version 1.3, 2015/08/22 16:36:05 |
version 1.4, 2015/09/11 14:30:23 |
|
|
int |
int |
ocsp_main(int argc, char **argv) |
ocsp_main(int argc, char **argv) |
{ |
{ |
ENGINE *e = NULL; |
|
char **args; |
char **args; |
char *host = NULL, *port = NULL, *path = "/"; |
char *host = NULL, *port = NULL, *path = "/"; |
char *reqin = NULL, *respin = NULL; |
char *reqin = NULL, *respin = NULL; |
|
|
args++; |
args++; |
X509_free(issuer); |
X509_free(issuer); |
issuer = load_cert(bio_err, *args, FORMAT_PEM, |
issuer = load_cert(bio_err, *args, FORMAT_PEM, |
NULL, e, "issuer certificate"); |
NULL, "issuer certificate"); |
if (!issuer) |
if (!issuer) |
goto end; |
goto end; |
} else |
} else |
|
|
args++; |
args++; |
X509_free(cert); |
X509_free(cert); |
cert = load_cert(bio_err, *args, FORMAT_PEM, |
cert = load_cert(bio_err, *args, FORMAT_PEM, |
NULL, e, "certificate"); |
NULL, "certificate"); |
if (!cert) |
if (!cert) |
goto end; |
goto end; |
if (!cert_id_md) |
if (!cert_id_md) |
|
|
if (!rkeyfile) |
if (!rkeyfile) |
rkeyfile = rsignfile; |
rkeyfile = rsignfile; |
rsigner = load_cert(bio_err, rsignfile, FORMAT_PEM, |
rsigner = load_cert(bio_err, rsignfile, FORMAT_PEM, |
NULL, e, "responder certificate"); |
NULL, "responder certificate"); |
if (!rsigner) { |
if (!rsigner) { |
BIO_printf(bio_err, "Error loading responder certificate\n"); |
BIO_printf(bio_err, "Error loading responder certificate\n"); |
goto end; |
goto end; |
} |
} |
rca_cert = load_cert(bio_err, rca_filename, FORMAT_PEM, |
rca_cert = load_cert(bio_err, rca_filename, FORMAT_PEM, |
NULL, e, "CA certificate"); |
NULL, "CA certificate"); |
if (rcertfile) { |
if (rcertfile) { |
rother = load_certs(bio_err, rcertfile, FORMAT_PEM, |
rother = load_certs(bio_err, rcertfile, FORMAT_PEM, |
NULL, e, "responder other certificates"); |
NULL, "responder other certificates"); |
if (!rother) |
if (!rother) |
goto end; |
goto end; |
} |
} |
rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, |
rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, |
"responder private key"); |
"responder private key"); |
if (!rkey) |
if (!rkey) |
goto end; |
goto end; |
|
|
if (!keyfile) |
if (!keyfile) |
keyfile = signfile; |
keyfile = signfile; |
signer = load_cert(bio_err, signfile, FORMAT_PEM, |
signer = load_cert(bio_err, signfile, FORMAT_PEM, |
NULL, e, "signer certificate"); |
NULL, "signer certificate"); |
if (!signer) { |
if (!signer) { |
BIO_printf(bio_err, "Error loading signer certificate\n"); |
BIO_printf(bio_err, "Error loading signer certificate\n"); |
goto end; |
goto end; |
} |
} |
if (sign_certfile) { |
if (sign_certfile) { |
sign_other = load_certs(bio_err, sign_certfile, FORMAT_PEM, |
sign_other = load_certs(bio_err, sign_certfile, FORMAT_PEM, |
NULL, e, "signer certificates"); |
NULL, "signer certificates"); |
if (!sign_other) |
if (!sign_other) |
goto end; |
goto end; |
} |
} |
key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL, |
key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, |
"signer private key"); |
"signer private key"); |
if (!key) |
if (!key) |
goto end; |
goto end; |
|
|
goto end; |
goto end; |
if (verify_certfile) { |
if (verify_certfile) { |
verify_other = load_certs(bio_err, verify_certfile, FORMAT_PEM, |
verify_other = load_certs(bio_err, verify_certfile, FORMAT_PEM, |
NULL, e, "validator certificate"); |
NULL, "validator certificate"); |
if (!verify_other) |
if (!verify_other) |
goto end; |
goto end; |
} |
} |