summaryrefslogtreecommitdiffstats
path: root/package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch
diff options
context:
space:
mode:
authorGustavo Zacarias <gustavo@zacarias.com.ar>2014-06-05 09:34:09 -0300
committerPeter Korsgaard <peter@korsgaard.com>2014-06-05 21:23:37 +0200
commitad92b26df746ef1d9a78e75c6ac8e8557211cf0b (patch)
treed4d2634e65953f407d3156850ca3f0d79b06c277 /package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch
parent70bd2d9ab5ca4261cade36aa671675dea52688b6 (diff)
downloadbuildroot-ad92b26df746ef1d9a78e75c6ac8e8557211cf0b.tar.gz
buildroot-ad92b26df746ef1d9a78e75c6ac8e8557211cf0b.zip
wpa_supplicant: bump to version 2.2
Patches are now upstream. Enable epoll support since any modern kernel/toolchain supports it. Interworking requires Hotspot functionality which we didn't enable before so introduce a new option for them. While at it group and sort the options in a more lean and friendly way. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Reviewed-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch')
-rw-r--r--package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch35
1 files changed, 0 insertions, 35 deletions
diff --git a/package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch b/package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch
deleted file mode 100644
index 7862de7a64..0000000000
--- a/package/wpa_supplicant/wpa_supplicant-0004-PKCS-1-Enforce-minimum-padding-for-decryption-in-int.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-From 6c5be116dd6997f68e524247751cff53c74519d7 Mon Sep 17 00:00:00 2001
-From: Jouni Malinen <jouni@qca.qualcomm.com>
-Date: Mon, 19 May 2014 23:26:43 +0300
-Subject: [PATCH] PKCS #1: Enforce minimum padding for decryption in
- internal TLS
-
-Follow the PKCS #1 v1.5, 8.1 constraint of at least eight octets long PS
-for the case where the internal TLS implementation decrypts PKCS #1
-formatted data. Similar limit was already in place for signature
-validation, but not for this decryption routine.
-
-Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
----
- src/tls/pkcs1.c | 5 +++++
- 1 file changed, 5 insertions(+)
-
-diff --git a/src/tls/pkcs1.c b/src/tls/pkcs1.c
-index af58a42987c6..ea3e6171a1d1 100644
---- a/src/tls/pkcs1.c
-+++ b/src/tls/pkcs1.c
-@@ -113,6 +113,11 @@ int pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key,
- pos++;
- if (pos == end)
- return -1;
-+ if (pos - out - 2 < 8) {
-+ /* PKCS #1 v1.5, 8.1: At least eight octets long PS */
-+ wpa_printf(MSG_INFO, "LibTomCrypt: Too short padding");
-+ return -1;
-+ }
- pos++;
-
- *outlen -= pos - out;
---
-2.0.0.rc2
-
OpenPOWER on IntegriCloud