From owner-svn-ports-all@freebsd.org Mon Nov 26 16:37:46 2018 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 68408113BF71; Mon, 26 Nov 2018 16:37:46 +0000 (UTC) (envelope-from cem@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 068657BF3C; Mon, 26 Nov 2018 16:37:46 +0000 (UTC) (envelope-from cem@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id DB4A96853; Mon, 26 Nov 2018 16:37:45 +0000 (UTC) (envelope-from cem@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id wAQGbjKn086440; Mon, 26 Nov 2018 16:37:45 GMT (envelope-from cem@FreeBSD.org) Received: (from cem@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id wAQGbjSV086439; Mon, 26 Nov 2018 16:37:45 GMT (envelope-from cem@FreeBSD.org) Message-Id: <201811261637.wAQGbjSV086439@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: cem set sender to cem@FreeBSD.org using -f From: Conrad Meyer Date: Mon, 26 Nov 2018 16:37:45 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r485945 - head/www/elinks/files X-SVN-Group: ports-head X-SVN-Commit-Author: cem X-SVN-Commit-Paths: head/www/elinks/files X-SVN-Commit-Revision: 485945 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 068657BF3C X-Spamd-Result: default: False [1.76 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_SPAM_SHORT(0.55)[0.551,0]; NEURAL_SPAM_MEDIUM(0.56)[0.562,0]; NEURAL_SPAM_LONG(0.64)[0.643,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Nov 2018 16:37:46 -0000 Author: cem (src committer) Date: Mon Nov 26 16:37:45 2018 New Revision: 485945 URL: https://svnweb.freebsd.org/changeset/ports/485945 Log: www/elinks: Fix build on OpenSSL 1.1.1 Use the provided getter routine instead of directly accessing the contents of the SSL struct, which is no longer exported as part of the ABI. Reviewed by: beat@ Approved by: beat@ Differential Revision: https://reviews.freebsd.org/D18325 Modified: head/www/elinks/files/patch-src_network_ssl_socket.c Modified: head/www/elinks/files/patch-src_network_ssl_socket.c ============================================================================== --- head/www/elinks/files/patch-src_network_ssl_socket.c Mon Nov 26 16:13:15 2018 (r485944) +++ head/www/elinks/files/patch-src_network_ssl_socket.c Mon Nov 26 16:37:45 2018 (r485945) @@ -9,3 +9,12 @@ #elif defined(CONFIG_GNUTLS) { /* GnuTLS does not support SSLv2 because it is "insecure". +@@ -145,7 +145,7 @@ + } + + if (client_cert) { +- SSL_CTX *ctx = ((SSL *) socket->ssl)->ctx; ++ SSL_CTX *ctx = SSL_get_SSL_CTX(socket->ssl); + + SSL_CTX_use_certificate_chain_file(ctx, client_cert); + SSL_CTX_use_PrivateKey_file(ctx, client_cert,