Lines Matching refs:stderr
297 fprintf(stderr, "failed to parser ALPN server protocol string: %s\n", in cb_server_alpn()
315 fprintf(stderr, "failed to allocate memory\n"); in cb_server_alpn()
637 fprintf(stderr, "usage: ssltest [args ...]\n"); in sv_usage()
638 fprintf(stderr, "\n"); in sv_usage()
639 fprintf(stderr, " -server_auth - check server certificate\n"); in sv_usage()
640 fprintf(stderr, " -client_auth - do client authentication\n"); in sv_usage()
641 fprintf(stderr, " -v - more output\n"); in sv_usage()
642 fprintf(stderr, " -d - debug output\n"); in sv_usage()
643 fprintf(stderr, " -reuse - use session-id reuse\n"); in sv_usage()
644 fprintf(stderr, " -num <val> - number of connections to perform\n"); in sv_usage()
645 fprintf(stderr, in sv_usage()
648 fprintf(stderr, in sv_usage()
650 fprintf(stderr, in sv_usage()
652 fprintf(stderr, in sv_usage()
654 fprintf(stderr, in sv_usage()
657 fprintf(stderr, " -no_dhe - disable DHE\n"); in sv_usage()
659 fprintf(stderr, " -no_ecdhe - disable ECDHE\n"); in sv_usage()
662 fprintf(stderr, " -psk arg - PSK in hex (without 0x)\n"); in sv_usage()
665 fprintf(stderr, " -ssl3 - use SSLv3\n"); in sv_usage()
668 fprintf(stderr, " -tls1 - use TLSv1\n"); in sv_usage()
671 fprintf(stderr, " -tls1_1 - use TLSv1.1\n"); in sv_usage()
674 fprintf(stderr, " -tls1_2 - use TLSv1.2\n"); in sv_usage()
677 fprintf(stderr, " -dtls - use DTLS\n"); in sv_usage()
679 fprintf(stderr, " -dtls1 - use DTLSv1\n"); in sv_usage()
682 fprintf(stderr, " -dtls12 - use DTLSv1.2\n"); in sv_usage()
685 fprintf(stderr, " -CApath arg - PEM format directory of CA's\n"); in sv_usage()
686 fprintf(stderr, " -CAfile arg - PEM format file of CA's\n"); in sv_usage()
687 fprintf(stderr, " -s_cert arg - Server certificate file\n"); in sv_usage()
688 fprintf(stderr, in sv_usage()
690 fprintf(stderr, " -c_cert arg - Client certificate file\n"); in sv_usage()
691 fprintf(stderr, in sv_usage()
693 fprintf(stderr, " -cipher arg - The TLSv1.2 and below cipher list\n"); in sv_usage()
694 fprintf(stderr, " -ciphersuites arg - The TLSv1.3 ciphersuites\n"); in sv_usage()
695 fprintf(stderr, " -bio_pair - Use BIO pairs\n"); in sv_usage()
696 fprintf(stderr, " -ipv4 - Use IPv4 connection on localhost\n"); in sv_usage()
697 fprintf(stderr, " -ipv6 - Use IPv6 connection on localhost\n"); in sv_usage()
698 fprintf(stderr, " -f - Test even cases that can't work\n"); in sv_usage()
699 fprintf(stderr, in sv_usage()
701 fprintf(stderr, " -zlib - use zlib compression\n"); in sv_usage()
703 fprintf(stderr, " -npn_client - have client side offer NPN\n"); in sv_usage()
704 fprintf(stderr, " -npn_server - have server side offer NPN\n"); in sv_usage()
705 fprintf(stderr, " -npn_server_reject - have server reject NPN\n"); in sv_usage()
707 fprintf(stderr, " -serverinfo_file file - have server use this file\n"); in sv_usage()
708 fprintf(stderr, " -serverinfo_sct - have client offer and expect SCT\n"); in sv_usage()
709 fprintf(stderr, in sv_usage()
711 fprintf(stderr, in sv_usage()
713 fprintf(stderr, " -alpn_client <string> - have client side offer ALPN\n"); in sv_usage()
714 fprintf(stderr, " -alpn_server <string> - have server side offer ALPN\n"); in sv_usage()
715 fprintf(stderr, " -alpn_server1 <string> - alias for -alpn_server\n"); in sv_usage()
716 fprintf(stderr, " -alpn_server2 <string> - have server side context 2 offer ALPN\n"); in sv_usage()
717 fprintf(stderr, in sv_usage()
719 fprintf(stderr, " -server_min_proto <string> - Minimum version the server should support\n"); in sv_usage()
720 fprintf(stderr, " -server_max_proto <string> - Maximum version the server should support\n"); in sv_usage()
721 fprintf(stderr, " -client_min_proto <string> - Minimum version the client should support\n"); in sv_usage()
722 fprintf(stderr, " -client_max_proto <string> - Maximum version the client should support\n"); in sv_usage()
723 …fprintf(stderr, " -should_negotiate <string> - The version that should be negotiated, fail-client … in sv_usage()
725 fprintf(stderr, " -noct - no certificate transparency\n"); in sv_usage()
726 fprintf(stderr, " -requestct - request certificate transparency\n"); in sv_usage()
727 fprintf(stderr, " -requirect - require certificate transparency\n"); in sv_usage()
729 fprintf(stderr, " -sn_client <string> - have client request this servername\n"); in sv_usage()
730 fprintf(stderr, " -sn_server1 <string> - have server context 1 respond to this servername\n"); in sv_usage()
731 fprintf(stderr, " -sn_server2 <string> - have server context 2 respond to this servername\n"); in sv_usage()
732 fprintf(stderr, " -sn_expect1 - expected server 1\n"); in sv_usage()
733 fprintf(stderr, " -sn_expect2 - expected server 2\n"); in sv_usage()
734 fprintf(stderr, " -server_sess_out <file> - Save the server session to a file\n"); in sv_usage()
735 fprintf(stderr, " -server_sess_in <file> - Read the server session from a file\n"); in sv_usage()
736 fprintf(stderr, " -client_sess_out <file> - Save the client session to a file\n"); in sv_usage()
737 fprintf(stderr, " -client_sess_in <file> - Read the client session from a file\n"); in sv_usage()
738 fprintf(stderr, " -should_reuse <number> - The expected state of reusing the session\n"); in sv_usage()
739 fprintf(stderr, " -no_ticket - do not issue TLS session ticket\n"); in sv_usage()
740 fprintf(stderr, " -client_ktls - try to enable client KTLS\n"); in sv_usage()
741 fprintf(stderr, " -server_ktls - try to enable server KTLS\n"); in sv_usage()
742 fprintf(stderr, " -provider <name> - Load the given provider into the library context\n"); in sv_usage()
743 fprintf(stderr, " -config <cnf> - Load the given config file into the library context\n"); in sv_usage()
992 fprintf(stderr, in main()
1260 … fprintf(stderr, "At most one of -ssl3, -tls1, -tls1_1, -tls1_2, -dtls, -dtls1 or -dtls12 should " in main()
1303 fprintf(stderr, "Testing was requested for a disabled protocol. " in main()
1311 fprintf(stderr, "This case cannot work. Use -f to perform " in main()
1320 fprintf(stderr, "Using BIO pair (-bio_pair)\n"); in main()
1324 fprintf(stderr, in main()
1333 fprintf(stderr, "Failed to add compression method\n"); in main()
1334 ERR_print_errors_fp(stderr); in main()
1337 fprintf(stderr, in main()
1340 ERR_print_errors_fp(stderr); in main()
1440 fprintf(stderr, "CLEARING ALL TLSv1.2 CIPHERS SHOULD FAIL\n"); in main()
1453 fprintf(stderr, "CLEARING ALL TLSv1.2 CIPHERS SHOULD FAIL\n"); in main()
1466 fprintf(stderr, "CLEARING ALL TLSv1.2 CIPHERS SHOULD FAIL\n"); in main()
2051 fprintf(stderr, "ERROR in CLIENT (write)\n"); in doit_localhost()
2062 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n"); in doit_localhost()
2077 fprintf(stderr, "ERROR in CLIENT (read)\n"); in doit_localhost()
2085 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n"); in doit_localhost()
2130 fprintf(stderr, "ERROR in SERVER (write)\n"); in doit_localhost()
2136 fprintf(stderr, "SSL SERVER STARTUP FAILED\n"); in doit_localhost()
2151 fprintf(stderr, "ERROR in SERVER (read)\n"); in doit_localhost()
2157 fprintf(stderr, "SSL SERVER STARTUP FAILED\n"); in doit_localhost()
2195 fprintf(stderr, "Server info verify error\n"); in doit_localhost()
2203 fprintf(stderr, "Custom extension error\n"); in doit_localhost()
2330 fprintf(stderr, "ERROR in CLIENT\n"); in doit_biopair()
2341 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n"); in doit_biopair()
2356 fprintf(stderr, "ERROR in CLIENT\n"); in doit_biopair()
2364 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n"); in doit_biopair()
2409 fprintf(stderr, "ERROR in SERVER\n"); in doit_biopair()
2415 fprintf(stderr, "SSL SERVER STARTUP FAILED\n"); in doit_biopair()
2430 fprintf(stderr, "ERROR in SERVER\n"); in doit_biopair()
2436 fprintf(stderr, "SSL SERVER STARTUP FAILED\n"); in doit_biopair()
2487 fprintf(stderr, "ERROR: BIO_write could not write " in doit_biopair()
2531 fprintf(stderr, "ERROR: BIO_read could not read " in doit_biopair()
2538 fprintf(stderr, "ERROR: BIO_nwrite() did not accept " in doit_biopair()
2553 fprintf(stderr, "ERROR: got stuck\n"); in doit_biopair()
2554 fprintf(stderr, " ERROR.\n"); in doit_biopair()
2569 fprintf(stderr, "Server info verify error\n"); in doit_biopair()
2577 fprintf(stderr, "Custom extension error\n"); in doit_biopair()
2730 fprintf(stderr, "ERROR in CLIENT\n"); in doit()
2736 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n"); in doit()
2759 fprintf(stderr, "ERROR in CLIENT\n"); in doit()
2765 fprintf(stderr, "SSL CLIENT STARTUP FAILED\n"); in doit()
2796 fprintf(stderr, "ERROR in SERVER\n"); in doit()
2803 fprintf(stderr, in doit()
2832 fprintf(stderr, "ERROR in SERVER\n"); in doit()
2839 fprintf(stderr, in doit()
2867 fprintf(stderr, "Server info verify error\n"); in doit()
2871 fprintf(stderr, "Custom extension error\n"); in doit()
2901 fprintf(stderr, "depth=%d error=%d %s\n", in verify_callback()
2912 fprintf(stderr, "Error string: %s\n", in verify_callback()
2993 fprintf(stderr, "client: created identity '%s' len=%d\n", identity, in psk_client_callback()