669 lines
33 KiB
C
Executable File
669 lines
33 KiB
C
Executable File
/* $OpenBSD: ssl_err.c,v 1.37 2020/01/21 05:19:02 jsing Exp $ */
|
|
/* ====================================================================
|
|
* Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* 3. All advertising materials mentioning features or use of this
|
|
* software must display the following acknowledgment:
|
|
* "This product includes software developed by the OpenSSL Project
|
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
|
*
|
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
* endorse or promote products derived from this software without
|
|
* prior written permission. For written permission, please contact
|
|
* openssl-core@OpenSSL.org.
|
|
*
|
|
* 5. Products derived from this software may not be called "OpenSSL"
|
|
* nor may "OpenSSL" appear in their names without prior written
|
|
* permission of the OpenSSL Project.
|
|
*
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
* acknowledgment:
|
|
* "This product includes software developed by the OpenSSL Project
|
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
* ====================================================================
|
|
*
|
|
* This product includes cryptographic software written by Eric Young
|
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
* Hudson (tjh@cryptsoft.com).
|
|
*
|
|
*/
|
|
|
|
/* NOTE: this file was auto generated by the mkerr.pl script: any changes
|
|
* made to it will be overwritten when the script next updates this file,
|
|
* only reason strings will be preserved.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <openssl/err.h>
|
|
#include <openssl/ssl.h>
|
|
|
|
#include "ssl_locl.h"
|
|
|
|
/* BEGIN ERROR CODES */
|
|
#ifndef OPENSSL_NO_ERR
|
|
|
|
#define ERR_FUNC(func) ERR_PACK(ERR_LIB_SSL,func,0)
|
|
#define ERR_REASON(reason) ERR_PACK(ERR_LIB_SSL,0,reason)
|
|
|
|
/* See SSL_state_func_code below */
|
|
static ERR_STRING_DATA SSL_str_functs[]= {
|
|
{ERR_FUNC(1), "CONNECT_CW_FLUSH"},
|
|
{ERR_FUNC(2), "CONNECT_CW_CLNT_HELLO"},
|
|
{ERR_FUNC(3), "CONNECT_CW_CLNT_HELLO"},
|
|
{ERR_FUNC(4), "CONNECT_CR_SRVR_HELLO"},
|
|
{ERR_FUNC(5), "CONNECT_CR_SRVR_HELLO"},
|
|
{ERR_FUNC(6), "CONNECT_CR_CERT"},
|
|
{ERR_FUNC(7), "CONNECT_CR_CERT"},
|
|
{ERR_FUNC(8), "CONNECT_CR_KEY_EXCH"},
|
|
{ERR_FUNC(9), "CONNECT_CR_KEY_EXCH"},
|
|
{ERR_FUNC(10), "CONNECT_CR_CERT_REQ"},
|
|
{ERR_FUNC(11), "CONNECT_CR_CERT_REQ"},
|
|
{ERR_FUNC(12), "CONNECT_CR_SRVR_DONE"},
|
|
{ERR_FUNC(13), "CONNECT_CR_SRVR_DONE"},
|
|
{ERR_FUNC(14), "CONNECT_CW_CERT"},
|
|
{ERR_FUNC(15), "CONNECT_CW_CERT"},
|
|
{ERR_FUNC(16), "CONNECT_CW_CERT_C"},
|
|
{ERR_FUNC(17), "CONNECT_CW_CERT_D"},
|
|
{ERR_FUNC(18), "CONNECT_CW_KEY_EXCH"},
|
|
{ERR_FUNC(19), "CONNECT_CW_KEY_EXCH"},
|
|
{ERR_FUNC(20), "CONNECT_CW_CERT_VRFY"},
|
|
{ERR_FUNC(21), "CONNECT_CW_CERT_VRFY"},
|
|
{ERR_FUNC(22), "CONNECT_CW_CHANGE"},
|
|
{ERR_FUNC(23), "CONNECT_CW_CHANGE"},
|
|
{ERR_FUNC(26), "CONNECT_CW_FINISHED"},
|
|
{ERR_FUNC(27), "CONNECT_CW_FINISHED"},
|
|
{ERR_FUNC(28), "CONNECT_CR_CHANGE"},
|
|
{ERR_FUNC(29), "CONNECT_CR_CHANGE"},
|
|
{ERR_FUNC(30), "CONNECT_CR_FINISHED"},
|
|
{ERR_FUNC(31), "CONNECT_CR_FINISHED"},
|
|
{ERR_FUNC(32), "CONNECT_CR_SESSION_TICKET"},
|
|
{ERR_FUNC(33), "CONNECT_CR_SESSION_TICKET"},
|
|
{ERR_FUNC(34), "CONNECT_CR_CERT_STATUS"},
|
|
{ERR_FUNC(35), "CONNECT_CR_CERT_STATUS"},
|
|
{ERR_FUNC(36), "ACCEPT_SW_FLUSH"},
|
|
{ERR_FUNC(37), "ACCEPT_SR_CLNT_HELLO"},
|
|
{ERR_FUNC(38), "ACCEPT_SR_CLNT_HELLO"},
|
|
{ERR_FUNC(39), "ACCEPT_SR_CLNT_HELLO_C"},
|
|
{ERR_FUNC(40), "ACCEPT_SW_HELLO_REQ"},
|
|
{ERR_FUNC(41), "ACCEPT_SW_HELLO_REQ"},
|
|
{ERR_FUNC(42), "ACCEPT_SW_HELLO_REQ_C"},
|
|
{ERR_FUNC(43), "ACCEPT_SW_SRVR_HELLO"},
|
|
{ERR_FUNC(44), "ACCEPT_SW_SRVR_HELLO"},
|
|
{ERR_FUNC(45), "ACCEPT_SW_CERT"},
|
|
{ERR_FUNC(46), "ACCEPT_SW_CERT"},
|
|
{ERR_FUNC(47), "ACCEPT_SW_KEY_EXCH"},
|
|
{ERR_FUNC(48), "ACCEPT_SW_KEY_EXCH"},
|
|
{ERR_FUNC(49), "ACCEPT_SW_CERT_REQ"},
|
|
{ERR_FUNC(50), "ACCEPT_SW_CERT_REQ"},
|
|
{ERR_FUNC(51), "ACCEPT_SW_SRVR_DONE"},
|
|
{ERR_FUNC(52), "ACCEPT_SW_SRVR_DONE"},
|
|
{ERR_FUNC(53), "ACCEPT_SR_CERT"},
|
|
{ERR_FUNC(54), "ACCEPT_SR_CERT"},
|
|
{ERR_FUNC(55), "ACCEPT_SR_KEY_EXCH"},
|
|
{ERR_FUNC(56), "ACCEPT_SR_KEY_EXCH"},
|
|
{ERR_FUNC(57), "ACCEPT_SR_CERT_VRFY"},
