Home
last modified time | relevance | path

Searched refs:tlsv1_server_log (Results 1 – 4 of 4) sorted by relevance

/external/wpa_supplicant_8/src/tls/
Dtlsv1_server_read.c132 tlsv1_server_log(conn, "Expected Handshake; received content type 0x%x", in tls_process_client_hello()
147 tlsv1_server_log(conn, "Received unexpected handshake message %d (expected ClientHello)", in tls_process_client_hello()
153 tlsv1_server_log(conn, "Received ClientHello"); in tls_process_client_hello()
172 tlsv1_server_log(conn, "Client version %d.%d", in tls_process_client_hello()
176 tlsv1_server_log(conn, "Unexpected protocol version in ClientHello %u.%u", in tls_process_client_hello()
195 tlsv1_server_log(conn, "Using TLS v%s", in tls_process_client_hello()
245 tlsv1_server_log(conn, "No supported cipher suite available"); in tls_process_client_hello()
275 tlsv1_server_log(conn, "Client does not accept NULL compression"); in tls_process_client_hello()
282 tlsv1_server_log(conn, "Unexpected extra octet in the end of ClientHello: 0x%02x", in tls_process_client_hello()
292 tlsv1_server_log(conn, "%u bytes of ClientHello extensions", in tls_process_client_hello()
[all …]
Dtlsv1_server.c24 void tlsv1_server_log(struct tlsv1_server *conn, const char *fmt, ...) in tlsv1_server_log() function
278 tlsv1_server_log(conn, "Record layer processing failed"); in tlsv1_server_decrypt()
292 tlsv1_server_log(conn, "Alert underflow"); in tlsv1_server_decrypt()
297 tlsv1_server_log(conn, "Received alert %d:%d", in tlsv1_server_decrypt()
311 tlsv1_server_log(conn, "Unexpected content type 0x%x", in tlsv1_server_decrypt()
323 tlsv1_server_log(conn, "TEST-FAILURE: Client ApplData received after invalid handshake"); in tlsv1_server_decrypt()
801 tlsv1_server_log(conn, "TESTING: Use short 511-bit prime with DHE"); in tlsv1_server_get_dh_p()
805 tlsv1_server_log(conn, "TESTING: Use short 767-bit prime with DHE"); in tlsv1_server_get_dh_p()
809 tlsv1_server_log(conn, "TESTING: Use bogus 15 \"prime\" with DHE"); in tlsv1_server_get_dh_p()
813 tlsv1_server_log(conn, "TESTING: Use short 58-bit prime in long container with DHE"); in tlsv1_server_get_dh_p()
[all …]
Dtlsv1_server_write.c51 tlsv1_server_log(conn, "Send ServerHello"); in tls_write_server_hello()
133 tlsv1_server_log(conn, "SessionTicket callback indicated failure"); in tls_write_server_hello()
208 tlsv1_server_log(conn, "Send Certificate"); in tls_write_server_certificate()
303 tlsv1_server_log(conn, "Send CertificateStatus (multi=%d)", ocsp_multi); in tls_write_server_certificate_status()
480 tlsv1_server_log(conn, "Send ServerKeyExchange"); in tls_write_server_key_exchange()
633 tlsv1_server_log(conn, "TESTING: Break ServerKeyExchange signed params hash"); in tls_write_server_key_exchange()
664 tlsv1_server_log(conn, "TESTING: Break ServerKeyExchange signed params signature"); in tls_write_server_key_exchange()
705 tlsv1_server_log(conn, "Send CertificateRequest"); in tls_write_server_certificate_request()
765 tlsv1_server_log(conn, "Send ServerHelloDone"); in tls_write_server_hello_done()
801 tlsv1_server_log(conn, "Send ChangeCipherSpec"); in tls_write_server_change_cipher_spec()
[all …]
Dtlsv1_server_i.h72 void tlsv1_server_log(struct tlsv1_server *conn, const char *fmt, ...)