| // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. |
| // Copyright 2005 Nokia. All rights reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // https://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| #include <openssl/ssl.h> |
| |
| #include <assert.h> |
| |
| #include "internal.h" |
| |
| |
| const char *SSL_state_string_long(const SSL *ssl) { |
| if (ssl->s3->hs == nullptr) { |
| return "SSL negotiation finished successfully"; |
| } |
| |
| return ssl->server ? ssl_server_handshake_state(ssl->s3->hs.get()) |
| : ssl_client_handshake_state(ssl->s3->hs.get()); |
| } |
| |
| const char *SSL_state_string(const SSL *ssl) { return "!!!!!!"; } |
| |
| const char *SSL_alert_type_string_long(int value) { |
| value >>= 8; |
| if (value == SSL3_AL_WARNING) { |
| return "warning"; |
| } else if (value == SSL3_AL_FATAL) { |
| return "fatal"; |
| } |
| |
| return "unknown"; |
| } |
| |
| const char *SSL_alert_type_string(int value) { return "!"; } |
| |
| const char *SSL_alert_desc_string(int value) { return "!!"; } |
| |
| const char *SSL_alert_desc_string_long(int value) { |
| switch (value & 0xff) { |
| case SSL3_AD_CLOSE_NOTIFY: |
| return "close notify"; |
| |
| case SSL3_AD_UNEXPECTED_MESSAGE: |
| return "unexpected_message"; |
| |
| case SSL3_AD_BAD_RECORD_MAC: |
| return "bad record mac"; |
| |
| case SSL3_AD_DECOMPRESSION_FAILURE: |
| return "decompression failure"; |
| |
| case SSL3_AD_HANDSHAKE_FAILURE: |
| return "handshake failure"; |
| |
| case SSL3_AD_NO_CERTIFICATE: |
| return "no certificate"; |
| |
| case SSL3_AD_BAD_CERTIFICATE: |
| return "bad certificate"; |
| |
| case SSL3_AD_UNSUPPORTED_CERTIFICATE: |
| return "unsupported certificate"; |
| |
| case SSL3_AD_CERTIFICATE_REVOKED: |
| return "certificate revoked"; |
| |
| case SSL3_AD_CERTIFICATE_EXPIRED: |
| return "certificate expired"; |
| |
| case SSL3_AD_CERTIFICATE_UNKNOWN: |
| return "certificate unknown"; |
| |
| case SSL3_AD_ILLEGAL_PARAMETER: |
| return "illegal parameter"; |
| |
| case TLS1_AD_DECRYPTION_FAILED: |
| return "decryption failed"; |
| |
| case TLS1_AD_RECORD_OVERFLOW: |
| return "record overflow"; |
| |
| case TLS1_AD_UNKNOWN_CA: |
| return "unknown CA"; |
| |
| case TLS1_AD_ACCESS_DENIED: |
| return "access denied"; |
| |
| case TLS1_AD_DECODE_ERROR: |
| return "decode error"; |
| |
| case TLS1_AD_DECRYPT_ERROR: |
| return "decrypt error"; |
| |
| case TLS1_AD_EXPORT_RESTRICTION: |
| return "export restriction"; |
| |
| case TLS1_AD_PROTOCOL_VERSION: |
| return "protocol version"; |
| |
| case TLS1_AD_INSUFFICIENT_SECURITY: |
| return "insufficient security"; |
| |
| case TLS1_AD_INTERNAL_ERROR: |
| return "internal error"; |
| |
| case SSL3_AD_INAPPROPRIATE_FALLBACK: |
| return "inappropriate fallback"; |
| |
| case TLS1_AD_USER_CANCELLED: |
| return "user canceled"; |
| |
| case TLS1_AD_NO_RENEGOTIATION: |
| return "no renegotiation"; |
| |
| case TLS1_AD_MISSING_EXTENSION: |
| return "missing extension"; |
| |
| case TLS1_AD_UNSUPPORTED_EXTENSION: |
| return "unsupported extension"; |
| |
| case TLS1_AD_CERTIFICATE_UNOBTAINABLE: |
| return "certificate unobtainable"; |
| |
| case TLS1_AD_UNRECOGNIZED_NAME: |
| return "unrecognized name"; |
| |
| case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE: |
| return "bad certificate status response"; |
| |
| case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE: |
| return "bad certificate hash value"; |
| |
| case TLS1_AD_UNKNOWN_PSK_IDENTITY: |
| return "unknown PSK identity"; |
| |
| case TLS1_AD_CERTIFICATE_REQUIRED: |
| return "certificate required"; |
| |
| case TLS1_AD_NO_APPLICATION_PROTOCOL: |
| return "no application protocol"; |
| |
| case TLS1_AD_ECH_REQUIRED: |
| return "ECH required"; |
| |
| default: |
| return "unknown"; |
| } |
| } |