wok-next annotate fetchmail/stuff/patches/disable-sslv3.patch @ rev 20877

msmtp: up (1.6.8); fetchmail: patch
author Aleksej Bobylev <al.bobylev@gmail.com>
date Fri Jul 06 14:18:54 2018 +0300 (2018-07-06)
parents
children
rev   line source
al@20877 1 diff -u -r fetchmail-6.3.26/socket.c fetchmail-6.3.26-nossl3/socket.c
al@20877 2 --- fetchmail-6.3.26/socket.c 2013-04-23 22:00:45.000000000 +0200
al@20877 3 +++ fetchmail-6.3.26-nossl3/socket.c 2016-03-03 18:18:46.688881618 +0100
al@20877 4 @@ -907,14 +907,11 @@
al@20877 5 _ssl_context[sock] = NULL;
al@20877 6 if(myproto) {
al@20877 7 if(!strcasecmp("ssl2",myproto)) {
al@20877 8 -#if HAVE_DECL_SSLV2_CLIENT_METHOD + 0 > 0
al@20877 9 - _ctx[sock] = SSL_CTX_new(SSLv2_client_method());
al@20877 10 -#else
al@20877 11 report(stderr, GT_("Your operating system does not support SSLv2.\n"));
al@20877 12 return -1;
al@20877 13 -#endif
al@20877 14 } else if(!strcasecmp("ssl3",myproto)) {
al@20877 15 - _ctx[sock] = SSL_CTX_new(SSLv3_client_method());
al@20877 16 + report(stderr, GT_("Your operating system does not support SSLv3.\n"));
al@20877 17 + return -1;
al@20877 18 } else if(!strcasecmp("tls1",myproto)) {
al@20877 19 _ctx[sock] = SSL_CTX_new(TLSv1_client_method());
al@20877 20 } else if (!strcasecmp("ssl23",myproto)) {