GCC Code Coverage Report | |||||||||||||||||||||
|
|||||||||||||||||||||
Line | Branch | Exec | Source |
1 |
/* $OpenBSD: ssl_err.c,v 1.35 2017/08/28 17:36:58 jsing Exp $ */ |
||
2 |
/* ==================================================================== |
||
3 |
* Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. |
||
4 |
* |
||
5 |
* Redistribution and use in source and binary forms, with or without |
||
6 |
* modification, are permitted provided that the following conditions |
||
7 |
* are met: |
||
8 |
* |
||
9 |
* 1. Redistributions of source code must retain the above copyright |
||
10 |
* notice, this list of conditions and the following disclaimer. |
||
11 |
* |
||
12 |
* 2. Redistributions in binary form must reproduce the above copyright |
||
13 |
* notice, this list of conditions and the following disclaimer in |
||
14 |
* the documentation and/or other materials provided with the |
||
15 |
* distribution. |
||
16 |
* |
||
17 |
* 3. All advertising materials mentioning features or use of this |
||
18 |
* software must display the following acknowledgment: |
||
19 |
* "This product includes software developed by the OpenSSL Project |
||
20 |
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" |
||
21 |
* |
||
22 |
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
||
23 |
* endorse or promote products derived from this software without |
||
24 |
* prior written permission. For written permission, please contact |
||
25 |
* openssl-core@OpenSSL.org. |
||
26 |
* |
||
27 |
* 5. Products derived from this software may not be called "OpenSSL" |
||
28 |
* nor may "OpenSSL" appear in their names without prior written |
||
29 |
* permission of the OpenSSL Project. |
||
30 |
* |
||
31 |
* 6. Redistributions of any form whatsoever must retain the following |
||
32 |
* acknowledgment: |
||
33 |
* "This product includes software developed by the OpenSSL Project |
||
34 |
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" |
||
35 |
* |
||
36 |
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
||
37 |
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
||
38 |
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
||
39 |
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
||
40 |
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
||
41 |
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
||
42 |
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
||
43 |
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
||
44 |
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
||
45 |
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
||
46 |
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
||
47 |
* OF THE POSSIBILITY OF SUCH DAMAGE. |
||
48 |
* ==================================================================== |
||
49 |
* |
||
50 |
* This product includes cryptographic software written by Eric Young |
||
51 |
* (eay@cryptsoft.com). This product includes software written by Tim |
||
52 |
* Hudson (tjh@cryptsoft.com). |
||
53 |
* |
||
54 |
*/ |
||
55 |
|||
56 |
/* NOTE: this file was auto generated by the mkerr.pl script: any changes |
||
57 |
* made to it will be overwritten when the script next updates this file, |
||
58 |
* only reason strings will be preserved. |
||
59 |
*/ |
||
60 |
|||
61 |
#include <stdio.h> |
||
62 |
|||
63 |
#include <openssl/err.h> |
||
64 |
#include <openssl/ssl.h> |
||
65 |
|||
66 |
#include "ssl_locl.h" |
||
67 |
|||
68 |
/* BEGIN ERROR CODES */ |
||
69 |
#ifndef OPENSSL_NO_ERR |
||
70 |
|||
71 |
#define ERR_FUNC(func) ERR_PACK(ERR_LIB_SSL,func,0) |
||
72 |
#define ERR_REASON(reason) ERR_PACK(ERR_LIB_SSL,0,reason) |
||
73 |
|||
74 |
/* See SSL_state_func_code below */ |
||
75 |
static ERR_STRING_DATA SSL_str_functs[]= { |
||
76 |
{ERR_FUNC(1), "CONNECT_CW_FLUSH"}, |
||
77 |
{ERR_FUNC(2), "CONNECT_CW_CLNT_HELLO"}, |
||
78 |
{ERR_FUNC(3), "CONNECT_CW_CLNT_HELLO"}, |
||
79 |
{ERR_FUNC(4), "CONNECT_CR_SRVR_HELLO"}, |
||
80 |
{ERR_FUNC(5), "CONNECT_CR_SRVR_HELLO"}, |
||
81 |
{ERR_FUNC(6), "CONNECT_CR_CERT"}, |
||
82 |
{ERR_FUNC(7), "CONNECT_CR_CERT"}, |
||
83 |
{ERR_FUNC(8), "CONNECT_CR_KEY_EXCH"}, |
||
84 |
{ERR_FUNC(9), "CONNECT_CR_KEY_EXCH"}, |
||
85 |
{ERR_FUNC(10), "CONNECT_CR_CERT_REQ"}, |
||
86 |
{ERR_FUNC(11), "CONNECT_CR_CERT_REQ"}, |
||
87 |
{ERR_FUNC(12), "CONNECT_CR_SRVR_DONE"}, |
||
88 |
{ERR_FUNC(13), "CONNECT_CR_SRVR_DONE"}, |
||
89 |
{ERR_FUNC(14), "CONNECT_CW_CERT"}, |
||
90 |
{ERR_FUNC(15), "CONNECT_CW_CERT"}, |
||
91 |
{ERR_FUNC(16), "CONNECT_CW_CERT_C"}, |
||
92 |
{ERR_FUNC(17), "CONNECT_CW_CERT_D"}, |
||
93 |
{ERR_FUNC(18), "CONNECT_CW_KEY_EXCH"}, |
||
94 |
{ERR_FUNC(19), "CONNECT_CW_KEY_EXCH"}, |
||
95 |
{ERR_FUNC(20), "CONNECT_CW_CERT_VRFY"}, |
||
96 |
{ERR_FUNC(21), "CONNECT_CW_CERT_VRFY"}, |
||
97 |
{ERR_FUNC(22), "CONNECT_CW_CHANGE"}, |
||
98 |
{ERR_FUNC(23), "CONNECT_CW_CHANGE"}, |
||
99 |
{ERR_FUNC(26), "CONNECT_CW_FINISHED"}, |
||
100 |
{ERR_FUNC(27), "CONNECT_CW_FINISHED"}, |
||
101 |
{ERR_FUNC(28), "CONNECT_CR_CHANGE"}, |
||
102 |
{ERR_FUNC(29), "CONNECT_CR_CHANGE"}, |
||
103 |
{ERR_FUNC(30), "CONNECT_CR_FINISHED"}, |
||
104 |
{ERR_FUNC(31), "CONNECT_CR_FINISHED"}, |
||
105 |
{ERR_FUNC(32), "CONNECT_CR_SESSION_TICKET"}, |
||
106 |
{ERR_FUNC(33), "CONNECT_CR_SESSION_TICKET"}, |
||
107 |
{ERR_FUNC(34), "CONNECT_CR_CERT_STATUS"}, |
||
108 |
{ERR_FUNC(35), "CONNECT_CR_CERT_STATUS"}, |
||
109 |
{ERR_FUNC(36), "ACCEPT_SW_FLUSH"}, |
||
110 |
{ERR_FUNC(37), "ACCEPT_SR_CLNT_HELLO"}, |
||
111 |
{ERR_FUNC(38), "ACCEPT_SR_CLNT_HELLO"}, |
||
112 |
{ERR_FUNC(39), "ACCEPT_SR_CLNT_HELLO_C"}, |
||
113 |
{ERR_FUNC(40), "ACCEPT_SW_HELLO_REQ"}, |
||
114 |
{ERR_FUNC(41), "ACCEPT_SW_HELLO_REQ"}, |
||
115 |
{ERR_FUNC(42), "ACCEPT_SW_HELLO_REQ_C"}, |
||
116 |
{ERR_FUNC(43), "ACCEPT_SW_SRVR_HELLO"}, |
||
117 |
{ERR_FUNC(44), "ACCEPT_SW_SRVR_HELLO"}, |
||
118 |
{ERR_FUNC(45), "ACCEPT_SW_CERT"}, |
||
119 |
{ERR_FUNC(46), "ACCEPT_SW_CERT"}, |
||
120 |
{ERR_FUNC(47), "ACCEPT_SW_KEY_EXCH"}, |
||
121 |
{ERR_FUNC(48), "ACCEPT_SW_KEY_EXCH"}, |
||
122 |
{ERR_FUNC(49), "ACCEPT_SW_CERT_REQ"}, |
||
123 |
{ERR_FUNC(50), "ACCEPT_SW_CERT_REQ"}, |
||
124 |
{ERR_FUNC(51), "ACCEPT_SW_SRVR_DONE"}, |
||
125 |
{ERR_FUNC(52), "ACCEPT_SW_SRVR_DONE"}, |
||
126 |
{ERR_FUNC(53), "ACCEPT_SR_CERT"}, |
||
127 |
{ERR_FUNC(54), "ACCEPT_SR_CERT"}, |
||
128 |
{ERR_FUNC(55), "ACCEPT_SR_KEY_EXCH"}, |
||
129 |
{ERR_FUNC(56), "ACCEPT_SR_KEY_EXCH"}, |
||
130 |
{ERR_FUNC(57), "ACCEPT_SR_CERT_VRFY"}, |
||
131 |
{ERR_FUNC(58), "ACCEPT_SR_CERT_VRFY"}, |
||
132 |
{ERR_FUNC(59), "ACCEPT_SR_CHANGE"}, |
||
133 |
{ERR_FUNC(60), "ACCEPT_SR_CHANGE"}, |
||
134 |
{ERR_FUNC(63), "ACCEPT_SR_FINISHED"}, |
||
135 |
{ERR_FUNC(64), "ACCEPT_SR_FINISHED"}, |
||
136 |
{ERR_FUNC(65), "ACCEPT_SW_CHANGE"}, |
||
137 |
{ERR_FUNC(66), "ACCEPT_SW_CHANGE"}, |
||
138 |
{ERR_FUNC(67), "ACCEPT_SW_FINISHED"}, |
||
139 |
{ERR_FUNC(68), "ACCEPT_SW_FINISHED"}, |
||
140 |
{ERR_FUNC(69), "ACCEPT_SW_SESSION_TICKET"}, |
||
141 |
{ERR_FUNC(70), "ACCEPT_SW_SESSION_TICKET"}, |
||
142 |
{ERR_FUNC(71), "ACCEPT_SW_CERT_STATUS"}, |
||
143 |
{ERR_FUNC(72), "ACCEPT_SW_CERT_STATUS"}, |
||
144 |
{ERR_FUNC(73), "ST_BEFORE"}, |
||
145 |
{ERR_FUNC(74), "ST_ACCEPT"}, |
||
146 |
{ERR_FUNC(75), "ST_CONNECT"}, |
||
147 |
{ERR_FUNC(76), "ST_OK"}, |
||
148 |
{ERR_FUNC(77), "ST_RENEGOTIATE"}, |
||
149 |
{ERR_FUNC(78), "ST_BEFORE_CONNECT"}, |
||
150 |
{ERR_FUNC(79), "ST_OK_CONNECT"}, |
||
151 |
{ERR_FUNC(80), "ST_BEFORE_ACCEPT"}, |
||
152 |
{ERR_FUNC(81), "ST_OK_ACCEPT"}, |
||
153 |
{ERR_FUNC(83), "DTLS1_ST_CR_HELLO_VERIFY_REQUEST"}, |
||
154 |
{ERR_FUNC(84), "DTLS1_ST_CR_HELLO_VERIFY_REQUEST"}, |
||
155 |
{ERR_FUNC(85), "DTLS1_ST_SW_HELLO_VERIFY_REQUEST"}, |
||
156 |
{ERR_FUNC(86), "DTLS1_ST_SW_HELLO_VERIFY_REQUEST"}, |
||
157 |
{ERR_FUNC(0xfff), "(UNKNOWN)SSL_internal"}, |
||
158 |
{0, NULL} |
||
159 |
}; |
||
160 |
|||
161 |
static ERR_STRING_DATA SSL_str_reasons[]= { |
||
162 |
{ERR_REASON(SSL_R_APP_DATA_IN_HANDSHAKE) , "app data in handshake"}, |
||
163 |
{ERR_REASON(SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT), "attempt to reuse session in different context"}, |
||
164 |
{ERR_REASON(SSL_R_BAD_ALERT_RECORD) , "bad alert record"}, |
||
165 |
{ERR_REASON(SSL_R_BAD_AUTHENTICATION_TYPE), "bad authentication type"}, |
||
166 |
{ERR_REASON(SSL_R_BAD_CHANGE_CIPHER_SPEC), "bad change cipher spec"}, |
||
167 |
{ERR_REASON(SSL_R_BAD_CHECKSUM) , "bad checksum"}, |
||
168 |
{ERR_REASON(SSL_R_BAD_DATA_RETURNED_BY_CALLBACK), "bad data returned by callback"}, |
||
169 |
{ERR_REASON(SSL_R_BAD_DECOMPRESSION) , "bad decompression"}, |
||
170 |
{ERR_REASON(SSL_R_BAD_DH_G_LENGTH) , "bad dh g length"}, |
||
171 |
{ERR_REASON(SSL_R_BAD_DH_PUB_KEY_LENGTH) , "bad dh pub key length"}, |
||
172 |
{ERR_REASON(SSL_R_BAD_DH_P_LENGTH) , "bad dh p length"}, |
||
173 |
{ERR_REASON(SSL_R_BAD_DIGEST_LENGTH) , "bad digest length"}, |
||
174 |
{ERR_REASON(SSL_R_BAD_DSA_SIGNATURE) , "bad dsa signature"}, |
||
175 |
{ERR_REASON(SSL_R_BAD_ECC_CERT) , "bad ecc cert"}, |
||
176 |
{ERR_REASON(SSL_R_BAD_ECDSA_SIGNATURE) , "bad ecdsa signature"}, |
||
177 |
{ERR_REASON(SSL_R_BAD_ECPOINT) , "bad ecpoint"}, |
||
178 |
{ERR_REASON(SSL_R_BAD_HANDSHAKE_LENGTH) , "bad handshake length"}, |
||
179 |
{ERR_REASON(SSL_R_BAD_HELLO_REQUEST) , "bad hello request"}, |
||
180 |
{ERR_REASON(SSL_R_BAD_LENGTH) , "bad length"}, |
||
181 |
{ERR_REASON(SSL_R_BAD_MAC_DECODE) , "bad mac decode"}, |
||
182 |
{ERR_REASON(SSL_R_BAD_MAC_LENGTH) , "bad mac length"}, |
||
183 |
{ERR_REASON(SSL_R_BAD_MESSAGE_TYPE) , "bad message type"}, |
||
184 |
{ERR_REASON(SSL_R_BAD_PACKET_LENGTH) , "bad packet length"}, |
||
185 |
{ERR_REASON(SSL_R_BAD_PROTOCOL_VERSION_NUMBER), "bad protocol version number"}, |
||
186 |
{ERR_REASON(SSL_R_BAD_PSK_IDENTITY_HINT_LENGTH), "bad psk identity hint length"}, |
||
187 |
{ERR_REASON(SSL_R_BAD_RESPONSE_ARGUMENT) , "bad response argument"}, |
||
188 |
{ERR_REASON(SSL_R_BAD_RSA_DECRYPT) , "bad rsa decrypt"}, |
||
189 |
{ERR_REASON(SSL_R_BAD_RSA_ENCRYPT) , "bad rsa encrypt"}, |
||
190 |
{ERR_REASON(SSL_R_BAD_RSA_E_LENGTH) , "bad rsa e length"}, |
