK",
388 infof(data, "%s (%ld)\n", "tsize parsed from OACK", tsize);
421 infof(data, "%s\n", "Connected for transmit");
437 infof(data, "%s\n", "Connected for receive");
598 infof(data, "Received last DATA packet block %d again.\n", rblock);
602 infof(data,
654 infof(data,
725 infof(data, "Received ACK for block %d, expecting %d\n"
    [all...]
transfer.c 276 infof(data, "the ioctl callback returned %d\n", (int)err);
344 DEBUGF(infof(conn->data,
364 infof(data,
372 infof(data,
443 DEBUGF(infof(data, "readwrite_data: we're done!\n"));
465 DEBUGF(infof(data, "nread <= 0, server closed connection, bailing\n"));
506 infof(data,
513 infof(data,
551 infof(data, "Ignoring the response-body\n");
560 infof(data, "The entire document is already downloaded")
    [all...]
connect.c 115 infof(data, "Failed to set SO_KEEPALIVE on fd %d\n", sockfd);
130 infof(data, "Failed to set SIO_KEEPALIVE_VALS on fd %d: %d\n",
139 infof(data, "Failed to set TCP_KEEPIDLE on fd %d\n", sockfd);
147 infof(data, "Failed to set TCP_KEEPINTVL on fd %d\n", sockfd);
156 infof(data, "Failed to set TCP_KEEPALIVE on fd %d\n", sockfd);
305 infof(data, "Local Interface %s is ip %s using address family %i\n",
324 infof(data, "SO_BINDTODEVICE %s failed with errno %d: %s;"
362 infof(data, "Name '%s' family %i resolved to '%s' family %i\n",
444 infof(data, "Local port: %hu\n", port);
450 infof(data, "Bind to local port %hu failed, trying next\n", port)
    [all...]
http_ntlm.c 87 infof(conn->data, "NTLM auth restarted\n");
91 infof(conn->data, "NTLM handshake rejected\n");
97 infof(conn->data, "NTLM handshake failure (internal error)\n");
pipeline.c 85 infof(data, "Conn: %ld (%p) Receive pipe weight: (%"
149 infof(conn->data, "%p is at send pipe head B!\n",
182 infof(handle, "Site %s:%d is pipeline blacklisted\n",
274 infof(handle, "Server %s is blacklisted\n", server_name);
281 DEBUGF(infof(handle, "Server %s is not blacklisted\n", server_name));
429 infof(data, "- Conn %ld (%p) send_pipe: %zu, recv_pipe: %zu\n",
hostip.c 317 infof(data, "Hostname in DNS cache was stale, zapped\n");
462 infof(data, "Hostname %s was found in DNS cache\n", hostname);
654 infof(conn->data, "timeout on name lookup is not supported\n");
789 infof(data, "Couldn't parse CURLOPT_RESOLVE removal entry '%s'!\n",
823 infof(data, "Couldn't parse CURLOPT_RESOLVE entry '%s'!\n",
830 infof(data, "Address in '%s' found illegal!\n", hostp->data);
874 infof(data, "Added %s:%d:%s to DNS cache\n",
security.c 312 infof(conn->data, "Send: %s%s\n", prot_level == PROT_PRIVATE?enc:mic,
418 infof(conn->data, "Trying to change the protection level after the"
494 infof(data, "Failed initialization for %s. Skipping it.\n",
500 infof(data, "Trying mechanism %s...\n", mech->name);
509 infof(data, "Mechanism %s is not supported by the server (server "
513 infof(data, "Mechanism %s was rejected by the server (server returned "
518 infof(data, "server does not support the security extensions\n");
x509asn1.c 799 infof(data, " %s: %s\n", label, output);
832 infof(data, " RSA Public Key (%lu bits)\n", len);
901 infof(data, "%2d Subject: %s\n", certnum, ccp);
911 infof(data, " Issuer: %s\n", ccp);
926 infof(data, " Version: %lu (0x%lx)\n", version + 1, version);
935 infof(data, " Serial Number: %s\n", ccp);
946 infof(data, " Signature Algorithm: %s\n", ccp);
956 infof(data, " Start Date: %s\n", ccp);
966 infof(data, " Expire Date: %s\n", ccp);
977 infof(data, " Public Key Algorithm: %s\n", ccp)
    [all...]
ftp.c 351 infof(data, "Connection accepted from server\n");
440 infof(data, "Checking for server connect\n");
450 infof(data, "There is negative response in cache while serv connect\n");
468 infof(data, "Ready to accept data connection from server\n");
472 infof(data, "Ctrl conn has data while waiting for data conn\n");
505 infof(data, "Doing the SSL/TLS handshake on the data stream\n");
554 infof(data, "Preparing for accepting server on data port\n");
662 infof(data, "We got a 421 - timeout!\n");
838 infof(conn->data, "FTP %p (line %d) state change from %s to %s\n",
    [all...]
