static HA_RWLOCK_T *ssl_rwlocks;
-@@ -1716,8 +1728,8 @@ ssl_sock_do_create_cert(const char *servername, struct bind_conf *bind_conf, SSL
+@@ -1720,8 +1732,8 @@ ssl_sock_do_create_cert(const char *servername, struct bind_conf *bind_conf, SSL
ASN1_INTEGER_set(X509_get_serialNumber(newcrt), HA_ATOMIC_ADD(&ssl_ctx_serial, 1));
/* Set duration for the certificate */
goto mkcert_error;
/* set public key in the certificate */
-@@ -6387,7 +6399,7 @@ smp_fetch_ssl_x_notafter(const struct arg *args, struct sample *smp, const char
+@@ -6395,7 +6407,7 @@ smp_fetch_ssl_x_notafter(const struct arg *args, struct sample *smp, const char
goto out;
smp_trash = get_trash_chunk();
goto out;
smp->data.u.str = *smp_trash;
-@@ -6487,7 +6499,7 @@ smp_fetch_ssl_x_notbefore(const struct a
+@@ -6495,7 +6507,7 @@ smp_fetch_ssl_x_notbefore(const struct a
goto out;
smp_trash = get_trash_chunk();
goto out;
smp->data.u.str = *smp_trash;
-@@ -9068,7 +9080,9 @@ static void __ssl_sock_init(void)
+@@ -9076,7 +9088,9 @@ static void __ssl_sock_init(void)
#endif
xprt_register(XPRT_SSL, &ssl_sock);
#if (!defined(OPENSSL_NO_COMP) && !defined(SSL_OP_NO_COMPRESSION))
cm = SSL_COMP_get_compression_methods();
i = sk_SSL_COMP_num(cm);
-@@ -9077,7 +9091,7 @@ static void __ssl_sock_init(void)
+@@ -9085,7 +9099,7 @@ static void __ssl_sock_init(void)
}
#endif
ssl_locking_init();
#endif
#if (OPENSSL_VERSION_NUMBER >= 0x1000200fL && !defined OPENSSL_NO_TLSEXT && !defined OPENSSL_IS_BORINGSSL && !defined LIBRESSL_VERSION_NUMBER)
-@@ -9106,8 +9120,8 @@ static void __ssl_sock_init(void)
+@@ -9114,8 +9128,8 @@ static void __ssl_sock_init(void)
#else /* OPENSSL_IS_BORINGSSL */
OPENSSL_VERSION_TEXT
"\nRunning on OpenSSL version : %s%s",
#endif
memprintf(&ptr, "%s\nOpenSSL library supports TLS extensions : "
#if OPENSSL_VERSION_NUMBER < 0x00907000L
-@@ -9198,12 +9212,14 @@ static void __ssl_sock_deinit(void)
+@@ -9206,12 +9220,14 @@ static void __ssl_sock_deinit(void)
}
#endif