Lines Matching refs:ssl

107         if (end - ssl < (int) (LEN))      \
459 void print_deserialized_ssl_cert(const uint8_t *ssl, uint32_t len) in print_deserialized_ssl_cert() argument
469 ret = mbedtls_x509_crt_parse_der(&crt, ssl, len); in print_deserialized_ssl_cert()
474 print_hex(ssl, len, 25, "\t"); in print_deserialized_ssl_cert()
525 void print_deserialized_ssl_session(const uint8_t *ssl, uint32_t len, in print_deserialized_ssl_session() argument
532 const uint8_t *end = ssl + len; in print_deserialized_ssl_session()
539 start = ((uint64_t) ssl[0] << 56) | in print_deserialized_ssl_session()
540 ((uint64_t) ssl[1] << 48) | in print_deserialized_ssl_session()
541 ((uint64_t) ssl[2] << 40) | in print_deserialized_ssl_session()
542 ((uint64_t) ssl[3] << 32) | in print_deserialized_ssl_session()
543 ((uint64_t) ssl[4] << 24) | in print_deserialized_ssl_session()
544 ((uint64_t) ssl[5] << 16) | in print_deserialized_ssl_session()
545 ((uint64_t) ssl[6] << 8) | in print_deserialized_ssl_session()
546 ((uint64_t) ssl[7]); in print_deserialized_ssl_session()
547 ssl += 8; in print_deserialized_ssl_session()
553 ciphersuite_id = ((int) ssl[0] << 8) | (int) ssl[1]; in print_deserialized_ssl_session()
555 ssl += 2; in print_deserialized_ssl_session()
586 printf("\tcompression : %s\n", get_enabled_str(*ssl++)); in print_deserialized_ssl_session()
592 printf_dbg("Session id length: %u\n", (uint32_t) *ssl++); in print_deserialized_ssl_session()
594 print_hex(ssl, 32, 16, "\t "); in print_deserialized_ssl_session()
595 ssl += 32; in print_deserialized_ssl_session()
599 print_hex(ssl, 48, 16, "\t "); in print_deserialized_ssl_session()
600 ssl += 48; in print_deserialized_ssl_session()
603 verify_result = ((uint32_t) ssl[0] << 24) | in print_deserialized_ssl_session()
604 ((uint32_t) ssl[1] << 16) | in print_deserialized_ssl_session()
605 ((uint32_t) ssl[2] << 8) | in print_deserialized_ssl_session()
606 ((uint32_t) ssl[3]); in print_deserialized_ssl_session()
607 ssl += 4; in print_deserialized_ssl_session()
613 cert_len = ((uint32_t) ssl[0] << 16) | in print_deserialized_ssl_session()
614 ((uint32_t) ssl[1] << 8) | in print_deserialized_ssl_session()
615 ((uint32_t) ssl[2]); in print_deserialized_ssl_session()
616 ssl += 3; in print_deserialized_ssl_session()
622 print_deserialized_ssl_cert(ssl, cert_len); in print_deserialized_ssl_session()
624 ssl += cert_len; in print_deserialized_ssl_session()
630 switch ((mbedtls_md_type_t) *ssl++) { in print_deserialized_ssl_session()
661 cert_len = (uint32_t) *ssl++; in print_deserialized_ssl_session()
667 print_hex(ssl, cert_len, 16, "\t "); in print_deserialized_ssl_session()
668 ssl += cert_len; in print_deserialized_ssl_session()
677 ticket_len = ((uint32_t) ssl[0] << 16) | in print_deserialized_ssl_session()
678 ((uint32_t) ssl[1] << 8) | in print_deserialized_ssl_session()
679 ((uint32_t) ssl[2]); in print_deserialized_ssl_session()
680 ssl += 3; in print_deserialized_ssl_session()
686 print_hex(ssl, ticket_len, 22, "\t"); in print_deserialized_ssl_session()
687 ssl += ticket_len; in print_deserialized_ssl_session()
692 ticket_lifetime = ((uint32_t) ssl[0] << 24) | in print_deserialized_ssl_session()
693 ((uint32_t) ssl[1] << 16) | in print_deserialized_ssl_session()
694 ((uint32_t) ssl[2] << 8) | in print_deserialized_ssl_session()
695 ((uint32_t) ssl[3]); in print_deserialized_ssl_session()
696 ssl += 4; in print_deserialized_ssl_session()
700 if (ssl < end) { in print_deserialized_ssl_session()
706 printf("\tMFL : %s\n", get_mfl_str(*ssl++)); in print_deserialized_ssl_session()
711 printf("\tnegotiate truncated HMAC : %s\n", get_enabled_str(*ssl++)); in print_deserialized_ssl_session()
716 printf("\tEncrypt-then-MAC : %s\n", get_enabled_str(*ssl++)); in print_deserialized_ssl_session()
719 if (0 != (end - ssl)) { in print_deserialized_ssl_session()
720 printf_err("%i bytes left to analyze from session\n", (int32_t) (end - ssl)); in print_deserialized_ssl_session()
757 void print_deserialized_ssl_context(const uint8_t *ssl, size_t len) in print_deserialized_ssl_context() argument
759 const uint8_t *end = ssl + len; in print_deserialized_ssl_context()
768 printf("\tmajor %u\n", (uint32_t) *ssl++); in print_deserialized_ssl_context()
769 printf("\tminor %u\n", (uint32_t) *ssl++); in print_deserialized_ssl_context()
770 printf("\tpath %u\n", (uint32_t) *ssl++); in print_deserialized_ssl_context()
774 session_cfg_flag = ((int) ssl[0] << 8) | ((int) ssl[1]); in print_deserialized_ssl_context()
775 ssl += 2; in print_deserialized_ssl_context()
777 context_cfg_flag = ((int) ssl[0] << 16) | in print_deserialized_ssl_context()
778 ((int) ssl[1] << 8) | in print_deserialized_ssl_context()
779 ((int) ssl[2]); in print_deserialized_ssl_context()
780 ssl += 3; in print_deserialized_ssl_context()
803 session_len = ((uint32_t) ssl[0] << 24) | in print_deserialized_ssl_context()
804 ((uint32_t) ssl[1] << 16) | in print_deserialized_ssl_context()
805 ((uint32_t) ssl[2] << 8) | in print_deserialized_ssl_context()
806 ((uint32_t) ssl[3]); in print_deserialized_ssl_context()
807 ssl += 4; in print_deserialized_ssl_context()
811 print_deserialized_ssl_session(ssl, session_len, session_cfg_flag); in print_deserialized_ssl_context()
812 ssl += session_len; in print_deserialized_ssl_context()
817 print_hex(ssl, TRANSFORM_RANDBYTE_LEN, 22, "\t"); in print_deserialized_ssl_context()
818 ssl += TRANSFORM_RANDBYTE_LEN; in print_deserialized_ssl_context()
826 cid_len = *ssl++; in print_deserialized_ssl_context()
832 print_hex(ssl, cid_len, 20, "\t"); in print_deserialized_ssl_context()
833 ssl += cid_len; in print_deserialized_ssl_context()
839 cid_len = *ssl++; in print_deserialized_ssl_context()
845 print_hex(ssl, cid_len, 20, "\t"); in print_deserialized_ssl_context()
846 ssl += cid_len; in print_deserialized_ssl_context()
856 badmac_seen = ((uint32_t) ssl[0] << 24) | in print_deserialized_ssl_context()
857 ((uint32_t) ssl[1] << 16) | in print_deserialized_ssl_context()
858 ((uint32_t) ssl[2] << 8) | in print_deserialized_ssl_context()
859 ((uint32_t) ssl[3]); in print_deserialized_ssl_context()
860 ssl += 4; in print_deserialized_ssl_context()
866 print_hex(ssl, 8, 20, ""); in print_deserialized_ssl_context()
867 ssl += 8; in print_deserialized_ssl_context()
872 print_hex(ssl, 8, 20, ""); in print_deserialized_ssl_context()
873 ssl += 8; in print_deserialized_ssl_context()
879 get_enabled_str(!(*ssl++))); in print_deserialized_ssl_context()
885 print_hex(ssl, 8, 20, ""); in print_deserialized_ssl_context()
886 ssl += 8; in print_deserialized_ssl_context()
891 mtu = (ssl[0] << 8) | ssl[1]; in print_deserialized_ssl_context()
892 ssl += 2; in print_deserialized_ssl_context()
901 alpn_len = *ssl++; in print_deserialized_ssl_context()
907 if (strlen((const char *) ssl) == alpn_len) { in print_deserialized_ssl_context()
908 printf("%s\n", ssl); in print_deserialized_ssl_context()
913 ssl += alpn_len; in print_deserialized_ssl_context()
919 if (0 != (end - ssl)) { in print_deserialized_ssl_context()
920 printf_err("%i bytes left to analyze from context\n", (int32_t) (end - ssl)); in print_deserialized_ssl_context()