After the latest round of header-hacking, regenerate the dependencies in
[openssl.git] / crypto / ocsp / ocsp_srv.c
index 5743f9c7544e1ee96629569e69b1052d99051c75..fffa134e7541aae8c1ab1043710fb4c624825181 100644 (file)
@@ -96,6 +96,12 @@ int OCSP_id_get0_info(ASN1_OCTET_STRING **piNameHash, ASN1_OBJECT **pmd,
        return 1;
        }
 
+int OCSP_request_is_signed(OCSP_REQUEST *req)
+       {
+       if(req->optionalSignature) return 1;
+       return 0;
+       }
+
 /* Create an OCSP response and encode an optional basic response */
 OCSP_RESPONSE *OCSP_response_create(int status, OCSP_BASICRESP *bs)
         {
@@ -106,7 +112,7 @@ OCSP_RESPONSE *OCSP_response_create(int status, OCSP_BASICRESP *bs)
        if (!bs) return rsp;
        if (!(rsp->responseBytes = OCSP_RESPBYTES_new())) goto err;
        rsp->responseBytes->responseType = OBJ_nid2obj(NID_id_pkix_OCSP_basic);
-       if (!ASN1_item_pack(bs, &OCSP_BASICRESP_it, &rsp->responseBytes->response))
+       if (!ASN1_item_pack(bs, ASN1_ITEM_rptr(OCSP_BASICRESP), &rsp->responseBytes->response))
                                goto err;
        return rsp;
 err: