diff options
author | tb <> | 2022-06-28 20:46:45 +0000 |
---|---|---|
committer | tb <> | 2022-06-28 20:46:45 +0000 |
commit | 059f1daa850cffb660f52c7f39c51b96c21aca61 (patch) | |
tree | 6d8e45b754028042b169fc7856d8fafc2e751b4c /src | |
parent | 21d5a64f4aa9b1c701405993b9f00f2116882d0b (diff) | |
download | openbsd-059f1daa850cffb660f52c7f39c51b96c21aca61.tar.gz openbsd-059f1daa850cffb660f52c7f39c51b96c21aca61.tar.bz2 openbsd-059f1daa850cffb660f52c7f39c51b96c21aca61.zip |
Add security level related error codes.
ok beck jsing sthen
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libssl/ssl_err.c | 7 |
1 files changed, 6 insertions, 1 deletions
diff --git a/src/lib/libssl/ssl_err.c b/src/lib/libssl/ssl_err.c index 761a3e2302..98ac620bd7 100644 --- a/src/lib/libssl/ssl_err.c +++ b/src/lib/libssl/ssl_err.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_err.c,v 1.41 2022/06/28 20:46:05 tb Exp $ */ | 1 | /* $OpenBSD: ssl_err.c,v 1.42 2022/06/28 20:46:45 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -208,6 +208,8 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
208 | {ERR_REASON(SSL_R_BN_LIB) , "bn lib"}, | 208 | {ERR_REASON(SSL_R_BN_LIB) , "bn lib"}, |
209 | {ERR_REASON(SSL_R_CA_DN_LENGTH_MISMATCH) , "ca dn length mismatch"}, | 209 | {ERR_REASON(SSL_R_CA_DN_LENGTH_MISMATCH) , "ca dn length mismatch"}, |
210 | {ERR_REASON(SSL_R_CA_DN_TOO_LONG) , "ca dn too long"}, | 210 | {ERR_REASON(SSL_R_CA_DN_TOO_LONG) , "ca dn too long"}, |
211 | {ERR_REASON(SSL_R_CA_KEY_TOO_SMALL) , "ca key too small"}, | ||
212 | {ERR_REASON(SSL_R_CA_MD_TOO_WEAK) , "ca md too weak"}, | ||
211 | {ERR_REASON(SSL_R_CCS_RECEIVED_EARLY) , "ccs received early"}, | 213 | {ERR_REASON(SSL_R_CCS_RECEIVED_EARLY) , "ccs received early"}, |
212 | {ERR_REASON(SSL_R_CERTIFICATE_VERIFY_FAILED), "certificate verify failed"}, | 214 | {ERR_REASON(SSL_R_CERTIFICATE_VERIFY_FAILED), "certificate verify failed"}, |
213 | {ERR_REASON(SSL_R_CERT_LENGTH_MISMATCH) , "cert length mismatch"}, | 215 | {ERR_REASON(SSL_R_CERT_LENGTH_MISMATCH) , "cert length mismatch"}, |
@@ -229,6 +231,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
229 | {ERR_REASON(SSL_R_DATA_LENGTH_TOO_LONG) , "data length too long"}, | 231 | {ERR_REASON(SSL_R_DATA_LENGTH_TOO_LONG) , "data length too long"}, |
230 | {ERR_REASON(SSL_R_DECRYPTION_FAILED) , "decryption failed"}, | 232 | {ERR_REASON(SSL_R_DECRYPTION_FAILED) , "decryption failed"}, |
231 | {ERR_REASON(SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC), "decryption failed or bad record mac"}, | 233 | {ERR_REASON(SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC), "decryption failed or bad record mac"}, |
234 | {ERR_REASON(SSL_R_DH_KEY_TOO_SMALL) , "dh key too small"}, | ||
232 | {ERR_REASON(SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG), "dh public value length is wrong"}, | 235 | {ERR_REASON(SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG), "dh public value length is wrong"}, |
233 | {ERR_REASON(SSL_R_DIGEST_CHECK_FAILED) , "digest check failed"}, | 236 | {ERR_REASON(SSL_R_DIGEST_CHECK_FAILED) , "digest check failed"}, |
234 | {ERR_REASON(SSL_R_DTLS_MESSAGE_TOO_BIG) , "dtls message too big"}, | 237 | {ERR_REASON(SSL_R_DTLS_MESSAGE_TOO_BIG) , "dtls message too big"}, |
@@ -238,6 +241,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
238 | {ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE), "ecc cert should have rsa signature"}, | 241 | {ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE), "ecc cert should have rsa signature"}, |
239 | {ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE), "ecc cert should have sha1 signature"}, | 242 | {ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE), "ecc cert should have sha1 signature"}, |
240 | {ERR_REASON(SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER), "ecgroup too large for cipher"}, | 243 | {ERR_REASON(SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER), "ecgroup too large for cipher"}, |
244 | {ERR_REASON(SSL_R_EE_KEY_TOO_SMALL) , "ee key too small"}, | ||
241 | {ERR_REASON(SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST), "empty srtp protection profile list"}, | 245 | {ERR_REASON(SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST), "empty srtp protection profile list"}, |
242 | {ERR_REASON(SSL_R_ENCRYPTED_LENGTH_TOO_LONG), "encrypted length too long"}, | 246 | {ERR_REASON(SSL_R_ENCRYPTED_LENGTH_TOO_LONG), "encrypted length too long"}, |
243 | {ERR_REASON(SSL_R_ERROR_GENERATING_TMP_RSA_KEY), "error generating tmp rsa key"}, | 247 | {ERR_REASON(SSL_R_ERROR_GENERATING_TMP_RSA_KEY), "error generating tmp rsa key"}, |
@@ -454,6 +458,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
454 | {ERR_REASON(SSL_R_UNSUPPORTED_SSL_VERSION), "unsupported ssl version"}, | 458 | {ERR_REASON(SSL_R_UNSUPPORTED_SSL_VERSION), "unsupported ssl version"}, |
455 | {ERR_REASON(SSL_R_UNSUPPORTED_STATUS_TYPE), "unsupported status type"}, | 459 | {ERR_REASON(SSL_R_UNSUPPORTED_STATUS_TYPE), "unsupported status type"}, |
456 | {ERR_REASON(SSL_R_USE_SRTP_NOT_NEGOTIATED), "use srtp not negotiated"}, | 460 | {ERR_REASON(SSL_R_USE_SRTP_NOT_NEGOTIATED), "use srtp not negotiated"}, |
461 | {ERR_REASON(SSL_R_VERSION_TOO_LOW) , "version too low"}, | ||
457 | {ERR_REASON(SSL_R_WRITE_BIO_NOT_SET) , "write bio not set"}, | 462 | {ERR_REASON(SSL_R_WRITE_BIO_NOT_SET) , "write bio not set"}, |
458 | {ERR_REASON(SSL_R_WRONG_CIPHER_RETURNED) , "wrong cipher returned"}, | 463 | {ERR_REASON(SSL_R_WRONG_CIPHER_RETURNED) , "wrong cipher returned"}, |
459 | {ERR_REASON(SSL_R_WRONG_CURVE) , "wrong curve"}, | 464 | {ERR_REASON(SSL_R_WRONG_CURVE) , "wrong curve"}, |