  /external/curl/lib/vtls/
schannel.c 77 * #define infof(x, y, ...) printf(y, __VA_ARGS__)
127 infof(data, "schannel: SSL/TLS connection with %s port %hu (step 1/3)\n",
137 infof(data, "schannel: re-using existing credential handle\n");
141 infof(data, "schannel: incremented credential handle refcount = %d\n",
168 infof(data, "schannel: disabled server certificate revocation "
171 infof(data, "schannel: checking server certificate revocation\n");
177 infof(data, "schannel: disabled server certificate revocation checks\n");
182 infof(data, "schannel: verifyhost setting prevents Schannel from "
249 infof(data, "schannel: using IP address, SNI is not supported by OS.\n");
284 infof(data, "schannel: ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID)
    [all...]
axtls.c 189 infof(data, "error reading ca cert file %s \n",
196 infof(data, "found certificates in %s\n", data->set.ssl.CAfile);
215 infof(data, "successfully read cert file %s \n",
239 infof(data, "successfully read key file %s \n",
267 infof (data, "SSL re-using session ID\n");
308 infof(data, "\t server certificate verification SKIPPED\n");
330 infof(data, "\tComparing subject alt name DNS with hostname: %s <-> %s\n",
348 infof(data, "\tsubjectAltName(s) do not match %s\n",
362 infof(data, "unable to obtain common name from peer certificate");
374 infof(data, "\tcommon name \"%s\" does not match \"%s\"\n"
    [all...]
gtls.c 225 infof(data, "%s\n", data->state.buffer);
331 infof(data, "gnutls_handshake() warning: %s\n", strerr);
429 infof(data, "Using TLS-SRP username: %s\n", data->set.ssl.username);
460 infof(data, "error reading ca cert file %s (%s)\n",
466 infof(data, "found %d certificates in %s\n",
477 infof(data, "error reading ca cert file %s (%s)\n",
483 infof(data, "found %d certificates in %s\n",
507 infof(data, "found %d CRL in %s\n",
528 infof(data, "WARNING: failed to configure server name indication (SNI) "
626 infof(data, "This GnuTLS does not support SRP\n")
    [all...]
cyassl.c 159 infof(data, "CyaSSL <3.3.0 cannot be configured to use TLS 1.0-1.2, "
248 infof(data, "error setting certificate verify locations,"
254 infof(data, "successfully set certificate verify locations:\n");
256 infof(data,
307 infof(data, "WARNING: failed to configure server name indication (SNI) "
363 infof(data, "ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID);
368 infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1);
394 infof (data, "SSL re-using session ID\n");
462 infof(data,
478 infof(data, "CA signer not available for verification,
    [all...]
mbedtls.c 113 infof(data, "%s", line);
293 infof(data, "mbedTLS: Connecting to %s:%d\n",
321 infof(data, "mbedTLS: Set min SSL version to TLS 1.0\n");
328 infof(data, "mbedTLS: Set SSL version to SSLv3\n");
335 infof(data, "mbedTLS: Set SSL version to TLS 1.0\n");
342 infof(data, "mbedTLS: Set SSL version to TLS 1.1\n");
349 infof(data, "mbedTLS: Set SSL version to TLS 1.2\n");
380 infof(data, "mbedTLS re-using session\n");
418 infof(data, "ALPN, offering %s\n", *p);
469 infof(data, "mbedTLS: Handshake complete, cipher is %s\n"
    [all...]
polarssl.c 124 infof(data, "%s", line);
284 infof(data, "PolarSSL: Connecting to %s:%d\n",
304 infof(data, "PolarSSL: Forced min. SSL Version to be SSLv3\n");
311 infof(data, "PolarSSL: Forced min. SSL Version to be TLS 1.0\n");
318 infof(data, "PolarSSL: Forced min. SSL Version to be TLS 1.1\n");
325 infof(data, "PolarSSL: Forced min. SSL Version to be TLS 1.2\n");
352 infof(data, "PolarSSL re-using session\n");
380 infof(data, "ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID);
385 infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1);
440 infof(data, "PolarSSL: Handshake complete, cipher is %s\n"
    [all...]
nss.c 334 infof(data, "warning: certificate file name \"%s\" handled as nickname; "
681 infof(conn->data, "skipping SSL peer certificate verification\n");
708 infof(conn->data, "ALPN/NPN, server did not agree to a protocol\n");
712 infof(conn->data, "ALPN, server accepted to use %.*s\n", buflen, buf);
716 infof(conn->data, "NPN, server accepted to use %.*s\n", buflen, buf);
787 infof(data, "Trying TLS False Start\n");
805 infof(data, "\tsubject: %s\n", subject);
810 infof(data, "\tstart date: %s\n", timeString);
813 infof(data, "\texpire date: %s\n", timeString);
814 infof(data, "\tcommon name: %s\n", common_name)
    [all...]
openssl.c 254 infof(data, "libcurl is now using a weak random seed!\n");
866 infof(data, "set default crypto engine '%s'\n",
972 infof(data, "SSL_ERROR_WANT_READ\n");
976 infof(data, "SSL_ERROR_WANT_WRITE\n");
1006 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN\n");
1009 infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN\n");
1012 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|"
    [all...]
  /external/curl/lib/vauth/
krb5_gssapi.c 126 infof(data, "GSSAPI handshake failure (empty challenge message)\n");
226 infof(data, "GSSAPI handshake failure (empty security message)\n");
275 infof(data, "GSSAPI handshake failure (invalid security data)\n");
291 infof(data, "GSSAPI handshake failure (invalid security layer)\n");
krb5_sspi.c 165 infof(data, "GSSAPI handshake failure (empty challenge message)\n");
282 infof(data, "GSSAPI handshake failure (empty security message)\n");
321 infof(data, "GSSAPI handshake failure (empty security message)\n");
330 infof(data, "GSSAPI handshake failure (invalid security data)\n");
345 infof(data, "GSSAPI handshake failure (invalid security layer)\n");

Completed in 272 milliseconds

1 2 3