Lines Matching refs:MBEDTLS_SSL_DEBUG_MSG

71     MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding server name extension: %s",  in ssl_write_hostname_ext()
78 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) ); in ssl_write_hostname_ext()
132 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding renegotiation extension" ) ); in ssl_write_renegotiation_ext()
136 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) ); in ssl_write_renegotiation_ext()
178 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding signature_algorithms extension" ) ); in ssl_write_signature_algorithms_ext()
192 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) ); in ssl_write_signature_algorithms_ext()
263 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding supported_elliptic_curves extension" ) );
275 MBEDTLS_SSL_DEBUG_MSG( 1, ( "invalid curve in ssl configuration" ) );
284 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
326 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding supported_point_formats extension" ) );
330 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
364 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding ecjpake_kkpp extension" ) );
368 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
383 MBEDTLS_SSL_DEBUG_MSG( 3, ( "generating new ecjpake parameters" ) );
397 MBEDTLS_SSL_DEBUG_MSG( 1, ( "allocation failed" ) );
406 MBEDTLS_SSL_DEBUG_MSG( 3, ( "re-using cached ecjpake parameters" ) );
412 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
440 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding max_fragment_length extension" ) );
444 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
474 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding truncated_hmac extension" ) );
478 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
507 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding encrypt_then_mac "
512 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
541 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding extended_master_secret "
546 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
575 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding session ticket extension" ) );
579 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
596 MBEDTLS_SSL_DEBUG_MSG( 3, ( "sending session ticket of length %d", tlen ) );
620 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, adding alpn extension" ) );
627 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
693 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, current time: %lu", t ) );
717 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write client hello" ) );
721 MBEDTLS_SSL_DEBUG_MSG( 1, ( "no RNG provided") );
735 MBEDTLS_SSL_DEBUG_MSG( 1, ( "configured max major version is invalid, "
754 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, max version: [%d:%d]",
817 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, session id len.: %d", n ) );
828 MBEDTLS_SSL_DEBUG_MSG( 3, ( "no verify cookie to send" ) );
884 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, add ciphersuite: %04x",
908 MBEDTLS_SSL_DEBUG_MSG( 3, ( "adding FALLBACK_SCSV" ) );
918 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, got %d ciphersuites", n ) );
939 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, compress len.: %d", 2 ) );
940 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, compress alg.: %d %d",
949 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, compress len.: %d", 1 ) );
950 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, compress alg.: %d",
1022 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello, total extension length: %d",
1049 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write client hello" ) );
1071 MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-matching renegotiation info" ) );
1084 MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-zero length renegotiation info" ) );
1208 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1224 MBEDTLS_SSL_DEBUG_MSG( 4, ( "point format selected: %d", p[0] ) );
1232 MBEDTLS_SSL_DEBUG_MSG( 1, ( "no point format in common" ) );
1248 MBEDTLS_SSL_DEBUG_MSG( 3, ( "skip ecjpake kkpp extension" ) );
1326 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse hello verify request" ) );
1347 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server version" ) );
1360 MBEDTLS_SSL_DEBUG_MSG( 1,
1372 MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc failed (%d bytes)", cookie_len ) );
1385 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse hello verify request" ) );
1410 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server hello" ) );
1430 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation requested, "
1435 MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-handshake message during renego" ) );
1440 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1449 MBEDTLS_SSL_DEBUG_MSG( 2, ( "received hello verify request" ) );
1450 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello" ) );
1466 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1492 MBEDTLS_SSL_DEBUG_MSG( 1, ( "server version out of bounds - "
1509 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, current time: %lu", t ) );
1520 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1532 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1542 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1569 MBEDTLS_SSL_DEBUG_MSG( 1, ( "server hello, bad compression: %d", comp ) );
1580 MBEDTLS_SSL_DEBUG_MSG( 1, ( "ciphersuite info for %04x not found", i ) );
1586 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, session id len.: %d", n ) );
1622 MBEDTLS_SSL_DEBUG_MSG( 3, ( "%s session has been resumed",
1625 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, chosen ciphersuite: %04x", i ) );
1626 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, compress alg.: %d", buf[37 + n] ) );
1636 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1640 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, chosen ciphersuite: %s", suite_info->name ) );
1647 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1664 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1671 MBEDTLS_SSL_DEBUG_MSG( 2, ( "server hello, total extension length: %d", ext_len ) );
1682 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1689 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found renegotiation extension" ) );
1702 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found max_fragment_length extension" ) );
1715 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found truncated_hmac extension" ) );
1728 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found encrypt_then_mac extension" ) );
1741 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found extended_master_secret extension" ) );
1754 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found session_ticket extension" ) );
1768 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found supported_point_formats extension" ) );
1782 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found ecjpake_kkpp extension" ) );
1795 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found alpn extension" ) );
1804 MBEDTLS_SSL_DEBUG_MSG( 3, ( "unknown extension found: %d (ignoring)",
1813 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
1824 MBEDTLS_SSL_DEBUG_MSG( 1, ( "legacy renegotiation, breaking off handshake" ) );
1832 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation_info extension missing (secure)" ) );
1839 MBEDTLS_SSL_DEBUG_MSG( 1, ( "legacy renegotiation not allowed" ) );
1846 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation_info extension present (legacy)" ) );
1859 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello" ) );
1888 MBEDTLS_SSL_DEBUG_MSG( 1, ( "DHM prime too short: %d < %d",
1915 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
1919 MBEDTLS_SSL_DEBUG_MSG( 2, ( "ECDH curve: %s", curve_info->name ) );
1965 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message (ECDHE curve)" ) );
1994MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message (psk_identity_hint length)" ) );
2025 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small for encrypted pms" ) );
2049 MBEDTLS_SSL_DEBUG_MSG( 2, ( "certificate required" ) );
2059 MBEDTLS_SSL_DEBUG_MSG( 1, ( "certificate key type mismatch" ) );
2116 MBEDTLS_SSL_DEBUG_MSG( 1, ( "Server used unsupported "
2126 MBEDTLS_SSL_DEBUG_MSG( 1, ( "server used unsupported "
2136 MBEDTLS_SSL_DEBUG_MSG( 1, ( "server used HashAlgorithm "
2141 MBEDTLS_SSL_DEBUG_MSG( 2, ( "Server used SignatureAlgorithm %d", (*p)[1] ) );
2142 MBEDTLS_SSL_DEBUG_MSG( 2, ( "Server used HashAlgorithm %d", (*p)[0] ) );
2161 MBEDTLS_SSL_DEBUG_MSG( 2, ( "certificate required" ) );
2168 MBEDTLS_SSL_DEBUG_MSG( 1, ( "server key not ECDH capable" ) );
2183 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server certificate (ECDH curve)" ) );
2198 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) );
2203 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse server key exchange" ) );
2222 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse server key exchange" ) );
2239 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
2256 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
2272 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
2293 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
2309 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
2331 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
2358 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
2364 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
2383 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
2395 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
2480 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
2489 MBEDTLS_SSL_DEBUG_MSG( 2, ( "certificate required" ) );
2498 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) );
2516 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server key exchange" ) );
2531 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate request" ) );
2539 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate request" ) );
2544 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
2556 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate request" ) );
2564 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate request" ) );
2579 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
2592 MBEDTLS_SSL_DEBUG_MSG( 3, ( "got %s certificate request",
2632 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
2648MBEDTLS_SSL_DEBUG_MSG( 3, ( "Supported Signature Algorithm found: %d,%d", sig_alg[i], sig_alg[i + …
2656 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
2669 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
2674 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse certificate request" ) );
2689 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server hello done" ) );
2701 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello done message" ) );
2710 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello done message" ) );
2721 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello done" ) );
2732 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write client key exchange" ) );
2827 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no private key for PSK" ) );
2836 MBEDTLS_SSL_DEBUG_MSG( 1, ( "psk identity too long or "
2872 MBEDTLS_SSL_DEBUG_MSG( 1, ( "psk identity or DHM size too long"
2912 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
2961 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
2977 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write client key exchange" ) );
2993 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate verify" ) );
3007 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate verify" ) );
3012 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
3026 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate verify" ) );
3040 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate verify" ) );
3047 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate verify" ) );
3054 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no private key for certificate" ) );
3133 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
3160 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write certificate verify" ) );
3180 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse new session ticket" ) );
3190 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad new session ticket message" ) );
3207 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad new session ticket message" ) );
3220 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad new session ticket message" ) );
3224 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket length: %d", ticket_len ) );
3245 MBEDTLS_SSL_DEBUG_MSG( 1, ( "ticket alloc failed" ) );
3260 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket in use, discarding session id" ) );
3263 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse new session ticket" ) );
3279 MBEDTLS_SSL_DEBUG_MSG( 2, ( "client state: %d", ssl->state ) );
3390 MBEDTLS_SSL_DEBUG_MSG( 2, ( "handshake: done" ) );
3399 MBEDTLS_SSL_DEBUG_MSG( 1, ( "invalid state %d", ssl->state ) );