aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJohn Crispin <blogic@openwrt.org>2014-09-18 15:24:45 +0000
committerJohn Crispin <blogic@openwrt.org>2014-09-18 15:24:45 +0000
commit1d3a0579dbeb1eb5c61e296f93111d66086ebc31 (patch)
treedd99974626b10363ebf4259d1a5d72dcf02893fb
parentd06df271fb99ab6b5193c359f2d02dc912c66fbc (diff)
downloadupstream-1d3a0579dbeb1eb5c61e296f93111d66086ebc31.tar.gz
upstream-1d3a0579dbeb1eb5c61e296f93111d66086ebc31.tar.bz2
upstream-1d3a0579dbeb1eb5c61e296f93111d66086ebc31.zip
cyassl: update to version 3.2.0
This fixes a security problem: Security fix for RSA Padding check vulnerability Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> Backport of r42526 git-svn-id: svn://svn.openwrt.org/openwrt/branches/barrier_breaker@42614 3c298f89-4303-0410-b956-a3cf2f4a3e73
-rw-r--r--package/libs/cyassl/Makefile4
-rw-r--r--package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch2
2 files changed, 3 insertions, 3 deletions
diff --git a/package/libs/cyassl/Makefile b/package/libs/cyassl/Makefile
index 11ca9c2d35..03f78cff9a 100644
--- a/package/libs/cyassl/Makefile
+++ b/package/libs/cyassl/Makefile
@@ -8,12 +8,12 @@
include $(TOPDIR)/rules.mk
PKG_NAME:=cyassl
-PKG_VERSION:=3.1.0
+PKG_VERSION:=3.2.0
PKG_RELEASE:=1
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).zip
PKG_SOURCE_URL:=http://www.yassl.com/
-PKG_MD5SUM:=72477eb50697e759d309c49cb1aef18a
+PKG_MD5SUM:=a80493c224ff86e45dc333c06d5edb88
PKG_FIXUP:=libtool
PKG_INSTALL:=1
diff --git a/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch b/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch
index 82e08c00d3..5463cb0cf9 100644
--- a/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch
+++ b/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch
@@ -1,6 +1,6 @@
--- a/src/internal.c
+++ b/src/internal.c
-@@ -5600,6 +5600,10 @@ int ProcessReply(CYASSL* ssl)
+@@ -6037,6 +6037,10 @@ int ProcessReply(CYASSL* ssl)
b1 =
ssl->buffers.inputBuffer.buffer[ssl->buffers.inputBuffer.idx++];
ssl->curSize = (word16)(((b0 & 0x7f) << 8) | b1);