aboutsummaryrefslogtreecommitdiffstats
path: root/sm/certcheck.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2005-03-17 19:10:37 +0000
committerWerner Koch <[email protected]>2005-03-17 19:10:37 +0000
commitfde76a2cf83eab4e0a229cfcffb12e467ff564e8 (patch)
tree0a9de741330942cd917034a97b502f7386a34939 /sm/certcheck.c
parentFixed description for dirmngr:honor-http-proxy (diff)
downloadgnupg-fde76a2cf83eab4e0a229cfcffb12e467ff564e8.tar.gz
gnupg-fde76a2cf83eab4e0a229cfcffb12e467ff564e8.zip
* certcheck.c: Fixed use of DBG_CRYPTO and DBG_X509.
* certchain.c (gpgsm_basic_cert_check): Dump certificates after a failed gcry_pk_verify. (find_up): Do an external lookup also for an authorityKeyIdentifier lookup. Factored external lookup code out to .. (find_up_external): .. new.
Diffstat (limited to 'sm/certcheck.c')
-rw-r--r--sm/certcheck.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/sm/certcheck.c b/sm/certcheck.c
index 4f667cbbe..611d3219c 100644
--- a/sm/certcheck.c
+++ b/sm/certcheck.c
@@ -101,7 +101,7 @@ do_encode_md (gcry_md_hd_t md, int algo, int pkalgo, unsigned int nbits,
memcpy ( frame+n, gcry_md_read(md, algo), len ); n += len;
assert ( n == nframe );
}
- if (DBG_X509)
+ if (DBG_CRYPTO)
{
int j;
log_debug ("encoded hash:");
@@ -196,7 +196,7 @@ gpgsm_check_cert_sig (ksba_cert_t issuer_cert, ksba_cert_t cert)
ksba_free (p);
return gpg_error (GPG_ERR_BUG);
}
- if (DBG_X509)
+ if (DBG_CRYPTO)
{
int j;
log_debug ("signature value:");
@@ -251,7 +251,7 @@ gpgsm_check_cert_sig (ksba_cert_t issuer_cert, ksba_cert_t cert)
rc = gcry_pk_verify (s_sig, s_hash, s_pkey);
- if (DBG_CRYPTO)
+ if (DBG_X509)
log_debug ("gcry_pk_verify: %s\n", gpg_strerror (rc));
gcry_md_close (md);
gcry_sexp_release (s_sig);
@@ -294,7 +294,7 @@ gpgsm_check_cms_signature (ksba_cert_t cert, ksba_const_sexp_t sigval,
gcry_sexp_release (s_sig);
return gpg_error (GPG_ERR_BUG);
}
- if (DBG_X509)
+ if (DBG_CRYPTO)
log_printhex ("public key: ", p, n);
rc = gcry_sexp_sscan ( &s_pkey, NULL, p, n);
@@ -321,7 +321,7 @@ gpgsm_check_cms_signature (ksba_cert_t cert, ksba_const_sexp_t sigval,
gcry_mpi_release (frame);
rc = gcry_pk_verify (s_sig, s_hash, s_pkey);
- if (DBG_CRYPTO)
+ if (DBG_X509)
log_debug ("gcry_pk_verify: %s\n", gpg_strerror (rc));
gcry_sexp_release (s_sig);
gcry_sexp_release (s_hash);