OVMS3-idf/components/mbedtls/port/esp32
David Cermak 2efb3288a0 mbedtls: fix hw accelerated big-num mul if operand and result overlap
this issue is mainly exposed when using larger (4096) client key in TLS mutual auth,
since it uses multiplications > 2048 when mbedtls_mpi_mul_mpi is used in recursion,
which works only if both operands point to different location than result since
mpi_mult_mpi_overlong() called mbedtls_mpi_grow() to reallocate buffers used in previous
pointer arithmetics and thus corrupting it. Fixed by growing the mpi buffer before
calling mpi_mult_mpi_overlong()
2020-01-09 18:11:18 +00:00
..
aes.c mbedtls: Remove esp_aes_encrypt/decrypt 2019-09-13 09:44:07 +10:00
esp_bignum.c mbedtls: fix hw accelerated big-num mul if operand and result overlap 2020-01-09 18:11:18 +00:00
sha.c Fixed warnings for components driver, esp32 and mbedtls 2019-11-15 08:51:16 +00:00