Lines Matching defs:ssl

35 #include "mbedtls/ssl.h"
89 * A macro that prevents from reading out of the ssl buffer range.
94 if (end - ssl < (int) (LEN)) \
443 * /p ssl pointer to serialized certificate
446 void print_deserialized_ssl_cert(const uint8_t *ssl, uint32_t len)
456 ret = mbedtls_x509_crt_parse_der(&crt, ssl, len);
461 print_hex(ssl, len, 25, "\t");
508 * /p ssl pointer to serialized session
512 void print_deserialized_ssl_session(const uint8_t *ssl, uint32_t len,
519 const uint8_t *end = ssl + len;
526 start = ((uint64_t) ssl[0] << 56) |
527 ((uint64_t) ssl[1] << 48) |
528 ((uint64_t) ssl[2] << 40) |
529 ((uint64_t) ssl[3] << 32) |
530 ((uint64_t) ssl[4] << 24) |
531 ((uint64_t) ssl[5] << 16) |
532 ((uint64_t) ssl[6] << 8) |
533 ((uint64_t) ssl[7]);
534 ssl += 8;
540 ciphersuite_id = ((int) ssl[0] << 8) | (int) ssl[1];
542 ssl += 2;
578 printf("\tcompression : %s\n", get_enabled_str(*ssl++));
584 printf_dbg("Session id length: %u\n", (uint32_t) *ssl++);
586 print_hex(ssl, 32, 16, "\t ");
587 ssl += 32;
591 print_hex(ssl, 48, 16, "\t ");
592 ssl += 48;
595 verify_result = ((uint32_t) ssl[0] << 24) |
596 ((uint32_t) ssl[1] << 16) |
597 ((uint32_t) ssl[2] << 8) |
598 ((uint32_t) ssl[3]);
599 ssl += 4;
605 cert_len = ((uint32_t) ssl[0] << 16) |
606 ((uint32_t) ssl[1] << 8) |
607 ((uint32_t) ssl[2]);
608 ssl += 3;
614 print_deserialized_ssl_cert(ssl, cert_len);
616 ssl += cert_len;
622 switch ((mbedtls_md_type_t) *ssl++) {
653 cert_len = (uint32_t) *ssl++;
659 print_hex(ssl, cert_len, 16, "\t ");
660 ssl += cert_len;
669 ticket_len = ((uint32_t) ssl[0] << 16) |
670 ((uint32_t) ssl[1] << 8) |
671 ((uint32_t) ssl[2]);
672 ssl += 3;
678 print_hex(ssl, ticket_len, 22, "\t");
679 ssl += ticket_len;
684 ticket_lifetime = ((uint32_t) ssl[0] << 24) |
685 ((uint32_t) ssl[1] << 16) |
686 ((uint32_t) ssl[2] << 8) |
687 ((uint32_t) ssl[3]);
688 ssl += 4;
692 if (ssl < end) {
698 printf("\tMFL : %s\n", get_mfl_str(*ssl++));
703 printf("\tnegotiate truncated HMAC : %s\n", get_enabled_str(*ssl++));
708 printf("\tEncrypt-then-MAC : %s\n", get_enabled_str(*ssl++));
711 if (0 != (end - ssl)) {
712 printf_err("%i bytes left to analyze from session\n", (int32_t) (end - ssl));
746 * /p ssl pointer to serialized session
749 void print_deserialized_ssl_context(const uint8_t *ssl, size_t len)
751 const uint8_t *end = ssl + len;
760 printf("\tmajor %u\n", (uint32_t) *ssl++);
761 printf("\tminor %u\n", (uint32_t) *ssl++);
762 printf("\tpath %u\n", (uint32_t) *ssl++);
766 session_cfg_flag = ((int) ssl[0] << 8) | ((int) ssl[1]);
767 ssl += 2;
769 context_cfg_flag = ((int) ssl[0] << 16) |
770 ((int) ssl[1] << 8) |
771 ((int) ssl[2]);
772 ssl += 3;
795 session_len = ((uint32_t) ssl[0] << 24) |
796 ((uint32_t) ssl[1] << 16) |
797 ((uint32_t) ssl[2] << 8) |
798 ((uint32_t) ssl[3]);
799 ssl += 4;
803 print_deserialized_ssl_session(ssl, session_len, session_cfg_flag);
804 ssl += session_len;
809 print_hex(ssl, TRANSFORM_RANDBYTE_LEN, 22, "\t");
810 ssl += TRANSFORM_RANDBYTE_LEN;
818 cid_len = *ssl++;
824 print_hex(ssl, cid_len, 20, "\t");
825 ssl += cid_len;
831 cid_len = *ssl++;
837 print_hex(ssl, cid_len, 20, "\t");
838 ssl += cid_len;
848 badmac_seen = ((uint32_t) ssl[0] << 24) |
849 ((uint32_t) ssl[1] << 16) |
850 ((uint32_t) ssl[2] << 8) |
851 ((uint32_t) ssl[3]);
852 ssl += 4;
858 print_hex(ssl, 8, 20, "");
859 ssl += 8;
864 print_hex(ssl, 8, 20, "");
865 ssl += 8;
871 get_enabled_str(!(*ssl++)));
877 print_hex(ssl, 8, 20, "");
878 ssl += 8;
883 mtu = (ssl[0] << 8) | ssl[1];
884 ssl += 2;
893 alpn_len = *ssl++;
899 if (strlen((const char *) ssl) == alpn_len) {
900 printf("%s\n", ssl);
905 ssl += alpn_len;
911 if (0 != (end - ssl)) {
912 printf_err("%i bytes left to analyze from context\n", (int32_t) (end - ssl));