summaryrefslogtreecommitdiffstats
path: root/ssl
diff options
context:
space:
mode:
authorJacob Champion <jacob.champion@enterprisedb.com>2024-05-06 09:50:11 -0700
committerTomas Mraz <tomas@openssl.org>2024-05-14 15:27:17 +0200
commita401aaf9ed6eb34842cdedfcc35448bdc4174df3 (patch)
tree0df9b272815649729cefb514577b4714b3a10679 /ssl
parentd8dd1dfdf5cf2343f6afd43dad4ce37045218624 (diff)
Add reason codes with the correct offset for two alerts
Fixes #24300. The current values of SSL_R_NO_APPLICATION_PROTOCOL and SSL_R_PSK_IDENTITY_NOT_FOUND don't allow for a correct lookup of the corresponding reason strings. CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24351)
Diffstat (limited to 'ssl')
-rw-r--r--ssl/ssl_err.c4
1 files changed, 4 insertions, 0 deletions
diff --git a/ssl/ssl_err.c b/ssl/ssl_err.c
index ddd0e2a36a..50d78b4769 100644
--- a/ssl/ssl_err.c
+++ b/ssl/ssl_err.c
@@ -500,6 +500,8 @@ static const ERR_STRING_DATA SSL_str_reasons[] = {
"tlsv1 alert insufficient security"},
{ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_INTERNAL_ERROR),
"tlsv1 alert internal error"},
+ {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_NO_APPLICATION_PROTOCOL),
+ "tlsv1 alert no application protocol"},
{ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_NO_RENEGOTIATION),
"tlsv1 alert no renegotiation"},
{ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_PROTOCOL_VERSION),
@@ -508,6 +510,8 @@ static const ERR_STRING_DATA SSL_str_reasons[] = {
"tlsv1 alert record overflow"},
{ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_UNKNOWN_CA),
"tlsv1 alert unknown ca"},
+ {ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_UNKNOWN_PSK_IDENTITY),
+ "tlsv1 alert unknown psk identity"},
{ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_ALERT_USER_CANCELLED),
"tlsv1 alert user cancelled"},
{ERR_PACK(ERR_LIB_SSL, 0, SSL_R_TLSV1_BAD_CERTIFICATE_HASH_VALUE),