0d336a4850
Security - Fixed missing padding length check required by PKCS1 v2.2 in mbedtls_rsa_rsaes_pkcs1_v15_decrypt(). (considered low impact) - Fixed potential integer overflow to buffer overflow in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() and mbedtls_rsa_rsaes_oaep_encrypt(). (not triggerable remotely in (D)TLS). - Fixed potential integer underflow to buffer overread in mbedtls_rsa_rsaes_oaep_decrypt(). It is not triggerable remotely in SSL/TLS. Bugfix - Fixed bug in mbedtls_mpi_add_mpi() that caused wrong results when the three arguments were the same (in-place doubling). #309 - Fixed issue in Makefile that prevented building using armar. #386 - Fixed issue that caused a hang when generating RSA keys of odd bitlength. - Fixed bug in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() that made null pointer dereference possible. - Fixed issue that caused a crash if invalid curves were passed to mbedtls_ssl_conf_curves(). #373 Changes - On ARM platforms, when compiling with -O0 with GCC, Clang or armcc5, don't use the optimized assembly for bignum multiplication. This removes the need to pass -fomit-frame-pointer to avoid a build error with -O0. - Disabled SSLv3 in the default configuration.
9 lines
638 B
Text
9 lines
638 B
Text
$NetBSD: distinfo,v 1.2 2016/09/15 10:48:01 fhajny Exp $
|
|
|
|
SHA1 (mbedtls-1.3.17-gpl.tgz) = f6e6d0e08e4425e0cbd141dd007541fedfff2a3e
|
|
RMD160 (mbedtls-1.3.17-gpl.tgz) = e923a83cc73a3f9a0e529921394417e60dbf5df8
|
|
SHA512 (mbedtls-1.3.17-gpl.tgz) = d8ca5c0f5550c9384b5ec9602aca314f6b95b8d320017217f6a66fee5e25989dc8ef8aeb046e887a478b12e0df879a3399a4ab99fc21b091888f30ab1ad2b2ea
|
|
Size (mbedtls-1.3.17-gpl.tgz) = 1766596 bytes
|
|
SHA1 (patch-Makefile) = 80698e16a397133de134ab582016b9e91ad652f0
|
|
SHA1 (patch-library_Makefile) = a3dcd83fb1cc74f59745f2168f14926c077a5289
|
|
SHA1 (patch-programs_test_CMakeLists.txt) = 94ce731d81f1584c406e3b295c84fd6a5c327a50
|