Updated through tag hostap_2_5 from git://w1.fi/hostap.git
[mech_eap.git] / libeap / src / tls / tlsv1_server_read.c
index 49e811f..0f237ba 100644 (file)
@@ -1,15 +1,9 @@
 /*
  * TLSv1 server - read handshake message
- * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi>
+ * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi>
  *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License version 2 as
- * published by the Free Software Foundation.
- *
- * Alternatively, this software may be distributed under the terms of BSD
- * license.
- *
- * See README and COPYING for more details.
+ * This software may be distributed under the terms of the BSD license.
+ * See README for more details.
  */
 
 #include "includes.h"
@@ -17,6 +11,7 @@
 #include "common.h"
 #include "crypto/md5.h"
 #include "crypto/sha1.h"
+#include "crypto/sha256.h"
 #include "crypto/tls.h"
 #include "x509v3.h"
 #include "tlsv1_common.h"
@@ -32,6 +27,25 @@ static int tls_process_change_cipher_spec(struct tlsv1_server *conn,
                                          size_t *in_len);
 
 
+static int testing_cipher_suite_filter(struct tlsv1_server *conn, u16 suite)
+{
+#ifdef CONFIG_TESTING_OPTIONS
+       if ((conn->test_flags &
+            (TLS_BREAK_SRV_KEY_X_HASH | TLS_BREAK_SRV_KEY_X_SIGNATURE |
+             TLS_DHE_PRIME_511B | TLS_DHE_PRIME_767B | TLS_DHE_PRIME_15 |
+             TLS_DHE_PRIME_58B | TLS_DHE_NON_PRIME)) &&
+           suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 &&
+           suite != TLS_DHE_RSA_WITH_AES_256_CBC_SHA &&
+           suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 &&
+           suite != TLS_DHE_RSA_WITH_AES_128_CBC_SHA &&
+           suite != TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA)
+               return 1;
+#endif /* CONFIG_TESTING_OPTIONS */
+
+       return 0;
+}
+
+
 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
                                    const u8 *in_data, size_t *in_len)
 {
@@ -43,8 +57,8 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
        u16 ext_type, ext_len;
 
        if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
-                          "received content type 0x%x", ct);
+               tlsv1_server_log(conn, "Expected Handshake; received content type 0x%x",
+                                ct);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
@@ -58,13 +72,13 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
 
        /* HandshakeType msg_type */
        if (*pos != TLS_HANDSHAKE_TYPE_CLIENT_HELLO) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
-                          "message %d (expected ClientHello)", *pos);
+               tlsv1_server_log(conn, "Received unexpected handshake message %d (expected ClientHello)",
+                                *pos);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
        }
-       wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello");
+       tlsv1_server_log(conn, "Received ClientHello");
        pos++;
        /* uint24 length */
        len = WPA_GET_BE24(pos);
@@ -83,17 +97,32 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
        if (end - pos < 2)
                goto decode_error;
        conn->client_version = WPA_GET_BE16(pos);
-       wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d",
-                  conn->client_version >> 8, conn->client_version & 0xff);
-       if (conn->client_version < TLS_VERSION) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
-                          "ClientHello");
+       tlsv1_server_log(conn, "Client version %d.%d",
+                        conn->client_version >> 8,
+                        conn->client_version & 0xff);
+       if (conn->client_version < TLS_VERSION_1) {
+               tlsv1_server_log(conn, "Unexpected protocol version in ClientHello %u.%u",
+                                conn->client_version >> 8,
+                                conn->client_version & 0xff);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_PROTOCOL_VERSION);
                return -1;
        }
        pos += 2;
 
+       if (TLS_VERSION == TLS_VERSION_1)
+               conn->rl.tls_version = TLS_VERSION_1;
+#ifdef CONFIG_TLSV12
+       else if (conn->client_version >= TLS_VERSION_1_2)
+               conn->rl.tls_version = TLS_VERSION_1_2;
+#endif /* CONFIG_TLSV12 */
+       else if (conn->client_version > TLS_VERSION_1_1)
+               conn->rl.tls_version = TLS_VERSION_1_1;
+       else
+               conn->rl.tls_version = conn->client_version;
+       tlsv1_server_log(conn, "Using TLS v%s",
+                        tls_version_str(conn->rl.tls_version));
+
        /* Random random */
        if (end - pos < TLS_RANDOM_LEN)
                goto decode_error;
@@ -127,6 +156,8 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
 
