• Home
  • Raw
  • Download

Lines Matching refs:BIO_printf

324 		BIO_printf(bio_s_out,"psk_server_cb\n");  in psk_server_cb()
327 BIO_printf(bio_err,"Error: client did not send PSK identity\n"); in psk_server_cb()
331 BIO_printf(bio_s_out,"identity_len=%d identity=%s\n", in psk_server_cb()
337 BIO_printf(bio_s_out, "PSK error: client identity not found" in psk_server_cb()
343 BIO_printf(bio_s_out, "PSK client identity found\n"); in psk_server_cb()
349 BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key); in psk_server_cb()
356 BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n", in psk_server_cb()
370 BIO_printf(bio_s_out, "fetched PSK len=%d\n", psk_len); in psk_server_cb()
374 BIO_printf(bio_err, "Error in PSK server callback\n"); in psk_server_cb()
401 BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login); in ssl_srp_server_param_cb()
407 BIO_printf(bio_err, "User %s doesn't exist\n", p->login); in ssl_srp_server_param_cb()
416BIO_printf(bio_err, "SRP parameters set: username = \"%s\" info=\"%s\" \n", p->login,p->user->info… in ssl_srp_server_param_cb()
460 BIO_printf(bio_err,"usage: s_server [args ...]\n"); in sv_usage()
461 BIO_printf(bio_err,"\n"); in sv_usage()
462 BIO_printf(bio_err," -accept arg - port to accept on (default is %d)\n",PORT); in sv_usage()
463 BIO_printf(bio_err," -context arg - set session ID context\n"); in sv_usage()
464 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n"); in sv_usage()
465 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n"); in sv_usage()
466 BIO_printf(bio_err," -cert arg - certificate file to use\n"); in sv_usage()
467 BIO_printf(bio_err," (default is %s)\n",TEST_CERT); in sv_usage()
468BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n"… in sv_usage()
470BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n"… in sv_usage()
473 BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n"); in sv_usage()
474 BIO_printf(bio_err," -key arg - Private Key file to use, in cert file if\n"); in sv_usage()
475 BIO_printf(bio_err," not specified (default is %s)\n",TEST_CERT); in sv_usage()
476 BIO_printf(bio_err," -keyform arg - key format (PEM, DER or ENGINE) PEM default\n"); in sv_usage()
477 BIO_printf(bio_err," -pass arg - private key file pass phrase source\n"); in sv_usage()
478 BIO_printf(bio_err," -dcert arg - second certificate file to use (usually for DSA)\n"); in sv_usage()
479 BIO_printf(bio_err," -dcertform x - second certificate format (PEM or DER) PEM default\n"); in sv_usage()
480 BIO_printf(bio_err," -dkey arg - second private key file to use (usually for DSA)\n"); in sv_usage()
481 BIO_printf(bio_err," -dkeyform arg - second key format (PEM, DER or ENGINE) PEM default\n"); in sv_usage()
482 BIO_printf(bio_err," -dpass arg - second private key file pass phrase source\n"); in sv_usage()
483 BIO_printf(bio_err," -dhparam arg - DH parameter file to use, in cert file if not specified\n"); in sv_usage()
484 BIO_printf(bio_err," or a default set of parameters is used\n"); in sv_usage()
486 BIO_printf(bio_err," -named_curve arg - Elliptic curve name to use for ephemeral ECDH keys.\n" \ in sv_usage()
491 BIO_printf(bio_err," -nbio - Run with non-blocking IO\n"); in sv_usage()
493 BIO_printf(bio_err," -nbio_test - test with the non-blocking test bio\n"); in sv_usage()
494 BIO_printf(bio_err," -crlf - convert LF from terminal into CRLF\n"); in sv_usage()
495 BIO_printf(bio_err," -debug - Print more output\n"); in sv_usage()
496 BIO_printf(bio_err," -msg - Show protocol messages\n"); in sv_usage()
497 BIO_printf(bio_err," -state - Print the SSL states\n"); in sv_usage()
498 BIO_printf(bio_err," -CApath arg - PEM format directory of CA's\n"); in sv_usage()
499 BIO_printf(bio_err," -CAfile arg - PEM format file of CA's\n"); in sv_usage()
500 BIO_printf(bio_err," -nocert - Don't use any certificates (Anon-DH)\n"); in sv_usage()
501 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n"); in sv_usage()
502 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n"); in sv_usage()
503 BIO_printf(bio_err," -quiet - No server output\n"); in sv_usage()
504 BIO_printf(bio_err," -no_tmp_rsa - Do not generate a tmp RSA key\n"); in sv_usage()
506 BIO_printf(bio_err," -psk_hint arg - PSK identity hint to use\n"); in sv_usage()
507 BIO_printf(bio_err," -psk arg - PSK in hex (without 0x)\n"); in sv_usage()
509 BIO_printf(bio_err," -jpake arg - JPAKE secret to use\n"); in sv_usage()
513 BIO_printf(bio_err," -srpvfile file - The verifier file for SRP\n"); in sv_usage()
514 BIO_printf(bio_err," -srpuserseed string - A seed string for a default user salt.\n"); in sv_usage()
516 BIO_printf(bio_err," -ssl2 - Just talk SSLv2\n"); in sv_usage()
517 BIO_printf(bio_err," -ssl3 - Just talk SSLv3\n"); in sv_usage()
518 BIO_printf(bio_err," -tls1_2 - Just talk TLSv1.2\n"); in sv_usage()
519 BIO_printf(bio_err," -tls1_1 - Just talk TLSv1.1\n"); in sv_usage()
520 BIO_printf(bio_err," -tls1 - Just talk TLSv1\n"); in sv_usage()
521 BIO_printf(bio_err," -dtls1 - Just talk DTLSv1\n"); in sv_usage()
522 BIO_printf(bio_err," -timeout - Enable timeouts\n"); in sv_usage()
523 BIO_printf(bio_err," -mtu - Set link layer MTU\n"); in sv_usage()
524 BIO_printf(bio_err," -chain - Read a certificate chain\n"); in sv_usage()
525 BIO_printf(bio_err," -no_ssl2 - Just disable SSLv2\n"); in sv_usage()
526 BIO_printf(bio_err," -no_ssl3 - Just disable SSLv3\n"); in sv_usage()
527 BIO_printf(bio_err," -no_tls1 - Just disable TLSv1\n"); in sv_usage()
528 BIO_printf(bio_err," -no_tls1_1 - Just disable TLSv1.1\n"); in sv_usage()
529 BIO_printf(bio_err," -no_tls1_2 - Just disable TLSv1.2\n"); in sv_usage()
531 BIO_printf(bio_err," -no_dhe - Disable ephemeral DH\n"); in sv_usage()
534 BIO_printf(bio_err," -no_ecdhe - Disable ephemeral ECDH\n"); in sv_usage()
536 BIO_printf(bio_err," -bugs - Turn on SSL bug compatibility\n"); in sv_usage()
537 BIO_printf(bio_err," -www - Respond to a 'GET /' with a status page\n"); in sv_usage()
538 BIO_printf(bio_err," -WWW - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n"); in sv_usage()
539 BIO_printf(bio_err," -HTTP - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n"); in sv_usage()
540BIO_printf(bio_err," with the assumption it contains a complete HTTP response.\n"); in sv_usage()
542 BIO_printf(bio_err," -engine id - Initialise and use the specified engine\n"); in sv_usage()
544 BIO_printf(bio_err," -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg'\n"); in sv_usage()
545 BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR); in sv_usage()
547 BIO_printf(bio_err," -servername host - servername for HostName TLS extension\n"); in sv_usage()
548 BIO_printf(bio_err," -servername_fatal - on mismatch send fatal alert (default warning alert)\n"); in sv_usage()
549 BIO_printf(bio_err," -cert2 arg - certificate file to use for servername\n"); in sv_usage()
550 BIO_printf(bio_err," (default is %s)\n",TEST_CERT2); in sv_usage()
551 BIO_printf(bio_err," -key2 arg - Private Key file to use for servername, in cert file if\n"); in sv_usage()
552 BIO_printf(bio_err," not specified (default is %s)\n",TEST_CERT2); in sv_usage()
553 BIO_printf(bio_err," -tlsextdebug - hex dump of all TLS extensions received\n"); in sv_usage()
554 BIO_printf(bio_err," -no_ticket - disable use of RFC4507bis session tickets\n"); in sv_usage()
555 BIO_printf(bio_err," -legacy_renegotiation - enable use of legacy renegotiation (dangerous)\n"); in sv_usage()
557BIO_printf(bio_err," -nextprotoneg arg - set the advertised protocols for the NPN extension (comma… in sv_usage()
560BIO_printf(bio_err," -use_srtp profiles - Offer SRTP key management with a colon-separated profile… in sv_usage()
563 BIO_printf(bio_err," -keymatexport label - Export keying material using label\n"); in sv_usage()
564 BIO_printf(bio_err," -keymatexportlen len - Export len bytes of keying material (default 20)\n"); in sv_usage()
735 BIO_printf(p->biodebug,"Hostname in TLS extension: \"%s\"\n",servername); in ssl_servername_cb()
746 BIO_printf(p->biodebug,"Switching server context.\n"); in ssl_servername_cb()
798 BIO_printf(err, "cert_status: received %d ids\n", sk_OCSP_RESPID_num(ids)); in cert_status_cb()
814 BIO_printf(err, "cert_status: AIA URL: %s\n", in cert_status_cb()
1015 BIO_printf(bio_err,"verify depth is %d\n",verify_depth); in MAIN()
1023 BIO_printf(bio_err,"verify depth is %d, must return a certificate\n",verify_depth); in MAIN()
1164 BIO_printf(bio_err, "Error parsing URL\n"); in MAIN()
1203 BIO_printf(bio_err,"Not a hex number '%s'\n",*argv); in MAIN()
1346 BIO_printf(bio_err,"unknown option %s\n",*argv); in MAIN()
1365 BIO_printf(bio_err, in MAIN()
1372 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n"); in MAIN()
1389 BIO_printf(bio_err, "Error getting password\n"); in MAIN()
1488 BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n"); in MAIN()
1491 BIO_printf(bio_err,"%ld semi-random bytes loaded\n", in MAIN()
1530 BIO_printf(bio_err, in MAIN()
1533 BIO_printf(bio_err, in MAIN()
1537 BIO_printf(bio_err,"error setting 'id_prefix'\n"); in MAIN()
1541 BIO_printf(bio_err,"id_prefix '%s' set.\n", session_id_prefix); in MAIN()
1570 BIO_printf(bio_err,"You must specify a certificate file for the server to use\n"); in MAIN()
1598 BIO_printf(bio_s_out,"Setting secondary ctx parameters\n"); in MAIN()
1603 BIO_printf(bio_err, in MAIN()
1606 BIO_printf(bio_err, in MAIN()
1610 BIO_printf(bio_err,"error setting 'id_prefix'\n"); in MAIN()
1614 BIO_printf(bio_err,"id_prefix '%s' set.\n", session_id_prefix); in MAIN()
1659 BIO_printf(bio_s_out,"Setting temp DH parameters\n"); in MAIN()
1663 BIO_printf(bio_s_out,"Using default temp DH parameters\n"); in MAIN()
1677 BIO_printf(bio_s_out,"Setting temp DH parameters\n"); in MAIN()
1702 BIO_printf(bio_err, "unknown curve name (%s)\n", in MAIN()
1709 BIO_printf(bio_err, "unable to create curve (%s)\n", in MAIN()
1717 BIO_printf(bio_s_out,"Setting temp ECDH parameters\n"); in MAIN()
