From: Jay Satiro Date: Fri, 21 Feb 2025 08:50:15 +0000 (-0500) Subject: wolfssl: warn if CA native import option is ignored X-Git-Tag: curl-8_13_0~343 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=2fce176bf6b4594aecabdd3e2cf1f53555c12cb6;p=thirdparty%2Fcurl.git wolfssl: warn if CA native import option is ignored - Show verbose message if the CA native import option is set but the wolfSSL build does not support it. wolfSSL has to be built with WOLFSSL_SYS_CA_CERTS to import native CA certificates and that may not be common. Closes https://github.com/curl/curl/pull/16417 --- diff --git a/lib/vtls/wolfssl.c b/lib/vtls/wolfssl.c index a2c6a05e4e..9d112616ce 100644 --- a/lib/vtls/wolfssl.c +++ b/lib/vtls/wolfssl.c @@ -609,9 +609,11 @@ static CURLcode wssl_populate_x509_store(struct Curl_cfilter *cf, /* We do not want to do this again, no matter the outcome */ wssl->x509_store_setup = TRUE; -#if !defined(NO_FILESYSTEM) && defined(WOLFSSL_SYS_CA_CERTS) + +#ifndef NO_FILESYSTEM /* load native CA certificates */ if(ssl_config->native_ca_store) { +#ifdef WOLFSSL_SYS_CA_CERTS if(wolfSSL_CTX_load_system_CA_certs(wssl->ssl_ctx) != WOLFSSL_SUCCESS) { infof(data, "error importing native CA store, continuing anyway"); } @@ -619,6 +621,10 @@ static CURLcode wssl_populate_x509_store(struct Curl_cfilter *cf, imported_native_ca = TRUE; infof(data, "successfully imported native CA store"); } +#else + infof(data, "ignoring native CA option because wolfSSL was built without " + "native CA support"); +#endif } #endif /* !NO_FILESYSTEM */