|
|
{ERR_FUNC(58), "ACCEPT_SR_CERT_VRFY"},
|
|
{ERR_FUNC(59), "ACCEPT_SR_CHANGE"},
|
|
{ERR_FUNC(60), "ACCEPT_SR_CHANGE"},
|
|
{ERR_FUNC(63), "ACCEPT_SR_FINISHED"},
|
|
{ERR_FUNC(64), "ACCEPT_SR_FINISHED"},
|
|
{ERR_FUNC(65), "ACCEPT_SW_CHANGE"},
|
|
{ERR_FUNC(66), "ACCEPT_SW_CHANGE"},
|
|
{ERR_FUNC(67), "ACCEPT_SW_FINISHED"},
|
|
{ERR_FUNC(68), "ACCEPT_SW_FINISHED"},
|
|
{ERR_FUNC(69), "ACCEPT_SW_SESSION_TICKET"},
|
|
{ERR_FUNC(70), "ACCEPT_SW_SESSION_TICKET"},
|
|
{ERR_FUNC(71), "ACCEPT_SW_CERT_STATUS"},
|
|
{ERR_FUNC(72), "ACCEPT_SW_CERT_STATUS"},
|
|
{ERR_FUNC(73), "ST_BEFORE"},
|
|
{ERR_FUNC(74), "ST_ACCEPT"},
|
|
{ERR_FUNC(75), "ST_CONNECT"},
|
|
{ERR_FUNC(76), "ST_OK"},
|
|
{ERR_FUNC(77), "ST_RENEGOTIATE"},
|
|
{ERR_FUNC(78), "ST_BEFORE_CONNECT"},
|
|
{ERR_FUNC(79), "ST_OK_CONNECT"},
|
|
{ERR_FUNC(80), "ST_BEFORE_ACCEPT"},
|
|
{ERR_FUNC(81), "ST_OK_ACCEPT"},
|
|
{ERR_FUNC(83), "DTLS1_ST_CR_HELLO_VERIFY_REQUEST"},
|
|
{ERR_FUNC(84), "DTLS1_ST_CR_HELLO_VERIFY_REQUEST"},
|
|
{ERR_FUNC(85), "DTLS1_ST_SW_HELLO_VERIFY_REQUEST"},
|
|
{ERR_FUNC(86), "DTLS1_ST_SW_HELLO_VERIFY_REQUEST"},
|
|
{ERR_FUNC(0xfff), "(UNKNOWN)SSL_internal"},
|
|
{0, NULL}
|
|
};
|
|
|
|
static ERR_STRING_DATA SSL_str_reasons[]= {
|
|
{ERR_REASON(SSL_R_APP_DATA_IN_HANDSHAKE) , "app data in handshake"},
|
|
{ERR_REASON(SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT), "attempt to reuse session in different context"},
|
|
{ERR_REASON(SSL_R_BAD_ALERT_RECORD) , "bad alert record"},
|
|
{ERR_REASON(SSL_R_BAD_AUTHENTICATION_TYPE), "bad authentication type"},
|
|
{ERR_REASON(SSL_R_BAD_CHANGE_CIPHER_SPEC), "bad change cipher spec"},
|
|
{ERR_REASON(SSL_R_BAD_CHECKSUM) , "bad checksum"},
|
|
{ERR_REASON(SSL_R_BAD_DATA_RETURNED_BY_CALLBACK), "bad data returned by callback"},
|
|
{ERR_REASON(SSL_R_BAD_DECOMPRESSION) , "bad decompression"},
|
|
{ERR_REASON(SSL_R_BAD_DH_G_LENGTH) , "bad dh g length"},
|
|
{ERR_REASON(SSL_R_BAD_DH_PUB_KEY_LENGTH) , "bad dh pub key length"},
|
|
{ERR_REASON(SSL_R_BAD_DH_P_LENGTH) , "bad dh p length"},
|
|
{ERR_REASON(SSL_R_BAD_DIGEST_LENGTH) , "bad digest length"},
|
|
{ERR_REASON(SSL_R_BAD_DSA_SIGNATURE) , "bad dsa signature"},
|
|
{ERR_REASON(SSL_R_BAD_ECC_CERT) , "bad ecc cert"},
|
|
{ERR_REASON(SSL_R_BAD_ECDSA_SIGNATURE) , "bad ecdsa signature"},
|
|
{ERR_REASON(SSL_R_BAD_ECPOINT) , "bad ecpoint"},
|
|
{ERR_REASON(SSL_R_BAD_HANDSHAKE_LENGTH) , "bad handshake length"},
|
|
{ERR_REASON(SSL_R_BAD_HELLO_REQUEST) , "bad hello request"},
|
|
{ERR_REASON(SSL_R_BAD_LENGTH) , "bad length"},
|
|
{ERR_REASON(SSL_R_BAD_MAC_DECODE) , "bad mac decode"},
|
|
{ERR_REASON(SSL_R_BAD_MAC_LENGTH) , "bad mac length"},
|
|
{ERR_REASON(SSL_R_BAD_MESSAGE_TYPE) , "bad message type"},
|
|
{ERR_REASON(SSL_R_BAD_PACKET_LENGTH) , "bad packet length"},
|
|
{ERR_REASON(SSL_R_BAD_PROTOCOL_VERSION_NUMBER), "bad protocol version number"},
|
|
{ERR_REASON(SSL_R_BAD_PSK_IDENTITY_HINT_LENGTH), "bad psk identity hint length"},
|
|
{ERR_REASON(SSL_R_BAD_RESPONSE_ARGUMENT) , "bad response argument"},
|
|
{ERR_REASON(SSL_R_BAD_RSA_DECRYPT) , "bad rsa decrypt"},
|
|
{ERR_REASON(SSL_R_BAD_RSA_ENCRYPT) , "bad rsa encrypt"},
|
|
{ERR_REASON(SSL_R_BAD_RSA_E_LENGTH) , "bad rsa e length"},
|
|
{ERR_REASON(SSL_R_BAD_RSA_MODULUS_LENGTH), "bad rsa modulus length"},
|
|
{ERR_REASON(SSL_R_BAD_RSA_SIGNATURE) , "bad rsa signature"},
|
|
{ERR_REASON(SSL_R_BAD_SIGNATURE) , "bad signature"},
|
|
{ERR_REASON(SSL_R_BAD_SRP_A_LENGTH) , "bad srp a length"},
|
|
{ERR_REASON(SSL_R_BAD_SRP_B_LENGTH) , "bad srp b length"},
|
|
{ERR_REASON(SSL_R_BAD_SRP_G_LENGTH) , "bad srp g length"},
|
|
{ERR_REASON(SSL_R_BAD_SRP_N_LENGTH) , "bad srp n length"},
|
|
{ERR_REASON(SSL_R_BAD_SRP_S_LENGTH) , "bad srp s length"},
|
|
{ERR_REASON(SSL_R_BAD_SRTP_MKI_VALUE) , "bad srtp mki value"},
|
|
{ERR_REASON(SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST), "bad srtp protection profile list"},
|
|
{ERR_REASON(SSL_R_BAD_SSL_FILETYPE) , "bad ssl filetype"},
|
|
{ERR_REASON(SSL_R_BAD_SSL_SESSION_ID_LENGTH), "bad ssl session id length"},
|
|
{ERR_REASON(SSL_R_BAD_STATE) , "bad state"},
|
|
{ERR_REASON(SSL_R_BAD_WRITE_RETRY) , "bad write retry"},
|
|
{ERR_REASON(SSL_R_BIO_NOT_SET) , "bio not set"},
|
|
{ERR_REASON(SSL_R_BLOCK_CIPHER_PAD_IS_WRONG), "block cipher pad is wrong"},
|
|
