2009-01-03 22:22:43 +01:00
|
|
|
/*
|
|
|
|
* Debugging routines
|
|
|
|
*
|
2020-08-07 13:07:28 +02:00
|
|
|
* Copyright The Mbed TLS Contributors
|
2015-09-04 14:21:07 +02:00
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
2010-07-18 22:36:00 +02:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
2010-07-18 22:36:00 +02:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2009-01-03 22:22:43 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
2009-01-03 22:22:43 +01:00
|
|
|
*/
|
|
|
|
|
2020-06-03 01:43:33 +02:00
|
|
|
#include "common.h"
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_DEBUG_C)
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-03-09 18:05:11 +01:00
|
|
|
#include "mbedtls/platform.h"
|
2015-01-30 12:10:20 +01:00
|
|
|
|
2016-04-26 08:43:27 +02:00
|
|
|
#include "mbedtls/debug.h"
|
2019-12-18 16:07:04 +01:00
|
|
|
#include "mbedtls/error.h"
|
2016-04-26 08:43:27 +02:00
|
|
|
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
2023-02-15 18:41:28 +01:00
|
|
|
/* DEBUG_BUF_SIZE must be at least 2 */
|
2015-06-23 12:04:52 +02:00
|
|
|
#define DEBUG_BUF_SIZE 512
|
|
|
|
|
2014-04-25 16:34:30 +02:00
|
|
|
static int debug_threshold = 0;
|
2014-04-25 15:04:14 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_debug_set_threshold(int threshold)
|
2014-04-25 16:34:30 +02:00
|
|
|
{
|
|
|
|
debug_threshold = threshold;
|
|
|
|
}
|
|
|
|
|
2015-08-31 16:11:00 +02:00
|
|
|
/*
|
|
|
|
* All calls to f_dbg must be made via this function
|
|
|
|
*/
|
2023-01-11 14:50:10 +01:00
|
|
|
static inline void debug_send_line(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line,
|
|
|
|
const char *str)
|
2015-08-31 16:11:00 +02:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* If in a threaded environment, we need a thread identifier.
|
|
|
|
* Since there is no portable way to get one, use the address of the ssl
|
|
|
|
* context instead, as it shouldn't be shared between threads.
|
|
|
|
*/
|
|
|
|
#if defined(MBEDTLS_THREADING_C)
|
|
|
|
char idstr[20 + DEBUG_BUF_SIZE]; /* 0x + 16 nibbles + ': ' */
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_snprintf(idstr, sizeof(idstr), "%p: %s", (void *) ssl, str);
|
|
|
|
ssl->conf->f_dbg(ssl->conf->p_dbg, level, file, line, idstr);
|
2015-08-31 16:11:00 +02:00
|
|
|
#else
|
2023-01-11 14:50:10 +01:00
|
|
|
ssl->conf->f_dbg(ssl->conf->p_dbg, level, file, line, str);
|
2015-08-31 16:11:00 +02:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2020-12-09 15:38:01 +01:00
|
|
|
MBEDTLS_PRINTF_ATTRIBUTE(5, 6)
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_debug_print_msg(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line,
|
|
|
|
const char *format, ...)
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
|
|
|
va_list argp;
|
2015-06-29 20:08:23 +02:00
|
|
|
char str[DEBUG_BUF_SIZE];
|
2019-12-16 12:46:15 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2023-02-15 12:31:39 +01:00
|
|
|
|
2023-05-16 17:43:48 +02:00
|
|
|
MBEDTLS_STATIC_ASSERT(DEBUG_BUF_SIZE >= 2, "DEBUG_BUF_SIZE too small");
|
2015-06-23 12:04:52 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (NULL == ssl ||
|
2018-06-29 10:04:46 +02:00
|
|
|
NULL == ssl->conf ||
|
|
|
|
NULL == ssl->conf->f_dbg ||
|
2023-01-11 14:50:10 +01:00
|
|
|
level > debug_threshold) {
|
2015-06-29 20:08:23 +02:00
|
|
|
return;
|
2018-06-29 10:04:46 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
va_start(argp, format);
|
|
|
|
ret = mbedtls_vsnprintf(str, DEBUG_BUF_SIZE, format, argp);
|
|
|
|
va_end(argp);
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-02-15 12:31:39 +01:00
|
|
|
if (ret < 0) {
|
2023-02-15 14:46:47 +01:00
|
|
|
ret = 0;
|
2023-02-15 12:31:39 +01:00
|
|
|
} else {
|
|
|
|
if (ret >= DEBUG_BUF_SIZE - 1) {
|
2023-02-15 14:46:47 +01:00
|
|
|
ret = DEBUG_BUF_SIZE - 2;
|
2023-02-15 12:01:16 +01:00
|
|
|
}
|
2022-10-31 08:17:37 +01:00
|
|
|
}
|
2023-02-15 14:46:47 +01:00
|
|
|
str[ret] = '\n';
|
|
|
|
str[ret + 1] = '\0';
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-02-15 14:46:47 +01:00
|
|
|
debug_send_line(ssl, level, file, line, str);
|
2015-06-23 12:04:52 +02:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_debug_print_ret(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line,
|
|
|
|
const char *text, int ret)
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-06-23 12:04:52 +02:00
|
|
|
char str[DEBUG_BUF_SIZE];
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (NULL == ssl ||
|
2018-06-29 10:04:46 +02:00
|
|
|
NULL == ssl->conf ||
|
|
|
|
NULL == ssl->conf->f_dbg ||
|
2023-01-11 14:50:10 +01:00
|
|
|
level > debug_threshold) {
|
2009-01-03 22:22:43 +01:00
|
|
|
return;
|
2018-06-29 10:04:46 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2015-05-11 18:52:25 +02:00
|
|
|
/*
|
|
|
|
* With non-blocking I/O and examples that just retry immediately,
|
|
|
|
* the logs would be quickly flooded with WANT_READ, so ignore that.
|
2022-12-04 18:19:59 +01:00
|
|
|
* Don't ignore WANT_WRITE however, since it is usually rare.
|
2015-05-11 18:52:25 +02:00
|
|
|
*/
|
2023-01-11 14:50:10 +01:00
|
|
|
if (ret == MBEDTLS_ERR_SSL_WANT_READ) {
|
2015-05-11 18:52:25 +02:00
|
|
|
return;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2015-05-11 18:52:25 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_snprintf(str, sizeof(str), "%s() returned %d (-0x%04x)\n",
|
|
|
|
text, ret, (unsigned int) -ret);
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
debug_send_line(ssl, level, file, line, str);
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_debug_print_buf(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line, const char *text,
|
|
|
|
const unsigned char *buf, size_t len)
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-06-23 12:04:52 +02:00
|
|
|
char str[DEBUG_BUF_SIZE];
|
2014-11-19 10:17:21 +01:00
|
|
|
char txt[17];
|
2015-06-22 11:50:58 +02:00
|
|
|
size_t i, idx = 0;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (NULL == ssl ||
|
2018-06-29 10:04:46 +02:00
|
|
|
NULL == ssl->conf ||
|
|
|
|
NULL == ssl->conf->f_dbg ||
|
2023-01-11 14:50:10 +01:00
|
|
|
level > debug_threshold) {
|
2009-01-03 22:22:43 +01:00
