summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_stat.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_stat.c')
-rw-r--r--src/lib/libssl/ssl_stat.c826
1 files changed, 826 insertions, 0 deletions
diff --git a/src/lib/libssl/ssl_stat.c b/src/lib/libssl/ssl_stat.c
new file mode 100644
index 0000000000..3d9371cdd7
--- /dev/null
+++ b/src/lib/libssl/ssl_stat.c
@@ -0,0 +1,826 @@
1/* ssl/ssl_stat.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58/* ====================================================================
59 * Copyright 2005 Nokia. All rights reserved.
60 *
61 * The portions of the attached software ("Contribution") is developed by
62 * Nokia Corporation and is licensed pursuant to the OpenSSL open source
63 * license.
64 *
65 * The Contribution, originally written by Mika Kousa and Pasi Eronen of
66 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
67 * support (see RFC 4279) to OpenSSL.
68 *
69 * No patent licenses or other rights except those expressly stated in
70 * the OpenSSL open source license shall be deemed granted or received
71 * expressly, by implication, estoppel, or otherwise.
72 *
73 * No assurances are provided by Nokia that the Contribution does not
74 * infringe the patent or other intellectual property rights of any third
75 * party or that the license provides you with all the necessary rights
76 * to make use of the Contribution.
77 *
78 * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
79 * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
80 * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
81 * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
82 * OTHERWISE.
83 */
84
85#include <stdio.h>
86#include "ssl_locl.h"
87
88const char
89*SSL_state_string_long(const SSL *s)
90{
91 const char *str;
92
93 switch (s->state) {
94 case SSL_ST_BEFORE:
95 str="before SSL initialization"; break;
96 case SSL_ST_ACCEPT:
97 str="before accept initialization"; break;
98 case SSL_ST_CONNECT:
99 str="before connect initialization"; break;
100 case SSL_ST_OK:
101 str="SSL negotiation finished successfully"; break;
102 case SSL_ST_RENEGOTIATE:
103 str="SSL renegotiate ciphers"; break;
104 case SSL_ST_BEFORE|SSL_ST_CONNECT:
105 str="before/connect initialization"; break;
106 case SSL_ST_OK|SSL_ST_CONNECT:
107 str="ok/connect SSL initialization"; break;
108 case SSL_ST_BEFORE|SSL_ST_ACCEPT:
109 str="before/accept initialization"; break;
110 case SSL_ST_OK|SSL_ST_ACCEPT:
111 str="ok/accept SSL initialization"; break;
112#ifndef OPENSSL_NO_SSL2
113 case SSL2_ST_CLIENT_START_ENCRYPTION:
114 str="SSLv2 client start encryption"; break;
115 case SSL2_ST_SERVER_START_ENCRYPTION:
116 str="SSLv2 server start encryption"; break;
117 case SSL2_ST_SEND_CLIENT_HELLO_A:
118 str="SSLv2 write client hello A"; break;
119 case SSL2_ST_SEND_CLIENT_HELLO_B:
120 str="SSLv2 write client hello B"; break;
121 case SSL2_ST_GET_SERVER_HELLO_A:
122 str="SSLv2 read server hello A"; break;
123 case SSL2_ST_GET_SERVER_HELLO_B:
124 str="SSLv2 read server hello B"; break;
125 case SSL2_ST_SEND_CLIENT_MASTER_KEY_A:
126 str="SSLv2 write client master key A"; break;
127 case SSL2_ST_SEND_CLIENT_MASTER_KEY_B:
128 str="SSLv2 write client master key B"; break;
129 case SSL2_ST_SEND_CLIENT_FINISHED_A:
130 str="SSLv2 write client finished A"; break;
131 case SSL2_ST_SEND_CLIENT_FINISHED_B:
132 str="SSLv2 write client finished B"; break;
133 case SSL2_ST_SEND_CLIENT_CERTIFICATE_A:
134 str="SSLv2 write client certificate A"; break;
135 case SSL2_ST_SEND_CLIENT_CERTIFICATE_B:
136 str="SSLv2 write client certificate B"; break;
137 case SSL2_ST_SEND_CLIENT_CERTIFICATE_C:
138 str="SSLv2 write client certificate C"; break;
139 case SSL2_ST_SEND_CLIENT_CERTIFICATE_D:
140 str="SSLv2 write client certificate D"; break;
141 case SSL2_ST_GET_SERVER_VERIFY_A:
142 str="SSLv2 read server verify A"; break;
143 case SSL2_ST_GET_SERVER_VERIFY_B:
144 str="SSLv2 read server verify B"; break;
145 case SSL2_ST_GET_SERVER_FINISHED_A:
146 str="SSLv2 read server finished A"; break;
147 case SSL2_ST_GET_SERVER_FINISHED_B:
148 str="SSLv2 read server finished B"; break;
149 case SSL2_ST_GET_CLIENT_HELLO_A:
150 str="SSLv2 read client hello A"; break;
151 case SSL2_ST_GET_CLIENT_HELLO_B:
152 str="SSLv2 read client hello B"; break;
153 case SSL2_ST_GET_CLIENT_HELLO_C:
154 str="SSLv2 read client hello C"; break;
155 case SSL2_ST_SEND_SERVER_HELLO_A:
156 str="SSLv2 write server hello A"; break;
157 case SSL2_ST_SEND_SERVER_HELLO_B:
158 str="SSLv2 write server hello B"; break;
159 case SSL2_ST_GET_CLIENT_MASTER_KEY_A:
160 str="SSLv2 read client master key A"; break;
161 case SSL2_ST_GET_CLIENT_MASTER_KEY_B:
162 str="SSLv2 read client master key B"; break;
163 case SSL2_ST_SEND_SERVER_VERIFY_A:
164 str="SSLv2 write server verify A"; break;
165 case SSL2_ST_SEND_SERVER_VERIFY_B:
166 str="SSLv2 write server verify B"; break;
167 case SSL2_ST_SEND_SERVER_VERIFY_C:
168 str="SSLv2 write server verify C"; break;
169 case SSL2_ST_GET_CLIENT_FINISHED_A:
170 str="SSLv2 read client finished A"; break;
171 case SSL2_ST_GET_CLIENT_FINISHED_B:
172 str="SSLv2 read client finished B"; break;
173 case SSL2_ST_SEND_SERVER_FINISHED_A:
174 str="SSLv2 write server finished A"; break;
175 case SSL2_ST_SEND_SERVER_FINISHED_B:
176 str="SSLv2 write server finished B"; break;
177 case SSL2_ST_SEND_REQUEST_CERTIFICATE_A:
178 str="SSLv2 write request certificate A"; break;
179 case SSL2_ST_SEND_REQUEST_CERTIFICATE_B:
180 str="SSLv2 write request certificate B"; break;
181 case SSL2_ST_SEND_REQUEST_CERTIFICATE_C:
182 str="SSLv2 write request certificate C"; break;
183 case SSL2_ST_SEND_REQUEST_CERTIFICATE_D:
184 str="SSLv2 write request certificate D"; break;
185 case SSL2_ST_X509_GET_SERVER_CERTIFICATE:
186 str="SSLv2 X509 read server certificate"; break;
187 case SSL2_ST_X509_GET_CLIENT_CERTIFICATE:
188 str="SSLv2 X509 read client certificate"; break;
189#endif
190
191#ifndef OPENSSL_NO_SSL3
192/* SSLv3 additions */
193 case SSL3_ST_CW_CLNT_HELLO_A:
194 str="SSLv3 write client hello A"; break;
195 case SSL3_ST_CW_CLNT_HELLO_B:
196 str="SSLv3 write client hello B"; break;
197 case SSL3_ST_CR_SRVR_HELLO_A:
198 str="SSLv3 read server hello A"; break;
199 case SSL3_ST_CR_SRVR_HELLO_B:
200 str="SSLv3 read server hello B"; break;
201 case SSL3_ST_CR_CERT_A:
202 str="SSLv3 read server certificate A"; break;
203 case SSL3_ST_CR_CERT_B:
204 str="SSLv3 read server certificate B"; break;
205 case SSL3_ST_CR_KEY_EXCH_A:
206 str="SSLv3 read server key exchange A"; break;
207 case SSL3_ST_CR_KEY_EXCH_B:
208 str="SSLv3 read server key exchange B"; break;
209 case SSL3_ST_CR_CERT_REQ_A:
210 str="SSLv3 read server certificate request A"; break;
211 case SSL3_ST_CR_CERT_REQ_B:
212 str="SSLv3 read server certificate request B"; break;
213 case SSL3_ST_CR_SESSION_TICKET_A:
214 str="SSLv3 read server session ticket A";break;
215 case SSL3_ST_CR_SESSION_TICKET_B:
216 str="SSLv3 read server session ticket B";break;
217 case SSL3_ST_CR_SRVR_DONE_A:
218 str="SSLv3 read server done A"; break;
219 case SSL3_ST_CR_SRVR_DONE_B:
220 str="SSLv3 read server done B"; break;
221 case SSL3_ST_CW_CERT_A:
222 str="SSLv3 write client certificate A"; break;
223 case SSL3_ST_CW_CERT_B:
224 str="SSLv3 write client certificate B"; break;
225 case SSL3_ST_CW_CERT_C:
226 str="SSLv3 write client certificate C"; break;
227 case SSL3_ST_CW_CERT_D:
228 str="SSLv3 write client certificate D"; break;
229 case SSL3_ST_CW_KEY_EXCH_A:
230 str="SSLv3 write client key exchange A"; break;
231 case SSL3_ST_CW_KEY_EXCH_B:
232 str="SSLv3 write client key exchange B"; break;
233 case SSL3_ST_CW_CERT_VRFY_A:
234 str="SSLv3 write certificate verify A"; break;
235 case SSL3_ST_CW_CERT_VRFY_B:
236 str="SSLv3 write certificate verify B"; break;
237
238 case SSL3_ST_CW_CHANGE_A:
239 case SSL3_ST_SW_CHANGE_A:
240 str="SSLv3 write change cipher spec A"; break;
241 case SSL3_ST_CW_CHANGE_B:
242 case SSL3_ST_SW_CHANGE_B:
243 str="SSLv3 write change cipher spec B"; break;
244 case SSL3_ST_CW_FINISHED_A:
245 case SSL3_ST_SW_FINISHED_A:
246 str="SSLv3 write finished A"; break;
247 case SSL3_ST_CW_FINISHED_B:
248 case SSL3_ST_SW_FINISHED_B:
249 str="SSLv3 write finished B"; break;
250 case SSL3_ST_CR_CHANGE_A:
251 case SSL3_ST_SR_CHANGE_A:
252 str="SSLv3 read change cipher spec A"; break;
253 case SSL3_ST_CR_CHANGE_B:
254 case SSL3_ST_SR_CHANGE_B:
255 str="SSLv3 read change cipher spec B"; break;
256 case SSL3_ST_CR_FINISHED_A:
257 case SSL3_ST_SR_FINISHED_A:
258 str="SSLv3 read finished A"; break;
259 case SSL3_ST_CR_FINISHED_B:
260 case SSL3_ST_SR_FINISHED_B:
261 str="SSLv3 read finished B"; break;
262
263 case SSL3_ST_CW_FLUSH:
264 case SSL3_ST_SW_FLUSH:
265 str="SSLv3 flush data"; break;
266
267 case SSL3_ST_SR_CLNT_HELLO_A:
268 str="SSLv3 read client hello A"; break;
269 case SSL3_ST_SR_CLNT_HELLO_B:
270 str="SSLv3 read client hello B"; break;
271 case SSL3_ST_SR_CLNT_HELLO_C:
272 str="SSLv3 read client hello C"; break;
273 case SSL3_ST_SW_HELLO_REQ_A:
274 str="SSLv3 write hello request A"; break;
275 case SSL3_ST_SW_HELLO_REQ_B:
276 str="SSLv3 write hello request B"; break;
277 case SSL3_ST_SW_HELLO_REQ_C:
278 str="SSLv3 write hello request C"; break;
279 case SSL3_ST_SW_SRVR_HELLO_A:
280 str="SSLv3 write server hello A"; break;
281 case SSL3_ST_SW_SRVR_HELLO_B:
282 str="SSLv3 write server hello B"; break;
283 case SSL3_ST_SW_CERT_A:
284 str="SSLv3 write certificate A"; break;
285 case SSL3_ST_SW_CERT_B:
286 str="SSLv3 write certificate B"; break;
287 case SSL3_ST_SW_KEY_EXCH_A:
288 str="SSLv3 write key exchange A"; break;
289 case SSL3_ST_SW_KEY_EXCH_B:
290 str="SSLv3 write key exchange B"; break;
291 case SSL3_ST_SW_CERT_REQ_A:
292 str="SSLv3 write certificate request A"; break;
293 case SSL3_ST_SW_CERT_REQ_B:
294 str="SSLv3 write certificate request B"; break;
295 case SSL3_ST_SW_SESSION_TICKET_A:
296 str="SSLv3 write session ticket A"; break;
297 case SSL3_ST_SW_SESSION_TICKET_B:
298 str="SSLv3 write session ticket B"; break;
299 case SSL3_ST_SW_SRVR_DONE_A:
300 str="SSLv3 write server done A"; break;
301 case SSL3_ST_SW_SRVR_DONE_B:
302 str="SSLv3 write server done B"; break;
303 case SSL3_ST_SR_CERT_A:
304 str="SSLv3 read client certificate A"; break;
305 case SSL3_ST_SR_CERT_B:
306 str="SSLv3 read client certificate B"; break;
307 case SSL3_ST_SR_KEY_EXCH_A:
308 str="SSLv3 read client key exchange A"; break;
309 case SSL3_ST_SR_KEY_EXCH_B:
310 str="SSLv3 read client key exchange B"; break;
311 case SSL3_ST_SR_CERT_VRFY_A:
312 str="SSLv3 read certificate verify A"; break;
313 case SSL3_ST_SR_CERT_VRFY_B:
314 str="SSLv3 read certificate verify B"; break;
315#endif
316
317#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
318/* SSLv2/v3 compatibility states */
319/* client */
320 case SSL23_ST_CW_CLNT_HELLO_A:
321 str="SSLv2/v3 write client hello A"; break;
322 case SSL23_ST_CW_CLNT_HELLO_B:
323 str="SSLv2/v3 write client hello B"; break;
324 case SSL23_ST_CR_SRVR_HELLO_A:
325 str="SSLv2/v3 read server hello A"; break;
326 case SSL23_ST_CR_SRVR_HELLO_B:
327 str="SSLv2/v3 read server hello B"; break;
328/* server */
329 case SSL23_ST_SR_CLNT_HELLO_A:
330 str="SSLv2/v3 read client hello A"; break;
331 case SSL23_ST_SR_CLNT_HELLO_B:
332 str="SSLv2/v3 read client hello B"; break;
333#endif
334
335/* DTLS */
336 case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A:
337 str="DTLS1 read hello verify request A"; break;
338 case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_B:
339 str="DTLS1 read hello verify request B"; break;
340 case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A:
341 str="DTLS1 write hello verify request A"; break;
342 case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B:
343 str="DTLS1 write hello verify request B"; break;
344
345 default:
346 str="unknown state"; break;
347 }
348 return (str);
349}
350
351const char
352*SSL_rstate_string_long(const SSL *s)
353{
354 const char *str;
355
356 switch (s->rstate) {
357 case SSL_ST_READ_HEADER:
358 str="read header"; break;
359 case SSL_ST_READ_BODY:
360 str="read body"; break;
361 case SSL_ST_READ_DONE:
362 str="read done"; break;
363 default:
364 str="unknown"; break;
365 }
366 return (str);
367}
368
369const char
370*SSL_state_string(const SSL *s)
371{
372 const char *str;
373
374 switch (s->state) {
375 case SSL_ST_BEFORE:
376 str="PINIT "; break;
377 case SSL_ST_ACCEPT:
378 str="AINIT "; break;
379 case SSL_ST_CONNECT:
380 str="CINIT "; break;
381 case SSL_ST_OK:
382 str="SSLOK "; break;
383#ifndef OPENSSL_NO_SSL2
384 case SSL2_ST_CLIENT_START_ENCRYPTION:
385 str="2CSENC"; break;
386 case SSL2_ST_SERVER_START_ENCRYPTION:
387 str="2SSENC"; break;
388 case SSL2_ST_SEND_CLIENT_HELLO_A:
389 str="2SCH_A"; break;
390 case SSL2_ST_SEND_CLIENT_HELLO_B:
391 str="2SCH_B"; break;
392 case SSL2_ST_GET_SERVER_HELLO_A:
393 str="2GSH_A"; break;
394 case SSL2_ST_GET_SERVER_HELLO_B:
395 str="2GSH_B"; break;
396 case SSL2_ST_SEND_CLIENT_MASTER_KEY_A:
397 str="2SCMKA"; break;
398 case SSL2_ST_SEND_CLIENT_MASTER_KEY_B:
399 str="2SCMKB"; break;
400 case SSL2_ST_SEND_CLIENT_FINISHED_A:
401 str="2SCF_A"; break;
402 case SSL2_ST_SEND_CLIENT_FINISHED_B:
403 str="2SCF_B"; break;
404 case SSL2_ST_SEND_CLIENT_CERTIFICATE_A:
405 str="2SCC_A"; break;
406 case SSL2_ST_SEND_CLIENT_CERTIFICATE_B:
407 str="2SCC_B"; break;
408 case SSL2_ST_SEND_CLIENT_CERTIFICATE_C:
409 str="2SCC_C"; break;
410 case SSL2_ST_SEND_CLIENT_CERTIFICATE_D:
411 str="2SCC_D"; break;
412 case SSL2_ST_GET_SERVER_VERIFY_A:
413 str="2GSV_A"; break;
414 case SSL2_ST_GET_SERVER_VERIFY_B:
415 str="2GSV_B"; break;
416 case SSL2_ST_GET_SERVER_FINISHED_A:
417 str="2GSF_A"; break;
418 case SSL2_ST_GET_SERVER_FINISHED_B:
419 str="2GSF_B"; break;
420 case SSL2_ST_GET_CLIENT_HELLO_A:
421 str="2GCH_A"; break;
422 case SSL2_ST_GET_CLIENT_HELLO_B:
423 str="2GCH_B"; break;
424 case SSL2_ST_GET_CLIENT_HELLO_C:
425 str="2GCH_C"; break;
426 case SSL2_ST_SEND_SERVER_HELLO_A:
427 str="2SSH_A"; break;
428 case SSL2_ST_SEND_SERVER_HELLO_B:
429 str="2SSH_B"; break;
430 case SSL2_ST_GET_CLIENT_MASTER_KEY_A:
431 str="2GCMKA"; break;
432 case SSL2_ST_GET_CLIENT_MASTER_KEY_B:
433 str="2GCMKA"; break;
434 case SSL2_ST_SEND_SERVER_VERIFY_A:
435 str="2SSV_A"; break;
436 case SSL2_ST_SEND_SERVER_VERIFY_B:
437 str="2SSV_B"; break;
438 case SSL2_ST_SEND_SERVER_VERIFY_C:
439 str="2SSV_C"; break;
440 case SSL2_ST_GET_CLIENT_FINISHED_A:
441 str="2GCF_A"; break;
442 case SSL2_ST_GET_CLIENT_FINISHED_B:
443 str="2GCF_B"; break;
444 case SSL2_ST_SEND_SERVER_FINISHED_A:
445 str="2SSF_A"; break;
446 case SSL2_ST_SEND_SERVER_FINISHED_B:
447 str="2SSF_B"; break;
448 case SSL2_ST_SEND_REQUEST_CERTIFICATE_A:
449 str="2SRC_A"; break;
450 case SSL2_ST_SEND_REQUEST_CERTIFICATE_B:
451 str="2SRC_B"; break;
452 case SSL2_ST_SEND_REQUEST_CERTIFICATE_C:
453 str="2SRC_C"; break;
454 case SSL2_ST_SEND_REQUEST_CERTIFICATE_D:
455 str="2SRC_D"; break;
456 case SSL2_ST_X509_GET_SERVER_CERTIFICATE:
457 str="2X9GSC"; break;
458 case SSL2_ST_X509_GET_CLIENT_CERTIFICATE:
459 str="2X9GCC"; break;
460#endif
461
462#ifndef OPENSSL_NO_SSL3
463/* SSLv3 additions */
464 case SSL3_ST_SW_FLUSH:
465 case SSL3_ST_CW_FLUSH:
466 str="3FLUSH"; break;
467 case SSL3_ST_CW_CLNT_HELLO_A:
468 str="3WCH_A"; break;
469 case SSL3_ST_CW_CLNT_HELLO_B:
470 str="3WCH_B"; break;
471 case SSL3_ST_CR_SRVR_HELLO_A:
472 str="3RSH_A"; break;
473 case SSL3_ST_CR_SRVR_HELLO_B:
474 str="3RSH_B"; break;
475 case SSL3_ST_CR_CERT_A:
476 str="3RSC_A"; break;
477 case SSL3_ST_CR_CERT_B:
478 str="3RSC_B"; break;
479 case SSL3_ST_CR_KEY_EXCH_A:
480 str="3RSKEA"; break;
481 case SSL3_ST_CR_KEY_EXCH_B:
482 str="3RSKEB"; break;
483 case SSL3_ST_CR_CERT_REQ_A:
484 str="3RCR_A"; break;
485 case SSL3_ST_CR_CERT_REQ_B:
486 str="3RCR_B"; break;
487 case SSL3_ST_CR_SRVR_DONE_A:
488 str="3RSD_A"; break;
489 case SSL3_ST_CR_SRVR_DONE_B:
490 str="3RSD_B"; break;
491 case SSL3_ST_CW_CERT_A:
492 str="3WCC_A"; break;
493 case SSL3_ST_CW_CERT_B:
494 str="3WCC_B"; break;
495 case SSL3_ST_CW_CERT_C:
496 str="3WCC_C"; break;
497 case SSL3_ST_CW_CERT_D:
498 str="3WCC_D"; break;
499 case SSL3_ST_CW_KEY_EXCH_A:
500 str="3WCKEA"; break;
501 case SSL3_ST_CW_KEY_EXCH_B:
502 str="3WCKEB"; break;
503 case SSL3_ST_CW_CERT_VRFY_A:
504 str="3WCV_A"; break;
505 case SSL3_ST_CW_CERT_VRFY_B:
506 str="3WCV_B"; break;
507
508 case SSL3_ST_SW_CHANGE_A:
509 case SSL3_ST_CW_CHANGE_A:
510 str="3WCCSA"; break;
511 case SSL3_ST_SW_CHANGE_B:
512 case SSL3_ST_CW_CHANGE_B:
513 str="3WCCSB"; break;
514 case SSL3_ST_SW_FINISHED_A:
515 case SSL3_ST_CW_FINISHED_A:
516 str="3WFINA"; break;
517 case SSL3_ST_SW_FINISHED_B:
518 case SSL3_ST_CW_FINISHED_B:
519 str="3WFINB"; break;
520 case SSL3_ST_SR_CHANGE_A:
521 case SSL3_ST_CR_CHANGE_A:
522 str="3RCCSA"; break;
523 case SSL3_ST_SR_CHANGE_B:
524 case SSL3_ST_CR_CHANGE_B:
525 str="3RCCSB"; break;
526 case SSL3_ST_SR_FINISHED_A:
527 case SSL3_ST_CR_FINISHED_A:
528 str="3RFINA"; break;
529 case SSL3_ST_SR_FINISHED_B:
530 case SSL3_ST_CR_FINISHED_B:
531 str="3RFINB"; break;
532
533 case SSL3_ST_SW_HELLO_REQ_A:
534 str="3WHR_A"; break;
535 case SSL3_ST_SW_HELLO_REQ_B:
536 str="3WHR_B"; break;
537 case SSL3_ST_SW_HELLO_REQ_C:
538 str="3WHR_C"; break;
539 case SSL3_ST_SR_CLNT_HELLO_A:
540 str="3RCH_A"; break;
541 case SSL3_ST_SR_CLNT_HELLO_B:
542 str="3RCH_B"; break;
543 case SSL3_ST_SR_CLNT_HELLO_C:
544 str="3RCH_C"; break;
545 case SSL3_ST_SW_SRVR_HELLO_A:
546 str="3WSH_A"; break;
547 case SSL3_ST_SW_SRVR_HELLO_B:
548 str="3WSH_B"; break;
549 case SSL3_ST_SW_CERT_A:
550 str="3WSC_A"; break;
551 case SSL3_ST_SW_CERT_B:
552 str="3WSC_B"; break;
553 case SSL3_ST_SW_KEY_EXCH_A:
554 str="3WSKEA"; break;
555 case SSL3_ST_SW_KEY_EXCH_B:
556 str="3WSKEB"; break;
557 case SSL3_ST_SW_CERT_REQ_A:
558 str="3WCR_A"; break;
559 case SSL3_ST_SW_CERT_REQ_B:
560 str="3WCR_B"; break;
561 case SSL3_ST_SW_SRVR_DONE_A:
562 str="3WSD_A"; break;
563 case SSL3_ST_SW_SRVR_DONE_B:
564 str="3WSD_B"; break;
565 case SSL3_ST_SR_CERT_A:
566 str="3RCC_A"; break;
567 case SSL3_ST_SR_CERT_B:
568 str="3RCC_B"; break;
569 case SSL3_ST_SR_KEY_EXCH_A:
570 str="3RCKEA"; break;
571 case SSL3_ST_SR_KEY_EXCH_B:
572 str="3RCKEB"; break;
573 case SSL3_ST_SR_CERT_VRFY_A:
574 str="3RCV_A"; break;
575 case SSL3_ST_SR_CERT_VRFY_B:
576 str="3RCV_B"; break;
577#endif
578
579#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
580/* SSLv2/v3 compatibility states */
581/* client */
582 case SSL23_ST_CW_CLNT_HELLO_A:
583 str="23WCHA"; break;
584 case SSL23_ST_CW_CLNT_HELLO_B:
585 str="23WCHB"; break;
586 case SSL23_ST_CR_SRVR_HELLO_A:
587 str="23RSHA"; break;
588 case SSL23_ST_CR_SRVR_HELLO_B:
589 str="23RSHA"; break;
590/* server */
591 case SSL23_ST_SR_CLNT_HELLO_A:
592 str="23RCHA"; break;
593 case SSL23_ST_SR_CLNT_HELLO_B:
594 str="23RCHB"; break;
595#endif
596/* DTLS */
597 case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A:
598 str="DRCHVA"; break;
599 case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_B:
600 str="DRCHVB"; break;
601 case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A:
602 str="DWCHVA"; break;
603 case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B:
604 str="DWCHVB"; break;
605
606 default:
607 str="UNKWN "; break;
608 }
609 return (str);
610}
611
612const char
613*SSL_alert_type_string_long(int value)
614{
615 value>>=8;
616 if (value == SSL3_AL_WARNING)
617 return("warning");
618 else if (value == SSL3_AL_FATAL)
619 return("fatal");
620 else
621 return("unknown");
622}
623
624const char
625*SSL_alert_type_string(int value)
626{
627 value>>=8;
628 if (value == SSL3_AL_WARNING)
629 return("W");
630 else if (value == SSL3_AL_FATAL)
631 return("F");
632 else
633 return("U");
634}
635
636const char
637*SSL_alert_desc_string(int value)
638{
639 const char *str;
640
641 switch (value & 0xff) {
642 case SSL3_AD_CLOSE_NOTIFY:
643 str="CN"; break;
644 case SSL3_AD_UNEXPECTED_MESSAGE:
645 str="UM"; break;
646 case SSL3_AD_BAD_RECORD_MAC:
647 str="BM"; break;
648 case SSL3_AD_DECOMPRESSION_FAILURE:
649 str="DF"; break;
650 case SSL3_AD_HANDSHAKE_FAILURE:
651 str="HF"; break;
652 case SSL3_AD_NO_CERTIFICATE:
653 str="NC"; break;
654 case SSL3_AD_BAD_CERTIFICATE:
655 str="BC"; break;
656 case SSL3_AD_UNSUPPORTED_CERTIFICATE:
657 str="UC"; break;
658 case SSL3_AD_CERTIFICATE_REVOKED:
659 str="CR"; break;
660 case SSL3_AD_CERTIFICATE_EXPIRED:
661 str="CE"; break;
662 case SSL3_AD_CERTIFICATE_UNKNOWN:
663 str="CU"; break;
664 case SSL3_AD_ILLEGAL_PARAMETER:
665 str="IP"; break;
666 case TLS1_AD_DECRYPTION_FAILED:
667 str="DC"; break;
668 case TLS1_AD_RECORD_OVERFLOW:
669 str="RO"; break;
670 case TLS1_AD_UNKNOWN_CA:
671 str="CA"; break;
672 case TLS1_AD_ACCESS_DENIED:
673 str="AD"; break;
674 case TLS1_AD_DECODE_ERROR:
675 str="DE"; break;
676 case TLS1_AD_DECRYPT_ERROR:
677 str="CY"; break;
678 case TLS1_AD_EXPORT_RESTRICTION:
679 str="ER"; break;
680 case TLS1_AD_PROTOCOL_VERSION:
681 str="PV"; break;
682 case TLS1_AD_INSUFFICIENT_SECURITY:
683 str="IS"; break;
684 case TLS1_AD_INTERNAL_ERROR:
685 str="IE"; break;
686 case TLS1_AD_USER_CANCELLED:
687 str="US"; break;
688 case TLS1_AD_NO_RENEGOTIATION:
689 str="NR"; break;
690 case TLS1_AD_UNSUPPORTED_EXTENSION:
691 str="UE"; break;
692 case TLS1_AD_CERTIFICATE_UNOBTAINABLE:
693 str="CO"; break;
694 case TLS1_AD_UNRECOGNIZED_NAME:
695 str="UN"; break;
696 case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE:
697 str="BR"; break;