1721 BIO_printf(bio_s_out,"Using default temp ECDH parameters\n"); in MAIN()
1725 BIO_printf(bio_err, "unable to create curve (nistp256)\n"); in MAIN()
1767 BIO_printf(bio_s_out,"Generating temp (512 bit) RSA key..."); in MAIN()
1788 BIO_printf(bio_s_out,"\n"); in MAIN()
1801 BIO_printf(bio_s_out, "PSK key given or JPAKE in use, setting server callback\n"); in MAIN()
1807 BIO_printf(bio_err,"error setting PSK identity hint to context\n"); in MAIN()
1817 BIO_printf(bio_err,"error setting cipher list\n"); in MAIN()
1824 BIO_printf(bio_err,"error setting cipher list\n"); in MAIN()
1861 BIO_printf(bio_err, in MAIN()
1881 BIO_printf(bio_s_out,"ACCEPT\n"); in MAIN()
1929 BIO_printf(bio,"%4ld items in the session cache\n", in print_stats()
1931 BIO_printf(bio,"%4ld client connects (SSL_connect())\n", in print_stats()
1933 BIO_printf(bio,"%4ld client renegotiates (SSL_connect())\n", in print_stats()
1935 BIO_printf(bio,"%4ld client connects that finished\n", in print_stats()
1937 BIO_printf(bio,"%4ld server accepts (SSL_accept())\n", in print_stats()
1939 BIO_printf(bio,"%4ld server renegotiates (SSL_accept())\n", in print_stats()
1941 BIO_printf(bio,"%4ld server accepts that finished\n", in print_stats()
1943 BIO_printf(bio,"%4ld session cache hits\n",SSL_CTX_sess_hits(ssl_ctx)); in print_stats()
1944 BIO_printf(bio,"%4ld session cache misses\n",SSL_CTX_sess_misses(ssl_ctx)); in print_stats()
1945 BIO_printf(bio,"%4ld session cache timeouts\n",SSL_CTX_sess_timeouts(ssl_ctx)); in print_stats()
1946 BIO_printf(bio,"%4ld callback cache hits\n",SSL_CTX_sess_cb_hits(ssl_ctx)); in print_stats()
1947 BIO_printf(bio,"%4ld cache full overflows (%ld allowed)\n", in print_stats()
1973 BIO_printf(bio_err,"out of memory\n"); in sv_body()
1982 BIO_printf(bio_err,"turning on non blocking io\n"); in sv_body()
2144 BIO_printf(bio_err,"TIMEOUT occured\n"); in sv_body()
2184 BIO_printf(bio_s_out,"DONE\n"); in sv_body()
2192 BIO_printf(bio_s_out,"DONE\n"); in sv_body()
2204 BIO_printf(bio_err,"HEARTBEATING\n"); in sv_body()
2256 BIO_printf(bio_s_out,"LOOKUP renego during write\n"); in sv_body()
2259 BIO_printf(bio_s_out,"LOOKUP done %s\n",srp_callback_parm.user->info); in sv_body()
2261 BIO_printf(bio_s_out,"LOOKUP not successful\n"); in sv_body()
2272 BIO_printf(bio_s_out,"Write BLOCK\n"); in sv_body()
2276 BIO_printf(bio_s_out,"ERROR\n"); in sv_body()
2282 BIO_printf(bio_s_out,"DONE\n"); in sv_body()
2315 BIO_printf(bio_s_out,"LOOKUP renego during read\n"); in sv_body()
2318 BIO_printf(bio_s_out,"LOOKUP done %s\n",srp_callback_parm.user->info); in sv_body()
2320 BIO_printf(bio_s_out,"LOOKUP not successful\n"); in sv_body()
2336 BIO_printf(bio_s_out,"Read BLOCK\n"); in sv_body()
2340 BIO_printf(bio_s_out,"ERROR\n"); in sv_body()
2345 BIO_printf(bio_s_out,"DONE\n"); in sv_body()
2355 BIO_printf(bio_s_out,"shutting down SSL\n"); in sv_body()
2363 BIO_printf(bio_s_out,"CONNECTION CLOSED\n"); in sv_body()
2370 BIO_printf(bio_s_out,"ACCEPT\n"); in sv_body()
2376 BIO_printf(bio_err,"shutdown accept socket\n"); in close_accept_socket()
2404 BIO_printf(bio_s_out,"LOOKUP during accept %s\n",srp_callback_parm.login); in init_ssl_connection()
2407 BIO_printf(bio_s_out,"LOOKUP done %s\n",srp_callback_parm.user->info); in init_ssl_connection()