|
|
|
return;
|
2018-06-29 10:04:46 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_snprintf(str + idx, sizeof(str) - idx, "dumping '%s' (%u bytes)\n",
|
|
|
|
text, (unsigned int) len);
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
debug_send_line(ssl, level, file, line, str);
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2014-04-25 15:18:34 +02:00
|
|
|
idx = 0;
|
2023-01-11 14:50:10 +01:00
|
|
|
memset(txt, 0, sizeof(txt));
|
|
|
|
for (i = 0; i < len; i++) {
|
|
|
|
if (i >= 4096) {
|
2009-01-03 22:22:43 +01:00
|
|
|
break;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (i % 16 == 0) {
|
|
|
|
if (i > 0) {
|
|
|
|
mbedtls_snprintf(str + idx, sizeof(str) - idx, " %s\n", txt);
|
|
|
|
debug_send_line(ssl, level, file, line, str);
|
2014-11-19 10:17:21 +01:00
|
|
|
|
2014-04-25 15:18:34 +02:00
|
|
|
idx = 0;
|
2023-01-11 14:50:10 +01:00
|
|
|
memset(txt, 0, sizeof(txt));
|
2014-04-25 15:18:34 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
idx += mbedtls_snprintf(str + idx, sizeof(str) - idx, "%04x: ",
|
|
|
|
(unsigned int) i);
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
idx += mbedtls_snprintf(str + idx, sizeof(str) - idx, " %02x",
|
|
|
|
(unsigned int) buf[i]);
|
|
|
|
txt[i % 16] = (buf[i] > 31 && buf[i] < 127) ? buf[i] : '.';
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (len > 0) {
|
|
|
|
for (/* i = i */; i % 16 != 0; i++) {
|
|
|
|
idx += mbedtls_snprintf(str + idx, sizeof(str) - idx, " ");
|
|
|
|
}
|
2014-11-19 10:17:21 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_snprintf(str + idx, sizeof(str) - idx, " %s\n", txt);
|
|
|
|
debug_send_line(ssl, level, file, line, str);
|
2014-04-25 15:18:34 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
|
|
|
|
2023-04-07 15:53:51 +02:00
|
|
|
#if defined(MBEDTLS_ECP_LIGHT)
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_debug_print_ecp(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line,
|
|
|
|
const char *text, const mbedtls_ecp_point *X)
|
2013-03-20 14:39:14 +01:00
|
|
|
{
|
2015-06-23 12:04:52 +02:00
|
|
|
char str[DEBUG_BUF_SIZE];
|
2013-03-20 14:39:14 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (NULL == ssl ||
|
2018-06-29 10:04:46 +02:00
|
|
|
NULL == ssl->conf ||
|
|
|
|
NULL == ssl->conf->f_dbg ||
|
2023-01-11 14:50:10 +01:00
|
|
|
level > debug_threshold) {
|
2014-04-25 16:34:30 +02:00
|
|
|
return;
|
2018-06-29 10:04:46 +02:00
|
|
|
}
|
2014-04-25 16:34:30 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_snprintf(str, sizeof(str), "%s(X)", text);
|
|
|
|
mbedtls_debug_print_mpi(ssl, level, file, line, str, &X->X);
|
2013-03-20 14:39:14 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_snprintf(str, sizeof(str), "%s(Y)", text);
|
|
|
|
mbedtls_debug_print_mpi(ssl, level, file, line, str, &X->Y);
|
2013-03-20 14:39:14 +01:00
|
|
|
}
|
2023-04-07 15:53:51 +02:00
|
|
|
#endif /* MBEDTLS_ECP_LIGHT */
|
2013-03-20 14:39:14 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_BIGNUM_C)
|
2023-05-17 15:35:46 +02:00
|
|
|
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
|
|
void mbedtls_debug_print_psa_ec(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line,
|
|
|
|
const char *text, const mbedtls_pk_context *pk)
|
|
|
|
{
|
|
|
|
char str[DEBUG_BUF_SIZE];
|
|
|
|
mbedtls_mpi mpi;
|
|
|
|
const uint8_t *mpi_start;
|
|
|
|
size_t mpi_len;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (NULL == ssl ||
|
|
|
|
NULL == ssl->conf ||
|