||
191 |
{ERR_REASON(SSL_R_BAD_RSA_MODULUS_LENGTH), "bad rsa modulus length"}, |
||
192 |
{ERR_REASON(SSL_R_BAD_RSA_SIGNATURE) , "bad rsa signature"}, |
||
193 |
{ERR_REASON(SSL_R_BAD_SIGNATURE) , "bad signature"}, |
||
194 |
{ERR_REASON(SSL_R_BAD_SRP_A_LENGTH) , "bad srp a length"}, |
||
195 |
{ERR_REASON(SSL_R_BAD_SRP_B_LENGTH) , "bad srp b length"}, |
||
196 |
{ERR_REASON(SSL_R_BAD_SRP_G_LENGTH) , "bad srp g length"}, |
||
197 |
{ERR_REASON(SSL_R_BAD_SRP_N_LENGTH) , "bad srp n length"}, |
||
198 |
{ERR_REASON(SSL_R_BAD_SRP_S_LENGTH) , "bad srp s length"}, |
||
199 |
{ERR_REASON(SSL_R_BAD_SRTP_MKI_VALUE) , "bad srtp mki value"}, |
||
200 |
{ERR_REASON(SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST), "bad srtp protection profile list"}, |
||
201 |
{ERR_REASON(SSL_R_BAD_SSL_FILETYPE) , "bad ssl filetype"}, |
||
202 |
{ERR_REASON(SSL_R_BAD_SSL_SESSION_ID_LENGTH), "bad ssl session id length"}, |
||
203 |
{ERR_REASON(SSL_R_BAD_STATE) , "bad state"}, |
||
204 |
{ERR_REASON(SSL_R_BAD_WRITE_RETRY) , "bad write retry"}, |
||
205 |
{ERR_REASON(SSL_R_BIO_NOT_SET) , "bio not set"}, |
||
206 |
{ERR_REASON(SSL_R_BLOCK_CIPHER_PAD_IS_WRONG), "block cipher pad is wrong"}, |
||
207 |
{ERR_REASON(SSL_R_BN_LIB) , "bn lib"}, |
||
208 |
{ERR_REASON(SSL_R_CA_DN_LENGTH_MISMATCH) , "ca dn length mismatch"}, |
||
209 |
{ERR_REASON(SSL_R_CA_DN_TOO_LONG) , "ca dn too long"}, |
||
210 |
{ERR_REASON(SSL_R_CCS_RECEIVED_EARLY) , "ccs received early"}, |
||
211 |
{ERR_REASON(SSL_R_CERTIFICATE_VERIFY_FAILED), "certificate verify failed"}, |
||
212 |
{ERR_REASON(SSL_R_CERT_LENGTH_MISMATCH) , "cert length mismatch"}, |
||
213 |
{ERR_REASON(SSL_R_CHALLENGE_IS_DIFFERENT), "challenge is different"}, |
||
214 |
{ERR_REASON(SSL_R_CIPHER_CODE_WRONG_LENGTH), "cipher code wrong length"}, |
||
215 |
{ERR_REASON(SSL_R_CIPHER_COMPRESSION_UNAVAILABLE), "cipher compression unavailable"}, |
||
216 |
{ERR_REASON(SSL_R_CIPHER_OR_HASH_UNAVAILABLE), "cipher or hash unavailable"}, |
||
217 |
{ERR_REASON(SSL_R_CIPHER_TABLE_SRC_ERROR), "cipher table src error"}, |
||
218 |
{ERR_REASON(SSL_R_CLIENTHELLO_TLSEXT) , "clienthello tlsext"}, |
||
219 |
{ERR_REASON(SSL_R_COMPRESSED_LENGTH_TOO_LONG), "compressed length too long"}, |
||
220 |
{ERR_REASON(SSL_R_COMPRESSION_DISABLED) , "compression disabled"}, |
||
221 |
{ERR_REASON(SSL_R_COMPRESSION_FAILURE) , "compression failure"}, |
||
222 |
{ERR_REASON(SSL_R_COMPRESSION_ID_NOT_WITHIN_PRIVATE_RANGE), "compression id not within private range"}, |
||
223 |
{ERR_REASON(SSL_R_COMPRESSION_LIBRARY_ERROR), "compression library error"}, |
||
224 |
{ERR_REASON(SSL_R_CONNECTION_ID_IS_DIFFERENT), "connection id is different"}, |
||
225 |
{ERR_REASON(SSL_R_CONNECTION_TYPE_NOT_SET), "connection type not set"}, |
||
226 |
{ERR_REASON(SSL_R_COOKIE_MISMATCH) , "cookie mismatch"}, |
||
227 |
{ERR_REASON(SSL_R_DATA_BETWEEN_CCS_AND_FINISHED), "data between ccs and finished"}, |
||
228 |
{ERR_REASON(SSL_R_DATA_LENGTH_TOO_LONG) , "data length too long"}, |
||
229 |
{ERR_REASON(SSL_R_DECRYPTION_FAILED) , "decryption failed"}, |
||
230 |
{ERR_REASON(SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC), "decryption failed or bad record mac"}, |
||
231 |
{ERR_REASON(SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG), "dh public value length is wrong"}, |
||
232 |
{ERR_REASON(SSL_R_DIGEST_CHECK_FAILED) , "digest check failed"}, |
||
233 |
{ERR_REASON(SSL_R_DTLS_MESSAGE_TOO_BIG) , "dtls message too big"}, |
||
234 |
{ERR_REASON(SSL_R_DUPLICATE_COMPRESSION_ID), "duplicate compression id"}, |
||
235 |
{ERR_REASON(SSL_R_ECC_CERT_NOT_FOR_KEY_AGREEMENT), "ecc cert not for key agreement"}, |
||
236 |
{ERR_REASON(SSL_R_ECC_CERT_NOT_FOR_SIGNING), "ecc cert not for signing"}, |
||
237 |
{ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE), "ecc cert should have rsa signature"}, |
||
238 |
{ERR_REASON(SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE), "ecc cert should have sha1 signature"}, |
||
239 |
{ERR_REASON(SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER), "ecgroup too large for cipher"}, |
||
240 |
{ERR_REASON(SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST), "empty srtp protection profile list"}, |
||
241 |
{ERR_REASON(SSL_R_ENCRYPTED_LENGTH_TOO_LONG), "encrypted length too long"}, |
||
242 |
{ERR_REASON(SSL_R_ERROR_GENERATING_TMP_RSA_KEY), "error generating tmp rsa key"}, |
||
243 |
{ERR_REASON(SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST), "error in received cipher list"}, |
||
244 |
{ERR_REASON(SSL_R_EXCESSIVE_MESSAGE_SIZE), "excessive message size"}, |
||
245 |
{ERR_REASON(SSL_R_EXTRA_DATA_IN_MESSAGE) , "extra data in message"}, |
||
246 |
{ERR_REASON(SSL_R_GOT_A_FIN_BEFORE_A_CCS), "got a fin before a ccs"}, |
||
247 |
{ERR_REASON(SSL_R_GOT_NEXT_PROTO_BEFORE_A_CCS), "got next proto before a ccs"}, |
||
248 |
{ERR_REASON(SSL_R_GOT_NEXT_PROTO_WITHOUT_EXTENSION), "got next proto without seeing extension"}, |
||
249 |
{ERR_REASON(SSL_R_HTTPS_PROXY_REQUEST) , "https proxy request"}, |
||
250 |
{ERR_REASON(SSL_R_HTTP_REQUEST) , "http request"}, |
||
251 |
{ERR_REASON(SSL_R_ILLEGAL_PADDING) , "illegal padding"}, |
||
252 |
{ERR_REASON(SSL_R_INAPPROPRIATE_FALLBACK), "inappropriate fallback"}, |
||
253 |
{ERR_REASON(SSL_R_INCONSISTENT_COMPRESSION), "inconsistent compression"}, |
||
254 |
{ERR_REASON(SSL_R_INVALID_CHALLENGE_LENGTH), "invalid challenge length"}, |
||
255 |
{ERR_REASON(SSL_R_INVALID_COMMAND) , "invalid command"}, |
||
256 |
{ERR_REASON(SSL_R_INVALID_COMPRESSION_ALGORITHM), "invalid compression algorithm"}, |
||
257 |
{ERR_REASON(SSL_R_INVALID_PURPOSE) , "invalid purpose"}, |
||
258 |
{ERR_REASON(SSL_R_INVALID_SRP_USERNAME) , "invalid srp username"}, |
||
259 |
{ERR_REASON(SSL_R_INVALID_STATUS_RESPONSE), "invalid status response"}, |
||
260 |
{ERR_REASON(SSL_R_INVALID_TICKET_KEYS_LENGTH), "invalid ticket keys length"}, |
||
261 |
{ERR_REASON(SSL_R_INVALID_TRUST) , "invalid trust"}, |
||
262 |
{ERR_REASON(SSL_R_KEY_ARG_TOO_LONG) , "key arg too long"}, |
||
263 |
{ERR_REASON(SSL_R_KRB5) , "krb5"}, |
||
264 |
{ERR_REASON(SSL_R_KRB5_C_CC_PRINC) , "krb5 client cc principal (no tkt?)"}, |
||
265 |
{ERR_REASON(SSL_R_KRB5_C_GET_CRED) , "krb5 client get cred"}, |
||
266 |
{ERR_REASON(SSL_R_KRB5_C_INIT) , "krb5 client init"}, |
||
267 |
{ERR_REASON(SSL_R_KRB5_C_MK_REQ) , "krb5 client mk_req (expired tkt?)"}, |
||
268 |
{ERR_REASON(SSL_R_KRB5_S_BAD_TICKET) , "krb5 server bad ticket"}, |
||
269 |
{ERR_REASON(SSL_R_KRB5_S_INIT) , "krb5 server init"}, |
||
270 |
{ERR_REASON(SSL_R_KRB5_S_RD_REQ) , "krb5 server rd_req (keytab perms?)"}, |
||
271 |
{ERR_REASON(SSL_R_KRB5_S_TKT_EXPIRED) , "krb5 server tkt expired"}, |
||
272 |
{ERR_REASON(SSL_R_KRB5_S_TKT_NYV) , "krb5 server tkt not yet valid"}, |
||
273 |
{ERR_REASON(SSL_R_KRB5_S_TKT_SKEW) , "krb5 server tkt skew"}, |
||
274 |
{ERR_REASON(SSL_R_LENGTH_MISMATCH) , "length mismatch"}, |
||
275 |
{ERR_REASON(SSL_R_LENGTH_TOO_SHORT) , "length too short"}, |
||
276 |
{ERR_REASON(SSL_R_LIBRARY_BUG) , "library bug"}, |
||
277 |
{ERR_REASON(SSL_R_LIBRARY_HAS_NO_CIPHERS), "library has no ciphers"}, |
||
278 |
{ERR_REASON(SSL_R_MESSAGE_TOO_LONG) , "message too long"}, |
||
279 |
{ERR_REASON(SSL_R_MISSING_DH_DSA_CERT) , "missing dh dsa cert"}, |
||
280 |
{ERR_REASON(SSL_R_MISSING_DH_KEY) , "missing dh key"}, |
||
281 |
{ERR_REASON(SSL_R_MISSING_DH_RSA_CERT) , "missing dh rsa cert"}, |
||
282 |
{ERR_REASON(SSL_R_MISSING_DSA_SIGNING_CERT), "missing dsa signing cert"}, |
||
283 |
{ERR_REASON(SSL_R_MISSING_EXPORT_TMP_DH_KEY), "missing export tmp dh key"}, |
||
284 |
{ERR_REASON(SSL_R_MISSING_EXPORT_TMP_RSA_KEY), "missing export tmp rsa key"}, |
||
285 |
{ERR_REASON(SSL_R_MISSING_RSA_CERTIFICATE), "missing rsa certificate"}, |
||
286 |
{ERR_REASON(SSL_R_MISSING_RSA_ENCRYPTING_CERT), "missing rsa encrypting cert"}, |
||
287 |
{ERR_REASON(SSL_R_MISSING_RSA_SIGNING_CERT), "missing rsa signing cert"}, |
||
288 |
{ERR_REASON(SSL_R_MISSING_SRP_PARAM) , "can't find SRP server param"}, |
||
289 |
{ERR_REASON(SSL_R_MISSING_TMP_DH_KEY) , "missing tmp dh key"}, |
||
290 |
{ERR_REASON(SSL_R_MISSING_TMP_ECDH_KEY) , "missing tmp ecdh key"}, |
||
291 |
{ERR_REASON(SSL_R_MISSING_TMP_RSA_KEY) , "missing tmp rsa key"}, |
||
292 |
{ERR_REASON(SSL_R_MISSING_TMP_RSA_PKEY) , "missing tmp rsa pkey"}, |
||
293 |
{ERR_REASON(SSL_R_MISSING_VERIFY_MESSAGE), "missing verify message"}, |
||
294 |
{ERR_REASON(SSL_R_MULTIPLE_SGC_RESTARTS) , "multiple sgc restarts"}, |
||
295 |
{ERR_REASON(SSL_R_NON_SSLV2_INITIAL_PACKET), "non sslv2 initial packet"}, |
||
296 |
{ERR_REASON(SSL_R_NO_CERTIFICATES_RETURNED), "no certificates returned"}, |
||
297 |
{ERR_REASON(SSL_R_NO_CERTIFICATE_ASSIGNED), "no certificate assigned"}, |
||
298 |
{ERR_REASON(SSL_R_NO_CERTIFICATE_RETURNED), "no certificate returned"}, |
||
299 |
{ERR_REASON(SSL_R_NO_CERTIFICATE_SET) , "no certificate set"}, |
||
300 |
{ERR_REASON(SSL_R_NO_CERTIFICATE_SPECIFIED), "no certificate specified"}, |
||
301 |
{ERR_REASON(SSL_R_NO_CIPHERS_AVAILABLE) , "no ciphers available"}, |
||
302 |
{ERR_REASON(SSL_R_NO_CIPHERS_PASSED) , "no ciphers passed"}, |
||
303 |
{ERR_REASON(SSL_R_NO_CIPHERS_SPECIFIED) , "no ciphers specified"}, |
||
304 |
{ERR_REASON(SSL_R_NO_CIPHER_LIST) , "no cipher list"}, |
||
305 |
{ERR_REASON(SSL_R_NO_CIPHER_MATCH) , "no cipher match"}, |
||
306 |
{ERR_REASON(SSL_R_NO_CLIENT_CERT_METHOD) , "no client cert method"}, |
||
307 |
{ERR_REASON(SSL_R_NO_CLIENT_CERT_RECEIVED), "no client cert received"}, |
||
308 |
{ERR_REASON(SSL_R_NO_COMPRESSION_SPECIFIED), "no compression specified"}, |
||
309 |
{ERR_REASON(SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER), "Peer haven't sent GOST certificate, required for selected ciphersuite"}, |
||
310 |
{ERR_REASON(SSL_R_NO_METHOD_SPECIFIED) , "no method specified"}, |
||
311 |
{ERR_REASON(SSL_R_NO_PRIVATEKEY) , "no privatekey"}, |
||
312 |
{ERR_REASON(SSL_R_NO_PRIVATE_KEY_ASSIGNED), "no private key assigned"}, |
||
313 |
{ERR_REASON(SSL_R_NO_PROTOCOLS_AVAILABLE), "no protocols available"}, |
||
314 |
