mbedtls

classic Classic list List threaded Threaded
10 messages Options
Reply | Threaded
Open this post in threaded view
|

mbedtls

Trampas Stern
Does anyone know how on an embedded platform to setup the entropy using mbedtls? 

Specifically I am trying to get https running with lwip and getting an assertion failure:

Assertion "httpd_init: altcp_tls_new failed" failed at line 2872 in ../src/libraries/lwip/src/apps/http/httpd.c

Which I think is because of lack of entropy functions.  

I did try defining ALTCP_MBEDTLS_ENTROPY_PTR and  ALTCP_MBEDTLS_ENTROPY_LEN but that seems to cause hard faults, when I assign it to a function pointer that generates a random number. 

Thanks
Trampas

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users
Reply | Threaded
Open this post in threaded view
|

Re: mbedtls

goldsimon@gmx.de
Am 17.02.2020 um 18:09 schrieb Trampas Stern:
> Does anyone know how on an embedded platform to setup the entropy using
> mbedtls?

I did that, but it's been a while, and I don't remember from the top of
my head.

I think you *can* use a string entropy source and implement that
correctly or you can enable some kind of debug option that says
somethink like "this is for testing only; using no entropy is ok"...

>
> Specifically I am trying to get https running with lwip and getting an
> assertion failure:
>
> Assertion "httpd_init: altcp_tls_new failed" failed at line 2872 in
> ../src/libraries/lwip/src/apps/http/httpd.c
>
> Which I think is because of lack of entropy functions.  
>
> I did try defining ALTCP_MBEDTLS_ENTROPY_PTR
> and  ALTCP_MBEDTLS_ENTROPY_LEN but that seems to cause hard faults, when
> I assign it to a function pointer that generates a random number.

That seems strange.

Regards,
Simon

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users
Reply | Threaded
Open this post in threaded view
|

Re: mbedtls

Trampas Stern
It appears that  ALTCP_MBEDTLS_ENTROPY_PTR  is a memory location not a pointer to function. 

I just went in and hacked the entropy_poll.c and created a new function: 

int mbedtls_platform_entropy_poll( void *data, unsigned char *output, size_t len,
                           size_t *olen )
{
size_t i=0;
while(i<len)
{
uint32_t x;
uint8_t *ptr;
x=get_random();
ptr=&x;
uint32_t j=0;
while (i<len && j<4)
{
output[i]=ptr[j];
i++;
j++;
}
}
*olen = i;

   return( 0 );
}

This got me passed that bug, however when running the https server I am unable to connect with Chrome.  I am trying to determine the root cause. 

Trampas


On Mon, Feb 17, 2020 at 3:39 PM [hidden email] <[hidden email]> wrote:
Am 17.02.2020 um 18:09 schrieb Trampas Stern:
> Does anyone know how on an embedded platform to setup the entropy using
> mbedtls?

I did that, but it's been a while, and I don't remember from the top of
my head.

I think you *can* use a string entropy source and implement that
correctly or you can enable some kind of debug option that says
somethink like "this is for testing only; using no entropy is ok"...

>
> Specifically I am trying to get https running with lwip and getting an
> assertion failure:
>
> Assertion "httpd_init: altcp_tls_new failed" failed at line 2872 in
> ../src/libraries/lwip/src/apps/http/httpd.c
>
> Which I think is because of lack of entropy functions.  
>
> I did try defining ALTCP_MBEDTLS_ENTROPY_PTR
> and  ALTCP_MBEDTLS_ENTROPY_LEN but that seems to cause hard faults, when
> I assign it to a function pointer that generates a random number.

That seems strange.

Regards,
Simon

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users
Reply | Threaded
Open this post in threaded view
|

Re: mbedtls

Trampas Stern
I found that chrome will not work with openssl keys generated by the comments in the code I found I had to generate different keys using the following commands. 

openssl ecparam -genkey -name prime256v1 -out ca.key
openssl req -x509 -new -SHA256 -nodes -key ca.key -days 3650 -out ca.crt


Now on the next issues... 



On Mon, Feb 17, 2020 at 3:52 PM Trampas Stern <[hidden email]> wrote:
It appears that  ALTCP_MBEDTLS_ENTROPY_PTR  is a memory location not a pointer to function. 

I just went in and hacked the entropy_poll.c and created a new function: 

int mbedtls_platform_entropy_poll( void *data, unsigned char *output, size_t len,
                           size_t *olen )
{
size_t i=0;
while(i<len)
{
uint32_t x;
uint8_t *ptr;
x=get_random();
ptr=&x;
uint32_t j=0;
while (i<len && j<4)
{
output[i]=ptr[j];
i++;
j++;
}
}
*olen = i;

   return( 0 );
}

This got me passed that bug, however when running the https server I am unable to connect with Chrome.  I am trying to determine the root cause. 

Trampas


On Mon, Feb 17, 2020 at 3:39 PM [hidden email] <[hidden email]> wrote:
Am 17.02.2020 um 18:09 schrieb Trampas Stern:
> Does anyone know how on an embedded platform to setup the entropy using
> mbedtls?

I did that, but it's been a while, and I don't remember from the top of
my head.

I think you *can* use a string entropy source and implement that
correctly or you can enable some kind of debug option that says
somethink like "this is for testing only; using no entropy is ok"...

>
> Specifically I am trying to get https running with lwip and getting an
> assertion failure:
>
> Assertion "httpd_init: altcp_tls_new failed" failed at line 2872 in
> ../src/libraries/lwip/src/apps/http/httpd.c
>
> Which I think is because of lack of entropy functions.  
>
> I did try defining ALTCP_MBEDTLS_ENTROPY_PTR
> and  ALTCP_MBEDTLS_ENTROPY_LEN but that seems to cause hard faults, when
> I assign it to a function pointer that generates a random number.

That seems strange.

Regards,
Simon

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users
Reply | Threaded
Open this post in threaded view
|

Re: mbedtls

goldsimon@gmx.de
Trampas Stern wrote:
> I found that chrome will not work with openssl keys generated by the comments in the code I found I had to generate different keys using the following commands. 
> [..]

Well, the code in the comment did work at some time. I don't think I can keep up with the speed that google changes TLS handling... :-)

Regards,
Simon

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users
Reply | Threaded
Open this post in threaded view
|

Re: mbedtls

Trampas Stern
I figured as much...   I am slow at learning this stuff, and figured adding the note to the forum is good for next guy. 

My next problem is that with https I am having problems transferring data. and getting http_err calls closing connections. 

ttpd.c 2792: http_accept 20453718 / 0
httpd.c 2792: http_accept 204536c0 / 0
httpd.c 2594: http_err: Connection closed.
httpd.c 2594: http_err: Connection closed.
httpd.c 2792: http_accept 204536ec / 0
httpd.c 2792: http_accept 20453744 / 0
httpd.c 2594: http_err: Connection closed.
httpd.c 2792: http_accept 204536c0 / 0
httpd.c 2692: http_recv: pcb=20453744 pbuf=204544f8 err=Ok.
httpd.c 2086: Received 567 bytes
httpd.c 2093: First pbuf
httpd.c 2137: CRLF received, parsing request
httpd.c 2144: Received GET request"
httpd.c 2205: Received "GET" request for URI: "/dashboard.html"
httpd.c 2412: Opening /dashboard.html
httpd.c 2414: Opening /dashboard.html
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 2764: http_recv: data 20411e78 len 2890
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=2890
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 2890 bytes
httpd.c  600: Sent 2890 bytes
httpd.c 1697: send_data end.
httpd.c 2637: http_poll: pcb=20453744 hs=204517ec pcb_state=ESTABLISHED
httpd.c 2670: http_poll: try to send more data
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 15842
httpd.c 1203: Trying to read 1 bytes.
fs.cpp   92: reading SD /dashboard.html: 1
httpd.c 1225: Read 1 bytes.
httpd.c 1228: Sent 1
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 1 bytes
httpd.c  600: Sent 1 bytes
httpd.c 1697: send_data end.
httpd.c 2674: tcp_output
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 15841
httpd.c 1203: Trying to read 2890 bytes.
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 1225: Read 2890 bytes.
httpd.c 1228: Sent 2890
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 2861 bytes
httpd.c  600: Sent 2861 bytes
httpd.c 1697: send_data end.
httpd.c 2692: http_recv: pcb=204536c0 pbuf=20455118 err=Ok.
httpd.c 2086: Received 434 bytes
httpd.c 2093: First pbuf
httpd.c 2137: CRLF received, parsing request
httpd.c 2144: Received GET request"
httpd.c 2205: Received "GET" request for URI: "/css/bootstrap.css"
httpd.c 2412: Opening /css/bootstrap.css
httpd.c 2414: Opening /css/bootstrap.css
fs.cpp   92: reading SD /css/bootstrap.css: 2890
httpd.c 2764: http_recv: data 20411e78 len 2890
httpd.c 1635: /css/bootstrap.css
httpd.c 1636: http_send: pcb=204536c0 hs=20452260 left=2890
httpd.c 1256: writting /css/bootstrap.css
httpd.c  578: Trying to send 2890 bytes
httpd.c  600: Sent 2890 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=29
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 29 bytes
httpd.c  600: Sent 29 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 12951
httpd.c 1203: Trying to read 2890 bytes.
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 1225: Read 2890 bytes.
httpd.c 1228: Sent 2890
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 2890 bytes
httpd.c  600: Sent 2890 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 10061
httpd.c 1203: Trying to read 2890 bytes.
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 1225: Read 2890 bytes.
httpd.c 1228: Sent 2890
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 1432 bytes
httpd.c  600: Sent 1432 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=1458
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 1458 bytes
httpd.c  600: Sent 1458 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 7171
httpd.c 1203: Trying to read 2890 bytes.
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 1225: Read 2890 bytes.
httpd.c 1228: Sent 2890
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 2864 bytes
httpd.c  600: Sent 2864 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=26
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 26 bytes
httpd.c  600: Sent 26 bytes
httpd.c 1697: send_data end.
httpd.c 2792: http_accept 20453668 / 0
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 4281
httpd.c 1203: Trying to read 2890 bytes.
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 1225: Read 2890 bytes.
httpd.c 1228: Sent 2890 


On Tue, Feb 18, 2020 at 7:32 AM Simon Goldschmidt <[hidden email]> wrote:
Trampas Stern wrote:
> I found that chrome will not work with openssl keys generated by the comments in the code I found I had to generate different keys using the following commands. 
> [..]

Well, the code in the comment did work at some time. I don't think I can keep up with the speed that google changes TLS handling... :-)

Regards,
Simon

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users
Reply | Threaded
Open this post in threaded view
|

Re: mbedtls

Trampas Stern
Right now the interface sometimes works and sometimes does not not.  I have not found the issue, maybe some one can point me in the right direction?

Thanks
Trampas

ssl_tls.c 8936: => free
ssl_tls.c 9001: <= free
ethernet.c  313: Network up IP=192.168.168.156
tcp_out.c 1097: tcp_enqueue_flags: queueing 6562:6563 (0x12)
tcp_out.c 1546: tcp_output_segment: 6562:6562
tcp_out.c 1097: tcp_enqueue_flags: queueing 6614:6615 (0x12)
tcp_out.c 1546: tcp_output_segment: 6614:6614
httpd.c 2804: http_accept 20454be0 / 0
tcp_out.c 1268: tcp_output: nothing to send (0)
ssl_tls.c 8086: => handshake
ssl_srv.c 4261: server state: 0
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 4261: server state: 1
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 1213: => parse client hello
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 2744: <= fetch input
ssl_srv.c 1257: client hello v3, message type: 22
ssl_srv.c 1266: client hello v3, message len.: 512
ssl_srv.c 1269: client hello v3, protocol version: [3:1]
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 5, nb_want: 517
ssl_tls.c 2723: in_left: 5, nb_want: 517
ssl_tls.c 2744: <= fetch input
ssl_srv.c 1369: client hello v3, handshake type: 1
ssl_srv.c 1378: client hello v3, handshake len.: 508
ssl_srv.c 1830: unknown extension found: 19018 (ignoring)
ssl_srv.c 1800: found extended master secret extension
ssl_srv.c 1713: found renegotiation extension
ssl_srv.c 1740: found supported elliptic curves extension
ssl_srv.c 1748: found supported point formats extension
ssl_srv.c  377: point format selected: 0
ssl_srv.c 1810: found session ticket extension
ssl_srv.c 1820: found alpn extension
ssl_srv.c 1830: unknown extension found: 5 (ignoring)
ssl_srv.c 1726: found signature_algorithms extension
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
ssl_srv.c 1830: unknown extension found: 18 (ignoring)
ssl_srv.c 1830: unknown extension found: 51 (ignoring)
ssl_srv.c 1830: unknown extension found: 45 (ignoring)
ssl_srv.c 1830: unknown extension found: 43 (ignoring)
ssl_srv.c 1830: unknown extension found: 27 (ignoring)
ssl_srv.c 1830: unknown extension found: 35466 (ignoring)
ssl_srv.c 1830: unknown extension found: 21 (ignoring)
ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c  720: ciphersuite requires certificate
ssl_srv.c  731: candidate certificate chain, certificate
ssl_srv.c  793: selected certificate chain, certificate
ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c 2035: <= parse client hello
ssl_srv.c 4261: server state: 2
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 2419: => write server hello
ssl_srv.c 2453: server hello, chosen version: [3:3]
ssl_srv.c 2462: server hello, current time: 4294967295
ssl_srv.c 2550: server hello, session id len.: 32
ssl_srv.c 2553: no session has been resumed
ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c 2562: server hello, compress alg.: 0x00
ssl_srv.c 2172: server hello, secure renegotiation extension
ssl_srv.c 2123: server hello, adding extended master secret extension
ssl_srv.c 2243: server hello, supported_point_formats extension
ssl_srv.c 2621: server hello, total extension length: 15
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 96, out_left: 96
tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=96, apiflags=1)
tcp_out.c  691: tcp_write: queueing 6615:6711
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 2640: <= write server hello
ssl_srv.c 4261: server state: 3
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5331: => write certificate
ssl_tls.c 5383: own certificate
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 600, out_left: 600
tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=600, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_tls.c 5435: <= write certificate
ssl_srv.c 4261: server state: 4
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 3273: => write server key exchange
ssl_srv.c 3051: ECDHE curve: secp384r1
ssl_srv.c 3140: pick hash algorithm 6 for signing
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 180
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 185, out_left: 185
tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=185, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 3357: <= write server key exchange
ssl_srv.c 4261: server state: 5
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 2685: => write certificate request
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 24, out_left: 24
tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=24, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 2835: <= write certificate request
ssl_srv.c 4261: server state: 6
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 3365: => write server hello done
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 9, out_left: 9
tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=9, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 3393: <= write server hello done
ssl_srv.c 4261: server state: 7
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5657: => parse certificate
ssl_tls.c 4313: => read record
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 8096: <= handshake
tcp_out.c 1546: tcp_output_segment: 6615:7529
tcp_out.c 1268: tcp_output: nothing to send (0)
tcp_out.c 1097: tcp_enqueue_flags: queueing 6667:6668 (0x12)
tcp_out.c 1546: tcp_output_segment: 6667:6667
tcp_out.c 1268: tcp_output: nothing to send (0)
tcp_out.c 1268: tcp_output: nothing to send (0)
tcp_out.c 1268: tcp_output: nothing to send (0)
tcp_out.c 1268: tcp_output: nothing to send (0)
ssl_tls.c 8086: => handshake
ssl_srv.c 4261: server state: 7
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5657: => parse certificate
ssl_tls.c 4313: => read record
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 2744: <= fetch input
ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 5, nb_want: 7
ssl_tls.c 2723: in_left: 5, nb_want: 7
ssl_tls.c 2744: <= fetch input
ssl_tls.c 5172: got an alert message, type: [2:46]
ssl_tls.c 5180: is a fatal alert message (msg 46)
ssl_tls.c 8096: <= handshake
ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
httpd.c 2599: http_err: Connection closed., pcb: 20454be0
tcp_out.c 1097: tcp_enqueue_flags: queueing 7529:7530 (0x1)
ssl_tls.c 8936: => free
ssl_tls.c 9001: <= free
tcp_out.c 1546: tcp_output_segment: 7529:7529
tcp_out.c 1268: tcp_output: nothing to send (0)
tcp_out.c 2056: tcp_output: sending ACK for 2844114649
httpd.c 2804: http_accept 20454c0c / 0
tcp_out.c 1268: tcp_output: nothing to send (0)
ssl_tls.c 8086: => handshake
ssl_srv.c 4261: server state: 0
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 4261: server state: 1
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 1213: => parse client hello
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 2744: <= fetch input
ssl_srv.c 1257: client hello v3, message type: 22
ssl_srv.c 1266: client hello v3, message len.: 512
ssl_srv.c 1269: client hello v3, protocol version: [3:1]
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 5, nb_want: 517
ssl_tls.c 2723: in_left: 5, nb_want: 517
ssl_tls.c 2744: <= fetch input
ssl_srv.c 1369: client hello v3, handshake type: 1
ssl_srv.c 1378: client hello v3, handshake len.: 508
ssl_srv.c 1830: unknown extension found: 47802 (ignoring)
ssl_srv.c 1800: found extended master secret extension
ssl_srv.c 1713: found renegotiation extension
ssl_srv.c 1740: found supported elliptic curves extension
ssl_srv.c 1748: found supported point formats extension
ssl_srv.c  377: point format selected: 0
ssl_srv.c 1810: found session ticket extension
ssl_srv.c 1820: found alpn extension
ssl_srv.c 1830: unknown extension found: 5 (ignoring)
ssl_srv.c 1726: found signature_algorithms extension
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
ssl_srv.c 1830: unknown extension found: 18 (ignoring)
ssl_srv.c 1830: unknown extension found: 51 (ignoring)
ssl_srv.c 1830: unknown extension found: 45 (ignoring)
ssl_srv.c 1830: unknown extension found: 43 (ignoring)
ssl_srv.c 1830: unknown extension found: 27 (ignoring)
ssl_srv.c 1830: unknown extension found: 43690 (ignoring)
ssl_srv.c 1830: unknown extension found: 21 (ignoring)
ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c  720: ciphersuite requires certificate
ssl_srv.c  731: candidate certificate chain, certificate
ssl_srv.c  793: selected certificate chain, certificate
ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c 2035: <= parse client hello
ssl_srv.c 4261: server state: 2
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 2419: => write server hello
ssl_srv.c 2453: server hello, chosen version: [3:3]
ssl_srv.c 2462: server hello, current time: 4294967295
ssl_srv.c 2550: server hello, session id len.: 32
ssl_srv.c 2553: no session has been resumed
ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c 2562: server hello, compress alg.: 0x00
ssl_srv.c 2172: server hello, secure renegotiation extension
ssl_srv.c 2123: server hello, adding extended master secret extension
ssl_srv.c 2243: server hello, supported_point_formats extension
ssl_srv.c 2621: server hello, total extension length: 15
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 96, out_left: 96
tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=96, apiflags=1)
tcp_out.c  691: tcp_write: queueing 6668:6764
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 2640: <= write server hello
ssl_srv.c 4261: server state: 3
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5331: => write certificate
ssl_tls.c 5383: own certificate
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 600, out_left: 600
tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=600, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_tls.c 5435: <= write certificate
ssl_srv.c 4261: server state: 4
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 3273: => write server key exchange
ssl_srv.c 3051: ECDHE curve: secp384r1
ssl_srv.c 3140: pick hash algorithm 6 for signing
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 180
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 185, out_left: 185
tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=185, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 3357: <= write server key exchange
ssl_srv.c 4261: server state: 5
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 2685: => write certificate request
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 24, out_left: 24
tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=24, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 2835: <= write certificate request
ssl_srv.c 4261: server state: 6
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 3365: => write server hello done
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 9, out_left: 9
tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=9, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 3393: <= write server hello done
ssl_srv.c 4261: server state: 7
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5657: => parse certificate
ssl_tls.c 4313: => read record
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 8096: <= handshake
tcp_out.c 1546: tcp_output_segment: 6668:7582
tcp_out.c 1268: tcp_output: nothing to send (0)
tcp_out.c 1268: tcp_output: nothing to send (0)
tcp_out.c 1268: tcp_output: nothing to send (0)
tcp_out.c 1546: tcp_output_segment: 6562:6562
tcp_out.c 1268: tcp_output: nothing to send (0)
ssl_tls.c 8086: => handshake
ssl_srv.c 4261: server state: 7
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5657: => parse certificate
ssl_tls.c 4313: => read record
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 2744: <= fetch input
ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 5, nb_want: 7
ssl_tls.c 2723: in_left: 5, nb_want: 7
ssl_tls.c 2744: <= fetch input
ssl_tls.c 5172: got an alert message, type: [2:46]
ssl_tls.c 5180: is a fatal alert message (msg 46)
ssl_tls.c 8096: <= handshake
ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
httpd.c 2599: http_err: Connection closed., pcb: 20454c0c
tcp_out.c 1097: tcp_enqueue_flags: queueing 7582:7583 (0x1)
ssl_tls.c 8936: => free
ssl_tls.c 9001: <= free
tcp_out.c 1546: tcp_output_segment: 7582:7582
tcp_out.c 1268: tcp_output: nothing to send (0)
tcp_out.c 1268: tcp_output: nothing to send (0)
tcp_out.c 2056: tcp_output: sending ACK for 2982664725
httpd.c 2804: http_accept 20454be0 / 0
tcp_out.c 1268: tcp_output: nothing to send (0)
ssl_tls.c 8086: => handshake
ssl_srv.c 4261: server state: 0
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 4261: server state: 1
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 1213: => parse client hello
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 2744: <= fetch input
ssl_srv.c 1257: client hello v3, message type: 22
ssl_srv.c 1266: client hello v3, message len.: 512
ssl_srv.c 1269: client hello v3, protocol version: [3:1]
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 5, nb_want: 517
ssl_tls.c 2723: in_left: 5, nb_want: 517
ssl_tls.c 2744: <= fetch input
ssl_srv.c 1369: client hello v3, handshake type: 1
ssl_srv.c 1378: client hello v3, handshake len.: 508
ssl_srv.c 1830: unknown extension found: 39578 (ignoring)
ssl_srv.c 1800: found extended master secret extension
ssl_srv.c 1713: found renegotiation extension
ssl_srv.c 1740: found supported elliptic curves extension
ssl_srv.c 1748: found supported point formats extension
ssl_srv.c  377: point format selected: 0
ssl_srv.c 1810: found session ticket extension
ssl_srv.c 1820: found alpn extension
ssl_srv.c 1830: unknown extension found: 5 (ignoring)
ssl_srv.c 1726: found signature_algorithms extension
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
ssl_srv.c 1830: unknown extension found: 18 (ignoring)
ssl_srv.c 1830: unknown extension found: 51 (ignoring)
ssl_srv.c 1830: unknown extension found: 45 (ignoring)
ssl_srv.c 1830: unknown extension found: 43 (ignoring)
ssl_srv.c 1830: unknown extension found: 27 (ignoring)
ssl_srv.c 1830: unknown extension found: 56026 (ignoring)
ssl_srv.c 1830: unknown extension found: 21 (ignoring)
ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c  720: ciphersuite requires certificate
ssl_srv.c  731: candidate certificate chain, certificate
ssl_srv.c  793: selected certificate chain, certificate
ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c 2035: <= parse client hello
ssl_srv.c 4261: server state: 2
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 2419: => write server hello
ssl_srv.c 2453: server hello, chosen version: [3:3]
ssl_srv.c 2462: server hello, current time: 4294967295
ssl_srv.c 2550: server hello, session id len.: 32
ssl_srv.c 2553: no session has been resumed
ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c 2562: server hello, compress alg.: 0x00
ssl_srv.c 2172: server hello, secure renegotiation extension
ssl_srv.c 2123: server hello, adding extended master secret extension
ssl_srv.c 2243: server hello, supported_point_formats extension
ssl_srv.c 2621: server hello, total extension length: 15
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 96, out_left: 96
tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=96, apiflags=1)
tcp_out.c  691: tcp_write: queueing 6563:6659
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 2640: <= write server hello
ssl_srv.c 4261: server state: 3
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5331: => write certificate
ssl_tls.c 5383: own certificate
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 600, out_left: 600
tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=600, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_tls.c 5435: <= write certificate
ssl_srv.c 4261: server state: 4
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 3273: => write server key exchange
ssl_srv.c 3051: ECDHE curve: secp384r1
ssl_srv.c 3140: pick hash algorithm 6 for signing
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 181
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 186, out_left: 186
tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=186, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 3357: <= write server key exchange
ssl_srv.c 4261: server state: 5
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 2685: => write certificate request
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 24, out_left: 24
tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=24, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 2835: <= write certificate request
ssl_srv.c 4261: server state: 6
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 3365: => write server hello done
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 9, out_left: 9
tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=9, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 3393: <= write server hello done
ssl_srv.c 4261: server state: 7
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5657: => parse certificate
ssl_tls.c 4313: => read record
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 8096: <= handshake
tcp_out.c 1546: tcp_output_segment: 6563:7478
tcp_out.c 1268: tcp_output: nothing to send (0)
ssl_tls.c 8086: => handshake
ssl_srv.c 4261: server state: 7
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5657: => parse certificate
ssl_tls.c 4313: => read record
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 2744: <= fetch input
ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 5, nb_want: 7
ssl_tls.c 2723: in_left: 5, nb_want: 7
ssl_tls.c 2744: <= fetch input
ssl_tls.c 5172: got an alert message, type: [2:46]
ssl_tls.c 5180: is a fatal alert message (msg 46)
ssl_tls.c 8096: <= handshake
ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
httpd.c 2599: http_err: Connection closed., pcb: 20454be0
tcp_out.c 1097: tcp_enqueue_flags: queueing 7478:7479 (0x1)
ssl_tls.c 8936: => free
ssl_tls.c 9001: <= free

On Tue, Feb 18, 2020 at 8:54 AM Trampas Stern <[hidden email]> wrote:
I figured as much...   I am slow at learning this stuff, and figured adding the note to the forum is good for next guy. 

My next problem is that with https I am having problems transferring data. and getting http_err calls closing connections. 

ttpd.c 2792: http_accept 20453718 / 0
httpd.c 2792: http_accept 204536c0 / 0
httpd.c 2594: http_err: Connection closed.
httpd.c 2594: http_err: Connection closed.
httpd.c 2792: http_accept 204536ec / 0
httpd.c 2792: http_accept 20453744 / 0
httpd.c 2594: http_err: Connection closed.
httpd.c 2792: http_accept 204536c0 / 0
httpd.c 2692: http_recv: pcb=20453744 pbuf=204544f8 err=Ok.
httpd.c 2086: Received 567 bytes
httpd.c 2093: First pbuf
httpd.c 2137: CRLF received, parsing request
httpd.c 2144: Received GET request"
httpd.c 2205: Received "GET" request for URI: "/dashboard.html"
httpd.c 2412: Opening /dashboard.html
httpd.c 2414: Opening /dashboard.html
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 2764: http_recv: data 20411e78 len 2890
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=2890
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 2890 bytes
httpd.c  600: Sent 2890 bytes
httpd.c 1697: send_data end.
httpd.c 2637: http_poll: pcb=20453744 hs=204517ec pcb_state=ESTABLISHED
httpd.c 2670: http_poll: try to send more data
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 15842
httpd.c 1203: Trying to read 1 bytes.
fs.cpp   92: reading SD /dashboard.html: 1
httpd.c 1225: Read 1 bytes.
httpd.c 1228: Sent 1
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 1 bytes
httpd.c  600: Sent 1 bytes
httpd.c 1697: send_data end.
httpd.c 2674: tcp_output
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 15841
httpd.c 1203: Trying to read 2890 bytes.
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 1225: Read 2890 bytes.
httpd.c 1228: Sent 2890
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 2861 bytes
httpd.c  600: Sent 2861 bytes
httpd.c 1697: send_data end.
httpd.c 2692: http_recv: pcb=204536c0 pbuf=20455118 err=Ok.
httpd.c 2086: Received 434 bytes
httpd.c 2093: First pbuf
httpd.c 2137: CRLF received, parsing request
httpd.c 2144: Received GET request"
httpd.c 2205: Received "GET" request for URI: "/css/bootstrap.css"
httpd.c 2412: Opening /css/bootstrap.css
httpd.c 2414: Opening /css/bootstrap.css
fs.cpp   92: reading SD /css/bootstrap.css: 2890
httpd.c 2764: http_recv: data 20411e78 len 2890
httpd.c 1635: /css/bootstrap.css
httpd.c 1636: http_send: pcb=204536c0 hs=20452260 left=2890
httpd.c 1256: writting /css/bootstrap.css
httpd.c  578: Trying to send 2890 bytes
httpd.c  600: Sent 2890 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=29
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 29 bytes
httpd.c  600: Sent 29 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 12951
httpd.c 1203: Trying to read 2890 bytes.
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 1225: Read 2890 bytes.
httpd.c 1228: Sent 2890
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 2890 bytes
httpd.c  600: Sent 2890 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 10061
httpd.c 1203: Trying to read 2890 bytes.
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 1225: Read 2890 bytes.
httpd.c 1228: Sent 2890
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 1432 bytes
httpd.c  600: Sent 1432 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=1458
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 1458 bytes
httpd.c  600: Sent 1458 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 7171
httpd.c 1203: Trying to read 2890 bytes.
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 1225: Read 2890 bytes.
httpd.c 1228: Sent 2890
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 2864 bytes
httpd.c  600: Sent 2864 bytes
httpd.c 1697: send_data end.
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=26
httpd.c 1256: writting /dashboard.html
httpd.c  578: Trying to send 26 bytes
httpd.c  600: Sent 26 bytes
httpd.c 1697: send_data end.
httpd.c 2792: http_accept 20453668 / 0
httpd.c 2610: http_sent 20453744
httpd.c 1635: /dashboard.html
httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
httpd.c 1144: bytes_left 4281
httpd.c 1203: Trying to read 2890 bytes.
fs.cpp   92: reading SD /dashboard.html: 2890
httpd.c 1225: Read 2890 bytes.
httpd.c 1228: Sent 2890 


On Tue, Feb 18, 2020 at 7:32 AM Simon Goldschmidt <[hidden email]> wrote:
Trampas Stern wrote:
> I found that chrome will not work with openssl keys generated by the comments in the code I found I had to generate different keys using the following commands. 
> [..]

Well, the code in the comment did work at some time. I don't think I can keep up with the speed that google changes TLS handling... :-)

Regards,
Simon

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users
Reply | Threaded
Open this post in threaded view
|

Re: mbedtls

wilkxt
What processor do you have, do you have enough RAM?
How do you turn off DEBUG problem occurs?
When the browser downloads each file, a new connection is made, which
consumes RAM. Process httpd for a permanent connection which is only
one handshake.

wt., 18 lut 2020 o 21:48 Trampas Stern <[hidden email]> napisał(a):

