Closed satishIoT closed 5 years ago
More detailed log file ..............................................................................
ets Jun 8 2016 00:22:57
rst:0x1 (POWERON_RESET),boot:0x17 (SPI_FAST_FLASH_BOOT) flash read err, 1000 ets_main.c 371 ets Jun 8 2016 00:22:57
rst:0x10 (RTCWDT_RTC_RESET),boot:0x17 (SPI_FAST_FLASH_BOOT) configsip: 0, SPIWP:0xee clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00 mode:DIO, clock div:2 load:0x3fff0018,len:4 load:0x3fff001c,len:5708 load:0x40078000,len:0 load:0x40078000,len:13804 entry 0x40079030 I (68) boot: Detected ESP32 I (32) boot: ESP-IDF v3.0-dev-1392-g579201bc-dirty 2nd stage bootloader I (32) boot: compile time 20:45:39 I (33) boot: Enabling RNG early entropy source... I (38) boot: SPI Speed : 40MHz I (43) boot: SPI Mode : DIO I (47) boot: SPI Flash Size : 4MB I (51) boot: Partition Table: I (54) boot: ## Label Usage Type ST Offset Length I (61) boot: 0 nvs WiFi data 01 02 00009000 00006000 I (69) boot: 1 phy_init RF data 01 01 0000f000 00001000 I (76) boot: 2 factory factory app 00 00 00010000 00200000 I (84) boot: End of partition table I (88) esp_image: segment 0: paddr=0x00010020 vaddr=0x3f400020 size=0x4fcb0 (326832) map I (210) esp_image: segment 1: paddr=0x0005fcd8 vaddr=0x3ffc0000 size=0x00338 ( 824) load I (211) esp_image: segment 2: paddr=0x00060018 vaddr=0x400d0018 size=0xdc704 (902916) map I (530) esp_image: segment 3: paddr=0x0013c724 vaddr=0x3ffc0338 size=0x044b4 ( 17588) load I (538) esp_image: segment 4: paddr=0x00140be0 vaddr=0x40080000 size=0x00400 ( 1024) load I (538) esp_image: segment 5: paddr=0x00140fe8 vaddr=0x40080400 size=0x15bd0 ( 89040) load I (583) esp_image: segment 6: paddr=0x00156bc0 vaddr=0x400c0000 size=0x00064 ( 100) load I (583) esp_image: segment 7: paddr=0x00156c2c vaddr=0x50000000 size=0x00008 ( 8) load I (602) boot: Loaded app from partition at offset 0x10000 I (603) boot: Disabling RNG early entropy source... I (604) cpu_start: Pro cpu up. I (607) cpu_start: Starting app cpu, entry point is 0x400810f8 I (0) cpu_start: App cpu up. I (618) heap_init: Initializing. RAM available for dynamic allocation: D (624) heap_init: New heap initialised at 0x3ffaff10 I (629) heap_init: At 3FFAFF10 len 000000F0 (0 KiB): DRAM D (635) heap_init: New heap initialised at 0x3ffd5098 I (641) heap_init: At 3FFD5098 len 0000AF68 (43 KiB): DRAM I (647) heap_init: At 3FFE0440 len 00003BC0 (14 KiB): D/IRAM I (653) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM D (660) heap_init: New heap initialised at 0x40095fd0 I (665) heap_init: At 40095FD0 len 0000A030 (40 KiB): IRAM I (671) cpu_start: Pro cpu start user code D (683) clk: RTC_SLOW_CLK calibration value: 3299661 D (22) intr_alloc: Connected src 57 to int 2 (cpu 0) D (22) intr_alloc: Connected src 24 to int 3 (cpu 0) I (23) cpu_start: Starting scheduler on PRO CPU. D (0) intr_alloc: Connected src 25 to int 2 (cpu 1) I (0) cpu_start: Starting scheduler on APP CPU. D (37) heap_init: New heap initialised at 0x3ffe0440 D (47) heap_init: New heap initialised at 0x3ffe4350 D (57) intr_alloc: Connected src 16 to int 9 (cpu 0) I (57) APP_DEBUG: Hello world! I (57) APP_DEBUG: This is ESP32 chip with 2 CPU cores, WiFi/BT/BLE, I (67) APP_DEBUG: silicon revision 1, I (77) APP_DEBUG: 4MB external flash
I (77) APP_DEBUG: Version: ECO_V0.04-INT
D (87) intr_alloc: Connected src 49 to int 12 (cpu 0) D (2087) intr_alloc: Connected src 14 to int 13 (cpu 0) I (2087) APP_DEBUG: Timer ISR init is done D (2087) intr_alloc: Connected src 34 to int 17 (cpu 0) I (2087) APP_DEBUG: Not in MF mode D (2097) nvs: nvs_flash_init_custom partition=nvs start=9 count=6 D (2137) nvs: nvs_open_from_partition storage 1 D (2137) nvs: nvs_get_str_or_blob block1 D (2137) nvs: nvs_get_str_or_blob block1 I (2137) APP_DEBUG: retriving from EEPROM size = 328 D (2137) nvs: nvs_get_str_or_blob block1_crc D (2147) nvs: nvs_get_str_or_blob block1_crc I (2147) APP_DEBUG: EepromInit(698) checkSum = 0x17e949bc I (2157) APP_DEBUG: Checksum Passed I (2157) APP_DEBUG: Not a deep sleep reset I (2167) APP_DEBUG: Running Model is: EWS ECR3700R20 I (2167) APP_DEBUG: Shadow not connected prop_tbl_offset=85
I (2177) APP_DEBUG: Shadow not connected prop_tbl_offset=86
I (2187) gpio: GPIO[27]| InputEn: 0| OutputEn: 1| OpenDrain: 0| Pullup: 0| Pulldown: 0| Intr:0 D (2197) intr_alloc: Connected src 30 to int 18 (cpu 0) I (2197) APP_DEBUG: Shadow not connected prop_tbl_offset=84
I (2207) APP_DEBUG: Flag.Valve_Pos = 1 I (2207) gpio: GPIO[21]| InputEn: 1| OutputEn: 0| OpenDrain: 0| Pullup: 0| Pulldown: 0| Intr:0 I (2217) gpio: GPIO[33]| InputEn: 1| OutputEn: 0| OpenDrain: 0| Pullup: 0| Pulldown: 0| Intr:0 D (2227) intr_alloc: Connected src 22 to int 19 (cpu 0) D (2237) BTDM_INIT: .data initialise [0x3ffae6e0] <== [0x4000d890]
D (2237) BTDM_INIT: .bss initialise [0x3ffb0000] - [0x3ffb09a8]
D (2247) BTDM_INIT: .bss initialise [0x3ffb09a8] - [0x3ffb1ddc]
D (2247) BTDM_INIT: .bss initialise [0x3ffb1ddc] - [0x3ffb2730]
D (2257) BTDM_INIT: .bss initialise [0x3ffb2730] - [0x3ffb8000]
D (2267) BTDM_INIT: .bss initialise [0x3ffb8000] - [0x3ffbbb28]
D (2267) BTDM_INIT: .bss initialise [0x3ffbbb28] - [0x3ffbdb28]
D (2277) BTDM_INIT: .bss initialise [0x3ffbdb28] - [0x3ffc0000]
I (2277) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE D (2527) phy_init: loading PHY init data from application binary D (2527) nvs: nvs_open_from_partition phy 0 D (2527) nvs: nvs_get cal_version 4 D (2527) nvs: nvs_get_str_or_blob cal_mac D (2537) nvs: nvs_get_str_or_blob cal_data D (2547) nvs: nvs_close 2 I (2587) phy: phy_version: 366.0, ba9923d, Oct 31 2017, 18:06:17, 0, 0 I (2587) APP_DEBUG: ble_task init bluetooth D (2587) nvs: nvs_open_from_partition bt_config.conf 1 D (2587) nvs: nvs_get_str_or_blob bt_cfg_key D (2597) nvs: nvs_close 3 D (2597) nvs: nvs_open_from_partition bt_config.conf 1 D (2597) nvs: nvs_set_blob bt_cfg_key 216 D (2607) nvs: nvs_close 4 I (2637) APP_DEBUG: create attribute table successfully, the number handle = 9 I (2637) APP_DEBUG: SERVICE_START_EVT, status 0, service_handle 40
I (2647) APP_DEBUG: advertising start successfully I (3197) APP_DEBUG: Time in seconds, (started from bootup) = 0 I (3197) APP_DEBUG: Current Time 00:18:07 I (4197) APP_DEBUG: Time in seconds, (started from bootup) = 1 I (4197) APP_DEBUG: Current Time 00:18:08 I (4207) APP_DEBUG: esphal_getAdc1Voltage(266) *voltage = 577 I (4207) APP_DEBUG: Shadow not connected prop_tbl_offset=90
I (4217) APP_DEBUG: Shadow not connected prop_tbl_offset=89
I (4217) APP_DEBUG: Cust.Salt_Level = 10 I (4227) APP_DEBUG: Get_out_of_salt_days = 34 D (4237) nvs: nvs_open_from_partition misc 1 D (4237) nvs: nvs_get_str_or_blob log I (4237) wifi: wifi firmware version: f204566 I (4247) wifi: config NVS flash: enabled I (4247) wifi: config nano formating: disabled I (4247) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE I (4257) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE D (4267) nvs: nvs_open_from_partition nvs.net80211 1 D (4277) nvs: nvs_get opmode 1 D (4277) nvs: nvs_get_str_or_blob sta.ssid D (4277) nvs: nvs_get_str_or_blob sta.mac D (4277) nvs: nvs_get sta.authmode 1 D (4277) nvs: nvs_get_str_or_blob sta.pswd D (4287) nvs: nvs_get_str_or_blob sta.pmk D (4287) nvs: nvs_get sta.chan 1 D (4287) nvs: nvs_get auto.conn 1 D (4297) nvs: nvs_get bssid.set 1 D (4297) nvs: nvs_get_str_or_blob sta.bssid D (4307) nvs: nvs_get sta.phym 1 D (4307) nvs: nvs_get sta.phybw 1 D (4307) nvs: nvs_get_str_or_blob sta.apsw D (4317) nvs: nvs_get_str_or_blob sta.apinfo D (4317) nvs: nvs_get sta.scan_method 1 D (4317) nvs: nvs_get sta.sort_method 1 D (4327) nvs: nvs_get sta.minrssi 1 D (4327) nvs: nvs_get sta.minauth 1 D (4337) nvs: nvs_get_str_or_blob ap.ssid D (4337) nvs: nvs_get_str_or_blob ap.mac D (4337) nvs: nvs_get_str_or_blob ap.passwd D (4347) nvs: nvs_get_str_or_blob ap.pmk D (4347) nvs: nvs_get ap.chan 1 D (4357) nvs: nvs_get ap.authmode 1 D (4357) nvs: nvs_get ap.hidden 1 D (4357) nvs: nvs_get ap.max.conn 1 D (4367) nvs: nvs_get bcn.interval 2 D (4367) nvs: nvs_get ap.phym 1 D (4367) nvs: nvs_get ap.phybw 1 D (4377) nvs: nvs_get ap.sndchan 1 D (4377) nvs: nvs_set_blob sta.mac 6 D (4377) nvs: nvs_set_blob ap.mac 6 I (4387) wifi: Init dynamic tx buffer num: 32 I (4387) wifi: Init data frame dynamic rx buffer num: 32 I (4397) wifi: Init management frame dynamic rx buffer num: 32 I (4397) wifi: wifi driver task: 3ffe9638, prio:23, stack:4096 I (4407) wifi: Init static rx buffer num: 10 I (4407) wifi: Init dynamic rx buffer num: 32 I (4407) wifi: wifi power manager task: 0x3fff0564 prio: 21 stack: 2560 I (4417) APP_DEBUG: Setting WiFi configuration SSID FILxxxxxx... D (4427) RTC_MODULE: Wi-Fi takes adc2 lock. D (4427) phy_init: loading PHY init data from application binary D (4437) nvs: nvs_open_from_partition phy 0 D (4437) nvs: nvs_get cal_version 4 D (4447) nvs: nvs_get_str_or_blob cal_mac D (4447) nvs: nvs_get_str_or_blob cal_data D (4457) nvs: nvs_close 7 I (4457) wifi: mode : sta (30:ae:a4:38:57:54) I (4457) APP_DEBUG: AWS IoT SDK Version 2.1.1- D (4457) event: SYSTEM_EVENT_STA_START D (4467) tcpip_adapter: check: local, if=0 fn=0x401285dc
D (4477) tcpip_adapter: call api in lwip: ret=0x0, give sem D (4477) tcpip_adapter: check: remote, if=0 fn=0x401285dc
I (4607) wifi: n:1 0, o:1 0, ap:255 255, sta:1 0, prof:1 I (5597) wifi: state: init -> auth (b0) I (5597) wifi: state: auth -> assoc (0) I (5597) APP_DEBUG: Time in seconds, (started from bootup) = 2 I (5597) APP_DEBUG: Current Time 00:18:08 I (5607) wifi: state: assoc -> run (10) I (5627) wifi: connected with FILxxxxxx, channel 1 D (5627) event: SYSTEM_EVENT_STA_CONNECTED, ssid:FILxxxxxx, ssid_len:12, bssid:74:26:ac:e3:e4:d0, channel:1, authmode:3 D (5637) tcpip_adapter: check: local, if=0 fn=0x4012882c
D (5637) tcpip_adapter: call api in lwip: ret=0x0, give sem D (5647) tcpip_adapter: check: remote, if=0 fn=0x4012882c
D (5647) tcpip_adapter: check: local, if=0 fn=0x40128ce4
D (5657) tcpip_adapter: dhcp client init ip/mask/gw to all-0 D (5657) tcpip_adapter: if0 start ip lost tmr: enter D (5667) tcpip_adapter: if0 start ip lost tmr: no need start because netif=0x3fff0b18 interval=120 ip=0 D (5677) tcpip_adapter: dhcp client start successfully D (5677) tcpip_adapter: call api in lwip: ret=0x0, give sem D (5687) tcpip_adapter: check: remote, if=0 fn=0x40128ce4
I (6187) APP_DEBUG: Time in seconds, (started from bootup) = 3 I (6187) APP_DEBUG: Current Time 00:18:10 D (6777) tcpip_adapter: if0 dhcpc cb D (6777) tcpip_adapter: if0 ip changed=1 D (6777) event: SYSTEM_EVENT_STA_GOT_IP, ip:192.168.2.169, mask:255.255.255.0, gw:192.168.2.1 I (6777) event: sta ip: 192.168.2.169, mask: 255.255.255.0, gw: 192.168.2.1 I (6787) APP_DEBUG: Shadow Init I (6787) APP_DEBUG: Shadow Connect D (6797) aws_iot: Seeding the random number generator... D (6807) aws_iot: Loading embedded CA root certificate ... D (6807) aws_iot: ok (0 skipped) D (6807) aws_iot: Loading embedded client certificate... D (6817) aws_iot: Loading embedded client private key... D (6987) aws_iot: ok D (6987) aws_iot: Connecting to a2ng0twleztum6.iot.us-east-1.amazonaws.com/8883... I (7187) APP_DEBUG: Time in seconds, (started from bootup) = 4 I (7187) APP_DEBUG: Current Time 00:18:11 D (7397) aws_iot: ok D (7397) aws_iot: Setting up the SSL/TLS structure... D (7397) aws_iot: SSL state connect : 0 D (7397) aws_iot: ok D (7397) aws_iot: SSL state connect : 0 D (7407) aws_iot: Performing the SSL/TLS handshake... I (7407) mbedtls: ssl_tls.c:6557 => handshake
I (7417) mbedtls: ssl_cli.c:3363 client state: 0
I (7417) mbedtls: ssl_tls.c:2416 => flush output
I (7427) mbedtls: ssl_tls.c:2428 <= flush output
I (7427) mbedtls: ssl_cli.c:3363 client state: 1
I (7437) mbedtls: ssl_tls.c:2416 => flush output
I (7447) mbedtls: ssl_tls.c:2428 <= flush output
I (7447) mbedtls: ssl_cli.c:719 => write client hello
D (7457) mbedtls: ssl_cli.c:757 client hello, max version: [3:3]
D (7457) mbedtls: ssl_cli.c:695 client hello, current time: 7
D (7467) mbedtls: ssl_cli.c:766 dumping 'client hello, random bytes' (32 bytes)
D (7477) mbedtls: ssl_cli.c:766 0000: 00 00 00 07 b8 9a b5 ae a2 89 f7 bf 1f 2b 15 62 .............+.b
D (7487) mbedtls: ssl_cli.c:766 0010: 51 02 02 43 c5 5c 39 bc a6 e7 71 09 a2 c0 90 80 Q..C.\9...q.....
D (7497) mbedtls: ssl_cli.c:819 client hello, session id len.: 0
D (7497) mbedtls: ssl_cli.c:820 dumping 'client hello, session id' (0 bytes)
D (7507) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c02c
D (7517) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c030
D (7517) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 009f
D (7527) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c0ad
D (7537) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c09f
D (7537) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c024
D (7547) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c028
D (7557) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 006b
D (7557) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c00a
D (7567) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c014
D (7567) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 0039
D (7577) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c0af
D (7587) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c0a3
D (7587) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c02b
D (7597) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c02f
D (7607) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 009e
D (7607) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c0ac
D (7617) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c09e
D (7627) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c023
D (7627) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c027
D (7637) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 0067
D (7647) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c009
D (7647) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c013
D (7657) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 0033
D (7667) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c0ae
D (7667) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c0a2
D (7677) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 009d
D (7687) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c09d
D (7687) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 003d
D (7697) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 0035
D (7697) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c032
D (7707) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c02a
D (7717) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c00f
D (7717) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c02e
D (7727) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c026
D (7737) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c005
D (7737) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c0a1
D (7747) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 009c
D (7757) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c09c
D (7757) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 003c
D (7767) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: 002f
D (7777) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c031
D (7777) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c029
D (7787) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c00e
D (7797) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c02d
D (7797) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c025
D (7807) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c004
D (7817) mbedtls: ssl_cli.c:887 client hello, add ciphersuite: c0a0
D (7817) mbedtls: ssl_cli.c:920 client hello, got 49 ciphersuites
D (7827) mbedtls: ssl_cli.c:951 client hello, compress len.: 1
D (7827) mbedtls: ssl_cli.c:953 client hello, compress alg.: 0
D (7837) mbedtls: ssl_cli.c:72 client hello, adding server name extension: a2ng0twleztum6.iot.us-east-1.amazonaws.com
D (7847) mbedtls: ssl_cli.c:178 client hello, adding signature_algorithms extension
D (7857) mbedtls: ssl_cli.c:263 client hello, adding supported_elliptic_curves extension
D (7867) mbedtls: ssl_cli.c:328 client hello, adding supported_point_formats extension
D (7877) mbedtls: ssl_cli.c:510 client hello, adding encrypt_then_mac extension
D (7877) mbedtls: ssl_cli.c:544 client hello, adding extended_master_secret extension
D (7887) mbedtls: ssl_cli.c:577 client hello, adding session ticket extension
D (7897) mbedtls: ssl_cli.c:1025 client hello, total extension length: 123
I (7907) mbedtls: ssl_tls.c:2701 => write record
D (7907) mbedtls: ssl_tls.c:2838 output record: msgtype = 22, version = [3:1], msglen = 266
I (7917) mbedtls: ssl_tls.c:2416 => flush output
I (7927) mbedtls: ssl_tls.c:2435 message length: 271, out_left: 271
I (7927) mbedtls: ssl_tls.c:2441 ssl->f_send() returned 271 (-0xfffffef1)
I (7937) mbedtls: ssl_tls.c:2460 <= flush output
I (7947) mbedtls: ssl_tls.c:2850 <= write record
I (7947) mbedtls: ssl_cli.c:1051 <= write client hello
I (7957) mbedtls: ssl_cli.c:3363 client state: 2
I (7957) mbedtls: ssl_tls.c:2416 => flush output
I (7967) mbedtls: ssl_tls.c:2428 <= flush output
I (7967) mbedtls: ssl_cli.c:1447 => parse server hello
I (7977) mbedtls: ssl_tls.c:3721 => read record
I (7977) mbedtls: ssl_tls.c:2208 => fetch input
I (7987) mbedtls: ssl_tls.c:2366 in_left: 0, nb_want: 5
I (8187) APP_DEBUG: Time in seconds, (started from bootup) = 5 I (8197) APP_DEBUG: Current Time 00:18:12 I (8217) mbedtls: ssl_tls.c:2390 in_left: 0, nb_want: 5
I (8217) mbedtls: ssl_tls.c:2391 ssl->f_recv(_timeout)() returned 5 (-0xfffffffb)
I (8227) mbedtls: ssl_tls.c:2403 <= fetch input
D (8227) mbedtls: ssl_tls.c:3487 input record: msgtype = 22, version = [3:3], msglen = 2656
I (8237) mbedtls: ssl_tls.c:2208 => fetch input
I (8247) mbedtls: ssl_tls.c:2366 in_left: 5, nb_want: 2661
I (8247) mbedtls: ssl_tls.c:2390 in_left: 5, nb_want: 2661
I (8257) mbedtls: ssl_tls.c:2391 ssl->f_recv(_timeout)() returned 2656 (-0xfffff5a0)
I (8267) mbedtls: ssl_tls.c:2403 <= fetch input
D (8287) mbedtls: ssl_tls.c:3089 handshake message: msglen = 2656, type = 2, hslen = 81
I (8297) mbedtls: ssl_tls.c:3754 <= read record
D (8297) mbedtls: ssl_cli.c:1527 dumping 'server hello, version' (2 bytes)
D (8297) mbedtls: ssl_cli.c:1527 0000: 03 03 ..
D (8307) mbedtls: ssl_cli.c:1553 server hello, current time: 1521560951
D (8317) mbedtls: ssl_cli.c:1560 dumping 'server hello, random bytes' (32 bytes)
D (8327) mbedtls: ssl_cli.c:1560 0000: 5a b1 2d 77 e2 8f 41 69 23 c8 fd 69 0a ad be 38 Z.-w..Ai#..i...8
D (8337) mbedtls: ssl_cli.c:1560 0010: bd ae 3e da 5b ef 1e c9 99 07 21 64 30 b2 c3 45 ..>.[.....!d0..E
D (8347) mbedtls: ssl_cli.c:1640 server hello, session id len.: 32
D (8347) mbedtls: ssl_cli.c:1641 dumping 'server hello, session id' (32 bytes)
D (8357) mbedtls: ssl_cli.c:1641 0000: 5a b1 2d 77 65 32 db b4 d4 26 37 f1 3d 01 cf e6 Z.-we2...&7.=...
D (8367) mbedtls: sslcli.c:1641 0010: 0c 48 ec ba ea 77 2e 6a 4f 11 3f df c9 db 5f 99 .H...w.jO.?....
D (8377) mbedtls: ssl_cli.c:1679 no session has been resumed
D (8387) mbedtls: ssl_cli.c:1681 server hello, chosen ciphersuite: c02c
D (8387) mbedtls: ssl_cli.c:1682 server hello, compress alg.: 0
D (8397) mbedtls: ssl_cli.c:1698 server hello, chosen ciphersuite: TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
I (8407) mbedtls: ssl_cli.c:1733 server hello, total extension length: 5
D (8417) mbedtls: ssl_cli.c:1753 found renegotiation extension
I (8417) mbedtls: ssl_cli.c:1922 <= parse server hello
I (8427) mbedtls: ssl_cli.c:3363 client state: 3
I (8427) mbedtls: ssl_tls.c:2416 => flush output
I (8437) mbedtls: ssl_tls.c:2428 <= flush output
I (8437) mbedtls: ssl_tls.c:4320 => parse certificate
I (8447) mbedtls: ssl_tls.c:3721 => read record
D (8477) mbedtls: ssl_tls.c:3089 handshake message: msglen = 2575, type = 11, hslen = 2316
I (8477) mbedtls: ssl_tls.c:3754 <= read record
D (8477) mbedtls: ssl_tls.c:4524 peer certificate #1:
D (8487) mbedtls: ssl_tls.c:4524 cert. version : 3
D (8487) mbedtls: ssl_tls.c:4524 serial number : 0A:84:9B:FA:E6:BB:18:70:3F:F7:76:20:47:7C:7D:90
D (8497) mbedtls: ssl_tls.c:4524 issuer name : C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN=Symantec Class 3 ECC 256 bit SSL CA - G2
D (8507) mbedtls: ssl_tls.c:4524 subject name : C=US, ST=Washington, L=Seattle, O=Amazon.com, Inc., CN=*.iot.us-east-1.amazonaws.com
D (8527) mbedtls: ssl_tls.c:4524 issued on : 2017-11-22 00:00:00
D (8527) mbedtls: ssl_tls.c:4524 expires on : 2018-11-23 23:59:59
D (8537) mbedtls: ssl_tls.c:4524 signed using : ECDSA with SHA256
D (8547) mbedtls: ssl_tls.c:4524 EC key size : 256 bits
D (8547) mbedtls: ssl_tls.c:4524 basic constraints : CA=false
D (8557) mbedtls: ssl_tls.c:4524 subject alt name : iot.us-east-1.amazonaws.com, *.iot.us-east-1.amazonaws.com
D (8567) mbedtls: ssl_tls.c:4524 key usage : Digital Signature
D (8577) mbedtls: ssl_tls.c:4524 ext key usage : TLS Web Server Authentication, TLS Web Client Authentication
D (8587) mbedtls: ssl_tls.c:4524 value of 'crt->eckey.Q(X)' (256 bits) is:
D (8587) mbedtls: ssl_tls.c:4524 ad e4 44 4b 35 6b ff 52 f3 9e 57 b3 69 df 98 04
D (8597) mbedtls: ssl_tls.c:4524 1b ec 35 72 8a 16 79 a2 7a 08 9f c2 6a 24 39 85
I (8607) wifi: pm start, type:0
D (8607) mbedtls: ssl_tls.c:4524 value of 'crt->eckey.Q(Y)' (254 bits) is:
D (8617) mbedtls: ssl_tls.c:4524 33 59 cd b2 7e 65 2b e8 63 03 cd 8c 8a f9 27 c7
D (8627) mbedtls: ssl_tls.c:4524 f2 e8 4a 90 be 22 79 71 9c 60 3f 14 85 6f ae 45
D (8627) mbedtls: ssl_tls.c:4524 peer certificate #2:
D (8637) mbedtls: ssl_tls.c:4524 cert. version : 3
D (8637) mbedtls: ssl_tls.c:4524 serial number : 3F:92:87:BE:9D:1D:A4:A3:7A:9D:F6:28:2E:77:5A:C4
D (8647) mbedtls: ssl_tls.c:4524 issuer name : C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Certification Authority - G5
D (8667) mbedtls: ssl_tls.c:4524 subject name : C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN=Symantec Class 3 ECC 256 bit SSL CA - G2
D (8687) mbedtls: ssl_tls.c:4524 issued on : 2015-05-12 00:00:00
D (8687) mbedtls: ssl_tls.c:4524 expires on : 2025-05-11 23:59:59
D (8697) mbedtls: ssl_tls.c:4524 signed using : RSA with SHA-256
D (8707) mbedtls: ssl_tls.c:4524 EC key size : 256 bits
D (8707) mbedtls: ssl_tls.c:4524 basic constraints : CA=true, max_pathlen=0
D (8717) mbedtls: ssl_tls.c:4524 subject alt name :
D (8727) mbedtls: ssl_tls.c:4524 key usage : Key Cert Sign, CRL Sign
D (8727) mbedtls: ssl_tls.c:4524 value of 'crt->eckey.Q(X)' (252 bits) is:
D (8737) mbedtls: ssl_tls.c:4524 0f 1b a4 91 d7 e7 ac e7 d1 4e 4e b7 64 5b e1 8f
D (8747) mbedtls: ssl_tls.c:4524 7f 6e 04 d3 ab 38 db 44 b7 40 5c 6d bd 96 96 37
D (8757) mbedtls: ssl_tls.c:4524 value of 'crt->eckey.Q(Y)' (256 bits) is:
D (8757) mbedtls: ssl_tls.c:4524 df 79 89 86 67 f7 b1 1f 08 9e fd 63 3b 46 8c 9f
D (8767) mbedtls: ssl_tls.c:4524 bd 53 e8 15 dc 97 3e 2b 81 46 ad 86 7f 0e 01 39
I (9187) APP_DEBUG: Time in seconds, (started from bootup) = 6 I (9187) APP_DEBUG: Current Time 00:18:13 D (9637) aws_iot: Verify requested for (Depth 2): D (9637) aws_iot: cert. version : 3 serial number : 18:DA:D1:9E:26:7D:E8:BB:4A:21:58:CD:CC:6B:3B:4A issuer name : C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Cert D (9657) aws_iot: This certificate has no flags D (9657) aws_iot: Verify requested for (Depth 1): D (9667) aws_iot: cert. version : 3 serial number : 3F:92:87:BE:9D:1D:A4:A3:7A:9D:F6:28:2E:77:5A:C4 issuer name : C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 2006 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Cert D (9687) aws_iot: This certificate has no flags D (9697) aws_iot: Verify requested for (Depth 0): D (9697) aws_iot: cert. version : 3 serial number : 0A:84:9B:FA:E6:BB:18:70:3F:F7:76:20:47:7C:7D:90 issuer name : C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN=Symantec Class 3 ECC 256 bit SSL CA - G2 subject name : C=US, ST=Washington, L= D (9727) aws_iot: This certificate has no flags D (9727) mbedtls: ssl_tls.c:4679 Certificate verification flags clear
I (9737) mbedtls: ssl_tls.c:4684 <= parse certificate
I (9747) mbedtls: ssl_cli.c:3363 client state: 4
I (9747) mbedtls: ssl_tls.c:2416 => flush output
I (9757) mbedtls: ssl_tls.c:2428 <= flush output
I (9757) mbedtls: ssl_cli.c:2263 => parse server key exchange
I (9767) mbedtls: ssl_tls.c:3721 => read record
D (9777) mbedtls: ssl_tls.c:3089 handshake message: msglen = 259, type = 12, hslen = 217
I (9777) mbedtls: ssl_tls.c:3754 <= read record
D (9787) mbedtls: ssl_cli.c:2337 dumping 'server key exchange' (213 bytes)
D (9787) mbedtls: ssl_cli.c:2337 0000: 03 00 19 85 04 01 99 cc 8e 46 b6 61 13 46 b8 7f .........F.a.F..
D (9797) mbedtls: ssl_cli.c:2337 0010: 77 af 33 cc a6 27 3f d0 c5 c9 6d ec 5a 3d f0 5a w.3..'?...m.Z=.Z
D (9807) mbedtls: ssl_cli.c:2337 0020: dd 9b e8 79 a9 a8 45 c9 70 23 ae 3e d0 d7 03 55 ...y..E.p#.>...U
D (9817) mbedtls: ssl_cli.c:2337 0030: 38 c0 eb b9 ec 9b 46 cb 43 da 63 4c 56 a9 52 32 8.....F.C.cLV.R2
D (9827) mbedtls: ssl_cli.c:2337 0040: d5 24 35 01 1e 51 9d 01 d0 5d c7 2b d5 83 cc a9 .$5..Q...].+....
D (9837) mbedtls: ssl_cli.c:2337 0050: d6 bc cc 7e f9 ca ae 34 df cc 7c ee 64 e7 9b 0a ...~...4..|.d...
D (9847) mbedtls: ssl_cli.c:2337 0060: 8d 05 c4 39 75 ca 29 97 10 b2 8b 09 74 0a 01 cd ...9u.).....t...
D (9857) mbedtls: ssl_cli.c:2337 0070: 7a 58 b3 56 dd 93 1c 36 38 2e 4b b7 19 a1 42 48 zX.V...68.K...BH
D (9867) mbedtls: sslcli.c:2337 0080: cb 67 ed e1 5f d6 cf a0 7f 06 03 00 48 30 46 02 .g.........H0F.
D (9877) mbedtls: ssl_cli.c:2337 0090: 21 00 fa 98 57 72 81 e7 21 0b b6 26 4b e0 6f 54 !...Wr..!..&K.oT
D (9887) mbedtls: ssl_cli.c:2337 00a0: e2 0f 78 3a 8d 84 b3 9d a3 51 60 0d d7 8d 2b 3d ..x:.....Q`...+=
D (9897) mbedtls: ssl_cli.c:2337 00b0: 7d 41 02 21 00 b8 a1 23 82 f0 f8 ec b1 7e 46 0a }A.!...#.....~F.
D (9907) mbedtls: ssl_cli.c:2337 00c0: 04 d2 02 68 77 39 e2 ce af 93 74 4f 56 50 4d 24 ...hw9....tOVPM$
D (9917) mbedtls: ssl_cli.c:2337 00d0: 56 80 e8 3a db V..:.
I (9927) mbedtls: ssl_cli.c:1982 ECDH curve: secp521r1
D (9937) mbedtls: ssl_cli.c:1992 value of 'ECDH: Qp(X)' (521 bits) is:
D (9937) mbedtls: ssl_cli.c:1992 01 99 cc 8e 46 b6 61 13 46 b8 7f 77 af 33 cc a6
D (9947) mbedtls: ssl_cli.c:1992 27 3f d0 c5 c9 6d ec 5a 3d f0 5a dd 9b e8 79 a9
D (9957) mbedtls: ssl_cli.c:1992 a8 45 c9 70 23 ae 3e d0 d7 03 55 38 c0 eb b9 ec
D (9967) mbedtls: ssl_cli.c:1992 9b 46 cb 43 da 63 4c 56 a9 52 32 d5 24 35 01 1e
D (9967) mbedtls: ssl_cli.c:1992 51 9d
D (9977) mbedtls: ssl_cli.c:1992 value of 'ECDH: Qp(Y)' (521 bits) is:
D (9987) mbedtls: ssl_cli.c:1992 01 d0 5d c7 2b d5 83 cc a9 d6 bc cc 7e f9 ca ae
D (9987) mbedtls: ssl_cli.c:1992 34 df cc 7c ee 64 e7 9b 0a 8d 05 c4 39 75 ca 29
D (9997) mbedtls: ssl_cli.c:1992 97 10 b2 8b 09 74 0a 01 cd 7a 58 b3 56 dd 93 1c
D (10007) mbedtls: ssl_cli.c:1992 36 38 2e 4b b7 19 a1 42 48 cb 67 ed e1 5f d6 cf
D (10017) mbedtls: ssl_cli.c:1992 a0 7f
I (10017) mbedtls: ssl_cli.c:2205 Server used SignatureAlgorithm 3
I (10027) mbedtls: ssl_cli.c:2206 Server used HashAlgorithm 6
D (10027) mbedtls: ssl_cli.c:2484 dumping 'signature' (72 bytes)
D (10037) mbedtls: ssl_cli.c:2484 0000: 30 46 02 21 00 fa 98 57 72 81 e7 21 0b b6 26 4b 0F.!...Wr..!..&K
D (10047) mbedtls: ssl_cli.c:2484 0010: e0 6f 54 e2 0f 78 3a 8d 84 b3 9d a3 51 60 0d d7 .oT..x:.....Q`..
D (10057) mbedtls: ssl_cli.c:2484 0020: 8d 2b 3d 7d 41 02 21 00 b8 a1 23 82 f0 f8 ec b1 .+=}A.!...#.....
D (10067) mbedtls: ssl_cli.c:2484 0030: 7e 46 0a 04 d2 02 68 77 39 e2 ce af 93 74 4f 56 ~F....hw9....tOV
D (10077) mbedtls: ssl_cli.c:2484 0040: 50 4d 24 56 80 e8 3a db PM$V..:.
D (10087) mbedtls: ssl_cli.c:2572 dumping 'parameters hash' (64 bytes)
D (10097) mbedtls: ssl_cli.c:2572 0000: cb d4 9b a1 43 16 44 e7 14 38 aa a9 1d bc 93 45 ....C.D..8.....E
D (10107) mbedtls: ssl_cli.c:2572 0010: 97 0e 34 23 d8 d8 30 2e 4a ae 37 13 83 36 39 c8 ..4#..0.J.7..69.
D (10117) mbedtls: ssl_cli.c:2572 0020: 0a 13 71 db 6f 25 12 70 1a 05 da d4 bb 5b 0c 05 ..q.o%.p.....[..
D (10127) mbedtls: ssl_cli.c:2572 0030: 56 86 c4 a3 61 b1 7c 39 16 73 00 53 54 0b 1b 2f V...a.|9.s.ST../
I (10187) APP_DEBUG: Time in seconds, (started from bootup) = 7 I (10187) APP_DEBUG: Current Time 00:18:14
I (10937) mbedtls: ssl_cli.c:2607 <= parse server key exchange
I (10937) mbedtls: ssl_cli.c:3363 client state: 5
I (10937) mbedtls: ssl_tls.c:2416 => flush output
I (10947) mbedtls: ssl_tls.c:2428 <= flush output
I (10947) mbedtls: ssl_cli.c:2640 => parse certificate request
I (10957) mbedtls: ssl_tls.c:3721 => read record
D (10967) mbedtls: ssl_tls.c:3089 handshake message: msglen = 42, type = 13, hslen = 38
I (10967) mbedtls: ssl_tls.c:3754 <= read record
D (10977) mbedtls: ssl_cli.c:2667 got a certificate request
D (10977) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 6,3
D (10987) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 6,1
D (10997) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 5,3
D (11007) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 5,1
D (11007) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 4,3
D (11017) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 4,1
D (11027) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 4,2
D (11027) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 3,3
D (11037) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 3,1
D (11047) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 3,2
D (11057) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 2,3
D (11057) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 2,1
D (11067) mbedtls: ssl_cli.c:2727 Supported Signature Algorithm found: 2,2
I (11077) mbedtls: ssl_cli.c:2757 <= parse certificate request
I (11077) mbedtls: ssl_cli.c:3363 client state: 6
I (11087) mbedtls: ssl_tls.c:2416 => flush output
I (11087) mbedtls: ssl_tls.c:2428 <= flush output
I (11097) mbedtls: ssl_cli.c:2767 => parse server hello done
I (11107) mbedtls: ssl_tls.c:3721 => read record
D (11107) mbedtls: ssl_tls.c:3089 handshake message: msglen = 4, type = 14, hslen = 4
I (11117) mbedtls: ssl_tls.c:3754 <= read record
I (11127) mbedtls: ssl_cli.c:2797 <= parse server hello done
I (11127) mbedtls: ssl_cli.c:3363 client state: 7
I (11137) mbedtls: ssl_tls.c:2416 => flush output
I (11137) mbedtls: ssl_tls.c:2428 <= flush output
I (11147) mbedtls: ssl_tls.c:4203 => write certificate
D (11147) mbedtls: ssl_tls.c:4255 own certificate #1:
D (11157) mbedtls: ssl_tls.c:4255 cert. version : 3
D (11167) mbedtls: ssl_tls.c:4255 serial number : A7:7A:1A:38:44:B1:F7:B3:8A:62:C9:AC:58:4D:E8:EF:0A:51:29:C5
D (11177) mbedtls: ssl_tls.c:4255 issuer name : OU=Amazon Web Services O=Amazon.com Inc. L=Seattle ST=Washington C=US
D (11187) mbedtls: ssl_tls.c:4255 subject name : CN=AWS IoT Certificate
I (11187) APP_DEBUG: Time in seconds, (started from bootup) = 8 D (11187) mbedtls: ssl_tls.c:4255 issued on : 2018-03-11 07:21:37
I (11197) APP_DEBUG: Current Time 00:18:15 D (11207) mbedtls: ssl_tls.c:4255 expires on : 2049-12-31 23:59:59
D (11217) mbedtls: ssl_tls.c:4255 signed using : RSA with SHA-256
D (11227) mbedtls: ssl_tls.c:4255 RSA key size : 2048 bits
D (11227) mbedtls: ssl_tls.c:4255 basic constraints : CA=false
D (11237) mbedtls: ssl_tls.c:4255 key usage : Digital Signature
D (11247) mbedtls: ssl_tls.c:4255 value of 'crt->rsa.N' (2048 bits) is:
D (11247) mbedtls: ssl_tls.c:4255 c8 8c 2b 03 8e 56 a7 b4 0e 5d e7 2f 3f 8c ec ce
D (11257) mbedtls: ssl_tls.c:4255 35 44 08 f4 ea 40 fb 71 18 88 f7 de ea 90 c3 e2
D (11267) mbedtls: ssl_tls.c:4255 2e 1f 3a e3 6a ef 9d 41 33 4c c4 b3 76 10 fc c2
D (11277) mbedtls: ssl_tls.c:4255 9d 3f ac 6b 0e cb 1d d7 f3 a6 d5 9e 27 8a 78 75
D (11277) mbedtls: ssl_tls.c:4255 6d ba 12 23 18 8f 97 3f 26 a1 87 d8 34 d6 5d da
D (11287) mbedtls: ssl_tls.c:4255 7e 11 10 b0 0b 6a 48 00 93 e8 89 d3 62 4d d4 5a
D (11297) mbedtls: ssl_tls.c:4255 54 5c f1 2a 76 7c 3a dc 6c a6 e5 a8 ec 7d 0d 48
D (11307) mbedtls: ssl_tls.c:4255 ff 92 2d d8 02 51 b8 da c2 42 3e dc 53 16 d9 0e
D (11317) mbedtls: ssl_tls.c:4255 22 ce 6f 32 ea f3 52 3f 0c dd 05 32 ae 45 78 4c
D (11317) mbedtls: ssl_tls.c:4255 39 4a c2 68 9d fc 32 c9 07 45 8a 16 5f 1e c2 8a
D (11327) mbedtls: ssl_tls.c:4255 ef 48 dd d6 90 1f 54 4c a5 2e ff a2 e8 b5 50 03
D (11337) mbedtls: ssl_tls.c:4255 4e 86 f6 38 6b 89 58 2e b3 42 18 94 e3 80 9a 05
D (11347) mbedtls: ssl_tls.c:4255 a1 4d 55 15 bb 3c 8c bb a1 1b a7 6e ad ba 63 fa
D (11347) mbedtls: ssl_tls.c:4255 66 f7 90 15 22 f3 98 25 e0 64 0c f6 76 c2 be c1
D (11357) mbedtls: ssl_tls.c:4255 c4 85 3e b4 43 3e be cd 96 83 b3 49 f1 37 c9 61
D (11367) mbedtls: ssl_tls.c:4255 75 e9 11 b1 7e 11 02 ec 0e 36 99 d9 42 25 7b 37
D (11377) mbedtls: ssl_tls.c:4255 value of 'crt->rsa.E' (17 bits) is:
D (11377) mbedtls: ssl_tls.c:4255 01 00 01
I (11387) mbedtls: ssl_tls.c:2701 => write record
D (11397) mbedtls: ssl_tls.c:2838 output record: msgtype = 22, version = [3:3], msglen = 872
I (11407) mbedtls: ssl_tls.c:2416 => flush output
I (11407) mbedtls: ssl_tls.c:2435 message length: 877, out_left: 877
I (11417) mbedtls: ssl_tls.c:2441 ssl->f_send() returned 877 (-0xfffffc93)
I (11417) mbedtls: ssl_tls.c:2460 <= flush output
I (11427) mbedtls: ssl_tls.c:2850 <= write record
I (11427) mbedtls: ssl_tls.c:4307 <= write certificate
I (11437) mbedtls: ssl_cli.c:3363 client state: 8
I (11447) mbedtls: ssl_tls.c:2416 => flush output
I (11447) mbedtls: ssl_tls.c:2428 <= flush output
I (11457) mbedtls: ssl_cli.c:2809 => write client key exchange
I (12187) APP_DEBUG: Time in seconds, (started from bootup) = 9 I (12187) APP_DEBUG: Current Time 00:18:16
D (12347) mbedtls: ssl_cli.c:2874 value of 'ECDH: Q(X)' (521 bits) is:
D (12347) mbedtls: ssl_cli.c:2874 01 15 7d 10 fa df a4 a8 72 a4 f3 30 78 52 d4 53
D (12347) mbedtls: ssl_cli.c:2874 08 20 15 f6 e5 4b 32 fb 20 8e 43 21 d9 5e fd fa
D (12357) mbedtls: ssl_cli.c:2874 3f 7a ea 0e c4 e3 7c 7c d5 75 e2 df 2e 16 0c 01
D (12367) mbedtls: ssl_cli.c:2874 2a 51 f9 a7 d6 cf d2 be bd 1f 85 5b 0b 08 8b ea
D (12367) mbedtls: ssl_cli.c:2874 41 46
D (12377) mbedtls: ssl_cli.c:2874 value of 'ECDH: Q(Y)' (521 bits) is:
D (12387) mbedtls: ssl_cli.c:2874 01 ce 9a 4a 38 95 a6 aa 5e 9b d0 c9 34 71 90 83
D (12387) mbedtls: ssl_cli.c:2874 0e d3 e4 76 a3 93 5c 3b 27 5c 16 5e 8d 44 21 7c
D (12397) mbedtls: ssl_cli.c:2874 16 4a cd 4b b8 69 a4 6b 98 70 13 89 44 ea 2f 38
