Document RSA keypair issue on OP-TEE 64-bit
Merge from Widevine repo of http://go/wvgerrit/169069 Merged from https://widevine-internal-review.googlesource.com/167604 Bug: 275264353 Test: luci tests Change-Id: Ib77b2f7d3855779dd6d97696d6066ad361e6e416
This commit is contained in:
committed by
Fred Gylys-Colwell
parent
64521717d8
commit
803617b783
@@ -102,7 +102,11 @@ OEMCrypto_BuildInformation(), the `WTPI_BUILD_INFO` macro is no longer required.
|
||||
expected keysize. Fixed to include leading zeroes if needed.
|
||||
- Bugfix: WPTI_GenerateRandomCertificateKeyPair() was implemented incorrectly.
|
||||
It did not return the correct minimum size, used the wrong mbedtls key type,
|
||||
and did not free allocated resources. Fixed all three issues.
|
||||
and did not free allocated resources. Fixed all three issues. Please note
|
||||
that on 64-bit targets, WPTI_GenerateRandomCertificateKeyPair() will exhaust
|
||||
the default memory pool that OP-TEE uses for mbedtls. We suggest increasing
|
||||
MPI_MEMPOOL_SIZE from 12k to 14k in optee_os/lib/libutee/tee_api_arith_mpi.c
|
||||
to avoid this.
|
||||
|
||||
### Trusty port changes
|
||||
|
||||
|
||||
Reference in New Issue
Block a user