-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Don't self-test ECJPAKE ALT implementations against known entropy #4007
Don't self-test ECJPAKE ALT implementations against known entropy #4007
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally looks good, I just need some clarification on a few points that I may have misunderstood.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
I still think this change is worth backporting to 2.16 however to keep the code identical in both branches and keep it maintainable. There should be no need to backport to 2.7 as it is entering end of life and this change is non-critical.
@@ -1059,6 +1063,7 @@ int mbedtls_ecjpake_self_test( int verbose ) | |||
if( verbose != 0 ) | |||
mbedtls_printf( "passed\n" ); | |||
|
|||
#if !defined(MBEDTLS_ECJPAKE_ALT) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please add a comment explaining why those tests are not relevant in the case of an alternative implementation of ECJPAKE.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done.
@@ -820,6 +820,8 @@ static const unsigned char ecjpake_test_password[] = { | |||
0x65, 0x73, 0x74 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Commit message: the commit message is too long and not rendered properly by GitHub.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
fixed
These implementations don't necessarily consume entropy the same way the mbed TLS internal software implementation does, and the 'reference handshake' test vectors can thus not be applied to an ALT implementation. Signed-off-by: Steven Cooreman <steven.cooreman@silabs.com>
39860e6
to
64f2773
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the very good and clear additional comment.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just needs a backport as previously mentioned and then this is good to merge.
@chris-jones-arm backport available in #4057. |
Description
These implementations don't necessarily consume entropy the same way the mbed TLS internal software implementation does, and the 'reference handshake' test vectors can thus not be applied to an ALT implementation.
Status
READY
Requires Backporting
NO
Migrations
NO