mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-23 01:45:48 +01:00
fe724fe618
Previously passing a NULL or zero length password into either mbedtls_pkcs12_pbe() or mbedtls_pkcs12_derive() could cause an infinate loop, and it was also possible to pass a NULL password, with a non-zero length, which would cause memory corruption. I have fixed these errors, and improved the documentation to reflect the changes and further explain what is expected of the inputs. Signed-off-by: Paul Elliott <paul.elliott@arm.com> |
||
---|---|---|
.. | ||
00README.md | ||
base64-ranges.txt | ||
bugfix-for-gcm-long-iv-size.txt | ||
build-without-sha.txt | ||
chacha20-poly1305-invalid-nonce.txt | ||
check-return.txt | ||
constant_time_module.txt | ||
do-not-use-obsolete-header.txt | ||
fix_compilation_ssl_tests.txt | ||
fix-cipher-output-size-macros.txt | ||
fix-mbedtls_cipher_crypt-aes-ecb.txt | ||
fix-needed-shared-libraries-linux.txt | ||
fix-pkcs12-null-password.txt | ||
fix-psa_gen_key-status.txt | ||
issue4630.txt | ||
makefile-python-windows.txt | ||
muladdc-memory.txt | ||
no-strerror.txt | ||
psa_alg_rsa_pss.txt | ||
psa_cipher_update_ecp.txt | ||
psa_crypto_api_macros.txt | ||
remove_default_alllow_sha1.txt | ||
remove-greentea-support.txt | ||
semi-public-structure-fields.txt | ||
tls_ext_cid-config.txt |