]> git.ipfire.org Git - thirdparty/openssl.git/blob - ssl/ssl_txt.c
Run util/openssl-format-source -v -c .
[thirdparty/openssl.git] / ssl / ssl_txt.c
1 /* ssl/ssl_txt.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59 #include <stdio.h>
60 #include <openssl/buffer.h>
61 #include "ssl_locl.h"
62
63 #ifndef OPENSSL_NO_FP_API
64 int SSL_SESSION_print_fp(FILE *fp, const SSL_SESSION *x)
65 {
66 BIO *b;
67 int ret;
68
69 if ((b = BIO_new(BIO_s_file_internal())) == NULL) {
70 SSLerr(SSL_F_SSL_SESSION_PRINT_FP, ERR_R_BUF_LIB);
71 return (0);
72 }
73 BIO_set_fp(b, fp, BIO_NOCLOSE);
74 ret = SSL_SESSION_print(b, x);
75 BIO_free(b);
76 return (ret);
77 }
78 #endif
79
80 int SSL_SESSION_print(BIO *bp, const SSL_SESSION *x)
81 {
82 unsigned int i;
83 const char *s;
84
85 if (x == NULL)
86 goto err;
87 if (BIO_puts(bp, "SSL-Session:\n") <= 0)
88 goto err;
89 if (x->ssl_version == SSL2_VERSION)
90 s = "SSLv2";
91 else if (x->ssl_version == SSL3_VERSION)
92 s = "SSLv3";
93 else if (x->ssl_version == TLS1_VERSION)
94 s = "TLSv1";
95 else if (x->ssl_version == DTLS1_VERSION)
96 s = "DTLSv1";
97 else if (x->ssl_version == DTLS1_BAD_VER)
98 s = "DTLSv1-bad";
99 else
100 s = "unknown";
101 if (BIO_printf(bp, " Protocol : %s\n", s) <= 0)
102 goto err;
103
104 if (x->cipher == NULL) {
105 if (((x->cipher_id) & 0xff000000) == 0x02000000) {
106 if (BIO_printf
107 (bp, " Cipher : %06lX\n", x->cipher_id & 0xffffff) <= 0)
108 goto err;
109 } else {
110 if (BIO_printf
111 (bp, " Cipher : %04lX\n", x->cipher_id & 0xffff) <= 0)
112 goto err;
113 }
114 } else {
115 if (BIO_printf
116 (bp, " Cipher : %s\n",
117 ((x->cipher == NULL) ? "unknown" : x->cipher->name)) <= 0)
118 goto err;
119 }
120 if (BIO_puts(bp, " Session-ID: ") <= 0)
121 goto err;
122 for (i = 0; i < x->session_id_length; i++) {
123 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0)
124 goto err;
125 }
126 if (BIO_puts(bp, "\n Session-ID-ctx: ") <= 0)
127 goto err;
128 for (i = 0; i < x->sid_ctx_length; i++) {
129 if (BIO_printf(bp, "%02X", x->sid_ctx[i]) <= 0)
130 goto err;
131 }
132 if (BIO_puts(bp, "\n Master-Key: ") <= 0)
133 goto err;
134 for (i = 0; i < (unsigned int)x->master_key_length; i++) {
135 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
136 goto err;
137 }
138 if (BIO_puts(bp, "\n Key-Arg : ") <= 0)
139 goto err;
140 if (x->key_arg_length == 0) {
141 if (BIO_puts(bp, "None") <= 0)
142 goto err;
143 } else
144 for (i = 0; i < x->key_arg_length; i++) {
145 if (BIO_printf(bp, "%02X", x->key_arg[i]) <= 0)
146 goto err;
147 }
148 #ifndef OPENSSL_NO_KRB5
149 if (BIO_puts(bp, "\n Krb5 Principal: ") <= 0)
150 goto err;
151 if (x->krb5_client_princ_len == 0) {
152 if (BIO_puts(bp, "None") <= 0)
153 goto err;
154 } else
155 for (i = 0; i < x->krb5_client_princ_len; i++) {
156 if (BIO_printf(bp, "%02X", x->krb5_client_princ[i]) <= 0)
157 goto err;
158 }
159 #endif /* OPENSSL_NO_KRB5 */
160 #ifndef OPENSSL_NO_TLSEXT
161 if (x->tlsext_tick_lifetime_hint) {
162 if (BIO_printf(bp,
163 "\n TLS session ticket lifetime hint: %ld (seconds)",
164 x->tlsext_tick_lifetime_hint) <= 0)
165 goto err;
166 }
167 if (x->tlsext_tick) {
168 if (BIO_puts(bp, "\n TLS session ticket:\n") <= 0)
169 goto err;
170 if (BIO_dump_indent(bp, (char *)x->tlsext_tick, x->tlsext_ticklen, 4)
171 <= 0)
172 goto err;
173 }
174 #endif
175 #ifndef OPENSSL_NO_COMP
176 if (x->compress_meth != 0) {
177 SSL_COMP *comp = NULL;
178
179 ssl_cipher_get_evp(x, NULL, NULL, &comp);
180 if (comp == NULL) {
181 if (BIO_printf(bp, "\n Compression: %d", x->compress_meth) <=
182 0)
183 goto err;
184 } else {
185 if (BIO_printf
186 (bp, "\n Compression: %d (%s)", comp->id,
187 comp->method->name) <= 0)
188 goto err;
189 }
190 }
191 #endif
192 if (x->time != 0L) {
193 if (BIO_printf(bp, "\n Start Time: %ld", x->time) <= 0)
194 goto err;
195 }
196 if (x->timeout != 0L) {
197 if (BIO_printf(bp, "\n Timeout : %ld (sec)", x->timeout) <= 0)
198 goto err;
199 }
200 if (BIO_puts(bp, "\n") <= 0)
201 goto err;
202
203 if (BIO_puts(bp, " Verify return code: ") <= 0)
204 goto err;
205 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result,
206 X509_verify_cert_error_string(x->verify_result)) <= 0)
207 goto err;
208
209 return (1);
210 err:
211 return (0);
212 }