Your patch (v3) has been applied to the master and release/2.4 branch.

Small side note: I assume that RSA_meth_new() can fail and return NULL
in OpenSSL 1.1?  Because for 1.0, the "check_malloc_return(rsa_meth)" call 
isn't necessary, as ALLOC_OBJ_CLEAR() would call ALLOC_OBJ() and that
already checks...  (mentioning this here in case someone wonders and goes
to the list archives).

commit 09776c5b52df13121504e07894a26d5cd1883317 (master)
commit 44bac2926d6b445a7773a24bb7c295b54f4be35e (release/2.4)
Author: Emmanuel Deloget
Date:   Thu Feb 23 15:35:56 2017 +0100

     OpenSSL: don't use direct access to the internal of RSA_METHOD

     Signed-off-by: Emmanuel Deloget <[email protected]>
     Acked-by: Steffan Karger <[email protected]>
     Message-Id: 
<79d89580db6fd92c059dabc4f5f4d83b72bb9d3d.1487859361.git.log...@free.fr>
     URL: 
https://www.mail-archive.com/[email protected]/msg14175.html
     Signed-off-by: Gert Doering <[email protected]>


--
kind regards,

Gert Doering


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to