/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | sendf.h | 35 #define infof(...) Curl_nop_stmt macro 37 #define infof(x...) Curl_nop_stmt macro 39 #define infof (void) macro 44 #define infof Curl_infof macro
|
H A D | curl_gssapi.c | 46 infof(data, "warning: support for CURLGSSAPI_DELEGATION_POLICY_FLAG not "
|
H A D | telnet.c | 319 infof(data, "%s IAC %s\n", direction, CURL_TELCMD(option)); 321 infof(data, "%s IAC %d\n", direction, option); 335 infof(data, "%s %s %s\n", direction, fmt, opt); 337 infof(data, "%s %s %d\n", direction, fmt, option); 340 infof(data, "%s %d %d\n", direction, cmd, option); 717 infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT"); 725 infof(data, "(terminated by "); 727 infof(data, "%s ", CURL_TELOPT(i)); 729 infof(data, "%s ", CURL_TELCMD(i)); 731 infof(dat [all...] |
H A D | pipeline.c | 88 infof(data, "Conn: %ld (%p) Receive pipe weight: (%" 143 infof(conn->data, "%p is at send pipe head B!\n", 176 infof(handle, "Site %s:%d is pipeline blacklisted\n", 268 infof(handle, "Server %s is blacklisted\n", server_name); 275 infof(handle, "Server %s is not blacklisted\n", server_name); 330 infof(data, "- Conn %ld (%p) send_pipe: %zu, recv_pipe: %zu\n",
|
H A D | http_proxy.c | 125 infof(data, "Establish HTTP proxy tunnel to %s:%hu\n", 323 infof(data, "chunk reading DONE\n"); 329 infof(data, "Read %zd bytes of chunk, continue\n", 383 infof(data, "Ignore %" CURL_FORMAT_CURL_OFF_T 402 infof(data, "%zd bytes of chunk left\n", gotbytes-i); 417 infof(data, "chunk reading DONE\n"); 424 infof(data, "Read %zd bytes of chunk, continue\n", 478 infof(data, "CONNECT responded chunked\n"); 538 infof(data, "TUNNEL_STATE switched to: %d\n", 573 infof (dat [all...] |
H A D | http_negotiate.c | 127 infof(conn->data, "%s\n", buf); 218 infof(data, "Parse SPNEGO Target Token failed\n"); 224 infof(data, "Parse SPNEGO Target Token succeeded (NULL token)\n"); 237 infof(data, "Parse SPNEGO Target Token succeeded\n"); 309 infof(conn->data, "Make SPNEGO Initial Token failed\n"); 316 infof(conn->data, "Make SPNEGO Initial Token succeeded (NULL token)\n"); 324 infof(conn->data, "Make SPNEGO Initial Token succeeded\n");
|
H A D | ssh.c | 393 infof(conn->data, "SFTP %p state change from %s to %s\n", 554 infof(data, "SSH host check: %d, key: %s\n", keycheck, 610 infof(data, "Warning adding the known host %s failed!\n", 620 infof(data, "Warning, writing %s failed!\n", 649 infof(data, "SSH MD5 fingerprint: %s\n", md5buffer); 669 infof(data, "MD5 checksum match!\n"); 758 infof(data, "SSH user accepted with no authentication\n"); 773 infof(data, "SSH authentication methods available: %s\n", 837 infof(data, "Using ssh public key file %s\n", sshc->rsa_pub); 838 infof(dat [all...] |
H A D | http2.c | 84 infof(conn->data, "HTTP/2 DISCONNECT starts now\n"); 93 infof(conn->data, "HTTP/2 DISCONNECT done\n"); 196 infof(conn->data, "on_frame_recv() was called with header %x\n", 230 infof(conn->data, "on_invalid_frame_recv() was called, error_code = %d\n", 245 infof(conn->data, "on_data_chunk_recv() " 258 infof(conn->data, "%zu data written\n", nread); 275 infof(conn->data, "before_frame_send() was called\n"); 285 infof(conn->data, "on_frame_send() was called\n"); 295 infof(conn->data, "on_frame_not_send() was called, lib_error_code = %d\n", 306 infof(con [all...] |
H A D | tftp.c | 265 infof(state->conn->data, 353 infof(data, "got option=(%s) value=(%s)\n", option, value); 384 infof(data, "%s (%d) %s (%d)\n", "blksize parsed from OACK", 391 infof(data, "%s (%ld)\n", "tsize parsed from OACK", tsize); 424 infof(data, "%s\n", "Connected for transmit"); 440 infof(data, "%s\n", "Connected for receive"); 597 infof(data, "Received last DATA packet block %d again.\n", rblock); 601 infof(data, 653 infof(data, 724 infof(dat [all...] |
