Update to mbedtls-2.16.6
Fix side channel in ECC code that allowed an adversary with access to precise enough timing and memory access information to fully recover an ECDSA private key (CVE-2020-10932).
This commit is contained in:
parent
0484011dd5
commit
afc5dbeaab
@ -1,10 +1,10 @@
|
|||||||
# $OpenBSD: Makefile,v 1.33 2020/02/22 06:38:12 bket Exp $
|
# $OpenBSD: Makefile,v 1.34 2020/04/15 13:04:41 bket Exp $
|
||||||
|
|
||||||
PORTROACH= limit:^2\.16
|
PORTROACH= limit:^2\.16
|
||||||
|
|
||||||
COMMENT= SSL library with an intuitive API and readable source code
|
COMMENT= SSL library with an intuitive API and readable source code
|
||||||
|
|
||||||
DISTNAME= mbedtls-2.16.5
|
DISTNAME= mbedtls-2.16.6
|
||||||
EXTRACT_SUFX= -gpl.tgz
|
EXTRACT_SUFX= -gpl.tgz
|
||||||
|
|
||||||
# check SOVERSION
|
# check SOVERSION
|
||||||
|
@ -1,2 +1,2 @@
|
|||||||
SHA256 (mbedtls-2.16.5-gpl.tgz) = br3qZWXHFPExW5r2qAKvtLTomXb31dKxWqgCjrUufQk=
|
SHA256 (mbedtls-2.16.6-gpl.tgz) = gKSE30LzLb6VZlzUsYzg3RS2xn39Vh020UdYAuQes+0=
|
||||||
SIZE (mbedtls-2.16.5-gpl.tgz) = 2702325
|
SIZE (mbedtls-2.16.6-gpl.tgz) = 2706375
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
$OpenBSD: patch-tests_suites_host_test_function,v 1.3 2019/10/18 04:56:37 bket Exp $
|
$OpenBSD: patch-tests_suites_host_test_function,v 1.4 2020/04/15 13:04:41 bket Exp $
|
||||||
|
|
||||||
Can't take the address of stdout.
|
Can't take the address of stdout.
|
||||||
|
|
||||||
@ -15,7 +15,7 @@ Index: tests/suites/host_test.function
|
|||||||
|
|
||||||
#if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C) && \
|
#if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C) && \
|
||||||
!defined(TEST_SUITE_MEMORY_BUFFER_ALLOC)
|
!defined(TEST_SUITE_MEMORY_BUFFER_ALLOC)
|
||||||
@@ -549,20 +546,6 @@ int execute_tests( int argc , const char ** argv )
|
@@ -537,20 +534,6 @@ int execute_tests( int argc , const char ** argv )
|
||||||
test_info.result = TEST_RESULT_SUCCESS;
|
test_info.result = TEST_RESULT_SUCCESS;
|
||||||
test_info.paramfail_test_state = PARAMFAIL_TESTSTATE_IDLE;
|
test_info.paramfail_test_state = PARAMFAIL_TESTSTATE_IDLE;
|
||||||
|
|
||||||
@ -36,7 +36,7 @@ Index: tests/suites/host_test.function
|
|||||||
|
|
||||||
function_id = strtol( params[0], NULL, 10 );
|
function_id = strtol( params[0], NULL, 10 );
|
||||||
if ( (ret = check_test( function_id )) == DISPATCH_TEST_SUCCESS )
|
if ( (ret = check_test( function_id )) == DISPATCH_TEST_SUCCESS )
|
||||||
@@ -574,13 +557,6 @@ int execute_tests( int argc , const char ** argv )
|
@@ -562,13 +545,6 @@ int execute_tests( int argc , const char ** argv )
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -50,7 +50,7 @@ Index: tests/suites/host_test.function
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -669,10 +645,6 @@ int execute_tests( int argc , const char ** argv )
|
@@ -652,10 +628,6 @@ int execute_tests( int argc , const char ** argv )
|
||||||
mbedtls_memory_buffer_alloc_free();
|
mbedtls_memory_buffer_alloc_free();
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user