It is a log:
ets Jan 8 2013,rst cause:2, boot mode:(3,7)
load 0x40100000, len 2304, room 16
tail 0
chksum 0x39
load 0x3ffe8000, len 1400, room 8
tail 0
chksum 0xd4
csum 0xd4
rBoot v1.4.2 - richardaburton@gmail.com
Flash Size: 32 Mbit
Flash Mode: DIO
Flash Speed: 40 MHz
rBoot Option: Config chksum
RBOOT config
---------------------------------------------
magic = E1
version = 01
mode = 00
current_rom = 00
gpio_rom = 00
count = 02
unused = 3FFFEFB6
roms[0] = 00002000
roms[1] = 00082000
chksum = 05
calc chksum = 05
---------------------------------------------
Booting rom 0.
!ЧяЬяА@Ђю?PЂю?ЂЂю?М$БрВa В !хяaыяА!пятяАБрВa В !ъяaЯяА!пятяАБрВa В !ъяaЯяА!пятяА<OS SDK ver: 2.0.0(e271380) compiled @ Mar 30 2018 18:54:06
phy ver: 1055_1, pp ver: 10.7
rf cal sector: 1019
tcpip_task_hdl : 40107a00, prio:10,stack:512
idle_task_hdl : 40107ab0,prio:0, stack:384
tim_task_hdl : 40107bf8, prio:2,stack:512
SDK version:2.0.0(e271380) 71640
mode : sta(dc:4f:22:4c:97:a7)
add if0
scandone
state: 0 -> 2 (b0)
state: 2 -> 3 (0)
state: 3 -> 5 (10)
add 0
aid 4
pm open phy_2,type:2 0 0
cnt
connected with TP-Link_618C, channel 10
dhcp client start...
sta connected
ip:192.168.1.103,mask:255.255.255.0,gw:192.168.1.1
sta got ip ,create task and free heap size is 69376
mqtt client thread starts
f: mqtt_client_thread
Seeding the random number generator
Loading the CA root certificate...
Loading the client certificate...
Loading the client private key...
Setting hostname for TLS session...
Setting up the SSL/TLS structure...
Connecting to 35.226.223.141:8883...Connected.
Performing the SSL/TLS handshake...
ssl_tls.c:6313 => handshake
ssl_cli.c:3267 client state: 0
ssl_tls.c:2429 => flush output
ssl_tls.c:2441 <= flush output
ssl_cli.c:3267 client state: 1
ssl_tls.c:2429 => flush output
ssl_tls.c:2441 <= flush output
ssl_cli.c:712 => write client hello
ssl_cli.c:750 client hello, max version: [3:3]
ssl_cli.c:759 dumping 'client hello, random bytes' (32 bytes)
ssl_cli.c:759 0000: 31 04 57 ed 2b 89 11 52 56 8e ac 84 51 9f 5a e2 1.W.+..RV...Q.Z.
ssl_cli.c:759 0010: c7 2a 38 d5 d3 ac a3 24 6d 53 87 9b 8d 16 10 c5 .*8....$mS......
