Lines Matching refs:MBEDTLS_SSL_DEBUG_MSG
118 MBEDTLS_SSL_DEBUG_MSG(1, ("non-matching renegotiation info")); in ssl_parse_renegotiation_info()
127 MBEDTLS_SSL_DEBUG_MSG(1, ("non-zero length renegotiation info")); in ssl_parse_renegotiation_info()
190 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_supported_groups_ext()
198 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_supported_groups_ext()
206 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_supported_groups_ext()
254 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_supported_point_formats()
274 MBEDTLS_SSL_DEBUG_MSG(4, ("point format selected: %d", p[0])); in ssl_parse_supported_point_formats()
302 MBEDTLS_SSL_DEBUG_MSG(3, ("skip ecjpake kkpp extension")); in ssl_parse_ecjpake_kkpp()
345 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_max_fragment_length_ext()
367 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_cid_ext()
380 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_cid_ext()
390 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_cid_ext()
400 MBEDTLS_SSL_DEBUG_MSG(3, ("Client sent CID extension, but CID disabled")); in ssl_parse_cid_ext()
405 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_cid_ext()
415 MBEDTLS_SSL_DEBUG_MSG(3, ("Use of CID extension negotiated")); in ssl_parse_cid_ext()
429 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_encrypt_then_mac_ext()
452 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_extended_ms_ext()
487 MBEDTLS_SSL_DEBUG_MSG(3, ("ticket length: %" MBEDTLS_PRINTF_SIZET, len)); in ssl_parse_session_ticket_ext()
495 MBEDTLS_SSL_DEBUG_MSG(3, ("ticket rejected: renegotiating")); in ssl_parse_session_ticket_ext()
508 MBEDTLS_SSL_DEBUG_MSG(3, ("ticket is not authentic")); in ssl_parse_session_ticket_ext()
510 MBEDTLS_SSL_DEBUG_MSG(3, ("ticket is expired")); in ssl_parse_session_ticket_ext()
531 MBEDTLS_SSL_DEBUG_MSG(3, ("session successfully restored from ticket")); in ssl_parse_session_ticket_ext()
607 MBEDTLS_SSL_DEBUG_MSG(3, ("found srtp profile: %s", in ssl_parse_use_srtp_ext()
617 MBEDTLS_SSL_DEBUG_MSG(3, ("selected srtp profile: %s", in ssl_parse_use_srtp_ext()
719 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite requires certificate")); in ssl_pick_cert()
722 MBEDTLS_SSL_DEBUG_MSG(3, ("server has no certificate")); in ssl_pick_cert()
746 MBEDTLS_SSL_DEBUG_MSG(3, ("certificate mismatch: key type")); in ssl_pick_cert()
762 MBEDTLS_SSL_DEBUG_MSG(3, ("certificate mismatch: " in ssl_pick_cert()
771 MBEDTLS_SSL_DEBUG_MSG(3, ("certificate mismatch: elliptic curve")); in ssl_pick_cert()
808 MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen")); in ssl_ciphersuite_match()
812 MBEDTLS_SSL_DEBUG_MSG(3, ("trying ciphersuite: %#04x (%s)", in ssl_ciphersuite_match()
817 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: version")); in ssl_ciphersuite_match()
824 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: ecjpake " in ssl_ciphersuite_match()
836 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: " in ssl_ciphersuite_match()
847 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: no pre-shared key")); in ssl_ciphersuite_match()
861 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: " in ssl_ciphersuite_match()
874 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: no suitable hash algorithm " in ssl_ciphersuite_match()
913 MBEDTLS_SSL_DEBUG_MSG(2, ("=> parse client hello")); in ssl_parse_client_hello()
953 MBEDTLS_SSL_DEBUG_MSG(3, ("client hello, message type: %d", in ssl_parse_client_hello()
957 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
961 MBEDTLS_SSL_DEBUG_MSG(3, ("client hello, message len.: %d", in ssl_parse_client_hello()
964 MBEDTLS_SSL_DEBUG_MSG(3, ("client hello, protocol version: [%d:%d]", in ssl_parse_client_hello()
