diff options
| author | beck <> | 2002-05-15 02:29:21 +0000 |
|---|---|---|
| committer | beck <> | 2002-05-15 02:29:21 +0000 |
| commit | b64270d1e45fe7f3241e4c9b6ce60d5ac89bc2e9 (patch) | |
| tree | fa27cf82a1250b64ed3bf5f4a18c7354d470bbcc /src/lib/libssl/ssl_stat.c | |
| parent | e471e1ea98d673597b182ea85f29e30c97cd08b5 (diff) | |
| download | openbsd-b64270d1e45fe7f3241e4c9b6ce60d5ac89bc2e9.tar.gz openbsd-b64270d1e45fe7f3241e4c9b6ce60d5ac89bc2e9.tar.bz2 openbsd-b64270d1e45fe7f3241e4c9b6ce60d5ac89bc2e9.zip | |
OpenSSL 0.9.7 stable 2002 05 08 merge
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/ssl_stat.c | 92 |
1 files changed, 70 insertions, 22 deletions
diff --git a/src/lib/libssl/ssl_stat.c b/src/lib/libssl/ssl_stat.c index 8e12461f3b..b16d253081 100644 --- a/src/lib/libssl/ssl_stat.c +++ b/src/lib/libssl/ssl_stat.c | |||
| @@ -59,9 +59,9 @@ | |||
| 59 | #include <stdio.h> | 59 | #include <stdio.h> |
| 60 | #include "ssl_locl.h" | 60 | #include "ssl_locl.h" |
| 61 | 61 | ||
| 62 | char *SSL_state_string_long(SSL *s) | 62 | const char *SSL_state_string_long(const SSL *s) |
| 63 | { | 63 | { |
| 64 | char *str; | 64 | const char *str; |
| 65 | 65 | ||
| 66 | switch (s->state) | 66 | switch (s->state) |
| 67 | { | 67 | { |
| @@ -74,7 +74,7 @@ case SSL_ST_BEFORE|SSL_ST_CONNECT: str="before/connect initialization"; break; | |||
| 74 | case SSL_ST_OK|SSL_ST_CONNECT: str="ok/connect SSL initialization"; break; | 74 | case SSL_ST_OK|SSL_ST_CONNECT: str="ok/connect SSL initialization"; break; |
| 75 | case SSL_ST_BEFORE|SSL_ST_ACCEPT: str="before/accept initialization"; break; | 75 | case SSL_ST_BEFORE|SSL_ST_ACCEPT: str="before/accept initialization"; break; |
| 76 | case SSL_ST_OK|SSL_ST_ACCEPT: str="ok/accept SSL initialization"; break; | 76 | case SSL_ST_OK|SSL_ST_ACCEPT: str="ok/accept SSL initialization"; break; |
| 77 | #ifndef NO_SSL2 | 77 | #ifndef OPENSSL_NO_SSL2 |
| 78 | case SSL2_ST_CLIENT_START_ENCRYPTION: str="SSLv2 client start encryption"; break; | 78 | case SSL2_ST_CLIENT_START_ENCRYPTION: str="SSLv2 client start encryption"; break; |
| 79 | case SSL2_ST_SERVER_START_ENCRYPTION: str="SSLv2 server start encryption"; break; | 79 | case SSL2_ST_SERVER_START_ENCRYPTION: str="SSLv2 server start encryption"; break; |
| 80 | case SSL2_ST_SEND_CLIENT_HELLO_A: str="SSLv2 write client hello A"; break; | 80 | case SSL2_ST_SEND_CLIENT_HELLO_A: str="SSLv2 write client hello A"; break; |
| @@ -115,7 +115,7 @@ case SSL2_ST_X509_GET_SERVER_CERTIFICATE: str="SSLv2 X509 read server certificat | |||
| 115 | case SSL2_ST_X509_GET_CLIENT_CERTIFICATE: str="SSLv2 X509 read client certificate"; break; | 115 | case SSL2_ST_X509_GET_CLIENT_CERTIFICATE: str="SSLv2 X509 read client certificate"; break; |
| 116 | #endif | 116 | #endif |
| 117 | 117 | ||
| 118 | #ifndef NO_SSL3 | 118 | #ifndef OPENSSL_NO_SSL3 |
| 119 | /* SSLv3 additions */ | 119 | /* SSLv3 additions */ |
| 120 | case SSL3_ST_CW_CLNT_HELLO_A: str="SSLv3 write client hello A"; break; | 120 | case SSL3_ST_CW_CLNT_HELLO_A: str="SSLv3 write client hello A"; break; |
| 121 | case SSL3_ST_CW_CLNT_HELLO_B: str="SSLv3 write client hello B"; break; | 121 | case SSL3_ST_CW_CLNT_HELLO_B: str="SSLv3 write client hello B"; break; |
| @@ -136,7 +136,7 @@ case SSL3_ST_CW_CERT_D: str="SSLv3 write client certificate D"; break; | |||
| 136 | case SSL3_ST_CW_KEY_EXCH_A: str="SSLv3 write client key exchange A"; break; | 136 | case SSL3_ST_CW_KEY_EXCH_A: str="SSLv3 write client key exchange A"; break; |
| 137 | case SSL3_ST_CW_KEY_EXCH_B: str="SSLv3 write client key exchange B"; break; | 137 | case SSL3_ST_CW_KEY_EXCH_B: str="SSLv3 write client key exchange B"; break; |
| 138 | case SSL3_ST_CW_CERT_VRFY_A: str="SSLv3 write certificate verify A"; break; | 138 | case SSL3_ST_CW_CERT_VRFY_A: str="SSLv3 write certificate verify A"; break; |
| 139 | case SSL3_ST_CW_CERT_VRFY_B: str="SSLv3 write certificate verify A"; break; | 139 | case SSL3_ST_CW_CERT_VRFY_B: str="SSLv3 write certificate verify B"; break; |
| 140 | 140 | ||
| 141 | case SSL3_ST_CW_CHANGE_A: | 141 | case SSL3_ST_CW_CHANGE_A: |
| 142 | case SSL3_ST_SW_CHANGE_A: str="SSLv3 write change cipher spec A"; break; | 142 | case SSL3_ST_SW_CHANGE_A: str="SSLv3 write change cipher spec A"; break; |
| @@ -145,7 +145,7 @@ case SSL3_ST_SW_CHANGE_B: str="SSLv3 write change cipher spec B"; break; | |||
| 145 | case SSL3_ST_CW_FINISHED_A: | 145 | case SSL3_ST_CW_FINISHED_A: |
| 146 | case SSL3_ST_SW_FINISHED_A: str="SSLv3 write finished A"; break; | 146 | case SSL3_ST_SW_FINISHED_A: str="SSLv3 write finished A"; break; |
| 147 | case SSL3_ST_CW_FINISHED_B: | 147 | case SSL3_ST_CW_FINISHED_B: |
| 148 | case SSL3_ST_SW_FINISHED_B: str="SSLv3 write finished A"; break; | 148 | case SSL3_ST_SW_FINISHED_B: str="SSLv3 write finished B"; break; |
| 149 | case SSL3_ST_CR_CHANGE_A: | 149 | case SSL3_ST_CR_CHANGE_A: |
| 150 | case SSL3_ST_SR_CHANGE_A: str="SSLv3 read change cipher spec A"; break; | 150 | case SSL3_ST_SR_CHANGE_A: str="SSLv3 read change cipher spec A"; break; |
| 151 | case SSL3_ST_CR_CHANGE_B: | 151 | case SSL3_ST_CR_CHANGE_B: |
| @@ -182,7 +182,7 @@ case SSL3_ST_SR_CERT_VRFY_A: str="SSLv3 read certificate verify A"; break; | |||
| 182 | case SSL3_ST_SR_CERT_VRFY_B: str="SSLv3 read certificate verify B"; break; | 182 | case SSL3_ST_SR_CERT_VRFY_B: str="SSLv3 read certificate verify B"; break; |
| 183 | #endif | 183 | #endif |
| 184 | 184 | ||
| 185 | #if !defined(NO_SSL2) && !defined(NO_SSL3) | 185 | #if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3) |
| 186 | /* SSLv2/v3 compatibility states */ | 186 | /* SSLv2/v3 compatibility states */ |
| 187 | /* client */ | 187 | /* client */ |
| 188 | case SSL23_ST_CW_CLNT_HELLO_A: str="SSLv2/v3 write client hello A"; break; | 188 | case SSL23_ST_CW_CLNT_HELLO_A: str="SSLv2/v3 write client hello A"; break; |
| @@ -199,9 +199,9 @@ default: str="unknown state"; break; | |||
| 199 | return(str); | 199 | return(str); |
| 200 | } | 200 | } |
| 201 | 201 | ||
| 202 | char *SSL_rstate_string_long(SSL *s) | 202 | const char *SSL_rstate_string_long(const SSL *s) |
| 203 | { | 203 | { |
| 204 | char *str; | 204 | const char *str; |
| 205 | 205 | ||
| 206 | switch (s->rstate) | 206 | switch (s->rstate) |
| 207 | { | 207 | { |
| @@ -213,9 +213,9 @@ char *SSL_rstate_string_long(SSL *s) | |||
| 213 | return(str); | 213 | return(str); |
| 214 | } | 214 | } |
| 215 | 215 | ||
| 216 | char *SSL_state_string(SSL *s) | 216 | const char *SSL_state_string(const SSL *s) |
| 217 | { | 217 | { |
| 218 | char *str; | 218 | const char *str; |
| 219 | 219 | ||
| 220 | switch (s->state) | 220 | switch (s->state) |
| 221 | { | 221 | { |
| @@ -223,7 +223,7 @@ case SSL_ST_BEFORE: str="PINIT "; break; | |||
| 223 | case SSL_ST_ACCEPT: str="AINIT "; break; | 223 | case SSL_ST_ACCEPT: str="AINIT "; break; |
| 224 | case SSL_ST_CONNECT: str="CINIT "; break; | 224 | case SSL_ST_CONNECT: str="CINIT "; break; |
| 225 | case SSL_ST_OK: str="SSLOK "; break; | 225 | case SSL_ST_OK: str="SSLOK "; break; |
| 226 | #ifndef NO_SSL2 | 226 | #ifndef OPENSSL_NO_SSL2 |
| 227 | case SSL2_ST_CLIENT_START_ENCRYPTION: str="2CSENC"; break; | 227 | case SSL2_ST_CLIENT_START_ENCRYPTION: str="2CSENC"; break; |
| 228 | case SSL2_ST_SERVER_START_ENCRYPTION: str="2SSENC"; break; | 228 | case SSL2_ST_SERVER_START_ENCRYPTION: str="2SSENC"; break; |
| 229 | case SSL2_ST_SEND_CLIENT_HELLO_A: str="2SCH_A"; break; | 229 | case SSL2_ST_SEND_CLIENT_HELLO_A: str="2SCH_A"; break; |
| @@ -264,7 +264,7 @@ case SSL2_ST_X509_GET_SERVER_CERTIFICATE: str="2X9GSC"; break; | |||
| 264 | case SSL2_ST_X509_GET_CLIENT_CERTIFICATE: str="2X9GCC"; break; | 264 | case SSL2_ST_X509_GET_CLIENT_CERTIFICATE: str="2X9GCC"; break; |
| 265 | #endif | 265 | #endif |
| 266 | 266 | ||
| 267 | #ifndef NO_SSL3 | 267 | #ifndef OPENSSL_NO_SSL3 |
| 268 | /* SSLv3 additions */ | 268 | /* SSLv3 additions */ |
| 269 | case SSL3_ST_SW_FLUSH: | 269 | case SSL3_ST_SW_FLUSH: |
| 270 | case SSL3_ST_CW_FLUSH: str="3FLUSH"; break; | 270 | case SSL3_ST_CW_FLUSH: str="3FLUSH"; break; |
