summaryrefslogtreecommitdiffstats
path: root/package/libs/cyassl
diff options
context:
space:
mode:
authorHauke Mehrtens <hauke@hauke-m.de>2014-09-13 20:56:55 +0000
committerHauke Mehrtens <hauke@hauke-m.de>2014-09-13 20:56:55 +0000
commitc8bc8031899e1f66f0001088e18837016ee86e54 (patch)
tree934173253f489b8dd21dc7afb9cc07229c0885a9 /package/libs/cyassl
parent2c605ba1f1130d81aa6ff2d070244aa0d6ba386d (diff)
downloadmaster-31e0f0ae-c8bc8031899e1f66f0001088e18837016ee86e54.tar.gz
master-31e0f0ae-c8bc8031899e1f66f0001088e18837016ee86e54.tar.bz2
master-31e0f0ae-c8bc8031899e1f66f0001088e18837016ee86e54.zip
cyassl: update to version 3.2.0
This fixes a security problem: Security fix for RSA Padding check vulnerability Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> SVN-Revision: 42526
Diffstat (limited to 'package/libs/cyassl')
-rw-r--r--package/libs/cyassl/Makefile4
-rw-r--r--package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch2
2 files changed, 3 insertions, 3 deletions
diff --git a/package/libs/cyassl/Makefile b/package/libs/cyassl/Makefile
index 11ca9c2d35..03f78cff9a 100644
--- a/package/libs/cyassl/Makefile
+++ b/package/libs/cyassl/Makefile
@@ -8,12 +8,12 @@
include $(TOPDIR)/rules.mk
PKG_NAME:=cyassl
-PKG_VERSION:=3.1.0
+PKG_VERSION:=3.2.0
PKG_RELEASE:=1
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).zip
PKG_SOURCE_URL:=http://www.yassl.com/
-PKG_MD5SUM:=72477eb50697e759d309c49cb1aef18a
+PKG_MD5SUM:=a80493c224ff86e45dc333c06d5edb88
PKG_FIXUP:=libtool
PKG_INSTALL:=1
diff --git a/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch b/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch
index 82e08c00d3..5463cb0cf9 100644
--- a/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch
+++ b/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch
@@ -1,6 +1,6 @@
--- a/src/internal.c
+++ b/src/internal.c
-@@ -5600,6 +5600,10 @@ int ProcessReply(CYASSL* ssl)
+@@ -6037,6 +6037,10 @@ int ProcessReply(CYASSL* ssl)
b1 =
ssl->buffers.inputBuffer.buffer[ssl->buffers.inputBuffer.idx++];
ssl->curSize = (word16)(((b0 & 0x7f) << 8) | b1);