diff options
author | Matthias Andree <matthias.andree@gmx.de> | 2015-01-16 20:48:46 +0100 |
---|---|---|
committer | Matthias Andree <matthias.andree@gmx.de> | 2015-01-16 20:48:46 +0100 |
commit | a2ae6f8d15d7caf815d7bdd13df833fd1b2af5cc (patch) | |
tree | 5c31ff2c9fc55824b8386806578af4e0a07095ad /socket.c | |
parent | fd20cf6829c42bb9b6c5316fc8269d4b1dffdafb (diff) | |
download | fetchmail-a2ae6f8d15d7caf815d7bdd13df833fd1b2af5cc.tar.gz fetchmail-a2ae6f8d15d7caf815d7bdd13df833fd1b2af5cc.tar.bz2 fetchmail-a2ae6f8d15d7caf815d7bdd13df833fd1b2af5cc.zip |
Permit build on SSLv3-disabled OpenSSL,
providing that these also omit the declaration of SSLv3_client_method().
Related to Debian Bug#775255.
Version report lists -SSLv3 on +SSL builds that omit SSLv3_client_method().
Version report lists -SSLv2 on +SSL builds that omit SSLv2_client_method().
Diffstat (limited to 'socket.c')
-rw-r--r-- | socket.c | 7 |
1 files changed, 6 insertions, 1 deletions
@@ -910,11 +910,16 @@ int SSLOpen(int sock, char *mycert, char *mykey, const char *myproto, int certck #if HAVE_DECL_SSLV2_CLIENT_METHOD + 0 > 0 _ctx[sock] = SSL_CTX_new(SSLv2_client_method()); #else - report(stderr, GT_("Your operating system does not support SSLv2.\n")); + report(stderr, GT_("Your OpenSSL version does not support SSLv2.\n")); return -1; #endif } else if(!strcasecmp("ssl3",myproto)) { +#if HAVE_DECL_SSLV3_CLIENT_METHOD + 0 > 0 _ctx[sock] = SSL_CTX_new(SSLv3_client_method()); +#else + report(stderr, GT_("Your OpenSSL version does not support SSLv3.\n")); + return -1; +#endif } else if(!strcasecmp("tls1",myproto)) { _ctx[sock] = SSL_CTX_new(TLSv1_client_method()); } else if (!strcasecmp("ssl23",myproto)) { |