With the recent vulnerabilities found in OpenSSL, I thought it'd make sense
for Apache to check for OpenSSL 0.9.6e or higher.
-Madhu
$ cvs diff acinclude.m4
Index: acinclude.m4
===================================================================
RCS file: /home/cvspublic/httpd-2.0/acinclude.m4,v
retrieving revision 1.126
diff -u -r1.126 acinclude.m4
--- acinclude.m4 16 Jul 2002 18:33:05 -0000 1.126
+++ acinclude.m4 9 Aug 2002 16:54:30 -0000
@@ -430,7 +430,7 @@
ap_ssltk_version="`$p/openssl version`"
case "$ap_ssltk_version" in
"OpenSSL "[[1-9]]* | \
- "OpenSSL "0.9.[[6-9]]* | \
+ "OpenSSL "0.9.[[6-9]][[e-z]]* | \
"OpenSSL "0.[[1-9]][[0-9]]* )
ap_cv_ssltk="`(cd $p/.. && pwd)`"
break
@@ -441,7 +441,7 @@
esac
done
if test "x$ap_cv_ssltk" = "x"; then
- AC_MSG_ERROR([requires OpenSSL 0.9.6 or higher])
+ AC_MSG_ERROR([requires OpenSSL 0.9.6e or higher])
fi
])
ap_ssltk_base="$ap_cv_ssltk"