]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/commit
nettle: Update to 3.7.3
authorAdolf Belka <adolf.belka@ipfire.org>
Thu, 10 Jun 2021 11:53:29 +0000 (13:53 +0200)
committerMichael Tremer <michael.tremer@ipfire.org>
Thu, 10 Jun 2021 12:22:59 +0000 (12:22 +0000)
commitb4cb1ed58b9dbd7d40bd8e9710b7f323da8b8997
tree240e6aee0cc28c1b510a7470455663d5625c82e8
parent3fbad7e512d807499c1c04b396bb55ebff1075d7
nettle: Update to 3.7.3

- Update from 3.7.2 to 3.7.3
- Update rootfile
- Changelog
    2021-05-22  Niels Möller  <nisse@lysator.liu.se>
* configure.ac: Bump package version, to 3.7.3.
  (LIBNETTLE_MINOR): Bump minor number, to 8.4.
  (LIBHOGWEED_MINOR): Bump minor number, to 6.4.
    2021-05-17  Niels Möller  <nisse@lysator.liu.se>
* rsa-decrypt-tr.c (rsa_decrypt_tr): Check up-front that input is
  in range.
* rsa-sec-decrypt.c (rsa_sec_decrypt): Likewise.
* rsa-decrypt.c (rsa_decrypt): Likewise.
* testsuite/rsa-encrypt-test.c (test_main): Add tests with input > n.
    2021-05-14  Niels Möller  <nisse@lysator.liu.se>
* rsa-sign-tr.c (rsa_sec_blind): Delete mn argument.
  (_rsa_sec_compute_root_tr): Delete mn argument, instead require
  that input size matches key size. Rearrange use of temporary
  storage, to support in-place operation, x == m. Update all
  callers.
* rsa-decrypt-tr.c (rsa_decrypt_tr): Make zero-padded copy of
  input, for calling _rsa_sec_compute_root_tr.
* rsa-sec-decrypt.c (rsa_sec_decrypt): Likewise.
* testsuite/rsa-encrypt-test.c (test_main): Test calling all of
  rsa_decrypt, rsa_decrypt_tr, and rsa_sec_decrypt with zero input.
    2021-05-06  Niels Möller  <nisse@lysator.liu.se>
* pkcs1-sec-decrypt.c (_pkcs1_sec_decrypt): Check that message
  length is valid, for given key size.
* testsuite/rsa-sec-decrypt-test.c (test_main): Add test cases for
  calls to rsa_sec_decrypt specifying a too large message length.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
config/rootfiles/common/nettle
lfs/nettle