summaryrefslogtreecommitdiff
path: root/lib/gnutls_errors.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2015-09-26 14:03:25 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2016-05-19 09:49:45 +0200
commit9bf790d1de691293793512a69796b65c4b7d69c0 (patch)
tree35498dfe98cad43dc89f7ce1236aeeb6a2e2792e /lib/gnutls_errors.c
parent81748e076ed2bbe3af9bd3c25ab5a3946968b4f5 (diff)
downloadgnutls-backport-new-verification-functions.tar.gz
Backported new verification functions for clients from 3.5.x branchbackport-new-verification-functions
The major use-case for the TLS protocol is verification of PKIX certificates. However, certificate verification support while is similar for almost all projects it requires around 100 lines of code (a callback) to be duplicated to all applications. That patch set gets rid of the callback and simplifies certificate verification support, by introducing a very simple API; one that would accept the session and the hostname only. Resolves #27
Diffstat (limited to 'lib/gnutls_errors.c')
-rw-r--r--lib/gnutls_errors.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/lib/gnutls_errors.c b/lib/gnutls_errors.c
index 50f2a0ff2c..91a0fa7925 100644
--- a/lib/gnutls_errors.c
+++ b/lib/gnutls_errors.c
@@ -153,6 +153,8 @@ static const gnutls_error_entry error_entries[] = {
GNUTLS_E_RECORD_LIMIT_REACHED),
ERROR_ENTRY(N_("Error in the certificate."),
GNUTLS_E_CERTIFICATE_ERROR),
+ ERROR_ENTRY(N_("Error in the certificate verification."),
+ GNUTLS_E_CERTIFICATE_VERIFICATION_ERROR),
ERROR_ENTRY(N_("Could not authenticate peer."),
GNUTLS_E_AUTH_ERROR),
ERROR_ENTRY(N_