File: 68_dont_force_sslv3.patch

package info (click to toggle)
xchat 2.8.8-7.3
  • links: PTS
  • area: main
  • in suites: jessie, jessie-kfreebsd
  • size: 12,476 kB
  • ctags: 9,461
  • sloc: ansic: 68,901; sh: 11,218; perl: 2,751; makefile: 772; asm: 398; yacc: 291; xml: 138; python: 22
file content (33 lines) | stat: -rw-r--r-- 1,182 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
Description: Don't force the use of SSLv3
Author: Marc Deslauriers <marc.deslauriers@canonical.com>
Bug: http://sourceforge.net/p/xchat/bugs/1598/
Bug-Ubuntu: https://bugs.launchpad.net/xchat-gnome/+bug/1381484
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766005
Forwarded: yes

---
 src/common/ssl.c |    4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

Index: b/src/common/ssl.c
===================================================================
--- a/src/common/ssl.c
+++ b/src/common/ssl.c
@@ -70,7 +70,7 @@ _SSL_context_init (void (*info_cb_func),
 
 	SSLeay_add_ssl_algorithms ();
 	SSL_load_error_strings ();
-	ctx = SSL_CTX_new (server ? SSLv3_server_method() : SSLv3_client_method ());
+	ctx = SSL_CTX_new (server ? SSLv23_server_method() : SSLv23_client_method ());
 
 	SSL_CTX_set_session_cache_mode (ctx, SSL_SESS_CACHE_BOTH);
 	SSL_CTX_set_timeout (ctx, 300);
@@ -281,7 +281,7 @@ _SSL_socket (SSL_CTX *ctx, int sd)
 		__SSL_critical_error ("SSL_new");
 
 	SSL_set_fd (ssl, sd);
-	if (ctx->method == SSLv3_client_method())
+	if (ctx->method == SSLv23_client_method())
 		SSL_set_connect_state (ssl);
 	else
 	        SSL_set_accept_state(ssl);