You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
TC_DA_1_7.py relies on in-repos PAA mirror. Recently when updating the mirror in credentials/development/paa-root-certs (See #26914), a new PAA was added to testnet with a SignatureAlgorithm field non-compliant with RFC5758 sec 3.2:
When the ecdsa-with-SHA224, ecdsa-with-SHA256, ecdsa-with-SHA384, or
ecdsa-with-SHA512 algorithm identifier appears in the algorithm field
as an AlgorithmIdentifier, the encoding MUST omit the parameters
field. That is, the AlgorithmIdentifier SHALL be a SEQUENCE of one
component, the OID ecdsa-with-SHA224, ecdsa-with-SHA256, ecdsa-with-
SHA384, or ecdsa-with-SHA512.
* Fix TC_DA_1_7.py PAA parser
- Fix TC_DA_1_7.py not to blow-up on bad PAAs, just log them.
- Fix PAA fetcher to do the same
Fixes#26979
* Update DCL mirror as of May 31, 2023
- Fix NXP DER conversion --> not 100% legal format, but kept
since only TC_DA_1_7.py library complains
- Updated all from local run.
Commands executed from root of SDK:
```
pip install click_option_group # somehow missing from requirements
cd credentials/development
python ../fetch-paa-certs-from-dcl.py --use-test-net-http
cd ../production
python ../fetch-paa-certs-from-dcl.py --use-main-net-http
git add credentials/
```
Fixes#26424
* Restyled by autopep8
* Update DCL PAAs on May 31, 2023
Commands run from root. Includes temporary NXP fixups
```
cd credentials/development
rm dcld_mirror_*
python ../fetch-paa-certs-from-dcl.py --use-test-net-http
python ../fetch-paa-certs-from-dcl.py --use-main-net-http
openssl x509 -inform pem -in paa-root-certs/dcld_mirror_SERIALNUMBER_63709330400001_CN_NXP_Matter_PAA_O_NXP_Semiconductors_NV_C_NL.pem -outform der -out paa-root-certs/dcld_mirror_SERIALNUMBER_63709330400001_CN_NXP_Matter_PAA_O_NXP_Semiconductors_NV_C_NL.der
openssl x509 -inform pem -in paa-root-certs/dcld_mirror_SERIALNUMBER_63709380400001_CN_NXP_Matter_Test_PAA_O_NXP_Semiconductors_NV_C_NL.pem -outform der -out paa-root-certs/dcld_mirror_SERIALNUMBER_63709380400001_CN_NXP_Matter_Test_PAA_O_NXP_Semiconductors_NV_C_NL.der
cd ../production
rm dcld_mirror_*
python ../fetch-paa-certs-from-dcl.py --use-main-net-http
openssl x509 -inform pem -in paa-root-certs/dcld_mirror_SERIALNUMBER_63709330400001_CN_NXP_Matter_PAA_O_NXP_Semiconductors_NV_C_NL.pem -outform der -out paa-root-certs/dcld_mirror_SERIALNUMBER_63709330400001_CN_NXP_Matter_PAA_O_NXP_Semiconductors_NV_C_NL.der
cd ../..
git add credentials
```
* Add allowlist of skipped PAAs to TC_DA_1_7
* Fix formatting again
* Restyled by autopep8
---------
Co-authored-by: tennessee.carmelveilleux@gmail.com <tennessee@google.com>
Co-authored-by: Restyled.io <commits@restyled.io>
Problem
TC_DA_1_7.py relies on in-repos PAA mirror. Recently when updating the mirror in
credentials/development/paa-root-certs
(See #26914), a new PAA was added to testnet with a SignatureAlgorithm field non-compliant with RFC5758 sec 3.2:When parsing the certificate (see attached offending_test_cert.der.zip)
, it blows-up with:
This is because the ASN.1 has a NULL for parameters, rather than omitted parameters:
The TC_DA_1_7.py script has to be updated to be more lenient to bad certs in the trust store, and just log on failure.
The text was updated successfully, but these errors were encountered: