coturn/debian/patches/No-FIPS-140-mode.patch
Nicholas Guriev 26beddf612 Import Debian changes 4.5.2-3.1
coturn (4.5.2-3.1) unstable; urgency=medium
.
  * Non-maintainer upload.
  * [518094e] New No-FIPS-140-mode.patch fixes build against OpenSSL 3.0
    (Closes: #995659, LP: #1967018)
2024-04-13 13:23:59 +00:00

31 lines
1.1 KiB
Diff

From: Nicholas Guriev <guriev-ns@ya.ru>
Date: Thu, 02 Jun 2022 12:34:17 +0300
Subject: Do not check FIPS 140 mode
It is not available in OpenSSL as packaged in Debian. The OPENSSL_FIPS macro
appeared in ancient OpenSSL sources but was never defined.
https://sources.debian.org/src/openssl/1.1.1n-0%2Bdeb11u2/crypto/o_fips.c/
---
src/client/ns_turn_msg.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--- a/src/client/ns_turn_msg.c
+++ b/src/client/ns_turn_msg.c
@@ -244,7 +244,7 @@ int stun_produce_integrity_key_str(const
unsigned int keylen = 0;
EVP_MD_CTX ctx;
EVP_MD_CTX_init(&ctx);
-#if defined EVP_MD_CTX_FLAG_NON_FIPS_ALLOW && !defined(LIBRESSL_VERSION_NUMBER)
+#ifdef OPENSSL_FIPS
if (FIPS_mode()) {
EVP_MD_CTX_set_flags(&ctx,EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
}
@@ -256,7 +256,7 @@ int stun_produce_integrity_key_str(const
#else
unsigned int keylen = 0;
EVP_MD_CTX *ctx = EVP_MD_CTX_new();
-#if defined EVP_MD_CTX_FLAG_NON_FIPS_ALLOW && ! defined(LIBRESSL_VERSION_NUMBER)
+#ifdef OPENSSL_FIPS
if (FIPS_mode()) {
EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
}