977 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
986 MBEDTLS_SSL_DEBUG_MSG(1, ("replayed record, discarding")); in ssl_parse_client_hello()
1011 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1050 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1054 MBEDTLS_SSL_DEBUG_MSG(3, ("client hello v3, handshake type: %d", buf[0])); in ssl_parse_client_hello()
1057 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1062 MBEDTLS_SSL_DEBUG_MSG(3, ("client hello v3, handshake len.: %u", in ssl_parse_client_hello()
1068 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message: %u != 0", in ssl_parse_client_hello()
1075 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message: %u != %u + %u", in ssl_parse_client_hello()
1094 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message_seq: " in ssl_parse_client_hello()
1117 MBEDTLS_SSL_DEBUG_MSG( in ssl_parse_client_hello()
1122 MBEDTLS_SSL_DEBUG_MSG(1, ("ClientHello fragmentation not supported")); in ssl_parse_client_hello()
1154 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1169 MBEDTLS_SSL_DEBUG_MSG(1, ("server only supports TLS 1.2")); in ssl_parse_client_hello()
1189 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1212 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1230 MBEDTLS_SSL_DEBUG_MSG(2, ("cookie verification failed")); in ssl_parse_client_hello()
1233 MBEDTLS_SSL_DEBUG_MSG(2, ("cookie verification passed")); in ssl_parse_client_hello()
1242 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1246 MBEDTLS_SSL_DEBUG_MSG(2, ("cookie verification skipped")); in ssl_parse_client_hello()
1262 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1284 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1299 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1308 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1324 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1333 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message")); in ssl_parse_client_hello()
1341 MBEDTLS_SSL_DEBUG_MSG(3, ("found ServerName extension")); in ssl_parse_client_hello()
1351 MBEDTLS_SSL_DEBUG_MSG(3, ("found renegotiation extension")); in ssl_parse_client_hello()
1364 MBEDTLS_SSL_DEBUG_MSG(3, ("found signature_algorithms extension")); in ssl_parse_client_hello()
1379 MBEDTLS_SSL_DEBUG_MSG(3, ("found supported elliptic curves extension")); in ssl_parse_client_hello()
1388 MBEDTLS_SSL_DEBUG_MSG(3, ("found supported point formats extension")); in ssl_parse_client_hello()
1402 MBEDTLS_SSL_DEBUG_MSG(3, ("found ecjpake kkpp extension")); in ssl_parse_client_hello()
1413 MBEDTLS_SSL_DEBUG_MSG(3, ("found max fragment length extension")); in ssl_parse_client_hello()
1424 MBEDTLS_SSL_DEBUG_MSG(3, ("found CID extension")); in ssl_parse_client_hello()
1435 MBEDTLS_SSL_DEBUG_MSG(3, ("found encrypt then mac extension")); in ssl_parse_client_hello()
1446 MBEDTLS_SSL_DEBUG_MSG(3, ("found extended master secret extension")); in ssl_parse_client_hello()
1457 MBEDTLS_SSL_DEBUG_MSG(3, ("found session ticket extension")); in ssl_parse_client_hello()
1468 MBEDTLS_SSL_DEBUG_MSG(3, ("found alpn extension")); in ssl_parse_client_hello()
1480 MBEDTLS_SSL_DEBUG_MSG(3, ("found use_srtp extension")); in ssl_parse_client_hello()
1490 MBEDTLS_SSL_DEBUG_MSG(3, ("unknown extension found: %u (ignoring)", in ssl_parse_client_hello()
1532 MBEDTLS_SSL_DEBUG_MSG(3, ("received TLS_EMPTY_RENEGOTIATION_INFO ")); in ssl_parse_client_hello()
1535 MBEDTLS_SSL_DEBUG_MSG(1, ("received RENEGOTIATION SCSV " in ssl_parse_client_hello()
1552 MBEDTLS_SSL_DEBUG_MSG(1, ("legacy renegotiation, breaking off handshake")); in ssl_parse_client_hello()
1559 MBEDTLS_SSL_DEBUG_MSG(1, ("renegotiation_info extension missing (secure)")); in ssl_parse_client_hello()
