Eneas U de Queiroz 9ce6aa9d8d wolfssl: bump to 5.2.0
Fixes two high-severity vulnerabilities:

- CVE-2022-25640: A TLS v1.3 server who requires mutual authentication
  can be bypassed.  If a malicious client does not send the
  certificate_verify message a client can connect without presenting a
  certificate even if the server requires one.

- CVE-2022-25638: A TLS v1.3 client attempting to authenticate a TLS
  v1.3 server can have its certificate heck bypassed. If the sig_algo in
  the certificate_verify message is different than the certificate
  message checking may be bypassed.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
Signed-off-by: Petr Štetiar <ynezz@true.cz> [ABI version change]
(cherry picked from commit e89f3e85eb1c1d81294e5d430a91b0ba625e2ec0)
(cherry picked from commit 2393b09b5906014047a14a79c03292429afcf408)
2022-04-16 15:13:32 +02:00
..
2019-09-04 13:42:02 +02:00
2019-01-24 10:39:30 +01:00
2019-05-17 21:41:43 +02:00
2019-11-01 14:22:37 +00:00
2019-01-24 10:39:30 +01:00
2019-09-04 13:46:01 +02:00
2019-01-24 10:39:30 +01:00
2019-01-24 10:39:30 +01:00
2019-01-24 10:39:30 +01:00
2019-09-04 13:37:38 +02:00
2020-07-04 21:10:18 +02:00
2022-03-16 16:34:26 +01:00
2019-02-26 23:20:04 +01:00
2019-10-19 14:30:00 +02:00
2020-06-17 22:22:25 +02:00
2022-04-16 15:13:32 +02:00