Commit e2b3d1321bc264d72d0cc2b12cfbd78891cef5eb
1 parent
7ddc463f
Exists in
master
and in
1 other branch
Using X509 error macros as message name to allow internet searching.
Showing
1 changed file
with
31 additions
and
3 deletions
Show diff stats
src/network_modules/openssl/messages.c
... | ... | @@ -46,6 +46,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
46 | 46 | { |
47 | 47 | .id = X509_V_OK, |
48 | 48 | .message = { |
49 | + .name = "X509_V_OK", | |
49 | 50 | .type = LIB3270_NOTIFY_INFO, |
50 | 51 | .icon = "security-high", |
51 | 52 | .summary = N_( "Secure connection was successful." ), |
... | ... | @@ -56,6 +57,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
56 | 57 | { |
57 | 58 | .id = X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT, |
58 | 59 | .message = { |
60 | + .name = "X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT", | |
59 | 61 | .type = LIB3270_NOTIFY_SECURE, |
60 | 62 | .icon = "dialog-error", |
61 | 63 | .summary = N_( "Unable to get issuer certificate" ), |
... | ... | @@ -66,12 +68,12 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
66 | 68 | { |
67 | 69 | .id = X509_V_ERR_UNABLE_TO_GET_CRL, |
68 | 70 | .message = { |
71 | + .name = "X509_V_ERR_UNABLE_TO_GET_CRL", | |
69 | 72 | #ifdef SSL_ENABLE_CRL_CHECK |
70 | 73 | .type = LIB3270_NOTIFY_SECURE, |
71 | 74 | #else |
72 | 75 | .type = LIB3270_NOTIFY_INFO, |
73 | 76 | #endif // SSL_ENABLE_CRL_CHECK |
74 | - .name = "X509UnableToGetCRL", | |
75 | 77 | .icon = "security-low", |
76 | 78 | .summary = N_( "Unable to get certificate CRL." ), |
77 | 79 | .body = N_( "The Certificate revocation list (CRL) of a certificate could not be found." ), |
... | ... | @@ -82,6 +84,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
82 | 84 | { |
83 | 85 | .id = X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE, |
84 | 86 | .message = { |
87 | + .name = "X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE", | |
85 | 88 | .type = LIB3270_NOTIFY_SECURE, |
86 | 89 | .icon = "dialog-error", |
87 | 90 | .summary = N_( "Unable to decrypt certificate's signature" ), |
... | ... | @@ -92,6 +95,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
92 | 95 | { |
93 | 96 | .id = X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE, |
94 | 97 | .message = { |
98 | + .name = "X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE", | |
95 | 99 | .type = LIB3270_NOTIFY_SECURE, |
96 | 100 | .icon = "dialog-error", |
97 | 101 | .summary = N_( "Unable to decrypt CRL's signature" ), |
... | ... | @@ -102,6 +106,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
102 | 106 | { |
103 | 107 | .id = X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY, |
104 | 108 | .message = { |
109 | + .name = "X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY", | |
105 | 110 | .type = LIB3270_NOTIFY_SECURE, |
106 | 111 | .icon = "dialog-error", |
107 | 112 | .summary = N_( "Unable to decode issuer public key" ), |
... | ... | @@ -112,6 +117,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
112 | 117 | { |
113 | 118 | .id = X509_V_ERR_CERT_SIGNATURE_FAILURE, |
114 | 119 | .message = { |
120 | + .name = "X509_V_ERR_CERT_SIGNATURE_FAILURE", | |
115 | 121 | .type = LIB3270_NOTIFY_SECURE, |
116 | 122 | .icon = "dialog-error", |
117 | 123 | .summary = N_( "Certificate signature failure" ), |
... | ... | @@ -122,6 +128,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
122 | 128 | { |
123 | 129 | .id = X509_V_ERR_CRL_SIGNATURE_FAILURE, |
124 | 130 | .message = { |
131 | + .name = "X509_V_ERR_CRL_SIGNATURE_FAILURE", | |
125 | 132 | .type = LIB3270_NOTIFY_SECURE, |
126 | 133 | .icon = "dialog-error", |
127 | 134 | .summary = N_( "CRL signature failure" ), |
... | ... | @@ -132,6 +139,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
132 | 139 | { |
133 | 140 | .id = X509_V_ERR_CERT_NOT_YET_VALID, |
134 | 141 | .message = { |
142 | + .name = "X509_V_ERR_CERT_NOT_YET_VALID", | |
135 | 143 | .type = LIB3270_NOTIFY_WARNING, |
136 | 144 | .icon = "security-medium", |
137 | 145 | .summary = N_( "Certificate is not yet valid" ), |
... | ... | @@ -142,6 +150,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
142 | 150 | { |
143 | 151 | .id = X509_V_ERR_CERT_HAS_EXPIRED, |
144 | 152 | .message = { |
153 | + .name = "X509_V_ERR_CERT_HAS_EXPIRED", | |
145 | 154 | .type = LIB3270_NOTIFY_SECURE, |
146 | 155 | .icon = "security-medium", |
147 | 156 | .summary = N_( "Certificate has expired" ), |
... | ... | @@ -152,6 +161,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
152 | 161 | { |
153 | 162 | .id = X509_V_ERR_CRL_NOT_YET_VALID, |
154 | 163 | .message = { |
164 | + .name = "X509_V_ERR_CRL_NOT_YET_VALID", | |
155 | 165 | .type = LIB3270_NOTIFY_WARNING, |
156 | 166 | .icon = "security-medium", |
157 | 167 | .summary = N_( "The CRL is not yet valid." ), |
... | ... | @@ -162,6 +172,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
162 | 172 | { |
163 | 173 | .id = X509_V_ERR_CRL_HAS_EXPIRED, |
164 | 174 | .message = { |
175 | + .name = "X509_V_ERR_CRL_HAS_EXPIRED", | |
165 | 176 | #ifdef SSL_ENABLE_CRL_EXPIRATION_CHECK |
166 | 177 | .type = LIB3270_NOTIFY_SECURE, |
167 | 178 | #else |
... | ... | @@ -176,6 +187,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
176 | 187 | { |
177 | 188 | .id = X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD, |
178 | 189 | .message = { |
190 | + .name = "X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD", | |
179 | 191 | .type = LIB3270_NOTIFY_SECURE, |
180 | 192 | .icon = "dialog-error", |
181 | 193 | .summary = N_( "Format error in certificate's notBefore field" ), |
... | ... | @@ -186,6 +198,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
186 | 198 | { |
187 | 199 | .id = X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD, |
188 | 200 | .message = { |
201 | + .name = "X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD", | |
189 | 202 | .type = LIB3270_NOTIFY_SECURE, |
190 | 203 | .icon = "dialog-error", |
191 | 204 | .summary = N_( "Format error in certificate's notAfter field" ), |
... | ... | @@ -196,6 +209,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
196 | 209 | { |
197 | 210 | .id = X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD, |
198 | 211 | .message = { |
212 | + .name = "X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD", | |
199 | 213 | .type = LIB3270_NOTIFY_SECURE, |
200 | 214 | .icon = "dialog-error", |
201 | 215 | .summary = N_( "Format error in CRL's lastUpdate field" ), |
... | ... | @@ -206,6 +220,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
206 | 220 | { |
207 | 221 | .id = X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD, |
208 | 222 | .message = { |
223 | + .name = "X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD", | |
209 | 224 | .type = LIB3270_NOTIFY_SECURE, |
210 | 225 | .icon = "dialog-error", |
211 | 226 | .summary = N_( "Format error in CRL's nextUpdate field" ), |
... | ... | @@ -216,6 +231,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
216 | 231 | { |
217 | 232 | .id = X509_V_ERR_OUT_OF_MEM, |
218 | 233 | .message = { |
234 | + .name = "X509_V_ERR_OUT_OF_MEM", | |
219 | 235 | .type = LIB3270_NOTIFY_ERROR, |
220 | 236 | .icon = "dialog-error", |
221 | 237 | .summary = N_( "Out of memory" ), |
... | ... | @@ -226,6 +242,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
226 | 242 | { |
227 | 243 | .id = X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT, |
228 | 244 | .message = { |
245 | + .name = "X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT", | |
229 | 246 | #ifdef SSL_ENABLE_SELF_SIGNED_CERT_CHECK |
230 | 247 | .type = LIB3270_NOTIFY_SECURE, |
231 | 248 | #else |
... | ... | @@ -233,7 +250,6 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
233 | 250 | #endif // SSL_ENABLE_SELF_SIGNED_CERT_CHECK |
234 | 251 | .icon = "security-medium", |
235 | 252 | .summary = N_( "Self signed certificate" ), |
236 | - .name = "X509DepthZeroSelfSignedCert", | |
237 | 253 | .label = N_( "Continue" ), |
238 | 254 | .body = N_( "The passed certificate is self signed and the same certificate cannot be found in the list of trusted certificates." ) |
239 | 255 | } |
... | ... | @@ -242,12 +258,12 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
242 | 258 | { |
243 | 259 | .id = X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN, |
244 | 260 | .message = { |
261 | + .name = "X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN", | |
245 | 262 | #ifdef SSL_ENABLE_SELF_SIGNED_CERT_CHECK |
246 | 263 | .type = LIB3270_NOTIFY_SECURE, |
247 | 264 | #else |
248 | 265 | .type = LIB3270_NOTIFY_INFO, |
249 | 266 | #endif // SSL_ENABLE_SELF_SIGNED_CERT_CHECK |
250 | - .name = "SelfSignedCertInChain", | |
251 | 267 | .icon = "security-low", |
252 | 268 | .label = N_("Continue"), |
253 | 269 | .summary = N_( "Self signed certificate in certificate chain" ), |
... | ... | @@ -258,6 +274,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
258 | 274 | { |
259 | 275 | .id = X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, |
260 | 276 | .message = { |
277 | + .name = "X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY", | |
261 | 278 | .type = LIB3270_NOTIFY_WARNING, |
262 | 279 | .icon = "security-low", |
263 | 280 | .summary = N_( "Unable to get local issuer certificate" ), |
... | ... | @@ -268,6 +285,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
268 | 285 | { |
269 | 286 | .id = X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE, |
270 | 287 | .message = { |
288 | + .name = "X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE", | |
271 | 289 | .type = LIB3270_NOTIFY_SECURE, |
272 | 290 | .icon = "security-low", |
273 | 291 | .summary = N_( "Unable to verify the first certificate" ), |
... | ... | @@ -278,6 +296,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
278 | 296 | { |
279 | 297 | .id = X509_V_ERR_CERT_REVOKED, |
280 | 298 | .message = { |
299 | + .name = "X509_V_ERR_CERT_REVOKED", | |
281 | 300 | .type = LIB3270_NOTIFY_SECURE, |
282 | 301 | .icon = "security-low", |
283 | 302 | .summary = N_( "Certificate revoked" ), |
... | ... | @@ -288,6 +307,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
288 | 307 | { |
289 | 308 | .id = X509_V_ERR_INVALID_CA, |
290 | 309 | .message = { |
310 | + .name = "X509_V_ERR_INVALID_CA", | |
291 | 311 | .type = LIB3270_NOTIFY_SECURE, |
292 | 312 | .icon = "security-low", |
293 | 313 | .summary = N_( "Invalid CA certificate" ), |
... | ... | @@ -298,6 +318,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
298 | 318 | { |
299 | 319 | .id = X509_V_ERR_PATH_LENGTH_EXCEEDED, |
300 | 320 | .message = { |
321 | + .name = "X509_V_ERR_PATH_LENGTH_EXCEEDED", | |
301 | 322 | .type = LIB3270_NOTIFY_SECURE, |
302 | 323 | .icon = "dialog-error", |
303 | 324 | .summary = N_( "Path length constraint exceeded" ), |
... | ... | @@ -308,6 +329,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
308 | 329 | { |
309 | 330 | .id = X509_V_ERR_INVALID_PURPOSE, |
310 | 331 | .message = { |
332 | + .name = "X509_V_ERR_INVALID_PURPOSE", | |
311 | 333 | .type = LIB3270_NOTIFY_SECURE, |
312 | 334 | .icon = "dialog-error", |
313 | 335 | .summary = N_( "Unsupported certificate purpose" ), |
... | ... | @@ -318,6 +340,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
318 | 340 | { |
319 | 341 | .id = X509_V_ERR_CERT_UNTRUSTED, |
320 | 342 | .message = { |
343 | + .name = "X509_V_ERR_CERT_UNTRUSTED", | |
321 | 344 | .type = LIB3270_NOTIFY_WARNING, |
322 | 345 | .icon = "security-low", |
323 | 346 | .summary = N_( "Certificate not trusted" ), |
... | ... | @@ -328,6 +351,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
328 | 351 | { |
329 | 352 | .id = X509_V_ERR_CERT_REJECTED, |
330 | 353 | .message = { |
354 | + .name = "X509_V_ERR_CERT_REJECTED", | |
331 | 355 | .type = LIB3270_NOTIFY_SECURE, |
332 | 356 | .icon = "security-low", |
333 | 357 | .summary = N_( "Certificate rejected" ), |
... | ... | @@ -338,6 +362,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
338 | 362 | { |
339 | 363 | .id = X509_V_ERR_SUBJECT_ISSUER_MISMATCH, |
340 | 364 | .message = { |
365 | + .name = "X509_V_ERR_SUBJECT_ISSUER_MISMATCH", | |
341 | 366 | .type = LIB3270_NOTIFY_SECURE, |
342 | 367 | .icon = "security-low", |
343 | 368 | .summary = N_( "Subject issuer mismatch" ), |
... | ... | @@ -348,6 +373,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
348 | 373 | { |
349 | 374 | .id = X509_V_ERR_AKID_SKID_MISMATCH, |
350 | 375 | .message = { |
376 | + .name = "X509_V_ERR_AKID_SKID_MISMATCH", | |
351 | 377 | .type = LIB3270_NOTIFY_SECURE, |
352 | 378 | .icon = "dialog-error", |
353 | 379 | .summary = N_( "Authority and subject key identifier mismatch" ), |
... | ... | @@ -358,6 +384,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
358 | 384 | { |
359 | 385 | .id = X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH, |
360 | 386 | .message = { |
387 | + .name = "X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH", | |
361 | 388 | .type = LIB3270_NOTIFY_SECURE, |
362 | 389 | .icon = "dialog-error", |
363 | 390 | .summary = N_( "Authority and issuer serial number mismatch" ), |
... | ... | @@ -368,6 +395,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) { |
368 | 395 | { |
369 | 396 | .id = X509_V_ERR_KEYUSAGE_NO_CERTSIGN, |
370 | 397 | .message = { |
398 | + .name = "X509_V_ERR_KEYUSAGE_NO_CERTSIGN", | |
371 | 399 | .type = LIB3270_NOTIFY_SECURE, |
372 | 400 | .icon = "dialog-error", |
373 | 401 | .summary = N_( "Key usage does not include certificate signing" ), | ... | ... |