mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-03 12:44:45 +02:00
wolfSSH Update
Originally, wolfSSH required some algorithms to be enabled in wolfCrypt to work correctly. wolfSSH is now more flexible with how wolfCrypt is configured, and these combinations do not have to be restricted.
This commit is contained in:
@@ -5485,13 +5485,7 @@ AS_IF([test "x$ENABLED_NULL_CIPHER" = "xno" && \
|
||||
# This will let you know if you enabled wolfSSH but have any of the prereqs
|
||||
# disabled. Some of these options, disabling them adds things to the FLAGS and
|
||||
# you need to check and add items in two places depending on the option.
|
||||
AS_IF([test "x$ENABLED_WOLFSSH" = "xyes"],
|
||||
[AS_IF([test "x$ENABLED_WPAS" = "xno"],[AM_CFLAGS="-DWOLFSSL_PUBLIC_MP $AM_CFLAGS"])
|
||||
AS_IF([test "x$ENABLED_AESGCM" = "xno"],[AC_MSG_ERROR([cannot enable wolfSSH with AES-GCM disabled])])
|
||||
AS_IF([test "x$ENABLED_ECC" = "xno"],[AC_MSG_ERROR([cannot enable wolfSSH with ECC disabled])])
|
||||
AS_IF([test "x$ENABLED_SHA" = "xno"],[AC_MSG_ERROR([cannot enable wolfSSH with SHA-1 disabled])])
|
||||
AS_IF([test "x$ENABLED_SHA512" = "xno"],[AC_MSG_ERROR([cannot enable wolfSSH with SHA-512/384 disabled])])
|
||||
])
|
||||
AS_IF([test "x$ENABLED_WOLFSSH" = "xyes"],[AS_IF([test "x$ENABLED_WPAS" = "xno"],[AM_CFLAGS="-DWOLFSSL_PUBLIC_MP $AM_CFLAGS"])])
|
||||
|
||||
if test "x$ENABLED_OPENSSLCOEXIST" = "xyes"; then
|
||||
if test "x$ENABLED_OPENSSLALL" = "xyes"; then
|
||||
|
Reference in New Issue
Block a user