Hello community,

here is the log from the commit of package snipl for openSUSE:Factory:NonFree 
checked in at 2017-12-29 12:35:38
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory:NonFree/snipl (Old)
 and      /work/SRC/openSUSE:Factory:NonFree/.snipl.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "snipl"

Fri Dec 29 12:35:38 2017 rev:25 rq:556029 version:0.3.0.0

Changes:
--------
--- /work/SRC/openSUSE:Factory:NonFree/snipl/snipl.changes      2017-11-10 
15:36:38.414999647 +0100
+++ /work/SRC/openSUSE:Factory:NonFree/.snipl.new/snipl.changes 2017-12-29 
12:35:41.593089064 +0100
@@ -1,0 +2,6 @@
+Mon Dec 11 17:02:01 UTC 2017 - [email protected]
+
+- Added snipl-sles15-openssl11.patch (bsc#1071405).
+  snipl fails to compile against openssl 1.1.0
+
+-------------------------------------------------------------------

New:
----
  snipl-sles15-openssl11.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ snipl.spec ++++++
--- /var/tmp/diff_new_pack.iOCuaj/_old  2017-12-29 12:35:42.032962472 +0100
+++ /var/tmp/diff_new_pack.iOCuaj/_new  2017-12-29 12:35:42.032962472 +0100
@@ -46,6 +46,7 @@
 Source2:        Z125-5589-05.txt
 Source99:       hwmcaapi.download
 Patch1:         snipl-0.3.0.0-hwmcaapidir.patch
+Patch2:         snipl-sles15-openssl11.patch
 
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 
@@ -58,6 +59,7 @@
 %prep
 %setup
 %patch1 -p1
+%patch2 -p1
 
 cp -p %SOURCE2 .
 mkdir hwmcaapi


++++++ snipl-sles15-openssl11.patch ++++++
Index: snipl-0.3.0.0/vmsmapi6.c
===================================================================
--- snipl-0.3.0.0.orig/vmsmapi6.c
+++ snipl-0.3.0.0/vmsmapi6.c
@@ -110,6 +110,7 @@ static int vm6_get_cert_attributes(struc
                                   char **name, char **fingerprint)
 {
        unsigned char sha[EVP_MAX_MD_SIZE];
+       char subjectname[2048];
        X509 *cert;
        X509_NAME *certname;
        int i;
@@ -151,7 +152,7 @@ static int vm6_get_cert_attributes(struc
                pos += 3;
        }
        sprintf(&buffer[pos], "%02x", sha[i]);
-       *name = strdup(cert->name);
+       *name = strdup(X509_NAME_oneline(X509_get_subject_name(cert), 
subjectname, sizeof(subjectname)));
 
        return 0;
 }

Reply via email to