name
stringlengths
1
473k
code
stringlengths
7
647k
asm
stringlengths
4
3.39M
file
stringlengths
8
196
test
int test(LIBSSH2_SESSION *session) { #if LIBSSH2_RSA_SHA1 && \ (defined(LIBSSH2_OPENSSL) || defined(LIBSSH2_WOLFSSL)) /* set in Dockerfile */ return test_auth_pubkey(session, 0, "libssh2", NULL, "key_rsa_signed-cert.pub", "key_rsa_signed"); #else (void)session; return 0; #endif }
pushq %rbp movq %rsp, %rbp subq $0x10, %rsp movq %rdi, -0x8(%rbp) movq -0x8(%rbp), %rdi xorl %esi, %esi leaq 0x1bcb(%rip), %rdx # 0x4004 xorl %eax, %eax movl %eax, %ecx leaq 0x1bc8(%rip), %r8 # 0x400c leaq 0x1bd9(%rip), %r9 # 0x4024 callq 0x2eb0 addq $0x10, %rsp popq %rbp retq nopw %cs:(%rax,%rax)
/sysprogs[P]libssh2/tests/test_auth_pubkey_ok_rsa_signed.c
test_auth_keyboard
int test_auth_keyboard(LIBSSH2_SESSION *session, int flags, const char *username, const char *password) { int rc; const char *userauth_list = libssh2_userauth_list(session, username, (unsigned int)strlen(username)); if(!userauth_list) { print_last_session_error("libssh2_userauth_list"); return 1; } if(!strstr(userauth_list, "keyboard-interactive")) { fprintf(stderr, "'keyboard-interactive' was expected in userauth list: %s\n", userauth_list); return 1; } kbd_password = password; rc = libssh2_userauth_keyboard_interactive_ex(session, username, (unsigned int)strlen(username), kbd_callback); kbd_password = NULL; if((flags & TEST_AUTH_SHOULDFAIL) != 0) { if(rc == 0) { fprintf(stderr, "Keyboard-interactive auth succeeded " "with wrong response\n"); return 1; } } else { if(rc) { print_last_session_error( "libssh2_userauth_keyboard_interactive_ex"); return 1; } } return 0; }
pushq %rbp movq %rsp, %rbp subq $0x60, %rsp movq %rdi, -0x10(%rbp) movl %esi, -0x14(%rbp) movq %rdx, -0x20(%rbp) movq %rcx, -0x28(%rbp) movq -0x10(%rbp), %rax movq %rax, -0x48(%rbp) movq -0x20(%rbp), %rax movq %rax, -0x40(%rbp) movq -0x20(%rbp), %rdi callq 0x20f0 movq -0x48(%rbp), %rdi movq -0x40(%rbp), %rsi movl %eax, %edx callq 0x21d0 movq %rax, -0x38(%rbp) cmpq $0x0, -0x38(%rbp) jne 0x2b42 leaq 0x17f6(%rip), %rdi # 0x4327 callq 0x28b0 movl $0x1, -0x4(%rbp) jmp 0x2c20 movq -0x38(%rbp), %rdi leaq 0x17f0(%rip), %rsi # 0x433d callq 0x2070 cmpq $0x0, %rax jne 0x2b80 movq 0x4481(%rip), %rax # 0x6fe0 movq (%rax), %rdi movq -0x38(%rbp), %rdx leaq 0x17e5(%rip), %rsi # 0x4352 movb $0x0, %al callq 0x2290 movl $0x1, -0x4(%rbp) jmp 0x2c20 movq -0x28(%rbp), %rax movq %rax, 0x2464d(%rip) # 0x271d8 movq -0x10(%rbp), %rax movq %rax, -0x58(%rbp) movq -0x20(%rbp), %rax movq %rax, -0x50(%rbp) movq -0x20(%rbp), %rdi callq 0x20f0 movq -0x58(%rbp), %rdi movq -0x50(%rbp), %rsi movl %eax, %edx leaq 0x7b(%rip), %rcx # 0x2c30 callq 0x2180 movl %eax, -0x2c(%rbp) movq $0x0, 0x24610(%rip) # 0x271d8 movl -0x14(%rbp), %eax andl $0x1, %eax cmpl $0x0, %eax je 0x2bfc cmpl $0x0, -0x2c(%rbp) jne 0x2bfa movq 0x4400(%rip), %rax # 0x6fe0 movq (%rax), %rdi leaq 0x17a2(%rip), %rsi # 0x438c movb $0x0, %al callq 0x2290 movl $0x1, -0x4(%rbp) jmp 0x2c20 jmp 0x2c19 cmpl $0x0, -0x2c(%rbp) je 0x2c17 leaq 0x17bc(%rip), %rdi # 0x43c5 callq 0x28b0 movl $0x1, -0x4(%rbp) jmp 0x2c20 jmp 0x2c19 movl $0x0, -0x4(%rbp) movl -0x4(%rbp), %eax addq $0x60, %rsp popq %rbp retq nopl (%rax)
/sysprogs[P]libssh2/tests/session_fixture.c
read_file
static int read_file(const char *path, char **out_buffer, size_t *out_len) { FILE *fp; char *buffer; size_t len; if(!out_buffer || !out_len || !path) { fprintf(stderr, "invalid params.\n"); return 1; } *out_buffer = NULL; *out_len = 0; fp = fopen(path, "r"); if(!fp) { fprintf(stderr, "File could not be read: %s\n", path); return 1; } fseek(fp, 0L, SEEK_END); len = ftell(fp); rewind(fp); buffer = calloc(1, len + 1); if(!buffer) { fclose(fp); fprintf(stderr, "Could not alloc memory.\n"); return 1; } if(1 != fread(buffer, len, 1, fp)) { fclose(fp); free(buffer); fprintf(stderr, "Could not read file into memory.\n"); return 1; } fclose(fp); *out_buffer = buffer; *out_len = len; return 0; }
pushq %rbp movq %rsp, %rbp subq $0x40, %rsp movq %rdi, -0x10(%rbp) movq %rsi, -0x18(%rbp) movq %rdx, -0x20(%rbp) cmpq $0x0, -0x18(%rbp) je 0x3139 cmpq $0x0, -0x20(%rbp) je 0x3139 cmpq $0x0, -0x10(%rbp) jne 0x315d movq 0x3ea0(%rip), %rax # 0x6fe0 movq (%rax), %rdi leaq 0x147e(%rip), %rsi # 0x45c8 movb $0x0, %al callq 0x2290 movl $0x1, -0x4(%rbp) jmp 0x32a1 movq -0x18(%rbp), %rax movq $0x0, (%rax) movq -0x20(%rbp), %rax movq $0x0, (%rax) movq -0x10(%rbp), %rdi leaq 0x18c8(%rip), %rsi # 0x4a46 callq 0x21f0 movq %rax, -0x28(%rbp) cmpq $0x0, -0x28(%rbp) jne 0x31b6 movq 0x3e4b(%rip), %rax # 0x6fe0 movq (%rax), %rdi movq -0x10(%rbp), %rdx leaq 0x1436(%rip), %rsi # 0x45d9 movb $0x0, %al callq 0x2290 movl $0x1, -0x4(%rbp) jmp 0x32a1 movq -0x28(%rbp), %rdi xorl %eax, %eax movl %eax, %esi movl $0x2, %edx callq 0x21e0 movq -0x28(%rbp), %rdi callq 0x2030 movq %rax, -0x38(%rbp) movq -0x28(%rbp), %rdi callq 0x2050 movq -0x38(%rbp), %rsi addq $0x1, %rsi movl $0x1, %edi callq 0x2130 movq %rax, -0x30(%rbp) cmpq $0x0, -0x30(%rbp) jne 0x3225 movq -0x28(%rbp), %rdi callq 0x2190 movq 0x3dd5(%rip), %rax # 0x6fe0 movq (%rax), %rdi leaq 0x13e0(%rip), %rsi # 0x45f5 movb $0x0, %al callq 0x2290 movl $0x1, -0x4(%rbp) jmp 0x32a1 movq -0x30(%rbp), %rdi movq -0x38(%rbp), %rsi movq -0x28(%rbp), %rcx movl $0x1, %edx callq 0x22a0 movq %rax, %rcx movl $0x1, %eax cmpq %rcx, %rax je 0x327b movq -0x28(%rbp), %rdi callq 0x2190 movq -0x30(%rbp), %rdi callq 0x2200 movq 0x3d7f(%rip), %rax # 0x6fe0 movq (%rax), %rdi leaq 0x13a3(%rip), %rsi # 0x460e movb $0x0, %al callq 0x2290 movl $0x1, -0x4(%rbp) jmp 0x32a1 movq -0x28(%rbp), %rdi callq 0x2190 movq -0x30(%rbp), %rcx movq -0x18(%rbp), %rax movq %rcx, (%rax) movq -0x38(%rbp), %rcx movq -0x20(%rbp), %rax movq %rcx, (%rax) movl $0x0, -0x4(%rbp) movl -0x4(%rbp), %eax addq $0x40, %rsp popq %rbp retq nopw (%rax,%rax)
/sysprogs[P]libssh2/tests/session_fixture.c
port_from_container
static int port_from_container(char *container_id, char **port_out) { if(is_running_inside_a_container()) { *port_out = strdup("22"); return 0; } else { return run_command(port_out, "docker inspect --format " "\"{{ index (index (index .NetworkSettings.Ports " "\\\"22/tcp\\\") 0) \\\"HostPort\\\" }}\" %s", container_id); } }
pushq %rbp movq %rsp, %rbp subq $0x20, %rsp movq %rdi, -0x10(%rbp) movq %rsi, -0x18(%rbp) callq 0x3da0 cmpl $0x0, %eax je 0x3d39 leaq 0xd27(%rip), %rdi # 0x4a48 callq 0x22f0 movq %rax, %rcx movq -0x18(%rbp), %rax movq %rcx, (%rax) movl $0x0, -0x4(%rbp) jmp 0x3d52 movq -0x18(%rbp), %rdi movq -0x10(%rbp), %rdx leaq 0xd03(%rip), %rsi # 0x4a4b movb $0x0, %al callq 0x3850 movl %eax, -0x4(%rbp) movl -0x4(%rbp), %eax addq $0x20, %rsp popq %rbp retq nopl (%rax,%rax)
/sysprogs[P]libssh2/tests/openssh_fixture.c
assert_int_eq(int, int, char const*, int)
int assert_int_eq(int a, int b, const char *testcase, int line) { test_counter++; int err = a!=b; if(err) { printf("not ok %d - %s...\n", test_counter, testcase); printf("# Expected %d, but observed %d instead (line %d)\n", a, b, line); global_err++; } else printf("ok %d - %s...\n", test_counter, testcase); return err; }
pushq %rbp pushq %r14 pushq %rbx movl %esi, %ebx movl %edi, %ebp movl 0x5eaa(%rip), %esi # 0x70a4 incl %esi movl %esi, 0x5ea2(%rip) # 0x70a4 cmpl %ebx, %edi je 0x1234 movl %ecx, %r14d leaq 0x2e00(%rip), %rdi # 0x4010 xorl %eax, %eax callq 0x1030 leaq 0x2e05(%rip), %rdi # 0x4023 movl %ebp, %esi movl %ebx, %edx movl %r14d, %ecx xorl %eax, %eax callq 0x1030 incl 0x5e6e(%rip) # 0x70a0 jmp 0x1242 leaq 0x2dd9(%rip), %rdi # 0x4014 xorl %eax, %eax callq 0x1030 xorl %eax, %eax cmpl %ebx, %ebp setne %al popq %rbx popq %r14 popq %rbp retq
/fundamental[P]rtosc/test/common.h
strings()
void strings() { l[0].type = l[1].type = 's'; l[0].val.s = "rtosc rtosc rtosc"; l[1].val.s = "rtosc"; r[0].val.s = "rt0sc"; r[1].val.s = ""; cmp_gt(l, r, 1, 1, NULL, "one string", "another string", __LINE__); cmp_gt(l, l+1, 1, 1, NULL, "one string", "subset string", __LINE__); cmp_gt(r, r+1, 1, 1, NULL, "normal string", "empty string", __LINE__); }
pushq %r15 pushq %r14 pushq %r12 pushq %rbx pushq %rax movb $0x73, %al movb %al, 0x4f46(%rip) # 0x70c8 leaq 0x4f3f(%rip), %r14 # 0x70c8 leaq 0x4f20(%rip), %r15 # 0x70b0 movb %al, 0x4f1a(%rip) # 0x70b0 leaq 0x21b0(%rip), %rax # 0x434d movq %rax, 0x4f14(%rip) # 0x70b8 leaq 0x21ae(%rip), %rax # 0x4359 movq %rax, 0x4f1e(%rip) # 0x70d0 leaq 0x21a6(%rip), %rax # 0x435f movq %rax, 0x4f48(%rip) # 0x7108 leaq 0x4f39(%rip), %rbx # 0x7100 leaq 0x207d(%rip), %rax # 0x424b movq %rax, 0x4f4b(%rip) # 0x7120 leaq 0x2194(%rip), %rax # 0x4370 leaq 0x2182(%rip), %r12 # 0x4365 movl $0x1, %edx movl $0x1, %ecx movq %r15, %rdi movq %rbx, %rsi xorl %r8d, %r8d movq %r12, %r9 pushq $0xb7 pushq %rax callq 0x1af9 addq $0x10, %rsp leaq 0x2170(%rip), %rax # 0x437f movl $0x1, %edx movl $0x1, %ecx movq %r15, %rdi movq %r14, %rsi xorl %r8d, %r8d movq %r12, %r9 pushq $0xb8 pushq %rax callq 0x1af9 addq $0x10, %rsp leaq 0x2160(%rip), %rax # 0x439b leaq 0x4ed6(%rip), %rsi # 0x7118 leaq 0x2144(%rip), %r9 # 0x438d movl $0x1, %edx movl $0x1, %ecx movq %rbx, %rdi xorl %r8d, %r8d pushq $0xb9 pushq %rax callq 0x1af9 addq $0x18, %rsp popq %rbx popq %r12 popq %r14 popq %r15 retq
/fundamental[P]rtosc/test/arg-val-cmp.cpp
rtosc_arg_vals_cmp_has_next
int rtosc_arg_vals_cmp_has_next(const rtosc_arg_val_itr* litr, const rtosc_arg_val_itr* ritr, size_t lsize, size_t rsize) { return (litr->i < lsize) && (ritr->i < rsize) && (litr->av->type != '-' || ritr->av->type != '-' || rtosc_av_rep_num(litr->av) || rtosc_av_rep_num(ritr->av)); }
pushq %r14 pushq %rbx pushq %rax xorl %ebx, %ebx cmpq %rdx, 0x8(%rdi) jae 0x2dae movq %rsi, %r14 cmpq %rcx, 0x8(%rsi) jae 0x2dae movq (%rdi), %rdi movl $0x1, %ebx cmpb $0x2d, (%rdi) jne 0x2dae movq (%r14), %rax cmpb $0x2d, (%rax) jne 0x2dae callq 0x2d52 testl %eax, %eax jne 0x2dae movq (%r14), %rdi callq 0x2d52 xorl %ebx, %ebx testl %eax, %eax setne %bl movl %ebx, %eax addq $0x8, %rsp popq %rbx popq %r14 retq
/fundamental[P]rtosc/src/cpp/arg-val-cmp.c
rtosc_arg_vals_eq_after_abort
int rtosc_arg_vals_eq_after_abort(const rtosc_arg_val_itr* litr, const rtosc_arg_val_itr* ritr, size_t lsize, size_t rsize) { return (litr->i == lsize || (litr->av->type == '-' && !rtosc_av_rep_num(litr->av))) && (ritr->i == rsize || (ritr->av->type == '-' && !rtosc_av_rep_num(ritr->av))); }
pushq %r15 pushq %r14 pushq %rbx movq %rcx, %r15 movq %rsi, %r14 cmpq %rdx, 0x8(%rdi) jne 0x2dec movl $0x1, %ebx cmpq %r15, 0x8(%r14) je 0x2dff movq (%r14), %rdi xorl %ebx, %ebx cmpb $0x2d, (%rdi) jne 0x2dff callq 0x2d52 xorl %ebx, %ebx testl %eax, %eax sete %bl jmp 0x2dff movq (%rdi), %rdi xorl %ebx, %ebx cmpb $0x2d, (%rdi) jne 0x2dff callq 0x2d52 testl %eax, %eax je 0x2dc9 movl %ebx, %eax popq %rbx popq %r14 popq %r15 retq
/fundamental[P]rtosc/src/cpp/arg-val-cmp.c
rtosc_arg_vals_eq_single
int rtosc_arg_vals_eq_single(const rtosc_arg_val_t* _lhs, const rtosc_arg_val_t* _rhs, const rtosc_cmp_options* opt) { #define mfabs(val) (((val) >= 0) ? (val) : -(val)) int rval; if(!opt) opt = &default_cmp_options; if(_lhs->type == _rhs->type) switch(_lhs->type) { case 'i': case 'c': case 'r': rval = _lhs->val.i == _rhs->val.i; break; case 'I': case 'T': case 'F': case 'N': rval = 1; break; case 'f': rval = (opt->float_tolerance == 0.0) ? _lhs->val.f == _rhs->val.f : mfabs(_lhs->val.f - _rhs->val.f) <= (float)opt->float_tolerance; break; case 'd': rval = (opt->float_tolerance == 0.0) ? _lhs->val.d == _rhs->val.d : mfabs(_lhs->val.d - _rhs->val.d) <= opt->float_tolerance; break; case 'h': rval = _lhs->val.h == _rhs->val.h; break; case 't': rval = _lhs->val.t == _rhs->val.t; break; case 'm': rval = 0 == memcmp(_lhs->val.m, _rhs->val.m, 4); break; case 's': case 'S': rval = (_lhs->val.s == NULL || _rhs->val.s == NULL) ? _lhs->val.s == _rhs->val.s : (0 == strcmp(_lhs->val.s, _rhs->val.s)); break; case 'b': { int32_t lbs = _lhs->val.b.len, rbs = _rhs->val.b.len; rval = lbs == rbs; if(rval) rval = 0 == memcmp(_lhs->val.b.data, _rhs->val.b.data, lbs); break; } case 'a': { if( rtosc_av_arr_type(_lhs) != rtosc_av_arr_type(_rhs) && !(rtosc_av_arr_type(_lhs) == 'T' && rtosc_av_arr_type(_rhs) == 'F') && !(rtosc_av_arr_type(_lhs) == 'F' && rtosc_av_arr_type(_rhs) == 'T')) rval = 0; else rval = rtosc_arg_vals_eq(_lhs+1, _rhs+1, rtosc_av_arr_len(_lhs), rtosc_av_arr_len(_rhs), opt); break; } default: rval = -1; // no recovery: the programmer did not pass the right args, and // we don't have a function to compare ranges here assert(false); exit(1); break; } else { rval = 0; } return rval; #undef mfabs }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx pushq %rax testq %rdx, %rdx leaq 0x1804(%rip), %r15 # 0x4620 cmovneq %rdx, %r15 movzbl (%rdi), %ecx cmpb (%rsi), %cl jne 0x2ff6 movl $0x1, %eax cmpl $0x52, %ecx jle 0x2e5e movq %rsi, %rbx movq %rdi, %r14 leal -0x61(%rcx), %edx cmpl $0x13, %edx ja 0x2e7b leaq 0x1736(%rip), %rax # 0x4580 movslq (%rax,%rdx,4), %rcx addq %rax, %rcx jmpq *%rcx movl 0x8(%r14), %ecx xorl %eax, %eax cmpl 0x8(%rbx), %ecx jmp 0x2e9d cmpl $0x46, %ecx je 0x2ff8 cmpl $0x49, %ecx je 0x2ff8 cmpl $0x4e, %ecx je 0x2ff8 jmp 0x2e89 cmpl $0x53, %ecx je 0x2ea5 cmpl $0x54, %ecx je 0x2ff8 movl $0x1, %edi callq 0x1090 movq 0x8(%r14), %rcx xorl %eax, %eax cmpq 0x8(%rbx), %rcx sete %al jmp 0x2ff8 movq 0x8(%r14), %rdi movq 0x8(%rbx), %rsi testq %rdi, %rdi je 0x3009 testq %rsi, %rsi je 0x3007 callq 0x10b0 testl %eax, %eax jmp 0x300c movsd (%r15), %xmm0 xorpd %xmm1, %xmm1 ucomisd %xmm1, %xmm0 movss 0x8(%r14), %xmm1 movss 0x8(%rbx), %xmm2 jne 0x3014 jp 0x3014 cmpeqss %xmm2, %xmm1 movd %xmm1, %eax andl $0x1, %eax jmp 0x303d movslq 0x8(%r14), %rdx movl $0x0, %eax cmpl 0x8(%rbx), %edx jne 0x2ff8 movq 0x10(%r14), %rdi movq 0x10(%rbx), %rsi callq 0x1070 movl %eax, %ecx xorl %eax, %eax testl %ecx, %ecx jmp 0x2e9d movq %r14, %rdi callq 0x2d41 movl %eax, %ebp movq %rbx, %rdi callq 0x2d41 cmpb %al, %bpl jne 0x2fb4 leaq 0x18(%r14), %r12 leaq 0x18(%rbx), %r13 movq %r14, %rdi callq 0x2d45 movslq %eax, %r14 movq %rbx, %rdi callq 0x2d45 movslq %eax, %rcx movq %r12, %rdi movq %r13, %rsi movq %r14, %rdx movq %r15, %r8 addq $0x8, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp jmp 0x3073 movsd (%r15), %xmm0 xorpd %xmm1, %xmm1 ucomisd %xmm1, %xmm0 movsd 0x8(%r14), %xmm1 movsd 0x8(%rbx), %xmm2 jne 0x3042 jp 0x3042 cmpeqsd %xmm2, %xmm1 movq %xmm1, %rax andl $0x1, %eax jmp 0x306e movq %r14, %rdi callq 0x2d41 cmpb $0x54, %al jne 0x2fd0 movq %rbx, %rdi callq 0x2d41 cmpb $0x46, %al je 0x2f41 movq %r14, %rdi callq 0x2d41 cmpb $0x46, %al jne 0x2ff6 movq %rbx, %rdi callq 0x2d41 movl %eax, %ecx movl $0x0, %eax cmpb $0x54, %cl je 0x2f41 jmp 0x2ff8 xorl %eax, %eax addq $0x8, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq xorl %esi, %esi cmpq %rsi, %rdi sete %al movzbl %al, %eax jmp 0x2ff8 subss %xmm2, %xmm1 movaps 0x1551(%rip), %xmm2 # 0x4570 xorps %xmm1, %xmm2 movaps %xmm2, %xmm3 cmpnless %xmm1, %xmm3 andps %xmm3, %xmm2 andnps %xmm1, %xmm3 cvtsd2ss %xmm0, %xmm0 orps %xmm2, %xmm3 ucomiss %xmm3, %xmm0 setae %al movzbl %al, %eax jmp 0x2ff8 subsd %xmm2, %xmm1 movapd 0x1512(%rip), %xmm2 # 0x4560 xorpd %xmm1, %xmm2 movapd %xmm2, %xmm3 cmpnlesd %xmm1, %xmm3 andpd %xmm3, %xmm2 andnpd %xmm1, %xmm3 orpd %xmm2, %xmm3 ucomisd %xmm3, %xmm0 setae %al movzbl %al, %eax jmp 0x2ff8
/fundamental[P]rtosc/src/cpp/arg-val-cmp.c
rtosc_arg_vals_eq
int rtosc_arg_vals_eq(const rtosc_arg_val_t* lhs, const rtosc_arg_val_t* rhs, size_t lsize, size_t rsize, const rtosc_cmp_options* opt) { // used if the value of lhs or rhs is range-computed: rtosc_arg_val_t rlhs, rrhs; rtosc_arg_val_itr litr, ritr; rtosc_arg_val_itr_init(&litr, lhs); rtosc_arg_val_itr_init(&ritr, rhs); int rval = 1; if(!opt) opt = &default_cmp_options; for( ; rtosc_arg_vals_cmp_has_next(&litr, &ritr, lsize, rsize) && rval; rtosc_arg_val_itr_next(&litr), rtosc_arg_val_itr_next(&ritr)) { rval = rtosc_arg_vals_eq_single(rtosc_arg_val_itr_get(&litr, &rlhs), rtosc_arg_val_itr_get(&ritr, &rrhs), opt); } return rval ? rtosc_arg_vals_eq_after_abort(&litr, &ritr, lsize, rsize) : rval; }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x68, %rsp movq %r8, %r12 movq %rcx, %rbx movq %rdx, %r14 movq %rsi, %r15 movq %rdi, %rsi leaq 0x20(%rsp), %r13 movq %r13, %rdi callq 0x35c0 leaq 0x8(%rsp), %rbp movq %rbp, %rdi movq %r15, %rsi callq 0x35c0 testq %r12, %r12 leaq 0x1569(%rip), %r15 # 0x4620 cmovneq %r12, %r15 movq %r13, %rdi movq %rbp, %rsi movq %r14, %rdx movq %rbx, %rcx callq 0x2d6c testl %eax, %eax je 0x3137 leaq 0x20(%rsp), %r12 leaq 0x8(%rsp), %rbp movq %r12, %rdi leaq 0x50(%rsp), %rsi callq 0x35d3 movq %rax, %r13 movq %rbp, %rdi leaq 0x38(%rsp), %rsi callq 0x35d3 movq %r13, %rdi movq %rax, %rsi movq %r15, %rdx callq 0x2e07 movl %eax, %r13d movq %r12, %rdi callq 0x361e movq %rbp, %rdi callq 0x361e movq %r12, %rdi movq %rbp, %rsi movq %r14, %rdx movq %rbx, %rcx callq 0x2d6c testl %eax, %eax je 0x3132 testl %r13d, %r13d jne 0x30da testl %r13d, %r13d je 0x314e leaq 0x20(%rsp), %rdi leaq 0x8(%rsp), %rsi movq %r14, %rdx movq %rbx, %rcx callq 0x2db8 jmp 0x3150 xorl %eax, %eax addq $0x68, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq
/fundamental[P]rtosc/src/cpp/arg-val-cmp.c
rtosc_arg_vals_cmp_single
int rtosc_arg_vals_cmp_single(const rtosc_arg_val_t* _lhs, const rtosc_arg_val_t* _rhs, const rtosc_cmp_options* opt) { #define cmp_3way(val1,val2) (((val1) == (val2)) \ ? 0 \ : (((val1) > (val2)) ? 1 : -1)) #define mfabs(val) (((val) >= 0) ? (val) : -(val)) int rval; if(!opt) opt = &default_cmp_options; if(_lhs->type == _rhs->type) switch(_lhs->type) { case 'i': case 'c': case 'r': rval = cmp_3way(_lhs->val.i, _rhs->val.i); break; case 'I': case 'T': case 'F': case 'N': rval = 0; break; case 'f': rval = (opt->float_tolerance == 0.0) ? cmp_3way(_lhs->val.f, _rhs->val.f) : (mfabs(_lhs->val.f - _rhs->val.f) <= (float)opt->float_tolerance) ? 0 : ((_lhs->val.f > _rhs->val.f) ? 1 : -1); break; case 'd': rval = (opt->float_tolerance == 0.0) ? cmp_3way(_lhs->val.d, _rhs->val.d) : (mfabs(_lhs->val.d - _rhs->val.d) <= opt->float_tolerance) ? 0 : ((_lhs->val.d > _rhs->val.d) ? 1 : -1); break; case 'h': rval = cmp_3way(_lhs->val.h, _rhs->val.h); break; case 't': // immediately is considered lower than everything else // this means if you send two events to a client, // one being "immediately" and one being different, the // immediately-event has the higher priority, event if the // other one is in the past rval = (_lhs->val.t == 1) ? (_rhs->val.t == 1) ? 0 : -1 // _lhs has higher priority => _lhs < _rhs : (_rhs->val.t == 1) ? 1 : cmp_3way(_lhs->val.t, _rhs->val.t); break; case 'm': rval = memcmp(_lhs->val.m, _rhs->val.m, 4); break; case 's': case 'S': rval = (_lhs->val.s == NULL || _rhs->val.s == NULL) ? cmp_3way(_lhs->val.s, _rhs->val.s) : strcmp(_lhs->val.s, _rhs->val.s); break; case 'b': { int32_t lbs = _lhs->val.b.len, rbs = _rhs->val.b.len; int32_t minlen = (lbs < rbs) ? lbs : rbs; rval = memcmp(_lhs->val.b.data, _rhs->val.b.data, minlen); if(lbs != rbs && !rval) { // both equal until here // the string that ends here is lexicographically smaller rval = (lbs > rbs) ? _lhs->val.b.data[minlen] : -_rhs->val.b.data[minlen]; } break; } case 'a': { int32_t llen = rtosc_av_arr_len(_lhs), rlen = rtosc_av_arr_len(_rhs); if( rtosc_av_arr_type(_lhs) != rtosc_av_arr_type(_rhs) && !(rtosc_av_arr_type(_lhs) == 'T' && rtosc_av_arr_type(_rhs)) && !(rtosc_av_arr_type(_lhs) == 'F' && rtosc_av_arr_type(_rhs))) rval = (rtosc_av_arr_type(_lhs) > rtosc_av_arr_type(_rhs)) ? 1 : -1; else { // the arg vals differ in this array => compare and return rval = rtosc_arg_vals_cmp(_lhs+1, _rhs+1, llen, rlen, opt); } break; } case '-': rval = -1; // no recovery: the programmer did not pass the right args, and // we don't have a function to compare ranges here assert(false); break; default: rval = -1; assert(false); } else { rval = (_lhs->type > _rhs->type) ? 1 : -1; } return rval; #undef mfabs #undef cmp_3way }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx pushq %rax testq %rdx, %rdx leaq 0x14ac(%rip), %r15 # 0x4620 cmovneq %rdx, %r15 movzbl (%rdi), %ecx movb (%rsi), %al cmpb %al, %cl jne 0x31b1 movq %rsi, %rbx movq %rdi, %r14 xorl %eax, %eax leal -0x61(%rcx), %edx cmpl $0x13, %edx ja 0x31ce leaq 0x1438(%rip), %rcx # 0x45d0 movslq (%rcx,%rdx,4), %rdx addq %rcx, %rdx jmpq *%rdx movl 0x8(%r14), %eax xorl %ecx, %ecx xorl %edx, %edx cmpl 0x8(%rbx), %eax jmp 0x3231 xorl %edx, %edx cmpb %al, %cl setg %dl leal -0x1(,%rdx,2), %eax addq $0x8, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq addl $-0x2d, %ecx cmpl $0x27, %ecx ja 0x321e movabsq $0x8212000000, %rdx # imm = 0x8212000000 btq %rcx, %rdx jb 0x31bf testq %rcx, %rcx je 0x321e cmpq $0x26, %rcx jne 0x321e movq 0x8(%r14), %rdi movq 0x8(%rbx), %rsi testq %rdi, %rdi je 0x33bc testq %rsi, %rsi je 0x33ea addq $0x8, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp jmp 0x10b0 movl $0xffffffff, %eax # imm = 0xFFFFFFFF jmp 0x31bf movq 0x8(%r14), %rax xorl %ecx, %ecx xorl %edx, %edx cmpq 0x8(%rbx), %rax setg %dl leal -0x1(%rdx,%rdx), %eax cmovel %ecx, %eax jmp 0x31bf movsd (%r15), %xmm2 xorpd %xmm0, %xmm0 ucomisd %xmm0, %xmm2 movss 0x8(%r14), %xmm0 movss 0x8(%rbx), %xmm1 jne 0x33fc jp 0x33fc ucomiss %xmm1, %xmm0 jmp 0x3388 movl 0x8(%r14), %ebp movl 0x8(%rbx), %r12d cmpl %r12d, %ebp movl %r12d, %eax cmovll %ebp, %eax movq 0x10(%r14), %r14 movq 0x10(%rbx), %r15 movslq %eax, %rbx movq %r14, %rdi movq %r15, %rsi movq %rbx, %rdx callq 0x1040 cmpl %r12d, %ebp je 0x31bf testl %eax, %eax jne 0x31bf cmpl %r12d, %ebp jle 0x3484 movzbl (%r14,%rbx), %eax jmp 0x31bf movq %r14, %rdi callq 0x2d45 movl %eax, %ebp movq %rbx, %rdi callq 0x2d45 movl %eax, %r12d movq %r14, %rdi callq 0x2d41 movl %eax, %r13d movq %rbx, %rdi callq 0x2d41 cmpb %al, %r13b je 0x331c movq %r14, %rdi callq 0x2d41 cmpb $0x54, %al jne 0x32fc movq %rbx, %rdi callq 0x2d41 testb %al, %al jne 0x331c movq %r14, %rdi callq 0x2d41 cmpb $0x46, %al jne 0x3490 movq %rbx, %rdi callq 0x2d41 testb %al, %al je 0x3490 addq $0x18, %r14 addq $0x18, %rbx movslq %ebp, %rdx movslq %r12d, %rcx movq %r14, %rdi movq %rbx, %rsi movq %r15, %r8 addq $0x8, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp jmp 0x34b6 movl 0x8(%r14), %ecx movl 0x8(%rbx), %edx bswapl %ecx bswapl %edx xorl %eax, %eax cmpl %edx, %ecx seta %al sbbl $0x0, %eax jmp 0x31bf movsd (%r15), %xmm2 xorpd %xmm0, %xmm0 ucomisd %xmm0, %xmm2 movsd 0x8(%r14), %xmm0 movsd 0x8(%rbx), %xmm1 jne 0x3437 jp 0x3437 ucomisd %xmm1, %xmm0 movl $0x0, %eax jne 0x3395 jnp 0x31bf seta %al movzbl %al, %eax jmp 0x3478 movq 0x8(%r14), %rdx movq 0x8(%rbx), %rcx cmpq $0x1, %rdx jne 0x33c6 xorl %eax, %eax cmpq $0x1, %rcx setne %al jmp 0x3489 cmpq %rsi, %rdi jne 0x33ec jmp 0x31bf movl $0x1, %eax cmpq $0x1, %rcx je 0x31bf movl $0x0, %eax cmpq %rcx, %rdx je 0x31bf xorl %eax, %eax cmpq %rdx, %rcx jmp 0x33f1 xorl %esi, %esi xorl %eax, %eax cmpq %rdi, %rsi adcl $-0x1, %eax orl $0x1, %eax jmp 0x31bf movaps %xmm0, %xmm3 subss %xmm1, %xmm3 movaps 0x1166(%rip), %xmm4 # 0x4570 xorps %xmm3, %xmm4 movaps %xmm4, %xmm5 cmpnless %xmm3, %xmm5 andps %xmm5, %xmm4 andnps %xmm3, %xmm5 cvtsd2ss %xmm2, %xmm2 orps %xmm4, %xmm5 ucomiss %xmm5, %xmm2 movl $0x0, %eax jae 0x31bf xorl %eax, %eax ucomiss %xmm1, %xmm0 jmp 0x3475 movapd %xmm0, %xmm3 subsd %xmm1, %xmm3 movapd 0x1119(%rip), %xmm4 # 0x4560 xorpd %xmm3, %xmm4 movapd %xmm4, %xmm5 cmpnlesd %xmm3, %xmm5 andpd %xmm5, %xmm4 andnpd %xmm3, %xmm5 orpd %xmm4, %xmm5 ucomisd %xmm5, %xmm2 movl $0x0, %eax jae 0x31bf xorl %eax, %eax ucomisd %xmm1, %xmm0 seta %al leal -0x1(,%rax,2), %eax jmp 0x31bf movzbl (%r15,%rbx), %eax negl %eax jmp 0x31bf movq %r14, %rdi callq 0x2d41 movl %eax, %ebp movq %rbx, %rdi callq 0x2d41 xorl %ecx, %ecx cmpb %al, %bpl setg %cl leal -0x1(,%rcx,2), %eax jmp 0x31bf
/fundamental[P]rtosc/src/cpp/arg-val-cmp.c
rtosc_arg_vals_cmp
int rtosc_arg_vals_cmp(const rtosc_arg_val_t* lhs, const rtosc_arg_val_t* rhs, size_t lsize, size_t rsize, const rtosc_cmp_options* opt) { // used if the value of lhs or rhs is range-computed: rtosc_arg_val_t rlhs, rrhs; rtosc_arg_val_itr litr, ritr; rtosc_arg_val_itr_init(&litr, lhs); rtosc_arg_val_itr_init(&ritr, rhs); int rval = 0; if(!opt) opt = &default_cmp_options; for( ; rtosc_arg_vals_cmp_has_next(&litr, &ritr, lsize, rsize) && !rval; rtosc_arg_val_itr_next(&litr), rtosc_arg_val_itr_next(&ritr)) { rval = rtosc_arg_vals_cmp_single(rtosc_arg_val_itr_get(&litr, &rlhs), rtosc_arg_val_itr_get(&ritr, &rrhs), opt); } return rval ? rval : (rtosc_arg_vals_eq_after_abort(&litr, &ritr, lsize, rsize)) ? 0 // they're equal until here, so one array must have // elements left: : (lsize-(litr.i) > rsize-(ritr.i)) ? 1 : -1; }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x68, %rsp movq %r8, %r12 movq %rcx, %rbx movq %rdx, %r14 movq %rsi, %r15 movq %rdi, %rsi leaq 0x20(%rsp), %r13 movq %r13, %rdi callq 0x35c0 leaq 0x8(%rsp), %rbp movq %rbp, %rdi movq %r15, %rsi callq 0x35c0 testq %r12, %r12 leaq 0x1126(%rip), %r15 # 0x4620 cmovneq %r12, %r15 movq %r13, %rdi movq %rbp, %rsi movq %r14, %rdx movq %rbx, %rcx callq 0x2d6c testl %eax, %eax je 0x357a leaq 0x20(%rsp), %r12 leaq 0x8(%rsp), %rbp movq %r12, %rdi leaq 0x50(%rsp), %rsi callq 0x35d3 movq %rax, %r13 movq %rbp, %rdi leaq 0x38(%rsp), %rsi callq 0x35d3 movq %r13, %rdi movq %rax, %rsi movq %r15, %rdx callq 0x315f movl %eax, %r13d movq %r12, %rdi callq 0x361e movq %rbp, %rdi callq 0x361e movq %r12, %rdi movq %rbp, %rsi movq %r14, %rdx movq %rbx, %rcx callq 0x2d6c testl %eax, %eax je 0x3575 testl %r13d, %r13d je 0x351d testl %r13d, %r13d jne 0x35ae leaq 0x20(%rsp), %rdi leaq 0x8(%rsp), %rsi movq %r14, %rdx movq %rbx, %rcx callq 0x2db8 xorl %r13d, %r13d testl %eax, %eax jne 0x35ae subq 0x28(%rsp), %r14 subq 0x10(%rsp), %rbx xorl %r13d, %r13d cmpq %r14, %rbx adcl $-0x1, %r13d orl $0x1, %r13d movl %r13d, %eax addq $0x68, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq
/fundamental[P]rtosc/src/cpp/arg-val-cmp.c
rtosc_arg_val_itr_get
const rtosc_arg_val_t* rtosc_arg_val_itr_get(const rtosc_arg_val_itr *itr, rtosc_arg_val_t* buffer) { const rtosc_arg_val_t* result; if(itr->av->type == '-') { if(rtosc_av_rep_has_delta(itr->av)) rtosc_arg_val_range_arg(itr->av, itr->range_i, buffer); else *buffer = itr->av[1]; result = buffer; } else result = itr->av; return result; }
pushq %r14 pushq %rbx pushq %rax movq %rdi, %r14 movq (%rdi), %rdi cmpb $0x2d, (%rdi) jne 0x35ff movq %rsi, %rbx callq 0x2d56 movq (%r14), %rdi testl %eax, %eax je 0x3604 movl 0x10(%r14), %esi movq %rbx, %rdx callq 0x3b6f jmp 0x3613 movq %rdi, %rbx jmp 0x3613 movq 0x28(%rdi), %rax movq %rax, 0x10(%rbx) movups 0x18(%rdi), %xmm0 movups %xmm0, (%rbx) movq %rbx, %rax addq $0x8, %rsp popq %rbx popq %r14 retq
/fundamental[P]rtosc/src/cpp/arg-val-itr.c
rtosc_arg_val_null
int rtosc_arg_val_null(rtosc_arg_val_t* av, char type) { av->type = type; switch(type) { case 'h': av->val.h = 0; return true; case 't': av->val.t = 0; return true; case 's': case 'S': av->val.s = NULL; return true; case 'd': av->val.d = 0.0; return true; case 'f': av->val.f = 0.0f; return true; case 'c': case 'i': case 'r': av->val.i = 0; return true; case 'T': case 'F': av->type = 'F'; av->val.T = 0; return true; default: return false; } }
movb %sil, (%rdi) xorl %eax, %eax cmpl $0x62, %esi jle 0x36eb addl $-0x63, %esi cmpl $0x11, %esi ja 0x3710 leaq 0xf4f(%rip), %rcx # 0x4628 movslq (%rcx,%rsi,4), %rdx addq %rcx, %rdx jmpq *%rdx movl $0x0, 0x8(%rdi) jmp 0x370b cmpl $0x46, %esi je 0x36fa cmpl $0x53, %esi je 0x3703 cmpl $0x54, %esi jne 0x3710 movb $0x46, (%rdi) movb $0x0, 0x8(%rdi) jmp 0x370b movq $0x0, 0x8(%rdi) movl $0x1, %eax retq
/fundamental[P]rtosc/src/cpp/arg-val-math.c
rtosc_arg_val_from_int
int rtosc_arg_val_from_int(rtosc_arg_val_t* av, char type, int number) { av->type = type; switch(type) { case 'h': av->val.h = number; return true; case 'd': av->val.d = number; return true; case 'f': av->val.f = number; return true; case 'c': case 'i': av->val.i = number; return true; case 'F': case 'T': // note: we discard av->type here! // it's clear that the decision should be based on "number", // not on the current type av->val.T = (number != 0.0); av->type = av->val.T ? 'T' : 'F'; return true; default: return false; } }
movb %sil, (%rdi) xorl %eax, %eax leal -0x63(%rsi), %ecx cmpl $0x6, %ecx ja 0x3733 leaq 0xf4b(%rip), %rsi # 0x4670 movslq (%rsi,%rcx,4), %rcx addq %rsi, %rcx jmpq *%rcx movl %edx, 0x8(%rdi) jmp 0x3771 cmpl $0x46, %esi je 0x373d cmpl $0x54, %esi jne 0x3776 testl %edx, %edx setne 0x8(%rdi) movl $0x54, %eax movl $0x46, %ecx cmovnel %eax, %ecx movb %cl, (%rdi) jmp 0x3771 cvtsi2ss %edx, %xmm0 movss %xmm0, 0x8(%rdi) jmp 0x3771 movslq %edx, %rax movq %rax, 0x8(%rdi) jmp 0x3771 cvtsi2sd %edx, %xmm0 movsd %xmm0, 0x8(%rdi) movl $0x1, %eax retq
/fundamental[P]rtosc/src/cpp/arg-val-math.c
rtosc_arg_val_round
int rtosc_arg_val_round(rtosc_arg_val_t* av) { int tmp; switch(av->type) { case 'd': tmp = (int)(av->val.d); av->val.d = tmp + (int)(av->val.d - tmp >= 0.999); return true; case 'f': tmp = (int)(av->val.f); av->val.f = tmp + (int)(av->val.f - tmp >= 0.999f); return true; case 'h': case 'c': case 'i': case 'T': case 'F': return true; default: return false; } }
movzbl (%rdi), %ecx movl $0x1, %eax leal -0x63(%rcx), %edx cmpl $0x6, %edx ja 0x387e leaq 0xe50(%rip), %rcx # 0x46c4 movslq (%rcx,%rdx,4), %rdx addq %rcx, %rdx jmpq *%rdx retq cmpl $0x46, %ecx je 0x387d cmpl $0x54, %ecx je 0x387d xorl %eax, %eax retq movsd 0x8(%rdi), %xmm0 cvttsd2si %xmm0, %ecx cvttpd2dq %xmm0, %xmm1 cvtdq2pd %xmm1, %xmm1 subsd %xmm1, %xmm0 ucomisd 0xec8(%rip), %xmm0 # 0x4770 sbbl $-0x1, %ecx xorps %xmm0, %xmm0 cvtsi2sd %ecx, %xmm0 movsd %xmm0, 0x8(%rdi) retq movss 0x8(%rdi), %xmm0 cvttss2si %xmm0, %ecx cvttps2dq %xmm0, %xmm1 cvtdq2ps %xmm1, %xmm1 subss %xmm1, %xmm0 ucomiss 0xe99(%rip), %xmm0 # 0x476c sbbl $-0x1, %ecx xorps %xmm0, %xmm0 cvtsi2ss %ecx, %xmm0 movss %xmm0, 0x8(%rdi) retq
/fundamental[P]rtosc/src/cpp/arg-val-math.c
rtosc_arg_val_div
int rtosc_arg_val_div(const rtosc_arg_val_t* lhs, const rtosc_arg_val_t* rhs, rtosc_arg_val_t* res) { if(lhs->type != rhs->type) return false; res->type = lhs->type; switch(lhs->type) { case 'd': res->val.d = lhs->val.d / rhs->val.d; return true; case 'f': res->val.f = lhs->val.f / rhs->val.f; return true; case 'h': res->val.h = lhs->val.h / rhs->val.h; return true; case 'c': case 'i': res->val.i = lhs->val.i / rhs->val.i; return true; case 'T': res->type = 'T'; res->val.T = 1; return true; case 'F': assert(false); return false; // divide by 0 default: return false; } }
movq %rdx, %rcx movb (%rdi), %dl xorl %eax, %eax cmpb (%rsi), %dl jne 0x3b28 movb %dl, (%rcx) movzbl (%rdi), %r8d leal -0x63(%r8), %edx cmpl $0x6, %edx ja 0x3ae4 leaq 0xc65(%rip), %r8 # 0x4734 movslq (%r8,%rdx,4), %rdx addq %r8, %rdx jmpq *%rdx movl 0x8(%rdi), %eax cltd idivl 0x8(%rsi) movl %eax, 0x8(%rcx) jmp 0x3b23 cmpl $0x54, %r8d jne 0x3b28 movb $0x54, (%rcx) movb $0x1, 0x8(%rcx) jmp 0x3b23 movq 0x8(%rdi), %rax cqto idivq 0x8(%rsi) movq %rax, 0x8(%rcx) jmp 0x3b23 movsd 0x8(%rdi), %xmm0 divsd 0x8(%rsi), %xmm0 movsd %xmm0, 0x8(%rcx) jmp 0x3b23 movss 0x8(%rdi), %xmm0 divss 0x8(%rsi), %xmm0 movss %xmm0, 0x8(%rcx) movl $0x1, %eax retq
/fundamental[P]rtosc/src/cpp/arg-val-math.c
tst_qpromise_finally::rejectedSync_void()
void tst_qpromise_finally::rejectedSync_void() { int value = -1; auto p = QtPromise::QPromise<void>::reject(QString{"foo"}).finally([&]() { value = 8; return 16; // ignored! }); Q_STATIC_ASSERT((std::is_same<decltype(p), QtPromise::QPromise<void>>::value)); QCOMPARE(waitForError(p, QString{}), QString{"foo"}); QCOMPARE(p.isRejected(), true); QCOMPARE(value, 8); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x148, %rsp # imm = 0x148 orl $-0x1, 0x4c(%rsp) leaq 0x128bc(%rip), %rsi # 0x1b0a3 leaq 0xd8(%rsp), %rbx movq %rbx, %rdi callq 0x10a2a leaq 0xf0(%rsp), %rdi movq %rbx, %rsi callq 0x10b32 leaq 0x1e2b2(%rip), %r12 # 0x26ac0 addq $0x10, %r12 movq %r12, 0x98(%rsp) movq 0xf8(%rsp), %rax movq %rax, 0xa0(%rsp) testq %rax, %rax je 0x8833 lock incl 0x8(%rax) leaq 0x1e23e(%rip), %r15 # 0x26a78 addq $0x10, %r15 movq %r15, 0x98(%rsp) leaq 0x1e1fb(%rip), %rbx # 0x26a48 addq $0x10, %rbx movq %rbx, 0x38(%rsp) pushq $0x68 popq %rdi callq 0x40a0 movq %rax, %r14 xorps %xmm0, %xmm0 movaps %xmm0, 0x50(%rax) movaps %xmm0, 0x40(%rax) movaps %xmm0, 0x30(%rax) movaps %xmm0, 0x20(%rax) movaps %xmm0, 0x10(%rax) movaps %xmm0, (%rax) andq $0x0, 0x60(%rax) movq %rax, %rdi callq 0x11bc0 movq %r14, 0x40(%rsp) lock incl 0x8(%r14) movq %rbx, 0xb0(%rsp) movq 0x40(%rsp), %rax movq %rax, 0xb8(%rsp) testq %rax, %rax je 0x88b0 lock incl 0x8(%rax) leaq 0x1e2c9(%rip), %r13 # 0x26b80 addq $0x10, %r13 leaq 0xb0(%rsp), %rsi movq %r13, (%rsi) leaq 0x60(%rsp), %rdi callq 0x11be0 leaq 0xb0(%rsp), %rdi callq 0x10c02 movq 0x60(%rsp), %rax movq %rax, 0x8(%rsp) testq %rax, %rax je 0x88fb lock incl (%rax) movq 0x60(%rsp), %rcx movq 0x8(%rsp), %rax jmp 0x88ff xorl %eax, %eax xorl %ecx, %ecx andq $0x0, 0x8(%rsp) movq %rax, 0x50(%rsp) movq %rcx, 0x10(%rsp) testq %rcx, %rcx je 0x8923 lock incl (%rcx) movq 0x10(%rsp), %rcx movq 0x50(%rsp), %rax jmp 0x8925 xorl %ecx, %ecx andq $0x0, 0x10(%rsp) movq %rcx, (%rsp) movq 0xa0(%rsp), %rbx movq %rax, 0x18(%rsp) testq %rax, %rax je 0x8948 lock incl (%rax) movq (%rsp), %rcx movq %rcx, 0x20(%rsp) testq %rcx, %rcx je 0x8955 lock incl (%rcx) leaq 0x4c(%rsp), %rbp movq %rbp, 0x28(%rsp) xorps %xmm0, %xmm0 movaps %xmm0, 0x120(%rsp) movaps %xmm0, 0x130(%rsp) pushq $0x18 popq %rdi callq 0x40a0 movq 0x18(%rsp), %rcx movq %rcx, (%rax) testq %rcx, %rcx je 0x898a lock incl (%rcx) movq 0x20(%rsp), %rcx movq %rcx, 0x8(%rax) testq %rcx, %rcx je 0x899b lock incl (%rcx) leaq 0x18(%rsp), %rdi movq 0x10(%rdi), %rcx movq %rcx, 0x10(%rax) leaq 0x120(%rsp), %r14 movq %rax, (%r14) leaq 0x6330(%rip), %rax # 0xecea movq %rax, 0x18(%r14) leaq 0x6335(%rip), %rax # 0xecfa movq %rax, 0x10(%r14) callq 0xecd4 movq %rbx, %rdi movq %r14, %rsi callq 0x14a3a leaq 0x120(%rsp), %rdi callq 0x11f1c movq 0xa0(%rsp), %rbx movq 0x50(%rsp), %rax movq %rax, 0x18(%rsp) testq %rax, %rax je 0x8a00 lock incl (%rax) movq (%rsp), %rax movq %rax, 0x20(%rsp) testq %rax, %rax je 0x8a11 lock incl (%rax) movq %rbp, 0x28(%rsp) xorps %xmm0, %xmm0 movaps %xmm0, 0x100(%rsp) movaps %xmm0, 0x110(%rsp) pushq $0x18 popq %rdi callq 0x40a0 movq 0x18(%rsp), %rcx movq %rcx, (%rax) testq %rcx, %rcx je 0x8a41 lock incl (%rcx) movq 0x20(%rsp), %rcx movq %rcx, 0x8(%rax) testq %rcx, %rcx je 0x8a52 lock incl (%rcx) leaq 0x18(%rsp), %rdi movq 0x10(%rdi), %rcx movq %rcx, 0x10(%rax) leaq 0x100(%rsp), %r14 movq %rax, (%r14) leaq 0x63a3(%rip), %rax # 0xee14 movq %rax, 0x18(%r14) leaq 0x63da(%rip), %rax # 0xee56 movq %rax, 0x10(%r14) callq 0xedfe movq %rbx, %rdi movq %r14, %rsi callq 0x14ac4 leaq 0x100(%rsp), %rdi callq 0x11f1c movq %rsp, %rdi callq 0x12092 leaq 0x10(%rsp), %rdi callq 0x12092 leaq 0x50(%rsp), %rdi callq 0x12092 leaq 0x8(%rsp), %rdi callq 0x12092 leaq 0x60(%rsp), %rdi callq 0x12092 movq %r13, 0x38(%rsp) movq 0xa0(%rsp), %rdi callq 0x11352 testb %al, %al jne 0x8af0 movq 0xa0(%rsp), %rdi callq 0x110a8 movq %r12, 0x50(%rsp) movq 0xa0(%rsp), %rax movq %rax, 0x58(%rsp) testq %rax, %rax je 0x8b0b lock incl 0x8(%rax) movq %r15, 0x50(%rsp) movq %r12, 0x78(%rsp) pushq $0x58 popq %rdi callq 0x40a0 movq %rax, %r14 xorps %xmm0, %xmm0 movaps %xmm0, 0x40(%rax) movaps %xmm0, 0x30(%rax) movaps %xmm0, 0x20(%rax) movaps %xmm0, 0x10(%rax) movaps %xmm0, (%rax) andq $0x0, 0x50(%rax) movq %rax, %rdi callq 0x10c46 movq %r14, 0x80(%rsp) lock incl 0x8(%r14) movq %r12, 0x60(%rsp) movq 0x80(%rsp), %rax movq %rax, 0x68(%rsp) testq %rax, %rax je 0x8b6b lock incl 0x8(%rax) leaq 0x60(%rsp), %rsi movq %r15, (%rsi) leaq 0x8(%rsp), %rdi callq 0x10c60 leaq 0x60(%rsp), %rdi callq 0x109dc movq 0x8(%rsp), %rax movq %rax, 0x10(%rsp) testq %rax, %rax je 0x8ba5 lock incl (%rax) movq 0x8(%rsp), %rcx movq 0x10(%rsp), %rax jmp 0x8ba9 xorl %eax, %eax xorl %ecx, %ecx andq $0x0, 0x10(%rsp) movq %rax, (%rsp) movq %rcx, 0x88(%rsp) testq %rcx, %rcx je 0x8bd1 lock incl (%rcx) movq 0x88(%rsp), %rcx movq (%rsp), %rax jmp 0x8bd3 xorl %ecx, %ecx andq $0x0, 0x88(%rsp) movq %rcx, 0x90(%rsp) movq 0x40(%rsp), %rbx movq %rax, 0x18(%rsp) testq %rax, %rax je 0x8bfe lock incl (%rax) movq 0x90(%rsp), %rcx movq %rcx, 0x20(%rsp) testq %rcx, %rcx je 0x8c0b lock incl (%rcx) movq %r12, 0x28(%rsp) movq 0x58(%rsp), %rax movq %rax, 0x30(%rsp) testq %rax, %rax je 0x8c23 lock incl 0x8(%rax) movq %r15, 0x28(%rsp) xorps %xmm0, %xmm0 movaps %xmm0, 0xb0(%rsp) movaps %xmm0, 0xc0(%rsp) pushq $0x20 popq %rdi callq 0x40a0 movq 0x18(%rsp), %rcx movq %rcx, (%rax) testq %rcx, %rcx je 0x8c53 lock incl (%rcx) movq 0x20(%rsp), %rcx movq %rcx, 0x8(%rax) testq %rcx, %rcx je 0x8c64 lock incl (%rcx) movq %r12, 0x10(%rax) movq 0x30(%rsp), %rcx movq %rcx, 0x18(%rax) testq %rcx, %rcx je 0x8c7a lock incl 0x8(%rcx) movq %r15, 0x10(%rax) leaq 0xb0(%rsp), %r14 movq %rax, (%r14) leaq 0x626e(%rip), %rax # 0xeefe movq %rax, 0x18(%r14) leaq 0x635b(%rip), %rax # 0xeff6 movq %rax, 0x10(%r14) leaq 0x18(%rsp), %rdi callq 0xeede movq %rbx, %rdi movq %r14, %rsi callq 0x125d8 leaq 0xb0(%rsp), %rdi callq 0x11f1c movq 0x40(%rsp), %rbx leaq 0x18(%rsp), %rdi movq %rsp, %rdx leaq 0x90(%rsp), %rcx xorl %esi, %esi callq 0x14832 leaq 0x18(%rsp), %rsi movq %rbx, %rdi callq 0x12662 leaq 0x18(%rsp), %rdi callq 0x11f1c leaq 0x90(%rsp), %rdi callq 0x11052 leaq 0x88(%rsp), %rdi callq 0x11052 movq %rsp, %rdi callq 0x11052 leaq 0x10(%rsp), %rdi callq 0x11052 leaq 0x8(%rsp), %rdi callq 0x11052 movq %r15, 0x78(%rsp) movq 0x40(%rsp), %rdi callq 0x1252c testb %al, %al jne 0x8d47 movq 0x40(%rsp), %rdi callq 0x12126 leaq 0x50(%rsp), %rdi callq 0x109dc leaq 0x38(%rsp), %rdi callq 0x10c02 leaq 0x98(%rsp), %rdi callq 0x109dc leaq 0xf0(%rsp), %rdi callq 0x109dc leaq 0xd8(%rsp), %rdi callq 0x11960 xorps %xmm0, %xmm0 leaq 0x60(%rsp), %rdx movaps %xmm0, (%rdx) andq $0x0, 0x10(%rdx) leaq 0xd8(%rsp), %rdi leaq 0x78(%rsp), %rsi callq 0xc1ac leaq 0x122f8(%rip), %rsi # 0x1b0a3 leaq 0x98(%rsp), %rdi callq 0x10a2a leaq 0x1228e(%rip), %rdx # 0x1b04d leaq 0x122e1(%rip), %rcx # 0x1b0a7 leaq 0x12147(%rip), %r8 # 0x1af14 leaq 0xd8(%rsp), %rdi leaq 0x98(%rsp), %rsi movl $0x8f, %r9d callq 0x109fd movl %eax, %ebx leaq 0x98(%rsp), %rdi callq 0x11960 leaq 0xd8(%rsp), %rdi callq 0x11960 leaq 0x60(%rsp), %rdi callq 0x11960 testb %bl, %bl je 0x8e7c movq 0x80(%rsp), %rdi callq 0x1682e leaq 0xd8(%rsp), %rdi movb %al, (%rdi) leaq 0x60(%rsp), %rsi movb $0x1, (%rsi) leaq 0x1223f(%rip), %rdx # 0x1b077 leaq 0x121e5(%rip), %rcx # 0x1b024 leaq 0x120ce(%rip), %r8 # 0x1af14 movl $0x90, %r9d callq 0x107e5 testb %al, %al je 0x8e7c movl 0x4c(%rsp), %edi leaq 0x121c9(%rip), %rdx # 0x1b029 leaq 0x121c8(%rip), %rcx # 0x1b02f leaq 0x120a6(%rip), %r8 # 0x1af14 pushq $0x8 popq %rsi movl $0x91, %r9d callq 0x4070 leaq 0x78(%rsp), %rdi callq 0x109dc addq $0x148, %rsp # imm = 0x148 popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq jmp 0x8e9c jmp 0x8e9c movq %rax, %rbx jmp 0x8ee1 movq %rax, %rbx leaq 0x98(%rsp), %rdi callq 0x11960 jmp 0x8ec0 movq %rax, %rbx leaq 0x18(%rsp), %rdi jmp 0x8efb movq %rax, %rbx leaq 0xd8(%rsp), %rdi callq 0x11960 jmp 0x8ed7 movq %rax, %rbx jmp 0x8f1c movq %rax, %rbx leaq 0x60(%rsp), %rdi callq 0x11960 leaq 0x78(%rsp), %rdi callq 0x109dc jmp 0x9139 movq %rax, %rbx leaq 0xb0(%rsp), %rdi callq 0x11f1c jmp 0x8f1c movq %rax, %rbx leaq 0xb0(%rsp), %rdi callq 0x11f1c leaq 0x18(%rsp), %rdi callq 0xeede leaq 0x90(%rsp), %rdi callq 0x11052 leaq 0x88(%rsp), %rdi callq 0x11052 movq %rsp, %rdi callq 0x11052 leaq 0x10(%rsp), %rdi callq 0x11052 movq %rbx, %rdi callq 0x4030 movq %rsp, %rbx movq %rbx, %rdi callq 0x4150 leaq 0x8(%rsp), %rdi movq %rbx, %rsi callq 0x10cc8 movq %rsp, %rdi callq 0x10d04 callq 0x4260 jmp 0x8d20 movq %rax, %rbx jmp 0x8f8f movq %rax, %rbx movq %rsp, %rdi callq 0x10d04 callq 0x4260 leaq 0x8(%rsp), %rdi callq 0x11052 jmp 0x8fad jmp 0x90ae movq %rax, %rbx leaq 0x60(%rsp), %rdi callq 0x109dc leaq 0x80(%rsp), %rdi callq 0x10d1a jmp 0x90f9 movq %rax, %rbx leaq 0x100(%rsp), %rdi jmp 0x900e movq %rax, %rbx pushq $0x58 popq %rsi movq %r14, %rdi callq 0x4080 jmp 0x90f9 movq %rax, %rbx leaq 0x100(%rsp), %rdi callq 0x11f1c leaq 0x18(%rsp), %rdi callq 0xedfe jmp 0x902f movq %rax, %rbx jmp 0x90f9 movq %rax, %rbx leaq 0x120(%rsp), %rdi callq 0x11f1c jmp 0x902f movq %rax, %rbx leaq 0x120(%rsp), %rdi callq 0x11f1c leaq 0x18(%rsp), %rdi callq 0xecd4 movq %rsp, %rdi callq 0x12092 leaq 0x10(%rsp), %rdi callq 0x12092 leaq 0x50(%rsp), %rdi callq 0x12092 leaq 0x8(%rsp), %rdi callq 0x12092 movq %rbx, %rdi callq 0x4030 leaq 0x18(%rsp), %rbx movq %rbx, %rdi callq 0x4150 leaq 0x60(%rsp), %rdi movq %rbx, %rsi callq 0x11c48 leaq 0x18(%rsp), %rdi callq 0x10d04 callq 0x4260 jmp 0x8ac3 movq %rax, %rbx jmp 0x90a2 movq %rax, %rbx leaq 0x18(%rsp), %rdi callq 0x10d04 callq 0x4260 leaq 0x60(%rsp), %rdi callq 0x12092 jmp 0x90c6 movq %rax, %rdi callq 0x10d0f movq %rax, %rbx leaq 0xb0(%rsp), %rdi callq 0x10c02 leaq 0x40(%rsp), %rdi callq 0x10be4 jmp 0x9112 movq %rax, %rbx pushq $0x68 popq %rsi movq %r14, %rdi callq 0x4080 jmp 0x9112 movq %rax, %rbx jmp 0x9112 movq %rax, %rbx jmp 0x912c movq %rax, %rbx leaq 0x78(%rsp), %rdi callq 0x109dc leaq 0x50(%rsp), %rdi callq 0x109dc jmp 0x9108 movq %rax, %rbx leaq 0x38(%rsp), %rdi callq 0x10c02 leaq 0x98(%rsp), %rdi callq 0x109dc leaq 0xf0(%rsp), %rdi callq 0x109dc leaq 0xd8(%rsp), %rdi callq 0x11960 movq %rbx, %rdi callq 0x4210 nop
/simonbrunel[P]qtpromise/tests/auto/qtpromise/qpromise/tst_finally.cpp
int waitForValue<int>(QtPromise::QPromise<int> const&, int const&)
static inline T waitForValue(const QtPromise::QPromise<T>& promise, const T& initial) { T value(initial); promise .then([&](const T& res) { value = res; }) .wait(); return value; }
pushq %r15 pushq %r14 pushq %r12 pushq %rbx subq $0xa8, %rsp movq %rdi, %rbx movl (%rsi), %eax movl %eax, 0x14(%rsp) leaq 0x1afaa(%rip), %r15 # 0x26ac0 addq $0x10, %r15 movq %r15, 0x30(%rsp) pushq $0x58 popq %rdi callq 0x40a0 movq %rax, %r14 xorps %xmm0, %xmm0 movaps %xmm0, (%rax) movaps %xmm0, 0x10(%rax) movaps %xmm0, 0x20(%rax) movaps %xmm0, 0x30(%rax) movaps %xmm0, 0x40(%rax) andq $0x0, 0x50(%rax) movq %rax, %rdi callq 0x10c46 movq %r14, 0x38(%rsp) lock incl 0x8(%r14) movq %r15, 0x60(%rsp) movq 0x38(%rsp), %rax movq %rax, 0x68(%rsp) testq %rax, %rax je 0xbb6f lock incl 0x8(%rax) leaq 0x1af02(%rip), %r12 # 0x26a78 addq $0x10, %r12 leaq 0x60(%rsp), %rsi movq %r12, (%rsi) leaq 0x8(%rsp), %rdi callq 0x10c60 leaq 0x60(%rsp), %rdi callq 0x109dc movq 0x8(%rsp), %rax movq %rax, 0x28(%rsp) testq %rax, %rax je 0xbbb4 lock incl (%rax) movq 0x8(%rsp), %rcx movq 0x28(%rsp), %rax jmp 0xbbb8 xorl %eax, %eax xorl %ecx, %ecx andq $0x0, 0x28(%rsp) movq %rax, (%rsp) movq %rcx, 0x18(%rsp) testq %rcx, %rcx je 0xbbda lock incl (%rcx) movq 0x18(%rsp), %rcx movq (%rsp), %rax jmp 0xbbdc xorl %ecx, %ecx andq $0x0, 0x18(%rsp) movq %rcx, 0x20(%rsp) movq 0x8(%rbx), %r14 movq %rax, 0x40(%rsp) testq %rax, %rax je 0xbbfd lock incl (%rax) movq 0x20(%rsp), %rcx movq %rcx, 0x48(%rsp) testq %rcx, %rcx je 0xbc0a lock incl (%rcx) leaq 0x14(%rsp), %rax movq %rax, 0x50(%rsp) xorps %xmm0, %xmm0 movaps %xmm0, 0x70(%rsp) movaps %xmm0, 0x80(%rsp) pushq $0x18 popq %rdi callq 0x40a0 movq 0x40(%rsp), %rcx movq %rcx, (%rax) testq %rcx, %rcx je 0xbc3c lock incl (%rcx) movq 0x48(%rsp), %rcx movq %rcx, 0x8(%rax) testq %rcx, %rcx je 0xbc4d lock incl (%rcx) leaq 0x40(%rsp), %rdi movq 0x10(%rdi), %rcx movq %rcx, 0x10(%rax) leaq 0x70(%rsp), %r15 movq %rax, (%r15) leaq 0xddd(%rip), %rax # 0xca46 movq %rax, 0x18(%r15) leaq 0xe42(%rip), %rax # 0xcab6 movq %rax, 0x10(%r15) callq 0xca30 movq %r14, %rdi movq %r15, %rsi callq 0x125d8 leaq 0x70(%rsp), %rdi callq 0x11f1c movq 0x8(%rbx), %r14 leaq 0x40(%rsp), %rdi movq %rsp, %rdx leaq 0x20(%rsp), %rcx xorl %esi, %esi callq 0x14832 leaq 0x40(%rsp), %rsi movq %r14, %rdi callq 0x12662 leaq 0x40(%rsp), %rdi callq 0x11f1c leaq 0x20(%rsp), %rdi callq 0x11052 leaq 0x18(%rsp), %rdi callq 0x11052 movq %rsp, %rdi callq 0x11052 leaq 0x28(%rsp), %rdi callq 0x11052 leaq 0x8(%rsp), %rdi callq 0x11052 movq %r12, 0x30(%rsp) movq 0x8(%rbx), %rdi callq 0x1252c testb %al, %al jne 0xbd0c movq 0x8(%rbx), %rdi callq 0x12126 leaq 0x98(%rsp), %rdi leaq 0x30(%rsp), %rsi callq 0x10b54 leaq 0x98(%rsp), %rdi callq 0x109dc leaq 0x30(%rsp), %rdi callq 0x109dc movl 0x14(%rsp), %eax addq $0xa8, %rsp popq %rbx popq %r12 popq %r14 popq %r15 retq movq %rax, %r14 leaq 0x40(%rsp), %rdi jmp 0xbd64 movq %rax, %r14 jmp 0xbd82 jmp 0xbe2c movq %rax, %r14 leaq 0x70(%rsp), %rdi callq 0x11f1c jmp 0xbd82 movq %rax, %r14 leaq 0x70(%rsp), %rdi callq 0x11f1c leaq 0x40(%rsp), %rdi callq 0xca30 leaq 0x20(%rsp), %rdi callq 0x11052 leaq 0x18(%rsp), %rdi callq 0x11052 movq %rsp, %rdi callq 0x11052 leaq 0x28(%rsp), %rdi callq 0x11052 movq %r14, %rdi callq 0x4030 movq %rsp, %r14 movq %r14, %rdi callq 0x4150 leaq 0x8(%rsp), %rdi movq %r14, %rsi callq 0x10cc8 movq %rsp, %rdi callq 0x10d04 callq 0x4260 jmp 0xbce7 movq %rax, %rbx jmp 0xbdef movq %rax, %rbx movq %rsp, %rdi callq 0x10d04 callq 0x4260 leaq 0x8(%rsp), %rdi callq 0x11052 jmp 0xbe10 movq %rax, %rdi callq 0x10d0f movq %rax, %rbx leaq 0x60(%rsp), %rdi callq 0x109dc leaq 0x38(%rsp), %rdi callq 0x10d1a jmp 0xbe39 movq %rax, %rbx pushq $0x58 popq %rsi movq %r14, %rdi callq 0x4080 jmp 0xbe39 movq %rax, %rbx leaq 0x30(%rsp), %rdi callq 0x109dc movq %rbx, %rdi callq 0x4210
/simonbrunel[P]qtpromise/tests/auto/qtpromise/qpromise/../shared/utils.h
void QtPromisePrivate::PromiseDispatch<QtPromise::QPromise<int>>::call<QtPromise::QPromiseResolve<int>, QtPromise::QPromiseReject<int>, tst_qpromise_finally::rejectedAsyncResolve()::$_1>(QtPromise::QPromiseResolve<int> const&, QtPromise::QPromiseReject<int> const&, tst_qpromise_finally::rejectedAsyncResolve()::$_1)
static void call(const Resolve& resolve, const Reject& reject, Functor fn, Args&&... args) { try { PromiseFulfill<Unqualified<Result>>::call(fn(std::forward<Args>(args)...), resolve, reject); } catch (...) { reject(std::current_exception()); } }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x68, %rsp movq %rdx, %r15 movq %rsi, 0x48(%rsp) movq %rdi, %r14 leaq 0x17102(%rip), %rbx # 0x26a48 addq $0x10, %rbx movq %rbx, 0x28(%rsp) pushq $0x68 popq %rdi callq 0x40a0 movq %rax, %r12 xorps %xmm0, %xmm0 movaps %xmm0, 0x50(%rax) movaps %xmm0, 0x40(%rax) movaps %xmm0, 0x30(%rax) movaps %xmm0, 0x20(%rax) movaps %xmm0, 0x10(%rax) movaps %xmm0, (%rax) andq $0x0, 0x60(%rax) movq %rax, %rdi callq 0x11bc0 movq %r12, 0x30(%rsp) lock incl 0x8(%r12) movq %rbx, 0x58(%rsp) movq 0x30(%rsp), %rax movq %rax, 0x60(%rsp) testq %rax, %rax je 0xf9a4 lock incl 0x8(%rax) leaq 0x171d5(%rip), %rbx # 0x26b80 addq $0x10, %rbx leaq 0x58(%rsp), %rsi movq %rbx, (%rsi) leaq 0x20(%rsp), %rdi callq 0x11be0 leaq 0x58(%rsp), %rdi callq 0x10c02 movq 0x20(%rsp), %rax movq %rax, 0x18(%rsp) testq %rax, %rax je 0xf9e4 lock incl (%rax) movq 0x18(%rsp), %rax jmp 0xf9e6 xorl %eax, %eax andq $0x0, 0x18(%rsp) movq %rax, 0x50(%rsp) movq %r15, 0x8(%rsp) movq %rax, 0x10(%rsp) testq %rax, %rax je 0xfa03 lock incl (%rax) leaq 0x10(%rsp), %r12 callq 0x4230 leaq 0x38(%rsp), %rdi movq %rax, %rsi callq 0x131e4 movq 0x38(%rsp), %rax testq %rax, %rax je 0xfac6 movl 0x4(%rax), %ecx testl %ecx, %ecx sete %cl movq 0x40(%rsp), %rdi testq %rdi, %rdi sete %dl orb %cl, %dl jne 0xfac6 movl 0x4(%rax), %eax callq 0x4270 testb %al, %al jne 0xfac6 movq 0x38(%rsp), %rax testq %rax, %rax je 0xfa67 movl 0x4(%rax), %eax testl %eax, %eax je 0xfa67 movq 0x40(%rsp), %rdi jmp 0xfa69 xorl %edi, %edi callq 0x4250 movq %rax, %r13 testq %rax, %rax jne 0xfa7f callq 0x43a0 testb %al, %al jne 0xfac6 pushq $0x20 popq %rdi callq 0x40a0 movq %rax, %rbp movq %rax, %rdi xorl %esi, %esi callq 0x4200 leaq 0x16e55(%rip), %rax # 0x268f0 movq %rax, (%rbp) movq 0x8(%rsp), %rax movq %rax, 0x10(%rbp) movq 0x10(%rsp), %rax movq %rax, 0x18(%rbp) testq %rax, %rax je 0xfab9 lock incl (%rax) movq %r13, %rdi movq %rbp, %rsi xorl %edx, %edx callq 0x40e0 leaq 0x38(%rsp), %rdi callq 0x10f5c movq %r12, %rdi callq 0x12092 leaq 0x50(%rsp), %rdi callq 0x12092 leaq 0x18(%rsp), %rdi callq 0x12092 leaq 0x20(%rsp), %rdi callq 0x12092 movq %rbx, 0x28(%rsp) pushq $0x8 popq %rsi movq %r15, %rdi callq 0x16850 leaq 0x28(%rsp), %rdi movq %r14, %rsi movq 0x48(%rsp), %rdx callq 0x139b4 leaq 0x28(%rsp), %rdi callq 0x10c02 addq $0x68, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq movq %rax, %r13 pushq $0x20 popq %rsi movq %rbp, %rdi callq 0x4080 jmp 0xfb44 movq %rax, %r13 leaq 0x38(%rsp), %rdi callq 0x10f5c jmp 0xfbeb jmp 0xfb55 movq %rax, %r14 leaq 0x28(%rsp), %rdi callq 0x10c02 jmp 0xfb90 movq %rax, %r14 leaq 0x58(%rsp), %rdi callq 0x10c02 leaq 0x30(%rsp), %rdi callq 0x10be4 jmp 0xfb90 movq %rax, %r14 pushq $0x68 popq %rsi movq %r12, %rdi callq 0x4080 jmp 0xfb90 movq %rax, %r14 movq %r14, %rdi callq 0x4030 leaq 0x8(%rsp), %r14 movq %r14, %rdi callq 0x4150 movq 0x48(%rsp), %rdi movq %r14, %rsi callq 0x11c48 leaq 0x8(%rsp), %rdi callq 0x10d04 callq 0x4260 jmp 0xfb22 movq %rax, %rbx leaq 0x8(%rsp), %rdi callq 0x10d04 callq 0x4260 movq %rbx, %rdi callq 0x4210 movq %rax, %rdi callq 0x10d0f movq %rax, %r13 movq %r12, %rdi callq 0x12092 leaq 0x50(%rsp), %rdi callq 0x12092 leaq 0x18(%rsp), %rdi callq 0x12092 movq %r13, %rdi callq 0x4030 leaq 0x8(%rsp), %r12 movq %r12, %rdi callq 0x4150 leaq 0x20(%rsp), %rdi movq %r12, %rsi callq 0x11c48 leaq 0x8(%rsp), %rdi callq 0x10d04 callq 0x4260 jmp 0xfaec movq %rax, %r14 jmp 0xfc54 movq %rax, %r14 leaq 0x8(%rsp), %rdi callq 0x10d04 callq 0x4260 leaq 0x20(%rsp), %rdi callq 0x12092 jmp 0xfb71 jmp 0xfbe0
/simonbrunel[P]qtpromise/include/../src/qtpromise/qpromise_p.h
void QtPromisePrivate::PromiseFulfill<QtPromise::QPromise<int>>::call<QtPromise::QPromiseResolve<int>, QtPromise::QPromiseReject<int>>(QtPromise::QPromise<int> const&, QtPromise::QPromiseResolve<int> const&, QtPromise::QPromiseReject<int> const&)
static void call(const QtPromise::QPromise<T>& promise, const TResolve& resolve, const TReject& reject) { if (promise.isFulfilled()) { resolve(promise.m_d->value()); } else if (promise.isRejected()) { reject(promise.m_d->error()); } else { promise.then( [=]() { resolve(promise.m_d->value()); }, [=]() { // catch all reject(promise.m_d->error()); }); } }
pushq %r15 pushq %r14 pushq %rbx subq $0x40, %rsp movq %rdx, %r14 movq %rsi, %r15 movq %rdi, %rbx callq 0x1084a testb %al, %al je 0x139e8 movq 0x8(%rbx), %rsi addq $0x58, %rsi movq %r15, %rdi addq $0x40, %rsp popq %rbx popq %r14 popq %r15 jmp 0x13b52 movq %rbx, %rdi callq 0x10a82 testb %al, %al je 0x13a0d movq 0x8(%rbx), %rsi addq $0x50, %rsi movq %r14, %rdi addq $0x40, %rsp popq %rbx popq %r14 popq %r15 jmp 0x13bcc movq (%r15), %rax movq %rax, (%rsp) testq %rax, %rax je 0x13a1c lock incl (%rax) leaq 0x13025(%rip), %rax # 0x26a48 addq $0x10, %rax movq %rax, 0x8(%rsp) movq 0x8(%rbx), %rcx movq %rcx, 0x10(%rsp) testq %rcx, %rcx je 0x13a3e lock incl 0x8(%rcx) leaq 0x1313b(%rip), %rdx # 0x26b80 addq $0x10, %rdx movq %rdx, 0x8(%rsp) movq (%r14), %rcx movq %rcx, 0x18(%rsp) testq %rcx, %rcx je 0x13a5e lock incl (%rcx) movq %rax, 0x20(%rsp) movq 0x8(%rbx), %rax movq %rax, 0x28(%rsp) testq %rax, %rax je 0x13a75 lock incl 0x8(%rax) leaq 0x18(%rsp), %rcx movq %rdx, 0x8(%rcx) leaq 0x30(%rsp), %rdi movq %rsp, %rdx movq %rbx, %rsi callq 0x13ad2 leaq 0x30(%rsp), %rdi callq 0x109dc leaq 0x18(%rsp), %rdi callq 0x13b26 movq %rsp, %rdi callq 0x13b3c addq $0x40, %rsp popq %rbx popq %r14 popq %r15 retq movq %rax, %rbx leaq 0x18(%rsp), %rdi callq 0x13b26 movq %rsp, %rdi callq 0x13b3c movq %rbx, %rdi callq 0x4210 nop
/simonbrunel[P]qtpromise/include/../src/qtpromise/qpromise_p.h
std::function<void (int const&)> QtPromisePrivate::PromiseHandler<int, void QtPromisePrivate::PromiseFulfill<QtPromise::QPromise<int>>::call<QtPromise::QPromiseResolve<int>, QtPromise::QPromiseReject<int>>(QtPromise::QPromise<int> const&, QtPromise::QPromiseResolve<int> const&, QtPromise::QPromiseReject<int> const&)::'lambda'(), void>::create<QtPromise::QPromiseResolve<void>, QtPromise::QPromiseReject<void>>(void QtPromisePrivate::PromiseFulfill<QtPromise::QPromise<int>>::call<QtPromise::QPromiseResolve<int>, QtPromise::QPromiseReject<int>>(QtPromise::QPromise<int> const&, QtPromise::QPromiseResolve<int> const&, QtPromise::QPromiseReject<int> const&)::'lambda'() const&, QtPromise::QPromiseResolve<int> const&, QtPromise::QPromiseReject<int> const&)
static std::function<void(const T&)> create(const THandler& handler, const TResolve& resolve, const TReject& reject) { return [=](const T&) { PromiseDispatch<ResType>::call(resolve, reject, handler); }; }
pushq %rbx subq $0x30, %rsp movq %rdi, %rbx movq (%rdx), %rax movq %rax, 0x8(%rsp) testq %rax, %rax je 0x13f0c lock incl (%rax) movq (%rcx), %rax movq %rax, 0x10(%rsp) testq %rax, %rax je 0x13f1c lock incl (%rax) movq (%rsi), %rax movq %rax, 0x18(%rsp) testq %rax, %rax je 0x13f2c lock incl (%rax) leaq 0x12b15(%rip), %rax # 0x26a48 addq $0x10, %rax movq %rax, 0x20(%rsp) movq 0x10(%rsi), %rax movq %rax, 0x28(%rsp) testq %rax, %rax je 0x13f4e lock incl 0x8(%rax) leaq 0x12c2b(%rip), %rax # 0x26b80 addq $0x10, %rax leaq 0x8(%rsp), %rsi movq %rax, 0x18(%rsi) movq %rbx, %rdi callq 0x1406e leaq 0x8(%rsp), %rdi callq 0x140b6 movq %rbx, %rax addq $0x30, %rsp popq %rbx retq movq %rax, %rbx leaq 0x8(%rsp), %rdi callq 0x140b6 movq %rbx, %rdi callq 0x4210
/simonbrunel[P]qtpromise/include/../src/qtpromise/qpromise_p.h
nlohmann::json_abi_v3_11_3::detail::lexer<nlohmann::json_abi_v3_11_3::basic_json<std::map, std::vector, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, bool, long, unsigned long, double, std::allocator, nlohmann::json_abi_v3_11_3::adl_serializer, std::vector<unsigned char, std::allocator<unsigned char>>, void>, nlohmann::json_abi_v3_11_3::detail::input_stream_adapter>::get()
char_int_type get() { ++position.chars_read_total; ++position.chars_read_current_line; if (next_unget) { // just reset the next_unget variable and work with current next_unget = false; } else { current = ia.get_character(); } if (JSON_HEDLEY_LIKELY(current != char_traits<char_type>::eof())) { token_string.push_back(char_traits<char_type>::to_char_type(current)); } if (current == '\n') { ++position.lines_read; position.chars_read_current_line = 0; } return current; }
pushq %rbx subq $0x10, %rsp movq %rdi, %rbx movdqu 0x20(%rdi), %xmm0 pcmpeqd %xmm1, %xmm1 psubq %xmm1, %xmm0 movdqu %xmm0, 0x20(%rdi) cmpb $0x1, 0x18(%rdi) jne 0x13520 movb $0x0, 0x18(%rbx) movl 0x14(%rbx), %eax cmpl $-0x1, %eax je 0x1352d leaq 0x38(%rbx), %rdi leaq 0xf(%rsp), %rsi movb %al, (%rsi) callq 0xc6d0 movl 0x14(%rbx), %eax cmpl $0xa, %eax jne 0x1351a incq 0x30(%rbx) andq $0x0, 0x28(%rbx) pushq $0xa popq %rax addq $0x10, %rsp popq %rbx retq movq %rbx, %rdi callq 0x13532 movl %eax, 0x14(%rbx) jmp 0x134f1 pushq $-0x1 jmp 0x13519 nop
/libKriging[P]libKriging/src/lib/include/libKriging/utils/nlohmann/json.hpp
arma::Mat<double>::Mat<arma::eOp<arma::Col<double>, arma::eop_neg>, arma::eOp<arma::Col<double>, arma::eop_square>, arma::eglue_div>(arma::eGlue<arma::eOp<arma::Col<double>, arma::eop_neg>, arma::eOp<arma::Col<double>, arma::eop_square>, arma::eglue_div> const&)
inline Mat<eT>::Mat(const eGlue<T1, T2, eglue_type>& X) : n_rows(X.get_n_rows()) , n_cols(X.get_n_cols()) , n_elem(X.get_n_elem()) , n_alloc() , vec_state(0) , mem_state(0) , mem() { arma_debug_sigprint_this(this); arma_type_check(( is_same_type< eT, typename T1::elem_type >::no )); arma_type_check(( is_same_type< eT, typename T2::elem_type >::no )); init_cold(); eglue_type::apply(*this, X); }
pushq %r14 pushq %rbx pushq %rax movq %rsi, %rbx movq %rdi, %r14 movq (%rsi), %rax movq (%rax), %rax movl (%rax), %ecx movl %ecx, (%rdi) movl $0x1, 0x4(%rdi) movl 0x8(%rax), %edi xorl %ecx, %ecx movl %edi, 0x8(%r14) movq %rcx, 0x20(%r14) movq %rcx, 0xc(%r14) cmpq $0x10, %rdi ja 0x2a2eb leaq 0x30(%r14), %rax testq %rdi, %rdi cmoveq %rdi, %rax movq %rax, 0x20(%r14) jmp 0x2a305 shlq $0x3, %rdi callq 0xc8c0 testq %rax, %rax je 0x2a3f0 movq %rax, 0x20(%r14) movl 0x8(%r14), %ecx movl %ecx, 0xc(%r14) movq (%rbx), %rcx movq (%rcx), %rdx movl 0x8(%rdx), %ecx testb $0xf, %al je 0x2a35d testq %rcx, %rcx je 0x2a3b4 movq 0x10(%rbx), %rsi movq 0x20(%rdx), %rdx movq (%rsi), %rsi movq 0x20(%rsi), %rsi xorl %edi, %edi movapd 0x7bf68(%rip), %xmm0 # 0xa62a0 movsd (%rdx,%rdi,8), %xmm1 xorpd %xmm0, %xmm1 movsd (%rsi,%rdi,8), %xmm2 mulsd %xmm2, %xmm2 divsd %xmm2, %xmm1 movsd %xmm1, (%rax,%rdi,8) incq %rdi cmpq %rdi, %rcx jne 0x2a338 jmp 0x2a3b4 movq 0x20(%rdx), %rdx testb $0xf, %dl jne 0x2a377 movq 0x10(%rbx), %rsi movq (%rsi), %rsi movq 0x20(%rsi), %rsi testb $0xf, %sil je 0x2a3bc testq %rcx, %rcx je 0x2a3b4 movq 0x10(%rbx), %rsi movq (%rsi), %rsi movq 0x20(%rsi), %rsi xorl %edi, %edi movapd 0x7bf0f(%rip), %xmm0 # 0xa62a0 movsd (%rdx,%rdi,8), %xmm1 xorpd %xmm0, %xmm1 movsd (%rsi,%rdi,8), %xmm2 mulsd %xmm2, %xmm2 divsd %xmm2, %xmm1 movsd %xmm1, (%rax,%rdi,8) incq %rdi cmpq %rdi, %rcx jne 0x2a391 addq $0x8, %rsp popq %rbx popq %r14 retq testq %rcx, %rcx je 0x2a3b4 xorl %edi, %edi movapd 0x7bed5(%rip), %xmm0 # 0xa62a0 movsd (%rdx,%rdi,8), %xmm1 xorpd %xmm0, %xmm1 movsd (%rsi,%rdi,8), %xmm2 mulsd %xmm2, %xmm2 divsd %xmm2, %xmm1 movsd %xmm1, (%rax,%rdi,8) incq %rdi cmpq %rdi, %rcx jne 0x2a3cb jmp 0x2a3b4 callq 0x11c73 nop
/libKriging[P]libKriging/build_O3/dependencies/armadillo-code/tmp/include/armadillo_bits/Mat_meat.hpp
Kriging::Kriging(arma::Col<double> const&, arma::Mat<double> const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, Trend::RegressionModel const&, bool, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, KrigingParameters const&)
LIBKRIGING_EXPORT Kriging::Kriging(const arma::vec& y, const arma::mat& X, const std::string& covType, const Trend::RegressionModel& regmodel, bool normalize, const std::string& optim, const std::string& objective, const Parameters& parameters) { if (y.n_elem != X.n_rows) throw std::runtime_error("Dimension of new data should be the same:\n X: (" + std::to_string(X.n_rows) + "x" + std::to_string(X.n_cols) + "), y: (" + std::to_string(y.n_elem) + ")"); make_Cov(covType); fit(y, X, regmodel, normalize, optim, objective, parameters); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x208, %rsp # imm = 0x208 movq %rdx, %r12 movq %rsi, %r14 movq %rdi, %rbx leaq 0x10(%rdi), %rax movq %rax, 0x10(%rsp) movq %rax, (%rdi) xorl %eax, %eax movq %rax, 0x8(%rdi) movb %al, 0x10(%rdi) movq %rax, 0x40(%rdi) xorps %xmm0, %xmm0 movaps %xmm0, 0x20(%rdi) movl %eax, 0x30(%rdi) movss 0x79d8b(%rip), %xmm1 # 0xa6050 movaps %xmm1, 0xd0(%rdi) movl $0x2, %edx movl %edx, 0xe0(%rdi) movq %rax, 0xf0(%rdi) movaps %xmm1, 0x180(%rdi) movl %edx, 0x190(%rdi) movq %rax, 0x1a0(%rdi) movsd 0x79f66(%rip), %xmm1 # 0xa6260 movaps %xmm1, 0x230(%rdi) movl $0x1, %edx movl %edx, 0x240(%rdi) movq %rax, 0x250(%rdi) leaq 0x308(%rdi), %rsi movaps %xmm0, 0x2e0(%rdi) movb %al, 0x2f0(%rdi) movq %rsi, 0x8(%rsp) movq %rsi, 0x2f8(%rdi) movq %rax, 0x300(%rdi) movb %al, 0x308(%rdi) leaq 0x328(%rdi), %r13 movq %r13, 0x318(%rdi) movq %rax, 0x320(%rdi) movb %al, 0x328(%rdi) movq %rax, 0x360(%rdi) movl %eax, 0x350(%rdi) movaps %xmm0, 0x340(%rdi) movaps %xmm1, 0x3f0(%rdi) movl %edx, 0x400(%rdi) movq %rax, 0x410(%rdi) movq %rax, 0x4c0(%rdi) movaps %xmm0, 0x4a0(%rdi) movl %eax, 0x4b0(%rdi) movq %rax, 0x570(%rdi) movaps %xmm0, 0x550(%rdi) movl %eax, 0x560(%rdi) movq %rax, 0x620(%rdi) movaps %xmm0, 0x600(%rdi) movl %eax, 0x610(%rdi) movq %rax, 0x6d0(%rdi) movaps %xmm0, 0x6b0(%rdi) movl %eax, 0x6c0(%rdi) movq %rax, 0x780(%rdi) movl %eax, 0x770(%rdi) movaps %xmm0, 0x760(%rdi) movq %rax, 0x830(%rdi) movl %eax, 0x820(%rdi) movaps %xmm0, 0x810(%rdi) movaps %xmm1, 0x8c0(%rdi) movl %edx, 0x8d0(%rdi) movq %rax, 0x8e0(%rdi) movaps %xmm1, 0x970(%rdi) movl %edx, 0x980(%rdi) movq %rax, 0x990(%rdi) movb %al, 0xa20(%rdi) movaps %xmm1, 0xa30(%rdi) movl %edx, 0xa40(%rdi) movq %rax, 0xa50(%rdi) movb %al, 0xae0(%rdi) movq %rax, 0xae8(%rdi) movw $0x100, 0xaf0(%rdi) # imm = 0x100 movq %rax, 0xb20(%rdi) movl %eax, 0xb10(%rdi) movaps %xmm0, 0xb00(%rdi) movq %rax, 0xbd0(%rdi) movl %eax, 0xbc0(%rdi) movaps %xmm0, 0xbb0(%rdi) movq %rax, 0xc60(%rdi) movq %rax, 0xc90(%rdi) movl %eax, 0xc80(%rdi) movaps %xmm0, 0xc70(%rdi) movq %rax, 0xd40(%rdi) movl %eax, 0xd30(%rdi) movaps %xmm0, 0xd20(%rdi) movq %rax, 0xdf0(%rdi) movl %eax, 0xde0(%rdi) movaps %xmm0, 0xdd0(%rdi) movq %rax, 0xea0(%rdi) movl %eax, 0xe90(%rdi) movaps %xmm0, 0xe80(%rdi) movq %rax, 0xf50(%rdi) movl %eax, 0xf40(%rdi) movaps %xmm0, 0xf30(%rdi) movq %rax, 0x1000(%rdi) movl %eax, 0xff0(%rdi) movaps %xmm0, 0xfe0(%rdi) movq %rax, 0x10b0(%rdi) movl %eax, 0x10a0(%rdi) movaps %xmm0, 0x1090(%rdi) movq %rax, 0x1160(%rdi) movl %eax, 0x1150(%rdi) movaps %xmm0, 0x1140(%rdi) movq %rax, 0x1210(%rdi) movl %eax, 0x1200(%rdi) movaps %xmm0, 0x11f0(%rdi) movq %rax, 0x12c0(%rdi) movl %eax, 0x12b0(%rdi) movaps %xmm0, 0x12a0(%rdi) movq %rax, 0x1370(%rdi) movl %eax, 0x1360(%rdi) movaps %xmm0, 0x1350(%rdi) movq %rax, 0x1420(%rdi) movl %eax, 0x1410(%rdi) movaps %xmm0, 0x1400(%rdi) movq %rax, 0x14d0(%rdi) movl %eax, 0x14c0(%rdi) movaps %xmm0, 0x14b0(%rdi) movq %rax, 0x1580(%rdi) movl %eax, 0x1570(%rdi) movaps %xmm0, 0x1560(%rdi) movq %rax, 0x1630(%rdi) movl %eax, 0x1620(%rdi) movaps %xmm0, 0x1610(%rdi) movq %rax, 0x16e0(%rdi) movl %eax, 0x16d0(%rdi) movaps %xmm0, 0x16c0(%rdi) movq %rax, 0x1790(%rdi) movl %eax, 0x1780(%rdi) movaps %xmm0, 0x1770(%rdi) movq %rax, 0x1840(%rdi) movl %eax, 0x1830(%rdi) movaps %xmm0, 0x1820(%rdi) movq %rax, 0x1930(%rdi) movaps %xmm0, 0x1920(%rdi) movaps %xmm0, 0x1910(%rdi) movaps %xmm0, 0x1900(%rdi) movaps %xmm0, 0x18f0(%rdi) movaps %xmm0, 0x18e0(%rdi) movaps %xmm0, 0x18d0(%rdi) movl 0x8(%r14), %eax cmpl (%r12), %eax jne 0x2c677 movl %r9d, %ebp movq %r8, %r15 movq %rbx, %rdi movq %rcx, %rsi callq 0x2b2a4 movq 0x240(%rsp), %r9 movzbl %bpl, %r8d movq %rbx, %rdi movq %r14, %rsi movq %r12, %rdx movq %r15, %rcx pushq 0x250(%rsp) pushq 0x250(%rsp) callq 0xccf0 addq $0x10, %rsp addq $0x208, %rsp # imm = 0x208 popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq movl $0x10, %edi callq 0xc340 movq %rax, %r15 movl (%r12), %esi leaq 0x148(%rsp), %rdi callq 0xcbd0 leaq 0x7b4da(%rip), %rsi # 0xa7b76 leaq 0x1a8(%rsp), %rdi leaq 0x148(%rsp), %rdx callq 0xcd10 leaq 0x7b8ec(%rip), %rsi # 0xa7fa4 leaq 0x1a8(%rsp), %rdi callq 0xceb0 leaq 0x118(%rsp), %rbp movq %rbp, -0x10(%rbp) movq (%rax), %rdx movq %rax, %rcx addq $0x10, %rcx cmpq %rcx, %rdx jne 0x2c6e9 movups (%rcx), %xmm0 movups %xmm0, (%rbp) jmp 0x2c6fc movq %rdx, 0x108(%rsp) movq (%rcx), %rdx movq %rdx, 0x118(%rsp) movq 0x8(%rax), %rdx movq %rdx, 0x110(%rsp) movq %rcx, (%rax) movq $0x0, 0x8(%rax) movb $0x0, 0x10(%rax) movl 0x4(%r12), %esi leaq 0x188(%rsp), %rdi callq 0xcbd0 leaq 0x1c8(%rsp), %rdi leaq 0x108(%rsp), %rsi leaq 0x188(%rsp), %rdx callq 0xc700 leaq 0x7b459(%rip), %rsi # 0xa7ba6 leaq 0x1c8(%rsp), %rdi callq 0xceb0 leaq 0x138(%rsp), %r12 movq %r12, -0x10(%r12) movq (%rax), %rdx movq %rax, %rcx addq $0x10, %rcx cmpq %rcx, %rdx jne 0x2c780 movups (%rcx), %xmm0 movups %xmm0, (%r12) jmp 0x2c793 movq %rdx, 0x128(%rsp) movq (%rcx), %rdx movq %rdx, 0x138(%rsp) movq 0x8(%rax), %rdx movq %rdx, 0x130(%rsp) movq %rcx, (%rax) movq $0x0, 0x8(%rax) movb $0x0, 0x10(%rax) movl 0x8(%r14), %esi leaq 0x168(%rsp), %rdi callq 0xcbd0 leaq 0x1e8(%rsp), %rdi leaq 0x128(%rsp), %rsi leaq 0x168(%rsp), %rdx callq 0xc700 leaq 0x7a037(%rip), %rsi # 0xa681a leaq 0x1e8(%rsp), %rdi callq 0xceb0 leaq 0xf8(%rsp), %rcx movq %rcx, -0x10(%rcx) movq (%rax), %rdx movq %rax, %rcx addq $0x10, %rcx cmpq %rcx, %rdx jne 0x2c81b movups (%rcx), %xmm0 leaq 0xf8(%rsp), %rdx movups %xmm0, (%rdx) jmp 0x2c82e movq %rdx, 0xe8(%rsp) movq (%rcx), %rdx movq %rdx, 0xf8(%rsp) movq 0x8(%rax), %rdx leaq 0xe8(%rsp), %rsi movq %rdx, 0x8(%rsi) movq %rcx, (%rax) movq $0x0, 0x8(%rax) movb $0x0, 0x10(%rax) movb $0x1, %r14b movq %r15, %rdi callq 0xcc90 xorl %r14d, %r14d movq 0xa078e(%rip), %rsi # 0xccff0 movq 0xa06d7(%rip), %rdx # 0xccf40 movq %r15, %rdi callq 0xcd60 movq %rax, (%rsp) movq 0xe8(%rsp), %rdi leaq 0xf8(%rsp), %rax cmpq %rax, %rdi je 0x2c8a3 movq 0xf8(%rsp), %rsi incq %rsi callq 0xc830 jmp 0x2c8a3 movq %rax, (%rsp) movb $0x1, %r14b leaq 0x1f8(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x2c8cd movq 0x1f8(%rsp), %rsi incq %rsi callq 0xc830 jmp 0x2c8cd movq %rax, (%rsp) movb $0x1, %r14b leaq 0x178(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x2c8f7 movq 0x178(%rsp), %rsi incq %rsi callq 0xc830 jmp 0x2c8f7 movq %rax, (%rsp) movb $0x1, %r14b movq 0x128(%rsp), %rdi cmpq %r12, %rdi je 0x2c91d movq 0x138(%rsp), %rsi incq %rsi callq 0xc830 jmp 0x2c91d movq %rax, (%rsp) movb $0x1, %r14b leaq 0x1d8(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x2c947 movq 0x1d8(%rsp), %rsi incq %rsi callq 0xc830 jmp 0x2c947 movq %rax, (%rsp) movb $0x1, %r14b leaq 0x198(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x2c971 movq 0x198(%rsp), %rsi incq %rsi callq 0xc830 jmp 0x2c971 movq %rax, (%rsp) movb $0x1, %r14b movq 0x108(%rsp), %rdi cmpq %rbp, %rdi je 0x2c997 movq 0x118(%rsp), %rsi incq %rsi callq 0xc830 jmp 0x2c997 movq %rax, (%rsp) movb $0x1, %r14b leaq 0x1b8(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x2c9b8 movq 0x1b8(%rsp), %rsi incq %rsi callq 0xc830 leaq 0x158(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x2c9d9 movq 0x158(%rsp), %rsi incq %rsi callq 0xc830 testb %r14b, %r14b jne 0x2ca0b jmp 0x2ca19 movq %rax, (%rsp) leaq 0x158(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x2ca0b movq 0x158(%rsp), %rsi incq %rsi callq 0xc830 jmp 0x2ca0b movq %rax, (%rsp) movq %r15, %rdi callq 0xc5d0 jmp 0x2ca19 movq %rax, (%rsp) movq 0x1920(%rbx), %rax testq %rax, %rax je 0x2ca36 leaq 0x1910(%rbx), %rdi movq %rdi, %rsi movl $0x3, %edx callq *%rax movq 0x1900(%rbx), %rax testq %rax, %rax je 0x2ca53 leaq 0x18f0(%rbx), %rdi movq %rdi, %rsi movl $0x3, %edx callq *%rax movq 0x18e0(%rbx), %rax testq %rax, %rax je 0x2ca70 leaq 0x18d0(%rbx), %rdi movq %rdi, %rsi movl $0x3, %edx callq *%rax leaq 0x340(%rbx), %rax movq %rax, 0xe0(%rsp) leaq 0x3f0(%rbx), %rax movq %rax, 0xd8(%rsp) leaq 0x4a0(%rbx), %rax movq %rax, 0xd0(%rsp) leaq 0x550(%rbx), %rax movq %rax, 0xc8(%rsp) leaq 0x600(%rbx), %rax movq %rax, 0xc0(%rsp) leaq 0x6b0(%rbx), %rax movq %rax, 0xb8(%rsp) leaq 0x760(%rbx), %rax movq %rax, 0xb0(%rsp) leaq 0x810(%rbx), %rax movq %rax, 0xa8(%rsp) leaq 0x8c0(%rbx), %rax movq %rax, 0xa0(%rsp) leaq 0x970(%rbx), %rax movq %rax, 0x98(%rsp) leaq 0xa30(%rbx), %rax movq %rax, 0x90(%rsp) leaq 0xb00(%rbx), %rax movq %rax, 0x88(%rsp) leaq 0xbb0(%rbx), %rax movq %rax, 0x80(%rsp) leaq 0xc70(%rbx), %rax movq %rax, 0x78(%rsp) leaq 0xd20(%rbx), %rax movq %rax, 0x70(%rsp) leaq 0xdd0(%rbx), %rax movq %rax, 0x68(%rsp) leaq 0xe80(%rbx), %rax movq %rax, 0x60(%rsp) leaq 0xf30(%rbx), %rax movq %rax, 0x58(%rsp) leaq 0xfe0(%rbx), %rax movq %rax, 0x50(%rsp) leaq 0x1090(%rbx), %rax movq %rax, 0x48(%rsp) leaq 0x1140(%rbx), %rax movq %rax, 0x40(%rsp) leaq 0x11f0(%rbx), %rax movq %rax, 0x38(%rsp) leaq 0x12a0(%rbx), %rax movq %rax, 0x30(%rsp) leaq 0x1350(%rbx), %rax movq %rax, 0x28(%rsp) leaq 0x1400(%rbx), %rax movq %rax, 0x20(%rsp) leaq 0x14b0(%rbx), %rax movq %rax, 0x18(%rsp) leaq 0x1560(%rbx), %r12 leaq 0x1610(%rbx), %r15 leaq 0x16c0(%rbx), %rbp leaq 0x1770(%rbx), %r14 leaq 0x1820(%rbx), %rdi callq 0x1c318 movq %r14, %rdi callq 0x1c318 movq %rbp, %rdi callq 0x1c318 movq %r15, %rdi callq 0x1c318 movq %r12, %rdi callq 0x1c318 movq 0x18(%rsp), %rdi callq 0x1c318 movq 0x20(%rsp), %rdi callq 0x1c318 movq 0x28(%rsp), %rdi callq 0x1c318 movq 0x30(%rsp), %rdi callq 0x1c318 movq 0x38(%rsp), %rdi callq 0x1c318 movq 0x40(%rsp), %rdi callq 0x1c318 movq 0x48(%rsp), %rdi callq 0x1c318 movq 0x50(%rsp), %rdi callq 0x1c318 movq 0x58(%rsp), %rdi callq 0x1c318 movq 0x60(%rsp), %rdi callq 0x1c318 movq 0x68(%rsp), %rdi callq 0x1c318 movq 0x70(%rsp), %rdi callq 0x1c318 movq 0x78(%rsp), %rdi callq 0x1c318 movq 0x80(%rsp), %rdi callq 0x1c318 movq 0x88(%rsp), %rdi callq 0x1c318 movq 0x90(%rsp), %rdi callq 0x1c318 movq 0x98(%rsp), %rdi callq 0x1c318 movq 0xa0(%rsp), %rdi callq 0x1c318 movq 0xa8(%rsp), %rdi callq 0x1c318 movq 0xb0(%rsp), %rdi callq 0x1c318 movq 0xb8(%rsp), %rdi callq 0x1c318 movq 0xc0(%rsp), %rdi callq 0x1c318 movq 0xc8(%rsp), %rdi callq 0x1c318 movq 0xd0(%rsp), %rdi callq 0x1c318 movq 0xd8(%rsp), %rdi callq 0x1c318 movq 0xe0(%rsp), %rdi callq 0x1c318 movq 0x318(%rbx), %rdi cmpq %r13, %rdi je 0x2cd5a movq (%r13), %rsi incq %rsi callq 0xc830 leaq 0x20(%rbx), %r14 leaq 0xd0(%rbx), %r15 leaq 0x180(%rbx), %r12 leaq 0x230(%rbx), %rbp movq 0x2f8(%rbx), %rdi cmpq 0x8(%rsp), %rdi je 0x2cd91 movq 0x8(%rsp), %rax movq (%rax), %rsi incq %rsi callq 0xc830 movq %rbp, %rdi callq 0x1c318 movq %r12, %rdi callq 0x1c318 movq %r15, %rdi callq 0x1c318 movq %r14, %rdi callq 0x1c318 movq (%rbx), %rdi cmpq 0x10(%rsp), %rdi je 0x2cdcb movq 0x10(%rsp), %rax movq (%rax), %rsi incq %rsi callq 0xc830 movq (%rsp), %rdi callq 0xcdb0 jmp 0x2cdd8 jmp 0x2cdd8 movq %rax, %rdi callq 0x1c342
/libKriging[P]libKriging/src/lib/Kriging.cpp
Kriging::_logLikelihood(arma::Col<double> const&, arma::Col<double>*, arma::Mat<double>*, Kriging::KModel*, std::map<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, double, std::less<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>>, std::allocator<std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const, double>>>*) const
double Kriging::_logLikelihood(const arma::vec& _theta, arma::vec* grad_out, arma::mat* hess_out, Kriging::KModel* model, std::map<std::string, double>* bench) const { // arma::cout << " theta: " << _theta << arma::endl; Kriging::KModel m = make_Model(_theta, bench); if (model != nullptr) *model = m; arma::uword n = m_X.n_rows; double sigma2; double ll; if (m_est_sigma2) { // DiceKriging: model@case == "LLconcentration_beta_sigma2" sigma2 = m.SSEstar / n; ll = -0.5 * (n * log(2 * M_PI * sigma2) + 2 * arma::sum(log(m.L.diag())) + n); } else { // DiceKriging: model@case == "LLconcentration_beta" sigma2 = m_sigma2; ll = -0.5 * (n * log(2 * M_PI * sigma2) + 2 * arma::sum(log(m.L.diag())) + as_scalar(LinearAlgebra::crossprod(m.Estar)) / sigma2); } if (grad_out != nullptr) { arma::uword d = m_X.n_cols; arma::uword p = m_F.n_cols; auto t0 = Bench::tic(); arma::vec terme1 = arma::vec(d); // useful if (hess_out != nullptr) if ((m.Linv.memptr() == nullptr) || (arma::size(m.Linv) != arma::size(m.L))) { m.Linv = LinearAlgebra::solve(m.L, arma::mat(n, n, arma::fill::eye)); t0 = Bench::toc(bench, "L ^-1", t0); } arma::mat Rinv = LinearAlgebra::crossprod(m.Linv); t0 = Bench::toc(bench, "R^-1 = t(L^-1) * L^-1", t0); arma::mat x = LinearAlgebra::solve(m.L.t(), m.Estar); t0 = Bench::toc(bench, "x = tL \\ z", t0); arma::cube gradR = arma::cube(n, n, d, arma::fill::none); const arma::vec zeros = arma::vec(d, arma::fill::zeros); for (arma::uword i = 0; i < n; i++) { gradR.tube(i, i) = zeros; for (arma::uword j = 0; j < i; j++) { gradR.tube(i, j) = m.R.at(i, j) * _DlnCovDtheta(m_dX.col(i * n + j), _theta); gradR.tube(j, i) = gradR.tube(i, j); } } t0 = Bench::toc(bench, "gradR = R * dlnCov(dX)", t0); for (arma::uword k = 0; k < d; k++) { t0 = Bench::tic(); arma::mat gradR_k = gradR.slice(k); t0 = Bench::toc(bench, "gradR_k = gradR[k]", t0); // should make a fast function trace_prod(A,B) -> sum_i(sum_j(Ai,j*Bj,i)) terme1.at(k) = as_scalar(x.t() * gradR_k * x) / sigma2; double terme2 = -arma::trace(Rinv * gradR_k); //-arma::accu(Rinv % gradR_k_upper) (*grad_out).at(k) = (terme1.at(k) + terme2) / 2; t0 = Bench::toc(bench, "grad_ll[k] = xt * gradR_k / S2 + tr(Ri * gradR_k)", t0); if (hess_out != nullptr) { //' @ref O. Roustant // for (k in 1:d) { // for (l in 1:k) { // aux <- grad_R[[k]] %*% Rinv %*% grad_R[[l]] // Dkl <- d2_matcor(X, modele_proba$covariance, R, grad_logR, k,l) // xk <- backsolve(t(T),grad_R[[k]]%*%x, upper.tri=FALSE) // xl <- backsolve(t(T),grad_R[[l]]%*%x, upper.tri=FALSE) // // hess_A <- - (t(xk) %*% H %*% xl) / sigma2_hat // hess_B <- (t(x) %*% ( -Dkl+2*aux ) %*% x) / sigma2_hat // hess_C <- - grad_A[k] * grad_A[l] / n // hess_D <- - sum(diag( Rinv %*% aux )) // hess_E <- sum(diag( Rinv %*% Dkl )) // // hess_log_vrais[k,l] <- 2*hess_A + hess_B + hess_C + hess_D + hess_E // hess_log_vrais[l,k] <- hess_log_vrais[k,l] // } // } t0 = Bench::tic(); arma::mat H = LinearAlgebra::tcrossprod(m.Qstar); t0 = Bench::toc(bench, "H = Q* * t(Q*)", t0); for (arma::uword l = 0; l <= k; l++) { arma::mat gradR_l = gradR.slice(l); // arma::mat(n, n); t0 = Bench::tic(); arma::mat aux = gradR_k * Rinv * gradR_l; t0 = Bench::toc(bench, "aux = gradR[k] * Ri * gradR[l]", t0); arma::mat hessR_k_l = arma::mat(n, n, arma::fill::none); if (k == l) { for (arma::uword i = 0; i < n; i++) { hessR_k_l.at(i, i) = 0; for (arma::uword j = 0; j < i; j++) { double dln_k = gradR_k.at(i, j); hessR_k_l.at(i, j) = hessR_k_l.at(j, i) = dln_k * (dln_k / m.R.at(i, j) - (_Cov_pow + 1) / _theta.at(k)); // !! NO: it just work for exp type kernels. Matern MUST have a special treatment !!! } } } else { for (arma::uword i = 0; i < n; i++) { hessR_k_l.at(i, i) = 0; for (arma::uword j = 0; j < i; j++) { hessR_k_l.at(i, j) = hessR_k_l.at(j, i) = gradR_k.at(i, j) * gradR_l.at(i, j) / m.R.at(i, j); //= gradR.slice(i).col(j)[k] * gradR.slice(i).col(j)[l] / m.R.at(i, j); } } } t0 = Bench::toc(bench, "hessR_k_l = ...", t0); // arma::mat xk =LinearAlgebra::solve(m.T, gradsR[k] * x); arma::mat xk = m.Linv * gradR_k * x; t0 = Bench::toc(bench, "xk = L \\ gradR[k] * x", t0); arma::mat xl; if (k == l) xl = xk; else xl = m.Linv * gradR_l * x; t0 = Bench::toc(bench, "xl = L \\ gradR[l] * x", t0); // arma::cout << " hess_A:" << -xk.t() * H * xl / sigma2 << arma::endl; // arma::cout << " hess_B:" << -x.t() * (hessR_k_l - 2*aux) * x / sigma2 << arma::endl; // arma::cout << " hess_C:" << -terme1.at(k) * terme1.at(l) / n << arma::endl; // arma::cout << " hess_D:" << -arma::trace(Rinv * aux) << arma::endl; // arma::cout << " hess_E:" << arma::trace(Rinv * hessR_k_l) << arma::endl; double h_lk = (2.0 * xk.t() * H * xl / (sigma2) + x.t() * (hessR_k_l - 2 * aux) * x / (sigma2) + arma::trace(Rinv * aux) + -arma::trace(Rinv * hessR_k_l))[0]; // should optim there using accu &% if (m_est_sigma2) h_lk += terme1.at(k) * terme1.at(l) / n; (*hess_out).at(l, k) = (*hess_out).at(k, l) = h_lk / 2; t0 = Bench::toc(bench, "hess_ll[l,k] = ...", t0); } } } } return ll; }
subq $0x648, %rsp # imm = 0x648 movq %r9, %rcx movq %rsi, %rdx movq %rdi, %rsi movq %rsp, %rdi callq 0x33554
/libKriging[P]libKriging/src/lib/Kriging.cpp
Kriging::leaveOneOutVec(arma::Col<double> const&)
LIBKRIGING_EXPORT std::tuple<arma::vec, arma::vec> Kriging::leaveOneOutVec(const arma::vec& _theta) { double loo = -1; arma::mat yhat = arma::mat(m_y.n_elem, 2, arma::fill::none); loo = _leaveOneOut(_theta, nullptr, &yhat, nullptr, nullptr); return std::make_tuple(std::move(yhat.col(0)), std::move(yhat.col(1) * std::sqrt(m_sigma2))); }
pushq %rbp pushq %r14 pushq %rbx subq $0x6f0, %rsp # imm = 0x6F0 movl 0x238(%rsi), %eax movl %eax, (%rsp) movl $0x2, 0x4(%rsp) leal (%rax,%rax), %ebp movl %ebp, 0x8(%rsp) movq $0x0, 0xc(%rsp) testl %eax, %eax jns 0x356a3 leaq 0x70a32(%rip), %rax # 0xa60c5 leaq 0xb0(%rsp), %rdi movq %rax, (%rdi) callq 0x11ca0 movq %rdx, %rbx movq %rsi, %r14 cmpl $0x10, %ebp ja 0x356c2 testl %ebp, %ebp leaq 0x30(%rsp), %rcx movl $0x0, %eax cmovneq %rcx, %rax xorl %ebp, %ebp jmp 0x356d7 movl %ebp, %edi shlq $0x3, %rdi callq 0xc8c0 testq %rax, %rax jne 0x356d7 callq 0x11d28 movq %rax, 0x20(%rsp) movl %ebp, 0xc(%rsp) leaq 0xb0(%rsp), %rdi movq %r14, %rsi movq %rbx, %rdx xorl %ecx, %ecx callq 0x33554 movq %rax, %rbx movq %rsp, %rdi callq 0x1c318 movq %rbx, %rdi callq 0xcdb0
/libKriging[P]libKriging/src/lib/Kriging.cpp
arma::Mat<double>::Mat<arma::eGlue<arma::Mat<double>, arma::Mat<double>, arma::eglue_minus>, arma::eop_scalar_div_post>(arma::eOp<arma::eGlue<arma::Mat<double>, arma::Mat<double>, arma::eglue_minus>, arma::eop_scalar_div_post> const&)
inline Mat<eT>::Mat(const eOp<T1, eop_type>& X) : n_rows(X.get_n_rows()) , n_cols(X.get_n_cols()) , n_elem(X.get_n_elem()) , n_alloc() , vec_state(0) , mem_state(0) , mem() { arma_debug_sigprint_this(this); arma_type_check(( is_same_type< eT, typename T1::elem_type >::no )); init_cold(); eop_type::apply(*this, X); }
pushq %r14 pushq %rbx pushq %rax movq %rsi, %rbx movq %rdi, %r14 movq (%rsi), %rax movq (%rax), %rdx movl (%rdx), %ecx movl %ecx, (%rdi) movl 0x4(%rdx), %eax movl %eax, 0x4(%rdi) movl 0x8(%rdx), %edi movl %edi, 0x8(%r14) xorl %edx, %edx movq %rdx, 0x20(%r14) movl $0x10000, %esi # imm = 0x10000 cmpl %esi, %ecx setae %r8b cmpl %esi, %eax setae %sil orb %r8b, %sil movq %rdx, 0xc(%r14) cmpb $0x1, %sil jne 0x4a601 movl %ecx, %ecx cvtsi2sd %rcx, %xmm0 movl %eax, %eax cvtsi2sd %rax, %xmm1 mulsd %xmm0, %xmm1 ucomisd 0x5ba5d(%rip), %xmm1 # 0xa6058 ja 0x4a6e6 cmpl $0x10, %edi ja 0x4a619 leaq 0x30(%r14), %rax testq %rdi, %rdi cmoveq %rdi, %rax movq %rax, 0x20(%r14) xorl %ecx, %ecx jmp 0x4a633 shlq $0x3, %rdi callq 0xc8c0 testq %rax, %rax je 0x4a6f8 movq %rax, 0x20(%r14) movl 0x8(%r14), %ecx movl %ecx, 0xc(%r14) movsd 0x10(%rbx), %xmm0 movq (%rbx), %rsi movq (%rsi), %rdx movl 0x8(%rdx), %ecx testb $0xf, %al je 0x4a679 testq %rcx, %rcx je 0x4a6ba movq 0x20(%rdx), %rdx movq 0x10(%rsi), %rsi movq 0x20(%rsi), %rsi xorl %edi, %edi movsd (%rdx,%rdi,8), %xmm1 subsd (%rsi,%rdi,8), %xmm1 divsd %xmm0, %xmm1 movsd %xmm1, (%rax,%rdi,8) incq %rdi cmpq %rdi, %rcx jne 0x4a65c jmp 0x4a6ba movq 0x20(%rdx), %rdx testb $0xf, %dl jne 0x4a690 movq 0x10(%rsi), %rdi movq 0x20(%rdi), %rdi testb $0xf, %dil je 0x4a6c2 testq %rcx, %rcx je 0x4a6ba movq 0x10(%rsi), %rsi movq 0x20(%rsi), %rsi xorl %edi, %edi movsd (%rdx,%rdi,8), %xmm1 subsd (%rsi,%rdi,8), %xmm1 divsd %xmm0, %xmm1 movsd %xmm1, (%rax,%rdi,8) incq %rdi cmpq %rdi, %rcx jne 0x4a69f addq $0x8, %rsp popq %rbx popq %r14 retq testq %rcx, %rcx je 0x4a6ba xorl %esi, %esi movsd (%rdx,%rsi,8), %xmm1 subsd (%rdi,%rsi,8), %xmm1 divsd %xmm0, %xmm1 movsd %xmm1, (%rax,%rsi,8) incq %rsi cmpq %rsi, %rcx jne 0x4a6c9 jmp 0x4a6ba leaq 0x5b9d8(%rip), %rax # 0xa60c5 movq %rsp, %rdi movq %rax, (%rdi) callq 0x11ca0 callq 0x11d28 nop
/libKriging[P]libKriging/build_O3/dependencies/armadillo-code/tmp/include/armadillo_bits/Mat_meat.hpp
NoiseKriging::save(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>) const
void NoiseKriging::save(const std::string filename) const { nlohmann::json j; j["version"] = 2; j["content"] = "NoiseKriging"; // _Cov_pow & std::function embedded by make_Cov j["covType"] = m_covType; j["X"] = to_json(m_X); j["centerX"] = to_json(m_centerX); j["scaleX"] = to_json(m_scaleX); j["y"] = to_json(m_y); j["centerY"] = m_centerY; j["scaleY"] = m_scaleY; j["normalize"] = m_normalize; j["noise"] = to_json(m_noise); j["regmodel"] = Trend::toString(m_regmodel); j["optim"] = m_optim; j["objective"] = m_objective; // Auxiliary data j["dX"] = to_json(m_dX); j["maxdX"] = to_json(m_maxdX); j["F"] = to_json(m_F); j["T"] = to_json(m_T); j["R"] = to_json(m_R); j["M"] = to_json(m_M); j["star"] = to_json(m_star); j["circ"] = to_json(m_circ); j["z"] = to_json(m_z); j["beta"] = to_json(m_beta); j["est_beta"] = m_est_beta; j["theta"] = to_json(m_theta); j["est_theta"] = m_est_theta; j["sigma2"] = m_sigma2; j["est_sigma2"] = m_est_sigma2; std::ofstream f(filename); f << std::setw(4) << j; }
pushq %r15 pushq %r14 pushq %r12 pushq %rbx subq $0x3e8, %rsp # imm = 0x3E8 movq %rsi, %rbx movq %rdi, %r14 movq %rsp, %r15 movb $0x0, (%r15) movq $0x0, 0x8(%r15) movq %r15, %rdi movl $0x1, %esi callq 0x4d8fe movq %r15, %rdi movl $0x1, %esi callq 0x4d8fe xorps %xmm0, %xmm0 leaq 0x80(%rsp), %r12 movaps %xmm0, (%r12) movl $0x2, %esi movq %r12, %rdi callq 0x549fe movq %r12, %rdi movl $0x1, %esi callq 0x4d8fe leaq 0x15a0a(%rip), %rsi # 0xa8186 movq %r15, %rdi callq 0x4b098 leaq 0x80(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x1b038(%rip), %rsi # 0xad7e8 leaq 0x1d8(%rsp), %rdi callq 0x98bda leaq 0x159ca(%rip), %rsi # 0xa818e movq %rsp, %rdi callq 0x4b098 leaq 0x1d8(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x1c8(%rsp), %rdi movq %r14, %rsi callq 0x4b192 leaq 0x1598e(%rip), %rsi # 0xa8196 movq %rsp, %rdi callq 0x4b098 leaq 0x1c8(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x20(%r14), %rsi leaq 0x1b8(%rsp), %rdi callq 0xc770 leaq 0x1bcff(%rip), %rsi # 0xae54c movq %rsp, %rdi callq 0x4b098 leaq 0x1b8(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0xd0(%r14), %rsi leaq 0x1a8(%rsp), %rdi callq 0xc130 leaq 0x15909(%rip), %rsi # 0xa819e movq %rsp, %rdi callq 0x4b098 leaq 0x1a8(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x180(%r14), %rsi leaq 0x198(%rsp), %rdi callq 0xc130 leaq 0x158c9(%rip), %rsi # 0xa81a6 movq %rsp, %rdi callq 0x4b098 leaq 0x198(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x230(%r14), %rsi leaq 0x188(%rsp), %rdi callq 0xcc00 leaq 0x159a7(%rip), %rsi # 0xa82cc movq %rsp, %rdi callq 0x4b098 leaq 0x188(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 xorps %xmm0, %xmm0 leaq 0x70(%rsp), %r15 movaps %xmm0, (%r15) movsd 0x2e0(%r14), %xmm0 movq %r15, %rdi callq 0x54b56 movq %r15, %rdi movl $0x1, %esi callq 0x4d8fe leaq 0x1582a(%rip), %rsi # 0xa81ad movq %rsp, %rdi callq 0x4b098 leaq 0x70(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x60(%rsp), %r15 xorps %xmm0, %xmm0 movaps %xmm0, (%r15) movsd 0x2e8(%r14), %xmm0 movq %r15, %rdi callq 0x54b56 movq %r15, %rdi movl $0x1, %esi callq 0x4d8fe leaq 0x157d7(%rip), %rsi # 0xa81b5 movq %rsp, %rdi callq 0x4b098 leaq 0x60(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 xorps %xmm0, %xmm0 leaq 0x50(%rsp), %r15 movaps %xmm0, (%r15) movzbl 0x2f0(%r14), %esi movq %r15, %rdi callq 0x54b98 movq %r15, %rdi movl $0x1, %esi callq 0x4d8fe leaq 0x15784(%rip), %rsi # 0xa81bc movq %rsp, %rdi callq 0x4b098 leaq 0x50(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x300(%r14), %rsi leaq 0x178(%rsp), %rdi callq 0xcc00 leaq 0x1ad78(%rip), %rsi # 0xad7f5 movq %rsp, %rdi callq 0x4b098 leaq 0x178(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x3b0(%r14), %rsi leaq 0x1e8(%rsp), %rdi callq 0xc7a0 leaq 0x168(%rsp), %rdi leaq 0x1e8(%rsp), %rsi callq 0x4b1cc leaq 0x156ec(%rip), %rsi # 0xa81c6 movq %rsp, %rdi callq 0x4b098 leaq 0x168(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x1f8(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x92b28 movq 0x1f8(%rsp), %rsi incq %rsi callq 0xc830 leaq 0x3b8(%r14), %rsi leaq 0x158(%rsp), %rdi callq 0x4b192 leaq 0x1568c(%rip), %rsi # 0xa81cf movq %rsp, %rdi callq 0x4b098 leaq 0x158(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x3d8(%r14), %rsi leaq 0x148(%rsp), %rdi callq 0x4b192 leaq 0x1564a(%rip), %rsi # 0xa81d5 movq %rsp, %rdi callq 0x4b098 leaq 0x148(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x400(%r14), %rsi leaq 0x138(%rsp), %rdi callq 0xc770 leaq 0x1560f(%rip), %rsi # 0xa81e2 movq %rsp, %rdi callq 0x4b098 leaq 0x138(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x4b0(%r14), %rsi leaq 0x128(%rsp), %rdi callq 0xcc00 leaq 0x155c4(%rip), %rsi # 0xa81df movq %rsp, %rdi callq 0x4b098 leaq 0x128(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x560(%r14), %rsi leaq 0x118(%rsp), %rdi callq 0xc770 leaq 0x17446(%rip), %rsi # 0xaa0a9 movq %rsp, %rdi callq 0x4b098 leaq 0x118(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x610(%r14), %rsi leaq 0x108(%rsp), %rdi callq 0xc770 leaq 0x139ba(%rip), %rsi # 0xa6665 movq %rsp, %rdi callq 0x4b098 leaq 0x108(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x6c0(%r14), %rsi leaq 0xf8(%rsp), %rdi callq 0xc770 leaq 0x1b715(%rip), %rsi # 0xae408 movq %rsp, %rdi callq 0x4b098 leaq 0xf8(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x770(%r14), %rsi leaq 0xe8(%rsp), %rdi callq 0xc770 leaq 0x154aa(%rip), %rsi # 0xa81e5 movq %rsp, %rdi callq 0x4b098 leaq 0xe8(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x820(%r14), %rsi leaq 0xd8(%rsp), %rdi callq 0xc770 leaq 0x15464(%rip), %rsi # 0xa81e7 movq %rsp, %rdi callq 0x4b098 leaq 0xd8(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x8d0(%r14), %rsi leaq 0xc8(%rsp), %rdi callq 0xc770 leaq 0x15421(%rip), %rsi # 0xa81ec movq %rsp, %rdi callq 0x4b098 leaq 0xc8(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x980(%r14), %rsi leaq 0xb8(%rsp), %rdi callq 0xcc00 leaq 0x153de(%rip), %rsi # 0xa81f1 movq %rsp, %rdi callq 0x4b098 leaq 0xb8(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0xa30(%r14), %rsi leaq 0xa8(%rsp), %rdi callq 0xcc00 leaq 0x1539c(%rip), %rsi # 0xa81f7 movq %rsp, %rdi callq 0x4b098 leaq 0xa8(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 xorps %xmm0, %xmm0 leaq 0x40(%rsp), %r15 movaps %xmm0, (%r15) movzbl 0xae0(%r14), %esi movq %r15, %rdi callq 0x54b98 movq %r15, %rdi movl $0x1, %esi callq 0x4d8fe leaq 0x1533b(%rip), %rsi # 0xa81f3 movq %rsp, %rdi callq 0x4b098 leaq 0x40(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0xaf0(%r14), %rsi leaq 0x98(%rsp), %rdi callq 0xcc00 leaq 0x15303(%rip), %rsi # 0xa8200 movq %rsp, %rdi callq 0x4b098 leaq 0x98(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 xorps %xmm0, %xmm0 leaq 0x30(%rsp), %r15 movaps %xmm0, (%r15) movzbl 0xba0(%r14), %esi movq %r15, %rdi callq 0x54b98 movq %r15, %rdi movl $0x1, %esi callq 0x4d8fe leaq 0x152a2(%rip), %rsi # 0xa81fc movq %rsp, %rdi callq 0x4b098 leaq 0x30(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 leaq 0x20(%rsp), %r15 xorps %xmm0, %xmm0 movaps %xmm0, (%r15) movsd 0xba8(%r14), %xmm0 movq %r15, %rdi callq 0x54b56 movq %r15, %rdi movl $0x1, %esi callq 0x4d8fe leaq 0x15255(%rip), %rsi # 0xa820a movq %rsp, %rdi callq 0x4b098 leaq 0x20(%rsp), %r15 movq %rax, %rdi movq %r15, %rsi callq 0x4b10e movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 xorps %xmm0, %xmm0 leaq 0x10(%rsp), %r15 movaps %xmm0, (%r15) movzbl 0xbb0(%r14), %esi movq %r15, %rdi callq 0x54b98 movq %r15, %rdi movl $0x1, %esi callq 0x4d8fe leaq 0x151f7(%rip), %rsi # 0xa8206 movq %rsp, %rdi callq 0x4b098 leaq 0x10(%rsp), %r14 movq %rax, %rdi movq %r14, %rsi callq 0x4b10e movq %r14, %rdi xorl %esi, %esi callq 0x4d8fe movq %r14, %rdi callq 0x4d9d4 leaq 0x1e8(%rsp), %rdi movq %rbx, %rsi movl $0x10, %edx callq 0xcee0 leaq 0x1e8(%rsp), %rdi movq (%rdi), %rax movq -0x18(%rax), %rax movq $0x4, 0x1f8(%rsp,%rax) movq %rsp, %rsi callq 0x4b205 movq 0x39eb0(%rip), %rax # 0xccf28 movq (%rax), %rcx movq 0x18(%rax), %rax leaq 0x1f0(%rsp), %rdi movq %rcx, -0x8(%rdi) movq -0x18(%rcx), %rcx movq %rax, 0x1e8(%rsp,%rcx) callq 0xc6e0 leaq 0x2e0(%rsp), %rdi callq 0xc210 movq %rsp, %rbx movq %rbx, %rdi xorl %esi, %esi callq 0x4d8fe movq %rbx, %rdi callq 0x4d9d4 addq $0x3e8, %rsp # imm = 0x3E8 popq %rbx popq %r12 popq %r14 popq %r15 retq movq %rax, %rbx leaq 0x1e8(%rsp), %rdi callq 0xcb40 jmp 0x932d7 jmp 0x932d4 movq %rax, %rbx leaq 0x10(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x20(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x30(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x98(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x40(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0xa8(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0xb8(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0xc8(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0xd8(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0xe8(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0xf8(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x108(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x118(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x128(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x138(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x148(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x158(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x168(%rsp), %r14 movq %r14, %rdi xorl %esi, %esi callq 0x4d8fe movq %r14, %rdi callq 0x4d9d4 jmp 0x9320d movq %rax, %rbx leaq 0x1f8(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x932d7 movq 0x1f8(%rsp), %rsi incq %rsi callq 0xc830 jmp 0x932d7 jmp 0x932d4 movq %rax, %rbx leaq 0x178(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x50(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x60(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x70(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x188(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x198(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x1a8(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x1b8(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x1c8(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x1d8(%rsp), %r14 jmp 0x932c0 movq %rax, %rbx leaq 0x80(%rsp), %r14 movq %r14, %rdi xorl %esi, %esi callq 0x4d8fe movq %r14, %rdi callq 0x4d9d4 jmp 0x932d7 movq %rax, %rbx movq %rsp, %r14 movq %r14, %rdi xorl %esi, %esi callq 0x4d8fe movq %r14, %rdi callq 0x4d9d4 movq %rbx, %rdi callq 0xcdb0
/libKriging[P]libKriging/src/lib/NoiseKriging.cpp
lkalloc::free(void*)
LIBKRIGING_EXPORT void free(void* mem_ptr) { #ifdef LIBKRIGING_DEBUG_ALLOC static int count = 0; ++count; // std::cout << "Using lkalloc deallocator " /* << custom_free */ << " (#" << count << ") in " << dllName() << "\n"; if (seens.find(mem_ptr) == seens.end()) { std::cout << "### (#" << count << ") lkalloc allocator has never seen " << mem_ptr << " ##" << std::endl; return; } #endif if (custom_free) { (*custom_free)(mem_ptr); } else { #ifdef _MSC_VER return _aligned_free(mem_ptr); #else ::free(mem_ptr); #endif } #ifdef LIBKRIGING_DEBUG_ALLOC seens.erase(mem_ptr); #endif }
movq 0x3421c(%rip), %rax # 0xcf180 testq %rax, %rax je 0xc950 jmpq *%rax
/libKriging[P]libKriging/src/lib/lkalloc.cpp
to_json[abi:cxx11](arma::Row<double> const&)
LIBKRIGING_EXPORT nlohmann::json to_json(const arma::rowvec& t) { auto data = serialize(t.memptr(), t.size()); std::string base64_data = base64_encode(data.data(), data.size(), false); return {{"type", "rowvec"}, {"size", t.size()}, {"base64_data", base64_data}}; }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x118, %rsp # imm = 0x118 movq %rsi, %r15 movq %rdi, %r14 movq 0x20(%rsi), %rsi movl 0x8(%r15), %edx leaq 0x8(%rsp), %rbx movq %rbx, %rdi callq 0x9dcbb movq (%rbx), %rsi movq 0x8(%rbx), %rdx subq %rsi, %rdx leaq 0x20(%rsp), %rdi xorl %ecx, %ecx callq 0x9bcd4 leaq 0x1168c(%rip), %rsi # 0xadf78 leaq 0x70(%rsp), %rdi callq 0x9e364 leaq 0x88(%rsp), %rdi movq $0x0, -0x8(%rdi) leaq 0x11670(%rip), %rsi # 0xadf7d callq 0x9e430 leaq 0x70(%rsp), %rsi movq $0x0, 0x28(%rsi) leaq 0xd0(%rsp), %rbx movl $0x2, %edx movq %rbx, %rdi movl $0x1, %ecx movl $0x2, %r8d callq 0x9dd52 leaq 0xe8(%rsp), %rbx movq $0x0, -0x8(%rbx) leaq 0x98f6(%rip), %rsi # 0xa624c leaq 0xa0(%rsp), %rdi callq 0x9e364 xorl %r13d, %r13d leaq 0xb8(%rsp), %r12 movq %r13, -0x8(%r12) movl 0x8(%r15), %esi xorps %xmm0, %xmm0 movups %xmm0, (%r12) movq %r12, %rdi callq 0x5e80e movq %r12, %rdi movl $0x1, %esi callq 0x4d8fe movq %r13, 0x10(%r12) leaq 0xa0(%rsp), %rsi movl $0x2, %edx movq %rbx, %rdi movl $0x1, %ecx movl $0x2, %r8d callq 0x9dd52 leaq 0x100(%rsp), %rbx movq $0x0, -0x8(%rbx) leaq 0x115b4(%rip), %rsi # 0xadf84 leaq 0x40(%rsp), %rdi callq 0x9e4fc leaq 0x58(%rsp), %rdi movq $0x0, -0x8(%rdi) leaq 0x20(%rsp), %rsi callq 0x5d060 leaq 0x40(%rsp), %rsi movq $0x0, 0x28(%rsi) movl $0x2, %edx movq %rbx, %rdi movl $0x1, %ecx movl $0x2, %r8d callq 0x9dd52 leaq 0xd0(%rsp), %rsi movq $0x0, 0x40(%rsi) movl $0x3, %edx movq %r14, %rdi movl $0x1, %ecx movl $0x2, %r8d callq 0x9dd52 movl $0x30, %r15d leaq (%rsp,%r15), %rbx addq $0xd0, %rbx movq %rbx, %rdi xorl %esi, %esi callq 0x4d8fe movq %rbx, %rdi callq 0x4d9d4 addq $-0x18, %r15 cmpq $-0x18, %r15 jne 0x9ca44 movl $0x18, %r15d leaq (%rsp,%r15), %rbx addq $0x40, %rbx movq %rbx, %rdi xorl %esi, %esi callq 0x4d8fe movq %rbx, %rdi callq 0x4d9d4 addq $-0x18, %r15 cmpq $-0x18, %r15 jne 0x9ca71 movl $0x18, %r15d leaq (%rsp,%r15), %rbx addq $0xa0, %rbx movq %rbx, %rdi xorl %esi, %esi callq 0x4d8fe movq %rbx, %rdi callq 0x4d9d4 addq $-0x18, %r15 cmpq $-0x18, %r15 jne 0x9ca9b movl $0x18, %r15d leaq (%rsp,%r15), %rbx addq $0x70, %rbx movq %rbx, %rdi xorl %esi, %esi callq 0x4d8fe movq %rbx, %rdi callq 0x4d9d4 addq $-0x18, %r15 cmpq $-0x18, %r15 jne 0x9cac8 leaq 0x30(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x9cb07 movq 0x30(%rsp), %rsi incq %rsi callq 0xc830 movq 0x8(%rsp), %rdi testq %rdi, %rdi je 0x9cb1e movq 0x18(%rsp), %rsi subq %rdi, %rsi callq 0xc830 movq %r14, %rax addq $0x118, %rsp # imm = 0x118 popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq movq %rax, %r14 movl $0x30, %r12d xorl %ebp, %ebp leaq (%rsp,%r12), %r15 addq $0xd0, %r15 movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 addq $-0x18, %r12 cmpq $-0x18, %r12 jne 0x9cb3e jmp 0x9cb6d movq %rax, %r14 movb $0x1, %bpl movl $0x18, %r12d leaq (%rsp,%r12), %r15 addq $0x40, %r15 movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 addq $-0x18, %r12 cmpq $-0x18, %r12 jne 0x9cb73 jmp 0x9cbbd movq %rax, %r14 leaq 0x40(%rsp), %r15 movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 jmp 0x9cbba jmp 0x9cbb7 movq %rax, %r14 movb $0x1, %bpl movl $0x18, %r12d leaq (%rsp,%r12), %r15 addq $0xa0, %r15 movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 addq $-0x18, %r12 cmpq $-0x18, %r12 jne 0x9cbc3 jmp 0x9cbf4 jmp 0x9cbee movq %rax, %r14 movb $0x1, %bpl movl $0x18, %r12d leaq (%rsp,%r12), %r15 addq $0x70, %r15 movq %r15, %rdi xorl %esi, %esi callq 0x4d8fe movq %r15, %rdi callq 0x4d9d4 addq $-0x18, %r12 cmpq $-0x18, %r12 jne 0x9cbfa leaq 0xd0(%rsp), %r15 cmpq %rbx, %r15 setne %al andb %al, %bpl cmpb $0x1, %bpl jne 0x9cc71 addq $-0x18, %rbx movq %rbx, %rdi xorl %esi, %esi callq 0x4d8fe movq %rbx, %rdi callq 0x4d9d4 cmpq %r15, %rbx jne 0x9cc35 jmp 0x9cc71 movq %rax, %r14 leaq 0x70(%rsp), %rbx movq %rbx, %rdi xorl %esi, %esi callq 0x4d8fe movq %rbx, %rdi callq 0x4d9d4 jmp 0x9cc71 movq %rax, %r14 leaq 0x30(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x9cc8c movq 0x30(%rsp), %rsi incq %rsi callq 0xc830 movq 0x8(%rsp), %rdi testq %rdi, %rdi je 0x9cca3 movq 0x18(%rsp), %rsi subq %rdi, %rsi callq 0xc830 movq %r14, %rdi callq 0xcdb0 movq %rax, %r14 jmp 0x9cc8c
/libKriging[P]libKriging/src/lib/utils/jsonutils.cpp
colvec_from_json(nlohmann::json_abi_v3_11_3::basic_json<std::map, std::vector, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, bool, long, unsigned long, double, std::allocator, nlohmann::json_abi_v3_11_3::adl_serializer, std::vector<unsigned char, std::allocator<unsigned char>>, void> const&)
LIBKRIGING_EXPORT arma::colvec colvec_from_json(const nlohmann::json& json_node) { assert(json_node["type"] == "colvec"); std::string base64_data = json_node["base64_data"]; const std::string data = base64_decode(base64_data); std::vector<double> raw_data = deserialize<double>(reinterpret_cast<const uint8_t*>(data.data()), data.size()); assert(raw_data.size() == json_node["size"]); return {raw_data}; }
pushq %r15 pushq %r14 pushq %r12 pushq %rbx subq $0x58, %rsp movq %rsi, %r14 movq %rdi, %rbx leaq 0x10776(%rip), %rsi # 0xadf78 movq %r14, %rdi callq 0x9df7c leaq 0x1077f(%rip), %rsi # 0xadf90 movq %rax, %rdi callq 0x9df2b testb %al, %al je 0x9d98b leaq 0x1075c(%rip), %rsi # 0xadf84 movq %r14, %rdi callq 0x9df7c leaq 0x38(%rsp), %r15 movq %r15, %rdi movq %rax, %rsi callq 0x4d5c6 leaq 0x18(%rsp), %rdi movq %r15, %rsi xorl %edx, %edx callq 0x9be5f movq 0x18(%rsp), %rsi movq 0x20(%rsp), %rdx movq %rsp, %rdi callq 0x9dff2 movq (%rsp), %r12 movq 0x8(%rsp), %r15 leaq 0x89db(%rip), %rsi # 0xa624c movq %r14, %rdi callq 0x9df7c subq %r12, %r15 sarq $0x3, %r15 movq %r15, %rdi movq %rax, %rsi callq 0x9e095 testb %al, %al je 0x9d9aa movabsq $0x7fffffff8, %r14 # imm = 0x7FFFFFFF8 movq (%rsp), %rcx movq 0x8(%rsp), %rdx subq %rcx, %rdx movq %rdx, %rax shrq $0x3, %rax movl %eax, (%rbx) movl $0x1, 0x4(%rbx) movl %eax, 0x8(%rbx) movabsq $0x100000000, %rsi # imm = 0x100000000 movq %rsi, 0xc(%rbx) movq $0x0, 0x20(%rbx) cmpl $0x10, %eax ja 0x9d8ee leaq 0x30(%rbx), %rdi xorl %esi, %esi testl %eax, %eax movl $0x0, %eax cmovneq %rdi, %rax movq %rax, 0x20(%rbx) jmp 0x9d915 andq %r14, %rdx movq %rdx, %rdi callq 0xc8c0 testq %rax, %rax je 0x9d9c9 movq %rax, 0x20(%rbx) movl 0x8(%rbx), %esi movq (%rsp), %rcx movq 0x8(%rsp), %rdx subq %rcx, %rdx movl %esi, 0xc(%rbx) andq %r14, %rdx je 0x9d931 cmpq %rcx, %rax je 0x9d931 movq %rax, %rdi movq %rcx, %rsi callq 0xc6a0 movq (%rsp), %rcx testq %rcx, %rcx je 0x9d946 movq 0x10(%rsp), %rsi subq %rcx, %rsi movq %rcx, %rdi callq 0xc830 leaq 0x28(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x9d961 movq 0x28(%rsp), %rsi incq %rsi callq 0xc830 leaq 0x48(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x9d97c movq 0x48(%rsp), %rsi incq %rsi callq 0xc830 movq %rbx, %rax addq $0x58, %rsp popq %rbx popq %r12 popq %r14 popq %r15 retq leaq 0x106ef(%rip), %rdi # 0xae081 leaq 0x10627(%rip), %rsi # 0xadfc0 leaq 0x106ff(%rip), %rcx # 0xae09f movl $0x5e, %edx callq 0xc520 leaq 0x106ab(%rip), %rdi # 0xae05c leaq 0x10608(%rip), %rsi # 0xadfc0 leaq 0x106e0(%rip), %rcx # 0xae09f movl $0x62, %edx callq 0xc520 callq 0x14a48 movq %rax, %rbx jmp 0x9d9f1 movq %rax, %rbx jmp 0x9da0c movq %rax, %rbx movq (%rsp), %rdi testq %rdi, %rdi je 0x9d9f1 movq 0x10(%rsp), %rsi subq %rdi, %rsi callq 0xc830 leaq 0x28(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x9da0c movq 0x28(%rsp), %rsi incq %rsi callq 0xc830 leaq 0x48(%rsp), %rax movq -0x10(%rax), %rdi cmpq %rax, %rdi je 0x9da27 movq 0x48(%rsp), %rsi incq %rsi callq 0xc830 movq %rbx, %rdi callq 0xcdb0
/libKriging[P]libKriging/src/lib/utils/jsonutils.cpp
hpsolb_
int hpsolb_(integer *n, doublereal *t, integer *iorder, integer *iheap) { /* System generated locals */ integer i__1; /* Local variables */ static integer i__, j, k; static doublereal out, ddum; static integer indxin, indxou; /* ************ */ /* Subroutine hpsolb */ /* This subroutine sorts out the least element of t, and puts the */ /* remaining elements of t in a heap. */ /* n is an integer variable. */ /* On entry n is the dimension of the arrays t and iorder. */ /* On exit n is unchanged. */ /* t is a double precision array of dimension n. */ /* On entry t stores the elements to be sorted, */ /* On exit t(n) stores the least elements of t, and t(1) to t(n-1) */ /* stores the remaining elements in the form of a heap. */ /* iorder is an integer array of dimension n. */ /* On entry iorder(i) is the index of t(i). */ /* On exit iorder(i) is still the index of t(i), but iorder may be */ /* permuted in accordance with t. */ /* iheap is an integer variable specifying the task. */ /* On entry iheap should be set as follows: */ /* iheap .eq. 0 if t(1) to t(n) is not in the form of a heap, */ /* iheap .ne. 0 if otherwise. */ /* On exit iheap is unchanged. */ /* References: */ /* Algorithm 232 of CACM (J. W. J. Williams): HEAPSORT. */ /* * * * */ /* NEOS, November 1994. (Latest revision June 1996.) */ /* Optimization Technology Center. */ /* Argonne National Laboratory and Northwestern University. */ /* Written by */ /* Ciyou Zhu */ /* in collaboration with R.H. Byrd, P. Lu-Chen and J. Nocedal. */ /* ************ */ /* Parameter adjustments */ --iorder; --t; /* Function Body */ if (*iheap == 0) { /* Rearrange the elements t(1) to t(n) to form a heap. */ i__1 = *n; for (k = 2; k <= i__1; ++k) { ddum = t[k]; indxin = iorder[k]; /* Add ddum to the heap. */ i__ = k; L10: if (i__ > 1) { j = i__ / 2; if (ddum < t[j]) { t[i__] = t[j]; iorder[i__] = iorder[j]; i__ = j; goto L10; } } t[i__] = ddum; iorder[i__] = indxin; /* L20: */ } } /* Assign to 'out' the value of t(1), the least member of the heap, */ /* and rearrange the remaining members to form a heap as */ /* elements 1 to n-1 of t. */ if (*n > 1) { i__ = 1; out = t[1]; indxou = iorder[1]; ddum = t[*n]; indxin = iorder[*n]; /* Restore the heap */ L30: j = i__ + i__; if (j <= *n - 1) { if (t[j + 1] < t[j]) { ++j; } if (t[j] < ddum) { t[i__] = t[j]; iorder[i__] = iorder[j]; i__ = j; goto L30; } } t[i__] = ddum; iorder[i__] = indxin; /* Put the least member in t(n). */ t[*n] = out; iorder[*n] = indxou; } return 0; }
cmpl $0x0, (%rcx) setne %al movl (%rdi), %ecx cmpl $0x2, %ecx setl %r8b orb %al, %r8b jne 0xa3d30 movl %ecx, %eax incq %rax movl $0x2, %ecx movsd -0x8(%rsi,%rcx,8), %xmm0 movl -0x4(%rdx,%rcx,4), %r8d movl %ecx, %r9d movl %r9d, %r10d shrl %r9d movsd -0x8(%rsi,%r9,8), %xmm1 ucomisd %xmm0, %xmm1 jbe 0xa3d17 movsd %xmm1, -0x8(%rsi,%r10,8) movl -0x4(%rdx,%r9,4), %r11d movl %r11d, -0x4(%rdx,%r10,4) cmpl $0x3, %r10d ja 0xa3ceb jmp 0xa3d1a movq %r10, %r9 movsd %xmm0, -0x8(%rsi,%r9,8) movl %r8d, -0x4(%rdx,%r9,4) incq %rcx cmpq %rax, %rcx jne 0xa3cdd movl (%rdi), %ecx cmpl $0x2, %ecx jl 0xa3dd0 pushq %rbx movsd (%rsi), %xmm0 movl (%rdx), %eax movl %ecx, %ecx movsd -0x8(%rsi,%rcx,8), %xmm1 movl -0x4(%rdx,%rcx,4), %ecx movl $0x1, %r8d je 0xa3db6 movl $0x1, %r10d movl $0x2, %r8d movl %r8d, %r9d orl $0x1, %r9d movslq %r9d, %r11 movslq %r8d, %rbx movsd -0x8(%rsi,%rbx,8), %xmm2 ucomisd -0x8(%rsi,%r11,8), %xmm2 ja 0xa3d7f movl %r8d, %r9d movslq %r9d, %r8 movsd -0x8(%rsi,%r8,8), %xmm2 ucomisd %xmm2, %xmm1 jbe 0xa3db0 movslq %r10d, %r10 movsd %xmm2, -0x8(%rsi,%r10,8) movl -0x4(%rdx,%r8,4), %r11d movl %r11d, -0x4(%rdx,%r10,4) addl %r8d, %r8d movl %r9d, %r10d cmpl (%rdi), %r8d jl 0xa3d60 jmp 0xa3db3 movl %r10d, %r9d movslq %r9d, %r8 movsd %xmm1, -0x8(%rsi,%r8,8) movl %ecx, -0x4(%rdx,%r8,4) movslq (%rdi), %rcx movsd %xmm0, -0x8(%rsi,%rcx,8) movl %eax, -0x4(%rdx,%rcx,4) popq %rbx xorl %eax, %eax retq
/libKriging[P]libKriging/dependencies/lbfgsb_cpp/Lbfgsb.3.0/lbfgsb.c
Wnrm2_
doublereal dnrm2_(integer *n, doublereal *x, integer *incx) { /* System generated locals */ integer i__1, i__2; doublereal ret_val, d__1, d__2, d__3; /* Builtin functions */ double sqrt(doublereal); /* Local variables */ static integer i__; static doublereal scale; /* ********** */ /* Function dnrm2 */ /* Given a vector x of length n, this function calculates the */ /* Euclidean norm of x with stride incx. */ /* The function statement is */ /* double precision function dnrm2(n,x,incx) */ /* where */ /* n is a positive integer input variable. */ /* x is an input array of length n. */ /* incx is a positive integer variable that specifies the */ /* stride of the vector. */ /* Subprograms called */ /* FORTRAN-supplied ... abs, max, sqrt */ /* MINPACK-2 Project. February 1991. */ /* Argonne National Laboratory. */ /* Brett M. Averick. */ /* ********** */ /* Parameter adjustments */ --x; /* Function Body */ ret_val = 0.; scale = 0.; i__1 = *n; i__2 = *incx; for (i__ = 1; i__2 < 0 ? i__ >= i__1 : i__ <= i__1; i__ += i__2) { /* Computing MAX */ d__2 = scale, d__3 = (d__1 = x[i__], abs(d__1)); scale = max(d__2,d__3); /* L10: */ } if (scale == 0.) { return ret_val; } i__2 = *n; i__1 = *incx; for (i__ = 1; i__1 < 0 ? i__ >= i__2 : i__ <= i__2; i__ += i__1) { /* Computing 2nd power */ d__1 = x[i__] / scale; ret_val += d__1 * d__1; /* L20: */ } ret_val = scale * sqrt(ret_val); return ret_val; }
movslq (%rdi), %rax xorl %edi, %edi testq %rax, %rax setg %dil xorl %r8d, %r8d cmpq $0x2, %rax setl %r8b movslq (%rdx), %rcx testq %rcx, %rcx cmovsl %r8d, %edi xorpd %xmm0, %xmm0 cmpb $0x1, %dil jne 0xa5901 leaq 0x1(%rcx), %rdx xorpd %xmm1, %xmm1 xorl %r8d, %r8d movapd 0xa0e(%rip), %xmm0 # 0xa62a0 leaq (%rdx,%r8), %r11 xorl %r10d, %r10d xorl %r9d, %r9d cmpq %rax, %r11 setge %r10b setle %r9b testl %ecx, %ecx movsd (%rsi,%r8,8), %xmm2 movapd %xmm2, %xmm3 xorpd %xmm0, %xmm3 movapd %xmm3, %xmm4 cmplesd %xmm2, %xmm4 andpd %xmm4, %xmm2 andnpd %xmm3, %xmm4 orpd %xmm2, %xmm4 movapd %xmm4, %xmm3 cmplesd %xmm1, %xmm3 movapd %xmm3, %xmm2 andnpd %xmm4, %xmm2 andpd %xmm1, %xmm3 cmovsl %r10d, %r9d orpd %xmm2, %xmm3 addq %rcx, %r8 movapd %xmm3, %xmm1 testb %r9b, %r9b jne 0xa5892 xorpd %xmm0, %xmm0 ucomisd %xmm0, %xmm3 jne 0xa5902 jp 0xa5902 retq xorpd %xmm1, %xmm1 testb %dil, %dil je 0xa5941 xorl %edi, %edi leaq (%rdx,%rdi), %r8 xorl %r9d, %r9d xorl %r10d, %r10d cmpq %rax, %r8 setge %r9b setle %r10b testl %ecx, %ecx movsd (%rsi,%rdi,8), %xmm2 divsd %xmm3, %xmm2 mulsd %xmm2, %xmm2 addsd %xmm2, %xmm0 cmovsl %r9d, %r10d addq %rcx, %rdi testb %r10b, %r10b jne 0xa590d ucomisd %xmm1, %xmm0 jb 0xa594d sqrtsd %xmm0, %xmm0 jmp 0xa5964 subq $0x18, %rsp movapd %xmm3, (%rsp) callq 0xc640 movapd (%rsp), %xmm3 addq $0x18, %rsp mulsd %xmm0, %xmm3 movapd %xmm3, %xmm0 retq
/libKriging[P]libKriging/dependencies/lbfgsb_cpp/Lbfgsb.3.0/blas.c
void (anonymous namespace)::randomize_container<std::array<unsigned char, 32ul>>(std::array<unsigned char, 32ul>&)
void randomize_container(C& container) { std::uniform_int_distribution<unsigned int> dist{ 0, std::numeric_limits<typename C::value_type>::max()}; std::random_device rnd; std::default_random_engine eng(rnd()); std::generate(container.begin(), container.end(), [&dist, &eng] { return dist(eng); }); }
pushq %r15 pushq %r14 pushq %r12 pushq %rbx subq $0x1398, %rsp # imm = 0x1398 movq %rdi, %rbx movabsq $0xff00000000, %rax # imm = 0xFF00000000 movq %rax, (%rsp) leaq 0x10(%rsp), %r14 movq %r14, %rdi callq 0x56a4c movq %r14, %rdi callq 0x186f0 movl %eax, %ecx leaq (%rcx,%rcx,2), %rcx shrq $0x20, %rcx movl %eax, %edx subl %ecx, %edx shrl %edx addl %ecx, %edx shrl $0x1e, %edx movl %edx, %ecx shll $0x1f, %ecx orl %edx, %ecx leal (%rax,%rcx), %edx cmpl $0x1, %edx adcl %eax, %ecx leaq 0x8(%rsp), %r14 movq %rcx, (%r14) xorl %r12d, %r12d movq %rsp, %r15 movq %r15, %rdi movq %r14, %rsi movq %r15, %rdx callq 0x56ab6 movb %al, (%rbx,%r12) incq %r12 cmpq $0x20, %r12 jne 0x32052 leaq 0x10(%rsp), %rdi callq 0x18480 addq $0x1398, %rsp # imm = 0x1398 popq %rbx popq %r12 popq %r14 popq %r15 retq jmp 0x3209f jmp 0x3208a movq %rax, %rbx leaq 0x10(%rsp), %rdi callq 0x18480 movq %rbx, %rdi callq 0x18900 movq %rax, %rdi callq 0x374a0
/IAIK[P]Picnic/tools/utils.h
mbedtls_net_set_nonblock
int mbedtls_net_set_nonblock( mbedtls_net_context *ctx ) { #if ( defined(_WIN32) || defined(_WIN32_WCE) ) && !defined(EFIX64) && \ !defined(EFI32) u_long n = 1; return( ioctlsocket( ctx->fd, FIONBIO, &n ) ); #else return( fcntl( ctx->fd, F_SETFL, fcntl( ctx->fd, F_GETFL ) | O_NONBLOCK ) ); #endif }
pushq %rbx movl (%rdi), %ebx movl %ebx, %edi movl $0x3, %esi xorl %eax, %eax callq 0xf0b0 orl $0x800, %eax # imm = 0x800 movl %ebx, %edi movl $0x4, %esi movl %eax, %edx xorl %eax, %eax popq %rbx jmp 0xf0b0
/Dragonchang[P]https_client/mbedtls/library/net_sockets.c
mbedtls_net_usleep
void mbedtls_net_usleep( unsigned long usec ) { #if defined(_WIN32) Sleep( ( usec + 999 ) / 1000 ); #else struct timeval tv; tv.tv_sec = usec / 1000000; #if defined(__unix__) || defined(__unix) || \ ( defined(__APPLE__) && defined(__MACH__) ) tv.tv_usec = (suseconds_t) usec % 1000000; #else tv.tv_usec = usec % 1000000; #endif select( 0, NULL, NULL, NULL, &tv ); #endif }
subq $0x18, %rsp movabsq $0x431bde82d7b634db, %rcx # imm = 0x431BDE82D7B634DB movq %rdi, %rax mulq %rcx shrq $0x12, %rdx leaq 0x8(%rsp), %r8 movq %rdx, (%r8) movq %rdi, %rax imulq %rcx movq %rdx, %rax shrq $0x3f, %rax sarq $0x12, %rdx addq %rax, %rdx imulq $0xf4240, %rdx, %rax # imm = 0xF4240 subq %rax, %rdi movq %rdi, 0x8(%r8) xorl %edi, %edi xorl %esi, %esi xorl %edx, %edx xorl %ecx, %ecx callq 0xf260 addq $0x18, %rsp retq
/Dragonchang[P]https_client/mbedtls/library/net_sockets.c
mbedtls_ssl_derive_keys
int mbedtls_ssl_derive_keys( mbedtls_ssl_context *ssl ) { int ret = 0; unsigned char tmp[64]; unsigned char keyblk[256]; unsigned char *key1; unsigned char *key2; unsigned char *mac_enc; unsigned char *mac_dec; size_t iv_copy_len; const mbedtls_cipher_info_t *cipher_info; const mbedtls_md_info_t *md_info; mbedtls_ssl_session *session = ssl->session_negotiate; mbedtls_ssl_transform *transform = ssl->transform_negotiate; mbedtls_ssl_handshake_params *handshake = ssl->handshake; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> derive keys" ) ); cipher_info = mbedtls_cipher_info_from_type( transform->ciphersuite_info->cipher ); if( cipher_info == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "cipher info for %d not found", transform->ciphersuite_info->cipher ) ); return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); } md_info = mbedtls_md_info_from_type( transform->ciphersuite_info->mac ); if( md_info == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "mbedtls_md info for %d not found", transform->ciphersuite_info->mac ) ); return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); } /* * Set appropriate PRF function and other SSL / TLS / TLS1.2 functions */ #if defined(MBEDTLS_SSL_PROTO_SSL3) if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ) { handshake->tls_prf = ssl3_prf; handshake->calc_verify = ssl_calc_verify_ssl; handshake->calc_finished = ssl_calc_finished_ssl; } else #endif #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) if( ssl->minor_ver < MBEDTLS_SSL_MINOR_VERSION_3 ) { handshake->tls_prf = tls1_prf; handshake->calc_verify = ssl_calc_verify_tls; handshake->calc_finished = ssl_calc_finished_tls; } else #endif #if defined(MBEDTLS_SSL_PROTO_TLS1_2) #if defined(MBEDTLS_SHA512_C) if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 && transform->ciphersuite_info->mac == MBEDTLS_MD_SHA384 ) { handshake->tls_prf = tls_prf_sha384; handshake->calc_verify = ssl_calc_verify_tls_sha384; handshake->calc_finished = ssl_calc_finished_tls_sha384; } else #endif #if defined(MBEDTLS_SHA256_C) if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 ) { handshake->tls_prf = tls_prf_sha256; handshake->calc_verify = ssl_calc_verify_tls_sha256; handshake->calc_finished = ssl_calc_finished_tls_sha256; } else #endif #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } /* * SSLv3: * master = * MD5( premaster + SHA1( 'A' + premaster + randbytes ) ) + * MD5( premaster + SHA1( 'BB' + premaster + randbytes ) ) + * MD5( premaster + SHA1( 'CCC' + premaster + randbytes ) ) * * TLSv1+: * master = PRF( premaster, "master secret", randbytes )[0..47] */ if( handshake->resume == 0 ) { MBEDTLS_SSL_DEBUG_BUF( 3, "premaster secret", handshake->premaster, handshake->pmslen ); #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) if( ssl->handshake->extended_ms == MBEDTLS_SSL_EXTENDED_MS_ENABLED ) { unsigned char session_hash[48]; size_t hash_len; MBEDTLS_SSL_DEBUG_MSG( 3, ( "using extended master secret" ) ); ssl->handshake->calc_verify( ssl, session_hash ); #if defined(MBEDTLS_SSL_PROTO_TLS1_2) if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 ) { #if defined(MBEDTLS_SHA512_C) if( ssl->transform_negotiate->ciphersuite_info->mac == MBEDTLS_MD_SHA384 ) { hash_len = 48; } else #endif hash_len = 32; } else #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ hash_len = 36; MBEDTLS_SSL_DEBUG_BUF( 3, "session hash", session_hash, hash_len ); ret = handshake->tls_prf( handshake->premaster, handshake->pmslen, "extended master secret", session_hash, hash_len, session->master, 48 ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "prf", ret ); return( ret ); } } else #endif ret = handshake->tls_prf( handshake->premaster, handshake->pmslen, "master secret", handshake->randbytes, 64, session->master, 48 ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "prf", ret ); return( ret ); } mbedtls_zeroize( handshake->premaster, sizeof(handshake->premaster) ); } else MBEDTLS_SSL_DEBUG_MSG( 3, ( "no premaster (session resumed)" ) ); /* * Swap the client and server random values. */ memcpy( tmp, handshake->randbytes, 64 ); memcpy( handshake->randbytes, tmp + 32, 32 ); memcpy( handshake->randbytes + 32, tmp, 32 ); mbedtls_zeroize( tmp, sizeof( tmp ) ); /* * SSLv3: * key block = * MD5( master + SHA1( 'A' + master + randbytes ) ) + * MD5( master + SHA1( 'BB' + master + randbytes ) ) + * MD5( master + SHA1( 'CCC' + master + randbytes ) ) + * MD5( master + SHA1( 'DDDD' + master + randbytes ) ) + * ... * * TLSv1: * key block = PRF( master, "key expansion", randbytes ) */ ret = handshake->tls_prf( session->master, 48, "key expansion", handshake->randbytes, 64, keyblk, 256 ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "prf", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_MSG( 3, ( "ciphersuite = %s", mbedtls_ssl_get_ciphersuite_name( session->ciphersuite ) ) ); MBEDTLS_SSL_DEBUG_BUF( 3, "master secret", session->master, 48 ); MBEDTLS_SSL_DEBUG_BUF( 4, "random bytes", handshake->randbytes, 64 ); MBEDTLS_SSL_DEBUG_BUF( 4, "key block", keyblk, 256 ); mbedtls_zeroize( handshake->randbytes, sizeof( handshake->randbytes ) ); /* * Determine the appropriate key, IV and MAC length. */ transform->keylen = cipher_info->key_bitlen / 8; if( cipher_info->mode == MBEDTLS_MODE_GCM || cipher_info->mode == MBEDTLS_MODE_CCM ) { transform->maclen = 0; transform->ivlen = 12; transform->fixed_ivlen = 4; /* Minimum length is expicit IV + tag */ transform->minlen = transform->ivlen - transform->fixed_ivlen + ( transform->ciphersuite_info->flags & MBEDTLS_CIPHERSUITE_SHORT_TAG ? 8 : 16 ); } else { /* Initialize HMAC contexts */ if( ( ret = mbedtls_md_setup( &transform->md_ctx_enc, md_info, 1 ) ) != 0 || ( ret = mbedtls_md_setup( &transform->md_ctx_dec, md_info, 1 ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_md_setup", ret ); return( ret ); } /* Get MAC length */ transform->maclen = mbedtls_md_get_size( md_info ); #if defined(MBEDTLS_SSL_TRUNCATED_HMAC) /* * If HMAC is to be truncated, we shall keep the leftmost bytes, * (rfc 6066 page 13 or rfc 2104 section 4), * so we only need to adjust the length here. */ if( session->trunc_hmac == MBEDTLS_SSL_TRUNC_HMAC_ENABLED ) transform->maclen = MBEDTLS_SSL_TRUNCATED_HMAC_LEN; #endif /* MBEDTLS_SSL_TRUNCATED_HMAC */ /* IV length */ transform->ivlen = cipher_info->iv_size; /* Minimum length */ if( cipher_info->mode == MBEDTLS_MODE_STREAM ) transform->minlen = transform->maclen; else { /* * GenericBlockCipher: * 1. if EtM is in use: one block plus MAC * otherwise: * first multiple of blocklen greater than maclen * 2. IV except for SSL3 and TLS 1.0 */ #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) if( session->encrypt_then_mac == MBEDTLS_SSL_ETM_ENABLED ) { transform->minlen = transform->maclen + cipher_info->block_size; } else #endif { transform->minlen = transform->maclen + cipher_info->block_size - transform->maclen % cipher_info->block_size; } #if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 || ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_1 ) ; /* No need to adjust minlen */ else #endif #if defined(MBEDTLS_SSL_PROTO_TLS1_1) || defined(MBEDTLS_SSL_PROTO_TLS1_2) if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_2 || ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 ) { transform->minlen += transform->ivlen; } else #endif { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } } } MBEDTLS_SSL_DEBUG_MSG( 3, ( "keylen: %d, minlen: %d, ivlen: %d, maclen: %d", transform->keylen, transform->minlen, transform->ivlen, transform->maclen ) ); /* * Finally setup the cipher contexts, IVs and MAC secrets. */ #if defined(MBEDTLS_SSL_CLI_C) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT ) { key1 = keyblk + transform->maclen * 2; key2 = keyblk + transform->maclen * 2 + transform->keylen; mac_enc = keyblk; mac_dec = keyblk + transform->maclen; /* * This is not used in TLS v1.1. */ iv_copy_len = ( transform->fixed_ivlen ) ? transform->fixed_ivlen : transform->ivlen; memcpy( transform->iv_enc, key2 + transform->keylen, iv_copy_len ); memcpy( transform->iv_dec, key2 + transform->keylen + iv_copy_len, iv_copy_len ); } else #endif /* MBEDTLS_SSL_CLI_C */ #if defined(MBEDTLS_SSL_SRV_C) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER ) { key1 = keyblk + transform->maclen * 2 + transform->keylen; key2 = keyblk + transform->maclen * 2; mac_enc = keyblk + transform->maclen; mac_dec = keyblk; /* * This is not used in TLS v1.1. */ iv_copy_len = ( transform->fixed_ivlen ) ? transform->fixed_ivlen : transform->ivlen; memcpy( transform->iv_dec, key1 + transform->keylen, iv_copy_len ); memcpy( transform->iv_enc, key1 + transform->keylen + iv_copy_len, iv_copy_len ); } else #endif /* MBEDTLS_SSL_SRV_C */ { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } #if defined(MBEDTLS_SSL_PROTO_SSL3) if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ) { if( transform->maclen > sizeof transform->mac_enc ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } memcpy( transform->mac_enc, mac_enc, transform->maclen ); memcpy( transform->mac_dec, mac_dec, transform->maclen ); } else #endif /* MBEDTLS_SSL_PROTO_SSL3 */ #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) || \ defined(MBEDTLS_SSL_PROTO_TLS1_2) if( ssl->minor_ver >= MBEDTLS_SSL_MINOR_VERSION_1 ) { mbedtls_md_hmac_starts( &transform->md_ctx_enc, mac_enc, transform->maclen ); mbedtls_md_hmac_starts( &transform->md_ctx_dec, mac_dec, transform->maclen ); } else #endif { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } #if defined(MBEDTLS_SSL_HW_RECORD_ACCEL) if( mbedtls_ssl_hw_record_init != NULL ) { int ret = 0; MBEDTLS_SSL_DEBUG_MSG( 2, ( "going for mbedtls_ssl_hw_record_init()" ) ); if( ( ret = mbedtls_ssl_hw_record_init( ssl, key1, key2, transform->keylen, transform->iv_enc, transform->iv_dec, iv_copy_len, mac_enc, mac_dec, transform->maclen ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_hw_record_init", ret ); return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED ); } } #endif /* MBEDTLS_SSL_HW_RECORD_ACCEL */ #if defined(MBEDTLS_SSL_EXPORT_KEYS) if( ssl->conf->f_export_keys != NULL ) { ssl->conf->f_export_keys( ssl->conf->p_export_keys, session->master, keyblk, transform->maclen, transform->keylen, iv_copy_len ); } #endif if( ( ret = mbedtls_cipher_setup( &transform->cipher_ctx_enc, cipher_info ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_cipher_setup", ret ); return( ret ); } if( ( ret = mbedtls_cipher_setup( &transform->cipher_ctx_dec, cipher_info ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_cipher_setup", ret ); return( ret ); } if( ( ret = mbedtls_cipher_setkey( &transform->cipher_ctx_enc, key1, cipher_info->key_bitlen, MBEDTLS_ENCRYPT ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_cipher_setkey", ret ); return( ret ); } if( ( ret = mbedtls_cipher_setkey( &transform->cipher_ctx_dec, key2, cipher_info->key_bitlen, MBEDTLS_DECRYPT ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_cipher_setkey", ret ); return( ret ); } #if defined(MBEDTLS_CIPHER_MODE_CBC) if( cipher_info->mode == MBEDTLS_MODE_CBC ) { if( ( ret = mbedtls_cipher_set_padding_mode( &transform->cipher_ctx_enc, MBEDTLS_PADDING_NONE ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_cipher_set_padding_mode", ret ); return( ret ); } if( ( ret = mbedtls_cipher_set_padding_mode( &transform->cipher_ctx_dec, MBEDTLS_PADDING_NONE ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_cipher_set_padding_mode", ret ); return( ret ); } } #endif /* MBEDTLS_CIPHER_MODE_CBC */ mbedtls_zeroize( keyblk, sizeof( keyblk ) ); #if defined(MBEDTLS_ZLIB_SUPPORT) // Initialize compression // if( session->compression == MBEDTLS_SSL_COMPRESS_DEFLATE ) { if( ssl->compress_buf == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 3, ( "Allocating compression buffer" ) ); ssl->compress_buf = mbedtls_calloc( 1, MBEDTLS_SSL_BUFFER_LEN ); if( ssl->compress_buf == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc(%d bytes) failed", MBEDTLS_SSL_BUFFER_LEN ) ); return( MBEDTLS_ERR_SSL_ALLOC_FAILED ); } } MBEDTLS_SSL_DEBUG_MSG( 3, ( "Initializing zlib states" ) ); memset( &transform->ctx_deflate, 0, sizeof( transform->ctx_deflate ) ); memset( &transform->ctx_inflate, 0, sizeof( transform->ctx_inflate ) ); if( deflateInit( &transform->ctx_deflate, Z_DEFAULT_COMPRESSION ) != Z_OK || inflateInit( &transform->ctx_inflate ) != Z_OK ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "Failed to initialize compression" ) ); return( MBEDTLS_ERR_SSL_COMPRESSION_FAILED ); } } #endif /* MBEDTLS_ZLIB_SUPPORT */ MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= derive keys" ) ); return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x198, %rsp # imm = 0x198 movq %rdi, %rbx movq 0x58(%rdi), %rbp movq 0x60(%rdi), %r12 movq 0x80(%rdi), %r14 leaq 0x3bb06(%rip), %rdx # 0x4c4bc leaq 0x3bb6b(%rip), %r8 # 0x4c528 movl $0x2, %esi movl $0x1f5, %ecx # imm = 0x1F5 xorl %eax, %eax callq 0xf997 movq (%r14), %rax movl 0x10(%rax), %edi callq 0x2a04f movq %rax, %r15 movq (%r14), %rax testq %r15, %r15 je 0x10b66 movl 0x14(%rax), %edi callq 0x38cdb testq %rax, %rax je 0x10b87 movq %rax, %rcx movl 0x18(%rbx), %eax cmpl $0x2, %eax jg 0x10bc9 leaq 0x932(%rip), %rax # 0x11341 movq %rax, 0x608(%r12) leaq 0xc64(%rip), %rax # 0x11682 movq %rax, 0x5f8(%r12) leaq 0xd46(%rip), %rax # 0x11773 movq %rax, 0x600(%r12) movq %rcx, 0x28(%rsp) cmpl $0x0, 0xa7c(%r12) je 0x10c09 leaq 0x3ba6c(%rip), %rdx # 0x4c4bc leaq 0x3bb71(%rip), %r8 # 0x4c5c8 movq %rbx, %rdi movl $0x3, %esi movl $0x27c, %ecx # imm = 0x27C xorl %eax, %eax callq 0xf997 movq %r14, 0x48(%rsp) leaq 0x618(%r12), %r13 movups 0x618(%r12), %xmm0 movups 0x628(%r12), %xmm1 movups 0x638(%r12), %xmm2 movups 0x648(%r12), %xmm3 movaps %xmm3, 0x80(%rsp) movaps %xmm2, 0x70(%rsp) movaps %xmm1, 0x60(%rsp) movaps %xmm0, 0x50(%rsp) movups 0x638(%r12), %xmm0 movups 0x648(%r12), %xmm1 movups %xmm0, 0x618(%r12) movups %xmm1, 0x628(%r12) movaps 0x50(%rsp), %xmm0 movaps 0x60(%rsp), %xmm1 movups %xmm0, 0x638(%r12) movups %xmm1, 0x648(%r12) xorl %eax, %eax movb $0x0, 0x50(%rsp,%rax) incq %rax cmpq $0x40, %rax jne 0x10af5 leaq 0x38(%rbp), %r14 movq $0x100, (%rsp) # imm = 0x100 leaq 0x3bad1(%rip), %rdx # 0x4c5e7 leaq 0x90(%rsp), %r9 movl $0x30, %esi movl $0x40, %r8d movq %r14, %rdi movq %r13, %rcx callq *0x608(%r12) testl %eax, %eax je 0x10d71 movl %eax, %ebp leaq 0x3b974(%rip), %rdx # 0x4c4bc leaq 0x3ba75(%rip), %r8 # 0x4c5c4 movq %rbx, %rdi movl $0x1, %esi movl $0x296, %ecx # imm = 0x296 movl %ebp, %r9d callq 0xfa82 jmp 0x10bb5 movl 0x10(%rax), %r9d leaq 0x3b94b(%rip), %rdx # 0x4c4bc leaq 0x3b9bf(%rip), %r8 # 0x4c537 movq %rbx, %rdi movl $0x1, %esi movl $0x1fb, %ecx # imm = 0x1FB jmp 0x10ba9 movq (%r14), %rax movl 0x14(%rax), %r9d leaq 0x3b927(%rip), %rdx # 0x4c4bc leaq 0x3b9b8(%rip), %r8 # 0x4c554 movq %rbx, %rdi movl $0x1, %esi movl $0x203, %ecx # imm = 0x203 xorl %eax, %eax callq 0xf997 movl $0xffff8f00, %ebp # imm = 0xFFFF8F00 movl %ebp, %eax addq $0x198, %rsp # imm = 0x198 popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq cmpl $0x3, %eax jne 0x10d45 movq (%r14), %rax cmpl $0x7, 0x14(%rax) jne 0x1106f leaq 0xd61(%rip), %rax # 0x11947 movq %rax, 0x608(%r12) leaq 0xd7a(%rip), %rax # 0x1196f movq %rax, 0x5f8(%r12) leaq 0xe29(%rip), %rax # 0x11a2d jmp 0x10a2d leaq 0x658(%r12), %r13 movq 0x610(%r12), %rax movq %rax, (%rsp) leaq 0x3b898(%rip), %rdx # 0x4c4bc leaq 0x3b95e(%rip), %r8 # 0x4c589 movq %rbx, %rdi movl $0x3, %esi movl $0x243, %ecx # imm = 0x243 movq %r13, %r9 callq 0xfb06 movq 0x60(%rbx), %rax cmpl $0x1, 0xa90(%rax) movq %rbp, 0x18(%rsp) jne 0x11011 movq %r15, 0x20(%rsp) leaq 0x3b85a(%rip), %rdx # 0x4c4bc leaq 0x3b931(%rip), %r8 # 0x4c59a movq %rbx, %rdi movl $0x3, %esi movl $0x24b, %ecx # imm = 0x24B xorl %eax, %eax callq 0xf997 movq 0x60(%rbx), %rax leaq 0x90(%rsp), %rsi movq %rbx, %rdi callq *0x5f8(%rax) movl $0x24, %r15d cmpl $0x3, 0x18(%rbx) jne 0x10cbb movq 0x80(%rbx), %rax movq (%rax), %rax xorl %r15d, %r15d cmpl $0x7, 0x14(%rax) sete %r15b shll $0x4, %r15d orq $0x20, %r15 movq %r15, (%rsp) leaq 0x3b7f6(%rip), %rdx # 0x4c4bc leaq 0x3b8ea(%rip), %r8 # 0x4c5b7 leaq 0x90(%rsp), %rbp movq %rbx, %rdi movl $0x3, %esi movl $0x260, %ecx # imm = 0x260 movq %rbp, %r9 callq 0xfb06 movq 0x610(%r12), %rsi movq 0x18(%rsp), %rax leaq 0x38(%rax), %r9 movq $0x30, (%rsp) leaq 0x3b896(%rip), %rdx # 0x4c5a0 movq %r13, %rdi movq %rbp, %rcx movq %r15, %r8 callq *0x608(%r12) testl %eax, %eax je 0x1110e movl %eax, %ebp leaq 0x3b790(%rip), %rdx # 0x4c4bc leaq 0x3b891(%rip), %r8 # 0x4c5c4 movq %rbx, %rdi movl $0x1, %esi movl $0x268, %ecx # imm = 0x268 jmp 0x10b5c leaq 0x3b770(%rip), %rdx # 0x4c4bc leaq 0x3b822(%rip), %r8 # 0x4c575 movq %rbx, %rdi movl $0x1, %esi movl $0x232, %ecx # imm = 0x232 xorl %eax, %eax callq 0xf997 movl $0xffff9400, %ebp # imm = 0xFFFF9400 jmp 0x10bb5 movq %r15, 0x20(%rsp) movq %rbp, %r12 movl 0x8(%rbp), %edi callq 0x190e4 leaq 0x3b734(%rip), %rbp # 0x4c4bc leaq 0x3b866(%rip), %r8 # 0x4c5f5 xorl %r15d, %r15d movq %rbx, %rdi movl $0x3, %esi movq %rbp, %rdx movl $0x29b, %ecx # imm = 0x29B movq %rax, %r9 xorl %eax, %eax callq 0xf997 movq $0x30, (%rsp) leaq 0x3b7ee(%rip), %r8 # 0x4c5a9 movq %rbx, %rdi movl $0x3, %esi movq %rbp, %rdx movl $0x29c, %ecx # imm = 0x29C movq %r14, 0x40(%rsp) movq %r14, %r9 callq 0xfb06 movq $0x40, (%rsp) leaq 0x3efea(%rip), %r8 # 0x4fdd1 movq %rbx, %rdi movl $0x4, %esi movq %rbp, %rdx movl $0x29d, %ecx # imm = 0x29D movq %r13, %r9 callq 0xfb06 movq $0x100, (%rsp) # imm = 0x100 leaq 0x3b7f8(%rip), %r8 # 0x4c606 leaq 0x90(%rsp), %rax movq %rbx, %rdi movl $0x4, %esi movq %rbp, %rdx movq %rax, %rbp movl $0x29e, %ecx # imm = 0x29E movq %rax, %r9 callq 0xfb06 movb $0x0, (%r13,%r15) incq %r15 cmpq $0x40, %r15 jne 0x10e31 movq 0x20(%rsp), %r15 movl 0x8(%r15), %eax shrl $0x3, %eax movq 0x48(%rsp), %r14 movl %eax, 0x8(%r14) movl 0x4(%r15), %eax cmpl $0x8, %eax je 0x10e67 cmpl $0x6, %eax jne 0x11099 movq $0x0, 0x28(%r14) movq $0xc, 0x18(%r14) movq $0x4, 0x20(%r14) movq (%r14), %rax xorl %ecx, %ecx testb $0x2, 0x2c(%rax) sete %cl leaq 0x10(,%rcx,8), %rdi movq %rdi, 0x10(%r14) movl $0xc, %esi xorl %ecx, %ecx movl 0x8(%r14), %r9d movq %rcx, 0x10(%rsp) movq %rsi, 0x8(%rsp) movq %rdi, (%rsp) leaq 0x3b605(%rip), %rdx # 0x4c4bc leaq 0x3b763(%rip), %r8 # 0x4c621 movq %rbx, %rdi movl $0x3, %esi movl $0x2ff, %ecx # imm = 0x2FF xorl %eax, %eax callq 0xf997 movq (%rbx), %rax movl 0x174(%rax), %ecx andl $0x1, %ecx movq 0x28(%r14), %rsi leaq (%rsp,%rsi,2), %rdx addq $0x90, %rdx movl 0x8(%r14), %eax leaq (%rdx,%rax), %r12 movl %ecx, %edi shll $0x4, %edi addq $0x30, %rdi xorl %r15d, %r15d testl %ecx, %ecx movq %rsi, 0x28(%rsp) leaq 0x90(%rsp,%rsi), %r13 movq %rbp, %rcx cmoveq %r13, %rcx movq %rcx, 0x18(%rsp) sete %r15b cmoveq %rbp, %r13 movq %rdx, %rcx cmoveq %r12, %rcx movq %rcx, 0x30(%rsp) cmovneq %r12, %rdx movq %rdx, 0x38(%rsp) movq 0x20(%r14), %rbp shll $0x4, %r15d addq $0x30, %r15 testq %rbp, %rbp jne 0x10f4e movq 0x18(%r14), %rbp addq %r14, %rdi addq %rax, %r12 movq %r12, %rsi movq %rbp, %rdx callq 0xf240 addq %r14, %r15 addq %rbp, %r12 movq %r15, %rdi movq %r12, %rsi movq %rbp, %rdx callq 0xf240 cmpl $0x0, 0x18(%rbx) jle 0x110ee leaq 0x50(%r14), %rdi movq %r13, %rsi movq 0x28(%rsp), %rdx callq 0x38fa0 leaq 0x68(%r14), %rdi movq 0x28(%r14), %rdx movq 0x18(%rsp), %rsi callq 0x38fa0 movq (%rbx), %rcx movq 0xb8(%rcx), %rax testq %rax, %rax je 0x10fd0 movq 0xc0(%rcx), %rdi movq 0x28(%r14), %rcx movl 0x8(%r14), %r8d leaq 0x90(%rsp), %rdx movq 0x40(%rsp), %rsi movq %rbp, %r9 callq *%rax leaq 0x80(%r14), %r12 movq %r12, %rdi movq 0x20(%rsp), %r15 movq %r15, %rsi callq 0x2a149 testl %eax, %eax je 0x11130 movl %eax, %ebp leaq 0x3b4c4(%rip), %rdx # 0x4c4bc leaq 0x3b650(%rip), %r8 # 0x4c64f movq %rbx, %rdi movl $0x1, %esi movl $0x36d, %ecx # imm = 0x36D jmp 0x10b5c movq 0x610(%r12), %rsi leaq 0x618(%r12), %rcx leaq 0x38(%rbp), %r9 movq $0x30, (%rsp) leaq 0x3b575(%rip), %rdx # 0x4c5a9 movl $0x40, %r8d movq %r13, %rdi callq *0x608(%r12) testl %eax, %eax je 0x11113 movl %eax, %ebp leaq 0x3b466(%rip), %rdx # 0x4c4bc leaq 0x3b567(%rip), %r8 # 0x4c5c4 movq %rbx, %rdi movl $0x1, %esi movl $0x275, %ecx # imm = 0x275 jmp 0x10b5c leaq 0xb1a(%rip), %rax # 0x11b90 movq %rax, 0x608(%r12) leaq 0xb33(%rip), %rax # 0x11bb8 movq %rax, 0x5f8(%r12) leaq 0xbdc(%rip), %rax # 0x11c70 jmp 0x10a2d leaq 0x50(%r14), %rdi movq 0x28(%rsp), %r13 movq %r13, %rsi movl $0x1, %edx callq 0x38da1 testl %eax, %eax jne 0x110cc leaq 0x68(%r14), %rdi movq %r13, %rsi movl $0x1, %edx callq 0x38da1 testl %eax, %eax je 0x111a8 movl %eax, %ebp leaq 0x3b3e7(%rip), %rdx # 0x4c4bc leaq 0x3b534(%rip), %r8 # 0x4c610 movq %rbx, %rdi movl $0x1, %esi movl $0x2bb, %ecx # imm = 0x2BB jmp 0x10b5c leaq 0x3b3c7(%rip), %rdx # 0x4c4bc leaq 0x3b479(%rip), %r8 # 0x4c575 movq %rbx, %rdi movl $0x1, %esi movl $0x349, %ecx # imm = 0x349 jmp 0x10d60 movq 0x20(%rsp), %r15 xorl %eax, %eax movq 0x18(%rsp), %rbp movb $0x0, (%r13,%rax) incq %rax cmpq $0x424, %rax # imm = 0x424 jne 0x1111a jmp 0x10a6b addq $0xd8, %r14 movq %r14, %rdi movq %r15, %rsi callq 0x2a149 testl %eax, %eax je 0x11168 movl %eax, %ebp leaq 0x3b36d(%rip), %rdx # 0x4c4bc leaq 0x3b4f9(%rip), %r8 # 0x4c64f movq %rbx, %rdi movl $0x1, %esi movl $0x374, %ecx # imm = 0x374 jmp 0x10b5c movl 0x8(%r15), %edx movq %r12, %rdi movq 0x38(%rsp), %rsi movl $0x1, %ecx callq 0x2a207 testl %eax, %eax je 0x11239 movl %eax, %ebp leaq 0x3b32d(%rip), %rdx # 0x4c4bc leaq 0x3b4ce(%rip), %r8 # 0x4c664 movq %rbx, %rdi movl $0x1, %esi movl $0x37c, %ecx # imm = 0x37C jmp 0x10b5c movq %r13, %rdi callq 0x39265 movzbl %al, %eax cmpl $0x1, 0x90(%r12) movl $0xa, %ecx cmovneq %rax, %rcx movq %rcx, 0x28(%r14) movl 0x18(%r15), %esi movq %rsi, 0x18(%r14) cmpl $0x7, 0x4(%r15) jne 0x111ec movq %rcx, 0x10(%r14) movq %rcx, %rdi leaq 0x90(%rsp), %rbp jmp 0x10e9e movl 0x20(%r15), %r8d leaq (%rcx,%r8), %rdi cmpl $0x1, 0x94(%r12) leaq 0x90(%rsp), %rbp je 0x11211 movl %ecx, %eax xorl %edx, %edx divl %r8d subq %rdx, %rdi movq %rdi, 0x10(%r14) movl 0x18(%rbx), %eax cmpl $0x2, %eax jb 0x10e9e addl $-0x2, %eax cmpl $0x1, %eax ja 0x112b0 addq %rsi, %rdi movq %rdi, 0x10(%r14) jmp 0x10e9e movl 0x8(%r15), %edx movq %r14, %rdi movq 0x30(%rsp), %rsi xorl %ecx, %ecx callq 0x2a207 testl %eax, %eax je 0x11272 movl %eax, %ebp leaq 0x3b263(%rip), %rdx # 0x4c4bc leaq 0x3b404(%rip), %r8 # 0x4c664 movq %rbx, %rdi movl $0x1, %esi movl $0x384, %ecx # imm = 0x384 jmp 0x10b5c cmpl $0x2, 0x4(%r15) jne 0x11303 movq %r12, %rdi movl $0x4, %esi callq 0x2a1c7 testl %eax, %eax je 0x112d0 movl %eax, %ebp leaq 0x3b225(%rip), %rdx # 0x4c4bc leaq 0x3b3dc(%rip), %r8 # 0x4c67a movq %rbx, %rdi movl $0x1, %esi movl $0x38e, %ecx # imm = 0x38E jmp 0x10b5c leaq 0x3b205(%rip), %rdx # 0x4c4bc leaq 0x3b2b7(%rip), %r8 # 0x4c575 movq %rbx, %rdi movl $0x1, %esi movl $0x2f7, %ecx # imm = 0x2F7 jmp 0x10d60 movq %r14, %rdi movl $0x4, %esi callq 0x2a1c7 testl %eax, %eax je 0x11303 movl %eax, %ebp leaq 0x3b1d2(%rip), %rdx # 0x4c4bc leaq 0x3b389(%rip), %r8 # 0x4c67a movq %rbx, %rdi movl $0x1, %esi movl $0x395, %ecx # imm = 0x395 jmp 0x10b5c xorl %eax, %eax movb $0x0, 0x90(%rsp,%rax) incq %rax cmpq $0x100, %rax # imm = 0x100 jne 0x11305 leaq 0x3b19d(%rip), %rdx # 0x4c4bc leaq 0x3b374(%rip), %r8 # 0x4c69a xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x3bd, %ecx # imm = 0x3BD xorl %eax, %eax callq 0xf997 jmp 0x10bb5
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
ssl_calc_verify_tls
void ssl_calc_verify_tls( mbedtls_ssl_context *ssl, unsigned char hash[36] ) { mbedtls_md5_context md5; mbedtls_sha1_context sha1; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> calc verify tls" ) ); mbedtls_md5_init( &md5 ); mbedtls_sha1_init( &sha1 ); mbedtls_md5_clone( &md5, &ssl->handshake->fin_md5 ); mbedtls_sha1_clone( &sha1, &ssl->handshake->fin_sha1 ); mbedtls_md5_finish( &md5, hash ); mbedtls_sha1_finish( &sha1, hash + 16 ); MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, 36 ); MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= calc verify" ) ); mbedtls_md5_free( &md5 ); mbedtls_sha1_free( &sha1 ); return; }
pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0xc0, %rsp movq %rsi, %r15 movq %rdi, %rbx leaq 0x3ae1d(%rip), %r14 # 0x4c4bc leaq 0x3c05c(%rip), %r8 # 0x4d702 movl $0x2, %esi movq %r14, %rdx movl $0x3f9, %ecx # imm = 0x3F9 xorl %eax, %eax callq 0xf997 leaq 0xc(%rsp), %r12 movq %r12, %rdi callq 0x3928c leaq 0x64(%rsp), %r13 movq %r13, %rdi callq 0x40c04 movl $0x3f8, %esi # imm = 0x3F8 addq 0x60(%rbx), %rsi movq %r12, %rdi callq 0x392c0 movl $0x450, %esi # imm = 0x450 addq 0x60(%rbx), %rsi movq %r13, %rdi callq 0x40c34 movq %r12, %rdi movq %r15, %rsi callq 0x39b50 leaq 0x10(%r15), %rsi movq %r13, %rdi callq 0x41e45 movq $0x24, (%rsp) leaq 0x3bff9(%rip), %r8 # 0x4d715 movq %rbx, %rdi movl $0x3, %esi movq %r14, %rdx movl $0x404, %ecx # imm = 0x404 movq %r15, %r9 callq 0xfb06 leaq 0x3bff3(%rip), %r8 # 0x4d72e movq %rbx, %rdi movl $0x2, %esi movq %r14, %rdx movl $0x405, %ecx # imm = 0x405 xorl %eax, %eax callq 0xf997 movq %r12, %rdi callq 0x392ab movq %r13, %rdi callq 0x40c1f addq $0xc0, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
ssl_calc_finished_tls_sha256
static void ssl_calc_finished_tls_sha256( mbedtls_ssl_context *ssl, unsigned char *buf, int from ) { int len = 12; const char *sender; mbedtls_sha256_context sha256; unsigned char padbuf[32]; mbedtls_ssl_session *session = ssl->session_negotiate; if( !session ) session = ssl->session; mbedtls_sha256_init( &sha256 ); MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> calc finished tls sha256" ) ); mbedtls_sha256_clone( &sha256, &ssl->handshake->fin_sha256 ); /* * TLSv1.2: * hash = PRF( master, finished_label, * Hash( handshake ) )[0.11] */ #if !defined(MBEDTLS_SHA256_ALT) MBEDTLS_SSL_DEBUG_BUF( 4, "finished sha2 state", (unsigned char *) sha256.state, sizeof( sha256.state ) ); #endif sender = ( from == MBEDTLS_SSL_IS_CLIENT ) ? "client finished" : "server finished"; mbedtls_sha256_finish( &sha256, padbuf ); ssl->handshake->tls_prf( session->master, 48, sender, padbuf, 32, buf, len ); MBEDTLS_SSL_DEBUG_BUF( 3, "calc finished result", buf, len ); mbedtls_sha256_free( &sha256 ); mbedtls_zeroize( padbuf, sizeof( padbuf ) ); MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= calc finished" ) ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0xa8, %rsp movl %edx, %ebp movq %rsi, 0x8(%rsp) movq %rdi, %rbx movq 0x58(%rdi), %r12 testq %r12, %r12 jne 0x11c98 movq 0x50(%rbx), %r12 leaq 0x3c(%rsp), %r14 movq %r14, %rdi callq 0x42170 leaq 0x3a810(%rip), %r13 # 0x4c4bc leaq 0x3c24d(%rip), %r8 # 0x4df00 xorl %r15d, %r15d movq %rbx, %rdi movl $0x2, %esi movq %r13, %rdx movl $0x12f8, %ecx # imm = 0x12F8 xorl %eax, %eax callq 0xf997 movl $0x4ac, %esi # imm = 0x4AC addq 0x60(%rbx), %rsi movq %r14, %rdi callq 0x421a4 leaq 0x44(%rsp), %r9 movq $0x20, (%rsp) leaq 0x3c22b(%rip), %r8 # 0x4df1d movq %rbx, %rdi movl $0x4, %esi movq %r13, %rdx movl $0x1304, %ecx # imm = 0x1304 callq 0xfb06 testl %ebp, %ebp leaq 0x3c1a9(%rip), %rax # 0x4deb9 leaq 0x3c1b2(%rip), %rbp # 0x4dec9 cmoveq %rax, %rbp leaq 0x10(%rsp), %r13 movq %r14, %rdi movq %r13, %rsi callq 0x42cc1 movq 0x60(%rbx), %rax addq $0x38, %r12 movl $0xc, %r14d movq %r14, (%rsp) movl $0x30, %esi movl $0x20, %r8d movq %r12, %rdi movq %rbp, %rdx movq %r13, %rcx movq 0x8(%rsp), %r12 movq %r12, %r9 callq *0x608(%rax) movq %r14, (%rsp) leaq 0x3c16f(%rip), %r8 # 0x4ded9 movq %rbx, %rdi movl $0x3, %esi leaq 0x3a743(%rip), %rdx # 0x4c4bc movl $0x1310, %ecx # imm = 0x1310 movq %r12, %r9 callq 0xfb06 leaq 0x3c(%rsp), %rdi callq 0x4218f movb $0x0, 0x10(%rsp,%r15) incq %r15 cmpq $0x20, %r15 jne 0x11d90 leaq 0x3a716(%rip), %rdx # 0x4c4bc leaq 0x3c141(%rip), %r8 # 0x4deee movq %rbx, %rdi movl $0x2, %esi movl $0x1316, %ecx # imm = 0x1316 xorl %eax, %eax callq 0xf997 addq $0xa8, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_fetch_input
int mbedtls_ssl_fetch_input( mbedtls_ssl_context *ssl, size_t nb_want ) { int ret; size_t len; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> fetch input" ) ); if( ssl->f_recv == NULL && ssl->f_recv_timeout == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "Bad usage of mbedtls_ssl_set_bio() " "or mbedtls_ssl_set_bio()" ) ); return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); } if( nb_want > MBEDTLS_SSL_BUFFER_LEN - (size_t)( ssl->in_hdr - ssl->in_buf ) ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "requesting more data than fits" ) ); return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); } #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) { uint32_t timeout; /* Just to be sure */ if( ssl->f_set_timer == NULL || ssl->f_get_timer == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "You must use " "mbedtls_ssl_set_timer_cb() for DTLS" ) ); return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); } /* * The point is, we need to always read a full datagram at once, so we * sometimes read more then requested, and handle the additional data. * It could be the rest of the current record (while fetching the * header) and/or some other records in the same datagram. */ /* * Move to the next record in the already read datagram if applicable */ if( ssl->next_record_offset != 0 ) { if( ssl->in_left < ssl->next_record_offset ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } ssl->in_left -= ssl->next_record_offset; if( ssl->in_left != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "next record in same datagram, offset: %d", ssl->next_record_offset ) ); memmove( ssl->in_hdr, ssl->in_hdr + ssl->next_record_offset, ssl->in_left ); } ssl->next_record_offset = 0; } MBEDTLS_SSL_DEBUG_MSG( 2, ( "in_left: %d, nb_want: %d", ssl->in_left, nb_want ) ); /* * Done if we already have enough data. */ if( nb_want <= ssl->in_left) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= fetch input" ) ); return( 0 ); } /* * A record can't be split accross datagrams. If we need to read but * are not at the beginning of a new record, the caller did something * wrong. */ if( ssl->in_left != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } /* * Don't even try to read if time's out already. * This avoids by-passing the timer when repeatedly receiving messages * that will end up being dropped. */ if( ssl_check_timer( ssl ) != 0 ) ret = MBEDTLS_ERR_SSL_TIMEOUT; else { len = MBEDTLS_SSL_BUFFER_LEN - ( ssl->in_hdr - ssl->in_buf ); if( ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER ) timeout = ssl->handshake->retransmit_timeout; else timeout = ssl->conf->read_timeout; MBEDTLS_SSL_DEBUG_MSG( 3, ( "f_recv_timeout: %u ms", timeout ) ); if( ssl->f_recv_timeout != NULL ) ret = ssl->f_recv_timeout( ssl->p_bio, ssl->in_hdr, len, timeout ); else ret = ssl->f_recv( ssl->p_bio, ssl->in_hdr, len ); MBEDTLS_SSL_DEBUG_RET( 2, "ssl->f_recv(_timeout)", ret ); if( ret == 0 ) return( MBEDTLS_ERR_SSL_CONN_EOF ); } if( ret == MBEDTLS_ERR_SSL_TIMEOUT ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "timeout" ) ); ssl_set_timer( ssl, 0 ); if( ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER ) { if( ssl_double_retransmit_timeout( ssl ) != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "handshake timeout" ) ); return( MBEDTLS_ERR_SSL_TIMEOUT ); } if( ( ret = mbedtls_ssl_resend( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_resend", ret ); return( ret ); } return( MBEDTLS_ERR_SSL_WANT_READ ); } #if defined(MBEDTLS_SSL_SRV_C) && defined(MBEDTLS_SSL_RENEGOTIATION) else if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER && ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_PENDING ) { if( ( ret = ssl_resend_hello_request( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "ssl_resend_hello_request", ret ); return( ret ); } return( MBEDTLS_ERR_SSL_WANT_READ ); } #endif /* MBEDTLS_SSL_SRV_C && MBEDTLS_SSL_RENEGOTIATION */ } if( ret < 0 ) return( ret ); ssl->in_left = ret; } else #endif { MBEDTLS_SSL_DEBUG_MSG( 2, ( "in_left: %d, nb_want: %d", ssl->in_left, nb_want ) ); while( ssl->in_left < nb_want ) { len = nb_want - ssl->in_left; if( ssl_check_timer( ssl ) != 0 ) ret = MBEDTLS_ERR_SSL_TIMEOUT; else { if( ssl->f_recv_timeout != NULL ) { ret = ssl->f_recv_timeout( ssl->p_bio, ssl->in_hdr + ssl->in_left, len, ssl->conf->read_timeout ); } else { ret = ssl->f_recv( ssl->p_bio, ssl->in_hdr + ssl->in_left, len ); } } MBEDTLS_SSL_DEBUG_MSG( 2, ( "in_left: %d, nb_want: %d", ssl->in_left, nb_want ) ); MBEDTLS_SSL_DEBUG_RET( 2, "ssl->f_recv(_timeout)", ret ); if( ret == 0 ) return( MBEDTLS_ERR_SSL_CONN_EOF ); if( ret < 0 ) return( ret ); ssl->in_left += ret; } } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= fetch input" ) ); return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx pushq %rax movq %rsi, %r14 movq %rdi, %rbx leaq 0x3a476(%rip), %rdx # 0x4c4bc leaq 0x3a69d(%rip), %r8 # 0x4c6ea movl $0x2, %esi movl $0x8a0, %ecx # imm = 0x8A0 xorl %eax, %eax callq 0xf997 cmpq $0x0, 0x28(%rbx) jne 0x12070 cmpq $0x0, 0x30(%rbx) je 0x1223f movq 0xa0(%rbx), %rax subq 0xb0(%rbx), %rax addq $0x414d, %rax # imm = 0x414D cmpq %r14, %rax jae 0x120a9 leaq 0x3a42c(%rip), %rdx # 0x4c4bc leaq 0x3a69e(%rip), %r8 # 0x4c735 movq %rbx, %rdi movl $0x1, %esi movl $0x8ab, %ecx # imm = 0x8AB jmp 0x12277 movq (%rbx), %rax testb $0x2, 0x174(%rax) jne 0x121ef movq 0xe8(%rbx), %r9 movq %r14, (%rsp) leaq 0x3a3f1(%rip), %rdx # 0x4c4bc leaq 0x3a6dc(%rip), %r8 # 0x4c7ae movq %rbx, %rdi movl $0x2, %esi movl $0x93e, %ecx # imm = 0x93E xorl %eax, %eax callq 0xf997 movq 0xe8(%rbx), %r12 cmpq %r14, %r12 jae 0x121c6 leaq 0x3a3bf(%rip), %r15 # 0x4c4bc leaq 0x3a6e8(%rip), %r13 # 0x4c7ec movq %rbx, %rdi callq 0x12563 movl $0xffff9800, %ebp # imm = 0xFFFF9800 testl %eax, %eax jne 0x1215a movq %r14, %rdx subq %r12, %rdx movq 0x30(%rbx), %rax testq %rax, %rax je 0x12143 movq (%rbx), %rcx movq 0x38(%rbx), %rdi movq 0xb0(%rbx), %rsi addq 0xe8(%rbx), %rsi movl 0x150(%rcx), %ecx callq *%rax jmp 0x12158 movq 0x38(%rbx), %rdi movq 0xb0(%rbx), %rsi addq 0xe8(%rbx), %rsi callq *0x28(%rbx) movl %eax, %ebp movq 0xe8(%rbx), %r9 movq %r14, (%rsp) movq %rbx, %rdi movl $0x2, %esi movq %r15, %rdx movl $0x956, %ecx # imm = 0x956 leaq 0x3a632(%rip), %r8 # 0x4c7ae xorl %eax, %eax callq 0xf997 movq %rbx, %rdi movl $0x2, %esi movq %r15, %rdx movl $0x957, %ecx # imm = 0x957 movq %r13, %r8 movl %ebp, %r9d callq 0xfa82 testl %ebp, %ebp je 0x1254f js 0x12283 movl %ebp, %r12d addq 0xe8(%rbx), %r12 movq %r12, 0xe8(%rbx) cmpq %r14, %r12 jb 0x12104 leaq 0x3a2ef(%rip), %rdx # 0x4c4bc leaq 0x3a5f3(%rip), %r8 # 0x4c7c7 xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x963, %ecx # imm = 0x963 xorl %eax, %eax callq 0xf997 jmp 0x12283 cmpq $0x0, 0x90(%rbx) je 0x1225c cmpq $0x0, 0x98(%rbx) je 0x1225c movq 0xf8(%rbx), %r9 testq %r9, %r9 je 0x122e7 movq 0xe8(%rbx), %rax subq %r9, %rax jae 0x12294 leaq 0x3a296(%rip), %rdx # 0x4c4bc leaq 0x3a348(%rip), %r8 # 0x4c575 movq %rbx, %rdi movl $0x1, %esi movl $0x8ca, %ecx # imm = 0x8CA jmp 0x12342 leaq 0x3a276(%rip), %rdx # 0x4c4bc leaq 0x3a4ac(%rip), %r8 # 0x4c6f9 movq %rbx, %rdi movl $0x1, %esi movl $0x8a5, %ecx # imm = 0x8A5 jmp 0x12277 leaq 0x3a259(%rip), %rdx # 0x4c4bc leaq 0x3a4ea(%rip), %r8 # 0x4c754 movq %rbx, %rdi movl $0x1, %esi movl $0x8b8, %ecx # imm = 0x8B8 xorl %eax, %eax callq 0xf997 movl $0xffff8f00, %ebp # imm = 0xFFFF8F00 movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq movq %rax, 0xe8(%rbx) je 0x122dc leaq 0x3a218(%rip), %rdx # 0x4c4bc leaq 0x3a4da(%rip), %r8 # 0x4c785 movq %rbx, %rdi movl $0x2, %esi movl $0x8d3, %ecx # imm = 0x8D3 xorl %eax, %eax callq 0xf997 movq 0xb0(%rbx), %rdi movq 0xe8(%rbx), %rdx movq 0xf8(%rbx), %rsi addq %rdi, %rsi callq 0xf2e0 movq $0x0, 0xf8(%rbx) movq 0xe8(%rbx), %r9 movq %r14, (%rsp) leaq 0x3a1c3(%rip), %rdx # 0x4c4bc leaq 0x3a4ae(%rip), %r8 # 0x4c7ae xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x8dd, %ecx # imm = 0x8DD xorl %eax, %eax callq 0xf997 movq 0xe8(%rbx), %rax cmpq %r14, %rax jae 0x12353 testq %rax, %rax je 0x12373 leaq 0x3a18e(%rip), %rdx # 0x4c4bc leaq 0x3a240(%rip), %r8 # 0x4c575 movq %rbx, %rdi movl $0x1, %esi movl $0x8ef, %ecx # imm = 0x8EF xorl %eax, %eax callq 0xf997 movl $0xffff9400, %ebp # imm = 0xFFFF9400 jmp 0x12283 leaq 0x3a162(%rip), %rdx # 0x4c4bc leaq 0x3a466(%rip), %r8 # 0x4c7c7 movq %rbx, %rdi movl $0x2, %esi movl $0x8e4, %ecx # imm = 0x8E4 jmp 0x121e3 movq %rbx, %rdi callq 0x12563 testl %eax, %eax je 0x12442 leaq 0x3a132(%rip), %rdx # 0x4c4bc leaq 0x3a47b(%rip), %r8 # 0x4c80c movq %rbx, %rdi movl $0x2, %esi movl $0x913, %ecx # imm = 0x913 xorl %eax, %eax callq 0xf997 movq %rbx, %rdi xorl %esi, %esi callq 0x125b5 cmpl $0x10, 0x8(%rbx) jne 0x12406 movq (%rbx), %rax movl $0xffff9800, %ebp # imm = 0xFFFF9800 testb $0x1, 0x174(%rax) je 0x12283 cmpl $0x3, 0xc(%rbx) jne 0x12283 movq %rbx, %rdi callq 0x12812 testl %eax, %eax je 0x12559 movl %eax, %ebp leaq 0x3a0cf(%rip), %rdx # 0x4c4bc leaq 0x3a420(%rip), %r8 # 0x4c814 movq %rbx, %rdi movl $0x1, %esi movl $0x92c, %ecx # imm = 0x92C jmp 0x124e6 movq %rbx, %rdi callq 0x12609 testl %eax, %eax je 0x124b9 leaq 0x3a09f(%rip), %rdx # 0x4c4bc leaq 0x3a3de(%rip), %r8 # 0x4c802 movq %rbx, %rdi movl $0x1, %esi movl $0x91a, %ecx # imm = 0x91A xorl %eax, %eax callq 0xf997 movl $0xffff9800, %ebp # imm = 0xFFFF9800 jmp 0x12283 movq 0xa0(%rbx), %r14 subq 0xb0(%rbx), %r14 addq $0x414d, %r14 # imm = 0x414D leaq 0x60(%rbx), %rax cmpl $0x10, 0x8(%rbx) cmoveq %rbx, %rax movl $0x150, %ecx # imm = 0x150 movl $0x3c8, %edx # imm = 0x3C8 cmoveq %rcx, %rdx movq (%rax), %rax movl (%rax,%rdx), %ebp leaq 0x3a03e(%rip), %rdx # 0x4c4bc leaq 0x3a351(%rip), %r8 # 0x4c7d6 movq %rbx, %rdi movl $0x3, %esi movl $0x903, %ecx # imm = 0x903 movl %ebp, %r9d xorl %eax, %eax callq 0xf997 movq 0x30(%rbx), %rax testq %rax, %rax je 0x124f3 movq 0x38(%rbx), %rdi movq 0xb0(%rbx), %rsi movq %r14, %rdx movl %ebp, %ecx callq *%rax jmp 0x12504 movq %rbx, %rdi callq 0x12663 testl %eax, %eax je 0x12559 movl %eax, %ebp leaq 0x39fea(%rip), %rdx # 0x4c4bc leaq 0x3a42c(%rip), %r8 # 0x4c905 movq %rbx, %rdi movl $0x1, %esi movl $0x920, %ecx # imm = 0x920 movl %ebp, %r9d callq 0xfa82 jmp 0x12283 movq 0x38(%rbx), %rdi movq 0xb0(%rbx), %rsi movq %r14, %rdx callq *0x28(%rbx) movl %eax, %ebp leaq 0x39faf(%rip), %rdx # 0x4c4bc leaq 0x3a2d8(%rip), %r8 # 0x4c7ec movq %rbx, %rdi movl $0x2, %esi movl $0x90b, %ecx # imm = 0x90B movl %eax, %r9d callq 0xfa82 testl %ebp, %ebp je 0x1254f cmpl $0xffff9800, %ebp # imm = 0xFFFF9800 je 0x12383 testl %ebp, %ebp js 0x12283 movl %ebp, %eax movq %rax, 0xe8(%rbx) jmp 0x121c6 movl $0xffff8d80, %ebp # imm = 0xFFFF8D80 jmp 0x12283 movl $0xffff9700, %ebp # imm = 0xFFFF9700 jmp 0x12283
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_flush_output
int mbedtls_ssl_flush_output( mbedtls_ssl_context *ssl ) { int ret; unsigned char *buf, i; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> flush output" ) ); if( ssl->f_send == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "Bad usage of mbedtls_ssl_set_bio() " "or mbedtls_ssl_set_bio()" ) ); return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); } /* Avoid incrementing counter if data is flushed */ if( ssl->out_left == 0 ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= flush output" ) ); return( 0 ); } while( ssl->out_left > 0 ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "message length: %d, out_left: %d", mbedtls_ssl_hdr_len( ssl ) + ssl->out_msglen, ssl->out_left ) ); buf = ssl->out_hdr + mbedtls_ssl_hdr_len( ssl ) + ssl->out_msglen - ssl->out_left; ret = ssl->f_send( ssl->p_bio, buf, ssl->out_left ); MBEDTLS_SSL_DEBUG_RET( 2, "ssl->f_send", ret ); if( ret <= 0 ) return( ret ); ssl->out_left -= ret; } for( i = 8; i > ssl_ep_len( ssl ); i-- ) if( ++ssl->out_ctr[i - 1] != 0 ) break; /* The loop goes to its end iff the counter is wrapping */ if( i == ssl_ep_len( ssl ) ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "outgoing message counter would wrap" ) ); return( MBEDTLS_ERR_SSL_COUNTER_WRAPPING ); } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= flush output" ) ); return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r12 pushq %rbx subq $0x10, %rsp movq %rdi, %rbx leaq 0x39c2b(%rip), %rdx # 0x4c4bc leaq 0x39f95(%rip), %r8 # 0x4c82d movl $0x2, %esi movl $0x970, %ecx # imm = 0x970 xorl %eax, %eax callq 0xf997 cmpq $0x0, 0x20(%rbx) je 0x129ac movq 0x160(%rbx), %rax testq %rax, %rax je 0x129d5 leaq 0x39bf1(%rip), %r14 # 0x4c4bc leaq 0x39f7b(%rip), %r15 # 0x4c84d leaq 0x39f95(%rip), %r12 # 0x4c86e movq (%rbx), %rcx movq 0x158(%rbx), %rdx movl 0x174(%rcx), %ecx andl $0x2, %ecx leaq (%rdx,%rcx,4), %r9 addq $0x5, %r9 movq %rax, (%rsp) movq %rbx, %rdi movl $0x2, %esi movq %r14, %rdx movl $0x983, %ecx # imm = 0x983 movq %r15, %r8 xorl %eax, %eax callq 0xf997 movq (%rbx), %rax movl 0x174(%rax), %esi andl $0x2, %esi shlq $0x2, %rsi addq 0x130(%rbx), %rsi addq 0x158(%rbx), %rsi movq 0x38(%rbx), %rdi movq 0x160(%rbx), %rdx subq %rdx, %rsi addq $0x5, %rsi callq *0x20(%rbx) movl %eax, %ebp movq %rbx, %rdi movl $0x2, %esi movq %r14, %rdx movl $0x989, %ecx # imm = 0x989 movq %r12, %r8 movl %eax, %r9d callq 0xfa82 testl %ebp, %ebp jle 0x12a4e movl %ebp, %ecx movq 0x160(%rbx), %rax subq %rcx, %rax movq %rax, 0x160(%rbx) jne 0x128d9 movb $0x8, %al movzbl %al, %ecx movq 0x128(%rbx), %rdx incb -0x1(%rdx,%rcx) movq (%rbx), %rdx jne 0x129f4 decb %al movl 0x174(%rdx), %edx andl $0x2, %edx movzbl %al, %ecx cmpl %ecx, %edx jb 0x12985 jmp 0x129fd leaq 0x39b09(%rip), %rdx # 0x4c4bc leaq 0x39d3f(%rip), %r8 # 0x4c6f9 movq %rbx, %rdi movl $0x1, %esi movl $0x975, %ecx # imm = 0x975 xorl %eax, %eax callq 0xf997 movl $0xffff8f00, %ebp # imm = 0xFFFF8F00 jmp 0x12a4e leaq 0x39ae0(%rip), %rdx # 0x4c4bc leaq 0x39e5a(%rip), %r8 # 0x4c83d xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x97c, %ecx # imm = 0x97C jmp 0x12a47 movl 0x174(%rdx), %edx andl $0x2, %edx cmpl %ecx, %edx jne 0x12a2a leaq 0x39ab4(%rip), %rdx # 0x4c4bc leaq 0x39e6b(%rip), %r8 # 0x4c87a movq %rbx, %rdi movl $0x1, %esi movl $0x998, %ecx # imm = 0x998 xorl %eax, %eax callq 0xf997 movl $0xffff9480, %ebp # imm = 0xFFFF9480 jmp 0x12a4e leaq 0x39a8b(%rip), %rdx # 0x4c4bc leaq 0x39e05(%rip), %r8 # 0x4c83d xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x99c, %ecx # imm = 0x99C xorl %eax, %eax callq 0xf997 movl %ebp, %eax addq $0x10, %rsp popq %rbx popq %r12 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_dtls_replay_check
int mbedtls_ssl_dtls_replay_check( mbedtls_ssl_context *ssl ) { uint64_t rec_seqnum = ssl_load_six_bytes( ssl->in_ctr + 2 ); uint64_t bit; if( ssl->conf->anti_replay == MBEDTLS_SSL_ANTI_REPLAY_DISABLED ) return( 0 ); if( rec_seqnum > ssl->in_window_top ) return( 0 ); bit = ssl->in_window_top - rec_seqnum; if( bit >= 64 ) return( -1 ); if( ( ssl->in_window & ( (uint64_t) 1 << bit ) ) != 0 ) return( -1 ); return( 0 ); }
movq (%rdi), %rcx xorl %eax, %eax testb $0x10, 0x175(%rcx) je 0x1414f movq 0xa8(%rdi), %rcx movzbl 0x2(%rcx), %edx shlq $0x28, %rdx movzbl 0x3(%rcx), %esi shlq $0x20, %rsi orq %rdx, %rsi movzbl 0x4(%rcx), %edx shll $0x18, %edx orq %rsi, %rdx movzbl 0x5(%rcx), %esi shll $0x10, %esi orq %rdx, %rsi movzbl 0x6(%rcx), %edx shll $0x8, %edx orq %rsi, %rdx movzbl 0x7(%rcx), %esi orq %rdx, %rsi movq 0x100(%rdi), %rcx subq %rsi, %rcx jb 0x1414f movl $0xffffffff, %eax # imm = 0xFFFFFFFF cmpq $0x3f, %rcx ja 0x1414f movq 0x108(%rdi), %rdx xorl %eax, %eax btq %rcx, %rdx sbbl %eax, %eax retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_read_record
int mbedtls_ssl_read_record( mbedtls_ssl_context *ssl ) { int ret; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> read record" ) ); do { if( ( ret = mbedtls_ssl_read_record_layer( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, ( "mbedtls_ssl_read_record_layer" ), ret ); return( ret ); } ret = mbedtls_ssl_handle_message_type( ssl ); } while( MBEDTLS_ERR_SSL_NON_FATAL == ret ); if( 0 != ret ) { MBEDTLS_SSL_DEBUG_RET( 1, ( "mbedtls_ssl_handle_message_type" ), ret ); return( ret ); } if( ssl->in_msgtype == MBEDTLS_SSL_MSG_HANDSHAKE ) { mbedtls_ssl_update_handshake_status( ssl ); } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= read record" ) ); return( 0 ); }
pushq %rbp pushq %rbx pushq %rax movq %rdi, %rbx leaq 0x382bd(%rip), %rdx # 0x4c4bc leaq 0x38919(%rip), %r8 # 0x4cb1f movl $0x2, %esi movl $0xe90, %ecx # imm = 0xE90 xorl %eax, %eax callq 0xf997 movq %rbx, %rdi callq 0x142ba testl %eax, %eax jne 0x1426f movq %rbx, %rdi callq 0x15611 cmpl $0xffff9980, %eax # imm = 0xFFFF9980 je 0x14217 movl %eax, %ebp testl %eax, %eax jne 0x1428e cmpl $0x16, 0xd8(%rbx) jne 0x14249 movq %rbx, %rdi callq 0x14095 leaq 0x3826c(%rip), %rdx # 0x4c4bc leaq 0x38915(%rip), %r8 # 0x4cb6c xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0xea9, %ecx # imm = 0xEA9 xorl %eax, %eax callq 0xf997 jmp 0x142b1 movl %eax, %ebp leaq 0x38244(%rip), %rdx # 0x4c4bc leaq 0x388af(%rip), %r8 # 0x4cb2e movq %rbx, %rdi movl $0x1, %esi movl $0xe96, %ecx # imm = 0xE96 jmp 0x142a9 leaq 0x38227(%rip), %rdx # 0x4c4bc leaq 0x388b0(%rip), %r8 # 0x4cb4c movq %rbx, %rdi movl $0x1, %esi movl $0xea0, %ecx # imm = 0xEA0 movl %ebp, %r9d callq 0xfa82 movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_send_fatal_handshake_failure
int mbedtls_ssl_send_fatal_handshake_failure( mbedtls_ssl_context *ssl ) { int ret; if( ( ret = mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL, MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE ) ) != 0 ) { return( ret ); } return( 0 ); }
movl $0x2, %esi movl $0x28, %edx jmp 0x15727
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_write_certificate
int mbedtls_ssl_write_certificate( mbedtls_ssl_context *ssl ) { int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE; size_t i, n; const mbedtls_x509_crt *crt; const mbedtls_ssl_ciphersuite_t *ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate" ) ); if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate" ) ); ssl->state++; return( 0 ); } #if defined(MBEDTLS_SSL_CLI_C) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT ) { if( ssl->client_auth == 0 ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip write certificate" ) ); ssl->state++; return( 0 ); } #if defined(MBEDTLS_SSL_PROTO_SSL3) /* * If using SSLv3 and got no cert, send an Alert message * (otherwise an empty Certificate message will be sent). */ if( mbedtls_ssl_own_cert( ssl ) == NULL && ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ) { ssl->out_msglen = 2; ssl->out_msgtype = MBEDTLS_SSL_MSG_ALERT; ssl->out_msg[0] = MBEDTLS_SSL_ALERT_LEVEL_WARNING; ssl->out_msg[1] = MBEDTLS_SSL_ALERT_MSG_NO_CERT; MBEDTLS_SSL_DEBUG_MSG( 2, ( "got no certificate to send" ) ); goto write_msg; } #endif /* MBEDTLS_SSL_PROTO_SSL3 */ } #endif /* MBEDTLS_SSL_CLI_C */ #if defined(MBEDTLS_SSL_SRV_C) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER ) { if( mbedtls_ssl_own_cert( ssl ) == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no certificate to send" ) ); return( MBEDTLS_ERR_SSL_CERTIFICATE_REQUIRED ); } } #endif MBEDTLS_SSL_DEBUG_CRT( 3, "own certificate", mbedtls_ssl_own_cert( ssl ) ); /* * 0 . 0 handshake type * 1 . 3 handshake length * 4 . 6 length of all certs * 7 . 9 length of cert. 1 * 10 . n-1 peer certificate * n . n+2 length of cert. 2 * n+3 . ... upper level cert, etc. */ i = 7; crt = mbedtls_ssl_own_cert( ssl ); while( crt != NULL ) { n = crt->raw.len; if( n > MBEDTLS_SSL_MAX_CONTENT_LEN - 3 - i ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "certificate too large, %d > %d", i + 3 + n, MBEDTLS_SSL_MAX_CONTENT_LEN ) ); return( MBEDTLS_ERR_SSL_CERTIFICATE_TOO_LARGE ); } ssl->out_msg[i ] = (unsigned char)( n >> 16 ); ssl->out_msg[i + 1] = (unsigned char)( n >> 8 ); ssl->out_msg[i + 2] = (unsigned char)( n ); i += 3; memcpy( ssl->out_msg + i, crt->raw.p, n ); i += n; crt = crt->next; } ssl->out_msg[4] = (unsigned char)( ( i - 7 ) >> 16 ); ssl->out_msg[5] = (unsigned char)( ( i - 7 ) >> 8 ); ssl->out_msg[6] = (unsigned char)( ( i - 7 ) ); ssl->out_msglen = i; ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE; ssl->out_msg[0] = MBEDTLS_SSL_HS_CERTIFICATE; #if defined(MBEDTLS_SSL_PROTO_SSL3) && defined(MBEDTLS_SSL_CLI_C) write_msg: #endif ssl->state++; if( ( ret = mbedtls_ssl_write_record( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_record", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write certificate" ) ); return( ret ); }
pushq %rbp pushq %r15 pushq %r14 pushq %rbx pushq %rax movq %rdi, %r14 movq 0x80(%rdi), %rax movq (%rax), %rbx leaq 0x36c04(%rip), %rdx # 0x4c4bc leaq 0x37439(%rip), %r8 # 0x4ccf8 movl $0x2, %esi movl $0x100b, %ecx # imm = 0x100B xorl %eax, %eax callq 0xf997 movl 0x18(%rbx), %eax cmpl $0xb, %eax ja 0x15917 movl $0x960, %ecx # imm = 0x960 btl %eax, %ecx jae 0x15917 leaq 0x36bd3(%rip), %rdx # 0x4c4bc leaq 0x3741d(%rip), %r8 # 0x4cd0d xorl %ebp, %ebp movq %r14, %rdi movl $0x2, %esi movl $0x1012, %ecx # imm = 0x1012 xorl %eax, %eax callq 0xf997 incl 0x8(%r14) movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %r14 popq %r15 popq %rbp retq movq (%r14), %rax testb $0x1, 0x174(%rax) jne 0x15933 cmpl $0x0, 0x16c(%r14) je 0x159a8 movq 0x60(%r14), %rcx jmp 0x1595a movq 0x60(%r14), %rcx testq %rcx, %rcx je 0x15948 movq 0x380(%rcx), %rdx testq %rdx, %rdx jne 0x15954 movq 0xd0(%rax), %rdx testq %rdx, %rdx je 0x1597c cmpq $0x0, (%rdx) je 0x1597c testq %rcx, %rcx je 0x1596b movq 0x380(%rcx), %rcx testq %rcx, %rcx jne 0x15977 movq 0xd0(%rax), %rcx testq %rcx, %rcx je 0x159ca movq (%rcx), %r9 jmp 0x159cd leaq 0x36b39(%rip), %rdx # 0x4c4bc leaq 0x3739d(%rip), %r8 # 0x4cd27 movq %r14, %rdi movl $0x1, %esi movl $0x1039, %ecx # imm = 0x1039 xorl %eax, %eax callq 0xf997 movl $0xffff8a80, %ebp # imm = 0xFFFF8A80 jmp 0x1590a leaq 0x36b0d(%rip), %rdx # 0x4c4bc leaq 0x37357(%rip), %r8 # 0x4cd0d xorl %ebp, %ebp movq %r14, %rdi movl $0x2, %esi movl $0x101c, %ecx # imm = 0x101C jmp 0x158ff xorl %r9d, %r9d leaq 0x36ae8(%rip), %rdx # 0x4c4bc leaq 0x37367(%rip), %r8 # 0x4cd42 movq %r14, %rdi movl $0x3, %esi movl $0x103f, %ecx # imm = 0x103F callq 0x10078 movq 0x60(%r14), %rax testq %rax, %rax je 0x15a02 movq 0x380(%rax), %rax testq %rax, %rax jne 0x15a11 movq (%r14), %rax movq 0xd0(%rax), %rax testq %rax, %rax je 0x15a84 movq (%rax), %r15 testq %r15, %r15 je 0x15a84 movl $0x7, %ebp movq 0x8(%r15), %rbx movl $0x3ffd, %eax # imm = 0x3FFD subq %rbp, %rax cmpq %rax, %rbx ja 0x15b2f movl %ebx, %eax shrl $0x10, %eax movq 0x148(%r14), %rcx movb %al, (%rcx,%rbp) movq 0x148(%r14), %rax movb %bh, 0x1(%rax,%rbp) movq 0x148(%r14), %rax movb %bl, 0x2(%rax,%rbp) leaq 0x3(%rbp), %rdi addq 0x148(%r14), %rdi movq 0x10(%r15), %rsi movq %rbx, %rdx callq 0xf240 addq %rbx, %rbp addq $0x3, %rbp movq 0x220(%r15), %r15 testq %r15, %r15 jne 0x15a1e jmp 0x15a89 movl $0x7, %ebp leaq -0x7(%rbp), %rax movl %eax, %ecx shrl $0x10, %ecx movq 0x148(%r14), %rdx movb %cl, 0x4(%rdx) movq 0x148(%r14), %rcx movb %ah, 0x5(%rcx) movq 0x148(%r14), %rcx movb %al, 0x6(%rcx) movq %rbp, 0x158(%r14) movl $0x16, 0x150(%r14) movq 0x148(%r14), %rax movb $0xb, (%rax) incl 0x8(%r14) movq %r14, %rdi callq 0x12b2b testl %eax, %eax je 0x15b06 movl %eax, %ebp leaq 0x369d7(%rip), %rdx # 0x4c4bc leaq 0x36dfd(%rip), %r8 # 0x4c8e9 movq %r14, %rdi movl $0x1, %esi movl $0x106f, %ecx # imm = 0x106F movl %eax, %r9d callq 0xfa82 jmp 0x1590a leaq 0x369af(%rip), %rdx # 0x4c4bc leaq 0x3725d(%rip), %r8 # 0x4cd71 xorl %ebp, %ebp movq %r14, %rdi movl $0x2, %esi movl $0x1073, %ecx # imm = 0x1073 xorl %eax, %eax callq 0xf997 jmp 0x1590a leaq (%rbx,%rbp), %r9 addq $0x3, %r9 movl $0x4000, (%rsp) # imm = 0x4000 leaq 0x36977(%rip), %rdx # 0x4c4bc leaq 0x37206(%rip), %r8 # 0x4cd52 movq %r14, %rdi movl $0x1, %esi movl $0x1053, %ecx # imm = 0x1053 xorl %eax, %eax callq 0xf997 movl $0xffff8b00, %ebp # imm = 0xFFFF8B00 jmp 0x1590a
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_parse_certificate
int mbedtls_ssl_parse_certificate( mbedtls_ssl_context *ssl ) { int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE; size_t i, n; const mbedtls_ssl_ciphersuite_t *ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; int authmode = ssl->conf->authmode; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse certificate" ) ); if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate" ) ); ssl->state++; return( 0 ); } #if defined(MBEDTLS_SSL_SRV_C) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER && ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate" ) ); ssl->state++; return( 0 ); } #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) if( ssl->handshake->sni_authmode != MBEDTLS_SSL_VERIFY_UNSET ) authmode = ssl->handshake->sni_authmode; #endif if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER && authmode == MBEDTLS_SSL_VERIFY_NONE ) { ssl->session_negotiate->verify_result = MBEDTLS_X509_BADCERT_SKIP_VERIFY; MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse certificate" ) ); ssl->state++; return( 0 ); } #endif if( ( ret = mbedtls_ssl_read_record( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret ); return( ret ); } ssl->state++; #if defined(MBEDTLS_SSL_SRV_C) #if defined(MBEDTLS_SSL_PROTO_SSL3) /* * Check if the client sent an empty certificate */ if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER && ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ) { if( ssl->in_msglen == 2 && ssl->in_msgtype == MBEDTLS_SSL_MSG_ALERT && ssl->in_msg[0] == MBEDTLS_SSL_ALERT_LEVEL_WARNING && ssl->in_msg[1] == MBEDTLS_SSL_ALERT_MSG_NO_CERT ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "SSLv3 client has no certificate" ) ); ssl->session_negotiate->verify_result = MBEDTLS_X509_BADCERT_MISSING; if( authmode == MBEDTLS_SSL_VERIFY_OPTIONAL ) return( 0 ); else return( MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE ); } } #endif /* MBEDTLS_SSL_PROTO_SSL3 */ #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) || \ defined(MBEDTLS_SSL_PROTO_TLS1_2) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER && ssl->minor_ver != MBEDTLS_SSL_MINOR_VERSION_0 ) { if( ssl->in_hslen == 3 + mbedtls_ssl_hs_hdr_len( ssl ) && ssl->in_msgtype == MBEDTLS_SSL_MSG_HANDSHAKE && ssl->in_msg[0] == MBEDTLS_SSL_HS_CERTIFICATE && memcmp( ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl ), "\0\0\0", 3 ) == 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "TLSv1 client has no certificate" ) ); ssl->session_negotiate->verify_result = MBEDTLS_X509_BADCERT_MISSING; if( authmode == MBEDTLS_SSL_VERIFY_OPTIONAL ) return( 0 ); else return( MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE ); } } #endif /* MBEDTLS_SSL_PROTO_TLS1 || MBEDTLS_SSL_PROTO_TLS1_1 || \ MBEDTLS_SSL_PROTO_TLS1_2 */ #endif /* MBEDTLS_SSL_SRV_C */ if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate message" ) ); return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } if( ssl->in_msg[0] != MBEDTLS_SSL_HS_CERTIFICATE || ssl->in_hslen < mbedtls_ssl_hs_hdr_len( ssl ) + 3 + 3 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE ); } i = mbedtls_ssl_hs_hdr_len( ssl ); /* * Same message structure as in mbedtls_ssl_write_certificate() */ n = ( ssl->in_msg[i+1] << 8 ) | ssl->in_msg[i+2]; if( ssl->in_msg[i] != 0 || ssl->in_hslen != n + 3 + mbedtls_ssl_hs_hdr_len( ssl ) ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE ); } /* In case we tried to reuse a session but it failed */ if( ssl->session_negotiate->peer_cert != NULL ) { mbedtls_x509_crt_free( ssl->session_negotiate->peer_cert ); mbedtls_free( ssl->session_negotiate->peer_cert ); } if( ( ssl->session_negotiate->peer_cert = mbedtls_calloc( 1, sizeof( mbedtls_x509_crt ) ) ) == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc(%d bytes) failed", sizeof( mbedtls_x509_crt ) ) ); return( MBEDTLS_ERR_SSL_ALLOC_FAILED ); } mbedtls_x509_crt_init( ssl->session_negotiate->peer_cert ); i += 3; while( i < ssl->in_hslen ) { if( ssl->in_msg[i] != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE ); } n = ( (unsigned int) ssl->in_msg[i + 1] << 8 ) | (unsigned int) ssl->in_msg[i + 2]; i += 3; if( n < 128 || i + n > ssl->in_hslen ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE ); } ret = mbedtls_x509_crt_parse_der( ssl->session_negotiate->peer_cert, ssl->in_msg + i, n ); if( 0 != ret && ( MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + MBEDTLS_ERR_OID_NOT_FOUND ) != ret ) { MBEDTLS_SSL_DEBUG_RET( 1, " mbedtls_x509_crt_parse_der", ret ); return( ret ); } i += n; } MBEDTLS_SSL_DEBUG_CRT( 3, "peer certificate", ssl->session_negotiate->peer_cert ); /* * On client, make sure the server cert doesn't change during renego to * avoid "triple handshake" attack: https://secure-resumption.com/ */ #if defined(MBEDTLS_SSL_RENEGOTIATION) && defined(MBEDTLS_SSL_CLI_C) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT && ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS ) { if( ssl->session->peer_cert == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "new server cert during renegotiation" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE ); } if( ssl->session->peer_cert->raw.len != ssl->session_negotiate->peer_cert->raw.len || memcmp( ssl->session->peer_cert->raw.p, ssl->session_negotiate->peer_cert->raw.p, ssl->session->peer_cert->raw.len ) != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "server cert changed during renegotiation" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE ); } } #endif /* MBEDTLS_SSL_RENEGOTIATION && MBEDTLS_SSL_CLI_C */ if( authmode != MBEDTLS_SSL_VERIFY_NONE ) { mbedtls_x509_crt *ca_chain; mbedtls_x509_crl *ca_crl; #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) if( ssl->handshake->sni_ca_chain != NULL ) { ca_chain = ssl->handshake->sni_ca_chain; ca_crl = ssl->handshake->sni_ca_crl; } else #endif { ca_chain = ssl->conf->ca_chain; ca_crl = ssl->conf->ca_crl; } if( ca_chain == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no CA chain" ) ); return( MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED ); } /* * Main check: verify certificate */ ret = mbedtls_x509_crt_verify_with_profile( ssl->session_negotiate->peer_cert, ca_chain, ca_crl, ssl->conf->cert_profile, ssl->hostname, &ssl->session_negotiate->verify_result, ssl->conf->f_vrfy, ssl->conf->p_vrfy ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "x509_verify_cert", ret ); } /* * Secondary checks: always done, but change 'ret' only if it was 0 */ #if defined(MBEDTLS_ECP_C) { const mbedtls_pk_context *pk = &ssl->session_negotiate->peer_cert->pk; /* If certificate uses an EC key, make sure the curve is OK */ if( mbedtls_pk_can_do( pk, MBEDTLS_PK_ECKEY ) && mbedtls_ssl_check_curve( ssl, mbedtls_pk_ec( *pk )->grp.id ) != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate (EC key curve)" ) ); if( ret == 0 ) ret = MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE; } } #endif /* MBEDTLS_ECP_C */ if( mbedtls_ssl_check_cert_usage( ssl->session_negotiate->peer_cert, ciphersuite_info, ! ssl->conf->endpoint, &ssl->session_negotiate->verify_result ) != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate (usage extensions)" ) ); if( ret == 0 ) ret = MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE; } if( authmode == MBEDTLS_SSL_VERIFY_OPTIONAL ) ret = 0; } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse certificate" ) ); return( ret ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x18, %rsp movq %rdi, %rbx movq (%rdi), %rax movq 0x80(%rdi), %rcx movq (%rcx), %r14 movl 0x174(%rax), %r12d leaq 0x36926(%rip), %rdx # 0x4c4bc leaq 0x371e9(%rip), %r8 # 0x4cd86 movl $0x2, %esi movl $0x107f, %ecx # imm = 0x107F xorl %eax, %eax callq 0xf997 movl 0x18(%r14), %ecx cmpl $0xb, %ecx ja 0x15bf9 movl $0x960, %eax # imm = 0x960 btl %ecx, %eax jae 0x15bf9 leaq 0x368f4(%rip), %rdx # 0x4c4bc leaq 0x371cc(%rip), %r8 # 0x4cd9b xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x1086, %ecx # imm = 0x1086 xorl %eax, %eax callq 0xf997 incl 0x8(%rbx) movl %ebp, %eax addq $0x18, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq movq (%rbx), %rax movl 0x174(%rax), %eax testb $0x1, %al sete %dl cmpl $0x7, %ecx setne %cl orb %dl, %cl jne 0x15c30 leaq 0x368a4(%rip), %rdx # 0x4c4bc leaq 0x3717c(%rip), %r8 # 0x4cd9b xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x108f, %ecx # imm = 0x108F jmp 0x15bde shrl $0x2, %r12d andl $0x3, %r12d movq 0x60(%rbx), %rcx movl 0x388(%rcx), %ecx cmpl $0x3, %ecx cmovnel %ecx, %r12d testb $0x1, %al je 0x15c7f testl %r12d, %r12d jne 0x15c7f movq 0x58(%rbx), %rax movl $0x80, 0x70(%rax) leaq 0x36858(%rip), %rdx # 0x4c4bc leaq 0x37130(%rip), %r8 # 0x4cd9b xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x109d, %ecx # imm = 0x109D jmp 0x15bde movq %rbx, %rdi callq 0x141f2 testl %eax, %eax je 0x15cb5 movl %eax, %ebp leaq 0x36828(%rip), %rdx # 0x4c4bc leaq 0x3711a(%rip), %r8 # 0x4cdb5 movq %rbx, %rdi movl $0x1, %esi movl $0x10a5, %ecx # imm = 0x10A5 movl %ebp, %r9d callq 0xfa82 jmp 0x15be8 incl 0x8(%rbx) movq (%rbx), %rax movl 0x174(%rax), %r15d testb $0x1, %r15b je 0x15d0c cmpl $0x0, 0x18(%rbx) je 0x15d0c movl %r15d, %eax andl $0x2, %eax shll $0x2, %eax leaq 0x7(%rax), %rcx cmpq %rcx, 0x110(%rbx) jne 0x15d0c cmpl $0x16, 0xd8(%rbx) jne 0x15d0c movq 0xc8(%rbx), %rcx cmpb $0xb, (%rcx) jne 0x15d0c orq $0x4, %rax movzbl 0x2(%rcx,%rax), %edx orw (%rcx,%rax), %dx je 0x15ea3 cmpl $0x16, 0xd8(%rbx) jne 0x15d59 movq 0xc8(%rbx), %rcx cmpb $0xb, (%rcx) jne 0x15d39 movq 0x110(%rbx), %rax andl $0x2, %r15d shll $0x2, %r15d leaq 0xa(%r15), %rdx cmpq %rdx, %rax jae 0x15d85 leaq 0x3677c(%rip), %rdx # 0x4c4bc leaq 0x370a6(%rip), %r8 # 0x4cded movq %rbx, %rdi movl $0x1, %esi movl $0x10e3, %ecx # imm = 0x10E3 jmp 0x15e92 leaq 0x3675c(%rip), %rdx # 0x4c4bc leaq 0x37086(%rip), %r8 # 0x4cded movq %rbx, %rdi movl $0x1, %esi movl $0x10dc, %ecx # imm = 0x10DC xorl %eax, %eax callq 0xf997 movl $0xffff8900, %ebp # imm = 0xFFFF8900 jmp 0x15be8 orq $0x4, %r15 cmpb $0x0, (%rcx,%r15) jne 0x15e77 movzwl 0x1(%rcx,%r15), %ecx rolw $0x8, %cx movzwl %cx, %ecx addq %r15, %rcx addq $0x3, %rcx cmpq %rcx, %rax jne 0x15e77 movq 0x58(%rbx), %r13 movq 0x68(%r13), %rdi testq %rdi, %rdi je 0x15dd4 callq 0x2387e movq 0x58(%rbx), %rax movq 0x68(%rax), %rdi callq 0xf030 movq 0x58(%rbx), %r13 movl $0x1, %edi movl $0x228, %esi # imm = 0x228 callq 0xf1d0 movq %rax, 0x68(%r13) testq %rax, %rax je 0x15f7c orq $0x3, %r15 movq %rax, %rdi callq 0x21da5 movq 0x110(%rbx), %rax xorl %ebp, %ebp cmpq %rax, %r15 jae 0x15ee5 movq 0xc8(%rbx), %rsi cmpb $0x0, (%rsi,%r15) jne 0x15fef movzwl 0x1(%rsi,%r15), %ecx rolw $0x8, %cx movzwl %cx, %edx cmpl $0x80, %edx jb 0x15fcf movq %r15, %rcx addq $0x3, %rcx leaq (%rdx,%rcx), %r15 cmpq %rax, %r15 ja 0x15fcf movq 0x58(%rbx), %rax movq 0x68(%rax), %rdi addq %rcx, %rsi callq 0x218d4 movl %eax, %ebp cmpl $0xffffd9d2, %eax # imm = 0xFFFFD9D2 je 0x15e6e testl %ebp, %ebp jne 0x1619b movq 0x110(%rbx), %rax jmp 0x15e05 leaq 0x3663e(%rip), %rdx # 0x4c4bc leaq 0x36f68(%rip), %r8 # 0x4cded movq %rbx, %rdi movl $0x1, %esi movl $0x10f1, %ecx # imm = 0x10F1 xorl %eax, %eax callq 0xf997 movl $0xffff8600, %ebp # imm = 0xFFFF8600 jmp 0x15be8 leaq 0x36612(%rip), %rdx # 0x4c4bc leaq 0x36f1c(%rip), %r8 # 0x4cdcd xorl %r14d, %r14d movq %rbx, %rdi movl $0x1, %esi movl $0x10cd, %ecx # imm = 0x10CD xorl %eax, %eax callq 0xf997 movq 0x58(%rbx), %rax movl $0x40, 0x70(%rax) cmpl $0x1, %r12d movl $0xffff8b80, %ebp # imm = 0xFFFF8B80 cmovel %r14d, %ebp jmp 0x15be8 movq 0x58(%rbx), %rax movq 0x68(%rax), %r9 leaq 0x365c8(%rip), %rdx # 0x4c4bc leaq 0x36f3d(%rip), %r8 # 0x4ce38 movq %rbx, %rdi movl $0x3, %esi movl $0x1125, %ecx # imm = 0x1125 callq 0x10078 movq (%rbx), %r15 testb $0x1, 0x174(%r15) jne 0x15fae cmpl $0x1, 0xc(%rbx) jne 0x15fae movq 0x50(%rbx), %rax movq 0x68(%rax), %rax testq %rax, %rax je 0x1617b movq 0x8(%rax), %rdx movq 0x58(%rbx), %rcx movq 0x68(%rcx), %rcx cmpq 0x8(%rcx), %rdx jne 0x15f5c movq 0x10(%rax), %rdi movq 0x10(%rcx), %rsi callq 0xf2b0 testl %eax, %eax je 0x15fae leaq 0x36559(%rip), %rdx # 0x4c4bc leaq 0x36f04(%rip), %r8 # 0x4ce6e movq %rbx, %rdi movl $0x1, %esi movl $0x113b, %ecx # imm = 0x113B jmp 0x15e92 leaq 0x36539(%rip), %rdx # 0x4c4bc leaq 0x36e7b(%rip), %r8 # 0x4ce05 movl $0x228, %r9d # imm = 0x228 movq %rbx, %rdi movl $0x1, %esi movl $0x1100, %ecx # imm = 0x1100 xorl %eax, %eax callq 0xf997 movl $0xffff8100, %ebp # imm = 0xFFFF8100 jmp 0x15be8 testl %r12d, %r12d je 0x16154 movq 0x60(%rbx), %rax movq 0x398(%rax), %rsi testq %rsi, %rsi je 0x1600f addq $0x3a0, %rax # imm = 0x3A0 jmp 0x16026 leaq 0x364e6(%rip), %rdx # 0x4c4bc leaq 0x36e10(%rip), %r8 # 0x4cded movq %rbx, %rdi movl $0x1, %esi movl $0x1116, %ecx # imm = 0x1116 jmp 0x15e92 leaq 0x364c6(%rip), %rdx # 0x4c4bc leaq 0x36df0(%rip), %r8 # 0x4cded movq %rbx, %rdi movl $0x1, %esi movl $0x110c, %ecx # imm = 0x110C jmp 0x15e92 movq 0xd8(%r15), %rsi testq %rsi, %rsi je 0x161bb leaq 0xe0(%r15), %rax movq (%rax), %rdx movq 0x58(%rbx), %r9 movq 0x170(%rbx), %r8 movq 0x68(%r9), %rdi movq 0xc8(%r15), %rcx addq $0x70, %r9 movups 0x68(%r15), %xmm0 movups %xmm0, (%rsp) callq 0x22dcf movl %eax, %r15d testl %eax, %eax je 0x1607b leaq 0x3645d(%rip), %rdx # 0x4c4bc leaq 0x36e41(%rip), %r8 # 0x4cea7 movq %rbx, %rdi movl $0x1, %esi movl $0x1166, %ecx # imm = 0x1166 movl %r15d, %r9d callq 0xfa82 movq 0x58(%rbx), %rax movq 0x68(%rax), %r13 leaq 0x148(%r13), %rdi movl $0x2, %esi callq 0x3b0be movq (%rbx), %rdx testl %eax, %eax je 0x160f9 movq 0xf0(%rdx), %rax testq %rax, %rax je 0x160c8 movl (%rax), %ecx testl %ecx, %ecx je 0x160c8 movq 0x150(%r13), %rsi movl (%rsi), %esi addq $0x4, %rax cmpl %esi, %ecx je 0x160f9 movl (%rax), %ecx addq $0x4, %rax testl %ecx, %ecx jne 0x160ba leaq 0x363ed(%rip), %rdx # 0x4c4bc leaq 0x36de2(%rip), %r8 # 0x4ceb8 movq %rbx, %rdi movl $0x1, %esi movl $0x1175, %ecx # imm = 0x1175 xorl %eax, %eax callq 0xf997 testl %r15d, %r15d movl $0xffff8600, %eax # imm = 0xFFFF8600 cmovel %eax, %r15d movq (%rbx), %rdx movq 0x58(%rbx), %rcx movq 0x68(%rcx), %rdi movl 0x174(%rdx), %edx notl %edx andl $0x1, %edx addq $0x70, %rcx movq %r14, %rsi callq 0x16217 testl %eax, %eax je 0x1614a leaq 0x36399(%rip), %rdx # 0x4c4bc leaq 0x36dad(%rip), %r8 # 0x4ced7 movq %rbx, %rdi movl $0x1, %esi movl $0x1181, %ecx # imm = 0x1181 xorl %eax, %eax callq 0xf997 testl %r15d, %r15d movl $0xffff8600, %eax # imm = 0xFFFF8600 cmovel %eax, %r15d xorl %ebp, %ebp cmpl $0x1, %r12d cmovnel %r15d, %ebp leaq 0x36361(%rip), %rdx # 0x4c4bc leaq 0x36d98(%rip), %r8 # 0x4cefa movq %rbx, %rdi movl $0x2, %esi movl $0x118a, %ecx # imm = 0x118A xorl %eax, %eax callq 0xf997 jmp 0x15be8 leaq 0x3633a(%rip), %rdx # 0x4c4bc leaq 0x36cc0(%rip), %r8 # 0x4ce49 movq %rbx, %rdi movl $0x1, %esi movl $0x1131, %ecx # imm = 0x1131 jmp 0x15e92 leaq 0x3631a(%rip), %rdx # 0x4c4bc leaq 0x36c73(%rip), %r8 # 0x4ce1c movq %rbx, %rdi movl $0x1, %esi movl $0x111e, %ecx # imm = 0x111E jmp 0x15ca8 leaq 0x362fa(%rip), %rdx # 0x4c4bc leaq 0x36cce(%rip), %r8 # 0x4ce97 movq %rbx, %rdi movl $0x1, %esi movl $0x1155, %ecx # imm = 0x1155 xorl %eax, %eax callq 0xf997 movl $0xffff8980, %ebp # imm = 0xFFFF8980 jmp 0x15be8
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_check_curve
int mbedtls_ssl_check_curve( const mbedtls_ssl_context *ssl, mbedtls_ecp_group_id grp_id ) { const mbedtls_ecp_group_id *gid; if( ssl->conf->curve_list == NULL ) return( -1 ); for( gid = ssl->conf->curve_list; *gid != MBEDTLS_ECP_DP_NONE; gid++ ) if( *gid == grp_id ) return( 0 ); return( -1 ); }
movq (%rdi), %rax movq 0xf0(%rax), %rcx movl $0xffffffff, %eax # imm = 0xFFFFFFFF testq %rcx, %rcx je 0x16213 movl (%rcx), %edx testl %edx, %edx je 0x16213 addq $0x4, %rcx cmpl %esi, %edx je 0x16214 movl (%rcx), %edx addq $0x4, %rcx testl %edx, %edx jne 0x16205 retq xorl %eax, %eax retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_check_cert_usage
int mbedtls_ssl_check_cert_usage( const mbedtls_x509_crt *cert, const mbedtls_ssl_ciphersuite_t *ciphersuite, int cert_endpoint, uint32_t *flags ) { int ret = 0; #if defined(MBEDTLS_X509_CHECK_KEY_USAGE) int usage = 0; #endif #if defined(MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE) const char *ext_oid; size_t ext_len; #endif #if !defined(MBEDTLS_X509_CHECK_KEY_USAGE) && \ !defined(MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE) ((void) cert); ((void) cert_endpoint); ((void) flags); #endif #if defined(MBEDTLS_X509_CHECK_KEY_USAGE) if( cert_endpoint == MBEDTLS_SSL_IS_SERVER ) { /* Server part of the key exchange */ switch( ciphersuite->key_exchange ) { case MBEDTLS_KEY_EXCHANGE_RSA: case MBEDTLS_KEY_EXCHANGE_RSA_PSK: usage = MBEDTLS_X509_KU_KEY_ENCIPHERMENT; break; case MBEDTLS_KEY_EXCHANGE_DHE_RSA: case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: usage = MBEDTLS_X509_KU_DIGITAL_SIGNATURE; break; case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: usage = MBEDTLS_X509_KU_KEY_AGREEMENT; break; /* Don't use default: we want warnings when adding new values */ case MBEDTLS_KEY_EXCHANGE_NONE: case MBEDTLS_KEY_EXCHANGE_PSK: case MBEDTLS_KEY_EXCHANGE_DHE_PSK: case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK: case MBEDTLS_KEY_EXCHANGE_ECJPAKE: usage = 0; } } else { /* Client auth: we only implement rsa_sign and mbedtls_ecdsa_sign for now */ usage = MBEDTLS_X509_KU_DIGITAL_SIGNATURE; } if( mbedtls_x509_crt_check_key_usage( cert, usage ) != 0 ) { *flags |= MBEDTLS_X509_BADCERT_KEY_USAGE; ret = -1; } #else ((void) ciphersuite); #endif /* MBEDTLS_X509_CHECK_KEY_USAGE */ #if defined(MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE) if( cert_endpoint == MBEDTLS_SSL_IS_SERVER ) { ext_oid = MBEDTLS_OID_SERVER_AUTH; ext_len = MBEDTLS_OID_SIZE( MBEDTLS_OID_SERVER_AUTH ); } else { ext_oid = MBEDTLS_OID_CLIENT_AUTH; ext_len = MBEDTLS_OID_SIZE( MBEDTLS_OID_CLIENT_AUTH ); } if( mbedtls_x509_crt_check_extended_key_usage( cert, ext_oid, ext_len ) != 0 ) { *flags |= MBEDTLS_X509_BADCERT_EXT_KEY_USAGE; ret = -1; } #endif /* MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE */ return( ret ); }
