request_done(cl);
}
+static void
+handle_uclient_log_msg(struct uclient *cl, enum uclient_log_type type, const char *msg)
+{
+ static const char * const type_str_list[] = {
+ [UCLIENT_LOG_SSL_ERROR] = "SSL error",
+ [UCLIENT_LOG_SSL_VERIFY_ERROR] = "SSL verify error",
+ };
+ const char *type_str = NULL;
+
+ if (type < ARRAY_SIZE(type_str_list))
+ type_str = type_str_list[type];
+ if (!type_str)
+ type_str = "Unknown";
+
+ fprintf(stderr, "%s: %s\n", type_str, msg);
+}
+
static void handle_uclient_error(struct uclient *cl, int code)
{
const char *type = "Unknown error";
.data_read = read_data_cb,
.data_eof = eof_cb,
.error = handle_uclient_error,
+ .log_msg = handle_uclient_log_msg,
};
static int usage(const char *progname)
return 1;
}
+static void debug_cb(void *priv, int level, const char *msg)
+{
+ fprintf(stderr, "%s\n", msg);
+}
+
enum {
L_NO_CHECK_CERTIFICATE,
L_CA_CERTIFICATE,
L_PROXY,
L_NO_PROXY,
L_QUIET,
+ L_VERBOSE,
};
static const struct option longopts[] = {
[L_PROXY] = { "proxy", required_argument, NULL, 0 },
[L_NO_PROXY] = { "no-proxy", no_argument, NULL, 0 },
[L_QUIET] = { "quiet", no_argument, NULL, 0 },
+ [L_VERBOSE] = { "verbose", no_argument, NULL, 0 },
{}
};
int i, ch;
int rc;
int af = -1;
+ int debug_level = 0;
signal(SIGPIPE, SIG_IGN);
ssl_ctx = uclient_new_ssl_context(&ssl_ops);
- while ((ch = getopt_long(argc, argv, "46cO:P:qsT:U:Y:", longopts, &longopt_idx)) != -1) {
+ while ((ch = getopt_long(argc, argv, "46cO:P:qsT:U:vY:", longopts, &longopt_idx)) != -1) {
switch(ch) {
case 0:
switch (longopt_idx) {
case L_QUIET:
quiet = true;
break;
+ case L_VERBOSE:
+ debug_level++;
+ break;
default:
return usage(progname);
}
case 'T':
timeout = atoi(optarg);
break;
+ case 'v':
+ debug_level++;
+ break;
case 'Y':
if (strcmp(optarg, "on") != 0)
proxy = false;
argv += optind;
argc -= optind;
+ if (debug_level)
+ ssl_ops->context_set_debug(ssl_ctx, debug_level, debug_cb, NULL);
+
if (verify && !has_cert)
default_certs = true;