From: Jean-Marc Pigeon (Delson) Date: Sun, 6 Apr 2025 14:10:36 +0000 (-0400) Subject: Adding localhost certificate X-Git-Tag: tag-0.7~30 X-Git-Url: https://jmp-git.ovh.safe.ca/?a=commitdiff_plain;h=c8fca7c2e7b4345a559c5059e3310869628492b4;p=jmp%2Fmailleur Adding localhost certificate --- diff --git a/Makefile b/Makefile index 1ae11e5..68b1203 100644 --- a/Makefile +++ b/Makefile @@ -70,6 +70,15 @@ dbgfeed : debug $(TESTIP) \ $(TESTPORT) \ $(DATATST)/feed00.tst +#testing TLS connection +testtls : + openssl s_client \ + -CAfile certs/safe_CA.pem \ + -cert certs/localhost_cert.pem \ + -key certs/localhost_key.pem \ + -connect $(TESTIP):$(TESTPORT) \ + -starttls \ + smtp #-------------------------------------------------------------------- #starting email receiver diff --git a/certs/localhost-cert.tar.gz b/certs/localhost-cert.tar.gz new file mode 100644 index 0000000..b5e1a5b Binary files /dev/null and b/certs/localhost-cert.tar.gz differ diff --git a/certs/localhost_cert.pem b/certs/localhost_cert.pem new file mode 100644 index 0000000..12e130d --- /dev/null +++ b/certs/localhost_cert.pem @@ -0,0 +1,147 @@ +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 2a:01:e0:a5:fb:80:80:00:00:00:29 + Signature Algorithm: sha384WithRSAEncryption + Issuer: C=CA, O=SAFE Inc., OU=Digital Certificate Signing, CN=SAFE Midle Ground CA (2024) - SHA384 - 3 + Validity + Not Before: Apr 6 13:59:06 2025 GMT + Not After : Apr 6 13:59:06 2050 GMT + Subject: C=CA, ST=Quebec, L=Montreal, O=SAFE Inc., OU=Mailleur email developpement test, CN=localhost.localdomain + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + Public-Key: (4096 bit) + Modulus: + 00:ba:5f:35:d2:04:d5:f4:da:f0:b1:99:6f:f3:42: + 42:0e:59:8d:7b:6c:24:97:6d:24:df:e8:fa:83:7c: + ae:92:fd:d1:58:1c:14:7e:20:71:5e:44:5a:b0:e8: + 7a:ce:45:33:95:aa:27:ef:52:fe:bd:5a:23:7b:4f: + 8b:24:4d:0b:f7:9c:99:25:b8:b9:af:8c:46:f7:a9: + 6c:18:ff:39:7c:a9:ff:9a:f5:f0:d7:d7:ca:dc:6c: + 5d:c7:09:02:83:87:37:1a:2f:f7:05:b8:39:af:9f: + ab:24:3b:24:48:e6:72:af:36:10:0d:c6:dc:bd:c2: + de:05:4f:4a:fd:d8:5b:35:24:b9:bc:ce:ab:37:3a: + f9:ff:2d:44:c2:33:f2:52:4a:36:5c:5f:80:a7:cd: + f7:1b:6d:55:b7:d6:13:25:72:d5:55:4d:54:ff:a1: + 1e:7d:85:8b:e0:e2:16:d1:d1:22:21:07:99:ad:9a: + 51:25:02:71:7b:56:e5:77:16:07:18:c6:fd:de:c4: + e0:e5:55:01:78:f6:3c:53:ab:35:1d:44:f8:26:af: + c3:11:a2:2d:63:73:29:c5:bd:b4:17:f7:83:7e:0d: + d9:0a:d9:a1:27:f2:7c:bc:ee:95:76:68:ec:c4:7f: + 35:64:44:d4:6d:43:46:99:40:52:cd:b4:c0:11:3a: + d7:ab:7c:cf:87:b5:41:32:a4:23:2d:3f:cc:fa:b2: + 6b:5b:dd:a5:58:14:7a:24:cb:3a:26:04:49:8f:07: + 8b:5b:d0:be:c2:ee:24:de:d1:74:cb:04:48:be:f9: + 74:5a:17:52:1e:0e:c0:ea:02:d1:7a:1e:e7:a2:95: + b4:77:1a:96:6d:34:80:78:85:0f:84:e6:3b:60:27: + 75:5d:33:60:6d:6b:d9:da:b9:af:a9:cf:bc:ae:c3: + 29:ca:a3:1b:4f:3b:7f:fa:ba:d6:01:f0:07:3f:7d: + 00:45:e6:6e:7f:aa:67:ad:90:db:1d:2a:eb:e4:be: + 43:13:5e:2e:dc:de:a1:36:fd:20:90:1f:ac:8c:3c: + c9:0e:32:96:ef:a8:19:1d:30:87:d1:f2:42:c7:55: + e7:46:24:9c:d2:4a:1f:42:01:f7:eb:68:5f:d6:b5: + 9a:3a:e2:51:90:94:59:9d:bc:83:dd:d8:89:e9:34: + af:d6:43:66:8f:87:85:2b:c6:b1:43:b6:09:92:ba: + f4:e3:d6:3b:c1:5b:2d:76:cd:56:ac:7f:bb:fb:60: + 30:a5:13:76:73:35:5e:67:df:dd:c5:fe:ab:e5:4f: + dd:80:56:19:a6:e0:d8:53:b2:20:5c:5c:34:2f:a1: + 31:0b:12:27:71:b6:ea:5b:2e:fa:a3:88:2f:f7:24: + 5b:93:0d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Key Usage: critical + Digital Signature, Key Encipherment + Authority Information Access: + CA Issuers - URI:http://certificates.safe.ca/cacert/safeMDL.pem + OCSP - URI:http://certificates/safe.ca/chkcertstats + X509v3 Certificate Policies: + Policy: 1.3.6.1.4.1.7438.1.2 + CPS: http://certificates.safe.ca/policies + Policy: 2.23.140.1.1 + X509v3 Basic Constraints: + CA:FALSE + X509v3 CRL Distribution Points: + Full Name: + URI:http://certificates.safe.ca/repository/revoklist.pem + X509v3 Subject Alternative Name: + DNS:localhost.localdomain, IP Address:127.127.0.1 + X509v3 Extended Key Usage: + TLS Web Server Authentication, TLS Web Client Authentication, E-mail Protection + X509v3 Subject Key Identifier: + 2D:BD:65:E1:4E:2B:7D:E0:80:3E:D2:66:6E:ED:81:87:4A:52:CD:6C + X509v3 Authority Key Identifier: + 9C:BE:0B:C0:22:76:F5:CF:BC:FD:78:9A:92:77:20:FE:BF:96:1E:D8 + Signature Algorithm: sha384WithRSAEncryption + Signature Value: + ac:e8:1e:50:ec:0e:b8:02:c6:ac:70:19:ee:37:7f:53:24:69: + cc:ca:6e:34:6b:9b:14:cf:71:67:bb:7d:f9:60:a7:92:59:9b: + de:56:8b:86:9a:8e:59:da:ad:4a:90:a4:2e:2d:c4:a0:17:01: + 18:84:c4:dd:5c:93:97:dd:d9:ad:d4:0d:63:33:3b:4e:3f:24: + 0e:6c:13:6c:3f:3b:5e:ca:27:a1:5a:1c:30:e4:eb:da:d0:e5: + b1:4f:ce:fb:c4:8c:76:da:e6:f6:00:a5:03:58:9b:6d:79:84: + 92:2c:10:66:96:b9:7f:73:57:97:7e:6a:f2:74:d3:ac:0a:3e: + b2:11:c4:f5:1e:4d:87:1f:8e:6d:29:ed:ef:97:8f:70:f7:37: + 61:3e:ae:4a:d6:6d:6e:80:c5:bb:de:9b:bd:06:bb:a8:94:28: + ed:f6:c9:4a:7f:e2:9a:44:e1:96:07:25:60:74:19:d1:fb:86: + 32:16:1c:c4:99:dd:de:ab:fe:7a:88:af:8e:3a:fa:36:c3:92: + b3:82:ba:50:18:02:42:2c:b4:6a:d2:ba:a3:8e:fb:72:6a:d1: + 8a:b4:3f:b3:9e:27:90:18:b8:50:04:b8:1e:14:d6:e1:98:ff: + ed:78:5d:5e:76:b0:6e:8d:e0:ea:e3:00:5e:c7:f3:eb:ed:71: + c6:c0:de:f1:e2:bb:03:14:f1:27:0f:a6:2e:6c:38:0a:ca:3e: + ef:e1:4c:d8:a4:dc:7d:6a:ec:e5:3e:b5:a7:53:7b:2a:32:76: + da:a8:e1:1b:8c:76:6b:8b:b8:75:51:65:25:e0:c2:31:c7:0b: + b1:a6:a2:10:b7:45:4d:fc:69:67:84:c6:81:c8:e7:5e:b8:fc: + fb:8d:64:e3:28:dc:b3:41:be:8e:58:7a:8e:9e:89:ee:51:f1: + bf:5e:82:a6:29:a8:98:fe:ef:fb:7c:70:f7:8c:ee:4e:07:47: + 10:4e:75:ad:21:a2:ad:9a:4e:e7:3a:01:2e:bc:81:63:b7:7c: + 4c:ea:32:4c:12:78:20:81:9d:f2:8d:5f:1f:4b:82:67:55:1f: + 95:ff:d8:7f:5b:50:74:fd:18:4c:74:3e:4e:cf:5b:26:d6:73: + 29:ea:dd:9b:a0:a5:0b:5d:5e:0d:36:fd:f5:d1:d0:91:9a:6e: + 81:b9:4a:93:d7:94:bb:75:e5:fa:ff:9f:5f:1e:f4:d3:63:9e: + 09:03:00:b5:aa:77:0d:9f:2f:25:41:99:f3:52:04:08:3d:f4: + d5:ab:37:3a:0c:1b:fe:db:66:45:8b:b3:88:7e:1d:9c:98:98: + a7:f7:00:30:06:78:f6:0e:ea:aa:e6:24:3d:3f:31:39:80:3e: + a8:74:a2:1e:42:51:d7:13 +-----BEGIN CERTIFICATE----- +MIIHZDCCBUygAwIBAgILKgHgpfuAgAAAACkwDQYJKoZIhvcNAQEMBQAwejELMAkG +A1UEBhMCQ0ExEjAQBgNVBAoMCVNBRkUgSW5jLjEkMCIGA1UECwwbRGlnaXRhbCBD +ZXJ0aWZpY2F0ZSBTaWduaW5nMTEwLwYDVQQDDChTQUZFIE1pZGxlIEdyb3VuZCBD +QSAoMjAyNCkgLSBTSEEzODQgLSAzMCAXDTI1MDQwNjEzNTkwNloYDzIwNTAwNDA2 +MTM1OTA2WjCBkTELMAkGA1UEBhMCQ0ExDzANBgNVBAgMBlF1ZWJlYzERMA8GA1UE +BwwITW9udHJlYWwxEjAQBgNVBAoMCVNBRkUgSW5jLjEqMCgGA1UECwwhTWFpbGxl +dXIgZW1haWwgZGV2ZWxvcHBlbWVudCB0ZXN0MR4wHAYDVQQDDBVsb2NhbGhvc3Qu +bG9jYWxkb21haW4wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC6XzXS +BNX02vCxmW/zQkIOWY17bCSXbSTf6PqDfK6S/dFYHBR+IHFeRFqw6HrORTOVqifv +Uv69WiN7T4skTQv3nJkluLmvjEb3qWwY/zl8qf+a9fDX18rcbF3HCQKDhzcaL/cF +uDmvn6skOyRI5nKvNhANxty9wt4FT0r92Fs1JLm8zqs3Ovn/LUTCM/JSSjZcX4Cn +zfcbbVW31hMlctVVTVT/oR59hYvg4hbR0SIhB5mtmlElAnF7VuV3FgcYxv3exODl +VQF49jxTqzUdRPgmr8MRoi1jcynFvbQX94N+DdkK2aEn8ny87pV2aOzEfzVkRNRt +Q0aZQFLNtMAROterfM+HtUEypCMtP8z6smtb3aVYFHokyzomBEmPB4tb0L7C7iTe +0XTLBEi++XRaF1IeDsDqAtF6HueilbR3GpZtNIB4hQ+E5jtgJ3VdM2Bta9naua+p +z7yuwynKoxtPO3/6utYB8Ac/fQBF5m5/qmetkNsdKuvkvkMTXi7c3qE2/SCQH6yM +PMkOMpbvqBkdMIfR8kLHVedGJJzSSh9CAffraF/WtZo64lGQlFmdvIPd2InpNK/W +Q2aPh4UrxrFDtgmSuvTj1jvBWy12zVasf7v7YDClE3ZzNV5n393F/qvlT92AVhmm +4NhTsiBcXDQvoTELEidxtupbLvqjiC/3JFuTDQIDAQABo4IBzzCCAcswDgYDVR0P +AQH/BAQDAgWgMIGABggrBgEFBQcBAQR0MHIwOgYIKwYBBQUHMAKGLmh0dHA6Ly9j +ZXJ0aWZpY2F0ZXMuc2FmZS5jYS9jYWNlcnQvc2FmZU1ETC5wZW0wNAYIKwYBBQUH +MAGGKGh0dHA6Ly9jZXJ0aWZpY2F0ZXMvc2FmZS5jYS9jaGtjZXJ0c3RhdHMwUwYD +VR0gBEwwSjA/BgkrBgEEAboOAQIwMjAwBggrBgEFBQcCARYkaHR0cDovL2NlcnRp +ZmljYXRlcy5zYWZlLmNhL3BvbGljaWVzMAcGBWeBDAEBMAkGA1UdEwQCMAAwRQYD +VR0fBD4wPDA6oDigNoY0aHR0cDovL2NlcnRpZmljYXRlcy5zYWZlLmNhL3JlcG9z +aXRvcnkvcmV2b2tsaXN0LnBlbTAmBgNVHREEHzAdghVsb2NhbGhvc3QubG9jYWxk +b21haW6HBH9/AAEwJwYDVR0lBCAwHgYIKwYBBQUHAwEGCCsGAQUFBwMCBggrBgEF +BQcDBDAdBgNVHQ4EFgQULb1l4U4rfeCAPtJmbu2Bh0pSzWwwHwYDVR0jBBgwFoAU +nL4LwCJ29c+8/Xiakncg/r+WHtgwDQYJKoZIhvcNAQEMBQADggIBAKzoHlDsDrgC +xqxwGe43f1MkaczKbjRrmxTPcWe7fflgp5JZm95Wi4aajlnarUqQpC4txKAXARiE +xN1ck5fd2a3UDWMzO04/JA5sE2w/O17KJ6FaHDDk69rQ5bFPzvvEjHba5vYApQNY +m215hJIsEGaWuX9zV5d+avJ006wKPrIRxPUeTYcfjm0p7e+Xj3D3N2E+rkrWbW6A +xbvem70Gu6iUKO32yUp/4ppE4ZYHJWB0GdH7hjIWHMSZ3d6r/nqIr446+jbDkrOC +ulAYAkIstGrSuqOO+3Jq0Yq0P7OeJ5AYuFAEuB4U1uGY/+14XV52sG6N4OrjAF7H +8+vtccbA3vHiuwMU8ScPpi5sOArKPu/hTNik3H1q7OU+tadTeyoydtqo4RuMdmuL +uHVRZSXgwjHHC7GmohC3RU38aWeExoHI5164/PuNZOMo3LNBvo5Yeo6eie5R8b9e +gqYpqJj+7/t8cPeM7k4HRxBOda0hoq2aTuc6AS68gWO3fEzqMkwSeCCBnfKNXx9L +gmdVH5X/2H9bUHT9GEx0Pk7PWybWcynq3ZugpQtdXg02/fXR0JGaboG5SpPXlLt1 +5fr/n18e9NNjngkDALWqdw2fLyVBmfNSBAg99NWrNzoMG/7bZkWLs4h+HZyYmKf3 +ADAGePYO6qrmJD0/MTmAPqh0oh5CUdcT +-----END CERTIFICATE----- diff --git a/certs/localhost_key.pem b/certs/localhost_key.pem new file mode 100644 index 0000000..bc8f96b --- /dev/null +++ b/certs/localhost_key.pem @@ -0,0 +1,52 @@ +-----BEGIN PRIVATE KEY----- +MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQC6XzXSBNX02vCx +mW/zQkIOWY17bCSXbSTf6PqDfK6S/dFYHBR+IHFeRFqw6HrORTOVqifvUv69WiN7 +T4skTQv3nJkluLmvjEb3qWwY/zl8qf+a9fDX18rcbF3HCQKDhzcaL/cFuDmvn6sk +OyRI5nKvNhANxty9wt4FT0r92Fs1JLm8zqs3Ovn/LUTCM/JSSjZcX4CnzfcbbVW3 +1hMlctVVTVT/oR59hYvg4hbR0SIhB5mtmlElAnF7VuV3FgcYxv3exODlVQF49jxT +qzUdRPgmr8MRoi1jcynFvbQX94N+DdkK2aEn8ny87pV2aOzEfzVkRNRtQ0aZQFLN +tMAROterfM+HtUEypCMtP8z6smtb3aVYFHokyzomBEmPB4tb0L7C7iTe0XTLBEi+ ++XRaF1IeDsDqAtF6HueilbR3GpZtNIB4hQ+E5jtgJ3VdM2Bta9naua+pz7yuwynK +oxtPO3/6utYB8Ac/fQBF5m5/qmetkNsdKuvkvkMTXi7c3qE2/SCQH6yMPMkOMpbv +qBkdMIfR8kLHVedGJJzSSh9CAffraF/WtZo64lGQlFmdvIPd2InpNK/WQ2aPh4Ur +xrFDtgmSuvTj1jvBWy12zVasf7v7YDClE3ZzNV5n393F/qvlT92AVhmm4NhTsiBc +XDQvoTELEidxtupbLvqjiC/3JFuTDQIDAQABAoICAAgIP3EQPUpivzngQ4dn5SHq +MSNPG1qdXRf7WgSdtIZoQwP5ndZ7vncSGhiCxHwsVldOcI8rdAgkIOBZIsWLPodK +6/zIs9QBhzN4TUzcfxVE3FvI2rrqtXb/gqEn3cBebP0HcS2BbZcImh8jH2K2791m +RpXZar0Q73GqI7DCCNhG/2xIOe/U7l5VjJ+UDo8GXMZpZUmWIl6/vRCBvOyBwPj+ +rrmfr4k4Xrlv9QzQ5xgmVDS7sGCYdNycd6JExESImvtlX83ydnBIqHvwpobe6JT+ +QTl61FrzZSr9DIx14ehmX2LM01m95StdWvqx9fZYByyNnNwiqKHFOGxeLGLxtsa9 +8q9r2NlCWISUrZxs8DJUqOEHBVexocFzoYHTj023nb78LqBIyESnphOQaAXiaFSq +0IWCh7/5BZsG5jcQaDkWBHbv2XcYFtiS8tQ4AvacE77SINWtmcCtYb5e3Zn3oB/r +i20AiQ3CWe5zO5Q9DfJJRj2k+UPXphkuu6uYbATxwYgfpHLeCwWGp10ABBt52Osn +4pyCKY4B6aEDfMY2eta/J/dUHN/0091u7tg7jvgwaJ7ZMR2vAGczLt0nkWFuKyVY +QAdlv1ebBN0jnhYFkELMKJJNYOJom7TaXLlqeGvKfjSavT5ZIBlZb3Hv0JYCZFP4 +L66kGMTD08hjsNg6SWCRAoIBAQDfV1gzXmUt9wgelo9QncIwbEegEC94QwVFNDXH +n90ityNd/6g8dqKcMnOS3m2R08eiFtGTjlokXTv0zL118pu4UN83ee4Lx0p/jfS2 +TWPKYOzltMIKcaSyBF+P4fdMe2QWOYvnhqWDv4hIDuomezuwgB6U+BTC+v3Vihtz +6IAOBfhGh40POC50I++ps2yfANcc4w0/a99tEUp3Pchsiw263w1f0OJZ7yBQL6fA +LeKBRxrljKRFIFCP0JM8XnxyQLz872kaqSwkmu0m+/ickD9Sr+8Gict9EVmuQKBF +e1TW+Kg1Pxi+L/n3csN4RxA+ZBJWKC77yly69W93b+2omiQJAoIBAQDVn/Drra44 +VXtC0irMvfD4v6Qb64wwcBLMgE1qaopso7vZDTKlzQoBgxVK+q8q4kGn4KyHQc94 +Prc/lgVEcxoyxD7GaQwKROTeBapN7WmzYtK9Tp/yqZegoRzkXjO0RxxcQLA5h/Yo +l7k1O8kewfOCrmLx9KUSzo6jWVzB/j5/8Qw1XA6WNvUSnUR61H4LFDwndypzd+V5 +RB3QolRDnz0eDZcSEDdutJ8NcK/Xs2eSGcUgawkD7mbifa96L+JFC+ds9ZrWg9KW +A66KSD7ooPBbU0LP3U/N3KAn9ESoZD+K4qkAvLpsNo9WRcks7lyz7yddc1XI0bKJ +irwzzgwwyl/lAoIBAQCSz4+i9MH93QzxTncWvx0PR54tkXYiz6t/Ojq/5k4uq8QL +3ipw1Gs/0co3GQ9ddKEd43IQVNrcXI009gD0r229UyvoA7Z+95n5Dw91ZpnaRqxy +ssd6pgllG4rVwewV0maQVXOp1dCnMhgbhfJVKVyrQQzZT9oV8Xc6D3bMUmEa1sHF +WwVWo8+leJnqK4+TVbIRww7KSdask1kn2O0OrLlxxX29JkokZBQRocHbik4CPQNp +MXIqHnvWjXy7ikCzueqBOb8VT289ALozjh52jDuT1yKAYcPpiqYw7Tptcgzq4rlv +hvJ00oS2LDJhthTvbki/adq4mOUr4HpNQL4wvmJBAoIBADvxs5MOm3KnWf04KFZn +fjTu4cgL4ry81imYXyDbYJh3oYCYmXu4+3PNKq5thbXM44uOGhuiNeuR/a3UFQpO +Gi3gr5TRaVWAW5CJmm5fjmeN9YC1jWB0gl3Kl+blIDEYOzcP1+Ns6YAegxQTAK6m +0gP7lzw54BBU8eWYb9Tn2PXh2AEpIda4+TAN/WdSNUQ6m16fq8PXAwdyO8ONqYOI +LYg/XALvlf50pKUK1+z5JLj0jkI4hsEZprkrd5Ab26xwWLJUgOxs9SyvP80B1NVG +Q+v8gyT8/yXPIQnVG2b9Km94ht/0FYPEE5ir4HXBNTYwh6VLdejyHt1FluYajYUr +ZJkCggEAaDYyDksmSEb14qAZzTYU2DIi2CglhOvEs8QSObR3KPYBD5roROIVat3X +LEtnnoNkCWGAnSC8PH3iNxh6EqA6Csjf2B/UKBYPy6jyV9HTkKa9aUOMoVYpzhMM +qzo4mCO7n2SKqlNzSLkzNLG5pcyOvVKkW9kEr6ruC3LG/Qd2Nx6xfF+Ien+YAwvP +W+17N2lDDdoa1YlXxIHu/DW5gCskF+WqkcsZAStsK01n1Tb9NcJiVC4QEPu8y57O +RulAtP4OgwwFhzQ1dhT92UFZrH+W28l3F571Nvx5ADPnRtLOB4umT0styUKm322Q +yVX+KcXoeFoZZcQR5s0qu1ZkJNhizw== +-----END PRIVATE KEY----- diff --git a/certs/mailleur_x509.pem b/certs/mailleur_server_cert_x509.pem similarity index 100% rename from certs/mailleur_x509.pem rename to certs/mailleur_server_cert_x509.pem diff --git a/certs/mailleur.key b/certs/mailleur_server_key.pem similarity index 100% rename from certs/mailleur.key rename to certs/mailleur_server_key.pem diff --git a/lib/subrou.c b/lib/subrou.c index 