698 case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE:
699 str="BH"; break;
700 case TLS1_AD_UNKNOWN_PSK_IDENTITY:
701 str="UP"; break;
702 default:
703 str="UK"; break;
704 }
705 return (str);
706}
707
708const char
709*SSL_alert_desc_string_long(int value)
710{
711 const char *str;
712
713 switch (value & 0xff) {
714 case SSL3_AD_CLOSE_NOTIFY:
715 str="close notify";
716 break;
717 case SSL3_AD_UNEXPECTED_MESSAGE:
718 str="unexpected_message";
719 break;
720 case SSL3_AD_BAD_RECORD_MAC:
721 str="bad record mac";
722 break;
723 case SSL3_AD_DECOMPRESSION_FAILURE:
724 str="decompression failure";
725 break;
726 case SSL3_AD_HANDSHAKE_FAILURE:
727 str="handshake failure";
728 break;
729 case SSL3_AD_NO_CERTIFICATE:
730 str="no certificate";
731 break;
732 case SSL3_AD_BAD_CERTIFICATE:
733 str="bad certificate";
734 break;
735 case SSL3_AD_UNSUPPORTED_CERTIFICATE:
736 str="unsupported certificate";
737 break;
738 case SSL3_AD_CERTIFICATE_REVOKED:
739 str="certificate revoked";
740 break;
741 case SSL3_AD_CERTIFICATE_EXPIRED:
742 str="certificate expired";
743 break;
744 case SSL3_AD_CERTIFICATE_UNKNOWN:
745 str="certificate unknown";
746 break;
747 case SSL3_AD_ILLEGAL_PARAMETER:
748 str="illegal parameter";
749 break;
750 case TLS1_AD_DECRYPTION_FAILED:
751 str="decryption failed";
752 break;
753 case TLS1_AD_RECORD_OVERFLOW:
754 str="record overflow";
755 break;
756 case TLS1_AD_UNKNOWN_CA:
757 str="unknown CA";
758 break;
759 case TLS1_AD_ACCESS_DENIED:
760 str="access denied";
761 break;
762 case TLS1_AD_DECODE_ERROR:
763 str="decode error";
764 break;
765 case TLS1_AD_DECRYPT_ERROR:
766 str="decrypt error";
767 break;
768 case TLS1_AD_EXPORT_RESTRICTION:
769 str="export restriction";
770 break;
771 case TLS1_AD_PROTOCOL_VERSION:
772 str="protocol version";
773 break;
774 case TLS1_AD_INSUFFICIENT_SECURITY:
775 str="insufficient security";
776 break;
777 case TLS1_AD_INTERNAL_ERROR:
778 str="internal error";
779 break;
780 case TLS1_AD_USER_CANCELLED:
781 str="user canceled";
782 break;
783 case TLS1_AD_NO_RENEGOTIATION:
784 str="no renegotiation";
785 break;
786 case TLS1_AD_UNSUPPORTED_EXTENSION:
787 str="unsupported extension";
788 break;
789 case TLS1_AD_CERTIFICATE_UNOBTAINABLE:
790 str="certificate unobtainable";
791 break;
792 case TLS1_AD_UNRECOGNIZED_NAME:
793 str="unrecognized name";
794 break;
795 case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE:
796 str="bad certificate status response";
797 break;
798 case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE:
799 str="bad certificate hash value";
800 break;
801 case TLS1_AD_UNKNOWN_PSK_IDENTITY:
802 str="unknown PSK identity";
803 break;
804 default:
805 str="unknown"; break;
806 }
807 return (str);
808}
809
810const char
811*SSL_rstate_string(const SSL *s)
812{
813 const char *str;
814
815 switch (s->rstate) {
816 case SSL_ST_READ_HEADER:
817 str="RH"; break;
818 case SSL_ST_READ_BODY:
819 str="RB"; break;
820 case SSL_ST_READ_DONE:
821 str="RD"; break;
822 default:
823 str="unknown"; break;
824 }
825 return (str);
826}