pushq %rbp pushq %r15 pushq %r14 pushq %rbx pushq %rax movq %rcx, %rbx movl %edx, %ebp movq %rsi, %rax movq %rdi, %r14 movl $0x80, %esi cmpl $0x1, %edx jne 0x1624b movl 0x18(%rax), %eax decl %eax xorl %esi, %esi cmpl $0x9, %eax ja 0x1624b movl %eax, %eax leaq 0x3623c(%rip), %rcx # 0x4c484 movl (%rcx,%rax,4), %esi movq %r14, %rdi callq 0x22cb5 testl %eax, %eax je 0x16263 orb $0x8, 0x1(%rbx) movl $0xffffffff, %r15d # imm = 0xFFFFFFFF jmp 0x16266 xorl %r15d, %r15d cmpl $0x1, %ebp leaq 0x37480(%rip), %rax # 0x4d6f0 leaq 0x37482(%rip), %rsi # 0x4d6f9 cmoveq %rax, %rsi movl $0x8, %edx movq %r14, %rdi callq 0x22ce7 testl %eax, %eax je 0x16296 orb $0x10, 0x1(%rbx) movl $0xffffffff, %r15d # imm = 0xFFFFFFFF movl %r15d, %eax addq $0x8, %rsp popq %rbx popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_write_change_cipher_spec
int mbedtls_ssl_write_change_cipher_spec( mbedtls_ssl_context *ssl ) { int ret; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write change cipher spec" ) ); ssl->out_msgtype = MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC; ssl->out_msglen = 1; ssl->out_msg[0] = 1; ssl->state++; if( ( ret = mbedtls_ssl_write_record( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_record", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write change cipher spec" ) ); return( 0 ); }
pushq %rbp pushq %rbx pushq %rax movq %rdi, %rbx leaq 0x3620b(%rip), %rdx # 0x4c4bc leaq 0x36c57(%rip), %r8 # 0x4cf0f movl $0x2, %esi movl $0x119a, %ecx # imm = 0x119A xorl %eax, %eax callq 0xf997 movl $0x14, 0x150(%rbx) movq $0x1, 0x158(%rbx) movq 0x148(%rbx), %rax movb $0x1, (%rax) incl 0x8(%rbx) movq %rbx, %rdi callq 0x12b2b movl %eax, %ebp leaq 0x361c0(%rip), %rdx # 0x4c4bc testl %eax, %eax je 0x1631e leaq 0x365e2(%rip), %r8 # 0x4c8e9 movq %rbx, %rdi movl $0x1, %esi movl $0x11a4, %ecx # imm = 0x11A4 movl %ebp, %r9d callq 0xfa82 jmp 0x16339 leaq 0x36c06(%rip), %r8 # 0x4cf2b movq %rbx, %rdi movl $0x2, %esi movl $0x11a8, %ecx # imm = 0x11A8 xorl %eax, %eax callq 0xf997 movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_optimize_checksum
void mbedtls_ssl_optimize_checksum( mbedtls_ssl_context *ssl, const mbedtls_ssl_ciphersuite_t *ciphersuite_info ) { ((void) ciphersuite_info); #if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \ defined(MBEDTLS_SSL_PROTO_TLS1_1) if( ssl->minor_ver < MBEDTLS_SSL_MINOR_VERSION_3 ) ssl->handshake->update_checksum = ssl_update_checksum_md5sha1; else #endif #if defined(MBEDTLS_SSL_PROTO_TLS1_2) #if defined(MBEDTLS_SHA512_C) if( ciphersuite_info->mac == MBEDTLS_MD_SHA384 ) ssl->handshake->update_checksum = ssl_update_checksum_sha384; else #endif #if defined(MBEDTLS_SHA256_C) if( ciphersuite_info->mac != MBEDTLS_MD_SHA384 ) ssl->handshake->update_checksum = ssl_update_checksum_sha256; else #endif #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return; } }
cmpl $0x2, 0x18(%rdi) jg 0x1650b movq 0x60(%rdi), %rax leaq 0x24(%rip), %rcx # 0x1652d jmp 0x16525 cmpl $0x7, 0x14(%rsi) movq 0x60(%rdi), %rax jne 0x1651e leaq 0x46(%rip), %rcx # 0x16562 jmp 0x16525 leaq 0x4e(%rip), %rcx # 0x16573 movq %rcx, 0x5f0(%rax) retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_handshake_wrapup
void mbedtls_ssl_handshake_wrapup( mbedtls_ssl_context *ssl ) { int resume = ssl->handshake->resume; MBEDTLS_SSL_DEBUG_MSG( 3, ( "=> handshake wrapup" ) ); #if defined(MBEDTLS_SSL_RENEGOTIATION) if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS ) { ssl->renego_status = MBEDTLS_SSL_RENEGOTIATION_DONE; ssl->renego_records_seen = 0; } #endif /* * Free the previous session and switch in the current one */ if( ssl->session ) { #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) /* RFC 7366 3.1: keep the EtM state */ ssl->session_negotiate->encrypt_then_mac = ssl->session->encrypt_then_mac; #endif mbedtls_ssl_session_free( ssl->session ); mbedtls_free( ssl->session ); } ssl->session = ssl->session_negotiate; ssl->session_negotiate = NULL; /* * Add cache entry */ if( ssl->conf->f_set_cache != NULL && ssl->session->id_len != 0 && resume == 0 ) { if( ssl->conf->f_set_cache( ssl->conf->p_cache, ssl->session ) != 0 ) MBEDTLS_SSL_DEBUG_MSG( 1, ( "cache did not store session" ) ); } #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM && ssl->handshake->flight != NULL ) { /* Cancel handshake timer */ ssl_set_timer( ssl, 0 ); /* Keep last flight around in case we need to resend it: * we need the handshake and transform structures for that */ MBEDTLS_SSL_DEBUG_MSG( 3, ( "skip freeing handshake and transform" ) ); } else #endif ssl_handshake_wrapup_free_hs_transform( ssl ); ssl->state++; MBEDTLS_SSL_DEBUG_MSG( 3, ( "<= handshake wrapup" ) ); }
pushq %rbp pushq %rbx pushq %rax movq %rdi, %rbx movq 0x60(%rdi), %rax movl 0xa7c(%rax), %ebp leaq 0x35edd(%rip), %rdx # 0x4c4bc leaq 0x369ff(%rip), %r8 # 0x4cfe5 movl $0x3, %esi movl $0x1369, %ecx # imm = 0x1369 xorl %eax, %eax callq 0xf997 cmpl $0x1, 0xc(%rbx) jne 0x16605 movq $0x2, 0xc(%rbx) movq 0x50(%rbx), %rdi testq %rdi, %rdi je 0x1662c movl 0x94(%rdi), %eax movq 0x58(%rbx), %rcx movl %eax, 0x94(%rcx) callq 0x166fa movq 0x50(%rbx), %rdi callq 0xf030 movq (%rbx), %rax movq 0x58(%rbx), %rsi movq %rsi, 0x50(%rbx) movq $0x0, 0x58(%rbx) movq 0x48(%rax), %rcx testq %rcx, %rcx je 0x1667f cmpq $0x0, 0x10(%rsi) je 0x1667f testl %ebp, %ebp jne 0x1667f movq 0x50(%rax), %rdi callq *%rcx testl %eax, %eax je 0x1667f leaq 0x35e58(%rip), %rdx # 0x4c4bc leaq 0x3698e(%rip), %r8 # 0x4cff9 movq %rbx, %rdi movl $0x1, %esi movl $0x138c, %ecx # imm = 0x138C xorl %eax, %eax callq 0xf997 movq (%rbx), %rax testb $0x2, 0x174(%rax) je 0x166c7 movq 0x60(%rbx), %rax cmpq $0x0, 0x3d0(%rax) je 0x166c7 movq %rbx, %rdi xorl %esi, %esi callq 0x125b5 leaq 0x35e12(%rip), %rdx # 0x4c4bc leaq 0x36964(%rip), %r8 # 0x4d015 movq %rbx, %rdi movl $0x3, %esi movl $0x1398, %ecx # imm = 0x1398 xorl %eax, %eax callq 0xf997 jmp 0x166cf movq %rbx, %rdi callq 0x15801 incl 0x8(%rbx) leaq 0x35de3(%rip), %rdx # 0x4c4bc leaq 0x3695a(%rip), %r8 # 0x4d03a movq %rbx, %rdi movl $0x3, %esi movl $0x13a0, %ecx # imm = 0x13A0 xorl %eax, %eax addq $0x8, %rsp popq %rbx popq %rbp jmp 0xf997
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_session_free
void mbedtls_ssl_session_free( mbedtls_ssl_session *session ) { if( session == NULL ) return; #if defined(MBEDTLS_X509_CRT_PARSE_C) if( session->peer_cert != NULL ) { mbedtls_x509_crt_free( session->peer_cert ); mbedtls_free( session->peer_cert ); } #endif #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C) mbedtls_free( session->ticket ); #endif mbedtls_zeroize( session, sizeof( mbedtls_ssl_session ) ); }
testq %rdi, %rdi je 0x16735 pushq %rbx movq %rdi, %rbx movq 0x68(%rdi), %rdi testq %rdi, %rdi je 0x1671a callq 0x2387e movq 0x68(%rbx), %rdi callq 0xf030 movq 0x78(%rbx), %rdi callq 0xf030 xorl %eax, %eax movb $0x0, (%rbx,%rax) incq %rax cmpq $0x98, %rax jne 0x16725 popq %rbx retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_parse_finished
int mbedtls_ssl_parse_finished( mbedtls_ssl_context *ssl ) { int ret; unsigned int hash_len; unsigned char buf[SSL_MAX_HASH_LEN]; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse finished" ) ); ssl->handshake->calc_finished( ssl, buf, ssl->conf->endpoint ^ 1 ); if( ( ret = mbedtls_ssl_read_record( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret ); return( ret ); } if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad finished message" ) ); return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } /* There is currently no ciphersuite using another length with TLS 1.2 */ #if defined(MBEDTLS_SSL_PROTO_SSL3) if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ) hash_len = 36; else #endif hash_len = 12; if( ssl->in_msg[0] != MBEDTLS_SSL_HS_FINISHED || ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) + hash_len ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad finished message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_FINISHED ); } if( mbedtls_ssl_safer_memcmp( ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl ), buf, hash_len ) != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad finished message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_FINISHED ); } #if defined(MBEDTLS_SSL_RENEGOTIATION) ssl->verify_data_len = hash_len; memcpy( ssl->peer_verify_data, buf, hash_len ); #endif if( ssl->handshake->resume != 0 ) { #if defined(MBEDTLS_SSL_CLI_C) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT ) ssl->state = MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC; #endif #if defined(MBEDTLS_SSL_SRV_C) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER ) ssl->state = MBEDTLS_SSL_HANDSHAKE_WRAPUP; #endif } else ssl->state++; #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) mbedtls_ssl_recv_flight_completed( ssl ); #endif MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse finished" ) ); return( 0 ); }
pushq %rbp pushq %rbx subq $0x18, %rsp movq %rdi, %rbx leaq 0x35b46(%rip), %rdx # 0x4c4bc leaq 0x36727(%rip), %r8 # 0x4d0a4 movl $0x2, %esi movl $0x1425, %ecx # imm = 0x1425 xorl %eax, %eax callq 0xf997 movq (%rbx), %rax movq 0x60(%rbx), %rcx movl 0x174(%rax), %edx notl %edx andl $0x1, %edx leaq 0xc(%rsp), %rsi movq %rbx, %rdi callq *0x600(%rcx) movq %rbx, %rdi callq 0x141f2 testl %eax, %eax je 0x169e4 movl %eax, %ebp leaq 0x35af9(%rip), %rdx # 0x4c4bc leaq 0x363eb(%rip), %r8 # 0x4cdb5 movq %rbx, %rdi movl $0x1, %esi movl $0x142b, %ecx # imm = 0x142B movl %eax, %r9d callq 0xfa82 jmp 0x16aaf cmpl $0x16, 0xd8(%rbx) jne 0x16a5f movq 0xc8(%rbx), %rcx cmpb $0x14, (%rcx) jne 0x16a88 movq (%rbx), %rax movb 0x174(%rax), %dl andb $0x2, %dl shrb %dl movzbl %dl, %edx shll $0x3, %edx leaq 0x10(%rdx), %rsi cmpq %rsi, 0x110(%rbx) jne 0x16a88 orq $0x4, %rdx addq %rdx, %rcx xorl %edx, %edx xorl %esi, %esi movb 0xc(%rsp,%rsi), %dil xorb (%rcx,%rsi), %dil orb %dil, %dl incq %rsi cmpq $0xc, %rsi jne 0x16a29 testb %dl, %dl je 0x16ab8 leaq 0x35a73(%rip), %rdx # 0x4c4bc leaq 0x36666(%rip), %r8 # 0x4d0b6 movq %rbx, %rdi movl $0x1, %esi movl $0x1447, %ecx # imm = 0x1447 jmp 0x16aa3 leaq 0x35a56(%rip), %rdx # 0x4c4bc leaq 0x36649(%rip), %r8 # 0x4d0b6 movq %rbx, %rdi movl $0x1, %esi movl $0x1431, %ecx # imm = 0x1431 xorl %eax, %eax callq 0xf997 movl $0xffff8900, %ebp # imm = 0xFFFF8900 jmp 0x16aaf leaq 0x35a2d(%rip), %rdx # 0x4c4bc leaq 0x36620(%rip), %r8 # 0x4d0b6 movq %rbx, %rdi movl $0x1, %esi movl $0x1440, %ecx # imm = 0x1440 xorl %eax, %eax callq 0xf997 movl $0xffff8180, %ebp # imm = 0xFFFF8180 movl %ebp, %eax addq $0x18, %rsp popq %rbx popq %rbp retq movq $0xc, 0x198(%rbx) movl 0x14(%rsp), %ecx movl %ecx, 0x1b4(%rbx) movq 0xc(%rsp), %rcx movq %rcx, 0x1ac(%rbx) movq 0x60(%rbx), %rcx cmpl $0x0, 0xa7c(%rcx) je 0x16b08 testb $0x1, 0x174(%rax) jne 0x16aff movl $0xa, 0x8(%rbx) testb $0x1, 0x174(%rax) je 0x16b0b movl $0xf, 0x8(%rbx) jmp 0x16b0b incl 0x8(%rbx) testb $0x2, 0x174(%rax) je 0x16b1c movq %rbx, %rdi callq 0x137db leaq 0x35999(%rip), %rdx # 0x4c4bc leaq 0x365a1(%rip), %r8 # 0x4d0cb xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x1463, %ecx # imm = 0x1463 xorl %eax, %eax callq 0xf997 jmp 0x16aaf
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_setup
int mbedtls_ssl_setup( mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf ) { int ret; const size_t len = MBEDTLS_SSL_BUFFER_LEN; ssl->conf = conf; /* * Prepare base structures */ if( ( ssl-> in_buf = mbedtls_calloc( 1, len ) ) == NULL || ( ssl->out_buf = mbedtls_calloc( 1, len ) ) == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc(%d bytes) failed", len ) ); mbedtls_free( ssl->in_buf ); ssl->in_buf = NULL; return( MBEDTLS_ERR_SSL_ALLOC_FAILED ); } #if defined(MBEDTLS_SSL_PROTO_DTLS) if( conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) { ssl->out_hdr = ssl->out_buf; ssl->out_ctr = ssl->out_buf + 3; ssl->out_len = ssl->out_buf + 11; ssl->out_iv = ssl->out_buf + 13; ssl->out_msg = ssl->out_buf + 13; ssl->in_hdr = ssl->in_buf; ssl->in_ctr = ssl->in_buf + 3; ssl->in_len = ssl->in_buf + 11; ssl->in_iv = ssl->in_buf + 13; ssl->in_msg = ssl->in_buf + 13; } else #endif { ssl->out_ctr = ssl->out_buf; ssl->out_hdr = ssl->out_buf + 8; ssl->out_len = ssl->out_buf + 11; ssl->out_iv = ssl->out_buf + 13; ssl->out_msg = ssl->out_buf + 13; ssl->in_ctr = ssl->in_buf; ssl->in_hdr = ssl->in_buf + 8; ssl->in_len = ssl->in_buf + 11; ssl->in_iv = ssl->in_buf + 13; ssl->in_msg = ssl->in_buf + 13; } if( ( ret = ssl_handshake_init( ssl ) ) != 0 ) return( ret ); return( 0 ); }
pushq %r15 pushq %r14 pushq %rbx movq %rsi, %r15 movq %rdi, %rbx movq %rsi, (%rdi) movl $0x1, %edi movl $0x414d, %esi # imm = 0x414D callq 0xf1d0 movq %rax, 0xa0(%rbx) testq %rax, %rax je 0x16bc2 movq %rax, %r14 movl $0x1, %edi movl $0x414d, %esi # imm = 0x414D callq 0xf1d0 movq %rax, 0x120(%rbx) testq %rax, %rax je 0x16bc2 testb $0x2, 0x174(%r15) jne 0x16c0c movq %rax, 0x128(%rbx) leaq 0x8(%rax), %rsi leaq 0x8(%r14), %rdx movq %r14, %rcx jmp 0x16c21 leaq 0x358f3(%rip), %rdx # 0x4c4bc leaq 0x36235(%rip), %r8 # 0x4ce05 movl $0x414d, %r9d # imm = 0x414D movq %rbx, %rdi movl $0x1, %esi movl $0x151f, %ecx # imm = 0x151F xorl %eax, %eax callq 0xf997 movq 0xa0(%rbx), %rdi callq 0xf030 movq $0x0, 0xa0(%rbx) movl $0xffff8100, %eax # imm = 0xFFFF8100 popq %rbx popq %r14 popq %r15 retq leaq 0x3(%rax), %rcx movq %rcx, 0x128(%rbx) leaq 0x3(%r14), %rcx movq %rax, %rsi movq %r14, %rdx leaq 0xd(%r14), %rdi addq $0xb, %r14 leaq 0xd(%rax), %r8 addq $0xb, %rax movq %rsi, 0x130(%rbx) movq %rax, 0x138(%rbx) movq %r8, 0x140(%rbx) movq %r8, 0x148(%rbx) movq %rcx, 0xa8(%rbx) movq %rdx, 0xb0(%rbx) movq %r14, 0xb8(%rbx) movq %rdi, 0xc0(%rbx) movq %rdi, 0xc8(%rbx) movq %rbx, %rdi popq %rbx popq %r14 popq %r15 jmp 0x16c7a
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
ssl_handshake_init
static int ssl_handshake_init( mbedtls_ssl_context *ssl ) { /* Clear old handshake information if present */ if( ssl->transform_negotiate ) mbedtls_ssl_transform_free( ssl->transform_negotiate ); if( ssl->session_negotiate ) mbedtls_ssl_session_free( ssl->session_negotiate ); if( ssl->handshake ) mbedtls_ssl_handshake_free( ssl->handshake ); /* * Either the pointers are now NULL or cleared properly and can be freed. * Now allocate missing structures. */ if( ssl->transform_negotiate == NULL ) { ssl->transform_negotiate = mbedtls_calloc( 1, sizeof(mbedtls_ssl_transform) ); } if( ssl->session_negotiate == NULL ) { ssl->session_negotiate = mbedtls_calloc( 1, sizeof(mbedtls_ssl_session) ); } if( ssl->handshake == NULL ) { ssl->handshake = mbedtls_calloc( 1, sizeof(mbedtls_ssl_handshake_params) ); } /* All pointers should exist and can be directly freed without issue */ if( ssl->handshake == NULL || ssl->transform_negotiate == NULL || ssl->session_negotiate == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc() of ssl sub-contexts failed" ) ); mbedtls_free( ssl->handshake ); mbedtls_free( ssl->transform_negotiate ); mbedtls_free( ssl->session_negotiate ); ssl->handshake = NULL; ssl->transform_negotiate = NULL; ssl->session_negotiate = NULL; return( MBEDTLS_ERR_SSL_ALLOC_FAILED ); } /* Initialize structures */ mbedtls_ssl_session_init( ssl->session_negotiate ); ssl_transform_init( ssl->transform_negotiate ); ssl_handshake_params_init( ssl->handshake ); #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) { ssl->handshake->alt_transform_out = ssl->transform_out; if( ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT ) ssl->handshake->retransmit_state = MBEDTLS_SSL_RETRANS_PREPARING; else ssl->handshake->retransmit_state = MBEDTLS_SSL_RETRANS_WAITING; ssl_set_timer( ssl, 0 ); } #endif return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r12 pushq %rbx movq %rdi, %rbx movq 0x80(%rdi), %rdi testq %rdi, %rdi je 0x16c96 callq 0x18455 movq 0x58(%rbx), %rdi testq %rdi, %rdi je 0x16ca4 callq 0x166fa movq 0x60(%rbx), %rdi testq %rdi, %rdi je 0x16cb2 callq 0x1849b leaq 0x58(%rbx), %r15 cmpq $0x0, 0x80(%rbx) je 0x16cc4 xorl %ebp, %ebp jmp 0x16ce1 movl $0x1, %edi movl $0x130, %esi # imm = 0x130 callq 0xf1d0 movq %rax, 0x80(%rbx) testq %rax, %rax sete %bpl movq (%r15), %r14 testq %r14, %r14 jne 0x16cfe movl $0x1, %edi movl $0x98, %esi callq 0xf1d0 movq %rax, %r14 movq %rax, (%r15) cmpq $0x0, 0x60(%rbx) je 0x16d73 testq %r14, %r14 setne %al notb %bpl testb %al, %bpl jne 0x16d9d leaq 0x3579e(%rip), %rdx # 0x4c4bc leaq 0x3727f(%rip), %r8 # 0x4dfa4 movq %rbx, %rdi movl $0x1, %esi movl $0x14c6, %ecx # imm = 0x14C6 xorl %eax, %eax callq 0xf997 movq 0x60(%rbx), %rdi callq 0xf030 movq 0x80(%rbx), %rdi callq 0xf030 movq 0x58(%rbx), %rdi callq 0xf030 movq $0x0, 0x80(%rbx) xorps %xmm0, %xmm0 movups %xmm0, (%r15) movl $0xffff8100, %ebp # imm = 0xFFFF8100 jmp 0x16ed3 movl $0x1, %edi movl $0xa98, %esi # imm = 0xA98 callq 0xf1d0 movq %rax, 0x60(%rbx) testq %rax, %rax sete %al testq %r14, %r14 sete %cl orb %bpl, %al orb %cl, %al jne 0x16d17 xorl %ebp, %ebp movl $0x98, %edx movq %r14, %rdi xorl %esi, %esi callq 0xf150 movq 0x80(%rbx), %r14 movl $0x130, %edx # imm = 0x130 movq %r14, %rdi xorl %esi, %esi callq 0xf150 leaq 0x80(%r14), %rdi callq 0x2a0fd leaq 0xd8(%r14), %rdi callq 0x2a0fd leaq 0x50(%r14), %rdi callq 0x38cf4 addq $0x68, %r14 movq %r14, %rdi callq 0x38cf4 movq 0x60(%rbx), %r14 movl $0xa98, %edx # imm = 0xA98 movq %r14, %rdi xorl %esi, %esi callq 0xf150 leaq 0x3f8(%r14), %r15 movq %r15, %rdi callq 0x3928c leaq 0x450(%r14), %r12 movq %r12, %rdi callq 0x40c04 movq %r15, %rdi callq 0x392c8 movq %r12, %rdi callq 0x40c3c leaq 0x4ac(%r14), %r15 movq %r15, %rdi callq 0x42170 movq %r15, %rdi xorl %esi, %esi callq 0x421ac leaq 0x518(%r14), %r15 movq %r15, %rdi callq 0x430d8 movq %r15, %rdi movl $0x1, %esi callq 0x43105 leaq 0x2025(%rip), %rax # 0x18e93 movq %rax, 0x5f0(%r14) movl $0x2, (%r14) leaq 0x8(%r14), %rdi callq 0x2ccd0 leaq 0x100(%r14), %rdi callq 0x2d8c7 movl $0x3, 0x388(%r14) movq (%rbx), %rax testb $0x2, 0x174(%rax) je 0x16ed3 movq 0x60(%rbx), %rcx movq 0x70(%rbx), %rdx movq %rdx, 0x3e8(%rcx) movb 0x174(%rax), %al addb %al, %al andb $0x2, %al movb %al, 0x3cc(%rcx) xorl %ebp, %ebp movq %rbx, %rdi xorl %esi, %esi callq 0x125b5 movl %ebp, %eax popq %rbx popq %r12 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_set_session
int mbedtls_ssl_set_session( mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session ) { int ret; if( ssl == NULL || session == NULL || ssl->session_negotiate == NULL || ssl->conf->endpoint != MBEDTLS_SSL_IS_CLIENT ) { return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); } if( ( ret = ssl_session_copy( ssl->session_negotiate, session ) ) != 0 ) return( ret ); ssl->handshake->resume = 1; return( 0 ); }
testq %rdi, %rdi sete %al testq %rsi, %rsi sete %cl orb %al, %cl movl $0xffff8f00, %eax # imm = 0xFFFF8F00 jne 0x17149 pushq %rbx movq %rdi, %rbx movq 0x58(%rdi), %rdi testq %rdi, %rdi je 0x17148 movq (%rbx), %rcx testb $0x1, 0x174(%rcx) jne 0x17148 callq 0x1714a testl %eax, %eax jne 0x17148 movq 0x60(%rbx), %rax movl $0x1, 0xa7c(%rax) xorl %eax, %eax popq %rbx retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_set_hs_psk
int mbedtls_ssl_set_hs_psk( mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len ) { if( psk == NULL || ssl->handshake == NULL ) return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); if( psk_len > MBEDTLS_PSK_MAX_LEN ) return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); if( ssl->handshake->psk != NULL ) mbedtls_free( ssl->handshake->psk ); if( ( ssl->handshake->psk = mbedtls_calloc( 1, psk_len ) ) == NULL ) return( MBEDTLS_ERR_SSL_ALLOC_FAILED ); ssl->handshake->psk_len = psk_len; memcpy( ssl->handshake->psk, psk, ssl->handshake->psk_len ); return( 0 ); }
movl $0xffff8f00, %eax # imm = 0xFFFF8F00 testq %rsi, %rsi je 0x17461 pushq %r15 pushq %r14 pushq %r12 pushq %rbx pushq %rax movq %rdx, %rbx movq %rdi, %r15 movq 0x60(%rdi), %r12 testq %r12, %r12 sete %cl cmpq $0x21, %rdx setae %dl orb %cl, %dl jne 0x17456 movq %rsi, %r14 movq 0x370(%r12), %rdi testq %rdi, %rdi je 0x1741d callq 0xf030 movq 0x60(%r15), %r12 movl $0x1, %edi movq %rbx, %rsi callq 0xf1d0 movq %rax, 0x370(%r12) testq %rax, %rax je 0x17451 movq %rbx, 0x378(%r12) movq %rax, %rdi movq %r14, %rsi movq %rbx, %rdx callq 0xf240 xorl %eax, %eax jmp 0x17456 movl $0xffff8100, %eax # imm = 0xFFFF8100 addq $0x8, %rsp popq %rbx popq %r12 popq %r14 popq %r15 retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_conf_dh_param_ctx
int mbedtls_ssl_conf_dh_param_ctx( mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx ) { int ret; if( ( ret = mbedtls_mpi_copy( &conf->dhm_P, &dhm_ctx->P ) ) != 0 || ( ret = mbedtls_mpi_copy( &conf->dhm_G, &dhm_ctx->G ) ) != 0 ) { mbedtls_mpi_free( &conf->dhm_P ); mbedtls_mpi_free( &conf->dhm_G ); return( ret ); } return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %rbx pushq %rax movq %rsi, %r15 movq %rdi, %rbx leaq 0xf8(%rdi), %r14 addq $0x8, %rsi movq %r14, %rdi callq 0x25a94 testl %eax, %eax jne 0x17513 leaq 0x110(%rbx), %rdi addq $0x20, %r15 movq %r15, %rsi callq 0x25a94 testl %eax, %eax je 0x17539 movl %eax, %ebp movq %r14, %rdi callq 0x2590b addq $0x110, %rbx # imm = 0x110 movq %rbx, %rdi callq 0x2590b movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %r14 popq %r15 popq %rbp retq xorl %ebp, %ebp jmp 0x1752c
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_get_version
const char *mbedtls_ssl_get_version( const mbedtls_ssl_context *ssl ) { #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) { switch( ssl->minor_ver ) { case MBEDTLS_SSL_MINOR_VERSION_2: return( "DTLSv1.0" ); case MBEDTLS_SSL_MINOR_VERSION_3: return( "DTLSv1.2" ); default: return( "unknown (DTLS)" ); } } #endif switch( ssl->minor_ver ) { case MBEDTLS_SSL_MINOR_VERSION_0: return( "SSLv3.0" ); case MBEDTLS_SSL_MINOR_VERSION_1: return( "TLSv1.0" ); case MBEDTLS_SSL_MINOR_VERSION_2: return( "TLSv1.1" ); case MBEDTLS_SSL_MINOR_VERSION_3: return( "TLSv1.2" ); default: return( "unknown" ); } }
movq (%rdi), %rax testb $0x2, 0x174(%rax) movl 0x18(%rdi), %eax jne 0x1780f cmpl $0x3, %eax ja 0x17835 leaq 0x34ca5(%rip), %rcx # 0x4c4ac movslq (%rcx,%rax,4), %rax addq %rcx, %rax retq cmpq $0x3, %rax leaq 0x358cc(%rip), %rcx # 0x4d0e6 leaq 0x358ce(%rip), %rdx # 0x4d0ef cmoveq %rcx, %rdx cmpq $0x2, %rax leaq 0x358ad(%rip), %rax # 0x4d0dd cmovneq %rdx, %rax retq leaq 0x43226(%rip), %rax # 0x5aa62 retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_get_max_frag_len
size_t mbedtls_ssl_get_max_frag_len( const mbedtls_ssl_context *ssl ) { size_t max_len; /* * Assume mfl_code is correct since it was checked when set */ max_len = mfl_code_to_length[ssl->conf->mfl_code]; /* * Check if a smaller max length was negotiated */ if( ssl->session_out != NULL && mfl_code_to_length[ssl->session_out->mfl_code] < max_len ) { max_len = mfl_code_to_length[ssl->session_out->mfl_code]; } return max_len; }
movq (%rdi), %rax movq 0x48(%rdi), %rcx movl 0x174(%rax), %eax shrl $0x5, %eax andl $0x1c, %eax leaq 0x34b8e(%rip), %rdx # 0x4c470 movl (%rax,%rdx), %eax testq %rcx, %rcx je 0x178f9 movzbl 0x8c(%rcx), %ecx movl (%rdx,%rcx,4), %ecx cmpl %eax, %ecx cmovbl %ecx, %eax movl %eax, %eax retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_get_session
int mbedtls_ssl_get_session( const mbedtls_ssl_context *ssl, mbedtls_ssl_session *dst ) { if( ssl == NULL || dst == NULL || ssl->session == NULL || ssl->conf->endpoint != MBEDTLS_SSL_IS_CLIENT ) { return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); } return( ssl_session_copy( dst, ssl->session ) ); }
testq %rdi, %rdi sete %al testq %rsi, %rsi sete %cl orb %al, %cl jne 0x17942 movq 0x50(%rdi), %rax testq %rax, %rax je 0x17942 movq (%rdi), %rcx testb $0x1, 0x174(%rcx) jne 0x17942 movq %rsi, %rdi movq %rax, %rsi jmp 0x1714a movl $0xffff8f00, %eax # imm = 0xFFFF8F00 retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_handshake
int mbedtls_ssl_handshake( mbedtls_ssl_context *ssl ) { int ret = 0; if( ssl == NULL || ssl->conf == NULL ) return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> handshake" ) ); while( ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER ) { ret = mbedtls_ssl_handshake_step( ssl ); if( ret != 0 ) break; } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= handshake" ) ); return( ret ); }
pushq %r14 pushq %rbx pushq %rax movl $0xffff8f00, %ebx # imm = 0xFFFF8F00 testq %rdi, %rdi je 0x179f8 movq %rdi, %r14 cmpq $0x0, (%rdi) je 0x179f8 leaq 0x34b18(%rip), %rdx # 0x4c4bc leaq 0x35763(%rip), %r8 # 0x4d10e xorl %ebx, %ebx movq %r14, %rdi movl $0x2, %esi movl $0x18c0, %ecx # imm = 0x18C0 xorl %eax, %eax callq 0xf997 cmpl $0x10, 0x8(%r14) je 0x179d6 movq %r14, %rdi callq 0x17948 testl %eax, %eax je 0x179c1 movl %eax, %ebx leaq 0x34adf(%rip), %rdx # 0x4c4bc leaq 0x35737(%rip), %r8 # 0x4d11b movq %r14, %rdi movl $0x2, %esi movl $0x18ca, %ecx # imm = 0x18CA xorl %eax, %eax callq 0xf997 movl %ebx, %eax addq $0x8, %rsp popq %rbx popq %r14 retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
ssl_start_renegotiation
static int ssl_start_renegotiation( mbedtls_ssl_context *ssl ) { int ret; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> renegotiate" ) ); if( ( ret = ssl_handshake_init( ssl ) ) != 0 ) return( ret ); /* RFC 6347 4.2.2: "[...] the HelloRequest will have message_seq = 0 and * the ServerHello will have message_seq = 1" */ #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM && ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_PENDING ) { if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER ) ssl->handshake->out_msg_seq = 1; else ssl->handshake->in_msg_seq = 1; } #endif ssl->state = MBEDTLS_SSL_HELLO_REQUEST; ssl->renego_status = MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS; if( ( ret = mbedtls_ssl_handshake( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_handshake", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= renegotiate" ) ); return( 0 ); }
pushq %rbp pushq %rbx pushq %rax movq %rdi, %rbx leaq 0x34938(%rip), %rdx # 0x4c4bc leaq 0x3646a(%rip), %r8 # 0x4dff5 movl $0x2, %esi movl $0x18f7, %ecx # imm = 0x18F7 xorl %eax, %eax callq 0xf997 movq %rbx, %rdi callq 0x16c7a movl %eax, %ebp testl %eax, %eax jne 0x17c44 movq (%rbx), %rax movl 0x174(%rax), %eax testb $0x2, %al je 0x17bdf cmpl $0x3, 0xc(%rbx) jne 0x17bdf movq 0x60(%rbx), %rcx testb $0x1, %al jne 0x17bd5 movl $0x1, 0x3ac(%rcx) jmp 0x17bdf movl $0x1, 0x3a8(%rcx) movabsq $0x100000000, %rax # imm = 0x100000000 movq %rax, 0x8(%rbx) movq %rbx, %rdi callq 0x17986 testl %eax, %eax je 0x17c20 movl %eax, %ebp leaq 0x348ba(%rip), %rdx # 0x4c4bc leaq 0x35537(%rip), %r8 # 0x4d140 movq %rbx, %rdi movl $0x1, %esi movl $0x190e, %ecx # imm = 0x190E movl %eax, %r9d callq 0xfa82 jmp 0x17c44 leaq 0x34895(%rip), %rdx # 0x4c4bc leaq 0x363d6(%rip), %r8 # 0x4e004 xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x1912, %ecx # imm = 0x1912 xorl %eax, %eax callq 0xf997 movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_read
int mbedtls_ssl_read( mbedtls_ssl_context *ssl, unsigned char *buf, size_t len ) { int ret, record_read = 0; size_t n; if( ssl == NULL || ssl->conf == NULL ) return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> read" ) ); #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) { if( ( ret = mbedtls_ssl_flush_output( ssl ) ) != 0 ) return( ret ); if( ssl->handshake != NULL && ssl->handshake->retransmit_state == MBEDTLS_SSL_RETRANS_SENDING ) { if( ( ret = mbedtls_ssl_resend( ssl ) ) != 0 ) return( ret ); } } #endif #if defined(MBEDTLS_SSL_RENEGOTIATION) if( ( ret = ssl_check_ctr_renegotiate( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "ssl_check_ctr_renegotiate", ret ); return( ret ); } #endif if( ssl->state != MBEDTLS_SSL_HANDSHAKE_OVER ) { ret = mbedtls_ssl_handshake( ssl ); if( ret == MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO ) { record_read = 1; } else if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_handshake", ret ); return( ret ); } } if( ssl->in_offt == NULL ) { /* Start timer if not already running */ if( ssl->f_get_timer != NULL && ssl->f_get_timer( ssl->p_timer ) == -1 ) { ssl_set_timer( ssl, ssl->conf->read_timeout ); } if( ! record_read ) { if( ( ret = mbedtls_ssl_read_record( ssl ) ) != 0 ) { if( ret == MBEDTLS_ERR_SSL_CONN_EOF ) return( 0 ); MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret ); return( ret ); } } if( ssl->in_msglen == 0 && ssl->in_msgtype == MBEDTLS_SSL_MSG_APPLICATION_DATA ) { /* * OpenSSL sends empty messages to randomize the IV */ if( ( ret = mbedtls_ssl_read_record( ssl ) ) != 0 ) { if( ret == MBEDTLS_ERR_SSL_CONN_EOF ) return( 0 ); MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret ); return( ret ); } } #if defined(MBEDTLS_SSL_RENEGOTIATION) if( ssl->in_msgtype == MBEDTLS_SSL_MSG_HANDSHAKE ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "received handshake message" ) ); #if defined(MBEDTLS_SSL_CLI_C) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT && ( ssl->in_msg[0] != MBEDTLS_SSL_HS_HELLO_REQUEST || ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) ) ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "handshake received (not HelloRequest)" ) ); /* With DTLS, drop the packet (probably from last handshake) */ #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) return( MBEDTLS_ERR_SSL_WANT_READ ); #endif return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER && ssl->in_msg[0] != MBEDTLS_SSL_HS_CLIENT_HELLO ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "handshake received (not ClientHello)" ) ); /* With DTLS, drop the packet (probably from last handshake) */ #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) return( MBEDTLS_ERR_SSL_WANT_READ ); #endif return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } #endif if( ssl->conf->disable_renegotiation == MBEDTLS_SSL_RENEGOTIATION_DISABLED || ( ssl->secure_renegotiation == MBEDTLS_SSL_LEGACY_RENEGOTIATION && ssl->conf->allow_legacy_renegotiation == MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION ) ) { MBEDTLS_SSL_DEBUG_MSG( 3, ( "refusing renegotiation, sending alert" ) ); #if defined(MBEDTLS_SSL_PROTO_SSL3) if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ) { /* * SSLv3 does not have a "no_renegotiation" alert */ if( ( ret = mbedtls_ssl_send_fatal_handshake_failure( ssl ) ) != 0 ) return( ret ); } else #endif /* MBEDTLS_SSL_PROTO_SSL3 */ #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) || \ defined(MBEDTLS_SSL_PROTO_TLS1_2) if( ssl->minor_ver >= MBEDTLS_SSL_MINOR_VERSION_1 ) { if( ( ret = mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_WARNING, MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION ) ) != 0 ) { return( ret ); } } else #endif /* MBEDTLS_SSL_PROTO_TLS1 || MBEDTLS_SSL_PROTO_TLS1_1 || MBEDTLS_SSL_PROTO_TLS1_2 */ { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } } else { /* DTLS clients need to know renego is server-initiated */ #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM && ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT ) { ssl->renego_status = MBEDTLS_SSL_RENEGOTIATION_PENDING; } #endif ret = ssl_start_renegotiation( ssl ); if( ret == MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO ) { record_read = 1; } else if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "ssl_start_renegotiation", ret ); return( ret ); } } /* If a non-handshake record was read during renego, fallthrough, * else tell the user they should call mbedtls_ssl_read() again */ if( ! record_read ) return( MBEDTLS_ERR_SSL_WANT_READ ); } else if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_PENDING ) { if( ssl->conf->renego_max_records >= 0 ) { if( ++ssl->renego_records_seen > ssl->conf->renego_max_records ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation requested, " "but not honored by client" ) ); return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } } } #endif /* MBEDTLS_SSL_RENEGOTIATION */ /* Fatal and closure alerts handled by mbedtls_ssl_read_record() */ if( ssl->in_msgtype == MBEDTLS_SSL_MSG_ALERT ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "ignoring non-fatal non-closure alert" ) ); return( MBEDTLS_ERR_SSL_WANT_READ ); } if( ssl->in_msgtype != MBEDTLS_SSL_MSG_APPLICATION_DATA ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad application data message" ) ); return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } ssl->in_offt = ssl->in_msg; /* We're going to return something now, cancel timer, * except if handshake (renegotiation) is in progress */ if( ssl->state == MBEDTLS_SSL_HANDSHAKE_OVER ) ssl_set_timer( ssl, 0 ); #if defined(MBEDTLS_SSL_PROTO_DTLS) /* If we requested renego but received AppData, resend HelloRequest. * Do it now, after setting in_offt, to avoid taking this branch * again if ssl_write_hello_request() returns WANT_WRITE */ #if defined(MBEDTLS_SSL_SRV_C) && defined(MBEDTLS_SSL_RENEGOTIATION) if( ssl->conf->endpoint == MBEDTLS_SSL_IS_SERVER && ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_PENDING ) { if( ( ret = ssl_resend_hello_request( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "ssl_resend_hello_request", ret ); return( ret ); } } #endif /* MBEDTLS_SSL_SRV_C && MBEDTLS_SSL_RENEGOTIATION */ #endif } n = ( len < ssl->in_msglen ) ? len : ssl->in_msglen; memcpy( buf, ssl->in_offt, n ); ssl->in_msglen -= n; if( ssl->in_msglen == 0 ) /* all bytes consumed */ ssl->in_offt = NULL; else /* more data available */ ssl->in_offt += n; MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= read" ) ); return( (int) n ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r12 pushq %rbx movl $0xffff8f00, %ebp # imm = 0xFFFF8F00 testq %rdi, %rdi je 0x17ece movq %rdi, %rbx cmpq $0x0, (%rdi) je 0x17ece movq %rdx, %r14 movq %rsi, %r15 leaq 0x3483f(%rip), %rdx # 0x4c4bc leaq 0x354d2(%rip), %r8 # 0x4d156 movq %rbx, %rdi movl $0x2, %esi movl $0x197a, %ecx # imm = 0x197A xorl %eax, %eax callq 0xf997 movq (%rbx), %rax testb $0x2, 0x174(%rax) jne 0x17cda movq %rbx, %rdi callq 0x18171 testl %eax, %eax je 0x17ced movl %eax, %ebp leaq 0x34803(%rip), %rdx # 0x4c4bc leaq 0x3549e(%rip), %r8 # 0x4d15e movq %rbx, %rdi movl $0x1, %esi movl $0x198e, %ecx # imm = 0x198E movl %ebp, %r9d callq 0xfa82 jmp 0x17ece movq %rbx, %rdi callq 0x1287b testl %eax, %eax je 0x17d28 movl %eax, %ebp jmp 0x17ece movb $0x1, %r12b cmpl $0x10, 0x8(%rbx) je 0x17d56 movq %rbx, %rdi callq 0x17986 cmpl $0xffff9500, %eax # imm = 0xFFFF9500 je 0x17d53 movl %eax, %ebp testl %eax, %eax je 0x17d56 leaq 0x347aa(%rip), %rdx # 0x4c4bc leaq 0x35427(%rip), %r8 # 0x4d140 movq %rbx, %rdi movl $0x1, %esi movl $0x199c, %ecx # imm = 0x199C jmp 0x17ccd movq 0x60(%rbx), %rax testq %rax, %rax je 0x17ca4 cmpb $0x1, 0x3cc(%rax) jne 0x17ca4 movq %rbx, %rdi callq 0x12663 testl %eax, %eax jne 0x17ce6 jmp 0x17ca4 xorl %r12d, %r12d cmpq $0x0, 0xd0(%rbx) je 0x17d94 movq 0xd0(%rbx), %rsi movq 0xe0(%rbx), %rax cmpq %r14, %rax cmovbq %rax, %r14 movq %r15, %rdi movq %r14, %rdx callq 0xf240 subq %r14, 0xe0(%rbx) jne 0x17e98 xorl %eax, %eax jmp 0x17ea2 movq 0x98(%rbx), %rax testq %rax, %rax je 0x17dbf movq 0x88(%rbx), %rdi callq *%rax cmpl $-0x1, %eax jne 0x17dbf movq (%rbx), %rax movl 0x150(%rax), %esi movq %rbx, %rdi callq 0x125b5 testb %r12b, %r12b je 0x17de1 movq %rbx, %rdi callq 0x141f2 cmpl $0xffff8d80, %eax # imm = 0xFFFF8D80 je 0x17f25 movl %eax, %ebp testl %eax, %eax jne 0x17f29 cmpq $0x0, 0xe0(%rbx) jne 0x17e11 cmpl $0x17, 0xd8(%rbx) jne 0x17e11 movq %rbx, %rdi callq 0x141f2 cmpl $0xffff8d80, %eax # imm = 0xFFFF8D80 je 0x17f25 movl %eax, %ebp testl %eax, %eax jne 0x18105 cmpl $0x16, 0xd8(%rbx) jne 0x17ed9 leaq 0x34697(%rip), %rdx # 0x4c4bc leaq 0x3534c(%rip), %r8 # 0x4d178 movq %rbx, %rdi movl $0x1, %esi movl $0x19c9, %ecx # imm = 0x19C9 xorl %eax, %eax callq 0xf997 movq (%rbx), %rax movq 0xc8(%rbx), %rcx movl 0x174(%rax), %eax movb (%rcx), %cl testb $0x1, %al jne 0x17f49 testb %cl, %cl jne 0x17e78 movl %eax, %ecx andl $0x2, %ecx leaq 0x4(,%rcx,4), %rcx cmpq %rcx, 0x110(%rbx) je 0x17f4e leaq 0x3463d(%rip), %rdx # 0x4c4bc leaq 0x3530d(%rip), %r8 # 0x4d193 movq %rbx, %rdi movl $0x1, %esi movl $0x19d0, %ecx # imm = 0x19D0 jmp 0x17fbf movq 0xd0(%rbx), %rax addq %r14, %rax movq %rax, 0xd0(%rbx) leaq 0x3460c(%rip), %rdx # 0x4c4bc leaq 0x353c2(%rip), %r8 # 0x4d279 movq %rbx, %rdi movl $0x2, %esi movl $0x1a6a, %ecx # imm = 0x1A6A xorl %eax, %eax callq 0xf997 movl %r14d, %ebp movl %ebp, %eax popq %rbx popq %r12 popq %r14 popq %r15 popq %rbp retq cmpl $0x3, 0xc(%rbx) jne 0x18036 movq (%rbx), %rax movl 0x15c(%rax), %eax testl %eax, %eax js 0x18036 movl 0x10(%rbx), %ecx leal 0x1(%rcx), %edx movl %edx, 0x10(%rbx) cmpl %eax, %ecx jl 0x18036 leaq 0x345b0(%rip), %rdx # 0x4c4bc leaq 0x352f1(%rip), %r8 # 0x4d204 movq %rbx, %rdi movl $0x1, %esi movl $0x1a30, %ecx # imm = 0x1A30 jmp 0x180f4 xorl %ebp, %ebp jmp 0x17ece leaq 0x3458c(%rip), %rdx # 0x4c4bc leaq 0x34e7e(%rip), %r8 # 0x4cdb5 movq %rbx, %rdi movl $0x1, %esi movl $0x19b1, %ecx # imm = 0x19B1 jmp 0x17ccd cmpb $0x1, %cl jne 0x17fa4 btl $0xe, %eax jae 0x17fe2 movl %eax, %ecx andl $0x30, %ecx orl 0x190(%rbx), %ecx je 0x17fe2 andl $0x3, %eax cmpl $0x2, %eax jne 0x17f74 movl $0x3, 0xc(%rbx) movq %rbx, %rdi callq 0x17b77 cmpl $0xffff9500, %eax # imm = 0xFFFF9500 je 0x18036 movl %eax, %ebp testl %eax, %eax jne 0x18151 movl $0xffff9700, %ebp # imm = 0xFFFF9700 testb %r12b, %r12b jne 0x17ece jmp 0x18036 leaq 0x34511(%rip), %rdx # 0x4c4bc leaq 0x35207(%rip), %r8 # 0x4d1b9 movq %rbx, %rdi movl $0x1, %esi movl $0x19dd, %ecx # imm = 0x19DD xorl %eax, %eax callq 0xf997 movq (%rbx), %rax testb $0x2, 0x174(%rax) movl $0xffff8900, %eax # imm = 0xFFFF8900 movl $0xffff9700, %ebp # imm = 0xFFFF9700 cmovel %eax, %ebp jmp 0x17ece leaq 0x344d3(%rip), %rdx # 0x4c4bc leaq 0x351ee(%rip), %r8 # 0x4d1de movq %rbx, %rdi movl $0x3, %esi movl $0x19ed, %ecx # imm = 0x19ED xorl %eax, %eax callq 0xf997 cmpl $0x0, 0x18(%rbx) jle 0x18125 movq %rbx, %rdi movl $0x1, %esi movl $0x64, %edx callq 0x15727 testl %eax, %eax setne %cl movl $0xffff9700, %ebp # imm = 0xFFFF9700 cmovnel %eax, %ebp orb %cl, %r12b jne 0x17ece movl 0xd8(%rbx), %eax cmpl $0x17, %eax je 0x18076 leaq 0x34474(%rip), %rdx # 0x4c4bc cmpl $0x15, %eax jne 0x180e0 leaq 0x351df(%rip), %r8 # 0x4d237 movq %rbx, %rdi movl $0x2, %esi movl $0x1a3a, %ecx # imm = 0x1A3A xorl %eax, %eax callq 0xf997 movl $0xffff9700, %ebp # imm = 0xFFFF9700 jmp 0x17ece movq 0xc8(%rbx), %rax movq %rax, 0xd0(%rbx) cmpl $0x10, 0x8(%rbx) jne 0x18094 movq %rbx, %rdi xorl %esi, %esi callq 0x125b5 movq (%rbx), %rax testb $0x1, 0x174(%rax) je 0x17d60 cmpl $0x3, 0xc(%rbx) jne 0x17d60 movq %rbx, %rdi callq 0x12812 testl %eax, %eax je 0x17d60 movl %eax, %ebp leaq 0x343f5(%rip), %rdx # 0x4c4bc leaq 0x34746(%rip), %r8 # 0x4c814 movq %rbx, %rdi movl $0x1, %esi movl $0x1a55, %ecx # imm = 0x1A55 jmp 0x17ccd leaq 0x35175(%rip), %r8 # 0x4d25c movq %rbx, %rdi movl $0x1, %esi movl $0x1a40, %ecx # imm = 0x1A40 xorl %eax, %eax callq 0xf997 movl $0xffff8900, %ebp # imm = 0xFFFF8900 jmp 0x17ece leaq 0x343b0(%rip), %rdx # 0x4c4bc leaq 0x34ca2(%rip), %r8 # 0x4cdb5 movq %rbx, %rdi movl $0x1, %esi movl $0x19c1, %ecx # imm = 0x19C1 jmp 0x17ccd leaq 0x34390(%rip), %rdx # 0x4c4bc leaq 0x34442(%rip), %r8 # 0x4c575 movq %rbx, %rdi movl $0x1, %esi movl $0x1a09, %ecx # imm = 0x1A09 xorl %eax, %eax callq 0xf997 movl $0xffff9400, %ebp # imm = 0xFFFF9400 jmp 0x17ece leaq 0x34364(%rip), %rdx # 0x4c4bc leaq 0x34fc9(%rip), %r8 # 0x4d128 movq %rbx, %rdi movl $0x1, %esi movl $0x1a1e, %ecx # imm = 0x1A1E jmp 0x17ccd
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_transform_free
void mbedtls_ssl_transform_free( mbedtls_ssl_transform *transform ) { if( transform == NULL ) return; #if defined(MBEDTLS_ZLIB_SUPPORT) deflateEnd( &transform->ctx_deflate ); inflateEnd( &transform->ctx_inflate ); #endif mbedtls_cipher_free( &transform->cipher_ctx_enc ); mbedtls_cipher_free( &transform->cipher_ctx_dec ); mbedtls_md_free( &transform->md_ctx_enc ); mbedtls_md_free( &transform->md_ctx_dec ); mbedtls_zeroize( transform, sizeof( mbedtls_ssl_transform ) ); }
testq %rdi, %rdi je 0x1849a pushq %rbx movq %rdi, %rbx addq $0x80, %rdi callq 0x2a11c leaq 0xd8(%rbx), %rdi callq 0x2a11c leaq 0x50(%rbx), %rdi callq 0x38d03 leaq 0x68(%rbx), %rdi callq 0x38d03 xorl %eax, %eax movb $0x0, (%rbx,%rax) incq %rax cmpq $0x130, %rax # imm = 0x130 jne 0x1848a popq %rbx retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
ssl_cookie_write_dummy
static int ssl_cookie_write_dummy( void *ctx, unsigned char **p, unsigned char *end, const unsigned char *cli_id, size_t cli_id_len ) { ((void) ctx); ((void) p); ((void) end); ((void) cli_id); ((void) cli_id_len); return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE ); }
movl $0xffff8f80, %eax # imm = 0xFFFF8F80 retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_config_free
void mbedtls_ssl_config_free( mbedtls_ssl_config *conf ) { #if defined(MBEDTLS_DHM_C) mbedtls_mpi_free( &conf->dhm_P ); mbedtls_mpi_free( &conf->dhm_G ); #endif #if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) if( conf->psk != NULL ) { mbedtls_zeroize( conf->psk, conf->psk_len ); mbedtls_zeroize( conf->psk_identity, conf->psk_identity_len ); mbedtls_free( conf->psk ); mbedtls_free( conf->psk_identity ); conf->psk_len = 0; conf->psk_identity_len = 0; } #endif #if defined(MBEDTLS_X509_CRT_PARSE_C) ssl_key_cert_free( conf->key_cert ); #endif mbedtls_zeroize( conf, sizeof( mbedtls_ssl_config ) ); }
pushq %r14 pushq %rbx pushq %rax movq %rdi, %rbx addq $0xf8, %rdi callq 0x2590b leaq 0x110(%rbx), %rdi callq 0x2590b movq 0x128(%rbx), %rax testq %rax, %rax je 0x1890a movq 0x130(%rbx), %rcx testq %rcx, %rcx je 0x188c1 xorl %edx, %edx movb $0x0, (%rax,%rdx) incq %rdx cmpq %rdx, %rcx jne 0x188b5 movq 0x140(%rbx), %rax testq %rax, %rax je 0x188e2 movq 0x138(%rbx), %rcx xorl %edx, %edx movb $0x0, (%rcx,%rdx) incq %rdx cmpq %rdx, %rax jne 0x188d6 movq 0x128(%rbx), %rdi callq 0xf030 movq 0x138(%rbx), %rdi callq 0xf030 xorl %eax, %eax movq %rax, 0x130(%rbx) movq %rax, 0x140(%rbx) movq 0xd0(%rbx), %rdi testq %rdi, %rdi je 0x18927 movq 0x10(%rdi), %r14 callq 0xf030 movq %r14, %rdi testq %r14, %r14 jne 0x18916 xorl %eax, %eax movb $0x0, (%rbx,%rax) incq %rax cmpq $0x178, %rax # imm = 0x178 jne 0x18929 addq $0x8, %rsp popq %rbx popq %r14 retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_pk_alg_from_sig
mbedtls_pk_type_t mbedtls_ssl_pk_alg_from_sig( unsigned char sig ) { switch( sig ) { #if defined(MBEDTLS_RSA_C) case MBEDTLS_SSL_SIG_RSA: return( MBEDTLS_PK_RSA ); #endif #if defined(MBEDTLS_ECDSA_C) case MBEDTLS_SSL_SIG_ECDSA: return( MBEDTLS_PK_ECDSA ); #endif default: return( MBEDTLS_PK_NONE ); } }
xorl %eax, %eax cmpl $0x3, %edi sete %al shll $0x2, %eax cmpl $0x1, %edi cmovel %edi, %eax retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_hash_from_md_alg
unsigned char mbedtls_ssl_hash_from_md_alg( int md ) { switch( md ) { #if defined(MBEDTLS_MD5_C) case MBEDTLS_MD_MD5: return( MBEDTLS_SSL_HASH_MD5 ); #endif #if defined(MBEDTLS_SHA1_C) case MBEDTLS_MD_SHA1: return( MBEDTLS_SSL_HASH_SHA1 ); #endif #if defined(MBEDTLS_SHA256_C) case MBEDTLS_MD_SHA224: return( MBEDTLS_SSL_HASH_SHA224 ); case MBEDTLS_MD_SHA256: return( MBEDTLS_SSL_HASH_SHA256 ); #endif #if defined(MBEDTLS_SHA512_C) case MBEDTLS_MD_SHA384: return( MBEDTLS_SSL_HASH_SHA384 ); case MBEDTLS_MD_SHA512: return( MBEDTLS_SSL_HASH_SHA512 ); #endif default: return( MBEDTLS_SSL_HASH_NONE ); } }
addl $-0x3, %edi leal 0x1(%rdi), %eax xorl %ecx, %ecx cmpl $0x6, %edi movzbl %al, %eax cmovael %ecx, %eax retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_read_version
void mbedtls_ssl_read_version( int *major, int *minor, int transport, const unsigned char ver[2] ) { #if defined(MBEDTLS_SSL_PROTO_DTLS) if( transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) { *major = 255 - ver[0] + 2; *minor = 255 - ver[1] + 1; if( *minor == MBEDTLS_SSL_MINOR_VERSION_1 ) ++*minor; /* DTLS 1.0 stored as TLS 1.1 internally */ } else #else ((void) transport); #endif { *major = ver[0]; *minor = ver[1]; } }
movzbl (%rcx), %eax cmpl $0x1, %edx jne 0x18a03 notb %al movzbl %al, %eax addl $0x2, %eax movl %eax, (%rdi) movzbl 0x1(%rcx), %eax movl $0xff, %ecx movl %eax, %edx xorl %ecx, %edx incl %edx cmpl %ecx, %eax movl $0x2, %eax cmovnel %edx, %eax jmp 0x18a09 movl %eax, (%rdi) movzbl 0x1(%rcx), %eax movl %eax, (%rsi) retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
tls_prf_generic
static int tls_prf_generic( mbedtls_md_type_t md_type, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen ) { size_t nb; size_t i, j, k, md_len; unsigned char tmp[128]; unsigned char h_i[MBEDTLS_MD_MAX_SIZE]; const mbedtls_md_info_t *md_info; mbedtls_md_context_t md_ctx; int ret; mbedtls_md_init( &md_ctx ); if( ( md_info = mbedtls_md_info_from_type( md_type ) ) == NULL ) return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); md_len = mbedtls_md_get_size( md_info ); if( sizeof( tmp ) < md_len + strlen( label ) + rlen ) return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); nb = strlen( label ); memcpy( tmp + md_len, label, nb ); memcpy( tmp + md_len + nb, random, rlen ); nb += rlen; /* * Compute P_<hash>(secret, label + random)[0..dlen] */ if ( ( ret = mbedtls_md_setup( &md_ctx, md_info, 1 ) ) != 0 ) return( ret ); mbedtls_md_hmac_starts( &md_ctx, secret, slen ); mbedtls_md_hmac_update( &md_ctx, tmp + md_len, nb ); mbedtls_md_hmac_finish( &md_ctx, tmp ); for( i = 0; i < dlen; i += md_len ) { mbedtls_md_hmac_reset ( &md_ctx ); mbedtls_md_hmac_update( &md_ctx, tmp, md_len + nb ); mbedtls_md_hmac_finish( &md_ctx, h_i ); mbedtls_md_hmac_reset ( &md_ctx ); mbedtls_md_hmac_update( &md_ctx, tmp, md_len ); mbedtls_md_hmac_finish( &md_ctx, tmp ); k = ( i + md_len > dlen ) ? dlen % md_len : md_len; for( j = 0; j < k; j++ ) dstbuf[i + j] = h_i[j]; } mbedtls_md_free( &md_ctx ); mbedtls_zeroize( tmp, sizeof( tmp ) ); mbedtls_zeroize( h_i, sizeof( h_i ) ); return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x108, %rsp # imm = 0x108 movq %r9, %r15 movq %r8, 0x18(%rsp) movq %rcx, %rbp movq %rdx, %r14 movq %rsi, %r12 movl %edi, %ebx leaq 0x28(%rsp), %rdi callq 0x38cf4 movl %ebx, %edi callq 0x38cdb testq %rax, %rax je 0x18c15 movq %rax, %r13 movq %r12, 0x10(%rsp) movq %rax, %rdi callq 0x39265 movzbl %al, %ebx movq %rbp, %rdi callq 0xf100 movq %rax, %r12 addq %r15, %rax movq %rax, 0x8(%rsp) leaq (%rax,%rbx), %rcx movl $0xffff8f00, %eax # imm = 0xFFFF8F00 movq %rcx, 0x20(%rsp) cmpq $0x80, %rcx ja 0x18c1a leaq (%rsp,%rbx), %rdi addq $0x80, %rdi movq %rbp, %rsi movq %rdi, %rbp movq %r12, %rdx callq 0xf240 addq %rbp, %r12 movq %r12, %rdi movq 0x18(%rsp), %rsi movq %r15, %rdx callq 0xf240 leaq 0x28(%rsp), %rdi movq %r13, %rsi movl $0x1, %edx callq 0x38da1 testl %eax, %eax jne 0x18c1a movq 0x148(%rsp), %r15 leaq 0x28(%rsp), %r12 movq %r12, %rdi movq 0x10(%rsp), %rsi movq %r14, %rdx callq 0x38fa0 movq %r12, %rdi movq %rbp, %rsi movq 0x8(%rsp), %rdx callq 0x3909b leaq 0x80(%rsp), %rsi movq %r12, %rdi callq 0x390c3 testq %r15, %r15 je 0x18be2 xorl %ebp, %ebp leaq 0x28(%rsp), %r12 leaq 0x80(%rsp), %r13 movq %rbp, %r14 movq %r12, %rdi callq 0x3914a movq %r12, %rdi movq %r13, %rsi movq 0x20(%rsp), %rdx callq 0x3909b movq %r12, %rdi leaq 0x40(%rsp), %rsi callq 0x390c3 movq %r12, %rdi callq 0x3914a movq %r12, %rdi movq %r13, %rsi movq %rbx, %rdx callq 0x3909b movq %r12, %rdi movq %r13, %rsi callq 0x390c3 addq %rbx, %rbp movq %rbx, %rdx cmpq %r15, %rbp jbe 0x18bc3 movq %r15, %rax xorl %edx, %edx divq %rbx testq %rdx, %rdx je 0x18bdd addq 0x140(%rsp), %r14 movq %r14, %rdi leaq 0x40(%rsp), %rsi callq 0xf240 cmpq %r15, %rbp jb 0x18b67 leaq 0x28(%rsp), %rdi callq 0x38d03 xorl %eax, %eax movb $0x0, 0x80(%rsp,%rax) incq %rax cmpq $0x80, %rax jne 0x18bee xorl %eax, %eax xorl %ecx, %ecx movb $0x0, 0x40(%rsp,%rcx) incq %rcx cmpq $0x40, %rcx jne 0x18c05 jmp 0x18c1a movl $0xffff9400, %eax # imm = 0xFFFF9400 addq $0x108, %rsp # imm = 0x108 popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
ssl_update_checksum_start
static void ssl_update_checksum_start( mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len ) { #if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \ defined(MBEDTLS_SSL_PROTO_TLS1_1) mbedtls_md5_update( &ssl->handshake->fin_md5 , buf, len ); mbedtls_sha1_update( &ssl->handshake->fin_sha1, buf, len ); #endif #if defined(MBEDTLS_SSL_PROTO_TLS1_2) #if defined(MBEDTLS_SHA256_C) mbedtls_sha256_update( &ssl->handshake->fin_sha256, buf, len ); #endif #if defined(MBEDTLS_SHA512_C) mbedtls_sha512_update( &ssl->handshake->fin_sha512, buf, len ); #endif #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ }
pushq %r15 pushq %r14 pushq %rbx movq %rdx, %rbx movq %rsi, %r14 movq %rdi, %r15 movl $0x3f8, %edi # imm = 0x3F8 addq 0x60(%r15), %rdi callq 0x39a96 movl $0x450, %edi # imm = 0x450 addq 0x60(%r15), %rdi movq %r14, %rsi movq %rbx, %rdx callq 0x41d8b movl $0x4ac, %edi # imm = 0x4AC addq 0x60(%r15), %rdi movq %r14, %rsi movq %rbx, %rdx callq 0x42c07 movl $0x518, %edi # imm = 0x518 addq 0x60(%r15), %rdi movq %r14, %rsi movq %rbx, %rdx popq %rbx popq %r14 popq %r15 jmp 0x4364b
/Dragonchang[P]https_client/mbedtls/library/ssl_tls.c
mbedtls_ssl_list_ciphersuites
const int *mbedtls_ssl_list_ciphersuites( void ) { /* * On initial call filter out all ciphersuites not supported by current * build based on presence in the ciphersuite_definitions. */ if( supported_init == 0 ) { const int *p; int *q; for( p = ciphersuite_preference, q = supported_ciphersuites; *p != 0 && q < supported_ciphersuites + MAX_CIPHERSUITES - 1; p++ ) { #if defined(MBEDTLS_REMOVE_ARC4_CIPHERSUITES) const mbedtls_ssl_ciphersuite_t *cs_info; if( ( cs_info = mbedtls_ssl_ciphersuite_from_id( *p ) ) != NULL && cs_info->cipher != MBEDTLS_CIPHER_ARC4_128 ) #else if( mbedtls_ssl_ciphersuite_from_id( *p ) != NULL ) #endif *(q++) = *p; } *q = 0; supported_init = 1; } return( supported_ciphersuites ); }
cmpb $0x0, 0x592ad(%rip) # 0x722c0 jne 0x19084 leaq 0x35074(%rip), %rax # 0x4e090 leaq 0x592ad(%rip), %rcx # 0x722d0 movl $0xc02c, %edi # imm = 0xC02C xorl %edx, %edx leaq 0x5510f(%rip), %rsi # 0x6e140 movq %rcx, %r8 movl $0xc009, %r10d # imm = 0xC009 movq %rsi, %r9 cmpl %edi, %r10d je 0x19050 movl (%r9), %r10d addq $0x30, %r9 testl %r10d, %r10d jne 0x1903d jmp 0x1905e cmpl $0x2a, -0x20(%r9) je 0x1905e addq $0x4, %rdx movl %edi, (%r8) leaq (%rcx,%rdx), %r8 movl 0x4(%rax), %edi testl %edi, %edi je 0x19076 addq $0x4, %rax cmpq $0x230, %rdx # imm = 0x230 jl 0x19034 movl $0x0, (%r8) movb $0x1, 0x5923c(%rip) # 0x722c0 leaq 0x59245(%rip), %rax # 0x722d0 retq
/Dragonchang[P]https_client/mbedtls/library/ssl_ciphersuites.c
mbedtls_ssl_ciphersuite_from_string
const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_string( const char *ciphersuite_name ) { const mbedtls_ssl_ciphersuite_t *cur = ciphersuite_definitions; if( NULL == ciphersuite_name ) return( NULL ); while( cur->id != 0 ) { if( 0 == strcmp( cur->name, ciphersuite_name ) ) return( cur ); cur++; } return( NULL ); }
pushq %r14 pushq %rbx pushq %rax testq %rdi, %rdi je 0x190d7 movq %rdi, %r14 leaq 0x55053(%rip), %rbx # 0x6e110 movq 0x8(%rbx), %rdi movq %r14, %rsi callq 0xf1e0 testl %eax, %eax je 0x190d9 cmpl $0x0, 0x30(%rbx) leaq 0x30(%rbx), %rbx jne 0x190bd xorl %ebx, %ebx movq %rbx, %rax addq $0x8, %rsp popq %rbx popq %r14 retq
/Dragonchang[P]https_client/mbedtls/library/ssl_ciphersuites.c
mbedtls_ssl_handshake_client_step
int mbedtls_ssl_handshake_client_step( mbedtls_ssl_context *ssl ) { int ret = 0; if( ssl->state == MBEDTLS_SSL_HANDSHAKE_OVER || ssl->handshake == NULL ) return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); MBEDTLS_SSL_DEBUG_MSG( 2, ( "client state: %d", ssl->state ) ); if( ( ret = mbedtls_ssl_flush_output( ssl ) ) != 0 ) return( ret ); #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM && ssl->handshake->retransmit_state == MBEDTLS_SSL_RETRANS_SENDING ) { if( ( ret = mbedtls_ssl_resend( ssl ) ) != 0 ) return( ret ); } #endif /* Change state now, so that it is right in mbedtls_ssl_read_record(), used * by DTLS for dropping out-of-sequence ChangeCipherSpec records */ #if defined(MBEDTLS_SSL_SESSION_TICKETS) if( ssl->state == MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC && ssl->handshake->new_session_ticket != 0 ) { ssl->state = MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET; } #endif switch( ssl->state ) { case MBEDTLS_SSL_HELLO_REQUEST: ssl->state = MBEDTLS_SSL_CLIENT_HELLO; break; /* * ==> ClientHello */ case MBEDTLS_SSL_CLIENT_HELLO: ret = ssl_write_client_hello( ssl ); break; /* * <== ServerHello * Certificate * ( ServerKeyExchange ) * ( CertificateRequest ) * ServerHelloDone */ case MBEDTLS_SSL_SERVER_HELLO: ret = ssl_parse_server_hello( ssl ); break; case MBEDTLS_SSL_SERVER_CERTIFICATE: ret = mbedtls_ssl_parse_certificate( ssl ); break; case MBEDTLS_SSL_SERVER_KEY_EXCHANGE: ret = ssl_parse_server_key_exchange( ssl ); break; case MBEDTLS_SSL_CERTIFICATE_REQUEST: ret = ssl_parse_certificate_request( ssl ); break; case MBEDTLS_SSL_SERVER_HELLO_DONE: ret = ssl_parse_server_hello_done( ssl ); break; /* * ==> ( Certificate/Alert ) * ClientKeyExchange * ( CertificateVerify ) * ChangeCipherSpec * Finished */ case MBEDTLS_SSL_CLIENT_CERTIFICATE: ret = mbedtls_ssl_write_certificate( ssl ); break; case MBEDTLS_SSL_CLIENT_KEY_EXCHANGE: ret = ssl_write_client_key_exchange( ssl ); break; case MBEDTLS_SSL_CERTIFICATE_VERIFY: ret = ssl_write_certificate_verify( ssl ); break; case MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC: ret = mbedtls_ssl_write_change_cipher_spec( ssl ); break; case MBEDTLS_SSL_CLIENT_FINISHED: ret = mbedtls_ssl_write_finished( ssl ); break; /* * <== ( NewSessionTicket ) * ChangeCipherSpec * Finished */ #if defined(MBEDTLS_SSL_SESSION_TICKETS) case MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET: ret = ssl_parse_new_session_ticket( ssl ); break; #endif case MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC: ret = mbedtls_ssl_parse_change_cipher_spec( ssl ); break; case MBEDTLS_SSL_SERVER_FINISHED: ret = mbedtls_ssl_parse_finished( ssl ); break; case MBEDTLS_SSL_FLUSH_BUFFERS: MBEDTLS_SSL_DEBUG_MSG( 2, ( "handshake: done" ) ); ssl->state = MBEDTLS_SSL_HANDSHAKE_WRAPUP; break; case MBEDTLS_SSL_HANDSHAKE_WRAPUP: mbedtls_ssl_handshake_wrapup( ssl ); break; default: MBEDTLS_SSL_DEBUG_MSG( 1, ( "invalid state %d", ssl->state ) ); return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); } return( ret ); }
pushq %rbp pushq %rbx pushq %rax movl 0x8(%rdi), %r9d movl $0xffff8f00, %ebp # imm = 0xFFFF8F00 cmpl $0x10, %r9d je 0x191d8 movq %rdi, %rbx cmpq $0x0, 0x60(%rdi) je 0x191d8 leaq 0x365a9(%rip), %rdx # 0x4f758 leaq 0x3660e(%rip), %r8 # 0x4f7c4 movq %rbx, %rdi movl $0x2, %esi movl $0xccf, %ecx # imm = 0xCCF xorl %eax, %eax callq 0xf997 movq %rbx, %rdi callq 0x1287b testl %eax, %eax je 0x191e1 movl %eax, %ebp movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %rbp retq movq (%rbx), %rax testb $0x2, 0x174(%rax) je 0x19206 movq 0x60(%rbx), %rax cmpb $0x1, 0x3cc(%rax) jne 0x19206 movq %rbx, %rdi callq 0x12663 testl %eax, %eax jne 0x191d6 movl 0x8(%rbx), %r9d cmpq $0x11, %r9 ja 0x192aa leaq 0x364bd(%rip), %rax # 0x4f6d8 movslq (%rax,%r9,4), %rcx addq %rax, %rcx jmpq *%rcx movl $0x1, 0x8(%rbx) jmp 0x1935d movq 0x60(%rbx), %rax cmpl $0x0, 0xa8c(%rax) je 0x19364 movl $0x11, 0x8(%rbx) movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x1c77a movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x162a4 movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x1b122 movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x19372 movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x1b94e movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x16736 movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x15b6a leaq 0x364a7(%rip), %rdx # 0x4f758 leaq 0x3652d(%rip), %r8 # 0x4f7e5 movq %rbx, %rdi movl $0x1, %esi movl $0xd47, %ecx # imm = 0xD47 xorl %eax, %eax callq 0xf997 jmp 0x191d8 movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x1a319 movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x1bc6f movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x1589d movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x16966 leaq 0x36448(%rip), %rdx # 0x4f758 leaq 0x364be(%rip), %r8 # 0x4f7d5 xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0xd3e, %ecx # imm = 0xD3E xorl %eax, %eax callq 0xf997 movl $0xf, 0x8(%rbx) jmp 0x191d8 movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x1c403 movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x1bdaf movq %rbx, %rdi callq 0x165c8 xorl %ebp, %ebp jmp 0x191d8 movq %rbx, %rdi addq $0x8, %rsp popq %rbx popq %rbp jmp 0x16342
/Dragonchang[P]https_client/mbedtls/library/ssl_cli.c
ssl_parse_server_hello
static int ssl_parse_server_hello( mbedtls_ssl_context *ssl ) { int ret, i; size_t n; size_t ext_len; unsigned char *buf, *ext; unsigned char comp; #if defined(MBEDTLS_ZLIB_SUPPORT) int accept_comp; #endif #if defined(MBEDTLS_SSL_RENEGOTIATION) int renegotiation_info_seen = 0; #endif int handshake_failure = 0; const mbedtls_ssl_ciphersuite_t *suite_info; #if defined(MBEDTLS_DEBUG_C) uint32_t t; #endif MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server hello" ) ); buf = ssl->in_msg; if( ( ret = mbedtls_ssl_read_record( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret ); return( ret ); } if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE ) { #if defined(MBEDTLS_SSL_RENEGOTIATION) if( ssl->renego_status == MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS ) { ssl->renego_records_seen++; if( ssl->conf->renego_max_records >= 0 && ssl->renego_records_seen > ssl->conf->renego_max_records ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "renegotiation requested, " "but not honored by server" ) ); return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } MBEDTLS_SSL_DEBUG_MSG( 1, ( "non-handshake message during renego" ) ); return( MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO ); } #endif /* MBEDTLS_SSL_RENEGOTIATION */ MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) ); return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) { if( buf[0] == MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "received hello verify request" ) ); MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello" ) ); return( ssl_parse_hello_verify_request( ssl ) ); } else { /* We made it through the verification process */ mbedtls_free( ssl->handshake->verify_cookie ); ssl->handshake->verify_cookie = NULL; ssl->handshake->verify_cookie_len = 0; } } #endif /* MBEDTLS_SSL_PROTO_DTLS */ if( ssl->in_hslen < 38 + mbedtls_ssl_hs_hdr_len( ssl ) || buf[0] != MBEDTLS_SSL_HS_SERVER_HELLO ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO ); } /* * 0 . 1 server_version * 2 . 33 random (maybe including 4 bytes of Unix time) * 34 . 34 session_id length = n * 35 . 34+n session_id * 35+n . 36+n cipher_suite * 37+n . 37+n compression_method * * 38+n . 39+n extensions length (optional) * 40+n . .. extensions */ buf += mbedtls_ssl_hs_hdr_len( ssl ); MBEDTLS_SSL_DEBUG_BUF( 3, "server hello, version", buf + 0, 2 ); mbedtls_ssl_read_version( &ssl->major_ver, &ssl->minor_ver, ssl->conf->transport, buf + 0 ); if( ssl->major_ver < ssl->conf->min_major_ver || ssl->minor_ver < ssl->conf->min_minor_ver || ssl->major_ver > ssl->conf->max_major_ver || ssl->minor_ver > ssl->conf->max_minor_ver ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "server version out of bounds - " " min: [%d:%d], server: [%d:%d], max: [%d:%d]", ssl->conf->min_major_ver, ssl->conf->min_minor_ver, ssl->major_ver, ssl->minor_ver, ssl->conf->max_major_ver, ssl->conf->max_minor_ver ) ); mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL, MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION ); return( MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION ); } #if defined(MBEDTLS_DEBUG_C) t = ( (uint32_t) buf[2] << 24 ) | ( (uint32_t) buf[3] << 16 ) | ( (uint32_t) buf[4] << 8 ) | ( (uint32_t) buf[5] ); MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, current time: %lu", t ) ); #endif memcpy( ssl->handshake->randbytes + 32, buf + 2, 32 ); n = buf[34]; MBEDTLS_SSL_DEBUG_BUF( 3, "server hello, random bytes", buf + 2, 32 ); if( n > 32 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO ); } if( ssl->in_hslen > mbedtls_ssl_hs_hdr_len( ssl ) + 39 + n ) { ext_len = ( ( buf[38 + n] << 8 ) | ( buf[39 + n] ) ); if( ( ext_len > 0 && ext_len < 4 ) || ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) + 40 + n + ext_len ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO ); } } else if( ssl->in_hslen == mbedtls_ssl_hs_hdr_len( ssl ) + 38 + n ) { ext_len = 0; } else { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO ); } /* ciphersuite (used later) */ i = ( buf[35 + n] << 8 ) | buf[36 + n]; /* * Read and check compression */ comp = buf[37 + n]; #if defined(MBEDTLS_ZLIB_SUPPORT) /* See comments in ssl_write_client_hello() */ #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) accept_comp = 0; else #endif accept_comp = 1; if( comp != MBEDTLS_SSL_COMPRESS_NULL && ( comp != MBEDTLS_SSL_COMPRESS_DEFLATE || accept_comp == 0 ) ) #else /* MBEDTLS_ZLIB_SUPPORT */ if( comp != MBEDTLS_SSL_COMPRESS_NULL ) #endif/* MBEDTLS_ZLIB_SUPPORT */ { MBEDTLS_SSL_DEBUG_MSG( 1, ( "server hello, bad compression: %d", comp ) ); return( MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE ); } /* * Initialize update checksum functions */ ssl->transform_negotiate->ciphersuite_info = mbedtls_ssl_ciphersuite_from_id( i ); if( ssl->transform_negotiate->ciphersuite_info == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "ciphersuite info for %04x not found", i ) ); return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA ); } mbedtls_ssl_optimize_checksum( ssl, ssl->transform_negotiate->ciphersuite_info ); MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, session id len.: %d", n ) ); MBEDTLS_SSL_DEBUG_BUF( 3, "server hello, session id", buf + 35, n ); /* * Check if the session can be resumed */ if( ssl->handshake->resume == 0 || n == 0 || #if defined(MBEDTLS_SSL_RENEGOTIATION) ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE || #endif ssl->session_negotiate->ciphersuite != i || ssl->session_negotiate->compression != comp || ssl->session_negotiate->id_len != n || memcmp( ssl->session_negotiate->id, buf + 35, n ) != 0 ) { ssl->state++; ssl->handshake->resume = 0; #if defined(MBEDTLS_HAVE_TIME) ssl->session_negotiate->start = mbedtls_time( NULL ); #endif ssl->session_negotiate->ciphersuite = i; ssl->session_negotiate->compression = comp; ssl->session_negotiate->id_len = n; memcpy( ssl->session_negotiate->id, buf + 35, n ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x48, %rsp movq %rdi, %rbx leaq 0x35427(%rip), %rdx # 0x4f758 leaq 0x3594f(%rip), %r8 # 0x4fc87 movl $0x2, %esi movl $0x582, %ecx # imm = 0x582 xorl %eax, %eax callq 0xf997 movq 0xc8(%rbx), %r12 movq %rbx, %rdi callq 0x141f2 testl %eax, %eax je 0x1a392 movl %eax, %ebp leaq 0x353f3(%rip), %rdx # 0x4f758 leaq 0x32a49(%rip), %r8 # 0x4cdb5 movq %rbx, %rdi movl $0x1, %esi movl $0x588, %ecx # imm = 0x588 movl %ebp, %r9d callq 0xfa82 movl %ebp, %eax addq $0x48, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq cmpl $0x16, 0xd8(%rbx) jne 0x1a4e5 movq (%rbx), %rcx movl $0x4, %eax testb $0x2, 0x174(%rcx) je 0x1a599 cmpb $0x3, (%r12) jne 0x1a55b leaq 0x35392(%rip), %r15 # 0x4f758 leaq 0x35940(%rip), %r8 # 0x4fd0d movq %rbx, %rdi movl $0x2, %esi movq %r15, %rdx movl $0x5a9, %ecx # imm = 0x5A9 xorl %eax, %eax callq 0xf997 leaq 0x35940(%rip), %r8 # 0x4fd2b movq %rbx, %rdi movl $0x2, %esi movq %r15, %rdx movl $0x5aa, %ecx # imm = 0x5AA xorl %eax, %eax callq 0xf997 movq (%rbx), %rax movq 0xc8(%rbx), %rcx movl 0x174(%rax), %eax andl $0x2, %eax leaq (%rcx,%rax,4), %r14 addq $0x4, %r14 leaq 0x35cdd(%rip), %r8 # 0x50101 movq %rbx, %rdi movl $0x2, %esi movq %r15, %rdx movl $0x52e, %ecx # imm = 0x52E xorl %eax, %eax callq 0xf997 movq $0x2, (%rsp) leaq 0x35cd9(%rip), %r8 # 0x50123 movq %rbx, %rdi movl $0x3, %esi movq %r15, %rdx movl $0x536, %ecx # imm = 0x536 movq %r14, %r9 callq 0xfb06 movq (%rbx), %rax movl 0x174(%rax), %edx shrl %edx andl $0x1, %edx leaq 0x44(%rsp), %r15 leaq 0x40(%rsp), %r12 movq %r15, %rdi movq %r12, %rsi movq %r14, %rcx callq 0x189d6 movl (%r15), %ecx cmpl $0x3, %ecx setl %dl movl (%r12), %eax cmpl $0x2, %eax setl %sil orb %dl, %sil jne 0x1a4be movq (%rbx), %rdx movzbl 0x170(%rdx), %esi cmpl %esi, %ecx ja 0x1a4be movzbl 0x171(%rdx), %ecx cmpl %ecx, %eax jbe 0x1a6fd leaq 0x35293(%rip), %rdx # 0x4f758 leaq 0x35c53(%rip), %r8 # 0x5011f movq %rbx, %rdi movl $0x1, %esi movl $0x543, %ecx # imm = 0x543 xorl %eax, %eax callq 0xf997 jmp 0x1a6e1 cmpl $0x1, 0xc(%rbx) jne 0x1a53b movl 0x10(%rbx), %eax leal 0x1(%rax), %ecx movl %ecx, 0x10(%rbx) movq (%rbx), %rcx movl 0x15c(%rcx), %ecx testl %ecx, %ecx sets %dl cmpl %ecx, %eax setl %al orb %dl, %al je 0x1a64a leaq 0x35242(%rip), %rdx # 0x4f758 leaq 0x357b3(%rip), %r8 # 0x4fcd0 movq %rbx, %rdi movl $0x1, %esi movl $0x59b, %ecx # imm = 0x59B xorl %eax, %eax callq 0xf997 movl $0xffff9500, %ebp # imm = 0xFFFF9500 jmp 0x1a381 leaq 0x35216(%rip), %rdx # 0x4f758 leaq 0x357ab(%rip), %r8 # 0x4fcf4 movq %rbx, %rdi movl $0x1, %esi movl $0x5a0, %ecx # imm = 0x5A0 jmp 0x1a665 movq 0x60(%rbx), %rax movq 0x3b0(%rax), %rdi callq 0xf030 movq 0x60(%rbx), %rax movq $0x0, 0x3b0(%rax) movb $0x0, 0x3b8(%rax) movq (%rbx), %rax movb 0x174(%rax), %al andb $0x2, %al shrb %al movzbl %al, %eax leaq 0x4(,%rax,8), %rax leaq 0x26(%rax), %rcx cmpq %rcx, 0x110(%rbx) jb 0x1a61e cmpb $0x2, (%r12) jne 0x1a61e addq %rax, %r12 movq $0x2, (%rsp) leaq 0x35199(%rip), %rdx # 0x4f758 leaq 0x3577b(%rip), %r8 # 0x4fd41 movq %rbx, %rdi movl $0x3, %esi movl $0x5cb, %ecx # imm = 0x5CB movq %r12, %r9 callq 0xfb06 leaq 0x14(%rbx), %rdi leaq 0x18(%rbx), %r14 movq (%rbx), %rax movl 0x174(%rax), %edx shrl %edx andl $0x1, %edx movq %r14, %rsi movq %r12, %rcx callq 0x189d6 movl 0x14(%rbx), %eax movq (%rbx), %rcx movzbl 0x172(%rcx), %r9d cmpl %r9d, %eax jge 0x1a676 movzbl 0x173(%rcx), %edx movl (%r14), %esi jmp 0x1a69e leaq 0x35133(%rip), %rdx # 0x4f758 leaq 0x356c8(%rip), %r8 # 0x4fcf4 movq %rbx, %rdi movl $0x1, %esi movl $0x5ba, %ecx # imm = 0x5BA xorl %eax, %eax callq 0xf997 movl $0xffff8680, %ebp # imm = 0xFFFF8680 jmp 0x1a381 leaq 0x35107(%rip), %rdx # 0x4f758 leaq 0x35645(%rip), %r8 # 0x4fc9d movq %rbx, %rdi movl $0x1, %esi movl $0x597, %ecx # imm = 0x597 xorl %eax, %eax callq 0xf997 movl $0xffff8900, %ebp # imm = 0xFFFF8900 jmp 0x1a381 movl (%r14), %esi movzbl 0x173(%rcx), %edx cmpl %edx, %esi jl 0x1a69e movzbl 0x170(%rcx), %edi cmpl %edi, %eax ja 0x1a69e movzbl 0x171(%rcx), %edi cmpl %edi, %esi jbe 0x1a807 movzbl 0x170(%rcx), %edi movzbl 0x171(%rcx), %ecx movl %ecx, 0x20(%rsp) movl %edi, 0x18(%rsp) movl %esi, 0x10(%rsp) movl %eax, 0x8(%rsp) movl %edx, (%rsp) leaq 0x35092(%rip), %rdx # 0x4f758 leaq 0x3568a(%rip), %r8 # 0x4fd57 movq %rbx, %rdi movl $0x1, %esi movl $0x5d8, %ecx # imm = 0x5D8 xorl %eax, %eax callq 0xf997 movq %rbx, %rdi movl $0x2, %esi movl $0x46, %edx callq 0x15727 movl $0xffff9180, %ebp # imm = 0xFFFF9180 jmp 0x1a381 movb 0x2(%r14), %bpl addq $0x3, %r14 movzbl %bpl, %r15d movq %r15, (%rsp) leaq 0x35044(%rip), %rdx # 0x4f758 leaq 0x3520b(%rip), %r8 # 0x4f926 movq %rbx, %rdi movl $0x3, %esi movl $0x54c, %ecx # imm = 0x54C movq %r14, %r9 callq 0xfb06 movq 0xc8(%rbx), %rax addq 0xe0(%rbx), %rax subq %r14, %rax cmpq %r15, %rax jge 0x1a77f leaq 0x3500b(%rip), %rdx # 0x4f758 leaq 0x359de(%rip), %r8 # 0x50132 movq %rbx, %rdi movl $0x1, %esi movl $0x551, %ecx # imm = 0x551 xorl %eax, %eax callq 0xf997 movq %rbx, %rdi movl $0x2, %esi movl $0x32, %edx callq 0x15727 jmp 0x1a640 movq 0x60(%rbx), %rax movq 0x3b0(%rax), %rdi callq 0xf030 movl $0x1, %edi movq %r15, %rsi callq 0xf1d0 movq 0x60(%rbx), %r12 movq %rax, 0x3b0(%r12) testq %rax, %rax je 0x1a8aa movq %rax, %rdi movq %r14, %rsi movq %r15, %rdx callq 0xf240 movb %bpl, 0x3b8(%r12) movl $0x1, 0x8(%rbx) movq %rbx, %rdi callq 0x16584 movq %rbx, %rdi callq 0x137db leaq 0x34f73(%rip), %rdx # 0x4f758 leaq 0x35979(%rip), %r8 # 0x50165 xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x569, %ecx # imm = 0x569 xorl %eax, %eax callq 0xf997 jmp 0x1a381 leaq 0x2(%r12), %r15 movl 0x2(%r12), %r9d bswapl %r9d leaq 0x34f3d(%rip), %rbp # 0x4f758 leaq 0x35581(%rip), %r8 # 0x4fda3 movq %rbx, %rdi movl $0x3, %esi movq %rbp, %rdx movl $0x5e5, %ecx # imm = 0x5E5 xorl %eax, %eax callq 0xf997 movq 0x60(%rbx), %rax movups 0x2(%r12), %xmm0 movups 0x12(%r12), %xmm1 movups %xmm1, 0x648(%rax) movups %xmm0, 0x638(%rax) movzbl 0x22(%r12), %r13d movq $0x20, (%rsp) leaq 0x35557(%rip), %r8 # 0x4fdc3 movq %rbx, %rdi movl $0x3, %esi movq %rbp, %rdx movl $0x5ec, %ecx # imm = 0x5EC movq %r15, %r9 callq 0xfb06 cmpq $0x21, %r13 jb 0x1a8d9 leaq 0x34ec7(%rip), %rdx # 0x4f758 leaq 0x3545c(%rip), %r8 # 0x4fcf4 movq %rbx, %rdi movl $0x1, %esi movl $0x5f0, %ecx # imm = 0x5F0 jmp 0x1a639 leaq 0x34ea7(%rip), %rdx # 0x4f758 leaq 0x33118(%rip), %r8 # 0x4d9d0 movq %rbx, %rdi movl $0x1, %esi movl $0x55c, %ecx # imm = 0x55C movl %r15d, %r9d xorl %eax, %eax callq 0xf997 movl $0xffff8100, %ebp # imm = 0xFFFF8100 jmp 0x1a381 movq (%rbx), %rcx movq 0x110(%rbx), %rax movb 0x174(%rcx), %cl andb $0x2, %cl shrb %cl movzbl %cl, %edx leaq 0x4(,%rdx,8), %rcx leaq 0x2b(,%rdx,8), %rdx addq %r13, %rdx cmpq %rdx, %rax jbe 0x1a950 movzwl 0x26(%r12,%r13), %edx rolw $0x8, %dx movzwl %dx, %r15d leaq -0x1(%r15), %rdx cmpq $0x3, %rdx jb 0x1a930 addq %r13, %rcx addq %r15, %rcx addq $0x28, %rcx cmpq %rcx, %rax je 0x1a95f leaq 0x34e21(%rip), %rdx # 0x4f758 leaq 0x353b6(%rip), %r8 # 0x4fcf4 movq %rbx, %rdi movl $0x1, %esi movl $0x5fc, %ecx # imm = 0x5FC jmp 0x1a639 addq %r13, %rcx addq $0x26, %rcx cmpq %rcx, %rax jne 0x1a996 xorl %r15d, %r15d movzbl 0x25(%r12,%r13), %r9d testl %r9d, %r9d je 0x1a9b6 leaq 0x34de7(%rip), %rdx # 0x4f758 leaq 0x35466(%rip), %r8 # 0x4fdde movq %rbx, %rdi movl $0x1, %esi movl $0x621, %ecx # imm = 0x621 xorl %eax, %eax callq 0xf997 movl $0xffff8f80, %ebp # imm = 0xFFFF8F80 jmp 0x1a381 leaq 0x34dbb(%rip), %rdx # 0x4f758 leaq 0x35350(%rip), %r8 # 0x4fcf4 movq %rbx, %rdi movl $0x1, %esi movl $0x606, %ecx # imm = 0x606 jmp 0x1a639 movzwl 0x23(%r12,%r13), %eax rolw $0x8, %ax movzwl %ax, %edi movl %edi, 0x38(%rsp) callq 0x1908c movq 0x80(%rbx), %rcx movq %rax, (%rcx) testq %rax, %rax je 0x1ab8c movq %rbx, %rdi movq %rax, %rsi callq 0x164f8 leaq 0x34d67(%rip), %rbp # 0x4f758 leaq 0x3542c(%rip), %r8 # 0x4fe24 movq %rbx, %rdi movl $0x3, %esi movq %rbp, %rdx movl $0x632, %ecx # imm = 0x632 movq %r13, %r9 xorl %eax, %eax callq 0xf997 leaq 0x23(%r12), %r9 movq %r13, (%rsp) leaq 0x35424(%rip), %r8 # 0x4fe46 movq %rbx, %rdi movl $0x3, %esi movq %rbp, %rdx movl $0x633, %ecx # imm = 0x633 movq %r9, 0x30(%rsp) callq 0xfb06 movq 0x60(%rbx), %rbp cmpl $0x0, 0xa7c(%rbp) je 0x1aa86 testb %r13b, %r13b je 0x1aa86 cmpl $0x0, 0xc(%rbx) jne 0x1aa86 movq 0x58(%rbx), %rdi movl 0x38(%rsp), %eax cmpl %eax, 0x8(%rdi) jne 0x1aa86 cmpl $0x0, 0xc(%rdi) jne 0x1aa86 cmpq %r13, 0x10(%rdi) jne 0x1aa86 addq $0x18, %rdi movq 0x30(%rsp), %rsi movq %r13, %rdx callq 0xf2b0 testl %eax, %eax je 0x1b096 incl 0x8(%rbx) xorl %eax, %eax movl %eax, 0xa7c(%rbp) xorl %ebp, %ebp xorl %edi, %edi callq 0xf250 movq 0x58(%rbx), %rdi movq %rax, (%rdi) movl 0x38(%rsp), %eax movl %eax, 0x8(%rdi) movl %ebp, 0xc(%rdi) movq %r13, 0x10(%rdi) addq $0x18, %rdi movq 0x30(%rsp), %rsi movq %r13, %rdx callq 0xf240 movq 0x60(%rbx), %rax cmpl $0x0, 0xa7c(%rax) leaq 0x353c1(%rip), %rax # 0x4fe93 leaq 0x33132(%rip), %r9 # 0x4dc0b cmoveq %rax, %r9 leaq 0x34c74(%rip), %rbp # 0x4f758 leaq 0x3538c(%rip), %r8 # 0x4fe77 movq %rbx, %rdi movl $0x3, %esi movq %rbp, %rdx movl $0x657, %ecx # imm = 0x657 xorl %eax, %eax callq 0xf997 leaq 0x3538d(%rip), %r8 # 0x4fe96 movq %rbx, %rdi movl $0x3, %esi movq %rbp, %rdx movl $0x659, %ecx # imm = 0x659 movl 0x38(%rsp), %r9d xorl %eax, %eax callq 0xf997 movzbl 0x25(%r12,%r13), %r9d leaq 0x3538b(%rip), %r8 # 0x4febd movq %rbx, %rdi movl $0x3, %esi movq %rbp, %rdx movl $0x65a, %ecx # imm = 0x65A xorl %eax, %eax callq 0xf997 movq 0x58(%rbx), %rax movl 0x8(%rax), %edi callq 0x1908c testq %rax, %rax je 0x1ab6c movq (%rbx), %rcx testb $0x40, 0x174(%rcx) je 0x1abbd cmpl $0x2a, 0x10(%rax) jne 0x1abbd leaq 0x34be5(%rip), %rdx # 0x4f758 leaq 0x3517a(%rip), %r8 # 0x4fcf4 movq %rbx, %rdi movl $0x1, %esi movl $0x664, %ecx # imm = 0x664 jmp 0x1a639 leaq 0x34bc5(%rip), %rdx # 0x4f758 leaq 0x35266(%rip), %r8 # 0x4fe00 movq %rbx, %rdi movl $0x1, %esi movl $0x62c, %ecx # imm = 0x62C movl 0x38(%rsp), %r9d xorl %eax, %eax callq 0xf997 movl $0xffff8f00, %ebp # imm = 0xFFFF8F00 jmp 0x1a381 movq 0x8(%rax), %r9 leaq 0x34b90(%rip), %rdx # 0x4f758 leaq 0x3530e(%rip), %r8 # 0x4fedd movq %rbx, %rdi movl $0x3, %esi movl $0x668, %ecx # imm = 0x668 xorl %eax, %eax callq 0xf997 movq (%rbx), %rax movslq 0x18(%rbx), %rcx movq (%rax,%rcx,8), %rax movl (%rax), %ecx testl %ecx, %ecx je 0x1afa7 movq 0x58(%rbx), %rdx addq $0x4, %rax cmpl 0x8(%rdx), %ecx jne 0x1abee movl $0x0, 0xc(%rdx) addq %r12, %r13 addq $0x28, %r13 leaq 0x34b3e(%rip), %rdx # 0x4f758 leaq 0x352e1(%rip), %r8 # 0x4ff02 movq %rbx, %rdi movl $0x2, %esi movl $0x687, %ecx # imm = 0x687 movq %r15, %r9 xorl %eax, %eax callq 0xf997 movl $0x0, 0x30(%rsp) testq %r15, %r15 je 0x1afc7 movzwl 0x2(%r13), %eax rolw $0x8, %ax movzwl %ax, %r12d leal 0x4(%r12), %ecx subq %rcx, %r15 jb 0x1afff movzwl (%r13), %eax rolw $0x8, %ax movzwl %ax, %r9d cmpl $0x15, %r9d movq %rcx, 0x38(%rsp) jg 0x1acf3 cmpl $0xa, %r9d jg 0x1ad6e cmpl $0x1, %r9d je 0x1ae0d cmpl $0x4, %r9d jne 0x1af52 movq %rbx, %rdi movl $0x3, %esi leaq 0x34aaf(%rip), %rdx # 0x4f758 movl $0x6b3, %ecx # imm = 0x6B3 leaq 0x352b8(%rip), %r8 # 0x4ff6d xorl %eax, %eax callq 0xf997 movl $0xffff8680, %ebp # imm = 0xFFFF8680 testl %r12d, %r12d jne 0x1a381 movq (%rbx), %rax movl 0x174(%rax), %eax movl $0x8000, %ecx # imm = 0x8000 andl %ecx, %eax je 0x1a381 movq 0x58(%rbx), %rax movl $0x1, 0x90(%rax) jmp 0x1af74 cmpl $0x22, %r9d jg 0x1adb8 cmpl $0x16, %r9d je 0x1ae65 cmpl $0x17, %r9d jne 0x1af52 movq %rbx, %rdi movl $0x3, %esi leaq 0x34a38(%rip), %rdx # 0x4f758 movl $0x6cd, %ecx # imm = 0x6CD leaq 0x35281(%rip), %r8 # 0x4ffad xorl %eax, %eax callq 0xf997 movq (%rbx), %rax movl $0xffff8680, %ebp # imm = 0xFFFF8680 testb $0x8, 0x175(%rax) je 0x1a381 testl %r12d, %r12d jne 0x1a381 cmpl $0x0, (%r14) je 0x1a381 movq 0x60(%rbx), %rax movl $0x1, 0xa90(%rax) jmp 0x1af74 cmpl $0xb, %r9d je 0x1aec2 cmpl $0x10, %r9d jne 0x1af52 movq %rbx, %rdi movl $0x3, %esi leaq 0x349c7(%rip), %rdx # 0x4f758 movl $0x703, %ecx # imm = 0x703 leaq 0x3527e(%rip), %r8 # 0x5001b xorl %eax, %eax callq 0xf997 leaq 0x4(%r13), %rsi movl %r12d, %edx movq %rbx, %rdi callq 0x1cb90 jmp 0x1aef3 cmpl $0x23, %r9d je 0x1aefc cmpl $0xff01, %r9d # imm = 0xFF01 jne 0x1af52 movq %rbx, %rdi movl $0x3, %esi leaq 0x3497a(%rip), %rdx # 0x4f758 movl $0x699, %ecx # imm = 0x699 leaq 0x35141(%rip), %r8 # 0x4ff2b xorl %eax, %eax callq 0xf997 leaq 0x4(%r13), %rsi movl %r12d, %edx movq %rbx, %rdi callq 0x1ca06 movl $0x1, 0x30(%rsp) jmp 0x1aef3 movq %rbx, %rdi movl $0x3, %esi leaq 0x3493c(%rip), %rdx # 0x4f758 movl $0x6a6, %ecx # imm = 0x6A6 leaq 0x35121(%rip), %r8 # 0x4ff49 xorl %eax, %eax callq 0xf997 movl $0xffff8680, %ebp # imm = 0xFFFF8680 cmpl $0x1, %r12d jne 0x1a381 movq (%rbx), %rax movl 0x174(%rax), %eax shrl $0x7, %eax andl $0x7, %eax je 0x1a381 movzbl 0x4(%r13), %ecx cmpl %ecx, %eax je 0x1af74 jmp 0x1a381 movq %rbx, %rdi movl $0x3, %esi leaq 0x348e4(%rip), %rdx # 0x4f758 movl $0x6c0, %ecx # imm = 0x6C0 leaq 0x3510c(%rip), %r8 # 0x4ff8c xorl %eax, %eax callq 0xf997 movq (%rbx), %rax movl $0xffff8680, %ebp # imm = 0xFFFF8680 testb $0x4, 0x175(%rax) je 0x1a381 testl %r12d, %r12d jne 0x1a381 cmpl $0x0, (%r14) je 0x1a381 movq 0x58(%rbx), %rax movl $0x1, 0x94(%rax) jmp 0x1af74 movq %rbx, %rdi movl $0x3, %esi leaq 0x34887(%rip), %rdx # 0x4f758 movl $0x6e8, %ecx # imm = 0x6E8 leaq 0x35116(%rip), %r8 # 0x4fff3 xorl %eax, %eax callq 0xf997 leaq 0x4(%r13), %rsi movl %r12d, %edx movq %rbx, %rdi callq 0x1caf5 testl %eax, %eax je 0x1af74 jmp 0x1b069 movq %rbx, %rdi movl $0x3, %esi leaq 0x3484d(%rip), %rdx # 0x4f758 movl $0x6da, %ecx # imm = 0x6DA leaq 0x350bd(%rip), %r8 # 0x4ffd4 xorl %eax, %eax callq 0xf997 movl $0xffff8680, %ebp # imm = 0xFFFF8680 testl %r12d, %r12d jne 0x1a381 movq (%rbx), %rax movl 0x174(%rax), %eax movl $0x10000, %ecx # imm = 0x10000 andl %ecx, %eax je 0x1a381 movq 0x60(%rbx), %rax movl $0x1, 0xa8c(%rax) jmp 0x1af74 movq %rbx, %rdi movl $0x3, %esi leaq 0x347f7(%rip), %rdx # 0x4f758 movl $0x70d, %ecx # imm = 0x70D leaq 0x350c3(%rip), %r8 # 0x50030 xorl %eax, %eax callq 0xf997 addq 0x38(%rsp), %r13 leaq -0x1(%r15), %rax cmpq $0x2, %rax ja 0x1ac40 leaq 0x347ca(%rip), %rdx # 0x4f758 leaq 0x34d5f(%rip), %r8 # 0x4fcf4 movq %rbx, %rdi movl $0x1, %esi movl $0x715, %ecx # imm = 0x715 jmp 0x1a639 leaq 0x347aa(%rip), %rdx # 0x4f758 leaq 0x34d3f(%rip), %r8 # 0x4fcf4 movq %rbx, %rdi movl $0x1, %esi movl $0x66f, %ecx # imm = 0x66F jmp 0x1a639 movl 0x190(%rbx), %eax testl %eax, %eax jne 0x1b01f movq (%rbx), %rcx movl 0x174(%rcx), %ecx andl $0x30, %ecx cmpl $0x20, %ecx jne 0x1b01f leaq 0x3476f(%rip), %rdx # 0x4f758 leaq 0x35067(%rip), %r8 # 0x50057 movq %rbx, %rdi movl $0x1, %esi movl $0x720, %ecx # imm = 0x720 jmp 0x1b04b leaq 0x34752(%rip), %rdx # 0x4f758 leaq 0x34ce7(%rip), %r8 # 0x4fcf4 movq %rbx, %rdi movl $0x1, %esi movl $0x692, %ecx # imm = 0x692 jmp 0x1a639 cmpl $0x1, 0xc(%rbx) jne 0x1b074 movl %eax, %ecx xorl $0x1, %ecx orl 0x30(%rsp), %ecx jne 0x1b070 leaq 0x34721(%rip), %rdx # 0x4f758 leaq 0x35046(%rip), %r8 # 0x50084 movq %rbx, %rdi movl $0x1, %esi movl $0x728, %ecx # imm = 0x728 xorl %eax, %eax callq 0xf997 movq %rbx, %rdi callq 0x1588e testl %eax, %eax movl $0xffff8680, %ebp # imm = 0xFFFF8680 cmovnel %eax, %ebp jmp 0x1a381 movl %eax, %ebp jmp 0x1a381 testl %eax, %eax je 0x1b0cf leaq 0x346dd(%rip), %rdx # 0x4f758 leaq 0x34ca9(%rip), %r8 # 0x4fd2b xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0x743, %ecx # imm = 0x743 jmp 0x1a7fb movl $0xc, 0x8(%rbx) movq %rbx, %rdi callq 0x1098c testl %eax, %eax je 0x1aac0 movl %eax, %ebp leaq 0x346a2(%rip), %rdx # 0x4f758 leaq 0x34da2(%rip), %r8 # 0x4fe5f movq %rbx, %rdi movl $0x1, %esi movl $0x651, %ecx # imm = 0x651 jmp 0x1a379 movq (%rbx), %rax testb $0x30, 0x174(%rax) je 0x1b102 cmpl $0x1, 0x30(%rsp) jne 0x1b074 leaq 0x3466f(%rip), %rdx # 0x4f758 leaq 0x34fe3(%rip), %r8 # 0x500d3 movq %rbx, %rdi movl $0x1, %esi movl $0x736, %ecx # imm = 0x736 jmp 0x1b04b leaq 0x3464f(%rip), %rdx # 0x4f758 leaq 0x34fa2(%rip), %r8 # 0x500b2 movq %rbx, %rdi movl $0x1, %esi movl $0x72f, %ecx # imm = 0x72F jmp 0x1b04b
/Dragonchang[P]https_client/mbedtls/library/ssl_cli.c
ssl_parse_server_key_exchange
static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl ) { int ret; const mbedtls_ssl_ciphersuite_t *ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; unsigned char *p, *end; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) ); #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse server key exchange" ) ); ssl->state++; return( 0 ); } ((void) p); ((void) end); #endif #if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \ defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_RSA || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA ) { if( ( ret = ssl_get_ecdh_params_from_cert( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "ssl_get_ecdh_params_from_cert", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= skip parse server key exchange" ) ); ssl->state++; return( 0 ); } ((void) p); ((void) end); #endif /* MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED || MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */ if( ( ret = mbedtls_ssl_read_record( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret ); return( ret ); } if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } /* * ServerKeyExchange may be skipped with PSK and RSA-PSK when the server * doesn't use a psk_identity_hint */ if( ssl->in_msg[0] != MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE ) { if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK ) { ssl->record_read = 1; goto exit; } MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } p = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl ); end = ssl->in_msg + ssl->in_hslen; MBEDTLS_SSL_DEBUG_BUF( 3, "server key exchange", p, end - p ); #if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK ) { if( ssl_parse_server_psk_hint( ssl, &p, end ) != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); } } /* FALLTROUGH */ #endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */ #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \ defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK ) ; /* nothing more to do */ else #endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED || MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED */ #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \ defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_RSA || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK ) { if( ssl_parse_server_dh_params( ssl, &p, end ) != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); } } else #endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED || MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */ #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \ defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \ defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA ) { if( ssl_parse_server_ecdh_params( ssl, &p, end ) != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); } } else #endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED || MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED || MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */ #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE ) { ret = mbedtls_ecjpake_read_round_two( &ssl->handshake->ecjpake_ctx, p, end - p ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_read_round_two", ret ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); } } else #endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */ { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \ defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \ defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_RSA || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA ) { size_t sig_len, hashlen; unsigned char hash[64]; mbedtls_md_type_t md_alg = MBEDTLS_MD_NONE; mbedtls_pk_type_t pk_alg = MBEDTLS_PK_NONE; unsigned char *params = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl ); size_t params_len = p - params; /* * Handle the digitally-signed structure */ #if defined(MBEDTLS_SSL_PROTO_TLS1_2) if( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 ) { if( ssl_parse_signature_algorithm( ssl, &p, end, &md_alg, &pk_alg ) != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); } if( pk_alg != mbedtls_ssl_get_ciphersuite_sig_pk_alg( ciphersuite_info ) ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); } } else #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ #if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \ defined(MBEDTLS_SSL_PROTO_TLS1_1) if( ssl->minor_ver < MBEDTLS_SSL_MINOR_VERSION_3 ) { pk_alg = mbedtls_ssl_get_ciphersuite_sig_pk_alg( ciphersuite_info ); /* Default hash for ECDSA is SHA-1 */ if( pk_alg == MBEDTLS_PK_ECDSA && md_alg == MBEDTLS_MD_NONE ) md_alg = MBEDTLS_MD_SHA1; } else #endif { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } /* * Read signature */ sig_len = ( p[0] << 8 ) | p[1]; p += 2; if( end != p + sig_len ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); } MBEDTLS_SSL_DEBUG_BUF( 3, "signature", p, sig_len ); /* * Compute the hash that has been signed */ #if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \ defined(MBEDTLS_SSL_PROTO_TLS1_1) if( md_alg == MBEDTLS_MD_NONE ) { mbedtls_md5_context mbedtls_md5; mbedtls_sha1_context mbedtls_sha1; mbedtls_md5_init( &mbedtls_md5 ); mbedtls_sha1_init( &mbedtls_sha1 ); hashlen = 36; /* * digitally-signed struct { * opaque md5_hash[16]; * opaque sha_hash[20]; * }; * * md5_hash * MD5(ClientHello.random + ServerHello.random * + ServerParams); * sha_hash * SHA(ClientHello.random + ServerHello.random * + ServerParams); */ mbedtls_md5_starts( &mbedtls_md5 ); mbedtls_md5_update( &mbedtls_md5, ssl->handshake->randbytes, 64 ); mbedtls_md5_update( &mbedtls_md5, params, params_len ); mbedtls_md5_finish( &mbedtls_md5, hash ); mbedtls_sha1_starts( &mbedtls_sha1 ); mbedtls_sha1_update( &mbedtls_sha1, ssl->handshake->randbytes, 64 ); mbedtls_sha1_update( &mbedtls_sha1, params, params_len ); mbedtls_sha1_finish( &mbedtls_sha1, hash + 16 ); mbedtls_md5_free( &mbedtls_md5 ); mbedtls_sha1_free( &mbedtls_sha1 ); } else #endif /* MBEDTLS_SSL_PROTO_SSL3 || MBEDTLS_SSL_PROTO_TLS1 || \ MBEDTLS_SSL_PROTO_TLS1_1 */ #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) || \ defined(MBEDTLS_SSL_PROTO_TLS1_2) if( md_alg != MBEDTLS_MD_NONE ) { mbedtls_md_context_t ctx; mbedtls_md_init( &ctx ); /* Info from md_alg will be used instead */ hashlen = 0; /* * digitally-signed struct { * opaque client_random[32]; * opaque server_random[32]; * ServerDHParams params; * }; */ if( ( ret = mbedtls_md_setup( &ctx, mbedtls_md_info_from_type( md_alg ), 0 ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_md_setup", ret ); return( ret ); } mbedtls_md_starts( &ctx ); mbedtls_md_update( &ctx, ssl->handshake->randbytes, 64 ); mbedtls_md_update( &ctx, params, params_len ); mbedtls_md_finish( &ctx, hash ); mbedtls_md_free( &ctx ); } else #endif /* MBEDTLS_SSL_PROTO_TLS1 || MBEDTLS_SSL_PROTO_TLS1_1 || \ MBEDTLS_SSL_PROTO_TLS1_2 */ { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } MBEDTLS_SSL_DEBUG_BUF( 3, "parameters hash", hash, hashlen != 0 ? hashlen : (unsigned int) ( mbedtls_md_get_size( mbedtls_md_info_from_type( md_alg ) ) ) ); if( ssl->session_negotiate->peer_cert == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 2, ( "certificate required" ) ); return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } /* * Verify signature */ if( ! mbedtls_pk_can_do( &ssl->session_negotiate->peer_cert->pk, pk_alg ) ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); return( MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH ); } if( ( ret = mbedtls_pk_verify( &ssl->session_negotiate->peer_cert->pk, md_alg, hash, hashlen, p, sig_len ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_pk_verify", ret ); return( ret ); } } #endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED || MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED || MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */ exit: ssl->state++; MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server key exchange" ) ); return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x128, %rsp # imm = 0x128 movq %rdi, %rbx movq 0x80(%rdi), %rax movq (%rax), %r14 leaq 0x34611(%rip), %rdx # 0x4f758 leaq 0x350ac(%rip), %r8 # 0x501fa movl $0x2, %esi movl $0x896, %ecx # imm = 0x896 xorl %eax, %eax callq 0xf997 movl 0x18(%r14), %eax leal -0x9(%rax), %ecx cmpl $0x2, %ecx jae 0x1b1ea movq 0x58(%rbx), %rax movq 0x68(%rax), %rdi testq %rdi, %rdi je 0x1b24b addq $0x148, %rdi # imm = 0x148 movl $0x2, %esi callq 0x3b0be testl %eax, %eax je 0x1b278 movq 0x58(%rbx), %rax movq 0x68(%rax), %rax movq 0x150(%rax), %rsi movl $0x100, %edi # imm = 0x100 addq 0x60(%rbx), %rdi movl $0x1, %edx callq 0x2da2a testl %eax, %eax je 0x1b385 movl %eax, %r13d leaq 0x3458f(%rip), %rdx # 0x4f758 leaq 0x35117(%rip), %r8 # 0x502e7 movq %rbx, %rdi movl $0x1, %esi movl $0x881, %ecx # imm = 0x881 movl %eax, %r9d callq 0xfa82 jmp 0x1b3bd cmpl $0x1, %eax jne 0x1b21c leaq 0x34562(%rip), %rdx # 0x4f758 leaq 0x3501a(%rip), %r8 # 0x50217 xorl %r13d, %r13d movq %rbx, %rdi movl $0x2, %esi movl $0x89b, %ecx # imm = 0x89B xorl %eax, %eax callq 0xf997 incl 0x8(%rbx) jmp 0x1b3e0 movq %rbx, %rdi callq 0x141f2 testl %eax, %eax je 0x1b2a5 movl %eax, %r13d leaq 0x34526(%rip), %rdx # 0x4f758 leaq 0x31b7c(%rip), %r8 # 0x4cdb5 movq %rbx, %rdi movl $0x1, %esi movl $0x8b9, %ecx # imm = 0x8B9 jmp 0x1b3d8 leaq 0x34506(%rip), %rdx # 0x4f758 leaq 0x3502e(%rip), %r8 # 0x50287 movq %rbx, %rdi movl $0x2, %esi movl $0x871, %ecx # imm = 0x871 xorl %eax, %eax callq 0xf997 movl $0xffff8900, %r13d # imm = 0xFFFF8900 jmp 0x1b3bd leaq 0x344d9(%rip), %rdx # 0x4f758 leaq 0x35045(%rip), %r8 # 0x502cb movq %rbx, %rdi movl $0x1, %esi movl $0x878, %ecx # imm = 0x878 xorl %eax, %eax callq 0xf997 movl $0xffff9300, %r13d # imm = 0xFFFF9300 jmp 0x1b3bd cmpl $0x16, 0xd8(%rbx) jne 0x1b3f5 movq 0xc8(%rbx), %r15 cmpb $0xc, (%r15) jne 0x1b43b movq (%rbx), %rax movl 0x174(%rax), %eax andl $0x2, %eax leaq 0x4(,%rax,4), %rcx leaq (%r15,%rax,4), %r12 addq $0x4, %r12 movq %r12, 0x10(%rsp) movq 0x110(%rbx), %rax addq %rax, %r15 subq %rcx, %rax movq %rax, (%rsp) leaq 0x3445c(%rip), %rdx # 0x4f758 leaq 0x34fb4(%rip), %r8 # 0x502b7 movq %rbx, %rdi movl $0x3, %esi movl $0x8d6, %ecx # imm = 0x8D6 movq %r12, %r9 callq 0xfb06 movl 0x18(%r14), %eax leal -0x5(%rax), %ecx cmpl $0x3, %ecx ja 0x1b478 movzwl (%r12), %ecx rolw $0x8, %cx movzwl %cx, %ecx addq %r12, %rcx addq $0x2, %rcx cmpq %r15, %rcx jbe 0x1b473 leaq 0x3440d(%rip), %r14 # 0x4f758 leaq 0x34fe9(%rip), %r8 # 0x5033b movq %rbx, %rdi movl $0x1, %esi movq %r14, %rdx movl $0x7ca, %ecx # imm = 0x7CA xorl %eax, %eax callq 0xf997 leaq 0x34ee7(%rip), %r8 # 0x50257 movq %rbx, %rdi movl $0x1, %esi movq %r14, %rdx movl $0x8e0, %ecx # imm = 0x8E0 jmp 0x1b707 movq %rbx, %rdi callq 0x1cf08 leaq 0x343c4(%rip), %rdx # 0x4f758 testl %eax, %eax je 0x1b41f leaq 0x34f5c(%rip), %r8 # 0x502ff movq %rbx, %rdi movl $0x1, %esi movl $0x887, %ecx # imm = 0x887 xorl %eax, %eax callq 0xf997 movl $0xffff8600, %r13d # imm = 0xFFFF8600 leaq 0x34394(%rip), %rdx # 0x4f758 leaq 0x34e6e(%rip), %r8 # 0x50239 movq %rbx, %rdi movl $0x1, %esi movl $0x8aa, %ecx # imm = 0x8AA movl %r13d, %r9d callq 0xfa82 movl %r13d, %eax addq $0x128, %rsp # imm = 0x128 popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq leaq 0x3435c(%rip), %rdx # 0x4f758 leaq 0x34e54(%rip), %r8 # 0x50257 movq %rbx, %rdi movl $0x1, %esi movl $0x8bf, %ecx # imm = 0x8BF xorl %eax, %eax callq 0xf997 movl $0xffff8900, %r13d # imm = 0xFFFF8900 jmp 0x1b3e0 leaq 0x34df1(%rip), %r8 # 0x50217 xorl %r13d, %r13d movq %rbx, %rdi movl $0x2, %esi movl $0x8ae, %ecx # imm = 0x8AE jmp 0x1b20d movl 0x18(%r14), %eax orl $0x2, %eax cmpl $0x7, %eax jne 0x1b456 movl $0x1, 0x11c(%rbx) jmp 0x1b8d4 leaq 0x342fb(%rip), %rdx # 0x4f758 leaq 0x34df3(%rip), %r8 # 0x50257 movq %rbx, %rdi movl $0x1, %esi movl $0x8d0, %ecx # imm = 0x8D0 jmp 0x1b410 movq %rcx, 0x10(%rsp) cmpl $0x8, %eax ja 0x1b49f movl $0x118, %ecx # imm = 0x118 btl %eax, %ecx jb 0x1b4bf movl $0x44, %ecx btl %eax, %ecx jb 0x1b4f3 movl $0xa0, %ecx btl %eax, %ecx jb 0x1b527 leaq 0x342b2(%rip), %rdx # 0x4f758 leaq 0x310c8(%rip), %r8 # 0x4c575 movq %rbx, %rdi movl $0x1, %esi movl $0x91b, %ecx # imm = 0x91B jmp 0x1b5d8 leaq 0x10(%rsp), %rsi movq %rbx, %rdi movq %r15, %rdx callq 0x1cd45 testl %eax, %eax je 0x1b527 leaq 0x3427e(%rip), %rdx # 0x4f758 leaq 0x34d76(%rip), %r8 # 0x50257 movq %rbx, %rdi movl $0x1, %esi movl $0x905, %ecx # imm = 0x905 jmp 0x1b707 leaq 0x10(%rsp), %rsi movq %rbx, %rdi movq %r15, %rdx callq 0x1cc3a testl %eax, %eax je 0x1b527 leaq 0x3424a(%rip), %rdx # 0x4f758 leaq 0x34d42(%rip), %r8 # 0x50257 movq %rbx, %rdi movl $0x1, %esi movl $0x8f5, %ecx # imm = 0x8F5 jmp 0x1b707 movl 0x18(%r14), %eax addl $-0x2, %eax cmpl $0x2, %eax ja 0x1b8d4 xorl %eax, %eax movl %eax, 0x18(%rsp) movl %eax, 0x1c(%rsp) movq 0xc8(%rbx), %r13 movq (%rbx), %rax movb 0x174(%rax), %bpl movq 0x10(%rsp), %r12 movl 0x18(%rbx), %eax cmpl $0x3, %eax jne 0x1b59d leaq 0x10(%rsp), %rsi leaq 0x18(%rsp), %rcx leaq 0x1c(%rsp), %r8 movq %rbx, %rdi movq %r15, %rdx callq 0x1cdc4 testl %eax, %eax je 0x1b5ea leaq 0x341d4(%rip), %rdx # 0x4f758 leaq 0x34ccc(%rip), %r8 # 0x50257 movq %rbx, %rdi movl $0x1, %esi movl $0x936, %ecx # imm = 0x936 jmp 0x1b707 jge 0x1b5bd movq %r14, %rdi callq 0x19149 movl %eax, %edx cmpl $0x4, %eax jne 0x1b612 movl $0x4, 0x18(%rsp) movl $0x4, %edx jmp 0x1b612 leaq 0x34194(%rip), %rdx # 0x4f758 leaq 0x30faa(%rip), %r8 # 0x4c575 movq %rbx, %rdi movl $0x1, %esi movl $0x94f, %ecx # imm = 0x94F xorl %eax, %eax callq 0xf997 movl $0xffff9400, %r13d # imm = 0xFFFF9400 jmp 0x1b3e0 movq %r13, 0x20(%rsp) movq %r12, %r13 movl 0x1c(%rsp), %r12d movq %r14, %rdi callq 0x19149 movl %r12d, %edx movq %r13, %r12 movq 0x20(%rsp), %r13 cmpl %eax, %edx jne 0x1b6ec movq 0x10(%rsp), %rax movzwl (%rax), %ecx rolw $0x8, %cx movzwl %cx, %r14d leaq 0x2(%rax), %r9 movq %r9, 0x10(%rsp) addq %r14, %rax addq $0x2, %rax cmpq %rax, %r15 je 0x1b657 leaq 0x3411a(%rip), %rdx # 0x4f758 leaq 0x34c12(%rip), %r8 # 0x50257 movq %rbx, %rdi movl $0x1, %esi movl $0x95b, %ecx # imm = 0x95B jmp 0x1b707 movl %edx, 0x20(%rsp) andb $0x2, %bpl shrb %bpl movzbl %bpl, %eax leaq 0x4(,%rax,8), %r15 addq %r13, %r15 subq %r15, %r12 movq %r14, (%rsp) leaq 0x340d9(%rip), %rdx # 0x4f758 leaq 0x35ea3(%rip), %r8 # 0x51529 movq %rbx, %rdi movl $0x3, %esi movl $0x95f, %ecx # imm = 0x95F callq 0xfb06 movl 0x18(%rsp), %ebp testl %ebp, %ebp je 0x1b719 leaq 0x70(%rsp), %r13 movq %r13, %rdi callq 0x38cf4 movl %ebp, %edi callq 0x38cdb movq %r13, %rdi movq %rax, %rsi xorl %edx, %edx callq 0x38da1 testl %eax, %eax je 0x1b7dc movl %eax, %r13d leaq 0x34085(%rip), %rdx # 0x4f758 leaq 0x30f36(%rip), %r8 # 0x4c610 movq %rbx, %rdi movl $0x1, %esi movl $0x9a2, %ecx # imm = 0x9A2 jmp 0x1b3d8 leaq 0x34065(%rip), %rdx # 0x4f758 leaq 0x34b5d(%rip), %r8 # 0x50257 movq %rbx, %rdi movl $0x1, %esi movl $0x93c, %ecx # imm = 0x93C xorl %eax, %eax callq 0xf997 movl $0xffff8500, %r13d # imm = 0xFFFF8500 jmp 0x1b3e0 leaq 0xd0(%rsp), %r13 movq %r13, %rdi callq 0x3928c leaq 0x70(%rsp), %rdi callq 0x40c04 movq %r13, %rdi movl %ebp, 0x2c(%rsp) movq %r13, %rbp callq 0x392c8 movl $0x618, %r13d # imm = 0x618 movq 0x60(%rbx), %rsi addq %r13, %rsi movl $0x40, %edx movq %rbp, %rdi callq 0x39a96 movq %rbp, %rdi movq %r15, %rsi movq %r12, %rdx callq 0x39a96 leaq 0x30(%rsp), %rsi movq %rbp, %rdi callq 0x39b50 leaq 0x70(%rsp), %rbp movq %rbp, %rdi callq 0x40c3c addq 0x60(%rbx), %r13 movl $0x40, %edx movq %rbp, %rdi movq %r13, %rsi callq 0x41d8b movq %rbp, %rdi movq %r15, %rsi movq %r12, %rdx callq 0x41d8b leaq 0x40(%rsp), %rsi movq %rbp, %r15 movq %rbp, %rdi callq 0x41e45 leaq 0xd0(%rsp), %rdi movl 0x2c(%rsp), %ebp callq 0x392ab movq %r15, %rdi callq 0x40c1f movl $0x24, %r15d movl $0x24, %eax jmp 0x1b837 leaq 0x70(%rsp), %r13 movq %r13, %rdi callq 0x38e0f movl $0x618, %esi # imm = 0x618 addq 0x60(%rbx), %rsi movl $0x40, %edx movq %r13, %rdi callq 0x38e30 movq %r13, %rdi movq %r15, %rsi movq %r12, %rdx callq 0x38e30 leaq 0x30(%rsp), %rsi movq %r13, %rdi callq 0x38e51 movq %r13, %rdi callq 0x38d03 movl %ebp, %edi callq 0x38cdb movq %rax, %rdi callq 0x39265 movzbl %al, %eax xorl %r15d, %r15d movq %rax, (%rsp) leaq 0x33f16(%rip), %rdx # 0x4f758 leaq 0x34a2e(%rip), %r8 # 0x50277 leaq 0x30(%rsp), %r9 movq %rbx, %rdi movl $0x3, %esi movl $0x9b5, %ecx # imm = 0x9B5 callq 0xfb06 movq 0x58(%rbx), %rax movq 0x68(%rax), %rdi testq %rdi, %rdi je 0x1b901 addq $0x148, %rdi # imm = 0x148 movl 0x20(%rsp), %esi callq 0x3b0be testl %eax, %eax je 0x1b921 movq 0x58(%rbx), %rax movl $0x148, %edi # imm = 0x148 addq 0x68(%rax), %rdi movq 0x10(%rsp), %r8 leaq 0x30(%rsp), %rdx movl %ebp, %esi movq %r15, %rcx movq %r14, %r9 callq 0x3b0d3 testl %eax, %eax je 0x1b8d4 movl %eax, %r13d leaq 0x33e9d(%rip), %rdx # 0x4f758 leaq 0x349da(%rip), %r8 # 0x5029c movq %rbx, %rdi movl $0x1, %esi movl $0x9c9, %ecx # imm = 0x9C9 jmp 0x1b3d8 incl 0x8(%rbx) leaq 0x33e7a(%rip), %rdx # 0x4f758 leaq 0x349c9(%rip), %r8 # 0x502ae xorl %r13d, %r13d movq %rbx, %rdi movl $0x2, %esi movl $0x9d4, %ecx # imm = 0x9D4 xorl %eax, %eax callq 0xf997 jmp 0x1b3e0 leaq 0x33e50(%rip), %rdx # 0x4f758 leaq 0x34978(%rip), %r8 # 0x50287 movq %rbx, %rdi movl $0x2, %esi movl $0x9b9, %ecx # imm = 0x9B9 jmp 0x1b410 leaq 0x33e30(%rip), %rdx # 0x4f758 leaq 0x34928(%rip), %r8 # 0x50257 movq %rbx, %rdi movl $0x1, %esi movl $0x9c2, %ecx # imm = 0x9C2 xorl %eax, %eax callq 0xf997 movl $0xffff9300, %r13d # imm = 0xFFFF9300 jmp 0x1b3e0
/Dragonchang[P]https_client/mbedtls/library/ssl_cli.c
ssl_parse_server_hello_done
static int ssl_parse_server_hello_done( mbedtls_ssl_context *ssl ) { int ret; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server hello done" ) ); if( ssl->record_read == 0 ) { if( ( ret = mbedtls_ssl_read_record( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_read_record", ret ); return( ret ); } if( ssl->in_msgtype != MBEDTLS_SSL_MSG_HANDSHAKE ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello done message" ) ); return( MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE ); } } ssl->record_read = 0; if( ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) || ssl->in_msg[0] != MBEDTLS_SSL_HS_SERVER_HELLO_DONE ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello done message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO_DONE ); } ssl->state++; #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) mbedtls_ssl_recv_flight_completed( ssl ); #endif MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse server hello done" ) ); return( 0 ); }
pushq %rbp pushq %rbx pushq %rax movq %rdi, %rbx leaq 0x33adc(%rip), %rdx # 0x4f758 leaq 0x3490e(%rip), %r8 # 0x50591 movl $0x2, %esi movl $0xa81, %ecx # imm = 0xA81 xorl %eax, %eax callq 0xf997 cmpl $0x0, 0x11c(%rbx) je 0x1bd3f movl $0x0, 0x11c(%rbx) movq (%rbx), %rax movb 0x174(%rax), %cl andb $0x2, %cl shrb %cl movzbl %cl, %ecx leaq 0x4(,%rcx,8), %rcx cmpq %rcx, 0x110(%rbx) jne 0x1bd16 movq 0xc8(%rbx), %rcx cmpb $0xe, (%rcx) jne 0x1bd16 incl 0x8(%rbx) testb $0x2, 0x174(%rax) je 0x1bced movq %rbx, %rdi callq 0x137db leaq 0x33a64(%rip), %rdx # 0x4f758 leaq 0x348cf(%rip), %r8 # 0x505ca xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0xaa1, %ecx # imm = 0xAA1 xorl %eax, %eax callq 0xf997 jmp 0x1bda6 leaq 0x33a3b(%rip), %rdx # 0x4f758 leaq 0x34888(%rip), %r8 # 0x505ac movq %rbx, %rdi movl $0x1, %esi movl $0xa96, %ecx # imm = 0xA96 xorl %eax, %eax callq 0xf997 movl $0xffff8480, %ebp # imm = 0xFFFF8480 jmp 0x1bda6 movq %rbx, %rdi callq 0x141f2 testl %eax, %eax je 0x1bd72 movl %eax, %ebp leaq 0x33a04(%rip), %rdx # 0x4f758 leaq 0x3105a(%rip), %r8 # 0x4cdb5 movq %rbx, %rdi movl $0x1, %esi movl $0xa87, %ecx # imm = 0xA87 movl %eax, %r9d callq 0xfa82 jmp 0x1bda6 cmpl $0x16, 0xd8(%rbx) je 0x1bca1 leaq 0x339d2(%rip), %rdx # 0x4f758 leaq 0x3481f(%rip), %r8 # 0x505ac movq %rbx, %rdi movl $0x1, %esi movl $0xa8d, %ecx # imm = 0xA8D xorl %eax, %eax callq 0xf997 movl $0xffff8900, %ebp # imm = 0xFFFF8900 movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_cli.c
ssl_write_client_key_exchange
static int ssl_write_client_key_exchange( mbedtls_ssl_context *ssl ) { int ret; size_t i, n; const mbedtls_ssl_ciphersuite_t *ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write client key exchange" ) ); #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_RSA ) { /* * DHM key exchange -- send G^X mod P */ n = ssl->handshake->dhm_ctx.len; ssl->out_msg[4] = (unsigned char)( n >> 8 ); ssl->out_msg[5] = (unsigned char)( n ); i = 6; ret = mbedtls_dhm_make_public( &ssl->handshake->dhm_ctx, (int) mbedtls_mpi_size( &ssl->handshake->dhm_ctx.P ), &ssl->out_msg[i], n, ssl->conf->f_rng, ssl->conf->p_rng ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_dhm_make_public", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: X ", &ssl->handshake->dhm_ctx.X ); MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: GX", &ssl->handshake->dhm_ctx.GX ); if( ( ret = mbedtls_dhm_calc_secret( &ssl->handshake->dhm_ctx, ssl->handshake->premaster, MBEDTLS_PREMASTER_SIZE, &ssl->handshake->pmslen, ssl->conf->f_rng, ssl->conf->p_rng ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_dhm_calc_secret", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: K ", &ssl->handshake->dhm_ctx.K ); } else #endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED */ #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \ defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \ defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \ defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_RSA || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA ) { /* * ECDH key exchange -- send client public value */ i = 4; ret = mbedtls_ecdh_make_public( &ssl->handshake->ecdh_ctx, &n, &ssl->out_msg[i], 1000, ssl->conf->f_rng, ssl->conf->p_rng ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecdh_make_public", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_ECP( 3, "ECDH: Q", &ssl->handshake->ecdh_ctx.Q ); if( ( ret = mbedtls_ecdh_calc_secret( &ssl->handshake->ecdh_ctx, &ssl->handshake->pmslen, ssl->handshake->premaster, MBEDTLS_MPI_MAX_SIZE, ssl->conf->f_rng, ssl->conf->p_rng ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecdh_calc_secret", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_MPI( 3, "ECDH: z", &ssl->handshake->ecdh_ctx.z ); } else #endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED || MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED || MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED || MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */ #if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK || ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK ) { /* * opaque psk_identity<0..2^16-1>; */ if( ssl->conf->psk == NULL || ssl->conf->psk_identity == NULL ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no private key for PSK" ) ); return( MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED ); } i = 4; n = ssl->conf->psk_identity_len; if( i + 2 + n > MBEDTLS_SSL_MAX_CONTENT_LEN ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "psk identity too long or " "SSL buffer too short" ) ); return( MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL ); } ssl->out_msg[i++] = (unsigned char)( n >> 8 ); ssl->out_msg[i++] = (unsigned char)( n ); memcpy( ssl->out_msg + i, ssl->conf->psk_identity, ssl->conf->psk_identity_len ); i += ssl->conf->psk_identity_len; #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK ) { n = 0; } else #endif #if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA_PSK ) { if( ( ret = ssl_write_encrypted_pms( ssl, i, &n, 2 ) ) != 0 ) return( ret ); } else #endif #if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK ) { /* * ClientDiffieHellmanPublic public (DHM send G^X mod P) */ n = ssl->handshake->dhm_ctx.len; if( i + 2 + n > MBEDTLS_SSL_MAX_CONTENT_LEN ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "psk identity or DHM size too long" " or SSL buffer too short" ) ); return( MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL ); } ssl->out_msg[i++] = (unsigned char)( n >> 8 ); ssl->out_msg[i++] = (unsigned char)( n ); ret = mbedtls_dhm_make_public( &ssl->handshake->dhm_ctx, (int) mbedtls_mpi_size( &ssl->handshake->dhm_ctx.P ), &ssl->out_msg[i], n, ssl->conf->f_rng, ssl->conf->p_rng ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_dhm_make_public", ret ); return( ret ); } } else #endif /* MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */ #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK ) { /* * ClientECDiffieHellmanPublic public; */ ret = mbedtls_ecdh_make_public( &ssl->handshake->ecdh_ctx, &n, &ssl->out_msg[i], MBEDTLS_SSL_MAX_CONTENT_LEN - i, ssl->conf->f_rng, ssl->conf->p_rng ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecdh_make_public", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_ECP( 3, "ECDH: Q", &ssl->handshake->ecdh_ctx.Q ); } else #endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED */ { MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } if( ( ret = mbedtls_ssl_psk_derive_premaster( ssl, ciphersuite_info->key_exchange ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_psk_derive_premaster", ret ); return( ret ); } } else #endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */ #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_RSA ) { i = 4; if( ( ret = ssl_write_encrypted_pms( ssl, i, &n, 0 ) ) != 0 ) return( ret ); } else #endif /* MBEDTLS_KEY_EXCHANGE_RSA_ENABLED */ #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE ) { i = 4; ret = mbedtls_ecjpake_write_round_two( &ssl->handshake->ecjpake_ctx, ssl->out_msg + i, MBEDTLS_SSL_MAX_CONTENT_LEN - i, &n, ssl->conf->f_rng, ssl->conf->p_rng ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_write_round_two", ret ); return( ret ); } ret = mbedtls_ecjpake_derive_secret( &ssl->handshake->ecjpake_ctx, ssl->handshake->premaster, 32, &ssl->handshake->pmslen, ssl->conf->f_rng, ssl->conf->p_rng ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ecjpake_derive_secret", ret ); return( ret ); } } else #endif /* MBEDTLS_KEY_EXCHANGE_RSA_ENABLED */ { ((void) ciphersuite_info); MBEDTLS_SSL_DEBUG_MSG( 1, ( "should never happen" ) ); return( MBEDTLS_ERR_SSL_INTERNAL_ERROR ); } ssl->out_msglen = i + n; ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE; ssl->out_msg[0] = MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE; ssl->state++; if( ( ret = mbedtls_ssl_write_record( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_record", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write client key exchange" ) ); return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r12 pushq %rbx subq $0x10, %rsp movq %rdi, %rbx movq 0x80(%rdi), %rax movq (%rax), %r12 leaq 0x33989(%rip), %rdx # 0x4f758 leaq 0x3480f(%rip), %r8 # 0x505e5 movl $0x2, %esi movl $0xaac, %ecx # imm = 0xAAC xorl %eax, %eax callq 0xf997 movl 0x18(%r12), %eax decl %eax cmpl $0x9, %eax ja 0x1c01e leaq 0x33922(%rip), %rcx # 0x4f720 movslq (%rcx,%rax,4), %rax addq %rcx, %rax jmpq *%rax movl $0x100, %edi # imm = 0x100 addq 0x60(%rbx), %rdi movq (%rbx), %rax movq 0x148(%rbx), %rdx addq $0x4, %rdx movq 0x30(%rax), %r8 movq 0x38(%rax), %r9 leaq 0x8(%rsp), %rsi movl $0x3e8, %ecx # imm = 0x3E8 callq 0x2da9e testl %eax, %eax je 0x1beee movl %eax, %ebp leaq 0x33912(%rip), %rdx # 0x4f758 leaq 0x347dd(%rip), %r8 # 0x5062a movq %rbx, %rdi movl $0x1, %esi movl $0xae9, %ecx # imm = 0xAE9 jmp 0x1c3ec movq (%rbx), %rax cmpq $0x0, 0x128(%rax) je 0x1bec2 cmpq $0x0, 0x138(%rax) je 0x1bec2 movq 0x140(%rax), %rax movq %rax, 0x8(%rsp) leaq -0x3ffb(%rax), %rcx cmpq $-0x4002, %rcx # imm = 0xBFFE ja 0x1c04a leaq 0x338bb(%rip), %rdx # 0x4f758 leaq 0x347c2(%rip), %r8 # 0x50666 movq %rbx, %rdi movl $0x1, %esi movl $0xb15, %ecx # imm = 0xB15 xorl %eax, %eax callq 0xf997 movl $0xffff9600, %ebp # imm = 0xFFFF9600 jmp 0x1c3f4 leaq 0x3388f(%rip), %rdx # 0x4f758 leaq 0x3477b(%rip), %r8 # 0x5064b movq %rbx, %rdi movl $0x1, %esi movl $0xb0b, %ecx # imm = 0xB0B xorl %eax, %eax callq 0xf997 movl $0xffff8a00, %ebp # imm = 0xFFFF8A00 jmp 0x1c3f4 movl $0x210, %r9d # imm = 0x210 addq 0x60(%rbx), %r9 leaq 0x33859(%rip), %rdx # 0x4f758 leaq 0x3473d(%rip), %r8 # 0x50643 movq %rbx, %rdi movl $0x3, %esi movl $0xaed, %ecx # imm = 0xAED callq 0xfd4c movq (%rbx), %rax movq 0x60(%rbx), %rdx leaq 0x100(%rdx), %rdi leaq 0x610(%rdx), %rsi addq $0x658, %rdx # imm = 0x658 movq 0x30(%rax), %r8 movq 0x38(%rax), %r9 movl $0x400, %ecx # imm = 0x400 callq 0x2db67 testl %eax, %eax je 0x1c0c0 movl %eax, %ebp leaq 0x33801(%rip), %rdx # 0x4f758 leaq 0x3076b(%rip), %r8 # 0x4c6c9 movq %rbx, %rdi movl $0x1, %esi movl $0xaf5, %ecx # imm = 0xAF5 jmp 0x1c3ec movl $0x4, %r14d leaq 0x8(%rsp), %rdx movl $0x4, %esi movq %rbx, %rdi xorl %ecx, %ecx callq 0x1cfba testl %eax, %eax je 0x1c0f0 movl %eax, %ebp jmp 0x1c3f4 movq 0x60(%rbx), %rax movq 0x8(%rax), %rax movq %rax, 0x8(%rsp) movq 0x148(%rbx), %rcx movb %ah, 0x4(%rcx) movb 0x8(%rsp), %al movq 0x148(%rbx), %rcx movb %al, 0x5(%rcx) movq 0x60(%rbx), %rdi leaq 0x8(%rdi), %r14 addq $0x10, %rdi callq 0x25e13 movq (%rbx), %rsi movq 0x148(%rbx), %rdx addq $0x6, %rdx movq 0x8(%rsp), %rcx movq 0x30(%rsi), %r8 movq 0x38(%rsi), %r9 movq %r14, %rdi movl %eax, %esi callq 0x2d038 testl %eax, %eax je 0x1c16a movl %eax, %ebp leaq 0x33753(%rip), %rdx # 0x4f758 leaq 0x345f6(%rip), %r8 # 0x50602 movq %rbx, %rdi movl $0x1, %esi movl $0xac0, %ecx # imm = 0xAC0 jmp 0x1c3ec leaq 0x33733(%rip), %rdx # 0x4f758 leaq 0x30549(%rip), %r8 # 0x4c575 movq %rbx, %rdi movl $0x1, %esi movl $0xb91, %ecx # imm = 0xB91 xorl %eax, %eax callq 0xf997 movl $0xffff9400, %ebp # imm = 0xFFFF9400 jmp 0x1c3f4 movq 0x148(%rbx), %rcx movb %ah, 0x4(%rcx) movb 0x8(%rsp), %al movq 0x148(%rbx), %rcx movb %al, 0x5(%rcx) movq (%rbx), %rax movq 0x148(%rbx), %rdi addq $0x6, %rdi movq 0x138(%rax), %rsi movq 0x140(%rax), %rdx callq 0xf240 movl 0x18(%r12), %ecx addl $-0x5, %ecx cmpl $0x3, %ecx ja 0x1c2c5 movq (%rbx), %rsi movq 0x140(%rsi), %rax leaq 0x6(%rax), %r14 leaq 0x3369f(%rip), %rdx # 0x4f748 movslq (%rdx,%rcx,4), %rcx addq %rdx, %rcx jmpq *%rcx movq $0x0, 0x8(%rsp) jmp 0x1c3ba movl $0x2a0, %r9d # imm = 0x2A0 addq 0x60(%rbx), %r9 leaq 0x33687(%rip), %rdx # 0x4f758 leaq 0x3060a(%rip), %r8 # 0x4c6e2 movq %rbx, %rdi movl $0x3, %esi movl $0xaf9, %ecx # imm = 0xAF9 callq 0xfdfd movl $0x4, %r14d addq 0x8(%rsp), %r14 movq %r14, 0x158(%rbx) movl $0x16, 0x150(%rbx) movq 0x148(%rbx), %rax movb $0x10, (%rax) incl 0x8(%rbx) movq %rbx, %rdi callq 0x12b2b testl %eax, %eax je 0x1c141 movl %eax, %ebp leaq 0x33630(%rip), %rdx # 0x4f758 leaq 0x307ba(%rip), %r8 # 0x4c8e9 movq %rbx, %rdi movl $0x1, %esi movl $0xb9d, %ecx # imm = 0xB9D jmp 0x1c3ec leaq 0x33610(%rip), %rdx # 0x4f758 leaq 0x345a0(%rip), %r8 # 0x506ef xorl %ebp, %ebp movq %rbx, %rdi movl $0x2, %esi movl $0xba1, %ecx # imm = 0xBA1 xorl %eax, %eax callq 0xf997 jmp 0x1c3f4 movq 0x60(%rbx), %r9 addq $0x40, %r9 leaq 0x335df(%rip), %r14 # 0x4f758 leaq 0x3449a(%rip), %r8 # 0x5061a movq %rbx, %rdi movl $0x3, %esi movq %r14, %rdx movl $0xac4, %ecx # imm = 0xAC4 callq 0xfdfd movq 0x60(%rbx), %r9 addq $0x58, %r9 leaq 0x3447e(%rip), %r8 # 0x50622 movq %rbx, %rdi movl $0x3, %esi movq %r14, %rdx movl $0xac5, %ecx # imm = 0xAC5 callq 0xfdfd movq (%rbx), %rax movq 0x60(%rbx), %rcx leaq 0x8(%rcx), %rdi leaq 0x658(%rcx), %rsi addq $0x610, %rcx # imm = 0x610 movq 0x30(%rax), %r8 movq 0x38(%rax), %r9 movl $0x424, %edx # imm = 0x424 callq 0x2d15a testl %eax, %eax je 0x1c2e5 movl %eax, %ebp leaq 0x33563(%rip), %rdx # 0x4f758 leaq 0x304ad(%rip), %r8 # 0x4c6a9 movq %rbx, %rdi movl $0x1, %esi movl $0xacd, %ecx # imm = 0xACD jmp 0x1c3ec leaq 0x8(%rsp), %rdx movl $0x2, %ecx movq %rbx, %rdi movq %r14, %rsi callq 0x1cfba testl %eax, %eax jne 0x1bf92 jmp 0x1c3ba movl $0x100, %edi # imm = 0x100 addq 0x60(%rbx), %rdi movq 0x148(%rbx), %rdx addq %r14, %rdx movl $0x3ffa, %ecx # imm = 0x3FFA subq %rax, %rcx movq 0x30(%rsi), %r8 movq 0x38(%rsi), %r9 leaq 0x8(%rsp), %rsi callq 0x2da9e testl %eax, %eax je 0x1c390 movl %eax, %ebp leaq 0x334ea(%rip), %rdx # 0x4f758 leaq 0x343b5(%rip), %r8 # 0x5062a movq %rbx, %rdi movl $0x1, %esi movl $0xb57, %ecx # imm = 0xB57 jmp 0x1c3ec movq 0x60(%rbx), %rcx movq 0x8(%rcx), %rcx movq %rcx, 0x8(%rsp) leaq (%rcx,%rax), %rdx addq $0x8, %rdx cmpq $0x4001, %rdx # imm = 0x4001 jb 0x1c31a leaq 0x334ac(%rip), %rdx # 0x4f758 leaq 0x343e1(%rip), %r8 # 0x50694 movq %rbx, %rdi movl $0x1, %esi movl $0xb39, %ecx # imm = 0xB39 jmp 0x1beb1 leaq 0x3348c(%rip), %rdx # 0x4f758 leaq 0x302a2(%rip), %r8 # 0x4c575 movq %rbx, %rdi movl $0x1, %esi movl $0xb60, %ecx # imm = 0xB60 jmp 0x1c039 movl $0x88, %r9d addq 0x60(%rbx), %r9 leaq 0x33462(%rip), %rdx # 0x4f758 leaq 0x303c4(%rip), %r8 # 0x4c6c1 movq %rbx, %rdi movl $0x3, %esi movl $0xad1, %ecx # imm = 0xAD1 callq 0xfdfd movl $0x6, %r14d jmp 0x1c0f0 leaq 0x8(%rax), %r14 movq 0x148(%rbx), %rdx movb %ch, 0x6(%rdx,%rax) movb 0x8(%rsp), %cl movq 0x148(%rbx), %rdx movb %cl, 0x7(%rdx,%rax) movq 0x60(%rbx), %rdi leaq 0x8(%rdi), %r15 addq $0x10, %rdi callq 0x25e13 movq 0x148(%rbx), %rdx addq %r14, %rdx movq 0x8(%rsp), %rcx movq (%rbx), %rsi movq 0x30(%rsi), %r8 movq 0x38(%rsi), %r9 movq %r15, %rdi movl %eax, %esi callq 0x2d038 testl %eax, %eax je 0x1c3ba movl %eax, %ebp leaq 0x333de(%rip), %rdx # 0x4f758 leaq 0x34281(%rip), %r8 # 0x50602 movq %rbx, %rdi movl $0x1, %esi movl $0xb46, %ecx # imm = 0xB46 jmp 0x1c3ec movl $0x210, %r9d # imm = 0x210 addq 0x60(%rbx), %r9 leaq 0x333b7(%rip), %rdx # 0x4f758 leaq 0x3429b(%rip), %r8 # 0x50643 movq %rbx, %rdi movl $0x3, %esi movl $0xb5b, %ecx # imm = 0xB5B callq 0xfd4c movl 0x18(%r12), %esi movq %rbx, %rdi callq 0x11dd3 testl %eax, %eax je 0x1c0f0 movl %eax, %ebp leaq 0x33380(%rip), %rdx # 0x4f758 leaq 0x342ef(%rip), %r8 # 0x506ce movq %rbx, %rdi movl $0x1, %esi movl $0xb67, %ecx # imm = 0xB67 movl %ebp, %r9d callq 0xfa82 movl %ebp, %eax addq $0x10, %rsp popq %rbx popq %r12 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_cli.c
ssl_parse_alpn_ext
static int ssl_parse_alpn_ext( mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len ) { size_t list_len, name_len; const char **p; /* If we didn't send it, the server shouldn't send it */ if( ssl->conf->alpn_list == NULL ) return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO ); /* * opaque ProtocolName<1..2^8-1>; * * struct { * ProtocolName protocol_name_list<2..2^16-1> * } ProtocolNameList; * * the "ProtocolNameList" MUST contain exactly one "ProtocolName" */ /* Min length is 2 (list_len) + 1 (name_len) + 1 (name) */ if( len < 4 ) return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO ); list_len = ( buf[0] << 8 ) | buf[1]; if( list_len != len - 2 ) return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO ); name_len = buf[2]; if( name_len != list_len - 1 ) return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO ); /* Check that the server chosen protocol was in our list and save it */ for( p = ssl->conf->alpn_list; *p != NULL; p++ ) { if( name_len == strlen( *p ) && memcmp( buf + 3, *p, name_len ) == 0 ) { ssl->alpn_chosen = *p; return( 0 ); } } return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx pushq %rax movq (%rdi), %rax movq 0x148(%rax), %rbp testq %rbp, %rbp sete %al cmpq $0x4, %rdx setb %cl orb %al, %cl movl $0xffff8680, %ebx # imm = 0xFFFF8680 jne 0x1cc29 movq %rsi, %r15 movzwl (%rsi), %eax rolw $0x8, %ax movzwl %ax, %eax addq $-0x2, %rdx cmpq %rdx, %rax jne 0x1cc29 movzbl 0x2(%r15), %r12d decq %rax cmpq %r12, %rax jne 0x1cc29 movq (%rbp), %r13 testq %r13, %r13 je 0x1cc29 movq %rdi, %r14 addq $0x3, %r15 addq $0x8, %rbp movq %r13, %rdi callq 0xf100 cmpq %r12, %rax jne 0x1cc11 movq %r15, %rdi movq %r13, %rsi movq %r12, %rdx callq 0xf2b0 testl %eax, %eax je 0x1cc20 movq (%rbp), %r13 addq $0x8, %rbp testq %r13, %r13 jne 0x1cbf2 jmp 0x1cc29 movq %r13, 0x178(%r14) xorl %ebx, %ebx movl %ebx, %eax addq $0x8, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_cli.c
ssl_parse_server_dh_params
static int ssl_parse_server_dh_params( mbedtls_ssl_context *ssl, unsigned char **p, unsigned char *end ) { int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE; /* * Ephemeral DH parameters: * * struct { * opaque dh_p<1..2^16-1>; * opaque dh_g<1..2^16-1>; * opaque dh_Ys<1..2^16-1>; * } ServerDHParams; */ if( ( ret = mbedtls_dhm_read_params( &ssl->handshake->dhm_ctx, p, end ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 2, ( "mbedtls_dhm_read_params" ), ret ); return( ret ); } if( ssl->handshake->dhm_ctx.len * 8 < ssl->conf->dhm_min_bitlen ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "DHM prime too short: %d < %d", ssl->handshake->dhm_ctx.len * 8, ssl->conf->dhm_min_bitlen ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); } MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: P ", &ssl->handshake->dhm_ctx.P ); MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: G ", &ssl->handshake->dhm_ctx.G ); MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: GY", &ssl->handshake->dhm_ctx.GY ); return( ret ); }
pushq %rbp pushq %r14 pushq %rbx subq $0x10, %rsp movq %rdi, %rbx movq 0x60(%rdi), %rdi addq $0x8, %rdi callq 0x2ccdc testl %eax, %eax je 0x1cc80 movl %eax, %ebp leaq 0x32af9(%rip), %rdx # 0x4f758 leaq 0x33710(%rip), %r8 # 0x50376 movq %rbx, %rdi movl $0x2, %esi movl $0x75a, %ecx # imm = 0x75A movl %eax, %r9d callq 0xfa82 jmp 0x1cd3a movq (%rbx), %rcx movq 0x60(%rbx), %rax movq 0x8(%rax), %r9 shlq $0x3, %r9 movl 0x16c(%rcx), %ecx cmpq %rcx, %r9 jae 0x1ccc6 movl %ecx, (%rsp) leaq 0x32ab4(%rip), %rdx # 0x4f758 leaq 0x336e3(%rip), %r8 # 0x5038e movq %rbx, %rdi movl $0x1, %esi movl $0x762, %ecx # imm = 0x762 xorl %eax, %eax callq 0xf997 movl $0xffff8500, %ebp # imm = 0xFFFF8500 jmp 0x1cd3a addq $0x10, %rax leaq 0x32a87(%rip), %r14 # 0x4f758 leaq 0x336d3(%rip), %r8 # 0x503ab movq %rbx, %rdi movl $0x3, %esi movq %r14, %rdx movl $0x766, %ecx # imm = 0x766 movq %rax, %r9 callq 0xfdfd movq 0x60(%rbx), %r9 addq $0x28, %r9 leaq 0x336b4(%rip), %r8 # 0x503b3 movq %rbx, %rdi movl $0x3, %esi movq %r14, %rdx movl $0x767, %ecx # imm = 0x767 callq 0xfdfd movq 0x60(%rbx), %r9 addq $0x70, %r9 leaq 0x33698(%rip), %r8 # 0x503bb movq %rbx, %rdi movl $0x3, %esi movq %r14, %rdx movl $0x768, %ecx # imm = 0x768 callq 0xfdfd xorl %ebp, %ebp movl %ebp, %eax addq $0x10, %rsp popq %rbx popq %r14 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_cli.c
ssl_parse_server_ecdh_params
static int ssl_parse_server_ecdh_params( mbedtls_ssl_context *ssl, unsigned char **p, unsigned char *end ) { int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE; /* * Ephemeral ECDH parameters: * * struct { * ECParameters curve_params; * ECPoint public; * } ServerECDHParams; */ if( ( ret = mbedtls_ecdh_read_params( &ssl->handshake->ecdh_ctx, (const unsigned char **) p, end ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, ( "mbedtls_ecdh_read_params" ), ret ); return( ret ); } if( ssl_check_server_ecdh_params( ssl ) != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server key exchange message (ECDHE curve)" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); } return( ret ); }
pushq %rbp pushq %rbx pushq %rax movq %rdi, %rbx movl $0x100, %edi # imm = 0x100 addq 0x60(%rbx), %rdi callq 0x2d9ed testl %eax, %eax je 0x1cd84 movl %eax, %ebp leaq 0x329f2(%rip), %rdx # 0x4f758 leaq 0x33656(%rip), %r8 # 0x503c3 movq %rbx, %rdi movl $0x1, %esi movl $0x7a7, %ecx # imm = 0x7A7 movl %eax, %r9d callq 0xfa82 jmp 0x1cdbb movq %rbx, %rdi callq 0x1cf08 testl %eax, %eax je 0x1cdb9 leaq 0x329c1(%rip), %rdx # 0x4f758 leaq 0x3363e(%rip), %r8 # 0x503dc movq %rbx, %rdi movl $0x1, %esi movl $0x7ad, %ecx # imm = 0x7AD xorl %eax, %eax callq 0xf997 movl $0xffff8500, %ebp # imm = 0xFFFF8500 jmp 0x1cdbb xorl %ebp, %ebp movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_cli.c
ssl_write_server_hello_done
static int ssl_write_server_hello_done( mbedtls_ssl_context *ssl ) { int ret; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write server hello done" ) ); ssl->out_msglen = 4; ssl->out_msgtype = MBEDTLS_SSL_MSG_HANDSHAKE; ssl->out_msg[0] = MBEDTLS_SSL_HS_SERVER_HELLO_DONE; ssl->state++; #if defined(MBEDTLS_SSL_PROTO_DTLS) if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) mbedtls_ssl_send_flight_completed( ssl ); #endif if( ( ret = mbedtls_ssl_write_record( ssl ) ) != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_write_record", ret ); return( ret ); } MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= write server hello done" ) ); return( 0 ); }
pushq %rbp pushq %rbx pushq %rax movq %rdi, %rbx leaq 0x30db9(%rip), %rdx # 0x50954 leaq 0x31a36(%rip), %r8 # 0x515d8 movl $0x2, %esi movl $0xbe1, %ecx # imm = 0xBE1 xorl %eax, %eax callq 0xf997 movq $0x4, 0x158(%rbx) movl $0x16, 0x150(%rbx) movq 0x148(%rbx), %rax movb $0xe, (%rax) incl 0x8(%rbx) movq (%rbx), %rax testb $0x2, 0x174(%rax) je 0x1fbe9 movq %rbx, %rdi callq 0x13868 movq %rbx, %rdi callq 0x12b2b movl %eax, %ebp leaq 0x30d5a(%rip), %rdx # 0x50954 testl %eax, %eax je 0x1fc1c leaq 0x2cce4(%rip), %r8 # 0x4c8e9 movq %rbx, %rdi movl $0x1, %esi movl $0xbf0, %ecx # imm = 0xBF0 movl %ebp, %r9d callq 0xfa82 jmp 0x1fc37 leaq 0x319d0(%rip), %r8 # 0x515f3 movq %rbx, %rdi movl $0x2, %esi movl $0xbf4, %ecx # imm = 0xBF4 xorl %eax, %eax callq 0xf997 movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_srv.c
ssl_parse_signature_algorithms_ext
static int ssl_parse_signature_algorithms_ext( mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len ) { size_t sig_alg_list_size; const unsigned char *p; const unsigned char *end = buf + len; const int *md_cur; sig_alg_list_size = ( ( buf[0] << 8 ) | ( buf[1] ) ); if( sig_alg_list_size + 2 != len || sig_alg_list_size % 2 != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO ); } /* * For now, ignore the SignatureAlgorithm part and rely on offered * ciphersuites only for that part. To be fixed later. * * So, just look at the HashAlgorithm part. */ for( md_cur = ssl->conf->sig_hashes; *md_cur != MBEDTLS_MD_NONE; md_cur++ ) { for( p = buf + 2; p < end; p += 2 ) { if( *md_cur == (int) mbedtls_ssl_md_alg_from_hash( p[0] ) ) { ssl->handshake->sig_alg = p[0]; goto have_sig_alg; } } } /* Some key echanges do not need signatures at all */ MBEDTLS_SSL_DEBUG_MSG( 3, ( "no signature_algorithm in common" ) ); return( 0 ); have_sig_alg: MBEDTLS_SSL_DEBUG_MSG( 3, ( "client hello v3, signature_algorithm ext: %d", ssl->handshake->sig_alg ) ); return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx pushq %rax movq %rdi, %rbx movzbl 0x1(%rsi), %eax testb $0x1, %al jne 0x20a57 movq %rdx, %r14 movq %rsi, %r15 movzbl (%rsi), %ecx shll $0x8, %ecx addq %rcx, %rax addq $0x2, %rax cmpq %rdx, %rax jne 0x20a57 movq (%rbx), %rax movq 0xe8(%rax), %r12 cmpl $0x0, (%r12) je 0x20a31 addq %r15, %r14 addq $0x2, %r15 movq %r15, %r13 cmpq %r14, %r13 jae 0x20a24 movl (%r12), %ebp movzbl (%r13), %edi callq 0x18981 addq $0x2, %r13 cmpl %eax, %ebp jne 0x20a07 jmp 0x20a80 cmpl $0x0, 0x4(%r12) leaq 0x4(%r12), %r12 jne 0x20a04 leaq 0x2ff1c(%rip), %rdx # 0x50954 leaq 0x30460(%rip), %r8 # 0x50e9f xorl %ebp, %ebp movq %rbx, %rdi movl $0x3, %esi movl $0xdf, %ecx xorl %eax, %eax callq 0xf997 jmp 0x20ab0 leaq 0x2fef6(%rip), %rdx # 0x50954 leaq 0x2ffa4(%rip), %r8 # 0x50a09 movq %rbx, %rdi movl $0x1, %esi movl $0xcb, %ecx xorl %eax, %eax callq 0xf997 movl $0xffff8700, %ebp # imm = 0xFFFF8700 jmp 0x20ab0 movzbl -0x2(%r13), %r9d movq 0x60(%rbx), %rax movl %r9d, (%rax) leaq 0x2fec1(%rip), %rdx # 0x50954 leaq 0x30426(%rip), %r8 # 0x50ec0 xorl %ebp, %ebp movq %rbx, %rdi movl $0x3, %esi movl $0xe4, %ecx xorl %eax, %eax callq 0xf997 movl %ebp, %eax addq $0x8, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_srv.c
ssl_parse_truncated_hmac_ext
static int ssl_parse_truncated_hmac_ext( mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len ) { if( len != 0 ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client hello message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO ); } ((void) buf); if( ssl->conf->trunc_hmac == MBEDTLS_SSL_TRUNC_HMAC_ENABLED ) ssl->session_negotiate->trunc_hmac = MBEDTLS_SSL_TRUNC_HMAC_ENABLED; return( 0 ); }
testq %rsi, %rsi je 0x20cd1 pushq %rax leaq 0x2fca5(%rip), %rdx # 0x50954 leaq 0x2fd53(%rip), %r8 # 0x50a09 movl $0x1, %esi movl $0x17b, %ecx # imm = 0x17B xorl %eax, %eax callq 0xf997 movl $0xffff8700, %eax # imm = 0xFFFF8700 addq $0x8, %rsp retq movq (%rdi), %rcx xorl %eax, %eax testb $-0x80, 0x175(%rcx) je 0x20ced movq 0x58(%rdi), %rcx movl $0x1, 0x90(%rcx) retq
/Dragonchang[P]https_client/mbedtls/library/ssl_srv.c
ssl_parse_session_ticket_ext
static int ssl_parse_session_ticket_ext( mbedtls_ssl_context *ssl, unsigned char *buf, size_t len ) { int ret; mbedtls_ssl_session session; mbedtls_ssl_session_init( &session ); if( ssl->conf->f_ticket_parse == NULL || ssl->conf->f_ticket_write == NULL ) { return( 0 ); } /* Remember the client asked us to send a new ticket */ ssl->handshake->new_session_ticket = 1; MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket length: %d", len ) ); if( len == 0 ) return( 0 ); #if defined(MBEDTLS_SSL_RENEGOTIATION) if( ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE ) { MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket rejected: renegotiating" ) ); return( 0 ); } #endif /* MBEDTLS_SSL_RENEGOTIATION */ /* * Failures are ok: just ignore the ticket and proceed. */ if( ( ret = ssl->conf->f_ticket_parse( ssl->conf->p_ticket, &session, buf, len ) ) != 0 ) { mbedtls_ssl_session_free( &session ); if( ret == MBEDTLS_ERR_SSL_INVALID_MAC ) MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket is not authentic" ) ); else if( ret == MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED ) MBEDTLS_SSL_DEBUG_MSG( 3, ( "ticket is expired" ) ); else MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_ticket_parse", ret ); return( 0 ); } /* * Keep the session ID sent by the client, since we MUST send it back to * inform them we're accepting the ticket (RFC 5077 section 3.4) */ session.id_len = ssl->session_negotiate->id_len; memcpy( &session.id, ssl->session_negotiate->id, session.id_len ); mbedtls_ssl_session_free( ssl->session_negotiate ); memcpy( ssl->session_negotiate, &session, sizeof( mbedtls_ssl_session ) ); /* Zeroize instead of free as we copied the content */ mbedtls_zeroize( &session, sizeof( mbedtls_ssl_session ) ); MBEDTLS_SSL_DEBUG_MSG( 3, ( "session successfully restored from ticket" ) ); ssl->handshake->resume = 1; /* Don't send a new ticket after all, this one is OK */ ssl->handshake->new_session_ticket = 0; return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %rbx subq $0x98, %rsp movq %rdx, %r14 movq %rsi, %r15 movq %rdi, %rbx movq %rsp, %rdi callq 0x16b45 movq (%rbx), %rax cmpq $0x0, 0xa8(%rax) je 0x20e27 cmpq $0x0, 0xa0(%rax) je 0x20e27 movq 0x60(%rbx), %rax movl $0x1, 0xa8c(%rax) leaq 0x2fb78(%rip), %rdx # 0x50954 leaq 0x2fa51(%rip), %r8 # 0x50834 movq %rbx, %rdi movl $0x3, %esi movl $0x1c9, %ecx # imm = 0x1C9 movq %r14, %r9 xorl %eax, %eax callq 0xf997 testq %r14, %r14 je 0x20e27 cmpl $0x0, 0xc(%rbx) je 0x20e35 leaq 0x2fb48(%rip), %rdx # 0x50954 leaq 0x300da(%rip), %r8 # 0x50eed movq %rbx, %rdi movl $0x3, %esi movl $0x1d1, %ecx # imm = 0x1D1 xorl %eax, %eax callq 0xf997 addq $0x98, %rsp popq %rbx popq %r14 popq %r15 popq %rbp retq movq (%rbx), %rax movq 0xb0(%rax), %rdi movq %rsp, %rsi movq %r15, %rdx movq %r14, %rcx callq *0xa8(%rax) testl %eax, %eax je 0x20e91 movl %eax, %ebp movq %rsp, %rdi callq 0x166fa leaq 0x2faf1(%rip), %rdx # 0x50954 cmpl $0xffff9280, %ebp # imm = 0xFFFF9280 je 0x20f14 cmpl $0xffff8e80, %ebp # imm = 0xFFFF8E80 jne 0x20f2d leaq 0x3008a(%rip), %r8 # 0x50f0c movq %rbx, %rdi movl $0x3, %esi movl $0x1df, %ecx # imm = 0x1DF jmp 0x20e20 movq 0x58(%rbx), %r14 movq 0x10(%r14), %rdx leaq 0x18(%rsp), %rdi movq %rdx, -0x8(%rdi) leaq 0x18(%r14), %rsi callq 0xf240 movq %r14, %rdi callq 0x166fa movq 0x58(%rbx), %rdi movq %rsp, %rsi movl $0x98, %edx callq 0xf240 xorl %eax, %eax movb $0x0, (%rsp,%rax) incq %rax cmpq $0x98, %rax jne 0x20ec6 leaq 0x2fa78(%rip), %rdx # 0x50954 leaq 0x3006c(%rip), %r8 # 0x50f4f movq %rbx, %rdi movl $0x3, %esi movl $0x1f5, %ecx # imm = 0x1F5 xorl %eax, %eax callq 0xf997 movq 0x60(%rbx), %rax movl $0x1, 0xa7c(%rax) movl $0x0, 0xa8c(%rax) jmp 0x20e27 leaq 0x30009(%rip), %r8 # 0x50f24 movq %rbx, %rdi movl $0x3, %esi movl $0x1e1, %ecx # imm = 0x1E1 jmp 0x20e20 leaq 0x30002(%rip), %r8 # 0x50f36 movq %rbx, %rdi movl $0x1, %esi movl $0x1e3, %ecx # imm = 0x1E3 movl %ebp, %r9d callq 0xfa82 jmp 0x20e27
/Dragonchang[P]https_client/mbedtls/library/ssl_srv.c
ssl_parse_alpn_ext
static int ssl_parse_alpn_ext( mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len ) { size_t list_len, cur_len, ours_len; const unsigned char *theirs, *start, *end; const char **ours; /* If ALPN not configured, just ignore the extension */ if( ssl->conf->alpn_list == NULL ) return( 0 ); /* * opaque ProtocolName<1..2^8-1>; * * struct { * ProtocolName protocol_name_list<2..2^16-1> * } ProtocolNameList; */ /* Min length is 2 (list_len) + 1 (name_len) + 1 (name) */ if( len < 4 ) return( MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO ); list_len = ( buf[0] << 8 ) | buf[1]; if( list_len != len - 2 ) return( MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO ); /* * Use our order of preference */ start = buf + 2; end = buf + len; for( ours = ssl->conf->alpn_list; *ours != NULL; ours++ ) { ours_len = strlen( *ours ); for( theirs = start; theirs != end; theirs += cur_len ) { /* If the list is well formed, we should get equality first */ if( theirs > end ) return( MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO ); cur_len = *theirs++; /* Empty strings MUST NOT be included */ if( cur_len == 0 ) return( MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO ); if( cur_len == ours_len && memcmp( theirs, *ours, cur_len ) == 0 ) { ssl->alpn_chosen = *ours; return( 0 ); } } } /* If we get there, no match was found */ mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL, MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL ); return( MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x18, %rsp movq (%rdi), %rax movq 0x148(%rax), %r12 xorl %ebx, %ebx testq %r12, %r12 je 0x21035 movq %rdx, %r15 movl $0xffff8700, %ebx # imm = 0xFFFF8700 cmpq $0x4, %rdx jb 0x21035 movzwl (%rsi), %eax rolw $0x8, %ax movzwl %ax, %eax leaq -0x2(%r15), %rcx cmpq %rcx, %rax jne 0x21035 movq (%r12), %rax movq %rax, (%rsp) testq %rax, %rax je 0x21012 leaq 0x2(%rsi), %rbp addq %rsi, %r15 movq %rdi, 0x8(%rsp) movq %rbp, 0x10(%rsp) movq (%rsp), %rdi callq 0xf100 movq %rax, %r13 cmpq %r15, %rbp ja 0x21035 movzbl (%rbp), %r14d testq %r14, %r14 je 0x21035 incq %rbp cmpq %r14, %r13 jne 0x20fee movq %rbp, %rdi movq (%rsp), %rsi movq %r13, %rdx callq 0xf2b0 testl %eax, %eax je 0x21023 addq %r14, %rbp cmpq %r15, %rbp jne 0x20fc4 movq 0x8(%r12), %rax addq $0x8, %r12 movq %rax, (%rsp) testq %rax, %rax movq 0x8(%rsp), %rdi movq 0x10(%rsp), %rbp jne 0x20fb8 movl $0x2, %esi movl $0x78, %edx callq 0x15727 jmp 0x21035 movq 0x8(%rsp), %rax movq (%rsp), %rcx movq %rcx, 0x178(%rax) xorl %ebx, %ebx movl %ebx, %eax addq $0x18, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/ssl_srv.c
ssl_parse_client_psk_identity
static int ssl_parse_client_psk_identity( mbedtls_ssl_context *ssl, unsigned char **p, const unsigned char *end ) { int ret = 0; size_t n; if( ssl->conf->f_psk == NULL && ( ssl->conf->psk == NULL || ssl->conf->psk_identity == NULL || ssl->conf->psk_identity_len == 0 || ssl->conf->psk_len == 0 ) ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "got no pre-shared key" ) ); return( MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED ); } /* * Receive client pre-shared key identity name */ if( *p + 2 > end ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE ); } n = ( (*p)[0] << 8 ) | (*p)[1]; *p += 2; if( n < 1 || n > 65535 || *p + n > end ) { MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) ); return( MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE ); } if( ssl->conf->f_psk != NULL ) { if( ssl->conf->f_psk( ssl->conf->p_psk, ssl, *p, n ) != 0 ) ret = MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY; } else { /* Identity is not a big secret since clients send it in the clear, * but treat it carefully anyway, just in case */ if( n != ssl->conf->psk_identity_len || mbedtls_ssl_safer_memcmp( ssl->conf->psk_identity, *p, n ) != 0 ) { ret = MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY; } } if( ret == MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY ) { MBEDTLS_SSL_DEBUG_BUF( 3, "Unknown PSK identity", *p, n ); if( ( ret = mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL, MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY ) ) != 0 ) { return( ret ); } return( MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY ); } *p += n; return( 0 ); }
pushq %r15 pushq %r14 pushq %rbx subq $0x10, %rsp movq %rsi, %r14 movq %rdi, %rbx movq (%rdi), %rax cmpq $0x0, 0x78(%rax) je 0x2153d movq (%r14), %rax leaq 0x2(%rax), %r9 cmpq %rdx, %r9 jbe 0x2158e leaq 0x2f430(%rip), %rdx # 0x50954 leaq 0x30100(%rip), %r8 # 0x5162b movq %rbx, %rdi movl $0x1, %esi movl $0xc9c, %ecx # imm = 0xC9C jmp 0x215cf cmpq $0x0, 0x128(%rax) je 0x21565 cmpq $0x0, 0x138(%rax) je 0x21565 cmpq $0x0, 0x140(%rax) je 0x21565 cmpq $0x0, 0x130(%rax) jne 0x21511 leaq 0x2f3e8(%rip), %rdx # 0x50954 leaq 0x301c8(%rip), %r8 # 0x5173b movq %rbx, %rdi movl $0x1, %esi movl $0xc93, %ecx # imm = 0xC93 xorl %eax, %eax callq 0xf997 movl $0xffff8a00, %eax # imm = 0xFFFF8A00 jmp 0x215db movzwl (%rax), %eax rolw $0x8, %ax movzwl %ax, %r15d movq %r9, (%r14) testw %r15w, %r15w sete %al leaq (%r9,%r15), %rcx cmpq %rdx, %rcx seta %cl orb %al, %cl cmpb $0x1, %cl jne 0x215e5 leaq 0x2f399(%rip), %rdx # 0x50954 leaq 0x30069(%rip), %r8 # 0x5162b movq %rbx, %rdi movl $0x1, %esi movl $0xca5, %ecx # imm = 0xCA5 xorl %eax, %eax callq 0xf997 movl $0xffff8400, %eax # imm = 0xFFFF8400 addq $0x10, %rsp popq %rbx popq %r14 popq %r15 retq movq (%rbx), %rcx movq 0x78(%rcx), %rax testq %rax, %rax je 0x2160c movq 0x80(%rcx), %rdi movq %rbx, %rsi movq %r9, %rdx movq %r15, %rcx callq *%rax movq (%r14), %r9 testl %eax, %eax jne 0x21637 jmp 0x2167e cmpq 0x140(%rcx), %r15 jne 0x21637 movq 0x138(%rcx), %rcx xorl %eax, %eax xorl %edx, %edx movb (%r9,%rdx), %sil xorb (%rcx,%rdx), %sil orb %sil, %al incq %rdx cmpq %rdx, %r15 jne 0x21620 testb %al, %al je 0x2167e movq %r15, (%rsp) leaq 0x2f312(%rip), %rdx # 0x50954 leaq 0x30108(%rip), %r8 # 0x51751 movq %rbx, %rdi movl $0x3, %esi movl $0xcbb, %ecx # imm = 0xCBB callq 0xfb06 movq %rbx, %rdi movl $0x2, %esi movl $0x73, %edx callq 0x15727 movl %eax, %ecx testl %eax, %eax movl $0xffff9380, %eax # imm = 0xFFFF9380 cmovnel %ecx, %eax jmp 0x215db addq %r15, %r9 movq %r9, (%r14) xorl %eax, %eax jmp 0x215db
/Dragonchang[P]https_client/mbedtls/library/ssl_srv.c
mbedtls_x509_crt_parse_der
int mbedtls_x509_crt_parse_der( mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen ) { int ret; mbedtls_x509_crt *crt = chain, *prev = NULL; /* * Check for valid input */ if( crt == NULL || buf == NULL ) return( MBEDTLS_ERR_X509_BAD_INPUT_DATA ); while( crt->version != 0 && crt->next != NULL ) { prev = crt; crt = crt->next; } /* * Add new certificate on the end of the chain if needed. */ if( crt->version != 0 && crt->next == NULL ) { crt->next = mbedtls_calloc( 1, sizeof( mbedtls_x509_crt ) ); if( crt->next == NULL ) return( MBEDTLS_ERR_X509_ALLOC_FAILED ); prev = crt; mbedtls_x509_crt_init( crt->next ); crt = crt->next; } if( ( ret = x509_crt_parse_der_core( crt, buf, buflen ) ) != 0 ) { if( prev ) prev->next = NULL; if( crt != chain ) mbedtls_free( crt ); return( ret ); } return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x78, %rsp testq %rdi, %rdi sete %al testq %rsi, %rsi sete %cl orb %al, %cl movl $0xffffd800, %ebp # imm = 0xFFFFD800 jne 0x219fc movq %rdx, %r15 movq %rsi, %r12 movq %rdi, %r13 cmpl $0x0, 0x30(%rdi) je 0x21925 movq %r13, %r14 movq %r14, %rbx movq 0x220(%r14), %r14 testq %r14, %r14 je 0x2192c cmpl $0x0, 0x30(%r14) jne 0x2190d jmp 0x21961 xorl %ebx, %ebx movq %r13, %r14 jmp 0x21961 movl $0x1, %edi movl $0x228, %esi # imm = 0x228 callq 0xf1d0 movq %rax, 0x220(%rbx) testq %rax, %rax je 0x21a0d movl $0x228, %edx # imm = 0x228 movq %rax, %rdi xorl %esi, %esi callq 0xf150 movq 0x220(%rbx), %r14 xorps %xmm0, %xmm0 movaps %xmm0, 0x20(%rsp) xorl %eax, %eax movq %rax, 0x30(%rsp) movaps %xmm0, 0x60(%rsp) movq %rax, 0x70(%rsp) movaps %xmm0, 0x40(%rsp) movq %rax, 0x50(%rsp) testq %r14, %r14 je 0x219da movq %r13, 0x18(%rsp) movq %rsp, %rdi movq %r12, (%rdi) leaq 0x8(%rsp), %rdx movq %r15, (%rdx) addq %r12, %r15 movq %r15, %rsi movl $0x30, %ecx callq 0x2539d movl $0xffffde80, %ebp # imm = 0xFFFFDE80 testl %eax, %eax jne 0x219cb movq 0x8(%rsp), %rbp movq (%rsp), %r13 subq %r13, %r15 cmpq %r15, %rbp jbe 0x21a14 movl $0xffffde1a, %ebp # imm = 0xFFFFDE1A movq %r14, %rdi callq 0x2387e movq 0x18(%rsp), %r13 jmp 0x219df movl $0xffffd800, %ebp # imm = 0xFFFFD800 testq %rbx, %rbx je 0x219ef movq $0x0, 0x220(%rbx) cmpq %r13, %r14 je 0x219fc movq %r14, %rdi callq 0xf030 movl %ebp, %eax addq $0x78, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq movl $0xffffd780, %ebp # imm = 0xFFFFD780 jmp 0x219fc addq %rbp, %r13 subq %r12, %r13 movq %r13, 0x8(%r14) movl $0x1, %edi movq %r13, %rsi callq 0xf1d0 movq %rax, 0x10(%r14) testq %rax, %rax je 0x21a93 movq %rax, %r15 movq %rax, %rdi movq %r12, %rsi movq %r13, %rdx callq 0xf240 movq %r13, %rax subq %rbp, %rax addq %r15, %rax movq %rsp, %rdi movq %rax, (%rdi) addq %r13, %r15 movq %rax, 0x28(%r14) leaq 0x8(%rsp), %rdx movq %r15, %rsi movl $0x30, %ecx callq 0x2539d testl %eax, %eax je 0x21a9d movl %eax, %ebp movq 0x18(%rsp), %r13 movq %r14, %rdi callq 0x2387e addl $0xffffde80, %ebp # imm = 0xFFFFDE80 jne 0x219df xorl %ebp, %ebp jmp 0x219fc movl $0xffffd780, %ebp # imm = 0xFFFFD780 jmp 0x219d3 movq %rsp, %rdi movq (%rdi), %r12 addq 0x8(%rsp), %r12 movq %r12, %rax subq 0x28(%r14), %rax movq %rax, 0x20(%r14) leaq 0x30(%r14), %rax movq %rax, 0x10(%rsp) leaq 0x38(%rsp), %rdx movq %r12, %rsi movl $0xa0, %ecx callq 0x2539d testl %eax, %eax je 0x21ae6 movl %eax, %ebp cmpl $-0x62, %eax jne 0x21b0a movq 0x10(%rsp), %rax movl $0x0, (%rax) jmp 0x21b12 movq %rsp, %rdi movq (%rdi), %r13 addq 0x38(%rsp), %r13 movq %r13, %rsi movq 0x10(%rsp), %rdx callq 0x2542e testl %eax, %eax je 0x21b47 movl %eax, %ebp addl $0xffffde00, %ebp # imm = 0xFFFFDE00 testl %ebp, %ebp jne 0x219cb leaq 0x38(%r14), %rdx movq %rsp, %rdi movq %r12, %rsi callq 0x242c8 testl %eax, %eax jne 0x21b40 leaq 0x50(%r14), %r13 movq %rsp, %rdi leaq 0x20(%rsp), %rcx movq %r12, %rsi movq %r13, %rdx callq 0x24349 testl %eax, %eax je 0x21b57 movl %eax, %ebp jmp 0x219cb cmpq %r13, (%rsp) je 0x21b12 movl $0xffffdd9a, %ebp # imm = 0xFFFFDD9A jmp 0x219cb movq 0x10(%rsp), %rdx movl (%rdx), %eax leal 0x1(%rax), %ecx movl %ecx, (%rdx) movl $0xffffda80, %ebp # imm = 0xFFFFDA80 cmpl $0x2, %eax jg 0x219cb leaq 0x210(%r14), %rdx leaq 0x214(%r14), %rcx leaq 0x218(%r14), %r8 leaq 0x20(%rsp), %rsi movq %r13, %rdi callq 0x24ae2 testl %eax, %eax jne 0x21b40 movq %rsp, %rdi movq (%rdi), %rax movq %rax, 0x78(%r14) leaq 0x8(%rsp), %rdx movq %r12, %rsi movl $0x30, %ecx callq 0x2539d testl %eax, %eax jne 0x21a71 movq %rsp, %rdi movq (%rdi), %rsi addq 0x8(%rsp), %rsi leaq 0x98(%r14), %rdx callq 0x246a4 testl %eax, %eax jne 0x21b40 movq %rsp, %rdi movq (%rdi), %rax subq 0x78(%r14), %rax movq %rax, 0x70(%r14) leaq 0x118(%r14), %rdx leaq 0x130(%r14), %rcx movq %r12, %rsi callq 0x239c6 testl %eax, %eax jne 0x21b40 movq %rsp, %rdi movq (%rdi), %rax movq %rax, 0x90(%r14) leaq 0x8(%rsp), %rdx movq %r12, %rsi movl $0x30, %ecx callq 0x2539d testl %eax, %eax jne 0x21a71 movq 0x8(%rsp), %rsi testq %rsi, %rsi je 0x21c51 movq %rsp, %rdi addq (%rdi), %rsi leaq 0xd8(%r14), %rdx callq 0x246a4 testl %eax, %eax jne 0x21b40 movq %rsp, %rdi movq (%rdi), %rax subq 0x90(%r14), %rax movq %rax, 0x88(%r14) leaq 0x148(%r14), %rdx movq %r12, %rsi callq 0x3bf86 testl %eax, %eax jne 0x21b40 movq 0x10(%rsp), %rax movl (%rax), %eax movl %eax, %ecx andl $-0x2, %ecx cmpl $0x2, %ecx jne 0x21cb3 leaq 0x158(%r14), %rdx movq %rsp, %rdi movq %r12, %rsi movl $0x1, %ecx callq 0x23a33 testl %eax, %eax jne 0x21b40 movq 0x10(%rsp), %rax movl (%rax), %eax andl $-0x2, %eax cmpl $0x2, %eax jne 0x21cfa leaq 0x170(%r14), %rdx movq %rsp, %rdi movq %r12, %rsi movl $0x2, %ecx callq 0x23a33 testl %eax, %eax jne 0x21b40 movq 0x10(%rsp), %rax cmpl $0x3, (%rax) jne 0x21cfa movq %rsp, %rdi movq %r12, %rsi movq %r14, %rdx callq 0x23a7d testl %eax, %eax jne 0x21b40 cmpq %r12, (%rsp) jne 0x219c6 movq %rsp, %rdi leaq 0x40(%rsp), %rdx leaq 0x60(%rsp), %rcx movq %r15, %rsi callq 0x24349 testl %eax, %eax jne 0x21b40 movq 0x58(%r14), %rdx movl $0xffffd980, %ebp # imm = 0xFFFFD980 cmpq 0x48(%rsp), %rdx jne 0x219cb movq 0x60(%r14), %rdi movq 0x50(%rsp), %rsi callq 0xf2b0 testl %eax, %eax jne 0x219cb movq 0x28(%rsp), %rdx cmpq 0x68(%rsp), %rdx jne 0x219cb testq %rdx, %rdx je 0x21d77 movq 0x30(%rsp), %rdi movq 0x70(%rsp), %rsi callq 0xf2b0 testl %eax, %eax jne 0x219cb leaq 0x1f8(%r14), %rdx movq %rsp, %rdi movq %r15, %rsi callq 0x24a84 testl %eax, %eax jne 0x21b40 movl $0xffffde1a, %ebp # imm = 0xFFFFDE1A cmpq %r15, (%rsp) jne 0x219cb jmp 0x21a8c
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c
mbedtls_x509_crt_parse
int mbedtls_x509_crt_parse( mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen ) { #if defined(MBEDTLS_PEM_PARSE_C) int success = 0, first_error = 0, total_failed = 0; int buf_format = MBEDTLS_X509_FORMAT_DER; #endif /* * Check for valid input */ if( chain == NULL || buf == NULL ) return( MBEDTLS_ERR_X509_BAD_INPUT_DATA ); /* * Determine buffer content. Buffer contains either one DER certificate or * one or more PEM certificates. */ #if defined(MBEDTLS_PEM_PARSE_C) if( buflen != 0 && buf[buflen - 1] == '\0' && strstr( (const char *) buf, "-----BEGIN CERTIFICATE-----" ) != NULL ) { buf_format = MBEDTLS_X509_FORMAT_PEM; } if( buf_format == MBEDTLS_X509_FORMAT_DER ) return mbedtls_x509_crt_parse_der( chain, buf, buflen ); #else return mbedtls_x509_crt_parse_der( chain, buf, buflen ); #endif #if defined(MBEDTLS_PEM_PARSE_C) if( buf_format == MBEDTLS_X509_FORMAT_PEM ) { int ret; mbedtls_pem_context pem; /* 1 rather than 0 since the terminating NULL byte is counted in */ while( buflen > 1 ) { size_t use_len; mbedtls_pem_init( &pem ); /* If we get there, we know the string is null-terminated */ ret = mbedtls_pem_read_buffer( &pem, "-----BEGIN CERTIFICATE-----", "-----END CERTIFICATE-----", buf, NULL, 0, &use_len ); if( ret == 0 ) { /* * Was PEM encoded */ buflen -= use_len; buf += use_len; } else if( ret == MBEDTLS_ERR_PEM_BAD_INPUT_DATA ) { return( ret ); } else if( ret != MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT ) { mbedtls_pem_free( &pem ); /* * PEM header and footer were found */ buflen -= use_len; buf += use_len; if( first_error == 0 ) first_error = ret; total_failed++; continue; } else break; ret = mbedtls_x509_crt_parse_der( chain, pem.buf, pem.buflen ); mbedtls_pem_free( &pem ); if( ret != 0 ) { /* * Quit parsing on a memory error */ if( ret == MBEDTLS_ERR_X509_ALLOC_FAILED ) return( ret ); if( first_error == 0 ) first_error = ret; total_failed++; continue; } success = 1; } } if( success ) return( total_failed ); else if( first_error ) return( first_error ); else return( MBEDTLS_ERR_X509_CERT_UNKNOWN_FORMAT ); #endif /* MBEDTLS_PEM_PARSE_C */ }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x48, %rsp testq %rdi, %rdi sete %al testq %rsi, %rsi sete %cl orb %al, %cl movl $0xffffd800, %eax # imm = 0xFFFFD800 je 0x21de3 addq $0x48, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq movq %rdx, %rbx movq %rsi, %r14 movq %rdi, %r15 testq %rdx, %rdx je 0x21df9 cmpb $0x0, -0x1(%r14,%rbx) je 0x21e15 movq %r15, %rdi movq %r14, %rsi movq %rbx, %rdx addq $0x48, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp jmp 0x218d4 leaq 0x33479(%rip), %rsi # 0x55295 movq %r14, %rdi callq 0xf360 testq %rax, %rax je 0x21df9 cmpq $0x1, %rbx jne 0x21e36 movl $0xffffd880, %eax # imm = 0xFFFFD880 jmp 0x21dd4 movq $0x0, 0x18(%rsp) leaq 0x30(%rsp), %r12 movl $0x0, 0x14(%rsp) movl $0x0, 0x24(%rsp) movq %r12, %rdi callq 0x3a51c leaq 0x28(%rsp), %rax movq %rax, (%rsp) movq %r12, %rdi leaq 0x33426(%rip), %rsi # 0x55295 leaq 0x3343b(%rip), %rdx # 0x552b1 movq %r14, %rcx xorl %r8d, %r8d xorl %r9d, %r9d callq 0x3a52b testl %eax, %eax je 0x21eac movl %eax, %ebp cmpl $0xffffeb80, %eax # imm = 0xFFFFEB80 je 0x21f34 cmpl $0xffffef80, %ebp # imm = 0xFFFFEF80 je 0x21f11 movq %r12, %rdi callq 0x3acf0 movq 0x28(%rsp), %r13 jmp 0x21ed9 movq 0x28(%rsp), %r13 movq 0x30(%rsp), %rsi movq 0x38(%rsp), %rdx movq %r15, %rdi callq 0x218d4 movl %eax, %ebp movq %r12, %rdi callq 0x3acf0 testl %ebp, %ebp je 0x21ef4 cmpl $0xffffd780, %ebp # imm = 0xFFFFD780 je 0x21f34 movl 0x14(%rsp), %eax testl %eax, %eax cmovel %ebp, %eax movl %eax, 0x14(%rsp) movq 0x18(%rsp), %rax incl %eax movq %rax, 0x18(%rsp) jmp 0x21efc movl $0x1, 0x24(%rsp) subq %r13, %rbx addq %r13, %r14 cmpq $0x1, %rbx leaq 0x30(%rsp), %r12 ja 0x21e54 cmpl $0x0, 0x24(%rsp) movq 0x18(%rsp), %rax jne 0x21dd4 movl 0x14(%rsp), %ecx movl %ecx, %eax testl %ecx, %ecx jne 0x21dd4 jmp 0x21e2f movl %ebp, %eax jmp 0x21dd4
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c
mbedtls_x509_crt_info
int mbedtls_x509_crt_info( char *buf, size_t size, const char *prefix, const mbedtls_x509_crt *crt ) { int ret; size_t n; char *p; char key_size_str[BEFORE_COLON]; p = buf; n = size; if( NULL == crt ) { ret = mbedtls_snprintf( p, n, "\nCertificate is uninitialised!\n" ); MBEDTLS_X509_SAFE_SNPRINTF; return( (int) ( size - n ) ); } ret = mbedtls_snprintf( p, n, "%scert. version : %d\n", prefix, crt->version ); MBEDTLS_X509_SAFE_SNPRINTF; ret = mbedtls_snprintf( p, n, "%sserial number : ", prefix ); MBEDTLS_X509_SAFE_SNPRINTF; ret = mbedtls_x509_serial_gets( p, n, &crt->serial ); MBEDTLS_X509_SAFE_SNPRINTF; ret = mbedtls_snprintf( p, n, "\n%sissuer name : ", prefix ); MBEDTLS_X509_SAFE_SNPRINTF; ret = mbedtls_x509_dn_gets( p, n, &crt->issuer ); MBEDTLS_X509_SAFE_SNPRINTF; ret = mbedtls_snprintf( p, n, "\n%ssubject name : ", prefix ); MBEDTLS_X509_SAFE_SNPRINTF; ret = mbedtls_x509_dn_gets( p, n, &crt->subject ); MBEDTLS_X509_SAFE_SNPRINTF; ret = mbedtls_snprintf( p, n, "\n%sissued on : " \ "%04d-%02d-%02d %02d:%02d:%02d", prefix, crt->valid_from.year, crt->valid_from.mon, crt->valid_from.day, crt->valid_from.hour, crt->valid_from.min, crt->valid_from.sec ); MBEDTLS_X509_SAFE_SNPRINTF; ret = mbedtls_snprintf( p, n, "\n%sexpires on : " \ "%04d-%02d-%02d %02d:%02d:%02d", prefix, crt->valid_to.year, crt->valid_to.mon, crt->valid_to.day, crt->valid_to.hour, crt->valid_to.min, crt->valid_to.sec ); MBEDTLS_X509_SAFE_SNPRINTF; ret = mbedtls_snprintf( p, n, "\n%ssigned using : ", prefix ); MBEDTLS_X509_SAFE_SNPRINTF; ret = mbedtls_x509_sig_alg_gets( p, n, &crt->sig_oid, crt->sig_pk, crt->sig_md, crt->sig_opts ); MBEDTLS_X509_SAFE_SNPRINTF; /* Key size */ if( ( ret = mbedtls_x509_key_size_helper( key_size_str, BEFORE_COLON, mbedtls_pk_get_name( &crt->pk ) ) ) != 0 ) { return( ret ); } ret = mbedtls_snprintf( p, n, "\n%s%-" BC "s: %d bits", prefix, key_size_str, (int) mbedtls_pk_get_bitlen( &crt->pk ) ); MBEDTLS_X509_SAFE_SNPRINTF; /* * Optional extensions */ if( crt->ext_types & MBEDTLS_X509_EXT_BASIC_CONSTRAINTS ) { ret = mbedtls_snprintf( p, n, "\n%sbasic constraints : CA=%s", prefix, crt->ca_istrue ? "true" : "false" ); MBEDTLS_X509_SAFE_SNPRINTF; if( crt->max_pathlen > 0 ) { ret = mbedtls_snprintf( p, n, ", max_pathlen=%d", crt->max_pathlen - 1 ); MBEDTLS_X509_SAFE_SNPRINTF; } } if( crt->ext_types & MBEDTLS_X509_EXT_SUBJECT_ALT_NAME ) { ret = mbedtls_snprintf( p, n, "\n%ssubject alt name : ", prefix ); MBEDTLS_X509_SAFE_SNPRINTF; if( ( ret = x509_info_subject_alt_name( &p, &n, &crt->subject_alt_names ) ) != 0 ) return( ret ); } if( crt->ext_types & MBEDTLS_X509_EXT_NS_CERT_TYPE ) { ret = mbedtls_snprintf( p, n, "\n%scert. type : ", prefix ); MBEDTLS_X509_SAFE_SNPRINTF; if( ( ret = x509_info_cert_type( &p, &n, crt->ns_cert_type ) ) != 0 ) return( ret ); } if( crt->ext_types & MBEDTLS_X509_EXT_KEY_USAGE ) { ret = mbedtls_snprintf( p, n, "\n%skey usage : ", prefix ); MBEDTLS_X509_SAFE_SNPRINTF; if( ( ret = x509_info_key_usage( &p, &n, crt->key_usage ) ) != 0 ) return( ret ); } if( crt->ext_types & MBEDTLS_X509_EXT_EXTENDED_KEY_USAGE ) { ret = mbedtls_snprintf( p, n, "\n%sext key usage : ", prefix ); MBEDTLS_X509_SAFE_SNPRINTF; if( ( ret = x509_info_ext_key_usage( &p, &n, &crt->ext_key_usage ) ) != 0 ) return( ret ); } ret = mbedtls_snprintf( p, n, "\n" ); MBEDTLS_X509_SAFE_SNPRINTF; return( (int) ( size - n ) ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x38, %rsp movq %rsi, %r14 movq %rdi, %r13 testq %rcx, %rcx je 0x22364 movq %rcx, %r15 movq %rdx, %r12 movl 0x30(%rcx), %r8d leaq 0x3322e(%rip), %rdx # 0x552f1 movq %r13, %rdi movq %r14, %rsi movq %r12, %rcx xorl %eax, %eax callq 0xf120 movl $0xffffd680, %ebx # imm = 0xFFFFD680 testl %eax, %eax js 0x2238f movl %eax, %eax movq %r14, %rbp subq %rax, %rbp jbe 0x2238f addq %rax, %r13 leaq 0x33213(%rip), %rdx # 0x5530b movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 leaq 0x38(%r15), %rdx movq %r13, %rdi movq %rbp, %rsi callq 0x24da7 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 leaq 0x331d8(%rip), %rdx # 0x55322 movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 leaq 0x98(%r15), %rdx movq %r13, %rdi movq %rbp, %rsi callq 0x24c0a testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 leaq 0x3319b(%rip), %rdx # 0x5533a movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 leaq 0xd8(%r15), %rdx movq %r13, %rdi movq %rbp, %rsi callq 0x24c0a testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f movq %rbp, 0x8(%rsp) addq %rax, %r13 movq %r13, (%rsp) movl 0x118(%r15), %r8d movl 0x11c(%r15), %r9d movl 0x120(%r15), %eax movq %rax, 0x18(%rsp) movl 0x124(%r15), %eax movq %rax, 0x10(%rsp) movl 0x128(%r15), %r10d movl 0x12c(%r15), %r11d leaq 0x33121(%rip), %rdx # 0x55352 movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax pushq %r11 pushq %r10 pushq 0x20(%rsp) pushq 0x30(%rsp) callq 0xf120 addq $0x20, %rsp testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 movl 0x130(%r15), %r8d movl 0x134(%r15), %r9d movl 0x138(%r15), %eax movq %rax, 0x18(%rsp) movl 0x13c(%r15), %eax movq %rax, 0x10(%rsp) movl 0x140(%r15), %r10d movl 0x144(%r15), %r11d leaq 0x330e5(%rip), %rdx # 0x55387 movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax pushq %r11 pushq %r10 pushq 0x20(%rsp) pushq 0x30(%rsp) callq 0xf120 addq $0x20, %rsp testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 leaq 0x330dd(%rip), %rdx # 0x553bc movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 leaq 0x50(%r15), %rdx movl 0x210(%r15), %r8d movl 0x214(%r15), %ecx movq 0x218(%r15), %r9 movq %r13, %rdi movq %rbp, %rsi callq 0x24e97 testl %eax, %eax js 0x2238f movl %eax, %eax movq %rax, 0x18(%rsp) subq %rax, %rbp jbe 0x2238f leaq 0x148(%r15), %rdi movq %rdi, 0x10(%rsp) callq 0x3b429 leaq 0x20(%rsp), %rdi movl $0x12, %esi movq %rax, %rdx callq 0x24fce testl %eax, %eax je 0x223a0 movl %eax, %ebx jmp 0x2238f leaq 0x32f66(%rip), %rdx # 0x552d1 movq %r13, %rdi movq %r14, %rsi xorl %eax, %eax callq 0xf120 movl %eax, %ecx cmpq %r14, %rcx movl $0xffffd680, %ebx # imm = 0xFFFFD680 cmovbl %eax, %ebx movl $0xffffd680, %ecx # imm = 0xFFFFD680 testl %eax, %eax cmovsl %ecx, %ebx movl %ebx, %eax addq $0x38, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq addq 0x18(%rsp), %r13 movq 0x10(%rsp), %rdi callq 0x3b3e3 leaq 0x3301e(%rip), %rdx # 0x553d4 leaq 0x20(%rsp), %r8 movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx movl %eax, %r9d xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 testb $0x1, 0x1c1(%r15) jne 0x22445 movl 0x1c0(%r15), %eax testb $0x20, %al jne 0x224cc btl $0x10, %eax jb 0x22530 testb $0x4, %al jne 0x22595 btl $0xb, %eax jb 0x225f9 leaq 0x3a9c4(%rip), %rdx # 0x5cddc movq %r13, %rdi movq %rbp, %rsi xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax cmpq %rbp, %rax jae 0x2238f subl %ebp, %eax addl %eax, %r14d movl %r14d, %ebx jmp 0x2238f cmpl $0x0, 0x1c4(%r15) leaq 0x32fb4(%rip), %rax # 0x55408 leaq 0x32fa8(%rip), %r8 # 0x55403 cmoveq %rax, %r8 leaq 0x32f80(%rip), %rdx # 0x553e6 movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 movl 0x1c8(%r15), %ecx testl %ecx, %ecx jle 0x223e6 decl %ecx leaq 0x32f6a(%rip), %rdx # 0x5540e movq %r13, %rdi movq %rbp, %rsi xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f addq %rax, %r13 jmp 0x223e6 leaq 0x32f4c(%rip), %rdx # 0x5541f movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f leaq 0x8(%rsp), %rsi movq %rbp, (%rsi) addq %rax, %r13 movq %rsp, %rdi movq %r13, (%rdi) leaq 0x1a0(%r15), %rdx callq 0x22659 testl %eax, %eax jne 0x22360 movl 0x1c0(%r15), %eax movq (%rsp), %r13 movq 0x8(%rsp), %rbp jmp 0x223f5 leaq 0x32f00(%rip), %rdx # 0x55437 movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f leaq 0x8(%rsp), %rsi movq %rbp, (%rsi) addq %rax, %r13 movq %rsp, %rdi movq %r13, (%rdi) movzbl 0x1f0(%r15), %edx callq 0x226fe testl %eax, %eax jne 0x22360 movl 0x1c0(%r15), %eax movq (%rsp), %r13 movq 0x8(%rsp), %rbp jmp 0x223ff leaq 0x32eb3(%rip), %rdx # 0x5544f movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f leaq 0x8(%rsp), %rsi movq %rbp, (%rsi) addq %rax, %r13 movq %rsp, %rdi movq %r13, (%rdi) movl 0x1cc(%r15), %edx callq 0x22912 testl %eax, %eax jne 0x22360 movl 0x1c0(%r15), %eax movq (%rsp), %r13 movq 0x8(%rsp), %rbp jmp 0x22407 leaq 0x32e67(%rip), %rdx # 0x55467 movq %r13, %rdi movq %rbp, %rsi movq %r12, %rcx xorl %eax, %eax callq 0xf120 testl %eax, %eax js 0x2238f movl %eax, %eax subq %rax, %rbp jbe 0x2238f leaq 0x8(%rsp), %rsi movq %rbp, (%rsi) addq %rax, %r13 movq %rsp, %rdi movq %r13, (%rdi) addq $0x1d0, %r15 # imm = 0x1D0 movq %r15, %rdx callq 0x22b56 testl %eax, %eax jne 0x22360 movq (%rsp), %r13 movq 0x8(%rsp), %rbp jmp 0x22411
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c
x509_info_key_usage
static int x509_info_key_usage( char **buf, size_t *size, unsigned int key_usage ) { int ret; size_t n = *size; char *p = *buf; const char *sep = ""; KEY_USAGE( MBEDTLS_X509_KU_DIGITAL_SIGNATURE, "Digital Signature" ); KEY_USAGE( MBEDTLS_X509_KU_NON_REPUDIATION, "Non Repudiation" ); KEY_USAGE( MBEDTLS_X509_KU_KEY_ENCIPHERMENT, "Key Encipherment" ); KEY_USAGE( MBEDTLS_X509_KU_DATA_ENCIPHERMENT, "Data Encipherment" ); KEY_USAGE( MBEDTLS_X509_KU_KEY_AGREEMENT, "Key Agreement" ); KEY_USAGE( MBEDTLS_X509_KU_KEY_CERT_SIGN, "Key Cert Sign" ); KEY_USAGE( MBEDTLS_X509_KU_CRL_SIGN, "CRL Sign" ); KEY_USAGE( MBEDTLS_X509_KU_ENCIPHER_ONLY, "Encipher Only" ); KEY_USAGE( MBEDTLS_X509_KU_DECIPHER_ONLY, "Decipher Only" ); *size = n; *buf = p; return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r12 pushq %rbx movl %edx, %ebp movq %rsi, %r14 movq %rdi, %rbx movq (%rsi), %r15 movq (%rdi), %r12 testb %bpl, %bpl js 0x22936 leaq 0x3a4be(%rip), %rcx # 0x5cdf2 jmp 0x22975 leaq 0x32be3(%rip), %rdx # 0x55520 leaq 0x3a4ae(%rip), %rcx # 0x5cdf2 movq %r12, %rdi movq %r15, %rsi xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22b4d movl %ecx, %ecx subq %rcx, %r15 jbe 0x22b4d addq %rcx, %r12 leaq 0x32b42(%rip), %rcx # 0x554b7 testb $0x40, %bpl je 0x229b3 leaq 0x32bb2(%rip), %rdx # 0x55534 movq %r12, %rdi movq %r15, %rsi xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22b4d movl %ecx, %ecx subq %rcx, %r15 jbe 0x22b4d addq %rcx, %r12 leaq 0x32b04(%rip), %rcx # 0x554b7 testb $0x20, %bpl je 0x229f1 leaq 0x32b86(%rip), %rdx # 0x55546 movq %r12, %rdi movq %r15, %rsi xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22b4d movl %ecx, %ecx subq %rcx, %r15 jbe 0x22b4d addq %rcx, %r12 leaq 0x32ac6(%rip), %rcx # 0x554b7 testb $0x10, %bpl je 0x22a2f leaq 0x32b5b(%rip), %rdx # 0x55559 movq %r12, %rdi movq %r15, %rsi xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22b4d movl %ecx, %ecx subq %rcx, %r15 jbe 0x22b4d addq %rcx, %r12 leaq 0x32a88(%rip), %rcx # 0x554b7 testb $0x8, %bpl je 0x22a6d leaq 0x32b31(%rip), %rdx # 0x5556d movq %r12, %rdi movq %r15, %rsi xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22b4d movl %ecx, %ecx subq %rcx, %r15 jbe 0x22b4d addq %rcx, %r12 leaq 0x32a4a(%rip), %rcx # 0x554b7 testb $0x4, %bpl je 0x22aab leaq 0x32b03(%rip), %rdx # 0x5557d movq %r12, %rdi movq %r15, %rsi xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22b4d movl %ecx, %ecx subq %rcx, %r15 jbe 0x22b4d addq %rcx, %r12 leaq 0x32a0c(%rip), %rcx # 0x554b7 testb $0x2, %bpl je 0x22ae1 leaq 0x32ad5(%rip), %rdx # 0x5558d movq %r12, %rdi movq %r15, %rsi xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22b4d movl %ecx, %ecx subq %rcx, %r15 jbe 0x22b4d addq %rcx, %r12 leaq 0x329d6(%rip), %rcx # 0x554b7 testb $0x1, %bpl je 0x22b17 leaq 0x32aaa(%rip), %rdx # 0x55598 movq %r12, %rdi movq %r15, %rsi xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22b4d movl %ecx, %ecx subq %rcx, %r15 jbe 0x22b4d addq %rcx, %r12 leaq 0x329a0(%rip), %rcx # 0x554b7 testw %bp, %bp jns 0x22b45 leaq 0x32a85(%rip), %rdx # 0x555a8 movq %r12, %rdi movq %r15, %rsi xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22b4d movl %ecx, %ecx subq %rcx, %r15 jbe 0x22b4d addq %rcx, %r12 movq %r15, (%r14) movq %r12, (%rbx) xorl %eax, %eax popq %rbx popq %r12 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c
mbedtls_x509_crt_verify_info
int mbedtls_x509_crt_verify_info( char *buf, size_t size, const char *prefix, uint32_t flags ) { int ret; const struct x509_crt_verify_string *cur; char *p = buf; size_t n = size; for( cur = x509_crt_verify_strings; cur->string != NULL ; cur++ ) { if( ( flags & cur->code ) == 0 ) continue; ret = mbedtls_snprintf( p, n, "%s%s\n", prefix, cur->string ); MBEDTLS_X509_SAFE_SNPRINTF; flags ^= cur->code; } if( flags != 0 ) { ret = mbedtls_snprintf( p, n, "%sUnknown reason " "(this should not happen)\n", prefix ); MBEDTLS_X509_SAFE_SNPRINTF; } return( (int) ( size - n ) ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx pushq %rax movl %ecx, %ebp movq %rdx, %r15 movq %rsi, %r14 movq %rdi, %r12 leaq 0x4cf5d(%rip), %rbx # 0x6fb80 leaq 0x32992(%rip), %r8 # 0x555bc movq %rsi, (%rsp) movl (%rbx), %r13d testl %ebp, %r13d je 0x22c65 movq %r12, %rdi movq %r14, %rsi leaq 0x3283c(%rip), %rdx # 0x5547f movq %r15, %rcx xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22ca6 movl %ecx, %ecx subq %rcx, %r14 jbe 0x22ca6 addq %rcx, %r12 xorl %r13d, %ebp movq 0x18(%rbx), %r8 addq $0x10, %rbx testq %r8, %r8 jne 0x22c2e testl %ebp, %ebp je 0x22c9f leaq 0x32808(%rip), %rdx # 0x55485 movq %r12, %rdi movq %r14, %rsi movq %r15, %rcx xorl %eax, %eax callq 0xf120 movl %eax, %ecx movl $0xffffd680, %eax # imm = 0xFFFFD680 testl %ecx, %ecx js 0x22ca6 movl %ecx, %ecx subq %rcx, %r14 jbe 0x22ca6 movq (%rsp), %rax subl %r14d, %eax addq $0x8, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c
mbedtls_x509_crt_check_extended_key_usage
int mbedtls_x509_crt_check_extended_key_usage( const mbedtls_x509_crt *crt, const char *usage_oid, size_t usage_len ) { const mbedtls_x509_sequence *cur; /* Extension is not mandatory, absent means no restriction */ if( ( crt->ext_types & MBEDTLS_X509_EXT_EXTENDED_KEY_USAGE ) == 0 ) return( 0 ); /* * Look for the requested usage (or wildcard ANY) in our list */ for( cur = &crt->ext_key_usage; cur != NULL; cur = cur->next ) { const mbedtls_x509_buf *cur_oid = &cur->buf; if( cur_oid->len == usage_len && memcmp( cur_oid->p, usage_oid, usage_len ) == 0 ) { return( 0 ); } if( MBEDTLS_OID_CMP( MBEDTLS_OID_ANY_EXTENDED_KEY_USAGE, cur_oid ) == 0 ) return( 0 ); } return( MBEDTLS_ERR_X509_BAD_INPUT_DATA ); }
pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx xorl %ebx, %ebx testb $0x8, 0x1c1(%rdi) je 0x22d4b movq %rdx, %r14 movq %rsi, %r15 movq %rdi, %r12 addq $0x1d0, %r12 # imm = 0x1D0 movq 0x8(%r12), %r13 cmpq %r14, %r13 jne 0x22d29 movq 0x10(%r12), %rdi movq %r15, %rsi movq %r14, %rdx callq 0xf2b0 testl %eax, %eax je 0x22d4b cmpq $0x4, %r13 jne 0x22d3c movq 0x10(%r12), %rax cmpl $0x251d55, (%rax) # imm = 0x251D55 je 0x22d4b movq 0x18(%r12), %r12 testq %r12, %r12 jne 0x22d0b movl $0xffffd800, %ebx # imm = 0xFFFFD800 movl %ebx, %eax popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 retq
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c
mbedtls_x509_crt_verify_with_profile
int mbedtls_x509_crt_verify_with_profile( mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const mbedtls_x509_crt_profile *profile, const char *cn, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy ) { size_t cn_len; int ret; int pathlen = 0, selfsigned = 0; mbedtls_x509_crt *parent; mbedtls_x509_name *name; mbedtls_x509_sequence *cur = NULL; mbedtls_pk_type_t pk_type; if( profile == NULL ) return( MBEDTLS_ERR_X509_BAD_INPUT_DATA ); *flags = 0; if( cn != NULL ) { name = &crt->subject; cn_len = strlen( cn ); if( crt->ext_types & MBEDTLS_X509_EXT_SUBJECT_ALT_NAME ) { cur = &crt->subject_alt_names; while( cur != NULL ) { if( cur->buf.len == cn_len && x509_memcasecmp( cn, cur->buf.p, cn_len ) == 0 ) break; if( cur->buf.len > 2 && memcmp( cur->buf.p, "*.", 2 ) == 0 && x509_check_wildcard( cn, &cur->buf ) == 0 ) { break; } cur = cur->next; } if( cur == NULL ) *flags |= MBEDTLS_X509_BADCERT_CN_MISMATCH; } else { while( name != NULL ) { if( MBEDTLS_OID_CMP( MBEDTLS_OID_AT_CN, &name->oid ) == 0 ) { if( name->val.len == cn_len && x509_memcasecmp( name->val.p, cn, cn_len ) == 0 ) break; if( name->val.len > 2 && memcmp( name->val.p, "*.", 2 ) == 0 && x509_check_wildcard( cn, &name->val ) == 0 ) break; } name = name->next; } if( name == NULL ) *flags |= MBEDTLS_X509_BADCERT_CN_MISMATCH; } } /* Check the type and size of the key */ pk_type = mbedtls_pk_get_type( &crt->pk ); if( x509_profile_check_pk_alg( profile, pk_type ) != 0 ) *flags |= MBEDTLS_X509_BADCERT_BAD_PK; if( x509_profile_check_key( profile, pk_type, &crt->pk ) != 0 ) *flags |= MBEDTLS_X509_BADCERT_BAD_KEY; /* Look for a parent in trusted CAs */ for( parent = trust_ca; parent != NULL; parent = parent->next ) { if( x509_crt_check_parent( crt, parent, 0, pathlen == 0 ) == 0 ) break; } if( parent != NULL ) { ret = x509_crt_verify_top( crt, parent, ca_crl, profile, pathlen, selfsigned, flags, f_vrfy, p_vrfy ); if( ret != 0 ) return( ret ); } else { /* Look for a parent upwards the chain */ for( parent = crt->next; parent != NULL; parent = parent->next ) if( x509_crt_check_parent( crt, parent, 0, pathlen == 0 ) == 0 ) break; /* Are we part of the chain or at the top? */ if( parent != NULL ) { ret = x509_crt_verify_child( crt, parent, trust_ca, ca_crl, profile, pathlen, selfsigned, flags, f_vrfy, p_vrfy ); if( ret != 0 ) return( ret ); } else { ret = x509_crt_verify_top( crt, trust_ca, ca_crl, profile, pathlen, selfsigned, flags, f_vrfy, p_vrfy ); if( ret != 0 ) return( ret ); } } if( *flags != 0 ) return( MBEDTLS_ERR_X509_CERT_VERIFY_FAILED ); return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x18, %rsp movq %rsi, 0x8(%rsp) testq %rcx, %rcx je 0x22ed1 movq %r9, %rbx movq %r8, %rbp movq %rcx, %r14 movq %rdi, %r13 movq %rdx, 0x10(%rsp) movl $0x0, (%r9) testq %r8, %r8 je 0x22f58 movq %rbp, %rdi callq 0xf100 movq %rax, %r15 testb $0x20, 0x1c0(%r13) jne 0x22edb leaq 0xd8(%r13), %r12 cmpq $0x3, 0x8(%r12) jne 0x22e4e movq 0x10(%r12), %rax movzwl (%rax), %ecx xorl $0x455, %ecx # imm = 0x455 movzbl 0x2(%rax), %eax xorl $0x3, %eax orw %cx, %ax je 0x22e5d movq 0x30(%r12), %r12 testq %r12, %r12 jne 0x22e2c jmp 0x22f52 movq 0x20(%r12), %rax cmpq %r15, %rax jne 0x22ea9 testq %r15, %r15 je 0x22f58 movq 0x28(%r12), %rcx xorl %edx, %edx movb (%rcx,%rdx), %sil movb (%rbp,%rdx), %dil cmpb %dil, %sil je 0x22e9c xorb %sil, %dil cmpb $0x20, %dil jne 0x22ea9 andb $-0x21, %sil addb $-0x41, %sil cmpb $0x19, %sil ja 0x22ea9 incq %rdx cmpq %rdx, %r15 jne 0x22e77 jmp 0x22f58 cmpq $0x3, %rax jb 0x22e4e movq 0x28(%r12), %rax cmpw $0x2e2a, (%rax) # imm = 0x2E2A jne 0x22e4e leaq 0x18(%r12), %rsi movq %rbp, %rdi callq 0x23066 testl %eax, %eax jne 0x22e4e jmp 0x22f58 movl $0xffffd800, %eax # imm = 0xFFFFD800 jmp 0x23057 leaq 0x1a0(%r13), %r12 movq 0x8(%r12), %rax cmpq %r15, %rax jne 0x22f27 testq %r15, %r15 je 0x22f58 movq 0x10(%r12), %rcx xorl %edx, %edx movb (%rbp,%rdx), %sil movb (%rcx,%rdx), %dil cmpb %dil, %sil je 0x22f1d xorb %sil, %dil cmpb $0x20, %dil jne 0x22f27 andb $-0x21, %sil addb $-0x41, %sil cmpb $0x19, %sil ja 0x22f27 incq %rdx cmpq %rdx, %r15 jne 0x22ef8 jmp 0x22f58 cmpq $0x3, %rax jb 0x22f48 movq 0x10(%r12), %rax cmpw $0x2e2a, (%rax) # imm = 0x2E2A jne 0x22f48 movq %rbp, %rdi movq %r12, %rsi callq 0x23066 testl %eax, %eax je 0x22f58 movq 0x18(%r12), %r12 testq %r12, %r12 jne 0x22ee2 movl $0x4, (%rbx) leaq 0x148(%r13), %r15 movq %r15, %rdi callq 0x3b442 movl 0x4(%r14), %ecx movl %eax, %edx decb %dl movzbl %dl, %edx btl %edx, %ecx jb 0x22f7b orb $-0x80, 0x1(%rbx) movq %r14, %rdi movl %eax, %esi movq %r15, %rdx callq 0x2310f testl %eax, %eax je 0x22f90 orb $0x1, 0x2(%rbx) movq 0x58(%rsp), %rbp movq 0x50(%rsp), %r12 movq %r13, %r15 cmpq $0x0, 0x8(%rsp) je 0x22fcf movq 0x8(%rsp), %r15 movq %r13, %rdi movq %r15, %rsi xorl %edx, %edx movl $0x1, %ecx callq 0x23159 testl %eax, %eax je 0x23022 movq 0x220(%r15), %r15 testq %r15, %r15 jne 0x22faa movq %r13, %r15 movq 0x220(%r15), %r15 testq %r15, %r15 je 0x23014 movq %r13, %rdi movq %r15, %rsi xorl %edx, %edx movl $0x1, %ecx callq 0x23159 testl %eax, %eax jne 0x22fcf movq %r13, %rdi movq %r15, %rsi movq 0x8(%rsp), %rdx movq 0x10(%rsp), %rcx movq %r14, %r8 xorl %r9d, %r9d pushq %rbp pushq %r12 pushq %rbx pushq $0x0 callq 0x23527 jmp 0x23043 subq $0x8, %rsp movq %r13, %rdi movq 0x10(%rsp), %rsi jmp 0x2302c subq $0x8, %rsp movq %r13, %rdi movq %r15, %rsi movq 0x18(%rsp), %rdx movq %r14, %rcx xorl %r8d, %r8d xorl %r9d, %r9d pushq %rbp pushq %r12 pushq %rbx callq 0x231f6 addq $0x20, %rsp testl %eax, %eax jne 0x23057 movl (%rbx), %ecx testl %ecx, %ecx movl $0xffffd900, %eax # imm = 0xFFFFD900 cmovel %ecx, %eax addq $0x18, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c
x509_profile_check_key
static int x509_profile_check_key( const mbedtls_x509_crt_profile *profile, mbedtls_pk_type_t pk_alg, const mbedtls_pk_context *pk ) { #if defined(MBEDTLS_RSA_C) if( pk_alg == MBEDTLS_PK_RSA || pk_alg == MBEDTLS_PK_RSASSA_PSS ) { if( mbedtls_pk_get_bitlen( pk ) >= profile->rsa_min_bitlen ) return( 0 ); return( -1 ); } #endif #if defined(MBEDTLS_ECP_C) if( pk_alg == MBEDTLS_PK_ECDSA || pk_alg == MBEDTLS_PK_ECKEY || pk_alg == MBEDTLS_PK_ECKEY_DH ) { mbedtls_ecp_group_id gid = mbedtls_pk_ec( *pk )->grp.id; if( ( profile->allowed_curves & MBEDTLS_X509_ID_FLAG( gid ) ) != 0 ) return( 0 ); return( -1 ); } #endif return( -1 ); }
pushq %rbx movq %rdi, %rbx cmpl $0x6, %esi je 0x2311d cmpl $0x1, %esi jne 0x23134 movq %rdx, %rdi callq 0x3b3e3 movq %rax, %rcx movl 0xc(%rbx), %edx xorl %eax, %eax cmpq %rdx, %rcx sbbl %eax, %eax popq %rbx retq addl $-0x2, %esi movl $0xffffffff, %eax # imm = 0xFFFFFFFF cmpl $0x2, %esi ja 0x23132 movq 0x8(%rdx), %rax movb (%rax), %al movl 0x8(%rbx), %ecx decb %al movzbl %al, %edx xorl %eax, %eax btl %edx, %ecx adcl $-0x1, %eax jmp 0x23132
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c
x509_crt_verify_top
static int x509_crt_verify_top( mbedtls_x509_crt *child, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const mbedtls_x509_crt_profile *profile, int path_cnt, int self_cnt, uint32_t *flags, int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy ) { int ret; uint32_t ca_flags = 0; int check_path_cnt; unsigned char hash[MBEDTLS_MD_MAX_SIZE]; const mbedtls_md_info_t *md_info; mbedtls_x509_crt *future_past_ca = NULL; if( mbedtls_x509_time_is_past( &child->valid_to ) ) *flags |= MBEDTLS_X509_BADCERT_EXPIRED; if( mbedtls_x509_time_is_future( &child->valid_from ) ) *flags |= MBEDTLS_X509_BADCERT_FUTURE; if( x509_profile_check_md_alg( profile, child->sig_md ) != 0 ) *flags |= MBEDTLS_X509_BADCERT_BAD_MD; if( x509_profile_check_pk_alg( profile, child->sig_pk ) != 0 ) *flags |= MBEDTLS_X509_BADCERT_BAD_PK; /* * Child is the top of the chain. Check against the trust_ca list. */ *flags |= MBEDTLS_X509_BADCERT_NOT_TRUSTED; md_info = mbedtls_md_info_from_type( child->sig_md ); if( md_info == NULL ) { /* * Cannot check 'unknown', no need to try any CA */ trust_ca = NULL; } else mbedtls_md( md_info, child->tbs.p, child->tbs.len, hash ); for( /* trust_ca */ ; trust_ca != NULL; trust_ca = trust_ca->next ) { if( x509_crt_check_parent( child, trust_ca, 1, path_cnt == 0 ) != 0 ) continue; check_path_cnt = path_cnt + 1; /* * Reduce check_path_cnt to check against if top of the chain is * the same as the trusted CA */ if( child->subject_raw.len == trust_ca->subject_raw.len && memcmp( child->subject_raw.p, trust_ca->subject_raw.p, child->issuer_raw.len ) == 0 ) { check_path_cnt--; } /* Self signed certificates do not count towards the limit */ if( trust_ca->max_pathlen > 0 && trust_ca->max_pathlen < check_path_cnt - self_cnt ) { continue; } if( mbedtls_pk_verify_ext( child->sig_pk, child->sig_opts, &trust_ca->pk, child->sig_md, hash, mbedtls_md_get_size( md_info ), child->sig.p, child->sig.len ) != 0 ) { continue; } if( mbedtls_x509_time_is_past( &trust_ca->valid_to ) || mbedtls_x509_time_is_future( &trust_ca->valid_from ) ) { if ( future_past_ca == NULL ) future_past_ca = trust_ca; continue; } break; } if( trust_ca != NULL || ( trust_ca = future_past_ca ) != NULL ) { /* * Top of chain is signed by a trusted CA */ *flags &= ~MBEDTLS_X509_BADCERT_NOT_TRUSTED; if( x509_profile_check_key( profile, child->sig_pk, &trust_ca->pk ) != 0 ) *flags |= MBEDTLS_X509_BADCERT_BAD_KEY; } /* * If top of chain is not the same as the trusted CA send a verify request * to the callback for any issues with validity and CRL presence for the * trusted CA certificate. */ if( trust_ca != NULL && ( child->subject_raw.len != trust_ca->subject_raw.len || memcmp( child->subject_raw.p, trust_ca->subject_raw.p, child->issuer_raw.len ) != 0 ) ) { #if defined(MBEDTLS_X509_CRL_PARSE_C) /* Check trusted CA's CRL for the chain's top crt */ *flags |= x509_crt_verifycrl( child, trust_ca, ca_crl, profile ); #else ((void) ca_crl); #endif if( mbedtls_x509_time_is_past( &trust_ca->valid_to ) ) ca_flags |= MBEDTLS_X509_BADCERT_EXPIRED; if( mbedtls_x509_time_is_future( &trust_ca->valid_from ) ) ca_flags |= MBEDTLS_X509_BADCERT_FUTURE; if( NULL != f_vrfy ) { if( ( ret = f_vrfy( p_vrfy, trust_ca, path_cnt + 1, &ca_flags ) ) != 0 ) { return( ret ); } } } /* Call callback on top cert */ if( NULL != f_vrfy ) { if( ( ret = f_vrfy( p_vrfy, child, path_cnt, flags ) ) != 0 ) return( ret ); } *flags |= ca_flags; return( 0 ); }
pushq %rbp pushq %r15 pushq %r14 pushq %r13 pushq %r12 pushq %rbx subq $0x88, %rsp movl %r9d, 0x2c(%rsp) movq %r8, 0x18(%rsp) movq %rcx, 0x10(%rsp) movq %rdx, 0x30(%rsp) movq %rsi, %r13 movq %rdi, %r15 movq 0xc0(%rsp), %rbx movl $0x0, 0x4(%rsp) addq $0x130, %rdi # imm = 0x130 callq 0x25002 testl %eax, %eax je 0x23244 orb $0x1, (%rbx) leaq 0x118(%r15), %rdi callq 0x250f3 movl (%rbx), %ecx testl %eax, %eax je 0x2325e orl $0x200, %ecx # imm = 0x200 movl %ecx, (%rbx) movb 0x210(%r15), %al movq 0x10(%rsp), %rdx movl (%rdx), %edx decb %al movzbl %al, %eax btl %eax, %edx jb 0x2327e orl $0x4000, %ecx # imm = 0x4000 movl %ecx, (%rbx) movb 0x214(%r15), %al movq 0x10(%rsp), %rdx movl 0x4(%rdx), %edx decb %al movzbl %al, %eax movl %ecx, %esi orl $0x8000, %esi # imm = 0x8000 btl %eax, %edx cmovbl %ecx, %esi orl $0x8, %esi movl %esi, (%rbx) movl 0x210(%r15), %edi callq 0x38cdb testq %rax, %rax je 0x234e6 movq 0x20(%r15), %rdx movq 0x28(%r15), %rsi leaq 0x40(%rsp), %rcx movq %rax, %rdi movq %rax, 0x38(%rsp) callq 0x38e72 testq %r13, %r13 je 0x234e6 xorl %ebp, %ebp movq 0x18(%rsp), %rax testl %eax, %eax sete %bpl leal 0x1(%rax), %r14d movq $0x0, 0x20(%rsp) movl %ebp, 0xc(%rsp) movl %r14d, 0x8(%rsp) movq %r15, %rdi movq %r13, %rsi movl $0x1, %edx movl %ebp, %ecx callq 0x23159 testl %eax, %eax jne 0x2340b movq 0x88(%r15), %rax movl %r14d, %ecx cmpq 0x88(%r13), %rax jne 0x23350 movq 0x70(%r15), %rdx movq 0x90(%r15), %rdi movq 0x90(%r13), %rsi callq 0xf2b0 movq 0x18(%rsp), %rcx testl %eax, %eax je 0x23350 movl %r14d, %ecx movl 0x1c8(%r13), %eax testl %eax, %eax jle 0x23367 subl 0x2c(%rsp), %ecx cmpl %ecx, %eax jl 0x2340b movl 0x210(%r15), %ebp movl 0x214(%r15), %ebx movq 0x218(%r15), %r12 leaq 0x148(%r13), %r14 movq 0x38(%rsp), %rdi callq 0x39265 movzbl %al, %r9d movl %ebx, %edi movq %r12, %rsi movq %r14, %rdx movl %ebp, %ecx leaq 0x40(%rsp), %r8 pushq 0x200(%r15) pushq 0x208(%r15) callq 0x3b160 addq $0x10, %rsp testl %eax, %eax je 0x233c9 movq 0xc0(%rsp), %rbx movl 0xc(%rsp), %ebp jmp 0x23406 leaq 0x130(%r13), %rdi callq 0x25002 testl %eax, %eax movq 0xc0(%rsp), %rbx movl 0xc(%rsp), %ebp jne 0x233f5 leaq 0x118(%r13), %rdi callq 0x250f3 testl %eax, %eax je 0x23429 movq 0x20(%rsp), %rax testq %rax, %rax cmoveq %r13, %rax movq %rax, 0x20(%rsp) movl 0x8(%rsp), %r14d movq 0x220(%r13), %r13 testq %r13, %r13 jne 0x23300 movq 0x20(%rsp), %r13 testq %r13, %r13 je 0x234e6 andb $-0x9, (%rbx) movl 0x214(%r15), %esi leaq 0x148(%r13), %rdx movq 0x10(%rsp), %rdi callq 0x2310f testl %eax, %eax je 0x2344c orb $0x1, 0x2(%rbx) movq 0x88(%r15), %rax cmpq 0x88(%r13), %rax jne 0x23477 movq 0x70(%r15), %rdx movq 0x90(%r15), %rdi movq 0x90(%r13), %rsi callq 0xf2b0 testl %eax, %eax je 0x234e6 movq %r15, %rdi movq %r13, %rsi movq 0x30(%rsp), %rdx movq 0x10(%rsp), %rcx callq 0x240d1 orl %eax, (%rbx) leaq 0x130(%r13), %rdi callq 0x25002 testl %eax, %eax je 0x234a3 orb $0x1, 0x4(%rsp) leaq 0x118(%r13), %rdi callq 0x250f3 testl %eax, %eax movq 0xc8(%rsp), %r14 je 0x234c0 orb $0x2, 0x5(%rsp) testq %r14, %r14 je 0x2350d movq 0x18(%rsp), %rax leal 0x1(%rax), %edx leaq 0x4(%rsp), %rcx movq 0xd0(%rsp), %rdi movq %r13, %rsi callq *%r14 testl %eax, %eax jne 0x23515 jmp 0x234f3 movq 0xc8(%rsp), %r14 testq %r14, %r14 je 0x2350d movq 0xd0(%rsp), %rdi movq %r15, %rsi movq 0x18(%rsp), %rdx movq %rbx, %rcx callq *%r14 testl %eax, %eax jne 0x23515 movl 0x4(%rsp), %eax orl %eax, (%rbx) xorl %eax, %eax addq $0x88, %rsp popq %rbx popq %r12 popq %r13 popq %r14 popq %r15 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c
mbedtls_x509_crt_free
void mbedtls_x509_crt_free( mbedtls_x509_crt *crt ) { mbedtls_x509_crt *cert_cur = crt; mbedtls_x509_crt *cert_prv; mbedtls_x509_name *name_cur; mbedtls_x509_name *name_prv; mbedtls_x509_sequence *seq_cur; mbedtls_x509_sequence *seq_prv; if( crt == NULL ) return; do { mbedtls_pk_free( &cert_cur->pk ); #if defined(MBEDTLS_X509_RSASSA_PSS_SUPPORT) mbedtls_free( cert_cur->sig_opts ); #endif name_cur = cert_cur->issuer.next; while( name_cur != NULL ) { name_prv = name_cur; name_cur = name_cur->next; mbedtls_zeroize( name_prv, sizeof( mbedtls_x509_name ) ); mbedtls_free( name_prv ); } name_cur = cert_cur->subject.next; while( name_cur != NULL ) { name_prv = name_cur; name_cur = name_cur->next; mbedtls_zeroize( name_prv, sizeof( mbedtls_x509_name ) ); mbedtls_free( name_prv ); } seq_cur = cert_cur->ext_key_usage.next; while( seq_cur != NULL ) { seq_prv = seq_cur; seq_cur = seq_cur->next; mbedtls_zeroize( seq_prv, sizeof( mbedtls_x509_sequence ) ); mbedtls_free( seq_prv ); } seq_cur = cert_cur->subject_alt_names.next; while( seq_cur != NULL ) { seq_prv = seq_cur; seq_cur = seq_cur->next; mbedtls_zeroize( seq_prv, sizeof( mbedtls_x509_sequence ) ); mbedtls_free( seq_prv ); } if( cert_cur->raw.p != NULL ) { mbedtls_zeroize( cert_cur->raw.p, cert_cur->raw.len ); mbedtls_free( cert_cur->raw.p ); } cert_cur = cert_cur->next; } while( cert_cur != NULL ); cert_cur = crt; do { cert_prv = cert_cur; cert_cur = cert_cur->next; mbedtls_zeroize( cert_prv, sizeof( mbedtls_x509_crt ) ); if( cert_prv != crt ) mbedtls_free( cert_prv ); } while( cert_cur != NULL ); }
testq %rdi, %rdi je 0x239c5 pushq %r15 pushq %r14 pushq %rbx movq %rdi, %rbx movq %rdi, %r14 leaq 0x148(%r14), %rdi callq 0x3afd0 movq 0x218(%r14), %rdi callq 0xf030 movq 0xc8(%r14), %rdi testq %rdi, %rdi je 0x238d6 movq 0x30(%rdi), %r15 xorl %eax, %eax movb $0x0, (%rdi,%rax) incq %rax cmpq $0x40, %rax jne 0x238bc callq 0xf030 movq %r15, %rdi testq %r15, %r15 jne 0x238b6 movq 0x108(%r14), %rdi testq %rdi, %rdi je 0x23902 movq 0x30(%rdi), %r15 xorl %eax, %eax movb $0x0, (%rdi,%rax) incq %rax cmpq $0x40, %rax jne 0x238e8 callq 0xf030 movq %r15, %rdi testq %r15, %r15 jne 0x238e2 movq 0x1e8(%r14), %rdi testq %rdi, %rdi je 0x2392e movq 0x18(%rdi), %r15 xorl %eax, %eax movb $0x0, (%rdi,%rax) incq %rax cmpq $0x20, %rax jne 0x23914 callq 0xf030 movq %r15, %rdi testq %r15, %r15 jne 0x2390e movq 0x1b8(%r14), %rdi testq %rdi, %rdi je 0x2395a movq 0x18(%rdi), %r15 xorl %eax, %eax movb $0x0, (%rdi,%rax) incq %rax cmpq $0x20, %rax jne 0x23940 callq 0xf030 movq %r15, %rdi testq %r15, %r15 jne 0x2393a movq 0x10(%r14), %rdi testq %rdi, %rdi je 0x23983 movq 0x8(%r14), %rax testq %rax, %rax je 0x2397e xorl %ecx, %ecx movb $0x0, (%rdi,%rcx) incq %rcx cmpq %rcx, %rax jne 0x2396e movq 0x10(%r14), %rdi callq 0xf030 movq 0x220(%r14), %r14 testq %r14, %r14 jne 0x23892 movq %rbx, %r14 movq %r14, %rdi movq 0x220(%r14), %r14 xorl %eax, %eax movb $0x0, (%rdi,%rax) incq %rax cmpq $0x228, %rax # imm = 0x228 jne 0x239a2 cmpq %rbx, %rdi je 0x239bb callq 0xf030 testq %r14, %r14 jne 0x23996 popq %rbx popq %r14 popq %r15 retq
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c
x509_get_uid
static int x509_get_uid( unsigned char **p, const unsigned char *end, mbedtls_x509_buf *uid, int n ) { int ret; if( *p == end ) return( 0 ); uid->tag = **p; if( ( ret = mbedtls_asn1_get_tag( p, end, &uid->len, MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | n ) ) != 0 ) { if( ret == MBEDTLS_ERR_ASN1_UNEXPECTED_TAG ) return( 0 ); return( ret ); } uid->p = *p; *p += uid->len; return( 0 ); }
pushq %rbp pushq %r14 pushq %rbx movq (%rdi), %rax xorl %ebp, %ebp cmpq %rsi, %rax je 0x23a76 movq %rdx, %rbx movq %rdi, %r14 movzbl (%rax), %eax movl %eax, (%rdx) addq $0x8, %rdx orl $0xa0, %ecx callq 0x2539d cmpl $-0x62, %eax je 0x23a76 movl %eax, %ebp testl %eax, %eax jne 0x23a76 movq (%r14), %rax movq %rax, 0x10(%rbx) addq 0x8(%rbx), %rax movq %rax, (%r14) xorl %ebp, %ebp movl %ebp, %eax popq %rbx popq %r14 popq %rbp retq
/Dragonchang[P]https_client/mbedtls/library/x509_crt.c