SetPhyMode:000021e1 Auto:1, FD10:64, HD10:32, FD100:256, HD100:128, FD1000:8192 LPBK:0

 ******* SYS/BIOS Ethernet/IP (CPSW) Rio BMC Sample application, EVM IP address: 192.168.1.4 ******
SetPhyMode:000021e1 Auto:1, FD10:64, HD10:32, FD100:256, HD100:128, FD1000:8192 LPBK:0

 I2C Test: 400Kbps: PASS

 Rio Debug ==> Ethernet MAC Address   : 0xc4-0xed-0xba-0x8b-0x74-0x5a



 I2C Test: 100Kbps: PASS

 I2C Test: timeout test passed.

 All tests have passed.

Rio: Time(GMT): Thu Oct 13 16:52:22 2016

------------------TCP: tcpClientHandler Success !!
---------- fdOpenSession Success !! ----------
wolfSSL_Init
wolfCrypt_InitENETPHY_FindingState: PhyNum: 0
ENETPHY_FindingState: PhyNum: 1
ENETPHY_DisablePhy(0)
Enable Phy to negotiate external connection
NWAY Advertising: FullDuplex-1000 FullDuplex-100 HalfDuplex-100 FullDuplex-10 HalfDuplex-10
ENETPHY_DisablePhy(1)
Enable Phy to negotiate external connection
NWAY Advertising: FullDuplex-1000 FullDuplex-100 HalfDuplex-100 FullDuplex-10 HalfDuplex-10
---------- Rio: tcpClientHandler: Started ----------.
WOLFSSL_CTX_new_ex
wolfSSL_CertManagerNew
---------- Rio: tcpClientHandler: wolfTLSv1_2_client_method Okay ----------.
---------- Rio: tcpClientHandler: wolfSSL_CTX_load_verify_buffer Enter ----------.
wolfSSL_CTX_load_verify_buffer
Adding a CA
GetExplicitVersion
GetSerialNumber
Got Cert Header
GetAlgoId
GetObjectId()
Got Algo ID
Getting Cert Name
Getting Cert Name
Got Subject Name
GetAlgoId
GetObjectId()
Got Key
Parsed Past Key
DecodeCertExtensions
GetObjectId()
DecodeSubjKeyId
GetObjectId()
DecodeAuthKeyId
GetObjectId()
DecodeBasicCaConstraint
GetAlgoId
GetObjectId()
        Parsed new CA
        Freeing Parsed CA
        Freeing der CA
                OK Freeing der CA
---------- Rio: tcpClientHandler: wolfSSL_CTX_load_verify_buffer Okay ----------.
---------- Rio: tcpClientHandler: wolfSSL_CTX_use_certificate_buffer enter ----------.
wolfSSL_CTX_use_certificate_buffer
Checking cert signature type
GetExplicitVersion
GetSerialNumber
Got Cert Header
GetAlgoId
GetObjectId()
Got Algo ID
Getting Cert Name
Getting Cert Name
Got Subject Name
GetAlgoId
GetObjectId()
Got Key
Not ECDSA cert signature
---------- Rio: tcpClientHandler: wolfSSL_CTX_use_certificate_buffer Okay ----------.
---------- Rio: tcpClientHandler: client_key_der_2048 enter ----------.
wolfSSL_CTX_use_PrivateKey_buffer
---------- Rio: tcpClientHandler: wolfSSL_CTX_use_PrivateKey_buffer Okay----------.
---------- Rio: tcpClientHandler: Error_init block Passed ----------.
---------- tcpHandler: socket creation Success, sockfd value =-2146869660 ----------
---------- Rio: tcpClientHandler: Creating socket ==>  Server= 0xa01a8c0, port:1000 /sin_port: 59395 ----------.
Phy: 1, NegMode 01e1, NWAYadvertise 01e1, NWAYREadvertise 4de1
Negotiated connection: FullDuplex 100 Mbs
---------- Rio: tcpClientHandler: Connecting connection Fail, close Socket !!, ret = -1 ----------.
---------- tcpHandler: socket creation Success, sockfd value =-2146869148 ----------
---------- Rio: tcpClientHandler: Creating socket ==>  Server= 0xa01a8c0, port:1000 /sin_port: 59395 ----------.
---------- Rio: tcpClientHandler: Connecting connection Fail, close Socket !!, ret = -1 ----------.
---------- tcpHandler: socket creation Success, sockfd value =-2146868636 ----------
---------- Rio: tcpClientHandler: Creating socket ==>  Server= 0xa01a8c0, port:1000 /sin_port: 59395 ----------.
---------- Rio: tcpClientHandler: Connecting connection Fail, close Socket !!, ret = -1 ----------.
---------- tcpHandler: socket creation Success, sockfd value =-2146868124 ----------
---------- Rio: tcpClientHandler: Creating socket ==>  Server= 0xa01a8c0, port:1000 /sin_port: 59395 ----------.
---------- Rio: tcpClientHandler: Connecting connection success ----------ret = -2146890648.
SSL_new
---------- Rio: tcpClientHandler:wolfSSL_new success, new SSL  okay ----------.
SSL_set_fd
SSL_set_read_fd
SSL_set_write_fd
SSL_connect()
Adding signature algorithms extension
growing output buffer