|
|
|
NULL == ssl->conf->f_dbg ||
|
|
|
|
level > debug_threshold) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* For the description of pk->pk_raw content please refer to the description
|
|
|
|
* psa_export_public_key() function. */
|
|
|
|
mpi_len = (pk->pub_raw_len - 1)/2;
|
|
|
|
|
|
|
|
/* X coordinate */
|
|
|
|
mbedtls_mpi_init(&mpi);
|
|
|
|
mpi_start = pk->pub_raw + 1;
|
|
|
|
ret = mbedtls_mpi_read_binary(&mpi, mpi_start, mpi_len);
|
|
|
|
if (ret != 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
mbedtls_snprintf(str, sizeof(str), "%s(X)", text);
|
|
|
|
mbedtls_debug_print_mpi(ssl, level, file, line, str, &mpi);
|
|
|
|
mbedtls_mpi_free(&mpi);
|
|
|
|
|
|
|
|
/* Y coordinate */
|
|
|
|
mbedtls_mpi_init(&mpi);
|
|
|
|
mpi_start = mpi_start + mpi_len;
|
|
|
|
ret = mbedtls_mpi_read_binary(&mpi, mpi_start, mpi_len);
|
|
|
|
if (ret != 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
mbedtls_snprintf(str, sizeof(str), "%s(Y)", text);
|
|
|
|
mbedtls_debug_print_mpi(ssl, level, file, line, str, &mpi);
|
|
|
|
mbedtls_mpi_free(&mpi);
|
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_PK_USE_PSA_EC_DATA */
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_debug_print_mpi(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line,
|
|
|
|
const char *text, const mbedtls_mpi *X)
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-06-23 12:04:52 +02:00
|
|
|
char str[DEBUG_BUF_SIZE];
|
2021-06-02 20:17:46 +02:00
|
|
|
size_t bitlen;
|
|
|
|
size_t idx = 0;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (NULL == ssl ||
|
2018-06-29 10:04:46 +02:00
|
|
|
NULL == ssl->conf ||
|
|
|
|
NULL == ssl->conf->f_dbg ||
|
|
|
|
NULL == X ||
|
2023-01-11 14:50:10 +01:00
|
|
|
level > debug_threshold) {
|
2009-01-03 22:22:43 +01:00
|
|
|
return;
|
2018-06-29 10:04:46 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
bitlen = mbedtls_mpi_bitlen(X);
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_snprintf(str, sizeof(str), "value of '%s' (%u bits) is:\n",
|
|
|
|
text, (unsigned) bitlen);
|
|
|
|
debug_send_line(ssl, level, file, line, str);
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (bitlen == 0) {
|
2021-06-02 20:17:46 +02:00
|
|
|
str[0] = ' '; str[1] = '0'; str[2] = '0';
|
|
|
|
idx = 3;
|
2023-01-11 14:50:10 +01:00
|
|
|
} else {
|
2021-06-02 20:17:46 +02:00
|
|
|
int n;
|
2023-01-11 14:50:10 +01:00
|
|
|
for (n = (int) ((bitlen - 1) / 8); n >= 0; n--) {
|
|
|
|
size_t limb_offset = n / sizeof(mbedtls_mpi_uint);
|
|
|
|
size_t offset_in_limb = n % sizeof(mbedtls_mpi_uint);
|
2021-06-02 20:17:46 +02:00
|
|
|
unsigned char octet =
|
2023-01-11 14:50:10 +01:00
|
|
|
(X->p[limb_offset] >> (offset_in_limb * 8)) & 0xff;
|
|
|
|
mbedtls_snprintf(str + idx, sizeof(str) - idx, " %02x", octet);
|
2021-06-02 20:17:46 +02:00
|
|
|
idx += 3;
|
|
|
|
/* Wrap lines after 16 octets that each take 3 columns */
|
2023-01-11 14:50:10 +01:00
|
|
|
if (idx >= 3 * 16) {
|
|
|
|
mbedtls_snprintf(str + idx, sizeof(str) - idx, "\n");
|
|
|
|
debug_send_line(ssl, level, file, line, str);
|
2021-06-02 20:17:46 +02:00
|
|
|
idx = 0;
|
2014-04-25 15:18:34 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
2011-03-14 21:41:31 +01:00
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (idx != 0) {
|
|
|
|
mbedtls_snprintf(str + idx, sizeof(str) - idx, "\n");
|
|
|
|
debug_send_line(ssl, level, file, line, str);
|
2021-06-02 20:17:46 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_BIGNUM_C */
