OVMS3-idf/components/mbedtls
David Cermak 2efb3288a0 mbedtls: fix hw accelerated big-num mul if operand and result overlap
this issue is mainly exposed when using larger (4096) client key in TLS mutual auth,
since it uses multiplications > 2048 when mbedtls_mpi_mul_mpi is used in recursion,
which works only if both operands point to different location than result since
mpi_mult_mpi_overlong() called mbedtls_mpi_grow() to reallocate buffers used in previous
pointer arithmetics and thus corrupting it. Fixed by growing the mpi buffer before
calling mpi_mult_mpi_overlong()
2020-01-09 18:11:18 +00:00
..
mbedtls@f5f2e5926c NimBLE: Add optional mbedTLS support to NimBLE 2019-09-30 14:15:43 +08:00
port mbedtls: fix hw accelerated big-num mul if operand and result overlap 2020-01-09 18:11:18 +00:00
test mbedtls: added mpi multiplication test for large numbers 2020-01-09 18:11:18 +00:00
CMakeLists.txt build system: Remove some dependencies from esp32 & esp32s2beta 2020-01-08 18:13:12 +11:00
component.mk build and link hello-world for esp32s2beta 2019-06-11 13:07:37 +08:00
Kconfig hw crypto: activated hardware acceleration for esp32s2beta 2019-12-12 12:37:29 +08:00
Makefile.projbuild esp32, mbedtls: check component name when enabling test flags 2018-11-20 01:27:24 +08:00