This version fixes 3 low-severity vulnerabilities: - CVE-2019-1547: ECDSA remote timing attack - CVE-2019-1549: Fork Protection - CVE-2019-1563: Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey Patches were refreshed. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
		
			
				
	
	
		
			26 lines
		
	
	
		
			973 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			26 lines
		
	
	
		
			973 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
From 559fbff13af9ce2fbc0b9bc5727a7323e1db6217 Mon Sep 17 00:00:00 2001
 | 
						|
From: Eneas U de Queiroz <cote2004-github@yahoo.com>
 | 
						|
Date: Thu, 27 Sep 2018 08:29:21 -0300
 | 
						|
Subject: Do not use host kernel version to disable AFALG
 | 
						|
 | 
						|
This patch prevents the Configure script from using the host kernel
 | 
						|
version to disable building the AFALG engine on openwrt targets.
 | 
						|
 | 
						|
Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
 | 
						|
 | 
						|
diff --git a/Configure b/Configure
 | 
						|
index 5a699836f3..74d057c219 100755
 | 
						|
--- a/Configure
 | 
						|
+++ b/Configure
 | 
						|
@@ -1532,7 +1532,9 @@ unless ($disabled{"crypto-mdebug-backtrace"})
 | 
						|
 
 | 
						|
 unless ($disabled{afalgeng}) {
 | 
						|
     $config{afalgeng}="";
 | 
						|
-    if (grep { $_ eq 'afalgeng' } @{$target{enable}}) {
 | 
						|
+    if ($target =~ m/openwrt$/) {
 | 
						|
+        push @{$config{engdirs}}, "afalg";
 | 
						|
+    } elsif (grep { $_ eq 'afalgeng' } @{$target{enable}}) {
 | 
						|
         my $minver = 4*10000 + 1*100 + 0;
 | 
						|
         if ($config{CROSS_COMPILE} eq "") {
 | 
						|
             my $verstr = `uname -r`;
 |