Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP1:GA
openssl-1_0_0.35258
openssl-1.0.2a-default-paths.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File openssl-1.0.2a-default-paths.patch of Package openssl-1_0_0.35258
Index: openssl-1.0.2b/apps/s_server.c =================================================================== --- openssl-1.0.2b.orig/apps/s_server.c 2015-06-11 17:28:04.879854931 +0200 +++ openssl-1.0.2b/apps/s_server.c 2015-06-11 17:28:32.040203749 +0200 @@ -1788,12 +1788,16 @@ int MAIN(int argc, char *argv[]) } #endif - if ((!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) || - (!SSL_CTX_set_default_verify_paths(ctx))) { - /* BIO_printf(bio_err,"X509_load_verify_locations\n"); */ - ERR_print_errors(bio_err); - /* goto end; */ + if (CAfile == NULL && CApath == NULL) { + if (!SSL_CTX_set_default_verify_paths(ctx)) { + ERR_print_errors(bio_err); + } + } else { + if (!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) { + ERR_print_errors(bio_err); + } } + if (vpm) SSL_CTX_set1_param(ctx, vpm); @@ -1850,8 +1854,10 @@ int MAIN(int argc, char *argv[]) else SSL_CTX_sess_set_cache_size(ctx2, 128); - if ((!SSL_CTX_load_verify_locations(ctx2, CAfile, CApath)) || - (!SSL_CTX_set_default_verify_paths(ctx2))) { + if (!SSL_CTX_load_verify_locations(ctx2, CAfile, CApath)) { + ERR_print_errors(bio_err); + } + if (!SSL_CTX_set_default_verify_paths(ctx2)) { ERR_print_errors(bio_err); } if (vpm) Index: openssl-1.0.2b/apps/s_time.c =================================================================== --- openssl-1.0.2b.orig/apps/s_time.c 2015-06-11 17:28:04.879854931 +0200 +++ openssl-1.0.2b/apps/s_time.c 2015-06-11 17:28:32.040203749 +0200 @@ -381,13 +381,14 @@ int MAIN(int argc, char **argv) SSL_load_error_strings(); - if ((!SSL_CTX_load_verify_locations(tm_ctx, CAfile, CApath)) || - (!SSL_CTX_set_default_verify_paths(tm_ctx))) { - /* - * BIO_printf(bio_err,"error setting default verify locations\n"); - */ - ERR_print_errors(bio_err); - /* goto end; */ + if (CAfile == NULL && CApath == NULL) { + if (!SSL_CTX_set_default_verify_paths(tm_ctx)) { + ERR_print_errors(bio_err); + } + } else { + if (!SSL_CTX_load_verify_locations(tm_ctx, CAfile, CApath)) { + ERR_print_errors(bio_err); + } } if (tm_cipher == NULL)
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor