wolfssl: bump to 4.1.0-stable
authorEneas U de Queiroz <cotequeiroz@gmail.com>
Mon, 5 Aug 2019 14:47:58 +0000 (11:47 -0300)
committerHauke Mehrtens <hauke@hauke-m.de>
Sat, 17 Aug 2019 14:43:23 +0000 (16:43 +0200)
commit77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c
tree67e9cf8898201ab77d30f91a4f6b844e0c83c55e
parent16730410136f1512203da9d21bb6a42f1cb43b4e
wolfssl: bump to 4.1.0-stable

Always build AES-GCM support.
Unnecessary patches were removed.

This includes two vulnerability fixes:

CVE-2019-11873: a potential buffer overflow case with the TLSv1.3 PSK
extension parsing.

CVE-2019-13628 (currently assigned-only): potential leak of nonce sizes
when performing ECDSA signing operations. The leak is considered to be
difficult to exploit but it could potentially be used maliciously to
perform a lattice based timing attack.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
package/libs/wolfssl/Config.in
package/libs/wolfssl/Makefile
package/libs/wolfssl/patches/100-disable-hardening-check.patch
package/libs/wolfssl/patches/400-additional_compatibility.patch [deleted file]
package/libs/wolfssl/patches/900-remove-broken-autoconf-macros.patch [deleted file]