summaryrefslogtreecommitdiff
path: root/security/nss/cmd/certcgi/certcgi.c
diff options
context:
space:
mode:
authorkirke%netscape.com <devnull@localhost>2001-01-31 23:25:02 +0000
committerkirke%netscape.com <devnull@localhost>2001-01-31 23:25:02 +0000
commit610623b37cae851c5c5185b28c5099116e16a653 (patch)
treea0a3dc737bddde8ff0c72e4aac065fdd4b536d66 /security/nss/cmd/certcgi/certcgi.c
parent4eb7618433660c6ff612fc8856130fca595bdfbd (diff)
downloadnss-hg-610623b37cae851c5c5185b28c5099116e16a653.tar.gz
Resolves bug 66244 - Many NSS command do not detect failure of NSS_Init* functions. Introduced SECU_PrintPRandOSError(progName); to print on failure. Each command is responsible for exiting with appropriate status to distinguish failure points.
Diffstat (limited to 'security/nss/cmd/certcgi/certcgi.c')
-rw-r--r--security/nss/cmd/certcgi/certcgi.c12
1 files changed, 10 insertions, 2 deletions
diff --git a/security/nss/cmd/certcgi/certcgi.c b/security/nss/cmd/certcgi/certcgi.c
index 0b9a02305..ad14f6dd9 100644
--- a/security/nss/cmd/certcgi/certcgi.c
+++ b/security/nss/cmd/certcgi/certcgi.c
@@ -62,6 +62,7 @@
#define SERIAL_FILE "../serial"
#define DB_DIRECTORY ".."
+static char *progName;
typedef struct PairStr Pair;
@@ -2201,8 +2202,8 @@ done:
}
-void
-main()
+int
+main(int argc, char **argv)
{
int length = 500;
int remaining = 500;
@@ -2240,6 +2241,9 @@ main()
PRBool UChain = PR_FALSE;
+ progName = strrchr(argv[0], '/');
+ progName = progName ? progName+1 : argv[0];
+
#ifdef TEST
sleep(20);
@@ -2251,6 +2255,10 @@ main()
PK11_SetPasswordFunc(return_dbpasswd);
NSS_InitReadWrite(DBdir);
+ if (status != SECSuccess) {
+ SECU_PrintPRandOSError(progName);
+ return -1;
+ }
handle = CERT_GetDefaultCertDB();
prefix[0]= '\0';