diff options
author | Pierre Ossman <ossman@cendio.se> | 2024-11-22 14:27:02 +0100 |
---|---|---|
committer | Pierre Ossman <ossman@cendio.se> | 2024-11-22 14:27:02 +0100 |
commit | 895b751c92775f7610869a205d58a0a7c98632e0 (patch) | |
tree | a2182b8a5ddee92e0d649968e50842572072addf /common/rfb/CSecurityTLS.cxx | |
parent | 9366d8e54c5ee1c2cfcf333a17b7fd4bdbd13993 (diff) | |
download | tigervnc-895b751c92775f7610869a205d58a0a7c98632e0.tar.gz tigervnc-895b751c92775f7610869a205d58a0a7c98632e0.zip |
Capitalize some more logging and exceptions
Diffstat (limited to 'common/rfb/CSecurityTLS.cxx')
-rw-r--r-- | common/rfb/CSecurityTLS.cxx | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/common/rfb/CSecurityTLS.cxx b/common/rfb/CSecurityTLS.cxx index 9072ce50..bb7e3879 100644 --- a/common/rfb/CSecurityTLS.cxx +++ b/common/rfb/CSecurityTLS.cxx @@ -312,12 +312,12 @@ void CSecurityTLS::checkSession() return; if (gnutls_certificate_type_get(session) != GNUTLS_CRT_X509) - throw protocol_error("unsupported certificate type"); + throw protocol_error("Unsupported certificate type"); err = gnutls_certificate_verify_peers2(session, &status); if (err != 0) { vlog.error("Server certificate verification failed: %s", gnutls_strerror(err)); - throw rdr::tls_error("server certificate verification()", err); + throw rdr::tls_error("Server certificate verification()", err); } if (status != 0) { @@ -360,7 +360,7 @@ void CSecurityTLS::checkSession() cert_list = gnutls_certificate_get_peers(session, &cert_list_size); if (!cert_list_size) - throw protocol_error("empty certificate chain"); + throw protocol_error("Empty certificate chain"); /* Process only server's certificate, not issuer's certificate */ gnutls_x509_crt_t crt; |