Your patch (v3) has been applied to the master and release/2.4 branch.

Small side note: I assume that RSA_meth_new() can fail and return NULL
in OpenSSL 1.1?  Because for 1.0, the "check_malloc_return(rsa_meth)" call 
isn't necessary, as ALLOC_OBJ_CLEAR() would call ALLOC_OBJ() and that
already checks...  (mentioning this here in case someone wonders and goes
to the list archives).

commit 09776c5b52df13121504e07894a26d5cd1883317 (master)
commit 44bac2926d6b445a7773a24bb7c295b54f4be35e (release/2.4)
Author: Emmanuel Deloget
Date:   Thu Feb 23 15:35:56 2017 +0100

     OpenSSL: don't use direct access to the internal of RSA_METHOD

     Signed-off-by: Emmanuel Deloget <log...@free.fr>
     Acked-by: Steffan Karger <steffan.kar...@fox-it.com>
     Message-Id: 
<79d89580db6fd92c059dabc4f5f4d83b72bb9d3d.1487859361.git.log...@free.fr>
     URL: 
https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg14175.html
     Signed-off-by: Gert Doering <g...@greenie.muc.de>


--
kind regards,

Gert Doering


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to