Skip to content

Commit 0eeae4d

Browse files
authored
Merge pull request #6460 from embhorn/mosquitto_osp
Add support for Mosquitto OSP
2 parents bd55866 + 1112751 commit 0eeae4d

7 files changed

Lines changed: 161 additions & 26 deletions

File tree

.github/workflows/mosquitto.yml

Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
name: mosquitto Tests
2+
3+
# START OF COMMON SECTION
4+
on:
5+
push:
6+
branches: [ 'master', 'main', 'release/**' ]
7+
pull_request:
8+
branches: [ '*' ]
9+
10+
concurrency:
11+
group: ${{ github.workflow }}-${{ github.ref }}
12+
cancel-in-progress: true
13+
# END OF COMMON SECTION
14+
15+
jobs:
16+
build_wolfssl:
17+
name: Build wolfSSL
18+
# Just to keep it the same as the testing target
19+
runs-on: ubuntu-latest
20+
# This should be a safe limit for the tests to run.
21+
timeout-minutes: 4
22+
steps:
23+
- name: Build wolfSSL
24+
uses: wolfSSL/actions-build-autotools-project@v1
25+
with:
26+
path: wolfssl
27+
configure: --enable-mosquitto CFLAGS="-DALLOW_INVALID_CERTSIGN"
28+
install: true
29+
30+
- name: Upload built lib
31+
uses: actions/upload-artifact@v4
32+
with:
33+
name: wolf-install-mosquitto
34+
path: build-dir
35+
retention-days: 5
36+
37+
mosquitto_check:
38+
strategy:
39+
fail-fast: false
40+
matrix:
41+
ref: [ 2.0.18 ]
42+
name: ${{ matrix.ref }}
43+
runs-on: ubuntu-latest
44+
# This should be a safe limit for the tests to run.
45+
timeout-minutes: 4
46+
needs: build_wolfssl
47+
steps:
48+
- name: Download lib
49+
uses: actions/download-artifact@v4
50+
with:
51+
name: wolf-install-mosquitto
52+
path: build-dir
53+
54+
- name: Checkout OSP
55+
uses: actions/checkout@v4
56+
with:
57+
repository: wolfssl/osp
58+
path: osp
59+
60+
- name: Install dependencies
61+
run: |
62+
export DEBIAN_FRONTEND=noninteractive
63+
sudo apt-get update
64+
sudo apt-get install -y build-essential libev-dev libssl-dev automake python3-docutils libcunit1 libcunit1-doc libcunit1-dev pkg-config make
65+
sudo pip install --upgrade psutil
66+
67+
- name: Checkout mosquitto
68+
uses: actions/checkout@v4
69+
with:
70+
repository: eclipse/mosquitto
71+
ref: v${{ matrix.ref }}
72+
path: mosquitto
73+
74+
- name: Configure and build mosquitto
75+
run: |
76+
cd $GITHUB_WORKSPACE/mosquitto/
77+
patch -p1 < $GITHUB_WORKSPACE/osp/mosquitto/${{ matrix.ref }}.patch
78+
make WITH_TLS=wolfssl WITH_CJSON=no WITH_DOCS=no WOLFSSLDIR=$GITHUB_WORKSPACE/build-dir
79+
80+
- name: Run mosquitto tests
81+
working-directory: ./mosquitto
82+
run: |
83+
make WITH_TLS=wolfssl WITH_CJSON=no WITH_DOCS=no WOLFSSLDIR=$GITHUB_WORKSPACE/build-dir ptest

configure.ac

Lines changed: 35 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1817,6 +1817,7 @@ AC_ARG_ENABLE([mcast],
18171817
# OpenLDAP (--enable-openldap)
18181818
# hitch (--enable-hitch)
18191819
# memcached (--enable-memcached)
1820+
# Mosquitto (--enable-mosquitto) HAVE_MOSQUITTO
18201821

18211822
# Bind DNS compatibility Build
18221823
AC_ARG_ENABLE([bind],
@@ -1880,12 +1881,25 @@ AC_ARG_ENABLE([openldap],
18801881
[ ENABLED_OPENLDAP=no ]
18811882
)
18821883

1884+
# Mosquitto support
1885+
AC_ARG_ENABLE([mosquitto],
1886+
[AS_HELP_STRING([--enable-mosquitto],[Enable Mosquitto support (default: disabled)])],
1887+
[ ENABLED_MOSQUITTO=$enableval ],
1888+
[ ENABLED_MOSQUITTO=no ]
1889+
)
1890+
1891+
if test "x$ENABLED_MOSQUITTO" = "xyes"
1892+
then
1893+
AM_CFLAGS="$AM_CFLAGS -DHAVE_MOSQUITTO"
1894+
fi
1895+
18831896
# lighty Support
18841897
AC_ARG_ENABLE([lighty],
18851898
[AS_HELP_STRING([--enable-lighty],[Enable lighttpd/lighty (default: disabled)])],
18861899
[ ENABLED_LIGHTY=$enableval ],
18871900
[ ENABLED_LIGHTY=no ]
18881901
)
1902+
18891903
# rsyslog Support
18901904
AC_ARG_ENABLE([rsyslog],
18911905
[AS_HELP_STRING([--enable-rsyslog],[Enable rsyslog (default: disabled)])],
@@ -2145,7 +2159,7 @@ if test "$ENABLED_LIBWEBSOCKETS" = "yes" || test "$ENABLED_OPENVPN" = "yes" || \
21452159
test "$ENABLED_OPENRESTY" = "yes" || test "$ENABLED_RSYSLOG" = "yes" || \
21462160
test "$ENABLED_KRB" = "yes" || test "$ENABLED_CHRONY" = "yes" || \
21472161
test "$ENABLED_FFMPEG" = "yes" || test "$ENABLED_STRONGSWAN" = "yes" || \
2148-
test "$ENABLED_OPENLDAP" = "yes" || test "$ENABLED_HITCH" = "yes"
2162+
test "$ENABLED_OPENLDAP" = "yes" || test "x$ENABLED_MOSQUITTO" = "xyes" || test "$ENABLED_HITCH" = "yes"
21492163
then
21502164
ENABLED_OPENSSLALL="yes"
21512165
fi
@@ -3742,7 +3756,7 @@ AC_ARG_ENABLE([sessioncerts],
37423756

37433757
if test "x$ENABLED_NGINX" = "xyes" || test "x$ENABLED_OPENVPN" = "xyes" || \
37443758
test "x$ENABLED_LIGHTY" = "xyes" || test "x$ENABLED_NETSNMP" = "xyes" || \
3745-
test "x$ENABLED_STRONGSWAN" = "xyes" || test "x$ENABLED_HITCH" = "xyes"
3759+
test "x$ENABLED_STRONGSWAN" = "xyes" || test "x$ENABLED_HITCH" = "xyes" || test "x$ENABLED_MOSQUITTO" = "xyes"
37463760
then
37473761
ENABLED_SESSIONCERTS=yes
37483762
fi
@@ -4226,6 +4240,11 @@ AC_ARG_ENABLE([psk],
42264240
[ ENABLED_PSK=no ]
42274241
)
42284242

