Blame SOURCES/openssl-1.0.2j-nokrb5-abi.patch

96a864
diff -up openssl-1.0.2j/ssl/ssl.h.nokrb5-abi openssl-1.0.2j/ssl/ssl.h
96a864
--- openssl-1.0.2j/ssl/ssl.h.nokrb5-abi	2016-10-07 11:33:36.000000000 +0200
96a864
+++ openssl-1.0.2j/ssl/ssl.h	2016-10-14 13:26:29.767624676 +0200
96a864
@@ -521,6 +521,9 @@ struct ssl_session_st {
96a864
 #  ifndef OPENSSL_NO_KRB5
96a864
     unsigned int krb5_client_princ_len;
96a864
     unsigned char krb5_client_princ[SSL_MAX_KRB5_PRINCIPAL_LENGTH];
96a864
+#  else
96a864
+    unsigned int unused_krb5_client_princ_len;
96a864
+    unsigned char unused_krb5_client_princ[SSL_MAX_KRB5_PRINCIPAL_LENGTH];
96a864
 #  endif                        /* OPENSSL_NO_KRB5 */
96a864
 #  ifndef OPENSSL_NO_PSK
96a864
     char *psk_identity_hint;
96a864
@@ -1521,6 +1524,8 @@ struct ssl_st {
96a864
 #  ifndef OPENSSL_NO_KRB5
96a864
     /* Kerberos 5 context */
96a864
     KSSL_CTX *kssl_ctx;
96a864
+#  else
96a864
+    void *unused_kssl_ctx;
96a864
 #  endif                        /* OPENSSL_NO_KRB5 */
96a864
 #  ifndef OPENSSL_NO_PSK
96a864
     unsigned int (*psk_client_callback) (SSL *ssl, const char *hint,