aboutsummaryrefslogtreecommitdiffstats
path: root/package/libs/openssl/patches/140-allow-prefer-chacha20.patch
diff options
context:
space:
mode:
authorEneas U de Queiroz <cote2004-github@yahoo.com>2019-02-27 21:39:18 +0000
committerHauke Mehrtens <hauke@hauke-m.de>2019-03-09 18:55:07 +0100
commitd971ae51a51cb1b145b6fbbf7d1327a99be257b1 (patch)
tree767db48749564fe5ca80e00fca3461f80f8b7af7 /package/libs/openssl/patches/140-allow-prefer-chacha20.patch
parentc3425be0820b215f44ebf831a0b794e1b70441ad (diff)
downloadupstream-d971ae51a51cb1b145b6fbbf7d1327a99be257b1.tar.gz
upstream-d971ae51a51cb1b145b6fbbf7d1327a99be257b1.tar.bz2
upstream-d971ae51a51cb1b145b6fbbf7d1327a99be257b1.zip
openssl: backport devcrypto changes from master
The patches to the /dev/crypto engine were commited to openssl master, and will be in the next major version (3.0). Changes: - Optimization in computing a digest in one operation, saving an ioctl - Runtime configuration options for the choice of algorithms to use - Command to dump useful information about the algorithms supported by the engine and the system. - Build the devcrypto engine as a dynamic module, like other engines. The devcrypto engine is built as a separate package by default, but options were added to allow building the engines into the main library. Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com> [refresh patches] Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Diffstat (limited to 'package/libs/openssl/patches/140-allow-prefer-chacha20.patch')
-rw-r--r--package/libs/openssl/patches/140-allow-prefer-chacha20.patch4
1 files changed, 2 insertions, 2 deletions
diff --git a/package/libs/openssl/patches/140-allow-prefer-chacha20.patch b/package/libs/openssl/patches/140-allow-prefer-chacha20.patch
index 9cbe221388..ecbb5c61db 100644
--- a/package/libs/openssl/patches/140-allow-prefer-chacha20.patch
+++ b/package/libs/openssl/patches/140-allow-prefer-chacha20.patch
@@ -37,7 +37,7 @@ Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
"TLS_AES_128_GCM_SHA256"
--- a/ssl/ssl_ciph.c
+++ b/ssl/ssl_ciph.c
-@@ -1464,11 +1464,29 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
+@@ -1466,11 +1466,29 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
ssl_cipher_apply_rule(0, SSL_kECDHE, 0, 0, 0, 0, 0, CIPHER_DEL, -1, &head,
&tail);
@@ -67,7 +67,7 @@ Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
/*
* ...and generally, our preferred cipher is AES.
-@@ -1524,7 +1542,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
+@@ -1526,7 +1544,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
* Within each group, ciphers remain sorted by strength and previous
* preference, i.e.,
* 1) ECDHE > DHE