summaryrefslogtreecommitdiff
path: root/src/lib/libssl/man
diff options
context:
space:
mode:
authortb <>2024-05-08 08:20:08 +0000
committertb <>2024-05-08 08:20:08 +0000
commit3064d328febdb0dffc9cd69259663580fd1133b4 (patch)
treed7f8ba21cb647b42fe65ff27d943962a818d966a /src/lib/libssl/man
parentc46d931e06126b69de6000e5b24e54d9e8779194 (diff)
downloadopenbsd-3064d328febdb0dffc9cd69259663580fd1133b4.tar.gz
openbsd-3064d328febdb0dffc9cd69259663580fd1133b4.tar.bz2
openbsd-3064d328febdb0dffc9cd69259663580fd1133b4.zip
Simplify X509_REQ_get_extensions()
Now that we know the two OIDs we need to look for when checking for the extension list attribute in a certification request, we can simplify this quite a bit. There is one change of behavior. Attribute value sets are not supposed to be empty and it makes no sense to return an empty stack of extensions in that case, return NULL instead, matching BoringSSL. This removes last use of ext_nids and ext_nid_list[], so these two bits of unprotected global mutable state can now join the party in the attic. ok jsing
Diffstat (limited to 'src/lib/libssl/man')
0 files changed, 0 insertions, 0 deletions