@@ -2285,9 +2285,9 @@ CURLcode Curl_ossl_verifyhost(struct Curl_easy *data, struct connectdata *conn,
2285
2285
#if (OPENSSL_VERSION_NUMBER >= 0x0090808fL ) && !defined(OPENSSL_NO_TLSEXT ) && \
2286
2286
!defined(OPENSSL_NO_OCSP )
2287
2287
static CURLcode verifystatus (struct Curl_cfilter * cf ,
2288
- struct Curl_easy * data )
2288
+ struct Curl_easy * data ,
2289
+ struct ossl_ctx * octx )
2289
2290
{
2290
- struct ssl_connect_data * connssl = cf -> ctx ;
2291
2291
int i , ocsp_status ;
2292
2292
#if defined(OPENSSL_IS_AWSLC )
2293
2293
const uint8_t * status ;
@@ -2300,14 +2300,14 @@ static CURLcode verifystatus(struct Curl_cfilter *cf,
2300
2300
OCSP_BASICRESP * br = NULL ;
2301
2301
X509_STORE * st = NULL ;
2302
2302
STACK_OF (X509 ) * ch = NULL ;
2303
- struct ossl_ctx * octx = (struct ossl_ctx * )connssl -> backend ;
2304
2303
X509 * cert ;
2305
2304
OCSP_CERTID * id = NULL ;
2306
2305
int cert_status , crl_reason ;
2307
2306
ASN1_GENERALIZEDTIME * rev , * thisupd , * nextupd ;
2308
2307
int ret ;
2309
2308
long len ;
2310
2309
2310
+ (void )cf ;
2311
2311
DEBUGASSERT (octx );
2312
2312
2313
2313
len = (long )SSL_get_tlsext_status_ocsp_resp (octx -> ssl , & status );
@@ -4657,7 +4657,7 @@ CURLcode Curl_oss_check_peer_cert(struct Curl_cfilter *cf,
4657
4657
!defined(OPENSSL_NO_OCSP )
4658
4658
if (conn_config -> verifystatus && !octx -> reused_session ) {
4659
4659
/* don't do this after Session ID reuse */
4660
- result = verifystatus (cf , data );
4660
+ result = verifystatus (cf , data , octx );
4661
4661
if (result ) {
4662
4662
/* when verifystatus failed, remove the session id from the cache again
4663
4663
if present */
0 commit comments