line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
/* |
2
|
|
|
|
|
|
|
* This file is automatically generated - do not manually modify it. |
3
|
|
|
|
|
|
|
* |
4
|
|
|
|
|
|
|
* To add or remove a constant, edit helper_script/constants.txt, then run |
5
|
|
|
|
|
|
|
* helper_script/update-exported-constants. |
6
|
|
|
|
|
|
|
*/ |
7
|
|
|
|
|
|
|
|
8
|
|
|
|
|
|
|
#ifdef NET_SSLEAY_32BIT_CONSTANTS |
9
|
|
|
|
|
|
|
static double |
10
|
|
|
|
|
|
|
#else |
11
|
|
|
|
|
|
|
static uint64_t |
12
|
|
|
|
|
|
|
#endif |
13
|
1070
|
|
|
|
|
|
constant (const char *name, size_t len) { |
14
|
|
|
|
|
|
|
/* Initially switch on the length of the name. */ |
15
|
1070
|
|
|
|
|
|
switch (len) { |
16
|
|
|
|
|
|
|
case 5: |
17
|
|
|
|
|
|
|
/* Names all of length 5. */ |
18
|
|
|
|
|
|
|
/* RSA_3 ST_OK */ |
19
|
|
|
|
|
|
|
/* Offset 0 gives the best switch position. */ |
20
|
2
|
|
|
|
|
|
switch (*name++) { |
21
|
|
|
|
|
|
|
case 'R': |
22
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SA_3", 4)) { |
23
|
|
|
|
|
|
|
/* R */ |
24
|
|
|
|
|
|
|
|
25
|
|
|
|
|
|
|
#ifdef RSA_3 |
26
|
1
|
|
|
|
|
|
return RSA_3; |
27
|
|
|
|
|
|
|
#else |
28
|
|
|
|
|
|
|
goto not_there; |
29
|
|
|
|
|
|
|
#endif |
30
|
|
|
|
|
|
|
|
31
|
|
|
|
|
|
|
} |
32
|
0
|
|
|
|
|
|
break; |
33
|
|
|
|
|
|
|
case 'S': |
34
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "T_OK", 4)) { |
35
|
|
|
|
|
|
|
/* S */ |
36
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
#ifdef SSL_ST_OK |
38
|
1
|
|
|
|
|
|
return SSL_ST_OK; |
39
|
|
|
|
|
|
|
#else |
40
|
|
|
|
|
|
|
goto not_there; |
41
|
|
|
|
|
|
|
#endif |
42
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
} |
44
|
0
|
|
|
|
|
|
break; |
45
|
|
|
|
|
|
|
} |
46
|
0
|
|
|
|
|
|
break; |
47
|
|
|
|
|
|
|
case 6: |
48
|
|
|
|
|
|
|
/* Names all of length 6. */ |
49
|
|
|
|
|
|
|
/* OP_ALL RSA_F4 */ |
50
|
|
|
|
|
|
|
/* Offset 0 gives the best switch position. */ |
51
|
17
|
|
|
|
|
|
switch (*name++) { |
52
|
|
|
|
|
|
|
case 'O': |
53
|
12
|
50
|
|
|
|
|
if (!memcmp(name, "P_ALL", 5)) { |
54
|
|
|
|
|
|
|
/* O */ |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
#ifdef SSL_OP_ALL |
57
|
12
|
|
|
|
|
|
return SSL_OP_ALL; |
58
|
|
|
|
|
|
|
#else |
59
|
|
|
|
|
|
|
goto not_there; |
60
|
|
|
|
|
|
|
#endif |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
} |
63
|
0
|
|
|
|
|
|
break; |
64
|
|
|
|
|
|
|
case 'R': |
65
|
3
|
50
|
|
|
|
|
if (!memcmp(name, "SA_F4", 5)) { |
66
|
|
|
|
|
|
|
/* R */ |
67
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
#ifdef RSA_F4 |
69
|
3
|
|
|
|
|
|
return RSA_F4; |
70
|
|
|
|
|
|
|
#else |
71
|
|
|
|
|
|
|
goto not_there; |
72
|
|
|
|
|
|
|
#endif |
73
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
} |
75
|
0
|
|
|
|
|
|
break; |
76
|
|
|
|
|
|
|
} |
77
|
2
|
|
|
|
|
|
break; |
78
|
|
|
|
|
|
|
case 7: |
79
|
|
|
|
|
|
|
/* Names all of length 7. */ |
80
|
|
|
|
|
|
|
/* CB_EXIT CB_LOOP CB_READ GEN_DNS GEN_RID GEN_URI NID_dsa NID_md2 NID_md5 |
81
|
|
|
|
|
|
|
NID_rc4 NID_rsa NID_sha NOTHING READING ST_INIT WRITING */ |
82
|
|
|
|
|
|
|
/* Offset 4 gives the best switch position. */ |
83
|
22
|
|
|
|
|
|
switch (name[4]) { |
84
|
|
|
|
|
|
|
case 'D': |
85
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_DNS", 7)) { |
86
|
|
|
|
|
|
|
/* ^ */ |
87
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
#ifdef GEN_DNS |
89
|
2
|
|
|
|
|
|
return GEN_DNS; |
90
|
|
|
|
|
|
|
#else |
91
|
|
|
|
|
|
|
goto not_there; |
92
|
|
|
|
|
|
|
#endif |
93
|
|
|
|
|
|
|
|
94
|
|
|
|
|
|
|
} |
95
|
0
|
|
|
|
|
|
break; |
96
|
|
|
|
|
|
|
case 'E': |
97
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_READ", 7)) { |
98
|
|
|
|
|
|
|
/* ^ */ |
99
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
#ifdef SSL_CB_READ |
101
|
2
|
|
|
|
|
|
return SSL_CB_READ; |
102
|
|
|
|
|
|
|
#else |
103
|
|
|
|
|
|
|
goto not_there; |
104
|
|
|
|
|
|
|
#endif |
105
|
|
|
|
|
|
|
|
106
|
|
|
|
|
|
|
} |
107
|
0
|
|
|
|
|
|
break; |
108
|
|
|
|
|
|
|
case 'I': |
109
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NOTHING", 7)) { |
110
|
|
|
|
|
|
|
/* ^ */ |
111
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
#ifdef SSL_NOTHING |
113
|
1
|
|
|
|
|
|
return SSL_NOTHING; |
114
|
|
|
|
|
|
|
#else |
115
|
|
|
|
|
|
|
goto not_there; |
116
|
|
|
|
|
|
|
#endif |
117
|
|
|
|
|
|
|
|
118
|
|
|
|
|
|
|
} |
119
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "READING", 7)) { |
120
|
|
|
|
|
|
|
/* ^ */ |
121
|
|
|
|
|
|
|
|
122
|
|
|
|
|
|
|
#ifdef SSL_READING |
123
|
1
|
|
|
|
|
|
return SSL_READING; |
124
|
|
|
|
|
|
|
#else |
125
|
|
|
|
|
|
|
goto not_there; |
126
|
|
|
|
|
|
|
#endif |
127
|
|
|
|
|
|
|
|
128
|
|
|
|
|
|
|
} |
129
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "WRITING", 7)) { |
130
|
|
|
|
|
|
|
/* ^ */ |
131
|
|
|
|
|
|
|
|
132
|
|
|
|
|
|
|
#ifdef SSL_WRITING |
133
|
1
|
|
|
|
|
|
return SSL_WRITING; |
134
|
|
|
|
|
|
|
#else |
135
|
|
|
|
|
|
|
goto not_there; |
136
|
|
|
|
|
|
|
#endif |
137
|
|
|
|
|
|
|
|
138
|
|
|
|
|
|
|
} |
139
|
0
|
|
|
|
|
|
break; |
140
|
|
|
|
|
|
|
case 'N': |
141
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_INIT", 7)) { |
142
|
|
|
|
|
|
|
/* ^ */ |
143
|
|
|
|
|
|
|
|
144
|
|
|
|
|
|
|
#ifdef SSL_ST_INIT |
145
|
1
|
|
|
|
|
|
return SSL_ST_INIT; |
146
|
|
|
|
|
|
|
#else |
147
|
|
|
|
|
|
|
goto not_there; |
148
|
|
|
|
|
|
|
#endif |
149
|
|
|
|
|
|
|
|
150
|
|
|
|
|
|
|
} |
151
|
0
|
|
|
|
|
|
break; |
152
|
|
|
|
|
|
|
case 'O': |
153
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_LOOP", 7)) { |
154
|
|
|
|
|
|
|
/* ^ */ |
155
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
#ifdef SSL_CB_LOOP |
157
|
2
|
|
|
|
|
|
return SSL_CB_LOOP; |
158
|
|
|
|
|
|
|
#else |
159
|
|
|
|
|
|
|
goto not_there; |
160
|
|
|
|
|
|
|
#endif |
161
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
} |
163
|
0
|
|
|
|
|
|
break; |
164
|
|
|
|
|
|
|
case 'R': |
165
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_RID", 7)) { |
166
|
|
|
|
|
|
|
/* ^ */ |
167
|
|
|
|
|
|
|
|
168
|
|
|
|
|
|
|
#ifdef GEN_RID |
169
|
2
|
|
|
|
|
|
return GEN_RID; |
170
|
|
|
|
|
|
|
#else |
171
|
|
|
|
|
|
|
goto not_there; |
172
|
|
|
|
|
|
|
#endif |
173
|
|
|
|
|
|
|
|
174
|
|
|
|
|
|
|
} |
175
|
0
|
|
|
|
|
|
break; |
176
|
|
|
|
|
|
|
case 'U': |
177
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_URI", 7)) { |
178
|
|
|
|
|
|
|
/* ^ */ |
179
|
|
|
|
|
|
|
|
180
|
|
|
|
|
|
|
#ifdef GEN_URI |
181
|
2
|
|
|
|
|
|
return GEN_URI; |
182
|
|
|
|
|
|
|
#else |
183
|
|
|
|
|
|
|
goto not_there; |
184
|
|
|
|
|
|
|
#endif |
185
|
|
|
|
|
|
|
|
186
|
|
|
|
|
|
|
} |
187
|
0
|
|
|
|
|
|
break; |
188
|
|
|
|
|
|
|
case 'X': |
189
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_EXIT", 7)) { |
190
|
|
|
|
|
|
|
/* ^ */ |
191
|
|
|
|
|
|
|
|
192
|
|
|
|
|
|
|
#ifdef SSL_CB_EXIT |
193
|
2
|
|
|
|
|
|
return SSL_CB_EXIT; |
194
|
|
|
|
|
|
|
#else |
195
|
|
|
|
|
|
|
goto not_there; |
196
|
|
|
|
|
|
|
#endif |
197
|
|
|
|
|
|
|
|
198
|
|
|
|
|
|
|
} |
199
|
0
|
|
|
|
|
|
break; |
200
|
|
|
|
|
|
|
case 'd': |
201
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_dsa", 7)) { |
202
|
|
|
|
|
|
|
/* ^ */ |
203
|
|
|
|
|
|
|
|
204
|
|
|
|
|
|
|
#ifdef NID_dsa |
205
|
1
|
|
|
|
|
|
return NID_dsa; |
206
|
|
|
|
|
|
|
#else |
207
|
|
|
|
|
|
|
goto not_there; |
208
|
|
|
|
|
|
|
#endif |
209
|
|
|
|
|
|
|
|
210
|
|
|
|
|
|
|
} |
211
|
0
|
|
|
|
|
|
break; |
212
|
|
|
|
|
|
|
case 'm': |
213
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_md2", 7)) { |
214
|
|
|
|
|
|
|
/* ^ */ |
215
|
|
|
|
|
|
|
|
216
|
|
|
|
|
|
|
#ifdef NID_md2 |
217
|
1
|
|
|
|
|
|
return NID_md2; |
218
|
|
|
|
|
|
|
#else |
219
|
|
|
|
|
|
|
goto not_there; |
220
|
|
|
|
|
|
|
#endif |
221
|
|
|
|
|
|
|
|
222
|
|
|
|
|
|
|
} |
223
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_md5", 7)) { |
224
|
|
|
|
|
|
|
/* ^ */ |
225
|
|
|
|
|
|
|
|
226
|
|
|
|
|
|
|
#ifdef NID_md5 |
227
|
1
|
|
|
|
|
|
return NID_md5; |
228
|
|
|
|
|
|
|
#else |
229
|
|
|
|
|
|
|
goto not_there; |
230
|
|
|
|
|
|
|
#endif |
231
|
|
|
|
|
|
|
|
232
|
|
|
|
|
|
|
} |
233
|
0
|
|
|
|
|
|
break; |
234
|
|
|
|
|
|
|
case 'r': |
235
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc4", 7)) { |
236
|
|
|
|
|
|
|
/* ^ */ |
237
|
|
|
|
|
|
|
|
238
|
|
|
|
|
|
|
#ifdef NID_rc4 |
239
|
1
|
|
|
|
|
|
return NID_rc4; |
240
|
|
|
|
|
|
|
#else |
241
|
|
|
|
|
|
|
goto not_there; |
242
|
|
|
|
|
|
|
#endif |
243
|
|
|
|
|
|
|
|
244
|
|
|
|
|
|
|
} |
245
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rsa", 7)) { |
246
|
|
|
|
|
|
|
/* ^ */ |
247
|
|
|
|
|
|
|
|
248
|
|
|
|
|
|
|
#ifdef NID_rsa |
249
|
1
|
|
|
|
|
|
return NID_rsa; |
250
|
|
|
|
|
|
|
#else |
251
|
|
|
|
|
|
|
goto not_there; |
252
|
|
|
|
|
|
|
#endif |
253
|
|
|
|
|
|
|
|
254
|
|
|
|
|
|
|
} |
255
|
0
|
|
|
|
|
|
break; |
256
|
|
|
|
|
|
|
case 's': |
257
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_sha", 7)) { |
258
|
|
|
|
|
|
|
/* ^ */ |
259
|
|
|
|
|
|
|
|
260
|
|
|
|
|
|
|
#ifdef NID_sha |
261
|
1
|
|
|
|
|
|
return NID_sha; |
262
|
|
|
|
|
|
|
#else |
263
|
|
|
|
|
|
|
goto not_there; |
264
|
|
|
|
|
|
|
#endif |
265
|
|
|
|
|
|
|
|
266
|
|
|
|
|
|
|
} |
267
|
0
|
|
|
|
|
|
break; |
268
|
|
|
|
|
|
|
} |
269
|
0
|
|
|
|
|
|
break; |
270
|
|
|
|
|
|
|
case 8: |
271
|
|
|
|
|
|
|
/* Names all of length 8. */ |
272
|
|
|
|
|
|
|
/* CB_ALERT CB_WRITE F_READ_N GEN_X400 NID_X500 NID_X509 NID_mdc2 NID_name |
273
|
|
|
|
|
|
|
NID_pkcs NID_sha1 */ |
274
|
|
|
|
|
|
|
/* Offset 5 gives the best switch position. */ |
275
|
12
|
|
|
|
|
|
switch (name[5]) { |
276
|
|
|
|
|
|
|
case '4': |
277
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_X400", 8)) { |
278
|
|
|
|
|
|
|
/* ^ */ |
279
|
|
|
|
|
|
|
|
280
|
|
|
|
|
|
|
#ifdef GEN_X400 |
281
|
1
|
|
|
|
|
|
return GEN_X400; |
282
|
|
|
|
|
|
|
#else |
283
|
|
|
|
|
|
|
goto not_there; |
284
|
|
|
|
|
|
|
#endif |
285
|
|
|
|
|
|
|
|
286
|
|
|
|
|
|
|
} |
287
|
0
|
|
|
|
|
|
break; |
288
|
|
|
|
|
|
|
case '5': |
289
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_X500", 8)) { |
290
|
|
|
|
|
|
|
/* ^ */ |
291
|
|
|
|
|
|
|
|
292
|
|
|
|
|
|
|
#ifdef NID_X500 |
293
|
1
|
|
|
|
|
|
return NID_X500; |
294
|
|
|
|
|
|
|
#else |
295
|
|
|
|
|
|
|
goto not_there; |
296
|
|
|
|
|
|
|
#endif |
297
|
|
|
|
|
|
|
|
298
|
|
|
|
|
|
|
} |
299
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_X509", 8)) { |
300
|
|
|
|
|
|
|
/* ^ */ |
301
|
|
|
|
|
|
|
|
302
|
|
|
|
|
|
|
#ifdef NID_X509 |
303
|
1
|
|
|
|
|
|
return NID_X509; |
304
|
|
|
|
|
|
|
#else |
305
|
|
|
|
|
|
|
goto not_there; |
306
|
|
|
|
|
|
|
#endif |
307
|
|
|
|
|
|
|
|
308
|
|
|
|
|
|
|
} |
309
|
0
|
|
|
|
|
|
break; |
310
|
|
|
|
|
|
|
case 'D': |
311
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_READ_N", 8)) { |
312
|
|
|
|
|
|
|
/* ^ */ |
313
|
|
|
|
|
|
|
|
314
|
|
|
|
|
|
|
#ifdef SSL_F_READ_N |
315
|
1
|
|
|
|
|
|
return SSL_F_READ_N; |
316
|
|
|
|
|
|
|
#else |
317
|
|
|
|
|
|
|
goto not_there; |
318
|
|
|
|
|
|
|
#endif |
319
|
|
|
|
|
|
|
|
320
|
|
|
|
|
|
|
} |
321
|
0
|
|
|
|
|
|
break; |
322
|
|
|
|
|
|
|
case 'E': |
323
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_ALERT", 8)) { |
324
|
|
|
|
|
|
|
/* ^ */ |
325
|
|
|
|
|
|
|
|
326
|
|
|
|
|
|
|
#ifdef SSL_CB_ALERT |
327
|
2
|
|
|
|
|
|
return SSL_CB_ALERT; |
328
|
|
|
|
|
|
|
#else |
329
|
|
|
|
|
|
|
goto not_there; |
330
|
|
|
|
|
|
|
#endif |
331
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
} |
333
|
0
|
|
|
|
|
|
break; |
334
|
|
|
|
|
|
|
case 'I': |
335
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_WRITE", 8)) { |
336
|
|
|
|
|
|
|
/* ^ */ |
337
|
|
|
|
|
|
|
|
338
|
|
|
|
|
|
|
#ifdef SSL_CB_WRITE |
339
|
2
|
|
|
|
|
|
return SSL_CB_WRITE; |
340
|
|
|
|
|
|
|
#else |
341
|
|
|
|
|
|
|
goto not_there; |
342
|
|
|
|
|
|
|
#endif |
343
|
|
|
|
|
|
|
|
344
|
|
|
|
|
|
|
} |
345
|
0
|
|
|
|
|
|
break; |
346
|
|
|
|
|
|
|
case 'a': |
347
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_name", 8)) { |
348
|
|
|
|
|
|
|
/* ^ */ |
349
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
#ifdef NID_name |
351
|
1
|
|
|
|
|
|
return NID_name; |
352
|
|
|
|
|
|
|
#else |
353
|
|
|
|
|
|
|
goto not_there; |
354
|
|
|
|
|
|
|
#endif |
355
|
|
|
|
|
|
|
|
356
|
|
|
|
|
|
|
} |
357
|
0
|
|
|
|
|
|
break; |
358
|
|
|
|
|
|
|
case 'd': |
359
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_mdc2", 8)) { |
360
|
|
|
|
|
|
|
/* ^ */ |
361
|
|
|
|
|
|
|
|
362
|
|
|
|
|
|
|
#ifdef NID_mdc2 |
363
|
1
|
|
|
|
|
|
return NID_mdc2; |
364
|
|
|
|
|
|
|
#else |
365
|
|
|
|
|
|
|
goto not_there; |
366
|
|
|
|
|
|
|
#endif |
367
|
|
|
|
|
|
|
|
368
|
|
|
|
|
|
|
} |
369
|
0
|
|
|
|
|
|
break; |
370
|
|
|
|
|
|
|
case 'h': |
371
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_sha1", 8)) { |
372
|
|
|
|
|
|
|
/* ^ */ |
373
|
|
|
|
|
|
|
|
374
|
|
|
|
|
|
|
#ifdef NID_sha1 |
375
|
1
|
|
|
|
|
|
return NID_sha1; |
376
|
|
|
|
|
|
|
#else |
377
|
|
|
|
|
|
|
goto not_there; |
378
|
|
|
|
|
|
|
#endif |
379
|
|
|
|
|
|
|
|
380
|
|
|
|
|
|
|
} |
381
|
0
|
|
|
|
|
|
break; |
382
|
|
|
|
|
|
|
case 'k': |
383
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs", 8)) { |
384
|
|
|
|
|
|
|
/* ^ */ |
385
|
|
|
|
|
|
|
|
386
|
|
|
|
|
|
|
#ifdef NID_pkcs |
387
|
1
|
|
|
|
|
|
return NID_pkcs; |
388
|
|
|
|
|
|
|
#else |
389
|
|
|
|
|
|
|
goto not_there; |
390
|
|
|
|
|
|
|
#endif |
391
|
|
|
|
|
|
|
|
392
|
|
|
|
|
|
|
} |
393
|
0
|
|
|
|
|
|
break; |
394
|
|
|
|
|
|
|
} |
395
|
0
|
|
|
|
|
|
break; |
396
|
|
|
|
|
|
|
case 9: |
397
|
|
|
|
|
|
|
/* Names all of length 9. */ |
398
|
|
|
|
|
|
|
/* ERROR_SSL EVP_PK_DH EVP_PK_EC F_SSL_NEW GEN_EMAIL GEN_IPADD NID_dsa_2 |
399
|
|
|
|
|
|
|
NID_id_ad NID_id_ce NID_id_kp NID_id_pe NID_pbes2 NID_pkcs3 NID_pkcs7 |
400
|
|
|
|
|
|
|
NID_pkcs9 NID_sxnet NID_title NID_undef ST_ACCEPT ST_BEFORE X509_V_OK */ |
401
|
|
|
|
|
|
|
/* Offset 8 gives the best switch position. */ |
402
|
68
|
|
|
|
|
|
switch (name[8]) { |
403
|
|
|
|
|
|
|
case '2': |
404
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_dsa_", 8)) { |
405
|
|
|
|
|
|
|
/* 2 */ |
406
|
|
|
|
|
|
|
|
407
|
|
|
|
|
|
|
#ifdef NID_dsa_2 |
408
|
1
|
|
|
|
|
|
return NID_dsa_2; |
409
|
|
|
|
|
|
|
#else |
410
|
|
|
|
|
|
|
goto not_there; |
411
|
|
|
|
|
|
|
#endif |
412
|
|
|
|
|
|
|
|
413
|
|
|
|
|
|
|
} |
414
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbes", 8)) { |
415
|
|
|
|
|
|
|
/* 2 */ |
416
|
|
|
|
|
|
|
|
417
|
|
|
|
|
|
|
#ifdef NID_pbes2 |
418
|
1
|
|
|
|
|
|
return NID_pbes2; |
419
|
|
|
|
|
|
|
#else |
420
|
|
|
|
|
|
|
goto not_there; |
421
|
|
|
|
|
|
|
#endif |
422
|
|
|
|
|
|
|
|
423
|
|
|
|
|
|
|
} |
424
|
0
|
|
|
|
|
|
break; |
425
|
|
|
|
|
|
|
case '3': |
426
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs", 8)) { |
427
|
|
|
|
|
|
|
/* 3 */ |
428
|
|
|
|
|
|
|
|
429
|
|
|
|
|
|
|
#ifdef NID_pkcs3 |
430
|
1
|
|
|
|
|
|
return NID_pkcs3; |
431
|
|
|
|
|
|
|
#else |
432
|
|
|
|
|
|
|
goto not_there; |
433
|
|
|
|
|
|
|
#endif |
434
|
|
|
|
|
|
|
|
435
|
|
|
|
|
|
|
} |
436
|
0
|
|
|
|
|
|
break; |
437
|
|
|
|
|
|
|
case '7': |
438
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs", 8)) { |
439
|
|
|
|
|
|
|
/* 7 */ |
440
|
|
|
|
|
|
|
|
441
|
|
|
|
|
|
|
#ifdef NID_pkcs7 |
442
|
1
|
|
|
|
|
|
return NID_pkcs7; |
443
|
|
|
|
|
|
|
#else |
444
|
|
|
|
|
|
|
goto not_there; |
445
|
|
|
|
|
|
|
#endif |
446
|
|
|
|
|
|
|
|
447
|
|
|
|
|
|
|
} |
448
|
0
|
|
|
|
|
|
break; |
449
|
|
|
|
|
|
|
case '9': |
450
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs", 8)) { |
451
|
|
|
|
|
|
|
/* 9 */ |
452
|
|
|
|
|
|
|
|
453
|
|
|
|
|
|
|
#ifdef NID_pkcs9 |
454
|
1
|
|
|
|
|
|
return NID_pkcs9; |
455
|
|
|
|
|
|
|
#else |
456
|
|
|
|
|
|
|
goto not_there; |
457
|
|
|
|
|
|
|
#endif |
458
|
|
|
|
|
|
|
|
459
|
|
|
|
|
|
|
} |
460
|
0
|
|
|
|
|
|
break; |
461
|
|
|
|
|
|
|
case 'C': |
462
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PK_E", 8)) { |
463
|
|
|
|
|
|
|
/* C */ |
464
|
|
|
|
|
|
|
|
465
|
|
|
|
|
|
|
#ifdef EVP_PK_EC |
466
|
1
|
|
|
|
|
|
return EVP_PK_EC; |
467
|
|
|
|
|
|
|
#else |
468
|
|
|
|
|
|
|
goto not_there; |
469
|
|
|
|
|
|
|
#endif |
470
|
|
|
|
|
|
|
|
471
|
|
|
|
|
|
|
} |
472
|
0
|
|
|
|
|
|
break; |
473
|
|
|
|
|
|
|
case 'D': |
474
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_IPAD", 8)) { |
475
|
|
|
|
|
|
|
/* D */ |
476
|
|
|
|
|
|
|
|
477
|
|
|
|
|
|
|
#ifdef GEN_IPADD |
478
|
2
|
|
|
|
|
|
return GEN_IPADD; |
479
|
|
|
|
|
|
|
#else |
480
|
|
|
|
|
|
|
goto not_there; |
481
|
|
|
|
|
|
|
#endif |
482
|
|
|
|
|
|
|
|
483
|
|
|
|
|
|
|
} |
484
|
0
|
|
|
|
|
|
break; |
485
|
|
|
|
|
|
|
case 'E': |
486
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_BEFOR", 8)) { |
487
|
|
|
|
|
|
|
/* E */ |
488
|
|
|
|
|
|
|
|
489
|
|
|
|
|
|
|
#ifdef SSL_ST_BEFORE |
490
|
1
|
|
|
|
|
|
return SSL_ST_BEFORE; |
491
|
|
|
|
|
|
|
#else |
492
|
|
|
|
|
|
|
goto not_there; |
493
|
|
|
|
|
|
|
#endif |
494
|
|
|
|
|
|
|
|
495
|
|
|
|
|
|
|
} |
496
|
0
|
|
|
|
|
|
break; |
497
|
|
|
|
|
|
|
case 'H': |
498
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PK_D", 8)) { |
499
|
|
|
|
|
|
|
/* H */ |
500
|
|
|
|
|
|
|
|
501
|
|
|
|
|
|
|
#ifdef EVP_PK_DH |
502
|
1
|
|
|
|
|
|
return EVP_PK_DH; |
503
|
|
|
|
|
|
|
#else |
504
|
|
|
|
|
|
|
goto not_there; |
505
|
|
|
|
|
|
|
#endif |
506
|
|
|
|
|
|
|
|
507
|
|
|
|
|
|
|
} |
508
|
0
|
|
|
|
|
|
break; |
509
|
|
|
|
|
|
|
case 'K': |
510
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_O", 8)) { |
511
|
|
|
|
|
|
|
/* K */ |
512
|
|
|
|
|
|
|
|
513
|
|
|
|
|
|
|
#ifdef X509_V_OK |
514
|
2
|
|
|
|
|
|
return X509_V_OK; |
515
|
|
|
|
|
|
|
#else |
516
|
|
|
|
|
|
|
goto not_there; |
517
|
|
|
|
|
|
|
#endif |
518
|
|
|
|
|
|
|
|
519
|
|
|
|
|
|
|
} |
520
|
0
|
|
|
|
|
|
break; |
521
|
|
|
|
|
|
|
case 'L': |
522
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "ERROR_SS", 8)) { |
523
|
|
|
|
|
|
|
/* L */ |
524
|
|
|
|
|
|
|
|
525
|
|
|
|
|
|
|
#ifdef SSL_ERROR_SSL |
526
|
1
|
|
|
|
|
|
return SSL_ERROR_SSL; |
527
|
|
|
|
|
|
|
#else |
528
|
|
|
|
|
|
|
goto not_there; |
529
|
|
|
|
|
|
|
#endif |
530
|
|
|
|
|
|
|
|
531
|
|
|
|
|
|
|
} |
532
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_EMAI", 8)) { |
533
|
|
|
|
|
|
|
/* L */ |
534
|
|
|
|
|
|
|
|
535
|
|
|
|
|
|
|
#ifdef GEN_EMAIL |
536
|
2
|
|
|
|
|
|
return GEN_EMAIL; |
537
|
|
|
|
|
|
|
#else |
538
|
|
|
|
|
|
|
goto not_there; |
539
|
|
|
|
|
|
|
#endif |
540
|
|
|
|
|
|
|
|
541
|
|
|
|
|
|
|
} |
542
|
0
|
|
|
|
|
|
break; |
543
|
|
|
|
|
|
|
case 'T': |
544
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_ACCEP", 8)) { |
545
|
|
|
|
|
|
|
/* T */ |
546
|
|
|
|
|
|
|
|
547
|
|
|
|
|
|
|
#ifdef SSL_ST_ACCEPT |
548
|
1
|
|
|
|
|
|
return SSL_ST_ACCEPT; |
549
|
|
|
|
|
|
|
#else |
550
|
|
|
|
|
|
|
goto not_there; |
551
|
|
|
|
|
|
|
#endif |
552
|
|
|
|
|
|
|
|
553
|
|
|
|
|
|
|
} |
554
|
0
|
|
|
|
|
|
break; |
555
|
|
|
|
|
|
|
case 'W': |
556
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_NE", 8)) { |
557
|
|
|
|
|
|
|
/* W */ |
558
|
|
|
|
|
|
|
|
559
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_NEW |
560
|
1
|
|
|
|
|
|
return SSL_F_SSL_NEW; |
561
|
|
|
|
|
|
|
#else |
562
|
|
|
|
|
|
|
goto not_there; |
563
|
|
|
|
|
|
|
#endif |
564
|
|
|
|
|
|
|
|
565
|
|
|
|
|
|
|
} |
566
|
0
|
|
|
|
|
|
break; |
567
|
|
|
|
|
|
|
case 'd': |
568
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_id_a", 8)) { |
569
|
|
|
|
|
|
|
/* d */ |
570
|
|
|
|
|
|
|
|
571
|
|
|
|
|
|
|
#ifdef NID_id_ad |
572
|
1
|
|
|
|
|
|
return NID_id_ad; |
573
|
|
|
|
|
|
|
#else |
574
|
|
|
|
|
|
|
goto not_there; |
575
|
|
|
|
|
|
|
#endif |
576
|
|
|
|
|
|
|
|
577
|
|
|
|
|
|
|
} |
578
|
0
|
|
|
|
|
|
break; |
579
|
|
|
|
|
|
|
case 'e': |
580
|
46
|
100
|
|
|
|
|
if (!memcmp(name, "NID_id_c", 8)) { |
581
|
|
|
|
|
|
|
/* e */ |
582
|
|
|
|
|
|
|
|
583
|
|
|
|
|
|
|
#ifdef NID_id_ce |
584
|
1
|
|
|
|
|
|
return NID_id_ce; |
585
|
|
|
|
|
|
|
#else |
586
|
|
|
|
|
|
|
goto not_there; |
587
|
|
|
|
|
|
|
#endif |
588
|
|
|
|
|
|
|
|
589
|
|
|
|
|
|
|
} |
590
|
45
|
100
|
|
|
|
|
if (!memcmp(name, "NID_id_p", 8)) { |
591
|
|
|
|
|
|
|
/* e */ |
592
|
|
|
|
|
|
|
|
593
|
|
|
|
|
|
|
#ifdef NID_id_pe |
594
|
1
|
|
|
|
|
|
return NID_id_pe; |
595
|
|
|
|
|
|
|
#else |
596
|
|
|
|
|
|
|
goto not_there; |
597
|
|
|
|
|
|
|
#endif |
598
|
|
|
|
|
|
|
|
599
|
|
|
|
|
|
|
} |
600
|
44
|
100
|
|
|
|
|
if (!memcmp(name, "NID_titl", 8)) { |
601
|
|
|
|
|
|
|
/* e */ |
602
|
|
|
|
|
|
|
|
603
|
|
|
|
|
|
|
#ifdef NID_title |
604
|
1
|
|
|
|
|
|
return NID_title; |
605
|
|
|
|
|
|
|
#else |
606
|
|
|
|
|
|
|
goto not_there; |
607
|
|
|
|
|
|
|
#endif |
608
|
|
|
|
|
|
|
|
609
|
|
|
|
|
|
|
} |
610
|
43
|
|
|
|
|
|
break; |
611
|
|
|
|
|
|
|
case 'f': |
612
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_unde", 8)) { |
613
|
|
|
|
|
|
|
/* f */ |
614
|
|
|
|
|
|
|
|
615
|
|
|
|
|
|
|
#ifdef NID_undef |
616
|
1
|
|
|
|
|
|
return NID_undef; |
617
|
|
|
|
|
|
|
#else |
618
|
|
|
|
|
|
|
goto not_there; |
619
|
|
|
|
|
|
|
#endif |
620
|
|
|
|
|
|
|
|
621
|
|
|
|
|
|
|
} |
622
|
0
|
|
|
|
|
|
break; |
623
|
|
|
|
|
|
|
case 'p': |
624
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_id_k", 8)) { |
625
|
|
|
|
|
|
|
/* p */ |
626
|
|
|
|
|
|
|
|
627
|
|
|
|
|
|
|
#ifdef NID_id_kp |
628
|
1
|
|
|
|
|
|
return NID_id_kp; |
629
|
|
|
|
|
|
|
#else |
630
|
|
|
|
|
|
|
goto not_there; |
631
|
|
|
|
|
|
|
#endif |
632
|
|
|
|
|
|
|
|
633
|
|
|
|
|
|
|
} |
634
|
0
|
|
|
|
|
|
break; |
635
|
|
|
|
|
|
|
case 't': |
636
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_sxne", 8)) { |
637
|
|
|
|
|
|
|
/* t */ |
638
|
|
|
|
|
|
|
|
639
|
|
|
|
|
|
|
#ifdef NID_sxnet |
640
|
1
|
|
|
|
|
|
return NID_sxnet; |
641
|
|
|
|
|
|
|
#else |
642
|
|
|
|
|
|
|
goto not_there; |
643
|
|
|
|
|
|
|
#endif |
644
|
|
|
|
|
|
|
|
645
|
|
|
|
|
|
|
} |
646
|
0
|
|
|
|
|
|
break; |
647
|
|
|
|
|
|
|
} |
648
|
44
|
|
|
|
|
|
break; |
649
|
|
|
|
|
|
|
case 10: |
650
|
|
|
|
|
|
|
/* Names all of length 10. */ |
651
|
|
|
|
|
|
|
/* ERROR_NONE EVP_PKS_EC EVP_PK_DSA EVP_PK_RSA F_SSL_READ NID_bf_cbc |
652
|
|
|
|
|
|
|
NID_bf_ecb NID_crlBag NID_keyBag NID_ms_efs NID_ms_sgc NID_ns_sgc |
653
|
|
|
|
|
|
|
NID_pbmac1 NID_rc4_40 NID_rsadsi R_X509_LIB SSLEAY_DIR ST_CONNECT */ |
654
|
|
|
|
|
|
|
/* Offset 9 gives the best switch position. */ |
655
|
21
|
|
|
|
|
|
switch (name[9]) { |
656
|
|
|
|
|
|
|
case '0': |
657
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rc4_4", 9)) { |
658
|
|
|
|
|
|
|
/* 0 */ |
659
|
|
|
|
|
|
|
|
660
|
|
|
|
|
|
|
#ifdef NID_rc4_40 |
661
|
1
|
|
|
|
|
|
return NID_rc4_40; |
662
|
|
|
|
|
|
|
#else |
663
|
|
|
|
|
|
|
goto not_there; |
664
|
|
|
|
|
|
|
#endif |
665
|
|
|
|
|
|
|
|
666
|
|
|
|
|
|
|
} |
667
|
0
|
|
|
|
|
|
break; |
668
|
|
|
|
|
|
|
case '1': |
669
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbmac", 9)) { |
670
|
|
|
|
|
|
|
/* 1 */ |
671
|
|
|
|
|
|
|
|
672
|
|
|
|
|
|
|
#ifdef NID_pbmac1 |
673
|
1
|
|
|
|
|
|
return NID_pbmac1; |
674
|
|
|
|
|
|
|
#else |
675
|
|
|
|
|
|
|
goto not_there; |
676
|
|
|
|
|
|
|
#endif |
677
|
|
|
|
|
|
|
|
678
|
|
|
|
|
|
|
} |
679
|
0
|
|
|
|
|
|
break; |
680
|
|
|
|
|
|
|
case 'A': |
681
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "EVP_PK_DS", 9)) { |
682
|
|
|
|
|
|
|
/* A */ |
683
|
|
|
|
|
|
|
|
684
|
|
|
|
|
|
|
#ifdef EVP_PK_DSA |
685
|
1
|
|
|
|
|
|
return EVP_PK_DSA; |
686
|
|
|
|
|
|
|
#else |
687
|
|
|
|
|
|
|
goto not_there; |
688
|
|
|
|
|
|
|
#endif |
689
|
|
|
|
|
|
|
|
690
|
|
|
|
|
|
|
} |
691
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PK_RS", 9)) { |
692
|
|
|
|
|
|
|
/* A */ |
693
|
|
|
|
|
|
|
|
694
|
|
|
|
|
|
|
#ifdef EVP_PK_RSA |
695
|
2
|
|
|
|
|
|
return EVP_PK_RSA; |
696
|
|
|
|
|
|
|
#else |
697
|
|
|
|
|
|
|
goto not_there; |
698
|
|
|
|
|
|
|
#endif |
699
|
|
|
|
|
|
|
|
700
|
|
|
|
|
|
|
} |
701
|
0
|
|
|
|
|
|
break; |
702
|
|
|
|
|
|
|
case 'B': |
703
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_X509_LI", 9)) { |
704
|
|
|
|
|
|
|
/* B */ |
705
|
|
|
|
|
|
|
|
706
|
|
|
|
|
|
|
#ifdef SSL_R_X509_LIB |
707
|
1
|
|
|
|
|
|
return SSL_R_X509_LIB; |
708
|
|
|
|
|
|
|
#else |
709
|
|
|
|
|
|
|
goto not_there; |
710
|
|
|
|
|
|
|
#endif |
711
|
|
|
|
|
|
|
|
712
|
|
|
|
|
|
|
} |
713
|
0
|
|
|
|
|
|
break; |
714
|
|
|
|
|
|
|
case 'C': |
715
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PKS_E", 9)) { |
716
|
|
|
|
|
|
|
/* C */ |
717
|
|
|
|
|
|
|
|
718
|
|
|
|
|
|
|
#ifdef EVP_PKS_EC |
719
|
1
|
|
|
|
|
|
return EVP_PKS_EC; |
720
|
|
|
|
|
|
|
#else |
721
|
|
|
|
|
|
|
goto not_there; |
722
|
|
|
|
|
|
|
#endif |
723
|
|
|
|
|
|
|
|
724
|
|
|
|
|
|
|
} |
725
|
0
|
|
|
|
|
|
break; |
726
|
|
|
|
|
|
|
case 'D': |
727
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_REA", 9)) { |
728
|
|
|
|
|
|
|
/* D */ |
729
|
|
|
|
|
|
|
|
730
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_READ |
731
|
1
|
|
|
|
|
|
return SSL_F_SSL_READ; |
732
|
|
|
|
|
|
|
#else |
733
|
|
|
|
|
|
|
goto not_there; |
734
|
|
|
|
|
|
|
#endif |
735
|
|
|
|
|
|
|
|
736
|
|
|
|
|
|
|
} |
737
|
0
|
|
|
|
|
|
break; |
738
|
|
|
|
|
|
|
case 'E': |
739
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_NON", 9)) { |
740
|
|
|
|
|
|
|
/* E */ |
741
|
|
|
|
|
|
|
|
742
|
|
|
|
|
|
|
#ifdef SSL_ERROR_NONE |
743
|
1
|
|
|
|
|
|
return SSL_ERROR_NONE; |
744
|
|
|
|
|
|
|
#else |
745
|
|
|
|
|
|
|
goto not_there; |
746
|
|
|
|
|
|
|
#endif |
747
|
|
|
|
|
|
|
|
748
|
|
|
|
|
|
|
} |
749
|
0
|
|
|
|
|
|
break; |
750
|
|
|
|
|
|
|
case 'R': |
751
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SSLEAY_DI", 9)) { |
752
|
|
|
|
|
|
|
/* R */ |
753
|
|
|
|
|
|
|
|
754
|
|
|
|
|
|
|
#ifdef SSLEAY_DIR |
755
|
2
|
|
|
|
|
|
return SSLEAY_DIR; |
756
|
|
|
|
|
|
|
#else |
757
|
|
|
|
|
|
|
goto not_there; |
758
|
|
|
|
|
|
|
#endif |
759
|
|
|
|
|
|
|
|
760
|
|
|
|
|
|
|
} |
761
|
0
|
|
|
|
|
|
break; |
762
|
|
|
|
|
|
|
case 'T': |
763
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_CONNEC", 9)) { |
764
|
|
|
|
|
|
|
/* T */ |
765
|
|
|
|
|
|
|
|
766
|
|
|
|
|
|
|
#ifdef SSL_ST_CONNECT |
767
|
1
|
|
|
|
|
|
return SSL_ST_CONNECT; |
768
|
|
|
|
|
|
|
#else |
769
|
|
|
|
|
|
|
goto not_there; |
770
|
|
|
|
|
|
|
#endif |
771
|
|
|
|
|
|
|
|
772
|
|
|
|
|
|
|
} |
773
|
0
|
|
|
|
|
|
break; |
774
|
|
|
|
|
|
|
case 'b': |
775
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_bf_ec", 9)) { |
776
|
|
|
|
|
|
|
/* b */ |
777
|
|
|
|
|
|
|
|
778
|
|
|
|
|
|
|
#ifdef NID_bf_ecb |
779
|
1
|
|
|
|
|
|
return NID_bf_ecb; |
780
|
|
|
|
|
|
|
#else |
781
|
|
|
|
|
|
|
goto not_there; |
782
|
|
|
|
|
|
|
#endif |
783
|
|
|
|
|
|
|
|
784
|
|
|
|
|
|
|
} |
785
|
0
|
|
|
|
|
|
break; |
786
|
|
|
|
|
|
|
case 'c': |
787
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_bf_cb", 9)) { |
788
|
|
|
|
|
|
|
/* c */ |
789
|
|
|
|
|
|
|
|
790
|
|
|
|
|
|
|
#ifdef NID_bf_cbc |
791
|
1
|
|
|
|
|
|
return NID_bf_cbc; |
792
|
|
|
|
|
|
|
#else |
793
|
|
|
|
|
|
|
goto not_there; |
794
|
|
|
|
|
|
|
#endif |
795
|
|
|
|
|
|
|
|
796
|
|
|
|
|
|
|
} |
797
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_ms_sg", 9)) { |
798
|
|
|
|
|
|
|
/* c */ |
799
|
|
|
|
|
|
|
|
800
|
|
|
|
|
|
|
#ifdef NID_ms_sgc |
801
|
1
|
|
|
|
|
|
return NID_ms_sgc; |
802
|
|
|
|
|
|
|
#else |
803
|
|
|
|
|
|
|
goto not_there; |
804
|
|
|
|
|
|
|
#endif |
805
|
|
|
|
|
|
|
|
806
|
|
|
|
|
|
|
} |
807
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ns_sg", 9)) { |
808
|
|
|
|
|
|
|
/* c */ |
809
|
|
|
|
|
|
|
|
810
|
|
|
|
|
|
|
#ifdef NID_ns_sgc |
811
|
1
|
|
|
|
|
|
return NID_ns_sgc; |
812
|
|
|
|
|
|
|
#else |
813
|
|
|
|
|
|
|
goto not_there; |
814
|
|
|
|
|
|
|
#endif |
815
|
|
|
|
|
|
|
|
816
|
|
|
|
|
|
|
} |
817
|
0
|
|
|
|
|
|
break; |
818
|
|
|
|
|
|
|
case 'g': |
819
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_crlBa", 9)) { |
820
|
|
|
|
|
|
|
/* g */ |
821
|
|
|
|
|
|
|
|
822
|
|
|
|
|
|
|
#ifdef NID_crlBag |
823
|
1
|
|
|
|
|
|
return NID_crlBag; |
824
|
|
|
|
|
|
|
#else |
825
|
|
|
|
|
|
|
goto not_there; |
826
|
|
|
|
|
|
|
#endif |
827
|
|
|
|
|
|
|
|
828
|
|
|
|
|
|
|
} |
829
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_keyBa", 9)) { |
830
|
|
|
|
|
|
|
/* g */ |
831
|
|
|
|
|
|
|
|
832
|
|
|
|
|
|
|
#ifdef NID_keyBag |
833
|
1
|
|
|
|
|
|
return NID_keyBag; |
834
|
|
|
|
|
|
|
#else |
835
|
|
|
|
|
|
|
goto not_there; |
836
|
|
|
|
|
|
|
#endif |
837
|
|
|
|
|
|
|
|
838
|
|
|
|
|
|
|
} |
839
|
0
|
|
|
|
|
|
break; |
840
|
|
|
|
|
|
|
case 'i': |
841
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rsads", 9)) { |
842
|
|
|
|
|
|
|
/* i */ |
843
|
|
|
|
|
|
|
|
844
|
|
|
|
|
|
|
#ifdef NID_rsadsi |
845
|
1
|
|
|
|
|
|
return NID_rsadsi; |
846
|
|
|
|
|
|
|
#else |
847
|
|
|
|
|
|
|
goto not_there; |
848
|
|
|
|
|
|
|
#endif |
849
|
|
|
|
|
|
|
|
850
|
|
|
|
|
|
|
} |
851
|
0
|
|
|
|
|
|
break; |
852
|
|
|
|
|
|
|
case 's': |
853
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ms_ef", 9)) { |
854
|
|
|
|
|
|
|
/* s */ |
855
|
|
|
|
|
|
|
|
856
|
|
|
|
|
|
|
#ifdef NID_ms_efs |
857
|
1
|
|
|
|
|
|
return NID_ms_efs; |
858
|
|
|
|
|
|
|
#else |
859
|
|
|
|
|
|
|
goto not_there; |
860
|
|
|
|
|
|
|
#endif |
861
|
|
|
|
|
|
|
|
862
|
|
|
|
|
|
|
} |
863
|
0
|
|
|
|
|
|
break; |
864
|
|
|
|
|
|
|
} |
865
|
1
|
|
|
|
|
|
break; |
866
|
|
|
|
|
|
|
case 11: |
867
|
|
|
|
|
|
|
/* Names all of length 11. */ |
868
|
|
|
|
|
|
|
/* EVP_PKS_DSA EVP_PKS_RSA EVP_PKT_ENC EVP_PKT_EXP GEN_DIRNAME NID_ad_OCSP |
869
|
|
|
|
|
|
|
NID_certBag NID_des_cbc NID_des_ecb NID_des_ede NID_ext_req NID_id_pkix |
870
|
|
|
|
|
|
|
NID_rc2_cbc NID_rc2_ecb NID_rc5_cbc NID_rc5_ecb NID_surname NID_x509Crl |
871
|
|
|
|
|
|
|
OPENSSL_DIR OP_NO_SSLv2 OP_NO_SSLv3 OP_NO_TLSv1 R_BAD_STATE SSL3_MT_CCS |
872
|
|
|
|
|
|
|
VERIFY_NONE VERIFY_PEER X509_LOOKUP */ |
873
|
|
|
|
|
|
|
/* Offset 9 gives the best switch position. */ |
874
|
30
|
|
|
|
|
|
switch (name[9]) { |
875
|
|
|
|
|
|
|
case 'C': |
876
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CCS", 11)) { |
877
|
|
|
|
|
|
|
/* ^ */ |
878
|
|
|
|
|
|
|
|
879
|
|
|
|
|
|
|
#ifdef SSL3_MT_CCS |
880
|
1
|
|
|
|
|
|
return SSL3_MT_CCS; |
881
|
|
|
|
|
|
|
#else |
882
|
|
|
|
|
|
|
goto not_there; |
883
|
|
|
|
|
|
|
#endif |
884
|
|
|
|
|
|
|
|
885
|
|
|
|
|
|
|
} |
886
|
0
|
|
|
|
|
|
break; |
887
|
|
|
|
|
|
|
case 'E': |
888
|
3
|
50
|
|
|
|
|
if (!memcmp(name, "VERIFY_PEER", 11)) { |
889
|
|
|
|
|
|
|
/* ^ */ |
890
|
|
|
|
|
|
|
|
891
|
|
|
|
|
|
|
#ifdef SSL_VERIFY_PEER |
892
|
3
|
|
|
|
|
|
return SSL_VERIFY_PEER; |
893
|
|
|
|
|
|
|
#else |
894
|
|
|
|
|
|
|
goto not_there; |
895
|
|
|
|
|
|
|
#endif |
896
|
|
|
|
|
|
|
|
897
|
|
|
|
|
|
|
} |
898
|
0
|
|
|
|
|
|
break; |
899
|
|
|
|
|
|
|
case 'I': |
900
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_DIR", 11)) { |
901
|
|
|
|
|
|
|
/* ^ */ |
902
|
|
|
|
|
|
|
|
903
|
|
|
|
|
|
|
#ifdef OPENSSL_DIR |
904
|
|
|
|
|
|
|
return OPENSSL_DIR; |
905
|
|
|
|
|
|
|
#else |
906
|
1
|
|
|
|
|
|
goto not_there; |
907
|
|
|
|
|
|
|
#endif |
908
|
|
|
|
|
|
|
|
909
|
|
|
|
|
|
|
} |
910
|
0
|
|
|
|
|
|
break; |
911
|
|
|
|
|
|
|
case 'M': |
912
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_DIRNAME", 11)) { |
913
|
|
|
|
|
|
|
/* ^ */ |
914
|
|
|
|
|
|
|
|
915
|
|
|
|
|
|
|
#ifdef GEN_DIRNAME |
916
|
1
|
|
|
|
|
|
return GEN_DIRNAME; |
917
|
|
|
|
|
|
|
#else |
918
|
|
|
|
|
|
|
goto not_there; |
919
|
|
|
|
|
|
|
#endif |
920
|
|
|
|
|
|
|
|
921
|
|
|
|
|
|
|
} |
922
|
0
|
|
|
|
|
|
break; |
923
|
|
|
|
|
|
|
case 'N': |
924
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "EVP_PKT_ENC", 11)) { |
925
|
|
|
|
|
|
|
/* ^ */ |
926
|
|
|
|
|
|
|
|
927
|
|
|
|
|
|
|
#ifdef EVP_PKT_ENC |
928
|
2
|
|
|
|
|
|
return EVP_PKT_ENC; |
929
|
|
|
|
|
|
|
#else |
930
|
|
|
|
|
|
|
goto not_there; |
931
|
|
|
|
|
|
|
#endif |
932
|
|
|
|
|
|
|
|
933
|
|
|
|
|
|
|
} |
934
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "VERIFY_NONE", 11)) { |
935
|
|
|
|
|
|
|
/* ^ */ |
936
|
|
|
|
|
|
|
|
937
|
|
|
|
|
|
|
#ifdef SSL_VERIFY_NONE |
938
|
1
|
|
|
|
|
|
return SSL_VERIFY_NONE; |
939
|
|
|
|
|
|
|
#else |
940
|
|
|
|
|
|
|
goto not_there; |
941
|
|
|
|
|
|
|
#endif |
942
|
|
|
|
|
|
|
|
943
|
|
|
|
|
|
|
} |
944
|
0
|
|
|
|
|
|
break; |
945
|
|
|
|
|
|
|
case 'S': |
946
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "EVP_PKS_DSA", 11)) { |
947
|
|
|
|
|
|
|
/* ^ */ |
948
|
|
|
|
|
|
|
|
949
|
|
|
|
|
|
|
#ifdef EVP_PKS_DSA |
950
|
1
|
|
|
|
|
|
return EVP_PKS_DSA; |
951
|
|
|
|
|
|
|
#else |
952
|
|
|
|
|
|
|
goto not_there; |
953
|
|
|
|
|
|
|
#endif |
954
|
|
|
|
|
|
|
|
955
|
|
|
|
|
|
|
} |
956
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "EVP_PKS_RSA", 11)) { |
957
|
|
|
|
|
|
|
/* ^ */ |
958
|
|
|
|
|
|
|
|
959
|
|
|
|
|
|
|
#ifdef EVP_PKS_RSA |
960
|
1
|
|
|
|
|
|
return EVP_PKS_RSA; |
961
|
|
|
|
|
|
|
#else |
962
|
|
|
|
|
|
|
goto not_there; |
963
|
|
|
|
|
|
|
#endif |
964
|
|
|
|
|
|
|
|
965
|
|
|
|
|
|
|
} |
966
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ad_OCSP", 11)) { |
967
|
|
|
|
|
|
|
/* ^ */ |
968
|
|
|
|
|
|
|
|
969
|
|
|
|
|
|
|
#ifdef NID_ad_OCSP |
970
|
1
|
|
|
|
|
|
return NID_ad_OCSP; |
971
|
|
|
|
|
|
|
#else |
972
|
|
|
|
|
|
|
goto not_there; |
973
|
|
|
|
|
|
|
#endif |
974
|
|
|
|
|
|
|
|
975
|
|
|
|
|
|
|
} |
976
|
0
|
|
|
|
|
|
break; |
977
|
|
|
|
|
|
|
case 'T': |
978
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_STATE", 11)) { |
979
|
|
|
|
|
|
|
/* ^ */ |
980
|
|
|
|
|
|
|
|
981
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_STATE |
982
|
1
|
|
|
|
|
|
return SSL_R_BAD_STATE; |
983
|
|
|
|
|
|
|
#else |
984
|
|
|
|
|
|
|
goto not_there; |
985
|
|
|
|
|
|
|
#endif |
986
|
|
|
|
|
|
|
|
987
|
|
|
|
|
|
|
} |
988
|
0
|
|
|
|
|
|
break; |
989
|
|
|
|
|
|
|
case 'U': |
990
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_LOOKUP", 11)) { |
991
|
|
|
|
|
|
|
/* ^ */ |
992
|
|
|
|
|
|
|
|
993
|
|
|
|
|
|
|
#ifdef SSL_X509_LOOKUP |
994
|
1
|
|
|
|
|
|
return SSL_X509_LOOKUP; |
995
|
|
|
|
|
|
|
#else |
996
|
|
|
|
|
|
|
goto not_there; |
997
|
|
|
|
|
|
|
#endif |
998
|
|
|
|
|
|
|
|
999
|
|
|
|
|
|
|
} |
1000
|
0
|
|
|
|
|
|
break; |
1001
|
|
|
|
|
|
|
case 'X': |
1002
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PKT_EXP", 11)) { |
1003
|
|
|
|
|
|
|
/* ^ */ |
1004
|
|
|
|
|
|
|
|
1005
|
|
|
|
|
|
|
#ifdef EVP_PKT_EXP |
1006
|
|
|
|
|
|
|
return EVP_PKT_EXP; |
1007
|
|
|
|
|
|
|
#else |
1008
|
1
|
|
|
|
|
|
goto not_there; |
1009
|
|
|
|
|
|
|
#endif |
1010
|
|
|
|
|
|
|
|
1011
|
|
|
|
|
|
|
} |
1012
|
0
|
|
|
|
|
|
break; |
1013
|
|
|
|
|
|
|
case 'a': |
1014
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_certBag", 11)) { |
1015
|
|
|
|
|
|
|
/* ^ */ |
1016
|
|
|
|
|
|
|
|
1017
|
|
|
|
|
|
|
#ifdef NID_certBag |
1018
|
1
|
|
|
|
|
|
return NID_certBag; |
1019
|
|
|
|
|
|
|
#else |
1020
|
|
|
|
|
|
|
goto not_there; |
1021
|
|
|
|
|
|
|
#endif |
1022
|
|
|
|
|
|
|
|
1023
|
|
|
|
|
|
|
} |
1024
|
0
|
|
|
|
|
|
break; |
1025
|
|
|
|
|
|
|
case 'b': |
1026
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_cbc", 11)) { |
1027
|
|
|
|
|
|
|
/* ^ */ |
1028
|
|
|
|
|
|
|
|
1029
|
|
|
|
|
|
|
#ifdef NID_des_cbc |
1030
|
1
|
|
|
|
|
|
return NID_des_cbc; |
1031
|
|
|
|
|
|
|
#else |
1032
|
|
|
|
|
|
|
goto not_there; |
1033
|
|
|
|
|
|
|
#endif |
1034
|
|
|
|
|
|
|
|
1035
|
|
|
|
|
|
|
} |
1036
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc2_cbc", 11)) { |
1037
|
|
|
|
|
|
|
/* ^ */ |
1038
|
|
|
|
|
|
|
|
1039
|
|
|
|
|
|
|
#ifdef NID_rc2_cbc |
1040
|
1
|
|
|
|
|
|
return NID_rc2_cbc; |
1041
|
|
|
|
|
|
|
#else |
1042
|
|
|
|
|
|
|
goto not_there; |
1043
|
|
|
|
|
|
|
#endif |
1044
|
|
|
|
|
|
|
|
1045
|
|
|
|
|
|
|
} |
1046
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rc5_cbc", 11)) { |
1047
|
|
|
|
|
|
|
/* ^ */ |
1048
|
|
|
|
|
|
|
|
1049
|
|
|
|
|
|
|
#ifdef NID_rc5_cbc |
1050
|
1
|
|
|
|
|
|
return NID_rc5_cbc; |
1051
|
|
|
|
|
|
|
#else |
1052
|
|
|
|
|
|
|
goto not_there; |
1053
|
|
|
|
|
|
|
#endif |
1054
|
|
|
|
|
|
|
|
1055
|
|
|
|
|
|
|
} |
1056
|
0
|
|
|
|
|
|
break; |
1057
|
|
|
|
|
|
|
case 'c': |
1058
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_ecb", 11)) { |
1059
|
|
|
|
|
|
|
/* ^ */ |
1060
|
|
|
|
|
|
|
|
1061
|
|
|
|
|
|
|
#ifdef NID_des_ecb |
1062
|
1
|
|
|
|
|
|
return NID_des_ecb; |
1063
|
|
|
|
|
|
|
#else |
1064
|
|
|
|
|
|
|
goto not_there; |
1065
|
|
|
|
|
|
|
#endif |
1066
|
|
|
|
|
|
|
|
1067
|
|
|
|
|
|
|
} |
1068
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc2_ecb", 11)) { |
1069
|
|
|
|
|
|
|
/* ^ */ |
1070
|
|
|
|
|
|
|
|
1071
|
|
|
|
|
|
|
#ifdef NID_rc2_ecb |
1072
|
1
|
|
|
|
|
|
return NID_rc2_ecb; |
1073
|
|
|
|
|
|
|
#else |
1074
|
|
|
|
|
|
|
goto not_there; |
1075
|
|
|
|
|
|
|
#endif |
1076
|
|
|
|
|
|
|
|
1077
|
|
|
|
|
|
|
} |
1078
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rc5_ecb", 11)) { |
1079
|
|
|
|
|
|
|
/* ^ */ |
1080
|
|
|
|
|
|
|
|
1081
|
|
|
|
|
|
|
#ifdef NID_rc5_ecb |
1082
|
1
|
|
|
|
|
|
return NID_rc5_ecb; |
1083
|
|
|
|
|
|
|
#else |
1084
|
|
|
|
|
|
|
goto not_there; |
1085
|
|
|
|
|
|
|
#endif |
1086
|
|
|
|
|
|
|
|
1087
|
|
|
|
|
|
|
} |
1088
|
0
|
|
|
|
|
|
break; |
1089
|
|
|
|
|
|
|
case 'd': |
1090
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede", 11)) { |
1091
|
|
|
|
|
|
|
/* ^ */ |
1092
|
|
|
|
|
|
|
|
1093
|
|
|
|
|
|
|
#ifdef NID_des_ede |
1094
|
|
|
|
|
|
|
return NID_des_ede; |
1095
|
|
|
|
|
|
|
#else |
1096
|
1
|
|
|
|
|
|
goto not_there; |
1097
|
|
|
|
|
|
|
#endif |
1098
|
|
|
|
|
|
|
|
1099
|
|
|
|
|
|
|
} |
1100
|
0
|
|
|
|
|
|
break; |
1101
|
|
|
|
|
|
|
case 'e': |
1102
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ext_req", 11)) { |
1103
|
|
|
|
|
|
|
/* ^ */ |
1104
|
|
|
|
|
|
|
|
1105
|
|
|
|
|
|
|
#ifdef NID_ext_req |
1106
|
1
|
|
|
|
|
|
return NID_ext_req; |
1107
|
|
|
|
|
|
|
#else |
1108
|
|
|
|
|
|
|
goto not_there; |
1109
|
|
|
|
|
|
|
#endif |
1110
|
|
|
|
|
|
|
|
1111
|
|
|
|
|
|
|
} |
1112
|
0
|
|
|
|
|
|
break; |
1113
|
|
|
|
|
|
|
case 'i': |
1114
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_id_pkix", 11)) { |
1115
|
|
|
|
|
|
|
/* ^ */ |
1116
|
|
|
|
|
|
|
|
1117
|
|
|
|
|
|
|
#ifdef NID_id_pkix |
1118
|
1
|
|
|
|
|
|
return NID_id_pkix; |
1119
|
|
|
|
|
|
|
#else |
1120
|
|
|
|
|
|
|
goto not_there; |
1121
|
|
|
|
|
|
|
#endif |
1122
|
|
|
|
|
|
|
|
1123
|
|
|
|
|
|
|
} |
1124
|
0
|
|
|
|
|
|
break; |
1125
|
|
|
|
|
|
|
case 'm': |
1126
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_surname", 11)) { |
1127
|
|
|
|
|
|
|
/* ^ */ |
1128
|
|
|
|
|
|
|
|
1129
|
|
|
|
|
|
|
#ifdef NID_surname |
1130
|
1
|
|
|
|
|
|
return NID_surname; |
1131
|
|
|
|
|
|
|
#else |
1132
|
|
|
|
|
|
|
goto not_there; |
1133
|
|
|
|
|
|
|
#endif |
1134
|
|
|
|
|
|
|
|
1135
|
|
|
|
|
|
|
} |
1136
|
0
|
|
|
|
|
|
break; |
1137
|
|
|
|
|
|
|
case 'r': |
1138
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_x509Crl", 11)) { |
1139
|
|
|
|
|
|
|
/* ^ */ |
1140
|
|
|
|
|
|
|
|
1141
|
|
|
|
|
|
|
#ifdef NID_x509Crl |
1142
|
1
|
|
|
|
|
|
return NID_x509Crl; |
1143
|
|
|
|
|
|
|
#else |
1144
|
|
|
|
|
|
|
goto not_there; |
1145
|
|
|
|
|
|
|
#endif |
1146
|
|
|
|
|
|
|
|
1147
|
|
|
|
|
|
|
} |
1148
|
0
|
|
|
|
|
|
break; |
1149
|
|
|
|
|
|
|
case 'v': |
1150
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OP_NO_SSLv2", 11)) { |
1151
|
|
|
|
|
|
|
/* ^ */ |
1152
|
|
|
|
|
|
|
|
1153
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_SSLv2 |
1154
|
1
|
|
|
|
|
|
return SSL_OP_NO_SSLv2; |
1155
|
|
|
|
|
|
|
#else |
1156
|
|
|
|
|
|
|
goto not_there; |
1157
|
|
|
|
|
|
|
#endif |
1158
|
|
|
|
|
|
|
|
1159
|
|
|
|
|
|
|
} |
1160
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_NO_SSLv3", 11)) { |
1161
|
|
|
|
|
|
|
/* ^ */ |
1162
|
|
|
|
|
|
|
|
1163
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_SSLv3 |
1164
|
1
|
|
|
|
|
|
return SSL_OP_NO_SSLv3; |
1165
|
|
|
|
|
|
|
#else |
1166
|
|
|
|
|
|
|
goto not_there; |
1167
|
|
|
|
|
|
|
#endif |
1168
|
|
|
|
|
|
|
|
1169
|
|
|
|
|
|
|
} |
1170
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_TLSv1", 11)) { |
1171
|
|
|
|
|
|
|
/* ^ */ |
1172
|
|
|
|
|
|
|
|
1173
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_TLSv1 |
1174
|
1
|
|
|
|
|
|
return SSL_OP_NO_TLSv1; |
1175
|
|
|
|
|
|
|
#else |
1176
|
|
|
|
|
|
|
goto not_there; |
1177
|
|
|
|
|
|
|
#endif |
1178
|
|
|
|
|
|
|
|
1179
|
|
|
|
|
|
|
} |
1180
|
0
|
|
|
|
|
|
break; |
1181
|
|
|
|
|
|
|
} |
1182
|
0
|
|
|
|
|
|
break; |
1183
|
|
|
|
|
|
|
case 12: |
1184
|
|
|
|
|
|
|
/* Names all of length 12. */ |
1185
|
|
|
|
|
|
|
/* EVP_PKT_EXCH EVP_PKT_SIGN FILETYPE_PEM F_SSL_SET_FD GEN_EDIPARTY |
1186
|
|
|
|
|
|
|
MBSTRING_ASC MBSTRING_BMP NID_bf_cfb64 NID_bf_ofb64 NID_des_ede3 |
1187
|
|
|
|
|
|
|
NID_desx_cbc NID_idea_cbc NID_idea_ecb NID_initials NID_md5_sha1 |
1188
|
|
|
|
|
|
|
NID_netscape OP_NO_TICKET R_PEER_ERROR R_SHORT_READ SSL2_VERSION |
1189
|
|
|
|
|
|
|
SSL3_VERSION ST_READ_BODY TLS1_VERSION */ |
1190
|
|
|
|
|
|
|
/* Offset 10 gives the best switch position. */ |
1191
|
53
|
|
|
|
|
|
switch (name[10]) { |
1192
|
|
|
|
|
|
|
case '6': |
1193
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_bf_cfb64", 12)) { |
1194
|
|
|
|
|
|
|
/* ^ */ |
1195
|
|
|
|
|
|
|
|
1196
|
|
|
|
|
|
|
#ifdef NID_bf_cfb64 |
1197
|
1
|
|
|
|
|
|
return NID_bf_cfb64; |
1198
|
|
|
|
|
|
|
#else |
1199
|
|
|
|
|
|
|
goto not_there; |
1200
|
|
|
|
|
|
|
#endif |
1201
|
|
|
|
|
|
|
|
1202
|
|
|
|
|
|
|
} |
1203
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_bf_ofb64", 12)) { |
1204
|
|
|
|
|
|
|
/* ^ */ |
1205
|
|
|
|
|
|
|
|
1206
|
|
|
|
|
|
|
#ifdef NID_bf_ofb64 |
1207
|
1
|
|
|
|
|
|
return NID_bf_ofb64; |
1208
|
|
|
|
|
|
|
#else |
1209
|
|
|
|
|
|
|
goto not_there; |
1210
|
|
|
|
|
|
|
#endif |
1211
|
|
|
|
|
|
|
|
1212
|
|
|
|
|
|
|
} |
1213
|
0
|
|
|
|
|
|
break; |
1214
|
|
|
|
|
|
|
case 'A': |
1215
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_SHORT_READ", 12)) { |
1216
|
|
|
|
|
|
|
/* ^ */ |
1217
|
|
|
|
|
|
|
|
1218
|
|
|
|
|
|
|
#ifdef SSL_R_SHORT_READ |
1219
|
1
|
|
|
|
|
|
return SSL_R_SHORT_READ; |
1220
|
|
|
|
|
|
|
#else |
1221
|
|
|
|
|
|
|
goto not_there; |
1222
|
|
|
|
|
|
|
#endif |
1223
|
|
|
|
|
|
|
|
1224
|
|
|
|
|
|
|
} |
1225
|
0
|
|
|
|
|
|
break; |
1226
|
|
|
|
|
|
|
case 'C': |
1227
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PKT_EXCH", 12)) { |
1228
|
|
|
|
|
|
|
/* ^ */ |
1229
|
|
|
|
|
|
|
|
1230
|
|
|
|
|
|
|
#ifdef EVP_PKT_EXCH |
1231
|
1
|
|
|
|
|
|
return EVP_PKT_EXCH; |
1232
|
|
|
|
|
|
|
#else |
1233
|
|
|
|
|
|
|
goto not_there; |
1234
|
|
|
|
|
|
|
#endif |
1235
|
|
|
|
|
|
|
|
1236
|
|
|
|
|
|
|
} |
1237
|
0
|
|
|
|
|
|
break; |
1238
|
|
|
|
|
|
|
case 'D': |
1239
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_READ_BODY", 12)) { |
1240
|
|
|
|
|
|
|
/* ^ */ |
1241
|
|
|
|
|
|
|
|
1242
|
|
|
|
|
|
|
#ifdef SSL_ST_READ_BODY |
1243
|
1
|
|
|
|
|
|
return SSL_ST_READ_BODY; |
1244
|
|
|
|
|
|
|
#else |
1245
|
|
|
|
|
|
|
goto not_there; |
1246
|
|
|
|
|
|
|
#endif |
1247
|
|
|
|
|
|
|
|
1248
|
|
|
|
|
|
|
} |
1249
|
0
|
|
|
|
|
|
break; |
1250
|
|
|
|
|
|
|
case 'E': |
1251
|
19
|
100
|
|
|
|
|
if (!memcmp(name, "FILETYPE_PEM", 12)) { |
1252
|
|
|
|
|
|
|
/* ^ */ |
1253
|
|
|
|
|
|
|
|
1254
|
|
|
|
|
|
|
#ifdef SSL_FILETYPE_PEM |
1255
|
17
|
|
|
|
|
|
return SSL_FILETYPE_PEM; |
1256
|
|
|
|
|
|
|
#else |
1257
|
|
|
|
|
|
|
goto not_there; |
1258
|
|
|
|
|
|
|
#endif |
1259
|
|
|
|
|
|
|
|
1260
|
|
|
|
|
|
|
} |
1261
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_TICKET", 12)) { |
1262
|
|
|
|
|
|
|
/* ^ */ |
1263
|
|
|
|
|
|
|
|
1264
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_TICKET |
1265
|
2
|
|
|
|
|
|
return SSL_OP_NO_TICKET; |
1266
|
|
|
|
|
|
|
#else |
1267
|
|
|
|
|
|
|
goto not_there; |
1268
|
|
|
|
|
|
|
#endif |
1269
|
|
|
|
|
|
|
|
1270
|
|
|
|
|
|
|
} |
1271
|
0
|
|
|
|
|
|
break; |
1272
|
|
|
|
|
|
|
case 'F': |
1273
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_SET_FD", 12)) { |
1274
|
|
|
|
|
|
|
/* ^ */ |
1275
|
|
|
|
|
|
|
|
1276
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_SET_FD |
1277
|
1
|
|
|
|
|
|
return SSL_F_SSL_SET_FD; |
1278
|
|
|
|
|
|
|
#else |
1279
|
|
|
|
|
|
|
goto not_there; |
1280
|
|
|
|
|
|
|
#endif |
1281
|
|
|
|
|
|
|
|
1282
|
|
|
|
|
|
|
} |
1283
|
0
|
|
|
|
|
|
break; |
1284
|
|
|
|
|
|
|
case 'G': |
1285
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PKT_SIGN", 12)) { |
1286
|
|
|
|
|
|
|
/* ^ */ |
1287
|
|
|
|
|
|
|
|
1288
|
|
|
|
|
|
|
#ifdef EVP_PKT_SIGN |
1289
|
2
|
|
|
|
|
|
return EVP_PKT_SIGN; |
1290
|
|
|
|
|
|
|
#else |
1291
|
|
|
|
|
|
|
goto not_there; |
1292
|
|
|
|
|
|
|
#endif |
1293
|
|
|
|
|
|
|
|
1294
|
|
|
|
|
|
|
} |
1295
|
0
|
|
|
|
|
|
break; |
1296
|
|
|
|
|
|
|
case 'M': |
1297
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MBSTRING_BMP", 12)) { |
1298
|
|
|
|
|
|
|
/* ^ */ |
1299
|
|
|
|
|
|
|
|
1300
|
|
|
|
|
|
|
#ifdef MBSTRING_BMP |
1301
|
1
|
|
|
|
|
|
return MBSTRING_BMP; |
1302
|
|
|
|
|
|
|
#else |
1303
|
|
|
|
|
|
|
goto not_there; |
1304
|
|
|
|
|
|
|
#endif |
1305
|
|
|
|
|
|
|
|
1306
|
|
|
|
|
|
|
} |
1307
|
0
|
|
|
|
|
|
break; |
1308
|
|
|
|
|
|
|
case 'O': |
1309
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "R_PEER_ERROR", 12)) { |
1310
|
|
|
|
|
|
|
/* ^ */ |
1311
|
|
|
|
|
|
|
|
1312
|
|
|
|
|
|
|
#ifdef SSL_R_PEER_ERROR |
1313
|
1
|
|
|
|
|
|
return SSL_R_PEER_ERROR; |
1314
|
|
|
|
|
|
|
#else |
1315
|
|
|
|
|
|
|
goto not_there; |
1316
|
|
|
|
|
|
|
#endif |
1317
|
|
|
|
|
|
|
|
1318
|
|
|
|
|
|
|
} |
1319
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "SSL2_VERSION", 12)) { |
1320
|
|
|
|
|
|
|
/* ^ */ |
1321
|
|
|
|
|
|
|
|
1322
|
|
|
|
|
|
|
#ifdef SSL2_VERSION |
1323
|
1
|
|
|
|
|
|
return SSL2_VERSION; |
1324
|
|
|
|
|
|
|
#else |
1325
|
|
|
|
|
|
|
goto not_there; |
1326
|
|
|
|
|
|
|
#endif |
1327
|
|
|
|
|
|
|
|
1328
|
|
|
|
|
|
|
} |
1329
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_VERSION", 12)) { |
1330
|
|
|
|
|
|
|
/* ^ */ |
1331
|
|
|
|
|
|
|
|
1332
|
|
|
|
|
|
|
#ifdef SSL3_VERSION |
1333
|
1
|
|
|
|
|
|
return SSL3_VERSION; |
1334
|
|
|
|
|
|
|
#else |
1335
|
|
|
|
|
|
|
goto not_there; |
1336
|
|
|
|
|
|
|
#endif |
1337
|
|
|
|
|
|
|
|
1338
|
|
|
|
|
|
|
} |
1339
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "TLS1_VERSION", 12)) { |
1340
|
|
|
|
|
|
|
/* ^ */ |
1341
|
|
|
|
|
|
|
|
1342
|
|
|
|
|
|
|
#ifdef TLS1_VERSION |
1343
|
1
|
|
|
|
|
|
return TLS1_VERSION; |
1344
|
|
|
|
|
|
|
#else |
1345
|
|
|
|
|
|
|
goto not_there; |
1346
|
|
|
|
|
|
|
#endif |
1347
|
|
|
|
|
|
|
|
1348
|
|
|
|
|
|
|
} |
1349
|
0
|
|
|
|
|
|
break; |
1350
|
|
|
|
|
|
|
case 'S': |
1351
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "MBSTRING_ASC", 12)) { |
1352
|
|
|
|
|
|
|
/* ^ */ |
1353
|
|
|
|
|
|
|
|
1354
|
|
|
|
|
|
|
#ifdef MBSTRING_ASC |
1355
|
2
|
|
|
|
|
|
return MBSTRING_ASC; |
1356
|
|
|
|
|
|
|
#else |
1357
|
|
|
|
|
|
|
goto not_there; |
1358
|
|
|
|
|
|
|
#endif |
1359
|
|
|
|
|
|
|
|
1360
|
|
|
|
|
|
|
} |
1361
|
0
|
|
|
|
|
|
break; |
1362
|
|
|
|
|
|
|
case 'T': |
1363
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_EDIPARTY", 12)) { |
1364
|
|
|
|
|
|
|
/* ^ */ |
1365
|
|
|
|
|
|
|
|
1366
|
|
|
|
|
|
|
#ifdef GEN_EDIPARTY |
1367
|
1
|
|
|
|
|
|
return GEN_EDIPARTY; |
1368
|
|
|
|
|
|
|
#else |
1369
|
|
|
|
|
|
|
goto not_there; |
1370
|
|
|
|
|
|
|
#endif |
1371
|
|
|
|
|
|
|
|
1372
|
|
|
|
|
|
|
} |
1373
|
0
|
|
|
|
|
|
break; |
1374
|
|
|
|
|
|
|
case 'a': |
1375
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_md5_sha1", 12)) { |
1376
|
|
|
|
|
|
|
/* ^ */ |
1377
|
|
|
|
|
|
|
|
1378
|
|
|
|
|
|
|
#ifdef NID_md5_sha1 |
1379
|
1
|
|
|
|
|
|
return NID_md5_sha1; |
1380
|
|
|
|
|
|
|
#else |
1381
|
|
|
|
|
|
|
goto not_there; |
1382
|
|
|
|
|
|
|
#endif |
1383
|
|
|
|
|
|
|
|
1384
|
|
|
|
|
|
|
} |
1385
|
0
|
|
|
|
|
|
break; |
1386
|
|
|
|
|
|
|
case 'b': |
1387
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_desx_cbc", 12)) { |
1388
|
|
|
|
|
|
|
/* ^ */ |
1389
|
|
|
|
|
|
|
|
1390
|
|
|
|
|
|
|
#ifdef NID_desx_cbc |
1391
|
1
|
|
|
|
|
|
return NID_desx_cbc; |
1392
|
|
|
|
|
|
|
#else |
1393
|
|
|
|
|
|
|
goto not_there; |
1394
|
|
|
|
|
|
|
#endif |
1395
|
|
|
|
|
|
|
|
1396
|
|
|
|
|
|
|
} |
1397
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_idea_cbc", 12)) { |
1398
|
|
|
|
|
|
|
/* ^ */ |
1399
|
|
|
|
|
|
|
|
1400
|
|
|
|
|
|
|
#ifdef NID_idea_cbc |
1401
|
1
|
|
|
|
|
|
return NID_idea_cbc; |
1402
|
|
|
|
|
|
|
#else |
1403
|
|
|
|
|
|
|
goto not_there; |
1404
|
|
|
|
|
|
|
#endif |
1405
|
|
|
|
|
|
|
|
1406
|
|
|
|
|
|
|
} |
1407
|
0
|
|
|
|
|
|
break; |
1408
|
|
|
|
|
|
|
case 'c': |
1409
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_idea_ecb", 12)) { |
1410
|
|
|
|
|
|
|
/* ^ */ |
1411
|
|
|
|
|
|
|
|
1412
|
|
|
|
|
|
|
#ifdef NID_idea_ecb |
1413
|
1
|
|
|
|
|
|
return NID_idea_ecb; |
1414
|
|
|
|
|
|
|
#else |
1415
|
|
|
|
|
|
|
goto not_there; |
1416
|
|
|
|
|
|
|
#endif |
1417
|
|
|
|
|
|
|
|
1418
|
|
|
|
|
|
|
} |
1419
|
0
|
|
|
|
|
|
break; |
1420
|
|
|
|
|
|
|
case 'e': |
1421
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede3", 12)) { |
1422
|
|
|
|
|
|
|
/* ^ */ |
1423
|
|
|
|
|
|
|
|
1424
|
|
|
|
|
|
|
#ifdef NID_des_ede3 |
1425
|
|
|
|
|
|
|
return NID_des_ede3; |
1426
|
|
|
|
|
|
|
#else |
1427
|
1
|
|
|
|
|
|
goto not_there; |
1428
|
|
|
|
|
|
|
#endif |
1429
|
|
|
|
|
|
|
|
1430
|
|
|
|
|
|
|
} |
1431
|
0
|
|
|
|
|
|
break; |
1432
|
|
|
|
|
|
|
case 'l': |
1433
|
11
|
100
|
|
|
|
|
if (!memcmp(name, "NID_initials", 12)) { |
1434
|
|
|
|
|
|
|
/* ^ */ |
1435
|
|
|
|
|
|
|
|
1436
|
|
|
|
|
|
|
#ifdef NID_initials |
1437
|
1
|
|
|
|
|
|
return NID_initials; |
1438
|
|
|
|
|
|
|
#else |
1439
|
|
|
|
|
|
|
goto not_there; |
1440
|
|
|
|
|
|
|
#endif |
1441
|
|
|
|
|
|
|
|
1442
|
|
|
|
|
|
|
} |
1443
|
10
|
|
|
|
|
|
break; |
1444
|
|
|
|
|
|
|
case 'p': |
1445
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape", 12)) { |
1446
|
|
|
|
|
|
|
/* ^ */ |
1447
|
|
|
|
|
|
|
|
1448
|
|
|
|
|
|
|
#ifdef NID_netscape |
1449
|
1
|
|
|
|
|
|
return NID_netscape; |
1450
|
|
|
|
|
|
|
#else |
1451
|
|
|
|
|
|
|
goto not_there; |
1452
|
|
|
|
|
|
|
#endif |
1453
|
|
|
|
|
|
|
|
1454
|
|
|
|
|
|
|
} |
1455
|
0
|
|
|
|
|
|
break; |
1456
|
|
|
|
|
|
|
} |
1457
|
11
|
|
|
|
|
|
break; |
1458
|
|
|
|
|
|
|
case 13: |
1459
|
|
|
|
|
|
|
/* Names all of length 13. */ |
1460
|
|
|
|
|
|
|
/* CB_READ_ALERT ERROR_SYSCALL FILETYPE_ASN1 F_SSL_SET_RFD F_SSL_SET_WFD |
1461
|
|
|
|
|
|
|
GEN_OTHERNAME MBSTRING_FLAG MBSTRING_UNIV MBSTRING_UTF8 NID_OCSP_sign |
1462
|
|
|
|
|
|
|
NID_algorithm NID_cast5_cbc NID_cast5_ecb NID_code_sign NID_delta_crl |
1463
|
|
|
|
|
|
|
NID_des_cfb64 NID_des_ofb64 NID_givenName NID_id_pbkdf2 NID_id_qt_cps |
1464
|
|
|
|
|
|
|
NID_key_usage NID_rc2_cfb64 NID_rc2_ofb64 NID_rc5_cfb64 NID_rc5_ofb64 |
1465
|
|
|
|
|
|
|
NID_ripemd160 NID_secretBag OP_NO_TLSv1_1 OP_NO_TLSv1_2 OP_NO_TLSv1_3 |
1466
|
|
|
|
|
|
|
OP_TLS_D5_BUG SENT_SHUTDOWN SSL2_MT_ERROR SSL3_RT_ALERT SSLEAY_CFLAGS |
1467
|
|
|
|
|
|
|
XN_FLAG_FN_LN XN_FLAG_FN_SN */ |
1468
|
|
|
|
|
|
|
/* Offset 12 gives the best switch position. */ |
1469
|
55
|
|
|
|
|
|
switch (name[12]) { |
1470
|
|
|
|
|
|
|
case '0': |
1471
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ripemd16", 12)) { |
1472
|
|
|
|
|
|
|
/* 0 */ |
1473
|
|
|
|
|
|
|
|
1474
|
|
|
|
|
|
|
#ifdef NID_ripemd160 |
1475
|
1
|
|
|
|
|
|
return NID_ripemd160; |
1476
|
|
|
|
|
|
|
#else |
1477
|
|
|
|
|
|
|
goto not_there; |
1478
|
|
|
|
|
|
|
#endif |
1479
|
|
|
|
|
|
|
|
1480
|
|
|
|
|
|
|
} |
1481
|
0
|
|
|
|
|
|
break; |
1482
|
|
|
|
|
|
|
case '1': |
1483
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "FILETYPE_ASN", 12)) { |
1484
|
|
|
|
|
|
|
/* 1 */ |
1485
|
|
|
|
|
|
|
|
1486
|
|
|
|
|
|
|
#ifdef SSL_FILETYPE_ASN1 |
1487
|
1
|
|
|
|
|
|
return SSL_FILETYPE_ASN1; |
1488
|
|
|
|
|
|
|
#else |
1489
|
|
|
|
|
|
|
goto not_there; |
1490
|
|
|
|
|
|
|
#endif |
1491
|
|
|
|
|
|
|
|
1492
|
|
|
|
|
|
|
} |
1493
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_TLSv1_", 12)) { |
1494
|
|
|
|
|
|
|
/* 1 */ |
1495
|
|
|
|
|
|
|
|
1496
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_TLSv1_1 |
1497
|
1
|
|
|
|
|
|
return SSL_OP_NO_TLSv1_1; |
1498
|
|
|
|
|
|
|
#else |
1499
|
|
|
|
|
|
|
goto not_there; |
1500
|
|
|
|
|
|
|
#endif |
1501
|
|
|
|
|
|
|
|
1502
|
|
|
|
|
|
|
} |
1503
|
0
|
|
|
|
|
|
break; |
1504
|
|
|
|
|
|
|
case '2': |
1505
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_id_pbkdf", 12)) { |
1506
|
|
|
|
|
|
|
/* 2 */ |
1507
|
|
|
|
|
|
|
|
1508
|
|
|
|
|
|
|
#ifdef NID_id_pbkdf2 |
1509
|
1
|
|
|
|
|
|
return NID_id_pbkdf2; |
1510
|
|
|
|
|
|
|
#else |
1511
|
|
|
|
|
|
|
goto not_there; |
1512
|
|
|
|
|
|
|
#endif |
1513
|
|
|
|
|
|
|
|
1514
|
|
|
|
|
|
|
} |
1515
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_TLSv1_", 12)) { |
1516
|
|
|
|
|
|
|
/* 2 */ |
1517
|
|
|
|
|
|
|
|
1518
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_TLSv1_2 |
1519
|
1
|
|
|
|
|
|
return SSL_OP_NO_TLSv1_2; |
1520
|
|
|
|
|
|
|
#else |
1521
|
|
|
|
|
|
|
goto not_there; |
1522
|
|
|
|
|
|
|
#endif |
1523
|
|
|
|
|
|
|
|
1524
|
|
|
|
|
|
|
} |
1525
|
0
|
|
|
|
|
|
break; |
1526
|
|
|
|
|
|
|
case '3': |
1527
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_TLSv1_", 12)) { |
1528
|
|
|
|
|
|
|
/* 3 */ |
1529
|
|
|
|
|
|
|
|
1530
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_TLSv1_3 |
1531
|
|
|
|
|
|
|
return SSL_OP_NO_TLSv1_3; |
1532
|
|
|
|
|
|
|
#else |
1533
|
1
|
|
|
|
|
|
goto not_there; |
1534
|
|
|
|
|
|
|
#endif |
1535
|
|
|
|
|
|
|
|
1536
|
|
|
|
|
|
|
} |
1537
|
0
|
|
|
|
|
|
break; |
1538
|
|
|
|
|
|
|
case '4': |
1539
|
6
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_cfb6", 12)) { |
1540
|
|
|
|
|
|
|
/* 4 */ |
1541
|
|
|
|
|
|
|
|
1542
|
|
|
|
|
|
|
#ifdef NID_des_cfb64 |
1543
|
1
|
|
|
|
|
|
return NID_des_cfb64; |
1544
|
|
|
|
|
|
|
#else |
1545
|
|
|
|
|
|
|
goto not_there; |
1546
|
|
|
|
|
|
|
#endif |
1547
|
|
|
|
|
|
|
|
1548
|
|
|
|
|
|
|
} |
1549
|
5
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_ofb6", 12)) { |
1550
|
|
|
|
|
|
|
/* 4 */ |
1551
|
|
|
|
|
|
|
|
1552
|
|
|
|
|
|
|
#ifdef NID_des_ofb64 |
1553
|
1
|
|
|
|
|
|
return NID_des_ofb64; |
1554
|
|
|
|
|
|
|
#else |
1555
|
|
|
|
|
|
|
goto not_there; |
1556
|
|
|
|
|
|
|
#endif |
1557
|
|
|
|
|
|
|
|
1558
|
|
|
|
|
|
|
} |
1559
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc2_cfb6", 12)) { |
1560
|
|
|
|
|
|
|
/* 4 */ |
1561
|
|
|
|
|
|
|
|
1562
|
|
|
|
|
|
|
#ifdef NID_rc2_cfb64 |
1563
|
1
|
|
|
|
|
|
return NID_rc2_cfb64; |
1564
|
|
|
|
|
|
|
#else |
1565
|
|
|
|
|
|
|
goto not_there; |
1566
|
|
|
|
|
|
|
#endif |
1567
|
|
|
|
|
|
|
|
1568
|
|
|
|
|
|
|
} |
1569
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc2_ofb6", 12)) { |
1570
|
|
|
|
|
|
|
/* 4 */ |
1571
|
|
|
|
|
|
|
|
1572
|
|
|
|
|
|
|
#ifdef NID_rc2_ofb64 |
1573
|
1
|
|
|
|
|
|
return NID_rc2_ofb64; |
1574
|
|
|
|
|
|
|
#else |
1575
|
|
|
|
|
|
|
goto not_there; |
1576
|
|
|
|
|
|
|
#endif |
1577
|
|
|
|
|
|
|
|
1578
|
|
|
|
|
|
|
} |
1579
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc5_cfb6", 12)) { |
1580
|
|
|
|
|
|
|
/* 4 */ |
1581
|
|
|
|
|
|
|
|
1582
|
|
|
|
|
|
|
#ifdef NID_rc5_cfb64 |
1583
|
1
|
|
|
|
|
|
return NID_rc5_cfb64; |
1584
|
|
|
|
|
|
|
#else |
1585
|
|
|
|
|
|
|
goto not_there; |
1586
|
|
|
|
|
|
|
#endif |
1587
|
|
|
|
|
|
|
|
1588
|
|
|
|
|
|
|
} |
1589
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rc5_ofb6", 12)) { |
1590
|
|
|
|
|
|
|
/* 4 */ |
1591
|
|
|
|
|
|
|
|
1592
|
|
|
|
|
|
|
#ifdef NID_rc5_ofb64 |
1593
|
1
|
|
|
|
|
|
return NID_rc5_ofb64; |
1594
|
|
|
|
|
|
|
#else |
1595
|
|
|
|
|
|
|
goto not_there; |
1596
|
|
|
|
|
|
|
#endif |
1597
|
|
|
|
|
|
|
|
1598
|
|
|
|
|
|
|
} |
1599
|
0
|
|
|
|
|
|
break; |
1600
|
|
|
|
|
|
|
case '8': |
1601
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "MBSTRING_UTF", 12)) { |
1602
|
|
|
|
|
|
|
/* 8 */ |
1603
|
|
|
|
|
|
|
|
1604
|
|
|
|
|
|
|
#ifdef MBSTRING_UTF8 |
1605
|
2
|
|
|
|
|
|
return MBSTRING_UTF8; |
1606
|
|
|
|
|
|
|
#else |
1607
|
|
|
|
|
|
|
goto not_there; |
1608
|
|
|
|
|
|
|
#endif |
1609
|
|
|
|
|
|
|
|
1610
|
|
|
|
|
|
|
} |
1611
|
0
|
|
|
|
|
|
break; |
1612
|
|
|
|
|
|
|
case 'D': |
1613
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_SET_RF", 12)) { |
1614
|
|
|
|
|
|
|
/* D */ |
1615
|
|
|
|
|
|
|
|
1616
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_SET_RFD |
1617
|
1
|
|
|
|
|
|
return SSL_F_SSL_SET_RFD; |
1618
|
|
|
|
|
|
|
#else |
1619
|
|
|
|
|
|
|
goto not_there; |
1620
|
|
|
|
|
|
|
#endif |
1621
|
|
|
|
|
|
|
|
1622
|
|
|
|
|
|
|
} |
1623
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_SET_WF", 12)) { |
1624
|
|
|
|
|
|
|
/* D */ |
1625
|
|
|
|
|
|
|
|
1626
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_SET_WFD |
1627
|
1
|
|
|
|
|
|
return SSL_F_SSL_SET_WFD; |
1628
|
|
|
|
|
|
|
#else |
1629
|
|
|
|
|
|
|
goto not_there; |
1630
|
|
|
|
|
|
|
#endif |
1631
|
|
|
|
|
|
|
|
1632
|
|
|
|
|
|
|
} |
1633
|
0
|
|
|
|
|
|
break; |
1634
|
|
|
|
|
|
|
case 'E': |
1635
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_OTHERNAM", 12)) { |
1636
|
|
|
|
|
|
|
/* E */ |
1637
|
|
|
|
|
|
|
|
1638
|
|
|
|
|
|
|
#ifdef GEN_OTHERNAME |
1639
|
2
|
|
|
|
|
|
return GEN_OTHERNAME; |
1640
|
|
|
|
|
|
|
#else |
1641
|
|
|
|
|
|
|
goto not_there; |
1642
|
|
|
|
|
|
|
#endif |
1643
|
|
|
|
|
|
|
|
1644
|
|
|
|
|
|
|
} |
1645
|
0
|
|
|
|
|
|
break; |
1646
|
|
|
|
|
|
|
case 'G': |
1647
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "MBSTRING_FLA", 12)) { |
1648
|
|
|
|
|
|
|
/* G */ |
1649
|
|
|
|
|
|
|
|
1650
|
|
|
|
|
|
|
#ifdef MBSTRING_FLAG |
1651
|
1
|
|
|
|
|
|
return MBSTRING_FLAG; |
1652
|
|
|
|
|
|
|
#else |
1653
|
|
|
|
|
|
|
goto not_there; |
1654
|
|
|
|
|
|
|
#endif |
1655
|
|
|
|
|
|
|
|
1656
|
|
|
|
|
|
|
} |
1657
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_TLS_D5_BU", 12)) { |
1658
|
|
|
|
|
|
|
/* G */ |
1659
|
|
|
|
|
|
|
|
1660
|
|
|
|
|
|
|
#ifdef SSL_OP_TLS_D5_BUG |
1661
|
1
|
|
|
|
|
|
return SSL_OP_TLS_D5_BUG; |
1662
|
|
|
|
|
|
|
#else |
1663
|
|
|
|
|
|
|
goto not_there; |
1664
|
|
|
|
|
|
|
#endif |
1665
|
|
|
|
|
|
|
|
1666
|
|
|
|
|
|
|
} |
1667
|
0
|
|
|
|
|
|
break; |
1668
|
|
|
|
|
|
|
case 'L': |
1669
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_SYSCAL", 12)) { |
1670
|
|
|
|
|
|
|
/* L */ |
1671
|
|
|
|
|
|
|
|
1672
|
|
|
|
|
|
|
#ifdef SSL_ERROR_SYSCALL |
1673
|
2
|
|
|
|
|
|
return SSL_ERROR_SYSCALL; |
1674
|
|
|
|
|
|
|
#else |
1675
|
|
|
|
|
|
|
goto not_there; |
1676
|
|
|
|
|
|
|
#endif |
1677
|
|
|
|
|
|
|
|
1678
|
|
|
|
|
|
|
} |
1679
|
0
|
|
|
|
|
|
break; |
1680
|
|
|
|
|
|
|
case 'N': |
1681
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "SENT_SHUTDOW", 12)) { |
1682
|
|
|
|
|
|
|
/* N */ |
1683
|
|
|
|
|
|
|
|
1684
|
|
|
|
|
|
|
#ifdef SSL_SENT_SHUTDOWN |
1685
|
1
|
|
|
|
|
|
return SSL_SENT_SHUTDOWN; |
1686
|
|
|
|
|
|
|
#else |
1687
|
|
|
|
|
|
|
goto not_there; |
1688
|
|
|
|
|
|
|
#endif |
1689
|
|
|
|
|
|
|
|
1690
|
|
|
|
|
|
|
} |
1691
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_L", 12)) { |
1692
|
|
|
|
|
|
|
/* N */ |
1693
|
|
|
|
|
|
|
|
1694
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_LN |
1695
|
1
|
|
|
|
|
|
return XN_FLAG_FN_LN; |
1696
|
|
|
|
|
|
|
#else |
1697
|
|
|
|
|
|
|
goto not_there; |
1698
|
|
|
|
|
|
|
#endif |
1699
|
|
|
|
|
|
|
|
1700
|
|
|
|
|
|
|
} |
1701
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_S", 12)) { |
1702
|
|
|
|
|
|
|
/* N */ |
1703
|
|
|
|
|
|
|
|
1704
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_SN |
1705
|
1
|
|
|
|
|
|
return XN_FLAG_FN_SN; |
1706
|
|
|
|
|
|
|
#else |
1707
|
|
|
|
|
|
|
goto not_there; |
1708
|
|
|
|
|
|
|
#endif |
1709
|
|
|
|
|
|
|
|
1710
|
|
|
|
|
|
|
} |
1711
|
0
|
|
|
|
|
|
break; |
1712
|
|
|
|
|
|
|
case 'R': |
1713
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_ERRO", 12)) { |
1714
|
|
|
|
|
|
|
/* R */ |
1715
|
|
|
|
|
|
|
|
1716
|
|
|
|
|
|
|
#ifdef SSL2_MT_ERROR |
1717
|
1
|
|
|
|
|
|
return SSL2_MT_ERROR; |
1718
|
|
|
|
|
|
|
#else |
1719
|
|
|
|
|
|
|
goto not_there; |
1720
|
|
|
|
|
|
|
#endif |
1721
|
|
|
|
|
|
|
|
1722
|
|
|
|
|
|
|
} |
1723
|
0
|
|
|
|
|
|
break; |
1724
|
|
|
|
|
|
|
case 'S': |
1725
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SSLEAY_CFLAG", 12)) { |
1726
|
|
|
|
|
|
|
/* S */ |
1727
|
|
|
|
|
|
|
|
1728
|
|
|
|
|
|
|
#ifdef SSLEAY_CFLAGS |
1729
|
2
|
|
|
|
|
|
return SSLEAY_CFLAGS; |
1730
|
|
|
|
|
|
|
#else |
1731
|
|
|
|
|
|
|
goto not_there; |
1732
|
|
|
|
|
|
|
#endif |
1733
|
|
|
|
|
|
|
|
1734
|
|
|
|
|
|
|
} |
1735
|
0
|
|
|
|
|
|
break; |
1736
|
|
|
|
|
|
|
case 'T': |
1737
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "CB_READ_ALER", 12)) { |
1738
|
|
|
|
|
|
|
/* T */ |
1739
|
|
|
|
|
|
|
|
1740
|
|
|
|
|
|
|
#ifdef SSL_CB_READ_ALERT |
1741
|
2
|
|
|
|
|
|
return SSL_CB_READ_ALERT; |
1742
|
|
|
|
|
|
|
#else |
1743
|
|
|
|
|
|
|
goto not_there; |
1744
|
|
|
|
|
|
|
#endif |
1745
|
|
|
|
|
|
|
|
1746
|
|
|
|
|
|
|
} |
1747
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_ALER", 12)) { |
1748
|
|
|
|
|
|
|
/* T */ |
1749
|
|
|
|
|
|
|
|
1750
|
|
|
|
|
|
|
#ifdef SSL3_RT_ALERT |
1751
|
1
|
|
|
|
|
|
return SSL3_RT_ALERT; |
1752
|
|
|
|
|
|
|
#else |
1753
|
|
|
|
|
|
|
goto not_there; |
1754
|
|
|
|
|
|
|
#endif |
1755
|
|
|
|
|
|
|
|
1756
|
|
|
|
|
|
|
} |
1757
|
0
|
|
|
|
|
|
break; |
1758
|
|
|
|
|
|
|
case 'V': |
1759
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MBSTRING_UNI", 12)) { |
1760
|
|
|
|
|
|
|
/* V */ |
1761
|
|
|
|
|
|
|
|
1762
|
|
|
|
|
|
|
#ifdef MBSTRING_UNIV |
1763
|
1
|
|
|
|
|
|
return MBSTRING_UNIV; |
1764
|
|
|
|
|
|
|
#else |
1765
|
|
|
|
|
|
|
goto not_there; |
1766
|
|
|
|
|
|
|
#endif |
1767
|
|
|
|
|
|
|
|
1768
|
|
|
|
|
|
|
} |
1769
|
0
|
|
|
|
|
|
break; |
1770
|
|
|
|
|
|
|
case 'b': |
1771
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_cast5_ec", 12)) { |
1772
|
|
|
|
|
|
|
/* b */ |
1773
|
|
|
|
|
|
|
|
1774
|
|
|
|
|
|
|
#ifdef NID_cast5_ecb |
1775
|
1
|
|
|
|
|
|
return NID_cast5_ecb; |
1776
|
|
|
|
|
|
|
#else |
1777
|
|
|
|
|
|
|
goto not_there; |
1778
|
|
|
|
|
|
|
#endif |
1779
|
|
|
|
|
|
|
|
1780
|
|
|
|
|
|
|
} |
1781
|
0
|
|
|
|
|
|
break; |
1782
|
|
|
|
|
|
|
case 'c': |
1783
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_cast5_cb", 12)) { |
1784
|
|
|
|
|
|
|
/* c */ |
1785
|
|
|
|
|
|
|
|
1786
|
|
|
|
|
|
|
#ifdef NID_cast5_cbc |
1787
|
1
|
|
|
|
|
|
return NID_cast5_cbc; |
1788
|
|
|
|
|
|
|
#else |
1789
|
|
|
|
|
|
|
goto not_there; |
1790
|
|
|
|
|
|
|
#endif |
1791
|
|
|
|
|
|
|
|
1792
|
|
|
|
|
|
|
} |
1793
|
0
|
|
|
|
|
|
break; |
1794
|
|
|
|
|
|
|
case 'e': |
1795
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_givenNam", 12)) { |
1796
|
|
|
|
|
|
|
/* e */ |
1797
|
|
|
|
|
|
|
|
1798
|
|
|
|
|
|
|
#ifdef NID_givenName |
1799
|
1
|
|
|
|
|
|
return NID_givenName; |
1800
|
|
|
|
|
|
|
#else |
1801
|
|
|
|
|
|
|
goto not_there; |
1802
|
|
|
|
|
|
|
#endif |
1803
|
|
|
|
|
|
|
|
1804
|
|
|
|
|
|
|
} |
1805
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_key_usag", 12)) { |
1806
|
|
|
|
|
|
|
/* e */ |
1807
|
|
|
|
|
|
|
|
1808
|
|
|
|
|
|
|
#ifdef NID_key_usage |
1809
|
2
|
|
|
|
|
|
return NID_key_usage; |
1810
|
|
|
|
|
|
|
#else |
1811
|
|
|
|
|
|
|
goto not_there; |
1812
|
|
|
|
|
|
|
#endif |
1813
|
|
|
|
|
|
|
|
1814
|
|
|
|
|
|
|
} |
1815
|
0
|
|
|
|
|
|
break; |
1816
|
|
|
|
|
|
|
case 'g': |
1817
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_secretBa", 12)) { |
1818
|
|
|
|
|
|
|
/* g */ |
1819
|
|
|
|
|
|
|
|
1820
|
|
|
|
|
|
|
#ifdef NID_secretBag |
1821
|
1
|
|
|
|
|
|
return NID_secretBag; |
1822
|
|
|
|
|
|
|
#else |
1823
|
|
|
|
|
|
|
goto not_there; |
1824
|
|
|
|
|
|
|
#endif |
1825
|
|
|
|
|
|
|
|
1826
|
|
|
|
|
|
|
} |
1827
|
0
|
|
|
|
|
|
break; |
1828
|
|
|
|
|
|
|
case 'l': |
1829
|
13
|
100
|
|
|
|
|
if (!memcmp(name, "NID_delta_cr", 12)) { |
1830
|
|
|
|
|
|
|
/* l */ |
1831
|
|
|
|
|
|
|
|
1832
|
|
|
|
|
|
|
#ifdef NID_delta_crl |
1833
|
1
|
|
|
|
|
|
return NID_delta_crl; |
1834
|
|
|
|
|
|
|
#else |
1835
|
|
|
|
|
|
|
goto not_there; |
1836
|
|
|
|
|
|
|
#endif |
1837
|
|
|
|
|
|
|
|
1838
|
|
|
|
|
|
|
} |
1839
|
12
|
|
|
|
|
|
break; |
1840
|
|
|
|
|
|
|
case 'm': |
1841
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_algorith", 12)) { |
1842
|
|
|
|
|
|
|
/* m */ |
1843
|
|
|
|
|
|
|
|
1844
|
|
|
|
|
|
|
#ifdef NID_algorithm |
1845
|
1
|
|
|
|
|
|
return NID_algorithm; |
1846
|
|
|
|
|
|
|
#else |
1847
|
|
|
|
|
|
|
goto not_there; |
1848
|
|
|
|
|
|
|
#endif |
1849
|
|
|
|
|
|
|
|
1850
|
|
|
|
|
|
|
} |
1851
|
0
|
|
|
|
|
|
break; |
1852
|
|
|
|
|
|
|
case 'n': |
1853
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_OCSP_sig", 12)) { |
1854
|
|
|
|
|
|
|
/* n */ |
1855
|
|
|
|
|
|
|
|
1856
|
|
|
|
|
|
|
#ifdef NID_OCSP_sign |
1857
|
1
|
|
|
|
|
|
return NID_OCSP_sign; |
1858
|
|
|
|
|
|
|
#else |
1859
|
|
|
|
|
|
|
goto not_there; |
1860
|
|
|
|
|
|
|
#endif |
1861
|
|
|
|
|
|
|
|
1862
|
|
|
|
|
|
|
} |
1863
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_code_sig", 12)) { |
1864
|
|
|
|
|
|
|
/* n */ |
1865
|
|
|
|
|
|
|
|
1866
|
|
|
|
|
|
|
#ifdef NID_code_sign |
1867
|
1
|
|
|
|
|
|
return NID_code_sign; |
1868
|
|
|
|
|
|
|
#else |
1869
|
|
|
|
|
|
|
goto not_there; |
1870
|
|
|
|
|
|
|
#endif |
1871
|
|
|
|
|
|
|
|
1872
|
|
|
|
|
|
|
} |
1873
|
0
|
|
|
|
|
|
break; |
1874
|
|
|
|
|
|
|
case 's': |
1875
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_id_qt_cp", 12)) { |
1876
|
|
|
|
|
|
|
/* s */ |
1877
|
|
|
|
|
|
|
|
1878
|
|
|
|
|
|
|
#ifdef NID_id_qt_cps |
1879
|
1
|
|
|
|
|
|
return NID_id_qt_cps; |
1880
|
|
|
|
|
|
|
#else |
1881
|
|
|
|
|
|
|
goto not_there; |
1882
|
|
|
|
|
|
|
#endif |
1883
|
|
|
|
|
|
|
|
1884
|
|
|
|
|
|
|
} |
1885
|
0
|
|
|
|
|
|
break; |
1886
|
|
|
|
|
|
|
} |
1887
|
12
|
|
|
|
|
|
break; |
1888
|
|
|
|
|
|
|
case 14: |
1889
|
|
|
|
|
|
|
/* Names all of length 14. */ |
1890
|
|
|
|
|
|
|
/* CB_ACCEPT_EXIT CB_ACCEPT_LOOP CB_WRITE_ALERT F_CLIENT_HELLO |
1891
|
|
|
|
|
|
|
F_SERVER_HELLO F_SSL_CERT_NEW NID_commonName NID_crl_number |
1892
|
|
|
|
|
|
|
NID_crl_reason NID_dsaWithSHA NID_idea_cfb64 NID_idea_ofb64 |
1893
|
|
|
|
|
|
|
NID_localKeyID NID_md5WithRSA NID_ms_ext_req NID_pkcs7_data |
1894
|
|
|
|
|
|
|
NID_rc2_40_cbc NID_rc2_64_cbc NID_time_stamp OPENSSL_CFLAGS |
1895
|
|
|
|
|
|
|
OP_NO_SSL_MASK R_BAD_CHECKSUM R_NO_PUBLICKEY R_NULL_SSL_CTX |
1896
|
|
|
|
|
|
|
SESS_CACHE_OFF SSL3_RT_HEADER SSLEAY_VERSION ST_READ_HEADER |
1897
|
|
|
|
|
|
|
TLS1_1_VERSION TLS1_2_VERSION TLS1_3_VERSION X509_TRUST_TSA |
1898
|
|
|
|
|
|
|
XN_FLAG_COMPAT XN_FLAG_DN_REV XN_FLAG_FN_OID XN_FLAG_SPC_EQ */ |
1899
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
1900
|
86
|
|
|
|
|
|
switch (name[13]) { |
1901
|
|
|
|
|
|
|
case '4': |
1902
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_idea_cfb6", 13)) { |
1903
|
|
|
|
|
|
|
/* 4 */ |
1904
|
|
|
|
|
|
|
|
1905
|
|
|
|
|
|
|
#ifdef NID_idea_cfb64 |
1906
|
1
|
|
|
|
|
|
return NID_idea_cfb64; |
1907
|
|
|
|
|
|
|
#else |
1908
|
|
|
|
|
|
|
goto not_there; |
1909
|
|
|
|
|
|
|
#endif |
1910
|
|
|
|
|
|
|
|
1911
|
|
|
|
|
|
|
} |
1912
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_idea_ofb6", 13)) { |
1913
|
|
|
|
|
|
|
/* 4 */ |
1914
|
|
|
|
|
|
|
|
1915
|
|
|
|
|
|
|
#ifdef NID_idea_ofb64 |
1916
|
1
|
|
|
|
|
|
return NID_idea_ofb64; |
1917
|
|
|
|
|
|
|
#else |
1918
|
|
|
|
|
|
|
goto not_there; |
1919
|
|
|
|
|
|
|
#endif |
1920
|
|
|
|
|
|
|
|
1921
|
|
|
|
|
|
|
} |
1922
|
0
|
|
|
|
|
|
break; |
1923
|
|
|
|
|
|
|
case 'A': |
1924
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_dsaWithSH", 13)) { |
1925
|
|
|
|
|
|
|
/* A */ |
1926
|
|
|
|
|
|
|
|
1927
|
|
|
|
|
|
|
#ifdef NID_dsaWithSHA |
1928
|
1
|
|
|
|
|
|
return NID_dsaWithSHA; |
1929
|
|
|
|
|
|
|
#else |
1930
|
|
|
|
|
|
|
goto not_there; |
1931
|
|
|
|
|
|
|
#endif |
1932
|
|
|
|
|
|
|
|
1933
|
|
|
|
|
|
|
} |
1934
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_md5WithRS", 13)) { |
1935
|
|
|
|
|
|
|
/* A */ |
1936
|
|
|
|
|
|
|
|
1937
|
|
|
|
|
|
|
#ifdef NID_md5WithRSA |
1938
|
1
|
|
|
|
|
|
return NID_md5WithRSA; |
1939
|
|
|
|
|
|
|
#else |
1940
|
|
|
|
|
|
|
goto not_there; |
1941
|
|
|
|
|
|
|
#endif |
1942
|
|
|
|
|
|
|
|
1943
|
|
|
|
|
|
|
} |
1944
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_TS", 13)) { |
1945
|
|
|
|
|
|
|
/* A */ |
1946
|
|
|
|
|
|
|
|
1947
|
|
|
|
|
|
|
#ifdef X509_TRUST_TSA |
1948
|
1
|
|
|
|
|
|
return X509_TRUST_TSA; |
1949
|
|
|
|
|
|
|
#else |
1950
|
|
|
|
|
|
|
goto not_there; |
1951
|
|
|
|
|
|
|
#endif |
1952
|
|
|
|
|
|
|
|
1953
|
|
|
|
|
|
|
} |
1954
|
0
|
|
|
|
|
|
break; |
1955
|
|
|
|
|
|
|
case 'D': |
1956
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_localKeyI", 13)) { |
1957
|
|
|
|
|
|
|
/* D */ |
1958
|
|
|
|
|
|
|
|
1959
|
|
|
|
|
|
|
#ifdef NID_localKeyID |
1960
|
1
|
|
|
|
|
|
return NID_localKeyID; |
1961
|
|
|
|
|
|
|
#else |
1962
|
|
|
|
|
|
|
goto not_there; |
1963
|
|
|
|
|
|
|
#endif |
1964
|
|
|
|
|
|
|
|
1965
|
|
|
|
|
|
|
} |
1966
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_OI", 13)) { |
1967
|
|
|
|
|
|
|
/* D */ |
1968
|
|
|
|
|
|
|
|
1969
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_OID |
1970
|
1
|
|
|
|
|
|
return XN_FLAG_FN_OID; |
1971
|
|
|
|
|
|
|
#else |
1972
|
|
|
|
|
|
|
goto not_there; |
1973
|
|
|
|
|
|
|
#endif |
1974
|
|
|
|
|
|
|
|
1975
|
|
|
|
|
|
|
} |
1976
|
0
|
|
|
|
|
|
break; |
1977
|
|
|
|
|
|
|
case 'F': |
1978
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_OF", 13)) { |
1979
|
|
|
|
|
|
|
/* F */ |
1980
|
|
|
|
|
|
|
|
1981
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_OFF |
1982
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_OFF; |
1983
|
|
|
|
|
|
|
#else |
1984
|
|
|
|
|
|
|
goto not_there; |
1985
|
|
|
|
|
|
|
#endif |
1986
|
|
|
|
|
|
|
|
1987
|
|
|
|
|
|
|
} |
1988
|
0
|
|
|
|
|
|
break; |
1989
|
|
|
|
|
|
|
case 'K': |
1990
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_SSL_MAS", 13)) { |
1991
|
|
|
|
|
|
|
/* K */ |
1992
|
|
|
|
|
|
|
|
1993
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_SSL_MASK |
1994
|
1
|
|
|
|
|
|
return SSL_OP_NO_SSL_MASK; |
1995
|
|
|
|
|
|
|
#else |
1996
|
|
|
|
|
|
|
goto not_there; |
1997
|
|
|
|
|
|
|
#endif |
1998
|
|
|
|
|
|
|
|
1999
|
|
|
|
|
|
|
} |
2000
|
0
|
|
|
|
|
|
break; |
2001
|
|
|
|
|
|
|
case 'M': |
2002
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_CHECKSU", 13)) { |
2003
|
|
|
|
|
|
|
/* M */ |
2004
|
|
|
|
|
|
|
|
2005
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_CHECKSUM |
2006
|
1
|
|
|
|
|
|
return SSL_R_BAD_CHECKSUM; |
2007
|
|
|
|
|
|
|
#else |
2008
|
|
|
|
|
|
|
goto not_there; |
2009
|
|
|
|
|
|
|
#endif |
2010
|
|
|
|
|
|
|
|
2011
|
|
|
|
|
|
|
} |
2012
|
0
|
|
|
|
|
|
break; |
2013
|
|
|
|
|
|
|
case 'N': |
2014
|
49
|
100
|
|
|
|
|
if (!memcmp(name, "SSLEAY_VERSIO", 13)) { |
2015
|
|
|
|
|
|
|
/* N */ |
2016
|
|
|
|
|
|
|
|
2017
|
|
|
|
|
|
|
#ifdef SSLEAY_VERSION |
2018
|
4
|
|
|
|
|
|
return SSLEAY_VERSION; |
2019
|
|
|
|
|
|
|
#else |
2020
|
|
|
|
|
|
|
goto not_there; |
2021
|
|
|
|
|
|
|
#endif |
2022
|
|
|
|
|
|
