Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:Ledest:erlang:24
erlang
4091-ssl-Enhance-ALERT-logs-to-help-understand-...
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 4091-ssl-Enhance-ALERT-logs-to-help-understand-what-cause.patch of Package erlang
From 0ba653028a0aa27c693600c4dadfba349cb7f7d3 Mon Sep 17 00:00:00 2001 From: Ingela Anderton Andin <ingela@erlang.org> Date: Tue, 21 May 2024 11:14:54 +0200 Subject: [PATCH] ssl: Enhance ALERT logs to help understand what causes the alert. --- lib/ssl/src/ssl_handshake.erl | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/lib/ssl/src/ssl_handshake.erl b/lib/ssl/src/ssl_handshake.erl index 0f9039a9f4..428e71d9b6 100644 --- a/lib/ssl/src/ssl_handshake.erl +++ b/lib/ssl/src/ssl_handshake.erl @@ -2090,28 +2090,27 @@ maybe_check_hostname(_, valid, _) -> path_validation_alert({bad_cert, cert_expired}) -> ?ALERT_REC(?FATAL, ?CERTIFICATE_EXPIRED); path_validation_alert({bad_cert, invalid_issuer}) -> - ?ALERT_REC(?FATAL, ?BAD_CERTIFICATE); + ?ALERT_REC(?FATAL, ?BAD_CERTIFICATE, invalid_issuer); path_validation_alert({bad_cert, invalid_signature}) -> - ?ALERT_REC(?FATAL, ?BAD_CERTIFICATE); + ?ALERT_REC(?FATAL, ?BAD_CERTIFICATE, invalid_signature); path_validation_alert({bad_cert, unsupported_signature}) -> ?ALERT_REC(?FATAL, ?UNSUPPORTED_CERTIFICATE); path_validation_alert({bad_cert, name_not_permitted}) -> - ?ALERT_REC(?FATAL, ?BAD_CERTIFICATE); + ?ALERT_REC(?FATAL, ?BAD_CERTIFICATE, name_not_permitted); path_validation_alert({bad_cert, unknown_critical_extension}) -> - ?ALERT_REC(?FATAL, ?UNSUPPORTED_CERTIFICATE); + ?ALERT_REC(?FATAL, ?UNSUPPORTED_CERTIFICATE, unknown_critical_extension); path_validation_alert({bad_cert, {revoked, _}}) -> ?ALERT_REC(?FATAL, ?CERTIFICATE_REVOKED); path_validation_alert({bad_cert, {revocation_status_undetermined, Details}}) -> Alert = ?ALERT_REC(?FATAL, ?BAD_CERTIFICATE), Alert#alert{reason = Details}; path_validation_alert({bad_cert, selfsigned_peer}) -> - ?ALERT_REC(?FATAL, ?BAD_CERTIFICATE); + ?ALERT_REC(?FATAL, ?BAD_CERTIFICATE, selfsigned_peer); path_validation_alert({bad_cert, unknown_ca}) -> ?ALERT_REC(?FATAL, ?UNKNOWN_CA); path_validation_alert(Reason) -> ?ALERT_REC(?FATAL, ?HANDSHAKE_FAILURE, Reason). - digitally_signed(Version, Msg, HashAlgo, PrivateKey, SignAlgo) -> try do_digitally_signed(Version, Msg, HashAlgo, PrivateKey, SignAlgo) catch -- 2.35.3
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor