Home | History | Annotate | Download | only in apps

Lines Matching refs:BIO_printf

317 		BIO_printf(bio_s_out,"psk_server_cb\n");
320 BIO_printf(bio_err,"Error: client did not send PSK identity\n");
324 BIO_printf(bio_s_out,"identity_len=%d identity=%s\n",
330 BIO_printf(bio_s_out, "PSK error: client identity not found"
336 BIO_printf(bio_s_out, "PSK client identity found\n");
342 BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key);
349 BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n",
363 BIO_printf(bio_s_out, "fetched PSK len=%d\n", psk_len);
367 BIO_printf(bio_err, "Error in PSK server callback\n");
407 BIO_printf(bio_err,"usage: s_server [args ...]\n");
408 BIO_printf(bio_err,"\n");
409 BIO_printf(bio_err," -accept arg - port to accept on (default is %d)\n",PORT);
410 BIO_printf(bio_err," -context arg - set session ID context\n");
411 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
412 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n");
413 BIO_printf(bio_err," -cert arg - certificate file to use\n");
414 BIO_printf(bio_err," (default is %s)\n",TEST_CERT);
415 BIO_printf(bio_err," -crl_check - check the peer certificate has not been revoked by its CA.\n" \
417 BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \
420 BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n");
421 BIO_printf(bio_err," -key arg - Private Key file to use, in cert file if\n");
422 BIO_printf(bio_err," not specified (default is %s)\n",TEST_CERT);
423 BIO_printf(bio_err," -keyform arg - key format (PEM, DER or ENGINE) PEM default\n");
424 BIO_printf(bio_err," -pass arg - private key file pass phrase source\n");
425 BIO_printf(bio_err," -dcert arg - second certificate file to use (usually for DSA)\n");
426 BIO_printf(bio_err," -dcertform x - second certificate format (PEM or DER) PEM default\n");
427 BIO_printf(bio_err," -dkey arg - second private key file to use (usually for DSA)\n");
428 BIO_printf(bio_err," -dkeyform arg - second key format (PEM, DER or ENGINE) PEM default\n");
429 BIO_printf(bio_err," -dpass arg - second private key file pass phrase source\n");
430 BIO_printf(bio_err," -dhparam arg - DH parameter file to use, in cert file if not specified\n");
431 BIO_printf(bio_err," or a default set of parameters is used\n");
433 BIO_printf(bio_err," -named_curve arg - Elliptic curve name to use for ephemeral ECDH keys.\n" \
438 BIO_printf(bio_err," -nbio - Run with non-blocking IO\n");
440 BIO_printf(bio_err," -nbio_test - test with the non-blocking test bio\n");
441 BIO_printf(bio_err," -crlf - convert LF from terminal into CRLF\n");
442 BIO_printf(bio_err," -debug - Print more output\n");
443 BIO_printf
444 BIO_printf(bio_err," -state - Print the SSL states\n");
445 BIO_printf(bio_err," -CApath arg - PEM format directory of CA's\n");
446 BIO_printf(bio_err," -CAfile arg - PEM format file of CA's\n");
447 BIO_printf(bio_err," -nocert - Don't use any certificates (Anon-DH)\n");
448 BIO_printf(bio_err," -cipher arg - play with 'openssl ciphers' to see what goes here\n");
449 BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
450 BIO_printf(bio_err," -quiet - No server output\n");
451 BIO_printf(bio_err," -no_tmp_rsa - Do not generate a tmp RSA key\n");
453 BIO_printf(bio_err," -psk_hint arg - PSK identity hint to use\n");
454 BIO_printf(bio_err," -psk arg - PSK in hex (without 0x)\n");
456 BIO_printf(bio_err," -jpake arg - JPAKE secret to use\n");
459 BIO_printf(bio_err," -ssl2 - Just talk SSLv2\n");
460 BIO_printf(bio_err," -ssl3 - Just talk SSLv3\n");
461 BIO_printf(bio_err," -tls1 - Just talk TLSv1\n");
462 BIO_printf(bio_err," -dtls1 - Just talk DTLSv1\n");
463 BIO_printf(bio_err," -timeout - Enable timeouts\n");
464 BIO_printf(bio_err," -mtu - Set link layer MTU\n");
465 BIO_printf(bio_err," -chain - Read a certificate chain\n");
466 BIO_printf(bio_err," -no_ssl2 - Just disable SSLv2\n");
467 BIO_printf(bio_err," -no_ssl3 - Just disable SSLv3\n");
468 BIO_printf(bio_err," -no_tls1 - Just disable TLSv1\n");
470 BIO_printf(bio_err," -no_dhe - Disable ephemeral DH\n");
473 BIO_printf(bio_err," -no_ecdhe - Disable ephemeral ECDH\n");
475 BIO_printf(bio_err," -bugs - Turn on SSL bug compatibility\n");
476 BIO_printf(bio_err," -www - Respond to a 'GET /' with a status page\n");
477 BIO_printf(bio_err," -WWW - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
478 BIO_printf(bio_err," -HTTP - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
479 BIO_printf(bio_err," with the assumption it contains a complete HTTP response.\n");
481 BIO_printf(bio_err," -engine id - Initialise and use the specified engine\n");
483 BIO_printf(bio_err," -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg'\n");
484 BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
486 BIO_printf(bio_err," -servername host - servername for HostName TLS extension\n");
487 BIO_printf(bio_err," -servername_fatal - on mismatch send fatal alert (default warning alert)\n");
488 BIO_printf(bio_err," -cert2 arg - certificate file to use for servername\n");
489 BIO_printf(bio_err," (default is %s)\n",TEST_CERT2);
490 BIO_printf(bio_err," -key2 arg - Private Key file to use for servername, in cert file if\n");
491 BIO_printf(bio_err," not specified (default is %s)\n",TEST_CERT2);
492 BIO_printf(bio_err," -tlsextdebug - hex dump of all TLS extensions received\n");
493 BIO_printf(bio_err," -no_ticket - disable use of RFC4507bis session tickets\n");
494 BIO_printf(bio_err," -legacy_renegotiation - enable use of legacy renegotiation (dangerous)\n");
666 BIO_printf(p->biodebug,"Hostname in TLS extension: \"%s\"\n",servername);
677 BIO_printf(p->biodebug,"Switching server context.\n");
729 BIO_printf(err, "cert_status: received %d ids\n", sk_OCSP_RESPID_num(ids));
745 BIO_printf(err, "cert_status: AIA URL: %s\n",
920 BIO_printf(bio_err,"verify depth is %d\n",verify_depth);
928 BIO_printf(bio_err,"verify depth is %d, must return a certificate\n",verify_depth);
1069 BIO_printf(bio_err, "Error parsing URL\n");
1108 BIO_printf(bio_err,"Not a hex number '%s'\n",*argv);
1205 BIO_printf(bio_err,"unknown option %s\n",*argv);
1224 BIO_printf(bio_err,
1231 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
1248 BIO_printf(bio_err, "Error getting password\n");
1332 BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
1335 BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
1374 BIO_printf(bio_err,
1377 BIO_printf(bio_err,
1381 BIO_printf(bio_err,"error setting 'id_prefix'\n");
1385 BIO_printf(bio_err,"id_prefix '%s' set.\n", session_id_prefix);
1409 BIO_printf(bio_err,"You must specify a certificate file for the server to use\n");
1417 /* BIO_printf(bio_err,"X509_load_verify_locations\n"); */
1437 BIO_printf(bio_s_out,"Setting secondary ctx parameters\n");
1442 BIO_printf(bio_err,
1445 BIO_printf(bio_err,
1449 BIO_printf(bio_err,"error setting 'id_prefix'\n");
1453 BIO_printf(bio_err,"id_prefix '%s' set.\n", session_id_prefix);
1493 BIO_printf(bio_s_out,"Setting temp DH parameters\n");
1497 BIO_printf(bio_s_out,"Using default temp DH parameters\n");
1511 BIO_printf(bio_s_out,"Setting temp DH parameters\n");
1536 BIO_printf(bio_err, "unknown curve name (%s)\n",
1543 BIO_printf(bio_err, "unable to create curve (%s)\n",
1551 BIO_printf(bio_s_out,"Setting temp ECDH parameters\n");
