Update to coturn 4.5.2

This commit is contained in:
feinerer 2021-04-30 07:52:33 +00:00
parent 2ed54fabfc
commit 06fbfe7051
4 changed files with 7 additions and 47 deletions

View File

@ -1,8 +1,8 @@
# $OpenBSD: Makefile,v 1.7 2020/08/15 05:11:03 feinerer Exp $
# $OpenBSD: Makefile,v 1.8 2021/04/30 07:52:33 feinerer Exp $
COMMENT = coturn STUN/TURN server
V = 4.5.1.3
V = 4.5.2
DISTNAME = turnserver-${V}
CATEGORIES = telephony
@ -30,7 +30,9 @@ LIB_DEPENDS = databases/mariadb \
CONFIGURE_STYLE = simple
CONFIGURE_ARGS = --localstatedir='${LOCALSTATEDIR}'
# There is no port for MongoDB development libraries and/or headers
CONFIGURE_ENV = TURN_NO_MONGO=1
CONFIGURE_ENV = TURN_NO_MONGO=1 \
TURN_NO_PROMETHEUS=1 \
TURN_NO_SYSTEMD=1
post-install:
rm -rf ${PREFIX}/etc

View File

@ -1,2 +1,2 @@
SHA256 (turnserver-4.5.1.3.tar.gz) = QIv3/eRV1kG7KiO6LfmS6groezKN505m4WfvWNjpcTo=
SIZE (turnserver-4.5.1.3.tar.gz) = 438452
SHA256 (turnserver-4.5.2.tar.gz) = HL74jNSrDeDU1wEfTn6vOaNEtIXponLzBV61PdMDtuE=
SIZE (turnserver-4.5.2.tar.gz) = 444865

View File

@ -1,17 +0,0 @@
$OpenBSD: patch-src_apps_relay_dtls_listener_c,v 1.1 2020/05/17 10:14:53 feinerer Exp $
src/apps/common/ns_turn_openssl.h hardcodes OPENSSL_VERSION_NUMBER as
0x1000107FL if LibreSSL is detected, so add an explicit check here.
Index: src/apps/relay/dtls_listener.c
--- src/apps/relay/dtls_listener.c.orig
+++ src/apps/relay/dtls_listener.c
@@ -206,7 +206,7 @@ static int generate_cookie(SSL *ssl, unsigned char *co
}
static int verify_cookie(SSL *ssl,
-#if OPENSSL_VERSION_NUMBER >= 0x10100000L
+#if OPENSSL_VERSION_NUMBER >= 0x10100000L | defined(LIBRESSL_VERSION_NUMBER)
const
#endif
unsigned char *cookie, unsigned int cookie_len)

View File

@ -1,25 +0,0 @@
$OpenBSD: patch-src_client_ns_turn_msg_c,v 1.2 2020/08/15 05:11:03 feinerer Exp $
LibreSSL has no FIPS mode.
Index: src/client/ns_turn_msg.c
--- src/client/ns_turn_msg.c.orig
+++ src/client/ns_turn_msg.c
@@ -244,7 +244,7 @@ int stun_produce_integrity_key_str(const uint8_t *unam
unsigned int keylen = 0;
EVP_MD_CTX ctx;
EVP_MD_CTX_init(&ctx);
-#ifdef EVP_MD_CTX_FLAG_NON_FIPS_ALLOW
+#ifdef OPENSSL_FIPS
if (FIPS_mode()) {
EVP_MD_CTX_set_flags(&ctx,EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
}
@@ -256,7 +256,7 @@ int stun_produce_integrity_key_str(const uint8_t *unam
#else
unsigned int keylen = 0;
EVP_MD_CTX *ctx = EVP_MD_CTX_new();
-#ifdef EVP_MD_CTX_FLAG_NON_FIPS_ALLOW
+#ifdef OPENSSL_FIPS
if (FIPS_mode()) {
EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
}