line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
/* |
2
|
|
|
|
|
|
|
* This file is automatically generated - do not manually modify it. |
3
|
|
|
|
|
|
|
* |
4
|
|
|
|
|
|
|
* To add or remove a constant, edit helper_script/constants.txt, then run |
5
|
|
|
|
|
|
|
* helper_script/update-exported-constants. |
6
|
|
|
|
|
|
|
*/ |
7
|
|
|
|
|
|
|
|
8
|
|
|
|
|
|
|
#ifdef NET_SSLEAY_32BIT_CONSTANTS |
9
|
|
|
|
|
|
|
static double |
10
|
|
|
|
|
|
|
#else |
11
|
|
|
|
|
|
|
static uint64_t |
12
|
|
|
|
|
|
|
#endif |
13
|
1107
|
|
|
|
|
|
constant (const char *name, size_t len) { |
14
|
|
|
|
|
|
|
/* Initially switch on the length of the name. */ |
15
|
1107
|
|
|
|
|
|
switch (len) { |
16
|
|
|
|
|
|
|
case 5: |
17
|
|
|
|
|
|
|
/* Names all of length 5. */ |
18
|
|
|
|
|
|
|
/* RSA_3 ST_OK */ |
19
|
|
|
|
|
|
|
/* Offset 0 gives the best switch position. */ |
20
|
2
|
|
|
|
|
|
switch (*name++) { |
21
|
|
|
|
|
|
|
case 'R': |
22
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SA_3", 4)) { |
23
|
|
|
|
|
|
|
/* R */ |
24
|
|
|
|
|
|
|
|
25
|
|
|
|
|
|
|
#ifdef RSA_3 |
26
|
1
|
|
|
|
|
|
return RSA_3; |
27
|
|
|
|
|
|
|
#else |
28
|
|
|
|
|
|
|
goto not_there; |
29
|
|
|
|
|
|
|
#endif |
30
|
|
|
|
|
|
|
|
31
|
|
|
|
|
|
|
} |
32
|
0
|
|
|
|
|
|
break; |
33
|
|
|
|
|
|
|
case 'S': |
34
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "T_OK", 4)) { |
35
|
|
|
|
|
|
|
/* S */ |
36
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
#ifdef SSL_ST_OK |
38
|
1
|
|
|
|
|
|
return SSL_ST_OK; |
39
|
|
|
|
|
|
|
#else |
40
|
|
|
|
|
|
|
goto not_there; |
41
|
|
|
|
|
|
|
#endif |
42
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
} |
44
|
0
|
|
|
|
|
|
break; |
45
|
|
|
|
|
|
|
} |
46
|
0
|
|
|
|
|
|
break; |
47
|
|
|
|
|
|
|
case 6: |
48
|
|
|
|
|
|
|
/* Names all of length 6. */ |
49
|
|
|
|
|
|
|
/* OP_ALL RSA_F4 */ |
50
|
|
|
|
|
|
|
/* Offset 0 gives the best switch position. */ |
51
|
17
|
|
|
|
|
|
switch (*name++) { |
52
|
|
|
|
|
|
|
case 'O': |
53
|
12
|
50
|
|
|
|
|
if (!memcmp(name, "P_ALL", 5)) { |
54
|
|
|
|
|
|
|
/* O */ |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
#ifdef SSL_OP_ALL |
57
|
12
|
|
|
|
|
|
return SSL_OP_ALL; |
58
|
|
|
|
|
|
|
#else |
59
|
|
|
|
|
|
|
goto not_there; |
60
|
|
|
|
|
|
|
#endif |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
} |
63
|
0
|
|
|
|
|
|
break; |
64
|
|
|
|
|
|
|
case 'R': |
65
|
3
|
50
|
|
|
|
|
if (!memcmp(name, "SA_F4", 5)) { |
66
|
|
|
|
|
|
|
/* R */ |
67
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
#ifdef RSA_F4 |
69
|
3
|
|
|
|
|
|
return RSA_F4; |
70
|
|
|
|
|
|
|
#else |
71
|
|
|
|
|
|
|
goto not_there; |
72
|
|
|
|
|
|
|
#endif |
73
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
} |
75
|
0
|
|
|
|
|
|
break; |
76
|
|
|
|
|
|
|
} |
77
|
2
|
|
|
|
|
|
break; |
78
|
|
|
|
|
|
|
case 7: |
79
|
|
|
|
|
|
|
/* Names all of length 7. */ |
80
|
|
|
|
|
|
|
/* CB_EXIT CB_LOOP CB_READ GEN_DNS GEN_RID GEN_URI NID_dsa NID_md2 NID_md5 |
81
|
|
|
|
|
|
|
NID_rc4 NID_rsa NID_sha NOTHING READING ST_INIT WRITING */ |
82
|
|
|
|
|
|
|
/* Offset 4 gives the best switch position. */ |
83
|
22
|
|
|
|
|
|
switch (name[4]) { |
84
|
|
|
|
|
|
|
case 'D': |
85
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_DNS", 7)) { |
86
|
|
|
|
|
|
|
/* ^ */ |
87
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
#ifdef GEN_DNS |
89
|
2
|
|
|
|
|
|
return GEN_DNS; |
90
|
|
|
|
|
|
|
#else |
91
|
|
|
|
|
|
|
goto not_there; |
92
|
|
|
|
|
|
|
#endif |
93
|
|
|
|
|
|
|
|
94
|
|
|
|
|
|
|
} |
95
|
0
|
|
|
|
|
|
break; |
96
|
|
|
|
|
|
|
case 'E': |
97
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_READ", 7)) { |
98
|
|
|
|
|
|
|
/* ^ */ |
99
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
#ifdef SSL_CB_READ |
101
|
2
|
|
|
|
|
|
return SSL_CB_READ; |
102
|
|
|
|
|
|
|
#else |
103
|
|
|
|
|
|
|
goto not_there; |
104
|
|
|
|
|
|
|
#endif |
105
|
|
|
|
|
|
|
|
106
|
|
|
|
|
|
|
} |
107
|
0
|
|
|
|
|
|
break; |
108
|
|
|
|
|
|
|
case 'I': |
109
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NOTHING", 7)) { |
110
|
|
|
|
|
|
|
/* ^ */ |
111
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
#ifdef SSL_NOTHING |
113
|
1
|
|
|
|
|
|
return SSL_NOTHING; |
114
|
|
|
|
|
|
|
#else |
115
|
|
|
|
|
|
|
goto not_there; |
116
|
|
|
|
|
|
|
#endif |
117
|
|
|
|
|
|
|
|
118
|
|
|
|
|
|
|
} |
119
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "READING", 7)) { |
120
|
|
|
|
|
|
|
/* ^ */ |
121
|
|
|
|
|
|
|
|
122
|
|
|
|
|
|
|
#ifdef SSL_READING |
123
|
1
|
|
|
|
|
|
return SSL_READING; |
124
|
|
|
|
|
|
|
#else |
125
|
|
|
|
|
|
|
goto not_there; |
126
|
|
|
|
|
|
|
#endif |
127
|
|
|
|
|
|
|
|
128
|
|
|
|
|
|
|
} |
129
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "WRITING", 7)) { |
130
|
|
|
|
|
|
|
/* ^ */ |
131
|
|
|
|
|
|
|
|
132
|
|
|
|
|
|
|
#ifdef SSL_WRITING |
133
|
1
|
|
|
|
|
|
return SSL_WRITING; |
134
|
|
|
|
|
|
|
#else |
135
|
|
|
|
|
|
|
goto not_there; |
136
|
|
|
|
|
|
|
#endif |
137
|
|
|
|
|
|
|
|
138
|
|
|
|
|
|
|
} |
139
|
0
|
|
|
|
|
|
break; |
140
|
|
|
|
|
|
|
case 'N': |
141
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_INIT", 7)) { |
142
|
|
|
|
|
|
|
/* ^ */ |
143
|
|
|
|
|
|
|
|
144
|
|
|
|
|
|
|
#ifdef SSL_ST_INIT |
145
|
1
|
|
|
|
|
|
return SSL_ST_INIT; |
146
|
|
|
|
|
|
|
#else |
147
|
|
|
|
|
|
|
goto not_there; |
148
|
|
|
|
|
|
|
#endif |
149
|
|
|
|
|
|
|
|
150
|
|
|
|
|
|
|
} |
151
|
0
|
|
|
|
|
|
break; |
152
|
|
|
|
|
|
|
case 'O': |
153
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_LOOP", 7)) { |
154
|
|
|
|
|
|
|
/* ^ */ |
155
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
#ifdef SSL_CB_LOOP |
157
|
2
|
|
|
|
|
|
return SSL_CB_LOOP; |
158
|
|
|
|
|
|
|
#else |
159
|
|
|
|
|
|
|
goto not_there; |
160
|
|
|
|
|
|
|
#endif |
161
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
} |
163
|
0
|
|
|
|
|
|
break; |
164
|
|
|
|
|
|
|
case 'R': |
165
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_RID", 7)) { |
166
|
|
|
|
|
|
|
/* ^ */ |
167
|
|
|
|
|
|
|
|
168
|
|
|
|
|
|
|
#ifdef GEN_RID |
169
|
2
|
|
|
|
|
|
return GEN_RID; |
170
|
|
|
|
|
|
|
#else |
171
|
|
|
|
|
|
|
goto not_there; |
172
|
|
|
|
|
|
|
#endif |
173
|
|
|
|
|
|
|
|
174
|
|
|
|
|
|
|
} |
175
|
0
|
|
|
|
|
|
break; |
176
|
|
|
|
|
|
|
case 'U': |
177
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_URI", 7)) { |
178
|
|
|
|
|
|
|
/* ^ */ |
179
|
|
|
|
|
|
|
|
180
|
|
|
|
|
|
|
#ifdef GEN_URI |
181
|
2
|
|
|
|
|
|
return GEN_URI; |
182
|
|
|
|
|
|
|
#else |
183
|
|
|
|
|
|
|
goto not_there; |
184
|
|
|
|
|
|
|
#endif |
185
|
|
|
|
|
|
|
|
186
|
|
|
|
|
|
|
} |
187
|
0
|
|
|
|
|
|
break; |
188
|
|
|
|
|
|
|
case 'X': |
189
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_EXIT", 7)) { |
190
|
|
|
|
|
|
|
/* ^ */ |
191
|
|
|
|
|
|
|
|
192
|
|
|
|
|
|
|
#ifdef SSL_CB_EXIT |
193
|
2
|
|
|
|
|
|
return SSL_CB_EXIT; |
194
|
|
|
|
|
|
|
#else |
195
|
|
|
|
|
|
|
goto not_there; |
196
|
|
|
|
|
|
|
#endif |
197
|
|
|
|
|
|
|
|
198
|
|
|
|
|
|
|
} |
199
|
0
|
|
|
|
|
|
break; |
200
|
|
|
|
|
|
|
case 'd': |
201
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_dsa", 7)) { |
202
|
|
|
|
|
|
|
/* ^ */ |
203
|
|
|
|
|
|
|
|
204
|
|
|
|
|
|
|
#ifdef NID_dsa |
205
|
1
|
|
|
|
|
|
return NID_dsa; |
206
|
|
|
|
|
|
|
#else |
207
|
|
|
|
|
|
|
goto not_there; |
208
|
|
|
|
|
|
|
#endif |
209
|
|
|
|
|
|
|
|
210
|
|
|
|
|
|
|
} |
211
|
0
|
|
|
|
|
|
break; |
212
|
|
|
|
|
|
|
case 'm': |
213
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_md2", 7)) { |
214
|
|
|
|
|
|
|
/* ^ */ |
215
|
|
|
|
|
|
|
|
216
|
|
|
|
|
|
|
#ifdef NID_md2 |
217
|
1
|
|
|
|
|
|
return NID_md2; |
218
|
|
|
|
|
|
|
#else |
219
|
|
|
|
|
|
|
goto not_there; |
220
|
|
|
|
|
|
|
#endif |
221
|
|
|
|
|
|
|
|
222
|
|
|
|
|
|
|
} |
223
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_md5", 7)) { |
224
|
|
|
|
|
|
|
/* ^ */ |
225
|
|
|
|
|
|
|
|
226
|
|
|
|
|
|
|
#ifdef NID_md5 |
227
|
1
|
|
|
|
|
|
return NID_md5; |
228
|
|
|
|
|
|
|
#else |
229
|
|
|
|
|
|
|
goto not_there; |
230
|
|
|
|
|
|
|
#endif |
231
|
|
|
|
|
|
|
|
232
|
|
|
|
|
|
|
} |
233
|
0
|
|
|
|
|
|
break; |
234
|
|
|
|
|
|
|
case 'r': |
235
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc4", 7)) { |
236
|
|
|
|
|
|
|
/* ^ */ |
237
|
|
|
|
|
|
|
|
238
|
|
|
|
|
|
|
#ifdef NID_rc4 |
239
|
1
|
|
|
|
|
|
return NID_rc4; |
240
|
|
|
|
|
|
|
#else |
241
|
|
|
|
|
|
|
goto not_there; |
242
|
|
|
|
|
|
|
#endif |
243
|
|
|
|
|
|
|
|
244
|
|
|
|
|
|
|
} |
245
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rsa", 7)) { |
246
|
|
|
|
|
|
|
/* ^ */ |
247
|
|
|
|
|
|
|
|
248
|
|
|
|
|
|
|
#ifdef NID_rsa |
249
|
1
|
|
|
|
|
|
return NID_rsa; |
250
|
|
|
|
|
|
|
#else |
251
|
|
|
|
|
|
|
goto not_there; |
252
|
|
|
|
|
|
|
#endif |
253
|
|
|
|
|
|
|
|
254
|
|
|
|
|
|
|
} |
255
|
0
|
|
|
|
|
|
break; |
256
|
|
|
|
|
|
|
case 's': |
257
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_sha", 7)) { |
258
|
|
|
|
|
|
|
/* ^ */ |
259
|
|
|
|
|
|
|
|
260
|
|
|
|
|
|
|
#ifdef NID_sha |
261
|
1
|
|
|
|
|
|
return NID_sha; |
262
|
|
|
|
|
|
|
#else |
263
|
|
|
|
|
|
|
goto not_there; |
264
|
|
|
|
|
|
|
#endif |
265
|
|
|
|
|
|
|
|
266
|
|
|
|
|
|
|
} |
267
|
0
|
|
|
|
|
|
break; |
268
|
|
|
|
|
|
|
} |
269
|
0
|
|
|
|
|
|
break; |
270
|
|
|
|
|
|
|
case 8: |
271
|
|
|
|
|
|
|
/* Names all of length 8. */ |
272
|
|
|
|
|
|
|
/* CB_ALERT CB_WRITE F_READ_N GEN_X400 NID_X500 NID_X509 NID_mdc2 NID_name |
273
|
|
|
|
|
|
|
NID_pkcs NID_sha1 */ |
274
|
|
|
|
|
|
|
/* Offset 5 gives the best switch position. */ |
275
|
12
|
|
|
|
|
|
switch (name[5]) { |
276
|
|
|
|
|
|
|
case '4': |
277
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_X400", 8)) { |
278
|
|
|
|
|
|
|
/* ^ */ |
279
|
|
|
|
|
|
|
|
280
|
|
|
|
|
|
|
#ifdef GEN_X400 |
281
|
1
|
|
|
|
|
|
return GEN_X400; |
282
|
|
|
|
|
|
|
#else |
283
|
|
|
|
|
|
|
goto not_there; |
284
|
|
|
|
|
|
|
#endif |
285
|
|
|
|
|
|
|
|
286
|
|
|
|
|
|
|
} |
287
|
0
|
|
|
|
|
|
break; |
288
|
|
|
|
|
|
|
case '5': |
289
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_X500", 8)) { |
290
|
|
|
|
|
|
|
/* ^ */ |
291
|
|
|
|
|
|
|
|
292
|
|
|
|
|
|
|
#ifdef NID_X500 |
293
|
1
|
|
|
|
|
|
return NID_X500; |
294
|
|
|
|
|
|
|
#else |
295
|
|
|
|
|
|
|
goto not_there; |
296
|
|
|
|
|
|
|
#endif |
297
|
|
|
|
|
|
|
|
298
|
|
|
|
|
|
|
} |
299
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_X509", 8)) { |
300
|
|
|
|
|
|
|
/* ^ */ |
301
|
|
|
|
|
|
|
|
302
|
|
|
|
|
|
|
#ifdef NID_X509 |
303
|
1
|
|
|
|
|
|
return NID_X509; |
304
|
|
|
|
|
|
|
#else |
305
|
|
|
|
|
|
|
goto not_there; |
306
|
|
|
|
|
|
|
#endif |
307
|
|
|
|
|
|
|
|
308
|
|
|
|
|
|
|
} |
309
|
0
|
|
|
|
|
|
break; |
310
|
|
|
|
|
|
|
case 'D': |
311
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_READ_N", 8)) { |
312
|
|
|
|
|
|
|
/* ^ */ |
313
|
|
|
|
|
|
|
|
314
|
|
|
|
|
|
|
#ifdef SSL_F_READ_N |
315
|
1
|
|
|
|
|
|
return SSL_F_READ_N; |
316
|
|
|
|
|
|
|
#else |
317
|
|
|
|
|
|
|
goto not_there; |
318
|
|
|
|
|
|
|
#endif |
319
|
|
|
|
|
|
|
|
320
|
|
|
|
|
|
|
} |
321
|
0
|
|
|
|
|
|
break; |
322
|
|
|
|
|
|
|
case 'E': |
323
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_ALERT", 8)) { |
324
|
|
|
|
|
|
|
/* ^ */ |
325
|
|
|
|
|
|
|
|
326
|
|
|
|
|
|
|
#ifdef SSL_CB_ALERT |
327
|
2
|
|
|
|
|
|
return SSL_CB_ALERT; |
328
|
|
|
|
|
|
|
#else |
329
|
|
|
|
|
|
|
goto not_there; |
330
|
|
|
|
|
|
|
#endif |
331
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
} |
333
|
0
|
|
|
|
|
|
break; |
334
|
|
|
|
|
|
|
case 'I': |
335
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_WRITE", 8)) { |
336
|
|
|
|
|
|
|
/* ^ */ |
337
|
|
|
|
|
|
|
|
338
|
|
|
|
|
|
|
#ifdef SSL_CB_WRITE |
339
|
2
|
|
|
|
|
|
return SSL_CB_WRITE; |
340
|
|
|
|
|
|
|
#else |
341
|
|
|
|
|
|
|
goto not_there; |
342
|
|
|
|
|
|
|
#endif |
343
|
|
|
|
|
|
|
|
344
|
|
|
|
|
|
|
} |
345
|
0
|
|
|
|
|
|
break; |
346
|
|
|
|
|
|
|
case 'a': |
347
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_name", 8)) { |
348
|
|
|
|
|
|
|
/* ^ */ |
349
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
#ifdef NID_name |
351
|
1
|
|
|
|
|
|
return NID_name; |
352
|
|
|
|
|
|
|
#else |
353
|
|
|
|
|
|
|
goto not_there; |
354
|
|
|
|
|
|
|
#endif |
355
|
|
|
|
|
|
|
|
356
|
|
|
|
|
|
|
} |
357
|
0
|
|
|
|
|
|
break; |
358
|
|
|
|
|
|
|
case 'd': |
359
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_mdc2", 8)) { |
360
|
|
|
|
|
|
|
/* ^ */ |
361
|
|
|
|
|
|
|
|
362
|
|
|
|
|
|
|
#ifdef NID_mdc2 |
363
|
1
|
|
|
|
|
|
return NID_mdc2; |
364
|
|
|
|
|
|
|
#else |
365
|
|
|
|
|
|
|
goto not_there; |
366
|
|
|
|
|
|
|
#endif |
367
|
|
|
|
|
|
|
|
368
|
|
|
|
|
|
|
} |
369
|
0
|
|
|
|
|
|
break; |
370
|
|
|
|
|
|
|
case 'h': |
371
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_sha1", 8)) { |
372
|
|
|
|
|
|
|
/* ^ */ |
373
|
|
|
|
|
|
|
|
374
|
|
|
|
|
|
|
#ifdef NID_sha1 |
375
|
1
|
|
|
|
|
|
return NID_sha1; |
376
|
|
|
|
|
|
|
#else |
377
|
|
|
|
|
|
|
goto not_there; |
378
|
|
|
|
|
|
|
#endif |
379
|
|
|
|
|
|
|
|
380
|
|
|
|
|
|
|
} |
381
|
0
|
|
|
|
|
|
break; |
382
|
|
|
|
|
|
|
case 'k': |
383
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs", 8)) { |
384
|
|
|
|
|
|
|
/* ^ */ |
385
|
|
|
|
|
|
|
|
386
|
|
|
|
|
|
|
#ifdef NID_pkcs |
387
|
1
|
|
|
|
|
|
return NID_pkcs; |
388
|
|
|
|
|
|
|
#else |
389
|
|
|
|
|
|
|
goto not_there; |
390
|
|
|
|
|
|
|
#endif |
391
|
|
|
|
|
|
|
|
392
|
|
|
|
|
|
|
} |
393
|
0
|
|
|
|
|
|
break; |
394
|
|
|
|
|
|
|
} |
395
|
0
|
|
|
|
|
|
break; |
396
|
|
|
|
|
|
|
case 9: |
397
|
|
|
|
|
|
|
/* Names all of length 9. */ |
398
|
|
|
|
|
|
|
/* ERROR_SSL EVP_PK_DH EVP_PK_EC F_SSL_NEW GEN_EMAIL GEN_IPADD NID_dsa_2 |
399
|
|
|
|
|
|
|
NID_id_ad NID_id_ce NID_id_kp NID_id_pe NID_pbes2 NID_pkcs3 NID_pkcs7 |
400
|
|
|
|
|
|
|
NID_pkcs9 NID_sxnet NID_title NID_undef ST_ACCEPT ST_BEFORE X509_V_OK */ |
401
|
|
|
|
|
|
|
/* Offset 8 gives the best switch position. */ |
402
|
68
|
|
|
|
|
|
switch (name[8]) { |
403
|
|
|
|
|
|
|
case '2': |
404
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_dsa_", 8)) { |
405
|
|
|
|
|
|
|
/* 2 */ |
406
|
|
|
|
|
|
|
|
407
|
|
|
|
|
|
|
#ifdef NID_dsa_2 |
408
|
1
|
|
|
|
|
|
return NID_dsa_2; |
409
|
|
|
|
|
|
|
#else |
410
|
|
|
|
|
|
|
goto not_there; |
411
|
|
|
|
|
|
|
#endif |
412
|
|
|
|
|
|
|
|
413
|
|
|
|
|
|
|
} |
414
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbes", 8)) { |
415
|
|
|
|
|
|
|
/* 2 */ |
416
|
|
|
|
|
|
|
|
417
|
|
|
|
|
|
|
#ifdef NID_pbes2 |
418
|
1
|
|
|
|
|
|
return NID_pbes2; |
419
|
|
|
|
|
|
|
#else |
420
|
|
|
|
|
|
|
goto not_there; |
421
|
|
|
|
|
|
|
#endif |
422
|
|
|
|
|
|
|
|
423
|
|
|
|
|
|
|
} |
424
|
0
|
|
|
|
|
|
break; |
425
|
|
|
|
|
|
|
case '3': |
426
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs", 8)) { |
427
|
|
|
|
|
|
|
/* 3 */ |
428
|
|
|
|
|
|
|
|
429
|
|
|
|
|
|
|
#ifdef NID_pkcs3 |
430
|
1
|
|
|
|
|
|
return NID_pkcs3; |
431
|
|
|
|
|
|
|
#else |
432
|
|
|
|
|
|
|
goto not_there; |
433
|
|
|
|
|
|
|
#endif |
434
|
|
|
|
|
|
|
|
435
|
|
|
|
|
|
|
} |
436
|
0
|
|
|
|
|
|
break; |
437
|
|
|
|
|
|
|
case '7': |
438
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs", 8)) { |
439
|
|
|
|
|
|
|
/* 7 */ |
440
|
|
|
|
|
|
|
|
441
|
|
|
|
|
|
|
#ifdef NID_pkcs7 |
442
|
1
|
|
|
|
|
|
return NID_pkcs7; |
443
|
|
|
|
|
|
|
#else |
444
|
|
|
|
|
|
|
goto not_there; |
445
|
|
|
|
|
|
|
#endif |
446
|
|
|
|
|
|
|
|
447
|
|
|
|
|
|
|
} |
448
|
0
|
|
|
|
|
|
break; |
449
|
|
|
|
|
|
|
case '9': |
450
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs", 8)) { |
451
|
|
|
|
|
|
|
/* 9 */ |
452
|
|
|
|
|
|
|
|
453
|
|
|
|
|
|
|
#ifdef NID_pkcs9 |
454
|
1
|
|
|
|
|
|
return NID_pkcs9; |
455
|
|
|
|
|
|
|
#else |
456
|
|
|
|
|
|
|
goto not_there; |
457
|
|
|
|
|
|
|
#endif |
458
|
|
|
|
|
|
|
|
459
|
|
|
|
|
|
|
} |
460
|
0
|
|
|
|
|
|
break; |
461
|
|
|
|
|
|
|
case 'C': |
462
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PK_E", 8)) { |
463
|
|
|
|
|
|
|
/* C */ |
464
|
|
|
|
|
|
|
|
465
|
|
|
|
|
|
|
#ifdef EVP_PK_EC |
466
|
1
|
|
|
|
|
|
return EVP_PK_EC; |
467
|
|
|
|
|
|
|
#else |
468
|
|
|
|
|
|
|
goto not_there; |
469
|
|
|
|
|
|
|
#endif |
470
|
|
|
|
|
|
|
|
471
|
|
|
|
|
|
|
} |
472
|
0
|
|
|
|
|
|
break; |
473
|
|
|
|
|
|
|
case 'D': |
474
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_IPAD", 8)) { |
475
|
|
|
|
|
|
|
/* D */ |
476
|
|
|
|
|
|
|
|
477
|
|
|
|
|
|
|
#ifdef GEN_IPADD |
478
|
2
|
|
|
|
|
|
return GEN_IPADD; |
479
|
|
|
|
|
|
|
#else |
480
|
|
|
|
|
|
|
goto not_there; |
481
|
|
|
|
|
|
|
#endif |
482
|
|
|
|
|
|
|
|
483
|
|
|
|
|
|
|
} |
484
|
0
|
|
|
|
|
|
break; |
485
|
|
|
|
|
|
|
case 'E': |
486
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_BEFOR", 8)) { |
487
|
|
|
|
|
|
|
/* E */ |
488
|
|
|
|
|
|
|
|
489
|
|
|
|
|
|
|
#ifdef SSL_ST_BEFORE |
490
|
1
|
|
|
|
|
|
return SSL_ST_BEFORE; |
491
|
|
|
|
|
|
|
#else |
492
|
|
|
|
|
|
|
goto not_there; |
493
|
|
|
|
|
|
|
#endif |
494
|
|
|
|
|
|
|
|
495
|
|
|
|
|
|
|
} |
496
|
0
|
|
|
|
|
|
break; |
497
|
|
|
|
|
|
|
case 'H': |
498
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PK_D", 8)) { |
499
|
|
|
|
|
|
|
/* H */ |
500
|
|
|
|
|
|
|
|
501
|
|
|
|
|
|
|
#ifdef EVP_PK_DH |
502
|
1
|
|
|
|
|
|
return EVP_PK_DH; |
503
|
|
|
|
|
|
|
#else |
504
|
|
|
|
|
|
|
goto not_there; |
505
|
|
|
|
|
|
|
#endif |
506
|
|
|
|
|
|
|
|
507
|
|
|
|
|
|
|
} |
508
|
0
|
|
|
|
|
|
break; |
509
|
|
|
|
|
|
|
case 'K': |
510
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_O", 8)) { |
511
|
|
|
|
|
|
|
/* K */ |
512
|
|
|
|
|
|
|
|
513
|
|
|
|
|
|
|
#ifdef X509_V_OK |
514
|
2
|
|
|
|
|
|
return X509_V_OK; |
515
|
|
|
|
|
|
|
#else |
516
|
|
|
|
|
|
|
goto not_there; |
517
|
|
|
|
|
|
|
#endif |
518
|
|
|
|
|
|
|
|
519
|
|
|
|
|
|
|
} |
520
|
0
|
|
|
|
|
|
break; |
521
|
|
|
|
|
|
|
case 'L': |
522
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "ERROR_SS", 8)) { |
523
|
|
|
|
|
|
|
/* L */ |
524
|
|
|
|
|
|
|
|
525
|
|
|
|
|
|
|
#ifdef SSL_ERROR_SSL |
526
|
1
|
|
|
|
|
|
return SSL_ERROR_SSL; |
527
|
|
|
|
|
|
|
#else |
528
|
|
|
|
|
|
|
goto not_there; |
529
|
|
|
|
|
|
|
#endif |
530
|
|
|
|
|
|
|
|
531
|
|
|
|
|
|
|
} |
532
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_EMAI", 8)) { |
533
|
|
|
|
|
|
|
/* L */ |
534
|
|
|
|
|
|
|
|
535
|
|
|
|
|
|
|
#ifdef GEN_EMAIL |
536
|
2
|
|
|
|
|
|
return GEN_EMAIL; |
537
|
|
|
|
|
|
|
#else |
538
|
|
|
|
|
|
|
goto not_there; |
539
|
|
|
|
|
|
|
#endif |
540
|
|
|
|
|
|
|
|
541
|
|
|
|
|
|
|
} |
542
|
0
|
|
|
|
|
|
break; |
543
|
|
|
|
|
|
|
case 'T': |
544
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_ACCEP", 8)) { |
545
|
|
|
|
|
|
|
/* T */ |
546
|
|
|
|
|
|
|
|
547
|
|
|
|
|
|
|
#ifdef SSL_ST_ACCEPT |
548
|
1
|
|
|
|
|
|
return SSL_ST_ACCEPT; |
549
|
|
|
|
|
|
|
#else |
550
|
|
|
|
|
|
|
goto not_there; |
551
|
|
|
|
|
|
|
#endif |
552
|
|
|
|
|
|
|
|
553
|
|
|
|
|
|
|
} |
554
|
0
|
|
|
|
|
|
break; |
555
|
|
|
|
|
|
|
case 'W': |
556
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_NE", 8)) { |
557
|
|
|
|
|
|
|
/* W */ |
558
|
|
|
|
|
|
|
|
559
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_NEW |
560
|
1
|
|
|
|
|
|
return SSL_F_SSL_NEW; |
561
|
|
|
|
|
|
|
#else |
562
|
|
|
|
|
|
|
goto not_there; |
563
|
|
|
|
|
|
|
#endif |
564
|
|
|
|
|
|
|
|
565
|
|
|
|
|
|
|
} |
566
|
0
|
|
|
|
|
|
break; |
567
|
|
|
|
|
|
|
case 'd': |
568
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_id_a", 8)) { |
569
|
|
|
|
|
|
|
/* d */ |
570
|
|
|
|
|
|
|
|
571
|
|
|
|
|
|
|
#ifdef NID_id_ad |
572
|
1
|
|
|
|
|
|
return NID_id_ad; |
573
|
|
|
|
|
|
|
#else |
574
|
|
|
|
|
|
|
goto not_there; |
575
|
|
|
|
|
|
|
#endif |
576
|
|
|
|
|
|
|
|
577
|
|
|
|
|
|
|
} |
578
|
0
|
|
|
|
|
|
break; |
579
|
|
|
|
|
|
|
case 'e': |
580
|
46
|
100
|
|
|
|
|
if (!memcmp(name, "NID_id_c", 8)) { |
581
|
|
|
|
|
|
|
/* e */ |
582
|
|
|
|
|
|
|
|
583
|
|
|
|
|
|
|
#ifdef NID_id_ce |
584
|
1
|
|
|
|
|
|
return NID_id_ce; |
585
|
|
|
|
|
|
|
#else |
586
|
|
|
|
|
|
|
goto not_there; |
587
|
|
|
|
|
|
|
#endif |
588
|
|
|
|
|
|
|
|
589
|
|
|
|
|
|
|
} |
590
|
45
|
100
|
|
|
|
|
if (!memcmp(name, "NID_id_p", 8)) { |
591
|
|
|
|
|
|
|
/* e */ |
592
|
|
|
|
|
|
|
|
593
|
|
|
|
|
|
|
#ifdef NID_id_pe |
594
|
1
|
|
|
|
|
|
return NID_id_pe; |
595
|
|
|
|
|
|
|
#else |
596
|
|
|
|
|
|
|
goto not_there; |
597
|
|
|
|
|
|
|
#endif |
598
|
|
|
|
|
|
|
|
599
|
|
|
|
|
|
|
} |
600
|
44
|
100
|
|
|
|
|
if (!memcmp(name, "NID_titl", 8)) { |
601
|
|
|
|
|
|
|
/* e */ |
602
|
|
|
|
|
|
|
|
603
|
|
|
|
|
|
|
#ifdef NID_title |
604
|
1
|
|
|
|
|
|
return NID_title; |
605
|
|
|
|
|
|
|
#else |
606
|
|
|
|
|
|
|
goto not_there; |
607
|
|
|
|
|
|
|
#endif |
608
|
|
|
|
|
|
|
|
609
|
|
|
|
|
|
|
} |
610
|
43
|
|
|
|
|
|
break; |
611
|
|
|
|
|
|
|
case 'f': |
612
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_unde", 8)) { |
613
|
|
|
|
|
|
|
/* f */ |
614
|
|
|
|
|
|
|
|
615
|
|
|
|
|
|
|
#ifdef NID_undef |
616
|
1
|
|
|
|
|
|
return NID_undef; |
617
|
|
|
|
|
|
|
#else |
618
|
|
|
|
|
|
|
goto not_there; |
619
|
|
|
|
|
|
|
#endif |
620
|
|
|
|
|
|
|
|
621
|
|
|
|
|
|
|
} |
622
|
0
|
|
|
|
|
|
break; |
623
|
|
|
|
|
|
|
case 'p': |
624
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_id_k", 8)) { |
625
|
|
|
|
|
|
|
/* p */ |
626
|
|
|
|
|
|
|
|
627
|
|
|
|
|
|
|
#ifdef NID_id_kp |
628
|
1
|
|
|
|
|
|
return NID_id_kp; |
629
|
|
|
|
|
|
|
#else |
630
|
|
|
|
|
|
|
goto not_there; |
631
|
|
|
|
|
|
|
#endif |
632
|
|
|
|
|
|
|
|
633
|
|
|
|
|
|
|
} |
634
|
0
|
|
|
|
|
|
break; |
635
|
|
|
|
|
|
|
case 't': |
636
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_sxne", 8)) { |
637
|
|
|
|
|
|
|
/* t */ |
638
|
|
|
|
|
|
|
|
639
|
|
|
|
|
|
|
#ifdef NID_sxnet |
640
|
1
|
|
|
|
|
|
return NID_sxnet; |
641
|
|
|
|
|
|
|
#else |
642
|
|
|
|
|
|
|
goto not_there; |
643
|
|
|
|
|
|
|
#endif |
644
|
|
|
|
|
|
|
|
645
|
|
|
|
|
|
|
} |
646
|
0
|
|
|
|
|
|
break; |
647
|
|
|
|
|
|
|
} |
648
|
44
|
|
|
|
|
|
break; |
649
|
|
|
|
|
|
|
case 10: |
650
|
|
|
|
|
|
|
/* Names all of length 10. */ |
651
|
|
|
|
|
|
|
/* ERROR_NONE EVP_PKS_EC EVP_PK_DSA EVP_PK_RSA F_SSL_READ MODE_ASYNC |
652
|
|
|
|
|
|
|
NID_bf_cbc NID_bf_ecb NID_crlBag NID_keyBag NID_ms_efs NID_ms_sgc |
653
|
|
|
|
|
|
|
NID_ns_sgc NID_pbmac1 NID_rc4_40 NID_rsadsi R_X509_LIB SSLEAY_DIR |
654
|
|
|
|
|
|
|
ST_CONNECT */ |
655
|
|
|
|
|
|
|
/* Offset 4 gives the best switch position. */ |
656
|
22
|
|
|
|
|
|
switch (name[4]) { |
657
|
|
|
|
|
|
|
case '0': |
658
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_X509_LIB", 10)) { |
659
|
|
|
|
|
|
|
/* ^ */ |
660
|
|
|
|
|
|
|
|
661
|
|
|
|
|
|
|
#ifdef SSL_R_X509_LIB |
662
|
1
|
|
|
|
|
|
return SSL_R_X509_LIB; |
663
|
|
|
|
|
|
|
#else |
664
|
|
|
|
|
|
|
goto not_there; |
665
|
|
|
|
|
|
|
#endif |
666
|
|
|
|
|
|
|
|
667
|
|
|
|
|
|
|
} |
668
|
0
|
|
|
|
|
|
break; |
669
|
|
|
|
|
|
|
case 'A': |
670
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SSLEAY_DIR", 10)) { |
671
|
|
|
|
|
|
|
/* ^ */ |
672
|
|
|
|
|
|
|
|
673
|
|
|
|
|
|
|
#ifdef SSLEAY_DIR |
674
|
2
|
|
|
|
|
|
return SSLEAY_DIR; |
675
|
|
|
|
|
|
|
#else |
676
|
|
|
|
|
|
|
goto not_there; |
677
|
|
|
|
|
|
|
#endif |
678
|
|
|
|
|
|
|
|
679
|
|
|
|
|
|
|
} |
680
|
0
|
|
|
|
|
|
break; |
681
|
|
|
|
|
|
|
case 'L': |
682
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_READ", 10)) { |
683
|
|
|
|
|
|
|
/* ^ */ |
684
|
|
|
|
|
|
|
|
685
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_READ |
686
|
1
|
|
|
|
|
|
return SSL_F_SSL_READ; |
687
|
|
|
|
|
|
|
#else |
688
|
|
|
|
|
|
|
goto not_there; |
689
|
|
|
|
|
|
|
#endif |
690
|
|
|
|
|
|
|
|
691
|
|
|
|
|
|
|
} |
692
|
0
|
|
|
|
|
|
break; |
693
|
|
|
|
|
|
|
case 'O': |
694
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_CONNECT", 10)) { |
695
|
|
|
|
|
|
|
/* ^ */ |
696
|
|
|
|
|
|
|
|
697
|
|
|
|
|
|
|
#ifdef SSL_ST_CONNECT |
698
|
1
|
|
|
|
|
|
return SSL_ST_CONNECT; |
699
|
|
|
|
|
|
|
#else |
700
|
|
|
|
|
|
|
goto not_there; |
701
|
|
|
|
|
|
|
#endif |
702
|
|
|
|
|
|
|
|
703
|
|
|
|
|
|
|
} |
704
|
0
|
|
|
|
|
|
break; |
705
|
|
|
|
|
|
|
case 'P': |
706
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "EVP_PKS_EC", 10)) { |
707
|
|
|
|
|
|
|
/* ^ */ |
708
|
|
|
|
|
|
|
|
709
|
|
|
|
|
|
|
#ifdef EVP_PKS_EC |
710
|
1
|
|
|
|
|
|
return EVP_PKS_EC; |
711
|
|
|
|
|
|
|
#else |
712
|
|
|
|
|
|
|
goto not_there; |
713
|
|
|
|
|
|
|
#endif |
714
|
|
|
|
|
|
|
|
715
|
|
|
|
|
|
|
} |
716
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "EVP_PK_DSA", 10)) { |
717
|
|
|
|
|
|
|
/* ^ */ |
718
|
|
|
|
|
|
|
|
719
|
|
|
|
|
|
|
#ifdef EVP_PK_DSA |
720
|
1
|
|
|
|
|
|
return EVP_PK_DSA; |
721
|
|
|
|
|
|
|
#else |
722
|
|
|
|
|
|
|
goto not_there; |
723
|
|
|
|
|
|
|
#endif |
724
|
|
|
|
|
|
|
|
725
|
|
|
|
|
|
|
} |
726
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PK_RSA", 10)) { |
727
|
|
|
|
|
|
|
/* ^ */ |
728
|
|
|
|
|
|
|
|
729
|
|
|
|
|
|
|
#ifdef EVP_PK_RSA |
730
|
2
|
|
|
|
|
|
return EVP_PK_RSA; |
731
|
|
|
|
|
|
|
#else |
732
|
|
|
|
|
|
|
goto not_there; |
733
|
|
|
|
|
|
|
#endif |
734
|
|
|
|
|
|
|
|
735
|
|
|
|
|
|
|
} |
736
|
0
|
|
|
|
|
|
break; |
737
|
|
|
|
|
|
|
case 'R': |
738
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_NONE", 10)) { |
739
|
|
|
|
|
|
|
/* ^ */ |
740
|
|
|
|
|
|
|
|
741
|
|
|
|
|
|
|
#ifdef SSL_ERROR_NONE |
742
|
1
|
|
|
|
|
|
return SSL_ERROR_NONE; |
743
|
|
|
|
|
|
|
#else |
744
|
|
|
|
|
|
|
goto not_there; |
745
|
|
|
|
|
|
|
#endif |
746
|
|
|
|
|
|
|
|
747
|
|
|
|
|
|
|
} |
748
|
0
|
|
|
|
|
|
break; |
749
|
|
|
|
|
|
|
case '_': |
750
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MODE_ASYNC", 10)) { |
751
|
|
|
|
|
|
|
/* ^ */ |
752
|
|
|
|
|
|
|
|
753
|
|
|
|
|
|
|
#ifdef SSL_MODE_ASYNC |
754
|
|
|
|
|
|
|
return SSL_MODE_ASYNC; |
755
|
|
|
|
|
|
|
#else |
756
|
1
|
|
|
|
|
|
goto not_there; |
757
|
|
|
|
|
|
|
#endif |
758
|
|
|
|
|
|
|
|
759
|
|
|
|
|
|
|
} |
760
|
0
|
|
|
|
|
|
break; |
761
|
|
|
|
|
|
|
case 'b': |
762
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_bf_cbc", 10)) { |
763
|
|
|
|
|
|
|
/* ^ */ |
764
|
|
|
|
|
|
|
|
765
|
|
|
|
|
|
|
#ifdef NID_bf_cbc |
766
|
1
|
|
|
|
|
|
return NID_bf_cbc; |
767
|
|
|
|
|
|
|
#else |
768
|
|
|
|
|
|
|
goto not_there; |
769
|
|
|
|
|
|
|
#endif |
770
|
|
|
|
|
|
|
|
771
|
|
|
|
|
|
|
} |
772
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_bf_ecb", 10)) { |
773
|
|
|
|
|
|
|
/* ^ */ |
774
|
|
|
|
|
|
|
|
775
|
|
|
|
|
|
|
#ifdef NID_bf_ecb |
776
|
1
|
|
|
|
|
|
return NID_bf_ecb; |
777
|
|
|
|
|
|
|
#else |
778
|
|
|
|
|
|
|
goto not_there; |
779
|
|
|
|
|
|
|
#endif |
780
|
|
|
|
|
|
|
|
781
|
|
|
|
|
|
|
} |
782
|
0
|
|
|
|
|
|
break; |
783
|
|
|
|
|
|
|
case 'c': |
784
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_crlBag", 10)) { |
785
|
|
|
|
|
|
|
/* ^ */ |
786
|
|
|
|
|
|
|
|
787
|
|
|
|
|
|
|
#ifdef NID_crlBag |
788
|
1
|
|
|
|
|
|
return NID_crlBag; |
789
|
|
|
|
|
|
|
#else |
790
|
|
|
|
|
|
|
goto not_there; |
791
|
|
|
|
|
|
|
#endif |
792
|
|
|
|
|
|
|
|
793
|
|
|
|
|
|
|
} |
794
|
0
|
|
|
|
|
|
break; |
795
|
|
|
|
|
|
|
case 'k': |
796
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_keyBag", 10)) { |
797
|
|
|
|
|
|
|
/* ^ */ |
798
|
|
|
|
|
|
|
|
799
|
|
|
|
|
|
|
#ifdef NID_keyBag |
800
|
1
|
|
|
|
|
|
return NID_keyBag; |
801
|
|
|
|
|
|
|
#else |
802
|
|
|
|
|
|
|
goto not_there; |
803
|
|
|
|
|
|
|
#endif |
804
|
|
|
|
|
|
|
|
805
|
|
|
|
|
|
|
} |
806
|
0
|
|
|
|
|
|
break; |
807
|
|
|
|
|
|
|
case 'm': |
808
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_ms_efs", 10)) { |
809
|
|
|
|
|
|
|
/* ^ */ |
810
|
|
|
|
|
|
|
|
811
|
|
|
|
|
|
|
#ifdef NID_ms_efs |
812
|
1
|
|
|
|
|
|
return NID_ms_efs; |
813
|
|
|
|
|
|
|
#else |
814
|
|
|
|
|
|
|
goto not_there; |
815
|
|
|
|
|
|
|
#endif |
816
|
|
|
|
|
|
|
|
817
|
|
|
|
|
|
|
} |
818
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ms_sgc", 10)) { |
819
|
|
|
|
|
|
|
/* ^ */ |
820
|
|
|
|
|
|
|
|
821
|
|
|
|
|
|
|
#ifdef NID_ms_sgc |
822
|
1
|
|
|
|
|
|
return NID_ms_sgc; |
823
|
|
|
|
|
|
|
#else |
824
|
|
|
|
|
|
|
goto not_there; |
825
|
|
|
|
|
|
|
#endif |
826
|
|
|
|
|
|
|
|
827
|
|
|
|
|
|
|
} |
828
|
0
|
|
|
|
|
|
break; |
829
|
|
|
|
|
|
|
case 'n': |
830
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ns_sgc", 10)) { |
831
|
|
|
|
|
|
|
/* ^ */ |
832
|
|
|
|
|
|
|
|
833
|
|
|
|
|
|
|
#ifdef NID_ns_sgc |
834
|
1
|
|
|
|
|
|
return NID_ns_sgc; |
835
|
|
|
|
|
|
|
#else |
836
|
|
|
|
|
|
|
goto not_there; |
837
|
|
|
|
|
|
|
#endif |
838
|
|
|
|
|
|
|
|
839
|
|
|
|
|
|
|
} |
840
|
0
|
|
|
|
|
|
break; |
841
|
|
|
|
|
|
|
case 'p': |
842
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbmac1", 10)) { |
843
|
|
|
|
|
|
|
/* ^ */ |
844
|
|
|
|
|
|
|
|
845
|
|
|
|
|
|
|
#ifdef NID_pbmac1 |
846
|
1
|
|
|
|
|
|
return NID_pbmac1; |
847
|
|
|
|
|
|
|
#else |
848
|
|
|
|
|
|
|
goto not_there; |
849
|
|
|
|
|
|
|
#endif |
850
|
|
|
|
|
|
|
|
851
|
|
|
|
|
|
|
} |
852
|
0
|
|
|
|
|
|
break; |
853
|
|
|
|
|
|
|
case 'r': |
854
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc4_40", 10)) { |
855
|
|
|
|
|
|
|
/* ^ */ |
856
|
|
|
|
|
|
|
|
857
|
|
|
|
|
|
|
#ifdef NID_rc4_40 |
858
|
1
|
|
|
|
|
|
return NID_rc4_40; |
859
|
|
|
|
|
|
|
#else |
860
|
|
|
|
|
|
|
goto not_there; |
861
|
|
|
|
|
|
|
#endif |
862
|
|
|
|
|
|
|
|
863
|
|
|
|
|
|
|
} |
864
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rsadsi", 10)) { |
865
|
|
|
|
|
|
|
/* ^ */ |
866
|
|
|
|
|
|
|
|
867
|
|
|
|
|
|
|
#ifdef NID_rsadsi |
868
|
1
|
|
|
|
|
|
return NID_rsadsi; |
869
|
|
|
|
|
|
|
#else |
870
|
|
|
|
|
|
|
goto not_there; |
871
|
|
|
|
|
|
|
#endif |
872
|
|
|
|
|
|
|
|
873
|
|
|
|
|
|
|
} |
874
|
0
|
|
|
|
|
|
break; |
875
|
|
|
|
|
|
|
} |
876
|
1
|
|
|
|
|
|
break; |
877
|
|
|
|
|
|
|
case 11: |
878
|
|
|
|
|
|
|
/* Names all of length 11. */ |
879
|
|
|
|
|
|
|
/* EVP_PKS_DSA EVP_PKS_RSA EVP_PKT_ENC EVP_PKT_EXP GEN_DIRNAME NID_ad_OCSP |
880
|
|
|
|
|
|
|
NID_certBag NID_des_cbc NID_des_ecb NID_des_ede NID_ext_req NID_id_pkix |
881
|
|
|
|
|
|
|
NID_rc2_cbc NID_rc2_ecb NID_rc5_cbc NID_rc5_ecb NID_surname NID_x509Crl |
882
|
|
|
|
|
|
|
OPENSSL_DIR OP_NO_SSLv2 OP_NO_SSLv3 OP_NO_TLSv1 R_BAD_STATE SSL3_MT_CCS |
883
|
|
|
|
|
|
|
VERIFY_NONE VERIFY_PEER X509_LOOKUP */ |
884
|
|
|
|
|
|
|
/* Offset 9 gives the best switch position. */ |
885
|
30
|
|
|
|
|
|
switch (name[9]) { |
886
|
|
|
|
|
|
|
case 'C': |
887
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CCS", 11)) { |
888
|
|
|
|
|
|
|
/* ^ */ |
889
|
|
|
|
|
|
|
|
890
|
|
|
|
|
|
|
#ifdef SSL3_MT_CCS |
891
|
1
|
|
|
|
|
|
return SSL3_MT_CCS; |
892
|
|
|
|
|
|
|
#else |
893
|
|
|
|
|
|
|
goto not_there; |
894
|
|
|
|
|
|
|
#endif |
895
|
|
|
|
|
|
|
|
896
|
|
|
|
|
|
|
} |
897
|
0
|
|
|
|
|
|
break; |
898
|
|
|
|
|
|
|
case 'E': |
899
|
3
|
50
|
|
|
|
|
if (!memcmp(name, "VERIFY_PEER", 11)) { |
900
|
|
|
|
|
|
|
/* ^ */ |
901
|
|
|
|
|
|
|
|
902
|
|
|
|
|
|
|
#ifdef SSL_VERIFY_PEER |
903
|
3
|
|
|
|
|
|
return SSL_VERIFY_PEER; |
904
|
|
|
|
|
|
|
#else |
905
|
|
|
|
|
|
|
goto not_there; |
906
|
|
|
|
|
|
|
#endif |
907
|
|
|
|
|
|
|
|
908
|
|
|
|
|
|
|
} |
909
|
0
|
|
|
|
|
|
break; |
910
|
|
|
|
|
|
|
case 'I': |
911
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_DIR", 11)) { |
912
|
|
|
|
|
|
|
/* ^ */ |
913
|
|
|
|
|
|
|
|
914
|
|
|
|
|
|
|
#ifdef OPENSSL_DIR |
915
|
|
|
|
|
|
|
return OPENSSL_DIR; |
916
|
|
|
|
|
|
|
#else |
917
|
1
|
|
|
|
|
|
goto not_there; |
918
|
|
|
|
|
|
|
#endif |
919
|
|
|
|
|
|
|
|
920
|
|
|
|
|
|
|
} |
921
|
0
|
|
|
|
|
|
break; |
922
|
|
|
|
|
|
|
case 'M': |
923
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_DIRNAME", 11)) { |
924
|
|
|
|
|
|
|
/* ^ */ |
925
|
|
|
|
|
|
|
|
926
|
|
|
|
|
|
|
#ifdef GEN_DIRNAME |
927
|
1
|
|
|
|
|
|
return GEN_DIRNAME; |
928
|
|
|
|
|
|
|
#else |
929
|
|
|
|
|
|
|
goto not_there; |
930
|
|
|
|
|
|
|
#endif |
931
|
|
|
|
|
|
|
|
932
|
|
|
|
|
|
|
} |
933
|
0
|
|
|
|
|
|
break; |
934
|
|
|
|
|
|
|
case 'N': |
935
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "EVP_PKT_ENC", 11)) { |
936
|
|
|
|
|
|
|
/* ^ */ |
937
|
|
|
|
|
|
|
|
938
|
|
|
|
|
|
|
#ifdef EVP_PKT_ENC |
939
|
2
|
|
|
|
|
|
return EVP_PKT_ENC; |
940
|
|
|
|
|
|
|
#else |
941
|
|
|
|
|
|
|
goto not_there; |
942
|
|
|
|
|
|
|
#endif |
943
|
|
|
|
|
|
|
|
944
|
|
|
|
|
|
|
} |
945
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "VERIFY_NONE", 11)) { |
946
|
|
|
|
|
|
|
/* ^ */ |
947
|
|
|
|
|
|
|
|
948
|
|
|
|
|
|
|
#ifdef SSL_VERIFY_NONE |
949
|
1
|
|
|
|
|
|
return SSL_VERIFY_NONE; |
950
|
|
|
|
|
|
|
#else |
951
|
|
|
|
|
|
|
goto not_there; |
952
|
|
|
|
|
|
|
#endif |
953
|
|
|
|
|
|
|
|
954
|
|
|
|
|
|
|
} |
955
|
0
|
|
|
|
|
|
break; |
956
|
|
|
|
|
|
|
case 'S': |
957
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "EVP_PKS_DSA", 11)) { |
958
|
|
|
|
|
|
|
/* ^ */ |
959
|
|
|
|
|
|
|
|
960
|
|
|
|
|
|
|
#ifdef EVP_PKS_DSA |
961
|
1
|
|
|
|
|
|
return EVP_PKS_DSA; |
962
|
|
|
|
|
|
|
#else |
963
|
|
|
|
|
|
|
goto not_there; |
964
|
|
|
|
|
|
|
#endif |
965
|
|
|
|
|
|
|
|
966
|
|
|
|
|
|
|
} |
967
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "EVP_PKS_RSA", 11)) { |
968
|
|
|
|
|
|
|
/* ^ */ |
969
|
|
|
|
|
|
|
|
970
|
|
|
|
|
|
|
#ifdef EVP_PKS_RSA |
971
|
1
|
|
|
|
|
|
return EVP_PKS_RSA; |
972
|
|
|
|
|
|
|
#else |
973
|
|
|
|
|
|
|
goto not_there; |
974
|
|
|
|
|
|
|
#endif |
975
|
|
|
|
|
|
|
|
976
|
|
|
|
|
|
|
} |
977
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ad_OCSP", 11)) { |
978
|
|
|
|
|
|
|
/* ^ */ |
979
|
|
|
|
|
|
|
|
980
|
|
|
|
|
|
|
#ifdef NID_ad_OCSP |
981
|
1
|
|
|
|
|
|
return NID_ad_OCSP; |
982
|
|
|
|
|
|
|
#else |
983
|
|
|
|
|
|
|
goto not_there; |
984
|
|
|
|
|
|
|
#endif |
985
|
|
|
|
|
|
|
|
986
|
|
|
|
|
|
|
} |
987
|
0
|
|
|
|
|
|
break; |
988
|
|
|
|
|
|
|
case 'T': |
989
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_STATE", 11)) { |
990
|
|
|
|
|
|
|
/* ^ */ |
991
|
|
|
|
|
|
|
|
992
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_STATE |
993
|
1
|
|
|
|
|
|
return SSL_R_BAD_STATE; |
994
|
|
|
|
|
|
|
#else |
995
|
|
|
|
|
|
|
goto not_there; |
996
|
|
|
|
|
|
|
#endif |
997
|
|
|
|
|
|
|
|
998
|
|
|
|
|
|
|
} |
999
|
0
|
|
|
|
|
|
break; |
1000
|
|
|
|
|
|
|
case 'U': |
1001
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_LOOKUP", 11)) { |
1002
|
|
|
|
|
|
|
/* ^ */ |
1003
|
|
|
|
|
|
|
|
1004
|
|
|
|
|
|
|
#ifdef SSL_X509_LOOKUP |
1005
|
1
|
|
|
|
|
|
return SSL_X509_LOOKUP; |
1006
|
|
|
|
|
|
|
#else |
1007
|
|
|
|
|
|
|
goto not_there; |
1008
|
|
|
|
|
|
|
#endif |
1009
|
|
|
|
|
|
|
|
1010
|
|
|
|
|
|
|
} |
1011
|
0
|
|
|
|
|
|
break; |
1012
|
|
|
|
|
|
|
case 'X': |
1013
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PKT_EXP", 11)) { |
1014
|
|
|
|
|
|
|
/* ^ */ |
1015
|
|
|
|
|
|
|
|
1016
|
|
|
|
|
|
|
#ifdef EVP_PKT_EXP |
1017
|
|
|
|
|
|
|
return EVP_PKT_EXP; |
1018
|
|
|
|
|
|
|
#else |
1019
|
1
|
|
|
|
|
|
goto not_there; |
1020
|
|
|
|
|
|
|
#endif |
1021
|
|
|
|
|
|
|
|
1022
|
|
|
|
|
|
|
} |
1023
|
0
|
|
|
|
|
|
break; |
1024
|
|
|
|
|
|
|
case 'a': |
1025
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_certBag", 11)) { |
1026
|
|
|
|
|
|
|
/* ^ */ |
1027
|
|
|
|
|
|
|
|
1028
|
|
|
|
|
|
|
#ifdef NID_certBag |
1029
|
1
|
|
|
|
|
|
return NID_certBag; |
1030
|
|
|
|
|
|
|
#else |
1031
|
|
|
|
|
|
|
goto not_there; |
1032
|
|
|
|
|
|
|
#endif |
1033
|
|
|
|
|
|
|
|
1034
|
|
|
|
|
|
|
} |
1035
|
0
|
|
|
|
|
|
break; |
1036
|
|
|
|
|
|
|
case 'b': |
1037
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_cbc", 11)) { |
1038
|
|
|
|
|
|
|
/* ^ */ |
1039
|
|
|
|
|
|
|
|
1040
|
|
|
|
|
|
|
#ifdef NID_des_cbc |
1041
|
1
|
|
|
|
|
|
return NID_des_cbc; |
1042
|
|
|
|
|
|
|
#else |
1043
|
|
|
|
|
|
|
goto not_there; |
1044
|
|
|
|
|
|
|
#endif |
1045
|
|
|
|
|
|
|
|
1046
|
|
|
|
|
|
|
} |
1047
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc2_cbc", 11)) { |
1048
|
|
|
|
|
|
|
/* ^ */ |
1049
|
|
|
|
|
|
|
|
1050
|
|
|
|
|
|
|
#ifdef NID_rc2_cbc |
1051
|
1
|
|
|
|
|
|
return NID_rc2_cbc; |
1052
|
|
|
|
|
|
|
#else |
1053
|
|
|
|
|
|
|
goto not_there; |
1054
|
|
|
|
|
|
|
#endif |
1055
|
|
|
|
|
|
|
|
1056
|
|
|
|
|
|
|
} |
1057
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rc5_cbc", 11)) { |
1058
|
|
|
|
|
|
|
/* ^ */ |
1059
|
|
|
|
|
|
|
|
1060
|
|
|
|
|
|
|
#ifdef NID_rc5_cbc |
1061
|
1
|
|
|
|
|
|
return NID_rc5_cbc; |
1062
|
|
|
|
|
|
|
#else |
1063
|
|
|
|
|
|
|
goto not_there; |
1064
|
|
|
|
|
|
|
#endif |
1065
|
|
|
|
|
|
|
|
1066
|
|
|
|
|
|
|
} |
1067
|
0
|
|
|
|
|
|
break; |
1068
|
|
|
|
|
|
|
case 'c': |
1069
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_ecb", 11)) { |
1070
|
|
|
|
|
|
|
/* ^ */ |
1071
|
|
|
|
|
|
|
|
1072
|
|
|
|
|
|
|
#ifdef NID_des_ecb |
1073
|
1
|
|
|
|
|
|
return NID_des_ecb; |
1074
|
|
|
|
|
|
|
#else |
1075
|
|
|
|
|
|
|
goto not_there; |
1076
|
|
|
|
|
|
|
#endif |
1077
|
|
|
|
|
|
|
|
1078
|
|
|
|
|
|
|
} |
1079
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc2_ecb", 11)) { |
1080
|
|
|
|
|
|
|
/* ^ */ |
1081
|
|
|
|
|
|
|
|
1082
|
|
|
|
|
|
|
#ifdef NID_rc2_ecb |
1083
|
1
|
|
|
|
|
|
return NID_rc2_ecb; |
1084
|
|
|
|
|
|
|
#else |
1085
|
|
|
|
|
|
|
goto not_there; |
1086
|
|
|
|
|
|
|
#endif |
1087
|
|
|
|
|
|
|
|
1088
|
|
|
|
|
|
|
} |
1089
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rc5_ecb", 11)) { |
1090
|
|
|
|
|
|
|
/* ^ */ |
1091
|
|
|
|
|
|
|
|
1092
|
|
|
|
|
|
|
#ifdef NID_rc5_ecb |
1093
|
1
|
|
|
|
|
|
return NID_rc5_ecb; |
1094
|
|
|
|
|
|
|
#else |
1095
|
|
|
|
|
|
|
goto not_there; |
1096
|
|
|
|
|
|
|
#endif |
1097
|
|
|
|
|
|
|
|
1098
|
|
|
|
|
|
|
} |
1099
|
0
|
|
|
|
|
|
break; |
1100
|
|
|
|
|
|
|
case 'd': |
1101
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede", 11)) { |
1102
|
|
|
|
|
|
|
/* ^ */ |
1103
|
|
|
|
|
|
|
|
1104
|
|
|
|
|
|
|
#ifdef NID_des_ede |
1105
|
|
|
|
|
|
|
return NID_des_ede; |
1106
|
|
|
|
|
|
|
#else |
1107
|
1
|
|
|
|
|
|
goto not_there; |
1108
|
|
|
|
|
|
|
#endif |
1109
|
|
|
|
|
|
|
|
1110
|
|
|
