Lines Matching refs:dtls_alert
1019 dtls_alert("expected 65 bytes long public point\n"); in check_client_keyexchange()
1025 dtls_alert("expected uncompressed public point\n"); in check_client_keyexchange()
1190 dtls_alert("The sendbuf (%zu bytes) is too small\n", *rlen); in dtls_prepare_record()
1619 dtls_alert("only sha256 is supported in certificate verify\n"); in dtls_check_ecdsa_signature_elem()
1626 dtls_alert("only ecdsa signature is supported in client verify\n"); in dtls_check_ecdsa_signature_elem()
1633 dtls_alert("signature length wrong\n"); in dtls_check_ecdsa_signature_elem()
1640 dtls_alert("wrong ASN.1 struct, expected SEQUENCE\n"); in dtls_check_ecdsa_signature_elem()
1647 dtls_alert("signature length wrong\n"); in dtls_check_ecdsa_signature_elem()
1654 dtls_alert("wrong ASN.1 struct, expected Integer\n"); in dtls_check_ecdsa_signature_elem()
1671 dtls_alert("wrong ASN.1 struct, expected Integer\n"); in dtls_check_ecdsa_signature_elem()
1707 dtls_alert("the packet length does not match the expected\n"); in check_client_certificate_verify()
1728 dtls_alert("wrong signature err: %i\n", ret); in check_client_certificate_verify()
2488 dtls_alert("unknown DTLS version\n"); in check_server_hello()
2508 dtls_alert("unsupported cipher 0x%02x 0x%02x\n", in check_server_hello()
2517 dtls_alert("unsupported compression method 0x%02x\n", data[0]); in check_server_hello()
2566 dtls_alert("expect length of 94 bytes for server certificate message\n"); in check_server_certificate()
2572 dtls_alert("expect length of 91 bytes for certificate\n"); in check_server_certificate()
2578 dtls_alert("got an unexpected Subject public key format\n"); in check_server_certificate()
2621 dtls_alert("the packet length does not match the expected\n"); in check_server_key_exchange_ecdsa()
2627 dtls_alert("Only named curves supported\n"); in check_server_key_exchange_ecdsa()
2634 dtls_alert("secp256r1 supported\n"); in check_server_key_exchange_ecdsa()
2641 dtls_alert("expected 65 bytes long public point\n"); in check_server_key_exchange_ecdsa()
2648 dtls_alert("expected uncompressed public point\n"); in check_server_key_exchange_ecdsa()
2678 dtls_alert("wrong signature\n"); in check_server_key_exchange_ecdsa()
2701 dtls_alert("the packet length does not match the expected\n"); in check_server_key_exchange_psk()
2742 dtls_alert("the packet length does not match the expected\n"); in check_certificate_request()
2749 dtls_alert("the cerfificate types are too long\n"); in check_certificate_request()
2762 dtls_alert("the request authentication algorithm is not supproted\n"); in check_certificate_request()
2769 dtls_alert("the signature and hash algorithm list is too long\n"); in check_certificate_request()
2793 dtls_alert("no supported hash and signature algorithem\n"); in check_certificate_request()
2888 dtls_alert("No security context for epoch: %i\n", dtls_get_epoch(header)); in decrypt_verify()
3250 dtls_alert("cannot create peer\n"); in handle_handshake_msg()
3517 dtls_alert("%d invalidate peer\n", data[1]); in handle_alert()
3795 dtls_alert("cannot create DTLS context\n"); in dtls_new_context()