summaryrefslogtreecommitdiffstats
path: root/database/sqlite
diff options
context:
space:
mode:
authorDavid Sommerseth <dazo@users.sourceforge.net>2008-10-08 07:40:03 +0200
committerDavid Sommerseth <dazo@users.sourceforge.net>2008-10-08 07:40:03 +0200
commitb6f246bb5470ddfd0309769ec908d1fbad7c322d (patch)
tree45f7013e0ee94d99873993bf4515f799f3d3f81d /database/sqlite
parent0caeac27ccd23c9d940d3eac212ef1a70ce91468 (diff)
downloadeurephia-b6f246bb5470ddfd0309769ec908d1fbad7c322d.tar.gz
eurephia-b6f246bb5470ddfd0309769ec908d1fbad7c322d.tar.xz
eurephia-b6f246bb5470ddfd0309769ec908d1fbad7c322d.zip
Moved TLS authentication logging from database module to eurephia.c
Also differentiated log level from user certs (depth == 0) and other depths.
Diffstat (limited to 'database/sqlite')
-rw-r--r--database/sqlite/eurephiadb-sqlite.c15
1 files changed, 2 insertions, 13 deletions
diff --git a/database/sqlite/eurephiadb-sqlite.c b/database/sqlite/eurephiadb-sqlite.c
index 8fcbd65..1424ffd 100644
--- a/database/sqlite/eurephiadb-sqlite.c
+++ b/database/sqlite/eurephiadb-sqlite.c
@@ -202,19 +202,8 @@ int eDBauth_TLS(eurephiaCTX *ctx, const char *org, const char *cname, const char
blid = strdup_nullsafe(sqlite_get_value(res, 0, 1));
sqlite_free_results(res);
- // Check if we found certificate to be blacklisted or not. blid == NULL when NOT blacklisted
- if( blid == NULL ) {
- if( certid > 0 ) {
- eurephia_log(ctx, LOG_INFO, 0,
- "Found certid %i for user: %s/%s/%s",
- certid, org, cname, email);
- } else {
- eurephia_log(ctx, LOG_INFO, 1,
- "Unknown certificate for: %s/%s/%s (depth %s, digest: %s)",
- org, cname, email, depth, digest);
- }
- // Certificate is okay, certid contains the certificate ID
- } else {
+ // Check if the certificate is blacklisted or not. blid != NULL when blacklisted
+ if( blid != NULL ) {
// If the certificate or IP is blacklisted, update status and deny access.
eurephia_log(ctx, LOG_WARNING, 0,
"Attempt with BLACKLISTED certificate (certid %i)", certid);