Commit Graph

4282 Commits

Author SHA1 Message Date
Janos Follath
e33f559de1 Included tests for the overflow 2016-05-18 19:30:09 +01:00
Janos Follath
e007c9fede Removing 'if' branch from the fix.
This new error shouldn't be distinguishable from other padding errors.
Updating 'bad' instead of adding a new 'if' branch.
2016-05-18 19:30:09 +01:00
Janos Follath
b645c45865 Add tests for the bug IOTSSL-619.
The main goal with these tests is to test the bug in question and
they are not meant to test the entire PKCS#1 v1.5 behaviour. To
achieve full test coverage, further test cases are needed.
2016-05-18 19:30:09 +01:00
Janos Follath
ea6cbb957c Add Changelog entry for current branch 2016-05-18 19:30:09 +01:00
Janos Follath
a95834340a Length check added 2016-05-18 19:30:09 +01:00
SimonB
493abdf692 Clarifies documentation on reported memory statistics 2016-05-05 17:55:19 +01:00
SimonB
991244cd7b Fixes memory leak in memory_buffer_alloc.c debug
Debug symbols were being leaked in memory_buffer_alloc.c
2016-05-05 17:51:09 +01:00
Attila Molnar
c7b8e3af53 Fix minor doc issue 2016-05-05 17:50:17 +01:00
Simon Butcher
d58d715680 Update ChangeLog for bug #429 in ssl_fork_server 2016-04-29 00:15:34 +01:00
Janos Follath
c89a62e809 Improves and makes pretty the ssl_fork_server output 2016-04-28 23:57:42 +01:00
Janos Follath
56a7347841 Fix issue #429 in ssl_fork_server.c 2016-04-28 23:57:28 +01:00
Janos Follath
e9d5510f05 Fix bug in ssl_write_supported_elliptic_curves_ext
Passing invalid curves to mbedtls_ssl_conf_curves potentially could caused a
crash later in ssl_write_supported_elliptic_curves_ext. #373
2016-04-22 09:55:32 +01:00
Janos Follath
689a627215 Fix null pointer dereference in the RSA module.
Introduced null pointer checks in mbedtls_rsa_rsaes_pkcs1_v15_encrypt
2016-04-19 10:20:59 +01:00
Simon Butcher
0705dd0588 Adds test for odd bit length RSA key size
Also tidy up ChangeLog following review.
2016-04-19 09:19:46 +01:00
Janos Follath
1a59a504e7 Fix odd bitlength RSA key generation
Fix issue that caused a hang up when generating RSA keys of odd
bitlength.
2016-04-19 09:19:21 +01:00
Janos Follath
1033abdd4e Remove unused code from PKCS1v15 test suite 2016-04-18 10:06:21 +01:00
Simon Butcher
e789a6ead6 Fixes typo in platform.h 2016-04-13 18:46:26 +01:00
Simon Butcher
3e25f8c01e Add missing config dependencies to PKCS1 V15 tests 2016-04-13 14:49:19 +01:00
Simon Butcher
57b42d25c3 Add missing stdlib.h header to rsa sample programs 2016-04-13 11:52:56 +01:00
Simon Butcher
7d65cedc96 Corrects platform return values in rsa sample programs 2016-04-12 15:04:10 +01:00
Simon Butcher
bbd3e8a1f0 Fixes error and exit paths in rsa sample programs 2016-04-12 14:24:23 +01:00
Janos Follath
8c60bdff5b Fix memory leaks in example programs. 2016-04-12 14:22:21 +01:00
Janos Follath
0e243cabc9 Add tests to cover PKCS1 v1.5 signature functions.
The reported memory leak should have been spotted by
make memcheck
But it wasn't. Keeping the tests for better coverage.
2016-04-12 14:22:09 +01:00
Simon Butcher
8e9cccb652 Merge branch 'mbedtls-2.1' 2016-03-30 01:49:22 +01:00
Janos Follath
db9fdbf6f4 Fix the broken pkcs1 v1.5 test.
The random buffer handed over to the test function was too small
and the remaining bytes were generated by the default (platform
dependant) function.
2016-03-30 01:01:44 +01:00
Simon Butcher
e6c8499c6c Merge branch 'mbedtls-2.1' 2016-03-30 00:59:09 +01:00
Simon Butcher
9ff2d96fe2 Fix Changelog for backport of IOTSSL-621 2016-03-17 11:09:45 +00:00
Simon Butcher
67c1ea7abd Merge 'iotssl-621-potential-integer-overflow'
Backport of fix for IOTSSL-621
2016-03-17 10:21:18 +00:00
Simon Butcher
fe0e8d2331 Fix ChangeLog after merging fix for IOTSSL-628 2016-03-16 23:08:18 +00:00
Janos Follath
4d9bbc4e36 Extended ChangeLog entry 2016-03-16 23:05:58 +00:00
Janos Follath
e75f8c32c5 Moved underflow test to better reflect time constant behaviour. 2016-03-16 23:05:42 +00:00
Janos Follath
3cbdbf918f Add Changelog entry for current branch 2016-03-16 23:05:25 +00:00
Janos Follath
5ed30c1920 Included test for integer underflow. 2016-03-16 23:05:10 +00:00
Janos Follath
365b226a56 x509: trailing bytes in DER: add integration tests 2016-03-15 23:49:46 +00:00
Janos Follath
f6f5441fd1 x509: trailing bytes in DER: correct a unit test
One of the unit test was failing, because it was testing behavior
that was part of the bug. Updated the return value to the correct one
2016-03-15 23:48:25 +00:00
Janos Follath
16734f011b x509: trailing bytes in DER: fix bug
Fix bug in mbedtls_x509_crt_parse that caused trailing extra data in the
buffer after DER certificates to be included in the raw representation. #377
2016-03-15 23:47:36 +00:00
Simon Butcher
02b8d481f6 Adapt SSLv3 test configuration for new default
Removed SSLv3 test suites from system tests in 'compat.sh' script, and
added SSLv3 specific tests to 'all.sh'
2016-03-15 20:39:52 +00:00
Janos Follath
3415cc2f35 Add Changelog entry for current branch 2016-03-15 09:52:56 +00:00
Janos Follath
6d133d2581 Included tests for the overflow 2016-03-15 09:51:50 +00:00
Janos Follath
542ee5d8f3 Update default configuration
Change the default settings for SSL and modify the tests accordingly.
2016-03-07 16:34:25 +00:00
Janos Follath
cbbfaba5a6 Removing 'if' branch from the fix.
This new error shouldn't be distinguishable from other padding errors.
Updating 'bad' instead of adding a new 'if' branch.
2016-03-01 22:09:52 +00:00
Janos Follath
e5b26c107b Add tests for the bug IOTSSL-619.
The main goal with these tests is to test the bug in question and
they are not meant to test the entire PKCS#1 v1.5 behaviour. To
achieve full test coverage, further test cases are needed.
2016-03-01 22:09:37 +00:00
Janos Follath
d936b04429 Add Changelog entry for current branch 2016-03-01 22:09:20 +00:00
Janos Follath
df5621c7f1 Length check added 2016-03-01 22:09:09 +00:00
Manuel Pégourié-Gonnard
f10f85f676 Add test for yotta debug build 2016-01-08 15:08:49 +01:00
Manuel Pégourié-Gonnard
5ae028550f Make check-names.sh happy 2016-01-08 15:08:49 +01:00
Manuel Pégourié-Gonnard
7715e669f1 Avoid build errors with -O0 due to assembly 2016-01-08 14:52:55 +01:00
Manuel Pégourié-Gonnard
bb81b4a009 Make ar invocation more portable
armar doesn't understand the syntax without dash. OTOH, the syntax with dash
is the only one specified by POSIX, and it's accepted by GNU ar, BSD ar (as
bundled with OS X) and armar, so it looks like the most portable syntax.

fixes #386
2016-01-08 14:52:14 +01:00
Manuel Pégourié-Gonnard
96ec00dd3a Update ChangeLog for latest PR merged
fixes #309
2016-01-08 14:51:51 +01:00
Janos Follath
79a1da6948 Improved on the previous fix and added a test case to cover both types
of carries.
2016-01-08 14:48:01 +01:00