ssl_stat.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443
  1. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  2. * All rights reserved.
  3. *
  4. * This package is an SSL implementation written
  5. * by Eric Young (eay@cryptsoft.com).
  6. * The implementation was written so as to conform with Netscapes SSL.
  7. *
  8. * This library is free for commercial and non-commercial use as long as
  9. * the following conditions are aheared to. The following conditions
  10. * apply to all code found in this distribution, be it the RC4, RSA,
  11. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  12. * included with this distribution is covered by the same copyright terms
  13. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  14. *
  15. * Copyright remains Eric Young's, and as such any Copyright notices in
  16. * the code are not to be removed.
  17. * If this package is used in a product, Eric Young should be given attribution
  18. * as the author of the parts of the library used.
  19. * This can be in the form of a textual message at program startup or
  20. * in documentation (online or textual) provided with the package.
  21. *
  22. * Redistribution and use in source and binary forms, with or without
  23. * modification, are permitted provided that the following conditions
  24. * are met:
  25. * 1. Redistributions of source code must retain the copyright
  26. * notice, this list of conditions and the following disclaimer.
  27. * 2. Redistributions in binary form must reproduce the above copyright
  28. * notice, this list of conditions and the following disclaimer in the
  29. * documentation and/or other materials provided with the distribution.
  30. * 3. All advertising materials mentioning features or use of this software
  31. * must display the following acknowledgement:
  32. * "This product includes cryptographic software written by
  33. * Eric Young (eay@cryptsoft.com)"
  34. * The word 'cryptographic' can be left out if the rouines from the library
  35. * being used are not cryptographic related :-).
  36. * 4. If you include any Windows specific code (or a derivative thereof) from
  37. * the apps directory (application code) you must include an acknowledgement:
  38. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  39. *
  40. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  41. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  42. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  43. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  44. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  45. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  46. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  47. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  48. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  49. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  50. * SUCH DAMAGE.
  51. *
  52. * The licence and distribution terms for any publically available version or
  53. * derivative of this code cannot be changed. i.e. this code cannot simply be
  54. * copied and put under another distribution licence
  55. * [including the GNU Public Licence.]
  56. */
  57. /* ====================================================================
  58. * Copyright 2005 Nokia. All rights reserved.
  59. *
  60. * The portions of the attached software ("Contribution") is developed by
  61. * Nokia Corporation and is licensed pursuant to the OpenSSL open source
  62. * license.
  63. *
  64. * The Contribution, originally written by Mika Kousa and Pasi Eronen of
  65. * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
  66. * support (see RFC 4279) to OpenSSL.
  67. *
  68. * No patent licenses or other rights except those expressly stated in
  69. * the OpenSSL open source license shall be deemed granted or received
  70. * expressly, by implication, estoppel, or otherwise.
  71. *
  72. * No assurances are provided by Nokia that the Contribution does not
  73. * infringe the patent or other intellectual property rights of any third
  74. * party or that the license provides you with all the necessary rights
  75. * to make use of the Contribution.
  76. *
  77. * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
  78. * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
  79. * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
  80. * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
  81. * OTHERWISE.
  82. */
  83. #include <openssl/ssl.h>
  84. #include <assert.h>
  85. #include "internal.h"
  86. static int ssl_state(const SSL *ssl) {
  87. if (ssl->s3->hs == NULL) {
  88. assert(ssl->s3->initial_handshake_complete);
  89. return SSL_ST_OK;
  90. }
  91. return ssl->s3->hs->state;
  92. }
  93. const char *SSL_state_string_long(const SSL *ssl) {
  94. switch (ssl_state(ssl)) {
  95. case SSL_ST_ACCEPT:
  96. return "before accept initialization";
  97. case SSL_ST_CONNECT:
  98. return "before connect initialization";
  99. case SSL_ST_OK:
  100. return "SSL negotiation finished successfully";
  101. case SSL_ST_RENEGOTIATE:
  102. return "SSL renegotiate ciphers";
  103. /* SSLv3 additions */
  104. case SSL3_ST_CW_CLNT_HELLO_A:
  105. return "SSLv3 write client hello A";
  106. case SSL3_ST_CR_SRVR_HELLO_A:
  107. return "SSLv3 read server hello A";
  108. case SSL3_ST_CR_CERT_A:
  109. return "SSLv3 read server certificate A";
  110. case SSL3_ST_CR_KEY_EXCH_A:
  111. return "SSLv3 read server key exchange A";
  112. case SSL3_ST_CR_CERT_REQ_A:
  113. return "SSLv3 read server certificate request A";
  114. case SSL3_ST_CR_SESSION_TICKET_A:
  115. return "SSLv3 read server session ticket A";
  116. case SSL3_ST_CR_SRVR_DONE_A:
  117. return "SSLv3 read server done A";
  118. case SSL3_ST_CW_CERT_A:
  119. return "SSLv3 write client certificate A";
  120. case SSL3_ST_CW_KEY_EXCH_A:
  121. return "SSLv3 write client key exchange A";
  122. case SSL3_ST_CW_CERT_VRFY_A:
  123. return "SSLv3 write certificate verify A";
  124. case SSL3_ST_CW_CERT_VRFY_B:
  125. return "SSLv3 write certificate verify B";
  126. case SSL3_ST_CW_CHANGE:
  127. case SSL3_ST_SW_CHANGE:
  128. return "SSLv3 write change cipher spec";
  129. case SSL3_ST_CW_FINISHED_A:
  130. case SSL3_ST_SW_FINISHED_A:
  131. return "SSLv3 write finished A";
  132. case SSL3_ST_CR_CHANGE:
  133. case SSL3_ST_SR_CHANGE:
  134. return "SSLv3 read change cipher spec";
  135. case SSL3_ST_CR_FINISHED_A:
  136. case SSL3_ST_SR_FINISHED_A:
  137. return "SSLv3 read finished A";
  138. case SSL3_ST_CW_FLUSH:
  139. case SSL3_ST_SW_FLUSH:
  140. return "SSLv3 flush data";
  141. case SSL3_ST_SR_CLNT_HELLO_A:
  142. return "SSLv3 read client hello A";
  143. case SSL3_ST_SR_CLNT_HELLO_B:
  144. return "SSLv3 read client hello B";
  145. case SSL3_ST_SR_CLNT_HELLO_C:
  146. return "SSLv3 read client hello C";
  147. case SSL3_ST_SW_SRVR_HELLO_A:
  148. return "SSLv3 write server hello A";
  149. case SSL3_ST_SW_CERT_A:
  150. return "SSLv3 write certificate A";
  151. case SSL3_ST_SW_KEY_EXCH_A:
  152. return "SSLv3 write key exchange A";
  153. case SSL3_ST_SW_CERT_REQ_A:
  154. return "SSLv3 write certificate request A";
  155. case SSL3_ST_SW_SESSION_TICKET_A:
  156. return "SSLv3 write session ticket A";
  157. case SSL3_ST_SW_SRVR_DONE_A:
  158. return "SSLv3 write server done A";
  159. case SSL3_ST_SR_CERT_A:
  160. return "SSLv3 read client certificate A";
  161. case SSL3_ST_SR_KEY_EXCH_A:
  162. return "SSLv3 read client key exchange A";
  163. case SSL3_ST_SR_KEY_EXCH_B:
  164. return "SSLv3 read client key exchange B";
  165. case SSL3_ST_SR_CERT_VRFY_A:
  166. return "SSLv3 read certificate verify A";
  167. /* DTLS */
  168. case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A:
  169. return "DTLS1 read hello verify request A";
  170. default:
  171. return "unknown state";
  172. }
  173. }
  174. const char *SSL_state_string(const SSL *ssl) {
  175. switch (ssl_state(ssl)) {
  176. case SSL_ST_ACCEPT:
  177. return "AINIT ";
  178. case SSL_ST_CONNECT:
  179. return "CINIT ";
  180. case SSL_ST_OK:
  181. return "SSLOK ";
  182. /* SSLv3 additions */
  183. case SSL3_ST_SW_FLUSH:
  184. case SSL3_ST_CW_FLUSH:
  185. return "3FLUSH";
  186. case SSL3_ST_CW_CLNT_HELLO_A:
  187. return "3WCH_A";
  188. case SSL3_ST_CR_SRVR_HELLO_A:
  189. return "3RSH_A";
  190. case SSL3_ST_CR_CERT_A:
  191. return "3RSC_A";
  192. case SSL3_ST_CR_KEY_EXCH_A:
  193. return "3RSKEA";
  194. case SSL3_ST_CR_CERT_REQ_A:
  195. return "3RCR_A";
  196. case SSL3_ST_CR_SRVR_DONE_A:
  197. return "3RSD_A";
  198. case SSL3_ST_CW_CERT_A:
  199. return "3WCC_A";
  200. case SSL3_ST_CW_KEY_EXCH_A:
  201. return "3WCKEA";
