Lines Matching refs:bp

40     char *bp;
50 bp = buf;
54 *bp++ = hex[(ch >> 4) & 0xf];
55 *bp++ = hex[ch & 0xf];
56 *bp++ = ' ';
62 bp = buf;
66 if (bp > buf) {
101 char *bp;
110 bp = buf;
113 *bp++ = hex[(ch >> 4) & 0xf];
114 *bp++ = hex[ch & 0xf];
115 *bp++ = ' ';
116 if (bp + 4 > buf + 50) {
117 *bp = 0;
124 bp = buf;
127 if (bp > buf) {
128 *bp = 0;
138 void ssl_DumpMsg(sslSocket *ss, unsigned char *bp, unsigned len)
140 switch (bp[0]) {
143 PrintInt(ss, "error", LEN(bp+1));
148 unsigned lcs = LEN(bp+3);
149 unsigned ls = LEN(bp+5);
150 unsigned lc = LEN(bp+7);
154 PrintInt(ss, "version (Major)", bp[1]);
155 PrintInt(ss, "version (minor)", bp[2]);
157 PrintBuf(ss, "cipher-specs", bp+9, lcs);
158 PrintBuf(ss, "session-id", bp+9+lcs, ls);
159 PrintBuf(ss, "challenge", bp+9+lcs+ls, lc);
164 unsigned lck = LEN(bp+4);
165 unsigned lek = LEN(bp+6);
166 unsigned lka = LEN(bp+8);
170 PrintInt(ss, "cipher-choice", bp[1]);
171 PrintInt(ss, "key-length", LEN(bp+2));
173 PrintBuf(ss, "clear-key", bp+10, lck);
174 PrintBuf(ss, "encrypted-key", bp+10+lck, lek);
175 PrintBuf(ss, "key-arg", bp+10+lck+lek, lka);
180 PrintBuf(ss, "connection-id", bp+1, len-1);
184 unsigned lc = LEN(bp+5);
185 unsigned lcs = LEN(bp+7);
186 unsigned lci = LEN(bp+9);
190 PrintInt(ss, "session-id-hit", bp[1]);
191 PrintInt(ss, "certificate-type", bp[2]);
192 PrintInt(ss, "version (Major)", bp[3]);
193 PrintInt(ss, "version (minor)", bp[3]);
194 PrintBuf(ss, "certificate", bp+11, lc);
195 PrintBuf(ss, "cipher-specs", bp+11+lc, lcs);
196 PrintBuf(ss, "connection-id", bp+11+lc+lcs, lci);
201 PrintBuf(ss, "challenge", bp+1, len-1);
205 PrintBuf(ss, "session-id", bp+1, len-1);
209 PrintInt(ss, "authentication-type", bp[1]);
210 PrintBuf(ss, "certificate-challenge", bp+2, len-2);
214 unsigned lc = LEN(bp+2);
215 unsigned lr = LEN(bp+4);
217 PrintInt(ss, "certificate-type", bp[1]);
218 PrintBuf(ss, "certificate", bp+6, lc);
219 PrintBuf(ss, "response", bp+6+lc, lr);
223 ssl_PrintBuf(ss, "sending *unknown* message type", bp, len);