version 1.383, 2020/01/14 15:07:30 |
version 1.384, 2020/01/21 11:06:09 |
|
|
exit(ok ? 0 : 1); |
exit(ok ? 0 : 1); |
} |
} |
|
|
#ifdef WITH_OPENSSL |
|
static void |
static void |
load_krl(const char *path, struct ssh_krl **krlp) |
load_krl(const char *path, struct ssh_krl **krlp) |
{ |
{ |
|
|
ssh_krl_free(krl); |
ssh_krl_free(krl); |
exit(ret); |
exit(ret); |
} |
} |
#endif |
|
|
|
static struct sshkey * |
static struct sshkey * |
load_sign_key(const char *keypath, const struct sshkey *pubkey) |
load_sign_key(const char *keypath, const struct sshkey *pubkey) |
|
|
usage(); |
usage(); |
} |
} |
if (gen_krl) { |
if (gen_krl) { |
#ifdef WITH_OPENSSL |
|
do_gen_krl(pw, update_krl, ca_key_path, |
do_gen_krl(pw, update_krl, ca_key_path, |
cert_serial, identity_comment, argc, argv); |
cert_serial, identity_comment, argc, argv); |
return (0); |
return (0); |
#else |
|
fatal("KRL generation not supported"); |
|
#endif |
|
} |
} |
if (check_krl) { |
if (check_krl) { |
#ifdef WITH_OPENSSL |
|
do_check_krl(pw, argc, argv); |
do_check_krl(pw, argc, argv); |
return (0); |
return (0); |
#else |
|
fatal("KRL checking not supported"); |
|
#endif |
|
} |
} |
if (ca_key_path != NULL) { |
if (ca_key_path != NULL) { |
if (cert_key_id == NULL) |
if (cert_key_id == NULL) |