sl@0: /* ssl/ssl_err.c */ sl@0: /* ==================================================================== sl@0: * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. sl@0: * sl@0: * Redistribution and use in source and binary forms, with or without sl@0: * modification, are permitted provided that the following conditions sl@0: * are met: sl@0: * sl@0: * 1. Redistributions of source code must retain the above copyright sl@0: * notice, this list of conditions and the following disclaimer. sl@0: * sl@0: * 2. Redistributions in binary form must reproduce the above copyright sl@0: * notice, this list of conditions and the following disclaimer in sl@0: * the documentation and/or other materials provided with the sl@0: * distribution. sl@0: * sl@0: * 3. All advertising materials mentioning features or use of this sl@0: * software must display the following acknowledgment: sl@0: * "This product includes software developed by the OpenSSL Project sl@0: * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" sl@0: * sl@0: * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to sl@0: * endorse or promote products derived from this software without sl@0: * prior written permission. For written permission, please contact sl@0: * openssl-core@OpenSSL.org. sl@0: * sl@0: * 5. Products derived from this software may not be called "OpenSSL" sl@0: * nor may "OpenSSL" appear in their names without prior written sl@0: * permission of the OpenSSL Project. sl@0: * sl@0: * 6. Redistributions of any form whatsoever must retain the following sl@0: * acknowledgment: sl@0: * "This product includes software developed by the OpenSSL Project sl@0: * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" sl@0: * sl@0: * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY sl@0: * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE sl@0: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR sl@0: * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR sl@0: * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, sl@0: * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT sl@0: * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; sl@0: * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) sl@0: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, sl@0: * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) sl@0: * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED sl@0: * OF THE POSSIBILITY OF SUCH DAMAGE. sl@0: * ==================================================================== sl@0: * sl@0: * This product includes cryptographic software written by Eric Young sl@0: * (eay@cryptsoft.com). This product includes software written by Tim sl@0: * Hudson (tjh@cryptsoft.com). sl@0: * sl@0: */ sl@0: /* sl@0: © Portions copyright (c) 2006 Nokia Corporation. All rights reserved. sl@0: */ sl@0: sl@0: /* NOTE: this file was auto generated by the mkerr.pl script: any changes sl@0: * made to it will be overwritten when the script next updates this file, sl@0: * only reason strings will be preserved. sl@0: */ sl@0: sl@0: #include sl@0: #include sl@0: #include sl@0: sl@0: #if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__))) sl@0: #include "libssl_wsd.h" sl@0: #endif sl@0: sl@0: sl@0: /* BEGIN ERROR CODES */ sl@0: #ifndef OPENSSL_NO_ERR sl@0: sl@0: #define ERR_FUNC(func) ERR_PACK(ERR_LIB_SSL,func,0) sl@0: #define ERR_REASON(reason) ERR_PACK(ERR_LIB_SSL,0,reason) sl@0: sl@0: #ifndef EMULATOR sl@0: static ERR_STRING_DATA SSL_str_functs[]= sl@0: #else sl@0: const ERR_STRING_DATA temp_SSL_str_functs[]= sl@0: #endif sl@0: { sl@0: {ERR_FUNC(SSL_F_CLIENT_CERTIFICATE), "CLIENT_CERTIFICATE"}, sl@0: {ERR_FUNC(SSL_F_CLIENT_FINISHED), "CLIENT_FINISHED"}, sl@0: {ERR_FUNC(SSL_F_CLIENT_HELLO), "CLIENT_HELLO"}, sl@0: {ERR_FUNC(SSL_F_CLIENT_MASTER_KEY), "CLIENT_MASTER_KEY"}, sl@0: {ERR_FUNC(SSL_F_D2I_SSL_SESSION), "d2i_SSL_SESSION"}, sl@0: {ERR_FUNC(SSL_F_DO_DTLS1_WRITE), "DO_DTLS1_WRITE"}, sl@0: {ERR_FUNC(SSL_F_DO_SSL3_WRITE), "DO_SSL3_WRITE"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_ACCEPT), "DTLS1_ACCEPT"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_BUFFER_RECORD), "DTLS1_BUFFER_RECORD"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_CLIENT_HELLO), "DTLS1_CLIENT_HELLO"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_CONNECT), "DTLS1_CONNECT"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_ENC), "DTLS1_ENC"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_GET_HELLO_VERIFY), "DTLS1_GET_HELLO_VERIFY"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_GET_MESSAGE), "DTLS1_GET_MESSAGE"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_GET_MESSAGE_FRAGMENT), "DTLS1_GET_MESSAGE_FRAGMENT"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_GET_RECORD), "DTLS1_GET_RECORD"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_OUTPUT_CERT_CHAIN), "DTLS1_OUTPUT_CERT_CHAIN"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_PREPROCESS_FRAGMENT), "DTLS1_PREPROCESS_FRAGMENT"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_PROCESS_OUT_OF_SEQ_MESSAGE), "DTLS1_PROCESS_OUT_OF_SEQ_MESSAGE"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_PROCESS_RECORD), "DTLS1_PROCESS_RECORD"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_READ_BYTES), "DTLS1_READ_BYTES"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_READ_FAILED), "DTLS1_READ_FAILED"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_SEND_CERTIFICATE_REQUEST), "DTLS1_SEND_CERTIFICATE_REQUEST"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_SEND_CLIENT_CERTIFICATE), "DTLS1_SEND_CLIENT_CERTIFICATE"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_SEND_CLIENT_KEY_EXCHANGE), "DTLS1_SEND_CLIENT_KEY_EXCHANGE"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_SEND_CLIENT_VERIFY), "DTLS1_SEND_CLIENT_VERIFY"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_SEND_HELLO_VERIFY_REQUEST), "DTLS1_SEND_HELLO_VERIFY_REQUEST"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_SEND_SERVER_CERTIFICATE), "DTLS1_SEND_SERVER_CERTIFICATE"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_SEND_SERVER_HELLO), "DTLS1_SEND_SERVER_HELLO"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_SEND_SERVER_KEY_EXCHANGE), "DTLS1_SEND_SERVER_KEY_EXCHANGE"}, sl@0: {ERR_FUNC(SSL_F_DTLS1_WRITE_APP_DATA_BYTES), "DTLS1_WRITE_APP_DATA_BYTES"}, sl@0: {ERR_FUNC(SSL_F_GET_CLIENT_FINISHED), "GET_CLIENT_FINISHED"}, sl@0: {ERR_FUNC(SSL_F_GET_CLIENT_HELLO), "GET_CLIENT_HELLO"}, sl@0: {ERR_FUNC(SSL_F_GET_CLIENT_MASTER_KEY), "GET_CLIENT_MASTER_KEY"}, sl@0: {ERR_FUNC(SSL_F_GET_SERVER_FINISHED), "GET_SERVER_FINISHED"}, sl@0: {ERR_FUNC(SSL_F_GET_SERVER_HELLO), "GET_SERVER_HELLO"}, sl@0: {ERR_FUNC(SSL_F_GET_SERVER_VERIFY), "GET_SERVER_VERIFY"}, sl@0: {ERR_FUNC(SSL_F_I2D_SSL_SESSION), "i2d_SSL_SESSION"}, sl@0: {ERR_FUNC(SSL_F_READ_N), "READ_N"}, sl@0: {ERR_FUNC(SSL_F_REQUEST_CERTIFICATE), "REQUEST_CERTIFICATE"}, sl@0: {ERR_FUNC(SSL_F_SERVER_FINISH), "SERVER_FINISH"}, sl@0: {ERR_FUNC(SSL_F_SERVER_HELLO), "SERVER_HELLO"}, sl@0: {ERR_FUNC(SSL_F_SERVER_VERIFY), "SERVER_VERIFY"}, sl@0: {ERR_FUNC(SSL_F_SSL23_ACCEPT), "SSL23_ACCEPT"}, sl@0: {ERR_FUNC(SSL_F_SSL23_CLIENT_HELLO), "SSL23_CLIENT_HELLO"}, sl@0: {ERR_FUNC(SSL_F_SSL23_CONNECT), "SSL23_CONNECT"}, sl@0: {ERR_FUNC(SSL_F_SSL23_GET_CLIENT_HELLO), "SSL23_GET_CLIENT_HELLO"}, sl@0: {ERR_FUNC(SSL_F_SSL23_GET_SERVER_HELLO), "SSL23_GET_SERVER_HELLO"}, sl@0: {ERR_FUNC(SSL_F_SSL23_PEEK), "SSL23_PEEK"}, sl@0: {ERR_FUNC(SSL_F_SSL23_READ), "SSL23_READ"}, sl@0: {ERR_FUNC(SSL_F_SSL23_WRITE), "SSL23_WRITE"}, sl@0: {ERR_FUNC(SSL_F_SSL2_ACCEPT), "SSL2_ACCEPT"}, sl@0: {ERR_FUNC(SSL_F_SSL2_CONNECT), "SSL2_CONNECT"}, sl@0: {ERR_FUNC(SSL_F_SSL2_ENC_INIT), "SSL2_ENC_INIT"}, sl@0: {ERR_FUNC(SSL_F_SSL2_GENERATE_KEY_MATERIAL), "SSL2_GENERATE_KEY_MATERIAL"}, sl@0: {ERR_FUNC(SSL_F_SSL2_PEEK), "SSL2_PEEK"}, sl@0: {ERR_FUNC(SSL_F_SSL2_READ), "SSL2_READ"}, sl@0: {ERR_FUNC(SSL_F_SSL2_READ_INTERNAL), "SSL2_READ_INTERNAL"}, sl@0: {ERR_FUNC(SSL_F_SSL2_SET_CERTIFICATE), "SSL2_SET_CERTIFICATE"}, sl@0: {ERR_FUNC(SSL_F_SSL2_WRITE), "SSL2_WRITE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_ACCEPT), "SSL3_ACCEPT"}, sl@0: {ERR_FUNC(SSL_F_SSL3_CALLBACK_CTRL), "SSL3_CALLBACK_CTRL"}, sl@0: {ERR_FUNC(SSL_F_SSL3_CHANGE_CIPHER_STATE), "SSL3_CHANGE_CIPHER_STATE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM), "SSL3_CHECK_CERT_AND_ALGORITHM"}, sl@0: {ERR_FUNC(SSL_F_SSL3_CLIENT_HELLO), "SSL3_CLIENT_HELLO"}, sl@0: {ERR_FUNC(SSL_F_SSL3_CONNECT), "SSL3_CONNECT"}, sl@0: {ERR_FUNC(SSL_F_SSL3_CTRL), "SSL3_CTRL"}, sl@0: {ERR_FUNC(SSL_F_SSL3_CTX_CTRL), "SSL3_CTX_CTRL"}, sl@0: {ERR_FUNC(SSL_F_SSL3_ENC), "SSL3_ENC"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GENERATE_KEY_BLOCK), "SSL3_GENERATE_KEY_BLOCK"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_CERTIFICATE_REQUEST), "SSL3_GET_CERTIFICATE_REQUEST"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_CERT_VERIFY), "SSL3_GET_CERT_VERIFY"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_CLIENT_CERTIFICATE), "SSL3_GET_CLIENT_CERTIFICATE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_CLIENT_HELLO), "SSL3_GET_CLIENT_HELLO"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE), "SSL3_GET_CLIENT_KEY_EXCHANGE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_FINISHED), "SSL3_GET_FINISHED"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_KEY_EXCHANGE), "SSL3_GET_KEY_EXCHANGE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_MESSAGE), "SSL3_GET_MESSAGE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_NEW_SESSION_TICKET), "SSL3_GET_NEW_SESSION_TICKET"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_RECORD), "SSL3_GET_RECORD"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_SERVER_CERTIFICATE), "SSL3_GET_SERVER_CERTIFICATE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_SERVER_DONE), "SSL3_GET_SERVER_DONE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_GET_SERVER_HELLO), "SSL3_GET_SERVER_HELLO"}, sl@0: {ERR_FUNC(SSL_F_SSL3_NEW_SESSION_TICKET), "SSL3_NEW_SESSION_TICKET"}, sl@0: {ERR_FUNC(SSL_F_SSL3_OUTPUT_CERT_CHAIN), "SSL3_OUTPUT_CERT_CHAIN"}, sl@0: {ERR_FUNC(SSL_F_SSL3_PEEK), "SSL3_PEEK"}, sl@0: {ERR_FUNC(SSL_F_SSL3_READ_BYTES), "SSL3_READ_BYTES"}, sl@0: {ERR_FUNC(SSL_F_SSL3_READ_N), "SSL3_READ_N"}, sl@0: {ERR_FUNC(SSL_F_SSL3_SEND_CERTIFICATE_REQUEST), "SSL3_SEND_CERTIFICATE_REQUEST"}, sl@0: {ERR_FUNC(SSL_F_SSL3_SEND_CLIENT_CERTIFICATE), "SSL3_SEND_CLIENT_CERTIFICATE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE), "SSL3_SEND_CLIENT_KEY_EXCHANGE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_SEND_CLIENT_VERIFY), "SSL3_SEND_CLIENT_VERIFY"}, sl@0: {ERR_FUNC(SSL_F_SSL3_SEND_SERVER_CERTIFICATE), "SSL3_SEND_SERVER_CERTIFICATE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_SEND_SERVER_HELLO), "SSL3_SEND_SERVER_HELLO"}, sl@0: {ERR_FUNC(SSL_F_SSL3_SEND_SERVER_KEY_EXCHANGE), "SSL3_SEND_SERVER_KEY_EXCHANGE"}, sl@0: {ERR_FUNC(SSL_F_SSL3_SETUP_BUFFERS), "SSL3_SETUP_BUFFERS"}, sl@0: {ERR_FUNC(SSL_F_SSL3_SETUP_KEY_BLOCK), "SSL3_SETUP_KEY_BLOCK"}, sl@0: {ERR_FUNC(SSL_F_SSL3_WRITE_BYTES), "SSL3_WRITE_BYTES"}, sl@0: {ERR_FUNC(SSL_F_SSL3_WRITE_PENDING), "SSL3_WRITE_PENDING"}, sl@0: {ERR_FUNC(SSL_F_SSL_ADD_CLIENTHELLO_TLSEXT), "SSL_ADD_CLIENTHELLO_TLSEXT"}, sl@0: {ERR_FUNC(SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK), "SSL_add_dir_cert_subjects_to_stack"}, sl@0: {ERR_FUNC(SSL_F_SSL_ADD_FILE_CERT_SUBJECTS_TO_STACK), "SSL_add_file_cert_subjects_to_stack"}, sl@0: {ERR_FUNC(SSL_F_SSL_ADD_SERVERHELLO_TLSEXT), "SSL_ADD_SERVERHELLO_TLSEXT"}, sl@0: {ERR_FUNC(SSL_F_SSL_BAD_METHOD), "SSL_BAD_METHOD"}, sl@0: {ERR_FUNC(SSL_F_SSL_BYTES_TO_CIPHER_LIST), "SSL_BYTES_TO_CIPHER_LIST"}, sl@0: {ERR_FUNC(SSL_F_SSL_CERT_DUP), "SSL_CERT_DUP"}, sl@0: {ERR_FUNC(SSL_F_SSL_CERT_INST), "SSL_CERT_INST"}, sl@0: {ERR_FUNC(SSL_F_SSL_CERT_INSTANTIATE), "SSL_CERT_INSTANTIATE"}, sl@0: {ERR_FUNC(SSL_F_SSL_CERT_NEW), "SSL_CERT_NEW"}, sl@0: {ERR_FUNC(SSL_F_SSL_CHECK_PRIVATE_KEY), "SSL_check_private_key"}, sl@0: {ERR_FUNC(SSL_F_SSL_CHECK_SERVERHELLO_TLSEXT), "SSL_CHECK_SERVERHELLO_TLSEXT"}, sl@0: {ERR_FUNC(SSL_F_SSL_CIPHER_PROCESS_RULESTR), "SSL_CIPHER_PROCESS_RULESTR"}, sl@0: {ERR_FUNC(SSL_F_SSL_CIPHER_STRENGTH_SORT), "SSL_CIPHER_STRENGTH_SORT"}, sl@0: {ERR_FUNC(SSL_F_SSL_CLEAR), "SSL_clear"}, sl@0: {ERR_FUNC(SSL_F_SSL_COMP_ADD_COMPRESSION_METHOD), "SSL_COMP_add_compression_method"}, sl@0: {ERR_FUNC(SSL_F_SSL_CREATE_CIPHER_LIST), "SSL_CREATE_CIPHER_LIST"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTRL), "SSL_ctrl"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_CHECK_PRIVATE_KEY), "SSL_CTX_check_private_key"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_NEW), "SSL_CTX_new"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_SET_CIPHER_LIST), "SSL_CTX_set_cipher_list"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_SET_PURPOSE), "SSL_CTX_set_purpose"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_SET_SESSION_ID_CONTEXT), "SSL_CTX_set_session_id_context"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_SET_SSL_VERSION), "SSL_CTX_set_ssl_version"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_SET_TRUST), "SSL_CTX_set_trust"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_USE_CERTIFICATE), "SSL_CTX_use_certificate"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_USE_CERTIFICATE_ASN1), "SSL_CTX_use_certificate_ASN1"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE), "SSL_CTX_use_certificate_chain_file"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE), "SSL_CTX_use_certificate_file"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_USE_PRIVATEKEY), "SSL_CTX_use_PrivateKey"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_USE_PRIVATEKEY_ASN1), "SSL_CTX_use_PrivateKey_ASN1"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_USE_PRIVATEKEY_FILE), "SSL_CTX_use_PrivateKey_file"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY), "SSL_CTX_use_RSAPrivateKey"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_ASN1), "SSL_CTX_use_RSAPrivateKey_ASN1"}, sl@0: {ERR_FUNC(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE), "SSL_CTX_use_RSAPrivateKey_file"}, sl@0: {ERR_FUNC(SSL_F_SSL_DO_HANDSHAKE), "SSL_do_handshake"}, sl@0: {ERR_FUNC(SSL_F_SSL_GET_NEW_SESSION), "SSL_GET_NEW_SESSION"}, sl@0: {ERR_FUNC(SSL_F_SSL_GET_PREV_SESSION), "SSL_GET_PREV_SESSION"}, sl@0: {ERR_FUNC(SSL_F_SSL_GET_SERVER_SEND_CERT), "SSL_GET_SERVER_SEND_CERT"}, sl@0: {ERR_FUNC(SSL_F_SSL_GET_SIGN_PKEY), "SSL_GET_SIGN_PKEY"}, sl@0: {ERR_FUNC(SSL_F_SSL_INIT_WBIO_BUFFER), "SSL_INIT_WBIO_BUFFER"}, sl@0: {ERR_FUNC(SSL_F_SSL_LOAD_CLIENT_CA_FILE), "SSL_load_client_CA_file"}, sl@0: {ERR_FUNC(SSL_F_SSL_NEW), "SSL_new"}, sl@0: {ERR_FUNC(SSL_F_SSL_PEEK), "SSL_peek"}, sl@0: {ERR_FUNC(SSL_F_SSL_PREPARE_CLIENTHELLO_TLSEXT), "SSL_PREPARE_CLIENTHELLO_TLSEXT"}, sl@0: {ERR_FUNC(SSL_F_SSL_PREPARE_SERVERHELLO_TLSEXT), "SSL_PREPARE_SERVERHELLO_TLSEXT"}, sl@0: {ERR_FUNC(SSL_F_SSL_READ), "SSL_read"}, sl@0: {ERR_FUNC(SSL_F_SSL_RSA_PRIVATE_DECRYPT), "SSL_RSA_PRIVATE_DECRYPT"}, sl@0: {ERR_FUNC(SSL_F_SSL_RSA_PUBLIC_ENCRYPT), "SSL_RSA_PUBLIC_ENCRYPT"}, sl@0: {ERR_FUNC(SSL_F_SSL_SESSION_NEW), "SSL_SESSION_new"}, sl@0: {ERR_FUNC(SSL_F_SSL_SESSION_PRINT_FP), "SSL_SESSION_print_fp"}, sl@0: {ERR_FUNC(SSL_F_SSL_SESS_CERT_NEW), "SSL_SESS_CERT_NEW"}, sl@0: {ERR_FUNC(SSL_F_SSL_SET_CERT), "SSL_SET_CERT"}, sl@0: {ERR_FUNC(SSL_F_SSL_SET_CIPHER_LIST), "SSL_set_cipher_list"}, sl@0: {ERR_FUNC(SSL_F_SSL_SET_FD), "SSL_set_fd"}, sl@0: {ERR_FUNC(SSL_F_SSL_SET_PKEY), "SSL_SET_PKEY"}, sl@0: {ERR_FUNC(SSL_F_SSL_SET_PURPOSE), "SSL_set_purpose"}, sl@0: {ERR_FUNC(SSL_F_SSL_SET_RFD), "SSL_set_rfd"}, sl@0: {ERR_FUNC(SSL_F_SSL_SET_SESSION), "SSL_set_session"}, sl@0: {ERR_FUNC(SSL_F_SSL_SET_SESSION_ID_CONTEXT), "SSL_set_session_id_context"}, sl@0: {ERR_FUNC(SSL_F_SSL_SET_TRUST), "SSL_set_trust"}, sl@0: {ERR_FUNC(SSL_F_SSL_SET_WFD), "SSL_set_wfd"}, sl@0: {ERR_FUNC(SSL_F_SSL_SHUTDOWN), "SSL_shutdown"}, sl@0: {ERR_FUNC(SSL_F_SSL_UNDEFINED_CONST_FUNCTION), "SSL_UNDEFINED_CONST_FUNCTION"}, sl@0: {ERR_FUNC(SSL_F_SSL_UNDEFINED_FUNCTION), "SSL_UNDEFINED_FUNCTION"}, sl@0: {ERR_FUNC(SSL_F_SSL_UNDEFINED_VOID_FUNCTION), "SSL_UNDEFINED_VOID_FUNCTION"}, sl@0: {ERR_FUNC(SSL_F_SSL_USE_CERTIFICATE), "SSL_use_certificate"}, sl@0: {ERR_FUNC(SSL_F_SSL_USE_CERTIFICATE_ASN1), "SSL_use_certificate_ASN1"}, sl@0: {ERR_FUNC(SSL_F_SSL_USE_CERTIFICATE_FILE), "SSL_use_certificate_file"}, sl@0: {ERR_FUNC(SSL_F_SSL_USE_PRIVATEKEY), "SSL_use_PrivateKey"}, sl@0: {ERR_FUNC(SSL_F_SSL_USE_PRIVATEKEY_ASN1), "SSL_use_PrivateKey_ASN1"}, sl@0: {ERR_FUNC(SSL_F_SSL_USE_PRIVATEKEY_FILE), "SSL_use_PrivateKey_file"}, sl@0: {ERR_FUNC(SSL_F_SSL_USE_RSAPRIVATEKEY), "SSL_use_RSAPrivateKey"}, sl@0: {ERR_FUNC(SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1), "SSL_use_RSAPrivateKey_ASN1"}, sl@0: {ERR_FUNC(SSL_F_SSL_USE_RSAPRIVATEKEY_FILE), "SSL_use_RSAPrivateKey_file"}, sl@0: {ERR_FUNC(SSL_F_SSL_VERIFY_CERT_CHAIN), "SSL_VERIFY_CERT_CHAIN"}, sl@0: {ERR_FUNC(SSL_F_SSL_WRITE), "SSL_write"}, sl@0: {ERR_FUNC(SSL_F_TLS1_CHANGE_CIPHER_STATE), "TLS1_CHANGE_CIPHER_STATE"}, sl@0: {ERR_FUNC(SSL_F_TLS1_ENC), "TLS1_ENC"}, sl@0: {ERR_FUNC(SSL_F_TLS1_SETUP_KEY_BLOCK), "TLS1_SETUP_KEY_BLOCK"}, sl@0: {ERR_FUNC(SSL_F_WRITE_PENDING), "WRITE_PENDING"}, sl@0: {0,NULL} sl@0: }; sl@0: sl@0: #ifdef EMULATOR sl@0: GET_STATIC_ARRAY_FROM_TLS(SSL_str_reasons,ssl_err,ERR_STRING_DATA) sl@0: sl@0: #define SSL_str_reasons (GET_WSD_VAR_NAME(SSL_str_reasons,ssl_err,s)()) sl@0: #endif sl@0: sl@0: #ifndef EMULATOR sl@0: static ERR_STRING_DATA SSL_str_reasons[]= sl@0: #else sl@0: const ERR_STRING_DATA temp_SSL_str_reasons[]= sl@0: #endif sl@0: { sl@0: {ERR_REASON(SSL_R_APP_DATA_IN_HANDSHAKE) ,"app data in handshake"}, sl@0: {ERR_REASON(SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT),"attempt to reuse session in different context"}, sl@0: {ERR_REASON(SSL_R_BAD_ALERT_RECORD) ,"bad alert record"}, sl@0: {ERR_REASON(SSL_R_BAD_AUTHENTICATION_TYPE),"bad authentication type"}, sl@0: {ERR_REASON(SSL_R_BAD_CHANGE_CIPHER_SPEC),"bad change cipher spec"}, sl@0: {ERR_REASON(SSL_R_BAD_CHECKSUM) ,"bad checksum"}, sl@0: {ERR_REASON(SSL_R_BAD_DATA_RETURNED_BY_CALLBACK),"bad data returned by callback"}, sl@0: {ERR_REASON(SSL_R_BAD_DECOMPRESSION) ,"bad decompression"}, sl@0: {ERR_REASON(SSL_R_BAD_DH_G_LENGTH) ,"bad dh g length"}, sl@0: {ERR_REASON(SSL_R_BAD_DH_PUB_KEY_LENGTH) ,"bad dh pub key length"}, sl@0: {ERR_REASON(SSL_R_BAD_DH_P_LENGTH) ,"bad dh p length"}, sl@0: {ERR_REASON(SSL_R_BAD_DIGEST_LENGTH) ,"bad digest length"}, sl@0: {ERR_REASON(SSL_R_BAD_DSA_SIGNATURE) ,"bad dsa signature"}, sl@0: {ERR_REASON(SSL_R_BAD_ECC_CERT) ,"bad ecc cert"}, sl@0: {ERR_REASON(SSL_R_BAD_ECDSA_SIGNATURE) ,"bad ecdsa signature"}, sl@0: {ERR_REASON(SSL_R_BAD_ECPOINT) ,"bad ecpoint"}, sl@0: {ERR_REASON(SSL_R_BAD_HELLO_REQUEST) ,"bad hello request"}, sl@0: {ERR_REASON(SSL_R_BAD_LENGTH) ,"bad length"}, sl@0: {ERR_REASON(SSL_R_BAD_MAC_DECODE) ,"bad mac decode"}, sl@0: {ERR_REASON(SSL_R_BAD_MESSAGE_TYPE) ,"bad message type"}, sl@0: {ERR_REASON(SSL_R_BAD_PACKET_LENGTH) ,"bad packet length"}, sl@0: {ERR_REASON(SSL_R_BAD_PROTOCOL_VERSION_NUMBER),"bad protocol version number"}, sl@0: {ERR_REASON(SSL_R_BAD_RESPONSE_ARGUMENT) ,"bad response argument"}, sl@0: {ERR_REASON(SSL_R_BAD_RSA_DECRYPT) ,"bad rsa decrypt"}, sl@0: {ERR_REASON(SSL_R_BAD_RSA_ENCRYPT) ,"bad rsa encrypt"}, sl@0: {ERR_REASON(SSL_R_BAD_RSA_E_LENGTH) ,"bad rsa e length"}, sl@0: {ERR_REASON(SSL_R_BAD_RSA_MODULUS_LENGTH),"bad rsa modulus length"}, sl@0: {ERR_REASON(SSL_R_BAD_RSA_SIGNATURE) ,"bad rsa signature"}, sl@0: {ERR_REASON(SSL_R_BAD_SIGNATURE) ,"bad signature"}, sl@0: {ERR_REASON(SSL_R_BAD_SSL_FILETYPE) ,"bad ssl filetype"}, sl@0: {ERR_REASON(SSL_R_BAD_SSL_SESSION_ID_LENGTH),"bad ssl session id length"}, sl@0: {ERR_REASON(SSL_R_BAD_STATE) ,"bad state"}, sl@0: {ERR_REASON(SSL_R_BAD_WRITE_RETRY) ,"bad write retry"}, sl@0: {ERR_REASON(SSL_R_BIO_NOT_SET) ,"bio not set"}, sl@0: {ERR_REASON(SSL_R_BLOCK_CIPHER_PAD_IS_WRONG),"block cipher pad is wrong"}, sl@0: {ERR_REASON(SSL_R_BN_LIB) ,"bn lib"}, sl@0: {ERR_REASON(SSL_R_CA_DN_LENGTH_MISMATCH) ,"ca dn length mismatch"}, sl@0: {ERR_REASON(SSL_R_CA_DN_TOO_LONG) ,"ca dn too long"}, sl@0: {ERR_REASON(SSL_R_CCS_RECEIVED_EARLY) ,"ccs received early"}, sl@0: {ERR_REASON(SSL_R_CERTIFICATE_VERIFY_FAILED),"certificate verify failed"}, sl@0: {ERR_REASON(SSL_R_CERT_LENGTH_MISMATCH) ,"cert length mismatch"}, sl@0: {ERR_REASON(SSL_R_CHALLENGE_IS_DIFFERENT),"challenge is different"}, sl@0: {ERR_REASON(SSL_R_CIPHER_CODE_WRONG_LENGTH),"cipher code wrong length"}, sl@0: {ERR_REASON(SSL_R_CIPHER_OR_HASH_UNAVAILABLE),"cipher or hash unavailable"}, sl@0: {ERR_REASON(SSL_R_CIPHER_TABLE_SRC_ERROR),"cipher table src error"}, sl@0: {ERR_REASON(SSL_R_CLIENTHELLO_TLSEXT) ,"clienthello tlsext"}, sl@0: {ERR_REASON(SSL_R_COMPRESSED_LENGTH_TOO_LONG),"compressed length too long"}, sl@0: {ERR_REASON(SSL_R_COMPRESSION_FAILURE) ,"compression failure"}, sl@0: {ERR_REASON(SSL_R_COMPRESSION_ID_NOT_WITHIN_PRIVATE_RANGE),"compression id not within private range"}, sl@0: {ERR_REASON(SSL_R_COMPRESSION_LIBRARY_ERROR),"compression library error"}, sl@0: {ERR_REASON(SSL_R_CONNECTION_ID_IS_DIFFERENT),"connection id is different"}, sl@0: {ERR_REASON(SSL_R_CONNECTION_TYPE_NOT_SET),"connection type not set"}, sl@0: {ERR_REASON(SSL_R_COOKIE_MISMATCH) ,"cookie mismatch"}, sl@0: {ERR_REASON(SSL_R_DATA_BETWEEN_CCS_AND_FINISHED),"data between ccs and finished"}, sl@0: {ERR_REASON(SSL_R_DATA_LENGTH_TOO_LONG) ,"data length too long"}, sl@0: {ERR_REASON(SSL_R_DECRYPTION_FAILED) ,"decryption failed"}, sl@0: {ERR_REASON(SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC),"decryption failed or bad record mac"}, sl@0: {ERR_REASON(SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG),"dh public value length is wrong"}, sl@0: {ERR_REASON(SSL_R_DIGEST_CHECK_FAILED) ,"digest check failed"}, sl@0: {ERR_REASON(SSL_R_DUPLICATE_COMPRESSION_ID),"duplicate compression id"}, sl@0: {ERR_REASON(SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER),"ecgroup too large for cipher"}, sl@0: {ERR_REASON(SSL_R_ENCRYPTED_LENGTH_TOO_LONG),"encrypted length too long"}, sl@0: {ERR_REASON(SSL_R_ERROR_GENERATING_TMP_RSA_KEY),"error generating tmp rsa key"}, sl@0: {ERR_REASON(SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST),"error in received cipher list"}, sl@0: {ERR_REASON(SSL_R_EXCESSIVE_MESSAGE_SIZE),"excessive message size"}, sl@0: {ERR_REASON(SSL_R_EXTRA_DATA_IN_MESSAGE) ,"extra data in message"}, sl@0: {ERR_REASON(SSL_R_GOT_A_FIN_BEFORE_A_CCS),"got a fin before a ccs"}, sl@0: {ERR_REASON(SSL_R_HTTPS_PROXY_REQUEST) ,"https proxy request"}, sl@0: {ERR_REASON(SSL_R_HTTP_REQUEST) ,"http request"}, sl@0: {ERR_REASON(SSL_R_ILLEGAL_PADDING) ,"illegal padding"}, sl@0: {ERR_REASON(SSL_R_INVALID_CHALLENGE_LENGTH),"invalid challenge length"}, sl@0: {ERR_REASON(SSL_R_INVALID_COMMAND) ,"invalid command"}, sl@0: {ERR_REASON(SSL_R_INVALID_PURPOSE) ,"invalid purpose"}, sl@0: {ERR_REASON(SSL_R_INVALID_TICKET_KEYS_LENGTH),"invalid ticket keys length"}, sl@0: {ERR_REASON(SSL_R_INVALID_TRUST) ,"invalid trust"}, sl@0: {ERR_REASON(SSL_R_KEY_ARG_TOO_LONG) ,"key arg too long"}, sl@0: {ERR_REASON(SSL_R_KRB5) ,"krb5"}, sl@0: {ERR_REASON(SSL_R_KRB5_C_CC_PRINC) ,"krb5 client cc principal (no tkt?)"}, sl@0: {ERR_REASON(SSL_R_KRB5_C_GET_CRED) ,"krb5 client get cred"}, sl@0: {ERR_REASON(SSL_R_KRB5_C_INIT) ,"krb5 client init"}, sl@0: {ERR_REASON(SSL_R_KRB5_C_MK_REQ) ,"krb5 client mk_req (expired tkt?)"}, sl@0: {ERR_REASON(SSL_R_KRB5_S_BAD_TICKET) ,"krb5 server bad ticket"}, sl@0: {ERR_REASON(SSL_R_KRB5_S_INIT) ,"krb5 server init"}, sl@0: {ERR_REASON(SSL_R_KRB5_S_RD_REQ) ,"krb5 server rd_req (keytab perms?)"}, sl@0: {ERR_REASON(SSL_R_KRB5_S_TKT_EXPIRED) ,"krb5 server tkt expired"}, sl@0: {ERR_REASON(SSL_R_KRB5_S_TKT_NYV) ,"krb5 server tkt not yet valid"}, sl@0: {ERR_REASON(SSL_R_KRB5_S_TKT_SKEW) ,"krb5 server tkt skew"}, sl@0: {ERR_REASON(SSL_R_LENGTH_MISMATCH) ,"length mismatch"}, sl@0: {ERR_REASON(SSL_R_LENGTH_TOO_SHORT) ,"length too short"}, sl@0: {ERR_REASON(SSL_R_LIBRARY_BUG) ,"library bug"}, sl@0: {ERR_REASON(SSL_R_LIBRARY_HAS_NO_CIPHERS),"library has no ciphers"}, sl@0: {ERR_REASON(SSL_R_MESSAGE_TOO_LONG) ,"message too long"}, sl@0: {ERR_REASON(SSL_R_MISSING_DH_DSA_CERT) ,"missing dh dsa cert"}, sl@0: {ERR_REASON(SSL_R_MISSING_DH_KEY) ,"missing dh key"}, sl@0: {ERR_REASON(SSL_R_MISSING_DH_RSA_CERT) ,"missing dh rsa cert"}, sl@0: {ERR_REASON(SSL_R_MISSING_DSA_SIGNING_CERT),"missing dsa signing cert"}, sl@0: {ERR_REASON(SSL_R_MISSING_EXPORT_TMP_DH_KEY),"missing export tmp dh key"}, sl@0: {ERR_REASON(SSL_R_MISSING_EXPORT_TMP_RSA_KEY),"missing export tmp rsa key"}, sl@0: {ERR_REASON(SSL_R_MISSING_RSA_CERTIFICATE),"missing rsa certificate"}, sl@0: {ERR_REASON(SSL_R_MISSING_RSA_ENCRYPTING_CERT),"missing rsa encrypting cert"}, sl@0: {ERR_REASON(SSL_R_MISSING_RSA_SIGNING_CERT),"missing rsa signing cert"}, sl@0: {ERR_REASON(SSL_R_MISSING_TMP_DH_KEY) ,"missing tmp dh key"}, sl@0: {ERR_REASON(SSL_R_MISSING_TMP_ECDH_KEY) ,"missing tmp ecdh key"}, sl@0: {ERR_REASON(SSL_R_MISSING_TMP_RSA_KEY) ,"missing tmp rsa key"}, sl@0: {ERR_REASON(SSL_R_MISSING_TMP_RSA_PKEY) ,"missing tmp rsa pkey"}, sl@0: {ERR_REASON(SSL_R_MISSING_VERIFY_MESSAGE),"missing verify message"}, sl@0: {ERR_REASON(SSL_R_NON_SSLV2_INITIAL_PACKET),"non sslv2 initial packet"}, sl@0: {ERR_REASON(SSL_R_NO_CERTIFICATES_RETURNED),"no certificates returned"}, sl@0: {ERR_REASON(SSL_R_NO_CERTIFICATE_ASSIGNED),"no certificate assigned"}, sl@0: {ERR_REASON(SSL_R_NO_CERTIFICATE_RETURNED),"no certificate returned"}, sl@0: {ERR_REASON(SSL_R_NO_CERTIFICATE_SET) ,"no certificate set"}, sl@0: {ERR_REASON(SSL_R_NO_CERTIFICATE_SPECIFIED),"no certificate specified"}, sl@0: {ERR_REASON(SSL_R_NO_CIPHERS_AVAILABLE) ,"no ciphers available"}, sl@0: {ERR_REASON(SSL_R_NO_CIPHERS_PASSED) ,"no ciphers passed"}, sl@0: {ERR_REASON(SSL_R_NO_CIPHERS_SPECIFIED) ,"no ciphers specified"}, sl@0: {ERR_REASON(SSL_R_NO_CIPHER_LIST) ,"no cipher list"}, sl@0: {ERR_REASON(SSL_R_NO_CIPHER_MATCH) ,"no cipher match"}, sl@0: {ERR_REASON(SSL_R_NO_CLIENT_CERT_RECEIVED),"no client cert received"}, sl@0: {ERR_REASON(SSL_R_NO_COMPRESSION_SPECIFIED),"no compression specified"}, sl@0: {ERR_REASON(SSL_R_NO_METHOD_SPECIFIED) ,"no method specified"}, sl@0: {ERR_REASON(SSL_R_NO_PRIVATEKEY) ,"no privatekey"}, sl@0: {ERR_REASON(SSL_R_NO_PRIVATE_KEY_ASSIGNED),"no private key assigned"}, sl@0: {ERR_REASON(SSL_R_NO_PROTOCOLS_AVAILABLE),"no protocols available"}, sl@0: {ERR_REASON(SSL_R_NO_PUBLICKEY) ,"no publickey"}, sl@0: {ERR_REASON(SSL_R_NO_SHARED_CIPHER) ,"no shared cipher"}, sl@0: {ERR_REASON(SSL_R_NO_VERIFY_CALLBACK) ,"no verify callback"}, sl@0: {ERR_REASON(SSL_R_NULL_SSL_CTX) ,"null ssl ctx"}, sl@0: {ERR_REASON(SSL_R_NULL_SSL_METHOD_PASSED),"null ssl method passed"}, sl@0: {ERR_REASON(SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED),"old session cipher not returned"}, sl@0: {ERR_REASON(SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE),"only tls allowed in fips mode"}, sl@0: {ERR_REASON(SSL_R_PACKET_LENGTH_TOO_LONG),"packet length too long"}, sl@0: {ERR_REASON(SSL_R_PARSE_TLSEXT) ,"parse tlsext"}, sl@0: {ERR_REASON(SSL_R_PATH_TOO_LONG) ,"path too long"}, sl@0: {ERR_REASON(SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE),"peer did not return a certificate"}, sl@0: {ERR_REASON(SSL_R_PEER_ERROR) ,"peer error"}, sl@0: {ERR_REASON(SSL_R_PEER_ERROR_CERTIFICATE),"peer error certificate"}, sl@0: {ERR_REASON(SSL_R_PEER_ERROR_NO_CERTIFICATE),"peer error no certificate"}, sl@0: {ERR_REASON(SSL_R_PEER_ERROR_NO_CIPHER) ,"peer error no cipher"}, sl@0: {ERR_REASON(SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE),"peer error unsupported certificate type"}, sl@0: {ERR_REASON(SSL_R_PRE_MAC_LENGTH_TOO_LONG),"pre mac length too long"}, sl@0: {ERR_REASON(SSL_R_PROBLEMS_MAPPING_CIPHER_FUNCTIONS),"problems mapping cipher functions"}, sl@0: {ERR_REASON(SSL_R_PROTOCOL_IS_SHUTDOWN) ,"protocol is shutdown"}, sl@0: {ERR_REASON(SSL_R_PUBLIC_KEY_ENCRYPT_ERROR),"public key encrypt error"}, sl@0: {ERR_REASON(SSL_R_PUBLIC_KEY_IS_NOT_RSA) ,"public key is not rsa"}, sl@0: {ERR_REASON(SSL_R_PUBLIC_KEY_NOT_RSA) ,"public key not rsa"}, sl@0: {ERR_REASON(SSL_R_READ_BIO_NOT_SET) ,"read bio not set"}, sl@0: {ERR_REASON(SSL_R_READ_TIMEOUT_EXPIRED) ,"read timeout expired"}, sl@0: {ERR_REASON(SSL_R_READ_WRONG_PACKET_TYPE),"read wrong packet type"}, sl@0: {ERR_REASON(SSL_R_RECORD_LENGTH_MISMATCH),"record length mismatch"}, sl@0: {ERR_REASON(SSL_R_RECORD_TOO_LARGE) ,"record too large"}, sl@0: {ERR_REASON(SSL_R_RECORD_TOO_SMALL) ,"record too small"}, sl@0: {ERR_REASON(SSL_R_REQUIRED_CIPHER_MISSING),"required cipher missing"}, sl@0: {ERR_REASON(SSL_R_REUSE_CERT_LENGTH_NOT_ZERO),"reuse cert length not zero"}, sl@0: {ERR_REASON(SSL_R_REUSE_CERT_TYPE_NOT_ZERO),"reuse cert type not zero"}, sl@0: {ERR_REASON(SSL_R_REUSE_CIPHER_LIST_NOT_ZERO),"reuse cipher list not zero"}, sl@0: {ERR_REASON(SSL_R_SERVERHELLO_TLSEXT) ,"serverhello tlsext"}, sl@0: {ERR_REASON(SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED),"session id context uninitialized"}, sl@0: {ERR_REASON(SSL_R_SHORT_READ) ,"short read"}, sl@0: {ERR_REASON(SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE),"signature for non signing certificate"}, sl@0: {ERR_REASON(SSL_R_SSL23_DOING_SESSION_ID_REUSE),"ssl23 doing session id reuse"}, sl@0: {ERR_REASON(SSL_R_SSL2_CONNECTION_ID_TOO_LONG),"ssl2 connection id too long"}, sl@0: {ERR_REASON(SSL_R_SSL3_EXT_INVALID_SERVERNAME),"ssl3 ext invalid servername"}, sl@0: {ERR_REASON(SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE),"ssl3 ext invalid servername type"}, sl@0: {ERR_REASON(SSL_R_SSL3_SESSION_ID_TOO_LONG),"ssl3 session id too long"}, sl@0: {ERR_REASON(SSL_R_SSL3_SESSION_ID_TOO_SHORT),"ssl3 session id too short"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_BAD_CERTIFICATE),"sslv3 alert bad certificate"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_BAD_RECORD_MAC),"sslv3 alert bad record mac"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED),"sslv3 alert certificate expired"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED),"sslv3 alert certificate revoked"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN),"sslv3 alert certificate unknown"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE),"sslv3 alert decompression failure"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE),"sslv3 alert handshake failure"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER),"sslv3 alert illegal parameter"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_NO_CERTIFICATE),"sslv3 alert no certificate"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE),"sslv3 alert unexpected message"}, sl@0: {ERR_REASON(SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE),"sslv3 alert unsupported certificate"}, sl@0: {ERR_REASON(SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION),"ssl ctx has no default ssl version"}, sl@0: {ERR_REASON(SSL_R_SSL_HANDSHAKE_FAILURE) ,"ssl handshake failure"}, sl@0: {ERR_REASON(SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS),"ssl library has no ciphers"}, sl@0: {ERR_REASON(SSL_R_SSL_SESSION_ID_CALLBACK_FAILED),"ssl session id callback failed"}, sl@0: {ERR_REASON(SSL_R_SSL_SESSION_ID_CONFLICT),"ssl session id conflict"}, sl@0: {ERR_REASON(SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG),"ssl session id context too long"}, sl@0: {ERR_REASON(SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH),"ssl session id has bad length"}, sl@0: {ERR_REASON(SSL_R_SSL_SESSION_ID_IS_DIFFERENT),"ssl session id is different"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_ACCESS_DENIED),"tlsv1 alert access denied"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_DECODE_ERROR),"tlsv1 alert decode error"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPTION_FAILED),"tlsv1 alert decryption failed"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_DECRYPT_ERROR),"tlsv1 alert decrypt error"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION),"tlsv1 alert export restriction"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY),"tlsv1 alert insufficient security"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_INTERNAL_ERROR),"tlsv1 alert internal error"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_NO_RENEGOTIATION),"tlsv1 alert no renegotiation"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_PROTOCOL_VERSION),"tlsv1 alert protocol version"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_RECORD_OVERFLOW),"tlsv1 alert record overflow"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_UNKNOWN_CA),"tlsv1 alert unknown ca"}, sl@0: {ERR_REASON(SSL_R_TLSV1_ALERT_USER_CANCELLED),"tlsv1 alert user cancelled"}, sl@0: {ERR_REASON(SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER),"tls client cert req with anon cipher"}, sl@0: {ERR_REASON(SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST),"tls invalid ecpointformat list"}, sl@0: {ERR_REASON(SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST),"tls peer did not respond with certificate list"}, sl@0: {ERR_REASON(SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG),"tls rsa encrypted value length is wrong"}, sl@0: {ERR_REASON(SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER),"tried to use unsupported cipher"}, sl@0: {ERR_REASON(SSL_R_UNABLE_TO_DECODE_DH_CERTS),"unable to decode dh certs"}, sl@0: {ERR_REASON(SSL_R_UNABLE_TO_DECODE_ECDH_CERTS),"unable to decode ecdh certs"}, sl@0: {ERR_REASON(SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY),"unable to extract public key"}, sl@0: {ERR_REASON(SSL_R_UNABLE_TO_FIND_DH_PARAMETERS),"unable to find dh parameters"}, sl@0: {ERR_REASON(SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS),"unable to find ecdh parameters"}, sl@0: {ERR_REASON(SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS),"unable to find public key parameters"}, sl@0: {ERR_REASON(SSL_R_UNABLE_TO_FIND_SSL_METHOD),"unable to find ssl method"}, sl@0: {ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL2_MD5_ROUTINES),"unable to load ssl2 md5 routines"}, sl@0: {ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES),"unable to load ssl3 md5 routines"}, sl@0: {ERR_REASON(SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES),"unable to load ssl3 sha1 routines"}, sl@0: {ERR_REASON(SSL_R_UNEXPECTED_MESSAGE) ,"unexpected message"}, sl@0: {ERR_REASON(SSL_R_UNEXPECTED_RECORD) ,"unexpected record"}, sl@0: {ERR_REASON(SSL_R_UNINITIALIZED) ,"uninitialized"}, sl@0: {ERR_REASON(SSL_R_UNKNOWN_ALERT_TYPE) ,"unknown alert type"}, sl@0: {ERR_REASON(SSL_R_UNKNOWN_CERTIFICATE_TYPE),"unknown certificate type"}, sl@0: {ERR_REASON(SSL_R_UNKNOWN_CIPHER_RETURNED),"unknown cipher returned"}, sl@0: {ERR_REASON(SSL_R_UNKNOWN_CIPHER_TYPE) ,"unknown cipher type"}, sl@0: {ERR_REASON(SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE),"unknown key exchange type"}, sl@0: {ERR_REASON(SSL_R_UNKNOWN_PKEY_TYPE) ,"unknown pkey type"}, sl@0: {ERR_REASON(SSL_R_UNKNOWN_PROTOCOL) ,"unknown protocol"}, sl@0: {ERR_REASON(SSL_R_UNKNOWN_REMOTE_ERROR_TYPE),"unknown remote error type"}, sl@0: {ERR_REASON(SSL_R_UNKNOWN_SSL_VERSION) ,"unknown ssl version"}, sl@0: {ERR_REASON(SSL_R_UNKNOWN_STATE) ,"unknown state"}, sl@0: {ERR_REASON(SSL_R_UNSUPPORTED_CIPHER) ,"unsupported cipher"}, sl@0: {ERR_REASON(SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM),"unsupported compression algorithm"}, sl@0: {ERR_REASON(SSL_R_UNSUPPORTED_ELLIPTIC_CURVE),"unsupported elliptic curve"}, sl@0: {ERR_REASON(SSL_R_UNSUPPORTED_PROTOCOL) ,"unsupported protocol"}, sl@0: {ERR_REASON(SSL_R_UNSUPPORTED_SSL_VERSION),"unsupported ssl version"}, sl@0: {ERR_REASON(SSL_R_WRITE_BIO_NOT_SET) ,"write bio not set"}, sl@0: {ERR_REASON(SSL_R_WRONG_CIPHER_RETURNED) ,"wrong cipher returned"}, sl@0: {ERR_REASON(SSL_R_WRONG_MESSAGE_TYPE) ,"wrong message type"}, sl@0: {ERR_REASON(SSL_R_WRONG_NUMBER_OF_KEY_BITS),"wrong number of key bits"}, sl@0: {ERR_REASON(SSL_R_WRONG_SIGNATURE_LENGTH),"wrong signature length"}, sl@0: {ERR_REASON(SSL_R_WRONG_SIGNATURE_SIZE) ,"wrong signature size"}, sl@0: {ERR_REASON(SSL_R_WRONG_SSL_VERSION) ,"wrong ssl version"}, sl@0: {ERR_REASON(SSL_R_WRONG_VERSION_NUMBER) ,"wrong version number"}, sl@0: {ERR_REASON(SSL_R_X509_LIB) ,"x509 lib"}, sl@0: {ERR_REASON(SSL_R_X509_VERIFICATION_SETUP_PROBLEMS),"x509 verification setup problems"}, sl@0: {0,NULL} sl@0: }; sl@0: sl@0: #ifdef EMULATOR sl@0: sl@0: GET_STATIC_ARRAY_FROM_TLS(SSL_str_functs,ssl_err,ERR_STRING_DATA) sl@0: sl@0: #define SSL_str_functs (GET_WSD_VAR_NAME(SSL_str_functs,ssl_err,s)()) sl@0: sl@0: #endif sl@0: #endif sl@0: sl@0: sl@0: sl@0: EXPORT_C void ERR_load_SSL_strings(void) sl@0: { sl@0: #ifndef OPENSSL_NO_ERR sl@0: sl@0: if (ERR_func_error_string(SSL_str_functs[0].error) == NULL) sl@0: { sl@0: ERR_load_strings(0,SSL_str_functs); sl@0: ERR_load_strings(0,SSL_str_reasons); sl@0: } sl@0: #endif sl@0: }