H A D | connect.c | 116 infof(data, "Failed to set SO_KEEPALIVE on fd %d\n", sockfd); 131 infof(data, "Failed to set SIO_KEEPALIVE_VALS on fd %d: %d\n", 140 infof(data, "Failed to set TCP_KEEPIDLE on fd %d\n", sockfd); 148 infof(data, "Failed to set TCP_KEEPINTVL on fd %d\n", sockfd); 157 infof(data, "Failed to set TCP_KEEPALIVE on fd %d\n", sockfd); 304 infof(data, "Local Interface %s is ip %s using address family %i\n", 323 infof(data, "SO_BINDTODEVICE %s failed with errno %d: %s;" 361 infof(data, "Name '%s' family %i resolved to '%s' family %i\n", 443 infof(data, "Local port: %hu\n", port); 449 infof(dat [all...] |
H A D | security.c | 319 infof(conn->data, "Send: %s%s\n", prot_level == PROT_PRIVATE?enc:mic, 427 infof(conn->data, "Trying to change the protection level after the" 498 infof(data, "Skipping mechanism with empty name (%p)\n", (void *)mech); 512 infof(data, "Failed initialization for %s. Skipping it.\n", mech_name); 517 infof(data, "Trying mechanism %s...\n", mech_name); 526 infof(data, "Mechanism %s is not supported by the server (server " 530 infof(data, "Mechanism %s was rejected by the server (server returned " 535 infof(data, "server does not support the security extensions\n");
|
H A D | transfer.c | 282 infof(data, "the ioctl callback returned %d\n", (int)err); 351 DEBUGF(infof(conn->data, 371 infof(data, 379 infof(data, 459 DEBUGF(infof(data, "nread <= 0, server closed connection, bailing\n")); 500 infof(data, 507 infof(data, 545 infof(data, "Ignoring the response-body\n"); 569 infof(data, "Simulate a HTTP 304 response!\n"); 630 infof(con [all...] |
H A D | x509asn1.c | 793 infof(data, " %s: %s\n", label, output); 826 infof(data, " RSA Public Key (%lu bits)\n", len); 895 infof(data, "%2d Subject: %s\n", certnum, ccp); 905 infof(data, " Issuer: %s\n", ccp); 920 infof(data, " Version: %lu (0x%lx)\n", version + 1, version); 929 infof(data, " Serial Number: %s\n", ccp); 940 infof(data, " Signature Algorithm: %s\n", ccp); 950 infof(data, " Start Date: %s\n", ccp); 960 infof(data, " Expire Date: %s\n", ccp); 971 infof(dat [all...] |
H A D | ftp.c | 346 infof(data, "Connection accepted from server\n"); 433 infof(data, "Checking for server connect\n"); 443 infof(data, "There is negative response in cache while serv connect\n"); 461 infof(data, "Ready to accept data connection from server\n"); 465 infof(data, "Ctrl conn has data while waiting for data conn\n"); 498 infof(data, "Doing the SSL/TLS handshake on the data stream\n"); 547 infof(data, "Preparing for accepting server on data port\n"); 655 infof(data, "We got a 421 - timeout!\n"); 826 infof(conn->data, "FTP %p (line %d) state change from %s to %s\n", 1177 infof(dat [all...] |
H A D | curl_ntlm.c | 95 infof(conn->data, "NTLM handshake rejected\n"); 101 infof(conn->data, "NTLM handshake failure (internal error)\n");
|
/macosx-10.10/curl-83.1.2/curl/lib/vtls/ |
H A D | axtls.c | 190 infof(data, "error reading ca cert file %s \n", 197 infof(data, "found certificates in %s\n", data->set.ssl.CAfile); 216 infof(data, "successfully read cert file %s \n", 240 infof(data, "successfully read key file %s \n", 263 infof (data, "SSL re-using session ID\n"); 303 infof(data, "\t server certificate verification SKIPPED\n"); 325 infof(data, "\tComparing subject alt name DNS with hostname: %s <-> %s\n", 343 infof(data, "\tsubjectAltName(s) do not match %s\n", 357 infof(data, "unable to obtain common name from peer certificate"); 369 infof(dat [all...] |
