@@ -4562,7 +4562,7 @@ parse_keygen_primary(rnp_ffi_t ffi,
45624562 return nullptr ;
45634563 }
45644564 /* Parse common key/subkey fields */
4565- if (!parse_keygen_common_fields (jso, cert.flags , cert.expiration , prot)) {
4565+ if (!parse_keygen_common_fields (jso, cert.flags , cert.key_expiration , prot)) {
45664566 return nullptr ;
45674567 }
45684568 /* UserID */
@@ -4597,7 +4597,7 @@ parse_keygen_sub(rnp_ffi_t ffi,
45974597 return nullptr ;
45984598 }
45994599 /* Parse common with primary key fields */
4600- if (!parse_keygen_common_fields (jso, binding.flags , binding.expiration , prot)) {
4600+ if (!parse_keygen_common_fields (jso, binding.flags , binding.key_expiration , prot)) {
46014601 return nullptr ;
46024602 }
46034603 /* Do not allow unknown extra fields */
@@ -4650,7 +4650,7 @@ gen_json_primary_key(rnp_ffi_t ffi,
46504650 bool protect)
46514651{
46524652 rnp::CertParams cert;
4653- cert.expiration = DEFAULT_KEY_EXPIRATION;
4653+ cert.key_expiration = DEFAULT_KEY_EXPIRATION;
46544654
46554655 auto keygen = parse_keygen_primary (ffi, jsoparams, cert, prot);
46564656 if (!keygen) {
@@ -4687,7 +4687,7 @@ gen_json_subkey(rnp_ffi_t ffi,
46874687 rnp::BindingParams binding;
46884688 rnp_key_protection_params_t prot = {};
46894689
4690- binding.expiration = DEFAULT_KEY_EXPIRATION;
4690+ binding.key_expiration = DEFAULT_KEY_EXPIRATION;
46914691 auto keygen = parse_keygen_sub (ffi, jsoparams, binding, prot);
46924692 if (!keygen) {
46934693 return RNP_ERROR_BAD_PARAMETERS;
@@ -5101,7 +5101,7 @@ try {
51015101 *op = new rnp_op_generate_st (ffi, key_alg);
51025102 (*op)->primary = true ;
51035103 (*op)->cert .flags = default_key_flags (key_alg, false );
5104- (*op)->cert .expiration = DEFAULT_KEY_EXPIRATION;
5104+ (*op)->cert .key_expiration = DEFAULT_KEY_EXPIRATION;
51055105
51065106 return RNP_SUCCESS;
51075107}
@@ -5134,7 +5134,7 @@ try {
51345134 *op = new rnp_op_generate_st (ffi, key_alg);
51355135 (*op)->primary = false ;
51365136 (*op)->binding .flags = default_key_flags (key_alg, true );
5137- (*op)->binding .expiration = DEFAULT_KEY_EXPIRATION;
5137+ (*op)->binding .key_expiration = DEFAULT_KEY_EXPIRATION;
51385138 (*op)->primary_sec = primary->sec ;
51395139 (*op)->primary_pub = primary->pub ;
51405140
@@ -5341,9 +5341,9 @@ try {
53415341 return RNP_ERROR_NULL_POINTER;
53425342 }
53435343 if (op->primary ) {
5344- op->cert .expiration = expiration;
5344+ op->cert .key_expiration = expiration;
53455345 } else {
5346- op->binding .expiration = expiration;
5346+ op->binding .key_expiration = expiration;
53475347 }
53485348 return RNP_SUCCESS;
53495349}
@@ -5704,7 +5704,7 @@ try {
57045704 rnp::CertParams info;
57055705 info.userid = uid;
57065706 info.flags = key_flags;
5707- info.expiration = expiration;
5707+ info.key_expiration = expiration;
57085708 info.primary = primary;
57095709
57105710 /* obtain and unlok secret key */
0 commit comments