aboutsummaryrefslogtreecommitdiff
path: root/rpkid/rpki/https.py
diff options
context:
space:
mode:
authorRob Austein <sra@hactrn.net>2008-04-25 06:45:10 +0000
committerRob Austein <sra@hactrn.net>2008-04-25 06:45:10 +0000
commitaac95769f39e37f89ca4b304d76dc514822a7271 (patch)
treea131f06614dea05d3c7193730e25fb43ff7e5654 /rpkid/rpki/https.py
parentf4d16327a6048cf932b53e40247df0b820e2dccf (diff)
New trust anchor model sort of working. make test runs again, anyway.
svn path=/docs/left-right-xml; revision=1704
Diffstat (limited to 'rpkid/rpki/https.py')
-rw-r--r--rpkid/rpki/https.py8
1 files changed, 5 insertions, 3 deletions
diff --git a/rpkid/rpki/https.py b/rpkid/rpki/https.py
index b5338f5d..2e70455b 100644
--- a/rpkid/rpki/https.py
+++ b/rpkid/rpki/https.py
@@ -60,7 +60,7 @@ class Checker(tlslite.api.Checker):
for x in trust_anchor:
if debug_tls_certs:
- rpki.log.debug("HTTPS trusted cert %s" % x.getSubject())
+ rpki.log.debug("HTTPS trusted cert issuer %s subject %s" % (x.getIssuer(), x.getSubject()))
self.x509store.addTrust(x.get_POW())
def x509store_thunk(self):
@@ -83,7 +83,7 @@ class Checker(tlslite.api.Checker):
if debug_tls_certs:
for i in range(len(chain)):
- rpki.log.debug("Received %s TLS cert[%d] %s" % (peer, i, chain[i].getSubject()))
+ rpki.log.debug("Received %s TLS cert[%d] issuer %s subject %s" % (peer, i, chain[i].getIssuer(), chain[i].getSubject()))
if not self.x509store_thunk().verifyChain(chain[0].get_POW(), [x.get_POW() for x in chain[1:]]):
if disable_tls_certificate_validation_exceptions:
@@ -123,9 +123,11 @@ def client(msg, client_key, client_cert, server_ta, url, timeout = 300):
u.query == "" and \
u.fragment == ""
+ rpki.log.debug("Contacting URL %s" % url)
+
if debug_tls_certs:
for cert in (client_cert,) if isinstance(client_cert, rpki.x509.X509) else client_cert:
- rpki.log.debug("Sending client TLS cert %s" % cert.getSubject())
+ rpki.log.debug("Sending client TLS cert issuer %s subject %s" % (cert.getIssuer(), cert.getSubject()))
# We could add a "settings = foo" argument to the following call to
# pass in a tlslite.HandshakeSettings object that would let us