>
> Right now the interface sometimes works and sometimes does not not.  I have not found the issue, maybe some one can point me in the right direction?
>
> Thanks
> Trampas
>
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
> ethernet.c  313: Network up IP=192.168.168.156
> tcp_out.c 1097: tcp_enqueue_flags: queueing 6562:6563 (0x12)
> tcp_out.c 1546: tcp_output_segment: 6562:6562
> tcp_out.c 1097: tcp_enqueue_flags: queueing 6614:6615 (0x12)
> tcp_out.c 1546: tcp_output_segment: 6614:6614
> httpd.c 2804: http_accept 20454be0 / 0
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 0
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 4261: server state: 1
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 1213: => parse client hello
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1257: client hello v3, message type: 22
> ssl_srv.c 1266: client hello v3, message len.: 512
> ssl_srv.c 1269: client hello v3, protocol version: [3:1]
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 517
> ssl_tls.c 2723: in_left: 5, nb_want: 517
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1369: client hello v3, handshake type: 1
> ssl_srv.c 1378: client hello v3, handshake len.: 508
> ssl_srv.c 1830: unknown extension found: 19018 (ignoring)
> ssl_srv.c 1800: found extended master secret extension
> ssl_srv.c 1713: found renegotiation extension
> ssl_srv.c 1740: found supported elliptic curves extension
> ssl_srv.c 1748: found supported point formats extension
> ssl_srv.c  377: point format selected: 0
> ssl_srv.c 1810: found session ticket extension
> ssl_srv.c 1820: found alpn extension
> ssl_srv.c 1830: unknown extension found: 5 (ignoring)
> ssl_srv.c 1726: found signature_algorithms extension
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
> ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
> ssl_srv.c 1830: unknown extension found: 18 (ignoring)
> ssl_srv.c 1830: unknown extension found: 51 (ignoring)
> ssl_srv.c 1830: unknown extension found: 45 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43 (ignoring)
> ssl_srv.c 1830: unknown extension found: 27 (ignoring)
> ssl_srv.c 1830: unknown extension found: 35466 (ignoring)
> ssl_srv.c 1830: unknown extension found: 21 (ignoring)
> ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c  720: ciphersuite requires certificate
> ssl_srv.c  731: candidate certificate chain, certificate
> ssl_srv.c  793: selected certificate chain, certificate
> ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2035: <= parse client hello
> ssl_srv.c 4261: server state: 2
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2419: => write server hello
> ssl_srv.c 2453: server hello, chosen version: [3:3]
> ssl_srv.c 2462: server hello, current time: 4294967295
> ssl_srv.c 2550: server hello, session id len.: 32
> ssl_srv.c 2553: no session has been resumed
> ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2562: server hello, compress alg.: 0x00
> ssl_srv.c 2172: server hello, secure renegotiation extension
> ssl_srv.c 2123: server hello, adding extended master secret extension
> ssl_srv.c 2243: server hello, supported_point_formats extension
> ssl_srv.c 2621: server hello, total extension length: 15
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 96, out_left: 96
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=96, apiflags=1)
> tcp_out.c  691: tcp_write: queueing 6615:6711
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2640: <= write server hello
> ssl_srv.c 4261: server state: 3
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5331: => write certificate
> ssl_tls.c 5383: own certificate
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 600, out_left: 600
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=600, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_tls.c 5435: <= write certificate
> ssl_srv.c 4261: server state: 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3273: => write server key exchange
> ssl_srv.c 3051: ECDHE curve: secp384r1
> ssl_srv.c 3140: pick hash algorithm 6 for signing
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 180
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 185, out_left: 185
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=185, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3357: <= write server key exchange
> ssl_srv.c 4261: server state: 5
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2685: => write certificate request
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 24, out_left: 24
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=24, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2835: <= write certificate request
> ssl_srv.c 4261: server state: 6
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3365: => write server hello done
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 9, out_left: 9
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=9, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3393: <= write server hello done
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 8096: <= handshake
> tcp_out.c 1546: tcp_output_segment: 6615:7529
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1097: tcp_enqueue_flags: queueing 6667:6668 (0x12)
> tcp_out.c 1546: tcp_output_segment: 6667:6667
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 7
> ssl_tls.c 2723: in_left: 5, nb_want: 7
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 5172: got an alert message, type: [2:46]
> ssl_tls.c 5180: is a fatal alert message (msg 46)
> ssl_tls.c 8096: <= handshake
> ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
> httpd.c 2599: http_err: Connection closed., pcb: 20454be0
> tcp_out.c 1097: tcp_enqueue_flags: queueing 7529:7530 (0x1)
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
> tcp_out.c 1546: tcp_output_segment: 7529:7529
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 2056: tcp_output: sending ACK for 2844114649
> httpd.c 2804: http_accept 20454c0c / 0
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 0
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 4261: server state: 1
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 1213: => parse client hello
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1257: client hello v3, message type: 22
> ssl_srv.c 1266: client hello v3, message len.: 512
> ssl_srv.c 1269: client hello v3, protocol version: [3:1]
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 517
> ssl_tls.c 2723: in_left: 5, nb_want: 517
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1369: client hello v3, handshake type: 1
> ssl_srv.c 1378: client hello v3, handshake len.: 508
> ssl_srv.c 1830: unknown extension found: 47802 (ignoring)
> ssl_srv.c 1800: found extended master secret extension
> ssl_srv.c 1713: found renegotiation extension
> ssl_srv.c 1740: found supported elliptic curves extension
> ssl_srv.c 1748: found supported point formats extension
> ssl_srv.c  377: point format selected: 0
> ssl_srv.c 1810: found session ticket extension
> ssl_srv.c 1820: found alpn extension
> ssl_srv.c 1830: unknown extension found: 5 (ignoring)
> ssl_srv.c 1726: found signature_algorithms extension
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
> ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
> ssl_srv.c 1830: unknown extension found: 18 (ignoring)
> ssl_srv.c 1830: unknown extension found: 51 (ignoring)
> ssl_srv.c 1830: unknown extension found: 45 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43 (ignoring)
> ssl_srv.c 1830: unknown extension found: 27 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43690 (ignoring)
> ssl_srv.c 1830: unknown extension found: 21 (ignoring)
> ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c  720: ciphersuite requires certificate
> ssl_srv.c  731: candidate certificate chain, certificate
> ssl_srv.c  793: selected certificate chain, certificate
> ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2035: <= parse client hello
> ssl_srv.c 4261: server state: 2
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2419: => write server hello
> ssl_srv.c 2453: server hello, chosen version: [3:3]
> ssl_srv.c 2462: server hello, current time: 4294967295
> ssl_srv.c 2550: server hello, session id len.: 32
> ssl_srv.c 2553: no session has been resumed
> ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2562: server hello, compress alg.: 0x00
> ssl_srv.c 2172: server hello, secure renegotiation extension
> ssl_srv.c 2123: server hello, adding extended master secret extension
> ssl_srv.c 2243: server hello, supported_point_formats extension
> ssl_srv.c 2621: server hello, total extension length: 15
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 96, out_left: 96
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=96, apiflags=1)
> tcp_out.c  691: tcp_write: queueing 6668:6764
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2640: <= write server hello
> ssl_srv.c 4261: server state: 3
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5331: => write certificate
> ssl_tls.c 5383: own certificate
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 600, out_left: 600
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=600, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_tls.c 5435: <= write certificate
> ssl_srv.c 4261: server state: 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3273: => write server key exchange
> ssl_srv.c 3051: ECDHE curve: secp384r1
> ssl_srv.c 3140: pick hash algorithm 6 for signing
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 180
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 185, out_left: 185
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=185, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3357: <= write server key exchange
> ssl_srv.c 4261: server state: 5
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2685: => write certificate request
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 24, out_left: 24
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=24, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2835: <= write certificate request
> ssl_srv.c 4261: server state: 6
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3365: => write server hello done
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 9, out_left: 9
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=9, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3393: <= write server hello done
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 8096: <= handshake
> tcp_out.c 1546: tcp_output_segment: 6668:7582
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1546: tcp_output_segment: 6562:6562
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 7
> ssl_tls.c 2723: in_left: 5, nb_want: 7
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 5172: got an alert message, type: [2:46]
> ssl_tls.c 5180: is a fatal alert message (msg 46)
> ssl_tls.c 8096: <= handshake
> ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
> httpd.c 2599: http_err: Connection closed., pcb: 20454c0c
> tcp_out.c 1097: tcp_enqueue_flags: queueing 7582:7583 (0x1)
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
> tcp_out.c 1546: tcp_output_segment: 7582:7582
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 2056: tcp_output: sending ACK for 2982664725
> httpd.c 2804: http_accept 20454be0 / 0
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 0
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 4261: server state: 1
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 1213: => parse client hello
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1257: client hello v3, message type: 22
> ssl_srv.c 1266: client hello v3, message len.: 512
> ssl_srv.c 1269: client hello v3, protocol version: [3:1]
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 517
> ssl_tls.c 2723: in_left: 5, nb_want: 517
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1369: client hello v3, handshake type: 1
> ssl_srv.c 1378: client hello v3, handshake len.: 508
> ssl_srv.c 1830: unknown extension found: 39578 (ignoring)
> ssl_srv.c 1800: found extended master secret extension
> ssl_srv.c 1713: found renegotiation extension
> ssl_srv.c 1740: found supported elliptic curves extension
> ssl_srv.c 1748: found supported point formats extension
> ssl_srv.c  377: point format selected: 0
> ssl_srv.c 1810: found session ticket extension
> ssl_srv.c 1820: found alpn extension
> ssl_srv.c 1830: unknown extension found: 5 (ignoring)
> ssl_srv.c 1726: found signature_algorithms extension
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
> ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
> ssl_srv.c 1830: unknown extension found: 18 (ignoring)
> ssl_srv.c 1830: unknown extension found: 51 (ignoring)
> ssl_srv.c 1830: unknown extension found: 45 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43 (ignoring)
> ssl_srv.c 1830: unknown extension found: 27 (ignoring)
> ssl_srv.c 1830: unknown extension found: 56026 (ignoring)
> ssl_srv.c 1830: unknown extension found: 21 (ignoring)
> ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c  720: ciphersuite requires certificate
> ssl_srv.c  731: candidate certificate chain, certificate
> ssl_srv.c  793: selected certificate chain, certificate
> ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2035: <= parse client hello
> ssl_srv.c 4261: server state: 2
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2419: => write server hello
> ssl_srv.c 2453: server hello, chosen version: [3:3]
> ssl_srv.c 2462: server hello, current time: 4294967295
> ssl_srv.c 2550: server hello, session id len.: 32
> ssl_srv.c 2553: no session has been resumed
> ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2562: server hello, compress alg.: 0x00
> ssl_srv.c 2172: server hello, secure renegotiation extension
> ssl_srv.c 2123: server hello, adding extended master secret extension
> ssl_srv.c 2243: server hello, supported_point_formats extension
> ssl_srv.c 2621: server hello, total extension length: 15
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 96, out_left: 96
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=96, apiflags=1)
> tcp_out.c  691: tcp_write: queueing 6563:6659
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2640: <= write server hello
> ssl_srv.c 4261: server state: 3
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5331: => write certificate
> ssl_tls.c 5383: own certificate
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 600, out_left: 600
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=600, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_tls.c 5435: <= write certificate
> ssl_srv.c 4261: server state: 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3273: => write server key exchange
> ssl_srv.c 3051: ECDHE curve: secp384r1
> ssl_srv.c 3140: pick hash algorithm 6 for signing
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 181
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 186, out_left: 186
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=186, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3357: <= write server key exchange
> ssl_srv.c 4261: server state: 5
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2685: => write certificate request
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 24, out_left: 24
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=24, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2835: <= write certificate request
> ssl_srv.c 4261: server state: 6
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3365: => write server hello done
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 9, out_left: 9
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=9, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3393: <= write server hello done
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 8096: <= handshake
> tcp_out.c 1546: tcp_output_segment: 6563:7478
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 7
> ssl_tls.c 2723: in_left: 5, nb_want: 7
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 5172: got an alert message, type: [2:46]
> ssl_tls.c 5180: is a fatal alert message (msg 46)
> ssl_tls.c 8096: <= handshake
> ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
> httpd.c 2599: http_err: Connection closed., pcb: 20454be0
> tcp_out.c 1097: tcp_enqueue_flags: queueing 7478:7479 (0x1)
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
>
> On Tue, Feb 18, 2020 at 8:54 AM Trampas Stern <[hidden email]> wrote:
>>
>> I figured as much...   I am slow at learning this stuff, and figured adding the note to the forum is good for next guy.
>>
>> My next problem is that with https I am having problems transferring data. and getting http_err calls closing connections.
>>
>> ttpd.c 2792: http_accept 20453718 / 0
>> httpd.c 2792: http_accept 204536c0 / 0
>> httpd.c 2594: http_err: Connection closed.
>> httpd.c 2594: http_err: Connection closed.
>> httpd.c 2792: http_accept 204536ec / 0
>> httpd.c 2792: http_accept 20453744 / 0
>> httpd.c 2594: http_err: Connection closed.
>> httpd.c 2792: http_accept 204536c0 / 0
>> httpd.c 2692: http_recv: pcb=20453744 pbuf=204544f8 err=Ok.
>> httpd.c 2086: Received 567 bytes
>> httpd.c 2093: First pbuf
>> httpd.c 2137: CRLF received, parsing request
>> httpd.c 2144: Received GET request"
>> httpd.c 2205: Received "GET" request for URI: "/dashboard.html"
>> httpd.c 2412: Opening /dashboard.html
>> httpd.c 2414: Opening /dashboard.html
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 2764: http_recv: data 20411e78 len 2890
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2890 bytes
>> httpd.c  600: Sent 2890 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2637: http_poll: pcb=20453744 hs=204517ec pcb_state=ESTABLISHED
>> httpd.c 2670: http_poll: try to send more data
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 15842
>> httpd.c 1203: Trying to read 1 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 1
>> httpd.c 1225: Read 1 bytes.
>> httpd.c 1228: Sent 1
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 1 bytes
>> httpd.c  600: Sent 1 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2674: tcp_output
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 15841
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2861 bytes
>> httpd.c  600: Sent 2861 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2692: http_recv: pcb=204536c0 pbuf=20455118 err=Ok.
>> httpd.c 2086: Received 434 bytes
>> httpd.c 2093: First pbuf
>> httpd.c 2137: CRLF received, parsing request
>> httpd.c 2144: Received GET request"
>> httpd.c 2205: Received "GET" request for URI: "/css/bootstrap.css"
>> httpd.c 2412: Opening /css/bootstrap.css
>> httpd.c 2414: Opening /css/bootstrap.css
>> fs.cpp   92: reading SD /css/bootstrap.css: 2890
>> httpd.c 2764: http_recv: data 20411e78 len 2890
>> httpd.c 1635: /css/bootstrap.css
>> httpd.c 1636: http_send: pcb=204536c0 hs=20452260 left=2890
>> httpd.c 1256: writting /css/bootstrap.css
>> httpd.c  578: Trying to send 2890 bytes
>> httpd.c  600: Sent 2890 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=29
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 29 bytes
>> httpd.c  600: Sent 29 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 12951
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2890 bytes
>> httpd.c  600: Sent 2890 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 10061
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 1432 bytes
>> httpd.c  600: Sent 1432 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=1458
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 1458 bytes
>> httpd.c  600: Sent 1458 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 7171
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2864 bytes
>> httpd.c  600: Sent 2864 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=26
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 26 bytes
>> httpd.c  600: Sent 26 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2792: http_accept 20453668 / 0
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 4281
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>>
>>
>> On Tue, Feb 18, 2020 at 7:32 AM Simon Goldschmidt <[hidden email]> wrote:
>>>
>>> Trampas Stern wrote:
>>> > I found that chrome will not work with openssl keys generated by the comments in the code I found I had to generate different keys using the following commands.
>>> > [..]
>>>
>>> Well, the code in the comment did work at some time. I don't think I can keep up with the speed that google changes TLS handling... :-)
>>>
>>> Regards,
>>> Simon
>>>
>>> _______________________________________________
>>> lwip-users mailing list
>>> [hidden email]
>>> https://lists.nongnu.org/mailman/listinfo/lwip-users
>
> _______________________________________________
> lwip-users mailing list
> [hidden email]
> https://lists.nongnu.org/mailman/listinfo/lwip-users



--
Pozdrawiam
Tomek

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users
Reply | Threaded
Open this post in threaded view
|

Re: mbedtls

Trampas Stern
The processor is the ATSAME70 with 384K SRAM, out of which the stack/heap is 250k so less than 130k is being used by static allocation.  The web server works without https, and I have it setup for 10 connections. 

The problem appears to be worse with DEBUG messaging off. However I do not have quantifiable data to prove this. 

