esp-idf/components/mbedtls
David Cermak fe94d07dfe mbedtls: fix hw accelerated big-num mul if operand and result overlap
this issue is mainly exposed when using larger (4096) client key in TLS mutual auth,
since it uses multiplications > 2048 when mbedtls_mpi_mul_mpi is used in recursion,
which works only if both operands point to different location than result since
mpi_mult_mpi_overlong() called mbedtls_mpi_grow() to reallocate buffers used in previous
pointer arithmetics and thus corrupting it. Fixed by growing the mpi buffer before
calling mpi_mult_mpi_overlong()
2020-02-20 11:50:46 +01:00
..
mbedtls@b9ada30675 mbedtls: update to 2.12.0 2018-08-05 09:17:40 +03:00
port mbedtls: fix hw accelerated big-num mul if operand and result overlap 2020-02-20 11:50:46 +01:00
test mbedtls: added mpi multiplication test for large numbers 2020-02-20 10:06:58 +01:00
CMakeLists.txt cmake: make main a component again 2018-09-13 11:13:27 +08:00
component.mk mbedtls: Add mbedtls submodule check to build system 2018-05-14 16:07:18 +08:00
Kconfig mbedtls: Remove "unsafe" warning, enable AES by default & make SHA/MPI optional 2017-08-25 16:08:03 +10:00
Makefile.projbuild mbedtls: enable deprecation warnings when building unit tests 2018-05-09 23:15:28 +08:00