commit:     d96be6df1dd3ddfbefe592dc4f1952dda317e36a
Author:     orbea <orbea <AT> riseup <DOT> net>
AuthorDate: Tue Jul 22 03:50:36 2025 +0000
Commit:     orbea <orbea <AT> riseup <DOT> net>
CommitDate: Tue Jul 22 03:50:36 2025 +0000
URL:        https://gitweb.gentoo.org/repo/proj/libressl.git/commit/?id=d96be6df

net-misc/stunnel: fix patch

Signed-off-by: orbea <orbea <AT> riseup.net>

 net-misc/stunnel/files/stunnel-5.71-libressl.patch | 31 ++++++++++++++++++++--
 1 file changed, 29 insertions(+), 2 deletions(-)

diff --git a/net-misc/stunnel/files/stunnel-5.71-libressl.patch 
b/net-misc/stunnel/files/stunnel-5.71-libressl.patch
index 3002bf5..efa4771 100644
--- a/net-misc/stunnel/files/stunnel-5.71-libressl.patch
+++ b/net-misc/stunnel/files/stunnel-5.71-libressl.patch
@@ -128,15 +128,33 @@ Rebased from an OpenBSD patch.
               * this means renegotiation -> mark it */
 --- a/src/ocsp.c
 +++ b/src/ocsp.c
+@@ -77,7 +77,7 @@ typedef struct {
+ /**************************************** OCSP stapling callbacks */
+ 
+ NOEXPORT int ocsp_client_cb(SSL *, void *);
+-#if OPENSSL_VERSION_NUMBER>=0x10002000L
++#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(OPENSSL_NO_PSK)
+ NOEXPORT int ocsp_server_cb(SSL *, void *);
+ #endif /* OpenSSL version 1.0.2 or later */
+ 
 @@ -108,7 +108,7 @@ int ocsp_init(SERVICE_OPTIONS *section) {
          }
          s_log(LOG_DEBUG, "OCSP: Client OCSP stapling enabled");
      } else {
 -#if OPENSSL_VERSION_NUMBER>=0x10002000L
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
++#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(OPENSSL_NO_PSK)
          if(!section->psk_keys) {
              if(SSL_CTX_set_tlsext_status_cb(section->ctx, 
ocsp_server_cb)==TLSEXT_STATUSTYPE_ocsp)
                  s_log(LOG_DEBUG, "OCSP: Server OCSP stapling enabled");
+@@ -279,7 +279,7 @@ cleanup:
+ 
+ /**************************************** OCSP stapling server callback */
+ 
+-#if OPENSSL_VERSION_NUMBER>=0x10002000L
++#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(OPENSSL_NO_PSK)
+ /*
+  * This is called when a client includes a certificate status request 
extension.
+  * The response is either obtained from a cache, or from an OCSP responder.
 --- a/src/prototypes.h
 +++ b/src/prototypes.h
 @@ -72,7 +72,7 @@ typedef struct servername_list_struct SERVERNAME_LIST;
@@ -204,6 +222,15 @@ Rebased from an OpenBSD patch.
  NOEXPORT void cb_new_auth(void *parent, void *ptr, CRYPTO_EX_DATA *ad,
          int idx, long argl, void *argp) {
  #else /* OPENSSL_VERSION_NUMBER>=0x10100000L */
+@@ -251,7 +251,7 @@ NOEXPORT int cb_new_auth(void *parent, void *ptr, 
CRYPTO_EX_DATA *ad,
+         (char *)argp);
+     if(!CRYPTO_set_ex_data(ad, idx, (void *)(-1)))
+         sslerror("CRYPTO_set_ex_data");
+-#if OPENSSL_VERSION_NUMBER<0x10100000L
++#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
+     return 1; /* success */
+ #endif /* OPENSSL_VERSION_NUMBER<0x10100000L */
+ }
 @@ -259,7 +259,7 @@ NOEXPORT int cb_new_auth(void *parent, void *ptr, 
CRYPTO_EX_DATA *ad,
  #if OPENSSL_VERSION_NUMBER>=0x30000000L
  NOEXPORT int cb_dup_addr(CRYPTO_EX_DATA *to, const CRYPTO_EX_DATA *from,
@@ -297,7 +324,7 @@ Rebased from an OpenBSD patch.
  
  NOEXPORT void tls_platform_init(void);
 -#if OPENSSL_VERSION_NUMBER<0x10100000L
-+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
++#if OPENSSL_VERSION_NUMBER<0x10100000L || (defined(LIBRESSL_VERSION_NUMBER) 
&& LIBRESSL_VERSION_NUMBER<0x4010000fL)
  NOEXPORT void free_function(void *);
  #endif
  

Reply via email to