mirror of
https://github.com/openwrt/openwrt.git
synced 2025-01-07 14:28:50 +00:00
31bb27f35b
This is amalgamation of backported changes since 4.7.0-stable release: Sergey V. Lobanov (2):5b13b0b02c
wolfssl: update to 5.1.1-stable7d376e6e52
libs/wolfssl: add SAN (Subject Alternative Name) support Andre Heider (3):3f8adcb215
wolfssl: remove --enable-sha512 configure switch249478ec48
wolfssl: always build with --enable-reproducible-build4b212b1306
wolfssl: build with WOLFSSL_ALT_CERT_CHAINS Ivan Pavlov (1):16414718f9
wolfssl: update to 4.8.1-stable David Bauer (1):f6d8c0cf2b
wolfssl: always export wc_ecc_set_rng Christian Lamparter (1):86801bd3d8
wolfssl: fix Ed25519 typo in config prompt The diff of security related changes we would need to backport would be so huge, that there would be a high probability of introducing new vulnerabilities, so it was decided, that bumping to latest stable release is the prefered way for fixing following security issues: * OCSP request/response verification issue. (fixed in 4.8.0) * Incorrectly skips OCSP verification in certain situations CVE-2021-38597 (fixed in 4.8.1) * Issue with incorrectly validating a certificate (fixed in 5.0.0) * Hang with DSA signature creation when a specific q value is used (fixed in 5.0.0) * Client side session resumption issue (fixed in 5.1.0) * Potential for DoS attack on a wolfSSL client CVE-2021-44718 (fixed in 5.1.0) * Non-random IV values in certain situations CVE-2022-23408 (fixed in 5.1.1) Cc: Hauke Mehrtens <hauke@hauke-m.de> Cc: Eneas U de Queiroz <cotequeiroz@gmail.com> Signed-off-by: Petr Štetiar <ynezz@true.cz> Acked-by: Hauke Mehrtens <hauke@hauke-m.de> Acked-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
81 lines
1.5 KiB
Plaintext
81 lines
1.5 KiB
Plaintext
if PACKAGE_libwolfssl
|
|
|
|
config WOLFSSL_HAS_AES_CCM
|
|
bool "Include AES-CCM support"
|
|
default y
|
|
|
|
config WOLFSSL_HAS_CHACHA_POLY
|
|
bool "Include ChaCha20-Poly1305 cipher suite support"
|
|
default y
|
|
|
|
config WOLFSSL_HAS_DH
|
|
bool "Include DH (Diffie-Hellman) support"
|
|
default y
|
|
|
|
config WOLFSSL_HAS_ARC4
|
|
bool "Include ARC4 support"
|
|
default y
|
|
|
|
config WOLFSSL_HAS_TLSV10
|
|
bool "Include TLS 1.0 support"
|
|
default y
|
|
|
|
config WOLFSSL_HAS_TLSV13
|
|
bool "Include TLS 1.3 support"
|
|
default y
|
|
|
|
config WOLFSSL_HAS_SESSION_TICKET
|
|
bool "Include session ticket support"
|
|
default y
|
|
|
|
config WOLFSSL_HAS_DTLS
|
|
bool "Include DTLS support"
|
|
default n
|
|
|
|
config WOLFSSL_HAS_OCSP
|
|
bool "Include OSCP stapling support"
|
|
default y
|
|
|
|
config WOLFSSL_HAS_WPAS
|
|
bool "Include wpa_supplicant support"
|
|
select WOLFSSL_HAS_ARC4
|
|
select WOLFSSL_HAS_OCSP
|
|
select WOLFSSL_HAS_SESSION_TICKET
|
|
default y
|
|
|
|
config WOLFSSL_HAS_ECC25519
|
|
bool "Include ECC Curve 25519 support"
|
|
default n
|
|
|
|
config WOLFSSL_ALT_NAMES
|
|
bool "Include SAN (Subject Alternative Name) support"
|
|
default y
|
|
|
|
config WOLFSSL_HAS_DEVCRYPTO
|
|
bool
|
|
|
|
choice
|
|
prompt "Hardware Acceleration"
|
|
default WOLFSSL_HAS_NO_HW
|
|
|
|
config WOLFSSL_HAS_NO_HW
|
|
bool "None"
|
|
|
|
config WOLFSSL_HAS_AFALG
|
|
bool "AF_ALG"
|
|
|
|
config WOLFSSL_HAS_DEVCRYPTO_CBC
|
|
bool "/dev/crytpo - AES-CBC-only"
|
|
select WOLFSSL_HAS_DEVCRYPTO
|
|
|
|
config WOLFSSL_HAS_DEVCRYPTO_AES
|
|
bool "/dev/crypto - AES-only (all supported modes)"
|
|
select WOLFSSL_HAS_DEVCRYPTO
|
|
|
|
config WOLFSSL_HAS_DEVCRYPTO_FULL
|
|
bool "/dev/crypto - full"
|
|
select WOLFSSL_HAS_DEVCRYPTO
|
|
endchoice
|
|
|
|
endif
|