mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2024-11-22 09:29:52 +03:00
Compare commits
7 Commits
7153bb8248
...
3664974604
Author | SHA1 | Date | |
---|---|---|---|
|
3664974604 | ||
|
31fed5a28f | ||
|
a8ce56b28b | ||
|
08e24917b8 | ||
|
e2017772c7 | ||
|
d6d0f2dadd | ||
|
68b72d8867 |
@ -1,4 +1,4 @@
|
|||||||
cmake_minimum_required(VERSION 3.10)
|
cmake_minimum_required(VERSION 3.15)
|
||||||
|
|
||||||
set(BUILD_NUMBER CACHE STRING "The number of the current build.")
|
set(BUILD_NUMBER CACHE STRING "The number of the current build.")
|
||||||
|
|
||||||
|
@ -33,6 +33,7 @@ You need to install the following software to build SoftEther VPN for UNIX.
|
|||||||
|
|
||||||
```bash
|
```bash
|
||||||
sudo yum -y groupinstall "Development Tools"
|
sudo yum -y groupinstall "Development Tools"
|
||||||
|
sudo yum -y install epel-release
|
||||||
sudo yum -y install cmake ncurses-devel openssl-devel libsodium-devel readline-devel zlib-devel
|
sudo yum -y install cmake ncurses-devel openssl-devel libsodium-devel readline-devel zlib-devel
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -351,6 +351,11 @@ MD *NewMdEx(char *name, bool hmac)
|
|||||||
#else
|
#else
|
||||||
m->Ctx = EVP_MD_CTX_create();
|
m->Ctx = EVP_MD_CTX_create();
|
||||||
#endif
|
#endif
|
||||||
|
if (m->Ctx == NULL)
|
||||||
|
{
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
if (EVP_DigestInit_ex(m->Ctx, m->Md, NULL) == false)
|
if (EVP_DigestInit_ex(m->Ctx, m->Md, NULL) == false)
|
||||||
{
|
{
|
||||||
Debug("NewMdEx(): EVP_DigestInit_ex() failed with error: %s\n", OpenSSL_Error());
|
Debug("NewMdEx(): EVP_DigestInit_ex() failed with error: %s\n", OpenSSL_Error());
|
||||||
@ -4604,6 +4609,11 @@ DH_CTX *DhNew(char *prime, UINT g)
|
|||||||
dh = ZeroMalloc(sizeof(DH_CTX));
|
dh = ZeroMalloc(sizeof(DH_CTX));
|
||||||
|
|
||||||
dh->dh = DH_new();
|
dh->dh = DH_new();
|
||||||
|
if (dh->dh == NULL)
|
||||||
|
{
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
||||||
dhp = BinToBigNum(buf->Buf, buf->Size);
|
dhp = BinToBigNum(buf->Buf, buf->Size);
|
||||||
dhg = BN_new();
|
dhg = BN_new();
|
||||||
|
@ -11860,6 +11860,12 @@ bool StartSSLEx3(SOCK *sock, X *x, K *priv, LIST *chain, UINT ssl_timeout, char
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
sock->ssl = SSL_new(ssl_ctx);
|
sock->ssl = SSL_new(ssl_ctx);
|
||||||
|
|
||||||
|
if (sock->ssl == NULL)
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
SSL_set_fd(sock->ssl, (int)sock->socket);
|
SSL_set_fd(sock->ssl, (int)sock->socket);
|
||||||
|
|
||||||
#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
|
#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
|
||||||
@ -16250,6 +16256,12 @@ UINT GetOSSecurityLevel()
|
|||||||
UINT security_level_new = 0, security_level_set_ssl_version = 0;
|
UINT security_level_new = 0, security_level_set_ssl_version = 0;
|
||||||
struct ssl_ctx_st *ctx = SSL_CTX_new(SSLv23_method());
|
struct ssl_ctx_st *ctx = SSL_CTX_new(SSLv23_method());
|
||||||
|
|
||||||
|
if (ctx == NULL)
|
||||||
|
{
|
||||||
|
return security_level_new;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
|
#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
|
||||||
security_level_new = SSL_CTX_get_security_level(ctx);
|
security_level_new = SSL_CTX_get_security_level(ctx);
|
||||||
#endif
|
#endif
|
||||||
|
Loading…
Reference in New Issue
Block a user