summaryrefslogtreecommitdiff
path: root/databases/mysql56-server/files/patch-vio_viosslfactories.c
diff options
context:
space:
mode:
authorJochen Neumeister <joneum@FreeBSD.org>2020-03-12 07:42:38 +0000
committerJochen Neumeister <joneum@FreeBSD.org>2020-03-12 07:42:38 +0000
commitc2bd9677788989f8289b28cec5eb2524f7b0b514 (patch)
tree83beb3ec44646f7c59693dce1ae56106a4b73eca /databases/mysql56-server/files/patch-vio_viosslfactories.c
parentx11-drivers/xorgxrdp: disable DRI3 option by default again (diff)
This fix a Problem, when MySQL build with libressl
/var/ports/usr/ports/databases/mysql56-client/work/mysql-5.6.47/vio/viosslfactories.c:230:25: error: use of undeclared identifier 'SSL_OP_NO_TLSv1_3' SSL_OP_NO_TLSv1_3 | ^ /var/ports/usr/ports/databases/mysql56-client/work/mysql-5.6.47/vio/viosslfactories.c:275:12: warning: implicit declaration of function 'SSL_CTX_set_ciphersuites' is invalid in C99 [-Wimplicit-function-declaration] if (0 == SSL_CTX_set_ciphersuites(ssl_fd->ssl_context, "")) Special thanks for his help to: fluffy PR: 244320 MFH: 2020Q1 Sponsored by: Netzkommune GmbH
Notes
Notes: svn path=/head/; revision=528272
Diffstat (limited to 'databases/mysql56-server/files/patch-vio_viosslfactories.c')
-rw-r--r--databases/mysql56-server/files/patch-vio_viosslfactories.c20
1 files changed, 20 insertions, 0 deletions
diff --git a/databases/mysql56-server/files/patch-vio_viosslfactories.c b/databases/mysql56-server/files/patch-vio_viosslfactories.c
new file mode 100644
index 000000000000..d6a164910a0d
--- /dev/null
+++ b/databases/mysql56-server/files/patch-vio_viosslfactories.c
@@ -0,0 +1,20 @@
+--- vio/viosslfactories.c.orig 2019-11-26 16:53:45 UTC
++++ vio/viosslfactories.c
+@@ -91,7 +91,7 @@ static DH *get_dh2048(void)
+ DH_free(dh);
+ return NULL;
+ }
+-#if OPENSSL_VERSION_NUMBER < 0x10100000L
++#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
+ dh->p= p;
+ dh->g= g;
+ #endif /* OPENSSL_VERSION_NUMBER < 0x10100000L */
+@@ -250,7 +250,7 @@ new_VioSSLFd(const char *key_file, const char *cert_fi
+ DBUG_RETURN(0);
+
+ if (!(ssl_fd->ssl_context= SSL_CTX_new(is_client ?
+-#if OPENSSL_VERSION_NUMBER < 0x10100000L
++#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
+ SSLv23_client_method() :
+ SSLv23_server_method()
+ #else /* OPENSSL_VERSION_NUMBER < 0x10100000L */