9d39fefc3b
Changes since v4.8.0: wolfSSL Release 4.8.1 (July 16, 2021) Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix: Vulnerabilities * [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim of Volkswagen Infotainment for the report.
39 lines
1 KiB
Makefile
39 lines
1 KiB
Makefile
# $NetBSD: Makefile,v 1.8 2021/07/24 04:45:06 fox Exp $
|
|
|
|
DISTNAME= wolfssl-4.8.1
|
|
CATEGORIES= security
|
|
MASTER_SITES= https://www.wolfssl.com/
|
|
EXTRACT_SUFX= .zip
|
|
|
|
MAINTAINER= fox@NetBSD.org
|
|
HOMEPAGE= https://www.wolfssl.com/
|
|
COMMENT= Embedded SSL C-Library
|
|
LICENSE= gnu-gpl-v2
|
|
|
|
GNU_CONFIGURE= yes
|
|
CONFIGURE_ARGS+= --disable-dependency-tracking
|
|
CONFIGURE_ARGS+= --enable-dh
|
|
CONFIGURE_ARGS+= --enable-dsa
|
|
CONFIGURE_ARGS+= --enable-dtls
|
|
CONFIGURE_ARGS+= --enable-ecc
|
|
CONFIGURE_ARGS+= --enable-ipv6
|
|
CONFIGURE_ARGS+= --enable-keygen
|
|
CONFIGURE_ARGS+= --enable-opensslextra
|
|
CONFIGURE_ARGS+= --enable-ripemd
|
|
CONFIGURE_ARGS+= --enable-sha512
|
|
CONFIGURE_ARGS+= --enable-shared
|
|
CONFIGURE_ARGS+= --enable-sni
|
|
CONFIGURE_ARGS+= --enable-ssh
|
|
CONFIGURE_ARGS+= --enable-static
|
|
CONFIGURE_ARGS+= --enable-tls13
|
|
CONFIGURE_ARGS+= --enable-tls13-draft18
|
|
|
|
PKGCONFIG_OVERRIDE+= support/wolfssl.pc.in
|
|
|
|
USE_LIBTOOL= yes
|
|
|
|
# XXX: Mutex related test fails with error -9906 in NetBSD 7/8/9 but
|
|
# this has been fixed in -current, libpthread in 9.99.46
|
|
TEST_TARGET= check
|
|
|
|
.include "../../mk/bsd.pkg.mk"
|