|
|
2023
|
|
|
|
|
|
|
} |
2024
|
45
|
100
|
|
|
|
|
if (!memcmp(name, "TLS1_1_VERSIO", 13)) { |
2025
|
|
|
|
|
|
|
/* N */ |
2026
|
|
|
|
|
|
|
|
2027
|
|
|
|
|
|
|
#ifdef TLS1_1_VERSION |
2028
|
1
|
|
|
|
|
|
return TLS1_1_VERSION; |
2029
|
|
|
|
|
|
|
#else |
2030
|
|
|
|
|
|
|
goto not_there; |
2031
|
|
|
|
|
|
|
#endif |
2032
|
|
|
|
|
|
|
|
2033
|
|
|
|
|
|
|
} |
2034
|
44
|
100
|
|
|
|
|
if (!memcmp(name, "TLS1_2_VERSIO", 13)) { |
2035
|
|
|
|
|
|
|
/* N */ |
2036
|
|
|
|
|
|
|
|
2037
|
|
|
|
|
|
|
#ifdef TLS1_2_VERSION |
2038
|
2
|
|
|
|
|
|
return TLS1_2_VERSION; |
2039
|
|
|
|
|
|
|
#else |
2040
|
|
|
|
|
|
|
goto not_there; |
2041
|
|
|
|
|
|
|
#endif |
2042
|
|
|
|
|
|
|
|
2043
|
|
|
|
|
|
|
} |
2044
|
42
|
50
|
|
|
|
|
if (!memcmp(name, "TLS1_3_VERSIO", 13)) { |
2045
|
|
|
|
|
|
|
/* N */ |
2046
|
|
|
|
|
|
|
|
2047
|
|
|
|
|
|
|
#ifdef TLS1_3_VERSION |
2048
|
|
|
|
|
|
|
return TLS1_3_VERSION; |
2049
|
|
|
|
|
|
|
#else |
2050
|
42
|
|
|
|
|
|
goto not_there; |
2051
|
|
|
|
|
|
|
#endif |
2052
|
|
|
|
|
|
|
|
2053
|
|
|
|
|
|
|
} |
2054
|
0
|
|
|
|
|
|
break; |
2055
|
|
|
|
|
|
|
case 'O': |
2056
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_CLIENT_HELL", 13)) { |
2057
|
|
|
|
|
|
|
/* O */ |
2058
|
|
|
|
|
|
|
|
2059
|
|
|
|
|
|
|
#ifdef SSL_F_CLIENT_HELLO |
2060
|
1
|
|
|
|
|
|
return SSL_F_CLIENT_HELLO; |
2061
|
|
|
|
|
|
|
#else |
2062
|
|
|
|
|
|
|
goto not_there; |
2063
|
|
|
|
|
|
|
#endif |
2064
|
|
|
|
|
|
|
|
2065
|
|
|
|
|
|
|
} |
2066
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SERVER_HELL", 13)) { |
2067
|
|
|
|
|
|
|
/* O */ |
2068
|
|
|
|
|
|
|
|
2069
|
|
|
|
|
|
|
#ifdef SSL_F_SERVER_HELLO |
2070
|
1
|
|
|
|
|
|
return SSL_F_SERVER_HELLO; |
2071
|
|
|
|
|
|
|
#else |
2072
|
|
|
|
|
|
|
goto not_there; |
2073
|
|
|
|
|
|
|
#endif |
2074
|
|
|
|
|
|
|
|
2075
|
|
|
|
|
|
|
} |
2076
|
0
|
|
|
|
|
|
break; |
2077
|
|
|
|
|
|
|
case 'P': |
2078
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_ACCEPT_LOO", 13)) { |
2079
|
|
|
|
|
|
|
/* P */ |
2080
|
|
|
|
|
|
|
|
2081
|
|
|
|
|
|
|
#ifdef SSL_CB_ACCEPT_LOOP |
2082
|
2
|
|
|
|
|
|
return SSL_CB_ACCEPT_LOOP; |
2083
|
|
|
|
|
|
|
#else |
2084
|
|
|
|
|
|
|
goto not_there; |
2085
|
|
|
|
|
|
|
#endif |
2086
|
|
|
|
|
|
|
|
2087
|
|
|
|
|
|
|
} |
2088
|
0
|
|
|
|
|
|
break; |
2089
|
|
|
|
|
|
|
case 'Q': |
2090
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SPC_E", 13)) { |
2091
|
|
|
|
|
|
|
/* Q */ |
2092
|
|
|
|
|
|
|
|
2093
|
|
|
|
|
|
|
#ifdef XN_FLAG_SPC_EQ |
2094
|
1
|
|
|
|
|
|
return XN_FLAG_SPC_EQ; |
2095
|
|
|
|
|
|
|
#else |
2096
|
|
|
|
|
|
|
goto not_there; |
2097
|
|
|
|
|
|
|
#endif |
2098
|
|
|
|
|
|
|
|
2099
|
|
|
|
|
|
|
} |
2100
|
0
|
|
|
|
|
|
break; |
2101
|
|
|
|
|
|
|
case 'R': |
2102
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_HEADE", 13)) { |
2103
|
|
|
|
|
|
|
/* R */ |
2104
|
|
|
|
|
|
|
|
2105
|
|
|
|
|
|
|
#ifdef SSL3_RT_HEADER |
2106
|
1
|
|
|
|
|
|
return SSL3_RT_HEADER; |
2107
|
|
|
|
|
|
|
#else |
2108
|
|
|
|
|
|
|
goto not_there; |
2109
|
|
|
|
|
|
|
#endif |
2110
|
|
|
|
|
|
|
|
2111
|
|
|
|
|
|
|
} |
2112
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_READ_HEADE", 13)) { |
2113
|
|
|
|
|
|
|
/* R */ |
2114
|
|
|
|
|
|
|
|
2115
|
|
|
|
|
|
|
#ifdef SSL_ST_READ_HEADER |
2116
|
1
|
|
|
|
|
|
return SSL_ST_READ_HEADER; |
2117
|
|
|
|
|
|
|
#else |
2118
|
|
|
|
|
|
|
goto not_there; |
2119
|
|
|
|
|
|
|
#endif |
2120
|
|
|
|
|
|
|
|
2121
|
|
|
|
|
|
|
} |
2122
|
0
|
|
|
|
|
|
break; |
2123
|
|
|
|
|
|
|
case 'S': |
2124
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_CFLAG", 13)) { |
2125
|
|
|
|
|
|
|
/* S */ |
2126
|
|
|
|
|
|
|
|
2127
|
|
|
|
|
|
|
#ifdef OPENSSL_CFLAGS |
2128
|
|
|
|
|
|
|
return OPENSSL_CFLAGS; |
2129
|
|
|
|
|
|
|
#else |
2130
|
1
|
|
|
|
|
|
goto not_there; |
2131
|
|
|
|
|
|
|
#endif |
2132
|
|
|
|
|
|
|
|
2133
|
|
|
|
|
|
|
} |
2134
|
0
|
|
|
|
|
|
break; |
2135
|
|
|
|
|
|
|
case 'T': |
2136
|
5
|
100
|
|
|
|
|
if (!memcmp(name, "CB_ACCEPT_EXI", 13)) { |
2137
|
|
|
|
|
|
|
/* T */ |
2138
|
|
|
|
|
|
|
|
2139
|
|
|
|
|
|
|
#ifdef SSL_CB_ACCEPT_EXIT |
2140
|
2
|
|
|
|
|
|
return SSL_CB_ACCEPT_EXIT; |
2141
|
|
|
|
|
|
|
#else |
2142
|
|
|
|
|
|
|
goto not_there; |
2143
|
|
|
|
|
|
|
#endif |
2144
|
|
|
|
|
|
|
|
2145
|
|
|
|
|
|
|
} |
2146
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "CB_WRITE_ALER", 13)) { |
2147
|
|
|
|
|
|
|
/* T */ |
2148
|
|
|
|
|
|
|
|
2149
|
|
|
|
|
|
|
#ifdef SSL_CB_WRITE_ALERT |
2150
|
2
|
|
|
|
|
|
return SSL_CB_WRITE_ALERT; |
2151
|
|
|
|
|
|
|
#else |
2152
|
|
|
|
|
|
|
goto not_there; |
2153
|
|
|
|
|
|
|
#endif |
2154
|
|
|
|
|
|
|
|
2155
|
|
|
|
|
|
|
} |
2156
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_COMPA", 13)) { |
2157
|
|
|
|
|
|
|
/* T */ |
2158
|
|
|
|
|
|
|
|
2159
|
|
|
|
|
|
|
#ifdef XN_FLAG_COMPAT |
2160
|
1
|
|
|
|
|
|
return XN_FLAG_COMPAT; |
2161
|
|
|
|
|
|
|
#else |
2162
|
|
|
|
|
|
|
goto not_there; |
2163
|
|
|
|
|
|
|
#endif |
2164
|
|
|
|
|
|
|
|
2165
|
|
|
|
|
|
|
} |
2166
|
0
|
|
|
|
|
|
break; |
2167
|
|
|
|
|
|
|
case 'V': |
2168
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_DN_RE", 13)) { |
2169
|
|
|
|
|
|
|
/* V */ |
2170
|
|
|
|
|
|
|
|
2171
|
|
|
|
|
|
|
#ifdef XN_FLAG_DN_REV |
2172
|
1
|
|
|
|
|
|
return XN_FLAG_DN_REV; |
2173
|
|
|
|
|
|
|
#else |
2174
|
|
|
|
|
|
|
goto not_there; |
2175
|
|
|
|
|
|
|
#endif |
2176
|
|
|
|
|
|
|
|
2177
|
|
|
|
|
|
|
} |
2178
|
0
|
|
|
|
|
|
break; |
2179
|
|
|
|
|
|
|
case 'W': |
2180
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_CERT_NE", 13)) { |
2181
|
|
|
|
|
|
|
/* W */ |
2182
|
|
|
|
|
|
|
|
2183
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_CERT_NEW |
2184
|
1
|
|
|
|
|
|
return SSL_F_SSL_CERT_NEW; |
2185
|
|
|
|
|
|
|
#else |
2186
|
|
|
|
|
|
|
goto not_there; |
2187
|
|
|
|
|
|
|
#endif |
2188
|
|
|
|
|
|
|
|
2189
|
|
|
|
|
|
|
} |
2190
|
0
|
|
|
|
|
|
break; |
2191
|
|
|
|
|
|
|
case 'X': |
2192
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NULL_SSL_CT", 13)) { |
2193
|
|
|
|
|
|
|
/* X */ |
2194
|
|
|
|
|
|
|
|
2195
|
|
|
|
|
|
|
#ifdef SSL_R_NULL_SSL_CTX |
2196
|
1
|
|
|
|
|
|
return SSL_R_NULL_SSL_CTX; |
2197
|
|
|
|
|
|
|
#else |
2198
|
|
|
|
|
|
|
goto not_there; |
2199
|
|
|
|
|
|
|
#endif |
2200
|
|
|
|
|
|
|
|
2201
|
|
|
|
|
|
|
} |
2202
|
0
|
|
|
|
|
|
break; |
2203
|
|
|
|
|
|
|
case 'Y': |
2204
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_PUBLICKE", 13)) { |
2205
|
|
|
|
|
|
|
/* Y */ |
2206
|
|
|
|
|
|
|
|
2207
|
|
|
|
|
|
|
#ifdef SSL_R_NO_PUBLICKEY |
2208
|
1
|
|
|
|
|
|
return SSL_R_NO_PUBLICKEY; |
2209
|
|
|
|
|
|
|
#else |
2210
|
|
|
|
|
|
|
goto not_there; |
2211
|
|
|
|
|
|
|
#endif |
2212
|
|
|
|
|
|
|
|
2213
|
|
|
|
|
|
|
} |
2214
|
0
|
|
|
|
|
|
break; |
2215
|
|
|
|
|
|
|
case 'a': |
2216
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_dat", 13)) { |
2217
|
|
|
|
|
|
|
/* a */ |
2218
|
|
|
|
|
|
|
|
2219
|
|
|
|
|
|
|
#ifdef NID_pkcs7_data |
2220
|
1
|
|
|
|
|
|
return NID_pkcs7_data; |
2221
|
|
|
|
|
|
|
#else |
2222
|
|
|
|
|
|
|
goto not_there; |
2223
|
|
|
|
|
|
|
#endif |
2224
|
|
|
|
|
|
|
|
2225
|
|
|
|
|
|
|
} |
2226
|
0
|
|
|
|
|
|
break; |
2227
|
|
|
|
|
|
|
case 'c': |
2228
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc2_40_cb", 13)) { |
2229
|
|
|
|
|
|
|
/* c */ |
2230
|
|
|
|
|
|
|
|
2231
|
|
|
|
|
|
|
#ifdef NID_rc2_40_cbc |
2232
|
1
|
|
|
|
|
|
return NID_rc2_40_cbc; |
2233
|
|
|
|
|
|
|
#else |
2234
|
|
|
|
|
|
|
goto not_there; |
2235
|
|
|
|
|
|
|
#endif |
2236
|
|
|
|
|
|
|
|
2237
|
|
|
|
|
|
|
} |
2238
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rc2_64_cb", 13)) { |
2239
|
|
|
|
|
|
|
/* c */ |
2240
|
|
|
|
|
|
|
|
2241
|
|
|
|
|
|
|
#ifdef NID_rc2_64_cbc |
2242
|
1
|
|
|
|
|
|
return NID_rc2_64_cbc; |
2243
|
|
|
|
|
|
|
#else |
2244
|
|
|
|
|
|
|
goto not_there; |
2245
|
|
|
|
|
|
|
#endif |
2246
|
|
|
|
|
|
|
|
2247
|
|
|
|
|
|
|
} |
2248
|
0
|
|
|
|
|
|
break; |
2249
|
|
|
|
|
|
|
case 'e': |
2250
|
3
|
50
|
|
|
|
|
if (!memcmp(name, "NID_commonNam", 13)) { |
2251
|
|
|
|
|
|
|
/* e */ |
2252
|
|
|
|
|
|
|
|
2253
|
|
|
|
|
|
|
#ifdef NID_commonName |
2254
|
3
|
|
|
|
|
|
return NID_commonName; |
2255
|
|
|
|
|
|
|
#else |
2256
|
|
|
|
|
|
|
goto not_there; |
2257
|
|
|
|
|
|
|
#endif |
2258
|
|
|
|
|
|
|
|
2259
|
|
|
|
|
|
|
} |
2260
|
0
|
|
|
|
|
|
break; |
2261
|
|
|
|
|
|
|
case 'n': |
2262
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_crl_reaso", 13)) { |
2263
|
|
|
|
|
|
|
/* n */ |
2264
|
|
|
|
|
|
|
|
2265
|
|
|
|
|
|
|
#ifdef NID_crl_reason |
2266
|
1
|
|
|
|
|
|
return NID_crl_reason; |
2267
|
|
|
|
|
|
|
#else |
2268
|
|
|
|
|
|
|
goto not_there; |
2269
|
|
|
|
|
|
|
#endif |
2270
|
|
|
|
|
|
|
|
2271
|
|
|
|
|
|
|
} |
2272
|
0
|
|
|
|
|
|
break; |
2273
|
|
|
|
|
|
|
case 'p': |
2274
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_time_stam", 13)) { |
2275
|
|
|
|
|
|
|
/* p */ |
2276
|
|
|
|
|
|
|
|
2277
|
|
|
|
|
|
|
#ifdef NID_time_stamp |
2278
|
1
|
|
|
|
|
|
return NID_time_stamp; |
2279
|
|
|
|
|
|
|
#else |
2280
|
|
|
|
|
|
|
goto not_there; |
2281
|
|
|
|
|
|
|
#endif |
2282
|
|
|
|
|
|
|
|
2283
|
|
|
|
|
|
|
} |
2284
|
0
|
|
|
|
|
|
break; |
2285
|
|
|
|
|
|
|
case 'q': |
2286
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ms_ext_re", 13)) { |
2287
|
|
|
|
|
|
|
/* q */ |
2288
|
|
|
|
|
|
|
|
2289
|
|
|
|
|
|
|
#ifdef NID_ms_ext_req |
2290
|
1
|
|
|
|
|
|
return NID_ms_ext_req; |
2291
|
|
|
|
|
|
|
#else |
2292
|
|
|
|
|
|
|
goto not_there; |
2293
|
|
|
|
|
|
|
#endif |
2294
|
|
|
|
|
|
|
|
2295
|
|
|
|
|
|
|
} |
2296
|
0
|
|
|
|
|
|
break; |
2297
|
|
|
|
|
|
|
case 'r': |
2298
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_crl_numbe", 13)) { |
2299
|
|
|
|
|
|
|
/* r */ |
2300
|
|
|
|
|
|
|
|
2301
|
|
|
|
|
|
|
#ifdef NID_crl_number |
2302
|
1
|
|
|
|
|
|
return NID_crl_number; |
2303
|
|
|
|
|
|
|
#else |
2304
|
|
|
|
|
|
|
goto not_there; |
2305
|
|
|
|
|
|
|
#endif |
2306
|
|
|
|
|
|
|
|
2307
|
|
|
|
|
|
|
} |
2308
|
0
|
|
|
|
|
|
break; |
2309
|
|
|
|
|
|
|
} |
2310
|
0
|
|
|
|
|
|
break; |
2311
|
|
|
|
|
|
|
case 15: |
2312
|
|
|
|
|
|
|
/* Names all of length 15. */ |
2313
|
|
|
|
|
|
|
/* CB_CONNECT_EXIT CB_CONNECT_LOOP ERROR_WANT_READ F_WRITE_PENDING |
2314
|
|
|
|
|
|
|
MODE_AUTO_RETRY NID_cast5_cfb64 NID_cast5_ofb64 NID_client_auth |
2315
|
|
|
|
|
|
|
NID_countryName NID_des_ede_cbc NID_description NID_dnQualifier |
2316
|
|
|
|
|
|
|
NID_dsaWithSHA1 NID_info_access NID_mdc2WithRSA NID_ms_code_com |
2317
|
|
|
|
|
|
|
NID_ms_code_ind NID_ms_ctl_sign NID_server_auth NID_sha1WithRSA |
2318
|
|
|
|
|
|
|
OPENSSL_VERSION OP_NO_QUERY_MTU R_NO_PRIVATEKEY R_UNKNOWN_STATE |
2319
|
|
|
|
|
|
|
SESS_CACHE_BOTH SSLEAY_BUILT_ON SSLEAY_PLATFORM XN_FLAG_FN_MASK |
2320
|
|
|
|
|
|
|
XN_FLAG_FN_NONE XN_FLAG_ONELINE XN_FLAG_RFC2253 */ |
2321
|
|
|
|
|
|
|
/* Offset 14 gives the best switch position. */ |
2322
|
83
|
|
|
|
|
|
switch (name[14]) { |
2323
|
|
|
|
|
|
|
case '1': |
2324
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_dsaWithSHA", 14)) { |
2325
|
|
|
|
|
|
|
/* 1 */ |
2326
|
|
|
|
|
|
|
|
2327
|
|
|
|
|
|
|
#ifdef NID_dsaWithSHA1 |
2328
|
1
|
|
|
|
|
|
return NID_dsaWithSHA1; |
2329
|
|
|
|
|
|
|
#else |
2330
|
|
|
|
|
|
|
goto not_there; |
2331
|
|
|
|
|
|
|
#endif |
2332
|
|
|
|
|
|
|
|
2333
|
|
|
|
|
|
|
} |
2334
|
0
|
|
|
|
|
|
break; |
2335
|
|
|
|
|
|
|
case '3': |
2336
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_RFC225", 14)) { |
2337
|
|
|
|
|
|
|
/* 3 */ |
2338
|
|
|
|
|
|
|
|
2339
|
|
|
|
|
|
|
#ifdef XN_FLAG_RFC2253 |
2340
|
1
|
|
|
|
|
|
return XN_FLAG_RFC2253; |
2341
|
|
|
|
|
|
|
#else |
2342
|
|
|
|
|
|
|
goto not_there; |
2343
|
|
|
|
|
|
|
#endif |
2344
|
|
|
|
|
|
|
|
2345
|
|
|
|
|
|
|
} |
2346
|
0
|
|
|
|
|
|
break; |
2347
|
|
|
|
|
|
|
case '4': |
2348
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_cast5_cfb6", 14)) { |
2349
|
|
|
|
|
|
|
/* 4 */ |
2350
|
|
|
|
|
|
|
|
2351
|
|
|
|
|
|
|
#ifdef NID_cast5_cfb64 |
2352
|
1
|
|
|
|
|
|
return NID_cast5_cfb64; |
2353
|
|
|
|
|
|
|
#else |
2354
|
|
|
|
|
|
|
goto not_there; |
2355
|
|
|
|
|
|
|
#endif |
2356
|
|
|
|
|
|
|
|
2357
|
|
|
|
|
|
|
} |
2358
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_cast5_ofb6", 14)) { |
2359
|
|
|
|
|
|
|
/* 4 */ |
2360
|
|
|
|
|
|
|
|
2361
|
|
|
|
|
|
|
#ifdef NID_cast5_ofb64 |
2362
|
1
|
|
|
|
|
|
return NID_cast5_ofb64; |
2363
|
|
|
|
|
|
|
#else |
2364
|
|
|
|
|
|
|
goto not_there; |
2365
|
|
|
|
|
|
|
#endif |
2366
|
|
|
|
|
|
|
|
2367
|
|
|
|
|
|
|
} |
2368
|
0
|
|
|
|
|
|
break; |
2369
|
|
|
|
|
|
|
case 'A': |
2370
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_mdc2WithRS", 14)) { |
2371
|
|
|
|
|
|
|
/* A */ |
2372
|
|
|
|
|
|
|
|
2373
|
|
|
|
|
|
|
#ifdef NID_mdc2WithRSA |
2374
|
1
|
|
|
|
|
|
return NID_mdc2WithRSA; |
2375
|
|
|
|
|
|
|
#else |
2376
|
|
|
|
|
|
|
goto not_there; |
2377
|
|
|
|
|
|
|
#endif |
2378
|
|
|
|
|
|
|
|
2379
|
|
|
|
|
|
|
} |
2380
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_sha1WithRS", 14)) { |
2381
|
|
|
|
|
|
|
/* A */ |
2382
|
|
|
|
|
|
|
|
2383
|
|
|
|
|
|
|
#ifdef NID_sha1WithRSA |
2384
|
1
|
|
|
|
|
|
return NID_sha1WithRSA; |
2385
|
|
|
|
|
|
|
#else |
2386
|
|
|
|
|
|
|
goto not_there; |
2387
|
|
|
|
|
|
|
#endif |
2388
|
|
|
|
|
|
|
|
2389
|
|
|
|
|
|
|
} |
2390
|
0
|
|
|
|
|
|
break; |
2391
|
|
|
|
|
|
|
case 'D': |
2392
|
8
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_REA", 14)) { |
2393
|
|
|
|
|
|
|
/* D */ |
2394
|
|
|
|
|
|
|
|
2395
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_READ |
2396
|
8
|
|
|
|
|
|
return SSL_ERROR_WANT_READ; |
2397
|
|
|
|
|
|
|
#else |
2398
|
|
|
|
|
|
|
goto not_there; |
2399
|
|
|
|
|
|
|
#endif |
2400
|
|
|
|
|
|
|
|
2401
|
|
|
|
|
|
|
} |
2402
|
0
|
|
|
|
|
|
break; |
2403
|
|
|
|
|
|
|
case 'E': |
2404
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "R_UNKNOWN_STAT", 14)) { |
2405
|
|
|
|
|
|
|
/* E */ |
2406
|
|
|
|
|
|
|
|
2407
|
|
|
|
|
|
|
#ifdef SSL_R_UNKNOWN_STATE |
2408
|
1
|
|
|
|
|
|
return SSL_R_UNKNOWN_STATE; |
2409
|
|
|
|
|
|
|
#else |
2410
|
|
|
|
|
|
|
goto not_there; |
2411
|
|
|
|
|
|
|
#endif |
2412
|
|
|
|
|
|
|
|
2413
|
|
|
|
|
|
|
} |
2414
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_NON", 14)) { |
2415
|
|
|
|
|
|
|
/* E */ |
2416
|
|
|
|
|
|
|
|
2417
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_NONE |
2418
|
1
|
|
|
|
|
|
return XN_FLAG_FN_NONE; |
2419
|
|
|
|
|
|
|
#else |
2420
|
|
|
|
|
|
|
goto not_there; |
2421
|
|
|
|
|
|
|
#endif |
2422
|
|
|
|
|
|
|
|
2423
|
|
|
|
|
|
|
} |
2424
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_ONELIN", 14)) { |
2425
|
|
|
|
|
|
|
/* E */ |
2426
|
|
|
|
|
|
|
|
2427
|
|
|
|
|
|
|
#ifdef XN_FLAG_ONELINE |
2428
|
1
|
|
|
|
|
|
return XN_FLAG_ONELINE; |
2429
|
|
|
|
|
|
|
#else |
2430
|
|
|
|
|
|
|
goto not_there; |
2431
|
|
|
|
|
|
|
#endif |
2432
|
|
|
|
|
|
|
|
2433
|
|
|
|
|
|
|
} |
2434
|
0
|
|
|
|
|
|
break; |
2435
|
|
|
|
|
|
|
case 'G': |
2436
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_WRITE_PENDIN", 14)) { |
2437
|
|
|
|
|
|
|
/* G */ |
2438
|
|
|
|
|
|
|
|
2439
|
|
|
|
|
|
|
#ifdef SSL_F_WRITE_PENDING |
2440
|
1
|
|
|
|
|
|
return SSL_F_WRITE_PENDING; |
2441
|
|
|
|
|
|
|
#else |
2442
|
|
|
|
|
|
|
goto not_there; |
2443
|
|
|
|
|
|
|
#endif |
2444
|
|
|
|
|
|
|
|
2445
|
|
|
|
|
|
|
} |
2446
|
0
|
|
|
|
|
|
break; |
2447
|
|
|
|
|
|
|
case 'H': |
2448
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_BOT", 14)) { |
2449
|
|
|
|
|
|
|
/* H */ |
2450
|
|
|
|
|
|
|
|
2451
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_BOTH |
2452
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_BOTH; |
2453
|
|
|
|
|
|
|
#else |
2454
|
|
|
|
|
|
|
goto not_there; |
2455
|
|
|
|
|
|
|
#endif |
2456
|
|
|
|
|
|
|
|
2457
|
|
|
|
|
|
|
} |
2458
|
0
|
|
|
|
|
|
break; |
2459
|
|
|
|
|
|
|
case 'K': |
2460
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_MAS", 14)) { |
2461
|
|
|
|
|
|
|
/* K */ |
2462
|
|
|
|
|
|
|
|
2463
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_MASK |
2464
|
1
|
|
|
|
|
|
return XN_FLAG_FN_MASK; |
2465
|
|
|
|
|
|
|
#else |
2466
|
|
|
|
|
|
|
goto not_there; |
2467
|
|
|
|
|
|
|
#endif |
2468
|
|
|
|
|
|
|
|
2469
|
|
|
|
|
|
|
} |
2470
|
0
|
|
|
|
|
|
break; |
2471
|
|
|
|
|
|
|
case 'M': |
2472
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SSLEAY_PLATFOR", 14)) { |
2473
|
|
|
|
|
|
|
/* M */ |
2474
|
|
|
|
|
|
|
|
2475
|
|
|
|
|
|
|
#ifdef SSLEAY_PLATFORM |
2476
|
2
|
|
|
|
|
|
return SSLEAY_PLATFORM; |
2477
|
|
|
|
|
|
|
#else |
2478
|
|
|
|
|
|
|
goto not_there; |
2479
|
|
|
|
|
|
|
#endif |
2480
|
|
|
|
|
|
|
|
2481
|
|
|
|
|
|
|
} |
2482
|
0
|
|
|
|
|
|
break; |
2483
|
|
|
|
|
|
|
case 'N': |
2484
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSIO", 14)) { |
2485
|
|
|
|
|
|
|
/* N */ |
2486
|
|
|
|
|
|
|
|
2487
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION |
2488
|
|
|
|
|
|
|
return OPENSSL_VERSION; |
2489
|
|
|
|
|
|
|
#else |
2490
|
1
|
|
|
|
|
|
goto not_there; |
2491
|
|
|
|
|
|
|
#endif |
2492
|
|
|
|
|
|
|
|
2493
|
|
|
|
|
|
|
} |
2494
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SSLEAY_BUILT_O", 14)) { |
2495
|
|
|
|
|
|
|
/* N */ |
2496
|
|
|
|
|
|
|
|
2497
|
|
|
|
|
|
|
#ifdef SSLEAY_BUILT_ON |
2498
|
2
|
|
|
|
|
|
return SSLEAY_BUILT_ON; |
2499
|
|
|
|
|
|
|
#else |
2500
|
|
|
|
|
|
|
goto not_there; |
2501
|
|
|
|
|
|
|
#endif |
2502
|
|
|
|
|
|
|
|
2503
|
|
|
|
|
|
|
} |
2504
|
0
|
|
|
|
|
|
break; |
2505
|
|
|
|
|
|
|
case 'P': |
2506
|
22
|
50
|
|
|
|
|
if (!memcmp(name, "CB_CONNECT_LOO", 14)) { |
2507
|
|
|
|
|
|
|
/* P */ |
2508
|
|
|
|
|
|
|
|
2509
|
|
|
|
|
|
|
#ifdef SSL_CB_CONNECT_LOOP |
2510
|
22
|
|
|
|
|
|
return SSL_CB_CONNECT_LOOP; |
2511
|
|
|
|
|
|
|
#else |
2512
|
|
|
|
|
|
|
goto not_there; |
2513
|
|
|
|
|
|
|
#endif |
2514
|
|
|
|
|
|
|
|
2515
|
|
|
|
|
|
|
} |
2516
|
0
|
|
|
|
|
|
break; |
2517
|
|
|
|
|
|
|
case 'T': |
2518
|
22
|
50
|
|
|
|
|
if (!memcmp(name, "CB_CONNECT_EXI", 14)) { |
2519
|
|
|
|
|
|
|
/* T */ |
2520
|
|
|
|
|
|
|
|
2521
|
|
|
|
|
|
|
#ifdef SSL_CB_CONNECT_EXIT |
2522
|
22
|
|
|
|
|
|
return SSL_CB_CONNECT_EXIT; |
2523
|
|
|
|
|
|
|
#else |
2524
|
|
|
|
|
|
|
goto not_there; |
2525
|
|
|
|
|
|
|
#endif |
2526
|
|
|
|
|
|
|
|
2527
|
|
|
|
|
|
|
} |
2528
|
0
|
|
|
|
|
|
break; |
2529
|
|
|
|
|
|
|
case 'U': |
2530
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_QUERY_MT", 14)) { |
2531
|
|
|
|
|
|
|
/* U */ |
2532
|
|
|
|
|
|
|
|
2533
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_QUERY_MTU |
2534
|
1
|
|
|
|
|
|
return SSL_OP_NO_QUERY_MTU; |
2535
|
|
|
|
|
|
|
#else |
2536
|
|
|
|
|
|
|
goto not_there; |
2537
|
|
|
|
|
|
|
#endif |
2538
|
|
|
|
|
|
|
|
2539
|
|
|
|
|
|
|
} |
2540
|
0
|
|
|
|
|
|
break; |
2541
|
|
|
|
|
|
|
case 'Y': |
2542
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "MODE_AUTO_RETR", 14)) { |
2543
|
|
|
|
|
|
|
/* Y */ |
2544
|
|
|
|
|
|
|
|
2545
|
|
|
|
|
|
|
#ifdef SSL_MODE_AUTO_RETRY |
2546
|
1
|
|
|
|
|
|
return SSL_MODE_AUTO_RETRY; |
2547
|
|
|
|
|
|
|
#else |
2548
|
|
|
|
|
|
|
goto not_there; |
2549
|
|
|
|
|
|
|
#endif |
2550
|
|
|
|
|
|
|
|
2551
|
|
|
|
|
|
|
} |
2552
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_PRIVATEKE", 14)) { |
2553
|
|
|
|
|
|
|
/* Y */ |
2554
|
|
|
|
|
|
|
|
2555
|
|
|
|
|
|
|
#ifdef SSL_R_NO_PRIVATEKEY |
2556
|
1
|
|
|
|
|
|
return SSL_R_NO_PRIVATEKEY; |
2557
|
|
|
|
|
|
|
#else |
2558
|
|
|
|
|
|
|
goto not_there; |
2559
|
|
|
|
|
|
|
#endif |
2560
|
|
|
|
|
|
|
|
2561
|
|
|
|
|
|
|
} |
2562
|
0
|
|
|
|
|
|
break; |
2563
|
|
|
|
|
|
|
case 'c': |
2564
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede_cb", 14)) { |
2565
|
|
|
|
|
|
|
/* c */ |
2566
|
|
|
|
|
|
|
|
2567
|
|
|
|
|
|
|
#ifdef NID_des_ede_cbc |
2568
|
1
|
|
|
|
|
|
return NID_des_ede_cbc; |
2569
|
|
|
|
|
|
|
#else |
2570
|
|
|
|
|
|
|
goto not_there; |
2571
|
|
|
|
|
|
|
#endif |
2572
|
|
|
|
|
|
|
|
2573
|
|
|
|
|
|
|
} |
2574
|
0
|
|
|
|
|
|
break; |
2575
|
|
|
|
|
|
|
case 'd': |
2576
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ms_code_in", 14)) { |
2577
|
|
|
|
|
|
|
/* d */ |
2578
|
|
|
|
|
|
|
|
2579
|
|
|
|
|
|
|
#ifdef NID_ms_code_ind |
2580
|
1
|
|
|
|
|
|
return NID_ms_code_ind; |
2581
|
|
|
|
|
|
|
#else |
2582
|
|
|
|
|
|
|
goto not_there; |
2583
|
|
|
|
|
|
|
#endif |
2584
|
|
|
|
|
|
|
|
2585
|
|
|
|
|
|
|
} |
2586
|
0
|
|
|
|
|
|
break; |
2587
|
|
|
|
|
|
|
case 'e': |
2588
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_countryNam", 14)) { |
2589
|
|
|
|
|
|
|
/* e */ |
2590
|
|
|
|
|
|
|
|
2591
|
|
|
|
|
|
|
#ifdef NID_countryName |
2592
|
2
|
|
|
|
|
|
return NID_countryName; |
2593
|
|
|
|
|
|
|
#else |
2594
|
|
|
|
|
|
|
goto not_there; |
2595
|
|
|
|
|
|
|
#endif |
2596
|
|
|
|
|
|
|
|
2597
|
|
|
|
|
|
|
} |
2598
|
0
|
|
|
|
|
|
break; |
2599
|
|
|
|
|
|
|
case 'h': |
2600
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_client_aut", 14)) { |
2601
|
|
|
|
|
|
|
/* h */ |
2602
|
|
|
|
|
|
|
|
2603
|
|
|
|
|
|
|
#ifdef NID_client_auth |
2604
|
1
|
|
|
|
|
|
return NID_client_auth; |
2605
|
|
|
|
|
|
|
#else |
2606
|
|
|
|
|
|
|
goto not_there; |
2607
|
|
|
|
|
|
|
#endif |
2608
|
|
|
|
|
|
|
|
2609
|
|
|
|
|
|
|
} |
2610
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_server_aut", 14)) { |
2611
|
|
|
|
|
|
|
/* h */ |
2612
|
|
|
|
|
|
|
|
2613
|
|
|
|
|
|
|
#ifdef NID_server_auth |
2614
|
1
|
|
|
|
|
|
return NID_server_auth; |
2615
|
|
|
|
|
|
|
#else |
2616
|
|
|
|
|
|
|
goto not_there; |
2617
|
|
|
|
|
|
|
#endif |
2618
|
|
|
|
|
|
|
|
2619
|
|
|
|
|
|
|
} |
2620
|
0
|
|
|
|
|
|
break; |
2621
|
|
|
|
|
|
|
case 'm': |
2622
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ms_code_co", 14)) { |
2623
|
|
|
|
|
|
|
/* m */ |
2624
|
|
|
|
|
|
|
|
2625
|
|
|
|
|
|
|
#ifdef NID_ms_code_com |
2626
|
1
|
|
|
|
|
|
return NID_ms_code_com; |
2627
|
|
|
|
|
|
|
#else |
2628
|
|
|
|
|
|
|
goto not_there; |
2629
|
|
|
|
|
|
|
#endif |
2630
|
|
|
|
|
|
|
|
2631
|
|
|
|
|
|
|
} |
2632
|
0
|
|
|
|
|
|
break; |
2633
|
|
|
|
|
|
|
case 'n': |
2634
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_descriptio", 14)) { |
2635
|
|
|
|
|
|
|
/* n */ |
2636
|
|
|
|
|
|
|
|
2637
|
|
|
|
|
|
|
#ifdef NID_description |
2638
|
1
|
|
|
|
|
|
return NID_description; |
2639
|
|
|
|
|
|
|
#else |
2640
|
|
|
|
|
|
|
goto not_there; |
2641
|
|
|
|
|
|
|
#endif |
2642
|
|
|
|
|
|
|
|
2643
|
|
|
|
|
|
|
} |
2644
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ms_ctl_sig", 14)) { |
2645
|
|
|
|
|
|
|
/* n */ |
2646
|
|
|
|
|
|
|
|
2647
|
|
|
|
|
|
|
#ifdef NID_ms_ctl_sign |
2648
|
1
|
|
|
|
|
|
return NID_ms_ctl_sign; |
2649
|
|
|
|
|
|
|
#else |
2650
|
|
|
|
|
|
|
goto not_there; |
2651
|
|
|
|
|
|
|
#endif |
2652
|
|
|
|
|
|
|
|
2653
|
|
|
|
|
|
|
} |
2654
|
0
|
|
|
|
|
|
break; |
2655
|
|
|
|
|
|
|
case 'r': |
2656
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_dnQualifie", 14)) { |
2657
|
|
|
|
|
|
|
/* r */ |
2658
|
|
|
|
|
|
|
|
2659
|
|
|
|
|
|
|
#ifdef NID_dnQualifier |
2660
|
1
|
|
|
|
|
|
return NID_dnQualifier; |
2661
|
|
|
|
|
|
|
#else |
2662
|
|
|
|
|
|
|
goto not_there; |
2663
|
|
|
|
|
|
|
#endif |
2664
|
|
|
|
|
|
|
|
2665
|
|
|
|
|
|
|
} |
2666
|
0
|
|
|
|
|
|
break; |
2667
|
|
|
|
|
|
|
case 's': |
2668
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_info_acces", 14)) { |
2669
|
|
|
|
|
|
|
/* s */ |
2670
|
|
|
|
|
|
|
|
2671
|
|
|
|
|
|
|
#ifdef NID_info_access |
2672
|
1
|
|
|
|
|
|
return NID_info_access; |
2673
|
|
|
|
|
|
|
#else |
2674
|
|
|
|
|
|
|
goto not_there; |
2675
|
|
|
|
|
|
|
#endif |
2676
|
|
|
|
|
|
|
|
2677
|
|
|
|
|
|
|
} |
2678
|
0
|
|
|
|
|
|
break; |
2679
|
|
|
|
|
|
|
} |
2680
|
0
|
|
|
|
|
|
break; |
2681
|
|
|
|
|
|
|
case 16: |
2682
|
|
|
|
|
|
|
/* Names all of length 16. */ |
2683
|
|
|
|
|
|
|
/* ERROR_WANT_WRITE NID_des_ede3_cbc NID_friendlyName NID_hmacWithSHA1 |
2684
|
|
|
|
|
|
|
NID_localityName NID_pkcs7_digest NID_pkcs7_signed NID_serialNumber |
2685
|
|
|
|
|
|
|
OPENSSL_BUILT_ON OPENSSL_CPU_INFO OPENSSL_PLATFORM OP_EPHEMERAL_RSA |
2686
|
|
|
|
|
|
|
OP_PKCS1_CHECK_1 OP_PKCS1_CHECK_2 OP_SINGLE_DH_USE R_BAD_MAC_DECODE |
2687
|
|
|
|
|
|
|
R_NO_CIPHER_LIST SSL3_MT_FINISHED X509_PURPOSE_ANY X509_TRUST_EMAIL |
2688
|
|
|
|
|
|
|
XN_FLAG_FN_ALIGN XN_FLAG_SEP_MASK */ |
2689
|
|
|
|
|
|
|
/* Offset 15 gives the best switch position. */ |
2690
|
44
|
|
|
|
|
|
switch (name[15]) { |
2691
|
|
|
|
|
|
|
case '1': |
2692
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_hmacWithSHA", 15)) { |
2693
|
|
|
|
|
|
|
/* 1 */ |
2694
|
|
|
|
|
|
|
|
2695
|
|
|
|
|
|
|
#ifdef NID_hmacWithSHA1 |
2696
|
1
|
|
|
|
|
|
return NID_hmacWithSHA1; |
2697
|
|
|
|
|
|
|
#else |
2698
|
|
|
|
|
|
|
goto not_there; |
2699
|
|
|
|
|
|
|
#endif |
2700
|
|
|
|
|
|
|
|
2701
|
|
|
|
|
|
|
} |
2702
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_PKCS1_CHECK_", 15)) { |
2703
|
|
|
|
|
|
|
/* 1 */ |
2704
|
|
|
|
|
|
|
|
2705
|
|
|
|
|
|
|
#ifdef SSL_OP_PKCS1_CHECK_1 |
2706
|
1
|
|
|
|
|
|
return SSL_OP_PKCS1_CHECK_1; |
2707
|
|
|
|
|
|
|
#else |
2708
|
|
|
|
|
|
|
goto not_there; |
2709
|
|
|
|
|
|
|
#endif |
2710
|
|
|
|
|
|
|
|
2711
|
|
|
|
|
|
|
} |
2712
|
0
|
|
|
|
|
|
break; |
2713
|
|
|
|
|
|
|
case '2': |
2714
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_PKCS1_CHECK_", 15)) { |
2715
|
|
|
|
|
|
|
/* 2 */ |
2716
|
|
|
|
|
|
|
|
2717
|
|
|
|
|
|
|
#ifdef SSL_OP_PKCS1_CHECK_2 |
2718
|
1
|
|
|
|
|
|
return SSL_OP_PKCS1_CHECK_2; |
2719
|
|
|
|
|
|
|
#else |
2720
|
|
|
|
|
|
|
goto not_there; |
2721
|
|
|
|
|
|
|
#endif |
2722
|
|
|
|
|
|
|
|
2723
|
|
|
|
|
|
|
} |
2724
|
0
|
|
|
|
|
|
break; |
2725
|
|
|
|
|
|
|
case 'A': |
2726
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_EPHEMERAL_RS", 15)) { |
2727
|
|
|
|
|
|
|
/* A */ |
2728
|
|
|
|
|
|
|
|
2729
|
|
|
|
|
|
|
#ifdef SSL_OP_EPHEMERAL_RSA |
2730
|
1
|
|
|
|
|
|
return SSL_OP_EPHEMERAL_RSA; |
2731
|
|
|
|
|
|
|
#else |
2732
|
|
|
|
|
|
|
goto not_there; |
2733
|
|
|
|
|
|
|
#endif |
2734
|
|
|
|
|
|
|
|
2735
|
|
|
|
|
|
|
} |
2736
|
0
|
|
|
|
|
|
break; |
2737
|
|
|
|
|
|
|
case 'D': |
2738
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_FINISHE", 15)) { |
2739
|
|
|
|
|
|
|
/* D */ |
2740
|
|
|
|
|
|
|
|
2741
|
|
|
|
|
|
|
#ifdef SSL3_MT_FINISHED |
2742
|
1
|
|
|
|
|
|
return SSL3_MT_FINISHED; |
2743
|
|
|
|
|
|
|
#else |
2744
|
|
|
|
|
|
|
goto not_there; |
2745
|
|
|
|
|
|
|
#endif |
2746
|
|
|
|
|
|
|
|
2747
|
|
|
|
|
|
|
} |
2748
|
0
|
|
|
|
|
|
break; |
2749
|
|
|
|
|
|
|
case 'E': |
2750
|
8
|
100
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_WRIT", 15)) { |
2751
|
|
|
|
|
|
|
/* E */ |
2752
|
|
|
|
|
|
|
|
2753
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_WRITE |
2754
|
6
|
|
|
|
|
|
return SSL_ERROR_WANT_WRITE; |
2755
|
|
|
|
|
|
|
#else |
2756
|
|
|
|
|
|
|
goto not_there; |
2757
|
|
|
|
|
|
|
#endif |
2758
|
|
|
|
|
|
|
|
2759
|
|
|
|
|
|
|
} |
2760
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_SINGLE_DH_US", 15)) { |
2761
|
|
|
|
|
|
|
/* E */ |
2762
|
|
|
|
|
|
|
|
2763
|
|
|
|
|
|
|
#ifdef SSL_OP_SINGLE_DH_USE |
2764
|
1
|
|
|
|
|
|
return SSL_OP_SINGLE_DH_USE; |
2765
|
|
|
|
|
|
|
#else |
2766
|
|
|
|
|
|
|
goto not_there; |
2767
|
|
|
|
|
|
|
#endif |
2768
|
|
|
|
|
|
|
|
2769
|
|
|
|
|
|
|
} |
2770
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_MAC_DECOD", 15)) { |
2771
|
|
|
|
|
|
|
/* E */ |
2772
|
|
|
|
|
|
|
|
2773
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_MAC_DECODE |
2774
|
1
|
|
|
|
|
|
return SSL_R_BAD_MAC_DECODE; |
2775
|
|
|
|
|
|
|
#else |
2776
|
|
|
|
|
|
|
goto not_there; |
2777
|
|
|
|
|
|
|
#endif |
2778
|
|
|
|
|
|
|
|
2779
|
|
|
|
|
|
|
} |
2780
|
0
|
|
|
|
|
|
break; |
2781
|
|
|
|
|
|
|
case 'K': |
2782
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SEP_MAS", 15)) { |
2783
|
|
|
|
|
|
|
/* K */ |
2784
|
|
|
|
|
|
|
|
2785
|
|
|
|
|
|
|
#ifdef XN_FLAG_SEP_MASK |
2786
|
1
|
|
|
|
|
|
return XN_FLAG_SEP_MASK; |
2787
|
|
|
|
|
|
|
#else |
2788
|
|
|
|
|
|
|
goto not_there; |
2789
|
|
|
|
|
|
|
#endif |
2790
|
|
|
|
|
|
|
|
2791
|
|
|
|
|
|
|
} |
2792
|
0
|
|
|
|
|
|
break; |
2793
|
|
|
|
|
|
|
case 'L': |
2794
|
3
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_EMAI", 15)) { |
2795
|
|
|
|
|
|
|
/* L */ |
2796
|
|
|
|
|
|
|
|
2797
|
|
|
|
|
|
|
#ifdef X509_TRUST_EMAIL |
2798
|
3
|
|
|
|
|
|
return X509_TRUST_EMAIL; |
2799
|
|
|
|
|
|
|
#else |
2800
|
|
|
|
|
|
|
goto not_there; |
2801
|
|
|
|
|
|
|
#endif |
2802
|
|
|
|
|
|
|
|
2803
|
|
|
|
|
|
|
} |
2804
|
0
|
|
|
|
|
|
break; |
2805
|
|
|
|
|
|
|
case 'M': |
2806
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_PLATFOR", 15)) { |
2807
|
|
|
|
|
|
|
/* M */ |
2808
|
|
|
|
|
|
|
|
2809
|
|
|
|
|
|
|
#ifdef OPENSSL_PLATFORM |
2810
|
|
|
|
|
|
|
return OPENSSL_PLATFORM; |
2811
|
|
|
|
|
|
|
#else |
2812
|
1
|
|
|
|
|
|
goto not_there; |
2813
|
|
|
|
|
|
|
#endif |
2814
|
|
|
|
|
|
|
|
2815
|
|
|
|
|
|
|
} |
2816
|
0
|
|
|
|
|
|
break; |
2817
|
|
|
|
|
|
|
case 'N': |
2818
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_BUILT_O", 15)) { |
2819
|
|
|
|
|
|
|
/* N */ |
2820
|
|
|
|
|
|
|
|
2821
|
|
|
|
|
|
|
#ifdef OPENSSL_BUILT_ON |
2822
|
|
|
|
|
|
|
return OPENSSL_BUILT_ON; |
2823
|
|
|
|
|
|
|
#else |
2824
|
1
|
|
|
|
|
|
goto not_there; |
2825
|
|
|
|
|
|
|
#endif |
2826
|
|
|
|
|
|
|
|
2827
|
|
|
|
|
|
|
} |
2828
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_ALIG", 15)) { |
2829
|
|
|
|
|
|
|
/* N */ |
2830
|
|
|
|
|
|
|
|
2831
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_ALIGN |
2832
|
1
|
|
|
|
|
|
return XN_FLAG_FN_ALIGN; |
2833
|
|
|
|
|
|
|
#else |
2834
|
|
|
|
|
|
|
goto not_there; |
2835
|
|
|
|
|
|
|
#endif |
2836
|
|
|
|
|
|
|
|
2837
|
|
|
|
|
|
|
} |
2838
|
0
|
|
|
|
|
|
break; |
2839
|
|
|
|
|
|
|
case 'O': |
2840
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_CPU_INF", 15)) { |
2841
|
|
|
|
|
|
|
/* O */ |
2842
|
|
|
|
|
|
|
|
2843
|
|
|
|
|
|
|
#ifdef OPENSSL_CPU_INFO |
2844
|
|
|
|
|
|
|
return OPENSSL_CPU_INFO; |
2845
|
|
|
|
|
|
|
#else |
2846
|
1
|
|
|
|
|
|
goto not_there; |
2847
|
|
|
|
|
|
|
#endif |
2848
|
|
|
|
|
|
|
|
2849
|
|
|
|
|
|
|
} |
2850
|
0
|
|
|
|
|
|
break; |
2851
|
|
|
|
|
|
|
case 'T': |
2852
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_CIPHER_LIS", 15)) { |
2853
|
|
|
|
|
|
|
/* T */ |
2854
|
|
|
|
|
|
|
|
2855
|
|
|
|
|
|
|
#ifdef SSL_R_NO_CIPHER_LIST |
2856
|
1
|
|
|
|
|
|
return SSL_R_NO_CIPHER_LIST; |
2857
|
|
|
|
|
|
|
#else |
2858
|
|
|
|
|
|
|
goto not_there; |
2859
|
|
|
|
|
|
|
#endif |
2860
|
|
|
|
|
|
|
|
2861
|
|
|
|
|
|
|
} |
2862
|
0
|
|
|
|
|
|
break; |
2863
|
|
|
|
|
|
|
case 'Y': |
2864
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_AN", 15)) { |
2865
|
|
|
|
|
|
|
/* Y */ |
2866
|
|
|
|
|
|
|
|
2867
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_ANY |
2868
|
1
|
|
|
|
|
|
return X509_PURPOSE_ANY; |
2869
|
|
|
|
|
|
|
#else |
2870
|
|
|
|
|
|
|
goto not_there; |
2871
|
|
|
|
|
|
|
#endif |
2872
|
|
|
|
|
|
|
|
2873
|
|
|
|
|
|
|
} |
2874
|
0
|
|
|
|
|
|
break; |
2875
|
|
|
|
|
|
|
case 'c': |
2876
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede3_cb", 15)) { |
2877
|
|
|
|
|
|
|
/* c */ |
2878
|
|
|
|
|
|
|
|
2879
|
|
|
|
|
|
|
#ifdef NID_des_ede3_cbc |
2880
|
1
|
|
|
|
|
|
return NID_des_ede3_cbc; |
2881
|
|
|
|
|
|
|
#else |
2882
|
|
|
|
|
|
|
goto not_there; |
2883
|
|
|
|
|
|
|
#endif |
2884
|
|
|
|
|
|
|
|
2885
|
|
|
|
|
|
|
} |
2886
|
0
|
|
|
|
|
|
break; |
2887
|
|
|
|
|
|
|
case 'd': |
2888
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_signe", 15)) { |
2889
|
|
|
|
|
|
|
/* d */ |
2890
|
|
|
|
|
|
|
|
2891
|
|
|
|
|
|
|
#ifdef NID_pkcs7_signed |
2892
|
1
|
|
|
|
|
|
return NID_pkcs7_signed; |
2893
|
|
|
|
|
|
|
#else |
2894
|
|
|
|
|
|
|
goto not_there; |
2895
|
|
|
|
|
|
|
#endif |
2896
|
|
|
|
|
|
|
|
2897
|
|
|
|
|
|
|
} |
2898
|
0
|
|
|
|
|
|
break; |
2899
|
|
|
|
|
|
|
case 'e': |
2900
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_friendlyNam", 15)) { |
2901
|
|
|
|
|
|
|
/* e */ |
2902
|
|
|
|
|
|
|
|
2903
|
|
|
|
|
|
|
#ifdef NID_friendlyName |
2904
|
1
|
|
|
|
|
|
return NID_friendlyName; |
2905
|
|
|
|
|
|
|
#else |
2906
|
|
|
|
|
|
|
goto not_there; |
2907
|
|
|
|
|
|
|
#endif |
2908
|
|
|
|
|
|
|
|
2909
|
|
|
|
|
|
|
} |
2910
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_localityNam", 15)) { |
2911
|
|
|
|
|
|
|
/* e */ |
2912
|
|
|
|
|
|
|
|
2913
|
|
|
|
|
|
|
#ifdef NID_localityName |
2914
|
1
|
|
|
|
|
|
return NID_localityName; |
2915
|
|
|
|
|
|
|
#else |
2916
|
|
|
|
|
|
|
goto not_there; |
2917
|
|
|
|
|
|
|
#endif |
2918
|
|
|
|
|
|
|
|
2919
|
|
|
|
|
|
|
} |
2920
|
0
|
|
|
|
|
|
break; |
2921
|
|
|
|
|
|
|
case 'r': |
2922
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_serialNumbe", 15)) { |
2923
|
|
|
|
|
|
|
/* r */ |
2924
|
|
|
|
|
|
|
|
2925
|
|
|
|
|
|
|
#ifdef NID_serialNumber |
2926
|
1
|
|
|
|
|
|
return NID_serialNumber; |
2927
|
|
|
|
|
|
|
#else |
2928
|
|
|
|
|
|
|
goto not_there; |
2929
|
|
|
|
|
|
|
#endif |
2930
|
|
|
|
|
|
|
|
2931
|
|
|
|
|
|
|
} |
2932
|
0
|
|
|
|
|
|
break; |
2933
|
|
|
|
|
|
|
case 't': |
2934
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_diges", 15)) { |
2935
|
|
|
|
|
|
|
/* t */ |
2936
|
|
|
|
|
|
|
|
2937
|
|
|
|
|
|
|
#ifdef NID_pkcs7_digest |
2938
|
1
|
|
|
|
|
|
return NID_pkcs7_digest; |
2939
|
|
|
|
|
|
|
#else |
2940
|
|
|
|
|
|
|
goto not_there; |
2941
|
|
|
|
|
|
|
#endif |
2942
|
|
|
|
|
|
|
|
2943
|
|
|
|
|
|
|
} |
2944
|
0
|
|
|
|
|
|
break; |
2945
|
|
|
|
|
|
|
} |
2946
|
15
|
|
|
|
|
|
break; |
2947
|
|
|
|
|
|
|
case 17: |
2948
|
|
|
|
|
|
|
/* Names all of length 17. */ |
2949
|
|
|
|
|
|
|
/* CB_HANDSHAKE_DONE ERROR_WANT_ACCEPT ERROR_ZERO_RETURN F_D2I_SSL_SESSION |
2950
|
|
|
|
|
|
|
F_I2D_SSL_SESSION F_SSL_SESSION_NEW NID_ad_ca_issuers NID_des_ede_cfb64 |
2951
|
|
|
|
|
|
|
NID_des_ede_ofb64 NID_dsaWithSHA1_2 NID_email_protect NID_ext_key_usage |
2952
|
|
|
|
|
|
|
NID_id_qt_unotice NID_rsaEncryption OP_NO_ANTI_REPLAY OP_NO_COMPRESSION |
2953
|
|
|
|
|
|
|
OP_TLSEXT_PADDING RECEIVED_SHUTDOWN R_BAD_WRITE_RETRY R_NO_CIPHER_MATCH |
2954
|
|
|
|
|
|
|
SESS_CACHE_CLIENT SESS_CACHE_SERVER SSL3_RT_HANDSHAKE X509_FILETYPE_PEM |
2955
|
|
|
|
|
|
|
X509_TRUST_COMPAT XN_FLAG_MULTILINE */ |
2956
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
2957
|
33
|
|
|
|
|
|
switch (name[13]) { |
2958
|
|
|
|
|
|
|
case 'A': |
2959
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_dsaWithSHA1_2", 17)) { |
2960
|
|
|
|
|
|
|
/* ^ */ |
2961
|
|
|
|
|
|
|
|
2962
|
|
|
|
|
|
|
#ifdef NID_dsaWithSHA1_2 |
2963
|
1
|
|
|
|
|
|
return NID_dsaWithSHA1_2; |
2964
|
|
|
|
|
|
|
#else |
2965
|
|
|
|
|
|
|
goto not_there; |
2966
|
|
|
|
|
|
|
#endif |
2967
|
|
|
|
|
|
|
|
2968
|
|
|
|
|
|
|
} |
2969
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_CIPHER_MATCH", 17)) { |
2970
|
|
|
|
|
|
|
/* ^ */ |
2971
|
|
|
|
|
|
|
|
2972
|
|
|
|
|
|
|
#ifdef SSL_R_NO_CIPHER_MATCH |
2973
|
1
|
|
|
|
|
|
return SSL_R_NO_CIPHER_MATCH; |
2974
|
|
|
|
|
|
|
#else |
2975
|
|
|
|
|
|
|
goto not_there; |
2976
|
|
|
|
|
|
|
#endif |
2977
|
|
|
|
|
|
|
|
2978
|
|
|
|
|
|
|
} |
2979
|
0
|
|
|
|
|
|
break; |
2980
|
|
|
|
|
|
|
case 'C': |
2981
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_ACCEPT", 17)) { |
2982
|
|
|
|
|
|
|
/* ^ */ |
2983
|
|
|
|
|
|
|
|
2984
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_ACCEPT |
2985
|
1
|
|
|
|
|
|
return SSL_ERROR_WANT_ACCEPT; |
2986
|
|
|
|
|
|
|
#else |
2987
|
|
|
|
|
|
|
goto not_there; |
2988
|
|
|
|
|
|
|
#endif |
2989
|
|
|
|
|
|
|
|
2990
|
|
|
|
|
|
|
} |
2991
|
0
|
|
|
|
|
|
break; |
2992
|
|
|
|
|
|
|
case 'D': |
2993
|
5
|
100
|
|
|
|
|
if (!memcmp(name, "CB_HANDSHAKE_DONE", 17)) { |
