[glib/wip/mjog/accept-certificate-docs] gio: Update error in accept-certificate docs
- From: Michael Gratton <mjog src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [glib/wip/mjog/accept-certificate-docs] gio: Update error in accept-certificate docs
- Date: Tue, 8 Jan 2019 11:35:27 +0000 (UTC)
commit 6ee6e945fb9bc4aa0eb1019ffeb0fbcd25ab860f
Author: Michael Gratton <mike vee net>
Date: Tue Jan 8 22:34:36 2019 +1100
gio: Update error in accept-certificate docs
This makes the documented error returned when the cert is rejected
consistent with both self and reality.
gio/gdtlsconnection.c | 4 ++--
gio/gtlsconnection.c | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
---
diff --git a/gio/gdtlsconnection.c b/gio/gdtlsconnection.c
index 254537198..d621b1eac 100644
--- a/gio/gdtlsconnection.c
+++ b/gio/gdtlsconnection.c
@@ -295,8 +295,8 @@ g_dtls_connection_default_init (GDtlsConnectionInterface *iface)
* let the user decide whether or not to accept the certificate, you
* would have to return %FALSE from the signal handler on the first
* attempt, and then after the connection attempt returns a
- * %G_TLS_ERROR_HANDSHAKE, you can interact with the user, and if
- * the user decides to accept the certificate, remember that fact,
+ * %G_TLS_ERROR_BAD_CERTIFICATE, you can interact with the user, and
+ * if the user decides to accept the certificate, remember that fact,
* create a new connection, and return %TRUE from the signal handler
* the next time.
*
diff --git a/gio/gtlsconnection.c b/gio/gtlsconnection.c
index a1e98c0c9..02a3098c1 100644
--- a/gio/gtlsconnection.c
+++ b/gio/gtlsconnection.c
@@ -323,8 +323,8 @@ g_tls_connection_class_init (GTlsConnectionClass *klass)
* let the user decide whether or not to accept the certificate, you
* would have to return %FALSE from the signal handler on the first
* attempt, and then after the connection attempt returns a
- * %G_TLS_ERROR_HANDSHAKE, you can interact with the user, and if
- * the user decides to accept the certificate, remember that fact,
+ * %G_TLS_ERROR_BAD_CERTIFICATE, you can interact with the user, and
+ * if the user decides to accept the certificate, remember that fact,
* create a new connection, and return %TRUE from the signal handler
* the next time.
*
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]