PA-RISC assembler pack: switch to bve in 64-bit builds.
[openssl.git] / crypto / x509 / x509_txt.c
index 5a945a70fb70c737e004e4a2f5e6eee6202cade3..361cd21987d562ddd5b8e8f0f506ca541fdf9331 100644 (file)
@@ -122,8 +122,14 @@ const char *X509_verify_cert_error_string(long n)
                return("certificate revoked");
        case X509_V_ERR_INVALID_CA:
                return ("invalid CA certificate");
+       case X509_V_ERR_INVALID_NON_CA:
+               return ("invalid non-CA certificate (has CA markings)");
        case X509_V_ERR_PATH_LENGTH_EXCEEDED:
                return ("path length constraint exceeded");
+       case X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED:
+               return("proxy path length constraint exceeded");
+       case X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED:
+               return("proxy certificates not allowed, please set the appropriate flag");
        case X509_V_ERR_INVALID_PURPOSE:
                return ("unsupported certificate purpose");
        case X509_V_ERR_CERT_UNTRUSTED:
@@ -140,12 +146,63 @@ const char *X509_verify_cert_error_string(long n)
                return("authority and issuer serial number mismatch");
        case X509_V_ERR_KEYUSAGE_NO_CERTSIGN:
                return("key usage does not include certificate signing");
-
        case X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER:
                return("unable to get CRL issuer certificate");
-
        case X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION:
                return("unhandled critical extension");
+       case X509_V_ERR_KEYUSAGE_NO_CRL_SIGN:
+               return("key usage does not include CRL signing");
+       case X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE:
+               return("key usage does not include digital signature");
+       case X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION:
+               return("unhandled critical CRL extension");
+       case X509_V_ERR_INVALID_EXTENSION:
+               return("invalid or inconsistent certificate extension");
+       case X509_V_ERR_INVALID_POLICY_EXTENSION:
+               return("invalid or inconsistent certificate policy extension");
+       case X509_V_ERR_NO_EXPLICIT_POLICY:
+               return("no explicit policy");
+       case X509_V_ERR_DIFFERENT_CRL_SCOPE:
+       return("Different CRL scope");
+       case X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE:
+       return("Unsupported extension feature");
+       case X509_V_ERR_UNNESTED_RESOURCE:
+               return("RFC 3779 resource not subset of parent's resources");
+
+       case X509_V_ERR_PERMITTED_VIOLATION:
+               return("permitted subtree violation");
+       case X509_V_ERR_EXCLUDED_VIOLATION:
+               return("excluded subtree violation");
+       case X509_V_ERR_SUBTREE_MINMAX:
+               return("name constraints minimum and maximum not supported");
+       case X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE:
+               return("unsupported name constraint type");
+       case X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX:
+               return("unsupported or invalid name constraint syntax");
+       case X509_V_ERR_UNSUPPORTED_NAME_SYNTAX:
+               return("unsupported or invalid name syntax");
+       case X509_V_ERR_CRL_PATH_VALIDATION_ERROR:
+               return("CRL path validation error");
+       case X509_V_ERR_PATH_LOOP:
+               return("Path Loop");
+       case X509_V_ERR_SUITE_B_INVALID_VERSION:
+               return("Suite B: certificate version invalid");
+       case X509_V_ERR_SUITE_B_INVALID_ALGORITHM:
+               return("Suite B: invalid public key algorithm");
+       case X509_V_ERR_SUITE_B_INVALID_CURVE:
+               return("Suite B: invalid ECC curve");
+       case X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM:
+               return("Suite B: invalid signature algorithm");
+       case X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED:
+               return("Suite B: curve not allowed for this LOS");
+       case X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256:
+               return("Suite B: cannot sign P-384 with P-256");
+       case X509_V_ERR_HOSTNAME_MISMATCH:
+               return("Hostname mismatch");
+       case X509_V_ERR_EMAIL_MISMATCH:
+               return("Email address mismatch");
+       case X509_V_ERR_IP_ADDRESS_MISMATCH:
+               return("IP address mismatch");
 
        default:
                BIO_snprintf(buf,sizeof buf,"error number %ld",n);