aboutsummaryrefslogtreecommitdiff
path: root/databases/mysql56-server/files/patch-sql-common_client.c
diff options
context:
space:
mode:
authorJochen Neumeister <joneum@FreeBSD.org>2020-03-12 07:47:46 +0000
committerJochen Neumeister <joneum@FreeBSD.org>2020-03-12 07:47:46 +0000
commit25f1ebfadd241438d2101129bffda8faecb88afe (patch)
tree088d51fc7cab27979248e5b4d19ca23decedaeb2 /databases/mysql56-server/files/patch-sql-common_client.c
parent5cfd4e8b48060eb366e6c29d62c2afe246d3c82a (diff)
downloadports-25f1ebfadd241438d2101129bffda8faecb88afe.tar.gz
ports-25f1ebfadd241438d2101129bffda8faecb88afe.zip
MFH: r528272
This fix a Problem, when MySQL build with libressl /var/ports/usr/ports/databases/mysql56-client/work/mysql-5.6.47/vio/viosslfactories.c:230:25: error: use of undeclared identifier 'SSL_OP_NO_TLSv1_3' SSL_OP_NO_TLSv1_3 | ^ /var/ports/usr/ports/databases/mysql56-client/work/mysql-5.6.47/vio/viosslfactories.c:275:12: warning: implicit declaration of function 'SSL_CTX_set_ciphersuites' is invalid in C99 [-Wimplicit-function-declaration] if (0 == SSL_CTX_set_ciphersuites(ssl_fd->ssl_context, "")) Special thanks for his help to: fluffy PR: 244320 Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum)
Notes
Notes: svn path=/branches/2020Q1/; revision=528273
Diffstat (limited to 'databases/mysql56-server/files/patch-sql-common_client.c')
-rw-r--r--databases/mysql56-server/files/patch-sql-common_client.c15
1 files changed, 15 insertions, 0 deletions
diff --git a/databases/mysql56-server/files/patch-sql-common_client.c b/databases/mysql56-server/files/patch-sql-common_client.c
new file mode 100644
index 000000000000..cfc168b75a53
--- /dev/null
+++ b/databases/mysql56-server/files/patch-sql-common_client.c
@@ -0,0 +1,15 @@
+--- sql-common/client.c.orig 2019-11-26 16:53:45 UTC
++++ sql-common/client.c
+@@ -1980,7 +1980,11 @@ static int ssl_verify_server_cert(Vio *vio, const char
+ goto error;
+ }
+
+- cn= (char *) ASN1_STRING_data(cn_asn1);
++#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
++ cn= (const char *) ASN1_STRING_data(cn_asn1);
++#else
++ cn= (const char *) ASN1_STRING_get0_data(cn_asn1);
++#endif
+
+ // There should not be any NULL embedded in the CN
+ if ((size_t)ASN1_STRING_length(cn_asn1) != strlen(cn))