@@ -2465,7 +2465,7 @@ check_client_certificate_verify(dtls_context_t *ctx,
24652465 result_r , result_s );
24662466
24672467 if (ret < 0 ) {
2468- dtls_alert ("wrong signature err: %i\n" , ret );
2468+ dtls_alert ("client certificate verify, wrong signature err: %i\n" , ret );
24692469 return dtls_alert_fatal_create (DTLS_ALERT_HANDSHAKE_FAILURE );
24702470 }
24712471 return 0 ;
@@ -3445,7 +3445,7 @@ check_server_certificate(dtls_context_t *ctx,
34453445 config -> keyx .ecdsa .other_pub_y ,
34463446 sizeof (config -> keyx .ecdsa .other_pub_x ));
34473447 if (err < 0 ) {
3448- dtls_warn ("The certificate was not accepted\n" );
3448+ dtls_info ("The server certificate was not accepted\n" );
34493449 return err ;
34503450 }
34513451
@@ -3483,14 +3483,14 @@ check_server_key_exchange_ecdsa(dtls_context_t *ctx,
34833483 key_params = data ;
34843484
34853485 if (dtls_uint8_to_int (data ) != TLS_EC_CURVE_TYPE_NAMED_CURVE ) {
3486- dtls_alert ("Only named curves supported\n" );
3486+ dtls_alert ("only named curves supported\n" );
34873487 return dtls_alert_fatal_create (DTLS_ALERT_HANDSHAKE_FAILURE );
34883488 }
34893489 data += sizeof (uint8 );
34903490 data_length -= sizeof (uint8 );
34913491
34923492 if (dtls_uint16_to_int (data ) != TLS_EXT_ELLIPTIC_CURVES_SECP256R1 ) {
3493- dtls_alert ("secp256r1 supported\n" );
3493+ dtls_alert ("only secp256r1 supported\n" );
34943494 return dtls_alert_fatal_create (DTLS_ALERT_HANDSHAKE_FAILURE );
34953495 }
34963496 data += sizeof (uint16 );
@@ -3534,7 +3534,7 @@ check_server_key_exchange_ecdsa(dtls_context_t *ctx,
35343534 result_r , result_s );
35353535
35363536 if (ret < 0 ) {
3537- dtls_alert ("wrong signature\n" );
3537+ dtls_alert ("server key exchange wrong signature\n" );
35383538 return dtls_alert_fatal_create (DTLS_ALERT_HANDSHAKE_FAILURE );
35393539 }
35403540 return 0 ;
0 commit comments