summaryrefslogtreecommitdiff
path: root/security/nss/cmd/p7verify
diff options
context:
space:
mode:
authorkirke%netscape.com <devnull@localhost>2001-01-31 23:25:02 +0000
committerkirke%netscape.com <devnull@localhost>2001-01-31 23:25:02 +0000
commit610623b37cae851c5c5185b28c5099116e16a653 (patch)
treea0a3dc737bddde8ff0c72e4aac065fdd4b536d66 /security/nss/cmd/p7verify
parent4eb7618433660c6ff612fc8856130fca595bdfbd (diff)
downloadnss-hg-610623b37cae851c5c5185b28c5099116e16a653.tar.gz
Resolves bug 66244 - Many NSS command do not detect failure of NSS_Init* functions. Introduced SECU_PrintPRandOSError(progName); to print on failure. Each command is responsible for exiting with appropriate status to distinguish failure points.
Diffstat (limited to 'security/nss/cmd/p7verify')
-rw-r--r--security/nss/cmd/p7verify/p7verify.c7
1 files changed, 6 insertions, 1 deletions
diff --git a/security/nss/cmd/p7verify/p7verify.c b/security/nss/cmd/p7verify/p7verify.c
index c63f1dd10..71043f7e7 100644
--- a/security/nss/cmd/p7verify/p7verify.c
+++ b/security/nss/cmd/p7verify/p7verify.c
@@ -216,6 +216,7 @@ main(int argc, char **argv)
SECCertUsage certUsage = certUsageEmailSigner;
PLOptState *optstate;
PLOptStatus status;
+ SECStatus rv;
progName = strrchr(argv[0], '/');
progName = progName ? progName+1 : argv[0];
@@ -284,7 +285,11 @@ main(int argc, char **argv)
/* Call the libsec initialization routines */
PR_Init(PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1);
- NSS_Init(SECU_ConfigDirectory(NULL));
+ rv = NSS_Init(SECU_ConfigDirectory(NULL));
+ if (rv != SECSuccess) {
+ SECU_PrintPRandOSError(progName);
+ return -1;
+ }
if (HashDecodeAndVerify(outFile, contentFile, signatureFile,
certUsage, progName)) {