diff options
author | Rod Whitby <rod@whitby.id.au> | 2005-07-19 20:19:04 +0000 |
---|---|---|
committer | OpenEmbedded Project <openembedded-devel@lists.openembedded.org> | 2005-07-19 20:19:04 +0000 |
commit | 48cfa786504fc72c1ae2663374ef34233cbf448c (patch) | |
tree | 831213c9900e904cada4991892dd5a4b32918ef9 /packages/sylpheed/files/sylpheed-gnutls-extra.patch | |
parent | 8b1c4a494721baaffe283cb55c204d444ca57770 (diff) | |
parent | 4d0a097e128e46bd4c7616881f2b8a53acdd27c2 (diff) |
propagate from branch 'org.openembedded.dev' (head 93d082d6c4a3db13947817853eef91fb326fc223)
to branch 'org.openembedded.nslu2-linux' (head 3d6cac6f54eff620f4ea72c01aace1b87353dca8)
Diffstat (limited to 'packages/sylpheed/files/sylpheed-gnutls-extra.patch')
-rw-r--r-- | packages/sylpheed/files/sylpheed-gnutls-extra.patch | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/packages/sylpheed/files/sylpheed-gnutls-extra.patch b/packages/sylpheed/files/sylpheed-gnutls-extra.patch new file mode 100644 index 0000000000..ba24b5a1d7 --- /dev/null +++ b/packages/sylpheed/files/sylpheed-gnutls-extra.patch @@ -0,0 +1,37 @@ +--- sylpheed-2.0.0beta6/src/ssl.c.orig 2005-07-20 15:45:12.882201824 +0100 ++++ sylpheed-2.0.0beta6/src/ssl.c 2005-07-20 16:10:04.006516472 +0100 +@@ -54,9 +54,9 @@ + debug_print(_("SSLv23 not available\n")); + } else { + debug_print(_("SSLv23 available\n")); +- if (certs_dir && ++ if (certs_dir /*&& + !SSL_CTX_load_verify_locations(ssl_ctx_SSLv23, NULL, +- certs_dir)) ++ certs_dir)*/) + g_warning("SSLv23 SSL_CTX_load_verify_locations failed.\n"); + } + +@@ -65,9 +65,9 @@ + debug_print(_("TLSv1 not available\n")); + } else { + debug_print(_("TLSv1 available\n")); +- if (certs_dir && ++ if (certs_dir /*&& + !SSL_CTX_load_verify_locations(ssl_ctx_TLSv1, NULL, +- certs_dir)) ++ certs_dir)*/) + g_warning("TLSv1 SSL_CTX_load_verify_locations failed.\n"); + } + +@@ -151,8 +151,8 @@ + g_free(str); + } + +- verify_result = SSL_get_verify_result(sockinfo->ssl); +- if (verify_result == X509_V_OK) ++ verify_result = 0; /*SSL_get_verify_result(sockinfo->ssl);*/ ++ if (verify_result == 1) + debug_print("SSL verify OK\n"); + else + g_warning("%s: SSL certificate verify failed (%ld: %s)\n", |