-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PKCS#12 file support #7
Labels
component-crypto
Crypto primitives and low-level interfaces
enhancement
historical-reviewing
Currently reviewing (for legacy PR/issues)
Comments
Patater
added a commit
to Patater/mbedtls
that referenced
this issue
Jan 15, 2019
[mbedcrypto] all.sh: make it possible to run a subset of the components
hanno-becker
pushed a commit
to hanno-becker/mbedtls
that referenced
this issue
Mar 23, 2020
Another bunch of trivial style changes towards obeying Mbed TLS coding style
mprse
added a commit
to mprse/mbedtls
that referenced
this issue
Jun 15, 2022
…e causing issues This commit needs to be dropped when real reason is found for: Sign alg from PK: RSA_PSS(SHA256), not supported .................. ==587199==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x4cd774 in mbedtls_debug_print_msg (/home/przemek/mbedtls/tests/test_suite_ssl+0x4cd774) Mbed-TLS#1 0x536e76 in mbedtls_ssl_tls13_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x536e76) Mbed-TLS#2 0x4beeb7 in test_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x4beeb7) Mbed-TLS#3 0x4bf2dc in test_get_sig_alg_from_pk_wrapper (/home/przemek/mbedtls/tests/test_suite_ssl+0x4bf2dc) Mbed-TLS#4 0x4c199f in execute_tests (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c199f) Mbed-TLS#5 0x4c2e86 in main (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c2e86) Mbed-TLS#6 0x7f4a5c8c60b2 in __libc_start_main /build/glibc-sMfBJT/glibc-2.31/csu/../csu/libc-start.c:308:16 Mbed-TLS#7 0x41c37d in _start (/home/przemek/mbedtls/tests/test_suite_ssl+0x41c37d) Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
mprse
added a commit
to mprse/mbedtls
that referenced
this issue
Jun 20, 2022
…e causing issues This commit needs to be dropped when real reason is found for: Sign alg from PK: RSA_PSS(SHA256), not supported .................. ==587199==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x4cd774 in mbedtls_debug_print_msg (/home/przemek/mbedtls/tests/test_suite_ssl+0x4cd774) Mbed-TLS#1 0x536e76 in mbedtls_ssl_tls13_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x536e76) Mbed-TLS#2 0x4beeb7 in test_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x4beeb7) Mbed-TLS#3 0x4bf2dc in test_get_sig_alg_from_pk_wrapper (/home/przemek/mbedtls/tests/test_suite_ssl+0x4bf2dc) Mbed-TLS#4 0x4c199f in execute_tests (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c199f) Mbed-TLS#5 0x4c2e86 in main (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c2e86) Mbed-TLS#6 0x7f4a5c8c60b2 in __libc_start_main /build/glibc-sMfBJT/glibc-2.31/csu/../csu/libc-start.c:308:16 Mbed-TLS#7 0x41c37d in _start (/home/przemek/mbedtls/tests/test_suite_ssl+0x41c37d) Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
3 tasks
12 tasks
daverodgman
added
the
historical-reviewing
Currently reviewing (for legacy PR/issues)
label
Nov 11, 2022
daverodgman
added a commit
that referenced
this issue
Dec 5, 2022
Add warnings & disable PKCS #7 by default
gilles-peskine-arm
added a commit
that referenced
this issue
Mar 1, 2023
Replace fuzzer-generated PKCS #7 memory management tests
daverodgman
added a commit
to xkqian/mbedtls
that referenced
this issue
Mar 9, 2023
Generated by running "make <filename>" and commiting the result. Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
daverodgman
added a commit
to daverodgman/mbedtls
that referenced
this issue
Mar 10, 2023
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
daverodgman
added a commit
to daverodgman/mbedtls
that referenced
this issue
Mar 11, 2023
Ensure that verification of an expired cert still fails, but update the test to handle the different error code. Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
daverodgman
added a commit
to daverodgman/mbedtls
that referenced
this issue
Mar 11, 2023
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
daverodgman
added a commit
to daverodgman/mbedtls
that referenced
this issue
Mar 11, 2023
Add test which uses an expired cert but is otherwise OK, which passes if and only if MBEDTLS_HAVE_TIME_DATE is not set. Add similar test which verifies against a different data file, which must fail regardless of MBEDTLS_HAVE_TIME_DATE. Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
daverodgman
added a commit
to daverodgman/mbedtls
that referenced
this issue
Mar 12, 2023
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
3 tasks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
component-crypto
Crypto primitives and low-level interfaces
enhancement
historical-reviewing
Currently reviewing (for legacy PR/issues)
No description provided.
The text was updated successfully, but these errors were encountered: