mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2025-01-22 13:41:04 +00:00
Updated change description as suggested by @gilles-peskine-arm.
Signed-off-by: stroebeljc <stroebeljc1@gmail.com>
This commit is contained in:
parent
e67ba98581
commit
03ee3834a0
|
@ -1,5 +1,10 @@
|
||||||
Security
|
Security
|
||||||
* Fix a security reduction error that causes all bits of the nonce
|
* Fix a security reduction in CTR_DRBG when the initial seeding obtained a
|
||||||
to be zero in mbedtls_ctr_drbg_reseed_internal. This prevents
|
nonce from entropy. Applications were affected if they called
|
||||||
the security strength from reaching the level required by NIST.
|
mbedtls_ctr_drbg_set_nonce_len(), if they called
|
||||||
|
mbedtls_ctr_drbg_set_entropy_len() with a size that was 3/2 times the key
|
||||||
|
length, or when the entropy module uses SHA-256 and CTR_DRBG uses AES-256.
|
||||||
|
In such cases, a random nonce was necessary to achieve the advertised
|
||||||
|
security strength, but the code incorrectly used a constant instead of
|
||||||
|
entropy from the nonce.
|
||||||
Found by John Stroebel in #3819 and fixed in #3973.
|
Found by John Stroebel in #3819 and fixed in #3973.
|
||||||
|
|
Loading…
Reference in a new issue