diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2018-09-26 21:18:33 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2018-09-27 09:00:30 +0200 |
commit | 23035b95d979a02036bab2212baef88521828274 (patch) | |
tree | 5804993bafbe3a5e57774308608d433e77fdf9db /source/n/fetchmail/fetchmail.openssl111.diff | |
parent | 6371ee337f229ef7fd9dc4800b593589def96747 (diff) | |
download | current-23035b95d979a02036bab2212baef88521828274.tar.gz |
Wed Sep 26 21:18:33 UTC 201820180926211833
a/aaa_terminfo-6.1_20180923-x86_64-1.txz: Upgraded.
a/eudev-3.2.6-x86_64-3.txz: Rebuilt.
Fixed issues with the default rules. Thanks to zuriel.
a/kernel-generic-4.14.72-x86_64-1.txz: Upgraded.
a/kernel-huge-4.14.72-x86_64-1.txz: Upgraded.
a/kernel-modules-4.14.72-x86_64-1.txz: Upgraded.
ap/vim-8.1.0436-x86_64-1.txz: Upgraded.
d/kernel-headers-4.14.72-x86-1.txz: Upgraded.
d/re2c-1.1.1-x86_64-1.txz: Upgraded.
k/kernel-source-4.14.72-noarch-1.txz: Upgraded.
l/ncurses-6.1_20180923-x86_64-1.txz: Upgraded.
n/fetchmail-6.3.26-x86_64-5.txz: Rebuilt.
Patched to fix certificate verification failures with OpenSSL 1.1.1.
Thanks to Jurgen Van Ham.
n/gnutls-3.6.4-x86_64-1.txz: Upgraded.
x/xf86-video-intel-20180906_25c9a2fc-x86_64-1.txz: Upgraded.
xap/vim-gvim-8.1.0436-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'source/n/fetchmail/fetchmail.openssl111.diff')
-rw-r--r-- | source/n/fetchmail/fetchmail.openssl111.diff | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/source/n/fetchmail/fetchmail.openssl111.diff b/source/n/fetchmail/fetchmail.openssl111.diff new file mode 100644 index 00000000..45516b6b --- /dev/null +++ b/source/n/fetchmail/fetchmail.openssl111.diff @@ -0,0 +1,11 @@ +--- ./socket.c.orig 2013-04-23 15:00:45.000000000 -0500 ++++ ./socket.c 2018-09-26 11:56:14.957489314 -0500 +@@ -1007,6 +1007,8 @@ + SSL_use_RSAPrivateKey_file(_ssl_context[sock], mykey, SSL_FILETYPE_PEM); + } + ++ SSL_set_tlsext_host_name(_ssl_context[sock],servercname); ++ + if (SSL_set_fd(_ssl_context[sock], sock) == 0 + || SSL_connect(_ssl_context[sock]) < 1) { + ERR_print_errors_fp(stderr); |