snprintf (buf, sizeof (buf), "%s (%d)",
X509_verify_cert_error_string(err), err);
dprint (2, (debugfile, "X509_verify_cert: %s\n", buf));
- dprint (2, (debugfile, " [%s]\n", peercert->name));
}
#endif
X509_STORE_CTX_free (xsc);
static int ssl_cache_trusted_cert (X509 *c)
{
- dprint (1, (debugfile, "trusted: %s\n", c->name));
+ dprint (1, (debugfile, "ssl_cache_trusted_cert: trusted\n"));
if (!SslSessionCerts)
SslSessionCerts = sk_X509_new_null();
return (sk_X509_push (SslSessionCerts, X509_dup(c)));
int i, preauthrc, chain_len;
STACK_OF(X509) *chain;
X509 *cert;
+#ifdef DEBUG
+ char buf[STRING];
+
+ dprint (1, (debugfile, "ssl_check_certificate: checking cert %s\n",
+ X509_NAME_oneline (X509_get_subject_name (data->cert),
+ buf, sizeof (buf))));
+#endif
if ((preauthrc = ssl_check_preauth (data->cert, conn->account.host)) > 0)
return preauthrc;
{
cert = sk_X509_value (chain, i);
+ dprint (1, (debugfile, "ssl_check_certificate: checking cert chain entry %s\n",
+ X509_NAME_oneline (X509_get_subject_name (cert),
+ buf, sizeof (buf))));
+
/* if the certificate validates or is manually accepted, then add it to
* the trusted set and recheck the peer certificate */
if (ssl_check_preauth (cert, NULL)
FILE *fp;
char *name = NULL, *c;
- dprint (2, (debugfile, "interactive_check_cert: %s\n", cert->name));
-
menu->max = 19;
menu->dialog = (char **) safe_calloc (1, menu->max * sizeof (char *));
for (i = 0; i < menu->max; i++)
row++;
name = X509_NAME_oneline (X509_get_subject_name (cert),
buf, sizeof (buf));
- dprint (2, (debugfile, "oneline: %s\n", name));
for (i = 0; i < 5; i++)
{