Open Source embedded SSL/TLS cryptographic library
Open Source embedded SSL/TLS cryptographic library
- Developed at security:tls
- Sources inherited from project openSUSE:Factory
-
3
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Slowroll:Base:1/mbedtls && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_service | 0000000604 604 Bytes | |
_servicedata | 0000000237 237 Bytes | |
baselibs.conf | 0000000063 63 Bytes | |
mbedtls-3.6.0.obscpio | 0044750861 42.7 MB | |
mbedtls-enable-pthread.patch | 0000000603 603 Bytes | |
mbedtls.changes | 0000381679 373 KB | |
mbedtls.obsinfo | 0000000096 96 Bytes | |
mbedtls.spec | 0000005384 5.26 KB |
Latest Revision
Ana Guerrero (anag+factory)
accepted
request 1164972
from
Martin Pluskal (pluskalm)
(revision 45)
- Update baselibs.conf - Update to version 3.6.0 (new LTS): * Fix typo in psa_key_production_parameters_t doc: 65535 should be 65537 * Record size limit support is released, so remove warning about only for testing * Autogenerated files for 3.6.0 * Fix some Changelog typos * Version Bump for 3.6.0 * Assemble Changelog * Fix #ifdef guard in driver wrapper template * test_suite_pk: fix guards in pk_psa_sign() * add changelog * pkwrite: add new internal symbol for the max supported public key DER length * test_suite_pk: uniformly generate RSA and EC keys in pk_psa_sign() * test_suite_pk: fix guards in pk_psa_sign() * test_suite_pk: test also RSA OAEP in pk_wrap_rsa_decrypt_test_vec() * pk_wrap: fix algorithm selection in rsa_opaque_decrypt() * test_suite_pk: fix guards in pk_psa_sign() * test_suite_pk: properly size buffers for public keys in pk_psa_sign() * test_suite_pk: test also RSA keys with PKCS1 v2.1 padding mode in pk_psa_sign() * pk_wrap: fix algorithm selection in rsa_opaque_sign_wrap() * test_suite_pk: fix RSA issue in pk_psa_sign() when !PK_[PARSE|WRITE]_C are defined * test_suite_pk: rename some variables in pk_psa_sign() * test_suite_pk: reshape pk_psa_sign() * tls13: srv: Fix potential stack buffer overread * test_suite_pk: always test verify_ext with opaque keys in pk_psa_wrap_sign_ext() * add changelog * Mention MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS * Remove 'Question' line around testing * Replace reference to master
Comments 0