95fab11..47e3e6c 100644 --- a/lib/subrou.c +++ b/lib/subrou.c @@ -21,7 +21,7 @@ //version definition #define VERSION "0.6" -#define RELEASE "44" +#define RELEASE "45" #define BRANCH "dvl" //Public variables diff --git a/lib/unitls.c b/lib/unitls.c index e677e71..b45853f 100644 --- a/lib/unitls.c +++ b/lib/unitls.c @@ -225,34 +225,47 @@ int phase; _Bool proceed; done=false; -certpub[0]="./kleenex/cert.pem"; //JMPDBG test Trusted file -certpub[1]="./kleenex/cert.pem"; //JMPDBG test -certpub[2]="./kleenex/key.pem"; //JMPDBG test +certpub[0]="./certs/safe_CA.pem"; //default and debugging certificats +//Default debugging server certificate +certpub[1]="./certs/mailleur_server_cert_x509.pem"; +certpub[2]="./certs/mailleur_server_key.pem"; phase=0; proceed=true; while (proceed==true) { switch (phase) { case 0 : //load CA trusted file if (SSL_CTX_use_certificate_chain_file(tls->ctx,certpub[0])!=1) { - (void) showtlserror(tls,0,"No chain Certificate"); + char msg[200]; + + (void) snprintf(msg,sizeof(msg),"%s, file <%s> missing?", + "No chain Certificate",certpub[0]); + (void) showtlserror(tls,0,msg); phase=999; //no need to go furter } break; case 1 : //loading default CA verify dir if (SSL_CTX_set_default_verify_paths(tls->ctx)==0) { - (void) showtlserror(tls,0,"No CA certificate"); + (void) showtlserror(tls,0,"Unable to verify default path"); phase=999; //no need to go furter } break; case 2 : //set certificate if (SSL_CTX_use_certificate_file(tls->ctx,certpub[1],SSL_FILETYPE_PEM)!=1) { - (void) showtlserror(tls,0,"No local Certificate"); + char msg[200]; + + (void) snprintf(msg,sizeof(msg),"%s, file <%s> missing?", + "Problem with certificate",certpub[1]); + (void) showtlserror(tls,0,msg); phase=999; //no need to go furter } break; case 3 : //set key if (SSL_CTX_use_PrivateKey_file(tls->ctx,certpub[2],SSL_FILETYPE_PEM)!=1) { - (void) showtlserror(tls,0,"No local Certificate"); + char msg[200]; + + (void) snprintf(msg,sizeof(msg),"%s, file <%s> missing?", + "Probleme with Certificate key",certpub[2]); + (void) showtlserror(tls,0,msg); phase=999; } break;