Searched refs:dtls_debug (Results 1 – 6 of 6) sorted by relevance
535 dtls_debug("key_block (%d bytes):\n", dtls_kb_size(config, peer->role)); in dtls_debug_keyblock()1013 dtls_debug("The client key exchange is too short\n"); in check_client_keyexchange()1044 dtls_debug("The client key exchange is too short\n"); in check_client_keyexchange()1053 dtls_debug("The identity has a wrong length\n"); in check_client_keyexchange()1089 dtls_debug("clear MAC\n"); in clear_hs_hash()1204 dtls_debug("dtls_prepare_record: send buffer too small\n"); in dtls_prepare_record()1222 dtls_debug("dtls_prepare_record(): encrypt using TLS_PSK_WITH_AES_128_CCM_8\n"); in dtls_prepare_record()1224 dtls_debug("dtls_prepare_record(): encrypt using TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8\n"); in dtls_prepare_record()1226 dtls_debug("dtls_prepare_record(): encrypt using unknown cipher\n"); in dtls_prepare_record()1276 dtls_debug("dtls_prepare_record: send buffer too small\n"); in dtls_prepare_record()[all …]
139 #define dtls_debug(...) dsrv_log(DTLS_LOG_DEBUG, __VA_ARGS__) macro
137 dtls_debug("DTLSv12: initialize HASH_SHA256\n"); in dtls_handshake_new()
176 dtls_debug("got %d bytes from port %d\n", len, in dtls_handle_read()
114 dtls_debug("got psk_identity_hint: '%.*s'\n", id_len, id); in get_psk_info()
537 dtls_debug("got psk_identity_hint: '%.*s'\n", id_len, in get_psk_info()