You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

451 lines
12 KiB

  1. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  2. * All rights reserved.
  3. *
  4. * This package is an SSL implementation written
  5. * by Eric Young (eay@cryptsoft.com).
  6. * The implementation was written so as to conform with Netscapes SSL.
  7. *
  8. * This library is free for commercial and non-commercial use as long as
  9. * the following conditions are aheared to. The following conditions
  10. * apply to all code found in this distribution, be it the RC4, RSA,
  11. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  12. * included with this distribution is covered by the same copyright terms
  13. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  14. *
  15. * Copyright remains Eric Young's, and as such any Copyright notices in
  16. * the code are not to be removed.
  17. * If this package is used in a product, Eric Young should be given attribution
  18. * as the author of the parts of the library used.
  19. * This can be in the form of a textual message at program startup or
  20. * in documentation (online or textual) provided with the package.
  21. *
  22. * Redistribution and use in source and binary forms, with or without
  23. * modification, are permitted provided that the following conditions
  24. * are met:
  25. * 1. Redistributions of source code must retain the copyright
  26. * notice, this list of conditions and the following disclaimer.
  27. * 2. Redistributions in binary form must reproduce the above copyright
  28. * notice, this list of conditions and the following disclaimer in the
  29. * documentation and/or other materials provided with the distribution.
  30. * 3. All advertising materials mentioning features or use of this software
  31. * must display the following acknowledgement:
  32. * "This product includes cryptographic software written by
  33. * Eric Young (eay@cryptsoft.com)"
  34. * The word 'cryptographic' can be left out if the rouines from the library
  35. * being used are not cryptographic related :-).
  36. * 4. If you include any Windows specific code (or a derivative thereof) from
  37. * the apps directory (application code) you must include an acknowledgement:
  38. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  39. *
  40. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  41. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  42. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  43. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  44. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  45. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  46. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  47. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  48. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  49. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  50. * SUCH DAMAGE.
  51. *
  52. * The licence and distribution terms for any publically available version or
  53. * derivative of this code cannot be changed. i.e. this code cannot simply be
  54. * copied and put under another distribution licence
  55. * [including the GNU Public Licence.]
  56. */
  57. /* ====================================================================
  58. * Copyright 2005 Nokia. All rights reserved.
  59. *
  60. * The portions of the attached software ("Contribution") is developed by
  61. * Nokia Corporation and is licensed pursuant to the OpenSSL open source
  62. * license.
  63. *
  64. * The Contribution, originally written by Mika Kousa and Pasi Eronen of
  65. * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
  66. * support (see RFC 4279) to OpenSSL.
  67. *
  68. * No patent licenses or other rights except those expressly stated in
  69. * the OpenSSL open source license shall be deemed granted or received
  70. * expressly, by implication, estoppel, or otherwise.
  71. *
  72. * No assurances are provided by Nokia that the Contribution does not
  73. * infringe the patent or other intellectual property rights of any third
  74. * party or that the license provides you with all the necessary rights
  75. * to make use of the Contribution.
  76. *
  77. * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
  78. * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
  79. * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
  80. * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
  81. * OTHERWISE.
  82. */
  83. #include <openssl/ssl.h>
  84. #include "internal.h"
  85. const char *SSL_state_string_long(const SSL *ssl) {
  86. switch (SSL_state(ssl)) {
  87. case SSL_ST_ACCEPT:
  88. return "before accept initialization";
  89. case SSL_ST_CONNECT:
  90. return "before connect initialization";
  91. case SSL_ST_OK:
  92. return "SSL negotiation finished successfully";
  93. case SSL_ST_RENEGOTIATE:
  94. return "SSL renegotiate ciphers";
  95. /* SSLv3 additions */
  96. case SSL3_ST_CW_CLNT_HELLO_A:
  97. return "SSLv3 write client hello A";
  98. case SSL3_ST_CR_SRVR_HELLO_A:
  99. return "SSLv3 read server hello A";
  100. case SSL3_ST_CR_CERT_A:
  101. return "SSLv3 read server certificate A";
  102. case SSL3_ST_CR_KEY_EXCH_A:
  103. return "SSLv3 read server key exchange A";
  104. case SSL3_ST_CR_CERT_REQ_A:
  105. return "SSLv3 read server certificate request A";
  106. case SSL3_ST_CR_SESSION_TICKET_A:
  107. return "SSLv3 read server session ticket A";
  108. case SSL3_ST_CR_SRVR_DONE_A:
  109. return "SSLv3 read server done A";
  110. case SSL3_ST_CW_CERT_A:
  111. return "SSLv3 write client certificate A";
  112. case SSL3_ST_CW_KEY_EXCH_A:
  113. return "SSLv3 write client key exchange A";
  114. case SSL3_ST_CW_CERT_VRFY_A:
  115. return "SSLv3 write certificate verify A";
  116. case SSL3_ST_CW_CERT_VRFY_B:
  117. return "SSLv3 write certificate verify B";
  118. case SSL3_ST_CW_CHANGE:
  119. case SSL3_ST_SW_CHANGE:
  120. return "SSLv3 write change cipher spec";
  121. case SSL3_ST_CW_FINISHED_A:
  122. case SSL3_ST_SW_FINISHED_A:
  123. return "SSLv3 write finished A";
  124. case SSL3_ST_CR_CHANGE:
  125. case SSL3_ST_SR_CHANGE:
  126. return "SSLv3 read change cipher spec";
  127. case SSL3_ST_CR_FINISHED_A:
  128. case SSL3_ST_SR_FINISHED_A:
  129. return "SSLv3 read finished A";
  130. case SSL3_ST_CW_FLUSH:
  131. case SSL3_ST_SW_FLUSH:
  132. return "SSLv3 flush data";
  133. case SSL3_ST_SR_CLNT_HELLO_A:
  134. return "SSLv3 read client hello A";
  135. case SSL3_ST_SR_CLNT_HELLO_B:
  136. return "SSLv3 read client hello B";
  137. case SSL3_ST_SR_CLNT_HELLO_C:
  138. return "SSLv3 read client hello C";
  139. case SSL3_ST_SW_HELLO_REQ_A:
  140. return "SSLv3 write hello request A";
  141. case SSL3_ST_SW_HELLO_REQ_B:
  142. return "SSLv3 write hello request B";
  143. case SSL3_ST_SW_HELLO_REQ_C:
  144. return "SSLv3 write hello request C";
  145. case SSL3_ST_SW_SRVR_HELLO_A:
  146. return "SSLv3 write server hello A";
  147. case SSL3_ST_SW_CERT_A:
  148. return "SSLv3 write certificate A";
  149. case SSL3_ST_SW_KEY_EXCH_A:
  150. return "SSLv3 write key exchange A";
  151. case SSL3_ST_SW_CERT_REQ_A:
  152. return "SSLv3 write certificate request A";
  153. case SSL3_ST_SW_SESSION_TICKET_A:
  154. return "SSLv3 write session ticket A";
  155. case SSL3_ST_SW_SRVR_DONE_A:
  156. return "SSLv3 write server done A";
  157. case SSL3_ST_SR_CERT_A:
  158. return "SSLv3 read client certificate A";
  159. case SSL3_ST_SR_KEY_EXCH_A:
  160. return "SSLv3 read client key exchange A";
  161. case SSL3_ST_SR_KEY_EXCH_B:
  162. return "SSLv3 read client key exchange B";
  163. case SSL3_ST_SR_CERT_VRFY_A:
  164. return "SSLv3 read certificate verify A";
  165. /* DTLS */
  166. case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A:
  167. return "DTLS1 read hello verify request A";
  168. default:
  169. return "unknown state";
  170. }
  171. }
  172. const char *SSL_state_string(const SSL *ssl) {
  173. switch (SSL_state(ssl)) {
  174. case SSL_ST_ACCEPT:
  175. return "AINIT ";
  176. case SSL_ST_CONNECT:
  177. return "CINIT ";
  178. case SSL_ST_OK:
  179. return "SSLOK ";
  180. /* SSLv3 additions */
  181. case SSL3_ST_SW_FLUSH:
  182. case SSL3_ST_CW_FLUSH:
  183. return "3FLUSH";
  184. case SSL3_ST_CW_CLNT_HELLO_A:
  185. return "3WCH_A";
  186. case SSL3_ST_CR_SRVR_HELLO_A:
  187. return "3RSH_A";
  188. case SSL3_ST_CR_CERT_A:
  189. return "3RSC_A";
  190. case SSL3_ST_CR_KEY_EXCH_A:
  191. return "3RSKEA";
  192. case SSL3_ST_CR_CERT_REQ_A:
  193. return "3RCR_A";
  194. case SSL3_ST_CR_SRVR_DONE_A:
  195. return "3RSD_A";
  196. case SSL3_ST_CW_CERT_A:
  197. return "3WCC_A";
  198. case SSL3_ST_CW_KEY_EXCH_A:
  199. return "3WCKEA";
  200. case SSL3_ST_CW_CERT_VRFY_A:
  201. return "3WCV_A";
  202. case SSL3_ST_CW_CERT_VRFY_B:
  203. return "3WCV_B";
  204. case SSL3_ST_SW_CHANGE:
  205. case SSL3_ST_CW_CHANGE:
  206. return "3WCCS_";
  207. case SSL3_ST_SW_FINISHED_A:
  208. case SSL3_ST_CW_FINISHED_A:
  209. return "3WFINA";
  210. case SSL3_ST_CR_CHANGE:
  211. case SSL3_ST_SR_CHANGE:
  212. return "3RCCS_";
  213. case SSL3_ST_SR_FINISHED_A:
  214. case SSL3_ST_CR_FINISHED_A:
  215. return "3RFINA";
  216. case SSL3_ST_SW_HELLO_REQ_A:
  217. return "3WHR_A";
  218. case SSL3_ST_SW_HELLO_REQ_B:
  219. return "3WHR_B";
  220. case SSL3_ST_SW_HELLO_REQ_C:
  221. return "3WHR_C";
  222. case SSL3_ST_SR_CLNT_HELLO_A:
  223. return "3RCH_A";
  224. case SSL3_ST_SR_CLNT_HELLO_B:
  225. return "3RCH_B";
  226. case SSL3_ST_SR_CLNT_HELLO_C:
  227. return "3RCH_C";
  228. case SSL3_ST_SW_SRVR_HELLO_A:
  229. return "3WSH_A";
  230. case SSL3_ST_SW_CERT_A:
  231. return "3WSC_A";
  232. case SSL3_ST_SW_KEY_EXCH_A:
  233. return "3WSKEA";
  234. case SSL3_ST_SW_KEY_EXCH_B:
  235. return "3WSKEB";
  236. case SSL3_ST_SW_CERT_REQ_A:
  237. return "3WCR_A";
  238. case SSL3_ST_SW_SRVR_DONE_A:
  239. return "3WSD_A";
  240. case SSL3_ST_SR_CERT_A:
  241. return "3RCC_A";
  242. case SSL3_ST_SR_KEY_EXCH_A:
  243. return "3RCKEA";
  244. case SSL3_ST_SR_CERT_VRFY_A:
  245. return "3RCV_A";
  246. /* DTLS */
  247. case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A:
  248. return "DRCHVA";
  249. default:
  250. return "UNKWN ";
  251. }
  252. }
  253. const char *SSL_alert_type_string_long(int value) {
  254. value >>= 8;
  255. if (value == SSL3_AL_WARNING) {
  256. return "warning";
  257. } else if (value == SSL3_AL_FATAL) {
  258. return "fatal";
  259. }
  260. return "unknown";
  261. }
  262. const char *SSL_alert_type_string(int value) {
  263. return "!";
  264. }
  265. const char *SSL_alert_desc_string(int value) {
  266. return "!!";
  267. }
  268. const char *SSL_alert_desc_string_long(int value) {
  269. switch (value & 0xff) {
  270. case SSL3_AD_CLOSE_NOTIFY:
  271. return "close notify";
  272. case SSL3_AD_UNEXPECTED_MESSAGE:
  273. return "unexpected_message";
  274. case SSL3_AD_BAD_RECORD_MAC:
  275. return "bad record mac";
  276. case SSL3_AD_DECOMPRESSION_FAILURE:
  277. return "decompression failure";
  278. case SSL3_AD_HANDSHAKE_FAILURE:
  279. return "handshake failure";
  280. case SSL3_AD_NO_CERTIFICATE:
  281. return "no certificate";
  282. case SSL3_AD_BAD_CERTIFICATE:
  283. return "bad certificate";
  284. case SSL3_AD_UNSUPPORTED_CERTIFICATE:
  285. return "unsupported certificate";
  286. case SSL3_AD_CERTIFICATE_REVOKED:
  287. return "certificate revoked";
  288. case SSL3_AD_CERTIFICATE_EXPIRED:
  289. return "certificate expired";
  290. case SSL3_AD_CERTIFICATE_UNKNOWN:
  291. return "certificate unknown";
  292. case SSL3_AD_ILLEGAL_PARAMETER:
  293. return "illegal parameter";
  294. case TLS1_AD_DECRYPTION_FAILED:
  295. return "decryption failed";
  296. case TLS1_AD_RECORD_OVERFLOW:
  297. return "record overflow";
  298. case TLS1_AD_UNKNOWN_CA:
  299. return "unknown CA";
  300. case TLS1_AD_ACCESS_DENIED:
  301. return "access denied";
  302. case TLS1_AD_DECODE_ERROR:
  303. return "decode error";
  304. case TLS1_AD_DECRYPT_ERROR:
  305. return "decrypt error";
  306. case TLS1_AD_EXPORT_RESTRICTION:
  307. return "export restriction";
  308. case TLS1_AD_PROTOCOL_VERSION:
  309. return "protocol version";
  310. case TLS1_AD_INSUFFICIENT_SECURITY:
  311. return "insufficient security";
  312. case TLS1_AD_INTERNAL_ERROR:
  313. return "internal error";
  314. case SSL3_AD_INAPPROPRIATE_FALLBACK:
  315. return "inappropriate fallback";
  316. case TLS1_AD_USER_CANCELLED:
  317. return "user canceled";
  318. case TLS1_AD_NO_RENEGOTIATION:
  319. return "no renegotiation";
  320. case TLS1_AD_UNSUPPORTED_EXTENSION:
  321. return "unsupported extension";
  322. case TLS1_AD_CERTIFICATE_UNOBTAINABLE:
  323. return "certificate unobtainable";
  324. case TLS1_AD_UNRECOGNIZED_NAME:
  325. return "unrecognized name";
  326. case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE:
  327. return "bad certificate status response";
  328. case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE:
  329. return "bad certificate hash value";
  330. case TLS1_AD_UNKNOWN_PSK_IDENTITY:
  331. return "unknown PSK identity";
  332. case TLS1_AD_CERTIFICATE_REQUIRED:
  333. return "certificate required";
  334. default:
  335. return "unknown";
  336. }
  337. }