mbedtls/ChangeLog.d
Fredrik Strupe 462aa575a4 PSA Crypto: Don't skip key data removal when SE driver is not in use
Closing a wrapped key with the new SE driver interface while
MBEDTLS_PSA_CRYPTO_SE_C is also enabled leads to the key material not
being freed, even though an old SE driver is not in use, leading to a
memory leak. This is because a wrapped key is also considered external.

This commit extends the check for skipping by checking whether an
old-style SE driver is registered with the provided slot, in addition to
checking whether the key is external.

Signed-off-by: Fredrik Strupe <fredrik.strupe@silabs.com>
2020-12-17 11:05:36 +01:00
..
00README.md Add guidance on writing and maintaining changelog entries 2020-03-27 20:14:19 +01:00
add-aes-ecb-to-psa.txt Style and language fixes 2020-08-25 12:32:22 +02:00
add_cipher_transparent_driver.txt Add changelog entry 2020-09-14 16:31:58 +02:00
add_sign_verify_keygen_transparent_driver.txt Added changelog 2020-09-04 14:22:27 +02:00
adjusting sliding_window_size_PR3592.txt adding entry file to ChangeLog.d for PR3592 2020-09-07 13:08:10 +02:00
bugfix_3524.txt fix(programs/psa): commit python3 generated file 2020-09-24 20:57:46 -07:00
bugfix_PR3294.txt Updates to cleanup fixes for #3294 2020-08-24 08:29:39 -07:00
comment_typo_in_mbedtls_ssl_set_bio.txt Update ChangeLog.d/comment_typo_in_mbedtls_ssl_set_bio.txt 2020-08-20 14:31:00 -07:00
fix-typo.txt Minor fixes to changelog 2020-09-10 08:26:39 +08:00
psa_close_key_memory_leak_fix.txt PSA Crypto: Don't skip key data removal when SE driver is not in use 2020-12-17 11:05:36 +01:00