Lines Matching refs:MBEDTLS_SSL_DEBUG_MSG

98     MBEDTLS_SSL_DEBUG_MSG( 3, ( "parse ServerName extension" ) );  in ssl_parse_servername_ext()
103 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_servername_ext()
113 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_servername_ext()
137 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_servername_ext()
160 MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-matching renegotiation info" ) ); in ssl_parse_renegotiation_info()
173 MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-zero length renegotiation info" ) ); in ssl_parse_renegotiation_info()
203 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_signature_algorithms_ext()
223 MBEDTLS_SSL_DEBUG_MSG( 3, ( "no signature_algorithm in common" ) ); in ssl_parse_signature_algorithms_ext()
227 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, signature_algorithm ext: %d", in ssl_parse_signature_algorithms_ext()
249 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_supported_elliptic_curves()
256 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_supported_elliptic_curves()
299 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_supported_point_formats()
315 MBEDTLS_SSL_DEBUG_MSG( 4, ( "point format selected: %d", p[0] ) ); in ssl_parse_supported_point_formats()
337 MBEDTLS_SSL_DEBUG_MSG( 3, ( "skip ecjpake kkpp extension" ) ); in ssl_parse_ecjpake_kkpp()
362 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_max_fragment_length_ext()
379 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_truncated_hmac_ext()
399 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_encrypt_then_mac_ext()
422 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_extended_ms_ext()
457 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket length: %d", len ) ); in ssl_parse_session_ticket_ext()
465 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket rejected: renegotiating" ) ); in ssl_parse_session_ticket_ext()
479 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket is not authentic" ) ); in ssl_parse_session_ticket_ext()
481 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket is expired" ) ); in ssl_parse_session_ticket_ext()
501 MBEDTLS_SSL_DEBUG_MSG( 3, ( "session successfully restored from ticket" ) ); in ssl_parse_session_ticket_ext()
623 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite requires certificate" ) ); in ssl_pick_cert()
627 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server has no certificate" ) ); in ssl_pick_cert()
638 MBEDTLS_SSL_DEBUG_MSG( 3, ( "certificate mismatch: key type" ) ); in ssl_pick_cert()
653 MBEDTLS_SSL_DEBUG_MSG( 3, ( "certificate mismatch: " in ssl_pick_cert()
662 MBEDTLS_SSL_DEBUG_MSG( 3, ( "certificate mismatch: elliptic curve" ) ); in ssl_pick_cert()
678 MBEDTLS_SSL_DEBUG_MSG( 3, ( "certificate not preferred: " in ssl_pick_cert()
716 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); in ssl_ciphersuite_match()
720 MBEDTLS_SSL_DEBUG_MSG( 3, ( "trying ciphersuite: %s", suite_info->name ) ); in ssl_ciphersuite_match()
725 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: version" ) ); in ssl_ciphersuite_match()
739 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: rc4" ) ); in ssl_ciphersuite_match()
748 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: ecjpake " in ssl_ciphersuite_match()
760 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: " in ssl_ciphersuite_match()
774 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: no pre-shared key" ) ); in ssl_ciphersuite_match()
789 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: " in ssl_ciphersuite_match()
810 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse client hello v2" ) );
815 MBEDTLS_SSL_DEBUG_MSG( 1, ( "client hello v2 illegal for renegotiation" ) );
828 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v2, message type: %d",
830 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v2, message len.: %d",
832 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v2, max. version: [%d:%d]",
848 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
856 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
866 MBEDTLS_SSL_DEBUG_MSG( 1, ( "client only supports ssl smaller than minimum"
904 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciph_len: %d, sess_len: %d, chal_len: %d",
912 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
918 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
924 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
930 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
958 MBEDTLS_SSL_DEBUG_MSG( 3, ( "received TLS_EMPTY_RENEGOTIATION_INFO " ) );
962 MBEDTLS_SSL_DEBUG_MSG( 1, ( "received RENEGOTIATION SCSV "
983 MBEDTLS_SSL_DEBUG_MSG( 3, ( "received FALLBACK_SCSV" ) );
987 MBEDTLS_SSL_DEBUG_MSG( 1, ( "inapropriate fallback" ) );
1031 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got ciphersuites in common, "
1037 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no ciphersuites in common" ) );
1042 MBEDTLS_SSL_DEBUG_MSG( 2, ( "selected ciphersuite: %s", ciphersuite_info->name ) );
1053 MBEDTLS_SSL_DEBUG_MSG( 1, ( "legacy renegotiation, breaking off handshake" ) );
1064 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse client hello v2" ) );
1088 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse client hello" ) );
1130 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, message type: %d",
1135 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1139 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, message len.: %d",
1142 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, protocol version: [%d:%d]",
1153 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1169 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1178 MBEDTLS_SSL_DEBUG_MSG( 1, ( "replayed record, discarding" ) );
1203 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1238 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1242 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, handshake type: %d", buf[0] ) );
1246 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1250 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, handshake len.: %d",
1257 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1277 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message_seq: "
1301 MBEDTLS_SSL_DEBUG_MSG( 1, ( "ClientHello fragmentation not supported" ) );
1333 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1351 MBEDTLS_SSL_DEBUG_MSG( 1, ( "client only supports ssl smaller than minimum"
1385 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1408 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1426 MBEDTLS_SSL_DEBUG_MSG( 2, ( "cookie verification failed" ) );
1431 MBEDTLS_SSL_DEBUG_MSG( 2, ( "cookie verification passed" ) );
1441 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1445 MBEDTLS_SSL_DEBUG_MSG( 2, ( "cookie verification skipped" ) );
1464 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1482 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1520 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1530 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1549 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1556 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found ServerName extension" ) );
1567 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found renegotiation extension" ) );
1580 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found signature_algorithms extension" ) );
1596 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found supported elliptic curves extension" ) );
1604 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found supported point formats extension" ) );
1616 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found ecjpake kkpp extension" ) );
1626 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found max fragment length extension" ) );
1636 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found truncated hmac extension" ) );
1646 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found encrypt then mac extension" ) );
1656 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found extended master secret extension" ) );
1666 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found session ticket extension" ) );
1676 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found alpn extension" ) );
1685 MBEDTLS_SSL_DEBUG_MSG( 3, ( "unknown extension found: %d (ignoring)",
1694 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
1708 MBEDTLS_SSL_DEBUG_MSG( 2, ( "received FALLBACK_SCSV" ) );
1712 MBEDTLS_SSL_DEBUG_MSG( 1, ( "inapropriate fallback" ) );
1732 MBEDTLS_SSL_DEBUG_MSG( 3, ( "received TLS_EMPTY_RENEGOTIATION_INFO " ) );
1736 MBEDTLS_SSL_DEBUG_MSG( 1, ( "received RENEGOTIATION SCSV during renegotiation" ) );
1755 MBEDTLS_SSL_DEBUG_MSG( 1, ( "legacy renegotiation, breaking off handshake" ) );
1763 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation_info extension missing (secure)" ) );
1770 MBEDTLS_SSL_DEBUG_MSG( 1, ( "legacy renegotiation not allowed" ) );
1777 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation_info extension present (legacy)" ) );
1825 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got ciphersuites in common, "
1832 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no ciphersuites in common" ) );
1838 MBEDTLS_SSL_DEBUG_MSG( 2, ( "selected ciphersuite: %s", ciphersuite_info->name ) );
1850 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse client hello" ) );
1868 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding truncated hmac extension" ) );
1911 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding encrypt then mac extension" ) );
1937 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding extended master secret "
1963 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding session ticket extension" ) );
1987 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, secure renegotiation extension" ) );
2028 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, max_fragment_length extension" ) );
2058 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, supported_point_formats extension" ) );
2090 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, ecjpake kkpp extension" ) );
2094 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) );
2127 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding alpn extension" ) );
2160 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write hello verify request" ) );
2179 MBEDTLS_SSL_DEBUG_MSG( 1, ( "inconsistent cookie callbacks" ) );
2210 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write hello verify request" ) );
2225 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write server hello" ) );
2231 MBEDTLS_SSL_DEBUG_MSG( 2, ( "client hello was not authenticated" ) );
2232 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write server hello" ) );
2240 MBEDTLS_SSL_DEBUG_MSG( 1, ( "no RNG provided") );
2258 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, chosen version: [%d:%d]",
2268 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, current time: %lu", t ) );
2298 MBEDTLS_SSL_DEBUG_MSG( 3, ( "session successfully restored from cache" ) );
2356 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, session id len.: %d", n ) );
2358 MBEDTLS_SSL_DEBUG_MSG( 3, ( "%s session has been resumed",
2365 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, chosen ciphersuite: %s",
2367 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, compress alg.: 0x%02X",
2423 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, total extension length: %d", ext_len ) );
2442 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write server hello" ) );
2457 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate request" ) );
2465 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate request" ) );
2470 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
2485 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate request" ) );
2503 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate request" ) );
2607 MBEDTLS_SSL_DEBUG_MSG( 1, ( "skipping CAs: buffer too short" ) );
2630 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write certificate request" ) );
2649 MBEDTLS_SSL_DEBUG_MSG( 1, ( "server key not ECDH capable" ) );
2687 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write server key exchange" ) );
2696 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write server key exchange" ) );
2709 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write server key exchange" ) );
2756 MBEDTLS_SSL_DEBUG_MSG( 1, ( "no DH parameters set" ) );
2823 MBEDTLS_SSL_DEBUG_MSG( 1, ( "no matching curve for ECDHE" ) );
2827 MBEDTLS_SSL_DEBUG_MSG( 2, ( "ECDHE curve: %s", (*curve)->name ) );
2876 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
2974 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
2986 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no private key" ) );
3032 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write server key exchange" ) );
3041 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write server hello done" ) );
3060 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write server hello done" ) );
3078 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
3087 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
3124 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no RSA private key" ) );
3138 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
3146 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
3177 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
3183 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
3219 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no pre-shared key" ) );
3228 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
3237 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
3284 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse client key exchange" ) );
3297 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
3303 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
3318 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange" ) );
3382 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange" ) );
3435 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange" ) );
3509 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
3521 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse client key exchange" ) );
3536 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate verify" ) );
3544 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate verify" ) );
3549 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
3566 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate verify" ) );
3575 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate verify" ) );
3605 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) );
3641 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) );
3652 MBEDTLS_SSL_DEBUG_MSG( 1, ( "peer not adhering to requested sig_alg"
3673 MBEDTLS_SSL_DEBUG_MSG( 1, ( "peer not adhering to requested sig_alg"
3683 MBEDTLS_SSL_DEBUG_MSG( 1, ( "sig_alg doesn't match cert key" ) );
3692 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) );
3698 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) );
3707 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) );
3724 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse certificate verify" ) );
3742 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write new session ticket" ) );
3790 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write new session ticket" ) );
3806 MBEDTLS_SSL_DEBUG_MSG( 2, ( "server state: %d", ssl->state ) );
3911 MBEDTLS_SSL_DEBUG_MSG( 2, ( "handshake: done" ) );
3920 MBEDTLS_SSL_DEBUG_MSG( 1, ( "invalid state %d", ssl->state ) );