Skip to content
Snippets Groups Projects
Commit 69b63a94 authored by Niels Möller's avatar Niels Möller
Browse files

Added more (conditional) debug output.

Rev: lib/modules/SSL.pmod/cipher.pike:1.8
Rev: lib/modules/SSL.pmod/handshake.pike:1.6
Rev: lib/modules/SSL.pmod/session.pike:1.8
parent 234d9e4d
No related branches found
No related tags found
No related merge requests found
/* $Id: cipher.pike,v 1.7 1998/01/20 16:11:53 nisse Exp $ /* $Id: cipher.pike,v 1.8 1998/02/11 05:19:04 nisse Exp $
* *
*/ */
...@@ -35,9 +35,17 @@ class mac_sha ...@@ -35,9 +35,17 @@ class mac_sha
string hash_raw(string data) string hash_raw(string data)
{ {
#ifdef SSL3_DEBUG
werror(sprintf("SSL.cipher: hash_raw('%s')\n", data));
#endif
object h = algorithm(); object h = algorithm();
h->update(data); string res = h->update(data)->digest();
return h->digest(); #ifdef SSL3_DEBUG
werror(sprintf("SSL.cipher: hash_raw->'%s'\n",res));
#endif
return res;
} }
string hash(object packet, object seq_num) string hash(object packet, object seq_num)
......
/* $Id: handshake.pike,v 1.5 1997/05/31 22:03:56 grubba Exp $ /* $Id: handshake.pike,v 1.6 1998/02/11 05:19:05 nisse Exp $
* *
*/ */
...@@ -172,6 +172,10 @@ object finished_packet(string sender) ...@@ -172,6 +172,10 @@ object finished_packet(string sender)
string server_derive_master_secret(string data) string server_derive_master_secret(string data)
{ {
string res = ""; string res = "";
#ifdef SSL3_DEBUG
werror(sprintf("server_derive_master_secret: ke_method %d\n",
session->ke_method));
#endif
switch(session->ke_method) switch(session->ke_method)
{ {
default: default:
...@@ -181,9 +185,13 @@ string server_derive_master_secret(string data) ...@@ -181,9 +185,13 @@ string server_derive_master_secret(string data)
case KE_rsa: case KE_rsa:
{ {
/* Decrypt the pre_master_secret */ /* Decrypt the pre_master_secret */
#ifdef SSL3_DEBUG
werror(sprintf("encrypted premaster_secret: '%s'\n", data));
#endif
// trace(1);
string s = context->rsa->decrypt(data); string s = context->rsa->decrypt(data);
#ifdef SSL3_DEBUG #ifdef SSL3_DEBUG
// werror(sprintf("premaster_secret: '%s'\n", s)); werror(sprintf("premaster_secret: '%O'\n", s));
#endif #endif
if (!s || (strlen(s) != 48) || (s[0] != 3)) if (!s || (strlen(s) != 48) || (s[0] != 3))
return 0; return 0;
...@@ -399,7 +407,7 @@ int handle_handshake(int type, string data, string raw) ...@@ -399,7 +407,7 @@ int handle_handshake(int type, string data, string raw)
return -1; return -1;
case HANDSHAKE_client_key_exchange: case HANDSHAKE_client_key_exchange:
#ifdef SSL3_DEBUG #ifdef SSL3_DEBUG
// werror("client_key_exchange\n"); werror("client_key_exchange\n");
#endif #endif
if (certificate_state == CERT_requested) if (certificate_state == CERT_requested)
{ /* Certificate should be sent before key exchange message */ { /* Certificate should be sent before key exchange message */
...@@ -410,17 +418,21 @@ int handle_handshake(int type, string data, string raw) ...@@ -410,17 +418,21 @@ int handle_handshake(int type, string data, string raw)
} }
if (!(session->master_secret = server_derive_master_secret(data))) if (!(session->master_secret = server_derive_master_secret(data)))
{ {
#ifdef SSL3_DEBUG
werror("server_derive_master_secret failed!\n");
#endif
send_packet(Alert(ALERT_fatal, ALERT_unexpected_message, send_packet(Alert(ALERT_fatal, ALERT_unexpected_message,
"SSL.session->handle_handshake: unexpected message\n", "SSL.session->handle_handshake: unexpected message\n",
backtrace())); backtrace()));
return -1; return -1;
} }
// trace(1);
array res = session->new_server_states(other_random, my_random); array res = session->new_server_states(other_random, my_random);
pending_read_state = res[0]; pending_read_state = res[0];
pending_write_state = res[1]; pending_write_state = res[1];
#ifdef SSL3_DEBUG #ifdef SSL3_DEBUG
// werror(sprintf("certificate_state: %d\n", certificate_state)); werror(sprintf("certificate_state: %d\n", certificate_state));
#endif #endif
if (certificate_state != CERT_received) if (certificate_state != CERT_received)
{ {
......
/* $Id: session.pike,v 1.7 1997/05/31 22:04:00 grubba Exp $ /* $Id: session.pike,v 1.8 1998/02/11 05:19:06 nisse Exp $
* *
*/ */
...@@ -52,7 +52,7 @@ string generate_key_block(string client_random, string server_random) ...@@ -52,7 +52,7 @@ string generate_key_block(string client_random, string server_random)
i++; i++;
string cookie = replace(allocate(i), 0, sprintf("%c", 64+i)) * ""; string cookie = replace(allocate(i), 0, sprintf("%c", 64+i)) * "";
#ifdef SSL3_DEBUG #ifdef SSL3_DEBUG
// werror(sprintf("cookie '%s'\n", cookie)); werror(sprintf("cookie '%s'\n", cookie));
#endif #endif
key += md5->hash_raw(master_secret + key += md5->hash_raw(master_secret +
sha->hash_raw(cookie + master_secret + sha->hash_raw(cookie + master_secret +
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment