Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP4:Update
curl.15480
curl-use_DEFAULT_SUSE_cipher.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File curl-use_DEFAULT_SUSE_cipher.patch of Package curl.15480
Index: curl-7.60.0/lib/vtls/openssl.c =================================================================== --- curl-7.60.0.orig/lib/vtls/openssl.c 2018-08-13 14:27:34.073518809 +0200 +++ curl-7.60.0/lib/vtls/openssl.c 2018-08-13 14:43:16.936008597 +0200 @@ -178,7 +178,7 @@ static unsigned long OpenSSL_version_num /* up2date versions of OpenSSL maintain the default reasonably secure without * breaking compatibility, so it is better not to override the default by curl */ -#define DEFAULT_CIPHER_SELECTION NULL +#define DEFAULT_CIPHER_SELECTION "DEFAULT_SUSE" #else /* ... but it is not the case with old versions of OpenSSL */ #define DEFAULT_CIPHER_SELECTION \ @@ -2394,8 +2394,18 @@ static CURLcode ossl_connect_step1(struc ciphers = (char *)DEFAULT_CIPHER_SELECTION; if(ciphers) { if(!SSL_CTX_set_cipher_list(BACKEND->ctx, ciphers)) { - failf(data, "failed setting cipher list: %s", ciphers); - return CURLE_SSL_CIPHER; + if(!strcmp(ciphers, "DEFAULT_SUSE")) { + infof(data, "cipher list %s not available, using %s\n", "DEFAULT_SUSE", "HIGH"); + if(!SSL_CTX_set_cipher_list(BACKEND->ctx, "HIGH")) { + failf(data, "failed setting cipher list: %s, setting cipher list %s also failed", + "DEFAULT_SUSE", "HIGH"); + return CURLE_SSL_CIPHER; + } + } + else { + failf(data, "failed setting cipher list: %s", ciphers); + return CURLE_SSL_CIPHER; + } } infof(data, "Cipher selection: %s\n", ciphers); }
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor