{
if (tls!=(TLSTYP *)0) {
tls->peerip=rou_freestr(tls->peerip);
+ tls->peername=rou_freestr(tls->peername);
tls->locip=rou_freestr(tls->locip);
tls->locport=rou_freestr(tls->locport);
if (tls->ssl!=(SSL *)0) {
(void) strcpy(serv,"peer-Unknown");
}
tls->peerip=strdup(host);
+ mode=NI_NAMEREQD|NI_NUMERICSERV;
+ status=getnameinfo(&connip,taille,host,sizeof(host),serv,sizeof(serv),mode);
+ if (status!=0)
+ (void) strcpy(host,"Unknown");
+ tls->peername=strdup(host);
}
break;
default : //SAFE Guard
verif=SSL_get_verify_result(tls->ssl);
switch (verif) {
case X509_V_OK :
- (void) rou_alert(0,"Peer [%s], %s; Remote certificate is verified",
- tls->peerip,cn);
+ (void) rou_alert(0,"Peer is [%s]/%s",tls->peerip,tls->peername);
+ (void) rou_alert(0,"%s; Remote certificate is verified",cn);
break;
default :
(void) rou_alert(0,"%s Remote certificate status='%d'",OPEP,verif);
BIO *bio; //SSL Basic IO
int handle; //device handle
char *peerip; //Remote IP number
+ char *peername; //Remote reverse address
char *locip; //Local IP number
char *locport; //local Port number
SSL_CTX *ctx; //SSL context