Add support for dynamically created and destroyed mutexes. This will
[openssl.git] / crypto / pkcs12 / p12_sbag.c
index 7087294739014e4b77a758a4ac80ba84a1f0edc5..64ac32ee6fdb8698d13d8921f78e61f91095f438 100644 (file)
@@ -81,8 +81,9 @@ int i2d_PKCS12_SAFEBAG(PKCS12_SAFEBAG *a, unsigned char **pp)
                break;
 
                case NID_safeContentsBag:
-                       M_ASN1_I2D_len_EXP_SEQUENCE_opt (a->value.safes,
-                                i2d_PKCS12_SAFEBAG, 0, V_ASN1_SEQUENCE, v);
+                       M_ASN1_I2D_len_EXP_SEQUENCE_opt_type
+                         (PKCS12_SAFEBAG, a->value.safes, i2d_PKCS12_SAFEBAG,
+                          0, V_ASN1_SEQUENCE, v);
                break;
 
                case NID_certBag:
@@ -98,7 +99,7 @@ int i2d_PKCS12_SAFEBAG(PKCS12_SAFEBAG *a, unsigned char **pp)
                break;
        }
 
-       M_ASN1_I2D_len_SET (a->attrib, i2d_X509_ATTRIBUTE);
+       M_ASN1_I2D_len_SET_type (X509_ATTRIBUTE,a->attrib, i2d_X509_ATTRIBUTE);
 
        M_ASN1_I2D_seq_total ();
        
@@ -117,8 +118,9 @@ int i2d_PKCS12_SAFEBAG(PKCS12_SAFEBAG *a, unsigned char **pp)
                break;
 
                case NID_safeContentsBag:
-                       M_ASN1_I2D_put_EXP_SEQUENCE_opt (a->value.safes,
-                                i2d_PKCS12_SAFEBAG, 0, V_ASN1_SEQUENCE, v);
+                       M_ASN1_I2D_put_EXP_SEQUENCE_opt_type
+                         (PKCS12_SAFEBAG, a->value.safes, i2d_PKCS12_SAFEBAG,
+                          0, V_ASN1_SEQUENCE, v);
                break;
 
                case NID_certBag:
@@ -134,7 +136,7 @@ int i2d_PKCS12_SAFEBAG(PKCS12_SAFEBAG *a, unsigned char **pp)
                break;
        }
 
-       M_ASN1_I2D_put_SET (a->attrib, i2d_X509_ATTRIBUTE);
+       M_ASN1_I2D_put_SET_type (X509_ATTRIBUTE, a->attrib, i2d_X509_ATTRIBUTE);
 
        M_ASN1_I2D_finish();
 }
@@ -146,7 +148,7 @@ PKCS12_SAFEBAG *PKCS12_SAFEBAG_new(void)
        M_ASN1_New_Malloc(ret, PKCS12_SAFEBAG);
        ret->type=NULL;
        ret->value.other=NULL;
-       M_ASN1_New(ret->attrib, sk_new_null);
+       M_ASN1_New(ret->attrib, sk_X509_ATTRIBUTE_new_null);
        ret->rest=NULL;
        return (ret);
        M_ASN1_New_Error(ASN1_F_PKCS12_SAFEBAG_NEW);
@@ -175,9 +177,10 @@ PKCS12_SAFEBAG *d2i_PKCS12_SAFEBAG(PKCS12_SAFEBAG **a, unsigned char **pp,
                break;
 
                case NID_safeContentsBag:
-                       M_ASN1_D2I_get_EXP_set_opt(ret->value.safes,
-                               d2i_PKCS12_SAFEBAG, PKCS12_SAFEBAG_free,
-                                                        0, V_ASN1_SEQUENCE);
+                       M_ASN1_D2I_get_EXP_set_opt_type
+                         (PKCS12_SAFEBAG, ret->value.safes,
+                          d2i_PKCS12_SAFEBAG, PKCS12_SAFEBAG_free, 0,
+                          V_ASN1_SEQUENCE);
                break;
 
                case NID_certBag:
@@ -192,8 +195,8 @@ PKCS12_SAFEBAG *d2i_PKCS12_SAFEBAG(PKCS12_SAFEBAG **a, unsigned char **pp,
                                                         d2i_ASN1_TYPE, 0);
                break;
        }
-       M_ASN1_D2I_get_set_opt(ret->attrib, d2i_X509_ATTRIBUTE,
-                                                        X509_ATTRIBUTE_free);
+       M_ASN1_D2I_get_set_opt_type(X509_ATTRIBUTE,ret->attrib,
+                                   d2i_X509_ATTRIBUTE,X509_ATTRIBUTE_free);
        M_ASN1_D2I_Finish(a, PKCS12_SAFEBAG_free, ASN1_F_D2I_PKCS12_SAFEBAG);
 }
 
@@ -222,6 +225,10 @@ void PKCS12_SAFEBAG_free (PKCS12_SAFEBAG *a)
        }
 
        ASN1_OBJECT_free (a->type);
-       sk_pop_free (a->attrib, X509_ATTRIBUTE_free);
-       Free ((char *)a);
+       sk_X509_ATTRIBUTE_pop_free (a->attrib, X509_ATTRIBUTE_free);
+       OPENSSL_free (a);
 }
+
+IMPLEMENT_STACK_OF(PKCS12_SAFEBAG)
+IMPLEMENT_ASN1_SET_OF(PKCS12_SAFEBAG)
+IMPLEMENT_PKCS12_STACK_OF(PKCS12_SAFEBAG)