1564 MBEDTLS_SSL_DEBUG_MSG(1, ("legacy renegotiation not allowed")); in ssl_parse_client_hello()
1569 MBEDTLS_SSL_DEBUG_MSG(1, ("renegotiation_info extension present (legacy)")); in ssl_parse_client_hello()
1643 MBEDTLS_SSL_DEBUG_MSG(1, ("got ciphersuites in common, " in ssl_parse_client_hello()
1649 MBEDTLS_SSL_DEBUG_MSG(1, ("got no ciphersuites in common")); in ssl_parse_client_hello()
1656 MBEDTLS_SSL_DEBUG_MSG(2, ("selected ciphersuite: %s", ciphersuite_info->name)); in ssl_parse_client_hello()
1676 MBEDTLS_SSL_DEBUG_MSG(3, ("client hello v3, signature_algorithm ext: %u", in ssl_parse_client_hello()
1679 MBEDTLS_SSL_DEBUG_MSG(3, ("no hash algorithm for signature algorithm " in ssl_parse_client_hello()
1684 MBEDTLS_SSL_DEBUG_MSG(2, ("<= parse client hello")); in ssl_parse_client_hello()
1709 MBEDTLS_SSL_DEBUG_MSG(1, ("buffer too small")); in ssl_write_cid_ext()
1713 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, adding CID extension")); in ssl_write_cid_ext()
1767 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, adding encrypt then mac extension")); in ssl_write_encrypt_then_mac_ext()
1791 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, adding extended master secret " in ssl_write_extended_ms_ext()
1816 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, adding session ticket extension")); in ssl_write_session_ticket_ext()
1839 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, secure renegotiation extension")); in ssl_write_renegotiation_ext()
1877 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, max_fragment_length extension")); in ssl_write_max_fragment_length_ext()
1907 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, supported_point_formats extension")); in ssl_write_supported_point_formats_ext()
1942 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, ecjpake kkpp extension")); in ssl_write_ecjpake_kkpp_ext()
1945 MBEDTLS_SSL_DEBUG_MSG(1, ("buffer too small")); in ssl_write_ecjpake_kkpp_ext()
1995 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, adding use_srtp extension")); in ssl_write_use_srtp_ext()
2010 MBEDTLS_SSL_DEBUG_MSG(1, ("buffer too small")); in ssl_write_use_srtp_ext()
2031 MBEDTLS_SSL_DEBUG_MSG(1, ("use_srtp extension invalid profile")); in ssl_write_use_srtp_ext()
2050 MBEDTLS_SSL_DEBUG_MSG(2, ("=> write hello verify request")); in ssl_write_hello_verify_request()
2067 MBEDTLS_SSL_DEBUG_MSG(1, ("inconsistent cookie callbacks")); in ssl_write_hello_verify_request()
2104 MBEDTLS_SSL_DEBUG_MSG(2, ("<= write hello verify request")); in ssl_write_hello_verify_request()
2153 MBEDTLS_SSL_DEBUG_MSG(3, ("session successfully restored from cache")); in ssl_handle_id_based_session_resumption()
2171 MBEDTLS_SSL_DEBUG_MSG(2, ("=> write server hello")); in ssl_write_server_hello()
2176 MBEDTLS_SSL_DEBUG_MSG(2, ("client hello was not authenticated")); in ssl_write_server_hello()
2177 MBEDTLS_SSL_DEBUG_MSG(2, ("<= write server hello")); in ssl_write_server_hello()
2196 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, chosen version: [%d:%d]", in ssl_write_server_hello()
2204 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, current time: %" MBEDTLS_PRINTF_LONGLONG, in ssl_write_server_hello()
2301 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, session id len.: %" MBEDTLS_PRINTF_SIZET, n)); in ssl_write_server_hello()
2303 MBEDTLS_SSL_DEBUG_MSG(3, ("%s session has been resumed", in ssl_write_server_hello()
2310 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, chosen ciphersuite: %s", in ssl_write_server_hello()
2312 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, compress alg.: 0x%02X", in ssl_write_server_hello()
2377 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, total extension length: %" MBEDTLS_PRINTF_SIZET, in ssl_write_server_hello()
