forked from wolfSSL/wolfssl
Introduce HAPROXY config flag + get/set app_data
This commit is contained in:
20
configure.ac
20
configure.ac
@@ -189,6 +189,7 @@ then
|
|||||||
enable_certservice=yes
|
enable_certservice=yes
|
||||||
enable_jni=yes
|
enable_jni=yes
|
||||||
enable_lighty=yes
|
enable_lighty=yes
|
||||||
|
enable_haproxy=yes
|
||||||
enable_stunnel=yes
|
enable_stunnel=yes
|
||||||
enable_nginx=yes
|
enable_nginx=yes
|
||||||
enable_pwdbased=yes
|
enable_pwdbased=yes
|
||||||
@@ -2380,6 +2381,24 @@ then
|
|||||||
AM_CFLAGS="$AM_CFLAGS -DHAVE_EXT_CACHE -DHAVE_EX_DATA"
|
AM_CFLAGS="$AM_CFLAGS -DHAVE_EXT_CACHE -DHAVE_EX_DATA"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# haproxy Support
|
||||||
|
AC_ARG_ENABLE([haproxy],
|
||||||
|
[ --enable-haproxy Enable haproxy (default: disabled)],
|
||||||
|
[ ENABLED_HAPROXY=$enableval ],
|
||||||
|
[ ENABLED_HAPROXY=no ]
|
||||||
|
)
|
||||||
|
|
||||||
|
if test "$ENABLED_HAPROXY" = "yes"
|
||||||
|
then
|
||||||
|
AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_HAPROXY"
|
||||||
|
# Requires opensslextra make sure on
|
||||||
|
if test "x$ENABLED_OPENSSLEXTRA" = "xno"
|
||||||
|
then
|
||||||
|
ENABLED_OPENSSLEXTRA="yes"
|
||||||
|
AM_CFLAGS="-DOPENSSL_EXTRA $AM_CFLAGS"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
|
||||||
# stunnel Support
|
# stunnel Support
|
||||||
AC_ARG_ENABLE([stunnel],
|
AC_ARG_ENABLE([stunnel],
|
||||||
@@ -3439,6 +3458,7 @@ echo " * CODING: $ENABLED_CODING"
|
|||||||
echo " * MEMORY: $ENABLED_MEMORY"
|
echo " * MEMORY: $ENABLED_MEMORY"
|
||||||
echo " * I/O POOL: $ENABLED_IOPOOL"
|
echo " * I/O POOL: $ENABLED_IOPOOL"
|
||||||
echo " * LIGHTY: $ENABLED_LIGHTY"
|
echo " * LIGHTY: $ENABLED_LIGHTY"
|
||||||
|
echo " * HAPROXY: $ENABLED_HAPROXY"
|
||||||
echo " * STUNNEL: $ENABLED_STUNNEL"
|
echo " * STUNNEL: $ENABLED_STUNNEL"
|
||||||
echo " * NGINX: $ENABLED_NGINX"
|
echo " * NGINX: $ENABLED_NGINX"
|
||||||
echo " * ERROR_STRINGS: $ENABLED_ERROR_STRINGS"
|
echo " * ERROR_STRINGS: $ENABLED_ERROR_STRINGS"
|
||||||
|
16
src/ssl.c
16
src/ssl.c
@@ -21713,21 +21713,13 @@ void* wolfSSL_GetRsaDecCtx(WOLFSSL* ssl)
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void* wolfSSL_get_app_data( const WOLFSSL *ssl)
|
void* wolfSSL_get_app_data( const WOLFSSL *ssl) {
|
||||||
{
|
|
||||||
/* checkout exdata stuff... */
|
/* checkout exdata stuff... */
|
||||||
(void)ssl;
|
return wolfSSL_get_ex_data(ssl,0);
|
||||||
WOLFSSL_ENTER("wolfSSL_get_app_data");
|
|
||||||
WOLFSSL_STUB("wolfSSL_get_app_data");
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void wolfSSL_set_app_data(WOLFSSL *ssl, void *arg) {
|
int wolfSSL_set_app_data(WOLFSSL *ssl, void *arg) {
|
||||||
(void)ssl;
|
return wolfSSL_set_ex_data(ssl,0,(char *)arg);
|
||||||
(void)arg;
|
|
||||||
