diff options
author | Fabian Groffen <grobian@gentoo.org> | 2022-12-27 21:31:29 +0100 |
---|---|---|
committer | Fabian Groffen <grobian@gentoo.org> | 2022-12-27 21:33:02 +0100 |
commit | e44efacab8c0d769cd1b6145e14bba16b109c094 (patch) | |
tree | bc81c4a8709bf27563afecc74f1b6bf82ac966c6 /mail-mta/exim | |
parent | app-editors/xvile: Stabilize 9.8w-r2 amd64, #888631 (diff) | |
download | gentoo-e44efacab8c0d769cd1b6145e14bba16b109c094.tar.gz gentoo-e44efacab8c0d769cd1b6145e14bba16b109c094.tar.bz2 gentoo-e44efacab8c0d769cd1b6145e14bba16b109c094.zip |
mail-mta/exim-4.94.2-r11: backport OpenSSL3 patch from 4.96
Closes: https://bugs.gentoo.org/888619
Signed-off-by: Fabian Groffen <grobian@gentoo.org>
Diffstat (limited to 'mail-mta/exim')
-rw-r--r-- | mail-mta/exim/exim-4.94.2-r11.ebuild | 1 | ||||
-rw-r--r-- | mail-mta/exim/files/exim-4.94.2-openssl3.patch | 34 |
2 files changed, 35 insertions, 0 deletions
diff --git a/mail-mta/exim/exim-4.94.2-r11.ebuild b/mail-mta/exim/exim-4.94.2-r11.ebuild index c62c296b2534..352ae0cdcd7e 100644 --- a/mail-mta/exim/exim-4.94.2-r11.ebuild +++ b/mail-mta/exim/exim-4.94.2-r11.ebuild @@ -122,6 +122,7 @@ src_prepare() { eapply "${FILESDIR}"/exim-4.94-localscan_dlopen.patch eapply "${FILESDIR}"/exim-4.94.2-fix-crash-resolve.patch # 799368 upstr eapply "${FILESDIR}"/exim-4.94-CVE-2022-3559.patch # 877607 upstr + eapply "${FILESDIR}"/exim-4.94.2-openssl3.patch # 888619 backport # for this reason we have a := dep on opendmarc, they changed their # API in a minor release diff --git a/mail-mta/exim/files/exim-4.94.2-openssl3.patch b/mail-mta/exim/files/exim-4.94.2-openssl3.patch new file mode 100644 index 000000000000..d1102aac8bfa --- /dev/null +++ b/mail-mta/exim/files/exim-4.94.2-openssl3.patch @@ -0,0 +1,34 @@ +Based on original commit, but applied to 4.94.2 tarball. + +From ff7829398d74e67f1c1f40339a772fd76708e5ac Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Jaroslav=20=C5=A0karvada?= <jskarvad@redhat.com> +Date: Sat, 27 Nov 2021 21:07:15 +0000 +Subject: [PATCH] Fix build for OpenSSL 3.0.0 . Bug 2810 + +--- + src/src/tls-openssl.c | 10 +++++++--- + 1 file changed, 7 insertions(+), 3 deletions(-) + +--- a/src/tls-openssl.c ++++ b/src/tls-openssl.c +@@ -227,12 +227,16 @@ + { US"no_tlsv1", SSL_OP_NO_TLSv1 }, + #endif + #ifdef SSL_OP_NO_TLSv1_1 +-#if SSL_OP_NO_TLSv1_1 == 0x00000400L ++# if OPENSSL_VERSION_NUMBER < 0x30000000L ++# if SSL_OP_NO_TLSv1_1 == 0x00000400L + /* Error in chosen value in 1.0.1a; see first item in CHANGES for 1.0.1b */ +-#warning OpenSSL 1.0.1a uses a bad value for SSL_OP_NO_TLSv1_1, ignoring +-#else ++# warning OpenSSL 1.0.1a uses a bad value for SSL_OP_NO_TLSv1_1, ignoring ++# define NO_SSL_OP_NO_TLSv1_1 ++# endif ++# endif ++# ifndef NO_SSL_OP_NO_TLSv1_1 + { US"no_tlsv1_1", SSL_OP_NO_TLSv1_1 }, +-#endif ++# endif + #endif + #ifdef SSL_OP_NO_TLSv1_2 + { US"no_tlsv1_2", SSL_OP_NO_TLSv1_2 }, |