-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possible memory leak if someone runs the benchmarks in a loop. #43
Comments
Fixed for the next release. |
AnttiKauppila
pushed a commit
to JarkkoPaso/mbedtls
that referenced
this issue
Aug 18, 2017
The fact that self-signed end-entity certs can be explicitly trusted by putting them in the CA list even if they don't have the CA bit was not documented though it's intentional, and tested by "Certificate verification Mbed-TLS#73 (selfsigned trusted without CA bit)" in test_suite_x509parse.data It is unclear to me whether the restriction that explicitly trusted end-entity certs must be self-signed is a good one. However, it seems intentional as it is tested in tests Mbed-TLS#42 and Mbed-TLS#43, so I'm not touching it for now.
mpg
added a commit
that referenced
this issue
Mar 6, 2018
The fact that self-signed end-entity certs can be explicitly trusted by putting them in the CA list even if they don't have the CA bit was not documented though it's intentional, and tested by "Certificate verification #73 (selfsigned trusted without CA bit)" in test_suite_x509parse.data It is unclear to me whether the restriction that explicitly trusted end-entity certs must be self-signed is a good one. However, it seems intentional as it is tested in tests #42 and #43, so I'm not touching it for now.
mpg
added a commit
that referenced
this issue
Mar 6, 2018
The fact that self-signed end-entity certs can be explicitly trusted by putting them in the CA list even if they don't have the CA bit was not documented though it's intentional, and tested by "Certificate verification #73 (selfsigned trusted without CA bit)" in test_suite_x509parse.data It is unclear to me whether the restriction that explicitly trusted end-entity certs must be self-signed is a good one. However, it seems intentional as it is tested in tests #42 and #43, so I'm not touching it for now.
gilles-peskine-arm
pushed a commit
to gilles-peskine-arm/mbedtls
that referenced
this issue
Mar 1, 2019
Update to a development version of Mbed TLS 2.16.0
hanno-becker
pushed a commit
to hanno-becker/mbedtls
that referenced
this issue
Oct 12, 2020
Add signature algorithm configuration
gilles-peskine-arm
pushed a commit
that referenced
this issue
Apr 21, 2021
The fact that self-signed end-entity certs can be explicitly trusted by putting them in the CA list even if they don't have the CA bit was not documented though it's intentional, and tested by "Certificate verification #73 (selfsigned trusted without CA bit)" in test_suite_x509parse.data It is unclear to me whether the restriction that explicitly trusted end-entity certs must be self-signed is a good one. However, it seems intentional as it is tested in tests #42 and #43, so I'm not touching it for now.
iameli
pushed a commit
to livepeer/mbedtls
that referenced
this issue
Dec 5, 2023
Memory access fixes. Thanks for contributing this fix.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
The GCM context does not get freed in programs/test/benchmark.c. There is a missing gcm_free() after line 300.
The text was updated successfully, but these errors were encountered: