diff options
author | tb <> | 2022-06-28 20:46:05 +0000 |
---|---|---|
committer | tb <> | 2022-06-28 20:46:05 +0000 |
commit | 21d5a64f4aa9b1c701405993b9f00f2116882d0b (patch) | |
tree | dd897235c1a3a3ccadfa6fd8c8dde3cf5d62538e /src | |
parent | 62de0d466feaa1f2912c54439a78a4028f743fa2 (diff) | |
download | openbsd-21d5a64f4aa9b1c701405993b9f00f2116882d0b.tar.gz openbsd-21d5a64f4aa9b1c701405993b9f00f2116882d0b.tar.bz2 openbsd-21d5a64f4aa9b1c701405993b9f00f2116882d0b.zip |
Sort error strings
ok beck jsing sthen
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libssl/ssl_err.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libssl/ssl_err.c b/src/lib/libssl/ssl_err.c index d4c9fbbf07..761a3e2302 100644 --- a/src/lib/libssl/ssl_err.c +++ b/src/lib/libssl/ssl_err.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_err.c,v 1.40 2022/02/05 14:54:10 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_err.c,v 1.41 2022/06/28 20:46:05 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -327,6 +327,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
327 | {ERR_REASON(SSL_R_PACKET_LENGTH_TOO_LONG), "packet length too long"}, | 327 | {ERR_REASON(SSL_R_PACKET_LENGTH_TOO_LONG), "packet length too long"}, |
328 | {ERR_REASON(SSL_R_PARSE_TLSEXT) , "parse tlsext"}, | 328 | {ERR_REASON(SSL_R_PARSE_TLSEXT) , "parse tlsext"}, |
329 | {ERR_REASON(SSL_R_PATH_TOO_LONG) , "path too long"}, | 329 | {ERR_REASON(SSL_R_PATH_TOO_LONG) , "path too long"}, |
330 | {ERR_REASON(SSL_R_PEER_BEHAVING_BADLY) , "peer is doing strange or hostile things"}, | ||
330 | {ERR_REASON(SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE), "peer did not return a certificate"}, | 331 | {ERR_REASON(SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE), "peer did not return a certificate"}, |
331 | {ERR_REASON(SSL_R_PEER_ERROR) , "peer error"}, | 332 | {ERR_REASON(SSL_R_PEER_ERROR) , "peer error"}, |
332 | {ERR_REASON(SSL_R_PEER_ERROR_CERTIFICATE), "peer error certificate"}, | 333 | {ERR_REASON(SSL_R_PEER_ERROR_CERTIFICATE), "peer error certificate"}, |
@@ -432,6 +433,7 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
432 | {ERR_REASON(SSL_R_UNEXPECTED_MESSAGE) , "unexpected message"}, | 433 | {ERR_REASON(SSL_R_UNEXPECTED_MESSAGE) , "unexpected message"}, |
433 | {ERR_REASON(SSL_R_UNEXPECTED_RECORD) , "unexpected record"}, | 434 | {ERR_REASON(SSL_R_UNEXPECTED_RECORD) , "unexpected record"}, |
434 | {ERR_REASON(SSL_R_UNINITIALIZED) , "uninitialized"}, | 435 | {ERR_REASON(SSL_R_UNINITIALIZED) , "uninitialized"}, |
436 | {ERR_REASON(SSL_R_UNKNOWN), "unknown failure occurred"}, | ||
435 | {ERR_REASON(SSL_R_UNKNOWN_ALERT_TYPE) , "unknown alert type"}, | 437 | {ERR_REASON(SSL_R_UNKNOWN_ALERT_TYPE) , "unknown alert type"}, |
436 | {ERR_REASON(SSL_R_UNKNOWN_CERTIFICATE_TYPE), "unknown certificate type"}, | 438 | {ERR_REASON(SSL_R_UNKNOWN_CERTIFICATE_TYPE), "unknown certificate type"}, |
437 | {ERR_REASON(SSL_R_UNKNOWN_CIPHER_RETURNED), "unknown cipher returned"}, | 439 | {ERR_REASON(SSL_R_UNKNOWN_CIPHER_RETURNED), "unknown cipher returned"}, |
@@ -464,8 +466,6 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
464 | {ERR_REASON(SSL_R_WRONG_VERSION_NUMBER) , "wrong version number"}, | 466 | {ERR_REASON(SSL_R_WRONG_VERSION_NUMBER) , "wrong version number"}, |
465 | {ERR_REASON(SSL_R_X509_LIB) , "x509 lib"}, | 467 | {ERR_REASON(SSL_R_X509_LIB) , "x509 lib"}, |
466 | {ERR_REASON(SSL_R_X509_VERIFICATION_SETUP_PROBLEMS), "x509 verification setup problems"}, | 468 | {ERR_REASON(SSL_R_X509_VERIFICATION_SETUP_PROBLEMS), "x509 verification setup problems"}, |
467 | {ERR_REASON(SSL_R_PEER_BEHAVING_BADLY), "peer is doing strange or hostile things"}, | ||
468 | {ERR_REASON(SSL_R_UNKNOWN), "unknown failure occurred"}, | ||
469 | {0, NULL} | 469 | {0, NULL} |
470 | }; | 470 | }; |
471 | 471 | ||