|
|
|
@ -448,14 +448,14 @@ static int tcptls_stream_close(void *cookie)
|
|
|
|
|
ERR_error_string(sslerr, err), ssl_error_to_string(sslerr, res));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
|
|
|
|
|
#if !defined(LIBRESSL_VERSION_NUMBER) && (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
|
|
|
if (!SSL_is_server(stream->ssl)) {
|
|
|
|
|
#else
|
|
|
|
|
if (!stream->ssl->server) {
|
|
|
|
|
#endif
|
|
|
|
|
/* For client threads, ensure that the error stack is cleared */
|
|
|
|
|
#if !defined(OPENSSL_VERSION_NUMBER) || OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
|
|
|
|
|
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10000000L
|
|
|
|
|
#if defined(LIBRESSL_VERSION_NUMBER) || (OPENSSL_VERSION_NUMBER < 0x10100000L)
|
|
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10000000L
|
|
|
|
|
ERR_remove_thread_state(NULL);
|
|
|
|
|
#else
|
|
|
|
|
ERR_remove_state(0);
|
|
|
|
@ -901,13 +901,13 @@ static int __ssl_setup(struct ast_tls_config *cfg, int client)
|
|
|
|
|
cfg->ssl_ctx = SSL_CTX_new(SSLv2_client_method());
|
|
|
|
|
} else
|
|
|
|
|
#endif
|
|
|
|
|
#ifndef OPENSSL_NO_SSL3_METHOD
|
|
|
|
|
#if !defined(OPENSSL_NO_SSL3_METHOD) && !(defined(OPENSSL_API_COMPAT) && (OPENSSL_API_COMPAT >= 0x10100000L))
|
|
|
|
|
if (ast_test_flag(&cfg->flags, AST_SSL_SSLV3_CLIENT)) {
|
|
|
|
|
ast_log(LOG_WARNING, "Usage of SSLv3 is discouraged due to known vulnerabilities. Please use 'tlsv1' or leave the TLS method unspecified!\n");
|
|
|
|
|
cfg->ssl_ctx = SSL_CTX_new(SSLv3_client_method());
|
|
|
|
|
} else
|
|
|
|
|
#endif
|
|
|
|
|
#if defined(OPENSSL_VERSION_NUMBER) && (OPENSSL_VERSION_NUMBER >= 0x10100000L)
|
|
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
|
|
|
cfg->ssl_ctx = SSL_CTX_new(TLS_client_method());
|
|
|
|
|
#else
|
|
|
|
|
if (ast_test_flag(&cfg->flags, AST_SSL_TLSV1_CLIENT)) {
|
|
|
|
|