/* Appease indent(1) */
#define x509_stack_t STACK_OF(X509)
-#define x509_extension_stack_t STACK_OF(X509_EXTENSION)
#define general_name_stack_t STACK_OF(GENERAL_NAME)
#define ssl_cipher_stack_t STACK_OF(SSL_CIPHER)
#define ssl_comp_stack_t STACK_OF(SSL_COMP)
{
TLS_CERTS *new = (TLS_CERTS *) mymalloc(sizeof(*new));
- CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509);
+ X509_up_ref(x);
new->cert = x;
new->next = d->certs;
d->certs = new;
static int push_ext(X509 *cert, X509_EXTENSION *ext)
{
- x509_extension_stack_t *exts;
-
if (ext) {
- if ((exts = cert->cert_info->extensions) == 0)
- exts = cert->cert_info->extensions = sk_X509_EXTENSION_new_null();
- if (exts && sk_X509_EXTENSION_push(exts, ext))
+ if (X509_add_ext(cert, ext, -1))
return 1;
X509_EXTENSION_free(ext);
}
if (cert) {
if (trusted && !X509_add1_trust_object(cert, serverAuth))
msg_fatal("out of memory");
- CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
+ X509_up_ref(cert);
if (!sk_X509_push(*xs, cert))
msg_fatal("out of memory");
}
if (TLScontext->errorcert != 0)
X509_free(TLScontext->errorcert);
if (errorcert != 0)
- CRYPTO_add(&errorcert->references, 1, CRYPTO_LOCK_X509);
+ X509_up_ref(errorcert);
TLScontext->errorcert = errorcert;
TLScontext->errorcode = errorcode;
TLScontext->errordepth = depth;