]> source.dussan.org Git - tigervnc.git/commitdiff
Don't fail on user CA/CRL problems
authorPierre Ossman <ossman@cendio.se>
Thu, 14 Oct 2021 06:57:08 +0000 (08:57 +0200)
committerPierre Ossman <ossman@cendio.se>
Thu, 14 Oct 2021 10:44:23 +0000 (12:44 +0200)
The certificates might still be fine using the system trust store, or
the user can make an exception. So let's just log and continue on.

This got very common after 960c7d2 where we now always have a default
value for these settings.

(cherry picked from commit 37f3a8b47f0b17ea1c1cacaf5c048a0bada618d3)

common/rfb/CSecurityTLS.cxx

index be70c55939967fe658d8c4da0bbe6db0722c8411..d0af141010db4b20205342016d07476a0e339dd1 100644 (file)
@@ -288,10 +288,10 @@ void CSecurityTLS::setParam()
       vlog.error("Could not load system certificate trust store");
 
     if (*cafile && gnutls_certificate_set_x509_trust_file(cert_cred,cafile,GNUTLS_X509_FMT_PEM) < 0)
-      throw AuthFailureException("load of CA cert failed");
+      vlog.error("Could not load user specified certificate authority");
 
     if (*crlfile && gnutls_certificate_set_x509_crl_file(cert_cred,crlfile,GNUTLS_X509_FMT_PEM) < 0)
-      throw AuthFailureException("load of CRL failed");
+      vlog.error("Could not load user specified certificate revocation list");
 
     if (gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, cert_cred) != GNUTLS_E_SUCCESS)
       throw AuthFailureException("gnutls_credentials_set failed");