aboutsummaryrefslogtreecommitdiffstats
path: root/package/libs/wolfssl/patches/100-disable-hardening-check.patch
diff options
context:
space:
mode:
authorEneas U de Queiroz <cotequeiroz@gmail.com>2019-07-01 13:39:59 -0300
committerKevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>2019-07-08 12:41:20 +0100
commit3167a57f72626e0d2d3a63a8200384db8b6d132d (patch)
treebf12e446345bc7c437cf3680e9f339bcab165ab6 /package/libs/wolfssl/patches/100-disable-hardening-check.patch
parentcd4fcd46f16743b554bca8236830ff838e118be4 (diff)
downloadupstream-3167a57f72626e0d2d3a63a8200384db8b6d132d.tar.gz
upstream-3167a57f72626e0d2d3a63a8200384db8b6d132d.tar.bz2
upstream-3167a57f72626e0d2d3a63a8200384db8b6d132d.zip
wolfssl: update to 3.15.7, fix Makefile
This includes a fix for a medium-level potential cache attack with a variant of Bleichenbacher’s attack. Patches were refreshed. Increased FP_MAX_BITS to allow 4096-bit RSA keys. Fixed poly1305 build option, and some Makefile updates. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com> (cherry picked from commit 2792daab5ad26e916619052fc7f581cddc1ea53c)
Diffstat (limited to 'package/libs/wolfssl/patches/100-disable-hardening-check.patch')
-rw-r--r--package/libs/wolfssl/patches/100-disable-hardening-check.patch4
1 files changed, 2 insertions, 2 deletions
diff --git a/package/libs/wolfssl/patches/100-disable-hardening-check.patch b/package/libs/wolfssl/patches/100-disable-hardening-check.patch
index d913b5fdea..8a51434633 100644
--- a/package/libs/wolfssl/patches/100-disable-hardening-check.patch
+++ b/package/libs/wolfssl/patches/100-disable-hardening-check.patch
@@ -1,6 +1,6 @@
--- a/wolfssl/wolfcrypt/settings.h
+++ b/wolfssl/wolfcrypt/settings.h
-@@ -1624,7 +1624,7 @@ extern void uITRON4_free(void *p) ;
+@@ -1759,7 +1759,7 @@ extern void uITRON4_free(void *p) ;
#endif
/* warning for not using harden build options (default with ./configure) */
@@ -8,4 +8,4 @@
+#if 0
#if (defined(USE_FAST_MATH) && !defined(TFM_TIMING_RESISTANT)) || \
(defined(HAVE_ECC) && !defined(ECC_TIMING_RESISTANT)) || \
- (!defined(NO_RSA) && !defined(WC_RSA_BLINDING) && !defined(HAVE_FIPS))
+ (!defined(NO_RSA) && !defined(WC_RSA_BLINDING) && !defined(HAVE_FIPS) && \