Lines Matching refs:BIO_printf

58         BIO_printf(bio_err, "depth=%d ", depth);  in verify_callback()
69 BIO_printf(bio_err, "verify error:num=%d:%s\n", err, in verify_callback()
92 BIO_printf(bio_err, "notBefore="); in verify_callback()
94 BIO_printf(bio_err, "\n"); in verify_callback()
100 BIO_printf(bio_err, "notAfter="); in verify_callback()
102 BIO_printf(bio_err, "\n"); in verify_callback()
113 BIO_printf(bio_err, "verify return:%d\n", ok); in verify_callback()
122 BIO_printf(bio_err, "unable to get certificate from '%s'\n", in set_cert_stuff()
130 BIO_printf(bio_err, "unable to get private key from '%s'\n", in set_cert_stuff()
146 BIO_printf(bio_err, in set_cert_stuff()
162 BIO_printf(bio_err, "error setting certificate\n"); in set_cert_key_stuff()
168 BIO_printf(bio_err, "error setting private key\n"); in set_cert_key_stuff()
177 BIO_printf(bio_err, in set_cert_key_stuff()
182 BIO_printf(bio_err, "error setting certificate chain\n"); in set_cert_key_stuff()
187 BIO_printf(bio_err, "error building certificate chain\n"); in set_cert_key_stuff()
225 BIO_printf(bio, "UNKNOWN (%d),", cert_type); in ssl_print_client_cert_types()
297 BIO_printf(out, "%s", sstr); in do_print_sigalgs()
299 BIO_printf(out, "0x%02X", (int)rsign); in do_print_sigalgs()
301 BIO_printf(out, "+%s", OBJ_nid2sn(hash_nid)); in do_print_sigalgs()
303 BIO_printf(out, "+0x%02X", (int)rhash); in do_print_sigalgs()
318 BIO_printf(out, "Peer signing digest: %s\n", OBJ_nid2sn(nid)); in ssl_print_sigalgs()
320 BIO_printf(out, "Peer signature type: %s\n", get_sigtype(nid)); in ssl_print_sigalgs()
351 BIO_printf(out, "unknown(%d)", (int)*pformats); in ssl_print_point_formats()
375 BIO_printf(out, "%s", SSL_group_to_name(s, nid)); in ssl_print_groups()
388 BIO_printf(out, "%s", SSL_group_to_name(s, nid)); in ssl_print_groups()
406 BIO_printf(out, "RSA, %d bits\n", EVP_PKEY_get_bits(key)); in ssl_print_tmp_key()
410 BIO_printf(out, "DH, %d bits\n", EVP_PKEY_get_bits(key)); in ssl_print_tmp_key()
421 BIO_printf(out, "ECDH, %s, %d bits\n", name, EVP_PKEY_get_bits(key)); in ssl_print_tmp_key()
426 BIO_printf(out, "%s, %d bits\n", OBJ_nid2sn(EVP_PKEY_get_id(key)), in ssl_print_tmp_key()
447 BIO_printf(out, "read from %p [%p] (%zu bytes => %zu (0x%zX))\n", in bio_dump_callback()
451 BIO_printf(out, "read from %p [%p] (%zu bytes => %d)\n", in bio_dump_callback()
458 BIO_printf(out, "write to %p [%p] (%zu bytes => %zu (0x%zX))\n", in bio_dump_callback()
462 BIO_printf(out, "write to %p [%p] (%zu bytes => %d)\n", in bio_dump_callback()
474 BIO_printf(out, "read from %p [%p] (%zu bytes => %zu (0x%zX))\n", in bio_dump_callback()
482 BIO_printf(out, "read from %p [%p] (%zu bytes => %d)\n", in bio_dump_callback()
494 BIO_printf(out, "write to %p [%p] (%zu bytes => %zu (0x%zX))\n", in bio_dump_callback()
502 BIO_printf(out, "write to %p [%p] (%zu bytes => %d)\n", in bio_dump_callback()
529 BIO_printf(bio_err, "%s:%s\n", str, SSL_state_string_long(s)); in apps_ssl_info_callback()
532 BIO_printf(bio_err, "SSL3 alert %s:%s:%s\n", in apps_ssl_info_callback()
538 BIO_printf(bio_err, "%s:failed in %s\n", in apps_ssl_info_callback()
541 BIO_printf(bio_err, "%s:error in %s\n", in apps_ssl_info_callback()
686 BIO_printf(bio, "%s %s%s [length %04lx]%s%s\n", str_write_p, str_version, in msg_cb()
693 BIO_printf(bio, " "); in msg_cb()
697 BIO_printf(bio, "\n "); in msg_cb()
698 BIO_printf(bio, " %02x", ((const unsigned char *)buf)[i]); in msg_cb()
701 BIO_printf(bio, " ..."); in msg_cb()
702 BIO_printf(bio, "\n"); in msg_cb()
806 BIO_printf(bio, "TLS %s extension \"%s\" (id=%d), len=%d\n", in tlsext_cb()
825 BIO_printf(bio_err, "error setting random cookie secret\n"); in generate_stateless_cookie_callback()
834 BIO_printf(bio_err, "memory full\n"); in generate_stateless_cookie_callback()
846 BIO_printf(bio_err, "Failed getting peer address\n"); in generate_stateless_cookie_callback()
861 BIO_printf(bio_err, in generate_stateless_cookie_callback()
948 BIO_printf(bio_err, "\t%s: %s\n", in print_chain_flags()
951 BIO_printf(bio_err, "\tSuite B: "); in print_chain_flags()
955 BIO_printf(bio_err, "not tested\n"); in print_chain_flags()
971 BIO_printf(bio_err, in set_cert_cb()
994 BIO_printf(bio_err, "Checking cert chain %d:\nSubject: ", i); in set_cert_cb()
1078 BIO_printf(bio_err, "Missing filename\n"); in load_excert()
1113 BIO_printf(bio_err, " %s: Error initialising xcert\n", in args_excert()
1126 BIO_printf(bio_err, "%s: Error adding xcert\n", opt_getprog()); in args_excert()
1134 BIO_printf(bio_err, "%s: Key already specified\n", opt_getprog()); in args_excert()
1141 BIO_printf(bio_err, "%s: Chain already specified\n", in args_excert()
1192 BIO_printf(bio_err, "%02X", rlist[j]); in print_raw_cipherlist()
1210 BIO_printf(bio_err, "%s: %zu-byte buffer too large to hexencode\n", in hexencode()
1233 BIO_printf(bio, "Verification: OK\n"); in print_verify_detail()
1235 BIO_printf(bio, "Verified peername: %s\n", peername); in print_verify_detail()
1239 BIO_printf(bio, "Verification error: %s\n", reason); in print_verify_detail()
1262 BIO_printf(bio, "DANE TLSA %d %d %d %s%s ", in print_verify_detail()
1266 BIO_printf(bio, "%s certificate at depth %d\n", in print_verify_detail()
1270 BIO_printf(bio, "matched the peer raw public key\n"); in print_verify_detail()
1282 BIO_printf(bio_err, "Protocol version: %s\n", SSL_get_version(s)); in print_ssl_summary()
1285 BIO_printf(bio_err, "Ciphersuite: %s\n", SSL_CIPHER_get_name(c)); in print_ssl_summary()
1293 BIO_printf(bio_err, "Hash used: %s\n", OBJ_nid2sn(nid)); in print_ssl_summary()
1295 BIO_printf(bio_err, "Signature type: %s\n", get_sigtype(nid)); in print_ssl_summary()
1298 BIO_printf(bio_err, "Peer used raw public key\n"); in print_ssl_summary()
1300 BIO_printf(bio_err, "Signature type: %s\n", get_sigtype(nid)); in print_ssl_summary()
1328 BIO_printf(bio_err, "Call to SSL_CONF_cmd(%s, %s) failed\n", in config_ctx()
1469 BIO_printf(sdb->out, "Version=%s", lookup(nid, ssl_versions, "???")); in security_callback_debug()
1485 BIO_printf(sdb->out, "%s=", nm); in security_callback_debug()
1514 BIO_printf(sdb->out, "Public key missing"); in security_callback_debug()
1520 BIO_printf(sdb->out, "%s, bits=%d", in security_callback_debug()
1534 BIO_printf(sdb->out, "%s", nm); in security_callback_debug()
1536 BIO_printf(sdb->out, "s_cb.c:security_callback_debug op=0x%x", op); in security_callback_debug()
1540 BIO_printf(sdb->out, " scheme=%s", sname); in security_callback_debug()
1548 BIO_printf(sdb->out, " digest=%s, algorithm=%s", hash_str, alg_str); in security_callback_debug()
1550 BIO_printf(sdb->out, " scheme=unknown(0x%04x)", raw_sig_code); in security_callback_debug()
1557 BIO_printf(sdb->out, ", security bits=%d", bits); in security_callback_debug()
1558 BIO_printf(sdb->out, ": %s\n", rv ? "yes" : "no"); in security_callback_debug()
1576 BIO_printf(bio_err, "Keylog callback is invoked without valid file!\n"); in keylog_callback()
1584 BIO_printf(bio_keylog, "%s\n", line); in keylog_callback()
1606 BIO_printf(bio_err, "Error writing keylog file %s\n", keylog_file); in set_keylog_file()
1628 BIO_printf(bio, "---\nNo %s certificate CA names sent\n", cs); in print_ca_names()
1632 BIO_printf(bio, "---\nAcceptable %s certificate CA names\n", cs); in print_ca_names()
1642 BIO_printf(bio, "Secure Renegotiation IS%s supported\n", in ssl_print_secure_renegotiation_notes()
1645 BIO_printf(bio, "This TLS version forbids renegotiation.\n"); in ssl_print_secure_renegotiation_notes()