wok-next diff xchat/stuff/patches/ssl.patch @ rev 20859
Update ALSA stack (1.1.6)
author | Aleksej Bobylev <al.bobylev@gmail.com> |
---|---|
date | Wed Jun 27 13:35:43 2018 +0300 (2018-06-27) |
parents | |
children |
line diff
1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 1.2 +++ b/xchat/stuff/patches/ssl.patch Wed Jun 27 13:35:43 2018 +0300 1.3 @@ -0,0 +1,37 @@ 1.4 +From 527eb322a5bfa97d5716e7f8178e319c515065a2 Mon Sep 17 00:00:00 2001 1.5 +From: Marc Deslauriers <marc.deslauriers@ubuntu.com> 1.6 +Date: Mon, 20 Oct 2014 10:08:26 -0400 1.7 +Subject: [PATCH] Don't force the use of SSLv3. 1.8 + 1.9 +SSLv3 should no longer be used for security reasons. Let the best 1.10 +connection method be automatically determined by using SSLv23_client_method() 1.11 +and SSLv23_server_method(). 1.12 +--- 1.13 + src/common/ssl.c | 4 ++-- 1.14 + 1 file changed, 2 insertions(+), 2 deletions(-) 1.15 + 1.16 +diff --git a/src/common/ssl.c b/src/common/ssl.c 1.17 +index a18ad47..35eb237 100644 1.18 +--- a/src/common/ssl.c 1.19 ++++ b/src/common/ssl.c 1.20 +@@ -70,7 +70,7 @@ _SSL_context_init (void (*info_cb_func), int server) 1.21 + 1.22 + SSLeay_add_ssl_algorithms (); 1.23 + SSL_load_error_strings (); 1.24 +- ctx = SSL_CTX_new (server ? SSLv3_server_method() : SSLv3_client_method ()); 1.25 ++ ctx = SSL_CTX_new (server ? SSLv23_server_method() : SSLv23_client_method ()); 1.26 + 1.27 + SSL_CTX_set_session_cache_mode (ctx, SSL_SESS_CACHE_BOTH); 1.28 + SSL_CTX_set_timeout (ctx, 300); 1.29 +@@ -281,7 +281,7 @@ _SSL_socket (SSL_CTX *ctx, int sd) 1.30 + __SSL_critical_error ("SSL_new"); 1.31 + 1.32 + SSL_set_fd (ssl, sd); 1.33 +- if (ctx->method == SSLv3_client_method()) 1.34 ++ if (ctx->method == SSLv23_client_method()) 1.35 + SSL_set_connect_state (ssl); 1.36 + else 1.37 + SSL_set_accept_state(ssl); 1.38 +-- 1.39 +2.1.0 1.40 +