{ERR_REASON(SSL_R_NO_PUBLICKEY) , "no publickey"}, |
||
315 |
{ERR_REASON(SSL_R_NO_RENEGOTIATION) , "no renegotiation"}, |
||
316 |
{ERR_REASON(SSL_R_NO_REQUIRED_DIGEST) , "digest requred for handshake isn't computed"}, |
||
317 |
{ERR_REASON(SSL_R_NO_SHARED_CIPHER) , "no shared cipher"}, |
||
318 |
{ERR_REASON(SSL_R_NO_SRTP_PROFILES) , "no srtp profiles"}, |
||
319 |
{ERR_REASON(SSL_R_NO_VERIFY_CALLBACK) , "no verify callback"}, |
||
320 |
{ERR_REASON(SSL_R_NULL_SSL_CTX) , "null ssl ctx"}, |
||
321 |
{ERR_REASON(SSL_R_NULL_SSL_METHOD_PASSED), "null ssl method passed"}, |
||
322 |
{ERR_REASON(SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED), "old session cipher not returned"}, |
||
323 |
{ERR_REASON(SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED), "old session compression algorithm not returned"}, |
||
324 |
{ERR_REASON(SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE), "only tls allowed in fips mode"}, |
||
325 |
{ERR_REASON(SSL_R_PACKET_LENGTH_TOO_LONG), "packet length too long"}, |
||
326 |
{ERR_REASON(SSL_R_PARSE_TLSEXT) , "parse tlsext"}, |
||
327 |
{ERR_REASON(SSL_R_PATH_TOO_LONG) , "path too long"}, |
||
328 |
{ERR_REASON(SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE), "peer did not return a certificate"}, |
||
329 |
{ERR_REASON(SSL_R_PEER_ERROR) , "peer error"}, |
||
330 |
{ERR_REASON(SSL_R_PEER_ERROR_CERTIFICATE), "peer error certificate"}, |
||
331 |
{ERR_REASON(SSL_R_PEER_ERROR_NO_CERTIFICATE), "peer error no certificate"}, |
||
332 |
{ERR_REASON(SSL_R_PEER_ERROR_NO_CIPHER) , "peer error no cipher"}, |
||
333 |
{ERR_REASON(SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE), "peer error unsupported certificate type"}, |
||
334 |
{ERR_REASON(SSL_R_PRE_MAC_LENGTH_TOO_LONG), "pre mac length too long"}, |
||
335 |
{ERR_REASON(SSL_R_PROBLEMS_MAPPING_CIPHER_FUNCTIONS), "problems mapping cipher functions"}, |
||
336 |
{ERR_REASON(SSL_R_PROTOCOL_IS_SHUTDOWN) , "protocol is shutdown"}, |
||
337 |
{ERR_REASON(SSL_R_PSK_IDENTITY_NOT_FOUND), "psk identity not found"}, |
||
338 |
{ERR_REASON(SSL_R_PSK_NO_CLIENT_CB) , "psk no client cb"}, |
||
339 |
{ERR_REASON(SSL_R_PSK_NO_SERVER_CB) , "psk no server cb"}, |
||
340 |
{ERR_REASON(SSL_R_PUBLIC_KEY_ENCRYPT_ERROR), "public key encrypt error"}, |
||
341 |
{ERR_REASON(SSL_R_PUBLIC_KEY_IS_NOT_RSA) , "public key is not rsa"}, |
||
342 |
{ERR_REASON(SSL_R_PUBLIC_KEY_NOT_RSA) , "public key not rsa"}, |
||
343 |
{ERR_REASON(SSL_R_READ_BIO_NOT_SET) , "read bio not set"}, |
||
344 |
{ERR_REASON(SSL_R_READ_TIMEOUT_EXPIRED) , "read timeout expired"}, |
||
345 |
{ERR_REASON(SSL_R_READ_WRONG_PACKET_TYPE), "read wrong packet type"}, |
||
346 |
{ERR_REASON(SSL_R_RECORD_LENGTH_MISMATCH), "record length mismatch"}, |
||
347 |
{ERR_REASON(SSL_R_RECORD_TOO_LARGE) , "record too large"}, |
||
348 |
{ERR_REASON(SSL_R_RECORD_TOO_SMALL) , "record too small"}, |
||
349 |
{ERR_REASON(SSL_R_RENEGOTIATE_EXT_TOO_LONG), "renegotiate ext too long"}, |
||
350 |
{ERR_REASON(SSL_R_RENEGOTIATION_ENCODING_ERR), "renegotiation encoding err"}, |
||
351 |
{ERR_REASON(SSL_R_RENEGOTIATION_MISMATCH), "renegotiation mismatch"}, |
||
352 |
{ERR_REASON(SSL_R_REQUIRED_CIPHER_MISSING), "required cipher missing"}, |
||
353 |
{ERR_REASON(SSL_R_REQUIRED_COMPRESSSION_ALGORITHM_MISSING), "required compresssion algorithm missing"}, |
||
354 |
{ERR_REASON(SSL_R_REUSE_CERT_LENGTH_NOT_ZERO), "reuse cert length not zero"}, |
||
355 |
{ERR_REASON(SSL_R_REUSE_CERT_TYPE_NOT_ZERO), "reuse cert type not zero"}, |
||
356 |
{ERR_REASON(SSL_R_REUSE_CIPHER_LIST_NOT_ZERO), "reuse cipher list not zero"}, |
||
357 |
{ERR_REASON(SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING), "scsv received when renegotiating"}, |
||
358 |
{ERR_REASON(SSL_R_SERVERHELLO_TLSEXT) , "serverhello tlsext"}, |
||
359 |
{ERR_REASON(SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED), "session id context uninitialized"}, |
||
360 |
{ERR_REASON(SSL_R_SHORT_READ) , "short read"}, |
||
361 |
{ERR_REASON(SSL_R_SIGNATURE_ALGORITHMS_ERROR), "signature algorithms error"}, |
||
362 |
{ERR_REASON(SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE), "signature for non signing certificate"}, |
||
363 |
{ERR_REASON(SSL_R_SRP_A_CALC) , "error with the srp params"}, |
||
364 |
{ERR_REASON(SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES), "srtp could not allocate profiles"}, |
||
365 |
{ERR_REASON(SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG), "srtp protection profile list too long"}, |
||
366 |
{ERR_REASON(SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE), "srtp unknown protection profile"}, |
||
367 |
{ERR_REASON(SSL_R_SSL23_DOING_SESSION_ID_REUSE), "ssl23 doing session id reuse"}, |
||
368 |
{ERR_REASON(SSL_R_SSL2_CONNECTION_ID_TOO_LONG), "ssl2 connection id too long"}, |
||
369 |
{ERR_REASON(SSL_R_SSL3_EXT_INVALID_ECPOINTFORMAT), "ssl3 ext invalid ecpointformat"}, |
||
370 |
{ERR_REASON(SSL_R_SSL3_EXT_INVALID_SERVERNAME), "ssl3 ext invalid servername"}, |
||
371 |
{ERR_REASON(SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE), "ssl3 ext invalid servername type"}, |
||
372 |
{ERR_REASON(SSL_R_SSL3_SESSION_ID_TOO_LONG), "ssl3 session id too long"}, |
||
373 |
{ERR_REASON(SSL_R_SSL3_SESSION_ID_TOO_SHORT), "ssl3 session id too short"}, |
||
374 |
{ERR_REASON(SSL_R_SSLV3_ALERT_BAD_CERTIFICATE), "sslv3 alert bad certificate"}, |
||
375 |
{ERR_REASON(SSL_R_SSLV3_ALERT_BAD_RECORD_MAC), "sslv3 alert bad record mac"}, |
||
376 |
{ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED), "sslv3 alert certificate expired"}, |
||
377 |
{ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED), "sslv3 alert certificate revoked"}, |
||
378 |
{ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN), "sslv3 alert certificate unknown"}, |
||
379 |
{ERR_REASON(SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE), "sslv3 alert decompression failure"}, |
||
380 |
{ERR_REASON(SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE), "sslv3 alert handshake failure"}, |
||
381 |
{ERR_REASON(SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER), "sslv3 alert illegal parameter"}, |
||
382 |
{ERR_REASON(SSL_R_SSLV3_ALERT_NO_CERTIFICATE), "sslv3 alert no certificate"}, |
||
383 |
{ERR_REASON(SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE), "sslv3 alert unexpected message"}, |
||
384 |
{ERR_REASON(SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE), "sslv3 alert unsupported certificate"}, |
||
385 |
{ERR_REASON(SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION), "ssl ctx has no default ssl version"}, |
||
386 |
{ERR_REASON(SSL_R_SSL_HANDSHAKE_FAILURE) , "ssl handshake failure"}, |
||
387 |
{ERR_REASON(SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS), "ssl library has no ciphers"}, |
||
388 |
{ERR_REASON(SSL_R_SSL_SESSION_ID_CALLBACK_FAILED), "ssl session id callback failed"}, |
||
389 |
{ERR_REASON(SSL_R_SSL_SESSION_ID_CONFLICT), "ssl session id conflict"}, |
||
390 |
{ERR_REASON(SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG), "ssl session id context too long"}, |
||
391 |
{ERR_REASON(SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH), "ssl session id has bad length"}, |
||
392 |
{ERR_REASON(SSL_R_SSL_SESSION_ID_IS_DIFFERENT), "ssl session id is different"}, |
||
393 |
{ERR_REASON(SSL_R_TLSV1_ALERT_ACCESS_DENIED), "tlsv1 alert access denied"}, |
||
394 |
{ERR_REASON(SSL_R_TLSV1_ALERT_DECODE_ERROR), "tlsv1 alert decode error"}, |
||
395 |
{ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPTION_FAILED), "tlsv1 alert decryption failed"}, |
||
396 |
{ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPT_ERROR), "tlsv1 alert decrypt error"}, |
||
397 |
{ERR_REASON(SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION), "tlsv1 alert export restriction"}, |
||
398 |
{ERR_REASON(SSL_R_TLSV1_ALERT_INAPPROPRIATE_FALLBACK), "tlsv1 alert inappropriate fallback"}, |
||
399 |
{ERR_REASON(SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY), "tlsv1 alert insufficient security"}, |
||
400 |
{ERR_REASON(SSL_R_TLSV1_ALERT_INTERNAL_ERROR), "tlsv1 alert internal error"}, |
||
401 |
{ERR_REASON(SSL_R_TLSV1_ALERT_NO_RENEGOTIATION), "tlsv1 alert no renegotiation"}, |
||
402 |
{ERR_REASON(SSL_R_TLSV1_ALERT_PROTOCOL_VERSION), "tlsv1 alert protocol version"}, |
||
403 |
{ERR_REASON(SSL_R_TLSV1_ALERT_RECORD_OVERFLOW), "tlsv1 alert record overflow"}, |
||
404 |
{ERR_REASON(SSL_R_TLSV1_ALERT_UNKNOWN_CA), "tlsv1 alert unknown ca"}, |
||
405 |
{ERR_REASON(SSL_R_TLSV1_ALERT_USER_CANCELLED), "tlsv1 alert user cancelled"}, |
||
406 |
{ERR_REASON(SSL_R_TLSV1_BAD_CERTIFICATE_HASH_VALUE), "tlsv1 bad certificate hash value"}, |
||
407 |
{ERR_REASON(SSL_R_TLSV1_BAD_CERTIFICATE_STATUS_RESPONSE), "tlsv1 bad certificate status response"}, |
||
408 |
{ERR_REASON(SSL_R_TLSV1_CERTIFICATE_UNOBTAINABLE), "tlsv1 certificate unobtainable"}, |
||
409 |
{ERR_REASON(SSL_R_TLSV1_UNRECOGNIZED_NAME), "tlsv1 unrecognized name"}, |
||
410 |
{ERR_REASON(SSL_R_TLSV1_UNSUPPORTED_EXTENSION), "tlsv1 unsupported extension"}, |
||
411 |
{ERR_REASON(SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER), "tls client cert req with anon cipher"}, |
||
412 |
{ERR_REASON(SSL_R_TLS_HEARTBEAT_PEER_DOESNT_ACCEPT), "peer does not accept heartbeats"}, |
||
413 |
{ERR_REASON(SSL_R_TLS_HEARTBEAT_PENDING) , "heartbeat request already pending"}, |
||
414 |
{ERR_REASON(SSL_R_TLS_ILLEGAL_EXPORTER_LABEL), "tls illegal exporter label"}, |
||
415 |
{ERR_REASON(SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST), "tls invalid ecpointformat list"}, |
||
416 |
{ERR_REASON(SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST), "tls peer did not respond with certificate list"}, |
||
417 |
{ERR_REASON(SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG), "tls rsa encrypted value length is wrong"}, |
||
418 |
{ERR_REASON(SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER), "tried to use unsupported cipher"}, |
||
419 |
{ERR_REASON(SSL_R_UNABLE_TO_DECODE_DH_CERTS), "unable to decode dh certs"}, |
||
420 |
{ERR_REASON(SSL_R_UNABLE_TO_DECODE_ECDH_CERTS), "unable to decode ecdh certs"}, |
