#include <openssl/bn.h>
#include <dpl/assert.h>
-#include <dpl/log/wrt_log.h>
+#include <dpl/log/log.h>
#include <vcore/Base64.h>
#include <vcore/TimeConversion.h>
base64.reset();
base64.append(der);
if (!base64.finalize()) {
- WrtLogW("Error during decoding");
+ LogWarning("Error during decoding");
}
tmp = base64.get();
ptr = reinterpret_cast<const unsigned char*>(tmp.c_str());
bool Certificate::isSignedBy(const CertificatePtr &parent) const
{
if (!parent) {
- WrtLogD("Invalid certificate parameter.");
+ LogDebug("Invalid certificate parameter.");
return false;
}
return 0 == X509_NAME_cmp(X509_get_subject_name(parent->m_x509),
}
else {
set.insert(std::string(temp));
- WrtLogD("FOUND GEN_DNS: %s", temp);
+ LogDebug("FOUND GEN_DNS: " << temp);
}
} else {
- WrtLogD("FOUND GEN TYPE ID: %d", namePart->type);
+ LogDebug("FOUND GEN TYPE ID: " << namePart->type);
}
}
return set;
NULL,
NULL));
if (!distPoints) {
- WrtLogD("No distribution points in certificate.");
+ LogDebug("No distribution points in certificate.");
return result;
}
for (int i = 0; i < count; ++i) {
DIST_POINT* point = sk_DIST_POINT_value(distPoints, i);
if (!point) {
- WrtLogE("Failed to get distribution point.");
+ LogError("Failed to get distribution point.");
continue;
}
if (point->distpoint != NULL &&
char *crlUri =
reinterpret_cast<char*>(name->d.ia5->data);
if (!crlUri) {
- WrtLogE("Failed to get URI.");
+ LogError("Failed to get URI.");
continue;
}
result.push_back(crlUri);