4243+
if test "x$ENABLED_MOSQUITTO" = "xyes"
4244+
then
4245+
ENABLED_PSK=yes
4246+
fi
4247+
42294248
# Single PSK identity
42304249
AC_ARG_ENABLE([psk-one-id],
42314250
[AS_HELP_STRING([--enable-psk-one-id],[Enable PSK (default: disabled)])],
@@ -5846,7 +5865,8 @@ fi
58465865
58475866
58485867
# OCSP
5849-
if test "x$ENABLED_OPENSSLALL" = "xyes" || test "x$ENABLED_NGINX" = "xyes" || test "x$ENABLED_LIGHTY" = "xyes"
5868+
if test "x$ENABLED_OPENSSLALL" = "xyes" || test "x$ENABLED_NGINX" = "xyes" || \
5869+
test "x$ENABLED_LIGHTY" = "xyes" || test "x$ENABLED_MOSQUITTO" = "xyes"
58505870
then
58515871
test "$enable_ocsp" = "" && enable_ocsp=yes
58525872
fi
@@ -5878,7 +5898,9 @@ AC_ARG_ENABLE([ocspstapling],
58785898
[ ENABLED_CERTIFICATE_STATUS_REQUEST=no ]
58795899
)
58805900
5881-
if test "x$ENABLED_NGINX" = "xyes" || test "x$ENABLED_WPAS" = "xyes" || test "x$ENABLED_HAPROXY" = "xyes" || test "x$ENABLED_LIGHTY" = "xyes"
5901+
if test "x$ENABLED_NGINX" = "xyes" || test "x$ENABLED_WPAS" = "xyes" || \
5902+
test "x$ENABLED_HAPROXY" = "xyes" || test "x$ENABLED_LIGHTY" = "xyes" || \
5903+
test "x$ENABLED_MOSQUITTO" = "xyes"
58825904
then
58835905
ENABLED_CERTIFICATE_STATUS_REQUEST="yes"
58845906
fi
@@ -5926,9 +5948,11 @@ AC_ARG_ENABLE([crl],
59265948
[ ENABLED_CRL=no ]
59275949
)
59285950
5929-
if test "x$ENABLED_NGINX" = "xyes" || test "x$ENABLED_HAPROXY" = "xyes" || test "x$ENABLED_OPENVPN" = "xyes" || \
5930-
test "x$ENABLED_WPAS" != "xno" || test "x$ENABLED_LIGHTY" = "xyes" || test "x$ENABLED_NETSNMP" = "xyes" || \
5931-
test "x$ENABLED_KRB" = "xyes" || test "x$ENABLED_STRONGSWAN" = "xyes"
5951+
if test "x$ENABLED_NGINX" = "xyes" || test "x$ENABLED_HAPROXY" = "xyes" || \
5952+
test "x$ENABLED_OPENVPN" = "xyes" || test "x$ENABLED_WPAS" != "xno" || \
5953+
test "x$ENABLED_LIGHTY" = "xyes" || test "x$ENABLED_NETSNMP" = "xyes" || \
5954+
test "x$ENABLED_KRB" = "xyes" || test "x$ENABLED_STRONGSWAN" = "xyes" || \
5955+
test "x$ENABLED_MOSQUITTO" = "xyes"
59325956
then
59335957
ENABLED_CRL=yes
59345958
fi
@@ -8942,7 +8966,7 @@ if test "$ENABLED_OPENSSH" = "yes" || test "$ENABLED_NGINX" = "yes" || \
89428966
test "$ENABLED_LIBWEBSOCKETS" = "yes" || \
89438967
test "x$ENABLED_LIGHTY" = "xyes" || test "$ENABLED_LIBSSH2" = "yes" || \
89448968
test "x$ENABLED_NTP" = "xyes" || test "$ENABLED_RSYSLOG" = "yes" || \
8945-
test "$ENABLED_OPENLDAP" = "yes" || test "$ENABLED_HITCH" = "yes"
8969+
test "$ENABLED_OPENLDAP" = "yes" || test "$ENABLED_HITCH" = "yes" || test "x$ENABLED_MOSQUITTO" = "xyes"
89468970
then
89478971
ENABLED_OPENSSLEXTRA="yes"
89488972
fi
@@ -9134,6 +9158,8 @@ AS_IF([test "x$ENABLED_STRONGSWAN" = "xyes"],
91349158
91359159
AS_IF([test "x$ENABLED_OPENLDAP" = "xyes"], [AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_SIGNER_DER_CERT"])
91369160
9161+
AS_IF([test "x$ENABLED_MOSQUITTO" = "xyes"], [AM_CFLAGS="$AM_CFLAGS -DHAVE_EX_DATA"])
9162+
91379163
if test "$ENABLED_ED25519_STREAM" != "no" && test "$ENABLED_SE050" != "yes"
91389164
then
91399165
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_ED25519_STREAMING_VERIFY"
@@ -10176,6 +10202,7 @@ echo " * strongSwan: $ENABLED_STRONGSWAN"
1017610202
echo " * OpenLDAP: $ENABLED_OPENLDAP"
1017710203
echo " * hitch: $ENABLED_HITCH"
1017810204
echo " * memcached: $ENABLED_MEMCACHED"
10205+
echo " * Mosquitto $ENABLED_MOSQUITTO"
1017910206
echo " * ERROR_STRINGS: $ENABLED_ERROR_STRINGS"
1018010207
echo " * DTLS: $ENABLED_DTLS"
1018110208
echo " * DTLS v1.3: $ENABLED_DTLS13"

src/ssl.c

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23300,6 +23300,18 @@ int wolfSSL_CTX_set_ecdh_auto(WOLFSSL_CTX* ctx, int onoff)
2330023300
return WOLFSSL_SUCCESS;
2330123301
}
2330223302

23303+
/* wolfSSL_CTX_set_dh_auto is provided as compatible API with
23304+
* SSL_CTX_set_dh_auto to enable auto dh selection functionality.
23305+
* Since this functionality is enabled by default in wolfSSL,
23306+
* this API exists as a stub.
23307+
*/
23308+
int wolfSSL_CTX_set_dh_auto(WOLFSSL_CTX* ctx, int onoff)
23309+
{
23310+
(void)ctx;
23311+
(void)onoff;
23312+
return WOLFSSL_SUCCESS;
23313+
}
23314+
2330323315
/**
2330423316
* set security level (wolfSSL doesn't support security level)
2330523317
* @param ctx a pointer to WOLFSSL_EVP_PKEY_CTX structure

tests/api.c

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3709,6 +3709,7 @@ static int test_wolfSSL_CertManagerCRL(void)
37093709
wolfSSL_CertManagerLoadCRL(cm, crl2, WOLFSSL_FILETYPE_PEM, 0));
37103710
wolfSSL_CertManagerFreeCRL(cm);
37113711

3712+
#ifndef WOLFSSL_CRL_ALLOW_MISSING_CDP
37123713
ExpectIntEQ(WOLFSSL_SUCCESS,
37133714
wolfSSL_CertManagerLoadCRL(cm, crl1, WOLFSSL_FILETYPE_PEM, 0));
37143715
ExpectIntEQ(WOLFSSL_SUCCESS,
@@ -3717,6 +3718,7 @@ static int test_wolfSSL_CertManagerCRL(void)
37173718
sizeof_server_cert_der_2048), CRL_MISSING);
37183719
ExpectIntEQ(wolfSSL_CertManagerVerifyBuffer(cm, server_cert_der_2048,
37193720
sizeof_server_cert_der_2048, WOLFSSL_FILETYPE_ASN1), CRL_MISSING);
3721+
#endif /* !WOLFSSL_CRL_ALLOW_MISSING_CDP */
37203722

37213723
ExpectIntEQ(wolfSSL_CertManagerLoadCRLBuffer(cm, crl_buff, sizeof(crl_buff),
37223724
WOLFSSL_FILETYPE_ASN1), 1);
@@ -48722,13 +48724,15 @@ static int test_wolfSSL_X509_STORE(void)
4872248724

4872348725
#ifdef HAVE_CRL
4872448726
X509_STORE_CTX *storeCtx = NULL;
48725-
X509_CRL *crl = NULL;
4872648727
X509 *ca = NULL;
4872748728
X509 *cert = NULL;
48728-
const char crlPem[] = "./certs/crl/crl.revoked";
4872948729
const char srvCert[] = "./certs/server-revoked-cert.pem";
4873048730
const char caCert[] = "./certs/ca-cert.pem";
48731+
#ifndef WOLFSSL_CRL_ALLOW_MISSING_CDP
48732+
X509_CRL *crl = NULL;
48733+
const char crlPem[] = "./certs/crl/crl.revoked";
4873148734
XFILE fp = XBADFILE;
48735+
#endif /* !WOLFSSL_CRL_ALLOW_MISSING_CDP */
4873248736

4873348737
ExpectNotNull(store = (X509_STORE *)X509_STORE_new());
4873448738
ExpectNotNull((ca = wolfSSL_X509_load_certificate_file(caCert,
@@ -48748,6 +48752,7 @@ static int test_wolfSSL_X509_STORE(void)
4874848752
X509_free(ca);
4874948753
ca = NULL;
4875048754

48755+
#ifndef WOLFSSL_CRL_ALLOW_MISSING_CDP
4875148756
/* should fail to verify now after adding in CRL */
4875248757
ExpectNotNull(store = (X509_STORE *)X509_STORE_new());
4875348758
ExpectNotNull((ca = wolfSSL_X509_load_certificate_file(caCert,
@@ -48777,6 +48782,7 @@ static int test_wolfSSL_X509_STORE(void)
4877748782
cert = NULL;
4877848783
X509_free(ca);
4877948784
ca = NULL;
48785+
#endif /* !WOLFSSL_CRL_ALLOW_MISSING_CDP */
4878048786
#endif /* HAVE_CRL */
4878148787

