OVMS3-idf/components/mbedtls/port
David Cermak 7b495db118 mbedtls: fix hw accelerated big-num mul if operand and result overlap
this issue is mainly exposed when using larger (4096) client key in TLS mutual auth,
since it uses multiplications > 2048 when mbedtls_mpi_mul_mpi is used in recursion,
which works only if both operands point to different location than result since
mpi_mult_mpi_overlong() called mbedtls_mpi_grow() to reallocate buffers used in previous
pointer arithmetics and thus corrupting it. Fixed by growing the mpi buffer before
calling mpi_mult_mpi_overlong()
2020-02-20 10:06:28 +01:00
..
include Merge branch 'feature/mbedtls_mem_alloc_options' into 'master' 2018-09-25 08:24:29 +08:00
esp_bignum.c mbedtls: fix hw accelerated big-num mul if operand and result overlap 2020-02-20 10:06:28 +01:00
esp_hardware.c esp32: Add esp_fill_random() function 2018-09-03 04:39:45 +00:00
esp_mem.c mbedtls: configurable options for controlling dynamic memory allocations 2018-09-24 11:17:48 +05:30
esp_sha1.c mbedtls: update usage of deprecated mbedtls_shaX APIs 2018-05-09 23:15:28 +08:00
esp_sha256.c mbedtls: update usage of deprecated mbedtls_shaX APIs 2018-05-09 23:15:28 +08:00
esp_sha512.c mbedtls: update usage of deprecated mbedtls_shaX APIs 2018-05-09 23:15:28 +08:00
mbedtls_debug.c gcc8_newlib3: Compilation warnings and errors not specific to newlib v3 2018-07-09 13:22:24 +03:00
net_sockets.c Remove check for would_block in mbedtls 2019-10-18 14:18:34 +05:30