|
|
|
|
} |
1111
|
0
|
|
|
|
|
|
break; |
1112
|
|
|
|
|
|
|
case 'e': |
1113
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ext_req", 11)) { |
1114
|
|
|
|
|
|
|
/* ^ */ |
1115
|
|
|
|
|
|
|
|
1116
|
|
|
|
|
|
|
#ifdef NID_ext_req |
1117
|
1
|
|
|
|
|
|
return NID_ext_req; |
1118
|
|
|
|
|
|
|
#else |
1119
|
|
|
|
|
|
|
goto not_there; |
1120
|
|
|
|
|
|
|
#endif |
1121
|
|
|
|
|
|
|
|
1122
|
|
|
|
|
|
|
} |
1123
|
0
|
|
|
|
|
|
break; |
1124
|
|
|
|
|
|
|
case 'i': |
1125
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_id_pkix", 11)) { |
1126
|
|
|
|
|
|
|
/* ^ */ |
1127
|
|
|
|
|
|
|
|
1128
|
|
|
|
|
|
|
#ifdef NID_id_pkix |
1129
|
1
|
|
|
|
|
|
return NID_id_pkix; |
1130
|
|
|
|
|
|
|
#else |
1131
|
|
|
|
|
|
|
goto not_there; |
1132
|
|
|
|
|
|
|
#endif |
1133
|
|
|
|
|
|
|
|
1134
|
|
|
|
|
|
|
} |
1135
|
0
|
|
|
|
|
|
break; |
1136
|
|
|
|
|
|
|
case 'm': |
1137
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_surname", 11)) { |
1138
|
|
|
|
|
|
|
/* ^ */ |
1139
|
|
|
|
|
|
|
|
1140
|
|
|
|
|
|
|
#ifdef NID_surname |
1141
|
1
|
|
|
|
|
|
return NID_surname; |
1142
|
|
|
|
|
|
|
#else |
1143
|
|
|
|
|
|
|
goto not_there; |
1144
|
|
|
|
|
|
|
#endif |
1145
|
|
|
|
|
|
|
|
1146
|
|
|
|
|
|
|
} |
1147
|
0
|
|
|
|
|
|
break; |
1148
|
|
|
|
|
|
|
case 'r': |
1149
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_x509Crl", 11)) { |
1150
|
|
|
|
|
|
|
/* ^ */ |
1151
|
|
|
|
|
|
|
|
1152
|
|
|
|
|
|
|
#ifdef NID_x509Crl |
1153
|
1
|
|
|
|
|
|
return NID_x509Crl; |
1154
|
|
|
|
|
|
|
#else |
1155
|
|
|
|
|
|
|
goto not_there; |
1156
|
|
|
|
|
|
|
#endif |
1157
|
|
|
|
|
|
|
|
1158
|
|
|
|
|
|
|
} |
1159
|
0
|
|
|
|
|
|
break; |
1160
|
|
|
|
|
|
|
case 'v': |
1161
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OP_NO_SSLv2", 11)) { |
1162
|
|
|
|
|
|
|
/* ^ */ |
1163
|
|
|
|
|
|
|
|
1164
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_SSLv2 |
1165
|
1
|
|
|
|
|
|
return SSL_OP_NO_SSLv2; |
1166
|
|
|
|
|
|
|
#else |
1167
|
|
|
|
|
|
|
goto not_there; |
1168
|
|
|
|
|
|
|
#endif |
1169
|
|
|
|
|
|
|
|
1170
|
|
|
|
|
|
|
} |
1171
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_NO_SSLv3", 11)) { |
1172
|
|
|
|
|
|
|
/* ^ */ |
1173
|
|
|
|
|
|
|
|
1174
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_SSLv3 |
1175
|
1
|
|
|
|
|
|
return SSL_OP_NO_SSLv3; |
1176
|
|
|
|
|
|
|
#else |
1177
|
|
|
|
|
|
|
goto not_there; |
1178
|
|
|
|
|
|
|
#endif |
1179
|
|
|
|
|
|
|
|
1180
|
|
|
|
|
|
|
} |
1181
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_TLSv1", 11)) { |
1182
|
|
|
|
|
|
|
/* ^ */ |
1183
|
|
|
|
|
|
|
|
1184
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_TLSv1 |
1185
|
1
|
|
|
|
|
|
return SSL_OP_NO_TLSv1; |
1186
|
|
|
|
|
|
|
#else |
1187
|
|
|
|
|
|
|
goto not_there; |
1188
|
|
|
|
|
|
|
#endif |
1189
|
|
|
|
|
|
|
|
1190
|
|
|
|
|
|
|
} |
1191
|
0
|
|
|
|
|
|
break; |
1192
|
|
|
|
|
|
|
} |
1193
|
0
|
|
|
|
|
|
break; |
1194
|
|
|
|
|
|
|
case 12: |
1195
|
|
|
|
|
|
|
/* Names all of length 12. */ |
1196
|
|
|
|
|
|
|
/* ASYNC_PAUSED EVP_PKT_EXCH EVP_PKT_SIGN FILETYPE_PEM F_SSL_SET_FD |
1197
|
|
|
|
|
|
|
GEN_EDIPARTY MBSTRING_ASC MBSTRING_BMP NID_bf_cfb64 NID_bf_ofb64 |
1198
|
|
|
|
|
|
|
NID_des_ede3 NID_desx_cbc NID_idea_cbc NID_idea_ecb NID_initials |
1199
|
|
|
|
|
|
|
NID_md5_sha1 NID_netscape OP_NO_TICKET RETRY_VERIFY R_PEER_ERROR |
1200
|
|
|
|
|
|
|
R_SHORT_READ SSL2_VERSION SSL3_VERSION ST_READ_BODY TLS1_VERSION */ |
1201
|
|
|
|
|
|
|
/* Offset 10 gives the best switch position. */ |
1202
|
55
|
|
|
|
|
|
switch (name[10]) { |
1203
|
|
|
|
|
|
|
case '6': |
1204
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_bf_cfb64", 12)) { |
1205
|
|
|
|
|
|
|
/* ^ */ |
1206
|
|
|
|
|
|
|
|
1207
|
|
|
|
|
|
|
#ifdef NID_bf_cfb64 |
1208
|
1
|
|
|
|
|
|
return NID_bf_cfb64; |
1209
|
|
|
|
|
|
|
#else |
1210
|
|
|
|
|
|
|
goto not_there; |
1211
|
|
|
|
|
|
|
#endif |
1212
|
|
|
|
|
|
|
|
1213
|
|
|
|
|
|
|
} |
1214
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_bf_ofb64", 12)) { |
1215
|
|
|
|
|
|
|
/* ^ */ |
1216
|
|
|
|
|
|
|
|
1217
|
|
|
|
|
|
|
#ifdef NID_bf_ofb64 |
1218
|
1
|
|
|
|
|
|
return NID_bf_ofb64; |
1219
|
|
|
|
|
|
|
#else |
1220
|
|
|
|
|
|
|
goto not_there; |
1221
|
|
|
|
|
|
|
#endif |
1222
|
|
|
|
|
|
|
|
1223
|
|
|
|
|
|
|
} |
1224
|
0
|
|
|
|
|
|
break; |
1225
|
|
|
|
|
|
|
case 'A': |
1226
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_SHORT_READ", 12)) { |
1227
|
|
|
|
|
|
|
/* ^ */ |
1228
|
|
|
|
|
|
|
|
1229
|
|
|
|
|
|
|
#ifdef SSL_R_SHORT_READ |
1230
|
1
|
|
|
|
|
|
return SSL_R_SHORT_READ; |
1231
|
|
|
|
|
|
|
#else |
1232
|
|
|
|
|
|
|
goto not_there; |
1233
|
|
|
|
|
|
|
#endif |
1234
|
|
|
|
|
|
|
|
1235
|
|
|
|
|
|
|
} |
1236
|
0
|
|
|
|
|
|
break; |
1237
|
|
|
|
|
|
|
case 'C': |
1238
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PKT_EXCH", 12)) { |
1239
|
|
|
|
|
|
|
/* ^ */ |
1240
|
|
|
|
|
|
|
|
1241
|
|
|
|
|
|
|
#ifdef EVP_PKT_EXCH |
1242
|
1
|
|
|
|
|
|
return EVP_PKT_EXCH; |
1243
|
|
|
|
|
|
|
#else |
1244
|
|
|
|
|
|
|
goto not_there; |
1245
|
|
|
|
|
|
|
#endif |
1246
|
|
|
|
|
|
|
|
1247
|
|
|
|
|
|
|
} |
1248
|
0
|
|
|
|
|
|
break; |
1249
|
|
|
|
|
|
|
case 'D': |
1250
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_READ_BODY", 12)) { |
1251
|
|
|
|
|
|
|
/* ^ */ |
1252
|
|
|
|
|
|
|
|
1253
|
|
|
|
|
|
|
#ifdef SSL_ST_READ_BODY |
1254
|
1
|
|
|
|
|
|
return SSL_ST_READ_BODY; |
1255
|
|
|
|
|
|
|
#else |
1256
|
|
|
|
|
|
|
goto not_there; |
1257
|
|
|
|
|
|
|
#endif |
1258
|
|
|
|
|
|
|
|
1259
|
|
|
|
|
|
|
} |
1260
|
0
|
|
|
|
|
|
break; |
1261
|
|
|
|
|
|
|
case 'E': |
1262
|
20
|
100
|
|
|
|
|
if (!memcmp(name, "ASYNC_PAUSED", 12)) { |
1263
|
|
|
|
|
|
|
/* ^ */ |
1264
|
|
|
|
|
|
|
|
1265
|
|
|
|
|
|
|
#ifdef SSL_ASYNC_PAUSED |
1266
|
|
|
|
|
|
|
return SSL_ASYNC_PAUSED; |
1267
|
|
|
|
|
|
|
#else |
1268
|
1
|
|
|
|
|
|
goto not_there; |
1269
|
|
|
|
|
|
|
#endif |
1270
|
|
|
|
|
|
|
|
1271
|
|
|
|
|
|
|
} |
1272
|
19
|
100
|
|
|
|
|
if (!memcmp(name, "FILETYPE_PEM", 12)) { |
1273
|
|
|
|
|
|
|
/* ^ */ |
1274
|
|
|
|
|
|
|
|
1275
|
|
|
|
|
|
|
#ifdef SSL_FILETYPE_PEM |
1276
|
17
|
|
|
|
|
|
return SSL_FILETYPE_PEM; |
1277
|
|
|
|
|
|
|
#else |
1278
|
|
|
|
|
|
|
goto not_there; |
1279
|
|
|
|
|
|
|
#endif |
1280
|
|
|
|
|
|
|
|
1281
|
|
|
|
|
|
|
} |
1282
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_TICKET", 12)) { |
1283
|
|
|
|
|
|
|
/* ^ */ |
1284
|
|
|
|
|
|
|
|
1285
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_TICKET |
1286
|
2
|
|
|
|
|
|
return SSL_OP_NO_TICKET; |
1287
|
|
|
|
|
|
|
#else |
1288
|
|
|
|
|
|
|
goto not_there; |
1289
|
|
|
|
|
|
|
#endif |
1290
|
|
|
|
|
|
|
|
1291
|
|
|
|
|
|
|
} |
1292
|
0
|
|
|
|
|
|
break; |
1293
|
|
|
|
|
|
|
case 'F': |
1294
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_SET_FD", 12)) { |
1295
|
|
|
|
|
|
|
/* ^ */ |
1296
|
|
|
|
|
|
|
|
1297
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_SET_FD |
1298
|
1
|
|
|
|
|
|
return SSL_F_SSL_SET_FD; |
1299
|
|
|
|
|
|
|
#else |
1300
|
|
|
|
|
|
|
goto not_there; |
1301
|
|
|
|
|
|
|
#endif |
1302
|
|
|
|
|
|
|
|
1303
|
|
|
|
|
|
|
} |
1304
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "RETRY_VERIFY", 12)) { |
1305
|
|
|
|
|
|
|
/* ^ */ |
1306
|
|
|
|
|
|
|
|
1307
|
|
|
|
|
|
|
#ifdef SSL_RETRY_VERIFY |
1308
|
|
|
|
|
|
|
return SSL_RETRY_VERIFY; |
1309
|
|
|
|
|
|
|
#else |
1310
|
1
|
|
|
|
|
|
goto not_there; |
1311
|
|
|
|
|
|
|
#endif |
1312
|
|
|
|
|
|
|
|
1313
|
|
|
|
|
|
|
} |
1314
|
0
|
|
|
|
|
|
break; |
1315
|
|
|
|
|
|
|
case 'G': |
1316
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "EVP_PKT_SIGN", 12)) { |
1317
|
|
|
|
|
|
|
/* ^ */ |
1318
|
|
|
|
|
|
|
|
1319
|
|
|
|
|
|
|
#ifdef EVP_PKT_SIGN |
1320
|
2
|
|
|
|
|
|
return EVP_PKT_SIGN; |
1321
|
|
|
|
|
|
|
#else |
1322
|
|
|
|
|
|
|
goto not_there; |
1323
|
|
|
|
|
|
|
#endif |
1324
|
|
|
|
|
|
|
|
1325
|
|
|
|
|
|
|
} |
1326
|
0
|
|
|
|
|
|
break; |
1327
|
|
|
|
|
|
|
case 'M': |
1328
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MBSTRING_BMP", 12)) { |
1329
|
|
|
|
|
|
|
/* ^ */ |
1330
|
|
|
|
|
|
|
|
1331
|
|
|
|
|
|
|
#ifdef MBSTRING_BMP |
1332
|
1
|
|
|
|
|
|
return MBSTRING_BMP; |
1333
|
|
|
|
|
|
|
#else |
1334
|
|
|
|
|
|
|
goto not_there; |
1335
|
|
|
|
|
|
|
#endif |
1336
|
|
|
|
|
|
|
|
1337
|
|
|
|
|
|
|
} |
1338
|
0
|
|
|
|
|
|
break; |
1339
|
|
|
|
|
|
|
case 'O': |
1340
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "R_PEER_ERROR", 12)) { |
1341
|
|
|
|
|
|
|
/* ^ */ |
1342
|
|
|
|
|
|
|
|
1343
|
|
|
|
|
|
|
#ifdef SSL_R_PEER_ERROR |
1344
|
1
|
|
|
|
|
|
return SSL_R_PEER_ERROR; |
1345
|
|
|
|
|
|
|
#else |
1346
|
|
|
|
|
|
|
goto not_there; |
1347
|
|
|
|
|
|
|
#endif |
1348
|
|
|
|
|
|
|
|
1349
|
|
|
|
|
|
|
} |
1350
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "SSL2_VERSION", 12)) { |
1351
|
|
|
|
|
|
|
/* ^ */ |
1352
|
|
|
|
|
|
|
|
1353
|
|
|
|
|
|
|
#ifdef SSL2_VERSION |
1354
|
1
|
|
|
|
|
|
return SSL2_VERSION; |
1355
|
|
|
|
|
|
|
#else |
1356
|
|
|
|
|
|
|
goto not_there; |
1357
|
|
|
|
|
|
|
#endif |
1358
|
|
|
|
|
|
|
|
1359
|
|
|
|
|
|
|
} |
1360
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_VERSION", 12)) { |
1361
|
|
|
|
|
|
|
/* ^ */ |
1362
|
|
|
|
|
|
|
|
1363
|
|
|
|
|
|
|
#ifdef SSL3_VERSION |
1364
|
1
|
|
|
|
|
|
return SSL3_VERSION; |
1365
|
|
|
|
|
|
|
#else |
1366
|
|
|
|
|
|
|
goto not_there; |
1367
|
|
|
|
|
|
|
#endif |
1368
|
|
|
|
|
|
|
|
1369
|
|
|
|
|
|
|
} |
1370
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "TLS1_VERSION", 12)) { |
1371
|
|
|
|
|
|
|
/* ^ */ |
1372
|
|
|
|
|
|
|
|
1373
|
|
|
|
|
|
|
#ifdef TLS1_VERSION |
1374
|
1
|
|
|
|
|
|
return TLS1_VERSION; |
1375
|
|
|
|
|
|
|
#else |
1376
|
|
|
|
|
|
|
goto not_there; |
1377
|
|
|
|
|
|
|
#endif |
1378
|
|
|
|
|
|
|
|
1379
|
|
|
|
|
|
|
} |
1380
|
0
|
|
|
|
|
|
break; |
1381
|
|
|
|
|
|
|
case 'S': |
1382
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "MBSTRING_ASC", 12)) { |
1383
|
|
|
|
|
|
|
/* ^ */ |
1384
|
|
|
|
|
|
|
|
1385
|
|
|
|
|
|
|
#ifdef MBSTRING_ASC |
1386
|
2
|
|
|
|
|
|
return MBSTRING_ASC; |
1387
|
|
|
|
|
|
|
#else |
1388
|
|
|
|
|
|
|
goto not_there; |
1389
|
|
|
|
|
|
|
#endif |
1390
|
|
|
|
|
|
|
|
1391
|
|
|
|
|
|
|
} |
1392
|
0
|
|
|
|
|
|
break; |
1393
|
|
|
|
|
|
|
case 'T': |
1394
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_EDIPARTY", 12)) { |
1395
|
|
|
|
|
|
|
/* ^ */ |
1396
|
|
|
|
|
|
|
|
1397
|
|
|
|
|
|
|
#ifdef GEN_EDIPARTY |
1398
|
1
|
|
|
|
|
|
return GEN_EDIPARTY; |
1399
|
|
|
|
|
|
|
#else |
1400
|
|
|
|
|
|
|
goto not_there; |
1401
|
|
|
|
|
|
|
#endif |
1402
|
|
|
|
|
|
|
|
1403
|
|
|
|
|
|
|
} |
1404
|
0
|
|
|
|
|
|
break; |
1405
|
|
|
|
|
|
|
case 'a': |
1406
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_md5_sha1", 12)) { |
1407
|
|
|
|
|
|
|
/* ^ */ |
1408
|
|
|
|
|
|
|
|
1409
|
|
|
|
|
|
|
#ifdef NID_md5_sha1 |
1410
|
1
|
|
|
|
|
|
return NID_md5_sha1; |
1411
|
|
|
|
|
|
|
#else |
1412
|
|
|
|
|
|
|
goto not_there; |
1413
|
|
|
|
|
|
|
#endif |
1414
|
|
|
|
|
|
|
|
1415
|
|
|
|
|
|
|
} |
1416
|
0
|
|
|
|
|
|
break; |
1417
|
|
|
|
|
|
|
case 'b': |
1418
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_desx_cbc", 12)) { |
1419
|
|
|
|
|
|
|
/* ^ */ |
1420
|
|
|
|
|
|
|
|
1421
|
|
|
|
|
|
|
#ifdef NID_desx_cbc |
1422
|
1
|
|
|
|
|
|
return NID_desx_cbc; |
1423
|
|
|
|
|
|
|
#else |
1424
|
|
|
|
|
|
|
goto not_there; |
1425
|
|
|
|
|
|
|
#endif |
1426
|
|
|
|
|
|
|
|
1427
|
|
|
|
|
|
|
} |
1428
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_idea_cbc", 12)) { |
1429
|
|
|
|
|
|
|
/* ^ */ |
1430
|
|
|
|
|
|
|
|
1431
|
|
|
|
|
|
|
#ifdef NID_idea_cbc |
1432
|
1
|
|
|
|
|
|
return NID_idea_cbc; |
1433
|
|
|
|
|
|
|
#else |
1434
|
|
|
|
|
|
|
goto not_there; |
1435
|
|
|
|
|
|
|
#endif |
1436
|
|
|
|
|
|
|
|
1437
|
|
|
|
|
|
|
} |
1438
|
0
|
|
|
|
|
|
break; |
1439
|
|
|
|
|
|
|
case 'c': |
1440
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_idea_ecb", 12)) { |
1441
|
|
|
|
|
|
|
/* ^ */ |
1442
|
|
|
|
|
|
|
|
1443
|
|
|
|
|
|
|
#ifdef NID_idea_ecb |
1444
|
1
|
|
|
|
|
|
return NID_idea_ecb; |
1445
|
|
|
|
|
|
|
#else |
1446
|
|
|
|
|
|
|
goto not_there; |
1447
|
|
|
|
|
|
|
#endif |
1448
|
|
|
|
|
|
|
|
1449
|
|
|
|
|
|
|
} |
1450
|
0
|
|
|
|
|
|
break; |
1451
|
|
|
|
|
|
|
case 'e': |
1452
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede3", 12)) { |
1453
|
|
|
|
|
|
|
/* ^ */ |
1454
|
|
|
|
|
|
|
|
1455
|
|
|
|
|
|
|
#ifdef NID_des_ede3 |
1456
|
|
|
|
|
|
|
return NID_des_ede3; |
1457
|
|
|
|
|
|
|
#else |
1458
|
1
|
|
|
|
|
|
goto not_there; |
1459
|
|
|
|
|
|
|
#endif |
1460
|
|
|
|
|
|
|
|
1461
|
|
|
|
|
|
|
} |
1462
|
0
|
|
|
|
|
|
break; |
1463
|
|
|
|
|
|
|
case 'l': |
1464
|
11
|
100
|
|
|
|
|
if (!memcmp(name, "NID_initials", 12)) { |
1465
|
|
|
|
|
|
|
/* ^ */ |
1466
|
|
|
|
|
|
|
|
1467
|
|
|
|
|
|
|
#ifdef NID_initials |
1468
|
1
|
|
|
|
|
|
return NID_initials; |
1469
|
|
|
|
|
|
|
#else |
1470
|
|
|
|
|
|
|
goto not_there; |
1471
|
|
|
|
|
|
|
#endif |
1472
|
|
|
|
|
|
|
|
1473
|
|
|
|
|
|
|
} |
1474
|
10
|
|
|
|
|
|
break; |
1475
|
|
|
|
|
|
|
case 'p': |
1476
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape", 12)) { |
1477
|
|
|
|
|
|
|
/* ^ */ |
1478
|
|
|
|
|
|
|
|
1479
|
|
|
|
|
|
|
#ifdef NID_netscape |
1480
|
1
|
|
|
|
|
|
return NID_netscape; |
1481
|
|
|
|
|
|
|
#else |
1482
|
|
|
|
|
|
|
goto not_there; |
1483
|
|
|
|
|
|
|
#endif |
1484
|
|
|
|
|
|
|
|
1485
|
|
|
|
|
|
|
} |
1486
|
0
|
|
|
|
|
|
break; |
1487
|
|
|
|
|
|
|
} |
1488
|
11
|
|
|
|
|
|
break; |
1489
|
|
|
|
|
|
|
case 13: |
1490
|
|
|
|
|
|
|
/* Names all of length 13. */ |
1491
|
|
|
|
|
|
|
/* ASYNC_NO_JOBS CB_READ_ALERT ERROR_SYSCALL FILETYPE_ASN1 F_SSL_SET_RFD |
1492
|
|
|
|
|
|
|
F_SSL_SET_WFD GEN_OTHERNAME MBSTRING_FLAG MBSTRING_UNIV MBSTRING_UTF8 |
1493
|
|
|
|
|
|
|
NID_OCSP_sign NID_algorithm NID_cast5_cbc NID_cast5_ecb NID_code_sign |
1494
|
|
|
|
|
|
|
NID_delta_crl NID_des_cfb64 NID_des_ofb64 NID_givenName NID_id_pbkdf2 |
1495
|
|
|
|
|
|
|
NID_id_qt_cps NID_key_usage NID_rc2_cfb64 NID_rc2_ofb64 NID_rc5_cfb64 |
1496
|
|
|
|
|
|
|
NID_rc5_ofb64 NID_ripemd160 NID_secretBag OP_NO_TLSv1_1 OP_NO_TLSv1_2 |
1497
|
|
|
|
|
|
|
OP_NO_TLSv1_3 OP_TLS_D5_BUG SENT_SHUTDOWN SSL2_MT_ERROR SSL3_RT_ALERT |
1498
|
|
|
|
|
|
|
SSLEAY_CFLAGS XN_FLAG_FN_LN XN_FLAG_FN_SN */ |
1499
|
|
|
|
|
|
|
/* Offset 12 gives the best switch position. */ |
1500
|
56
|
|
|
|
|
|
switch (name[12]) { |
1501
|
|
|
|
|
|
|
case '0': |
1502
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ripemd16", 12)) { |
1503
|
|
|
|
|
|
|
/* 0 */ |
1504
|
|
|
|
|
|
|
|
1505
|
|
|
|
|
|
|
#ifdef NID_ripemd160 |
1506
|
1
|
|
|
|
|
|
return NID_ripemd160; |
1507
|
|
|
|
|
|
|
#else |
1508
|
|
|
|
|
|
|
goto not_there; |
1509
|
|
|
|
|
|
|
#endif |
1510
|
|
|
|
|
|
|
|
1511
|
|
|
|
|
|
|
} |
1512
|
0
|
|
|
|
|
|
break; |
1513
|
|
|
|
|
|
|
case '1': |
1514
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "FILETYPE_ASN", 12)) { |
1515
|
|
|
|
|
|
|
/* 1 */ |
1516
|
|
|
|
|
|
|
|
1517
|
|
|
|
|
|
|
#ifdef SSL_FILETYPE_ASN1 |
1518
|
1
|
|
|
|
|
|
return SSL_FILETYPE_ASN1; |
1519
|
|
|
|
|
|
|
#else |
1520
|
|
|
|
|
|
|
goto not_there; |
1521
|
|
|
|
|
|
|
#endif |
1522
|
|
|
|
|
|
|
|
1523
|
|
|
|
|
|
|
} |
1524
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_TLSv1_", 12)) { |
1525
|
|
|
|
|
|
|
/* 1 */ |
1526
|
|
|
|
|
|
|
|
1527
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_TLSv1_1 |
1528
|
1
|
|
|
|
|
|
return SSL_OP_NO_TLSv1_1; |
1529
|
|
|
|
|
|
|
#else |
1530
|
|
|
|
|
|
|
goto not_there; |
1531
|
|
|
|
|
|
|
#endif |
1532
|
|
|
|
|
|
|
|
1533
|
|
|
|
|
|
|
} |
1534
|
0
|
|
|
|
|
|
break; |
1535
|
|
|
|
|
|
|
case '2': |
1536
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_id_pbkdf", 12)) { |
1537
|
|
|
|
|
|
|
/* 2 */ |
1538
|
|
|
|
|
|
|
|
1539
|
|
|
|
|
|
|
#ifdef NID_id_pbkdf2 |
1540
|
1
|
|
|
|
|
|
return NID_id_pbkdf2; |
1541
|
|
|
|
|
|
|
#else |
1542
|
|
|
|
|
|
|
goto not_there; |
1543
|
|
|
|
|
|
|
#endif |
1544
|
|
|
|
|
|
|
|
1545
|
|
|
|
|
|
|
} |
1546
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_TLSv1_", 12)) { |
1547
|
|
|
|
|
|
|
/* 2 */ |
1548
|
|
|
|
|
|
|
|
1549
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_TLSv1_2 |
1550
|
1
|
|
|
|
|
|
return SSL_OP_NO_TLSv1_2; |
1551
|
|
|
|
|
|
|
#else |
1552
|
|
|
|
|
|
|
goto not_there; |
1553
|
|
|
|
|
|
|
#endif |
1554
|
|
|
|
|
|
|
|
1555
|
|
|
|
|
|
|
} |
1556
|
0
|
|
|
|
|
|
break; |
1557
|
|
|
|
|
|
|
case '3': |
1558
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_TLSv1_", 12)) { |
1559
|
|
|
|
|
|
|
/* 3 */ |
1560
|
|
|
|
|
|
|
|
1561
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_TLSv1_3 |
1562
|
|
|
|
|
|
|
return SSL_OP_NO_TLSv1_3; |
1563
|
|
|
|
|
|
|
#else |
1564
|
1
|
|
|
|
|
|
goto not_there; |
1565
|
|
|
|
|
|
|
#endif |
1566
|
|
|
|
|
|
|
|
1567
|
|
|
|
|
|
|
} |
1568
|
0
|
|
|
|
|
|
break; |
1569
|
|
|
|
|
|
|
case '4': |
1570
|
6
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_cfb6", 12)) { |
1571
|
|
|
|
|
|
|
/* 4 */ |
1572
|
|
|
|
|
|
|
|
1573
|
|
|
|
|
|
|
#ifdef NID_des_cfb64 |
1574
|
1
|
|
|
|
|
|
return NID_des_cfb64; |
1575
|
|
|
|
|
|
|
#else |
1576
|
|
|
|
|
|
|
goto not_there; |
1577
|
|
|
|
|
|
|
#endif |
1578
|
|
|
|
|
|
|
|
1579
|
|
|
|
|
|
|
} |
1580
|
5
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_ofb6", 12)) { |
1581
|
|
|
|
|
|
|
/* 4 */ |
1582
|
|
|
|
|
|
|
|
1583
|
|
|
|
|
|
|
#ifdef NID_des_ofb64 |
1584
|
1
|
|
|
|
|
|
return NID_des_ofb64; |
1585
|
|
|
|
|
|
|
#else |
1586
|
|
|
|
|
|
|
goto not_there; |
1587
|
|
|
|
|
|
|
#endif |
1588
|
|
|
|
|
|
|
|
1589
|
|
|
|
|
|
|
} |
1590
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc2_cfb6", 12)) { |
1591
|
|
|
|
|
|
|
/* 4 */ |
1592
|
|
|
|
|
|
|
|
1593
|
|
|
|
|
|
|
#ifdef NID_rc2_cfb64 |
1594
|
1
|
|
|
|
|
|
return NID_rc2_cfb64; |
1595
|
|
|
|
|
|
|
#else |
1596
|
|
|
|
|
|
|
goto not_there; |
1597
|
|
|
|
|
|
|
#endif |
1598
|
|
|
|
|
|
|
|
1599
|
|
|
|
|
|
|
} |
1600
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc2_ofb6", 12)) { |
1601
|
|
|
|
|
|
|
/* 4 */ |
1602
|
|
|
|
|
|
|
|
1603
|
|
|
|
|
|
|
#ifdef NID_rc2_ofb64 |
1604
|
1
|
|
|
|
|
|
return NID_rc2_ofb64; |
1605
|
|
|
|
|
|
|
#else |
1606
|
|
|
|
|
|
|
goto not_there; |
1607
|
|
|
|
|
|
|
#endif |
1608
|
|
|
|
|
|
|
|
1609
|
|
|
|
|
|
|
} |
1610
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc5_cfb6", 12)) { |
1611
|
|
|
|
|
|
|
/* 4 */ |
1612
|
|
|
|
|
|
|
|
1613
|
|
|
|
|
|
|
#ifdef NID_rc5_cfb64 |
1614
|
1
|
|
|
|
|
|
return NID_rc5_cfb64; |
1615
|
|
|
|
|
|
|
#else |
1616
|
|
|
|
|
|
|
goto not_there; |
1617
|
|
|
|
|
|
|
#endif |
1618
|
|
|
|
|
|
|
|
1619
|
|
|
|
|
|
|
} |
1620
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rc5_ofb6", 12)) { |
1621
|
|
|
|
|
|
|
/* 4 */ |
1622
|
|
|
|
|
|
|
|
1623
|
|
|
|
|
|
|
#ifdef NID_rc5_ofb64 |
1624
|
1
|
|
|
|
|
|
return NID_rc5_ofb64; |
1625
|
|
|
|
|
|
|
#else |
1626
|
|
|
|
|
|
|
goto not_there; |
1627
|
|
|
|
|
|
|
#endif |
1628
|
|
|
|
|
|
|
|
1629
|
|
|
|
|
|
|
} |
1630
|
0
|
|
|
|
|
|
break; |
1631
|
|
|
|
|
|
|
case '8': |
1632
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "MBSTRING_UTF", 12)) { |
1633
|
|
|
|
|
|
|
/* 8 */ |
1634
|
|
|
|
|
|
|
|
1635
|
|
|
|
|
|
|
#ifdef MBSTRING_UTF8 |
1636
|
2
|
|
|
|
|
|
return MBSTRING_UTF8; |
1637
|
|
|
|
|
|
|
#else |
1638
|
|
|
|
|
|
|
goto not_there; |
1639
|
|
|
|
|
|
|
#endif |
1640
|
|
|
|
|
|
|
|
1641
|
|
|
|
|
|
|
} |
1642
|
0
|
|
|
|
|
|
break; |
1643
|
|
|
|
|
|
|
case 'D': |
1644
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_SET_RF", 12)) { |
1645
|
|
|
|
|
|
|
/* D */ |
1646
|
|
|
|
|
|
|
|
1647
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_SET_RFD |
1648
|
1
|
|
|
|
|
|
return SSL_F_SSL_SET_RFD; |
1649
|
|
|
|
|
|
|
#else |
1650
|
|
|
|
|
|
|
goto not_there; |
1651
|
|
|
|
|
|
|
#endif |
1652
|
|
|
|
|
|
|
|
1653
|
|
|
|
|
|
|
} |
1654
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_SET_WF", 12)) { |
1655
|
|
|
|
|
|
|
/* D */ |
1656
|
|
|
|
|
|
|
|
1657
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_SET_WFD |
1658
|
1
|
|
|
|
|
|
return SSL_F_SSL_SET_WFD; |
1659
|
|
|
|
|
|
|
#else |
1660
|
|
|
|
|
|
|
goto not_there; |
1661
|
|
|
|
|
|
|
#endif |
1662
|
|
|
|
|
|
|
|
1663
|
|
|
|
|
|
|
} |
1664
|
0
|
|
|
|
|
|
break; |
1665
|
|
|
|
|
|
|
case 'E': |
1666
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "GEN_OTHERNAM", 12)) { |
1667
|
|
|
|
|
|
|
/* E */ |
1668
|
|
|
|
|
|
|
|
1669
|
|
|
|
|
|
|
#ifdef GEN_OTHERNAME |
1670
|
2
|
|
|
|
|
|
return GEN_OTHERNAME; |
1671
|
|
|
|
|
|
|
#else |
1672
|
|
|
|
|
|
|
goto not_there; |
1673
|
|
|
|
|
|
|
#endif |
1674
|
|
|
|
|
|
|
|
1675
|
|
|
|
|
|
|
} |
1676
|
0
|
|
|
|
|
|
break; |
1677
|
|
|
|
|
|
|
case 'G': |
1678
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "MBSTRING_FLA", 12)) { |
1679
|
|
|
|
|
|
|
/* G */ |
1680
|
|
|
|
|
|
|
|
1681
|
|
|
|
|
|
|
#ifdef MBSTRING_FLAG |
1682
|
1
|
|
|
|
|
|
return MBSTRING_FLAG; |
1683
|
|
|
|
|
|
|
#else |
1684
|
|
|
|
|
|
|
goto not_there; |
1685
|
|
|
|
|
|
|
#endif |
1686
|
|
|
|
|
|
|
|
1687
|
|
|
|
|
|
|
} |
1688
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_TLS_D5_BU", 12)) { |
1689
|
|
|
|
|
|
|
/* G */ |
1690
|
|
|
|
|
|
|
|
1691
|
|
|
|
|
|
|
#ifdef SSL_OP_TLS_D5_BUG |
1692
|
1
|
|
|
|
|
|
return SSL_OP_TLS_D5_BUG; |
1693
|
|
|
|
|
|
|
#else |
1694
|
|
|
|
|
|
|
goto not_there; |
1695
|
|
|
|
|
|
|
#endif |
1696
|
|
|
|
|
|
|
|
1697
|
|
|
|
|
|
|
} |
1698
|
0
|
|
|
|
|
|
break; |
1699
|
|
|
|
|
|
|
case 'L': |
1700
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_SYSCAL", 12)) { |
1701
|
|
|
|
|
|
|
/* L */ |
1702
|
|
|
|
|
|
|
|
1703
|
|
|
|
|
|
|
#ifdef SSL_ERROR_SYSCALL |
1704
|
2
|
|
|
|
|
|
return SSL_ERROR_SYSCALL; |
1705
|
|
|
|
|
|
|
#else |
1706
|
|
|
|
|
|
|
goto not_there; |
1707
|
|
|
|
|
|
|
#endif |
1708
|
|
|
|
|
|
|
|
1709
|
|
|
|
|
|
|
} |
1710
|
0
|
|
|
|
|
|
break; |
1711
|
|
|
|
|
|
|
case 'N': |
1712
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "SENT_SHUTDOW", 12)) { |
1713
|
|
|
|
|
|
|
/* N */ |
1714
|
|
|
|
|
|
|
|
1715
|
|
|
|
|
|
|
#ifdef SSL_SENT_SHUTDOWN |
1716
|
1
|
|
|
|
|
|
return SSL_SENT_SHUTDOWN; |
1717
|
|
|
|
|
|
|
#else |
1718
|
|
|
|
|
|
|
goto not_there; |
1719
|
|
|
|
|
|
|
#endif |
1720
|
|
|
|
|
|
|
|
1721
|
|
|
|
|
|
|
} |
1722
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_L", 12)) { |
1723
|
|
|
|
|
|
|
/* N */ |
1724
|
|
|
|
|
|
|
|
1725
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_LN |
1726
|
1
|
|
|
|
|
|
return XN_FLAG_FN_LN; |
1727
|
|
|
|
|
|
|
#else |
1728
|
|
|
|
|
|
|
goto not_there; |
1729
|
|
|
|
|
|
|
#endif |
1730
|
|
|
|
|
|
|
|
1731
|
|
|
|
|
|
|
} |
1732
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_S", 12)) { |
1733
|
|
|
|
|
|
|
/* N */ |
1734
|
|
|
|
|
|
|
|
1735
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_SN |
1736
|
1
|
|
|
|
|
|
return XN_FLAG_FN_SN; |
1737
|
|
|
|
|
|
|
#else |
1738
|
|
|
|
|
|
|
goto not_there; |
1739
|
|
|
|
|
|
|
#endif |
1740
|
|
|
|
|
|
|
|
1741
|
|
|
|
|
|
|
} |
1742
|
0
|
|
|
|
|
|
break; |
1743
|
|
|
|
|
|
|
case 'R': |
1744
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_ERRO", 12)) { |
1745
|
|
|
|
|
|
|
/* R */ |
1746
|
|
|
|
|
|
|
|
1747
|
|
|
|
|
|
|
#ifdef SSL2_MT_ERROR |
1748
|
1
|
|
|
|
|
|
return SSL2_MT_ERROR; |
1749
|
|
|
|
|
|
|
#else |
1750
|
|
|
|
|
|
|
goto not_there; |
1751
|
|
|
|
|
|
|
#endif |
1752
|
|
|
|
|
|
|
|
1753
|
|
|
|
|
|
|
} |
1754
|
0
|
|
|
|
|
|
break; |
1755
|
|
|
|
|
|
|
case 'S': |
1756
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "ASYNC_NO_JOB", 12)) { |
1757
|
|
|
|
|
|
|
/* S */ |
1758
|
|
|
|
|
|
|
|
1759
|
|
|
|
|
|
|
#ifdef SSL_ASYNC_NO_JOBS |
1760
|
|
|
|
|
|
|
return SSL_ASYNC_NO_JOBS; |
1761
|
|
|
|
|
|
|
#else |
1762
|
1
|
|
|
|
|
|
goto not_there; |
1763
|
|
|
|
|
|
|
#endif |
1764
|
|
|
|
|
|
|
|
1765
|
|
|
|
|
|
|
} |
1766
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SSLEAY_CFLAG", 12)) { |
1767
|
|
|
|
|
|
|
/* S */ |
1768
|
|
|
|
|
|
|
|
1769
|
|
|
|
|
|
|
#ifdef SSLEAY_CFLAGS |
1770
|
2
|
|
|
|
|
|
return SSLEAY_CFLAGS; |
1771
|
|
|
|
|
|
|
#else |
1772
|
|
|
|
|
|
|
goto not_there; |
1773
|
|
|
|
|
|
|
#endif |
1774
|
|
|
|
|
|
|
|
1775
|
|
|
|
|
|
|
} |
1776
|
0
|
|
|
|
|
|
break; |
1777
|
|
|
|
|
|
|
case 'T': |
1778
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "CB_READ_ALER", 12)) { |
1779
|
|
|
|
|
|
|
/* T */ |
1780
|
|
|
|
|
|
|
|
1781
|
|
|
|
|
|
|
#ifdef SSL_CB_READ_ALERT |
1782
|
2
|
|
|
|
|
|
return SSL_CB_READ_ALERT; |
1783
|
|
|
|
|
|
|
#else |
1784
|
|
|
|
|
|
|
goto not_there; |
1785
|
|
|
|
|
|
|
#endif |
1786
|
|
|
|
|
|
|
|
1787
|
|
|
|
|
|
|
} |
1788
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_ALER", 12)) { |
1789
|
|
|
|
|
|
|
/* T */ |
1790
|
|
|
|
|
|
|
|
1791
|
|
|
|
|
|
|
#ifdef SSL3_RT_ALERT |
1792
|
1
|
|
|
|
|
|
return SSL3_RT_ALERT; |
1793
|
|
|
|
|
|
|
#else |
1794
|
|
|
|
|
|
|
goto not_there; |
1795
|
|
|
|
|
|
|
#endif |
1796
|
|
|
|
|
|
|
|
1797
|
|
|
|
|
|
|
} |
1798
|
0
|
|
|
|
|
|
break; |
1799
|
|
|
|
|
|
|
case 'V': |
1800
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MBSTRING_UNI", 12)) { |
1801
|
|
|
|
|
|
|
/* V */ |
1802
|
|
|
|
|
|
|
|
1803
|
|
|
|
|
|
|
#ifdef MBSTRING_UNIV |
1804
|
1
|
|
|
|
|
|
return MBSTRING_UNIV; |
1805
|
|
|
|
|
|
|
#else |
1806
|
|
|
|
|
|
|
goto not_there; |
1807
|
|
|
|
|
|
|
#endif |
1808
|
|
|
|
|
|
|
|
1809
|
|
|
|
|
|
|
} |
1810
|
0
|
|
|
|
|
|
break; |
1811
|
|
|
|
|
|
|
case 'b': |
1812
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_cast5_ec", 12)) { |
1813
|
|
|
|
|
|
|
/* b */ |
1814
|
|
|
|
|
|
|
|
1815
|
|
|
|
|
|
|
#ifdef NID_cast5_ecb |
1816
|
1
|
|
|
|
|
|
return NID_cast5_ecb; |
1817
|
|
|
|
|
|
|
#else |
1818
|
|
|
|
|
|
|
goto not_there; |
1819
|
|
|
|
|
|
|
#endif |
1820
|
|
|
|
|
|
|
|
1821
|
|
|
|
|
|
|
} |
1822
|
0
|
|
|
|
|
|
break; |
1823
|
|
|
|
|
|
|
case 'c': |
1824
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_cast5_cb", 12)) { |
1825
|
|
|
|
|
|
|
/* c */ |
1826
|
|
|
|
|
|
|
|
1827
|
|
|
|
|
|
|
#ifdef NID_cast5_cbc |
1828
|
1
|
|
|
|
|
|
return NID_cast5_cbc; |
1829
|
|
|
|
|
|
|
#else |
1830
|
|
|
|
|
|
|
goto not_there; |
1831
|
|
|
|
|
|
|
#endif |
1832
|
|
|
|
|
|
|
|
1833
|
|
|
|
|
|
|
} |
1834
|
0
|
|
|
|
|
|
break; |
1835
|
|
|
|
|
|
|
case 'e': |
1836
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_givenNam", 12)) { |
1837
|
|
|
|
|
|
|
/* e */ |
1838
|
|
|
|
|
|
|
|
1839
|
|
|
|
|
|
|
#ifdef NID_givenName |
1840
|
1
|
|
|
|
|
|
return NID_givenName; |
1841
|
|
|
|
|
|
|
#else |
1842
|
|
|
|
|
|
|
goto not_there; |
1843
|
|
|
|
|
|
|
#endif |
1844
|
|
|
|
|
|
|
|
1845
|
|
|
|
|
|
|
} |
1846
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_key_usag", 12)) { |
1847
|
|
|
|
|
|
|
/* e */ |
1848
|
|
|
|
|
|
|
|
1849
|
|
|
|
|
|
|
#ifdef NID_key_usage |
1850
|
2
|
|
|
|
|
|
return NID_key_usage; |
1851
|
|
|
|
|
|
|
#else |
1852
|
|
|
|
|
|
|
goto not_there; |
1853
|
|
|
|
|
|
|
#endif |
1854
|
|
|
|
|
|
|
|
1855
|
|
|
|
|
|
|
} |
1856
|
0
|
|
|
|
|
|
break; |
1857
|
|
|
|
|
|
|
case 'g': |
1858
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_secretBa", 12)) { |
1859
|
|
|
|
|
|
|
/* g */ |
1860
|
|
|
|
|
|
|
|
1861
|
|
|
|
|
|
|
#ifdef NID_secretBag |
1862
|
1
|
|
|
|
|
|
return NID_secretBag; |
1863
|
|
|
|
|
|
|
#else |
1864
|
|
|
|
|
|
|
goto not_there; |
1865
|
|
|
|
|
|
|
#endif |
1866
|
|
|
|
|
|
|
|
1867
|
|
|
|
|
|
|
} |
1868
|
0
|
|
|
|
|
|
break; |
1869
|
|
|
|
|
|
|
case 'l': |
1870
|
13
|
100
|
|
|
|
|
if (!memcmp(name, "NID_delta_cr", 12)) { |
1871
|
|
|
|
|
|
|
/* l */ |
1872
|
|
|
|
|
|
|
|
1873
|
|
|
|
|
|
|
#ifdef NID_delta_crl |
1874
|
1
|
|
|
|
|
|
return NID_delta_crl; |
1875
|
|
|
|
|
|
|
#else |
1876
|
|
|
|
|
|
|
goto not_there; |
1877
|
|
|
|
|
|
|
#endif |
1878
|
|
|
|
|
|
|
|
1879
|
|
|
|
|
|
|
} |
1880
|
12
|
|
|
|
|
|
break; |
1881
|
|
|
|
|
|
|
case 'm': |
1882
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_algorith", 12)) { |
1883
|
|
|
|
|
|
|
/* m */ |
1884
|
|
|
|
|
|
|
|
1885
|
|
|
|
|
|
|
#ifdef NID_algorithm |
1886
|
1
|
|
|
|
|
|
return NID_algorithm; |
1887
|
|
|
|
|
|
|
#else |
1888
|
|
|
|
|
|
|
goto not_there; |
1889
|
|
|
|
|
|
|
#endif |
1890
|
|
|
|
|
|
|
|
1891
|
|
|
|
|
|
|
} |
1892
|
0
|
|
|
|
|
|
break; |
1893
|
|
|
|
|
|
|
case 'n': |
1894
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_OCSP_sig", 12)) { |
1895
|
|
|
|
|
|
|
/* n */ |
1896
|
|
|
|
|
|
|
|
1897
|
|
|
|
|
|
|
#ifdef NID_OCSP_sign |
1898
|
1
|
|
|
|
|
|
return NID_OCSP_sign; |
1899
|
|
|
|
|
|
|
#else |
1900
|
|
|
|
|
|
|
goto not_there; |
1901
|
|
|
|
|
|
|
#endif |
1902
|
|
|
|
|
|
|
|
1903
|
|
|
|
|
|
|
} |
1904
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_code_sig", 12)) { |
1905
|
|
|
|
|
|
|
/* n */ |
1906
|
|
|
|
|
|
|
|
1907
|
|
|
|
|
|
|
#ifdef NID_code_sign |
1908
|
1
|
|
|
|
|
|
return NID_code_sign; |
1909
|
|
|
|
|
|
|
#else |
1910
|
|
|
|
|
|
|
goto not_there; |
1911
|
|
|
|
|
|
|
#endif |
1912
|
|
|
|
|
|
|
|
1913
|
|
|
|
|
|
|
} |
1914
|
0
|
|
|
|
|
|
break; |
1915
|
|
|
|
|
|
|
case 's': |
1916
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_id_qt_cp", 12)) { |
1917
|
|
|
|
|
|
|
/* s */ |
1918
|
|
|
|
|
|
|
|
1919
|
|
|
|
|
|
|
#ifdef NID_id_qt_cps |
1920
|
1
|
|
|
|
|
|
return NID_id_qt_cps; |
1921
|
|
|
|
|
|
|
#else |
1922
|
|
|
|
|
|
|
goto not_there; |
1923
|
|
|
|
|
|
|
#endif |
1924
|
|
|
|
|
|
|
|
1925
|
|
|
|
|
|
|
} |
1926
|
0
|
|
|
|
|
|
break; |
1927
|
|
|
|
|
|
|
} |
1928
|
12
|
|
|
|
|
|
break; |
1929
|
|
|
|
|
|
|
case 14: |
1930
|
|
|
|
|
|
|
/* Names all of length 14. */ |
1931
|
|
|
|
|
|
|
/* CB_ACCEPT_EXIT CB_ACCEPT_LOOP CB_WRITE_ALERT F_CLIENT_HELLO |
1932
|
|
|
|
|
|
|
F_SERVER_HELLO F_SSL_CERT_NEW NID_commonName NID_crl_number |
1933
|
|
|
|
|
|
|
NID_crl_reason NID_dsaWithSHA NID_idea_cfb64 NID_idea_ofb64 |
1934
|
|
|
|
|
|
|
NID_localKeyID NID_md5WithRSA NID_ms_ext_req NID_pkcs7_data |
1935
|
|
|
|
|
|
|
NID_rc2_40_cbc NID_rc2_64_cbc NID_time_stamp OPENSSL_CFLAGS |
1936
|
|
|
|
|
|
|
OP_ENABLE_KTLS OP_NO_SSL_MASK R_BAD_CHECKSUM R_NO_PUBLICKEY |
1937
|
|
|
|
|
|
|
R_NULL_SSL_CTX SESS_CACHE_OFF SSL3_RT_HEADER SSLEAY_VERSION |
1938
|
|
|
|
|
|
|
ST_READ_HEADER TLS1_1_VERSION TLS1_2_VERSION TLS1_3_VERSION |
1939
|
|
|
|
|
|
|
X509_TRUST_TSA XN_FLAG_COMPAT XN_FLAG_DN_REV XN_FLAG_FN_OID |
1940
|
|
|
|
|
|
|
XN_FLAG_SPC_EQ */ |
1941
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
1942
|
87
|
|
|
|
|
|
switch (name[13]) { |
1943
|
|
|
|
|
|
|
case '4': |
1944
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_idea_cfb6", 13)) { |
1945
|
|
|
|
|
|
|
/* 4 */ |
1946
|
|
|
|
|
|
|
|
1947
|
|
|
|
|
|
|
#ifdef NID_idea_cfb64 |
1948
|
1
|
|
|
|
|
|
return NID_idea_cfb64; |
1949
|
|
|
|
|
|
|
#else |
1950
|
|
|
|
|
|
|
goto not_there; |
1951
|
|
|
|
|
|
|
#endif |
1952
|
|
|
|
|
|
|
|
1953
|
|
|
|
|
|
|
} |
1954
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_idea_ofb6", 13)) { |
1955
|
|
|
|
|
|
|
/* 4 */ |
1956
|
|
|
|
|
|
|
|
1957
|
|
|
|
|
|
|
#ifdef NID_idea_ofb64 |
1958
|
1
|
|
|
|
|
|
return NID_idea_ofb64; |
1959
|
|
|
|
|
|
|
#else |
1960
|
|
|
|
|
|
|
goto not_there; |
1961
|
|
|
|
|
|
|
#endif |
1962
|
|
|
|
|
|
|
|
1963
|
|
|
|
|
|
|
} |
1964
|
0
|
|
|
|
|
|
break; |
1965
|
|
|
|
|
|
|
case 'A': |
1966
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_dsaWithSH", 13)) { |
1967
|
|
|
|
|
|
|
/* A */ |
1968
|
|
|
|
|
|
|
|
1969
|
|
|
|
|
|
|
#ifdef NID_dsaWithSHA |
1970
|
1
|
|
|
|
|
|
return NID_dsaWithSHA; |
1971
|
|
|
|
|
|
|
#else |
1972
|
|
|
|
|
|
|
goto not_there; |
1973
|
|
|
|
|
|
|
#endif |
1974
|
|
|
|
|
|
|
|
1975
|
|
|
|
|
|
|
} |
1976
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_md5WithRS", 13)) { |
1977
|
|
|
|
|
|
|
/* A */ |
1978
|
|
|
|
|
|
|
|
1979
|
|
|
|
|
|
|
#ifdef NID_md5WithRSA |
1980
|
1
|
|
|
|
|
|
return NID_md5WithRSA; |
1981
|
|
|
|
|
|
|
#else |
1982
|
|
|
|
|
|
|
goto not_there; |
1983
|
|
|
|
|
|
|
#endif |
1984
|
|
|
|
|
|
|
|
1985
|
|
|
|
|
|
|
} |
1986
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_TS", 13)) { |
1987
|
|
|
|
|
|
|
/* A */ |
1988
|
|
|
|
|
|
|
|
1989
|
|
|
|
|
|
|
#ifdef X509_TRUST_TSA |
1990
|
1
|
|
|
|
|
|
return X509_TRUST_TSA; |
1991
|
|
|
|
|
|
|
#else |
1992
|
|
|
|
|
|
|
goto not_there; |
1993
|
|
|
|
|
|
|
#endif |
1994
|
|
|
|
|
|
|
|
1995
|
|
|
|
|
|
|
} |
1996
|
0
|
|
|
|
|
|
break; |
1997
|
|
|
|
|
|
|
case 'D': |
1998
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_localKeyI", 13)) { |
1999
|
|
|
|
|
|
|
/* D */ |
2000
|
|
|
|
|
|
|
|
2001
|
|
|
|
|
|
|
#ifdef NID_localKeyID |
2002
|
1
|
|
|
|
|
|
return NID_localKeyID; |
2003
|
|
|
|
|
|
|
#else |
2004
|
|
|
|
|
|
|
goto not_there; |
2005
|
|
|
|
|
|
|
#endif |
2006
|
|
|
|
|
|
|
|
2007
|
|
|
|
|
|
|
} |
2008
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_OI", 13)) { |
2009
|
|
|
|
|
|
|
/* D */ |
2010
|
|
|
|
|
|
|
|
2011
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_OID |
2012
|
1
|
|
|
|
|
|
return XN_FLAG_FN_OID; |
2013
|
|
|
|
|
|
|
#else |
2014
|
|
|
|
|
|
|
goto not_there; |
2015
|
|
|
|
|
|
|
#endif |
2016
|
|
|
|
|
|
|
|
2017
|
|
|
|
|
|
|
} |
2018
|
0
|
|
|
|
|
|
break; |
2019
|
|
|
|
|
|
|
case 'F': |
2020
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_OF", 13)) { |
2021
|
|
|
|
|
|
|
/* F */ |
2022
|
|
|
|
|
|
|
|
2023
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_OFF |
2024
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_OFF; |
2025
|
|
|
|
|
|
|
#else |
2026
|
|
|
|
|
|
|
goto not_there; |
2027
|
|
|
|
|
|
|
#endif |
2028
|
|
|
|
|
|
|
|
2029
|
|
|
|
|
|
|
} |
2030
|
0
|
|
|
|
|
|
break; |
2031
|
|
|
|
|
|
|
case 'K': |
2032
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_SSL_MAS", 13)) { |
2033
|
|
|
|
|
|
|
/* K */ |
2034
|
|
|
|
|
|
|
|
2035
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_SSL_MASK |
2036
|
1
|
|
|
|
|
|
return SSL_OP_NO_SSL_MASK; |
2037
|
|
|
|
|
|
|
#else |
2038
|
|
|
|
|
|
|
goto not_there; |
2039
|
|
|
|
|
|
|
#endif |
2040
|
|
|
|
|
|
|
|
2041
|
|
|
|
|
|
|
} |
2042
|
0
|
|
|
|
|
|
break; |
2043
|
|
|
|
|
|
|
case 'M': |
2044
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_CHECKSU", 13)) { |
2045
|
|
|
|
|
|
|
/* M */ |
2046
|
|
|
|
|
|
|
|
2047
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_CHECKSUM |
2048
|
1
|
|
|
|
|
|
return SSL_R_BAD_CHECKSUM; |
2049
|
|
|
|
|
|
|
#else |
2050
|
|
|
|
|
|
|
goto not_there; |
2051
|
|
|
|
|
|
|
#endif |
2052
|
|
|
|
|
|
|
|
2053
|
|
|
|
|
|
|
} |
2054
|
0
|
|
|
|
|
|
break; |
2055
|
|
|
|
|
|
|
case 'N': |
2056
|
49
|
100
|
|
|
|
|
if (!memcmp(name, "SSLEAY_VERSIO", 13)) { |
2057
|
|
|
|
|
|
|
/* N */ |
2058
|
|
|
|
|
|
|
|
2059
|
|
|
|
|
|
|
#ifdef SSLEAY_VERSION |
2060
|
4
|
|
|
|
|
|
return SSLEAY_VERSION; |
2061
|
|
|
|
|
|
|
#else |
2062
|
|
|
|
|
|
|
goto not_there; |
2063
|
|
|
|
|
|
|
#endif |
2064
|
|
|
|
|
|
|
|
2065
|
|
|
|
|
|
|
} |
2066
|
45
|
100
|
|
|
|
|
if (!memcmp(name, "TLS1_1_VERSIO", 13)) { |
2067
|
|
|
|
|
|
|
/* N */ |
2068
|
|
|
|
|
|
|
|
2069
|
|
|
|
|
|
|
#ifdef TLS1_1_VERSION |
2070
|
1
|
|
|
|
|
|
return TLS1_1_VERSION; |
2071
|
|
|
|
|
|
|
#else |
2072
|
|
|
|
|
|
|
goto not_there; |
2073
|
|
|
|
|
|
|
#endif |
2074
|
|
|
|
|
|
|
|
2075
|
|
|
|
|
|
|
} |
2076
|
44
|
100
|
|
|
|
|
if (!memcmp(name, "TLS1_2_VERSIO", 13)) { |
2077
|
|
|
|
|
|
|
/* N */ |
2078
|
|
|
|
|
|
|
|
2079
|
|
|
|
|
|
|
#ifdef TLS1_2_VERSION |
2080
|
2
|
|
|
|
|
|
return TLS1_2_VERSION; |
2081
|
|
|
|
|
|
|
#else |
2082
|
|
|
|
|
|
|
goto not_there; |
2083
|
|
|
|
|
|
|
#endif |
2084
|
|
|
|
|
|
|
|
2085
|
|
|
|
|
|
|
} |
2086
|
42
|
50
|
|
|
|
|
if (!memcmp(name, "TLS1_3_VERSIO", 13)) { |
2087
|
|
|
|
|
|
|
/* N */ |
2088
|
|
|
|
|
|
|
|
2089
|
|
|
|
|
|
|
#ifdef TLS1_3_VERSION |
2090
|
|
|
|
|
|
|
return TLS1_3_VERSION; |
2091
|
|
|
|
|
|
|
#else |
2092
|
42
|
|
|
|
|
|
goto not_there; |
2093
|
|
|
|
|
|
|
#endif |
2094
|
|
|
|
|
|
|
|
2095
|
|
|
|
|
|
|
} |
2096
|
0
|
|
|
|
|
|
break; |
2097
|
|
|
|
|
|
|
case 'O': |
2098
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_CLIENT_HELL", 13)) { |
2099
|
|
|
|
|
|
|
/* O */ |
2100
|
|
|
|
|
|
|
|
2101
|
|
|
|
|
|
|
#ifdef SSL_F_CLIENT_HELLO |
2102
|
1
|
|
|
|
|
|
return SSL_F_CLIENT_HELLO; |
2103
|
|
|
|
|
|
|
#else |
2104
|
|
|
|
|
|
|
goto not_there; |
2105
|
|
|
|
|
|
|
#endif |
2106
|
|
|
|
|
|
|
|
2107
|
|
|
|
|
|
|
} |
2108
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SERVER_HELL", 13)) { |
2109
|
|
|
|
|
|
|
/* O */ |
2110
|
|
|
|
|
|
|
|
2111
|
|
|
|
|
|
|
#ifdef SSL_F_SERVER_HELLO |
2112
|
1
|
|
|
|
|
|
return SSL_F_SERVER_HELLO; |
2113
|
|
|
|
|
|
|
#else |
2114
|
|
|
|
|
|
|
goto not_there; |
2115
|
|
|
|
|
|
|
#endif |
2116
|
|
|
|
|
|
|
|
2117
|
|
|
|
|
|
|
} |
2118
|
0
|
|
|
|
|
|
break; |
2119
|
|
|
|
|
|
|
case 'P': |
2120
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "CB_ACCEPT_LOO", 13)) { |
2121
|
|
|
|
|
|
|
/* P */ |
2122
|
|
|
|
|
|
|
|
2123
|
|
|
|
|
|
|
#ifdef SSL_CB_ACCEPT_LOOP |
2124
|
2
|
|
|
|
|
|
return SSL_CB_ACCEPT_LOOP; |
2125
|
|
|
|
|
|
|
#else |
2126
|
|
|
|
|
|
|
goto not_there; |
2127
|
|
|
|
|
|
|
#endif |
2128
|
|
|
|
|
|
|
|
2129
|
|
|
|
|
|
|
} |
2130
|
0
|
|
|
|
|
|
break; |
2131
|
|
|
|
|
|
|
case 'Q': |
2132
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SPC_E", 13)) { |
2133
|
|
|
|
|
|
|
/* Q */ |
2134
|
|
|
|
|
|
|
|
2135
|
|
|
|
|
|
|
#ifdef XN_FLAG_SPC_EQ |
2136
|
1
|
|
|
|
|
|
return XN_FLAG_SPC_EQ; |
2137
|
|
|
|
|
|
|
#else |
2138
|
|
|
|
|
|
|
goto not_there; |
2139
|
|
|
|
|
|
|
#endif |
2140
|
|
|
|
|
|
|
|
2141
|
|
|
|
|
|
|
} |
2142
|
0
|
|
|
|
|
|
break; |
2143
|
|
|
|
|
|
|
case 'R': |
2144
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_HEADE", 13)) { |
2145
|
|
|
|
|
|
|
/* R */ |
2146
|
|
|
|
|
|
|
|
2147
|
|
|
|
|
|
|
#ifdef SSL3_RT_HEADER |
2148
|
1
|
|
|
|
|
|
return SSL3_RT_HEADER; |
2149
|
|
|
|
|
|
|
#else |
2150
|
|
|
|
|
|
|
goto not_there; |
2151
|
|
|
|
|
|
|
#endif |
2152
|
|
|
|
|
|
|
|
2153
|
|
|
|
|
|
|
} |
2154
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ST_READ_HEADE", 13)) { |
2155
|
|
|
|
|
|
|
/* R */ |
2156
|
|
|
|
|
|
|
|
2157
|
|
|
|
|
|
|
#ifdef SSL_ST_READ_HEADER |
2158
|
1
|
|
|
|
|
|
return SSL_ST_READ_HEADER; |
2159
|
|
|
|
|
|
|
#else |
2160
|
|
|
|
|
|
|
goto not_there; |
2161
|
|
|
|
|
|
|
#endif |
2162
|
|
|
|
|
|
|
|
2163
|
|
|
|
|
|
|
} |
2164
|
0
|
|
|
|
|
|
break; |
2165
|
|
|
|
|
|
|
case 'S': |
2166
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_CFLAG", 13)) { |
2167
|
|
|
|
|
|
|
/* S */ |
2168
|
|
|
|
|
|
|
|
2169
|
|
|
|
|
|
|
#ifdef OPENSSL_CFLAGS |
2170
|
|
|
|
|
|
|
return OPENSSL_CFLAGS; |
2171
|
|
|
|
|
|
|
#else |
2172
|
1
|
|
|
|
|
|
goto not_there; |
2173
|
|
|
|
|
|
|
#endif |
2174
|
|
|
|
|
|
|
|
2175
|
|
|
|
|
|
|
} |
2176
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_ENABLE_KTL", 13)) { |
2177
|
|
|
|
|
|
|
/* S */ |
2178
|
|
|
|
|
|
|
|
2179
|
|
|
|
|
|
|
#ifdef SSL_OP_ENABLE_KTLS |
2180
|
|
|
|
|
|
|
return SSL_OP_ENABLE_KTLS; |
2181
|
|
|
|
|
|
|
#else |
2182
|
1
|
|
|
|
|
|
goto not_there; |
2183
|
|
|
|
|
|
|
#endif |
2184
|
|
|
|
|
|
|
|
2185
|
|
|
|
|
|
|
} |
2186
|
0
|
|
|
|
|
|
break; |
2187
|
|
|
|
|
|
|
case 'T': |
2188
|
5
|
100
|
|
|
|
|
if (!memcmp(name, "CB_ACCEPT_EXI", 13)) { |
2189
|
|
|
|
|
|
|
/* T */ |
2190
|
|
|
|
|
|
|
|
2191
|
|
|
|
|
|
|
#ifdef SSL_CB_ACCEPT_EXIT |
2192
|
2
|
|
|
|
|
|
return SSL_CB_ACCEPT_EXIT; |
2193
|
|
|
|
|
|
|
#else |
2194
|
|
|
|
|
|
|
goto not_there; |
2195
|
|
|
|
|
|
|
#endif |
2196
|
|
|
|
|
|
|
|
2197
|
|
|
|
|
|
|
} |
2198
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "CB_WRITE_ALER", 13)) { |
2199
|
|
|
|
|
|
|
/* T */ |
2200
|
|
|
|
|
|
|
|
2201
|
|
|
|
|
|
|
#ifdef SSL_CB_WRITE_ALERT |
2202
|
2
|
|
|
|
|
|
return SSL_CB_WRITE_ALERT; |
2203
|
|
|
|
|
|
|
#else |
2204
|
|
|
|
|
|
|
goto not_there; |
2205
|
|
|
|
|
|
|
#endif |
2206
|
|
|
|
|
|
|
|
2207
|
|
|
|
|
|
|
} |
2208
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_COMPA", 13)) { |
2209
|
|
|
|
|
|
|
/* T */ |
2210
|
|
|
|
|
|
|
|
2211
|
|
|
|
|
|
|
#ifdef XN_FLAG_COMPAT |
2212
|
1
|
|
|
|
|
|
return XN_FLAG_COMPAT; |
2213
|
|
|
|
|
|
|
#else |
2214
|
|
|
|
|
|
|
goto not_there; |
2215
|
|
|
|
|
|
|
#endif |
2216
|
|
|
|
|
|
|
|
2217
|
|
|
|
|
|
|
} |
2218
|
0
|
|
|
|
|
|
break; |
2219
|
|
|
|
|
|
|
case 'V': |
2220
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_DN_RE", 13)) { |
2221
|
|
|
|
|
|
|
/* V */ |
2222
|
|
|
|
|
|
|
|
2223
|
|
|
|
|
|
|
#ifdef XN_FLAG_DN_REV |
2224
|
1
|
|
|
|
|
|
return XN_FLAG_DN_REV; |
2225
|
|
|
|
|
|
|
#else |
2226
|
|
|
|
|
|
|
goto not_there; |
2227
|
|
|
|
|
|
|
#endif |
2228
|
|
|
|
|
|
|
|
2229
|
|
|
|
|
|
|
} |
2230
|
0
|
|
|
|
|
|
break; |
2231
|
|
|
|
|
|
|
case 'W': |
2232
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_CERT_NE", 13)) { |
2233
|
|
|
|
|
|
|
/* W */ |
2234
|
|
|
|
|
|
|
|
2235
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_CERT_NEW |
2236
|
1
|
|
|
|
|
|
return SSL_F_SSL_CERT_NEW; |
2237
|
|
|
|
|
|
|
#else |
2238
|
|
|
|
|
|
|
goto not_there; |
2239
|
|
|
|
|
|
|
#endif |
2240
|
|
|
|
|
|
|
|
2241
|
|
|
|
|
|
|
} |
2242
|
0
|
|
|
|
|
|
break; |
2243
|
|
|
|
|
|
|
case 'X': |
2244
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NULL_SSL_CT", 13)) { |
2245
|
|
|
|
|
|
|
/* X */ |
2246
|
|
|
|
|
|
|
|
2247
|
|
|
|
|
|
|
#ifdef SSL_R_NULL_SSL_CTX |
2248
|
1
|
|
|
|
|
|
return SSL_R_NULL_SSL_CTX; |
2249
|
|
|
|
|
|
|
#else |
2250
|
|
|
|
|
|
|
goto not_there; |
2251
|
|
|
|
|
|
|
#endif |
2252
|
|
|
|
|
|
|
|
2253
|
|
|
|
|
|
|
} |
2254
|
0
|
|
|
|
|
|
break; |
2255
|
|
|
|
|
|
|
case 'Y': |
2256
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_PUBLICKE", 13)) { |
2257
|
|
|
|
|
|
|
/* Y */ |
2258
|
|
|
|
|
|
|
|
2259
|
|
|
|
|
|
|
#ifdef SSL_R_NO_PUBLICKEY |
2260
|
1
|
|
|
|
|
|
return SSL_R_NO_PUBLICKEY; |
2261
|
|
|
|
|
|
|
#else |
2262
|
|
|
|
|
|
|
goto not_there; |
2263
|
|
|
|
|
|
|
#endif |
2264
|
|
|
|
|
|
|
|
2265
|
|
|
|
|
|
|
} |
2266
|
0
|
|
|
|
|
|
break; |
2267
|
|
|
|
|
|
|
case 'a': |
2268
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_dat", 13)) { |
2269
|
|
|
|
|
|
|
/* a */ |
2270
|
|
|
|
|
|
|
|
2271
|
|
|
|
|
|
|
#ifdef NID_pkcs7_data |
2272
|
1
|
|
|
|
|
|
return NID_pkcs7_data; |
2273
|
|
|
|
|
|
|
#else |
2274
|
|
|
|
|
|
|
goto not_there; |
2275
|
|
|
|
|
|
|
#endif |
2276
|
|
|
|
|
|
|
|
2277
|
|
|
|
|
|
|
} |
2278
|
0
|
|
|
|
|
|
break; |
2279
|
|
|
|
|
|
|
case 'c': |
2280
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_rc2_40_cb", 13)) { |
2281
|
|
|
|
|
|
|
/* c */ |
2282
|
|
|
|
|
|
|
|
2283
|
|
|
|
|
|
|
#ifdef NID_rc2_40_cbc |
2284
|
1
|
|
|
|
|
|
return NID_rc2_40_cbc; |
2285
|
|
|
|
|
|
|
#else |
2286
|
|
|
|
|
|
|
goto not_there; |
2287
|
|
|
|
|
|
|
#endif |
2288
|
|
|
|
|
|
|
|
2289
|
|
|
|
|
|
|
} |
2290
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rc2_64_cb", 13)) { |
2291
|
|
|
|
|
|
|
/* c */ |
2292
|
|
|
|
|
|
|
|
2293
|
|
|
|
|
|
|
#ifdef NID_rc2_64_cbc |
2294
|
1
|
|
|
|
|
|
return NID_rc2_64_cbc; |
2295
|
|
|
|
|
|
|
#else |
2296
|
|
|
|
|
|
|
goto not_there; |
2297
|
|
|
|
|
|
|
#endif |
2298
|
|
|
|
|
|
|
|
2299
|
|
|
|
|
|
|
} |
2300
|
0
|
|
|
|
|
|
break; |
2301
|
|
|
|
|
|
|
case 'e': |
2302
|
3
|
50
|
|
|
|
|
if (!memcmp(name, "NID_commonNam", 13)) { |
2303
|
|
|
|
|
|
|
/* e */ |
2304
|
|
|
|
|
|
|
|
2305
|
|
|
|
|
|
|
#ifdef NID_commonName |
2306
|
3
|
|
|
|
|
|
return NID_commonName; |
2307
|
|
|
|
|
|
|
#else |
2308
|
|
|
|
|
|
|
goto not_there; |
2309
|
|
|
|
|
|
|
#endif |
2310
|
|
|
|
|
|
|
|
2311
|
|
|
|
|
|
|
} |
2312
|
0
|
|
|
|
|
|
break; |
2313
|
|
|
|
|
|
|
case 'n': |
2314
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_crl_reaso", 13)) { |
2315
|
|
|
|
|
|
|
/* n */ |
2316
|
|
|
|
|
|
|
|
2317
|
|
|
|
|
|
|
#ifdef NID_crl_reason |
2318
|
1
|
|
|
|
|
|
return NID_crl_reason; |
2319
|
|
|
|
|
|
|
#else |
2320
|
|
|
|
|
|
|
goto not_there; |
2321
|
|
|
|
|
|
|
#endif |
2322
|
|
|
|
|
|
|
|
2323
|
|
|
|
|
|
|
} |
2324
|
0
|
|
|
|
|
|
break; |
2325
|
|
|
|
|
|
|
case 'p': |
2326
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_time_stam", 13)) { |
2327
|
|
|
|
|
|
|
/* p */ |
2328
|
|
|
|
|
|
|
|
2329
|
|
|
|
|
|
|
#ifdef NID_time_stamp |
2330
|
1
|
|
|
|
|
|
return NID_time_stamp; |
2331
|
|
|
|
|
|
|
#else |
2332
|
|
|
|
|
|
|
goto not_there; |
2333
|
|
|
|
|
|
|
#endif |
2334
|
|
|
|
|
|
|
|
2335
|
|
|
|
|
|
|
} |
2336
|
0
|
|
|
|
|
|
break; |
2337
|
|
|
|
|
|
|
case 'q': |
2338
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ms_ext_re", 13)) { |
2339
|
|
|
|
|
|
|
/* q */ |
2340
|
|
|
|
|
|
|
|
2341
|
|
|
|
|
|
|
#ifdef NID_ms_ext_req |
2342
|
1
|
|
|
|
|
|
return NID_ms_ext_req; |
2343
|
|
|
|
|
|
|
#else |
2344
|
|
|
|
|
|
|
goto not_there; |
2345
|
|
|
|
|
|
|
#endif |
2346
|
|
|
|
|
|
|
|
2347
|
|
|
|
|
|
|
} |
2348
|
0
|
|
|
|
|
|
break; |
2349
|
|
|
|
|
|
|
case 'r': |
2350
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_crl_numbe", 13)) { |
2351
|
|
|
|
|
|
|
/* r */ |
2352
|
|
|
|
|
|
|
|
2353
|
|
|
|
|
|
|
#ifdef NID_crl_number |
2354
|
1
|
|
|
|
|
|
return NID_crl_number; |
2355
|
|
|
|
|
|
|
#else |
2356
|
|
|
|
|
|
|
goto not_there; |
2357
|
|
|
|
|
|
|
#endif |
2358
|
|
|
|
|
|
|
|
2359
|
|
|
|
|
|
|
} |
2360
|
0
|
|
|
|
|
|
break; |
2361
|
|
|
|
|
|
|
} |
2362
|
0
|
|
|
|
|
|
break; |
2363
|
|
|
|
|
|
|
case 15: |
2364
|
|
|
|
|
|
|
/* Names all of length 15. */ |
2365
|
|
|
|
|
|
|
/* CB_CONNECT_EXIT CB_CONNECT_LOOP CLIENT_HELLO_CB ERROR_WANT_READ |
2366
|
|
|
|
|
|
|
F_WRITE_PENDING MODE_AUTO_RETRY NID_cast5_cfb64 NID_cast5_ofb64 |
2367
|
|
|
|
|
|
|
NID_client_auth NID_countryName NID_des_ede_cbc NID_description |
2368
|
|
|
|
|
|
|
NID_dnQualifier NID_dsaWithSHA1 NID_info_access NID_mdc2WithRSA |
2369
|
|
|
|
|
|
|
NID_ms_code_com NID_ms_code_ind NID_ms_ctl_sign NID_server_auth |
2370
|
|
|
|
|
|
|
NID_sha1WithRSA OPENSSL_VERSION OP_NO_QUERY_MTU R_NO_PRIVATEKEY |
2371
|
|
|
|
|
|
|
R_UNKNOWN_STATE SESS_CACHE_BOTH SSLEAY_BUILT_ON SSLEAY_PLATFORM |
2372
|
|
|
|
|
|
|
XN_FLAG_FN_MASK XN_FLAG_FN_NONE XN_FLAG_ONELINE XN_FLAG_RFC2253 */ |
2373
|
|
|
|
|
|
|
/* Offset 14 gives the best switch position. */ |
2374
|
84
|
|
|
|
|
|
switch (name[14]) { |
2375
|
|
|
|
|
|
|
case '1': |
2376
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_dsaWithSHA", 14)) { |
2377
|
|
|
|
|
|
|
/* 1 */ |
2378
|
|
|
|
|
|
|
|
2379
|
|
|
|
|
|
|
#ifdef NID_dsaWithSHA1 |
2380
|
1
|
|
|
|
|
|
return NID_dsaWithSHA1; |
2381
|
|
|
|
|
|
|
#else |
2382
|
|
|
|
|
|
|
goto not_there; |
2383
|
|
|
|
|
|
|
#endif |
2384
|
|
|
|
|
|
|
|
2385
|
|
|
|
|
|
|
} |
2386
|
0
|
|
|
|
|
|
break; |
2387
|
|
|
|
|
|
|
case '3': |
2388
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_RFC225", 14)) { |
2389
|
|
|
|
|
|
|
/* 3 */ |
2390
|
|
|
|
|
|
|
|
2391
|
|
|
|
|
|
|
#ifdef XN_FLAG_RFC2253 |
2392
|
1
|
|
|
|
|
|
return XN_FLAG_RFC2253; |
2393
|
|
|
|
|
|
|
#else |
2394
|
|
|
|
|
|
|
goto not_there; |
2395
|
|
|
|
|
|
|
#endif |
2396
|
|
|
|
|
|
|
|
2397
|
|
|
|
|
|
|
} |
2398
|
0
|
|
|
|
|
|
break; |
2399
|
|
|
|
|
|
|
case '4': |
2400
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_cast5_cfb6", 14)) { |
2401
|
|
|
|
|
|
|
/* 4 */ |
2402
|
|
|
|
|
|
|
|
2403
|
|
|
|
|
|
|
#ifdef NID_cast5_cfb64 |
2404
|
1
|
|
|
|
|
|
return NID_cast5_cfb64; |
2405
|
|
|
|
|
|
|
#else |
2406
|
|
|
|
|
|
|
goto not_there; |
2407
|
|
|
|
|
|
|
#endif |
2408
|
|
|
|
|
|
|
|
2409
|
|
|
|
|
|
|
} |
2410
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_cast5_ofb6", 14)) { |
2411
|
|
|
|
|
|
|
/* 4 */ |
2412
|
|
|
|
|
|
|
|
2413
|
|
|
|
|
|
|
#ifdef NID_cast5_ofb64 |
2414
|
1
|
|
|
|
|
|
return NID_cast5_ofb64; |
2415
|
|
|
|
|
|
|
#else |
2416
|
|
|
|
|
|
|
goto not_there; |
2417
|
|
|
|
|
|
|
#endif |
2418
|
|
|
|
|
|
|
|
2419
|
|
|
|
|
|
|
} |
2420
|
0
|
|
|
|
|
|
break; |
2421
|
|
|
|
|
|
|
case 'A': |
2422
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_mdc2WithRS", 14)) { |
2423
|
|
|
|
|
|
|
/* A */ |
2424
|
|
|
|
|
|
|
|
2425
|
|
|
|
|
|
|
#ifdef NID_mdc2WithRSA |
2426
|
1
|
|
|
|
|
|
return NID_mdc2WithRSA; |
2427
|
|
|
|
|
|
|
#else |
2428
|
|
|
|
|
|
|
goto not_there; |
2429
|
|
|
|
|
|
|
#endif |
2430
|
|
|
|
|
|
|
|
2431
|
|
|
|
|
|
|
} |
2432
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_sha1WithRS", 14)) { |
2433
|
|
|
|
|
|
|
/* A */ |
2434
|
|
|
|
|
|
|
|
2435
|
|
|
|
|
|
|
#ifdef NID_sha1WithRSA |
2436
|
1
|
|
|
|
|
|
return NID_sha1WithRSA; |
2437
|
|
|
|
|
|
|
#else |
2438
|
|
|
|
|
|
|
goto not_there; |
2439
|
|
|
|
|
|
|
#endif |
2440
|
|
|
|
|
|
|
|
2441
|
|
|
|
|
|
|
} |
2442
|
0
|
|
|
|
|
|
break; |
2443
|
|
|
|
|
|
|
case 'B': |
2444
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "CLIENT_HELLO_C", 14)) { |
2445
|
|
|
|
|
|
|
/* B */ |
2446
|
|
|
|
|
|
|
|
2447
|
|
|
|
|
|
|
#ifdef SSL_CLIENT_HELLO_CB |
2448
|
|
|
|
|
|
|
return SSL_CLIENT_HELLO_CB; |
2449
|
|
|
|
|
|
|
#else |
2450
|
1
|
|
|
|
|
|
goto not_there; |
2451
|
|
|
|
|
|
|
#endif |
2452
|
|
|
|
|
|
|
|
2453
|
|
|
|
|
|
|
} |
2454
|
0
|
|
|
|
|
|
break; |
2455
|
|
|
|
|
|
|
case 'D': |
2456
|
8
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_REA", 14)) { |
2457
|
|
|
|
|
|
|
/* D */ |
2458
|
|
|
|
|
|
|
|
2459
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_READ |
2460
|
8
|
|
|
|
|
|
return SSL_ERROR_WANT_READ; |
2461
|
|
|
|
|
|
|
#else |
2462
|
|
|
|
|
|
|
goto not_there; |
2463
|
|
|
|
|
|
|
#endif |
2464
|
|
|
|
|
|
|
|
2465
|
|
|
|
|
|
|
} |
2466
|
0
|
|
|
|
|
|
break; |
2467
|
|
|
|
|
|
|
case 'E': |
2468
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "R_UNKNOWN_STAT", 14)) { |
2469
|
|
|
|
|
|
|
/* E */ |
2470
|
|
|
|
|
|
|
|
2471
|
|
|
|
|
|
|
#ifdef SSL_R_UNKNOWN_STATE |
2472
|
1
|
|
|
|
|
|
return SSL_R_UNKNOWN_STATE; |
2473
|
|
|
|
|
|
|
#else |
2474
|
|
|
|
|
|
|
goto not_there; |
2475
|
|
|
|
|
|
|
#endif |
2476
|
|
|
|
|
|
|
|
2477
|
|
|
|
|
|
|
} |
2478
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_NON", 14)) { |
2479
|
|
|
|
|
|
|
/* E */ |
2480
|
|
|
|
|
|
|
|
2481
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_NONE |
2482
|
1
|
|
|
|
|
|
return XN_FLAG_FN_NONE; |
2483
|
|
|
|
|
|
|
#else |
2484
|
|
|
|
|
|
|
goto not_there; |
2485
|
|
|
|
|
|
|
#endif |
2486
|
|
|
|
|
|
|
|
2487
|
|
|
|
|
|
|
} |
2488
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_ONELIN", 14)) { |
2489
|
|
|
|
|
|
|
/* E */ |
2490
|
|
|
|
|
|
|
|
2491
|
|
|
|
|
|
|
#ifdef XN_FLAG_ONELINE |
2492
|
1
|
|
|
|
|
|
return XN_FLAG_ONELINE; |
2493
|
|
|
|
|
|
|
#else |
2494
|
|
|
|
|
|
|
goto not_there; |
2495
|
|
|
|
|
|
|
#endif |
2496
|
|
|
|
|
|
|
|
2497
|
|
|
|
|
|
|
} |
2498
|
0
|
|
|
|
|
|
break; |
2499
|
|
|
|
|
|
|
case 'G': |
2500
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_WRITE_PENDIN", 14)) { |
2501
|
|
|
|
|
|
|
/* G */ |
2502
|
|
|
|
|
|
|
|
2503
|
|
|
|
|
|
|
#ifdef SSL_F_WRITE_PENDING |
2504
|
1
|
|
|
|
|
|
return SSL_F_WRITE_PENDING; |
2505
|
|
|
|
|
|
|
#else |
2506
|
|
|
|
|
|
|
goto not_there; |
2507
|
|
|
|
|
|
|
#endif |
2508
|
|
|
|
|
|
|
|
2509
|
|
|
|
|
|
|
} |
2510
|
0
|
|
|
|
|
|
break; |
2511
|
|
|
|
|
|
|
case 'H': |
2512
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_BOT", 14)) { |
2513
|
|
|
|
|
|
|
/* H */ |
2514
|
|
|
|
|
|
|
|
2515
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_BOTH |
2516
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_BOTH; |
2517
|
|
|
|
|
|
|
#else |
2518
|
|
|
|
|
|
|
goto not_there; |
2519
|
|
|
|
|
|
|
#endif |
2520
|
|
|
|
|
|
|
|
2521
|
|
|
|
|
|
|
} |
2522
|
0
|
|
|
|
|
|
break; |
2523
|
|
|
|
|
|
|
case 'K': |
2524
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_MAS", 14)) { |
2525
|
|
|
|
|
|
|
/* K */ |
2526
|
|
|
|
|
|
|
|
2527
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_MASK |
2528
|
1
|
|
|
|
|
|
return XN_FLAG_FN_MASK; |
2529
|
|
|
|
|
|
|
#else |
2530
|
|
|
|
|
|
|
goto not_there; |
2531
|
|
|
|
|
|
|
#endif |
2532
|
|
|
|
|
|
|
|
2533
|
|
|
|
|
|
|
} |
2534
|
0
|
|
|
|
|
|
break; |
2535
|
|
|
|
|
|
|
case 'M': |
2536
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SSLEAY_PLATFOR", 14)) { |
2537
|
|
|
|
|
|
|
/* M */ |
2538
|
|
|
|
|
|
|
|
2539
|
|
|
|
|
|
|
#ifdef SSLEAY_PLATFORM |
2540
|
2
|
|
|
|
|
|
return SSLEAY_PLATFORM; |
2541
|
|
|
|
|
|
|
#else |
2542
|
|
|
|
|
|
|
goto not_there; |
2543
|
|
|
|
|
|
|
#endif |
2544
|
|
|
|
|
|
|
|
2545
|
|
|
|
|
|
|
} |
2546
|
0
|
|
|
|
|
|
break; |
2547
|
|
|
|
|
|
|
case 'N': |
2548
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSIO", 14)) { |
2549
|
|
|
|
|
|
|
/* N */ |
2550
|
|
|
|
|
|
|
|
2551
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION |
2552
|
|
|
|
|
|
|
return OPENSSL_VERSION; |
2553
|
|
|
|
|
|
|
#else |
2554
|
1
|
|
|
|
|
|
goto not_there; |
2555
|
|
|
|
|
|
|
#endif |
2556
|
|
|
|
|
|
|
|
2557
|
|
|
|
|
|
|
} |
2558
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SSLEAY_BUILT_O", 14)) { |
2559
|
|
|
|
|
|
|
/* N */ |
2560
|
|
|
|
|
|
|
|
2561
|
|
|
|
|
|
|
#ifdef SSLEAY_BUILT_ON |
2562
|
2
|
|
|
|
|
|
return SSLEAY_BUILT_ON; |
2563
|
|
|
|
|
|
|
#else |
2564
|
|
|
|
|
|
|
goto not_there; |
2565
|
|
|
|
|
|
|
#endif |
2566
|
|
|
|
|
|
|
|
2567
|
|
|
|
|
|
|
} |
2568
|
0
|
|
|
|
|
|
break; |
2569
|
|
|
|
|
|
|
case 'P': |
2570
|
22
|
50
|
|
|
|
|
if (!memcmp(name, "CB_CONNECT_LOO", 14)) { |
2571
|
|
|
|
|
|
|
/* P */ |
2572
|
|
|
|
|
|
|
|
2573
|
|
|
|
|
|
|
#ifdef SSL_CB_CONNECT_LOOP |
2574
|
22
|
|
|
|
|
|
return SSL_CB_CONNECT_LOOP; |
2575
|
|
|
|
|
|
|
#else |
2576
|
|
|
|
|
|
|
goto not_there; |
2577
|
|
|
|
|
|
|
#endif |
2578
|
|
|
|
|
|
|
|
2579
|
|
|
|
|
|
|
} |
2580
|
0
|
|
|
|
|
|
break; |
2581
|
|
|
|
|
|
|
case 'T': |
2582
|
22
|
50
|
|
|
|
|
if (!memcmp(name, "CB_CONNECT_EXI", 14)) { |
2583
|
|
|
|
|
|
|
/* T */ |
2584
|
|
|
|
|
|
|
|
2585
|
|
|
|
|
|
|
#ifdef SSL_CB_CONNECT_EXIT |
2586
|
22
|
|
|
|
|
|
return SSL_CB_CONNECT_EXIT; |
2587
|
|
|
|
|
|
|
#else |
2588
|
|
|
|
|
|
|
goto not_there; |
2589
|
|
|
|
|
|
|
#endif |
2590
|
|
|
|
|
|
|
|
2591
|
|
|
|
|
|
|
} |
2592
|
0
|
|
|
|
|
|
break; |
2593
|
|
|
|
|
|
|
case 'U': |
2594
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_QUERY_MT", 14)) { |
2595
|
|
|
|
|
|
|
/* U */ |
2596
|
|
|
|
|
|
|
|
2597
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_QUERY_MTU |
2598
|
1
|
|
|
|
|
|
return SSL_OP_NO_QUERY_MTU; |
2599
|
|
|
|
|
|
|
#else |
2600
|
|
|
|
|
|
|
goto not_there; |
2601
|
|
|
|
|
|
|
#endif |
2602
|
|
|
|
|
|
|
|
2603
|
|
|
|
|
|
|
} |
2604
|
0
|
|
|
|
|
|
break; |
2605
|
|
|
|
|
|
|
case 'Y': |
2606
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "MODE_AUTO_RETR", 14)) { |
2607
|
|
|
|
|
|
|
/* Y */ |
2608
|
|
|
|
|
|
|
|
2609
|
|
|
|
|
|
|
#ifdef SSL_MODE_AUTO_RETRY |
2610
|
1
|
|
|
|
|
|
return SSL_MODE_AUTO_RETRY; |
2611
|
|
|
|
|
|
|
#else |
2612
|
|
|
|
|
|
|
goto not_there; |
2613
|
|
|
|
|
|
|
#endif |
2614
|
|
|
|
|
|
|
|
2615
|
|
|
|
|
|
|
} |
2616
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_PRIVATEKE", 14)) { |
2617
|
|
|
|
|
|
|
/* Y */ |
2618
|
|
|
|
|
|
|
|
2619
|
|
|
|
|
|
|
#ifdef SSL_R_NO_PRIVATEKEY |
2620
|
1
|
|
|
|
|
|
return SSL_R_NO_PRIVATEKEY; |
2621
|
|
|
|
|
|
|
#else |
2622
|
|
|
|
|
|
|
goto not_there; |
2623
|
|
|
|
|
|
|
#endif |
2624
|
|
|
|
|
|
|
|
2625
|
|
|
|
|
|
|
} |
2626
|
0
|
|
|
|
|
|
break; |
2627
|
|
|
|
|
|
|
case 'c': |
2628
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede_cb", 14)) { |
2629
|
|
|
|
|
|
|
/* c */ |
2630
|
|
|
|
|
|
|
|
2631
|
|
|
|
|
|
|
#ifdef NID_des_ede_cbc |
2632
|
1
|
|
|
|
|
|
return NID_des_ede_cbc; |
2633
|
|
|
|
|
|
|
#else |
2634
|
|
|
|
|
|
|
goto not_there; |
2635
|
|
|
|
|
|
|
#endif |
2636
|
|
|
|
|
|
|
|
2637
|
|
|
|
|
|
|
} |
2638
|
0
|
|
|
|
|
|
break; |
2639
|
|
|
|
|
|
|
case 'd': |
2640
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ms_code_in", 14)) { |
2641
|
|
|
|
|
|
|
/* d */ |
2642
|
|
|
|
|
|
|
|
2643
|
|
|
|
|
|
|
#ifdef NID_ms_code_ind |
2644
|
1
|
|
|
|
|
|
return NID_ms_code_ind; |
2645
|
|
|
|
|
|
|
#else |
2646
|
|
|
|
|
|
|
goto not_there; |
2647
|
|
|
|
|
|
|
#endif |
2648
|
|
|
|
|
|
|
|
2649
|
|
|
|
|
|
|
} |
2650
|
0
|
|
|
|
|
|
break; |
2651
|
|
|
|
|
|
|
case 'e': |
2652
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_countryNam", 14)) { |
2653
|
|
|
|
|
|
|
/* e */ |
2654
|
|
|
|
|
|
|
|
2655
|
|
|
|
|
|
|
#ifdef NID_countryName |
2656
|
2
|
|
|
|
|
|
return NID_countryName; |
2657
|
|
|
|
|
|
|
#else |
2658
|
|
|
|
|
|
|
goto not_there; |
2659
|
|
|
|
|
|
|
#endif |
2660
|
|
|
|
|
|
|
|
2661
|
|
|
|
|
|
|
} |
2662
|
0
|
|
|
|
|
|
break; |
2663
|
|
|
|
|
|
|
case 'h': |
2664
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_client_aut", 14)) { |
2665
|
|
|
|
|
|
|
/* h */ |
2666
|
|
|
|
|
|
|
|
2667
|
|
|
|
|
|
|
#ifdef NID_client_auth |
2668
|
1
|
|
|
|
|
|
return NID_client_auth; |
2669
|
|
|
|
|
|
|
#else |
2670
|
|
|
|
|
|
|
goto not_there; |
2671
|
|
|
|
|
|
|
#endif |
2672
|
|
|
|
|
|
|
|
2673
|
|
|
|
|
|
|
} |
2674
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_server_aut", 14)) { |
2675
|
|
|
|
|
|
|
/* h */ |
2676
|
|
|
|
|
|
|
|
2677
|
|
|
|
|
|
|
#ifdef NID_server_auth |
2678
|
1
|
|
|
|
|
|
return NID_server_auth; |
2679
|
|
|
|
|
|
|
#else |
2680
|
|
|
|
|
|
|
goto not_there; |
2681
|
|
|
|
|
|
|
#endif |
2682
|
|
|
|
|
|
|
|
2683
|
|
|
|
|
|
|
} |
2684
|
0
|
|
|
|
|
|
break; |
2685
|
|
|
|
|
|
|
case 'm': |
2686
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ms_code_co", 14)) { |
2687
|
|
|
|
|
|
|
/* m */ |
2688
|
|
|
|
|
|
|
|
2689
|
|
|
|
|
|
|
#ifdef NID_ms_code_com |
2690
|
1
|
|
|
|
|
|
return NID_ms_code_com; |
2691
|
|
|
|
|
|
|
#else |
2692
|
|
|
|
|
|
|
goto not_there; |
2693
|
|
|
|
|
|
|
#endif |
2694
|
|
|
|
|
|
|
|
2695
|
|
|
|
|
|
|
} |
2696
|
0
|
|
|
|
|
|
break; |
2697
|
|
|
|
|
|
|
case 'n': |
2698
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_descriptio", 14)) { |
2699
|
|
|
|
|
|
|
/* n */ |
2700
|
|
|
|
|
|
|
|
2701
|
|
|
|
|
|
|
#ifdef NID_description |
2702
|
1
|
|
|
|
|
|
return NID_description; |
2703
|
|
|
|
|
|
|
#else |
2704
|
|
|
|
|
|
|
goto not_there; |
2705
|
|
|
|
|
|
|
#endif |
2706
|
|
|
|
|
|
|
|
2707
|
|
|
|
|
|
|
} |
2708
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ms_ctl_sig", 14)) { |
2709
|
|
|
|
|
|
|
/* n */ |
2710
|
|
|
|
|
|
|
|
2711
|
|
|
|
|
|
|
#ifdef NID_ms_ctl_sign |
2712
|
1
|
|
|
|
|
|
return NID_ms_ctl_sign; |
2713
|
|
|
|
|
|
|
#else |
2714
|
|
|
|
|
|
|
goto not_there; |
2715
|
|
|
|
|
|
|
#endif |
2716
|
|
|
|
|
|
|
|
2717
|
|
|
|
|
|
|
} |
2718
|
0
|
|
|
|
|
|
break; |
2719
|
|
|
|
|
|
|
case 'r': |
2720
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_dnQualifie", 14)) { |
2721
|
|
|
|
|
|
|
/* r */ |
2722
|
|
|
|
|
|
|
|
2723
|
|
|
|
|
|
|
#ifdef NID_dnQualifier |
2724
|
1
|
|
|
|
|
|
return NID_dnQualifier; |
2725
|
|
|
|
|
|
|
#else |
2726
|
|
|
|
|
|
|
goto not_there; |
2727
|
|
|
|
|
|
|
#endif |
2728
|
|
|
|
|
|
|
|
2729
|
|
|
|
|
|
|
} |
2730
|
0
|
|
|
|
|
|
break; |
2731
|
|
|
|
|
|
|
case 's': |
2732
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_info_acces", 14)) { |
2733
|
|
|
|
|
|
|
/* s */ |
2734
|
|
|
|
|
|
|
|
2735
|
|
|
|
|
|
|
#ifdef NID_info_access |
2736
|
1
|
|
|
|
|
|
return NID_info_access; |
2737
|
|
|
|
|
|
|
#else |
2738
|
|
|
|
|
|
|
goto not_there; |
2739
|
|
|
|
|
|
|
#endif |
2740
|
|
|
|
|
|
|
|
2741
|
|
|
|
|
|
|
} |
2742
|
0
|
|
|
|
|
|
break; |
2743
|
|
|
|
|
|
|
} |
2744
|
0
|
|
|
|
|
|
break; |
2745
|
|
|
|
|
|
|
case 16: |
2746
|
|
|
|
|
|
|
/* Names all of length 16. */ |
2747
|
|
|
|
|
|
|
/* ERROR_WANT_ASYNC ERROR_WANT_WRITE NID_des_ede3_cbc NID_friendlyName |
2748
|
|
|
|
|
|
|
NID_hmacWithSHA1 NID_localityName NID_pkcs7_digest NID_pkcs7_signed |
2749
|
|
|
|
|
|
|
NID_serialNumber OPENSSL_BUILT_ON OPENSSL_CPU_INFO OPENSSL_PLATFORM |
2750
|
|
|
|
|
|
|
OP_EPHEMERAL_RSA OP_PKCS1_CHECK_1 OP_PKCS1_CHECK_2 OP_SINGLE_DH_USE |
2751
|
|
|
|
|
|
|
R_BAD_MAC_DECODE R_NO_CIPHER_LIST SSL3_MT_FINISHED X509_PURPOSE_ANY |
2752
|
|
|
|
|
|
|
X509_TRUST_EMAIL XN_FLAG_FN_ALIGN XN_FLAG_SEP_MASK */ |
2753
|
|
|
|
|
|
|
/* Offset 15 gives the best switch position. */ |
2754
|
45
|
|
|
|
|
|
switch (name[15]) { |
2755
|
|
|
|
|
|
|
case '1': |
2756
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_hmacWithSHA", 15)) { |
2757
|
|
|
|
|
|
|
/* 1 */ |
2758
|
|
|
|
|
|
|
|
2759
|
|
|
|
|
|
|
#ifdef NID_hmacWithSHA1 |
2760
|
1
|
|
|
|
|
|
return NID_hmacWithSHA1; |
2761
|
|
|
|
|
|
|
#else |
2762
|
|
|
|
|
|
|
goto not_there; |
2763
|
|
|
|
|
|
|
#endif |
2764
|
|
|
|
|
|
|
|
2765
|
|
|
|
|
|
|
} |
2766
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_PKCS1_CHECK_", 15)) { |
2767
|
|
|
|
|
|
|
/* 1 */ |
2768
|
|
|
|
|
|
|
|
2769
|
|
|
|
|
|
|
#ifdef SSL_OP_PKCS1_CHECK_1 |
2770
|
1
|
|
|
|
|
|
return SSL_OP_PKCS1_CHECK_1; |
2771
|
|
|
|
|
|
|
#else |
2772
|
|
|
|
|
|
|
goto not_there; |
2773
|
|
|
|
|
|
|
#endif |
2774
|
|
|
|
|
|
|
|
2775
|
|
|
|
|
|
|
} |
2776
|
0
|
|
|
|
|
|
break; |
2777
|
|
|
|
|
|
|
case '2': |
2778
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_PKCS1_CHECK_", 15)) { |
2779
|
|
|
|
|
|
|
/* 2 */ |
2780
|
|
|
|
|
|
|
|
2781
|
|
|
|
|
|
|
#ifdef SSL_OP_PKCS1_CHECK_2 |
2782
|
1
|
|
|
|
|
|
return SSL_OP_PKCS1_CHECK_2; |
2783
|
|
|
|
|
|
|
#else |
2784
|
|
|
|
|
|
|
goto not_there; |
2785
|
|
|
|
|
|
|
#endif |
2786
|
|
|
|
|
|
|
|
2787
|
|
|
|
|
|
|
} |
2788
|
0
|
|
|
|
|
|
break; |
2789
|
|
|
|
|
|
|
case 'A': |
2790
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_EPHEMERAL_RS", 15)) { |
2791
|
|
|
|
|
|
|
/* A */ |
2792
|
|
|
|
|
|
|
|
2793
|
|
|
|
|
|
|
#ifdef SSL_OP_EPHEMERAL_RSA |
2794
|
1
|
|
|
|
|
|
return SSL_OP_EPHEMERAL_RSA; |
2795
|
|
|
|
|
|
|
#else |
2796
|
|
|
|
|
|
|
goto not_there; |
2797
|
|
|
|
|
|
|
#endif |
2798
|
|
|
|
|
|
|
|
2799
|
|
|
|
|
|
|
} |
2800
|
0
|
|
|
|
|
|
break; |
2801
|
|
|
|
|
|
|
case 'C': |
2802
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_ASYN", 15)) { |
2803
|
|
|
|
|
|
|
/* C */ |
2804
|
|
|
|
|
|
|
|
2805
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_ASYNC |
2806
|
|
|
|
|
|
|
return SSL_ERROR_WANT_ASYNC; |
2807
|
|
|
|
|
|
|
#else |
2808
|
1
|
|
|
|
|
|
goto not_there; |
2809
|
|
|
|
|
|
|
#endif |
2810
|
|
|
|
|
|
|
|
2811
|
|
|
|
|
|
|
} |
2812
|
0
|
|
|
|
|
|
break; |
2813
|
|
|
|
|
|
|
case 'D': |
2814
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_FINISHE", 15)) { |
2815
|
|
|
|
|
|
|
/* D */ |
2816
|
|
|
|
|
|
|
|
2817
|
|
|
|
|
|
|
#ifdef SSL3_MT_FINISHED |
2818
|
1
|
|
|
|
|
|
return SSL3_MT_FINISHED; |
2819
|
|
|
|
|
|
|
#else |
2820
|
|
|
|
|
|
|
goto not_there; |
2821
|
|
|
|
|
|
|
#endif |
2822
|
|
|
|
|
|
|
|
2823
|
|
|
|
|
|
|
} |
2824
|
0
|
|
|
|
|
|
break; |
2825
|
|
|
|
|
|
|
case 'E': |
2826
|
8
|
100
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_WRIT", 15)) { |
2827
|
|
|
|
|
|
|
/* E */ |
2828
|
|
|
|
|
|
|
|
2829
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_WRITE |
2830
|
6
|
|
|
|
|
|
return SSL_ERROR_WANT_WRITE; |
2831
|
|
|
|
|
|
|
#else |
2832
|
|
|
|
|
|
|
goto not_there; |
2833
|
|
|
|
|
|
|
#endif |
2834
|
|
|
|
|
|
|
|
2835
|
|
|
|
|
|
|
} |
2836
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_SINGLE_DH_US", 15)) { |
2837
|
|
|
|
|
|
|
/* E */ |
2838
|
|
|
|
|
|
|
|
2839
|
|
|
|
|
|
|
#ifdef SSL_OP_SINGLE_DH_USE |
2840
|
1
|
|
|
|
|
|
return SSL_OP_SINGLE_DH_USE; |
2841
|
|
|
|
|
|
|
#else |
2842
|
|
|
|
|
|
|
goto not_there; |
2843
|
|
|
|
|
|
|
#endif |
2844
|
|
|
|
|
|
|
|
2845
|
|
|
|
|
|
|
} |
2846
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_MAC_DECOD", 15)) { |
2847
|
|
|
|
|
|
|
/* E */ |
2848
|
|
|
|
|
|
|
|
2849
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_MAC_DECODE |
2850
|
1
|
|
|
|
|
|
return SSL_R_BAD_MAC_DECODE; |
2851
|
|
|
|
|
|
|
#else |
2852
|
|
|
|
|
|
|
goto not_there; |
2853
|
|
|
|
|
|
|
#endif |
2854
|
|
|
|
|
|
|
|
2855
|
|
|
|
|
|
|
} |
2856
|
0
|
|
|
|
|
|
break; |
2857
|
|
|
|
|
|
|
case 'K': |
2858
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SEP_MAS", 15)) { |
2859
|
|
|
|
|
|
|
/* K */ |
2860
|
|
|
|
|
|
|
|
2861
|
|
|
|
|
|
|
#ifdef XN_FLAG_SEP_MASK |
2862
|
1
|
|
|
|
|
|
return XN_FLAG_SEP_MASK; |
2863
|
|
|
|
|
|
|
#else |
2864
|
|
|
|
|
|
|
goto not_there; |
2865
|
|
|
|
|
|
|
#endif |
2866
|
|
|
|
|
|
|
|
2867
|
|
|
|
|
|
|
} |
2868
|
0
|
|
|
|
|
|
break; |
2869
|
|
|
|
|
|
|
case 'L': |
2870
|
3
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_EMAI", 15)) { |
2871
|
|
|
|
|
|
|
/* L */ |
2872
|
|
|
|
|
|
|
|
2873
|
|
|
|
|
|
|
#ifdef X509_TRUST_EMAIL |
2874
|
3
|
|
|
|
|
|
return X509_TRUST_EMAIL; |
2875
|
|
|
|
|
|
|
#else |
2876
|
|
|
|
|
|
|
goto not_there; |
2877
|
|
|
|
|
|
|
#endif |
2878
|
|
|
|
|
|
|
|
2879
|
|
|
|
|
|
|
} |
2880
|
0
|
|
|
|
|
|
break; |
2881
|
|
|
|
|
|
|
case 'M': |
2882
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_PLATFOR", 15)) { |
2883
|
|
|
|
|
|
|
/* M */ |
2884
|
|
|
|
|
|
|
|
2885
|
|
|
|
|
|
|
#ifdef OPENSSL_PLATFORM |
2886
|
|
|
|
|
|
|
return OPENSSL_PLATFORM; |
2887
|
|
|
|
|
|
|
#else |
2888
|
1
|
|
|
|
|
|
goto not_there; |
2889
|
|
|
|
|
|
|
#endif |
2890
|
|
|
|
|
|
|
|
2891
|
|
|
|
|
|
|
} |
2892
|
0
|
|
|
|
|
|
break; |
2893
|
|
|
|
|
|
|
case 'N': |
2894
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_BUILT_O", 15)) { |
2895
|
|
|
|
|
|
|
/* N */ |
2896
|
|
|
|
|
|
|
|
2897
|
|
|
|
|
|
|
#ifdef OPENSSL_BUILT_ON |
2898
|
|
|
|
|
|
|
return OPENSSL_BUILT_ON; |
2899
|
|
|
|
|
|
|
#else |
2900
|
1
|
|
|
|
|
|
goto not_there; |
2901
|
|
|
|
|
|
|
#endif |
2902
|
|
|
|
|
|
|
|
2903
|
|
|
|
|
|
|
} |
2904
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_FN_ALIG", 15)) { |
2905
|
|
|
|
|
|
|
/* N */ |
2906
|
|
|
|
|
|
|
|
2907
|
|
|
|
|
|
|
#ifdef XN_FLAG_FN_ALIGN |
2908
|
1
|
|
|
|
|
|
return XN_FLAG_FN_ALIGN; |
2909
|
|
|
|
|
|
|
#else |
2910
|
|
|
|
|
|
|
goto not_there; |
2911
|
|
|
|
|
|
|
#endif |
2912
|
|
|
|
|
|
|
|
2913
|
|
|
|
|
|
|
} |
2914
|
0
|
|
|
|
|
|
break; |
2915
|
|
|
|
|
|
|
case 'O': |
2916
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_CPU_INF", 15)) { |
2917
|
|
|
|
|
|
|
/* O */ |
2918
|
|
|
|
|
|
|
|
2919
|
|
|
|
|
|
|
#ifdef OPENSSL_CPU_INFO |
2920
|
|
|
|
|
|
|
return OPENSSL_CPU_INFO; |
2921
|
|
|
|
|
|
|
#else |
2922
|
1
|
|
|
|
|
|
goto not_there; |
2923
|
|
|
|
|
|
|
#endif |
2924
|
|
|
|
|
|
|
|
2925
|
|
|
|
|
|
|
} |
2926
|
0
|
|
|
|
|
|
break; |
2927
|
|
|
|
|
|
|
case 'T': |
2928
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_CIPHER_LIS", 15)) { |
2929
|
|
|
|
|
|
|
/* T */ |
2930
|
|
|
|
|
|
|
|
2931
|
|
|
|
|
|
|
#ifdef SSL_R_NO_CIPHER_LIST |
2932
|
1
|
|
|
|
|
|
return SSL_R_NO_CIPHER_LIST; |
2933
|
|
|
|
|
|
|
#else |
2934
|
|
|
|
|
|
|
goto not_there; |
2935
|
|
|
|
|
|
|
#endif |
2936
|
|
|
|
|
|
|
|
2937
|
|
|
|
|
|
|
} |
2938
|
0
|
|
|
|
|
|
break; |
2939
|
|
|
|
|
|
|
case 'Y': |
2940
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_AN", 15)) { |
2941
|
|
|
|
|
|
|
/* Y */ |
2942
|
|
|
|
|
|
|
|
2943
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_ANY |
2944
|
1
|
|
|
|
|
|
return X509_PURPOSE_ANY; |
2945
|
|
|
|
|
|
|
#else |
2946
|
|
|
|
|
|
|
goto not_there; |
2947
|
|
|
|
|
|
|
#endif |
2948
|
|
|
|
|
|
|
|
2949
|
|
|
|
|
|
|
} |
2950
|
0
|
|
|
|
|
|
break; |
2951
|
|
|
|
|
|
|
case 'c': |
2952
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede3_cb", 15)) { |
2953
|
|
|
|
|
|
|
/* c */ |
2954
|
|
|
|
|
|
|
|
2955
|
|
|
|
|
|
|
#ifdef NID_des_ede3_cbc |
2956
|
1
|
|
|
|
|
|
return NID_des_ede3_cbc; |
2957
|
|
|
|
|
|
|
#else |
2958
|
|
|
|
|
|
|
goto not_there; |
2959
|
|
|
|
|
|
|
#endif |
2960
|
|
|
|
|
|
|
|
2961
|
|
|
|
|
|
|
} |
2962
|
0
|
|
|
|
|
|
break; |
2963
|
|
|
|
|
|
|
case 'd': |
2964
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_signe", 15)) { |
2965
|
|
|
|
|
|
|
/* d */ |
2966
|
|
|
|
|
|
|
|
2967
|
|
|
|
|
|
|
#ifdef NID_pkcs7_signed |
2968
|
1
|
|
|
|
|
|
return NID_pkcs7_signed; |
2969
|
|
|
|
|
|
|
#else |
2970
|
|
|
|
|
|
|
goto not_there; |
2971
|
|
|
|
|
|
|
#endif |
2972
|
|
|
|
|
|
|
|
2973
|
|
|
|
|
|
|
} |
2974
|
0
|
|
|
|
|
|
break; |
2975
|
|
|
|
|
|
|
case 'e': |
2976
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_friendlyNam", 15)) { |
2977
|
|
|
|
|
|
|
/* e */ |
2978
|
|
|
|
|
|
|
|
2979
|
|
|
|
|
|
|
#ifdef NID_friendlyName |
2980
|
1
|
|
|
|
|
|
return NID_friendlyName; |
2981
|
|
|
|
|
|
|
#else |
2982
|
|
|
|
|
|
|
goto not_there; |
2983
|
|
|
|
|
|
|
#endif |
2984
|
|
|
|
|
|
|
|
2985
|
|
|
|
|
|
|
} |
2986
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_localityNam", 15)) { |
2987
|
|
|
|
|
|
|
/* e */ |
2988
|
|
|
|
|
|
|
|
2989
|
|
|
|
|
|
|
#ifdef NID_localityName |
2990
|
1
|
|
|
|
|
|
return NID_localityName; |
2991
|
|
|
|
|
|
|
#else |
2992
|
|
|
|
|
|
|
goto not_there; |
2993
|
|
|
|
|
|
|
#endif |
2994
|
|
|
|
|
|
|
|
2995
|
|
|
|
|
|
|
} |
2996
|
0
|
|
|
|
|
|
break; |
2997
|
|
|
|
|
|
|
case 'r': |
2998
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_serialNumbe", 15)) { |
2999
|
|
|
|
|
|
|
/* r */ |
3000
|
|
|
|
|
|
|
|
3001
|
|
|
|
|
|
|
#ifdef NID_serialNumber |
3002
|
1
|
|
|
|
|
|
return NID_serialNumber; |
3003
|
|
|
|
|
|
|
#else |
3004
|
|
|
|
|
|
|
goto not_there; |
3005
|
|
|
|
|
|
|
#endif |
3006
|
|
|
|
|
|
|
|
3007
|
|
|
|
|
|
|
} |
3008
|
0
|
|
|
|
|
|
break; |
3009
|
|
|
|
|
|
|
case 't': |
3010
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_diges", 15)) { |
3011
|
|
|
|
|
|
|
/* t */ |
3012
|
|
|
|
|
|
|
|
3013
|
|
|
|
|
|
|
#ifdef NID_pkcs7_digest |
3014
|
1
|
|
|
|
|
|
return NID_pkcs7_digest; |
3015
|
|
|
|
|
|
|
#else |
3016
|
|
|
|
|
|
|
goto not_there; |
3017
|
|
|
|
|
|
|
#endif |
3018
|
|
|
|
|
|
|
|
3019
|
|
|
|
|
|
|
} |
3020
|
0
|
|
|
|
|
|
break; |
3021
|
|
|
|
|
|
|
} |
3022
|
15
|
|
|
|
|
|
break; |
3023
|
|
|
|
|
|
|
case 17: |
3024
|
|
|
|
|
|
|
/* Names all of length 17. */ |
3025
|
|
|
|
|
|
|
/* CB_HANDSHAKE_DONE ERROR_WANT_ACCEPT ERROR_ZERO_RETURN F_D2I_SSL_SESSION |
3026
|
|
|
|
|
|
|
F_I2D_SSL_SESSION F_SSL_SESSION_NEW NID_ad_ca_issuers NID_des_ede_cfb64 |
3027
|
|
|
|
|
|
|
NID_des_ede_ofb64 NID_dsaWithSHA1_2 NID_email_protect NID_ext_key_usage |
3028
|
|
|
|
|
|
|
NID_id_qt_unotice NID_rsaEncryption OP_NO_ANTI_REPLAY OP_NO_COMPRESSION |
3029
|
|
|
|
|
|
|
OP_TLSEXT_PADDING RECEIVED_SHUTDOWN R_BAD_WRITE_RETRY R_NO_CIPHER_MATCH |
3030
|
|
|
|
|
|
|
SESS_CACHE_CLIENT SESS_CACHE_SERVER SSL3_RT_HANDSHAKE X509_FILETYPE_PEM |
3031
|
|
|
|
|
|
|
X509_TRUST_COMPAT XN_FLAG_MULTILINE */ |
3032
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
3033
|
33
|
|
|
|
|
|
switch (name[13]) { |
3034
|
|
|
|
|
|
|
case 'A': |
3035
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_dsaWithSHA1_2", 17)) { |
3036
|
|
|
|
|
|
|
/* ^ */ |
3037
|
|
|
|
|
|
|
|
3038
|
|
|
|
|
|
|
#ifdef NID_dsaWithSHA1_2 |
3039
|
1
|
|
|
|
|
|
return NID_dsaWithSHA1_2; |
3040
|
|
|
|
|
|
|
#else |
3041
|
|
|
|
|
|
|
goto not_there; |
3042
|
|
|
|
|
|
|
#endif |
3043
|
|
|
|
|
|
|
|
3044
|
|
|
|
|
|
|
} |
3045
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_CIPHER_MATCH", 17)) { |
3046
|
|
|
|
|
|
|
/* ^ */ |
3047
|
|
|
|
|
|
|
|
3048
|
|
|
|
|
|
|
#ifdef SSL_R_NO_CIPHER_MATCH |
3049
|
1
|
|
|
|
|
|
return SSL_R_NO_CIPHER_MATCH; |
3050
|
|
|
|
|
|
|
#else |
3051
|
|
|
|
|
|
|
goto not_there; |
3052
|
|
|
|
|
|
|
#endif |
3053
|
|
|
|
|
|
|
|
3054
|
|
|
|
|
|
|
} |
3055
|
0
|
|
|
|
|
|
break; |
3056
|
|
|
|
|
|
|
case 'C': |
3057
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_ACCEPT", 17)) { |
3058
|
|
|
|
|
|
|
/* ^ */ |
3059
|
|
|
|
|
|
|
|
3060
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_ACCEPT |
3061
|
1
|
|
|
|
|
|
return SSL_ERROR_WANT_ACCEPT; |
3062
|
|
|
|
|
|
|
#else |
3063
|
|
|
|
|
|
|
goto not_there; |
3064
|
|
|
|
|
|
|
#endif |
3065
|
|
|
|
|
|
|
|
3066
|
|
|
|
|
|
|
} |
3067
|
0
|
|
|
|
|
|
break; |
3068
|
|
|
|
|
|
|
case 'D': |
3069
|
5
|
100
|
|
|
|
|
if (!memcmp(name, "CB_HANDSHAKE_DONE", 17)) { |
3070
|
|
|
|
|
|
|
/* ^ */ |
3071
|
|
|
|
|
|
|
|
3072
|
|
|
|
|
|
|
#ifdef SSL_CB_HANDSHAKE_DONE |
3073
|
2
|
|
|
|
|
|
return SSL_CB_HANDSHAKE_DONE; |
3074
|
|
|
|
|
|
|
#else |
3075
|
|
|
|
|
|
|
goto not_there; |
3076
|
|
|
|
|
|
|
#endif |
3077
|
|
|
|
|
|
|
|
3078
|
|
|
|
|
|
|
} |
3079
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OP_TLSEXT_PADDING", 17)) { |
3080
|
|
|
|
|
|
|
/* ^ */ |
3081
|
|
|
|
|
|
|
|
3082
|
|
|
|
|
|
|
#ifdef SSL_OP_TLSEXT_PADDING |
3083
|
1
|
|
|
|
|
|
return SSL_OP_TLSEXT_PADDING; |
3084
|
|
|
|
|
|
|
#else |
3085
|
|
|
|
|
|
|
goto not_there; |
3086
|
|
|
|
|
|
|
#endif |
3087
|
|
|
|
|
|
|
|
3088
|
|
|
|
|
|
|
} |
3089
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "RECEIVED_SHUTDOWN", 17)) { |
3090
|
|
|
|
|
|
|
/* ^ */ |
3091
|
|
|
|
|
|
|
|
3092
|
|
|
|
|
|
|
#ifdef SSL_RECEIVED_SHUTDOWN |
3093
|
2
|
|
|
|
|
|
return SSL_RECEIVED_SHUTDOWN; |
3094
|
|
|
|
|
|
|
#else |
3095
|
|
|
|
|
|
|
goto not_there; |
3096
|
|
|
|
|
|
|
#endif |
3097
|
|
|
|
|
|
|
|
3098
|
|
|
|
|
|
|
} |
3099
|
0
|
|
|
|
|
|
break; |
3100
|
|
|
|
|
|
|
case 'E': |
3101
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_WRITE_RETRY", 17)) { |
3102
|
|
|
|
|
|
|
/* ^ */ |
3103
|
|
|
|
|
|
|
|
3104
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_WRITE_RETRY |
3105
|
1
|
|
|
|
|
|
return SSL_R_BAD_WRITE_RETRY; |
3106
|
|
|
|
|
|
|
#else |
3107
|
|
|
|
|
|
|
goto not_there; |
3108
|
|
|
|
|
|
|
#endif |
3109
|
|
|
|
|
|
|
|
3110
|
|
|
|
|
|
|
} |
3111
|
0
|
|
|
|
|
|
break; |
3112
|
|
|
|
|
|
|
case 'H': |
3113
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_HANDSHAKE", 17)) { |
3114
|
|
|
|
|
|
|
/* ^ */ |
3115
|
|
|
|
|
|
|
|
3116
|
|
|
|
|
|
|
#ifdef SSL3_RT_HANDSHAKE |
3117
|
1
|
|
|
|
|
|
return SSL3_RT_HANDSHAKE; |
3118
|
|
|
|
|
|
|
#else |
3119
|
|
|
|
|
|
|
goto not_there; |
3120
|
|
|
|
|
|
|
#endif |
3121
|
|
|
|
|
|
|
|
3122
|
|
|
|
|
|
|
} |
3123
|
0
|
|
|
|
|
|
break; |
3124
|
|
|
|
|
|
|
case 'I': |
3125
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_CLIENT", 17)) { |
3126
|
|
|
|
|
|
|
/* ^ */ |
3127
|
|
|
|
|
|
|
|
3128
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_CLIENT |
3129
|
2
|
|
|
|
|
|
return SSL_SESS_CACHE_CLIENT; |
3130
|
|
|
|
|
|
|
#else |
3131
|
|
|
|
|
|
|
goto not_there; |
3132
|
|
|
|
|
|
|
#endif |
3133
|
|
|
|
|
|
|
|
3134
|
|
|
|
|
|
|
} |
3135
|
0
|
|
|
|
|
|
break; |
3136
|
|
|
|
|
|
|
case 'L': |
3137
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_MULTILINE", 17)) { |
3138
|
|
|
|
|
|
|
/* ^ */ |
3139
|
|
|
|
|
|
|
|
3140
|
|
|
|
|
|
|
#ifdef XN_FLAG_MULTILINE |
3141
|
1
|
|
|
|
|
|
return XN_FLAG_MULTILINE; |
3142
|
|
|
|
|
|
|
#else |
3143
|
|
|
|
|
|
|
goto not_there; |
3144
|
|
|
|
|
|
|
#endif |
3145
|
|
|
|
|
|
|
|
3146
|
|
|
|
|
|
|
} |
3147
|
0
|
|
|
|
|
|
break; |
3148
|
|
|
|
|
|
|
case 'M': |
3149
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_COMPAT", 17)) { |
3150
|
|
|
|
|
|
|
/* ^ */ |
3151
|
|
|
|
|
|
|
|
3152
|
|
|
|
|
|
|
#ifdef X509_TRUST_COMPAT |
3153
|
1
|
|
|
|
|
|
return X509_TRUST_COMPAT; |
3154
|
|
|
|
|
|
|
#else |
3155
|
|
|
|
|
|
|
goto not_there; |
3156
|
|
|
|
|
|
|
#endif |
3157
|
|
|
|
|
|
|
|
3158
|
|
|
|
|
|
|
} |
3159
|
0
|
|
|
|
|
|
break; |
3160
|
|
|
|
|
|
|
case 'P': |
3161
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_ANTI_REPLAY", 17)) { |
3162
|
|
|
|
|
|
|
/* ^ */ |
3163
|
|
|
|
|
|
|
|
3164
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_ANTI_REPLAY |
3165
|
|
|
|
|
|
|
return SSL_OP_NO_ANTI_REPLAY; |
3166
|
|
|
|
|
|
|
#else |
3167
|
1
|
|
|
|
|
|
goto not_there; |
3168
|
|
|
|
|
|
|
#endif |
3169
|
|
|
|
|
|
|
|
3170
|
|
|
|
|
|
|
} |
3171
|
0
|
|
|
|
|
|
break; |
3172
|
|
|
|
|
|
|
case 'R': |
3173
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_SERVER", 17)) { |
3174
|
|
|
|
|
|
|
/* ^ */ |
3175
|
|
|
|
|
|
|
|
3176
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_SERVER |
3177
|
2
|
|
|
|
|
|
return SSL_SESS_CACHE_SERVER; |
3178
|
|
|
|
|
|
|
#else |
3179
|
|
|
|
|
|
|
goto not_there; |
3180
|
|
|
|
|
|
|
#endif |
3181
|
|
|
|
|
|
|
|
3182
|
|
|
|
|
|
|
} |
3183
|
0
|
|
|
|
|
|
break; |
3184
|
|
|
|
|
|
|
case 'S': |
3185
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "F_D2I_SSL_SESSION", 17)) { |
3186
|
|
|
|
|
|
|
