diff options
author | beck <> | 2000-03-19 11:13:58 +0000 |
---|---|---|
committer | beck <> | 2000-03-19 11:13:58 +0000 |
commit | 796d609550df3a33fc11468741c5d2f6d3df4c11 (patch) | |
tree | 6c6d539061caa20372dad0ac4ddb1dfae2fbe7fe /src/lib/libcrypto/x509/x509_set.c | |
parent | 5be3114c1fd7e0dfea1e38d3abb4cbba75244419 (diff) | |
download | openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.tar.gz openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.tar.bz2 openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.zip |
OpenSSL 0.9.5 merge
*warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2
if you are using the ssl26 packages for ssh and other things to work you will
need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
Diffstat (limited to 'src/lib/libcrypto/x509/x509_set.c')
-rw-r--r-- | src/lib/libcrypto/x509/x509_set.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/src/lib/libcrypto/x509/x509_set.c b/src/lib/libcrypto/x509/x509_set.c index 5a6f7b414f..add842d17a 100644 --- a/src/lib/libcrypto/x509/x509_set.c +++ b/src/lib/libcrypto/x509/x509_set.c | |||
@@ -68,7 +68,7 @@ int X509_set_version(X509 *x, long version) | |||
68 | if (x == NULL) return(0); | 68 | if (x == NULL) return(0); |
69 | if (x->cert_info->version == NULL) | 69 | if (x->cert_info->version == NULL) |
70 | { | 70 | { |
71 | if ((x->cert_info->version=ASN1_INTEGER_new()) == NULL) | 71 | if ((x->cert_info->version=M_ASN1_INTEGER_new()) == NULL) |
72 | return(0); | 72 | return(0); |
73 | } | 73 | } |
74 | return(ASN1_INTEGER_set(x->cert_info->version,version)); | 74 | return(ASN1_INTEGER_set(x->cert_info->version,version)); |
@@ -82,10 +82,10 @@ int X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial) | |||
82 | in=x->cert_info->serialNumber; | 82 | in=x->cert_info->serialNumber; |
83 | if (in != serial) | 83 | if (in != serial) |
84 | { | 84 | { |
85 | in=ASN1_INTEGER_dup(serial); | 85 | in=M_ASN1_INTEGER_dup(serial); |
86 | if (in != NULL) | 86 | if (in != NULL) |
87 | { | 87 | { |
88 | ASN1_INTEGER_free(x->cert_info->serialNumber); | 88 | M_ASN1_INTEGER_free(x->cert_info->serialNumber); |
89 | x->cert_info->serialNumber=in; | 89 | x->cert_info->serialNumber=in; |
90 | } | 90 | } |
91 | } | 91 | } |
@@ -112,10 +112,10 @@ int X509_set_notBefore(X509 *x, ASN1_UTCTIME *tm) | |||
112 | in=x->cert_info->validity->notBefore; | 112 | in=x->cert_info->validity->notBefore; |
113 | if (in != tm) | 113 | if (in != tm) |
114 | { | 114 | { |
115 | in=ASN1_UTCTIME_dup(tm); | 115 | in=M_ASN1_UTCTIME_dup(tm); |
116 | if (in != NULL) | 116 | if (in != NULL) |
117 | { | 117 | { |
118 | ASN1_UTCTIME_free(x->cert_info->validity->notBefore); | 118 | M_ASN1_UTCTIME_free(x->cert_info->validity->notBefore); |
119 | x->cert_info->validity->notBefore=in; | 119 | x->cert_info->validity->notBefore=in; |
120 | } | 120 | } |
121 | } | 121 | } |
@@ -130,10 +130,10 @@ int X509_set_notAfter(X509 *x, ASN1_UTCTIME *tm) | |||
130 | in=x->cert_info->validity->notAfter; | 130 | in=x->cert_info->validity->notAfter; |
131 | if (in != tm) | 131 | if (in != tm) |
132 | { | 132 | { |
133 | in=ASN1_UTCTIME_dup(tm); | 133 | in=M_ASN1_UTCTIME_dup(tm); |
134 | if (in != NULL) | 134 | if (in != NULL) |
135 | { | 135 | { |
136 | ASN1_UTCTIME_free(x->cert_info->validity->notAfter); | 136 | M_ASN1_UTCTIME_free(x->cert_info->validity->notAfter); |
137 | x->cert_info->validity->notAfter=in; | 137 | x->cert_info->validity->notAfter=in; |
138 | } | 138 | } |
139 | } | 139 | } |