--- a/src/tls.c +++ b/src/tls.c @@ -45,6 +45,10 @@ # include # include # include +#if OPENSSL_VERSION_NUMBER < 0x10100000L +#define X509_getm_notBefore X509_get_notBefore +#define X509_getm_notAfter X509_get_notAfter +#endif #endif /* HAVE_LIBSSL */ #ifdef HAVE_LIBIDN @@ -167,8 +171,10 @@ int tls_lib_init(char **errstr) #ifdef HAVE_LIBSSL int e; +#if OPENSSL_VERSION_NUMBER < 0x10100000L SSL_load_error_strings(); SSL_library_init(); +#endif if ((e = seed_prng(errstr)) != TLS_EOK) { return e; @@ -518,7 +524,7 @@ int tls_cert_info_get(tls_t *tls, tls_cert_info_t *tci, char **errstr) *errstr = xasprintf(_("%s: error getting SHA1 fingerprint"), errmsg); return TLS_ECERT; } - asn1time = X509_get_notBefore(x509cert); + asn1time = X509_getm_notBefore(x509cert); if (asn1time_to_time_t((char *)asn1time->data, (asn1time->type != V_ASN1_GENERALIZEDTIME), &(tci->activation_time)) != 0) @@ -528,7 +534,7 @@ int tls_cert_info_get(tls_t *tls, tls_cert_info_t *tci, char **errstr) tls_cert_info_free(tci); return TLS_ECERT; } - asn1time = X509_get_notAfter(x509cert); + asn1time = X509_getm_notAfter(x509cert); if (asn1time_to_time_t((char *)asn1time->data, (asn1time->type != V_ASN1_GENERALIZEDTIME), &(tci->expiration_time)) != 0)