You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Note that mbedtls_ctr_drbg_seed() must not be called twice
You can't reuse a CTR_DRBG context without free()ing it. This
generally happened to work, but was never guaranteed. It could have
failed with alternative implementations of the AES module because
mbedtls_ctr_drbg_seed() calls mbedtls_aes_init() on a context which is
already initialized if mbedtls_ctr_drbg_seed() hasn't been called
before, plausibly causing a memory leak. Since the addition of
mbedtls_ctr_drbg_set_nonce_len(), the second call to
mbedtls_ctr_drbg_seed() uses a nonsensical value as the entropy nonce
length.
0 commit comments