From 7aa4b340bfd6600147a86b952e3caea335ff00d8 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?J=C3=B6rg=20Frings-F=C3=BCrst?= Date: Sat, 26 Aug 2017 20:26:31 +0200 Subject: New patch 0130_openssl.patch --- debian/patches/0130_openssl.patch | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) create mode 100644 debian/patches/0130_openssl.patch (limited to 'debian/patches/0130_openssl.patch') diff --git a/debian/patches/0130_openssl.patch b/debian/patches/0130_openssl.patch new file mode 100644 index 0000000..b938ddc --- /dev/null +++ b/debian/patches/0130_openssl.patch @@ -0,0 +1,19 @@ +Description: Enable all ssl connections +Author: Jörg Frings-Fürst +Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871427 +Last-Update: 2017-08-26 +--- +This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ +Index: trunk/ccast/ccpacket.c +=================================================================== +--- trunk.orig/ccast/ccpacket.c ++++ trunk/ccast/ccpacket.c +@@ -157,7 +157,7 @@ static ccpacket_err connect_ccpacket_imp + if ((p->ctx = ssl_ctx_new(SSL_SERVER_VERIFY_LATER, 1)) == NULL) + #else + // Want to use TLS_client_method(), but older OpenSSL doesn't have it... +- if ((p->ctx = SSL_CTX_new(TLSv1_client_method())) == NULL) ++ if ((p->ctx = SSL_CTX_new(SSLv23_client_method())) == NULL) + #endif + { + DBG((g_log,0, "connect ssl_ctx_new failed\n")) -- cgit v1.2.3