mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-01-28 01:32:22 +01:00
* Added Apache httpd support `--enable-apachehttpd`. * Added `SSL_CIPHER_get_version`, `BIO_new_fp`, `SSL_SESSION_print` and `SSL_in_connect_init` compatibility API's. * Fix to expose `ASN1_UTCTIME_print` stub. * Pulled in `wolfSSL_X509_get_ext_count` from QT. * Added `X509_get_ext_count`, `BIO_set_callback`, `BIO_set_callback_arg` and `BIO_get_callback_arg`. * Added `wolfSSL_ERR_print_errors`. * Added `BIO_set_nbio` template. * Fixes for building with Apache httpd. * Added DH prime functions required for Apache httpd. * Fix and move the BN DH prime macros. * Fix for `SSL_CTX_set_tlsext_servername_arg` to have return code. * Only add the `BN_get_rfc*_prime_*` macro's if older than 1.1.0. * Added `ERR_GET_FUNC`, `SSL_CTX_clear_extra_chain_certs` prototypes. * Added `wolfSSL_CTX_set_client_cert_cb` template and `OPENSSL_load_builtin_modules` stub macro. * Added `X509_INFO` templates (`X509_INFO_new`, `X509_INFO_free`, `sk_X509_INFO_new_null`, `sk_X509_INFO_num`, `sk_X509_INFO_value`, `sk_X509_INFO_free`). Added `sk_X509_shift`. * Added BIO_set_callback, BIO_get_callback, BIO_set_callback_arg, BIO_get_callback_arg * add BIO_set_nbio, ERR_print_errors and tests * add X509 INFO stack push function * Add ASN1_UTCTIME_print and unit test * Add X509_get_ext_count unit test * initial commit of wolfSSL_PEM_X509_INFO_read_bio * Added `sk_X509_NAME_new`, `sk_X509_NAME_push`, `sk_X509_NAME_find`, `sk_X509_NAME_set_cmp_func` and `sk_X509_NAME_free`. Grouped `sk_X509_NAME_*` functions. * Cleanup sk X509 NAME/INFO pop free template. * Advance openssl compatibility to v1.1.0 for Apache httpd. Added TLS version macros. Implemented sk X509 NAME/INFO pop and pop_free. * Added `TLS_client_method` support. * Added `SSL_get_server_tmp_key` and `EC_curve_nid2nist`. * Added `SSL_CTX_set_min_proto_version` and `SSL_CTX_set_max_proto_version`. Fix for `BN_get_rfc*_prime_*` with the v1.1.0 change. * add test cases for PEM_X509_INFO_read_bio * Fixes for `BN_get_rfc*_prime_*` macros. Added template for `SSL_DH_set0_pqg`. Fix for `SSL_OP_NO_` to use Macro's (as is done in openssl). Added `SSL_set_verify_result`. Added stub for `OPENSSL_malloc_init`. * Apache httpd compatibility functions. BIO setter/getters. * implement ASN1_TIME_check and add test case * add SSL_get_client_CA_list * add initial implementation of wolfSSL_DH_set0_pqg * Add apache support to OBJ_txt2nid and unit test, add stub for OBJ_create * add X509_STORE_CTX_get1_chain, sk_free, sk_X509_dup * Add sk_SSL_COMP_num and SSL_COMP struct * implement and test of SSL_SESSION_print * add SSL_CTX_set_client_cert_cb * expand BIO_printf and add test case * Added `OCSP_CERTID_dup`. Added `ASN1_TYPE`. * add implementation for wolfSSL_get_server_tmp_key * add wolfSSL_BIO_puts and test case * Add X509_EXTENSION_get_object and X509_EXTENSION_get_data * add helper for bio flag set and null x509 stack * add test adn implementation for wolfSSL_i2d_PrivateKey * Added `ASN1_OTHERNAME`, `ACCESS_DESCRIPTION` and `GENERAL_NAME`. Added `sk_ACCESS_DESCRIPTION_pop_free` and `ACCESS_DESCRIPTION_free` stubs. * add wolfSSL_PEM_read_bio_ECPKParameters * add BIO_vfree * add X509_up_ref * add X509_STORE_CTX_set_ex_data * add _GNU_SOURCE macro and wolfSSL_EVP_read_pw_string * add wolfSSL_EVP_PKEY_ref_up function * X509_get_ext, X509V3_EXT_print, and d2i_DISPLAYTEXT stubs * add X509_set_issuer_name * add wolfSSL_sk_SSL_CIPHER_* functions and tests * add prototype for sk_X509_EXTENSION and ACCESS_DESCRIPTION * fix casting to avoid clang warning * adjust test_wolfSSL_X509_STORE_CTX test case * Added `OpenSSL_version` * renegotiate functions and additional stack functions * add aditional stub functions * Add Apache httpd requirements for ALPN, CRL, Cert Gen/Req/Ext and SecRen. Fix for `sk_X509_INFO_new_null`. * add ocsp stub functions * Proper fix for `sk_X509_INFO_new_null`. Added templates for `X509_get_ext_by_NID` and `X509_add_ext`. Added templates for `ASN1_TIME_diff` and `ASN1_TIME_set`. * x509 extension stack additions * Fixed template for `OCSP_id_get0_info`. * add X509 stub functions * add X509_STORE_CTX_get0_store() and unit test * Added `EVP_PKEY_CTX_new_id`, `EVP_PKEY_CTX_set_rsa_keygen_bits`, `EVP_PKEY_keygen_init`, `EVP_PKEY_keygen` and `BN_to_ASN1_INTEGER`. * x509v3 stubs and req add extensions * Add OBJ_txt2obj and unit test; add long name to wolfssl_object_info table for use by OBJ_* functions * wolfSSL_set_alpn_protos implementation * Added `EVP_SignInit_ex` and `TLS_server_method` implementation. Added stubs for `RSA_get0_key` and `i2d_OCSP_REQUEST_bio`. Fix typo on `OCSP_response_create`. Fix warning in `wolfSSL_set_alpn_protos`. * Added `X509_EXTENSION_free` stub. Fixed a few macro typos/adding missing. * add X509_STORE_CTX_get0_current_issuer and unit test * add OBJ_cmp and unit test * add RSA_get0_key and unit test * add OCSP_check_nonce * Implement X509_set_notAfter/notBefore/serialNumber/version,X509_STORE_CTX_set_depth,X509V3_set_ctx. * Modify wolfSSL_X509_set_notAfter/notBefore and add tests for each. * Add test_wolfSSL_X509_set_version w/ fixes to _set_version and fix _set_notBefore/notAfter tests * add OCSP_id_get0_info and unit test, move WOLFSSL_ASN1_INTEGER to asn_public.h from ssl.h * inital implementation of wolfSSL_X509_sign * add debugging messages and set data for BIO's * Add i2d_OCSP_REQUEST_bio. * implementation of some WOLFSSL_BIO_METHOD custom functions * fix for ASN time structure and remove log node * initial eNULL support and sanity checks * fixes after rebasing code * adjust test cases and ASN1_TIME print * Various fixes for memory leaks * Apache compatibility in CTX_set_client_CA_list for X509_NAME use; add X509_NAME_dup as supporting function * Add initial X509_STORE_load_locations stub for Apache * Updates to X509_get_ext_d2i to return GENERAL_NAME struct instead of ASN1_OBJECT for alternative names and add supporting GENERAL_NAME functions * Add X509_STORE_load_locations implementation; add wolfSSL_CertManagerLoadCRL_ex; initial renegotiation fixes/updates * Fix for freeing peer cert in wolfSSL_Rehandshake instead of FreeHandShakeResources during secure renegotiation * Add X509_ALGOR and X509_PUBKEY structs for X509_PUBKEY_get0_param and X509_get_X509_PUBKEY implementation * Initial implementation of wolfSSL_X509_get_X509_PUBKEY and wolfSSL_X509_PUBKEY_get0_param * Add implementation for X509_get0_tbs_sigalg and X509_ALGOR_get0 * Add OBJ_nid2ln implementation * Fix compile errors in tests/api.c for some build options * Updates to X509_STORE_load_locations for non-CRL types; Add additional DETECT_CERT_TYPE enum and logic for detecting certificate type in ProcessFile * Add X509_STORE_load_locations unit test and minor error handling fixes * Add unit test for X509_sign * Set correct alert type for revoked certificates; add/fix a few WOLFSSL_ENTER messages * Add X509_ALGOR member to X509 struct; refactoring and unit tests for wolfSSL_X509_ALGOR_get0 and wolfSSL_X509_get0_tbs_sigalg * Add X509_PUBKEY member to X509 struct; refactoring and unit tests for wolfSSL_X509_get_X509_PUBKEY and wolfSSL_X509_PUBKEY_get0_param * Stack fixes after rebase * Secure renegotiation refactoring: add ACCEPT_BEGIN_RENEG to AcceptState for use in wolfSSL_SSL_in_connect_init; free old peer cert when receiving new cert to fix memory leak * Move enc-then-mac enable option in configure.ac for apache httpd compatibility * Simplify wolfSSL_SSL_in_connect_init logic * Remove unneeded wolfSSL_CertManagerLoadCRL_ex * Fixes for jenkins test failures * SSL_get_secure_renegotiation_support for print statement in Apache
202 lines
11 KiB
C
202 lines
11 KiB
C
/* error-ssl.h
|
|
*
|
|
* Copyright (C) 2006-2019 wolfSSL Inc.
|
|
*
|
|
* This file is part of wolfSSL.
|
|
*
|
|
* wolfSSL is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* wolfSSL is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
|
*/
|
|
|
|
|
|
|
|
#ifndef WOLFSSL_ERROR_H
|
|
#define WOLFSSL_ERROR_H
|
|
|
|
#include <wolfssl/wolfcrypt/error-crypt.h> /* pull in wolfCrypt errors */
|
|
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
enum wolfSSL_ErrorCodes {
|
|
INPUT_CASE_ERROR = -301, /* process input state error */
|
|
PREFIX_ERROR = -302, /* bad index to key rounds */
|
|
MEMORY_ERROR = -303, /* out of memory */
|
|
VERIFY_FINISHED_ERROR = -304, /* verify problem on finished */
|
|
VERIFY_MAC_ERROR = -305, /* verify mac problem */
|
|
PARSE_ERROR = -306, /* parse error on header */
|
|
UNKNOWN_HANDSHAKE_TYPE = -307, /* weird handshake type */
|
|
SOCKET_ERROR_E = -308, /* error state on socket */
|
|
SOCKET_NODATA = -309, /* expected data, not there */
|
|
INCOMPLETE_DATA = -310, /* don't have enough data to
|
|
complete task */
|
|
UNKNOWN_RECORD_TYPE = -311, /* unknown type in record hdr */
|
|
DECRYPT_ERROR = -312, /* error during decryption */
|
|
FATAL_ERROR = -313, /* recvd alert fatal error */
|
|
ENCRYPT_ERROR = -314, /* error during encryption */
|
|
FREAD_ERROR = -315, /* fread problem */
|
|
NO_PEER_KEY = -316, /* need peer's key */
|
|
NO_PRIVATE_KEY = -317, /* need the private key */
|
|
RSA_PRIVATE_ERROR = -318, /* error during rsa priv op */
|
|
NO_DH_PARAMS = -319, /* server missing DH params */
|
|
BUILD_MSG_ERROR = -320, /* build message failure */
|
|
|
|
BAD_HELLO = -321, /* client hello malformed */
|
|
DOMAIN_NAME_MISMATCH = -322, /* peer subject name mismatch */
|
|
WANT_READ = -323, /* want read, call again */
|
|
NOT_READY_ERROR = -324, /* handshake layer not ready */
|
|
|
|
VERSION_ERROR = -326, /* record layer version error */
|
|
WANT_WRITE = -327, /* want write, call again */
|
|
BUFFER_ERROR = -328, /* malformed buffer input */
|
|
VERIFY_CERT_ERROR = -329, /* verify cert error */
|
|
VERIFY_SIGN_ERROR = -330, /* verify sign error */
|
|
CLIENT_ID_ERROR = -331, /* psk client identity error */
|
|
SERVER_HINT_ERROR = -332, /* psk server hint error */
|
|
PSK_KEY_ERROR = -333, /* psk key error */
|
|
|
|
GETTIME_ERROR = -337, /* gettimeofday failed ??? */
|
|
GETITIMER_ERROR = -338, /* getitimer failed ??? */
|
|
SIGACT_ERROR = -339, /* sigaction failed ??? */
|
|
SETITIMER_ERROR = -340, /* setitimer failed ??? */
|
|
LENGTH_ERROR = -341, /* record layer length error */
|
|
PEER_KEY_ERROR = -342, /* can't decode peer key */
|
|
ZERO_RETURN = -343, /* peer sent close notify */
|
|
SIDE_ERROR = -344, /* wrong client/server type */
|
|
NO_PEER_CERT = -345, /* peer didn't send key */
|
|
NTRU_KEY_ERROR = -346, /* NTRU key error */
|
|
NTRU_DRBG_ERROR = -347, /* NTRU drbg error */
|
|
NTRU_ENCRYPT_ERROR = -348, /* NTRU encrypt error */
|
|
NTRU_DECRYPT_ERROR = -349, /* NTRU decrypt error */
|
|
ECC_CURVETYPE_ERROR = -350, /* Bad ECC Curve Type */
|
|
ECC_CURVE_ERROR = -351, /* Bad ECC Curve */
|
|
ECC_PEERKEY_ERROR = -352, /* Bad Peer ECC Key */
|
|
ECC_MAKEKEY_ERROR = -353, /* Bad Make ECC Key */
|
|
ECC_EXPORT_ERROR = -354, /* Bad ECC Export Key */
|
|
ECC_SHARED_ERROR = -355, /* Bad ECC Shared Secret */
|
|
NOT_CA_ERROR = -357, /* Not a CA cert error */
|
|
|
|
BAD_CERT_MANAGER_ERROR = -359, /* Bad Cert Manager */
|
|
OCSP_CERT_REVOKED = -360, /* OCSP Certificate revoked */
|
|
CRL_CERT_REVOKED = -361, /* CRL Certificate revoked */
|
|
CRL_MISSING = -362, /* CRL Not loaded */
|
|
MONITOR_SETUP_E = -363, /* CRL Monitor setup error */
|
|
THREAD_CREATE_E = -364, /* Thread Create Error */
|
|
OCSP_NEED_URL = -365, /* OCSP need an URL for lookup */
|
|
OCSP_CERT_UNKNOWN = -366, /* OCSP responder doesn't know */
|
|
OCSP_LOOKUP_FAIL = -367, /* OCSP lookup not successful */
|
|
MAX_CHAIN_ERROR = -368, /* max chain depth exceeded */
|
|
COOKIE_ERROR = -369, /* dtls cookie error */
|
|
SEQUENCE_ERROR = -370, /* dtls sequence error */
|
|
SUITES_ERROR = -371, /* suites pointer error */
|
|
|
|
OUT_OF_ORDER_E = -373, /* out of order message */
|
|
BAD_KEA_TYPE_E = -374, /* bad KEA type found */
|
|
SANITY_CIPHER_E = -375, /* sanity check on cipher error */
|
|
RECV_OVERFLOW_E = -376, /* RXCB returned more than rqed */
|
|
GEN_COOKIE_E = -377, /* Generate Cookie Error */
|
|
NO_PEER_VERIFY = -378, /* Need peer cert verify Error */
|
|
FWRITE_ERROR = -379, /* fwrite problem */
|
|
CACHE_MATCH_ERROR = -380, /* chache hdr match error */
|
|
UNKNOWN_SNI_HOST_NAME_E = -381, /* Unrecognized host name Error */
|
|
UNKNOWN_MAX_FRAG_LEN_E = -382, /* Unrecognized max frag len Error */
|
|
KEYUSE_SIGNATURE_E = -383, /* KeyUse digSignature error */
|
|
KEYUSE_ENCIPHER_E = -385, /* KeyUse keyEncipher error */
|
|
EXTKEYUSE_AUTH_E = -386, /* ExtKeyUse server|client_auth */
|
|
SEND_OOB_READ_E = -387, /* Send Cb out of bounds read */
|
|
SECURE_RENEGOTIATION_E = -388, /* Invalid Renegotiation Info */
|
|
SESSION_TICKET_LEN_E = -389, /* Session Ticket too large */
|
|
SESSION_TICKET_EXPECT_E = -390, /* Session Ticket missing */
|
|
SCR_DIFFERENT_CERT_E = -391, /* SCR Different cert error */
|
|
SESSION_SECRET_CB_E = -392, /* Session secret Cb fcn failure */
|
|
NO_CHANGE_CIPHER_E = -393, /* Finished before change cipher */
|
|
SANITY_MSG_E = -394, /* Sanity check on msg order error */
|
|
DUPLICATE_MSG_E = -395, /* Duplicate message error */
|
|
SNI_UNSUPPORTED = -396, /* SSL 3.0 does not support SNI */
|
|
SOCKET_PEER_CLOSED_E = -397, /* Underlying transport closed */
|
|
BAD_TICKET_KEY_CB_SZ = -398, /* Bad session ticket key cb size */
|
|
BAD_TICKET_MSG_SZ = -399, /* Bad session ticket msg size */
|
|
BAD_TICKET_ENCRYPT = -400, /* Bad user ticket encrypt */
|
|
DH_KEY_SIZE_E = -401, /* DH Key too small */
|
|
SNI_ABSENT_ERROR = -402, /* No SNI request. */
|
|
RSA_SIGN_FAULT = -403, /* RSA Sign fault */
|
|
HANDSHAKE_SIZE_ERROR = -404, /* Handshake message too large */
|
|
UNKNOWN_ALPN_PROTOCOL_NAME_E = -405, /* Unrecognized protocol name Error*/
|
|
BAD_CERTIFICATE_STATUS_ERROR = -406, /* Bad certificate status message */
|
|
OCSP_INVALID_STATUS = -407, /* Invalid OCSP Status */
|
|
OCSP_WANT_READ = -408, /* OCSP callback response WOLFSSL_CBIO_ERR_WANT_READ */
|
|
RSA_KEY_SIZE_E = -409, /* RSA key too small */
|
|
ECC_KEY_SIZE_E = -410, /* ECC key too small */
|
|
DTLS_EXPORT_VER_E = -411, /* export version error */
|
|
INPUT_SIZE_E = -412, /* input size too big error */
|
|
CTX_INIT_MUTEX_E = -413, /* initialize ctx mutex error */
|
|
EXT_MASTER_SECRET_NEEDED_E = -414, /* need EMS enabled to resume */
|
|
DTLS_POOL_SZ_E = -415, /* exceeded DTLS pool size */
|
|
DECODE_E = -416, /* decode handshake message error */
|
|
HTTP_TIMEOUT = -417, /* HTTP timeout for OCSP or CRL req */
|
|
WRITE_DUP_READ_E = -418, /* Write dup write side can't read */
|
|
WRITE_DUP_WRITE_E = -419, /* Write dup read side can't write */
|
|
INVALID_CERT_CTX_E = -420, /* TLS cert ctx not matching */
|
|
BAD_KEY_SHARE_DATA = -421, /* Key Share data invalid */
|
|
MISSING_HANDSHAKE_DATA = -422, /* Handshake message missing data */
|
|
BAD_BINDER = -423, /* Binder does not match */
|
|
EXT_NOT_ALLOWED = -424, /* Extension not allowed in msg */
|
|
INVALID_PARAMETER = -425, /* Security parameter invalid */
|
|
MCAST_HIGHWATER_CB_E = -426, /* Multicast highwater cb err */
|
|
ALERT_COUNT_E = -427, /* Alert Count exceeded err */
|
|
EXT_MISSING = -428, /* Required extension not found */
|
|
UNSUPPORTED_EXTENSION = -429, /* TLSX not requested by client */
|
|
PRF_MISSING = -430, /* PRF not compiled in */
|
|
DTLS_RETX_OVER_TX = -431, /* Retransmit DTLS flight over */
|
|
DH_PARAMS_NOT_FFDHE_E = -432, /* DH params from server not FFDHE */
|
|
TCA_INVALID_ID_TYPE = -433, /* TLSX TCA ID type invalid */
|
|
TCA_ABSENT_ERROR = -434, /* TLSX TCA ID no response */
|
|
TSIP_MAC_DIGSZ_E = -435, /* Invalid MAC size for TSIP */
|
|
CLIENT_CERT_CB_ERROR = -436, /* Client cert callback error */
|
|
/* add strings to wolfSSL_ERR_reason_error_string in internal.c !!!!! */
|
|
|
|
/* begin negotiation parameter errors */
|
|
UNSUPPORTED_SUITE = -500, /* unsupported cipher suite */
|
|
MATCH_SUITE_ERROR = -501, /* can't match cipher suite */
|
|
COMPRESSION_ERROR = -502, /* compression mismatch */
|
|
KEY_SHARE_ERROR = -503, /* key share mismatch */
|
|
POST_HAND_AUTH_ERROR = -504, /* client won't do post-hand auth */
|
|
HRR_COOKIE_ERROR = -505 /* HRR msg cookie mismatch */
|
|
/* end negotiation parameter errors only 10 for now */
|
|
/* add strings to wolfSSL_ERR_reason_error_string in internal.c !!!!! */
|
|
|
|
/* no error stings go down here, add above negotiation errors !!!! */
|
|
};
|
|
|
|
|
|
#if defined(WOLFSSL_CALLBACKS) || defined(OPENSSL_EXTRA)
|
|
enum {
|
|
MIN_PARAM_ERR = UNSUPPORTED_SUITE,
|
|
MAX_PARAM_ERR = MIN_PARAM_ERR - 10
|
|
};
|
|
#endif
|
|
|
|
|
|
WOLFSSL_LOCAL
|
|
void SetErrorString(int err, char* buff);
|
|
|
|
|
|
#ifdef __cplusplus
|
|
} /* extern "C" */
|
|
#endif
|
|
|
|
|
|
#endif /* wolfSSL_ERROR_H */
|