D (12407) mbedtls: ssl_cli.c:2874 ab f0 bb 2e 87 fe 6c 37 7a c7 29 c2 61 d2 cc 41
D (12417) mbedtls: ssl_cli.c:2874 27 c4
I (13187) APP_DEBUG: Time in seconds, (started from bootup) = 10 I (13187) APP_DEBUG: Current Time 00:18:17 D (13317) mbedtls: ssl_cli.c:2886 value of 'ECDH: z' (521 bits) is:
D (13317) mbedtls: ssl_cli.c:2886 01 b7 a2 db 0a 6a 1b 16 9b 60 84 3e 97 a1 90 fe
D (13327) mbedtls: ssl_cli.c:2886 e8 fe e1 1a c3 9c ad ec 1b bc db 6c fd fe 97 40
D (13337) mbedtls: ssl_cli.c:2886 2c b0 d4 e6 b8 04 b5 60 78 3f f8 2e 8f b0 71 6f
D (13337) mbedtls: ssl_cli.c:2886 18 58 a6 a3 86 05 16 11 37 00 f5 79 31 10 89 db
D (13347) mbedtls: ssl_cli.c:2886 e8 56
I (13357) mbedtls: ssl_tls.c:2701 => write record
D (13357) mbedtls: ssl_tls.c:2838 output record: msgtype = 22, version = [3:3], msglen = 138
I (13367) mbedtls: ssl_tls.c:2416 => flush output
I (13377) mbedtls: ssl_tls.c:2435 message length: 143, out_left: 143
I (13377) mbedtls: ssl_tls.c:2441 ssl->f_send() returned 143 (-0xffffff71)
I (13387) mbedtls: ssl_tls.c:2460 <= flush output
I (13397) mbedtls: ssl_tls.c:2850 <= write record
I (13397) mbedtls: ssl_cli.c:3051 <= write client key exchange
I (13407) mbedtls: ssl_cli.c:3363 client state: 9
I (13407) mbedtls: ssl_tls.c:2416 => flush output
I (13417) mbedtls: ssl_tls.c:2428 <= flush output
I (13417) mbedtls: ssl_cli.c:3102 => write certificate verify
I (13427) mbedtls: ssl_tls.c:501 => derive keys
D (13437) mbedtls: ssl_tls.c:579 dumping 'premaster secret' (66 bytes)
D (13437) mbedtls: ssl_tls.c:579 0000: 01 b7 a2 db 0a 6a 1b 16 9b 60 84 3e 97 a1 90 fe .....j...`.>....
D (13447) mbedtls: ssl_tls.c:579 0010: e8 fe e1 1a c3 9c ad ec 1b bc db 6c fd fe 97 40 ...........l...@
D (13457) mbedtls: ssl_tls.c:579 0020: 2c b0 d4 e6 b8 04 b5 60 78 3f f8 2e 8f b0 71 6f ,......`x?....qo
D (13467) mbedtls: ssl_tls.c:579 0030: 18 58 a6 a3 86 05 16 11 37 00 f5 79 31 10 89 db .X......7..y1...
D (13477) mbedtls: ssl_tls.c:579 0040: e8 56 .V
D (13497) mbedtls: ssl_tls.c:667 ciphersuite = TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
D (13497) mbedtls: ssl_tls.c:668 dumping 'master secret' (48 bytes)
D (13507) mbedtls: ssl_tls.c:668 0000: 27 ef 2c b7 d7 55 f6 a9 8d f9 66 d8 a7 ca 1c 4c '.,..U....f....L
D (13517) mbedtls: ssl_tls.c:668 0010: bb 44 c2 76 3b ef 4c f9 c7 c5 c3 6a f1 29 27 4f .D.v;.L....j.)'O
D (13527) mbedtls: ssl_tls.c:668 0020: 35 00 64 b8 a9 27 d3 ab 5c fc 8a be 8a 7a 7e a0 5.d..'......z~.
D (13537) mbedtls: ssl_tls.c:767 keylen: 32, minlen: 24, ivlen: 12, maclen: 0
I (13537) mbedtls: ssl_tls.c:957 <= derive keys
I (13547) mbedtls: ssl_tls.c:1067 => calc verify sha384
D (13547) mbedtls: ssl_tls.c:1072 dumping 'calculated verify result' (48 bytes)
D (13557) mbedtls: ssl_tls.c:1072 0000: 6a 90 22 6b 63 97 a4 51 2d c8 e0 43 e4 1f 25 e7 j."kc..Q-..C..%.
D (13567) mbedtls: ssl_tls.c:1072 0010: 18 d5 8b cf 2a 21 b1 13 bc ee 63 48 fa 5a b4 69 ....*!....cH.Z.i
D (13577) mbedtls: ssl_tls.c:1072 0020: ae b3 ea 36 66 98 a8 58 96 60 a3 cd 5c 10 75 6b ...6f..X.`...uk
I (13587) mbedtls: ssl_tls.c:1073 <= calc verify
W (14087) mbedtls: ssl_cli.c:3217 mbedtls_pk_sign() returned -17168 (-0x4310)
I (14087) mbedtls: ssl_tls.c:6567 <= handshake
E (14097) aws_iot: failed! mbedtls_ssl_handshake returned -0x4310 I (14097) mbedtls: ssl_tls.c:7186 => write close notify
I (14107) mbedtls: ssl_tls.c:7202 <= write close notify
I (14117) mbedtls: ssl_tls.c:7344 => free
I (14117) mbedtls: ssl_tls.c:7409 <= free
E (14117) APP_DEBUG: aws_iot_shadow_connect returned error -4, aborting... abort() was called at PC 0x4010d017 on core 1
Backtrace: 0x4008c5cc:0x3ffdfca0 0x4008c6cb:0x3ffdfcc0 0x4010d017:0x3ffdfce0
Rebooting...
Satish, the error -0x4310 refers to MBEDTLS_ERR_RSA_PRIVATE_FAILED (0x4300) + MBEDTLS_ERR_MPI_ALLOC_FAILED (0x0010). It looks like your system is running out of memory.
Any more input im using ERS32 WROOM module and i guess we have enough memory to deal with all tasks. Any changes in menuconfig to be taken care in mbedtls ?
@satishIoT
Did you check how much dynamic memory is available (please note that WROOM module does not have external SPIRAM) before starting TLS connection (or at various stages in AWS IoT shadow task)? You can use esp_get_free_heap_size
and esp_get_minimum_free_heap_size
APIs for this.
Thanks @negativekelvin your suggestion was spot on. But i have another issue ; im using the shadow example and as understood if n/w disconnects then the autoreconnect of shadow should have happened and should have looped in while(NETWORK_ATTEMPTING_RECONNECT == rc || NETWORK_RECONNECTED == rc || SUCCESS == rc) { rc = aws_iot_shadow_yield(&mqttClient, 200); if(NETWORK_ATTEMPTING_RECONNECT == rc || shadowUpdateInProgress) { rc = aws_iot_shadow_yield(&mqttClient, 1000); // If the client is attempting to reconnect, or already waiting on a shadow update, // we will skip the rest of the loop. continue; } But instead it goes all down through the loop and give rc = -28. Pl suggest how to initiate the reconnect when ever n/w breakdown happens and comes back.
thanks satish
pl suggest on above errors.
Dear Experts , Awaiting for suggestions on how to deal with above errors , to make my connection robust .
thanks in advance !!
@satishIoT "mbedtls_net_connect returned -0x52" indicates hostname resolution failure (internet connectivity issue?)
@ameyinamdar - Im using hotspot to verify/test how the connectivity works say if i try posting mqtt messages say at every minute then i dont see such issue but if i dont enable my hotspot for 45 min or more ( kind of connection break ) i see this error along with -14 and -13 error also. i want to have a robust method to connect my device when ever connectivity returns back. what should i need to take care in such cases.
Dear Experts , Awaiting for suggestions on how to deal with above errors , to make my connection robust .
thanks in advance !!
@satishIoT The thing_shadow_sample example does not take care of reconnection and the task is killed upon disconnection. What changes have you made to restart the aws_iot_task on reconnection? Are you getting the errors -14/-13 with your changes? Can you please share them?
@ameyinamdar - as per above log you see im getting -13 and -14 errors . Could share some pointer on how to take care of re-connection. Im using hotspot to connect and after some time i turn off the hotspot for more then a hour and see it never reconnects.
thanks for helping !!
Dear Experts , Awaiting for suggestions on how to deal with above errors , to make my connection robust .
thanks in advance !!
@satishIoT Hi, sorry that get back to you so late. Does your issue still exist? Thanks.
@satishIoT Closing this issue (not reproducible at our end), in case it still exists please feel free to reopen at https://github.com/espressif/esp-aws-iot (we moved aws-iot
to independent repository)
Hi I keep facing this error now and then when ever i work with shadow. 1) aws_iot: failed! mbedtls_ssl_handshake returned -0x4310 E (18143) APP_DEBUG: aws_iot_shadow_connect returned error -4, aborting... 2) Shadow update timeout .. 3) And if it succeeds posting messages then again at some point i get aws_iot: failed! mbedtls_ssl_handshake returned -0x4310 and never able to reconnect or recover from there on. 4) This certificate has no flags : what this means will this cause any issue w.r.t connection to aws. pl advice !! sats
Complete log file .....................................................
Rebooting... ets Jun 8 2016 00:22:57
rst:0xc (SW_CPU_RESET),boot:0x17 (SPI_FAST_FLASH_BOOT) configsip: 0, SPIWP:0xee clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00 mode:DIO, clock div:2 load:0x3fff0018,len:4 load:0x3fff001c,len:5708 load:0x40078000,len:0 load:0x40078000,len:13804 entry 0x40079030 I (68) boot: Detected ESP32 I (32) boot: ESP-IDF v3.0-dev-1392-g579201bc-dirty 2nd stage bootloader I (32) boot: compile time 17:09:35 I (33) boot: Enabling RNG early entropy source... I (39) boot: SPI Speed : 40MHz I (43) boot: SPI Mode : DIO I (47) boot: SPI Flash Size : 4MB I (51) boot: Partition Table: I (55) boot: ## Label Usage Type ST Offset Length I (62) boot: 0 nvs WiFi data 01 02 00009000 00006000 I (69) boot: 1 phy_init RF data 01 01 0000f000 00001000 I (77) boot: 2 factory factory app 00 00 00010000 00200000 I (84) boot: End of partition table I (88) esp_image: segment 0: paddr=0x00010020 vaddr=0x3f400020 size=0x4a5b0 (304 560) map I (203) esp_image: segment 1: paddr=0x0005a5d8 vaddr=0x3ffc0000 size=0x047f4 ( 1 8420) load I (211) esp_image: segment 2: paddr=0x0005edd4 vaddr=0x40080000 size=0x00400 ( 1024) load I (211) esp_image: segment 3: paddr=0x0005f1dc vaddr=0x40080400 size=0x00e34 ( 3636) load I (220) esp_image: segment 4: paddr=0x00060018 vaddr=0x400d0018 size=0xd794c (88 3020) map I (534) esp_image: segment 5: paddr=0x0013796c vaddr=0x40081234 size=0x14d9c ( 8 5404) load I (570) esp_image: segment 6: paddr=0x0014c710 vaddr=0x400c0000 size=0x00064 ( 100) load I (570) esp_image: segment 7: paddr=0x0014c77c vaddr=0x50000000 size=0x00008 ( 8) load I (589) boot: Loaded app from partition at offset 0x10000 I (589) boot: Disabling RNG early entropy source... I (590) cpu_start: Pro cpu up. I (594) cpu_start: Starting app cpu, entry point is 0x400810f8 I (584) cpu_start: App cpu up. I (605) heap_init: Initializing. RAM available for dynamic allocation: D (611) heap_init: New heap initialised at 0x3ffaff10 I (616) heap_init: At 3FFAFF10 len 000000F0 (0 KiB): DRAM D (622) heap_init: New heap initialised at 0x3ffd4fa8 I (628) heap_init: At 3FFD4FA8 len 0000B058 (44 KiB): DRAM I (634) heap_init: At 3FFE0440 len 00003BC0 (14 KiB): D/IRAM I (640) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM D (647) heap_init: New heap initialised at 0x40095fd0 I (652) heap_init: At 40095FD0 len 0000A030 (40 KiB): IRAM I (658) cpu_start: Pro cpu start user code D (670) clk: RTC_SLOW_CLK calibration value: 3293798 D (9) intr_alloc: Connected src 57 to int 2 (cpu 0) D (9) intr_alloc: Connected src 24 to int 3 (cpu 0) I (10) cpu_start: Starting scheduler on PRO CPU. D (0) intr_alloc: Connected src 25 to int 2 (cpu 1) I (0) cpu_start: Starting scheduler on APP CPU. D (24) heap_init: New heap initialised at 0x3ffe0440 D (34) heap_init: New heap initialised at 0x3ffe4350 D (44) intr_alloc: Connected src 16 to int 9 (cpu 0) I (44) APP_DEBUG: Hello world! I (44) APP_DEBUG: This is ESP32 chip with 2 CPU cores, WiFi/BT/BLE, I (54) APP_DEBUG: silicon revision 1, I (64) APP_DEBUG: 4MB external flash
I (64) APP_DEBUG: Version: ECO_V0.04-INT
D (74) intr_alloc: Connected src 49 to int 12 (cpu 0) D (2074) intr_alloc: Connected src 14 to int 13 (cpu 0) I (2074) APP_DEBUG: Timer ISR init is done D (2074) intr_alloc: Connected src 34 to int 17 (cpu 0) I (2074) APP_DEBUG: Not in MF mode D (2084) nvs: nvs_flash_init_custom partition=nvs start=9 count=6 D (2124) nvs: nvs_open_from_partition storage 1 D (2124) nvs: nvs_get_str_or_blob block1 D (2124) nvs: nvs_get_str_or_blob block1 I (2124) APP_DEBUG: retriving from EEPROM size = 328 D (2124) nvs: nvs_get_str_or_blob block1_crc D (2134) nvs: nvs_get_str_or_blob block1_crc I (2134) APP_DEBUG: EepromInit(698) checkSum = 0x17e949bc I (2144) APP_DEBUG: Checksum Passed I (2144) APP_DEBUG: Not a deep sleep reset I (2154) APP_DEBUG: Running Model is: EWS ECR3700R20 I (2154) APP_DEBUG: Shadow not connected prop_tbl_offset=85
I (2164) APP_DEBUG: Shadow not connected prop_tbl_offset=86
I (2174) gpio: GPIO[27]| InputEn: 0| OutputEn: 1| OpenDrain: 0| Pullup: 0| Pulld own: 0| Intr:0 D (2184) intr_alloc: Connected src 30 to int 18 (cpu 0) I (2184) APP_DEBUG: Shadow not connected prop_tbl_offset=84
I (2194) APP_DEBUG: Flag.Valve_Pos = 1 I (2194) gpio: GPIO[21]| InputEn: 1| OutputEn: 0| OpenDrain: 0| Pullup: 0| Pulld own: 0| Intr:0 I (2204) gpio: GPIO[33]| InputEn: 1| OutputEn: 0| OpenDrain: 0| Pullup: 0| Pulld own: 0| Intr:0 D (2214) intr_alloc: Connected src 22 to int 19 (cpu 0) D (2224) BTDM_INIT: .data initialise [0x3ffae6e0] <== [0x4000d890]
D (2224) BTDM_INIT: .bss initialise [0x3ffb0000] - [0x3ffb09a8]
D (2234) BTDM_INIT: .bss initialise [0x3ffb09a8] - [0x3ffb1ddc]
D (2234) BTDM_INIT: .bss initialise [0x3ffb1ddc] - [0x3ffb2730]
D (2244) BTDM_INIT: .bss initialise [0x3ffb2730] - [0x3ffb8000]
D (2254) BTDM_INIT: .bss initialise [0x3ffb8000] - [0x3ffbbb28]
D (2254) BTDM_INIT: .bss initialise [0x3ffbbb28] - [0x3ffbdb28]
D (2264) BTDM_INIT: .bss initialise [0x3ffbdb28] - [0x3ffc0000]
I (2264) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE D (2514) phy_init: loading PHY init data from application binary D (2514) nvs: nvs_open_from_partition phy 0 D (2514) nvs: nvs_get cal_version 4 D (2514) nvs: nvs_get_str_or_blob cal_mac D (2524) nvs: nvs_get_str_or_blob cal_data D (2554) nvs: nvs_close 2 I (2584) phy: phy_version: 366.0, ba9923d, Oct 31 2017, 18:06:17, 0, 0 I (2584) APP_DEBUG: ble_task init bluetooth D (2584) nvs: nvs_open_from_partition bt_config.conf 1 D (2584) nvs: nvs_get_str_or_blob bt_cfg_key D (2594) nvs: nvs_close 3 D (2594) nvs: nvs_open_from_partition bt_config.conf 1 D (2594) nvs: nvs_set_blob bt_cfg_key 216 D (2604) nvs: nvs_close 4 I (2634) APP_DEBUG: create attribute table successfully, the number handle = 9 I (2644) APP_DEBUG: SERVICE_START_EVT, status 0, service_handle 40
I (2644) APP_DEBUG: advertising start successfully I (3174) APP_DEBUG: Time in seconds, (started from bootup) = 0 I (3174) APP_DEBUG: Current Time 00:18:07 I (4174) APP_DEBUG: Time in seconds, (started from bootup) = 1 I (4174) APP_DEBUG: Current Time 00:18:08 I (4184) APP_DEBUG: esphal_getAdc1Voltage(266) *voltage = 421 I (4184) APP_DEBUG: Shadow not connected prop_tbl_offset=90