2994
|
|
|
|
|
|
|
/* ^ */ |
2995
|
|
|
|
|
|
|
|
2996
|
|
|
|
|
|
|
#ifdef SSL_CB_HANDSHAKE_DONE |
2997
|
2
|
|
|
|
|
|
return SSL_CB_HANDSHAKE_DONE; |
2998
|
|
|
|
|
|
|
#else |
2999
|
|
|
|
|
|
|
goto not_there; |
3000
|
|
|
|
|
|
|
#endif |
3001
|
|
|
|
|
|
|
|
3002
|
|
|
|
|
|
|
} |
3003
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OP_TLSEXT_PADDING", 17)) { |
3004
|
|
|
|
|
|
|
/* ^ */ |
3005
|
|
|
|
|
|
|
|
3006
|
|
|
|
|
|
|
#ifdef SSL_OP_TLSEXT_PADDING |
3007
|
1
|
|
|
|
|
|
return SSL_OP_TLSEXT_PADDING; |
3008
|
|
|
|
|
|
|
#else |
3009
|
|
|
|
|
|
|
goto not_there; |
3010
|
|
|
|
|
|
|
#endif |
3011
|
|
|
|
|
|
|
|
3012
|
|
|
|
|
|
|
} |
3013
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "RECEIVED_SHUTDOWN", 17)) { |
3014
|
|
|
|
|
|
|
/* ^ */ |
3015
|
|
|
|
|
|
|
|
3016
|
|
|
|
|
|
|
#ifdef SSL_RECEIVED_SHUTDOWN |
3017
|
2
|
|
|
|
|
|
return SSL_RECEIVED_SHUTDOWN; |
3018
|
|
|
|
|
|
|
#else |
3019
|
|
|
|
|
|
|
goto not_there; |
3020
|
|
|
|
|
|
|
#endif |
3021
|
|
|
|
|
|
|
|
3022
|
|
|
|
|
|
|
} |
3023
|
0
|
|
|
|
|
|
break; |
3024
|
|
|
|
|
|
|
case 'E': |
3025
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_WRITE_RETRY", 17)) { |
3026
|
|
|
|
|
|
|
/* ^ */ |
3027
|
|
|
|
|
|
|
|
3028
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_WRITE_RETRY |
3029
|
1
|
|
|
|
|
|
return SSL_R_BAD_WRITE_RETRY; |
3030
|
|
|
|
|
|
|
#else |
3031
|
|
|
|
|
|
|
goto not_there; |
3032
|
|
|
|
|
|
|
#endif |
3033
|
|
|
|
|
|
|
|
3034
|
|
|
|
|
|
|
} |
3035
|
0
|
|
|
|
|
|
break; |
3036
|
|
|
|
|
|
|
case 'H': |
3037
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_HANDSHAKE", 17)) { |
3038
|
|
|
|
|
|
|
/* ^ */ |
3039
|
|
|
|
|
|
|
|
3040
|
|
|
|
|
|
|
#ifdef SSL3_RT_HANDSHAKE |
3041
|
1
|
|
|
|
|
|
return SSL3_RT_HANDSHAKE; |
3042
|
|
|
|
|
|
|
#else |
3043
|
|
|
|
|
|
|
goto not_there; |
3044
|
|
|
|
|
|
|
#endif |
3045
|
|
|
|
|
|
|
|
3046
|
|
|
|
|
|
|
} |
3047
|
0
|
|
|
|
|
|
break; |
3048
|
|
|
|
|
|
|
case 'I': |
3049
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_CLIENT", 17)) { |
3050
|
|
|
|
|
|
|
/* ^ */ |
3051
|
|
|
|
|
|
|
|
3052
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_CLIENT |
3053
|
2
|
|
|
|
|
|
return SSL_SESS_CACHE_CLIENT; |
3054
|
|
|
|
|
|
|
#else |
3055
|
|
|
|
|
|
|
goto not_there; |
3056
|
|
|
|
|
|
|
#endif |
3057
|
|
|
|
|
|
|
|
3058
|
|
|
|
|
|
|
} |
3059
|
0
|
|
|
|
|
|
break; |
3060
|
|
|
|
|
|
|
case 'L': |
3061
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_MULTILINE", 17)) { |
3062
|
|
|
|
|
|
|
/* ^ */ |
3063
|
|
|
|
|
|
|
|
3064
|
|
|
|
|
|
|
#ifdef XN_FLAG_MULTILINE |
3065
|
1
|
|
|
|
|
|
return XN_FLAG_MULTILINE; |
3066
|
|
|
|
|
|
|
#else |
3067
|
|
|
|
|
|
|
goto not_there; |
3068
|
|
|
|
|
|
|
#endif |
3069
|
|
|
|
|
|
|
|
3070
|
|
|
|
|
|
|
} |
3071
|
0
|
|
|
|
|
|
break; |
3072
|
|
|
|
|
|
|
case 'M': |
3073
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_COMPAT", 17)) { |
3074
|
|
|
|
|
|
|
/* ^ */ |
3075
|
|
|
|
|
|
|
|
3076
|
|
|
|
|
|
|
#ifdef X509_TRUST_COMPAT |
3077
|
1
|
|
|
|
|
|
return X509_TRUST_COMPAT; |
3078
|
|
|
|
|
|
|
#else |
3079
|
|
|
|
|
|
|
goto not_there; |
3080
|
|
|
|
|
|
|
#endif |
3081
|
|
|
|
|
|
|
|
3082
|
|
|
|
|
|
|
} |
3083
|
0
|
|
|
|
|
|
break; |
3084
|
|
|
|
|
|
|
case 'P': |
3085
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_ANTI_REPLAY", 17)) { |
3086
|
|
|
|
|
|
|
/* ^ */ |
3087
|
|
|
|
|
|
|
|
3088
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_ANTI_REPLAY |
3089
|
|
|
|
|
|
|
return SSL_OP_NO_ANTI_REPLAY; |
3090
|
|
|
|
|
|
|
#else |
3091
|
1
|
|
|
|
|
|
goto not_there; |
3092
|
|
|
|
|
|
|
#endif |
3093
|
|
|
|
|
|
|
|
3094
|
|
|
|
|
|
|
} |
3095
|
0
|
|
|
|
|
|
break; |
3096
|
|
|
|
|
|
|
case 'R': |
3097
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_SERVER", 17)) { |
3098
|
|
|
|
|
|
|
/* ^ */ |
3099
|
|
|
|
|
|
|
|
3100
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_SERVER |
3101
|
2
|
|
|
|
|
|
return SSL_SESS_CACHE_SERVER; |
3102
|
|
|
|
|
|
|
#else |
3103
|
|
|
|
|
|
|
goto not_there; |
3104
|
|
|
|
|
|
|
#endif |
3105
|
|
|
|
|
|
|
|
3106
|
|
|
|
|
|
|
} |
3107
|
0
|
|
|
|
|
|
break; |
3108
|
|
|
|
|
|
|
case 'S': |
3109
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "F_D2I_SSL_SESSION", 17)) { |
3110
|
|
|
|
|
|
|
/* ^ */ |
3111
|
|
|
|
|
|
|
|
3112
|
|
|
|
|
|
|
#ifdef SSL_F_D2I_SSL_SESSION |
3113
|
1
|
|
|
|
|
|
return SSL_F_D2I_SSL_SESSION; |
3114
|
|
|
|
|
|
|
#else |
3115
|
|
|
|
|
|
|
goto not_there; |
3116
|
|
|
|
|
|
|
#endif |
3117
|
|
|
|
|
|
|
|
3118
|
|
|
|
|
|
|
} |
3119
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_I2D_SSL_SESSION", 17)) { |
3120
|
|
|
|
|
|
|
/* ^ */ |
3121
|
|
|
|
|
|
|
|
3122
|
|
|
|
|
|
|
#ifdef SSL_F_I2D_SSL_SESSION |
3123
|
1
|
|
|
|
|
|
return SSL_F_I2D_SSL_SESSION; |
3124
|
|
|
|
|
|
|
#else |
3125
|
|
|
|
|
|
|
goto not_there; |
3126
|
|
|
|
|
|
|
#endif |
3127
|
|
|
|
|
|
|
|
3128
|
|
|
|
|
|
|
} |
3129
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_COMPRESSION", 17)) { |
3130
|
|
|
|
|
|
|
/* ^ */ |
3131
|
|
|
|
|
|
|
|
3132
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_COMPRESSION |
3133
|
2
|
|
|
|
|
|
return SSL_OP_NO_COMPRESSION; |
3134
|
|
|
|
|
|
|
#else |
3135
|
|
|
|
|
|
|
goto not_there; |
3136
|
|
|
|
|
|
|
#endif |
3137
|
|
|
|
|
|
|
|
3138
|
|
|
|
|
|
|
} |
3139
|
0
|
|
|
|
|
|
break; |
3140
|
|
|
|
|
|
|
case 'T': |
3141
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_ZERO_RETURN", 17)) { |
3142
|
|
|
|
|
|
|
/* ^ */ |
3143
|
|
|
|
|
|
|
|
3144
|
|
|
|
|
|
|
#ifdef SSL_ERROR_ZERO_RETURN |
3145
|
2
|
|
|
|
|
|
return SSL_ERROR_ZERO_RETURN; |
3146
|
|
|
|
|
|
|
#else |
3147
|
|
|
|
|
|
|
goto not_there; |
3148
|
|
|
|
|
|
|
#endif |
3149
|
|
|
|
|
|
|
|
3150
|
|
|
|
|
|
|
} |
3151
|
0
|
|
|
|
|
|
break; |
3152
|
|
|
|
|
|
|
case '_': |
3153
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_SESSION_NEW", 17)) { |
3154
|
|
|
|
|
|
|
/* ^ */ |
3155
|
|
|
|
|
|
|
|
3156
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_SESSION_NEW |
3157
|
1
|
|
|
|
|
|
return SSL_F_SSL_SESSION_NEW; |
3158
|
|
|
|
|
|
|
#else |
3159
|
|
|
|
|
|
|
goto not_there; |
3160
|
|
|
|
|
|
|
#endif |
3161
|
|
|
|
|
|
|
|
3162
|
|
|
|
|
|
|
} |
3163
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_FILETYPE_PEM", 17)) { |
3164
|
|
|
|
|
|
|
/* ^ */ |
3165
|
|
|
|
|
|
|
|
3166
|
|
|
|
|
|
|
#ifdef X509_FILETYPE_PEM |
3167
|
1
|
|
|
|
|
|
return X509_FILETYPE_PEM; |
3168
|
|
|
|
|
|
|
#else |
3169
|
|
|
|
|
|
|
goto not_there; |
3170
|
|
|
|
|
|
|
#endif |
3171
|
|
|
|
|
|
|
|
3172
|
|
|
|
|
|
|
} |
3173
|
0
|
|
|
|
|
|
break; |
3174
|
|
|
|
|
|
|
case 'f': |
3175
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_ede_cfb64", 17)) { |
3176
|
|
|
|
|
|
|
/* ^ */ |
3177
|
|
|
|
|
|
|
|
3178
|
|
|
|
|
|
|
#ifdef NID_des_ede_cfb64 |
3179
|
1
|
|
|
|
|
|
return NID_des_ede_cfb64; |
3180
|
|
|
|
|
|
|
#else |
3181
|
|
|
|
|
|
|
goto not_there; |
3182
|
|
|
|
|
|
|
#endif |
3183
|
|
|
|
|
|
|
|
3184
|
|
|
|
|
|
|
} |
3185
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede_ofb64", 17)) { |
3186
|
|
|
|
|
|
|
/* ^ */ |
3187
|
|
|
|
|
|
|
|
3188
|
|
|
|
|
|
|
#ifdef NID_des_ede_ofb64 |
3189
|
1
|
|
|
|
|
|
return NID_des_ede_ofb64; |
3190
|
|
|
|
|
|
|
#else |
3191
|
|
|
|
|
|
|
goto not_there; |
3192
|
|
|
|
|
|
|
#endif |
3193
|
|
|
|
|
|
|
|
3194
|
|
|
|
|
|
|
} |
3195
|
0
|
|
|
|
|
|
break; |
3196
|
|
|
|
|
|
|
case 's': |
3197
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ext_key_usage", 17)) { |
3198
|
|
|
|
|
|
|
/* ^ */ |
3199
|
|
|
|
|
|
|
|
3200
|
|
|
|
|
|
|
#ifdef NID_ext_key_usage |
3201
|
2
|
|
|
|
|
|
return NID_ext_key_usage; |
3202
|
|
|
|
|
|
|
#else |
3203
|
|
|
|
|
|
|
goto not_there; |
3204
|
|
|
|
|
|
|
#endif |
3205
|
|
|
|
|
|
|
|
3206
|
|
|
|
|
|
|
} |
3207
|
0
|
|
|
|
|
|
break; |
3208
|
|
|
|
|
|
|
case 't': |
3209
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_email_protect", 17)) { |
3210
|
|
|
|
|
|
|
/* ^ */ |
3211
|
|
|
|
|
|
|
|
3212
|
|
|
|
|
|
|
#ifdef NID_email_protect |
3213
|
1
|
|
|
|
|
|
return NID_email_protect; |
3214
|
|
|
|
|
|
|
#else |
3215
|
|
|
|
|
|
|
goto not_there; |
3216
|
|
|
|
|
|
|
#endif |
3217
|
|
|
|
|
|
|
|
3218
|
|
|
|
|
|
|
} |
3219
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_id_qt_unotice", 17)) { |
3220
|
|
|
|
|
|
|
/* ^ */ |
3221
|
|
|
|
|
|
|
|
3222
|
|
|
|
|
|
|
#ifdef NID_id_qt_unotice |
3223
|
1
|
|
|
|
|
|
return NID_id_qt_unotice; |
3224
|
|
|
|
|
|
|
#else |
3225
|
|
|
|
|
|
|
goto not_there; |
3226
|
|
|
|
|
|
|
#endif |
3227
|
|
|
|
|
|
|
|
3228
|
|
|
|
|
|
|
} |
3229
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rsaEncryption", 17)) { |
3230
|
|
|
|
|
|
|
/* ^ */ |
3231
|
|
|
|
|
|
|
|
3232
|
|
|
|
|
|
|
#ifdef NID_rsaEncryption |
3233
|
1
|
|
|
|
|
|
return NID_rsaEncryption; |
3234
|
|
|
|
|
|
|
#else |
3235
|
|
|
|
|
|
|
goto not_there; |
3236
|
|
|
|
|
|
|
#endif |
3237
|
|
|
|
|
|
|
|
3238
|
|
|
|
|
|
|
} |
3239
|
0
|
|
|
|
|
|
break; |
3240
|
|
|
|
|
|
|
case 'u': |
3241
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ad_ca_issuers", 17)) { |
3242
|
|
|
|
|
|
|
/* ^ */ |
3243
|
|
|
|
|
|
|
|
3244
|
|
|
|
|
|
|
#ifdef NID_ad_ca_issuers |
3245
|
1
|
|
|
|
|
|
return NID_ad_ca_issuers; |
3246
|
|
|
|
|
|
|
#else |
3247
|
|
|
|
|
|
|
goto not_there; |
3248
|
|
|
|
|
|
|
#endif |
3249
|
|
|
|
|
|
|
|
3250
|
|
|
|
|
|
|
} |
3251
|
0
|
|
|
|
|
|
break; |
3252
|
|
|
|
|
|
|
} |
3253
|
0
|
|
|
|
|
|
break; |
3254
|
|
|
|
|
|
|
case 18: |
3255
|
|
|
|
|
|
|
/* Names all of length 18. */ |
3256
|
|
|
|
|
|
|
/* CB_HANDSHAKE_START ERROR_WANT_CONNECT F_GET_CLIENT_HELLO |
3257
|
|
|
|
|
|
|
F_GET_SERVER_HELLO NID_des_ede3_cfb64 NID_des_ede3_ofb64 |
3258
|
|
|
|
|
|
|
NID_dhKeyAgreement OP_COOKIE_EXCHANGE OP_SINGLE_ECDH_USE |
3259
|
|
|
|
|
|
|
R_BAD_SSL_FILETYPE SSL3_MT_KEY_UPDATE SSL3_MT_NEXT_PROTO |
3260
|
|
|
|
|
|
|
VERIFY_CLIENT_ONCE X509_FILETYPE_ASN1 */ |
3261
|
|
|
|
|
|
|
/* Offset 11 gives the best switch position. */ |
3262
|
35
|
|
|
|
|
|
switch (name[11]) { |
3263
|
|
|
|
|
|
|
case '3': |
3264
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_ede3_cfb64", 18)) { |
3265
|
|
|
|
|
|
|
/* ^ */ |
3266
|
|
|
|
|
|
|
|
3267
|
|
|
|
|
|
|
#ifdef NID_des_ede3_cfb64 |
3268
|
1
|
|
|
|
|
|
return NID_des_ede3_cfb64; |
3269
|
|
|
|
|
|
|
#else |
3270
|
|
|
|
|
|
|
goto not_there; |
3271
|
|
|
|
|
|
|
#endif |
3272
|
|
|
|
|
|
|
|
3273
|
|
|
|
|
|
|
} |
3274
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede3_ofb64", 18)) { |
3275
|
|
|
|
|
|
|
/* ^ */ |
3276
|
|
|
|
|
|
|
|
3277
|
|
|
|
|
|
|
#ifdef NID_des_ede3_ofb64 |
3278
|
1
|
|
|
|
|
|
return NID_des_ede3_ofb64; |
3279
|
|
|
|
|
|
|
#else |
3280
|
|
|
|
|
|
|
goto not_there; |
3281
|
|
|
|
|
|
|
#endif |
3282
|
|
|
|
|
|
|
|
3283
|
|
|
|
|
|
|
} |
3284
|
0
|
|
|
|
|
|
break; |
3285
|
|
|
|
|
|
|
case 'C': |
3286
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_CONNECT", 18)) { |
3287
|
|
|
|
|
|
|
/* ^ */ |
3288
|
|
|
|
|
|
|
|
3289
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_CONNECT |
3290
|
1
|
|
|
|
|
|
return SSL_ERROR_WANT_CONNECT; |
3291
|
|
|
|
|
|
|
#else |
3292
|
|
|
|
|
|
|
goto not_there; |
3293
|
|
|
|
|
|
|
#endif |
3294
|
|
|
|
|
|
|
|
3295
|
|
|
|
|
|
|
} |
3296
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_SINGLE_ECDH_USE", 18)) { |
3297
|
|
|
|
|
|
|
/* ^ */ |
3298
|
|
|
|
|
|
|
|
3299
|
|
|
|
|
|
|
#ifdef SSL_OP_SINGLE_ECDH_USE |
3300
|
1
|
|
|
|
|
|
return SSL_OP_SINGLE_ECDH_USE; |
3301
|
|
|
|
|
|
|
#else |
3302
|
|
|
|
|
|
|
goto not_there; |
3303
|
|
|
|
|
|
|
#endif |
3304
|
|
|
|
|
|
|
|
3305
|
|
|
|
|
|
|
} |
3306
|
0
|
|
|
|
|
|
break; |
3307
|
|
|
|
|
|
|
case 'E': |
3308
|
22
|
50
|
|
|
|
|
if (!memcmp(name, "CB_HANDSHAKE_START", 18)) { |
3309
|
|
|
|
|
|
|
/* ^ */ |
3310
|
|
|
|
|
|
|
|
3311
|
|
|
|
|
|
|
#ifdef SSL_CB_HANDSHAKE_START |
3312
|
22
|
|
|
|
|
|
return SSL_CB_HANDSHAKE_START; |
3313
|
|
|
|
|
|
|
#else |
3314
|
|
|
|
|
|
|
goto not_there; |
3315
|
|
|
|
|
|
|
#endif |
3316
|
|
|
|
|
|
|
|
3317
|
|
|
|
|
|
|
} |
3318
|
0
|
|
|
|
|
|
break; |
3319
|
|
|
|
|
|
|
case 'I': |
3320
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_SSL_FILETYPE", 18)) { |
3321
|
|
|
|
|
|
|
/* ^ */ |
3322
|
|
|
|
|
|
|
|
3323
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_SSL_FILETYPE |
3324
|
1
|
|
|
|
|
|
return SSL_R_BAD_SSL_FILETYPE; |
3325
|
|
|
|
|
|
|
#else |
3326
|
|
|
|
|
|
|
goto not_there; |
3327
|
|
|
|
|
|
|
#endif |
3328
|
|
|
|
|
|
|
|
3329
|
|
|
|
|
|
|
} |
3330
|
0
|
|
|
|
|
|
break; |
3331
|
|
|
|
|
|
|
case 'N': |
3332
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "VERIFY_CLIENT_ONCE", 18)) { |
3333
|
|
|
|
|
|
|
/* ^ */ |
3334
|
|
|
|
|
|
|
|
3335
|
|
|
|
|
|
|
#ifdef SSL_VERIFY_CLIENT_ONCE |
3336
|
1
|
|
|
|
|
|
return SSL_VERIFY_CLIENT_ONCE; |
3337
|
|
|
|
|
|
|
#else |
3338
|
|
|
|
|
|
|
goto not_there; |
3339
|
|
|
|
|
|
|
#endif |
3340
|
|
|
|
|
|
|
|
3341
|
|
|
|
|
|
|
} |
3342
|
0
|
|
|
|
|
|
break; |
3343
|
|
|
|
|
|
|
case 'P': |
3344
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_FILETYPE_ASN1", 18)) { |
3345
|
|
|
|
|
|
|
/* ^ */ |
3346
|
|
|
|
|
|
|
|
3347
|
|
|
|
|
|
|
#ifdef X509_FILETYPE_ASN1 |
3348
|
1
|
|
|
|
|
|
return X509_FILETYPE_ASN1; |
3349
|
|
|
|
|
|
|
#else |
3350
|
|
|
|
|
|
|
goto not_there; |
3351
|
|
|
|
|
|
|
#endif |
3352
|
|
|
|
|
|
|
|
3353
|
|
|
|
|
|
|
} |
3354
|
0
|
|
|
|
|
|
break; |
3355
|
|
|
|
|
|
|
case 'R': |
3356
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_GET_SERVER_HELLO", 18)) { |
3357
|
|
|
|
|
|
|
/* ^ */ |
3358
|
|
|
|
|
|
|
|
3359
|
|
|
|
|
|
|
#ifdef SSL_F_GET_SERVER_HELLO |
3360
|
1
|
|
|
|
|
|
return SSL_F_GET_SERVER_HELLO; |
3361
|
|
|
|
|
|
|
#else |
3362
|
|
|
|
|
|
|
goto not_there; |
3363
|
|
|
|
|
|
|
#endif |
3364
|
|
|
|
|
|
|
|
3365
|
|
|
|
|
|
|
} |
3366
|
0
|
|
|
|
|
|
break; |
3367
|
|
|
|
|
|
|
case 'T': |
3368
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_GET_CLIENT_HELLO", 18)) { |
3369
|
|
|
|
|
|
|
/* ^ */ |
3370
|
|
|
|
|
|
|
|
3371
|
|
|
|
|
|
|
#ifdef SSL_F_GET_CLIENT_HELLO |
3372
|
1
|
|
|
|
|
|
return SSL_F_GET_CLIENT_HELLO; |
3373
|
|
|
|
|
|
|
#else |
3374
|
|
|
|
|
|
|
goto not_there; |
3375
|
|
|
|
|
|
|
#endif |
3376
|
|
|
|
|
|
|
|
3377
|
|
|
|
|
|
|
} |
3378
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_NEXT_PROTO", 18)) { |
3379
|
|
|
|
|
|
|
/* ^ */ |
3380
|
|
|
|
|
|
|
|
3381
|
|
|
|
|
|
|
#ifdef SSL3_MT_NEXT_PROTO |
3382
|
1
|
|
|
|
|
|
return SSL3_MT_NEXT_PROTO; |
3383
|
|
|
|
|
|
|
#else |
3384
|
|
|
|
|
|
|
goto not_there; |
3385
|
|
|
|
|
|
|
#endif |
3386
|
|
|
|
|
|
|
|
3387
|
|
|
|
|
|
|
} |
3388
|
0
|
|
|
|
|
|
break; |
3389
|
|
|
|
|
|
|
case 'X': |
3390
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_COOKIE_EXCHANGE", 18)) { |
3391
|
|
|
|
|
|
|
/* ^ */ |
3392
|
|
|
|
|
|
|
|
3393
|
|
|
|
|
|
|
#ifdef SSL_OP_COOKIE_EXCHANGE |
3394
|
1
|
|
|
|
|
|
return SSL_OP_COOKIE_EXCHANGE; |
3395
|
|
|
|
|
|
|
#else |
3396
|
|
|
|
|
|
|
goto not_there; |
3397
|
|
|
|
|
|
|
#endif |
3398
|
|
|
|
|
|
|
|
3399
|
|
|
|
|
|
|
} |
3400
|
0
|
|
|
|
|
|
break; |
3401
|
|
|
|
|
|
|
case '_': |
3402
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_KEY_UPDATE", 18)) { |
3403
|
|
|
|
|
|
|
/* ^ */ |
3404
|
|
|
|
|
|
|
|
3405
|
|
|
|
|
|
|
#ifdef SSL3_MT_KEY_UPDATE |
3406
|
|
|
|
|
|
|
return SSL3_MT_KEY_UPDATE; |
3407
|
|
|
|
|
|
|
#else |
3408
|
1
|
|
|
|
|
|
goto not_there; |
3409
|
|
|
|
|
|
|
#endif |
3410
|
|
|
|
|
|
|
|
3411
|
|
|
|
|
|
|
} |
3412
|
0
|
|
|
|
|
|
break; |
3413
|
|
|
|
|
|
|
case 'r': |
3414
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_dhKeyAgreement", 18)) { |
3415
|
|
|
|
|
|
|
/* ^ */ |
3416
|
|
|
|
|
|
|
|
3417
|
|
|
|
|
|
|
#ifdef NID_dhKeyAgreement |
3418
|
1
|
|
|
|
|
|
return NID_dhKeyAgreement; |
3419
|
|
|
|
|
|
|
#else |
3420
|
|
|
|
|
|
|
goto not_there; |
3421
|
|
|
|
|
|
|
#endif |
3422
|
|
|
|
|
|
|
|
3423
|
|
|
|
|
|
|
} |
3424
|
0
|
|
|
|
|
|
break; |
3425
|
|
|
|
|
|
|
} |
3426
|
0
|
|
|
|
|
|
break; |
3427
|
|
|
|
|
|
|
case 19: |
3428
|
|
|
|
|
|
|
/* Names all of length 19. */ |
3429
|
|
|
|
|
|
|
/* F_CLIENT_MASTER_KEY F_GET_SERVER_VERIFY NID_invalidity_date |
3430
|
|
|
|
|
|
|
NID_issuer_alt_name NID_pkcs7_encrypted NID_pkcs7_enveloped |
3431
|
|
|
|
|
|
|
NID_rle_compression NID_safeContentsBag NID_sdsiCertificate |
3432
|
|
|
|
|
|
|
NID_x509Certificate OPENSSL_ENGINES_DIR OPENSSL_MODULES_DIR |
3433
|
|
|
|
|
|
|
OP_ALLOW_NO_DHE_KEX OP_CISCO_ANYCONNECT OP_NON_EXPORT_FIRST |
3434
|
|
|
|
|
|
|
OP_NO_RENEGOTIATION OP_TLS_ROLLBACK_BUG SSL3_MT_CERTIFICATE |
3435
|
|
|
|
|
|
|
SSL3_MT_SERVER_DONE */ |
3436
|
|
|
|
|
|
|
/* Offset 12 gives the best switch position. */ |
3437
|
22
|
|
|
|
|
|
switch (name[12]) { |
3438
|
|
|
|
|
|
|
case 'A': |
3439
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_TLS_ROLLBACK_BUG", 19)) { |
3440
|
|
|
|
|
|
|
/* ^ */ |
3441
|
|
|
|
|
|
|
|
3442
|
|
|
|
|
|
|
#ifdef SSL_OP_TLS_ROLLBACK_BUG |
3443
|
1
|
|
|
|
|
|
return SSL_OP_TLS_ROLLBACK_BUG; |
3444
|
|
|
|
|
|
|
#else |
3445
|
|
|
|
|
|
|
goto not_there; |
3446
|
|
|
|
|
|
|
#endif |
3447
|
|
|
|
|
|
|
|
3448
|
|
|
|
|
|
|
} |
3449
|
0
|
|
|
|
|
|
break; |
3450
|
|
|
|
|
|
|
case 'C': |
3451
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_CISCO_ANYCONNECT", 19)) { |
3452
|
|
|
|
|
|
|
/* ^ */ |
3453
|
|
|
|
|
|
|
|
3454
|
|
|
|
|
|
|
#ifdef SSL_OP_CISCO_ANYCONNECT |
3455
|
1
|
|
|
|
|
|
return SSL_OP_CISCO_ANYCONNECT; |
3456
|
|
|
|
|
|
|
#else |
3457
|
|
|
|
|
|
|
goto not_there; |
3458
|
|
|
|
|
|
|
#endif |
3459
|
|
|
|
|
|
|
|
3460
|
|
|
|
|
|
|
} |
3461
|
0
|
|
|
|
|
|
break; |
3462
|
|
|
|
|
|
|
case 'D': |
3463
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_ALLOW_NO_DHE_KEX", 19)) { |
3464
|
|
|
|
|
|
|
/* ^ */ |
3465
|
|
|
|
|
|
|
|
3466
|
|
|
|
|
|
|
#ifdef SSL_OP_ALLOW_NO_DHE_KEX |
3467
|
|
|
|
|
|
|
return SSL_OP_ALLOW_NO_DHE_KEX; |
3468
|
|
|
|
|
|
|
#else |
3469
|
1
|
|
|
|
|
|
goto not_there; |
3470
|
|
|
|
|
|
|
#endif |
3471
|
|
|
|
|
|
|
|
3472
|
|
|
|
|
|
|
} |
3473
|
0
|
|
|
|
|
|
break; |
3474
|
|
|
|
|
|
|
case 'E': |
3475
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_SERVER_DONE", 19)) { |
3476
|
|
|
|
|
|
|
/* ^ */ |
3477
|
|
|
|
|
|
|
|
3478
|
|
|
|
|
|
|
#ifdef SSL3_MT_SERVER_DONE |
3479
|
1
|
|
|
|
|
|
return SSL3_MT_SERVER_DONE; |
3480
|
|
|
|
|
|
|
#else |
3481
|
|
|
|
|
|
|
goto not_there; |
3482
|
|
|
|
|
|
|
#endif |
3483
|
|
|
|
|
|
|
|
3484
|
|
|
|
|
|
|
} |
3485
|
0
|
|
|
|
|
|
break; |
3486
|
|
|
|
|
|
|
case 'I': |
3487
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CERTIFICATE", 19)) { |
3488
|
|
|
|
|
|
|
/* ^ */ |
3489
|
|
|
|
|
|
|
|
3490
|
|
|
|
|
|
|
#ifdef SSL3_MT_CERTIFICATE |
3491
|
1
|
|
|
|
|
|
return SSL3_MT_CERTIFICATE; |
3492
|
|
|
|
|
|
|
#else |
3493
|
|
|
|
|
|
|
goto not_there; |
3494
|
|
|
|
|
|
|
#endif |
3495
|
|
|
|
|
|
|
|
3496
|
|
|
|
|
|
|
} |
3497
|
0
|
|
|
|
|
|
break; |
3498
|
|
|
|
|
|
|
case 'L': |
3499
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_MODULES_DIR", 19)) { |
3500
|
|
|
|
|
|
|
/* ^ */ |
3501
|
|
|
|
|
|
|
|
3502
|
|
|
|
|
|
|
#ifdef OPENSSL_MODULES_DIR |
3503
|
|
|
|
|
|
|
return OPENSSL_MODULES_DIR; |
3504
|
|
|
|
|
|
|
#else |
3505
|
2
|
|
|
|
|
|
goto not_there; |
3506
|
|
|
|
|
|
|
#endif |
3507
|
|
|
|
|
|
|
|
3508
|
|
|
|
|
|
|
} |
3509
|
0
|
|
|
|
|
|
break; |
3510
|
|
|
|
|
|
|
case 'N': |
3511
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_ENGINES_DIR", 19)) { |
3512
|
|
|
|
|
|
|
/* ^ */ |
3513
|
|
|
|
|
|
|
|
3514
|
|
|
|
|
|
|
#ifdef OPENSSL_ENGINES_DIR |
3515
|
|
|
|
|
|
|
return OPENSSL_ENGINES_DIR; |
3516
|
|
|
|
|
|
|
#else |
3517
|
1
|
|
|
|
|
|
goto not_there; |
3518
|
|
|
|
|
|
|
#endif |
3519
|
|
|
|
|
|
|
|
3520
|
|
|
|
|
|
|
} |
3521
|
0
|
|
|
|
|
|
break; |
3522
|
|
|
|
|
|
|
case 'T': |
3523
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_CLIENT_MASTER_KEY", 19)) { |
3524
|
|
|
|
|
|
|
/* ^ */ |
3525
|
|
|
|
|
|
|
|
3526
|
|
|
|
|
|
|
#ifdef SSL_F_CLIENT_MASTER_KEY |
3527
|
1
|
|
|
|
|
|
return SSL_F_CLIENT_MASTER_KEY; |
3528
|
|
|
|
|
|
|
#else |
3529
|
|
|
|
|
|
|
goto not_there; |
3530
|
|
|
|
|
|
|
#endif |
3531
|
|
|
|
|
|
|
|
3532
|
|
|
|
|
|
|
} |
3533
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_NON_EXPORT_FIRST", 19)) { |
3534
|
|
|
|
|
|
|
/* ^ */ |
3535
|
|
|
|
|
|
|
|
3536
|
|
|
|
|
|
|
#ifdef SSL_OP_NON_EXPORT_FIRST |
3537
|
|
|
|
|
|
|
return SSL_OP_NON_EXPORT_FIRST; |
3538
|
|
|
|
|
|
|
#else |
3539
|
1
|
|
|
|
|
|
goto not_there; |
3540
|
|
|
|
|
|
|
#endif |
3541
|
|
|
|
|
|
|
|
3542
|
|
|
|
|
|
|
} |
3543
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_RENEGOTIATION", 19)) { |
3544
|
|
|
|
|
|
|
/* ^ */ |
3545
|
|
|
|
|
|
|
|
3546
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_RENEGOTIATION |
3547
|
|
|
|
|
|
|
return SSL_OP_NO_RENEGOTIATION; |
3548
|
|
|
|
|
|
|
#else |
3549
|
1
|
|
|
|
|
|
goto not_there; |
3550
|
|
|
|
|
|
|
#endif |
3551
|
|
|
|
|
|
|
|
3552
|
|
|
|
|
|
|
} |
3553
|
0
|
|
|
|
|
|
break; |
3554
|
|
|
|
|
|
|
case '_': |
3555
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_GET_SERVER_VERIFY", 19)) { |
3556
|
|
|
|
|
|
|
/* ^ */ |
3557
|
|
|
|
|
|
|
|
3558
|
|
|
|
|
|
|
#ifdef SSL_F_GET_SERVER_VERIFY |
3559
|
1
|
|
|
|
|
|
return SSL_F_GET_SERVER_VERIFY; |
3560
|
|
|
|
|
|
|
#else |
3561
|
|
|
|
|
|
|
goto not_there; |
3562
|
|
|
|
|
|
|
#endif |
3563
|
|
|
|
|
|
|
|
3564
|
|
|
|
|
|
|
} |
3565
|
0
|
|
|
|
|
|
break; |
3566
|
|
|
|
|
|
|
case 'c': |
3567
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_encrypted", 19)) { |
3568
|
|
|
|
|
|
|
/* ^ */ |
3569
|
|
|
|
|
|
|
|
3570
|
|
|
|
|
|
|
#ifdef NID_pkcs7_encrypted |
3571
|
1
|
|
|
|
|
|
return NID_pkcs7_encrypted; |
3572
|
|
|
|
|
|
|
#else |
3573
|
|
|
|
|
|
|
goto not_there; |
3574
|
|
|
|
|
|
|
#endif |
3575
|
|
|
|
|
|
|
|
3576
|
|
|
|
|
|
|
} |
3577
|
0
|
|
|
|
|
|
break; |
3578
|
|
|
|
|
|
|
case 'e': |
3579
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_safeContentsBag", 19)) { |
3580
|
|
|
|
|
|
|
/* ^ */ |
3581
|
|
|
|
|
|
|
|
3582
|
|
|
|
|
|
|
#ifdef NID_safeContentsBag |
3583
|
1
|
|
|
|
|
|
return NID_safeContentsBag; |
3584
|
|
|
|
|
|
|
#else |
3585
|
|
|
|
|
|
|
goto not_there; |
3586
|
|
|
|
|
|
|
#endif |
3587
|
|
|
|
|
|
|
|
3588
|
|
|
|
|
|
|
} |
3589
|
0
|
|
|
|
|
|
break; |
3590
|
|
|
|
|
|
|
case 'i': |
3591
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_sdsiCertificate", 19)) { |
3592
|
|
|
|
|
|
|
/* ^ */ |
3593
|
|
|
|
|
|
|
|
3594
|
|
|
|
|
|
|
#ifdef NID_sdsiCertificate |
3595
|
1
|
|
|
|
|
|
return NID_sdsiCertificate; |
3596
|
|
|
|
|
|
|
#else |
3597
|
|
|
|
|
|
|
goto not_there; |
3598
|
|
|
|
|
|
|
#endif |
3599
|
|
|
|
|
|
|
|
3600
|
|
|
|
|
|
|
} |
3601
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_x509Certificate", 19)) { |
3602
|
|
|
|
|
|
|
/* ^ */ |
3603
|
|
|
|
|
|
|
|
3604
|
|
|
|
|
|
|
#ifdef NID_x509Certificate |
3605
|
1
|
|
|
|
|
|
return NID_x509Certificate; |
3606
|
|
|
|
|
|
|
#else |
3607
|
|
|
|
|
|
|
goto not_there; |
3608
|
|
|
|
|
|
|
#endif |
3609
|
|
|
|
|
|
|
|
3610
|
|
|
|
|
|
|
} |
3611
|
0
|
|
|
|
|
|
break; |
3612
|
|
|
|
|
|
|
case 'l': |
3613
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_issuer_alt_name", 19)) { |
3614
|
|
|
|
|
|
|
/* ^ */ |
3615
|
|
|
|
|
|
|
|
3616
|
|
|
|
|
|
|
#ifdef NID_issuer_alt_name |
3617
|
1
|
|
|
|
|
|
return NID_issuer_alt_name; |
3618
|
|
|
|
|
|
|
#else |
3619
|
|
|
|
|
|
|
goto not_there; |
3620
|
|
|
|
|
|
|
#endif |
3621
|
|
|
|
|
|
|
|
3622
|
|
|
|
|
|
|
} |
3623
|
0
|
|
|
|
|
|
break; |
3624
|
|
|
|
|
|
|
case 'r': |
3625
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rle_compression", 19)) { |
3626
|
|
|
|
|
|
|
/* ^ */ |
3627
|
|
|
|
|
|
|
|
3628
|
|
|
|
|
|
|
#ifdef NID_rle_compression |
3629
|
1
|
|
|
|
|
|
return NID_rle_compression; |
3630
|
|
|
|
|
|
|
#else |
3631
|
|
|
|
|
|
|
goto not_there; |
3632
|
|
|
|
|
|
|
#endif |
3633
|
|
|
|
|
|
|
|
3634
|
|
|
|
|
|
|
} |
3635
|
0
|
|
|
|
|
|
break; |
3636
|
|
|
|
|
|
|
case 't': |
3637
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_invalidity_date", 19)) { |
3638
|
|
|
|
|
|
|
/* ^ */ |
3639
|
|
|
|
|
|
|
|
3640
|
|
|
|
|
|
|
#ifdef NID_invalidity_date |
3641
|
1
|
|
|
|
|
|
return NID_invalidity_date; |
3642
|
|
|
|
|
|
|
#else |
3643
|
|
|
|
|
|
|
goto not_there; |
3644
|
|
|
|
|
|
|
#endif |
3645
|
|
|
|
|
|
|
|
3646
|
|
|
|
|
|
|
} |
3647
|
0
|
|
|
|
|
|
break; |
3648
|
|
|
|
|
|
|
case 'v': |
3649
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_enveloped", 19)) { |
3650
|
|
|
|
|
|
|
/* ^ */ |
3651
|
|
|
|
|
|
|
|
3652
|
|
|
|
|
|
|
#ifdef NID_pkcs7_enveloped |
3653
|
1
|
|
|
|
|
|
return NID_pkcs7_enveloped; |
3654
|
|
|
|
|
|
|
#else |
3655
|
|
|
|
|
|
|
goto not_there; |
3656
|
|
|
|
|
|
|
#endif |
3657
|
|
|
|
|
|
|
|
3658
|
|
|
|
|
|
|
} |
3659
|
0
|
|
|
|
|
|
break; |
3660
|
|
|
|
|
|
|
} |
3661
|
2
|
|
|
|
|
|
break; |
3662
|
|
|
|
|
|
|
case 20: |
3663
|
|
|
|
|
|
|
/* Names all of length 20. */ |
3664
|
|
|
|
|
|
|
/* ASN1_STRFLGS_ESC_MSB ASN1_STRFLGS_RFC2253 F_CLIENT_CERTIFICATE |
3665
|
|
|
|
|
|
|
F_SSL_USE_PRIVATEKEY MODE_RELEASE_BUFFERS NID_netscape_comment |
3666
|
|
|
|
|
|
|
NID_organizationName NID_ripemd160WithRSA NID_subject_alt_name |
3667
|
|
|
|
|
|
|
NID_uniqueIdentifier NID_zlib_compression OP_PRIORITIZE_CHACHA |
3668
|
|
|
|
|
|
|
R_NO_CERTIFICATE_SET SESSION_ASN1_VERSION SSL2_MT_CLIENT_HELLO |
3669
|
|
|
|
|
|
|
SSL2_MT_SERVER_HELLO SSL3_MT_CLIENT_HELLO SSL3_MT_MESSAGE_HASH |
3670
|
|
|
|
|
|
|
SSL3_MT_SERVER_HELLO X509_TRUST_OCSP_SIGN X509_V_ERR_PATH_LOOP */ |
3671
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
3672
|
22
|
|
|
|
|
|
switch (name[13]) { |
3673
|
|
|
|
|
|
|
case 'A': |
3674
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_CERTIFICATE_SET", 20)) { |
3675
|
|
|
|
|
|
|
/* ^ */ |
3676
|
|
|
|
|
|
|
|
3677
|
|
|
|
|
|
|
#ifdef SSL_R_NO_CERTIFICATE_SET |
3678
|
1
|
|
|
|
|
|
return SSL_R_NO_CERTIFICATE_SET; |
3679
|
|
|
|
|
|
|
#else |
3680
|
|
|
|
|
|
|
goto not_there; |
3681
|
|
|
|
|
|
|
#endif |
3682
|
|
|
|
|
|
|
|
3683
|
|
|
|
|
|
|
} |
3684
|
0
|
|
|
|
|
|
break; |
3685
|
|
|
|
|
|
|
case 'B': |
3686
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MODE_RELEASE_BUFFERS", 20)) { |
3687
|
|
|
|
|
|
|
/* ^ */ |
3688
|
|
|
|
|
|
|
|
3689
|
|
|
|
|
|
|
#ifdef SSL_MODE_RELEASE_BUFFERS |
3690
|
1
|
|
|
|
|
|
return SSL_MODE_RELEASE_BUFFERS; |
3691
|
|
|
|
|
|
|
#else |
3692
|
|
|
|
|
|
|
goto not_there; |
3693
|
|
|
|
|
|
|
#endif |
3694
|
|
|
|
|
|
|
|
3695
|
|
|
|
|
|
|
} |
3696
|
0
|
|
|
|
|
|
break; |
3697
|
|
|
|
|
|
|
case 'E': |
3698
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ASN1_STRFLGS_ESC_MSB", 20)) { |
3699
|
|
|
|
|
|
|
/* ^ */ |
3700
|
|
|
|
|
|
|
|
3701
|
|
|
|
|
|
|
#ifdef ASN1_STRFLGS_ESC_MSB |
3702
|
1
|
|
|
|
|
|
return ASN1_STRFLGS_ESC_MSB; |
3703
|
|
|
|
|
|
|
#else |
3704
|
|
|
|
|
|
|
goto not_there; |
3705
|
|
|
|
|
|
|
#endif |
3706
|
|
|
|
|
|
|
|
3707
|
|
|
|
|
|
|
} |
3708
|
0
|
|
|
|
|
|
break; |
3709
|
|
|
|
|
|
|
case 'G': |
3710
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_MESSAGE_HASH", 20)) { |
3711
|
|
|
|
|
|
|
/* ^ */ |
3712
|
|
|
|
|
|
|
|
3713
|
|
|
|
|
|
|
#ifdef SSL3_MT_MESSAGE_HASH |
3714
|
|
|
|
|
|
|
return SSL3_MT_MESSAGE_HASH; |
3715
|
|
|
|
|
|
|
#else |
3716
|
1
|
|
|
|
|
|
goto not_there; |
3717
|
|
|
|
|
|
|
#endif |
3718
|
|
|
|
|
|
|
|
3719
|
|
|
|
|
|
|
} |
3720
|
0
|
|
|
|
|
|
break; |
3721
|
|
|
|
|
|
|
case 'I': |
3722
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_CLIENT_CERTIFICATE", 20)) { |
3723
|
|
|
|
|
|
|
/* ^ */ |
3724
|
|
|
|
|
|
|
|
3725
|
|
|
|
|
|
|
#ifdef SSL_F_CLIENT_CERTIFICATE |
3726
|
1
|
|
|
|
|
|
return SSL_F_CLIENT_CERTIFICATE; |
3727
|
|
|
|
|
|
|
#else |
3728
|
|
|
|
|
|
|
goto not_there; |
3729
|
|
|
|
|
|
|
#endif |
3730
|
|
|
|
|
|
|
|
3731
|
|
|
|
|
|
|
} |
3732
|
0
|
|
|
|
|
|
break; |
3733
|
|
|
|
|
|
|
case 'R': |
3734
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "ASN1_STRFLGS_RFC2253", 20)) { |
3735
|
|
|
|
|
|
|
/* ^ */ |
3736
|
|
|
|
|
|
|
|
3737
|
|
|
|
|
|
|
#ifdef ASN1_STRFLGS_RFC2253 |
3738
|
1
|
|
|
|
|
|
return ASN1_STRFLGS_RFC2253; |
3739
|
|
|
|
|
|
|
#else |
3740
|
|
|
|
|
|
|
goto not_there; |
3741
|
|
|
|
|
|
|
#endif |
3742
|
|
|
|
|
|
|
|
3743
|
|
|
|
|
|
|
} |
3744
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_SERVER_HELLO", 20)) { |
3745
|
|
|
|
|
|
|
/* ^ */ |
3746
|
|
|
|
|
|
|
|
3747
|
|
|
|
|
|
|
#ifdef SSL2_MT_SERVER_HELLO |
3748
|
1
|
|
|
|
|
|
return SSL2_MT_SERVER_HELLO; |
3749
|
|
|
|
|
|
|
#else |
3750
|
|
|
|
|
|
|
goto not_there; |
3751
|
|
|
|
|
|
|
#endif |
3752
|
|
|
|
|
|
|
|
3753
|
|
|
|
|
|
|
} |
3754
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_SERVER_HELLO", 20)) { |
3755
|
|
|
|
|
|
|
/* ^ */ |
3756
|
|
|
|
|
|
|
|
3757
|
|
|
|
|
|
|
#ifdef SSL3_MT_SERVER_HELLO |
3758
|
1
|
|
|
|
|
|
return SSL3_MT_SERVER_HELLO; |
3759
|
|
|
|
|
|
|
#else |
3760
|
|
|
|
|
|
|
goto not_there; |
3761
|
|
|
|
|
|
|
#endif |
3762
|
|
|
|
|
|
|
|
3763
|
|
|
|
|
|
|
} |
3764
|
0
|
|
|
|
|
|
break; |
3765
|
|
|
|
|
|
|
case 'S': |
3766
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_OCSP_SIGN", 20)) { |
3767
|
|
|
|
|
|
|
/* ^ */ |
3768
|
|
|
|
|
|
|
|
3769
|
|
|
|
|
|
|
#ifdef X509_TRUST_OCSP_SIGN |
3770
|
1
|
|
|
|
|
|
return X509_TRUST_OCSP_SIGN; |
3771
|
|
|
|
|
|
|
#else |
3772
|
|
|
|
|
|
|
goto not_there; |
3773
|
|
|
|
|
|
|
#endif |
3774
|
|
|
|
|
|
|
|
3775
|
|
|
|
|
|
|
} |
3776
|
0
|
|
|
|
|
|
break; |
3777
|
|
|
|
|
|
|
case 'T': |
3778
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_CLIENT_HELLO", 20)) { |
3779
|
|
|
|
|
|
|
/* ^ */ |
3780
|
|
|
|
|
|
|
|
3781
|
|
|
|
|
|
|
#ifdef SSL2_MT_CLIENT_HELLO |
3782
|
1
|
|
|
|
|
|
return SSL2_MT_CLIENT_HELLO; |
3783
|
|
|
|
|
|
|
#else |
3784
|
|
|
|
|
|
|
goto not_there; |
3785
|
|
|
|
|
|
|
#endif |
3786
|
|
|
|
|
|
|
|
3787
|
|
|
|
|
|
|
} |
3788
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CLIENT_HELLO", 20)) { |
3789
|
|
|
|
|
|
|
/* ^ */ |
3790
|
|
|
|
|
|
|
|
3791
|
|
|
|
|
|
|
#ifdef SSL3_MT_CLIENT_HELLO |
3792
|
1
|
|
|
|
|
|
return SSL3_MT_CLIENT_HELLO; |
3793
|
|
|
|
|
|
|
#else |
3794
|
|
|
|
|
|
|
goto not_there; |
3795
|
|
|
|
|
|
|
#endif |
3796
|
|
|
|
|
|
|
|
3797
|
|
|
|
|
|
|
} |
3798
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PATH_LOOP", 20)) { |
3799
|
|
|
|
|
|
|
/* ^ */ |
3800
|
|
|
|
|
|
|
|
3801
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PATH_LOOP |
3802
|
|
|
|
|
|
|
return X509_V_ERR_PATH_LOOP; |
3803
|
|
|
|
|
|
|
#else |
3804
|
1
|
|
|
|
|
|
goto not_there; |
3805
|
|
|
|
|
|
|
#endif |
3806
|
|
|
|
|
|
|
|
3807
|
|
|
|
|
|
|
} |
3808
|
0
|
|
|
|
|
|
break; |
3809
|
|
|
|
|
|
|
case 'V': |
3810
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_PRIVATEKEY", 20)) { |
3811
|
|
|
|
|
|
|
/* ^ */ |
3812
|
|
|
|
|
|
|
|
3813
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_PRIVATEKEY |
3814
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_PRIVATEKEY; |
3815
|
|
|
|
|
|
|
#else |
3816
|
|
|
|
|
|
|
goto not_there; |
3817
|
|
|
|
|
|
|
#endif |
3818
|
|
|
|
|
|
|
|
3819
|
|
|
|
|
|
|
} |
3820
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESSION_ASN1_VERSION", 20)) { |
3821
|
|
|
|
|
|
|
/* ^ */ |
3822
|
|
|
|
|
|
|
|
3823
|
|
|
|
|
|
|
#ifdef SSL_SESSION_ASN1_VERSION |
3824
|
1
|
|
|
|
|
|
return SSL_SESSION_ASN1_VERSION; |
3825
|
|
|
|
|
|
|
#else |
3826
|
|
|
|
|
|
|
goto not_there; |
3827
|
|
|
|
|
|
|
#endif |
3828
|
|
|
|
|
|
|
|
3829
|
|
|
|
|
|
|
} |
3830
|
0
|
|
|
|
|
|
break; |
3831
|
|
|
|
|
|
|
case 'W': |
3832
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ripemd160WithRSA", 20)) { |
3833
|
|
|
|
|
|
|
/* ^ */ |
3834
|
|
|
|
|
|
|
|
3835
|
|
|
|
|
|
|
#ifdef NID_ripemd160WithRSA |
3836
|
1
|
|
|
|
|
|
return NID_ripemd160WithRSA; |
3837
|
|
|
|
|
|
|
#else |
3838
|
|
|
|
|
|
|
goto not_there; |
3839
|
|
|
|
|
|
|
#endif |
3840
|
|
|
|
|
|
|
|
3841
|
|
|
|
|
|
|
} |
3842
|
0
|
|
|
|
|
|
break; |
3843
|
|
|
|
|
|
|
case '_': |
3844
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_PRIORITIZE_CHACHA", 20)) { |
3845
|
|
|
|
|
|
|
/* ^ */ |
3846
|
|
|
|
|
|
|
|
3847
|
|
|
|
|
|
|
#ifdef SSL_OP_PRIORITIZE_CHACHA |
3848
|
|
|
|
|
|
|
return SSL_OP_PRIORITIZE_CHACHA; |
3849
|
|
|
|
|
|
|
#else |
3850
|
1
|
|
|
|
|
|
goto not_there; |
3851
|
|
|
|
|
|
|
#endif |
3852
|
|
|
|
|
|
|
|
3853
|
|
|
|
|
|
|
} |
3854
|
0
|
|
|
|
|
|
break; |
3855
|
|
|
|
|
|
|
case 'c': |
3856
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_comment", 20)) { |
3857
|
|
|
|
|
|
|
/* ^ */ |
3858
|
|
|
|
|
|
|
|
3859
|
|
|
|
|
|
|
#ifdef NID_netscape_comment |
3860
|
1
|
|
|
|
|
|
return NID_netscape_comment; |
3861
|
|
|
|
|
|
|
#else |
3862
|
|
|
|
|
|
|
goto not_there; |
3863
|
|
|
|
|
|
|
#endif |
3864
|
|
|
|
|
|
|
|
3865
|
|
|
|
|
|
|
} |
3866
|
0
|
|
|
|
|
|
break; |
3867
|
|
|
|
|
|
|
case 'i': |
3868
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_organizationName", 20)) { |
3869
|
|
|
|
|
|
|
/* ^ */ |
3870
|
|
|
|
|
|
|
|
3871
|
|
|
|
|
|
|
#ifdef NID_organizationName |
3872
|
1
|
|
|
|
|
|
return NID_organizationName; |
3873
|
|
|
|
|
|
|
#else |
3874
|
|
|
|
|
|
|
goto not_there; |
3875
|
|
|
|
|
|
|
#endif |
3876
|
|
|
|
|
|
|
|
3877
|
|
|
|
|
|
|
} |
3878
|
0
|
|
|
|
|
|
break; |
3879
|
|
|
|
|
|
|
case 'l': |
3880
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_subject_alt_name", 20)) { |
3881
|
|
|
|
|
|
|
/* ^ */ |
3882
|
|
|
|
|
|
|
|
3883
|
|
|
|
|
|
|
#ifdef NID_subject_alt_name |
3884
|
2
|
|
|
|
|
|
return NID_subject_alt_name; |
3885
|
|
|
|
|
|
|
#else |
3886
|
|
|
|
|
|
|
goto not_there; |
3887
|
|
|
|
|
|
|
#endif |
3888
|
|
|
|
|
|
|
|
3889
|
|
|
|
|
|
|
} |
3890
|
0
|
|
|
|
|
|
break; |
3891
|
|
|
|
|
|
|
case 'n': |
3892
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_uniqueIdentifier", 20)) { |
3893
|
|
|
|
|
|
|
/* ^ */ |
3894
|
|
|
|
|
|
|
|
3895
|
|
|
|
|
|
|
#ifdef NID_uniqueIdentifier |
3896
|
|
|
|
|
|
|
return NID_uniqueIdentifier; |
3897
|
|
|
|
|
|
|
#else |
3898
|
1
|
|
|
|
|
|
goto not_there; |
3899
|
|
|
|
|
|
|
#endif |
3900
|
|
|
|
|
|
|
|
3901
|
|
|
|
|
|
|
} |
3902
|
0
|
|
|
|
|
|
break; |
3903
|
|
|
|
|
|
|
case 'r': |
3904
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_zlib_compression", 20)) { |
3905
|
|
|
|
|
|
|
/* ^ */ |
3906
|
|
|
|
|
|
|
|
3907
|
|
|
|
|
|
|
#ifdef NID_zlib_compression |
3908
|
1
|
|
|
|
|
|
return NID_zlib_compression; |
3909
|
|
|
|
|
|
|
#else |
3910
|
|
|
|
|
|
|
goto not_there; |
3911
|
|
|
|
|
|
|
#endif |
3912
|
|
|
|
|
|
|
|
3913
|
|
|
|
|
|
|
} |
3914
|
0
|
|
|
|
|
|
break; |
3915
|
|
|
|
|
|
|
} |
3916
|
0
|
|
|
|
|
|
break; |
3917
|
|
|
|
|
|
|
case 21: |
3918
|
|
|
|
|
|
|
/* Names all of length 21. */ |
3919
|
|
|
|
|
|
|
/* ASN1_STRFLGS_ESC_CTRL F_GET_CLIENT_FINISHED F_GET_SERVER_FINISHED |
3920
|
|
|
|
|
|
|
F_REQUEST_CERTIFICATE F_SSL_GET_NEW_SESSION F_SSL_USE_CERTIFICATE |
3921
|
|
|
|
|
|
|
NID_SMIMECapabilities NID_basic_constraints NID_netscape_base_url |
3922
|
|
|
|
|
|
|
NID_pkcs9_contentType NID_pkcs9_signingTime OPENSSL_VERSION_MAJOR |
3923
|
|
|
|
|
|
|
OPENSSL_VERSION_MINOR OPENSSL_VERSION_PATCH OP_NETSCAPE_CA_DN_BUG |
3924
|
|
|
|
|
|
|
SSL2_MT_SERVER_VERIFY SSL3_MT_HELLO_REQUEST VERIFY_POST_HANDSHAKE |
3925
|
|
|
|
|
|
|
X509_FILETYPE_DEFAULT X509_PURPOSE_CRL_SIGN X509_TRUST_SSL_CLIENT |
3926
|
|
|
|
|
|
|
X509_TRUST_SSL_SERVER X509_V_ERR_INVALID_CA X509_V_ERR_OUT_OF_MEM |
3927
|
|
|
|
|
|
|
X509_V_FLAG_CRL_CHECK XN_FLAG_SEP_CPLUS_SPC XN_FLAG_SEP_MULTILINE |
3928
|
|
|
|
|
|
|
XN_FLAG_SEP_SPLUS_SPC */ |
3929
|
|
|
|
|
|
|
/* Offset 19 gives the best switch position. */ |
3930
|
29
|
|
|
|
|
|
switch (name[19]) { |
3931
|
|
|
|
|
|
|
case 'C': |
3932
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSION_PATCH", 21)) { |
3933
|
|
|
|
|
|
|
/* ^ */ |
3934
|
|
|
|
|
|
|
|
3935
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION_PATCH |
3936
|
|
|
|
|
|
|
return OPENSSL_VERSION_PATCH; |
3937
|
|
|
|
|
|
|
#else |
3938
|
1
|
|
|
|
|
|
goto not_there; |
3939
|
|
|
|
|
|
|
#endif |
3940
|
|
|
|
|
|
|
|
3941
|
|
|
|
|
|
|
} |
3942
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_CA", 21)) { |
3943
|
|
|
|
|
|
|
/* ^ */ |
3944
|
|
|
|
|
|
|
|
3945
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_CA |
3946
|
1
|
|
|
|
|
|
return X509_V_ERR_INVALID_CA; |
3947
|
|
|
|
|
|
|
#else |
3948
|
|
|
|
|
|
|
goto not_there; |
3949
|
|
|
|
|
|
|
#endif |
3950
|
|
|
|
|
|
|
|
3951
|
|
|
|
|
|
|
} |
3952
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_CRL_CHECK", 21)) { |
3953
|
|
|
|
|
|
|
/* ^ */ |
3954
|
|
|
|
|
|
|
|
3955
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_CRL_CHECK |
3956
|
1
|
|
|
|
|
|
return X509_V_FLAG_CRL_CHECK; |
3957
|
|
|
|
|
|
|
#else |
3958
|
|
|
|
|
|
|
goto not_there; |
3959
|
|
|
|
|
|
|
#endif |
3960
|
|
|
|
|
|
|
|
3961
|
|
|
|
|
|
|
} |
3962
|
0
|
|
|
|
|
|
break; |
3963
|
|
|
|
|
|
|
case 'E': |
3964
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "F_GET_CLIENT_FINISHED", 21)) { |
3965
|
|
|
|
|
|
|
/* ^ */ |
3966
|
|
|
|
|
|
|
|
3967
|
|
|
|
|
|
|
#ifdef SSL_F_GET_CLIENT_FINISHED |
3968
|
1
|
|
|
|
|
|
return SSL_F_GET_CLIENT_FINISHED; |
3969
|
|
|
|
|
|
|
#else |
3970
|
|
|
|
|
|
|
goto not_there; |
3971
|
|
|
|
|
|
|
#endif |
3972
|
|
|
|
|
|
|
|
3973
|
|
|
|
|
|
|
} |
3974
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_GET_SERVER_FINISHED", 21)) { |
3975
|
|
|
|
|
|
|
/* ^ */ |
3976
|
|
|
|
|
|
|
|
3977
|
|
|
|
|
|
|
#ifdef SSL_F_GET_SERVER_FINISHED |
3978
|
1
|
|
|
|
|
|
return SSL_F_GET_SERVER_FINISHED; |
3979
|
|
|
|
|
|
|
#else |
3980
|
|
|
|
|
|
|
goto not_there; |
3981
|
|
|
|
|
|
|
#endif |
3982
|
|
|
|
|
|
|
|
3983
|
|
|
|
|
|
|
} |
3984
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_SSL_SERVER", 21)) { |
3985
|
|
|
|
|
|
|
/* ^ */ |
3986
|
|
|
|
|
|
|
|
3987
|
|
|
|
|
|
|
#ifdef X509_TRUST_SSL_SERVER |
3988
|
1
|
|
|
|
|
|
return X509_TRUST_SSL_SERVER; |
3989
|
|
|
|
|
|
|
#else |
3990
|
|
|
|
|
|
|
goto not_there; |
3991
|
|
|
|
|
|
|
#endif |
3992
|
|
|
|
|
|
|
|
3993
|
|
|
|
|
|
|
} |
3994
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_OUT_OF_MEM", 21)) { |
3995
|
|
|
|
|
|
|
/* ^ */ |
3996
|
|
|
|
|
|
|
|
3997
|
|
|
|
|
|
|
#ifdef X509_V_ERR_OUT_OF_MEM |
3998
|
1
|
|
|
|
|
|
return X509_V_ERR_OUT_OF_MEM; |
3999
|
|
|
|
|
|
|
#else |
4000
|
|
|
|
|
|
|
goto not_there; |
4001
|
|
|
|
|
|
|
#endif |
4002
|
|
|
|
|
|
|
|
4003
|
|
|
|
|
|
|
} |
4004
|
0
|
|
|
|
|
|
break; |
4005
|
|
|
|
|
|
|
case 'F': |
4006
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_SERVER_VERIFY", 21)) { |
4007
|
|
|
|
|
|
|
/* ^ */ |
4008
|
|
|
|
|
|
|
|
4009
|
|
|
|
|
|
|
#ifdef SSL2_MT_SERVER_VERIFY |
4010
|
1
|
|
|
|
|
|
return SSL2_MT_SERVER_VERIFY; |
4011
|
|
|
|
|
|
|
#else |
4012
|
|
|
|
|
|
|
goto not_there; |
4013
|
|
|
|
|
|
|
#endif |
4014
|
|
|
|
|
|
|
|
4015
|
|
|
|
|
|
|
} |
4016
|
0
|
|
|
|
|
|
break; |
4017
|
|
|
|
|
|
|
case 'G': |
4018
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_CRL_SIGN", 21)) { |
4019
|
|
|
|
|
|
|
/* ^ */ |
4020
|
|
|
|
|
|
|
|
4021
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_CRL_SIGN |
4022
|
1
|
|
|
|
|
|
return X509_PURPOSE_CRL_SIGN; |
4023
|
|
|
|
|
|
|
#else |
4024
|
|
|
|
|
|
|
goto not_there; |
4025
|
|
|
|
|
|
|
#endif |
4026
|
|
|
|
|
|
|
|
4027
|
|
|
|
|
|
|
} |
4028
|
0
|
|
|
|
|
|
break; |
4029
|
|
|
|
|
|
|
case 'K': |
4030
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "VERIFY_POST_HANDSHAKE", 21)) { |
4031
|
|
|
|
|
|
|
/* ^ */ |
4032
|
|
|
|
|
|
|
|
4033
|
|
|
|
|
|
|
#ifdef SSL_VERIFY_POST_HANDSHAKE |
4034
|
|
|
|
|
|
|
return SSL_VERIFY_POST_HANDSHAKE; |
4035
|
|
|
|
|
|
|
#else |
4036
|
1
|
|
|
|
|
|
goto not_there; |
4037
|
|
|
|
|
|
|
#endif |
4038
|
|
|
|
|
|
|
|
4039
|
|
|
|
|
|
|
} |
4040
|
0
|
|
|
|
|
|
break; |
4041
|
|
|
|
|
|
|
case 'L': |
4042
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_FILETYPE_DEFAULT", 21)) { |
4043
|
|
|
|
|
|
|
/* ^ */ |
4044
|
|
|
|
|
|
|
|
4045
|
|
|
|
|
|
|
#ifdef X509_FILETYPE_DEFAULT |
4046
|
1
|
|
|
|
|
|
return X509_FILETYPE_DEFAULT; |
4047
|
|
|
|
|
|
|
#else |
4048
|
|
|
|
|
|
|
goto not_there; |
4049
|
|
|
|
|
|
|
#endif |
4050
|
|
|
|
|
|
|
|
4051
|
|
|
|
|
|
|
} |
4052
|
0
|
|
|
|
|
|
break; |
4053
|
|
|
|
|
|
|
case 'N': |
4054
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_SSL_CLIENT", 21)) { |
4055
|
|
|
|
|
|
|
/* ^ */ |
4056
|
|
|
|
|
|
|
|
4057
|
|
|
|
|
|
|
#ifdef X509_TRUST_SSL_CLIENT |
4058
|
1
|
|
|
|
|
|
return X509_TRUST_SSL_CLIENT; |
4059
|
|
|
|
|
|
|
#else |
4060
|
|
|
|
|
|
|
goto not_there; |
4061
|
|
|
|
|
|
|
#endif |
4062
|
|
|
|
|
|
|
|
4063
|
|
|
|
|
|
|
} |
4064
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SEP_MULTILINE", 21)) { |
4065
|
|
|
|
|
|
|
/* ^ */ |
4066
|
|
|
|
|
|
|
|
4067
|
|
|
|
|
|
|
#ifdef XN_FLAG_SEP_MULTILINE |
4068
|
1
|
|
|
|
|
|
return XN_FLAG_SEP_MULTILINE; |
4069
|
|
|
|
|
|
|
#else |
4070
|
|
|
|
|
|
|
goto not_there; |
4071
|
|
|
|
|
|
|
#endif |
4072
|
|
|
|
|
|
|
|
4073
|
|
|
|
|
|
|
} |
4074
|
0
|
|
|
|
|
|
break; |
4075
|
|
|
|
|
|
|
case 'O': |
4076
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_GET_NEW_SESSION", 21)) { |
4077
|
|
|
|
|
|
|
/* ^ */ |
4078
|
|
|
|
|
|
|
|
4079
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_GET_NEW_SESSION |
4080
|
1
|
|
|
|
|
|
return SSL_F_SSL_GET_NEW_SESSION; |
4081
|
|
|
|
|
|
|
#else |
4082
|
|
|
|
|
|
|
goto not_there; |
4083
|
|
|
|
|
|
|
#endif |
4084
|
|
|
|
|
|
|
|
4085
|
|
|
|
|
|
|
} |
4086
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSION_MAJOR", 21)) { |
4087
|
|
|
|
|
|
|
/* ^ */ |
4088
|
|
|
|
|
|
|
|
4089
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION_MAJOR |
4090
|
|
|
|
|
|
|
return OPENSSL_VERSION_MAJOR; |
4091
|
|
|
|
|
|
|
#else |
4092
|
1
|
|
|
|
|
|
goto not_there; |
4093
|
|
|
|
|
|
|
#endif |
4094
|
|
|
|
|
|
|
|
4095
|
|
|
|
|
|
|
} |
4096
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSION_MINOR", 21)) { |
4097
|
|
|
|
|
|
|
/* ^ */ |
4098
|
|
|
|
|
|
|
|
4099
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION_MINOR |
4100
|
|
|
|
|
|
|
return OPENSSL_VERSION_MINOR; |
4101
|
|
|
|
|
|
|
#else |
4102
|
1
|
|
|
|
|
|
goto not_there; |
4103
|
|
|
|
|
|
|
#endif |
4104
|
|
|
|
|
|
|
|
4105
|
|
|
|
|
|
|
} |
4106
|
0
|
|
|
|
|
|
break; |
4107
|
|
|
|
|
|
|
case 'P': |
4108
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SEP_CPLUS_SPC", 21)) { |
4109
|
|
|
|
|
|
|
/* ^ */ |
4110
|
|
|
|
|
|
|
|
4111
|
|
|
|
|
|
|
#ifdef XN_FLAG_SEP_CPLUS_SPC |
4112
|
1
|
|
|
|
|
|
return XN_FLAG_SEP_CPLUS_SPC; |
4113
|
|
|
|
|
|
|
#else |
4114
|
|
|
|
|
|
|
goto not_there; |
4115
|
|
|
|
|
|
|
#endif |
4116
|
|
|
|
|
|
|
|
4117
|
|
|
|
|
|
|
} |
4118
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SEP_SPLUS_SPC", 21)) { |
4119
|
|
|
|
|
|
|
/* ^ */ |
4120
|
|
|
|
|
|
|
|
4121
|
|
|
|
|
|
|
#ifdef XN_FLAG_SEP_SPLUS_SPC |
4122
|
1
|
|
|
|
|
|
return XN_FLAG_SEP_SPLUS_SPC; |
4123
|
|
|
|
|
|
|
#else |
4124
|
|
|
|
|
|
|
goto not_there; |
4125
|
|
|
|
|
|
|
#endif |
4126
|
|
|
|
|
|
|
|
4127
|
|
|
|
|
|
|
} |
4128
|
0
|
|
|
|
|
|
break; |
4129
|
|
|
|
|
|
|
case 'R': |
4130
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ASN1_STRFLGS_ESC_CTRL", 21)) { |
4131
|
|
|
|
|
|
|
/* ^ */ |
4132
|
|
|
|
|
|
|
|
4133
|
|
|
|
|
|
|
#ifdef ASN1_STRFLGS_ESC_CTRL |
4134
|
1
|
|
|
|
|
|
return ASN1_STRFLGS_ESC_CTRL; |
4135
|
|
|
|
|
|
|
#else |
4136
|
|
|
|
|
|
|
goto not_there; |
4137
|
|
|
|
|
|
|
#endif |
4138
|
|
|
|
|
|
|
|
4139
|
|
|
|
|
|
|
} |
4140
|
0
|
|
|
|
|
|
break; |
4141
|
|
|
|
|
|
|
case 'S': |
4142
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_HELLO_REQUEST", 21)) { |
4143
|
|
|
|
|
|
|
/* ^ */ |
4144
|
|
|
|
|
|
|
|
4145
|
|
|
|
|
|
|
#ifdef SSL3_MT_HELLO_REQUEST |
4146
|
1
|
|
|
|
|
|
return SSL3_MT_HELLO_REQUEST; |
4147
|
|
|
|
|
|
|
#else |
4148
|
|
|
|
|
|
|
goto not_there; |
4149
|
|
|
|
|
|
|
#endif |
4150
|
|
|
|
|
|
|
|
4151
|
|
|
|
|
|
|
} |
4152
|
0
|
|
|
|
|
|
break; |
4153
|
|
|
|
|
|
|
case 'T': |
4154
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_REQUEST_CERTIFICATE", 21)) { |
4155
|
|
|
|
|
|
|
/* ^ */ |
4156
|
|
|
|
|
|
|
|
4157
|
|
|
|
|
|
|
#ifdef SSL_F_REQUEST_CERTIFICATE |
4158
|
1
|
|
|
|
|
|
return SSL_F_REQUEST_CERTIFICATE; |
4159
|
|
|
|
|
|
|
#else |
4160
|
|
|
|
|
|
|
goto not_there; |
4161
|
|
|
|
|
|
|
#endif |
4162
|
|
|
|
|
|
|
|
4163
|
|
|
|
|
|
|
} |
4164
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_CERTIFICATE", 21)) { |
4165
|
|
|
|
|
|
|
/* ^ */ |
4166
|
|
|
|
|
|
|
|
4167
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_CERTIFICATE |
4168
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_CERTIFICATE; |
4169
|
|
|
|
|
|
|
#else |
4170
|
|
|
|
|
|
|
goto not_there; |
4171
|
|
|
|
|
|
|
#endif |
4172
|
|
|
|
|
|
|
|
4173
|
|
|
|
|
|
|
} |
4174
|
0
|
|
|
|
|
|
break; |
4175
|
|
|
|
|
|
|
case 'U': |
4176
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NETSCAPE_CA_DN_BUG", 21)) { |
4177
|
|
|
|
|
|
|
/* ^ */ |
4178
|
|
|
|
|
|
|
|
4179
|
|
|
|
|
|
|
#ifdef SSL_OP_NETSCAPE_CA_DN_BUG |
4180
|
1
|
|
|
|
|
|
return SSL_OP_NETSCAPE_CA_DN_BUG; |
4181
|
|
|
|
|
|
|
#else |
4182
|
|
|
|
|
|
|
goto not_there; |
4183
|
|
|
|
|
|
|
#endif |
4184
|
|
|
|
|
|
|
|
4185
|
|
|
|
|
|
|
} |
4186
|
0
|
|
|
|
|
|
break; |
4187
|
|
|
|
|
|
|
case 'e': |
4188
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_SMIMECapabilities", 21)) { |
4189
|
|
|
|
|
|
|
/* ^ */ |
4190
|
|
|
|
|
|
|
|
4191
|
|
|
|
|
|
|
#ifdef NID_SMIMECapabilities |
4192
|
1
|
|
|
|
|
|
return NID_SMIMECapabilities; |
4193
|
|
|
|
|
|
|
#else |
4194
|
|
|
|
|
|
|
goto not_there; |
4195
|
|
|
|
|
|
|
#endif |
4196
|
|
|
|
|
|
|
|
4197
|
|
|
|
|
|
|
} |
4198
|
0
|
|
|
|
|
|
break; |
4199
|
|
|
|
|
|
|
case 'm': |
4200
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_signingTime", 21)) { |
4201
|
|
|
|
|
|
|
/* ^ */ |
4202
|
|
|
|
|
|
|
|
4203
|
|
|
|
|
|
|
#ifdef NID_pkcs9_signingTime |
4204
|
1
|
|
|
|
|
|
return NID_pkcs9_signingTime; |
4205
|
|
|
|
|
|
|
#else |
4206
|
|
|
|
|
|
|
goto not_there; |
4207
|
|
|
|
|
|
|
#endif |
4208
|
|
|
|
|
|
|
|
4209
|
|
|
|
|
|
|
} |
4210
|
0
|
|
|
|
|
|
break; |
4211
|
|
|
|
|
|
|
case 'p': |
4212
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_contentType", 21)) { |
4213
|
|
|
|
|
|
|
/* ^ */ |
4214
|
|
|
|
|
|
|
|
4215
|
|
|
|
|
|
|
#ifdef NID_pkcs9_contentType |
4216
|
1
|
|
|
|
|
|
return NID_pkcs9_contentType; |
4217
|
|
|
|
|
|
|
#else |
4218
|
|
|
|
|
|
|
goto not_there; |
4219
|
|
|
|
|
|
|
#endif |
4220
|
|
|
|
|
|
|
|
4221
|
|
|
|
|
|
|
} |
4222
|
0
|
|
|
|
|
|
break; |
4223
|
|
|
|
|
|
|
case 'r': |
4224
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_base_url", 21)) { |
4225
|
|
|
|
|
|
|
/* ^ */ |
4226
|
|
|
|
|
|
|
|
4227
|
|
|
|
|
|
|
#ifdef NID_netscape_base_url |
4228
|
1
|
|
|
|
|
|
return NID_netscape_base_url; |
4229
|
|
|
|
|
|
|
#else |
4230
|
|
|
|
|
|
|
goto not_there; |
4231
|
|
|
|
|
|
|
#endif |
4232
|
|
|
|
|
|
|
|
4233
|
|
|
|
|
|
|
} |
4234
|
0
|
|
|
|
|
|
break; |
4235
|
|
|
|
|
|
|
case 't': |
4236
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_basic_constraints", 21)) { |
4237
|
|
|
|
|
|
|
/* ^ */ |
4238
|
|
|
|
|
|
|
|
4239
|
|
|
|
|
|
|
#ifdef NID_basic_constraints |
4240
|
2
|
|
|
|
|
|
return NID_basic_constraints; |
4241
|
|
|
|
|
|
|
#else |
4242
|
|
|
|
|
|
|
goto not_there; |
4243
|
|
|
|
|
|
|
#endif |
4244
|
|
|
|
|
|
|
|
4245
|
|
|
|
|
|
|
} |
4246
|
0
|
|
|
|
|
|
break; |
4247
|
|
|
|
|
|
|
} |
4248
|
0
|
|
|
|
|
|
break; |
4249
|
|
|
|
|
|
|
case 22: |
4250
|
|
|
|
|
|
|
/* Names all of length 22. */ |
4251
|
|
|
|
|
|
|
/* ASN1_STRFLGS_ESC_QUOTE ERROR_WANT_X509_LOOKUP F_SSL_SESSION_PRINT_FP |
4252
|
|
|
|
|
|
|
NID_netscape_cert_type NID_netscape_data_type NID_pkcs9_emailAddress |
4253
|
|
|
|
|
|
|
OPENSSL_VERSION_NUMBER OPENSSL_VERSION_STRING OP_NO_ENCRYPT_THEN_MAC |
4254
|
|
|
|
|
|
|
R_PEER_ERROR_NO_CIPHER SESS_CACHE_NO_INTERNAL TLSEXT_STATUSTYPE_ocsp |
4255
|
|
|
|
|
|
|
V_OCSP_CERTSTATUS_GOOD X509_TRUST_OBJECT_SIGN X509_V_ERR_UNSPECIFIED |
4256
|
|
|
|
|
|
|
X509_V_FLAG_USE_DELTAS XN_FLAG_SEP_COMMA_PLUS */ |
4257
|
|
|
|
|
|
|
/* Offset 18 gives the best switch position. */ |
4258
|
180
|
|
|
|
|
|
switch (name[18]) { |
4259
|
|
|
|
|
|
|
case 'F': |
4260
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSPECIFIED", 22)) { |
4261
|
|
|
|
|
|
|
/* ^ */ |
4262
|
|
|
|
|
|
|
|
4263
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSPECIFIED |
4264
|
1
|
|
|
|
|
|
return X509_V_ERR_UNSPECIFIED; |
4265
|
|
|
|
|
|
|
#else |
4266
|
|
|
|
|
|
|
goto not_there; |
4267
|
|
|
|
|
|
|
#endif |
4268
|
|
|
|
|
|
|
|
4269
|
|
|
|
|
|
|
} |
4270
|
0
|
|
|
|
|
|
break; |
4271
|
|
|
|
|
|
|
case 'G': |
4272
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "V_OCSP_CERTSTATUS_GOOD", 22)) { |
4273
|
|
|
|
|
|
|
/* ^ */ |
4274
|
|
|
|
|
|
|
|
4275
|
|
|
|
|
|
|
#ifdef V_OCSP_CERTSTATUS_GOOD |
4276
|
1
|
|
|
|
|
|
return V_OCSP_CERTSTATUS_GOOD; |
4277
|
|
|
|
|
|
|
#else |
4278
|
|
|
|
|
|
|
goto not_there; |
4279
|
|
|
|
|
|
|
#endif |
4280
|
|
|
|
|
|
|
|
4281
|
|
|
|
|
|
|
} |
4282
|
0
|
|
|
|
|
|
break; |
4283
|
|
|
|
|
|
|
case 'L': |
4284
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_USE_DELTAS", 22)) { |
4285
|
|
|
|
|
|
|
/* ^ */ |
4286
|
|
|
|
|
|
|
|
4287
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_USE_DELTAS |
4288
|
1
|
|
|
|
|
|
return X509_V_FLAG_USE_DELTAS; |
4289
|
|
|
|
|
|
|
#else |
4290
|
|
|
|
|
|
|
goto not_there; |
4291
|
|
|
|
|
|
|
#endif |
4292
|
|
|
|
|
|
|
|
4293
|
|
|
|
|
|
|
} |
4294
|
0
|
|
|
|
|
|
break; |
4295
|
|
|
|
|
|
|
case 'M': |
4296
|
163
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSION_NUMBER", 22)) { |
4297
|
|
|
|
|
|
|
/* ^ */ |
4298
|
|
|
|
|
|
|
|
4299
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION_NUMBER |
4300
|
163
|
|
|
|
|
|
return OPENSSL_VERSION_NUMBER; |
4301
|
|
|
|
|
|
|
#else |
4302
|
|
|
|
|
|
|
goto not_there; |
4303
|
|
|
|
|
|
|
#endif |
4304
|
|
|
|
|
|
|
|
4305
|
|
|
|
|
|
|
} |
4306
|
0
|
|
|
|
|
|
break; |
4307
|
|
|
|
|
|
|
case 'O': |
4308
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_X509_LOOKUP", 22)) { |
4309
|
|
|
|
|
|
|
/* ^ */ |
4310
|
|
|
|
|
|
|
|
4311
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_X509_LOOKUP |
4312
|
1
|
|
|
|
|
|
return SSL_ERROR_WANT_X509_LOOKUP; |
4313
|
|
|
|
|
|
|
#else |
4314
|
|
|
|
|
|
|
goto not_there; |
4315
|
|
|
|
|
|
|
#endif |
4316
|
|
|
|
|
|
|
|
4317
|
|
|
|
|
|
|
} |
4318
|
0
|
|
|
|
|
|
break; |
4319
|
|
|
|
|
|
|
case 'P': |
4320
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "R_PEER_ERROR_NO_CIPHER", 22)) { |
4321
|
|
|
|
|
|
|
/* ^ */ |
4322
|
|
|
|
|
|
|
|
4323
|
|
|
|
|
|
|
#ifdef SSL_R_PEER_ERROR_NO_CIPHER |
4324
|
1
|
|
|
|
|
|
return SSL_R_PEER_ERROR_NO_CIPHER; |
4325
|
|
|
|
|
|
|
#else |
4326
|
|
|
|
|
|
|
goto not_there; |
4327
|
|
|
|
|
|
|
#endif |
4328
|
|
|
|
|
|
|
|
4329
|
|
|
|
|
|
|
} |
4330
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SEP_COMMA_PLUS", 22)) { |
4331
|
|
|
|
|
|
|
/* ^ */ |
4332
|
|
|
|
|
|
|
|
4333
|
|
|
|
|
|
|
#ifdef XN_FLAG_SEP_COMMA_PLUS |
4334
|
1
|
|
|
|
|
|
return XN_FLAG_SEP_COMMA_PLUS; |
4335
|
|
|
|
|
|
|
#else |
4336
|
|
|
|
|
|
|
goto not_there; |
4337
|
|
|
|
|
|
|
#endif |
4338
|
|
|
|
|
|
|
|
4339
|
|
|
|
|
|
|
} |
4340
|
0
|
|
|
|
|
|
break; |
4341
|
|
|
|
|
|
|
case 'R': |
4342
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSION_STRING", 22)) { |
4343
|
|
|
|
|
|
|
/* ^ */ |
4344
|
|
|
|
|
|
|
|
4345
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION_STRING |
4346
|
|
|
|
|
|
|
return OPENSSL_VERSION_STRING; |
4347
|
|
|
|
|
|
|
#else |
4348
|
1
|
|
|
|
|
|
goto not_there; |
4349
|
|
|
|
|
|
|
#endif |
4350
|
|
|
|
|
|
|
|
4351
|
|
|
|
|
|
|
} |
4352
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_NO_INTERNAL", 22)) { |
4353
|
|
|
|
|
|
|
/* ^ */ |
4354
|
|
|
|
|
|
|
|
4355
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_NO_INTERNAL |
4356
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_NO_INTERNAL; |
4357
|
|
|
|
|
|
|
#else |
4358
|
|
|
|
|
|
|
goto not_there; |
4359
|
|
|
|
|
|
|
#endif |
4360
|
|
|
|
|
|
|
|
4361
|
|
|
|
|
|
|
} |
4362
|
0
|
|
|
|
|
|
break; |
4363
|
|
|
|
|
|
|
case 'S': |
4364
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_OBJECT_SIGN", 22)) { |
4365
|
|
|
|
|
|
|
/* ^ */ |
4366
|
|
|
|
|
|
|
|
4367
|
|
|
|
|
|
|
#ifdef X509_TRUST_OBJECT_SIGN |
4368
|
1
|
|
|
|
|
|
return X509_TRUST_OBJECT_SIGN; |
4369
|
|
|
|
|
|
|
#else |
4370
|
|
|
|
|
|
|
goto not_there; |
4371
|
|
|
|
|
|
|
#endif |
4372
|
|
|
|
|
|
|
|
4373
|
|
|
|
|
|
|
} |
4374
|
0
|
|
|
|
|
|
break; |
4375
|
|
|
|
|
|
|
case 'T': |
4376
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_SESSION_PRINT_FP", 22)) { |
4377
|
|
|
|
|
|
|
/* ^ */ |
4378
|
|
|
|
|
|
|
|
4379
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_SESSION_PRINT_FP |
4380
|
1
|
|
|
|
|
|
return SSL_F_SSL_SESSION_PRINT_FP; |
4381
|
|
|
|
|
|
|
#else |
4382
|
|
|
|
|
|
|
goto not_there; |
4383
|
|
|
|
|
|
|
#endif |
4384
|
|
|
|
|
|
|
|
4385
|
|
|
|
|
|
|
} |
4386
|
0
|
|
|
|
|
|
break; |
4387
|
|
|
|
|
|
|
case 'U': |
4388
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ASN1_STRFLGS_ESC_QUOTE", 22)) { |
4389
|
|
|
|
|
|
|
/* ^ */ |
4390
|
|
|
|
|
|
|
|
4391
|
|
|
|
|
|
|
#ifdef ASN1_STRFLGS_ESC_QUOTE |
4392
|
1
|
|
|
|
|
|
return ASN1_STRFLGS_ESC_QUOTE; |
4393
|
|
|
|
|
|
|
#else |
4394
|
|
|
|
|
|
|
goto not_there; |
4395
|
|
|
|
|
|
|
#endif |
4396
|
|
|
|
|
|
|
|
4397
|
|
|
|
|
|
|
} |
4398
|
0
|
|
|
|
|
|
break; |
4399
|
|
|
|
|
|
|
case '_': |
4400
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_ENCRYPT_THEN_MAC", 22)) { |
4401
|
|
|
|
|
|
|
/* ^ */ |
4402
|
|
|
|
|
|
|
|
4403
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_ENCRYPT_THEN_MAC |
4404
|
|
|
|
|
|
|
return SSL_OP_NO_ENCRYPT_THEN_MAC; |
4405
|
|
|
|
|
|
|
#else |
4406
|
1
|
|
|
|
|
|
goto not_there; |
4407
|
|
|
|
|
|
|
#endif |
4408
|
|
|
|
|
|
|
|
4409
|
|
|
|
|
|
|
} |
4410
|
0
|
|
|
|
|
|
break; |
4411
|
|
|
|
|
|
|
case 'o': |
4412
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "TLSEXT_STATUSTYPE_ocsp", 22)) { |
4413
|
|
|
|
|
|
|
/* ^ */ |
4414
|
|
|
|
|
|
|
|
4415
|
|
|
|
|
|
|
#ifdef TLSEXT_STATUSTYPE_ocsp |
4416
|
1
|
|
|
|
|
|
return TLSEXT_STATUSTYPE_ocsp; |
4417
|
|
|
|
|
|
|
#else |
4418
|
|
|
|
|
|
|
goto not_there; |
4419
|
|
|
|
|
|
|
#endif |
4420
|
|
|
|
|
|
|
|
4421
|
|
|
|
|
|
|
} |
4422
|
0
|
|
|
|
|
|
break; |
4423
|
|
|
|
|
|
|
case 'r': |
4424
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_emailAddress", 22)) { |
4425
|
|
|
|
|
|
|
/* ^ */ |
4426
|
|
|
|
|
|
|
|
4427
|
|
|
|
|
|
|
#ifdef NID_pkcs9_emailAddress |
4428
|
1
|
|
|
|
|
|
return NID_pkcs9_emailAddress; |
4429
|
|
|
|
|
|
|
#else |
4430
|
|
|
|
|
|
|
goto not_there; |
4431
|
|
|
|
|
|
|
#endif |
4432
|
|
|
|
|
|
|
|
4433
|
|
|
|
|
|
|
} |
4434
|
0
|
|
|
|
|
|
break; |
4435
|
|
|
|
|
|
|
case 't': |
4436
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_netscape_cert_type", 22)) { |
4437
|
|
|
|
|
|
|
/* ^ */ |
4438
|
|
|
|
|
|
|
|
4439
|
|
|
|
|
|
|
#ifdef NID_netscape_cert_type |
4440
|
2
|
|
|
|
|
|
return NID_netscape_cert_type; |
4441
|
|
|
|
|
|
|
#else |
4442
|
|
|
|
|
|
|
goto not_there; |
4443
|
|
|
|
|
|
|
#endif |
4444
|
|
|
|
|
|
|
|
4445
|
|
|
|
|
|
|
} |
4446
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_data_type", 22)) { |
4447
|
|
|
|
|
|
|
/* ^ */ |
4448
|
|
|
|
|
|
|
|
4449
|
|
|
|
|
|
|
#ifdef NID_netscape_data_type |
4450
|
1
|
|
|
|
|
|
return NID_netscape_data_type; |
4451
|
|
|
|
|
|
|
#else |
4452
|
|
|
|
|
|
|
goto not_there; |
4453
|
|
|
|
|
|
|
#endif |
4454
|
|
|
|
|
|
|
|
4455
|
|
|
|
|
|
|
} |
4456
|
0
|
|
|
|
|
|
break; |
4457
|
|
|
|
|
|
|
} |
4458
|
0
|
|
|
|
|
|
break; |
4459
|
|
|
|
|
|
|
case 23: |
4460
|
|
|
|
|
|
|
/* Names all of length 23. */ |
4461
|
|
|
|
|
|
|
/* F_GET_CLIENT_MASTER_KEY F_SSL_USE_RSAPRIVATEKEY LIBRESSL_VERSION_NUMBER |
4462
|
|
|
|
|
|
|
NID_pkcs8ShroudedKeyBag NID_pkcs9_messageDigest NID_stateOrProvinceName |
4463
|
|
|
|
|
|
|
OPENSSL_INFO_CONFIG_DIR OP_CRYPTOPRO_TLSEXT_BUG R_BAD_RESPONSE_ARGUMENT |
4464
|
|
|
|
|
|
|
R_PUBLIC_KEY_IS_NOT_RSA SSL2_MT_CLIENT_FINISHED SSL2_MT_SERVER_FINISHED |
4465
|
|
|
|
|
|
|
SSL3_MT_CERTIFICATE_URL X509_PURPOSE_SMIME_SIGN X509_PURPOSE_SSL_CLIENT |
4466
|
|
|
|
|
|
|
X509_PURPOSE_SSL_SERVER X509_TRUST_OCSP_REQUEST X509_V_ERR_CERT_REVOKED |
4467
|
|
|
|
|
|
|
X509_V_ERR_INVALID_CALL X509_V_ERR_STORE_LOOKUP X509_V_FLAG_INHIBIT_ANY |
4468
|
|
|
|
|
|
|
X509_V_FLAG_INHIBIT_MAP X509_V_FLAG_POLICY_MASK X509_V_FLAG_X509_STRICT |
4469
|
|
|
|
|
|
|
*/ |
4470
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
4471
|
32
|
|
|
|
|
|
switch (name[13]) { |
4472
|
|
|
|
|
|
|
case '5': |
4473
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_X509_STRICT", 23)) { |
4474
|
|
|
|
|
|
|
/* ^ */ |
4475
|
|
|
|
|
|
|
|
4476
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_X509_STRICT |
4477
|
1
|
|
|
|
|
|
return X509_V_FLAG_X509_STRICT; |
4478
|
|
|
|
|
|
|
#else |
4479
|
|
|
|
|
|
|
goto not_there; |
4480
|
|
|
|
|
|
|
#endif |
4481
|
|
|
|
|
|
|
|
4482
|
|
|
|
|
|
|
} |
4483
|
0
|
|
|
|
|
|
break; |
4484
|
|
|
|
|
|
|
case 'C': |
4485
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_CONFIG_DIR", 23)) { |
4486
|
|
|
|
|
|
|
/* ^ */ |
4487
|
|
|
|
|
|
|
|
4488
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_CONFIG_DIR |
4489
|
|
|
|
|
|
|
return OPENSSL_INFO_CONFIG_DIR; |
4490
|
|
|
|
|
|
|
#else |
4491
|
1
|
|
|
|
|
|
goto not_there; |
4492
|
|
|
|
|
|
|
#endif |
4493
|
|
|
|
|
|
|
|
4494
|
|
|
|
|
|
|
} |
4495
|
0
|
|
|
|
|
|
break; |
4496
|
|
|
|
|
|
|
case 'E': |
4497
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_RESPONSE_ARGUMENT", 23)) { |
4498
|
|
|
|
|
|
|
/* ^ */ |
4499
|
|
|
|
|
|
|
|
4500
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_RESPONSE_ARGUMENT |
4501
|
1
|
|
|
|
|
|
return SSL_R_BAD_RESPONSE_ARGUMENT; |
4502
|
|
|
|
|
|
|
#else |
4503
|
|
|
|
|
|
|
goto not_there; |
4504
|
|
|
|
|
|
|
#endif |
4505
|
|
|
|
|
|
|
|
4506
|
|
|
|
|
|
|
} |
4507
|
0
|
|
|
|
|
|
break; |
4508
|
|
|
|
|
|
|
case 'F': |
4509
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CERTIFICATE_URL", 23)) { |
4510
|
|
|
|
|
|
|
/* ^ */ |
4511
|
|
|
|
|
|
|
|
4512
|
|
|
|
|
|
|
#ifdef SSL3_MT_CERTIFICATE_URL |
4513
|
|
|
|
|
|
|
return SSL3_MT_CERTIFICATE_URL; |
4514
|
|
|
|
|
|
|
#else |
4515
|
1
|
|
|
|
|
|
goto not_there; |
4516
|
|
|
|
|
|
|
#endif |
4517
|
|
|
|
|
|
|
|
4518
|
|
|
|
|
|
|
} |
4519
|
0
|
|
|
|
|
|
break; |
4520
|
|
|
|
|
|
|
case 'I': |
4521
|
7
|
100
|
|
|
|
|
if (!memcmp(name, "LIBRESSL_VERSION_NUMBER", 23)) { |
4522
|
|
|
|
|
|
|
/* ^ */ |
4523
|
|
|
|
|
|
|
|
4524
|
|
|
|
|
|
|
#ifdef LIBRESSL_VERSION_NUMBER |
4525
|
|
|
|
|
|
|
return LIBRESSL_VERSION_NUMBER; |
4526
|
|
|
|
|
|
|
#else |
4527
|
6
|
|
|
|
|
|
goto not_there; |
4528
|
|
|
|
|
|
|
#endif |
4529
|
|
|
|
|
|
|
|
4530
|
|
|
|
|
|
|
} |
4531
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_PUBLIC_KEY_IS_NOT_RSA", 23)) { |
4532
|
|
|
|
|
|
|
/* ^ */ |
4533
|
|
|
|
|
|
|
|
4534
|
|
|
|
|
|
|
#ifdef SSL_R_PUBLIC_KEY_IS_NOT_RSA |
4535
|
1
|
|
|
|
|
|
return SSL_R_PUBLIC_KEY_IS_NOT_RSA; |
4536
|
|
|
|
|
|
|
#else |
4537
|
|
|
|
|
|
|
goto not_there; |
4538
|
|
|
|
|
|
|
#endif |
4539
|
|
|
|
|
|
|
|
4540
|
|
|
|
|
|
|
} |
4541
|
0
|
|
|
|
|
|
break; |
4542
|
|
|
|
|
|
|
case 'M': |
4543
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_GET_CLIENT_MASTER_KEY", 23)) { |
4544
|
|
|
|
|
|
|
/* ^ */ |
4545
|
|
|
|
|
|
|
|
4546
|
|
|
|
|
|
|
#ifdef SSL_F_GET_CLIENT_MASTER_KEY |
4547
|
1
|
|
|
|
|
|
return SSL_F_GET_CLIENT_MASTER_KEY; |
4548
|
|
|
|
|
|
|
#else |
4549
|
|
|
|
|
|
|
goto not_there; |
4550
|
|
|
|
|
|
|
#endif |
4551
|
|
|
|
|
|
|
|
4552
|
|
|
|
|
|
|
} |
4553
|
0
|
|
|
|
|
|
break; |
4554
|
|
|
|
|
|
|
case 'N': |
4555
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_INHIBIT_ANY", 23)) { |
4556
|
|
|
|
|
|
|
/* ^ */ |
4557
|
|
|
|
|
|
|
|
4558
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_INHIBIT_ANY |
4559
|
1
|
|
|
|
|
|
return X509_V_FLAG_INHIBIT_ANY; |
4560
|
|
|
|
|
|
|
#else |
4561
|
|
|
|
|
|
|
goto not_there; |
4562
|
|
|
|
|
|
|
#endif |
4563
|
|
|
|
|
|
|
|
4564
|
|
|
|
|
|
|
} |
4565
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_INHIBIT_MAP", 23)) { |
4566
|
|
|
|
|
|
|
/* ^ */ |
4567
|
|
|
|
|
|
|
|
4568
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_INHIBIT_MAP |
4569
|
1
|
|
|
|
|
|
return X509_V_FLAG_INHIBIT_MAP; |
4570
|
|
|
|
|
|
|
#else |
4571
|
|
|
|
|
|
|
goto not_there; |
4572
|
|
|
|
|
|
|
#endif |
4573
|
|
|
|
|
|
|
|
4574
|
|
|
|
|
|
|
} |
4575
|
0
|
|
|
|
|
|
break; |
4576
|
|
|
|
|
|
|
case 'O': |
4577
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_STORE_LOOKUP", 23)) { |
4578
|
|
|
|
|
|
|
/* ^ */ |
4579
|
|
|
|
|
|
|
|
4580
|
|
|
|
|
|
|
#ifdef X509_V_ERR_STORE_LOOKUP |
4581
|
|
|
|
|
|
|
return X509_V_ERR_STORE_LOOKUP; |
4582
|
|
|
|
|
|
|
#else |
4583
|
1
|
|
|
|
|
|
goto not_there; |
4584
|
|
|
|
|
|
|
#endif |
4585
|
|
|
|
|
|
|
|
4586
|
|
|
|
|
|
|
} |
4587
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_POLICY_MASK", 23)) { |
4588
|
|
|
|
|
|
|
/* ^ */ |
4589
|
|
|
|
|
|
|
|
4590
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_POLICY_MASK |
4591
|
1
|
|
|
|
|
|
return X509_V_FLAG_POLICY_MASK; |
4592
|
|
|
|
|
|
|
#else |
4593
|
|
|
|
|
|
|
goto not_there; |
4594
|
|
|
|
|
|
|
#endif |
4595
|
|
|
|
|
|
|
|
4596
|
|
|
|
|
|
|
} |
4597
|
0
|
|
|
|
|
|
break; |
4598
|
|
|
|
|
|
|
case 'P': |
4599
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_RSAPRIVATEKEY", 23)) { |
4600
|
|
|
|
|
|
|
/* ^ */ |
4601
|
|
|
|
|
|
|
|
4602
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_RSAPRIVATEKEY |
4603
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_RSAPRIVATEKEY; |
4604
|
|
|
|
|
|
|
#else |
4605
|
|
|
|
|
|
|
goto not_there; |
4606
|
|
|
|
|
|
|
#endif |
4607
|
|
|
|
|
|
|
|
4608
|
|
|
|
|
|
|
} |
4609
|
0
|
|
|
|
|
|
break; |
4610
|
|
|
|
|
|
|
case 'R': |
4611
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_SERVER_FINISHED", 23)) { |
4612
|
|
|
|
|
|
|
/* ^ */ |
4613
|
|
|
|
|
|
|
|
4614
|
|
|
|
|
|
|
#ifdef SSL2_MT_SERVER_FINISHED |
4615
|
1
|
|
|
|
|
|
return SSL2_MT_SERVER_FINISHED; |
4616
|
|
|
|
|
|
|
#else |
4617
|
|
|
|
|
|
|
goto not_there; |
4618
|
|
|
|
|
|
|
#endif |
4619
|
|
|
|
|
|
|
|
4620
|
|
|
|
|
|
|
} |
4621
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_REVOKED", 23)) { |
4622
|
|
|
|
|
|
|
/* ^ */ |
4623
|
|
|
|
|
|
|
|
4624
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_REVOKED |
4625
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_REVOKED; |
4626
|
|
|
|
|
|
|
#else |
4627
|
|
|
|
|
|
|
goto not_there; |
4628
|
|
|
|
|
|
|
#endif |
4629
|
|
|
|
|
|
|
|
4630
|
|
|
|
|
|
|
} |
4631
|
0
|
|
|
|
|
|
break; |
4632
|
|
|
|
|
|
|
case 'S': |
4633
|
6
|
100
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_SMIME_SIGN", 23)) { |
4634
|
|
|
|
|
|
|
/* ^ */ |
4635
|
|
|
|
|
|
|
|
4636
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_SMIME_SIGN |
4637
|
1
|
|
|
|
|
|
return X509_PURPOSE_SMIME_SIGN; |
4638
|
|
|
|
|
|
|
#else |
4639
|
|
|
|
|
|
|
goto not_there; |
4640
|
|
|
|
|
|
|
#endif |
4641
|
|
|
|
|
|
|
|
4642
|
|
|
|
|
|
|
} |
4643
|
5
|
100
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_SSL_CLIENT", 23)) { |
4644
|
|
|
|
|
|
|
/* ^ */ |
4645
|
|
|
|
|
|
|
|
4646
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_SSL_CLIENT |
4647
|
3
|
|
|
|
|
|
return X509_PURPOSE_SSL_CLIENT; |
4648
|
|
|
|
|
|
|
#else |
4649
|
|
|
|
|
|
|
goto not_there; |
4650
|
|
|
|
|
|
|
#endif |
4651
|
|
|
|
|
|
|
|
4652
|
|
|
|
|
|
|
} |
4653
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_SSL_SERVER", 23)) { |
4654
|
|
|
|
|
|
|
/* ^ */ |
4655
|
|
|
|
|
|
|
|
4656
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_SSL_SERVER |
4657
|
1
|
|
|
|
|
|
return X509_PURPOSE_SSL_SERVER; |
4658
|
|
|
|
|
|
|
#else |
4659
|
|
|
|
|
|
|
goto not_there; |
4660
|
|
|
|
|
|
|
#endif |
4661
|
|
|
|
|
|
|
|
4662
|
|
|
|
|
|
|
} |
4663
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_OCSP_REQUEST", 23)) { |
4664
|
|
|
|
|
|
|
/* ^ */ |
4665
|
|
|
|
|
|
|
|
4666
|
|
|
|
|
|
|
#ifdef X509_TRUST_OCSP_REQUEST |
4667
|
1
|
|
|
|
|
|
return X509_TRUST_OCSP_REQUEST; |
4668
|
|
|
|
|
|
|
#else |
4669
|
|
|
|
|
|
|
goto not_there; |
4670
|
|
|
|
|
|
|
#endif |
4671
|
|
|
|
|
|
|
|
4672
|
|
|
|
|
|
|
} |
4673
|
0
|
|
|
|
|
|
break; |
4674
|
|
|
|
|
|
|
case 'T': |
4675
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_CRYPTOPRO_TLSEXT_BUG", 23)) { |
4676
|
|
|
|
|
|
|
/* ^ */ |
4677
|
|
|
|
|
|
|
|
4678
|
|
|
|
|
|
|
#ifdef SSL_OP_CRYPTOPRO_TLSEXT_BUG |
4679
|
1
|
|
|
|
|
|
return SSL_OP_CRYPTOPRO_TLSEXT_BUG; |
4680
|
|
|
|
|
|
|
#else |
4681
|
|
|
|
|
|
|
goto not_there; |
4682
|
|
|
|
|
|
|
#endif |
4683
|
|
|
|
|
|
|
|
4684
|
|
|
|
|
|
|
} |
4685
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_CLIENT_FINISHED", 23)) { |
4686
|
|
|
|
|
|
|
/* ^ */ |
4687
|
|
|
|
|
|
|
|
4688
|
|
|
|
|
|
|
#ifdef SSL2_MT_CLIENT_FINISHED |
4689
|
1
|
|
|
|
|
|
return SSL2_MT_CLIENT_FINISHED; |
4690
|
|
|
|
|
|
|
#else |
4691
|
|
|
|
|
|
|
goto not_there; |
4692
|
|
|
|
|
|
|
#endif |
4693
|
|
|
|
|
|
|
|
4694
|
|
|
|
|
|
|
} |
4695
|
0
|
|
|
|
|
|
break; |
4696
|
|
|
|
|
|
|
case 'V': |
4697
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_CALL", 23)) { |
4698
|
|
|
|
|
|
|
/* ^ */ |
4699
|
|
|
|
|
|
|
|
4700
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_CALL |
4701
|
|
|
|
|
|
|
return X509_V_ERR_INVALID_CALL; |
4702
|
|
|
|
|
|
|
#else |
4703
|
1
|
|
|
|
|
|
goto not_there; |
4704
|
|
|
|
|
|
|
#endif |
4705
|
|
|
|
|
|
|
|
4706
|
|
|
|
|
|
|
} |
4707
|
0
|
|
|
|
|
|
break; |
4708
|
|
|
|
|
|
|
case 'o': |
4709
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_stateOrProvinceName", 23)) { |
4710
|
|
|
|
|
|
|
/* ^ */ |
4711
|
|
|
|
|
|
|
|
4712
|
|
|
|
|
|
|
#ifdef NID_stateOrProvinceName |
4713
|
1
|
|
|
|
|
|
return NID_stateOrProvinceName; |
4714
|
|
|
|
|
|
|
#else |
4715
|
|
|
|
|
|
|
goto not_there; |
4716
|
|
|
|
|
|
|
#endif |
4717
|
|
|
|
|
|
|
|
4718
|
|
|
|
|
|
|
} |
4719
|
0
|
|
|
|
|
|
break; |
4720
|
|
|
|
|
|
|
case 's': |
4721
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_messageDigest", 23)) { |
4722
|
|
|
|
|
|
|
/* ^ */ |
4723
|
|
|
|
|
|
|
|
4724
|
|
|
|
|
|
|
#ifdef NID_pkcs9_messageDigest |
4725
|
1
|
|
|
|
|
|
return NID_pkcs9_messageDigest; |
4726
|
|
|
|
|
|
|
#else |
4727
|
|
|
|
|
|
|
goto not_there; |
4728
|
|
|
|
|
|
|
#endif |
4729
|
|
|
|
|
|
|
|
4730
|
|
|
|
|
|
|
} |
4731
|
0
|
|
|
|
|
|
break; |
4732
|
|
|
|
|
|
|
case 'u': |
4733
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs8ShroudedKeyBag", 23)) { |
4734
|
|
|
|
|
|
|
/* ^ */ |
4735
|
|
|
|
|
|
|
|
4736
|
|
|
|
|
|
|
#ifdef NID_pkcs8ShroudedKeyBag |
4737
|
1
|
|
|
|
|
|
return NID_pkcs8ShroudedKeyBag; |
4738
|
|
|
|
|
|
|
#else |
4739
|
|
|
|
|
|
|
goto not_there; |
4740
|
|
|
|
|
|
|
#endif |
4741
|
|
|
|
|
|
|
|
4742
|
|
|
|
|
|
|
} |
4743
|
0
|
|
|
|
|
|
break; |
4744
|
|
|
|
|
|
|
} |
4745
|
1
|
|
|
|
|
|
break; |
4746
|
|
|
|
|
|
|
case 24: |
4747
|
|
|
|
|
|
|
/* Names all of length 24. */ |
4748
|
|
|
|
|
|
|
/* F_SSL_RSA_PUBLIC_ENCRYPT NID_certificate_policies |
4749
|
|
|
|
|
|
|
NID_md2WithRSAEncryption NID_md5WithRSAEncryption |
4750
|
|
|
|
|
|
|
NID_netscape_renewal_url NID_pbeWithMD2AndDES_CBC |
4751
|
|
|
|
|
|
|
NID_pbeWithMD2AndRC2_CBC NID_pbeWithMD5AndDES_CBC |
4752
|
|
|
|
|
|
|
NID_pbeWithMD5AndRC2_CBC NID_shaWithRSAEncryption |
4753
|
|
|
|
|
|
|
OPENSSL_INFO_ENGINES_DIR OPENSSL_INFO_MODULES_DIR |
4754
|
|
|
|
|
|
|
OPENSSL_INFO_SEED_SOURCE OP_LEGACY_SERVER_CONNECT |
4755
|
|
|
|
|
|
|
OP_MICROSOFT_SESS_ID_BUG OP_TLS_BLOCK_PADDING_BUG |
4756
|
|
|
|
|
|
|
R_CHALLENGE_IS_DIFFERENT R_CIPHER_TABLE_SRC_ERROR |
4757
|
|
|
|
|
|
|
R_PEER_ERROR_CERTIFICATE R_READ_WRONG_PACKET_TYPE |
4758
|
|
|
|
|
|
|
SESS_CACHE_NO_AUTO_CLEAR SSL3_RT_APPLICATION_DATA |
4759
|
|
|
|
|
|
|
X509_PURPOSE_OCSP_HELPER X509_V_ERR_CERT_REJECTED |
4760
|
|
|
|
|
|
|
X509_V_ERR_DANE_NO_MATCH X509_V_ERR_NO_VALID_SCTS |
4761
|
|
|
|
|
|
|
X509_V_FLAG_POLICY_CHECK */ |
4762
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
4763
|
28
|
|
|
|
|
|
switch (name[13]) { |
4764
|
|
|
|
|
|
|
case '2': |
4765
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithMD2AndDES_CBC", 24)) { |
4766
|
|
|
|
|
|
|
/* ^ */ |
4767
|
|
|
|
|
|
|
|
4768
|
|
|
|
|
|
|
#ifdef NID_pbeWithMD2AndDES_CBC |
4769
|
1
|
|
|
|
|
|
return NID_pbeWithMD2AndDES_CBC; |
4770
|
|
|
|
|
|
|
#else |
4771
|
|
|
|
|
|
|
goto not_there; |
4772
|
|
|
|
|
|
|
#endif |
4773
|
|
|
|
|
|
|
|
4774
|
|
|
|
|
|
|
} |
4775
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithMD2AndRC2_CBC", 24)) { |
4776
|
|
|
|
|
|
|
/* ^ */ |
4777
|
|
|
|
|
|
|
|
4778
|
|
|
|
|
|
|
#ifdef NID_pbeWithMD2AndRC2_CBC |
4779
|
1
|
|
|
|
|
|
return NID_pbeWithMD2AndRC2_CBC; |
4780
|
|
|
|
|
|
|
#else |
4781
|
|
|
|
|
|
|
goto not_there; |
4782
|
|
|
|
|
|
|
#endif |
4783
|
|
|
|
|
|
|
|
4784
|
|
|
|
|
|
|
} |
4785
|
0
|
|
|
|
|
|
break; |
4786
|
|
|
|
|
|
|
case '5': |
4787
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithMD5AndDES_CBC", 24)) { |
4788
|
|
|
|
|
|
|
/* ^ */ |
4789
|
|
|
|
|
|
|
|
4790
|
|
|
|
|
|
|
#ifdef NID_pbeWithMD5AndDES_CBC |
4791
|
1
|
|
|
|
|
|
return NID_pbeWithMD5AndDES_CBC; |
4792
|
|
|
|
|
|
|
#else |
4793
|
|
|
|
|
|
|
goto not_there; |
4794
|
|
|
|
|
|
|
#endif |
4795
|
|
|
|
|
|
|
|
4796
|
|
|
|
|
|
|
} |
4797
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithMD5AndRC2_CBC", 24)) { |
4798
|
|
|
|
|
|
|
/* ^ */ |
4799
|
|
|
|
|
|
|
|
4800
|
|
|
|
|
|
|
#ifdef NID_pbeWithMD5AndRC2_CBC |
4801
|
1
|
|
|
|
|
|
return NID_pbeWithMD5AndRC2_CBC; |
4802
|
|
|
|
|
|
|
#else |
4803
|
|
|
|
|
|
|
goto not_there; |
4804
|
|
|
|
|
|
|
#endif |
4805
|
|
|
|
|
|
|
|
4806
|
|
|
|
|
|
|
} |
4807
|
0
|
|
|
|
|
|
break; |
4808
|
|
|
|
|
|
|
case 'A': |
4809
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_md2WithRSAEncryption", 24)) { |
4810
|
|
|
|
|
|
|
/* ^ */ |
4811
|
|
|
|
|
|
|
|
4812
|
|
|
|
|
|
|
#ifdef NID_md2WithRSAEncryption |
4813
|
1
|
|
|
|
|
|
return NID_md2WithRSAEncryption; |
4814
|
|
|
|
|
|
|
#else |
4815
|
|
|
|
|
|
|
goto not_there; |
4816
|
|
|
|
|
|
|
#endif |
4817
|
|
|
|
|
|
|
|
4818
|
|
|
|
|
|
|
} |
4819
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_md5WithRSAEncryption", 24)) { |
4820
|
|
|
|
|
|
|
/* ^ */ |
4821
|
|
|
|
|
|
|
|
4822
|
|
|
|
|
|
|
#ifdef NID_md5WithRSAEncryption |
4823
|
1
|
|
|
|
|
|
return NID_md5WithRSAEncryption; |
4824
|
|
|
|
|
|
|
#else |
4825
|
|
|
|
|
|
|
goto not_there; |
4826
|
|
|
|
|
|
|
#endif |
4827
|
|
|
|
|
|
|
|
4828
|
|
|
|
|
|
|
} |
4829
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_shaWithRSAEncryption", 24)) { |
4830
|
|
|
|
|
|
|
/* ^ */ |
4831
|
|
|
|
|
|
|
|
4832
|
|
|
|
|
|
|
#ifdef NID_shaWithRSAEncryption |
4833
|
1
|
|
|
|
|
|
return NID_shaWithRSAEncryption; |
4834
|
|
|
|
|
|
|
#else |
4835
|
|
|
|
|
|
|
goto not_there; |
4836
|
|
|
|
|
|
|
#endif |
4837
|
|
|
|
|
|
|
|
4838
|
|
|
|
|
|
|
} |
4839
|
0
|
|
|
|
|
|
break; |
4840
|
|
|
|
|
|
|
case 'C': |
4841
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "R_PEER_ERROR_CERTIFICATE", 24)) { |
4842
|
|
|
|
|
|
|
/* ^ */ |
4843
|
|
|
|
|
|
|
|
4844
|
|
|
|
|
|
|
#ifdef SSL_R_PEER_ERROR_CERTIFICATE |
4845
|
1
|
|
|
|
|
|
return SSL_R_PEER_ERROR_CERTIFICATE; |
4846
|
|
|
|
|
|
|
#else |
4847
|
|
|
|
|
|
|
goto not_there; |
4848
|
|
|
|
|
|
|
#endif |
4849
|
|
|
|
|
|
|
|
4850
|
|
|
|
|
|
|
} |
4851
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_APPLICATION_DATA", 24)) { |
4852
|
|
|
|
|
|
|
/* ^ */ |
4853
|
|
|
|
|
|
|
|
4854
|
|
|
|
|
|
|
#ifdef SSL3_RT_APPLICATION_DATA |
4855
|
1
|
|
|
|
|
|
return SSL3_RT_APPLICATION_DATA; |
4856
|
|
|
|
|
|
|
#else |
4857
|
|
|
|
|
|
|
goto not_there; |
4858
|
|
|
|
|
|
|
#endif |
4859
|
|
|
|
|
|
|
|
4860
|
|
|
|
|
|
|
} |
4861
|
0
|
|
|
|
|
|
break; |
4862
|
|
|
|
|
|
|
case 'E': |
4863
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_ENGINES_DIR", 24)) { |
4864
|
|
|
|
|
|
|
/* ^ */ |
4865
|
|
|
|
|
|
|
|
4866
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_ENGINES_DIR |
4867
|
|
|
|
|
|
|
return OPENSSL_INFO_ENGINES_DIR; |
4868
|
|
|
|
|
|
|
#else |
4869
|
1
|
|
|
|
|
|
goto not_there; |
4870
|
|
|
|
|
|
|
#endif |
4871
|
|
|
|
|
|
|
|
4872
|
|
|
|
|
|
|
} |
4873
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_CIPHER_TABLE_SRC_ERROR", 24)) { |
4874
|
|
|
|
|
|
|
/* ^ */ |
4875
|
|
|
|
|
|
|
|
4876
|
|
|
|
|
|
|
#ifdef SSL_R_CIPHER_TABLE_SRC_ERROR |
4877
|
1
|
|
|
|
|
|
return SSL_R_CIPHER_TABLE_SRC_ERROR; |
4878
|
|
|
|
|
|
|
#else |
4879
|
|
|
|
|
|
|
goto not_there; |
4880
|
|
|
|
|
|
|
#endif |
4881
|
|
|
|
|
|
|
|
4882
|
|
|
|
|
|
|
} |
4883
|
0
|
|
|
|
|
|
break; |
4884
|
|
|
|
|
|
|
case 'L': |
4885
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_RSA_PUBLIC_ENCRYPT", 24)) { |
4886
|
|
|
|
|
|
|
/* ^ */ |
4887
|
|
|
|
|
|
|
|
4888
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_RSA_PUBLIC_ENCRYPT |
4889
|
1
|
|
|
|
|
|
return SSL_F_SSL_RSA_PUBLIC_ENCRYPT; |
4890
|
|
|
|
|
|
|
#else |
4891
|
|
|
|
|
|
|
goto not_there; |
4892
|
|
|
|
|
|
|
#endif |
4893
|
|
|
|
|
|
|
|
4894
|
|
|
|
|
|
|
} |
4895
|
0
|
|
|
|
|
|
break; |
4896
|
|
|
|
|
|
|
case 'M': |
4897
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_MODULES_DIR", 24)) { |
4898
|
|
|
|
|
|
|
/* ^ */ |
4899
|
|
|
|
|
|
|
|
4900
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_MODULES_DIR |
4901
|
|
|
|
|
|
|
return OPENSSL_INFO_MODULES_DIR; |
4902
|
|
|
|
|
|
|
#else |
4903
|
1
|
|
|
|
|
|
goto not_there; |
4904
|
|
|
|
|
|
|
#endif |
4905
|
|
|
|
|
|
|
|
4906
|
|
|
|
|
|
|
} |
4907
|
0
|
|
|
|
|
|
break; |
4908
|
|
|
|
|
|
|
case 'N': |
4909
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_DANE_NO_MATCH", 24)) { |
4910
|
|
|
|
|
|
|
/* ^ */ |
4911
|
|
|
|
|
|
|
|
4912
|
|
|
|
|
|
|
#ifdef X509_V_ERR_DANE_NO_MATCH |
4913
|
|
|
|
|
|
|
return X509_V_ERR_DANE_NO_MATCH; |
4914
|
|
|
|
|
|
|
#else |
4915
|
1
|
|
|
|
|
|
goto not_there; |
4916
|
|
|
|
|
|
|
#endif |
4917
|
|
|
|
|
|
|
|
4918
|
|
|
|
|
|
|
} |
4919
|
0
|
|
|
|
|
|
break; |
4920
|
|
|
|
|
|
|
case 'O': |
4921
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_OCSP_HELPER", 24)) { |
4922
|
|
|
|
|
|
|
/* ^ */ |
4923
|
|
|
|
|
|
|
|
4924
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_OCSP_HELPER |
4925
|
1
|
|
|
|
|
|
return X509_PURPOSE_OCSP_HELPER; |
4926
|
|
|
|
|
|
|
#else |
4927
|
|
|
|
|
|
|
goto not_there; |
4928
|
|
|
|
|
|
|
#endif |
4929
|
|
|
|
|
|
|
|
4930
|
|
|
|
|
|
|
} |
4931
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_POLICY_CHECK", 24)) { |
4932
|
|
|
|
|
|
|
/* ^ */ |
4933
|
|
|
|
|
|
|
|
4934
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_POLICY_CHECK |
4935
|
2
|
|
|
|
|
|
return X509_V_FLAG_POLICY_CHECK; |
4936
|
|
|
|
|
|
|
#else |
4937
|
|
|
|
|
|
|
goto not_there; |
4938
|
|
|
|
|
|
|
#endif |
4939
|
|
|
|
|
|
|
|
4940
|
|
|
|
|
|
|
} |
4941
|
0
|
|
|
|
|
|
break; |
4942
|
|
|
|
|
|
|
case 'P': |
4943
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_TLS_BLOCK_PADDING_BUG", 24)) { |
4944
|
|
|
|
|
|
|
/* ^ */ |
4945
|
|
|
|
|
|
|
|
4946
|
|
|
|
|
|
|
#ifdef SSL_OP_TLS_BLOCK_PADDING_BUG |
4947
|
1
|
|
|
|
|
|
return SSL_OP_TLS_BLOCK_PADDING_BUG; |
4948
|
|
|
|
|
|
|
#else |
4949
|
|
|
|
|
|
|
goto not_there; |
4950
|
|
|
|
|
|
|
#endif |
4951
|
|
|
|
|
|
|
|
4952
|
|
|
|
|
|
|
} |
4953
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_READ_WRONG_PACKET_TYPE", 24)) { |
4954
|
|
|
|
|
|
|
/* ^ */ |
4955
|
|
|
|
|
|
|
|
4956
|
|
|
|
|
|
|
#ifdef SSL_R_READ_WRONG_PACKET_TYPE |
4957
|
1
|
|
|
|
|
|
return SSL_R_READ_WRONG_PACKET_TYPE; |
4958
|
|
|
|
|
|
|
#else |
4959
|
|
|
|
|
|
|
goto not_there; |
4960
|
|
|
|
|
|
|
#endif |
4961
|
|
|
|
|
|
|
|
4962
|
|
|
|
|
|
|
} |
4963
|
0
|
|
|
|
|
|
break; |
4964
|
|
|
|
|
|
|
case 'R': |
4965
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_REJECTED", 24)) { |
4966
|
|
|
|
|
|
|
/* ^ */ |
4967
|
|
|
|
|
|
|
|
4968
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_REJECTED |
4969
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_REJECTED; |
4970
|
|
|
|
|
|
|
#else |
4971
|
|
|
|
|
|
|
goto not_there; |
4972
|
|
|
|
|
|
|
#endif |
4973
|
|
|
|
|
|
|
|
4974
|
|
|
|
|
|
|
} |
4975
|
0
|
|
|
|
|
|
break; |
4976
|
|
|
|
|
|
|
case 'S': |
4977
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_SEED_SOURCE", 24)) { |
4978
|
|
|
|
|
|
|
/* ^ */ |
4979
|
|
|
|
|
|
|
|
4980
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_SEED_SOURCE |
4981
|
|
|
|
|
|
|
return OPENSSL_INFO_SEED_SOURCE; |
4982
|
|
|
|
|
|
|
#else |
4983
|
1
|
|
|
|
|
|
goto not_there; |
4984
|
|
|
|
|
|
|
#endif |
4985
|
|
|
|
|
|
|
|
4986
|
|
|
|
|
|
|
} |
4987
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_MICROSOFT_SESS_ID_BUG", 24)) { |
4988
|
|
|
|
|
|
|
/* ^ */ |
4989
|
|
|
|
|
|
|
|
4990
|
|
|
|
|
|
|
#ifdef SSL_OP_MICROSOFT_SESS_ID_BUG |
4991
|
1
|
|
|
|
|
|
return SSL_OP_MICROSOFT_SESS_ID_BUG; |
4992
|
|
|
|
|
|
|
#else |
4993
|
|
|
|
|
|
|
goto not_there; |
4994
|
|
|
|
|
|
|
#endif |
4995
|
|
|
|
|
|
|
|
4996
|
|
|
|
|
|
|
} |
4997
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_CHALLENGE_IS_DIFFERENT", 24)) { |
4998
|
|
|
|
|
|
|
/* ^ */ |
4999
|
|
|
|
|
|
|
|
5000
|
|
|
|
|
|
|
#ifdef SSL_R_CHALLENGE_IS_DIFFERENT |
5001
|
1
|
|
|
|
|
|
return SSL_R_CHALLENGE_IS_DIFFERENT; |
5002
|
|
|
|
|
|
|
#else |
5003
|
|
|
|
|
|
|
goto not_there; |
5004
|
|
|
|
|
|
|
#endif |
5005
|
|
|
|
|
|
|
|
5006
|
|
|
|
|
|
|
} |
5007
|
0
|
|
|
|
|
|
break; |
5008
|
|
|
|
|
|
|
case 'V': |
5009
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_LEGACY_SERVER_CONNECT", 24)) { |
5010
|
|
|
|
|
|
|
/* ^ */ |
5011
|
|
|
|
|
|
|
|
5012
|
|
|
|
|
|
|
#ifdef SSL_OP_LEGACY_SERVER_CONNECT |
5013
|
1
|
|
|
|
|
|
return SSL_OP_LEGACY_SERVER_CONNECT; |
5014
|
|
|
|
|
|
|
#else |
5015
|
|
|
|
|
|
|
goto not_there; |
5016
|
|
|
|
|
|
|
#endif |
5017
|
|
|
|
|
|
|
|
5018
|
|
|
|
|
|
|
} |
5019
|
0
|
|
|
|
|
|
break; |
5020
|
|
|
|
|
|
|
case '_': |
5021
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_NO_AUTO_CLEAR", 24)) { |
5022
|
|
|
|
|
|
|
/* ^ */ |
5023
|
|
|
|
|
|
|
|
5024
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_NO_AUTO_CLEAR |
5025
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_NO_AUTO_CLEAR; |
5026
|
|
|
|
|
|
|
#else |
5027
|
|
|
|
|
|
|
goto not_there; |
5028
|
|
|
|
|
|
|
#endif |
5029
|
|
|
|
|
|
|
|
5030
|
|
|
|
|
|
|
} |
5031
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_NO_VALID_SCTS", 24)) { |
5032
|
|
|
|
|
|
|
/* ^ */ |
5033
|
|
|
|
|
|
|
|
5034
|
|
|
|
|
|
|
#ifdef X509_V_ERR_NO_VALID_SCTS |
5035
|
|
|
|
|
|
|
return X509_V_ERR_NO_VALID_SCTS; |
5036
|
|
|
|
|
|
|
#else |
5037
|
1
|
|
|
|
|
|
goto not_there; |
5038
|
|
|
|
|
|
|
#endif |
5039
|
|
|
|
|
|
|
|
5040
|
|
|
|
|
|
|
} |
5041
|
0
|
|
|
|
|
|
break; |
5042
|
|
|
|
|
|
|
case 'r': |
5043
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_renewal_url", 24)) { |
5044
|
|
|
|
|
|
|
/* ^ */ |
5045
|
|
|
|
|
|
|
|
5046
|
|
|
|
|
|
|
#ifdef NID_netscape_renewal_url |
5047
|
1
|
|
|
|
|
|
return NID_netscape_renewal_url; |
5048
|
|
|
|
|
|
|
#else |
5049
|
|
|
|
|
|
|
goto not_there; |
5050
|
|
|
|
|
|
|
#endif |
5051
|
|
|
|
|
|
|
|
5052
|
|
|
|
|
|
|
} |
5053
|
0
|
|
|
|
|
|
break; |
5054
|
|
|
|
|
|
|
case 't': |
5055
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_certificate_policies", 24)) { |
5056
|
|
|
|
|
|
|
/* ^ */ |
5057
|
|
|
|
|
|
|
|
5058
|
|
|
|
|
|
|
#ifdef NID_certificate_policies |
5059
|
1
|
|
|
|
|
|
return NID_certificate_policies; |
5060
|
|
|
|
|
|
|
#else |
5061
|
|
|
|
|
|
|
goto not_there; |
5062
|
|
|
|
|
|
|
#endif |
5063
|
|
|
|
|
|
|
|
5064
|
|
|
|
|
|
|
} |
5065
|
0
|
|
|
|
|
|
break; |
5066
|
|
|
|
|
|
|
} |
5067
|
0
|
|
|
|
|
|
break; |
5068
|
|
|
|
|
|
|
case 25: |
5069
|
|
|
|
|
|
|
/* Names all of length 25. */ |
5070
|
|
|
|
|
|
|
/* F_SSL_RSA_PRIVATE_DECRYPT F_SSL_USE_PRIVATEKEY_ASN1 |
5071
|
|
|
|
|
|
|
F_SSL_USE_PRIVATEKEY_FILE MODE_ENABLE_PARTIAL_WRITE |
5072
|
|
|
|
|
|
|
NID_pbeWithSHA1AndDES_CBC NID_pbeWithSHA1AndRC2_CBC |
5073
|
|
|
|
|
|
|
NID_sha1WithRSAEncryption OPENSSL_INFO_CPU_SETTINGS |
5074
|
|
|
|
|
|
|
OP_MSIE_SSLV2_RSA_PADDING OP_NETSCAPE_CHALLENGE_BUG |
5075
|
|
|
|
|
|
|
OP_SAFARI_ECDHE_ECDSA_BUG R_BAD_AUTHENTICATION_TYPE |
5076
|
|
|
|
|
|
|
SSL2_MT_CLIENT_MASTER_KEY SSL3_MT_END_OF_EARLY_DATA |
5077
|
|
|
|
|
|
|
SSL3_MT_NEWSESSION_TICKET SSL3_MT_SUPPLEMENTAL_DATA |
5078
|
|
|
|
|
|
|
V_OCSP_CERTSTATUS_REVOKED V_OCSP_CERTSTATUS_UNKNOWN |
5079
|
|
|
|
|
|
|
X509_V_ERR_CA_MD_TOO_WEAK X509_V_ERR_CERT_UNTRUSTED |
5080
|
|
|
|
|
|
|
X509_V_ERR_EMAIL_MISMATCH X509_V_ERR_INVALID_NON_CA |
5081
|
|
|
|
|
|
|
X509_V_ERR_SUBTREE_MINMAX X509_V_FLAG_CRL_CHECK_ALL |
5082
|
|
|
|
|
|
|
X509_V_FLAG_LEGACY_VERIFY X509_V_FLAG_NOTIFY_POLICY |
5083
|
|
|
|
|
|
|
X509_V_FLAG_NO_ALT_CHAINS X509_V_FLAG_NO_CHECK_TIME |
5084
|
|
|
|
|
|
|
X509_V_FLAG_PARTIAL_CHAIN X509_V_FLAG_TRUSTED_FIRST */ |
5085
|
|
|
|
|
|
|
/* Offset 19 gives the best switch position. */ |
5086
|
32
|
|
|
|
|
|
switch (name[19]) { |
5087
|
|
|
|
|
|
|
case 'A': |
5088
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_MSIE_SSLV2_RSA_PADDING", 25)) { |
5089
|
|
|
|
|
|
|
/* ^ */ |
5090
|
|
|
|
|
|
|
|
5091
|
|
|
|
|
|
|
#ifdef SSL_OP_MSIE_SSLV2_RSA_PADDING |
5092
|
1
|
|
|
|
|
|
return SSL_OP_MSIE_SSLV2_RSA_PADDING; |
5093
|
|
|
|
|
|
|
#else |
5094
|
|
|
|
|
|
|
goto not_there; |
5095
|
|
|
|
|
|
|
#endif |
5096
|
|
|
|
|
|
|
|
5097
|
|
|
|
|
|
|
} |
5098
|
0
|
|
|
|
|
|
break; |
5099
|
|
|
|
|
|
|
case 'C': |
5100
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithSHA1AndRC2_CBC", 25)) { |
5101
|
|
|
|
|
|
|
/* ^ */ |
5102
|
|
|
|
|
|
|
|
5103
|
|
|
|
|
|
|
#ifdef NID_pbeWithSHA1AndRC2_CBC |
5104
|
1
|
|
|
|
|
|
return NID_pbeWithSHA1AndRC2_CBC; |
5105
|
|
|
|
|
|
|
#else |
5106
|
|
|
|
|
|
|
goto not_there; |
5107
|
|
|
|
|
|
|
#endif |
5108
|
|
|
|
|
|
|
|
5109
|
|
|
|
|
|
|
} |
5110
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_CRL_CHECK_ALL", 25)) { |
5111
|
|
|
|
|
|
|
/* ^ */ |
5112
|
|
|
|
|
|
|
|
5113
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_CRL_CHECK_ALL |
5114
|
1
|
|
|
|
|
|
return X509_V_FLAG_CRL_CHECK_ALL; |
5115
|
|
|
|
|
|
|
#else |
5116
|
|
|
|
|
|
|
goto not_there; |
5117
|
|
|
|
|
|
|
#endif |
5118
|
|
|
|
|
|
|
|
5119
|
|
|
|
|
|
|
} |
5120
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_NO_ALT_CHAINS", 25)) { |
5121
|
|
|
|
|
|
|
/* ^ */ |
5122
|
|
|
|
|
|
|
|
5123
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_NO_ALT_CHAINS |
5124
|
1
|
|
|
|
|
|
return X509_V_FLAG_NO_ALT_CHAINS; |
5125
|
|
|
|
|
|
|
#else |
5126
|
|
|
|
|
|
|
goto not_there; |
5127
|
|
|
|
|
|
|
#endif |
5128
|
|
|
|
|
|
|
|
5129
|
|
|
|
|
|
|
} |
5130
|
0
|
|
|
|
|
|
break; |
5131
|
|
|
|
|
|
|
case 'E': |
5132
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_RSA_PRIVATE_DECRYPT", 25)) { |
5133
|
|
|
|
|
|
|
/* ^ */ |
5134
|
|
|
|
|
|
|
|
5135
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_RSA_PRIVATE_DECRYPT |
5136
|
1
|
|
|
|
|
|
return SSL_F_SSL_RSA_PRIVATE_DECRYPT; |
5137
|
|
|
|
|
|
|
#else |
5138
|
|
|
|
|
|
|
goto not_there; |
5139
|
|
|
|
|
|
|
#endif |
5140
|
|
|
|
|
|
|
|
5141
|
|
|
|
|
|
|
} |
5142
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithSHA1AndDES_CBC", 25)) { |
5143
|
|
|
|
|
|
|
/* ^ */ |
5144
|
|
|
|
|
|
|
|
5145
|
|
|
|
|
|
|
#ifdef NID_pbeWithSHA1AndDES_CBC |
5146
|
1
|
|
|
|
|
|
return NID_pbeWithSHA1AndDES_CBC; |
5147
|
|
|
|
|
|
|
#else |
5148
|
|
|
|
|
|
|
goto not_there; |
5149
|
|
|
|
|
|
|
#endif |
5150
|
|
|
|
|
|
|
|
5151
|
|
|
|
|
|
|
} |
5152
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_CLIENT_MASTER_KEY", 25)) { |
5153
|
|
|
|
|
|
|
/* ^ */ |
5154
|
|
|
|
|
|
|
|
5155
|
|
|
|
|
|
|
#ifdef SSL2_MT_CLIENT_MASTER_KEY |
5156
|
1
|
|
|
|
|
|
return SSL2_MT_CLIENT_MASTER_KEY; |
5157
|
|
|
|
|
|
|
#else |
5158
|
|
|
|
|
|
|
goto not_there; |
5159
|
|
|
|
|
|
|
#endif |
5160
|
|
|
|
|
|
|
|
5161
|
|
|
|
|
|
|
} |
5162
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "V_OCSP_CERTSTATUS_REVOKED", 25)) { |
5163
|
|
|
|
|
|
|
/* ^ */ |
5164
|
|
|
|
|
|
|
|
5165
|
|
|
|
|
|
|
#ifdef V_OCSP_CERTSTATUS_REVOKED |
5166
|
1
|
|
|
|
|
|
return V_OCSP_CERTSTATUS_REVOKED; |
5167
|
|
|
|
|
|
|
#else |
5168
|
|
|
|
|
|
|
goto not_there; |
5169
|
|
|
|
|
|
|
#endif |
5170
|
|
|
|
|
|
|
|
5171
|
|
|
|
|
|
|
} |
5172
|
0
|
|
|
|
|
|
break; |
5173
|
|
|
|
|
|
|
case 'G': |
5174
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NETSCAPE_CHALLENGE_BUG", 25)) { |
5175
|
|
|
|
|
|
|
/* ^ */ |
5176
|
|
|
|
|
|
|
|
5177
|
|
|
|
|
|
|
#ifdef SSL_OP_NETSCAPE_CHALLENGE_BUG |
5178
|
1
|
|
|
|
|
|
return SSL_OP_NETSCAPE_CHALLENGE_BUG; |
5179
|
|
|
|
|
|
|
#else |
5180
|
|
|
|
|
|
|
goto not_there; |
5181
|
|
|
|
|
|
|
#endif |
5182
|
|
|
|
|
|
|
|
5183
|
|
|
|
|
|
|
} |
5184
|
0
|
|
|
|
|
|
break; |
5185
|
|
|
|
|
|
|
case 'K': |
5186
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_NO_CHECK_TIME", 25)) { |
5187
|
|
|
|
|
|
|
/* ^ */ |
5188
|
|
|
|
|
|
|
|
5189
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_NO_CHECK_TIME |
5190
|
|
|
|
|
|
|
return X509_V_FLAG_NO_CHECK_TIME; |
5191
|
|
|
|
|
|
|
#else |
5192
|
1
|
|
|
|
|
|
goto not_there; |
5193
|
|
|
|
|
|
|
#endif |
5194
|
|
|
|
|
|
|
|
5195
|
|
|
|
|
|
|
} |
5196
|
0
|
|
|
|
|
|
break; |
5197
|
|
|
|
|
|
|
case 'L': |
5198
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_SUPPLEMENTAL_DATA", 25)) { |
5199
|
|
|
|
|
|
|
/* ^ */ |
5200
|
|
|
|
|
|
|
|
5201
|
|
|
|
|
|
|
#ifdef SSL3_MT_SUPPLEMENTAL_DATA |
5202
|
|
|
|
|
|
|
return SSL3_MT_SUPPLEMENTAL_DATA; |
5203
|
|
|
|
|
|
|
#else |
5204
|
1
|
|
|
|
|
|
goto not_there; |
5205
|
|
|
|
|
|
|
#endif |
5206
|
|
|
|
|
|
|
|
5207
|
|
|
|
|
|
|
} |
5208
|
0
|
|
|
|
|
|
break; |
5209
|
|
|
|
|
|
|
case 'M': |
5210
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUBTREE_MINMAX", 25)) { |
5211
|
|
|
|
|
|
|
/* ^ */ |
5212
|
|
|
|
|
|
|
|
5213
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUBTREE_MINMAX |
5214
|
1
|
|
|
|
|
|
return X509_V_ERR_SUBTREE_MINMAX; |
5215
|
|
|
|
|
|
|
#else |
5216
|
|
|
|
|
|
|
goto not_there; |
5217
|
|
|
|
|
|
|
#endif |
5218
|
|
|
|
|
|
|
|
5219
|
|
|
|
|
|
|
} |
5220
|
0
|
|
|
|
|
|
break; |
5221
|
|
|
|
|
|
|
case 'N': |
5222
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "R_BAD_AUTHENTICATION_TYPE", 25)) { |
5223
|
|
|
|
|
|
|
/* ^ */ |
5224
|
|
|
|
|
|
|
|
5225
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_AUTHENTICATION_TYPE |
5226
|
1
|
|
|
|
|
|
return SSL_R_BAD_AUTHENTICATION_TYPE; |
5227
|
|
|
|
|
|
|
#else |
5228
|
|
|
|
|
|
|
goto not_there; |
5229
|
|
|
|
|
|
|
#endif |
5230
|
|
|
|
|
|
|
|
5231
|
|
|
|
|
|
|
} |
5232
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "V_OCSP_CERTSTATUS_UNKNOWN", 25)) { |
5233
|
|
|
|
|
|
|
/* ^ */ |
5234
|
|
|
|
|
|
|
|
5235
|
|
|
|
|
|
|
#ifdef V_OCSP_CERTSTATUS_UNKNOWN |
5236
|
1
|
|
|
|
|
|
return V_OCSP_CERTSTATUS_UNKNOWN; |
5237
|
|
|
|
|
|
|
#else |
5238
|
|
|
|
|
|
|
goto not_there; |
5239
|
|
|
|
|
|
|
#endif |
5240
|
|
|
|
|
|
|
|
5241
|
|
|
|
|
|
|
} |
5242
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_NON_CA", 25)) { |
5243
|
|
|
|
|
|
|
/* ^ */ |
5244
|
|
|
|
|
|
|
|
5245
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_NON_CA |
5246
|
1
|
|
|
|
|
|
return X509_V_ERR_INVALID_NON_CA; |
5247
|
|
|
|
|
|
|
#else |
5248
|
|
|
|
|
|
|
goto not_there; |
5249
|
|
|
|
|
|
|
#endif |
5250
|
|
|
|
|
|
|
|
5251
|
|
|
|
|
|
|
} |
5252
|
0
|
|
|
|
|
|
break; |
5253
|
|
|
|
|
|
|
case 'O': |
5254
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CA_MD_TOO_WEAK", 25)) { |
5255
|
|
|
|
|
|
|
/* ^ */ |
5256
|
|
|
|
|
|
|
|
5257
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CA_MD_TOO_WEAK |
5258
|
|
|
|
|
|
|
return X509_V_ERR_CA_MD_TOO_WEAK; |
5259
|
|
|
|
|
|
|
#else |
5260
|
1
|
|
|
|
|
|
goto not_there; |
5261
|
|
|
|
|
|
|
#endif |
5262
|
|
|
|
|
|
|
|
5263
|
|
|
|
|
|
|
} |
5264
|
0
|
|
|
|
|
|
break; |
5265
|
|
|
|
|
|
|
case 'P': |
5266
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_NOTIFY_POLICY", 25)) { |
5267
|
|
|
|
|
|
|
/* ^ */ |
5268
|
|
|
|
|
|
|
|
5269
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_NOTIFY_POLICY |
5270
|
1
|
|
|
|
|
|
return X509_V_FLAG_NOTIFY_POLICY; |
5271
|
|
|
|
|
|
|
#else |
5272
|
|
|
|
|
|
|
goto not_there; |
5273
|
|
|
|
|
|
|
#endif |
5274
|
|
|
|
|
|
|
|
5275
|
|
|
|
|
|
|
} |
5276
|
0
|
|
|
|
|
|
break; |
5277
|
|
|
|
|
|
|
case 'R': |
5278
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_UNTRUSTED", 25)) { |
5279
|
|
|
|
|
|
|
/* ^ */ |
5280
|
|
|
|
|
|
|
|
5281
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_UNTRUSTED |
5282
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_UNTRUSTED; |
5283
|
|
|
|
|
|
|
#else |
5284
|
|
|
|
|
|
|
goto not_there; |
5285
|
|
|
|
|
|
|
#endif |
5286
|
|
|
|
|
|
|
|
5287
|
|
|
|
|
|
|
} |
5288
|
0
|
|
|
|
|
|
break; |
5289
|
|
|
|
|
|
|
case 'S': |
5290
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_SAFARI_ECDHE_ECDSA_BUG", 25)) { |
5291
|
|
|
|
|
|
|
/* ^ */ |
5292
|
|
|
|
|
|
|
|
5293
|
|
|
|
|
|
|
#ifdef SSL_OP_SAFARI_ECDHE_ECDSA_BUG |
5294
|
1
|
|
|
|
|
|
return SSL_OP_SAFARI_ECDHE_ECDSA_BUG; |
5295
|
|
|
|
|
|
|
#else |
5296
|
|
|
|
|
|
|
goto not_there; |
5297
|
|
|
|
|
|
|
#endif |
5298
|
|
|
|
|
|
|
|
5299
|
|
|
|
|
|
|
} |
5300
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_EMAIL_MISMATCH", 25)) { |
5301
|
|
|
|
|
|
|
/* ^ */ |
5302
|
|
|
|
|
|
|
|
5303
|
|
|
|
|
|
|
#ifdef X509_V_ERR_EMAIL_MISMATCH |
5304
|
1
|
|
|
|
|
|
return X509_V_ERR_EMAIL_MISMATCH; |
5305
|
|
|
|
|
|
|
#else |
5306
|
|
|
|
|
|
|
goto not_there; |
5307
|
|
|
|
|
|
|
#endif |
5308
|
|
|
|
|
|
|
|
5309
|
|
|
|
|
|
|
} |
5310
|
0
|
|
|
|
|
|
break; |
5311
|
|
|
|
|
|
|
case 'T': |
5312
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_CPU_SETTINGS", 25)) { |
5313
|
|
|
|
|
|
|
/* ^ */ |
5314
|
|
|
|
|
|
|
|
5315
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_CPU_SETTINGS |
5316
|
|
|
|
|
|
|
return OPENSSL_INFO_CPU_SETTINGS; |
5317
|
|
|
|
|
|
|
#else |
5318
|
1
|
|
|
|
|
|
goto not_there; |
5319
|
|
|
|
|
|
|
#endif |
5320
|
|
|
|
|
|
|
|
5321
|
|
|
|
|
|
|
} |
5322
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_NEWSESSION_TICKET", 25)) { |
5323
|
|
|
|
|
|
|
/* ^ */ |
5324
|
|
|
|
|
|
|
|
5325
|
|
|
|
|
|
|
#ifdef SSL3_MT_NEWSESSION_TICKET |
5326
|
1
|
|
|
|
|
|
return SSL3_MT_NEWSESSION_TICKET; |
5327
|
|
|
|
|
|
|
#else |
5328
|
|
|
|
|
|
|
goto not_there; |
5329
|
|
|
|
|
|
|
#endif |
5330
|
|
|
|
|
|
|
|
5331
|
|
|
|
|
|
|
} |
5332
|
0
|
|
|
|
|
|
break; |
5333
|
|
|
|
|
|
|
case 'V': |
5334
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_LEGACY_VERIFY", 25)) { |
5335
|
|
|
|
|
|
|
/* ^ */ |
5336
|
|
|
|
|
|
|
|
5337
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_LEGACY_VERIFY |
5338
|
|
|
|
|
|
|
return X509_V_FLAG_LEGACY_VERIFY; |
5339
|
|
|
|
|
|
|
#else |
5340
|
1
|
|
|
|
|
|
goto not_there; |
5341
|
|
|
|
|
|
|
#endif |
5342
|
|
|
|
|
|
|
|
5343
|
|
|
|
|
|
|
} |
5344
|
0
|
|
|
|
|
|
break; |
5345
|
|
|
|
|
|
|
case 'Y': |
5346
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_PRIVATEKEY_ASN1", 25)) { |
5347
|
|
|
|
|
|
|
/* ^ */ |
5348
|
|
|
|
|
|
|
|
5349
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_PRIVATEKEY_ASN1 |
5350
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_PRIVATEKEY_ASN1; |
5351
|
|
|
|
|
|
|
#else |
5352
|
|
|
|
|
|
|
goto not_there; |
5353
|
|
|
|
|
|
|
#endif |
5354
|
|
|
|
|
|
|
|
5355
|
|
|
|
|
|
|
} |
5356
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_PRIVATEKEY_FILE", 25)) { |
5357
|
|
|
|
|
|
|
/* ^ */ |
5358
|
|
|
|
|
|
|
|
5359
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_PRIVATEKEY_FILE |
5360
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_PRIVATEKEY_FILE; |
5361
|
|
|
|
|
|
|
#else |
5362
|
|
|
|
|
|
|
goto not_there; |
5363
|
|
|
|
|
|
|
#endif |
5364
|
|
|
|
|
|
|
|
5365
|
|
|
|
|
|
|
} |
5366
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_END_OF_EARLY_DATA", 25)) { |
5367
|
|
|
|
|
|
|
/* ^ */ |
5368
|
|
|
|
|
|
|
|
5369
|
|
|
|
|
|
|
#ifdef SSL3_MT_END_OF_EARLY_DATA |
5370
|
|
|
|
|
|
|
return SSL3_MT_END_OF_EARLY_DATA; |
5371
|
|
|
|
|
|
|
#else |
5372
|
1
|
|
|
|
|
|
goto not_there; |
5373
|
|
|
|
|
|
|
#endif |
5374
|
|
|
|
|
|
|
|
5375
|
|
|
|
|
|
|
} |
5376
|
0
|
|
|
|
|
|
break; |
5377
|
|
|
|
|
|
|
case '_': |
5378
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "MODE_ENABLE_PARTIAL_WRITE", 25)) { |
5379
|
|
|
|
|
|
|
/* ^ */ |
5380
|
|
|
|
|
|
|
|
5381
|
|
|
|
|
|
|
#ifdef SSL_MODE_ENABLE_PARTIAL_WRITE |
5382
|
1
|
|
|
|
|
|
return SSL_MODE_ENABLE_PARTIAL_WRITE; |
5383
|
|
|
|
|
|
|
#else |
5384
|
|
|
|
|
|
|
goto not_there; |
5385
|
|
|
|
|
|
|
#endif |
5386
|
|
|
|
|
|
|
|
5387
|
|
|
|
|
|
|
} |
5388
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_PARTIAL_CHAIN", 25)) { |
5389
|
|
|
|
|
|
|
/* ^ */ |
5390
|
|
|
|
|
|
|
|
5391
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_PARTIAL_CHAIN |
5392
|
1
|
|
|
|
|
|
return X509_V_FLAG_PARTIAL_CHAIN; |
5393
|
|
|
|
|
|
|
#else |
5394
|
|
|
|
|
|
|
goto not_there; |
5395
|
|
|
|
|
|
|
#endif |
5396
|
|
|
|
|
|
|
|
5397
|
|
|
|
|
|
|
} |
5398
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_TRUSTED_FIRST", 25)) { |
5399
|
|
|
|
|
|
|
/* ^ */ |
5400
|
|
|
|
|
|
|
|
5401
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_TRUSTED_FIRST |
5402
|
1
|
|
|
|
|
|
return X509_V_FLAG_TRUSTED_FIRST; |
5403
|
|
|
|
|
|
|
#else |
5404
|
|
|
|
|
|
|
goto not_there; |
5405
|
|
|
|
|
|
|
#endif |
5406
|
|
|
|
|
|
|
|
5407
|
|
|
|
|
|
|
} |
5408
|
0
|
|
|
|
|
|
break; |
5409
|
|
|
|
|
|
|
case 'y': |
5410
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_sha1WithRSAEncryption", 25)) { |
5411
|
|
|
|
|
|
|
/* ^ */ |
5412
|
|
|
|
|
|
|
|
5413
|
|
|
|
|
|
|
#ifdef NID_sha1WithRSAEncryption |
5414
|
1
|
|
|
|
|
|
return NID_sha1WithRSAEncryption; |
5415
|
|
|
|
|
|
|
#else |
5416
|
|
|
|
|
|
|
goto not_there; |
5417
|
|
|
|
|
|
|
#endif |
5418
|
|
|
|
|
|
|
|
5419
|
|
|
|
|
|
|
} |
5420
|
0
|
|
|
|
|
|
break; |
5421
|
|
|
|
|
|
|
} |
5422
|
2
|
|
|
|
|
|
break; |
5423
|
|
|
|
|
|
|
case 26: |
5424
|
|
|
|
|
|
|
/* Names all of length 26. */ |
5425
|
|
|
|
|
|
|
/* F_SSL_USE_CERTIFICATE_ASN1 F_SSL_USE_CERTIFICATE_FILE |
5426
|
|
|
|
|
|
|
NID_netscape_ca_policy_url NID_netscape_cert_sequence |
5427
|
|
|
|
|
|
|
NID_organizationalUnitName NID_pbeWithMD5AndCast5_CBC |
5428
|
|
|
|
|
|
|
NID_pkcs9_countersignature NID_pkcs9_unstructuredName |
5429
|
|
|
|
|
|
|
NID_subject_key_identifier OPENSSL_INFO_DSO_EXTENSION |
5430
|
|
|
|
|
|
|
OP_ENABLE_MIDDLEBOX_COMPAT OP_NO_CLIENT_RENEGOTIATION |
5431
|
|
|
|
|
|
|
R_INVALID_CHALLENGE_LENGTH R_NO_CERTIFICATE_SPECIFIED |
5432
|
|
|
|
|
|
|
R_PUBLIC_KEY_ENCRYPT_ERROR SSL2_MT_CLIENT_CERTIFICATE |
5433
|
|
|
|
|
|
|
SSL3_MT_CERTIFICATE_STATUS SSL3_MT_CERTIFICATE_VERIFY |
5434
|
|
|
|
|
|
|
SSL3_MT_CHANGE_CIPHER_SPEC SSL3_RT_CHANGE_CIPHER_SPEC |
5435
|
|
|
|
|
|
|
SSL3_RT_INNER_CONTENT_TYPE X509_PURPOSE_NS_SSL_SERVER |
5436
|
|
|
|
|
|
|
X509_PURPOSE_SMIME_ENCRYPT X509_V_ERR_CRL_HAS_EXPIRED |
5437
|
|
|
|
|
|
|
X509_V_ERR_INVALID_PURPOSE X509_V_FLAG_SUITEB_128_LOS |
5438
|
|
|
|
|
|
|
X509_V_FLAG_SUITEB_192_LOS X509_V_FLAG_USE_CHECK_TIME */ |
5439
|
|
|
|
|
|
|
/* Offset 20 gives the best switch position. */ |
5440
|
28
|
|
|
|
|
|
switch (name[20]) { |
5441
|
|
|
|
|
|
|
case '2': |
5442
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_SUITEB_128_LOS", 26)) { |
5443
|
|
|
|
|
|
|
/* ^ */ |
5444
|
|
|
|
|
|
|
|
5445
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_SUITEB_128_LOS |
5446
|
1
|
|
|
|
|
|
return X509_V_FLAG_SUITEB_128_LOS; |
5447
|
|
|
|
|
|
|
#else |
5448
|
|
|
|
|
|
|
goto not_there; |
5449
|
|
|
|
|
|
|
#endif |
5450
|
|
|
|
|
|
|
|
5451
|
|
|
|
|
|
|
} |
5452
|
0
|
|
|
|
|
|
break; |
5453
|
|
|
|
|
|
|
case '9': |
5454
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_SUITEB_192_LOS", 26)) { |
5455
|
|
|
|
|
|
|
/* ^ */ |
5456
|
|
|
|
|
|
|
|
5457
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_SUITEB_192_LOS |
5458
|
1
|
|
|
|
|
|
return X509_V_FLAG_SUITEB_192_LOS; |
5459
|
|
|
|
|
|
|
#else |
5460
|
|
|
|
|
|
|
goto not_there; |
5461
|
|
|
|
|
|
|
#endif |
5462
|
|
|
|
|
|
|
|
5463
|
|
|
|
|
|
|
} |
5464
|
0
|
|
|
|
|
|
break; |
5465
|
|
|
|
|
|
|
case 'C': |
5466
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_ENABLE_MIDDLEBOX_COMPAT", 26)) { |
5467
|
|
|
|
|
|
|
/* ^ */ |
5468
|
|
|
|
|
|
|
|
5469
|
|
|
|
|
|
|
#ifdef SSL_OP_ENABLE_MIDDLEBOX_COMPAT |
5470
|
|
|
|
|
|
|
return SSL_OP_ENABLE_MIDDLEBOX_COMPAT; |
5471
|
|
|
|
|
|
|
#else |
5472
|
1
|
|
|
|
|
|
goto not_there; |
5473
|
|
|
|
|
|
|
#endif |
5474
|
|
|
|
|
|
|
|
5475
|
|
|
|
|
|
|
} |
5476
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_CERTIFICATE_SPECIFIED", 26)) { |
5477
|
|
|
|
|
|
|
/* ^ */ |
5478
|
|
|
|
|
|
|
|
5479
|
|
|
|
|
|
|
#ifdef SSL_R_NO_CERTIFICATE_SPECIFIED |
5480
|
1
|
|
|
|
|
|
return SSL_R_NO_CERTIFICATE_SPECIFIED; |
5481
|
|
|
|
|
|
|
#else |
5482
|
|
|
|
|
|
|
goto not_there; |
5483
|
|
|
|
|
|
|
#endif |
5484
|
|
|
|
|
|
|
|
5485
|
|
|
|
|
|
|
} |
5486
|
0
|
|
|
|
|
|
break; |
5487
|
|
|
|
|
|
|
case 'E': |
5488
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_CERTIFICATE_ASN1", 26)) { |
5489
|
|
|
|
|
|
|
/* ^ */ |
5490
|
|
|
|
|
|
|
|
5491
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_CERTIFICATE_ASN1 |
5492
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_CERTIFICATE_ASN1; |
5493
|
|
|
|
|
|
|
#else |
5494
|
|
|
|
|
|
|
goto not_there; |
5495
|
|
|
|
|
|
|
#endif |
5496
|
|
|
|
|
|
|
|
5497
|
|
|
|
|
|
|
} |
5498
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_CERTIFICATE_FILE", 26)) { |
5499
|
|
|
|
|
|
|
/* ^ */ |
5500
|
|
|
|
|
|
|
|
5501
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_CERTIFICATE_FILE |
5502
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_CERTIFICATE_FILE; |
5503
|
|
|
|
|
|
|
#else |
5504
|
|
|
|
|
|
|
goto not_there; |
5505
|
|
|
|
|
|
|
#endif |
5506
|
|
|
|
|
|
|
|
5507
|
|
|
|
|
|
|
} |
5508
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_DSO_EXTENSION", 26)) { |
5509
|
|
|
|
|
|
|
/* ^ */ |
5510
|
|
|
|
|
|
|
|
5511
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_DSO_EXTENSION |
5512
|
|
|
|
|
|
|
return OPENSSL_INFO_DSO_EXTENSION; |
5513
|
|
|
|
|
|
|
#else |
5514
|
1
|
|
|
|
|
|
goto not_there; |
5515
|
|
|
|
|
|
|
#endif |
5516
|
|
|
|
|
|
|
|
5517
|
|
|
|
|
|
|
} |
5518
|
0
|
|
|
|
|
|
break; |
5519
|
|
|
|
|
|
|
case 'F': |
5520
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_CLIENT_CERTIFICATE", 26)) { |
5521
|
|
|
|
|
|
|
/* ^ */ |
5522
|
|
|
|
|
|
|
|
5523
|
|
|
|
|
|
|
#ifdef SSL2_MT_CLIENT_CERTIFICATE |
5524
|
1
|
|
|
|
|
|
return SSL2_MT_CLIENT_CERTIFICATE; |
5525
|
|
|
|
|
|
|
#else |
5526
|
|
|
|
|
|
|
goto not_there; |
5527
|
|
|
|
|
|
|
#endif |
5528
|
|
|
|
|
|
|
|
5529
|
|
|
|
|
|
|
} |
5530
|
0
|
|
|
|
|
|
break; |
5531
|
|
|
|
|
|
|
case 'I': |
5532
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_CLIENT_RENEGOTIATION", 26)) { |
5533
|
|
|
|
|
|
|
/* ^ */ |
5534
|
|
|
|
|
|
|
|
5535
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_CLIENT_RENEGOTIATION |
5536
|
|
|
|
|
|
|
return SSL_OP_NO_CLIENT_RENEGOTIATION; |
5537
|
|
|
|
|
|
|
#else |
5538
|
1
|
|
|
|
|
|
goto not_there; |
5539
|
|
|
|
|
|
|
#endif |
5540
|
|
|
|
|
|
|
|
5541
|
|
|
|
|
|
|
} |
5542
|
0
|
|
|
|
|
|
break; |
5543
|
|
|
|
|
|
|
case 'K': |
5544
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_USE_CHECK_TIME", 26)) { |
5545
|
|
|
|
|
|
|
/* ^ */ |
5546
|
|
|
|
|
|
|
|
5547
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_USE_CHECK_TIME |
5548
|
1
|
|
|
|
|
|
return X509_V_FLAG_USE_CHECK_TIME; |
5549
|
|
|
|
|
|
|
#else |
5550
|
|
|
|
|
|
|
goto not_there; |
5551
|
|
|
|
|
|
|
#endif |
5552
|
|
|
|
|
|
|
|
5553
|
|
|
|
|
|
|
} |
5554
|
0
|
|
|
|
|
|
break; |
5555
|
|
|
|
|
|
|
case 'L': |
5556
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_INVALID_CHALLENGE_LENGTH", 26)) { |
5557
|
|
|
|
|
|
|
/* ^ */ |
5558
|
|
|
|
|
|
|
|
5559
|
|
|
|
|
|
|
#ifdef SSL_R_INVALID_CHALLENGE_LENGTH |
5560
|
1
|
|
|
|
|
|
return SSL_R_INVALID_CHALLENGE_LENGTH; |
5561
|
|
|
|
|
|
|
#else |
5562
|
|
|
|
|
|
|
goto not_there; |
5563
|
|
|
|
|
|
|
#endif |
5564
|
|
|
|
|
|
|
|
5565
|
|
|
|
|
|
|
} |
5566
|
0
|
|
|
|
|
|
break; |
5567
|
|
|
|
|
|
|
case 'N': |
5568
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_SMIME_ENCRYPT", 26)) { |
5569
|
|
|
|
|
|
|
/* ^ */ |
5570
|
|
|
|
|
|
|
|
5571
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_SMIME_ENCRYPT |
5572
|
1
|
|
|
|
|
|
return X509_PURPOSE_SMIME_ENCRYPT; |
5573
|
|
|
|
|
|
|
#else |
5574
|
|
|
|
|
|
|
goto not_there; |
5575
|
|
|
|
|
|
|
#endif |
5576
|
|
|
|
|
|
|
|
5577
|
|
|
|
|
|
|
} |
5578
|
0
|
|
|
|
|
|
break; |
5579
|
|
|
|
|
|
|
case 'R': |
5580
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CHANGE_CIPHER_SPEC", 26)) { |
5581
|
|
|
|
|
|
|
/* ^ */ |
5582
|
|
|
|
|
|
|
|
5583
|
|
|
|
|
|
|
#ifdef SSL3_MT_CHANGE_CIPHER_SPEC |
5584
|
|
|
|
|
|
|
return SSL3_MT_CHANGE_CIPHER_SPEC; |
5585
|
|
|
|
|
|
|
#else |
5586
|
1
|
|
|
|
|
|
goto not_there; |
5587
|
|
|
|
|
|
|
#endif |
5588
|
|
|
|
|
|
|
|
5589
|
|
|
|
|
|
|
} |
5590
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_CHANGE_CIPHER_SPEC", 26)) { |
5591
|
|
|
|
|
|
|
/* ^ */ |
5592
|
|
|
|
|
|
|
|
5593
|
|
|
|
|
|
|
#ifdef SSL3_RT_CHANGE_CIPHER_SPEC |
5594
|
1
|
|
|
|
|
|
return SSL3_RT_CHANGE_CIPHER_SPEC; |
5595
|
|
|
|
|
|
|
#else |
5596
|
|
|
|
|
|
|
goto not_there; |
5597
|
|
|
|
|
|
|
#endif |
5598
|
|
|
|
|
|
|
|
5599
|
|
|
|
|
|
|
} |
5600
|
0
|
|
|
|
|
|
break; |
5601
|
|
|
|
|
|
|
case 'S': |
5602
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CERTIFICATE_STATUS", 26)) { |
5603
|
|
|
|
|
|
|
/* ^ */ |
5604
|
|
|
|
|
|
|
|
5605
|
|
|
|
|
|
|
#ifdef SSL3_MT_CERTIFICATE_STATUS |
5606
|
1
|
|
|
|
|
|
return SSL3_MT_CERTIFICATE_STATUS; |
5607
|
|
|
|
|
|
|
#else |
5608
|
|
|
|
|
|
|
goto not_there; |
5609
|
|
|
|
|
|
|
#endif |
5610
|
|
|
|
|
|
|
|
5611
|
|
|
|
|
|
|
} |
5612
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_NS_SSL_SERVER", 26)) { |
5613
|
|
|
|
|
|
|
/* ^ */ |
5614
|
|
|
|
|
|
|
|
5615
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_NS_SSL_SERVER |
5616
|
1
|
|
|
|
|
|
return X509_PURPOSE_NS_SSL_SERVER; |
5617
|
|
|
|
|
|
|
#else |
5618
|
|
|
|
|
|
|
goto not_there; |
5619
|
|
|
|
|
|
|
#endif |
5620
|
|
|
|
|
|
|
|
5621
|
|
|
|
|
|
|
} |
5622
|
0
|
|
|
|
|
|
break; |
5623
|
|
|
|
|
|
|
case 'T': |
5624
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_INNER_CONTENT_TYPE", 26)) { |
5625
|
|
|
|
|
|
|
/* ^ */ |
5626
|
|
|
|
|
|
|
|
5627
|
|
|
|
|
|
|
#ifdef SSL3_RT_INNER_CONTENT_TYPE |
5628
|
|
|
|
|
|
|
return SSL3_RT_INNER_CONTENT_TYPE; |
5629
|
|
|
|
|
|
|
#else |
5630
|
1
|
|
|
|
|
|
goto not_there; |
5631
|
|
|
|
|
|
|
#endif |
5632
|
|
|
|
|
|
|
|
5633
|
|
|
|
|
|
|
} |
5634
|
0
|
|
|
|
|
|
break; |
5635
|
|
|
|
|
|
|
case 'U': |
5636
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_PURPOSE", 26)) { |
5637
|
|
|
|
|
|
|
/* ^ */ |
5638
|
|
|
|
|
|
|
|
5639
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_PURPOSE |
5640
|
1
|
|
|
|
|
|
return X509_V_ERR_INVALID_PURPOSE; |
5641
|
|
|
|
|
|
|
#else |
5642
|
|
|
|
|
|
|
goto not_there; |
5643
|
|
|
|
|
|
|
#endif |
5644
|
|
|
|
|
|
|
|
5645
|
|
|
|
|
|
|
} |
5646
|
0
|
|
|
|
|
|
break; |
5647
|
|
|
|
|
|
|
case 'V': |
5648
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CERTIFICATE_VERIFY", 26)) { |
5649
|
|
|
|
|
|
|
/* ^ */ |
5650
|
|
|
|
|
|
|
|
5651
|
|
|
|
|
|
|
#ifdef SSL3_MT_CERTIFICATE_VERIFY |
5652
|
1
|
|
|
|
|
|
return SSL3_MT_CERTIFICATE_VERIFY; |
5653
|
|
|
|
|
|
|
#else |
5654
|
|
|
|
|
|
|
goto not_there; |
5655
|
|
|
|
|
|
|
#endif |
5656
|
|
|
|
|
|
|
|
5657
|
|
|
|
|
|
|
} |
5658
|
0
|
|
|
|
|
|
break; |
5659
|
|
|
|
|
|
|
case 'X': |
5660
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CRL_HAS_EXPIRED", 26)) { |
5661
|
|
|
|
|
|
|
/* ^ */ |
5662
|
|
|
|
|
|
|
|
5663
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CRL_HAS_EXPIRED |
5664
|
1
|
|
|
|
|
|
return X509_V_ERR_CRL_HAS_EXPIRED; |
5665
|
|
|
|
|
|
|
#else |
5666
|
|
|
|
|
|
|
goto not_there; |
5667
|
|
|
|
|
|
|
#endif |
5668
|
|
|
|
|
|
|
|
5669
|
|
|
|
|
|
|
} |
5670
|
0
|
|
|
|
|
|
break; |
5671
|
|
|
|
|
|
|
case '_': |
5672
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_PUBLIC_KEY_ENCRYPT_ERROR", 26)) { |
5673
|
|
|
|
|
|
|
/* ^ */ |
5674
|
|
|
|
|
|
|
|
5675
|
|
|
|
|
|
|
#ifdef SSL_R_PUBLIC_KEY_ENCRYPT_ERROR |
5676
|
1
|
|
|
|
|
|
return SSL_R_PUBLIC_KEY_ENCRYPT_ERROR; |
5677
|
|
|
|
|
|
|
#else |
5678
|
|
|
|
|
|
|
goto not_there; |
5679
|
|
|
|
|
|
|
#endif |
5680
|
|
|
|
|
|
|
|
5681
|
|
|
|
|
|
|
} |
5682
|
0
|
|
|
|
|
|
break; |
5683
|
|
|
|
|
|
|
case 'c': |
5684
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_ca_policy_url", 26)) { |
5685
|
|
|
|
|
|
|
/* ^ */ |
5686
|
|
|
|
|
|
|
|
5687
|
|
|
|
|
|
|
#ifdef NID_netscape_ca_policy_url |
5688
|
1
|
|
|
|
|
|
return NID_netscape_ca_policy_url; |
5689
|
|
|
|
|
|
|
#else |
5690
|
|
|
|
|
|
|
goto not_there; |
5691
|
|
|
|
|
|
|
#endif |
5692
|
|
|
|
|
|
|
|
5693
|
|
|
|
|
|
|
} |
5694
|
0
|
|
|
|
|
|
break; |
5695
|
|
|
|
|
|
|
case 'e': |
5696
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_unstructuredName", 26)) { |
5697
|
|
|
|
|
|
|
/* ^ */ |
5698
|
|
|
|
|
|
|
|
5699
|
|
|
|
|
|
|
#ifdef NID_pkcs9_unstructuredName |
5700
|
1
|
|
|
|
|
|
return NID_pkcs9_unstructuredName; |
5701
|
|
|
|
|
|
|
#else |
5702
|
|
|
|
|
|
|
goto not_there; |
5703
|
|
|
|
|
|
|
#endif |
5704
|
|
|
|
|
|
|
|
5705
|
|
|
|
|
|
|
} |
5706
|
0
|
|
|
|
|
|
break; |
5707
|
|
|
|
|
|
|
case 'i': |
5708
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_organizationalUnitName", 26)) { |
5709
|
|
|
|
|
|
|
/* ^ */ |
5710
|
|
|
|
|
|
|
|
5711
|
|
|
|
|
|
|
#ifdef NID_organizationalUnitName |
5712
|
1
|
|
|
|
|
|
return NID_organizationalUnitName; |
5713
|
|
|
|
|
|
|
#else |
5714
|
|
|
|
|
|
|
goto not_there; |
5715
|
|
|
|
|
|
|
#endif |
5716
|
|
|
|
|
|
|
|
5717
|
|
|
|
|
|
|
} |
5718
|
0
|
|
|
|
|
|
break; |
5719
|
|
|
|
|
|
|
case 'n': |
5720
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_countersignature", 26)) { |
5721
|
|
|
|
|
|
|
/* ^ */ |
5722
|
|
|
|
|
|
|
|
5723
|
|
|
|
|
|
|
#ifdef NID_pkcs9_countersignature |
5724
|
1
|
|
|
|
|
|
return NID_pkcs9_countersignature; |
5725
|
|
|
|
|
|
|
#else |
5726
|
|
|
|
|
|
|
goto not_there; |
5727
|
|
|
|
|
|
|
#endif |
5728
|
|
|
|
|
|
|
|
5729
|
|
|
|
|
|
|
} |
5730
|
0
|
|
|
|
|
|
break; |
5731
|
|
|
|
|
|
|
case 'q': |
5732
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_cert_sequence", 26)) { |
5733
|
|
|
|
|
|
|
/* ^ */ |
5734
|
|
|
|
|
|
|
|
5735
|
|
|
|
|
|
|
#ifdef NID_netscape_cert_sequence |
5736
|
1
|
|
|
|
|
|
return NID_netscape_cert_sequence; |
5737
|
|
|
|
|
|
|
#else |
5738
|
|
|
|
|
|
|
goto not_there; |
5739
|
|
|
|
|
|
|
#endif |
5740
|
|
|
|
|
|
|
|
5741
|
|
|
|
|
|
|
} |
5742
|
0
|
|
|
|
|
|
break; |
5743
|
|
|
|
|
|
|
case 't': |
5744
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithMD5AndCast5_CBC", 26)) { |
5745
|
|
|
|
|
|
|
/* ^ */ |
5746
|
|
|
|
|
|
|
|
5747
|
|
|
|
|
|
|
#ifdef NID_pbeWithMD5AndCast5_CBC |
5748
|
1
|
|
|
|
|
|
return NID_pbeWithMD5AndCast5_CBC; |
5749
|
|
|
|
|
|
|
#else |
5750
|
|
|
|
|
|
|
goto not_there; |
5751
|
|
|
|
|
|
|
#endif |
5752
|
|
|
|
|
|
|
|
5753
|
|
|
|
|
|
|
} |
5754
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_subject_key_identifier", 26)) { |
5755
|
|
|
|
|
|
|
/* ^ */ |
5756
|
|
|
|
|
|
|
|
5757
|
|
|
|
|
|
|
#ifdef NID_subject_key_identifier |
5758
|
1
|
|
|
|
|
|
return NID_subject_key_identifier; |
5759
|
|
|
|
|
|
|
#else |
5760
|
|
|
|
|
|
|
goto not_there; |
5761
|
|
|
|
|
|
|
#endif |
5762
|
|
|
|
|
|
|
|
5763
|
|
|
|
|
|
|
} |
5764
|
0
|
|
|
|
|
|
break; |
5765
|
|
|
|
|
|
|
} |
5766
|
0
|
|
|
|
|
|
break; |
5767
|
|
|
|
|
|
|
case 27: |
5768
|
|
|
|
|
|
|
/* Names all of length 27. */ |
5769
|
|
|
|
|
|
|
/* NID_crl_distribution_points NID_netscape_cert_extension |
5770
|
|
|
|
|
|
|
NID_netscape_revocation_url NID_pbe_WithSHA1And40BitRC4 |
5771
|
|
|
|
|
|
|
NID_pkcs9_challengePassword NID_pkcs9_extCertAttributes |
5772
|
|
|
|
|
|
|
OPENSSL_FULL_VERSION_STRING OPENSSL_INFO_LIST_SEPARATOR |
5773
|
|
|
|
|
|
|
OP_CIPHER_SERVER_PREFERENCE OP_SSLEAY_080_CLIENT_DH_BUG |
5774
|
|
|
|
|
|
|
R_BAD_SSL_SESSION_ID_LENGTH R_UNKNOWN_REMOTE_ERROR_TYPE |
5775
|
|
|
|
|
|
|
SSL2_MT_REQUEST_CERTIFICATE SSL3_MT_CERTIFICATE_REQUEST |
5776
|
|
|
|
|
|
|
SSL3_MT_CLIENT_KEY_EXCHANGE SSL3_MT_SERVER_KEY_EXCHANGE |
5777
|
|
|
|
|
|
|
VERIFY_FAIL_IF_NO_PEER_CERT X509_PURPOSE_TIMESTAMP_SIGN |
5778
|
|
|
|
|
|
|
X509_V_ERR_CA_KEY_TOO_SMALL X509_V_ERR_CERT_HAS_EXPIRED |
5779
|
|
|
|
|
|
|
X509_V_ERR_EE_KEY_TOO_SMALL X509_V_FLAG_CB_ISSUER_CHECK |
5780
|
|
|
|
|
|
|
X509_V_FLAG_EXPLICIT_POLICY X509_V_FLAG_IGNORE_CRITICAL |
5781
|
|
|
|
|
|
|
XN_FLAG_DUMP_UNKNOWN_FIELDS */ |
5782
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
5783
|
27
|
|
|
|
|
|
switch (name[13]) { |
5784
|
|
|
|
|
|
|
case 'B': |
5785
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_CB_ISSUER_CHECK", 27)) { |
5786
|
|
|
|
|
|
|
/* ^ */ |
5787
|
|
|
|
|
|
|
|
5788
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_CB_ISSUER_CHECK |
5789
|
1
|
|
|
|
|
|
return X509_V_FLAG_CB_ISSUER_CHECK; |
5790
|
|
|
|
|
|
|
#else |
5791
|
|
|
|
|
|
|
goto not_there; |
5792
|
|
|
|
|
|
|
#endif |
5793
|
|
|
|
|
|
|
|
5794
|
|
|
|
|
|
|
} |
5795
|
0
|
|
|
|
|
|
break; |
5796
|
|
|
|
|
|
|
case 'C': |
5797
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_extCertAttributes", 27)) { |
5798
|
|
|
|
|
|
|
/* ^ */ |
5799
|
|
|
|
|
|
|
|
5800
|
|
|
|
|
|
|
#ifdef NID_pkcs9_extCertAttributes |
5801
|
1
|
|
|
|
|
|
return NID_pkcs9_extCertAttributes; |
5802
|
|
|
|
|
|
|
#else |
5803
|
|
|
|
|
|
|
goto not_there; |
5804
|
|
|
|
|
|
|
#endif |
5805
|
|
|
|
|
|
|
|
5806
|
|
|
|
|
|
|
} |
5807
|
0
|
|
|
|
|
|
break; |
5808
|
|
|
|
|
|
|
case 'F': |
5809
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CERTIFICATE_REQUEST", 27)) { |
5810
|
|
|
|
|
|
|
/* ^ */ |
5811
|
|
|
|
|
|
|
|
5812
|
|
|
|
|
|
|
#ifdef SSL3_MT_CERTIFICATE_REQUEST |
5813
|
1
|
|
|
|
|
|
return SSL3_MT_CERTIFICATE_REQUEST; |
5814
|
|
|
|
|
|
|
#else |
5815
|
|
|
|
|
|
|
goto not_there; |
5816
|
|
|
|
|
|
|
#endif |
5817
|
|
|
|
|
|
|
|
5818
|
|
|
|
|
|
|
} |
5819
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "VERIFY_FAIL_IF_NO_PEER_CERT", 27)) { |
5820
|
|
|
|
|
|
|
/* ^ */ |
5821
|
|
|
|
|
|
|
|
5822
|
|
|
|
|
|
|
#ifdef SSL_VERIFY_FAIL_IF_NO_PEER_CERT |
5823
|
1
|
|
|
|
|
|
return SSL_VERIFY_FAIL_IF_NO_PEER_CERT; |
5824
|
|
|
|
|
|
|
#else |
5825
|
|
|
|
|
|
|
goto not_there; |
5826
|
|
|
|
|
|
|
#endif |
5827
|
|
|
|
|
|
|
|
5828
|
|
|
|
|
|
|
} |
5829
|
0
|
|
|
|
|
|
break; |
5830
|
|
|
|
|
|
|
case 'G': |
5831
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_IGNORE_CRITICAL", 27)) { |
5832
|
|
|
|
|
|
|
/* ^ */ |
5833
|
|
|
|
|
|
|
|
5834
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_IGNORE_CRITICAL |
5835
|
1
|
|
|
|
|
|
return X509_V_FLAG_IGNORE_CRITICAL; |
5836
|
|
|
|
|
|
|
#else |
5837
|
|
|
|
|
|
|
goto not_there; |
5838
|
|
|
|
|
|
|
#endif |
5839
|
|
|
|
|
|
|
|
5840
|
|
|
|
|
|
|
} |
5841
|
0
|
|
|
|
|
|
break; |
5842
|
|
|
|
|
|
|
case 'H': |
5843
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And40BitRC4", 27)) { |
5844
|
|
|
|
|
|
|
/* ^ */ |
5845
|
|
|
|
|
|
|
|
5846
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And40BitRC4 |
5847
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And40BitRC4; |
5848
|
|
|
|
|
|
|
#else |
5849
|
|
|
|
|
|
|
goto not_there; |
5850
|
|
|
|
|
|
|
#endif |
5851
|
|
|
|
|
|
|
|
5852
|
|
|
|
|
|
|
} |
5853
|
0
|
|
|
|
|
|
break; |
5854
|
|
|
|
|
|
|
case 'L': |
5855
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_LIST_SEPARATOR", 27)) { |
5856
|
|
|
|
|
|
|
/* ^ */ |
5857
|
|
|
|
|
|
|
|
5858
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_LIST_SEPARATOR |
5859
|
|
|
|
|
|
|
return OPENSSL_INFO_LIST_SEPARATOR; |
5860
|
|
|
|
|
|
|
#else |
5861
|
1
|
|
|
|
|
|
goto not_there; |
5862
|
|
|
|
|
|
|
#endif |
5863
|
|
|
|
|
|
|
|
5864
|
|
|
|
|
|
|
} |
5865
|
0
|
|
|
|
|
|
break; |
5866
|
|
|
|
|
|
|
case 'O': |
5867
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_UNKNOWN_REMOTE_ERROR_TYPE", 27)) { |
5868
|
|
|
|
|
|
|
/* ^ */ |
5869
|
|
|
|
|
|
|
|
5870
|
|
|
|
|
|
|
#ifdef SSL_R_UNKNOWN_REMOTE_ERROR_TYPE |
5871
|
1
|
|
|
|
|
|
return SSL_R_UNKNOWN_REMOTE_ERROR_TYPE; |
5872
|
|
|
|
|
|
|
#else |
5873
|
|
|
|
|
|
|
goto not_there; |
5874
|
|
|
|
|
|
|
#endif |
5875
|
|
|
|
|
|
|
|
5876
|
|
|
|
|
|
|
} |
5877
|
0
|
|
|
|
|
|
break; |
5878
|
|
|
|
|
|
|
case 'R': |
5879
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_SERVER_KEY_EXCHANGE", 27)) { |
5880
|
|
|
|
|
|
|
/* ^ */ |
5881
|
|
|
|
|
|
|
|
5882
|
|
|
|
|
|
|
#ifdef SSL3_MT_SERVER_KEY_EXCHANGE |
5883
|
1
|
|
|
|
|
|
return SSL3_MT_SERVER_KEY_EXCHANGE; |
5884
|
|
|
|
|
|
|
#else |
5885
|
|
|
|
|
|
|
goto not_there; |
5886
|
|
|
|
|
|
|
#endif |
5887
|
|
|
|
|
|
|
|
5888
|
|
|
|
|
|
|
} |
5889
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_HAS_EXPIRED", 27)) { |
5890
|
|
|
|
|
|
|
/* ^ */ |
5891
|
|
|
|
|
|
|
|
5892
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_HAS_EXPIRED |
5893
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_HAS_EXPIRED; |
5894
|
|
|
|
|
|
|
#else |
5895
|
|
|
|
|
|
|
goto not_there; |
5896
|
|
|
|
|
|
|
#endif |
5897
|
|
|
|
|
|
|
|
5898
|
|
|
|
|
|
|
} |
5899
|
0
|
|
|
|
|
|
break; |
5900
|
|
|
|
|
|
|
case 'S': |
5901
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "R_BAD_SSL_SESSION_ID_LENGTH", 27)) { |
5902
|
|
|
|
|
|
|
/* ^ */ |
5903
|
|
|
|
|
|
|
|
5904
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_SSL_SESSION_ID_LENGTH |
5905
|
1
|
|
|
|
|
|
return SSL_R_BAD_SSL_SESSION_ID_LENGTH; |
5906
|
|
|
|
|
|
|
#else |
5907
|
|
|
|
|
|
|
goto not_there; |
5908
|
|
|
|
|
|
|
#endif |
5909
|
|
|
|
|
|
|
|
5910
|
|
|
|
|
|
|
} |
5911
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_REQUEST_CERTIFICATE", 27)) { |
5912
|
|
|
|
|
|
|
/* ^ */ |
5913
|
|
|
|
|
|
|
|
5914
|
|
|
|
|
|
|
#ifdef SSL2_MT_REQUEST_CERTIFICATE |
5915
|
1
|
|
|
|
|
|
return SSL2_MT_REQUEST_CERTIFICATE; |
5916
|
|
|
|
|
|
|
#else |
5917
|
|
|
|
|
|
|
goto not_there; |
5918
|
|
|
|
|
|
|
#endif |
5919
|
|
|
|
|
|
|
|
5920
|
|
|
|
|
|
|
} |
5921
|
0
|
|
|
|
|
|
break; |
5922
|
|
|
|
|
|
|
case 'T': |
5923
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CLIENT_KEY_EXCHANGE", 27)) { |
5924
|
|
|
|
|
|
|
/* ^ */ |
5925
|
|
|
|
|
|
|
|
5926
|
|
|
|
|
|
|
#ifdef SSL3_MT_CLIENT_KEY_EXCHANGE |
5927
|
1
|
|
|
|
|
|
return SSL3_MT_CLIENT_KEY_EXCHANGE; |
5928
|
|
|
|
|
|
|
#else |
5929
|
|
|
|
|
|
|
goto not_there; |
5930
|
|
|
|
|
|
|
#endif |
5931
|
|
|
|
|
|
|
|
5932
|
|
|
|
|
|
|
} |
5933
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_TIMESTAMP_SIGN", 27)) { |
5934
|
|
|
|
|
|
|
/* ^ */ |
5935
|
|
|
|
|
|
|
|
5936
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_TIMESTAMP_SIGN |
5937
|
1
|
|
|
|
|
|
return X509_PURPOSE_TIMESTAMP_SIGN; |
5938
|
|
|
|
|
|
|
#else |
5939
|
|
|
|
|
|
|
goto not_there; |
5940
|
|
|
|
|
|
|
#endif |
5941
|
|
|
|
|
|
|
|
5942
|
|
|
|
|
|
|
} |
5943
|
0
|
|
|
|
|
|
break; |
5944
|
|
|
|
|
|
|
case 'U': |
5945
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_DUMP_UNKNOWN_FIELDS", 27)) { |
5946
|
|
|
|
|
|
|
/* ^ */ |
5947
|
|
|
|
|
|
|
|
5948
|
|
|
|
|
|
|
#ifdef XN_FLAG_DUMP_UNKNOWN_FIELDS |
5949
|
1
|
|
|
|
|
|
return XN_FLAG_DUMP_UNKNOWN_FIELDS; |
5950
|
|
|
|
|
|
|
#else |
5951
|
|
|
|
|
|
|
goto not_there; |
5952
|
|
|
|
|
|
|
#endif |
5953
|
|
|
|
|
|
|
|
5954
|
|
|
|
|
|
|
} |
5955
|
0
|
|
|
|
|
|
break; |
5956
|
|
|
|
|
|
|
case 'V': |
5957
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_FULL_VERSION_STRING", 27)) { |
5958
|
|
|
|
|
|
|
/* ^ */ |
5959
|
|
|
|
|
|
|
|
5960
|
|
|
|
|
|
|
#ifdef OPENSSL_FULL_VERSION_STRING |
5961
|
|
|
|
|
|
|
return OPENSSL_FULL_VERSION_STRING; |
5962
|
|
|
|
|
|
|
#else |
5963
|
1
|
|
|
|
|
|
goto not_there; |
5964
|
|
|
|
|
|
|
#endif |
5965
|
|
|
|
|
|
|
|
5966
|
|
|
|
|
|
|
} |
5967
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_CIPHER_SERVER_PREFERENCE", 27)) { |
5968
|
|
|
|
|
|
|
/* ^ */ |
5969
|
|
|
|
|
|
|
|
5970
|
|
|
|
|
|
|
#ifdef SSL_OP_CIPHER_SERVER_PREFERENCE |
5971
|
1
|
|
|
|
|
|
return SSL_OP_CIPHER_SERVER_PREFERENCE; |
5972
|
|
|
|
|
|
|
#else |
5973
|
|
|
|
|
|
|
goto not_there; |
5974
|
|
|
|
|
|
|
#endif |
5975
|
|
|
|
|
|
|
|
5976
|
|
|
|
|
|
|
} |
5977
|
0
|
|
|
|
|
|
break; |
5978
|
|
|
|
|
|
|
case 'X': |
5979
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_EXPLICIT_POLICY", 27)) { |
5980
|
|
|
|
|
|
|
/* ^ */ |
5981
|
|
|
|
|
|
|
|
5982
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_EXPLICIT_POLICY |
5983
|
2
|
|
|
|
|
|
return X509_V_FLAG_EXPLICIT_POLICY; |
5984
|
|
|
|
|
|
|
#else |
5985
|
|
|
|
|
|
|
goto not_there; |
5986
|
|
|
|
|
|
|
#endif |
5987
|
|
|
|
|
|
|
|
5988
|
|
|
|
|
|
|
} |
5989
|
0
|
|
|
|
|
|
break; |
5990
|
|
|
|
|
|
|
case '_': |
5991
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OP_SSLEAY_080_CLIENT_DH_BUG", 27)) { |
5992
|
|
|
|
|
|
|
/* ^ */ |
5993
|
|
|
|
|
|
|
|
5994
|
|
|
|
|
|
|
#ifdef SSL_OP_SSLEAY_080_CLIENT_DH_BUG |
5995
|
1
|
|
|
|
|
|
return SSL_OP_SSLEAY_080_CLIENT_DH_BUG; |
5996
|
|
|
|
|
|
|
#else |
5997
|
|
|
|
|
|
|
goto not_there; |
5998
|
|
|
|
|
|
|
#endif |
5999
|
|
|
|
|
|
|
|
6000
|
|
|
|
|
|
|
} |
6001
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CA_KEY_TOO_SMALL", 27)) { |
6002
|
|
|
|
|
|
|
/* ^ */ |
6003
|
|
|
|
|
|
|
|
6004
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CA_KEY_TOO_SMALL |
6005
|
|
|
|
|
|
|
return X509_V_ERR_CA_KEY_TOO_SMALL; |
6006
|
|
|
|
|
|
|
#else |
6007
|
1
|
|
|
|
|
|
goto not_there; |
6008
|
|
|
|
|
|
|
#endif |
6009
|
|
|
|
|
|
|
|
6010
|
|
|
|
|
|
|
} |
6011
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_EE_KEY_TOO_SMALL", 27)) { |
6012
|
|
|
|
|
|
|
/* ^ */ |
6013
|
|
|
|
|
|
|
|
6014
|
|
|
|
|
|
|
#ifdef X509_V_ERR_EE_KEY_TOO_SMALL |
6015
|
|
|
|
|
|
|
return X509_V_ERR_EE_KEY_TOO_SMALL; |
6016
|
|
|
|
|
|
|
#else |
6017
|
1
|
|
|
|
|
|
goto not_there; |
6018
|
|
|
|
|
|
|
#endif |
6019
|
|
|
|
|
|
|
|
6020
|
|
|
|
|
|
|
} |
6021
|
0
|
|
|
|
|
|
break; |
6022
|
|
|
|
|
|
|
case 'c': |
6023
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_cert_extension", 27)) { |
6024
|
|
|
|
|
|
|
/* ^ */ |
6025
|
|
|
|
|
|
|
|
6026
|
|
|
|
|
|
|
#ifdef NID_netscape_cert_extension |
6027
|
1
|
|
|
|
|
|
return NID_netscape_cert_extension; |
6028
|
|
|
|
|
|
|
#else |
6029
|
|
|
|
|
|
|
goto not_there; |
6030
|
|
|
|
|
|
|
#endif |
6031
|
|
|
|
|
|
|
|
6032
|
|
|
|
|
|
|
} |
6033
|
0
|
|
|
|
|
|
break; |
6034
|
|
|
|
|
|
|
case 'i': |
6035
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_crl_distribution_points", 27)) { |
6036
|
|
|
|
|
|
|
/* ^ */ |
6037
|
|
|
|
|
|
|
|
6038
|
|
|
|
|
|
|
#ifdef NID_crl_distribution_points |
6039
|
2
|
|
|
|
|
|
return NID_crl_distribution_points; |
6040
|
|
|
|
|
|
|
#else |
6041
|
|
|
|
|
|
|
goto not_there; |
6042
|
|
|
|
|
|
|
#endif |
6043
|
|
|
|
|
|
|
|
6044
|
|
|
|
|
|
|
} |
6045
|
0
|
|
|
|
|
|
break; |
6046
|
|
|
|
|
|
|
case 'l': |
6047
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_challengePassword", 27)) { |
6048
|
|
|
|
|
|
|
/* ^ */ |
6049
|
|
|
|
|
|
|
|
6050
|
|
|
|
|
|
|
#ifdef NID_pkcs9_challengePassword |
6051
|
1
|
|
|
|
|
|
return NID_pkcs9_challengePassword; |
6052
|
|
|
|
|
|
|
#else |
6053
|
|
|
|
|
|
|
goto not_there; |
6054
|
|
|
|
|
|
|
#endif |
6055
|
|
|
|
|
|
|
|
6056
|
|
|
|
|
|
|
} |
6057
|
0
|
|
|
|
|
|
break; |
6058
|
|
|
|
|
|
|
case 'r': |
6059
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_revocation_url", 27)) { |
6060
|
|
|
|
|
|
|
/* ^ */ |
6061
|
|
|
|
|
|
|
|
6062
|
|
|
|
|
|
|
#ifdef NID_netscape_revocation_url |
6063
|
1
|
|
|
|
|
|
return NID_netscape_revocation_url; |
6064
|
|
|
|
|
|
|
#else |
6065
|
|
|
|
|
|
|
goto not_there; |
6066
|
|
|
|
|
|
|
#endif |
6067
|
|
|
|
|
|
|
|
6068
|
|
|
|
|
|
|
} |
6069
|
0
|
|
|
|
|
|
break; |
6070
|
|
|
|
|
|
|
} |
6071
|
0
|
|
|
|
|
|
break; |
6072
|
|
|
|
|
|
|
case 28: |
6073
|
|
|
|
|
|
|
/* Names all of length 28. */ |
6074
|
|
|
|
|
|
|
/* F_SSL_USE_RSAPRIVATEKEY_ASN1 F_SSL_USE_RSAPRIVATEKEY_FILE |
6075
|
|
|
|
|
|
|
NID_authority_key_identifier NID_netscape_ssl_server_name |
6076
|
|
|
|
|
|
|
NID_pbe_WithSHA1And128BitRC4 NID_pkcs7_signedAndEnveloped |
6077
|
|
|
|
|
|
|
NID_private_key_usage_period SESS_CACHE_NO_INTERNAL_STORE |
6078
|
|
|
|
|
|
|
SSL3_MT_ENCRYPTED_EXTENSIONS X509_CHECK_FLAG_NO_WILDCARDS |
6079
|
|
|
|
|
|
|
X509_V_ERR_CRL_NOT_YET_VALID X509_V_ERR_HOSTNAME_MISMATCH |
6080
|
|
|
|
|
|
|
X509_V_ERR_INVALID_EXTENSION X509_V_ERR_OCSP_CERT_UNKNOWN |
6081
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_GET_CRL X509_V_ERR_UNNESTED_RESOURCE */ |
6082
|
|
|
|
|
|
|
/* Offset 11 gives the best switch position. */ |
6083
|
19
|
|
|
|
|
|
switch (name[11]) { |
6084
|
|
|
|
|
|
|
case 'C': |
6085
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CRL_NOT_YET_VALID", 28)) { |
6086
|
|
|
|
|
|
|
/* ^ */ |
6087
|
|
|
|
|
|
|
|
6088
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CRL_NOT_YET_VALID |
6089
|
1
|
|
|
|
|
|
return X509_V_ERR_CRL_NOT_YET_VALID; |
6090
|
|
|
|
|
|
|
#else |
6091
|
|
|
|
|
|
|
goto not_there; |
6092
|
|
|
|
|
|
|
#endif |
6093
|
|
|
|
|
|
|
|
6094
|
|
|
|
|
|
|
} |
6095
|
0
|
|
|
|
|
|
break; |
6096
|
|
|
|
|
|
|
case 'F': |
6097
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_NO_WILDCARDS", 28)) { |
6098
|
|
|
|
|
|
|
/* ^ */ |
6099
|
|
|
|
|
|
|
|
6100
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_NO_WILDCARDS |
6101
|
2
|
|
|
|
|
|
return X509_CHECK_FLAG_NO_WILDCARDS; |
6102
|
|
|
|
|
|
|
#else |
6103
|
|
|
|
|
|
|
goto not_there; |
6104
|
|
|
|
|
|
|
#endif |
6105
|
|
|
|
|
|
|
|
6106
|
|
|
|
|
|
|
} |
6107
|
0
|
|
|
|
|
|
break; |
6108
|
|
|
|
|
|
|
case 'H': |
6109
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_HOSTNAME_MISMATCH", 28)) { |
6110
|
|
|
|
|
|
|
/* ^ */ |
6111
|
|
|
|
|
|
|
|
6112
|
|
|
|
|
|
|
#ifdef X509_V_ERR_HOSTNAME_MISMATCH |
6113
|
2
|
|
|
|
|
|
return X509_V_ERR_HOSTNAME_MISMATCH; |
6114
|
|
|
|
|
|
|
#else |
6115
|
|
|
|
|
|
|
goto not_there; |
6116
|
|
|
|
|
|
|
#endif |
6117
|
|
|
|
|
|
|
|
6118
|
|
|
|
|
|
|
} |
6119
|
0
|
|
|
|
|
|
break; |
6120
|
|
|
|
|
|
|
case 'I': |
6121
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_EXTENSION", 28)) { |
6122
|
|
|
|
|
|
|
/* ^ */ |
6123
|
|
|
|
|
|
|
|
6124
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_EXTENSION |
6125
|
1
|
|
|
|
|
|
return X509_V_ERR_INVALID_EXTENSION; |
6126
|
|
|
|
|
|
|
#else |
6127
|
|
|
|
|
|
|
goto not_there; |
6128
|
|
|
|
|
|
|
#endif |
6129
|
|
|
|
|
|
|
|
6130
|
|
|
|
|
|
|
} |
6131
|
0
|
|
|
|
|
|
break; |
6132
|
|
|
|
|
|
|
case 'N': |
6133
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_NO_INTERNAL_STORE", 28)) { |
6134
|
|
|
|
|
|
|
/* ^ */ |
6135
|
|
|
|
|
|
|
|
6136
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_NO_INTERNAL_STORE |
6137
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_NO_INTERNAL_STORE; |
6138
|
|
|
|
|
|
|
#else |
6139
|
|
|
|
|
|
|
goto not_there; |
6140
|
|
|
|
|
|
|
#endif |
6141
|
|
|
|
|
|
|
|
6142
|
|
|
|
|
|
|
} |
6143
|
0
|
|
|
|
|
|
break; |
6144
|
|
|
|
|
|
|
case 'O': |
6145
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_OCSP_CERT_UNKNOWN", 28)) { |
6146
|
|
|
|
|
|
|
/* ^ */ |
6147
|
|
|
|
|
|
|
|
6148
|
|
|
|
|
|
|
#ifdef X509_V_ERR_OCSP_CERT_UNKNOWN |
6149
|
|
|
|
|
|
|
return X509_V_ERR_OCSP_CERT_UNKNOWN; |
6150
|
|
|
|
|
|
|
#else |
6151
|
1
|
|
|
|
|
|
goto not_there; |
6152
|
|
|
|
|
|
|
#endif |
6153
|
|
|
|
|
|
|
|
6154
|
|
|
|
|
|
|
} |
6155
|
0
|
|
|
|
|
|
break; |
6156
|
|
|
|
|
|
|
case 'R': |
6157
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_ENCRYPTED_EXTENSIONS", 28)) { |
6158
|
|
|
|
|
|
|
/* ^ */ |
6159
|
|
|
|
|
|
|
|
6160
|
|
|
|
|
|
|
#ifdef SSL3_MT_ENCRYPTED_EXTENSIONS |
6161
|
|
|
|
|
|
|
return SSL3_MT_ENCRYPTED_EXTENSIONS; |
6162
|
|
|
|
|
|
|
#else |
6163
|
1
|
|
|
|
|
|
goto not_there; |
6164
|
|
|
|
|
|
|
#endif |
6165
|
|
|
|
|
|
|
|
6166
|
|
|
|
|
|
|
} |
6167
|
0
|
|
|
|
|
|
break; |
6168
|
|
|
|
|
|
|
case 'S': |
6169
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_RSAPRIVATEKEY_ASN1", 28)) { |
6170
|
|
|
|
|
|
|
/* ^ */ |
6171
|
|
|
|
|
|
|
|
6172
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1 |
6173
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1; |
6174
|
|
|
|
|
|
|
#else |
6175
|
|
|
|
|
|
|
goto not_there; |
6176
|
|
|
|
|
|
|
#endif |
6177
|
|
|
|
|
|
|
|
6178
|
|
|
|
|
|
|
} |
6179
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_RSAPRIVATEKEY_FILE", 28)) { |
6180
|
|
|
|
|
|
|
/* ^ */ |
6181
|
|
|
|
|
|
|
|
6182
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_RSAPRIVATEKEY_FILE |
6183
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_RSAPRIVATEKEY_FILE; |
6184
|
|
|
|
|
|
|
#else |
6185
|
|
|
|
|
|
|
goto not_there; |
6186
|
|
|
|
|
|
|
#endif |
6187
|
|
|
|
|
|
|
|
6188
|
|
|
|
|
|
|
} |
6189
|
0
|
|
|
|
|
|
break; |
6190
|
|
|
|
|
|
|
case 'U': |
6191
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_CRL", 28)) { |
6192
|
|
|
|
|
|
|
/* ^ */ |
6193
|
|
|
|
|
|
|
|
6194
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_GET_CRL |
6195
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_GET_CRL; |
6196
|
|
|
|
|
|
|
#else |
6197
|
|
|
|
|
|
|
goto not_there; |
6198
|
|
|
|
|
|
|
#endif |
6199
|
|
|
|
|
|
|
|
6200
|
|
|
|
|
|
|
} |
6201
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNNESTED_RESOURCE", 28)) { |
6202
|
|
|
|
|
|
|
/* ^ */ |
6203
|
|
|
|
|
|
|
|
6204
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNNESTED_RESOURCE |
6205
|
1
|
|
|
|
|
|
return X509_V_ERR_UNNESTED_RESOURCE; |
6206
|
|
|
|
|
|
|
#else |
6207
|
|
|
|
|
|
|
goto not_there; |
6208
|
|
|
|
|
|
|
#endif |
6209
|
|
|
|
|
|
|
|
6210
|
|
|
|
|
|
|
} |
6211
|
0
|
|
|
|
|
|
break; |
6212
|
|
|
|
|
|
|
case '_': |
6213
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_private_key_usage_period", 28)) { |
6214
|
|
|
|
|
|
|
/* ^ */ |
6215
|
|
|
|
|
|
|
|
6216
|
|
|
|
|
|
|
#ifdef NID_private_key_usage_period |
6217
|
1
|
|
|
|
|
|
return NID_private_key_usage_period; |
6218
|
|
|
|
|
|
|
#else |
6219
|
|
|
|
|
|
|
goto not_there; |
6220
|
|
|
|
|
|
|
#endif |
6221
|
|
|
|
|
|
|
|
6222
|
|
|
|
|
|
|
} |
6223
|
0
|
|
|
|
|
|
break; |
6224
|
|
|
|
|
|
|
case 'e': |
6225
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_ssl_server_name", 28)) { |
6226
|
|
|
|
|
|
|
/* ^ */ |
6227
|
|
|
|
|
|
|
|
6228
|
|
|
|
|
|
|
#ifdef NID_netscape_ssl_server_name |
6229
|
1
|
|
|
|
|
|
return NID_netscape_ssl_server_name; |
6230
|
|
|
|
|
|
|
#else |
6231
|
|
|
|
|
|
|
goto not_there; |
6232
|
|
|
|
|
|
|
#endif |
6233
|
|
|
|
|
|
|
|
6234
|
|
|
|
|
|
|
} |
6235
|
0
|
|
|
|
|
|
break; |
6236
|
|
|
|
|
|
|
case 'h': |
6237
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And128BitRC4", 28)) { |
6238
|
|
|
|
|
|
|
/* ^ */ |
6239
|
|
|
|
|
|
|
|
6240
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And128BitRC4 |
6241
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And128BitRC4; |
6242
|
|
|
|
|
|
|
#else |
6243
|
|
|
|
|
|
|
goto not_there; |
6244
|
|
|
|
|
|
|
#endif |
6245
|
|
|
|
|
|
|
|
6246
|
|
|
|
|
|
|
} |
6247
|
0
|
|
|
|
|
|
break; |
6248
|
|
|
|
|
|
|
case 'i': |
6249
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_signedAndEnveloped", 28)) { |
6250
|
|
|
|
|
|
|
/* ^ */ |
6251
|
|
|
|
|
|
|
|
6252
|
|
|
|
|
|
|
#ifdef NID_pkcs7_signedAndEnveloped |
6253
|
1
|
|
|
|
|
|
return NID_pkcs7_signedAndEnveloped; |
6254
|
|
|
|
|
|
|
#else |
6255
|
|
|
|
|
|
|
goto not_there; |
6256
|
|
|
|
|
|
|
#endif |
6257
|
|
|
|
|
|
|
|
6258
|
|
|
|
|
|
|
} |
6259
|
0
|
|
|
|
|
|
break; |
6260
|
|
|
|
|
|
|
case 't': |
6261
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_authority_key_identifier", 28)) { |
6262
|
|
|
|
|
|
|
/* ^ */ |
6263
|
|
|
|
|
|
|
|
6264
|
|
|
|
|
|
|
#ifdef NID_authority_key_identifier |
6265
|
2
|
|
|
|
|
|
return NID_authority_key_identifier; |
6266
|
|
|
|
|
|
|
#else |
6267
|
|
|
|
|
|
|
goto not_there; |
6268
|
|
|
|
|
|
|
#endif |
6269
|
|
|
|
|
|
|
|
6270
|
|
|
|
|
|
|
} |
6271
|
0
|
|
|
|
|
|
break; |
6272
|
|
|
|
|
|
|
} |
6273
|
0
|
|
|
|
|
|
break; |
6274
|
|
|
|
|
|
|
case 29: |
6275
|
|
|
|
|
|
|
/* Names all of length 29. */ |
6276
|
|
|
|
|
|
|
/* NID_pkcs9_unstructuredAddress OCSP_RESPONSE_STATUS_TRYLATER |
6277
|
|
|
|
|
|
|
OP_MICROSOFT_BIG_SSLV3_BUFFER R_SSL_SESSION_ID_IS_DIFFERENT |
6278
|
|
|
|
|
|
|
SESS_CACHE_NO_INTERNAL_LOOKUP X509_V_ERR_AKID_SKID_MISMATCH |
6279
|
|
|
|
|
|
|
X509_V_ERR_CERT_NOT_YET_VALID X509_V_ERR_EXCLUDED_VIOLATION |
6280
|
|
|
|
|
|
|
X509_V_ERR_NO_EXPLICIT_POLICY X509_V_ERR_OCSP_VERIFY_FAILED |
6281
|
|
|
|
|
|
|
X509_V_ERR_OCSP_VERIFY_NEEDED X509_V_FLAG_ALLOW_PROXY_CERTS */ |
6282
|
|
|
|
|
|
|
/* Offset 16 gives the best switch position. */ |
6283
|
15
|
|
|
|
|
|
switch (name[16]) { |
6284
|
|
|
|
|
|
|
case 'A': |
6285
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_TRYLATER", 29)) { |
6286
|
|
|
|
|
|
|
/* ^ */ |
6287
|
|
|
|
|
|
|
|
6288
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_TRYLATER |
6289
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_TRYLATER; |
6290
|
|
|
|
|
|
|
#else |
6291
|
|
|
|
|
|
|
goto not_there; |
6292
|
|
|
|
|
|
|
#endif |
6293
|
|
|
|
|
|
|
|
6294
|
|
|
|
|
|
|
} |
6295
|
0
|
|
|
|
|
|
break; |
6296
|
|
|
|
|
|
|
case 'D': |
6297
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_EXCLUDED_VIOLATION", 29)) { |
6298
|
|
|
|
|
|
|
/* ^ */ |
6299
|
|
|
|
|
|
|
|
6300
|
|
|
|
|
|
|
#ifdef X509_V_ERR_EXCLUDED_VIOLATION |
6301
|
1
|
|
|
|
|
|
return X509_V_ERR_EXCLUDED_VIOLATION; |
6302
|
|
|
|
|
|
|
#else |
6303
|
|
|
|
|
|
|
goto not_there; |
6304
|
|
|
|
|
|
|
#endif |
6305
|
|
|
|
|
|
|
|
6306
|
|
|
|
|
|
|
} |
6307
|
0
|
|
|
|
|
|
break; |
6308
|
|
|
|
|
|
|
case 'N': |
6309
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_NOT_YET_VALID", 29)) { |
6310
|
|
|
|
|
|
|
/* ^ */ |
6311
|
|
|
|
|
|
|
|
6312
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_NOT_YET_VALID |
6313
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_NOT_YET_VALID; |
6314
|
|
|
|
|
|
|
#else |
6315
|
|
|
|
|
|
|
goto not_there; |
6316
|
|
|
|
|
|
|
#endif |
6317
|
|
|
|
|
|
|
|
6318
|
|
|
|
|
|
|
} |
6319
|
0
|
|
|
|
|
|
break; |
6320
|
|
|
|
|
|
|
case 'P': |
6321
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_NO_EXPLICIT_POLICY", 29)) { |
6322
|
|
|
|
|
|
|
/* ^ */ |
6323
|
|
|
|
|
|
|
|
6324
|
|
|
|
|
|
|
#ifdef X509_V_ERR_NO_EXPLICIT_POLICY |
6325
|
2
|
|
|
|
|
|
return X509_V_ERR_NO_EXPLICIT_POLICY; |
6326
|
|
|
|
|
|
|
#else |
6327
|
|
|
|
|
|
|
goto not_there; |
6328
|
|
|
|
|
|
|
#endif |
6329
|
|
|
|
|
|
|
|
6330
|
|
|
|
|
|
|
} |
6331
|
0
|
|
|
|
|
|
break; |
6332
|
|
|
|
|
|
|
case 'S': |
6333
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_AKID_SKID_MISMATCH", 29)) { |
6334
|
|
|
|
|
|
|
/* ^ */ |
6335
|
|
|
|
|
|
|
|
6336
|
|
|
|
|
|
|
#ifdef X509_V_ERR_AKID_SKID_MISMATCH |
6337
|
1
|
|
|
|
|
|
return X509_V_ERR_AKID_SKID_MISMATCH; |
6338
|
|
|
|
|
|
|
#else |
6339
|
|
|
|
|
|
|
goto not_there; |
6340
|
|
|
|
|
|
|
#endif |
6341
|
|
|
|
|
|
|
|
6342
|
|
|
|
|
|
|
} |
6343
|
0
|
|
|
|
|
|
break; |
6344
|
|
|
|
|
|
|
case 'T': |
6345
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_NO_INTERNAL_LOOKUP", 29)) { |
6346
|
|
|
|
|
|
|
/* ^ */ |
6347
|
|
|
|
|
|
|
|
6348
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_NO_INTERNAL_LOOKUP |
6349
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_NO_INTERNAL_LOOKUP; |
6350
|
|
|
|
|
|
|
#else |
6351
|
|
|
|
|
|
|
goto not_there; |
6352
|
|
|
|
|
|
|
#endif |
6353
|
|
|
|
|
|
|
|
6354
|
|
|
|
|
|
|
} |
6355
|
0
|
|
|
|
|
|
break; |
6356
|
|
|
|
|
|
|
case 'V': |
6357
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_OCSP_VERIFY_FAILED", 29)) { |
6358
|
|
|
|
|
|
|
/* ^ */ |
6359
|
|
|
|
|
|
|
|
6360
|
|
|
|
|
|
|
#ifdef X509_V_ERR_OCSP_VERIFY_FAILED |
6361
|
|
|
|
|
|
|
return X509_V_ERR_OCSP_VERIFY_FAILED; |
6362
|
|
|
|
|
|
|
#else |
6363
|
1
|
|
|
|
|
|
goto not_there; |
6364
|
|
|
|
|
|
|
#endif |
6365
|
|
|
|
|
|
|
|
6366
|
|
|
|
|
|
|
} |
6367
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_OCSP_VERIFY_NEEDED", 29)) { |
6368
|
|
|
|
|
|
|
/* ^ */ |
6369
|
|
|
|
|
|
|
|
6370
|
|
|
|
|
|
|
#ifdef X509_V_ERR_OCSP_VERIFY_NEEDED |
6371
|
|
|
|
|
|
|
return X509_V_ERR_OCSP_VERIFY_NEEDED; |
6372
|
|
|
|
|
|
|
#else |
6373
|
1
|
|
|
|
|
|
goto not_there; |
6374
|
|
|
|
|
|
|
#endif |
6375
|
|
|
|
|
|
|
|
6376
|
|
|
|
|
|
|
} |
6377
|
0
|
|
|
|
|
|
break; |
6378
|
|
|
|
|
|
|
case 'W': |
6379
|
3
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_ALLOW_PROXY_CERTS", 29)) { |
6380
|
|
|
|
|
|
|
/* ^ */ |
6381
|
|
|
|
|
|
|
|
6382
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_ALLOW_PROXY_CERTS |
6383
|
3
|
|
|
|
|
|
return X509_V_FLAG_ALLOW_PROXY_CERTS; |
6384
|
|
|
|
|
|
|
#else |
6385
|
|
|
|
|
|
|
goto not_there; |
6386
|
|
|
|
|
|
|
#endif |
6387
|
|
|
|
|
|
|
|
6388
|
|
|
|
|
|
|
} |
6389
|
0
|
|
|
|
|
|
break; |
6390
|
|
|
|
|
|
|
case '_': |
6391
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_MICROSOFT_BIG_SSLV3_BUFFER", 29)) { |
6392
|
|
|
|
|
|
|
/* ^ */ |
6393
|
|
|
|
|
|
|
|
6394
|
|
|
|
|
|
|
#ifdef SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER |
6395
|
1
|
|
|
|
|
|
return SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER; |
6396
|
|
|
|
|
|
|
#else |
6397
|
|
|
|
|
|
|
goto not_there; |
6398
|
|
|
|
|
|
|
#endif |
6399
|
|
|
|
|
|
|
|
6400
|
|
|
|
|
|
|
} |
6401
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_SSL_SESSION_ID_IS_DIFFERENT", 29)) { |
6402
|
|
|
|
|
|
|
/* ^ */ |
6403
|
|
|
|
|
|
|
|
6404
|
|
|
|
|
|
|
#ifdef SSL_R_SSL_SESSION_ID_IS_DIFFERENT |
6405
|
1
|
|
|
|
|
|
return SSL_R_SSL_SESSION_ID_IS_DIFFERENT; |
6406
|
|
|
|
|
|
|
#else |
6407
|
|
|
|
|
|
|
goto not_there; |
6408
|
|
|
|
|
|
|
#endif |
6409
|
|
|
|
|
|
|
|
6410
|
|
|
|
|
|
|
} |
6411
|
0
|
|
|
|
|
|
break; |
6412
|
|
|
|
|
|
|
case 'c': |
6413
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_unstructuredAddress", 29)) { |
6414
|
|
|
|
|
|
|
/* ^ */ |
6415
|
|
|
|
|
|
|
|
6416
|
|
|
|
|
|
|
#ifdef NID_pkcs9_unstructuredAddress |
6417
|
1
|
|
|
|
|
|
return NID_pkcs9_unstructuredAddress; |
6418
|
|
|
|
|
|
|
#else |
6419
|
|
|
|
|
|
|
goto not_there; |
6420
|
|
|
|
|
|
|
#endif |
6421
|
|
|
|
|
|
|
|
6422
|
|
|
|
|
|
|
} |
6423
|
0
|
|
|
|
|
|
break; |
6424
|
|
|
|
|
|
|
} |
6425
|
0
|
|
|
|
|
|
break; |
6426
|
|
|
|
|
|
|
case 30: |
6427
|
|
|
|
|
|
|
/* Names all of length 30. */ |
6428
|
|
|
|
|
|
|
/* NID_netscape_ca_revocation_url OP_DONT_INSERT_EMPTY_FRAGMENTS |
6429
|
|
|
|
|
|
|
OP_SSLREF2_REUSE_CERT_TYPE_BUG R_UNABLE_TO_EXTRACT_PUBLIC_KEY |
6430
|
|
|
|
|
|
|
X509_V_ERR_CERT_CHAIN_TOO_LONG X509_V_ERR_DIFFERENT_CRL_SCOPE |
6431
|
|
|
|
|
|
|
X509_V_ERR_IP_ADDRESS_MISMATCH X509_V_ERR_PERMITTED_VIOLATION |
6432
|
|
|
|
|
|
|
X509_V_FLAG_CHECK_SS_SIGNATURE */ |
6433
|
|
|
|
|
|
|
/* Offset 24 gives the best switch position. */ |
6434
|
9
|
|
|
|
|
|
switch (name[24]) { |
6435
|
|
|
|
|
|
|
case 'G': |
6436
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_DONT_INSERT_EMPTY_FRAGMENTS", 30)) { |
6437
|
|
|
|
|
|
|
/* ^ */ |
6438
|
|
|
|
|
|
|
|
6439
|
|
|
|
|
|
|
#ifdef SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS |
6440
|
1
|
|
|
|
|
|
return SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS; |
6441
|
|
|
|
|
|
|
#else |
6442
|
|
|
|
|
|
|
goto not_there; |
6443
|
|
|
|
|
|
|
#endif |
6444
|
|
|
|
|
|
|
|
6445
|
|
|
|
|
|
|
} |
6446
|
0
|
|
|
|
|
|
break; |
6447
|
|
|
|
|
|
|
case 'I': |
6448
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_UNABLE_TO_EXTRACT_PUBLIC_KEY", 30)) { |
6449
|
|
|
|
|
|
|
/* ^ */ |
6450
|
|
|
|
|
|
|
|
6451
|
|
|
|
|
|
|
#ifdef SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY |
6452
|
1
|
|
|
|
|
|
return SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY; |
6453
|
|
|
|
|
|
|
#else |
6454
|
|
|
|
|
|
|
goto not_there; |
6455
|
|
|
|
|
|
|
#endif |
6456
|
|
|
|
|
|
|
|
6457
|
|
|
|
|
|
|
} |
6458
|
0
|
|
|
|
|
|
break; |
6459
|
|
|
|
|
|
|
case 'L': |
6460
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PERMITTED_VIOLATION", 30)) { |
6461
|
|
|
|
|
|
|
/* ^ */ |
6462
|
|
|
|
|
|
|
|
6463
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PERMITTED_VIOLATION |
6464
|
1
|
|
|
|
|
|
return X509_V_ERR_PERMITTED_VIOLATION; |
6465
|
|
|
|
|
|
|
#else |
6466
|
|
|
|
|
|
|
goto not_there; |
6467
|
|
|
|
|
|
|
#endif |
6468
|
|
|
|
|
|
|
|
6469
|
|
|
|
|
|
|
} |
6470
|
0
|
|
|
|
|
|
break; |
6471
|
|
|
|
|
|
|
case 'N': |
6472
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_CHECK_SS_SIGNATURE", 30)) { |
6473
|
|
|
|
|
|
|
/* ^ */ |
6474
|
|
|
|
|
|
|
|
6475
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_CHECK_SS_SIGNATURE |
6476
|
1
|
|
|
|
|
|
return X509_V_FLAG_CHECK_SS_SIGNATURE; |
6477
|
|
|
|
|
|
|
#else |
6478
|
|
|
|
|
|
|
goto not_there; |
6479
|
|
|
|
|
|
|
#endif |
6480
|
|
|
|
|
|
|
|
6481
|
|
|
|
|
|
|
} |
6482
|
0
|
|
|
|
|
|
break; |
6483
|
|
|
|
|
|
|
case 'O': |
6484
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_CHAIN_TOO_LONG", 30)) { |
6485
|
|
|
|
|
|
|
/* ^ */ |
6486
|
|
|
|
|
|
|
|
6487
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_CHAIN_TOO_LONG |
6488
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_CHAIN_TOO_LONG; |
6489
|
|
|
|
|
|
|
#else |
6490
|
|
|
|
|
|
|
goto not_there; |
6491
|
|
|
|
|
|
|
#endif |
6492
|
|
|
|
|
|
|
|
6493
|
|
|
|
|
|
|
} |
6494
|
0
|
|
|
|
|
|
break; |
6495
|
|
|
|
|
|
|
case 'P': |
6496
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_SSLREF2_REUSE_CERT_TYPE_BUG", 30)) { |
6497
|
|
|
|
|
|
|
/* ^ */ |
6498
|
|
|
|
|
|
|
|
6499
|
|
|
|
|
|
|
#ifdef SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG |
6500
|
1
|
|
|
|
|
|
return SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG; |
6501
|
|
|
|
|
|
|
#else |
6502
|
|
|
|
|
|
|
goto not_there; |
6503
|
|
|
|
|
|
|
#endif |
6504
|
|
|
|
|
|
|
|
6505
|
|
|
|
|
|
|
} |
6506
|
0
|
|
|
|
|
|
break; |
6507
|
|
|
|
|
|
|
case 'S': |
6508
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_IP_ADDRESS_MISMATCH", 30)) { |
6509
|
|
|
|
|
|
|
/* ^ */ |
6510
|
|
|
|
|
|
|
|
6511
|
|
|
|
|
|
|
#ifdef X509_V_ERR_IP_ADDRESS_MISMATCH |
6512
|
1
|
|
|
|
|
|
return X509_V_ERR_IP_ADDRESS_MISMATCH; |
6513
|
|
|
|
|
|
|
#else |
6514
|
|
|
|
|
|
|
goto not_there; |
6515
|
|
|
|
|
|
|
#endif |
6516
|
|
|
|
|
|
|
|
6517
|
|
|
|
|
|
|
} |
6518
|
0
|
|
|
|
|
|
break; |
6519
|
|
|
|
|
|
|
case '_': |
6520
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_DIFFERENT_CRL_SCOPE", 30)) { |
6521
|
|
|
|
|
|
|
/* ^ */ |
6522
|
|
|
|
|
|
|
|
6523
|
|
|
|
|
|
|
#ifdef X509_V_ERR_DIFFERENT_CRL_SCOPE |
6524
|
1
|
|
|
|
|
|
return X509_V_ERR_DIFFERENT_CRL_SCOPE; |
6525
|
|
|
|
|
|
|
#else |
6526
|
|
|
|
|
|
|
goto not_there; |
6527
|
|
|
|
|
|
|
#endif |
6528
|
|
|
|
|
|
|
|
6529
|
|
|
|
|
|
|
} |
6530
|
0
|
|
|
|
|
|
break; |
6531
|
|
|
|
|
|
|
case 'o': |
6532
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_ca_revocation_url", 30)) { |
6533
|
|
|
|
|
|
|
/* ^ */ |
6534
|
|
|
|
|
|
|
|
6535
|
|
|
|
|
|
|
#ifdef NID_netscape_ca_revocation_url |
6536
|
1
|
|
|
|
|
|
return NID_netscape_ca_revocation_url; |
6537
|
|
|
|
|
|
|
#else |
6538
|
|
|
|
|
|
|
goto not_there; |
6539
|
|
|
|
|
|
|
#endif |
6540
|
|
|
|
|
|
|
|
6541
|
|
|
|
|
|
|
} |
6542
|
0
|
|
|
|
|
|
break; |
6543
|
|
|
|
|
|
|
} |
6544
|
0
|
|
|
|
|
|
break; |
6545
|
|
|
|
|
|
|
case 31: |
6546
|
|
|
|
|
|
|
/* Names all of length 31. */ |
6547
|
|
|
|
|
|
|
/* MIN_RSA_MODULUS_LENGTH_IN_BYTES MODE_ACCEPT_MOVING_WRITE_BUFFER |
6548
|
|
|
|
|
|
|
NID_pbe_WithSHA1And40BitRC2_CBC OCSP_RESPONSE_STATUS_SUCCESSFUL |
6549
|
|
|
|
|
|
|
X509_V_ERR_KEYUSAGE_NO_CERTSIGN X509_V_ERR_KEYUSAGE_NO_CRL_SIGN |
6550
|
|
|
|
|
|
|
X509_V_ERR_PATH_LENGTH_EXCEEDED X509_V_FLAG_SUITEB_128_LOS_ONLY */ |
6551
|
|
|
|
|
|
|
/* Offset 30 gives the best switch position. */ |
6552
|
8
|
|
|
|
|
|
switch (name[30]) { |
6553
|
|
|
|
|
|
|
case 'C': |
6554
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And40BitRC2_CB", 30)) { |
6555
|
|
|
|
|
|
|
/* C */ |
6556
|
|
|
|
|
|
|
|
6557
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And40BitRC2_CBC |
6558
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And40BitRC2_CBC; |
6559
|
|
|
|
|
|
|
#else |
6560
|
|
|
|
|
|
|
goto not_there; |
6561
|
|
|
|
|
|
|
#endif |
6562
|
|
|
|
|
|
|
|
6563
|
|
|
|
|
|
|
} |
6564
|
0
|
|
|
|
|
|
break; |
6565
|
|
|
|
|
|
|
case 'D': |
6566
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PATH_LENGTH_EXCEEDE", 30)) { |
6567
|
|
|
|
|
|
|
/* D */ |
6568
|
|
|
|
|
|
|
|
6569
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PATH_LENGTH_EXCEEDED |
6570
|
1
|
|
|
|
|
|
return X509_V_ERR_PATH_LENGTH_EXCEEDED; |
6571
|
|
|
|
|
|
|
#else |
6572
|
|
|
|
|
|
|
goto not_there; |
6573
|
|
|
|
|
|
|
#endif |
6574
|
|
|
|
|
|
|
|
6575
|
|
|
|
|
|
|
} |
6576
|
0
|
|
|
|
|
|
break; |
6577
|
|
|
|
|
|
|
case 'L': |
6578
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_SUCCESSFU", 30)) { |
6579
|
|
|
|
|
|
|
/* L */ |
6580
|
|
|
|
|
|
|
|
6581
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_SUCCESSFUL |
6582
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_SUCCESSFUL; |
6583
|
|
|
|
|
|
|
#else |
6584
|
|
|
|
|
|
|
goto not_there; |
6585
|
|
|
|
|
|
|
#endif |
6586
|
|
|
|
|
|
|
|
6587
|
|
|
|
|
|
|
} |
6588
|
0
|
|
|
|
|
|
break; |
6589
|
|
|
|
|
|
|
case 'N': |
6590
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CERTSIG", 30)) { |
6591
|
|
|
|
|
|
|
/* N */ |
6592
|
|
|
|
|
|
|
|
6593
|
|
|
|
|
|
|
#ifdef X509_V_ERR_KEYUSAGE_NO_CERTSIGN |
6594
|
1
|
|
|
|
|
|
return X509_V_ERR_KEYUSAGE_NO_CERTSIGN; |
6595
|
|
|
|
|
|
|
#else |
6596
|
|
|
|
|
|
|
goto not_there; |
6597
|
|
|
|
|
|
|
#endif |
6598
|
|
|
|
|
|
|
|
6599
|
|
|
|
|
|
|
} |
6600
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CRL_SIG", 30)) { |
6601
|
|
|
|
|
|
|
/* N */ |
6602
|
|
|
|
|
|
|
|
6603
|
|
|
|
|
|
|
#ifdef X509_V_ERR_KEYUSAGE_NO_CRL_SIGN |
6604
|
1
|
|
|
|
|
|
return X509_V_ERR_KEYUSAGE_NO_CRL_SIGN; |
6605
|
|
|
|
|
|
|
#else |
6606
|
|
|
|
|
|
|
goto not_there; |
6607
|
|
|
|
|
|
|
#endif |
6608
|
|
|
|
|
|
|
|
6609
|
|
|
|
|
|
|
} |
6610
|
0
|
|
|
|
|
|
break; |
6611
|
|
|
|
|
|
|
case 'R': |
6612
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MODE_ACCEPT_MOVING_WRITE_BUFFE", 30)) { |
6613
|
|
|
|
|
|
|
/* R */ |
6614
|
|
|
|
|
|
|
|
6615
|
|
|
|
|
|
|
#ifdef SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER |
6616
|
1
|
|
|
|
|
|
return SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER; |
6617
|
|
|
|
|
|
|
#else |
6618
|
|
|
|
|
|
|
goto not_there; |
6619
|
|
|
|
|
|
|
#endif |
6620
|
|
|
|
|
|
|
|
6621
|
|
|
|
|
|
|
} |
6622
|
0
|
|
|
|
|
|
break; |
6623
|
|
|
|
|
|
|
case 'S': |
6624
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MIN_RSA_MODULUS_LENGTH_IN_BYTE", 30)) { |
6625
|
|
|
|
|
|
|
/* S */ |
6626
|
|
|
|
|
|
|
|
6627
|
|
|
|
|
|
|
#ifdef SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES |
6628
|
1
|
|
|
|
|
|
return SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES; |
6629
|
|
|
|
|
|
|
#else |
6630
|
|
|
|
|
|
|
goto not_there; |
6631
|
|
|
|
|
|
|
#endif |
6632
|
|
|
|
|
|
|
|
6633
|
|
|
|
|
|
|
} |
6634
|
0
|
|
|
|
|
|
break; |
6635
|
|
|
|
|
|
|
case 'Y': |
6636
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_SUITEB_128_LOS_ONL", 30)) { |
6637
|
|
|
|
|
|
|
/* Y */ |
6638
|
|
|
|
|
|
|
|
6639
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_SUITEB_128_LOS_ONLY |
6640
|
1
|
|
|
|
|
|
return X509_V_FLAG_SUITEB_128_LOS_ONLY; |
6641
|
|
|
|
|
|
|
#else |
6642
|
|
|
|
|
|
|
goto not_there; |
6643
|
|
|
|
|
|
|
#endif |
6644
|
|
|
|
|
|
|
|
6645
|
|
|
|
|
|
|
} |
6646
|
0
|
|
|
|
|
|
break; |
6647
|
|
|
|
|
|
|
} |
6648
|
0
|
|
|
|
|
|
break; |
6649
|
|
|
|
|
|
|
case 32: |
6650
|
|
|
|
|
|
|
/* Names all of length 32. */ |
6651
|
|
|
|
|
|
|
/* NID_pbe_WithSHA1And128BitRC2_CBC OCSP_RESPONSE_STATUS_SIGREQUIRED |
6652
|
|
|
|
|
|
|
X509_V_ERR_CRL_SIGNATURE_FAILURE X509_V_ERR_SUITE_B_INVALID_CURVE |
6653
|
|
|
|
|
|
|
X509_V_FLAG_EXTENDED_CRL_SUPPORT */ |
6654
|
|
|
|
|
|
|
/* Offset 25 gives the best switch position. */ |
6655
|
5
|
|
|
|
|
|
switch (name[25]) { |
6656
|
|
|
|
|
|
|
case 'D': |
6657
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_CURVE", 32)) { |
6658
|
|
|
|
|
|
|
/* ^ */ |
6659
|
|
|
|
|
|
|
|
6660
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_INVALID_CURVE |
6661
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_INVALID_CURVE; |
6662
|
|
|
|
|
|
|
#else |
6663
|
|
|
|
|
|
|
goto not_there; |
6664
|
|
|
|
|
|
|
#endif |
6665
|
|
|
|
|
|
|
|
6666
|
|
|
|
|
|
|
} |
6667
|
0
|
|
|
|
|
|
break; |
6668
|
|
|
|
|
|
|
case 'E': |
6669
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_SIGREQUIRED", 32)) { |
6670
|
|
|
|
|
|
|
/* ^ */ |
6671
|
|
|
|
|
|
|
|
6672
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_SIGREQUIRED |
6673
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_SIGREQUIRED; |
6674
|
|
|
|
|
|
|
#else |
6675
|
|
|
|
|
|
|
goto not_there; |
6676
|
|
|
|
|
|
|
#endif |
6677
|
|
|
|
|
|
|
|
6678
|
|
|
|
|
|
|
} |
6679
|
0
|
|
|
|
|
|
break; |
6680
|
|
|
|
|
|
|
case 'F': |
6681
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CRL_SIGNATURE_FAILURE", 32)) { |
6682
|
|
|
|
|
|
|
/* ^ */ |
6683
|
|
|
|
|
|
|
|
6684
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CRL_SIGNATURE_FAILURE |
6685
|
1
|
|
|
|
|
|
return X509_V_ERR_CRL_SIGNATURE_FAILURE; |
6686
|
|
|
|
|
|
|
#else |
6687
|
|
|
|
|
|
|
goto not_there; |
6688
|
|
|
|
|
|
|
#endif |
6689
|
|
|
|
|
|
|
|
6690
|
|
|
|
|
|
|
} |
6691
|
0
|
|
|
|
|
|
break; |
6692
|
|
|
|
|
|
|
case 'R': |
6693
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And128BitRC2_CBC", 32)) { |
6694
|
|
|
|
|
|
|
/* ^ */ |
6695
|
|
|
|
|
|
|
|
6696
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And128BitRC2_CBC |
6697
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And128BitRC2_CBC; |
6698
|
|
|
|
|
|
|
#else |
6699
|
|
|
|
|
|
|
goto not_there; |
6700
|
|
|
|
|
|
|
#endif |
6701
|
|
|
|
|
|
|
|
6702
|
|
|
|
|
|
|
} |
6703
|
0
|
|
|
|
|
|
break; |
6704
|
|
|
|
|
|
|
case 'S': |
6705
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_EXTENDED_CRL_SUPPORT", 32)) { |
6706
|
|
|
|
|
|
|
/* ^ */ |
6707
|
|
|
|
|
|
|
|
6708
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_EXTENDED_CRL_SUPPORT |
6709
|
1
|
|
|
|
|
|
return X509_V_FLAG_EXTENDED_CRL_SUPPORT; |
6710
|
|
|
|
|
|
|
#else |
6711
|
|
|
|
|
|
|
goto not_there; |
6712
|
|
|
|
|
|
|
#endif |
6713
|
|
|
|
|
|
|
|
6714
|
|
|
|
|
|
|
} |
6715
|
0
|
|
|
|
|
|
break; |
6716
|
|
|
|
|
|
|
} |
6717
|
0
|
|
|
|
|
|
break; |
6718
|
|
|
|
|
|
|
case 33: |
6719
|
|
|
|
|
|
|
/* Names all of length 33. */ |
6720
|
|
|
|
|
|
|
/* OCSP_RESPONSE_STATUS_UNAUTHORIZED X509_V_ERR_CERT_SIGNATURE_FAILURE */ |
6721
|
|
|
|
|
|
|
/* Offset 32 gives the best switch position. */ |
6722
|
2
|
|
|
|
|
|
switch (name[32]) { |
6723
|
|
|
|
|
|
|
case 'D': |
6724
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_UNAUTHORIZE", 32)) { |
6725
|
|
|
|
|
|
|
/* D */ |
6726
|
|
|
|
|
|
|
|
6727
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_UNAUTHORIZED |
6728
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_UNAUTHORIZED; |
6729
|
|
|
|
|
|
|
#else |
6730
|
|
|
|
|
|
|
goto not_there; |
6731
|
|
|
|
|
|
|
#endif |
6732
|
|
|
|
|
|
|
|
6733
|
|
|
|
|
|
|
} |
6734
|
0
|
|
|
|
|
|
break; |
6735
|
|
|
|
|
|
|
case 'E': |
6736
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_SIGNATURE_FAILUR", 32)) { |
6737
|
|
|
|
|
|
|
/* E */ |
6738
|
|
|
|
|
|
|
|
6739
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_SIGNATURE_FAILURE |
6740
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_SIGNATURE_FAILURE; |
6741
|
|
|
|
|
|
|
#else |
6742
|
|
|
|
|
|
|
goto not_there; |
6743
|
|
|
|
|
|
|
#endif |
6744
|
|
|
|
|
|
|
|
6745
|
|
|
|
|
|
|
} |
6746
|
0
|
|
|
|
|
|
break; |
6747
|
|
|
|
|
|
|
} |
6748
|
0
|
|
|
|
|
|
break; |
6749
|
|
|
|
|
|
|
case 34: |
6750
|
|
|
|
|
|
|
/* Names all of length 34. */ |
6751
|
|
|
|
|
|
|
/* OCSP_RESPONSE_STATUS_INTERNALERROR OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG |
6752
|
|
|
|
|
|
|
X509_V_ERR_SUBJECT_ISSUER_MISMATCH X509_V_ERR_SUITE_B_INVALID_VERSION |
6753
|
|
|
|
|
|
|
X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED X509_V_ERR_UNSUPPORTED_NAME_SYNTAX */ |
6754
|
|
|
|
|
|
|
/* Offset 24 gives the best switch position. */ |
6755
|
6
|
|
|
|
|
|
switch (name[24]) { |
6756
|
|
|
|
|
|
|
case 'A': |
6757
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSUPPORTED_NAME_SYNTAX", 34)) { |
6758
|
|
|
|
|
|
|
/* ^ */ |
6759
|
|
|
|
|
|
|
|
6760
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSUPPORTED_NAME_SYNTAX |
6761
|
1
|
|
|
|
|
|
return X509_V_ERR_UNSUPPORTED_NAME_SYNTAX; |
6762
|
|
|
|
|
|
|
#else |
6763
|
|
|
|
|
|
|
goto not_there; |
6764
|
|
|
|
|
|
|
#endif |
6765
|
|
|
|
|
|
|
|
6766
|
|
|
|
|
|
|
} |
6767
|
0
|
|
|
|
|
|
break; |
6768
|
|
|
|
|
|
|
case 'C': |
6769
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG", 34)) { |
6770
|
|
|
|
|
|
|
/* ^ */ |
6771
|
|
|
|
|
|
|
|
6772
|
|
|
|
|
|
|
#ifdef SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG |
6773
|
1
|
|
|
|
|
|
return SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG; |
6774
|
|
|
|
|
|
|
#else |
6775
|
|
|
|
|
|
|
goto not_there; |
6776
|
|
|
|
|
|
|
#endif |
6777
|
|
|
|
|
|
|
|
6778
|
|
|
|
|
|
|
} |
6779
|
0
|
|
|
|
|
|
break; |
6780
|
|
|
|
|
|
|
case 'E': |
6781
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_INTERNALERROR", 34)) { |
6782
|
|
|
|
|
|
|
/* ^ */ |
6783
|
|
|
|
|
|
|
|
6784
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_INTERNALERROR |
6785
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_INTERNALERROR; |
6786
|
|
|
|
|
|
|
#else |
6787
|
|
|
|
|
|
|
goto not_there; |
6788
|
|
|
|
|
|
|
#endif |
6789
|
|
|
|
|
|
|
|
6790
|
|
|
|
|
|
|
} |
6791
|
0
|
|
|
|
|
|
break; |
6792
|
|
|
|
|
|
|
case 'I': |
6793
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_VERSION", 34)) { |
6794
|
|
|
|
|
|
|
/* ^ */ |
6795
|
|
|
|
|
|
|
|
6796
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_INVALID_VERSION |
6797
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_INVALID_VERSION; |
6798
|
|
|
|
|
|
|
#else |
6799
|
|
|
|
|
|
|
goto not_there; |
6800
|
|
|
|
|
|
|
#endif |
6801
|
|
|
|
|
|
|
|
6802
|
|
|
|
|
|
|
} |
6803
|
0
|
|
|
|
|
|
break; |
6804
|
|
|
|
|
|
|
case 'O': |
6805
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED", 34)) { |
6806
|
|
|
|
|
|
|
/* ^ */ |
6807
|
|
|
|
|
|
|
|
6808
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED |
6809
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED; |
6810
|
|
|
|
|
|
|
#else |
6811
|
|
|
|
|
|
|
goto not_there; |
6812
|
|
|
|
|
|
|
#endif |
6813
|
|
|
|
|
|
|
|
6814
|
|
|
|
|
|
|
} |
6815
|
0
|
|
|
|
|
|
break; |
6816
|
|
|
|
|
|
|
case 'R': |
6817
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUBJECT_ISSUER_MISMATCH", 34)) { |
6818
|
|
|
|
|
|
|
/* ^ */ |
6819
|
|
|
|
|
|
|
|
6820
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUBJECT_ISSUER_MISMATCH |
6821
|
1
|
|
|
|
|
|
return X509_V_ERR_SUBJECT_ISSUER_MISMATCH; |
6822
|
|
|
|
|
|
|
#else |
6823
|
|
|
|
|
|
|
goto not_there; |
6824
|
|
|
|
|
|
|
#endif |
6825
|
|
|
|
|
|
|
|
6826
|
|
|
|
|
|
|
} |
6827
|
0
|
|
|
|
|
|
break; |
6828
|
|
|
|
|
|
|
} |
6829
|
0
|
|
|
|
|
|
break; |
6830
|
|
|
|
|
|
|
case 35: |
6831
|
|
|
|
|
|
|
/* Names all of length 35. */ |
6832
|
|
|
|
|
|
|
/* OPENSSL_INFO_DIR_FILENAME_SEPARATOR OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG |
6833
|
|
|
|
|
|
|
R_PEER_DID_NOT_RETURN_A_CERTIFICATE X509_CHECK_FLAG_NEVER_CHECK_SUBJECT |
6834
|
|
|
|
|
|
|
X509_V_ERR_APPLICATION_VERIFICATION X509_V_ERR_INVALID_POLICY_EXTENSION |
6835
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER _NET_SSLEAY_TEST_UNDEFINED_CONSTANT |
6836
|
|
|
|
|
|
|
*/ |
6837
|
|
|
|
|
|
|
/* Offset 29 gives the best switch position. */ |
6838
|
8
|
|
|
|
|
|
switch (name[29]) { |
6839
|
|
|
|
|
|
|
case 'A': |
6840
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_DIR_FILENAME_SEPARATOR", 35)) { |
6841
|
|
|
|
|
|
|
/* ^ */ |
6842
|
|
|
|
|
|
|
|
6843
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_DIR_FILENAME_SEPARATOR |
6844
|
|
|
|
|
|
|
return OPENSSL_INFO_DIR_FILENAME_SEPARATOR; |
6845
|
|
|
|
|
|
|
#else |
6846
|
1
|
|
|
|
|
|
goto not_there; |
6847
|
|
|
|
|
|
|
#endif |
6848
|
|
|
|
|
|
|
|
6849
|
|
|
|
|
|
|
} |
6850
|
0
|
|
|
|
|
|
break; |
6851
|
|
|
|
|
|
|
case 'C': |
6852
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_APPLICATION_VERIFICATION", 35)) { |
6853
|
|
|
|
|
|
|
/* ^ */ |
6854
|
|
|
|
|
|
|
|
6855
|
|
|
|
|
|
|
#ifdef X509_V_ERR_APPLICATION_VERIFICATION |
6856
|
1
|
|
|
|
|
|
return X509_V_ERR_APPLICATION_VERIFICATION; |
6857
|
|
|
|
|
|
|
#else |
6858
|
|
|
|
|
|
|
goto not_there; |
6859
|
|
|
|
|
|
|
#endif |
6860
|
|
|
|
|
|
|
|
6861
|
|
|
|
|
|
|
} |
6862
|
0
|
|
|
|
|
|
break; |
6863
|
|
|
|
|
|
|
case 'E': |
6864
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_POLICY_EXTENSION", 35)) { |
6865
|
|
|
|
|
|
|
/* ^ */ |
6866
|
|
|
|
|
|
|
|
6867
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_POLICY_EXTENSION |
6868
|
1
|
|
|
|
|
|
return X509_V_ERR_INVALID_POLICY_EXTENSION; |
6869
|
|
|
|
|
|
|
#else |
6870
|
|
|
|
|
|
|
goto not_there; |
6871
|
|
|
|
|
|
|
#endif |
6872
|
|
|
|
|
|
|
|
6873
|
|
|
|
|
|
|
} |
6874
|
0
|
|
|
|
|
|
break; |
6875
|
|
|
|
|
|
|
case 'F': |
6876
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_PEER_DID_NOT_RETURN_A_CERTIFICATE", 35)) { |
6877
|
|
|
|
|
|
|
/* ^ */ |
6878
|
|
|
|
|
|
|
|
6879
|
|
|
|
|
|
|
#ifdef SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE |
6880
|
1
|
|
|
|
|
|
return SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE; |
6881
|
|
|
|
|
|
|
#else |
6882
|
|
|
|
|
|
|
goto not_there; |
6883
|
|
|
|
|
|
|
#endif |
6884
|
|
|
|
|
|
|
|
6885
|
|
|
|
|
|
|
} |
6886
|
0
|
|
|
|
|
|
break; |
6887
|
|
|
|
|
|
|
case 'G': |
6888
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG", 35)) { |
6889
|
|
|
|
|
|
|
/* ^ */ |
6890
|
|
|
|
|
|
|
|
6891
|
|
|
|
|
|
|
#ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG |
6892
|
1
|
|
|
|
|
|
return SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG; |
6893
|
|
|
|
|
|
|
#else |
6894
|
|
|
|
|
|
|
goto not_there; |
6895
|
|
|
|
|
|
|
#endif |
6896
|
|
|
|
|
|
|
|
6897
|
|
|
|
|
|
|
} |
6898
|
0
|
|
|
|
|
|
break; |
6899
|
|
|
|
|
|
|
case 'I': |
6900
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER", 35)) { |
6901
|
|
|
|
|
|
|
/* ^ */ |
6902
|
|
|
|
|
|
|
|
6903
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER |
6904
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER; |
6905
|
|
|
|
|
|
|
#else |
6906
|
|
|
|
|
|
|
goto not_there; |
6907
|
|
|
|
|
|
|
#endif |
6908
|
|
|
|
|
|
|
|
6909
|
|
|
|
|
|
|
} |
6910
|
0
|
|
|
|
|
|
break; |
6911
|
|
|
|
|
|
|
case 'N': |
6912
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "_NET_SSLEAY_TEST_UNDEFINED_CONSTANT", 35)) { |
6913
|
|
|
|
|
|
|
/* ^ */ |
6914
|
|
|
|
|
|
|
|
6915
|
|
|
|
|
|
|
#ifdef _NET_SSLEAY_TEST_UNDEFINED_CONSTANT |
6916
|
|
|
|
|
|
|
return _NET_SSLEAY_TEST_UNDEFINED_CONSTANT; |
6917
|
|
|
|
|
|
|
#else |
6918
|
1
|
|
|
|
|
|
goto not_there; |
6919
|
|
|
|
|
|
|
#endif |
6920
|
|
|
|
|
|
|
|
6921
|
|
|
|
|
|
|
} |
6922
|
0
|
|
|
|
|
|
break; |
6923
|
|
|
|
|
|
|
case 'U': |
6924
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_NEVER_CHECK_SUBJECT", 35)) { |
6925
|
|
|
|
|
|
|
/* ^ */ |
6926
|
|
|
|
|
|
|
|
6927
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_NEVER_CHECK_SUBJECT |
6928
|
|
|
|
|
|
|
return X509_CHECK_FLAG_NEVER_CHECK_SUBJECT; |
6929
|
|
|
|
|
|
|
#else |
6930
|
1
|
|
|
|
|
|
goto not_there; |
6931
|
|
|
|
|
|
|
#endif |
6932
|
|
|
|
|
|
|
|
6933
|
|
|
|
|
|
|
} |
6934
|
0
|
|
|
|
|
|
break; |
6935
|
|
|
|
|
|
|
} |
6936
|
0
|
|
|
|
|
|
break; |
6937
|
|
|
|
|
|
|
case 36: |
6938
|
|
|
|
|
|
|
/* Names all of length 36. */ |
6939
|
|
|
|
|
|
|
/* OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION |
6940
|
|
|
|
|
|
|
X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT |
6941
|
|
|
|
|
|
|
X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS |
6942
|
|
|
|
|
|
|
X509_V_ERR_CRL_PATH_VALIDATION_ERROR |
6943
|
|
|
|
|
|
|
X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN |
6944
|
|
|
|
|
|
|
X509_V_ERR_SUITE_B_INVALID_ALGORITHM |
6945
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT */ |
6946
|
|
|
|
|
|
|
/* Offset 25 gives the best switch position. */ |
6947
|
7
|
|
|
|
|
|
switch (name[25]) { |
6948
|
|
|
|
|
|
|
case 'A': |
6949
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CRL_PATH_VALIDATION_ERROR", 36)) { |
6950
|
|
|
|
|
|
|
/* ^ */ |
6951
|
|
|
|
|
|
|
|
6952
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CRL_PATH_VALIDATION_ERROR |
6953
|
1
|
|
|
|
|
|
return X509_V_ERR_CRL_PATH_VALIDATION_ERROR; |
6954
|
|
|
|
|
|
|
#else |
6955
|
|
|
|
|
|
|
goto not_there; |
6956
|
|
|
|
|
|
|
#endif |
6957
|
|
|
|
|
|
|
|
6958
|
|
|
|
|
|
|
} |
6959
|
0
|
|
|
|
|
|
break; |
6960
|
|
|
|
|
|
|
case 'D': |
6961
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_ALGORITHM", 36)) { |
6962
|
|
|
|
|
|
|
/* ^ */ |
6963
|
|
|
|
|
|
|
|
6964
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_INVALID_ALGORITHM |
6965
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_INVALID_ALGORITHM; |
6966
|
|
|
|
|
|
|
#else |
6967
|
|
|
|
|
|
|
goto not_there; |
6968
|
|
|
|
|
|
|
#endif |
6969
|
|
|
|
|
|
|
|
6970
|
|
|
|
|
|
|
} |
6971
|
0
|
|
|
|
|
|
break; |
6972
|
|
|
|
|
|
|
case 'E': |
6973
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT", 36)) { |
6974
|
|
|
|
|
|
|
/* ^ */ |
6975
|
|
|
|
|
|
|
|
6976
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT |
6977
|
1
|
|
|
|
|
|
return X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT; |
6978
|
|
|
|
|
|
|
#else |
6979
|
|
|
|
|
|
|
goto not_there; |
6980
|
|
|
|
|
|
|
#endif |
6981
|
|
|
|
|
|
|
|
6982
|
|
|
|
|
|
|
} |
6983
|
0
|
|
|
|
|
|
break; |
6984
|
|
|
|
|
|
|
case 'I': |
6985
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT", 36)) { |
6986
|
|
|
|
|
|
|
/* ^ */ |
6987
|
|
|
|
|
|
|
|
6988
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT |
6989
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT; |
6990
|
|
|
|
|
|
|
#else |
6991
|
|
|
|
|
|
|
goto not_there; |
6992
|
|
|
|
|
|
|
#endif |
6993
|
|
|
|
|
|
|
|
6994
|
|
|
|
|
|
|
} |
6995
|
0
|
|
|
|
|
|
break; |
6996
|
|
|
|
|
|
|
case 'L': |
6997
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS", 36)) { |
6998
|
|
|
|
|
|
|
/* ^ */ |
6999
|
|
|
|
|
|
|
|
7000
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS |
7001
|
1
|
|
|
|
|
|
return X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS; |
7002
|
|
|
|
|
|
|
#else |
7003
|
|
|
|
|
|
|
goto not_there; |
7004
|
|
|
|
|
|
|
#endif |
7005
|
|
|
|
|
|
|
|
7006
|
|
|
|
|
|
|
} |
7007
|
0
|
|
|
|
|
|
break; |
7008
|
|
|
|
|
|
|
case 'N': |
7009
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION", 36)) { |
7010
|
|
|
|
|
|
|
/* ^ */ |
7011
|
|
|
|
|
|
|
|
7012
|
|
|
|
|
|
|
#ifdef SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION |
7013
|
1
|
|
|
|
|
|
return SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION; |
7014
|
|
|
|
|
|
|
#else |
7015
|
|
|
|
|
|
|
goto not_there; |
7016
|
|
|
|
|
|
|
#endif |
7017
|
|
|
|
|
|
|
|
7018
|
|
|
|
|
|
|
} |
7019
|
0
|
|
|
|
|
|
break; |
7020
|
|
|
|
|
|
|
case 'R': |
7021
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN", 36)) { |
7022
|
|
|
|
|
|
|
/* ^ */ |
7023
|
|
|
|
|
|
|
|
7024
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN |
7025
|
1
|
|
|
|
|
|
return X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN; |
7026
|
|
|
|
|
|
|
#else |
7027
|
|
|
|
|
|
|
goto not_there; |
7028
|
|
|
|
|
|
|
#endif |
7029
|
|
|
|
|
|
|
|
7030
|
|
|
|
|
|
|
} |
7031
|
0
|
|
|
|
|
|
break; |
7032
|
|
|
|
|
|
|
} |
7033
|
0
|
|
|
|
|
|
break; |
7034
|
|
|
|
|
|
|
case 37: |
7035
|
|
|
|
|
|
|
/* Names all of length 37. */ |
7036
|
|
|
|
|
|
|
/* OCSP_RESPONSE_STATUS_MALFORMEDREQUEST |
7037
|
|
|
|
|
|
|
X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS |
7038
|
|
|
|
|
|
|
X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED */ |
7039
|
|
|
|
|
|
|
/* Offset 31 gives the best switch position. */ |
7040
|
3
|
|
|
|
|
|
switch (name[31]) { |
7041
|
|
|
|
|
|
|
case 'C': |
7042
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED", 37)) { |
7043
|
|
|
|
|
|
|
/* ^ */ |
7044
|
|
|
|
|
|
|
|
7045
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED |
7046
|
1
|
|
|
|
|
|
return X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED; |
7047
|
|
|
|
|
|
|
#else |
7048
|
|
|
|
|
|
|
goto not_there; |
7049
|
|
|
|
|
|
|
#endif |
7050
|
|
|
|
|
|
|
|
7051
|
|
|
|
|
|
|
} |
7052
|
0
|
|
|
|
|
|
break; |
7053
|
|
|
|
|
|
|
case 'D': |
7054
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS", 37)) { |
7055
|
|
|
|
|
|
|
/* ^ */ |
7056
|
|
|
|
|
|
|
|
7057
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS |
7058
|
1
|
|
|
|
|
|
return X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS; |
7059
|
|
|
|
|
|
|
#else |
7060
|
|
|
|
|
|
|
goto not_there; |
7061
|
|
|
|
|
|
|
#endif |
7062
|
|
|
|
|
|
|
|
7063
|
|
|
|
|
|
|
} |
7064
|
0
|
|
|
|
|
|
break; |
7065
|
|
|
|
|
|
|
case 'E': |
7066
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_MALFORMEDREQUEST", 37)) { |
7067
|
|
|
|
|
|
|
/* ^ */ |
7068
|
|
|
|
|
|
|
|
7069
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_MALFORMEDREQUEST |
7070
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_MALFORMEDREQUEST; |
7071
|
|
|
|
|
|
|
#else |
7072
|
|
|
|
|
|
|
goto not_there; |
7073
|
|
|
|
|
|
|
#endif |
7074
|
|
|
|
|
|
|
|
7075
|
|
|
|
|
|
|
} |
7076
|
0
|
|
|
|
|
|
break; |
7077
|
|
|
|
|
|
|
} |
7078
|
0
|
|
|
|
|
|
break; |
7079
|
|
|
|
|
|
|
case 38: |
7080
|
|
|
|
|
|
|
/* Names all of length 38. */ |
7081
|
|
|
|
|
|
|
/* NID_pbe_WithSHA1And2_Key_TripleDES_CBC |
7082
|
|
|
|
|
|
|
NID_pbe_WithSHA1And3_Key_TripleDES_CBC |
7083
|
|
|
|
|
|
|
X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH |
7084
|
|
|
|
|
|
|
X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT |
7085
|
|
|
|
|
|
|
X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE */ |
7086
|
|
|
|
|
|
|
/* Offset 19 gives the best switch position. */ |
7087
|
5
|
|
|
|
|
|
switch (name[19]) { |
7088
|
|
|
|
|
|
|
case '2': |
7089
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And2_Key_TripleDES_CBC", 38)) { |
7090
|
|
|
|
|
|
|
/* ^ */ |
7091
|
|
|
|
|
|
|
|
7092
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And2_Key_TripleDES_CBC |
7093
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And2_Key_TripleDES_CBC; |
7094
|
|
|
|
|
|
|
#else |
7095
|
|
|
|
|
|
|
goto not_there; |
7096
|
|
|
|
|
|
|
#endif |
7097
|
|
|
|
|
|
|
|
7098
|
|
|
|
|
|
|
} |
7099
|
0
|
|
|
|
|
|
break; |
7100
|
|
|
|
|
|
|
case '3': |
7101
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And3_Key_TripleDES_CBC", 38)) { |
7102
|
|
|
|
|
|
|
/* ^ */ |
7103
|
|
|
|
|
|
|
|
7104
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And3_Key_TripleDES_CBC |
7105
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And3_Key_TripleDES_CBC; |
7106
|
|
|
|
|
|
|
#else |
7107
|
|
|
|
|
|
|
goto not_there; |
7108
|
|
|
|
|
|
|
#endif |
7109
|
|
|
|
|
|
|
|
7110
|
|
|
|
|
|
|
} |
7111
|
0
|
|
|
|
|
|
break; |
7112
|
|
|
|
|
|
|
case 'R': |
7113
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT", 38)) { |
7114
|
|
|
|
|
|
|
/* ^ */ |
7115
|
|
|
|
|
|
|
|
7116
|
|
|
|
|
|
|
#ifdef X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT |
7117
|
1
|
|
|
|
|
|
return X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT; |
7118
|
|
|
|
|
|
|
#else |
7119
|
|
|
|
|
|
|
goto not_there; |
7120
|
|
|
|
|
|
|
#endif |
7121
|
|
|
|
|
|
|
|
7122
|
|
|
|
|
|
|
} |
7123
|
0
|
|
|
|
|
|
break; |
7124
|
|
|
|
|
|
|
case 'T': |
7125
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE", 38)) { |
7126
|
|
|
|
|
|
|
/* ^ */ |
7127
|
|
|
|
|
|
|
|
7128
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE |
7129
|
1
|
|
|
|
|
|
return X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE; |
7130
|
|
|
|
|
|
|
#else |
7131
|
|
|
|
|
|
|
goto not_there; |
7132
|
|
|
|
|
|
|
#endif |
7133
|
|
|
|
|
|
|
|
7134
|
|
|
|
|
|
|
} |
7135
|
0
|
|
|
|
|
|
break; |
7136
|
|
|
|
|
|
|
case 'U': |
7137
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH", 38)) { |
7138
|
|
|
|
|
|
|
/* ^ */ |
7139
|
|
|
|
|
|
|
|
7140
|
|
|
|
|
|
|
#ifdef X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH |
7141
|
1
|
|
|
|
|
|
return X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH; |
7142
|
|
|
|
|
|
|
#else |
7143
|
|
|
|
|
|
|
goto not_there; |
7144
|
|
|
|
|
|
|
#endif |
7145
|
|
|
|
|
|
|
|
7146
|
|
|
|
|
|
|
} |
7147
|
0
|
|
|
|
|
|
break; |
7148
|
|
|
|
|
|
|
} |
7149
|
0
|
|
|
|
|
|
break; |
7150
|
|
|
|
|
|
|
case 39: |
7151
|
|
|
|
|
|
|
/* Names all of length 39. */ |
7152
|
|
|
|
|
|
|
/* X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS |
7153
|
|
|
|
|
|
|
X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION |
7154
|
|
|
|
|
|
|
X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION */ |
7155
|
|
|
|
|
|
|
/* Offset 26 gives the best switch position. */ |
7156
|
3
|
|
|
|
|
|
switch (name[26]) { |
7157
|
|
|
|
|
|
|
case 'A': |
7158
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION", 39)) { |
7159
|
|
|
|
|
|
|
/* ^ */ |
7160
|
|
|
|
|
|
|
|
7161
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION |
7162
|
|
|
|
|
|
|
return X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION; |
7163
|
|
|
|
|
|
|
#else |
7164
|
1
|
|
|
|
|
|
goto not_there; |
7165
|
|
|
|
|
|
|
#endif |
7166
|
|
|
|
|
|
|
|
7167
|
|
|
|
|
|
|
} |
7168
|
0
|
|
|
|
|
|
break; |
7169
|
|
|
|
|
|
|
case 'C': |
7170
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION", 39)) { |
7171
|
|
|
|
|
|
|
/* ^ */ |
7172
|
|
|
|
|
|
|
|
7173
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION |
7174
|
1
|
|
|
|
|
|
return X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION; |
7175
|
|
|
|
|
|
|
#else |
7176
|
|
|
|
|
|
|
goto not_there; |
7177
|
|
|
|
|
|
|
#endif |
7178
|
|
|
|
|
|
|
|
7179
|
|
|
|
|
|
|
} |
7180
|
0
|
|
|
|
|
|
break; |
7181
|
|
|
|
|
|
|
case 'E': |
7182
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS", 39)) { |
7183
|
|
|
|
|
|
|
/* ^ */ |
7184
|
|
|
|
|
|
|
|
7185
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS |
7186
|
1
|
|
|
|
|
|
return X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS; |
7187
|
|
|
|
|
|
|
#else |
7188
|
|
|
|
|
|
|
goto not_there; |
7189
|
|
|
|
|
|
|
#endif |
7190
|
|
|
|
|
|
|
|
7191
|
|
|
|
|
|
|
} |
7192
|
0
|
|
|
|
|
|
break; |
7193
|
|
|
|
|
|
|
} |
7194
|
0
|
|
|
|
|
|
break; |
7195
|
|
|
|
|
|
|
case 40: |
7196
|
|
|
|
|
|
|
/* Names all of length 40. */ |
7197
|
|
|
|
|
|
|
/* X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD |
7198
|
|
|
|
|
|
|
X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE |
7199
|
|
|
|
|
|
|
X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX |
7200
|
|
|
|
|
|
|
X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE */ |
7201
|
|
|
|
|
|
|
/* Offset 26 gives the best switch position. */ |
7202
|
4
|
|
|
|
|
|
switch (name[26]) { |
7203
|
|
|
|
|
|
|
case 'E': |
7204
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE", 40)) { |
7205
|
|
|
|
|
|
|
/* ^ */ |
7206
|
|
|
|
|
|
|
|
7207
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE |
7208
|
1
|
|
|
|
|
|
return X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE; |
7209
|
|
|
|
|
|
|
#else |
7210
|
|
|
|
|
|
|
goto not_there; |
7211
|
|
|
|
|
|
|
#endif |
7212
|
|
|
|
|
|
|
|
7213
|
|
|
|
|
|
|
} |
7214
|
0
|
|
|
|
|
|
break; |
7215
|
|
|
|
|
|
|
case 'I': |
7216
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE", 40)) { |
7217
|
|
|
|
|
|
|
/* ^ */ |
7218
|
|
|
|
|
|
|
|
7219
|
|
|
|
|
|
|
#ifdef X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE |
7220
|
1
|
|
|
|
|
|
return X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE; |
7221
|
|
|
|
|
|
|
#else |
7222
|
|
|
|
|
|
|
goto not_there; |
7223
|
|
|
|
|
|
|
#endif |
7224
|
|
|
|
|
|
|
|
7225
|
|
|
|
|
|
|
} |
7226
|
0
|
|
|
|
|
|
break; |
7227
|
|
|
|
|
|
|
case 'O': |
7228
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD", 40)) { |
7229
|
|
|
|
|
|
|
/* ^ */ |
7230
|
|
|
|
|
|
|
|
7231
|
|
|
|
|
|
|
#ifdef X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD |
7232
|
1
|
|
|
|
|
|
return X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD; |
7233
|
|
|
|
|
|
|
#else |
7234
|
|
|
|
|
|
|
goto not_there; |
7235
|
|
|
|
|
|
|
#endif |
7236
|
|
|
|
|
|
|
|
7237
|
|
|
|
|
|
|
} |
7238
|
0
|
|
|
|
|
|
break; |
7239
|
|
|
|
|
|
|
case 'S': |
7240
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX", 40)) { |
7241
|
|
|
|
|
|
|
/* ^ */ |
7242
|
|
|
|
|
|
|
|
7243
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX |
7244
|
1
|
|
|
|
|
|
return X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX; |
7245
|
|
|
|
|
|
|
#else |
7246
|
|
|
|
|
|
|
goto not_there; |
7247
|
|
|
|
|
|
|
#endif |
7248
|
|
|
|
|
|
|
|
7249
|
|
|
|
|
|
|
} |
7250
|
0
|
|
|
|
|
|
break; |
7251
|
|
|
|
|
|
|
} |
7252
|
0
|
|
|
|
|
|
break; |
7253
|
|
|
|
|
|
|
case 41: |
7254
|
|
|
|
|
|
|
/* Names all of length 41. */ |
7255
|
|
|
|
|
|
|
/* OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION |
7256
|
|
|
|
|
|
|
R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE |
7257
|
|
|
|
|
|
|
X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD |
7258
|
|
|
|
|
|
|
X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD |
7259
|
|
|
|
|
|
|
X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD |
7260
|
|
|
|
|
|
|
X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED */ |
7261
|
|
|
|
|
|
|
/* Offset 26 gives the best switch position. */ |
7262
|
6
|
|
|
|
|
|
switch (name[26]) { |
7263
|
|
|
|
|
|
|
case 'E': |
7264
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE", 41)) { |
7265
|
|
|
|
|
|
|
/* ^ */ |
7266
|
|
|
|
|
|
|
|
7267
|
|
|
|
|
|
|
#ifdef SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE |
7268
|
1
|
|
|
|
|
|
return SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE; |
7269
|
|
|
|
|
|
|
#else |
7270
|
|
|
|
|
|
|
goto not_there; |
7271
|
|
|
|
|
|
|
#endif |
7272
|
|
|
|
|
|
|
|
7273
|
|
|
|
|
|
|
} |
7274
|
0
|
|
|
|
|
|
break; |
7275
|
|
|
|
|
|
|
case 'N': |
7276
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION", 41)) { |
7277
|
|
|
|
|
|
|
/* ^ */ |
7278
|
|
|
|
|
|
|
|
7279
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION |
7280
|
1
|
|
|
|
|
|
return SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION; |
7281
|
|
|
|
|
|
|
#else |
7282
|
|
|
|
|
|
|
goto not_there; |
7283
|
|
|
|
|
|
|
#endif |
7284
|
|
|
|
|
|
|
|
7285
|
|
|
|
|
|
|
} |
7286
|
0
|
|
|
|
|
|
break; |
7287
|
|
|
|
|
|
|
case 'O': |
7288
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD", 41)) { |
7289
|
|
|
|
|
|
|
/* ^ */ |
7290
|
|
|
|
|
|
|
|
7291
|
|
|
|
|
|
|
#ifdef X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD |
7292
|
1
|
|
|
|
|
|
return X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD; |
7293
|
|
|
|
|
|
|
#else |
7294
|
|
|
|
|
|
|
goto not_there; |
7295
|
|
|
|
|
|
|
#endif |
7296
|
|
|
|
|
|
|
|
7297
|
|
|
|
|
|
|
} |
7298
|
0
|
|
|
|
|
|
break; |
7299
|
|
|
|
|
|
|
case 'S': |
7300
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD", 41)) { |
7301
|
|
|
|
|
|
|
/* ^ */ |
7302
|
|
|
|
|
|
|
|
7303
|
|
|
|
|
|
|
#ifdef X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD |
7304
|
1
|
|
|
|
|
|
return X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD; |
7305
|
|
|
|
|
|
|
#else |
7306
|
|
|
|
|
|
|
goto not_there; |
7307
|
|
|
|
|
|
|
#endif |
7308
|
|
|
|
|
|
|
|
7309
|
|
|
|
|
|
|
} |
7310
|
0
|
|
|
|
|
|
break; |
7311
|
|
|
|
|
|
|
case 'T': |
7312
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED", 41)) { |
7313
|
|
|
|
|
|
|
/* ^ */ |
7314
|
|
|
|
|
|
|
|
7315
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED |
7316
|
1
|
|
|
|
|
|
return X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED; |
7317
|
|
|
|
|
|
|
#else |
7318
|
|
|
|
|
|
|
goto not_there; |
7319
|
|
|
|
|
|
|
#endif |
7320
|
|
|
|
|
|
|
|
7321
|
|
|
|
|
|
|
} |
7322
|
0
|
|
|
|
|
|
break; |
7323
|
|
|
|
|
|
|
case 'X': |
7324
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD", 41)) { |
7325
|
|
|
|
|
|
|
/* ^ */ |
7326
|
|
|
|
|
|
|
|
7327
|
|
|
|
|
|
|
#ifdef X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD |
7328
|
1
|
|
|
|
|
|
return X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD; |
7329
|
|
|
|
|
|
|
#else |
7330
|
|
|
|
|
|
|
goto not_there; |
7331
|
|
|
|
|
|
|
#endif |
7332
|
|
|
|
|
|
|
|
7333
|
|
|
|
|
|
|
} |
7334
|
0
|
|
|
|
|
|
break; |
7335
|
|
|
|
|
|
|
} |
7336
|
0
|
|
|
|
|
|
break; |
7337
|
|
|
|
|
|
|
case 42: |
7338
|
|
|
|
|
|
|
/* Names all of length 42. */ |
7339
|
|
|
|
|
|
|
/* X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE |
7340
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE */ |
7341
|
|
|
|
|
|
|
/* Offset 29 gives the best switch position. */ |
7342
|
2
|
|
|
|
|
|
switch (name[29]) { |
7343
|
|
|
|
|
|
|
case 'C': |
7344
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE", 42)) { |
7345
|
|
|
|
|
|
|
/* ^ */ |
7346
|
|
|
|
|
|
|
|
7347
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE |
7348
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE; |
7349
|
|
|
|
|
|
|
#else |
7350
|
|
|
|
|
|
|
goto not_there; |
7351
|
|
|
|
|
|
|
#endif |
7352
|
|
|
|
|
|
|
|
7353
|
|
|
|
|
|
|
} |
7354
|
0
|
|
|
|
|
|
break; |
7355
|
|
|
|
|
|
|
case 'E': |
7356
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE", 42)) { |
7357
|
|
|
|
|
|
|
/* ^ */ |
7358
|
|
|
|
|
|
|
|
7359
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE |
7360
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE; |
7361
|
|
|
|
|
|
|
#else |
7362
|
|
|
|
|
|
|
goto not_there; |
7363
|
|
|
|
|
|
|
#endif |
7364
|
|
|
|
|
|
|
|
7365
|
|
|
|
|
|
|
} |
7366
|
0
|
|
|
|
|
|
break; |
7367
|
|
|
|
|
|
|
} |
7368
|
0
|
|
|
|
|
|
break; |
7369
|
|
|
|
|
|
|
case 43: |
7370
|
|
|
|
|
|
|
/* Names all of length 43. */ |
7371
|
|
|
|
|
|
|
/* X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE |
7372
|
|
|
|
|
|
|
X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION */ |
7373
|
|
|
|
|
|
|
/* Offset 14 gives the best switch position. */ |
7374
|
2
|
|
|
|
|
|
switch (name[14]) { |
7375
|
|
|
|
|
|
|
case 'A': |
7376
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION", 43)) { |
7377
|
|
|
|
|
|
|
/* ^ */ |
7378
|
|
|
|
|
|
|
|
7379
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION |
7380
|
1
|
|
|
|
|
|
return X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION; |
7381
|
|
|
|
|
|
|
#else |
7382
|
|
|
|
|
|
|
goto not_there; |
7383
|
|
|
|
|
|
|
#endif |
7384
|
|
|
|
|
|
|
|
7385
|
|
|
|
|
|
|
} |
7386
|
0
|
|
|
|
|
|
break; |
7387
|
|
|
|
|
|
|
case 'B': |
7388
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE", 43)) { |
7389
|
|
|
|
|
|
|
/* ^ */ |
7390
|
|
|
|
|
|
|
|
7391
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE |
7392
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE; |
7393
|
|
|
|
|
|
|
#else |
7394
|
|
|
|
|
|
|
goto not_there; |
7395
|
|
|
|
|
|
|
#endif |
7396
|
|
|
|
|
|
|
|
7397
|
|
|
|
|
|
|
} |
7398
|
0
|
|
|
|
|
|
break; |
7399
|
|
|
|
|
|
|
} |
7400
|
0
|
|
|
|
|
|
break; |
7401
|
|
|
|
|
|
|
case 44: |
7402
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY", 44)) { |
7403
|
|
|
|
|
|
|
|
7404
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY |
7405
|
2
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY; |
7406
|
|
|
|
|
|
|
#else |
7407
|
|
|
|
|
|
|
goto not_there; |
7408
|
|
|
|
|
|
|
#endif |
7409
|
|
|
|
|
|
|
|
7410
|
|
|
|
|
|
|
} |
7411
|
0
|
|
|
|
|
|
break; |
7412
|
|
|
|
|
|
|
case 45: |
7413
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY", 45)) { |
7414
|
|
|
|
|
|
|
|
7415
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY |
7416
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY; |
7417
|
|
|
|
|
|
|
#else |
7418
|
|
|
|
|
|
|
goto not_there; |
7419
|
|
|
|
|
|
|
#endif |
7420
|
|
|
|
|
|
|
|
7421
|
|
|
|
|
|
|
} |
7422
|
0
|
|
|
|
|
|
break; |
7423
|
|
|
|
|
|
|
case 46: |
7424
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM", 46)) { |
7425
|
|
|
|
|
|
|
|
7426
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM |
7427
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM; |
7428
|
|
|
|
|
|
|
#else |
7429
|
|
|
|
|
|
|
goto not_there; |
7430
|
|
|
|
|
|
|
#endif |
7431
|
|
|
|
|
|
|
|
7432
|
|
|
|
|
|
|
} |
7433
|
0
|
|
|
|
|
|
break; |
7434
|
|
|
|
|
|
|
case 47: |
7435
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256", 47)) { |
7436
|
|
|
|
|
|
|
|
7437
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256 |
7438
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256; |
7439
|
|
|
|
|
|
|
#else |
7440
|
|
|
|
|
|
|
goto not_there; |
7441
|
|
|
|
|
|
|
#endif |
7442
|
|
|
|
|
|
|
|
7443
|
|
|
|
|
|
|
} |
7444
|
0
|
|
|
|
|
|
break; |
7445
|
|
|
|
|
|
|
} |
7446
|
|
|
|
|
|
|
|
7447
|
90
|
|
|
|
|
|
errno = EINVAL; |
7448
|
90
|
|
|
|
|
|
return 0; |
7449
|
|
|
|
|
|
|
|
7450
|
|
|
|
|
|
|
not_there: |
7451
|
108
|
|
|
|
|
|
errno = ENOENT; |
7452
|
108
|
|
|
|
|
|
return 0; |
7453
|
|
|
|
|
|
|
|
7454
|
|
|
|
|
|
|
} |