| Index: openssl/apps/asn1pars.c
|
| ===================================================================
|
| --- openssl/apps/asn1pars.c (revision 105093)
|
| +++ openssl/apps/asn1pars.c (working copy)
|
| @@ -96,7 +96,7 @@
|
| unsigned char *tmpbuf;
|
| const unsigned char *ctmpbuf;
|
| BUF_MEM *buf=NULL;
|
| - STACK *osk=NULL;
|
| + STACK_OF(OPENSSL_STRING) *osk=NULL;
|
| ASN1_TYPE *at=NULL;
|
|
|
| informat=FORMAT_PEM;
|
| @@ -113,7 +113,7 @@
|
| prog=argv[0];
|
| argc--;
|
| argv++;
|
| - if ((osk=sk_new_null()) == NULL)
|
| + if ((osk=sk_OPENSSL_STRING_new_null()) == NULL)
|
| {
|
| BIO_printf(bio_err,"Memory allocation failure\n");
|
| goto end;
|
| @@ -169,7 +169,7 @@
|
| else if (strcmp(*argv,"-strparse") == 0)
|
| {
|
| if (--argc < 1) goto bad;
|
| - sk_push(osk,*(++argv));
|
| + sk_OPENSSL_STRING_push(osk,*(++argv));
|
| }
|
| else if (strcmp(*argv,"-genstr") == 0)
|
| {
|
| @@ -302,18 +302,18 @@
|
|
|
| /* If any structs to parse go through in sequence */
|
|
|
| - if (sk_num(osk))
|
| + if (sk_OPENSSL_STRING_num(osk))
|
| {
|
| tmpbuf=(unsigned char *)str;
|
| tmplen=num;
|
| - for (i=0; i<sk_num(osk); i++)
|
| + for (i=0; i<sk_OPENSSL_STRING_num(osk); i++)
|
| {
|
| ASN1_TYPE *atmp;
|
| int typ;
|
| - j=atoi(sk_value(osk,i));
|
| + j=atoi(sk_OPENSSL_STRING_value(osk,i));
|
| if (j == 0)
|
| {
|
| - BIO_printf(bio_err,"'%s' is an invalid number\n",sk_value(osk,i));
|
| + BIO_printf(bio_err,"'%s' is an invalid number\n",sk_OPENSSL_STRING_value(osk,i));
|
| continue;
|
| }
|
| tmpbuf+=j;
|
| @@ -378,7 +378,7 @@
|
| ERR_print_errors(bio_err);
|
| if (buf != NULL) BUF_MEM_free(buf);
|
| if (at != NULL) ASN1_TYPE_free(at);
|
| - if (osk != NULL) sk_free(osk);
|
| + if (osk != NULL) sk_OPENSSL_STRING_free(osk);
|
| OBJ_cleanup();
|
| apps_shutdown();
|
| OPENSSL_EXIT(ret);
|
| @@ -408,6 +408,7 @@
|
|
|
| atyp = ASN1_generate_nconf(genstr, cnf);
|
| NCONF_free(cnf);
|
| + cnf = NULL;
|
|
|
| if (!atyp)
|
| return -1;
|
|
|