[PATCH 0/3] Support TLS/SSL and WPA3-Personal/SAE by default
Petr Štetiar
ynezz at true.cz
Mon Jul 27 04:50:48 EDT 2020
Hauke Mehrtens <hauke at hauke-m.de> [2020-07-26 19:15:59]:
> How stable is the ABI of wolfssl?
I assume, that we're going to find the answer in the upcoming years :-)
Anyway, by looking purely at the Git log of hostapd it seems stable.
$ git log --pretty="%ci %s" src/crypto/*wolfssl*
2020-05-16 21:02:17 +0300 wolfssl: Fix crypto_bignum_rand() implementation
2020-05-16 21:01:51 +0300 wolfssl: Fix compiler warnings on size_t printf format use
2020-02-29 23:26:26 +0200 crypto: Add a function to get the ECDH prime length
2019-10-25 19:29:53 +0300 crypto: Remove unused crypto_bignum_sqrtmod()
2019-10-14 19:38:41 +0300 wolfSSL: Fix crypto_bignum_sub()
2019-10-14 19:38:41 +0300 crypto: Add more bignum/EC helper functions
2019-08-06 13:12:37 +0300 wolfssl: Avoid void pointer arithmetic
2019-05-26 16:11:56 +0300 More forceful clearing of stack memory with keys
2019-04-26 17:43:45 +0300 Remove unused crypto_bignum_bits()
2019-04-13 18:28:05 +0300 Remove the unused crypto_ec_cofactor() function
2019-04-09 16:24:38 +0300 Extend domain_match and domain_suffix_match to allow list of values
2019-04-09 16:24:38 +0300 wolfSSL: Fix dNSName matching with domain_match and domain_suffix_match
2019-03-16 18:52:09 +0200 Add support for an optional context parameter to TLS exporter
2019-03-11 14:09:45 +0200 OpenSSL: Add 'check_cert_subject' support for TLS server
2019-03-05 17:05:03 +0200 Add explicit checks for peer's DH public key
2018-12-31 12:51:51 +0200 hostapd: Add configuration option check_crl_strict
2018-12-30 17:21:55 +0200 OpenSSL: Add openssl_ecdh_curves parameter
2018-10-11 12:12:30 +0300 TLS: Add tls_connection_peer_serial_num()
2018-05-17 22:02:02 +0300 wolfSSL: Fix crypto_bignum_rshift() wrapper
2018-05-17 20:08:22 +0300 wolfSSL: DH initialization to call TEST_FAIL() for error tests
2018-05-17 20:08:15 +0300 wolfSSL: Fix ECDH set peer to use the index when importing point
2018-05-02 13:32:51 +0300 wolfSSL: Fix EAP-FAST key derivation
2018-05-02 13:32:51 +0300 wolfSSL: Do not free cert store after setting it
2018-05-02 13:32:51 +0300 wolfSSL: Fix OCSP ifdefs
2018-05-02 13:32:51 +0300 wolfSSL: Fix altSubjectName handling
2018-05-02 13:32:51 +0300 wolfSSL: Use defines from wolfssl/options.h
2018-05-02 13:32:51 +0300 wolfSSL: Use wolfSSL memory allocation in dh5_init()
2018-05-02 13:32:51 +0300 wolfSSL: Load certificates using 'chain' APIs
2018-05-02 13:32:51 +0300 wolfSSL: Changes for memory allocation failure testing
2018-05-02 13:32:51 +0300 wolfSSL: Fix crypto_hash_init() memory clearing
2018-05-02 13:32:51 +0300 wolfSSL: Fix crypto_ec_point_y_sqr()
2018-05-02 13:32:51 +0300 wolfSSL: Fix crypto_ec_point_solve_y_coord()
2018-05-02 13:32:49 +0300 wolfSSL: Add crypto_ecdh_*()
2018-05-02 12:04:46 +0300 wolfSSL: Use new digest namespace
2018-05-02 00:37:57 +0300 wolfSSL: Fix conditional EAP-FAST compilation issue
2018-03-03 11:52:40 +0200 Add support for wolfSSL cryptographic library
> We probably have to update it to new versions in the lifetime and then
> it would be nice if we only have to update the wolfssl package.
We're using stable release, so this should be doable.
> Is this also enough to make LUCI work with https when just luci is
> activated?
I didn't tried it yet, but I assume, that uhttpd uses libustream-wolfssl for
the TLS so it should work out of the box. As Daniel already pointed out, the
"only" missing bit is px5g-wolfssl for self-signed certificate generation.
-- ynezz
More information about the openwrt-devel
mailing list