merge the control file and the .ipk file targets into one to prevent them from going...
[openwrt.git] / package / wpa_supplicant / patches / 100-timestamp_check.patch
1 --- a/src/tls/x509v3.c
2 +++ b/src/tls/x509v3.c
3 @@ -1591,8 +1591,11 @@ int x509_certificate_chain_validate(stru
4 if (chain_trusted)
5 continue;
6
7 - if ((unsigned long) now.sec <
8 + if (
9 +#ifndef NO_TIMESTAMP_CHECK
10 + (unsigned long) now.sec <
11 (unsigned long) cert->not_before ||
12 +#endif
13 (unsigned long) now.sec >
14 (unsigned long) cert->not_after) {
15 wpa_printf(MSG_INFO, "X509: Certificate not valid "
This page took 0.049746 seconds and 5 git commands to generate.