diff options
author | John Audia <therealgraysky@proton.me> | 2022-07-21 15:59:30 -0400 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2022-07-31 00:11:21 +0200 |
commit | c2aa816f28e0fe2f6f77d0c6da4eba19ea8db4ea (patch) | |
tree | bc6d830b1c540b8e018559b5cf5cbb6be68d5f27 /package/libs/wolfssl | |
parent | 74554578935f625d0ccfe95cfd9c03cb5031126e (diff) | |
download | upstream-c2aa816f28e0fe2f6f77d0c6da4eba19ea8db4ea.tar.gz upstream-c2aa816f28e0fe2f6f77d0c6da4eba19ea8db4ea.tar.bz2 upstream-c2aa816f28e0fe2f6f77d0c6da4eba19ea8db4ea.zip |
wolfssl: fix math library build
Apply upstream patch[1] to fix breakage around math libraries.
This can likely be removed when 5.5.0-stable is tagged and released.
Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B
1. https://github.com/wolfSSL/wolfssl/pull/5390
Signed-off-by: John Audia <therealgraysky@proton.me>
Diffstat (limited to 'package/libs/wolfssl')
-rw-r--r-- | package/libs/wolfssl/patches/101-update-sp_rand_prime-s-preprocessor-gating-to-match.patch | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/package/libs/wolfssl/patches/101-update-sp_rand_prime-s-preprocessor-gating-to-match.patch b/package/libs/wolfssl/patches/101-update-sp_rand_prime-s-preprocessor-gating-to-match.patch new file mode 100644 index 0000000000..4b56c1568a --- /dev/null +++ b/package/libs/wolfssl/patches/101-update-sp_rand_prime-s-preprocessor-gating-to-match.patch @@ -0,0 +1,23 @@ +From dc92ec2aa9cb76b782bdba3fc5203267ebf39994 Mon Sep 17 00:00:00 2001 +From: Kareem <kareem@wolfssl.com> +Date: Fri, 22 Jul 2022 11:07:46 -0700 +Subject: [PATCH] Update sp_rand_prime's preprocessor gating to match + wolfSSL_BN_generate_prime_ex's. + +--- + wolfcrypt/src/sp_int.c | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +--- a/wolfcrypt/src/sp_int.c ++++ b/wolfcrypt/src/sp_int.c +@@ -15647,8 +15647,8 @@ int sp_radix_size(sp_int* a, int radix, + * Prime number generation and checking. + ***************************************/ + +-#if defined(WOLFSSL_KEY_GEN) && (!defined(NO_DH) || !defined(NO_DSA)) && \ +- !defined(WC_NO_RNG) ++#if defined(WOLFSSL_KEY_GEN) && (!defined(NO_RSA) || !defined(NO_DH) || \ ++ !defined(NO_DSA)) && !defined(WC_NO_RNG) + /* Generate a random prime for RSA only. + * + * @param [out] r SP integer to hold result. |