4878248788

@@ -67172,7 +67178,8 @@ static int test_wolfSSL_X509_load_crl_file(void)
6717267178
{
6717367179
EXPECT_DECLS;
6717467180
#if defined(OPENSSL_EXTRA) && defined(HAVE_CRL) && !defined(NO_FILESYSTEM) && \
67175-
!defined(NO_STDIO_FILESYSTEM) && !defined(NO_RSA) && !defined(NO_BIO)
67181+
!defined(NO_STDIO_FILESYSTEM) && !defined(NO_RSA) && !defined(NO_BIO) && \
67182+
!defined(WOLFSSL_CRL_ALLOW_MISSING_CDP)
6717667183
int i;
6717767184
char pem[][100] = {
6717867185
"./certs/crl/crl.pem",
@@ -73858,7 +73865,8 @@ static int test_wolfSSL_CTX_LoadCRL(void)
7385873865
return EXPECT_RESULT();
7385973866
}
7386073867

73861-
#if defined(HAVE_SSL_MEMIO_TESTS_DEPENDENCIES) && defined(HAVE_CRL)
73868+
#if defined(HAVE_SSL_MEMIO_TESTS_DEPENDENCIES) && defined(HAVE_CRL) && \
73869+
!defined(WOLFSSL_CRL_ALLOW_MISSING_CDP)
7386273870
static int test_multiple_crls_same_issuer_ctx_ready(WOLFSSL_CTX* ctx)
7386373871
{
7386473872
EXPECT_DECLS;
@@ -73872,7 +73880,8 @@ static int test_multiple_crls_same_issuer_ctx_ready(WOLFSSL_CTX* ctx)
7387273880
static int test_multiple_crls_same_issuer(void)
7387373881
{
7387473882
EXPECT_DECLS;
73875-
#if defined(HAVE_SSL_MEMIO_TESTS_DEPENDENCIES) && defined(HAVE_CRL)
73883+
#if defined(HAVE_SSL_MEMIO_TESTS_DEPENDENCIES) && defined(HAVE_CRL) && \
73884+
!defined(WOLFSSL_CRL_ALLOW_MISSING_CDP)
7387673885
test_ssl_cbf client_cbs, server_cbs;
7387773886
struct {
7387873887
const char* server_cert;
@@ -81475,7 +81484,8 @@ static int test_certreq_sighash_algos(void)
8147581484
return EXPECT_RESULT();
8147681485
}
8147781486

81478-
#if defined(HAVE_CRL) && defined(HAVE_SSL_MEMIO_TESTS_DEPENDENCIES)
81487+
#if defined(HAVE_CRL) && defined(HAVE_SSL_MEMIO_TESTS_DEPENDENCIES) && \
81488+
!defined(WOLFSSL_CRL_ALLOW_MISSING_CDP)
8147981489
static int test_revoked_loaded_int_cert_ctx_ready1(WOLFSSL_CTX* ctx)
8148081490
{
8148181491
EXPECT_DECLS;
@@ -81525,7 +81535,8 @@ static int test_revoked_loaded_int_cert_ctx_ready2(WOLFSSL_CTX* ctx)
8152581535
static int test_revoked_loaded_int_cert(void)
8152681536
{
8152781537
EXPECT_DECLS;
81528-
#if defined(HAVE_CRL) && defined(HAVE_SSL_MEMIO_TESTS_DEPENDENCIES)
81538+
#if defined(HAVE_CRL) && defined(HAVE_SSL_MEMIO_TESTS_DEPENDENCIES) && \
81539+
!defined(WOLFSSL_CRL_ALLOW_MISSING_CDP)
8152981540
test_ssl_cbf client_cbf;
8153081541
test_ssl_cbf server_cbf;
8153181542
struct {
@@ -81565,7 +81576,6 @@ static int test_revoked_loaded_int_cert(void)
8156581576
break;
8156681577
printf("\t%s passed\n", test_params[i].certPemFile);
8156781578
}
81568-
8156981579
#endif
8157081580
return EXPECT_RESULT();
8157181581
}

wolfssl/openssl/opensslv.h

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -35,24 +35,26 @@
3535
defined(OPENSSL_VERSION_NUMBER) && (OPENSSL_VERSION_NUMBER == 0x10100000L) ||\
3636
defined(OPENSSL_VERSION_NUMBER) && (OPENSSL_VERSION_NUMBER == 0x10001040L)
3737
/* valid version */
38+
#elif defined(HAVE_MOSQUITTO)
39+
#define OPENSSL_VERSION_NUMBER 0x10100000L
3840
#elif defined(WOLFSSL_APACHE_HTTPD) || defined(HAVE_LIBEST) || \
3941
defined(WOLFSSL_BIND) || defined(WOLFSSL_NGINX) || \
4042
defined(WOLFSSL_RSYSLOG) || defined(WOLFSSL_KRB) || defined(HAVE_STUNNEL) || \
4143
defined(WOLFSSL_OPENSSH)
4244
/* For Apache httpd, Use 1.1.0 compatibility */
43-
#define OPENSSL_VERSION_NUMBER 0x10100003L
44-
#elif defined(WOLFSSL_QT) || defined(WOLFSSL_PYTHON) || defined(WOLFSSL_KRB)
45+
#define OPENSSL_VERSION_NUMBER 0x10100003L
46+
#elif defined(WOLFSSL_QT) || defined(WOLFSSL_PYTHON)
4547
/* For Qt and Python 3.8.5 compatibility */
46-
#define OPENSSL_VERSION_NUMBER 0x10101000L
48+
#define OPENSSL_VERSION_NUMBER 0x10101000L
4749
#elif defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_FFMPEG)
48-
#define OPENSSL_VERSION_NUMBER 0x1010000fL
50+
#define OPENSSL_VERSION_NUMBER 0x1010000fL
4951
#elif defined(OPENSSL_ALL) || defined(HAVE_LIGHTY) || \
50-
defined(WOLFSSL_NGINX) || defined(WOLFSSL_OPENVPN)
51-
/* version number can be increased for Lighty after compatibility for ECDH
52-
is added */
53-
#define OPENSSL_VERSION_NUMBER 0x10001040L
52+
defined(WOLFSSL_NGINX) || defined(WOLFSSL_OPENSSH) || defined(WOLFSSL_OPENVPN)
53+
/* version number can be increased for Lighty after compatibility for ECDH
54+
is added */
55+
#define OPENSSL_VERSION_NUMBER 0x10001040L
5456
#else
55-
#define OPENSSL_VERSION_NUMBER 0x0090810fL
57+
#define OPENSSL_VERSION_NUMBER 0x0090810fL
5658
#endif
5759

5860
#define OPENSSL_VERSION_TEXT "wolfSSL " LIBWOLFSSL_VERSION_STRING

wolfssl/openssl/ssl.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1219,7 +1219,6 @@ typedef WOLFSSL_SRTP_PROTECTION_PROFILE SRTP_PROTECTION_PROFILE;
12191219
#define SSL_R_SHORT_READ 10
12201220
#define ERR_R_PEM_LIB 9
12211221
#define SSL_CTRL_MODE 33
1222-
12231222
#define SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS 83
12241223

12251224
#define SSL_CTX_clear_chain_certs(ctx) SSL_CTX_set0_chain(ctx,NULL)
@@ -1239,6 +1238,7 @@ typedef WOLFSSL_SRTP_PROTECTION_PROFILE SRTP_PROTECTION_PROFILE;
12391238
(char *)(arg))
12401239
#endif /* OPENSSL_ALL || WOLFSSL_ASIO || WOLFSSL_HAPROXY */
12411240

1241+
#define SSL_CTX_set_dh_auto wolfSSL_CTX_set_dh_auto
12421242
#define SSL_CTX_set_tmp_dh wolfSSL_CTX_set_tmp_dh
12431243

12441244
#define TLSEXT_STATUSTYPE_ocsp 1

wolfssl/ssl.h

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1125,6 +1125,7 @@ WOLFSSL_API int wolfSSL_CTX_up_ref(WOLFSSL_CTX* ctx);
11251125
#ifdef OPENSSL_EXTRA
11261126
WOLFSSL_API int wolfSSL_set_ecdh_auto(WOLFSSL* ssl, int onoff);
11271127
WOLFSSL_API int wolfSSL_CTX_set_ecdh_auto(WOLFSSL_CTX* ctx, int onoff);
1128+
WOLFSSL_API int wolfSSL_CTX_set_dh_auto(WOLFSSL_CTX* ctx, int onoff);
11281129
WOLFSSL_API int wolfSSL_get_signature_nid(WOLFSSL* ssl, int* nid);
11291130
WOLFSSL_API int wolfSSL_get_signature_type_nid(const WOLFSSL* ssl, int* nid);
11301131
WOLFSSL_API int wolfSSL_get_peer_signature_nid(WOLFSSL* ssl, int* nid);

0 commit comments

Comments
 (0)