diff options
author | Werner Koch <[email protected]> | 2005-03-17 19:10:37 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2005-03-17 19:10:37 +0000 |
commit | fde76a2cf83eab4e0a229cfcffb12e467ff564e8 (patch) | |
tree | 0a9de741330942cd917034a97b502f7386a34939 /sm/certcheck.c | |
parent | Fixed description for dirmngr:honor-http-proxy (diff) | |
download | gnupg-fde76a2cf83eab4e0a229cfcffb12e467ff564e8.tar.gz gnupg-fde76a2cf83eab4e0a229cfcffb12e467ff564e8.zip |
* certcheck.c: Fixed use of DBG_CRYPTO and DBG_X509.
* certchain.c (gpgsm_basic_cert_check): Dump certificates after a
failed gcry_pk_verify.
(find_up): Do an external lookup also for an authorityKeyIdentifier
lookup. Factored external lookup code out to ..
(find_up_external): .. new.
Diffstat (limited to 'sm/certcheck.c')
-rw-r--r-- | sm/certcheck.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/sm/certcheck.c b/sm/certcheck.c index 4f667cbbe..611d3219c 100644 --- a/sm/certcheck.c +++ b/sm/certcheck.c @@ -101,7 +101,7 @@ do_encode_md (gcry_md_hd_t md, int algo, int pkalgo, unsigned int nbits, memcpy ( frame+n, gcry_md_read(md, algo), len ); n += len; assert ( n == nframe ); } - if (DBG_X509) + if (DBG_CRYPTO) { int j; log_debug ("encoded hash:"); @@ -196,7 +196,7 @@ gpgsm_check_cert_sig (ksba_cert_t issuer_cert, ksba_cert_t cert) ksba_free (p); return gpg_error (GPG_ERR_BUG); } - if (DBG_X509) + if (DBG_CRYPTO) { int j; log_debug ("signature value:"); @@ -251,7 +251,7 @@ gpgsm_check_cert_sig (ksba_cert_t issuer_cert, ksba_cert_t cert) rc = gcry_pk_verify (s_sig, s_hash, s_pkey); - if (DBG_CRYPTO) + if (DBG_X509) log_debug ("gcry_pk_verify: %s\n", gpg_strerror (rc)); gcry_md_close (md); gcry_sexp_release (s_sig); @@ -294,7 +294,7 @@ gpgsm_check_cms_signature (ksba_cert_t cert, ksba_const_sexp_t sigval, gcry_sexp_release (s_sig); return gpg_error (GPG_ERR_BUG); } - if (DBG_X509) + if (DBG_CRYPTO) log_printhex ("public key: ", p, n); rc = gcry_sexp_sscan ( &s_pkey, NULL, p, n); @@ -321,7 +321,7 @@ gpgsm_check_cms_signature (ksba_cert_t cert, ksba_const_sexp_t sigval, gcry_mpi_release (frame); rc = gcry_pk_verify (s_sig, s_hash, s_pkey); - if (DBG_CRYPTO) + if (DBG_X509) log_debug ("gcry_pk_verify: %s\n", gpg_strerror (rc)); gcry_sexp_release (s_sig); gcry_sexp_release (s_hash); |