diff options
author | Waldemar Brodkorb <wbx@uclibc-ng.org> | 2016-09-28 19:04:37 +0200 |
---|---|---|
committer | Waldemar Brodkorb <wbx@uclibc-ng.org> | 2016-09-30 21:18:09 +0200 |
commit | 4237c9d899a7e5dfb9d62644601bcbfa1574ab82 (patch) | |
tree | ccb7b6d3fe16110c0dbc0648ca5c7760ab6d2b31 /package/strongswan/patches | |
parent | f9be3a73d76d5cf4f8b07cbbff925872927a1eaa (diff) |
remove OpenSSL support
I thought some time about this, we have it in parallel some time and
it have issues for allmodconfig builds.
Anyway I have no fun doing openssl updates twice a week.
We just can not support stunnel/ssltunnel anymore.
For nodejs we use bundled openssl.
I am an old OpenBSD geek anyway, so get rid of OpenSSL.
Diffstat (limited to 'package/strongswan/patches')
-rw-r--r-- | package/strongswan/patches/patch-src_libstrongswan_plugins_openssl_openssl_plugin_c | 11 | ||||
-rw-r--r-- | package/strongswan/patches/patch-src_starter_netkey_c | 8 |
2 files changed, 15 insertions, 4 deletions
diff --git a/package/strongswan/patches/patch-src_libstrongswan_plugins_openssl_openssl_plugin_c b/package/strongswan/patches/patch-src_libstrongswan_plugins_openssl_openssl_plugin_c new file mode 100644 index 000000000..401bd7a64 --- /dev/null +++ b/package/strongswan/patches/patch-src_libstrongswan_plugins_openssl_openssl_plugin_c @@ -0,0 +1,11 @@ +--- strongswan-5.5.0.orig/src/libstrongswan/plugins/openssl/openssl_plugin.c 2016-06-30 16:20:10.000000000 +0200 ++++ strongswan-5.5.0/src/libstrongswan/plugins/openssl/openssl_plugin.c 2016-09-30 05:36:45.015692462 +0200 +@@ -573,7 +573,7 @@ plugin_t *openssl_plugin_create() + }, + ); + +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) + /* note that we can't call OPENSSL_cleanup() when the plugin is destroyed + * as we couldn't initialize the library again afterwards */ + OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CONFIG | diff --git a/package/strongswan/patches/patch-src_starter_netkey_c b/package/strongswan/patches/patch-src_starter_netkey_c index b87895eeb..adb7e09eb 100644 --- a/package/strongswan/patches/patch-src_starter_netkey_c +++ b/package/strongswan/patches/patch-src_starter_netkey_c @@ -1,6 +1,6 @@ ---- strongswan-5.0.0.orig/src/starter/netkey.c 2012-06-13 06:32:03.000000000 +0200 -+++ strongswan-5.0.0/src/starter/netkey.c 2012-07-26 16:55:59.000000000 +0200 -@@ -43,6 +43,7 @@ bool starter_netkey_init(void) +--- strongswan-5.5.0.orig/src/starter/netkey.c 2016-04-22 22:01:35.000000000 +0200 ++++ strongswan-5.5.0/src/starter/netkey.c 2016-09-30 05:30:43.681874545 +0200 +@@ -42,6 +42,7 @@ bool starter_netkey_init(void) } /* make sure that all required IPsec modules are loaded */ @@ -8,7 +8,7 @@ if (stat(PROC_MODULES, &stb) == 0) { ignore_result(system("modprobe -qv ah4")); -@@ -51,6 +52,7 @@ bool starter_netkey_init(void) +@@ -50,6 +51,7 @@ bool starter_netkey_init(void) ignore_result(system("modprobe -qv xfrm4_tunnel")); ignore_result(system("modprobe -qv xfrm_user")); } |