1/* ssl/ssl_txt.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to.  The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 *    notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 *    notice, this list of conditions and the following disclaimer in the
30 *    documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 *    must display the following acknowledgement:
33 *    "This product includes cryptographic software written by
34 *     Eric Young (eay@cryptsoft.com)"
35 *    The word 'cryptographic' can be left out if the rouines from the library
36 *    being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 *    the apps directory (application code) you must include an acknowledgement:
39 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <stdio.h>
60#include <openssl/buffer.h>
61#include "ssl_locl.h"
62
63#ifndef OPENSSL_NO_FP_API
64int SSL_SESSION_print_fp(FILE *fp, const SSL_SESSION *x)
65	{
66	BIO *b;
67	int ret;
68
69	if ((b=BIO_new(BIO_s_file_internal())) == NULL)
70		{
71		SSLerr(SSL_F_SSL_SESSION_PRINT_FP,ERR_R_BUF_LIB);
72		return(0);
73		}
74	BIO_set_fp(b,fp,BIO_NOCLOSE);
75	ret=SSL_SESSION_print(b,x);
76	BIO_free(b);
77	return(ret);
78	}
79#endif
80
81int SSL_SESSION_print(BIO *bp, const SSL_SESSION *x)
82	{
83	unsigned int i;
84	const char *s;
85
86	if (x == NULL) goto err;
87	if (BIO_puts(bp,"SSL-Session:\n") <= 0) goto err;
88	if (x->ssl_version == SSL2_VERSION)
89		s="SSLv2";
90	else if (x->ssl_version == SSL3_VERSION)
91		s="SSLv3";
92	else if (x->ssl_version == TLS1_VERSION)
93		s="TLSv1";
94	else if (x->ssl_version == DTLS1_VERSION)
95		s="DTLSv1";
96	else if (x->ssl_version == DTLS1_BAD_VER)
97		s="DTLSv1-bad";
98	else
99		s="unknown";
100	if (BIO_printf(bp,"    Protocol  : %s\n",s) <= 0) goto err;
101
102	if (x->cipher == NULL)
103		{
104		if (((x->cipher_id) & 0xff000000) == 0x02000000)
105			{
106			if (BIO_printf(bp,"    Cipher    : %06lX\n",x->cipher_id&0xffffff) <= 0)
107				goto err;
108			}
109		else
110			{
111			if (BIO_printf(bp,"    Cipher    : %04lX\n",x->cipher_id&0xffff) <= 0)
112				goto err;
113			}
114		}
115	else
116		{
117		if (BIO_printf(bp,"    Cipher    : %s\n",((x->cipher == NULL)?"unknown":x->cipher->name)) <= 0)
118			goto err;
119		}
120	if (BIO_puts(bp,"    Session-ID: ") <= 0) goto err;
121	for (i=0; i<x->session_id_length; i++)
122		{
123		if (BIO_printf(bp,"%02X",x->session_id[i]) <= 0) goto err;
124		}
125	if (BIO_puts(bp,"\n    Session-ID-ctx: ") <= 0) goto err;
126	for (i=0; i<x->sid_ctx_length; i++)
127		{
128		if (BIO_printf(bp,"%02X",x->sid_ctx[i]) <= 0)
129			goto err;
130		}
131	if (BIO_puts(bp,"\n    Master-Key: ") <= 0) goto err;
132	for (i=0; i<(unsigned int)x->master_key_length; i++)
133		{
134		if (BIO_printf(bp,"%02X",x->master_key[i]) <= 0) goto err;
135		}
136	if (BIO_puts(bp,"\n    Key-Arg   : ") <= 0) goto err;
137	if (x->key_arg_length == 0)
138		{
139		if (BIO_puts(bp,"None") <= 0) goto err;
140		}
141	else
142		for (i=0; i<x->key_arg_length; i++)
143			{
144			if (BIO_printf(bp,"%02X",x->key_arg[i]) <= 0) goto err;
145			}
146#ifndef OPENSSL_NO_KRB5
147       if (BIO_puts(bp,"\n    Krb5 Principal: ") <= 0) goto err;
148            if (x->krb5_client_princ_len == 0)
149            {
150		if (BIO_puts(bp,"None") <= 0) goto err;
151		}
152	else
153		for (i=0; i<x->krb5_client_princ_len; i++)
154			{
155			if (BIO_printf(bp,"%02X",x->krb5_client_princ[i]) <= 0) goto err;
156			}
157#endif /* OPENSSL_NO_KRB5 */
158#ifndef OPENSSL_NO_TLSEXT
159	if (x->tlsext_tick_lifetime_hint)
160		{
161		if (BIO_printf(bp,
162			"\n    TLS session ticket lifetime hint: %ld (seconds)",
163			x->tlsext_tick_lifetime_hint) <=0)
164			goto err;
165		}
166	if (x->tlsext_tick)
167		{
168		if (BIO_puts(bp, "\n    TLS session ticket:\n") <= 0) goto err;
169		if (BIO_dump_indent(bp, (char *)x->tlsext_tick, x->tlsext_ticklen, 4) <= 0)
170			goto err;
171		}
172#endif
173#ifndef OPENSSL_NO_COMP
174	if (x->compress_meth != 0)
175		{
176		SSL_COMP *comp = NULL;
177
178		ssl_cipher_get_evp(x,NULL,NULL,&comp);
179		if (comp == NULL)
180			{
181			if (BIO_printf(bp,"\n    Compression: %d",x->compress_meth) <= 0) goto err;
182			}
183		else
184			{
185			if (BIO_printf(bp,"\n    Compression: %d (%s)", comp->id,comp->method->name) <= 0) goto err;
186			}
187		}
188#endif
189	if (x->time != 0L)
190		{
191		if (BIO_printf(bp, "\n    Start Time: %ld",x->time) <= 0) goto err;
192		}
193	if (x->timeout != 0L)
194		{
195		if (BIO_printf(bp, "\n    Timeout   : %ld (sec)",x->timeout) <= 0) goto err;
196		}
197	if (BIO_puts(bp,"\n") <= 0) goto err;
198
199	if (BIO_puts(bp, "    Verify return code: ") <= 0) goto err;
200	if (BIO_printf(bp, "%ld (%s)\n", x->verify_result,
201		X509_verify_cert_error_string(x->verify_result)) <= 0) goto err;
202
203	return(1);
204err:
205	return(0);
206	}
207
208