summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/objects/obj_dat.c
diff options
context:
space:
mode:
authortb <>2024-05-08 08:20:08 +0000
committertb <>2024-05-08 08:20:08 +0000
commit0545b7fda04ee1a8a0fcc9978f5622784b152278 (patch)
treed7f8ba21cb647b42fe65ff27d943962a818d966a /src/lib/libcrypto/objects/obj_dat.c
parentffb8206b50bbd81b1f29efa652218fd949b207af (diff)
downloadopenbsd-0545b7fda04ee1a8a0fcc9978f5622784b152278.tar.gz
openbsd-0545b7fda04ee1a8a0fcc9978f5622784b152278.tar.bz2
openbsd-0545b7fda04ee1a8a0fcc9978f5622784b152278.zip
Simplify X509_REQ_get_extensions()
Now that we know the two OIDs we need to look for when checking for the extension list attribute in a certification request, we can simplify this quite a bit. There is one change of behavior. Attribute value sets are not supposed to be empty and it makes no sense to return an empty stack of extensions in that case, return NULL instead, matching BoringSSL. This removes last use of ext_nids and ext_nid_list[], so these two bits of unprotected global mutable state can now join the party in the attic. ok jsing
Diffstat (limited to 'src/lib/libcrypto/objects/obj_dat.c')
0 files changed, 0 insertions, 0 deletions