Lines Matching refs:failf

1035   failf(data, "Insufficient randomness");  in ossl_seed()
1330 failf(data, in cert_stuff()
1351 failf(data, in cert_stuff()
1387 failf(data, "ssl engine does not support loading certificates"); in cert_stuff()
1394 failf(data, "ssl engine cannot load client cert with id" in cert_stuff()
1402 failf(data, "ssl engine did not initialized the certificate " in cert_stuff()
1408 failf(data, "unable to set client certificate [%s]", in cert_stuff()
1416 failf(data, "crypto engine not set, cannot load certificate"); in cert_stuff()
1422 failf(data, "file type ENG for certificate not implemented"); in cert_stuff()
1435 failf(data, in cert_stuff()
1446 failf(data, in cert_stuff()
1455 failf(data, "could not open PKCS12 file '%s'", cert_file); in cert_stuff()
1465 failf(data, "error reading PKCS12 file '%s'", in cert_stuff()
1474 failf(data, in cert_stuff()
1486 failf(data, in cert_stuff()
1495 failf(data, "unable to use private key from PKCS12 file '%s'", in cert_stuff()
1501 failf(data, "private key from PKCS12 file '%s' " in cert_stuff()
1518 failf(data, "cannot add certificate to client CA list"); in cert_stuff()
1523 failf(data, "cannot add certificate to certificate chain"); in cert_stuff()
1539 failf(data, "not supported file type '%s' for certificate", cert_type); in cert_stuff()
1560 failf(data, "unable to set private key file: '%s' type %s", in cert_stuff()
1585 failf(data, "unable do create " OSSL_PACKAGE in cert_stuff()
1598 failf(data, "failed to load private key from crypto engine"); in cert_stuff()
1602 failf(data, "unable to set private key"); in cert_stuff()
1609 failf(data, "crypto engine not set, cannot load private key"); in cert_stuff()
1615 failf(data, "file type ENG for private key not supported"); in cert_stuff()
1620 failf(data, "file type P12 for private key not supported"); in cert_stuff()
1625 failf(data, "not supported file type for private key"); in cert_stuff()
1631 failf(data, "unable to create an SSL structure"); in cert_stuff()
1675 failf(data, "Private key does not match the certificate public key"); in cert_stuff()
1815 failf(data, "SSL Engine '%s' not found", engine); in ossl_set_engine()
1828 failf(data, "Failed to initialise SSL Engine '%s': %s", in ossl_set_engine()
1836 failf(data, "SSL Engine not supported"); in ossl_set_engine()
1852 failf(data, "set default crypto engine '%s' failed", in ossl_set_engine_default()
2142 failf(data, "unexpected ssl peer type: %d", peer->type); in ossl_verifyhost()
2228 failf(data, "SSL: no alternative certificate subject name matches " in ossl_verifyhost()
2275 failf(data, "SSL: illegal cert name field"); in ossl_verifyhost()
2285 failf(data, in ossl_verifyhost()
2291 failf(data, "SSL: certificate subject name '%s' does not match " in ossl_verifyhost()
2336 failf(data, "No OCSP response received"); in verifystatus()
2343 failf(data, "Invalid OCSP response"); in verifystatus()
2350 failf(data, "Invalid OCSP response status: %s (%d)", in verifystatus()
2358 failf(data, "Invalid OCSP response"); in verifystatus()
2365 failf(data, "Could not get peer certificate chain"); in verifystatus()
2390 failf(data, "Could not add issuer cert to OCSP response"); in verifystatus()
2400 failf(data, "OCSP response verification failed"); in verifystatus()
2408 failf(data, "Error getting peer certificate"); in verifystatus()
2423 failf(data, "Error computing OCSP ID"); in verifystatus()
2433 failf(data, "Could not find certificate ID in OCSP response"); in verifystatus()
2440 failf(data, "OCSP response has expired"); in verifystatus()
2454 failf(data, "SSL certificate revocation reason: %s (%d)", in verifystatus()
2829 failf(data, OSSL_PACKAGE " was built without TLS 1.3 support"); in ossl_set_ssl_version_min_max_legacy()
