diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2015-08-27 22:12:55 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2015-08-27 22:33:36 +0200 |
commit | 4b6003734006fd7e63812ba03eeefbb1525dc060 (patch) | |
tree | e4a8c44eb4b30685529a777e796a791c76a90301 /lib/auto-verify.c | |
parent | 5bc2123885d38bad739cd47b614e92eb3be95e96 (diff) | |
download | gnutls-4b6003734006fd7e63812ba03eeefbb1525dc060.tar.gz |
Introduced GNUTLS_E_CERTIFICATE_VERIFICATION_ERROR to be returned by the auto-verification functions
Diffstat (limited to 'lib/auto-verify.c')
-rw-r--r-- | lib/auto-verify.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/lib/auto-verify.c b/lib/auto-verify.c index 6445a410b2..45695fc959 100644 --- a/lib/auto-verify.c +++ b/lib/auto-verify.c @@ -47,7 +47,7 @@ static int auto_verify_cb(gnutls_session_t session) session->internals.vc_status = status; if (status != 0) /* Certificate is not trusted */ - return gnutls_assert_val(GNUTLS_E_CERTIFICATE_ERROR); + return gnutls_assert_val(GNUTLS_E_CERTIFICATE_VERIFICATION_ERROR); /* notify gnutls to continue handshake normally */ return 0; @@ -61,8 +61,8 @@ static int auto_verify_cb(gnutls_session_t session) * * This function instructs GnuTLS to verify the peer's certificate * using the provided hostname. If the verification fails the handshake - * will also fail. The verification result can be obtained using - * gnutls_session_get_verify_cert_status(). + * will also fail with %GNUTLS_E_CERTIFICATE_VERIFICATION_ERROR. In that + * case the verification result can be obtained using gnutls_session_get_verify_cert_status(). * * The @hostname pointer provided must remain valid for the lifetime * of the session. More precisely it should be available during any subsequent @@ -102,8 +102,8 @@ void gnutls_session_auto_verify_cert(gnutls_session_t session, * * This function instructs GnuTLS to verify the peer's certificate * using the provided typed data information. If the verification fails the handshake - * will also fail. The verification result can be obtained using - * gnutls_session_get_verify_cert_status(). + * will also fail with %GNUTLS_E_CERTIFICATE_VERIFICATION_ERROR. In that + * case the verification result can be obtained using gnutls_session_get_verify_cert_status(). * * The acceptable typed data are the same as in gnutls_certificate_verify_peers(), * and once set must remain valid for the lifetime of the session. More precisely |