[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] Log certificate lifetime on failure.
Update of /home/or/cvsroot/src/common
In directory moria.mit.edu:/tmp/cvs-serv31311/src/common
Modified Files:
tortls.c
Log Message:
Log certificate lifetime on failure.
Index: tortls.c
===================================================================
RCS file: /home/or/cvsroot/src/common/tortls.c,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -d -r1.60 -r1.61
--- tortls.c 21 Jul 2004 03:32:56 -0000 1.60
+++ tortls.c 21 Jul 2004 17:59:24 -0000 1.61
@@ -601,6 +601,45 @@
return -1;
}
+static void log_cert_lifetime(X509 *cert, const char *problem)
+{
+ BIO *bio = NULL;
+ BUF_MEM *buf;
+ char *s1=NULL, *s2=NULL;
+
+ if (problem)
+ log_fn(LOG_WARN,"Certificate %s: is your system clock set incorrectly?",
+ problem);
+
+ if (!(bio = BIO_new(BIO_s_mem()))) {
+ log_fn(LOG_WARN, "Couldn't allocate BIO!"); goto end;
+ }
+ if (!(ASN1_TIME_print(bio, X509_get_notBefore(cert)))) {
+ tls_log_errors(LOG_WARN, "printing certificate lifetime");
+ goto end;
+ }
+ BIO_get_mem_ptr(bio, &buf);
+ s1 = tor_strndup(buf->data, buf->length);
+
+ BIO_reset(bio);
+ if (!(ASN1_TIME_print(bio, X509_get_notAfter(cert)))) {
+ tls_log_errors(LOG_WARN, "printing certificate lifetime");
+ goto end;
+ }
+ BIO_get_mem_ptr(bio, &buf);
+ s2 = tor_strndup(buf->data, buf->length);
+
+ log_fn(LOG_WARN, " (certificate lifetime runs from %s through %s)",s1,s2);
+
+ end:
+ if (bio)
+ BIO_free(bio);
+ if (s1)
+ tor_free(s1);
+ if (s2)
+ tor_free(s2);
+}
+
/** If the provided tls connection is authenticated and has a
* certificate that is currently valid and signed, then set
* *<b>identity_key</b> to the identity certificate's key and return
@@ -640,12 +679,12 @@
now = time(NULL);
t = now + CERT_ALLOW_SKEW;
if (X509_cmp_time(X509_get_notBefore(cert), &t) > 0) {
- log_fn(LOG_WARN,"Certificate becomes valid in the future: is your system clock set incorrectly?");
+ log_cert_lifetime(cert, "not yet valid");
goto done;
}
t = now - CERT_ALLOW_SKEW;
if (X509_cmp_time(X509_get_notAfter(cert), &t) < 0) {
- log_fn(LOG_WARN,"Certificate already expired; is your system clock set incorrectly?");
+ log_cert_lifetime(cert, "already expired");
goto done;
}