Lines Matching refs:ssl
94 if (end - ssl < (int) (LEN)) \
446 static void print_deserialized_ssl_cert(const uint8_t *ssl, uint32_t len) in print_deserialized_ssl_cert() argument
456 ret = mbedtls_x509_crt_parse_der(&crt, ssl, len); in print_deserialized_ssl_cert()
461 print_hex(ssl, len, 25, "\t"); in print_deserialized_ssl_cert()
512 static void print_deserialized_ssl_session(const uint8_t *ssl, uint32_t len, in print_deserialized_ssl_session() argument
519 const uint8_t *end = ssl + len; in print_deserialized_ssl_session()
526 start = ((uint64_t) ssl[0] << 56) | in print_deserialized_ssl_session()
527 ((uint64_t) ssl[1] << 48) | in print_deserialized_ssl_session()
528 ((uint64_t) ssl[2] << 40) | in print_deserialized_ssl_session()
529 ((uint64_t) ssl[3] << 32) | in print_deserialized_ssl_session()
530 ((uint64_t) ssl[4] << 24) | in print_deserialized_ssl_session()
531 ((uint64_t) ssl[5] << 16) | in print_deserialized_ssl_session()
532 ((uint64_t) ssl[6] << 8) | in print_deserialized_ssl_session()
533 ((uint64_t) ssl[7]); in print_deserialized_ssl_session()
534 ssl += 8; in print_deserialized_ssl_session()
540 ciphersuite_id = ((int) ssl[0] << 8) | (int) ssl[1]; in print_deserialized_ssl_session()
542 ssl += 2; in print_deserialized_ssl_session()
578 printf("\tcompression : %s\n", get_enabled_str(*ssl++)); in print_deserialized_ssl_session()
584 printf_dbg("Session id length: %u\n", (uint32_t) *ssl++); in print_deserialized_ssl_session()
586 print_hex(ssl, 32, 16, "\t "); in print_deserialized_ssl_session()
587 ssl += 32; in print_deserialized_ssl_session()
591 print_hex(ssl, 48, 16, "\t "); in print_deserialized_ssl_session()
592 ssl += 48; in print_deserialized_ssl_session()
595 verify_result = ((uint32_t) ssl[0] << 24) | in print_deserialized_ssl_session()
596 ((uint32_t) ssl[1] << 16) | in print_deserialized_ssl_session()
597 ((uint32_t) ssl[2] << 8) | in print_deserialized_ssl_session()
598 ((uint32_t) ssl[3]); in print_deserialized_ssl_session()
599 ssl += 4; in print_deserialized_ssl_session()
605 cert_len = ((uint32_t) ssl[0] << 16) | in print_deserialized_ssl_session()
606 ((uint32_t) ssl[1] << 8) | in print_deserialized_ssl_session()
607 ((uint32_t) ssl[2]); in print_deserialized_ssl_session()
608 ssl += 3; in print_deserialized_ssl_session()
614 print_deserialized_ssl_cert(ssl, cert_len); in print_deserialized_ssl_session()
616 ssl += cert_len; in print_deserialized_ssl_session()
622 switch ((mbedtls_md_type_t) *ssl++) { in print_deserialized_ssl_session()
653 cert_len = (uint32_t) *ssl++; in print_deserialized_ssl_session()
659 print_hex(ssl, cert_len, 16, "\t "); in print_deserialized_ssl_session()
660 ssl += cert_len; in print_deserialized_ssl_session()
669 ticket_len = ((uint32_t) ssl[0] << 16) | in print_deserialized_ssl_session()
670 ((uint32_t) ssl[1] << 8) | in print_deserialized_ssl_session()
671 ((uint32_t) ssl[2]); in print_deserialized_ssl_session()
672 ssl += 3; in print_deserialized_ssl_session()
678 print_hex(ssl, ticket_len, 22, "\t"); in print_deserialized_ssl_session()
679 ssl += ticket_len; in print_deserialized_ssl_session()
684 ticket_lifetime = ((uint32_t) ssl[0] << 24) | in print_deserialized_ssl_session()
685 ((uint32_t) ssl[1] << 16) | in print_deserialized_ssl_session()
686 ((uint32_t) ssl[2] << 8) | in print_deserialized_ssl_session()
687 ((uint32_t) ssl[3]); in print_deserialized_ssl_session()
688 ssl += 4; in print_deserialized_ssl_session()
692 if (ssl < end) { in print_deserialized_ssl_session()
698 printf("\tMFL : %s\n", get_mfl_str(*ssl++)); in print_deserialized_ssl_session()
703 printf("\tnegotiate truncated HMAC : %s\n", get_enabled_str(*ssl++)); in print_deserialized_ssl_session()
708 printf("\tEncrypt-then-MAC : %s\n", get_enabled_str(*ssl++)); in print_deserialized_ssl_session()
711 if (0 != (end - ssl)) { in print_deserialized_ssl_session()
712 printf_err("%i bytes left to analyze from session\n", (int32_t) (end - ssl)); in print_deserialized_ssl_session()
749 static void print_deserialized_ssl_context(const uint8_t *ssl, size_t len) in print_deserialized_ssl_context() argument
751 const uint8_t *end = ssl + len; in print_deserialized_ssl_context()
760 printf("\tmajor %u\n", (uint32_t) *ssl++); in print_deserialized_ssl_context()
761 printf("\tminor %u\n", (uint32_t) *ssl++); in print_deserialized_ssl_context()
762 printf("\tpath %u\n", (uint32_t) *ssl++); in print_deserialized_ssl_context()
766 session_cfg_flag = ((int) ssl[0] << 8) | ((int) ssl[1]); in print_deserialized_ssl_context()
767 ssl += 2; in print_deserialized_ssl_context()
769 context_cfg_flag = ((int) ssl[0] << 16) | in print_deserialized_ssl_context()
770 ((int) ssl[1] << 8) | in print_deserialized_ssl_context()
771 ((int) ssl[2]); in print_deserialized_ssl_context()
772 ssl += 3; in print_deserialized_ssl_context()
795 session_len = ((uint32_t) ssl[0] << 24) | in print_deserialized_ssl_context()
796 ((uint32_t) ssl[1] << 16) | in print_deserialized_ssl_context()
797 ((uint32_t) ssl[2] << 8) | in print_deserialized_ssl_context()
798 ((uint32_t) ssl[3]); in print_deserialized_ssl_context()
799 ssl += 4; in print_deserialized_ssl_context()
803 print_deserialized_ssl_session(ssl, session_len, session_cfg_flag); in print_deserialized_ssl_context()
804 ssl += session_len; in print_deserialized_ssl_context()
809 print_hex(ssl, TRANSFORM_RANDBYTE_LEN, 22, "\t"); in print_deserialized_ssl_context()
810 ssl += TRANSFORM_RANDBYTE_LEN; in print_deserialized_ssl_context()
818 cid_len = *ssl++; in print_deserialized_ssl_context()
824 print_hex(ssl, cid_len, 20, "\t"); in print_deserialized_ssl_context()
825 ssl += cid_len; in print_deserialized_ssl_context()
831 cid_len = *ssl++; in print_deserialized_ssl_context()
837 print_hex(ssl, cid_len, 20, "\t"); in print_deserialized_ssl_context()
838 ssl += cid_len; in print_deserialized_ssl_context()
848 badmac_seen = ((uint32_t) ssl[0] << 24) | in print_deserialized_ssl_context()
849 ((uint32_t) ssl[1] << 16) | in print_deserialized_ssl_context()
850 ((uint32_t) ssl[2] << 8) | in print_deserialized_ssl_context()
851 ((uint32_t) ssl[3]); in print_deserialized_ssl_context()
852 ssl += 4; in print_deserialized_ssl_context()
858 print_hex(ssl, 8, 20, ""); in print_deserialized_ssl_context()
859 ssl += 8; in print_deserialized_ssl_context()
864 print_hex(ssl, 8, 20, ""); in print_deserialized_ssl_context()
865 ssl += 8; in print_deserialized_ssl_context()
871 get_enabled_str(!(*ssl++))); in print_deserialized_ssl_context()
877 print_hex(ssl, 8, 20, ""); in print_deserialized_ssl_context()
878 ssl += 8; in print_deserialized_ssl_context()
883 mtu = (ssl[0] << 8) | ssl[1]; in print_deserialized_ssl_context()
884 ssl += 2; in print_deserialized_ssl_context()
893 alpn_len = *ssl++; in print_deserialized_ssl_context()
899 if (strlen((const char *) ssl) == alpn_len) { in print_deserialized_ssl_context()
900 printf("%s\n", ssl); in print_deserialized_ssl_context()
905 ssl += alpn_len; in print_deserialized_ssl_context()
911 if (0 != (end - ssl)) { in print_deserialized_ssl_context()
912 printf_err("%i bytes left to analyze from context\n", (int32_t) (end - ssl)); in print_deserialized_ssl_context()