||
421 |
{ERR_REASON(SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY), "unable to extract public key"}, |
||
422 |
{ERR_REASON(SSL_R_UNABLE_TO_FIND_DH_PARAMETERS), "unable to find dh parameters"}, |
||
423 |
{ERR_REASON(SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS), "unable to find ecdh parameters"}, |
||
424 |
{ERR_REASON(SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS), "unable to find public key parameters"}, |
||
425 |
{ERR_REASON(SSL_R_UNABLE_TO_FIND_SSL_METHOD), "unable to find ssl method"}, |
||
426 |
{ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL2_MD5_ROUTINES), "unable to load ssl2 md5 routines"}, |
||
427 |
{ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES), "unable to load ssl3 md5 routines"}, |
||
428 |
{ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES), "unable to load ssl3 sha1 routines"}, |
||
429 |
{ERR_REASON(SSL_R_UNEXPECTED_MESSAGE) , "unexpected message"}, |
||
430 |
{ERR_REASON(SSL_R_UNEXPECTED_RECORD) , "unexpected record"}, |
||
431 |
{ERR_REASON(SSL_R_UNINITIALIZED) , "uninitialized"}, |
||
432 |
{ERR_REASON(SSL_R_UNKNOWN_ALERT_TYPE) , "unknown alert type"}, |
||
433 |
{ERR_REASON(SSL_R_UNKNOWN_CERTIFICATE_TYPE), "unknown certificate type"}, |
||
434 |
{ERR_REASON(SSL_R_UNKNOWN_CIPHER_RETURNED), "unknown cipher returned"}, |
||
435 |
{ERR_REASON(SSL_R_UNKNOWN_CIPHER_TYPE) , "unknown cipher type"}, |
||
436 |
{ERR_REASON(SSL_R_UNKNOWN_DIGEST) , "unknown digest"}, |
||
437 |
{ERR_REASON(SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE), "unknown key exchange type"}, |
||
438 |
{ERR_REASON(SSL_R_UNKNOWN_PKEY_TYPE) , "unknown pkey type"}, |
||
439 |
{ERR_REASON(SSL_R_UNKNOWN_PROTOCOL) , "unknown protocol"}, |
||
440 |
{ERR_REASON(SSL_R_UNKNOWN_REMOTE_ERROR_TYPE), "unknown remote error type"}, |
||
441 |
{ERR_REASON(SSL_R_UNKNOWN_SSL_VERSION) , "unknown ssl version"}, |
||
442 |
{ERR_REASON(SSL_R_UNKNOWN_STATE) , "unknown state"}, |
||
443 |
{ERR_REASON(SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED), "unsafe legacy renegotiation disabled"}, |
||
444 |
{ERR_REASON(SSL_R_UNSUPPORTED_CIPHER) , "unsupported cipher"}, |
||
445 |
{ERR_REASON(SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM), "unsupported compression algorithm"}, |
||
446 |
{ERR_REASON(SSL_R_UNSUPPORTED_DIGEST_TYPE), "unsupported digest type"}, |
||
447 |
{ERR_REASON(SSL_R_UNSUPPORTED_ELLIPTIC_CURVE), "unsupported elliptic curve"}, |
||
448 |
{ERR_REASON(SSL_R_UNSUPPORTED_PROTOCOL) , "unsupported protocol"}, |
||
449 |
{ERR_REASON(SSL_R_UNSUPPORTED_SSL_VERSION), "unsupported ssl version"}, |
||
450 |
{ERR_REASON(SSL_R_UNSUPPORTED_STATUS_TYPE), "unsupported status type"}, |
||
451 |
{ERR_REASON(SSL_R_USE_SRTP_NOT_NEGOTIATED), "use srtp not negotiated"}, |
||
452 |
{ERR_REASON(SSL_R_WRITE_BIO_NOT_SET) , "write bio not set"}, |
||
453 |
{ERR_REASON(SSL_R_WRONG_CIPHER_RETURNED) , "wrong cipher returned"}, |
||
454 |
{ERR_REASON(SSL_R_WRONG_CURVE) , "wrong curve"}, |
||
455 |
{ERR_REASON(SSL_R_WRONG_MESSAGE_TYPE) , "wrong message type"}, |
||
456 |
{ERR_REASON(SSL_R_WRONG_NUMBER_OF_KEY_BITS), "wrong number of key bits"}, |
||
457 |
{ERR_REASON(SSL_R_WRONG_SIGNATURE_LENGTH), "wrong signature length"}, |
||
458 |
{ERR_REASON(SSL_R_WRONG_SIGNATURE_SIZE) , "wrong signature size"}, |
||
459 |
{ERR_REASON(SSL_R_WRONG_SIGNATURE_TYPE) , "wrong signature type"}, |
||
460 |
{ERR_REASON(SSL_R_WRONG_SSL_VERSION) , "wrong ssl version"}, |
||
461 |
{ERR_REASON(SSL_R_WRONG_VERSION_NUMBER) , "wrong version number"}, |
||
462 |
{ERR_REASON(SSL_R_X509_LIB) , "x509 lib"}, |
||
463 |
{ERR_REASON(SSL_R_X509_VERIFICATION_SETUP_PROBLEMS), "x509 verification setup problems"}, |
||
464 |
{ERR_REASON(SSL_R_PEER_BEHAVING_BADLY) ,"peer is doing strange or hostile things"}, |
||
465 |
{0, NULL} |
||
466 |
}; |
||
467 |
|||
468 |
#endif |
||
469 |
|||
470 |
void |
||
471 |
ERR_load_SSL_strings(void) |
||
472 |
{ |
||
473 |
#ifndef OPENSSL_NO_ERR |
||
474 |
✓✗ | 5900 |
if (ERR_func_error_string(SSL_str_functs[0].error) == NULL) { |
475 |
2950 |
ERR_load_strings(0, SSL_str_functs); |
|
476 |
2950 |
ERR_load_strings(0, SSL_str_reasons); |
|
477 |
2950 |
} |
|
478 |
#endif |
||
479 |
2950 |
} |
|
480 |
|||
481 |
void |
||
482 |
SSL_load_error_strings(void) |
||
483 |
{ |
||
484 |
#ifndef OPENSSL_NO_ERR |
||
485 |
5900 |
ERR_load_crypto_strings(); |
|
486 |
2950 |
ERR_load_SSL_strings(); |
|
487 |
#endif |
||
488 |
2950 |
} |
|
489 |
|||
490 |
int |
||
491 |
SSL_state_func_code(int state) { |
||
492 |
✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✗ ✗✗✗✓ ✗✓✗✓ ✗✗✗✗ ✗✗ |
624 |
switch (state) { |
493 |
case SSL3_ST_CW_FLUSH: |
||
494 |
return 1; |
||
495 |
case SSL3_ST_CW_CLNT_HELLO_A: |
||
496 |
return 2; |
||
497 |
case SSL3_ST_CW_CLNT_HELLO_B: |
||
498 |
return 3; |
||
499 |
case SSL3_ST_CR_SRVR_HELLO_A: |
||
500 |
return 4; |
||
501 |
case SSL3_ST_CR_SRVR_HELLO_B: |
||
502 |
return 5; |
||
503 |
case SSL3_ST_CR_CERT_A: |
||
504 |
return 6; |
||
505 |
case SSL3_ST_CR_CERT_B: |
