CLEANUP: ssl: rename ssl_get_issuer_chain to ssl_get0_issuer_chain
Rename ssl_get_issuer_chain to ssl_get0_issuer_chain to be consistent
with openssl >= 1.0.2 API.
diff --git a/src/ssl_sock.c b/src/ssl_sock.c
index 45a650a..86fa1a3 100644
--- a/src/ssl_sock.c
+++ b/src/ssl_sock.c
@@ -161,7 +161,7 @@
int nb_engines = 0;
static struct eb_root cert_issuer_tree = EB_ROOT; /* issuers tree from "issuers-chain-path" */
-static struct issuer_chain* ssl_get_issuer_chain(X509 *cert);
+static struct issuer_chain* ssl_get0_issuer_chain(X509 *cert);
static struct {
char *crt_base; /* base directory path for certificates */
@@ -3629,7 +3629,7 @@
} else {
/* Find Certificate Chain in global */
struct issuer_chain *issuer;
- issuer = ssl_get_issuer_chain(ckch->cert);
+ issuer = ssl_get0_issuer_chain(ckch->cert);
if (issuer)
find_chain = issuer->chain;
}
@@ -10166,7 +10166,7 @@
return ret;
}
-static struct issuer_chain* ssl_get_issuer_chain(X509 *cert)
+static struct issuer_chain* ssl_get0_issuer_chain(X509 *cert)
{
AUTHORITY_KEYID *akid;
struct issuer_chain *issuer = NULL;
@@ -11268,7 +11268,7 @@
chain = ckchs->ckch->chain;
if (chain == NULL) {
struct issuer_chain *issuer;
- issuer = ssl_get_issuer_chain(ckchs->ckch->cert);
+ issuer = ssl_get0_issuer_chain(ckchs->ckch->cert);
if (issuer) {
chain = issuer->chain;
chunk_appendf(out, "Chain Filename: ");