Upstream version 9.38.198.0
[platform/framework/web/crosswalk.git] / src / third_party / boringssl / src / ssl / ssl_stat.c
1 /* ssl/ssl_stat.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  * 
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  * 
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  * 
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from 
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  * 
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  * 
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 /* ====================================================================
59  * Copyright 2005 Nokia. All rights reserved.
60  *
61  * The portions of the attached software ("Contribution") is developed by
62  * Nokia Corporation and is licensed pursuant to the OpenSSL open source
63  * license.
64  *
65  * The Contribution, originally written by Mika Kousa and Pasi Eronen of
66  * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
67  * support (see RFC 4279) to OpenSSL.
68  *
69  * No patent licenses or other rights except those expressly stated in
70  * the OpenSSL open source license shall be deemed granted or received
71  * expressly, by implication, estoppel, or otherwise.
72  *
73  * No assurances are provided by Nokia that the Contribution does not
74  * infringe the patent or other intellectual property rights of any third
75  * party or that the license provides you with all the necessary rights
76  * to make use of the Contribution.
77  *
78  * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
79  * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
80  * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
81  * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
82  * OTHERWISE.
83  */
84
85 #include <stdio.h>
86 #include "ssl_locl.h"
87
88 const char *SSL_state_string_long(const SSL *s)
89         {
90         const char *str;
91
92         switch (s->state)
93                 {
94 case SSL_ST_BEFORE: str="before SSL initialization"; break;
95 case SSL_ST_ACCEPT: str="before accept initialization"; break;
96 case SSL_ST_CONNECT: str="before connect initialization"; break;
97 case SSL_ST_OK: str="SSL negotiation finished successfully"; break;
98 case SSL_ST_RENEGOTIATE:        str="SSL renegotiate ciphers"; break;
99 case SSL_ST_BEFORE|SSL_ST_CONNECT: str="before/connect initialization"; break;
100 case SSL_ST_OK|SSL_ST_CONNECT: str="ok/connect SSL initialization"; break;
101 case SSL_ST_BEFORE|SSL_ST_ACCEPT: str="before/accept initialization"; break;
102 case SSL_ST_OK|SSL_ST_ACCEPT: str="ok/accept SSL initialization"; break;
103
104 #ifndef OPENSSL_NO_SSL3
105 /* SSLv3 additions */
106 case SSL3_ST_CW_CLNT_HELLO_A:   str="SSLv3 write client hello A"; break;
107 case SSL3_ST_CW_CLNT_HELLO_B:   str="SSLv3 write client hello B"; break;
108 case SSL3_ST_CR_SRVR_HELLO_A:   str="SSLv3 read server hello A"; break;
109 case SSL3_ST_CR_SRVR_HELLO_B:   str="SSLv3 read server hello B"; break;
110 case SSL3_ST_CR_CERT_A:         str="SSLv3 read server certificate A"; break;
111 case SSL3_ST_CR_CERT_B:         str="SSLv3 read server certificate B"; break;
112 case SSL3_ST_CR_KEY_EXCH_A:     str="SSLv3 read server key exchange A"; break;
113 case SSL3_ST_CR_KEY_EXCH_B:     str="SSLv3 read server key exchange B"; break;
114 case SSL3_ST_CR_CERT_REQ_A:     str="SSLv3 read server certificate request A"; break;
115 case SSL3_ST_CR_CERT_REQ_B:     str="SSLv3 read server certificate request B"; break;
116 case SSL3_ST_CR_SESSION_TICKET_A: str="SSLv3 read server session ticket A";break;
