Update of /cvsroot/pgsqlclient/pgsqlclient_10/Mono.Security.Protocol.Tls/Mono.Security.Protocol.Tls/Mono.Security.Protocol.Tls.Alerts
In directory sc8-pr-cvs1:/tmp/cvs-serv1337
Modified Files:
TlsAlert.cs
Log Message:
2003-11-13 Carlos Guzmán Álvarez <car...@te...>
* Mono.Security.Protocol.Tls/TlsSessionContext.cs:
- Renamed to TlsContext.
2003-11-12 Carlos Guzmán Álvarez <car...@te...>
* Mono.Security.Protocol.Tls.Alerts/TlsAlert.cs:
- Changes for give full error message only in debug mode ( Thanks to Sebastién Pouliot. )
* Mono.Security.Protocol.Tls/TlsProtocol.cs:
- Renamed to SecurityProtocolType.cs ( for match .NET 1.2 )
* Mono.Security.Cryptography/MD5SHA1CryptoServiceProvider.cs:
- Renamed to MD5SHA1.cs ( Thanks to Sebastién Pouliot. )
* Mono.Security.Cryptography/TlsCompressionMethod.cs:
- Renamed to SecurityCompressionType.
* Mono.Security.Protocol.Tls/CipherAlgorithmType.cs:
* Mono.Security.Protocol.Tls/HashAlgorithmType.cs:
* Mono.Security.Protocol.Tls/ExchangeAlgorithmType.cs:
- New enumerations that matches .NET 1.2 definitions with some minor differences.
* Mono.Security.Protocol.Tls/CipherSuite.cs:
* Mono.Security.Protocol.Tls/TlsCipherSuite.cs:
* Mono.Security.Protocol.Tls/TlsSslCipherSuite.cs:
* Mono.Security.Protocol.Tls/TlsSessionContext.cs:
- Added changes for make use of new enumerations.
* Mono.Security.Protocol.Tls/TlsClientStream.cs:
- Added new informative properties that matches .NET 1.2 SslClientStream
( Not all the properties are implemented yet ).
Index: TlsAlert.cs
===================================================================
RCS file: /cvsroot/pgsqlclient/pgsqlclient_10/Mono.Security.Protocol.Tls/Mono.Security.Protocol.Tls/Mono.Security.Protocol.Tls.Alerts/TlsAlert.cs,v
retrieving revision 1.3
retrieving revision 1.4
diff -C2 -d -r1.3 -r1.4
*** TlsAlert.cs 10 Nov 2003 12:16:03 -0000 1.3
--- TlsAlert.cs 13 Nov 2003 09:23:17 -0000 1.4
***************
*** 119,122 ****
--- 119,123 ----
internal static string GetAlertMessage(TlsAlertDescription description)
{
+ #if (DEBUG)
switch (description)
{
***************
*** 193,196 ****
--- 194,273 ----
return "";
}
+ #else
+ switch (description)
+ {
+ case TlsAlertDescription.AccessDenied:
+ return "Invalid message.";
+
+ case TlsAlertDescription.BadCertificate:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.BadRecordMAC:
+ return "Cryptographic failiure.";
+
+ case TlsAlertDescription.CertificateExpired:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.CertificateRevoked:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.CertificateUnknown:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.CloseNotify:
+ return "Connection closed.";
+
+ case TlsAlertDescription.DecodeError:
+ return "Invalid message.";
+
+ case TlsAlertDescription.DecompressionFailiure:
+ return "Compression error.";
+
+ case TlsAlertDescription.DecryptError:
+ return "Cryptographic failiure.";
+
+ case TlsAlertDescription.DecryptionFailed:
+ return "Cryptographic failiure.";
+
+ case TlsAlertDescription.ExportRestriction:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.HandshakeFailiure:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.IlegalParameter:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.InsuficientSecurity:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.InternalError:
+ return "Fatal failiure.";
+
+ case TlsAlertDescription.NoRenegotiation:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.ProtocolVersion:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.RecordOverflow:
+ return "Incorrect message.";
+
+ case TlsAlertDescription.UnexpectedMessage:
+ return "Incorrect message.";
+
+ case TlsAlertDescription.UnknownCA:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.UnsupportedCertificate:
+ return "Handshake failiure.";
+
+ case TlsAlertDescription.UserCancelled:
+ return "Handshake cancelled by user.";
+
+ default:
+ return "";
+ }
+ #endif
}
|