2837 failf(data, OSSL_PACKAGE " was built without TLS 1.2 support"); in ossl_set_ssl_version_min_max_legacy()
2845 failf(data, OSSL_PACKAGE " was built without TLS 1.1 support"); in ossl_set_ssl_version_min_max_legacy()
2874 failf(data, OSSL_PACKAGE " was built without TLS 1.3 support"); in ossl_set_ssl_version_min_max_legacy()
3077 failf(data, "SSL: Out of memory allocating for OID list"); in import_windows_cert_store()
3199 failf(data, "error importing CA certificate blob"); in populate_x509_store()
3214 failf(data, "error setting certificate file: %s", ssl_cafile); in populate_x509_store()
3223 failf(data, "error setting certificate path: %s", ssl_capath); in populate_x509_store()
3235 failf(data, "error setting certificate verify locations:" in populate_x509_store()
3267 failf(data, "error loading CRL file: %s", ssl_crlfile); in populate_x509_store()
3527 failf(data, "No SSLv2 support"); in Curl_ossl_ctx_init()
3530 failf(data, "No SSLv3 support"); in Curl_ossl_ctx_init()
3533 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in Curl_ossl_ctx_init()
3540 failf(data, "QUIC needs at least TLS version 1.3"); in Curl_ossl_ctx_init()
3553 failf(data, "unsupported transport %d in SSL init", transport); in Curl_ossl_ctx_init()
3562 failf(data, "SSL: could not create a context: %s", in Curl_ossl_ctx_init()
3666 failf(data, "Unrecognized parameter passed via CURLOPT_SSLVERSION"); in Curl_ossl_ctx_init()
3680 failf(data, "Error setting ALPN"); in Curl_ossl_ctx_init()
3703 failf(data, "failed setting cipher list: %s", ciphers); in Curl_ossl_ctx_init()
3714 failf(data, "failed setting TLS 1.3 cipher suite: %s", ciphers13); in Curl_ossl_ctx_init()
3732 failf(data, "failed setting curves list: '%s'", curves); in Curl_ossl_ctx_init()
3746 failf(data, "Unable to set SRP username"); in Curl_ossl_ctx_init()
3750 failf(data, "failed setting SRP password"); in Curl_ossl_ctx_init()
3757 failf(data, "failed setting SRP cipher list"); in Curl_ossl_ctx_init()
3805 failf(data, "error signaled by ssl ctx callback"); in Curl_ossl_ctx_init()
3815 failf(data, "SSL: could not create a context (handle)"); in Curl_ossl_ctx_init()
3838 failf(data, "Failed set SNI"); in Curl_ossl_ctx_init()
3986 failf(data, "SSL: SSL_set_session failed: %s", in Curl_ossl_ctx_init()
4023 failf(data, "Error determining ALPN"); in ossl_connect_step1()
4228 failf(data, "%s", "SSL certificate verification failed");
4240 failf(data, "TLS cert problem: %s",
4256 failf(data, "ECH required: %s",
4262 failf(data, "TLS connect error: %s",
4278 failf(data, OSSL_PACKAGE " SSL_connect: %s in connection to %s:%d ",
4542 failf(data,
4560 failf(data, "SSL: could not get peer certificate");
4602 failf(data, "SSL: could not get X509-issuer name");
4618 failf(data,
4631 failf(data,
4643 failf(data, "SSL: Unable to open issuer cert (%s)",
4655 failf(data, "SSL: Unable to read issuer cert (%s)",
4666 failf(data, "SSL: Certificate issuer check failed (%s)",
4688 failf(data, "SSL certificate verify result: %s (%ld)",
4744 failf(data, "SSL: public key does not match pinned public key");
4799 failf(data, "SSL connection timeout");
4815 failf(data, "SSL connection timeout");
4831 failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
4837 failf(data, "SSL connection timeout");
4967 failf(data, OSSL_PACKAGE " SSL_write: %s, errno %d",
4977 failf(data, "SSL_write() error: %s",
4985 failf(data, OSSL_PACKAGE " SSL_write: %s, errno %d",
5065 failf(data, OSSL_PACKAGE " SSL_read: %s, errno %d",
5088 failf(data, OSSL_PACKAGE " SSL_read: %s, errno %d"
5135 failf(data, "Failed to find the SSL filter");
5146 failf(data,
5159 failf(data, "Could not find digest algorithm %s (NID %d)",
5166 failf(data, "X509_digest() failed");