Searched refs:infof (Results 1 - 25 of 40) sorted by relevance

12

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/
H A Dsendf.h35 #define infof(...) Curl_nop_stmt macro
37 #define infof(x...) Curl_nop_stmt macro
39 #define infof (void) macro
44 #define infof Curl_infof macro
H A Daxtls.c189 infof(data, "error reading ca cert file %s \n",
197 infof(data, "found certificates in %s\n", data->set.ssl.CAfile);
216 infof(data, "successfully read cert file %s \n",
241 infof(data, "successfully read key file %s \n",
265 infof (data, "SSL re-using session ID\n");
279 infof (data, "handshake completed successfully\n");
294 infof(data, "\t server certificate verification SKIPPED\n");
302 infof(data, "error fetching CN from cert\n");
324 infof (data, "failed to add session to cache\n");
340 infof(con
[all...]
H A Dcurl_gssapi.c46 infof(data, "warning: support for CURLGSSAPI_DELEGATION_POLICY_FLAG not "
H A Dhttp_proxy.c93 infof(data, "Establish HTTP proxy tunnel to %s:%hu\n",
203 DEBUGF(infof(data,
209 DEBUGF(infof(data, "Easy mode waiting response from proxy CONNECT."));
310 infof(data, "chunk reading DONE\n");
314 infof(data, "Read %zd bytes of chunk, continue\n",
365 infof(data, "Ignore %" FORMAT_OFF_T
383 infof(data, "%zd bytes of chunk left\n", gotbytes-i);
398 infof(data, "chunk reading DONE\n");
402 infof(data, "Read %zd bytes of chunk, continue\n",
439 infof(dat
[all...]
H A Dssluse.c270 infof(data, "libcurl is now using a weak random seed!\n");
803 infof(data,"set default crypto engine '%s'\n",
909 infof(data, "SSL_ERROR_WANT_READ\n");
913 infof(data, "SSL_ERROR_WANT_WRITE\n");
943 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN\n");
946 infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN\n");
949 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|"
1196 infof(data, "\t subjectAltName: %s matched\n", conn->host.dispname);
1200 infof(data, "\t subjectAltName does not match %s\n", conn->host.dispname);
1280 infof(dat
[all...]
H A Dgtls.c201 infof(data, "%s", data->state.buffer);
364 infof(data, "Using TLS-SRP username: %s\n", data->set.ssl.username);
395 infof(data, "error reading ca cert file %s (%s)\n",
401 infof(data, "found %d certificates in %s\n",
416 infof(data, "found %d CRL in %s\n",
437 infof(data, "WARNING: failed to configure server name indication (SNI) "
512 infof (data, "SSL re-using session ID\n");
570 infof(data, "\t common name: WARNING couldn't obtain\n");
596 infof(data, "\t server certificate verification FAILED\n");
599 infof(dat
[all...]
H A Dnss.c299 infof(data, "warning: certificate file name \"%s\" handled as nickname; "
603 infof(conn->data, "skipping SSL peer certificate verification\n");
627 infof(conn->data, "Issuer certificate is invalid: '%s'\n", issuer);
630 infof(conn->data, "Certificate is signed by an untrusted issuer: '%s'\n",
640 infof(conn->data, "warning: SSL: certificate subject name '%s' does not "
645 infof(conn->data, "Remote Certificate has expired.\n");
648 infof(conn->data, "Peer's certificate issuer is not recognized: '%s'\n",
652 infof(conn->data, "Bad certificate received. Subject = '%s', "
657 infof(conn->data, "SSL certificate verify ok.\n");
686 infof(dat
[all...]
H A Dtelnet.c284 infof(data, "%s IAC %s\n", direction, CURL_TELCMD(option));
286 infof(data, "%s IAC %d\n", direction, option);
300 infof(data, "%s %s %s\n", direction, fmt, opt);
302 infof(data, "%s %s %d\n", direction, fmt, option);
305 infof(data, "%s %d %d\n", direction, cmd, option);
668 infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT");
676 infof(data, "(terminated by ");
678 infof(data, "%s ", CURL_TELOPT(i));
680 infof(data, "%s ", CURL_TELCMD(i));
682 infof(dat
[all...]