ssl_cli.c:812 client hello, session id len.: 0
ssl_cli.c:813 dumping 'client hello, session id' (0 bytes)
ssl_cli.c:880 client hello, add ciphersuite: 003d
ssl_cli.c:880 client hello, add ciphersuite: 0035
ssl_cli.c:880 client hello, add ciphersuite: 003c
ssl_cli.c:880 client hello, add ciphersuite: 002f
ssl_cli.c:880 client hello, add ciphersuite: 00b7
ssl_cli.c:880 client hello, add ciphersuite: 0095
ssl_cli.c:880 client hello, add ciphersuite: 00b6
ssl_cli.c:880 client hello, add ciphersuite: 0094
ssl_cli.c:913 client hello, got 9 ciphersuites
ssl_cli.c:944 client hello, compress len.: 1
ssl_cli.c:946 client hello, compress alg.: 0
ssl_cli.c:72 client hello, adding server name extension: 35.226.223.141
ssl_cli.c:178 client hello, adding signature_algorithms extension
ssl_cli.c:1018 client hello, total extension length: 39
ssl_tls.c:2714 => write record
ssl_tls.c:2849 output record: msgtype = 22, version = [3:1], msglen = 102
ssl_tls.c:2429 => flush output
ssl_tls.c:2448 message length: 107, out_left: 107
ssl_tls.c:2454 ssl->f_send() returned 107 (-0xffffff95)
ssl_tls.c:2473 <= flush output
ssl_tls.c:2861 <= write record
ssl_cli.c:1044 <= write client hello
ssl_cli.c:3267 client state: 2
ssl_tls.c:2429 => flush output
ssl_tls.c:2441 <= flush output
ssl_cli.c:1396 => parse server hello
ssl_tls.c:3739 => read record
ssl_tls.c:2221 => fetch input
ssl_tls.c:2379 in_left: 0, nb_want: 5
ssl_tls.c:2403 in_left: 0, nb_want: 5
ssl_tls.c:2404 ssl->f_recv(_timeout)() returned 5 (-0xfffffffb)
ssl_tls.c:2416 <= fetch input
ssl_tls.c:3495 input record: msgtype = 22, version = [3:3], msglen = 81
ssl_tls.c:2221 => fetch input
ssl_tls.c:2379 in_left: 5, nb_want: 86
ssl_tls.c:2403 in_left: 5, nb_want: 86
ssl_tls.c:2404 ssl->f_recv(_timeout)() returned 81 (-0xffffffaf)
ssl_tls.c:2416 <= fetch input
ssl_tls.c:3100 handshake message: msglen = 81, type = 2, hslen = 81
ssl_tls.c:3976 <= read record
ssl_cli.c:1469 dumping 'server hello, version' (2 bytes)
ssl_cli.c:1469 0000: 03 03 ..
ssl_cli.c:1495 server hello, current time: 1541010821
ssl_cli.c:1502 dumping 'server hello, random bytes' (32 bytes)
ssl_cli.c:1502 0000: 5b d9 f5 85 f1 39 d2 d2 e3 6f d9 a4 e4 59 ff 4b [....9...o...Y.K
ssl_cli.c:1502 0010: 9f f3 da b6 3b e1 94 f5 53 ef a8 51 51 e2 c5 8e ....;...S..QQ...
ssl_cli.c:1572 server hello, session id len.: 32
ssl_cli.c:1573 dumping 'server hello, session id' (32 bytes)
ssl_cli.c:1573 0000: 2d 8f 8f 35 a1 cc 85 5e a1 4d 21 f5 dc 7d e3 1c -..5...^.M!..}..