Signature Algorithms extension to write
Point Formats extension to write
Elliptic Curves extension to write
my_IOSend: sent
Shrinking output buffer

connect state: CLIENT_HELLO_SENT
my_IORecv: received
growing input buffer

my_IORecv: received
received record layer msg
DoHandShakeMsg()
DoHandShakeMsgType
processing server hello
VerifyClientSuite
my_IORecv: received
growing input buffer

my_IORecv: received
received record layer msg
DoHandShakeMsg()
DoHandShakeMsgType
processing certificate
ProcessPeerCerts
Loading peer's cert chain
        Put another cert into chain
        Put another cert into chain
GetExplicitVersion
GetSerialNumber
Got Cert Header
GetAlgoId
GetObjectId()
Got Algo ID
Getting Cert Name
Getting Cert Name
Got Subject Name
GetAlgoId
GetObjectId()
Got Key
Parsed Past Key
DecodeCertExtensions
GetObjectId()
DecodeSubjKeyId
GetObjectId()
DecodeAuthKeyId
GetObjectId()
DecodeBasicCaConstraint
GetAlgoId
GetObjectId()
About to verify certificate signature
ConfirmSignature
Verified CA from chain and already had it
Verifying Peer's cert
GetExplicitVersion
GetSerialNumber
Got Cert Header
GetAlgoId
GetObjectId()
Got Algo ID
Getting Cert Name
Getting Cert Name
Got Subject Name
GetAlgoId
GetObjectId()
Got Key
Parsed Past Key
DecodeCertExtensions
GetObjectId()
DecodeSubjKeyId
GetObjectId()
DecodeAuthKeyId
GetObjectId()
DecodeBasicCaConstraint
GetAlgoId
GetObjectId()
About to verify certificate signature
ConfirmSignature
Verified Peer's cert
my_IORecv: received
my_IORecv: received
received record layer msg
DoHandShakeMsg()
DoHandShakeMsgType
processing certificate request
my_IORecv: received
my_IORecv: received
received record layer msg
DoHandShakeMsg()
DoHandShakeMsgType
No KeyExchange required
processing server hello done
connect state: HELLO_AGAIN
connect state: HELLO_AGAIN_REPLY
connect state: FIRST_REPLY_DONE
growing output buffer

my_IOSend: sent
Shrinking output buffer

sent: certificate
connect state: FIRST_REPLY_FIRST
SendClientKeyExchange
RsaEnc
growing output buffer

my_IOSend: sent
Shrinking output buffer

sent: client key exchange
connect state: FIRST_REPLY_SECOND
SendCertificateVerify
growing output buffer

Trying RSA private key
Using RSA private key
RsaSign
VerifyRsaSign
my_IOSend: sent
Shrinking output buffer

sent: certificate verify
connect state: FIRST_REPLY_THIRD
growing output buffer

my_IOSend: sent
Shrinking output buffer

sent: change cipher spec
connect state: FIRST_REPLY_FOURTH
growing output buffer

BuildMessage
my_IOSend: sent
Shrinking output buffer

sent: finished
connect state: FINISHED_DONE
my_IORecv: received
my_IORecv: received
received record layer msg
got CHANGE CIPHER SPEC
my_IORecv: received
my_IORecv: received
received record layer msg
DoHandShakeMsg()
DoHandShakeMsgType
processing finished
connect state: SECOND_REPLY_DONE
Shrinking input buffer

---------- Rio: tcpClientHandler:wolfSSL_connect success ----------.
SSL_get_fd
SSL_write()
growing output buffer

BuildMessage
my_IOSend: sent
Shrinking output buffer

wolfSSL_read()
wolfSSL_read_internal()
ReceiveData()
my_IORecv: received
growing input buffer

my_IORecv: received
received record layer msg
got app DATA
Shrinking input buffer

---------- Rio: tcpClientHandler:wolfSSL_Heard: "I hear you fa shizzle!" ----------.
SSL_free
CTX ref count not 0 yet, no free
---------- Rio: tcpClientHandler:wolfSSL Memory_free ----------.
SSL_CTX_free
CTX ref count down to 0, doing full free
wolfSSL_CertManagerFree
wolfSSL_Cleanup
wolfCrypt_Cleanup