        cipher_suite = 0;
        for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) {
+               if (testing_cipher_suite_filter(conn, conn->cipher_suites[i]))
+                       continue;
                c = pos;
                for (j = 0; j < num_suites; j++) {
                        u16 tmp = WPA_GET_BE16(c);
@@ -139,8 +170,7 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
        }
        pos += num_suites * 2;
        if (!cipher_suite) {
-               wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite "
-                          "available");
+               tlsv1_server_log(conn, "No supported cipher suite available");
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_ILLEGAL_PARAMETER);
                return -1;
@@ -170,16 +200,15 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
                        compr_null_found = 1;
        }
        if (!compr_null_found) {
-               wpa_printf(MSG_INFO, "TLSv1: Client does not accept NULL "
-                          "compression");
+               tlsv1_server_log(conn, "Client does not accept NULL compression");
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_ILLEGAL_PARAMETER);
                return -1;
        }
 
        if (end - pos == 1) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the "
-                           "end of ClientHello: 0x%02x", *pos);
+               tlsv1_server_log(conn, "Unexpected extra octet in the end of ClientHello: 0x%02x",
+                                *pos);
                goto decode_error;
        }
 
@@ -188,12 +217,11 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
                ext_len = WPA_GET_BE16(pos);
                pos += 2;
 
-               wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello "
-                          "extensions", ext_len);
+               tlsv1_server_log(conn, "%u bytes of ClientHello extensions",
+                                ext_len);
                if (end - pos != ext_len) {
-                       wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello "
-                                  "extension list length %u (expected %u)",
-                                  ext_len, (unsigned int) (end - pos));
+                       tlsv1_server_log(conn, "Invalid ClientHello extension list length %u (expected %u)",
+                                        ext_len, (unsigned int) (end - pos));
                        goto decode_error;
                }
 
@@ -206,8 +234,7 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
 
                while (pos < end) {
                        if (end - pos < 2) {
-                               wpa_printf(MSG_DEBUG, "TLSv1: Invalid "
-                                          "extension_type field");
+                               tlsv1_server_log(conn, "Invalid extension_type field");
                                goto decode_error;
                        }
 
@@ -215,8 +242,7 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
                        pos += 2;
 
                        if (end - pos < 2) {
-                               wpa_printf(MSG_DEBUG, "TLSv1: Invalid "
-                                          "extension_data length field");
+                               tlsv1_server_log(conn, "Invalid extension_data length field");
                                goto decode_error;
                        }
 
@@ -224,13 +250,12 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
                        pos += 2;
 
                        if (end - pos < ext_len) {
-                               wpa_printf(MSG_DEBUG, "TLSv1: Invalid "
-                                          "extension_data field");
+                               tlsv1_server_log(conn, "Invalid extension_data field");
                                goto decode_error;
                        }
 
-                       wpa_printf(MSG_DEBUG, "TLSv1: ClientHello Extension "
-                                  "type %u", ext_type);
+                       tlsv1_server_log(conn, "ClientHello Extension type %u",
+                                        ext_type);
                        wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello "
                                    "Extension data", pos, ext_len);
 
@@ -250,14 +275,13 @@ static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct,
 
        *in_len = end - in_data;
 
-       wpa_printf(MSG_DEBUG, "TLSv1: ClientHello OK - proceed to "
-                  "ServerHello");
+       tlsv1_server_log(conn, "ClientHello OK - proceed to ServerHello");
        conn->state = SERVER_HELLO;
 
        return 0;
 
 decode_error:
-       wpa_printf(MSG_DEBUG, "TLSv1: Failed to decode ClientHello");
+       tlsv1_server_log(conn, "Failed to decode ClientHello");
        tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                           TLS_ALERT_DECODE_ERROR);
        return -1;
@@ -274,8 +298,8 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
        int reason;
 
        if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
-                          "received content type 0x%x", ct);
+               tlsv1_server_log(conn, "Expected Handshake; received content type 0x%x",
+                                ct);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
@@ -285,8 +309,8 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
        left = *in_len;
 
        if (left < 4) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate message "
-                          "(len=%lu)", (unsigned long) left);
+               tlsv1_server_log(conn, "Too short Certificate message (len=%lu)",
+                                (unsigned long) left);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -298,9 +322,8 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
        left -= 4;
 
        if (len > left) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Unexpected Certificate message "
-                          "length (len=%lu != left=%lu)",
-                          (unsigned long) len, (unsigned long) left);
+               tlsv1_server_log(conn, "Unexpected Certificate message length (len=%lu != left=%lu)",
+                                (unsigned long) len, (unsigned long) left);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -308,8 +331,7 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
 
        if (type == TLS_HANDSHAKE_TYPE_CLIENT_KEY_EXCHANGE) {
                if (conn->verify_peer) {
-                       wpa_printf(MSG_DEBUG, "TLSv1: Client did not include "
-                                  "Certificate");
+                       tlsv1_server_log(conn, "Client did not include Certificate");
                        tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                           TLS_ALERT_UNEXPECTED_MESSAGE);
                        return -1;
@@ -319,17 +341,15 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
                                                       in_len);
        }
        if (type != TLS_HANDSHAKE_TYPE_CERTIFICATE) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
-                          "message %d (expected Certificate/"
-                          "ClientKeyExchange)", type);
+               tlsv1_server_log(conn, "Received unexpected handshake message %d (expected Certificate/ClientKeyExchange)",
+                                type);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
        }
 