2391 MBEDTLS_SSL_DEBUG_MSG(2, ("<= write server hello")); in ssl_write_server_hello()
2403 MBEDTLS_SSL_DEBUG_MSG(2, ("=> write certificate request")); in ssl_write_certificate_request()
2406 MBEDTLS_SSL_DEBUG_MSG(2, ("<= skip write certificate request")); in ssl_write_certificate_request()
2411 MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen")); in ssl_write_certificate_request()
2428 MBEDTLS_SSL_DEBUG_MSG(2, ("=> write certificate request")); in ssl_write_certificate_request()
2441 MBEDTLS_SSL_DEBUG_MSG(2, ("<= skip write certificate request")); in ssl_write_certificate_request()
2558 MBEDTLS_SSL_DEBUG_MSG(1, ("skipping CAs: buffer too short")); in ssl_write_certificate_request()
2581 MBEDTLS_SSL_DEBUG_MSG(2, ("<= write certificate request")); in ssl_write_certificate_request()
2744 MBEDTLS_SSL_DEBUG_MSG(1, ("got no server private key")); in ssl_get_ecdh_params_from_cert()
2749 MBEDTLS_SSL_DEBUG_MSG(1, ("server key not ECDH capable")); in ssl_get_ecdh_params_from_cert()
2914 MBEDTLS_SSL_DEBUG_MSG(1, ("no DH parameters set")); in ssl_prepare_server_key_exchange()
2989 MBEDTLS_SSL_DEBUG_MSG(1, ("no matching curve for ECDHE")); in ssl_prepare_server_key_exchange()
2993 MBEDTLS_SSL_DEBUG_MSG(2, ("ECDHE curve: %s", in ssl_prepare_server_key_exchange()
3007 MBEDTLS_SSL_DEBUG_MSG(1, ("Perform PSA-based ECDH computation.")); in ssl_prepare_server_key_exchange()
3013 MBEDTLS_SSL_DEBUG_MSG(1, ("Invalid ecc group parse.")); in ssl_prepare_server_key_exchange()
3118 MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen")); in ssl_prepare_server_key_exchange()
3146 MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen")); in ssl_prepare_server_key_exchange()
3152 MBEDTLS_SSL_DEBUG_MSG(3, ("pick hash algorithm %u for signing", (unsigned) md_alg)); in ssl_prepare_server_key_exchange()
3166 MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen")); in ssl_prepare_server_key_exchange()
3217 MBEDTLS_SSL_DEBUG_MSG(1, ("got no private key")); in ssl_prepare_server_key_exchange()
3256 MBEDTLS_SSL_DEBUG_MSG(2, ("=> write server key exchange")); in ssl_write_server_key_exchange()
3276 MBEDTLS_SSL_DEBUG_MSG(2, ("<= skip write server key exchange")); in ssl_write_server_key_exchange()
3287 MBEDTLS_SSL_DEBUG_MSG(2, ("resuming signature operation")); in ssl_write_server_key_exchange()
3303 MBEDTLS_SSL_DEBUG_MSG(2, ("<= write server key exchange (pending)")); in ssl_write_server_key_exchange()
3338 MBEDTLS_SSL_DEBUG_MSG(2, ("<= write server key exchange")); in ssl_write_server_key_exchange()
3347 MBEDTLS_SSL_DEBUG_MSG(2, ("=> write server hello done")); in ssl_write_server_hello_done()
3374 MBEDTLS_SSL_DEBUG_MSG(2, ("<= write server hello done")); in ssl_write_server_hello_done()
3392 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange message")); in ssl_parse_client_dh_public()
3400 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange message")); in ssl_parse_client_dh_public()
3451 MBEDTLS_SSL_DEBUG_MSG(1, ("got no local certificate")); in ssl_decrypt_encrypted_pms()
3462 MBEDTLS_SSL_DEBUG_MSG(2, ("resuming decryption operation")); in ssl_decrypt_encrypted_pms()
3472 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange message")); in ssl_decrypt_encrypted_pms()
3477 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange message")); in ssl_decrypt_encrypted_pms()
3482 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange message")); in ssl_decrypt_encrypted_pms()
3515 MBEDTLS_SSL_DEBUG_MSG(1, ("got no RSA private key")); in ssl_decrypt_encrypted_pms()
3588 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange message")); in ssl_parse_encrypted_pms()
3594 MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen")); in ssl_parse_encrypted_pms()
3617 MBEDTLS_SSL_DEBUG_MSG(1, ("got no pre-shared key")); in ssl_parse_client_psk_identity()
3625 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange message")); in ssl_parse_client_psk_identity()
3633 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange message")); in ssl_parse_client_psk_identity()
3672 MBEDTLS_SSL_DEBUG_MSG(2, ("=> parse client key exchange")); in ssl_parse_client_key_exchange()
3683 MBEDTLS_SSL_DEBUG_MSG(3, ("will resume decryption of previously-read record")); in ssl_parse_client_key_exchange()
3695 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange message")); in ssl_parse_client_key_exchange()
3700 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange message")); in ssl_parse_client_key_exchange()
3712 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange")); in ssl_parse_client_key_exchange()
3742 MBEDTLS_SSL_DEBUG_MSG(3, ("Read the peer's public key.")); in ssl_parse_client_key_exchange()
3748 MBEDTLS_SSL_DEBUG_MSG(1, ("Invalid buffer length: %" MBEDTLS_PRINTF_SIZET, in ssl_parse_client_key_exchange()
3754 MBEDTLS_SSL_DEBUG_MSG(1, ("Invalid data length: %" MBEDTLS_PRINTF_SIZET in ssl_parse_client_key_exchange()
3762 MBEDTLS_SSL_DEBUG_MSG(1, ("Invalid public key length: %" MBEDTLS_PRINTF_SIZET in ssl_parse_client_key_exchange()
3832 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange")); in ssl_parse_client_key_exchange()
3853 MBEDTLS_SSL_DEBUG_MSG(3, ("PSK identity already parsed")); in ssl_parse_client_key_exchange()
3891 MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange")); in ssl_parse_client_key_exchange()
4068 MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen")); in ssl_parse_client_key_exchange()
4079 MBEDTLS_SSL_DEBUG_MSG(2, ("<= parse client key exchange")); in ssl_parse_client_key_exchange()
4091 MBEDTLS_SSL_DEBUG_MSG(2, ("=> parse certificate verify")); in ssl_parse_certificate_verify()
4094 MBEDTLS_SSL_DEBUG_MSG(2, ("<= skip parse certificate verify")); in ssl_parse_certificate_verify()
4099 MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen")); in ssl_parse_certificate_verify()
4117 MBEDTLS_SSL_DEBUG_MSG(2, ("=> parse certificate verify")); in ssl_parse_certificate_verify()
4120 MBEDTLS_SSL_DEBUG_MSG(2, ("<= skip parse certificate verify")); in ssl_parse_certificate_verify()
4127 MBEDTLS_SSL_DEBUG_MSG(2, ("<= skip parse certificate verify")); in ssl_parse_certificate_verify()
4133 MBEDTLS_SSL_DEBUG_MSG(2, ("<= skip parse certificate verify")); in ssl_parse_certificate_verify()
4151 MBEDTLS_SSL_DEBUG_MSG(1, ("bad certificate verify message")); in ssl_parse_certificate_verify()
4174 MBEDTLS_SSL_DEBUG_MSG(1, ("bad certificate verify message")); in ssl_parse_certificate_verify()
4184 MBEDTLS_SSL_DEBUG_MSG(1, ("peer not adhering to requested sig_alg" in ssl_parse_certificate_verify()
4205 MBEDTLS_SSL_DEBUG_MSG(1, ("peer not adhering to requested sig_alg" in ssl_parse_certificate_verify()
4214 MBEDTLS_SSL_DEBUG_MSG(1, ("sig_alg doesn't match cert key")); in ssl_parse_certificate_verify()
4221 MBEDTLS_SSL_DEBUG_MSG(1, ("bad certificate verify message")); in ssl_parse_certificate_verify()
4229 MBEDTLS_SSL_DEBUG_MSG(1, ("bad certificate verify message")); in ssl_parse_certificate_verify()
4256 MBEDTLS_SSL_DEBUG_MSG(2, ("<= parse certificate verify")); in ssl_parse_certificate_verify()
4270 MBEDTLS_SSL_DEBUG_MSG(2, ("=> write new session ticket")); in ssl_write_new_session_ticket()
4313 MBEDTLS_SSL_DEBUG_MSG(2, ("<= write new session ticket")); in ssl_write_new_session_ticket()
4326 MBEDTLS_SSL_DEBUG_MSG(2, ("server state: %d", ssl->state)); in mbedtls_ssl_handshake_server_step()
4418 MBEDTLS_SSL_DEBUG_MSG(2, ("handshake: done")); in mbedtls_ssl_handshake_server_step()
4427 MBEDTLS_SSL_DEBUG_MSG(1, ("invalid state %d", ssl->state)); in mbedtls_ssl_handshake_server_step()