Lines Matching refs:MBEDTLS_SSL_DEBUG_MSG
92 MBEDTLS_SSL_DEBUG_MSG( 3, ( "parse ServerName extension" ) ); in ssl_parse_servername_ext()
96 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_servername_ext()
104 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_servername_ext()
116 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_servername_ext()
142 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_servername_ext()
165 MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-matching renegotiation info" ) ); in ssl_parse_renegotiation_info()
176 MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-zero length renegotiation info" ) ); in ssl_parse_renegotiation_info()
216 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_signature_algorithms_ext()
225 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_signature_algorithms_ext()
246 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, signature_algorithm ext" in ssl_parse_signature_algorithms_ext()
255 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, signature_algorithm ext:" in ssl_parse_signature_algorithms_ext()
263 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, signature_algorithm ext:" in ssl_parse_signature_algorithms_ext()
269 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, signature_algorithm ext: " in ssl_parse_signature_algorithms_ext()
290 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_supported_elliptic_curves()
299 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_supported_elliptic_curves()
308 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_supported_elliptic_curves()
356 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_supported_point_formats()
375 MBEDTLS_SSL_DEBUG_MSG( 4, ( "point format selected: %d", p[0] ) ); in ssl_parse_supported_point_formats()
397 MBEDTLS_SSL_DEBUG_MSG( 3, ( "skip ecjpake kkpp extension" ) ); in ssl_parse_ecjpake_kkpp()
424 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_max_fragment_length_ext()
443 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_truncated_hmac_ext()
465 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_encrypt_then_mac_ext()
490 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_extended_ms_ext()
527 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket length: %d", len ) ); in ssl_parse_session_ticket_ext()
535 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket rejected: renegotiating" ) ); in ssl_parse_session_ticket_ext()
549 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket is not authentic" ) ); in ssl_parse_session_ticket_ext()
551 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket is expired" ) ); in ssl_parse_session_ticket_ext()
571 MBEDTLS_SSL_DEBUG_MSG( 3, ( "session successfully restored from ticket" ) ); in ssl_parse_session_ticket_ext()
718 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite requires certificate" ) ); in ssl_pick_cert()
722 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server has no certificate" ) ); in ssl_pick_cert()
733 MBEDTLS_SSL_DEBUG_MSG( 3, ( "certificate mismatch: key type" ) ); in ssl_pick_cert()
748 MBEDTLS_SSL_DEBUG_MSG( 3, ( "certificate mismatch: " in ssl_pick_cert()
757 MBEDTLS_SSL_DEBUG_MSG( 3, ( "certificate mismatch: elliptic curve" ) ); in ssl_pick_cert()
773 MBEDTLS_SSL_DEBUG_MSG( 3, ( "certificate not preferred: " in ssl_pick_cert()
816 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); in ssl_ciphersuite_match()
820 MBEDTLS_SSL_DEBUG_MSG( 3, ( "trying ciphersuite: %s", suite_info->name ) ); in ssl_ciphersuite_match()
825 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: version" ) ); in ssl_ciphersuite_match()
839 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: rc4" ) ); in ssl_ciphersuite_match()
848 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: ecjpake " in ssl_ciphersuite_match()
860 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: " in ssl_ciphersuite_match()
874 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: no pre-shared key" ) ); in ssl_ciphersuite_match()
889 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: no suitable hash algorithm " in ssl_ciphersuite_match()
908 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite mismatch: " in ssl_ciphersuite_match()
929 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse client hello v2" ) ); in ssl_parse_client_hello_v2()
934 MBEDTLS_SSL_DEBUG_MSG( 1, ( "client hello v2 illegal for renegotiation" ) ); in ssl_parse_client_hello_v2()
945 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v2, message type: %d", in ssl_parse_client_hello_v2()
947 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v2, message len.: %d", in ssl_parse_client_hello_v2()
949 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v2, max. version: [%d:%d]", in ssl_parse_client_hello_v2()
965 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello_v2()
973 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello_v2()
983 MBEDTLS_SSL_DEBUG_MSG( 1, ( "client only supports ssl smaller than minimum" in ssl_parse_client_hello_v2()
1021 MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciph_len: %d, sess_len: %d, chal_len: %d", in ssl_parse_client_hello_v2()
1029 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello_v2()
1035 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello_v2()
1041 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello_v2()
1047 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello_v2()
1075 MBEDTLS_SSL_DEBUG_MSG( 3, ( "received TLS_EMPTY_RENEGOTIATION_INFO " ) ); in ssl_parse_client_hello_v2()
1079 MBEDTLS_SSL_DEBUG_MSG( 1, ( "received RENEGOTIATION SCSV " in ssl_parse_client_hello_v2()
1099 MBEDTLS_SSL_DEBUG_MSG( 3, ( "received FALLBACK_SCSV" ) ); in ssl_parse_client_hello_v2()
1103 MBEDTLS_SSL_DEBUG_MSG( 1, ( "inapropriate fallback" ) ); in ssl_parse_client_hello_v2()
1144 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got ciphersuites in common, " in ssl_parse_client_hello_v2()
1150 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no ciphersuites in common" ) ); in ssl_parse_client_hello_v2()
1155 MBEDTLS_SSL_DEBUG_MSG( 2, ( "selected ciphersuite: %s", ciphersuite_info->name ) ); in ssl_parse_client_hello_v2()
1166 MBEDTLS_SSL_DEBUG_MSG( 1, ( "legacy renegotiation, breaking off handshake" ) ); in ssl_parse_client_hello_v2()
1175 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse client hello v2" ) ); in ssl_parse_client_hello_v2()
1211 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse client hello" ) ); in ssl_parse_client_hello()
1254 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, message type: %d", in ssl_parse_client_hello()
1259 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1263 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, message len.: %d", in ssl_parse_client_hello()
1266 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, protocol version: [%d:%d]", in ssl_parse_client_hello()
1277 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1293 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1302 MBEDTLS_SSL_DEBUG_MSG( 1, ( "replayed record, discarding" ) ); in ssl_parse_client_hello()
1327 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1363 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1367 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, handshake type: %d", buf[0] ) ); in ssl_parse_client_hello()
1371 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1375 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, handshake len.: %d", in ssl_parse_client_hello()
1382 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1402 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message_seq: " in ssl_parse_client_hello()
1426 MBEDTLS_SSL_DEBUG_MSG( 1, ( "ClientHello fragmentation not supported" ) ); in ssl_parse_client_hello()
1458 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1476 MBEDTLS_SSL_DEBUG_MSG( 1, ( "client only supports ssl smaller than minimum" in ssl_parse_client_hello()
1508 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1533 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1553 MBEDTLS_SSL_DEBUG_MSG( 2, ( "cookie verification failed" ) ); in ssl_parse_client_hello()
1558 MBEDTLS_SSL_DEBUG_MSG( 2, ( "cookie verification passed" ) ); in ssl_parse_client_hello()
1569 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1573 MBEDTLS_SSL_DEBUG_MSG( 2, ( "cookie verification skipped" ) ); in ssl_parse_client_hello()
1592 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1612 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1652 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1664 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1681 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1691 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1700 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found ServerName extension" ) ); in ssl_parse_client_hello()
1711 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found renegotiation extension" ) ); in ssl_parse_client_hello()
1724 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found signature_algorithms extension" ) ); in ssl_parse_client_hello()
1738 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found supported elliptic curves extension" ) ); in ssl_parse_client_hello()
1746 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found supported point formats extension" ) ); in ssl_parse_client_hello()
1758 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found ecjpake kkpp extension" ) ); in ssl_parse_client_hello()
1768 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found max fragment length extension" ) ); in ssl_parse_client_hello()
1778 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found truncated hmac extension" ) ); in ssl_parse_client_hello()
1788 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found encrypt then mac extension" ) ); in ssl_parse_client_hello()
1798 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found extended master secret extension" ) ); in ssl_parse_client_hello()
1808 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found session ticket extension" ) ); in ssl_parse_client_hello()
1818 MBEDTLS_SSL_DEBUG_MSG( 3, ( "found alpn extension" ) ); in ssl_parse_client_hello()
1827 MBEDTLS_SSL_DEBUG_MSG( 3, ( "unknown extension found: %d (ignoring)", in ssl_parse_client_hello()
1836 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); in ssl_parse_client_hello()
1852 MBEDTLS_SSL_DEBUG_MSG( 2, ( "received FALLBACK_SCSV" ) ); in ssl_parse_client_hello()
1856 MBEDTLS_SSL_DEBUG_MSG( 1, ( "inapropriate fallback" ) ); in ssl_parse_client_hello()
1896 MBEDTLS_SSL_DEBUG_MSG( 3, ( "received TLS_EMPTY_RENEGOTIATION_INFO " ) ); in ssl_parse_client_hello()
1900 MBEDTLS_SSL_DEBUG_MSG( 1, ( "received RENEGOTIATION SCSV " in ssl_parse_client_hello()
1918 MBEDTLS_SSL_DEBUG_MSG( 1, ( "legacy renegotiation, breaking off handshake" ) ); in ssl_parse_client_hello()
1926 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation_info extension missing (secure)" ) ); in ssl_parse_client_hello()
1933 MBEDTLS_SSL_DEBUG_MSG( 1, ( "legacy renegotiation not allowed" ) ); in ssl_parse_client_hello()
1940 MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation_info extension present (legacy)" ) ); in ssl_parse_client_hello()
1984 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got ciphersuites in common, " in ssl_parse_client_hello()
1992 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no ciphersuites in common" ) ); in ssl_parse_client_hello()
1999 MBEDTLS_SSL_DEBUG_MSG( 2, ( "selected ciphersuite: %s", ciphersuite_info->name ) ); in ssl_parse_client_hello()
2022 MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, signature_algorithm ext: %d", in ssl_parse_client_hello()
2027 MBEDTLS_SSL_DEBUG_MSG( 3, ( "no hash algorithm for signature algorithm " in ssl_parse_client_hello()
2033 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse client hello" ) ); in ssl_parse_client_hello()
2051 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding truncated hmac extension" ) ); in ssl_write_truncated_hmac_ext()
2094 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding encrypt then mac extension" ) ); in ssl_write_encrypt_then_mac_ext()
2120 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding extended master secret " in ssl_write_extended_ms_ext()
2146 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding session ticket extension" ) ); in ssl_write_session_ticket_ext()
2170 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, secure renegotiation extension" ) ); in ssl_write_renegotiation_ext()
2211 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, max_fragment_length extension" ) ); in ssl_write_max_fragment_length_ext()
2241 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, supported_point_formats extension" ) ); in ssl_write_supported_point_formats_ext()
2273 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, ecjpake kkpp extension" ) ); in ssl_write_ecjpake_kkpp_ext()
2277 MBEDTLS_SSL_DEBUG_MSG( 1, ( "buffer too small" ) ); in ssl_write_ecjpake_kkpp_ext()
2310 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding alpn extension" ) ); in ssl_write_alpn_ext()
2343 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write hello verify request" ) ); in ssl_write_hello_verify_request()
2362 MBEDTLS_SSL_DEBUG_MSG( 1, ( "inconsistent cookie callbacks" ) ); in ssl_write_hello_verify_request()
2402 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write hello verify request" ) ); in ssl_write_hello_verify_request()
2417 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write server hello" ) ); in ssl_write_server_hello()
2423 MBEDTLS_SSL_DEBUG_MSG( 2, ( "client hello was not authenticated" ) ); in ssl_write_server_hello()
2424 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write server hello" ) ); in ssl_write_server_hello()
2432 MBEDTLS_SSL_DEBUG_MSG( 1, ( "no RNG provided") ); in ssl_write_server_hello()
2450 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, chosen version: [%d:%d]", in ssl_write_server_hello()
2460 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, current time: %lu", t ) ); in ssl_write_server_hello()
2490 MBEDTLS_SSL_DEBUG_MSG( 3, ( "session successfully restored from cache" ) ); in ssl_write_server_hello()
2548 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, session id len.: %d", n ) ); in ssl_write_server_hello()
2550 MBEDTLS_SSL_DEBUG_MSG( 3, ( "%s session has been resumed", in ssl_write_server_hello()
2557 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, chosen ciphersuite: %s", in ssl_write_server_hello()
2559 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, compress alg.: 0x%02X", in ssl_write_server_hello()
2619 MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, total extension length: %d", ext_len ) ); in ssl_write_server_hello()
2638 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write server hello" ) ); in ssl_write_server_hello()
2654 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate request" ) ); in ssl_write_certificate_request()
2662 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate request" ) ); in ssl_write_certificate_request()
2667 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); in ssl_write_certificate_request()
2683 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate request" ) ); in ssl_write_certificate_request()
2701 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate request" ) ); in ssl_write_certificate_request()
2809 MBEDTLS_SSL_DEBUG_MSG( 1, ( "skipping CAs: buffer too short" ) ); in ssl_write_certificate_request()
2833 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write certificate request" ) ); in ssl_write_certificate_request()
2852 MBEDTLS_SSL_DEBUG_MSG( 1, ( "server key not ECDH capable" ) ); in ssl_get_ecdh_params_from_cert()
2973 MBEDTLS_SSL_DEBUG_MSG( 1, ( "no DH parameters set" ) ); in ssl_prepare_server_key_exchange()
3045 MBEDTLS_SSL_DEBUG_MSG( 1, ( "no matching curve for ECDHE" ) ); in ssl_prepare_server_key_exchange()
3049 MBEDTLS_SSL_DEBUG_MSG( 2, ( "ECDHE curve: %s", (*curve)->name ) ); in ssl_prepare_server_key_exchange()
3115 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); in ssl_prepare_server_key_exchange()
3138 MBEDTLS_SSL_DEBUG_MSG( 3, ( "pick hash algorithm %d for signing", md_alg ) ); in ssl_prepare_server_key_exchange()
3172 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); in ssl_prepare_server_key_exchange()
3233 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no private key" ) ); in ssl_prepare_server_key_exchange()
3271 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write server key exchange" ) ); in ssl_write_server_key_exchange()
3289 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write server key exchange" ) ); in ssl_write_server_key_exchange()
3301 MBEDTLS_SSL_DEBUG_MSG( 2, ( "resuming signature operation" ) ); in ssl_write_server_key_exchange()
3319 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write server key exchange (pending)" ) ); in ssl_write_server_key_exchange()
3355 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write server key exchange" ) ); in ssl_write_server_key_exchange()
3363 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write server hello done" ) ); in ssl_write_server_hello_done()
3391 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write server hello done" ) ); in ssl_write_server_hello_done()
3409 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); in ssl_parse_client_dh_public()
3418 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); in ssl_parse_client_dh_public()
3475 MBEDTLS_SSL_DEBUG_MSG( 2, ( "resuming decryption operation" ) ); in ssl_decrypt_encrypted_pms()
3489 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); in ssl_decrypt_encrypted_pms()
3495 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); in ssl_decrypt_encrypted_pms()
3503 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); in ssl_decrypt_encrypted_pms()
3539 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no RSA private key" ) ); in ssl_decrypt_encrypted_pms()
3624 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); in ssl_parse_encrypted_pms()
3630 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); in ssl_parse_encrypted_pms()
3656 MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no pre-shared key" ) ); in ssl_parse_client_psk_identity()
3665 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); in ssl_parse_client_psk_identity()
3674 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); in ssl_parse_client_psk_identity()
3716 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse client key exchange" ) ); in ssl_parse_client_key_exchange()
3728 MBEDTLS_SSL_DEBUG_MSG( 3, ( "will resume decryption of previously-read record" ) ); in ssl_parse_client_key_exchange()
3743 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); in ssl_parse_client_key_exchange()
3749 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); in ssl_parse_client_key_exchange()
3764 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange" ) ); in ssl_parse_client_key_exchange()
3830 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange" ) ); in ssl_parse_client_key_exchange()
3852 MBEDTLS_SSL_DEBUG_MSG( 3, ( "PSK identity already parsed" ) ); in ssl_parse_client_key_exchange()
3896 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange" ) ); in ssl_parse_client_key_exchange()
3971 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); in ssl_parse_client_key_exchange()
3983 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse client key exchange" ) ); in ssl_parse_client_key_exchange()
3999 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate verify" ) ); in ssl_parse_certificate_verify()
4007 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate verify" ) ); in ssl_parse_certificate_verify()
4012 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); in ssl_parse_certificate_verify()
4030 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate verify" ) ); in ssl_parse_certificate_verify()
4039 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate verify" ) ); in ssl_parse_certificate_verify()
4058 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) ); in ssl_parse_certificate_verify()
4094 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) ); in ssl_parse_certificate_verify()
4105 MBEDTLS_SSL_DEBUG_MSG( 1, ( "peer not adhering to requested sig_alg" in ssl_parse_certificate_verify()
4126 MBEDTLS_SSL_DEBUG_MSG( 1, ( "peer not adhering to requested sig_alg" in ssl_parse_certificate_verify()
4136 MBEDTLS_SSL_DEBUG_MSG( 1, ( "sig_alg doesn't match cert key" ) ); in ssl_parse_certificate_verify()
4145 MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); in ssl_parse_certificate_verify()
4151 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) ); in ssl_parse_certificate_verify()
4160 MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) ); in ssl_parse_certificate_verify()
4177 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse certificate verify" ) ); in ssl_parse_certificate_verify()
4195 MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write new session ticket" ) ); in ssl_write_new_session_ticket()
4243 MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write new session ticket" ) ); in ssl_write_new_session_ticket()
4259 MBEDTLS_SSL_DEBUG_MSG( 2, ( "server state: %d", ssl->state ) ); in mbedtls_ssl_handshake_server_step()
4364 MBEDTLS_SSL_DEBUG_MSG( 2, ( "handshake: done" ) ); in mbedtls_ssl_handshake_server_step()
4373 MBEDTLS_SSL_DEBUG_MSG( 1, ( "invalid state %d", ssl->state ) ); in mbedtls_ssl_handshake_server_step()