Line 0
Link Here
|
|
|
1 |
--- lib/vtls/wolfssl.c.orig 2019-10-15 21:41:50 UTC |
2 |
+++ lib/vtls/wolfssl.c |
3 |
@@ -105,11 +105,11 @@ static Curl_send wolfssl_send; |
4 |
static int do_file_type(const char *type) |
5 |
{ |
6 |
if(!type || !type[0]) |
7 |
- return SSL_FILETYPE_PEM; |
8 |
+ return WOLFSSL_FILETYPE_PEM; |
9 |
if(strcasecompare(type, "PEM")) |
10 |
- return SSL_FILETYPE_PEM; |
11 |
+ return WOLFSSL_FILETYPE_PEM; |
12 |
if(strcasecompare(type, "DER")) |
13 |
- return SSL_FILETYPE_ASN1; |
14 |
+ return WOLFSSL_FILETYPE_ASN1; |
15 |
return -1; |
16 |
} |
17 |
|
18 |
@@ -306,8 +306,8 @@ wolfssl_connect_step1(struct connectdata *conn, |
19 |
* anyway. In the latter case the result of the verification is checked with |
20 |
* SSL_get_verify_result() below. */ |
21 |
SSL_CTX_set_verify(BACKEND->ctx, |
22 |
- SSL_CONN_CONFIG(verifypeer)?SSL_VERIFY_PEER: |
23 |
- SSL_VERIFY_NONE, |
24 |
+ SSL_CONN_CONFIG(verifypeer)?WOLFSSL_VERIFY_PEER: |
25 |
+ WOLFSSL_VERIFY_NONE, |
26 |
NULL); |
27 |
|
28 |
#ifdef HAVE_SNI |
29 |
@@ -380,7 +380,7 @@ wolfssl_connect_step1(struct connectdata *conn, |
30 |
|
31 |
if(wolfSSL_UseALPN(BACKEND->handle, protocols, |
32 |
(unsigned)strlen(protocols), |
33 |
- WOLFSSL_ALPN_CONTINUE_ON_MISMATCH) != SSL_SUCCESS) { |
34 |
+ WOLFSSL_ALPN_CONTINUE_ON_MISMATCH) != WOLFSSL_SUCCESS) { |
35 |
failf(data, "SSL: failed setting ALPN protocols"); |
36 |
return CURLE_SSL_CONNECT_ERROR; |
37 |
} |
38 |
@@ -440,7 +440,7 @@ wolfssl_connect_step2(struct connectdata *conn, |
39 |
/* Enable RFC2818 checks */ |
40 |
if(SSL_CONN_CONFIG(verifyhost)) { |
41 |
ret = wolfSSL_check_domain_name(BACKEND->handle, hostname); |
42 |
- if(ret == SSL_FAILURE) |
43 |
+ if(ret == WOLFSSL_FAILURE) |
44 |
return CURLE_OUT_OF_MEMORY; |
45 |
} |
46 |
|
47 |
@@ -449,11 +449,11 @@ wolfssl_connect_step2(struct connectdata *conn, |
48 |
char error_buffer[WOLFSSL_MAX_ERROR_SZ]; |
49 |
int detail = SSL_get_error(BACKEND->handle, ret); |
50 |
|
51 |
- if(SSL_ERROR_WANT_READ == detail) { |
52 |
+ if(WOLFSSL_ERROR_WANT_READ == detail) { |
53 |
connssl->connecting_state = ssl_connect_2_reading; |
54 |
return CURLE_OK; |
55 |
} |
56 |
- else if(SSL_ERROR_WANT_WRITE == detail) { |
57 |
+ else if(WOLFSSL_ERROR_WANT_WRITE == detail) { |
58 |
connssl->connecting_state = ssl_connect_2_writing; |
59 |
return CURLE_OK; |
60 |
} |
61 |
@@ -560,7 +560,7 @@ wolfssl_connect_step2(struct connectdata *conn, |
62 |
|
63 |
rc = wolfSSL_ALPN_GetProtocol(BACKEND->handle, &protocol, &protocol_len); |
64 |
|
65 |
- if(rc == SSL_SUCCESS) { |
66 |
+ if(rc == WOLFSSL_SUCCESS) { |
67 |
infof(data, "ALPN, server accepted to use %.*s\n", protocol_len, |
68 |
protocol); |
69 |
|
70 |
@@ -663,8 +663,8 @@ static ssize_t wolfssl_send(struct connectdata *conn, |
71 |
int err = SSL_get_error(BACKEND->handle, rc); |
72 |
|
73 |
switch(err) { |
74 |
- case SSL_ERROR_WANT_READ: |
75 |
- case SSL_ERROR_WANT_WRITE: |
76 |
+ case WOLFSSL_ERROR_WANT_READ: |
77 |
+ case WOLFSSL_ERROR_WANT_WRITE: |
78 |
/* there's data pending, re-invoke SSL_write() */ |
79 |
*curlcode = CURLE_AGAIN; |
80 |
return -1; |
81 |
@@ -709,10 +709,10 @@ static ssize_t wolfssl_recv(struct connectdata *conn, |
82 |
int err = SSL_get_error(BACKEND->handle, nread); |
83 |
|
84 |
switch(err) { |
85 |
- case SSL_ERROR_ZERO_RETURN: /* no more data */ |
86 |
+ case WOLFSSL_ERROR_ZERO_RETURN: /* no more data */ |
87 |
break; |
88 |
- case SSL_ERROR_WANT_READ: |
89 |
- case SSL_ERROR_WANT_WRITE: |
90 |
+ case WOLFSSL_ERROR_WANT_READ: |
91 |
+ case WOLFSSL_ERROR_WANT_WRITE: |
92 |
/* there's data pending, re-invoke SSL_read() */ |
93 |
*curlcode = CURLE_AGAIN; |
94 |
return -1; |
95 |
@@ -747,7 +747,7 @@ static size_t Curl_wolfssl_version(char *buffer, size_ |
96 |
|
97 |
static int Curl_wolfssl_init(void) |
98 |
{ |
99 |
- return (wolfSSL_Init() == SSL_SUCCESS); |
100 |
+ return (wolfSSL_Init() == WOLFSSL_SUCCESS); |
101 |
} |
102 |
|
103 |
|
104 |
@@ -936,18 +936,18 @@ static CURLcode Curl_wolfssl_random(struct Curl_easy * |
105 |
return CURLE_OK; |
106 |
} |
107 |
|
108 |
-static CURLcode Curl_wolfssl_sha256sum(const unsigned char *tmp, /* input */ |
109 |
- size_t tmplen, |
110 |
- unsigned char *sha256sum /* output */, |
111 |
- size_t unused) |
112 |
-{ |
113 |
- Sha256 SHA256pw; |
114 |
- (void)unused; |
115 |
- wc_InitSha256(&SHA256pw); |
116 |
- wc_Sha256Update(&SHA256pw, tmp, (word32)tmplen); |
117 |
- wc_Sha256Final(&SHA256pw, sha256sum); |
118 |
- return CURLE_OK; |
119 |
-} |
120 |
+//static CURLcode Curl_wolfssl_sha256sum(const unsigned char *tmp, /* input */ |
121 |
+// size_t tmplen, |
122 |
+// unsigned char *sha256sum /* output */, |
123 |
+// size_t unused) |
124 |
+//{ |
125 |
+// Sha256 SHA256pw; |
126 |
+// (void)unused; |
127 |
+// wc_InitSha256(&SHA256pw); |
128 |
+// wc_Sha256Update(&SHA256pw, tmp, (word32)tmplen); |
129 |
+// wc_Sha256Final(&SHA256pw, sha256sum); |
130 |
+// return CURLE_OK; |
131 |
+//} |
132 |
|
133 |
static void *Curl_wolfssl_get_internals(struct ssl_connect_data *connssl, |
134 |
CURLINFO info UNUSED_PARAM) |
135 |
@@ -985,7 +985,7 @@ const struct Curl_ssl Curl_ssl_wolfssl = { |
136 |
Curl_none_engines_list, /* engines_list */ |
137 |
Curl_none_false_start, /* false_start */ |
138 |
Curl_none_md5sum, /* md5sum */ |
139 |
- Curl_wolfssl_sha256sum /* sha256sum */ |
140 |
+// Curl_wolfssl_sha256sum /* sha256sum */ |
141 |
}; |
142 |
|
143 |
#endif |