Lines Matching full:failf
241 failf(data, "%s", PR_ErrorToString(err, PR_LANGUAGE_I_DEFAULT));
293 failf(data, "Unknown cipher in list: %s", cipher);
308 failf(data, "cipher-suite not supported by NSS: %s", cipherlist[i].name);
655 failf(conn->data, "Unable to load client key: Incorrect password");
658 failf(conn->data, "Unable to load certificate %s", filename);
678 failf(data, "unable to load client cert: %d (%s)", err, err_name);
695 failf(data, "unable to load client key: %d (%s)", err, err_name);
728 failf(conn->data, "Invalid OCSP response");
733 failf(conn->data, "No OCSP response received");
743 failf(conn->data, "Invalid OCSP response");
1062 failf(data, "failed to verify pinned public key");
1095 failf(data, "NSS: PK11 slot not found: %s", pem_slotname);
1101 failf(data, "NSS: CKA_VALUE not found in PK11 generic object");
1109 failf(data, "NSS: client certificate from file not found");
1117 failf(data, "NSS: private key from file not found");
1136 failf(data, "NSS: client certificate not found (nickname not "
1139 failf(data, "NSS: client certificate not found: %s", nickname);
1150 failf(data, "NSS: refusing previously loaded certificate from file: %s",
1156 failf(data, "NSS: private key not found for certificate: %s", nickname);
1386 failf(data, "unable to initialize NSS, curl_global_init() should have "
1704 failf(data, "unsupported min version passed via CURLOPT_SSLVERSION");
1718 failf(data, "unsupported max version passed via CURLOPT_SSLVERSION");
1902 /* failf() is already done in cert_stuff() */
2065 failf(data, "timed out before SSL handshake");
2198 /* The SelectClientCert() hook uses this for infof() and failf() but the
2235 /* The SelectClientCert() hook uses this for infof() and failf() but the