I am still learning about encryption but it appears that some connections are failing handshake.

httpd.c 2804: http_accept 20454b04 / 0
tcp_out.c 1268: tcp_output: nothing to send (0)
ssl_tls.c 8086: => handshake
ssl_srv.c 4261: server state: 0
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 4261: server state: 1
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 1213: => parse client hello
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 2744: <= fetch input
ssl_srv.c 1257: client hello v3, message type: 22
ssl_srv.c 1266: client hello v3, message len.: 512
ssl_srv.c 1269: client hello v3, protocol version: [3:1]
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 5, nb_want: 517
ssl_tls.c 2723: in_left: 5, nb_want: 517
ssl_tls.c 2744: <= fetch input
ssl_srv.c 1369: client hello v3, handshake type: 1
ssl_srv.c 1378: client hello v3, handshake len.: 508
ssl_srv.c 1830: unknown extension found: 51914 (ignoring)
ssl_srv.c 1830: unknown extension found: 23 (ignoring)
ssl_srv.c 1713: found renegotiation extension
ssl_srv.c 1740: found supported elliptic curves extension
ssl_srv.c 1748: found supported point formats extension
ssl_srv.c  377: point format selected: 0
ssl_srv.c 1830: unknown extension found: 35 (ignoring)
ssl_srv.c 1830: unknown extension found: 16 (ignoring)
ssl_srv.c 1830: unknown extension found: 5 (ignoring)
ssl_srv.c 1726: found signature_algorithms extension
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
ssl_srv.c 1830: unknown extension found: 18 (ignoring)
ssl_srv.c 1830: unknown extension found: 51 (ignoring)
ssl_srv.c 1830: unknown extension found: 45 (ignoring)
ssl_srv.c 1830: unknown extension found: 43 (ignoring)
ssl_srv.c 1830: unknown extension found: 27 (ignoring)
ssl_srv.c 1830: unknown extension found: 56026 (ignoring)
ssl_srv.c 1830: unknown extension found: 21 (ignoring)
ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c  720: ciphersuite requires certificate
ssl_srv.c  731: candidate certificate chain, certificate
ssl_srv.c  793: selected certificate chain, certificate
ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c 2035: <= parse client hello
ssl_srv.c 4261: server state: 2
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 2419: => write server hello
ssl_srv.c 2453: server hello, chosen version: [3:3]
ssl_srv.c 2462: server hello, current time: 4294967295
ssl_srv.c 2550: server hello, session id len.: 32
ssl_srv.c 2553: no session has been resumed
ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c 2562: server hello, compress alg.: 0x00
ssl_srv.c 2172: server hello, secure renegotiation extension
ssl_srv.c 2243: server hello, supported_point_formats extension
ssl_srv.c 2621: server hello, total extension length: 11
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 87
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 92, out_left: 92
tcp_out.c  428: tcp_write(pcb=20454824, data=20414f28, len=92, apiflags=1)
tcp_out.c  691: tcp_write: queueing 31447:31539
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 2640: <= write server hello
ssl_srv.c 4261: server state: 3
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5331: => write certificate
ssl_tls.c 5383: own certificate
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 600, out_left: 600
tcp_out.c  428: tcp_write(pcb=20454824, data=20414f28, len=600, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_tls.c 5435: <= write certificate
ssl_srv.c 4261: server state: 4
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 3273: => write server key exchange
ssl_srv.c 3051: ECDHE curve: secp384r1
ssl_srv.c 3140: pick hash algorithm 6 for signing
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 181
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 186, out_left: 186
tcp_out.c  428: tcp_write(pcb=20454824, data=20414f28, len=186, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 3357: <= write server key exchange
ssl_srv.c 4261: server state: 5
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 2685: => write certificate request
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 24, out_left: 24
tcp_out.c  428: tcp_write(pcb=20454824, data=20414f28, len=24, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 2835: <= write certificate request
ssl_srv.c 4261: server state: 6
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 3365: => write server hello done
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 9, out_left: 9
tcp_out.c  428: tcp_write(pcb=20454824, data=20414f28, len=9, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 3393: <= write server hello done
ssl_srv.c 4261: server state: 7
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5657: => parse certificate
ssl_tls.c 4313: => read record
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 8096: <= handshake
tcp_out.c 1546: tcp_output_segment: 31447:32358
ssl_tls.c 8086: => handshake
ssl_srv.c 4261: server state: 7
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5657: => parse certificate
ssl_tls.c 4313: => read record
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 2744: <= fetch input
ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 5, nb_want: 7
ssl_tls.c 2723: in_left: 5, nb_want: 7
ssl_tls.c 2744: <= fetch input
ssl_tls.c 5172: got an alert message, type: [2:46]
ssl_tls.c 5180: is a fatal alert message (msg 46)
ssl_tls.c 8096: <= handshake
ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780

On Wed, Feb 19, 2020 at 3:55 AM tomek wilkxt <[hidden email]> wrote:
What processor do you have, do you have enough RAM?
How do you turn off DEBUG problem occurs?
When the browser downloads each file, a new connection is made, which
consumes RAM. Process httpd for a permanent connection which is only
one handshake.

wt., 18 lut 2020 o 21:48 Trampas Stern <[hidden email]> napisał(a):
>
> Right now the interface sometimes works and sometimes does not not.  I have not found the issue, maybe some one can point me in the right direction?
>
> Thanks
> Trampas
>
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
> ethernet.c  313: Network up IP=192.168.168.156
> tcp_out.c 1097: tcp_enqueue_flags: queueing 6562:6563 (0x12)
> tcp_out.c 1546: tcp_output_segment: 6562:6562
> tcp_out.c 1097: tcp_enqueue_flags: queueing 6614:6615 (0x12)
> tcp_out.c 1546: tcp_output_segment: 6614:6614
> httpd.c 2804: http_accept 20454be0 / 0
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 0
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 4261: server state: 1
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 1213: => parse client hello
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1257: client hello v3, message type: 22
> ssl_srv.c 1266: client hello v3, message len.: 512
> ssl_srv.c 1269: client hello v3, protocol version: [3:1]
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 517
> ssl_tls.c 2723: in_left: 5, nb_want: 517
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1369: client hello v3, handshake type: 1
> ssl_srv.c 1378: client hello v3, handshake len.: 508
> ssl_srv.c 1830: unknown extension found: 19018 (ignoring)
> ssl_srv.c 1800: found extended master secret extension
> ssl_srv.c 1713: found renegotiation extension
> ssl_srv.c 1740: found supported elliptic curves extension
> ssl_srv.c 1748: found supported point formats extension
> ssl_srv.c  377: point format selected: 0
> ssl_srv.c 1810: found session ticket extension
> ssl_srv.c 1820: found alpn extension
> ssl_srv.c 1830: unknown extension found: 5 (ignoring)
> ssl_srv.c 1726: found signature_algorithms extension
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
> ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
> ssl_srv.c 1830: unknown extension found: 18 (ignoring)
> ssl_srv.c 1830: unknown extension found: 51 (ignoring)
> ssl_srv.c 1830: unknown extension found: 45 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43 (ignoring)
> ssl_srv.c 1830: unknown extension found: 27 (ignoring)
> ssl_srv.c 1830: unknown extension found: 35466 (ignoring)
> ssl_srv.c 1830: unknown extension found: 21 (ignoring)
> ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c  720: ciphersuite requires certificate
> ssl_srv.c  731: candidate certificate chain, certificate
> ssl_srv.c  793: selected certificate chain, certificate
> ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2035: <= parse client hello
> ssl_srv.c 4261: server state: 2
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2419: => write server hello
> ssl_srv.c 2453: server hello, chosen version: [3:3]
> ssl_srv.c 2462: server hello, current time: 4294967295
> ssl_srv.c 2550: server hello, session id len.: 32
> ssl_srv.c 2553: no session has been resumed
> ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2562: server hello, compress alg.: 0x00
> ssl_srv.c 2172: server hello, secure renegotiation extension
> ssl_srv.c 2123: server hello, adding extended master secret extension
> ssl_srv.c 2243: server hello, supported_point_formats extension
> ssl_srv.c 2621: server hello, total extension length: 15
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 96, out_left: 96
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=96, apiflags=1)
> tcp_out.c  691: tcp_write: queueing 6615:6711
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2640: <= write server hello
> ssl_srv.c 4261: server state: 3
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5331: => write certificate
> ssl_tls.c 5383: own certificate
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 600, out_left: 600
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=600, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_tls.c 5435: <= write certificate
> ssl_srv.c 4261: server state: 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3273: => write server key exchange
> ssl_srv.c 3051: ECDHE curve: secp384r1
> ssl_srv.c 3140: pick hash algorithm 6 for signing
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 180
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 185, out_left: 185
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=185, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3357: <= write server key exchange
> ssl_srv.c 4261: server state: 5
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2685: => write certificate request
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 24, out_left: 24
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=24, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2835: <= write certificate request
> ssl_srv.c 4261: server state: 6
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3365: => write server hello done
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 9, out_left: 9
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=9, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3393: <= write server hello done
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 8096: <= handshake
> tcp_out.c 1546: tcp_output_segment: 6615:7529
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1097: tcp_enqueue_flags: queueing 6667:6668 (0x12)
> tcp_out.c 1546: tcp_output_segment: 6667:6667
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 7
> ssl_tls.c 2723: in_left: 5, nb_want: 7
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 5172: got an alert message, type: [2:46]
> ssl_tls.c 5180: is a fatal alert message (msg 46)
> ssl_tls.c 8096: <= handshake
> ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
> httpd.c 2599: http_err: Connection closed., pcb: 20454be0
> tcp_out.c 1097: tcp_enqueue_flags: queueing 7529:7530 (0x1)
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
> tcp_out.c 1546: tcp_output_segment: 7529:7529
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 2056: tcp_output: sending ACK for 2844114649
> httpd.c 2804: http_accept 20454c0c / 0
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 0
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 4261: server state: 1
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 1213: => parse client hello
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1257: client hello v3, message type: 22
> ssl_srv.c 1266: client hello v3, message len.: 512
> ssl_srv.c 1269: client hello v3, protocol version: [3:1]
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 517
> ssl_tls.c 2723: in_left: 5, nb_want: 517
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1369: client hello v3, handshake type: 1
> ssl_srv.c 1378: client hello v3, handshake len.: 508
> ssl_srv.c 1830: unknown extension found: 47802 (ignoring)
> ssl_srv.c 1800: found extended master secret extension
> ssl_srv.c 1713: found renegotiation extension
> ssl_srv.c 1740: found supported elliptic curves extension
> ssl_srv.c 1748: found supported point formats extension
> ssl_srv.c  377: point format selected: 0
> ssl_srv.c 1810: found session ticket extension
> ssl_srv.c 1820: found alpn extension
> ssl_srv.c 1830: unknown extension found: 5 (ignoring)
> ssl_srv.c 1726: found signature_algorithms extension
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
> ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
> ssl_srv.c 1830: unknown extension found: 18 (ignoring)
> ssl_srv.c 1830: unknown extension found: 51 (ignoring)
> ssl_srv.c 1830: unknown extension found: 45 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43 (ignoring)
> ssl_srv.c 1830: unknown extension found: 27 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43690 (ignoring)
> ssl_srv.c 1830: unknown extension found: 21 (ignoring)
> ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c  720: ciphersuite requires certificate
> ssl_srv.c  731: candidate certificate chain, certificate
> ssl_srv.c  793: selected certificate chain, certificate
> ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2035: <= parse client hello
> ssl_srv.c 4261: server state: 2
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2419: => write server hello
> ssl_srv.c 2453: server hello, chosen version: [3:3]
> ssl_srv.c 2462: server hello, current time: 4294967295
> ssl_srv.c 2550: server hello, session id len.: 32
> ssl_srv.c 2553: no session has been resumed
> ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2562: server hello, compress alg.: 0x00
> ssl_srv.c 2172: server hello, secure renegotiation extension
> ssl_srv.c 2123: server hello, adding extended master secret extension
> ssl_srv.c 2243: server hello, supported_point_formats extension
> ssl_srv.c 2621: server hello, total extension length: 15
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 96, out_left: 96
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=96, apiflags=1)
> tcp_out.c  691: tcp_write: queueing 6668:6764
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2640: <= write server hello
> ssl_srv.c 4261: server state: 3
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5331: => write certificate
> ssl_tls.c 5383: own certificate
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 600, out_left: 600
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=600, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_tls.c 5435: <= write certificate
> ssl_srv.c 4261: server state: 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3273: => write server key exchange
> ssl_srv.c 3051: ECDHE curve: secp384r1
> ssl_srv.c 3140: pick hash algorithm 6 for signing
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 180
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 185, out_left: 185
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=185, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3357: <= write server key exchange
> ssl_srv.c 4261: server state: 5
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2685: => write certificate request
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 24, out_left: 24
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=24, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2835: <= write certificate request
> ssl_srv.c 4261: server state: 6
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3365: => write server hello done
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 9, out_left: 9
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=9, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3393: <= write server hello done
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 8096: <= handshake
> tcp_out.c 1546: tcp_output_segment: 6668:7582
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1546: tcp_output_segment: 6562:6562
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 7
> ssl_tls.c 2723: in_left: 5, nb_want: 7
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 5172: got an alert message, type: [2:46]
> ssl_tls.c 5180: is a fatal alert message (msg 46)
> ssl_tls.c 8096: <= handshake
> ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
> httpd.c 2599: http_err: Connection closed., pcb: 20454c0c
> tcp_out.c 1097: tcp_enqueue_flags: queueing 7582:7583 (0x1)
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
> tcp_out.c 1546: tcp_output_segment: 7582:7582
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 2056: tcp_output: sending ACK for 2982664725
> httpd.c 2804: http_accept 20454be0 / 0
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 0
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 4261: server state: 1
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 1213: => parse client hello
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1257: client hello v3, message type: 22
> ssl_srv.c 1266: client hello v3, message len.: 512
> ssl_srv.c 1269: client hello v3, protocol version: [3:1]
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 517
> ssl_tls.c 2723: in_left: 5, nb_want: 517
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1369: client hello v3, handshake type: 1
> ssl_srv.c 1378: client hello v3, handshake len.: 508
> ssl_srv.c 1830: unknown extension found: 39578 (ignoring)
> ssl_srv.c 1800: found extended master secret extension
> ssl_srv.c 1713: found renegotiation extension
> ssl_srv.c 1740: found supported elliptic curves extension
> ssl_srv.c 1748: found supported point formats extension
> ssl_srv.c  377: point format selected: 0
> ssl_srv.c 1810: found session ticket extension
> ssl_srv.c 1820: found alpn extension
> ssl_srv.c 1830: unknown extension found: 5 (ignoring)
> ssl_srv.c 1726: found signature_algorithms extension
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
> ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
> ssl_srv.c 1830: unknown extension found: 18 (ignoring)
> ssl_srv.c 1830: unknown extension found: 51 (ignoring)
> ssl_srv.c 1830: unknown extension found: 45 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43 (ignoring)
> ssl_srv.c 1830: unknown extension found: 27 (ignoring)
> ssl_srv.c 1830: unknown extension found: 56026 (ignoring)
> ssl_srv.c 1830: unknown extension found: 21 (ignoring)
> ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c  720: ciphersuite requires certificate
> ssl_srv.c  731: candidate certificate chain, certificate
> ssl_srv.c  793: selected certificate chain, certificate
> ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2035: <= parse client hello
> ssl_srv.c 4261: server state: 2
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2419: => write server hello
> ssl_srv.c 2453: server hello, chosen version: [3:3]
> ssl_srv.c 2462: server hello, current time: 4294967295
> ssl_srv.c 2550: server hello, session id len.: 32
> ssl_srv.c 2553: no session has been resumed
> ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2562: server hello, compress alg.: 0x00
> ssl_srv.c 2172: server hello, secure renegotiation extension
> ssl_srv.c 2123: server hello, adding extended master secret extension
> ssl_srv.c 2243: server hello, supported_point_formats extension
> ssl_srv.c 2621: server hello, total extension length: 15
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 96, out_left: 96
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=96, apiflags=1)
> tcp_out.c  691: tcp_write: queueing 6563:6659
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2640: <= write server hello
> ssl_srv.c 4261: server state: 3
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5331: => write certificate
> ssl_tls.c 5383: own certificate
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 600, out_left: 600
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=600, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_tls.c 5435: <= write certificate
> ssl_srv.c 4261: server state: 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3273: => write server key exchange
> ssl_srv.c 3051: ECDHE curve: secp384r1
> ssl_srv.c 3140: pick hash algorithm 6 for signing
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 181
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 186, out_left: 186
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=186, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3357: <= write server key exchange
> ssl_srv.c 4261: server state: 5
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2685: => write certificate request
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 24, out_left: 24
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=24, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2835: <= write certificate request
> ssl_srv.c 4261: server state: 6
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3365: => write server hello done
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 9, out_left: 9
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=9, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3393: <= write server hello done
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 8096: <= handshake
> tcp_out.c 1546: tcp_output_segment: 6563:7478
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 7
> ssl_tls.c 2723: in_left: 5, nb_want: 7
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 5172: got an alert message, type: [2:46]
> ssl_tls.c 5180: is a fatal alert message (msg 46)
> ssl_tls.c 8096: <= handshake
> ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
> httpd.c 2599: http_err: Connection closed., pcb: 20454be0
> tcp_out.c 1097: tcp_enqueue_flags: queueing 7478:7479 (0x1)
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
>
> On Tue, Feb 18, 2020 at 8:54 AM Trampas Stern <[hidden email]> wrote:
>>
>> I figured as much...   I am slow at learning this stuff, and figured adding the note to the forum is good for next guy.
>>
>> My next problem is that with https I am having problems transferring data. and getting http_err calls closing connections.
>>
>> ttpd.c 2792: http_accept 20453718 / 0
>> httpd.c 2792: http_accept 204536c0 / 0
>> httpd.c 2594: http_err: Connection closed.
>> httpd.c 2594: http_err: Connection closed.
>> httpd.c 2792: http_accept 204536ec / 0
>> httpd.c 2792: http_accept 20453744 / 0
>> httpd.c 2594: http_err: Connection closed.
>> httpd.c 2792: http_accept 204536c0 / 0
>> httpd.c 2692: http_recv: pcb=20453744 pbuf=204544f8 err=Ok.
>> httpd.c 2086: Received 567 bytes
>> httpd.c 2093: First pbuf
>> httpd.c 2137: CRLF received, parsing request
>> httpd.c 2144: Received GET request"
>> httpd.c 2205: Received "GET" request for URI: "/dashboard.html"
>> httpd.c 2412: Opening /dashboard.html
>> httpd.c 2414: Opening /dashboard.html
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 2764: http_recv: data 20411e78 len 2890
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2890 bytes
>> httpd.c  600: Sent 2890 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2637: http_poll: pcb=20453744 hs=204517ec pcb_state=ESTABLISHED
>> httpd.c 2670: http_poll: try to send more data
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 15842
>> httpd.c 1203: Trying to read 1 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 1
>> httpd.c 1225: Read 1 bytes.
>> httpd.c 1228: Sent 1
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 1 bytes
>> httpd.c  600: Sent 1 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2674: tcp_output
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 15841
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2861 bytes
>> httpd.c  600: Sent 2861 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2692: http_recv: pcb=204536c0 pbuf=20455118 err=Ok.
>> httpd.c 2086: Received 434 bytes
>> httpd.c 2093: First pbuf
>> httpd.c 2137: CRLF received, parsing request
>> httpd.c 2144: Received GET request"
>> httpd.c 2205: Received "GET" request for URI: "/css/bootstrap.css"
>> httpd.c 2412: Opening /css/bootstrap.css
>> httpd.c 2414: Opening /css/bootstrap.css
>> fs.cpp   92: reading SD /css/bootstrap.css: 2890
>> httpd.c 2764: http_recv: data 20411e78 len 2890
>> httpd.c 1635: /css/bootstrap.css
>> httpd.c 1636: http_send: pcb=204536c0 hs=20452260 left=2890
>> httpd.c 1256: writting /css/bootstrap.css
>> httpd.c  578: Trying to send 2890 bytes
>> httpd.c  600: Sent 2890 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=29
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 29 bytes
>> httpd.c  600: Sent 29 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 12951
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2890 bytes
>> httpd.c  600: Sent 2890 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 10061
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 1432 bytes
>> httpd.c  600: Sent 1432 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=1458
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 1458 bytes
>> httpd.c  600: Sent 1458 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 7171
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2864 bytes
>> httpd.c  600: Sent 2864 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=26
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 26 bytes
>> httpd.c  600: Sent 26 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2792: http_accept 20453668 / 0
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 4281
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>>
>>
>> On Tue, Feb 18, 2020 at 7:32 AM Simon Goldschmidt <[hidden email]> wrote:
>>>
>>> Trampas Stern wrote:
>>> > I found that chrome will not work with openssl keys generated by the comments in the code I found I had to generate different keys using the following commands.
>>> > [..]
>>>
>>> Well, the code in the comment did work at some time. I don't think I can keep up with the speed that google changes TLS handling... :-)
>>>
>>> Regards,
>>> Simon
>>>
>>> _______________________________________________
>>> lwip-users mailing list
>>> [hidden email]
>>> https://lists.nongnu.org/mailman/listinfo/lwip-users
>
> _______________________________________________
> lwip-users mailing list
> [hidden email]
> https://lists.nongnu.org/mailman/listinfo/lwip-users



--
Pozdrawiam
Tomek

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users
Reply | Threaded
Open this post in threaded view
|

Re: mbedtls

kbreining

Hello,

guess we are struggling with the same issue. I am using a TIVA TM4C129 Cortex M4 processor with 256K RAM. I can see that you connection also sometimes drops with an alert 2/46. I have activated the mbedTLS debugging and can see that this always happens after unsuccessfully trying to allocate a buffer of 16kByte. I have now reduced the number of connections down to 4 - although my webpages contain a lot of JavaScript so that the browser tries to open more than 10 connections. But this is no issue. TCP will just not send an ACK on the received SYN, so the browser tries again later. For me this solved at least this issue. There are still others. As Mario said on your other thread: it seems it is a long way to go to optimize all.

 

Klaus

 

 

 

-----Original-Nachricht-----

Betreff: Re: [lwip-users] mbedtls

Datum: 2020-02-19T12:42:36+0100

Von: "Trampas Stern" <[hidden email]>

An: "Mailing list for lwIP users" <[hidden email]>

 

 

 

The processor is the ATSAME70 with 384K SRAM, out of which the stack/heap is 250k so less than 130k is being used by static allocation.  The web server works without https, and I have it setup for 10 connections. 
 
The problem appears to be worse with DEBUG messaging off. However I do not have quantifiable data to prove this. 
 