/* ^ */ |
3187
|
|
|
|
|
|
|
|
3188
|
|
|
|
|
|
|
#ifdef SSL_F_D2I_SSL_SESSION |
3189
|
1
|
|
|
|
|
|
return SSL_F_D2I_SSL_SESSION; |
3190
|
|
|
|
|
|
|
#else |
3191
|
|
|
|
|
|
|
goto not_there; |
3192
|
|
|
|
|
|
|
#endif |
3193
|
|
|
|
|
|
|
|
3194
|
|
|
|
|
|
|
} |
3195
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_I2D_SSL_SESSION", 17)) { |
3196
|
|
|
|
|
|
|
/* ^ */ |
3197
|
|
|
|
|
|
|
|
3198
|
|
|
|
|
|
|
#ifdef SSL_F_I2D_SSL_SESSION |
3199
|
1
|
|
|
|
|
|
return SSL_F_I2D_SSL_SESSION; |
3200
|
|
|
|
|
|
|
#else |
3201
|
|
|
|
|
|
|
goto not_there; |
3202
|
|
|
|
|
|
|
#endif |
3203
|
|
|
|
|
|
|
|
3204
|
|
|
|
|
|
|
} |
3205
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_COMPRESSION", 17)) { |
3206
|
|
|
|
|
|
|
/* ^ */ |
3207
|
|
|
|
|
|
|
|
3208
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_COMPRESSION |
3209
|
2
|
|
|
|
|
|
return SSL_OP_NO_COMPRESSION; |
3210
|
|
|
|
|
|
|
#else |
3211
|
|
|
|
|
|
|
goto not_there; |
3212
|
|
|
|
|
|
|
#endif |
3213
|
|
|
|
|
|
|
|
3214
|
|
|
|
|
|
|
} |
3215
|
0
|
|
|
|
|
|
break; |
3216
|
|
|
|
|
|
|
case 'T': |
3217
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_ZERO_RETURN", 17)) { |
3218
|
|
|
|
|
|
|
/* ^ */ |
3219
|
|
|
|
|
|
|
|
3220
|
|
|
|
|
|
|
#ifdef SSL_ERROR_ZERO_RETURN |
3221
|
2
|
|
|
|
|
|
return SSL_ERROR_ZERO_RETURN; |
3222
|
|
|
|
|
|
|
#else |
3223
|
|
|
|
|
|
|
goto not_there; |
3224
|
|
|
|
|
|
|
#endif |
3225
|
|
|
|
|
|
|
|
3226
|
|
|
|
|
|
|
} |
3227
|
0
|
|
|
|
|
|
break; |
3228
|
|
|
|
|
|
|
case '_': |
3229
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_SESSION_NEW", 17)) { |
3230
|
|
|
|
|
|
|
/* ^ */ |
3231
|
|
|
|
|
|
|
|
3232
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_SESSION_NEW |
3233
|
1
|
|
|
|
|
|
return SSL_F_SSL_SESSION_NEW; |
3234
|
|
|
|
|
|
|
#else |
3235
|
|
|
|
|
|
|
goto not_there; |
3236
|
|
|
|
|
|
|
#endif |
3237
|
|
|
|
|
|
|
|
3238
|
|
|
|
|
|
|
} |
3239
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_FILETYPE_PEM", 17)) { |
3240
|
|
|
|
|
|
|
/* ^ */ |
3241
|
|
|
|
|
|
|
|
3242
|
|
|
|
|
|
|
#ifdef X509_FILETYPE_PEM |
3243
|
1
|
|
|
|
|
|
return X509_FILETYPE_PEM; |
3244
|
|
|
|
|
|
|
#else |
3245
|
|
|
|
|
|
|
goto not_there; |
3246
|
|
|
|
|
|
|
#endif |
3247
|
|
|
|
|
|
|
|
3248
|
|
|
|
|
|
|
} |
3249
|
0
|
|
|
|
|
|
break; |
3250
|
|
|
|
|
|
|
case 'f': |
3251
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_ede_cfb64", 17)) { |
3252
|
|
|
|
|
|
|
/* ^ */ |
3253
|
|
|
|
|
|
|
|
3254
|
|
|
|
|
|
|
#ifdef NID_des_ede_cfb64 |
3255
|
1
|
|
|
|
|
|
return NID_des_ede_cfb64; |
3256
|
|
|
|
|
|
|
#else |
3257
|
|
|
|
|
|
|
goto not_there; |
3258
|
|
|
|
|
|
|
#endif |
3259
|
|
|
|
|
|
|
|
3260
|
|
|
|
|
|
|
} |
3261
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede_ofb64", 17)) { |
3262
|
|
|
|
|
|
|
/* ^ */ |
3263
|
|
|
|
|
|
|
|
3264
|
|
|
|
|
|
|
#ifdef NID_des_ede_ofb64 |
3265
|
1
|
|
|
|
|
|
return NID_des_ede_ofb64; |
3266
|
|
|
|
|
|
|
#else |
3267
|
|
|
|
|
|
|
goto not_there; |
3268
|
|
|
|
|
|
|
#endif |
3269
|
|
|
|
|
|
|
|
3270
|
|
|
|
|
|
|
} |
3271
|
0
|
|
|
|
|
|
break; |
3272
|
|
|
|
|
|
|
case 's': |
3273
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ext_key_usage", 17)) { |
3274
|
|
|
|
|
|
|
/* ^ */ |
3275
|
|
|
|
|
|
|
|
3276
|
|
|
|
|
|
|
#ifdef NID_ext_key_usage |
3277
|
2
|
|
|
|
|
|
return NID_ext_key_usage; |
3278
|
|
|
|
|
|
|
#else |
3279
|
|
|
|
|
|
|
goto not_there; |
3280
|
|
|
|
|
|
|
#endif |
3281
|
|
|
|
|
|
|
|
3282
|
|
|
|
|
|
|
} |
3283
|
0
|
|
|
|
|
|
break; |
3284
|
|
|
|
|
|
|
case 't': |
3285
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_email_protect", 17)) { |
3286
|
|
|
|
|
|
|
/* ^ */ |
3287
|
|
|
|
|
|
|
|
3288
|
|
|
|
|
|
|
#ifdef NID_email_protect |
3289
|
1
|
|
|
|
|
|
return NID_email_protect; |
3290
|
|
|
|
|
|
|
#else |
3291
|
|
|
|
|
|
|
goto not_there; |
3292
|
|
|
|
|
|
|
#endif |
3293
|
|
|
|
|
|
|
|
3294
|
|
|
|
|
|
|
} |
3295
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_id_qt_unotice", 17)) { |
3296
|
|
|
|
|
|
|
/* ^ */ |
3297
|
|
|
|
|
|
|
|
3298
|
|
|
|
|
|
|
#ifdef NID_id_qt_unotice |
3299
|
1
|
|
|
|
|
|
return NID_id_qt_unotice; |
3300
|
|
|
|
|
|
|
#else |
3301
|
|
|
|
|
|
|
goto not_there; |
3302
|
|
|
|
|
|
|
#endif |
3303
|
|
|
|
|
|
|
|
3304
|
|
|
|
|
|
|
} |
3305
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rsaEncryption", 17)) { |
3306
|
|
|
|
|
|
|
/* ^ */ |
3307
|
|
|
|
|
|
|
|
3308
|
|
|
|
|
|
|
#ifdef NID_rsaEncryption |
3309
|
1
|
|
|
|
|
|
return NID_rsaEncryption; |
3310
|
|
|
|
|
|
|
#else |
3311
|
|
|
|
|
|
|
goto not_there; |
3312
|
|
|
|
|
|
|
#endif |
3313
|
|
|
|
|
|
|
|
3314
|
|
|
|
|
|
|
} |
3315
|
0
|
|
|
|
|
|
break; |
3316
|
|
|
|
|
|
|
case 'u': |
3317
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ad_ca_issuers", 17)) { |
3318
|
|
|
|
|
|
|
/* ^ */ |
3319
|
|
|
|
|
|
|
|
3320
|
|
|
|
|
|
|
#ifdef NID_ad_ca_issuers |
3321
|
1
|
|
|
|
|
|
return NID_ad_ca_issuers; |
3322
|
|
|
|
|
|
|
#else |
3323
|
|
|
|
|
|
|
goto not_there; |
3324
|
|
|
|
|
|
|
#endif |
3325
|
|
|
|
|
|
|
|
3326
|
|
|
|
|
|
|
} |
3327
|
0
|
|
|
|
|
|
break; |
3328
|
|
|
|
|
|
|
} |
3329
|
0
|
|
|
|
|
|
break; |
3330
|
|
|
|
|
|
|
case 18: |
3331
|
|
|
|
|
|
|
/* Names all of length 18. */ |
3332
|
|
|
|
|
|
|
/* CB_HANDSHAKE_START ERROR_WANT_CONNECT F_GET_CLIENT_HELLO |
3333
|
|
|
|
|
|
|
F_GET_SERVER_HELLO MODE_NO_AUTO_CHAIN NID_des_ede3_cfb64 |
3334
|
|
|
|
|
|
|
NID_des_ede3_ofb64 NID_dhKeyAgreement OP_COOKIE_EXCHANGE |
3335
|
|
|
|
|
|
|
OP_SINGLE_ECDH_USE R_BAD_SSL_FILETYPE SSL3_MT_KEY_UPDATE |
3336
|
|
|
|
|
|
|
SSL3_MT_NEXT_PROTO VERIFY_CLIENT_ONCE X509_FILETYPE_ASN1 |
3337
|
|
|
|
|
|
|
X509_TRUST_DEFAULT */ |
3338
|
|
|
|
|
|
|
/* Offset 11 gives the best switch position. */ |
3339
|
37
|
|
|
|
|
|
switch (name[11]) { |
3340
|
|
|
|
|
|
|
case '3': |
3341
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_des_ede3_cfb64", 18)) { |
3342
|
|
|
|
|
|
|
/* ^ */ |
3343
|
|
|
|
|
|
|
|
3344
|
|
|
|
|
|
|
#ifdef NID_des_ede3_cfb64 |
3345
|
1
|
|
|
|
|
|
return NID_des_ede3_cfb64; |
3346
|
|
|
|
|
|
|
#else |
3347
|
|
|
|
|
|
|
goto not_there; |
3348
|
|
|
|
|
|
|
#endif |
3349
|
|
|
|
|
|
|
|
3350
|
|
|
|
|
|
|
} |
3351
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_des_ede3_ofb64", 18)) { |
3352
|
|
|
|
|
|
|
/* ^ */ |
3353
|
|
|
|
|
|
|
|
3354
|
|
|
|
|
|
|
#ifdef NID_des_ede3_ofb64 |
3355
|
1
|
|
|
|
|
|
return NID_des_ede3_ofb64; |
3356
|
|
|
|
|
|
|
#else |
3357
|
|
|
|
|
|
|
goto not_there; |
3358
|
|
|
|
|
|
|
#endif |
3359
|
|
|
|
|
|
|
|
3360
|
|
|
|
|
|
|
} |
3361
|
0
|
|
|
|
|
|
break; |
3362
|
|
|
|
|
|
|
case 'C': |
3363
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_CONNECT", 18)) { |
3364
|
|
|
|
|
|
|
/* ^ */ |
3365
|
|
|
|
|
|
|
|
3366
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_CONNECT |
3367
|
1
|
|
|
|
|
|
return SSL_ERROR_WANT_CONNECT; |
3368
|
|
|
|
|
|
|
#else |
3369
|
|
|
|
|
|
|
goto not_there; |
3370
|
|
|
|
|
|
|
#endif |
3371
|
|
|
|
|
|
|
|
3372
|
|
|
|
|
|
|
} |
3373
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_SINGLE_ECDH_USE", 18)) { |
3374
|
|
|
|
|
|
|
/* ^ */ |
3375
|
|
|
|
|
|
|
|
3376
|
|
|
|
|
|
|
#ifdef SSL_OP_SINGLE_ECDH_USE |
3377
|
1
|
|
|
|
|
|
return SSL_OP_SINGLE_ECDH_USE; |
3378
|
|
|
|
|
|
|
#else |
3379
|
|
|
|
|
|
|
goto not_there; |
3380
|
|
|
|
|
|
|
#endif |
3381
|
|
|
|
|
|
|
|
3382
|
|
|
|
|
|
|
} |
3383
|
0
|
|
|
|
|
|
break; |
3384
|
|
|
|
|
|
|
case 'D': |
3385
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_DEFAULT", 18)) { |
3386
|
|
|
|
|
|
|
/* ^ */ |
3387
|
|
|
|
|
|
|
|
3388
|
|
|
|
|
|
|
#ifdef X509_TRUST_DEFAULT |
3389
|
1
|
|
|
|
|
|
return X509_TRUST_DEFAULT; |
3390
|
|
|
|
|
|
|
#else |
3391
|
|
|
|
|
|
|
goto not_there; |
3392
|
|
|
|
|
|
|
#endif |
3393
|
|
|
|
|
|
|
|
3394
|
|
|
|
|
|
|
} |
3395
|
0
|
|
|
|
|
|
break; |
3396
|
|
|
|
|
|
|
case 'E': |
3397
|
22
|
50
|
|
|
|
|
if (!memcmp(name, "CB_HANDSHAKE_START", 18)) { |
3398
|
|
|
|
|
|
|
/* ^ */ |
3399
|
|
|
|
|
|
|
|
3400
|
|
|
|
|
|
|
#ifdef SSL_CB_HANDSHAKE_START |
3401
|
22
|
|
|
|
|
|
return SSL_CB_HANDSHAKE_START; |
3402
|
|
|
|
|
|
|
#else |
3403
|
|
|
|
|
|
|
goto not_there; |
3404
|
|
|
|
|
|
|
#endif |
3405
|
|
|
|
|
|
|
|
3406
|
|
|
|
|
|
|
} |
3407
|
0
|
|
|
|
|
|
break; |
3408
|
|
|
|
|
|
|
case 'I': |
3409
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_SSL_FILETYPE", 18)) { |
3410
|
|
|
|
|
|
|
/* ^ */ |
3411
|
|
|
|
|
|
|
|
3412
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_SSL_FILETYPE |
3413
|
1
|
|
|
|
|
|
return SSL_R_BAD_SSL_FILETYPE; |
3414
|
|
|
|
|
|
|
#else |
3415
|
|
|
|
|
|
|
goto not_there; |
3416
|
|
|
|
|
|
|
#endif |
3417
|
|
|
|
|
|
|
|
3418
|
|
|
|
|
|
|
} |
3419
|
0
|
|
|
|
|
|
break; |
3420
|
|
|
|
|
|
|
case 'N': |
3421
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "VERIFY_CLIENT_ONCE", 18)) { |
3422
|
|
|
|
|
|
|
/* ^ */ |
3423
|
|
|
|
|
|
|
|
3424
|
|
|
|
|
|
|
#ifdef SSL_VERIFY_CLIENT_ONCE |
3425
|
1
|
|
|
|
|
|
return SSL_VERIFY_CLIENT_ONCE; |
3426
|
|
|
|
|
|
|
#else |
3427
|
|
|
|
|
|
|
goto not_there; |
3428
|
|
|
|
|
|
|
#endif |
3429
|
|
|
|
|
|
|
|
3430
|
|
|
|
|
|
|
} |
3431
|
0
|
|
|
|
|
|
break; |
3432
|
|
|
|
|
|
|
case 'O': |
3433
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MODE_NO_AUTO_CHAIN", 18)) { |
3434
|
|
|
|
|
|
|
/* ^ */ |
3435
|
|
|
|
|
|
|
|
3436
|
|
|
|
|
|
|
#ifdef SSL_MODE_NO_AUTO_CHAIN |
3437
|
1
|
|
|
|
|
|
return SSL_MODE_NO_AUTO_CHAIN; |
3438
|
|
|
|
|
|
|
#else |
3439
|
|
|
|
|
|
|
goto not_there; |
3440
|
|
|
|
|
|
|
#endif |
3441
|
|
|
|
|
|
|
|
3442
|
|
|
|
|
|
|
} |
3443
|
0
|
|
|
|
|
|
break; |
3444
|
|
|
|
|
|
|
case 'P': |
3445
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_FILETYPE_ASN1", 18)) { |
3446
|
|
|
|
|
|
|
/* ^ */ |
3447
|
|
|
|
|
|
|
|
3448
|
|
|
|
|
|
|
#ifdef X509_FILETYPE_ASN1 |
3449
|
1
|
|
|
|
|
|
return X509_FILETYPE_ASN1; |
3450
|
|
|
|
|
|
|
#else |
3451
|
|
|
|
|
|
|
goto not_there; |
3452
|
|
|
|
|
|
|
#endif |
3453
|
|
|
|
|
|
|
|
3454
|
|
|
|
|
|
|
} |
3455
|
0
|
|
|
|
|
|
break; |
3456
|
|
|
|
|
|
|
case 'R': |
3457
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_GET_SERVER_HELLO", 18)) { |
3458
|
|
|
|
|
|
|
/* ^ */ |
3459
|
|
|
|
|
|
|
|
3460
|
|
|
|
|
|
|
#ifdef SSL_F_GET_SERVER_HELLO |
3461
|
1
|
|
|
|
|
|
return SSL_F_GET_SERVER_HELLO; |
3462
|
|
|
|
|
|
|
#else |
3463
|
|
|
|
|
|
|
goto not_there; |
3464
|
|
|
|
|
|
|
#endif |
3465
|
|
|
|
|
|
|
|
3466
|
|
|
|
|
|
|
} |
3467
|
0
|
|
|
|
|
|
break; |
3468
|
|
|
|
|
|
|
case 'T': |
3469
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_GET_CLIENT_HELLO", 18)) { |
3470
|
|
|
|
|
|
|
/* ^ */ |
3471
|
|
|
|
|
|
|
|
3472
|
|
|
|
|
|
|
#ifdef SSL_F_GET_CLIENT_HELLO |
3473
|
1
|
|
|
|
|
|
return SSL_F_GET_CLIENT_HELLO; |
3474
|
|
|
|
|
|
|
#else |
3475
|
|
|
|
|
|
|
goto not_there; |
3476
|
|
|
|
|
|
|
#endif |
3477
|
|
|
|
|
|
|
|
3478
|
|
|
|
|
|
|
} |
3479
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_NEXT_PROTO", 18)) { |
3480
|
|
|
|
|
|
|
/* ^ */ |
3481
|
|
|
|
|
|
|
|
3482
|
|
|
|
|
|
|
#ifdef SSL3_MT_NEXT_PROTO |
3483
|
1
|
|
|
|
|
|
return SSL3_MT_NEXT_PROTO; |
3484
|
|
|
|
|
|
|
#else |
3485
|
|
|
|
|
|
|
goto not_there; |
3486
|
|
|
|
|
|
|
#endif |
3487
|
|
|
|
|
|
|
|
3488
|
|
|
|
|
|
|
} |
3489
|
0
|
|
|
|
|
|
break; |
3490
|
|
|
|
|
|
|
case 'X': |
3491
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_COOKIE_EXCHANGE", 18)) { |
3492
|
|
|
|
|
|
|
/* ^ */ |
3493
|
|
|
|
|
|
|
|
3494
|
|
|
|
|
|
|
#ifdef SSL_OP_COOKIE_EXCHANGE |
3495
|
1
|
|
|
|
|
|
return SSL_OP_COOKIE_EXCHANGE; |
3496
|
|
|
|
|
|
|
#else |
3497
|
|
|
|
|
|
|
goto not_there; |
3498
|
|
|
|
|
|
|
#endif |
3499
|
|
|
|
|
|
|
|
3500
|
|
|
|
|
|
|
} |
3501
|
0
|
|
|
|
|
|
break; |
3502
|
|
|
|
|
|
|
case '_': |
3503
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_KEY_UPDATE", 18)) { |
3504
|
|
|
|
|
|
|
/* ^ */ |
3505
|
|
|
|
|
|
|
|
3506
|
|
|
|
|
|
|
#ifdef SSL3_MT_KEY_UPDATE |
3507
|
|
|
|
|
|
|
return SSL3_MT_KEY_UPDATE; |
3508
|
|
|
|
|
|
|
#else |
3509
|
1
|
|
|
|
|
|
goto not_there; |
3510
|
|
|
|
|
|
|
#endif |
3511
|
|
|
|
|
|
|
|
3512
|
|
|
|
|
|
|
} |
3513
|
0
|
|
|
|
|
|
break; |
3514
|
|
|
|
|
|
|
case 'r': |
3515
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_dhKeyAgreement", 18)) { |
3516
|
|
|
|
|
|
|
/* ^ */ |
3517
|
|
|
|
|
|
|
|
3518
|
|
|
|
|
|
|
#ifdef NID_dhKeyAgreement |
3519
|
1
|
|
|
|
|
|
return NID_dhKeyAgreement; |
3520
|
|
|
|
|
|
|
#else |
3521
|
|
|
|
|
|
|
goto not_there; |
3522
|
|
|
|
|
|
|
#endif |
3523
|
|
|
|
|
|
|
|
3524
|
|
|
|
|
|
|
} |
3525
|
0
|
|
|
|
|
|
break; |
3526
|
|
|
|
|
|
|
} |
3527
|
0
|
|
|
|
|
|
break; |
3528
|
|
|
|
|
|
|
case 19: |
3529
|
|
|
|
|
|
|
/* Names all of length 19. */ |
3530
|
|
|
|
|
|
|
/* F_CLIENT_MASTER_KEY F_GET_SERVER_VERIFY NID_invalidity_date |
3531
|
|
|
|
|
|
|
NID_issuer_alt_name NID_pkcs7_encrypted NID_pkcs7_enveloped |
3532
|
|
|
|
|
|
|
NID_rle_compression NID_safeContentsBag NID_sdsiCertificate |
3533
|
|
|
|
|
|
|
NID_x509Certificate OPENSSL_ENGINES_DIR OPENSSL_MODULES_DIR |
3534
|
|
|
|
|
|
|
OP_ALLOW_NO_DHE_KEX OP_CISCO_ANYCONNECT OP_NON_EXPORT_FIRST |
3535
|
|
|
|
|
|
|
OP_NO_RENEGOTIATION OP_TLS_ROLLBACK_BUG SSL3_MT_CERTIFICATE |
3536
|
|
|
|
|
|
|
SSL3_MT_SERVER_DONE */ |
3537
|
|
|
|
|
|
|
/* Offset 12 gives the best switch position. */ |
3538
|
22
|
|
|
|
|
|
switch (name[12]) { |
3539
|
|
|
|
|
|
|
case 'A': |
3540
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_TLS_ROLLBACK_BUG", 19)) { |
3541
|
|
|
|
|
|
|
/* ^ */ |
3542
|
|
|
|
|
|
|
|
3543
|
|
|
|
|
|
|
#ifdef SSL_OP_TLS_ROLLBACK_BUG |
3544
|
1
|
|
|
|
|
|
return SSL_OP_TLS_ROLLBACK_BUG; |
3545
|
|
|
|
|
|
|
#else |
3546
|
|
|
|
|
|
|
goto not_there; |
3547
|
|
|
|
|
|
|
#endif |
3548
|
|
|
|
|
|
|
|
3549
|
|
|
|
|
|
|
} |
3550
|
0
|
|
|
|
|
|
break; |
3551
|
|
|
|
|
|
|
case 'C': |
3552
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_CISCO_ANYCONNECT", 19)) { |
3553
|
|
|
|
|
|
|
/* ^ */ |
3554
|
|
|
|
|
|
|
|
3555
|
|
|
|
|
|
|
#ifdef SSL_OP_CISCO_ANYCONNECT |
3556
|
1
|
|
|
|
|
|
return SSL_OP_CISCO_ANYCONNECT; |
3557
|
|
|
|
|
|
|
#else |
3558
|
|
|
|
|
|
|
goto not_there; |
3559
|
|
|
|
|
|
|
#endif |
3560
|
|
|
|
|
|
|
|
3561
|
|
|
|
|
|
|
} |
3562
|
0
|
|
|
|
|
|
break; |
3563
|
|
|
|
|
|
|
case 'D': |
3564
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_ALLOW_NO_DHE_KEX", 19)) { |
3565
|
|
|
|
|
|
|
/* ^ */ |
3566
|
|
|
|
|
|
|
|
3567
|
|
|
|
|
|
|
#ifdef SSL_OP_ALLOW_NO_DHE_KEX |
3568
|
|
|
|
|
|
|
return SSL_OP_ALLOW_NO_DHE_KEX; |
3569
|
|
|
|
|
|
|
#else |
3570
|
1
|
|
|
|
|
|
goto not_there; |
3571
|
|
|
|
|
|
|
#endif |
3572
|
|
|
|
|
|
|
|
3573
|
|
|
|
|
|
|
} |
3574
|
0
|
|
|
|
|
|
break; |
3575
|
|
|
|
|
|
|
case 'E': |
3576
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_SERVER_DONE", 19)) { |
3577
|
|
|
|
|
|
|
/* ^ */ |
3578
|
|
|
|
|
|
|
|
3579
|
|
|
|
|
|
|
#ifdef SSL3_MT_SERVER_DONE |
3580
|
1
|
|
|
|
|
|
return SSL3_MT_SERVER_DONE; |
3581
|
|
|
|
|
|
|
#else |
3582
|
|
|
|
|
|
|
goto not_there; |
3583
|
|
|
|
|
|
|
#endif |
3584
|
|
|
|
|
|
|
|
3585
|
|
|
|
|
|
|
} |
3586
|
0
|
|
|
|
|
|
break; |
3587
|
|
|
|
|
|
|
case 'I': |
3588
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CERTIFICATE", 19)) { |
3589
|
|
|
|
|
|
|
/* ^ */ |
3590
|
|
|
|
|
|
|
|
3591
|
|
|
|
|
|
|
#ifdef SSL3_MT_CERTIFICATE |
3592
|
1
|
|
|
|
|
|
return SSL3_MT_CERTIFICATE; |
3593
|
|
|
|
|
|
|
#else |
3594
|
|
|
|
|
|
|
goto not_there; |
3595
|
|
|
|
|
|
|
#endif |
3596
|
|
|
|
|
|
|
|
3597
|
|
|
|
|
|
|
} |
3598
|
0
|
|
|
|
|
|
break; |
3599
|
|
|
|
|
|
|
case 'L': |
3600
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_MODULES_DIR", 19)) { |
3601
|
|
|
|
|
|
|
/* ^ */ |
3602
|
|
|
|
|
|
|
|
3603
|
|
|
|
|
|
|
#ifdef OPENSSL_MODULES_DIR |
3604
|
|
|
|
|
|
|
return OPENSSL_MODULES_DIR; |
3605
|
|
|
|
|
|
|
#else |
3606
|
2
|
|
|
|
|
|
goto not_there; |
3607
|
|
|
|
|
|
|
#endif |
3608
|
|
|
|
|
|
|
|
3609
|
|
|
|
|
|
|
} |
3610
|
0
|
|
|
|
|
|
break; |
3611
|
|
|
|
|
|
|
case 'N': |
3612
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_ENGINES_DIR", 19)) { |
3613
|
|
|
|
|
|
|
/* ^ */ |
3614
|
|
|
|
|
|
|
|
3615
|
|
|
|
|
|
|
#ifdef OPENSSL_ENGINES_DIR |
3616
|
|
|
|
|
|
|
return OPENSSL_ENGINES_DIR; |
3617
|
|
|
|
|
|
|
#else |
3618
|
1
|
|
|
|
|
|
goto not_there; |
3619
|
|
|
|
|
|
|
#endif |
3620
|
|
|
|
|
|
|
|
3621
|
|
|
|
|
|
|
} |
3622
|
0
|
|
|
|
|
|
break; |
3623
|
|
|
|
|
|
|
case 'T': |
3624
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_CLIENT_MASTER_KEY", 19)) { |
3625
|
|
|
|
|
|
|
/* ^ */ |
3626
|
|
|
|
|
|
|
|
3627
|
|
|
|
|
|
|
#ifdef SSL_F_CLIENT_MASTER_KEY |
3628
|
1
|
|
|
|
|
|
return SSL_F_CLIENT_MASTER_KEY; |
3629
|
|
|
|
|
|
|
#else |
3630
|
|
|
|
|
|
|
goto not_there; |
3631
|
|
|
|
|
|
|
#endif |
3632
|
|
|
|
|
|
|
|
3633
|
|
|
|
|
|
|
} |
3634
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_NON_EXPORT_FIRST", 19)) { |
3635
|
|
|
|
|
|
|
/* ^ */ |
3636
|
|
|
|
|
|
|
|
3637
|
|
|
|
|
|
|
#ifdef SSL_OP_NON_EXPORT_FIRST |
3638
|
|
|
|
|
|
|
return SSL_OP_NON_EXPORT_FIRST; |
3639
|
|
|
|
|
|
|
#else |
3640
|
1
|
|
|
|
|
|
goto not_there; |
3641
|
|
|
|
|
|
|
#endif |
3642
|
|
|
|
|
|
|
|
3643
|
|
|
|
|
|
|
} |
3644
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_RENEGOTIATION", 19)) { |
3645
|
|
|
|
|
|
|
/* ^ */ |
3646
|
|
|
|
|
|
|
|
3647
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_RENEGOTIATION |
3648
|
|
|
|
|
|
|
return SSL_OP_NO_RENEGOTIATION; |
3649
|
|
|
|
|
|
|
#else |
3650
|
1
|
|
|
|
|
|
goto not_there; |
3651
|
|
|
|
|
|
|
#endif |
3652
|
|
|
|
|
|
|
|
3653
|
|
|
|
|
|
|
} |
3654
|
0
|
|
|
|
|
|
break; |
3655
|
|
|
|
|
|
|
case '_': |
3656
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_GET_SERVER_VERIFY", 19)) { |
3657
|
|
|
|
|
|
|
/* ^ */ |
3658
|
|
|
|
|
|
|
|
3659
|
|
|
|
|
|
|
#ifdef SSL_F_GET_SERVER_VERIFY |
3660
|
1
|
|
|
|
|
|
return SSL_F_GET_SERVER_VERIFY; |
3661
|
|
|
|
|
|
|
#else |
3662
|
|
|
|
|
|
|
goto not_there; |
3663
|
|
|
|
|
|
|
#endif |
3664
|
|
|
|
|
|
|
|
3665
|
|
|
|
|
|
|
} |
3666
|
0
|
|
|
|
|
|
break; |
3667
|
|
|
|
|
|
|
case 'c': |
3668
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_encrypted", 19)) { |
3669
|
|
|
|
|
|
|
/* ^ */ |
3670
|
|
|
|
|
|
|
|
3671
|
|
|
|
|
|
|
#ifdef NID_pkcs7_encrypted |
3672
|
1
|
|
|
|
|
|
return NID_pkcs7_encrypted; |
3673
|
|
|
|
|
|
|
#else |
3674
|
|
|
|
|
|
|
goto not_there; |
3675
|
|
|
|
|
|
|
#endif |
3676
|
|
|
|
|
|
|
|
3677
|
|
|
|
|
|
|
} |
3678
|
0
|
|
|
|
|
|
break; |
3679
|
|
|
|
|
|
|
case 'e': |
3680
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_safeContentsBag", 19)) { |
3681
|
|
|
|
|
|
|
/* ^ */ |
3682
|
|
|
|
|
|
|
|
3683
|
|
|
|
|
|
|
#ifdef NID_safeContentsBag |
3684
|
1
|
|
|
|
|
|
return NID_safeContentsBag; |
3685
|
|
|
|
|
|
|
#else |
3686
|
|
|
|
|
|
|
goto not_there; |
3687
|
|
|
|
|
|
|
#endif |
3688
|
|
|
|
|
|
|
|
3689
|
|
|
|
|
|
|
} |
3690
|
0
|
|
|
|
|
|
break; |
3691
|
|
|
|
|
|
|
case 'i': |
3692
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_sdsiCertificate", 19)) { |
3693
|
|
|
|
|
|
|
/* ^ */ |
3694
|
|
|
|
|
|
|
|
3695
|
|
|
|
|
|
|
#ifdef NID_sdsiCertificate |
3696
|
1
|
|
|
|
|
|
return NID_sdsiCertificate; |
3697
|
|
|
|
|
|
|
#else |
3698
|
|
|
|
|
|
|
goto not_there; |
3699
|
|
|
|
|
|
|
#endif |
3700
|
|
|
|
|
|
|
|
3701
|
|
|
|
|
|
|
} |
3702
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_x509Certificate", 19)) { |
3703
|
|
|
|
|
|
|
/* ^ */ |
3704
|
|
|
|
|
|
|
|
3705
|
|
|
|
|
|
|
#ifdef NID_x509Certificate |
3706
|
1
|
|
|
|
|
|
return NID_x509Certificate; |
3707
|
|
|
|
|
|
|
#else |
3708
|
|
|
|
|
|
|
goto not_there; |
3709
|
|
|
|
|
|
|
#endif |
3710
|
|
|
|
|
|
|
|
3711
|
|
|
|
|
|
|
} |
3712
|
0
|
|
|
|
|
|
break; |
3713
|
|
|
|
|
|
|
case 'l': |
3714
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_issuer_alt_name", 19)) { |
3715
|
|
|
|
|
|
|
/* ^ */ |
3716
|
|
|
|
|
|
|
|
3717
|
|
|
|
|
|
|
#ifdef NID_issuer_alt_name |
3718
|
1
|
|
|
|
|
|
return NID_issuer_alt_name; |
3719
|
|
|
|
|
|
|
#else |
3720
|
|
|
|
|
|
|
goto not_there; |
3721
|
|
|
|
|
|
|
#endif |
3722
|
|
|
|
|
|
|
|
3723
|
|
|
|
|
|
|
} |
3724
|
0
|
|
|
|
|
|
break; |
3725
|
|
|
|
|
|
|
case 'r': |
3726
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_rle_compression", 19)) { |
3727
|
|
|
|
|
|
|
/* ^ */ |
3728
|
|
|
|
|
|
|
|
3729
|
|
|
|
|
|
|
#ifdef NID_rle_compression |
3730
|
1
|
|
|
|
|
|
return NID_rle_compression; |
3731
|
|
|
|
|
|
|
#else |
3732
|
|
|
|
|
|
|
goto not_there; |
3733
|
|
|
|
|
|
|
#endif |
3734
|
|
|
|
|
|
|
|
3735
|
|
|
|
|
|
|
} |
3736
|
0
|
|
|
|
|
|
break; |
3737
|
|
|
|
|
|
|
case 't': |
3738
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_invalidity_date", 19)) { |
3739
|
|
|
|
|
|
|
/* ^ */ |
3740
|
|
|
|
|
|
|
|
3741
|
|
|
|
|
|
|
#ifdef NID_invalidity_date |
3742
|
1
|
|
|
|
|
|
return NID_invalidity_date; |
3743
|
|
|
|
|
|
|
#else |
3744
|
|
|
|
|
|
|
goto not_there; |
3745
|
|
|
|
|
|
|
#endif |
3746
|
|
|
|
|
|
|
|
3747
|
|
|
|
|
|
|
} |
3748
|
0
|
|
|
|
|
|
break; |
3749
|
|
|
|
|
|
|
case 'v': |
3750
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_enveloped", 19)) { |
3751
|
|
|
|
|
|
|
/* ^ */ |
3752
|
|
|
|
|
|
|
|
3753
|
|
|
|
|
|
|
#ifdef NID_pkcs7_enveloped |
3754
|
1
|
|
|
|
|
|
return NID_pkcs7_enveloped; |
3755
|
|
|
|
|
|
|
#else |
3756
|
|
|
|
|
|
|
goto not_there; |
3757
|
|
|
|
|
|
|
#endif |
3758
|
|
|
|
|
|
|
|
3759
|
|
|
|
|
|
|
} |
3760
|
0
|
|
|
|
|
|
break; |
3761
|
|
|
|
|
|
|
} |
3762
|
2
|
|
|
|
|
|
break; |
3763
|
|
|
|
|
|
|
case 20: |
3764
|
|
|
|
|
|
|
/* Names all of length 20. */ |
3765
|
|
|
|
|
|
|
/* ASN1_STRFLGS_ESC_MSB ASN1_STRFLGS_RFC2253 ERROR_WANT_ASYNC_JOB |
3766
|
|
|
|
|
|
|
F_CLIENT_CERTIFICATE F_SSL_USE_PRIVATEKEY MODE_RELEASE_BUFFERS |
3767
|
|
|
|
|
|
|
NID_netscape_comment NID_organizationName NID_ripemd160WithRSA |
3768
|
|
|
|
|
|
|
NID_subject_alt_name NID_uniqueIdentifier NID_zlib_compression |
3769
|
|
|
|
|
|
|
OP_CLEANSE_PLAINTEXT OP_PRIORITIZE_CHACHA R_NO_CERTIFICATE_SET |
3770
|
|
|
|
|
|
|
SESSION_ASN1_VERSION SSL2_MT_CLIENT_HELLO SSL2_MT_SERVER_HELLO |
3771
|
|
|
|
|
|
|
SSL3_MT_CLIENT_HELLO SSL3_MT_MESSAGE_HASH SSL3_MT_SERVER_HELLO |
3772
|
|
|
|
|
|
|
X509_TRUST_OCSP_SIGN X509_V_ERR_PATH_LOOP */ |
3773
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
3774
|
24
|
|
|
|
|
|
switch (name[13]) { |
3775
|
|
|
|
|
|
|
case 'A': |
3776
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_CLEANSE_PLAINTEXT", 20)) { |
3777
|
|
|
|
|
|
|
/* ^ */ |
3778
|
|
|
|
|
|
|
|
3779
|
|
|
|
|
|
|
#ifdef SSL_OP_CLEANSE_PLAINTEXT |
3780
|
|
|
|
|
|
|
return SSL_OP_CLEANSE_PLAINTEXT; |
3781
|
|
|
|
|
|
|
#else |
3782
|
1
|
|
|
|
|
|
goto not_there; |
3783
|
|
|
|
|
|
|
#endif |
3784
|
|
|
|
|
|
|
|
3785
|
|
|
|
|
|
|
} |
3786
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_CERTIFICATE_SET", 20)) { |
3787
|
|
|
|
|
|
|
/* ^ */ |
3788
|
|
|
|
|
|
|
|
3789
|
|
|
|
|
|
|
#ifdef SSL_R_NO_CERTIFICATE_SET |
3790
|
1
|
|
|
|
|
|
return SSL_R_NO_CERTIFICATE_SET; |
3791
|
|
|
|
|
|
|
#else |
3792
|
|
|
|
|
|
|
goto not_there; |
3793
|
|
|
|
|
|
|
#endif |
3794
|
|
|
|
|
|
|
|
3795
|
|
|
|
|
|
|
} |
3796
|
0
|
|
|
|
|
|
break; |
3797
|
|
|
|
|
|
|
case 'B': |
3798
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MODE_RELEASE_BUFFERS", 20)) { |
3799
|
|
|
|
|
|
|
/* ^ */ |
3800
|
|
|
|
|
|
|
|
3801
|
|
|
|
|
|
|
#ifdef SSL_MODE_RELEASE_BUFFERS |
3802
|
1
|
|
|
|
|
|
return SSL_MODE_RELEASE_BUFFERS; |
3803
|
|
|
|
|
|
|
#else |
3804
|
|
|
|
|
|
|
goto not_there; |
3805
|
|
|
|
|
|
|
#endif |
3806
|
|
|
|
|
|
|
|
3807
|
|
|
|
|
|
|
} |
3808
|
0
|
|
|
|
|
|
break; |
3809
|
|
|
|
|
|
|
case 'E': |
3810
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ASN1_STRFLGS_ESC_MSB", 20)) { |
3811
|
|
|
|
|
|
|
/* ^ */ |
3812
|
|
|
|
|
|
|
|
3813
|
|
|
|
|
|
|
#ifdef ASN1_STRFLGS_ESC_MSB |
3814
|
1
|
|
|
|
|
|
return ASN1_STRFLGS_ESC_MSB; |
3815
|
|
|
|
|
|
|
#else |
3816
|
|
|
|
|
|
|
goto not_there; |
3817
|
|
|
|
|
|
|
#endif |
3818
|
|
|
|
|
|
|
|
3819
|
|
|
|
|
|
|
} |
3820
|
0
|
|
|
|
|
|
break; |
3821
|
|
|
|
|
|
|
case 'G': |
3822
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_MESSAGE_HASH", 20)) { |
3823
|
|
|
|
|
|
|
/* ^ */ |
3824
|
|
|
|
|
|
|
|
3825
|
|
|
|
|
|
|
#ifdef SSL3_MT_MESSAGE_HASH |
3826
|
|
|
|
|
|
|
return SSL3_MT_MESSAGE_HASH; |
3827
|
|
|
|
|
|
|
#else |
3828
|
1
|
|
|
|
|
|
goto not_there; |
3829
|
|
|
|
|
|
|
#endif |
3830
|
|
|
|
|
|
|
|
3831
|
|
|
|
|
|
|
} |
3832
|
0
|
|
|
|
|
|
break; |
3833
|
|
|
|
|
|
|
case 'I': |
3834
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_CLIENT_CERTIFICATE", 20)) { |
3835
|
|
|
|
|
|
|
/* ^ */ |
3836
|
|
|
|
|
|
|
|
3837
|
|
|
|
|
|
|
#ifdef SSL_F_CLIENT_CERTIFICATE |
3838
|
1
|
|
|
|
|
|
return SSL_F_CLIENT_CERTIFICATE; |
3839
|
|
|
|
|
|
|
#else |
3840
|
|
|
|
|
|
|
goto not_there; |
3841
|
|
|
|
|
|
|
#endif |
3842
|
|
|
|
|
|
|
|
3843
|
|
|
|
|
|
|
} |
3844
|
0
|
|
|
|
|
|
break; |
3845
|
|
|
|
|
|
|
case 'R': |
3846
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "ASN1_STRFLGS_RFC2253", 20)) { |
3847
|
|
|
|
|
|
|
/* ^ */ |
3848
|
|
|
|
|
|
|
|
3849
|
|
|
|
|
|
|
#ifdef ASN1_STRFLGS_RFC2253 |
3850
|
1
|
|
|
|
|
|
return ASN1_STRFLGS_RFC2253; |
3851
|
|
|
|
|
|
|
#else |
3852
|
|
|
|
|
|
|
goto not_there; |
3853
|
|
|
|
|
|
|
#endif |
3854
|
|
|
|
|
|
|
|
3855
|
|
|
|
|
|
|
} |
3856
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_SERVER_HELLO", 20)) { |
3857
|
|
|
|
|
|
|
/* ^ */ |
3858
|
|
|
|
|
|
|
|
3859
|
|
|
|
|
|
|
#ifdef SSL2_MT_SERVER_HELLO |
3860
|
1
|
|
|
|
|
|
return SSL2_MT_SERVER_HELLO; |
3861
|
|
|
|
|
|
|
#else |
3862
|
|
|
|
|
|
|
goto not_there; |
3863
|
|
|
|
|
|
|
#endif |
3864
|
|
|
|
|
|
|
|
3865
|
|
|
|
|
|
|
} |
3866
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_SERVER_HELLO", 20)) { |
3867
|
|
|
|
|
|
|
/* ^ */ |
3868
|
|
|
|
|
|
|
|
3869
|
|
|
|
|
|
|
#ifdef SSL3_MT_SERVER_HELLO |
3870
|
1
|
|
|
|
|
|
return SSL3_MT_SERVER_HELLO; |
3871
|
|
|
|
|
|
|
#else |
3872
|
|
|
|
|
|
|
goto not_there; |
3873
|
|
|
|
|
|
|
#endif |
3874
|
|
|
|
|
|
|
|
3875
|
|
|
|
|
|
|
} |
3876
|
0
|
|
|
|
|
|
break; |
3877
|
|
|
|
|
|
|
case 'S': |
3878
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_OCSP_SIGN", 20)) { |
3879
|
|
|
|
|
|
|
/* ^ */ |
3880
|
|
|
|
|
|
|
|
3881
|
|
|
|
|
|
|
#ifdef X509_TRUST_OCSP_SIGN |
3882
|
1
|
|
|
|
|
|
return X509_TRUST_OCSP_SIGN; |
3883
|
|
|
|
|
|
|
#else |
3884
|
|
|
|
|
|
|
goto not_there; |
3885
|
|
|
|
|
|
|
#endif |
3886
|
|
|
|
|
|
|
|
3887
|
|
|
|
|
|
|
} |
3888
|
0
|
|
|
|
|
|
break; |
3889
|
|
|
|
|
|
|
case 'T': |
3890
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_CLIENT_HELLO", 20)) { |
3891
|
|
|
|
|
|
|
/* ^ */ |
3892
|
|
|
|
|
|
|
|
3893
|
|
|
|
|
|
|
#ifdef SSL2_MT_CLIENT_HELLO |
3894
|
1
|
|
|
|
|
|
return SSL2_MT_CLIENT_HELLO; |
3895
|
|
|
|
|
|
|
#else |
3896
|
|
|
|
|
|
|
goto not_there; |
3897
|
|
|
|
|
|
|
#endif |
3898
|
|
|
|
|
|
|
|
3899
|
|
|
|
|
|
|
} |
3900
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CLIENT_HELLO", 20)) { |
3901
|
|
|
|
|
|
|
/* ^ */ |
3902
|
|
|
|
|
|
|
|
3903
|
|
|
|
|
|
|
#ifdef SSL3_MT_CLIENT_HELLO |
3904
|
1
|
|
|
|
|
|
return SSL3_MT_CLIENT_HELLO; |
3905
|
|
|
|
|
|
|
#else |
3906
|
|
|
|
|
|
|
goto not_there; |
3907
|
|
|
|
|
|
|
#endif |
3908
|
|
|
|
|
|
|
|
3909
|
|
|
|
|
|
|
} |
3910
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PATH_LOOP", 20)) { |
3911
|
|
|
|
|
|
|
/* ^ */ |
3912
|
|
|
|
|
|
|
|
3913
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PATH_LOOP |
3914
|
|
|
|
|
|
|
return X509_V_ERR_PATH_LOOP; |
3915
|
|
|
|
|
|
|
#else |
3916
|
1
|
|
|
|
|
|
goto not_there; |
3917
|
|
|
|
|
|
|
#endif |
3918
|
|
|
|
|
|
|
|
3919
|
|
|
|
|
|
|
} |
3920
|
0
|
|
|
|
|
|
break; |
3921
|
|
|
|
|
|
|
case 'V': |
3922
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_PRIVATEKEY", 20)) { |
3923
|
|
|
|
|
|
|
/* ^ */ |
3924
|
|
|
|
|
|
|
|
3925
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_PRIVATEKEY |
3926
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_PRIVATEKEY; |
3927
|
|
|
|
|
|
|
#else |
3928
|
|
|
|
|
|
|
goto not_there; |
3929
|
|
|
|
|
|
|
#endif |
3930
|
|
|
|
|
|
|
|
3931
|
|
|
|
|
|
|
} |
3932
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESSION_ASN1_VERSION", 20)) { |
3933
|
|
|
|
|
|
|
/* ^ */ |
3934
|
|
|
|
|
|
|
|
3935
|
|
|
|
|
|
|
#ifdef SSL_SESSION_ASN1_VERSION |
3936
|
1
|
|
|
|
|
|
return SSL_SESSION_ASN1_VERSION; |
3937
|
|
|
|
|
|
|
#else |
3938
|
|
|
|
|
|
|
goto not_there; |
3939
|
|
|
|
|
|
|
#endif |
3940
|
|
|
|
|
|
|
|
3941
|
|
|
|
|
|
|
} |
3942
|
0
|
|
|
|
|
|
break; |
3943
|
|
|
|
|
|
|
case 'W': |
3944
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_ripemd160WithRSA", 20)) { |
3945
|
|
|
|
|
|
|
/* ^ */ |
3946
|
|
|
|
|
|
|
|
3947
|
|
|
|
|
|
|
#ifdef NID_ripemd160WithRSA |
3948
|
1
|
|
|
|
|
|
return NID_ripemd160WithRSA; |
3949
|
|
|
|
|
|
|
#else |
3950
|
|
|
|
|
|
|
goto not_there; |
3951
|
|
|
|
|
|
|
#endif |
3952
|
|
|
|
|
|
|
|
3953
|
|
|
|
|
|
|
} |
3954
|
0
|
|
|
|
|
|
break; |
3955
|
|
|
|
|
|
|
case 'Y': |
3956
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_ASYNC_JOB", 20)) { |
3957
|
|
|
|
|
|
|
/* ^ */ |
3958
|
|
|
|
|
|
|
|
3959
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_ASYNC_JOB |
3960
|
|
|
|
|
|
|
return SSL_ERROR_WANT_ASYNC_JOB; |
3961
|
|
|
|
|
|
|
#else |
3962
|
1
|
|
|
|
|
|
goto not_there; |
3963
|
|
|
|
|
|
|
#endif |
3964
|
|
|
|
|
|
|
|
3965
|
|
|
|
|
|
|
} |
3966
|
0
|
|
|
|
|
|
break; |
3967
|
|
|
|
|
|
|
case '_': |
3968
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_PRIORITIZE_CHACHA", 20)) { |
3969
|
|
|
|
|
|
|
/* ^ */ |
3970
|
|
|
|
|
|
|
|
3971
|
|
|
|
|
|
|
#ifdef SSL_OP_PRIORITIZE_CHACHA |
3972
|
|
|
|
|
|
|
return SSL_OP_PRIORITIZE_CHACHA; |
3973
|
|
|
|
|
|
|
#else |
3974
|
1
|
|
|
|
|
|
goto not_there; |
3975
|
|
|
|
|
|
|
#endif |
3976
|
|
|
|
|
|
|
|
3977
|
|
|
|
|
|
|
} |
3978
|
0
|
|
|
|
|
|
break; |
3979
|
|
|
|
|
|
|
case 'c': |
3980
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_comment", 20)) { |
3981
|
|
|
|
|
|
|
/* ^ */ |
3982
|
|
|
|
|
|
|
|
3983
|
|
|
|
|
|
|
#ifdef NID_netscape_comment |
3984
|
1
|
|
|
|
|
|
return NID_netscape_comment; |
3985
|
|
|
|
|
|
|
#else |
3986
|
|
|
|
|
|
|
goto not_there; |
3987
|
|
|
|
|
|
|
#endif |
3988
|
|
|
|
|
|
|
|
3989
|
|
|
|
|
|
|
} |
3990
|
0
|
|
|
|
|
|
break; |
3991
|
|
|
|
|
|
|
case 'i': |
3992
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_organizationName", 20)) { |
3993
|
|
|
|
|
|
|
/* ^ */ |
3994
|
|
|
|
|
|
|
|
3995
|
|
|
|
|
|
|
#ifdef NID_organizationName |
3996
|
1
|
|
|
|
|
|
return NID_organizationName; |
3997
|
|
|
|
|
|
|
#else |
3998
|
|
|
|
|
|
|
goto not_there; |
3999
|
|
|
|
|
|
|
#endif |
4000
|
|
|
|
|
|
|
|
4001
|
|
|
|
|
|
|
} |
4002
|
0
|
|
|
|
|
|
break; |
4003
|
|
|
|
|
|
|
case 'l': |
4004
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_subject_alt_name", 20)) { |
4005
|
|
|
|
|
|
|
/* ^ */ |
4006
|
|
|
|
|
|
|
|
4007
|
|
|
|
|
|
|
#ifdef NID_subject_alt_name |
4008
|
2
|
|
|
|
|
|
return NID_subject_alt_name; |
4009
|
|
|
|
|
|
|
#else |
4010
|
|
|
|
|
|
|
goto not_there; |
4011
|
|
|
|
|
|
|
#endif |
4012
|
|
|
|
|
|
|
|
4013
|
|
|
|
|
|
|
} |
4014
|
0
|
|
|
|
|
|
break; |
4015
|
|
|
|
|
|
|
case 'n': |
4016
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_uniqueIdentifier", 20)) { |
4017
|
|
|
|
|
|
|
/* ^ */ |
4018
|
|
|
|
|
|
|
|
4019
|
|
|
|
|
|
|
#ifdef NID_uniqueIdentifier |
4020
|
|
|
|
|
|
|
return NID_uniqueIdentifier; |
4021
|
|
|
|
|
|
|
#else |
4022
|
1
|
|
|
|
|
|
goto not_there; |
4023
|
|
|
|
|
|
|
#endif |
4024
|
|
|
|
|
|
|
|
4025
|
|
|
|
|
|
|
} |
4026
|
0
|
|
|
|
|
|
break; |
4027
|
|
|
|
|
|
|
case 'r': |
4028
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_zlib_compression", 20)) { |
4029
|
|
|
|
|
|
|
/* ^ */ |
4030
|
|
|
|
|
|
|
|
4031
|
|
|
|
|
|
|
#ifdef NID_zlib_compression |
4032
|
1
|
|
|
|
|
|
return NID_zlib_compression; |
4033
|
|
|
|
|
|
|
#else |
4034
|
|
|
|
|
|
|
goto not_there; |
4035
|
|
|
|
|
|
|
#endif |
4036
|
|
|
|
|
|
|
|
4037
|
|
|
|
|
|
|
} |
4038
|
0
|
|
|
|
|
|
break; |
4039
|
|
|
|
|
|
|
} |
4040
|
0
|
|
|
|
|
|
break; |
4041
|
|
|
|
|
|
|
case 21: |
4042
|
|
|
|
|
|
|
/* Names all of length 21. */ |
4043
|
|
|
|
|
|
|
/* ASN1_STRFLGS_ESC_CTRL F_GET_CLIENT_FINISHED F_GET_SERVER_FINISHED |
4044
|
|
|
|
|
|
|
F_REQUEST_CERTIFICATE F_SSL_GET_NEW_SESSION F_SSL_USE_CERTIFICATE |
4045
|
|
|
|
|
|
|
NID_SMIMECapabilities NID_basic_constraints NID_netscape_base_url |
4046
|
|
|
|
|
|
|
NID_pkcs9_contentType NID_pkcs9_signingTime OPENSSL_VERSION_MAJOR |
4047
|
|
|
|
|
|
|
OPENSSL_VERSION_MINOR OPENSSL_VERSION_PATCH OP_NETSCAPE_CA_DN_BUG |
4048
|
|
|
|
|
|
|
SSL2_MT_SERVER_VERIFY SSL3_MT_HELLO_REQUEST VERIFY_POST_HANDSHAKE |
4049
|
|
|
|
|
|
|
X509_FILETYPE_DEFAULT X509_PURPOSE_CRL_SIGN X509_TRUST_SSL_CLIENT |
4050
|
|
|
|
|
|
|
X509_TRUST_SSL_SERVER X509_V_ERR_INVALID_CA X509_V_ERR_OUT_OF_MEM |
4051
|
|
|
|
|
|
|
X509_V_FLAG_CRL_CHECK XN_FLAG_SEP_CPLUS_SPC XN_FLAG_SEP_MULTILINE |
4052
|
|
|
|
|
|
|
XN_FLAG_SEP_SPLUS_SPC */ |
4053
|
|
|
|
|
|
|
/* Offset 19 gives the best switch position. */ |
4054
|
29
|
|
|
|
|
|
switch (name[19]) { |
4055
|
|
|
|
|
|
|
case 'C': |
4056
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSION_PATCH", 21)) { |
4057
|
|
|
|
|
|
|
/* ^ */ |
4058
|
|
|
|
|
|
|
|
4059
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION_PATCH |
4060
|
|
|
|
|
|
|
return OPENSSL_VERSION_PATCH; |
4061
|
|
|
|
|
|
|
#else |
4062
|
1
|
|
|
|
|
|
goto not_there; |
4063
|
|
|
|
|
|
|
#endif |
4064
|
|
|
|
|
|
|
|
4065
|
|
|
|
|
|
|
} |
4066
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_CA", 21)) { |
4067
|
|
|
|
|
|
|
/* ^ */ |
4068
|
|
|
|
|
|
|
|
4069
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_CA |
4070
|
1
|
|
|
|
|
|
return X509_V_ERR_INVALID_CA; |
4071
|
|
|
|
|
|
|
#else |
4072
|
|
|
|
|
|
|
goto not_there; |
4073
|
|
|
|
|
|
|
#endif |
4074
|
|
|
|
|
|
|
|
4075
|
|
|
|
|
|
|
} |
4076
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_CRL_CHECK", 21)) { |
4077
|
|
|
|
|
|
|
/* ^ */ |
4078
|
|
|
|
|
|
|
|
4079
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_CRL_CHECK |
4080
|
1
|
|
|
|
|
|
return X509_V_FLAG_CRL_CHECK; |
4081
|
|
|
|
|
|
|
#else |
4082
|
|
|
|
|
|
|
goto not_there; |
4083
|
|
|
|
|
|
|
#endif |
4084
|
|
|
|
|
|
|
|
4085
|
|
|
|
|
|
|
} |
4086
|
0
|
|
|
|
|
|
break; |
4087
|
|
|
|
|
|
|
case 'E': |
4088
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "F_GET_CLIENT_FINISHED", 21)) { |
4089
|
|
|
|
|
|
|
/* ^ */ |
4090
|
|
|
|
|
|
|
|
4091
|
|
|
|
|
|
|
#ifdef SSL_F_GET_CLIENT_FINISHED |
4092
|
1
|
|
|
|
|
|
return SSL_F_GET_CLIENT_FINISHED; |
4093
|
|
|
|
|
|
|
#else |
4094
|
|
|
|
|
|
|
goto not_there; |
4095
|
|
|
|
|
|
|
#endif |
4096
|
|
|
|
|
|
|
|
4097
|
|
|
|
|
|
|
} |
4098
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_GET_SERVER_FINISHED", 21)) { |
4099
|
|
|
|
|
|
|
/* ^ */ |
4100
|
|
|
|
|
|
|
|
4101
|
|
|
|
|
|
|
#ifdef SSL_F_GET_SERVER_FINISHED |
4102
|
1
|
|
|
|
|
|
return SSL_F_GET_SERVER_FINISHED; |
4103
|
|
|
|
|
|
|
#else |
4104
|
|
|
|
|
|
|
goto not_there; |
4105
|
|
|
|
|
|
|
#endif |
4106
|
|
|
|
|
|
|
|
4107
|
|
|
|
|
|
|
} |
4108
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_SSL_SERVER", 21)) { |
4109
|
|
|
|
|
|
|
/* ^ */ |
4110
|
|
|
|
|
|
|
|
4111
|
|
|
|
|
|
|
#ifdef X509_TRUST_SSL_SERVER |
4112
|
1
|
|
|
|
|
|
return X509_TRUST_SSL_SERVER; |
4113
|
|
|
|
|
|
|
#else |
4114
|
|
|
|
|
|
|
goto not_there; |
4115
|
|
|
|
|
|
|
#endif |
4116
|
|
|
|
|
|
|
|
4117
|
|
|
|
|
|
|
} |
4118
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_OUT_OF_MEM", 21)) { |
4119
|
|
|
|
|
|
|
/* ^ */ |
4120
|
|
|
|
|
|
|
|
4121
|
|
|
|
|
|
|
#ifdef X509_V_ERR_OUT_OF_MEM |
4122
|
1
|
|
|
|
|
|
return X509_V_ERR_OUT_OF_MEM; |
4123
|
|
|
|
|
|
|
#else |
4124
|
|
|
|
|
|
|
goto not_there; |
4125
|
|
|
|
|
|
|
#endif |
4126
|
|
|
|
|
|
|
|
4127
|
|
|
|
|
|
|
} |
4128
|
0
|
|
|
|
|
|
break; |
4129
|
|
|
|
|
|
|
case 'F': |
4130
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_SERVER_VERIFY", 21)) { |
4131
|
|
|
|
|
|
|
/* ^ */ |
4132
|
|
|
|
|
|
|
|
4133
|
|
|
|
|
|
|
#ifdef SSL2_MT_SERVER_VERIFY |
4134
|
1
|
|
|
|
|
|
return SSL2_MT_SERVER_VERIFY; |
4135
|
|
|
|
|
|
|
#else |
4136
|
|
|
|
|
|
|
goto not_there; |
4137
|
|
|
|
|
|
|
#endif |
4138
|
|
|
|
|
|
|
|
4139
|
|
|
|
|
|
|
} |
4140
|
0
|
|
|
|
|
|
break; |
4141
|
|
|
|
|
|
|
case 'G': |
4142
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_CRL_SIGN", 21)) { |
4143
|
|
|
|
|
|
|
/* ^ */ |
4144
|
|
|
|
|
|
|
|
4145
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_CRL_SIGN |
4146
|
1
|
|
|
|
|
|
return X509_PURPOSE_CRL_SIGN; |
4147
|
|
|
|
|
|
|
#else |
4148
|
|
|
|
|
|
|
goto not_there; |
4149
|
|
|
|
|
|
|
#endif |
4150
|
|
|
|
|
|
|
|
4151
|
|
|
|
|
|
|
} |
4152
|
0
|
|
|
|
|
|
break; |
4153
|
|
|
|
|
|
|
case 'K': |
4154
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "VERIFY_POST_HANDSHAKE", 21)) { |
4155
|
|
|
|
|
|
|
/* ^ */ |
4156
|
|
|
|
|
|
|
|
4157
|
|
|
|
|
|
|
#ifdef SSL_VERIFY_POST_HANDSHAKE |
4158
|
|
|
|
|
|
|
return SSL_VERIFY_POST_HANDSHAKE; |
4159
|
|
|
|
|
|
|
#else |
4160
|
1
|
|
|
|
|
|
goto not_there; |
4161
|
|
|
|
|
|
|
#endif |
4162
|
|
|
|
|
|
|
|
4163
|
|
|
|
|
|
|
} |
4164
|
0
|
|
|
|
|
|
break; |
4165
|
|
|
|
|
|
|
case 'L': |
4166
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_FILETYPE_DEFAULT", 21)) { |
4167
|
|
|
|
|
|
|
/* ^ */ |
4168
|
|
|
|
|
|
|
|
4169
|
|
|
|
|
|
|
#ifdef X509_FILETYPE_DEFAULT |
4170
|
1
|
|
|
|
|
|
return X509_FILETYPE_DEFAULT; |
4171
|
|
|
|
|
|
|
#else |
4172
|
|
|
|
|
|
|
goto not_there; |
4173
|
|
|
|
|
|
|
#endif |
4174
|
|
|
|
|
|
|
|
4175
|
|
|
|
|
|
|
} |
4176
|
0
|
|
|
|
|
|
break; |
4177
|
|
|
|
|
|
|
case 'N': |
4178
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_SSL_CLIENT", 21)) { |
4179
|
|
|
|
|
|
|
/* ^ */ |
4180
|
|
|
|
|
|
|
|
4181
|
|
|
|
|
|
|
#ifdef X509_TRUST_SSL_CLIENT |
4182
|
1
|
|
|
|
|
|
return X509_TRUST_SSL_CLIENT; |
4183
|
|
|
|
|
|
|
#else |
4184
|
|
|
|
|
|
|
goto not_there; |
4185
|
|
|
|
|
|
|
#endif |
4186
|
|
|
|
|
|
|
|
4187
|
|
|
|
|
|
|
} |
4188
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SEP_MULTILINE", 21)) { |
4189
|
|
|
|
|
|
|
/* ^ */ |
4190
|
|
|
|
|
|
|
|
4191
|
|
|
|
|
|
|
#ifdef XN_FLAG_SEP_MULTILINE |
4192
|
1
|
|
|
|
|
|
return XN_FLAG_SEP_MULTILINE; |
4193
|
|
|
|
|
|
|
#else |
4194
|
|
|
|
|
|
|
goto not_there; |
4195
|
|
|
|
|
|
|
#endif |
4196
|
|
|
|
|
|
|
|
4197
|
|
|
|
|
|
|
} |
4198
|
0
|
|
|
|
|
|
break; |
4199
|
|
|
|
|
|
|
case 'O': |
4200
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_GET_NEW_SESSION", 21)) { |
4201
|
|
|
|
|
|
|
/* ^ */ |
4202
|
|
|
|
|
|
|
|
4203
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_GET_NEW_SESSION |
4204
|
1
|
|
|
|
|
|
return SSL_F_SSL_GET_NEW_SESSION; |
4205
|
|
|
|
|
|
|
#else |
4206
|
|
|
|
|
|
|
goto not_there; |
4207
|
|
|
|
|
|
|
#endif |
4208
|
|
|
|
|
|
|
|
4209
|
|
|
|
|
|
|
} |
4210
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSION_MAJOR", 21)) { |
4211
|
|
|
|
|
|
|
/* ^ */ |
4212
|
|
|
|
|
|
|
|
4213
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION_MAJOR |
4214
|
|
|
|
|
|
|
return OPENSSL_VERSION_MAJOR; |
4215
|
|
|
|
|
|
|
#else |
4216
|
1
|
|
|
|
|
|
goto not_there; |
4217
|
|
|
|
|
|
|
#endif |
4218
|
|
|
|
|
|
|
|
4219
|
|
|
|
|
|
|
} |
4220
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSION_MINOR", 21)) { |
4221
|
|
|
|
|
|
|
/* ^ */ |
4222
|
|
|
|
|
|
|
|
4223
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION_MINOR |
4224
|
|
|
|
|
|
|
return OPENSSL_VERSION_MINOR; |
4225
|
|
|
|
|
|
|
#else |
4226
|
1
|
|
|
|
|
|
goto not_there; |
4227
|
|
|
|
|
|
|
#endif |
4228
|
|
|
|
|
|
|
|
4229
|
|
|
|
|
|
|
} |
4230
|
0
|
|
|
|
|
|
break; |
4231
|
|
|
|
|
|
|
case 'P': |
4232
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SEP_CPLUS_SPC", 21)) { |
4233
|
|
|
|
|
|
|
/* ^ */ |
4234
|
|
|
|
|
|
|
|
4235
|
|
|
|
|
|
|
#ifdef XN_FLAG_SEP_CPLUS_SPC |
4236
|
1
|
|
|
|
|
|
return XN_FLAG_SEP_CPLUS_SPC; |
4237
|
|
|
|
|
|
|
#else |
4238
|
|
|
|
|
|
|
goto not_there; |
4239
|
|
|
|
|
|
|
#endif |
4240
|
|
|
|
|
|
|
|
4241
|
|
|
|
|
|
|
} |
4242
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SEP_SPLUS_SPC", 21)) { |
4243
|
|
|
|
|
|
|
/* ^ */ |
4244
|
|
|
|
|
|
|
|
4245
|
|
|
|
|
|
|
#ifdef XN_FLAG_SEP_SPLUS_SPC |
4246
|
1
|
|
|
|
|
|
return XN_FLAG_SEP_SPLUS_SPC; |
4247
|
|
|
|
|
|
|
#else |
4248
|
|
|
|
|
|
|
goto not_there; |
4249
|
|
|
|
|
|
|
#endif |
4250
|
|
|
|
|
|
|
|
4251
|
|
|
|
|
|
|
} |
4252
|
0
|
|
|
|
|
|
break; |
4253
|
|
|
|
|
|
|
case 'R': |
4254
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ASN1_STRFLGS_ESC_CTRL", 21)) { |
4255
|
|
|
|
|
|
|
/* ^ */ |
4256
|
|
|
|
|
|
|
|
4257
|
|
|
|
|
|
|
#ifdef ASN1_STRFLGS_ESC_CTRL |
4258
|
1
|
|
|
|
|
|
return ASN1_STRFLGS_ESC_CTRL; |
4259
|
|
|
|
|
|
|
#else |
4260
|
|
|
|
|
|
|
goto not_there; |
4261
|
|
|
|
|
|
|
#endif |
4262
|
|
|
|
|
|
|
|
4263
|
|
|
|
|
|
|
} |
4264
|
0
|
|
|
|
|
|
break; |
4265
|
|
|
|
|
|
|
case 'S': |
4266
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_HELLO_REQUEST", 21)) { |
4267
|
|
|
|
|
|
|
/* ^ */ |
4268
|
|
|
|
|
|
|
|
4269
|
|
|
|
|
|
|
#ifdef SSL3_MT_HELLO_REQUEST |
4270
|
1
|
|
|
|
|
|
return SSL3_MT_HELLO_REQUEST; |
4271
|
|
|
|
|
|
|
#else |
4272
|
|
|
|
|
|
|
goto not_there; |
4273
|
|
|
|
|
|
|
#endif |
4274
|
|
|
|
|
|
|
|
4275
|
|
|
|
|
|
|
} |
4276
|
0
|
|
|
|
|
|
break; |
4277
|
|
|
|
|
|
|
case 'T': |
4278
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_REQUEST_CERTIFICATE", 21)) { |
4279
|
|
|
|
|
|
|
/* ^ */ |
4280
|
|
|
|
|
|
|
|
4281
|
|
|
|
|
|
|
#ifdef SSL_F_REQUEST_CERTIFICATE |
4282
|
1
|
|
|
|
|
|
return SSL_F_REQUEST_CERTIFICATE; |
4283
|
|
|
|
|
|
|
#else |
4284
|
|
|
|
|
|
|
goto not_there; |
4285
|
|
|
|
|
|
|
#endif |
4286
|
|
|
|
|
|
|
|
4287
|
|
|
|
|
|
|
} |
4288
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_CERTIFICATE", 21)) { |
4289
|
|
|
|
|
|
|
/* ^ */ |
4290
|
|
|
|
|
|
|
|
4291
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_CERTIFICATE |
4292
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_CERTIFICATE; |
4293
|
|
|
|
|
|
|
#else |
4294
|
|
|
|
|
|
|
goto not_there; |
4295
|
|
|
|
|
|
|
#endif |
4296
|
|
|
|
|
|
|
|
4297
|
|
|
|
|
|
|
} |
4298
|
0
|
|
|
|
|
|
break; |
4299
|
|
|
|
|
|
|
case 'U': |
4300
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NETSCAPE_CA_DN_BUG", 21)) { |
4301
|
|
|
|
|
|
|
/* ^ */ |
4302
|
|
|
|
|
|
|
|
4303
|
|
|
|
|
|
|
#ifdef SSL_OP_NETSCAPE_CA_DN_BUG |
4304
|
1
|
|
|
|
|
|
return SSL_OP_NETSCAPE_CA_DN_BUG; |
4305
|
|
|
|
|
|
|
#else |
4306
|
|
|
|
|
|
|
goto not_there; |
4307
|
|
|
|
|
|
|
#endif |
4308
|
|
|
|
|
|
|
|
4309
|
|
|
|
|
|
|
} |
4310
|
0
|
|
|
|
|
|
break; |
4311
|
|
|
|
|
|
|
case 'e': |
4312
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_SMIMECapabilities", 21)) { |
4313
|
|
|
|
|
|
|
/* ^ */ |
4314
|
|
|
|
|
|
|
|
4315
|
|
|
|
|
|
|
#ifdef NID_SMIMECapabilities |
4316
|
1
|
|
|
|
|
|
return NID_SMIMECapabilities; |
4317
|
|
|
|
|
|
|
#else |
4318
|
|
|
|
|
|
|
goto not_there; |
4319
|
|
|
|
|
|
|
#endif |
4320
|
|
|
|
|
|
|
|
4321
|
|
|
|
|
|
|
} |
4322
|
0
|
|
|
|
|
|
break; |
4323
|
|
|
|
|
|
|
case 'm': |
4324
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_signingTime", 21)) { |
4325
|
|
|
|
|
|
|
/* ^ */ |
4326
|
|
|
|
|
|
|
|
4327
|
|
|
|
|
|
|
#ifdef NID_pkcs9_signingTime |
4328
|
1
|
|
|
|
|
|
return NID_pkcs9_signingTime; |
4329
|
|
|
|
|
|
|
#else |
4330
|
|
|
|
|
|
|
goto not_there; |
4331
|
|
|
|
|
|
|
#endif |
4332
|
|
|
|
|
|
|
|
4333
|
|
|
|
|
|
|
} |
4334
|
0
|
|
|
|
|
|
break; |
4335
|
|
|
|
|
|
|
case 'p': |
4336
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_contentType", 21)) { |
4337
|
|
|
|
|
|
|
/* ^ */ |
4338
|
|
|
|
|
|
|
|
4339
|
|
|
|
|
|
|
#ifdef NID_pkcs9_contentType |
4340
|
1
|
|
|
|
|
|
return NID_pkcs9_contentType; |
4341
|
|
|
|
|
|
|
#else |
4342
|
|
|
|
|
|
|
goto not_there; |
4343
|
|
|
|
|
|
|
#endif |
4344
|
|
|
|
|
|
|
|
4345
|
|
|
|
|
|
|
} |
4346
|
0
|
|
|
|
|
|
break; |
4347
|
|
|
|
|
|
|
case 'r': |
4348
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_base_url", 21)) { |
4349
|
|
|
|
|
|
|
/* ^ */ |
4350
|
|
|
|
|
|
|
|
4351
|
|
|
|
|
|
|
#ifdef NID_netscape_base_url |
4352
|
1
|
|
|
|
|
|
return NID_netscape_base_url; |
4353
|
|
|
|
|
|
|
#else |
4354
|
|
|
|
|
|
|
goto not_there; |
4355
|
|
|
|
|
|
|
#endif |
4356
|
|
|
|
|
|
|
|
4357
|
|
|
|
|
|
|
} |
4358
|
0
|
|
|
|
|
|
break; |
4359
|
|
|
|
|
|
|
case 't': |
4360
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_basic_constraints", 21)) { |
4361
|
|
|
|
|
|
|
/* ^ */ |
4362
|
|
|
|
|
|
|
|
4363
|
|
|
|
|
|
|
#ifdef NID_basic_constraints |
4364
|
2
|
|
|
|
|
|
return NID_basic_constraints; |
4365
|
|
|
|
|
|
|
#else |
4366
|
|
|
|
|
|
|
goto not_there; |
4367
|
|
|
|
|
|
|
#endif |
4368
|
|
|
|
|
|
|
|
4369
|
|
|
|
|
|
|
} |
4370
|
0
|
|
|
|
|
|
break; |
4371
|
|
|
|
|
|
|
} |
4372
|
0
|
|
|
|
|
|
break; |
4373
|
|
|
|
|
|
|
case 22: |
4374
|
|
|
|
|
|
|
/* Names all of length 22. */ |
4375
|
|
|
|
|
|
|
/* ASN1_STRFLGS_ESC_QUOTE ERROR_WANT_X509_LOOKUP F_SSL_SESSION_PRINT_FP |
4376
|
|
|
|
|
|
|
NID_netscape_cert_type NID_netscape_data_type NID_pkcs9_emailAddress |
4377
|
|
|
|
|
|
|
OPENSSL_VERSION_NUMBER OPENSSL_VERSION_STRING OP_NO_ENCRYPT_THEN_MAC |
4378
|
|
|
|
|
|
|
R_PEER_ERROR_NO_CIPHER SESS_CACHE_NO_INTERNAL SESS_CACHE_UPDATE_TIME |
4379
|
|
|
|
|
|
|
TLSEXT_STATUSTYPE_ocsp V_OCSP_CERTSTATUS_GOOD X509_TRUST_OBJECT_SIGN |
4380
|
|
|
|
|
|
|
X509_V_ERR_UNSPECIFIED X509_V_FLAG_USE_DELTAS XN_FLAG_SEP_COMMA_PLUS */ |
4381
|
|
|
|
|
|
|
/* Offset 18 gives the best switch position. */ |
4382
|
181
|
|
|
|
|
|
switch (name[18]) { |
4383
|
|
|
|
|
|
|
case 'F': |
4384
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSPECIFIED", 22)) { |
4385
|
|
|
|
|
|
|
/* ^ */ |
4386
|
|
|
|
|
|
|
|
4387
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSPECIFIED |
4388
|
1
|
|
|
|
|
|
return X509_V_ERR_UNSPECIFIED; |
4389
|
|
|
|
|
|
|
#else |
4390
|
|
|
|
|
|
|
goto not_there; |
4391
|
|
|
|
|
|
|
#endif |
4392
|
|
|
|
|
|
|
|
4393
|
|
|
|
|
|
|
} |
4394
|
0
|
|
|
|
|
|
break; |
4395
|
|
|
|
|
|
|
case 'G': |
4396
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "V_OCSP_CERTSTATUS_GOOD", 22)) { |
4397
|
|
|
|
|
|
|
/* ^ */ |
4398
|
|
|
|
|
|
|
|
4399
|
|
|
|
|
|
|
#ifdef V_OCSP_CERTSTATUS_GOOD |
4400
|
1
|
|
|
|
|
|
return V_OCSP_CERTSTATUS_GOOD; |
4401
|
|
|
|
|
|
|
#else |
4402
|
|
|
|
|
|
|
goto not_there; |
4403
|
|
|
|
|
|
|
#endif |
4404
|
|
|
|
|
|
|
|
4405
|
|
|
|
|
|
|
} |
4406
|
0
|
|
|
|
|
|
break; |
4407
|
|
|
|
|
|
|
case 'L': |
4408
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_USE_DELTAS", 22)) { |
4409
|
|
|
|
|
|
|
/* ^ */ |
4410
|
|
|
|
|
|
|
|
4411
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_USE_DELTAS |
4412
|
1
|
|
|
|
|
|
return X509_V_FLAG_USE_DELTAS; |
4413
|
|
|
|
|
|
|
#else |
4414
|
|
|
|
|
|
|
goto not_there; |
4415
|
|
|
|
|
|
|
#endif |
4416
|
|
|
|
|
|
|
|
4417
|
|
|
|
|
|
|
} |
4418
|
0
|
|
|
|
|
|
break; |
4419
|
|
|
|
|
|
|
case 'M': |
4420
|
163
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSION_NUMBER", 22)) { |
4421
|
|
|
|
|
|
|
/* ^ */ |
4422
|
|
|
|
|
|
|
|
4423
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION_NUMBER |
4424
|
163
|
|
|
|
|
|
return OPENSSL_VERSION_NUMBER; |
4425
|
|
|
|
|
|
|
#else |
4426
|
|
|
|
|
|
|
goto not_there; |
4427
|
|
|
|
|
|
|
#endif |
4428
|
|
|
|
|
|
|
|
4429
|
|
|
|
|
|
|
} |
4430
|
0
|
|
|
|
|
|
break; |
4431
|
|
|
|
|
|
|
case 'O': |
4432
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_X509_LOOKUP", 22)) { |
4433
|
|
|
|
|
|
|
/* ^ */ |
4434
|
|
|
|
|
|
|
|
4435
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_X509_LOOKUP |
4436
|
1
|
|
|
|
|
|
return SSL_ERROR_WANT_X509_LOOKUP; |
4437
|
|
|
|
|
|
|
#else |
4438
|
|
|
|
|
|
|
goto not_there; |
4439
|
|
|
|
|
|
|
#endif |
4440
|
|
|
|
|
|
|
|
4441
|
|
|
|
|
|
|
} |
4442
|
0
|
|
|
|
|
|
break; |
4443
|
|
|
|
|
|
|
case 'P': |
4444
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "R_PEER_ERROR_NO_CIPHER", 22)) { |
4445
|
|
|
|
|
|
|
/* ^ */ |
4446
|
|
|
|
|
|
|
|
4447
|
|
|
|
|
|
|
#ifdef SSL_R_PEER_ERROR_NO_CIPHER |
4448
|
1
|
|
|
|
|
|
return SSL_R_PEER_ERROR_NO_CIPHER; |
4449
|
|
|
|
|
|
|
#else |
4450
|
|
|
|
|
|
|
goto not_there; |
4451
|
|
|
|
|
|
|
#endif |
4452
|
|
|
|
|
|
|
|
4453
|
|
|
|
|
|
|
} |
4454
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_SEP_COMMA_PLUS", 22)) { |
4455
|
|
|
|
|
|
|
/* ^ */ |
4456
|
|
|
|
|
|
|
|
4457
|
|
|
|
|
|
|
#ifdef XN_FLAG_SEP_COMMA_PLUS |
4458
|
1
|
|
|
|
|
|
return XN_FLAG_SEP_COMMA_PLUS; |
4459
|
|
|
|
|
|
|
#else |
4460
|
|
|
|
|
|
|
goto not_there; |
4461
|
|
|
|
|
|
|
#endif |
4462
|
|
|
|
|
|
|
|
4463
|
|
|
|
|
|
|
} |
4464
|
0
|
|
|
|
|
|
break; |
4465
|
|
|
|
|
|
|
case 'R': |
4466
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_VERSION_STRING", 22)) { |
4467
|
|
|
|
|
|
|
/* ^ */ |
4468
|
|
|
|
|
|
|
|
4469
|
|
|
|
|
|
|
#ifdef OPENSSL_VERSION_STRING |
4470
|
|
|
|
|
|
|
return OPENSSL_VERSION_STRING; |
4471
|
|
|
|
|
|
|
#else |
4472
|
1
|
|
|
|
|
|
goto not_there; |
4473
|
|
|
|
|
|
|
#endif |
4474
|
|
|
|
|
|
|
|
4475
|
|
|
|
|
|
|
} |
4476
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_NO_INTERNAL", 22)) { |
4477
|
|
|
|
|
|
|
/* ^ */ |
4478
|
|
|
|
|
|
|
|
4479
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_NO_INTERNAL |
4480
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_NO_INTERNAL; |
4481
|
|
|
|
|
|
|
#else |
4482
|
|
|
|
|
|
|
goto not_there; |
4483
|
|
|
|
|
|
|
#endif |
4484
|
|
|
|
|
|
|
|
4485
|
|
|
|
|
|
|
} |
4486
|
0
|
|
|
|
|
|
break; |
4487
|
|
|
|
|
|
|
case 'S': |
4488
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_OBJECT_SIGN", 22)) { |
4489
|
|
|
|
|
|
|
/* ^ */ |
4490
|
|
|
|
|
|
|
|
4491
|
|
|
|
|
|
|
#ifdef X509_TRUST_OBJECT_SIGN |
4492
|
1
|
|
|
|
|
|
return X509_TRUST_OBJECT_SIGN; |
4493
|
|
|
|
|
|
|
#else |
4494
|
|
|
|
|
|
|
goto not_there; |
4495
|
|
|
|
|
|
|
#endif |
4496
|
|
|
|
|
|
|
|
4497
|
|
|
|
|
|
|
} |
4498
|
0
|
|
|
|
|
|
break; |
4499
|
|
|
|
|
|
|
case 'T': |
4500
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_SESSION_PRINT_FP", 22)) { |
4501
|
|
|
|
|
|
|
/* ^ */ |
4502
|
|
|
|
|
|
|
|
4503
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_SESSION_PRINT_FP |
4504
|
1
|
|
|
|
|
|
return SSL_F_SSL_SESSION_PRINT_FP; |
4505
|
|
|
|
|
|
|
#else |
4506
|
|
|
|
|
|
|
goto not_there; |
4507
|
|
|
|
|
|
|
#endif |
4508
|
|
|
|
|
|
|
|
4509
|
|
|
|
|
|
|
} |
4510
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_UPDATE_TIME", 22)) { |
4511
|
|
|
|
|
|
|
/* ^ */ |
4512
|
|
|
|
|
|
|
|
4513
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_UPDATE_TIME |
4514
|
|
|
|
|
|
|
return SSL_SESS_CACHE_UPDATE_TIME; |
4515
|
|
|
|
|
|
|
#else |
4516
|
1
|
|
|
|
|
|
goto not_there; |
4517
|
|
|
|
|
|
|
#endif |
4518
|
|
|
|
|
|
|
|
4519
|
|
|
|
|
|
|
} |
4520
|
0
|
|
|
|
|
|
break; |
4521
|
|
|
|
|
|
|
case 'U': |
4522
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "ASN1_STRFLGS_ESC_QUOTE", 22)) { |
4523
|
|
|
|
|
|
|
/* ^ */ |
4524
|
|
|
|
|
|
|
|
4525
|
|
|
|
|
|
|
#ifdef ASN1_STRFLGS_ESC_QUOTE |
4526
|
1
|
|
|
|
|
|
return ASN1_STRFLGS_ESC_QUOTE; |
4527
|
|
|
|
|
|
|
#else |
4528
|
|
|
|
|
|
|
goto not_there; |
4529
|
|
|
|
|
|
|
#endif |
4530
|
|
|
|
|
|
|
|
4531
|
|
|
|
|
|
|
} |
4532
|
0
|
|
|
|
|
|
break; |
4533
|
|
|
|
|
|
|
case '_': |
4534
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_ENCRYPT_THEN_MAC", 22)) { |
4535
|
|
|
|
|
|
|
/* ^ */ |
4536
|
|
|
|
|
|
|
|
4537
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_ENCRYPT_THEN_MAC |
4538
|
|
|
|
|
|
|
return SSL_OP_NO_ENCRYPT_THEN_MAC; |
4539
|
|
|
|
|
|
|
#else |
4540
|
1
|
|
|
|
|
|
goto not_there; |
4541
|
|
|
|
|
|
|
#endif |
4542
|
|
|
|
|
|
|
|
4543
|
|
|
|
|
|
|
} |
4544
|
0
|
|
|
|
|
|
break; |
4545
|
|
|
|
|
|
|
case 'o': |
4546
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "TLSEXT_STATUSTYPE_ocsp", 22)) { |
4547
|
|
|
|
|
|
|
/* ^ */ |
4548
|
|
|
|
|
|
|
|
4549
|
|
|
|
|
|
|
#ifdef TLSEXT_STATUSTYPE_ocsp |
4550
|
1
|
|
|
|
|
|
return TLSEXT_STATUSTYPE_ocsp; |
4551
|
|
|
|
|
|
|
#else |
4552
|
|
|
|
|
|
|
goto not_there; |
4553
|
|
|
|
|
|
|
#endif |
4554
|
|
|
|
|
|
|
|
4555
|
|
|
|
|
|
|
} |
4556
|
0
|
|
|
|
|
|
break; |
4557
|
|
|
|
|
|
|
case 'r': |
4558
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_emailAddress", 22)) { |
4559
|
|
|
|
|
|
|
/* ^ */ |
4560
|
|
|
|
|
|
|
|
4561
|
|
|
|
|
|
|
#ifdef NID_pkcs9_emailAddress |
4562
|
1
|
|
|
|
|
|
return NID_pkcs9_emailAddress; |
4563
|
|
|
|
|
|
|
#else |
4564
|
|
|
|
|
|
|
goto not_there; |
4565
|
|
|
|
|
|
|
#endif |
4566
|
|
|
|
|
|
|
|
4567
|
|
|
|
|
|
|
} |
4568
|
0
|
|
|
|
|
|
break; |
4569
|
|
|
|
|
|
|
case 't': |
4570
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_netscape_cert_type", 22)) { |
4571
|
|
|
|
|
|
|
/* ^ */ |
4572
|
|
|
|
|
|
|
|
4573
|
|
|
|
|
|
|
#ifdef NID_netscape_cert_type |
4574
|
2
|
|
|
|
|
|
return NID_netscape_cert_type; |
4575
|
|
|
|
|
|
|
#else |
4576
|
|
|
|
|
|
|
goto not_there; |
4577
|
|
|
|
|
|
|
#endif |
4578
|
|
|
|
|
|
|
|
4579
|
|
|
|
|
|
|
} |
4580
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_data_type", 22)) { |
4581
|
|
|
|
|
|
|
/* ^ */ |
4582
|
|
|
|
|
|
|
|
4583
|
|
|
|
|
|
|
#ifdef NID_netscape_data_type |
4584
|
1
|
|
|
|
|
|
return NID_netscape_data_type; |
4585
|
|
|
|
|
|
|
#else |
4586
|
|
|
|
|
|
|
goto not_there; |
4587
|
|
|
|
|
|
|
#endif |
4588
|
|
|
|
|
|
|
|
4589
|
|
|
|
|
|
|
} |
4590
|
0
|
|
|
|
|
|
break; |
4591
|
|
|
|
|
|
|
} |
4592
|
0
|
|
|
|
|
|
break; |
4593
|
|
|
|
|
|
|
case 23: |
4594
|
|
|
|
|
|
|
/* Names all of length 23. */ |
4595
|
|
|
|
|
|
|
/* ERROR_WANT_RETRY_VERIFY F_GET_CLIENT_MASTER_KEY F_SSL_USE_RSAPRIVATEKEY |
4596
|
|
|
|
|
|
|
LIBRESSL_VERSION_NUMBER NID_pkcs8ShroudedKeyBag NID_pkcs9_messageDigest |
4597
|
|
|
|
|
|
|
NID_stateOrProvinceName OPENSSL_INFO_CONFIG_DIR OP_CRYPTOPRO_TLSEXT_BUG |
4598
|
|
|
|
|
|
|
R_BAD_RESPONSE_ARGUMENT R_PUBLIC_KEY_IS_NOT_RSA SSL2_MT_CLIENT_FINISHED |
4599
|
|
|
|
|
|
|
SSL2_MT_SERVER_FINISHED SSL3_MT_CERTIFICATE_URL X509_PURPOSE_SMIME_SIGN |
4600
|
|
|
|
|
|
|
X509_PURPOSE_SSL_CLIENT X509_PURPOSE_SSL_SERVER X509_TRUST_OCSP_REQUEST |
4601
|
|
|
|
|
|
|
X509_V_ERR_CERT_REVOKED X509_V_ERR_INVALID_CALL X509_V_ERR_STORE_LOOKUP |
4602
|
|
|
|
|
|
|
X509_V_FLAG_INHIBIT_ANY X509_V_FLAG_INHIBIT_MAP X509_V_FLAG_POLICY_MASK |
4603
|
|
|
|
|
|
|
X509_V_FLAG_X509_STRICT */ |
4604
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
4605
|
33
|
|
|
|
|
|
switch (name[13]) { |
4606
|
|
|
|
|
|
|
case '5': |
4607
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_X509_STRICT", 23)) { |
4608
|
|
|
|
|
|
|
/* ^ */ |
4609
|
|
|
|
|
|
|
|
4610
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_X509_STRICT |
4611
|
1
|
|
|
|
|
|
return X509_V_FLAG_X509_STRICT; |
4612
|
|
|
|
|
|
|
#else |
4613
|
|
|
|
|
|
|
goto not_there; |
4614
|
|
|
|
|
|
|
#endif |
4615
|
|
|
|
|
|
|
|
4616
|
|
|
|
|
|
|
} |
4617
|
0
|
|
|
|
|
|
break; |
4618
|
|
|
|
|
|
|
case 'C': |
4619
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_CONFIG_DIR", 23)) { |
4620
|
|
|
|
|
|
|
/* ^ */ |
4621
|
|
|
|
|
|
|
|
4622
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_CONFIG_DIR |
4623
|
|
|
|
|
|
|
return OPENSSL_INFO_CONFIG_DIR; |
4624
|
|
|
|
|
|
|
#else |
4625
|
1
|
|
|
|
|
|
goto not_there; |
4626
|
|
|
|
|
|
|
#endif |
4627
|
|
|
|
|
|
|
|
4628
|
|
|
|
|
|
|
} |
4629
|
0
|
|
|
|
|
|
break; |
4630
|
|
|
|
|
|
|
case 'E': |
4631
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_BAD_RESPONSE_ARGUMENT", 23)) { |
4632
|
|
|
|
|
|
|
/* ^ */ |
4633
|
|
|
|
|
|
|
|
4634
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_RESPONSE_ARGUMENT |
4635
|
1
|
|
|
|
|
|
return SSL_R_BAD_RESPONSE_ARGUMENT; |
4636
|
|
|
|
|
|
|
#else |
4637
|
|
|
|
|
|
|
goto not_there; |
4638
|
|
|
|
|
|
|
#endif |
4639
|
|
|
|
|
|
|
|
4640
|
|
|
|
|
|
|
} |
4641
|
0
|
|
|
|
|
|
break; |
4642
|
|
|
|
|
|
|
case 'F': |
4643
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CERTIFICATE_URL", 23)) { |
4644
|
|
|
|
|
|
|
/* ^ */ |
4645
|
|
|
|
|
|
|
|
4646
|
|
|
|
|
|
|
#ifdef SSL3_MT_CERTIFICATE_URL |
4647
|
|
|
|
|
|
|
return SSL3_MT_CERTIFICATE_URL; |
4648
|
|
|
|
|
|
|
#else |
4649
|
1
|
|
|
|
|
|
goto not_there; |
4650
|
|
|
|
|
|
|
#endif |
4651
|
|
|
|
|
|
|
|
4652
|
|
|
|
|
|
|
} |
4653
|
0
|
|
|
|
|
|
break; |
4654
|
|
|
|
|
|
|
case 'I': |
4655
|
7
|
100
|
|
|
|
|
if (!memcmp(name, "LIBRESSL_VERSION_NUMBER", 23)) { |
4656
|
|
|
|
|
|
|
/* ^ */ |
4657
|
|
|
|
|
|
|
|
4658
|
|
|
|
|
|
|
#ifdef LIBRESSL_VERSION_NUMBER |
4659
|
|
|
|
|
|
|
return LIBRESSL_VERSION_NUMBER; |
4660
|
|
|
|
|
|
|
#else |
4661
|
6
|
|
|
|
|
|
goto not_there; |
4662
|
|
|
|
|
|
|
#endif |
4663
|
|
|
|
|
|
|
|
4664
|
|
|
|
|
|
|
} |
4665
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_PUBLIC_KEY_IS_NOT_RSA", 23)) { |
4666
|
|
|
|
|
|
|
/* ^ */ |
4667
|
|
|
|
|
|
|
|
4668
|
|
|
|
|
|
|
#ifdef SSL_R_PUBLIC_KEY_IS_NOT_RSA |
4669
|
1
|
|
|
|
|
|
return SSL_R_PUBLIC_KEY_IS_NOT_RSA; |
4670
|
|
|
|
|
|
|
#else |
4671
|
|
|
|
|
|
|
goto not_there; |
4672
|
|
|
|
|
|
|
#endif |
4673
|
|
|
|
|
|
|
|
4674
|
|
|
|
|
|
|
} |
4675
|
0
|
|
|
|
|
|
break; |
4676
|
|
|
|
|
|
|
case 'M': |
4677
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_GET_CLIENT_MASTER_KEY", 23)) { |
4678
|
|
|
|
|
|
|
/* ^ */ |
4679
|
|
|
|
|
|
|
|
4680
|
|
|
|
|
|
|
#ifdef SSL_F_GET_CLIENT_MASTER_KEY |
4681
|
1
|
|
|
|
|
|
return SSL_F_GET_CLIENT_MASTER_KEY; |
4682
|
|
|
|
|
|
|
#else |
4683
|
|
|
|
|
|
|
goto not_there; |
4684
|
|
|
|
|
|
|
#endif |
4685
|
|
|
|
|
|
|
|
4686
|
|
|
|
|
|
|
} |
4687
|
0
|
|
|
|
|
|
break; |
4688
|
|
|
|
|
|
|
case 'N': |
4689
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_INHIBIT_ANY", 23)) { |
4690
|
|
|
|
|
|
|
/* ^ */ |
4691
|
|
|
|
|
|
|
|
4692
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_INHIBIT_ANY |
4693
|
1
|
|
|
|
|
|
return X509_V_FLAG_INHIBIT_ANY; |
4694
|
|
|
|
|
|
|
#else |
4695
|
|
|
|
|
|
|
goto not_there; |
4696
|
|
|
|
|
|
|
#endif |
4697
|
|
|
|
|
|
|
|
4698
|
|
|
|
|
|
|
} |
4699
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_INHIBIT_MAP", 23)) { |
4700
|
|
|
|
|
|
|
/* ^ */ |
4701
|
|
|
|
|
|
|
|
4702
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_INHIBIT_MAP |
4703
|
1
|
|
|
|
|
|
return X509_V_FLAG_INHIBIT_MAP; |
4704
|
|
|
|
|
|
|
#else |
4705
|
|
|
|
|
|
|
goto not_there; |
4706
|
|
|
|
|
|
|
#endif |
4707
|
|
|
|
|
|
|
|
4708
|
|
|
|
|
|
|
} |
4709
|
0
|
|
|
|
|
|
break; |
4710
|
|
|
|
|
|
|
case 'O': |
4711
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_STORE_LOOKUP", 23)) { |
4712
|
|
|
|
|
|
|
/* ^ */ |
4713
|
|
|
|
|
|
|
|
4714
|
|
|
|
|
|
|
#ifdef X509_V_ERR_STORE_LOOKUP |
4715
|
|
|
|
|
|
|
return X509_V_ERR_STORE_LOOKUP; |
4716
|
|
|
|
|
|
|
#else |
4717
|
1
|
|
|
|
|
|
goto not_there; |
4718
|
|
|
|
|
|
|
#endif |
4719
|
|
|
|
|
|
|
|
4720
|
|
|
|
|
|
|
} |
4721
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_POLICY_MASK", 23)) { |
4722
|
|
|
|
|
|
|
/* ^ */ |
4723
|
|
|
|
|
|
|
|
4724
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_POLICY_MASK |
4725
|
1
|
|
|
|
|
|
return X509_V_FLAG_POLICY_MASK; |
4726
|
|
|
|
|
|
|
#else |
4727
|
|
|
|
|
|
|
goto not_there; |
4728
|
|
|
|
|
|
|
#endif |
4729
|
|
|
|
|
|
|
|
4730
|
|
|
|
|
|
|
} |
4731
|
0
|
|
|
|
|
|
break; |
4732
|
|
|
|
|
|
|
case 'P': |
4733
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_RSAPRIVATEKEY", 23)) { |
4734
|
|
|
|
|
|
|
/* ^ */ |
4735
|
|
|
|
|
|
|
|
4736
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_RSAPRIVATEKEY |
4737
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_RSAPRIVATEKEY; |
4738
|
|
|
|
|
|
|
#else |
4739
|
|
|
|
|
|
|
goto not_there; |
4740
|
|
|
|
|
|
|
#endif |
4741
|
|
|
|
|
|
|
|
4742
|
|
|
|
|
|
|
} |
4743
|
0
|
|
|
|
|
|
break; |
4744
|
|
|
|
|
|
|
case 'R': |
4745
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_SERVER_FINISHED", 23)) { |
4746
|
|
|
|
|
|
|
/* ^ */ |
4747
|
|
|
|
|
|
|
|
4748
|
|
|
|
|
|
|
#ifdef SSL2_MT_SERVER_FINISHED |
4749
|
1
|
|
|
|
|
|
return SSL2_MT_SERVER_FINISHED; |
4750
|
|
|
|
|
|
|
#else |
4751
|
|
|
|
|
|
|
goto not_there; |
4752
|
|
|
|
|
|
|
#endif |
4753
|
|
|
|
|
|
|
|
4754
|
|
|
|
|
|
|
} |
4755
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_REVOKED", 23)) { |
4756
|
|
|
|
|
|
|
/* ^ */ |
4757
|
|
|
|
|
|
|
|
4758
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_REVOKED |
4759
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_REVOKED; |
4760
|
|
|
|
|
|
|
#else |
4761
|
|
|
|
|
|
|
goto not_there; |
4762
|
|
|
|
|
|
|
#endif |
4763
|
|
|
|
|
|
|
|
4764
|
|
|
|
|
|
|
} |
4765
|
0
|
|
|
|
|
|
break; |
4766
|
|
|
|
|
|
|
case 'S': |
4767
|
6
|
100
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_SMIME_SIGN", 23)) { |
4768
|
|
|
|
|
|
|
/* ^ */ |
4769
|
|
|
|
|
|
|
|
4770
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_SMIME_SIGN |
4771
|
1
|
|
|
|
|
|
return X509_PURPOSE_SMIME_SIGN; |
4772
|
|
|
|
|
|
|
#else |
4773
|
|
|
|
|
|
|
goto not_there; |
4774
|
|
|
|
|
|
|
#endif |
4775
|
|
|
|
|
|
|
|
4776
|
|
|
|
|
|
|
} |
4777
|
5
|
100
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_SSL_CLIENT", 23)) { |
4778
|
|
|
|
|
|
|
/* ^ */ |
4779
|
|
|
|
|
|
|
|
4780
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_SSL_CLIENT |
4781
|
3
|
|
|
|
|
|
return X509_PURPOSE_SSL_CLIENT; |
4782
|
|
|
|
|
|
|
#else |
4783
|
|
|
|
|
|
|
goto not_there; |
4784
|
|
|
|
|
|
|
#endif |
4785
|
|
|
|
|
|
|
|
4786
|
|
|
|
|
|
|
} |
4787
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_SSL_SERVER", 23)) { |
4788
|
|
|
|
|
|
|
/* ^ */ |
4789
|
|
|
|
|
|
|
|
4790
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_SSL_SERVER |
4791
|
1
|
|
|
|
|
|
return X509_PURPOSE_SSL_SERVER; |
4792
|
|
|
|
|
|
|
#else |
4793
|
|
|
|
|
|
|
goto not_there; |
4794
|
|
|
|
|
|
|
#endif |
4795
|
|
|
|
|
|
|
|
4796
|
|
|
|
|
|
|
} |
4797
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_TRUST_OCSP_REQUEST", 23)) { |
4798
|
|
|
|
|
|
|
/* ^ */ |
4799
|
|
|
|
|
|
|
|
4800
|
|
|
|
|
|
|
#ifdef X509_TRUST_OCSP_REQUEST |
4801
|
1
|
|
|
|
|
|
return X509_TRUST_OCSP_REQUEST; |
4802
|
|
|
|
|
|
|
#else |
4803
|
|
|
|
|
|
|
goto not_there; |
4804
|
|
|
|
|
|
|
#endif |
4805
|
|
|
|
|
|
|
|
4806
|
|
|
|
|
|
|
} |
4807
|
0
|
|
|
|
|
|
break; |
4808
|
|
|
|
|
|
|
case 'T': |
4809
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_RETRY_VERIFY", 23)) { |
4810
|
|
|
|
|
|
|
/* ^ */ |
4811
|
|
|
|
|
|
|
|
4812
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_RETRY_VERIFY |
4813
|
|
|
|
|
|
|
return SSL_ERROR_WANT_RETRY_VERIFY; |
4814
|
|
|
|
|
|
|
#else |
4815
|
1
|
|
|
|
|
|
goto not_there; |
4816
|
|
|
|
|
|
|
#endif |
4817
|
|
|
|
|
|
|
|
4818
|
|
|
|
|
|
|
} |
4819
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_CRYPTOPRO_TLSEXT_BUG", 23)) { |
4820
|
|
|
|
|
|
|
/* ^ */ |
4821
|
|
|
|
|
|
|
|
4822
|
|
|
|
|
|
|
#ifdef SSL_OP_CRYPTOPRO_TLSEXT_BUG |
4823
|
1
|
|
|
|
|
|
return SSL_OP_CRYPTOPRO_TLSEXT_BUG; |
4824
|
|
|
|
|
|
|
#else |
4825
|
|
|
|
|
|
|
goto not_there; |
4826
|
|
|
|
|
|
|
#endif |
4827
|
|
|
|
|
|
|
|
4828
|
|
|
|
|
|
|
} |
4829
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_CLIENT_FINISHED", 23)) { |
4830
|
|
|
|
|
|
|
/* ^ */ |
4831
|
|
|
|
|
|
|
|
4832
|
|
|
|
|
|
|
#ifdef SSL2_MT_CLIENT_FINISHED |
4833
|
1
|
|
|
|
|
|
return SSL2_MT_CLIENT_FINISHED; |
4834
|
|
|
|
|
|
|
#else |
4835
|
|
|
|
|
|
|
goto not_there; |
4836
|
|
|
|
|
|
|
#endif |
4837
|
|
|
|
|
|
|
|
4838
|
|
|
|
|
|
|
} |
4839
|
0
|
|
|
|
|
|
break; |
4840
|
|
|
|
|
|
|
case 'V': |
4841
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_CALL", 23)) { |
4842
|
|
|
|
|
|
|
/* ^ */ |
4843
|
|
|
|
|
|
|
|
4844
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_CALL |
4845
|
|
|
|
|
|
|
return X509_V_ERR_INVALID_CALL; |
4846
|
|
|
|
|
|
|
#else |
4847
|
1
|
|
|
|
|
|
goto not_there; |
4848
|
|
|
|
|
|
|
#endif |
4849
|
|
|
|
|
|
|
|
4850
|
|
|
|
|
|
|
} |
4851
|
0
|
|
|
|
|
|
break; |
4852
|
|
|
|
|
|
|
case 'o': |
4853
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_stateOrProvinceName", 23)) { |
4854
|
|
|
|
|
|
|
/* ^ */ |
4855
|
|
|
|
|
|
|
|
4856
|
|
|
|
|
|
|
#ifdef NID_stateOrProvinceName |
4857
|
1
|
|
|
|
|
|
return NID_stateOrProvinceName; |
4858
|
|
|
|
|
|
|
#else |
4859
|
|
|
|
|
|
|
goto not_there; |
4860
|
|
|
|
|
|
|
#endif |
4861
|
|
|
|
|
|
|
|
4862
|
|
|
|
|
|
|
} |
4863
|
0
|
|
|
|
|
|
break; |
4864
|
|
|
|
|
|
|
case 's': |
4865
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_messageDigest", 23)) { |
4866
|
|
|
|
|
|
|
/* ^ */ |
4867
|
|
|
|
|
|
|
|
4868
|
|
|
|
|
|
|
#ifdef NID_pkcs9_messageDigest |
4869
|
1
|
|
|
|
|
|
return NID_pkcs9_messageDigest; |
4870
|
|
|
|
|
|
|
#else |
4871
|
|
|
|
|
|
|
goto not_there; |
4872
|
|
|
|
|
|
|
#endif |
4873
|
|
|
|
|
|
|
|
4874
|
|
|
|
|
|
|
} |
4875
|
0
|
|
|
|
|
|
break; |
4876
|
|
|
|
|
|
|
case 'u': |
4877
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs8ShroudedKeyBag", 23)) { |
4878
|
|
|
|
|
|
|
/* ^ */ |
4879
|
|
|
|
|
|
|
|
4880
|
|
|
|
|
|
|
#ifdef NID_pkcs8ShroudedKeyBag |
4881
|
1
|
|
|
|
|
|
return NID_pkcs8ShroudedKeyBag; |
4882
|
|
|
|
|
|
|
#else |
4883
|
|
|
|
|
|
|
goto not_there; |
4884
|
|
|
|
|
|
|
#endif |
4885
|
|
|
|
|
|
|
|
4886
|
|
|
|
|
|
|
} |
4887
|
0
|
|
|
|
|
|
break; |
4888
|
|
|
|
|
|
|
} |
4889
|
1
|
|
|
|
|
|
break; |
4890
|
|
|
|
|
|
|
case 24: |
4891
|
|
|
|
|
|
|
/* Names all of length 24. */ |
4892
|
|
|
|
|
|
|
/* F_SSL_RSA_PUBLIC_ENCRYPT NID_certificate_policies |
4893
|
|
|
|
|
|
|
NID_md2WithRSAEncryption NID_md5WithRSAEncryption |
4894
|
|
|
|
|
|
|
NID_netscape_renewal_url NID_pbeWithMD2AndDES_CBC |
4895
|
|
|
|
|
|
|
NID_pbeWithMD2AndRC2_CBC NID_pbeWithMD5AndDES_CBC |
4896
|
|
|
|
|
|
|
NID_pbeWithMD5AndRC2_CBC NID_shaWithRSAEncryption |
4897
|
|
|
|
|
|
|
OPENSSL_INFO_ENGINES_DIR OPENSSL_INFO_MODULES_DIR |
4898
|
|
|
|
|
|
|
OPENSSL_INFO_SEED_SOURCE OP_IGNORE_UNEXPECTED_EOF |
4899
|
|
|
|
|
|
|
OP_LEGACY_SERVER_CONNECT OP_MICROSOFT_SESS_ID_BUG |
4900
|
|
|
|
|
|
|
OP_TLS_BLOCK_PADDING_BUG R_CHALLENGE_IS_DIFFERENT |
4901
|
|
|
|
|
|
|
R_CIPHER_TABLE_SRC_ERROR R_PEER_ERROR_CERTIFICATE |
4902
|
|
|
|
|
|
|
R_READ_WRONG_PACKET_TYPE SESS_CACHE_NO_AUTO_CLEAR |
4903
|
|
|
|
|
|
|
SSL3_RT_APPLICATION_DATA X509_PURPOSE_OCSP_HELPER |
4904
|
|
|
|
|
|
|
X509_V_ERR_CERT_REJECTED X509_V_ERR_DANE_NO_MATCH |
4905
|
|
|
|
|
|
|
X509_V_ERR_NO_VALID_SCTS X509_V_FLAG_POLICY_CHECK */ |
4906
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
4907
|
29
|
|
|
|
|
|
switch (name[13]) { |
4908
|
|
|
|
|
|
|
case '2': |
4909
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithMD2AndDES_CBC", 24)) { |
4910
|
|
|
|
|
|
|
/* ^ */ |
4911
|
|
|
|
|
|
|
|
4912
|
|
|
|
|
|
|
#ifdef NID_pbeWithMD2AndDES_CBC |
4913
|
1
|
|
|
|
|
|
return NID_pbeWithMD2AndDES_CBC; |
4914
|
|
|
|
|
|
|
#else |
4915
|
|
|
|
|
|
|
goto not_there; |
4916
|
|
|
|
|
|
|
#endif |
4917
|
|
|
|
|
|
|
|
4918
|
|
|
|
|
|
|
} |
4919
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithMD2AndRC2_CBC", 24)) { |
4920
|
|
|
|
|
|
|
/* ^ */ |
4921
|
|
|
|
|
|
|
|
4922
|
|
|
|
|
|
|
#ifdef NID_pbeWithMD2AndRC2_CBC |
4923
|
1
|
|
|
|
|
|
return NID_pbeWithMD2AndRC2_CBC; |
4924
|
|
|
|
|
|
|
#else |
4925
|
|
|
|
|
|
|
goto not_there; |
4926
|
|
|
|
|
|
|
#endif |
4927
|
|
|
|
|
|
|
|
4928
|
|
|
|
|
|
|
} |
4929
|
0
|
|
|
|
|
|
break; |
4930
|
|
|
|
|
|
|
case '5': |
4931
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithMD5AndDES_CBC", 24)) { |
4932
|
|
|
|
|
|
|
/* ^ */ |
4933
|
|
|
|
|
|
|
|
4934
|
|
|
|
|
|
|
#ifdef NID_pbeWithMD5AndDES_CBC |
4935
|
1
|
|
|
|
|
|
return NID_pbeWithMD5AndDES_CBC; |
4936
|
|
|
|
|
|
|
#else |
4937
|
|
|
|
|
|
|
goto not_there; |
4938
|
|
|
|
|
|
|
#endif |
4939
|
|
|
|
|
|
|
|
4940
|
|
|
|
|
|
|
} |
4941
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithMD5AndRC2_CBC", 24)) { |
4942
|
|
|
|
|
|
|
/* ^ */ |
4943
|
|
|
|
|
|
|
|
4944
|
|
|
|
|
|
|
#ifdef NID_pbeWithMD5AndRC2_CBC |
4945
|
1
|
|
|
|
|
|
return NID_pbeWithMD5AndRC2_CBC; |
4946
|
|
|
|
|
|
|
#else |
4947
|
|
|
|
|
|
|
goto not_there; |
4948
|
|
|
|
|
|
|
#endif |
4949
|
|
|
|
|
|
|
|
4950
|
|
|
|
|
|
|
} |
4951
|
0
|
|
|
|
|
|
break; |
4952
|
|
|
|
|
|
|
case 'A': |
4953
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_md2WithRSAEncryption", 24)) { |
4954
|
|
|
|
|
|
|
/* ^ */ |
4955
|
|
|
|
|
|
|
|
4956
|
|
|
|
|
|
|
#ifdef NID_md2WithRSAEncryption |
4957
|
1
|
|
|
|
|
|
return NID_md2WithRSAEncryption; |
4958
|
|
|
|
|
|
|
#else |
4959
|
|
|
|
|
|
|
goto not_there; |
4960
|
|
|
|
|
|
|
#endif |
4961
|
|
|
|
|
|
|
|
4962
|
|
|
|
|
|
|
} |
4963
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_md5WithRSAEncryption", 24)) { |
4964
|
|
|
|
|
|
|
/* ^ */ |
4965
|
|
|
|
|
|
|
|
4966
|
|
|
|
|
|
|
#ifdef NID_md5WithRSAEncryption |
4967
|
1
|
|
|
|
|
|
return NID_md5WithRSAEncryption; |
4968
|
|
|
|
|
|
|
#else |
4969
|
|
|
|
|
|
|
goto not_there; |
4970
|
|
|
|
|
|
|
#endif |
4971
|
|
|
|
|
|
|
|
4972
|
|
|
|
|
|
|
} |
4973
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_shaWithRSAEncryption", 24)) { |
4974
|
|
|
|
|
|
|
/* ^ */ |
4975
|
|
|
|
|
|
|
|
4976
|
|
|
|
|
|
|
#ifdef NID_shaWithRSAEncryption |
4977
|
1
|
|
|
|
|
|
return NID_shaWithRSAEncryption; |
4978
|
|
|
|
|
|
|
#else |
4979
|
|
|
|
|
|
|
goto not_there; |
4980
|
|
|
|
|
|
|
#endif |
4981
|
|
|
|
|
|
|
|
4982
|
|
|
|
|
|
|
} |
4983
|
0
|
|
|
|
|
|
break; |
4984
|
|
|
|
|
|
|
case 'C': |
4985
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "R_PEER_ERROR_CERTIFICATE", 24)) { |
4986
|
|
|
|
|
|
|
/* ^ */ |
4987
|
|
|
|
|
|
|
|
4988
|
|
|
|
|
|
|
#ifdef SSL_R_PEER_ERROR_CERTIFICATE |
4989
|
1
|
|
|
|
|
|
return SSL_R_PEER_ERROR_CERTIFICATE; |
4990
|
|
|
|
|
|
|
#else |
4991
|
|
|
|
|
|
|
goto not_there; |
4992
|
|
|
|
|
|
|
#endif |
4993
|
|
|
|
|
|
|
|
4994
|
|
|
|
|
|
|
} |
4995
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_APPLICATION_DATA", 24)) { |
4996
|
|
|
|
|
|
|
/* ^ */ |
4997
|
|
|
|
|
|
|
|
4998
|
|
|
|
|
|
|
#ifdef SSL3_RT_APPLICATION_DATA |
4999
|
1
|
|
|
|
|
|
return SSL3_RT_APPLICATION_DATA; |
5000
|
|
|
|
|
|
|
#else |
5001
|
|
|
|
|
|
|
goto not_there; |
5002
|
|
|
|
|
|
|
#endif |
5003
|
|
|
|
|
|
|
|
5004
|
|
|
|
|
|
|
} |
5005
|
0
|
|
|
|
|
|
break; |
5006
|
|
|
|
|
|
|
case 'E': |
5007
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_ENGINES_DIR", 24)) { |
5008
|
|
|
|
|
|
|
/* ^ */ |
5009
|
|
|
|
|
|
|
|
5010
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_ENGINES_DIR |
5011
|
|
|
|
|
|
|
return OPENSSL_INFO_ENGINES_DIR; |
5012
|
|
|
|
|
|
|
#else |
5013
|
1
|
|
|
|
|
|
goto not_there; |
5014
|
|
|
|
|
|
|
#endif |
5015
|
|
|
|
|
|
|
|
5016
|
|
|
|
|
|
|
} |
5017
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_CIPHER_TABLE_SRC_ERROR", 24)) { |
5018
|
|
|
|
|
|
|
/* ^ */ |
5019
|
|
|
|
|
|
|
|
5020
|
|
|
|
|
|
|
#ifdef SSL_R_CIPHER_TABLE_SRC_ERROR |
5021
|
1
|
|
|
|
|
|
return SSL_R_CIPHER_TABLE_SRC_ERROR; |
5022
|
|
|
|
|
|
|
#else |
5023
|
|
|
|
|
|
|
goto not_there; |
5024
|
|
|
|
|
|
|
#endif |
5025
|
|
|
|
|
|
|
|
5026
|
|
|
|
|
|
|
} |
5027
|
0
|
|
|
|
|
|
break; |
5028
|
|
|
|
|
|
|
case 'L': |
5029
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_RSA_PUBLIC_ENCRYPT", 24)) { |
5030
|
|
|
|
|
|
|
/* ^ */ |
5031
|
|
|
|
|
|
|
|
5032
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_RSA_PUBLIC_ENCRYPT |
5033
|
1
|
|
|
|
|
|
return SSL_F_SSL_RSA_PUBLIC_ENCRYPT; |
5034
|
|
|
|
|
|
|
#else |
5035
|
|
|
|
|
|
|
goto not_there; |
5036
|
|
|
|
|
|
|
#endif |
5037
|
|
|
|
|
|
|
|
5038
|
|
|
|
|
|
|
} |
5039
|
0
|
|
|
|
|
|
break; |
5040
|
|
|
|
|
|
|
case 'M': |
5041
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_MODULES_DIR", 24)) { |
5042
|
|
|
|
|
|
|
/* ^ */ |
5043
|
|
|
|
|
|
|
|
5044
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_MODULES_DIR |
5045
|
|
|
|
|
|
|
return OPENSSL_INFO_MODULES_DIR; |
5046
|
|
|
|
|
|
|
#else |
5047
|
1
|
|
|
|
|
|
goto not_there; |
5048
|
|
|
|
|
|
|
#endif |
5049
|
|
|
|
|
|
|
|
5050
|
|
|
|
|
|
|
} |
5051
|
0
|
|
|
|
|
|
break; |
5052
|
|
|
|
|
|
|
case 'N': |
5053
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_DANE_NO_MATCH", 24)) { |
5054
|
|
|
|
|
|
|
/* ^ */ |
5055
|
|
|
|
|
|
|
|
5056
|
|
|
|
|
|
|
#ifdef X509_V_ERR_DANE_NO_MATCH |
5057
|
|
|
|
|
|
|
return X509_V_ERR_DANE_NO_MATCH; |
5058
|
|
|
|
|
|
|
#else |
5059
|
1
|
|
|
|
|
|
goto not_there; |
5060
|
|
|
|
|
|
|
#endif |
5061
|
|
|
|
|
|
|
|
5062
|
|
|
|
|
|
|
} |
5063
|
0
|
|
|
|
|
|
break; |
5064
|
|
|
|
|
|
|
case 'O': |
5065
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_OCSP_HELPER", 24)) { |
5066
|
|
|
|
|
|
|
/* ^ */ |
5067
|
|
|
|
|
|
|
|
5068
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_OCSP_HELPER |
5069
|
1
|
|
|
|
|
|
return X509_PURPOSE_OCSP_HELPER; |
5070
|
|
|
|
|
|
|
#else |
5071
|
|
|
|
|
|
|
goto not_there; |
5072
|
|
|
|
|
|
|
#endif |
5073
|
|
|
|
|
|
|
|
5074
|
|
|
|
|
|
|
} |
5075
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_POLICY_CHECK", 24)) { |
5076
|
|
|
|
|
|
|
/* ^ */ |
5077
|
|
|
|
|
|
|
|
5078
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_POLICY_CHECK |
5079
|
2
|
|
|
|
|
|
return X509_V_FLAG_POLICY_CHECK; |
5080
|
|
|
|
|
|
|
#else |
5081
|
|
|
|
|
|
|
goto not_there; |
5082
|
|
|
|
|
|
|
#endif |
5083
|
|
|
|
|
|
|
|
5084
|
|
|
|
|
|
|
} |
5085
|
0
|
|
|
|
|
|
break; |
5086
|
|
|
|
|
|
|
case 'P': |
5087
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_TLS_BLOCK_PADDING_BUG", 24)) { |
5088
|
|
|
|
|
|
|
/* ^ */ |
5089
|
|
|
|
|
|
|
|
5090
|
|
|
|
|
|
|
#ifdef SSL_OP_TLS_BLOCK_PADDING_BUG |
5091
|
1
|
|
|
|
|
|
return SSL_OP_TLS_BLOCK_PADDING_BUG; |
5092
|
|
|
|
|
|
|
#else |
5093
|
|
|
|
|
|
|
goto not_there; |
5094
|
|
|
|
|
|
|
#endif |
5095
|
|
|
|
|
|
|
|
5096
|
|
|
|
|
|
|
} |
5097
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_READ_WRONG_PACKET_TYPE", 24)) { |
5098
|
|
|
|
|
|
|
/* ^ */ |
5099
|
|
|
|
|
|
|
|
5100
|
|
|
|
|
|
|
#ifdef SSL_R_READ_WRONG_PACKET_TYPE |
5101
|
1
|
|
|
|
|
|
return SSL_R_READ_WRONG_PACKET_TYPE; |
5102
|
|
|
|
|
|
|
#else |
5103
|
|
|
|
|
|
|
goto not_there; |
5104
|
|
|
|
|
|
|
#endif |
5105
|
|
|
|
|
|
|
|
5106
|
|
|
|
|
|
|
} |
5107
|
0
|
|
|
|
|
|
break; |
5108
|
|
|
|
|
|
|
case 'R': |
5109
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_REJECTED", 24)) { |
5110
|
|
|
|
|
|
|
/* ^ */ |
5111
|
|
|
|
|
|
|
|
5112
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_REJECTED |
5113
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_REJECTED; |
5114
|
|
|
|
|
|
|
#else |
5115
|
|
|
|
|
|
|
goto not_there; |
5116
|
|
|
|
|
|
|
#endif |
5117
|
|
|
|
|
|
|
|
5118
|
|
|
|
|
|
|
} |
5119
|
0
|
|
|
|
|
|
break; |
5120
|
|
|
|
|
|
|
case 'S': |
5121
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_SEED_SOURCE", 24)) { |
5122
|
|
|
|
|
|
|
/* ^ */ |
5123
|
|
|
|
|
|
|
|
5124
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_SEED_SOURCE |
5125
|
|
|
|
|
|
|
return OPENSSL_INFO_SEED_SOURCE; |
5126
|
|
|
|
|
|
|
#else |
5127
|
1
|
|
|
|
|
|
goto not_there; |
5128
|
|
|
|
|
|
|
#endif |
5129
|
|
|
|
|
|
|
|
5130
|
|
|
|
|
|
|
} |
5131
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_MICROSOFT_SESS_ID_BUG", 24)) { |
5132
|
|
|
|
|
|
|
/* ^ */ |
5133
|
|
|
|
|
|
|
|
5134
|
|
|
|
|
|
|
#ifdef SSL_OP_MICROSOFT_SESS_ID_BUG |
5135
|
1
|
|
|
|
|
|
return SSL_OP_MICROSOFT_SESS_ID_BUG; |
5136
|
|
|
|
|
|
|
#else |
5137
|
|
|
|
|
|
|
goto not_there; |
5138
|
|
|
|
|
|
|
#endif |
5139
|
|
|
|
|
|
|
|
5140
|
|
|
|
|
|
|
} |
5141
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_CHALLENGE_IS_DIFFERENT", 24)) { |
5142
|
|
|
|
|
|
|
/* ^ */ |
5143
|
|
|
|
|
|
|
|
5144
|
|
|
|
|
|
|
#ifdef SSL_R_CHALLENGE_IS_DIFFERENT |
5145
|
1
|
|
|
|
|
|
return SSL_R_CHALLENGE_IS_DIFFERENT; |
5146
|
|
|
|
|
|
|
#else |
5147
|
|
|
|
|
|
|
goto not_there; |
5148
|
|
|
|
|
|
|
#endif |
5149
|
|
|
|
|
|
|
|
5150
|
|
|
|
|
|
|
} |
5151
|
0
|
|
|
|
|
|
break; |
5152
|
|
|
|
|
|
|
case 'V': |
5153
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_LEGACY_SERVER_CONNECT", 24)) { |
5154
|
|
|
|
|
|
|
/* ^ */ |
5155
|
|
|
|
|
|
|
|
5156
|
|
|
|
|
|
|
#ifdef SSL_OP_LEGACY_SERVER_CONNECT |
5157
|
1
|
|
|
|
|
|
return SSL_OP_LEGACY_SERVER_CONNECT; |
5158
|
|
|
|
|
|
|
#else |
5159
|
|
|
|
|
|
|
goto not_there; |
5160
|
|
|
|
|
|
|
#endif |
5161
|
|
|
|
|
|
|
|
5162
|
|
|
|
|
|
|
} |
5163
|
0
|
|
|
|
|
|
break; |
5164
|
|
|
|
|
|
|
case 'X': |
5165
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_IGNORE_UNEXPECTED_EOF", 24)) { |
5166
|
|
|
|
|
|
|
/* ^ */ |
5167
|
|
|
|
|
|
|
|
5168
|
|
|
|
|
|
|
#ifdef SSL_OP_IGNORE_UNEXPECTED_EOF |
5169
|
|
|
|
|
|
|
return SSL_OP_IGNORE_UNEXPECTED_EOF; |
5170
|
|
|
|
|
|
|
#else |
5171
|
1
|
|
|
|
|
|
goto not_there; |
5172
|
|
|
|
|
|
|
#endif |
5173
|
|
|
|
|
|
|
|
5174
|
|
|
|
|
|
|
} |
5175
|
0
|
|
|
|
|
|
break; |
5176
|
|
|
|
|
|
|
case '_': |
5177
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_NO_AUTO_CLEAR", 24)) { |
5178
|
|
|
|
|
|
|
/* ^ */ |
5179
|
|
|
|
|
|
|
|
5180
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_NO_AUTO_CLEAR |
5181
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_NO_AUTO_CLEAR; |
5182
|
|
|
|
|
|
|
#else |
5183
|
|
|
|
|
|
|
goto not_there; |
5184
|
|
|
|
|
|
|
#endif |
5185
|
|
|
|
|
|
|
|
5186
|
|
|
|
|
|
|
} |
5187
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_NO_VALID_SCTS", 24)) { |
5188
|
|
|
|
|
|
|
/* ^ */ |
5189
|
|
|
|
|
|
|
|
5190
|
|
|
|
|
|
|
#ifdef X509_V_ERR_NO_VALID_SCTS |
5191
|
|
|
|
|
|
|
return X509_V_ERR_NO_VALID_SCTS; |
5192
|
|
|
|
|
|
|
#else |
5193
|
1
|
|
|
|
|
|
goto not_there; |
5194
|
|
|
|
|
|
|
#endif |
5195
|
|
|
|
|
|
|
|
5196
|
|
|
|
|
|
|
} |
5197
|
0
|
|
|
|
|
|
break; |
5198
|
|
|
|
|
|
|
case 'r': |
5199
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_renewal_url", 24)) { |
5200
|
|
|
|
|
|
|
/* ^ */ |
5201
|
|
|
|
|
|
|
|
5202
|
|
|
|
|
|
|
#ifdef NID_netscape_renewal_url |
5203
|
1
|
|
|
|
|
|
return NID_netscape_renewal_url; |
5204
|
|
|
|
|
|
|
#else |
5205
|
|
|
|
|
|
|
goto not_there; |
5206
|
|
|
|
|
|
|
#endif |
5207
|
|
|
|
|
|
|
|
5208
|
|
|
|
|
|
|
} |
5209
|
0
|
|
|
|
|
|
break; |
5210
|
|
|
|
|
|
|
case 't': |
5211
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_certificate_policies", 24)) { |
5212
|
|
|
|
|
|
|
/* ^ */ |
5213
|
|
|
|
|
|
|
|
5214
|
|
|
|
|
|
|
#ifdef NID_certificate_policies |
5215
|
1
|
|
|
|
|
|
return NID_certificate_policies; |
5216
|
|
|
|
|
|
|
#else |
5217
|
|
|
|
|
|
|
goto not_there; |
5218
|
|
|
|
|
|
|
#endif |
5219
|
|
|
|
|
|
|
|
5220
|
|
|
|
|
|
|
} |
5221
|
0
|
|
|
|
|
|
break; |
5222
|
|
|
|
|
|
|
} |
5223
|
0
|
|
|
|
|
|
break; |
5224
|
|
|
|
|
|
|
case 25: |
5225
|
|
|
|
|
|
|
/* Names all of length 25. */ |
5226
|
|
|
|
|
|
|
/* F_SSL_RSA_PRIVATE_DECRYPT F_SSL_USE_PRIVATEKEY_ASN1 |
5227
|
|
|
|
|
|
|
F_SSL_USE_PRIVATEKEY_FILE MODE_ENABLE_PARTIAL_WRITE |
5228
|
|
|
|
|
|
|
NID_pbeWithSHA1AndDES_CBC NID_pbeWithSHA1AndRC2_CBC |
5229
|
|
|
|
|
|
|
NID_sha1WithRSAEncryption OPENSSL_INFO_CPU_SETTINGS |
5230
|
|
|
|
|
|
|
OP_MSIE_SSLV2_RSA_PADDING OP_NETSCAPE_CHALLENGE_BUG |
5231
|
|
|
|
|
|
|
OP_SAFARI_ECDHE_ECDSA_BUG R_BAD_AUTHENTICATION_TYPE |
5232
|
|
|
|
|
|
|
SSL2_MT_CLIENT_MASTER_KEY SSL3_MT_END_OF_EARLY_DATA |
5233
|
|
|
|
|
|
|
SSL3_MT_NEWSESSION_TICKET SSL3_MT_SUPPLEMENTAL_DATA |
5234
|
|
|
|
|
|
|
V_OCSP_CERTSTATUS_REVOKED V_OCSP_CERTSTATUS_UNKNOWN |
5235
|
|
|
|
|
|
|
X509_V_ERR_CA_MD_TOO_WEAK X509_V_ERR_CERT_UNTRUSTED |
5236
|
|
|
|
|
|
|
X509_V_ERR_EMAIL_MISMATCH X509_V_ERR_INVALID_NON_CA |
5237
|
|
|
|
|
|
|
X509_V_ERR_SUBTREE_MINMAX X509_V_FLAG_CRL_CHECK_ALL |
5238
|
|
|
|
|
|
|
X509_V_FLAG_LEGACY_VERIFY X509_V_FLAG_NOTIFY_POLICY |
5239
|
|
|
|
|
|
|
X509_V_FLAG_NO_ALT_CHAINS X509_V_FLAG_NO_CHECK_TIME |
5240
|
|
|
|
|
|
|
X509_V_FLAG_PARTIAL_CHAIN X509_V_FLAG_TRUSTED_FIRST */ |
5241
|
|
|
|
|
|
|
/* Offset 19 gives the best switch position. */ |
5242
|
32
|
|
|
|
|
|
switch (name[19]) { |
5243
|
|
|
|
|
|
|
case 'A': |
5244
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_MSIE_SSLV2_RSA_PADDING", 25)) { |
5245
|
|
|
|
|
|
|
/* ^ */ |
5246
|
|
|
|
|
|
|
|
5247
|
|
|
|
|
|
|
#ifdef SSL_OP_MSIE_SSLV2_RSA_PADDING |
5248
|
1
|
|
|
|
|
|
return SSL_OP_MSIE_SSLV2_RSA_PADDING; |
5249
|
|
|
|
|
|
|
#else |
5250
|
|
|
|
|
|
|
goto not_there; |
5251
|
|
|
|
|
|
|
#endif |
5252
|
|
|
|
|
|
|
|
5253
|
|
|
|
|
|
|
} |
5254
|
0
|
|
|
|
|
|
break; |
5255
|
|
|
|
|
|
|
case 'C': |
5256
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithSHA1AndRC2_CBC", 25)) { |
5257
|
|
|
|
|
|
|
/* ^ */ |
5258
|
|
|
|
|
|
|
|
5259
|
|
|
|
|
|
|
#ifdef NID_pbeWithSHA1AndRC2_CBC |
5260
|
1
|
|
|
|
|
|
return NID_pbeWithSHA1AndRC2_CBC; |
5261
|
|
|
|
|
|
|
#else |
5262
|
|
|
|
|
|
|
goto not_there; |
5263
|
|
|
|
|
|
|
#endif |
5264
|
|
|
|
|
|
|
|
5265
|
|
|
|
|
|
|
} |
5266
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_CRL_CHECK_ALL", 25)) { |
5267
|
|
|
|
|
|
|
/* ^ */ |
5268
|
|
|
|
|
|
|
|
5269
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_CRL_CHECK_ALL |
5270
|
1
|
|
|
|
|
|
return X509_V_FLAG_CRL_CHECK_ALL; |
5271
|
|
|
|
|
|
|
#else |
5272
|
|
|
|
|
|
|
goto not_there; |
5273
|
|
|
|
|
|
|
#endif |
5274
|
|
|
|
|
|
|
|
5275
|
|
|
|
|
|
|
} |
5276
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_NO_ALT_CHAINS", 25)) { |
5277
|
|
|
|
|
|
|
/* ^ */ |
5278
|
|
|
|
|
|
|
|
5279
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_NO_ALT_CHAINS |
5280
|
1
|
|
|
|
|
|
return X509_V_FLAG_NO_ALT_CHAINS; |
5281
|
|
|
|
|
|
|
#else |
5282
|
|
|
|
|
|
|
goto not_there; |
5283
|
|
|
|
|
|
|
#endif |
5284
|
|
|
|
|
|
|
|
5285
|
|
|
|
|
|
|
} |
5286
|
0
|
|
|
|
|
|
break; |
5287
|
|
|
|
|
|
|
case 'E': |
5288
|
4
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_RSA_PRIVATE_DECRYPT", 25)) { |
5289
|
|
|
|
|
|
|
/* ^ */ |
5290
|
|
|
|
|
|
|
|
5291
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_RSA_PRIVATE_DECRYPT |
5292
|
1
|
|
|
|
|
|
return SSL_F_SSL_RSA_PRIVATE_DECRYPT; |
5293
|
|
|
|
|
|
|
#else |
5294
|
|
|
|
|
|
|
goto not_there; |
5295
|
|
|
|
|
|
|
#endif |
5296
|
|
|
|
|
|
|
|
5297
|
|
|
|
|
|
|
} |
5298
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithSHA1AndDES_CBC", 25)) { |
5299
|
|
|
|
|
|
|
/* ^ */ |
5300
|
|
|
|
|
|
|
|
5301
|
|
|
|
|
|
|
#ifdef NID_pbeWithSHA1AndDES_CBC |
5302
|
1
|
|
|
|
|
|
return NID_pbeWithSHA1AndDES_CBC; |
5303
|
|
|
|
|
|
|
#else |
5304
|
|
|
|
|
|
|
goto not_there; |
5305
|
|
|
|
|
|
|
#endif |
5306
|
|
|
|
|
|
|
|
5307
|
|
|
|
|
|
|
} |
5308
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_CLIENT_MASTER_KEY", 25)) { |
5309
|
|
|
|
|
|
|
/* ^ */ |
5310
|
|
|
|
|
|
|
|
5311
|
|
|
|
|
|
|
#ifdef SSL2_MT_CLIENT_MASTER_KEY |
5312
|
1
|
|
|
|
|
|
return SSL2_MT_CLIENT_MASTER_KEY; |
5313
|
|
|
|
|
|
|
#else |
5314
|
|
|
|
|
|
|
goto not_there; |
5315
|
|
|
|
|
|
|
#endif |
5316
|
|
|
|
|
|
|
|
5317
|
|
|
|
|
|
|
} |
5318
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "V_OCSP_CERTSTATUS_REVOKED", 25)) { |
5319
|
|
|
|
|
|
|
/* ^ */ |
5320
|
|
|
|
|
|
|
|
5321
|
|
|
|
|
|
|
#ifdef V_OCSP_CERTSTATUS_REVOKED |
5322
|
1
|
|
|
|
|
|
return V_OCSP_CERTSTATUS_REVOKED; |
5323
|
|
|
|
|
|
|
#else |
5324
|
|
|
|
|
|
|
goto not_there; |
5325
|
|
|
|
|
|
|
#endif |
5326
|
|
|
|
|
|
|
|
5327
|
|
|
|
|
|
|
} |
5328
|
0
|
|
|
|
|
|
break; |
5329
|
|
|
|
|
|
|
case 'G': |
5330
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NETSCAPE_CHALLENGE_BUG", 25)) { |
5331
|
|
|
|
|
|
|
/* ^ */ |
5332
|
|
|
|
|
|
|
|
5333
|
|
|
|
|
|
|
#ifdef SSL_OP_NETSCAPE_CHALLENGE_BUG |
5334
|
1
|
|
|
|
|
|
return SSL_OP_NETSCAPE_CHALLENGE_BUG; |
5335
|
|
|
|
|
|
|
#else |
5336
|
|
|
|
|
|
|
goto not_there; |
5337
|
|
|
|
|
|
|
#endif |
5338
|
|
|
|
|
|
|
|
5339
|
|
|
|
|
|
|
} |
5340
|
0
|
|
|
|
|
|
break; |
5341
|
|
|
|
|
|
|
case 'K': |
5342
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_NO_CHECK_TIME", 25)) { |
5343
|
|
|
|
|
|
|
/* ^ */ |
5344
|
|
|
|
|
|
|
|
5345
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_NO_CHECK_TIME |
5346
|
|
|
|
|
|
|
return X509_V_FLAG_NO_CHECK_TIME; |
5347
|
|
|
|
|
|
|
#else |
5348
|
1
|
|
|
|
|
|
goto not_there; |
5349
|
|
|
|
|
|
|
#endif |
5350
|
|
|
|
|
|
|
|
5351
|
|
|
|
|
|
|
} |
5352
|
0
|
|
|
|
|
|
break; |
5353
|
|
|
|
|
|
|
case 'L': |
5354
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_SUPPLEMENTAL_DATA", 25)) { |
5355
|
|
|
|
|
|
|
/* ^ */ |
5356
|
|
|
|
|
|
|
|
5357
|
|
|
|
|
|
|
#ifdef SSL3_MT_SUPPLEMENTAL_DATA |
5358
|
|
|
|
|
|
|
return SSL3_MT_SUPPLEMENTAL_DATA; |
5359
|
|
|
|
|
|
|
#else |
5360
|
1
|
|
|
|
|
|
goto not_there; |
5361
|
|
|
|
|
|
|
#endif |
5362
|
|
|
|
|
|
|
|
5363
|
|
|
|
|
|
|
} |
5364
|
0
|
|
|
|
|
|
break; |
5365
|
|
|
|
|
|
|
case 'M': |
5366
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUBTREE_MINMAX", 25)) { |
5367
|
|
|
|
|
|
|
/* ^ */ |
5368
|
|
|
|
|
|
|
|
5369
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUBTREE_MINMAX |
5370
|
1
|
|
|
|
|
|
return X509_V_ERR_SUBTREE_MINMAX; |
5371
|
|
|
|
|
|
|
#else |
5372
|
|
|
|
|
|
|
goto not_there; |
5373
|
|
|
|
|
|
|
#endif |
5374
|
|
|
|
|
|
|
|
5375
|
|
|
|
|
|
|
} |
5376
|
0
|
|
|
|
|
|
break; |
5377
|
|
|
|
|
|
|
case 'N': |
5378
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "R_BAD_AUTHENTICATION_TYPE", 25)) { |
5379
|
|
|
|
|
|
|
/* ^ */ |
5380
|
|
|
|
|
|
|
|
5381
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_AUTHENTICATION_TYPE |
5382
|
1
|
|
|
|
|
|
return SSL_R_BAD_AUTHENTICATION_TYPE; |
5383
|
|
|
|
|
|
|
#else |
5384
|
|
|
|
|
|
|
goto not_there; |
5385
|
|
|
|
|
|
|
#endif |
5386
|
|
|
|
|
|
|
|
5387
|
|
|
|
|
|
|
} |
5388
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "V_OCSP_CERTSTATUS_UNKNOWN", 25)) { |
5389
|
|
|
|
|
|
|
/* ^ */ |
5390
|
|
|
|
|
|
|
|
5391
|
|
|
|
|
|
|
#ifdef V_OCSP_CERTSTATUS_UNKNOWN |
5392
|
1
|
|
|
|
|
|
return V_OCSP_CERTSTATUS_UNKNOWN; |
5393
|
|
|
|
|
|
|
#else |
5394
|
|
|
|
|
|
|
goto not_there; |
5395
|
|
|
|
|
|
|
#endif |
5396
|
|
|
|
|
|
|
|
5397
|
|
|
|
|
|
|
} |
5398
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_NON_CA", 25)) { |
5399
|
|
|
|
|
|
|
/* ^ */ |
5400
|
|
|
|
|
|
|
|
5401
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_NON_CA |
5402
|
1
|
|
|
|
|
|
return X509_V_ERR_INVALID_NON_CA; |
5403
|
|
|
|
|
|
|
#else |
5404
|
|
|
|
|
|
|
goto not_there; |
5405
|
|
|
|
|
|
|
#endif |
5406
|
|
|
|
|
|
|
|
5407
|
|
|
|
|
|
|
} |
5408
|
0
|
|
|
|
|
|
break; |
5409
|
|
|
|
|
|
|
case 'O': |
5410
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CA_MD_TOO_WEAK", 25)) { |
5411
|
|
|
|
|
|
|
/* ^ */ |
5412
|
|
|
|
|
|
|
|
5413
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CA_MD_TOO_WEAK |
5414
|
|
|
|
|
|
|
return X509_V_ERR_CA_MD_TOO_WEAK; |
5415
|
|
|
|
|
|
|
#else |
5416
|
1
|
|
|
|
|
|
goto not_there; |
5417
|
|
|
|
|
|
|
#endif |
5418
|
|
|
|
|
|
|
|
5419
|
|
|
|
|
|
|
} |
5420
|
0
|
|
|
|
|
|
break; |
5421
|
|
|
|
|
|
|
case 'P': |
5422
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_NOTIFY_POLICY", 25)) { |
5423
|
|
|
|
|
|
|
/* ^ */ |
5424
|
|
|
|
|
|
|
|
5425
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_NOTIFY_POLICY |
5426
|
1
|
|
|
|
|
|
return X509_V_FLAG_NOTIFY_POLICY; |
5427
|
|
|
|
|
|
|
#else |
5428
|
|
|
|
|
|
|
goto not_there; |
5429
|
|
|
|
|
|
|
#endif |
5430
|
|
|
|
|
|
|
|
5431
|
|
|
|
|
|
|
} |
5432
|
0
|
|
|
|
|
|
break; |
5433
|
|
|
|
|
|
|
case 'R': |
5434
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_UNTRUSTED", 25)) { |
5435
|
|
|
|
|
|
|
/* ^ */ |
5436
|
|
|
|
|
|
|
|
5437
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_UNTRUSTED |
5438
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_UNTRUSTED; |
5439
|
|
|
|
|
|
|
#else |
5440
|
|
|
|
|
|
|
goto not_there; |
5441
|
|
|
|
|
|
|
#endif |
5442
|
|
|
|
|
|
|
|
5443
|
|
|
|
|
|
|
} |
5444
|
0
|
|
|
|
|
|
break; |
5445
|
|
|
|
|
|
|
case 'S': |
5446
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_SAFARI_ECDHE_ECDSA_BUG", 25)) { |
5447
|
|
|
|
|
|
|
/* ^ */ |
5448
|
|
|
|
|
|
|
|
5449
|
|
|
|
|
|
|
#ifdef SSL_OP_SAFARI_ECDHE_ECDSA_BUG |
5450
|
1
|
|
|
|
|
|
return SSL_OP_SAFARI_ECDHE_ECDSA_BUG; |
5451
|
|
|
|
|
|
|
#else |
5452
|
|
|
|
|
|
|
goto not_there; |
5453
|
|
|
|
|
|
|
#endif |
5454
|
|
|
|
|
|
|
|
5455
|
|
|
|
|
|
|
} |
5456
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_EMAIL_MISMATCH", 25)) { |
5457
|
|
|
|
|
|
|
/* ^ */ |
5458
|
|
|
|
|
|
|
|
5459
|
|
|
|
|
|
|
#ifdef X509_V_ERR_EMAIL_MISMATCH |
5460
|
1
|
|
|
|
|
|
return X509_V_ERR_EMAIL_MISMATCH; |
5461
|
|
|
|
|
|
|
#else |
5462
|
|
|
|
|
|
|
goto not_there; |
5463
|
|
|
|
|
|
|
#endif |
5464
|
|
|
|
|
|
|
|
5465
|
|
|
|
|
|
|
} |
5466
|
0
|
|
|
|
|
|
break; |
5467
|
|
|
|
|
|
|
case 'T': |
5468
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_CPU_SETTINGS", 25)) { |
5469
|
|
|
|
|
|
|
/* ^ */ |
5470
|
|
|
|
|
|
|
|
5471
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_CPU_SETTINGS |
5472
|
|
|
|
|
|
|
return OPENSSL_INFO_CPU_SETTINGS; |
5473
|
|
|
|
|
|
|
#else |
5474
|
1
|
|
|
|
|
|
goto not_there; |
5475
|
|
|
|
|
|
|
#endif |
5476
|
|
|
|
|
|
|
|
5477
|
|
|
|
|
|
|
} |
5478
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_NEWSESSION_TICKET", 25)) { |
5479
|
|
|
|
|
|
|
/* ^ */ |
5480
|
|
|
|
|
|
|
|
5481
|
|
|
|
|
|
|
#ifdef SSL3_MT_NEWSESSION_TICKET |
5482
|
1
|
|
|
|
|
|
return SSL3_MT_NEWSESSION_TICKET; |
5483
|
|
|
|
|
|
|
#else |
5484
|
|
|
|
|
|
|
goto not_there; |
5485
|
|
|
|
|
|
|
#endif |
5486
|
|
|
|
|
|
|
|
5487
|
|
|
|
|
|
|
} |
5488
|
0
|
|
|
|
|
|
break; |
5489
|
|
|
|
|
|
|
case 'V': |
5490
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_LEGACY_VERIFY", 25)) { |
5491
|
|
|
|
|
|
|
/* ^ */ |
5492
|
|
|
|
|
|
|
|
5493
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_LEGACY_VERIFY |
5494
|
|
|
|
|
|
|
return X509_V_FLAG_LEGACY_VERIFY; |
5495
|
|
|
|
|
|
|
#else |
5496
|
1
|
|
|
|
|
|
goto not_there; |
5497
|
|
|
|
|
|
|
#endif |
5498
|
|
|
|
|
|
|
|
5499
|
|
|
|
|
|
|
} |
5500
|
0
|
|
|
|
|
|
break; |
5501
|
|
|
|
|
|
|
case 'Y': |
5502
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_PRIVATEKEY_ASN1", 25)) { |
5503
|
|
|
|
|
|
|
/* ^ */ |
5504
|
|
|
|
|
|
|
|
5505
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_PRIVATEKEY_ASN1 |
5506
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_PRIVATEKEY_ASN1; |
5507
|
|
|
|
|
|
|
#else |
5508
|
|
|
|
|
|
|
goto not_there; |
5509
|
|
|
|
|
|
|
#endif |
5510
|
|
|
|
|
|
|
|
5511
|
|
|
|
|
|
|
} |
5512
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_PRIVATEKEY_FILE", 25)) { |
5513
|
|
|
|
|
|
|
/* ^ */ |
5514
|
|
|
|
|
|
|
|
5515
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_PRIVATEKEY_FILE |
5516
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_PRIVATEKEY_FILE; |
5517
|
|
|
|
|
|
|
#else |
5518
|
|
|
|
|
|
|
goto not_there; |
5519
|
|
|
|
|
|
|
#endif |
5520
|
|
|
|
|
|
|
|
5521
|
|
|
|
|
|
|
} |
5522
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_END_OF_EARLY_DATA", 25)) { |
5523
|
|
|
|
|
|
|
/* ^ */ |
5524
|
|
|
|
|
|
|
|
5525
|
|
|
|
|
|
|
#ifdef SSL3_MT_END_OF_EARLY_DATA |
5526
|
|
|
|
|
|
|
return SSL3_MT_END_OF_EARLY_DATA; |
5527
|
|
|
|
|
|
|
#else |
5528
|
1
|
|
|
|
|
|
goto not_there; |
5529
|
|
|
|
|
|
|
#endif |
5530
|
|
|
|
|
|
|
|
5531
|
|
|
|
|
|
|
} |
5532
|
0
|
|
|
|
|
|
break; |
5533
|
|
|
|
|
|
|
case '_': |
5534
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "MODE_ENABLE_PARTIAL_WRITE", 25)) { |
5535
|
|
|
|
|
|
|
/* ^ */ |
5536
|
|
|
|
|
|
|
|
5537
|
|
|
|
|
|
|
#ifdef SSL_MODE_ENABLE_PARTIAL_WRITE |
5538
|
1
|
|
|
|
|
|
return SSL_MODE_ENABLE_PARTIAL_WRITE; |
5539
|
|
|
|
|
|
|
#else |
5540
|
|
|
|
|
|
|
goto not_there; |
5541
|
|
|
|
|
|
|
#endif |
5542
|
|
|
|
|
|
|
|
5543
|
|
|
|
|
|
|
} |
5544
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_PARTIAL_CHAIN", 25)) { |
5545
|
|
|
|
|
|
|
/* ^ */ |
5546
|
|
|
|
|
|
|
|
5547
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_PARTIAL_CHAIN |
5548
|
1
|
|
|
|
|
|
return X509_V_FLAG_PARTIAL_CHAIN; |
5549
|
|
|
|
|
|
|
#else |
5550
|
|
|
|
|
|
|
goto not_there; |
5551
|
|
|
|
|
|
|
#endif |
5552
|
|
|
|
|
|
|
|
5553
|
|
|
|
|
|
|
} |
5554
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_TRUSTED_FIRST", 25)) { |
5555
|
|
|
|
|
|
|
/* ^ */ |
5556
|
|
|
|
|
|
|
|
5557
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_TRUSTED_FIRST |
5558
|
1
|
|
|
|
|
|
return X509_V_FLAG_TRUSTED_FIRST; |
5559
|
|
|
|
|
|
|
#else |
5560
|
|
|
|
|
|
|
goto not_there; |
5561
|
|
|
|
|
|
|
#endif |
5562
|
|
|
|
|
|
|
|
5563
|
|
|
|
|
|
|
} |
5564
|
0
|
|
|
|
|
|
break; |
5565
|
|
|
|
|
|
|
case 'y': |
5566
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_sha1WithRSAEncryption", 25)) { |
5567
|
|
|
|
|
|
|
/* ^ */ |
5568
|
|
|
|
|
|
|
|
5569
|
|
|
|
|
|
|
#ifdef NID_sha1WithRSAEncryption |
5570
|
1
|
|
|
|
|
|
return NID_sha1WithRSAEncryption; |
5571
|
|
|
|
|
|
|
#else |
5572
|
|
|
|
|
|
|
goto not_there; |
5573
|
|
|
|
|
|
|
#endif |
5574
|
|
|
|
|
|
|
|
5575
|
|
|
|
|
|
|
} |
5576
|
0
|
|
|
|
|
|
break; |
5577
|
|
|
|
|
|
|
} |
5578
|
2
|
|
|
|
|
|
break; |
5579
|
|
|
|
|
|
|
case 26: |
5580
|
|
|
|
|
|
|
/* Names all of length 26. */ |
5581
|
|
|
|
|
|
|
/* ERROR_WANT_CLIENT_HELLO_CB F_SSL_USE_CERTIFICATE_ASN1 |
5582
|
|
|
|
|
|
|
F_SSL_USE_CERTIFICATE_FILE NID_netscape_ca_policy_url |
5583
|
|
|
|
|
|
|
NID_netscape_cert_sequence NID_organizationalUnitName |
5584
|
|
|
|
|
|
|
NID_pbeWithMD5AndCast5_CBC NID_pkcs9_countersignature |
5585
|
|
|
|
|
|
|
NID_pkcs9_unstructuredName NID_subject_key_identifier |
5586
|
|
|
|
|
|
|
OPENSSL_INFO_DSO_EXTENSION OP_DISABLE_TLSEXT_CA_NAMES |
5587
|
|
|
|
|
|
|
OP_ENABLE_MIDDLEBOX_COMPAT OP_NO_CLIENT_RENEGOTIATION |
5588
|
|
|
|
|
|
|
R_INVALID_CHALLENGE_LENGTH R_NO_CERTIFICATE_SPECIFIED |
5589
|
|
|
|
|
|
|
R_PUBLIC_KEY_ENCRYPT_ERROR SSL2_MT_CLIENT_CERTIFICATE |
5590
|
|
|
|
|
|
|
SSL3_MT_CERTIFICATE_STATUS SSL3_MT_CERTIFICATE_VERIFY |
5591
|
|
|
|
|
|
|
SSL3_MT_CHANGE_CIPHER_SPEC SSL3_RT_CHANGE_CIPHER_SPEC |
5592
|
|
|
|
|
|
|
SSL3_RT_INNER_CONTENT_TYPE X509_PURPOSE_NS_SSL_SERVER |
5593
|
|
|
|
|
|
|
X509_PURPOSE_SMIME_ENCRYPT X509_V_ERR_CRL_HAS_EXPIRED |
5594
|
|
|
|
|
|
|
X509_V_ERR_INVALID_PURPOSE X509_V_FLAG_SUITEB_128_LOS |
5595
|
|
|
|
|
|
|
X509_V_FLAG_SUITEB_192_LOS X509_V_FLAG_USE_CHECK_TIME */ |
5596
|
|
|
|
|
|
|
/* Offset 20 gives the best switch position. */ |
5597
|
30
|
|
|
|
|
|
switch (name[20]) { |
5598
|
|
|
|
|
|
|
case '2': |
5599
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_SUITEB_128_LOS", 26)) { |
5600
|
|
|
|
|
|
|
/* ^ */ |
5601
|
|
|
|
|
|
|
|
5602
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_SUITEB_128_LOS |
5603
|
1
|
|
|
|
|
|
return X509_V_FLAG_SUITEB_128_LOS; |
5604
|
|
|
|
|
|
|
#else |
5605
|
|
|
|
|
|
|
goto not_there; |
5606
|
|
|
|
|
|
|
#endif |
5607
|
|
|
|
|
|
|
|
5608
|
|
|
|
|
|
|
} |
5609
|
0
|
|
|
|
|
|
break; |
5610
|
|
|
|
|
|
|
case '9': |
5611
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_SUITEB_192_LOS", 26)) { |
5612
|
|
|
|
|
|
|
/* ^ */ |
5613
|
|
|
|
|
|
|
|
5614
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_SUITEB_192_LOS |
5615
|
1
|
|
|
|
|
|
return X509_V_FLAG_SUITEB_192_LOS; |
5616
|
|
|
|
|
|
|
#else |
5617
|
|
|
|
|
|
|
goto not_there; |
5618
|
|
|
|
|
|
|
#endif |
5619
|
|
|
|
|
|
|
|
5620
|
|
|
|
|
|
|
} |
5621
|
0
|
|
|
|
|
|
break; |
5622
|
|
|
|
|
|
|
case 'C': |
5623
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_ENABLE_MIDDLEBOX_COMPAT", 26)) { |
5624
|
|
|
|
|
|
|
/* ^ */ |
5625
|
|
|
|
|
|
|
|
5626
|
|
|
|
|
|
|
#ifdef SSL_OP_ENABLE_MIDDLEBOX_COMPAT |
5627
|
|
|
|
|
|
|
return SSL_OP_ENABLE_MIDDLEBOX_COMPAT; |
5628
|
|
|
|
|
|
|
#else |
5629
|
1
|
|
|
|
|
|
goto not_there; |
5630
|
|
|
|
|
|
|
#endif |
5631
|
|
|
|
|
|
|
|
5632
|
|
|
|
|
|
|
} |
5633
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_NO_CERTIFICATE_SPECIFIED", 26)) { |
5634
|
|
|
|
|
|
|
/* ^ */ |
5635
|
|
|
|
|
|
|
|
5636
|
|
|
|
|
|
|
#ifdef SSL_R_NO_CERTIFICATE_SPECIFIED |
5637
|
1
|
|
|
|
|
|
return SSL_R_NO_CERTIFICATE_SPECIFIED; |
5638
|
|
|
|
|
|
|
#else |
5639
|
|
|
|
|
|
|
goto not_there; |
5640
|
|
|
|
|
|
|
#endif |
5641
|
|
|
|
|
|
|
|
5642
|
|
|
|
|
|
|
} |
5643
|
0
|
|
|
|
|
|
break; |
5644
|
|
|
|
|
|
|
case 'E': |
5645
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_CERTIFICATE_ASN1", 26)) { |
5646
|
|
|
|
|
|
|
/* ^ */ |
5647
|
|
|
|
|
|
|
|
5648
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_CERTIFICATE_ASN1 |
5649
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_CERTIFICATE_ASN1; |
5650
|
|
|
|
|
|
|
#else |
5651
|
|
|
|
|
|
|
goto not_there; |
5652
|
|
|
|
|
|
|
#endif |
5653
|
|
|
|
|
|
|
|
5654
|
|
|
|
|
|
|
} |
5655
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_CERTIFICATE_FILE", 26)) { |
5656
|
|
|
|
|
|
|
/* ^ */ |
5657
|
|
|
|
|
|
|
|
5658
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_CERTIFICATE_FILE |
5659
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_CERTIFICATE_FILE; |
5660
|
|
|
|
|
|
|
#else |
5661
|
|
|
|
|
|
|
goto not_there; |
5662
|
|
|
|
|
|
|
#endif |
5663
|
|
|
|
|
|
|
|
5664
|
|
|
|
|
|
|
} |
5665
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_DSO_EXTENSION", 26)) { |
5666
|
|
|
|
|
|
|
/* ^ */ |
5667
|
|
|
|
|
|
|
|
5668
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_DSO_EXTENSION |
5669
|
|
|
|
|
|
|
return OPENSSL_INFO_DSO_EXTENSION; |
5670
|
|
|
|
|
|
|
#else |
5671
|
1
|
|
|
|
|
|
goto not_there; |
5672
|
|
|
|
|
|
|
#endif |
5673
|
|
|
|
|
|
|
|
5674
|
|
|
|
|
|
|
} |
5675
|
0
|
|
|
|
|
|
break; |
5676
|
|
|
|
|
|
|
case 'F': |
5677
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_CLIENT_CERTIFICATE", 26)) { |
5678
|
|
|
|
|
|
|
/* ^ */ |
5679
|
|
|
|
|
|
|
|
5680
|
|
|
|
|
|
|
#ifdef SSL2_MT_CLIENT_CERTIFICATE |
5681
|
1
|
|
|
|
|
|
return SSL2_MT_CLIENT_CERTIFICATE; |
5682
|
|
|
|
|
|
|
#else |
5683
|
|
|
|
|
|
|
goto not_there; |
5684
|
|
|
|
|
|
|
#endif |
5685
|
|
|
|
|
|
|
|
5686
|
|
|
|
|
|
|
} |
5687
|
0
|
|
|
|
|
|
break; |
5688
|
|
|
|
|
|
|
case 'I': |
5689
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_CLIENT_RENEGOTIATION", 26)) { |
5690
|
|
|
|
|
|
|
/* ^ */ |
5691
|
|
|
|
|
|
|
|
5692
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_CLIENT_RENEGOTIATION |
5693
|
|
|
|
|
|
|
return SSL_OP_NO_CLIENT_RENEGOTIATION; |
5694
|
|
|
|
|
|
|
#else |
5695
|
1
|
|
|
|
|
|
goto not_there; |
5696
|
|
|
|
|
|
|
#endif |
5697
|
|
|
|
|
|
|
|
5698
|
|
|
|
|
|
|
} |
5699
|
0
|
|
|
|
|
|
break; |
5700
|
|
|
|
|
|
|
case 'K': |
5701
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_USE_CHECK_TIME", 26)) { |
5702
|
|
|
|
|
|
|
/* ^ */ |
5703
|
|
|
|
|
|
|
|
5704
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_USE_CHECK_TIME |
5705
|
1
|
|
|
|
|
|
return X509_V_FLAG_USE_CHECK_TIME; |
5706
|
|
|
|
|
|
|
#else |
5707
|
|
|
|
|
|
|
goto not_there; |
5708
|
|
|
|
|
|
|
#endif |
5709
|
|
|
|
|
|
|
|
5710
|
|
|
|
|
|
|
} |
5711
|
0
|
|
|
|
|
|
break; |
5712
|
|
|
|
|
|
|
case 'L': |
5713
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "ERROR_WANT_CLIENT_HELLO_CB", 26)) { |
5714
|
|
|
|
|
|
|
/* ^ */ |
5715
|
|
|
|
|
|
|
|
5716
|
|
|
|
|
|
|
#ifdef SSL_ERROR_WANT_CLIENT_HELLO_CB |
5717
|
|
|
|
|
|
|
return SSL_ERROR_WANT_CLIENT_HELLO_CB; |
5718
|
|
|
|
|
|
|
#else |
5719
|
1
|
|
|
|
|
|
goto not_there; |
5720
|
|
|
|
|
|
|
#endif |
5721
|
|
|
|
|
|
|
|
5722
|
|
|
|
|
|
|
} |
5723
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_INVALID_CHALLENGE_LENGTH", 26)) { |
5724
|
|
|
|
|
|
|
/* ^ */ |
5725
|
|
|
|
|
|
|
|
5726
|
|
|
|
|
|
|
#ifdef SSL_R_INVALID_CHALLENGE_LENGTH |
5727
|
1
|
|
|
|
|
|
return SSL_R_INVALID_CHALLENGE_LENGTH; |
5728
|
|
|
|
|
|
|
#else |
5729
|
|
|
|
|
|
|
goto not_there; |
5730
|
|
|
|
|
|
|
#endif |
5731
|
|
|
|
|
|
|
|
5732
|
|
|
|
|
|
|
} |
5733
|
0
|
|
|
|
|
|
break; |
5734
|
|
|
|
|
|
|
case 'N': |
5735
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_SMIME_ENCRYPT", 26)) { |
5736
|
|
|
|
|
|
|
/* ^ */ |
5737
|
|
|
|
|
|
|
|
5738
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_SMIME_ENCRYPT |
5739
|
1
|
|
|
|
|
|
return X509_PURPOSE_SMIME_ENCRYPT; |
5740
|
|
|
|
|
|
|
#else |
5741
|
|
|
|
|
|
|
goto not_there; |
5742
|
|
|
|
|
|
|
#endif |
5743
|
|
|
|
|
|
|
|
5744
|
|
|
|
|
|
|
} |
5745
|
0
|
|
|
|
|
|
break; |
5746
|
|
|
|
|
|
|
case 'R': |
5747
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CHANGE_CIPHER_SPEC", 26)) { |
5748
|
|
|
|
|
|
|
/* ^ */ |
5749
|
|
|
|
|
|
|
|
5750
|
|
|
|
|
|
|
#ifdef SSL3_MT_CHANGE_CIPHER_SPEC |
5751
|
|
|
|
|
|
|
return SSL3_MT_CHANGE_CIPHER_SPEC; |
5752
|
|
|
|
|
|
|
#else |
5753
|
1
|
|
|
|
|
|
goto not_there; |
5754
|
|
|
|
|
|
|
#endif |
5755
|
|
|
|
|
|
|
|
5756
|
|
|
|
|
|
|
} |
5757
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_CHANGE_CIPHER_SPEC", 26)) { |
5758
|
|
|
|
|
|
|
/* ^ */ |
5759
|
|
|
|
|
|
|
|
5760
|
|
|
|
|
|
|
#ifdef SSL3_RT_CHANGE_CIPHER_SPEC |
5761
|
1
|
|
|
|
|
|
return SSL3_RT_CHANGE_CIPHER_SPEC; |
5762
|
|
|
|
|
|
|
#else |
5763
|
|
|
|
|
|
|
goto not_there; |
5764
|
|
|
|
|
|
|
#endif |
5765
|
|
|
|
|
|
|
|
5766
|
|
|
|
|
|
|
} |
5767
|
0
|
|
|
|
|
|
break; |
5768
|
|
|
|
|
|
|
case 'S': |
5769
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CERTIFICATE_STATUS", 26)) { |
5770
|
|
|
|
|
|
|
/* ^ */ |
5771
|
|
|
|
|
|
|
|
5772
|
|
|
|
|
|
|
#ifdef SSL3_MT_CERTIFICATE_STATUS |
5773
|
1
|
|
|
|
|
|
return SSL3_MT_CERTIFICATE_STATUS; |
5774
|
|
|
|
|
|
|
#else |
5775
|
|
|
|
|
|
|
goto not_there; |
5776
|
|
|
|
|
|
|
#endif |
5777
|
|
|
|
|
|
|
|
5778
|
|
|
|
|
|
|
} |
5779
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_NS_SSL_SERVER", 26)) { |
5780
|
|
|
|
|
|
|
/* ^ */ |
5781
|
|
|
|
|
|
|
|
5782
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_NS_SSL_SERVER |
5783
|
1
|
|
|
|
|
|
return X509_PURPOSE_NS_SSL_SERVER; |
5784
|
|
|
|
|
|
|
#else |
5785
|
|
|
|
|
|
|
goto not_there; |
5786
|
|
|
|
|
|
|
#endif |
5787
|
|
|
|
|
|
|
|
5788
|
|
|
|
|
|
|
} |
5789
|
0
|
|
|
|
|
|
break; |
5790
|
|
|
|
|
|
|
case 'T': |
5791
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_RT_INNER_CONTENT_TYPE", 26)) { |
5792
|
|
|
|
|
|
|
/* ^ */ |
5793
|
|
|
|
|
|
|
|
5794
|
|
|
|
|
|
|
#ifdef SSL3_RT_INNER_CONTENT_TYPE |
5795
|
|
|
|
|
|
|
return SSL3_RT_INNER_CONTENT_TYPE; |
5796
|
|
|
|
|
|
|
#else |
5797
|
1
|
|
|
|
|
|
goto not_there; |
5798
|
|
|
|
|
|
|
#endif |
5799
|
|
|
|
|
|
|
|
5800
|
|
|
|
|
|
|
} |
5801
|
0
|
|
|
|
|
|
break; |
5802
|
|
|
|
|
|
|
case 'U': |
5803
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_PURPOSE", 26)) { |
5804
|
|
|
|
|
|
|
/* ^ */ |
5805
|
|
|
|
|
|
|
|
5806
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_PURPOSE |
5807
|
1
|
|
|
|
|
|
return X509_V_ERR_INVALID_PURPOSE; |
5808
|
|
|
|
|
|
|
#else |
5809
|
|
|
|
|
|
|
goto not_there; |
5810
|
|
|
|
|
|
|
#endif |
5811
|
|
|
|
|
|
|
|
5812
|
|
|
|
|
|
|
} |
5813
|
0
|
|
|
|
|
|
break; |
5814
|
|
|
|
|
|
|
case 'V': |
5815
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CERTIFICATE_VERIFY", 26)) { |
5816
|
|
|
|
|
|
|
/* ^ */ |
5817
|
|
|
|
|
|
|
|
5818
|
|
|
|
|
|
|
#ifdef SSL3_MT_CERTIFICATE_VERIFY |
5819
|
1
|
|
|
|
|
|
return SSL3_MT_CERTIFICATE_VERIFY; |
5820
|
|
|
|
|
|
|
#else |
5821
|
|
|
|
|
|
|
goto not_there; |
5822
|
|
|
|
|
|
|
#endif |
5823
|
|
|
|
|
|
|
|
5824
|
|
|
|
|
|
|
} |
5825
|
0
|
|
|
|
|
|
break; |
5826
|
|
|
|
|
|
|
case 'X': |
5827
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CRL_HAS_EXPIRED", 26)) { |
5828
|
|
|
|
|
|
|
/* ^ */ |
5829
|
|
|
|
|
|
|
|
5830
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CRL_HAS_EXPIRED |
5831
|
1
|
|
|
|
|
|
return X509_V_ERR_CRL_HAS_EXPIRED; |
5832
|
|
|
|
|
|
|
#else |
5833
|
|
|
|
|
|
|
goto not_there; |
5834
|
|
|
|
|
|
|
#endif |
5835
|
|
|
|
|
|
|
|
5836
|
|
|
|
|
|
|
} |
5837
|
0
|
|
|
|
|
|
break; |
5838
|
|
|
|
|
|
|
case '_': |
5839
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_DISABLE_TLSEXT_CA_NAMES", 26)) { |
5840
|
|
|
|
|
|
|
/* ^ */ |
5841
|
|
|
|
|
|
|
|
5842
|
|
|
|
|
|
|
#ifdef SSL_OP_DISABLE_TLSEXT_CA_NAMES |
5843
|
|
|
|
|
|
|
return SSL_OP_DISABLE_TLSEXT_CA_NAMES; |
5844
|
|
|
|
|
|
|
#else |
5845
|
1
|
|
|
|
|
|
goto not_there; |
5846
|
|
|
|
|
|
|
#endif |
5847
|
|
|
|
|
|
|
|
5848
|
|
|
|
|
|
|
} |
5849
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_PUBLIC_KEY_ENCRYPT_ERROR", 26)) { |
5850
|
|
|
|
|
|
|
/* ^ */ |
5851
|
|
|
|
|
|
|
|
5852
|
|
|
|
|
|
|
#ifdef SSL_R_PUBLIC_KEY_ENCRYPT_ERROR |
5853
|
1
|
|
|
|
|
|
return SSL_R_PUBLIC_KEY_ENCRYPT_ERROR; |
5854
|
|
|
|
|
|
|
#else |
5855
|
|
|
|
|
|
|
goto not_there; |
5856
|
|
|
|
|
|
|
#endif |
5857
|
|
|
|
|
|
|
|
5858
|
|
|
|
|
|
|
} |
5859
|
0
|
|
|
|
|
|
break; |
5860
|
|
|
|
|
|
|
case 'c': |
5861
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_ca_policy_url", 26)) { |
5862
|
|
|
|
|
|
|
/* ^ */ |
5863
|
|
|
|
|
|
|
|
5864
|
|
|
|
|
|
|
#ifdef NID_netscape_ca_policy_url |
5865
|
1
|
|
|
|
|
|
return NID_netscape_ca_policy_url; |
5866
|
|
|
|
|
|
|
#else |
5867
|
|
|
|
|
|
|
goto not_there; |
5868
|
|
|
|
|
|
|
#endif |
5869
|
|
|
|
|
|
|
|
5870
|
|
|
|
|
|
|
} |
5871
|
0
|
|
|
|
|
|
break; |
5872
|
|
|
|
|
|
|
case 'e': |
5873
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_unstructuredName", 26)) { |
5874
|
|
|
|
|
|
|
/* ^ */ |
5875
|
|
|
|
|
|
|
|
5876
|
|
|
|
|
|
|
#ifdef NID_pkcs9_unstructuredName |
5877
|
1
|
|
|
|
|
|
return NID_pkcs9_unstructuredName; |
5878
|
|
|
|
|
|
|
#else |
5879
|
|
|
|
|
|
|
goto not_there; |
5880
|
|
|
|
|
|
|
#endif |
5881
|
|
|
|
|
|
|
|
5882
|
|
|
|
|
|
|
} |
5883
|
0
|
|
|
|
|
|
break; |
5884
|
|
|
|
|
|
|
case 'i': |
5885
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_organizationalUnitName", 26)) { |
5886
|
|
|
|
|
|
|
/* ^ */ |
5887
|
|
|
|
|
|
|
|
5888
|
|
|
|
|
|
|
#ifdef NID_organizationalUnitName |
5889
|
1
|
|
|
|
|
|
return NID_organizationalUnitName; |
5890
|
|
|
|
|
|
|
#else |
5891
|
|
|
|
|
|
|
goto not_there; |
5892
|
|
|
|
|
|
|
#endif |
5893
|
|
|
|
|
|
|
|
5894
|
|
|
|
|
|
|
} |
5895
|
0
|
|
|
|
|
|
break; |
5896
|
|
|
|
|
|
|
case 'n': |
5897
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_countersignature", 26)) { |
5898
|
|
|
|
|
|
|
/* ^ */ |
5899
|
|
|
|
|
|
|
|
5900
|
|
|
|
|
|
|
#ifdef NID_pkcs9_countersignature |
5901
|
1
|
|
|
|
|
|
return NID_pkcs9_countersignature; |
5902
|
|
|
|
|
|
|
#else |
5903
|
|
|
|
|
|
|
goto not_there; |
5904
|
|
|
|
|
|
|
#endif |
5905
|
|
|
|
|
|
|
|
5906
|
|
|
|
|
|
|
} |
5907
|
0
|
|
|
|
|
|
break; |
5908
|
|
|
|
|
|
|
case 'q': |
5909
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_cert_sequence", 26)) { |
5910
|
|
|
|
|
|
|
/* ^ */ |
5911
|
|
|
|
|
|
|
|
5912
|
|
|
|
|
|
|
#ifdef NID_netscape_cert_sequence |
5913
|
1
|
|
|
|
|
|
return NID_netscape_cert_sequence; |
5914
|
|
|
|
|
|
|
#else |
5915
|
|
|
|
|
|
|
goto not_there; |
5916
|
|
|
|
|
|
|
#endif |
5917
|
|
|
|
|
|
|
|
5918
|
|
|
|
|
|
|
} |
5919
|
0
|
|
|
|
|
|
break; |
5920
|
|
|
|
|
|
|
case 't': |
5921
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbeWithMD5AndCast5_CBC", 26)) { |
5922
|
|
|
|
|
|
|
/* ^ */ |
5923
|
|
|
|
|
|
|
|
5924
|
|
|
|
|
|
|
#ifdef NID_pbeWithMD5AndCast5_CBC |
5925
|
1
|
|
|
|
|
|
return NID_pbeWithMD5AndCast5_CBC; |
5926
|
|
|
|
|
|
|
#else |
5927
|
|
|
|
|
|
|
goto not_there; |
5928
|
|
|
|
|
|
|
#endif |
5929
|
|
|
|
|
|
|
|
5930
|
|
|
|
|
|
|
} |
5931
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_subject_key_identifier", 26)) { |
5932
|
|
|
|
|
|
|
/* ^ */ |
5933
|
|
|
|
|
|
|
|
5934
|
|
|
|
|
|
|
#ifdef NID_subject_key_identifier |
5935
|
1
|
|
|
|
|
|
return NID_subject_key_identifier; |
5936
|
|
|
|
|
|
|
#else |
5937
|
|
|
|
|
|
|
goto not_there; |
5938
|
|
|
|
|
|
|
#endif |
5939
|
|
|
|
|
|
|
|
5940
|
|
|
|
|
|
|
} |
5941
|
0
|
|
|
|
|
|
break; |
5942
|
|
|
|
|
|
|
} |
5943
|
0
|
|
|
|
|
|
break; |
5944
|
|
|
|
|
|
|
case 27: |
5945
|
|
|
|
|
|
|
/* Names all of length 27. */ |
5946
|
|
|
|
|
|
|
/* NID_crl_distribution_points NID_netscape_cert_extension |
5947
|
|
|
|
|
|
|
NID_netscape_revocation_url NID_pbe_WithSHA1And40BitRC4 |
5948
|
|
|
|
|
|
|
NID_pkcs9_challengePassword NID_pkcs9_extCertAttributes |
5949
|
|
|
|
|
|
|
OPENSSL_FULL_VERSION_STRING OPENSSL_INFO_LIST_SEPARATOR |
5950
|
|
|
|
|
|
|
OP_CIPHER_SERVER_PREFERENCE OP_SSLEAY_080_CLIENT_DH_BUG |
5951
|
|
|
|
|
|
|
R_BAD_SSL_SESSION_ID_LENGTH R_UNKNOWN_REMOTE_ERROR_TYPE |
5952
|
|
|
|
|
|
|
SSL2_MT_REQUEST_CERTIFICATE SSL3_MT_CERTIFICATE_REQUEST |
5953
|
|
|
|
|
|
|
SSL3_MT_CLIENT_KEY_EXCHANGE SSL3_MT_SERVER_KEY_EXCHANGE |
5954
|
|
|
|
|
|
|
VERIFY_FAIL_IF_NO_PEER_CERT X509_PURPOSE_TIMESTAMP_SIGN |
5955
|
|
|
|
|
|
|
X509_V_ERR_CA_KEY_TOO_SMALL X509_V_ERR_CERT_HAS_EXPIRED |
5956
|
|
|
|
|
|
|
X509_V_ERR_EE_KEY_TOO_SMALL X509_V_FLAG_CB_ISSUER_CHECK |
5957
|
|
|
|
|
|
|
X509_V_FLAG_EXPLICIT_POLICY X509_V_FLAG_IGNORE_CRITICAL |
5958
|
|
|
|
|
|
|
XN_FLAG_DUMP_UNKNOWN_FIELDS */ |
5959
|
|
|
|
|
|
|
/* Offset 13 gives the best switch position. */ |
5960
|
27
|
|
|
|
|
|
switch (name[13]) { |
5961
|
|
|
|
|
|
|
case 'B': |
5962
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_CB_ISSUER_CHECK", 27)) { |
5963
|
|
|
|
|
|
|
/* ^ */ |
5964
|
|
|
|
|
|
|
|
5965
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_CB_ISSUER_CHECK |
5966
|
1
|
|
|
|
|
|
return X509_V_FLAG_CB_ISSUER_CHECK; |
5967
|
|
|
|
|
|
|
#else |
5968
|
|
|
|
|
|
|
goto not_there; |
5969
|
|
|
|
|
|
|
#endif |
5970
|
|
|
|
|
|
|
|
5971
|
|
|
|
|
|
|
} |
5972
|
0
|
|
|
|
|
|
break; |
5973
|
|
|
|
|
|
|
case 'C': |
5974
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_extCertAttributes", 27)) { |
5975
|
|
|
|
|
|
|
/* ^ */ |
5976
|
|
|
|
|
|
|
|
5977
|
|
|
|
|
|
|
#ifdef NID_pkcs9_extCertAttributes |
5978
|
1
|
|
|
|
|
|
return NID_pkcs9_extCertAttributes; |
5979
|
|
|
|
|
|
|
#else |
5980
|
|
|
|
|
|
|
goto not_there; |
5981
|
|
|
|
|
|
|
#endif |
5982
|
|
|
|
|
|
|
|
5983
|
|
|
|
|
|
|
} |
5984
|
0
|
|
|
|
|
|
break; |
5985
|
|
|
|
|
|
|
case 'F': |
5986
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CERTIFICATE_REQUEST", 27)) { |
5987
|
|
|
|
|
|
|
/* ^ */ |
5988
|
|
|
|
|
|
|
|
5989
|
|
|
|
|
|
|
#ifdef SSL3_MT_CERTIFICATE_REQUEST |
5990
|
1
|
|
|
|
|
|
return SSL3_MT_CERTIFICATE_REQUEST; |
5991
|
|
|
|
|
|
|
#else |
5992
|
|
|
|
|
|
|
goto not_there; |
5993
|
|
|
|
|
|
|
#endif |
5994
|
|
|
|
|
|
|
|
5995
|
|
|
|
|
|
|
} |
5996
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "VERIFY_FAIL_IF_NO_PEER_CERT", 27)) { |
5997
|
|
|
|
|
|
|
/* ^ */ |
5998
|
|
|
|
|
|
|
|
5999
|
|
|
|
|
|
|
#ifdef SSL_VERIFY_FAIL_IF_NO_PEER_CERT |
6000
|
1
|
|
|
|
|
|
return SSL_VERIFY_FAIL_IF_NO_PEER_CERT; |
6001
|
|
|
|
|
|
|
#else |
6002
|
|
|
|
|
|
|
goto not_there; |
6003
|
|
|
|
|
|
|
#endif |
6004
|
|
|
|
|
|
|
|
6005
|
|
|
|
|
|
|
} |
6006
|
0
|
|
|
|
|
|
break; |
6007
|
|
|
|
|
|
|
case 'G': |
6008
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_IGNORE_CRITICAL", 27)) { |
6009
|
|
|
|
|
|
|
/* ^ */ |
6010
|
|
|
|
|
|
|
|
6011
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_IGNORE_CRITICAL |
6012
|
1
|
|
|
|
|
|
return X509_V_FLAG_IGNORE_CRITICAL; |
6013
|
|
|
|
|
|
|
#else |
6014
|
|
|
|
|
|
|
goto not_there; |
6015
|
|
|
|
|
|
|
#endif |
6016
|
|
|
|
|
|
|
|
6017
|
|
|
|
|
|
|
} |
6018
|
0
|
|
|
|
|
|
break; |
6019
|
|
|
|
|
|
|
case 'H': |
6020
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And40BitRC4", 27)) { |
6021
|
|
|
|
|
|
|
/* ^ */ |
6022
|
|
|
|
|
|
|
|
6023
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And40BitRC4 |
6024
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And40BitRC4; |
6025
|
|
|
|
|
|
|
#else |
6026
|
|
|
|
|
|
|
goto not_there; |
6027
|
|
|
|
|
|
|
#endif |
6028
|
|
|
|
|
|
|
|
6029
|
|
|
|
|
|
|
} |
6030
|
0
|
|
|
|
|
|
break; |
6031
|
|
|
|
|
|
|
case 'L': |
6032
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_LIST_SEPARATOR", 27)) { |
6033
|
|
|
|
|
|
|
/* ^ */ |
6034
|
|
|
|
|
|
|
|
6035
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_LIST_SEPARATOR |
6036
|
|
|
|
|
|
|
return OPENSSL_INFO_LIST_SEPARATOR; |
6037
|
|
|
|
|
|
|
#else |
6038
|
1
|
|
|
|
|
|
goto not_there; |
6039
|
|
|
|
|
|
|
#endif |
6040
|
|
|
|
|
|
|
|
6041
|
|
|
|
|
|
|
} |
6042
|
0
|
|
|
|
|
|
break; |
6043
|
|
|
|
|
|
|
case 'O': |
6044
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_UNKNOWN_REMOTE_ERROR_TYPE", 27)) { |
6045
|
|
|
|
|
|
|
/* ^ */ |
6046
|
|
|
|
|
|
|
|
6047
|
|
|
|
|
|
|
#ifdef SSL_R_UNKNOWN_REMOTE_ERROR_TYPE |
6048
|
1
|
|
|
|
|
|
return SSL_R_UNKNOWN_REMOTE_ERROR_TYPE; |
6049
|
|
|
|
|
|
|
#else |
6050
|
|
|
|
|
|
|
goto not_there; |
6051
|
|
|
|
|
|
|
#endif |
6052
|
|
|
|
|
|
|
|
6053
|
|
|
|
|
|
|
} |
6054
|
0
|
|
|
|
|
|
break; |
6055
|
|
|
|
|
|
|
case 'R': |
6056
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_SERVER_KEY_EXCHANGE", 27)) { |
6057
|
|
|
|
|
|
|
/* ^ */ |
6058
|
|
|
|
|
|
|
|
6059
|
|
|
|
|
|
|
#ifdef SSL3_MT_SERVER_KEY_EXCHANGE |
6060
|
1
|
|
|
|
|
|
return SSL3_MT_SERVER_KEY_EXCHANGE; |
6061
|
|
|
|
|
|
|
#else |
6062
|
|
|
|
|
|
|
goto not_there; |
6063
|
|
|
|
|
|
|
#endif |
6064
|
|
|
|
|
|
|
|
6065
|
|
|
|
|
|
|
} |
6066
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_HAS_EXPIRED", 27)) { |
6067
|
|
|
|
|
|
|
/* ^ */ |
6068
|
|
|
|
|
|
|
|
6069
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_HAS_EXPIRED |
6070
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_HAS_EXPIRED; |
6071
|
|
|
|
|
|
|
#else |
6072
|
|
|
|
|
|
|
goto not_there; |
6073
|
|
|
|
|
|
|
#endif |
6074
|
|
|
|
|
|
|
|
6075
|
|
|
|
|
|
|
} |
6076
|
0
|
|
|
|
|
|
break; |
6077
|
|
|
|
|
|
|
case 'S': |
6078
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "R_BAD_SSL_SESSION_ID_LENGTH", 27)) { |
6079
|
|
|
|
|
|
|
/* ^ */ |
6080
|
|
|
|
|
|
|
|
6081
|
|
|
|
|
|
|
#ifdef SSL_R_BAD_SSL_SESSION_ID_LENGTH |
6082
|
1
|
|
|
|
|
|
return SSL_R_BAD_SSL_SESSION_ID_LENGTH; |
6083
|
|
|
|
|
|
|
#else |
6084
|
|
|
|
|
|
|
goto not_there; |
6085
|
|
|
|
|
|
|
#endif |
6086
|
|
|
|
|
|
|
|
6087
|
|
|
|
|
|
|
} |
6088
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL2_MT_REQUEST_CERTIFICATE", 27)) { |
6089
|
|
|
|
|
|
|
/* ^ */ |
6090
|
|
|
|
|
|
|
|
6091
|
|
|
|
|
|
|
#ifdef SSL2_MT_REQUEST_CERTIFICATE |
6092
|
1
|
|
|
|
|
|
return SSL2_MT_REQUEST_CERTIFICATE; |
6093
|
|
|
|
|
|
|
#else |
6094
|
|
|
|
|
|
|
goto not_there; |
6095
|
|
|
|
|
|
|
#endif |
6096
|
|
|
|
|
|
|
|
6097
|
|
|
|
|
|
|
} |
6098
|
0
|
|
|
|
|
|
break; |
6099
|
|
|
|
|
|
|
case 'T': |
6100
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_CLIENT_KEY_EXCHANGE", 27)) { |
6101
|
|
|
|
|
|
|
/* ^ */ |
6102
|
|
|
|
|
|
|
|
6103
|
|
|
|
|
|
|
#ifdef SSL3_MT_CLIENT_KEY_EXCHANGE |
6104
|
1
|
|
|
|
|
|
return SSL3_MT_CLIENT_KEY_EXCHANGE; |
6105
|
|
|
|
|
|
|
#else |
6106
|
|
|
|
|
|
|
goto not_there; |
6107
|
|
|
|
|
|
|
#endif |
6108
|
|
|
|
|
|
|
|
6109
|
|
|
|
|
|
|
} |
6110
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_PURPOSE_TIMESTAMP_SIGN", 27)) { |
6111
|
|
|
|
|
|
|
/* ^ */ |
6112
|
|
|
|
|
|
|
|
6113
|
|
|
|
|
|
|
#ifdef X509_PURPOSE_TIMESTAMP_SIGN |
6114
|
1
|
|
|
|
|
|
return X509_PURPOSE_TIMESTAMP_SIGN; |
6115
|
|
|
|
|
|
|
#else |
6116
|
|
|
|
|
|
|
goto not_there; |
6117
|
|
|
|
|
|
|
#endif |
6118
|
|
|
|
|
|
|
|
6119
|
|
|
|
|
|
|
} |
6120
|
0
|
|
|
|
|
|
break; |
6121
|
|
|
|
|
|
|
case 'U': |
6122
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "XN_FLAG_DUMP_UNKNOWN_FIELDS", 27)) { |
6123
|
|
|
|
|
|
|
/* ^ */ |
6124
|
|
|
|
|
|
|
|
6125
|
|
|
|
|
|
|
#ifdef XN_FLAG_DUMP_UNKNOWN_FIELDS |
6126
|
1
|
|
|
|
|
|
return XN_FLAG_DUMP_UNKNOWN_FIELDS; |
6127
|
|
|
|
|
|
|
#else |
6128
|
|
|
|
|
|
|
goto not_there; |
6129
|
|
|
|
|
|
|
#endif |
6130
|
|
|
|
|
|
|
|
6131
|
|
|
|
|
|
|
} |
6132
|
0
|
|
|
|
|
|
break; |
6133
|
|
|
|
|
|
|
case 'V': |
6134
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OPENSSL_FULL_VERSION_STRING", 27)) { |
6135
|
|
|
|
|
|
|
/* ^ */ |
6136
|
|
|
|
|
|
|
|
6137
|
|
|
|
|
|
|
#ifdef OPENSSL_FULL_VERSION_STRING |
6138
|
|
|
|
|
|
|
return OPENSSL_FULL_VERSION_STRING; |
6139
|
|
|
|
|
|
|
#else |
6140
|
1
|
|
|
|
|
|
goto not_there; |
6141
|
|
|
|
|
|
|
#endif |
6142
|
|
|
|
|
|
|
|
6143
|
|
|
|
|
|
|
} |
6144
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_CIPHER_SERVER_PREFERENCE", 27)) { |
6145
|
|
|
|
|
|
|
/* ^ */ |
6146
|
|
|
|
|
|
|
|
6147
|
|
|
|
|
|
|
#ifdef SSL_OP_CIPHER_SERVER_PREFERENCE |
6148
|
1
|
|
|
|
|
|
return SSL_OP_CIPHER_SERVER_PREFERENCE; |
6149
|
|
|
|
|
|
|
#else |
6150
|
|
|
|
|
|
|
goto not_there; |
6151
|
|
|
|
|
|
|
#endif |
6152
|
|
|
|
|
|
|
|
6153
|
|
|
|
|
|
|
} |
6154
|
0
|
|
|
|
|
|
break; |
6155
|
|
|
|
|
|
|
case 'X': |
6156
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_EXPLICIT_POLICY", 27)) { |
6157
|
|
|
|
|
|
|
/* ^ */ |
6158
|
|
|
|
|
|
|
|
6159
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_EXPLICIT_POLICY |
6160
|
2
|
|
|
|
|
|
return X509_V_FLAG_EXPLICIT_POLICY; |
6161
|
|
|
|
|
|
|
#else |
6162
|
|
|
|
|
|
|
goto not_there; |
6163
|
|
|
|
|
|
|
#endif |
6164
|
|
|
|
|
|
|
|
6165
|
|
|
|
|
|
|
} |
6166
|
0
|
|
|
|
|
|
break; |
6167
|
|
|
|
|
|
|
case '_': |
6168
|
3
|
100
|
|
|
|
|
if (!memcmp(name, "OP_SSLEAY_080_CLIENT_DH_BUG", 27)) { |
6169
|
|
|
|
|
|
|
/* ^ */ |
6170
|
|
|
|
|
|
|
|
6171
|
|
|
|
|
|
|
#ifdef SSL_OP_SSLEAY_080_CLIENT_DH_BUG |
6172
|
1
|
|
|
|
|
|
return SSL_OP_SSLEAY_080_CLIENT_DH_BUG; |
6173
|
|
|
|
|
|
|
#else |
6174
|
|
|
|
|
|
|
goto not_there; |
6175
|
|
|
|
|
|
|
#endif |
6176
|
|
|
|
|
|
|
|
6177
|
|
|
|
|
|
|
} |
6178
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CA_KEY_TOO_SMALL", 27)) { |
6179
|
|
|
|
|
|
|
/* ^ */ |
6180
|
|
|
|
|
|
|
|
6181
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CA_KEY_TOO_SMALL |
6182
|
|
|
|
|
|
|
return X509_V_ERR_CA_KEY_TOO_SMALL; |
6183
|
|
|
|
|
|
|
#else |
6184
|
1
|
|
|
|
|
|
goto not_there; |
6185
|
|
|
|
|
|
|
#endif |
6186
|
|
|
|
|
|
|
|
6187
|
|
|
|
|
|
|
} |
6188
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_EE_KEY_TOO_SMALL", 27)) { |
6189
|
|
|
|
|
|
|
/* ^ */ |
6190
|
|
|
|
|
|
|
|
6191
|
|
|
|
|
|
|
#ifdef X509_V_ERR_EE_KEY_TOO_SMALL |
6192
|
|
|
|
|
|
|
return X509_V_ERR_EE_KEY_TOO_SMALL; |
6193
|
|
|
|
|
|
|
#else |
6194
|
1
|
|
|
|
|
|
goto not_there; |
6195
|
|
|
|
|
|
|
#endif |
6196
|
|
|
|
|
|
|
|
6197
|
|
|
|
|
|
|
} |
6198
|
0
|
|
|
|
|
|
break; |
6199
|
|
|
|
|
|
|
case 'c': |
6200
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_cert_extension", 27)) { |
6201
|
|
|
|
|
|
|
/* ^ */ |
6202
|
|
|
|
|
|
|
|
6203
|
|
|
|
|
|
|
#ifdef NID_netscape_cert_extension |
6204
|
1
|
|
|
|
|
|
return NID_netscape_cert_extension; |
6205
|
|
|
|
|
|
|
#else |
6206
|
|
|
|
|
|
|
goto not_there; |
6207
|
|
|
|
|
|
|
#endif |
6208
|
|
|
|
|
|
|
|
6209
|
|
|
|
|
|
|
} |
6210
|
0
|
|
|
|
|
|
break; |
6211
|
|
|
|
|
|
|
case 'i': |
6212
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_crl_distribution_points", 27)) { |
6213
|
|
|
|
|
|
|
/* ^ */ |
6214
|
|
|
|
|
|
|
|
6215
|
|
|
|
|
|
|
#ifdef NID_crl_distribution_points |
6216
|
2
|
|
|
|
|
|
return NID_crl_distribution_points; |
6217
|
|
|
|
|
|
|
#else |
6218
|
|
|
|
|
|
|
goto not_there; |
6219
|
|
|
|
|
|
|
#endif |
6220
|
|
|
|
|
|
|
|
6221
|
|
|
|
|
|
|
} |
6222
|
0
|
|
|
|
|
|
break; |
6223
|
|
|
|
|
|
|
case 'l': |
6224
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_challengePassword", 27)) { |
6225
|
|
|
|
|
|
|
/* ^ */ |
6226
|
|
|
|
|
|
|
|
6227
|
|
|
|
|
|
|
#ifdef NID_pkcs9_challengePassword |
6228
|
1
|
|
|
|
|
|
return NID_pkcs9_challengePassword; |
6229
|
|
|
|
|
|
|
#else |
6230
|
|
|
|
|
|
|
goto not_there; |
6231
|
|
|
|
|
|
|
#endif |
6232
|
|
|
|
|
|
|
|
6233
|
|
|
|
|
|
|
} |
6234
|
0
|
|
|
|
|
|
break; |
6235
|
|
|
|
|
|
|
case 'r': |
6236
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_revocation_url", 27)) { |
6237
|
|
|
|
|
|
|
/* ^ */ |
6238
|
|
|
|
|
|
|
|
6239
|
|
|
|
|
|
|
#ifdef NID_netscape_revocation_url |
6240
|
1
|
|
|
|
|
|
return NID_netscape_revocation_url; |
6241
|
|
|
|
|
|
|
#else |
6242
|
|
|
|
|
|
|
goto not_there; |
6243
|
|
|
|
|
|
|
#endif |
6244
|
|
|
|
|
|
|
|
6245
|
|
|
|
|
|
|
} |
6246
|
0
|
|
|
|
|
|
break; |
6247
|
|
|
|
|
|
|
} |
6248
|
0
|
|
|
|
|
|
break; |
6249
|
|
|
|
|
|
|
case 28: |
6250
|
|
|
|
|
|
|
/* Names all of length 28. */ |
6251
|
|
|
|
|
|
|
/* F_SSL_USE_RSAPRIVATEKEY_ASN1 F_SSL_USE_RSAPRIVATEKEY_FILE |
6252
|
|
|
|
|
|
|
NID_authority_key_identifier NID_netscape_ssl_server_name |
6253
|
|
|
|
|
|
|
NID_pbe_WithSHA1And128BitRC4 NID_pkcs7_signedAndEnveloped |
6254
|
|
|
|
|
|
|
NID_private_key_usage_period OP_NO_EXTENDED_MASTER_SECRET |
6255
|
|
|
|
|
|
|
SESS_CACHE_NO_INTERNAL_STORE SSL3_MT_ENCRYPTED_EXTENSIONS |
6256
|
|
|
|
|
|
|
X509_CHECK_FLAG_NO_WILDCARDS X509_V_ERR_CRL_NOT_YET_VALID |
6257
|
|
|
|
|
|
|
X509_V_ERR_HOSTNAME_MISMATCH X509_V_ERR_INVALID_EXTENSION |
6258
|
|
|
|
|
|
|
X509_V_ERR_ISSUER_NAME_EMPTY X509_V_ERR_OCSP_CERT_UNKNOWN |
6259
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_GET_CRL X509_V_ERR_UNNESTED_RESOURCE */ |
6260
|
|
|
|
|
|
|
/* Offset 11 gives the best switch position. */ |
6261
|
21
|
|
|
|
|
|
switch (name[11]) { |
6262
|
|
|
|
|
|
|
case 'C': |
6263
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CRL_NOT_YET_VALID", 28)) { |
6264
|
|
|
|
|
|
|
/* ^ */ |
6265
|
|
|
|
|
|
|
|
6266
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CRL_NOT_YET_VALID |
6267
|
1
|
|
|
|
|
|
return X509_V_ERR_CRL_NOT_YET_VALID; |
6268
|
|
|
|
|
|
|
#else |
6269
|
|
|
|
|
|
|
goto not_there; |
6270
|
|
|
|
|
|
|
#endif |
6271
|
|
|
|
|
|
|
|
6272
|
|
|
|
|
|
|
} |
6273
|
0
|
|
|
|
|
|
break; |
6274
|
|
|
|
|
|
|
case 'D': |
6275
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_EXTENDED_MASTER_SECRET", 28)) { |
6276
|
|
|
|
|
|
|
/* ^ */ |
6277
|
|
|
|
|
|
|
|
6278
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_EXTENDED_MASTER_SECRET |
6279
|
|
|
|
|
|
|
return SSL_OP_NO_EXTENDED_MASTER_SECRET; |
6280
|
|
|
|
|
|
|
#else |
6281
|
1
|
|
|
|
|
|
goto not_there; |
6282
|
|
|
|
|
|
|
#endif |
6283
|
|
|
|
|
|
|
|
6284
|
|
|
|
|
|
|
} |
6285
|
0
|
|
|
|
|
|
break; |
6286
|
|
|
|
|
|
|
case 'F': |
6287
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_NO_WILDCARDS", 28)) { |
6288
|
|
|
|
|
|
|
/* ^ */ |
6289
|
|
|
|
|
|
|
|
6290
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_NO_WILDCARDS |
6291
|
2
|
|
|
|
|
|
return X509_CHECK_FLAG_NO_WILDCARDS; |
6292
|
|
|
|
|
|
|
#else |
6293
|
|
|
|
|
|
|
goto not_there; |
6294
|
|
|
|
|
|
|
#endif |
6295
|
|
|
|
|
|
|
|
6296
|
|
|
|
|
|
|
} |
6297
|
0
|
|
|
|
|
|
break; |
6298
|
|
|
|
|
|
|
case 'H': |
6299
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_HOSTNAME_MISMATCH", 28)) { |
6300
|
|
|
|
|
|
|
/* ^ */ |
6301
|
|
|
|
|
|
|
|
6302
|
|
|
|
|
|
|
#ifdef X509_V_ERR_HOSTNAME_MISMATCH |
6303
|
2
|
|
|
|
|
|
return X509_V_ERR_HOSTNAME_MISMATCH; |
6304
|
|
|
|
|
|
|
#else |
6305
|
|
|
|
|
|
|
goto not_there; |
6306
|
|
|
|
|
|
|
#endif |
6307
|
|
|
|
|
|
|
|
6308
|
|
|
|
|
|
|
} |
6309
|
0
|
|
|
|
|
|
break; |
6310
|
|
|
|
|
|
|
case 'I': |
6311
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_EXTENSION", 28)) { |
6312
|
|
|
|
|
|
|
/* ^ */ |
6313
|
|
|
|
|
|
|
|
6314
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_EXTENSION |
6315
|
1
|
|
|
|
|
|
return X509_V_ERR_INVALID_EXTENSION; |
6316
|
|
|
|
|
|
|
#else |
6317
|
|
|
|
|
|
|
goto not_there; |
6318
|
|
|
|
|
|
|
#endif |
6319
|
|
|
|
|
|
|
|
6320
|
|
|
|
|
|
|
} |
6321
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_ISSUER_NAME_EMPTY", 28)) { |
6322
|
|
|
|
|
|
|
/* ^ */ |
6323
|
|
|
|
|
|
|
|
6324
|
|
|
|
|
|
|
#ifdef X509_V_ERR_ISSUER_NAME_EMPTY |
6325
|
|
|
|
|
|
|
return X509_V_ERR_ISSUER_NAME_EMPTY; |
6326
|
|
|
|
|
|
|
#else |
6327
|
1
|
|
|
|
|
|
goto not_there; |
6328
|
|
|
|
|
|
|
#endif |
6329
|
|
|
|
|
|
|
|
6330
|
|
|
|
|
|
|
} |
6331
|
0
|
|
|
|
|
|
break; |
6332
|
|
|
|
|
|
|
case 'N': |
6333
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_NO_INTERNAL_STORE", 28)) { |
6334
|
|
|
|
|
|
|
/* ^ */ |
6335
|
|
|
|
|
|
|
|
6336
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_NO_INTERNAL_STORE |
6337
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_NO_INTERNAL_STORE; |
6338
|
|
|
|
|
|
|
#else |
6339
|
|
|
|
|
|
|
goto not_there; |
6340
|
|
|
|
|
|
|
#endif |
6341
|
|
|
|
|
|
|
|
6342
|
|
|
|
|
|
|
} |
6343
|
0
|
|
|
|
|
|
break; |
6344
|
|
|
|
|
|
|
case 'O': |
6345
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_OCSP_CERT_UNKNOWN", 28)) { |
6346
|
|
|
|
|
|
|
/* ^ */ |
6347
|
|
|
|
|
|
|
|
6348
|
|
|
|
|
|
|
#ifdef X509_V_ERR_OCSP_CERT_UNKNOWN |
6349
|
|
|
|
|
|
|
return X509_V_ERR_OCSP_CERT_UNKNOWN; |
6350
|
|
|
|
|
|
|
#else |
6351
|
1
|
|
|
|
|
|
goto not_there; |
6352
|
|
|
|
|
|
|
#endif |
6353
|
|
|
|
|
|
|
|
6354
|
|
|
|
|
|
|
} |
6355
|
0
|
|
|
|
|
|
break; |
6356
|
|
|
|
|
|
|
case 'R': |
6357
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SSL3_MT_ENCRYPTED_EXTENSIONS", 28)) { |
6358
|
|
|
|
|
|
|
/* ^ */ |
6359
|
|
|
|
|
|
|
|
6360
|
|
|
|
|
|
|
#ifdef SSL3_MT_ENCRYPTED_EXTENSIONS |
6361
|
|
|
|
|
|
|
return SSL3_MT_ENCRYPTED_EXTENSIONS; |
6362
|
|
|
|
|
|
|
#else |
6363
|
1
|
|
|
|
|
|
goto not_there; |
6364
|
|
|
|
|
|
|
#endif |
6365
|
|
|
|
|
|
|
|
6366
|
|
|
|
|
|
|
} |
6367
|
0
|
|
|
|
|
|
break; |
6368
|
|
|
|
|
|
|
case 'S': |
6369
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_RSAPRIVATEKEY_ASN1", 28)) { |
6370
|
|
|
|
|
|
|
/* ^ */ |
6371
|
|
|
|
|
|
|
|
6372
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1 |
6373
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1; |
6374
|
|
|
|
|
|
|
#else |
6375
|
|
|
|
|
|
|
goto not_there; |
6376
|
|
|
|
|
|
|
#endif |
6377
|
|
|
|
|
|
|
|
6378
|
|
|
|
|
|
|
} |
6379
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "F_SSL_USE_RSAPRIVATEKEY_FILE", 28)) { |
6380
|
|
|
|
|
|
|
/* ^ */ |
6381
|
|
|
|
|
|
|
|
6382
|
|
|
|
|
|
|
#ifdef SSL_F_SSL_USE_RSAPRIVATEKEY_FILE |
6383
|
1
|
|
|
|
|
|
return SSL_F_SSL_USE_RSAPRIVATEKEY_FILE; |
6384
|
|
|
|
|
|
|
#else |
6385
|
|
|
|
|
|
|
goto not_there; |
6386
|
|
|
|
|
|
|
#endif |
6387
|
|
|
|
|
|
|
|
6388
|
|
|
|
|
|
|
} |
6389
|
0
|
|
|
|
|
|
break; |
6390
|
|
|
|
|
|
|
case 'U': |
6391
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_CRL", 28)) { |
6392
|
|
|
|
|
|
|
/* ^ */ |
6393
|
|
|
|
|
|
|
|
6394
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_GET_CRL |
6395
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_GET_CRL; |
6396
|
|
|
|
|
|
|
#else |
6397
|
|
|
|
|
|
|
goto not_there; |
6398
|
|
|
|
|
|
|
#endif |
6399
|
|
|
|
|
|
|
|
6400
|
|
|
|
|
|
|
} |
6401
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNNESTED_RESOURCE", 28)) { |
6402
|
|
|
|
|
|
|
/* ^ */ |
6403
|
|
|
|
|
|
|
|
6404
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNNESTED_RESOURCE |
6405
|
1
|
|
|
|
|
|
return X509_V_ERR_UNNESTED_RESOURCE; |
6406
|
|
|
|
|
|
|
#else |
6407
|
|
|
|
|
|
|
goto not_there; |
6408
|
|
|
|
|
|
|
#endif |
6409
|
|
|
|
|
|
|
|
6410
|
|
|
|
|
|
|
} |
6411
|
0
|
|
|
|
|
|
break; |
6412
|
|
|
|
|
|
|
case '_': |
6413
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_private_key_usage_period", 28)) { |
6414
|
|
|
|
|
|
|
/* ^ */ |
6415
|
|
|
|
|
|
|
|
6416
|
|
|
|
|
|
|
#ifdef NID_private_key_usage_period |
6417
|
1
|
|
|
|
|
|
return NID_private_key_usage_period; |
6418
|
|
|
|
|
|
|
#else |
6419
|
|
|
|
|
|
|
goto not_there; |
6420
|
|
|
|
|
|
|
#endif |
6421
|
|
|
|
|
|
|
|
6422
|
|
|
|
|
|
|
} |
6423
|
0
|
|
|
|
|
|
break; |
6424
|
|
|
|
|
|
|
case 'e': |
6425
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_ssl_server_name", 28)) { |
6426
|
|
|
|
|
|
|
/* ^ */ |
6427
|
|
|
|
|
|
|
|
6428
|
|
|
|
|
|
|
#ifdef NID_netscape_ssl_server_name |
6429
|
1
|
|
|
|
|
|
return NID_netscape_ssl_server_name; |
6430
|
|
|
|
|
|
|
#else |
6431
|
|
|
|
|
|
|
goto not_there; |
6432
|
|
|
|
|
|
|
#endif |
6433
|
|
|
|
|
|
|
|
6434
|
|
|
|
|
|
|
} |
6435
|
0
|
|
|
|
|
|
break; |
6436
|
|
|
|
|
|
|
case 'h': |
6437
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And128BitRC4", 28)) { |
6438
|
|
|
|
|
|
|
/* ^ */ |
6439
|
|
|
|
|
|
|
|
6440
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And128BitRC4 |
6441
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And128BitRC4; |
6442
|
|
|
|
|
|
|
#else |
6443
|
|
|
|
|
|
|
goto not_there; |
6444
|
|
|
|
|
|
|
#endif |
6445
|
|
|
|
|
|
|
|
6446
|
|
|
|
|
|
|
} |
6447
|
0
|
|
|
|
|
|
break; |
6448
|
|
|
|
|
|
|
case 'i': |
6449
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs7_signedAndEnveloped", 28)) { |
6450
|
|
|
|
|
|
|
/* ^ */ |
6451
|
|
|
|
|
|
|
|
6452
|
|
|
|
|
|
|
#ifdef NID_pkcs7_signedAndEnveloped |
6453
|
1
|
|
|
|
|
|
return NID_pkcs7_signedAndEnveloped; |
6454
|
|
|
|
|
|
|
#else |
6455
|
|
|
|
|
|
|
goto not_there; |
6456
|
|
|
|
|
|
|
#endif |
6457
|
|
|
|
|
|
|
|
6458
|
|
|
|
|
|
|
} |
6459
|
0
|
|
|
|
|
|
break; |
6460
|
|
|
|
|
|
|
case 't': |
6461
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "NID_authority_key_identifier", 28)) { |
6462
|
|
|
|
|
|
|
/* ^ */ |
6463
|
|
|
|
|
|
|
|
6464
|
|
|
|
|
|
|
#ifdef NID_authority_key_identifier |
6465
|
2
|
|
|
|
|
|
return NID_authority_key_identifier; |
6466
|
|
|
|
|
|
|
#else |
6467
|
|
|
|
|
|
|
goto not_there; |
6468
|
|
|
|
|
|
|
#endif |
6469
|
|
|
|
|
|
|
|
6470
|
|
|
|
|
|
|
} |
6471
|
0
|
|
|
|
|
|
break; |
6472
|
|
|
|
|
|
|
} |
6473
|
0
|
|
|
|
|
|
break; |
6474
|
|
|
|
|
|
|
case 29: |
6475
|
|
|
|
|
|
|
/* Names all of length 29. */ |
6476
|
|
|
|
|
|
|
/* NID_pkcs9_unstructuredAddress OCSP_RESPONSE_STATUS_TRYLATER |
6477
|
|
|
|
|
|
|
OP_ALLOW_CLIENT_RENEGOTIATION OP_MICROSOFT_BIG_SSLV3_BUFFER |
6478
|
|
|
|
|
|
|
R_SSL_SESSION_ID_IS_DIFFERENT SESS_CACHE_NO_INTERNAL_LOOKUP |
6479
|
|
|
|
|
|
|
X509_V_ERR_AKID_SKID_MISMATCH X509_V_ERR_CERT_NOT_YET_VALID |
6480
|
|
|
|
|
|
|
X509_V_ERR_EXCLUDED_VIOLATION X509_V_ERR_NO_EXPLICIT_POLICY |
6481
|
|
|
|
|
|
|
X509_V_ERR_OCSP_VERIFY_FAILED X509_V_ERR_OCSP_VERIFY_NEEDED |
6482
|
|
|
|
|
|
|
X509_V_ERR_SUBJECT_NAME_EMPTY X509_V_FLAG_ALLOW_PROXY_CERTS */ |
6483
|
|
|
|
|
|
|
/* Offset 16 gives the best switch position. */ |
6484
|
17
|
|
|
|
|
|
switch (name[16]) { |
6485
|
|
|
|
|
|
|
case 'A': |
6486
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_TRYLATER", 29)) { |
6487
|
|
|
|
|
|
|
/* ^ */ |
6488
|
|
|
|
|
|
|
|
6489
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_TRYLATER |
6490
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_TRYLATER; |
6491
|
|
|
|
|
|
|
#else |
6492
|
|
|
|
|
|
|
goto not_there; |
6493
|
|
|
|
|
|
|
#endif |
6494
|
|
|
|
|
|
|
|
6495
|
|
|
|
|
|
|
} |
6496
|
0
|
|
|
|
|
|
break; |
6497
|
|
|
|
|
|
|
case 'C': |
6498
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUBJECT_NAME_EMPTY", 29)) { |
6499
|
|
|
|
|
|
|
/* ^ */ |
6500
|
|
|
|
|
|
|
|
6501
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUBJECT_NAME_EMPTY |
6502
|
|
|
|
|
|
|
return X509_V_ERR_SUBJECT_NAME_EMPTY; |
6503
|
|
|
|
|
|
|
#else |
6504
|
1
|
|
|
|
|
|
goto not_there; |
6505
|
|
|
|
|
|
|
#endif |
6506
|
|
|
|
|
|
|
|
6507
|
|
|
|
|
|
|
} |
6508
|
0
|
|
|
|
|
|
break; |
6509
|
|
|
|
|
|
|
case 'D': |
6510
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_EXCLUDED_VIOLATION", 29)) { |
6511
|
|
|
|
|
|
|
/* ^ */ |
6512
|
|
|
|
|
|
|
|
6513
|
|
|
|
|
|
|
#ifdef X509_V_ERR_EXCLUDED_VIOLATION |
6514
|
1
|
|
|
|
|
|
return X509_V_ERR_EXCLUDED_VIOLATION; |
6515
|
|
|
|
|
|
|
#else |
6516
|
|
|
|
|
|
|
goto not_there; |
6517
|
|
|
|
|
|
|
#endif |
6518
|
|
|
|
|
|
|
|
6519
|
|
|
|
|
|
|
} |
6520
|
0
|
|
|
|
|
|
break; |
6521
|
|
|
|
|
|
|
case 'N': |
6522
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_NOT_YET_VALID", 29)) { |
6523
|
|
|
|
|
|
|
/* ^ */ |
6524
|
|
|
|
|
|
|
|
6525
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_NOT_YET_VALID |
6526
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_NOT_YET_VALID; |
6527
|
|
|
|
|
|
|
#else |
6528
|
|
|
|
|
|
|
goto not_there; |
6529
|
|
|
|
|
|
|
#endif |
6530
|
|
|
|
|
|
|
|
6531
|
|
|
|
|
|
|
} |
6532
|
0
|
|
|
|
|
|
break; |
6533
|
|
|
|
|
|
|
case 'P': |
6534
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_NO_EXPLICIT_POLICY", 29)) { |
6535
|
|
|
|
|
|
|
/* ^ */ |
6536
|
|
|
|
|
|
|
|
6537
|
|
|
|
|
|
|
#ifdef X509_V_ERR_NO_EXPLICIT_POLICY |
6538
|
2
|
|
|
|
|
|
return X509_V_ERR_NO_EXPLICIT_POLICY; |
6539
|
|
|
|
|
|
|
#else |
6540
|
|
|
|
|
|
|
goto not_there; |
6541
|
|
|
|
|
|
|
#endif |
6542
|
|
|
|
|
|
|
|
6543
|
|
|
|
|
|
|
} |
6544
|
0
|
|
|
|
|
|
break; |
6545
|
|
|
|
|
|
|
case 'R': |
6546
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_ALLOW_CLIENT_RENEGOTIATION", 29)) { |
6547
|
|
|
|
|
|
|
/* ^ */ |
6548
|
|
|
|
|
|
|
|
6549
|
|
|
|
|
|
|
#ifdef SSL_OP_ALLOW_CLIENT_RENEGOTIATION |
6550
|
|
|
|
|
|
|
return SSL_OP_ALLOW_CLIENT_RENEGOTIATION; |
6551
|
|
|
|
|
|
|
#else |
6552
|
1
|
|
|
|
|
|
goto not_there; |
6553
|
|
|
|
|
|
|
#endif |
6554
|
|
|
|
|
|
|
|
6555
|
|
|
|
|
|
|
} |
6556
|
0
|
|
|
|
|
|
break; |
6557
|
|
|
|
|
|
|
case 'S': |
6558
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_AKID_SKID_MISMATCH", 29)) { |
6559
|
|
|
|
|
|
|
/* ^ */ |
6560
|
|
|
|
|
|
|
|
6561
|
|
|
|
|
|
|
#ifdef X509_V_ERR_AKID_SKID_MISMATCH |
6562
|
1
|
|
|
|
|
|
return X509_V_ERR_AKID_SKID_MISMATCH; |
6563
|
|
|
|
|
|
|
#else |
6564
|
|
|
|
|
|
|
goto not_there; |
6565
|
|
|
|
|
|
|
#endif |
6566
|
|
|
|
|
|
|
|
6567
|
|
|
|
|
|
|
} |
6568
|
0
|
|
|
|
|
|
break; |
6569
|
|
|
|
|
|
|
case 'T': |
6570
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "SESS_CACHE_NO_INTERNAL_LOOKUP", 29)) { |
6571
|
|
|
|
|
|
|
/* ^ */ |
6572
|
|
|
|
|
|
|
|
6573
|
|
|
|
|
|
|
#ifdef SSL_SESS_CACHE_NO_INTERNAL_LOOKUP |
6574
|
1
|
|
|
|
|
|
return SSL_SESS_CACHE_NO_INTERNAL_LOOKUP; |
6575
|
|
|
|
|
|
|
#else |
6576
|
|
|
|
|
|
|
goto not_there; |
6577
|
|
|
|
|
|
|
#endif |
6578
|
|
|
|
|
|
|
|
6579
|
|
|
|
|
|
|
} |
6580
|
0
|
|
|
|
|
|
break; |
6581
|
|
|
|
|
|
|
case 'V': |
6582
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_OCSP_VERIFY_FAILED", 29)) { |
6583
|
|
|
|
|
|
|
/* ^ */ |
6584
|
|
|
|
|
|
|
|
6585
|
|
|
|
|
|
|
#ifdef X509_V_ERR_OCSP_VERIFY_FAILED |
6586
|
|
|
|
|
|
|
return X509_V_ERR_OCSP_VERIFY_FAILED; |
6587
|
|
|
|
|
|
|
#else |
6588
|
1
|
|
|
|
|
|
goto not_there; |
6589
|
|
|
|
|
|
|
#endif |
6590
|
|
|
|
|
|
|
|
6591
|
|
|
|
|
|
|
} |
6592
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_OCSP_VERIFY_NEEDED", 29)) { |
6593
|
|
|
|
|
|
|
/* ^ */ |
6594
|
|
|
|
|
|
|
|
6595
|
|
|
|
|
|
|
#ifdef X509_V_ERR_OCSP_VERIFY_NEEDED |
6596
|
|
|
|
|
|
|
return X509_V_ERR_OCSP_VERIFY_NEEDED; |
6597
|
|
|
|
|
|
|
#else |
6598
|
1
|
|
|
|
|
|
goto not_there; |
6599
|
|
|
|
|
|
|
#endif |
6600
|
|
|
|
|
|
|
|
6601
|
|
|
|
|
|
|
} |
6602
|
0
|
|
|
|
|
|
break; |
6603
|
|
|
|
|
|
|
case 'W': |
6604
|
3
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_ALLOW_PROXY_CERTS", 29)) { |
6605
|
|
|
|
|
|
|
/* ^ */ |
6606
|
|
|
|
|
|
|
|
6607
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_ALLOW_PROXY_CERTS |
6608
|
3
|
|
|
|
|
|
return X509_V_FLAG_ALLOW_PROXY_CERTS; |
6609
|
|
|
|
|
|
|
#else |
6610
|
|
|
|
|
|
|
goto not_there; |
6611
|
|
|
|
|
|
|
#endif |
6612
|
|
|
|
|
|
|
|
6613
|
|
|
|
|
|
|
} |
6614
|
0
|
|
|
|
|
|
break; |
6615
|
|
|
|
|
|
|
case '_': |
6616
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "OP_MICROSOFT_BIG_SSLV3_BUFFER", 29)) { |
6617
|
|
|
|
|
|
|
/* ^ */ |
6618
|
|
|
|
|
|
|
|
6619
|
|
|
|
|
|
|
#ifdef SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER |
6620
|
1
|
|
|
|
|
|
return SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER; |
6621
|
|
|
|
|
|
|
#else |
6622
|
|
|
|
|
|
|
goto not_there; |
6623
|
|
|
|
|
|
|
#endif |
6624
|
|
|
|
|
|
|
|
6625
|
|
|
|
|
|
|
} |
6626
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_SSL_SESSION_ID_IS_DIFFERENT", 29)) { |
6627
|
|
|
|
|
|
|
/* ^ */ |
6628
|
|
|
|
|
|
|
|
6629
|
|
|
|
|
|
|
#ifdef SSL_R_SSL_SESSION_ID_IS_DIFFERENT |
6630
|
1
|
|
|
|
|
|
return SSL_R_SSL_SESSION_ID_IS_DIFFERENT; |
6631
|
|
|
|
|
|
|
#else |
6632
|
|
|
|
|
|
|
goto not_there; |
6633
|
|
|
|
|
|
|
#endif |
6634
|
|
|
|
|
|
|
|
6635
|
|
|
|
|
|
|
} |
6636
|
0
|
|
|
|
|
|
break; |
6637
|
|
|
|
|
|
|
case 'c': |
6638
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pkcs9_unstructuredAddress", 29)) { |
6639
|
|
|
|
|
|
|
/* ^ */ |
6640
|
|
|
|
|
|
|
|
6641
|
|
|
|
|
|
|
#ifdef NID_pkcs9_unstructuredAddress |
6642
|
1
|
|
|
|
|
|
return NID_pkcs9_unstructuredAddress; |
6643
|
|
|
|
|
|
|
#else |
6644
|
|
|
|
|
|
|
goto not_there; |
6645
|
|
|
|
|
|
|
#endif |
6646
|
|
|
|
|
|
|
|
6647
|
|
|
|
|
|
|
} |
6648
|
0
|
|
|
|
|
|
break; |
6649
|
|
|
|
|
|
|
} |
6650
|
0
|
|
|
|
|
|
break; |
6651
|
|
|
|
|
|
|
case 30: |
6652
|
|
|
|
|
|
|
/* Names all of length 30. */ |
6653
|
|
|
|
|
|
|
/* NID_netscape_ca_revocation_url OP_DONT_INSERT_EMPTY_FRAGMENTS |
6654
|
|
|
|
|
|
|
OP_SSLREF2_REUSE_CERT_TYPE_BUG R_UNABLE_TO_EXTRACT_PUBLIC_KEY |
6655
|
|
|
|
|
|
|
X509_V_ERR_CERT_CHAIN_TOO_LONG X509_V_ERR_DIFFERENT_CRL_SCOPE |
6656
|
|
|
|
|
|
|
X509_V_ERR_IP_ADDRESS_MISMATCH X509_V_ERR_PERMITTED_VIOLATION |
6657
|
|
|
|
|
|
|
X509_V_FLAG_CHECK_SS_SIGNATURE */ |
6658
|
|
|
|
|
|
|
/* Offset 24 gives the best switch position. */ |
6659
|
9
|
|
|
|
|
|
switch (name[24]) { |
6660
|
|
|
|
|
|
|
case 'G': |
6661
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_DONT_INSERT_EMPTY_FRAGMENTS", 30)) { |
6662
|
|
|
|
|
|
|
/* ^ */ |
6663
|
|
|
|
|
|
|
|
6664
|
|
|
|
|
|
|
#ifdef SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS |
6665
|
1
|
|
|
|
|
|
return SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS; |
6666
|
|
|
|
|
|
|
#else |
6667
|
|
|
|
|
|
|
goto not_there; |
6668
|
|
|
|
|
|
|
#endif |
6669
|
|
|
|
|
|
|
|
6670
|
|
|
|
|
|
|
} |
6671
|
0
|
|
|
|
|
|
break; |
6672
|
|
|
|
|
|
|
case 'I': |
6673
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_UNABLE_TO_EXTRACT_PUBLIC_KEY", 30)) { |
6674
|
|
|
|
|
|
|
/* ^ */ |
6675
|
|
|
|
|
|
|
|
6676
|
|
|
|
|
|
|
#ifdef SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY |
6677
|
1
|
|
|
|
|
|
return SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY; |
6678
|
|
|
|
|
|
|
#else |
6679
|
|
|
|
|
|
|
goto not_there; |
6680
|
|
|
|
|
|
|
#endif |
6681
|
|
|
|
|
|
|
|
6682
|
|
|
|
|
|
|
} |
6683
|
0
|
|
|
|
|
|
break; |
6684
|
|
|
|
|
|
|
case 'L': |
6685
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PERMITTED_VIOLATION", 30)) { |
6686
|
|
|
|
|
|
|
/* ^ */ |
6687
|
|
|
|
|
|
|
|
6688
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PERMITTED_VIOLATION |
6689
|
1
|
|
|
|
|
|
return X509_V_ERR_PERMITTED_VIOLATION; |
6690
|
|
|
|
|
|
|
#else |
6691
|
|
|
|
|
|
|
goto not_there; |
6692
|
|
|
|
|
|
|
#endif |
6693
|
|
|
|
|
|
|
|
6694
|
|
|
|
|
|
|
} |
6695
|
0
|
|
|
|
|
|
break; |
6696
|
|
|
|
|
|
|
case 'N': |
6697
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_CHECK_SS_SIGNATURE", 30)) { |
6698
|
|
|
|
|
|
|
/* ^ */ |
6699
|
|
|
|
|
|
|
|
6700
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_CHECK_SS_SIGNATURE |
6701
|
1
|
|
|
|
|
|
return X509_V_FLAG_CHECK_SS_SIGNATURE; |
6702
|
|
|
|
|
|
|
#else |
6703
|
|
|
|
|
|
|
goto not_there; |
6704
|
|
|
|
|
|
|
#endif |
6705
|
|
|
|
|
|
|
|
6706
|
|
|
|
|
|
|
} |
6707
|
0
|
|
|
|
|
|
break; |
6708
|
|
|
|
|
|
|
case 'O': |
6709
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_CHAIN_TOO_LONG", 30)) { |
6710
|
|
|
|
|
|
|
/* ^ */ |
6711
|
|
|
|
|
|
|
|
6712
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_CHAIN_TOO_LONG |
6713
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_CHAIN_TOO_LONG; |
6714
|
|
|
|
|
|
|
#else |
6715
|
|
|
|
|
|
|
goto not_there; |
6716
|
|
|
|
|
|
|
#endif |
6717
|
|
|
|
|
|
|
|
6718
|
|
|
|
|
|
|
} |
6719
|
0
|
|
|
|
|
|
break; |
6720
|
|
|
|
|
|
|
case 'P': |
6721
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_SSLREF2_REUSE_CERT_TYPE_BUG", 30)) { |
6722
|
|
|
|
|
|
|
/* ^ */ |
6723
|
|
|
|
|
|
|
|
6724
|
|
|
|
|
|
|
#ifdef SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG |
6725
|
1
|
|
|
|
|
|
return SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG; |
6726
|
|
|
|
|
|
|
#else |
6727
|
|
|
|
|
|
|
goto not_there; |
6728
|
|
|
|
|
|
|
#endif |
6729
|
|
|
|
|
|
|
|
6730
|
|
|
|
|
|
|
} |
6731
|
0
|
|
|
|
|
|
break; |
6732
|
|
|
|
|
|
|
case 'S': |
6733
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_IP_ADDRESS_MISMATCH", 30)) { |
6734
|
|
|
|
|
|
|
/* ^ */ |
6735
|
|
|
|
|
|
|
|
6736
|
|
|
|
|
|
|
#ifdef X509_V_ERR_IP_ADDRESS_MISMATCH |
6737
|
1
|
|
|
|
|
|
return X509_V_ERR_IP_ADDRESS_MISMATCH; |
6738
|
|
|
|
|
|
|
#else |
6739
|
|
|
|
|
|
|
goto not_there; |
6740
|
|
|
|
|
|
|
#endif |
6741
|
|
|
|
|
|
|
|
6742
|
|
|
|
|
|
|
} |
6743
|
0
|
|
|
|
|
|
break; |
6744
|
|
|
|
|
|
|
case '_': |
6745
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_DIFFERENT_CRL_SCOPE", 30)) { |
6746
|
|
|
|
|
|
|
/* ^ */ |
6747
|
|
|
|
|
|
|
|
6748
|
|
|
|
|
|
|
#ifdef X509_V_ERR_DIFFERENT_CRL_SCOPE |
6749
|
1
|
|
|
|
|
|
return X509_V_ERR_DIFFERENT_CRL_SCOPE; |
6750
|
|
|
|
|
|
|
#else |
6751
|
|
|
|
|
|
|
goto not_there; |
6752
|
|
|
|
|
|
|
#endif |
6753
|
|
|
|
|
|
|
|
6754
|
|
|
|
|
|
|
} |
6755
|
0
|
|
|
|
|
|
break; |
6756
|
|
|
|
|
|
|
case 'o': |
6757
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_netscape_ca_revocation_url", 30)) { |
6758
|
|
|
|
|
|
|
/* ^ */ |
6759
|
|
|
|
|
|
|
|
6760
|
|
|
|
|
|
|
#ifdef NID_netscape_ca_revocation_url |
6761
|
1
|
|
|
|
|
|
return NID_netscape_ca_revocation_url; |
6762
|
|
|
|
|
|
|
#else |
6763
|
|
|
|
|
|
|
goto not_there; |
6764
|
|
|
|
|
|
|
#endif |
6765
|
|
|
|
|
|
|
|
6766
|
|
|
|
|
|
|
} |
6767
|
0
|
|
|
|
|
|
break; |
6768
|
|
|
|
|
|
|
} |
6769
|
0
|
|
|
|
|
|
break; |
6770
|
|
|
|
|
|
|
case 31: |
6771
|
|
|
|
|
|
|
/* Names all of length 31. */ |
6772
|
|
|
|
|
|
|
/* MIN_RSA_MODULUS_LENGTH_IN_BYTES MODE_ACCEPT_MOVING_WRITE_BUFFER |
6773
|
|
|
|
|
|
|
NID_pbe_WithSHA1And40BitRC2_CBC OCSP_RESPONSE_STATUS_SUCCESSFUL |
6774
|
|
|
|
|
|
|
X509_V_ERR_KEYUSAGE_NO_CERTSIGN X509_V_ERR_KEYUSAGE_NO_CRL_SIGN |
6775
|
|
|
|
|
|
|
X509_V_ERR_NO_ISSUER_PUBLIC_KEY X509_V_ERR_PATH_LENGTH_EXCEEDED |
6776
|
|
|
|
|
|
|
X509_V_FLAG_SUITEB_128_LOS_ONLY */ |
6777
|
|
|
|
|
|
|
/* Offset 24 gives the best switch position. */ |
6778
|
9
|
|
|
|
|
|
switch (name[24]) { |
6779
|
|
|
|
|
|
|
case 'C': |
6780
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_SUCCESSFUL", 31)) { |
6781
|
|
|
|
|
|
|
/* ^ */ |
6782
|
|
|
|
|
|
|
|
6783
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_SUCCESSFUL |
6784
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_SUCCESSFUL; |
6785
|
|
|
|
|
|
|
#else |
6786
|
|
|
|
|
|
|
goto not_there; |
6787
|
|
|
|
|
|
|
#endif |
6788
|
|
|
|
|
|
|
|
6789
|
|
|
|
|
|
|
} |
6790
|
0
|
|
|
|
|
|
break; |
6791
|
|
|
|
|
|
|
case 'E': |
6792
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CERTSIGN", 31)) { |
6793
|
|
|
|
|
|
|
/* ^ */ |
6794
|
|
|
|
|
|
|
|
6795
|
|
|
|
|
|
|
#ifdef X509_V_ERR_KEYUSAGE_NO_CERTSIGN |
6796
|
1
|
|
|
|
|
|
return X509_V_ERR_KEYUSAGE_NO_CERTSIGN; |
6797
|
|
|
|
|
|
|
#else |
6798
|
|
|
|
|
|
|
goto not_there; |
6799
|
|
|
|
|
|
|
#endif |
6800
|
|
|
|
|
|
|
|
6801
|
|
|
|
|
|
|
} |
6802
|
0
|
|
|
|
|
|
break; |
6803
|
|
|
|
|
|
|
case 'L': |
6804
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_NO_ISSUER_PUBLIC_KEY", 31)) { |
6805
|
|
|
|
|
|
|
/* ^ */ |
6806
|
|
|
|
|
|
|
|
6807
|
|
|
|
|
|
|
#ifdef X509_V_ERR_NO_ISSUER_PUBLIC_KEY |
6808
|
|
|
|
|
|
|
return X509_V_ERR_NO_ISSUER_PUBLIC_KEY; |
6809
|
|
|
|
|
|
|
#else |
6810
|
1
|
|
|
|
|
|
goto not_there; |
6811
|
|
|
|
|
|
|
#endif |
6812
|
|
|
|
|
|
|
|
6813
|
|
|
|
|
|
|
} |
6814
|
0
|
|
|
|
|
|
break; |
6815
|
|
|
|
|
|
|
case 'N': |
6816
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MIN_RSA_MODULUS_LENGTH_IN_BYTES", 31)) { |
6817
|
|
|
|
|
|
|
/* ^ */ |
6818
|
|
|
|
|
|
|
|
6819
|
|
|
|
|
|
|
#ifdef SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES |
6820
|
1
|
|
|
|
|
|
return SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES; |
6821
|
|
|
|
|
|
|
#else |
6822
|
|
|
|
|
|
|
goto not_there; |
6823
|
|
|
|
|
|
|
#endif |
6824
|
|
|
|
|
|
|
|
6825
|
|
|
|
|
|
|
} |
6826
|
0
|
|
|
|
|
|
break; |
6827
|
|
|
|
|
|
|
case 'O': |
6828
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_SUITEB_128_LOS_ONLY", 31)) { |
6829
|
|
|
|
|
|
|
/* ^ */ |
6830
|
|
|
|
|
|
|
|
6831
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_SUITEB_128_LOS_ONLY |
6832
|
1
|
|
|
|
|
|
return X509_V_FLAG_SUITEB_128_LOS_ONLY; |
6833
|
|
|
|
|
|
|
#else |
6834
|
|
|
|
|
|
|
goto not_there; |
6835
|
|
|
|
|
|
|
#endif |
6836
|
|
|
|
|
|
|
|
6837
|
|
|
|
|
|
|
} |
6838
|
0
|
|
|
|
|
|
break; |
6839
|
|
|
|
|
|
|
case 'R': |
6840
|
2
|
100
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And40BitRC2_CBC", 31)) { |
6841
|
|
|
|
|
|
|
/* ^ */ |
6842
|
|
|
|
|
|
|
|
6843
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And40BitRC2_CBC |
6844
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And40BitRC2_CBC; |
6845
|
|
|
|
|
|
|
#else |
6846
|
|
|
|
|
|
|
goto not_there; |
6847
|
|
|
|
|
|
|
#endif |
6848
|
|
|
|
|
|
|
|
6849
|
|
|
|
|
|
|
} |
6850
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_CRL_SIGN", 31)) { |
6851
|
|
|
|
|
|
|
/* ^ */ |
6852
|
|
|
|
|
|
|
|
6853
|
|
|
|
|
|
|
#ifdef X509_V_ERR_KEYUSAGE_NO_CRL_SIGN |
6854
|
1
|
|
|
|
|
|
return X509_V_ERR_KEYUSAGE_NO_CRL_SIGN; |
6855
|
|
|
|
|
|
|
#else |
6856
|
|
|
|
|
|
|
goto not_there; |
6857
|
|
|
|
|
|
|
#endif |
6858
|
|
|
|
|
|
|
|
6859
|
|
|
|
|
|
|
} |
6860
|
0
|
|
|
|
|
|
break; |
6861
|
|
|
|
|
|
|
case 'X': |
6862
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PATH_LENGTH_EXCEEDED", 31)) { |
6863
|
|
|
|
|
|
|
/* ^ */ |
6864
|
|
|
|
|
|
|
|
6865
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PATH_LENGTH_EXCEEDED |
6866
|
1
|
|
|
|
|
|
return X509_V_ERR_PATH_LENGTH_EXCEEDED; |
6867
|
|
|
|
|
|
|
#else |
6868
|
|
|
|
|
|
|
goto not_there; |
6869
|
|
|
|
|
|
|
#endif |
6870
|
|
|
|
|
|
|
|
6871
|
|
|
|
|
|
|
} |
6872
|
0
|
|
|
|
|
|
break; |
6873
|
|
|
|
|
|
|
case '_': |
6874
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "MODE_ACCEPT_MOVING_WRITE_BUFFER", 31)) { |
6875
|
|
|
|
|
|
|
/* ^ */ |
6876
|
|
|
|
|
|
|
|
6877
|
|
|
|
|
|
|
#ifdef SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER |
6878
|
1
|
|
|
|
|
|
return SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER; |
6879
|
|
|
|
|
|
|
#else |
6880
|
|
|
|
|
|
|
goto not_there; |
6881
|
|
|
|
|
|
|
#endif |
6882
|
|
|
|
|
|
|
|
6883
|
|
|
|
|
|
|
} |
6884
|
0
|
|
|
|
|
|
break; |
6885
|
|
|
|
|
|
|
} |
6886
|
0
|
|
|
|
|
|
break; |
6887
|
|
|
|
|
|
|
case 32: |
6888
|
|
|
|
|
|
|
/* Names all of length 32. */ |
6889
|
|
|
|
|
|
|
/* NID_pbe_WithSHA1And128BitRC2_CBC OCSP_RESPONSE_STATUS_SIGREQUIRED |
6890
|
|
|
|
|
|
|
X509_V_ERR_CA_BCONS_NOT_CRITICAL X509_V_ERR_CRL_SIGNATURE_FAILURE |
6891
|
|
|
|
|
|
|
X509_V_ERR_SUITE_B_INVALID_CURVE X509_V_FLAG_EXTENDED_CRL_SUPPORT */ |
6892
|
|
|
|
|
|
|
/* Offset 21 gives the best switch position. */ |
6893
|
6
|
|
|
|
|
|
switch (name[21]) { |
6894
|
|
|
|
|
|
|
case '8': |
6895
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And128BitRC2_CBC", 32)) { |
6896
|
|
|
|
|
|
|
/* ^ */ |
6897
|
|
|
|
|
|
|
|
6898
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And128BitRC2_CBC |
6899
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And128BitRC2_CBC; |
6900
|
|
|
|
|
|
|
#else |
6901
|
|
|
|
|
|
|
goto not_there; |
6902
|
|
|
|
|
|
|
#endif |
6903
|
|
|
|
|
|
|
|
6904
|
|
|
|
|
|
|
} |
6905
|
0
|
|
|
|
|
|
break; |
6906
|
|
|
|
|
|
|
case 'C': |
6907
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_FLAG_EXTENDED_CRL_SUPPORT", 32)) { |
6908
|
|
|
|
|
|
|
/* ^ */ |
6909
|
|
|
|
|
|
|
|
6910
|
|
|
|
|
|
|
#ifdef X509_V_FLAG_EXTENDED_CRL_SUPPORT |
6911
|
1
|
|
|
|
|
|
return X509_V_FLAG_EXTENDED_CRL_SUPPORT; |
6912
|
|
|
|
|
|
|
#else |
6913
|
|
|
|
|
|
|
goto not_there; |
6914
|
|
|
|
|
|
|
#endif |
6915
|
|
|
|
|
|
|
|
6916
|
|
|
|
|
|
|
} |
6917
|
0
|
|
|
|
|
|
break; |
6918
|
|
|
|
|
|
|
case 'O': |
6919
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CA_BCONS_NOT_CRITICAL", 32)) { |
6920
|
|
|
|
|
|
|
/* ^ */ |
6921
|
|
|
|
|
|
|
|
6922
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CA_BCONS_NOT_CRITICAL |
6923
|
|
|
|
|
|
|
return X509_V_ERR_CA_BCONS_NOT_CRITICAL; |
6924
|
|
|
|
|
|
|
#else |
6925
|
1
|
|
|
|
|
|
goto not_there; |
6926
|
|
|
|
|
|
|
#endif |
6927
|
|
|
|
|
|
|
|
6928
|
|
|
|
|
|
|
} |
6929
|
0
|
|
|
|
|
|
break; |
6930
|
|
|
|
|
|
|
case 'S': |
6931
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_SIGREQUIRED", 32)) { |
6932
|
|
|
|
|
|
|
/* ^ */ |
6933
|
|
|
|
|
|
|
|
6934
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_SIGREQUIRED |
6935
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_SIGREQUIRED; |
6936
|
|
|
|
|
|
|
#else |
6937
|
|
|
|
|
|
|
goto not_there; |
6938
|
|
|
|
|
|
|
#endif |
6939
|
|
|
|
|
|
|
|
6940
|
|
|
|
|
|
|
} |
6941
|
0
|
|
|
|
|
|
break; |
6942
|
|
|
|
|
|
|
case 'U': |
6943
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CRL_SIGNATURE_FAILURE", 32)) { |
6944
|
|
|
|
|
|
|
/* ^ */ |
6945
|
|
|
|
|
|
|
|
6946
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CRL_SIGNATURE_FAILURE |
6947
|
1
|
|
|
|
|
|
return X509_V_ERR_CRL_SIGNATURE_FAILURE; |
6948
|
|
|
|
|
|
|
#else |
6949
|
|
|
|
|
|
|
goto not_there; |
6950
|
|
|
|
|
|
|
#endif |
6951
|
|
|
|
|
|
|
|
6952
|
|
|
|
|
|
|
} |
6953
|
0
|
|
|
|
|
|
break; |
6954
|
|
|
|
|
|
|
case 'V': |
6955
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_CURVE", 32)) { |
6956
|
|
|
|
|
|
|
/* ^ */ |
6957
|
|
|
|
|
|
|
|
6958
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_INVALID_CURVE |
6959
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_INVALID_CURVE; |
6960
|
|
|
|
|
|
|
#else |
6961
|
|
|
|
|
|
|
goto not_there; |
6962
|
|
|
|
|
|
|
#endif |
6963
|
|
|
|
|
|
|
|
6964
|
|
|
|
|
|
|
} |
6965
|
0
|
|
|
|
|
|
break; |
6966
|
|
|
|
|
|
|
} |
6967
|
0
|
|
|
|
|
|
break; |
6968
|
|
|
|
|
|
|
case 33: |
6969
|
|
|
|
|
|
|
/* Names all of length 33. */ |
6970
|
|
|
|
|
|
|
/* OCSP_RESPONSE_STATUS_UNAUTHORIZED X509_V_ERR_CERT_SIGNATURE_FAILURE |
6971
|
|
|
|
|
|
|
X509_V_ERR_EC_KEY_EXPLICIT_PARAMS X509_V_ERR_EMPTY_SUBJECT_ALT_NAME */ |
6972
|
|
|
|
|
|
|
/* Offset 29 gives the best switch position. */ |
6973
|
4
|
|
|
|
|
|
switch (name[29]) { |
6974
|
|
|
|
|
|
|
case 'I': |
6975
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_UNAUTHORIZED", 33)) { |
6976
|
|
|
|
|
|
|
/* ^ */ |
6977
|
|
|
|
|
|
|
|
6978
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_UNAUTHORIZED |
6979
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_UNAUTHORIZED; |
6980
|
|
|
|
|
|
|
#else |
6981
|
|
|
|
|
|
|
goto not_there; |
6982
|
|
|
|
|
|
|
#endif |
6983
|
|
|
|
|
|
|
|
6984
|
|
|
|
|
|
|
} |
6985
|
0
|
|
|
|
|
|
break; |
6986
|
|
|
|
|
|
|
case 'L': |
6987
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CERT_SIGNATURE_FAILURE", 33)) { |
6988
|
|
|
|
|
|
|
/* ^ */ |
6989
|
|
|
|
|
|
|
|
6990
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CERT_SIGNATURE_FAILURE |
6991
|
1
|
|
|
|
|
|
return X509_V_ERR_CERT_SIGNATURE_FAILURE; |
6992
|
|
|
|
|
|
|
#else |
6993
|
|
|
|
|
|
|
goto not_there; |
6994
|
|
|
|
|
|
|
#endif |
6995
|
|
|
|
|
|
|
|
6996
|
|
|
|
|
|
|
} |
6997
|
0
|
|
|
|
|
|
break; |
6998
|
|
|
|
|
|
|
case 'N': |
6999
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_EMPTY_SUBJECT_ALT_NAME", 33)) { |
7000
|
|
|
|
|
|
|
/* ^ */ |
7001
|
|
|
|
|
|
|
|
7002
|
|
|
|
|
|
|
#ifdef X509_V_ERR_EMPTY_SUBJECT_ALT_NAME |
7003
|
|
|
|
|
|
|
return X509_V_ERR_EMPTY_SUBJECT_ALT_NAME; |
7004
|
|
|
|
|
|
|
#else |
7005
|
1
|
|
|
|
|
|
goto not_there; |
7006
|
|
|
|
|
|
|
#endif |
7007
|
|
|
|
|
|
|
|
7008
|
|
|
|
|
|
|
} |
7009
|
0
|
|
|
|
|
|
break; |
7010
|
|
|
|
|
|
|
case 'R': |
7011
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_EC_KEY_EXPLICIT_PARAMS", 33)) { |
7012
|
|
|
|
|
|
|
/* ^ */ |
7013
|
|
|
|
|
|
|
|
7014
|
|
|
|
|
|
|
#ifdef X509_V_ERR_EC_KEY_EXPLICIT_PARAMS |
7015
|
|
|
|
|
|
|
return X509_V_ERR_EC_KEY_EXPLICIT_PARAMS; |
7016
|
|
|
|
|
|
|
#else |
7017
|
1
|
|
|
|
|
|
goto not_there; |
7018
|
|
|
|
|
|
|
#endif |
7019
|
|
|
|
|
|
|
|
7020
|
|
|
|
|
|
|
} |
7021
|
0
|
|
|
|
|
|
break; |
7022
|
|
|
|
|
|
|
} |
7023
|
0
|
|
|
|
|
|
break; |
7024
|
|
|
|
|
|
|
case 34: |
7025
|
|
|
|
|
|
|
/* Names all of length 34. */ |
7026
|
|
|
|
|
|
|
/* OCSP_RESPONSE_STATUS_INTERNALERROR OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG |
7027
|
|
|
|
|
|
|
X509_V_ERR_SUBJECT_ISSUER_MISMATCH X509_V_ERR_SUITE_B_INVALID_VERSION |
7028
|
|
|
|
|
|
|
X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED X509_V_ERR_UNSUPPORTED_NAME_SYNTAX */ |
7029
|
|
|
|
|
|
|
/* Offset 24 gives the best switch position. */ |
7030
|
6
|
|
|
|
|
|
switch (name[24]) { |
7031
|
|
|
|
|
|
|
case 'A': |
7032
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSUPPORTED_NAME_SYNTAX", 34)) { |
7033
|
|
|
|
|
|
|
/* ^ */ |
7034
|
|
|
|
|
|
|
|
7035
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSUPPORTED_NAME_SYNTAX |
7036
|
1
|
|
|
|
|
|
return X509_V_ERR_UNSUPPORTED_NAME_SYNTAX; |
7037
|
|
|
|
|
|
|
#else |
7038
|
|
|
|
|
|
|
goto not_there; |
7039
|
|
|
|
|
|
|
#endif |
7040
|
|
|
|
|
|
|
|
7041
|
|
|
|
|
|
|
} |
7042
|
0
|
|
|
|
|
|
break; |
7043
|
|
|
|
|
|
|
case 'C': |
7044
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG", 34)) { |
7045
|
|
|
|
|
|
|
/* ^ */ |
7046
|
|
|
|
|
|
|
|
7047
|
|
|
|
|
|
|
#ifdef SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG |
7048
|
1
|
|
|
|
|
|
return SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG; |
7049
|
|
|
|
|
|
|
#else |
7050
|
|
|
|
|
|
|
goto not_there; |
7051
|
|
|
|
|
|
|
#endif |
7052
|
|
|
|
|
|
|
|
7053
|
|
|
|
|
|
|
} |
7054
|
0
|
|
|
|
|
|
break; |
7055
|
|
|
|
|
|
|
case 'E': |
7056
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_INTERNALERROR", 34)) { |
7057
|
|
|
|
|
|
|
/* ^ */ |
7058
|
|
|
|
|
|
|
|
7059
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_INTERNALERROR |
7060
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_INTERNALERROR; |
7061
|
|
|
|
|
|
|
#else |
7062
|
|
|
|
|
|
|
goto not_there; |
7063
|
|
|
|
|
|
|
#endif |
7064
|
|
|
|
|
|
|
|
7065
|
|
|
|
|
|
|
} |
7066
|
0
|
|
|
|
|
|
break; |
7067
|
|
|
|
|
|
|
case 'I': |
7068
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_VERSION", 34)) { |
7069
|
|
|
|
|
|
|
/* ^ */ |
7070
|
|
|
|
|
|
|
|
7071
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_INVALID_VERSION |
7072
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_INVALID_VERSION; |
7073
|
|
|
|
|
|
|
#else |
7074
|
|
|
|
|
|
|
goto not_there; |
7075
|
|
|
|
|
|
|
#endif |
7076
|
|
|
|
|
|
|
|
7077
|
|
|
|
|
|
|
} |
7078
|
0
|
|
|
|
|
|
break; |
7079
|
|
|
|
|
|
|
case 'O': |
7080
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED", 34)) { |
7081
|
|
|
|
|
|
|
/* ^ */ |
7082
|
|
|
|
|
|
|
|
7083
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED |
7084
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED; |
7085
|
|
|
|
|
|
|
#else |
7086
|
|
|
|
|
|
|
goto not_there; |
7087
|
|
|
|
|
|
|
#endif |
7088
|
|
|
|
|
|
|
|
7089
|
|
|
|
|
|
|
} |
7090
|
0
|
|
|
|
|
|
break; |
7091
|
|
|
|
|
|
|
case 'R': |
7092
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUBJECT_ISSUER_MISMATCH", 34)) { |
7093
|
|
|
|
|
|
|
/* ^ */ |
7094
|
|
|
|
|
|
|
|
7095
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUBJECT_ISSUER_MISMATCH |
7096
|
1
|
|
|
|
|
|
return X509_V_ERR_SUBJECT_ISSUER_MISMATCH; |
7097
|
|
|
|
|
|
|
#else |
7098
|
|
|
|
|
|
|
goto not_there; |
7099
|
|
|
|
|
|
|
#endif |
7100
|
|
|
|
|
|
|
|
7101
|
|
|
|
|
|
|
} |
7102
|
0
|
|
|
|
|
|
break; |
7103
|
|
|
|
|
|
|
} |
7104
|
0
|
|
|
|
|
|
break; |
7105
|
|
|
|
|
|
|
case 35: |
7106
|
|
|
|
|
|
|
/* Names all of length 35. */ |
7107
|
|
|
|
|
|
|
/* OPENSSL_INFO_DIR_FILENAME_SEPARATOR OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG |
7108
|
|
|
|
|
|
|
R_PEER_DID_NOT_RETURN_A_CERTIFICATE X509_CHECK_FLAG_NEVER_CHECK_SUBJECT |
7109
|
|
|
|
|
|
|
X509_V_ERR_APPLICATION_VERIFICATION X509_V_ERR_INVALID_POLICY_EXTENSION |
7110
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER _NET_SSLEAY_TEST_UNDEFINED_CONSTANT |
7111
|
|
|
|
|
|
|
*/ |
7112
|
|
|
|
|
|
|
/* Offset 29 gives the best switch position. */ |
7113
|
8
|
|
|
|
|
|
switch (name[29]) { |
7114
|
|
|
|
|
|
|
case 'A': |
7115
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OPENSSL_INFO_DIR_FILENAME_SEPARATOR", 35)) { |
7116
|
|
|
|
|
|
|
/* ^ */ |
7117
|
|
|
|
|
|
|
|
7118
|
|
|
|
|
|
|
#ifdef OPENSSL_INFO_DIR_FILENAME_SEPARATOR |
7119
|
|
|
|
|
|
|
return OPENSSL_INFO_DIR_FILENAME_SEPARATOR; |
7120
|
|
|
|
|
|
|
#else |
7121
|
1
|
|
|
|
|
|
goto not_there; |
7122
|
|
|
|
|
|
|
#endif |
7123
|
|
|
|
|
|
|
|
7124
|
|
|
|
|
|
|
} |
7125
|
0
|
|
|
|
|
|
break; |
7126
|
|
|
|
|
|
|
case 'C': |
7127
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_APPLICATION_VERIFICATION", 35)) { |
7128
|
|
|
|
|
|
|
/* ^ */ |
7129
|
|
|
|
|
|
|
|
7130
|
|
|
|
|
|
|
#ifdef X509_V_ERR_APPLICATION_VERIFICATION |
7131
|
1
|
|
|
|
|
|
return X509_V_ERR_APPLICATION_VERIFICATION; |
7132
|
|
|
|
|
|
|
#else |
7133
|
|
|
|
|
|
|
goto not_there; |
7134
|
|
|
|
|
|
|
#endif |
7135
|
|
|
|
|
|
|
|
7136
|
|
|
|
|
|
|
} |
7137
|
0
|
|
|
|
|
|
break; |
7138
|
|
|
|
|
|
|
case 'E': |
7139
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_INVALID_POLICY_EXTENSION", 35)) { |
7140
|
|
|
|
|
|
|
/* ^ */ |
7141
|
|
|
|
|
|
|
|
7142
|
|
|
|
|
|
|
#ifdef X509_V_ERR_INVALID_POLICY_EXTENSION |
7143
|
1
|
|
|
|
|
|
return X509_V_ERR_INVALID_POLICY_EXTENSION; |
7144
|
|
|
|
|
|
|
#else |
7145
|
|
|
|
|
|
|
goto not_there; |
7146
|
|
|
|
|
|
|
#endif |
7147
|
|
|
|
|
|
|
|
7148
|
|
|
|
|
|
|
} |
7149
|
0
|
|
|
|
|
|
break; |
7150
|
|
|
|
|
|
|
case 'F': |
7151
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_PEER_DID_NOT_RETURN_A_CERTIFICATE", 35)) { |
7152
|
|
|
|
|
|
|
/* ^ */ |
7153
|
|
|
|
|
|
|
|
7154
|
|
|
|
|
|
|
#ifdef SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE |
7155
|
1
|
|
|
|
|
|
return SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE; |
7156
|
|
|
|
|
|
|
#else |
7157
|
|
|
|
|
|
|
goto not_there; |
7158
|
|
|
|
|
|
|
#endif |
7159
|
|
|
|
|
|
|
|
7160
|
|
|
|
|
|
|
} |
7161
|
0
|
|
|
|
|
|
break; |
7162
|
|
|
|
|
|
|
case 'G': |
7163
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG", 35)) { |
7164
|
|
|
|
|
|
|
/* ^ */ |
7165
|
|
|
|
|
|
|
|
7166
|
|
|
|
|
|
|
#ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG |
7167
|
1
|
|
|
|
|
|
return SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG; |
7168
|
|
|
|
|
|
|
#else |
7169
|
|
|
|
|
|
|
goto not_there; |
7170
|
|
|
|
|
|
|
#endif |
7171
|
|
|
|
|
|
|
|
7172
|
|
|
|
|
|
|
} |
7173
|
0
|
|
|
|
|
|
break; |
7174
|
|
|
|
|
|
|
case 'I': |
7175
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER", 35)) { |
7176
|
|
|
|
|
|
|
/* ^ */ |
7177
|
|
|
|
|
|
|
|
7178
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER |
7179
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER; |
7180
|
|
|
|
|
|
|
#else |
7181
|
|
|
|
|
|
|
goto not_there; |
7182
|
|
|
|
|
|
|
#endif |
7183
|
|
|
|
|
|
|
|
7184
|
|
|
|
|
|
|
} |
7185
|
0
|
|
|
|
|
|
break; |
7186
|
|
|
|
|
|
|
case 'N': |
7187
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "_NET_SSLEAY_TEST_UNDEFINED_CONSTANT", 35)) { |
7188
|
|
|
|
|
|
|
/* ^ */ |
7189
|
|
|
|
|
|
|
|
7190
|
|
|
|
|
|
|
#ifdef _NET_SSLEAY_TEST_UNDEFINED_CONSTANT |
7191
|
|
|
|
|
|
|
return _NET_SSLEAY_TEST_UNDEFINED_CONSTANT; |
7192
|
|
|
|
|
|
|
#else |
7193
|
1
|
|
|
|
|
|
goto not_there; |
7194
|
|
|
|
|
|
|
#endif |
7195
|
|
|
|
|
|
|
|
7196
|
|
|
|
|
|
|
} |
7197
|
0
|
|
|
|
|
|
break; |
7198
|
|
|
|
|
|
|
case 'U': |
7199
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_NEVER_CHECK_SUBJECT", 35)) { |
7200
|
|
|
|
|
|
|
/* ^ */ |
7201
|
|
|
|
|
|
|
|
7202
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_NEVER_CHECK_SUBJECT |
7203
|
|
|
|
|
|
|
return X509_CHECK_FLAG_NEVER_CHECK_SUBJECT; |
7204
|
|
|
|
|
|
|
#else |
7205
|
1
|
|
|
|
|
|
goto not_there; |
7206
|
|
|
|
|
|
|
#endif |
7207
|
|
|
|
|
|
|
|
7208
|
|
|
|
|
|
|
} |
7209
|
0
|
|
|
|
|
|
break; |
7210
|
|
|
|
|
|
|
} |
7211
|
0
|
|
|
|
|
|
break; |
7212
|
|
|
|
|
|
|
case 36: |
7213
|
|
|
|
|
|
|
/* Names all of length 36. */ |
7214
|
|
|
|
|
|
|
/* OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION |
7215
|
|
|
|
|
|
|
X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT |
7216
|
|
|
|
|
|
|
X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS |
7217
|
|
|
|
|
|
|
X509_V_ERR_CA_CERT_MISSING_KEY_USAGE |
7218
|
|
|
|
|
|
|
X509_V_ERR_CRL_PATH_VALIDATION_ERROR |
7219
|
|
|
|
|
|
|
X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN |
7220
|
|
|
|
|
|
|
X509_V_ERR_SUITE_B_INVALID_ALGORITHM |
7221
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT */ |
7222
|
|
|
|
|
|
|
/* Offset 25 gives the best switch position. */ |
7223
|
8
|
|
|
|
|
|
switch (name[25]) { |
7224
|
|
|
|
|
|
|
case 'A': |
7225
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CRL_PATH_VALIDATION_ERROR", 36)) { |
7226
|
|
|
|
|
|
|
/* ^ */ |
7227
|
|
|
|
|
|
|
|
7228
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CRL_PATH_VALIDATION_ERROR |
7229
|
1
|
|
|
|
|
|
return X509_V_ERR_CRL_PATH_VALIDATION_ERROR; |
7230
|
|
|
|
|
|
|
#else |
7231
|
|
|
|
|
|
|
goto not_there; |
7232
|
|
|
|
|
|
|
#endif |
7233
|
|
|
|
|
|
|
|
7234
|
|
|
|
|
|
|
} |
7235
|
0
|
|
|
|
|
|
break; |
7236
|
|
|
|
|
|
|
case 'D': |
7237
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_ALGORITHM", 36)) { |
7238
|
|
|
|
|
|
|
/* ^ */ |
7239
|
|
|
|
|
|
|
|
7240
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_INVALID_ALGORITHM |
7241
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_INVALID_ALGORITHM; |
7242
|
|
|
|
|
|
|
#else |
7243
|
|
|
|
|
|
|
goto not_there; |
7244
|
|
|
|
|
|
|
#endif |
7245
|
|
|
|
|
|
|
|
7246
|
|
|
|
|
|
|
} |
7247
|
0
|
|
|
|
|
|
break; |
7248
|
|
|
|
|
|
|
case 'E': |
7249
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT", 36)) { |
7250
|
|
|
|
|
|
|
/* ^ */ |
7251
|
|
|
|
|
|
|
|
7252
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT |
7253
|
1
|
|
|
|
|
|
return X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT; |
7254
|
|
|
|
|
|
|
#else |
7255
|
|
|
|
|
|
|
goto not_there; |
7256
|
|
|
|
|
|
|
#endif |
7257
|
|
|
|
|
|
|
|
7258
|
|
|
|
|
|
|
} |
7259
|
0
|
|
|
|
|
|
break; |
7260
|
|
|
|
|
|
|
case 'G': |
7261
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_CA_CERT_MISSING_KEY_USAGE", 36)) { |
7262
|
|
|
|
|
|
|
/* ^ */ |
7263
|
|
|
|
|
|
|
|
7264
|
|
|
|
|
|
|
#ifdef X509_V_ERR_CA_CERT_MISSING_KEY_USAGE |
7265
|
|
|
|
|
|
|
return X509_V_ERR_CA_CERT_MISSING_KEY_USAGE; |
7266
|
|
|
|
|
|
|
#else |
7267
|
1
|
|
|
|
|
|
goto not_there; |
7268
|
|
|
|
|
|
|
#endif |
7269
|
|
|
|
|
|
|
|
7270
|
|
|
|
|
|
|
} |
7271
|
0
|
|
|
|
|
|
break; |
7272
|
|
|
|
|
|
|
case 'I': |
7273
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT", 36)) { |
7274
|
|
|
|
|
|
|
/* ^ */ |
7275
|
|
|
|
|
|
|
|
7276
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT |
7277
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT; |
7278
|
|
|
|
|
|
|
#else |
7279
|
|
|
|
|
|
|
goto not_there; |
7280
|
|
|
|
|
|
|
#endif |
7281
|
|
|
|
|
|
|
|
7282
|
|
|
|
|
|
|
} |
7283
|
0
|
|
|
|
|
|
break; |
7284
|
|
|
|
|
|
|
case 'L': |
7285
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS", 36)) { |
7286
|
|
|
|
|
|
|
/* ^ */ |
7287
|
|
|
|
|
|
|
|
7288
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS |
7289
|
1
|
|
|
|
|
|
return X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS; |
7290
|
|
|
|
|
|
|
#else |
7291
|
|
|
|
|
|
|
goto not_there; |
7292
|
|
|
|
|
|
|
#endif |
7293
|
|
|
|
|
|
|
|
7294
|
|
|
|
|
|
|
} |
7295
|
0
|
|
|
|
|
|
break; |
7296
|
|
|
|
|
|
|
case 'N': |
7297
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION", 36)) { |
7298
|
|
|
|
|
|
|
/* ^ */ |
7299
|
|
|
|
|
|
|
|
7300
|
|
|
|
|
|
|
#ifdef SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION |
7301
|
1
|
|
|
|
|
|
return SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION; |
7302
|
|
|
|
|
|
|
#else |
7303
|
|
|
|
|
|
|
goto not_there; |
7304
|
|
|
|
|
|
|
#endif |
7305
|
|
|
|
|
|
|
|
7306
|
|
|
|
|
|
|
} |
7307
|
0
|
|
|
|
|
|
break; |
7308
|
|
|
|
|
|
|
case 'R': |
7309
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN", 36)) { |
7310
|
|
|
|
|
|
|
/* ^ */ |
7311
|
|
|
|
|
|
|
|
7312
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN |
7313
|
1
|
|
|
|
|
|
return X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN; |
7314
|
|
|
|
|
|
|
#else |
7315
|
|
|
|
|
|
|
goto not_there; |
7316
|
|
|
|
|
|
|
#endif |
7317
|
|
|
|
|
|
|
|
7318
|
|
|
|
|
|
|
} |
7319
|
0
|
|
|
|
|
|
break; |
7320
|
|
|
|
|
|
|
} |
7321
|
0
|
|
|
|
|
|
break; |
7322
|
|
|
|
|
|
|
case 37: |
7323
|
|
|
|
|
|
|
/* Names all of length 37. */ |
7324
|
|
|
|
|
|
|
/* OCSP_RESPONSE_STATUS_MALFORMEDREQUEST |
7325
|
|
|
|
|
|
|
X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS |
7326
|
|
|
|
|
|
|
X509_V_ERR_PATHLEN_INVALID_FOR_NON_CA |
7327
|
|
|
|
|
|
|
X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED */ |
7328
|
|
|
|
|
|
|
/* Offset 17 gives the best switch position. */ |
7329
|
4
|
|
|
|
|
|
switch (name[17]) { |
7330
|
|
|
|
|
|
|
case 'N': |
7331
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PATHLEN_INVALID_FOR_NON_CA", 37)) { |
7332
|
|
|
|
|
|
|
/* ^ */ |
7333
|
|
|
|
|
|
|
|
7334
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PATHLEN_INVALID_FOR_NON_CA |
7335
|
|
|
|
|
|
|
return X509_V_ERR_PATHLEN_INVALID_FOR_NON_CA; |
7336
|
|
|
|
|
|
|
#else |
7337
|
1
|
|
|
|
|
|
goto not_there; |
7338
|
|
|
|
|
|
|
#endif |
7339
|
|
|
|
|
|
|
|
7340
|
|
|
|
|
|
|
} |
7341
|
0
|
|
|
|
|
|
break; |
7342
|
|
|
|
|
|
|
case 'P': |
7343
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED", 37)) { |
7344
|
|
|
|
|
|
|
/* ^ */ |
7345
|
|
|
|
|
|
|
|
7346
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED |
7347
|
1
|
|
|
|
|
|
return X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED; |
7348
|
|
|
|
|
|
|
#else |
7349
|
|
|
|
|
|
|
goto not_there; |
7350
|
|
|
|
|
|
|
#endif |
7351
|
|
|
|
|
|
|
|
7352
|
|
|
|
|
|
|
} |
7353
|
0
|
|
|
|
|
|
break; |
7354
|
|
|
|
|
|
|
case 'T': |
7355
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OCSP_RESPONSE_STATUS_MALFORMEDREQUEST", 37)) { |
7356
|
|
|
|
|
|
|
/* ^ */ |
7357
|
|
|
|
|
|
|
|
7358
|
|
|
|
|
|
|
#ifdef OCSP_RESPONSE_STATUS_MALFORMEDREQUEST |
7359
|
1
|
|
|
|
|
|
return OCSP_RESPONSE_STATUS_MALFORMEDREQUEST; |
7360
|
|
|
|
|
|
|
#else |
7361
|
|
|
|
|
|
|
goto not_there; |
7362
|
|
|
|
|
|
|
#endif |
7363
|
|
|
|
|
|
|
|
7364
|
|
|
|
|
|
|
} |
7365
|
0
|
|
|
|
|
|
break; |
7366
|
|
|
|
|
|
|
case 'U': |
7367
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS", 37)) { |
7368
|
|
|
|
|
|
|
/* ^ */ |
7369
|
|
|
|
|
|
|
|
7370
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS |
7371
|
1
|
|
|
|
|
|
return X509_CHECK_FLAG_MULTI_LABEL_WILDCARDS; |
7372
|
|
|
|
|
|
|
#else |
7373
|
|
|
|
|
|
|
goto not_there; |
7374
|
|
|
|
|
|
|
#endif |
7375
|
|
|
|
|
|
|
|
7376
|
|
|
|
|
|
|
} |
7377
|
0
|
|
|
|
|
|
break; |
7378
|
|
|
|
|
|
|
} |
7379
|
0
|
|
|
|
|
|
break; |
7380
|
|
|
|
|
|
|
case 38: |
7381
|
|
|
|
|
|
|
/* Names all of length 38. */ |
7382
|
|
|
|
|
|
|
/* NID_pbe_WithSHA1And2_Key_TripleDES_CBC |
7383
|
|
|
|
|
|
|
NID_pbe_WithSHA1And3_Key_TripleDES_CBC |
7384
|
|
|
|
|
|
|
X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH |
7385
|
|
|
|
|
|
|
X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT |
7386
|
|
|
|
|
|
|
X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE */ |
7387
|
|
|
|
|
|
|
/* Offset 19 gives the best switch position. */ |
7388
|
5
|
|
|
|
|
|
switch (name[19]) { |
7389
|
|
|
|
|
|
|
case '2': |
7390
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And2_Key_TripleDES_CBC", 38)) { |
7391
|
|
|
|
|
|
|
/* ^ */ |
7392
|
|
|
|
|
|
|
|
7393
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And2_Key_TripleDES_CBC |
7394
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And2_Key_TripleDES_CBC; |
7395
|
|
|
|
|
|
|
#else |
7396
|
|
|
|
|
|
|
goto not_there; |
7397
|
|
|
|
|
|
|
#endif |
7398
|
|
|
|
|
|
|
|
7399
|
|
|
|
|
|
|
} |
7400
|
0
|
|
|
|
|
|
break; |
7401
|
|
|
|
|
|
|
case '3': |
7402
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "NID_pbe_WithSHA1And3_Key_TripleDES_CBC", 38)) { |
7403
|
|
|
|
|
|
|
/* ^ */ |
7404
|
|
|
|
|
|
|
|
7405
|
|
|
|
|
|
|
#ifdef NID_pbe_WithSHA1And3_Key_TripleDES_CBC |
7406
|
1
|
|
|
|
|
|
return NID_pbe_WithSHA1And3_Key_TripleDES_CBC; |
7407
|
|
|
|
|
|
|
#else |
7408
|
|
|
|
|
|
|
goto not_there; |
7409
|
|
|
|
|
|
|
#endif |
7410
|
|
|
|
|
|
|
|
7411
|
|
|
|
|
|
|
} |
7412
|
0
|
|
|
|
|
|
break; |
7413
|
|
|
|
|
|
|
case 'R': |
7414
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT", 38)) { |
7415
|
|
|
|
|
|
|
/* ^ */ |
7416
|
|
|
|
|
|
|
|
7417
|
|
|
|
|
|
|
#ifdef X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT |
7418
|
1
|
|
|
|
|
|
return X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT; |
7419
|
|
|
|
|
|
|
#else |
7420
|
|
|
|
|
|
|
goto not_there; |
7421
|
|
|
|
|
|
|
#endif |
7422
|
|
|
|
|
|
|
|
7423
|
|
|
|
|
|
|
} |
7424
|
0
|
|
|
|
|
|
break; |
7425
|
|
|
|
|
|
|
case 'T': |
7426
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE", 38)) { |
7427
|
|
|
|
|
|
|
/* ^ */ |
7428
|
|
|
|
|
|
|
|
7429
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE |
7430
|
1
|
|
|
|
|
|
return X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE; |
7431
|
|
|
|
|
|
|
#else |
7432
|
|
|
|
|
|
|
goto not_there; |
7433
|
|
|
|
|
|
|
#endif |
7434
|
|
|
|
|
|
|
|
7435
|
|
|
|
|
|
|
} |
7436
|
0
|
|
|
|
|
|
break; |
7437
|
|
|
|
|
|
|
case 'U': |
7438
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH", 38)) { |
7439
|
|
|
|
|
|
|
/* ^ */ |
7440
|
|
|
|
|
|
|
|
7441
|
|
|
|
|
|
|
#ifdef X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH |
7442
|
1
|
|
|
|
|
|
return X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH; |
7443
|
|
|
|
|
|
|
#else |
7444
|
|
|
|
|
|
|
goto not_there; |
7445
|
|
|
|
|
|
|
#endif |
7446
|
|
|
|
|
|
|
|
7447
|
|
|
|
|
|
|
} |
7448
|
0
|
|
|
|
|
|
break; |
7449
|
|
|
|
|
|
|
} |
7450
|
0
|
|
|
|
|
|
break; |
7451
|
|
|
|
|
|
|
case 39: |
7452
|
|
|
|
|
|
|
/* Names all of length 39. */ |
7453
|
|
|
|
|
|
|
/* X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS |
7454
|
|
|
|
|
|
|
X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3 |
7455
|
|
|
|
|
|
|
X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION |
7456
|
|
|
|
|
|
|
X509_V_ERR_SIGNATURE_ALGORITHM_MISMATCH |
7457
|
|
|
|
|
|
|
X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION */ |
7458
|
|
|
|
|
|
|
/* Offset 19 gives the best switch position. */ |
7459
|
5
|
|
|
|
|
|
switch (name[19]) { |
7460
|
|
|
|
|
|
|
case 'B': |
7461
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION", 39)) { |
7462
|
|
|
|
|
|
|
/* ^ */ |
7463
|
|
|
|
|
|
|
|
7464
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION |
7465
|
|
|
|
|
|
|
return X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION; |
7466
|
|
|
|
|
|
|
#else |
7467
|
1
|
|
|
|
|
|
goto not_there; |
7468
|
|
|
|
|
|
|
#endif |
7469
|
|
|
|
|
|
|
|
7470
|
|
|
|
|
|
|
} |
7471
|
0
|
|
|
|
|
|
break; |
7472
|
|
|
|
|
|
|
case 'D': |
7473
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION", 39)) { |
7474
|
|
|
|
|
|
|
/* ^ */ |
7475
|
|
|
|
|
|
|
|
7476
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION |
7477
|
1
|
|
|
|
|
|
return X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION; |
7478
|
|
|
|
|
|
|
#else |
7479
|
|
|
|
|
|
|
goto not_there; |
7480
|
|
|
|
|
|
|
#endif |
7481
|
|
|
|
|
|
|
|
7482
|
|
|
|
|
|
|
} |
7483
|
0
|
|
|
|
|
|
break; |
7484
|
|
|
|
|
|
|
case 'E': |
7485
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SIGNATURE_ALGORITHM_MISMATCH", 39)) { |
7486
|
|
|
|
|
|
|
/* ^ */ |
7487
|
|
|
|
|
|
|
|
7488
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SIGNATURE_ALGORITHM_MISMATCH |
7489
|
|
|
|
|
|
|
return X509_V_ERR_SIGNATURE_ALGORITHM_MISMATCH; |
7490
|
|
|
|
|
|
|
#else |
7491
|
1
|
|
|
|
|
|
goto not_there; |
7492
|
|
|
|
|
|
|
#endif |
7493
|
|
|
|
|
|
|
|
7494
|
|
|
|
|
|
|
} |
7495
|
0
|
|
|
|
|
|
break; |
7496
|
|
|
|
|
|
|
case 'G': |
7497
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS", 39)) { |
7498
|
|
|
|
|
|
|
/* ^ */ |
7499
|
|
|
|
|
|
|
|
7500
|
|
|
|
|
|
|
#ifdef X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS |
7501
|
1
|
|
|
|
|
|
return X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS; |
7502
|
|
|
|
|
|
|
#else |
7503
|
|
|
|
|
|
|
goto not_there; |
7504
|
|
|
|
|
|
|
#endif |
7505
|
|
|
|
|
|
|
|
7506
|
|
|
|
|
|
|
} |
7507
|
0
|
|
|
|
|
|
break; |
7508
|
|
|
|
|
|
|
case 'N': |
7509
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3", 39)) { |
7510
|
|
|
|
|
|
|
/* ^ */ |
7511
|
|
|
|
|
|
|
|
7512
|
|
|
|
|
|
|
#ifdef X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3 |
7513
|
|
|
|
|
|
|
return X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3; |
7514
|
|
|
|
|
|
|
#else |
7515
|
1
|
|
|
|
|
|
goto not_there; |
7516
|
|
|
|
|
|
|
#endif |
7517
|
|
|
|
|
|
|
|
7518
|
|
|
|
|
|
|
} |
7519
|
0
|
|
|
|
|
|
break; |
7520
|
|
|
|
|
|
|
} |
7521
|
0
|
|
|
|
|
|
break; |
7522
|
|
|
|
|
|
|
case 40: |
7523
|
|
|
|
|
|
|
/* Names all of length 40. */ |
7524
|
|
|
|
|
|
|
/* X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD |
7525
|
|
|
|
|
|
|
X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE |
7526
|
|
|
|
|
|
|
X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX |
7527
|
|
|
|
|
|
|
X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE */ |
7528
|
|
|
|
|
|
|
/* Offset 26 gives the best switch position. */ |
7529
|
4
|
|
|
|
|
|
switch (name[26]) { |
7530
|
|
|
|
|
|
|
case 'E': |
7531
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE", 40)) { |
7532
|
|
|
|
|
|
|
/* ^ */ |
7533
|
|
|
|
|
|
|
|
7534
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE |
7535
|
1
|
|
|
|
|
|
return X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE; |
7536
|
|
|
|
|
|
|
#else |
7537
|
|
|
|
|
|
|
goto not_there; |
7538
|
|
|
|
|
|
|
#endif |
7539
|
|
|
|
|
|
|
|
7540
|
|
|
|
|
|
|
} |
7541
|
0
|
|
|
|
|
|
break; |
7542
|
|
|
|
|
|
|
case 'I': |
7543
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE", 40)) { |
7544
|
|
|
|
|
|
|
/* ^ */ |
7545
|
|
|
|
|
|
|
|
7546
|
|
|
|
|
|
|
#ifdef X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE |
7547
|
1
|
|
|
|
|
|
return X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE; |
7548
|
|
|
|
|
|
|
#else |
7549
|
|
|
|
|
|
|
goto not_there; |
7550
|
|
|
|
|
|
|
#endif |
7551
|
|
|
|
|
|
|
|
7552
|
|
|
|
|
|
|
} |
7553
|
0
|
|
|
|
|
|
break; |
7554
|
|
|
|
|
|
|
case 'O': |
7555
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD", 40)) { |
7556
|
|
|
|
|
|
|
/* ^ */ |
7557
|
|
|
|
|
|
|
|
7558
|
|
|
|
|
|
|
#ifdef X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD |
7559
|
1
|
|
|
|
|
|
return X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD; |
7560
|
|
|
|
|
|
|
#else |
7561
|
|
|
|
|
|
|
goto not_there; |
7562
|
|
|
|
|
|
|
#endif |
7563
|
|
|
|
|
|
|
|
7564
|
|
|
|
|
|
|
} |
7565
|
0
|
|
|
|
|
|
break; |
7566
|
|
|
|
|
|
|
case 'S': |
7567
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX", 40)) { |
7568
|
|
|
|
|
|
|
/* ^ */ |
7569
|
|
|
|
|
|
|
|
7570
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX |
7571
|
1
|
|
|
|
|
|
return X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX; |
7572
|
|
|
|
|
|
|
#else |
7573
|
|
|
|
|
|
|
goto not_there; |
7574
|
|
|
|
|
|
|
#endif |
7575
|
|
|
|
|
|
|
|
7576
|
|
|
|
|
|
|
} |
7577
|
0
|
|
|
|
|
|
break; |
7578
|
|
|
|
|
|
|
} |
7579
|
0
|
|
|
|
|
|
break; |
7580
|
|
|
|
|
|
|
case 41: |
7581
|
|
|
|
|
|
|
/* Names all of length 41. */ |
7582
|
|
|
|
|
|
|
/* OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION |
7583
|
|
|
|
|
|
|
R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE |
7584
|
|
|
|
|
|
|
X509_V_ERR_EMPTY_SUBJECT_SAN_NOT_CRITICAL |
7585
|
|
|
|
|
|
|
X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD |
7586
|
|
|
|
|
|
|
X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD |
7587
|
|
|
|
|
|
|
X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD |
7588
|
|
|
|
|
|
|
X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER |
7589
|
|
|
|
|
|
|
X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED */ |
7590
|
|
|
|
|
|
|
/* Offset 26 gives the best switch position. */ |
7591
|
8
|
|
|
|
|
|
switch (name[26]) { |
7592
|
|
|
|
|
|
|
case 'A': |
7593
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_EMPTY_SUBJECT_SAN_NOT_CRITICAL", 41)) { |
7594
|
|
|
|
|
|
|
/* ^ */ |
7595
|
|
|
|
|
|
|
|
7596
|
|
|
|
|
|
|
#ifdef X509_V_ERR_EMPTY_SUBJECT_SAN_NOT_CRITICAL |
7597
|
|
|
|
|
|
|
return X509_V_ERR_EMPTY_SUBJECT_SAN_NOT_CRITICAL; |
7598
|
|
|
|
|
|
|
#else |
7599
|
1
|
|
|
|
|
|
goto not_there; |
7600
|
|
|
|
|
|
|
#endif |
7601
|
|
|
|
|
|
|
|
7602
|
|
|
|
|
|
|
} |
7603
|
0
|
|
|
|
|
|
break; |
7604
|
|
|
|
|
|
|
case 'E': |
7605
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE", 41)) { |
7606
|
|
|
|
|
|
|
/* ^ */ |
7607
|
|
|
|
|
|
|
|
7608
|
|
|
|
|
|
|
#ifdef SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE |
7609
|
1
|
|
|
|
|
|
return SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE; |
7610
|
|
|
|
|
|
|
#else |
7611
|
|
|
|
|
|
|
goto not_there; |
7612
|
|
|
|
|
|
|
#endif |
7613
|
|
|
|
|
|
|
|
7614
|
|
|
|
|
|
|
} |
7615
|
0
|
|
|
|
|
|
break; |
7616
|
|
|
|
|
|
|
case 'N': |
7617
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION", 41)) { |
7618
|
|
|
|
|
|
|
/* ^ */ |
7619
|
|
|
|
|
|
|
|
7620
|
|
|
|
|
|
|
#ifdef SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION |
7621
|
1
|
|
|
|
|
|
return SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION; |
7622
|
|
|
|
|
|
|
#else |
7623
|
|
|
|
|
|
|
goto not_there; |
7624
|
|
|
|
|
|
|
#endif |
7625
|
|
|
|
|
|
|
|
7626
|
|
|
|
|
|
|
} |
7627
|
0
|
|
|
|
|
|
break; |
7628
|
|
|
|
|
|
|
case 'O': |
7629
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD", 41)) { |
7630
|
|
|
|
|
|
|
/* ^ */ |
7631
|
|
|
|
|
|
|
|
7632
|
|
|
|
|
|
|
#ifdef X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD |
7633
|
1
|
|
|
|
|
|
return X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD; |
7634
|
|
|
|
|
|
|
#else |
7635
|
|
|
|
|
|
|
goto not_there; |
7636
|
|
|
|
|
|
|
#endif |
7637
|
|
|
|
|
|
|
|
7638
|
|
|
|
|
|
|
} |
7639
|
0
|
|
|
|
|
|
break; |
7640
|
|
|
|
|
|
|
case 'S': |
7641
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD", 41)) { |
7642
|
|
|
|
|
|
|
/* ^ */ |
7643
|
|
|
|
|
|
|
|
7644
|
|
|
|
|
|
|
#ifdef X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD |
7645
|
1
|
|
|
|
|
|
return X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD; |
7646
|
|
|
|
|
|
|
#else |
7647
|
|
|
|
|
|
|
goto not_there; |
7648
|
|
|
|
|
|
|
#endif |
7649
|
|
|
|
|
|
|
|
7650
|
|
|
|
|
|
|
} |
7651
|
0
|
|
|
|
|
|
break; |
7652
|
|
|
|
|
|
|
case 'T': |
7653
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED", 41)) { |
7654
|
|
|
|
|
|
|
/* ^ */ |
7655
|
|
|
|
|
|
|
|
7656
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED |
7657
|
1
|
|
|
|
|
|
return X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED; |
7658
|
|
|
|
|
|
|
#else |
7659
|
|
|
|
|
|
|
goto not_there; |
7660
|
|
|
|
|
|
|
#endif |
7661
|
|
|
|
|
|
|
|
7662
|
|
|
|
|
|
|
} |
7663
|
0
|
|
|
|
|
|
break; |
7664
|
|
|
|
|
|
|
case 'X': |
7665
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD", 41)) { |
7666
|
|
|
|
|
|
|
/* ^ */ |
7667
|
|
|
|
|
|
|
|
7668
|
|
|
|
|
|
|
#ifdef X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD |
7669
|
1
|
|
|
|
|
|
return X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD; |
7670
|
|
|
|
|
|
|
#else |
7671
|
|
|
|
|
|
|
goto not_there; |
7672
|
|
|
|
|
|
|
#endif |
7673
|
|
|
|
|
|
|
|
7674
|
|
|
|
|
|
|
} |
7675
|
0
|
|
|
|
|
|
break; |
7676
|
|
|
|
|
|
|
case '_': |
7677
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER", 41)) { |
7678
|
|
|
|
|
|
|
/* ^ */ |
7679
|
|
|
|
|
|
|
|
7680
|
|
|
|
|
|
|
#ifdef X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER |
7681
|
|
|
|
|
|
|
return X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER; |
7682
|
|
|
|
|
|
|
#else |
7683
|
1
|
|
|
|
|
|
goto not_there; |
7684
|
|
|
|
|
|
|
#endif |
7685
|
|
|
|
|
|
|
|
7686
|
|
|
|
|
|
|
} |
7687
|
0
|
|
|
|
|
|
break; |
7688
|
|
|
|
|
|
|
} |
7689
|
0
|
|
|
|
|
|
break; |
7690
|
|
|
|
|
|
|
case 42: |
7691
|
|
|
|
|
|
|
/* Names all of length 42. */ |
7692
|
|
|
|
|
|
|
/* X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL |
7693
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE |
7694
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE |
7695
|
|
|
|
|
|
|
X509_V_ERR_UNSUPPORTED_SIGNATURE_ALGORITHM */ |
7696
|
|
|
|
|
|
|
/* Offset 23 gives the best switch position. */ |
7697
|
4
|
|
|
|
|
|
switch (name[23]) { |
7698
|
|
|
|
|
|
|
case 'C': |
7699
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE", 42)) { |
7700
|
|
|
|
|
|
|
/* ^ */ |
7701
|
|
|
|
|
|
|
|
7702
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE |
7703
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE; |
7704
|
|
|
|
|
|
|
#else |
7705
|
|
|
|
|
|
|
goto not_there; |
7706
|
|
|
|
|
|
|
#endif |
7707
|
|
|
|
|
|
|
|
7708
|
|
|
|
|
|
|
} |
7709
|
0
|
|
|
|
|
|
break; |
7710
|
|
|
|
|
|
|
case 'I': |
7711
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL", 42)) { |
7712
|
|
|
|
|
|
|
/* ^ */ |
7713
|
|
|
|
|
|
|
|
7714
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL |
7715
|
|
|
|
|
|
|
return X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL; |
7716
|
|
|
|
|
|
|
#else |
7717
|
1
|
|
|
|
|
|
goto not_there; |
7718
|
|
|
|
|
|
|
#endif |
7719
|
|
|
|
|
|
|
|
7720
|
|
|
|
|
|
|
} |
7721
|
0
|
|
|
|
|
|
break; |
7722
|
|
|
|
|
|
|
case 'R': |
7723
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE", 42)) { |
7724
|
|
|
|
|
|
|
/* ^ */ |
7725
|
|
|
|
|
|
|
|
7726
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE |
7727
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE; |
7728
|
|
|
|
|
|
|
#else |
7729
|
|
|
|
|
|
|
goto not_there; |
7730
|
|
|
|
|
|
|
#endif |
7731
|
|
|
|
|
|
|
|
7732
|
|
|
|
|
|
|
} |
7733
|
0
|
|
|
|
|
|
break; |
7734
|
|
|
|
|
|
|
case 'S': |
7735
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNSUPPORTED_SIGNATURE_ALGORITHM", 42)) { |
7736
|
|
|
|
|
|
|
/* ^ */ |
7737
|
|
|
|
|
|
|
|
7738
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNSUPPORTED_SIGNATURE_ALGORITHM |
7739
|
|
|
|
|
|
|
return X509_V_ERR_UNSUPPORTED_SIGNATURE_ALGORITHM; |
7740
|
|
|
|
|
|
|
#else |
7741
|
1
|
|
|
|
|
|
goto not_there; |
7742
|
|
|
|
|
|
|
#endif |
7743
|
|
|
|
|
|
|
|
7744
|
|
|
|
|
|
|
} |
7745
|
0
|
|
|
|
|
|
break; |
7746
|
|
|
|
|
|
|
} |
7747
|
0
|
|
|
|
|
|
break; |
7748
|
|
|
|
|
|
|
case 43: |
7749
|
|
|
|
|
|
|
/* Names all of length 43. */ |
7750
|
|
|
|
|
|
|
/* X509_V_ERR_MISSING_AUTHORITY_KEY_IDENTIFIER |
7751
|
|
|
|
|
|
|
X509_V_ERR_PATHLEN_WITHOUT_KU_KEY_CERT_SIGN |
7752
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE |
7753
|
|
|
|
|
|
|
X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION */ |
7754
|
|
|
|
|
|
|
/* Offset 36 gives the best switch position. */ |
7755
|
4
|
|
|
|
|
|
switch (name[36]) { |
7756
|
|
|
|
|
|
|
case 'G': |
7757
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE", 43)) { |
7758
|
|
|
|
|
|
|
/* ^ */ |
7759
|
|
|
|
|
|
|
|
7760
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE |
7761
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE; |
7762
|
|
|
|
|
|
|
#else |
7763
|
|
|
|
|
|
|
goto not_there; |
7764
|
|
|
|
|
|
|
#endif |
7765
|
|
|
|
|
|
|
|
7766
|
|
|
|
|
|
|
} |
7767
|
0
|
|
|
|
|
|
break; |
7768
|
|
|
|
|
|
|
case 'N': |
7769
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_MISSING_AUTHORITY_KEY_IDENTIFIER", 43)) { |
7770
|
|
|
|
|
|
|
/* ^ */ |
7771
|
|
|
|
|
|
|
|
7772
|
|
|
|
|
|
|
#ifdef X509_V_ERR_MISSING_AUTHORITY_KEY_IDENTIFIER |
7773
|
|
|
|
|
|
|
return X509_V_ERR_MISSING_AUTHORITY_KEY_IDENTIFIER; |
7774
|
|
|
|
|
|
|
#else |
7775
|
1
|
|
|
|
|
|
goto not_there; |
7776
|
|
|
|
|
|
|
#endif |
7777
|
|
|
|
|
|
|
|
7778
|
|
|
|
|
|
|
} |
7779
|
0
|
|
|
|
|
|
break; |
7780
|
|
|
|
|
|
|
case 'R': |
7781
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_PATHLEN_WITHOUT_KU_KEY_CERT_SIGN", 43)) { |
7782
|
|
|
|
|
|
|
/* ^ */ |
7783
|
|
|
|
|
|
|
|
7784
|
|
|
|
|
|
|
#ifdef X509_V_ERR_PATHLEN_WITHOUT_KU_KEY_CERT_SIGN |
7785
|
|
|
|
|
|
|
return X509_V_ERR_PATHLEN_WITHOUT_KU_KEY_CERT_SIGN; |
7786
|
|
|
|
|
|
|
#else |
7787
|
1
|
|
|
|
|
|
goto not_there; |
7788
|
|
|
|
|
|
|
#endif |
7789
|
|
|
|
|
|
|
|
7790
|
|
|
|
|
|
|
} |
7791
|
0
|
|
|
|
|
|
break; |
7792
|
|
|
|
|
|
|
case 'T': |
7793
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION", 43)) { |
7794
|
|
|
|
|
|
|
/* ^ */ |
7795
|
|
|
|
|
|
|
|
7796
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION |
7797
|
1
|
|
|
|
|
|
return X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION; |
7798
|
|
|
|
|
|
|
#else |
7799
|
|
|
|
|
|
|
goto not_there; |
7800
|
|
|
|
|
|
|
#endif |
7801
|
|
|
|
|
|
|
|
7802
|
|
|
|
|
|
|
} |
7803
|
0
|
|
|
|
|
|
break; |
7804
|
|
|
|
|
|
|
} |
7805
|
0
|
|
|
|
|
|
break; |
7806
|
|
|
|
|
|
|
case 44: |
7807
|
|
|
|
|
|
|
/* Names all of length 44. */ |
7808
|
|
|
|
|
|
|
/* X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL |
7809
|
|
|
|
|
|
|
X509_V_ERR_SIGNATURE_ALGORITHM_INCONSISTENCY |
7810
|
|
|
|
|
|
|
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY */ |
7811
|
|
|
|
|
|
|
/* Offset 40 gives the best switch position. */ |
7812
|
4
|
|
|
|
|
|
switch (name[40]) { |
7813
|
|
|
|
|
|
|
case 'A': |
7814
|
2
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY", 44)) { |
7815
|
|
|
|
|
|
|
/* ^ */ |
7816
|
|
|
|
|
|
|
|
7817
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY |
7818
|
2
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY; |
7819
|
|
|
|
|
|
|
#else |
7820
|
|
|
|
|
|
|
goto not_there; |
7821
|
|
|
|
|
|
|
#endif |
7822
|
|
|
|
|
|
|
|
7823
|
|
|
|
|
|
|
} |
7824
|
0
|
|
|
|
|
|
break; |
7825
|
|
|
|
|
|
|
case 'E': |
7826
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SIGNATURE_ALGORITHM_INCONSISTENCY", 44)) { |
7827
|
|
|
|
|
|
|
/* ^ */ |
7828
|
|
|
|
|
|
|
|
7829
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SIGNATURE_ALGORITHM_INCONSISTENCY |
7830
|
|
|
|
|
|
|
return X509_V_ERR_SIGNATURE_ALGORITHM_INCONSISTENCY; |
7831
|
|
|
|
|
|
|
#else |
7832
|
1
|
|
|
|
|
|
goto not_there; |
7833
|
|
|
|
|
|
|
#endif |
7834
|
|
|
|
|
|
|
|
7835
|
|
|
|
|
|
|
} |
7836
|
0
|
|
|
|
|
|
break; |
7837
|
|
|
|
|
|
|
case 'I': |
7838
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL", 44)) { |
7839
|
|
|
|
|
|
|
/* ^ */ |
7840
|
|
|
|
|
|
|
|
7841
|
|
|
|
|
|
|
#ifdef X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL |
7842
|
|
|
|
|
|
|
return X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL; |
7843
|
|
|
|
|
|
|
#else |
7844
|
1
|
|
|
|
|
|
goto not_there; |
7845
|
|
|
|
|
|
|
#endif |
7846
|
|
|
|
|
|
|
|
7847
|
|
|
|
|
|
|
} |
7848
|
0
|
|
|
|
|
|
break; |
7849
|
|
|
|
|
|
|
} |
7850
|
0
|
|
|
|
|
|
break; |
7851
|
|
|
|
|
|
|
case 45: |
7852
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY", 45)) { |
7853
|
|
|
|
|
|
|
|
7854
|
|
|
|
|
|
|
#ifdef X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY |
7855
|
1
|
|
|
|
|
|
return X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY; |
7856
|
|
|
|
|
|
|
#else |
7857
|
|
|
|
|
|
|
goto not_there; |
7858
|
|
|
|
|
|
|
#endif |
7859
|
|
|
|
|
|
|
|
7860
|
|
|
|
|
|
|
} |
7861
|
0
|
|
|
|
|
|
break; |
7862
|
|
|
|
|
|
|
case 46: |
7863
|
|
|
|
|
|
|
/* Names all of length 46. */ |
7864
|
|
|
|
|
|
|
/* X509_V_ERR_KU_KEY_CERT_SIGN_INVALID_FOR_NON_CA |
7865
|
|
|
|
|
|
|
X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM */ |
7866
|
|
|
|
|
|
|
/* Offset 40 gives the best switch position. */ |
7867
|
2
|
|
|
|
|
|
switch (name[40]) { |
7868
|
|
|
|
|
|
|
case 'N': |
7869
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_KU_KEY_CERT_SIGN_INVALID_FOR_NON_CA", 46)) { |
7870
|
|
|
|
|
|
|
/* ^ */ |
7871
|
|
|
|
|
|
|
|
7872
|
|
|
|
|
|
|
#ifdef X509_V_ERR_KU_KEY_CERT_SIGN_INVALID_FOR_NON_CA |
7873
|
|
|
|
|
|
|
return X509_V_ERR_KU_KEY_CERT_SIGN_INVALID_FOR_NON_CA; |
7874
|
|
|
|
|
|
|
#else |
7875
|
1
|
|
|
|
|
|
goto not_there; |
7876
|
|
|
|
|
|
|
#endif |
7877
|
|
|
|
|
|
|
|
7878
|
|
|
|
|
|
|
} |
7879
|
0
|
|
|
|
|
|
break; |
7880
|
|
|
|
|
|
|
case 'O': |
7881
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM", 46)) { |
7882
|
|
|
|
|
|
|
/* ^ */ |
7883
|
|
|
|
|
|
|
|
7884
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM |
7885
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM; |
7886
|
|
|
|
|
|
|
#else |
7887
|
|
|
|
|
|
|
goto not_there; |
7888
|
|
|
|
|
|
|
#endif |
7889
|
|
|
|
|
|
|
|
7890
|
|
|
|
|
|
|
} |
7891
|
0
|
|
|
|
|
|
break; |
7892
|
|
|
|
|
|
|
} |
7893
|
0
|
|
|
|
|
|
break; |
7894
|
|
|
|
|
|
|
case 47: |
7895
|
1
|
50
|
|
|
|
|
if (!memcmp(name, "X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256", 47)) { |
7896
|
|
|
|
|
|
|
|
7897
|
|
|
|
|
|
|
#ifdef X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256 |
7898
|
1
|
|
|
|
|
|
return X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256; |
7899
|
|
|
|
|
|
|
#else |
7900
|
|
|
|
|
|
|
goto not_there; |
7901
|
|
|
|
|
|
|
#endif |
7902
|
|
|
|
|
|
|
|
7903
|
|
|
|
|
|
|
} |
7904
|
0
|
|
|
|
|
|
break; |
7905
|
|
|
|
|
|
|
} |
7906
|
|
|
|
|
|
|
|
7907
|
90
|
|
|
|
|
|
errno = EINVAL; |
7908
|
90
|
|
|
|
|
|
return 0; |
7909
|
|
|
|
|
|
|
|
7910
|
|
|
|
|
|
|
not_there: |
7911
|
143
|
|
|
|
|
|
errno = ENOENT; |
7912
|
143
|
|
|
|
|
|
return 0; |
7913
|
|
|
|
|
|
|
|
7914
|
|
|
|
|
|
|
} |