ssl_txt.c revision 296465
1/* ssl/ssl_txt.c */ 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay@cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay@cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 59#include <stdio.h> 60#include <openssl/buffer.h> 61#include "ssl_locl.h" 62 63#ifndef OPENSSL_NO_FP_API 64int SSL_SESSION_print_fp(FILE *fp, const SSL_SESSION *x) 65{ 66 BIO *b; 67 int ret; 68 69 if ((b = BIO_new(BIO_s_file_internal())) == NULL) { 70 SSLerr(SSL_F_SSL_SESSION_PRINT_FP, ERR_R_BUF_LIB); 71 return (0); 72 } 73 BIO_set_fp(b, fp, BIO_NOCLOSE); 74 ret = SSL_SESSION_print(b, x); 75 BIO_free(b); 76 return (ret); 77} 78#endif 79 80int SSL_SESSION_print(BIO *bp, const SSL_SESSION *x) 81{ 82 unsigned int i; 83 const char *s; 84 85 if (x == NULL) 86 goto err; 87 if (BIO_puts(bp, "SSL-Session:\n") <= 0) 88 goto err; 89 if (x->ssl_version == SSL2_VERSION) 90 s = "SSLv2"; 91 else if (x->ssl_version == SSL3_VERSION) 92 s = "SSLv3"; 93 else if (x->ssl_version == TLS1_VERSION) 94 s = "TLSv1"; 95 else if (x->ssl_version == DTLS1_VERSION) 96 s = "DTLSv1"; 97 else if (x->ssl_version == DTLS1_BAD_VER) 98 s = "DTLSv1-bad"; 99 else 100 s = "unknown"; 101 if (BIO_printf(bp, " Protocol : %s\n", s) <= 0) 102 goto err; 103 104 if (x->cipher == NULL) { 105 if (((x->cipher_id) & 0xff000000) == 0x02000000) { 106 if (BIO_printf 107 (bp, " Cipher : %06lX\n", x->cipher_id & 0xffffff) <= 0) 108 goto err; 109 } else { 110 if (BIO_printf 111 (bp, " Cipher : %04lX\n", x->cipher_id & 0xffff) <= 0) 112 goto err; 113 } 114 } else { 115 if (BIO_printf 116 (bp, " Cipher : %s\n", 117 ((x->cipher == NULL) ? "unknown" : x->cipher->name)) <= 0) 118 goto err; 119 } 120 if (BIO_puts(bp, " Session-ID: ") <= 0) 121 goto err; 122 for (i = 0; i < x->session_id_length; i++) { 123 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) 124 goto err; 125 } 126 if (BIO_puts(bp, "\n Session-ID-ctx: ") <= 0) 127 goto err; 128 for (i = 0; i < x->sid_ctx_length; i++) { 129 if (BIO_printf(bp, "%02X", x->sid_ctx[i]) <= 0) 130 goto err; 131 } 132 if (BIO_puts(bp, "\n Master-Key: ") <= 0) 133 goto err; 134 for (i = 0; i < (unsigned int)x->master_key_length; i++) { 135 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0) 136 goto err; 137 } 138 if (BIO_puts(bp, "\n Key-Arg : ") <= 0) 139 goto err; 140 if (x->key_arg_length == 0) { 141 if (BIO_puts(bp, "None") <= 0) 142 goto err; 143 } else 144 for (i = 0; i < x->key_arg_length; i++) { 145 if (BIO_printf(bp, "%02X", x->key_arg[i]) <= 0) 146 goto err; 147 } 148#ifndef OPENSSL_NO_KRB5 149 if (BIO_puts(bp, "\n Krb5 Principal: ") <= 0) 150 goto err; 151 if (x->krb5_client_princ_len == 0) { 152 if (BIO_puts(bp, "None") <= 0) 153 goto err; 154 } else 155 for (i = 0; i < x->krb5_client_princ_len; i++) { 156 if (BIO_printf(bp, "%02X", x->krb5_client_princ[i]) <= 0) 157 goto err; 158 } 159#endif /* OPENSSL_NO_KRB5 */ 160#ifndef OPENSSL_NO_TLSEXT 161 if (x->tlsext_tick_lifetime_hint) { 162 if (BIO_printf(bp, 163 "\n TLS session ticket lifetime hint: %ld (seconds)", 164 x->tlsext_tick_lifetime_hint) <= 0) 165 goto err; 166 } 167 if (x->tlsext_tick) { 168 if (BIO_puts(bp, "\n TLS session ticket:\n") <= 0) 169 goto err; 170 if (BIO_dump_indent(bp, (char *)x->tlsext_tick, x->tlsext_ticklen, 4) 171 <= 0) 172 goto err; 173 } 174#endif 175#ifndef OPENSSL_NO_COMP 176 if (x->compress_meth != 0) { 177 SSL_COMP *comp = NULL; 178 179 ssl_cipher_get_evp(x, NULL, NULL, &comp); 180 if (comp == NULL) { 181 if (BIO_printf(bp, "\n Compression: %d", x->compress_meth) <= 182 0) 183 goto err; 184 } else { 185 if (BIO_printf 186 (bp, "\n Compression: %d (%s)", comp->id, 187 comp->method->name) <= 0) 188 goto err; 189 } 190 } 191#endif 192 if (x->time != 0L) { 193 if (BIO_printf(bp, "\n Start Time: %ld", x->time) <= 0) 194 goto err; 195 } 196 if (x->timeout != 0L) { 197 if (BIO_printf(bp, "\n Timeout : %ld (sec)", x->timeout) <= 0) 198 goto err; 199 } 200 if (BIO_puts(bp, "\n") <= 0) 201 goto err; 202 203 if (BIO_puts(bp, " Verify return code: ") <= 0) 204 goto err; 205 if (BIO_printf(bp, "%ld (%s)\n", x->verify_result, 206 X509_verify_cert_error_string(x->verify_result)) <= 0) 207 goto err; 208 209 return (1); 210 err: 211 return (0); 212} 213