diff options
author | dtucker@openbsd.org <dtucker@openbsd.org> | 2021-07-12 08:08:57 +0200 |
---|---|---|
committer | Darren Tucker <dtucker@dtucker.net> | 2021-07-12 09:38:47 +0200 |
commit | 6c29b387cd64a57b0ec8ae7d2c8d02789d88fcc3 (patch) | |
tree | f833dd592e23bbf6622c1ca4262b033ac4b5595a | |
parent | upstream: silence redundant error message; reported by Fabian Stelzer (diff) | |
download | openssh-6c29b387cd64a57b0ec8ae7d2c8d02789d88fcc3.tar.xz openssh-6c29b387cd64a57b0ec8ae7d2c8d02789d88fcc3.zip |
upstream: Use existing format_absolute_time() function when
printing cert validity instead of doing it inline. Part of bz#3329.
OpenBSD-Commit-ID: a13d4e3c4f59644c23745eb02a09b2a4e717c00c
Diffstat (limited to '')
-rw-r--r-- | sshkey.c | 22 |
1 files changed, 5 insertions, 17 deletions
@@ -1,4 +1,4 @@ -/* $OpenBSD: sshkey.c,v 1.117 2021/07/05 01:21:07 dtucker Exp $ */ +/* $OpenBSD: sshkey.c,v 1.118 2021/07/12 06:08:57 dtucker Exp $ */ /* * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. * Copyright (c) 2008 Alexander von Gernler. All rights reserved. @@ -3166,28 +3166,16 @@ size_t sshkey_format_cert_validity(const struct sshkey_cert *cert, char *s, size_t l) { char from[32], to[32], ret[128]; - time_t tt; - struct tm *tm; *from = *to = '\0'; if (cert->valid_after == 0 && cert->valid_before == 0xffffffffffffffffULL) return strlcpy(s, "forever", l); - if (cert->valid_after != 0) { - /* XXX revisit INT_MAX in 2038 :) */ - tt = cert->valid_after > INT_MAX ? - INT_MAX : cert->valid_after; - tm = localtime(&tt); - strftime(from, sizeof(from), "%Y-%m-%dT%H:%M:%S", tm); - } - if (cert->valid_before != 0xffffffffffffffffULL) { - /* XXX revisit INT_MAX in 2038 :) */ - tt = cert->valid_before > INT_MAX ? - INT_MAX : cert->valid_before; - tm = localtime(&tt); - strftime(to, sizeof(to), "%Y-%m-%dT%H:%M:%S", tm); - } + if (cert->valid_after != 0) + format_absolute_time(cert->valid_after, from, sizeof(from)); + if (cert->valid_before != 0xffffffffffffffffULL) + format_absolute_time(cert->valid_before, to, sizeof(to)); if (cert->valid_after == 0) snprintf(ret, sizeof(ret), "before %s", to); |