117 case SSL3_ST_CR_SESSION_TICKET_B: str="SSLv3 read server session ticket B";break;
118 case SSL3_ST_CR_SRVR_DONE_A:    str="SSLv3 read server done A"; break;
119 case SSL3_ST_CR_SRVR_DONE_B:    str="SSLv3 read server done B"; break;
120 case SSL3_ST_CW_CERT_A:         str="SSLv3 write client certificate A"; break;
121 case SSL3_ST_CW_CERT_B:         str="SSLv3 write client certificate B"; break;
122 case SSL3_ST_CW_CERT_C:         str="SSLv3 write client certificate C"; break;
123 case SSL3_ST_CW_CERT_D:         str="SSLv3 write client certificate D"; break;
124 case SSL3_ST_CW_KEY_EXCH_A:     str="SSLv3 write client key exchange A"; break;
125 case SSL3_ST_CW_KEY_EXCH_B:     str="SSLv3 write client key exchange B"; break;
126 case SSL3_ST_CW_CERT_VRFY_A:    str="SSLv3 write certificate verify A"; break;
127 case SSL3_ST_CW_CERT_VRFY_B:    str="SSLv3 write certificate verify B"; break;
128
129 case SSL3_ST_CW_CHANGE_A:
130 case SSL3_ST_SW_CHANGE_A:       str="SSLv3 write change cipher spec A"; break;
131 case SSL3_ST_CW_CHANGE_B:       
132 case SSL3_ST_SW_CHANGE_B:       str="SSLv3 write change cipher spec B"; break;
133 case SSL3_ST_CW_FINISHED_A:     
134 case SSL3_ST_SW_FINISHED_A:     str="SSLv3 write finished A"; break;
135 case SSL3_ST_CW_FINISHED_B:     
136 case SSL3_ST_SW_FINISHED_B:     str="SSLv3 write finished B"; break;
137 case SSL3_ST_CR_CHANGE:
138 case SSL3_ST_SR_CHANGE:         str="SSLv3 read change cipher spec"; break;
139 case SSL3_ST_CR_FINISHED_A:     
140 case SSL3_ST_SR_FINISHED_A:     str="SSLv3 read finished A"; break;
141 case SSL3_ST_CR_FINISHED_B:     
142 case SSL3_ST_SR_FINISHED_B:     str="SSLv3 read finished B"; break;
143
144 case SSL3_ST_CW_FLUSH:
145 case SSL3_ST_SW_FLUSH:          str="SSLv3 flush data"; break;
146
147 case SSL3_ST_SR_CLNT_HELLO_A:   str="SSLv3 read client hello A"; break;
148 case SSL3_ST_SR_CLNT_HELLO_B:   str="SSLv3 read client hello B"; break;
149 case SSL3_ST_SR_CLNT_HELLO_C:   str="SSLv3 read client hello C"; break;
150 case SSL3_ST_SR_CLNT_HELLO_D:   str="SSLv3 read client hello D"; break;
151 case SSL3_ST_SW_HELLO_REQ_A:    str="SSLv3 write hello request A"; break;
152 case SSL3_ST_SW_HELLO_REQ_B:    str="SSLv3 write hello request B"; break;
153 case SSL3_ST_SW_HELLO_REQ_C:    str="SSLv3 write hello request C"; break;
154 case SSL3_ST_SW_SRVR_HELLO_A:   str="SSLv3 write server hello A"; break;
155 case SSL3_ST_SW_SRVR_HELLO_B:   str="SSLv3 write server hello B"; break;
156 case SSL3_ST_SW_CERT_A:         str="SSLv3 write certificate A"; break;
157 case SSL3_ST_SW_CERT_B:         str="SSLv3 write certificate B"; break;
158 case SSL3_ST_SW_KEY_EXCH_A:     str="SSLv3 write key exchange A"; break;
159 case SSL3_ST_SW_KEY_EXCH_B:     str="SSLv3 write key exchange B"; break;
160 case SSL3_ST_SW_CERT_REQ_A:     str="SSLv3 write certificate request A"; break;
161 case SSL3_ST_SW_CERT_REQ_B:     str="SSLv3 write certificate request B"; break;
162 case SSL3_ST_SW_SESSION_TICKET_A: str="SSLv3 write session ticket A"; break;
163 case SSL3_ST_SW_SESSION_TICKET_B: str="SSLv3 write session ticket B"; break;
164 case SSL3_ST_SW_SRVR_DONE_A:    str="SSLv3 write server done A"; break;
165 case SSL3_ST_SW_SRVR_DONE_B:    str="SSLv3 write server done B"; break;
166 case SSL3_ST_SR_CERT_A:         str="SSLv3 read client certificate A"; break;
167 case SSL3_ST_SR_CERT_B:         str="SSLv3 read client certificate B"; break;
168 case SSL3_ST_SR_KEY_EXCH_A:     str="SSLv3 read client key exchange A"; break;
169 case SSL3_ST_SR_KEY_EXCH_B:     str="SSLv3 read client key exchange B"; break;
170 case SSL3_ST_SR_CERT_VRFY_A:    str="SSLv3 read certificate verify A"; break;
