aboutsummaryrefslogtreecommitdiffstats
path: root/common/rfb/CSecurityTLS.cxx
diff options
context:
space:
mode:
authorPierre Ossman <ossman@cendio.se>2024-11-22 14:27:02 +0100
committerPierre Ossman <ossman@cendio.se>2024-11-22 14:27:02 +0100
commit895b751c92775f7610869a205d58a0a7c98632e0 (patch)
treea2182b8a5ddee92e0d649968e50842572072addf /common/rfb/CSecurityTLS.cxx
parent9366d8e54c5ee1c2cfcf333a17b7fd4bdbd13993 (diff)
downloadtigervnc-895b751c92775f7610869a205d58a0a7c98632e0.tar.gz
tigervnc-895b751c92775f7610869a205d58a0a7c98632e0.zip
Capitalize some more logging and exceptions
Diffstat (limited to 'common/rfb/CSecurityTLS.cxx')
-rw-r--r--common/rfb/CSecurityTLS.cxx6
1 files changed, 3 insertions, 3 deletions
diff --git a/common/rfb/CSecurityTLS.cxx b/common/rfb/CSecurityTLS.cxx
index 9072ce50..bb7e3879 100644
--- a/common/rfb/CSecurityTLS.cxx
+++ b/common/rfb/CSecurityTLS.cxx
@@ -312,12 +312,12 @@ void CSecurityTLS::checkSession()
return;
if (gnutls_certificate_type_get(session) != GNUTLS_CRT_X509)
- throw protocol_error("unsupported certificate type");
+ throw protocol_error("Unsupported certificate type");
err = gnutls_certificate_verify_peers2(session, &status);
if (err != 0) {
vlog.error("Server certificate verification failed: %s", gnutls_strerror(err));
- throw rdr::tls_error("server certificate verification()", err);
+ throw rdr::tls_error("Server certificate verification()", err);
}
if (status != 0) {
@@ -360,7 +360,7 @@ void CSecurityTLS::checkSession()
cert_list = gnutls_certificate_get_peers(session, &cert_list_size);
if (!cert_list_size)
- throw protocol_error("empty certificate chain");
+ throw protocol_error("Empty certificate chain");
/* Process only server's certificate, not issuer's certificate */
gnutls_x509_crt_t crt;