WOLFSSL_ENTER("wolfSSL_set_app_data");
|
|
||||||
WOLFSSL_STUB("wolfSSL_set_app_data");
|
|
||||||
}
|
}
|
||||||
|
|
||||||
WOLFSSL_ASN1_OBJECT * wolfSSL_X509_NAME_ENTRY_get_object(WOLFSSL_X509_NAME_ENTRY *ne) {
|
WOLFSSL_ASN1_OBJECT * wolfSSL_X509_NAME_ENTRY_get_object(WOLFSSL_X509_NAME_ENTRY *ne) {
|
||||||
|
@@ -30,6 +30,7 @@
|
|||||||
/* for users not using preprocessor flags*/
|
/* for users not using preprocessor flags*/
|
||||||
#include <wolfssl/wolfcrypt/settings.h>
|
#include <wolfssl/wolfcrypt/settings.h>
|
||||||
#include <wolfssl/version.h>
|
#include <wolfssl/version.h>
|
||||||
|
#include <wolfssl/wolfcrypt/types.h> /* for XFILE */
|
||||||
|
|
||||||
#ifdef HAVE_WOLF_EVENT
|
#ifdef HAVE_WOLF_EVENT
|
||||||
#include <wolfssl/wolfcrypt/wolfevent.h>
|
#include <wolfssl/wolfcrypt/wolfevent.h>
|
||||||
@@ -2045,7 +2046,7 @@ WOLFSSL_API int wolfSSL_OBJ_sn2nid(const char *sn);
|
|||||||
WOLFSSL_API void wolfSSL_CTX_set_verify_depth(WOLFSSL_CTX *ctx,int depth);
|
WOLFSSL_API void wolfSSL_CTX_set_verify_depth(WOLFSSL_CTX *ctx,int depth);
|
||||||
WOLFSSL_API void wolfSSL_set_verify_depth(WOLFSSL *ssl,int depth);
|
WOLFSSL_API void wolfSSL_set_verify_depth(WOLFSSL *ssl,int depth);
|
||||||
WOLFSSL_API void* wolfSSL_get_app_data( const WOLFSSL *ssl);
|
WOLFSSL_API void* wolfSSL_get_app_data( const WOLFSSL *ssl);
|
||||||
WOLFSSL_API void wolfSSL_set_app_data(WOLFSSL *ssl, void *arg);
|
WOLFSSL_API int wolfSSL_set_app_data(WOLFSSL *ssl, void *arg);
|
||||||
WOLFSSL_API WOLFSSL_ASN1_OBJECT * wolfSSL_X509_NAME_ENTRY_get_object(WOLFSSL_X509_NAME_ENTRY *ne);
|
WOLFSSL_API WOLFSSL_ASN1_OBJECT * wolfSSL_X509_NAME_ENTRY_get_object(WOLFSSL_X509_NAME_ENTRY *ne);
|
||||||
WOLFSSL_API WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_get_entry(WOLFSSL_X509_NAME *name, int loc);
|
WOLFSSL_API WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_get_entry(WOLFSSL_X509_NAME *name, int loc);
|
||||||
WOLFSSL_API void wolfSSL_sk_X509_NAME_pop_free(STACK_OF(WOLFSSL_X509_NAME)* sk, void f (WOLFSSL_X509_NAME*));
|
WOLFSSL_API void wolfSSL_sk_X509_NAME_pop_free(STACK_OF(WOLFSSL_X509_NAME)* sk, void f (WOLFSSL_X509_NAME*));
|
||||||
@@ -2209,7 +2210,7 @@ WOLFSSL_API unsigned long wolfSSL_ERR_peek_error_line_data(const char **file,
|
|||||||
int *line, const char **data, int *flags);
|
int *line, const char **data, int *flags);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef WOLFSSL_NGINX
|
#if defined WOLFSSL_NGINX || defined WOLFSSL_HAPROXY
|
||||||
/* Not an OpenSSL API. */
|
/* Not an OpenSSL API. */
|
||||||
WOLFSSL_LOCAL int wolfSSL_get_ocsp_response(WOLFSSL* ssl, byte** response);
|
WOLFSSL_LOCAL int wolfSSL_get_ocsp_response(WOLFSSL* ssl, byte** response);
|
||||||
/* Not an OpenSSL API. */
|
/* Not an OpenSSL API. */
|
||||||
|
Reference in New Issue
Block a user