7bc8f03844
Fixes: CVE-2015-5291 - Remote attack on clients using session tickets or SNI Also includes countermeasures against Lenstra's RSA-CRT attach for PKCS#1 v1.5 signatures (1.2.16) and the Logjam attack (1.2.15). Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Reviewed-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Tested-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
30 lines
970 B
Makefile
30 lines
970 B
Makefile
################################################################################
|
|
#
|
|
# polarssl
|
|
#
|
|
################################################################################
|
|
|
|
POLARSSL_SITE = https://tls.mbed.org/code/releases
|
|
POLARSSL_VERSION = 1.2.17
|
|
POLARSSL_SOURCE = polarssl-$(POLARSSL_VERSION)-gpl.tgz
|
|
POLARSSL_CONF_OPTS = \
|
|
-DENABLE_PROGRAMS=$(if $(BR2_PACKAGE_POLARSSL_PROGRAMS),ON,OFF)
|
|
|
|
POLARSSL_INSTALL_STAGING = YES
|
|
POLARSSL_LICENSE = GPLv2
|
|
POLARSSL_LICENSE_FILES = LICENSE
|
|
|
|
define POLARSSL_DISABLE_ASM
|
|
$(SED) '/^#define POLARSSL_HAVE_ASM/d' $(@D)/include/polarssl/config.h
|
|
endef
|
|
|
|
# ARM in thumb mode breaks debugging with asm optimizations
|
|
# Microblaze asm optimizations are broken in general
|
|
ifeq ($(BR2_ENABLE_DEBUG)$(BR2_ARM_INSTRUCTIONS_THUMB)$(BR2_ARM_INSTRUCTIONS_THUMB2),yy)
|
|
POLARSSL_POST_CONFIGURE_HOOKS += POLARSSL_DISABLE_ASM
|
|
else ifeq ($(BR2_microblaze),y)
|
|
POLARSSL_POST_CONFIGURE_HOOKS += POLARSSL_DISABLE_ASM
|
|
endif
|
|
|
|
$(eval $(cmake-package))
|