I am still learning about encryption but it appears that some connections are failing handshake.
 
httpd.c 2804: http_accept 20454b04 / 0
tcp_out.c 1268: tcp_output: nothing to send (0)
ssl_tls.c 8086: => handshake
ssl_srv.c 4261: server state: 0
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 4261: server state: 1
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 1213: => parse client hello
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 2744: <= fetch input
ssl_srv.c 1257: client hello v3, message type: 22
ssl_srv.c 1266: client hello v3, message len.: 512
ssl_srv.c 1269: client hello v3, protocol version: [3:1]
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 5, nb_want: 517
ssl_tls.c 2723: in_left: 5, nb_want: 517
ssl_tls.c 2744: <= fetch input
ssl_srv.c 1369: client hello v3, handshake type: 1
ssl_srv.c 1378: client hello v3, handshake len.: 508
ssl_srv.c 1830: unknown extension found: 51914 (ignoring)
ssl_srv.c 1830: unknown extension found: 23 (ignoring)
ssl_srv.c 1713: found renegotiation extension
ssl_srv.c 1740: found supported elliptic curves extension
ssl_srv.c 1748: found supported point formats extension
ssl_srv.c  377: point format selected: 0
ssl_srv.c 1830: unknown extension found: 35 (ignoring)
ssl_srv.c 1830: unknown extension found: 16 (ignoring)
ssl_srv.c 1830: unknown extension found: 5 (ignoring)
ssl_srv.c 1726: found signature_algorithms extension
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
ssl_srv.c 1830: unknown extension found: 18 (ignoring)
ssl_srv.c 1830: unknown extension found: 51 (ignoring)
ssl_srv.c 1830: unknown extension found: 45 (ignoring)
ssl_srv.c 1830: unknown extension found: 43 (ignoring)
ssl_srv.c 1830: unknown extension found: 27 (ignoring)
ssl_srv.c 1830: unknown extension found: 56026 (ignoring)
ssl_srv.c 1830: unknown extension found: 21 (ignoring)
ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c  720: ciphersuite requires certificate
ssl_srv.c  731: candidate certificate chain, certificate
ssl_srv.c  793: selected certificate chain, certificate
ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c 2035: <= parse client hello
ssl_srv.c 4261: server state: 2
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 2419: => write server hello
ssl_srv.c 2453: server hello, chosen version: [3:3]
ssl_srv.c 2462: server hello, current time: 4294967295
ssl_srv.c 2550: server hello, session id len.: 32
ssl_srv.c 2553: no session has been resumed
ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
ssl_srv.c 2562: server hello, compress alg.: 0x00
ssl_srv.c 2172: server hello, secure renegotiation extension
ssl_srv.c 2243: server hello, supported_point_formats extension
ssl_srv.c 2621: server hello, total extension length: 11
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 87
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 92, out_left: 92
tcp_out.c  428: tcp_write(pcb=20454824, data=20414f28, len=92, apiflags=1)
tcp_out.c  691: tcp_write: queueing 31447:31539
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 2640: <= write server hello
ssl_srv.c 4261: server state: 3
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5331: => write certificate
ssl_tls.c 5383: own certificate
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 600, out_left: 600
tcp_out.c  428: tcp_write(pcb=20454824, data=20414f28, len=600, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_tls.c 5435: <= write certificate
ssl_srv.c 4261: server state: 4
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 3273: => write server key exchange
ssl_srv.c 3051: ECDHE curve: secp384r1
ssl_srv.c 3140: pick hash algorithm 6 for signing
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 181
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 186, out_left: 186
tcp_out.c  428: tcp_write(pcb=20454824, data=20414f28, len=186, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 3357: <= write server key exchange
ssl_srv.c 4261: server state: 5
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 2685: => write certificate request
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 24, out_left: 24
tcp_out.c  428: tcp_write(pcb=20454824, data=20414f28, len=24, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 2835: <= write certificate request
ssl_srv.c 4261: server state: 6
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_srv.c 3365: => write server hello done
ssl_tls.c 3186: => write handshake message
ssl_tls.c 3345: => write record
ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
ssl_tls.c 2757: => flush output
ssl_tls.c 2776: message length: 9, out_left: 9
tcp_out.c  428: tcp_write(pcb=20454824, data=20414f28, len=9, apiflags=1)
ssl_tls.c 2809: <= flush output
ssl_tls.c 3478: <= write record
ssl_tls.c 3322: <= write handshake message
ssl_srv.c 3393: <= write server hello done
ssl_srv.c 4261: server state: 7
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5657: => parse certificate
ssl_tls.c 4313: => read record
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 8096: <= handshake
tcp_out.c 1546: tcp_output_segment: 31447:32358
ssl_tls.c 8086: => handshake
ssl_srv.c 4261: server state: 7
ssl_tls.c 2757: => flush output
ssl_tls.c 2769: <= flush output
ssl_tls.c 5657: => parse certificate
ssl_tls.c 4313: => read record
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 0, nb_want: 5
ssl_tls.c 2723: in_left: 0, nb_want: 5
ssl_tls.c 2744: <= fetch input
ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
ssl_tls.c 2538: => fetch input
ssl_tls.c 2699: in_left: 5, nb_want: 7
ssl_tls.c 2723: in_left: 5, nb_want: 7
ssl_tls.c 2744: <= fetch input
ssl_tls.c 5172: got an alert message, type: [2:46]
ssl_tls.c 5180: is a fatal alert message (msg 46)
ssl_tls.c 8096: <= handshake
ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780

On Wed, Feb 19, 2020 at 3:55 AM tomek wilkxt <[hidden email]> wrote:
What processor do you have, do you have enough RAM?
How do you turn off DEBUG problem occurs?
When the browser downloads each file, a new connection is made, which
consumes RAM. Process httpd for a permanent connection which is only
one handshake.

wt., 18 lut 2020 o 21:48 Trampas Stern <[hidden email]> napisał(a):

>
> Right now the interface sometimes works and sometimes does not not.  I have not found the issue, maybe some one can point me in the right direction?
>
> Thanks
> Trampas
>
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
> ethernet.c  313: Network up IP=192.168.168.156
> tcp_out.c 1097: tcp_enqueue_flags: queueing 6562:6563 (0x12)
> tcp_out.c 1546: tcp_output_segment: 6562:6562
> tcp_out.c 1097: tcp_enqueue_flags: queueing 6614:6615 (0x12)
> tcp_out.c 1546: tcp_output_segment: 6614:6614
> httpd.c 2804: http_accept 20454be0 / 0
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 0
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 4261: server state: 1
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 1213: => parse client hello
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1257: client hello v3, message type: 22
> ssl_srv.c 1266: client hello v3, message len.: 512
> ssl_srv.c 1269: client hello v3, protocol version: [3:1]
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 517
> ssl_tls.c 2723: in_left: 5, nb_want: 517
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1369: client hello v3, handshake type: 1
> ssl_srv.c 1378: client hello v3, handshake len.: 508
> ssl_srv.c 1830: unknown extension found: 19018 (ignoring)
> ssl_srv.c 1800: found extended master secret extension
> ssl_srv.c 1713: found renegotiation extension
> ssl_srv.c 1740: found supported elliptic curves extension
> ssl_srv.c 1748: found supported point formats extension
> ssl_srv.c  377: point format selected: 0
> ssl_srv.c 1810: found session ticket extension
> ssl_srv.c 1820: found alpn extension
> ssl_srv.c 1830: unknown extension found: 5 (ignoring)
> ssl_srv.c 1726: found signature_algorithms extension
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
> ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
> ssl_srv.c 1830: unknown extension found: 18 (ignoring)
> ssl_srv.c 1830: unknown extension found: 51 (ignoring)
> ssl_srv.c 1830: unknown extension found: 45 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43 (ignoring)
> ssl_srv.c 1830: unknown extension found: 27 (ignoring)
> ssl_srv.c 1830: unknown extension found: 35466 (ignoring)
> ssl_srv.c 1830: unknown extension found: 21 (ignoring)
> ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c  720: ciphersuite requires certificate
> ssl_srv.c  731: candidate certificate chain, certificate
> ssl_srv.c  793: selected certificate chain, certificate
> ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2035: <= parse client hello
> ssl_srv.c 4261: server state: 2
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2419: => write server hello
> ssl_srv.c 2453: server hello, chosen version: [3:3]
> ssl_srv.c 2462: server hello, current time: 4294967295
> ssl_srv.c 2550: server hello, session id len.: 32
> ssl_srv.c 2553: no session has been resumed
> ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2562: server hello, compress alg.: 0x00
> ssl_srv.c 2172: server hello, secure renegotiation extension
> ssl_srv.c 2123: server hello, adding extended master secret extension
> ssl_srv.c 2243: server hello, supported_point_formats extension
> ssl_srv.c 2621: server hello, total extension length: 15
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 96, out_left: 96
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=96, apiflags=1)
> tcp_out.c  691: tcp_write: queueing 6615:6711
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2640: <= write server hello
> ssl_srv.c 4261: server state: 3
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5331: => write certificate
> ssl_tls.c 5383: own certificate
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 600, out_left: 600
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=600, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_tls.c 5435: <= write certificate
> ssl_srv.c 4261: server state: 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3273: => write server key exchange
> ssl_srv.c 3051: ECDHE curve: secp384r1
> ssl_srv.c 3140: pick hash algorithm 6 for signing
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 180
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 185, out_left: 185
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=185, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3357: <= write server key exchange
> ssl_srv.c 4261: server state: 5
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2685: => write certificate request
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 24, out_left: 24
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=24, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2835: <= write certificate request
> ssl_srv.c 4261: server state: 6
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3365: => write server hello done
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 9, out_left: 9
> tcp_out.c  428: tcp_write(pcb=20454788, data=204137b8, len=9, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3393: <= write server hello done
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 8096: <= handshake
> tcp_out.c 1546: tcp_output_segment: 6615:7529
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1097: tcp_enqueue_flags: queueing 6667:6668 (0x12)
> tcp_out.c 1546: tcp_output_segment: 6667:6667
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 7
> ssl_tls.c 2723: in_left: 5, nb_want: 7
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 5172: got an alert message, type: [2:46]
> ssl_tls.c 5180: is a fatal alert message (msg 46)
> ssl_tls.c 8096: <= handshake
> ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
> httpd.c 2599: http_err: Connection closed., pcb: 20454be0
> tcp_out.c 1097: tcp_enqueue_flags: queueing 7529:7530 (0x1)
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
> tcp_out.c 1546: tcp_output_segment: 7529:7529
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 2056: tcp_output: sending ACK for 2844114649
> httpd.c 2804: http_accept 20454c0c / 0
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 0
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 4261: server state: 1
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 1213: => parse client hello
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1257: client hello v3, message type: 22
> ssl_srv.c 1266: client hello v3, message len.: 512
> ssl_srv.c 1269: client hello v3, protocol version: [3:1]
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 517
> ssl_tls.c 2723: in_left: 5, nb_want: 517
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1369: client hello v3, handshake type: 1
> ssl_srv.c 1378: client hello v3, handshake len.: 508
> ssl_srv.c 1830: unknown extension found: 47802 (ignoring)
> ssl_srv.c 1800: found extended master secret extension
> ssl_srv.c 1713: found renegotiation extension
> ssl_srv.c 1740: found supported elliptic curves extension
> ssl_srv.c 1748: found supported point formats extension
> ssl_srv.c  377: point format selected: 0
> ssl_srv.c 1810: found session ticket extension
> ssl_srv.c 1820: found alpn extension
> ssl_srv.c 1830: unknown extension found: 5 (ignoring)
> ssl_srv.c 1726: found signature_algorithms extension
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
> ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
> ssl_srv.c 1830: unknown extension found: 18 (ignoring)
> ssl_srv.c 1830: unknown extension found: 51 (ignoring)
> ssl_srv.c 1830: unknown extension found: 45 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43 (ignoring)
> ssl_srv.c 1830: unknown extension found: 27 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43690 (ignoring)
> ssl_srv.c 1830: unknown extension found: 21 (ignoring)
> ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c  720: ciphersuite requires certificate
> ssl_srv.c  731: candidate certificate chain, certificate
> ssl_srv.c  793: selected certificate chain, certificate
> ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2035: <= parse client hello
> ssl_srv.c 4261: server state: 2
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2419: => write server hello
> ssl_srv.c 2453: server hello, chosen version: [3:3]
> ssl_srv.c 2462: server hello, current time: 4294967295
> ssl_srv.c 2550: server hello, session id len.: 32
> ssl_srv.c 2553: no session has been resumed
> ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2562: server hello, compress alg.: 0x00
> ssl_srv.c 2172: server hello, secure renegotiation extension
> ssl_srv.c 2123: server hello, adding extended master secret extension
> ssl_srv.c 2243: server hello, supported_point_formats extension
> ssl_srv.c 2621: server hello, total extension length: 15
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 96, out_left: 96
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=96, apiflags=1)
> tcp_out.c  691: tcp_write: queueing 6668:6764
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2640: <= write server hello
> ssl_srv.c 4261: server state: 3
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5331: => write certificate
> ssl_tls.c 5383: own certificate
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 600, out_left: 600
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=600, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_tls.c 5435: <= write certificate
> ssl_srv.c 4261: server state: 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3273: => write server key exchange
> ssl_srv.c 3051: ECDHE curve: secp384r1
> ssl_srv.c 3140: pick hash algorithm 6 for signing
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 180
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 185, out_left: 185
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=185, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3357: <= write server key exchange
> ssl_srv.c 4261: server state: 5
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2685: => write certificate request
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 24, out_left: 24
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=24, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2835: <= write certificate request
> ssl_srv.c 4261: server state: 6
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3365: => write server hello done
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 9, out_left: 9
> tcp_out.c  428: tcp_write(pcb=204546ec, data=20416220, len=9, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3393: <= write server hello done
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 8096: <= handshake
> tcp_out.c 1546: tcp_output_segment: 6668:7582
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1546: tcp_output_segment: 6562:6562
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 7
> ssl_tls.c 2723: in_left: 5, nb_want: 7
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 5172: got an alert message, type: [2:46]
> ssl_tls.c 5180: is a fatal alert message (msg 46)
> ssl_tls.c 8096: <= handshake
> ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
> httpd.c 2599: http_err: Connection closed., pcb: 20454c0c
> tcp_out.c 1097: tcp_enqueue_flags: queueing 7582:7583 (0x1)
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
> tcp_out.c 1546: tcp_output_segment: 7582:7582
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 1268: tcp_output: nothing to send (0)
> tcp_out.c 2056: tcp_output: sending ACK for 2982664725
> httpd.c 2804: http_accept 20454be0 / 0
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 0
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 4261: server state: 1
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 1213: => parse client hello
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1257: client hello v3, message type: 22
> ssl_srv.c 1266: client hello v3, message len.: 512
> ssl_srv.c 1269: client hello v3, protocol version: [3:1]
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 517
> ssl_tls.c 2723: in_left: 5, nb_want: 517
> ssl_tls.c 2744: <= fetch input
> ssl_srv.c 1369: client hello v3, handshake type: 1
> ssl_srv.c 1378: client hello v3, handshake len.: 508
> ssl_srv.c 1830: unknown extension found: 39578 (ignoring)
> ssl_srv.c 1800: found extended master secret extension
> ssl_srv.c 1713: found renegotiation extension
> ssl_srv.c 1740: found supported elliptic curves extension
> ssl_srv.c 1748: found supported point formats extension
> ssl_srv.c  377: point format selected: 0
> ssl_srv.c 1810: found session ticket extension
> ssl_srv.c 1820: found alpn extension
> ssl_srv.c 1830: unknown extension found: 5 (ignoring)
> ssl_srv.c 1726: found signature_algorithms extension
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 6
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 4
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 4 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 5
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 7
> ssl_srv.c  249: client hello v3, signature_algorithm ext unknown sig alg encoding 6
> ssl_srv.c  267: client hello v3, signature_algorithm ext: match sig 1 and hash 8
> ssl_srv.c  272: client hello v3, signature_algorithm ext: hash alg 4 not supported
> ssl_srv.c 1830: unknown extension found: 18 (ignoring)
> ssl_srv.c 1830: unknown extension found: 51 (ignoring)
> ssl_srv.c 1830: unknown extension found: 45 (ignoring)
> ssl_srv.c 1830: unknown extension found: 43 (ignoring)
> ssl_srv.c 1830: unknown extension found: 27 (ignoring)
> ssl_srv.c 1830: unknown extension found: 56026 (ignoring)
> ssl_srv.c 1830: unknown extension found: 21 (ignoring)
> ssl_srv.c  822: trying ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c  720: ciphersuite requires certificate
> ssl_srv.c  731: candidate certificate chain, certificate
> ssl_srv.c  793: selected certificate chain, certificate
> ssl_srv.c 2001: selected ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2035: <= parse client hello
> ssl_srv.c 4261: server state: 2
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2419: => write server hello
> ssl_srv.c 2453: server hello, chosen version: [3:3]
> ssl_srv.c 2462: server hello, current time: 4294967295
> ssl_srv.c 2550: server hello, session id len.: 32
> ssl_srv.c 2553: no session has been resumed
> ssl_srv.c 2560: server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
> ssl_srv.c 2562: server hello, compress alg.: 0x00
> ssl_srv.c 2172: server hello, secure renegotiation extension
> ssl_srv.c 2123: server hello, adding extended master secret extension
> ssl_srv.c 2243: server hello, supported_point_formats extension
> ssl_srv.c 2621: server hello, total extension length: 15
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 91
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 96, out_left: 96
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=96, apiflags=1)
> tcp_out.c  691: tcp_write: queueing 6563:6659
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2640: <= write server hello
> ssl_srv.c 4261: server state: 3
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5331: => write certificate
> ssl_tls.c 5383: own certificate
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 595
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 600, out_left: 600
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=600, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_tls.c 5435: <= write certificate
> ssl_srv.c 4261: server state: 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3273: => write server key exchange
> ssl_srv.c 3051: ECDHE curve: secp384r1
> ssl_srv.c 3140: pick hash algorithm 6 for signing
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 181
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 186, out_left: 186
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=186, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3357: <= write server key exchange
> ssl_srv.c 4261: server state: 5
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 2685: => write certificate request
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 19
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 24, out_left: 24
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=24, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 2835: <= write certificate request
> ssl_srv.c 4261: server state: 6
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_srv.c 3365: => write server hello done
> ssl_tls.c 3186: => write handshake message
> ssl_tls.c 3345: => write record
> ssl_tls.c 3425: output record: msgtype = 22, version = [3:3], msglen = 4
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2776: message length: 9, out_left: 9
> tcp_out.c  428: tcp_write(pcb=20454824, data=20416220, len=9, apiflags=1)
> ssl_tls.c 2809: <= flush output
> ssl_tls.c 3478: <= write record
> ssl_tls.c 3322: <= write handshake message
> ssl_srv.c 3393: <= write server hello done
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 8096: <= handshake
> tcp_out.c 1546: tcp_output_segment: 6563:7478
> tcp_out.c 1268: tcp_output: nothing to send (0)
> ssl_tls.c 8086: => handshake
> ssl_srv.c 4261: server state: 7
> ssl_tls.c 2757: => flush output
> ssl_tls.c 2769: <= flush output
> ssl_tls.c 5657: => parse certificate
> ssl_tls.c 4313: => read record
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 0, nb_want: 5
> ssl_tls.c 2723: in_left: 0, nb_want: 5
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 4058: input record: msgtype = 21, version = [3:3], msglen = 2
> ssl_tls.c 2538: => fetch input
> ssl_tls.c 2699: in_left: 5, nb_want: 7
> ssl_tls.c 2723: in_left: 5, nb_want: 7
> ssl_tls.c 2744: <= fetch input
> ssl_tls.c 5172: got an alert message, type: [2:46]
> ssl_tls.c 5180: is a fatal alert message (msg 46)
> ssl_tls.c 8096: <= handshake
> ERROR:    altcp_tls_mbedtls.c  283: mbedtls_ssl_handshake failed: -0x7780
> httpd.c 2599: http_err: Connection closed., pcb: 20454be0
> tcp_out.c 1097: tcp_enqueue_flags: queueing 7478:7479 (0x1)
> ssl_tls.c 8936: => free
> ssl_tls.c 9001: <= free
>
> On Tue, Feb 18, 2020 at 8:54 AM Trampas Stern <[hidden email]> wrote:
>>
>> I figured as much...   I am slow at learning this stuff, and figured adding the note to the forum is good for next guy.
>>
>> My next problem is that with https I am having problems transferring data. and getting http_err calls closing connections.
>>
>> ttpd.c 2792: http_accept 20453718 / 0
>> httpd.c 2792: http_accept 204536c0 / 0
>> httpd.c 2594: http_err: Connection closed.
>> httpd.c 2594: http_err: Connection closed.
>> httpd.c 2792: http_accept 204536ec / 0
>> httpd.c 2792: http_accept 20453744 / 0
>> httpd.c 2594: http_err: Connection closed.
>> httpd.c 2792: http_accept 204536c0 / 0
>> httpd.c 2692: http_recv: pcb=20453744 pbuf=204544f8 err=Ok.
>> httpd.c 2086: Received 567 bytes
>> httpd.c 2093: First pbuf
>> httpd.c 2137: CRLF received, parsing request
>> httpd.c 2144: Received GET request"
>> httpd.c 2205: Received "GET" request for URI: "/dashboard.html"
>> httpd.c 2412: Opening /dashboard.html
>> httpd.c 2414: Opening /dashboard.html
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 2764: http_recv: data 20411e78 len 2890
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2890 bytes
>> httpd.c  600: Sent 2890 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2637: http_poll: pcb=20453744 hs=204517ec pcb_state=ESTABLISHED
>> httpd.c 2670: http_poll: try to send more data
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 15842
>> httpd.c 1203: Trying to read 1 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 1
>> httpd.c 1225: Read 1 bytes.
>> httpd.c 1228: Sent 1
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 1 bytes
>> httpd.c  600: Sent 1 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2674: tcp_output
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 15841
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2861 bytes
>> httpd.c  600: Sent 2861 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2692: http_recv: pcb=204536c0 pbuf=20455118 err=Ok.
>> httpd.c 2086: Received 434 bytes
>> httpd.c 2093: First pbuf
>> httpd.c 2137: CRLF received, parsing request
>> httpd.c 2144: Received GET request"
>> httpd.c 2205: Received "GET" request for URI: "/css/bootstrap.css"
>> httpd.c 2412: Opening /css/bootstrap.css
>> httpd.c 2414: Opening /css/bootstrap.css
>> fs.cpp   92: reading SD /css/bootstrap.css: 2890
>> httpd.c 2764: http_recv: data 20411e78 len 2890
>> httpd.c 1635: /css/bootstrap.css
>> httpd.c 1636: http_send: pcb=204536c0 hs=20452260 left=2890
>> httpd.c 1256: writting /css/bootstrap.css
>> httpd.c  578: Trying to send 2890 bytes
>> httpd.c  600: Sent 2890 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=29
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 29 bytes
>> httpd.c  600: Sent 29 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 12951
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2890 bytes
>> httpd.c  600: Sent 2890 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 10061
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 1432 bytes
>> httpd.c  600: Sent 1432 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=1458
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 1458 bytes
>> httpd.c  600: Sent 1458 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 7171
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 2864 bytes
>> httpd.c  600: Sent 2864 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=26
>> httpd.c 1256: writting /dashboard.html
>> httpd.c  578: Trying to send 26 bytes
>> httpd.c  600: Sent 26 bytes
>> httpd.c 1697: send_data end.
>> httpd.c 2792: http_accept 20453668 / 0
>> httpd.c 2610: http_sent 20453744
>> httpd.c 1635: /dashboard.html
>> httpd.c 1636: http_send: pcb=20453744 hs=204517ec left=0
>> httpd.c 1144: bytes_left 4281
>> httpd.c 1203: Trying to read 2890 bytes.
>> fs.cpp   92: reading SD /dashboard.html: 2890
>> httpd.c 1225: Read 2890 bytes.
>> httpd.c 1228: Sent 2890
>>
>>
>> On Tue, Feb 18, 2020 at 7:32 AM Simon Goldschmidt <[hidden email]> wrote:
>>>
>>> Trampas Stern wrote:
>>> > I found that chrome will not work with openssl keys generated by the comments in the code I found I had to generate different keys using the following commands.
>>> > [..]
>>>
>>> Well, the code in the comment did work at some time. I don't think I can keep up with the speed that google changes TLS handling... :-)
>>>
>>> Regards,
>>> Simon
>>>
>>> _______________________________________________
>>> lwip-users mailing list
>>> [hidden email]
>>> https://lists.nongnu.org/mailman/listinfo/lwip-users
>
> _______________________________________________
> lwip-users mailing list
> [hidden email]
> https://lists.nongnu.org/mailman/listinfo/lwip-users



--
Pozdrawiam
Tomek

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users

_______________________________________________
lwip-users mailing list
[hidden email]
https://lists.nongnu.org/mailman/listinfo/lwip-users