diff options
author | markus <> | 2002-09-05 12:51:50 +0000 |
---|---|---|
committer | markus <> | 2002-09-05 12:51:50 +0000 |
commit | 15b5d84f9da2ce4bfae8580e56e34a859f74ad71 (patch) | |
tree | bf939e82d7fd73cc8a01cf6959002209972091bc /src/lib/libssl/ssl_stat.c | |
parent | 027351f729b9e837200dae6e1520cda6577ab930 (diff) | |
download | openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.tar.gz openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.tar.bz2 openbsd-15b5d84f9da2ce4bfae8580e56e34a859f74ad71.zip |
import openssl-0.9.7-beta1
Diffstat (limited to 'src/lib/libssl/ssl_stat.c')
-rw-r--r-- | src/lib/libssl/ssl_stat.c | 126 |
1 files changed, 85 insertions, 41 deletions
diff --git a/src/lib/libssl/ssl_stat.c b/src/lib/libssl/ssl_stat.c index a1daf25dd4..b16d253081 100644 --- a/src/lib/libssl/ssl_stat.c +++ b/src/lib/libssl/ssl_stat.c | |||
@@ -59,23 +59,22 @@ | |||
59 | #include <stdio.h> | 59 | #include <stdio.h> |
60 | #include "ssl_locl.h" | 60 | #include "ssl_locl.h" |
61 | 61 | ||
62 | char *SSL_state_string_long(s) | 62 | const char *SSL_state_string_long(const SSL *s) |
63 | SSL *s; | ||
64 | { | 63 | { |
65 | char *str; | 64 | const char *str; |
66 | 65 | ||
67 | switch (s->state) | 66 | switch (s->state) |
68 | { | 67 | { |
69 | case SSL_ST_BEFORE: str="before SSL initalisation"; break; | 68 | case SSL_ST_BEFORE: str="before SSL initialization"; break; |
70 | case SSL_ST_ACCEPT: str="before accept initalisation"; break; | 69 | case SSL_ST_ACCEPT: str="before accept initialization"; break; |
71 | case SSL_ST_CONNECT: str="before connect initalisation"; break; | 70 | case SSL_ST_CONNECT: str="before connect initialization"; break; |
72 | case SSL_ST_OK: str="SSL negotiation finished successfully"; break; | 71 | case SSL_ST_OK: str="SSL negotiation finished successfully"; break; |
73 | case SSL_ST_RENEGOTIATE: str="SSL renegotiate ciphers"; break; | 72 | case SSL_ST_RENEGOTIATE: str="SSL renegotiate ciphers"; break; |
74 | case SSL_ST_BEFORE|SSL_ST_CONNECT: str="before/connect initalisation"; break; | 73 | case SSL_ST_BEFORE|SSL_ST_CONNECT: str="before/connect initialization"; break; |
75 | case SSL_ST_OK|SSL_ST_CONNECT: str="ok/connect SSL initalisation"; break; | 74 | case SSL_ST_OK|SSL_ST_CONNECT: str="ok/connect SSL initialization"; break; |
76 | case SSL_ST_BEFORE|SSL_ST_ACCEPT: str="before/accept initalisation"; break; | 75 | case SSL_ST_BEFORE|SSL_ST_ACCEPT: str="before/accept initialization"; break; |
77 | case SSL_ST_OK|SSL_ST_ACCEPT: str="ok/accept SSL initalisation"; break; | 76 | case SSL_ST_OK|SSL_ST_ACCEPT: str="ok/accept SSL initialization"; break; |
78 | #ifndef NO_SSL2 | 77 | #ifndef OPENSSL_NO_SSL2 |
79 | case SSL2_ST_CLIENT_START_ENCRYPTION: str="SSLv2 client start encryption"; break; | 78 | case SSL2_ST_CLIENT_START_ENCRYPTION: str="SSLv2 client start encryption"; break; |
80 | case SSL2_ST_SERVER_START_ENCRYPTION: str="SSLv2 server start encryption"; break; | 79 | case SSL2_ST_SERVER_START_ENCRYPTION: str="SSLv2 server start encryption"; break; |
81 | case SSL2_ST_SEND_CLIENT_HELLO_A: str="SSLv2 write client hello A"; break; | 80 | case SSL2_ST_SEND_CLIENT_HELLO_A: str="SSLv2 write client hello A"; break; |
@@ -116,7 +115,7 @@ case SSL2_ST_X509_GET_SERVER_CERTIFICATE: str="SSLv2 X509 read server certificat | |||
116 | case SSL2_ST_X509_GET_CLIENT_CERTIFICATE: str="SSLv2 X509 read client certificate"; break; | 115 | case SSL2_ST_X509_GET_CLIENT_CERTIFICATE: str="SSLv2 X509 read client certificate"; break; |
117 | #endif | 116 | #endif |
118 | 117 | ||
119 | #ifndef NO_SSL3 | 118 | #ifndef OPENSSL_NO_SSL3 |
120 | /* SSLv3 additions */ | 119 | /* SSLv3 additions */ |
121 | case SSL3_ST_CW_CLNT_HELLO_A: str="SSLv3 write client hello A"; break; | 120 | case SSL3_ST_CW_CLNT_HELLO_A: str="SSLv3 write client hello A"; break; |
122 | case SSL3_ST_CW_CLNT_HELLO_B: str="SSLv3 write client hello B"; break; | 121 | case SSL3_ST_CW_CLNT_HELLO_B: str="SSLv3 write client hello B"; break; |
@@ -132,10 +131,12 @@ case SSL3_ST_CR_SRVR_DONE_A: str="SSLv3 read server done A"; break; | |||
132 | case SSL3_ST_CR_SRVR_DONE_B: str="SSLv3 read server done B"; break; | 131 | case SSL3_ST_CR_SRVR_DONE_B: str="SSLv3 read server done B"; break; |
133 | case SSL3_ST_CW_CERT_A: str="SSLv3 write client certificate A"; break; | 132 | case SSL3_ST_CW_CERT_A: str="SSLv3 write client certificate A"; break; |
134 | case SSL3_ST_CW_CERT_B: str="SSLv3 write client certificate B"; break; | 133 | case SSL3_ST_CW_CERT_B: str="SSLv3 write client certificate B"; break; |
134 | case SSL3_ST_CW_CERT_C: str="SSLv3 write client certificate C"; break; | ||
135 | case SSL3_ST_CW_CERT_D: str="SSLv3 write client certificate D"; break; | ||
135 | case SSL3_ST_CW_KEY_EXCH_A: str="SSLv3 write client key exchange A"; break; | 136 | case SSL3_ST_CW_KEY_EXCH_A: str="SSLv3 write client key exchange A"; break; |
136 | case SSL3_ST_CW_KEY_EXCH_B: str="SSLv3 write client key exchange B"; break; | 137 | case SSL3_ST_CW_KEY_EXCH_B: str="SSLv3 write client key exchange B"; break; |
137 | case SSL3_ST_CW_CERT_VRFY_A: str="SSLv3 write certificate verify A"; break; | 138 | case SSL3_ST_CW_CERT_VRFY_A: str="SSLv3 write certificate verify A"; break; |
138 | case SSL3_ST_CW_CERT_VRFY_B: str="SSLv3 write certificate verify A"; break; | 139 | case SSL3_ST_CW_CERT_VRFY_B: str="SSLv3 write certificate verify B"; break; |
139 | 140 | ||
