For some odd reasons, the static inline plugin_call() function managed
to corrupt the struct env_set *es pointer. The result was that es->list
pointed at an invalid address, which again caused SEGV.
This patch replaces the static inline function with a macro instead, and
let the plugin_call_ssl()
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 16/10/11 15:59, Adriaan de Jong wrote:
> Hi everyone,
>
> The patch available at
> https://github.com/andj/openvpn-ssl-refactoring/commit/77b34616e70dcab081b2a2f0f567d1ab8fd25349
> moves OpenVPN master from PolarSSL v0.99-pre5 to v1.0.0, the first
PolarSSL does not support PKCS#12 certificate/key bundles, but had a
typo where #ifdef USE_POLARSSL was used, and it should have been #ifndef
instead.
Also added a few extra exclusions of PKCS#12 messages where appropriate,
to avoid confusing users.
Signed-off-by: David Sommerseth
---
options.c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 16/10/11 15:50, Adriaan de Jong wrote:
> As promised, I've rebased the patches on the current master branch.
> They're available here:
>
> https://github.com/andj/openvpn-ssl-refactoring/commits/rebasedmaster
> (i.e. in the rebasedmaster branch o
On Sun, Oct 23, 2011 at 12:35:13 +0200, David Sommerseth wrote:
> diff --git a/options.c b/options.c
> index 39e7a57..4fd6933 100644
> --- a/options.c
> +++ b/options.c
> @@ -559,7 +559,9 @@ static const char usage_message[] =
>" by a Certificate Authority in --ca file.\n"
>