version 1.8, 2019/11/04 14:47:43 |
version 1.9, 2019/11/04 14:49:59 |
|
|
encerts = sk_X509_new_null(); |
encerts = sk_X509_new_null(); |
while (*args) { |
while (*args) { |
if (!(cert = load_cert(bio_err, *args, FORMAT_PEM, |
if (!(cert = load_cert(bio_err, *args, FORMAT_PEM, |
NULL, e, "recipient certificate file"))) |
NULL, "recipient certificate file"))) |
goto end; |
goto end; |
sk_X509_push(encerts, cert); |
sk_X509_push(encerts, cert); |
cert = NULL; |
cert = NULL; |
|
|
} |
} |
if (certfile) { |
if (certfile) { |
if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL, |
if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL, |
e, "certificate file"))) { |
"certificate file"))) { |
ERR_print_errors(bio_err); |
ERR_print_errors(bio_err); |
goto end; |
goto end; |
} |
} |
} |
} |
if (recipfile && (operation == SMIME_DECRYPT)) { |
if (recipfile && (operation == SMIME_DECRYPT)) { |
if (!(recip = load_cert(bio_err, recipfile, FORMAT_PEM, NULL, |
if (!(recip = load_cert(bio_err, recipfile, FORMAT_PEM, NULL, |
e, "recipient certificate file"))) { |
"recipient certificate file"))) { |
ERR_print_errors(bio_err); |
ERR_print_errors(bio_err); |
goto end; |
goto end; |
} |
} |
} |
} |
if (operation == SMIME_SIGN_RECEIPT) { |
if (operation == SMIME_SIGN_RECEIPT) { |
if (!(signer = load_cert(bio_err, signerfile, FORMAT_PEM, NULL, |
if (!(signer = load_cert(bio_err, signerfile, FORMAT_PEM, NULL, |
e, "receipt signer certificate file"))) { |
"receipt signer certificate file"))) { |
ERR_print_errors(bio_err); |
ERR_print_errors(bio_err); |
goto end; |
goto end; |
} |
} |
|
|
keyfile = NULL; |
keyfile = NULL; |
|
|
if (keyfile) { |
if (keyfile) { |
key = load_key(bio_err, keyfile, keyform, 0, passin, e, |
key = load_key(bio_err, keyfile, keyform, 0, passin, |
"signing key file"); |
"signing key file"); |
if (!key) |
if (!key) |
goto end; |
goto end; |
|
|
signerfile = sk_OPENSSL_STRING_value(sksigners, i); |
signerfile = sk_OPENSSL_STRING_value(sksigners, i); |
keyfile = sk_OPENSSL_STRING_value(skkeys, i); |
keyfile = sk_OPENSSL_STRING_value(skkeys, i); |
signer = load_cert(bio_err, signerfile, FORMAT_PEM, |
signer = load_cert(bio_err, signerfile, FORMAT_PEM, |
NULL, e, "signer certificate"); |
NULL, "signer certificate"); |
if (!signer) |
if (!signer) |
goto end; |
goto end; |
key = load_key(bio_err, keyfile, keyform, 0, passin, e, |
key = load_key(bio_err, keyfile, keyform, 0, passin, |
"signing key file"); |
"signing key file"); |
if (!key) |
if (!key) |
goto end; |
goto end; |