I (4194) APP_DEBUG: Shadow not connected prop_tbl_offset=89
I (4194) APP_DEBUG: Cust.Salt_Level = 10 I (4204) APP_DEBUG: Get_out_of_salt_days = 34 D (4224) nvs: nvs_open_from_partition misc 1 D (4224) nvs: nvs_get_str_or_blob log I (4224) wifi: wifi firmware version: f204566 I (4224) wifi: config NVS flash: enabled I (4224) wifi: config nano formating: disabled I (4234) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE I (4244) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE D (4254) nvs: nvs_open_from_partition nvs.net80211 1 D (4254) nvs: nvs_get opmode 1 D (4254) nvs: nvs_get_str_or_blob sta.ssid D (4264) nvs: nvs_get_str_or_blob sta.mac D (4264) nvs: nvs_get sta.authmode 1 D (4274) nvs: nvs_get_str_or_blob sta.pswd D (4274) nvs: nvs_get_str_or_blob sta.pmk D (4274) nvs: nvs_get sta.chan 1 D (4284) nvs: nvs_get auto.conn 1 D (4284) nvs: nvs_get bssid.set 1 D (4284) nvs: nvs_get_str_or_blob sta.bssid D (4294) nvs: nvs_get sta.phym 1 D (4294) nvs: nvs_get sta.phybw 1 D (4294) nvs: nvs_get_str_or_blob sta.apsw D (4304) nvs: nvs_get_str_or_blob sta.apinfo D (4304) nvs: nvs_get sta.scan_method 1 D (4304) nvs: nvs_get sta.sort_method 1 D (4304) nvs: nvs_get sta.minrssi 1 D (4304) nvs: nvs_get sta.minauth 1 D (4314) nvs: nvs_get_str_or_blob ap.ssid D (4314) nvs: nvs_get_str_or_blob ap.mac D (4324) nvs: nvs_get_str_or_blob ap.passwd D (4324) nvs: nvs_get_str_or_blob ap.pmk D (4324) nvs: nvs_get ap.chan 1 D (4334) nvs: nvs_get ap.authmode 1 D (4334) nvs: nvs_get ap.hidden 1 D (4334) nvs: nvs_get ap.max.conn 1 D (4344) nvs: nvs_get bcn.interval 2 D (4344) nvs: nvs_get ap.phym 1 D (4344) nvs: nvs_get ap.phybw 1 D (4354) nvs: nvs_get ap.sndchan 1 D (4354) nvs: nvs_set_blob sta.mac 6 D (4364) nvs: nvs_set_blob ap.mac 6 I (4364) wifi: Init dynamic tx buffer num: 32 I (4364) wifi: Init data frame dynamic rx buffer num: 32 I (4374) wifi: Init management frame dynamic rx buffer num: 32 I (4374) wifi: wifi driver task: 3ffec828, prio:23, stack:4096 I (4384) wifi: Init static rx buffer num: 10 I (4384) wifi: Init dynamic rx buffer num: 32 I (4394) wifi: wifi power manager task: 0x3fff1468 prio: 21 stack: 2560 I (4394) APP_DEBUG: Setting WiFi configuration SSID FILxxxxxx... D (4404) RTC_MODULE: Wi-Fi takes adc2 lock. D (4404) phy_init: loading PHY init data from application binary D (4414) nvs: nvs_open_from_partition phy 0 D (4414) nvs: nvs_get cal_version 4 D (4424) nvs: nvs_get_str_or_blob cal_mac D (4424) nvs: nvs_get_str_or_blob cal_data D (4434) nvs: nvs_close 7 I (4444) wifi: mode : sta (30:ae:a4:38:57:54) I (4444) APP_DEBUG: AWS IoT SDK Version 2.1.1- D (4444) event: SYSTEM_EVENT_STA_START D (4444) tcpip_adapter: check: local, if=0 fn=0x401284a0
D (4454) tcpip_adapter: call api in lwip: ret=0x0, give sem D (4454) tcpip_adapter: check: remote, if=0 fn=0x401284a0
I (4584) wifi: n:1 0, o:1 0, ap:255 255, sta:1 0, prof:1 I (5574) wifi: state: init -> auth (b0) I (5574) APP_DEBUG: Time in seconds, (started from bootup) = 2 I (5574) APP_DEBUG: Current Time 00:18:08 I (5574) wifi: state: auth -> assoc (0) I (5584) wifi: state: assoc -> run (10) I (5604) wifi: connected with FILxxxxx, channel 1 D (5604) event: SYSTEM_EVENT_STA_CONNECTED, ssid:FILxxxxxx, ssid_len:12, bssi d:74:26:ac:e3:e4:d0, channel:1, authmode:3 D (5614) tcpip_adapter: check: local, if=0 fn=0x401286f0
D (5614) tcpip_adapter: call api in lwip: ret=0x0, give sem D (5624) tcpip_adapter: check: remote, if=0 fn=0x401286f0
D (5634) tcpip_adapter: check: local, if=0 fn=0x40128ba8
D (5634) tcpip_adapter: dhcp client init ip/mask/gw to all-0 D (5644) tcpip_adapter: if0 start ip lost tmr: enter D (5644) tcpip_adapter: if0 start ip lost tmr: no need start because netif=0x3ff f1b20 interval=120 ip=0 D (5654) tcpip_adapter: dhcp client start successfully D (5664) tcpip_adapter: call api in lwip: ret=0x0, give sem D (5664) tcpip_adapter: check: remote, if=0 fn=0x40128ba8
I (6164) APP_DEBUG: Time in seconds, (started from bootup) = 3 I (6164) APP_DEBUG: Current Time 00:18:10 D (6744) tcpip_adapter: if0 dhcpc cb D (6744) tcpip_adapter: if0 ip changed=1 D (6744) event: SYSTEM_EVENT_STA_GOT_IP, ip:192.168.2.169, mask:255.255.255.0, g w:192.168.2.1 I (6744) event: sta ip: 192.168.2.169, mask: 255.255.255.0, gw: 192.168.2.1 I (6754) APP_DEBUG: Shadow Init I (6754) APP_DEBUG: Shadow Connect D (6764) aws_iot: Seeding the random number generator... D (6764) aws_iot: Loading embedded CA root certificate ... D (6774) aws_iot: ok (0 skipped) D (6774) aws_iot: Loading embedded client certificate... D (6784) aws_iot: Loading embedded client private key... D (6954) aws_iot: ok D (6954) aws_iot: Connecting to a2ng0twleztum6.iot.us-east-1.amazonaws.com/8883. .. I (7164) APP_DEBUG: Time in seconds, (started from bootup) = 4 I (7164) APP_DEBUG: Current Time 00:18:11 D (7434) aws_iot: ok D (7434) aws_iot: Setting up the SSL/TLS structure... D (7434) aws_iot: SSL state connect : 0 D (7434) aws_iot: ok D (7434) aws_iot: SSL state connect : 0 D (7434) aws_iot: Performing the SSL/TLS handshake... I (8164) APP_DEBUG: Time in seconds, (started from bootup) = 5 I (8164) APP_DEBUG: Current Time 00:18:12 I (8584) wifi: pm start, type:0
D (8594) aws_iot: Verify requested for (Depth 2): D (8594) aws_iot: cert. version : 3 serial number : 18:DA:D1:9E:26:7D:E8:BB:4A:21:58:CD:CC:6B:3B:4A issuer name : C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 20 06 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Cert D (8614) aws_iot: This certificate has no flags D (8614) aws_iot: Verify requested for (Depth 1): D (8624) aws_iot: cert. version : 3 serial number : 3F:92:87:BE:9D:1D:A4:A3:7A:9D:F6:28:2E:77:5A:C4 issuer name : C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 20 06 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 3 Public Primary Cert D (8644) aws_iot: This certificate has no flags D (8654) aws_iot: Verify requested for (Depth 0): D (8654) aws_iot: cert. version : 3 serial number : 0A:84:9B:FA:E6:BB:18:70:3F:F7:76:20:47:7C:7D:90 issuer name : C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN= Symantec Class 3 ECC 256 bit SSL CA - G2 subject name : C=US, ST=Washington, L= D (8674) aws_iot: This certificate has no flags I (9164) APP_DEBUG: Time in seconds, (started from bootup) = 6 I (9164) APP_DEBUG: Current Time 00:18:13 I (10164) APP_DEBUG: Time in seconds, (started from bootup) = 7 I (10174) APP_DEBUG: Current Time 00:18:14 I (11164) APP_DEBUG: Time in seconds, (started from bootup) = 8 I (11164) APP_DEBUG: Current Time 00:18:15 I (12164) APP_DEBUG: Time in seconds, (started from bootup) = 9 I (12164) APP_DEBUG: Current Time 00:18:16 Task watchdog got triggered. The following tasks did not reset the watchdog in t ime:
Backtrace: 0x4008c5cc:0x3ffdfbb0 0x4008c6cb:0x3ffdfbd0 0x4010cedf:0x3ffdfbf0