aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorsfan5 <sfan5@live.de>2024-05-13 20:22:44 +0200
committerAnton Khirnov <anton@khirnov.net>2024-06-11 16:35:31 +0200
commit63b6620ad3cd36710907f17384c75f5497de246b (patch)
tree992b41ea350e95f7949372364010287b542afde2
parentb6f37ffba71fa26b6176eb964cadcb442a115a54 (diff)
downloadffmpeg-63b6620ad3cd36710907f17384c75f5497de246b.tar.gz
lavf/tls_mbedtls: handle more error codes for human-readable messages
Signed-off-by: Anton Khirnov <anton@khirnov.net>
-rw-r--r--libavformat/tls_mbedtls.c9
1 files changed, 9 insertions, 0 deletions
diff --git a/libavformat/tls_mbedtls.c b/libavformat/tls_mbedtls.c
index 1a182e735e..02f08fddbb 100644
--- a/libavformat/tls_mbedtls.c
+++ b/libavformat/tls_mbedtls.c
@@ -138,6 +138,9 @@ static void handle_handshake_error(URLContext *h, int ret)
case MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE:
av_log(h, AV_LOG_ERROR, "TLS handshake failed.\n");
break;
+ case MBEDTLS_ERR_SSL_BAD_PROTOCOL_VERSION:
+ av_log(h, AV_LOG_ERROR, "TLS protocol version mismatch.\n");
+ break;
#endif
case MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE:
av_log(h, AV_LOG_ERROR, "A fatal alert message was received from the peer, has the peer a correct certificate?\n");
@@ -145,9 +148,15 @@ static void handle_handshake_error(URLContext *h, int ret)
case MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED:
av_log(h, AV_LOG_ERROR, "No CA chain is set, but required to operate. Was the CA correctly set?\n");
break;
+ case MBEDTLS_ERR_SSL_INTERNAL_ERROR:
+ av_log(h, AV_LOG_ERROR, "Internal error encountered.\n");
+ break;
case MBEDTLS_ERR_NET_CONN_RESET:
av_log(h, AV_LOG_ERROR, "TLS handshake was aborted by peer.\n");
break;
+ case MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:
+ av_log(h, AV_LOG_ERROR, "Certificate verification failed.\n");
+ break;
default:
av_log(h, AV_LOG_ERROR, "mbedtls_ssl_handshake returned -0x%x\n", -ret);
break;