{ERR_REASON(SSL_R_BN_LIB) , "bn lib"},
|
|
{ERR_REASON(SSL_R_CA_DN_LENGTH_MISMATCH) , "ca dn length mismatch"},
|
|
{ERR_REASON(SSL_R_CA_DN_TOO_LONG) , "ca dn too long"},
|
|
{ERR_REASON(SSL_R_CCS_RECEIVED_EARLY) , "ccs received early"},
|
|
{ERR_REASON(SSL_R_CERTIFICATE_VERIFY_FAILED), "certificate verify failed"},
|
|
{ERR_REASON(SSL_R_CERT_LENGTH_MISMATCH) , "cert length mismatch"},
|
|
{ERR_REASON(SSL_R_CHALLENGE_IS_DIFFERENT), "challenge is different"},
|
|
{ERR_REASON(SSL_R_CIPHER_CODE_WRONG_LENGTH), "cipher code wrong length"},
|
|
{ERR_REASON(SSL_R_CIPHER_COMPRESSION_UNAVAILABLE), "cipher compression unavailable"},
|
|
{ERR_REASON(SSL_R_CIPHER_OR_HASH_UNAVAILABLE), "cipher or hash unavailable"},
|
|
{ERR_REASON(SSL_R_CIPHER_TABLE_SRC_ERROR), "cipher table src error"},
|
|
{ERR_REASON(SSL_R_CLIENTHELLO_TLSEXT) , "clienthello tlsext"},
|
|
{ERR_REASON(SSL_R_COMPRESSED_LENGTH_TOO_LONG), "compressed length too long"},
|
|
{ERR_REASON(SSL_R_COMPRESSION_DISABLED) , "compression disabled"},
|
|
{ERR_REASON(SSL_R_COMPRESSION_FAILURE) , "compression failure"},
|
|
{ERR_REASON(SSL_R_COMPRESSION_ID_NOT_WITHIN_PRIVATE_RANGE), "compression id not within private range"},
|
|
{ERR_REASON(SSL_R_COMPRESSION_LIBRARY_ERROR), "compression library error"},
|
|
{ERR_REASON(SSL_R_CONNECTION_ID_IS_DIFFERENT), "connection id is different"},
|
|
{ERR_REASON(SSL_R_CONNECTION_TYPE_NOT_SET), "connection type not set"},
|
|
{ERR_REASON(SSL_R_COOKIE_MISMATCH) , "cookie mismatch"},
|
|
{ERR_REASON(SSL_R_DATA_BETWEEN_CCS_AND_FINISHED), "data between ccs and finished"},
|
|
{ERR_REASON(SSL_R_DATA_LENGTH_TOO_LONG) , "data length too long"},
|
|
{ERR_REASON(SSL_R_DECRYPTION_FAILED) , "decryption failed"},
|
|
{ERR_REASON(SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC), "decryption failed or bad record mac"},
|
|
{ERR_REASON(SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG), "dh public value length is wrong"},
|
|
{ERR_REASON(SSL_R_DIGEST_CHECK_FAILED) , "digest check failed"},
|
|
{ERR_REASON(SSL_R_DTLS_MESSAGE_TOO_BIG) , "dtls message too big"},
|
|
{ERR_REASON(SSL_R_DUPLICATE_COMPRESSION_ID), "duplicate compression id"},
|
|
{ERR_REASON(SSL_R_ECC_CERT_NOT_FOR_KEY_AGREEMENT), "ecc cert not for key agreement"},
|
|
{ERR_REASON(SSL_R_ECC_CERT_NOT_FOR_SIGNING), "ecc cert not for signing"},
|
|
{ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE), "ecc cert should have rsa signature"},
|
|
{ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE), "ecc cert should have sha1 signature"},
|
|
{ERR_REASON(SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER), "ecgroup too large for cipher"},
|
|
{ERR_REASON(SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST), "empty srtp protection profile list"},
|
|
{ERR_REASON(SSL_R_ENCRYPTED_LENGTH_TOO_LONG), "encrypted length too long"},
|
|
{ERR_REASON(SSL_R_ERROR_GENERATING_TMP_RSA_KEY), "error generating tmp rsa key"},
|
|
{ERR_REASON(SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST), "error in received cipher list"},
|
|
{ERR_REASON(SSL_R_EXCESSIVE_MESSAGE_SIZE), "excessive message size"},
|
|
{ERR_REASON(SSL_R_EXTRA_DATA_IN_MESSAGE) , "extra data in message"},
|
|
{ERR_REASON(SSL_R_GOT_A_FIN_BEFORE_A_CCS), "got a fin before a ccs"},
|
|
{ERR_REASON(SSL_R_GOT_NEXT_PROTO_BEFORE_A_CCS), "got next proto before a ccs"},
|
|
{ERR_REASON(SSL_R_GOT_NEXT_PROTO_WITHOUT_EXTENSION), "got next proto without seeing extension"},
|
|
{ERR_REASON(SSL_R_HTTPS_PROXY_REQUEST) , "https proxy request"},
|
|
{ERR_REASON(SSL_R_HTTP_REQUEST) , "http request"},
|
|
{ERR_REASON(SSL_R_ILLEGAL_PADDING) , "illegal padding"},
|
|
{ERR_REASON(SSL_R_INAPPROPRIATE_FALLBACK), "inappropriate fallback"},
|
|
{ERR_REASON(SSL_R_INCONSISTENT_COMPRESSION), "inconsistent compression"},
|
|
{ERR_REASON(SSL_R_INVALID_CHALLENGE_LENGTH), "invalid challenge length"},
|
|
{ERR_REASON(SSL_R_INVALID_COMMAND) , "invalid command"},
|
|
{ERR_REASON(SSL_R_INVALID_COMPRESSION_ALGORITHM), "invalid compression algorithm"},
|
|
{ERR_REASON(SSL_R_INVALID_PURPOSE) , "invalid purpose"},
|
|
{ERR_REASON(SSL_R_INVALID_SRP_USERNAME) , "invalid srp username"},
|
|
{ERR_REASON(SSL_R_INVALID_STATUS_RESPONSE), "invalid status response"},
|
|
{ERR_REASON(SSL_R_INVALID_TICKET_KEYS_LENGTH), "invalid ticket keys length"},
|
|
{ERR_REASON(SSL_R_INVALID_TRUST) , "invalid trust"},
|
|
{ERR_REASON(SSL_R_KEY_ARG_TOO_LONG) , "key arg too long"},
|
|
{ERR_REASON(SSL_R_KRB5) , "krb5"},
|
|
{ERR_REASON(SSL_R_KRB5_C_CC_PRINC) , "krb5 client cc principal (no tkt?)"},
|
|
{ERR_REASON(SSL_R_KRB5_C_GET_CRED) , "krb5 client get cred"},
|
|
{ERR_REASON(SSL_R_KRB5_C_INIT) , "krb5 client init"},
|
|
{ERR_REASON(SSL_R_KRB5_C_MK_REQ) , "krb5 client mk_req (expired tkt?)"},
|
|
{ERR_REASON(SSL_R_KRB5_S_BAD_TICKET) , "krb5 server bad ticket"},
|
|
{ERR_REASON(SSL_R_KRB5_S_INIT) , "krb5 server init"},
|
|
{ERR_REASON(SSL_R_KRB5_S_RD_REQ) , "krb5 server rd_req (keytab perms?)"},
|
|
{ERR_REASON(SSL_R_KRB5_S_TKT_EXPIRED) , "krb5 server tkt expired"},
|
|
{ERR_REASON(SSL_R_KRB5_S_TKT_NYV) , "krb5 server tkt not yet valid"},
|
|
{ERR_REASON(SSL_R_KRB5_S_TKT_SKEW) , "krb5 server tkt skew"},
|
|
{ERR_REASON(SSL_R_LENGTH_MISMATCH) , "length mismatch"},
|
|
{ERR_REASON(SSL_R_LENGTH_TOO_SHORT) , "length too short"},
|
|
{ERR_REASON(SSL_R_LIBRARY_BUG) , "library bug"},
|
|
{ERR_REASON(SSL_R_LIBRARY_HAS_NO_CIPHERS), "library has no ciphers"},
|
|
{ERR_REASON(SSL_R_MESSAGE_TOO_LONG) , "message too long"},
|
|
{ERR_REASON(SSL_R_MISSING_DH_DSA_CERT) , "missing dh dsa cert"},
|
|
{ERR_REASON(SSL_R_MISSING_DH_KEY) , "missing dh key"},
|
|
{ERR_REASON(SSL_R_MISSING_DH_RSA_CERT) , "missing dh rsa cert"},
|
|
{ERR_REASON(SSL_R_MISSING_DSA_SIGNING_CERT), "missing dsa signing cert"},
|
|
{ERR_REASON(SSL_R_MISSING_EXPORT_TMP_DH_KEY), "missing export tmp dh key"},
|
|
{ERR_REASON(SSL_R_MISSING_EXPORT_TMP_RSA_KEY), "missing export tmp rsa key"},
|
|
{ERR_REASON(SSL_R_MISSING_RSA_CERTIFICATE), "missing rsa certificate"},
|
|
{ERR_REASON(SSL_R_MISSING_RSA_ENCRYPTING_CERT), "missing rsa encrypting cert"},
|
|
{ERR_REASON(SSL_R_MISSING_RSA_SIGNING_CERT), "missing rsa signing cert"},
|
|
{ERR_REASON(SSL_R_MISSING_SRP_PARAM) , "can't find SRP server param"},
|
|
{ERR_REASON(SSL_R_MISSING_TMP_DH_KEY) , "missing tmp dh key"},
|
|
{ERR_REASON(SSL_R_MISSING_TMP_ECDH_KEY) , "missing tmp ecdh key"},
|
|
{ERR_REASON(SSL_R_MISSING_TMP_RSA_KEY) , "missing tmp rsa key"},
|
|
{ERR_REASON(SSL_R_MISSING_TMP_RSA_PKEY) , "missing tmp rsa pkey"},
|
|
{ERR_REASON(SSL_R_MISSING_VERIFY_MESSAGE), "missing verify message"},
|
|
{ERR_REASON(SSL_R_MULTIPLE_SGC_RESTARTS) , "multiple sgc restarts"},
|
|
{ERR_REASON(SSL_R_NON_SSLV2_INITIAL_PACKET), "non sslv2 initial packet"},
|
|
{ERR_REASON(SSL_R_NO_CERTIFICATES_RETURNED), "no certificates returned"},
|
|
{ERR_REASON(SSL_R_NO_CERTIFICATE_ASSIGNED), "no certificate assigned"},
|
|
{ERR_REASON(SSL_R_NO_CERTIFICATE_RETURNED), "no certificate returned"},
|
|
{ERR_REASON(SSL_R_NO_CERTIFICATE_SET) , "no certificate set"},
|
|
{ERR_REASON(SSL_R_NO_CERTIFICATE_SPECIFIED), "no certificate specified"},
|
|
{ERR_REASON(SSL_R_NO_CIPHERS_AVAILABLE) , "no ciphers available"},
|
|
{ERR_REASON(SSL_R_NO_CIPHERS_PASSED) , "no ciphers passed"},
|
|
{ERR_REASON(SSL_R_NO_CIPHERS_SPECIFIED) , "no ciphers specified"},
|
|
{ERR_REASON(SSL_R_NO_CIPHER_LIST) , "no cipher list"},
|
|
{ERR_REASON(SSL_R_NO_CIPHER_MATCH) , "no cipher match"},
|
|
{ERR_REASON(SSL_R_NO_CLIENT_CERT_METHOD) , "no client cert method"},
|
|
{ERR_REASON(SSL_R_NO_CLIENT_CERT_RECEIVED), "no client cert received"},
|
|
{ERR_REASON(SSL_R_NO_COMPRESSION_SPECIFIED), "no compression specified"},
|
|
{ERR_REASON(SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER), "Peer haven't sent GOST certificate, required for selected ciphersuite"},
|
|
{ERR_REASON(SSL_R_NO_METHOD_SPECIFIED) , "no method specified"},
|
|
{ERR_REASON(SSL_R_NO_PRIVATEKEY) , "no privatekey"},
|
|
{ERR_REASON(SSL_R_NO_PRIVATE_KEY_ASSIGNED), "no private key assigned"},
|
|
{ERR_REASON(SSL_R_NO_PROTOCOLS_AVAILABLE), "no protocols available"},
|
|
{ERR_REASON(SSL_R_NO_PUBLICKEY) , "no publickey"},
|
|
{ERR_REASON(SSL_R_NO_RENEGOTIATION) , "no renegotiation"},
|
|
{ERR_REASON(SSL_R_NO_REQUIRED_DIGEST) , "digest requred for handshake isn't computed"},
|
|
{ERR_REASON(SSL_R_NO_SHARED_CIPHER) , "no shared cipher"},
|
|
{ERR_REASON(SSL_R_NO_SRTP_PROFILES) , "no srtp profiles"},
|
|
{ERR_REASON(SSL_R_NO_VERIFY_CALLBACK) , "no verify callback"},
|
|
{ERR_REASON(SSL_R_NULL_SSL_CTX) , "null ssl ctx"},
|
|
{ERR_REASON(SSL_R_NULL_SSL_METHOD_PASSED), "null ssl method passed"},
|
|
{ERR_REASON(SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED), "old session cipher not returned"},
|
|
{ERR_REASON(SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED), "old session compression algorithm not returned"},
|
|
{ERR_REASON(SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE), "only tls allowed in fips mode"},
|
|
{ERR_REASON(SSL_R_PACKET_LENGTH_TOO_LONG), "packet length too long"},
|
|
{ERR_REASON(SSL_R_PARSE_TLSEXT) , "parse tlsext"},
|
|
{ERR_REASON(SSL_R_PATH_TOO_LONG) , "path too long"},
|
|
{ERR_REASON(SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE), "peer did not return a certificate"},
|
|
{ERR_REASON(SSL_R_PEER_ERROR) , "peer error"},
|
|
{ERR_REASON(SSL_R_PEER_ERROR_CERTIFICATE), "peer error certificate"},
|
|
{ERR_REASON(SSL_R_PEER_ERROR_NO_CERTIFICATE), "peer error no certificate"},
|
|
{ERR_REASON(SSL_R_PEER_ERROR_NO_CIPHER) , "peer error no cipher"},
|
|
{ERR_REASON(SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE), "peer error unsupported certificate type"},
|
|
{ERR_REASON(SSL_R_PRE_MAC_LENGTH_TOO_LONG), "pre mac length too long"},
|
|
{ERR_REASON(SSL_R_PROBLEMS_MAPPING_CIPHER_FUNCTIONS), "problems mapping cipher functions"},
|
|
{ERR_REASON(SSL_R_PROTOCOL_IS_SHUTDOWN) , "protocol is shutdown"},
|
|
{ERR_REASON(SSL_R_PSK_IDENTITY_NOT_FOUND), "psk identity not found"},
|
|
{ERR_REASON(SSL_R_PSK_NO_CLIENT_CB) , "psk no client cb"},
|
|
{ERR_REASON(SSL_R_PSK_NO_SERVER_CB) , "psk no server cb"},
|
|
{ERR_REASON(SSL_R_PUBLIC_KEY_ENCRYPT_ERROR), "public key encrypt error"},
|
|
{ERR_REASON(SSL_R_PUBLIC_KEY_IS_NOT_RSA) , "public key is not rsa"},
|
|
{ERR_REASON(SSL_R_PUBLIC_KEY_NOT_RSA) , "public key not rsa"},
|
|
{ERR_REASON(SSL_R_READ_BIO_NOT_SET) , "read bio not set"},
|
|
{ERR_REASON(SSL_R_READ_TIMEOUT_EXPIRED) , "read timeout expired"},
|
|
{ERR_REASON(SSL_R_READ_WRONG_PACKET_TYPE), "read wrong packet type"},
|
|
{ERR_REASON(SSL_R_RECORD_LENGTH_MISMATCH), "record length mismatch"},
|
|
{ERR_REASON(SSL_R_RECORD_TOO_LARGE) , "record too large"},
|
|
{ERR_REASON(SSL_R_RECORD_TOO_SMALL) , "record too small"},
|
|
{ERR_REASON(SSL_R_RENEGOTIATE_EXT_TOO_LONG), "renegotiate ext too long"},
|
|
{ERR_REASON(SSL_R_RENEGOTIATION_ENCODING_ERR), "renegotiation encoding err"},
|
|
{ERR_REASON(SSL_R_RENEGOTIATION_MISMATCH), "renegotiation mismatch"},
|
|
{ERR_REASON(SSL_R_REQUIRED_CIPHER_MISSING), "required cipher missing"},
|
|
{ERR_REASON(SSL_R_REQUIRED_COMPRESSSION_ALGORITHM_MISSING), "required compresssion algorithm missing"},
|
|
{ERR_REASON(SSL_R_REUSE_CERT_LENGTH_NOT_ZERO), "reuse cert length not zero"},
|
|
{ERR_REASON(SSL_R_REUSE_CERT_TYPE_NOT_ZERO), "reuse cert type not zero"},
|
|
{ERR_REASON(SSL_R_REUSE_CIPHER_LIST_NOT_ZERO), "reuse cipher list not zero"},
|
|
{ERR_REASON(SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING), "scsv received when renegotiating"},
|
|
{ERR_REASON(SSL_R_SERVERHELLO_TLSEXT) , "serverhello tlsext"},
|
|
{ERR_REASON(SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED), "session id context uninitialized"},
|
|
{ERR_REASON(SSL_R_SHORT_READ) , "short read"},
|
|
{ERR_REASON(SSL_R_SIGNATURE_ALGORITHMS_ERROR), "signature algorithms error"},
|
|
{ERR_REASON(SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE), "signature for non signing certificate"},
|
|
{ERR_REASON(SSL_R_SRP_A_CALC) , "error with the srp params"},
|
|
{ERR_REASON(SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES), "srtp could not allocate profiles"},
|
|
{ERR_REASON(SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG), "srtp protection profile list too long"},
|
|
{ERR_REASON(SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE), "srtp unknown protection profile"},
|
|
{ERR_REASON(SSL_R_SSL23_DOING_SESSION_ID_REUSE), "ssl23 doing session id reuse"},
|
|
{ERR_REASON(SSL_R_SSL2_CONNECTION_ID_TOO_LONG), "ssl2 connection id too long"},
|
|
{ERR_REASON(SSL_R_SSL3_EXT_INVALID_ECPOINTFORMAT), "ssl3 ext invalid ecpointformat"},
|
|
{ERR_REASON(SSL_R_SSL3_EXT_INVALID_SERVERNAME), "ssl3 ext invalid servername"},
|
|
{ERR_REASON(SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE), "ssl3 ext invalid servername type"},
|
|
{ERR_REASON(SSL_R_SSL3_SESSION_ID_TOO_LONG), "ssl3 session id too long"},
|
|
{ERR_REASON(SSL_R_SSL3_SESSION_ID_TOO_SHORT), "ssl3 session id too short"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_BAD_CERTIFICATE), "sslv3 alert bad certificate"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_BAD_RECORD_MAC), "sslv3 alert bad record mac"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED), "sslv3 alert certificate expired"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED), "sslv3 alert certificate revoked"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN), "sslv3 alert certificate unknown"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE), "sslv3 alert decompression failure"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE), "sslv3 alert handshake failure"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER), "sslv3 alert illegal parameter"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_NO_CERTIFICATE), "sslv3 alert no certificate"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE), "sslv3 alert unexpected message"},
|
|
{ERR_REASON(SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE), "sslv3 alert unsupported certificate"},
|
|
{ERR_REASON(SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION), "ssl ctx has no default ssl version"},
|
|
{ERR_REASON(SSL_R_SSL_HANDSHAKE_FAILURE) , "ssl handshake failure"},
|
|
{ERR_REASON(SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS), "ssl library has no ciphers"},
|
|
{ERR_REASON(SSL_R_SSL_SESSION_ID_CALLBACK_FAILED), "ssl session id callback failed"},
|
|
{ERR_REASON(SSL_R_SSL_SESSION_ID_CONFLICT), "ssl session id conflict"},
|
|
{ERR_REASON(SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG), "ssl session id context too long"},
|
|
{ERR_REASON(SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH), "ssl session id has bad length"},
|
|
{ERR_REASON(SSL_R_SSL_SESSION_ID_IS_DIFFERENT), "ssl session id is different"},
|
|
{ERR_REASON(SSL_R_SSL_SESSION_ID_TOO_LONG), "ssl session id is too long"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_ACCESS_DENIED), "tlsv1 alert access denied"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_DECODE_ERROR), "tlsv1 alert decode error"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPTION_FAILED), "tlsv1 alert decryption failed"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPT_ERROR), "tlsv1 alert decrypt error"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION), "tlsv1 alert export restriction"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_INAPPROPRIATE_FALLBACK), "tlsv1 alert inappropriate fallback"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY), "tlsv1 alert insufficient security"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_INTERNAL_ERROR), "tlsv1 alert internal error"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_NO_RENEGOTIATION), "tlsv1 alert no renegotiation"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_PROTOCOL_VERSION), "tlsv1 alert protocol version"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_RECORD_OVERFLOW), "tlsv1 alert record overflow"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_UNKNOWN_CA), "tlsv1 alert unknown ca"},
|
|
{ERR_REASON(SSL_R_TLSV1_ALERT_USER_CANCELLED), "tlsv1 alert user cancelled"},
|
|
{ERR_REASON(SSL_R_TLSV1_BAD_CERTIFICATE_HASH_VALUE), "tlsv1 bad certificate hash value"},
|
|
{ERR_REASON(SSL_R_TLSV1_BAD_CERTIFICATE_STATUS_RESPONSE), "tlsv1 bad certificate status response"},
|
|
{ERR_REASON(SSL_R_TLSV1_CERTIFICATE_UNOBTAINABLE), "tlsv1 certificate unobtainable"},
|
|
{ERR_REASON(SSL_R_TLSV1_UNRECOGNIZED_NAME), "tlsv1 unrecognized name"},
|
|
{ERR_REASON(SSL_R_TLSV1_UNSUPPORTED_EXTENSION), "tlsv1 unsupported extension"},
|
|
{ERR_REASON(SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER), "tls client cert req with anon cipher"},
|
|
{ERR_REASON(SSL_R_TLS_HEARTBEAT_PEER_DOESNT_ACCEPT), "peer does not accept heartbeats"},
|
|
{ERR_REASON(SSL_R_TLS_HEARTBEAT_PENDING) , "heartbeat request already pending"},
|
|
{ERR_REASON(SSL_R_TLS_ILLEGAL_EXPORTER_LABEL), "tls illegal exporter label"},
|
|
{ERR_REASON(SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST), "tls invalid ecpointformat list"},
|
|
{ERR_REASON(SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST), "tls peer did not respond with certificate list"},
|
|
{ERR_REASON(SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG), "tls rsa encrypted value length is wrong"},
|
|
{ERR_REASON(SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER), "tried to use unsupported cipher"},
|
|
{ERR_REASON(SSL_R_UNABLE_TO_DECODE_DH_CERTS), "unable to decode dh certs"},
|
|
{ERR_REASON(SSL_R_UNABLE_TO_DECODE_ECDH_CERTS), "unable to decode ecdh certs"},
|
|
{ERR_REASON(SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY), "unable to extract public key"},
|
|
{ERR_REASON(SSL_R_UNABLE_TO_FIND_DH_PARAMETERS), "unable to find dh parameters"},
|
|
{ERR_REASON(SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS), "unable to find ecdh parameters"},
|
|
{ERR_REASON(SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS), "unable to find public key parameters"},
|
|
{ERR_REASON(SSL_R_UNABLE_TO_FIND_SSL_METHOD), "unable to find ssl method"},
|
|
{ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL2_MD5_ROUTINES), "unable to load ssl2 md5 routines"},
|
|
{ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES), "unable to load ssl3 md5 routines"},
|
|
{ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES), "unable to load ssl3 sha1 routines"},
|
|
{ERR_REASON(SSL_R_UNEXPECTED_MESSAGE) , "unexpected message"},
|
|
{ERR_REASON(SSL_R_UNEXPECTED_RECORD) , "unexpected record"},
|
|
{ERR_REASON(SSL_R_UNINITIALIZED) , "uninitialized"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_ALERT_TYPE) , "unknown alert type"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_CERTIFICATE_TYPE), "unknown certificate type"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_CIPHER_RETURNED), "unknown cipher returned"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_CIPHER_TYPE) , "unknown cipher type"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_DIGEST) , "unknown digest"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE), "unknown key exchange type"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_PKEY_TYPE) , "unknown pkey type"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_PROTOCOL) , "unknown protocol"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_REMOTE_ERROR_TYPE), "unknown remote error type"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_SSL_VERSION) , "unknown ssl version"},
|
|
{ERR_REASON(SSL_R_UNKNOWN_STATE) , "unknown state"},
|
|
{ERR_REASON(SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED), "unsafe legacy renegotiation disabled"},
|
|
{ERR_REASON(SSL_R_UNSUPPORTED_CIPHER) , "unsupported cipher"},
|
|
{ERR_REASON(SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM), "unsupported compression algorithm"},
|
|
{ERR_REASON(SSL_R_UNSUPPORTED_DIGEST_TYPE), "unsupported digest type"},
|
|
{ERR_REASON(SSL_R_UNSUPPORTED_ELLIPTIC_CURVE), "unsupported elliptic curve"},
|
|
{ERR_REASON(SSL_R_UNSUPPORTED_PROTOCOL) , "unsupported protocol"},
|
|
{ERR_REASON(SSL_R_UNSUPPORTED_SSL_VERSION), "unsupported ssl version"},
|
|
{ERR_REASON(SSL_R_UNSUPPORTED_STATUS_TYPE), "unsupported status type"},
|
|
{ERR_REASON(SSL_R_USE_SRTP_NOT_NEGOTIATED), "use srtp not negotiated"},
|
|
{ERR_REASON(SSL_R_WRITE_BIO_NOT_SET) , "write bio not set"},
|
|
{ERR_REASON(SSL_R_WRONG_CIPHER_RETURNED) , "wrong cipher returned"},
|
|
{ERR_REASON(SSL_R_WRONG_CURVE) , "wrong curve"},
|
|
{ERR_REASON(SSL_R_WRONG_MESSAGE_TYPE) , "wrong message type"},
|
|
{ERR_REASON(SSL_R_WRONG_NUMBER_OF_KEY_BITS), "wrong number of key bits"},
|
|
{ERR_REASON(SSL_R_WRONG_SIGNATURE_LENGTH), "wrong signature length"},
|
|
{ERR_REASON(SSL_R_WRONG_SIGNATURE_SIZE) , "wrong signature size"},
|
|
{ERR_REASON(SSL_R_WRONG_SIGNATURE_TYPE) , "wrong signature type"},
|
|
{ERR_REASON(SSL_R_WRONG_SSL_VERSION) , "wrong ssl version"},
|
|
{ERR_REASON(SSL_R_WRONG_VERSION_NUMBER) , "wrong version number"},
|
|
{ERR_REASON(SSL_R_X509_LIB) , "x509 lib"},
|
|
{ERR_REASON(SSL_R_X509_VERIFICATION_SETUP_PROBLEMS), "x509 verification setup problems"},
|
|
{ERR_REASON(SSL_R_PEER_BEHAVING_BADLY), "peer is doing strange or hostile things"},
|
|
{ERR_REASON(SSL_R_UNKNOWN), "unknown failure occurred"},
|
|
{0, NULL}
|
|
};
|
|
|
|
#endif
|
|
|
|
void
|
|
ERR_load_SSL_strings(void)
|
|
{
|
|
#ifndef OPENSSL_NO_ERR
|
|
if (ERR_func_error_string(SSL_str_functs[0].error) == NULL) {
|
|
ERR_load_strings(0, SSL_str_functs);
|
|
ERR_load_strings(0, SSL_str_reasons);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
void
|
|
SSL_load_error_strings(void)
|
|
{
|
|
#ifndef OPENSSL_NO_ERR
|
|
ERR_load_crypto_strings();
|
|
ERR_load_SSL_strings();
|
|
#endif
|
|
}
|
|
|
|
int
|
|
SSL_state_func_code(int state) {
|
|
switch (state) {
|
|
case SSL3_ST_CW_FLUSH:
|
|
return 1;
|
|
case SSL3_ST_CW_CLNT_HELLO_A:
|
|
return 2;
|
|
case SSL3_ST_CW_CLNT_HELLO_B:
|
|
return 3;
|
|
case SSL3_ST_CR_SRVR_HELLO_A:
|
|
return 4;
|
|
case SSL3_ST_CR_SRVR_HELLO_B:
|
|
return 5;
|
|
case SSL3_ST_CR_CERT_A:
|
|
return 6;
|
|
case SSL3_ST_CR_CERT_B:
|
|
return 7;
|
|
case SSL3_ST_CR_KEY_EXCH_A:
|
|
return 8;
|
|
case SSL3_ST_CR_KEY_EXCH_B:
|
|
return 9;
|
|
case SSL3_ST_CR_CERT_REQ_A:
|
|
return 10;
|
|
case SSL3_ST_CR_CERT_REQ_B:
|
|
return 11;
|
|
case SSL3_ST_CR_SRVR_DONE_A:
|
|
return 12;
|
|
case SSL3_ST_CR_SRVR_DONE_B:
|
|
return 13;
|
|
case SSL3_ST_CW_CERT_A:
|
|
return 14;
|
|
case SSL3_ST_CW_CERT_B:
|
|
return 15;
|
|
case SSL3_ST_CW_CERT_C:
|
|
return 16;
|
|
case SSL3_ST_CW_CERT_D:
|
|
return 17;
|
|
case SSL3_ST_CW_KEY_EXCH_A:
|
|
return 18;
|
|
case SSL3_ST_CW_KEY_EXCH_B:
|
|
return 19;
|
|
case SSL3_ST_CW_CERT_VRFY_A:
|
|
return 20;
|
|
case SSL3_ST_CW_CERT_VRFY_B:
|
|
return 21;
|
|
case SSL3_ST_CW_CHANGE_A:
|
|
return 22;
|
|
case SSL3_ST_CW_CHANGE_B:
|
|
return 23;
|
|
case SSL3_ST_CW_FINISHED_A:
|
|
return 26;
|
|
case SSL3_ST_CW_FINISHED_B:
|
|
return 27;
|
|
case SSL3_ST_CR_CHANGE_A:
|
|
return 28;
|
|
case SSL3_ST_CR_CHANGE_B:
|
|
return 29;
|
|
case SSL3_ST_CR_FINISHED_A:
|
|
return 30;
|
|
case SSL3_ST_CR_FINISHED_B:
|
|
return 31;
|
|
case SSL3_ST_CR_SESSION_TICKET_A:
|
|
return 32;
|
|
case SSL3_ST_CR_SESSION_TICKET_B:
|
|
return 33;
|
|
case SSL3_ST_CR_CERT_STATUS_A:
|
|
return 34;
|
|
case SSL3_ST_CR_CERT_STATUS_B:
|
|
return 35;
|
|
case SSL3_ST_SW_FLUSH:
|
|
return 36;
|
|
case SSL3_ST_SR_CLNT_HELLO_A:
|
|
return 37;
|
|
case SSL3_ST_SR_CLNT_HELLO_B:
|
|
return 38;
|
|
case SSL3_ST_SR_CLNT_HELLO_C:
|
|
return 39;
|
|
case SSL3_ST_SW_HELLO_REQ_A:
|
|
return 40;
|
|
case SSL3_ST_SW_HELLO_REQ_B:
|
|
return 41;
|
|
case SSL3_ST_SW_HELLO_REQ_C:
|
|
return 42;
|
|
case SSL3_ST_SW_SRVR_HELLO_A:
|
|
return 43;
|
|
case SSL3_ST_SW_SRVR_HELLO_B:
|
|
return 44;
|
|
case SSL3_ST_SW_CERT_A:
|
|
return 45;
|
|
case SSL3_ST_SW_CERT_B:
|
|
return 46;
|
|
case SSL3_ST_SW_KEY_EXCH_A:
|
|
return 47;
|
|
case SSL3_ST_SW_KEY_EXCH_B:
|
|
return 48;
|
|
case SSL3_ST_SW_CERT_REQ_A:
|
|
return 49;
|
|
case SSL3_ST_SW_CERT_REQ_B:
|
|
return 50;
|
|
case SSL3_ST_SW_SRVR_DONE_A:
|
|
return 51;
|
|
case SSL3_ST_SW_SRVR_DONE_B:
|
|
return 52;
|
|
case SSL3_ST_SR_CERT_A:
|
|
return 53;
|
|
case SSL3_ST_SR_CERT_B:
|
|
return 54;
|
|
case SSL3_ST_SR_KEY_EXCH_A:
|
|
return 55;
|
|
case SSL3_ST_SR_KEY_EXCH_B:
|
|
return 56;
|
|
case SSL3_ST_SR_CERT_VRFY_A:
|
|
return 57;
|
|
case SSL3_ST_SR_CERT_VRFY_B:
|
|
return 58;
|
|
case SSL3_ST_SR_CHANGE_A:
|
|
return 59;
|
|
case SSL3_ST_SR_CHANGE_B:
|
|
return 60;
|
|
case SSL3_ST_SR_FINISHED_A:
|
|
return 63;
|
|
case SSL3_ST_SR_FINISHED_B:
|
|
return 64;
|
|
case SSL3_ST_SW_CHANGE_A:
|
|
return 65;
|
|
case SSL3_ST_SW_CHANGE_B:
|
|
return 66;
|
|
case SSL3_ST_SW_FINISHED_A:
|
|
return 67;
|
|
case SSL3_ST_SW_FINISHED_B:
|
|
return 68;
|
|
case SSL3_ST_SW_SESSION_TICKET_A:
|
|
return 69;
|
|
case SSL3_ST_SW_SESSION_TICKET_B:
|
|
return 70;
|
|
case SSL3_ST_SW_CERT_STATUS_A:
|
|
return 71;
|
|
case SSL3_ST_SW_CERT_STATUS_B:
|
|
return 72;
|
|
case SSL_ST_BEFORE:
|
|
return 73;
|
|
case SSL_ST_ACCEPT:
|
|
return 74;
|
|
case SSL_ST_CONNECT:
|
|
return 75;
|
|
case SSL_ST_OK:
|
|
return 76;
|
|
case SSL_ST_RENEGOTIATE:
|
|
return 77;
|
|
case SSL_ST_BEFORE|SSL_ST_CONNECT:
|
|
return 78;
|
|
case SSL_ST_OK|SSL_ST_CONNECT:
|
|
return 79;
|
|
case SSL_ST_BEFORE|SSL_ST_ACCEPT:
|
|
return 80;
|
|
case SSL_ST_OK|SSL_ST_ACCEPT:
|
|
return 81;
|
|
case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A:
|
|
return 83;
|
|
case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_B:
|
|
return 84;
|
|
case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A:
|
|
return 85;
|
|
case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B:
|
|
return 86;
|
|
default:
|
|
break;
|
|
}
|
|
return 0xfff;
|
|
}
|
|
|
|
void
|
|
SSL_error_internal(const SSL *s, int r, char *f, int l)
|
|
{
|
|
ERR_PUT_error(ERR_LIB_SSL,
|
|
(SSL_state_func_code(S3I(s)->hs.state)), r, f, l);
|
|
}
|