summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/asn1/x_req.c
diff options
context:
space:
mode:
authorbeck <>2000-03-19 11:13:58 +0000
committerbeck <>2000-03-19 11:13:58 +0000
commit796d609550df3a33fc11468741c5d2f6d3df4c11 (patch)
tree6c6d539061caa20372dad0ac4ddb1dfae2fbe7fe /src/lib/libcrypto/asn1/x_req.c
parent5be3114c1fd7e0dfea1e38d3abb4cbba75244419 (diff)
downloadopenbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.tar.gz
openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.tar.bz2
openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.zip
OpenSSL 0.9.5 merge
*warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2 if you are using the ssl26 packages for ssh and other things to work you will need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
Diffstat (limited to 'src/lib/libcrypto/asn1/x_req.c')
-rw-r--r--src/lib/libcrypto/asn1/x_req.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libcrypto/asn1/x_req.c b/src/lib/libcrypto/asn1/x_req.c
index 9b1d6abe64..0cd572ee73 100644
--- a/src/lib/libcrypto/asn1/x_req.c
+++ b/src/lib/libcrypto/asn1/x_req.c
@@ -73,7 +73,7 @@ int i2d_X509_REQ_INFO(X509_REQ_INFO *a, unsigned char **pp)
73 * allow some CA Software to accept the cert request. 73 * allow some CA Software to accept the cert request.
74 * It is not following the PKCS standards ... 74 * It is not following the PKCS standards ...
75 * PKCS#10 pg 5 75 * PKCS#10 pg 5
76 * attributes [0] IMPLICIT Attibutes 76 * attributes [0] IMPLICIT Attributes
77 * NOTE: no OPTIONAL ... so it *must* be there 77 * NOTE: no OPTIONAL ... so it *must* be there
78 */ 78 */
79 if (a->req_kludge) 79 if (a->req_kludge)
@@ -94,7 +94,7 @@ int i2d_X509_REQ_INFO(X509_REQ_INFO *a, unsigned char **pp)
94 /* this is a *nasty* hack reported to be required by some CA's. 94 /* this is a *nasty* hack reported to be required by some CA's.
95 * It is not following the PKCS standards ... 95 * It is not following the PKCS standards ...
96 * PKCS#10 pg 5 96 * PKCS#10 pg 5
97 * attributes [0] IMPLICIT Attibutes 97 * attributes [0] IMPLICIT Attributes
98 * NOTE: no OPTIONAL ... so it *must* be there 98 * NOTE: no OPTIONAL ... so it *must* be there
99 */ 99 */
100 if (a->req_kludge) 100 if (a->req_kludge)
@@ -126,7 +126,7 @@ X509_REQ_INFO *d2i_X509_REQ_INFO(X509_REQ_INFO **a, unsigned char **pp,
126 * have been reported as requiring it. 126 * have been reported as requiring it.
127 * It is not following the PKCS standards ... 127 * It is not following the PKCS standards ...
128 * PKCS#10 pg 5 128 * PKCS#10 pg 5
129 * attributes [0] IMPLICIT Attibutes 129 * attributes [0] IMPLICIT Attributes
130 * NOTE: no OPTIONAL ... so it *must* be there 130 * NOTE: no OPTIONAL ... so it *must* be there
131 */ 131 */
132 if (asn1_Finish(&c)) 132 if (asn1_Finish(&c))
@@ -147,7 +147,7 @@ X509_REQ_INFO *X509_REQ_INFO_new(void)
147 ASN1_CTX c; 147 ASN1_CTX c;
148 148
149 M_ASN1_New_Malloc(ret,X509_REQ_INFO); 149 M_ASN1_New_Malloc(ret,X509_REQ_INFO);
150 M_ASN1_New(ret->version,ASN1_INTEGER_new); 150 M_ASN1_New(ret->version,M_ASN1_INTEGER_new);
151 M_ASN1_New(ret->subject,X509_NAME_new); 151 M_ASN1_New(ret->subject,X509_NAME_new);
152 M_ASN1_New(ret->pubkey,X509_PUBKEY_new); 152 M_ASN1_New(ret->pubkey,X509_PUBKEY_new);
153 M_ASN1_New(ret->attributes,sk_X509_ATTRIBUTE_new_null); 153 M_ASN1_New(ret->attributes,sk_X509_ATTRIBUTE_new_null);
@@ -159,11 +159,11 @@ X509_REQ_INFO *X509_REQ_INFO_new(void)
159void X509_REQ_INFO_free(X509_REQ_INFO *a) 159void X509_REQ_INFO_free(X509_REQ_INFO *a)
160 { 160 {
161 if (a == NULL) return; 161 if (a == NULL) return;
162 ASN1_INTEGER_free(a->version); 162 M_ASN1_INTEGER_free(a->version);
163 X509_NAME_free(a->subject); 163 X509_NAME_free(a->subject);
164 X509_PUBKEY_free(a->pubkey); 164 X509_PUBKEY_free(a->pubkey);
165 sk_X509_ATTRIBUTE_pop_free(a->attributes,X509_ATTRIBUTE_free); 165 sk_X509_ATTRIBUTE_pop_free(a->attributes,X509_ATTRIBUTE_free);
166 Free((char *)a); 166 Free(a);
167 } 167 }
168 168
169int i2d_X509_REQ(X509_REQ *a, unsigned char **pp) 169int i2d_X509_REQ(X509_REQ *a, unsigned char **pp)
@@ -203,7 +203,7 @@ X509_REQ *X509_REQ_new(void)
203 ret->references=1; 203 ret->references=1;
204 M_ASN1_New(ret->req_info,X509_REQ_INFO_new); 204 M_ASN1_New(ret->req_info,X509_REQ_INFO_new);
205 M_ASN1_New(ret->sig_alg,X509_ALGOR_new); 205 M_ASN1_New(ret->sig_alg,X509_ALGOR_new);
206 M_ASN1_New(ret->signature,ASN1_BIT_STRING_new); 206 M_ASN1_New(ret->signature,M_ASN1_BIT_STRING_new);
207 return(ret); 207 return(ret);
208 M_ASN1_New_Error(ASN1_F_X509_REQ_NEW); 208 M_ASN1_New_Error(ASN1_F_X509_REQ_NEW);
209 } 209 }
@@ -229,8 +229,8 @@ void X509_REQ_free(X509_REQ *a)
229 229
230 X509_REQ_INFO_free(a->req_info); 230 X509_REQ_INFO_free(a->req_info);
231 X509_ALGOR_free(a->sig_alg); 231 X509_ALGOR_free(a->sig_alg);
232 ASN1_BIT_STRING_free(a->signature); 232 M_ASN1_BIT_STRING_free(a->signature);
233 Free((char *)a); 233 Free(a);
234 } 234 }
235 235
236 236