Lines Matching refs:nss
2 * SSL/TLS interface functions for NSS
25 #include <nss/nss.h>
26 #include <nss/nssilckt.h>
27 #include <nss/ssl.h>
28 #include <nss/pk11func.h>
29 #include <nss/secerr.h>
51 wpa_printf(MSG_DEBUG, "NSS: I/O close");
58 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount);
65 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount);
73 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size);
84 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount);
87 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet");
116 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__);
117 wpa_hexdump(MSG_MSGDUMP, "NSS: I/O send data", buf, amount);
121 wpa_printf(MSG_ERROR, "NSS: Failed to allocate memory for the "
137 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__);
146 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__);
153 wpa_printf(MSG_DEBUG, "NSS: I/O getpeername");
156 * It Looks like NSS only supports IPv4 and IPv6 TCP sockets. Provide a
172 wpa_printf(MSG_DEBUG, "NSS: I/O getsocketoption(Nonblocking)");
176 wpa_printf(MSG_DEBUG, "NSS: I/O getsocketoption(%d)",
225 wpa_printf(MSG_ERROR, "NSS: TODO - %s", __func__);
247 wpa_printf(MSG_ERROR, "NSS: NSS_Init(cert_dir=%s) "
253 wpa_printf(MSG_ERROR, "NSS: NSS_NoDB_Init(NULL) "
264 wpa_printf(MSG_ERROR, "NSS: SSL_OptionSetDefault failed");
269 wpa_printf(MSG_ERROR, "NSS: NSS_SetDomesticPolicy() failed");
281 wpa_printf(MSG_ERROR, "NSS: NSS_Shutdown() failed");
302 wpa_printf(MSG_DEBUG, "NSS: Bad Server Certificate (sec err "
305 wpa_printf(MSG_DEBUG, "NSS: Bad Server Certificate (err %d)",
310 wpa_printf(MSG_DEBUG, "NSS: Peer certificate subject='%s' issuer='%s'",
325 wpa_printf(MSG_DEBUG, "NSS: Handshake completed");
360 wpa_printf(MSG_ERROR, "NSS: Failed to set options");
396 wpa_printf(MSG_ERROR, "NSS: TODO - %s", __func__);
432 /* NSS does not export master secret or client/server random. */
442 wpa_printf(MSG_INFO, "NSS: Unsupported PRF request "
450 wpa_printf(MSG_INFO, "NSS: Failed to use TLS extractor "
466 wpa_printf(MSG_DEBUG, "NSS: handshake: in_len=%u",
522 wpa_printf(MSG_DEBUG, "NSS: encrypt %d bytes",
527 wpa_printf(MSG_ERROR, "NSS: Encryption failed");
548 wpa_printf(MSG_DEBUG, "NSS: decrypt %d bytes",
574 wpa_printf(MSG_DEBUG, "NSS: PR_Recv: %d", res);