2409 BIO_printf(bio_s_out,"LOOKUP not successful\n"); in init_ssl_connection()
2417 BIO_printf(bio_s_out,"DELAY\n"); in init_ssl_connection()
2421 BIO_printf(bio_err,"ERROR\n"); in init_ssl_connection()
2425 BIO_printf(bio_err,"verify error:%s\n", in init_ssl_connection()
2438 BIO_printf(bio_s_out,"Client certificate\n"); in init_ssl_connection()
2441 BIO_printf(bio_s_out,"subject=%s\n",buf); in init_ssl_connection()
2443 BIO_printf(bio_s_out,"issuer=%s\n",buf); in init_ssl_connection()
2448 BIO_printf(bio_s_out,"Shared ciphers:%s\n",buf); in init_ssl_connection()
2450 BIO_printf(bio_s_out,"CIPHER is %s\n",(str != NULL)?str:"(NONE)"); in init_ssl_connection()
2456 BIO_printf(bio_s_out,"NEXTPROTO is "); in init_ssl_connection()
2458 BIO_printf(bio_s_out, "\n"); in init_ssl_connection()
2467 BIO_printf(bio_s_out,"SRTP Extension negotiated, profile=%s\n", in init_ssl_connection()
2471 if (SSL_cache_hit(con)) BIO_printf(bio_s_out,"Reused session-id\n"); in init_ssl_connection()
2474 BIO_printf(bio_s_out, in init_ssl_connection()
2480 BIO_printf(bio_s_out,"Kerberos peer principal is %s\n", in init_ssl_connection()
2484 BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n", in init_ssl_connection()
2488 BIO_printf(bio_s_out, "Keying material exporter:\n"); in init_ssl_connection()
2489 BIO_printf(bio_s_out, " Label: '%s'\n", keymatexportlabel); in init_ssl_connection()
2490 BIO_printf(bio_s_out, " Length: %i bytes\n", in init_ssl_connection()
2501 BIO_printf(bio_s_out, " Error\n"); in init_ssl_connection()
2505 BIO_printf(bio_s_out, " Keying material: "); in init_ssl_connection()
2507 BIO_printf(bio_s_out, "%02X", in init_ssl_connection()
2509 BIO_printf(bio_s_out, "\n"); in init_ssl_connection()
2581 BIO_printf(bio_err,"turning on non blocking io\n"); in www_body()
2646 BIO_printf(bio_s_out,"LOOKUP during accept %s\n",srp_callback_parm.login); in www_body()
2649 BIO_printf(bio_s_out,"LOOKUP done %s\n",srp_callback_parm.user->info); in www_body()
2651 BIO_printf(bio_s_out,"LOOKUP not successful\n"); in www_body()
2686 BIO_printf(bio_s_out,"read R BLOCK\n"); in www_body()
2722 BIO_printf(io, in www_body()
2729 BIO_printf(io,"Ciphers supported in s_server binary\n"); in www_body()
2735 BIO_printf(io,"%-11s:%-25s", in www_body()
2745 BIO_printf(io,"---\nCiphers common between both SSL end points:\n"); in www_body()
2765 BIO_printf(io,(SSL_cache_hit(con) in www_body()
2769 BIO_printf(io,"%s, Cipher is %s\n", in www_body()
2773 BIO_printf(io,"---\n"); in www_body()
2775 BIO_printf(io,"---\n"); in www_body()
2779 BIO_printf(io,"Client certificate\n"); in www_body()
2824 BIO_printf(io,"'%s' is an invalid file name\r\n",p); in www_body()
2832 BIO_printf(io,"'%s' contains '..' reference\r\n",p); in www_body()
2839 BIO_printf(io,"'%s' is an invalid path\r\n",p); in www_body()
2856 BIO_printf(io,"'%s' is a directory\r\n",p); in www_body()
2864 BIO_printf(io,"Error opening '%s'\r\n",p); in www_body()
2870 BIO_printf(bio_err,"FILE:%s\n",p); in www_body()
2911 BIO_printf(bio_s_out,"rwrite W BLOCK\n"); in www_body()
2950 BIO_printf(bio_s_out,"ACCEPT\n"); in www_body()
2965 BIO_printf(bio_err,"Allocation error in generating RSA key\n"); in tmp_rsa_cb()
2970 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength); in tmp_rsa_cb()
2981 BIO_printf(bio_err,"\n"); in tmp_rsa_cb()