140 | case SSL3_ST_CW_CHANGE_A: | 141 | case SSL3_ST_CW_CHANGE_A: |
141 | case SSL3_ST_SW_CHANGE_A: str="SSLv3 write change cipher spec A"; break; | 142 | case SSL3_ST_SW_CHANGE_A: str="SSLv3 write change cipher spec A"; break; |
@@ -144,7 +145,7 @@ case SSL3_ST_SW_CHANGE_B: str="SSLv3 write change cipher spec B"; break; | |||
144 | case SSL3_ST_CW_FINISHED_A: | 145 | case SSL3_ST_CW_FINISHED_A: |
145 | case SSL3_ST_SW_FINISHED_A: str="SSLv3 write finished A"; break; | 146 | case SSL3_ST_SW_FINISHED_A: str="SSLv3 write finished A"; break; |
146 | case SSL3_ST_CW_FINISHED_B: | 147 | case SSL3_ST_CW_FINISHED_B: |
147 | case SSL3_ST_SW_FINISHED_B: str="SSLv3 write finished A"; break; | 148 | case SSL3_ST_SW_FINISHED_B: str="SSLv3 write finished B"; break; |
148 | case SSL3_ST_CR_CHANGE_A: | 149 | case SSL3_ST_CR_CHANGE_A: |
149 | case SSL3_ST_SR_CHANGE_A: str="SSLv3 read change cipher spec A"; break; | 150 | case SSL3_ST_SR_CHANGE_A: str="SSLv3 read change cipher spec A"; break; |
150 | case SSL3_ST_CR_CHANGE_B: | 151 | case SSL3_ST_CR_CHANGE_B: |
@@ -181,8 +182,8 @@ case SSL3_ST_SR_CERT_VRFY_A: str="SSLv3 read certificate verify A"; break; | |||
181 | case SSL3_ST_SR_CERT_VRFY_B: str="SSLv3 read certificate verify B"; break; | 182 | case SSL3_ST_SR_CERT_VRFY_B: str="SSLv3 read certificate verify B"; break; |
182 | #endif | 183 | #endif |
183 | 184 | ||
184 | #if !defined(NO_SSL2) && !defined(NO_SSL3) | 185 | #if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3) |
185 | /* SSLv2/v3 compatablitity states */ | 186 | /* SSLv2/v3 compatibility states */ |
186 | /* client */ | 187 | /* client */ |
187 | case SSL23_ST_CW_CLNT_HELLO_A: str="SSLv2/v3 write client hello A"; break; | 188 | case SSL23_ST_CW_CLNT_HELLO_A: str="SSLv2/v3 write client hello A"; break; |
188 | case SSL23_ST_CW_CLNT_HELLO_B: str="SSLv2/v3 write client hello B"; break; | 189 | case SSL23_ST_CW_CLNT_HELLO_B: str="SSLv2/v3 write client hello B"; break; |
@@ -198,10 +199,9 @@ default: str="unknown state"; break; | |||
198 | return(str); | 199 | return(str); |
199 | } | 200 | } |
200 | 201 | ||
201 | char *SSL_rstate_string_long(s) | 202 | const char *SSL_rstate_string_long(const SSL *s) |
202 | SSL *s; | ||
203 | { | 203 | { |
204 | char *str; | 204 | const char *str; |
205 | 205 | ||
206 | switch (s->rstate) | 206 | switch (s->rstate) |
207 | { | 207 | { |
@@ -213,10 +213,9 @@ SSL *s; | |||
213 | return(str); | 213 | return(str); |
214 | } | 214 | } |
215 | 215 | ||
216 | char *SSL_state_string(s) | 216 | const char *SSL_state_string(const SSL *s) |
217 | SSL *s; | ||
218 | { | 217 | { |
219 | char *str; | 218 | const char *str; |
220 | 219 | ||
221 | switch (s->state) | 220 | switch (s->state) |
222 | { | 221 | { |
@@ -224,7 +223,7 @@ case SSL_ST_BEFORE: str="PINIT "; break; | |||
224 | case SSL_ST_ACCEPT: str="AINIT "; break; | 223 | case SSL_ST_ACCEPT: str="AINIT "; break; |
225 | case SSL_ST_CONNECT: str="CINIT "; break; | 224 | case SSL_ST_CONNECT: str="CINIT "; break; |
226 | case SSL_ST_OK: str="SSLOK "; break; | 225 | case SSL_ST_OK: str="SSLOK "; break; |
227 | #ifndef NO_SSL2 | 226 | #ifndef OPENSSL_NO_SSL2 |
228 | case SSL2_ST_CLIENT_START_ENCRYPTION: str="2CSENC"; break; | 227 | case SSL2_ST_CLIENT_START_ENCRYPTION: str="2CSENC"; break; |
229 | case SSL2_ST_SERVER_START_ENCRYPTION: str="2SSENC"; break; | 228 | case SSL2_ST_SERVER_START_ENCRYPTION: str="2SSENC"; break; |
230 | case SSL2_ST_SEND_CLIENT_HELLO_A: str="2SCH_A"; break; | 229 | case SSL2_ST_SEND_CLIENT_HELLO_A: str="2SCH_A"; break; |
@@ -265,7 +264,7 @@ case SSL2_ST_X509_GET_SERVER_CERTIFICATE: str="2X9GSC"; break; | |||
265 | case SSL2_ST_X509_GET_CLIENT_CERTIFICATE: str="2X9GCC"; break; | 264 | case SSL2_ST_X509_GET_CLIENT_CERTIFICATE: str="2X9GCC"; break; |
266 | #endif | 265 | #endif |
267 | 266 | ||
268 | #ifndef NO_SSL3 | 267 | #ifndef OPENSSL_NO_SSL3 |
269 | /* SSLv3 additions */ | 268 | /* SSLv3 additions */ |
270 | case SSL3_ST_SW_FLUSH: | 269 | case SSL3_ST_SW_FLUSH: |
271 | case SSL3_ST_CW_FLUSH: str="3FLUSH"; break; | 270 | case SSL3_ST_CW_FLUSH: str="3FLUSH"; break; |
@@ -283,6 +282,8 @@ case SSL3_ST_CR_SRVR_DONE_A: str="3RSD_A"; break; | |||
283 | case SSL3_ST_CR_SRVR_DONE_B: str="3RSD_B"; break; | 282 | case SSL3_ST_CR_SRVR_DONE_B: str="3RSD_B"; break; |
284 | case SSL3_ST_CW_CERT_A: str="3WCC_A"; break; | 283 | case SSL3_ST_CW_CERT_A: str="3WCC_A"; break; |
285 | case SSL3_ST_CW_CERT_B: str="3WCC_B"; break; | 284 | case SSL3_ST_CW_CERT_B: str="3WCC_B"; break; |
285 | case SSL3_ST_CW_CERT_C: str="3WCC_C"; break; | ||
286 | case SSL3_ST_CW_CERT_D: str="3WCC_D"; break; | ||
286 | case SSL3_ST_CW_KEY_EXCH_A: str="3WCKEA"; break; | 287 | case SSL3_ST_CW_KEY_EXCH_A: str="3WCKEA"; break; |
287 | case SSL3_ST_CW_KEY_EXCH_B: str="3WCKEB"; break; | 288 | case SSL3_ST_CW_KEY_EXCH_B: str="3WCKEB"; break; |
288 | case SSL3_ST_CW_CERT_VRFY_A: str="3WCV_A"; break; | 289 | case SSL3_ST_CW_CERT_VRFY_A: str="3WCV_A"; break; |
@@ -329,8 +330,8 @@ case SSL3_ST_SR_CERT_VRFY_A: str="3RCV_A"; break; | |||
329 | case SSL3_ST_SR_CERT_VRFY_B: str="3RCV_B"; break; | 330 | case SSL3_ST_SR_CERT_VRFY_B: str="3RCV_B"; break; |
330 | #endif | 331 | #endif |
331 | 332 | ||
332 | #if !defined(NO_SSL2) && !defined(NO_SSL3) | 333 | #if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3) |
333 | /* SSLv2/v3 compatablitity states */ | 334 | /* SSLv2/v3 compatibility states */ |
334 | /* client */ | 335 | /* client */ |
335 | case SSL23_ST_CW_CLNT_HELLO_A: str="23WCHA"; break; | 336 | case SSL23_ST_CW_CLNT_HELLO_A: str="23WCHA"; break; |
336 | case SSL23_ST_CW_CLNT_HELLO_B: str="23WCHB"; break; | 337 | case SSL23_ST_CW_CLNT_HELLO_B: str="23WCHB"; break; |
@@ -346,8 +347,7 @@ default: str="UNKWN "; break; | |||
346 | return(str); | 347 | return(str); |
347 | } | 348 | } |
348 | 349 | ||
349 | char *SSL_alert_type_string_long(value) | 350 | const char *SSL_alert_type_string_long(int value) |
350 | int value; | ||
351 | { | 351 | { |
352 | value>>=8; | 352 | value>>=8; |
353 | if (value == SSL3_AL_WARNING) | 353 | if (value == SSL3_AL_WARNING) |
@@ -358,8 +358,7 @@ int value; | |||
358 | return("unknown"); | 358 | return("unknown"); |
359 | } | 359 | } |
360 | 360 | ||
361 | char *SSL_alert_type_string(value) | 361 | const char *SSL_alert_type_string(int value) |
362 | int value; | ||
363 | { | 362 | { |
364 | value>>=8; | 363 | value>>=8; |
365 | if (value == SSL3_AL_WARNING) | 364 | if (value == SSL3_AL_WARNING) |
@@ -370,10 +369,9 @@ int value; | |||
370 | return("U"); | 369 | return("U"); |
371 | } | 370 | } |
372 | 371 | ||
373 | char *SSL_alert_desc_string(value) | 372 | const char *SSL_alert_desc_string(int value) |
374 | int value; | ||
375 | { | 373 | { |
376 | char *str; | 374 | const char *str; |
377 | 375 | ||
378 | switch (value & 0xff) | 376 | switch (value & 0xff) |
379 | { | 377 | { |
@@ -389,15 +387,26 @@ int value; | |||
389 | case SSL3_AD_CERTIFICATE_EXPIRED: str="CE"; break; | 387 | case SSL3_AD_CERTIFICATE_EXPIRED: str="CE"; break; |
390 | case SSL3_AD_CERTIFICATE_UNKNOWN: str="CU"; break; | 388 | case SSL3_AD_CERTIFICATE_UNKNOWN: str="CU"; break; |
391 | case SSL3_AD_ILLEGAL_PARAMETER: str="IP"; break; | 389 | case SSL3_AD_ILLEGAL_PARAMETER: str="IP"; break; |
390 | case TLS1_AD_DECRYPTION_FAILED: str="DC"; break; | ||
391 | case TLS1_AD_RECORD_OVERFLOW: str="RO"; break; | ||
392 | case TLS1_AD_UNKNOWN_CA: str="CA"; break; | ||
393 | case TLS1_AD_ACCESS_DENIED: str="AD"; break; | ||
394 | case TLS1_AD_DECODE_ERROR: str="DE"; break; | ||
395 | case TLS1_AD_DECRYPT_ERROR: str="CY"; break; | ||
396 | case TLS1_AD_EXPORT_RESTRICTION: str="ER"; break; | ||
397 | case TLS1_AD_PROTOCOL_VERSION: str="PV"; break; | ||
398 | case TLS1_AD_INSUFFICIENT_SECURITY: str="IS"; break; | ||
399 | case TLS1_AD_INTERNAL_ERROR: str="IE"; break; | ||
400 | case TLS1_AD_USER_CANCELLED: str="US"; break; | ||
401 | case TLS1_AD_NO_RENEGOTIATION: str="NR"; break; | ||
392 | default: str="UK"; break; | 402 | default: str="UK"; break; |
393 | } | 403 | } |
394 | return(str); | 404 | return(str); |
395 | } | 405 | } |
396 | 406 | ||
397 | char *SSL_alert_desc_string_long(value) | 407 | const char *SSL_alert_desc_string_long(int value) |
398 | int value; | ||
399 | { | 408 | { |
400 | char *str; | 409 | const char *str; |
401 | 410 | ||
402 | switch (value & 0xff) | 411 | switch (value & 0xff) |
403 | { | 412 | { |
@@ -405,7 +414,7 @@ int value; | |||
405 | str="close notify"; | 414 | str="close notify"; |
406 | break; | 415 | break; |
407 | case SSL3_AD_UNEXPECTED_MESSAGE: | 416 | case SSL3_AD_UNEXPECTED_MESSAGE: |
408 | str="unexected_message"; | 417 | str="unexpected_message"; |
409 | break; | 418 | break; |
410 | case SSL3_AD_BAD_RECORD_MAC: | 419 | case SSL3_AD_BAD_RECORD_MAC: |
411 | str="bad record mac"; | 420 | str="bad record mac"; |
@@ -432,20 +441,55 @@ int value; | |||
432 | str="certificate expired"; | 441 | str="certificate expired"; |
433 | break; | 442 | break; |
434 | case SSL3_AD_CERTIFICATE_UNKNOWN: | 443 | case SSL3_AD_CERTIFICATE_UNKNOWN: |
435 | str="certifcate unknown"; | 444 | str="certificate unknown"; |
436 | break; | 445 | break; |
437 | case SSL3_AD_ILLEGAL_PARAMETER: | 446 | case SSL3_AD_ILLEGAL_PARAMETER: |
438 | str="illegal parameter"; | 447 | str="illegal parameter"; |
439 | break; | 448 | break; |
449 | case TLS1_AD_DECRYPTION_FAILED: | ||
450 | str="decryption failed"; | ||
451 | break; | ||
452 | case TLS1_AD_RECORD_OVERFLOW: | ||
453 | str="record overflow"; | ||
454 | break; | ||
455 | case TLS1_AD_UNKNOWN_CA: | ||
456 | str="unknown CA"; | ||
457 | break; | ||
458 | case TLS1_AD_ACCESS_DENIED: | ||
459 | str="access denied"; | ||
460 | break; | ||
461 | case TLS1_AD_DECODE_ERROR: | ||
462 | str="decode error"; | ||
463 | break; | ||
464 | case TLS1_AD_DECRYPT_ERROR: | ||
465 | str="decrypt error"; | ||
466 | break; | ||
467 | case TLS1_AD_EXPORT_RESTRICTION: | ||
468 | str="export restriction"; | ||
469 | break; | ||
470 | case TLS1_AD_PROTOCOL_VERSION: | ||
471 | str="protocol version"; | ||
472 | break; | ||
473 | case TLS1_AD_INSUFFICIENT_SECURITY: | ||
474 | str="insufficient security"; | ||
475 | break; | ||
476 | case TLS1_AD_INTERNAL_ERROR: | ||
477 | str="internal error"; | ||
478 | break; | ||
479 | case TLS1_AD_USER_CANCELLED: | ||
480 | str="user canceled"; | ||
481 | break; | ||
482 | case TLS1_AD_NO_RENEGOTIATION: | ||
483 | str="no renegotiation"; | ||
484 | break; | ||
440 | default: str="unknown"; break; | 485 | default: str="unknown"; break; |
441 | } | 486 | } |
442 | return(str); | 487 | return(str); |
443 | } | 488 | } |
444 | 489 | ||
445 | char *SSL_rstate_string(s) | 490 | const char *SSL_rstate_string(const SSL *s) |
446 | SSL *s; | ||
447 | { | 491 | { |
448 | char *str; | 492 | const char *str; |
449 | 493 | ||
450 | switch (s->rstate) | 494 | switch (s->rstate) |
451 | { | 495 | { |