diff options
Diffstat (limited to '')
-rw-r--r-- | src/usr.bin/openssl/ocsp.c | 23 |
1 files changed, 11 insertions, 12 deletions
diff --git a/src/usr.bin/openssl/ocsp.c b/src/usr.bin/openssl/ocsp.c index ab5a755713..39000328b6 100644 --- a/src/usr.bin/openssl/ocsp.c +++ b/src/usr.bin/openssl/ocsp.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ocsp.c,v 1.3 2015/08/22 16:36:05 jsing Exp $ */ | 1 | /* $OpenBSD: ocsp.c,v 1.4 2015/09/11 14:30:23 bcook Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2000. | 3 | * project 2000. |
4 | */ | 4 | */ |
@@ -105,7 +105,6 @@ static OCSP_RESPONSE *query_responder(BIO * err, BIO * cbio, char *path, | |||
105 | int | 105 | int |
106 | ocsp_main(int argc, char **argv) | 106 | ocsp_main(int argc, char **argv) |
107 | { | 107 | { |
108 | ENGINE *e = NULL; | ||
109 | char **args; | 108 | char **args; |
110 | char *host = NULL, *port = NULL, *path = "/"; | 109 | char *host = NULL, *port = NULL, *path = "/"; |
111 | char *reqin = NULL, *respin = NULL; | 110 | char *reqin = NULL, *respin = NULL; |
@@ -335,7 +334,7 @@ ocsp_main(int argc, char **argv) | |||
335 | args++; | 334 | args++; |
336 | X509_free(issuer); | 335 | X509_free(issuer); |
337 | issuer = load_cert(bio_err, *args, FORMAT_PEM, | 336 | issuer = load_cert(bio_err, *args, FORMAT_PEM, |
338 | NULL, e, "issuer certificate"); | 337 | NULL, "issuer certificate"); |
339 | if (!issuer) | 338 | if (!issuer) |
340 | goto end; | 339 | goto end; |
341 | } else | 340 | } else |
@@ -345,7 +344,7 @@ ocsp_main(int argc, char **argv) | |||
345 | args++; | 344 | args++; |
346 | X509_free(cert); | 345 | X509_free(cert); |
347 | cert = load_cert(bio_err, *args, FORMAT_PEM, | 346 | cert = load_cert(bio_err, *args, FORMAT_PEM, |
348 | NULL, e, "certificate"); | 347 | NULL, "certificate"); |
349 | if (!cert) | 348 | if (!cert) |
350 | goto end; | 349 | goto end; |
351 | if (!cert_id_md) | 350 | if (!cert_id_md) |
@@ -531,20 +530,20 @@ ocsp_main(int argc, char **argv) | |||
531 | if (!rkeyfile) | 530 | if (!rkeyfile) |
532 | rkeyfile = rsignfile; | 531 | rkeyfile = rsignfile; |
533 | rsigner = load_cert(bio_err, rsignfile, FORMAT_PEM, | 532 | rsigner = load_cert(bio_err, rsignfile, FORMAT_PEM, |
534 | NULL, e, "responder certificate"); | 533 | NULL, "responder certificate"); |
535 | if (!rsigner) { | 534 | if (!rsigner) { |
536 | BIO_printf(bio_err, "Error loading responder certificate\n"); | 535 | BIO_printf(bio_err, "Error loading responder certificate\n"); |
537 | goto end; | 536 | goto end; |
538 | } | 537 | } |
539 | rca_cert = load_cert(bio_err, rca_filename, FORMAT_PEM, | 538 | rca_cert = load_cert(bio_err, rca_filename, FORMAT_PEM, |
540 | NULL, e, "CA certificate"); | 539 | NULL, "CA certificate"); |
541 | if (rcertfile) { | 540 | if (rcertfile) { |
542 | rother = load_certs(bio_err, rcertfile, FORMAT_PEM, | 541 | rother = load_certs(bio_err, rcertfile, FORMAT_PEM, |
543 | NULL, e, "responder other certificates"); | 542 | NULL, "responder other certificates"); |
544 | if (!rother) | 543 | if (!rother) |
545 | goto end; | 544 | goto end; |
546 | } | 545 | } |
547 | rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, | 546 | rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, |
548 | "responder private key"); | 547 | "responder private key"); |
549 | if (!rkey) | 548 | if (!rkey) |
550 | goto end; | 549 | goto end; |
@@ -574,18 +573,18 @@ redo_accept: | |||
574 | if (!keyfile) | 573 | if (!keyfile) |
575 | keyfile = signfile; | 574 | keyfile = signfile; |
576 | signer = load_cert(bio_err, signfile, FORMAT_PEM, | 575 | signer = load_cert(bio_err, signfile, FORMAT_PEM, |
577 | NULL, e, "signer certificate"); | 576 | NULL, "signer certificate"); |
578 | if (!signer) { | 577 | if (!signer) { |
579 | BIO_printf(bio_err, "Error loading signer certificate\n"); | 578 | BIO_printf(bio_err, "Error loading signer certificate\n"); |
580 | goto end; | 579 | goto end; |
581 | } | 580 | } |
582 | if (sign_certfile) { | 581 | if (sign_certfile) { |
583 | sign_other = load_certs(bio_err, sign_certfile, FORMAT_PEM, | 582 | sign_other = load_certs(bio_err, sign_certfile, FORMAT_PEM, |
584 | NULL, e, "signer certificates"); | 583 | NULL, "signer certificates"); |
585 | if (!sign_other) | 584 | if (!sign_other) |
586 | goto end; | 585 | goto end; |
587 | } | 586 | } |
588 | key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL, | 587 | key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, |
589 | "signer private key"); | 588 | "signer private key"); |
590 | if (!key) | 589 | if (!key) |
591 | goto end; | 590 | goto end; |
@@ -690,7 +689,7 @@ done_resp: | |||
690 | goto end; | 689 | goto end; |
691 | if (verify_certfile) { | 690 | if (verify_certfile) { |
692 | verify_other = load_certs(bio_err, verify_certfile, FORMAT_PEM, | 691 | verify_other = load_certs(bio_err, verify_certfile, FORMAT_PEM, |
693 | NULL, e, "validator certificate"); | 692 | NULL, "validator certificate"); |
694 | if (!verify_other) | 693 | if (!verify_other) |
695 | goto end; | 694 | goto end; |
696 | } | 695 | } |