Hello,
Tried to rebuild adding the joined upstream patch pointed by Pierre-Yves
Bonnetain to the debian/patches directory (as well as patch in bug #713672),
It resolved this bug.
Please add the tag patch to this bug.
--
En droit pénal français, un acte de piraterie est « le fait de s'emparer ou de
prendre le contrôle par violence ou menace de violence d'un aéronef, d'un
navire ou de tout autre moyen de transport à bord desquels des personnes
ont pris place, ainsi que d'une plate-forme fixe située sur le plateau
continental » (Article L.224-6).
Landry MINOZA
landry.min...@gmail.com
--- Begin Message ---
Hello,
Got the same batch of errors on XCA. There is a patch on xca Git's
repository to correct it.
http://gitweb.hohnstaedt.de/?p=projects/xca.git;a=commitdiff;h=4f7cd417320215c8ed3567536cbf2ca008946c38#patch1
Sincerely,
--
Pierre-Yves Bonnetain-Nesterenko
B&A Consultants - Sécurité informatique - www.ba-consultants.fr
Tel. : +33 (0) 563 277 241 - Fax : +33 (0) 567 737 829
--- End Message ---
From: Oliver Winker <oli...@oli1170.net>
Date: Tue, 12 Aug 2014 17:08:05 +0000 (+0200)
Subject: Fix for openssl 1.0.1i
X-Git-Url: http://gitweb.hohnstaedt.de/?p=projects%2Fxca.git;a=commitdiff_plain;h=4f7cd417320215c8ed3567536cbf2ca008946c38
Fix for openssl 1.0.1i
Fixes following application error
Errors
error:0D0C40D8:asn1 encoding routines:c2i_ASN1_OBJECT:invalid object encoding
error:0D08303A:asn1 encoding routines:ASN1_TEMPLATE_NOEXP_D2I:nested asn1 error
Due to openssl 1.0.1i change:
commit 03b04ddac162c7b7fa3c57eadccc5a583a00d291
Author: Emilia Kasper <emi...@openssl.org>
Date: Wed Jul 2 19:02:33 2014 +0200
Commit messgae amended and
Signed-off-by: Christian Hohnstaedt <chohnsta...@innominate.com>
---
diff --git a/lib/x509v3ext.cpp b/lib/x509v3ext.cpp
index cf74c32..d94cbda 100644
--- a/lib/x509v3ext.cpp
+++ b/lib/x509v3ext.cpp
@@ -27,6 +27,8 @@ x509v3ext::x509v3ext(const X509_EXTENSION *n)
x509v3ext::x509v3ext(const x509v3ext &n)
{
ext = NULL;
+ if (!n.isValid())
+ return;
set(n.ext);
}
@@ -743,7 +745,7 @@ X509_EXTENSION *x509v3ext::get() const
bool x509v3ext::isValid() const
{
- return ext->value->length > 0 &&
+ return ext && ext->value && ext->value->length > 0 &&
OBJ_obj2nid(ext->object) != NID_undef;
}