1555 BIO_printf(bio_s_out,"Using default temp ECDH parameters\n");
1559 BIO_printf(bio_err, "unable to create curve (nistp256)\n");
1601 BIO_printf(bio_s_out,"Generating temp (512 bit) RSA key...");
1622 BIO_printf(bio_s_out,"\n");
1635 BIO_printf(bio_s_out, "PSK key given or JPAKE in use, setting server callback\n");
1641 BIO_printf(bio_err,"error setting PSK identity hint to context\n");
1651 BIO_printf(bio_err,"error setting cipher list\n");
1658 BIO_printf(bio_err,"error setting cipher list\n");
1696 BIO_printf(bio_s_out,"ACCEPT\n");
1736 BIO_printf(bio,"%4ld items in the session cache\n",
1738 BIO_printf(bio,"%4ld client connects (SSL_connect())\n",
1740 BIO_printf(bio,"%4ld client renegotiates (SSL_connect())\n",
1742 BIO_printf(bio,"%4ld client connects that finished\n",
1744 BIO_printf(bio,"%4ld server accepts (SSL_accept())\n",
1746 BIO_printf(bio,"%4ld server renegotiates (SSL_accept())\n",
1748 BIO_printf(bio,"%4ld server accepts that finished\n",
1750 BIO_printf(bio,"%4ld session cache hits\n",SSL_CTX_sess_hits(ssl_ctx));
1751 BIO_printf(bio,"%4ld session cache misses\n",SSL_CTX_sess_misses(ssl_ctx));
1752 BIO_printf(bio,"%4ld session cache timeouts\n",SSL_CTX_sess_timeouts(ssl_ctx));
1753 BIO_printf(bio,"%4ld callback cache hits\n",SSL_CTX_sess_cb_hits(ssl_ctx));
1754 BIO_printf(bio,"%4ld cache full overflows (%ld allowed)\n",
1777 BIO_printf(bio_err,"out of memory\n");
1786 BIO_printf(bio_err,"turning on non blocking io\n");
1949 BIO_printf(bio_err,"TIMEOUT occured\n");
1989 BIO_printf(bio_s_out,"DONE\n");
1997 BIO_printf(bio_s_out,"DONE\n");
2055 BIO_printf(bio_s_out,"Write BLOCK\n");
2059 BIO_printf(bio_s_out,"ERROR\n");
2065 BIO_printf(bio_s_out,"DONE\n");
2108 BIO_printf(bio_s_out,"Read BLOCK\n");
2112 BIO_printf(bio_s_out,"ERROR\n");
2117 BIO_printf(bio_s_out,"DONE\n");
2127 BIO_printf(bio_s_out,"shutting down SSL\n");
2135 BIO_printf(bio_s_out,"CONNECTION CLOSED\n");
2142 BIO_printf(bio_s_out,"ACCEPT\n");
2148 BIO_printf(bio_err,"shutdown accept socket\n");
2167 BIO_printf(bio_s_out,"DELAY\n");
2171 BIO_printf(bio_err,"ERROR\n");
2175 BIO_printf(bio_err,"verify error:%s\n",
2188 BIO_printf(bio_s_out,"Client certificate\n");
2191 BIO_printf(bio_s_out,"subject=%s\n",buf);
2193 BIO_printf(bio_s_out,"issuer=%s\n",buf);
2198 BIO_printf(bio_s_out,"Shared ciphers:%s\n",buf);
2200 BIO_printf(bio_s_out,"CIPHER is %s\n",(str != NULL)?str:"(NONE)");
2201 if (con->hit) BIO_printf(bio_s_out,"Reused session-id\n");
2204 BIO_printf(bio_s_out,"Peer has incorrect TLSv1 block padding\n");
2208 BIO_printf(bio_s_out,"Kerberos peer principal is %s\n",
2212 BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n",
2275 BIO_printf(bio_err,"turning on non blocking io\n");
2370 BIO_printf(bio_s_out,"read R BLOCK\n");
2408 BIO_printf(io,"Ciphers supported in s_server binary\n");
2414 BIO_printf(io,"%-11s:%-25s",
2424 BIO_printf(io,"---\nCiphers common between both SSL end points:\n");
2444 BIO_printf(io,((con->hit)
2448 BIO_printf(io,"%s, Cipher is %s\n",
2452 BIO_printf(io,"---\n");
2454 BIO_printf(io,"---\n");
2458 BIO_printf(io,"Client certificate\n");
2503 BIO_printf(io,"'%s' is an invalid file name\r\n",p);
2511 BIO_printf(io,"'%s' contains '..' reference\r\n",p);
2518 BIO_printf(io,"'%s' is an invalid path\r\n",p);
2535 BIO_printf(io,"'%s' is a directory\r\n",p);
2543 BIO_printf(io,"Error opening '%s'\r\n",p);
2549 BIO_printf(bio_err,"FILE:%s\n",p);
2591 BIO_printf(bio_s_out,"rwrite W BLOCK\n");
2630 BIO_printf(bio_s_out,"ACCEPT\n");
2645 BIO_printf(bio_err,"Allocation error in generating RSA key\n");
2650 BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength);
2661 BIO_printf(bio_err,"\n");