Andre Heider 4b212b1306 wolfssl: build with WOLFSSL_ALT_CERT_CHAINS
"Alternate certification chains, as oppossed to requiring full chain
validataion. Certificate validation behavior is relaxed, similar to
openssl and browsers. Only the peer certificate must validate to a trusted
certificate. Without this, all certificates sent by a peer must be
used in the trust chain or the connection will be rejected."

This fixes e.g. uclient-fetch and curl connecting to servers using a Let's
Encrypt certificate which are cross-signed by the now expired
DST Root CA X3, see [0].

This is the recommended solution from upstream [1].

The binary size increases by ~12.3kb:
1236160 staging_dir/target-mipsel_24kc_musl/usr/lib/libwolfssl.so.4.8.1.39c36f2f
1248704 staging_dir/target-mipsel_24kc_musl/usr/lib/libwolfssl.so.4.8.1.39c36f2f

[0] https://github.com/openwrt/packages/issues/16674
[1] https://github.com/wolfSSL/wolfssl/issues/4443#issuecomment-934926793

Signed-off-by: Andre Heider <a.heider@gmail.com>
[bump PKG_RELEASE]
Signed-off-by: David Bauer <mail@david-bauer.net>
(cherry picked from commit 28d8e6a8711ba78f1684a205e11b0dbd4ff2b2f3)
2021-10-17 16:26:54 +02:00
..
2021-02-14 19:38:15 +01:00
2020-02-22 16:34:57 +01:00
2021-02-14 19:38:15 +01:00
2019-01-24 10:39:30 +01:00
2021-02-14 19:38:15 +01:00
2019-11-01 21:19:40 +01:00
2020-12-22 18:59:10 +01:00
2021-03-15 21:53:15 +00:00
2021-03-29 22:26:27 +02:00
2021-08-08 20:51:41 +02:00
2020-03-05 20:48:58 +01:00
2020-12-22 18:59:10 +01:00
2021-08-28 15:51:41 +02:00
2020-12-22 18:59:10 +01:00
2019-02-26 23:20:04 +01:00
2021-02-14 19:38:15 +01:00
2021-02-25 14:41:40 +01:00