5a4a21
diff -up librelp-1.9.0/src/tcp.c.orig librelp-1.9.0/src/tcp.c
5a4a21
--- librelp-1.9.0/src/tcp.c.orig	2021-04-26 12:50:02.988053548 +0200
5a4a21
+++ librelp-1.9.0/src/tcp.c	2021-04-26 15:12:58.292600192 +0200
5a4a21
@@ -1155,32 +1155,8 @@ static relpRetVal LIBRELP_ATTR_NONNULL()
5a4a21
 relpTcpTLSSetPrio_gtls(relpTcp_t *const pThis)
5a4a21
 {
5a4a21
 	int r;
5a4a21
-	char pristringBuf[4096];
5a4a21
-	char *pristring;
5a4a21
 	ENTER_RELPFUNC;
5a4a21
-	/* Set default priority string (in simple cases where the user does not care...) */
5a4a21
-	if(pThis->pristring == NULL) {
5a4a21
-		if (pThis->authmode == eRelpAuthMode_None) {
5a4a21
-			if(pThis->bEnableTLSZip) {
5a4a21
-				strncpy(pristringBuf, "NORMAL:+ANON-DH:+COMP-ALL", sizeof(pristringBuf));
5a4a21
-			} else {
5a4a21
-				strncpy(pristringBuf, "NORMAL:+ANON-DH:+COMP-NULL", sizeof(pristringBuf));
5a4a21
-			}
5a4a21
-			pristringBuf[sizeof(pristringBuf)-1] = '\0';
5a4a21
-			pristring = pristringBuf;
5a4a21
-			r = gnutls_priority_set_direct(pThis->session, pristring, NULL);
5a4a21
-		} else {
5a4a21
-			r = gnutls_set_default_priority(pThis->session);
5a4a21
-			strncpy(pristringBuf, "to recommended system default", sizeof(pristringBuf));
5a4a21
-			pristringBuf[sizeof(pristringBuf)-1] = '\0';
5a4a21
-			pristring = pristringBuf;
5a4a21
-		}
5a4a21
-
5a4a21
-	} else {
5a4a21
-		pristring = pThis->pristring;
5a4a21
-		r = gnutls_priority_set_direct(pThis->session, pristring, NULL);
5a4a21
-	}
5a4a21
-
5a4a21
+	r = gnutls_set_default_priority(pThis->session);
5a4a21
 	if(r == GNUTLS_E_INVALID_REQUEST) {
5a4a21
 		ABORT_FINALIZE(RELP_RET_INVLD_TLS_PRIO);
5a4a21
 	} else if(r != GNUTLS_E_SUCCESS) {
5a4a21
@@ -1188,7 +1164,7 @@ relpTcpTLSSetPrio_gtls(relpTcp_t *const
5a4a21
 	}
5a4a21
 
5a4a21
 finalize_it:
5a4a21
-	pThis->pEngine->dbgprint((char*)"relpTcpTLSSetPrio_gtls: Setting ciphers '%s' iRet=%d\n", pristring, iRet);
5a4a21
+	pThis->pEngine->dbgprint((char*)"relpTcpTLSSetPrio_gtls: Setting ciphers to system default iRet=%d\n", iRet);
5a4a21
 
5a4a21
 	if(iRet != RELP_RET_OK) {
5a4a21
 		chkGnutlsCode(pThis, "Failed to set GnuTLS priority", iRet, r);
5a4a21
@@ -1207,37 +1183,15 @@ relpTcpTLSSetPrio_gtls(LIBRELP_ATTR_UNUS
5a4a21
 static relpRetVal LIBRELP_ATTR_NONNULL()
5a4a21
 relpTcpTLSSetPrio_ossl(relpTcp_t *const pThis)
5a4a21
 {
5a4a21
-	char pristringBuf[4096];
5a4a21
-	char *pristring;
5a4a21
 	ENTER_RELPFUNC;
5a4a21
-	/* Compute priority string (in simple cases where the user does not care...) */
5a4a21
-	if(pThis->pristring == NULL) {
5a4a21
-		if (pThis->authmode == eRelpAuthMode_None) {
5a4a21
-			#if OPENSSL_VERSION_NUMBER >= 0x10100000L \
5a4a21
-				&& !defined(LIBRESSL_VERSION_NUMBER)
5a4a21
-			 /* NOTE: do never use: +eNULL, it DISABLES encryption! */
5a4a21
-			strncpy(pristringBuf, "ALL:+COMPLEMENTOFDEFAULT:+ADH:+ECDH:+aNULL@SECLEVEL=0",
5a4a21
-				sizeof(pristringBuf));
5a4a21
-			#else
5a4a21
-			strncpy(pristringBuf, "ALL:+COMPLEMENTOFDEFAULT:+ADH:+ECDH:+aNULL",
5a4a21
-				sizeof(pristringBuf));
5a4a21
-			#endif
5a4a21
-		} else {
5a4a21
-			strncpy(pristringBuf, "DEFAULT", sizeof(pristringBuf));
5a4a21
-		}
5a4a21
-		pristringBuf[sizeof(pristringBuf)-1] = '\0';
5a4a21
-		pristring = pristringBuf;
5a4a21
-	} else {
5a4a21
-		pristring = pThis->pristring;
5a4a21
-	}
5a4a21
 
5a4a21
-	if ( SSL_set_cipher_list(pThis->ssl, pristring) == 0 ){
5a4a21
-		pThis->pEngine->dbgprint((char*)"relpTcpTLSSetPrio_ossl: Error setting ciphers '%s'\n", pristring);
5a4a21
+	if ( SSL_set_cipher_list(pThis->ssl, "PROFILE=SYSTEM") == 0 ){
5a4a21
+		pThis->pEngine->dbgprint((char*)"relpTcpTLSSetPrio_ossl: Error setting ciphers to system default\n");
5a4a21
 		ABORT_FINALIZE(RELP_RET_ERR_TLS_SETUP);
5a4a21
 	}
5a4a21
 
5a4a21
 finalize_it:
5a4a21
-	pThis->pEngine->dbgprint((char*)"relpTcpTLSSetPrio_ossl: Setting ciphers '%s' iRet=%d\n", pristring, iRet);
5a4a21
+	pThis->pEngine->dbgprint((char*)"relpTcpTLSSetPrio_ossl: Setting ciphers to system default iRet=%d\n", iRet);
5a4a21
 	LEAVE_RELPFUNC;
5a4a21
 }
5a4a21
 #else