mirror of
https://github.com/moparisthebest/curl
synced 2024-12-24 09:08:49 -05:00
infof: remove newline from format strings, always append it
- the data needs to be "line-based" anyway since it's also passed to the debug callback/application - it makes infof() work like failf() and consistency is good - there's an assert that triggers on newlines in the format string - Also removes a few instances of "..." - Removes the code that would append "..." to the end of the data *iff* it was truncated in infof() Closes #7357
This commit is contained in:
parent
1026b36ea0
commit
e7416cfd2b
12
lib/altsvc.c
12
lib/altsvc.c
@ -5,7 +5,7 @@
|
||||
* | (__| |_| | _ <| |___
|
||||
* \___|\___/|_| \_\_____|
|
||||
*
|
||||
* Copyright (C) 2019 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
* Copyright (C) 2019 - 2021, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
*
|
||||
* This software is licensed as described in the file COPYING, which
|
||||
* you should have received as part of this distribution. The terms
|
||||
@ -460,7 +460,7 @@ CURLcode Curl_altsvc_parse(struct Curl_easy *data,
|
||||
(void)data;
|
||||
#endif
|
||||
if(result) {
|
||||
infof(data, "Excessive alt-svc header, ignoring...\n");
|
||||
infof(data, "Excessive alt-svc header, ignoring.");
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
@ -496,7 +496,7 @@ CURLcode Curl_altsvc_parse(struct Curl_easy *data,
|
||||
p++;
|
||||
len = p - hostp;
|
||||
if(!len || (len >= MAX_ALTSVC_HOSTLEN)) {
|
||||
infof(data, "Excessive alt-svc host name, ignoring...\n");
|
||||
infof(data, "Excessive alt-svc host name, ignoring.");
|
||||
dstalpnid = ALPN_none;
|
||||
}
|
||||
else {
|
||||
@ -513,7 +513,7 @@ CURLcode Curl_altsvc_parse(struct Curl_easy *data,
|
||||
/* a port number */
|
||||
unsigned long port = strtoul(++p, &end_ptr, 10);
|
||||
if(port > USHRT_MAX || end_ptr == p || *end_ptr != '\"') {
|
||||
infof(data, "Unknown alt-svc port number, ignoring...\n");
|
||||
infof(data, "Unknown alt-svc port number, ignoring.");
|
||||
dstalpnid = ALPN_none;
|
||||
}
|
||||
p = end_ptr;
|
||||
@ -579,12 +579,12 @@ CURLcode Curl_altsvc_parse(struct Curl_easy *data,
|
||||
as->expires = maxage + time(NULL);
|
||||
as->persist = persist;
|
||||
Curl_llist_insert_next(&asi->list, asi->list.tail, as, &as->node);
|
||||
infof(data, "Added alt-svc: %s:%d over %s\n", dsthost, dstport,
|
||||
infof(data, "Added alt-svc: %s:%d over %s", dsthost, dstport,
|
||||
Curl_alpnid2str(dstalpnid));
|
||||
}
|
||||
}
|
||||
else {
|
||||
infof(data, "Unknown alt-svc protocol \"%s\", skipping...\n",
|
||||
infof(data, "Unknown alt-svc protocol \"%s\", skipping.",
|
||||
alpnbuf);
|
||||
}
|
||||
}
|
||||
|
@ -187,7 +187,7 @@ static int hyper_body_chunk(void *userdata, const hyper_buf *chunk)
|
||||
(conn->http_ntlm_state == NTLMSTATE_TYPE2)) ||
|
||||
((data->req.httpcode == 407) &&
|
||||
(conn->proxy_ntlm_state == NTLMSTATE_TYPE2)))) {
|
||||
infof(data, "Connection closed while negotiating NTLM\n");
|
||||
infof(data, "Connection closed while negotiating NTLM");
|
||||
data->state.authproblem = TRUE;
|
||||
Curl_safefree(data->req.newurl);
|
||||
}
|
||||
@ -200,7 +200,7 @@ static int hyper_body_chunk(void *userdata, const hyper_buf *chunk)
|
||||
else
|
||||
result = Curl_http_firstwrite(data, data->conn, &done);
|
||||
if(result || done) {
|
||||
infof(data, "Return early from hyper_body_chunk\n");
|
||||
infof(data, "Return early from hyper_body_chunk");
|
||||
data->state.hresult = result;
|
||||
return HYPER_ITER_BREAK;
|
||||
}
|
||||
@ -345,7 +345,7 @@ CURLcode Curl_hyper_stream(struct Curl_easy *data,
|
||||
if(errnum == HYPERE_ABORTED_BY_CALLBACK) {
|
||||
/* override Hyper's view, might not even be an error */
|
||||
result = data->state.hresult;
|
||||
infof(data, "hyperstream is done (by early callback)\n");
|
||||
infof(data, "hyperstream is done (by early callback)");
|
||||
}
|
||||
else {
|
||||
uint8_t errbuf[256];
|
||||
@ -366,7 +366,7 @@ CURLcode Curl_hyper_stream(struct Curl_easy *data,
|
||||
else if(h->endtask == task) {
|
||||
/* end of transfer */
|
||||
*done = TRUE;
|
||||
infof(data, "hyperstream is done!\n");
|
||||
infof(data, "hyperstream is done!");
|
||||
break;
|
||||
}
|
||||
else if(t != HYPER_TASK_RESPONSE) {
|
||||
@ -707,7 +707,7 @@ CURLcode Curl_http(struct Curl_easy *data, bool *done)
|
||||
the rest of the request in the PERFORM phase. */
|
||||
*done = TRUE;
|
||||
|
||||
infof(data, "Time for the Hyper dance\n");
|
||||
infof(data, "Time for the Hyper dance");
|
||||
memset(h, 0, sizeof(struct hyptransfer));
|
||||
|
||||
result = Curl_http_host(data, conn);
|
||||
|
@ -266,7 +266,7 @@ CURLcode Curl_conncache_add_conn(struct Curl_easy *data)
|
||||
connc->num_conn++;
|
||||
|
||||
DEBUGF(infof(data, "Added connection %ld. "
|
||||
"The cache now contains %zu members\n",
|
||||
"The cache now contains %zu members",
|
||||
conn->connection_id, connc->num_conn));
|
||||
|
||||
unlock:
|
||||
@ -300,7 +300,7 @@ void Curl_conncache_remove_conn(struct Curl_easy *data,
|
||||
conn->bundle = NULL; /* removed from it */
|
||||
if(connc) {
|
||||
connc->num_conn--;
|
||||
DEBUGF(infof(data, "The cache now contains %zu members\n",
|
||||
DEBUGF(infof(data, "The cache now contains %zu members",
|
||||
connc->num_conn));
|
||||
}
|
||||
if(lock) {
|
||||
@ -410,7 +410,7 @@ bool Curl_conncache_return_conn(struct Curl_easy *data,
|
||||
conn->lastused = Curl_now(); /* it was used up until now */
|
||||
if(maxconnects > 0 &&
|
||||
Curl_conncache_size(data) > maxconnects) {
|
||||
infof(data, "Connection cache is full, closing the oldest one.\n");
|
||||
infof(data, "Connection cache is full, closing the oldest one");
|
||||
|
||||
conn_candidate = Curl_conncache_extract_oldest(data);
|
||||
if(conn_candidate) {
|
||||
@ -466,7 +466,7 @@ Curl_conncache_extract_bundle(struct Curl_easy *data,
|
||||
/* remove it to prevent another thread from nicking it */
|
||||
bundle_remove_conn(bundle, conn_candidate);
|
||||
data->state.conn_cache->num_conn--;
|
||||
DEBUGF(infof(data, "The cache now contains %zu members\n",
|
||||
DEBUGF(infof(data, "The cache now contains %zu members",
|
||||
data->state.conn_cache->num_conn));
|
||||
}
|
||||
|
||||
@ -528,7 +528,7 @@ Curl_conncache_extract_oldest(struct Curl_easy *data)
|
||||
/* remove it to prevent another thread from nicking it */
|
||||
bundle_remove_conn(bundle_candidate, conn_candidate);
|
||||
connc->num_conn--;
|
||||
DEBUGF(infof(data, "The cache now contains %zu members\n",
|
||||
DEBUGF(infof(data, "The cache now contains %zu members",
|
||||
connc->num_conn));
|
||||
}
|
||||
CONNCACHE_UNLOCK(data);
|
||||
|
@ -111,7 +111,7 @@ tcpkeepalive(struct Curl_easy *data,
|
||||
/* only set IDLE and INTVL if setting KEEPALIVE is successful */
|
||||
if(setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE,
|
||||
(void *)&optval, sizeof(optval)) < 0) {
|
||||
infof(data, "Failed to set SO_KEEPALIVE on fd %d\n", sockfd);
|
||||
infof(data, "Failed to set SO_KEEPALIVE on fd %d", sockfd);
|
||||
}
|
||||
else {
|
||||
#if defined(SIO_KEEPALIVE_VALS)
|
||||
@ -126,7 +126,7 @@ tcpkeepalive(struct Curl_easy *data,
|
||||
vals.keepaliveinterval = optval;
|
||||
if(WSAIoctl(sockfd, SIO_KEEPALIVE_VALS, (LPVOID) &vals, sizeof(vals),
|
||||
NULL, 0, &dummy, NULL, NULL) != 0) {
|
||||
infof(data, "Failed to set SIO_KEEPALIVE_VALS on fd %d: %d\n",
|
||||
infof(data, "Failed to set SIO_KEEPALIVE_VALS on fd %d: %d",
|
||||
(int)sockfd, WSAGetLastError());
|
||||
}
|
||||
#else
|
||||
@ -135,7 +135,7 @@ tcpkeepalive(struct Curl_easy *data,
|
||||
KEEPALIVE_FACTOR(optval);
|
||||
if(setsockopt(sockfd, IPPROTO_TCP, TCP_KEEPIDLE,
|
||||
(void *)&optval, sizeof(optval)) < 0) {
|
||||
infof(data, "Failed to set TCP_KEEPIDLE on fd %d\n", sockfd);
|
||||
infof(data, "Failed to set TCP_KEEPIDLE on fd %d", sockfd);
|
||||
}
|
||||
#endif
|
||||
#ifdef TCP_KEEPINTVL
|
||||
@ -143,7 +143,7 @@ tcpkeepalive(struct Curl_easy *data,
|
||||
KEEPALIVE_FACTOR(optval);
|
||||
if(setsockopt(sockfd, IPPROTO_TCP, TCP_KEEPINTVL,
|
||||
(void *)&optval, sizeof(optval)) < 0) {
|
||||
infof(data, "Failed to set TCP_KEEPINTVL on fd %d\n", sockfd);
|
||||
infof(data, "Failed to set TCP_KEEPINTVL on fd %d", sockfd);
|
||||
}
|
||||
#endif
|
||||
#ifdef TCP_KEEPALIVE
|
||||
@ -152,7 +152,7 @@ tcpkeepalive(struct Curl_easy *data,
|
||||
KEEPALIVE_FACTOR(optval);
|
||||
if(setsockopt(sockfd, IPPROTO_TCP, TCP_KEEPALIVE,
|
||||
(void *)&optval, sizeof(optval)) < 0) {
|
||||
infof(data, "Failed to set TCP_KEEPALIVE on fd %d\n", sockfd);
|
||||
infof(data, "Failed to set TCP_KEEPALIVE on fd %d", sockfd);
|
||||
}
|
||||
#endif
|
||||
#endif
|
||||
@ -331,7 +331,7 @@ static CURLcode bindlocal(struct Curl_easy *data,
|
||||
/*
|
||||
* We now have the numerical IP address in the 'myhost' buffer
|
||||
*/
|
||||
infof(data, "Local Interface %s is ip %s using address family %i\n",
|
||||
infof(data, "Local Interface %s is ip %s using address family %i",
|
||||
dev, myhost, af);
|
||||
done = 1;
|
||||
break;
|
||||
@ -364,7 +364,7 @@ static CURLcode bindlocal(struct Curl_easy *data,
|
||||
if(h) {
|
||||
/* convert the resolved address, sizeof myhost >= INET_ADDRSTRLEN */
|
||||
Curl_printable_address(h->addr, myhost, sizeof(myhost));
|
||||
infof(data, "Name '%s' family %i resolved to '%s' family %i\n",
|
||||
infof(data, "Name '%s' family %i resolved to '%s' family %i",
|
||||
dev, af, myhost, h->addr->ai_family);
|
||||
Curl_resolv_unlock(data, h);
|
||||
if(af != h->addr->ai_family) {
|
||||
@ -458,13 +458,13 @@ static CURLcode bindlocal(struct Curl_easy *data,
|
||||
error, Curl_strerror(error, buffer, sizeof(buffer)));
|
||||
return CURLE_INTERFACE_FAILED;
|
||||
}
|
||||
infof(data, "Local port: %hu\n", port);
|
||||
infof(data, "Local port: %hu", port);
|
||||
conn->bits.bound = TRUE;
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
if(--portnum > 0) {
|
||||
infof(data, "Bind to local port %hu failed, trying next\n", port);
|
||||
infof(data, "Bind to local port %hu failed, trying next", port);
|
||||
port++; /* try next port */
|
||||
/* We re-use/clobber the port variable here below */
|
||||
if(sock->sa_family == AF_INET)
|
||||
@ -921,7 +921,7 @@ CURLcode Curl_is_connected(struct Curl_easy *data,
|
||||
if(Curl_timediff(now, conn->connecttime) >=
|
||||
conn->timeoutms_per_addr[i]) {
|
||||
infof(data, "After %" CURL_FORMAT_TIMEDIFF_T
|
||||
"ms connect time, move on!\n", conn->timeoutms_per_addr[i]);
|
||||
"ms connect time, move on!", conn->timeoutms_per_addr[i]);
|
||||
error = ETIMEDOUT;
|
||||
}
|
||||
|
||||
@ -980,7 +980,7 @@ CURLcode Curl_is_connected(struct Curl_easy *data,
|
||||
char buffer[STRERROR_LEN];
|
||||
Curl_printable_address(conn->tempaddr[i], ipaddress,
|
||||
sizeof(ipaddress));
|
||||
infof(data, "connect to %s port %u failed: %s\n",
|
||||
infof(data, "connect to %s port %u failed: %s",
|
||||
ipaddress, conn->port,
|
||||
Curl_strerror(error, buffer, sizeof(buffer)));
|
||||
#endif
|
||||
@ -1073,7 +1073,7 @@ static void tcpnodelay(struct Curl_easy *data, curl_socket_t sockfd)
|
||||
|
||||
if(setsockopt(sockfd, level, TCP_NODELAY, (void *)&onoff,
|
||||
sizeof(onoff)) < 0)
|
||||
infof(data, "Could not set TCP_NODELAY: %s\n",
|
||||
infof(data, "Could not set TCP_NODELAY: %s",
|
||||
Curl_strerror(SOCKERRNO, buffer, sizeof(buffer)));
|
||||
#else
|
||||
(void)data;
|
||||
@ -1093,7 +1093,7 @@ static void nosigpipe(struct Curl_easy *data,
|
||||
if(setsockopt(sockfd, SOL_SOCKET, SO_NOSIGPIPE, (void *)&onoff,
|
||||
sizeof(onoff)) < 0) {
|
||||
char buffer[STRERROR_LEN];
|
||||
infof(data, "Could not set SO_NOSIGPIPE: %s\n",
|
||||
infof(data, "Could not set SO_NOSIGPIPE: %s",
|
||||
Curl_strerror(SOCKERRNO, buffer, sizeof(buffer)));
|
||||
}
|
||||
}
|
||||
@ -1188,7 +1188,7 @@ static CURLcode singleipconnect(struct Curl_easy *data,
|
||||
Curl_closesocket(data, conn, sockfd);
|
||||
return CURLE_OK;
|
||||
}
|
||||
infof(data, " Trying %s:%d...\n", ipaddress, port);
|
||||
infof(data, " Trying %s:%d...", ipaddress, port);
|
||||
|
||||
#ifdef ENABLE_IPV6
|
||||
is_tcp = (addr.family == AF_INET || addr.family == AF_INET6) &&
|
||||
@ -1279,7 +1279,7 @@ static CURLcode singleipconnect(struct Curl_easy *data,
|
||||
#elif defined(TCP_FASTOPEN_CONNECT) /* Linux >= 4.11 */
|
||||
if(setsockopt(sockfd, IPPROTO_TCP, TCP_FASTOPEN_CONNECT,
|
||||
(void *)&optval, sizeof(optval)) < 0)
|
||||
infof(data, "Failed to enable TCP Fast Open on fd %d\n", sockfd);
|
||||
infof(data, "Failed to enable TCP Fast Open on fd %d", sockfd);
|
||||
|
||||
rc = connect(sockfd, &addr.sa_addr, addr.addrlen);
|
||||
#elif defined(MSG_FASTOPEN) /* old Linux */
|
||||
@ -1329,7 +1329,7 @@ static CURLcode singleipconnect(struct Curl_easy *data,
|
||||
|
||||
default:
|
||||
/* unknown error, fallthrough and try another address! */
|
||||
infof(data, "Immediate connect fail for %s: %s\n",
|
||||
infof(data, "Immediate connect fail for %s: %s",
|
||||
ipaddress, Curl_strerror(error, buffer, sizeof(buffer)));
|
||||
data->state.os_errno = error;
|
||||
|
||||
@ -1402,7 +1402,7 @@ CURLcode Curl_connecthost(struct Curl_easy *data,
|
||||
|
||||
ainext(conn, 1, FALSE); /* assigns conn->tempaddr[1] accordingly */
|
||||
|
||||
DEBUGF(infof(data, "family0 == %s, family1 == %s\n",
|
||||
DEBUGF(infof(data, "family0 == %s, family1 == %s",
|
||||
conn->tempfamily[0] == AF_INET ? "v4" : "v6",
|
||||
conn->tempfamily[1] == AF_INET ? "v4" : "v6"));
|
||||
|
||||
|
12
lib/cookie.c
12
lib/cookie.c
@ -340,7 +340,7 @@ void Curl_cookie_loadfiles(struct Curl_easy *data)
|
||||
* Failure may be due to OOM or a bad cookie; both are ignored
|
||||
* but only the first should be
|
||||
*/
|
||||
infof(data, "ignoring failed cookie_init for %s\n", list->data);
|
||||
infof(data, "ignoring failed cookie_init for %s", list->data);
|
||||
else
|
||||
data->cookies = newcookies;
|
||||
list = list->next;
|
||||
@ -520,7 +520,7 @@ Curl_cookie_add(struct Curl_easy *data,
|
||||
if(nlen >= (MAX_NAME-1) || len >= (MAX_NAME-1) ||
|
||||
((nlen + len) > MAX_NAME)) {
|
||||
freecookie(co);
|
||||
infof(data, "oversized cookie dropped, name/val %zu + %zu bytes\n",
|
||||
infof(data, "oversized cookie dropped, name/val %zu + %zu bytes",
|
||||
nlen, len);
|
||||
return NULL;
|
||||
}
|
||||
@ -661,7 +661,7 @@ Curl_cookie_add(struct Curl_easy *data,
|
||||
* not a domain to which the current host belongs. Mark as bad.
|
||||
*/
|
||||
badcookie = TRUE;
|
||||
infof(data, "skipped cookie with bad tailmatch domain: %s\n",
|
||||
infof(data, "skipped cookie with bad tailmatch domain: %s",
|
||||
whatptr);
|
||||
}
|
||||
}
|
||||
@ -1005,7 +1005,7 @@ Curl_cookie_add(struct Curl_easy *data,
|
||||
|
||||
if(!acceptable) {
|
||||
infof(data, "cookie '%s' dropped, domain '%s' must not "
|
||||
"set cookies for '%s'\n", co->name, domain, co->domain);
|
||||
"set cookies for '%s'", co->name, domain, co->domain);
|
||||
freecookie(co);
|
||||
return NULL;
|
||||
}
|
||||
@ -1117,7 +1117,7 @@ Curl_cookie_add(struct Curl_easy *data,
|
||||
if(c->running)
|
||||
/* Only show this when NOT reading the cookies from a file */
|
||||
infof(data, "%s cookie %s=\"%s\" for domain %s, path %s, "
|
||||
"expire %" CURL_FORMAT_CURL_OFF_T "\n",
|
||||
"expire %" CURL_FORMAT_CURL_OFF_T,
|
||||
replace_old?"Replaced":"Added", co->name, co->value,
|
||||
co->domain, co->path, co->expires);
|
||||
|
||||
@ -1743,7 +1743,7 @@ void Curl_flush_cookies(struct Curl_easy *data, bool cleanup)
|
||||
/* if we have a destination file for all the cookies to get dumped to */
|
||||
res = cookie_output(data, data->cookies, data->set.str[STRING_COOKIEJAR]);
|
||||
if(res)
|
||||
infof(data, "WARNING: failed to save cookies in %s: %s\n",
|
||||
infof(data, "WARNING: failed to save cookies in %s: %s",
|
||||
data->set.str[STRING_COOKIEJAR], curl_easy_strerror(res));
|
||||
}
|
||||
else {
|
||||
|
@ -59,7 +59,7 @@ OM_uint32 Curl_gss_init_sec_context(
|
||||
req_flags |= GSS_C_DELEG_POLICY_FLAG;
|
||||
#else
|
||||
infof(data, "warning: support for CURLGSSAPI_DELEGATION_POLICY_FLAG not "
|
||||
"compiled in\n");
|
||||
"compiled in");
|
||||
#endif
|
||||
}
|
||||
|
||||
@ -130,7 +130,7 @@ void Curl_gss_log_error(struct Curl_easy *data, const char *prefix,
|
||||
|
||||
display_gss_error(minor, GSS_C_MECH_CODE, buf, len);
|
||||
|
||||
infof(data, "%s%s\n", prefix, buf);
|
||||
infof(data, "%s%s", prefix, buf);
|
||||
#ifdef CURL_DISABLE_VERBOSE_STRINGS
|
||||
(void)data;
|
||||
(void)prefix;
|
||||
|
@ -355,17 +355,17 @@ CURLcode Curl_input_ntlm_wb(struct Curl_easy *data,
|
||||
}
|
||||
else {
|
||||
if(*state == NTLMSTATE_LAST) {
|
||||
infof(data, "NTLM auth restarted\n");
|
||||
infof(data, "NTLM auth restarted");
|
||||
Curl_http_auth_cleanup_ntlm_wb(conn);
|
||||
}
|
||||
else if(*state == NTLMSTATE_TYPE3) {
|
||||
infof(data, "NTLM handshake rejected\n");
|
||||
infof(data, "NTLM handshake rejected");
|
||||
Curl_http_auth_cleanup_ntlm_wb(conn);
|
||||
*state = NTLMSTATE_NONE;
|
||||
return CURLE_REMOTE_ACCESS_DENIED;
|
||||
}
|
||||
else if(*state >= NTLMSTATE_TYPE1) {
|
||||
infof(data, "NTLM handshake failure (internal error)\n");
|
||||
infof(data, "NTLM handshake failure (internal error)");
|
||||
return CURLE_REMOTE_ACCESS_DENIED;
|
||||
}
|
||||
|
||||
|
@ -53,14 +53,14 @@ CURLcode Curl_range(struct Curl_easy *data)
|
||||
if((to_t == CURL_OFFT_INVAL) && !from_t) {
|
||||
/* X - */
|
||||
data->state.resume_from = from;
|
||||
DEBUGF(infof(data, "RANGE %" CURL_FORMAT_CURL_OFF_T " to end of file\n",
|
||||
DEBUGF(infof(data, "RANGE %" CURL_FORMAT_CURL_OFF_T " to end of file",
|
||||
from));
|
||||
}
|
||||
else if((from_t == CURL_OFFT_INVAL) && !to_t) {
|
||||
/* -Y */
|
||||
data->req.maxdownload = to;
|
||||
data->state.resume_from = -to;
|
||||
DEBUGF(infof(data, "RANGE the last %" CURL_FORMAT_CURL_OFF_T " bytes\n",
|
||||
DEBUGF(infof(data, "RANGE the last %" CURL_FORMAT_CURL_OFF_T " bytes",
|
||||
to));
|
||||
}
|
||||
else {
|
||||
@ -78,12 +78,12 @@ CURLcode Curl_range(struct Curl_easy *data)
|
||||
data->req.maxdownload = totalsize + 1; /* include last byte */
|
||||
data->state.resume_from = from;
|
||||
DEBUGF(infof(data, "RANGE from %" CURL_FORMAT_CURL_OFF_T
|
||||
" getting %" CURL_FORMAT_CURL_OFF_T " bytes\n",
|
||||
" getting %" CURL_FORMAT_CURL_OFF_T " bytes",
|
||||
from, data->req.maxdownload));
|
||||
}
|
||||
DEBUGF(infof(data, "range-download from %" CURL_FORMAT_CURL_OFF_T
|
||||
" to %" CURL_FORMAT_CURL_OFF_T ", totally %"
|
||||
CURL_FORMAT_CURL_OFF_T " bytes\n",
|
||||
CURL_FORMAT_CURL_OFF_T " bytes",
|
||||
from, to, data->req.maxdownload));
|
||||
}
|
||||
else
|
||||
|
@ -234,7 +234,7 @@ static void state(struct SASL *sasl, struct Curl_easy *data,
|
||||
};
|
||||
|
||||
if(sasl->state != newstate)
|
||||
infof(data, "SASL %p state change from %s to %s\n",
|
||||
infof(data, "SASL %p state change from %s to %s",
|
||||
(void *)sasl, names[sasl->state], names[newstate]);
|
||||
#else
|
||||
(void) data;
|
||||
|
@ -216,7 +216,7 @@ static CURLcode dict_do(struct Curl_easy *data, bool *done)
|
||||
}
|
||||
|
||||
if(!word || (*word == (char)0)) {
|
||||
infof(data, "lookup word is missing\n");
|
||||
infof(data, "lookup word is missing");
|
||||
word = (char *)"default";
|
||||
}
|
||||
if(!database || (*database == (char)0)) {
|
||||
@ -267,7 +267,7 @@ static CURLcode dict_do(struct Curl_easy *data, bool *done)
|
||||
}
|
||||
|
||||
if(!word || (*word == (char)0)) {
|
||||
infof(data, "lookup word is missing\n");
|
||||
infof(data, "lookup word is missing");
|
||||
word = (char *)"default";
|
||||
}
|
||||
if(!database || (*database == (char)0)) {
|
||||
|
16
lib/doh.c
16
lib/doh.c
@ -193,9 +193,9 @@ static int doh_done(struct Curl_easy *doh, CURLcode result)
|
||||
struct dohdata *dohp = data->req.doh;
|
||||
/* so one of the DOH request done for the 'data' transfer is now complete! */
|
||||
dohp->pending--;
|
||||
infof(data, "a DOH request is completed, %u to go\n", dohp->pending);
|
||||
infof(data, "a DOH request is completed, %u to go", dohp->pending);
|
||||
if(result)
|
||||
infof(data, "DOH request %s\n", curl_easy_strerror(result));
|
||||
infof(data, "DOH request %s", curl_easy_strerror(result));
|
||||
|
||||
if(!dohp->pending) {
|
||||
/* DOH completed */
|
||||
@ -764,11 +764,11 @@ static void showdoh(struct Curl_easy *data,
|
||||
const struct dohentry *d)
|
||||
{
|
||||
int i;
|
||||
infof(data, "TTL: %u seconds\n", d->ttl);
|
||||
infof(data, "TTL: %u seconds", d->ttl);
|
||||
for(i = 0; i < d->numaddr; i++) {
|
||||
const struct dohaddr *a = &d->addr[i];
|
||||
if(a->type == DNS_TYPE_A) {
|
||||
infof(data, "DOH A: %u.%u.%u.%u\n",
|
||||
infof(data, "DOH A: %u.%u.%u.%u",
|
||||
a->ip.v4[0], a->ip.v4[1],
|
||||
a->ip.v4[2], a->ip.v4[3]);
|
||||
}
|
||||
@ -788,11 +788,11 @@ static void showdoh(struct Curl_easy *data,
|
||||
len -= l;
|
||||
ptr += l;
|
||||
}
|
||||
infof(data, "%s\n", buffer);
|
||||
infof(data, "%s", buffer);
|
||||
}
|
||||
}
|
||||
for(i = 0; i < d->numcname; i++) {
|
||||
infof(data, "CNAME: %s\n", Curl_dyn_ptr(&d->cname[i]));
|
||||
infof(data, "CNAME: %s", Curl_dyn_ptr(&d->cname[i]));
|
||||
}
|
||||
}
|
||||
#else
|
||||
@ -958,7 +958,7 @@ CURLcode Curl_doh_is_resolved(struct Curl_easy *data,
|
||||
&de);
|
||||
Curl_dyn_free(&p->serverdoh);
|
||||
if(rc[slot]) {
|
||||
infof(data, "DOH: %s type %s for %s\n", doh_strerror(rc[slot]),
|
||||
infof(data, "DOH: %s type %s for %s", doh_strerror(rc[slot]),
|
||||
type2name(p->dnstype), dohp->host);
|
||||
}
|
||||
} /* next slot */
|
||||
@ -969,7 +969,7 @@ CURLcode Curl_doh_is_resolved(struct Curl_easy *data,
|
||||
struct Curl_dns_entry *dns;
|
||||
struct Curl_addrinfo *ai;
|
||||
|
||||
infof(data, "DOH Host name: %s\n", dohp->host);
|
||||
infof(data, "DOH Host name: %s", dohp->host);
|
||||
showdoh(data, &de);
|
||||
|
||||
ai = doh2ai(&de, dohp->host, dohp->port);
|
||||
|
10
lib/easy.c
10
lib/easy.c
@ -417,13 +417,13 @@ static int events_socket(struct Curl_easy *easy, /* easy handle */
|
||||
ev->list = nxt;
|
||||
free(m);
|
||||
m = nxt;
|
||||
infof(easy, "socket cb: socket %d REMOVED\n", s);
|
||||
infof(easy, "socket cb: socket %d REMOVED", s);
|
||||
}
|
||||
else {
|
||||
/* The socket 's' is already being monitored, update the activity
|
||||
mask. Convert from libcurl bitmask to the poll one. */
|
||||
m->socket.events = socketcb2poll(what);
|
||||
infof(easy, "socket cb: socket %d UPDATED as %s%s\n", s,
|
||||
infof(easy, "socket cb: socket %d UPDATED as %s%s", s,
|
||||
(what&CURL_POLL_IN)?"IN":"",
|
||||
(what&CURL_POLL_OUT)?"OUT":"");
|
||||
}
|
||||
@ -447,7 +447,7 @@ static int events_socket(struct Curl_easy *easy, /* easy handle */
|
||||
m->socket.events = socketcb2poll(what);
|
||||
m->socket.revents = 0;
|
||||
ev->list = m;
|
||||
infof(easy, "socket cb: socket %d ADDED as %s%s\n", s,
|
||||
infof(easy, "socket cb: socket %d ADDED as %s%s", s,
|
||||
(what&CURL_POLL_IN)?"IN":"",
|
||||
(what&CURL_POLL_OUT)?"OUT":"");
|
||||
}
|
||||
@ -532,7 +532,7 @@ static CURLcode wait_or_timeout(struct Curl_multi *multi, struct events *ev)
|
||||
if(fds[i].revents) {
|
||||
/* socket activity, tell libcurl */
|
||||
int act = poll2cselect(fds[i].revents); /* convert */
|
||||
infof(multi->easyp, "call curl_multi_socket_action(socket %d)\n",
|
||||
infof(multi->easyp, "call curl_multi_socket_action(socket %d)",
|
||||
fds[i].fd);
|
||||
mcode = curl_multi_socket_action(multi, fds[i].fd, act,
|
||||
&ev->running_handles);
|
||||
@ -1027,7 +1027,7 @@ CURLcode curl_easy_pause(struct Curl_easy *data, int action)
|
||||
|
||||
if((newstate & (KEEP_RECV_PAUSE| KEEP_SEND_PAUSE)) == oldstate) {
|
||||
/* Not changing any pause state, return */
|
||||
DEBUGF(infof(data, "pause: no change, early return\n"));
|
||||
DEBUGF(infof(data, "pause: no change, early return"));
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
|
100
lib/ftp.c
100
lib/ftp.c
@ -289,7 +289,7 @@ static CURLcode AcceptServerConnect(struct Curl_easy *data)
|
||||
failf(data, "Error accept()ing server connect");
|
||||
return CURLE_FTP_PORT_FAILED;
|
||||
}
|
||||
infof(data, "Connection accepted from server\n");
|
||||
infof(data, "Connection accepted from server");
|
||||
/* when this happens within the DO state it is important that we mark us as
|
||||
not needing DO_MORE anymore */
|
||||
conn->bits.do_more = FALSE;
|
||||
@ -380,7 +380,7 @@ static CURLcode ReceivedServerConnect(struct Curl_easy *data, bool *received)
|
||||
*received = FALSE;
|
||||
|
||||
timeout_ms = ftp_timeleft_accept(data);
|
||||
infof(data, "Checking for server connect\n");
|
||||
infof(data, "Checking for server connect");
|
||||
if(timeout_ms < 0) {
|
||||
/* if a timeout was already reached, bail out */
|
||||
failf(data, "Accept timeout occurred while waiting server connect");
|
||||
@ -390,7 +390,7 @@ static CURLcode ReceivedServerConnect(struct Curl_easy *data, bool *received)
|
||||
/* First check whether there is a cached response from server */
|
||||
if(pp->cache_size && pp->cache && pp->cache[0] > '3') {
|
||||
/* Data connection could not be established, let's return */
|
||||
infof(data, "There is negative response in cache while serv connect\n");
|
||||
infof(data, "There is negative response in cache while serv connect");
|
||||
(void)Curl_GetFTPResponse(data, &nread, &ftpcode);
|
||||
return CURLE_FTP_ACCEPT_FAILED;
|
||||
}
|
||||
@ -408,11 +408,11 @@ static CURLcode ReceivedServerConnect(struct Curl_easy *data, bool *received)
|
||||
default:
|
||||
|
||||
if(result & CURL_CSELECT_IN2) {
|
||||
infof(data, "Ready to accept data connection from server\n");
|
||||
infof(data, "Ready to accept data connection from server");
|
||||
*received = TRUE;
|
||||
}
|
||||
else if(result & CURL_CSELECT_IN) {
|
||||
infof(data, "Ctrl conn has data while waiting for data conn\n");
|
||||
infof(data, "Ctrl conn has data while waiting for data conn");
|
||||
(void)Curl_GetFTPResponse(data, &nread, &ftpcode);
|
||||
|
||||
if(ftpcode/100 > 3)
|
||||
@ -444,7 +444,7 @@ static CURLcode InitiateTransfer(struct Curl_easy *data)
|
||||
if(conn->bits.ftp_use_data_ssl) {
|
||||
/* since we only have a plaintext TCP connection here, we must now
|
||||
* do the TLS stuff */
|
||||
infof(data, "Doing the SSL/TLS handshake on the data stream\n");
|
||||
infof(data, "Doing the SSL/TLS handshake on the data stream");
|
||||
result = Curl_ssl_connect(data, conn, SECONDARYSOCKET);
|
||||
if(result)
|
||||
return result;
|
||||
@ -487,7 +487,7 @@ static CURLcode AllowServerConnect(struct Curl_easy *data, bool *connected)
|
||||
CURLcode result = CURLE_OK;
|
||||
|
||||
*connected = FALSE;
|
||||
infof(data, "Preparing for accepting server on data port\n");
|
||||
infof(data, "Preparing for accepting server on data port");
|
||||
|
||||
/* Save the time we start accepting server connect */
|
||||
Curl_pgrsTime(data, TIMER_STARTACCEPT);
|
||||
@ -592,7 +592,7 @@ static CURLcode ftp_readresp(struct Curl_easy *data,
|
||||
* This response code can come at any point so having it treated
|
||||
* generically is a good idea.
|
||||
*/
|
||||
infof(data, "We got a 421 - timeout!\n");
|
||||
infof(data, "We got a 421 - timeout!");
|
||||
state(data, FTP_STOP);
|
||||
return CURLE_OPERATION_TIMEDOUT;
|
||||
}
|
||||
@ -768,7 +768,7 @@ static void _state(struct Curl_easy *data,
|
||||
(void) lineno;
|
||||
#else
|
||||
if(ftpc->state != newstate)
|
||||
infof(data, "FTP %p (line %d) state change from %s to %s\n",
|
||||
infof(data, "FTP %p (line %d) state change from %s to %s",
|
||||
(void *)ftpc, lineno, ftp_state_names[ftpc->state],
|
||||
ftp_state_names[newstate]);
|
||||
#endif
|
||||
@ -1139,7 +1139,7 @@ static CURLcode ftp_state_use_port(struct Curl_easy *data,
|
||||
/* The requested bind address is not local. Use the address used for
|
||||
* the control connection instead and restart the port loop
|
||||
*/
|
||||
infof(data, "bind(port=%hu) on non-local address failed: %s\n", port,
|
||||
infof(data, "bind(port=%hu) on non-local address failed: %s", port,
|
||||
Curl_strerror(error, buffer, sizeof(buffer)));
|
||||
|
||||
sslen = sizeof(ss);
|
||||
@ -1341,7 +1341,7 @@ static CURLcode ftp_state_use_pasv(struct Curl_easy *data,
|
||||
if(!result) {
|
||||
ftpc->count1 = modeoff;
|
||||
state(data, FTP_PASV);
|
||||
infof(data, "Connect data stream passively\n");
|
||||
infof(data, "Connect data stream passively");
|
||||
}
|
||||
return result;
|
||||
}
|
||||
@ -1648,7 +1648,7 @@ static CURLcode ftp_state_ul_setup(struct Curl_easy *data,
|
||||
data->state.infilesize -= data->state.resume_from;
|
||||
|
||||
if(data->state.infilesize <= 0) {
|
||||
infof(data, "File already completely uploaded\n");
|
||||
infof(data, "File already completely uploaded");
|
||||
|
||||
/* no data to transfer */
|
||||
Curl_setup_transfer(data, -1, -1, FALSE, -1);
|
||||
@ -1802,7 +1802,7 @@ static CURLcode ftp_epsv_disable(struct Curl_easy *data,
|
||||
return CURLE_WEIRD_SERVER_REPLY;
|
||||
}
|
||||
|
||||
infof(data, "Failed EPSV attempt. Disabling EPSV\n");
|
||||
infof(data, "Failed EPSV attempt. Disabling EPSV");
|
||||
/* disable it for next transfer */
|
||||
conn->bits.ftp_use_epsv = FALSE;
|
||||
data->state.errorbuf = FALSE; /* allow error message to get
|
||||
@ -1921,7 +1921,7 @@ static CURLcode ftp_state_pasv_resp(struct Curl_easy *data,
|
||||
if(data->set.ftp_skip_ip) {
|
||||
/* told to ignore the remotely given IP but instead use the host we used
|
||||
for the control connection */
|
||||
infof(data, "Skip %u.%u.%u.%u for data connection, re-use %s instead\n",
|
||||
infof(data, "Skip %u.%u.%u.%u for data connection, re-use %s instead",
|
||||
ip[0], ip[1], ip[2], ip[3],
|
||||
conn->host.name);
|
||||
ftpc->newhost = strdup(control_address(conn));
|
||||
@ -2044,7 +2044,7 @@ static CURLcode ftp_state_port_resp(struct Curl_easy *data,
|
||||
/* the command failed */
|
||||
|
||||
if(EPRT == fcmd) {
|
||||
infof(data, "disabling EPRT usage\n");
|
||||
infof(data, "disabling EPRT usage");
|
||||
conn->bits.ftp_use_eprt = FALSE;
|
||||
}
|
||||
fcmd++;
|
||||
@ -2058,7 +2058,7 @@ static CURLcode ftp_state_port_resp(struct Curl_easy *data,
|
||||
result = ftp_state_use_port(data, fcmd);
|
||||
}
|
||||
else {
|
||||
infof(data, "Connect data stream actively\n");
|
||||
infof(data, "Connect data stream actively");
|
||||
state(data, FTP_STOP); /* end of DO phase */
|
||||
result = ftp_dophase_done(data, FALSE);
|
||||
}
|
||||
@ -2128,7 +2128,7 @@ static CURLcode ftp_state_mdtm_resp(struct Curl_easy *data,
|
||||
}
|
||||
break;
|
||||
default:
|
||||
infof(data, "unsupported MDTM reply format\n");
|
||||
infof(data, "unsupported MDTM reply format");
|
||||
break;
|
||||
case 550: /* "No such file or directory" */
|
||||
failf(data, "Given file does not exist");
|
||||
@ -2142,7 +2142,7 @@ static CURLcode ftp_state_mdtm_resp(struct Curl_easy *data,
|
||||
case CURL_TIMECOND_IFMODSINCE:
|
||||
default:
|
||||
if(data->info.filetime <= data->set.timevalue) {
|
||||
infof(data, "The requested document is not new enough\n");
|
||||
infof(data, "The requested document is not new enough");
|
||||
ftp->transfer = PPTRANSFER_NONE; /* mark to not transfer data */
|
||||
data->info.timecond = TRUE;
|
||||
state(data, FTP_STOP);
|
||||
@ -2151,7 +2151,7 @@ static CURLcode ftp_state_mdtm_resp(struct Curl_easy *data,
|
||||
break;
|
||||
case CURL_TIMECOND_IFUNMODSINCE:
|
||||
if(data->info.filetime > data->set.timevalue) {
|
||||
infof(data, "The requested document is not old enough\n");
|
||||
infof(data, "The requested document is not old enough");
|
||||
ftp->transfer = PPTRANSFER_NONE; /* mark to not transfer data */
|
||||
data->info.timecond = TRUE;
|
||||
state(data, FTP_STOP);
|
||||
@ -2161,7 +2161,7 @@ static CURLcode ftp_state_mdtm_resp(struct Curl_easy *data,
|
||||
} /* switch */
|
||||
}
|
||||
else {
|
||||
infof(data, "Skipping time comparison\n");
|
||||
infof(data, "Skipping time comparison");
|
||||
}
|
||||
}
|
||||
|
||||
@ -2186,7 +2186,7 @@ static CURLcode ftp_state_type_resp(struct Curl_easy *data,
|
||||
return CURLE_FTP_COULDNT_SET_TYPE;
|
||||
}
|
||||
if(ftpcode != 200)
|
||||
infof(data, "Got a %03d response code instead of the assumed 200\n",
|
||||
infof(data, "Got a %03d response code instead of the assumed 200",
|
||||
ftpcode);
|
||||
|
||||
if(instate == FTP_TYPE)
|
||||
@ -2219,7 +2219,7 @@ static CURLcode ftp_state_retr(struct Curl_easy *data,
|
||||
/* We always (attempt to) get the size of downloads, so it is done before
|
||||
this even when not doing resumes. */
|
||||
if(filesize == -1) {
|
||||
infof(data, "ftp server doesn't support SIZE\n");
|
||||
infof(data, "ftp server doesn't support SIZE");
|
||||
/* We couldn't get the size and therefore we can't know if there really
|
||||
is a part of the file left to get, although the server will just
|
||||
close the connection when we start the connection so it won't cause
|
||||
@ -2256,7 +2256,7 @@ static CURLcode ftp_state_retr(struct Curl_easy *data,
|
||||
if(ftp->downloadsize == 0) {
|
||||
/* no data to transfer */
|
||||
Curl_setup_transfer(data, -1, -1, FALSE, -1);
|
||||
infof(data, "File already completely downloaded\n");
|
||||
infof(data, "File already completely downloaded");
|
||||
|
||||
/* Set ->transfer so that we won't get any error in ftp_done()
|
||||
* because we didn't transfer the any file */
|
||||
@ -2267,7 +2267,7 @@ static CURLcode ftp_state_retr(struct Curl_easy *data,
|
||||
|
||||
/* Set resume file transfer offset */
|
||||
infof(data, "Instructs server to resume from offset %"
|
||||
CURL_FORMAT_CURL_OFF_T "\n", data->state.resume_from);
|
||||
CURL_FORMAT_CURL_OFF_T, data->state.resume_from);
|
||||
|
||||
result = Curl_pp_sendf(data, &ftpc->pp, "REST %" CURL_FORMAT_CURL_OFF_T,
|
||||
data->state.resume_from);
|
||||
@ -2413,7 +2413,7 @@ static CURLcode ftp_state_stor_resp(struct Curl_easy *data,
|
||||
|
||||
if(!connected) {
|
||||
struct ftp_conn *ftpc = &conn->proto.ftpc;
|
||||
infof(data, "Data conn was not available immediately\n");
|
||||
infof(data, "Data conn was not available immediately");
|
||||
ftpc->wait_data_conn = TRUE;
|
||||
}
|
||||
|
||||
@ -2506,11 +2506,11 @@ static CURLcode ftp_state_get_resp(struct Curl_easy *data,
|
||||
else if((instate != FTP_LIST) && (data->state.prefer_ascii))
|
||||
size = -1; /* kludge for servers that understate ASCII mode file size */
|
||||
|
||||
infof(data, "Maxdownload = %" CURL_FORMAT_CURL_OFF_T "\n",
|
||||
infof(data, "Maxdownload = %" CURL_FORMAT_CURL_OFF_T,
|
||||
data->req.maxdownload);
|
||||
|
||||
if(instate != FTP_LIST)
|
||||
infof(data, "Getting file with size: %" CURL_FORMAT_CURL_OFF_T "\n",
|
||||
infof(data, "Getting file with size: %" CURL_FORMAT_CURL_OFF_T,
|
||||
size);
|
||||
|
||||
/* FTP download: */
|
||||
@ -2526,7 +2526,7 @@ static CURLcode ftp_state_get_resp(struct Curl_easy *data,
|
||||
|
||||
if(!connected) {
|
||||
struct ftp_conn *ftpc = &conn->proto.ftpc;
|
||||
infof(data, "Data conn was not available immediately\n");
|
||||
infof(data, "Data conn was not available immediately");
|
||||
state(data, FTP_STOP);
|
||||
ftpc->wait_data_conn = TRUE;
|
||||
}
|
||||
@ -2702,9 +2702,9 @@ static CURLcode ftp_statemachine(struct Curl_easy *data,
|
||||
Curl_sec_request_prot(conn, data->set.str[STRING_KRB_LEVEL]);
|
||||
|
||||
if(Curl_sec_login(data, conn))
|
||||
infof(data, "Logging in with password in cleartext!\n");
|
||||
infof(data, "Logging in with password in cleartext!");
|
||||
else
|
||||
infof(data, "Authentication successful\n");
|
||||
infof(data, "Authentication successful");
|
||||
}
|
||||
#endif
|
||||
|
||||
@ -2895,7 +2895,7 @@ static CURLcode ftp_statemachine(struct Curl_easy *data,
|
||||
}
|
||||
Curl_safefree(ftpc->entrypath);
|
||||
ftpc->entrypath = dir; /* remember this */
|
||||
infof(data, "Entry path is '%s'\n", ftpc->entrypath);
|
||||
infof(data, "Entry path is '%s'", ftpc->entrypath);
|
||||
/* also save it where getinfo can access it: */
|
||||
data->state.most_recent_ftp_entrypath = ftpc->entrypath;
|
||||
state(data, FTP_SYST);
|
||||
@ -2904,18 +2904,18 @@ static CURLcode ftp_statemachine(struct Curl_easy *data,
|
||||
|
||||
Curl_safefree(ftpc->entrypath);
|
||||
ftpc->entrypath = dir; /* remember this */
|
||||
infof(data, "Entry path is '%s'\n", ftpc->entrypath);
|
||||
infof(data, "Entry path is '%s'", ftpc->entrypath);
|
||||
/* also save it where getinfo can access it: */
|
||||
data->state.most_recent_ftp_entrypath = ftpc->entrypath;
|
||||
}
|
||||
else {
|
||||
/* couldn't get the path */
|
||||
free(dir);
|
||||
infof(data, "Failed to figure out path\n");
|
||||
infof(data, "Failed to figure out path");
|
||||
}
|
||||
}
|
||||
state(data, FTP_STOP); /* we are done with the CONNECT phase! */
|
||||
DEBUGF(infof(data, "protocol connect phase DONE\n"));
|
||||
DEBUGF(infof(data, "protocol connect phase DONE"));
|
||||
break;
|
||||
|
||||
case FTP_SYST:
|
||||
@ -2962,7 +2962,7 @@ static CURLcode ftp_statemachine(struct Curl_easy *data,
|
||||
}
|
||||
|
||||
state(data, FTP_STOP); /* we are done with the CONNECT phase! */
|
||||
DEBUGF(infof(data, "protocol connect phase DONE\n"));
|
||||
DEBUGF(infof(data, "protocol connect phase DONE"));
|
||||
break;
|
||||
|
||||
case FTP_NAMEFMT:
|
||||
@ -2973,7 +2973,7 @@ static CURLcode ftp_statemachine(struct Curl_easy *data,
|
||||
}
|
||||
|
||||
state(data, FTP_STOP); /* we are done with the CONNECT phase! */
|
||||
DEBUGF(infof(data, "protocol connect phase DONE\n"));
|
||||
DEBUGF(infof(data, "protocol connect phase DONE"));
|
||||
break;
|
||||
|
||||
case FTP_QUOTE:
|
||||
@ -3272,7 +3272,7 @@ static CURLcode ftp_done(struct Curl_easy *data, CURLcode status,
|
||||
}
|
||||
|
||||
if(ftpc->prevpath)
|
||||
infof(data, "Remembering we are in dir \"%s\"\n", ftpc->prevpath);
|
||||
infof(data, "Remembering we are in dir \"%s\"", ftpc->prevpath);
|
||||
}
|
||||
|
||||
/* free the dir tree and file parts */
|
||||
@ -3338,7 +3338,7 @@ static CURLcode ftp_done(struct Curl_easy *data, CURLcode status,
|
||||
if(ftpc->dont_check && data->req.maxdownload > 0) {
|
||||
/* we have just sent ABOR and there is no reliable way to check if it was
|
||||
* successful or not; we have to close the connection now */
|
||||
infof(data, "partial download completed, closing connection\n");
|
||||
infof(data, "partial download completed, closing connection");
|
||||
connclose(conn, "Partial download with no ability to check");
|
||||
return result;
|
||||
}
|
||||
@ -3529,7 +3529,7 @@ ftp_pasv_verbose(struct Curl_easy *data,
|
||||
{
|
||||
char buf[256];
|
||||
Curl_printable_address(ai, buf, sizeof(buf));
|
||||
infof(data, "Connecting to %s (%s) port %d\n", newhost, buf, port);
|
||||
infof(data, "Connecting to %s (%s) port %d", newhost, buf, port);
|
||||
}
|
||||
#endif
|
||||
|
||||
@ -3569,7 +3569,7 @@ static CURLcode ftp_do_more(struct Curl_easy *data, int *completep)
|
||||
|
||||
/* Ready to do more? */
|
||||
if(connected) {
|
||||
DEBUGF(infof(data, "DO-MORE connected phase starts\n"));
|
||||
DEBUGF(infof(data, "DO-MORE connected phase starts"));
|
||||
}
|
||||
else {
|
||||
if(result && (ftpc->count1 == 0)) {
|
||||
@ -3692,7 +3692,7 @@ static CURLcode ftp_do_more(struct Curl_easy *data, int *completep)
|
||||
if(!ftpc->wait_data_conn) {
|
||||
/* no waiting for the data connection so this is now complete */
|
||||
*completep = 1;
|
||||
DEBUGF(infof(data, "DO-MORE phase ends with %d\n", (int)result));
|
||||
DEBUGF(infof(data, "DO-MORE phase ends with %d", (int)result));
|
||||
}
|
||||
|
||||
return result;
|
||||
@ -3717,7 +3717,7 @@ CURLcode ftp_perform(struct Curl_easy *data,
|
||||
CURLcode result = CURLE_OK;
|
||||
struct connectdata *conn = data->conn;
|
||||
|
||||
DEBUGF(infof(data, "DO phase starts\n"));
|
||||
DEBUGF(infof(data, "DO phase starts"));
|
||||
|
||||
if(data->set.opt_no_body) {
|
||||
/* requested no body means no transfer... */
|
||||
@ -3737,10 +3737,10 @@ CURLcode ftp_perform(struct Curl_easy *data,
|
||||
|
||||
*connected = conn->bits.tcpconnect[SECONDARYSOCKET];
|
||||
|
||||
infof(data, "ftp_perform ends with SECONDARY: %d\n", *connected);
|
||||
infof(data, "ftp_perform ends with SECONDARY: %d", *connected);
|
||||
|
||||
if(*dophase_done)
|
||||
DEBUGF(infof(data, "DO phase is complete1\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete1"));
|
||||
|
||||
return result;
|
||||
}
|
||||
@ -3834,7 +3834,7 @@ static CURLcode init_wc_data(struct Curl_easy *data)
|
||||
/* let the writefunc callback know the transfer */
|
||||
data->set.out = data;
|
||||
|
||||
infof(data, "Wildcard - Parsing started\n");
|
||||
infof(data, "Wildcard - Parsing started");
|
||||
return CURLE_OK;
|
||||
|
||||
fail:
|
||||
@ -3901,7 +3901,7 @@ static CURLcode wc_statemach(struct Curl_easy *data)
|
||||
free(ftp->pathalloc);
|
||||
ftp->pathalloc = ftp->path = tmp_path;
|
||||
|
||||
infof(data, "Wildcard - START of \"%s\"\n", finfo->filename);
|
||||
infof(data, "Wildcard - START of \"%s\"", finfo->filename);
|
||||
if(data->set.chunk_bgn) {
|
||||
long userresponse;
|
||||
Curl_set_in_callback(data, true);
|
||||
@ -3910,7 +3910,7 @@ static CURLcode wc_statemach(struct Curl_easy *data)
|
||||
Curl_set_in_callback(data, false);
|
||||
switch(userresponse) {
|
||||
case CURL_CHUNK_BGN_FUNC_SKIP:
|
||||
infof(data, "Wildcard - \"%s\" skipped by user\n",
|
||||
infof(data, "Wildcard - \"%s\" skipped by user",
|
||||
finfo->filename);
|
||||
wildcard->state = CURLWC_SKIP;
|
||||
continue;
|
||||
@ -4233,7 +4233,7 @@ CURLcode ftp_parse_url_path(struct Curl_easy *data)
|
||||
n -= ftpc->file?strlen(ftpc->file):0;
|
||||
|
||||
if((strlen(oldPath) == n) && !strncmp(rawPath, oldPath, n)) {
|
||||
infof(data, "Request has same path as previous transfer\n");
|
||||
infof(data, "Request has same path as previous transfer");
|
||||
ftpc->cwddone = TRUE;
|
||||
}
|
||||
}
|
||||
@ -4279,11 +4279,11 @@ static CURLcode ftp_doing(struct Curl_easy *data,
|
||||
CURLcode result = ftp_multi_statemach(data, dophase_done);
|
||||
|
||||
if(result)
|
||||
DEBUGF(infof(data, "DO phase failed\n"));
|
||||
DEBUGF(infof(data, "DO phase failed"));
|
||||
else if(*dophase_done) {
|
||||
result = ftp_dophase_done(data, FALSE /* not connected */);
|
||||
|
||||
DEBUGF(infof(data, "DO phase is complete2\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete2"));
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
18
lib/hostip.c
18
lib/hostip.c
@ -290,7 +290,7 @@ static struct Curl_dns_entry *fetch_addr(struct Curl_easy *data,
|
||||
user.cache_timeout = data->set.dns_cache_timeout;
|
||||
|
||||
if(hostcache_timestamp_remove(&user, dns)) {
|
||||
infof(data, "Hostname in DNS cache was stale, zapped\n");
|
||||
infof(data, "Hostname in DNS cache was stale, zapped");
|
||||
dns = NULL; /* the memory deallocation is being handled by the hash */
|
||||
Curl_hash_delete(data->dns.hostcache, entry_id, entry_len + 1);
|
||||
}
|
||||
@ -588,7 +588,7 @@ enum resolve_t Curl_resolv(struct Curl_easy *data,
|
||||
dns = fetch_addr(data, hostname, port);
|
||||
|
||||
if(dns) {
|
||||
infof(data, "Hostname %s was found in DNS cache\n", hostname);
|
||||
infof(data, "Hostname %s was found in DNS cache", hostname);
|
||||
dns->inuse++; /* we use it! */
|
||||
rc = CURLRESOLV_RESOLVED;
|
||||
}
|
||||
@ -853,7 +853,7 @@ enum resolve_t Curl_resolv_timeout(struct Curl_easy *data,
|
||||
#else
|
||||
#ifndef CURLRES_ASYNCH
|
||||
if(timeoutms)
|
||||
infof(data, "timeout on name lookup is not supported\n");
|
||||
infof(data, "timeout on name lookup is not supported");
|
||||
#else
|
||||
(void)timeoutms; /* timeoutms not used with an async resolver */
|
||||
#endif
|
||||
@ -991,7 +991,7 @@ CURLcode Curl_loadhostpairs(struct Curl_easy *data)
|
||||
size_t entry_len;
|
||||
|
||||
if(2 != sscanf(hostp->data + 1, "%255[^:]:%d", hostname, &port)) {
|
||||
infof(data, "Couldn't parse CURLOPT_RESOLVE removal entry '%s'!\n",
|
||||
infof(data, "Couldn't parse CURLOPT_RESOLVE removal entry '%s'",
|
||||
hostp->data);
|
||||
continue;
|
||||
}
|
||||
@ -1080,7 +1080,7 @@ CURLcode Curl_loadhostpairs(struct Curl_easy *data)
|
||||
|
||||
#ifndef ENABLE_IPV6
|
||||
if(strchr(address, ':')) {
|
||||
infof(data, "Ignoring resolve address '%s', missing IPv6 support.\n",
|
||||
infof(data, "Ignoring resolve address '%s', missing IPv6 support.",
|
||||
address);
|
||||
continue;
|
||||
}
|
||||
@ -1088,7 +1088,7 @@ CURLcode Curl_loadhostpairs(struct Curl_easy *data)
|
||||
|
||||
ai = Curl_str2addr(address, port);
|
||||
if(!ai) {
|
||||
infof(data, "Resolve address '%s' found illegal!\n", address);
|
||||
infof(data, "Resolve address '%s' found illegal!", address);
|
||||
goto err;
|
||||
}
|
||||
|
||||
@ -1124,7 +1124,7 @@ CURLcode Curl_loadhostpairs(struct Curl_easy *data)
|
||||
dns = Curl_hash_pick(data->dns.hostcache, entry_id, entry_len + 1);
|
||||
|
||||
if(dns) {
|
||||
infof(data, "RESOLVE %s:%d is - old addresses discarded!\n",
|
||||
infof(data, "RESOLVE %s:%d is - old addresses discarded!",
|
||||
hostname, port);
|
||||
/* delete old entry, there are two reasons for this
|
||||
1. old entry may have different addresses.
|
||||
@ -1157,12 +1157,12 @@ CURLcode Curl_loadhostpairs(struct Curl_easy *data)
|
||||
Curl_freeaddrinfo(head);
|
||||
return CURLE_OUT_OF_MEMORY;
|
||||
}
|
||||
infof(data, "Added %s:%d:%s to DNS cache%s\n",
|
||||
infof(data, "Added %s:%d:%s to DNS cache%s",
|
||||
hostname, port, addresses, permanent ? "" : " (non-permanent)");
|
||||
|
||||
/* Wildcard hostname */
|
||||
if(hostname[0] == '*' && hostname[1] == '\0') {
|
||||
infof(data, "RESOLVE %s:%d is wildcard, enabling wildcard checks\n",
|
||||
infof(data, "RESOLVE %s:%d is wildcard, enabling wildcard checks",
|
||||
hostname, port);
|
||||
data->state.wildcard_resolve = true;
|
||||
}
|
||||
|
@ -104,7 +104,7 @@ struct Curl_addrinfo *Curl_getaddrinfo(struct Curl_easy *data,
|
||||
|
||||
ai = Curl_ipv4_resolve_r(hostname, port);
|
||||
if(!ai)
|
||||
infof(data, "Curl_ipv4_resolve_r failed for %s\n", hostname);
|
||||
infof(data, "Curl_ipv4_resolve_r failed for %s", hostname);
|
||||
|
||||
return ai;
|
||||
}
|
||||
|
@ -172,7 +172,7 @@ struct Curl_addrinfo *Curl_getaddrinfo(struct Curl_easy *data,
|
||||
|
||||
error = Curl_getaddrinfo_ex(hostname, sbufptr, &hints, &res);
|
||||
if(error) {
|
||||
infof(data, "getaddrinfo(3) failed for %s:%d\n", hostname, port);
|
||||
infof(data, "getaddrinfo(3) failed for %s:%d", hostname, port);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
72
lib/http.c
72
lib/http.c
@ -504,7 +504,7 @@ static CURLcode http_perhapsrewind(struct Curl_easy *data,
|
||||
/* rewind data when completely done sending! */
|
||||
if(!conn->bits.authneg && (conn->writesockfd != CURL_SOCKET_BAD)) {
|
||||
conn->bits.rewindaftersend = TRUE;
|
||||
infof(data, "Rewind stream after send\n");
|
||||
infof(data, "Rewind stream after send");
|
||||
}
|
||||
|
||||
return CURLE_OK;
|
||||
@ -515,7 +515,7 @@ static CURLcode http_perhapsrewind(struct Curl_easy *data,
|
||||
return CURLE_OK;
|
||||
|
||||
infof(data, "NTLM send, close instead of sending %"
|
||||
CURL_FORMAT_CURL_OFF_T " bytes\n",
|
||||
CURL_FORMAT_CURL_OFF_T " bytes",
|
||||
(curl_off_t)(expectsend - bytessent));
|
||||
}
|
||||
#endif
|
||||
@ -532,7 +532,7 @@ static CURLcode http_perhapsrewind(struct Curl_easy *data,
|
||||
/* rewind data when completely done sending! */
|
||||
if(!conn->bits.authneg && (conn->writesockfd != CURL_SOCKET_BAD)) {
|
||||
conn->bits.rewindaftersend = TRUE;
|
||||
infof(data, "Rewind stream after send\n");
|
||||
infof(data, "Rewind stream after send");
|
||||
}
|
||||
|
||||
return CURLE_OK;
|
||||
@ -543,7 +543,7 @@ static CURLcode http_perhapsrewind(struct Curl_easy *data,
|
||||
return CURLE_OK;
|
||||
|
||||
infof(data, "NEGOTIATE send, close instead of sending %"
|
||||
CURL_FORMAT_CURL_OFF_T " bytes\n",
|
||||
CURL_FORMAT_CURL_OFF_T " bytes",
|
||||
(curl_off_t)(expectsend - bytessent));
|
||||
}
|
||||
#endif
|
||||
@ -756,14 +756,14 @@ output_auth_headers(struct Curl_easy *data,
|
||||
|
||||
if(auth) {
|
||||
#ifndef CURL_DISABLE_PROXY
|
||||
infof(data, "%s auth using %s with user '%s'\n",
|
||||
infof(data, "%s auth using %s with user '%s'",
|
||||
proxy ? "Proxy" : "Server", auth,
|
||||
proxy ? (data->state.aptr.proxyuser ?
|
||||
data->state.aptr.proxyuser : "") :
|
||||
(data->state.aptr.user ?
|
||||
data->state.aptr.user : ""));
|
||||
#else
|
||||
infof(data, "Server auth using %s with user '%s'\n",
|
||||
infof(data, "Server auth using %s with user '%s'",
|
||||
auth, data->state.aptr.user ?
|
||||
data->state.aptr.user : "");
|
||||
#endif
|
||||
@ -995,14 +995,14 @@ CURLcode Curl_http_input_auth(struct Curl_easy *data, bool proxy,
|
||||
|
||||
result = Curl_input_ntlm_wb(data, conn, proxy, auth);
|
||||
if(result) {
|
||||
infof(data, "Authentication problem. Ignoring this.\n");
|
||||
infof(data, "Authentication problem. Ignoring this.");
|
||||
data->state.authproblem = TRUE;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
}
|
||||
else {
|
||||
infof(data, "Authentication problem. Ignoring this.\n");
|
||||
infof(data, "Authentication problem. Ignoring this.");
|
||||
data->state.authproblem = TRUE;
|
||||
}
|
||||
}
|
||||
@ -1013,7 +1013,7 @@ CURLcode Curl_http_input_auth(struct Curl_easy *data, bool proxy,
|
||||
#ifndef CURL_DISABLE_CRYPTO_AUTH
|
||||
if(checkprefix("Digest", auth) && is_valid_auth_separator(auth[6])) {
|
||||
if((authp->avail & CURLAUTH_DIGEST) != 0)
|
||||
infof(data, "Ignoring duplicate digest auth header.\n");
|
||||
infof(data, "Ignoring duplicate digest auth header.");
|
||||
else if(Curl_auth_is_digest_supported()) {
|
||||
CURLcode result;
|
||||
|
||||
@ -1026,7 +1026,7 @@ CURLcode Curl_http_input_auth(struct Curl_easy *data, bool proxy,
|
||||
* Digest */
|
||||
result = Curl_input_digest(data, proxy, auth);
|
||||
if(result) {
|
||||
infof(data, "Authentication problem. Ignoring this.\n");
|
||||
infof(data, "Authentication problem. Ignoring this.");
|
||||
data->state.authproblem = TRUE;
|
||||
}
|
||||
}
|
||||
@ -1042,7 +1042,7 @@ CURLcode Curl_http_input_auth(struct Curl_easy *data, bool proxy,
|
||||
anyway, which basically means our name+password isn't
|
||||
valid. */
|
||||
authp->avail = CURLAUTH_NONE;
|
||||
infof(data, "Authentication problem. Ignoring this.\n");
|
||||
infof(data, "Authentication problem. Ignoring this.");
|
||||
data->state.authproblem = TRUE;
|
||||
}
|
||||
}
|
||||
@ -1055,7 +1055,7 @@ CURLcode Curl_http_input_auth(struct Curl_easy *data, bool proxy,
|
||||
/* We asked for Bearer authentication but got a 40X back
|
||||
anyway, which basically means our token isn't valid. */
|
||||
authp->avail = CURLAUTH_NONE;
|
||||
infof(data, "Authentication problem. Ignoring this.\n");
|
||||
infof(data, "Authentication problem. Ignoring this.");
|
||||
data->state.authproblem = TRUE;
|
||||
}
|
||||
}
|
||||
@ -2910,7 +2910,7 @@ CURLcode Curl_http_firstwrite(struct Curl_easy *data,
|
||||
/* We have a new url to load, but since we want to be able to re-use this
|
||||
connection properly, we read the full response in "ignore more" */
|
||||
k->ignorebody = TRUE;
|
||||
infof(data, "Ignoring the response-body\n");
|
||||
infof(data, "Ignoring the response-body");
|
||||
}
|
||||
if(data->state.resume_from && !k->content_range &&
|
||||
(data->state.httpreq == HTTPREQ_GET) &&
|
||||
@ -2945,7 +2945,7 @@ CURLcode Curl_http_firstwrite(struct Curl_easy *data,
|
||||
/* We're simulating a http 304 from server so we return
|
||||
what should have been returned from the server */
|
||||
data->info.httpcode = 304;
|
||||
infof(data, "Simulate a HTTP 304 response!\n");
|
||||
infof(data, "Simulate a HTTP 304 response!");
|
||||
/* we abort the transfer before it is completed == we ruin the
|
||||
re-use ability. Close the connection */
|
||||
connclose(conn, "Simulated 304 handling");
|
||||
@ -3035,11 +3035,11 @@ CURLcode Curl_http(struct Curl_easy *data, bool *done)
|
||||
if(conn->bits.httpproxy && !conn->bits.tunnel_proxy) {
|
||||
/* We don't support HTTP/2 proxies yet. Also it's debatable
|
||||
whether or not this setting should apply to HTTP/2 proxies. */
|
||||
infof(data, "Ignoring HTTP/2 prior knowledge due to proxy\n");
|
||||
infof(data, "Ignoring HTTP/2 prior knowledge due to proxy");
|
||||
break;
|
||||
}
|
||||
#endif
|
||||
DEBUGF(infof(data, "HTTP/2 over clean TCP\n"));
|
||||
DEBUGF(infof(data, "HTTP/2 over clean TCP"));
|
||||
conn->httpversion = 20;
|
||||
|
||||
result = Curl_http2_switched(data, NULL, 0);
|
||||
@ -3260,7 +3260,7 @@ CURLcode Curl_http(struct Curl_easy *data, bool *done)
|
||||
/* already sent the entire request body, mark the "upload" as
|
||||
complete */
|
||||
infof(data, "upload completely sent off: %" CURL_FORMAT_CURL_OFF_T
|
||||
" out of %" CURL_FORMAT_CURL_OFF_T " bytes\n",
|
||||
" out of %" CURL_FORMAT_CURL_OFF_T " bytes",
|
||||
data->req.writebytecount, http->postsize);
|
||||
data->req.upload_done = TRUE;
|
||||
data->req.keepon &= ~KEEP_SEND; /* we're done writing */
|
||||
@ -3418,7 +3418,7 @@ CURLcode Curl_http_header(struct Curl_easy *data, struct connectdata *conn,
|
||||
return CURLE_FILESIZE_EXCEEDED;
|
||||
}
|
||||
streamclose(conn, "overflow content-length");
|
||||
infof(data, "Overflow Content-Length: value!\n");
|
||||
infof(data, "Overflow Content-Length: value!");
|
||||
}
|
||||
else {
|
||||
/* negative or just rubbish - bad HTTP */
|
||||
@ -3450,7 +3450,7 @@ CURLcode Curl_http_header(struct Curl_easy *data, struct connectdata *conn,
|
||||
* Default action for 1.0 is to close.
|
||||
*/
|
||||
connkeep(conn, "Proxy-Connection keep-alive"); /* don't close */
|
||||
infof(data, "HTTP/1.0 proxy connection set to keep alive!\n");
|
||||
infof(data, "HTTP/1.0 proxy connection set to keep alive!");
|
||||
}
|
||||
else if((conn->httpversion == 11) &&
|
||||
conn->bits.httpproxy &&
|
||||
@ -3460,7 +3460,7 @@ CURLcode Curl_http_header(struct Curl_easy *data, struct connectdata *conn,
|
||||
* close down after this transfer.
|
||||
*/
|
||||
connclose(conn, "Proxy-Connection: asked to close after done");
|
||||
infof(data, "HTTP/1.1 proxy connection set close!\n");
|
||||
infof(data, "HTTP/1.1 proxy connection set close!");
|
||||
}
|
||||
#endif
|
||||
else if((conn->httpversion == 10) &&
|
||||
@ -3472,7 +3472,7 @@ CURLcode Curl_http_header(struct Curl_easy *data, struct connectdata *conn,
|
||||
*
|
||||
* [RFC2068, section 19.7.1] */
|
||||
connkeep(conn, "Connection keep-alive");
|
||||
infof(data, "HTTP/1.0 connection set to keep alive!\n");
|
||||
infof(data, "HTTP/1.0 connection set to keep alive!");
|
||||
}
|
||||
else if(Curl_compareheader(headp, "Connection:", "close")) {
|
||||
/*
|
||||
@ -3653,10 +3653,10 @@ CURLcode Curl_http_header(struct Curl_easy *data, struct connectdata *conn,
|
||||
Curl_hsts_parse(data->hsts, data->state.up.hostname,
|
||||
headp + strlen("Strict-Transport-Security:"));
|
||||
if(check)
|
||||
infof(data, "Illegal STS header skipped\n");
|
||||
infof(data, "Illegal STS header skipped");
|
||||
#ifdef DEBUGBUILD
|
||||
else
|
||||
infof(data, "Parsed STS header fine (%zu entries)\n",
|
||||
infof(data, "Parsed STS header fine (%zu entries)",
|
||||
data->hsts->list.size);
|
||||
#endif
|
||||
}
|
||||
@ -3726,12 +3726,12 @@ CURLcode Curl_http_statusline(struct Curl_easy *data,
|
||||
/* Default action for HTTP/1.0 must be to close, unless
|
||||
we get one of those fancy headers that tell us the
|
||||
server keeps it open for us! */
|
||||
infof(data, "HTTP 1.0, assume close after body\n");
|
||||
infof(data, "HTTP 1.0, assume close after body");
|
||||
connclose(conn, "HTTP/1.0 close after body");
|
||||
}
|
||||
else if(conn->httpversion == 20 ||
|
||||
(k->upgr101 == UPGR101_REQUESTED && k->httpcode == 101)) {
|
||||
DEBUGF(infof(data, "HTTP/2 found, allow multiplexing\n"));
|
||||
DEBUGF(infof(data, "HTTP/2 found, allow multiplexing"));
|
||||
/* HTTP/2 cannot avoid multiplexing since it is a core functionality
|
||||
of the protocol */
|
||||
conn->bundle->multiuse = BUNDLE_MULTIPLEX;
|
||||
@ -3740,7 +3740,7 @@ CURLcode Curl_http_statusline(struct Curl_easy *data,
|
||||
!conn->bits.close) {
|
||||
/* If HTTP version is >= 1.1 and connection is persistent */
|
||||
DEBUGF(infof(data,
|
||||
"HTTP 1.1 or later with persistent connection\n"));
|
||||
"HTTP 1.1 or later with persistent connection"));
|
||||
}
|
||||
|
||||
k->http_bodyless = k->httpcode >= 100 && k->httpcode < 200;
|
||||
@ -3918,7 +3918,7 @@ CURLcode Curl_http_readwrite_headers(struct Curl_easy *data,
|
||||
/* Switching Protocols */
|
||||
if(k->upgr101 == UPGR101_REQUESTED) {
|
||||
/* Switching to HTTP/2 */
|
||||
infof(data, "Received 101\n");
|
||||
infof(data, "Received 101");
|
||||
k->upgr101 = UPGR101_RECEIVED;
|
||||
|
||||
/* we'll get more headers (HTTP/2 response) */
|
||||
@ -3958,7 +3958,7 @@ CURLcode Curl_http_readwrite_headers(struct Curl_easy *data,
|
||||
assume that the server will close the connection to
|
||||
signal the end of the document. */
|
||||
infof(data, "no chunk, no close, no size. Assume close to "
|
||||
"signal end\n");
|
||||
"signal end");
|
||||
streamclose(conn, "HTTP: No end-of-message indicator");
|
||||
}
|
||||
}
|
||||
@ -3971,7 +3971,7 @@ CURLcode Curl_http_readwrite_headers(struct Curl_easy *data,
|
||||
(conn->http_ntlm_state == NTLMSTATE_TYPE2)) ||
|
||||
((data->req.httpcode == 407) &&
|
||||
(conn->proxy_ntlm_state == NTLMSTATE_TYPE2)))) {
|
||||
infof(data, "Connection closure while negotiating auth (HTTP 1.0?)\n");
|
||||
infof(data, "Connection closure while negotiating auth (HTTP 1.0?)");
|
||||
data->state.authproblem = TRUE;
|
||||
}
|
||||
#endif
|
||||
@ -3981,7 +3981,7 @@ CURLcode Curl_http_readwrite_headers(struct Curl_easy *data,
|
||||
(conn->http_negotiate_state == GSS_AUTHRECV)) ||
|
||||
((data->req.httpcode == 407) &&
|
||||
(conn->proxy_negotiate_state == GSS_AUTHRECV)))) {
|
||||
infof(data, "Connection closure while negotiating auth (HTTP 1.0?)\n");
|
||||
infof(data, "Connection closure while negotiating auth (HTTP 1.0?)");
|
||||
data->state.authproblem = TRUE;
|
||||
}
|
||||
if((conn->http_negotiate_state == GSS_AUTHDONE) &&
|
||||
@ -4061,21 +4061,21 @@ CURLcode Curl_http_readwrite_headers(struct Curl_easy *data,
|
||||
if((k->httpcode == 417) && data->state.expect100header) {
|
||||
/* 417 Expectation Failed - try again without the Expect
|
||||
header */
|
||||
infof(data, "Got 417 while waiting for a 100\n");
|
||||
infof(data, "Got 417 while waiting for a 100");
|
||||
data->state.disableexpect = TRUE;
|
||||
DEBUGASSERT(!data->req.newurl);
|
||||
data->req.newurl = strdup(data->state.url);
|
||||
Curl_done_sending(data, k);
|
||||
}
|
||||
else if(data->set.http_keep_sending_on_error) {
|
||||
infof(data, "HTTP error before end of send, keep sending\n");
|
||||
infof(data, "HTTP error before end of send, keep sending");
|
||||
if(k->exp100 > EXP100_SEND_DATA) {
|
||||
k->exp100 = EXP100_SEND_DATA;
|
||||
k->keepon |= KEEP_SEND;
|
||||
}
|
||||
}
|
||||
else {
|
||||
infof(data, "HTTP error before end of send, stop sending\n");
|
||||
infof(data, "HTTP error before end of send, stop sending");
|
||||
streamclose(conn, "Stop sending data before everything sent");
|
||||
result = Curl_done_sending(data, k);
|
||||
if(result)
|
||||
@ -4095,7 +4095,7 @@ CURLcode Curl_http_readwrite_headers(struct Curl_easy *data,
|
||||
if(conn->bits.rewindaftersend) {
|
||||
/* We rewind after a complete send, so thus we continue
|
||||
sending now */
|
||||
infof(data, "Keep sending data to get tossed away!\n");
|
||||
infof(data, "Keep sending data to get tossed away!");
|
||||
k->keepon |= KEEP_SEND;
|
||||
}
|
||||
}
|
||||
@ -4250,11 +4250,11 @@ CURLcode Curl_http_readwrite_headers(struct Curl_easy *data,
|
||||
if(k->upgr101 == UPGR101_RECEIVED) {
|
||||
/* supposedly upgraded to http2 now */
|
||||
if(conn->httpversion != 20)
|
||||
infof(data, "Lying server, not serving HTTP/2\n");
|
||||
infof(data, "Lying server, not serving HTTP/2");
|
||||
}
|
||||
if(conn->httpversion < 20) {
|
||||
conn->bundle->multiuse = BUNDLE_NO_MULTIUSE;
|
||||
infof(data, "Mark bundle as not supporting multiuse\n");
|
||||
infof(data, "Mark bundle as not supporting multiuse");
|
||||
}
|
||||
}
|
||||
else if(!nc) {
|
||||
|
138
lib/http2.c
138
lib/http2.c
@ -146,12 +146,12 @@ static CURLcode http2_disconnect(struct Curl_easy *data,
|
||||
(void)data;
|
||||
#endif
|
||||
|
||||
H2BUGF(infof(data, "HTTP/2 DISCONNECT starts now\n"));
|
||||
H2BUGF(infof(data, "HTTP/2 DISCONNECT starts now"));
|
||||
|
||||
nghttp2_session_del(c->h2);
|
||||
Curl_safefree(c->inbuf);
|
||||
|
||||
H2BUGF(infof(data, "HTTP/2 DISCONNECT done\n"));
|
||||
H2BUGF(infof(data, "HTTP/2 DISCONNECT done"));
|
||||
|
||||
return CURLE_OK;
|
||||
}
|
||||
@ -196,7 +196,7 @@ static bool http2_connisdead(struct Curl_easy *data, struct connectdata *conn)
|
||||
data, FIRSTSOCKET, httpc->inbuf, H2_BUFSIZE, &result);
|
||||
if(nread != -1) {
|
||||
infof(data,
|
||||
"%d bytes stray data read before trying h2 connection\n",
|
||||
"%d bytes stray data read before trying h2 connection",
|
||||
(int)nread);
|
||||
httpc->nread_inbuf = 0;
|
||||
httpc->inbuflen = nread;
|
||||
@ -552,7 +552,7 @@ static int push_promise(struct Curl_easy *data,
|
||||
const nghttp2_push_promise *frame)
|
||||
{
|
||||
int rv; /* one of the CURL_PUSH_* defines */
|
||||
H2BUGF(infof(data, "PUSH_PROMISE received, stream %u!\n",
|
||||
H2BUGF(infof(data, "PUSH_PROMISE received, stream %u!",
|
||||
frame->promised_stream_id));
|
||||
if(data->multi->push_cb) {
|
||||
struct HTTP *stream;
|
||||
@ -564,7 +564,7 @@ static int push_promise(struct Curl_easy *data,
|
||||
/* clone the parent */
|
||||
struct Curl_easy *newhandle = duphandle(data);
|
||||
if(!newhandle) {
|
||||
infof(data, "failed to duplicate handle\n");
|
||||
infof(data, "failed to duplicate handle");
|
||||
rv = CURL_PUSH_DENY; /* FAIL HARD */
|
||||
goto fail;
|
||||
}
|
||||
@ -572,7 +572,7 @@ static int push_promise(struct Curl_easy *data,
|
||||
heads.data = data;
|
||||
heads.frame = frame;
|
||||
/* ask the application */
|
||||
H2BUGF(infof(data, "Got PUSH_PROMISE, ask application!\n"));
|
||||
H2BUGF(infof(data, "Got PUSH_PROMISE, ask application!"));
|
||||
|
||||
stream = data->req.p.http;
|
||||
if(!stream) {
|
||||
@ -620,7 +620,7 @@ static int push_promise(struct Curl_easy *data,
|
||||
state with the given connection !*/
|
||||
rc = Curl_multi_add_perform(data->multi, newhandle, conn);
|
||||
if(rc) {
|
||||
infof(data, "failed to add handle to multi\n");
|
||||
infof(data, "failed to add handle to multi");
|
||||
http2_stream_free(newhandle->req.p.http);
|
||||
newhandle->req.p.http = NULL;
|
||||
Curl_close(&newhandle);
|
||||
@ -633,7 +633,7 @@ static int push_promise(struct Curl_easy *data,
|
||||
frame->promised_stream_id,
|
||||
newhandle);
|
||||
if(rv) {
|
||||
infof(data, "failed to set user_data for stream %d\n",
|
||||
infof(data, "failed to set user_data for stream %d",
|
||||
frame->promised_stream_id);
|
||||
DEBUGASSERT(0);
|
||||
rv = CURL_PUSH_DENY;
|
||||
@ -643,7 +643,7 @@ static int push_promise(struct Curl_easy *data,
|
||||
Curl_dyn_init(&newstream->trailer_recvbuf, DYN_H2_TRAILERS);
|
||||
}
|
||||
else {
|
||||
H2BUGF(infof(data, "Got PUSH_PROMISE, ignore it!\n"));
|
||||
H2BUGF(infof(data, "Got PUSH_PROMISE, ignore it!"));
|
||||
rv = CURL_PUSH_DENY;
|
||||
}
|
||||
fail:
|
||||
@ -679,21 +679,21 @@ static int on_frame_recv(nghttp2_session *session, const nghttp2_frame *frame,
|
||||
/* stream ID zero is for connection-oriented stuff */
|
||||
if(frame->hd.type == NGHTTP2_SETTINGS) {
|
||||
uint32_t max_conn = httpc->settings.max_concurrent_streams;
|
||||
H2BUGF(infof(data, "Got SETTINGS\n"));
|
||||
H2BUGF(infof(data, "Got SETTINGS"));
|
||||
httpc->settings.max_concurrent_streams =
|
||||
nghttp2_session_get_remote_settings(
|
||||
session, NGHTTP2_SETTINGS_MAX_CONCURRENT_STREAMS);
|
||||
httpc->settings.enable_push =
|
||||
nghttp2_session_get_remote_settings(
|
||||
session, NGHTTP2_SETTINGS_ENABLE_PUSH);
|
||||
H2BUGF(infof(data, "MAX_CONCURRENT_STREAMS == %d\n",
|
||||
H2BUGF(infof(data, "MAX_CONCURRENT_STREAMS == %d",
|
||||
httpc->settings.max_concurrent_streams));
|
||||
H2BUGF(infof(data, "ENABLE_PUSH == %s\n",
|
||||
H2BUGF(infof(data, "ENABLE_PUSH == %s",
|
||||
httpc->settings.enable_push?"TRUE":"false"));
|
||||
if(max_conn != httpc->settings.max_concurrent_streams) {
|
||||
/* only signal change if the value actually changed */
|
||||
infof(data,
|
||||
"Connection state changed (MAX_CONCURRENT_STREAMS == %u)!\n",
|
||||
"Connection state changed (MAX_CONCURRENT_STREAMS == %u)!",
|
||||
httpc->settings.max_concurrent_streams);
|
||||
multi_connchanged(data->multi);
|
||||
}
|
||||
@ -703,19 +703,19 @@ static int on_frame_recv(nghttp2_session *session, const nghttp2_frame *frame,
|
||||
data_s = nghttp2_session_get_stream_user_data(session, stream_id);
|
||||
if(!data_s) {
|
||||
H2BUGF(infof(data,
|
||||
"No Curl_easy associated with stream: %x\n",
|
||||
"No Curl_easy associated with stream: %x",
|
||||
stream_id));
|
||||
return 0;
|
||||
}
|
||||
|
||||
stream = data_s->req.p.http;
|
||||
if(!stream) {
|
||||
H2BUGF(infof(data_s, "No proto pointer for stream: %x\n",
|
||||
H2BUGF(infof(data_s, "No proto pointer for stream: %x",
|
||||
stream_id));
|
||||
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
||||
}
|
||||
|
||||
H2BUGF(infof(data_s, "on_frame_recv() header %x stream %x\n",
|
||||
H2BUGF(infof(data_s, "on_frame_recv() header %x stream %x",
|
||||
frame->hd.type, stream_id));
|
||||
|
||||
switch(frame->hd.type) {
|
||||
@ -763,7 +763,7 @@ static int on_frame_recv(nghttp2_session *session, const nghttp2_frame *frame,
|
||||
ncopy);
|
||||
stream->nread_header_recvbuf += ncopy;
|
||||
|
||||
H2BUGF(infof(data_s, "Store %zu bytes headers from stream %u at %p\n",
|
||||
H2BUGF(infof(data_s, "Store %zu bytes headers from stream %u at %p",
|
||||
ncopy, stream_id, stream->mem));
|
||||
|
||||
stream->len -= ncopy;
|
||||
@ -785,13 +785,13 @@ static int on_frame_recv(nghttp2_session *session, const nghttp2_frame *frame,
|
||||
if(nghttp2_is_fatal(h2))
|
||||
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
||||
else if(rv == CURL_PUSH_ERROROUT) {
|
||||
DEBUGF(infof(data_s, "Fail the parent stream (too)\n"));
|
||||
DEBUGF(infof(data_s, "Fail the parent stream (too)"));
|
||||
return NGHTTP2_ERR_CALLBACK_FAILURE;
|
||||
}
|
||||
}
|
||||
break;
|
||||
default:
|
||||
H2BUGF(infof(data_s, "Got frame type %x for stream %u!\n",
|
||||
H2BUGF(infof(data_s, "Got frame type %x for stream %u!",
|
||||
frame->hd.type, stream_id));
|
||||
break;
|
||||
}
|
||||
@ -836,7 +836,7 @@ static int on_data_chunk_recv(nghttp2_session *session, uint8_t flags,
|
||||
Curl_expire(data_s, 0, EXPIRE_RUN_NOW);
|
||||
|
||||
H2BUGF(infof(data_s, "%zu data received for stream %u "
|
||||
"(%zu left in buffer %p, total %zu)\n",
|
||||
"(%zu left in buffer %p, total %zu)",
|
||||
nread, stream_id,
|
||||
stream->len, stream->mem,
|
||||
stream->memlen));
|
||||
@ -845,7 +845,7 @@ static int on_data_chunk_recv(nghttp2_session *session, uint8_t flags,
|
||||
stream->pausedata = mem + nread;
|
||||
stream->pauselen = len - nread;
|
||||
H2BUGF(infof(data_s, "NGHTTP2_ERR_PAUSE - %zu bytes out of buffer"
|
||||
", stream %u\n",
|
||||
", stream %u",
|
||||
len - nread, stream_id));
|
||||
data_s->conn->proto.httpc.pause_stream_id = stream_id;
|
||||
|
||||
@ -883,7 +883,7 @@ static int on_stream_close(nghttp2_session *session, int32_t stream_id,
|
||||
decided to reject stream (e.g., PUSH_PROMISE). */
|
||||
return 0;
|
||||
}
|
||||
H2BUGF(infof(data_s, "on_stream_close(), %s (err %d), stream %u\n",
|
||||
H2BUGF(infof(data_s, "on_stream_close(), %s (err %d), stream %u",
|
||||
nghttp2_http2_strerror(error_code), error_code, stream_id));
|
||||
stream = data_s->req.p.http;
|
||||
if(!stream)
|
||||
@ -898,15 +898,15 @@ static int on_stream_close(nghttp2_session *session, int32_t stream_id,
|
||||
/* remove the entry from the hash as the stream is now gone */
|
||||
rv = nghttp2_session_set_stream_user_data(session, stream_id, 0);
|
||||
if(rv) {
|
||||
infof(data_s, "http/2: failed to clear user_data for stream %d!\n",
|
||||
infof(data_s, "http/2: failed to clear user_data for stream %d!",
|
||||
stream_id);
|
||||
DEBUGASSERT(0);
|
||||
}
|
||||
if(stream_id == httpc->pause_stream_id) {
|
||||
H2BUGF(infof(data_s, "Stopped the pause stream!\n"));
|
||||
H2BUGF(infof(data_s, "Stopped the pause stream!"));
|
||||
httpc->pause_stream_id = 0;
|
||||
}
|
||||
H2BUGF(infof(data_s, "Removed stream %u hash!\n", stream_id));
|
||||
H2BUGF(infof(data_s, "Removed stream %u hash!", stream_id));
|
||||
stream->stream_id = 0; /* cleared */
|
||||
}
|
||||
return 0;
|
||||
@ -924,7 +924,7 @@ static int on_begin_headers(nghttp2_session *session,
|
||||
return 0;
|
||||
}
|
||||
|
||||
H2BUGF(infof(data_s, "on_begin_headers() was called\n"));
|
||||
H2BUGF(infof(data_s, "on_begin_headers() was called"));
|
||||
|
||||
if(frame->hd.type != NGHTTP2_HEADERS) {
|
||||
return 0;
|
||||
@ -1052,7 +1052,7 @@ static int on_header(nghttp2_session *session, const nghttp2_frame *frame,
|
||||
|
||||
if(stream->bodystarted) {
|
||||
/* This is a trailer */
|
||||
H2BUGF(infof(data_s, "h2 trailer: %.*s: %.*s\n", namelen, name, valuelen,
|
||||
H2BUGF(infof(data_s, "h2 trailer: %.*s: %.*s", namelen, name, valuelen,
|
||||
value));
|
||||
result = Curl_dyn_addf(&stream->trailer_recvbuf,
|
||||
"%.*s: %.*s\r\n", namelen, name,
|
||||
@ -1085,7 +1085,7 @@ static int on_header(nghttp2_session *session, const nghttp2_frame *frame,
|
||||
if(get_transfer(httpc) != data_s)
|
||||
Curl_expire(data_s, 0, EXPIRE_RUN_NOW);
|
||||
|
||||
H2BUGF(infof(data_s, "h2 status: HTTP/2 %03d (easy %p)\n",
|
||||
H2BUGF(infof(data_s, "h2 status: HTTP/2 %03d (easy %p)",
|
||||
stream->status_code, data_s));
|
||||
return 0;
|
||||
}
|
||||
@ -1109,7 +1109,7 @@ static int on_header(nghttp2_session *session, const nghttp2_frame *frame,
|
||||
if(get_transfer(httpc) != data_s)
|
||||
Curl_expire(data_s, 0, EXPIRE_RUN_NOW);
|
||||
|
||||
H2BUGF(infof(data_s, "h2 header: %.*s: %.*s\n", namelen, name, valuelen,
|
||||
H2BUGF(infof(data_s, "h2 header: %.*s: %.*s", namelen, name, valuelen,
|
||||
value));
|
||||
|
||||
return 0; /* 0 is successful */
|
||||
@ -1159,7 +1159,7 @@ static ssize_t data_source_read_callback(nghttp2_session *session,
|
||||
return NGHTTP2_ERR_DEFERRED;
|
||||
|
||||
H2BUGF(infof(data_s, "data_source_read_callback: "
|
||||
"returns %zu bytes stream %u\n",
|
||||
"returns %zu bytes stream %u",
|
||||
nread, stream_id));
|
||||
|
||||
return nread;
|
||||
@ -1226,7 +1226,7 @@ void Curl_http2_done(struct Curl_easy *data, bool premature)
|
||||
(void)nghttp2_session_send(httpc->h2);
|
||||
|
||||
if(http->stream_id == httpc->pause_stream_id) {
|
||||
infof(data, "stopped the pause stream!\n");
|
||||
infof(data, "stopped the pause stream!");
|
||||
httpc->pause_stream_id = 0;
|
||||
}
|
||||
}
|
||||
@ -1239,7 +1239,7 @@ void Curl_http2_done(struct Curl_easy *data, bool premature)
|
||||
int rv = nghttp2_session_set_stream_user_data(httpc->h2,
|
||||
http->stream_id, 0);
|
||||
if(rv) {
|
||||
infof(data, "http/2: failed to clear user_data for stream %d!\n",
|
||||
infof(data, "http/2: failed to clear user_data for stream %d!",
|
||||
http->stream_id);
|
||||
DEBUGASSERT(0);
|
||||
}
|
||||
@ -1386,7 +1386,7 @@ static int h2_process_pending_input(struct Curl_easy *data,
|
||||
if(nread == rv) {
|
||||
H2BUGF(infof(data,
|
||||
"h2_process_pending_input: All data in connection buffer "
|
||||
"processed\n"));
|
||||
"processed"));
|
||||
httpc->inbuflen = 0;
|
||||
httpc->nread_inbuf = 0;
|
||||
}
|
||||
@ -1394,7 +1394,7 @@ static int h2_process_pending_input(struct Curl_easy *data,
|
||||
httpc->nread_inbuf += rv;
|
||||
H2BUGF(infof(data,
|
||||
"h2_process_pending_input: %zu bytes left in connection "
|
||||
"buffer\n",
|
||||
"buffer",
|
||||
httpc->inbuflen - httpc->nread_inbuf));
|
||||
}
|
||||
|
||||
@ -1415,7 +1415,7 @@ static int h2_process_pending_input(struct Curl_easy *data,
|
||||
if(should_close_session(httpc)) {
|
||||
struct HTTP *stream = data->req.p.http;
|
||||
H2BUGF(infof(data,
|
||||
"h2_process_pending_input: nothing to do in this session\n"));
|
||||
"h2_process_pending_input: nothing to do in this session"));
|
||||
if(stream->error)
|
||||
*err = CURLE_HTTP2;
|
||||
else {
|
||||
@ -1459,7 +1459,7 @@ CURLcode Curl_http2_done_sending(struct Curl_easy *data,
|
||||
struct SingleRequest *k = &data->req;
|
||||
int rv;
|
||||
|
||||
H2BUGF(infof(data, "HTTP/2 still wants to send data (easy %p)\n", data));
|
||||
H2BUGF(infof(data, "HTTP/2 still wants to send data (easy %p)", data));
|
||||
|
||||
/* and attempt to send the pending frames */
|
||||
rv = h2_session_send(data, h2);
|
||||
@ -1498,7 +1498,7 @@ static ssize_t http2_handle_stream_close(struct connectdata *conn,
|
||||
/* Reset to FALSE to prevent infinite loop in readwrite_data function. */
|
||||
stream->closed = FALSE;
|
||||
if(stream->error == NGHTTP2_REFUSED_STREAM) {
|
||||
H2BUGF(infof(data, "REFUSED_STREAM (%d), try again on a new connection!\n",
|
||||
H2BUGF(infof(data, "REFUSED_STREAM (%d), try again on a new connection!",
|
||||
stream->stream_id));
|
||||
connclose(conn, "REFUSED_STREAM"); /* don't use this anymore */
|
||||
data->state.refused_stream = TRUE;
|
||||
@ -1547,7 +1547,7 @@ static ssize_t http2_handle_stream_close(struct connectdata *conn,
|
||||
|
||||
stream->close_handled = TRUE;
|
||||
|
||||
H2BUGF(infof(data, "http2_recv returns 0, http2_handle_stream_close\n"));
|
||||
H2BUGF(infof(data, "http2_recv returns 0, http2_handle_stream_close"));
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -1590,7 +1590,7 @@ static int h2_session_send(struct Curl_easy *data,
|
||||
|
||||
h2_pri_spec(data, &pri_spec);
|
||||
|
||||
H2BUGF(infof(data, "Queuing PRIORITY on stream %u (easy %p)\n",
|
||||
H2BUGF(infof(data, "Queuing PRIORITY on stream %u (easy %p)",
|
||||
stream->stream_id, data));
|
||||
DEBUGASSERT(stream->stream_id != -1);
|
||||
rv = nghttp2_submit_priority(h2, NGHTTP2_FLAG_NONE, stream->stream_id,
|
||||
@ -1614,7 +1614,7 @@ static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
||||
|
||||
if(should_close_session(httpc)) {
|
||||
H2BUGF(infof(data,
|
||||
"http2_recv: nothing to do in this session\n"));
|
||||
"http2_recv: nothing to do in this session"));
|
||||
if(conn->bits.close) {
|
||||
/* already marked for closure, return OK and we're done */
|
||||
*err = CURLE_OK;
|
||||
@ -1648,12 +1648,12 @@ static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
||||
stream->nread_header_recvbuf, ncopy);
|
||||
stream->nread_header_recvbuf += ncopy;
|
||||
|
||||
H2BUGF(infof(data, "http2_recv: Got %d bytes from header_recvbuf\n",
|
||||
H2BUGF(infof(data, "http2_recv: Got %d bytes from header_recvbuf",
|
||||
(int)ncopy));
|
||||
return ncopy;
|
||||
}
|
||||
|
||||
H2BUGF(infof(data, "http2_recv: easy %p (stream %u) win %u/%u\n",
|
||||
H2BUGF(infof(data, "http2_recv: easy %p (stream %u) win %u/%u",
|
||||
data, stream->stream_id,
|
||||
nghttp2_session_get_local_window_size(httpc->h2),
|
||||
nghttp2_session_get_stream_local_window_size(httpc->h2,
|
||||
@ -1661,7 +1661,7 @@ static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
||||
));
|
||||
|
||||
if((data->state.drain) && stream->memlen) {
|
||||
H2BUGF(infof(data, "http2_recv: DRAIN %zu bytes stream %u!! (%p => %p)\n",
|
||||
H2BUGF(infof(data, "http2_recv: DRAIN %zu bytes stream %u!! (%p => %p)",
|
||||
stream->memlen, stream->stream_id,
|
||||
stream->mem, mem));
|
||||
if(mem != stream->mem) {
|
||||
@ -1689,7 +1689,7 @@ static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
||||
stream->pauselen -= nread;
|
||||
|
||||
if(stream->pauselen == 0) {
|
||||
H2BUGF(infof(data, "Unpaused by stream %u\n", stream->stream_id));
|
||||
H2BUGF(infof(data, "Unpaused by stream %u", stream->stream_id));
|
||||
DEBUGASSERT(httpc->pause_stream_id == stream->stream_id);
|
||||
httpc->pause_stream_id = 0;
|
||||
|
||||
@ -1707,7 +1707,7 @@ static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
H2BUGF(infof(data, "http2_recv: returns unpaused %zd bytes on stream %u\n",
|
||||
H2BUGF(infof(data, "http2_recv: returns unpaused %zd bytes on stream %u",
|
||||
nread, stream->stream_id));
|
||||
return nread;
|
||||
}
|
||||
@ -1723,7 +1723,7 @@ static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
||||
if(stream->closed)
|
||||
/* closed overrides paused */
|
||||
return 0;
|
||||
H2BUGF(infof(data, "stream %x is paused, pause id: %x\n",
|
||||
H2BUGF(infof(data, "stream %x is paused, pause id: %x",
|
||||
stream->stream_id, httpc->pause_stream_id));
|
||||
*err = CURLE_AGAIN;
|
||||
return -1;
|
||||
@ -1761,12 +1761,12 @@ static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
||||
return -1;
|
||||
}
|
||||
|
||||
H2BUGF(infof(data, "end of stream\n"));
|
||||
H2BUGF(infof(data, "end of stream"));
|
||||
*err = CURLE_OK;
|
||||
return 0;
|
||||
}
|
||||
|
||||
H2BUGF(infof(data, "nread=%zd\n", nread));
|
||||
H2BUGF(infof(data, "nread=%zd", nread));
|
||||
|
||||
httpc->inbuflen = nread;
|
||||
|
||||
@ -1775,7 +1775,7 @@ static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
||||
else {
|
||||
nread = httpc->inbuflen - httpc->nread_inbuf;
|
||||
(void)nread; /* silence warning, used in debug */
|
||||
H2BUGF(infof(data, "Use data left in connection buffer, nread=%zd\n",
|
||||
H2BUGF(infof(data, "Use data left in connection buffer, nread=%zd",
|
||||
nread));
|
||||
}
|
||||
|
||||
@ -1784,14 +1784,14 @@ static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
||||
}
|
||||
if(stream->memlen) {
|
||||
ssize_t retlen = stream->memlen;
|
||||
H2BUGF(infof(data, "http2_recv: returns %zd for stream %u\n",
|
||||
H2BUGF(infof(data, "http2_recv: returns %zd for stream %u",
|
||||
retlen, stream->stream_id));
|
||||
stream->memlen = 0;
|
||||
|
||||
if(httpc->pause_stream_id == stream->stream_id) {
|
||||
/* data for this stream is returned now, but this stream caused a pause
|
||||
already so we need it called again asap */
|
||||
H2BUGF(infof(data, "Data returned for PAUSED stream %u\n",
|
||||
H2BUGF(infof(data, "Data returned for PAUSED stream %u",
|
||||
stream->stream_id));
|
||||
}
|
||||
else if(!stream->closed) {
|
||||
@ -1806,7 +1806,7 @@ static ssize_t http2_recv(struct Curl_easy *data, int sockindex,
|
||||
if(stream->closed)
|
||||
return http2_handle_stream_close(conn, data, stream, err);
|
||||
*err = CURLE_AGAIN;
|
||||
H2BUGF(infof(data, "http2_recv returns AGAIN for stream %u\n",
|
||||
H2BUGF(infof(data, "http2_recv returns AGAIN for stream %u",
|
||||
stream->stream_id));
|
||||
return -1;
|
||||
}
|
||||
@ -1910,11 +1910,11 @@ static ssize_t http2_send(struct Curl_easy *data, int sockindex,
|
||||
|
||||
(void)sockindex;
|
||||
|
||||
H2BUGF(infof(data, "http2_send len=%zu\n", len));
|
||||
H2BUGF(infof(data, "http2_send len=%zu", len));
|
||||
|
||||
if(stream->stream_id != -1) {
|
||||
if(stream->close_handled) {
|
||||
infof(data, "stream %d closed\n", stream->stream_id);
|
||||
infof(data, "stream %d closed", stream->stream_id);
|
||||
*err = CURLE_HTTP2_STREAM;
|
||||
return -1;
|
||||
}
|
||||
@ -1943,7 +1943,7 @@ static ssize_t http2_send(struct Curl_easy *data, int sockindex,
|
||||
stream->upload_len = 0;
|
||||
|
||||
if(should_close_session(httpc)) {
|
||||
H2BUGF(infof(data, "http2_send: nothing to do in this session\n"));
|
||||
H2BUGF(infof(data, "http2_send: nothing to do in this session"));
|
||||
*err = CURLE_HTTP2;
|
||||
return -1;
|
||||
}
|
||||
@ -1956,7 +1956,7 @@ static ssize_t http2_send(struct Curl_easy *data, int sockindex,
|
||||
nghttp2_session_resume_data(h2, stream->stream_id);
|
||||
}
|
||||
|
||||
H2BUGF(infof(data, "http2_send returns %zu for stream %u\n", len,
|
||||
H2BUGF(infof(data, "http2_send returns %zu for stream %u", len,
|
||||
stream->stream_id));
|
||||
return len;
|
||||
}
|
||||
@ -2119,7 +2119,7 @@ static ssize_t http2_send(struct Curl_easy *data, int sockindex,
|
||||
for(i = 0; i < nheader; ++i) {
|
||||
acc += nva[i].namelen + nva[i].valuelen;
|
||||
|
||||
H2BUGF(infof(data, "h2 header: %.*s:%.*s\n",
|
||||
H2BUGF(infof(data, "h2 header: %.*s:%.*s",
|
||||
nva[i].namelen, nva[i].name,
|
||||
nva[i].valuelen, nva[i].value));
|
||||
}
|
||||
@ -2127,13 +2127,13 @@ static ssize_t http2_send(struct Curl_easy *data, int sockindex,
|
||||
if(acc > MAX_ACC) {
|
||||
infof(data, "http2_send: Warning: The cumulative length of all "
|
||||
"headers exceeds %d bytes and that could cause the "
|
||||
"stream to be rejected.\n", MAX_ACC);
|
||||
"stream to be rejected.", MAX_ACC);
|
||||
}
|
||||
}
|
||||
|
||||
h2_pri_spec(data, &pri_spec);
|
||||
|
||||
H2BUGF(infof(data, "http2_send request allowed %d (easy handle %p)\n",
|
||||
H2BUGF(infof(data, "http2_send request allowed %d (easy handle %p)",
|
||||
nghttp2_session_check_request_allowed(h2), (void *)data));
|
||||
|
||||
switch(data->state.httpreq) {
|
||||
@ -2161,20 +2161,20 @@ static ssize_t http2_send(struct Curl_easy *data, int sockindex,
|
||||
|
||||
if(stream_id < 0) {
|
||||
H2BUGF(infof(data,
|
||||
"http2_send() nghttp2_submit_request error (%s)%d\n",
|
||||
"http2_send() nghttp2_submit_request error (%s)%d",
|
||||
nghttp2_strerror(stream_id), stream_id));
|
||||
*err = CURLE_SEND_ERROR;
|
||||
return -1;
|
||||
}
|
||||
|
||||
infof(data, "Using Stream ID: %x (easy handle %p)\n",
|
||||
infof(data, "Using Stream ID: %x (easy handle %p)",
|
||||
stream_id, (void *)data);
|
||||
stream->stream_id = stream_id;
|
||||
|
||||
rv = h2_session_send(data, h2);
|
||||
if(rv) {
|
||||
H2BUGF(infof(data,
|
||||
"http2_send() nghttp2_session_send error (%s)%d\n",
|
||||
"http2_send() nghttp2_session_send error (%s)%d",
|
||||
nghttp2_strerror(rv), rv));
|
||||
|
||||
*err = CURLE_SEND_ERROR;
|
||||
@ -2182,7 +2182,7 @@ static ssize_t http2_send(struct Curl_easy *data, int sockindex,
|
||||
}
|
||||
|
||||
if(should_close_session(httpc)) {
|
||||
H2BUGF(infof(data, "http2_send: nothing to do in this session\n"));
|
||||
H2BUGF(infof(data, "http2_send: nothing to do in this session"));
|
||||
*err = CURLE_HTTP2;
|
||||
return -1;
|
||||
}
|
||||
@ -2233,7 +2233,7 @@ CURLcode Curl_http2_setup(struct Curl_easy *data,
|
||||
return result;
|
||||
}
|
||||
|
||||
infof(data, "Using HTTP2, server supports multiplexing\n");
|
||||
infof(data, "Using HTTP2, server supports multiplexing");
|
||||
stream->upload_left = 0;
|
||||
stream->upload_mem = NULL;
|
||||
stream->upload_len = 0;
|
||||
@ -2250,7 +2250,7 @@ CURLcode Curl_http2_setup(struct Curl_easy *data,
|
||||
conn->httpversion = 20;
|
||||
conn->bundle->multiuse = BUNDLE_MULTIPLEX;
|
||||
|
||||
infof(data, "Connection state changed (HTTP/2 confirmed)\n");
|
||||
infof(data, "Connection state changed (HTTP/2 confirmed)");
|
||||
multi_connchanged(data->multi);
|
||||
|
||||
return CURLE_OK;
|
||||
@ -2290,7 +2290,7 @@ CURLcode Curl_http2_switched(struct Curl_easy *data,
|
||||
stream->stream_id,
|
||||
data);
|
||||
if(rv) {
|
||||
infof(data, "http/2: failed to set user_data for stream %d!\n",
|
||||
infof(data, "http/2: failed to set user_data for stream %d!",
|
||||
stream->stream_id);
|
||||
DEBUGASSERT(0);
|
||||
}
|
||||
@ -2330,7 +2330,7 @@ CURLcode Curl_http2_switched(struct Curl_easy *data,
|
||||
}
|
||||
|
||||
infof(data, "Copying HTTP/2 data in stream buffer to connection buffer"
|
||||
" after upgrade: len=%zu\n",
|
||||
" after upgrade: len=%zu",
|
||||
nread);
|
||||
|
||||
if(nread)
|
||||
@ -2381,7 +2381,7 @@ CURLcode Curl_http2_stream_pause(struct Curl_easy *data, bool pause)
|
||||
if(rv)
|
||||
return CURLE_SEND_ERROR;
|
||||
|
||||
DEBUGF(infof(data, "Set HTTP/2 window size to %u for stream %u\n",
|
||||
DEBUGF(infof(data, "Set HTTP/2 window size to %u for stream %u",
|
||||
window, stream->stream_id));
|
||||
|
||||
#ifdef DEBUGBUILD
|
||||
@ -2390,7 +2390,7 @@ CURLcode Curl_http2_stream_pause(struct Curl_easy *data, bool pause)
|
||||
uint32_t window2 =
|
||||
nghttp2_session_get_stream_local_window_size(httpc->h2,
|
||||
stream->stream_id);
|
||||
DEBUGF(infof(data, "HTTP/2 window size is now %u for stream %u\n",
|
||||
DEBUGF(infof(data, "HTTP/2 window size is now %u for stream %u",
|
||||
window2, stream->stream_id));
|
||||
}
|
||||
#endif
|
||||
|
@ -126,7 +126,7 @@ CURLcode Curl_output_aws_sigv4(struct Curl_easy *data, bool proxy)
|
||||
tmp1 = strchr(tmp0, ':');
|
||||
len = tmp1 ? (size_t)(tmp1 - tmp0) : strlen(tmp0);
|
||||
if(len < 1) {
|
||||
infof(data, "first provider can't be empty\n");
|
||||
infof(data, "first provider can't be empty");
|
||||
ret = CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
goto fail;
|
||||
}
|
||||
@ -145,7 +145,7 @@ CURLcode Curl_output_aws_sigv4(struct Curl_easy *data, bool proxy)
|
||||
tmp1 = strchr(tmp0, ':');
|
||||
len = tmp1 ? (size_t)(tmp1 - tmp0) : strlen(tmp0);
|
||||
if(len < 1) {
|
||||
infof(data, "second provider can't be empty\n");
|
||||
infof(data, "second provider can't be empty");
|
||||
ret = CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
goto fail;
|
||||
}
|
||||
@ -165,7 +165,7 @@ CURLcode Curl_output_aws_sigv4(struct Curl_easy *data, bool proxy)
|
||||
tmp1 = strchr(tmp0, ':');
|
||||
len = tmp1 ? (size_t)(tmp1 - tmp0) : strlen(tmp0);
|
||||
if(len < 1) {
|
||||
infof(data, "region can't be empty\n");
|
||||
infof(data, "region can't be empty");
|
||||
ret = CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
goto fail;
|
||||
}
|
||||
@ -182,7 +182,7 @@ CURLcode Curl_output_aws_sigv4(struct Curl_easy *data, bool proxy)
|
||||
goto fail;
|
||||
}
|
||||
if(strlen(service) < 1) {
|
||||
infof(data, "service can't be empty\n");
|
||||
infof(data, "service can't be empty");
|
||||
ret = CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
goto fail;
|
||||
}
|
||||
@ -203,7 +203,7 @@ CURLcode Curl_output_aws_sigv4(struct Curl_easy *data, bool proxy)
|
||||
tmp1 = strchr(tmp0, '.');
|
||||
len = tmp1 - tmp0;
|
||||
if(!tmp1 || len < 1) {
|
||||
infof(data, "service missing in parameters or hostname\n");
|
||||
infof(data, "service missing in parameters or hostname");
|
||||
ret = CURLE_URL_MALFORMAT;
|
||||
goto fail;
|
||||
}
|
||||
@ -218,7 +218,7 @@ CURLcode Curl_output_aws_sigv4(struct Curl_easy *data, bool proxy)
|
||||
tmp1 = strchr(tmp0, '.');
|
||||
len = tmp1 - tmp0;
|
||||
if(!tmp1 || len < 1) {
|
||||
infof(data, "region missing in parameters or hostname\n");
|
||||
infof(data, "region missing in parameters or hostname");
|
||||
ret = CURLE_URL_MALFORMAT;
|
||||
goto fail;
|
||||
}
|
||||
|
@ -89,7 +89,7 @@ CURLcode Curl_input_negotiate(struct Curl_easy *data, struct connectdata *conn,
|
||||
neg_ctx->havenegdata = len != 0;
|
||||
if(!len) {
|
||||
if(state == GSS_AUTHSUCC) {
|
||||
infof(data, "Negotiate auth restarted\n");
|
||||
infof(data, "Negotiate auth restarted");
|
||||
Curl_http_auth_cleanup_negotiate(conn);
|
||||
}
|
||||
else if(state != GSS_AUTHNONE) {
|
||||
@ -142,11 +142,11 @@ CURLcode Curl_output_negotiate(struct Curl_easy *data,
|
||||
}
|
||||
|
||||
if(neg_ctx->noauthpersist ||
|
||||
(*state != GSS_AUTHDONE && *state != GSS_AUTHSUCC)) {
|
||||
(*state != GSS_AUTHDONE && *state != GSS_AUTHSUCC)) {
|
||||
|
||||
if(neg_ctx->noauthpersist && *state == GSS_AUTHSUCC) {
|
||||
infof(data, "Curl_output_negotiate, "
|
||||
"no persistent authentication: cleanup existing context");
|
||||
"no persistent authentication: cleanup existing context");
|
||||
Curl_http_auth_cleanup_negotiate(conn);
|
||||
}
|
||||
if(!neg_ctx->context) {
|
||||
|
@ -100,17 +100,17 @@ CURLcode Curl_input_ntlm(struct Curl_easy *data,
|
||||
}
|
||||
else {
|
||||
if(*state == NTLMSTATE_LAST) {
|
||||
infof(data, "NTLM auth restarted\n");
|
||||
infof(data, "NTLM auth restarted");
|
||||
Curl_http_auth_cleanup_ntlm(conn);
|
||||
}
|
||||
else if(*state == NTLMSTATE_TYPE3) {
|
||||
infof(data, "NTLM handshake rejected\n");
|
||||
infof(data, "NTLM handshake rejected");
|
||||
Curl_http_auth_cleanup_ntlm(conn);
|
||||
*state = NTLMSTATE_NONE;
|
||||
return CURLE_REMOTE_ACCESS_DENIED;
|
||||
}
|
||||
else if(*state >= NTLMSTATE_TYPE1) {
|
||||
infof(data, "NTLM handshake failure (internal error)\n");
|
||||
infof(data, "NTLM handshake failure (internal error)");
|
||||
return CURLE_REMOTE_ACCESS_DENIED;
|
||||
}
|
||||
|
||||
|
@ -169,7 +169,7 @@ static CURLcode connect_init(struct Curl_easy *data, bool reinit)
|
||||
s = calloc(1, sizeof(struct http_connect_state));
|
||||
if(!s)
|
||||
return CURLE_OUT_OF_MEMORY;
|
||||
infof(data, "allocate connect buffer!\n");
|
||||
infof(data, "allocate connect buffer!");
|
||||
conn->connect_state = s;
|
||||
Curl_dyn_init(&s->rcvbuf, DYN_PROXY_CONNECT_HEADERS);
|
||||
|
||||
@ -210,7 +210,7 @@ static void connect_done(struct Curl_easy *data)
|
||||
/* retore the protocol pointer */
|
||||
data->req.p.http = s->prot_save;
|
||||
s->prot_save = NULL;
|
||||
infof(data, "CONNECT phase completed!\n");
|
||||
infof(data, "CONNECT phase completed!");
|
||||
}
|
||||
}
|
||||
|
||||
@ -278,7 +278,7 @@ static CURLcode CONNECT(struct Curl_easy *data,
|
||||
char *hostheader = NULL;
|
||||
char *host = NULL;
|
||||
|
||||
infof(data, "Establish HTTP proxy tunnel to %s:%d\n",
|
||||
infof(data, "Establish HTTP proxy tunnel to %s:%d",
|
||||
hostname, remote_port);
|
||||
|
||||
/* This only happens if we've looped here due to authentication
|
||||
@ -419,7 +419,7 @@ static CURLcode CONNECT(struct Curl_easy *data,
|
||||
/* proxy auth was requested and there was proxy auth available,
|
||||
then deem this as "mere" proxy disconnect */
|
||||
conn->bits.proxy_connect_closed = TRUE;
|
||||
infof(data, "Proxy CONNECT connection closed\n");
|
||||
infof(data, "Proxy CONNECT connection closed");
|
||||
}
|
||||
else {
|
||||
error = SELECT_ERROR;
|
||||
@ -454,7 +454,7 @@ static CURLcode CONNECT(struct Curl_easy *data,
|
||||
r = Curl_httpchunk_read(data, &byte, 1, &tookcareof, &extra);
|
||||
if(r == CHUNKE_STOP) {
|
||||
/* we're done reading chunks! */
|
||||
infof(data, "chunk reading DONE\n");
|
||||
infof(data, "chunk reading DONE");
|
||||
s->keepon = KEEPON_DONE;
|
||||
/* we did the full CONNECT treatment, go COMPLETE */
|
||||
s->tunnel_state = TUNNEL_COMPLETE;
|
||||
@ -513,13 +513,13 @@ static CURLcode CONNECT(struct Curl_easy *data,
|
||||
|
||||
if(s->cl) {
|
||||
infof(data, "Ignore %" CURL_FORMAT_CURL_OFF_T
|
||||
" bytes of response-body\n", s->cl);
|
||||
" bytes of response-body", s->cl);
|
||||
}
|
||||
else if(s->chunked_encoding) {
|
||||
CHUNKcode r;
|
||||
CURLcode extra;
|
||||
|
||||
infof(data, "Ignore chunked response-body\n");
|
||||
infof(data, "Ignore chunked response-body");
|
||||
|
||||
/* We set ignorebody true here since the chunked decoder
|
||||
function will acknowledge that. Pay attention so that this is
|
||||
@ -536,7 +536,7 @@ static CURLcode CONNECT(struct Curl_easy *data,
|
||||
&extra);
|
||||
if(r == CHUNKE_STOP) {
|
||||
/* we're done reading chunks! */
|
||||
infof(data, "chunk reading DONE\n");
|
||||
infof(data, "chunk reading DONE");
|
||||
s->keepon = KEEPON_DONE;
|
||||
/* we did the full CONNECT treatment, go to COMPLETE */
|
||||
s->tunnel_state = TUNNEL_COMPLETE;
|
||||
@ -582,7 +582,7 @@ static CURLcode CONNECT(struct Curl_easy *data,
|
||||
/* A client MUST ignore any Content-Length or Transfer-Encoding
|
||||
header fields received in a successful response to CONNECT.
|
||||
"Successful" described as: 2xx (Successful). RFC 7231 4.3.6 */
|
||||
infof(data, "Ignoring Content-Length in CONNECT %03d response\n",
|
||||
infof(data, "Ignoring Content-Length in CONNECT %03d response",
|
||||
k->httpcode);
|
||||
}
|
||||
else {
|
||||
@ -598,11 +598,11 @@ static CURLcode CONNECT(struct Curl_easy *data,
|
||||
header fields received in a successful response to CONNECT.
|
||||
"Successful" described as: 2xx (Successful). RFC 7231 4.3.6 */
|
||||
infof(data, "Ignoring Transfer-Encoding in "
|
||||
"CONNECT %03d response\n", k->httpcode);
|
||||
"CONNECT %03d response", k->httpcode);
|
||||
}
|
||||
else if(Curl_compareheader(linep,
|
||||
"Transfer-Encoding:", "chunked")) {
|
||||
infof(data, "CONNECT responded chunked\n");
|
||||
infof(data, "CONNECT responded chunked");
|
||||
s->chunked_encoding = TRUE;
|
||||
/* init our chunky engine */
|
||||
Curl_httpchunk_init(data);
|
||||
@ -660,7 +660,7 @@ static CURLcode CONNECT(struct Curl_easy *data,
|
||||
if(data->info.httpproxycode/100 != 2) {
|
||||
if(s->close_connection && data->req.newurl) {
|
||||
conn->bits.proxy_connect_closed = TRUE;
|
||||
infof(data, "Connect me again please\n");
|
||||
infof(data, "Connect me again please");
|
||||
connect_done(data);
|
||||
}
|
||||
else {
|
||||
@ -695,7 +695,7 @@ static CURLcode CONNECT(struct Curl_easy *data,
|
||||
data->state.authproxy.done = TRUE;
|
||||
data->state.authproxy.multipass = FALSE;
|
||||
|
||||
infof(data, "Proxy replied %d to CONNECT request\n",
|
||||
infof(data, "Proxy replied %d to CONNECT request",
|
||||
data->info.httpproxycode);
|
||||
data->req.ignorebody = FALSE; /* put it (back) to non-ignore state */
|
||||
conn->bits.rewindaftersend = FALSE; /* make sure this isn't set for the
|
||||
@ -910,7 +910,7 @@ static CURLcode CONNECT(struct Curl_easy *data,
|
||||
if(data->info.httpproxycode/100 != 2) {
|
||||
if(conn->bits.close && data->req.newurl) {
|
||||
conn->bits.proxy_connect_closed = TRUE;
|
||||
infof(data, "Connect me again please\n");
|
||||
infof(data, "Connect me again please");
|
||||
connect_done(data);
|
||||
}
|
||||
else {
|
||||
|
20
lib/imap.c
20
lib/imap.c
@ -414,7 +414,7 @@ static void state(struct Curl_easy *data, imapstate newstate)
|
||||
};
|
||||
|
||||
if(imapc->state != newstate)
|
||||
infof(data, "IMAP %p state change from %s to %s\n",
|
||||
infof(data, "IMAP %p state change from %s to %s",
|
||||
(void *)imapc, names[imapc->state], names[newstate]);
|
||||
#endif
|
||||
|
||||
@ -606,7 +606,7 @@ static CURLcode imap_perform_authentication(struct Curl_easy *data,
|
||||
result = imap_perform_login(data, conn);
|
||||
else {
|
||||
/* Other mechanisms not supported */
|
||||
infof(data, "No known authentication mechanisms supported!\n");
|
||||
infof(data, "No known authentication mechanisms supported!");
|
||||
result = CURLE_LOGIN_DENIED;
|
||||
}
|
||||
}
|
||||
@ -861,7 +861,7 @@ static CURLcode imap_state_servergreet_resp(struct Curl_easy *data,
|
||||
/* PREAUTH */
|
||||
struct imap_conn *imapc = &conn->proto.imapc;
|
||||
imapc->preauth = TRUE;
|
||||
infof(data, "PREAUTH connection, already authenticated!\n");
|
||||
infof(data, "PREAUTH connection, already authenticated!");
|
||||
}
|
||||
else if(imapcode != IMAP_RESP_OK) {
|
||||
failf(data, "Got unexpected imap-server response");
|
||||
@ -1143,7 +1143,7 @@ static CURLcode imap_state_fetch_resp(struct Curl_easy *data,
|
||||
}
|
||||
|
||||
if(parsed) {
|
||||
infof(data, "Found %" CURL_FORMAT_CURL_OFF_T " bytes to download\n",
|
||||
infof(data, "Found %" CURL_FORMAT_CURL_OFF_T " bytes to download",
|
||||
size);
|
||||
Curl_pgrsSetDownloadSize(data, size);
|
||||
|
||||
@ -1169,7 +1169,7 @@ static CURLcode imap_state_fetch_resp(struct Curl_easy *data,
|
||||
data->req.bytecount += chunk;
|
||||
|
||||
infof(data, "Written %zu bytes, %" CURL_FORMAT_CURL_OFF_TU
|
||||
" bytes are left for transfer\n", chunk, size - chunk);
|
||||
" bytes are left for transfer", chunk, size - chunk);
|
||||
|
||||
/* Have we used the entire cache or just part of it?*/
|
||||
if(pp->cache_size > chunk) {
|
||||
@ -1543,7 +1543,7 @@ static CURLcode imap_perform(struct Curl_easy *data, bool *connected,
|
||||
struct imap_conn *imapc = &conn->proto.imapc;
|
||||
bool selected = FALSE;
|
||||
|
||||
DEBUGF(infof(data, "DO phase starts\n"));
|
||||
DEBUGF(infof(data, "DO phase starts"));
|
||||
|
||||
if(data->set.opt_no_body) {
|
||||
/* Requested no body means no transfer */
|
||||
@ -1590,7 +1590,7 @@ static CURLcode imap_perform(struct Curl_easy *data, bool *connected,
|
||||
*connected = conn->bits.tcpconnect[FIRSTSOCKET];
|
||||
|
||||
if(*dophase_done)
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
|
||||
return result;
|
||||
}
|
||||
@ -1682,11 +1682,11 @@ static CURLcode imap_doing(struct Curl_easy *data, bool *dophase_done)
|
||||
CURLcode result = imap_multi_statemach(data, dophase_done);
|
||||
|
||||
if(result)
|
||||
DEBUGF(infof(data, "DO phase failed\n"));
|
||||
DEBUGF(infof(data, "DO phase failed"));
|
||||
else if(*dophase_done) {
|
||||
result = imap_dophase_done(data, FALSE /* not connected */);
|
||||
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
|
||||
return result;
|
||||
@ -2017,7 +2017,7 @@ static CURLcode imap_parse_url_path(struct Curl_easy *data)
|
||||
return result;
|
||||
}
|
||||
|
||||
DEBUGF(infof(data, "IMAP URL parameter '%s' = '%s'\n", name, value));
|
||||
DEBUGF(infof(data, "IMAP URL parameter '%s' = '%s'", name, value));
|
||||
|
||||
/* Process the known hierarchical parameters (UIDVALIDITY, UID, SECTION and
|
||||
PARTIAL) stripping of the trailing slash character if it is present.
|
||||
|
23
lib/krb5.c
23
lib/krb5.c
@ -263,7 +263,7 @@ krb5_auth(void *app_data, struct Curl_easy *data, struct connectdata *conn)
|
||||
}
|
||||
/* We pass NULL as |output_name_type| to avoid a leak. */
|
||||
gss_display_name(&min, gssname, &output_buffer, NULL);
|
||||
Curl_infof(data, "Trying against %s\n", output_buffer.value);
|
||||
infof(data, "Trying against %s", output_buffer.value);
|
||||
gssresp = GSS_C_NO_BUFFER;
|
||||
*context = GSS_C_NO_CONTEXT;
|
||||
|
||||
@ -290,7 +290,7 @@ krb5_auth(void *app_data, struct Curl_easy *data, struct connectdata *conn)
|
||||
}
|
||||
|
||||
if(GSS_ERROR(maj)) {
|
||||
Curl_infof(data, "Error creating security context\n");
|
||||
infof(data, "Error creating security context");
|
||||
ret = AUTH_ERROR;
|
||||
break;
|
||||
}
|
||||
@ -301,8 +301,7 @@ krb5_auth(void *app_data, struct Curl_easy *data, struct connectdata *conn)
|
||||
result = Curl_base64_encode(data, (char *)output_buffer.value,
|
||||
output_buffer.length, &p, &base64_sz);
|
||||
if(result) {
|
||||
Curl_infof(data, "base64-encoding: %s\n",
|
||||
curl_easy_strerror(result));
|
||||
infof(data, "base64-encoding: %s", curl_easy_strerror(result));
|
||||
ret = AUTH_ERROR;
|
||||
break;
|
||||
}
|
||||
@ -327,7 +326,7 @@ krb5_auth(void *app_data, struct Curl_easy *data, struct connectdata *conn)
|
||||
}
|
||||
|
||||
if(data->state.buffer[0] != '2' && data->state.buffer[0] != '3') {
|
||||
Curl_infof(data, "Server didn't accept auth data\n");
|
||||
infof(data, "Server didn't accept auth data");
|
||||
ret = AUTH_ERROR;
|
||||
break;
|
||||
}
|
||||
@ -629,7 +628,7 @@ static void do_sec_send(struct Curl_easy *data, struct connectdata *conn,
|
||||
|
||||
socket_write(data, fd, cmd_buffer, cmd_size);
|
||||
socket_write(data, fd, "\r\n", 2);
|
||||
infof(data, "Send: %s%s\n", prot_level == PROT_PRIVATE?enc:mic,
|
||||
infof(data, "Send: %s%s", prot_level == PROT_PRIVATE?enc:mic,
|
||||
cmd_buffer);
|
||||
free(cmd_buffer);
|
||||
}
|
||||
@ -738,7 +737,7 @@ static int sec_set_protection_level(struct Curl_easy *data)
|
||||
|
||||
if(!conn->sec_complete) {
|
||||
infof(data, "Trying to change the protection level after the"
|
||||
" completion of the data exchange.\n");
|
||||
" completion of the data exchange.");
|
||||
return -1;
|
||||
}
|
||||
|
||||
@ -815,13 +814,13 @@ static CURLcode choose_mech(struct Curl_easy *data, struct connectdata *conn)
|
||||
if(mech->init) {
|
||||
ret = mech->init(conn->app_data);
|
||||
if(ret) {
|
||||
infof(data, "Failed initialization for %s. Skipping it.\n",
|
||||
infof(data, "Failed initialization for %s. Skipping it.",
|
||||
mech->name);
|
||||
return CURLE_FAILED_INIT;
|
||||
}
|
||||
}
|
||||
|
||||
infof(data, "Trying mechanism %s...\n", mech->name);
|
||||
infof(data, "Trying mechanism %s...", mech->name);
|
||||
ret = ftp_send_command(data, "AUTH %s", mech->name);
|
||||
if(ret < 0)
|
||||
return CURLE_COULDNT_CONNECT;
|
||||
@ -830,15 +829,15 @@ static CURLcode choose_mech(struct Curl_easy *data, struct connectdata *conn)
|
||||
switch(ret) {
|
||||
case 504:
|
||||
infof(data, "Mechanism %s is not supported by the server (server "
|
||||
"returned ftp code: 504).\n", mech->name);
|
||||
"returned ftp code: 504).", mech->name);
|
||||
break;
|
||||
case 534:
|
||||
infof(data, "Mechanism %s was rejected by the server (server returned "
|
||||
"ftp code: 534).\n", mech->name);
|
||||
"ftp code: 534).", mech->name);
|
||||
break;
|
||||
default:
|
||||
if(ret/100 == 5) {
|
||||
infof(data, "server does not support the security extensions\n");
|
||||
infof(data, "server does not support the security extensions");
|
||||
return CURLE_USE_SSL_FAILED;
|
||||
}
|
||||
break;
|
||||
|
20
lib/ldap.c
20
lib/ldap.c
@ -296,9 +296,9 @@ static CURLcode ldap_do(struct Curl_easy *data, bool *done)
|
||||
char *passwd = NULL;
|
||||
|
||||
*done = TRUE; /* unconditionally */
|
||||
infof(data, "LDAP local: LDAP Vendor = %s ; LDAP Version = %d\n",
|
||||
infof(data, "LDAP local: LDAP Vendor = %s ; LDAP Version = %d",
|
||||
LDAP_VENDOR_NAME, LDAP_VENDOR_VERSION);
|
||||
infof(data, "LDAP local: %s\n", data->state.url);
|
||||
infof(data, "LDAP local: %s", data->state.url);
|
||||
|
||||
#ifdef HAVE_LDAP_URL_PARSE
|
||||
rc = ldap_url_parse(data->state.url, &ludp);
|
||||
@ -314,7 +314,7 @@ static CURLcode ldap_do(struct Curl_easy *data, bool *done)
|
||||
/* Get the URL scheme (either ldap or ldaps) */
|
||||
if(conn->given->flags & PROTOPT_SSL)
|
||||
ldap_ssl = 1;
|
||||
infof(data, "LDAP local: trying to establish %s connection\n",
|
||||
infof(data, "LDAP local: trying to establish %s connection",
|
||||
ldap_ssl ? "encrypted" : "cleartext");
|
||||
|
||||
#if defined(USE_WIN32_LDAP)
|
||||
@ -366,14 +366,14 @@ static CURLcode ldap_do(struct Curl_easy *data, bool *done)
|
||||
result = CURLE_SSL_CERTPROBLEM;
|
||||
goto quit;
|
||||
}
|
||||
infof(data, "LDAP local: using %s CA cert '%s'\n",
|
||||
(cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"),
|
||||
ldap_ca);
|
||||
infof(data, "LDAP local: using %s CA cert '%s'",
|
||||
(cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"),
|
||||
ldap_ca);
|
||||
rc = ldapssl_add_trusted_cert(ldap_ca, cert_type);
|
||||
if(rc != LDAP_SUCCESS) {
|
||||
failf(data, "LDAP local: ERROR setting %s CA cert: %s",
|
||||
(cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"),
|
||||
ldap_err2string(rc));
|
||||
(cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"),
|
||||
ldap_err2string(rc));
|
||||
result = CURLE_SSL_CERTPROBLEM;
|
||||
goto quit;
|
||||
}
|
||||
@ -409,7 +409,7 @@ static CURLcode ldap_do(struct Curl_easy *data, bool *done)
|
||||
result = CURLE_SSL_CERTPROBLEM;
|
||||
goto quit;
|
||||
}
|
||||
infof(data, "LDAP local: using PEM CA cert: %s\n", ldap_ca);
|
||||
infof(data, "LDAP local: using PEM CA cert: %s", ldap_ca);
|
||||
rc = ldap_set_option(NULL, LDAP_OPT_X_TLS_CACERTFILE, ldap_ca);
|
||||
if(rc != LDAP_SUCCESS) {
|
||||
failf(data, "LDAP local: ERROR setting PEM CA cert: %s",
|
||||
@ -718,7 +718,7 @@ quit:
|
||||
LDAP_TRACE(("Received %d entries\n", num));
|
||||
}
|
||||
if(rc == LDAP_SIZELIMIT_EXCEEDED)
|
||||
infof(data, "There are more than %d entries\n", num);
|
||||
infof(data, "There are more than %d entries", num);
|
||||
if(ludp)
|
||||
ldap_free_urldesc(ludp);
|
||||
if(server)
|
||||
|
16
lib/mqtt.c
16
lib/mqtt.c
@ -297,7 +297,7 @@ static CURLcode mqtt_connect(struct Curl_easy *data)
|
||||
result = CURLE_WEIRD_SERVER_REPLY;
|
||||
goto end;
|
||||
}
|
||||
infof(data, "Using client id '%s'\n", client_id);
|
||||
infof(data, "Using client id '%s'", client_id);
|
||||
|
||||
/* position where starts the user payload */
|
||||
start_user = pos + 3 + MQTT_CLIENTID_LEN;
|
||||
@ -560,7 +560,7 @@ static void mqstate(struct Curl_easy *data,
|
||||
struct connectdata *conn = data->conn;
|
||||
struct mqtt_conn *mqtt = &conn->proto.mqtt;
|
||||
#ifdef CURLDEBUG
|
||||
infof(data, "%s (from %s) (next is %s)\n",
|
||||
infof(data, "%s (from %s) (next is %s)",
|
||||
statenames[state],
|
||||
statenames[mqtt->state],
|
||||
(state == MQTT_FIRST)? statenames[nextstate] : "");
|
||||
@ -607,7 +607,7 @@ static CURLcode mqtt_read_publish(struct Curl_easy *data, bool *done)
|
||||
goto MQTT_SUBACK_COMING;
|
||||
}
|
||||
else if(packet == MQTT_MSG_DISCONNECT) {
|
||||
infof(data, "Got DISCONNECT\n");
|
||||
infof(data, "Got DISCONNECT");
|
||||
*done = TRUE;
|
||||
goto end;
|
||||
}
|
||||
@ -618,7 +618,7 @@ static CURLcode mqtt_read_publish(struct Curl_easy *data, bool *done)
|
||||
|
||||
/* -- switched state -- */
|
||||
remlen = mq->remaining_length;
|
||||
infof(data, "Remaining length: %zd bytes\n", remlen);
|
||||
infof(data, "Remaining length: %zd bytes", remlen);
|
||||
if(data->set.max_filesize &&
|
||||
(curl_off_t)remlen > data->set.max_filesize) {
|
||||
failf(data, "Maximum file size exceeded");
|
||||
@ -639,12 +639,12 @@ static CURLcode mqtt_read_publish(struct Curl_easy *data, bool *done)
|
||||
result = Curl_read(data, sockfd, (char *)pkt, rest, &nread);
|
||||
if(result) {
|
||||
if(CURLE_AGAIN == result) {
|
||||
infof(data, "EEEE AAAAGAIN\n");
|
||||
infof(data, "EEEE AAAAGAIN");
|
||||
}
|
||||
goto end;
|
||||
}
|
||||
if(!nread) {
|
||||
infof(data, "server disconnected\n");
|
||||
infof(data, "server disconnected");
|
||||
result = CURLE_PARTIAL_FILE;
|
||||
goto end;
|
||||
}
|
||||
@ -710,7 +710,7 @@ static CURLcode mqtt_doing(struct Curl_easy *data, bool *done)
|
||||
return result;
|
||||
}
|
||||
|
||||
infof(data, "mqtt_doing: state [%d]\n", (int) mqtt->state);
|
||||
infof(data, "mqtt_doing: state [%d]", (int) mqtt->state);
|
||||
switch(mqtt->state) {
|
||||
case MQTT_FIRST:
|
||||
/* Read the initial byte only */
|
||||
@ -745,7 +745,7 @@ static CURLcode mqtt_doing(struct Curl_easy *data, bool *done)
|
||||
mqstate(data, MQTT_FIRST, MQTT_FIRST);
|
||||
|
||||
if(mq->firstbyte == MQTT_MSG_DISCONNECT) {
|
||||
infof(data, "Got DISCONNECT\n");
|
||||
infof(data, "Got DISCONNECT");
|
||||
*done = TRUE;
|
||||
}
|
||||
break;
|
||||
|
22
lib/multi.c
22
lib/multi.c
@ -169,7 +169,7 @@ static void mstate(struct Curl_easy *data, CURLMstate state
|
||||
connection_id = data->conn->connection_id;
|
||||
|
||||
infof(data,
|
||||
"STATE: %s => %s handle %p; line %d (connection #%ld)\n",
|
||||
"STATE: %s => %s handle %p; line %d (connection #%ld)",
|
||||
statename[oldstate], statename[data->mstate],
|
||||
(void *)data, lineno, connection_id);
|
||||
}
|
||||
@ -562,7 +562,7 @@ static CURLcode multi_done(struct Curl_easy *data,
|
||||
struct connectdata *conn = data->conn;
|
||||
unsigned int i;
|
||||
|
||||
DEBUGF(infof(data, "multi_done\n"));
|
||||
DEBUGF(infof(data, "multi_done"));
|
||||
|
||||
if(data->state.done)
|
||||
/* Stop if multi_done() has already been called */
|
||||
@ -610,7 +610,7 @@ static CURLcode multi_done(struct Curl_easy *data,
|
||||
/* Stop if still used. */
|
||||
CONNCACHE_UNLOCK(data);
|
||||
DEBUGF(infof(data, "Connection still in use %zu, "
|
||||
"no more multi_done now!\n",
|
||||
"no more multi_done now!",
|
||||
conn->easyq.size));
|
||||
return CURLE_OK;
|
||||
}
|
||||
@ -687,7 +687,7 @@ static CURLcode multi_done(struct Curl_easy *data,
|
||||
if(Curl_conncache_return_conn(data, conn)) {
|
||||
/* remember the most recently used connection */
|
||||
data->state.lastconnect_id = conn->connection_id;
|
||||
infof(data, "%s\n", buffer);
|
||||
infof(data, "%s", buffer);
|
||||
}
|
||||
else
|
||||
data->state.lastconnect_id = -1;
|
||||
@ -1740,7 +1740,7 @@ static CURLMcode multi_runsingle(struct Curl_multi *multi,
|
||||
rc = CURLM_OK;
|
||||
|
||||
if(multi_ischanged(multi, TRUE)) {
|
||||
DEBUGF(infof(data, "multi changed, check CONNECT_PEND queue!\n"));
|
||||
DEBUGF(infof(data, "multi changed, check CONNECT_PEND queue!"));
|
||||
process_pending_handles(multi); /* multiplexed */
|
||||
}
|
||||
|
||||
@ -1816,7 +1816,7 @@ static CURLMcode multi_runsingle(struct Curl_multi *multi,
|
||||
}
|
||||
else if(data->state.previouslypending) {
|
||||
/* this transfer comes from the pending queue so try move another */
|
||||
infof(data, "Transfer was pending, now try another\n");
|
||||
infof(data, "Transfer was pending, now try another");
|
||||
process_pending_handles(data->multi);
|
||||
}
|
||||
|
||||
@ -1871,7 +1871,7 @@ static CURLMcode multi_runsingle(struct Curl_multi *multi,
|
||||
data->state.async.done = TRUE;
|
||||
#endif
|
||||
result = CURLE_OK;
|
||||
infof(data, "Hostname '%s' was found in DNS cache\n", hostname);
|
||||
infof(data, "Hostname '%s' was found in DNS cache", hostname);
|
||||
}
|
||||
|
||||
if(!dns)
|
||||
@ -2303,7 +2303,7 @@ static CURLMcode multi_runsingle(struct Curl_multi *multi,
|
||||
CURLcode ret = Curl_retry_request(data, &newurl);
|
||||
|
||||
if(!ret) {
|
||||
infof(data, "Downgrades to HTTP/1.1!\n");
|
||||
infof(data, "Downgrades to HTTP/1.1!");
|
||||
streamclose(data->conn, "Disconnect HTTP/2 for HTTP/1");
|
||||
data->state.httpwant = CURL_HTTP_VERSION_1_1;
|
||||
/* clear the error message bit too as we ignore the one we got */
|
||||
@ -3378,7 +3378,7 @@ void Curl_expire(struct Curl_easy *data, timediff_t milli, expire_id id)
|
||||
rc = Curl_splayremove(multi->timetree, &data->state.timenode,
|
||||
&multi->timetree);
|
||||
if(rc)
|
||||
infof(data, "Internal error removing splay node = %d\n", rc);
|
||||
infof(data, "Internal error removing splay node = %d", rc);
|
||||
}
|
||||
|
||||
/* Indicate that we are in the splay tree and insert the new timer expiry
|
||||
@ -3425,7 +3425,7 @@ void Curl_expire_clear(struct Curl_easy *data)
|
||||
rc = Curl_splayremove(multi->timetree, &data->state.timenode,
|
||||
&multi->timetree);
|
||||
if(rc)
|
||||
infof(data, "Internal error clearing splay node = %d\n", rc);
|
||||
infof(data, "Internal error clearing splay node = %d", rc);
|
||||
|
||||
/* flush the timeout list too */
|
||||
while(list->size > 0) {
|
||||
@ -3433,7 +3433,7 @@ void Curl_expire_clear(struct Curl_easy *data)
|
||||
}
|
||||
|
||||
#ifdef DEBUGBUILD
|
||||
infof(data, "Expire cleared (transfer %p)\n", data);
|
||||
infof(data, "Expire cleared (transfer %p)", data);
|
||||
#endif
|
||||
nowp->tv_sec = 0;
|
||||
nowp->tv_usec = 0;
|
||||
|
@ -400,7 +400,7 @@ static CURLcode oldap_do(struct Curl_easy *data, bool *done)
|
||||
|
||||
connkeep(conn, "OpenLDAP do");
|
||||
|
||||
infof(data, "LDAP local: %s\n", data->state.url);
|
||||
infof(data, "LDAP local: %s", data->state.url);
|
||||
|
||||
rc = ldap_url_parse(data->state.url, &ludp);
|
||||
if(rc != LDAP_URL_SUCCESS) {
|
||||
@ -510,7 +510,7 @@ static ssize_t oldap_recv(struct Curl_easy *data, int sockindex, char *buf,
|
||||
else {
|
||||
/* successful */
|
||||
if(code == LDAP_SIZELIMIT_EXCEEDED)
|
||||
infof(data, "There are more than %d entries\n", lr->nument);
|
||||
infof(data, "There are more than %d entries", lr->nument);
|
||||
data->req.size = data->req.bytecount;
|
||||
*err = CURLE_OK;
|
||||
ret = 0;
|
||||
|
@ -402,7 +402,7 @@ CURLcode Curl_pp_readresp(struct Curl_easy *data,
|
||||
clipamount = gotbytes - i;
|
||||
restart = TRUE;
|
||||
DEBUGF(infof(data, "Curl_pp_readresp_ %d bytes of trailing "
|
||||
"server response left\n",
|
||||
"server response left",
|
||||
(int)clipamount));
|
||||
}
|
||||
else if(keepon) {
|
||||
@ -412,7 +412,7 @@ CURLcode Curl_pp_readresp(struct Curl_easy *data,
|
||||
with it. We keep the first bytes of the line then we throw
|
||||
away the rest. */
|
||||
infof(data, "Excessive server response line length received, "
|
||||
"%zd bytes. Stripping\n", gotbytes);
|
||||
"%zd bytes. Stripping", gotbytes);
|
||||
restart = TRUE;
|
||||
|
||||
/* we keep 40 bytes since all our pingpong protocols are only
|
||||
|
12
lib/pop3.c
12
lib/pop3.c
@ -308,7 +308,7 @@ static void state(struct Curl_easy *data, pop3state newstate)
|
||||
};
|
||||
|
||||
if(pop3c->state != newstate)
|
||||
infof(data, "POP3 %p state change from %s to %s\n",
|
||||
infof(data, "POP3 %p state change from %s to %s",
|
||||
(void *)pop3c, names[pop3c->state], names[newstate]);
|
||||
#endif
|
||||
|
||||
@ -552,7 +552,7 @@ static CURLcode pop3_perform_authentication(struct Curl_easy *data,
|
||||
result = pop3_perform_user(data, conn);
|
||||
else {
|
||||
/* Other mechanisms not supported */
|
||||
infof(data, "No known authentication mechanisms supported!\n");
|
||||
infof(data, "No known authentication mechanisms supported!");
|
||||
result = CURLE_LOGIN_DENIED;
|
||||
}
|
||||
}
|
||||
@ -1173,7 +1173,7 @@ static CURLcode pop3_perform(struct Curl_easy *data, bool *connected,
|
||||
struct connectdata *conn = data->conn;
|
||||
struct POP3 *pop3 = data->req.p.pop3;
|
||||
|
||||
DEBUGF(infof(data, "DO phase starts\n"));
|
||||
DEBUGF(infof(data, "DO phase starts"));
|
||||
|
||||
if(data->set.opt_no_body) {
|
||||
/* Requested no body means no transfer */
|
||||
@ -1192,7 +1192,7 @@ static CURLcode pop3_perform(struct Curl_easy *data, bool *connected,
|
||||
*connected = conn->bits.tcpconnect[FIRSTSOCKET];
|
||||
|
||||
if(*dophase_done)
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
|
||||
return result;
|
||||
}
|
||||
@ -1275,11 +1275,11 @@ static CURLcode pop3_doing(struct Curl_easy *data, bool *dophase_done)
|
||||
CURLcode result = pop3_multi_statemach(data, dophase_done);
|
||||
|
||||
if(result)
|
||||
DEBUGF(infof(data, "DO phase failed\n"));
|
||||
DEBUGF(infof(data, "DO phase failed"));
|
||||
else if(*dophase_done) {
|
||||
result = pop3_dophase_done(data, FALSE /* not connected */);
|
||||
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
|
||||
return result;
|
||||
|
@ -5,7 +5,7 @@
|
||||
* | (__| |_| | _ <| |___
|
||||
* \___|\___/|_| \_\_____|
|
||||
*
|
||||
* Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
* Copyright (C) 1998 - 2021, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
*
|
||||
* This software is licensed as described in the file COPYING, which
|
||||
* you should have received as part of this distribution. The terms
|
||||
@ -87,7 +87,7 @@ static CURLcode randit(struct Curl_easy *data, unsigned int *rnd)
|
||||
|
||||
if(!seeded) {
|
||||
struct curltime now = Curl_now();
|
||||
infof(data, "WARNING: Using weak random seed\n");
|
||||
infof(data, "WARNING: Using weak random seed");
|
||||
randseed += (unsigned int)now.tv_usec + (unsigned int)now.tv_sec;
|
||||
randseed = randseed * 1103515245 + 12345;
|
||||
randseed = randseed * 1103515245 + 12345;
|
||||
|
@ -231,7 +231,7 @@ static CURLcode rtsp_done(struct Curl_easy *data,
|
||||
}
|
||||
if(data->set.rtspreq == RTSPREQ_RECEIVE &&
|
||||
(data->conn->proto.rtspc.rtp_channel == -1)) {
|
||||
infof(data, "Got an RTP Receive with a CSeq of %ld\n", CSeq_recv);
|
||||
infof(data, "Got an RTP Receive with a CSeq of %ld", CSeq_recv);
|
||||
}
|
||||
}
|
||||
|
||||
@ -651,7 +651,7 @@ static CURLcode rtsp_rtp_readwrite(struct Curl_easy *data,
|
||||
}
|
||||
/* We have the full RTP interleaved packet
|
||||
* Write out the header including the leading '$' */
|
||||
DEBUGF(infof(data, "RTP write channel %d rtp_length %d\n",
|
||||
DEBUGF(infof(data, "RTP write channel %d rtp_length %d",
|
||||
rtspc->rtp_channel, rtp_length));
|
||||
result = rtp_client_write(data, &rtp[0], rtp_length + 4);
|
||||
if(result) {
|
||||
@ -682,7 +682,7 @@ static CURLcode rtsp_rtp_readwrite(struct Curl_easy *data,
|
||||
}
|
||||
|
||||
if(rtp_dataleft && rtp[0] == '$') {
|
||||
DEBUGF(infof(data, "RTP Rewinding %zd %s\n", rtp_dataleft,
|
||||
DEBUGF(infof(data, "RTP Rewinding %zd %s", rtp_dataleft,
|
||||
*readmore ? "(READMORE)" : ""));
|
||||
|
||||
/* Store the incomplete RTP packet for a "rewind" */
|
||||
|
24
lib/sendf.c
24
lib/sendf.c
@ -236,29 +236,22 @@ bool Curl_recv_has_postponed_data(struct connectdata *conn, int sockindex)
|
||||
#endif /* ! USE_RECV_BEFORE_SEND_WORKAROUND */
|
||||
|
||||
/* Curl_infof() is for info message along the way */
|
||||
#define MAXINFO 2048
|
||||
|
||||
void Curl_infof(struct Curl_easy *data, const char *fmt, ...)
|
||||
{
|
||||
DEBUGASSERT(!strchr(fmt, '\n'));
|
||||
if(data && data->set.verbose) {
|
||||
va_list ap;
|
||||
size_t len;
|
||||
char print_buffer[2048 + 1];
|
||||
char buffer[MAXINFO + 2];
|
||||
va_start(ap, fmt);
|
||||
len = mvsnprintf(print_buffer, sizeof(print_buffer), fmt, ap);
|
||||
/*
|
||||
* Indicate truncation of the input by replacing the last 3 characters
|
||||
* with "...", and transfer the newline over in case the format had one.
|
||||
*/
|
||||
if(len >= sizeof(print_buffer)) {
|
||||
len = strlen(fmt);
|
||||
if(fmt[--len] == '\n')
|
||||
msnprintf(print_buffer + (sizeof(print_buffer) - 5), 5, "...\n");
|
||||
else
|
||||
msnprintf(print_buffer + (sizeof(print_buffer) - 4), 4, "...");
|
||||
}
|
||||
(void)mvsnprintf(buffer, MAXINFO, fmt, ap);
|
||||
len = strlen(buffer);
|
||||
va_end(ap);
|
||||
len = strlen(print_buffer);
|
||||
Curl_debug(data, CURLINFO_TEXT, print_buffer, len);
|
||||
buffer[len++] = '\n';
|
||||
buffer[len] = '\0';
|
||||
Curl_debug(data, CURLINFO_TEXT, buffer, len);
|
||||
}
|
||||
}
|
||||
|
||||
@ -282,6 +275,7 @@ void Curl_failf(struct Curl_easy *data, const char *fmt, ...)
|
||||
data->state.errorbuf = TRUE; /* wrote error string */
|
||||
}
|
||||
error[len++] = '\n';
|
||||
error[len] = '\0';
|
||||
Curl_debug(data, CURLINFO_TEXT, error, len);
|
||||
va_end(ap);
|
||||
}
|
||||
|
@ -204,7 +204,7 @@ static void conn_state(struct Curl_easy *data, enum smb_conn_state newstate)
|
||||
};
|
||||
|
||||
if(smbc->state != newstate)
|
||||
infof(data, "SMB conn %p state change from %s to %s\n",
|
||||
infof(data, "SMB conn %p state change from %s to %s",
|
||||
(void *)smbc, names[smbc->state], names[newstate]);
|
||||
#endif
|
||||
|
||||
@ -230,7 +230,7 @@ static void request_state(struct Curl_easy *data,
|
||||
};
|
||||
|
||||
if(req->state != newstate)
|
||||
infof(data, "SMB request %p state change from %s to %s\n",
|
||||
infof(data, "SMB request %p state change from %s to %s",
|
||||
(void *)req, names[req->state], names[newstate]);
|
||||
#endif
|
||||
|
||||
|
12
lib/smtp.c
12
lib/smtp.c
@ -308,7 +308,7 @@ static void state(struct Curl_easy *data, smtpstate newstate)
|
||||
};
|
||||
|
||||
if(smtpc->state != newstate)
|
||||
infof(data, "SMTP %p state change from %s to %s\n",
|
||||
infof(data, "SMTP %p state change from %s to %s",
|
||||
(void *)smtpc, names[smtpc->state], names[newstate]);
|
||||
#endif
|
||||
|
||||
@ -485,7 +485,7 @@ static CURLcode smtp_perform_authentication(struct Curl_easy *data)
|
||||
state(data, SMTP_AUTH);
|
||||
else {
|
||||
/* Other mechanisms not supported */
|
||||
infof(data, "No known authentication mechanisms supported!\n");
|
||||
infof(data, "No known authentication mechanisms supported!");
|
||||
result = CURLE_LOGIN_DENIED;
|
||||
}
|
||||
}
|
||||
@ -1456,7 +1456,7 @@ static CURLcode smtp_perform(struct Curl_easy *data, bool *connected,
|
||||
struct connectdata *conn = data->conn;
|
||||
struct SMTP *smtp = data->req.p.smtp;
|
||||
|
||||
DEBUGF(infof(data, "DO phase starts\n"));
|
||||
DEBUGF(infof(data, "DO phase starts"));
|
||||
|
||||
if(data->set.opt_no_body) {
|
||||
/* Requested no body means no transfer */
|
||||
@ -1496,7 +1496,7 @@ static CURLcode smtp_perform(struct Curl_easy *data, bool *connected,
|
||||
*connected = conn->bits.tcpconnect[FIRSTSOCKET];
|
||||
|
||||
if(*dophase_done)
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
|
||||
return result;
|
||||
}
|
||||
@ -1580,11 +1580,11 @@ static CURLcode smtp_doing(struct Curl_easy *data, bool *dophase_done)
|
||||
CURLcode result = smtp_multi_statemach(data, dophase_done);
|
||||
|
||||
if(result)
|
||||
DEBUGF(infof(data, "DO phase failed\n"));
|
||||
DEBUGF(infof(data, "DO phase failed"));
|
||||
else if(*dophase_done) {
|
||||
result = smtp_dophase_done(data, FALSE /* not connected */);
|
||||
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
|
||||
return result;
|
||||
|
30
lib/socks.c
30
lib/socks.c
@ -148,7 +148,7 @@ static void socksstate(struct Curl_easy *data,
|
||||
|
||||
#if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS)
|
||||
infof(data,
|
||||
"SXSTATE: %s => %s conn %p; line %d\n",
|
||||
"SXSTATE: %s => %s conn %p; line %d",
|
||||
statename[oldstate], statename[conn->cnnct.state], conn,
|
||||
lineno);
|
||||
#endif
|
||||
@ -214,10 +214,10 @@ CURLproxycode Curl_SOCKS4(const char *proxy_user,
|
||||
/* SOCKS4 can only do IPv4, insist! */
|
||||
conn->ip_version = CURL_IPRESOLVE_V4;
|
||||
if(conn->bits.httpproxy)
|
||||
infof(data, "SOCKS4%s: connecting to HTTP proxy %s port %d\n",
|
||||
infof(data, "SOCKS4%s: connecting to HTTP proxy %s port %d",
|
||||
protocol4a ? "a" : "", hostname, remote_port);
|
||||
|
||||
infof(data, "SOCKS4 communication to %s:%d\n", hostname, remote_port);
|
||||
infof(data, "SOCKS4 communication to %s:%d", hostname, remote_port);
|
||||
|
||||
/*
|
||||
* Compose socks4 request
|
||||
@ -244,7 +244,7 @@ CURLproxycode Curl_SOCKS4(const char *proxy_user,
|
||||
return CURLPX_RESOLVE_HOST;
|
||||
else if(rc == CURLRESOLV_PENDING) {
|
||||
sxstate(data, CONNECT_RESOLVING);
|
||||
infof(data, "SOCKS4 non-blocking resolve of %s\n", hostname);
|
||||
infof(data, "SOCKS4 non-blocking resolve of %s", hostname);
|
||||
return CURLPX_OK;
|
||||
}
|
||||
sxstate(data, CONNECT_RESOLVED);
|
||||
@ -264,7 +264,7 @@ CURLproxycode Curl_SOCKS4(const char *proxy_user,
|
||||
data->state.async.dns = dns;
|
||||
data->state.async.done = TRUE;
|
||||
#endif
|
||||
infof(data, "Hostname '%s' was found\n", hostname);
|
||||
infof(data, "Hostname '%s' was found", hostname);
|
||||
sxstate(data, CONNECT_RESOLVED);
|
||||
}
|
||||
else {
|
||||
@ -301,7 +301,7 @@ CURLproxycode Curl_SOCKS4(const char *proxy_user,
|
||||
socksreq[6] = ((unsigned char *)&saddr_in->sin_addr.s_addr)[2];
|
||||
socksreq[7] = ((unsigned char *)&saddr_in->sin_addr.s_addr)[3];
|
||||
|
||||
infof(data, "SOCKS4 connect to IPv4 %s (locally resolved)\n", buf);
|
||||
infof(data, "SOCKS4 connect to IPv4 %s (locally resolved)", buf);
|
||||
|
||||
Curl_resolv_unlock(data, dns); /* not used anymore from now on */
|
||||
}
|
||||
@ -437,7 +437,7 @@ CURLproxycode Curl_SOCKS4(const char *proxy_user,
|
||||
/* Result */
|
||||
switch(socksreq[1]) {
|
||||
case 90:
|
||||
infof(data, "SOCKS4%s request granted.\n", protocol4a?"a":"");
|
||||
infof(data, "SOCKS4%s request granted.", protocol4a?"a":"");
|
||||
break;
|
||||
case 91:
|
||||
failf(data,
|
||||
@ -530,19 +530,19 @@ CURLproxycode Curl_SOCKS5(const char *proxy_user,
|
||||
switch(sx->state) {
|
||||
case CONNECT_SOCKS_INIT:
|
||||
if(conn->bits.httpproxy)
|
||||
infof(data, "SOCKS5: connecting to HTTP proxy %s port %d\n",
|
||||
infof(data, "SOCKS5: connecting to HTTP proxy %s port %d",
|
||||
hostname, remote_port);
|
||||
|
||||
/* RFC1928 chapter 5 specifies max 255 chars for domain name in packet */
|
||||
if(!socks5_resolve_local && hostname_len > 255) {
|
||||
infof(data, "SOCKS5: server resolving disabled for hostnames of "
|
||||
"length > 255 [actual len=%zu]\n", hostname_len);
|
||||
"length > 255 [actual len=%zu]", hostname_len);
|
||||
socks5_resolve_local = TRUE;
|
||||
}
|
||||
|
||||
if(auth & ~(CURLAUTH_BASIC | CURLAUTH_GSSAPI))
|
||||
infof(data,
|
||||
"warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %lu\n",
|
||||
"warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %lu",
|
||||
auth);
|
||||
if(!(auth & CURLAUTH_BASIC))
|
||||
/* disable username/password auth */
|
||||
@ -780,7 +780,7 @@ CURLproxycode Curl_SOCKS5(const char *proxy_user,
|
||||
data->state.async.dns = dns;
|
||||
data->state.async.done = TRUE;
|
||||
#endif
|
||||
infof(data, "SOCKS5: hostname '%s' found\n", hostname);
|
||||
infof(data, "SOCKS5: hostname '%s' found", hostname);
|
||||
}
|
||||
|
||||
if(!dns) {
|
||||
@ -822,7 +822,7 @@ CURLproxycode Curl_SOCKS5(const char *proxy_user,
|
||||
socksreq[len++] = ((unsigned char *)&saddr_in->sin_addr.s_addr)[i];
|
||||
}
|
||||
|
||||
infof(data, "SOCKS5 connect to IPv4 %s (locally resolved)\n", dest);
|
||||
infof(data, "SOCKS5 connect to IPv4 %s (locally resolved)", dest);
|
||||
}
|
||||
#ifdef ENABLE_IPV6
|
||||
else if(hp->ai_family == AF_INET6) {
|
||||
@ -836,7 +836,7 @@ CURLproxycode Curl_SOCKS5(const char *proxy_user,
|
||||
((unsigned char *)&saddr_in6->sin6_addr.s6_addr)[i];
|
||||
}
|
||||
|
||||
infof(data, "SOCKS5 connect to IPv6 %s (locally resolved)\n", dest);
|
||||
infof(data, "SOCKS5 connect to IPv6 %s (locally resolved)", dest);
|
||||
}
|
||||
#endif
|
||||
else {
|
||||
@ -860,7 +860,7 @@ CURLproxycode Curl_SOCKS5(const char *proxy_user,
|
||||
socksreq[len++] = (char) hostname_len; /* one byte address length */
|
||||
memcpy(&socksreq[len], hostname, hostname_len); /* address w/o NULL */
|
||||
len += hostname_len;
|
||||
infof(data, "SOCKS5 connect to %s:%d (remotely resolved)\n",
|
||||
infof(data, "SOCKS5 connect to %s:%d (remotely resolved)",
|
||||
hostname, remote_port);
|
||||
}
|
||||
/* FALLTHROUGH */
|
||||
@ -1024,7 +1024,7 @@ CURLproxycode Curl_SOCKS5(const char *proxy_user,
|
||||
}
|
||||
sxstate(data, CONNECT_DONE);
|
||||
}
|
||||
infof(data, "SOCKS5 request granted.\n");
|
||||
infof(data, "SOCKS5 request granted.");
|
||||
|
||||
*done = TRUE;
|
||||
return CURLPX_OK; /* Proxy was successful! */
|
||||
|
@ -328,7 +328,7 @@ CURLcode Curl_SOCKS5_gssapi_negotiate(int sockindex,
|
||||
user[gss_send_token.length] = '\0';
|
||||
gss_release_name(&gss_status, &gss_client_name);
|
||||
gss_release_buffer(&gss_status, &gss_send_token);
|
||||
infof(data, "SOCKS5 server authenticated user %s with GSS-API.\n",user);
|
||||
infof(data, "SOCKS5 server authenticated user %s with GSS-API.",user);
|
||||
free(user);
|
||||
user = NULL;
|
||||
|
||||
@ -344,7 +344,7 @@ CURLcode Curl_SOCKS5_gssapi_negotiate(int sockindex,
|
||||
else if(gss_ret_flags & GSS_C_INTEG_FLAG)
|
||||
gss_enc = 1;
|
||||
|
||||
infof(data, "SOCKS5 server supports GSS-API %s data protection.\n",
|
||||
infof(data, "SOCKS5 server supports GSS-API %s data protection.",
|
||||
(gss_enc == 0)?"no":((gss_enc==1)?"integrity":"confidentiality"));
|
||||
/* force for the moment to no data protection */
|
||||
gss_enc = 0;
|
||||
@ -518,7 +518,7 @@ CURLcode Curl_SOCKS5_gssapi_negotiate(int sockindex,
|
||||
|
||||
(void)curlx_nonblock(sock, TRUE);
|
||||
|
||||
infof(data, "SOCKS5 access with%s protection granted.\n",
|
||||
infof(data, "SOCKS5 access with%s protection granted.",
|
||||
(socksreq[0] == 0)?"out GSS-API data":
|
||||
((socksreq[0] == 1)?" GSS-API integrity":" GSS-API confidentiality"));
|
||||
|
||||
|
@ -327,7 +327,7 @@ CURLcode Curl_SOCKS5_gssapi_negotiate(int sockindex,
|
||||
failf(data, "Failed to determine user name.");
|
||||
return CURLE_COULDNT_CONNECT;
|
||||
}
|
||||
infof(data, "SOCKS5 server authenticated user %s with GSS-API.\n",
|
||||
infof(data, "SOCKS5 server authenticated user %s with GSS-API.",
|
||||
names.sUserName);
|
||||
s_pSecFn->FreeContextBuffer(names.sUserName);
|
||||
|
||||
@ -343,7 +343,7 @@ CURLcode Curl_SOCKS5_gssapi_negotiate(int sockindex,
|
||||
else if(sspi_ret_flags & ISC_REQ_INTEGRITY)
|
||||
gss_enc = 1;
|
||||
|
||||
infof(data, "SOCKS5 server supports GSS-API %s data protection.\n",
|
||||
infof(data, "SOCKS5 server supports GSS-API %s data protection.",
|
||||
(gss_enc == 0)?"no":((gss_enc == 1)?"integrity":"confidentiality") );
|
||||
/* force to no data protection, avoid encryption/decryption for now */
|
||||
gss_enc = 0;
|
||||
@ -591,7 +591,7 @@ CURLcode Curl_SOCKS5_gssapi_negotiate(int sockindex,
|
||||
}
|
||||
(void)curlx_nonblock(sock, TRUE);
|
||||
|
||||
infof(data, "SOCKS5 access with%s protection granted.\n",
|
||||
infof(data, "SOCKS5 access with%s protection granted.",
|
||||
(socksreq[0] == 0)?"out GSS-API data":
|
||||
((socksreq[0] == 1)?" GSS-API integrity":" GSS-API confidentiality"));
|
||||
|
||||
|
12
lib/telnet.c
12
lib/telnet.c
@ -268,9 +268,9 @@ static void printoption(struct Curl_easy *data,
|
||||
if(data->set.verbose) {
|
||||
if(cmd == CURL_IAC) {
|
||||
if(CURL_TELCMD_OK(option))
|
||||
infof(data, "%s IAC %s\n", direction, CURL_TELCMD(option));
|
||||
infof(data, "%s IAC %s", direction, CURL_TELCMD(option));
|
||||
else
|
||||
infof(data, "%s IAC %d\n", direction, option);
|
||||
infof(data, "%s IAC %d", direction, option);
|
||||
}
|
||||
else {
|
||||
const char *fmt = (cmd == CURL_WILL) ? "WILL" :
|
||||
@ -287,12 +287,12 @@ static void printoption(struct Curl_easy *data,
|
||||
opt = NULL;
|
||||
|
||||
if(opt)
|
||||
infof(data, "%s %s %s\n", direction, fmt, opt);
|
||||
infof(data, "%s %s %s", direction, fmt, opt);
|
||||
else
|
||||
infof(data, "%s %s %d\n", direction, fmt, option);
|
||||
infof(data, "%s %s %d", direction, fmt, option);
|
||||
}
|
||||
else
|
||||
infof(data, "%s %d %d\n", direction, cmd, option);
|
||||
infof(data, "%s %d %d", direction, cmd, option);
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -765,8 +765,6 @@ static void printsub(struct Curl_easy *data,
|
||||
break;
|
||||
}
|
||||
}
|
||||
if(direction)
|
||||
infof(data, "\n");
|
||||
}
|
||||
}
|
||||
|
||||
|
38
lib/tftp.c
38
lib/tftp.c
@ -239,7 +239,7 @@ static CURLcode tftp_set_timeouts(struct tftp_state_data *state)
|
||||
|
||||
infof(state->data,
|
||||
"set timeouts for state %d; Total % " CURL_FORMAT_CURL_OFF_T
|
||||
", retry %d maxtry %d\n",
|
||||
", retry %d maxtry %d",
|
||||
(int)state->state, timeout_ms, state->retry_time, state->retry_max);
|
||||
|
||||
/* init RX time */
|
||||
@ -325,7 +325,7 @@ static CURLcode tftp_parse_option_ack(struct tftp_state_data *state,
|
||||
return CURLE_TFTP_ILLEGAL;
|
||||
}
|
||||
|
||||
infof(data, "got option=(%s) value=(%s)\n", option, value);
|
||||
infof(data, "got option=(%s) value=(%s)", option, value);
|
||||
|
||||
if(checkprefix(option, TFTP_OPTION_BLKSIZE)) {
|
||||
long blksize;
|
||||
@ -356,14 +356,14 @@ static CURLcode tftp_parse_option_ack(struct tftp_state_data *state,
|
||||
}
|
||||
|
||||
state->blksize = (int)blksize;
|
||||
infof(data, "%s (%d) %s (%d)\n", "blksize parsed from OACK",
|
||||
infof(data, "%s (%d) %s (%d)", "blksize parsed from OACK",
|
||||
state->blksize, "requested", state->requested_blksize);
|
||||
}
|
||||
else if(checkprefix(option, TFTP_OPTION_TSIZE)) {
|
||||
long tsize = 0;
|
||||
|
||||
tsize = strtol(value, NULL, 10);
|
||||
infof(data, "%s (%ld)\n", "tsize parsed from OACK", tsize);
|
||||
infof(data, "%s (%ld)", "tsize parsed from OACK", tsize);
|
||||
|
||||
/* tsize should be ignored on upload: Who cares about the size of the
|
||||
remote file? */
|
||||
@ -397,7 +397,7 @@ static CURLcode tftp_connect_for_tx(struct tftp_state_data *state,
|
||||
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
||||
struct Curl_easy *data = state->data;
|
||||
|
||||
infof(data, "%s\n", "Connected for transmit");
|
||||
infof(data, "%s", "Connected for transmit");
|
||||
#endif
|
||||
state->state = TFTP_STATE_TX;
|
||||
result = tftp_set_timeouts(state);
|
||||
@ -413,7 +413,7 @@ static CURLcode tftp_connect_for_rx(struct tftp_state_data *state,
|
||||
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
||||
struct Curl_easy *data = state->data;
|
||||
|
||||
infof(data, "%s\n", "Connected for receive");
|
||||
infof(data, "%s", "Connected for receive");
|
||||
#endif
|
||||
state->state = TFTP_STATE_RX;
|
||||
result = tftp_set_timeouts(state);
|
||||
@ -596,12 +596,12 @@ static CURLcode tftp_rx(struct tftp_state_data *state,
|
||||
else if(state->block == rblock) {
|
||||
/* This is the last recently received block again. Log it and ACK it
|
||||
again. */
|
||||
infof(data, "Received last DATA packet block %d again.\n", rblock);
|
||||
infof(data, "Received last DATA packet block %d again.", rblock);
|
||||
}
|
||||
else {
|
||||
/* totally unexpected, just log it */
|
||||
infof(data,
|
||||
"Received unexpected DATA packet block %d, expecting block %d\n",
|
||||
"Received unexpected DATA packet block %d, expecting block %d",
|
||||
rblock, NEXT_BLOCKNUM(state->block));
|
||||
break;
|
||||
}
|
||||
@ -653,7 +653,7 @@ static CURLcode tftp_rx(struct tftp_state_data *state,
|
||||
/* Increment the retry count and fail if over the limit */
|
||||
state->retries++;
|
||||
infof(data,
|
||||
"Timeout waiting for block %d ACK. Retries = %d\n",
|
||||
"Timeout waiting for block %d ACK. Retries = %d",
|
||||
NEXT_BLOCKNUM(state->block), state->retries);
|
||||
if(state->retries > state->retry_max) {
|
||||
state->error = TFTP_ERR_TIMEOUT;
|
||||
@ -724,7 +724,7 @@ static CURLcode tftp_tx(struct tftp_state_data *state, tftp_event_t event)
|
||||
* */
|
||||
!(state->block == 0 && rblock == 65535)) {
|
||||
/* This isn't the expected block. Log it and up the retry counter */
|
||||
infof(data, "Received ACK for block %d, expecting %d\n",
|
||||
infof(data, "Received ACK for block %d, expecting %d",
|
||||
rblock, state->block);
|
||||
state->retries++;
|
||||
/* Bail out if over the maximum */
|
||||
@ -797,7 +797,7 @@ static CURLcode tftp_tx(struct tftp_state_data *state, tftp_event_t event)
|
||||
/* Increment the retry counter and log the timeout */
|
||||
state->retries++;
|
||||
infof(data, "Timeout waiting for block %d ACK. "
|
||||
" Retries = %d\n", NEXT_BLOCKNUM(state->block), state->retries);
|
||||
" Retries = %d", NEXT_BLOCKNUM(state->block), state->retries);
|
||||
/* Decide if we've had enough */
|
||||
if(state->retries > state->retry_max) {
|
||||
state->error = TFTP_ERR_TIMEOUT;
|
||||
@ -906,22 +906,22 @@ static CURLcode tftp_state_machine(struct tftp_state_data *state,
|
||||
|
||||
switch(state->state) {
|
||||
case TFTP_STATE_START:
|
||||
DEBUGF(infof(data, "TFTP_STATE_START\n"));
|
||||
DEBUGF(infof(data, "TFTP_STATE_START"));
|
||||
result = tftp_send_first(state, event);
|
||||
break;
|
||||
case TFTP_STATE_RX:
|
||||
DEBUGF(infof(data, "TFTP_STATE_RX\n"));
|
||||
DEBUGF(infof(data, "TFTP_STATE_RX"));
|
||||
result = tftp_rx(state, event);
|
||||
break;
|
||||
case TFTP_STATE_TX:
|
||||
DEBUGF(infof(data, "TFTP_STATE_TX\n"));
|
||||
DEBUGF(infof(data, "TFTP_STATE_TX"));
|
||||
result = tftp_tx(state, event);
|
||||
break;
|
||||
case TFTP_STATE_FIN:
|
||||
infof(data, "%s\n", "TFTP finished");
|
||||
infof(data, "%s", "TFTP finished");
|
||||
break;
|
||||
default:
|
||||
DEBUGF(infof(data, "STATE: %d\n", state->state));
|
||||
DEBUGF(infof(data, "STATE: %d", state->state));
|
||||
failf(data, "%s", "Internal state machine error");
|
||||
result = CURLE_TFTP_ILLEGAL;
|
||||
break;
|
||||
@ -1153,7 +1153,7 @@ static CURLcode tftp_receive_packet(struct Curl_easy *data)
|
||||
size_t strn = state->rbytes - 4;
|
||||
state->error = (tftp_error_t)error;
|
||||
if(tftp_strnlen(str, strn) < strn)
|
||||
infof(data, "TFTP error: %s\n", str);
|
||||
infof(data, "TFTP error: %s", str);
|
||||
break;
|
||||
}
|
||||
case TFTP_EVENT_ACK:
|
||||
@ -1288,7 +1288,7 @@ static CURLcode tftp_doing(struct Curl_easy *data, bool *dophase_done)
|
||||
result = tftp_multi_statemach(data, dophase_done);
|
||||
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
else if(!result) {
|
||||
/* The multi code doesn't have this logic for the DOING state so we
|
||||
@ -1325,7 +1325,7 @@ static CURLcode tftp_perform(struct Curl_easy *data, bool *dophase_done)
|
||||
tftp_multi_statemach(data, dophase_done);
|
||||
|
||||
if(*dophase_done)
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
|
||||
return result;
|
||||
}
|
||||
|
@ -188,7 +188,7 @@ CURLcode Curl_fillreadbuffer(struct Curl_easy *data, size_t bytes,
|
||||
/* at this point we already verified that the callback exists
|
||||
so we compile and store the trailers buffer, then proceed */
|
||||
infof(data,
|
||||
"Moving trailers state machine from initialized to sending.\n");
|
||||
"Moving trailers state machine from initialized to sending.");
|
||||
data->state.trailers_state = TRAILERS_SENDING;
|
||||
Curl_dyn_init(&data->state.trailers_buf, DYN_TRAILERS);
|
||||
|
||||
@ -211,7 +211,7 @@ CURLcode Curl_fillreadbuffer(struct Curl_easy *data, size_t bytes,
|
||||
curl_slist_free_all(trailers);
|
||||
return result;
|
||||
}
|
||||
infof(data, "Successfully compiled trailers.\r\n");
|
||||
infof(data, "Successfully compiled trailers.");
|
||||
curl_slist_free_all(trailers);
|
||||
}
|
||||
#endif
|
||||
@ -376,7 +376,7 @@ CURLcode Curl_fillreadbuffer(struct Curl_easy *data, size_t bytes,
|
||||
data->set.trailer_callback = NULL;
|
||||
/* mark the transfer as done */
|
||||
data->req.upload_done = TRUE;
|
||||
infof(data, "Signaling end of chunked upload after trailers.\n");
|
||||
infof(data, "Signaling end of chunked upload after trailers.");
|
||||
}
|
||||
else
|
||||
#endif
|
||||
@ -385,7 +385,7 @@ CURLcode Curl_fillreadbuffer(struct Curl_easy *data, size_t bytes,
|
||||
/* mark this as done once this chunk is transferred */
|
||||
data->req.upload_done = TRUE;
|
||||
infof(data,
|
||||
"Signaling end of chunked upload via terminating chunk.\n");
|
||||
"Signaling end of chunked upload via terminating chunk.");
|
||||
}
|
||||
|
||||
if(added_crlf)
|
||||
@ -463,7 +463,7 @@ CURLcode Curl_readrewind(struct Curl_easy *data)
|
||||
err = (data->set.ioctl_func)(data, CURLIOCMD_RESTARTREAD,
|
||||
data->set.ioctl_client);
|
||||
Curl_set_in_callback(data, false);
|
||||
infof(data, "the ioctl callback returned %d\n", (int)err);
|
||||
infof(data, "the ioctl callback returned %d", (int)err);
|
||||
|
||||
if(err) {
|
||||
failf(data, "ioctl callback returned error %d", (int)err);
|
||||
@ -530,7 +530,7 @@ bool Curl_meets_timecondition(struct Curl_easy *data, time_t timeofdoc)
|
||||
default:
|
||||
if(timeofdoc <= data->set.timevalue) {
|
||||
infof(data,
|
||||
"The requested document is not new enough\n");
|
||||
"The requested document is not new enough");
|
||||
data->info.timecond = TRUE;
|
||||
return FALSE;
|
||||
}
|
||||
@ -538,7 +538,7 @@ bool Curl_meets_timecondition(struct Curl_easy *data, time_t timeofdoc)
|
||||
case CURL_TIMECOND_IFUNMODSINCE:
|
||||
if(timeofdoc >= data->set.timevalue) {
|
||||
infof(data,
|
||||
"The requested document is not old enough\n");
|
||||
"The requested document is not old enough");
|
||||
data->info.timecond = TRUE;
|
||||
return FALSE;
|
||||
}
|
||||
@ -615,7 +615,7 @@ static CURLcode readwrite_data(struct Curl_easy *data,
|
||||
else {
|
||||
/* read nothing but since we wanted nothing we consider this an OK
|
||||
situation to proceed from */
|
||||
DEBUGF(infof(data, "readwrite_data: we're done!\n"));
|
||||
DEBUGF(infof(data, "readwrite_data: we're done!"));
|
||||
nread = 0;
|
||||
}
|
||||
|
||||
@ -638,10 +638,10 @@ static CURLcode readwrite_data(struct Curl_easy *data,
|
||||
server closed the connection and we bail out from this! */
|
||||
#ifdef USE_NGHTTP2
|
||||
if(is_http2 && !nread)
|
||||
DEBUGF(infof(data, "nread == 0, stream closed, bailing\n"));
|
||||
DEBUGF(infof(data, "nread == 0, stream closed, bailing"));
|
||||
else
|
||||
#endif
|
||||
DEBUGF(infof(data, "nread <= 0, server closed connection, bailing\n"));
|
||||
DEBUGF(infof(data, "nread <= 0, server closed connection, bailing"));
|
||||
k->keepon &= ~KEEP_RECV;
|
||||
break;
|
||||
}
|
||||
@ -684,7 +684,7 @@ static CURLcode readwrite_data(struct Curl_easy *data,
|
||||
infof(data,
|
||||
"Excess found:"
|
||||
" excess = %zd"
|
||||
" url = %s (zero-length body)\n",
|
||||
" url = %s (zero-length body)",
|
||||
nread, data->state.up.path);
|
||||
}
|
||||
|
||||
@ -764,7 +764,7 @@ static CURLcode readwrite_data(struct Curl_easy *data,
|
||||
written to the client. */
|
||||
if(conn->chunk.datasize) {
|
||||
infof(data, "Leftovers after chunking: % "
|
||||
CURL_FORMAT_CURL_OFF_T "u bytes\n",
|
||||
CURL_FORMAT_CURL_OFF_T "u bytes",
|
||||
conn->chunk.datasize);
|
||||
}
|
||||
}
|
||||
@ -775,7 +775,7 @@ static CURLcode readwrite_data(struct Curl_easy *data,
|
||||
/* Account for body content stored in the header buffer */
|
||||
if((k->badheader == HEADER_PARTHEADER) && !k->ignorebody) {
|
||||
size_t headlen = Curl_dyn_len(&data->state.headerb);
|
||||
DEBUGF(infof(data, "Increasing bytecount by %zu\n", headlen));
|
||||
DEBUGF(infof(data, "Increasing bytecount by %zu", headlen));
|
||||
k->bytecount += headlen;
|
||||
}
|
||||
|
||||
@ -789,7 +789,7 @@ static CURLcode readwrite_data(struct Curl_easy *data,
|
||||
" excess = %zu"
|
||||
", size = %" CURL_FORMAT_CURL_OFF_T
|
||||
", maxdownload = %" CURL_FORMAT_CURL_OFF_T
|
||||
", bytecount = %" CURL_FORMAT_CURL_OFF_T "\n",
|
||||
", bytecount = %" CURL_FORMAT_CURL_OFF_T,
|
||||
excess, k->size, k->maxdownload, k->bytecount);
|
||||
connclose(conn, "excess found in a read");
|
||||
}
|
||||
@ -898,7 +898,7 @@ static CURLcode readwrite_data(struct Curl_easy *data,
|
||||
/* When we've read the entire thing and the close bit is set, the server
|
||||
may now close the connection. If there's now any kind of sending going
|
||||
on from our side, we need to stop that immediately. */
|
||||
infof(data, "we are done reading and this is set to close, stop send\n");
|
||||
infof(data, "we are done reading and this is set to close, stop send");
|
||||
k->keepon &= ~KEEP_SEND; /* no writing anymore either */
|
||||
}
|
||||
|
||||
@ -1128,7 +1128,7 @@ static CURLcode readwrite_upload(struct Curl_easy *data,
|
||||
(k->writebytecount == data->state.infilesize)) {
|
||||
/* we have sent all data we were supposed to */
|
||||
k->upload_done = TRUE;
|
||||
infof(data, "We are completely uploaded and fine\n");
|
||||
infof(data, "We are completely uploaded and fine");
|
||||
}
|
||||
|
||||
if(k->upload_present != bytes_written) {
|
||||
@ -1199,7 +1199,7 @@ CURLcode Curl_readwrite(struct connectdata *conn,
|
||||
|
||||
if(data->state.drain) {
|
||||
select_res |= CURL_CSELECT_IN;
|
||||
DEBUGF(infof(data, "Curl_readwrite: forcibly told to drain data\n"));
|
||||
DEBUGF(infof(data, "Curl_readwrite: forcibly told to drain data"));
|
||||
}
|
||||
|
||||
if(!select_res) /* Call for select()/poll() only, if read/write/error
|
||||
@ -1263,7 +1263,7 @@ CURLcode Curl_readwrite(struct connectdata *conn,
|
||||
k->exp100 = EXP100_SEND_DATA;
|
||||
k->keepon |= KEEP_SEND;
|
||||
Curl_expire_done(data, EXPIRE_100_TIMEOUT);
|
||||
infof(data, "Done waiting for 100-continue\n");
|
||||
infof(data, "Done waiting for 100-continue");
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -1679,7 +1679,7 @@ CURLcode Curl_follow(struct Curl_easy *data,
|
||||
data->state.url = newurl;
|
||||
data->state.url_alloc = TRUE;
|
||||
|
||||
infof(data, "Issue another request to this URL: '%s'\n", data->state.url);
|
||||
infof(data, "Issue another request to this URL: '%s'", data->state.url);
|
||||
|
||||
/*
|
||||
* We get here when the HTTP code is 300-399 (and 401). We need to perform
|
||||
@ -1722,7 +1722,7 @@ CURLcode Curl_follow(struct Curl_easy *data,
|
||||
|| data->state.httpreq == HTTPREQ_POST_FORM
|
||||
|| data->state.httpreq == HTTPREQ_POST_MIME)
|
||||
&& !(data->set.keep_post & CURL_REDIR_POST_301)) {
|
||||
infof(data, "Switch from POST to GET\n");
|
||||
infof(data, "Switch from POST to GET");
|
||||
data->state.httpreq = HTTPREQ_GET;
|
||||
}
|
||||
break;
|
||||
@ -1747,7 +1747,7 @@ CURLcode Curl_follow(struct Curl_easy *data,
|
||||
|| data->state.httpreq == HTTPREQ_POST_FORM
|
||||
|| data->state.httpreq == HTTPREQ_POST_MIME)
|
||||
&& !(data->set.keep_post & CURL_REDIR_POST_302)) {
|
||||
infof(data, "Switch from POST to GET\n");
|
||||
infof(data, "Switch from POST to GET");
|
||||
data->state.httpreq = HTTPREQ_GET;
|
||||
}
|
||||
break;
|
||||
@ -1765,7 +1765,7 @@ CURLcode Curl_follow(struct Curl_easy *data,
|
||||
!(data->set.keep_post & CURL_REDIR_POST_303))) {
|
||||
data->state.httpreq = HTTPREQ_GET;
|
||||
data->set.upload = false;
|
||||
infof(data, "Switch to %s\n",
|
||||
infof(data, "Switch to %s",
|
||||
data->set.opt_no_body?"HEAD":"GET");
|
||||
}
|
||||
break;
|
||||
@ -1826,7 +1826,7 @@ CURLcode Curl_retry_request(struct Curl_easy *data, char **url)
|
||||
to issue again, but the nghttp2 API can deliver the message to other
|
||||
streams as well, which is why this adds the check the data counters
|
||||
too. */
|
||||
infof(data, "REFUSED_STREAM, retrying a fresh connect\n");
|
||||
infof(data, "REFUSED_STREAM, retrying a fresh connect");
|
||||
data->state.refused_stream = FALSE; /* clear again */
|
||||
retry = TRUE;
|
||||
}
|
||||
@ -1838,8 +1838,8 @@ CURLcode Curl_retry_request(struct Curl_easy *data, char **url)
|
||||
data->state.retrycount = 0;
|
||||
return CURLE_SEND_ERROR;
|
||||
}
|
||||
infof(data, "Connection died, retrying a fresh connect\
|
||||
(retry count: %d)\n", data->state.retrycount);
|
||||
infof(data, "Connection died, retrying a fresh connect (retry count: %d)",
|
||||
data->state.retrycount);
|
||||
*url = strdup(data->state.url);
|
||||
if(!*url)
|
||||
return CURLE_OUT_OF_MEMORY;
|
||||
|
74
lib/url.c
74
lib/url.c
@ -733,7 +733,7 @@ static void conn_shutdown(struct Curl_easy *data, struct connectdata *conn)
|
||||
{
|
||||
DEBUGASSERT(conn);
|
||||
DEBUGASSERT(data);
|
||||
infof(data, "Closing connection %ld\n", conn->connection_id);
|
||||
infof(data, "Closing connection %ld", conn->connection_id);
|
||||
|
||||
#ifndef USE_HYPER
|
||||
if(conn->connect_state && conn->connect_state->prot_save) {
|
||||
@ -840,7 +840,7 @@ CURLcode Curl_disconnect(struct Curl_easy *data,
|
||||
* are other users of it
|
||||
*/
|
||||
if(CONN_INUSE(conn) && !dead_connection) {
|
||||
DEBUGF(infof(data, "Curl_disconnect when inuse: %zu\n", CONN_INUSE(conn)));
|
||||
DEBUGF(infof(data, "Curl_disconnect when inuse: %zu", CONN_INUSE(conn)));
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
@ -973,7 +973,7 @@ static bool conn_maxage(struct Curl_easy *data,
|
||||
idletime /= 1000; /* integer seconds is fine */
|
||||
|
||||
if(idletime > data->set.maxage_conn) {
|
||||
infof(data, "Too old connection (%ld seconds), disconnect it\n",
|
||||
infof(data, "Too old connection (%ld seconds), disconnect it",
|
||||
idletime);
|
||||
return TRUE;
|
||||
}
|
||||
@ -1022,7 +1022,7 @@ static bool extract_if_dead(struct connectdata *conn,
|
||||
}
|
||||
|
||||
if(dead) {
|
||||
infof(data, "Connection %ld seems to be dead!\n", conn->connection_id);
|
||||
infof(data, "Connection %ld seems to be dead!", conn->connection_id);
|
||||
Curl_conncache_remove_conn(data, conn, FALSE);
|
||||
return TRUE;
|
||||
}
|
||||
@ -1138,7 +1138,7 @@ ConnectionExists(struct Curl_easy *data,
|
||||
/* Max pipe length is zero (unlimited) for multiplexed connections */
|
||||
struct Curl_llist_element *curr;
|
||||
|
||||
infof(data, "Found bundle for host %s: %p [%s]\n",
|
||||
infof(data, "Found bundle for host %s: %p [%s]",
|
||||
hostbundle, (void *)bundle, (bundle->multiuse == BUNDLE_MULTIPLEX ?
|
||||
"can multiplex" : "serially"));
|
||||
|
||||
@ -1146,22 +1146,22 @@ ConnectionExists(struct Curl_easy *data,
|
||||
if(canmultiplex) {
|
||||
if(bundle->multiuse == BUNDLE_UNKNOWN) {
|
||||
if(data->set.pipewait) {
|
||||
infof(data, "Server doesn't support multiplex yet, wait\n");
|
||||
infof(data, "Server doesn't support multiplex yet, wait");
|
||||
*waitpipe = TRUE;
|
||||
CONNCACHE_UNLOCK(data);
|
||||
return FALSE; /* no re-use */
|
||||
}
|
||||
|
||||
infof(data, "Server doesn't support multiplex (yet)\n");
|
||||
infof(data, "Server doesn't support multiplex (yet)");
|
||||
canmultiplex = FALSE;
|
||||
}
|
||||
if((bundle->multiuse == BUNDLE_MULTIPLEX) &&
|
||||
!Curl_multiplex_wanted(data->multi)) {
|
||||
infof(data, "Could multiplex, but not asked to!\n");
|
||||
infof(data, "Could multiplex, but not asked to!");
|
||||
canmultiplex = FALSE;
|
||||
}
|
||||
if(bundle->multiuse == BUNDLE_NO_MULTIUSE) {
|
||||
infof(data, "Can not multiplex, even if we wanted to!\n");
|
||||
infof(data, "Can not multiplex, even if we wanted to!");
|
||||
canmultiplex = FALSE;
|
||||
}
|
||||
}
|
||||
@ -1209,7 +1209,7 @@ ConnectionExists(struct Curl_easy *data,
|
||||
completed yet and until then we don't re-use this connection */
|
||||
if(!check->primary_ip[0]) {
|
||||
infof(data,
|
||||
"Connection #%ld is still name resolving, can't reuse\n",
|
||||
"Connection #%ld is still name resolving, can't reuse",
|
||||
check->connection_id);
|
||||
continue;
|
||||
}
|
||||
@ -1218,7 +1218,7 @@ ConnectionExists(struct Curl_easy *data,
|
||||
if(check->sock[FIRSTSOCKET] == CURL_SOCKET_BAD) {
|
||||
foundPendingCandidate = TRUE;
|
||||
/* Don't pick a connection that hasn't connected yet */
|
||||
infof(data, "Connection #%ld isn't open enough, can't reuse\n",
|
||||
infof(data, "Connection #%ld isn't open enough, can't reuse",
|
||||
check->connection_id);
|
||||
continue;
|
||||
}
|
||||
@ -1373,7 +1373,7 @@ ConnectionExists(struct Curl_easy *data,
|
||||
&check->ssl_config)) {
|
||||
DEBUGF(infof(data,
|
||||
"Connection #%ld has different SSL parameters, "
|
||||
"can't reuse\n",
|
||||
"can't reuse",
|
||||
check->connection_id));
|
||||
continue;
|
||||
}
|
||||
@ -1381,7 +1381,7 @@ ConnectionExists(struct Curl_easy *data,
|
||||
foundPendingCandidate = TRUE;
|
||||
DEBUGF(infof(data,
|
||||
"Connection #%ld has not started SSL connect, "
|
||||
"can't reuse\n",
|
||||
"can't reuse",
|
||||
check->connection_id));
|
||||
continue;
|
||||
}
|
||||
@ -1468,14 +1468,14 @@ ConnectionExists(struct Curl_easy *data,
|
||||
/* Multiplexed connections can only be HTTP/2 for now */
|
||||
struct http_conn *httpc = &check->proto.httpc;
|
||||
if(multiplexed >= httpc->settings.max_concurrent_streams) {
|
||||
infof(data, "MAX_CONCURRENT_STREAMS reached, skip (%zu)\n",
|
||||
infof(data, "MAX_CONCURRENT_STREAMS reached, skip (%zu)",
|
||||
multiplexed);
|
||||
continue;
|
||||
}
|
||||
else if(multiplexed >=
|
||||
Curl_multi_max_concurrent_streams(data->multi)) {
|
||||
infof(data, "client side MAX_CONCURRENT_STREAMS reached"
|
||||
", skip (%zu)\n",
|
||||
", skip (%zu)",
|
||||
multiplexed);
|
||||
continue;
|
||||
}
|
||||
@ -1483,7 +1483,7 @@ ConnectionExists(struct Curl_easy *data,
|
||||
#endif
|
||||
/* When not multiplexed, we have a match here! */
|
||||
chosen = check;
|
||||
infof(data, "Multiplexed connection found!\n");
|
||||
infof(data, "Multiplexed connection found!");
|
||||
break;
|
||||
}
|
||||
else {
|
||||
@ -1506,7 +1506,7 @@ ConnectionExists(struct Curl_easy *data,
|
||||
|
||||
if(foundPendingCandidate && data->set.pipewait) {
|
||||
infof(data,
|
||||
"Found pending candidate for reuse and CURLOPT_PIPEWAIT is set\n");
|
||||
"Found pending candidate for reuse and CURLOPT_PIPEWAIT is set");
|
||||
*waitpipe = TRUE;
|
||||
}
|
||||
|
||||
@ -1521,7 +1521,7 @@ void Curl_verboseconnect(struct Curl_easy *data,
|
||||
struct connectdata *conn)
|
||||
{
|
||||
if(data->set.verbose)
|
||||
infof(data, "Connected to %s (%s) port %u (#%ld)\n",
|
||||
infof(data, "Connected to %s (%s) port %u (#%ld)",
|
||||
#ifndef CURL_DISABLE_PROXY
|
||||
conn->bits.socksproxy ? conn->socks_proxy.host.dispname :
|
||||
conn->bits.httpproxy ? conn->http_proxy.host.dispname :
|
||||
@ -1625,7 +1625,7 @@ CURLcode Curl_idnconvert_hostname(struct Curl_easy *data,
|
||||
return CURLE_URL_MALFORMAT;
|
||||
}
|
||||
#else
|
||||
infof(data, "IDN support not present, can't parse Unicode domains\n");
|
||||
infof(data, "IDN support not present, can't parse Unicode domains");
|
||||
#endif
|
||||
}
|
||||
return CURLE_OK;
|
||||
@ -1893,7 +1893,7 @@ static void zonefrom_url(CURLU *uh, struct Curl_easy *data,
|
||||
scopeidx = if_nametoindex(zoneid);
|
||||
#endif
|
||||
if(!scopeidx)
|
||||
infof(data, "Invalid zoneid: %s; %s\n", zoneid,
|
||||
infof(data, "Invalid zoneid: %s; %s", zoneid,
|
||||
strerror(errno));
|
||||
else
|
||||
conn->scope_id = scopeidx;
|
||||
@ -1950,7 +1950,7 @@ static CURLcode parseurlandfillconn(struct Curl_easy *data,
|
||||
CURLU_DISALLOW_USER : 0) |
|
||||
(data->set.path_as_is ? CURLU_PATH_AS_IS : 0));
|
||||
if(uc) {
|
||||
DEBUGF(infof(data, "curl_url_set rejected %s\n", data->state.url));
|
||||
DEBUGF(infof(data, "curl_url_set rejected %s", data->state.url));
|
||||
return Curl_uc_to_curlcode(uc);
|
||||
}
|
||||
|
||||
@ -1995,7 +1995,7 @@ static CURLcode parseurlandfillconn(struct Curl_easy *data,
|
||||
}
|
||||
data->state.url = url;
|
||||
data->state.url_alloc = TRUE;
|
||||
infof(data, "Switched from HTTP to HTTPS due to HSTS => %s\n",
|
||||
infof(data, "Switched from HTTP to HTTPS due to HSTS => %s",
|
||||
data->state.url);
|
||||
}
|
||||
}
|
||||
@ -2349,7 +2349,7 @@ static char *detect_proxy(struct Curl_easy *data,
|
||||
}
|
||||
}
|
||||
if(proxy)
|
||||
infof(data, "Uses proxy env variable %s == '%s'\n", envp, proxy);
|
||||
infof(data, "Uses proxy env variable %s == '%s'", envp, proxy);
|
||||
|
||||
return proxy;
|
||||
}
|
||||
@ -2592,7 +2592,7 @@ static CURLcode create_conn_helper_init_proxy(struct Curl_easy *data,
|
||||
no_proxy = curl_getenv(p);
|
||||
}
|
||||
if(no_proxy) {
|
||||
infof(data, "Uses proxy env variable %s == '%s'\n", p, no_proxy);
|
||||
infof(data, "Uses proxy env variable %s == '%s'", p, no_proxy);
|
||||
}
|
||||
}
|
||||
|
||||
@ -2911,7 +2911,7 @@ static CURLcode override_login(struct Curl_easy *data,
|
||||
&netrc_user_changed, &netrc_passwd_changed,
|
||||
data->set.str[STRING_NETRC_FILE]);
|
||||
if(ret > 0) {
|
||||
infof(data, "Couldn't find host %s in the %s file; using defaults\n",
|
||||
infof(data, "Couldn't find host %s in the %s file; using defaults",
|
||||
conn->host.name, data->set.str[STRING_NETRC_FILE]);
|
||||
}
|
||||
else if(ret < 0) {
|
||||
@ -3042,7 +3042,7 @@ static CURLcode parse_connect_to_host_port(struct Curl_easy *data,
|
||||
if(*ptr == '%') {
|
||||
/* There might be a zone identifier */
|
||||
if(strncmp("%25", ptr, 3))
|
||||
infof(data, "Please URL encode %% as %%25, see RFC 6874.\n");
|
||||
infof(data, "Please URL encode %% as %%25, see RFC 6874.");
|
||||
ptr++;
|
||||
/* Allow unreserved characters as defined in RFC 3986 */
|
||||
while(*ptr && (ISALPHA(*ptr) || ISXDIGIT(*ptr) || (*ptr == '-') ||
|
||||
@ -3053,7 +3053,7 @@ static CURLcode parse_connect_to_host_port(struct Curl_easy *data,
|
||||
/* yeps, it ended nicely with a bracket as well */
|
||||
*ptr++ = '\0';
|
||||
else
|
||||
infof(data, "Invalid IPv6 address format\n");
|
||||
infof(data, "Invalid IPv6 address format");
|
||||
portptr = ptr;
|
||||
/* Note that if this didn't end with a bracket, we still advanced the
|
||||
* hostptr first, but I can't see anything wrong with that as no host
|
||||
@ -3194,7 +3194,7 @@ static CURLcode parse_connect_to_slist(struct Curl_easy *data,
|
||||
conn->conn_to_host.name = host;
|
||||
conn->bits.conn_to_host = TRUE;
|
||||
|
||||
infof(data, "Connecting to hostname: %s\n", host);
|
||||
infof(data, "Connecting to hostname: %s", host);
|
||||
}
|
||||
else {
|
||||
/* no "connect to host" */
|
||||
@ -3205,7 +3205,7 @@ static CURLcode parse_connect_to_slist(struct Curl_easy *data,
|
||||
if(port >= 0) {
|
||||
conn->conn_to_port = port;
|
||||
conn->bits.conn_to_port = TRUE;
|
||||
infof(data, "Connecting to port: %d\n", port);
|
||||
infof(data, "Connecting to port: %d", port);
|
||||
}
|
||||
else {
|
||||
/* no "connect to port" */
|
||||
@ -3266,7 +3266,7 @@ static CURLcode parse_connect_to_slist(struct Curl_easy *data,
|
||||
conn->conn_to_port = as->dst.port;
|
||||
conn->bits.conn_to_port = TRUE;
|
||||
conn->bits.altused = TRUE;
|
||||
infof(data, "Alt-svc connecting from [%s]%s:%d to [%s]%s:%d\n",
|
||||
infof(data, "Alt-svc connecting from [%s]%s:%d to [%s]%s:%d",
|
||||
Curl_alpnid2str(srcalpnid), host, conn->remote_port,
|
||||
Curl_alpnid2str(as->dst.alpnid), hostd, as->dst.port);
|
||||
if(srcalpnid != as->dst.alpnid) {
|
||||
@ -3862,14 +3862,14 @@ static CURLcode create_conn(struct Curl_easy *data,
|
||||
*in_connect = conn;
|
||||
|
||||
#ifndef CURL_DISABLE_PROXY
|
||||
infof(data, "Re-using existing connection! (#%ld) with %s %s\n",
|
||||
infof(data, "Re-using existing connection! (#%ld) with %s %s",
|
||||
conn->connection_id,
|
||||
conn->bits.proxy?"proxy":"host",
|
||||
conn->socks_proxy.host.name ? conn->socks_proxy.host.dispname :
|
||||
conn->http_proxy.host.name ? conn->http_proxy.host.dispname :
|
||||
conn->host.dispname);
|
||||
#else
|
||||
infof(data, "Re-using existing connection! (#%ld) with host %s\n",
|
||||
infof(data, "Re-using existing connection! (#%ld) with host %s",
|
||||
conn->connection_id, conn->host.dispname);
|
||||
#endif
|
||||
}
|
||||
@ -3909,7 +3909,7 @@ static CURLcode create_conn(struct Curl_easy *data,
|
||||
if(conn_candidate)
|
||||
(void)Curl_disconnect(data, conn_candidate, FALSE);
|
||||
else {
|
||||
infof(data, "No more connections allowed to host %s: %zu\n",
|
||||
infof(data, "No more connections allowed to host %s: %zu",
|
||||
bundlehost, max_host_connections);
|
||||
connections_available = FALSE;
|
||||
}
|
||||
@ -3929,13 +3929,13 @@ static CURLcode create_conn(struct Curl_easy *data,
|
||||
if(conn_candidate)
|
||||
(void)Curl_disconnect(data, conn_candidate, FALSE);
|
||||
else {
|
||||
infof(data, "No connections available in cache\n");
|
||||
infof(data, "No connections available in cache");
|
||||
connections_available = FALSE;
|
||||
}
|
||||
}
|
||||
|
||||
if(!connections_available) {
|
||||
infof(data, "No connections available.\n");
|
||||
infof(data, "No connections available.");
|
||||
|
||||
conn_free(conn);
|
||||
*in_connect = NULL;
|
||||
@ -3960,14 +3960,14 @@ static CURLcode create_conn(struct Curl_easy *data,
|
||||
connection based. */
|
||||
if((data->state.authhost.picked & (CURLAUTH_NTLM | CURLAUTH_NTLM_WB)) &&
|
||||
data->state.authhost.done) {
|
||||
infof(data, "NTLM picked AND auth done set, clear picked!\n");
|
||||
infof(data, "NTLM picked AND auth done set, clear picked!");
|
||||
data->state.authhost.picked = CURLAUTH_NONE;
|
||||
data->state.authhost.done = FALSE;
|
||||
}
|
||||
|
||||
if((data->state.authproxy.picked & (CURLAUTH_NTLM | CURLAUTH_NTLM_WB)) &&
|
||||
data->state.authproxy.done) {
|
||||
infof(data, "NTLM-proxy picked AND auth done set, clear picked!\n");
|
||||
infof(data, "NTLM-proxy picked AND auth done set, clear picked!");
|
||||
data->state.authproxy.picked = CURLAUTH_NONE;
|
||||
data->state.authproxy.done = FALSE;
|
||||
}
|
||||
|
@ -112,7 +112,7 @@ CURLcode Curl_auth_create_digest_md5_message(struct Curl_easy *data,
|
||||
|
||||
/* Ensure we have a valid challenge message */
|
||||
if(!Curl_bufref_len(chlg)) {
|
||||
infof(data, "DIGEST-MD5 handshake failure (empty challenge message)\n");
|
||||
infof(data, "DIGEST-MD5 handshake failure (empty challenge message)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
@ -207,7 +207,7 @@ CURLcode Curl_auth_create_digest_md5_message(struct Curl_easy *data,
|
||||
if(status == SEC_E_INSUFFICIENT_MEMORY)
|
||||
return CURLE_OUT_OF_MEMORY;
|
||||
|
||||
infof(data, "schannel: InitializeSecurityContext failed: %s\n",
|
||||
infof(data, "schannel: InitializeSecurityContext failed: %s",
|
||||
Curl_sspi_strerror(status, buffer, sizeof(buffer)));
|
||||
|
||||
return CURLE_AUTH_ERROR;
|
||||
@ -461,7 +461,7 @@ CURLcode Curl_auth_create_digest_http_message(struct Curl_easy *data,
|
||||
if(status == SEC_E_OK)
|
||||
output_token_len = chlg_buf[4].cbBuffer;
|
||||
else { /* delete the context so a new one can be made */
|
||||
infof(data, "digest_sspi: MakeSignature failed, error 0x%08lx\n",
|
||||
infof(data, "digest_sspi: MakeSignature failed, error 0x%08lx",
|
||||
(long)status);
|
||||
s_pSecFn->DeleteSecurityContext(digest->http_context);
|
||||
Curl_safefree(digest->http_context);
|
||||
@ -597,7 +597,7 @@ CURLcode Curl_auth_create_digest_http_message(struct Curl_easy *data,
|
||||
if(status == SEC_E_INSUFFICIENT_MEMORY)
|
||||
return CURLE_OUT_OF_MEMORY;
|
||||
|
||||
infof(data, "schannel: InitializeSecurityContext failed: %s\n",
|
||||
infof(data, "schannel: InitializeSecurityContext failed: %s",
|
||||
Curl_sspi_strerror(status, buffer, sizeof(buffer)));
|
||||
|
||||
return CURLE_AUTH_ERROR;
|
||||
|
@ -123,7 +123,7 @@ CURLcode Curl_auth_create_gssapi_user_message(struct Curl_easy *data,
|
||||
|
||||
if(chlg) {
|
||||
if(!Curl_bufref_len(chlg)) {
|
||||
infof(data, "GSSAPI handshake failure (empty challenge message)\n");
|
||||
infof(data, "GSSAPI handshake failure (empty challenge message)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
input_token.value = (void *) Curl_bufref_ptr(chlg);
|
||||
@ -199,7 +199,7 @@ CURLcode Curl_auth_create_gssapi_security_message(struct Curl_easy *data,
|
||||
|
||||
/* Ensure we have a valid challenge message */
|
||||
if(!Curl_bufref_len(chlg)) {
|
||||
infof(data, "GSSAPI handshake failure (empty security message)\n");
|
||||
infof(data, "GSSAPI handshake failure (empty security message)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
@ -238,7 +238,7 @@ CURLcode Curl_auth_create_gssapi_security_message(struct Curl_easy *data,
|
||||
|
||||
/* Not 4 octets long so fail as per RFC4752 Section 3.1 */
|
||||
if(output_token.length != 4) {
|
||||
infof(data, "GSSAPI handshake failure (invalid security data)\n");
|
||||
infof(data, "GSSAPI handshake failure (invalid security data)");
|
||||
gss_release_buffer(&unused_status, &username_token);
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
@ -250,7 +250,7 @@ CURLcode Curl_auth_create_gssapi_security_message(struct Curl_easy *data,
|
||||
/* Extract the security layer */
|
||||
sec_layer = indata & 0x000000FF;
|
||||
if(!(sec_layer & GSSAUTH_P_NONE)) {
|
||||
infof(data, "GSSAPI handshake failure (invalid security layer)\n");
|
||||
infof(data, "GSSAPI handshake failure (invalid security layer)");
|
||||
|
||||
gss_release_buffer(&unused_status, &username_token);
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
|
@ -173,7 +173,7 @@ CURLcode Curl_auth_create_gssapi_user_message(struct Curl_easy *data,
|
||||
|
||||
if(chlg) {
|
||||
if(!Curl_bufref_len(chlg)) {
|
||||
infof(data, "GSSAPI handshake failure (empty challenge message)\n");
|
||||
infof(data, "GSSAPI handshake failure (empty challenge message)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
@ -272,7 +272,7 @@ CURLcode Curl_auth_create_gssapi_security_message(struct Curl_easy *data,
|
||||
|
||||
/* Ensure we have a valid challenge message */
|
||||
if(!Curl_bufref_len(chlg)) {
|
||||
infof(data, "GSSAPI handshake failure (empty security message)\n");
|
||||
infof(data, "GSSAPI handshake failure (empty security message)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
@ -312,13 +312,13 @@ CURLcode Curl_auth_create_gssapi_security_message(struct Curl_easy *data,
|
||||
/* Decrypt the inbound challenge and obtain the qop */
|
||||
status = s_pSecFn->DecryptMessage(krb5->context, &input_desc, 0, &qop);
|
||||
if(status != SEC_E_OK) {
|
||||
infof(data, "GSSAPI handshake failure (empty security message)\n");
|
||||
infof(data, "GSSAPI handshake failure (empty security message)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
/* Not 4 octets long so fail as per RFC4752 Section 3.1 */
|
||||
if(input_buf[1].cbBuffer != 4) {
|
||||
infof(data, "GSSAPI handshake failure (invalid security data)\n");
|
||||
infof(data, "GSSAPI handshake failure (invalid security data)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
@ -329,7 +329,7 @@ CURLcode Curl_auth_create_gssapi_security_message(struct Curl_easy *data,
|
||||
/* Extract the security layer */
|
||||
sec_layer = indata & 0x000000FF;
|
||||
if(!(sec_layer & KERB_WRAP_NO_ENCRYPT)) {
|
||||
infof(data, "GSSAPI handshake failure (invalid security layer)\n");
|
||||
infof(data, "GSSAPI handshake failure (invalid security layer)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
|
@ -182,7 +182,7 @@ static CURLcode ntlm_decode_type2_target(struct Curl_easy *data,
|
||||
(target_info_offset + target_info_len) > type2len ||
|
||||
target_info_offset < 48) {
|
||||
infof(data, "NTLM handshake failure (bad type-2 message). "
|
||||
"Target Info Offset Len is set incorrect by the peer\n");
|
||||
"Target Info Offset Len is set incorrect by the peer");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
@ -286,7 +286,7 @@ CURLcode Curl_auth_decode_ntlm_type2_message(struct Curl_easy *data,
|
||||
(memcmp(type2, NTLMSSP_SIGNATURE, 8) != 0) ||
|
||||
(memcmp(type2 + 8, type2_marker, sizeof(type2_marker)) != 0)) {
|
||||
/* This was not a good enough type-2 message */
|
||||
infof(data, "NTLM handshake failure (bad type-2 message)\n");
|
||||
infof(data, "NTLM handshake failure (bad type-2 message)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
@ -296,7 +296,7 @@ CURLcode Curl_auth_decode_ntlm_type2_message(struct Curl_easy *data,
|
||||
if(ntlm->flags & NTLMFLAG_NEGOTIATE_TARGET_INFO) {
|
||||
result = ntlm_decode_type2_target(data, type2ref, ntlm);
|
||||
if(result) {
|
||||
infof(data, "NTLM handshake failure (bad type-2 message)\n");
|
||||
infof(data, "NTLM handshake failure (bad type-2 message)");
|
||||
return result;
|
||||
}
|
||||
}
|
||||
@ -533,7 +533,7 @@ CURLcode Curl_auth_create_ntlm_type3_message(struct Curl_easy *data,
|
||||
/* Get the machine's un-qualified host name as NTLM doesn't like the fully
|
||||
qualified domain name */
|
||||
if(Curl_gethostname(host, sizeof(host))) {
|
||||
infof(data, "gethostname() failed, continuing without!\n");
|
||||
infof(data, "gethostname() failed, continuing without!");
|
||||
hostlen = 0;
|
||||
}
|
||||
else {
|
||||
|
@ -206,7 +206,7 @@ CURLcode Curl_auth_decode_ntlm_type2_message(struct Curl_easy *data,
|
||||
|
||||
/* Ensure we have a valid type-2 message */
|
||||
if(!Curl_bufref_len(type2)) {
|
||||
infof(data, "NTLM handshake failure (empty type-2 message)\n");
|
||||
infof(data, "NTLM handshake failure (empty type-2 message)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
@ -309,7 +309,7 @@ CURLcode Curl_auth_create_ntlm_type3_message(struct Curl_easy *data,
|
||||
&type_3_desc,
|
||||
&attrs, &expiry);
|
||||
if(status != SEC_E_OK) {
|
||||
infof(data, "NTLM handshake failure (type-3 message): Status=%x\n",
|
||||
infof(data, "NTLM handshake failure (type-3 message): Status=%x",
|
||||
status);
|
||||
|
||||
if(status == SEC_E_INSUFFICIENT_MEMORY)
|
||||
|
@ -5,7 +5,7 @@
|
||||
* | (__| |_| | _ <| |___
|
||||
* \___|\___/|_| \_\_____|
|
||||
*
|
||||
* Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
* Copyright (C) 1998 - 2021, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
*
|
||||
* This software is licensed as described in the file COPYING, which
|
||||
* you should have received as part of this distribution. The terms
|
||||
@ -137,8 +137,7 @@ CURLcode Curl_auth_decode_spnego_message(struct Curl_easy *data,
|
||||
|
||||
/* Ensure we have a valid challenge message */
|
||||
if(!chlg) {
|
||||
infof(data, "SPNEGO handshake failure (empty challenge message)\n");
|
||||
|
||||
infof(data, "SPNEGO handshake failure (empty challenge message)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
|
@ -5,7 +5,7 @@
|
||||
* | (__| |_| | _ <| |___
|
||||
* \___|\___/|_| \_\_____|
|
||||
*
|
||||
* Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
* Copyright (C) 1998 - 2021, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
*
|
||||
* This software is licensed as described in the file COPYING, which
|
||||
* you should have received as part of this distribution. The terms
|
||||
@ -191,8 +191,7 @@ CURLcode Curl_auth_decode_spnego_message(struct Curl_easy *data,
|
||||
|
||||
/* Ensure we have a valid challenge message */
|
||||
if(!chlg) {
|
||||
infof(data, "SPNEGO handshake failure (empty challenge message)\n");
|
||||
|
||||
infof(data, "SPNEGO handshake failure (empty challenge message)");
|
||||
return CURLE_BAD_CONTENT_ENCODING;
|
||||
}
|
||||
|
||||
|
@ -779,7 +779,7 @@ CURLcode Curl_quic_connect(struct Curl_easy *data,
|
||||
return CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
}
|
||||
|
||||
infof(data, "Connect socket %d over QUIC to %s:%d\n",
|
||||
infof(data, "Connect socket %d over QUIC to %s:%d",
|
||||
sockfd, ipbuf, port);
|
||||
|
||||
qs->version = NGTCP2_PROTO_VER_MAX;
|
||||
@ -951,7 +951,7 @@ static int cb_h3_stream_close(nghttp3_conn *conn, int64_t stream_id,
|
||||
(void)stream_id;
|
||||
(void)app_error_code;
|
||||
(void)user_data;
|
||||
H3BUGF(infof(data, "cb_h3_stream_close CALLED\n"));
|
||||
H3BUGF(infof(data, "cb_h3_stream_close CALLED"));
|
||||
|
||||
stream->closed = TRUE;
|
||||
Curl_expire(data, 0, EXPIRE_QUIC);
|
||||
@ -1287,7 +1287,7 @@ static ssize_t ngh3_stream_recv(struct Curl_easy *data,
|
||||
return 0;
|
||||
}
|
||||
|
||||
infof(data, "ngh3_stream_recv returns 0 bytes and EAGAIN\n");
|
||||
infof(data, "ngh3_stream_recv returns 0 bytes and EAGAIN");
|
||||
*curlcode = CURLE_AGAIN;
|
||||
return -1;
|
||||
}
|
||||
@ -1304,7 +1304,7 @@ static int cb_h3_acked_stream_data(nghttp3_conn *conn, int64_t stream_id,
|
||||
if(!data->set.postfields) {
|
||||
stream->h3out->used -= datalen;
|
||||
H3BUGF(infof(data,
|
||||
"cb_h3_acked_stream_data, %zd bytes, %zd left unacked\n",
|
||||
"cb_h3_acked_stream_data, %zd bytes, %zd left unacked",
|
||||
datalen, stream->h3out->used));
|
||||
DEBUGASSERT(stream->h3out->used < H3_SEND_SIZE);
|
||||
|
||||
@ -1366,13 +1366,13 @@ static ssize_t cb_h3_readfunction(nghttp3_conn *conn, int64_t stream_id,
|
||||
if(!stream->upload_left)
|
||||
*pflags = NGHTTP3_DATA_FLAG_EOF;
|
||||
}
|
||||
H3BUGF(infof(data, "cb_h3_readfunction %zd bytes%s (at %zd unacked)\n",
|
||||
H3BUGF(infof(data, "cb_h3_readfunction %zd bytes%s (at %zd unacked)",
|
||||
nread, *pflags == NGHTTP3_DATA_FLAG_EOF?" EOF":"",
|
||||
out->used));
|
||||
}
|
||||
if(stream->upload_done && !stream->upload_len &&
|
||||
(stream->upload_left <= 0)) {
|
||||
H3BUGF(infof(data, "!!!!!!!!! cb_h3_readfunction sets EOF\n"));
|
||||
H3BUGF(infof(data, "!!!!!!!!! cb_h3_readfunction sets EOF"));
|
||||
*pflags = NGHTTP3_DATA_FLAG_EOF;
|
||||
return nread ? 1 : 0;
|
||||
}
|
||||
@ -1565,7 +1565,7 @@ static CURLcode http_request(struct Curl_easy *data, const void *mem,
|
||||
if(acc > MAX_ACC) {
|
||||
infof(data, "http_request: Warning: The cumulative length of all "
|
||||
"headers exceeds %d bytes and that could cause the "
|
||||
"stream to be rejected.\n", MAX_ACC);
|
||||
"stream to be rejected.", MAX_ACC);
|
||||
}
|
||||
}
|
||||
|
||||
@ -1611,7 +1611,7 @@ static CURLcode http_request(struct Curl_easy *data, const void *mem,
|
||||
|
||||
Curl_safefree(nva);
|
||||
|
||||
infof(data, "Using HTTP/3 Stream ID: %x (easy handle %p)\n",
|
||||
infof(data, "Using HTTP/3 Stream ID: %x (easy handle %p)",
|
||||
stream3_id, (void *)data);
|
||||
|
||||
return CURLE_OK;
|
||||
@ -1641,7 +1641,7 @@ static ssize_t ngh3_stream_send(struct Curl_easy *data,
|
||||
sent = len;
|
||||
}
|
||||
else {
|
||||
H3BUGF(infof(data, "ngh3_stream_send() wants to send %zd bytes\n",
|
||||
H3BUGF(infof(data, "ngh3_stream_send() wants to send %zd bytes",
|
||||
len));
|
||||
if(!stream->upload_len) {
|
||||
stream->upload_mem = mem;
|
||||
|
@ -258,7 +258,7 @@ CURLcode Curl_quic_connect(struct Curl_easy *data,
|
||||
return CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
}
|
||||
|
||||
infof(data, "Connect socket %d over QUIC to %s:%ld\n",
|
||||
infof(data, "Connect socket %d over QUIC to %s:%ld",
|
||||
sockfd, ipbuf, port);
|
||||
|
||||
Curl_persistconninfo(data, conn, NULL, -1);
|
||||
@ -277,7 +277,7 @@ CURLcode Curl_quic_connect(struct Curl_easy *data,
|
||||
offset += 1 + alpn_len;
|
||||
}
|
||||
|
||||
infof(data, "Sent QUIC client Initial, ALPN: %s\n",
|
||||
infof(data, "Sent QUIC client Initial, ALPN: %s",
|
||||
alpn_protocols + 1);
|
||||
}
|
||||
|
||||
@ -345,7 +345,7 @@ CURLcode Curl_quic_is_connected(struct Curl_easy *data,
|
||||
if(quiche_conn_is_established(qs->conn)) {
|
||||
*done = TRUE;
|
||||
result = quiche_has_connected(conn, 0, sockindex);
|
||||
DEBUGF(infof(data, "quiche established connection!\n"));
|
||||
DEBUGF(infof(data, "quiche established connection!"));
|
||||
}
|
||||
|
||||
return result;
|
||||
@ -491,7 +491,7 @@ static ssize_t h3_stream_recv(struct Curl_easy *data,
|
||||
headers.nlen = 0;
|
||||
|
||||
if(process_ingress(data, sockfd, qs)) {
|
||||
infof(data, "h3_stream_recv returns on ingress\n");
|
||||
infof(data, "h3_stream_recv returns on ingress");
|
||||
*curlcode = CURLE_RECV_ERROR;
|
||||
return -1;
|
||||
}
|
||||
@ -504,7 +504,7 @@ static ssize_t h3_stream_recv(struct Curl_easy *data,
|
||||
|
||||
if(s != stream->stream3_id) {
|
||||
/* another transfer, ignore for now */
|
||||
infof(data, "Got h3 for stream %u, expects %u\n",
|
||||
infof(data, "Got h3 for stream %u, expects %u",
|
||||
s, stream->stream3_id);
|
||||
continue;
|
||||
}
|
||||
@ -585,7 +585,7 @@ static ssize_t h3_stream_send(struct Curl_easy *data,
|
||||
sent = len;
|
||||
}
|
||||
else {
|
||||
H3BUGF(infof(data, "Pass on %zd body bytes to quiche\n", len));
|
||||
H3BUGF(infof(data, "Pass on %zd body bytes to quiche", len));
|
||||
sent = quiche_h3_send_body(qs->h3c, qs->conn, stream->stream3_id,
|
||||
(uint8_t *)mem, len, FALSE);
|
||||
if(sent < 0) {
|
||||
@ -778,7 +778,7 @@ static CURLcode http_request(struct Curl_easy *data, const void *mem,
|
||||
for(i = 0; i < nheader; ++i) {
|
||||
acc += nva[i].name_len + nva[i].value_len;
|
||||
|
||||
H3BUGF(infof(data, "h3 [%.*s: %.*s]\n",
|
||||
H3BUGF(infof(data, "h3 [%.*s: %.*s]",
|
||||
nva[i].name_len, nva[i].name,
|
||||
nva[i].value_len, nva[i].value));
|
||||
}
|
||||
@ -786,7 +786,7 @@ static CURLcode http_request(struct Curl_easy *data, const void *mem,
|
||||
if(acc > MAX_ACC) {
|
||||
infof(data, "http_request: Warning: The cumulative length of all "
|
||||
"headers exceeds %d bytes and that could cause the "
|
||||
"stream to be rejected.\n", MAX_ACC);
|
||||
"stream to be rejected.", MAX_ACC);
|
||||
}
|
||||
}
|
||||
|
||||
@ -823,13 +823,13 @@ static CURLcode http_request(struct Curl_easy *data, const void *mem,
|
||||
Curl_safefree(nva);
|
||||
|
||||
if(stream3_id < 0) {
|
||||
H3BUGF(infof(data, "quiche_h3_send_request returned %d\n",
|
||||
H3BUGF(infof(data, "quiche_h3_send_request returned %d",
|
||||
stream3_id));
|
||||
result = CURLE_SEND_ERROR;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
infof(data, "Using HTTP/3 Stream ID: %x (easy handle %p)\n",
|
||||
infof(data, "Using HTTP/3 Stream ID: %x (easy handle %p)",
|
||||
stream3_id, (void *)data);
|
||||
stream->stream3_id = stream3_id;
|
||||
|
||||
|
@ -303,7 +303,7 @@ static void mystate(struct Curl_easy *data, sshstate nowstate
|
||||
|
||||
|
||||
if(sshc->state != nowstate) {
|
||||
infof(data, "SSH %p state change from %s to %s (line %d)\n",
|
||||
infof(data, "SSH %p state change from %s to %s (line %d)",
|
||||
(void *) sshc, names[sshc->state], names[nowstate],
|
||||
lineno);
|
||||
}
|
||||
@ -368,7 +368,7 @@ static int myssh_is_known(struct Curl_easy *data)
|
||||
for(i = 0; i < 16; i++)
|
||||
msnprintf(&md5buffer[i*2], 3, "%02x", (unsigned char)hash[i]);
|
||||
|
||||
infof(data, "SSH MD5 fingerprint: %s\n", md5buffer);
|
||||
infof(data, "SSH MD5 fingerprint: %s", md5buffer);
|
||||
|
||||
if(!strcasecompare(md5buffer, pubkey_md5)) {
|
||||
failf(data,
|
||||
@ -732,7 +732,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
|
||||
if(rc == SSH_AUTH_SUCCESS) {
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "Authenticated with none\n");
|
||||
infof(data, "Authenticated with none");
|
||||
state(data, SSH_AUTH_DONE);
|
||||
break;
|
||||
}
|
||||
@ -744,7 +744,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
sshc->auth_methods = ssh_userauth_list(sshc->ssh_session, NULL);
|
||||
if(sshc->auth_methods & SSH_AUTH_METHOD_PUBLICKEY) {
|
||||
state(data, SSH_AUTH_PKEY_INIT);
|
||||
infof(data, "Authentication using SSH public key file\n");
|
||||
infof(data, "Authentication using SSH public key file");
|
||||
}
|
||||
else if(sshc->auth_methods & SSH_AUTH_METHOD_GSSAPI_MIC) {
|
||||
state(data, SSH_AUTH_GSSAPI);
|
||||
@ -810,7 +810,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(rc == SSH_AUTH_SUCCESS) {
|
||||
rc = SSH_OK;
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "Completed public key authentication\n");
|
||||
infof(data, "Completed public key authentication");
|
||||
state(data, SSH_AUTH_DONE);
|
||||
break;
|
||||
}
|
||||
@ -827,12 +827,12 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
|
||||
if(rc == SSH_AUTH_SUCCESS) {
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "Completed public key authentication\n");
|
||||
infof(data, "Completed public key authentication");
|
||||
state(data, SSH_AUTH_DONE);
|
||||
break;
|
||||
}
|
||||
else {
|
||||
infof(data, "Failed public key authentication (rc: %d)\n", rc);
|
||||
infof(data, "Failed public key authentication (rc: %d)", rc);
|
||||
MOVE_TO_SECONDARY_AUTH;
|
||||
}
|
||||
break;
|
||||
@ -852,7 +852,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(rc == SSH_AUTH_SUCCESS) {
|
||||
rc = SSH_OK;
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "Completed gssapi authentication\n");
|
||||
infof(data, "Completed gssapi authentication");
|
||||
state(data, SSH_AUTH_DONE);
|
||||
break;
|
||||
}
|
||||
@ -878,7 +878,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
if(rc == SSH_OK) {
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "completed keyboard interactive authentication\n");
|
||||
infof(data, "completed keyboard interactive authentication");
|
||||
}
|
||||
state(data, SSH_AUTH_DONE);
|
||||
break;
|
||||
@ -901,7 +901,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
|
||||
if(rc == SSH_AUTH_SUCCESS) {
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "Completed password authentication\n");
|
||||
infof(data, "Completed password authentication");
|
||||
state(data, SSH_AUTH_DONE);
|
||||
}
|
||||
else {
|
||||
@ -919,7 +919,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
/*
|
||||
* At this point we have an authenticated ssh session.
|
||||
*/
|
||||
infof(data, "Authentication complete\n");
|
||||
infof(data, "Authentication complete");
|
||||
|
||||
Curl_pgrsTime(data, TIMER_APPCONNECT); /* SSH is connected */
|
||||
|
||||
@ -930,7 +930,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
state(data, SSH_SFTP_INIT);
|
||||
break;
|
||||
}
|
||||
infof(data, "SSH CONNECT phase done\n");
|
||||
infof(data, "SSH CONNECT phase done");
|
||||
state(data, SSH_STOP);
|
||||
break;
|
||||
|
||||
@ -970,7 +970,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
we get the homedir here, we get the "workingpath" in the DO action
|
||||
since the homedir will remain the same between request but the
|
||||
working path will not. */
|
||||
DEBUGF(infof(data, "SSH CONNECT phase done\n"));
|
||||
DEBUGF(infof(data, "SSH CONNECT phase done"));
|
||||
state(data, SSH_STOP);
|
||||
break;
|
||||
|
||||
@ -983,7 +983,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
|
||||
if(data->set.quote) {
|
||||
infof(data, "Sending quote commands\n");
|
||||
infof(data, "Sending quote commands");
|
||||
sshc->quote_item = data->set.quote;
|
||||
state(data, SSH_SFTP_QUOTE);
|
||||
}
|
||||
@ -994,7 +994,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
|
||||
case SSH_SFTP_POSTQUOTE_INIT:
|
||||
if(data->set.postquote) {
|
||||
infof(data, "Sending quote commands\n");
|
||||
infof(data, "Sending quote commands");
|
||||
sshc->quote_item = data->set.postquote;
|
||||
state(data, SSH_SFTP_QUOTE);
|
||||
}
|
||||
@ -1367,7 +1367,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(sshc->slash_pos) {
|
||||
*sshc->slash_pos = 0;
|
||||
|
||||
infof(data, "Creating directory '%s'\n", protop->path);
|
||||
infof(data, "Creating directory '%s'", protop->path);
|
||||
state(data, SSH_SFTP_CREATE_DIRS_MKDIR);
|
||||
break;
|
||||
}
|
||||
@ -1731,7 +1731,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(data->req.size == 0) {
|
||||
/* no data to transfer */
|
||||
Curl_setup_transfer(data, -1, -1, FALSE, -1);
|
||||
infof(data, "File already completely downloaded\n");
|
||||
infof(data, "File already completely downloaded");
|
||||
state(data, SSH_STOP);
|
||||
break;
|
||||
}
|
||||
@ -1764,7 +1764,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
Curl_safefree(protop->path);
|
||||
|
||||
DEBUGF(infof(data, "SFTP DONE done\n"));
|
||||
DEBUGF(infof(data, "SFTP DONE done"));
|
||||
|
||||
/* Check if nextstate is set and move .nextstate could be POSTQUOTE_INIT
|
||||
After nextstate is executed, the control should come back to
|
||||
@ -1933,7 +1933,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
break;
|
||||
}
|
||||
if(rc != SSH_OK) {
|
||||
infof(data, "Failed to close libssh scp channel: %s\n",
|
||||
infof(data, "Failed to close libssh scp channel: %s",
|
||||
ssh_get_error(sshc->ssh_session));
|
||||
}
|
||||
}
|
||||
@ -1946,7 +1946,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
ssh_scp_free(sshc->scp_session);
|
||||
sshc->scp_session = NULL;
|
||||
}
|
||||
DEBUGF(infof(data, "SCP DONE phase complete\n"));
|
||||
DEBUGF(infof(data, "SCP DONE phase complete"));
|
||||
|
||||
ssh_set_blocking(sshc->ssh_session, 0);
|
||||
|
||||
@ -2213,7 +2213,7 @@ static CURLcode myssh_connect(struct Curl_easy *data, bool *done)
|
||||
}
|
||||
|
||||
if(conn->user && conn->user[0] != '\0') {
|
||||
infof(data, "User: %s\n", conn->user);
|
||||
infof(data, "User: %s", conn->user);
|
||||
rc = ssh_options_set(ssh->ssh_session, SSH_OPTIONS_USER, conn->user);
|
||||
if(rc != SSH_OK) {
|
||||
failf(data, "Could not set user");
|
||||
@ -2222,7 +2222,7 @@ static CURLcode myssh_connect(struct Curl_easy *data, bool *done)
|
||||
}
|
||||
|
||||
if(data->set.str[STRING_SSH_KNOWNHOSTS]) {
|
||||
infof(data, "Known hosts: %s\n", data->set.str[STRING_SSH_KNOWNHOSTS]);
|
||||
infof(data, "Known hosts: %s", data->set.str[STRING_SSH_KNOWNHOSTS]);
|
||||
rc = ssh_options_set(ssh->ssh_session, SSH_OPTIONS_KNOWNHOSTS,
|
||||
data->set.str[STRING_SSH_KNOWNHOSTS]);
|
||||
if(rc != SSH_OK) {
|
||||
@ -2279,7 +2279,7 @@ static CURLcode scp_doing(struct Curl_easy *data, bool *dophase_done)
|
||||
result = myssh_multi_statemach(data, dophase_done);
|
||||
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
return result;
|
||||
}
|
||||
@ -2300,7 +2300,7 @@ CURLcode scp_perform(struct Curl_easy *data,
|
||||
CURLcode result = CURLE_OK;
|
||||
struct connectdata *conn = data->conn;
|
||||
|
||||
DEBUGF(infof(data, "DO phase starts\n"));
|
||||
DEBUGF(infof(data, "DO phase starts"));
|
||||
|
||||
*dophase_done = FALSE; /* not done yet */
|
||||
|
||||
@ -2312,7 +2312,7 @@ CURLcode scp_perform(struct Curl_easy *data,
|
||||
*connected = conn->bits.tcpconnect[FIRSTSOCKET];
|
||||
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
|
||||
return result;
|
||||
@ -2481,7 +2481,7 @@ CURLcode sftp_perform(struct Curl_easy *data,
|
||||
CURLcode result = CURLE_OK;
|
||||
struct connectdata *conn = data->conn;
|
||||
|
||||
DEBUGF(infof(data, "DO phase starts\n"));
|
||||
DEBUGF(infof(data, "DO phase starts"));
|
||||
|
||||
*dophase_done = FALSE; /* not done yet */
|
||||
|
||||
@ -2494,7 +2494,7 @@ CURLcode sftp_perform(struct Curl_easy *data,
|
||||
*connected = conn->bits.tcpconnect[FIRSTSOCKET];
|
||||
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
|
||||
return result;
|
||||
@ -2506,7 +2506,7 @@ static CURLcode sftp_doing(struct Curl_easy *data,
|
||||
{
|
||||
CURLcode result = myssh_multi_statemach(data, dophase_done);
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
return result;
|
||||
}
|
||||
@ -2521,7 +2521,7 @@ static CURLcode sftp_disconnect(struct Curl_easy *data,
|
||||
CURLcode result = CURLE_OK;
|
||||
(void) dead_connection;
|
||||
|
||||
DEBUGF(infof(data, "SSH DISCONNECT starts now\n"));
|
||||
DEBUGF(infof(data, "SSH DISCONNECT starts now"));
|
||||
|
||||
if(conn->proto.sshc.ssh_session) {
|
||||
/* only if there's a session still around to use! */
|
||||
@ -2529,7 +2529,7 @@ static CURLcode sftp_disconnect(struct Curl_easy *data,
|
||||
result = myssh_block_statemach(data, TRUE);
|
||||
}
|
||||
|
||||
DEBUGF(infof(data, "SSH DISCONNECT is done\n"));
|
||||
DEBUGF(infof(data, "SSH DISCONNECT is done"));
|
||||
|
||||
return result;
|
||||
|
||||
|
@ -378,7 +378,7 @@ static void state(struct Curl_easy *data, sshstate nowstate)
|
||||
DEBUGASSERT(sizeof(names)/sizeof(names[0]) == SSH_LAST);
|
||||
|
||||
if(sshc->state != nowstate) {
|
||||
infof(data, "SFTP %p state change from %s to %s\n",
|
||||
infof(data, "SFTP %p state change from %s to %s",
|
||||
(void *)sshc, names[sshc->state], names[nowstate]);
|
||||
}
|
||||
#endif
|
||||
@ -491,7 +491,7 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
|
||||
break;
|
||||
#endif
|
||||
default:
|
||||
infof(data, "unsupported key type, can't check knownhosts!\n");
|
||||
infof(data, "unsupported key type, can't check knownhosts!");
|
||||
keybit = 0;
|
||||
break;
|
||||
}
|
||||
@ -519,7 +519,7 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
|
||||
&host);
|
||||
#endif
|
||||
|
||||
infof(data, "SSH host check: %d, key: %s\n", keycheck,
|
||||
infof(data, "SSH host check: %d, key: %s", keycheck,
|
||||
(keycheck <= LIBSSH2_KNOWNHOST_CHECK_MISMATCH)?
|
||||
host->key:"<none>");
|
||||
|
||||
@ -586,7 +586,7 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
|
||||
LIBSSH2_KNOWNHOST_KEYENC_RAW|
|
||||
keybit, NULL);
|
||||
if(addrc)
|
||||
infof(data, "Warning adding the known host %s failed!\n",
|
||||
infof(data, "Warning adding the known host %s failed!",
|
||||
conn->host.name);
|
||||
else if(rc == CURLKHSTAT_FINE_ADD_TO_FILE ||
|
||||
rc == CURLKHSTAT_FINE_REPLACE) {
|
||||
@ -597,7 +597,7 @@ static CURLcode ssh_knownhost(struct Curl_easy *data)
|
||||
data->set.str[STRING_SSH_KNOWNHOSTS],
|
||||
LIBSSH2_KNOWNHOST_FILE_OPENSSH);
|
||||
if(wrc) {
|
||||
infof(data, "Warning, writing %s failed!\n",
|
||||
infof(data, "Warning, writing %s failed!",
|
||||
data->set.str[STRING_SSH_KNOWNHOSTS]);
|
||||
}
|
||||
}
|
||||
@ -626,7 +626,7 @@ static CURLcode ssh_check_fingerprint(struct Curl_easy *data)
|
||||
int i;
|
||||
for(i = 0; i < 16; i++)
|
||||
msnprintf(&md5buffer[i*2], 3, "%02x", (unsigned char) fingerprint[i]);
|
||||
infof(data, "SSH MD5 fingerprint: %s\n", md5buffer);
|
||||
infof(data, "SSH MD5 fingerprint: %s", md5buffer);
|
||||
}
|
||||
|
||||
/* Before we authenticate we check the hostkey's MD5 fingerprint
|
||||
@ -645,7 +645,7 @@ static CURLcode ssh_check_fingerprint(struct Curl_easy *data)
|
||||
sshc->actualcode = CURLE_PEER_FAILED_VERIFICATION;
|
||||
return sshc->actualcode;
|
||||
}
|
||||
infof(data, "MD5 checksum match!\n");
|
||||
infof(data, "MD5 checksum match!");
|
||||
/* as we already matched, we skip the check for known hosts */
|
||||
return CURLE_OK;
|
||||
}
|
||||
@ -702,7 +702,7 @@ static CURLcode ssh_force_knownhost_key_type(struct Curl_easy *data)
|
||||
if(store->name[0] == '[') {
|
||||
kh_name_end = strstr(store->name, "]:");
|
||||
if(!kh_name_end) {
|
||||
infof(data, "Invalid host pattern %s in %s\n",
|
||||
infof(data, "Invalid host pattern %s in %s",
|
||||
store->name, data->set.str[STRING_SSH_KNOWNHOSTS]);
|
||||
continue;
|
||||
}
|
||||
@ -729,7 +729,7 @@ static CURLcode ssh_force_knownhost_key_type(struct Curl_easy *data)
|
||||
}
|
||||
|
||||
if(found) {
|
||||
infof(data, "Found host %s in %s\n",
|
||||
infof(data, "Found host %s in %s",
|
||||
conn->host.name, data->set.str[STRING_SSH_KNOWNHOSTS]);
|
||||
|
||||
switch(store->typemask & LIBSSH2_KNOWNHOST_KEY_MASK) {
|
||||
@ -768,13 +768,13 @@ static CURLcode ssh_force_knownhost_key_type(struct Curl_easy *data)
|
||||
return CURLE_SSH;
|
||||
}
|
||||
|
||||
infof(data, "Set \"%s\" as SSH hostkey type\n", hostkey_method);
|
||||
infof(data, "Set \"%s\" as SSH hostkey type", hostkey_method);
|
||||
result = libssh2_session_error_to_CURLE(
|
||||
libssh2_session_method_pref(
|
||||
sshc->ssh_session, LIBSSH2_METHOD_HOSTKEY, hostkey_method));
|
||||
}
|
||||
else {
|
||||
infof(data, "Did not find host %s in %s\n",
|
||||
infof(data, "Did not find host %s in %s",
|
||||
conn->host.name, data->set.str[STRING_SSH_KNOWNHOSTS]);
|
||||
}
|
||||
}
|
||||
@ -874,7 +874,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(!sshc->authlist) {
|
||||
if(libssh2_userauth_authenticated(sshc->ssh_session)) {
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "SSH user accepted with no authentication\n");
|
||||
infof(data, "SSH user accepted with no authentication");
|
||||
state(data, SSH_AUTH_DONE);
|
||||
break;
|
||||
}
|
||||
@ -887,7 +887,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
break;
|
||||
}
|
||||
infof(data, "SSH authentication methods available: %s\n",
|
||||
infof(data, "SSH authentication methods available: %s",
|
||||
sshc->authlist);
|
||||
|
||||
state(data, SSH_AUTH_PKEY_INIT);
|
||||
@ -972,8 +972,8 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
sshc->passphrase = "";
|
||||
|
||||
if(sshc->rsa_pub)
|
||||
infof(data, "Using SSH public key file '%s'\n", sshc->rsa_pub);
|
||||
infof(data, "Using SSH private key file '%s'\n", sshc->rsa);
|
||||
infof(data, "Using SSH public key file '%s'", sshc->rsa_pub);
|
||||
infof(data, "Using SSH private key file '%s'", sshc->rsa);
|
||||
|
||||
state(data, SSH_AUTH_PKEY);
|
||||
}
|
||||
@ -1000,14 +1000,14 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
|
||||
if(rc == 0) {
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "Initialized SSH public key authentication\n");
|
||||
infof(data, "Initialized SSH public key authentication");
|
||||
state(data, SSH_AUTH_DONE);
|
||||
}
|
||||
else {
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session,
|
||||
&err_msg, NULL, 0);
|
||||
infof(data, "SSH public key authentication failed: %s\n", err_msg);
|
||||
infof(data, "SSH public key authentication failed: %s", err_msg);
|
||||
state(data, SSH_AUTH_PASS_INIT);
|
||||
rc = 0; /* clear rc and continue */
|
||||
}
|
||||
@ -1035,7 +1035,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
if(rc == 0) {
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "Initialized password authentication\n");
|
||||
infof(data, "Initialized password authentication");
|
||||
state(data, SSH_AUTH_DONE);
|
||||
}
|
||||
else {
|
||||
@ -1069,7 +1069,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(!sshc->ssh_agent) {
|
||||
sshc->ssh_agent = libssh2_agent_init(sshc->ssh_session);
|
||||
if(!sshc->ssh_agent) {
|
||||
infof(data, "Could not create agent object\n");
|
||||
infof(data, "Could not create agent object");
|
||||
|
||||
state(data, SSH_AUTH_KEY_INIT);
|
||||
break;
|
||||
@ -1080,7 +1080,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(rc == LIBSSH2_ERROR_EAGAIN)
|
||||
break;
|
||||
if(rc < 0) {
|
||||
infof(data, "Failure connecting to agent\n");
|
||||
infof(data, "Failure connecting to agent");
|
||||
state(data, SSH_AUTH_KEY_INIT);
|
||||
rc = 0; /* clear rc and continue */
|
||||
}
|
||||
@ -1100,7 +1100,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(rc == LIBSSH2_ERROR_EAGAIN)
|
||||
break;
|
||||
if(rc < 0) {
|
||||
infof(data, "Failure requesting identities to agent\n");
|
||||
infof(data, "Failure requesting identities to agent");
|
||||
state(data, SSH_AUTH_KEY_INIT);
|
||||
rc = 0; /* clear rc and continue */
|
||||
}
|
||||
@ -1136,13 +1136,13 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
|
||||
if(rc < 0)
|
||||
infof(data, "Failure requesting identities to agent\n");
|
||||
infof(data, "Failure requesting identities to agent");
|
||||
else if(rc == 1)
|
||||
infof(data, "No identity would match\n");
|
||||
infof(data, "No identity would match");
|
||||
|
||||
if(rc == LIBSSH2_ERROR_NONE) {
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "Agent based authentication successful\n");
|
||||
infof(data, "Agent based authentication successful");
|
||||
state(data, SSH_AUTH_DONE);
|
||||
}
|
||||
else {
|
||||
@ -1174,7 +1174,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
if(rc == 0) {
|
||||
sshc->authed = TRUE;
|
||||
infof(data, "Initialized keyboard interactive authentication\n");
|
||||
infof(data, "Initialized keyboard interactive authentication");
|
||||
}
|
||||
state(data, SSH_AUTH_DONE);
|
||||
break;
|
||||
@ -1190,7 +1190,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
/*
|
||||
* At this point we have an authenticated ssh session.
|
||||
*/
|
||||
infof(data, "Authentication complete\n");
|
||||
infof(data, "Authentication complete");
|
||||
|
||||
Curl_pgrsTime(data, TIMER_APPCONNECT); /* SSH is connected */
|
||||
|
||||
@ -1201,7 +1201,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
state(data, SSH_SFTP_INIT);
|
||||
break;
|
||||
}
|
||||
infof(data, "SSH CONNECT phase done\n");
|
||||
infof(data, "SSH CONNECT phase done");
|
||||
state(data, SSH_STOP);
|
||||
break;
|
||||
|
||||
@ -1261,7 +1261,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
a time-out or similar */
|
||||
result = CURLE_SSH;
|
||||
sshc->actualcode = result;
|
||||
DEBUGF(infof(data, "error = %lu makes libcurl = %d\n",
|
||||
DEBUGF(infof(data, "error = %lu makes libcurl = %d",
|
||||
sftperr, (int)result));
|
||||
state(data, SSH_STOP);
|
||||
break;
|
||||
@ -1271,7 +1271,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
we get the homedir here, we get the "workingpath" in the DO action
|
||||
since the homedir will remain the same between request but the
|
||||
working path will not. */
|
||||
DEBUGF(infof(data, "SSH CONNECT phase done\n"));
|
||||
DEBUGF(infof(data, "SSH CONNECT phase done"));
|
||||
state(data, SSH_STOP);
|
||||
break;
|
||||
|
||||
@ -1285,7 +1285,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
|
||||
if(data->set.quote) {
|
||||
infof(data, "Sending quote commands\n");
|
||||
infof(data, "Sending quote commands");
|
||||
sshc->quote_item = data->set.quote;
|
||||
state(data, SSH_SFTP_QUOTE);
|
||||
}
|
||||
@ -1296,7 +1296,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
|
||||
case SSH_SFTP_POSTQUOTE_INIT:
|
||||
if(data->set.postquote) {
|
||||
infof(data, "Sending quote commands\n");
|
||||
infof(data, "Sending quote commands");
|
||||
sshc->quote_item = data->set.postquote;
|
||||
state(data, SSH_SFTP_QUOTE);
|
||||
}
|
||||
@ -2048,7 +2048,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(sshc->slash_pos) {
|
||||
*sshc->slash_pos = 0;
|
||||
|
||||
infof(data, "Creating directory '%s'\n", sshp->path);
|
||||
infof(data, "Creating directory '%s'", sshp->path);
|
||||
state(data, SSH_SFTP_CREATE_DIRS_MKDIR);
|
||||
break;
|
||||
}
|
||||
@ -2411,7 +2411,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(data->req.size == 0) {
|
||||
/* no data to transfer */
|
||||
Curl_setup_transfer(data, -1, -1, FALSE, -1);
|
||||
infof(data, "File already completely downloaded\n");
|
||||
infof(data, "File already completely downloaded");
|
||||
state(data, SSH_STOP);
|
||||
break;
|
||||
}
|
||||
@ -2446,14 +2446,14 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session,
|
||||
&err_msg, NULL, 0);
|
||||
infof(data, "Failed to close libssh2 file: %d %s\n", rc, err_msg);
|
||||
infof(data, "Failed to close libssh2 file: %d %s", rc, err_msg);
|
||||
}
|
||||
sshc->sftp_handle = NULL;
|
||||
}
|
||||
|
||||
Curl_safefree(sshp->path);
|
||||
|
||||
DEBUGF(infof(data, "SFTP DONE done\n"));
|
||||
DEBUGF(infof(data, "SFTP DONE done"));
|
||||
|
||||
/* Check if nextstate is set and move .nextstate could be POSTQUOTE_INIT
|
||||
After nextstate is executed, the control should come back to
|
||||
@ -2483,7 +2483,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session, &err_msg,
|
||||
NULL, 0);
|
||||
infof(data, "Failed to close libssh2 file: %d %s\n", rc, err_msg);
|
||||
infof(data, "Failed to close libssh2 file: %d %s", rc, err_msg);
|
||||
}
|
||||
sshc->sftp_handle = NULL;
|
||||
}
|
||||
@ -2493,7 +2493,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
break;
|
||||
}
|
||||
if(rc < 0) {
|
||||
infof(data, "Failed to stop libssh2 sftp subsystem\n");
|
||||
infof(data, "Failed to stop libssh2 sftp subsystem");
|
||||
}
|
||||
sshc->sftp_session = NULL;
|
||||
}
|
||||
@ -2668,7 +2668,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session,
|
||||
&err_msg, NULL, 0);
|
||||
infof(data, "Failed to send libssh2 channel EOF: %d %s\n",
|
||||
infof(data, "Failed to send libssh2 channel EOF: %d %s",
|
||||
rc, err_msg);
|
||||
}
|
||||
}
|
||||
@ -2685,7 +2685,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session,
|
||||
&err_msg, NULL, 0);
|
||||
infof(data, "Failed to get channel EOF: %d %s\n", rc, err_msg);
|
||||
infof(data, "Failed to get channel EOF: %d %s", rc, err_msg);
|
||||
}
|
||||
}
|
||||
state(data, SSH_SCP_WAIT_CLOSE);
|
||||
@ -2701,7 +2701,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session,
|
||||
&err_msg, NULL, 0);
|
||||
infof(data, "Channel failed to close: %d %s\n", rc, err_msg);
|
||||
infof(data, "Channel failed to close: %d %s", rc, err_msg);
|
||||
}
|
||||
}
|
||||
state(data, SSH_SCP_CHANNEL_FREE);
|
||||
@ -2717,12 +2717,12 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session,
|
||||
&err_msg, NULL, 0);
|
||||
infof(data, "Failed to free libssh2 scp subsystem: %d %s\n",
|
||||
infof(data, "Failed to free libssh2 scp subsystem: %d %s",
|
||||
rc, err_msg);
|
||||
}
|
||||
sshc->ssh_channel = NULL;
|
||||
}
|
||||
DEBUGF(infof(data, "SCP DONE phase complete\n"));
|
||||
DEBUGF(infof(data, "SCP DONE phase complete"));
|
||||
#if 0 /* PREV */
|
||||
state(data, SSH_SESSION_DISCONNECT);
|
||||
#endif
|
||||
@ -2743,7 +2743,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session,
|
||||
&err_msg, NULL, 0);
|
||||
infof(data, "Failed to free libssh2 scp subsystem: %d %s\n",
|
||||
infof(data, "Failed to free libssh2 scp subsystem: %d %s",
|
||||
rc, err_msg);
|
||||
}
|
||||
sshc->ssh_channel = NULL;
|
||||
@ -2758,7 +2758,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session,
|
||||
&err_msg, NULL, 0);
|
||||
infof(data, "Failed to disconnect libssh2 session: %d %s\n",
|
||||
infof(data, "Failed to disconnect libssh2 session: %d %s",
|
||||
rc, err_msg);
|
||||
}
|
||||
}
|
||||
@ -2787,7 +2787,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session,
|
||||
&err_msg, NULL, 0);
|
||||
infof(data, "Failed to disconnect from libssh2 agent: %d %s\n",
|
||||
infof(data, "Failed to disconnect from libssh2 agent: %d %s",
|
||||
rc, err_msg);
|
||||
}
|
||||
libssh2_agent_free(sshc->ssh_agent);
|
||||
@ -2809,7 +2809,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
char *err_msg = NULL;
|
||||
(void)libssh2_session_last_error(sshc->ssh_session,
|
||||
&err_msg, NULL, 0);
|
||||
infof(data, "Failed to free libssh2 session: %d %s\n", rc, err_msg);
|
||||
infof(data, "Failed to free libssh2 session: %d %s", rc, err_msg);
|
||||
}
|
||||
sshc->ssh_session = NULL;
|
||||
}
|
||||
@ -3085,10 +3085,10 @@ static CURLcode ssh_connect(struct Curl_easy *data, bool *done)
|
||||
|
||||
#ifdef CURL_LIBSSH2_DEBUG
|
||||
if(conn->user) {
|
||||
infof(data, "User: %s\n", conn->user);
|
||||
infof(data, "User: %s", conn->user);
|
||||
}
|
||||
if(conn->passwd) {
|
||||
infof(data, "Password: %s\n", conn->passwd);
|
||||
infof(data, "Password: %s", conn->passwd);
|
||||
}
|
||||
sock = conn->sock[FIRSTSOCKET];
|
||||
#endif /* CURL_LIBSSH2_DEBUG */
|
||||
@ -3122,7 +3122,7 @@ static CURLcode ssh_connect(struct Curl_easy *data, bool *done)
|
||||
sshrecv.recvptr = ssh_tls_recv;
|
||||
sshsend.sendptr = ssh_tls_send;
|
||||
|
||||
infof(data, "Uses HTTPS proxy!\n");
|
||||
infof(data, "Uses HTTPS proxy!");
|
||||
/*
|
||||
Setup libssh2 callbacks to make it read/write TLS from the socket.
|
||||
|
||||
@ -3160,7 +3160,7 @@ static CURLcode ssh_connect(struct Curl_easy *data, bool *done)
|
||||
#if LIBSSH2_VERSION_NUM >= 0x010208
|
||||
if(libssh2_session_flag(sshc->ssh_session, LIBSSH2_FLAG_COMPRESS, 1) < 0)
|
||||
#endif
|
||||
infof(data, "Failed to enable compression for ssh session\n");
|
||||
infof(data, "Failed to enable compression for ssh session");
|
||||
}
|
||||
|
||||
#ifdef HAVE_LIBSSH2_KNOWNHOST_API
|
||||
@ -3178,14 +3178,14 @@ static CURLcode ssh_connect(struct Curl_easy *data, bool *done)
|
||||
data->set.str[STRING_SSH_KNOWNHOSTS],
|
||||
LIBSSH2_KNOWNHOST_FILE_OPENSSH);
|
||||
if(rc < 0)
|
||||
infof(data, "Failed to read known hosts from %s\n",
|
||||
infof(data, "Failed to read known hosts from %s",
|
||||
data->set.str[STRING_SSH_KNOWNHOSTS]);
|
||||
}
|
||||
#endif /* HAVE_LIBSSH2_KNOWNHOST_API */
|
||||
|
||||
#ifdef CURL_LIBSSH2_DEBUG
|
||||
libssh2_trace(sshc->ssh_session, ~0);
|
||||
infof(data, "SSH socket: %d\n", (int)sock);
|
||||
infof(data, "SSH socket: %d", (int)sock);
|
||||
#endif /* CURL_LIBSSH2_DEBUG */
|
||||
|
||||
state(data, SSH_INIT);
|
||||
@ -3212,7 +3212,7 @@ CURLcode scp_perform(struct Curl_easy *data,
|
||||
CURLcode result = CURLE_OK;
|
||||
struct connectdata *conn = data->conn;
|
||||
|
||||
DEBUGF(infof(data, "DO phase starts\n"));
|
||||
DEBUGF(infof(data, "DO phase starts"));
|
||||
|
||||
*dophase_done = FALSE; /* not done yet */
|
||||
|
||||
@ -3225,7 +3225,7 @@ CURLcode scp_perform(struct Curl_easy *data,
|
||||
*connected = conn->bits.tcpconnect[FIRSTSOCKET];
|
||||
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
|
||||
return result;
|
||||
@ -3239,7 +3239,7 @@ static CURLcode scp_doing(struct Curl_easy *data,
|
||||
result = ssh_multi_statemach(data, dophase_done);
|
||||
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
return result;
|
||||
}
|
||||
@ -3401,7 +3401,7 @@ CURLcode sftp_perform(struct Curl_easy *data,
|
||||
{
|
||||
CURLcode result = CURLE_OK;
|
||||
|
||||
DEBUGF(infof(data, "DO phase starts\n"));
|
||||
DEBUGF(infof(data, "DO phase starts"));
|
||||
|
||||
*dophase_done = FALSE; /* not done yet */
|
||||
|
||||
@ -3414,7 +3414,7 @@ CURLcode sftp_perform(struct Curl_easy *data,
|
||||
*connected = data->conn->bits.tcpconnect[FIRSTSOCKET];
|
||||
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
|
||||
return result;
|
||||
@ -3427,7 +3427,7 @@ static CURLcode sftp_doing(struct Curl_easy *data,
|
||||
CURLcode result = ssh_multi_statemach(data, dophase_done);
|
||||
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
return result;
|
||||
}
|
||||
@ -3442,7 +3442,7 @@ static CURLcode sftp_disconnect(struct Curl_easy *data,
|
||||
struct ssh_conn *sshc = &conn->proto.sshc;
|
||||
(void) dead_connection;
|
||||
|
||||
DEBUGF(infof(data, "SSH DISCONNECT starts now\n"));
|
||||
DEBUGF(infof(data, "SSH DISCONNECT starts now"));
|
||||
|
||||
if(sshc->ssh_session) {
|
||||
/* only if there's a session still around to use! */
|
||||
@ -3450,7 +3450,7 @@ static CURLcode sftp_disconnect(struct Curl_easy *data,
|
||||
result = ssh_block_statemach(data, conn, TRUE);
|
||||
}
|
||||
|
||||
DEBUGF(infof(data, "SSH DISCONNECT is done\n"));
|
||||
DEBUGF(infof(data, "SSH DISCONNECT is done"));
|
||||
|
||||
return result;
|
||||
|
||||
|
@ -205,7 +205,7 @@ static void state(struct Curl_easy *data, sshstate nowstate)
|
||||
DEBUGASSERT(sizeof(names)/sizeof(names[0]) == SSH_LAST);
|
||||
|
||||
if(sshc->state != nowstate) {
|
||||
infof(data, "wolfssh %p state change from %s to %s\n",
|
||||
infof(data, "wolfssh %p state change from %s to %s",
|
||||
(void *)sshc, names[sshc->state], names[nowstate]);
|
||||
}
|
||||
#endif
|
||||
@ -274,7 +274,7 @@ static ssize_t wsftp_send(struct Curl_easy *data, int sockindex,
|
||||
return -1;
|
||||
}
|
||||
DEBUGASSERT(rc == (int)len);
|
||||
infof(data, "sent %zd bytes SFTP from offset %zd\n",
|
||||
infof(data, "sent %zd bytes SFTP from offset %zd",
|
||||
len, sshc->offset);
|
||||
sshc->offset += len;
|
||||
return (ssize_t)rc;
|
||||
@ -348,7 +348,7 @@ static int userauth(byte authtype,
|
||||
void *ctx)
|
||||
{
|
||||
struct Curl_easy *data = ctx;
|
||||
DEBUGF(infof(data, "wolfssh callback: type %s\n",
|
||||
DEBUGF(infof(data, "wolfssh callback: type %s",
|
||||
authtype == WOLFSSH_USERAUTH_PASSWORD ? "PASSWORD" :
|
||||
"PUBLICCKEY"));
|
||||
if(authtype == WOLFSSH_USERAUTH_PASSWORD) {
|
||||
@ -468,7 +468,7 @@ static CURLcode wssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
state(data, SSH_STOP);
|
||||
return CURLE_SSH;
|
||||
}
|
||||
infof(data, "wolfssh connected!\n");
|
||||
infof(data, "wolfssh connected!");
|
||||
state(data, SSH_STOP);
|
||||
break;
|
||||
case SSH_STOP:
|
||||
@ -489,7 +489,7 @@ static CURLcode wssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
return CURLE_OK;
|
||||
}
|
||||
else if(rc == WS_SUCCESS) {
|
||||
infof(data, "wolfssh SFTP connected!\n");
|
||||
infof(data, "wolfssh SFTP connected!");
|
||||
state(data, SSH_SFTP_REALPATH);
|
||||
}
|
||||
else {
|
||||
@ -518,7 +518,7 @@ static CURLcode wssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
else {
|
||||
memcpy(sshc->homedir, name->fName, name->fSz);
|
||||
sshc->homedir[name->fSz] = 0;
|
||||
infof(data, "wolfssh SFTP realpath succeeded!\n");
|
||||
infof(data, "wolfssh SFTP realpath succeeded!");
|
||||
}
|
||||
wolfSSH_SFTPNAME_list_free(name);
|
||||
state(data, SSH_STOP);
|
||||
@ -536,7 +536,7 @@ static CURLcode wssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
|
||||
if(data->set.quote) {
|
||||
infof(data, "Sending quote commands\n");
|
||||
infof(data, "Sending quote commands");
|
||||
sshc->quote_item = data->set.quote;
|
||||
state(data, SSH_SFTP_QUOTE);
|
||||
}
|
||||
@ -616,7 +616,7 @@ static CURLcode wssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
return CURLE_OK;
|
||||
}
|
||||
else if(rc == WS_SUCCESS) {
|
||||
infof(data, "wolfssh SFTP open succeeded!\n");
|
||||
infof(data, "wolfssh SFTP open succeeded!");
|
||||
}
|
||||
else {
|
||||
failf(data, "wolfssh SFTP upload open failed: %d", rc);
|
||||
@ -727,7 +727,7 @@ static CURLcode wssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
return CURLE_OK;
|
||||
}
|
||||
else if(rc == WS_SUCCESS) {
|
||||
infof(data, "wolfssh SFTP open succeeded!\n");
|
||||
infof(data, "wolfssh SFTP open succeeded!");
|
||||
state(data, SSH_SFTP_DOWNLOAD_STAT);
|
||||
return CURLE_OK;
|
||||
}
|
||||
@ -753,7 +753,7 @@ static CURLcode wssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
return CURLE_OK;
|
||||
}
|
||||
else if(rc == WS_SUCCESS) {
|
||||
infof(data, "wolfssh STAT succeeded!\n");
|
||||
infof(data, "wolfssh STAT succeeded!");
|
||||
}
|
||||
else {
|
||||
failf(data, "wolfssh SFTP open failed: %d", rc);
|
||||
@ -769,12 +769,12 @@ static CURLcode wssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
data->req.maxdownload = size;
|
||||
Curl_pgrsSetDownloadSize(data, size);
|
||||
|
||||
infof(data, "SFTP download %" CURL_FORMAT_CURL_OFF_T " bytes\n", size);
|
||||
infof(data, "SFTP download %" CURL_FORMAT_CURL_OFF_T " bytes", size);
|
||||
|
||||
/* We cannot seek with wolfSSH so resuming and range requests are not
|
||||
possible */
|
||||
if(data->state.use_range || data->state.resume_from) {
|
||||
infof(data, "wolfSSH cannot do range/seek on SFTP\n");
|
||||
infof(data, "wolfSSH cannot do range/seek on SFTP");
|
||||
return CURLE_BAD_DOWNLOAD_RESUME;
|
||||
}
|
||||
|
||||
@ -782,7 +782,7 @@ static CURLcode wssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
if(data->req.size == 0) {
|
||||
/* no data to transfer */
|
||||
Curl_setup_transfer(data, -1, -1, FALSE, -1);
|
||||
infof(data, "File already completely downloaded\n");
|
||||
infof(data, "File already completely downloaded");
|
||||
state(data, SSH_STOP);
|
||||
break;
|
||||
}
|
||||
@ -911,7 +911,7 @@ static CURLcode wssh_multi_statemach(struct Curl_easy *data, bool *done)
|
||||
/* if there's no error, it isn't done and it didn't EWOULDBLOCK, then
|
||||
try again */
|
||||
if(*done) {
|
||||
DEBUGF(infof(data, "wssh_statemach_act says DONE\n"));
|
||||
DEBUGF(infof(data, "wssh_statemach_act says DONE"));
|
||||
}
|
||||
} while(!result && !*done && !block);
|
||||
|
||||
@ -937,7 +937,7 @@ CURLcode wsftp_perform(struct Curl_easy *data,
|
||||
CURLcode result = CURLE_OK;
|
||||
struct connectdata *conn = data->conn;
|
||||
|
||||
DEBUGF(infof(data, "DO phase starts\n"));
|
||||
DEBUGF(infof(data, "DO phase starts"));
|
||||
|
||||
*dophase_done = FALSE; /* not done yet */
|
||||
|
||||
@ -950,7 +950,7 @@ CURLcode wsftp_perform(struct Curl_easy *data,
|
||||
*connected = conn->bits.tcpconnect[FIRSTSOCKET];
|
||||
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
|
||||
return result;
|
||||
@ -1107,7 +1107,7 @@ static CURLcode wsftp_doing(struct Curl_easy *data,
|
||||
CURLcode result = wssh_multi_statemach(data, dophase_done);
|
||||
|
||||
if(*dophase_done) {
|
||||
DEBUGF(infof(data, "DO phase is complete\n"));
|
||||
DEBUGF(infof(data, "DO phase is complete"));
|
||||
}
|
||||
return result;
|
||||
}
|
||||
@ -1119,7 +1119,7 @@ static CURLcode wsftp_disconnect(struct Curl_easy *data,
|
||||
CURLcode result = CURLE_OK;
|
||||
(void)dead;
|
||||
|
||||
DEBUGF(infof(data, "SSH DISCONNECT starts now\n"));
|
||||
DEBUGF(infof(data, "SSH DISCONNECT starts now"));
|
||||
|
||||
if(conn->proto.sshc.ssh_session) {
|
||||
/* only if there's a session still around to use! */
|
||||
@ -1127,7 +1127,7 @@ static CURLcode wsftp_disconnect(struct Curl_easy *data,
|
||||
result = wssh_block_statemach(data, TRUE);
|
||||
}
|
||||
|
||||
DEBUGF(infof(data, "SSH DISCONNECT is done\n"));
|
||||
DEBUGF(infof(data, "SSH DISCONNECT is done"));
|
||||
return result;
|
||||
}
|
||||
|
||||
|
@ -349,7 +349,7 @@ static CURLcode bearssl_connect_step1(struct Curl_easy *data,
|
||||
return ret;
|
||||
}
|
||||
infof(data, "error setting certificate verify locations,"
|
||||
" continuing anyway:\n");
|
||||
" continuing anyway:");
|
||||
}
|
||||
}
|
||||
|
||||
@ -373,7 +373,7 @@ static CURLcode bearssl_connect_step1(struct Curl_easy *data,
|
||||
if(!Curl_ssl_getsessionid(data, conn, SSL_IS_PROXY() ? TRUE : FALSE,
|
||||
&session, NULL, sockindex)) {
|
||||
br_ssl_engine_set_session_parameters(&backend->ctx.eng, session);
|
||||
infof(data, "BearSSL: re-using session ID\n");
|
||||
infof(data, "BearSSL: re-using session ID");
|
||||
}
|
||||
Curl_ssl_sessionid_unlock(data);
|
||||
}
|
||||
@ -392,12 +392,12 @@ static CURLcode bearssl_connect_step1(struct Curl_easy *data,
|
||||
#endif
|
||||
) {
|
||||
backend->protocols[cur++] = ALPN_H2;
|
||||
infof(data, "ALPN, offering %s\n", ALPN_H2);
|
||||
infof(data, "ALPN, offering %s", ALPN_H2);
|
||||
}
|
||||
#endif
|
||||
|
||||
backend->protocols[cur++] = ALPN_HTTP_1_1;
|
||||
infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1);
|
||||
infof(data, "ALPN, offering %s", ALPN_HTTP_1_1);
|
||||
|
||||
br_ssl_engine_set_protocol_names(&backend->ctx.eng,
|
||||
backend->protocols, cur);
|
||||
@ -538,7 +538,7 @@ static CURLcode bearssl_connect_step3(struct Curl_easy *data,
|
||||
|
||||
protocol = br_ssl_engine_get_selected_protocol(&backend->ctx.eng);
|
||||
if(protocol) {
|
||||
infof(data, "ALPN, server accepted to use %s\n", protocol);
|
||||
infof(data, "ALPN, server accepted to use %s", protocol);
|
||||
|
||||
#ifdef USE_HTTP2
|
||||
if(!strcmp(protocol, ALPN_H2))
|
||||
@ -548,12 +548,12 @@ static CURLcode bearssl_connect_step3(struct Curl_easy *data,
|
||||
if(!strcmp(protocol, ALPN_HTTP_1_1))
|
||||
conn->negnpn = CURL_HTTP_VERSION_1_1;
|
||||
else
|
||||
infof(data, "ALPN, unrecognized protocol %s\n", protocol);
|
||||
infof(data, "ALPN, unrecognized protocol %s", protocol);
|
||||
Curl_multiuse_state(data, conn->negnpn == CURL_HTTP_VERSION_2 ?
|
||||
BUNDLE_MULTIPLEX : BUNDLE_NO_MULTIUSE);
|
||||
}
|
||||
else
|
||||
infof(data, "ALPN, server did not agree to a protocol\n");
|
||||
infof(data, "ALPN, server did not agree to a protocol");
|
||||
}
|
||||
|
||||
if(SSL_SET_OPTION(primary.sessionid)) {
|
||||
|
@ -1011,7 +1011,7 @@ static CURLcode gskit_connect_step3(struct Curl_easy *data,
|
||||
CURLE_OK) {
|
||||
int i;
|
||||
|
||||
infof(data, "Server certificate:\n");
|
||||
infof(data, "Server certificate:");
|
||||
p = cdev;
|
||||
for(i = 0; i++ < cdec; p++)
|
||||
switch(p->cert_data_id) {
|
||||
@ -1020,16 +1020,16 @@ static CURLcode gskit_connect_step3(struct Curl_easy *data,
|
||||
certend = cert + cdev->cert_data_l;
|
||||
break;
|
||||
case CERT_DN_PRINTABLE:
|
||||
infof(data, "\t subject: %.*s\n", p->cert_data_l, p->cert_data_p);
|
||||
infof(data, "\t subject: %.*s", p->cert_data_l, p->cert_data_p);
|
||||
break;
|
||||
case CERT_ISSUER_DN_PRINTABLE:
|
||||
infof(data, "\t issuer: %.*s\n", p->cert_data_l, p->cert_data_p);
|
||||
infof(data, "\t issuer: %.*s", p->cert_data_l, p->cert_data_p);
|
||||
break;
|
||||
case CERT_VALID_FROM:
|
||||
infof(data, "\t start date: %.*s\n", p->cert_data_l, p->cert_data_p);
|
||||
infof(data, "\t start date: %.*s", p->cert_data_l, p->cert_data_p);
|
||||
break;
|
||||
case CERT_VALID_TO:
|
||||
infof(data, "\t expire date: %.*s\n", p->cert_data_l, p->cert_data_p);
|
||||
infof(data, "\t expire date: %.*s", p->cert_data_l, p->cert_data_p);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -147,7 +147,7 @@ static void showtime(struct Curl_easy *data,
|
||||
|
||||
msnprintf(str,
|
||||
sizeof(str),
|
||||
"\t %s: %s, %02d %s %4d %02d:%02d:%02d GMT",
|
||||
" %s: %s, %02d %s %4d %02d:%02d:%02d GMT",
|
||||
text,
|
||||
Curl_wkday[tm->tm_wday?tm->tm_wday-1:6],
|
||||
tm->tm_mday,
|
||||
@ -156,7 +156,7 @@ static void showtime(struct Curl_easy *data,
|
||||
tm->tm_hour,
|
||||
tm->tm_min,
|
||||
tm->tm_sec);
|
||||
infof(data, "%s\n", str);
|
||||
infof(data, "%s", str);
|
||||
}
|
||||
#endif
|
||||
|
||||
@ -266,7 +266,7 @@ static CURLcode handshake(struct Curl_easy *data,
|
||||
if(!strerr)
|
||||
strerr = gnutls_strerror(rc);
|
||||
|
||||
infof(data, "gnutls_handshake() warning: %s\n", strerr);
|
||||
infof(data, "gnutls_handshake() warning: %s", strerr);
|
||||
continue;
|
||||
}
|
||||
else if(rc < 0) {
|
||||
@ -432,7 +432,7 @@ gtls_connect_step1(struct Curl_easy *data,
|
||||
|
||||
#ifdef HAVE_GNUTLS_SRP
|
||||
if(SSL_SET_OPTION(authtype) == CURL_TLSAUTH_SRP) {
|
||||
infof(data, "Using TLS-SRP username: %s\n", SSL_SET_OPTION(username));
|
||||
infof(data, "Using TLS-SRP username: %s", SSL_SET_OPTION(username));
|
||||
|
||||
rc = gnutls_srp_allocate_client_credentials(
|
||||
&backend->srp_client_cred);
|
||||
@ -462,7 +462,7 @@ gtls_connect_step1(struct Curl_easy *data,
|
||||
SSL_CONN_CONFIG(CAfile),
|
||||
GNUTLS_X509_FMT_PEM);
|
||||
if(rc < 0) {
|
||||
infof(data, "error reading ca cert file %s (%s)\n",
|
||||
infof(data, "error reading ca cert file %s (%s)",
|
||||
SSL_CONN_CONFIG(CAfile), gnutls_strerror(rc));
|
||||
if(SSL_CONN_CONFIG(verifypeer)) {
|
||||
*certverifyresult = rc;
|
||||
@ -470,7 +470,7 @@ gtls_connect_step1(struct Curl_easy *data,
|
||||
}
|
||||
}
|
||||
else
|
||||
infof(data, "found %d certificates in %s\n", rc,
|
||||
infof(data, "found %d certificates in %s", rc,
|
||||
SSL_CONN_CONFIG(CAfile));
|
||||
}
|
||||
|
||||
@ -480,7 +480,7 @@ gtls_connect_step1(struct Curl_easy *data,
|
||||
SSL_CONN_CONFIG(CApath),
|
||||
GNUTLS_X509_FMT_PEM);
|
||||
if(rc < 0) {
|
||||
infof(data, "error reading ca cert file %s (%s)\n",
|
||||
infof(data, "error reading ca cert file %s (%s)",
|
||||
SSL_CONN_CONFIG(CApath), gnutls_strerror(rc));
|
||||
if(SSL_CONN_CONFIG(verifypeer)) {
|
||||
*certverifyresult = rc;
|
||||
@ -488,7 +488,7 @@ gtls_connect_step1(struct Curl_easy *data,
|
||||
}
|
||||
}
|
||||
else
|
||||
infof(data, "found %d certificates in %s\n",
|
||||
infof(data, "found %d certificates in %s",
|
||||
rc, SSL_CONN_CONFIG(CApath));
|
||||
}
|
||||
|
||||
@ -511,7 +511,7 @@ gtls_connect_step1(struct Curl_easy *data,
|
||||
return CURLE_SSL_CRL_BADFILE;
|
||||
}
|
||||
else
|
||||
infof(data, "found %d CRL in %s\n",
|
||||
infof(data, "found %d CRL in %s",
|
||||
rc, SSL_SET_OPTION(CRLfile));
|
||||
}
|
||||
|
||||
@ -544,7 +544,7 @@ gtls_connect_step1(struct Curl_easy *data,
|
||||
(gnutls_server_name_set(session, GNUTLS_NAME_DNS, hostname,
|
||||
strlen(hostname)) < 0))
|
||||
infof(data, "WARNING: failed to configure server name indication (SNI) "
|
||||
"TLS extension\n");
|
||||
"TLS extension");
|
||||
|
||||
/* Use default priorities */
|
||||
rc = gnutls_set_default_priority(session);
|
||||
@ -597,12 +597,12 @@ gtls_connect_step1(struct Curl_easy *data,
|
||||
free(prioritysrp);
|
||||
|
||||
if((rc == GNUTLS_E_INVALID_REQUEST) && err) {
|
||||
infof(data, "This GnuTLS does not support SRP\n");
|
||||
infof(data, "This GnuTLS does not support SRP");
|
||||
}
|
||||
}
|
||||
else {
|
||||
#endif
|
||||
infof(data, "GnuTLS ciphers: %s\n", prioritylist);
|
||||
infof(data, "GnuTLS ciphers: %s", prioritylist);
|
||||
rc = gnutls_priority_set_direct(session, prioritylist, &err);
|
||||
#ifdef HAVE_GNUTLS_SRP
|
||||
}
|
||||
@ -627,14 +627,14 @@ gtls_connect_step1(struct Curl_easy *data,
|
||||
protocols[cur].data = (unsigned char *)ALPN_H2;
|
||||
protocols[cur].size = ALPN_H2_LENGTH;
|
||||
cur++;
|
||||
infof(data, "ALPN, offering %.*s\n", ALPN_H2_LENGTH, ALPN_H2);
|
||||
infof(data, "ALPN, offering %.*s", ALPN_H2_LENGTH, ALPN_H2);
|
||||
}
|
||||
#endif
|
||||
|
||||
protocols[cur].data = (unsigned char *)ALPN_HTTP_1_1;
|
||||
protocols[cur].size = ALPN_HTTP_1_1_LENGTH;
|
||||
cur++;
|
||||
infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1);
|
||||
infof(data, "ALPN, offering %s", ALPN_HTTP_1_1);
|
||||
|
||||
gnutls_alpn_set_protocols(session, protocols, cur, 0);
|
||||
}
|
||||
@ -740,7 +740,7 @@ gtls_connect_step1(struct Curl_easy *data,
|
||||
gnutls_session_set_data(session, ssl_sessionid, ssl_idsize);
|
||||
|
||||
/* Informational message */
|
||||
infof(data, "SSL re-using session ID\n");
|
||||
infof(data, "SSL re-using session ID");
|
||||
}
|
||||
Curl_ssl_sessionid_unlock(data);
|
||||
}
|
||||
@ -843,7 +843,7 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
gnutls_cipher_get(session),
|
||||
gnutls_mac_get(session));
|
||||
|
||||
infof(data, "SSL connection using %s / %s\n",
|
||||
infof(data, "SSL connection using %s / %s",
|
||||
gnutls_protocol_get_name(version), ptr);
|
||||
|
||||
/* This function will return the peer's raw certificate (chain) as sent by
|
||||
@ -874,7 +874,7 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
}
|
||||
#endif
|
||||
}
|
||||
infof(data, "\t common name: WARNING couldn't obtain\n");
|
||||
infof(data, " common name: WARNING couldn't obtain");
|
||||
}
|
||||
|
||||
if(data->set.ssl.certinfo && chainp) {
|
||||
@ -921,13 +921,13 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
return CURLE_PEER_FAILED_VERIFICATION;
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate verification FAILED\n");
|
||||
infof(data, " server certificate verification FAILED");
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate verification OK\n");
|
||||
infof(data, " server certificate verification OK");
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate verification SKIPPED\n");
|
||||
infof(data, " server certificate verification SKIPPED");
|
||||
|
||||
if(SSL_CONN_CONFIG(verifystatus)) {
|
||||
if(gnutls_ocsp_status_request_is_checked(session, 0) == 0) {
|
||||
@ -939,7 +939,7 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
|
||||
rc = gnutls_ocsp_status_request_get(session, &status_request);
|
||||
|
||||
infof(data, "\t server certificate status verification FAILED\n");
|
||||
infof(data, " server certificate status verification FAILED");
|
||||
|
||||
if(rc == GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) {
|
||||
failf(data, "No OCSP response received");
|
||||
@ -1027,10 +1027,10 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
return CURLE_SSL_INVALIDCERTSTATUS;
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate status verification OK\n");
|
||||
infof(data, " server certificate status verification OK");
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate status verification SKIPPED\n");
|
||||
infof(data, " server certificate status verification SKIPPED");
|
||||
|
||||
/* initialize an X.509 certificate structure. */
|
||||
gnutls_x509_crt_init(&x509_cert);
|
||||
@ -1053,7 +1053,7 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
gnutls_x509_crt_deinit(x509_cert);
|
||||
return CURLE_SSL_ISSUER_ERROR;
|
||||
}
|
||||
infof(data, "\t server certificate issuer check OK (Issuer Cert: %s)\n",
|
||||
infof(data, " server certificate issuer check OK (Issuer Cert: %s)",
|
||||
SSL_SET_OPTION(issuercert)?SSL_SET_OPTION(issuercert):"none");
|
||||
}
|
||||
|
||||
@ -1064,7 +1064,7 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
certname,
|
||||
&size);
|
||||
if(rc) {
|
||||
infof(data, "error fetching CN from cert:%s\n",
|
||||
infof(data, "error fetching CN from cert:%s",
|
||||
gnutls_strerror(rc));
|
||||
}
|
||||
|
||||
@ -1124,11 +1124,11 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
return CURLE_PEER_FAILED_VERIFICATION;
|
||||
}
|
||||
else
|
||||
infof(data, "\t common name: %s (does not match '%s')\n",
|
||||
infof(data, " common name: %s (does not match '%s')",
|
||||
certname, SSL_HOST_DISPNAME());
|
||||
}
|
||||
else
|
||||
infof(data, "\t common name: %s (matched)\n", certname);
|
||||
infof(data, " common name: %s (matched)", certname);
|
||||
|
||||
/* Check for time-based validity */
|
||||
certclock = gnutls_x509_crt_get_expiration_time(x509_cert);
|
||||
@ -1141,7 +1141,7 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate expiration date verify FAILED\n");
|
||||
infof(data, " server certificate expiration date verify FAILED");
|
||||
}
|
||||
else {
|
||||
if(certclock < time(NULL)) {
|
||||
@ -1152,10 +1152,10 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
return CURLE_PEER_FAILED_VERIFICATION;
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate expiration date FAILED\n");
|
||||
infof(data, " server certificate expiration date FAILED");
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate expiration date OK\n");
|
||||
infof(data, " server certificate expiration date OK");
|
||||
}
|
||||
|
||||
certclock = gnutls_x509_crt_get_activation_time(x509_cert);
|
||||
@ -1168,7 +1168,7 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate activation date verify FAILED\n");
|
||||
infof(data, " server certificate activation date verify FAILED");
|
||||
}
|
||||
else {
|
||||
if(certclock > time(NULL)) {
|
||||
@ -1179,10 +1179,10 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
return CURLE_PEER_FAILED_VERIFICATION;
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate activation date FAILED\n");
|
||||
infof(data, " server certificate activation date FAILED");
|
||||
}
|
||||
else
|
||||
infof(data, "\t server certificate activation date OK\n");
|
||||
infof(data, " server certificate activation date OK");
|
||||
}
|
||||
|
||||
ptr = SSL_PINNED_PUB_KEY();
|
||||
@ -1208,19 +1208,19 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
||||
/* public key algorithm's parameters */
|
||||
algo = gnutls_x509_crt_get_pk_algorithm(x509_cert, &bits);
|
||||
infof(data, "\t certificate public key: %s\n",
|
||||
infof(data, " certificate public key: %s",
|
||||
gnutls_pk_algorithm_get_name(algo));
|
||||
|
||||
/* version of the X.509 certificate. */
|
||||
infof(data, "\t certificate version: #%d\n",
|
||||
infof(data, " certificate version: #%d",
|
||||
gnutls_x509_crt_get_version(x509_cert));
|
||||
|
||||
|
||||
rc = gnutls_x509_crt_get_dn2(x509_cert, &certfields);
|
||||
if(rc)
|
||||
infof(data, "Failed to get certificate name\n");
|
||||
infof(data, "Failed to get certificate name");
|
||||
else {
|
||||
infof(data, "\t subject: %s\n", certfields.data);
|
||||
infof(data, " subject: %s", certfields.data);
|
||||
|
||||
certclock = gnutls_x509_crt_get_activation_time(x509_cert);
|
||||
showtime(data, "start date", certclock);
|
||||
@ -1233,9 +1233,9 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
|
||||
rc = gnutls_x509_crt_get_issuer_dn2(x509_cert, &certfields);
|
||||
if(rc)
|
||||
infof(data, "Failed to get certificate issuer\n");
|
||||
infof(data, "Failed to get certificate issuer");
|
||||
else {
|
||||
infof(data, "\t issuer: %s\n", certfields.data);
|
||||
infof(data, " issuer: %s", certfields.data);
|
||||
|
||||
gnutls_free(certfields.data);
|
||||
}
|
||||
@ -1246,7 +1246,7 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
if(conn->bits.tls_enable_alpn) {
|
||||
rc = gnutls_alpn_get_selected_protocol(session, &proto);
|
||||
if(rc == 0) {
|
||||
infof(data, "ALPN, server accepted to use %.*s\n", proto.size,
|
||||
infof(data, "ALPN, server accepted to use %.*s", proto.size,
|
||||
proto.data);
|
||||
|
||||
#ifdef USE_HTTP2
|
||||
@ -1263,7 +1263,7 @@ gtls_connect_step3(struct Curl_easy *data,
|
||||
}
|
||||
}
|
||||
else
|
||||
infof(data, "ALPN, server did not agree to a protocol\n");
|
||||
infof(data, "ALPN, server did not agree to a protocol");
|
||||
|
||||
Curl_multiuse_state(data, conn->negnpn == CURL_HTTP_VERSION_2 ?
|
||||
BUNDLE_MULTIPLEX : BUNDLE_NO_MULTIUSE);
|
||||
@ -1505,7 +1505,7 @@ static int gtls_shutdown(struct Curl_easy *data, struct connectdata *conn,
|
||||
break;
|
||||
case GNUTLS_E_AGAIN:
|
||||
case GNUTLS_E_INTERRUPTED:
|
||||
infof(data, "GNUTLS_E_AGAIN || GNUTLS_E_INTERRUPTED\n");
|
||||
infof(data, "GNUTLS_E_AGAIN || GNUTLS_E_INTERRUPTED");
|
||||
break;
|
||||
default:
|
||||
retval = -1;
|
||||
@ -1619,7 +1619,7 @@ static bool gtls_cert_status_request(void)
|
||||
}
|
||||
|
||||
static void *gtls_get_internals(struct ssl_connect_data *connssl,
|
||||
CURLINFO info UNUSED_PARAM)
|
||||
CURLINFO info UNUSED_PARAM)
|
||||
{
|
||||
struct ssl_backend_data *backend = connssl->backend;
|
||||
(void)info;
|
||||
|
@ -401,7 +401,7 @@ mbed_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
}
|
||||
}
|
||||
|
||||
infof(data, "mbedTLS: Connecting to %s:%ld\n", hostname, port);
|
||||
infof(data, "mbedTLS: Connecting to %s:%ld", hostname, port);
|
||||
|
||||
mbedtls_ssl_config_init(&backend->config);
|
||||
|
||||
@ -428,7 +428,7 @@ mbed_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
case CURL_SSLVERSION_TLSv1:
|
||||
mbedtls_ssl_conf_min_version(&backend->config, MBEDTLS_SSL_MAJOR_VERSION_3,
|
||||
MBEDTLS_SSL_MINOR_VERSION_1);
|
||||
infof(data, "mbedTLS: Set min SSL version to TLS 1.0\n");
|
||||
infof(data, "mbedTLS: Set min SSL version to TLS 1.0");
|
||||
break;
|
||||
case CURL_SSLVERSION_TLSv1_0:
|
||||
case CURL_SSLVERSION_TLSv1_1:
|
||||
@ -481,7 +481,7 @@ mbed_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
failf(data, "mbedtls_ssl_set_session returned -0x%x", -ret);
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
infof(data, "mbedTLS re-using session\n");
|
||||
infof(data, "mbedTLS re-using session");
|
||||
}
|
||||
Curl_ssl_sessionid_unlock(data);
|
||||
}
|
||||
@ -519,7 +519,7 @@ mbed_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
for(p = &backend->protocols[0]; *p; ++p)
|
||||
infof(data, "ALPN, offering %s\n", *p);
|
||||
infof(data, "ALPN, offering %s", *p);
|
||||
}
|
||||
#endif
|
||||
|
||||
@ -581,9 +581,8 @@ mbed_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
|
||||
infof(data, "mbedTLS: Handshake complete, cipher is %s\n",
|
||||
mbedtls_ssl_get_ciphersuite(&backend->ssl)
|
||||
);
|
||||
infof(data, "mbedTLS: Handshake complete, cipher is %s",
|
||||
mbedtls_ssl_get_ciphersuite(&backend->ssl));
|
||||
|
||||
ret = mbedtls_ssl_get_verify_result(&backend->ssl);
|
||||
|
||||
@ -620,9 +619,9 @@ mbed_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
return CURLE_OUT_OF_MEMORY;
|
||||
|
||||
if(mbedtls_x509_crt_info(buffer, bufsize, "* ", peercert) > 0)
|
||||
infof(data, "Dumping cert info:\n%s\n", buffer);
|
||||
infof(data, "Dumping cert info: %s", buffer);
|
||||
else
|
||||
infof(data, "Unable to dump certificate information.\n");
|
||||
infof(data, "Unable to dump certificate information");
|
||||
|
||||
free(buffer);
|
||||
}
|
||||
@ -683,7 +682,7 @@ mbed_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl);
|
||||
|
||||
if(next_protocol) {
|
||||
infof(data, "ALPN, server accepted to use %s\n", next_protocol);
|
||||
infof(data, "ALPN, server accepted to use %s", next_protocol);
|
||||
#ifdef USE_NGHTTP2
|
||||
if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID,
|
||||
NGHTTP2_PROTO_VERSION_ID_LEN) &&
|
||||
@ -698,7 +697,7 @@ mbed_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
}
|
||||
}
|
||||
else {
|
||||
infof(data, "ALPN, server did not agree to a protocol\n");
|
||||
infof(data, "ALPN, server did not agree to a protocol");
|
||||
}
|
||||
Curl_multiuse_state(data, conn->negnpn == CURL_HTTP_VERSION_2 ?
|
||||
BUNDLE_MULTIPLEX : BUNDLE_NO_MULTIUSE);
|
||||
@ -706,7 +705,7 @@ mbed_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
#endif
|
||||
|
||||
connssl->connecting_state = ssl_connect_3;
|
||||
infof(data, "SSL connected\n");
|
||||
infof(data, "SSL connected");
|
||||
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
@ -167,14 +167,14 @@ mesalink_connect_step1(struct Curl_easy *data,
|
||||
}
|
||||
infof(data,
|
||||
"error setting certificate verify locations,"
|
||||
" continuing anyway:\n");
|
||||
" continuing anyway:");
|
||||
}
|
||||
else {
|
||||
infof(data, "successfully set certificate verify locations:\n");
|
||||
infof(data, "successfully set certificate verify locations:");
|
||||
}
|
||||
infof(data, " CAfile: %s\n",
|
||||
infof(data, " CAfile: %s",
|
||||
SSL_CONN_CONFIG(CAfile) ? SSL_CONN_CONFIG(CAfile): "none");
|
||||
infof(data, " CApath: %s\n",
|
||||
infof(data, " CApath: %s",
|
||||
SSL_CONN_CONFIG(CApath) ? SSL_CONN_CONFIG(CApath): "none");
|
||||
}
|
||||
|
||||
@ -196,7 +196,7 @@ mesalink_connect_step1(struct Curl_easy *data,
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
infof(data,
|
||||
"client cert: %s\n",
|
||||
"client cert: %s",
|
||||
SSL_CONN_CONFIG(clientcert)?
