aboutsummaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorDaniel Stenberg <daniel@haxx.se>2004-07-04 21:42:32 +0000
committerDaniel Stenberg <daniel@haxx.se>2004-07-04 21:42:32 +0000
commit4511f7ac5066350c5aa8f590871758bd867f93e8 (patch)
tree9177e2a7356f373023d0abeac7048176e9200986 /lib
parentb9f76f11bb7f3448a287a4907d3eee2964290964 (diff)
SSL_get_verify_result() returns a long, so we receive the result in a long
and not an int.
Diffstat (limited to 'lib')
-rw-r--r--lib/ssluse.c13
1 files changed, 8 insertions, 5 deletions
diff --git a/lib/ssluse.c b/lib/ssluse.c
index 7f568bb99..0a65dc32e 100644
--- a/lib/ssluse.c
+++ b/lib/ssluse.c
@@ -1078,6 +1078,7 @@ Curl_SSLConnect(struct connectdata *conn,
#ifdef USE_SSLEAY
struct SessionHandle *data = conn->data;
int err;
+ long lerr;
int what;
char * str;
SSL_METHOD *req_method;
@@ -1440,18 +1441,20 @@ Curl_SSLConnect(struct connectdata *conn,
/* We could do all sorts of certificate verification stuff here before
deallocating the certificate. */
- err = data->set.ssl.certverifyresult=SSL_get_verify_result(connssl->handle);
+ lerr = data->set.ssl.certverifyresult=
+ SSL_get_verify_result(connssl->handle);
if(data->set.ssl.certverifyresult != X509_V_OK) {
if(data->set.ssl.verifypeer) {
/* We probably never reach this, because SSL_connect() will fail
and we return earlyer if verifypeer is set? */
- failf(data, "SSL certificate verify result: %s (%d)",
- X509_verify_cert_error_string(err), err);
+ failf(data, "SSL certificate verify result: %s (%ld)",
+ X509_verify_cert_error_string(lerr), lerr);
retcode = CURLE_SSL_PEER_CERTIFICATE;
}
else
- infof(data, "SSL certificate verify result: %s (%d), continuing anyway.\n",
- X509_verify_cert_error_string(err), err);
+ infof(data, "SSL certificate verify result: %s (%ld),"
+ " continuing anyway.\n",
+ X509_verify_cert_error_string(err), lerr);
}
else
infof(data, "SSL certificate verify ok.\n");