[erlang-bugs] possible bug in ssl and/or public_key module (R13 and R14)
Ingela Anderton Andin
ingela@REDACTED
Fri Sep 24 09:59:24 CEST 2010
Hi!
Filipe David Manana wrote:
> Regarding the suggestion:
>
>
>> 3) For the verify function, it receives {bad_cert, unknown_ca} when a certificate is self-signed? I would like to distinguish between unknown CAs and >self-signed certificates (certificate signed by the target host).
>>
>
>
>>> I think you have a point here we will look in to this.
>>>
>
> Is there any standard (more formal) procedure to submit the suggestion
> to the OTP team, or posting to this mailing list is enough?
>
> cheers
>
This depends on the type of change you are suggesting. In this case it
is a small fairly uncontroversial change that we have already decided
to adopt
as it is in line with what the old ssl-implementation does. So no need to
be more formal and write an EEP - http://www.erlang.org/eep.html
It is actually already implemented in the branch
ia/ssl-and-public_key/backwards-compatibility/OTP-8858
<http://github.com/IngelaAndin/otp/tree/ia%2Fssl-and-public_key%2Fbackwards-compatibility%2FOTP-8858>
as the old iplementation does distinguish between the two cases.
You can now get {bad_cert, selfsigned_peer} as well as {bad_cert,
unknown_ca}.
Regards Ingela Erlang/OTP team - Ericsson AB
More information about the erlang-bugs
mailing list