]> git.ipfire.org Git - thirdparty/haproxy.git/commitdiff
MINOR: ssl: Remove ClientHello specific traces if !HAVE_SSL_CLIENT_HELLO_CB
authorRemi Tricot-Le Breton <rlebreton@haproxy.com>
Tue, 15 Jul 2025 08:45:11 +0000 (10:45 +0200)
committerWilliam Lallemand <wlallemand@haproxy.com>
Mon, 21 Jul 2025 14:44:50 +0000 (16:44 +0200)
SSL libraries like wolfSSL that don't have the clienthello callback
mechanism enabled do not need to have the traces that are only called
from the said callback.
The code added to parse the ciphers relied on a function that wes not
defined in wolfSSL (SSL_CIPHER_find).

src/ssl_trace.c

index ed67a5860508e371467c80d0f35463fb86415dc3..cc7b870428d3e5a82e989008ca184ac2234143a9 100644 (file)
@@ -215,6 +215,8 @@ static void ssl_trace(enum trace_level level, uint64_t mask, const struct trace_
                }
        }
 
+#ifdef HAVE_SSL_CLIENT_HELLO_CB
+
        if (mask & SSL_EV_CONN_SIGALG_EXT && src->verbosity >= SSL_VERB_ADVANCED) {
                if (a2 && a3) {
                        const uint16_t *extension_data = a2;
@@ -306,5 +308,6 @@ static void ssl_trace(enum trace_level level, uint64_t mask, const struct trace_
                        }
                }
        }
+#endif /* HAVE_SSL_CLIENT_HELLO_CB */
 }