H A Dpolarssl.c81 infof(data, "%s", line);
179 infof(data, "PolarSSL: Connected to %s:%d\n",
206 infof(data, "PolarSSL re-using session\n");
225 infof(data, "WARNING: failed to configure "
229 infof(data, "PolarSSL: performing SSL/TLS handshake...\n");
268 infof(data, "PolarSSL: Handshake complete, cipher is %s\n",
299 infof(data, "Dumping cert info:\n%s\n", buffer);
H A Dsecurity.c326 infof(conn->data, "Send: %s%s\n", prot_level == PROT_PRIVATE?enc:mic,
434 infof(conn->data, "Trying to change the protection level after the"
505 infof(data, "Skipping mechanism with empty name (%p)\n", mech);
519 infof(data, "Failed initialization for %s. Skipping it.\n", mech_name);
524 infof(data, "Trying mechanism %s...\n", mech_name);
533 infof(data, "Mechanism %s is not supported by the server (server "
537 infof(data, "Mechanism %s was rejected by the server (server returned "
542 infof(data, "server does not support the security extensions\n");
H A Dssh.c389 infof(conn->data, "SFTP %p state change from %s to %s\n",
550 infof(data, "SSH host check: %d, key: %s\n", keycheck,
606 infof(data, "Warning adding the known host %s failed!\n",
616 infof(data, "Warning, writing %s failed!\n",
698 infof(data, "Fingerprint: ");
700 infof(data, "%02X ", (unsigned char) fingerprint[rc]);
701 infof(data, "\n");
759 infof(data, "SSH authentication methods available: %s\n",
823 infof(data, "Using ssh public key file %s\n", sshc->rsa_pub);
824 infof(dat
[all...]
H A Dcyassl.c145 infof(data, "error setting certificate verify locations,"
151 infof(data, "successfully set certificate verify locations:\n");
153 infof(data,
212 infof (data, "SSL re-using session ID\n");
234 infof(data, "CyaSSL: Connecting to %s:%d\n",
261 infof(data, "SSL connected");
285 infof(data, "old SSL session ID is stale, removing\n");
H A Dhttp_negotiate.c127 infof(conn->data, "%s", buf);
224 infof(data, "Parse SPNEGO Target Token failed\n");
236 infof(data, "Parse SPNEGO Target Token succeeded\n");
304 infof(conn->data, "Make SPNEGO Initial Token failed\n");
320 infof(conn->data, "Make SPNEGO Initial Token succeeded\n");
H A Dconnect.c272 infof(data, "Local Interface %s is ip %s using address family %i\n",
291 infof(data, "SO_BINDTODEVICE %s failed with errno %d: %s;"
326 infof(data, "Name '%s' family %i resolved to '%s' family %i\n",
394 infof(data, "Local port: %hu\n", port);
400 infof(data, "Bind to local port %hu failed, trying next\n", port);
683 infof(data, "After %ldms connect time, move on!\n",
716 infof(data, "%s\n",Curl_strerror(conn, error));
719 infof(data, "Connection failed\n");
767 infof(data, "Could not set TCP_NODELAY: %s\n",
770 infof(dat
[all...]
H A Dtftp.c270 infof(state->conn->data,
358 infof(data, "got option=(%s) value=(%s)\n", option, value);
389 infof(data, "%s (%d) %s (%d)\n", "blksize parsed from OACK",
396 infof(data, "%s (%ld)\n", "tsize parsed from OACK", tsize);
429 infof(data, "%s\n", "Connected for transmit");
445 infof(data, "%s\n", "Connected for receive");
596 infof(data,
648 infof(data,
719 infof(data, "Received ACK for block %d, expecting %d\n",
777 infof(dat
[all...]
H A Dtransfer.c278 infof(data, "the ioctl callback returned %d\n", (int)err);
334 DEBUGF(infof(conn->data,
354 infof(data,
362 infof(data,
442 DEBUGF(infof(data, "nread <= 0, server closed connection, bailing\n"));
483 infof(data,
490 infof(data,
528 infof(data, "Ignoring the response-body\n");
609 infof(conn->data, "Leftovers after chunking: %zu bytes", dataleft);
613 infof(con
[all...]
H A Dftp.c366 infof(data, "Connection accepted from server\n");
604 infof(conn->data, "FTP %p state change from %s to %s\n",
942 infof(data, "bind(port=%hu) on non-local address failed: %s", port,
1140 infof(conn->data, "Connect data stream passively\n");
1451 infof(data, "File already completely uploaded\n");
1666 infof(data, "Skips %d.%d.%d.%d for data connection, uses %s instead\n",
1690 infof(data, "disabling EPSV usage\n");
1749 infof(data, "got positive EPSV response, but can't connect. "
1849 infof(data, "disabling EPRT usage\n");
1863 infof(dat
[all...]
H A Dldap.c189 infof(data, "LDAP local: LDAP Vendor = %s ; LDAP Version = %d\n",
191 infof(data, "LDAP local: %s\n", data->change.url);
207 infof(data, "LDAP local: trying to establish %s connection\n",
243 infof(data, "LDAP local: using %s CA cert '%s'\n",
286 infof(data, "LDAP local: using PEM CA cert: %s\n", ldap_ca);
458 infof(data, "There are more than %d entries\n", num);
H A Dfile.c151 DEBUGF(infof(data, "RANGE %" FORMAT_OFF_T " to end of file\n",
158 DEBUGF(infof(data, "RANGE the last %" FORMAT_OFF_T " bytes\n",
166 DEBUGF(infof(data, "RANGE from %" FORMAT_OFF_T
170 DEBUGF(infof(data, "range-download from %" FORMAT_OFF_T
H A Dhostip4.c115 infof(conn->data, "Curl_ipv4_resolve_r failed for %s\n", hostname);
H A Dhostip6.c220 infof(data, "getaddrinfo(3) failed for %s:%d\n", hostname, port);
H A Dkrb4.c130 infof(data, "krb4_decode: %s\n", krb_get_err_text(e));
226 infof(data, "%s\n", krb_get_err_text(ret));
238 infof(data, "Can't get address for realm %s\n",
244 infof(data, "Using NAT IP address (%s) for kerberos 4\n", addr_buf);
H A Dhttp.c397 infof(data, "Rewind stream after send\n");
406 infof(data, "NTLM send, close instead of sending %" FORMAT_OFF_T
589 infof(data, "%s auth using %s with user '%s'\n",
748 infof(data, "Authentication problem. Ignoring this.\n");
804 infof(data, "Authentication problem. Ignoring this.\n");
814 infof(data, "Ignoring duplicate digest auth header.\n");
828 infof(data, "Authentication problem. Ignoring this.\n");
843 infof(data, "Authentication problem. Ignoring this.\n");
2583 infof(data, "upload completely sent off: %" FORMAT_OFF_T " out of "
2855 infof(dat
[all...]
H A Dsocks_gssapi.c332 infof(data, "SOCKS5 server authencticated user %s with gssapi.\n",user);
348 infof(data, "SOCKS5 server supports gssapi %s data protection.\n",
520 infof(data, "SOCKS5 access with%s protection granted.\n",
H A Dcookie.c179 with data being NULL. Such as infof() and similar */
312 infof(data, "skipped cookie with illegal dotcount domain: %s\n",
340 infof(data, "skipped cookie with bad tailmatch domain: %s\n",
681 infof(data, "%s cookie %s=\"%s\" for domain %s, path %s, "
1144 infof(data, "WARNING: failed to save cookies in %s\n",

Completed in 252 milliseconds

12