Lines Matching refs:msglen

24 # define ssl_trace_list(bio, indent, msg, msglen, value, table) \
25 do_ssl_trace_list(bio, indent, msg, msglen, value, \
41 const unsigned char *msg, size_t msglen,
46 if (msglen % vlen)
48 while (msglen) {
55 msglen -= vlen;
615 const unsigned char *msg, size_t msglen)
620 BIO_printf(bio, "%s (len=%d): ", name, (int)msglen);
621 for (i = 0; i < msglen; i++)
899 size_t extslen, msglen = *msginlen;
903 if (msglen == 0) {
907 if (msglen < 2)
910 msglen -= 2;
915 *msginlen = msglen;
918 if (extslen > msglen)
921 msglen -= extslen;
944 *msginlen = msglen;
949 const unsigned char *msg, size_t msglen)
954 if (!ssl_print_version(bio, indent, "client_version", &msg, &msglen, NULL))
956 if (!ssl_print_random(bio, indent, &msg, &msglen))
958 if (!ssl_print_hexbuf(bio, indent, "session_id", 1, &msg, &msglen))
961 if (!ssl_print_hexbuf(bio, indent, "cookie", 1, &msg, &msglen))
964 if (msglen < 2)
968 msglen -= 2;
971 if (msglen < len || len & 1)
979 msglen -= 2;
982 if (msglen < 1)
986 msglen--;
987 if (msglen < len)
996 msglen--;
1000 &msglen))
1006 const unsigned char *msg, size_t msglen)
1008 if (!ssl_print_version(bio, indent, "server_version", &msg, &msglen, NULL))
1010 if (!ssl_print_hexbuf(bio, indent, "cookie", 1, &msg, &msglen))
1016 const unsigned char *msg, size_t msglen)
1021 if (!ssl_print_version(bio, indent, "server_version", &msg, &msglen, &vers))
1023 if (!ssl_print_random(bio, indent, &msg, &msglen))
1026 && !ssl_print_hexbuf(bio, indent, "session_id", 1, &msg, &msglen))
1028 if (msglen < 2)
1035 msglen -= 2;
1037 if (msglen < 1)
1043 msglen--;
1046 &msglen))
1100 const unsigned char *msg, size_t msglen)
1109 "psk_identity", 2, &msg, &msglen))
1118 "EncryptedPreMasterSecret", msg, msglen);
1121 "EncryptedPreMasterSecret", 2, &msg, &msglen))
1128 if (!ssl_print_hexbuf(bio, indent + 2, "dh_Yc", 2, &msg, &msglen))
1134 if (!ssl_print_hexbuf(bio, indent + 2, "ecdh_Yc", 1, &msg, &msglen))
1138 ssl_print_hex(bio, indent + 2, "GostKeyTransportBlob", msg, msglen);
1139 msglen = 0;
1143 "GOST-wrapped PreMasterSecret", msg, msglen);
1144 msglen = 0;
1148 return !msglen;
1152 const unsigned char *msg, size_t msglen)
1161 "psk_identity_hint", 2, &msg, &msglen))
1167 if (!ssl_print_hexbuf(bio, indent + 2, "rsa_modulus", 2, &msg, &msglen))
1170 &msg, &msglen))
1176 if (!ssl_print_hexbuf(bio, indent + 2, "dh_p", 2, &msg, &msglen))
1178 if (!ssl_print_hexbuf(bio, indent + 2, "dh_g", 2, &msg, &msglen))
1180 if (!ssl_print_hexbuf(bio, indent + 2, "dh_Ys", 2, &msg, &msglen))
1186 if (msglen < 1)
1195 if (msglen < 3)
1201 msglen -= 3;
1202 if (!ssl_print_hexbuf(bio, indent + 2, "point", 1, &msg, &msglen))
1215 ssl_print_signature(bio, indent, ssl, &msg, &msglen);
1216 return !msglen;
1222 size_t msglen = *pmsglen;
1227 if (msglen < 3)
1230 if (msglen < clen + 3)
1256 size_t msglen)
1261 && !ssl_print_hexbuf(bio, indent, "context", 1, &msg, &msglen))
1264 if (msglen < 3)
1267 if (msglen != clen + 3)
1285 const unsigned char *msg, size_t msglen)
1291 if (!ssl_print_hexbuf(bio, indent, "request_context", 1, &msg, &msglen))
1294 SSL3_MT_CERTIFICATE_REQUEST, &msg, &msglen))
1298 if (msglen < 1)
1301 if (msglen < xlen + 1)
1309 msglen -= xlen + 1;
1312 if (msglen < 2)
1315 if (msglen < xlen + 2 || (xlen & 1))
1318 msglen -= xlen + 2;
1332 if (msglen < 2)
1336 if (msglen < xlen + 2)
1339 msglen -= 2 + xlen;
1367 &msg, &msglen))
1370 return msglen == 0;
1374 const unsigned char *msg, size_t msglen)
1378 if (msglen == 0) {
1383 if (msglen < 4)
1389 msglen -= 4;
1396 if (msglen < 4)
1403 msglen -= 4;
1408 &msglen))
1411 if (!ssl_print_hexbuf(bio, indent + 2, "ticket", 2, &msg, &msglen))
1415 SSL3_MT_NEWSESSION_TICKET, &msg, &msglen))
1417 if (msglen)
1423 const unsigned char *msg, size_t msglen,
1429 if (msglen < 4)
1437 msglen -= 4;
1439 if (msglen < 8)
1448 msglen -= 8;
1450 if (msglen < hlen)
1454 if (!ssl_print_client_hello(bio, ssl, indent + 2, msg, msglen))
1459 if (!dtls_print_hello_vfyrequest(bio, indent + 2, msg, msglen))
1464 if (!ssl_print_server_hello(bio, indent + 2, msg, msglen))
1469 if (!ssl_print_server_keyex(bio, indent + 2, ssl, msg, msglen))
1474 if (!ssl_print_client_keyex(bio, indent + 2, ssl, msg, msglen))
1479 if (!ssl_print_certificates(bio, ssl, server, indent + 2, msg, msglen))
1484 if (!ssl_print_signature(bio, indent + 2, ssl, &msg, &msglen))
1489 if (!ssl_print_cert_request(bio, indent + 2, ssl, msg, msglen))
1494 ssl_print_hex(bio, indent + 2, "verify_data", msg, msglen);
1498 if (msglen != 0)
1499 ssl_print_hex(bio, indent + 2, "unexpected value", msg, msglen);
1503 if (!ssl_print_ticket(bio, indent + 2, ssl, msg, msglen))
1509 SSL3_MT_ENCRYPTED_EXTENSIONS, &msg, &msglen))
1514 if (msglen != 1) {
1515 ssl_print_hex(bio, indent + 2, "unexpected value", msg, msglen);
1518 if (!ssl_trace_list(bio, indent + 2, msg, msglen, 1,
1526 BIO_dump_indent(bio, (const char *)msg, msglen, indent + 4);
1532 const void *buf, size_t msglen, SSL *ssl, void *arg)
1543 if (msglen < (size_t)(SSL_IS_DTLS(ssl) ?
1546 ssl_print_hex(bio, 0, " too short message", msg, msglen);
1563 msg[msglen - 2] << 8 | msg[msglen - 1]);
1574 msg, msglen, 4))
1579 if (msglen == 1 && msg[0] == 1)
1582 ssl_print_hex(bio, 4, "unknown value", msg, msglen);
1586 if (msglen != 2)