diff options
author | Rosen Penev <rosenp@gmail.com> | 2019-01-01 23:52:00 -0800 |
---|---|---|
committer | Toke Høiland-Jørgensen <toke@toke.dk> | 2019-01-08 15:19:00 +0100 |
commit | 18085ebccd432a84663d30b0aef19b1f9012514f (patch) | |
tree | b6fe9beaab9d021376758cea23ab019cfd32793d /net/radsecproxy | |
parent | 924b5bbf3514df76eaea9da7bc38991cdddbbc77 (diff) |
radsecproxy: Fix compilation without deprecated OpenSSL 1.0.2 APIs
Signed-off-by: Rosen Penev <rosenp@gmail.com>
Diffstat (limited to 'net/radsecproxy')
-rw-r--r-- | net/radsecproxy/Makefile | 2 | ||||
-rw-r--r-- | net/radsecproxy/patches/100-openssl-deprecated.patch | 22 |
2 files changed, 23 insertions, 1 deletions
diff --git a/net/radsecproxy/Makefile b/net/radsecproxy/Makefile index bfb2eda1a..76a1a3ca9 100644 --- a/net/radsecproxy/Makefile +++ b/net/radsecproxy/Makefile @@ -9,7 +9,7 @@ include $(TOPDIR)/rules.mk PKG_NAME:=radsecproxy PKG_VERSION:=1.7.2 -PKG_RELEASE:=1 +PKG_RELEASE:=2 PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz PKG_SOURCE_URL:=https://github.com/radsecproxy/radsecproxy/releases/download/$(PKG_VERSION)/ diff --git a/net/radsecproxy/patches/100-openssl-deprecated.patch b/net/radsecproxy/patches/100-openssl-deprecated.patch new file mode 100644 index 000000000..24c214079 --- /dev/null +++ b/net/radsecproxy/patches/100-openssl-deprecated.patch @@ -0,0 +1,22 @@ +--- a/tlscommon.c ++++ b/tlscommon.c +@@ -44,8 +44,8 @@ static uint8_t cookie_secret_initialized = 0; + #if OPENSSL_VERSION_NUMBER < 0x10100000 + static pthread_mutex_t *ssl_locks = NULL; + +-unsigned long ssl_thread_id() { +- return (unsigned long)pthread_self(); ++void ssl_thread_id(CRYPTO_THREADID *id) { ++ CRYPTO_THREADID_set_numeric(id, (unsigned long)pthread_self()); + } + + void ssl_locking_callback(int mode, int type, const char *file, int line) { +@@ -69,7 +69,7 @@ void sslinit() { + for (i = 0; i < CRYPTO_num_locks(); i++) { + pthread_mutex_init(&ssl_locks[i], NULL); + } +- CRYPTO_set_id_callback(ssl_thread_id); ++ CRYPTO_THREADID_set_callback(ssl_thread_id); + CRYPTO_set_locking_callback(ssl_locking_callback); + SSL_load_error_strings(); + #else |