From 4511f7ac5066350c5aa8f590871758bd867f93e8 Mon Sep 17 00:00:00 2001 From: Daniel Stenberg Date: Sun, 4 Jul 2004 21:42:32 +0000 Subject: SSL_get_verify_result() returns a long, so we receive the result in a long and not an int. --- lib/ssluse.c | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/lib/ssluse.c b/lib/ssluse.c index 7f568bb99..0a65dc32e 100644 --- a/lib/ssluse.c +++ b/lib/ssluse.c @@ -1078,6 +1078,7 @@ Curl_SSLConnect(struct connectdata *conn, #ifdef USE_SSLEAY struct SessionHandle *data = conn->data; int err; + long lerr; int what; char * str; SSL_METHOD *req_method; @@ -1440,18 +1441,20 @@ Curl_SSLConnect(struct connectdata *conn, /* We could do all sorts of certificate verification stuff here before deallocating the certificate. */ - err = data->set.ssl.certverifyresult=SSL_get_verify_result(connssl->handle); + lerr = data->set.ssl.certverifyresult= + SSL_get_verify_result(connssl->handle); if(data->set.ssl.certverifyresult != X509_V_OK) { if(data->set.ssl.verifypeer) { /* We probably never reach this, because SSL_connect() will fail and we return earlyer if verifypeer is set? */ - failf(data, "SSL certificate verify result: %s (%d)", - X509_verify_cert_error_string(err), err); + failf(data, "SSL certificate verify result: %s (%ld)", + X509_verify_cert_error_string(lerr), lerr); retcode = CURLE_SSL_PEER_CERTIFICATE; } else - infof(data, "SSL certificate verify result: %s (%d), continuing anyway.\n", - X509_verify_cert_error_string(err), err); + infof(data, "SSL certificate verify result: %s (%ld)," + " continuing anyway.\n", + X509_verify_cert_error_string(err), lerr); } else infof(data, "SSL certificate verify ok.\n"); -- cgit v1.2.3