return ret;
}
-void
+int
load_bio_certificate_chain (ptls_context_t * ctx, const char *cert_data)
{
BIO *cert_bio;
if (ptls_load_bio_certificates (ctx, cert_bio) != 0)
{
BIO_free (cert_bio);
- clib_warning ("failed to load certificate:%s\n", strerror (errno));
- exit (1);
+ return -1;
}
BIO_free (cert_bio);
+ return 0;
}
-void
+int
load_bio_private_key (ptls_context_t * ctx, const char *pk_data)
{
static ptls_openssl_sign_certificate_t sc;
BIO_free (key_bio);
if (pkey == NULL)
- {
- clib_warning ("failed to read private key from app configuration\n");
- exit (1);
- }
+ return -1;
ptls_openssl_init_sign_certificate (&sc, pkey);
EVP_PKEY_free (pkey);
ctx->sign_certificate = &sc.super;
+ return 0;
}
int ptls_load_bio_certificates (ptls_context_t * ctx, BIO * bio);
-void load_bio_certificate_chain (ptls_context_t * ctx, const char *cert_data);
+int load_bio_certificate_chain (ptls_context_t * ctx, const char *cert_data);
-void load_bio_private_key (ptls_context_t * ctx, const char *pk_data);
+int load_bio_private_key (ptls_context_t * ctx, const char *pk_data);
#endif /* __included_quic_certs_h__ */
&ptls_openssl_sha256, key_vec);
if (!is_client && app->tls_key != NULL && app->tls_cert != NULL)
{
- load_bio_private_key (quicly_ctx->tls, (char *) app->tls_key);
- load_bio_certificate_chain (quicly_ctx->tls, (char *) app->tls_cert);
+ if (load_bio_private_key (quicly_ctx->tls, (char *) app->tls_key))
+ {
+ QUIC_DBG (1, "failed to read private key from app configuration\n");
+ }
+ if (load_bio_certificate_chain (quicly_ctx->tls,
+ (char *) app->tls_cert))
+ {
+ QUIC_DBG (1, "failed to load certificate\n");
+ }
}
}