171 case SSL3_ST_SR_CERT_VRFY_B:    str="SSLv3 read certificate verify B"; break;
172 #endif
173
174 #if !defined(OPENSSL_NO_SSL3)
175 /* SSLv2/v3 compatibility states */
176 /* client */
177 case SSL23_ST_CW_CLNT_HELLO_A:  str="SSLv2/v3 write client hello A"; break;
178 case SSL23_ST_CW_CLNT_HELLO_B:  str="SSLv2/v3 write client hello B"; break;
179 case SSL23_ST_CR_SRVR_HELLO_A:  str="SSLv2/v3 read server hello A"; break;
180 case SSL23_ST_CR_SRVR_HELLO_B:  str="SSLv2/v3 read server hello B"; break;
181 /* server */
182 case SSL23_ST_SR_CLNT_HELLO_A:  str="SSLv2/v3 read client hello A"; break;
183 case SSL23_ST_SR_CLNT_HELLO_B:  str="SSLv2/v3 read client hello B"; break;
184 #endif
185
186 /* DTLS */
187 case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A: str="DTLS1 read hello verify request A"; break;
188 case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_B: str="DTLS1 read hello verify request B"; break;
189 case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A: str="DTLS1 write hello verify request A"; break;
190 case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B: str="DTLS1 write hello verify request B"; break;
191
192 default:        str="unknown state"; break;
193                 }
194         return(str);
195         }
196
197 const char *SSL_rstate_string_long(const SSL *s)
198         {
199         const char *str;
200
201         switch (s->rstate)
202                 {
203         case SSL_ST_READ_HEADER: str="read header"; break;
204         case SSL_ST_READ_BODY: str="read body"; break;
205         case SSL_ST_READ_DONE: str="read done"; break;
206         default: str="unknown"; break;
207                 }
208         return(str);
209         }
210
211 const char *SSL_state_string(const SSL *s)
212         {
213         const char *str;
214
215         switch (s->state)
216                 {
217 case SSL_ST_BEFORE:                             str="PINIT "; break;
218 case SSL_ST_ACCEPT:                             str="AINIT "; break;
219 case SSL_ST_CONNECT:                            str="CINIT "; break;
220 case SSL_ST_OK:                                 str="SSLOK "; break;
221
222 #ifndef OPENSSL_NO_SSL3
223 /* SSLv3 additions */
224 case SSL3_ST_SW_FLUSH:
225 case SSL3_ST_CW_FLUSH:                          str="3FLUSH"; break;
226 case SSL3_ST_CW_CLNT_HELLO_A:                   str="3WCH_A"; break;
227 case SSL3_ST_CW_CLNT_HELLO_B:                   str="3WCH_B"; break;
228 case SSL3_ST_CR_SRVR_HELLO_A:                   str="3RSH_A"; break;
229 case SSL3_ST_CR_SRVR_HELLO_B:                   str="3RSH_B"; break;
230 case SSL3_ST_CR_CERT_A:                         str="3RSC_A"; break;
231 case SSL3_ST_CR_CERT_B:                         str="3RSC_B"; break;
232 case SSL3_ST_CR_KEY_EXCH_A:                     str="3RSKEA"; break;
233 case SSL3_ST_CR_KEY_EXCH_B:                     str="3RSKEB"; break;
234 case SSL3_ST_CR_CERT_REQ_A:                     str="3RCR_A"; break;
235 case SSL3_ST_CR_CERT_REQ_B:                     str="3RCR_B"; break;
236 case SSL3_ST_CR_SRVR_DONE_A:                    str="3RSD_A"; break;
237 case SSL3_ST_CR_SRVR_DONE_B:                    str="3RSD_B"; break;
238 case SSL3_ST_CW_CERT_A:                         str="3WCC_A"; break;
239 case SSL3_ST_CW_CERT_B:                         str="3WCC_B"; break;
240 case SSL3_ST_CW_CERT_C:                         str="3WCC_C"; break;
241 case SSL3_ST_CW_CERT_D:                         str="3WCC_D"; break;
242 case SSL3_ST_CW_KEY_EXCH_A:                     str="3WCKEA"; break;
243 case SSL3_ST_CW_KEY_EXCH_B:                     str="3WCKEB"; break;
244 case SSL3_ST_CW_CERT_VRFY_A:                    str="3WCV_A"; break;
245 case SSL3_ST_CW_CERT_VRFY_B:                    str="3WCV_B"; break;
246
247 case SSL3_ST_SW_CHANGE_A:
248 case SSL3_ST_CW_CHANGE_A:                       str="3WCCSA"; break;
249 case SSL3_ST_SW_CHANGE_B:
250 case SSL3_ST_CW_CHANGE_B:                       str="3WCCSB"; break;
251 case SSL3_ST_SW_FINISHED_A:
252 case SSL3_ST_CW_FINISHED_A:                     str="3WFINA"; break;
253 case SSL3_ST_SW_FINISHED_B:
254 case SSL3_ST_CW_FINISHED_B:                     str="3WFINB"; break;
255 case SSL3_ST_CR_CHANGE:
256 case SSL3_ST_SR_CHANGE:                         str="3RCCS_"; break;
257 case SSL3_ST_SR_FINISHED_A:
258 case SSL3_ST_CR_FINISHED_A:                     str="3RFINA"; break;
259 case SSL3_ST_SR_FINISHED_B:
260 case SSL3_ST_CR_FINISHED_B:                     str="3RFINB"; break;
261
262 case SSL3_ST_SW_HELLO_REQ_A:                    str="3WHR_A"; break;
263 case SSL3_ST_SW_HELLO_REQ_B:                    str="3WHR_B"; break;
264 case SSL3_ST_SW_HELLO_REQ_C:                    str="3WHR_C"; break;
265 case SSL3_ST_SR_CLNT_HELLO_A:                   str="3RCH_A"; break;
266 case SSL3_ST_SR_CLNT_HELLO_B:                   str="3RCH_B"; break;
267 case SSL3_ST_SR_CLNT_HELLO_C:                   str="3RCH_C"; break;
268 case SSL3_ST_SR_CLNT_HELLO_D:                   str="3RCH_D"; break;
269 case SSL3_ST_SW_SRVR_HELLO_A:                   str="3WSH_A"; break;
270 case SSL3_ST_SW_SRVR_HELLO_B:                   str="3WSH_B"; break;
271 case SSL3_ST_SW_CERT_A:                         str="3WSC_A"; break;
272 case SSL3_ST_SW_CERT_B:                         str="3WSC_B"; break;
273 case SSL3_ST_SW_KEY_EXCH_A:                     str="3WSKEA"; break;
274 case SSL3_ST_SW_KEY_EXCH_B:                     str="3WSKEB"; break;
275 case SSL3_ST_SW_CERT_REQ_A:                     str="3WCR_A"; break;
276 case SSL3_ST_SW_CERT_REQ_B:                     str="3WCR_B"; break;
277 case SSL3_ST_SW_SRVR_DONE_A:                    str="3WSD_A"; break;
278 case SSL3_ST_SW_SRVR_DONE_B:                    str="3WSD_B"; break;
279 case SSL3_ST_SR_CERT_A:                         str="3RCC_A"; break;
280 case SSL3_ST_SR_CERT_B:                         str="3RCC_B"; break;
281 case SSL3_ST_SR_KEY_EXCH_A:                     str="3RCKEA"; break;
282 case SSL3_ST_SR_KEY_EXCH_B:                     str="3RCKEB"; break;
283 case SSL3_ST_SR_CERT_VRFY_A:                    str="3RCV_A"; break;
284 case SSL3_ST_SR_CERT_VRFY_B:                    str="3RCV_B"; break;
285 #endif
286
287 #if !defined(OPENSSL_NO_SSL3)
288 /* SSLv2/v3 compatibility states */
289 /* client */
290 case SSL23_ST_CW_CLNT_HELLO_A:                  str="23WCHA"; break;
291 case SSL23_ST_CW_CLNT_HELLO_B:                  str="23WCHB"; break;
292 case SSL23_ST_CR_SRVR_HELLO_A:                  str="23RSHA"; break;
293 case SSL23_ST_CR_SRVR_HELLO_B:                  str="23RSHA"; break;
294 /* server */
295 case SSL23_ST_SR_CLNT_HELLO_A:                  str="23RCHA"; break;
296 case SSL23_ST_SR_CLNT_HELLO_B:                  str="23RCHB"; break;
297 #endif
298 /* DTLS */
299 case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A: str="DRCHVA"; break;
300 case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_B: str="DRCHVB"; break;
301 case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A: str="DWCHVA"; break;
302 case DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B: str="DWCHVB"; break;
303
304 default:                                        str="UNKWN "; break;
305                 }
306         return(str);
307         }
308
309 const char *SSL_alert_type_string_long(int value)
310         {
311         value>>=8;
312         if (value == SSL3_AL_WARNING)
313                 return("warning");
314         else if (value == SSL3_AL_FATAL)
315                 return("fatal");
316         else
317                 return("unknown");
318         }
319
320 const char *SSL_alert_type_string(int value)
321         {
322         value>>=8;
323         if (value == SSL3_AL_WARNING)
324                 return("W");
325         else if (value == SSL3_AL_FATAL)
326                 return("F");
327         else
328                 return("U");
329         }
330
331 const char *SSL_alert_desc_string(int value)
332         {
333         const char *str;
334
335         switch (value & 0xff)
336                 {
337         case SSL3_AD_CLOSE_NOTIFY:              str="CN"; break;
338         case SSL3_AD_UNEXPECTED_MESSAGE:        str="UM"; break;
339         case SSL3_AD_BAD_RECORD_MAC:            str="BM"; break;
340         case SSL3_AD_DECOMPRESSION_FAILURE:     str="DF"; break;
341         case SSL3_AD_HANDSHAKE_FAILURE:         str="HF"; break;
342         case SSL3_AD_NO_CERTIFICATE:            str="NC"; break;
343         case SSL3_AD_BAD_CERTIFICATE:           str="BC"; break;
344         case SSL3_AD_UNSUPPORTED_CERTIFICATE:   str="UC"; break;
345         case SSL3_AD_CERTIFICATE_REVOKED:       str="CR"; break;
346         case SSL3_AD_CERTIFICATE_EXPIRED:       str="CE"; break;
347         case SSL3_AD_CERTIFICATE_UNKNOWN:       str="CU"; break;
348         case SSL3_AD_ILLEGAL_PARAMETER:         str="IP"; break;
349         case TLS1_AD_DECRYPTION_FAILED:         str="DC"; break;
350         case TLS1_AD_RECORD_OVERFLOW:           str="RO"; break;
351         case TLS1_AD_UNKNOWN_CA:                str="CA"; break;
352         case TLS1_AD_ACCESS_DENIED:             str="AD"; break;
353         case TLS1_AD_DECODE_ERROR:              str="DE"; break;
354         case TLS1_AD_DECRYPT_ERROR:             str="CY"; break;
355         case TLS1_AD_EXPORT_RESTRICTION:        str="ER"; break;
356         case TLS1_AD_PROTOCOL_VERSION:          str="PV"; break;
357         case TLS1_AD_INSUFFICIENT_SECURITY:     str="IS"; break;
358         case TLS1_AD_INTERNAL_ERROR:            str="IE"; break;
359         case TLS1_AD_USER_CANCELLED:            str="US"; break;
360         case TLS1_AD_NO_RENEGOTIATION:          str="NR"; break;
361         case TLS1_AD_UNSUPPORTED_EXTENSION:     str="UE"; break;
362         case TLS1_AD_CERTIFICATE_UNOBTAINABLE:  str="CO"; break;
363         case TLS1_AD_UNRECOGNIZED_NAME:         str="UN"; break;
364         case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE: str="BR"; break;
365         case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE: str="BH"; break;
366         case TLS1_AD_UNKNOWN_PSK_IDENTITY:      str="UP"; break;
367         default:                                str="UK"; break;
368                 }
369         return(str);
370         }
371
372 const char *SSL_alert_desc_string_long(int value)
373         {
374         const char *str;
375
376         switch (value & 0xff)
377                 {
378         case SSL3_AD_CLOSE_NOTIFY:
379                 str="close notify";
380                 break;
381         case SSL3_AD_UNEXPECTED_MESSAGE:
382                 str="unexpected_message";
383                 break;
384         case SSL3_AD_BAD_RECORD_MAC:
385                 str="bad record mac";
386                 break;
387         case SSL3_AD_DECOMPRESSION_FAILURE:
388                 str="decompression failure";
389                 break;
390         case SSL3_AD_HANDSHAKE_FAILURE:
391                 str="handshake failure";
392                 break;
393         case SSL3_AD_NO_CERTIFICATE:
394                 str="no certificate";
395                 break;
396         case SSL3_AD_BAD_CERTIFICATE:
397                 str="bad certificate";
398                 break;
399         case SSL3_AD_UNSUPPORTED_CERTIFICATE:
400                 str="unsupported certificate";
401                 break;
402         case SSL3_AD_CERTIFICATE_REVOKED:
403                 str="certificate revoked";
404                 break;
405         case SSL3_AD_CERTIFICATE_EXPIRED:
406                 str="certificate expired";
407                 break;
408         case SSL3_AD_CERTIFICATE_UNKNOWN:
409                 str="certificate unknown";
410                 break;
411         case SSL3_AD_ILLEGAL_PARAMETER:
412                 str="illegal parameter";
413                 break;
414         case TLS1_AD_DECRYPTION_FAILED:
415                 str="decryption failed";
416                 break;
417         case TLS1_AD_RECORD_OVERFLOW:
418                 str="record overflow";
419                 break;
420         case TLS1_AD_UNKNOWN_CA:
421                 str="unknown CA";
422                 break;
423         case TLS1_AD_ACCESS_DENIED:
424                 str="access denied";
425                 break;
426         case TLS1_AD_DECODE_ERROR:
427                 str="decode error";
428                 break;
429         case TLS1_AD_DECRYPT_ERROR:
430                 str="decrypt error";
431                 break;
432         case TLS1_AD_EXPORT_RESTRICTION:
433                 str="export restriction";
434                 break;
435         case TLS1_AD_PROTOCOL_VERSION:
436                 str="protocol version";
437                 break;
438         case TLS1_AD_INSUFFICIENT_SECURITY:
439                 str="insufficient security";
440                 break;
441         case TLS1_AD_INTERNAL_ERROR:
442                 str="internal error";
443                 break;
444         case TLS1_AD_USER_CANCELLED:
445                 str="user canceled";
446                 break;
447         case TLS1_AD_NO_RENEGOTIATION:
448                 str="no renegotiation";
449                 break;
450         case TLS1_AD_UNSUPPORTED_EXTENSION:
451                 str="unsupported extension";
452                 break;
453         case TLS1_AD_CERTIFICATE_UNOBTAINABLE:
454                 str="certificate unobtainable";
455                 break;
456         case TLS1_AD_UNRECOGNIZED_NAME:
457                 str="unrecognized name";
458                 break;
459         case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE:
460                 str="bad certificate status response";
461                 break;
462         case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE:
463                 str="bad certificate hash value";
464                 break;
465         case TLS1_AD_UNKNOWN_PSK_IDENTITY:
466                 str="unknown PSK identity";
467                 break;
468         default: str="unknown"; break;
469                 }
470         return(str);
471         }
472
473 const char *SSL_rstate_string(const SSL *s)
474         {
475         const char *str;
476
477         switch (s->rstate)
478                 {
479         case SSL_ST_READ_HEADER:str="RH"; break;
480         case SSL_ST_READ_BODY:  str="RB"; break;
481         case SSL_ST_READ_DONE:  str="RD"; break;
482         default: str="unknown"; break;
483                 }
484         return(str);
485         }