Blame SOURCES/openssl-1.0.2j-nokrb5-abi.patch

c05f5d
diff -up openssl-1.0.2j/ssl/ssl.h.nokrb5-abi openssl-1.0.2j/ssl/ssl.h
c05f5d
--- openssl-1.0.2j/ssl/ssl.h.nokrb5-abi	2016-10-07 11:33:36.000000000 +0200
c05f5d
+++ openssl-1.0.2j/ssl/ssl.h	2016-10-14 13:26:29.767624676 +0200
c05f5d
@@ -521,6 +521,9 @@ struct ssl_session_st {
c05f5d
 #  ifndef OPENSSL_NO_KRB5
c05f5d
     unsigned int krb5_client_princ_len;
c05f5d
     unsigned char krb5_client_princ[SSL_MAX_KRB5_PRINCIPAL_LENGTH];
c05f5d
+#  else
c05f5d
+    unsigned int unused_krb5_client_princ_len;
c05f5d
+    unsigned char unused_krb5_client_princ[SSL_MAX_KRB5_PRINCIPAL_LENGTH];
c05f5d
 #  endif                        /* OPENSSL_NO_KRB5 */
c05f5d
 #  ifndef OPENSSL_NO_PSK
c05f5d
     char *psk_identity_hint;
c05f5d
@@ -1521,6 +1524,8 @@ struct ssl_st {
c05f5d
 #  ifndef OPENSSL_NO_KRB5
c05f5d
     /* Kerberos 5 context */
c05f5d
     KSSL_CTX *kssl_ctx;
c05f5d
+#  else
c05f5d
+    void *unused_kssl_ctx;
c05f5d
 #  endif                        /* OPENSSL_NO_KRB5 */
c05f5d
 #  ifndef OPENSSL_NO_PSK
c05f5d
     unsigned int (*psk_client_callback) (SSL *ssl, const char *hint,