mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2025-05-20 21:32:12 +00:00
commit
72388387c0
|
@ -32,6 +32,10 @@ Bugfix
|
||||||
* Fix documentation and implementation missmatch for function arguments of
|
* Fix documentation and implementation missmatch for function arguments of
|
||||||
mbedtls_gcm_finish(). Found by cmiatpaar. #602
|
mbedtls_gcm_finish(). Found by cmiatpaar. #602
|
||||||
* Guarantee that P>Q at RSA key generation. Found by inestlerode. #558
|
* Guarantee that P>Q at RSA key generation. Found by inestlerode. #558
|
||||||
|
* Fix missing return code check after call to mbedtls_md_setup() that could
|
||||||
|
result in usage of invalid md_ctx in mbedtls_rsa_rsaes_oaep_encrypt(),
|
||||||
|
mbedtls_rsa_rsaes_oaep_decrypt(), mbedtls_rsa_rsassa_pss_sign() and
|
||||||
|
mbedtls_rsa_rsassa_pss_verify_ext(). Fixed by Brian J. Murray.
|
||||||
|
|
||||||
= mbed TLS 2.1.5 branch released 2016-06-28
|
= mbed TLS 2.1.5 branch released 2016-06-28
|
||||||
|
|
||||||
|
|
|
@ -551,7 +551,11 @@ int mbedtls_rsa_rsaes_oaep_encrypt( mbedtls_rsa_context *ctx,
|
||||||
memcpy( p, input, ilen );
|
memcpy( p, input, ilen );
|
||||||
|
|
||||||
mbedtls_md_init( &md_ctx );
|
mbedtls_md_init( &md_ctx );
|
||||||
mbedtls_md_setup( &md_ctx, md_info, 0 );
|
if( ( ret = mbedtls_md_setup( &md_ctx, md_info, 0 ) ) != 0 )
|
||||||
|
{
|
||||||
|
mbedtls_md_free( &md_ctx );
|
||||||
|
return( ret );
|
||||||
|
}
|
||||||
|
|
||||||
// maskedDB: Apply dbMask to DB
|
// maskedDB: Apply dbMask to DB
|
||||||
//
|
//
|
||||||
|
@ -726,7 +730,12 @@ int mbedtls_rsa_rsaes_oaep_decrypt( mbedtls_rsa_context *ctx,
|
||||||
* Unmask data and generate lHash
|
* Unmask data and generate lHash
|
||||||
*/
|
*/
|
||||||
mbedtls_md_init( &md_ctx );
|
mbedtls_md_init( &md_ctx );
|
||||||
mbedtls_md_setup( &md_ctx, md_info, 0 );
|
if( ( ret = mbedtls_md_setup( &md_ctx, md_info, 0 ) ) != 0 )
|
||||||
|
{
|
||||||
|
mbedtls_md_free( &md_ctx );
|
||||||
|
return( ret );
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Generate lHash */
|
/* Generate lHash */
|
||||||
mbedtls_md( md_info, label, label_len, lhash );
|
mbedtls_md( md_info, label, label_len, lhash );
|
||||||
|
@ -972,7 +981,11 @@ int mbedtls_rsa_rsassa_pss_sign( mbedtls_rsa_context *ctx,
|
||||||
p += slen;
|
p += slen;
|
||||||
|
|
||||||
mbedtls_md_init( &md_ctx );
|
mbedtls_md_init( &md_ctx );
|
||||||
mbedtls_md_setup( &md_ctx, md_info, 0 );
|
if( ( ret = mbedtls_md_setup( &md_ctx, md_info, 0 ) ) != 0 )
|
||||||
|
{
|
||||||
|
mbedtls_md_free( &md_ctx );
|
||||||
|
return( ret );
|
||||||
|
}
|
||||||
|
|
||||||
// Generate H = Hash( M' )
|
// Generate H = Hash( M' )
|
||||||
//
|
//
|
||||||
|
@ -1245,7 +1258,11 @@ int mbedtls_rsa_rsassa_pss_verify_ext( mbedtls_rsa_context *ctx,
|
||||||
return( MBEDTLS_ERR_RSA_BAD_INPUT_DATA );
|
return( MBEDTLS_ERR_RSA_BAD_INPUT_DATA );
|
||||||
|
|
||||||
mbedtls_md_init( &md_ctx );
|
mbedtls_md_init( &md_ctx );
|
||||||
mbedtls_md_setup( &md_ctx, md_info, 0 );
|
if( ( ret = mbedtls_md_setup( &md_ctx, md_info, 0 ) ) != 0 )
|
||||||
|
{
|
||||||
|
mbedtls_md_free( &md_ctx );
|
||||||
|
return( ret );
|
||||||
|
}
|
||||||
|
|
||||||
mgf_mask( p, siglen - hlen - 1, p + siglen - hlen - 1, hlen, &md_ctx );
|
mgf_mask( p, siglen - hlen - 1, p + siglen - hlen - 1, hlen, &md_ctx );
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue