aboutsummaryrefslogtreecommitdiffstats
path: root/package/libs/wolfssl/patches/100-disable-hardening-check.patch
diff options
context:
space:
mode:
authorEneas U de Queiroz <cotequeiroz@gmail.com>2019-07-01 13:39:59 -0300
committerChristian Lamparter <chunkeey@gmail.com>2019-07-07 13:02:05 +0200
commit2792daab5ad26e916619052fc7f581cddc1ea53c (patch)
treee730b400c5dcaf3e13445c8a5360b4de0efaed1f /package/libs/wolfssl/patches/100-disable-hardening-check.patch
parent7f79882d44baf7d63fd6f2040deb4fca8e78fb24 (diff)
downloadupstream-2792daab5ad26e916619052fc7f581cddc1ea53c.tar.gz
upstream-2792daab5ad26e916619052fc7f581cddc1ea53c.tar.bz2
upstream-2792daab5ad26e916619052fc7f581cddc1ea53c.zip
wolfssl: update to 3.15.7, fix Makefile
This includes a fix for a medium-level potential cache attack with a variant of Bleichenbacher’s attack. Patches were refreshed. Increased FP_MAX_BITS to allow 4096-bit RSA keys. Fixed poly1305 build option, and some Makefile updates. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
Diffstat (limited to 'package/libs/wolfssl/patches/100-disable-hardening-check.patch')
-rw-r--r--package/libs/wolfssl/patches/100-disable-hardening-check.patch4
1 files changed, 2 insertions, 2 deletions
diff --git a/package/libs/wolfssl/patches/100-disable-hardening-check.patch b/package/libs/wolfssl/patches/100-disable-hardening-check.patch
index d913b5fdea..8a51434633 100644
--- a/package/libs/wolfssl/patches/100-disable-hardening-check.patch
+++ b/package/libs/wolfssl/patches/100-disable-hardening-check.patch
@@ -1,6 +1,6 @@
--- a/wolfssl/wolfcrypt/settings.h
+++ b/wolfssl/wolfcrypt/settings.h
-@@ -1624,7 +1624,7 @@ extern void uITRON4_free(void *p) ;
+@@ -1759,7 +1759,7 @@ extern void uITRON4_free(void *p) ;
#endif
/* warning for not using harden build options (default with ./configure) */
@@ -8,4 +8,4 @@
+#if 0
#if (defined(USE_FAST_MATH) && !defined(TFM_TIMING_RESISTANT)) || \
(defined(HAVE_ECC) && !defined(ECC_TIMING_RESISTANT)) || \
- (!defined(NO_RSA) && !defined(WC_RSA_BLINDING) && !defined(HAVE_FIPS))
+ (!defined(NO_RSA) && !defined(WC_RSA_BLINDING) && !defined(HAVE_FIPS) && \