Blame SOURCES/bacula-openssl.patch

df1dee
diff -Naur bacula-11.0.1.old/src/lib/crypto.c bacula-11.0.1/src/lib/crypto.c
df1dee
--- bacula-11.0.1.old/src/lib/crypto.c	2021-02-11 14:08:38.220885976 +0100
df1dee
+++ bacula-11.0.1/src/lib/crypto.c	2021-02-11 14:08:42.518956898 +0100
df1dee
@@ -42,7 +42,7 @@
df1dee
  * For OpenSSL version 1.x, EVP_PKEY_encrypt no longer
df1dee
  *  exists.  It was not an official API.
df1dee
  */
df1dee
-#ifdef HAVE_OPENSSLv1
df1dee
+#if (OPENSSL_VERSION_NUMBER >= 0x10000000L)
df1dee
 #define EVP_PKEY_encrypt EVP_PKEY_encrypt_old
df1dee
 #define EVP_PKEY_decrypt EVP_PKEY_decrypt_old
df1dee
 #endif
df1dee
diff -Naur bacula-11.0.1.old/src/lib/tls.c bacula-11.0.1/src/lib/tls.c
df1dee
--- bacula-11.0.1.old/src/lib/tls.c	2021-02-11 14:08:38.218885943 +0100
df1dee
+++ bacula-11.0.1/src/lib/tls.c	2021-02-11 14:08:42.565957674 +0100
df1dee
@@ -47,9 +47,6 @@
df1dee
 
df1dee
 #include "openssl-compat.h"
df1dee
 
df1dee
-/* No anonymous ciphers, no <128 bit ciphers, no export ciphers, no MD5 ciphers */
df1dee
-#define TLS_DEFAULT_CIPHERS "ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH"
df1dee
-
df1dee
 /* TLS Context Structure */
df1dee
 struct TLS_Context {
df1dee
    SSL_CTX *openssl;
df1dee
@@ -350,7 +347,7 @@
df1dee
       SSL_CTX_set_options(ctx->openssl, SSL_OP_SINGLE_DH_USE);
df1dee
    }
df1dee
 
df1dee
-   if (SSL_CTX_set_cipher_list(ctx->openssl, TLS_DEFAULT_CIPHERS) != 1) {
df1dee
+   if (SSL_CTX_set_cipher_list(ctx->openssl, "PROFILE=SYSTEM") != 1) {
df1dee
       Jmsg0(NULL, M_ERROR, 0,
df1dee
              _("Error setting cipher list, no valid ciphers available\n"));
df1dee
       goto err;
df1dee
@@ -551,7 +548,7 @@
df1dee
          extname = OBJ_nid2sn(OBJ_obj2nid(X509_EXTENSION_get_object(ext)));
df1dee
 
df1dee
          if (strcmp(extname, "subjectAltName") == 0) {
df1dee
-#ifdef HAVE_OPENSSLv1
df1dee
+#if (OPENSSL_VERSION_NUMBER >= 0x10000000L)
df1dee
             const X509V3_EXT_METHOD *method;
df1dee
 #else
df1dee
             X509V3_EXT_METHOD *method;