summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_cert.c
diff options
context:
space:
mode:
authorjsing <>2022-01-08 12:43:45 +0000
committerjsing <>2022-01-08 12:43:45 +0000
commitdc6c56e417f73129ab2e1f477f2816f0cb654ff5 (patch)
tree8a7527e5b21283646513b32c21a84fef811d965b /src/lib/libssl/ssl_cert.c
parent28e3801f3f0182c33d771dcddd72a444055cc7a1 (diff)
downloadopenbsd-dc6c56e417f73129ab2e1f477f2816f0cb654ff5.tar.gz
openbsd-dc6c56e417f73129ab2e1f477f2816f0cb654ff5.tar.bz2
openbsd-dc6c56e417f73129ab2e1f477f2816f0cb654ff5.zip
Rename CERT to SSL_CERT and CERT_PKEY to SSL_CERT_PKEY.
Nearly all structs in libssl start with an SSL_ suffix, rename CERT and CERT_PKEY for consistency. ok inoguchi@ tb@
Diffstat (limited to '')
-rw-r--r--src/lib/libssl/ssl_cert.c26
1 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libssl/ssl_cert.c b/src/lib/libssl/ssl_cert.c
index 173e217c8f..c735547393 100644
--- a/src/lib/libssl/ssl_cert.c
+++ b/src/lib/libssl/ssl_cert.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_cert.c,v 1.91 2022/01/07 16:45:06 jsing Exp $ */ 1/* $OpenBSD: ssl_cert.c,v 1.92 2022/01/08 12:43:44 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -158,12 +158,12 @@ SSL_get_ex_data_X509_STORE_CTX_idx(void)
158 return ssl_x509_store_ctx_idx; 158 return ssl_x509_store_ctx_idx;
159} 159}
160 160
161CERT * 161SSL_CERT *
162ssl_cert_new(void) 162ssl_cert_new(void)
163{ 163{
164 CERT *ret; 164 SSL_CERT *ret;
165 165
166 ret = calloc(1, sizeof(CERT)); 166 ret = calloc(1, sizeof(SSL_CERT));
167 if (ret == NULL) { 167 if (ret == NULL) {
168 SSLerrorx(ERR_R_MALLOC_FAILURE); 168 SSLerrorx(ERR_R_MALLOC_FAILURE);
169 return (NULL); 169 return (NULL);
@@ -173,13 +173,13 @@ ssl_cert_new(void)
173 return (ret); 173 return (ret);
174} 174}
175 175
176CERT * 176SSL_CERT *
177ssl_cert_dup(CERT *cert) 177ssl_cert_dup(SSL_CERT *cert)
178{ 178{
179 CERT *ret; 179 SSL_CERT *ret;
180 int i; 180 int i;
181 181
182 ret = calloc(1, sizeof(CERT)); 182 ret = calloc(1, sizeof(SSL_CERT));
183 if (ret == NULL) { 183 if (ret == NULL) {
184 SSLerrorx(ERR_R_MALLOC_FAILURE); 184 SSLerrorx(ERR_R_MALLOC_FAILURE);
185 return (NULL); 185 return (NULL);
@@ -269,7 +269,7 @@ ssl_cert_dup(CERT *cert)
269 269
270 270
271void 271void
272ssl_cert_free(CERT *c) 272ssl_cert_free(SSL_CERT *c)
273{ 273{
274 int i; 274 int i;
275 275
@@ -292,7 +292,7 @@ ssl_cert_free(CERT *c)
292} 292}
293 293
294int 294int
295ssl_cert_set0_chain(CERT *c, STACK_OF(X509) *chain) 295ssl_cert_set0_chain(SSL_CERT *c, STACK_OF(X509) *chain)
296{ 296{
297 if (c->key == NULL) 297 if (c->key == NULL)
298 return 0; 298 return 0;
@@ -304,7 +304,7 @@ ssl_cert_set0_chain(CERT *c, STACK_OF(X509) *chain)
304} 304}
305 305
306int 306int
307ssl_cert_set1_chain(CERT *c, STACK_OF(X509) *chain) 307ssl_cert_set1_chain(SSL_CERT *c, STACK_OF(X509) *chain)
308{ 308{
309 STACK_OF(X509) *new_chain = NULL; 309 STACK_OF(X509) *new_chain = NULL;
310 310
@@ -321,7 +321,7 @@ ssl_cert_set1_chain(CERT *c, STACK_OF(X509) *chain)
321} 321}
322 322
323int 323int
324ssl_cert_add0_chain_cert(CERT *c, X509 *cert) 324ssl_cert_add0_chain_cert(SSL_CERT *c, X509 *cert)
325{ 325{
326 if (c->key == NULL) 326 if (c->key == NULL)
327 return 0; 327 return 0;
@@ -337,7 +337,7 @@ ssl_cert_add0_chain_cert(CERT *c, X509 *cert)
337} 337}
338 338
339int 339int
340ssl_cert_add1_chain_cert(CERT *c, X509 *cert) 340ssl_cert_add1_chain_cert(SSL_CERT *c, X509 *cert)
341{ 341{
342 if (!ssl_cert_add0_chain_cert(c, cert)) 342 if (!ssl_cert_add0_chain_cert(c, cert))
343 return 0; 343 return 0;