uftp: upgrade 4.10.1 -> 4.10.2

This includes:

Version 4.10.2
  Fixed security issue where using sha384 or sha512 would set encryption keys
    to all bytes 0
  When using ECDH key exchange with closed group membership, an incorrect
    signature would be applied to the ANNOUCE message, causing the session
    to fail.  Bug fixes.
  Relaxed server side checks on the type of key supplied by a client when not
    using public key signatures on all messages.  This will assist in the
    upgrade process to the upcoming version 5.0.
  Fixed various small memory leaks

Signed-off-by: Pierre-Jean Texier <pjtexier@koncepto.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
This commit is contained in:
Pierre-Jean Texier 2020-04-12 20:08:25 +02:00 committed by Khem Raj
parent b069fb8442
commit 3efeab289c

View File

@ -7,8 +7,8 @@ LIC_FILES_CHKSUM = "file://LICENSE.txt;md5=d32239bcb673463ab874e80d47fae504"
UPSTREAM_CHECK_URI = "https://sourceforge.net/projects/uftp-multicast/files/source-tar/"
SRC_URI = "${SOURCEFORGE_MIRROR}/uftp-multicast/source-tar/uftp-${PV}.tar.gz"
SRC_URI[md5sum] = "a5c79c8e5a20d0646c9579fe1f339493"
SRC_URI[sha256sum] = "903353febf1b88f701198d956a60cec3d2be3cc251561a678061761aec6622f6"
SRC_URI[md5sum] = "db0519bf7b1e0329449e81c1e68262f8"
SRC_URI[sha256sum] = "ecab6ab07fe0ebaf7bfe35d99fe2da28ede3ddc6f21f825d3b259cf171258505"
DEPENDS = "openssl"