ssl_cli.c:1573 0010: 6c aa 7b 96 ee 27 88 81 e0 f7 8d 9d 67 ca d1 f7 l.{..'......g...
ssl_cli.c:1609 no session has been resumed
ssl_cli.c:1611 server hello, chosen ciphersuite: 003d
ssl_cli.c:1612 server hello, compress alg.: 0
ssl_cli.c:1626 server hello, chosen ciphersuite: TLS-RSA-WITH-AES-256-CBC-SHA256
ssl_cli.c:1657 server hello, total extension length: 5
ssl_cli.c:1675 found renegotiation extension
ssl_cli.c:1845 <= parse server hello
ssl_cli.c:3267 client state: 3
ssl_tls.c:2429 => flush output
ssl_tls.c:2441 <= flush output
ssl_tls.c:4195 => parse certificate
ssl_tls.c:3739 => read record
ssl_tls.c:2221 => fetch input
ssl_tls.c:2379 in_left: 0, nb_want: 5
ssl_tls.c:2403 in_left: 0, nb_want: 5
ssl_tls.c:2404 ssl->f_recv(_timeout)() returned 5 (-0xfffffffb)
ssl_tls.c:2416 <= fetch input
ssl_tls.c:3495 input record: msgtype = 22, version = [3:3], msglen = 3674
ssl_tls.c:2221 => fetch input
ssl_tls.c:2379 in_left: 5, nb_want: 3679
ssl_tls.c:2403 in_left: 5, nb_want: 3679
ssl_tls.c:2404 ssl->f_recv(_timeout)() returned 3674 (-0xfffff1a6)
ssl_tls.c:2416 <= fetch input
ssl_tls.c:3100 handshake message: msglen = 3674, type = 11, hslen = 3674
ssl_tls.c:3976 <= read record
ssl_tls.c:4361 peer certificate #1:
ssl_tls.c:4361 cert. version : 3
ssl_tls.c:4361 serial number : 10:01
ssl_tls.c:4361 issuer name : C=IL, ST=Israel, O=Dealor Ltd, OU=Dealor Ltd Certificate Authority, CN=Dealor Ltd Intermediate CA
ssl_tls.c:4361 subject name : C=IL, ST=Israel, L=Modiin, O=Dealor Ltd, OU=Dealor Ltd vernemq server, CN=*.dealor-vernemq-headless.dev.svc.cluster.local
ssl_tls.c:4361 issued on : 2018-10-18 08:04:20
ssl_tls.c:4361 expires on : 2019-10-28 08:04:20
ssl_tls.c:4361 signed using : RSA with SHA-256
ssl_tls.c:4361 RSA key size : 2048 bits
ssl_tls.c:4361 basic constraints : CA=false
ssl_tls.c:4361 cert. type : SSL Server
ssl_tls.c:4361 key usage : Digital Signature, Key Encipherment
ssl_tls.c:4361 ext key usage : TLS Web Server Authentication
ssl_tls.c:4361 value of 'crt->rsa.N' (2048 bits) is:
ssl_tls.c:4361 ae c7 09 3b 92 5e 2f ff ce e8 d0 5f 44 2b 54 47
ssl_tls.c:4361 9b da f3 24 91 ce 79 3f 0f 7b a4 a1 12 6a 3f ca
ssl_tls.c:4361 56 93 b4 2a ec b5 f3 14 b4 53 26 c4 b4 87 65 cb
ssl_tls.c:4361 47 13 0a 0d 09 8f 53 7f 6c 4a 2d 34 89 b2 32 0f
ssl_tls.c:4361 a6 9a 24 1a be 15 44 7b d7 dc 0f 27 14 d1 c4 97
ssl_tls.c:4361 b6 84 94 81 ad ae bb e6 39 fb 02 95 f3 6a 17 31
ssl_tls.c:4361 2f c2 ae 66 12 27 c1 dd 4f 96 ee 5a c4 b7 96 58
ssl_tls.c:4361 d8 5e 7d 9c 77 c7 86 4e f8 67 dd 43 e8 54 c0 ba
