diff options
author | V3n3RiX <venerix@redcorelinux.org> | 2018-05-25 15:22:17 +0100 |
---|---|---|
committer | V3n3RiX <venerix@redcorelinux.org> | 2018-05-25 15:22:17 +0100 |
commit | 22910f5d14da606bd7f06e19a2f61c5d1a8fc94b (patch) | |
tree | 808b5701901fb54b53ec3ecf6f33272e933f3ea6 /net-libs/pjproject/files/pjproject-2.7.2-libressl.patch | |
parent | 91c0ec2d7067f6ab1ef578bd9967b32ca07eb502 (diff) |
gentoo resync : 25.05.2018
Diffstat (limited to 'net-libs/pjproject/files/pjproject-2.7.2-libressl.patch')
-rw-r--r-- | net-libs/pjproject/files/pjproject-2.7.2-libressl.patch | 98 |
1 files changed, 98 insertions, 0 deletions
diff --git a/net-libs/pjproject/files/pjproject-2.7.2-libressl.patch b/net-libs/pjproject/files/pjproject-2.7.2-libressl.patch new file mode 100644 index 000000000000..07efa9ccb8fd --- /dev/null +++ b/net-libs/pjproject/files/pjproject-2.7.2-libressl.patch @@ -0,0 +1,98 @@ +Index: /third_party/srtp/crypto/hash/hmac_ossl.c +=================================================================== +--- /third_party/srtp/crypto/hash/hmac_ossl.c (revision 5725) ++++ /third_party/srtp/crypto/hash/hmac_ossl.c (revision 5726) +@@ -52,6 +52,8 @@ + #include <openssl/evp.h> + #include <openssl/hmac.h> ++#include <openssl/opensslv.h> + + #define SHA1_DIGEST_SIZE 20 ++#define USING_LIBRESSL (defined(LIBRESSL_VERSION_NUMBER)) + + /* the debug module for authentiation */ +@@ -77,5 +79,5 @@ + /* OpenSSL 1.1.0 made HMAC_CTX an opaque structure, which must be allocated + using HMAC_CTX_new. But this function doesn't exist in OpenSSL 1.0.x. */ +-#if OPENSSL_VERSION_NUMBER < 0x10100000L ++#if USING_LIBRESSL || OPENSSL_VERSION_NUMBER < 0x10100000L + { + /* allocate memory for auth and HMAC_CTX structures */ +@@ -122,5 +124,5 @@ + hmac_ctx = (HMAC_CTX*)a->state; + +-#if OPENSSL_VERSION_NUMBER < 0x10100000L ++#if USING_LIBRESSL || OPENSSL_VERSION_NUMBER < 0x10100000L + HMAC_CTX_cleanup(hmac_ctx); + +Index: /pjlib/src/pj/ssl_sock_ossl.c +=================================================================== +--- /pjlib/src/pj/ssl_sock_ossl.c (revision 5725) ++++ /pjlib/src/pj/ssl_sock_ossl.c (revision 5726) +@@ -56,6 +56,10 @@ + #include <openssl/rand.h> + #include <openssl/opensslconf.h> +- +-#if !defined(OPENSSL_NO_EC) && OPENSSL_VERSION_NUMBER >= 0x1000200fL ++#include <openssl/opensslv.h> ++ ++#define USING_LIBRESSL (defined(LIBRESSL_VERSION_NUMBER)) ++ ++#if !USING_LIBRESSL && !defined(OPENSSL_NO_EC) \ ++ && OPENSSL_VERSION_NUMBER >= 0x1000200fL + + # include <openssl/obj_mac.h> +@@ -115,5 +119,5 @@ + + +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L ++#if !USING_LIBRESSL && OPENSSL_VERSION_NUMBER >= 0x10100000L + # define OPENSSL_NO_SSL2 /* seems to be removed in 1.1.0 */ + # define M_ASN1_STRING_data(x) ASN1_STRING_get0_data(x) +@@ -539,5 +543,5 @@ + + /* Init OpenSSL lib */ +-#if OPENSSL_VERSION_NUMBER < 0x10100000L ++#if USING_LIBRESSL || OPENSSL_VERSION_NUMBER < 0x10100000L + SSL_library_init(); + SSL_load_error_strings(); +@@ -560,5 +564,7 @@ + const char *cname; + +-#if OPENSSL_VERSION_NUMBER < 0x10100000L ++#if (USING_LIBRESSL && LIBRESSL_VERSION_NUMBER < 0x2020100fL)\ ++ || OPENSSL_VERSION_NUMBER < 0x10100000L ++ + meth = (SSL_METHOD*)SSLv23_server_method(); + if (!meth) +@@ -603,5 +609,6 @@ + SSL_set_session(ssl, SSL_SESSION_new()); + +-#if !defined(OPENSSL_NO_EC) && OPENSSL_VERSION_NUMBER >= 0x1000200fL ++#if !USING_LIBRESSL && !defined(OPENSSL_NO_EC) \ ++ && OPENSSL_VERSION_NUMBER >= 0x1000200fL + openssl_curves_num = SSL_get_shared_curve(ssl,-1); + if (openssl_curves_num > PJ_ARRAY_SIZE(openssl_curves)) +@@ -795,5 +802,6 @@ + + /* Determine SSL method to use */ +-#if OPENSSL_VERSION_NUMBER < 0x10100000L ++#if (USING_LIBRESSL && LIBRESSL_VERSION_NUMBER < 0x2020100fL)\ ++ || OPENSSL_VERSION_NUMBER < 0x10100000L + switch (ssock->param.proto) { + case PJ_SSL_SOCK_PROTO_TLS1: +@@ -1232,5 +1240,6 @@ + static pj_status_t set_curves_list(pj_ssl_sock_t *ssock) + { +-#if !defined(OPENSSL_NO_EC) && OPENSSL_VERSION_NUMBER >= 0x1000200fL ++#if !USING_LIBRESSL && !defined(OPENSSL_NO_EC) \ ++ && OPENSSL_VERSION_NUMBER >= 0x1000200fL + int ret; + int curves[PJ_SSL_SOCK_MAX_CURVES]; +@@ -1263,5 +1272,5 @@ + static pj_status_t set_sigalgs(pj_ssl_sock_t *ssock) + { +-#if OPENSSL_VERSION_NUMBER >= 0x1000200fL ++#if !USING_LIBRESSL && OPENSSL_VERSION_NUMBER >= 0x1000200fL + int ret; + |