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2020-10-09 10:19:39 +02:00
|
|
|
#if defined(MBEDTLS_X509_CRT_PARSE_C) && !defined(MBEDTLS_X509_REMOVE_INFO)
|
2023-01-11 14:50:10 +01:00
|
|
|
static void debug_print_pk(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line,
|
|
|
|
const char *text, const mbedtls_pk_context *pk)
|
2013-08-14 18:04:18 +02:00
|
|
|
{
|
|
|
|
size_t i;
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_pk_debug_item items[MBEDTLS_PK_DEBUG_MAX_ITEMS];
|
2013-08-14 18:04:18 +02:00
|
|
|
char name[16];
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
memset(items, 0, sizeof(items));
|
2013-08-14 18:04:18 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (mbedtls_pk_debug(pk, items) != 0) {
|
|
|
|
debug_send_line(ssl, level, file, line,
|
|
|
|
"invalid PK context\n");
|
2013-08-14 18:04:18 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
for (i = 0; i < MBEDTLS_PK_DEBUG_MAX_ITEMS; i++) {
|
|
|
|
if (items[i].type == MBEDTLS_PK_DEBUG_NONE) {
|
2013-08-14 18:04:18 +02:00
|
|
|
return;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2013-08-14 18:04:18 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_snprintf(name, sizeof(name), "%s%s", text, items[i].name);
|
|
|
|
name[sizeof(name) - 1] = '\0';
|
2013-08-14 18:04:18 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (items[i].type == MBEDTLS_PK_DEBUG_MPI) {
|
|
|
|
mbedtls_debug_print_mpi(ssl, level, file, line, name, items[i].value);
|
|
|
|
} else
|
2023-04-07 15:53:51 +02:00
|
|
|
#if defined(MBEDTLS_ECP_LIGHT)
|
2023-01-11 14:50:10 +01:00
|
|
|
if (items[i].type == MBEDTLS_PK_DEBUG_ECP) {
|
|
|
|
mbedtls_debug_print_ecp(ssl, level, file, line, name, items[i].value);
|
|
|
|
} else
|
2023-05-17 15:35:46 +02:00
|
|
|
#endif
|
|
|
|
#if defined(MBEDTLS_PK_USE_PSA_EC_DATA)
|
|
|
|
if (items[i].type == MBEDTLS_PK_DEBUG_PSA_EC) {
|
|
|
|
mbedtls_debug_print_psa_ec(ssl, level, file, line, name, items[i].value);
|
|
|
|
} else
|
2013-10-15 11:54:47 +02:00
|
|
|
#endif
|
2023-01-11 14:50:10 +01:00
|
|
|
{ debug_send_line(ssl, level, file, line,
|
|
|
|
"should not happen\n"); }
|
2013-08-14 18:04:18 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
static void debug_print_line_by_line(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line, const char *text)
|
2015-06-23 16:34:24 +02:00
|
|
|
{
|
|
|
|
char str[DEBUG_BUF_SIZE];
|
|
|
|
const char *start, *cur;
|
|
|
|
|
|
|
|
start = text;
|
2023-01-11 14:50:10 +01:00
|
|
|
for (cur = text; *cur != '\0'; cur++) {
|
|
|
|
if (*cur == '\n') {
|
2015-06-23 16:34:24 +02:00
|
|
|
size_t len = cur - start + 1;
|
2023-01-11 14:50:10 +01:00
|
|
|
if (len > DEBUG_BUF_SIZE - 1) {
|
2015-06-23 16:34:24 +02:00
|
|
|
len = DEBUG_BUF_SIZE - 1;
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2015-06-23 16:34:24 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
memcpy(str, start, len);
|
2015-06-23 16:34:24 +02:00
|
|
|
str[len] = '\0';
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
debug_send_line(ssl, level, file, line, str);
|
2015-06-23 16:34:24 +02:00
|
|
|
|
|
|
|
start = cur + 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_debug_print_crt(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line,
|
|
|
|
const char *text, const mbedtls_x509_crt *crt)
|
2009-01-03 22:22:43 +01:00
|
|
|
{
|
2015-06-23 16:34:24 +02:00
|
|
|
char str[DEBUG_BUF_SIZE];
|
|
|
|
int i = 0;
