diff --git a/README.md b/README.md index a798df5b0be8a5dee46c66632194fdc278d5a925..aa3cac261cee65e4a24a62cf74f5eeb3f347934a 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,5 @@ Author: Neeserg Parajuli + Student num: 582811 Program: diff --git a/certcheck b/certcheck index dd2bd1939093d1b05f2976abee12c7ad1f42f048..fab3db37cc846948f3f61a493a8b35db1d57050e 100755 Binary files a/certcheck and b/certcheck differ diff --git a/validater.c b/validater.c index f39c56f44c865dc9b5bcef827ce3c15e38671794..0a2cf346bac986315bc08fa175e6a732496fb118 100644 --- a/validater.c +++ b/validater.c @@ -10,21 +10,21 @@ int validate_certificate(char* filename, char* URL){ //check the if the url is in the SAN list given that its not already the common name if (!check_san_valid(cert, URL, in_host)) { - printf("SAN \n"); + //printf("SAN \n"); X509_free(cert); return 0; } //check the expiry date if (!check_time(cert)) { - printf("time\n"); + //printf("time\n"); X509_free(cert); return 0; } //check if the RSA key is 2048 bits if (!check_public_key(cert)) { - printf("PKEY\n"); + //printf("PKEY\n"); X509_free(cert); return 0; } @@ -32,14 +32,14 @@ int validate_certificate(char* filename, char* URL){ if (!check_constraint(cert)) { - printf("CONSTRAINTS\n"); + //printf("CONSTRAINTS\n"); X509_free(cert); return 0; } //check if the usage TLS is webserver authentication if (!check_ext_key(cert)) { - printf("ext key\n"); + //printf("ext key\n"); X509_free(cert); return 0; }