Commit e2b3d1321bc264d72d0cc2b12cfbd78891cef5eb

Authored by Perry Werneck
1 parent 7ddc463f
Exists in master and in 1 other branch develop

Using X509 error macros as message name to allow internet searching.

Showing 1 changed file with 31 additions and 3 deletions   Show diff stats
src/network_modules/openssl/messages.c
... ... @@ -46,6 +46,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
46 46 {
47 47 .id = X509_V_OK,
48 48 .message = {
  49 + .name = "X509_V_OK",
49 50 .type = LIB3270_NOTIFY_INFO,
50 51 .icon = "security-high",
51 52 .summary = N_( "Secure connection was successful." ),
... ... @@ -56,6 +57,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
56 57 {
57 58 .id = X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT,
58 59 .message = {
  60 + .name = "X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT",
59 61 .type = LIB3270_NOTIFY_SECURE,
60 62 .icon = "dialog-error",
61 63 .summary = N_( "Unable to get issuer certificate" ),
... ... @@ -66,12 +68,12 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
66 68 {
67 69 .id = X509_V_ERR_UNABLE_TO_GET_CRL,
68 70 .message = {
  71 + .name = "X509_V_ERR_UNABLE_TO_GET_CRL",
69 72 #ifdef SSL_ENABLE_CRL_CHECK
70 73 .type = LIB3270_NOTIFY_SECURE,
71 74 #else
72 75 .type = LIB3270_NOTIFY_INFO,
73 76 #endif // SSL_ENABLE_CRL_CHECK
74   - .name = "X509UnableToGetCRL",
75 77 .icon = "security-low",
76 78 .summary = N_( "Unable to get certificate CRL." ),
77 79 .body = N_( "The Certificate revocation list (CRL) of a certificate could not be found." ),
... ... @@ -82,6 +84,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
82 84 {
83 85 .id = X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE,
84 86 .message = {
  87 + .name = "X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE",
85 88 .type = LIB3270_NOTIFY_SECURE,
86 89 .icon = "dialog-error",
87 90 .summary = N_( "Unable to decrypt certificate's signature" ),
... ... @@ -92,6 +95,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
92 95 {
93 96 .id = X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE,
94 97 .message = {
  98 + .name = "X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE",
95 99 .type = LIB3270_NOTIFY_SECURE,
96 100 .icon = "dialog-error",
97 101 .summary = N_( "Unable to decrypt CRL's signature" ),
... ... @@ -102,6 +106,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
102 106 {
103 107 .id = X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY,
104 108 .message = {
  109 + .name = "X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY",
105 110 .type = LIB3270_NOTIFY_SECURE,
106 111 .icon = "dialog-error",
107 112 .summary = N_( "Unable to decode issuer public key" ),
... ... @@ -112,6 +117,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
112 117 {
113 118 .id = X509_V_ERR_CERT_SIGNATURE_FAILURE,
114 119 .message = {
  120 + .name = "X509_V_ERR_CERT_SIGNATURE_FAILURE",
115 121 .type = LIB3270_NOTIFY_SECURE,
116 122 .icon = "dialog-error",
117 123 .summary = N_( "Certificate signature failure" ),
... ... @@ -122,6 +128,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
122 128 {
123 129 .id = X509_V_ERR_CRL_SIGNATURE_FAILURE,
124 130 .message = {
  131 + .name = "X509_V_ERR_CRL_SIGNATURE_FAILURE",
125 132 .type = LIB3270_NOTIFY_SECURE,
126 133 .icon = "dialog-error",
127 134 .summary = N_( "CRL signature failure" ),
... ... @@ -132,6 +139,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
132 139 {
133 140 .id = X509_V_ERR_CERT_NOT_YET_VALID,
134 141 .message = {
  142 + .name = "X509_V_ERR_CERT_NOT_YET_VALID",
135 143 .type = LIB3270_NOTIFY_WARNING,
136 144 .icon = "security-medium",
137 145 .summary = N_( "Certificate is not yet valid" ),
... ... @@ -142,6 +150,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
142 150 {
143 151 .id = X509_V_ERR_CERT_HAS_EXPIRED,
144 152 .message = {
  153 + .name = "X509_V_ERR_CERT_HAS_EXPIRED",
145 154 .type = LIB3270_NOTIFY_SECURE,
146 155 .icon = "security-medium",
147 156 .summary = N_( "Certificate has expired" ),
... ... @@ -152,6 +161,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
152 161 {
153 162 .id = X509_V_ERR_CRL_NOT_YET_VALID,
154 163 .message = {
  164 + .name = "X509_V_ERR_CRL_NOT_YET_VALID",
155 165 .type = LIB3270_NOTIFY_WARNING,
156 166 .icon = "security-medium",
157 167 .summary = N_( "The CRL is not yet valid." ),
... ... @@ -162,6 +172,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
162 172 {
163 173 .id = X509_V_ERR_CRL_HAS_EXPIRED,
164 174 .message = {
  175 + .name = "X509_V_ERR_CRL_HAS_EXPIRED",
165 176 #ifdef SSL_ENABLE_CRL_EXPIRATION_CHECK
166 177 .type = LIB3270_NOTIFY_SECURE,
167 178 #else
... ... @@ -176,6 +187,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
176 187 {
177 188 .id = X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD,
178 189 .message = {
  190 + .name = "X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD",
179 191 .type = LIB3270_NOTIFY_SECURE,
180 192 .icon = "dialog-error",
181 193 .summary = N_( "Format error in certificate's notBefore field" ),
... ... @@ -186,6 +198,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
186 198 {
187 199 .id = X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD,
188 200 .message = {
  201 + .name = "X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD",
189 202 .type = LIB3270_NOTIFY_SECURE,
190 203 .icon = "dialog-error",
191 204 .summary = N_( "Format error in certificate's notAfter field" ),
... ... @@ -196,6 +209,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
196 209 {
197 210 .id = X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD,
198 211 .message = {
  212 + .name = "X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD",
199 213 .type = LIB3270_NOTIFY_SECURE,
200 214 .icon = "dialog-error",
201 215 .summary = N_( "Format error in CRL's lastUpdate field" ),
... ... @@ -206,6 +220,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
206 220 {
207 221 .id = X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD,
208 222 .message = {
  223 + .name = "X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD",
209 224 .type = LIB3270_NOTIFY_SECURE,
210 225 .icon = "dialog-error",
211 226 .summary = N_( "Format error in CRL's nextUpdate field" ),
... ... @@ -216,6 +231,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
216 231 {
217 232 .id = X509_V_ERR_OUT_OF_MEM,
218 233 .message = {
  234 + .name = "X509_V_ERR_OUT_OF_MEM",
219 235 .type = LIB3270_NOTIFY_ERROR,
220 236 .icon = "dialog-error",
221 237 .summary = N_( "Out of memory" ),
... ... @@ -226,6 +242,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
226 242 {
227 243 .id = X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT,
228 244 .message = {
  245 + .name = "X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT",
229 246 #ifdef SSL_ENABLE_SELF_SIGNED_CERT_CHECK
230 247 .type = LIB3270_NOTIFY_SECURE,
231 248 #else
... ... @@ -233,7 +250,6 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
233 250 #endif // SSL_ENABLE_SELF_SIGNED_CERT_CHECK
234 251 .icon = "security-medium",
235 252 .summary = N_( "Self signed certificate" ),
236   - .name = "X509DepthZeroSelfSignedCert",
237 253 .label = N_( "Continue" ),
238 254 .body = N_( "The passed certificate is self signed and the same certificate cannot be found in the list of trusted certificates." )
239 255 }
... ... @@ -242,12 +258,12 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
242 258 {
243 259 .id = X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN,
244 260 .message = {
  261 + .name = "X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN",
245 262 #ifdef SSL_ENABLE_SELF_SIGNED_CERT_CHECK
246 263 .type = LIB3270_NOTIFY_SECURE,
247 264 #else
248 265 .type = LIB3270_NOTIFY_INFO,
249 266 #endif // SSL_ENABLE_SELF_SIGNED_CERT_CHECK
250   - .name = "SelfSignedCertInChain",
251 267 .icon = "security-low",
252 268 .label = N_("Continue"),
253 269 .summary = N_( "Self signed certificate in certificate chain" ),
... ... @@ -258,6 +274,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
258 274 {
259 275 .id = X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY,
260 276 .message = {
  277 + .name = "X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY",
261 278 .type = LIB3270_NOTIFY_WARNING,
262 279 .icon = "security-low",
263 280 .summary = N_( "Unable to get local issuer certificate" ),
... ... @@ -268,6 +285,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
268 285 {
269 286 .id = X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE,
270 287 .message = {
  288 + .name = "X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE",
271 289 .type = LIB3270_NOTIFY_SECURE,
272 290 .icon = "security-low",
273 291 .summary = N_( "Unable to verify the first certificate" ),
... ... @@ -278,6 +296,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
278 296 {
279 297 .id = X509_V_ERR_CERT_REVOKED,
280 298 .message = {
  299 + .name = "X509_V_ERR_CERT_REVOKED",
281 300 .type = LIB3270_NOTIFY_SECURE,
282 301 .icon = "security-low",
283 302 .summary = N_( "Certificate revoked" ),
... ... @@ -288,6 +307,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
288 307 {
289 308 .id = X509_V_ERR_INVALID_CA,
290 309 .message = {
  310 + .name = "X509_V_ERR_INVALID_CA",
291 311 .type = LIB3270_NOTIFY_SECURE,
292 312 .icon = "security-low",
293 313 .summary = N_( "Invalid CA certificate" ),
... ... @@ -298,6 +318,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
298 318 {
299 319 .id = X509_V_ERR_PATH_LENGTH_EXCEEDED,
300 320 .message = {
  321 + .name = "X509_V_ERR_PATH_LENGTH_EXCEEDED",
301 322 .type = LIB3270_NOTIFY_SECURE,
302 323 .icon = "dialog-error",
303 324 .summary = N_( "Path length constraint exceeded" ),
... ... @@ -308,6 +329,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
308 329 {
309 330 .id = X509_V_ERR_INVALID_PURPOSE,
310 331 .message = {
  332 + .name = "X509_V_ERR_INVALID_PURPOSE",
311 333 .type = LIB3270_NOTIFY_SECURE,
312 334 .icon = "dialog-error",
313 335 .summary = N_( "Unsupported certificate purpose" ),
... ... @@ -318,6 +340,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
318 340 {
319 341 .id = X509_V_ERR_CERT_UNTRUSTED,
320 342 .message = {
  343 + .name = "X509_V_ERR_CERT_UNTRUSTED",
321 344 .type = LIB3270_NOTIFY_WARNING,
322 345 .icon = "security-low",
323 346 .summary = N_( "Certificate not trusted" ),
... ... @@ -328,6 +351,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
328 351 {
329 352 .id = X509_V_ERR_CERT_REJECTED,
330 353 .message = {
  354 + .name = "X509_V_ERR_CERT_REJECTED",
331 355 .type = LIB3270_NOTIFY_SECURE,
332 356 .icon = "security-low",
333 357 .summary = N_( "Certificate rejected" ),
... ... @@ -338,6 +362,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
338 362 {
339 363 .id = X509_V_ERR_SUBJECT_ISSUER_MISMATCH,
340 364 .message = {
  365 + .name = "X509_V_ERR_SUBJECT_ISSUER_MISMATCH",
341 366 .type = LIB3270_NOTIFY_SECURE,
342 367 .icon = "security-low",
343 368 .summary = N_( "Subject issuer mismatch" ),
... ... @@ -348,6 +373,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
348 373 {
349 374 .id = X509_V_ERR_AKID_SKID_MISMATCH,
350 375 .message = {
  376 + .name = "X509_V_ERR_AKID_SKID_MISMATCH",
351 377 .type = LIB3270_NOTIFY_SECURE,
352 378 .icon = "dialog-error",
353 379 .summary = N_( "Authority and subject key identifier mismatch" ),
... ... @@ -358,6 +384,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
358 384 {
359 385 .id = X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH,
360 386 .message = {
  387 + .name = "X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH",
361 388 .type = LIB3270_NOTIFY_SECURE,
362 389 .icon = "dialog-error",
363 390 .summary = N_( "Authority and issuer serial number mismatch" ),
... ... @@ -368,6 +395,7 @@ const LIB3270_SSL_MESSAGE * lib3270_openssl_message_from_id(long id) {
368 395 {
369 396 .id = X509_V_ERR_KEYUSAGE_NO_CERTSIGN,
370 397 .message = {
  398 + .name = "X509_V_ERR_KEYUSAGE_NO_CERTSIGN",
371 399 .type = LIB3270_NOTIFY_SECURE,
372 400 .icon = "dialog-error",
373 401 .summary = N_( "Key usage does not include certificate signing" ),
... ...