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (NULL == ssl ||
|
2018-06-29 10:04:46 +02:00
|
|
|
NULL == ssl->conf ||
|
|
|
|
NULL == ssl->conf->f_dbg ||
|
|
|
|
NULL == crt ||
|
2023-01-11 14:50:10 +01:00
|
|
|
level > debug_threshold) {
|
2009-01-03 22:22:43 +01:00
|
|
|
return;
|
2018-06-29 10:04:46 +02:00
|
|
|
}
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
while (crt != NULL) {
|
2009-05-02 17:13:40 +02:00
|
|
|
char buf[1024];
|
2014-04-25 15:04:14 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_snprintf(str, sizeof(str), "%s #%d:\n", text, ++i);
|
|
|
|
debug_send_line(ssl, level, file, line, str);
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_x509_crt_info(buf, sizeof(buf) - 1, "", crt);
|
|
|
|
debug_print_line_by_line(ssl, level, file, line, buf);
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
debug_print_pk(ssl, level, file, line, "crt->", &crt->pk);
|
2009-01-03 22:22:43 +01:00
|
|
|
|
|
|
|
crt = crt->next;
|
|
|
|
}
|
|
|
|
}
|
2020-10-09 10:19:39 +02:00
|
|
|
#endif /* MBEDTLS_X509_CRT_PARSE_C && MBEDTLS_X509_REMOVE_INFO */
|
2009-01-03 22:22:43 +01:00
|
|
|
|
2023-07-25 10:57:01 +02:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED) && \
|
|
|
|
defined(MBEDTLS_ECDH_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
static void mbedtls_debug_printf_ecdh_internal(const mbedtls_ssl_context *ssl,
|
|
|
|
int level, const char *file,
|
|
|
|
int line,
|
|
|
|
const mbedtls_ecdh_context *ecdh,
|
|
|
|
mbedtls_debug_ecdh_attr attr)
|
2018-08-22 02:37:55 +02:00
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
|
2023-01-11 14:50:10 +01:00
|
|
|
const mbedtls_ecdh_context *ctx = ecdh;
|
2018-08-22 02:37:55 +02:00
|
|
|
#else
|
2023-01-11 14:50:10 +01:00
|
|
|
const mbedtls_ecdh_context_mbed *ctx = &ecdh->ctx.mbed_ecdh;
|
2018-08-22 02:37:55 +02:00
|
|
|
#endif
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
switch (attr) {
|
2018-08-22 02:37:55 +02:00
|
|
|
case MBEDTLS_DEBUG_ECDH_Q:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_debug_print_ecp(ssl, level, file, line, "ECDH: Q",
|
|
|
|
&ctx->Q);
|
2018-08-22 02:37:55 +02:00
|
|
|
break;
|
|
|
|
case MBEDTLS_DEBUG_ECDH_QP:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_debug_print_ecp(ssl, level, file, line, "ECDH: Qp",
|
|
|
|
&ctx->Qp);
|
2018-08-22 02:37:55 +02:00
|
|
|
break;
|
|
|
|
case MBEDTLS_DEBUG_ECDH_Z:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_debug_print_mpi(ssl, level, file, line, "ECDH: z",
|
|
|
|
&ctx->z);
|
2018-08-22 02:37:55 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_debug_printf_ecdh(const mbedtls_ssl_context *ssl, int level,
|
|
|
|
const char *file, int line,
|
|
|
|
const mbedtls_ecdh_context *ecdh,
|
|
|
|
mbedtls_debug_ecdh_attr attr)
|
2018-08-22 02:37:55 +02:00
|
|
|
{
|
|
|
|
#if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_debug_printf_ecdh_internal(ssl, level, file, line, ecdh, attr);
|
2018-08-22 02:37:55 +02:00
|
|
|
#else
|
2023-01-11 14:50:10 +01:00
|
|
|
switch (ecdh->var) {
|
2018-08-22 02:37:55 +02:00
|
|
|
default:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_debug_printf_ecdh_internal(ssl, level, file, line, ecdh,
|
|
|
|
attr);
|
2018-08-22 02:37:55 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
2023-07-25 10:57:01 +02:00
|
|
|
#endif /* MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED &&
|
|
|
|
MBEDTLS_ECDH_C */
|
2018-08-22 02:37:55 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_DEBUG_C */
|