H A D | curl_schannel.c | 81 * #define infof(x, y, ...) printf(y, __VA_ARGS__) 126 infof(data, "schannel: SSL/TLS connection with %s port %hu (step 1/3)\n", 132 infof(data, "schannel: re-using existing credential handle\n"); 150 infof(data, "schannel: checking server certificate revocation\n"); 156 infof(data, "schannel: disable server certificate revocation checks\n"); 161 infof(data, "schannel: verifyhost setting prevents Schannel from " 227 infof(data, "schannel: using IP address, SNI is not supported by OS.\n"); 272 infof(data, "schannel: sending initial handshake data: " 285 infof(data, "schannel: sent initial handshake data: " 312 infof(dat [all...] |
H A D | gtls.c | 215 infof(data, "%s\n", data->state.buffer); 426 infof(data, "Using TLS-SRP username: %s\n", data->set.ssl.username); 457 infof(data, "error reading ca cert file %s (%s)\n", 463 infof(data, "found %d certificates in %s\n", 478 infof(data, "found %d CRL in %s\n", 499 infof(data, "WARNING: failed to configure server name indication (SNI) " 597 infof(data, "This GnuTLS does not support SRP\n"); 620 infof(data, "ALPN, offering %s, %s\n", NGHTTP2_PROTO_VERSION_ID, 624 infof(data, "SSL, can't negotiate HTTP/2.0 without ALPN\n"); 674 infof (dat [all...] |
H A D | openssl.c | 258 infof(data, "libcurl is now using a weak random seed!\n"); 855 infof(data,"set default crypto engine '%s'\n", 961 infof(data, "SSL_ERROR_WANT_READ\n"); 965 infof(data, "SSL_ERROR_WANT_WRITE\n"); 995 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN\n"); 998 infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN\n"); 1001 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|" 1193 infof(data, "\t subjectAltName: %s matched\n", conn->host.dispname); 1197 infof(data, "\t subjectAltName does not match %s\n", conn->host.dispname); 1278 infof(dat [all...] |
H A D | cyassl.c | 106 infof(data, "CyaSSL cannot be configured to use TLS 1.0-1.2, " 159 infof(data, "error setting certificate verify locations," 165 infof(data, "successfully set certificate verify locations:\n"); 167 infof(data, 226 infof (data, "SSL re-using session ID\n"); 248 infof(data, "CyaSSL: Connecting to %s:%d\n", 295 infof(data, 310 infof(data, "SSL connected\n"); 334 infof(data, "old SSL session ID is stale, removing\n");
|
H A D | nss.c | 324 infof(data, "warning: certificate file name \"%s\" handled as nickname; " 642 infof(conn->data, "skipping SSL peer certificate verification\n"); 670 infof(conn->data, "TLS, neither ALPN nor NPN succeeded\n"); 674 infof(conn->data, "ALPN, server accepted to use %.*s\n", buflen, buf); 678 infof(conn->data, "NPN, server accepted to use %.*s\n", buflen, buf); 709 infof(data, "\tsubject: %s\n", subject); 714 infof(data, "\tstart date: %s\n", timeString); 717 infof(data, "\texpire date: %s\n", timeString); 718 infof(data, "\tcommon name: %s\n", common_name); 719 infof(dat [all...] |
H A D | polarssl.c | 116 infof(data, "%s", line); 265 infof(data, "PolarSSL: Connecting to %s:%d\n", 285 infof(data, "PolarSSL re-using session\n"); 304 infof(data, "WARNING: failed to configure " 315 infof(data, "ALPN, offering %s, %s\n", protocols[0], 377 infof(data, "PolarSSL: Handshake complete, cipher is %s\n", 407 infof(data, "Dumping cert info:\n%s\n", buffer); 415 infof(data, "ALPN, server accepted to use %s\n", next_protocol); 426 infof(data, "ALPN, server did not agree to a protocol\n"); 432 infof(dat [all...] |
/macosx-10.10/ksh-23/ksh/src/lib/libast/astsa/ |
H A D | option.h | 51 Optinfo_f infof; /* runtime info function */ member in struct:Optdisc_s 78 #define optinit(d,f) (memset(d,0,sizeof(*(d))),(d)->version=OPT_VERSION,(d)->infof=(f),opt_info.disc=(d))
|
/macosx-10.10/ksh-23/ksh/src/lib/libast/include/ |
H A D | option.h | 49 Optinfo_f infof; /* runtime info function */ member in struct:Optdisc_s 90 #define optinit(d,f) (memset(d,0,sizeof(*(d))),(d)->version=OPT_VERSION,(d)->infof=(f),opt_info.disc=(d))
|
/macosx-10.10/ksh-23/ksh/src/cmd/ksh93/bltins/ |
H A D | getopts.c | 36 static int infof(Opt_t* op, Sfio_t* sp, const char* s, Optdisc_t* dp) function 73 disc.hdr.infof = infof;
|