Last active
September 8, 2019 20:49
-
-
Save mwgamera/f4f4fc965f3c122ca4b939708c66ca54 to your computer and use it in GitHub Desktop.
Archiveteam's Wget with Lua hooks for Alpine Linux
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Maintainer: klg <[email protected]> | |
pkgname=wget-lua | |
pkgver=1.14_git20160530 | |
_pkgver=1.14.lua.20160530-955376b | |
pkgrel=3 | |
pkgdesc="Wget with Lua extensions" | |
url="https://www.archiveteam.org/index.php?title=Wget_with_Lua_hooks" | |
arch="all" | |
license="GPL3+" | |
depends="" | |
makedepends="openssl-dev zlib-dev lua5.1-dev flex autoconf" | |
install="" | |
subpackages="" | |
source="https://warriorhq.archiveteam.org/downloads/$pkgname/wget-$_pkgver.tar.gz | |
wget-openssl.patch" | |
builddir="$srcdir/wget-$_pkgver" | |
build() { | |
./configure \ | |
--build=$CBUILD \ | |
--host=$CHOST \ | |
--prefix=/usr \ | |
--sysconfdir=/etc \ | |
--with-ssl=openssl \ | |
--disable-nls \ | |
|| return 1 | |
make || return 1 | |
} | |
package() { | |
install -D "$builddir/src/wget" "$pkgdir/usr/bin/wget-lua" | |
} | |
sha512sums="f6094bccdbc8e4a2357682210c34ed50b8d56103dd997cd20b4b3d90f47b9090eec81f714cd1cfb2246e45a26a876b00bb65668aa45150c114eb751ce81500cd wget-1.14.lua.20160530-955376b.tar.gz | |
67a3eeaeaef4fbdabe22796d03c91dabba0ee09ddd2e2a7d7a7fe41cae8b7aab45df854885da4f5bd9965bc21a560c87f6c428b15865b317dfbf4451e096ee29 wget-openssl.patch" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- a/src/openssl.c 2014-06-05 19:03:16 +0000 | |
+++ b/src/openssl.c | |
@@ -86,9 +86,11 @@ | |
if (RAND_status ()) | |
return; | |
+#ifdef HAVE_RAND_EGD | |
/* Get random data from EGD if opt.egd_file was used. */ | |
if (opt.egd_file && *opt.egd_file) | |
RAND_egd (opt.egd_file); | |
+#endif | |
if (RAND_status ()) | |
return; | |
@@ -178,21 +180,18 @@ | |
SSL_library_init (); | |
SSL_load_error_strings (); | |
- SSLeay_add_all_algorithms (); | |
- SSLeay_add_ssl_algorithms (); | |
+ OpenSSL_add_all_algorithms (); | |
+ OpenSSL_add_ssl_algorithms (); | |
switch (opt.secure_protocol) | |
{ | |
case secure_protocol_auto: | |
meth = SSLv23_client_method (); | |
break; | |
-#ifndef OPENSSL_NO_SSL2 | |
- case secure_protocol_sslv2: | |
- meth = SSLv2_client_method (); | |
- break; | |
-#endif | |
+#ifndef OPENSSL_NO_SSL3_METHOD | |
case secure_protocol_sslv3: | |
meth = SSLv3_client_method (); | |
+#endif | |
break; | |
case secure_protocol_tlsv1: | |
meth = TLSv1_client_method (); | |
@@ -425,7 +424,7 @@ | |
if (!SSL_set_fd (conn, FD_TO_SOCKET (fd))) | |
goto error; | |
SSL_set_connect_state (conn); | |
- if (SSL_connect (conn) <= 0 || conn->state != SSL_ST_OK) | |
+ if (SSL_connect (conn) <= 0 || SSL_get_state(conn) != TLS_ST_OK) | |
goto error; | |
ctx = xnew0 (struct openssl_transport_context); |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment