/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/ |
H A D | sendf.h | 35 #define infof(...) Curl_nop_stmt macro 37 #define infof(x...) Curl_nop_stmt macro 39 #define infof (void) macro 44 #define infof Curl_infof macro
|
H A D | axtls.c | 189 infof(data, "error reading ca cert file %s \n", 197 infof(data, "found certificates in %s\n", data->set.ssl.CAfile); 216 infof(data, "successfully read cert file %s \n", 241 infof(data, "successfully read key file %s \n", 265 infof (data, "SSL re-using session ID\n"); 279 infof (data, "handshake completed successfully\n"); 294 infof(data, "\t server certificate verification SKIPPED\n"); 302 infof(data, "error fetching CN from cert\n"); 324 infof (data, "failed to add session to cache\n"); 340 infof(con [all...] |
H A D | curl_gssapi.c | 46 infof(data, "warning: support for CURLGSSAPI_DELEGATION_POLICY_FLAG not "
|
H A D | http_proxy.c | 93 infof(data, "Establish HTTP proxy tunnel to %s:%hu\n", 203 DEBUGF(infof(data, 209 DEBUGF(infof(data, "Easy mode waiting response from proxy CONNECT.")); 310 infof(data, "chunk reading DONE\n"); 314 infof(data, "Read %zd bytes of chunk, continue\n", 365 infof(data, "Ignore %" FORMAT_OFF_T 383 infof(data, "%zd bytes of chunk left\n", gotbytes-i); 398 infof(data, "chunk reading DONE\n"); 402 infof(data, "Read %zd bytes of chunk, continue\n", 439 infof(dat [all...] |
H A D | ssluse.c | 270 infof(data, "libcurl is now using a weak random seed!\n"); 803 infof(data,"set default crypto engine '%s'\n", 909 infof(data, "SSL_ERROR_WANT_READ\n"); 913 infof(data, "SSL_ERROR_WANT_WRITE\n"); 943 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN\n"); 946 infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN\n"); 949 infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|" 1196 infof(data, "\t subjectAltName: %s matched\n", conn->host.dispname); 1200 infof(data, "\t subjectAltName does not match %s\n", conn->host.dispname); 1280 infof(dat [all...] |
H A D | gtls.c | 201 infof(data, "%s", data->state.buffer); 364 infof(data, "Using TLS-SRP username: %s\n", data->set.ssl.username); 395 infof(data, "error reading ca cert file %s (%s)\n", 401 infof(data, "found %d certificates in %s\n", 416 infof(data, "found %d CRL in %s\n", 437 infof(data, "WARNING: failed to configure server name indication (SNI) " 512 infof (data, "SSL re-using session ID\n"); 570 infof(data, "\t common name: WARNING couldn't obtain\n"); 596 infof(data, "\t server certificate verification FAILED\n"); 599 infof(dat [all...] |
H A D | nss.c | 299 infof(data, "warning: certificate file name \"%s\" handled as nickname; " 603 infof(conn->data, "skipping SSL peer certificate verification\n"); 627 infof(conn->data, "Issuer certificate is invalid: '%s'\n", issuer); 630 infof(conn->data, "Certificate is signed by an untrusted issuer: '%s'\n", 640 infof(conn->data, "warning: SSL: certificate subject name '%s' does not " 645 infof(conn->data, "Remote Certificate has expired.\n"); 648 infof(conn->data, "Peer's certificate issuer is not recognized: '%s'\n", 652 infof(conn->data, "Bad certificate received. Subject = '%s', " 657 infof(conn->data, "SSL certificate verify ok.\n"); 686 infof(dat [all...] |
H A D | telnet.c | 284 infof(data, "%s IAC %s\n", direction, CURL_TELCMD(option)); 286 infof(data, "%s IAC %d\n", direction, option); 300 infof(data, "%s %s %s\n", direction, fmt, opt); 302 infof(data, "%s %s %d\n", direction, fmt, option); 305 infof(data, "%s %d %d\n", direction, cmd, option); 668 infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT"); 676 infof(data, "(terminated by "); 678 infof(data, "%s ", CURL_TELOPT(i)); 680 infof(data, "%s ", CURL_TELCMD(i)); 682 infof(dat [all...] |
H A D | polarssl.c | 81 infof(data, "%s", line); 179 infof(data, "PolarSSL: Connected to %s:%d\n", 206 infof(data, "PolarSSL re-using session\n"); 225 infof(data, "WARNING: failed to configure " 229 infof(data, "PolarSSL: performing SSL/TLS handshake...\n"); 268 infof(data, "PolarSSL: Handshake complete, cipher is %s\n", 299 infof(data, "Dumping cert info:\n%s\n", buffer);
|
H A D | security.c | 326 infof(conn->data, "Send: %s%s\n", prot_level == PROT_PRIVATE?enc:mic, 434 infof(conn->data, "Trying to change the protection level after the" 505 infof(data, "Skipping mechanism with empty name (%p)\n", mech); 519 infof(data, "Failed initialization for %s. Skipping it.\n", mech_name); 524 infof(data, "Trying mechanism %s...\n", mech_name); 533 infof(data, "Mechanism %s is not supported by the server (server " 537 infof(data, "Mechanism %s was rejected by the server (server returned " 542 infof(data, "server does not support the security extensions\n");
|
H A D | ssh.c | 389 infof(conn->data, "SFTP %p state change from %s to %s\n", 550 infof(data, "SSH host check: %d, key: %s\n", keycheck, 606 infof(data, "Warning adding the known host %s failed!\n", 616 infof(data, "Warning, writing %s failed!\n", 698 infof(data, "Fingerprint: "); 700 infof(data, "%02X ", (unsigned char) fingerprint[rc]); 701 infof(data, "\n"); 759 infof(data, "SSH authentication methods available: %s\n", 823 infof(data, "Using ssh public key file %s\n", sshc->rsa_pub); 824 infof(dat [all...] |
H A D | cyassl.c | 145 infof(data, "error setting certificate verify locations," 151 infof(data, "successfully set certificate verify locations:\n"); 153 infof(data, 212 infof (data, "SSL re-using session ID\n"); 234 infof(data, "CyaSSL: Connecting to %s:%d\n", 261 infof(data, "SSL connected"); 285 infof(data, "old SSL session ID is stale, removing\n");
|
H A D | http_negotiate.c | 127 infof(conn->data, "%s", buf); 224 infof(data, "Parse SPNEGO Target Token failed\n"); 236 infof(data, "Parse SPNEGO Target Token succeeded\n"); 304 infof(conn->data, "Make SPNEGO Initial Token failed\n"); 320 infof(conn->data, "Make SPNEGO Initial Token succeeded\n");
|
H A D | connect.c | 272 infof(data, "Local Interface %s is ip %s using address family %i\n", 291 infof(data, "SO_BINDTODEVICE %s failed with errno %d: %s;" 326 infof(data, "Name '%s' family %i resolved to '%s' family %i\n", 394 infof(data, "Local port: %hu\n", port); 400 infof(data, "Bind to local port %hu failed, trying next\n", port); 683 infof(data, "After %ldms connect time, move on!\n", 716 infof(data, "%s\n",Curl_strerror(conn, error)); 719 infof(data, "Connection failed\n"); 767 infof(data, "Could not set TCP_NODELAY: %s\n", 770 infof(dat [all...] |
H A D | tftp.c | 270 infof(state->conn->data, 358 infof(data, "got option=(%s) value=(%s)\n", option, value); 389 infof(data, "%s (%d) %s (%d)\n", "blksize parsed from OACK", 396 infof(data, "%s (%ld)\n", "tsize parsed from OACK", tsize); 429 infof(data, "%s\n", "Connected for transmit"); 445 infof(data, "%s\n", "Connected for receive"); 596 infof(data, 648 infof(data, 719 infof(data, "Received ACK for block %d, expecting %d\n", 777 infof(dat [all...] |
H A D | transfer.c | 278 infof(data, "the ioctl callback returned %d\n", (int)err); 334 DEBUGF(infof(conn->data, 354 infof(data, 362 infof(data, 442 DEBUGF(infof(data, "nread <= 0, server closed connection, bailing\n")); 483 infof(data, 490 infof(data, 528 infof(data, "Ignoring the response-body\n"); 609 infof(conn->data, "Leftovers after chunking: %zu bytes", dataleft); 613 infof(con [all...] |
H A D | ftp.c | 366 infof(data, "Connection accepted from server\n"); 604 infof(conn->data, "FTP %p state change from %s to %s\n", 942 infof(data, "bind(port=%hu) on non-local address failed: %s", port, 1140 infof(conn->data, "Connect data stream passively\n"); 1451 infof(data, "File already completely uploaded\n"); 1666 infof(data, "Skips %d.%d.%d.%d for data connection, uses %s instead\n", 1690 infof(data, "disabling EPSV usage\n"); 1749 infof(data, "got positive EPSV response, but can't connect. " 1849 infof(data, "disabling EPRT usage\n"); 1863 infof(dat [all...] |
H A D | ldap.c | 189 infof(data, "LDAP local: LDAP Vendor = %s ; LDAP Version = %d\n", 191 infof(data, "LDAP local: %s\n", data->change.url); 207 infof(data, "LDAP local: trying to establish %s connection\n", 243 infof(data, "LDAP local: using %s CA cert '%s'\n", 286 infof(data, "LDAP local: using PEM CA cert: %s\n", ldap_ca); 458 infof(data, "There are more than %d entries\n", num);
|
H A D | file.c | 151 DEBUGF(infof(data, "RANGE %" FORMAT_OFF_T " to end of file\n", 158 DEBUGF(infof(data, "RANGE the last %" FORMAT_OFF_T " bytes\n", 166 DEBUGF(infof(data, "RANGE from %" FORMAT_OFF_T 170 DEBUGF(infof(data, "range-download from %" FORMAT_OFF_T
|
H A D | hostip4.c | 115 infof(conn->data, "Curl_ipv4_resolve_r failed for %s\n", hostname);
|
H A D | hostip6.c | 220 infof(data, "getaddrinfo(3) failed for %s:%d\n", hostname, port);
|
H A D | krb4.c | 130 infof(data, "krb4_decode: %s\n", krb_get_err_text(e)); 226 infof(data, "%s\n", krb_get_err_text(ret)); 238 infof(data, "Can't get address for realm %s\n", 244 infof(data, "Using NAT IP address (%s) for kerberos 4\n", addr_buf);
|
H A D | http.c | 397 infof(data, "Rewind stream after send\n"); 406 infof(data, "NTLM send, close instead of sending %" FORMAT_OFF_T 589 infof(data, "%s auth using %s with user '%s'\n", 748 infof(data, "Authentication problem. Ignoring this.\n"); 804 infof(data, "Authentication problem. Ignoring this.\n"); 814 infof(data, "Ignoring duplicate digest auth header.\n"); 828 infof(data, "Authentication problem. Ignoring this.\n"); 843 infof(data, "Authentication problem. Ignoring this.\n"); 2583 infof(data, "upload completely sent off: %" FORMAT_OFF_T " out of " 2855 infof(dat [all...] |
H A D | socks_gssapi.c | 332 infof(data, "SOCKS5 server authencticated user %s with gssapi.\n",user); 348 infof(data, "SOCKS5 server supports gssapi %s data protection.\n", 520 infof(data, "SOCKS5 access with%s protection granted.\n",
|
H A D | cookie.c | 179 with data being NULL. Such as infof() and similar */ 312 infof(data, "skipped cookie with illegal dotcount domain: %s\n", 340 infof(data, "skipped cookie with bad tailmatch domain: %s\n", 681 infof(data, "%s cookie %s=\"%s\" for domain %s, path %s, " 1144 infof(data, "WARNING: failed to save cookies in %s\n",
|