ssl_tls.c:4361 13 13 4b b8 79 0f e1 4d f6 23 7b ac 5c 89 9b fa
ssl_tls.c:4361 7d 33 71 61 bb 13 f9 00 62 07 73 7d 4b 45 06 72
ssl_tls.c:4361 67 98 8d 92 cc 1c 4b b4 4c 24 f1 fd 79 e6 93 39
ssl_tls.c:4361 a9 b7 25 45 19 48 67 58 22 9a e0 54 4d 06 04 13
ssl_tls.c:4361 3c 3d 65 32 01 10 40 84 dc 2f 27 d0 fd 88 4f cf
ssl_tls.c:4361 7f 8a 67 45 7b b4 10 6a 6d 46 4d 4e 3e ec 78 06
ssl_tls.c:4361 f7 4f fb d1 e5 f1 6d 81 a2 b9 c5 da 96 ad 52 2a
ssl_tls.c:4361 c6 45 96 aa 73 4d 56 3b ee e6 b0 2a dd 65 44 07
ssl_tls.c:4361 value of 'crt->rsa.E' (17 bits) is:
ssl_tls.c:4361 01 00 01
ssl_tls.c:4361 peer certificate #2:
ssl_tls.c:4361 cert. version : 3
ssl_tls.c:4361 serial number : 10:01
ssl_tls.c:4361 issuer name : C=IL, ST=Israel, L=Modiin, O=Dealor Ltd, CN=Dealor Ltd Root CA
ssl_tls.c:4361 subject name : C=IL, ST=Israel, O=Dealor Ltd, OU=Dealor Ltd Certificate Authority, CN=Dealor Ltd Intermediate CA
ssl_tls.c:4361 issued on : 2018-10-18 07:23:52
ssl_tls.c:4361 expires on : 2028-10-15 07:23:52
ssl_tls.c:4361 signed using : RSA with SHA-256
ssl_tls.c:4361 RSA key size : 4096 bits
ssl_tls.c:4361 basic constraints : CA=true, max_pathlen=0
ssl_tls.c:4361 key usage : Digital Signature, Key Cert Sign, CRL Sign
ssl_tls.c:4361 value of 'crt->rsa.N' (4096 bits) is:
ssl_tls.c:4361 b1 1f 94 b4 6d 26 3c 2e c0 25 18 c5 a3 79 d4 ac
ssl_tls.c:4361 4c 1a 67 15 67 ea 6d 6f 39 17 39 a6 77 b0 36 d2
ssl_tls.c:4361 5d 43 ac 10 96 b5 61 49 5d ca dc da 1a d1 7c 2a
ssl_tls.c:4361 b6 da 0e 4a 4a 76 b2 55 af 48 16 87 d9 f6 38 be
ssl_tls.c:4361 f2 e8 20 ce c1 ab de 43 1c e9 a1 4f 48 1e b8 41
ssl_tls.c:4361 f3 d1 35 18 7a 04 3d bb 5d 5d ef c3 58 d8 2f dc
ssl_tls.c:4361 d3 6e 8f f9 1f 41 cd 39 63 c7 ca 2f 03 ac 21 7b
ssl_tls.c:4361 d9 fc 54 b8 5c c6 c0 8f 27 e0 b3 8a 78 f9 25 85
ssl_tls.c:4361 d2 6d 06 73 0d e4 67 c1 a8 99 4d ca cd 74 b1 06
ssl_tls.c:4361 d6 f6 34 5b ca e9 94 b0 b5 06 bf 22 6c 25 ab b0
ssl_tls.c:4361 6b a1 af 87 ce 6c 49 b9 ae 5b d4 cd 75 68 dc 58
ssl_tls.c:4361 dd 09 f9 20 a5 93 f7 93 e3 28 f8 ae 70 2e f3 23
ssl_tls.c:4361 12 04 20 33 58 10 db b6 0c 93 b0 10 44 3a 79 ca
ssl_tls.c:4361 dd a6 af 6e 90 a7 e9 80 11 9f d6 0e 78 a5 b1 cc
ssl_tls.c:4361 02 a3 9e a9 9e b0 17 87 b2 8f 6e f8 48 11 57 7a
ssl_tls.c:4361 76 05 c2 70 28 52 a1 69 da 1f 18 f5 c6 be ee fe
ssl_tls.c:4361 7c 6a d8 91 e5 d7 7b a4 22 b2 0c f0 36 12 f8 c1
ssl_tls.c:4361 d5 34 2e 0d bc d2 97 df ac 0b ae fc 1a ae 2f 0b
ssl_tls.c:4361 46 87 5a 4a 78 fd f9 88 e8 cc 2b f3 ee 2e 19 ca
ssl_tls.c:4361 7e 84 28 9c 79 e7 30 4b 29 a5 26 d5 09 a2 74 a5
ssl_tls.c:4361 7f be fe 01 82 be b4 03 7b 07 da 1e dd 42 a7 9d
ssl_tls.c:4361 52 1d b2 7e 84 e3 52 47 a8 38 84 f8 fb 74 f9 63
ssl_tls.c:4361 2d 8c f1 85 a6 d7 82 37 f7 9a 7a 22 4d 80 2f ab
ssl_tls.c:4361 5e 1c 64 3b 67 fb a7 c5 2e c7 61 01 a4 98 96 64
ssl_tls.c:4361 fb 4d 5b 3e ed 6d 49 16 d3 8c 7e e0 e1 93 4b 6f
ssl_tls.c:4361 75 d1 1f bf 8e 89 84 83 02 20 7f fc 2e bf eb da
ssl_tls.c:4361 66 d4 1c ea dd b4 59 f8 c1 10 85 c0 6b 62 d5 80
ssl_tls.c:4361 3e e7 6c c4 ee 35 e2 2f b8 9e 6d 90 6f 3f c8 8f
ssl_tls.c:4361 a5 41 7d fd e2 99 37 e6 18 c9 aa fc ee ab 7e 0b
ssl_tls.c:4361 02 b2 67 b0 82 41 d3 d6 c3 5e 45 6a c0 80 68 96
ssl_tls.c:4361 ea 03 50 1c ef 64 aa 6c 1e 77 5b 25 47 10 db c9
ssl_tls.c:4361 d4 48 79 ab 44 58 0f 51 16 61 81 1e 31 77 a1 49
ssl_tls.c:4361 value of 'crt->rsa.E' (17 bits) is:
ssl_tls.c:4361 01 00 01
ssl_tls.c:4361 peer certificate #3:
ssl_tls.c:4361 cert. version : 3
ssl_tls.c:4361 serial number : 88:7C:E8:8A:78:C7:57:38
ssl_tls.c:4361 issuer name : C=IL, ST=Israel, L=Modiin, O=Dealor Ltd, CN=Dealor Ltd Root CA
ssl_tls.c:4361 subject name : C=IL, ST=Israel, L=Modiin, O=Dealor Ltd, CN=Dealor Ltd Root CA
ssl_tls.c:4361 issued on : 2018-10-17 21:34:51
ssl_tls.c:4361 expires on : 2038-10-12 21:34:51
ssl_tls.c:4361 signed using : RSA with SHA-256
ssl_tls.c:4361 RSA key size : 2048 bits
ssl_tls.c:4361 basic constraints : CA=true
ssl_tls.c:4361 key usage : Digital Signature, Key Cert Sign, CRL Sign
ssl_tls.c:4361 value of 'crt->rsa.N' (2048 bits) is:
ssl_tls.c:4361 b0 e3 1a 61 98 44 71 5e 17 37 b0 d5 f9 9c c2 2f
ssl_tls.c:4361 4f 73 96 21 9d 63 80 1e 36 1d 8b 64 d8 6d 5b b6
ssl_tls.c:4361 b5 8e d2 f4 f9 8a 99 d0 cc fb 7f ca 1e d0 a6 a8
ssl_tls.c:4361 5e be fd de 85 9d 4b 11 c9 34 dc c5 0a 6d 4a 6c
ssl_tls.c:4361 c0 4c 69 b7 6b c1 c9 8c 80 d9 70 8d 08 a4 22 ba
ssl_tls.c:4361 66 b9 76 d0 e8 2a 04 0c dc c1 2a bc 1c 46 fe d9
ssl_tls.c:4361 53 c8 52 7e 58 b0 d8 0c 39 5e fe 98 7e 69 30 6d
ssl_tls.c:4361 f7 90 f7 c1 9e 24 4e 0d 1f ad 43 48 9d 13 81 95
ssl_tls.c:4361 a5 67 ac c8 72 03 59 45 64 d7 11 2b ae b7 b1 1f
ssl_tls.c:4361 db f1 b1 e6 b3 46 b6 06 d1 87 da 16 0b b5 e2 82
ssl_tls.c:4361 fb 22 be a8 5f b4 1c fc 3b a7 4c e7 d7 48 80 c5
ssl_tls.c:4361 2c 9f 41 78 c3 ec 00 13 ae 1f d1 d6 f0 73 3e c7
ssl_tls.c:4361 58 ab 9b e6 cf 96 fb 19 ae 52 16 52 ec a2 82 25
ssl_tls.c:4361 2f b6 b4 e3 15 cd b7 02 ee b6 06 78 9e 1d c4 2d
ssl_tls.c:4361 1a af 65 b9 73 cd b5 b1 d8 95 dc ca 25 0d 7c 26
