View | Details | Raw Unified | Return to bug 242824 | Differences between
and this patch

Collapse All | Expand All

(-)./Makefile (-1 / +1 lines)
Lines 3-8 Link Here
3
3
4
PORTNAME=	curl
4
PORTNAME=	curl
5
PORTVERSION=	7.67.0
5
PORTVERSION=	7.67.0
6
PORTREVISION=	1
6
CATEGORIES=	ftp net www
7
CATEGORIES=	ftp net www
7
MASTER_SITES=	https://curl.haxx.se/download/ \
8
MASTER_SITES=	https://curl.haxx.se/download/ \
8
		LOCAL/sunpoet
9
		LOCAL/sunpoet
Lines 140-146 THREADED_RESOLVER_CONFIGURE_ENABLE= pthreads threaded- Link Here
140
TLS_SRP_CONFIGURE_ENABLE=	tls-srp
141
TLS_SRP_CONFIGURE_ENABLE=	tls-srp
141
WOLFSSL_CONFIGURE_WITH=	wolfssl
142
WOLFSSL_CONFIGURE_WITH=	wolfssl
142
WOLFSSL_LIB_DEPENDS=	libwolfssl.so:security/wolfssl
143
WOLFSSL_LIB_DEPENDS=	libwolfssl.so:security/wolfssl
143
WOLFSSL_BROKEN=		does not build
144
144
145
.include <bsd.port.pre.mk>
145
.include <bsd.port.pre.mk>
146
146
(-)./files/patch-lib-vtls-wolfssl.c (+143 lines)
Line 0 Link Here
1
--- lib/vtls/wolfssl.c.orig	2019-10-15 21:41:50 UTC
2
+++ lib/vtls/wolfssl.c
3
@@ -105,11 +105,11 @@ static Curl_send wolfssl_send;
4
 static int do_file_type(const char *type)
5
 {
6
   if(!type || !type[0])
7
-    return SSL_FILETYPE_PEM;
8
+    return WOLFSSL_FILETYPE_PEM;
9
   if(strcasecompare(type, "PEM"))
10
-    return SSL_FILETYPE_PEM;
11
+    return WOLFSSL_FILETYPE_PEM;
12
   if(strcasecompare(type, "DER"))
13
-    return SSL_FILETYPE_ASN1;
14
+    return WOLFSSL_FILETYPE_ASN1;
15
   return -1;
16
 }
17
 
18
@@ -306,8 +306,8 @@ wolfssl_connect_step1(struct connectdata *conn,
19
    * anyway. In the latter case the result of the verification is checked with
20
    * SSL_get_verify_result() below. */
21
   SSL_CTX_set_verify(BACKEND->ctx,
22
-                     SSL_CONN_CONFIG(verifypeer)?SSL_VERIFY_PEER:
23
-                                                 SSL_VERIFY_NONE,
24
+                     SSL_CONN_CONFIG(verifypeer)?WOLFSSL_VERIFY_PEER:
25
+                                                 WOLFSSL_VERIFY_NONE,
26
                      NULL);
27
 
28
 #ifdef HAVE_SNI
29
@@ -380,7 +380,7 @@ wolfssl_connect_step1(struct connectdata *conn,
30
 
31
     if(wolfSSL_UseALPN(BACKEND->handle, protocols,
32
                        (unsigned)strlen(protocols),
33
-                       WOLFSSL_ALPN_CONTINUE_ON_MISMATCH) != SSL_SUCCESS) {
34
+                       WOLFSSL_ALPN_CONTINUE_ON_MISMATCH) != WOLFSSL_SUCCESS) {
35
       failf(data, "SSL: failed setting ALPN protocols");
36
       return CURLE_SSL_CONNECT_ERROR;
37
     }
38
@@ -440,7 +440,7 @@ wolfssl_connect_step2(struct connectdata *conn,
39
   /* Enable RFC2818 checks */
40
   if(SSL_CONN_CONFIG(verifyhost)) {
41
     ret = wolfSSL_check_domain_name(BACKEND->handle, hostname);
42
-    if(ret == SSL_FAILURE)
43
+    if(ret == WOLFSSL_FAILURE)
44
       return CURLE_OUT_OF_MEMORY;
45
   }
46
 
47
@@ -449,11 +449,11 @@ wolfssl_connect_step2(struct connectdata *conn,
48
     char error_buffer[WOLFSSL_MAX_ERROR_SZ];
49
     int  detail = SSL_get_error(BACKEND->handle, ret);
50
 
