[PATCH] openssl: use --cross-compile-prefix in Configure

2020-11-28 Thread Eneas U de Queiroz
ine option '-Qunused-arguments' Signed-off-by: Eneas U de Queiroz --- neheb, or anyone else affected, please test this patch to see if what I'm claiming is actually true. At least it does not appear to break compilation in my case ;-) Compile-tested using a Gentoo host, and mvebu

[PATCH v2] openssl: use --cross-compile-prefix in Configure

2020-11-28 Thread Eneas U de Queiroz
ine option '-Qunused-arguments' Signed-off-by: Eneas U de Queiroz --- neheb, or anyone else affected, please test this patch to see if what I'm claiming is actually true. At least it does not appear to break compilation in my case ;-) Compile-tested using a Gentoo host, and mvebu as tar

[RFC PATCH 2/2] wolfssl: compile with --enable-opensslall

2020-12-06 Thread Eneas U de Queiroz
This enables all OpenSSL API available. It is required to avoid some silent failures, such as when performing client certificate validation. Package size increases from 356.6K to 374.7K for arm_cortex-a9_vfpv3-d16. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/wolfssl/Makefile b

[RFC PATCH 0/2] wolfssl: build with --enable-opensslall

2020-12-06 Thread Eneas U de Queiroz
s somewhat misleading, since it is not a superset of opensslextra. Eneas [1] https://github.com/openwrt/packages/issues/14142 Eneas U de Queiroz (2): wolfssl: add lighty support, skip crypttests wolfssl: compile with --enable-opensslall package/libs/wolfss

[RFC PATCH 1/2] wolfssl: add lighty support, skip crypttests

2020-12-06 Thread Eneas U de Queiroz
Tnis adds the --enable-lighty option to configure, enabling the minimum API needed to run lighttpd, in the packages feed. Size increase is about 120 bytes for arm_cortex-a9_vfpv3-d16. While at it, speed up build by disabling crypt bench/test. Signed-off-by: Eneas U de Queiroz diff --git a

[PATCH ustream] ustream-openssl: fix bio memory leak

2020-12-09 Thread Eneas U de Queiroz
Using the patch by Pan Chen as inspiration, this avoids a memory leak by using a global BIO_METHOD pointer that doesn't ordinarily need to be freed. CC: Pan Chen Signed-off-by: Eneas U de Queiroz --- Run-tested with a WRT-3200ACM, running uclient_fetch and uhttpd. I have not run it

Re: [PATCH ustream] ustream-openssl: fix bio memory leak

2020-12-09 Thread Eneas U de Queiroz
On Wed, Dec 9, 2020 at 1:45 PM Petr Štetiar wrote: > > Eneas U de Queiroz [2020-12-09 13:06:45]: > > Hi, > > > Using the patch by Pan Chen as inspiration, this avoids a memory leak by > > using a global BIO_METHOD pointer that doesn't ordinarily need to be >

Re: [PATCH ustream] ustream-openssl: fix bio memory leak

2020-12-09 Thread Eneas U de Queiroz
On Wed, Dec 9, 2020 at 1:58 PM Daniel Golle wrote: > > On Wed, Dec 09, 2020 at 05:44:48PM +0100, Petr Štetiar wrote: > > Eneas U de Queiroz [2020-12-09 13:06:45]: > > > > Hi, > > > > > Using the patch by Pan Chen as inspiration, this avoids a memory

Re: [PATCH ustream] ustream-openssl: fix bio memory leak

2020-12-10 Thread Eneas U de Queiroz
Hi Petr On Wed, Dec 9, 2020 at 6:59 PM Petr Štetiar wrote: > > Eneas U de Queiroz [2020-12-09 14:39:06]: > > Hi, > > > So the answer to your question is because you only allocate the table if > > methods_ustream is NULL, and it will point to the created table then

Re: [PATCH ustream] ustream-openssl: fix bio memory leak

2020-12-10 Thread Eneas U de Queiroz
Hi Petr On Thu, Dec 10, 2020 at 12:57 PM Petr Štetiar wrote: > > After tackling BIO_free, my suggestion would be to determine where the > > method table variable should go, and where to call BIO_meth_new and > > BIO_meth_free. I would add it to a defined struct > > ustream_ssl_ctx--which is now

[PATCH] openssl: update to 1.1.1i

2020-12-11 Thread Eneas U de Queiroz
Fixes: CVE-2020-1971, defined as high severity, summarized as: NULL pointer deref in GENERAL_NAME_cmp function can lead to a DOS attack. Signed-off-by: Eneas U de Queiroz --- This was run-tested in a WRT-3200ACM diff --git a/package/libs/openssl/Makefile b/package/libs/openssl/Makefile index

[PATCH] wolfssl: Update to v4.6.0-stable

2020-12-29 Thread Eneas U de Queiroz
tions, size increases from 374.7K to 408.8K for arm_cortex_a9_vfpv3-d16. The ABI does not change from previous version. Backported patches were removed; remaining patch was refreshed. Signed-off-by: Eneas U de Queiroz --- Run-tested on a Linksys WRT3200ACM (arm) with uhttpd, uclient-fetch, and

Re: [PATCH] base-files: sysupgrade: store status of system-services

2021-01-11 Thread Eneas U de Queiroz
+1 I agree 100% with Adrian on this one. Enable by default, add option to disable. Disabled services are, intuitively, part of the configuration being saved. So, it should not be saved when '-n' is given. I may be stretching things a bit, but I would consider this a fix, not a feature change ;-

