mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-26 16:05:48 +01:00
d8e2e8347b
Zeroize local MAC variables used for CBC+HMAC cipher suites. In encryption, this is just good hygiene but probably not needed for security since the data protected by the MAC that could leak is about to be transmitted anyway. In DTLS decryption, this could be a security issue since an adversary could learn the MAC of data that they were trying to inject. At least with encrypt-then-MAC, the adversary could then easily inject a datagram with a corrected packet. TLS would still be safe since the receiver would close the connection after the bad MAC. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com> |
||
---|---|---|
.. | ||
00README.md | ||
base64-ranges.txt | ||
bugfix-for-gcm-long-iv-size.txt | ||
build-without-sha.txt | ||
chacha20-poly1305-invalid-nonce.txt | ||
check-return.txt | ||
constant_time_module.txt | ||
do-not-use-obsolete-header.txt | ||
fix_compilation_ssl_tests.txt | ||
fix-cipher-output-size-macros.txt | ||
fix-mbedtls_cipher_crypt-aes-ecb.txt | ||
fix-needed-shared-libraries-linux.txt | ||
fix-psa_gen_key-status.txt | ||
issue4630.txt | ||
makefile-python-windows.txt | ||
muladdc-memory.txt | ||
no-strerror.txt | ||
psa_alg_rsa_pss.txt | ||
psa_cipher_update_ecp.txt | ||
psa_crypto_api_macros.txt | ||
remove_default_alllow_sha1.txt | ||
remove-greentea-support.txt | ||
semi-public-structure-fields.txt | ||
ssl-mac-zeroize.txt | ||
tls_ext_cid-config.txt | ||
twos_complement_representation.txt |