summaryrefslogtreecommitdiffstats
path: root/ssl/ssl_stat.c
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2017-11-27 12:35:15 +0000
committerMatt Caswell <matt@openssl.org>2017-11-28 10:24:23 +0000
commit881dfedeb51dd161330bf60cc7e2ecf826ad9ee9 (patch)
treecf83ef0e73e52dea2ee1f5b2cbf29e6e85ecdeca /ssl/ssl_stat.c
parentb7af3f1433cc0d8d5f88c0b8dcd55c0c2261281a (diff)
Fix SSL_state_string() and SSL_state_string_long()
These functions needed updates for the various state machine states that have been added for TLSv1.3. Fixes #4795 Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4801)
Diffstat (limited to 'ssl/ssl_stat.c')
-rw-r--r--ssl/ssl_stat.c60
1 files changed, 60 insertions, 0 deletions
diff --git a/ssl/ssl_stat.c b/ssl/ssl_stat.c
index 405924d1ad..5dd71d2294 100644
--- a/ssl/ssl_stat.c
+++ b/ssl/ssl_stat.c
@@ -87,6 +87,36 @@ const char *SSL_state_string_long(const SSL *s)
return "DTLS1 read hello verify request";
case DTLS_ST_SW_HELLO_VERIFY_REQUEST:
return "DTLS1 write hello verify request";
+ case TLS_ST_SW_ENCRYPTED_EXTENSIONS:
+ return "TLSv1.3 write encrypted extensions";
+ case TLS_ST_CR_ENCRYPTED_EXTENSIONS:
+ return "TLSv1.3 read encrypted extensions";
+ case TLS_ST_CR_CERT_VRFY:
+ return "TLSv1.3 read server certificate verify";
+ case TLS_ST_SW_CERT_VRFY:
+ return "TLSv1.3 write server certificate verify";
+ case TLS_ST_CR_HELLO_REQ:
+ return "SSLv3/TLS read hello request";
+ case TLS_ST_SW_HELLO_RETRY_REQUEST:
+ return "TLSv1.3 write hello retry request";
+ case TLS_ST_CR_HELLO_RETRY_REQUEST:
+ return "TLSv1.3 read hello retry request";
+ case TLS_ST_SW_KEY_UPDATE:
+ return "TLSv1.3 write server key update";
+ case TLS_ST_CW_KEY_UPDATE:
+ return "TLSv1.3 write client key update";
+ case TLS_ST_SR_KEY_UPDATE:
+ return "TLSv1.3 read client key update";
+ case TLS_ST_CR_KEY_UPDATE:
+ return "TLSv1.3 read server key update";
+ case TLS_ST_EARLY_DATA:
+ return "TLSv1.3 early data";
+ case TLS_ST_PENDING_EARLY_DATA_END:
+ return "TLSv1.3 pending early data end";
+ case TLS_ST_CW_END_OF_EARLY_DATA:
+ return "TLSv1.3 write end of early data";
+ case TLS_ST_SR_END_OF_EARLY_DATA:
+ return "TLSv1.3 read end of early data";
default:
return "unknown state";
}
@@ -168,6 +198,36 @@ const char *SSL_state_string(const SSL *s)
return "DRCHV";
case DTLS_ST_SW_HELLO_VERIFY_REQUEST:
return "DWCHV";
+ case TLS_ST_SW_ENCRYPTED_EXTENSIONS:
+ return "TWEE";
+ case TLS_ST_CR_ENCRYPTED_EXTENSIONS:
+ return "TREE";
+ case TLS_ST_CR_CERT_VRFY:
+ return "TRSCV";
+ case TLS_ST_SW_CERT_VRFY:
+ return "TRSCV";
+ case TLS_ST_CR_HELLO_REQ:
+ return "TRHR";
+ case TLS_ST_SW_HELLO_RETRY_REQUEST:
+ return "TWHRR";
+ case TLS_ST_CR_HELLO_RETRY_REQUEST:
+ return "TRHRR";
+ case TLS_ST_SW_KEY_UPDATE:
+ return "TWSKU";
+ case TLS_ST_CW_KEY_UPDATE:
+ return "TWCKU";
+ case TLS_ST_SR_KEY_UPDATE:
+ return "TRCKU";
+ case TLS_ST_CR_KEY_UPDATE:
+ return "TRSKU";
+ case TLS_ST_EARLY_DATA:
+ return "TED";
+ case TLS_ST_PENDING_EARLY_DATA_END:
+ return "TPEDE";
+ case TLS_ST_CW_END_OF_EARLY_DATA:
+ return "TWEOED";
+ case TLS_ST_SR_END_OF_EARLY_DATA:
+ return "TWEOED";
default:
return "UNKWN ";
}