@@ -518,8 +518,9 @@
void
tls_ctx_set_cert_profile(struct tls_root_ctx *ctx, const char *profile)
{
-#if OPENSSL_VERSION_NUMBER > 0x10100000L \
- && (!defined(LIBRESSL_VERSION_NUMBER) || LIBRESSL_VERSION_NUMBER > 0x3060000fL)
+#if OPENSSL_VERSION_NUMBER > 0x10100000L \
+ && (!defined(LIBRESSL_VERSION_NUMBER) || LIBRESSL_VERSION_NUMBER > 0x3060000fL) \
+ && !defined(OPENSSL_IS_AWSLC)
/* OpenSSL does not have certificate profiles, but a complex set of
* callbacks that we could try to implement to achieve something similar.
* For now, use OpenSSL's security levels to achieve similar (but not equal)
@@ -549,8 +550,8 @@
if (profile)
{
msg(M_WARN,
- "WARNING: OpenSSL 1.1.0 and LibreSSL do not support "
- "--tls-cert-profile, ignoring user-set profile: '%s'",
+ "WARNING: OpenSSL 1.1.0, AWS-LC and LibreSSL < 3.6.0 do not "
+ "support --tls-cert-profile, ignoring user-set profile: '%s'",
profile);
}
#endif /* if OPENSSL_VERSION_NUMBER > 0x10100000L */