| @@ -330,7 +330,7 @@ case SSL3_ST_SR_CERT_VRFY_A: str="3RCV_A"; break; | |||
| 330 | case SSL3_ST_SR_CERT_VRFY_B: str="3RCV_B"; break; | 330 | case SSL3_ST_SR_CERT_VRFY_B: str="3RCV_B"; break; |
| 331 | #endif | 331 | #endif |
| 332 | 332 | ||
| 333 | #if !defined(NO_SSL2) && !defined(NO_SSL3) | 333 | #if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3) |
| 334 | /* SSLv2/v3 compatibility states */ | 334 | /* SSLv2/v3 compatibility states */ |
| 335 | /* client */ | 335 | /* client */ |
| 336 | case SSL23_ST_CW_CLNT_HELLO_A: str="23WCHA"; break; | 336 | case SSL23_ST_CW_CLNT_HELLO_A: str="23WCHA"; break; |
| @@ -347,7 +347,7 @@ default: str="UNKWN "; break; | |||
| 347 | return(str); | 347 | return(str); |
| 348 | } | 348 | } |
| 349 | 349 | ||
| 350 | char *SSL_alert_type_string_long(int value) | 350 | const char *SSL_alert_type_string_long(int value) |
| 351 | { | 351 | { |
| 352 | value>>=8; | 352 | value>>=8; |
| 353 | if (value == SSL3_AL_WARNING) | 353 | if (value == SSL3_AL_WARNING) |
| @@ -358,7 +358,7 @@ char *SSL_alert_type_string_long(int value) | |||
| 358 | return("unknown"); | 358 | return("unknown"); |
| 359 | } | 359 | } |
| 360 | 360 | ||
| 361 | char *SSL_alert_type_string(int value) | 361 | const char *SSL_alert_type_string(int value) |
| 362 | { | 362 | { |
| 363 | value>>=8; | 363 | value>>=8; |
| 364 | if (value == SSL3_AL_WARNING) | 364 | if (value == SSL3_AL_WARNING) |
| @@ -369,9 +369,9 @@ char *SSL_alert_type_string(int value) | |||
| 369 | return("U"); | 369 | return("U"); |
| 370 | } | 370 | } |
| 371 | 371 | ||
| 372 | char *SSL_alert_desc_string(int value) | 372 | const char *SSL_alert_desc_string(int value) |
| 373 | { | 373 | { |
| 374 | char *str; | 374 | const char *str; |
| 375 | 375 | ||
| 376 | switch (value & 0xff) | 376 | switch (value & 0xff) |
| 377 | { | 377 | { |
| @@ -387,14 +387,26 @@ char *SSL_alert_desc_string(int value) | |||
| 387 | case SSL3_AD_CERTIFICATE_EXPIRED: str="CE"; break; | 387 | case SSL3_AD_CERTIFICATE_EXPIRED: str="CE"; break; |
| 388 | case SSL3_AD_CERTIFICATE_UNKNOWN: str="CU"; break; | 388 | case SSL3_AD_CERTIFICATE_UNKNOWN: str="CU"; break; |
| 389 | case SSL3_AD_ILLEGAL_PARAMETER: str="IP"; break; | 389 | case SSL3_AD_ILLEGAL_PARAMETER: str="IP"; break; |
| 390 | case TLS1_AD_DECRYPTION_FAILED: str="DC"; break; | ||
| 391 | case TLS1_AD_RECORD_OVERFLOW: str="RO"; break; | ||
| 392 | case TLS1_AD_UNKNOWN_CA: str="CA"; break; | ||
| 393 | case TLS1_AD_ACCESS_DENIED: str="AD"; break; | ||
| 394 | case TLS1_AD_DECODE_ERROR: str="DE"; break; | ||
| 395 | case TLS1_AD_DECRYPT_ERROR: str="CY"; break; | ||
