aboutsummaryrefslogtreecommitdiffstats
path: root/package/libs/wolfssl/patches/400-additional_compatibility.patch
diff options
context:
space:
mode:
authorEneas U de Queiroz <cotequeiroz@gmail.com>2019-08-05 11:47:58 -0300
committerHauke Mehrtens <hauke@hauke-m.de>2019-08-17 16:43:23 +0200
commit77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c (patch)
tree67e9cf8898201ab77d30f91a4f6b844e0c83c55e /package/libs/wolfssl/patches/400-additional_compatibility.patch
parent16730410136f1512203da9d21bb6a42f1cb43b4e (diff)
downloadupstream-77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c.tar.gz
upstream-77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c.tar.bz2
upstream-77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c.zip
wolfssl: bump to 4.1.0-stable
Always build AES-GCM support. Unnecessary patches were removed. This includes two vulnerability fixes: CVE-2019-11873: a potential buffer overflow case with the TLSv1.3 PSK extension parsing. CVE-2019-13628 (currently assigned-only): potential leak of nonce sizes when performing ECDSA signing operations. The leak is considered to be difficult to exploit but it could potentially be used maliciously to perform a lattice based timing attack. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
Diffstat (limited to 'package/libs/wolfssl/patches/400-additional_compatibility.patch')
-rw-r--r--package/libs/wolfssl/patches/400-additional_compatibility.patch12
1 files changed, 0 insertions, 12 deletions
diff --git a/package/libs/wolfssl/patches/400-additional_compatibility.patch b/package/libs/wolfssl/patches/400-additional_compatibility.patch
deleted file mode 100644
index 1464e9d2a8..0000000000
--- a/package/libs/wolfssl/patches/400-additional_compatibility.patch
+++ /dev/null
@@ -1,12 +0,0 @@
---- a/cyassl/openssl/ssl.h
-+++ b/cyassl/openssl/ssl.h
-@@ -28,6 +28,9 @@
- #define CYASSL_OPENSSL_H_
-
- #include <cyassl/ssl.h>
-+#ifndef HAVE_SNI
-+#undef CYASSL_SNI_HOST_NAME
-+#endif
- #include <wolfssl/openssl/ssl.h>
-
- #endif