-       wpa_printf(MSG_DEBUG,
-                  "TLSv1: Received Certificate (certificate_list len %lu)",
-                  (unsigned long) len);
+       tlsv1_server_log(conn, "Received Certificate (certificate_list len %lu)",
+                        (unsigned long) len);
 
        /*
         * opaque ASN.1Cert<2^24-1>;
@@ -342,8 +362,8 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
        end = pos + len;
 
        if (end - pos < 3) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Too short Certificate "
-                          "(left=%lu)", (unsigned long) left);
+               tlsv1_server_log(conn, "Too short Certificate (left=%lu)",
+                                (unsigned long) left);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -353,10 +373,9 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
        pos += 3;
 
        if ((size_t) (end - pos) != list_len) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate_list "
-                          "length (len=%lu left=%lu)",
-                          (unsigned long) list_len,
-                          (unsigned long) (end - pos));
+               tlsv1_server_log(conn, "Unexpected certificate_list length (len=%lu left=%lu)",
+                                (unsigned long) list_len,
+                                (unsigned long) (end - pos));
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -365,8 +384,7 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
        idx = 0;
        while (pos < end) {
                if (end - pos < 3) {
-                       wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
-                                  "certificate_list");
+                       tlsv1_server_log(conn, "Failed to parse certificate_list");
                        tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                           TLS_ALERT_DECODE_ERROR);
                        x509_certificate_chain_free(chain);
@@ -377,25 +395,23 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
                pos += 3;
 
                if ((size_t) (end - pos) < cert_len) {
-                       wpa_printf(MSG_DEBUG, "TLSv1: Unexpected certificate "
-                                  "length (len=%lu left=%lu)",
-                                  (unsigned long) cert_len,
-                                  (unsigned long) (end - pos));
+                       tlsv1_server_log(conn, "Unexpected certificate length (len=%lu left=%lu)",
+                                        (unsigned long) cert_len,
+                                        (unsigned long) (end - pos));
                        tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                           TLS_ALERT_DECODE_ERROR);
                        x509_certificate_chain_free(chain);
                        return -1;
                }
 
-               wpa_printf(MSG_DEBUG, "TLSv1: Certificate %lu (len %lu)",
-                          (unsigned long) idx, (unsigned long) cert_len);
+               tlsv1_server_log(conn, "Certificate %lu (len %lu)",
+                                (unsigned long) idx, (unsigned long) cert_len);
 
                if (idx == 0) {
                        crypto_public_key_free(conn->client_rsa_key);
                        if (tls_parse_cert(pos, cert_len,
                                           &conn->client_rsa_key)) {
-                               wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
-                                          "the certificate");
+                               tlsv1_server_log(conn, "Failed to parse the certificate");
                                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                                   TLS_ALERT_BAD_CERTIFICATE);
                                x509_certificate_chain_free(chain);
@@ -405,8 +421,7 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
 
                cert = x509_certificate_parse(pos, cert_len);
                if (cert == NULL) {
-                       wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse "
-                                  "the certificate");
+                       tlsv1_server_log(conn, "Failed to parse the certificate");
                        tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                           TLS_ALERT_BAD_CERTIFICATE);
                        x509_certificate_chain_free(chain);
@@ -424,10 +439,10 @@ static int tls_process_certificate(struct tlsv1_server *conn, u8 ct,
        }
 
        if (x509_certificate_chain_validate(conn->cred->trusted_certs, chain,
-                                           &reason) < 0) {
+                                           &reason, 0) < 0) {
                int tls_reason;
-               wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain "
-                          "validation failed (reason=%d)", reason);
+               tlsv1_server_log(conn, "Server certificate chain validation failed (reason=%d)",
+                                reason);
                switch (reason) {
                case X509_VALIDATE_BAD_CERTIFICATE:
                        tls_reason = TLS_ALERT_BAD_CERTIFICATE;
@@ -483,6 +498,13 @@ static int tls_process_client_key_exchange_rsa(
 
        encr_len = WPA_GET_BE16(pos);
        pos += 2;
+       if (pos + encr_len > end) {
+               tlsv1_server_log(conn, "Invalid ClientKeyExchange format: encr_len=%u left=%u",
+                                encr_len, (unsigned int) (end - pos));
+               tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
+                                  TLS_ALERT_DECODE_ERROR);
+               return -1;
+       }
 
        outbuflen = outlen = end - pos;
        out = os_malloc(outlen >= TLS_PRE_MASTER_SECRET_LEN ?
@@ -512,24 +534,22 @@ static int tls_process_client_key_exchange_rsa(
         */
 
        if (crypto_private_key_decrypt_pkcs1_v15(conn->cred->key,
-                                                pos, end - pos,
+                                                pos, encr_len,
                                                 out, &outlen) < 0) {
                wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt "
-                          "PreMasterSecret (encr_len=%d outlen=%lu)",
-                          (int) (end - pos), (unsigned long) outlen);
+                          "PreMasterSecret (encr_len=%u outlen=%lu)",
+                          encr_len, (unsigned long) outlen);
                use_random = 1;
        }
 
-       if (outlen != TLS_PRE_MASTER_SECRET_LEN) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Unexpected PreMasterSecret "
-                          "length %lu", (unsigned long) outlen);
+       if (!use_random && outlen != TLS_PRE_MASTER_SECRET_LEN) {
+               tlsv1_server_log(conn, "Unexpected PreMasterSecret length %lu",
+                                (unsigned long) outlen);
                use_random = 1;
        }
 
-       if (WPA_GET_BE16(out) != conn->client_version) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Client version in "
-                          "ClientKeyExchange does not match with version in "
-                          "ClientHello");
+       if (!use_random && WPA_GET_BE16(out) != conn->client_version) {
+               tlsv1_server_log(conn, "Client version in ClientKeyExchange does not match with version in ClientHello");
                use_random = 1;
        }
 
@@ -564,7 +584,7 @@ static int tls_process_client_key_exchange_rsa(
 }
 
 
-static int tls_process_client_key_exchange_dh_anon(
+static int tls_process_client_key_exchange_dh(
        struct tlsv1_server *conn, const u8 *pos, const u8 *end)
 {
        const u8 *dh_yc;
@@ -572,6 +592,8 @@ static int tls_process_client_key_exchange_dh_anon(
        u8 *shared;
        size_t shared_len;
        int res;
+       const u8 *dh_p;
+       size_t dh_p_len;
 
        /*
         * struct {
@@ -582,6 +604,7 @@ static int tls_process_client_key_exchange_dh_anon(
         * } ClientDiffieHellmanPublic;
         */
 
+       tlsv1_server_log(conn, "ClientDiffieHellmanPublic received");
        wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic",
                    pos, end - pos);
 
@@ -594,8 +617,7 @@ static int tls_process_client_key_exchange_dh_anon(
        }
 
        if (end - pos < 3) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Invalid client public value "
-                          "length");
+               tlsv1_server_log(conn, "Invalid client public value length");
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -604,9 +626,9 @@ static int tls_process_client_key_exchange_dh_anon(
        dh_yc_len = WPA_GET_BE16(pos);
        dh_yc = pos + 2;
 
-       if (dh_yc + dh_yc_len > end) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Client public value overflow "
-                          "(length %d)", dh_yc_len);
+       if (dh_yc_len > end - dh_yc) {
+               tlsv1_server_log(conn, "Client public value overflow (length %d)",
+                                dh_yc_len);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -623,7 +645,9 @@ static int tls_process_client_key_exchange_dh_anon(
                return -1;
        }
 
-       shared_len = conn->cred->dh_p_len;
+       tlsv1_server_get_dh_p(conn, &dh_p, &dh_p_len);
+
+       shared_len = dh_p_len;
        shared = os_malloc(shared_len);
        if (shared == NULL) {
                wpa_printf(MSG_DEBUG, "TLSv1: Could not allocate memory for "
@@ -635,8 +659,7 @@ static int tls_process_client_key_exchange_dh_anon(
 
        /* shared = Yc^secret mod p */
        if (crypto_mod_exp(dh_yc, dh_yc_len, conn->dh_secret,
-                          conn->dh_secret_len,
-                          conn->cred->dh_p, conn->cred->dh_p_len,
+                          conn->dh_secret_len, dh_p, dh_p_len,
                           shared, &shared_len)) {
                os_free(shared);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
@@ -677,8 +700,8 @@ static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
        const struct tls_cipher_suite *suite;
 
        if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
-                          "received content type 0x%x", ct);
+               tlsv1_server_log(conn, "Expected Handshake; received content type 0x%x",
+                                ct);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
@@ -688,8 +711,8 @@ static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
        left = *in_len;
 
        if (left < 4) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Too short ClientKeyExchange "
-                          "(Left=%lu)", (unsigned long) left);
+               tlsv1_server_log(conn, "Too short ClientKeyExchange (Left=%lu)",
+                                (unsigned long) left);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -701,9 +724,8 @@ static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
        left -= 4;
 
        if (len > left) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ClientKeyExchange "
-                          "length (len=%lu != left=%lu)",
-                          (unsigned long) len, (unsigned long) left);
+               tlsv1_server_log(conn, "Mismatch in ClientKeyExchange length (len=%lu != left=%lu)",
+                                (unsigned long) len, (unsigned long) left);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -712,14 +734,14 @@ static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
        end = pos + len;
 
        if (type != TLS_HANDSHAKE_TYPE_CLIENT_KEY_EXCHANGE) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
-                          "message %d (expected ClientKeyExchange)", type);
+               tlsv1_server_log(conn, "Received unexpected handshake message %d (expected ClientKeyExchange)",
+                                type);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
        }
 
-       wpa_printf(MSG_DEBUG, "TLSv1: Received ClientKeyExchange");
+       tlsv1_server_log(conn, "Received ClientKeyExchange");
 
        wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len);
 
@@ -729,11 +751,11 @@ static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
        else
                keyx = suite->key_exchange;
 
-       if (keyx == TLS_KEY_X_DH_anon &&
-           tls_process_client_key_exchange_dh_anon(conn, pos, end) < 0)
+       if ((keyx == TLS_KEY_X_DH_anon || keyx == TLS_KEY_X_DHE_RSA) &&
+           tls_process_client_key_exchange_dh(conn, pos, end) < 0)
                return -1;
 
-       if (keyx != TLS_KEY_X_DH_anon &&
+       if (keyx != TLS_KEY_X_DH_anon && keyx != TLS_KEY_X_DHE_RSA &&
            tls_process_client_key_exchange_rsa(conn, pos, end) < 0)
                return -1;
 
@@ -751,15 +773,13 @@ static int tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct,
        const u8 *pos, *end;
        size_t left, len;
        u8 type;
-       size_t hlen, buflen;
-       u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN], *hpos, *buf;
-       enum { SIGN_ALG_RSA, SIGN_ALG_DSA } alg = SIGN_ALG_RSA;
-       u16 slen;
+       size_t hlen;
+       u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN], *hpos;
+       u8 alert;
 
        if (ct == TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC) {
                if (conn->verify_peer) {
-                       wpa_printf(MSG_DEBUG, "TLSv1: Client did not include "
-                                  "CertificateVerify");
+                       tlsv1_server_log(conn, "Client did not include CertificateVerify");
                        tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                           TLS_ALERT_UNEXPECTED_MESSAGE);
                        return -1;
@@ -770,8 +790,8 @@ static int tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct,
        }
 
        if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
-                          "received content type 0x%x", ct);
+               tlsv1_server_log(conn, "Expected Handshake; received content type 0x%x",
+                                ct);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
@@ -781,8 +801,8 @@ static int tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct,
        left = *in_len;
 
        if (left < 4) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Too short CertificateVerify "
-                          "message (len=%lu)", (unsigned long) left);
+               tlsv1_server_log(conn, "Too short CertificateVerify message (len=%lu)",
+                                (unsigned long) left);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -794,9 +814,8 @@ static int tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct,
        left -= 4;
 
        if (len > left) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Unexpected CertificateVerify "
-                          "message length (len=%lu != left=%lu)",
-                          (unsigned long) len, (unsigned long) left);
+               tlsv1_server_log(conn, "Unexpected CertificateVerify message length (len=%lu != left=%lu)",
+                                (unsigned long) len, (unsigned long) left);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -805,14 +824,14 @@ static int tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct,
        end = pos + len;
 
        if (type != TLS_HANDSHAKE_TYPE_CERTIFICATE_VERIFY) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
-                          "message %d (expected CertificateVerify)", type);
+               tlsv1_server_log(conn, "Received unexpected handshake message %d (expected CertificateVerify)",
+                                type);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
        }
 
-       wpa_printf(MSG_DEBUG, "TLSv1: Received CertificateVerify");
+       tlsv1_server_log(conn, "Received CertificateVerify");
 
        /*
         * struct {
@@ -822,21 +841,58 @@ static int tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct,
 
        hpos = hash;
 
-       if (alg == SIGN_ALG_RSA) {
-               hlen = MD5_MAC_LEN;
-               if (conn->verify.md5_cert == NULL ||
-                   crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0)
-               {
+#ifdef CONFIG_TLSV12
+       if (conn->rl.tls_version == TLS_VERSION_1_2) {
+               /*
+                * RFC 5246, 4.7:
+                * TLS v1.2 adds explicit indication of the used signature and
+                * hash algorithms.
+                *
+                * struct {
+                *   HashAlgorithm hash;
+                *   SignatureAlgorithm signature;
+                * } SignatureAndHashAlgorithm;
+                */
+               if (end - pos < 2) {
+                       tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
+                                          TLS_ALERT_DECODE_ERROR);
+                       return -1;
+               }
+               if (pos[0] != TLS_HASH_ALG_SHA256 ||
+                   pos[1] != TLS_SIGN_ALG_RSA) {
+                       wpa_printf(MSG_DEBUG, "TLSv1.2: Unsupported hash(%u)/"
+                                  "signature(%u) algorithm",
+                                  pos[0], pos[1]);
+                       tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
+                                          TLS_ALERT_INTERNAL_ERROR);
+                       return -1;
+               }
+               pos += 2;
+
+               hlen = SHA256_MAC_LEN;
+               if (conn->verify.sha256_cert == NULL ||
+                   crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
+                   0) {
+                       conn->verify.sha256_cert = NULL;
                        tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                           TLS_ALERT_INTERNAL_ERROR);
-                       conn->verify.md5_cert = NULL;
-                       crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL);
-                       conn->verify.sha1_cert = NULL;
                        return -1;
                }
-               hpos += MD5_MAC_LEN;
-       } else
-               crypto_hash_finish(conn->verify.md5_cert, NULL, NULL);
+               conn->verify.sha256_cert = NULL;
+       } else {
+#endif /* CONFIG_TLSV12 */
+
+       hlen = MD5_MAC_LEN;
+       if (conn->verify.md5_cert == NULL ||
+           crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) {
+               tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
+                                  TLS_ALERT_INTERNAL_ERROR);
+               conn->verify.md5_cert = NULL;
+               crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL);
+               conn->verify.sha1_cert = NULL;
+               return -1;
+       }
+       hpos += MD5_MAC_LEN;
 
        conn->verify.md5_cert = NULL;
        hlen = SHA1_MAC_LEN;
@@ -849,60 +905,21 @@ static int tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct,
        }
        conn->verify.sha1_cert = NULL;
 
-       if (alg == SIGN_ALG_RSA)
-               hlen += MD5_MAC_LEN;
+       hlen += MD5_MAC_LEN;
 
-       wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
-
-       if (end - pos < 2) {
-               tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
-                                  TLS_ALERT_DECODE_ERROR);
-               return -1;
-       }
-       slen = WPA_GET_BE16(pos);
-       pos += 2;
-       if (end - pos < slen) {
-               tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
-                                  TLS_ALERT_DECODE_ERROR);
-               return -1;
-       }
-
-       wpa_hexdump(MSG_MSGDUMP, "TLSv1: Signature", pos, end - pos);
-       if (conn->client_rsa_key == NULL) {
-               wpa_printf(MSG_DEBUG, "TLSv1: No client public key to verify "
-                          "signature");
-               tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
-                                  TLS_ALERT_INTERNAL_ERROR);
-               return -1;
-       }
-
-       buflen = end - pos;
-       buf = os_malloc(end - pos);
-       if (crypto_public_key_decrypt_pkcs1(conn->client_rsa_key,
-                                           pos, end - pos, buf, &buflen) < 0)
-       {
-               wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt signature");
-               os_free(buf);
-               tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
-                                  TLS_ALERT_DECRYPT_ERROR);
-               return -1;
+#ifdef CONFIG_TLSV12
        }
+#endif /* CONFIG_TLSV12 */
 
-       wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature",
-                       buf, buflen);
+       wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
 
-       if (buflen != hlen || os_memcmp(buf, hash, buflen) != 0) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Invalid Signature in "
-                          "CertificateVerify - did not match with calculated "
-                          "hash");
-               os_free(buf);
-               tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
-                                  TLS_ALERT_DECRYPT_ERROR);
+       if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key,
+                                hash, hlen, pos, end - pos, &alert) < 0) {
+               tlsv1_server_log(conn, "Invalid Signature in CertificateVerify");
+               tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, alert);
                return -1;
        }
 
-       os_free(buf);
-
        *in_len = end - in_data;
 
        conn->state = CHANGE_CIPHER_SPEC;
@@ -919,8 +936,8 @@ static int tls_process_change_cipher_spec(struct tlsv1_server *conn,
        size_t left;
 
        if (ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Expected ChangeCipherSpec; "
-                          "received content type 0x%x", ct);
+               tlsv1_server_log(conn, "Expected ChangeCipherSpec; received content type 0x%x",
+                                ct);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
@@ -930,21 +947,21 @@ static int tls_process_change_cipher_spec(struct tlsv1_server *conn,
        left = *in_len;
 
        if (left < 1) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Too short ChangeCipherSpec");
+               tlsv1_server_log(conn, "Too short ChangeCipherSpec");
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
        }
 
        if (*pos != TLS_CHANGE_CIPHER_SPEC) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Expected ChangeCipherSpec; "
-                          "received data 0x%x", *pos);
+               tlsv1_server_log(conn, "Expected ChangeCipherSpec; received data 0x%x",
+                                *pos);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
        }
 
-       wpa_printf(MSG_DEBUG, "TLSv1: Received ChangeCipherSpec");
+       tlsv1_server_log(conn, "Received ChangeCipherSpec");
        if (tlsv1_record_change_read_cipher(&conn->rl) < 0) {
                wpa_printf(MSG_DEBUG, "TLSv1: Failed to change read cipher "
                           "for record layer");
@@ -969,9 +986,48 @@ static int tls_process_client_finished(struct tlsv1_server *conn, u8 ct,
        u8 verify_data[TLS_VERIFY_DATA_LEN];
        u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN];
 
+#ifdef CONFIG_TESTING_OPTIONS
+       if ((conn->test_flags &
+            (TLS_BREAK_SRV_KEY_X_HASH | TLS_BREAK_SRV_KEY_X_SIGNATURE)) &&
+           !conn->test_failure_reported) {
+               tlsv1_server_log(conn, "TEST-FAILURE: Client Finished received after invalid ServerKeyExchange");
+               conn->test_failure_reported = 1;
+       }
+
+       if ((conn->test_flags & TLS_DHE_PRIME_15) &&
+           !conn->test_failure_reported) {
+               tlsv1_server_log(conn, "TEST-FAILURE: Client Finished received after bogus DHE \"prime\" 15");
+               conn->test_failure_reported = 1;
+       }
+
+       if ((conn->test_flags & TLS_DHE_PRIME_58B) &&
+           !conn->test_failure_reported) {
+               tlsv1_server_log(conn, "TEST-FAILURE: Client Finished received after short 58-bit DHE prime in long container");
+               conn->test_failure_reported = 1;
+       }
+
+       if ((conn->test_flags & TLS_DHE_PRIME_511B) &&
+           !conn->test_failure_reported) {
+               tlsv1_server_log(conn, "TEST-WARNING: Client Finished received after short 511-bit DHE prime (insecure)");
+               conn->test_failure_reported = 1;
+       }
+
+       if ((conn->test_flags & TLS_DHE_PRIME_767B) &&
+           !conn->test_failure_reported) {
+               tlsv1_server_log(conn, "TEST-NOTE: Client Finished received after 767-bit DHE prime (relatively insecure)");
+               conn->test_failure_reported = 1;
+       }
+
+       if ((conn->test_flags & TLS_DHE_NON_PRIME) &&
+           !conn->test_failure_reported) {
+               tlsv1_server_log(conn, "TEST-NOTE: Client Finished received after non-prime claimed as DHE prime");
+               conn->test_failure_reported = 1;
+       }
+#endif /* CONFIG_TESTING_OPTIONS */
+
        if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Expected Finished; "
-                          "received content type 0x%x", ct);
+               tlsv1_server_log(conn, "Expected Finished; received content type 0x%x",
+                                ct);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_UNEXPECTED_MESSAGE);
                return -1;
@@ -981,9 +1037,8 @@ static int tls_process_client_finished(struct tlsv1_server *conn, u8 ct,
        left = *in_len;
 
        if (left < 4) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Too short record (left=%lu) for "
-                          "Finished",
-                          (unsigned long) left);
+               tlsv1_server_log(conn, "Too short record (left=%lu) forFinished",
+                                (unsigned long) left);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -1003,18 +1058,16 @@ static int tls_process_client_finished(struct tlsv1_server *conn, u8 ct,
        left -= 4;
 
        if (len > left) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Too short buffer for Finished "
-                          "(len=%lu > left=%lu)",
-                          (unsigned long) len, (unsigned long) left);
+               tlsv1_server_log(conn, "Too short buffer for Finished (len=%lu > left=%lu)",
+                                (unsigned long) len, (unsigned long) left);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
        }
        end = pos + len;
        if (len != TLS_VERIFY_DATA_LEN) {
-               wpa_printf(MSG_DEBUG, "TLSv1: Unexpected verify_data length "
-                          "in Finished: %lu (expected %d)",
-                          (unsigned long) len, TLS_VERIFY_DATA_LEN);
+               tlsv1_server_log(conn, "Unexpected verify_data length in Finished: %lu (expected %d)",
+                                (unsigned long) len, TLS_VERIFY_DATA_LEN);
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                   TLS_ALERT_DECODE_ERROR);
                return -1;
@@ -1022,6 +1075,21 @@ static int tls_process_client_finished(struct tlsv1_server *conn, u8 ct,
        wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
                    pos, TLS_VERIFY_DATA_LEN);
 
+#ifdef CONFIG_TLSV12
+       if (conn->rl.tls_version >= TLS_VERSION_1_2) {
+               hlen = SHA256_MAC_LEN;
+               if (conn->verify.sha256_client == NULL ||
+                   crypto_hash_finish(conn->verify.sha256_client, hash, &hlen)
+                   < 0) {
+                       tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
+                                          TLS_ALERT_INTERNAL_ERROR);
+                       conn->verify.sha256_client = NULL;
+                       return -1;
+               }
+               conn->verify.sha256_client = NULL;
+       } else {
+#endif /* CONFIG_TLSV12 */
+
        hlen = MD5_MAC_LEN;
        if (conn->verify.md5_client == NULL ||
            crypto_hash_finish(conn->verify.md5_client, hash, &hlen) < 0) {
@@ -1043,9 +1111,15 @@ static int tls_process_client_finished(struct tlsv1_server *conn, u8 ct,
                return -1;
        }
        conn->verify.sha1_client = NULL;
+       hlen = MD5_MAC_LEN + SHA1_MAC_LEN;
+
+#ifdef CONFIG_TLSV12
+       }
+#endif /* CONFIG_TLSV12 */
 
-       if (tls_prf(conn->master_secret, TLS_MASTER_SECRET_LEN,
-                   "client finished", hash, MD5_MAC_LEN + SHA1_MAC_LEN,
+       if (tls_prf(conn->rl.tls_version,
+                   conn->master_secret, TLS_MASTER_SECRET_LEN,
+                   "client finished", hash, hlen,
                    verify_data, TLS_VERIFY_DATA_LEN)) {
                wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive verify_data");
                tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
@@ -1055,19 +1129,18 @@ static int tls_process_client_finished(struct tlsv1_server *conn, u8 ct,
        wpa_hexdump_key(MSG_DEBUG, "TLSv1: verify_data (client)",
                        verify_data, TLS_VERIFY_DATA_LEN);
 
-       if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
-               wpa_printf(MSG_INFO, "TLSv1: Mismatch in verify_data");
+       if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
+               tlsv1_server_log(conn, "Mismatch in verify_data");
                return -1;
        }
 
-       wpa_printf(MSG_DEBUG, "TLSv1: Received Finished");
+       tlsv1_server_log(conn, "Received Finished");
 
        *in_len = end - in_data;
 
        if (conn->use_session_ticket) {
                /* Abbreviated handshake using session ticket; RFC 4507 */
-               wpa_printf(MSG_DEBUG, "TLSv1: Abbreviated handshake completed "
-                          "successfully");
+               tlsv1_server_log(conn, "Abbreviated handshake completed successfully");
                conn->state = ESTABLISHED;
        } else {
                /* Full handshake */
@@ -1083,13 +1156,12 @@ int tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct,
 {
        if (ct == TLS_CONTENT_TYPE_ALERT) {
                if (*len < 2) {
-                       wpa_printf(MSG_DEBUG, "TLSv1: Alert underflow");
+                       tlsv1_server_log(conn, "Alert underflow");
                        tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
                                           TLS_ALERT_DECODE_ERROR);
                        return -1;
                }
-               wpa_printf(MSG_DEBUG, "TLSv1: Received alert %d:%d",
-                          buf[0], buf[1]);
+               tlsv1_server_log(conn, "Received alert %d:%d", buf[0], buf[1]);
                *len = 2;
                conn->state = FAILED;
                return -1;
@@ -1121,9 +1193,8 @@ int tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct,
                        return -1;
                break;
        default:
-               wpa_printf(MSG_DEBUG, "TLSv1: Unexpected state %d "
-                          "while processing received message",
-                          conn->state);
+               tlsv1_server_log(conn, "Unexpected state %d while processing received message",
+                                conn->state);
                return -1;
        }