|
||||
SSL_CONN_CONFIG(clientcert): "none");
|
||||
}
|
||||
@ -209,7 +209,7 @@ mesalink_connect_step1(struct Curl_easy *data,
|
||||
return CURLE_SSL_CIPHER;
|
||||
}
|
||||
#endif
|
||||
infof(data, "Cipher selection: %s\n", ciphers);
|
||||
infof(data, "Cipher selection: %s", ciphers);
|
||||
}
|
||||
|
||||
if(BACKEND->handle)
|
||||
@ -273,7 +273,7 @@ mesalink_connect_step1(struct Curl_easy *data,
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
/* Informational message */
|
||||
infof(data, "SSL re-using session ID\n");
|
||||
infof(data, "SSL re-using session ID");
|
||||
}
|
||||
Curl_ssl_sessionid_unlock(data);
|
||||
}
|
||||
@ -326,7 +326,7 @@ mesalink_connect_step2(struct Curl_easy *data,
|
||||
|
||||
connssl->connecting_state = ssl_connect_3;
|
||||
infof(data,
|
||||
"SSL connection using %s / %s\n",
|
||||
"SSL connection using %s / %s",
|
||||
SSL_get_version(BACKEND->handle),
|
||||
SSL_get_cipher_name(BACKEND->handle));
|
||||
|
||||
@ -356,7 +356,7 @@ mesalink_connect_step3(struct connectdata *conn, int sockindex)
|
||||
sockindex));
|
||||
if(incache) {
|
||||
if(old_ssl_sessionid != our_ssl_sessionid) {
|
||||
infof(data, "old SSL session ID is stale, removing\n");
|
||||
infof(data, "old SSL session ID is stale, removing");
|
||||
Curl_ssl_delsessionid(data, old_ssl_sessionid);
|
||||
incache = FALSE;
|
||||
}
|
||||
|
@ -433,7 +433,7 @@ static char *dup_nickname(struct Curl_easy *data, const char *str)
|
||||
n = strchr(str, '/');
|
||||
if(!n) {
|
||||
infof(data, "warning: certificate file name \"%s\" handled as nickname; "
|
||||
"please use \"./%s\" to force file name\n", str, str);
|
||||
"please use \"./%s\" to force file name", str, str);
|
||||
return strdup(str);
|
||||
}
|
||||
|
||||
@ -824,7 +824,7 @@ static SECStatus nss_auth_cert_hook(void *arg, PRFileDesc *fd, PRBool checksig,
|
||||
#endif
|
||||
|
||||
if(!SSL_CONN_CONFIG(verifypeer)) {
|
||||
infof(data, "skipping SSL peer certificate verification\n");
|
||||
infof(data, "skipping SSL peer certificate verification");
|
||||
return SECSuccess;
|
||||
}
|
||||
|
||||
@ -857,15 +857,15 @@ static void HandshakeCallback(PRFileDesc *sock, void *arg)
|
||||
#endif
|
||||
case SSL_NEXT_PROTO_NO_SUPPORT:
|
||||
case SSL_NEXT_PROTO_NO_OVERLAP:
|
||||
infof(data, "ALPN/NPN, server did not agree to a protocol\n");
|
||||
infof(data, "ALPN/NPN, server did not agree to a protocol");
|
||||
return;
|
||||
#ifdef SSL_ENABLE_ALPN
|
||||
case SSL_NEXT_PROTO_SELECTED:
|
||||
infof(data, "ALPN, server accepted to use %.*s\n", buflen, buf);
|
||||
infof(data, "ALPN, server accepted to use %.*s", buflen, buf);
|
||||
break;
|
||||
#endif
|
||||
case SSL_NEXT_PROTO_NEGOTIATED:
|
||||
infof(data, "NPN, server accepted to use %.*s\n", buflen, buf);
|
||||
infof(data, "NPN, server accepted to use %.*s", buflen, buf);
|
||||
break;
|
||||
}
|
||||
|
||||
@ -937,7 +937,7 @@ static SECStatus CanFalseStartCallback(PRFileDesc *sock, void *client_data,
|
||||
|
||||
*canFalseStart = PR_TRUE;
|
||||
|
||||
infof(data, "Trying TLS False Start\n");
|
||||
infof(data, "Trying TLS False Start");
|
||||
|
||||
end:
|
||||
return SECSuccess;
|
||||
@ -955,17 +955,17 @@ static void display_cert_info(struct Curl_easy *data,
|
||||
subject = CERT_NameToAscii(&cert->subject);
|
||||
issuer = CERT_NameToAscii(&cert->issuer);
|
||||
common_name = CERT_GetCommonName(&cert->subject);
|
||||
infof(data, "\tsubject: %s\n", subject);
|
||||
infof(data, "subject: %s\n", subject);
|
||||
|
||||
CERT_GetCertTimes(cert, ¬Before, ¬After);
|
||||
PR_ExplodeTime(notBefore, PR_GMTParameters, &printableTime);
|
||||
PR_FormatTime(timeString, 256, "%b %d %H:%M:%S %Y GMT", &printableTime);
|
||||
infof(data, "\tstart date: %s\n", timeString);
|
||||
infof(data, " start date: %s", timeString);
|
||||
PR_ExplodeTime(notAfter, PR_GMTParameters, &printableTime);
|
||||
PR_FormatTime(timeString, 256, "%b %d %H:%M:%S %Y GMT", &printableTime);
|
||||
infof(data, "\texpire date: %s\n", timeString);
|
||||
infof(data, "\tcommon name: %s\n", common_name);
|
||||
infof(data, "\tissuer: %s\n", issuer);
|
||||
infof(data, " expire date: %s", timeString);
|
||||
infof(data, " common name: %s", common_name);
|
||||
infof(data, " issuer: %s", issuer);
|
||||
|
||||
PR_Free(subject);
|
||||
PR_Free(issuer);
|
||||
@ -987,13 +987,13 @@ static CURLcode display_conn_info(struct Curl_easy *data, PRFileDesc *sock)
|
||||
channel.cipherSuite) {
|
||||
if(SSL_GetCipherSuiteInfo(channel.cipherSuite,
|
||||
&suite, sizeof(suite)) == SECSuccess) {
|
||||
infof(data, "SSL connection using %s\n", suite.cipherSuiteName);
|
||||
infof(data, "SSL connection using %s", suite.cipherSuiteName);
|
||||
}
|
||||
}
|
||||
|
||||
cert = SSL_PeerCertificate(sock);
|
||||
if(cert) {
|
||||
infof(data, "Server certificate:\n");
|
||||
infof(data, "Server certificate:");
|
||||
|
||||
if(!data->set.ssl.certinfo) {
|
||||
display_cert_info(data, cert);
|
||||
@ -1058,7 +1058,7 @@ static SECStatus BadCertHandler(void *arg, PRFileDesc *sock)
|
||||
/* print only info about the cert, the error is printed off the callback */
|
||||
cert = SSL_PeerCertificate(sock);
|
||||
if(cert) {
|
||||
infof(data, "Server certificate:\n");
|
||||
infof(data, "Server certificate:");
|
||||
display_cert_info(data, cert);
|
||||
CERT_DestroyCertificate(cert);
|
||||
}
|
||||
@ -1132,7 +1132,7 @@ static CURLcode cmp_peer_pubkey(struct ssl_connect_data *connssl,
|
||||
/* report the resulting status */
|
||||
switch(result) {
|
||||
case CURLE_OK:
|
||||
infof(data, "pinned public key verified successfully!\n");
|
||||
infof(data, "pinned public key verified successfully!");
|
||||
break;
|
||||
case CURLE_SSL_PINNEDPUBKEYNOTMATCH:
|
||||
failf(data, "failed to verify pinned public key");
|
||||
@ -1196,7 +1196,7 @@ static SECStatus SelectClientCert(void *arg, PRFileDesc *sock,
|
||||
return SECFailure;
|
||||
}
|
||||
|
||||
infof(data, "NSS: client certificate from file\n");
|
||||
infof(data, "NSS: client certificate from file");
|
||||
display_cert_info(data, cert);
|
||||
|
||||
*pRetCert = cert;
|
||||
@ -1234,7 +1234,7 @@ static SECStatus SelectClientCert(void *arg, PRFileDesc *sock,
|
||||
return SECFailure;
|
||||
}
|
||||
|
||||
infof(data, "NSS: using client certificate: %s\n", nickname);
|
||||
infof(data, "NSS: using client certificate: %s", nickname);
|
||||
display_cert_info(data, *pRetCert);
|
||||
return SECSuccess;
|
||||
}
|
||||
@ -1355,7 +1355,7 @@ static CURLcode nss_init_core(struct Curl_easy *data, const char *cert_dir)
|
||||
if(!certpath)
|
||||
return CURLE_OUT_OF_MEMORY;
|
||||
|
||||
infof(data, "Initializing NSS with certpath: %s\n", certpath);
|
||||
infof(data, "Initializing NSS with certpath: %s", certpath);
|
||||
nss_context = NSS_InitContext(certpath, "", "", "", &initparams,
|
||||
NSS_INIT_READONLY | NSS_INIT_PK11RELOAD);
|
||||
free(certpath);
|
||||
@ -1365,10 +1365,10 @@ static CURLcode nss_init_core(struct Curl_easy *data, const char *cert_dir)
|
||||
|
||||
err = PR_GetError();
|
||||
err_name = nss_error_to_name(err);
|
||||
infof(data, "Unable to initialize NSS database: %d (%s)\n", err, err_name);
|
||||
infof(data, "Unable to initialize NSS database: %d (%s)", err, err_name);
|
||||
}
|
||||
|
||||
infof(data, "Initializing NSS with certpath: none\n");
|
||||
infof(data, "Initializing NSS with certpath: none");
|
||||
nss_context = NSS_InitContext("", "", "", "", &initparams, NSS_INIT_READONLY
|
||||
| NSS_INIT_NOCERTDB | NSS_INIT_NOMODDB | NSS_INIT_FORCEOPEN
|
||||
| NSS_INIT_NOROOTINIT | NSS_INIT_OPTIMIZESPACE | NSS_INIT_PK11RELOAD);
|
||||
@ -1658,8 +1658,8 @@ static CURLcode nss_load_ca_certificates(struct Curl_easy *data,
|
||||
if(capath && !capath[0])
|
||||
capath = NULL;
|
||||
|
||||
infof(data, " CAfile: %s\n", cafile ? cafile : "none");
|
||||
infof(data, " CApath: %s\n", capath ? capath : "none");
|
||||
infof(data, " CAfile: %s", cafile ? cafile : "none");
|
||||
infof(data, " CApath: %s", capath ? capath : "none");
|
||||
|
||||
/* load libnssckbi.so if no other trust roots were specified */
|
||||
use_trust_module = !cafile && !capath;
|
||||
@ -1668,7 +1668,7 @@ static CURLcode nss_load_ca_certificates(struct Curl_easy *data,
|
||||
if(use_trust_module && !trust_module) {
|
||||
/* libnssckbi.so needed but not yet loaded --> load it! */
|
||||
result = nss_load_module(&trust_module, trust_library, "trust");
|
||||
infof(data, "%s %s\n", (result) ? "failed to load" : "loaded",
|
||||
infof(data, "%s %s", (result) ? "failed to load" : "loaded",
|
||||
trust_library);
|
||||
if(result == CURLE_FAILED_INIT)
|
||||
/* If libnssckbi.so is not available (or fails to load), one can still
|
||||
@ -1677,7 +1677,7 @@ static CURLcode nss_load_ca_certificates(struct Curl_easy *data,
|
||||
}
|
||||
else if(!use_trust_module && trust_module) {
|
||||
/* libnssckbi.so not needed but already loaded --> unload it! */
|
||||
infof(data, "unloading %s\n", trust_library);
|
||||
infof(data, "unloading %s", trust_library);
|
||||
nss_unload_module(&trust_module);
|
||||
}
|
||||
PR_Unlock(nss_trustload_lock);
|
||||
@ -1710,7 +1710,7 @@ static CURLcode nss_load_ca_certificates(struct Curl_easy *data,
|
||||
if(CURLE_OK != nss_load_cert(&conn->ssl[sockindex], fullpath, PR_TRUE))
|
||||
/* This is purposefully tolerant of errors so non-PEM files can
|
||||
* be in the same directory */
|
||||
infof(data, "failed to load '%s' from CURLOPT_CAPATH\n", fullpath);
|
||||
infof(data, "failed to load '%s' from CURLOPT_CAPATH", fullpath);
|
||||
|
||||
free(fullpath);
|
||||
}
|
||||
@ -1718,7 +1718,7 @@ static CURLcode nss_load_ca_certificates(struct Curl_easy *data,
|
||||
PR_CloseDir(dir);
|
||||
}
|
||||
else
|
||||
infof(data, "warning: CURLOPT_CAPATH not a directory (%s)\n", capath);
|
||||
infof(data, "warning: CURLOPT_CAPATH not a directory (%s)", capath);
|
||||
}
|
||||
|
||||
return CURLE_OK;
|
||||
@ -1821,7 +1821,7 @@ static CURLcode nss_fail_connect(struct ssl_connect_data *connssl,
|
||||
curlerr = CURLE_SSL_CERTPROBLEM;
|
||||
|
||||
/* print the error number and error string */
|
||||
infof(data, "NSS error %d (%s)\n", err, nss_error_to_name(err));
|
||||
infof(data, "NSS error %d (%s)", err, nss_error_to_name(err));
|
||||
|
||||
/* print a human-readable message describing the error if available */
|
||||
nss_print_error_message(data, err);
|
||||
@ -1895,7 +1895,7 @@ static CURLcode nss_setup_connect(struct Curl_easy *data,
|
||||
PR_Unlock(nss_initlock);
|
||||
if(result == CURLE_FAILED_INIT)
|
||||
infof(data, "WARNING: failed to load NSS PEM library %s. Using "
|
||||
"OpenSSL PEM certificates will not work.\n", pem_library);
|
||||
"OpenSSL PEM certificates will not work.", pem_library);
|
||||
else if(result)
|
||||
goto error;
|
||||
|
||||
@ -1930,8 +1930,8 @@ static CURLcode nss_setup_connect(struct Curl_easy *data,
|
||||
sslver_req_str = nss_sslver_to_name(sslver.max);
|
||||
sslver_supp_str = nss_sslver_to_name(sslver_supported.max);
|
||||
if(sslver_req_str && sslver_supp_str)
|
||||
infof(data, "Falling back from %s to max supported SSL version (%s)\n",
|
||||
sslver_req_str, sslver_supp_str);
|
||||
infof(data, "Falling back from %s to max supported SSL version (%s)",
|
||||
sslver_req_str, sslver_supp_str);
|
||||
free(sslver_req_str);
|
||||
free(sslver_supp_str);
|
||||
sslver.max = sslver_supported.max;
|
||||
@ -1944,11 +1944,11 @@ static CURLcode nss_setup_connect(struct Curl_easy *data,
|
||||
/* unless the user explicitly asks to allow the protocol vulnerability, we
|
||||
use the work-around */
|
||||
if(SSL_OptionSet(model, SSL_CBC_RANDOM_IV, ssl_cbc_random_iv) != SECSuccess)
|
||||
infof(data, "warning: failed to set SSL_CBC_RANDOM_IV = %d\n",
|
||||
infof(data, "warning: failed to set SSL_CBC_RANDOM_IV = %d",
|
||||
ssl_cbc_random_iv);
|
||||
#else
|
||||
if(ssl_cbc_random_iv)
|
||||
infof(data, "warning: support for SSL_CBC_RANDOM_IV not compiled in\n");
|
||||
infof(data, "warning: support for SSL_CBC_RANDOM_IV not compiled in");
|
||||
#endif
|
||||
|
||||
if(SSL_CONN_CONFIG(cipher_list)) {
|
||||
@ -1959,7 +1959,7 @@ static CURLcode nss_setup_connect(struct Curl_easy *data,
|
||||
}
|
||||
|
||||
if(!SSL_CONN_CONFIG(verifypeer) && SSL_CONN_CONFIG(verifyhost))
|
||||
infof(data, "warning: ignoring value of ssl.verifyhost\n");
|
||||
infof(data, "warning: ignoring value of ssl.verifyhost");
|
||||
|
||||
/* bypass the default SSL_AuthCertificate() hook in case we do not want to
|
||||
* verify peer */
|
||||
@ -1979,7 +1979,7 @@ static CURLcode nss_setup_connect(struct Curl_easy *data,
|
||||
const CURLcode rv = nss_load_ca_certificates(data, conn, sockindex);
|
||||
if((rv == CURLE_SSL_CACERT_BADFILE) && !SSL_CONN_CONFIG(verifypeer))
|
||||
/* not a fatal error because we are not going to verify the peer */
|
||||
infof(data, "warning: CA certificates failed to load\n");
|
||||
infof(data, "warning: CA certificates failed to load");
|
||||
else if(rv) {
|
||||
result = rv;
|
||||
goto error;
|
||||
@ -1992,7 +1992,7 @@ static CURLcode nss_setup_connect(struct Curl_easy *data,
|
||||
result = rv;
|
||||
goto error;
|
||||
}
|
||||
infof(data, " CRLfile: %s\n", SSL_SET_OPTION(CRLfile));
|
||||
infof(data, " CRLfile: %s", SSL_SET_OPTION(CRLfile));
|
||||
}
|
||||
|
||||
if(SSL_SET_OPTION(primary.clientcert)) {
|
||||
@ -2197,12 +2197,12 @@ static CURLcode nss_do_connect(struct Curl_easy *data,
|
||||
}
|
||||
|
||||
if(SECFailure == ret) {
|
||||
infof(data, "SSL certificate issuer check failed\n");
|
||||
infof(data, "SSL certificate issuer check failed");
|
||||
result = CURLE_SSL_ISSUER_ERROR;
|
||||
goto error;
|
||||
}
|
||||
else {
|
||||
infof(data, "SSL certificate issuer check ok\n");
|
||||
infof(data, "SSL certificate issuer check ok");
|
||||
}
|
||||
}
|
||||
|
||||
@ -2314,7 +2314,7 @@ static ssize_t nss_send(struct Curl_easy *data, /* transfer */
|
||||
else {
|
||||
/* print the error number and error string */
|
||||
const char *err_name = nss_error_to_name(err);
|
||||
infof(data, "SSL write: error %d (%s)\n", err, err_name);
|
||||
infof(data, "SSL write: error %d (%s)", err, err_name);
|
||||
|
||||
/* print a human-readable message describing the error if available */
|
||||
nss_print_error_message(data, err);
|
||||
@ -2356,7 +2356,7 @@ static ssize_t nss_recv(struct Curl_easy *data, /* transfer */
|
||||
else {
|
||||
/* print the error number and error string */
|
||||
const char *err_name = nss_error_to_name(err);
|
||||
infof(data, "SSL read: errno %d (%s)\n", err, err_name);
|
||||
infof(data, "SSL read: errno %d (%s)", err, err_name);
|
||||
|
||||
/* print a human-readable message describing the error if available */
|
||||
nss_print_error_message(data, err);
|
||||
@ -2435,7 +2435,7 @@ static bool nss_false_start(void)
|
||||
}
|
||||
|
||||
static void *nss_get_internals(struct ssl_connect_data *connssl,
|
||||
CURLINFO info UNUSED_PARAM)
|
||||
CURLINFO info UNUSED_PARAM)
|
||||
{
|
||||
struct ssl_backend_data *backend = connssl->backend;
|
||||
(void)info;
|
||||
|
@ -517,7 +517,7 @@ static CURLcode ossl_seed(struct Curl_easy *data)
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
infof(data, "libcurl is now using a weak random seed!\n");
|
||||
infof(data, "libcurl is now using a weak random seed!");
|
||||
return (rand_enough() ? CURLE_OK :
|
||||
CURLE_SSL_CONNECT_ERROR /* confusing error code */);
|
||||
}
|
||||
@ -1353,7 +1353,7 @@ static CURLcode ossl_set_engine_default(struct Curl_easy *data)
|
||||
#ifdef USE_OPENSSL_ENGINE
|
||||
if(data->state.engine) {
|
||||
if(ENGINE_set_default(data->state.engine, ENGINE_METHOD_ALL) > 0) {
|
||||
infof(data, "set default crypto engine '%s'\n",
|
||||
infof(data, "set default crypto engine '%s'",
|
||||
ENGINE_get_id(data->state.engine));
|
||||
}
|
||||
else {
|
||||
@ -1481,11 +1481,11 @@ static int ossl_shutdown(struct Curl_easy *data,
|
||||
break;
|
||||
case SSL_ERROR_WANT_READ:
|
||||
/* there's data pending, re-invoke SSL_read() */
|
||||
infof(data, "SSL_ERROR_WANT_READ\n");
|
||||
infof(data, "SSL_ERROR_WANT_READ");
|
||||
break;
|
||||
case SSL_ERROR_WANT_WRITE:
|
||||
/* SSL wants a write. Really odd. Let's bail out. */
|
||||
infof(data, "SSL_ERROR_WANT_WRITE\n");
|
||||
infof(data, "SSL_ERROR_WANT_WRITE");
|
||||
done = TRUE;
|
||||
break;
|
||||
default:
|
||||
@ -1517,14 +1517,14 @@ static int ossl_shutdown(struct Curl_easy *data,
|
||||
#ifdef HAVE_SSL_GET_SHUTDOWN
|
||||
switch(SSL_get_shutdown(backend->handle)) {
|
||||
case SSL_SENT_SHUTDOWN:
|
||||
infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN\n");
|
||||
infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN");
|
||||
break;
|
||||
case SSL_RECEIVED_SHUTDOWN:
|
||||
infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN\n");
|
||||
infof(data, "SSL_get_shutdown() returned SSL_RECEIVED_SHUTDOWN");
|
||||
break;
|
||||
case SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN:
|
||||
infof(data, "SSL_get_shutdown() returned SSL_SENT_SHUTDOWN|"
|
||||
"SSL_RECEIVED__SHUTDOWN\n");
|
||||
"SSL_RECEIVED__SHUTDOWN");
|
||||
break;
|
||||
}
|
||||
#endif
|
||||
@ -1591,7 +1591,7 @@ static bool subj_alt_hostcheck(struct Curl_easy *data,
|
||||
if(Curl_cert_hostcheck(match_pattern2, hostname)) {
|
||||
res = TRUE;
|
||||
infof(data,
|
||||
" subjectAltName: host \"%s\" matched cert's \"%s\"\n",
|
||||
" subjectAltName: host \"%s\" matched cert's \"%s\"",
|
||||
dispname, match_pattern2);
|
||||
}
|
||||
}
|
||||
@ -1610,7 +1610,7 @@ static bool subj_alt_hostcheck(struct Curl_easy *data,
|
||||
(void)data;
|
||||
#endif
|
||||
if(Curl_cert_hostcheck(match_pattern, hostname)) {
|
||||
infof(data, " subjectAltName: host \"%s\" matched cert's \"%s\"\n",
|
||||
infof(data, " subjectAltName: host \"%s\" matched cert's \"%s\"",
|
||||
dispname, match_pattern);
|
||||
return TRUE;
|
||||
}
|
||||
@ -1730,7 +1730,7 @@ static CURLcode verifyhost(struct Curl_easy *data, struct connectdata *conn,
|
||||
if((altlen == addrlen) && !memcmp(altptr, &addr, altlen)) {
|
||||
ipmatched = TRUE;
|
||||
infof(data,
|
||||
" subjectAltName: host \"%s\" matched cert's IP address!\n",
|
||||
" subjectAltName: host \"%s\" matched cert's IP address!",
|
||||
dispname);
|
||||
}
|
||||
break;
|
||||
@ -1747,7 +1747,7 @@ static CURLcode verifyhost(struct Curl_easy *data, struct connectdata *conn,
|
||||
/* an alternative name matched */
|
||||
;
|
||||
else if(dNSName || iPAddress) {
|
||||
infof(data, " subjectAltName does not match %s\n", dispname);
|
||||
infof(data, " subjectAltName does not match %s", dispname);
|
||||
failf(data, "SSL: no alternative certificate subject name matches "
|
||||
"target host name '%s'", dispname);
|
||||
result = CURLE_PEER_FAILED_VERIFICATION;
|
||||
@ -1829,7 +1829,7 @@ static CURLcode verifyhost(struct Curl_easy *data, struct connectdata *conn,
|
||||
result = CURLE_PEER_FAILED_VERIFICATION;
|
||||
}
|
||||
else {
|
||||
infof(data, " common name: %s (matched)\n", peer_CN);
|
||||
infof(data, " common name: %s (matched)", peer_CN);
|
||||
}
|
||||
if(peer_CN)
|
||||
OPENSSL_free(peer_CN);
|
||||
@ -1965,7 +1965,7 @@ static CURLcode verifystatus(struct Curl_easy *data,
|
||||
goto end;
|
||||
}
|
||||
|
||||
infof(data, "SSL certificate status: %s (%d)\n",
|
||||
infof(data, "SSL certificate status: %s (%d)",
|
||||
OCSP_cert_status_str(cert_status), cert_status);
|
||||
|
||||
switch(cert_status) {
|
||||
@ -2269,7 +2269,7 @@ select_next_proto_cb(SSL *ssl,
|
||||
#ifdef USE_HTTP2
|
||||
if(data->state.httpwant >= CURL_HTTP_VERSION_2 &&
|
||||
!select_next_protocol(out, outlen, in, inlen, ALPN_H2, ALPN_H2_LENGTH)) {
|
||||
infof(data, "NPN, negotiated HTTP2 (%s)\n", ALPN_H2);
|
||||
infof(data, "NPN, negotiated HTTP2 (%s)", ALPN_H2);
|
||||
conn->negnpn = CURL_HTTP_VERSION_2;
|
||||
return SSL_TLSEXT_ERR_OK;
|
||||
}
|
||||
@ -2277,12 +2277,12 @@ select_next_proto_cb(SSL *ssl,
|
||||
|
||||
if(!select_next_protocol(out, outlen, in, inlen, ALPN_HTTP_1_1,
|
||||
ALPN_HTTP_1_1_LENGTH)) {
|
||||
infof(data, "NPN, negotiated HTTP1.1\n");
|
||||
infof(data, "NPN, negotiated HTTP1.1");
|
||||
conn->negnpn = CURL_HTTP_VERSION_1_1;
|
||||
return SSL_TLSEXT_ERR_OK;
|
||||
}
|
||||
|
||||
infof(data, "NPN, no overlap, use HTTP1.1\n");
|
||||
infof(data, "NPN, no overlap, use HTTP1.1");
|
||||
*out = (unsigned char *)ALPN_HTTP_1_1;
|
||||
*outlen = ALPN_HTTP_1_1_LENGTH;
|
||||
conn->negnpn = CURL_HTTP_VERSION_1_1;
|
||||
@ -2499,7 +2499,7 @@ static int ossl_new_session_cb(SSL *ssl, SSL_SESSION *ssl_sessionid)
|
||||
&old_ssl_sessionid, NULL, sockindex));
|
||||
if(incache) {
|
||||
if(old_ssl_sessionid != ssl_sessionid) {
|
||||
infof(data, "old SSL session ID is stale, removing\n");
|
||||
infof(data, "old SSL session ID is stale, removing");
|
||||
Curl_ssl_delsessionid(data, old_ssl_sessionid);
|
||||
incache = FALSE;
|
||||
}
|
||||
@ -2793,14 +2793,14 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
|
||||
memcpy(&protocols[cur], ALPN_H2, ALPN_H2_LENGTH);
|
||||
cur += ALPN_H2_LENGTH;
|
||||
infof(data, "ALPN, offering %s\n", ALPN_H2);
|
||||
infof(data, "ALPN, offering %s", ALPN_H2);
|
||||
}
|
||||
#endif
|
||||
|
||||
protocols[cur++] = ALPN_HTTP_1_1_LENGTH;
|
||||
memcpy(&protocols[cur], ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH);
|
||||
cur += ALPN_HTTP_1_1_LENGTH;
|
||||
infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1);
|
||||
infof(data, "ALPN, offering %s", ALPN_HTTP_1_1);
|
||||
|
||||
/* expects length prefixed preference ordered list of protocols in wire
|
||||
* format
|
||||
@ -2832,7 +2832,7 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
failf(data, "failed setting cipher list: %s", ciphers);
|
||||
return CURLE_SSL_CIPHER;
|
||||
}
|
||||
infof(data, "Cipher selection: %s\n", ciphers);
|
||||
infof(data, "Cipher selection: %s", ciphers);
|
||||
}
|
||||
|
||||
#ifdef HAVE_SSL_CTX_SET_CIPHERSUITES
|
||||
@ -2843,7 +2843,7 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
failf(data, "failed setting TLS 1.3 cipher suite: %s", ciphers13);
|
||||
return CURLE_SSL_CIPHER;
|
||||
}
|
||||
infof(data, "TLS 1.3 cipher selection: %s\n", ciphers13);
|
||||
infof(data, "TLS 1.3 cipher selection: %s", ciphers13);
|
||||
}
|
||||
}
|
||||
#endif
|
||||
@ -2869,7 +2869,7 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
if(ssl_authtype == CURL_TLSAUTH_SRP) {
|
||||
char * const ssl_username = SSL_SET_OPTION(username);
|
||||
|
||||
infof(data, "Using TLS-SRP username: %s\n", ssl_username);
|
||||
infof(data, "Using TLS-SRP username: %s", ssl_username);
|
||||
|
||||
if(!SSL_CTX_set_srp_username(backend->ctx, ssl_username)) {
|
||||
failf(data, "Unable to set SRP user name");
|
||||
@ -2880,7 +2880,7 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
return CURLE_BAD_FUNCTION_ARGUMENT;
|
||||
}
|
||||
if(!SSL_CONN_CONFIG(cipher_list)) {
|
||||
infof(data, "Setting cipher list SRP\n");
|
||||
infof(data, "Setting cipher list SRP");
|
||||
|
||||
if(!SSL_CTX_set_cipher_list(backend->ctx, "SRP")) {
|
||||
failf(data, "failed setting SRP cipher list");
|
||||
@ -2933,7 +2933,7 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
NULL, cert_name, sizeof(cert_name))) {
|
||||
strcpy(cert_name, "Unknown");
|
||||
}
|
||||
infof(data, "SSL: Checking cert \"%s\"\n", cert_name);
|
||||
infof(data, "SSL: Checking cert %s\"\n", cert_name);
|
||||
#endif
|
||||
|
||||
encoded_cert = (const unsigned char *)pContext->pbCertEncoded;
|
||||
@ -3015,7 +3015,7 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
OpenSSL. */
|
||||
if(X509_STORE_add_cert(store, x509) == 1) {
|
||||
#if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS)
|
||||
infof(data, "SSL: Imported cert \"%s\"\n", cert_name);
|
||||
infof(data, "SSL: Imported cert \"%s\"", cert_name);
|
||||
#endif
|
||||
imported_native_ca = true;
|
||||
}
|
||||
@ -3030,9 +3030,9 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
return result;
|
||||
}
|
||||
if(imported_native_ca)
|
||||
infof(data, "successfully imported windows ca store\n");
|
||||
infof(data, "successfully imported windows ca store");
|
||||
else
|
||||
infof(data, "error importing windows ca store, continuing anyway\n");
|
||||
infof(data, "error importing windows ca store, continuing anyway");
|
||||
}
|
||||
#endif
|
||||
|
||||
@ -3045,7 +3045,7 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
return result;
|
||||
}
|
||||
/* Only warning if no certificate verification is required. */
|
||||
infof(data, "error importing CA certificate blob, continuing anyway\n");
|
||||
infof(data, "error importing CA certificate blob, continuing anyway");
|
||||
}
|
||||
}
|
||||
|
||||
@ -3060,9 +3060,9 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
return CURLE_SSL_CACERT_BADFILE;
|
||||
}
|
||||
/* Continue with a warning if no certificate verif is required. */
|
||||
infof(data, "error setting certificate file, continuing anyway\n");
|
||||
infof(data, "error setting certificate file, continuing anyway");
|
||||
}
|
||||
infof(data, " CAfile: %s\n", ssl_cafile);
|
||||
infof(data, " CAfile: %s", ssl_cafile);
|
||||
}
|
||||
if(ssl_capath) {
|
||||
if(!SSL_CTX_load_verify_dir(backend->ctx, ssl_capath)) {
|
||||
@ -3072,9 +3072,9 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
return CURLE_SSL_CACERT_BADFILE;
|
||||
}
|
||||
/* Continue with a warning if no certificate verif is required. */
|
||||
infof(data, "error setting certificate path, continuing anyway\n");
|
||||
infof(data, "error setting certificate path, continuing anyway");
|
||||
}
|
||||
infof(data, " CApath: %s\n", ssl_capath);
|
||||
infof(data, " CApath: %s", ssl_capath);
|
||||
}
|
||||
}
|
||||
#else
|
||||
@ -3093,14 +3093,14 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
/* Just continue with a warning if no strict certificate verification
|
||||
is required. */
|
||||
infof(data, "error setting certificate verify locations,"
|
||||
" continuing anyway:\n");
|
||||
" continuing anyway:");
|
||||
}
|
||||
else {
|
||||
/* Everything is fine. */
|
||||
infof(data, "successfully set certificate verify locations:\n");
|
||||
infof(data, "successfully set certificate verify locations:");
|
||||
}
|
||||
infof(data, " CAfile: %s\n", ssl_cafile ? ssl_cafile : "none");
|
||||
infof(data, " CApath: %s\n", ssl_capath ? ssl_capath : "none");
|
||||
infof(data, " CAfile: %s", ssl_cafile ? ssl_cafile : "none");
|
||||
infof(data, " CApath: %s", ssl_capath ? ssl_capath : "none");
|
||||
}
|
||||
#endif
|
||||
|
||||
@ -3124,11 +3124,11 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
return CURLE_SSL_CRL_BADFILE;
|
||||
}
|
||||
/* Everything is fine. */
|
||||
infof(data, "successfully load CRL file:\n");
|
||||
infof(data, "successfully load CRL file:");
|
||||
X509_STORE_set_flags(SSL_CTX_get_cert_store(backend->ctx),
|
||||
X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL);
|
||||
|
||||
infof(data, " CRLfile: %s\n", ssl_crlfile);
|
||||
infof(data, " CRLfile: %s", ssl_crlfile);
|
||||
}
|
||||
|
||||
if(verifypeer) {
|
||||
@ -3232,7 +3232,7 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
data->state.buffer[nlen] = 0;
|
||||
if(!SSL_set_tlsext_host_name(backend->handle, data->state.buffer))
|
||||
infof(data, "WARNING: failed to configure server name indication (SNI) "
|
||||
"TLS extension\n");
|
||||
"TLS extension");
|
||||
}
|
||||
#endif
|
||||
|
||||
@ -3250,7 +3250,7 @@ static CURLcode ossl_connect_step1(struct Curl_easy *data,
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
/* Informational message */
|
||||
infof(data, "SSL re-using session ID\n");
|
||||
infof(data, "SSL re-using session ID");
|
||||
}
|
||||
Curl_ssl_sessionid_unlock(data);
|
||||
|
||||
@ -3405,7 +3405,7 @@ static CURLcode ossl_connect_step2(struct Curl_easy *data,
|
||||
connssl->connecting_state = ssl_connect_3;
|
||||
|
||||
/* Informational message */
|
||||
infof(data, "SSL connection using %s / %s\n",
|
||||
infof(data, "SSL connection using %s / %s",
|
||||
SSL_get_version(backend->handle),
|
||||
SSL_get_cipher(backend->handle));
|
||||
|
||||
@ -3418,7 +3418,7 @@ static CURLcode ossl_connect_step2(struct Curl_easy *data,
|
||||
unsigned int len;
|
||||
SSL_get0_alpn_selected(backend->handle, &neg_protocol, &len);
|
||||
if(len) {
|
||||
infof(data, "ALPN, server accepted to use %.*s\n", len, neg_protocol);
|
||||
infof(data, "ALPN, server accepted to use %.*s", len, neg_protocol);
|
||||
|
||||
#ifdef USE_HTTP2
|
||||
if(len == ALPN_H2_LENGTH &&
|
||||
@ -3433,7 +3433,7 @@ static CURLcode ossl_connect_step2(struct Curl_easy *data,
|
||||
}
|
||||
}
|
||||
else
|
||||
infof(data, "ALPN, server did not agree to a protocol\n");
|
||||
infof(data, "ALPN, server did not agree to a protocol");
|
||||
|
||||
Curl_multiuse_state(data, conn->negnpn == CURL_HTTP_VERSION_2 ?
|
||||
BUNDLE_MULTIPLEX : BUNDLE_NO_MULTIUSE);
|
||||
@ -3643,7 +3643,7 @@ static CURLcode get_cert_chain(struct Curl_easy *data,
|
||||
|
||||
pubkey = X509_get_pubkey(x);
|
||||
if(!pubkey)
|
||||
infof(data, " Unable to load public key\n");
|
||||
infof(data, " Unable to load public key");
|
||||
else {
|
||||
int pktype;
|
||||
#ifdef HAVE_OPAQUE_EVP_PKEY
|
||||
@ -3857,23 +3857,23 @@ static CURLcode servercert(struct Curl_easy *data,
|
||||
return CURLE_PEER_FAILED_VERIFICATION;
|
||||
}
|
||||
|
||||
infof(data, "%s certificate:\n", SSL_IS_PROXY() ? "Proxy" : "Server");
|
||||
infof(data, "%s certificate:", SSL_IS_PROXY() ? "Proxy" : "Server");
|
||||
|
||||
rc = x509_name_oneline(X509_get_subject_name(backend->server_cert),
|
||||
buffer, sizeof(buffer));
|
||||
infof(data, " subject: %s\n", rc?"[NONE]":buffer);
|
||||
infof(data, " subject: %s", rc?"[NONE]":buffer);
|
||||
|
||||
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
||||
{
|
||||
long len;
|
||||
ASN1_TIME_print(mem, X509_get0_notBefore(backend->server_cert));
|
||||
len = BIO_get_mem_data(mem, (char **) &ptr);
|
||||
infof(data, " start date: %.*s\n", (int)len, ptr);
|
||||
infof(data, " start date: %.*s", (int)len, ptr);
|
||||
(void)BIO_reset(mem);
|
||||
|
||||
ASN1_TIME_print(mem, X509_get0_notAfter(backend->server_cert));
|
||||
len = BIO_get_mem_data(mem, (char **) &ptr);
|
||||
infof(data, " expire date: %.*s\n", (int)len, ptr);
|
||||
infof(data, " expire date: %.*s", (int)len, ptr);
|
||||
(void)BIO_reset(mem);
|
||||
}
|
||||
#endif
|
||||
@ -3897,7 +3897,7 @@ static CURLcode servercert(struct Curl_easy *data,
|
||||
result = CURLE_PEER_FAILED_VERIFICATION;
|
||||
}
|
||||
else {
|
||||
infof(data, " issuer: %s\n", buffer);
|
||||
infof(data, " issuer: %s", buffer);
|
||||
|
||||
/* We could do all sorts of certificate verification stuff here before
|
||||
deallocating the certificate. */
|
||||
@ -3954,7 +3954,7 @@ static CURLcode servercert(struct Curl_easy *data,
|
||||
return CURLE_SSL_ISSUER_ERROR;
|
||||
}
|
||||
|
||||
infof(data, " SSL certificate issuer check ok (%s)\n",
|
||||
infof(data, " SSL certificate issuer check ok (%s)",
|
||||
SSL_SET_OPTION(issuercert));
|
||||
BIO_free(fp);
|
||||
X509_free(issuer);
|
||||
@ -3973,11 +3973,11 @@ static CURLcode servercert(struct Curl_easy *data,
|
||||
}
|
||||
else
|
||||
infof(data, " SSL certificate verify result: %s (%ld),"
|
||||
" continuing anyway.\n",
|
||||
" continuing anyway.",
|
||||
X509_verify_cert_error_string(lerr), lerr);
|
||||
}
|
||||
else
|
||||
infof(data, " SSL certificate verify ok.\n");
|
||||
infof(data, " SSL certificate verify ok.");
|
||||
}
|
||||
|
||||
#if (OPENSSL_VERSION_NUMBER >= 0x0090808fL) && !defined(OPENSSL_NO_TLSEXT) && \
|
||||
|
@ -73,7 +73,7 @@ cr_connect(struct Curl_easy *data UNUSED_PARAM,
|
||||
struct connectdata *conn UNUSED_PARAM,
|
||||
int sockindex UNUSED_PARAM)
|
||||
{
|
||||
infof(data, "rustls_connect: unimplemented\n");
|
||||
infof(data, "rustls_connect: unimplemented");
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
|
||||
@ -129,7 +129,7 @@ cr_recv(struct Curl_easy *data, int sockindex,
|
||||
io_error = rustls_connection_read_tls(rconn, read_cb,
|
||||
&conn->sock[sockindex], &tls_bytes_read);
|
||||
if(io_error == EAGAIN || io_error == EWOULDBLOCK) {
|
||||
infof(data, "sread: EAGAIN or EWOULDBLOCK\n");
|
||||
infof(data, "sread: EAGAIN or EWOULDBLOCK");
|
||||
}
|
||||
else if(io_error) {
|
||||
failf(data, "reading from socket: %s", strerror(io_error));
|
||||
@ -142,7 +142,7 @@ cr_recv(struct Curl_easy *data, int sockindex,
|
||||
return -1;
|
||||
}
|
||||
|
||||
infof(data, "cr_recv read %ld bytes from the network\n", tls_bytes_read);
|
||||
infof(data, "cr_recv read %ld bytes from the network", tls_bytes_read);
|
||||
|
||||
rresult = rustls_connection_process_new_packets(rconn);
|
||||
if(rresult != RUSTLS_RESULT_OK) {
|
||||
@ -173,12 +173,12 @@ cr_recv(struct Curl_easy *data, int sockindex,
|
||||
available data has been read." If we bring in more ciphertext with
|
||||
read_tls, more plaintext will become available. So don't tell curl
|
||||
this is an EOF. Instead, say "come back later." */
|
||||
infof(data, "cr_recv got 0 bytes of plaintext\n");
|
||||
infof(data, "cr_recv got 0 bytes of plaintext");
|
||||
backend->data_pending = FALSE;
|
||||
break;
|
||||
}
|
||||
else {
|
||||
infof(data, "cr_recv copied out %ld bytes of plaintext\n", n);
|
||||
infof(data, "cr_recv copied out %ld bytes of plaintext", n);
|
||||
plain_bytes_copied += n;
|
||||
}
|
||||
}
|
||||
@ -218,7 +218,7 @@ cr_send(struct Curl_easy *data, int sockindex,
|
||||
rustls_result rresult;
|
||||
rustls_io_result io_error;
|
||||
|
||||
infof(data, "cr_send %ld bytes of plaintext\n", plainlen);
|
||||
infof(data, "cr_send %ld bytes of plaintext", plainlen);
|
||||
|
||||
if(plainlen > 0) {
|
||||
rresult = rustls_connection_write(rconn, plainbuf, plainlen,
|
||||
@ -239,7 +239,7 @@ cr_send(struct Curl_easy *data, int sockindex,
|
||||
io_error = rustls_connection_write_tls(rconn, write_cb,
|
||||
&conn->sock[sockindex], &tlswritten);
|
||||
if(io_error == EAGAIN || io_error == EWOULDBLOCK) {
|
||||
infof(data, "swrite: EAGAIN after %ld bytes\n", tlswritten_total);
|
||||
infof(data, "swrite: EAGAIN after %ld bytes", tlswritten_total);
|
||||
*err = CURLE_AGAIN;
|
||||
return -1;
|
||||
}
|
||||
@ -253,7 +253,7 @@ cr_send(struct Curl_easy *data, int sockindex,
|
||||
*err = CURLE_WRITE_ERROR;
|
||||
return -1;
|
||||
}
|
||||
infof(data, "cr_send wrote %ld bytes to network\n", tlswritten);
|
||||
infof(data, "cr_send wrote %ld bytes to network", tlswritten);
|
||||
tlswritten_total += tlswritten;
|
||||
}
|
||||
|
||||
@ -304,10 +304,10 @@ cr_init_backend(struct Curl_easy *data, struct connectdata *conn,
|
||||
|
||||
config_builder = rustls_client_config_builder_new();
|
||||
#ifdef USE_HTTP2
|
||||
infof(data, "offering ALPN for HTTP/1.1 and HTTP/2\n");
|
||||
infof(data, "offering ALPN for HTTP/1.1 and HTTP/2");
|
||||
rustls_client_config_builder_set_protocols(config_builder, alpn, 2);
|
||||
#else
|
||||
infof(data, "offering ALPN for HTTP/1.1 only\n");
|
||||
infof(data, "offering ALPN for HTTP/1.1 only");
|
||||
rustls_client_config_builder_set_protocols(config_builder, alpn, 1);
|
||||
#endif
|
||||
if(!verifypeer) {
|
||||
@ -355,24 +355,24 @@ cr_set_negotiated_alpn(struct Curl_easy *data, struct connectdata *conn,
|
||||
|
||||
rustls_connection_get_alpn_protocol(rconn, &protocol, &len);
|
||||
if(NULL == protocol) {
|
||||
infof(data, "ALPN, server did not agree to a protocol\n");
|
||||
infof(data, "ALPN, server did not agree to a protocol");
|
||||
return;
|
||||
}
|
||||
|
||||
#ifdef USE_HTTP2
|
||||
if(len == ALPN_H2_LENGTH && 0 == memcmp(ALPN_H2, protocol, len)) {
|
||||
infof(data, "ALPN, negotiated h2\n");
|
||||
infof(data, "ALPN, negotiated h2");
|
||||
conn->negnpn = CURL_HTTP_VERSION_2;
|
||||
}
|
||||
else
|
||||
#endif
|
||||
if(len == ALPN_HTTP_1_1_LENGTH &&
|
||||
0 == memcmp(ALPN_HTTP_1_1, protocol, len)) {
|
||||
infof(data, "ALPN, negotiated http/1.1\n");
|
||||
infof(data, "ALPN, negotiated http/1.1");
|
||||
conn->negnpn = CURL_HTTP_VERSION_1_1;
|
||||
}
|
||||
else {
|
||||
infof(data, "ALPN, negotiated an unrecognized protocol\n");
|
||||
infof(data, "ALPN, negotiated an unrecognized protocol");
|
||||
}
|
||||
|
||||
Curl_multiuse_state(data, conn->negnpn == CURL_HTTP_VERSION_2 ?
|
||||
@ -415,7 +415,7 @@ cr_connect_nonblocking(struct Curl_easy *data, struct connectdata *conn,
|
||||
* once the handshake is done.
|
||||
*/
|
||||
if(!rustls_connection_is_handshaking(rconn)) {
|
||||
infof(data, "Done handshaking\n");
|
||||
infof(data, "Done handshaking");
|
||||
/* Done with the handshake. Set up callbacks to send/receive data. */
|
||||
connssl->state = ssl_connection_complete;
|
||||
|
||||
@ -440,22 +440,19 @@ cr_connect_nonblocking(struct Curl_easy *data, struct connectdata *conn,
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
if(0 == what) {
|
||||
infof(data, "Curl_socket_check: %s would block\n",
|
||||
wants_read&&wants_write ?
|
||||
"writing and reading" :
|
||||
wants_write ?
|
||||
"writing" :
|
||||
"reading");
|
||||
infof(data, "Curl_socket_check: %s would block",
|
||||
wants_read&&wants_write ? "writing and reading" :
|
||||
wants_write ? "writing" : "reading");
|
||||
*done = FALSE;
|
||||
return CURLE_OK;
|
||||
}
|
||||
/* socket is readable or writable */
|
||||
|
||||
if(wants_write) {
|
||||
infof(data, "rustls_connection wants us to write_tls.\n");
|
||||
infof(data, "rustls_connection wants us to write_tls.");
|
||||
cr_send(data, sockindex, NULL, 0, &tmperr);
|
||||
if(tmperr == CURLE_AGAIN) {
|
||||
infof(data, "writing would block\n");
|
||||
infof(data, "writing would block");
|
||||
/* fall through */
|
||||
}
|
||||
else if(tmperr != CURLE_OK) {
|
||||
@ -464,11 +461,11 @@ cr_connect_nonblocking(struct Curl_easy *data, struct connectdata *conn,
|
||||
}
|
||||
|
||||
if(wants_read) {
|
||||
infof(data, "rustls_connection wants us to read_tls.\n");
|
||||
infof(data, "rustls_connection wants us to read_tls.");
|
||||
|
||||
cr_recv(data, sockindex, NULL, 0, &tmperr);
|
||||
if(tmperr == CURLE_AGAIN) {
|
||||
infof(data, "reading would block\n");
|
||||
infof(data, "reading would block");
|
||||
/* fall through */
|
||||
}
|
||||
else if(tmperr != CURLE_OK) {
|
||||
|
@ -441,7 +441,7 @@ schannel_acquire_credential_handle(struct Curl_easy *data,
|
||||
SCH_CRED_IGNORE_REVOCATION_OFFLINE;
|
||||
|
||||
DEBUGF(infof(data, "schannel: disabled server certificate revocation "
|
||||
"checks\n"));
|
||||
"checks"));
|
||||
}
|
||||
else if(SSL_SET_OPTION(revoke_best_effort)) {
|
||||
schannel_cred.dwFlags |= SCH_CRED_IGNORE_NO_REVOCATION_CHECK |
|
||||
@ -453,7 +453,7 @@ schannel_acquire_credential_handle(struct Curl_easy *data,
|
||||
schannel_cred.dwFlags |= SCH_CRED_REVOCATION_CHECK_CHAIN;
|
||||
|
||||
DEBUGF(infof(data,
|
||||
"schannel: checking server certificate revocation\n"));
|
||||
"schannel: checking server certificate revocation"));
|
||||
}
|
||||
}
|
||||
else {
|
||||
@ -461,23 +461,23 @@ schannel_acquire_credential_handle(struct Curl_easy *data,
|
||||
SCH_CRED_IGNORE_NO_REVOCATION_CHECK |
|
||||
SCH_CRED_IGNORE_REVOCATION_OFFLINE;
|
||||
DEBUGF(infof(data,
|
||||
"schannel: disabled server cert revocation checks\n"));
|
||||
"schannel: disabled server cert revocation checks"));
|
||||
}
|
||||
|
||||
if(!conn->ssl_config.verifyhost) {
|
||||
schannel_cred.dwFlags |= SCH_CRED_NO_SERVERNAME_CHECK;
|
||||
DEBUGF(infof(data, "schannel: verifyhost setting prevents Schannel from "
|
||||
"comparing the supplied target name with the subject "
|
||||
"names in server certificates.\n"));
|
||||
"names in server certificates."));
|
||||
}
|
||||
|
||||
if(!SSL_SET_OPTION(auto_client_cert)) {
|
||||
schannel_cred.dwFlags &= ~SCH_CRED_USE_DEFAULT_CREDS;
|
||||
schannel_cred.dwFlags |= SCH_CRED_NO_DEFAULT_CREDS;
|
||||
infof(data, "schannel: disabled automatic use of client certificate\n");
|
||||
infof(data, "schannel: disabled automatic use of client certificate");
|
||||
}
|
||||
else
|
||||
infof(data, "schannel: enabled automatic use of client certificate\n");
|
||||
infof(data, "schannel: enabled automatic use of client certificate");
|
||||
|
||||
switch(conn->ssl_config.version) {
|
||||
case CURL_SSLVERSION_DEFAULT:
|
||||
@ -773,7 +773,7 @@ schannel_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
char * const hostname = SSL_HOST_NAME();
|
||||
|
||||
DEBUGF(infof(data,
|
||||
"schannel: SSL/TLS connection with %s port %hu (step 1/3)\n",
|
||||
"schannel: SSL/TLS connection with %s port %hu (step 1/3)",
|
||||
hostname, conn->remote_port));
|
||||
|
||||
if(curlx_verify_windows_version(5, 1, PLATFORM_WINNT,
|
||||
@ -781,7 +781,7 @@ schannel_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
/* Schannel in Windows XP (OS version 5.1) uses legacy handshakes and
|
||||
algorithms that may not be supported by all servers. */
|
||||
infof(data, "schannel: Windows version is old and may not be able to "
|
||||
"connect to some servers due to lack of SNI, algorithms, etc.\n");
|
||||
"connect to some servers due to lack of SNI, algorithms, etc.");
|
||||
}
|
||||
|
||||
#ifdef HAS_ALPN
|
||||
@ -836,12 +836,12 @@ schannel_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
SSL_IS_PROXY() ? TRUE : FALSE,
|
||||
(void **)&old_cred, NULL, sockindex)) {
|
||||
BACKEND->cred = old_cred;
|
||||
DEBUGF(infof(data, "schannel: re-using existing credential handle\n"));
|
||||
DEBUGF(infof(data, "schannel: re-using existing credential handle"));
|
||||
|
||||
/* increment the reference counter of the credential/session handle */
|
||||
BACKEND->cred->refcount++;
|
||||
DEBUGF(infof(data,
|
||||
"schannel: incremented credential handle refcount = %d\n",
|
||||
"schannel: incremented credential handle refcount = %d",
|
||||
BACKEND->cred->refcount));
|
||||
}
|
||||
Curl_ssl_sessionid_unlock(data);
|
||||
@ -860,7 +860,7 @@ schannel_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
|| Curl_inet_pton(AF_INET6, hostname, &addr6)
|
||||
#endif
|
||||
) {
|
||||
infof(data, "schannel: using IP address, SNI is not supported by OS.\n");
|
||||
infof(data, "schannel: using IP address, SNI is not supported by OS.");
|
||||
}
|
||||
|
||||
#ifdef HAS_ALPN
|
||||
@ -893,14 +893,14 @@ schannel_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
alpn_buffer[cur++] = ALPN_H2_LENGTH;
|
||||
memcpy(&alpn_buffer[cur], ALPN_H2, ALPN_H2_LENGTH);
|
||||
cur += ALPN_H2_LENGTH;
|
||||
infof(data, "schannel: ALPN, offering %s\n", ALPN_H2);
|
||||
infof(data, "schannel: ALPN, offering %s", ALPN_H2);
|
||||
}
|
||||
#endif
|
||||
|
||||
alpn_buffer[cur++] = ALPN_HTTP_1_1_LENGTH;
|
||||
memcpy(&alpn_buffer[cur], ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH);
|
||||
cur += ALPN_HTTP_1_1_LENGTH;
|
||||
infof(data, "schannel: ALPN, offering %s\n", ALPN_HTTP_1_1);
|
||||
infof(data, "schannel: ALPN, offering %s", ALPN_HTTP_1_1);
|
||||
|
||||
*list_len = curlx_uitous(cur - list_start_index);
|
||||
*extension_len = *list_len + sizeof(unsigned int) + sizeof(unsigned short);
|
||||
@ -988,7 +988,7 @@ schannel_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
}
|
||||
|
||||
DEBUGF(infof(data, "schannel: sending initial handshake data: "
|
||||
"sending %lu bytes...\n", outbuf.cbBuffer));
|
||||
"sending %lu bytes.", outbuf.cbBuffer));
|
||||
|
||||
/* send initial handshake data which is now stored in output buffer */
|
||||
result = Curl_write_plain(data, conn->sock[sockindex], outbuf.pvBuffer,
|
||||
@ -1001,7 +1001,7 @@ schannel_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
}
|
||||
|
||||
DEBUGF(infof(data, "schannel: sent initial handshake data: "
|
||||
"sent %zd bytes\n", written));
|
||||
"sent %zd bytes", written));
|
||||
|
||||
BACKEND->recv_unrecoverable_err = CURLE_OK;
|
||||
BACKEND->recv_sspi_close_notify = false;
|
||||
@ -1035,7 +1035,7 @@ schannel_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
doread = (connssl->connecting_state != ssl_connect_2_writing) ? TRUE : FALSE;
|
||||
|
||||
DEBUGF(infof(data,
|
||||
"schannel: SSL/TLS connection with %s port %hu (step 2/3)\n",
|
||||
"schannel: SSL/TLS connection with %s port %hu (step 2/3)",
|
||||
hostname, conn->remote_port));
|
||||
|
||||
if(!BACKEND->cred || !BACKEND->ctxt)
|
||||
@ -1097,7 +1097,7 @@ schannel_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
if(connssl->connecting_state != ssl_connect_2_writing)
|
||||
connssl->connecting_state = ssl_connect_2_reading;
|
||||
DEBUGF(infof(data, "schannel: failed to receive handshake, "
|
||||
"need more data\n"));
|
||||
"need more data"));
|
||||
return CURLE_OK;
|
||||
}
|
||||
else if((result != CURLE_OK) || (nread == 0)) {
|
||||
@ -1109,11 +1109,11 @@ schannel_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
/* increase encrypted data buffer offset */
|
||||
BACKEND->encdata_offset += nread;
|
||||
BACKEND->encdata_is_incomplete = false;
|
||||
DEBUGF(infof(data, "schannel: encrypted data got %zd\n", nread));
|
||||
DEBUGF(infof(data, "schannel: encrypted data got %zd", nread));
|
||||
}
|
||||
|
||||
DEBUGF(infof(data,
|
||||
"schannel: encrypted data buffer: offset %zu length %zu\n",
|
||||
"schannel: encrypted data buffer: offset %zu length %zu",
|
||||
BACKEND->encdata_offset, BACKEND->encdata_length));
|
||||
|
||||
/* setup input buffers */
|
||||
@ -1158,7 +1158,7 @@ schannel_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
BACKEND->encdata_is_incomplete = true;
|
||||
connssl->connecting_state = ssl_connect_2_reading;
|
||||
DEBUGF(infof(data,
|
||||
"schannel: received incomplete message, need more data\n"));
|
||||
"schannel: received incomplete message, need more data"));
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
@ -1170,7 +1170,7 @@ schannel_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
BACKEND->req_flags |= ISC_REQ_USE_SUPPLIED_CREDS;
|
||||
connssl->connecting_state = ssl_connect_2_writing;
|
||||
DEBUGF(infof(data,
|
||||
"schannel: a client certificate has been requested\n"));
|
||||
"schannel: a client certificate has been requested"));
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
@ -1180,7 +1180,7 @@ schannel_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
/* search for handshake tokens that need to be send */
|
||||
if(outbuf[i].BufferType == SECBUFFER_TOKEN && outbuf[i].cbBuffer > 0) {
|
||||
DEBUGF(infof(data, "schannel: sending next handshake data: "
|
||||
"sending %lu bytes...\n", outbuf[i].cbBuffer));
|
||||
"sending %lu bytes.", outbuf[i].cbBuffer));
|
||||
|
||||
/* send handshake token to server */
|
||||
result = Curl_write_plain(data, conn->sock[sockindex],
|
||||
@ -1235,7 +1235,7 @@ schannel_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
|
||||
/* check if there was additional remaining encrypted data */
|
||||
if(inbuf[1].BufferType == SECBUFFER_EXTRA && inbuf[1].cbBuffer > 0) {
|
||||
DEBUGF(infof(data, "schannel: encrypted data length: %lu\n",
|
||||
DEBUGF(infof(data, "schannel: encrypted data length: %lu",
|
||||
inbuf[1].cbBuffer));
|
||||
/*
|
||||
There are two cases where we could be getting extra data here:
|
||||
@ -1275,7 +1275,7 @@ schannel_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
/* check if the handshake is complete */
|
||||
if(sspi_status == SEC_E_OK) {
|
||||
connssl->connecting_state = ssl_connect_3;
|
||||
DEBUGF(infof(data, "schannel: SSL/TLS handshake complete\n"));
|
||||
DEBUGF(infof(data, "schannel: SSL/TLS handshake complete"));
|
||||
}
|
||||
|
||||
pubkey_ptr = SSL_PINNED_PUB_KEY();
|
||||
@ -1374,7 +1374,7 @@ schannel_connect_step3(struct Curl_easy *data, struct connectdata *conn,
|
||||
DEBUGASSERT(ssl_connect_3 == connssl->connecting_state);
|
||||
|
||||
DEBUGF(infof(data,
|
||||
"schannel: SSL/TLS connection with %s port %hu (step 3/3)\n",
|
||||
"schannel: SSL/TLS connection with %s port %hu (step 3/3)",
|
||||
hostname, conn->remote_port));
|
||||
|
||||
if(!BACKEND->cred)
|
||||
@ -1410,7 +1410,7 @@ schannel_connect_step3(struct Curl_easy *data, struct connectdata *conn,
|
||||
if(alpn_result.ProtoNegoStatus ==
|
||||
SecApplicationProtocolNegotiationStatus_Success) {
|
||||
|
||||
infof(data, "schannel: ALPN, server accepted to use %.*s\n",
|
||||
infof(data, "schannel: ALPN, server accepted to use %.*s",
|
||||
alpn_result.ProtocolIdSize, alpn_result.ProtocolId);
|
||||
|
||||
#ifdef USE_HTTP2
|
||||
@ -1427,7 +1427,7 @@ schannel_connect_step3(struct Curl_easy *data, struct connectdata *conn,
|
||||
}
|
||||
}
|
||||
else
|
||||
infof(data, "ALPN, server did not agree to a protocol\n");
|
||||
infof(data, "ALPN, server did not agree to a protocol");
|
||||
Curl_multiuse_state(data, conn->negnpn == CURL_HTTP_VERSION_2 ?