  202. case SSL3_ST_CW_CERT_VRFY_A:
  203. return "3WCV_A";
  204. case SSL3_ST_CW_CERT_VRFY_B:
  205. return "3WCV_B";
  206. case SSL3_ST_SW_CHANGE:
  207. case SSL3_ST_CW_CHANGE:
  208. return "3WCCS_";
  209. case SSL3_ST_SW_FINISHED_A:
  210. case SSL3_ST_CW_FINISHED_A:
  211. return "3WFINA";
  212. case SSL3_ST_CR_CHANGE:
  213. case SSL3_ST_SR_CHANGE:
  214. return "3RCCS_";
  215. case SSL3_ST_SR_FINISHED_A:
  216. case SSL3_ST_CR_FINISHED_A:
  217. return "3RFINA";
  218. case SSL3_ST_SR_CLNT_HELLO_A:
  219. return "3RCH_A";
  220. case SSL3_ST_SR_CLNT_HELLO_B:
  221. return "3RCH_B";
  222. case SSL3_ST_SR_CLNT_HELLO_C:
  223. return "3RCH_C";
  224. case SSL3_ST_SW_SRVR_HELLO_A:
  225. return "3WSH_A";
  226. case SSL3_ST_SW_CERT_A:
  227. return "3WSC_A";
  228. case SSL3_ST_SW_KEY_EXCH_A:
  229. return "3WSKEA";
  230. case SSL3_ST_SW_KEY_EXCH_B:
  231. return "3WSKEB";
  232. case SSL3_ST_SW_CERT_REQ_A:
  233. return "3WCR_A";
  234. case SSL3_ST_SW_SRVR_DONE_A:
  235. return "3WSD_A";
  236. case SSL3_ST_SR_CERT_A:
  237. return "3RCC_A";
  238. case SSL3_ST_SR_KEY_EXCH_A:
  239. return "3RCKEA";
  240. case SSL3_ST_SR_CERT_VRFY_A:
  241. return "3RCV_A";
  242. /* DTLS */
  243. case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A:
  244. return "DRCHVA";
  245. default:
  246. return "UNKWN ";
  247. }
  248. }
  249. const char *SSL_alert_type_string_long(int value) {
  250. value >>= 8;
  251. if (value == SSL3_AL_WARNING) {
  252. return "warning";
  253. } else if (value == SSL3_AL_FATAL) {
  254. return "fatal";
  255. }
  256. return "unknown";
  257. }
  258. const char *SSL_alert_type_string(int value) {
  259. return "!";
  260. }
  261. const char *SSL_alert_desc_string(int value) {
  262. return "!!";
  263. }
  264. const char *SSL_alert_desc_string_long(int value) {
  265. switch (value & 0xff) {
  266. case SSL3_AD_CLOSE_NOTIFY:
  267. return "close notify";
  268. case SSL3_AD_UNEXPECTED_MESSAGE:
  269. return "unexpected_message";
  270. case SSL3_AD_BAD_RECORD_MAC:
  271. return "bad record mac";
  272. case SSL3_AD_DECOMPRESSION_FAILURE:
  273. return "decompression failure";
  274. case SSL3_AD_HANDSHAKE_FAILURE:
  275. return "handshake failure";
  276. case SSL3_AD_NO_CERTIFICATE:
  277. return "no certificate";
  278. case SSL3_AD_BAD_CERTIFICATE:
  279. return "bad certificate";
  280. case SSL3_AD_UNSUPPORTED_CERTIFICATE:
  281. return "unsupported certificate";
  282. case SSL3_AD_CERTIFICATE_REVOKED:
  283. return "certificate revoked";
  284. case SSL3_AD_CERTIFICATE_EXPIRED:
  285. return "certificate expired";
  286. case SSL3_AD_CERTIFICATE_UNKNOWN:
  287. return "certificate unknown";
  288. case SSL3_AD_ILLEGAL_PARAMETER:
  289. return "illegal parameter";
  290. case TLS1_AD_DECRYPTION_FAILED:
  291. return "decryption failed";
  292. case TLS1_AD_RECORD_OVERFLOW:
  293. return "record overflow";
  294. case TLS1_AD_UNKNOWN_CA:
  295. return "unknown CA";
  296. case TLS1_AD_ACCESS_DENIED:
  297. return "access denied";
  298. case TLS1_AD_DECODE_ERROR:
  299. return "decode error";
  300. case TLS1_AD_DECRYPT_ERROR:
  301. return "decrypt error";
  302. case TLS1_AD_EXPORT_RESTRICTION:
  303. return "export restriction";
  304. case TLS1_AD_PROTOCOL_VERSION:
  305. return "protocol version";
  306. case TLS1_AD_INSUFFICIENT_SECURITY:
  307. return "insufficient security";
  308. case TLS1_AD_INTERNAL_ERROR:
  309. return "internal error";
  310. case SSL3_AD_INAPPROPRIATE_FALLBACK:
  311. return "inappropriate fallback";
  312. case TLS1_AD_USER_CANCELLED:
  313. return "user canceled";
  314. case TLS1_AD_NO_RENEGOTIATION:
  315. return "no renegotiation";
  316. case TLS1_AD_UNSUPPORTED_EXTENSION:
  317. return "unsupported extension";
  318. case TLS1_AD_CERTIFICATE_UNOBTAINABLE:
  319. return "certificate unobtainable";
  320. case TLS1_AD_UNRECOGNIZED_NAME:
  321. return "unrecognized name";
  322. case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE:
  323. return "bad certificate status response";
  324. case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE:
  325. return "bad certificate hash value";
  326. case TLS1_AD_UNKNOWN_PSK_IDENTITY:
  327. return "unknown PSK identity";
  328. case TLS1_AD_CERTIFICATE_REQUIRED:
  329. return "certificate required";
  330. default:
  331. return "unknown";
  332. }
  333. }