diff options
| author | Yang Tse <yangsita@gmail.com> | 2012-06-19 20:28:21 +0200 | 
|---|---|---|
| committer | Yang Tse <yangsita@gmail.com> | 2012-06-19 20:32:19 +0200 | 
| commit | 75dd191bdfa2dcc3074ce76cec10d74f627d5894 (patch) | |
| tree | de09b49706106d75a2227d78213ec8be8715aa51 | |
| parent | e93e3bcb8217b0337219d0e6a2e9893e6bd4ea06 (diff) | |
schannel SSL: make wording of some trace messages better reflect reality
| -rw-r--r-- | lib/curl_schannel.c | 38 | 
1 files changed, 22 insertions, 16 deletions
diff --git a/lib/curl_schannel.c b/lib/curl_schannel.c index 06286a72b..ed6c5abe3 100644 --- a/lib/curl_schannel.c +++ b/lib/curl_schannel.c @@ -123,7 +123,7 @@ schannel_connect_step1(struct connectdata *conn, int sockindex)  #endif    TCHAR *host_name; -  infof(data, "schannel: connecting to %s:%hu (step 1/3)\n", +  infof(data, "schannel: SSL/TLS connection with %s port %hu (step 1/3)\n",          conn->host.name, conn->remote_port);    /* check for an existing re-usable credential handle */ @@ -289,7 +289,7 @@ schannel_connect_step2(struct connectdata *conn, int sockindex)    SECURITY_STATUS sspi_status = SEC_E_OK;    TCHAR *host_name; -  infof(data, "schannel: connecting to %s:%hu (step 2/3)\n", +  infof(data, "schannel: SSL/TLS connection with %s port %hu (step 2/3)\n",          conn->host.name, conn->remote_port);    /* buffer to store previously received and encrypted data */ @@ -314,11 +314,13 @@ schannel_connect_step2(struct connectdata *conn, int sockindex)    else if(connssl->connecting_state != ssl_connect_2_writing) {      if(nread < 0) {        connssl->connecting_state = ssl_connect_2_reading; -      infof(data, "schannel: failed to receive handshake, need more data\n"); +      infof(data, "schannel: failed to receive handshake, " +            "need more data\n");        return CURLE_OK;      }      else if(nread == 0) { -      failf(data, "schannel: failed to receive handshake, connection failed"); +      failf(data, "schannel: failed to receive handshake, " +            "SSL/TLS connection failed");        return CURLE_SSL_CONNECT_ERROR;      }    } @@ -435,7 +437,7 @@ schannel_connect_step2(struct connectdata *conn, int sockindex)    /* check if the handshake is complete */    if(sspi_status == SEC_E_OK) {      connssl->connecting_state = ssl_connect_3; -    infof(data, "schannel: handshake complete\n"); +    infof(data, "schannel: SSL/TLS handshake complete\n");    }  #ifdef _WIN32_WCE @@ -459,7 +461,7 @@ schannel_connect_step3(struct connectdata *conn, int sockindex)    DEBUGASSERT(ssl_connect_3 == connssl->connecting_state); -  infof(data, "schannel: connecting to %s:%hu (step 3/3)\n", +  infof(data, "schannel: SSL/TLS connection with %s port %hu (step 3/3)\n",          conn->host.name, conn->remote_port);    /* check if the required context attributes are met */ @@ -528,7 +530,7 @@ schannel_connect_common(struct connectdata *conn, int sockindex,      if(timeout_ms < 0) {        /* no need to continue if time already is up */ -      failf(data, "SSL connection timeout"); +      failf(data, "SSL/TLS connection timeout");        return CURLE_OPERATION_TIMEDOUT;      } @@ -546,7 +548,7 @@ schannel_connect_common(struct connectdata *conn, int sockindex,      if(timeout_ms < 0) {        /* no need to continue if time already is up */ -      failf(data, "SSL connection timeout"); +      failf(data, "SSL/TLS connection timeout");        return CURLE_OPERATION_TIMEDOUT;      } @@ -562,7 +564,7 @@ schannel_connect_common(struct connectdata *conn, int sockindex,        what = Curl_socket_ready(readfd, writefd, nonblocking ? 0 : timeout_ms);        if(what < 0) {          /* fatal error */ -        failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO); +        failf(data, "select/poll on SSL/TLS socket, errno: %d", SOCKERRNO);          return CURLE_SSL_CONNECT_ERROR;        }        else if(0 == what) { @@ -572,7 +574,7 @@ schannel_connect_common(struct connectdata *conn, int sockindex,          }          else {            /* timeout */ -          failf(data, "SSL connection timeout"); +          failf(data, "SSL/TLS connection timeout");            return CURLE_OPERATION_TIMEDOUT;          }        } @@ -849,16 +851,20 @@ schannel_recv(struct connectdata *conn, int sockindex,      /* check if server wants to renegotiate the connection context */      if(sspi_status == SEC_I_RENEGOTIATE) { -      infof(data, "schannel: client needs to renegotiate with server\n"); +      infof(data, "schannel: remote party requests SSL/TLS renegotiation\n");        /* begin renegotiation */ +      infof(data, "schannel: renegotiating SSL/TLS connection\n");        connssl->state = ssl_connection_negotiating;        connssl->connecting_state = ssl_connect_2_writing;        retcode = schannel_connect_common(conn, sockindex, FALSE, &done);        if(retcode)          *err = retcode; -      else /* now retry receiving data */ +      else { +        infof(data, "schannel: SSL/TLS connection renegotiated\n"); +        /* now retry receiving data */          return schannel_recv(conn, sockindex, buf, len, err); +      }      }    } @@ -936,7 +942,7 @@ bool Curl_schannel_data_pending(const struct connectdata *conn, int sockindex)  {    const struct ssl_connect_data *connssl = &conn->ssl[sockindex]; -  if(connssl->use) /* SSL is in use */ +  if(connssl->use) /* SSL/TLS is in use */      return (connssl->encdata_offset > 0 ||              connssl->decdata_offset > 0 ) ? TRUE : FALSE;    else @@ -946,7 +952,7 @@ bool Curl_schannel_data_pending(const struct connectdata *conn, int sockindex)  void Curl_schannel_close(struct connectdata *conn, int sockindex)  {    if(conn->ssl[sockindex].use) -    /* if the SSL channel hasn't been shut down yet, do that now. */ +    /* if the SSL/TLS channel hasn't been shut down yet, do that now. */      Curl_ssl_shutdown(conn, sockindex);  } @@ -958,7 +964,7 @@ http://msdn.microsoft.com/en-us/library/windows/desktop/aa380138(v=vs.85).aspx    struct SessionHandle *data = conn->data;    struct ssl_connect_data *connssl = &conn->ssl[sockindex]; -  infof(data, "schannel: shutting down SSL connection with %s:%hu\n", +  infof(data, "schannel: shutting down SSL/TLS connection with %s port %hu\n",          conn->host.name, conn->remote_port);    if(connssl->ctxt) { @@ -1085,7 +1091,7 @@ static CURLcode verify_certificate(struct connectdata *conn, int sockindex)    struct ssl_connect_data *connssl = &conn->ssl[sockindex];    CURLcode result = CURLE_OK;    CERT_CONTEXT *pCertContextServer = NULL; -  CCERT_CHAIN_CONTEXT *pChainContext = NULL; +  const CERT_CHAIN_CONTEXT *pChainContext = NULL;    status = s_pSecFn->QueryContextAttributes(&connssl->ctxt->ctxt_handle,                                              SECPKG_ATTR_REMOTE_CERT_CONTEXT,  | 
