On 14/12/15 21:09, Steffan Karger wrote: > Previously, client certificate expiry warnings would only visible in the > server log, and server certificate expiry warnings in the client log. > Both after a (failed) connection attempt. This patch adds a warning to > log when a users own certificate has expired (or is not yet valid) to ease > problem diagnosis / error reporting. > > Note that this is just a warning, since on some systems (notably embedded > devices) there might be no correct time available. > > Signed-off-by: Steffan Karger <stef...@karger.me> > --- > src/openvpn/ssl.c | 3 +++ > src/openvpn/ssl_backend.h | 9 +++++++++ > src/openvpn/ssl_openssl.c | 27 +++++++++++++++++++++++++++ > src/openvpn/ssl_polarssl.c | 14 ++++++++++++++ > 4 files changed, 53 insertions(+) > > diff --git a/src/openvpn/ssl.c b/src/openvpn/ssl.c > index 887bd75..665fdd7 100644 > --- a/src/openvpn/ssl.c > +++ b/src/openvpn/ssl.c [...snip...] > > void > +tls_ctx_check_cert_time (const struct tls_root_ctx *ctx) > +{ > + int ret; > + const X509 *cert = SSL_CTX_get0_certificate(ctx->ctx);
Hi, Just tried to build openvpn on one of my laptops (Scientific Linux 7.1, openssl-1.0.1e-42.el7). And it explodes when reaching the SSL_CTX_get0_certificate(), it seems that support arrived in OpenSSL 1.0.2? Could that be right? Haven't had brainpower yet to dig deeper. I will retry a build on my work laptop too (RHEL 7.2) tomorrow, to see if this is an issue there too. -- kind regards, David Sommerseth -- kind regards, David Sommerseth