|
||||
BUNDLE_MULTIPLEX : BUNDLE_NO_MULTIUSE);
|
||||
}
|
||||
@ -1444,7 +1444,7 @@ schannel_connect_step3(struct Curl_easy *data, struct connectdata *conn,
|
||||
if(incache) {
|
||||
if(old_cred != BACKEND->cred) {
|
||||
DEBUGF(infof(data,
|
||||
"schannel: old credential handle is stale, removing\n"));
|
||||
"schannel: old credential handle is stale, removing"));
|
||||
/* we're not taking old_cred ownership here, no refcount++ is needed */
|
||||
Curl_ssl_delsessionid(data, (void *)old_cred);
|
||||
incache = FALSE;
|
||||
@ -1463,7 +1463,7 @@ schannel_connect_step3(struct Curl_easy *data, struct connectdata *conn,
|
||||
/* this cred session is now also referenced by sessionid cache */
|
||||
BACKEND->cred->refcount++;
|
||||
DEBUGF(infof(data,
|
||||
"schannel: stored credential handle in session cache\n"));
|
||||
"schannel: stored credential handle in session cache"));
|
||||
}
|
||||
}
|
||||
Curl_ssl_sessionid_unlock(data);
|
||||
@ -1794,21 +1794,21 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
* handled in the cleanup.
|
||||
*/
|
||||
|
||||
DEBUGF(infof(data, "schannel: client wants to read %zu bytes\n", len));
|
||||
DEBUGF(infof(data, "schannel: client wants to read %zu bytes", len));
|
||||
*err = CURLE_OK;
|
||||
|
||||
if(len && len <= BACKEND->decdata_offset) {
|
||||
infof(data, "schannel: enough decrypted data is already available\n");
|
||||
infof(data, "schannel: enough decrypted data is already available");
|
||||
goto cleanup;
|
||||
}
|
||||
else if(BACKEND->recv_unrecoverable_err) {
|
||||
*err = BACKEND->recv_unrecoverable_err;
|
||||
infof(data, "schannel: an unrecoverable error occurred in a prior call\n");
|
||||
infof(data, "schannel: an unrecoverable error occurred in a prior call");
|
||||
goto cleanup;
|
||||
}
|
||||
else if(BACKEND->recv_sspi_close_notify) {
|
||||
/* once a server has indicated shutdown there is no more encrypted data */
|
||||
infof(data, "schannel: server indicated shutdown in a prior call\n");
|
||||
infof(data, "schannel: server indicated shutdown in a prior call");
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
@ -1837,12 +1837,12 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
BACKEND->encdata_buffer = reallocated_buffer;
|
||||
BACKEND->encdata_length = reallocated_length;
|
||||
size = BACKEND->encdata_length - BACKEND->encdata_offset;
|
||||
DEBUGF(infof(data, "schannel: encdata_buffer resized %zu\n",
|
||||
DEBUGF(infof(data, "schannel: encdata_buffer resized %zu",
|
||||
BACKEND->encdata_length));
|
||||
}
|
||||
|
||||
DEBUGF(infof(data,
|
||||
"schannel: encrypted data buffer: offset %zu length %zu\n",
|
||||
"schannel: encrypted data buffer: offset %zu length %zu",
|
||||
BACKEND->encdata_offset, BACKEND->encdata_length));
|
||||
|
||||
/* read encrypted data from socket */
|
||||
@ -1854,25 +1854,25 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
nread = -1;
|
||||
if(*err == CURLE_AGAIN)
|
||||
DEBUGF(infof(data,
|
||||
"schannel: Curl_read_plain returned CURLE_AGAIN\n"));
|
||||
"schannel: Curl_read_plain returned CURLE_AGAIN"));
|
||||
else if(*err == CURLE_RECV_ERROR)
|
||||
infof(data, "schannel: Curl_read_plain returned CURLE_RECV_ERROR\n");
|
||||
infof(data, "schannel: Curl_read_plain returned CURLE_RECV_ERROR");
|
||||
else
|
||||
infof(data, "schannel: Curl_read_plain returned error %d\n", *err);
|
||||
infof(data, "schannel: Curl_read_plain returned error %d", *err);
|
||||
}
|
||||
else if(nread == 0) {
|
||||
BACKEND->recv_connection_closed = true;
|
||||
DEBUGF(infof(data, "schannel: server closed the connection\n"));
|
||||
DEBUGF(infof(data, "schannel: server closed the connection"));
|
||||
}
|
||||
else if(nread > 0) {
|
||||
BACKEND->encdata_offset += (size_t)nread;
|
||||
BACKEND->encdata_is_incomplete = false;
|
||||
DEBUGF(infof(data, "schannel: encrypted data got %zd\n", nread));
|
||||
DEBUGF(infof(data, "schannel: encrypted data got %zd", nread));
|
||||
}
|
||||
}
|
||||
|
||||
DEBUGF(infof(data,
|
||||
"schannel: encrypted data buffer: offset %zu length %zu\n",
|
||||
"schannel: encrypted data buffer: offset %zu length %zu",
|
||||
BACKEND->encdata_offset, BACKEND->encdata_length));
|
||||
|
||||
/* decrypt loop */
|
||||
@ -1901,7 +1901,7 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
/* check for successfully decrypted data, even before actual
|
||||
renegotiation or shutdown of the connection context */
|
||||
if(inbuf[1].BufferType == SECBUFFER_DATA) {
|
||||
DEBUGF(infof(data, "schannel: decrypted data length: %lu\n",
|
||||
DEBUGF(infof(data, "schannel: decrypted data length: %lu",
|
||||
inbuf[1].cbBuffer));
|
||||
|
||||
/* increase buffer in order to fit the received amount of data */
|
||||
@ -1934,15 +1934,15 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
BACKEND->decdata_offset += size;
|
||||
}
|
||||
|
||||
DEBUGF(infof(data, "schannel: decrypted data added: %zu\n", size));
|
||||
DEBUGF(infof(data, "schannel: decrypted data added: %zu", size));
|
||||
DEBUGF(infof(data,
|
||||
"schannel: decrypted cached: offset %zu length %zu\n",
|
||||
"schannel: decrypted cached: offset %zu length %zu",
|
||||
BACKEND->decdata_offset, BACKEND->decdata_length));
|
||||
}
|
||||
|
||||
/* check for remaining encrypted data */
|
||||
if(inbuf[3].BufferType == SECBUFFER_EXTRA && inbuf[3].cbBuffer > 0) {
|
||||
DEBUGF(infof(data, "schannel: encrypted data length: %lu\n",
|
||||
DEBUGF(infof(data, "schannel: encrypted data length: %lu",
|
||||
inbuf[3].cbBuffer));
|
||||
|
||||
/* check if the remaining data is less than the total amount
|
||||
@ -1958,7 +1958,7 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
}
|
||||
|
||||
DEBUGF(infof(data,
|
||||
"schannel: encrypted cached: offset %zu length %zu\n",
|
||||
"schannel: encrypted cached: offset %zu length %zu",
|
||||
BACKEND->encdata_offset, BACKEND->encdata_length));
|
||||
}
|
||||
else {
|
||||
@ -1968,29 +1968,29 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
|
||||
/* check if server wants to renegotiate the connection context */
|
||||
if(sspi_status == SEC_I_RENEGOTIATE) {
|
||||
infof(data, "schannel: remote party requests renegotiation\n");
|
||||
infof(data, "schannel: remote party requests renegotiation");
|
||||
if(*err && *err != CURLE_AGAIN) {
|
||||
infof(data, "schannel: can't renogotiate, an error is pending\n");
|
||||
infof(data, "schannel: can't renogotiate, an error is pending");
|
||||
goto cleanup;
|
||||
}
|
||||
if(BACKEND->encdata_offset) {
|
||||
*err = CURLE_RECV_ERROR;
|
||||
infof(data, "schannel: can't renogotiate, "
|
||||
"encrypted data available\n");
|
||||
"encrypted data available");
|
||||
goto cleanup;
|
||||
}
|
||||
/* begin renegotiation */
|
||||
infof(data, "schannel: renegotiating SSL/TLS connection\n");
|
||||
infof(data, "schannel: renegotiating SSL/TLS connection");
|
||||
connssl->state = ssl_connection_negotiating;
|
||||
connssl->connecting_state = ssl_connect_2_writing;
|
||||
*err = schannel_connect_common(data, conn, sockindex, FALSE, &done);
|
||||
if(*err) {
|
||||
infof(data, "schannel: renegotiation failed\n");
|
||||
infof(data, "schannel: renegotiation failed");
|
||||
goto cleanup;
|
||||
}
|
||||
/* now retry receiving data */
|
||||
sspi_status = SEC_E_OK;
|
||||
infof(data, "schannel: SSL/TLS connection renegotiated\n");
|
||||
infof(data, "schannel: SSL/TLS connection renegotiated");
|
||||
continue;
|
||||
}
|
||||
/* check if the server closed the connection */
|
||||
@ -2000,7 +2000,7 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
BACKEND->recv_sspi_close_notify = true;
|
||||
if(!BACKEND->recv_connection_closed) {
|
||||
BACKEND->recv_connection_closed = true;
|
||||
infof(data, "schannel: server closed the connection\n");
|
||||
infof(data, "schannel: server closed the connection");
|
||||
}
|
||||
goto cleanup;
|
||||
}
|
||||
@ -2009,7 +2009,7 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
BACKEND->encdata_is_incomplete = true;
|
||||
if(!*err)
|
||||
*err = CURLE_AGAIN;
|
||||
infof(data, "schannel: failed to decrypt data, need more data\n");
|
||||
infof(data, "schannel: failed to decrypt data, need more data");
|
||||
goto cleanup;
|
||||
}
|
||||
else {
|
||||
@ -2017,23 +2017,23 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
char buffer[STRERROR_LEN];
|
||||
#endif
|
||||
*err = CURLE_RECV_ERROR;
|
||||
infof(data, "schannel: failed to read data from server: %s\n",
|
||||
infof(data, "schannel: failed to read data from server: %s",
|
||||
Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
|
||||
goto cleanup;
|
||||
}
|
||||
}
|
||||
|
||||
DEBUGF(infof(data,
|
||||
"schannel: encrypted data buffer: offset %zu length %zu\n",
|
||||
"schannel: encrypted data buffer: offset %zu length %zu",
|
||||
BACKEND->encdata_offset, BACKEND->encdata_length));
|
||||
|
||||
DEBUGF(infof(data,
|
||||
"schannel: decrypted data buffer: offset %zu length %zu\n",
|
||||
"schannel: decrypted data buffer: offset %zu length %zu",
|
||||
BACKEND->decdata_offset, BACKEND->decdata_length));
|
||||
|
||||
cleanup:
|
||||
/* Warning- there is no guarantee the encdata state is valid at this point */
|
||||
DEBUGF(infof(data, "schannel: schannel_recv cleanup\n"));
|
||||
DEBUGF(infof(data, "schannel: schannel_recv cleanup"));
|
||||
|
||||
/* Error if the connection has closed without a close_notify.
|
||||
|
||||
@ -2055,7 +2055,7 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
BACKEND->recv_sspi_close_notify = true;
|
||||
else {
|
||||
*err = CURLE_RECV_ERROR;
|
||||
infof(data, "schannel: server closed abruptly (missing close_notify)\n");
|
||||
infof(data, "schannel: server closed abruptly (missing close_notify)");
|
||||
}
|
||||
}
|
||||
|
||||
@ -2069,9 +2069,9 @@ schannel_recv(struct Curl_easy *data, int sockindex,
|
||||
memmove(BACKEND->decdata_buffer, BACKEND->decdata_buffer + size,
|
||||
BACKEND->decdata_offset - size);
|
||||
BACKEND->decdata_offset -= size;
|
||||
DEBUGF(infof(data, "schannel: decrypted data returned %zu\n", size));
|
||||
DEBUGF(infof(data, "schannel: decrypted data returned %zu", size));
|
||||
DEBUGF(infof(data,
|
||||
"schannel: decrypted data buffer: offset %zu length %zu\n",
|
||||
"schannel: decrypted data buffer: offset %zu length %zu",
|
||||
BACKEND->decdata_offset, BACKEND->decdata_length));
|
||||
*err = CURLE_OK;
|
||||
return (ssize_t)size;
|
||||
@ -2155,7 +2155,7 @@ static int schannel_shutdown(struct Curl_easy *data, struct connectdata *conn,
|
||||
|
||||
DEBUGASSERT(data);
|
||||
|
||||
infof(data, "schannel: shutting down SSL/TLS connection with %s port %hu\n",
|
||||
infof(data, "schannel: shutting down SSL/TLS connection with %s port %hu",
|
||||
hostname, conn->remote_port);
|
||||
|
||||
if(BACKEND->cred && BACKEND->ctxt) {
|
||||
@ -2213,14 +2213,14 @@ static int schannel_shutdown(struct Curl_easy *data, struct connectdata *conn,
|
||||
s_pSecFn->FreeContextBuffer(outbuf.pvBuffer);
|
||||
if((result != CURLE_OK) || (outbuf.cbBuffer != (size_t) written)) {
|
||||
infof(data, "schannel: failed to send close msg: %s"
|
||||
" (bytes written: %zd)\n", curl_easy_strerror(result), written);
|
||||
" (bytes written: %zd)", curl_easy_strerror(result), written);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/* free SSPI Schannel API security context handle */
|
||||
if(BACKEND->ctxt) {
|
||||
DEBUGF(infof(data, "schannel: clear security context handle\n"));
|
||||
DEBUGF(infof(data, "schannel: clear security context handle"));
|
||||
s_pSecFn->DeleteSecurityContext(&BACKEND->ctxt->ctxt_handle);
|
||||
Curl_safefree(BACKEND->ctxt);
|
||||
}
|
||||
|
@ -204,12 +204,12 @@ static CURLcode add_certs_data_to_store(HCERTSTORE trust_store,
|
||||
if(result == CURLE_OK) {
|
||||
if(!num_certs) {
|
||||
infof(data,
|
||||
"schannel: did not add any certificates from CA file '%s'\n",
|
||||
"schannel: did not add any certificates from CA file '%s'",
|
||||
ca_file_text);
|
||||
}
|
||||
else {
|
||||
infof(data,
|
||||
"schannel: added %d certificate(s) from CA file '%s'\n",
|
||||
"schannel: added %d certificate(s) from CA file '%s'",
|
||||
num_certs, ca_file_text);
|
||||
}
|
||||
}
|
||||
@ -526,7 +526,7 @@ static CURLcode verify_host(struct Curl_easy *data,
|
||||
if(match_result == CURL_HOST_MATCH) {
|
||||
infof(data,
|
||||
"schannel: connection hostname (%s) validated "
|
||||
"against certificate name (%s)\n",
|
||||
"against certificate name (%s)",
|
||||
conn_hostname, cert_hostname);
|
||||
result = CURLE_OK;
|
||||
}
|
||||
@ -535,7 +535,7 @@ static CURLcode verify_host(struct Curl_easy *data,
|
||||
|
||||
infof(data,
|
||||
"schannel: connection hostname (%s) did not match "
|
||||
"against certificate name (%s)\n",
|
||||
"against certificate name (%s)",
|
||||
conn_hostname, cert_hostname);
|
||||
|
||||
cert_hostname_len =
|
||||
|
@ -1644,7 +1644,7 @@ static CURLcode sectransp_set_selected_ciphers(struct Curl_easy *data,
|
||||
}
|
||||
}
|
||||
/* All cipher suites in the list are found. Report to logs as-is */
|
||||
infof(data, "SSL: Setting cipher suites list \"%s\"\n", ciphers);
|
||||
infof(data, "SSL: Setting cipher suites list \"%s\"", ciphers);
|
||||
|
||||
err = SSLSetEnabledCiphers(ssl_ctx, selected_ciphers, ciphers_count);
|
||||
if(err != noErr) {
|
||||
@ -1840,19 +1840,19 @@ static CURLcode sectransp_connect_step1(struct Curl_easy *data,
|
||||
#endif
|
||||
) {
|
||||
CFArrayAppendValue(alpnArr, CFSTR(ALPN_H2));
|
||||
infof(data, "ALPN, offering %s\n", ALPN_H2);
|
||||
infof(data, "ALPN, offering %s", ALPN_H2);
|
||||
}
|
||||
#endif
|
||||
|
||||
CFArrayAppendValue(alpnArr, CFSTR(ALPN_HTTP_1_1));
|
||||
infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1);
|
||||
infof(data, "ALPN, offering %s", ALPN_HTTP_1_1);
|
||||
|
||||
/* expects length prefixed preference ordered list of protocols in wire
|
||||
* format
|
||||
*/
|
||||
err = SSLSetALPNProtocols(backend->ssl_ctx, alpnArr);
|
||||
if(err != noErr)
|
||||
infof(data, "WARNING: failed to set ALPN protocols; OSStatus %d\n",
|
||||
infof(data, "WARNING: failed to set ALPN protocols; OSStatus %d",
|
||||
err);
|
||||
CFRelease(alpnArr);
|
||||
}
|
||||
@ -1861,7 +1861,7 @@ static CURLcode sectransp_connect_step1(struct Curl_easy *data,
|
||||
|
||||
if(SSL_SET_OPTION(key)) {
|
||||
infof(data, "WARNING: SSL: CURLOPT_SSLKEY is ignored by Secure "
|
||||
"Transport. The private key must be in the Keychain.\n");
|
||||
"Transport. The private key must be in the Keychain.");
|
||||
}
|
||||
|
||||
if(ssl_cert || ssl_cert_blob) {
|
||||
@ -1876,11 +1876,11 @@ static CURLcode sectransp_connect_step1(struct Curl_easy *data,
|
||||
if(is_cert_file || is_cert_data) {
|
||||
if(!SSL_SET_OPTION(cert_type))
|
||||
infof(data, "WARNING: SSL: Certificate type not set, assuming "
|
||||
"PKCS#12 format.\n");
|
||||
"PKCS#12 format.");
|
||||
else if(strncmp(SSL_SET_OPTION(cert_type), "P12",
|
||||
strlen(SSL_SET_OPTION(cert_type))) != 0)
|
||||
infof(data, "WARNING: SSL: The Security framework only supports "
|
||||
"loading identities that are in PKCS#12 format.\n");
|
||||
"loading identities that are in PKCS#12 format.");
|
||||
|
||||
err = CopyIdentityFromPKCS12File(ssl_cert, ssl_cert_blob,
|
||||
SSL_SET_OPTION(key_passwd), &cert_and_key);
|
||||
@ -1899,7 +1899,7 @@ static CURLcode sectransp_connect_step1(struct Curl_easy *data,
|
||||
char *certp;
|
||||
CURLcode result = CopyCertSubject(data, cert, &certp);
|
||||
if(!result) {
|
||||
infof(data, "Client certificate: %s\n", certp);
|
||||
infof(data, "Client certificate: %s", certp);
|
||||
free(certp);
|
||||
}
|
||||
|
||||
@ -2025,7 +2025,7 @@ static CURLcode sectransp_connect_step1(struct Curl_easy *data,
|
||||
strlen(hostname));
|
||||
|
||||
if(err != noErr) {
|
||||
infof(data, "WARNING: SSL: SSLSetPeerDomainName() failed: OSStatus %d\n",
|
||||
infof(data, "WARNING: SSL: SSLSetPeerDomainName() failed: OSStatus %d",
|
||||
err);
|
||||
}
|
||||
|
||||
@ -2035,11 +2035,11 @@ static CURLcode sectransp_connect_step1(struct Curl_easy *data,
|
||||
#endif
|
||||
) {
|
||||
infof(data, "WARNING: using IP address, SNI is being disabled by "
|
||||
"the OS.\n");
|
||||
"the OS.");
|
||||
}
|
||||
}
|
||||
else {
|
||||
infof(data, "WARNING: disabling hostname validation also disables SNI.\n");
|
||||
infof(data, "WARNING: disabling hostname validation also disables SNI.");
|
||||
}
|
||||
|
||||
ciphers = SSL_CONN_CONFIG(cipher_list);
|
||||
@ -2082,7 +2082,7 @@ static CURLcode sectransp_connect_step1(struct Curl_easy *data,
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
}
|
||||
/* Informational message */
|
||||
infof(data, "SSL re-using session ID\n");
|
||||
infof(data, "SSL re-using session ID");
|
||||
}
|
||||
/* If there isn't one, then let's make one up! This has to be done prior
|
||||
to starting the handshake. */
|
||||
@ -2487,7 +2487,7 @@ static CURLcode pkp_pin_peer_pubkey(struct Curl_easy *data,
|
||||
spkiHeaderLength = 23;
|
||||
break;
|
||||
default:
|
||||
infof(data, "SSL: unhandled public key length: %d\n", pubkeylen);
|
||||
infof(data, "SSL: unhandled public key length: %d", pubkeylen);
|
||||
#elif SECTRANSP_PINNEDPUBKEY_V2
|
||||
default:
|
||||
/* ecDSA secp256r1 pubkeylen == 91 header already included?
|
||||
@ -2778,35 +2778,35 @@ sectransp_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
(void)SSLGetNegotiatedProtocolVersion(backend->ssl_ctx, &protocol);
|
||||
switch(protocol) {
|
||||
case kSSLProtocol2:
|
||||
infof(data, "SSL 2.0 connection using %s\n",
|
||||
infof(data, "SSL 2.0 connection using %s",
|
||||
TLSCipherNameForNumber(cipher));
|
||||
break;
|
||||
case kSSLProtocol3:
|
||||
infof(data, "SSL 3.0 connection using %s\n",
|
||||
infof(data, "SSL 3.0 connection using %s",
|
||||
TLSCipherNameForNumber(cipher));
|
||||
break;
|
||||
case kTLSProtocol1:
|
||||
infof(data, "TLS 1.0 connection using %s\n",
|
||||
infof(data, "TLS 1.0 connection using %s",
|
||||
TLSCipherNameForNumber(cipher));
|
||||
break;
|
||||
#if CURL_BUILD_MAC_10_8 || CURL_BUILD_IOS
|
||||
case kTLSProtocol11:
|
||||
infof(data, "TLS 1.1 connection using %s\n",
|
||||
infof(data, "TLS 1.1 connection using %s",
|
||||
TLSCipherNameForNumber(cipher));
|
||||
break;
|
||||
case kTLSProtocol12:
|
||||
infof(data, "TLS 1.2 connection using %s\n",
|
||||
infof(data, "TLS 1.2 connection using %s",
|
||||
TLSCipherNameForNumber(cipher));
|
||||
break;
|
||||
#endif /* CURL_BUILD_MAC_10_8 || CURL_BUILD_IOS */
|
||||
#if CURL_BUILD_MAC_10_13 || CURL_BUILD_IOS_11
|
||||
case kTLSProtocol13:
|
||||
infof(data, "TLS 1.3 connection using %s\n",
|
||||
infof(data, "TLS 1.3 connection using %s",
|
||||
TLSCipherNameForNumber(cipher));
|
||||
break;
|
||||
#endif /* CURL_BUILD_MAC_10_13 || CURL_BUILD_IOS_11 */
|
||||
default:
|
||||
infof(data, "Unknown protocol connection\n");
|
||||
infof(data, "Unknown protocol connection");
|
||||
break;
|
||||
}
|
||||
|
||||
@ -2832,7 +2832,7 @@ sectransp_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
conn->negnpn = CURL_HTTP_VERSION_1_1;
|
||||
}
|
||||
else
|
||||
infof(data, "ALPN, server did not agree to a protocol\n");
|
||||
infof(data, "ALPN, server did not agree to a protocol");
|
||||
|
||||
Curl_multiuse_state(data, conn->negnpn == CURL_HTTP_VERSION_2 ?
|
||||
BUNDLE_MULTIPLEX : BUNDLE_NO_MULTIUSE);
|
||||
@ -2881,7 +2881,7 @@ show_verbose_server_cert(struct Curl_easy *data,
|
||||
server_cert = SecTrustGetCertificateAtIndex(trust, i);
|
||||
result = CopyCertSubject(data, server_cert, &certp);
|
||||
if(!result) {
|
||||
infof(data, "Server certificate: %s\n", certp);
|
||||
infof(data, "Server certificate: %s", certp);
|
||||
free(certp);
|
||||
}
|
||||
}
|
||||
@ -2907,7 +2907,7 @@ show_verbose_server_cert(struct Curl_easy *data,
|
||||
server_cert = SecTrustGetCertificateAtIndex(trust, i);
|
||||
result = CopyCertSubject(data, server_cert, &certp);
|
||||
if(!result) {
|
||||
infof(data, "Server certificate: %s\n", certp);
|
||||
infof(data, "Server certificate: %s", certp);
|
||||
free(certp);
|
||||
}
|
||||
}
|
||||
@ -2927,7 +2927,7 @@ show_verbose_server_cert(struct Curl_easy *data,
|
||||
i);
|
||||
result = CopyCertSubject(data, server_cert, &certp);
|
||||
if(!result) {
|
||||
infof(data, "Server certificate: %s\n", certp);
|
||||
infof(data, "Server certificate: %s", certp);
|
||||
free(certp);
|
||||
}
|
||||
}
|
||||
@ -2947,7 +2947,7 @@ show_verbose_server_cert(struct Curl_easy *data,
|
||||
server_cert = (SecCertificateRef)CFArrayGetValueAtIndex(server_certs, i);
|
||||
result = CopyCertSubject(data, server_cert, &certp);
|
||||
if(!result) {
|
||||
infof(data, "Server certificate: %s\n", certp);
|
||||
infof(data, "Server certificate: %s", certp);
|
||||
free(certp);
|
||||
}
|
||||
}
|
||||
|
@ -444,7 +444,7 @@ bool Curl_ssl_getsessionid(struct Curl_easy *data,
|
||||
}
|
||||
}
|
||||
|
||||
DEBUGF(infof(data, "%s Session ID in cache for %s %s://%s:%d\n",
|
||||
DEBUGF(infof(data, "%s Session ID in cache for %s %s://%s:%d",
|
||||
no_match? "Didn't find": "Found",
|
||||
isProxy ? "proxy" : "host",
|
||||
conn->handler->scheme, name, port));
|
||||
@ -593,7 +593,7 @@ CURLcode Curl_ssl_addsessionid(struct Curl_easy *data,
|
||||
return CURLE_OUT_OF_MEMORY;
|
||||
}
|
||||
|
||||
DEBUGF(infof(data, "Added Session ID to cache for %s://%s:%d [%s]\n",
|
||||
DEBUGF(infof(data, "Added Session ID to cache for %s://%s:%d [%s]",
|
||||
store->scheme, store->name, store->remote_port,
|
||||
isProxy ? "PROXY" : "server"));
|
||||
return CURLE_OK;
|
||||
@ -953,7 +953,7 @@ CURLcode Curl_pin_peer_pubkey(struct Curl_easy *data,
|
||||
if(encode)
|
||||
return encode;
|
||||
|
||||
infof(data, "\t public key hash: sha256//%s\n", encoded);
|
||||
infof(data, " public key hash: sha256//%s", encoded);
|
||||
|
||||
/* it starts with sha256//, copy so we can modify it */
|
||||
pinkeylen = strlen(pinnedpubkey) + 1;
|
||||
|
@ -239,7 +239,7 @@ wolfssl_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
req_method = SSLv23_client_method();
|
||||
#else
|
||||
infof(data, "wolfSSL <3.3.0 cannot be configured to use TLS 1.0-1.2, "
|
||||
"TLS 1.0 is used exclusively\n");
|
||||
"TLS 1.0 is used exclusively");
|
||||
req_method = TLSv1_client_method();
|
||||
#endif
|
||||
use_sni(TRUE);
|
||||
@ -324,7 +324,7 @@ wolfssl_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
failf(data, "failed setting cipher list: %s", ciphers);
|
||||
return CURLE_SSL_CIPHER;
|
||||
}
|
||||
infof(data, "Cipher selection: %s\n", ciphers);
|
||||
infof(data, "Cipher selection: %s", ciphers);
|
||||
}
|
||||
|
||||
#ifndef NO_FILESYSTEM
|
||||
@ -347,16 +347,16 @@ wolfssl_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
/* Just continue with a warning if no strict certificate
|
||||
verification is required. */
|
||||
infof(data, "error setting certificate verify locations,"
|
||||
" continuing anyway:\n");
|
||||
" continuing anyway:");
|
||||
}
|
||||
}
|
||||
else {
|
||||
/* Everything is fine. */
|
||||
infof(data, "successfully set certificate verify locations:\n");
|
||||
infof(data, "successfully set certificate verify locations:");
|
||||
}
|
||||
infof(data, " CAfile: %s\n",
|
||||
infof(data, " CAfile: %s",
|
||||
SSL_CONN_CONFIG(CAfile) ? SSL_CONN_CONFIG(CAfile) : "none");
|
||||
infof(data, " CApath: %s\n",
|
||||
infof(data, " CApath: %s",
|
||||
SSL_CONN_CONFIG(CApath) ? SSL_CONN_CONFIG(CApath) : "none");
|
||||
}
|
||||
|
||||
@ -406,7 +406,7 @@ wolfssl_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
(wolfSSL_CTX_UseSNI(backend->ctx, WOLFSSL_SNI_HOST_NAME, hostname,
|
||||
(unsigned short)hostname_len) != 1)) {
|
||||
infof(data, "WARNING: failed to configure server name indication (SNI) "
|
||||
"TLS extension\n");
|
||||
"TLS extension");
|
||||
}
|
||||
}
|
||||
#endif
|
||||
@ -450,12 +450,12 @@ wolfssl_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
#ifdef USE_HTTP2
|
||||
if(data->state.httpwant >= CURL_HTTP_VERSION_2) {
|
||||
strcpy(protocols + strlen(protocols), ALPN_H2 ",");
|
||||
infof(data, "ALPN, offering %s\n", ALPN_H2);
|
||||
infof(data, "ALPN, offering %s", ALPN_H2);
|
||||
}
|
||||
#endif
|
||||
|
||||
strcpy(protocols + strlen(protocols), ALPN_HTTP_1_1);
|
||||
infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1);
|
||||
infof(data, "ALPN, offering %s", ALPN_HTTP_1_1);
|
||||
|
||||
if(wolfSSL_UseALPN(backend->handle, protocols,
|
||||
(unsigned)strlen(protocols),
|
||||
@ -498,7 +498,7 @@ wolfssl_connect_step1(struct Curl_easy *data, struct connectdata *conn,
|
||||
infof(data, "Can't use session ID, going on without\n");
|
||||
}
|
||||
else
|
||||
infof(data, "SSL re-using session ID\n");
|
||||
infof(data, "SSL re-using session ID");
|
||||
}
|
||||
Curl_ssl_sessionid_unlock(data);
|
||||
}
|
||||
@ -578,7 +578,7 @@ wolfssl_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
* as also mismatching CN fields */
|
||||
else if(DOMAIN_NAME_MISMATCH == detail) {
|
||||
#if 1
|
||||
failf(data, "\tsubject alt name(s) or common name do not match \"%s\"",
|
||||
failf(data, " subject alt name(s) or common name do not match \"%s\"",
|
||||
dispname);
|
||||
return CURLE_PEER_FAILED_VERIFICATION;
|
||||
#else
|
||||
@ -590,13 +590,13 @@ wolfssl_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
* 'conn->ssl_config.verifyhost' value. */
|
||||
if(SSL_CONN_CONFIG(verifyhost)) {
|
||||
failf(data,
|
||||
"\tsubject alt name(s) or common name do not match \"%s\"\n",
|
||||
" subject alt name(s) or common name do not match \"%s\"\n",
|
||||
dispname);
|
||||
return CURLE_PEER_FAILED_VERIFICATION;
|
||||
}
|
||||
else {
|
||||
infof(data,
|
||||
"\tsubject alt name(s) and/or common name do not match \"%s\"\n",
|
||||
" subject alt name(s) and/or common name do not match \"%s\"",
|
||||
dispname);
|
||||
return CURLE_OK;
|
||||
}
|
||||
@ -605,14 +605,14 @@ wolfssl_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
#if LIBWOLFSSL_VERSION_HEX >= 0x02007000 /* 2.7.0 */
|
||||
else if(ASN_NO_SIGNER_E == detail) {
|
||||
if(SSL_CONN_CONFIG(verifypeer)) {
|
||||
failf(data, "\tCA signer not available for verification");
|
||||
failf(data, " CA signer not available for verification");
|
||||
return CURLE_SSL_CACERT_BADFILE;
|
||||
}
|
||||
else {
|
||||
/* Just continue with a warning if no strict certificate
|
||||
verification is required. */
|
||||
infof(data, "CA signer not available for verification, "
|
||||
"continuing anyway\n");
|
||||
"continuing anyway");
|
||||
}
|
||||
}
|
||||
#endif
|
||||
@ -677,7 +677,7 @@ wolfssl_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
rc = wolfSSL_ALPN_GetProtocol(backend->handle, &protocol, &protocol_len);
|
||||
|
||||
if(rc == SSL_SUCCESS) {
|
||||
infof(data, "ALPN, server accepted to use %.*s\n", protocol_len,
|
||||
infof(data, "ALPN, server accepted to use %.*s", protocol_len,
|
||||
protocol);
|
||||
|
||||
if(protocol_len == ALPN_HTTP_1_1_LENGTH &&
|
||||
@ -690,13 +690,13 @@ wolfssl_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
conn->negnpn = CURL_HTTP_VERSION_2;
|
||||
#endif
|
||||
else
|
||||
infof(data, "ALPN, unrecognized protocol %.*s\n", protocol_len,
|
||||
infof(data, "ALPN, unrecognized protocol %.*s", protocol_len,
|
||||
protocol);
|
||||
Curl_multiuse_state(data, conn->negnpn == CURL_HTTP_VERSION_2 ?
|
||||
BUNDLE_MULTIPLEX : BUNDLE_NO_MULTIUSE);
|
||||
}
|
||||
else if(rc == SSL_ALPN_NOT_FOUND)
|
||||
infof(data, "ALPN, server did not agree to a protocol\n");
|
||||
infof(data, "ALPN, server did not agree to a protocol");
|
||||
else {
|
||||
failf(data, "ALPN, failure getting protocol, error %d", rc);
|
||||
return CURLE_SSL_CONNECT_ERROR;
|
||||
@ -706,11 +706,11 @@ wolfssl_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
|
||||
connssl->connecting_state = ssl_connect_3;
|
||||
#if (LIBWOLFSSL_VERSION_HEX >= 0x03009010)
|
||||
infof(data, "SSL connection using %s / %s\n",
|
||||
infof(data, "SSL connection using %s / %s",
|
||||
wolfSSL_get_version(backend->handle),
|
||||
wolfSSL_get_cipher_name(backend->handle));
|
||||
#else
|
||||
infof(data, "SSL connected\n");
|
||||
infof(data, "SSL connected");
|
||||
#endif
|
||||
|
||||
return CURLE_OK;
|
||||
@ -739,7 +739,7 @@ wolfssl_connect_step3(struct Curl_easy *data, struct connectdata *conn,
|
||||
&old_ssl_sessionid, NULL, sockindex));
|
||||
if(incache) {
|
||||
if(old_ssl_sessionid != our_ssl_sessionid) {
|
||||
infof(data, "old SSL session ID is stale, removing\n");
|
||||
infof(data, "old SSL session ID is stale, removing");
|
||||
Curl_ssl_delsessionid(data, old_ssl_sessionid);
|
||||
incache = FALSE;
|
||||
}
|
||||
@ -1089,7 +1089,7 @@ static CURLcode wolfssl_sha256sum(const unsigned char *tmp, /* input */
|
||||
}
|
||||
|
||||
static void *wolfssl_get_internals(struct ssl_connect_data *connssl,
|
||||
CURLINFO info UNUSED_PARAM)
|
||||
CURLINFO info UNUSED_PARAM)
|
||||
{
|
||||
struct ssl_backend_data *backend = connssl->backend;
|
||||
(void)info;
|
||||
|
@ -866,7 +866,7 @@ static void do_pubkey_field(struct Curl_easy *data, int certnum,
|
||||
if(data->set.ssl.certinfo)
|
||||
Curl_ssl_push_certinfo(data, certnum, label, output);
|
||||
if(!certnum)
|
||||
infof(data, " %s: %s\n", label, output);
|
||||
infof(data, " %s: %s", label, output);
|
||||
free((char *) output);
|
||||
}
|
||||
}
|
||||
@ -905,7 +905,7 @@ static void do_pubkey(struct Curl_easy *data, int certnum,
|
||||
if(len > 32)
|
||||
elem.beg = q; /* Strip leading zero bytes. */
|
||||
if(!certnum)
|
||||
infof(data, " RSA Public Key (%lu bits)\n", len);
|
||||
infof(data, " RSA Public Key (%lu bits)", len);
|
||||
if(data->set.ssl.certinfo) {
|
||||
q = curl_maprintf("%lu", len);
|
||||
if(q) {
|
||||
@ -978,7 +978,7 @@ CURLcode Curl_extract_certinfo(struct Curl_easy *data,
|
||||
if(data->set.ssl.certinfo)
|
||||
Curl_ssl_push_certinfo(data, certnum, "Subject", ccp);
|
||||
if(!certnum)
|
||||
infof(data, "%2d Subject: %s\n", certnum, ccp);
|
||||
infof(data, "%2d Subject: %s", certnum, ccp);
|
||||
free((char *) ccp);
|
||||
|
||||
/* Issuer. */
|
||||
@ -988,7 +988,7 @@ CURLcode Curl_extract_certinfo(struct Curl_easy *data,
|
||||
if(data->set.ssl.certinfo)
|
||||
Curl_ssl_push_certinfo(data, certnum, "Issuer", ccp);
|
||||
if(!certnum)
|
||||
infof(data, " Issuer: %s\n", ccp);
|
||||
infof(data, " Issuer: %s", ccp);
|
||||
free((char *) ccp);
|
||||
|
||||
/* Version (always fits in less than 32 bits). */
|
||||
@ -1003,7 +1003,7 @@ CURLcode Curl_extract_certinfo(struct Curl_easy *data,
|
||||
free((char *) ccp);
|
||||
}
|
||||
if(!certnum)
|
||||
infof(data, " Version: %lu (0x%lx)\n", version + 1, version);
|
||||
infof(data, " Version: %lu (0x%lx)", version + 1, version);
|
||||
|
||||
/* Serial number. */
|
||||
ccp = ASN1tostr(&cert.serialNumber, 0);
|
||||
@ -1012,7 +1012,7 @@ CURLcode Curl_extract_certinfo(struct Curl_easy *data,
|
||||
if(data->set.ssl.certinfo)
|
||||
Curl_ssl_push_certinfo(data, certnum, "Serial Number", ccp);
|
||||
if(!certnum)
|
||||
infof(data, " Serial Number: %s\n", ccp);
|
||||
infof(data, " Serial Number: %s", ccp);
|
||||
free((char *) ccp);
|
||||
|
||||
/* Signature algorithm .*/
|
||||
@ -1023,7 +1023,7 @@ CURLcode Curl_extract_certinfo(struct Curl_easy *data,
|
||||
if(data->set.ssl.certinfo)
|
||||
Curl_ssl_push_certinfo(data, certnum, "Signature Algorithm", ccp);
|
||||
if(!certnum)
|
||||
infof(data, " Signature Algorithm: %s\n", ccp);
|
||||
infof(data, " Signature Algorithm: %s", ccp);
|
||||
free((char *) ccp);
|
||||
|
||||
/* Start Date. */
|
||||
@ -1033,7 +1033,7 @@ CURLcode Curl_extract_certinfo(struct Curl_easy *data,
|
||||
if(data->set.ssl.certinfo)
|
||||
Curl_ssl_push_certinfo(data, certnum, "Start Date", ccp);
|
||||
if(!certnum)
|
||||
infof(data, " Start Date: %s\n", ccp);
|
||||
infof(data, " Start Date: %s", ccp);
|
||||
free((char *) ccp);
|
||||
|
||||
/* Expire Date. */
|
||||
@ -1043,7 +1043,7 @@ CURLcode Curl_extract_certinfo(struct Curl_easy *data,
|
||||
if(data->set.ssl.certinfo)
|
||||
Curl_ssl_push_certinfo(data, certnum, "Expire Date", ccp);
|
||||
if(!certnum)
|
||||
infof(data, " Expire Date: %s\n", ccp);
|
||||
infof(data, " Expire Date: %s", ccp);
|
||||
free((char *) ccp);
|
||||
|
||||
/* Public Key Algorithm. */
|
||||
@ -1054,7 +1054,7 @@ CURLcode Curl_extract_certinfo(struct Curl_easy *data,
|
||||
if(data->set.ssl.certinfo)
|
||||
Curl_ssl_push_certinfo(data, certnum, "Public Key Algorithm", ccp);
|
||||
if(!certnum)
|
||||
infof(data, " Public Key Algorithm: %s\n", ccp);
|
||||
infof(data, " Public Key Algorithm: %s", ccp);
|
||||
do_pubkey(data, certnum, ccp, ¶m, &cert.subjectPublicKey);
|
||||
free((char *) ccp);
|
||||
|
||||
@ -1065,7 +1065,7 @@ CURLcode Curl_extract_certinfo(struct Curl_easy *data,
|
||||
if(data->set.ssl.certinfo)
|
||||
Curl_ssl_push_certinfo(data, certnum, "Signature", ccp);
|
||||
if(!certnum)
|
||||
infof(data, " Signature: %s\n", ccp);
|
||||
infof(data, " Signature: %s", ccp);
|
||||
free((char *) ccp);
|
||||
|
||||
/* Generate PEM certificate. */
|
||||
@ -1098,7 +1098,7 @@ CURLcode Curl_extract_certinfo(struct Curl_easy *data,
|
||||
if(data->set.ssl.certinfo)
|
||||
Curl_ssl_push_certinfo(data, certnum, "Cert", cp2);
|
||||
if(!certnum)
|
||||
infof(data, "%s\n", cp2);
|
||||
infof(data, "%s", cp2);
|
||||
free(cp2);
|
||||
return CURLE_OK;
|
||||
}
|
||||
@ -1220,12 +1220,12 @@ CURLcode Curl_verifyhost(struct Curl_easy *data, struct connectdata *conn,
|
||||
switch(matched) {
|
||||
case 1:
|
||||
/* an alternative name matched the server hostname */
|
||||
infof(data, "\t subjectAltName: %s matched\n", dispname);
|
||||
infof(data, " subjectAltName: %s matched", dispname);
|
||||
return CURLE_OK;
|
||||
case 0:
|
||||
/* an alternative name field existed, but didn't match and then
|
||||
we MUST fail */
|
||||
infof(data, "\t subjectAltName does not match %s\n", dispname);
|
||||
infof(data, " subjectAltName does not match %s", dispname);
|
||||
return CURLE_PEER_FAILED_VERIFICATION;
|
||||
}
|
||||
|
||||
@ -1262,7 +1262,7 @@ CURLcode Curl_verifyhost(struct Curl_easy *data, struct connectdata *conn,
|
||||
if(strlen(dnsname) != (size_t) len) /* Nul byte in string ? */
|
||||
failf(data, "SSL: illegal cert name field");
|
||||
else if(Curl_cert_hostcheck((const char *) dnsname, hostname)) {
|
||||
infof(data, "\t common name: %s (matched)\n", dnsname);
|
||||
infof(data, " common name: %s (matched)", dnsname);
|
||||
free(dnsname);
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
@ -79,30 +79,39 @@ unit_stop(void)
|
||||
curl_global_cleanup();
|
||||
}
|
||||
|
||||
static int verify(const char *info, const char *two)
|
||||
{
|
||||
/* the 'info' one has a newline appended */
|
||||
char *nl = strchr(info, '\n');
|
||||
if(!nl)
|
||||
return 1; /* nope */
|
||||
return strncmp(info, two, nl - info);
|
||||
}
|
||||
|
||||
UNITTEST_START
|
||||
|
||||
/* Injecting a simple short string via a format */
|
||||
msnprintf(input, sizeof(input), "Simple Test");
|
||||
Curl_infof(data, "%s", input);
|
||||
fail_unless(strcmp(result, input) == 0, "Simple string test");
|
||||
fail_unless(verify(result, input) == 0, "Simple string test");
|
||||
|
||||
/* Injecting a few different variables with a format */
|
||||
Curl_infof(data, "%s %u testing %lu\n", input, 42, 43L);
|
||||
fail_unless(strcmp(result, "Simple Test 42 testing 43\n") == 0,
|
||||
Curl_infof(data, "%s %u testing %lu", input, 42, 43L);
|
||||
fail_unless(verify(result, "Simple Test 42 testing 43\n") == 0,
|
||||
"Format string");
|
||||
|
||||
/* Variations of empty strings */
|
||||
Curl_infof(data, "");
|
||||
fail_unless(strlen(result) == 0, "Empty string");
|
||||
fail_unless(strlen(result) == 1, "Empty string");
|
||||
Curl_infof(data, "%s", NULL);
|
||||
fail_unless(strcmp(result, "(nil)") == 0, "Passing NULL as string");
|
||||
fail_unless(verify(result, "(nil)") == 0, "Passing NULL as string");
|
||||
|
||||
/* A string just long enough to not be truncated */
|
||||
memset(input, '\0', sizeof(input));
|
||||
memset(input, 'A', 2048);
|
||||
Curl_infof(data, "%s", input);
|
||||
fail_unless(strlen(result) == 2048, "No truncation of infof input");
|
||||
fail_unless(strcmp(result, input) == 0, "No truncation of infof input");
|
||||
fail_unless(verify(result, input) == 0, "No truncation of infof input");
|
||||
fail_unless(result[sizeof(result) - 1] == '\0',
|
||||
"No truncation of infof input");
|
||||
|
||||
@ -111,25 +120,20 @@ memset(input + 2047, 'A', 4);
|
||||
Curl_infof(data, "%s", input);
|
||||
fail_unless(strlen(result) == 2048, "Truncation of infof input 1");
|
||||
fail_unless(result[sizeof(result) - 1] == '\0', "Truncation of infof input 1");
|
||||
fail_unless(strncmp(result + 2045, "...", 3) == 0,
|
||||
"Truncation of infof input 1");
|
||||
|
||||
/* Just over the limit for truncation with newline */
|
||||
memset(input + 2047, 'A', 4);
|
||||
memset(input + 2047 + 4, '\n', 1);
|
||||
Curl_infof(data, "%s\n", input);
|
||||
Curl_infof(data, "%s", input);
|
||||
fail_unless(strlen(result) == 2048, "Truncation of infof input 2");
|
||||
fail_unless(result[sizeof(result) - 1] == '\0', "Truncation of infof input 2");
|
||||
fail_unless(strncmp(result + 2044, "...", 3) == 0,
|
||||
"Truncation of infof input 2");
|
||||
|
||||
/* Way over the limit for truncation with newline */
|
||||
memset(input, '\0', sizeof(input));
|
||||
memset(input, 'A', sizeof(input) - 1);
|
||||
Curl_infof(data, "%s\n", input);
|
||||
Curl_infof(data, "%s", input);
|
||||
fail_unless(strlen(result) == 2048, "Truncation of infof input 3");
|
||||
fail_unless(result[sizeof(result) - 1] == '\0', "Truncation of infof input 3");
|
||||
fail_unless(strncmp(result + 2044, "...", 3) == 0,
|
||||
"Truncation of infof input 3");
|
||||
|
||||
|
||||
UNITTEST_STOP
|
||||
|
Loading…
Reference in New Issue
Block a user