- }
- const vector<XSECCryptoX509CRL*>& crls = pkixInfo->getCRLs();
- for (vector<XSECCryptoX509CRL*>::const_iterator j=crls.begin(); j!=crls.end(); ++j) {
- if ((*j)->getProviderName()==DSIGConstants::s_unicodeStrPROVOpenSSL) {
- // owned by store
- X509_STORE_add_crl(store, X509_CRL_dup(static_cast<OpenSSLCryptoX509CRL*>(*j)->getOpenSSLX509CRL()));
- ++count;
- }
- }
- log.debug("supplied (%d) CRL(s)", count);
- if (count > 0) {
- X509_STORE_set_flags(store, fullCRLChain ? (X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL) : (X509_V_FLAG_CRL_CHECK));
- }
- else if (requireCRL) {
- log.warn("CRL checking is required, but none were supplied");
- sk_X509_free(CAstack);
- X509_STORE_free(store);
- return false;
- }
+ log.debug("supplied (%d) CRL(s)", count);
+ if (count > 0) {
+ X509_STORE_set_flags(store, fullCRLChain ? (X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL) : (X509_V_FLAG_CRL_CHECK));
+ }
+ else {
+ log.warn("CRL checking is enabled, but none were supplied");
+ sk_X509_free(CAstack);
+ X509_STORE_free(store);
+ return false;
+ }