ssl_tls.c:4361 04 30 d3 d7 ec 21 2f d4 ab 78 a2 48 f5 57 d8 79
ssl_tls.c:4361 value of 'crt->rsa.E' (17 bits) is:
ssl_tls.c:4361 01 00 01
ssl_tls.c:4462 <= parse certificate
ssl_cli.c:3267 client state: 4
ssl_tls.c:2429 => flush output
ssl_tls.c:2441 <= flush output
ssl_cli.c:2181 => parse server key exchange
ssl_cli.c:2186 <= skip parse server key exchange
ssl_cli.c:3267 client state: 5
ssl_tls.c:2429 => flush output
ssl_tls.c:2441 <= flush output
ssl_cli.c:2537 => parse certificate request
ssl_tls.c:3739 => read record
ssl_tls.c:2221 => fetch input
ssl_tls.c:2379 in_left: 0, nb_want: 5
ssl_tls.c:2403 in_left: 0, nb_want: 5
ssl_tls.c:2404 ssl->f_recv(_timeout)() returned 5 (-0xfffffffb)
ssl_tls.c:2416 <= fetch input
ssl_tls.c:3495 input record: msgtype = 22, version = [3:3], msglen = 271
ssl_tls.c:2221 => fetch input
ssl_tls.c:2379 in_left: 5, nb_want: 276
ssl_tls.c:2403 in_left: 5, nb_want: 276
ssl_tls.c:2404 ssl->f_recv(_timeout)() returned 271 (-0xfffffef1)
ssl_tls.c:2416 <= fetch input
ssl_tls.c:3100 handshake message: msglen = 271, type = 13, hslen = 271
ssl_tls.c:3976 <= read record
ssl_cli.c:2574 got a certificate request
ssl_cli.c:2666 <= parse certificate request
ssl_cli.c:3267 client state: 6
ssl_tls.c:2429 => flush output
ssl_tls.c:2441 <= flush output
ssl_cli.c:2679 => parse server hello done
ssl_tls.c:3739 => read record
ssl_tls.c:2221 => fetch input
ssl_tls.c:2379 in_left: 0, nb_want: 5
ssl_tls.c:2403 in_left: 0, nb_want: 5
ssl_tls.c:2404 ssl->f_recv(_timeout)() returned 5 (-0xfffffffb)
ssl_tls.c:2416 <= fetch input
ssl_tls.c:3495 input record: msgtype = 22, version = [3:3], msglen = 4
ssl_tls.c:2221 => fetch input
ssl_tls.c:2379 in_left: 5, nb_want: 9
ssl_tls.c:2403 in_left: 5, nb_want: 9
ssl_tls.c:2404 ssl->f_recv(_timeout)() returned 4 (-0xfffffffc)
ssl_tls.c:2416 <= fetch input
ssl_tls.c:3100 handshake message: msglen = 4, type = 14, hslen = 4
ssl_tls.c:3976 <= read record
ssl_cli.c:2711 <= parse server hello done
ssl_cli.c:3267 client state: 7
ssl_tls.c:2429 => flush output
ssl_tls.c:2441 <= flush output
ssl_tls.c:4079 => write certificate
ssl_tls.c:4131 own certificate #1:
ssl_tls.c:4131 cert. version : 3
ssl_tls.c:4131 serial number : 10:03
ssl_tls.c:4131 issuer name : C=IL, ST=Israel, O=Dealor Ltd, OU=Dealor Ltd Certificate Authority, CN=Dealor Ltd Intermediate CA
ssl_tls.c:4131 subject name : C=IL, ST=Israel, L=Modiin, O=Dealor LTD, OU=Dealor LTD device, CN=dealor-client-1y
ssl_tls.c:4131 issued on : 2018-10-24 10:22:41
