diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2015-09-26 14:03:25 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2016-05-19 09:49:45 +0200 |
commit | 9bf790d1de691293793512a69796b65c4b7d69c0 (patch) | |
tree | 35498dfe98cad43dc89f7ce1236aeeb6a2e2792e /lib/gnutls_errors.c | |
parent | 81748e076ed2bbe3af9bd3c25ab5a3946968b4f5 (diff) | |
download | gnutls-backport-new-verification-functions.tar.gz |
Backported new verification functions for clients from 3.5.x branchbackport-new-verification-functions
The major use-case for the TLS protocol is verification of PKIX
certificates. However, certificate verification support while is
similar for almost all projects it requires around 100 lines of code
(a callback) to be duplicated to all applications. That patch
set gets rid of the callback and simplifies certificate verification
support, by introducing a very simple API; one that would accept
the session and the hostname only.
Resolves #27
Diffstat (limited to 'lib/gnutls_errors.c')
-rw-r--r-- | lib/gnutls_errors.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/lib/gnutls_errors.c b/lib/gnutls_errors.c index 50f2a0ff2c..91a0fa7925 100644 --- a/lib/gnutls_errors.c +++ b/lib/gnutls_errors.c @@ -153,6 +153,8 @@ static const gnutls_error_entry error_entries[] = { GNUTLS_E_RECORD_LIMIT_REACHED), ERROR_ENTRY(N_("Error in the certificate."), GNUTLS_E_CERTIFICATE_ERROR), + ERROR_ENTRY(N_("Error in the certificate verification."), + GNUTLS_E_CERTIFICATE_VERIFICATION_ERROR), ERROR_ENTRY(N_("Could not authenticate peer."), GNUTLS_E_AUTH_ERROR), ERROR_ENTRY(N_ |