Re: Deprecate snort in favor of snort3

2021-01-31 Thread Eneas U de Queiroz
On Sun, Jan 31, 2021 at 3:45 PM W. Michael Petullo wrote: > > OpenWrt provides two snort packages: snort and snort3. Now that snort3 is > out of beta, I would like to consider deprecating the snort package. One > difficulty of maintaining both packages is that a different version of > the libdaq p

Re: [PATCH] kernel: DSA roaming fix for Marvell Link Street switch series

2021-02-15 Thread Eneas U de Queiroz
-1-tob...@waldekranz.com/ > Link: https://lore.kernel.org/netdev/20210130134334.10243-1-dqf...@gmail.com/ > Ref: https://gitlab.nic.cz/turris/turris-build/-/issues/165 > Signed-off-by: DENG Qingfang Tested-by: Eneas U de Queiroz I have tested this using WRT3200ACM, and it solves the problem

[PATCH] openssl: bump to 1.1.1j

2021-02-16 Thread Eneas U de Queiroz
are currently awaiting analysis. Signed-off-by: Eneas U de Queiroz --- This was run-tested on a WRT3200ACM (mvebu), using nginx, and wpad, and openssl-util. diff --git a/package/libs/openssl/Makefile b/package/libs/openssl/Makefile index 714ce2059a..4fb4cb2784 100644 --- a/package/libs/openssl

[PATCH] openssl: always build with GOST engine support

2021-02-17 Thread Eneas U de Queiroz
commit also includes a commented-out example engine configuration in openssl.cnf, as it is done for other available engines. Signed-off-by: Eneas U de Queiroz --- Run tested in WRT3200ACM (mvebu), with and without gost-engine 1.1.0.3. GOST engine PR: https://github.com/openwrt/packages/pull/14765

[PATCH] wolfssl: bump to v4.7.0-stable

2021-02-21 Thread Eneas U de Queiroz
Biggest fix for this version is CVE-2021-3336, which has already been applied here. There are a couple of low severity security bug fixes as well. Three patches are no longer needed, and were removed; the one remaining was refreshed. Signed-off-by: Eneas U de Queiroz --- This was run-tested

[PATCH] gmp: compile with -DPIC to use correct asm code

2021-03-11 Thread Eneas U de Queiroz
mpile with -fPIC Cc: Stijn Tintel Signed-off-by: Eneas U de Queiroz --- There's an error on one architecture, and all others work fine without this, so I'm uneasy changing this and then breaking stuff that was working fine otherwise. However, it feels wrong to me to generate PIC co

Re: [PATCH] gmp: compile with -DPIC to use correct asm code

2021-03-19 Thread Eneas U de Queiroz
On Fri, Mar 19, 2021 at 5:08 PM Philip Prindeville wrote: > > > Maybe I'm missing something, but why not just fix rules.mk: > > > ifneq (,$(findstring $(ARCH) , aarch64 aarch64_be powerpc )) > FPIC:=-fPIC > else > FPIC:=-fpic > endif > > HOST_FPIC:=-fPIC > > > To have the FPIC and HOST_FPIC de

Re: [PATCH] openssl: don't rename a file with quilt

2021-03-26 Thread Eneas U de Queiroz
Hi Rosen This patch does not apply as is, but don't write a v2 yet. I'm testing the bump to 1.1.1k, and I'll handle it from there, by using --no-renames with git format-patch. I'm maintaining the patches at https://github.com/cotequeiroz/openssl, and refreshing backports with git is much easier t

[PATCH] openssl: bump to 1.1.1k

2021-03-26 Thread Eneas U de Queiroz
a client. Signed-off-by: Eneas U de Queiroz --- This was run-tested on WRT3200ACM (mvebu, armv7), using nginx, and openssl util to encrypt & decrypt some files using software and the devcrypto engine, since there have been some changes in the engine, related to BSD compatibility, when opening

[RFC PATCH] openssl: make the patches QUILT-friendly

2021-03-26 Thread Eneas U de Queiroz
o-make-the-dev-crypto-engine-dynamic.patch. So, I've generated a new patch with 'git format-patch --no-renames', and then 'make package/openssl/{refresh,update}'. Signed-off-by: Eneas U de Queiroz --- While I really prefer to leave the git-formatted patches as they are

Re: [PATCH] openssl: don't rename a file with quilt

2021-03-26 Thread Eneas U de Queiroz
On Fri, Mar 26, 2021 at 4:28 PM Rosen Penev wrote: > > On Fri, Mar 26, 2021 at 5:55 AM Eneas U de Queiroz > wrote: > > > > On Fri, Mar 26, 2021 at 6:26 AM Rosen Penev wrote: > > > +ifeq ($(QUILT),) > > > + mv $(PKG_BUILD_DIR)/crypto/engine/eng_devc

Re: [PATCH] openssl: don't rename a file with quilt

2021-03-26 Thread Eneas U de Queiroz
On Fri, Mar 26, 2021 at 6:57 PM Felix Fietkau wrote: > I fully agree with Eneas here (though I don't like his patch for this > issue either). This is the first time I wrote a patch I do NOT want to be applied. I just want to keep the status quo. > Here's a way to fix this: > > include/package-d

Re: [RFC PATCH] openssl: make the patches QUILT-friendly

2021-03-26 Thread Eneas U de Queiroz
On Fri, Mar 26, 2021 at 7:35 PM Kevin 'ldir' Darbyshire-Bryant wrote: > > ... I was also frustrated that there was patch fuzz in the tree on a fairly > core package - that really shouldn’t be the case. My apologies. I work in a clone of the openssl git repo, rebasing the changes on top of the c

Re: OpenWrt 21.02-rc1

2021-04-07 Thread Eneas U de Queiroz
On Tue, Apr 6, 2021 at 7:30 PM Hauke Mehrtens wrote: > > Hi, > > How do we want to go forward with OpenWrt 21.02-rc1? > > * I think the base system is ok. > * The http (original wolfssl) problem reported by jow is fixed > * LuCI in the 21.02 branch still misses DSA support, this was merged > into

[OpenWrt-Devel] [PATCH] ustream-ssl: update to 2019-06-24

2019-06-24 Thread Eneas U de Queiroz
This adds chacha20-poly1305 support to the mbedtls variant. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/ustream-ssl/Makefile b/package/libs/ustream-ssl/Makefile index a15f3d8ab8..ca9ad5d98b 100644 --- a/package/libs/ustream-ssl/Makefile +++ b/package/libs/ustream-ssl/Makefile

[OpenWrt-Devel] [PATCH 1/3] wolfssl: update to 3.15.7, fix Makefile

2019-06-25 Thread Eneas U de Queiroz
This includes a fix for a medium-level potential cache attack with a variant of Bleichenbacher’s attack. Patches were refreshed. Fixed poly1305 build option, and made some Makefile updates. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/wolfssl/Config.in b/package/libs/wolfssl

[OpenWrt-Devel] [PATCH 0/3] wolfssl update

2019-06-25 Thread Eneas U de Queiroz
ed wolfssl options in hostapd. Eneas U de Queiroz (3): wolfssl: update to 3.15.7, fix Makefile wolfssl: reorganize, add build options hostapd: adjust removed wolfssl options package/libs/wolfssl/Config.in| 53 +--- package/libs/wolfssl/Makefile

[OpenWrt-Devel] [PATCH 3/3] hostapd: adjust removed wolfssl options

2019-06-25 Thread Eneas U de Queiroz
From: Eneas U de Queiroz This adjusts the selection of recently removed wolfssl options which have always been built into the library even in their absence. Also remove the selection of libwolfssl itself, allowing the library to be built as a module. Signed-off-by: Eneas U de Queiroz diff

[OpenWrt-Devel] [PATCH 2/3] wolfssl: reorganize, add build options

2019-06-25 Thread Eneas U de Queiroz
ort is selected. Add building options for TLS 1.0 and TLS 1.3. Add hardware crypto support, which due to a bug, only works when CCM support is turned off. Reorganized option conditionals in Makefile. Add Eneas U de Queiroz as maintainer. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs

[OpenWrt-Devel] [PATCH v2 0/3] wolfssl update

2019-07-01 Thread Eneas U de Queiroz
dents my confidence. Nonetheless, uhttpd connects without a problem, and I can confirm /dev/crypto or AF_ALG sockets open. The package currently lacks a maintainer, so I've added myself. -- Changelog: v1->v2: * Increased FP_MAX_BITS to allow 4096-bit RSA keys. * Update master to 4.0.0 Eneas

[OpenWrt-Devel] [PATCH v2 1/3] wolfssl: update to 3.15.7, fix Makefile

2019-07-01 Thread Eneas U de Queiroz
This includes a fix for a medium-level potential cache attack with a variant of Bleichenbacher’s attack. Patches were refreshed. Increased FP_MAX_BITS to allow 4096-bit RSA keys. Fixed poly1305 build option, and some Makefile updates. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs

[OpenWrt-Devel] [PATCH v2 3/3] hostapd: adjust removed wolfssl options

2019-07-01 Thread Eneas U de Queiroz
This edjusts the selection of recently removed wolfssl options which have always been built into the library even in their abscence. Also remove the selection of libwolfssl itself, allowing the library to be built as a module. Signed-off-by: Eneas U de Queiroz diff --git a/package/network

[OpenWrt-Devel] [PATCH v2 2/3] wolfssl: update to 4.0.0-stable

2019-07-01 Thread Eneas U de Queiroz
ort is selected. Add building options for TLS 1.0, and TLS 1.3. Add hardware crypto support, which due to a bug, only works when CCM support is turned off. Reorganized option conditionals in Makefile. Add Eneas U de Queiroz as maintainer. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs

[OpenWrt-Devel] [PATCH] wolfssl: fix PKG_HASH

2019-07-08 Thread Eneas U de Queiroz
Commit 3167a57 missed it. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/wolfssl/Makefile b/package/libs/wolfssl/Makefile index 7aaa562539..264be02496 100644 --- a/package/libs/wolfssl/Makefile +++ b/package/libs/wolfssl/Makefile @@ -13,7 +13,7 @@ PKG_RELEASE:=1 PKG_SOURCE

[OpenWrt-Devel] [PATCH 0/2] Remove eglibc remnants

2019-07-15 Thread Eneas U de Queiroz
I've found some remnants from eglibc, removed by 64da662 in Feb/2016. While at it, I stumbled upon a case statement with redundant commands, so I've simplified it as well. Eneas U de Queiroz (2): libs/toolchain: remove eglibc remnant file target/toolchain/files/wrapper.sh: simp

[OpenWrt-Devel] [PATCH 1/2] libs/toolchain: remove eglibc remnant file

2019-07-15 Thread Eneas U de Queiroz
This removes package/libs/toolchain/eglibc-files/etc/nsswitch.conf. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/toolchain/eglibc-files/etc/nsswitch.conf b/package/libs/toolchain/eglibc-files/etc/nsswitch.conf deleted file mode 100644 index 981c425da6..00 --- a/package

[OpenWrt-Devel] [PATCH 2/2] target/toolchain/files/wrapper.sh: simplify 'case'

2019-07-15 Thread Eneas U de Queiroz
Removed an eglibc remnant, and while at it, grouped all of the TOOLCHAIN_PLATFORMs using the same FLAGS together. Signed-off-by: Eneas U de Queiroz diff --git a/target/toolchain/files/wrapper.sh b/target/toolchain/files/wrapper.sh index 2b760840d8..4452128382 100755 --- a/target/toolchain

[OpenWrt-Devel] [PATCH 1/1] wolfssl: bump to 4.1.0-stable

2019-08-05 Thread Eneas U de Queiroz
operations. The leak is considered to be difficult to exploit but it could potentially be used maliciously to perform a lattice based timing attack. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/wolfssl/Config.in b/package/libs/wolfssl/Config.in index 875ff5e6a3..a729f73a1d 100644

[OpenWrt-Devel] [PATCH 0/1] wolfssl: bump to 4.1.0-stable

2019-08-05 Thread Eneas U de Queiroz
e compiled all packages that use wolfssl and found no issues with them. ustream-ssl actually defines HAVE_SNI, and I have done extensive runtime tests without any issues. 900-remove-broken-autoconf-macros.patch: this was fixed upstream, and the jobserver was disabled by ./configure --disable-jo

[OpenWrt-Devel] [19.07 PATCH] wolfssl: bump to 4.1.0-stable

2019-08-05 Thread Eneas U de Queiroz
TLS 1.0, and TLS 1.3. * Add hardware crypto support, which due to a bug, only works when CCM support is turned off. * Reorganized option conditionals in Makefile. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/wolfssl/Config.in b/package/libs/wolfssl/Config.in index 4aa163b361..a72

[OpenWrt-Devel] [RFC 18.06 PATCH 3/3] hostapd: bump wolfssl variants, adjust options

2019-08-05 Thread Eneas U de Queiroz
wolfssl changed ABI version, so this forces an update to hostapd. Some build options selected by hostapd are always built now, so they were removed. Signed-off-by: Eneas U de Queiroz diff --git a/package/network/services/hostapd/Config.in b/package/network/services/hostapd/Config.in index

[OpenWrt-Devel] [RFC 18.06 PATCH 2/3] ustream-ssl: bump wolfssl variant

2019-08-05 Thread Eneas U de Queiroz
wolfssl changed ABI version. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/ustream-ssl/Makefile b/package/libs/ustream-ssl/Makefile index 2ea5bf0bd5..c0fd281866 100644 --- a/package/libs/ustream-ssl/Makefile +++ b/package/libs/ustream-ssl/Makefile @@ -3,6 +3,15 @@ include

[OpenWrt-Devel] [RFC 18.06 PATCH 1/3] wolfssl: bump to 4.1.0-stable

2019-08-05 Thread Eneas U de Queiroz
TLS 1.0, and TLS 1.3. * Add AF_ALG hardware crypto support, which due to a bug, only works when CCM support is turned off. * Reorganized option conditionals in Makefile. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/wolfssl/Config.in b/package/libs/wolfssl/Config.in index 50

[OpenWrt-Devel] [RFC 18.06-alt PATCH 1/1] wolfssl: fixes for CVE-2018-16870 & CVE-2019-13628

2019-08-05 Thread Eneas U de Queiroz
. The leak is considered to be difficult to exploit but it could potentially be used maliciously to perform a lattice based timing attack. Backported from 4.1.0. Signed-off-by: Eneas U de Queiroz --- This is an alternative to updating 18.06 to 4.1.0, just backporting the patches. This has been

[OpenWrt-Devel] [PATCH 1/3] openssl: always build with EC support

2019-08-05 Thread Eneas U de Queiroz
Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/openssl/Config.in b/package/libs/openssl/Config.in index 63493829ba..d1281ec6fa 100644 --- a/package/libs/openssl/Config.in +++ b/package/libs/openssl/Config.in @@ -76,7 +76,6 @@ config OPENSSL_WITH_TLS13 bool default y

[OpenWrt-Devel] [PATCH 0/3] support EC keys in px5g/uhttpd

2019-08-05 Thread Eneas U de Queiroz
compatibility you wish to use. A P-256 EC key offers a strenght equivalent of 3072-bit RSA key, and is generated much faster than even a 2048-bit RSA key. uhttpd currently generates a 2048-bit RSA key by default, and that has not been changed. Eneas U de Queiroz (3): openssl: always build

[OpenWrt-Devel] [PATCH 2/3] px5g: support EC keys

2019-08-05 Thread Eneas U de Queiroz
d. Package size increased by about 900 bytes (arm). Signed-off-by: Eneas U de Queiroz diff --git a/package/utils/px5g/Makefile b/package/utils/px5g/Makefile index 7b5748425d..cfd1bfc80e 100644 --- a/package/utils/px5g/Makefile +++ b/package/utils/px5g/Makefile @@ -8,7 +8,7 @@ include $(

[OpenWrt-Devel] [PATCH 3/3] uhttpd: add support to generate EC keys

2019-08-05 Thread Eneas U de Queiroz
This adds the key_type and ec_curve options to enable the generation of EC keys during initialization, using openssl or the new options added to px5g. Signed-off-by: Eneas U de Queiroz diff --git a/package/network/services/uhttpd/Makefile b/package/network/services/uhttpd/Makefile index

[OpenWrt-Devel] [ustream-ssl PATCH 2/2] Revise supported ciphersuites

2019-08-05 Thread Eneas U de Queiroz
ed ciphers, so DHE-chacha and DHE-GCM were moved ahead of ECDHE-CBC. Signed-off-by: Eneas U de Queiroz --- If you use the intermediate compatibility list, you lose compatibility with Safari on iOS<=8 and OS X<=10.10. Windows XP will not work either, but since it is not compatible with EC k

[OpenWrt-Devel] [ustream-ssl PATCH 1/2] wolfssl, openssl: use TLS 1.3, set ciphersuites

2019-08-05 Thread Eneas U de Queiroz
: Eneas U de Queiroz diff --git a/ustream-openssl.c b/ustream-openssl.c index 7c72ce1..3810d6a 100644 --- a/ustream-openssl.c +++ b/ustream-openssl.c @@ -33,6 +33,21 @@ * aes128, aes256, 3DES(client only) */ +#ifdef WOLFSSL_SSL_H +# define top_ciphers

[OpenWrt-Devel] [PATCH ustream-ssl 1/2] ustream-io-cyassl.c: fix client-mode connections

2019-09-12 Thread Eneas U de Queiroz
aintaining backward compatibility. Signed-off-by: Eneas U de Queiroz --- This was tested on a WRT3200ACM running openwrt master, using uclient-fetch and uhttpd. I've also tested on x86_64 (not on openwrt, though) for compatibility with previous versions of wolfssl, so it _should_ be safe to use

[OpenWrt-Devel] [PATCH ustream-ssl 2/2] ustream-openssl.c: do CN validation with wolfssl

2019-09-12 Thread Eneas U de Queiroz
used, which should be good enough. Nonetheless, the call is being checked in CMakeLists.txt, just in case wolfssl build options change. Without CN validation, uclient-fetch will fail to run unless the --no-check-certificate option is used. Signed-off-by: Eneas U de Queiroz --- This was run-tested

[OpenWrt-Devel] [PATCH] wolfssl: allow building with hw-crytpo and AES-CCM

2019-09-12 Thread Eneas U de Queiroz
Hardware acceleration was disabled when AES-CCM was selected as a workaround for a build failure. This applies a couple of upstream patches fixing this. Signed-off-by: Eneas U de Queiroz --- This is the result of this upstream issue: https://github.com/wolfSSL/wolfssl/issues/2392 It was tested

[OpenWrt-Devel] [PATCH] openssl: bump to 1.1.1d

2019-09-17 Thread Eneas U de Queiroz
This version fixes 3 low-severity vulnerabilities: - CVE-2019-1547: ECDSA remote timing attack - CVE-2019-1549: Fork Protection - CVE-2019-1563: Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey Patches were refreshed. Signed-off-by: Eneas U de Queiroz -- Run

[OpenWrt-Devel] [PATCH 18.06] openssl: bump to 1.0.2t, add maintainer

2019-09-17 Thread Eneas U de Queiroz
This version fixes 3 low-severity vulnerabilities: - CVE-2019-1547: ECDSA remote timing attack - CVE-2019-1549: Fork Protection - CVE-2019-1563: Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey Patches were refreshed, and Eneas U de Queiroz added as maintainer

[OpenWrt-Devel] [PATCH lede-17.01] openssl: bump to 1.0.2t, Makefile updates

2019-09-17 Thread Eneas U de Queiroz
, and Eneas U de Queiroz added as maintainer. Signed-off-by: Eneas U de Queiroz diff --git a/package/libs/openssl/Makefile b/package/libs/openssl/Makefile index 60357604b1..3f8907cf17 100644 --- a/package/libs/openssl/Makefile +++ b/package/libs/openssl/Makefile @@ -9,7 +9,7 @@ include $(TOPDIR

[OpenWrt-Devel] [PATCH ustream-ssl v2 0/3] wolfssl updates

2019-09-18 Thread Eneas U de Queiroz
m the next commit on. Eneas -- Eneas U de Queiroz (3): Remove CyaSSL, WolfSSL < 3.10.4 support ustream-io-cyassl.c: fix client-mode connections wolfssl: enable CN validation CMakeLists.txt | 25 +++ ustream-internal.h | 3

[OpenWrt-Devel] [PATCH ustream-ssl v2 1/3] Remove CyaSSL, WolfSSL < 3.10.4 support

2019-09-18 Thread Eneas U de Queiroz
This updates the CyaSSL names to wolfSSL, and removes obsolete code to support old versions of the library < v3.10.4. Some #include statements were moved around, so that wolfssl/options.h is loaded before any other wolfssl/openssl header. Signed-off-by: Eneas U de Queiroz diff --gi

[OpenWrt-Devel] [PATCH ustream-ssl v2 3/3] wolfssl: enable CN validation

2019-09-18 Thread Eneas U de Queiroz
called, and 'valid_cert' will be true if that call suceeds and we have a peer certificate, just as it happens with openssl. Only 'valid_cn' will not be set. Signed-off-by: Eneas U de Queiroz diff --git a/CMakeLists.txt b/CMakeLists.txt index 6b3fc8c..86e1b07 100644 --- a/

