ssl_txt.c revision 194206
1/* ssl/ssl_txt.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to.  The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 *    notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 *    notice, this list of conditions and the following disclaimer in the
30 *    documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 *    must display the following acknowledgement:
33 *    "This product includes cryptographic software written by
34 *     Eric Young (eay@cryptsoft.com)"
35 *    The word 'cryptographic' can be left out if the rouines from the library
36 *    being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 *    the apps directory (application code) you must include an acknowledgement:
39 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <stdio.h>
60#include <openssl/buffer.h>
61#include "ssl_locl.h"
62
63#ifndef OPENSSL_NO_FP_API
64int SSL_SESSION_print_fp(FILE *fp, const SSL_SESSION *x)
65	{
66	BIO *b;
67	int ret;
68
69	if ((b=BIO_new(BIO_s_file_internal())) == NULL)
70		{
71		SSLerr(SSL_F_SSL_SESSION_PRINT_FP,ERR_R_BUF_LIB);
72		return(0);
73		}
74	BIO_set_fp(b,fp,BIO_NOCLOSE);
75	ret=SSL_SESSION_print(b,x);
76	BIO_free(b);
77	return(ret);
78	}
79#endif
80
81int SSL_SESSION_print(BIO *bp, const SSL_SESSION *x)
82	{
83	unsigned int i;
84	const char *s;
85
86	if (x == NULL) goto err;
87	if (BIO_puts(bp,"SSL-Session:\n") <= 0) goto err;
88	if (x->ssl_version == SSL2_VERSION)
89		s="SSLv2";
90	else if (x->ssl_version == SSL3_VERSION)
91		s="SSLv3";
92	else if (x->ssl_version == TLS1_VERSION)
93		s="TLSv1";
94	else
95		s="unknown";
96	if (BIO_printf(bp,"    Protocol  : %s\n",s) <= 0) goto err;
97
98	if (x->cipher == NULL)
99		{
100		if (((x->cipher_id) & 0xff000000) == 0x02000000)
101			{
102			if (BIO_printf(bp,"    Cipher    : %06lX\n",x->cipher_id&0xffffff) <= 0)
103				goto err;
104			}
105		else
106			{
107			if (BIO_printf(bp,"    Cipher    : %04lX\n",x->cipher_id&0xffff) <= 0)
108				goto err;
109			}
110		}
111	else
112		{
113		if (BIO_printf(bp,"    Cipher    : %s\n",((x->cipher == NULL)?"unknown":x->cipher->name)) <= 0)
114			goto err;
115		}
116	if (BIO_puts(bp,"    Session-ID: ") <= 0) goto err;
117	for (i=0; i<x->session_id_length; i++)
118		{
119		if (BIO_printf(bp,"%02X",x->session_id[i]) <= 0) goto err;
120		}
121	if (BIO_puts(bp,"\n    Session-ID-ctx: ") <= 0) goto err;
122	for (i=0; i<x->sid_ctx_length; i++)
123		{
124		if (BIO_printf(bp,"%02X",x->sid_ctx[i]) <= 0)
125			goto err;
126		}
127	if (BIO_puts(bp,"\n    Master-Key: ") <= 0) goto err;
128	for (i=0; i<(unsigned int)x->master_key_length; i++)
129		{
130		if (BIO_printf(bp,"%02X",x->master_key[i]) <= 0) goto err;
131		}
132	if (BIO_puts(bp,"\n    Key-Arg   : ") <= 0) goto err;
133	if (x->key_arg_length == 0)
134		{
135		if (BIO_puts(bp,"None") <= 0) goto err;
136		}
137	else
138		for (i=0; i<x->key_arg_length; i++)
139			{
140			if (BIO_printf(bp,"%02X",x->key_arg[i]) <= 0) goto err;
141			}
142#ifndef OPENSSL_NO_KRB5
143       if (BIO_puts(bp,"\n    Krb5 Principal: ") <= 0) goto err;
144            if (x->krb5_client_princ_len == 0)
145            {
146		if (BIO_puts(bp,"None") <= 0) goto err;
147		}
148	else
149		for (i=0; i<x->krb5_client_princ_len; i++)
150			{
151			if (BIO_printf(bp,"%02X",x->krb5_client_princ[i]) <= 0) goto err;
152			}
153#endif /* OPENSSL_NO_KRB5 */
154#ifndef OPENSSL_NO_TLSEXT
155	if (x->tlsext_tick_lifetime_hint)
156		{
157		if (BIO_printf(bp,
158			"\n    TLS session ticket lifetime hint: %ld (seconds)",
159			x->tlsext_tick_lifetime_hint) <=0)
160			goto err;
161		}
162	if (x->tlsext_tick)
163		{
164		if (BIO_puts(bp, "\n    TLS session ticket:\n") <= 0) goto err;
165		if (BIO_dump_indent(bp, (char *)x->tlsext_tick, x->tlsext_ticklen, 4) <= 0)
166			goto err;
167		}
168#endif
169#ifndef OPENSSL_NO_COMP
170	if (x->compress_meth != 0)
171		{
172		SSL_COMP *comp = NULL;
173
174		ssl_cipher_get_evp(x,NULL,NULL,&comp);
175		if (comp == NULL)
176			{
177			if (BIO_printf(bp,"\n   Compression: %d",x->compress_meth) <= 0) goto err;
178			}
179		else
180			{
181			if (BIO_printf(bp,"\n   Compression: %d (%s)", comp->id,comp->method->name) <= 0) goto err;
182			}
183		}
184#endif
185	if (x->time != 0L)
186		{
187		if (BIO_printf(bp, "\n    Start Time: %ld",x->time) <= 0) goto err;
188		}
189	if (x->timeout != 0L)
190		{
191		if (BIO_printf(bp, "\n    Timeout   : %ld (sec)",x->timeout) <= 0) goto err;
192		}
193	if (BIO_puts(bp,"\n") <= 0) goto err;
194
195	if (BIO_puts(bp, "    Verify return code: ") <= 0) goto err;
196	if (BIO_printf(bp, "%ld (%s)\n", x->verify_result,
197		X509_verify_cert_error_string(x->verify_result)) <= 0) goto err;
198
199	return(1);
200err:
201	return(0);
202	}
203
204