board/csky: fixup gdb instructions in readme.txt
[buildroot-gz.git] / package / fetchmail / 0002-enable-libressl.patch
bloba98e19dda49b0df5e254c1366d0f48f8d69b44a5
1 Fetched from upstream git and tweaked for the release:
2 https://gitlab.com/fetchmail/fetchmail/commit/a2ae6f8d15d7caf815d7bdd13df833fd1b2af5cc
4 Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
6 diff -Nura fetchmail-6.3.26.orig/config.h.in fetchmail-6.3.26/config.h.in
7 --- fetchmail-6.3.26.orig/config.h.in 2015-12-30 10:44:33.467746835 -0300
8 +++ fetchmail-6.3.26/config.h.in 2015-12-30 10:45:50.271403589 -0300
9 @@ -53,6 +53,10 @@
10 if you don't. */
11 #undef HAVE_DECL_SSLV2_CLIENT_METHOD
13 +/* Define to 1 if you have the declaration of `SSLv3_client_method', and to 0
14 + if you don't. */
15 +#undef HAVE_DECL_SSLV3_CLIENT_METHOD
17 /* Define to 1 if you have the declaration of `strerror', and to 0 if you
18 don't. */
19 #undef HAVE_DECL_STRERROR
20 diff -Nura fetchmail-6.3.26.orig/configure.ac fetchmail-6.3.26/configure.ac
21 --- fetchmail-6.3.26.orig/configure.ac 2015-12-30 10:44:33.465746766 -0300
22 +++ fetchmail-6.3.26/configure.ac 2015-12-30 10:46:03.708868409 -0300
23 @@ -803,6 +803,7 @@
25 case "$LIBS" in *-lssl*)
26 AC_CHECK_DECLS([SSLv2_client_method],,,[#include <openssl/ssl.h>])
27 + AC_CHECK_DECLS([SSLv3_client_method],,,[#include <openssl/ssl.h>])
29 esac
31 diff -Nura fetchmail-6.3.26.orig/fetchmail.c fetchmail-6.3.26/fetchmail.c
32 --- fetchmail-6.3.26.orig/fetchmail.c 2015-12-30 10:44:33.469746904 -0300
33 +++ fetchmail-6.3.26/fetchmail.c 2015-12-30 10:46:03.708868409 -0300
34 @@ -263,6 +263,12 @@
35 #ifdef SSL_ENABLE
36 "+SSL"
37 #endif
38 +#if HAVE_DECL_SSLV2_CLIENT_METHOD + 0 == 0
39 + "-SSLv2"
40 +#endif
41 +#if HAVE_DECL_SSLV3_CLIENT_METHOD + 0 == 0
42 + "-SSLv3"
43 +#endif
44 #ifdef OPIE_ENABLE
45 "+OPIE"
46 #endif /* OPIE_ENABLE */
47 diff -Nura fetchmail-6.3.26.orig/socket.c fetchmail-6.3.26/socket.c
48 --- fetchmail-6.3.26.orig/socket.c 2015-12-30 10:44:33.464746731 -0300
49 +++ fetchmail-6.3.26/socket.c 2015-12-30 10:46:03.709868443 -0300
50 @@ -910,11 +910,16 @@
51 #if HAVE_DECL_SSLV2_CLIENT_METHOD + 0 > 0
52 _ctx[sock] = SSL_CTX_new(SSLv2_client_method());
53 #else
54 - report(stderr, GT_("Your operating system does not support SSLv2.\n"));
55 + report(stderr, GT_("Your OpenSSL version does not support SSLv2.\n"));
56 return -1;
57 #endif
58 } else if(!strcasecmp("ssl3",myproto)) {
59 +#if HAVE_DECL_SSLV3_CLIENT_METHOD + 0 > 0
60 _ctx[sock] = SSL_CTX_new(SSLv3_client_method());
61 +#else
62 + report(stderr, GT_("Your OpenSSL version does not support SSLv3.\n"));
63 + return -1;
64 +#endif
65 } else if(!strcasecmp("tls1",myproto)) {
66 _ctx[sock] = SSL_CTX_new(TLSv1_client_method());
67 } else if (!strcasecmp("ssl23",myproto)) {