diff --git a/security/tor/files/patch-src_lib_crypt__ops_crypto__openssl__mgt.c b/security/tor/files/patch-src_lib_crypt__ops_crypto__openssl__mgt.c new file mode 100644 --- /dev/null +++ b/security/tor/files/patch-src_lib_crypt__ops_crypto__openssl__mgt.c @@ -0,0 +1,27 @@ +--- src/lib/crypt_ops/crypto_openssl_mgt.c.orig 2023-12-04 08:51:40 UTC ++++ src/lib/crypt_ops/crypto_openssl_mgt.c +@@ -344,13 +344,16 @@ crypto_openssl_init_engines(const char *accelName, + /* Log, if available, the intersection of the set of algorithms + used by Tor and the set of algorithms available in the engine */ + log_engine("RSA", ENGINE_get_default_RSA()); ++#ifndef LIBRESSL_VERSION_NUMBER + log_engine("DH", ENGINE_get_default_DH()); + #ifdef OPENSSL_1_1_API + log_engine("EC", ENGINE_get_default_EC()); + #else ++#endif + log_engine("ECDH", ENGINE_get_default_ECDH()); + log_engine("ECDSA", ENGINE_get_default_ECDSA()); + #endif /* defined(OPENSSL_1_1_API) */ ++#ifndef LIBRESSL_VERSION_NUMBER + log_engine("RAND", ENGINE_get_default_RAND()); + log_engine("RAND (which we will not use)", ENGINE_get_default_RAND()); + log_engine("SHA1", ENGINE_get_digest_engine(NID_sha1)); +@@ -366,6 +369,7 @@ crypto_openssl_init_engines(const char *accelName, + log_engine("AES-256-CBC", ENGINE_get_cipher_engine(NID_aes_256_cbc)); + #ifdef NID_aes_256_gcm + log_engine("AES-256-GCM", ENGINE_get_cipher_engine(NID_aes_256_gcm)); ++#endif + #endif + return 0; +