diff options
author | beck <> | 2000-03-19 11:13:58 +0000 |
---|---|---|
committer | beck <> | 2000-03-19 11:13:58 +0000 |
commit | 796d609550df3a33fc11468741c5d2f6d3df4c11 (patch) | |
tree | 6c6d539061caa20372dad0ac4ddb1dfae2fbe7fe /src/lib/libcrypto/asn1/x_req.c | |
parent | 5be3114c1fd7e0dfea1e38d3abb4cbba75244419 (diff) | |
download | openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.tar.gz openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.tar.bz2 openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.zip |
OpenSSL 0.9.5 merge
*warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2
if you are using the ssl26 packages for ssh and other things to work you will
need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
Diffstat (limited to 'src/lib/libcrypto/asn1/x_req.c')
-rw-r--r-- | src/lib/libcrypto/asn1/x_req.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libcrypto/asn1/x_req.c b/src/lib/libcrypto/asn1/x_req.c index 9b1d6abe64..0cd572ee73 100644 --- a/src/lib/libcrypto/asn1/x_req.c +++ b/src/lib/libcrypto/asn1/x_req.c | |||
@@ -73,7 +73,7 @@ int i2d_X509_REQ_INFO(X509_REQ_INFO *a, unsigned char **pp) | |||
73 | * allow some CA Software to accept the cert request. | 73 | * allow some CA Software to accept the cert request. |
74 | * It is not following the PKCS standards ... | 74 | * It is not following the PKCS standards ... |
75 | * PKCS#10 pg 5 | 75 | * PKCS#10 pg 5 |
76 | * attributes [0] IMPLICIT Attibutes | 76 | * attributes [0] IMPLICIT Attributes |
77 | * NOTE: no OPTIONAL ... so it *must* be there | 77 | * NOTE: no OPTIONAL ... so it *must* be there |
78 | */ | 78 | */ |
79 | if (a->req_kludge) | 79 | if (a->req_kludge) |
@@ -94,7 +94,7 @@ int i2d_X509_REQ_INFO(X509_REQ_INFO *a, unsigned char **pp) | |||
94 | /* this is a *nasty* hack reported to be required by some CA's. | 94 | /* this is a *nasty* hack reported to be required by some CA's. |
95 | * It is not following the PKCS standards ... | 95 | * It is not following the PKCS standards ... |
96 | * PKCS#10 pg 5 | 96 | * PKCS#10 pg 5 |
97 | * attributes [0] IMPLICIT Attibutes | 97 | * attributes [0] IMPLICIT Attributes |
98 | * NOTE: no OPTIONAL ... so it *must* be there | 98 | * NOTE: no OPTIONAL ... so it *must* be there |
99 | */ | 99 | */ |
100 | if (a->req_kludge) | 100 | if (a->req_kludge) |
@@ -126,7 +126,7 @@ X509_REQ_INFO *d2i_X509_REQ_INFO(X509_REQ_INFO **a, unsigned char **pp, | |||
126 | * have been reported as requiring it. | 126 | * have been reported as requiring it. |
127 | * It is not following the PKCS standards ... | 127 | * It is not following the PKCS standards ... |
128 | * PKCS#10 pg 5 | 128 | * PKCS#10 pg 5 |
129 | * attributes [0] IMPLICIT Attibutes | 129 | * attributes [0] IMPLICIT Attributes |
130 | * NOTE: no OPTIONAL ... so it *must* be there | 130 | * NOTE: no OPTIONAL ... so it *must* be there |
131 | */ | 131 | */ |
132 | if (asn1_Finish(&c)) | 132 | if (asn1_Finish(&c)) |
@@ -147,7 +147,7 @@ X509_REQ_INFO *X509_REQ_INFO_new(void) | |||
147 | ASN1_CTX c; | 147 | ASN1_CTX c; |
148 | 148 | ||
149 | M_ASN1_New_Malloc(ret,X509_REQ_INFO); | 149 | M_ASN1_New_Malloc(ret,X509_REQ_INFO); |
150 | M_ASN1_New(ret->version,ASN1_INTEGER_new); | 150 | M_ASN1_New(ret->version,M_ASN1_INTEGER_new); |
151 | M_ASN1_New(ret->subject,X509_NAME_new); | 151 | M_ASN1_New(ret->subject,X509_NAME_new); |
152 | M_ASN1_New(ret->pubkey,X509_PUBKEY_new); | 152 | M_ASN1_New(ret->pubkey,X509_PUBKEY_new); |
153 | M_ASN1_New(ret->attributes,sk_X509_ATTRIBUTE_new_null); | 153 | M_ASN1_New(ret->attributes,sk_X509_ATTRIBUTE_new_null); |
@@ -159,11 +159,11 @@ X509_REQ_INFO *X509_REQ_INFO_new(void) | |||
159 | void X509_REQ_INFO_free(X509_REQ_INFO *a) | 159 | void X509_REQ_INFO_free(X509_REQ_INFO *a) |
160 | { | 160 | { |
161 | if (a == NULL) return; | 161 | if (a == NULL) return; |
162 | ASN1_INTEGER_free(a->version); | 162 | M_ASN1_INTEGER_free(a->version); |
163 | X509_NAME_free(a->subject); | 163 | X509_NAME_free(a->subject); |
164 | X509_PUBKEY_free(a->pubkey); | 164 | X509_PUBKEY_free(a->pubkey); |
165 | sk_X509_ATTRIBUTE_pop_free(a->attributes,X509_ATTRIBUTE_free); | 165 | sk_X509_ATTRIBUTE_pop_free(a->attributes,X509_ATTRIBUTE_free); |
166 | Free((char *)a); | 166 | Free(a); |
167 | } | 167 | } |
168 | 168 | ||
169 | int i2d_X509_REQ(X509_REQ *a, unsigned char **pp) | 169 | int i2d_X509_REQ(X509_REQ *a, unsigned char **pp) |
@@ -203,7 +203,7 @@ X509_REQ *X509_REQ_new(void) | |||
203 | ret->references=1; | 203 | ret->references=1; |
204 | M_ASN1_New(ret->req_info,X509_REQ_INFO_new); | 204 | M_ASN1_New(ret->req_info,X509_REQ_INFO_new); |
205 | M_ASN1_New(ret->sig_alg,X509_ALGOR_new); | 205 | M_ASN1_New(ret->sig_alg,X509_ALGOR_new); |
206 | M_ASN1_New(ret->signature,ASN1_BIT_STRING_new); | 206 | M_ASN1_New(ret->signature,M_ASN1_BIT_STRING_new); |
207 | return(ret); | 207 | return(ret); |
208 | M_ASN1_New_Error(ASN1_F_X509_REQ_NEW); | 208 | M_ASN1_New_Error(ASN1_F_X509_REQ_NEW); |
209 | } | 209 | } |
@@ -229,8 +229,8 @@ void X509_REQ_free(X509_REQ *a) | |||
229 | 229 | ||
230 | X509_REQ_INFO_free(a->req_info); | 230 | X509_REQ_INFO_free(a->req_info); |
231 | X509_ALGOR_free(a->sig_alg); | 231 | X509_ALGOR_free(a->sig_alg); |
232 | ASN1_BIT_STRING_free(a->signature); | 232 | M_ASN1_BIT_STRING_free(a->signature); |
233 | Free((char *)a); | 233 | Free(a); |
234 | } | 234 | } |
235 | 235 | ||
236 | 236 | ||