2237 *
2238 * Returns:
2239 * none
2240 */
2241 static void
2242 print_ciphers(SSL *ssl)
2243 {
2244 SSL_CIPHER *c;
2245 STACK_OF(SSL_CIPHER) *sk;
2246 int i;
2247 const char *name;
2248
2249 if (ssl == NULL)
2250 return;
2251
2252 sk = SSL_get_ciphers(ssl);
2253 if (sk == NULL)
2254 return;
2255
2256 for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
2257 /* LINTED */
2258 c = sk_SSL_CIPHER_value(sk, i);
2259 libbootlog(BOOTLOG_VERBOSE, "%08lx %s", c->id, c->name);
2260 }
2261 name = SSL_get_cipher_name(ssl);
2262 if (name == NULL)
2263 name = "";
2264 libbootlog(BOOTLOG_VERBOSE, "Current cipher = %s", name);
2265 }
2266
2267 /*
2268 * read_headerlines - Get the header lines from the server. This reads
2269 * lines until it gets a empty line indicating end of headers.
2270 *
2271 * ret = read_headerlines(c_id);
2272 *
2273 * Arguments:
2274 * c_id - Info about the connection being read.
2275 * bread - TRUE if the headerlines are part of the message body.
2276 *
2277 * Returns:
|
2237 *
2238 * Returns:
2239 * none
2240 */
2241 static void
2242 print_ciphers(SSL *ssl)
2243 {
2244 SSL_CIPHER *c;
2245 STACK_OF(SSL_CIPHER) *sk;
2246 int i;
2247 const char *name;
2248
2249 if (ssl == NULL)
2250 return;
2251
2252 sk = SSL_get_ciphers(ssl);
2253 if (sk == NULL)
2254 return;
2255
2256 for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
2257 c = sk_SSL_CIPHER_value(sk, i);
2258 libbootlog(BOOTLOG_VERBOSE, "%08lx %s", c->id, c->name);
2259 }
2260 name = SSL_get_cipher_name(ssl);
2261 if (name == NULL)
2262 name = "";
2263 libbootlog(BOOTLOG_VERBOSE, "Current cipher = %s", name);
2264 }
2265
2266 /*
2267 * read_headerlines - Get the header lines from the server. This reads
2268 * lines until it gets a empty line indicating end of headers.
2269 *
2270 * ret = read_headerlines(c_id);
2271 *
2272 * Arguments:
2273 * c_id - Info about the connection being read.
2274 * bread - TRUE if the headerlines are part of the message body.
2275 *
2276 * Returns:
|