Skip to content

Commit 2c4556c

Browse files
Merge pull request #6835 from julek-wolfssl/no-ossl-defs-in-release
Add option to disable OPENSSL_COMPATIBLE_DEFAULTS
2 parents 1b4435d + 8ce8359 commit 2c4556c

2 files changed

Lines changed: 32 additions & 12 deletions

File tree

.github/workflows/packaging.yml

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,14 @@ jobs:
1616
- name: Configure wolfSSL
1717
run: |
1818
autoreconf -ivf
19-
./configure --enable-distro --disable-examples --disable-silent-rules
19+
./configure --enable-distro --enable-all \
20+
--disable-openssl-compatible-defaults --enable-intelasm \
21+
--enable-dtls13 --enable-dtls-mtu \
22+
--enable-sp-asm --disable-examples --disable-silent-rules
23+
24+
- name: Make sure OPENSSL_COMPATIBLE_DEFAULTS is not present in options.h
25+
run: |
26+
! grep OPENSSL_COMPATIBLE_DEFAULTS wolfssl/options.h
2027
2128
- name: Build wolfSSL .deb
2229
run: make deb-docker

configure.ac

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8114,20 +8114,33 @@ AC_ARG_ENABLE([sys-ca-certs],
81148114
# (for now checking both C_FLAGS and C_EXTRA_FLAGS)
81158115
AS_CASE(["$CFLAGS $CPPFLAGS"],[*'WOLFSSL_TRUST_PEER_CERT'*],[ENABLED_TRUSTED_PEER_CERT=yes])
81168116

8117+
# Allows disabling the OPENSSL_COMPATIBLE_DEFAULTS macro
8118+
AC_ARG_ENABLE([openssl-compatible-defaults],
8119+
[AS_HELP_STRING([--disable-openssl-compatible-defaults],[Disable OpenSSL compatible defaults when enabled by other options (default: enabled)])],
8120+
[ ENABLED_OPENSSL_COMPATIBLE_DEFAULTS=$enableval ],
8121+
[ ENABLED_OPENSSL_COMPATIBLE_DEFAULTS=yes ]
8122+
)
81178123

81188124
AS_CASE(["$CFLAGS $CPPFLAGS $AM_CFLAGS"],[*'OPENSSL_COMPATIBLE_DEFAULTS'*],
8119-
[ENABLED_OPENSSL_COMPATIBLE_DEFAULTS=yes])
8120-
if test "x$ENABLED_OPENSSL_COMPATIBLE_DEFAULTS" = "xyes"
8125+
[FOUND_OPENSSL_COMPATIBLE_DEFAULTS=yes])
8126+
if test "x$FOUND_OPENSSL_COMPATIBLE_DEFAULTS" = "xyes"
81218127
then
8122-
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_TRUST_PEER_CERT"
8123-
AM_CFLAGS="$AM_CFLAGS -DNO_SESSION_CACHE_REF"
8124-
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_TLS13_NO_PEEK_HANDSHAKE_DONE"
8125-
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_ALT_CERT_CHAINS"
8126-
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_PRIORITIZE_PSK"
8127-
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_CHECK_ALERT_ON_ERR"
8128-
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_TICKET_HAVE_ID"
8129-
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_NO_OCSP_ISSUER_CHECK"
8130-
ENABLED_TRUSTED_PEER_CERT=yes
8128+
if test "x$ENABLED_OPENSSL_COMPATIBLE_DEFAULTS" = "xyes"
8129+
then
8130+
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_TRUST_PEER_CERT"
8131+
AM_CFLAGS="$AM_CFLAGS -DNO_SESSION_CACHE_REF"
8132+
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_TLS13_NO_PEEK_HANDSHAKE_DONE"
8133+
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_ALT_CERT_CHAINS"
8134+
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_PRIORITIZE_PSK"
8135+
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_CHECK_ALERT_ON_ERR"
8136+
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_TICKET_HAVE_ID"
8137+
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_NO_OCSP_ISSUER_CHECK"
8138+
ENABLED_TRUSTED_PEER_CERT=yes
8139+
else
8140+
CFLAGS=$(printf "%s" "$CFLAGS" | sed 's/-DOPENSSL_COMPATIBLE_DEFAULTS//g')
8141+
CPPFLAGS=$(printf "%s" "$CPPFLAGS" | sed 's/-DOPENSSL_COMPATIBLE_DEFAULTS//g')
8142+
AM_CFLAGS=$(printf "%s" "$AM_CFLAGS" | sed 's/-DOPENSSL_COMPATIBLE_DEFAULTS//g')
8143+
fi
81318144
fi
81328145

81338146
# determine if we have key validation mechanism

0 commit comments

Comments
 (0)