hostapd: wolfssl: add RNG to EC key
authorDavid Bauer <mail@david-bauer.net>
Wed, 5 May 2021 23:53:49 +0000 (01:53 +0200)
committerDavid Bauer <mail@david-bauer.net>
Mon, 21 Jun 2021 20:43:15 +0000 (22:43 +0200)
Since upstream commit 6467de5a8840 ("Randomize z ordinates in
scalar mult when timing resistant") WolfSSL requires a RNG for
the EC key when built hardened which is the default.

Set the RNG for the EC key to fix connections for OWE clients.

Signed-off-by: David Bauer <mail@david-bauer.net>
(cherry picked from commit ddcb970274c011d3db611ec39350ee4704ff0e02)

package/network/services/hostapd/Makefile
package/network/services/hostapd/patches/802-wolfssl-init-RNG-with-ECC-key.patch [new file with mode: 0644]

index bd2a7c96ad4c1d6788ed035d33af5a24814e8fbf..0779421b8d734e5ece0151501d13394512b2b7b1 100644 (file)
@@ -7,7 +7,7 @@
 include $(TOPDIR)/rules.mk
 
 PKG_NAME:=hostapd
-PKG_RELEASE:=32
+PKG_RELEASE:=33
 
 PKG_SOURCE_URL:=http://w1.fi/hostap.git
 PKG_SOURCE_PROTO:=git
diff --git a/package/network/services/hostapd/patches/802-wolfssl-init-RNG-with-ECC-key.patch b/package/network/services/hostapd/patches/802-wolfssl-init-RNG-with-ECC-key.patch
new file mode 100644 (file)
index 0000000..89d111e
--- /dev/null
@@ -0,0 +1,48 @@
+From 21ce83b4ae2b9563175fdb4fc4312096cc399cf8 Mon Sep 17 00:00:00 2001
+From: David Bauer <mail@david-bauer.net>
+Date: Wed, 5 May 2021 00:44:34 +0200
+Subject: [PATCH] wolfssl: add RNG to EC key
+
+Since upstream commit 6467de5a8840 ("Randomize z ordinates in
+scalar mult when timing resistant") WolfSSL requires a RNG for
+the EC key when built hardened which is the default.
+
+Set the RNG for the EC key to fix connections for OWE clients.
+
+Signed-off-by: David Bauer <mail@david-bauer.net>
+---
+ src/crypto/crypto_wolfssl.c | 4 ++++
+ 1 file changed, 4 insertions(+)
+
+diff --git a/src/crypto/crypto_wolfssl.c b/src/crypto/crypto_wolfssl.c
+index 2e4bf8962..ed2528159 100644
+--- a/src/crypto/crypto_wolfssl.c
++++ b/src/crypto/crypto_wolfssl.c
+@@ -1303,6 +1303,7 @@ int ecc_projective_add_point(ecc_point *P, ecc_point *Q, ecc_point *R,
+ struct crypto_ec {
+       ecc_key key;
++      WC_RNG rng;
+       mp_int a;
+       mp_int prime;
+       mp_int order;
+@@ -1357,6 +1358,8 @@ struct crypto_ec * crypto_ec_init(int group)
+               return NULL;
+       if (wc_ecc_init(&e->key) != 0 ||
++          wc_InitRng(&e->rng) != 0 ||
++          wc_ecc_set_rng(&e->key, &e->rng) != 0 ||
+           wc_ecc_set_curve(&e->key, 0, curve_id) != 0 ||
+           mp_init(&e->a) != MP_OKAY ||
+           mp_init(&e->prime) != MP_OKAY ||
+@@ -1388,6 +1391,7 @@ void crypto_ec_deinit(struct crypto_ec* e)
+       mp_clear(&e->order);
+       mp_clear(&e->prime);
+       mp_clear(&e->a);
++      wc_FreeRng(&e->rng);
+       wc_ecc_free(&e->key);
+       os_free(e);
+ }
+-- 
+2.31.1
+