mirror of
https://github.com/yuzu-mirror/mbedtls.git
synced 2025-12-06 07:12:32 +01:00
Although the library documentation does not guarantee that calling mbedtls_entropy_free() twice works, it's a plausible assumption and it's natural to write code that frees an object twice. While this is uncommon for an entropy context, which is usually a global variable, it came up in our own unit tests (random_twice tests in test_suite_random). Announce this in the same changelog entry as for RSA because it's the same bug in the two modules. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com> |
||
|---|---|---|
| .. | ||
| 00README.md | ||
| drbg-mutex.txt | ||
| fix_psa_crypto_leak.txt | ||
| getentropy.txt | ||
| issue3819.txt | ||
| issue4093.txt | ||
| mbedtls_ecc_group_of_psa.txt | ||
| mbedtls_psa_get_random.txt | ||
| mpi_sub_abs.txt | ||
| no_ecp_fallback.txt | ||
| programs-ssl-use-after-scope.txt | ||
| psa-crypto-api-rename-aead-tag-length-macros.txt | ||
| psa-crypto-client.txt | ||
| psa-crypto-hmac-drbg.txt | ||
| psa-crypto-rename-output-buffer-size-macros.txt | ||
| psa_allow_tweaking_library_configuration.txt | ||
| psa_close_key_memory_leak_fix.txt | ||
| rsa-mutex.txt | ||
| rsa_private-ret.txt | ||