diff options
author | Hauke Mehrtens <hauke@openwrt.org> | 2014-09-13 20:56:55 +0000 |
---|---|---|
committer | Hauke Mehrtens <hauke@openwrt.org> | 2014-09-13 20:56:55 +0000 |
commit | 6161cab72ff6315a525369e09ba18f765d17ac89 (patch) | |
tree | a14b2e3def4cf6e629202b971bbd2db6d7b7aa0d | |
parent | db79e96601211dd50323536d1414928b437f60fe (diff) | |
download | master-187ad058-6161cab72ff6315a525369e09ba18f765d17ac89.tar.gz master-187ad058-6161cab72ff6315a525369e09ba18f765d17ac89.tar.bz2 master-187ad058-6161cab72ff6315a525369e09ba18f765d17ac89.zip |
cyassl: update to version 3.2.0
This fixes a security problem:
Security fix for RSA Padding check vulnerability
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@42526 3c298f89-4303-0410-b956-a3cf2f4a3e73
-rw-r--r-- | package/libs/cyassl/Makefile | 4 | ||||
-rw-r--r-- | package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch | 2 |
2 files changed, 3 insertions, 3 deletions
diff --git a/package/libs/cyassl/Makefile b/package/libs/cyassl/Makefile index 11ca9c2d35..03f78cff9a 100644 --- a/package/libs/cyassl/Makefile +++ b/package/libs/cyassl/Makefile @@ -8,12 +8,12 @@ include $(TOPDIR)/rules.mk PKG_NAME:=cyassl -PKG_VERSION:=3.1.0 +PKG_VERSION:=3.2.0 PKG_RELEASE:=1 PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).zip PKG_SOURCE_URL:=http://www.yassl.com/ -PKG_MD5SUM:=72477eb50697e759d309c49cb1aef18a +PKG_MD5SUM:=a80493c224ff86e45dc333c06d5edb88 PKG_FIXUP:=libtool PKG_INSTALL:=1 diff --git a/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch b/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch index 82e08c00d3..5463cb0cf9 100644 --- a/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch +++ b/package/libs/cyassl/patches/200-SSL_accept-handle-hello-garbage.patch @@ -1,6 +1,6 @@ --- a/src/internal.c +++ b/src/internal.c -@@ -5600,6 +5600,10 @@ int ProcessReply(CYASSL* ssl) +@@ -6037,6 +6037,10 @@ int ProcessReply(CYASSL* ssl) b1 = ssl->buffers.inputBuffer.buffer[ssl->buffers.inputBuffer.idx++]; ssl->curSize = (word16)(((b0 & 0x7f) << 8) | b1); |