summaryrefslogtreecommitdiff
path: root/lib/gnutls_kx.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/gnutls_kx.c')
-rw-r--r--lib/gnutls_kx.c30
1 files changed, 15 insertions, 15 deletions
diff --git a/lib/gnutls_kx.c b/lib/gnutls_kx.c
index a073cbf1e2..30b8f666ac 100644
--- a/lib/gnutls_kx.c
+++ b/lib/gnutls_kx.c
@@ -53,9 +53,9 @@ char random[2*TLS_RANDOM_SIZE];
premaster = state->gnutls_key->key.data;
#ifdef HARD_DEBUG
- fprintf(stderr, "PREMASTER SECRET[%d]: %s\n", premaster_size, _gnutls_bin2hex(premaster, premaster_size));
- fprintf(stderr, "CLIENT RANDOM[%d]: %s\n", 32, _gnutls_bin2hex(state->security_parameters.client_random,32));
- fprintf(stderr, "SERVER RANDOM[%d]: %s\n", 32, _gnutls_bin2hex(state->security_parameters.server_random,32));
+ _gnutls_log( "PREMASTER SECRET[%d]: %s\n", premaster_size, _gnutls_bin2hex(premaster, premaster_size));
+ _gnutls_log( "CLIENT RANDOM[%d]: %s\n", 32, _gnutls_bin2hex(state->security_parameters.client_random,32));
+ _gnutls_log( "SERVER RANDOM[%d]: %s\n", 32, _gnutls_bin2hex(state->security_parameters.server_random,32));
#endif
if (_gnutls_version_ssl3(state->connection_state.version) == 0) {
@@ -76,7 +76,7 @@ char random[2*TLS_RANDOM_SIZE];
if (master==NULL) return GNUTLS_E_MEMORY_ERROR;
#ifdef HARD_DEBUG
- fprintf(stderr, "MASTER SECRET: %s\n", _gnutls_bin2hex(master, TLS_MASTER_SIZE));
+ _gnutls_log( "MASTER SECRET: %s\n", _gnutls_bin2hex(master, TLS_MASTER_SIZE));
#endif
memcpy(state->security_parameters.master_secret, master, TLS_MASTER_SIZE);
secure_free(master);
@@ -98,7 +98,7 @@ int _gnutls_send_server_kx_message(SOCKET cd, GNUTLS_STATE state)
return 0;
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Sending server KX message\n");
+ _gnutls_log( "Sending server KX message\n");
#endif
@@ -130,7 +130,7 @@ int _gnutls_send_server_kx_message2(SOCKET cd, GNUTLS_STATE state)
data_size = state->gnutls_internals.auth_struct->gnutls_generate_server_kx2( state->gnutls_key, &data);
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Sending server KX message2\n");
+ _gnutls_log( "Sending server KX message2\n");
#endif
if (data_size<0) {
@@ -162,7 +162,7 @@ int _gnutls_send_client_kx_message(SOCKET cd, GNUTLS_STATE state)
return 0;
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Sending client KX message\n");
+ _gnutls_log( "Sending client KX message\n");
#endif
data_size = state->gnutls_internals.auth_struct->gnutls_generate_client_kx( state->gnutls_key, &data);
@@ -194,7 +194,7 @@ int _gnutls_send_client_kx_message0(SOCKET cd, GNUTLS_STATE state)
return 0;
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Sending client KX message0\n");
+ _gnutls_log( "Sending client KX message0\n");
#endif
data_size = state->gnutls_internals.auth_struct->gnutls_generate_client_kx0( state->gnutls_key, &data);
@@ -235,7 +235,7 @@ int _gnutls_send_client_certificate_verify(SOCKET cd, GNUTLS_STATE state)
}
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Sending client certificate verify message\n");
+ _gnutls_log( "Sending client certificate verify message\n");
#endif
data_size = state->gnutls_internals.auth_struct->gnutls_generate_client_cert_vrfy( state->gnutls_key, &data);
if (data_size < 0)
@@ -259,7 +259,7 @@ int _gnutls_recv_server_kx_message(SOCKET cd, GNUTLS_STATE state)
if (state->gnutls_internals.auth_struct->gnutls_process_server_kx!=NULL) {
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Receiving Server KX message\n");
+ _gnutls_log( "Receiving Server KX message\n");
#endif
ret =
@@ -289,7 +289,7 @@ int _gnutls_recv_server_kx_message2(SOCKET cd, GNUTLS_STATE state)
if (state->gnutls_internals.auth_struct->gnutls_process_server_kx2 != NULL) {
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Receiving Server KX message2\n");
+ _gnutls_log( "Receiving Server KX message2\n");
#endif
ret =
@@ -320,7 +320,7 @@ int _gnutls_recv_client_kx_message(SOCKET cd, GNUTLS_STATE state)
if (state->gnutls_internals.auth_struct->gnutls_process_client_kx != NULL) {
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Receiving client KX message\n");
+ _gnutls_log( "Receiving client KX message\n");
#endif
ret =
@@ -351,7 +351,7 @@ int _gnutls_recv_client_kx_message0(SOCKET cd, GNUTLS_STATE state)
if (state->gnutls_internals.auth_struct->gnutls_process_client_kx0 != NULL) {
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Receiving client KX message0\n");
+ _gnutls_log( "Receiving client KX message0\n");
#endif
ret =
@@ -383,7 +383,7 @@ int _gnutls_send_certificate(SOCKET cd, GNUTLS_STATE state)
return 0;
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Sending certificate message\n");
+ _gnutls_log( "Sending certificate message\n");
#endif
@@ -440,7 +440,7 @@ int _gnutls_send_client_certificate(SOCKET cd, GNUTLS_STATE state)
return 0;
#ifdef HANDSHAKE_DEBUG
- fprintf(stderr, "Sending Client Certificate\n");
+ _gnutls_log( "Sending Client Certificate\n");
#endif
return _gnutls_send_certificate(cd, state);