diff options
author | Chunrong Guo <chunrong.guo@nxp.com> | 2017-04-18 12:18:44 +0800 |
---|---|---|
committer | Otavio Salvador <otavio@ossystems.com.br> | 2017-05-02 17:54:58 -0300 |
commit | cfb3ddaaaa78204ef5281c8627eed08f4f7e3f09 (patch) | |
tree | eed52994eb5c9abb844439aefa9faa2328c6b451 /recipes-connectivity/openssl/openssl-qoriq/qoriq/0009-RSA-Keygen-Fix.patch | |
parent | 6e3cc428cfe8c50f38e37161e52a0e63d1f13367 (diff) | |
download | meta-freescale-cfb3ddaaaa78204ef5281c8627eed08f4f7e3f09.tar.gz |
openssl-qoriq: upgrade to 1.0.2k
Signed-off-by: Chunrong Guo <B40290@freescale.com>
Signed-off-by: Otavio Salvador <otavio@ossystems.com.br>
Diffstat (limited to 'recipes-connectivity/openssl/openssl-qoriq/qoriq/0009-RSA-Keygen-Fix.patch')
-rw-r--r-- | recipes-connectivity/openssl/openssl-qoriq/qoriq/0009-RSA-Keygen-Fix.patch | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/recipes-connectivity/openssl/openssl-qoriq/qoriq/0009-RSA-Keygen-Fix.patch b/recipes-connectivity/openssl/openssl-qoriq/qoriq/0009-RSA-Keygen-Fix.patch index d4cd02fd..faa1690b 100644 --- a/recipes-connectivity/openssl/openssl-qoriq/qoriq/0009-RSA-Keygen-Fix.patch +++ b/recipes-connectivity/openssl/openssl-qoriq/qoriq/0009-RSA-Keygen-Fix.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From ca7adb9cf57497d27136a599531ea5b9671876c7 Mon Sep 17 00:00:00 2001 | 1 | From b3726ca2b823fe2a4c675b750e6f96d4a03ce93c Mon Sep 17 00:00:00 2001 |
2 | From: Yashpal Dutta <yashpal.dutta@freescale.com> | 2 | From: Yashpal Dutta <yashpal.dutta@freescale.com> |
3 | Date: Wed, 16 Apr 2014 22:53:04 +0545 | 3 | Date: Wed, 16 Apr 2014 22:53:04 +0545 |
4 | Subject: [PATCH 09/48] RSA Keygen Fix | 4 | Subject: [PATCH 09/48] RSA Keygen Fix |
@@ -16,10 +16,10 @@ Tested-by: Cristian Stoica <cristian.stoica@freescale.com> | |||
16 | 1 file changed, 7 insertions(+), 5 deletions(-) | 16 | 1 file changed, 7 insertions(+), 5 deletions(-) |
17 | 17 | ||
18 | diff --git a/crypto/engine/eng_cryptodev.c b/crypto/engine/eng_cryptodev.c | 18 | diff --git a/crypto/engine/eng_cryptodev.c b/crypto/engine/eng_cryptodev.c |
19 | index 44017a3..eac5fb6 100644 | 19 | index 8c9ad5c..3686c23 100644 |
20 | --- a/crypto/engine/eng_cryptodev.c | 20 | --- a/crypto/engine/eng_cryptodev.c |
21 | +++ b/crypto/engine/eng_cryptodev.c | 21 | +++ b/crypto/engine/eng_cryptodev.c |
22 | @@ -2018,7 +2018,7 @@ static int cryptodev_rsa_keygen(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) | 22 | @@ -2031,7 +2031,7 @@ static int cryptodev_rsa_keygen(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) |
23 | int i; | 23 | int i; |
24 | 24 | ||
25 | if ((fd = get_asym_dev_crypto()) < 0) | 25 | if ((fd = get_asym_dev_crypto()) < 0) |
@@ -28,7 +28,7 @@ index 44017a3..eac5fb6 100644 | |||
28 | 28 | ||
29 | if (!rsa->n && ((rsa->n = BN_new()) == NULL)) | 29 | if (!rsa->n && ((rsa->n = BN_new()) == NULL)) |
30 | goto err; | 30 | goto err; |
31 | @@ -2047,7 +2047,7 @@ static int cryptodev_rsa_keygen(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) | 31 | @@ -2060,7 +2060,7 @@ static int cryptodev_rsa_keygen(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) |
32 | /* p length */ | 32 | /* p length */ |
33 | kop.crk_param[kop.crk_iparams].crp_p = calloc(p_len + 1, sizeof(char)); | 33 | kop.crk_param[kop.crk_iparams].crp_p = calloc(p_len + 1, sizeof(char)); |
34 | if (!kop.crk_param[kop.crk_iparams].crp_p) | 34 | if (!kop.crk_param[kop.crk_iparams].crp_p) |
@@ -37,7 +37,7 @@ index 44017a3..eac5fb6 100644 | |||
37 | kop.crk_param[kop.crk_iparams].crp_nbits = p_len * 8; | 37 | kop.crk_param[kop.crk_iparams].crp_nbits = p_len * 8; |
38 | memset(kop.crk_param[kop.crk_iparams].crp_p, 0xff, p_len + 1); | 38 | memset(kop.crk_param[kop.crk_iparams].crp_p, 0xff, p_len + 1); |
39 | kop.crk_iparams++; | 39 | kop.crk_iparams++; |
40 | @@ -2055,7 +2055,7 @@ static int cryptodev_rsa_keygen(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) | 40 | @@ -2068,7 +2068,7 @@ static int cryptodev_rsa_keygen(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) |
41 | /* q length */ | 41 | /* q length */ |
42 | kop.crk_param[kop.crk_iparams].crp_p = calloc(q_len + 1, sizeof(char)); | 42 | kop.crk_param[kop.crk_iparams].crp_p = calloc(q_len + 1, sizeof(char)); |
43 | if (!kop.crk_param[kop.crk_iparams].crp_p) | 43 | if (!kop.crk_param[kop.crk_iparams].crp_p) |
@@ -46,7 +46,7 @@ index 44017a3..eac5fb6 100644 | |||
46 | kop.crk_param[kop.crk_iparams].crp_nbits = q_len * 8; | 46 | kop.crk_param[kop.crk_iparams].crp_nbits = q_len * 8; |
47 | memset(kop.crk_param[kop.crk_iparams].crp_p, 0xff, q_len + 1); | 47 | memset(kop.crk_param[kop.crk_iparams].crp_p, 0xff, q_len + 1); |
48 | kop.crk_iparams++; | 48 | kop.crk_iparams++; |
49 | @@ -2115,8 +2115,10 @@ static int cryptodev_rsa_keygen(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) | 49 | @@ -2128,8 +2128,10 @@ static int cryptodev_rsa_keygen(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) |
50 | } | 50 | } |
51 | sw_try: | 51 | sw_try: |
52 | { | 52 | { |
@@ -60,5 +60,5 @@ index 44017a3..eac5fb6 100644 | |||
60 | return ret; | 60 | return ret; |
61 | 61 | ||
62 | -- | 62 | -- |
63 | 2.7.0 | 63 | 2.7.3 |
64 | 64 | ||