51
-    if(SSL_ERROR_WANT_READ == detail) {
52
+    if(WOLFSSL_ERROR_WANT_READ == detail) {
53
       connssl->connecting_state = ssl_connect_2_reading;
54
       return CURLE_OK;
55
     }
56
-    else if(SSL_ERROR_WANT_WRITE == detail) {
57
+    else if(WOLFSSL_ERROR_WANT_WRITE == detail) {
58
       connssl->connecting_state = ssl_connect_2_writing;
59
       return CURLE_OK;
60
     }
61
@@ -560,7 +560,7 @@ wolfssl_connect_step2(struct connectdata *conn,
62
 
63
     rc = wolfSSL_ALPN_GetProtocol(BACKEND->handle, &protocol, &protocol_len);
64
 
65
-    if(rc == SSL_SUCCESS) {
66
+    if(rc == WOLFSSL_SUCCESS) {
67
       infof(data, "ALPN, server accepted to use %.*s\n", protocol_len,
68
             protocol);
69
 
70
@@ -663,8 +663,8 @@ static ssize_t wolfssl_send(struct connectdata *conn,
71
     int err = SSL_get_error(BACKEND->handle, rc);
72
 
73
     switch(err) {
74
-    case SSL_ERROR_WANT_READ:
75
-    case SSL_ERROR_WANT_WRITE:
76
+    case WOLFSSL_ERROR_WANT_READ:
77
+    case WOLFSSL_ERROR_WANT_WRITE:
78
       /* there's data pending, re-invoke SSL_write() */
79
       *curlcode = CURLE_AGAIN;
80
       return -1;
81
@@ -709,10 +709,10 @@ static ssize_t wolfssl_recv(struct connectdata *conn,
82
     int err = SSL_get_error(BACKEND->handle, nread);
83
 
84
     switch(err) {
85
-    case SSL_ERROR_ZERO_RETURN: /* no more data */
86
+    case WOLFSSL_ERROR_ZERO_RETURN: /* no more data */
87
       break;
88
-    case SSL_ERROR_WANT_READ:
89
-    case SSL_ERROR_WANT_WRITE:
90
+    case WOLFSSL_ERROR_WANT_READ:
91
+    case WOLFSSL_ERROR_WANT_WRITE:
92
       /* there's data pending, re-invoke SSL_read() */
93
       *curlcode = CURLE_AGAIN;
94
       return -1;
95
@@ -747,7 +747,7 @@ static size_t Curl_wolfssl_version(char *buffer, size_
96
 
97
 static int Curl_wolfssl_init(void)
98
 {
99
-  return (wolfSSL_Init() == SSL_SUCCESS);
100
+  return (wolfSSL_Init() == WOLFSSL_SUCCESS);
101
 }
102
 
103
 
104
@@ -936,18 +936,18 @@ static CURLcode Curl_wolfssl_random(struct Curl_easy *
105
   return CURLE_OK;
106
 }
107
 
108
-static CURLcode Curl_wolfssl_sha256sum(const unsigned char *tmp, /* input */
109
-                                  size_t tmplen,
110
-                                  unsigned char *sha256sum /* output */,
111
-                                  size_t unused)
112
-{
113
-  Sha256 SHA256pw;
114
-  (void)unused;
115
-  wc_InitSha256(&SHA256pw);
116
-  wc_Sha256Update(&SHA256pw, tmp, (word32)tmplen);
117
-  wc_Sha256Final(&SHA256pw, sha256sum);
118
-  return CURLE_OK;
119
-}
120
+//static CURLcode Curl_wolfssl_sha256sum(const unsigned char *tmp, /* input */
121
+//                                  size_t tmplen,
122
+//                                  unsigned char *sha256sum /* output */,
123
+//                                  size_t unused)
124
+//{
125
+//  Sha256 SHA256pw;
126
+//  (void)unused;
127
+//  wc_InitSha256(&SHA256pw);
128
+//  wc_Sha256Update(&SHA256pw, tmp, (word32)tmplen);
129
+//  wc_Sha256Final(&SHA256pw, sha256sum);
130
+//  return CURLE_OK;
131
+//}
132
 
133
 static void *Curl_wolfssl_get_internals(struct ssl_connect_data *connssl,
134
                                        CURLINFO info UNUSED_PARAM)
135
@@ -985,7 +985,7 @@ const struct Curl_ssl Curl_ssl_wolfssl = {
136
   Curl_none_engines_list,          /* engines_list */
137
   Curl_none_false_start,           /* false_start */
138
   Curl_none_md5sum,                /* md5sum */
139
-  Curl_wolfssl_sha256sum            /* sha256sum */
140
+//  Curl_wolfssl_sha256sum            /* sha256sum */
141
 };
142
 
143
 #endif

Return to bug 242824