Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PKCS#12 file support #7

Closed
pjbakker opened this issue Nov 15, 2012 · 0 comments
Closed

PKCS#12 file support #7

pjbakker opened this issue Nov 15, 2012 · 0 comments
Labels
component-crypto Crypto primitives and low-level interfaces enhancement historical-reviewing Currently reviewing (for legacy PR/issues)

Comments

@pjbakker
Copy link
Contributor

No description provided.

Patater added a commit to Patater/mbedtls that referenced this issue Jan 15, 2019
[mbedcrypto] all.sh: make it possible to run a subset of the components
@RonEld RonEld added the component-crypto Crypto primitives and low-level interfaces label Feb 17, 2019
hanno-becker pushed a commit to hanno-becker/mbedtls that referenced this issue Mar 23, 2020
Another bunch of trivial style changes towards obeying Mbed TLS coding style
mprse added a commit to mprse/mbedtls that referenced this issue Jun 15, 2022
…e causing issues

This commit needs to be dropped when real reason is found for:

Sign alg from PK: RSA_PSS(SHA256), not supported .................. ==587199==WARNING: MemorySanitizer: use-of-uninitialized-value
    #0 0x4cd774 in mbedtls_debug_print_msg (/home/przemek/mbedtls/tests/test_suite_ssl+0x4cd774)
    Mbed-TLS#1 0x536e76 in mbedtls_ssl_tls13_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x536e76)
    Mbed-TLS#2 0x4beeb7 in test_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x4beeb7)
    Mbed-TLS#3 0x4bf2dc in test_get_sig_alg_from_pk_wrapper (/home/przemek/mbedtls/tests/test_suite_ssl+0x4bf2dc)
    Mbed-TLS#4 0x4c199f in execute_tests (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c199f)
    Mbed-TLS#5 0x4c2e86 in main (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c2e86)
    Mbed-TLS#6 0x7f4a5c8c60b2 in __libc_start_main /build/glibc-sMfBJT/glibc-2.31/csu/../csu/libc-start.c:308:16
    Mbed-TLS#7 0x41c37d in _start (/home/przemek/mbedtls/tests/test_suite_ssl+0x41c37d)

Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
mprse added a commit to mprse/mbedtls that referenced this issue Jun 20, 2022
…e causing issues

This commit needs to be dropped when real reason is found for:

Sign alg from PK: RSA_PSS(SHA256), not supported .................. ==587199==WARNING: MemorySanitizer: use-of-uninitialized-value
    #0 0x4cd774 in mbedtls_debug_print_msg (/home/przemek/mbedtls/tests/test_suite_ssl+0x4cd774)
    Mbed-TLS#1 0x536e76 in mbedtls_ssl_tls13_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x536e76)
    Mbed-TLS#2 0x4beeb7 in test_get_sig_alg_from_pk (/home/przemek/mbedtls/tests/test_suite_ssl+0x4beeb7)
    Mbed-TLS#3 0x4bf2dc in test_get_sig_alg_from_pk_wrapper (/home/przemek/mbedtls/tests/test_suite_ssl+0x4bf2dc)
    Mbed-TLS#4 0x4c199f in execute_tests (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c199f)
    Mbed-TLS#5 0x4c2e86 in main (/home/przemek/mbedtls/tests/test_suite_ssl+0x4c2e86)
    Mbed-TLS#6 0x7f4a5c8c60b2 in __libc_start_main /build/glibc-sMfBJT/glibc-2.31/csu/../csu/libc-start.c:308:16
    Mbed-TLS#7 0x41c37d in _start (/home/przemek/mbedtls/tests/test_suite_ssl+0x41c37d)

Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
@daverodgman daverodgman added the historical-reviewing Currently reviewing (for legacy PR/issues) label Nov 11, 2022
daverodgman added a commit that referenced this issue Dec 5, 2022
Add warnings & disable PKCS #7 by default
@daverodgman daverodgman mentioned this issue Feb 7, 2023
3 tasks
gilles-peskine-arm added a commit that referenced this issue Mar 1, 2023
Replace fuzzer-generated PKCS #7 memory management tests
daverodgman added a commit to xkqian/mbedtls that referenced this issue Mar 9, 2023
Generated by running "make <filename>" and commiting the result.

Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
daverodgman added a commit to daverodgman/mbedtls that referenced this issue Mar 10, 2023
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
daverodgman added a commit to daverodgman/mbedtls that referenced this issue Mar 11, 2023
Ensure that verification of an expired cert still fails, but
update the test to handle the different error code.

Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
daverodgman added a commit to daverodgman/mbedtls that referenced this issue Mar 11, 2023
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
daverodgman added a commit to daverodgman/mbedtls that referenced this issue Mar 11, 2023
Add test which uses an expired cert but is otherwise OK, which
passes if and only if MBEDTLS_HAVE_TIME_DATE is not set.

Add similar test which verifies against a different data file,
which must fail regardless of MBEDTLS_HAVE_TIME_DATE.

Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
daverodgman added a commit to daverodgman/mbedtls that referenced this issue Mar 12, 2023
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
component-crypto Crypto primitives and low-level interfaces enhancement historical-reviewing Currently reviewing (for legacy PR/issues)
Projects
None yet
Development

No branches or pull requests

3 participants