diff options
author | Eneas U de Queiroz <cotequeiroz@gmail.com> | 2019-07-01 13:39:59 -0300 |
---|---|---|
committer | Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk> | 2019-07-08 12:41:20 +0100 |
commit | 3167a57f72626e0d2d3a63a8200384db8b6d132d (patch) | |
tree | bf12e446345bc7c437cf3680e9f339bcab165ab6 /package/libs/wolfssl/patches/100-disable-hardening-check.patch | |
parent | cd4fcd46f16743b554bca8236830ff838e118be4 (diff) | |
download | upstream-3167a57f72626e0d2d3a63a8200384db8b6d132d.tar.gz upstream-3167a57f72626e0d2d3a63a8200384db8b6d132d.tar.bz2 upstream-3167a57f72626e0d2d3a63a8200384db8b6d132d.zip |
wolfssl: update to 3.15.7, fix Makefile
This includes a fix for a medium-level potential cache attack with a
variant of Bleichenbacher’s attack. Patches were refreshed.
Increased FP_MAX_BITS to allow 4096-bit RSA keys.
Fixed poly1305 build option, and some Makefile updates.
Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit 2792daab5ad26e916619052fc7f581cddc1ea53c)
Diffstat (limited to 'package/libs/wolfssl/patches/100-disable-hardening-check.patch')
-rw-r--r-- | package/libs/wolfssl/patches/100-disable-hardening-check.patch | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/package/libs/wolfssl/patches/100-disable-hardening-check.patch b/package/libs/wolfssl/patches/100-disable-hardening-check.patch index d913b5fdea..8a51434633 100644 --- a/package/libs/wolfssl/patches/100-disable-hardening-check.patch +++ b/package/libs/wolfssl/patches/100-disable-hardening-check.patch @@ -1,6 +1,6 @@ --- a/wolfssl/wolfcrypt/settings.h +++ b/wolfssl/wolfcrypt/settings.h -@@ -1624,7 +1624,7 @@ extern void uITRON4_free(void *p) ; +@@ -1759,7 +1759,7 @@ extern void uITRON4_free(void *p) ; #endif /* warning for not using harden build options (default with ./configure) */ @@ -8,4 +8,4 @@ +#if 0 #if (defined(USE_FAST_MATH) && !defined(TFM_TIMING_RESISTANT)) || \ (defined(HAVE_ECC) && !defined(ECC_TIMING_RESISTANT)) || \ - (!defined(NO_RSA) && !defined(WC_RSA_BLINDING) && !defined(HAVE_FIPS)) + (!defined(NO_RSA) && !defined(WC_RSA_BLINDING) && !defined(HAVE_FIPS) && \ |