Blame SOURCES/0035-OpenSSL-always-provide-OBJ_create-with-name-strings.patch

d84fc6
From 44b211bcf7ad58ff29e6495e1c3978e4660cb7d1 Mon Sep 17 00:00:00 2001
d84fc6
From: Peter Jones <pjones@redhat.com>
d84fc6
Date: Tue, 15 Jan 2019 18:04:34 -0500
d84fc6
Subject: [PATCH 35/62] OpenSSL: always provide OBJ_create() with name strings.
d84fc6
d84fc6
Some versions of OpenSSL seem to go back and forth as to whether NULL
d84fc6
for these names are okay.  Don't risk it.
d84fc6
d84fc6
Signed-off-by: Peter Jones <pjones@redhat.com>
d84fc6
Upstream-commit-id: 46b76a01717
d84fc6
---
d84fc6
 shim.c | 4 +++-
d84fc6
 1 file changed, 3 insertions(+), 1 deletion(-)
d84fc6
d84fc6
diff --git a/shim.c b/shim.c
d84fc6
index a0eb19b91fe..d7ee2b6de6f 100644
d84fc6
--- a/shim.c
d84fc6
+++ b/shim.c
d84fc6
@@ -388,7 +388,9 @@ static BOOLEAN verify_eku(UINT8 *Cert, UINTN CertSize)
d84fc6
 	EXTENDED_KEY_USAGE *eku;
d84fc6
 	ASN1_OBJECT *module_signing;
d84fc6
 
d84fc6
-	module_signing = OBJ_nid2obj(OBJ_create(OID_EKU_MODSIGN, NULL, NULL));
d84fc6
+        module_signing = OBJ_nid2obj(OBJ_create(OID_EKU_MODSIGN,
d84fc6
+                                                "modsign-eku",
d84fc6
+                                                "modsign-eku"));
d84fc6
 
d84fc6
 	x509 = d2i_X509 (NULL, &Temp, (long) CertSize);
d84fc6
 	if (x509 != NULL) {
d84fc6
-- 
d84fc6
2.26.2
d84fc6