||
506 |
return 7; |
||
507 |
case SSL3_ST_CR_KEY_EXCH_A: |
||
508 |
return 8; |
||
509 |
case SSL3_ST_CR_KEY_EXCH_B: |
||
510 |
return 9; |
||
511 |
case SSL3_ST_CR_CERT_REQ_A: |
||
512 |
return 10; |
||
513 |
case SSL3_ST_CR_CERT_REQ_B: |
||
514 |
return 11; |
||
515 |
case SSL3_ST_CR_SRVR_DONE_A: |
||
516 |
return 12; |
||
517 |
case SSL3_ST_CR_SRVR_DONE_B: |
||
518 |
return 13; |
||
519 |
case SSL3_ST_CW_CERT_A: |
||
520 |
return 14; |
||
521 |
case SSL3_ST_CW_CERT_B: |
||
522 |
return 15; |
||
523 |
case SSL3_ST_CW_CERT_C: |
||
524 |
return 16; |
||
525 |
case SSL3_ST_CW_CERT_D: |
||
526 |
return 17; |
||
527 |
case SSL3_ST_CW_KEY_EXCH_A: |
||
528 |
return 18; |
||
529 |
case SSL3_ST_CW_KEY_EXCH_B: |
||
530 |
return 19; |
||
531 |
case SSL3_ST_CW_CERT_VRFY_A: |
||
532 |
return 20; |
||
533 |
case SSL3_ST_CW_CERT_VRFY_B: |
||
534 |
return 21; |
||
535 |
case SSL3_ST_CW_CHANGE_A: |
||
536 |
return 22; |
||
537 |
case SSL3_ST_CW_CHANGE_B: |
||
538 |
return 23; |
||
539 |
case SSL3_ST_CW_FINISHED_A: |
||
540 |
return 26; |
||
541 |
case SSL3_ST_CW_FINISHED_B: |
||
542 |
return 27; |
||
543 |
case SSL3_ST_CR_CHANGE_A: |
||
544 |
return 28; |
||
545 |
case SSL3_ST_CR_CHANGE_B: |
||
546 |
return 29; |
||
547 |
case SSL3_ST_CR_FINISHED_A: |
||
548 |
return 30; |
||
549 |
case SSL3_ST_CR_FINISHED_B: |
||
550 |
return 31; |
||
551 |
case SSL3_ST_CR_SESSION_TICKET_A: |
||
552 |
return 32; |
||
553 |
case SSL3_ST_CR_SESSION_TICKET_B: |
||
554 |
return 33; |
||
555 |
case SSL3_ST_CR_CERT_STATUS_A: |
||
556 |
return 34; |
||
557 |
case SSL3_ST_CR_CERT_STATUS_B: |
||
558 |
return 35; |
||
559 |
case SSL3_ST_SW_FLUSH: |
||
560 |
return 36; |
||
561 |
case SSL3_ST_SR_CLNT_HELLO_A: |
||
562 |
return 37; |
||
563 |
case SSL3_ST_SR_CLNT_HELLO_B: |
||
564 |
return 38; |
||
565 |
case SSL3_ST_SR_CLNT_HELLO_C: |
||
566 |
return 39; |
||
567 |
case SSL3_ST_SW_HELLO_REQ_A: |
||
568 |
return 40; |
||
569 |
case SSL3_ST_SW_HELLO_REQ_B: |
||
570 |
return 41; |
||
571 |
case SSL3_ST_SW_HELLO_REQ_C: |
||
572 |
return 42; |
||
573 |
case SSL3_ST_SW_SRVR_HELLO_A: |
||
574 |
return 43; |
||
575 |
case SSL3_ST_SW_SRVR_HELLO_B: |
||
576 |
return 44; |
||
577 |
case SSL3_ST_SW_CERT_A: |
||
578 |
return 45; |
||
579 |
case SSL3_ST_SW_CERT_B: |
||
580 |
return 46; |
||
581 |
case SSL3_ST_SW_KEY_EXCH_A: |
||
582 |
return 47; |
||
583 |
case SSL3_ST_SW_KEY_EXCH_B: |
||
584 |
return 48; |
||
585 |
case SSL3_ST_SW_CERT_REQ_A: |
||
586 |
return 49; |
||
587 |
case SSL3_ST_SW_CERT_REQ_B: |
||
588 |
return 50; |
||
589 |
case SSL3_ST_SW_SRVR_DONE_A: |
||
590 |
return 51; |
||
591 |
case SSL3_ST_SW_SRVR_DONE_B: |
||
592 |
return 52; |
||
593 |
case SSL3_ST_SR_CERT_A: |
||
594 |
return 53; |
||
595 |
case SSL3_ST_SR_CERT_B: |
||
596 |
return 54; |
||
597 |
case SSL3_ST_SR_KEY_EXCH_A: |
||
598 |
return 55; |
||
599 |
case SSL3_ST_SR_KEY_EXCH_B: |
||
600 |
return 56; |
||
601 |
case SSL3_ST_SR_CERT_VRFY_A: |
||
602 |
return 57; |
||
603 |
case SSL3_ST_SR_CERT_VRFY_B: |
||
604 |
return 58; |
||
605 |
case SSL3_ST_SR_CHANGE_A: |
||
606 |
return 59; |
||
607 |
case SSL3_ST_SR_CHANGE_B: |
||
608 |
return 60; |
||
609 |
case SSL3_ST_SR_FINISHED_A: |
||
610 |
return 63; |
||
611 |
case SSL3_ST_SR_FINISHED_B: |
||
612 |
return 64; |
||
613 |
case SSL3_ST_SW_CHANGE_A: |
||
614 |
return 65; |
||
615 |
case SSL3_ST_SW_CHANGE_B: |
||
616 |
return 66; |
||
617 |
case SSL3_ST_SW_FINISHED_A: |
||
618 |
return 67; |
||
619 |
case SSL3_ST_SW_FINISHED_B: |
||
620 |
return 68; |
||
621 |
case SSL3_ST_SW_SESSION_TICKET_A: |
||
622 |
return 69; |
||
623 |
case SSL3_ST_SW_SESSION_TICKET_B: |
||
624 |
return 70; |
||
625 |
case SSL3_ST_SW_CERT_STATUS_A: |
||
626 |
return 71; |
||
627 |
case SSL3_ST_SW_CERT_STATUS_B: |
||
628 |
return 72; |
||
629 |
case SSL_ST_BEFORE: |
||
630 |
return 73; |
||
631 |
case SSL_ST_ACCEPT: |
||
632 |
return 74; |
||
633 |
case SSL_ST_CONNECT: |
||
634 |
return 75; |
||
635 |
case SSL_ST_OK: |
||
636 |
288 |
return 76; |
|
637 |
case SSL_ST_RENEGOTIATE: |
||
638 |
return 77; |
||
639 |
case SSL_ST_BEFORE|SSL_ST_CONNECT: |
||
640 |
16 |
return 78; |
|
641 |
case SSL_ST_OK|SSL_ST_CONNECT: |
||
642 |
return 79; |
||
643 |
case SSL_ST_BEFORE|SSL_ST_ACCEPT: |
||
644 |
8 |
return 80; |
|
645 |
case SSL_ST_OK|SSL_ST_ACCEPT: |
||
646 |
return 81; |
||
647 |
case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A: |
||
648 |
return 83; |
||
649 |
case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_B: |
||
650 |
return 84; |
||
651 |
case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A: |
||
652 |
return 85; |
||
653 |
case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B: |
||
654 |
return 86; |
||
655 |
default: |
||
656 |
break; |
||
657 |
} |
||
658 |
return 0xfff; |
||
659 |
312 |
} |
|
660 |
|||
661 |
void |
||
662 |
SSL_error_internal(const SSL *s, int r, char *f, int l) |
||
663 |
{ |
||
664 |
624 |
ERR_PUT_error(ERR_LIB_SSL, |
|
665 |
(SSL_state_func_code(S3I(s)->hs.state)), r, f, l); |
||
666 |
312 |
} |
Generated by: GCOVR (Version 3.3) |