summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormarino <marino@FreeBSD.org>2016-09-12 15:34:22 +0000
committermarino <marino@FreeBSD.org>2016-09-12 15:34:22 +0000
commitf4d706adaa2d9ad31beefa58b44a6ad0b0885bf1 (patch)
treee3c55e29abf6ee6988af46f9cc600c7c045f86fd
parent22478cb13c8621f7c7ea5dc72c0c75e6b4c4e63c (diff)
downloadFreeBSD-ports-f4d706adaa2d9ad31beefa58b44a6ad0b0885bf1.zip
FreeBSD-ports-f4d706adaa2d9ad31beefa58b44a6ad0b0885bf1.tar.gz
net/asterisk: Fix build when SSLv3 method is N/A (LibreSSL)
Approved by: SSL blanket P.S. Why is this port still in the tree? It expired in April 2016.
-rw-r--r--net/asterisk/files/patch-main_tcptls.c17
1 files changed, 17 insertions, 0 deletions
diff --git a/net/asterisk/files/patch-main_tcptls.c b/net/asterisk/files/patch-main_tcptls.c
new file mode 100644
index 0000000..d013da9
--- /dev/null
+++ b/net/asterisk/files/patch-main_tcptls.c
@@ -0,0 +1,17 @@
+--- main/tcptls.c.orig 2015-04-08 18:53:07.000000000 +0200
++++ main/tcptls.c 2015-09-23 21:30:28.092457300 +0200
+@@ -768,10 +768,13 @@ static int __ssl_setup(struct ast_tls_co
+ cfg->ssl_ctx = SSL_CTX_new(SSLv2_client_method());
+ } else
+ #endif
++#ifndef OPENSSL_NO_SSL3
+ if (ast_test_flag(&cfg->flags, AST_SSL_SSLV3_CLIENT)) {
+ ast_log(LOG_WARNING, "Usage of SSLv3 is discouraged due to known vulnerabilities. Please use 'tlsv1' or leave the TLS method unspecified!\n");
+ cfg->ssl_ctx = SSL_CTX_new(SSLv3_client_method());
+- } else if (ast_test_flag(&cfg->flags, AST_SSL_TLSV1_CLIENT)) {
++ } else
++#endif
++ if (ast_test_flag(&cfg->flags, AST_SSL_TLSV1_CLIENT)) {
+ cfg->ssl_ctx = SSL_CTX_new(TLSv1_client_method());
+ } else {
+ disable_ssl = 1;
OpenPOWER on IntegriCloud