logo

overlay

My own overlay for experimentations, use with caution, no support is provided git clone https://hacktivis.me/git/overlay.git

ldns-utils-1.7.0_libressl.patch (2754B)


  1. diff --git a/examples/ldns-dane.c b/examples/ldns-dane.c
  2. index f223675..c819b4a 100644
  3. --- a/examples/ldns-dane.c
  4. +++ b/examples/ldns-dane.c
  5. @@ -1097,7 +1097,7 @@ dane_create(ldns_rr_list* tlsas, ldns_rdf* tlsa_owner,
  6. }
  7. }
  8. -#if defined(USE_DANE_VERIFY) && ( OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) )
  9. +#if defined(USE_DANE_VERIFY) && ( OPENSSL_VERSION_NUMBER < 0x10100000 || defined(LIBRESSL_VERSION_NUMBER) )
  10. static bool
  11. dane_verify(ldns_rr_list* tlsas, ldns_rdf* address,
  12. X509* cert, STACK_OF(X509)* extra_certs,
  13. @@ -1165,7 +1165,7 @@ main(int argc, char* const* argv)
  14. ldns_status s;
  15. size_t i;
  16. -#if OPENSSL_VERSION_NUMBER >= 0x10100000 && ! defined(HAVE_LIBRESSL)
  17. +#if OPENSSL_VERSION_NUMBER >= 0x10100000 && ! defined(LIBRESSL_VERSION_NUMBER)
  18. size_t j, usable_tlsas = 0;
  19. X509_STORE_CTX *store_ctx = NULL;
  20. #endif /* OPENSSL_VERSION_NUMBER >= 0x10100000 */
  21. @@ -1688,7 +1688,7 @@ main(int argc, char* const* argv)
  22. }
  23. }
  24. -#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL)
  25. +#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(LIBRESSL_VERSION_NUMBER)
  26. ctx = SSL_CTX_new(SSLv23_client_method());
  27. #else
  28. ctx = SSL_CTX_new(TLS_client_method());
  29. @@ -1730,7 +1730,7 @@ main(int argc, char* const* argv)
  30. verify_server_name, name);
  31. break;
  32. #ifdef USE_DANE_VERIFY
  33. -#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL)
  34. +#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(LIBRESSL_VERSION_NUMBER)
  35. case VERIFY: if (! dane_verify(tlsas, NULL,
  36. cert, extra_certs, store,
  37. verify_server_name, name,
  38. @@ -1844,7 +1844,7 @@ main(int argc, char* const* argv)
  39. address = ldns_rr_a_address(
  40. ldns_rr_list_rr(addresses, i));
  41. assert(address != NULL);
  42. -#if OPENSSL_VERSION_NUMBER >= 0x10100000 && ! defined(HAVE_LIBRESSL)
  43. +#if OPENSSL_VERSION_NUMBER >= 0x10100000 && ! defined(LIBRESSL_VERSION_NUMBER)
  44. if (mode == VERIFY) {
  45. usable_tlsas = 0;
  46. if (SSL_dane_enable(ssl, name_str) <= 0) {
  47. @@ -1904,7 +1904,7 @@ main(int argc, char* const* argv)
  48. continue;
  49. }
  50. LDNS_ERR(s, "could not get cert chain from ssl");
  51. -#if OPENSSL_VERSION_NUMBER >= 0x10100000 && ! defined(HAVE_LIBRESSL)
  52. +#if OPENSSL_VERSION_NUMBER >= 0x10100000 && ! defined(LIBRESSL_VERSION_NUMBER)
  53. if (mode == VERIFY) {
  54. char *address_str = ldns_rdf2str(address);
  55. @@ -1934,7 +1934,7 @@ main(int argc, char* const* argv)
  56. #ifdef USE_DANE_VERIFY
  57. case VERIFY:
  58. -#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL)
  59. +#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(LIBRESSL_VERSION_NUMBER)
  60. if (! dane_verify(tlsas, address,
  61. cert, extra_certs, store,
  62. verify_server_name, name,