Your patch (v3) has been applied to the master and release/2.4 branch.
Small side note: I assume that RSA_meth_new() can fail and return NULL
in OpenSSL 1.1? Because for 1.0, the "check_malloc_return(rsa_meth)" call
isn't necessary, as ALLOC_OBJ_CLEAR() would call ALLOC_OBJ() and that
already checks... (mentioning this here in case someone wonders and goes
to the list archives).
commit 09776c5b52df13121504e07894a26d5cd1883317 (master)
commit 44bac2926d6b445a7773a24bb7c295b54f4be35e (release/2.4)
Author: Emmanuel Deloget
Date: Thu Feb 23 15:35:56 2017 +0100
OpenSSL: don't use direct access to the internal of RSA_METHOD
Signed-off-by: Emmanuel Deloget <[email protected]>
Acked-by: Steffan Karger <[email protected]>
Message-Id:
<79d89580db6fd92c059dabc4f5f4d83b72bb9d3d.1487859361.git.log...@free.fr>
URL:
https://www.mail-archive.com/[email protected]/msg14175.html
Signed-off-by: Gert Doering <[email protected]>
--
kind regards,
Gert Doering
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openvpn-devel