patch-src_openvpn_ssl_openssl_c 1.3 KB

1234567891011121314151617181920212223242526272829
  1. --- openvpn-2.4.7.orig/src/openvpn/ssl_openssl.c 2019-02-20 13:28:23.000000000 +0100
  2. +++ openvpn-2.4.7/src/openvpn/ssl_openssl.c 2019-10-07 21:44:52.473323073 +0200
  3. @@ -459,7 +459,7 @@ tls_ctx_restrict_ciphers_tls13(struct tl
  4. return;
  5. }
  6. -#if (OPENSSL_VERSION_NUMBER < 0x1010100fL)
  7. +#if (OPENSSL_VERSION_NUMBER < 0x1010100fL) || defined(LIBRESSL_VERSION_NUMBER)
  8. crypto_msg(M_WARN, "Not compiled with OpenSSL 1.1.1 or higher. "
  9. "Ignoring TLS 1.3 only tls-ciphersuites '%s' setting.",
  10. ciphers);
  11. @@ -1846,7 +1846,7 @@ show_available_tls_ciphers_list(const ch
  12. crypto_msg(M_FATAL, "Cannot create SSL_CTX object");
  13. }
  14. -#if (OPENSSL_VERSION_NUMBER >= 0x1010100fL)
  15. +#if (OPENSSL_VERSION_NUMBER >= 0x1010100fL && !defined(LIBRESSL_VERSION_NUMBER))
  16. if (tls13)
  17. {
  18. SSL_CTX_set_min_proto_version(tls_ctx.ctx, TLS1_3_VERSION);
  19. @@ -1867,7 +1867,7 @@ show_available_tls_ciphers_list(const ch
  20. crypto_msg(M_FATAL, "Cannot create SSL object");
  21. }
  22. -#if (OPENSSL_VERSION_NUMBER < 0x1010000fL)
  23. +#if (OPENSSL_VERSION_NUMBER < 0x1010000fL) || defined(LIBRESSL_VERSION_NUMBER)
  24. STACK_OF(SSL_CIPHER) *sk = SSL_get_ciphers(ssl);
  25. #else
  26. STACK_OF(SSL_CIPHER) *sk = SSL_get1_supported_ciphers(ssl);