version 1.9, 2015/08/22 16:36:05 |
version 1.10, 2015/09/10 06:36:45 |
|
|
s_time_meth = SSLv23_client_method(); |
s_time_meth = SSLv23_client_method(); |
|
|
verify_depth = 0; |
verify_depth = 0; |
verify_error = X509_V_OK; |
|
|
|
memset(&s_time_config, 0, sizeof(s_time_config)); |
memset(&s_time_config, 0, sizeof(s_time_config)); |
|
|
|
|
} |
} |
} |
} |
|
|
|
SSL_CTX_set_verify(tm_ctx, s_time_config.verify, NULL); |
|
|
if (!set_cert_stuff(tm_ctx, s_time_config.certfile, |
if (!set_cert_stuff(tm_ctx, s_time_config.certfile, |
s_time_config.keyfile)) |
s_time_config.keyfile)) |
goto end; |
goto end; |
|
|
struct pollfd pfd[1]; |
struct pollfd pfd[1]; |
SSL *serverCon; |
SSL *serverCon; |
BIO *conn; |
BIO *conn; |
|
long verify_error; |
int i; |
int i; |
|
|
if ((conn = BIO_new(BIO_s_connect())) == NULL) |
if ((conn = BIO_new(BIO_s_connect())) == NULL) |
|
|
} |
} |
if (i <= 0) { |
if (i <= 0) { |
BIO_printf(bio_err, "ERROR\n"); |
BIO_printf(bio_err, "ERROR\n"); |
|
verify_error = SSL_get_verify_result(serverCon); |
if (verify_error != X509_V_OK) |
if (verify_error != X509_V_OK) |
BIO_printf(bio_err, "verify error:%s\n", |
BIO_printf(bio_err, "verify error:%s\n", |
X509_verify_cert_error_string(verify_error)); |
X509_verify_cert_error_string(verify_error)); |