OVMS3-idf/components/mbedtls/port
David Cermak f8fc84813c mbedtls: fix hw accelerated big-num mul if operand and result overlap
this issue is mainly exposed when using larger (4096) client key in TLS mutual auth,
since it uses multiplications > 2048 when mbedtls_mpi_mul_mpi is used in recursion,
which works only if both operands point to different location than result since
mpi_mult_mpi_overlong() called mbedtls_mpi_grow() to reallocate buffers used in previous
pointer arithmetics and thus corrupting it. Fixed by growing the mpi buffer before
calling mpi_mult_mpi_overlong()
2020-02-20 10:03:00 +01:00
..
esp32 Fixed warnings for components driver, esp32 and mbedtls 2019-11-19 15:02:02 +05:30
include NimBLE: Add optional mbedTLS support to NimBLE (backport) 2019-09-23 21:37:40 +08:00
esp_bignum.c mbedtls: fix hw accelerated big-num mul if operand and result overlap 2020-02-20 10:03:00 +01:00
esp_hardware.c mbedtls: import mbedtls project w/o modification 2018-11-27 13:59:26 +08:00
esp_mem.c mbedtls: import mbedtls project w/o modification 2018-11-27 13:59:26 +08:00
esp_sha.c esp32: Rewrite esp_sha function 2019-05-13 12:32:45 +08:00
esp_sha1.c move hwcrypto from esp32 to mbedtls 2019-03-26 16:24:22 +08:00
esp_sha256.c move hwcrypto from esp32 to mbedtls 2019-03-26 16:24:22 +08:00
esp_sha512.c move hwcrypto from esp32 to mbedtls 2019-03-26 16:24:22 +08:00
mbedtls_debug.c mbedtls: import mbedtls project w/o modification 2018-11-27 13:59:26 +08:00
net_sockets.c Remove check for would_block in mbedtls 2019-12-04 17:28:15 +05:30