-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automatically build up certificate chains #5
Labels
Comments
Closed
SergeySeroshtan
added a commit
to VirgilSecurity/mbedtls
that referenced
this issue
Dec 6, 2016
NirEkhauz
pushed a commit
to NirEkhauz/mbedtls
that referenced
this issue
Nov 30, 2017
* CTR_DRBG Error handling Check AES return values and return error when needed. Add a new error code: MBEDTLS_ERR_CTR_DRBG_CRYPTO_FAILED * Update and rename ctr_drbg.c to ctr_drbg.h * Update ctr_drbg.h * Rename ctr_drbg.h to ctr_drbg.c * CTR_DRBG Error handling Check AES return values and return error when needed. Add a new error code: MBEDTLS_ERR_CTR_DRBG_CRYPTO_FAILED * More changes after code review. * CTR_DRBG more memory cleanup.
hanno-becker
pushed a commit
to hanno-becker/mbedtls
that referenced
this issue
Mar 23, 2020
First step in adapting TLS 1.3 prototype to Mbed TLS style
minosgalanakis
added a commit
to minosgalanakis/mbedtls
that referenced
this issue
Dec 10, 2021
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
superna9999
added a commit
to superna9999/mbedtls
that referenced
this issue
Apr 15, 2022
…ent return in pk_rsa_verify_ext_test_vec() Signed-off-by: Neil Armstrong <narmstrong@baylibre.com>
superna9999
added a commit
to superna9999/mbedtls
that referenced
this issue
Apr 22, 2022
…_verify_ext_test_vec() Signed-off-by: Neil Armstrong <narmstrong@baylibre.com>
mprse
added a commit
to mprse/mbedtls
that referenced
this issue
Jun 15, 2022
…e causing issues This commit needs to be dropped when real reason is found for: Sign alg from PK: RSA_PSS(SHA256), not supported .................. ==587199==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x4cd774 in mbedtls_debug_print_msg (/home/przemek/mbedtls/tests/test_suite_ssl+0x4cd774) Mbed-TLS#1 0x536e76 in mbedtls_ssl_tls13_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x536e76) Mbed-TLS#2 0x4beeb7 in test_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x4beeb7) Mbed-TLS#3 0x4bf2dc in test_get_sig_alg_from_pk_wrapper (/home/przemek/mbedtls/tests/test_suite_ssl+0x4bf2dc) Mbed-TLS#4 0x4c199f in execute_tests (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c199f) Mbed-TLS#5 0x4c2e86 in main (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c2e86) Mbed-TLS#6 0x7f4a5c8c60b2 in __libc_start_main /build/glibc-sMfBJT/glibc-2.31/csu/../csu/libc-start.c:308:16 Mbed-TLS#7 0x41c37d in _start (/home/przemek/mbedtls/tests/test_suite_ssl+0x41c37d) Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
mprse
added a commit
to mprse/mbedtls
that referenced
this issue
Jun 20, 2022
…e causing issues This commit needs to be dropped when real reason is found for: Sign alg from PK: RSA_PSS(SHA256), not supported .................. ==587199==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x4cd774 in mbedtls_debug_print_msg (/home/przemek/mbedtls/tests/test_suite_ssl+0x4cd774) Mbed-TLS#1 0x536e76 in mbedtls_ssl_tls13_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x536e76) Mbed-TLS#2 0x4beeb7 in test_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x4beeb7) Mbed-TLS#3 0x4bf2dc in test_get_sig_alg_from_pk_wrapper (/home/przemek/mbedtls/tests/test_suite_ssl+0x4bf2dc) Mbed-TLS#4 0x4c199f in execute_tests (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c199f) Mbed-TLS#5 0x4c2e86 in main (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c2e86) Mbed-TLS#6 0x7f4a5c8c60b2 in __libc_start_main /build/glibc-sMfBJT/glibc-2.31/csu/../csu/libc-start.c:308:16 Mbed-TLS#7 0x41c37d in _start (/home/przemek/mbedtls/tests/test_suite_ssl+0x41c37d) Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
daverodgman
added a commit
to daverodgman/mbedtls
that referenced
this issue
Nov 22, 2022
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
SSL servers should provide as much information their certificate's chain as possible. PolarSSL could help applications by appending certificate authority certificates to a certificate automatically.
Along similar lines, if a server requests a client certificate, it can pass a list of known CAs to the client. PolarSSL should ensure that the returned client certificate has one of the given CAs as its parent.
The text was updated successfully, but these errors were encountered: