diff options
author | marino <marino@FreeBSD.org> | 2016-09-12 15:34:22 +0000 |
---|---|---|
committer | marino <marino@FreeBSD.org> | 2016-09-12 15:34:22 +0000 |
commit | f4d706adaa2d9ad31beefa58b44a6ad0b0885bf1 (patch) | |
tree | e3c55e29abf6ee6988af46f9cc600c7c045f86fd | |
parent | 22478cb13c8621f7c7ea5dc72c0c75e6b4c4e63c (diff) | |
download | FreeBSD-ports-f4d706adaa2d9ad31beefa58b44a6ad0b0885bf1.zip FreeBSD-ports-f4d706adaa2d9ad31beefa58b44a6ad0b0885bf1.tar.gz |
net/asterisk: Fix build when SSLv3 method is N/A (LibreSSL)
Approved by: SSL blanket
P.S. Why is this port still in the tree? It expired in April 2016.
-rw-r--r-- | net/asterisk/files/patch-main_tcptls.c | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/net/asterisk/files/patch-main_tcptls.c b/net/asterisk/files/patch-main_tcptls.c new file mode 100644 index 0000000..d013da9 --- /dev/null +++ b/net/asterisk/files/patch-main_tcptls.c @@ -0,0 +1,17 @@ +--- main/tcptls.c.orig 2015-04-08 18:53:07.000000000 +0200 ++++ main/tcptls.c 2015-09-23 21:30:28.092457300 +0200 +@@ -768,10 +768,13 @@ static int __ssl_setup(struct ast_tls_co + cfg->ssl_ctx = SSL_CTX_new(SSLv2_client_method()); + } else + #endif ++#ifndef OPENSSL_NO_SSL3 + if (ast_test_flag(&cfg->flags, AST_SSL_SSLV3_CLIENT)) { + ast_log(LOG_WARNING, "Usage of SSLv3 is discouraged due to known vulnerabilities. Please use 'tlsv1' or leave the TLS method unspecified!\n"); + cfg->ssl_ctx = SSL_CTX_new(SSLv3_client_method()); +- } else if (ast_test_flag(&cfg->flags, AST_SSL_TLSV1_CLIENT)) { ++ } else ++#endif ++ if (ast_test_flag(&cfg->flags, AST_SSL_TLSV1_CLIENT)) { + cfg->ssl_ctx = SSL_CTX_new(TLSv1_client_method()); + } else { + disable_ssl = 1; |