MINOR: ssl: new functions duplicate and free a ckch_store
ckchs_dup() alloc a new ckch_store and copy the content of its source.
ckchs_free() frees a ckch_store and its content.
diff --git a/src/ssl_sock.c b/src/ssl_sock.c
index cfc68e5..f8d8259 100644
--- a/src/ssl_sock.c
+++ b/src/ssl_sock.c
@@ -3454,6 +3454,75 @@
}
#endif
+/*
+ * Free a ckch_store and its ckch(s)
+ * The linked ckch_inst are not free'd
+ */
+void ckchs_free(struct ckch_store *ckchs)
+{
+ if (!ckchs)
+ return;
+
+#if HA_OPENSSL_VERSION_NUMBER >= 0x1000200fL
+ if (ckchs->multi) {
+ int n;
+
+ for (n = 0; n < SSL_SOCK_NUM_KEYTYPES; n++)
+ ssl_sock_free_cert_key_and_chain_contents(&ckchs->ckch[n]);
+ } else
+#endif
+ {
+ ssl_sock_free_cert_key_and_chain_contents(ckchs->ckch);
+ ckchs->ckch = NULL;
+ }
+
+ free(ckchs);
+}
+
+/* allocate and duplicate a ckch_store
+ * Return a new ckch_store or NULL */
+static struct ckch_store *ckchs_dup(const struct ckch_store *src)
+{
+ struct ckch_store *dst;
+ int pathlen;
+
+ pathlen = strlen(src->path);
+ dst = calloc(1, sizeof(*dst) + pathlen + 1);
+ if (!dst)
+ return NULL;
+ /* copy previous key */
+ memcpy(dst->path, src->path, pathlen + 1);
+ dst->multi = src->multi;
+ LIST_INIT(&dst->ckch_inst);
+
+ dst->ckch = calloc((src->multi ? SSL_SOCK_NUM_KEYTYPES : 1), sizeof(*dst->ckch));
+ if (!dst->ckch)
+ goto error;
+
+#if HA_OPENSSL_VERSION_NUMBER >= 0x1000200fL
+ if (src->multi) {
+ int n;
+
+ for (n = 0; n < SSL_SOCK_NUM_KEYTYPES; n++) {
+ if (&src->ckch[n]) {
+ if (!ssl_sock_copy_cert_key_and_chain(&src->ckch[n], &dst->ckch[n]))
+ goto error;
+ }
+ }
+ } else
+#endif
+ {
+ if (!ssl_sock_copy_cert_key_and_chain(src->ckch, dst->ckch))
+ goto error;
+ }
+
+ return dst;
+
+error:
+ ckchs_free(dst);
+
+ return NULL;
+}
/*
* lookup a path into the ckchs tree.