SHA256
1
0
forked from pool/sslscan
sslscan/fedora-sslscan-patents.patch
Johannes Weberhofer 2779045d1d Accepting request 822258 from home:wfrisch:branches:security
- Upgrade to version 2.0.0-beta6
  * Various bugfixes
  * Added -4 and -6 options to force IPv4 and IPv6.
  * Added strength attribute to XML to reflect colouring in stdout
  * Checks for server signature algorithms.
  * Checks for server key exchange groups.
  * Support for SSLv2 and SSLv3 protocol detection regardless of OpenSSL
  * Support for TLSv1.3
  * Support for additional cipher suites.
  * Print curve name and key strength for ECC certs
  * Fix a bug with servers that return incorrect cipher IDs.
  * Add a new "<certificates>" element to the XML output.
  * Remove the "Signature Algorithm:" text and spacing from the XML.
  * Report servers that accept any signature algorithm in the XML
- Rebased fedora-sslscan-patents.patch
- OpenSSL dependency bumped to >= 1.1

OBS-URL: https://build.opensuse.org/request/show/822258
OBS-URL: https://build.opensuse.org/package/show/security/sslscan?expand=0&rev=18
2020-07-22 15:03:09 +00:00

22 lines
1.3 KiB
Diff

diff --git a/sslscan.c b/sslscan.c
index a7b0233..2698f90 100644
--- a/sslscan.c
+++ b/sslscan.c
@@ -2891,6 +2891,8 @@ int showCertificate(struct sslCheckOptions *options)
printf(" DSA Public Key: NULL\n");
}
break;
+ /* Comment out patented technology not enabled in Fedora */
+ /*
case EVP_PKEY_EC:
if (EVP_PKEY_get1_EC_KEY(publicKey)!=NULL)
{
@@ -2908,6 +2910,7 @@ int showCertificate(struct sslCheckOptions *options)
printf(" EC Public Key: NULL\n");
}
break;
+ */
default:
printf(" Public Key: Unknown\n");
printf_xml(" <pk error=\"true\" type=\"unknown\" />\n");