| 396 | case TLS1_AD_EXPORT_RESTRICTION: str="ER"; break; | ||
| 397 | case TLS1_AD_PROTOCOL_VERSION: str="PV"; break; | ||
| 398 | case TLS1_AD_INSUFFICIENT_SECURITY: str="IS"; break; | ||
| 399 | case TLS1_AD_INTERNAL_ERROR: str="IE"; break; | ||
| 400 | case TLS1_AD_USER_CANCELLED: str="US"; break; | ||
| 401 | case TLS1_AD_NO_RENEGOTIATION: str="NR"; break; | ||
| 390 | default: str="UK"; break; | 402 | default: str="UK"; break; |
| 391 | } | 403 | } |
| 392 | return(str); | 404 | return(str); |
| 393 | } | 405 | } |
| 394 | 406 | ||
| 395 | char *SSL_alert_desc_string_long(int value) | 407 | const char *SSL_alert_desc_string_long(int value) |
| 396 | { | 408 | { |
| 397 | char *str; | 409 | const char *str; |
| 398 | 410 | ||
| 399 | switch (value & 0xff) | 411 | switch (value & 0xff) |
| 400 | { | 412 | { |
| @@ -434,14 +446,50 @@ char *SSL_alert_desc_string_long(int value) | |||
| 434 | case SSL3_AD_ILLEGAL_PARAMETER: | 446 | case SSL3_AD_ILLEGAL_PARAMETER: |
| 435 | str="illegal parameter"; | 447 | str="illegal parameter"; |
| 436 | break; | 448 | break; |
| 449 | case TLS1_AD_DECRYPTION_FAILED: | ||
| 450 | str="decryption failed"; | ||
| 451 | break; | ||
| 452 | case TLS1_AD_RECORD_OVERFLOW: | ||
| 453 | str="record overflow"; | ||
| 454 | break; | ||
| 455 | case TLS1_AD_UNKNOWN_CA: | ||
| 456 | str="unknown CA"; | ||
| 457 | break; | ||
| 458 | case TLS1_AD_ACCESS_DENIED: | ||
| 459 | str="access denied"; | ||
| 460 | break; | ||
| 461 | case TLS1_AD_DECODE_ERROR: | ||
| 462 | str="decode error"; | ||
| 463 | break; | ||
| 464 | case TLS1_AD_DECRYPT_ERROR: | ||
| 465 | str="decrypt error"; | ||
| 466 | break; | ||
| 467 | case TLS1_AD_EXPORT_RESTRICTION: | ||
| 468 | str="export restriction"; | ||
| 469 | break; | ||
| 470 | case TLS1_AD_PROTOCOL_VERSION: | ||
| 471 | str="protocol version"; | ||
| 472 | break; | ||
| 473 | case TLS1_AD_INSUFFICIENT_SECURITY: | ||
| 474 | str="insufficient security"; | ||
| 475 | break; | ||
| 476 | case TLS1_AD_INTERNAL_ERROR: | ||
| 477 | str="internal error"; | ||
| 478 | break; | ||
| 479 | case TLS1_AD_USER_CANCELLED: | ||
| 480 | str="user canceled"; | ||
| 481 | break; | ||
| 482 | case TLS1_AD_NO_RENEGOTIATION: | ||
| 483 | str="no renegotiation"; | ||
| 484 | break; | ||
| 437 | default: str="unknown"; break; | 485 | default: str="unknown"; break; |
| 438 | } | 486 | } |
| 439 | return(str); | 487 | return(str); |
| 440 | } | 488 | } |
| 441 | 489 | ||
| 442 | char *SSL_rstate_string(SSL *s) | 490 | const char *SSL_rstate_string(const SSL *s) |
| 443 | { | 491 | { |
| 444 | char *str; | 492 | const char *str; |
| 445 | 493 | ||
| 446 | switch (s->rstate) | 494 | switch (s->rstate) |
| 447 | { | 495 | { |