ssl_tls.c:4131 expires on : 2020-03-07 10:22:41
ssl_tls.c:4131 signed using : RSA with SHA-256
ssl_tls.c:4131 RSA key size : 2048 bits
ssl_tls.c:4131 basic constraints : CA=false
ssl_tls.c:4131 cert. type : SSL Client, Email
ssl_tls.c:4131 key usage : Digital Signature, Non Repudiation, Key Encipherment
ssl_tls.c:4131 ext key usage : TLS Web Client Authentication, E-mail Protection
ssl_tls.c:4131 value of 'crt->rsa.N' (2048 bits) is:
ssl_tls.c:4131 c3 27 02 f6 b6 a9 2b 5c 3a 01 be e2 74 1d e3 5c
ssl_tls.c:4131 5e 96 ae 50 a4 e8 e3 49 68 5a 23 a5 5c 4c 30 3d
ssl_tls.c:4131 cf b4 f2 27 a0 d8 05 2f e4 5c 1e fb 0c 76 90 f2
ssl_tls.c:4131 ef a1 4f 99 53 86 1a 60 71 cc ab f5 6d 26 e1 99
ssl_tls.c:4131 c3 ef 8d 70 be 49 89 65 16 b4 17 01 c2 25 20 c7
ssl_tls.c:4131 cd 81 eb 0a 9f 9b 76 ea d1 99 2a 95 6d 4f 8a 94
ssl_tls.c:4131 16 91 32 d6 d4 d5 07 3f 08 2b e3 fb e6 45 cb 84
ssl_tls.c:4131 13 68 fc 22 ad 0e 50 40 7a 71 2e 2e ed af f2 1e
ssl_tls.c:4131 97 15 5a 8d bc 59 0e b3 85 b2 a7 ab af 6a 52 7d
ssl_tls.c:4131 58 e8 1d fc 49 b9 f7 c2 a5 d8 ee c9 a1 44 90 f1
ssl_tls.c:4131 a6 6a 3e 0d 98 5f b1 1b 7c 0e c2 b8 73 c3 e5 01
ssl_tls.c:4131 f1 e7 4d 84 42 58 b0 74 b2 1c 04 ac 31 08 b5 14
ssl_tls.c:4131 b4 06 cb 33 88 48 48 67 9e b3 d6 f8 44 67 9e db
ssl_tls.c:4131 11 29 3f 83 0d 2d 0e ed 71 35 45 be 16 f6 01 63
ssl_tls.c:4131 d1 ac 1f cc 6c 66 a0 3a 7f 2d cc e1 e1 e8 12 ad
ssl_tls.c:4131 f1 a8 d4 c6 97 64 eb 35 b7 2e 40 f8 95 10 b1 61
ssl_tls.c:4131 value of 'crt->rsa.E' (17 bits) is:
ssl_tls.c:4131 01 00 01
ssl_tls.c:2714 => write record
ssl_tls.c:2849 output record: msgtype = 22, version = [3:3], msglen = 1359
ssl_tls.c:2429 => flush output
ssl_tls.c:2448 message length: 1364, out_left: 1364
ssl_tls.c:2454 ssl->f_send() returned 1364 (-0xfffffaac)
ssl_tls.c:2473 <= flush output
ssl_tls.c:2861 <= write record
ssl_tls.c:4183 <= write certificate
ssl_cli.c:3267 client state: 8
ssl_tls.c:2429 => flush output
ssl_tls.c:2441 <= flush output
ssl_cli.c:2722 => write client key exchange
ssl_tls.c:2714 => write record
ssl_tls.c:2849 output record: msgtype = 22, version = [3:3], msglen = 262
ssl_tls.c:2429 => flush output
ssl_tls.c:2448 message length: 267, out_left: 267
ssl_tls.c:2454 ssl->f_send() returned -78 (-0x004e)
ssl_tls.c:2857 mbedtls_ssl_flush_output() returned -78 (-0x004e)
ssl_cli.c:2965 mbedtls_ssl_write_record() returned -78 (-0x004e)
ssl_tls.c:6323 <= handshake
mbedtls_ssl_handshake returned -0x4e
Last error was: -0x4e - UNKNOWN ERROR CODE (004E)