[OpenWrt-Devel] [PATCH ustream-ssl v2 2/3] ustream-io-cyassl.c: fix client-mode connections

2019-09-18 Thread Eneas U de Queiroz
sts.txt to detect their presence. Otherwise, another call to ustream_set_io is done before creating the SSL session to properly set the callbacks. Signed-off-by: Eneas U de Queiroz diff --git a/CMakeLists.txt b/CMakeLists.txt index 3b557c3..6b3fc8c 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@

[OpenWrt-Devel] [PATCH ustream-ssl] Update example certificate & key, fix typo

2019-09-19 Thread Eneas U de Queiroz
The current crypto libraries will fail to load small RSA keys, so a new certificate was generated with a 2048-bit RSA key. Also fixed a typo in ustream-example-client.c Signed-off-by: Eneas U de Queiroz -- This is the output of 'openssl x509 -noout -text -in example.crt', with the

[OpenWrt-Devel] [PATCH] kernel: fix hw-crypto detection of qce driver

2019-09-20 Thread Eneas U de Queiroz
This adds the CRYPTO_ALG_KERN_DRIVER_ONLY flag to Qualcomm crypto engine driver algorithms, so that openssl devcrypto can recognize them as hardware-accelerated. Signed-off-by: Eneas U de Queiroz -- It was reported to me at the forum: https://forum.openwrt.org/t/comparing-cpu-soc-performance

[OpenWrt-Devel] [PATCH] ipq806x: remove unsupported hw-crypto qce driver

2019-09-25 Thread Eneas U de Queiroz
CONFIG_CRYPTO_GF128MUL was removed as well, since it is only needed by some cipher modes (LRW, GCM), none of which are selected, and it is packaged as a module. Signed-off-by: Eneas U de Queiroz -- > The upstream qce crypto driver does not support the IPQ806x series. > The ipq806x target used to host ipq40

[OpenWrt-Devel] [PATCH] ipq40xx: fix hw-crypto detection of qce driver

2019-09-25 Thread Eneas U de Queiroz
This adds the CRYPTO_ALG_KERN_DRIVER_ONLY flag to Qualcomm crypto engine driver algorithms, so that openssl devcrypto can recognize them as hardware-accelerated. Signed-off-by: Eneas U de Queiroz diff --git a/target/linux/ipq40xx/patches-4.14/181-crypto-qce-add-CRYPTO_ALG_KERN_DRIVER_ONLY

[OpenWrt-Devel] [PATCH] openssl: Add engine configuration to openssl.cnf

2019-10-01 Thread Eneas U de Queiroz
ation commands. Signed-off-by: Eneas U de Queiroz --- This should be cherry-picked to 19.07. Run-tested on WRT3200ACM without engines, and with devcrypto & afalg. diff --git a/package/libs/openssl/Makefile b/package/libs/openssl/Makefile index 28625bad05..eb267f31f0 100644 --- a/package/lib

[OpenWrt-Devel] [PATCH] hostapd: adjust to removal of WOLFSSL_HAS_AES_GCM

2019-10-07 Thread Eneas U de Queiroz
WolfSSL is always built with AES-GCM support now. Signed-off-by: Eneas U de Queiroz --- As for 19.07, it needs 94d131332b5adbcf885a92608c40a22b79b3c708 (hostapd: adjust removed wolfssl options) cherry-picked first, then this as well, since the wolfssl options were all removed in 19.07 too

[OpenWrt-Devel] [PATCH ustream-ssl] wolfssl: adjust to new API in v4.2.0

2019-10-29 Thread Eneas U de Queiroz
t_method" redefined [-Werror] Only define the symbols if not previously defined. Signed-off-by: Eneas U de Queiroz -- There are two CVEs with critical(CVSS 3.1)/high(CVSS2.0) base scores that have been fixed in wolfssl 4.2.0: CVE-2019-16748 & CVE-2019-15651. Before we can update wolfssl, thi

[OpenWrt-Devel] [PATCH] wolfssl: update to v4.2.0-stable

2019-11-06 Thread Eneas U de Queiroz
openwrt) - CVE-2019-15651: 1-byte overread when decoding certificate extensions - CVE-2019-16748: 1-byte overread when checking certificate signatures - DSA attack to recover DSA private keys Signed-off-by: Eneas U de Queiroz --- This was run-tested on WRT3200ACM, using uhttpdi, uclient-fetch, curl

[OpenWrt-Devel] [PATCH] kernel: add crypto_user mod to crypto-user pkg

2019-11-06 Thread Eneas U de Queiroz
This is needed to export crypto information to netfilter, allowing the alt. afalg openssl engine to obtain information about the drivers being used. Signed-off-by: Eneas U de Queiroz --- Tested on WRT3200ACM, running openrt master. For mvebu, this increases the package size from 17,097 to

[OpenWrt-Devel] [PATCH] wolfssl: bump to 4.3.0-stable

2019-12-26 Thread Eneas U de Queiroz
This update fixes many bugs, and six security vulnerabilities, including CVE-2019-18840. Signed-off-by: Eneas U de Queiroz -- Compile-tested all dependents, and run-tested with wpad, uhttpd, and curl on WRT3200ACM. There has been an issue with WPA3 and wolfssl. I am not able to test it, but I

[OpenWrt-Devel] [PATCH] curl: rename cyassl->wolfssl

2019-12-26 Thread Eneas U de Queiroz
The old name was dropped and no longer works. Signed-off-by: Eneas U de Queiroz -- While testing this with wolfssl, I noticed the package was built without TLS support. This was run-tested with wolfssl on WRT3200ACM diff --git a/package/network/utils/curl/Makefile b/package/network/utils/curl

[OpenWrt-Devel] [PATCH] cryptodev-linux: remove DEFAULT redefinition

2020-01-15 Thread Eneas U de Queiroz
The 'DEFAULT:=m if ALL' line prevents the phase1 buildbots from building the package, and users from downloading it, since they use 'ALL_KMODS=y' but 'ALL' is not set. Signed-off-by: Eneas U de Queiroz -- This was reported here: https://github.com/openwrt/package

Re: [PATCH] package: openssl: Enable built engines per default

2021-04-22 Thread Eneas U de Queiroz
On Thu, Apr 22, 2021 at 3:55 AM Daniel Danzberger wrote: > > Automatically enable an engine in the openssl.cnf if it has been build. > Before this change, /etc/openssl.cnf had to be edited manually on the > system to enable the engine. > > +define Package/libopenssl-conf/enable > + $(if $(C

Re: [PATCH] package: openssl: Enable built engines per default

2021-04-23 Thread Eneas U de Queiroz
On Fri, Apr 23, 2021 at 3:11 AM Florian Eckert wrote: > How about if we create a uci default script and check on the running > system what is installed? > And then we could generate a file and add or remove an include line form > the openssl.cnf [1]? Hi Florian, Daniel I think we can manage some

Re: [PATCH] package: openssl: Enable built engines per default

2021-04-27 Thread Eneas U de Queiroz
> >> How about if we create a uci default script and check on the running > >> system what is installed? > >> And then we could generate a file and add or remove an include line > >> form > >> the openssl.cnf [1]? > > > > I think we can manage something like that. The .include option can > > load

[PATCH 0/3] Engine configuration series

2021-04-28 Thread Eneas U de Queiroz
supported parameters is defined. After this is merged, I will adapt the two engines in the packages feed. Eneas U de Queiroz (3): openssl: config engines in /etc/ssl/engines.cnf.d openssl: configure engine packages during install openssl: configure engines with uci package/libs/openss

[PATCH 1/3] openssl: config engines in /etc/ssl/engines.cnf.d

2021-04-28 Thread Eneas U de Queiroz
. Signed-off-by: Eneas U de Queiroz --- package/libs/openssl/Makefile | 30 -- package/libs/openssl/files/afalg.cnf | 32 ++ package/libs/openssl/files/devcrypto.cnf | 31 ++ package/libs/openssl/files/engines.cnf| 7 ++ package/libs/openssl/files

[PATCH 2/3] openssl: configure engine packages during install

2021-04-28 Thread Eneas U de Queiroz
ut of tree engines as well. Signed-off-by: Eneas U de Queiroz --- package/libs/openssl/Makefile | 58 + package/libs/openssl/engine.mk| 82 +++ package/libs/openssl/files/engines.cnf| 12 +-- .../150-openssl.cnf-add-engines-conf.pat

[PATCH 3/3] openssl: configure engines with uci

2021-04-28 Thread Eneas U de Queiroz
lib/engines-1.1/%ENGINE%.so. The engine list is generated by an init script which is set to run after 'log' because it informs the engines being enabled or skipped. It should run before any service using OpenSSL as the crypto library, otherwise the service will not use any engine. Si

Re: [PATCH 3/3] openssl: configure engines with uci

2021-04-29 Thread Eneas U de Queiroz
Hi Florian On Thu, Apr 29, 2021 at 3:44 AM Florian Eckert wrote: > > $(if > > CONFIG_OPENSSL_ENGINE_BUILTIN_DEVCRYPTO,/etc/ssl/engines.cnf.d/devcrypto.cnf) > > $(if > > CONFIG_OPENSSL_ENGINE_BUILTIN_PADLOCK,/etc/ssl/engines.cnf.d/padlock.cnf) > > I think AFALG is missing there? > As I mentioned

[PATCH v2 0/3] Engine configuration series

2021-04-29 Thread Eneas U de Queiroz
les leftover from previous development versions Eneas U de Queiroz (3): openssl: config engines in /etc/ssl/engines.cnf.d openssl: configure engine packages during install openssl: configure engines with uci package/libs/openssl/Makefile | 55 +- package/libs/

[PATCH v2 3/3] openssl: configure engines with uci

2021-04-29 Thread Eneas U de Queiroz
lib/engines-1.1/%ENGINE%.so. The engine list is generated by an init script which is set to run after 'log' because it informs the engines being enabled or skipped. It should run before any service using OpenSSL as the crypto library, otherwise the service will not use any engine. Sign

[PATCH v2 1/3] openssl: config engines in /etc/ssl/engines.cnf.d

2021-04-29 Thread Eneas U de Queiroz
. Signed-off-by: Eneas U de Queiroz --- Changelog: v1->v2: unchanged package/libs/openssl/Makefile | 30 -- package/libs/openssl/files/afalg.cnf | 32 ++ package/libs/openssl/files/devcrypto.cnf | 31 ++ package/libs/openssl/files/engines.cnf|

[PATCH v2 2/3] openssl: configure engine packages during install

2021-04-29 Thread Eneas U de Queiroz
ut of tree engines as well. Signed-off-by: Eneas U de Queiroz --- Changelog: v1->v2: unchanged package/libs/openssl/Makefile | 58 + package/libs/openssl/engine.mk| 82 +++ package/libs/openssl/files/engines.cnf| 12 +-- .../15

[PATCH v3 0/3] Engine configuration series

2021-04-29 Thread Eneas U de Queiroz
ver from previous development versions v2->v3: - actually removed the extra files that I had promised in v2 Eneas U de Queiroz (3): openssl: config engines in /etc/ssl/engines.cnf.d openssl: configure engine packages during install openssl: configure engines with uci package/l

[PATCH v3 1/3] openssl: config engines in /etc/ssl/engines.cnf.d

2021-04-29 Thread Eneas U de Queiroz
. Signed-off-by: Eneas U de Queiroz --- Changelog: v1->v2: unchanged v2->v3: unchanged package/libs/openssl/Makefile | 30 -- package/libs/openssl/files/afalg.cnf | 32 ++ package/libs/openssl/files/devcrypto.cnf | 31 ++ package/libs/openssl

[PATCH v3 2/3] openssl: configure engine packages during install

2021-04-29 Thread Eneas U de Queiroz
ut of tree engines as well. Signed-off-by: Eneas U de Queiroz --- Changelog: v1->v2: unchanged v2->v3: unchanged package/libs/openssl/Makefile | 58 + package/libs/openssl/engine.mk| 82 +++ package/libs/openssl/files/engines

[PATCH v3 3/3] openssl: configure engines with uci

2021-04-29 Thread Eneas U de Queiroz
lib/engines-1.1/%ENGINE%.so. The engine list is generated by an init script which is set to run after 'log' because it informs the engines being enabled or skipped. It should run before any service using OpenSSL as the crypto library, otherwise the service will not use any engine. Sign

[PATCH 0/2] Bump WolfSSL and libtool

2021-07-22 Thread Eneas U de Queiroz
parison, there are 71 files changed, 17143 insertions(+), 5697 deletions(-), when going from 2.4 to 2.4.6. 3. Bump both to keep in sync with master. My vote: do 1 now, and wait for possible fallout from master. Then, perhaps try to keep them in sync, at the following point release. Chee

[PATCH 2/2] wolfssl: bump to v4.8.0-stable

2021-07-22 Thread Eneas U de Queiroz
resulting in a failed verification. Signed-off-by: Eneas U de Queiroz --- package/libs/wolfssl/Makefile | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/package/libs/wolfssl/Makefile b/package/libs/wolfssl/Makefile index 0c95288a2a..38c284ec5d 100644 --- a/package/libs

[PATCH 1/2] libtool: bump to 2.4.6

2021-07-22 Thread Eneas U de Queiroz
/host/bin/grep -F"} -+ : ${GREP="$STAGING_DIR/../host/bin/grep"} -+ : ${SED="$STAGING_DIR/../host/bin/sed"} -+else -+ : ${EGREP="@EGREP@"} -+ : ${FGREP="@FGREP@"} -+ : ${GREP="@GREP@"} -+ : ${SED="@SED@"} -+fi -

[PATCH v2 0/2] Bump WolfSSL and libtool

2021-07-28 Thread Eneas U de Queiroz
My vote: do 1 now, and wait for possible fallout from master. Then, perhaps try to keep them in sync, at the following point release. Cheers Eneas U de Queiroz (2): libtool: bump to 2.4.6 wolfssl: bump to v4.8.1-stable package/libs/wolfssl/Makefile | 6 +- .../patches/100-d

[PATCH v2 2/2] wolfssl: bump to v4.8.1-stable

2021-07-28 Thread Eneas U de Queiroz
: Eneas U de Queiroz --- package/libs/wolfssl/Makefile | 6 +++--- .../libs/wolfssl/patches/100-disable-hardening-check.patch | 2 +- package/libs/wolfssl/patches/200-ecc-rng.patch | 4 ++-- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a

[PATCH v2 1/2] libtool: bump to 2.4.6

2021-07-28 Thread Eneas U de Queiroz
/host/bin/grep -F"} -+ : ${GREP="$STAGING_DIR/../host/bin/grep"} -+ : ${SED="$STAGING_DIR/../host/bin/sed"} -+else -+ : ${EGREP="@EGREP@"} -+ : ${FGREP="@FGREP@"} -+ : ${GREP="@GREP@"} -+ : ${SED="@SED@"} -+fi -

[PATCH] ethtool: fix recursive dependency

2021-08-12 Thread Eneas U de Queiroz
Change the CONFLICTS definition from the alternative package (ethtool-full) to the main one. The CONFLICTS line creates a dependency to the conflicting package. Right now, the dependency would be created in the PACKAGE_ethtool-full symbol: config PACKAGE_ethtool-full depends on m || (PAC

[PATCH] download: improve handling of invalid local files

2021-08-20 Thread Eneas U de Queiroz
age is rebuilt even if it is not otherwise needed. To fix this, instead of always forcing the download target to be remade, check its hash first: if it matches, then the FORCE is not added. Signed-off-by: Eneas U de Queiroz --- include/download.mk | 17 +++-- include/host-build

[PATCH] openssl: bump to 1.1.1l

2021-08-26 Thread Eneas U de Queiroz
This version fixes two vulnerabilities: - SM2 Decryption Buffer Overflow (CVE-2021-3711) Severity: High - Read buffer overruns processing ASN.1 strings (CVE-2021-3712) Severity: Medium Signed-off-by: Eneas U de Queiroz --- package/libs/openssl/Makefile

  1   2   3   >