Fix detection of sha224 and sha384, patch from Brian Sipos

https://sourceforge.net/p/net-snmp/bugs/2564/

Luckily nobody's needed to build using an OpenSSL version
that doesn't support sha224 or sha384, since the inversion
of the test here would try to use sha224/sha384 support only
on OpenSSL versions that don't support them!
diff --git a/README b/README
index 2e47661..53958c4 100644
--- a/README
+++ b/README
@@ -354,6 +354,7 @@
     Bart Van Assche <bart.vanassche@gmail.com>
     Pablo Carboni <pcarboni@users.sourceforge.net>
     Bill Fenner <fenner@gmail.com>
+    Brian Sipos <bsiposrkf@users.sourceforge.net>
 
   We've probably forgotten people on this list.  Let us know if you've
   contributed code and we've left you out.
diff --git a/configure.d/config_os_libs2 b/configure.d/config_os_libs2
index cb1dde9..47491e2 100644
--- a/configure.d/config_os_libs2
+++ b/configure.d/config_os_libs2
@@ -330,12 +330,12 @@
 fi
 if test "x$TLSPROG" = "xyes"; then
    AC_CHECK_DECL([EVP_sha224],
-    : ,
     AC_DEFINE([HAVE_EVP_SHA224], [], [Define if you have EVP_sha224/256 in openssl]),
+    : ,
     [[#include <openssl/evp.h>]])
    AC_CHECK_DECL([EVP_sha384],
-    : ,
     AC_DEFINE([HAVE_EVP_SHA384], [], [Define if you have EVP_sha384/256 in openssl]),
+    : ,
     [[#include <openssl/evp.h>]])
 fi