Your patch (v3) has been applied to the master and release/2.4 branch. Small side note: I assume that RSA_meth_new() can fail and return NULL in OpenSSL 1.1? Because for 1.0, the "check_malloc_return(rsa_meth)" call isn't necessary, as ALLOC_OBJ_CLEAR() would call ALLOC_OBJ() and that already checks... (mentioning this here in case someone wonders and goes to the list archives).
commit 09776c5b52df13121504e07894a26d5cd1883317 (master) commit 44bac2926d6b445a7773a24bb7c295b54f4be35e (release/2.4) Author: Emmanuel Deloget Date: Thu Feb 23 15:35:56 2017 +0100 OpenSSL: don't use direct access to the internal of RSA_METHOD Signed-off-by: Emmanuel Deloget <log...@free.fr> Acked-by: Steffan Karger <steffan.kar...@fox-it.com> Message-Id: <79d89580db6fd92c059dabc4f5f4d83b72bb9d3d.1487859361.git.log...@free.fr> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg14175.html Signed-off-by: Gert Doering <g...@greenie.muc.de> -- kind regards, Gert Doering ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, SlashDot.org! http://sdm.link/slashdot _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel