summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authortb <>2022-06-28 20:46:45 +0000
committertb <>2022-06-28 20:46:45 +0000
commit059f1daa850cffb660f52c7f39c51b96c21aca61 (patch)
tree6d8e45b754028042b169fc7856d8fafc2e751b4c /src
parent21d5a64f4aa9b1c701405993b9f00f2116882d0b (diff)
downloadopenbsd-059f1daa850cffb660f52c7f39c51b96c21aca61.tar.gz
openbsd-059f1daa850cffb660f52c7f39c51b96c21aca61.tar.bz2
openbsd-059f1daa850cffb660f52c7f39c51b96c21aca61.zip
Add security level related error codes.
ok beck jsing sthen
Diffstat (limited to 'src')
-rw-r--r--src/lib/libssl/ssl_err.c7
1 files changed, 6 insertions, 1 deletions
diff --git a/src/lib/libssl/ssl_err.c b/src/lib/libssl/ssl_err.c
index 761a3e2302..98ac620bd7 100644
--- a/src/lib/libssl/ssl_err.c
+++ b/src/lib/libssl/ssl_err.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_err.c,v 1.41 2022/06/28 20:46:05 tb Exp $ */ 1/* $OpenBSD: ssl_err.c,v 1.42 2022/06/28 20:46:45 tb Exp $ */
2/* ==================================================================== 2/* ====================================================================
3 * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. 3 * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved.
4 * 4 *
@@ -208,6 +208,8 @@ static ERR_STRING_DATA SSL_str_reasons[]= {
208 {ERR_REASON(SSL_R_BN_LIB) , "bn lib"}, 208 {ERR_REASON(SSL_R_BN_LIB) , "bn lib"},
209 {ERR_REASON(SSL_R_CA_DN_LENGTH_MISMATCH) , "ca dn length mismatch"}, 209 {ERR_REASON(SSL_R_CA_DN_LENGTH_MISMATCH) , "ca dn length mismatch"},
210 {ERR_REASON(SSL_R_CA_DN_TOO_LONG) , "ca dn too long"}, 210 {ERR_REASON(SSL_R_CA_DN_TOO_LONG) , "ca dn too long"},
211 {ERR_REASON(SSL_R_CA_KEY_TOO_SMALL) , "ca key too small"},
212 {ERR_REASON(SSL_R_CA_MD_TOO_WEAK) , "ca md too weak"},
211 {ERR_REASON(SSL_R_CCS_RECEIVED_EARLY) , "ccs received early"}, 213 {ERR_REASON(SSL_R_CCS_RECEIVED_EARLY) , "ccs received early"},
212 {ERR_REASON(SSL_R_CERTIFICATE_VERIFY_FAILED), "certificate verify failed"}, 214 {ERR_REASON(SSL_R_CERTIFICATE_VERIFY_FAILED), "certificate verify failed"},
213 {ERR_REASON(SSL_R_CERT_LENGTH_MISMATCH) , "cert length mismatch"}, 215 {ERR_REASON(SSL_R_CERT_LENGTH_MISMATCH) , "cert length mismatch"},
@@ -229,6 +231,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= {
229 {ERR_REASON(SSL_R_DATA_LENGTH_TOO_LONG) , "data length too long"}, 231 {ERR_REASON(SSL_R_DATA_LENGTH_TOO_LONG) , "data length too long"},
230 {ERR_REASON(SSL_R_DECRYPTION_FAILED) , "decryption failed"}, 232 {ERR_REASON(SSL_R_DECRYPTION_FAILED) , "decryption failed"},
231 {ERR_REASON(SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC), "decryption failed or bad record mac"}, 233 {ERR_REASON(SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC), "decryption failed or bad record mac"},
234 {ERR_REASON(SSL_R_DH_KEY_TOO_SMALL) , "dh key too small"},
232 {ERR_REASON(SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG), "dh public value length is wrong"}, 235 {ERR_REASON(SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG), "dh public value length is wrong"},
233 {ERR_REASON(SSL_R_DIGEST_CHECK_FAILED) , "digest check failed"}, 236 {ERR_REASON(SSL_R_DIGEST_CHECK_FAILED) , "digest check failed"},
234 {ERR_REASON(SSL_R_DTLS_MESSAGE_TOO_BIG) , "dtls message too big"}, 237 {ERR_REASON(SSL_R_DTLS_MESSAGE_TOO_BIG) , "dtls message too big"},
@@ -238,6 +241,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= {
238 {ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE), "ecc cert should have rsa signature"}, 241 {ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE), "ecc cert should have rsa signature"},
239 {ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE), "ecc cert should have sha1 signature"}, 242 {ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE), "ecc cert should have sha1 signature"},
240 {ERR_REASON(SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER), "ecgroup too large for cipher"}, 243 {ERR_REASON(SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER), "ecgroup too large for cipher"},
244 {ERR_REASON(SSL_R_EE_KEY_TOO_SMALL) , "ee key too small"},
241 {ERR_REASON(SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST), "empty srtp protection profile list"}, 245 {ERR_REASON(SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST), "empty srtp protection profile list"},
242 {ERR_REASON(SSL_R_ENCRYPTED_LENGTH_TOO_LONG), "encrypted length too long"}, 246 {ERR_REASON(SSL_R_ENCRYPTED_LENGTH_TOO_LONG), "encrypted length too long"},
243 {ERR_REASON(SSL_R_ERROR_GENERATING_TMP_RSA_KEY), "error generating tmp rsa key"}, 247 {ERR_REASON(SSL_R_ERROR_GENERATING_TMP_RSA_KEY), "error generating tmp rsa key"},
@@ -454,6 +458,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= {
454 {ERR_REASON(SSL_R_UNSUPPORTED_SSL_VERSION), "unsupported ssl version"}, 458 {ERR_REASON(SSL_R_UNSUPPORTED_SSL_VERSION), "unsupported ssl version"},
455 {ERR_REASON(SSL_R_UNSUPPORTED_STATUS_TYPE), "unsupported status type"}, 459 {ERR_REASON(SSL_R_UNSUPPORTED_STATUS_TYPE), "unsupported status type"},
456 {ERR_REASON(SSL_R_USE_SRTP_NOT_NEGOTIATED), "use srtp not negotiated"}, 460 {ERR_REASON(SSL_R_USE_SRTP_NOT_NEGOTIATED), "use srtp not negotiated"},
461 {ERR_REASON(SSL_R_VERSION_TOO_LOW) , "version too low"},
457 {ERR_REASON(SSL_R_WRITE_BIO_NOT_SET) , "write bio not set"}, 462 {ERR_REASON(SSL_R_WRITE_BIO_NOT_SET) , "write bio not set"},
458 {ERR_REASON(SSL_R_WRONG_CIPHER_RETURNED) , "wrong cipher returned"}, 463 {ERR_REASON(SSL_R_WRONG_CIPHER_RETURNED) , "wrong cipher returned"},
459 {ERR_REASON(SSL_R_WRONG_CURVE) , "wrong curve"}, 464 {ERR_REASON(SSL_R_WRONG_CURVE) , "wrong curve"},