diff options
| author | beck <> | 2000-12-15 02:58:47 +0000 |
|---|---|---|
| committer | beck <> | 2000-12-15 02:58:47 +0000 |
| commit | 9200bb13d15da4b2a23e6bc92c20e95b74aa2113 (patch) | |
| tree | 5c52d628ec1e34be76e7ef2a4235d248b7c44d24 /src/lib/libcrypto/x509/x509_set.c | |
| parent | e131d25072e3d4197ba4b9bcc0d1b27d34d6488d (diff) | |
| download | openbsd-9200bb13d15da4b2a23e6bc92c20e95b74aa2113.tar.gz openbsd-9200bb13d15da4b2a23e6bc92c20e95b74aa2113.tar.bz2 openbsd-9200bb13d15da4b2a23e6bc92c20e95b74aa2113.zip | |
openssl-engine-0.9.6 merge
Diffstat (limited to 'src/lib/libcrypto/x509/x509_set.c')
| -rw-r--r-- | src/lib/libcrypto/x509/x509_set.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/libcrypto/x509/x509_set.c b/src/lib/libcrypto/x509/x509_set.c index add842d17a..aaf61ca062 100644 --- a/src/lib/libcrypto/x509/x509_set.c +++ b/src/lib/libcrypto/x509/x509_set.c | |||
| @@ -104,36 +104,36 @@ int X509_set_subject_name(X509 *x, X509_NAME *name) | |||
| 104 | return(X509_NAME_set(&x->cert_info->subject,name)); | 104 | return(X509_NAME_set(&x->cert_info->subject,name)); |
| 105 | } | 105 | } |
| 106 | 106 | ||
| 107 | int X509_set_notBefore(X509 *x, ASN1_UTCTIME *tm) | 107 | int X509_set_notBefore(X509 *x, ASN1_TIME *tm) |
| 108 | { | 108 | { |
| 109 | ASN1_UTCTIME *in; | 109 | ASN1_TIME *in; |
| 110 | 110 | ||
| 111 | if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); | 111 | if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); |
| 112 | in=x->cert_info->validity->notBefore; | 112 | in=x->cert_info->validity->notBefore; |
| 113 | if (in != tm) | 113 | if (in != tm) |
| 114 | { | 114 | { |
| 115 | in=M_ASN1_UTCTIME_dup(tm); | 115 | in=M_ASN1_TIME_dup(tm); |
| 116 | if (in != NULL) | 116 | if (in != NULL) |
| 117 | { | 117 | { |
| 118 | M_ASN1_UTCTIME_free(x->cert_info->validity->notBefore); | 118 | M_ASN1_TIME_free(x->cert_info->validity->notBefore); |
| 119 | x->cert_info->validity->notBefore=in; | 119 | x->cert_info->validity->notBefore=in; |
| 120 | } | 120 | } |
| 121 | } | 121 | } |
| 122 | return(in != NULL); | 122 | return(in != NULL); |
| 123 | } | 123 | } |
| 124 | 124 | ||
| 125 | int X509_set_notAfter(X509 *x, ASN1_UTCTIME *tm) | 125 | int X509_set_notAfter(X509 *x, ASN1_TIME *tm) |
| 126 | { | 126 | { |
| 127 | ASN1_UTCTIME *in; | 127 | ASN1_TIME *in; |
| 128 | 128 | ||
| 129 | if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); | 129 | if ((x == NULL) || (x->cert_info->validity == NULL)) return(0); |
| 130 | in=x->cert_info->validity->notAfter; | 130 | in=x->cert_info->validity->notAfter; |
| 131 | if (in != tm) | 131 | if (in != tm) |
| 132 | { | 132 | { |
| 133 | in=M_ASN1_UTCTIME_dup(tm); | 133 | in=M_ASN1_TIME_dup(tm); |
| 134 | if (in != NULL) | 134 | if (in != NULL) |
| 135 | { | 135 | { |
| 136 | M_ASN1_UTCTIME_free(x->cert_info->validity->notAfter); | 136 | M_ASN1_TIME_free(x->cert_info->validity->notAfter); |
| 137 | x->cert_info->validity->notAfter=in; | 137 | x->cert_info->validity->notAfter=in; |
| 138 | } | 138 | } |
| 139 | } | 139 | } |
