Lines Matching refs:BIO_printf
58 BIO_printf(bio_err, "depth=%d ", depth); in verify_callback()
69 BIO_printf(bio_err, "verify error:num=%d:%s\n", err, in verify_callback()
92 BIO_printf(bio_err, "notBefore="); in verify_callback()
94 BIO_printf(bio_err, "\n"); in verify_callback()
100 BIO_printf(bio_err, "notAfter="); in verify_callback()
102 BIO_printf(bio_err, "\n"); in verify_callback()
113 BIO_printf(bio_err, "verify return:%d\n", ok); in verify_callback()
122 BIO_printf(bio_err, "unable to get certificate from '%s'\n", in set_cert_stuff()
130 BIO_printf(bio_err, "unable to get private key from '%s'\n", in set_cert_stuff()
146 BIO_printf(bio_err, in set_cert_stuff()
162 BIO_printf(bio_err, "error setting certificate\n"); in set_cert_key_stuff()
168 BIO_printf(bio_err, "error setting private key\n"); in set_cert_key_stuff()
177 BIO_printf(bio_err, in set_cert_key_stuff()
182 BIO_printf(bio_err, "error setting certificate chain\n"); in set_cert_key_stuff()
187 BIO_printf(bio_err, "error building certificate chain\n"); in set_cert_key_stuff()
225 BIO_printf(bio, "UNKNOWN (%d),", cert_type); in ssl_print_client_cert_types()
317 BIO_printf(out, "%s", sstr); in do_print_sigalgs()
319 BIO_printf(out, "0x%02X", (int)rsign); in do_print_sigalgs()
321 BIO_printf(out, "+%s", OBJ_nid2sn(hash_nid)); in do_print_sigalgs()
323 BIO_printf(out, "+0x%02X", (int)rhash); in do_print_sigalgs()
338 BIO_printf(out, "Peer signing digest: %s\n", OBJ_nid2sn(nid)); in ssl_print_sigalgs()
340 BIO_printf(out, "Peer signature type: %s\n", get_sigtype(nid)); in ssl_print_sigalgs()
371 BIO_printf(out, "unknown(%d)", (int)*pformats); in ssl_print_point_formats()
395 BIO_printf(out, "%s", SSL_group_to_name(s, nid)); in ssl_print_groups()
408 BIO_printf(out, "%s", SSL_group_to_name(s, nid)); in ssl_print_groups()
426 BIO_printf(out, "RSA, %d bits\n", EVP_PKEY_get_bits(key)); in ssl_print_tmp_key()
430 BIO_printf(out, "DH, %d bits\n", EVP_PKEY_get_bits(key)); in ssl_print_tmp_key()
441 BIO_printf(out, "ECDH, %s, %d bits\n", name, EVP_PKEY_get_bits(key)); in ssl_print_tmp_key()
446 BIO_printf(out, "%s, %d bits\n", OBJ_nid2sn(EVP_PKEY_get_id(key)), in ssl_print_tmp_key()
467 BIO_printf(out, "read from %p [%p] (%zu bytes => %zu (0x%zX))\n", in bio_dump_callback()
471 BIO_printf(out, "read from %p [%p] (%zu bytes => %d)\n", in bio_dump_callback()
478 BIO_printf(out, "write to %p [%p] (%zu bytes => %zu (0x%zX))\n", in bio_dump_callback()
482 BIO_printf(out, "write to %p [%p] (%zu bytes => %d)\n", in bio_dump_callback()
494 BIO_printf(out, "read from %p [%p] (%zu bytes => %zu (0x%zX))\n", in bio_dump_callback()
502 BIO_printf(out, "read from %p [%p] (%zu bytes => %d)\n", in bio_dump_callback()
514 BIO_printf(out, "write to %p [%p] (%zu bytes => %zu (0x%zX))\n", in bio_dump_callback()
522 BIO_printf(out, "write to %p [%p] (%zu bytes => %d)\n", in bio_dump_callback()
549 BIO_printf(bio_err, "%s:%s\n", str, SSL_state_string_long(s)); in apps_ssl_info_callback()
552 BIO_printf(bio_err, "SSL3 alert %s:%s:%s\n", in apps_ssl_info_callback()
558 BIO_printf(bio_err, "%s:failed in %s\n", in apps_ssl_info_callback()
561 BIO_printf(bio_err, "%s:error in %s\n", in apps_ssl_info_callback()
706 BIO_printf(bio, "%s %s%s [length %04lx]%s%s\n", str_write_p, str_version, in msg_cb()
713 BIO_printf(bio, " "); in msg_cb()
717 BIO_printf(bio, "\n "); in msg_cb()
718 BIO_printf(bio, " %02x", ((const unsigned char *)buf)[i]); in msg_cb()
721 BIO_printf(bio, " ..."); in msg_cb()
722 BIO_printf(bio, "\n"); in msg_cb()
826 BIO_printf(bio, "TLS %s extension \"%s\" (id=%d), len=%d\n", in tlsext_cb()
845 BIO_printf(bio_err, "error setting random cookie secret\n"); in generate_stateless_cookie_callback()
854 BIO_printf(bio_err, "memory full\n"); in generate_stateless_cookie_callback()
866 BIO_printf(bio_err, "Failed getting peer address\n"); in generate_stateless_cookie_callback()
881 BIO_printf(bio_err, in generate_stateless_cookie_callback()
968 BIO_printf(bio_err, "\t%s: %s\n", in print_chain_flags()
971 BIO_printf(bio_err, "\tSuite B: "); in print_chain_flags()
975 BIO_printf(bio_err, "not tested\n"); in print_chain_flags()
991 BIO_printf(bio_err, in set_cert_cb()
1014 BIO_printf(bio_err, "Checking cert chain %d:\nSubject: ", i); in set_cert_cb()
1098 BIO_printf(bio_err, "Missing filename\n"); in load_excert()
1133 BIO_printf(bio_err, " %s: Error initialising xcert\n", in args_excert()
1146 BIO_printf(bio_err, "%s: Error adding xcert\n", opt_getprog()); in args_excert()
1154 BIO_printf(bio_err, "%s: Key already specified\n", opt_getprog()); in args_excert()
1161 BIO_printf(bio_err, "%s: Chain already specified\n", in args_excert()
1212 BIO_printf(bio_err, "%02X", rlist[j]); in print_raw_cipherlist()
1230 BIO_printf(bio_err, "%s: %zu-byte buffer too large to hexencode\n", in hexencode()
1253 BIO_printf(bio, "Verification: OK\n"); in print_verify_detail()
1255 BIO_printf(bio, "Verified peername: %s\n", peername); in print_verify_detail()
1259 BIO_printf(bio, "Verification error: %s\n", reason); in print_verify_detail()
1282 BIO_printf(bio, "DANE TLSA %d %d %d %s%s ", in print_verify_detail()
1286 BIO_printf(bio, "%s certificate at depth %d\n", in print_verify_detail()
1290 BIO_printf(bio, "matched the peer raw public key\n"); in print_verify_detail()
1302 BIO_printf(bio_err, "Protocol version: %s\n", SSL_get_version(s)); in print_ssl_summary()
1305 BIO_printf(bio_err, "Ciphersuite: %s\n", SSL_CIPHER_get_name(c)); in print_ssl_summary()
1313 BIO_printf(bio_err, "Hash used: %s\n", OBJ_nid2sn(nid)); in print_ssl_summary()
1315 BIO_printf(bio_err, "Signature type: %s\n", get_sigtype(nid)); in print_ssl_summary()
1318 BIO_printf(bio_err, "Peer used raw public key\n"); in print_ssl_summary()
1320 BIO_printf(bio_err, "Signature type: %s\n", get_sigtype(nid)); in print_ssl_summary()
1332 BIO_printf(bio_err, "Negotiated TLS1.3 group: %s\n", in print_ssl_summary()
1349 BIO_printf(bio_err, "Call to SSL_CONF_cmd(%s, %s) failed\n", in config_ctx()
1490 BIO_printf(sdb->out, "Version=%s", lookup(nid, ssl_versions, "???")); in security_callback_debug()
1506 BIO_printf(sdb->out, "%s=", nm); in security_callback_debug()
1535 BIO_printf(sdb->out, "Public key missing"); in security_callback_debug()
1541 BIO_printf(sdb->out, "%s, bits=%d", in security_callback_debug()
1555 BIO_printf(sdb->out, "%s", nm); in security_callback_debug()
1557 BIO_printf(sdb->out, "s_cb.c:security_callback_debug op=0x%x", op); in security_callback_debug()
1561 BIO_printf(sdb->out, " scheme=%s", sname); in security_callback_debug()
1569 BIO_printf(sdb->out, " digest=%s, algorithm=%s", hash_str, alg_str); in security_callback_debug()
1571 BIO_printf(sdb->out, " scheme=unknown(0x%04x)", raw_sig_code); in security_callback_debug()
1578 BIO_printf(sdb->out, ", security bits=%d", bits); in security_callback_debug()
1579 BIO_printf(sdb->out, ": %s\n", rv ? "yes" : "no"); in security_callback_debug()
1597 BIO_printf(bio_err, "Keylog callback is invoked without valid file!\n"); in keylog_callback()
1605 BIO_printf(bio_keylog, "%s\n", line); in keylog_callback()
1627 BIO_printf(bio_err, "Error writing keylog file %s\n", keylog_file); in set_keylog_file()
1649 BIO_printf(bio, "---\nNo %s certificate CA names sent\n", cs); in print_ca_names()
1653 BIO_printf(bio, "---\nAcceptable %s certificate CA names\n", cs); in print_ca_names()
1663 BIO_printf(bio, "Secure Renegotiation IS%s supported\n", in ssl_print_secure_renegotiation_notes()
1666 BIO_printf(bio, "This TLS version forbids renegotiation.\n"); in ssl_print_secure_renegotiation_notes()