wolfssl: bump to v5.3.0-stable
This is mostly a bug fix release, including two that were already
patched here:
- 300-fix-SSL_get_verify_result-regression.patch
- 400-wolfcrypt-src-port-devcrypto-devcrypto_aes.c-remove-.patch
Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit 73c1fe2890)
			
			
This commit is contained in:
		
				
					committed by
					
						
						Hauke Mehrtens
					
				
			
			
				
	
			
			
			
						parent
						
							3aeb6e975f
						
					
				
				
					commit
					6f8db8fee3
				
			@@ -8,12 +8,12 @@
 | 
			
		||||
include $(TOPDIR)/rules.mk
 | 
			
		||||
 | 
			
		||||
PKG_NAME:=wolfssl
 | 
			
		||||
PKG_VERSION:=5.2.0-stable
 | 
			
		||||
PKG_VERSION:=5.3.0-stable
 | 
			
		||||
PKG_RELEASE:=$(AUTORELEASE)
 | 
			
		||||
 | 
			
		||||
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
 | 
			
		||||
PKG_SOURCE_URL:=https://github.com/wolfSSL/wolfssl/archive/v$(PKG_VERSION)
 | 
			
		||||
PKG_HASH:=409b4646c5f54f642de0e9f3544c3b83de7238134f5b1ff93fb44527bf119d05
 | 
			
		||||
PKG_HASH:=1a3bb310dc01d3e73d9ad91b6ea8249d081016f8eef4ae8f21d3421f91ef1de9
 | 
			
		||||
 | 
			
		||||
PKG_FIXUP:=libtool libtool-abiver
 | 
			
		||||
PKG_INSTALL:=1
 | 
			
		||||
 
 | 
			
		||||
@@ -1,24 +0,0 @@
 | 
			
		||||
From 87e43dd63ba429297e439f2dfd1ee8b45981e18b Mon Sep 17 00:00:00 2001
 | 
			
		||||
From: Juliusz Sosinowicz <juliusz@wolfssl.com>
 | 
			
		||||
Date: Sat, 12 Feb 2022 00:34:24 +0100
 | 
			
		||||
Subject: [PATCH] Reported in ZD13631
 | 
			
		||||
 | 
			
		||||
`ssl->peerVerifyRet` wasn't being cleared when retrying with an alternative cert chain
 | 
			
		||||
 | 
			
		||||
References: https://github.com/wolfSSL/wolfssl/issues/4879
 | 
			
		||||
---
 | 
			
		||||
 src/internal.c | 3 +++
 | 
			
		||||
 1 file changed, 3 insertions(+)
 | 
			
		||||
 | 
			
		||||
--- a/src/internal.c
 | 
			
		||||
+++ b/src/internal.c
 | 
			
		||||
@@ -12342,6 +12342,9 @@ int ProcessPeerCerts(WOLFSSL* ssl, byte*
 | 
			
		||||
                             }
 | 
			
		||||
 
 | 
			
		||||
                             ret = 0; /* clear errors and continue */
 | 
			
		||||
+                    #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
 | 
			
		||||
+                            ssl->peerVerifyRet = 0;
 | 
			
		||||
+                    #endif
 | 
			
		||||
                             args->verifyErr = 0;
 | 
			
		||||
                         }
 | 
			
		||||
 
 | 
			
		||||
@@ -1,19 +0,0 @@
 | 
			
		||||
From 096889927d9528d4fbeb3aab56d1fe8225d2e7ec Mon Sep 17 00:00:00 2001
 | 
			
		||||
From: Daniel Pouzzner <douzzer@wolfssl.com>
 | 
			
		||||
Date: Thu, 14 Apr 2022 20:23:31 -0500
 | 
			
		||||
Subject: [PATCH] wolfcrypt/src/port/devcrypto/devcrypto_aes.c: remove
 | 
			
		||||
 redundant "int ret" in wc_AesCtrEncrypt() (supersedes #5052).
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
diff --git a/wolfcrypt/src/port/devcrypto/devcrypto_aes.c b/wolfcrypt/src/port/devcrypto/devcrypto_aes.c
 | 
			
		||||
index 3bc1d5bb1..28e145e27 100644
 | 
			
		||||
--- a/wolfcrypt/src/port/devcrypto/devcrypto_aes.c
 | 
			
		||||
+++ b/wolfcrypt/src/port/devcrypto/devcrypto_aes.c
 | 
			
		||||
@@ -208,7 +208,6 @@ int wc_AesCtrEncrypt(Aes* aes, byte* out, const byte* in, word32 sz)
 | 
			
		||||
     int ret;
 | 
			
		||||
     struct crypt_op crt;
 | 
			
		||||
     byte* tmp;
 | 
			
		||||
-    int ret;
 | 
			
		||||
 
 | 
			
		||||
     if (aes == NULL || out == NULL || in == NULL) {
 | 
			
		||||
         return BAD_FUNC_ARG;
 | 
			
		||||
		Reference in New Issue
	
	Block a user