• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/ssl/

Lines Matching refs:msg

70 # define ssl_trace_list(bio, indent, msg, msglen, value, table) \
71 do_ssl_trace_list(bio, indent, msg, msglen, value, \
85 const unsigned char *msg, size_t msglen,
92 val = msg[0];
94 val = (val << 8) | msg[1];
97 msg += vlen;
468 const unsigned char *msg, size_t msglen)
474 BIO_printf(bio, "%02X", msg[i]);
640 const unsigned char *msg, size_t msglen)
648 extslen = (msg[0] << 8) | msg[1];
651 msg += 2;
659 extype = (msg[0] << 8) | msg[1];
660 extlen = (msg[2] << 8) | msg[3];
663 msg += 4;
665 extype, msg, extlen))
667 msg += extlen;
674 const unsigned char *msg, size_t msglen)
678 if (!ssl_print_version(bio, indent, "client_version", &msg, &msglen))
680 if (!ssl_print_random(bio, indent, &msg, &msglen))
682 if (!ssl_print_hexbuf(bio, indent, "session_id", 1, &msg, &msglen))
685 if (!ssl_print_hexbuf(bio, indent, "cookie", 1, &msg, &msglen))
690 len = (msg[0] << 8) | msg[1];
691 msg += 2;
698 cs = (msg[0] << 8) | msg[1];
701 msg[0], msg[1], ssl_trace_str(cs, ssl_ciphers_tbl));
702 msg += 2;
708 len = msg[0];
709 msg++;
718 ssl_trace_str(msg[0], ssl_comp_tbl), msg[0]);
719 msg++;
723 if (!ssl_print_extensions(bio, indent, 0, msg, msglen))
729 const unsigned char *msg,
732 if (!ssl_print_version(bio, indent, "server_version", &msg, &msglen))
734 if (!ssl_print_hexbuf(bio, indent, "cookie", 1, &msg, &msglen))
740 const unsigned char *msg, size_t msglen)
743 if (!ssl_print_version(bio, indent, "server_version", &msg, &msglen))
745 if (!ssl_print_random(bio, indent, &msg, &msglen))
747 if (!ssl_print_hexbuf(bio, indent, "session_id", 1, &msg, &msglen))
751 cs = (msg[0] << 8) | msg[1];
754 msg[0], msg[1], ssl_trace_str(cs, ssl_ciphers_tbl));
755 msg += 2;
761 ssl_trace_str(msg[0], ssl_comp_tbl), msg[0]);
762 msg++;
764 if (!ssl_print_extensions(bio, indent, 1, msg, msglen))
821 const unsigned char *msg, size_t msglen)
833 "EncyptedPreMasterSecret", msg, msglen);
837 &msg, &msglen))
851 if (!ssl_print_hexbuf(bio, indent + 2, "dh_Yc", 2, &msg, &msglen))
863 if (!ssl_print_hexbuf(bio, indent + 2, "ecdh_Yc", 1, &msg, &msglen))
872 const unsigned char *msg, size_t msglen)
892 &msg, &msglen))
895 &msg, &msglen))
900 if (!ssl_print_hexbuf(bio, indent + 2, "dh_p", 2, &msg, &msglen))
902 if (!ssl_print_hexbuf(bio, indent + 2, "dh_g", 2, &msg, &msglen))
904 if (!ssl_print_hexbuf(bio, indent + 2, "dh_Ys", 2, &msg, &msglen))
912 if (msg[0] == EXPLICIT_PRIME_CURVE_TYPE)
914 else if (msg[0] == EXPLICIT_CHAR2_CURVE_TYPE)
916 else if (msg[0] == NAMED_CURVE_TYPE) {
920 curve = (msg[1] << 8) | msg[2];
923 msg += 3;
925 if (!ssl_print_hexbuf(bio, indent + 2, "point", 1, &msg, &msglen))
930 return ssl_print_signature(bio, indent, ssl, &msg, &msglen);
968 const unsigned char *msg, size_t msglen)
973 clen = (msg[0] << 16) | (msg[1] << 8) | msg[2];
976 msg += 3;
980 if (!ssl_print_certificate(bio, indent + 2, &msg, &clen))
987 const unsigned char *msg, size_t msglen)
992 xlen = msg[0];
995 msg++;
998 if (!ssl_trace_list(bio, indent + 2, msg, xlen, 1, ssl_ctype_tbl))
1000 msg += xlen;
1006 xlen = (msg[0] << 8) | msg[1];
1009 msg += 2;
1015 ssl_trace_str(msg[0], ssl_md_tbl),
1016 ssl_trace_str(msg[1], ssl_sig_tbl), msg[0], msg[1]);
1018 msg += 2;
1020 msg += xlen;
1024 xlen = (msg[0] << 8) | msg[1];
1028 msg += 2;
1037 dlen = (msg[0] << 8) | msg[1];
1040 msg += 2;
1043 p = msg;
1053 msg += dlen;
1059 const unsigned char *msg, size_t msglen)
1069 tick_life = (msg[0] << 24) | (msg[1] << 16) | (msg[2] << 8) | msg[3];
1071 msg += 4;
1074 if (!ssl_print_hexbuf(bio, indent + 2, "ticket", 2, &msg, &msglen))
1082 const unsigned char *msg, size_t msglen,
1089 htype = msg[0];
1090 hlen = (msg[1] << 16) | (msg[2] << 8) | msg[3];
1094 msg += 4;
1102 (msg[0] << 8) | msg[1],
1103 (msg[2] << 16) | (msg[3] << 8) | msg[4],
1104 (msg[5] << 16) | (msg[6] << 8) | msg[7]);
1105 msg += 8;
1112 if (!ssl_print_client_hello(bio, ssl, indent + 2, msg, msglen))
1117 if (!dtls_print_hello_vfyrequest(bio, indent + 2, msg, msglen))
1122 if (!ssl_print_server_hello(bio, indent + 2, msg, msglen))
1127 if (!ssl_print_server_keyex(bio, indent + 2, ssl, msg, msglen))
1132 if (!ssl_print_client_keyex(bio, indent + 2, ssl, msg, msglen))
1137 if (!ssl_print_certificates(bio, indent + 2, msg, msglen))
1142 if (!ssl_print_signature(bio, indent + 2, ssl, &msg, &msglen))
1147 if (!ssl_print_cert_request(bio, indent + 2, ssl, msg, msglen))
1152 ssl_print_hex(bio, indent + 2, "verify_data", msg, msglen);
1157 ssl_print_hex(bio, indent + 2, "unexpected value", msg, msglen);
1161 if (!ssl_print_ticket(bio, indent + 2, msg, msglen))
1168 BIO_dump_indent(bio, (char *)msg, msglen, indent + 4);
1174 const unsigned char *msg, size_t msglen)
1180 ssl_trace_str(msg[0], ssl_hb_type_tbl));
1181 msg++;
1183 if (!ssl_print_hexbuf(bio, indent, "payload", 2, &msg, &msglen))
1185 ssl_print_hex(bio, indent, "padding", msg, msglen);
1199 const unsigned char *msg = buf;
1206 msg, msglen);
1212 int hvers = msg[1] << 8 | msg[2];
1219 (msg[3] << 8 | msg[4]),
1220 (msg[5] << 8 | msg[6]),
1221 (msg[7] << 8 | msg[8]), (msg[9] << 8 | msg[10]));
1228 ssl_trace_str(msg[msglen], ssl_handshake_tbl));
1233 ssl_trace_str(msg[0], ssl_content_tbl), msg[0],
1234 msg[msglen - 2] << 8 | msg[msglen - 1]);
1238 if (!ssl_print_handshake(bio, ssl, msg, msglen, 4))
1243 if (msglen == 1 && msg[0] == 1)
1246 ssl_print_hex(bio, 4, "unknown value", msg, msglen);
1254 SSL_alert_type_string_long(msg[0] << 8),
1255 msg[0], SSL_alert_desc_string_long(msg[1]), msg[1]);
1258 ssl_print_heartbeat(bio, 4, msg, msglen);