xref: /openbsd-src/usr.bin/ssh/ssherr.c (revision b02978545bce442573ccf47f7da3f17e8d0f4916)
1*b0297854Sdjm /*	$OpenBSD: ssherr.c,v 1.10 2020/01/25 23:13:09 djm Exp $	*/
215b55daeSdjm /*
315b55daeSdjm  * Copyright (c) 2011 Damien Miller
415b55daeSdjm  *
515b55daeSdjm  * Permission to use, copy, modify, and distribute this software for any
615b55daeSdjm  * purpose with or without fee is hereby granted, provided that the above
715b55daeSdjm  * copyright notice and this permission notice appear in all copies.
815b55daeSdjm  *
915b55daeSdjm  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
1015b55daeSdjm  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
1115b55daeSdjm  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
1215b55daeSdjm  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
1315b55daeSdjm  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
1415b55daeSdjm  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1515b55daeSdjm  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1615b55daeSdjm  */
1715b55daeSdjm 
1815b55daeSdjm #include <errno.h>
1915b55daeSdjm #include <string.h>
2015b55daeSdjm #include "ssherr.h"
2115b55daeSdjm 
2215b55daeSdjm const char *
ssh_err(int n)2315b55daeSdjm ssh_err(int n)
2415b55daeSdjm {
2515b55daeSdjm 	switch (n) {
2615b55daeSdjm 	case SSH_ERR_SUCCESS:
2715b55daeSdjm 		return "success";
2815b55daeSdjm 	case SSH_ERR_INTERNAL_ERROR:
2915b55daeSdjm 		return "unexpected internal error";
3015b55daeSdjm 	case SSH_ERR_ALLOC_FAIL:
3115b55daeSdjm 		return "memory allocation failed";
3215b55daeSdjm 	case SSH_ERR_MESSAGE_INCOMPLETE:
3315b55daeSdjm 		return "incomplete message";
3415b55daeSdjm 	case SSH_ERR_INVALID_FORMAT:
3515b55daeSdjm 		return "invalid format";
3615b55daeSdjm 	case SSH_ERR_BIGNUM_IS_NEGATIVE:
3715b55daeSdjm 		return "bignum is negative";
3815b55daeSdjm 	case SSH_ERR_STRING_TOO_LARGE:
3915b55daeSdjm 		return "string is too large";
4015b55daeSdjm 	case SSH_ERR_BIGNUM_TOO_LARGE:
4115b55daeSdjm 		return "bignum is too large";
4215b55daeSdjm 	case SSH_ERR_ECPOINT_TOO_LARGE:
4315b55daeSdjm 		return "elliptic curve point is too large";
4415b55daeSdjm 	case SSH_ERR_NO_BUFFER_SPACE:
4515b55daeSdjm 		return "insufficient buffer space";
4615b55daeSdjm 	case SSH_ERR_INVALID_ARGUMENT:
4715b55daeSdjm 		return "invalid argument";
4815b55daeSdjm 	case SSH_ERR_KEY_BITS_MISMATCH:
4915b55daeSdjm 		return "key bits do not match";
5015b55daeSdjm 	case SSH_ERR_EC_CURVE_INVALID:
5115b55daeSdjm 		return "invalid elliptic curve";
5215b55daeSdjm 	case SSH_ERR_KEY_TYPE_MISMATCH:
5315b55daeSdjm 		return "key type does not match";
5415b55daeSdjm 	case SSH_ERR_KEY_TYPE_UNKNOWN:
5515b55daeSdjm 		return "unknown or unsupported key type";
5615b55daeSdjm 	case SSH_ERR_EC_CURVE_MISMATCH:
5715b55daeSdjm 		return "elliptic curve does not match";
5815b55daeSdjm 	case SSH_ERR_EXPECTED_CERT:
5915b55daeSdjm 		return "plain key provided where certificate required";
6015b55daeSdjm 	case SSH_ERR_KEY_LACKS_CERTBLOB:
6115b55daeSdjm 		return "key lacks certificate data";
6215b55daeSdjm 	case SSH_ERR_KEY_CERT_UNKNOWN_TYPE:
6315b55daeSdjm 		return "unknown/unsupported certificate type";
6415b55daeSdjm 	case SSH_ERR_KEY_CERT_INVALID_SIGN_KEY:
6515b55daeSdjm 		return "invalid certificate signing key";
6615b55daeSdjm 	case SSH_ERR_KEY_INVALID_EC_VALUE:
6715b55daeSdjm 		return "invalid elliptic curve value";
6815b55daeSdjm 	case SSH_ERR_SIGNATURE_INVALID:
6915b55daeSdjm 		return "incorrect signature";
7015b55daeSdjm 	case SSH_ERR_LIBCRYPTO_ERROR:
7115b55daeSdjm 		return "error in libcrypto";  /* XXX fetch and return */
7215b55daeSdjm 	case SSH_ERR_UNEXPECTED_TRAILING_DATA:
7315b55daeSdjm 		return "unexpected bytes remain after decoding";
7415b55daeSdjm 	case SSH_ERR_SYSTEM_ERROR:
7515b55daeSdjm 		return strerror(errno);
7615b55daeSdjm 	case SSH_ERR_KEY_CERT_INVALID:
7715b55daeSdjm 		return "invalid certificate";
7815b55daeSdjm 	case SSH_ERR_AGENT_COMMUNICATION:
7915b55daeSdjm 		return "communication with agent failed";
8015b55daeSdjm 	case SSH_ERR_AGENT_FAILURE:
8115b55daeSdjm 		return "agent refused operation";
8215b55daeSdjm 	case SSH_ERR_DH_GEX_OUT_OF_RANGE:
8315b55daeSdjm 		return "DH GEX group out of range";
8415b55daeSdjm 	case SSH_ERR_DISCONNECTED:
8515b55daeSdjm 		return "disconnected";
8615b55daeSdjm 	case SSH_ERR_MAC_INVALID:
8715b55daeSdjm 		return "message authentication code incorrect";
8815b55daeSdjm 	case SSH_ERR_NO_CIPHER_ALG_MATCH:
8915b55daeSdjm 		return "no matching cipher found";
9015b55daeSdjm 	case SSH_ERR_NO_MAC_ALG_MATCH:
9115b55daeSdjm 		return "no matching MAC found";
9215b55daeSdjm 	case SSH_ERR_NO_COMPRESS_ALG_MATCH:
9315b55daeSdjm 		return "no matching compression method found";
9415b55daeSdjm 	case SSH_ERR_NO_KEX_ALG_MATCH:
9515b55daeSdjm 		return "no matching key exchange method found";
9615b55daeSdjm 	case SSH_ERR_NO_HOSTKEY_ALG_MATCH:
9715b55daeSdjm 		return "no matching host key type found";
9815b55daeSdjm 	case SSH_ERR_PROTOCOL_MISMATCH:
9915b55daeSdjm 		return "protocol version mismatch";
10015b55daeSdjm 	case SSH_ERR_NO_PROTOCOL_VERSION:
10115b55daeSdjm 		return "could not read protocol version";
10215b55daeSdjm 	case SSH_ERR_NO_HOSTKEY_LOADED:
10315b55daeSdjm 		return "could not load host key";
10415b55daeSdjm 	case SSH_ERR_NEED_REKEY:
10515b55daeSdjm 		return "rekeying not supported by peer";
10615b55daeSdjm 	case SSH_ERR_PASSPHRASE_TOO_SHORT:
1070768ca3dStim 		return "passphrase is too short (minimum five characters)";
10815b55daeSdjm 	case SSH_ERR_FILE_CHANGED:
10915b55daeSdjm 		return "file changed while reading";
11015b55daeSdjm 	case SSH_ERR_KEY_UNKNOWN_CIPHER:
11115b55daeSdjm 		return "key encrypted using unsupported cipher";
11215b55daeSdjm 	case SSH_ERR_KEY_WRONG_PASSPHRASE:
11315b55daeSdjm 		return "incorrect passphrase supplied to decrypt private key";
11415b55daeSdjm 	case SSH_ERR_KEY_BAD_PERMISSIONS:
11515b55daeSdjm 		return "bad permissions";
11615b55daeSdjm 	case SSH_ERR_KEY_CERT_MISMATCH:
11715b55daeSdjm 		return "certificate does not match key";
11815b55daeSdjm 	case SSH_ERR_KEY_NOT_FOUND:
11915b55daeSdjm 		return "key not found";
12015b55daeSdjm 	case SSH_ERR_AGENT_NOT_PRESENT:
12115b55daeSdjm 		return "agent not present";
12215b55daeSdjm 	case SSH_ERR_AGENT_NO_IDENTITIES:
12315b55daeSdjm 		return "agent contains no identities";
12483fcfd69Sdjm 	case SSH_ERR_BUFFER_READ_ONLY:
12583fcfd69Sdjm 		return "internal error: buffer is read-only";
12615b55daeSdjm 	case SSH_ERR_KRL_BAD_MAGIC:
12715b55daeSdjm 		return "KRL file has invalid magic number";
12815b55daeSdjm 	case SSH_ERR_KEY_REVOKED:
12915b55daeSdjm 		return "Key is revoked";
13042dab86dSdjm 	case SSH_ERR_CONN_CLOSED:
13142dab86dSdjm 		return "Connection closed";
13242dab86dSdjm 	case SSH_ERR_CONN_TIMEOUT:
13342dab86dSdjm 		return "Connection timed out";
1347b0d3b43Sdjm 	case SSH_ERR_CONN_CORRUPT:
1357b0d3b43Sdjm 		return "Connection corrupted";
1367b0d3b43Sdjm 	case SSH_ERR_PROTOCOL_ERROR:
1377b0d3b43Sdjm 		return "Protocol error";
138654a3af3Sdjm 	case SSH_ERR_KEY_LENGTH:
139654a3af3Sdjm 		return "Invalid key length";
1407b28dfb0Sdjm 	case SSH_ERR_NUMBER_TOO_LARGE:
1417b28dfb0Sdjm 		return "number is too large";
14238a44c4dSdjm 	case SSH_ERR_SIGN_ALG_UNSUPPORTED:
14338a44c4dSdjm 		return "signature algorithm not supported";
144480af03fSdjm 	case SSH_ERR_FEATURE_UNSUPPORTED:
145480af03fSdjm 		return "requested feature not supported";
146*b0297854Sdjm 	case SSH_ERR_DEVICE_NOT_FOUND:
147*b0297854Sdjm 		return "device not found";
14815b55daeSdjm 	default:
14915b55daeSdjm 		return "unknown error";
15015b55daeSdjm 	}
15115b55daeSdjm }
152