community/stunnel: upgrade to 5.48

This commit is contained in:
Natanael Copa 2018-11-01 14:38:59 +00:00
parent e07d739fb3
commit a28ca12532
2 changed files with 11 additions and 31 deletions

View File

@ -3,18 +3,17 @@
# Contributor: Jakub Jirutka <jakub@jirutka.cz>
# Maintainer: Jakub Jirutka <jakub@jirutka.cz>
pkgname=stunnel
pkgver=5.46
pkgver=5.48
pkgrel=0
pkgdesc="SSL encryption wrapper between network client and server"
url="https://www.stunnel.org"
arch="all"
license="GPL-2.0-or-later with OpenSSL exception"
# support for SO_ORIGINAL_DST will be silently disabled without linux-headers
makedepends="libressl-dev linux-headers"
makedepends="openssl-dev linux-headers"
subpackages="$pkgname-doc"
install="$pkgname.pre-install"
source="https://www.stunnel.org/downloads/archive/${pkgver%.*}.x/stunnel-$pkgver.tar.gz
libressl-2.7.patch
stunnel.initd
stunnel.conf"
builddir="$srcdir/$pkgname-$pkgver"
@ -34,6 +33,14 @@ build() {
check() {
cd "$builddir"
# our openssl does not have PSK
rm tests/recipes/014_PSK_secrets
# FIXME: those fails for unknown reason
rm tests/recipes/037_failover_prio1
rm tests/recipes/038_failover_prio2
make check
}
@ -50,7 +57,6 @@ package() {
"$pkgdir"/usr/share/doc/$pkgname/examples/
}
sha512sums="2000e36d4d011a83e47afcaf19473e083da010d7b3909cb831c51975512257888615b5d64f4a4d78f48529d68c6740ea2be7f7935b0ab86de4535e290f78cc97 stunnel-5.46.tar.gz
32a3a994309ec2f91aff3f6f5cbb95e2167940a2ef0038321015c438fc158d28c7e9ff42ffa934924edda631bfe0abf747574f19665cae85d4e9953299e35f62 libressl-2.7.patch
sha512sums="5e6669ecd6e9b49aa6ef82b9a4dc6a2193c975eef85262aba70c7f264ef1b4d15dc287a2baa94b71be063deddcd07a20a5347ed5280f044fc6f68c61429a24fa stunnel-5.48.tar.gz
33e215413e08fdd5783cc76e6ba6a2342fb6d0573f801815c4d3022625e71be6c9739d47a7a61bf7c803f27911b9c92cf6ae3e522add040f83802e1aaeaee000 stunnel.initd
a72bfddeb74787d58c9fd24782d86c0498ce3530a43fbdd4ec4c4b57baa6257b6ef21005aca274b22c4a22cdbbbcee63dd3d841f458af248db9c69e8d59fa56f stunnel.conf"

View File

@ -1,26 +0,0 @@
diff --git a/src/ctx.c b/src/ctx.c
index b54fdbd..ef9aca1 100644
--- a/src/ctx.c
+++ b/src/ctx.c
@@ -407,7 +407,7 @@ NOEXPORT int ecdh_init(SERVICE_OPTIONS *section) {
/**************************************** initialize OpenSSL CONF */
NOEXPORT int conf_init(SERVICE_OPTIONS *section) {
-#if OPENSSL_VERSION_NUMBER>=0x10002000L
+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
SSL_CONF_CTX *cctx;
NAME_LIST *curr;
char *cmd, *param;
diff --git a/src/verify.c b/src/verify.c
index f9b9105..3b61b79 100644
--- a/src/verify.c
+++ b/src/verify.c
@@ -353,7 +353,7 @@ NOEXPORT int cert_check_local(X509_STORE_CTX *callback_ctx) {
cert=X509_STORE_CTX_get_current_cert(callback_ctx);
subject=X509_get_subject_name(cert);
-#if OPENSSL_VERSION_NUMBER<0x10100006L
+#if OPENSSL_VERSION_NUMBER<0x10100006L || defined(LIBRESSL_VERSION_NUMBER)
#define X509_STORE_CTX_get1_certs X509_STORE_get1_certs
#endif
/* modern API allows retrieving multiple matching certificates */