Janos Follath
e33f559de1
Included tests for the overflow
2016-05-18 19:30:09 +01:00
Janos Follath
e007c9fede
Removing 'if' branch from the fix.
...
This new error shouldn't be distinguishable from other padding errors.
Updating 'bad' instead of adding a new 'if' branch.
2016-05-18 19:30:09 +01:00
Janos Follath
b645c45865
Add tests for the bug IOTSSL-619.
...
The main goal with these tests is to test the bug in question and
they are not meant to test the entire PKCS#1 v1.5 behaviour. To
achieve full test coverage, further test cases are needed.
2016-05-18 19:30:09 +01:00
Janos Follath
ea6cbb957c
Add Changelog entry for current branch
2016-05-18 19:30:09 +01:00
Janos Follath
a95834340a
Length check added
2016-05-18 19:30:09 +01:00
SimonB
493abdf692
Clarifies documentation on reported memory statistics
2016-05-05 17:55:19 +01:00
SimonB
991244cd7b
Fixes memory leak in memory_buffer_alloc.c debug
...
Debug symbols were being leaked in memory_buffer_alloc.c
2016-05-05 17:51:09 +01:00
Attila Molnar
c7b8e3af53
Fix minor doc issue
2016-05-05 17:50:17 +01:00
Simon Butcher
d58d715680
Update ChangeLog for bug #429 in ssl_fork_server
2016-04-29 00:15:34 +01:00
Janos Follath
c89a62e809
Improves and makes pretty the ssl_fork_server output
2016-04-28 23:57:42 +01:00
Janos Follath
56a7347841
Fix issue #429 in ssl_fork_server.c
2016-04-28 23:57:28 +01:00
Janos Follath
e9d5510f05
Fix bug in ssl_write_supported_elliptic_curves_ext
...
Passing invalid curves to mbedtls_ssl_conf_curves potentially could caused a
crash later in ssl_write_supported_elliptic_curves_ext. #373
2016-04-22 09:55:32 +01:00
Janos Follath
689a627215
Fix null pointer dereference in the RSA module.
...
Introduced null pointer checks in mbedtls_rsa_rsaes_pkcs1_v15_encrypt
2016-04-19 10:20:59 +01:00
Simon Butcher
0705dd0588
Adds test for odd bit length RSA key size
...
Also tidy up ChangeLog following review.
2016-04-19 09:19:46 +01:00
Janos Follath
1a59a504e7
Fix odd bitlength RSA key generation
...
Fix issue that caused a hang up when generating RSA keys of odd
bitlength.
2016-04-19 09:19:21 +01:00
Janos Follath
1033abdd4e
Remove unused code from PKCS1v15 test suite
2016-04-18 10:06:21 +01:00
Simon Butcher
e789a6ead6
Fixes typo in platform.h
2016-04-13 18:46:26 +01:00
Simon Butcher
3e25f8c01e
Add missing config dependencies to PKCS1 V15 tests
2016-04-13 14:49:19 +01:00
Simon Butcher
57b42d25c3
Add missing stdlib.h header to rsa sample programs
2016-04-13 11:52:56 +01:00
Simon Butcher
7d65cedc96
Corrects platform return values in rsa sample programs
2016-04-12 15:04:10 +01:00
Simon Butcher
bbd3e8a1f0
Fixes error and exit paths in rsa sample programs
2016-04-12 14:24:23 +01:00
Janos Follath
8c60bdff5b
Fix memory leaks in example programs.
2016-04-12 14:22:21 +01:00
Janos Follath
0e243cabc9
Add tests to cover PKCS1 v1.5 signature functions.
...
The reported memory leak should have been spotted by
make memcheck
But it wasn't. Keeping the tests for better coverage.
2016-04-12 14:22:09 +01:00
Simon Butcher
8e9cccb652
Merge branch 'mbedtls-2.1'
2016-03-30 01:49:22 +01:00
Janos Follath
db9fdbf6f4
Fix the broken pkcs1 v1.5 test.
...
The random buffer handed over to the test function was too small
and the remaining bytes were generated by the default (platform
dependant) function.
2016-03-30 01:01:44 +01:00
Simon Butcher
e6c8499c6c
Merge branch 'mbedtls-2.1'
2016-03-30 00:59:09 +01:00
Simon Butcher
9ff2d96fe2
Fix Changelog for backport of IOTSSL-621
2016-03-17 11:09:45 +00:00
Simon Butcher
67c1ea7abd
Merge 'iotssl-621-potential-integer-overflow'
...
Backport of fix for IOTSSL-621
2016-03-17 10:21:18 +00:00
Simon Butcher
fe0e8d2331
Fix ChangeLog after merging fix for IOTSSL-628
2016-03-16 23:08:18 +00:00
Janos Follath
4d9bbc4e36
Extended ChangeLog entry
2016-03-16 23:05:58 +00:00
Janos Follath
e75f8c32c5
Moved underflow test to better reflect time constant behaviour.
2016-03-16 23:05:42 +00:00
Janos Follath
3cbdbf918f
Add Changelog entry for current branch
2016-03-16 23:05:25 +00:00
Janos Follath
5ed30c1920
Included test for integer underflow.
2016-03-16 23:05:10 +00:00
Janos Follath
365b226a56
x509: trailing bytes in DER: add integration tests
2016-03-15 23:49:46 +00:00
Janos Follath
f6f5441fd1
x509: trailing bytes in DER: correct a unit test
...
One of the unit test was failing, because it was testing behavior
that was part of the bug. Updated the return value to the correct one
2016-03-15 23:48:25 +00:00
Janos Follath
16734f011b
x509: trailing bytes in DER: fix bug
...
Fix bug in mbedtls_x509_crt_parse that caused trailing extra data in the
buffer after DER certificates to be included in the raw representation. #377
2016-03-15 23:47:36 +00:00
Simon Butcher
02b8d481f6
Adapt SSLv3 test configuration for new default
...
Removed SSLv3 test suites from system tests in 'compat.sh' script, and
added SSLv3 specific tests to 'all.sh'
2016-03-15 20:39:52 +00:00
Janos Follath
3415cc2f35
Add Changelog entry for current branch
2016-03-15 09:52:56 +00:00
Janos Follath
6d133d2581
Included tests for the overflow
2016-03-15 09:51:50 +00:00
Janos Follath
542ee5d8f3
Update default configuration
...
Change the default settings for SSL and modify the tests accordingly.
2016-03-07 16:34:25 +00:00
Janos Follath
cbbfaba5a6
Removing 'if' branch from the fix.
...
This new error shouldn't be distinguishable from other padding errors.
Updating 'bad' instead of adding a new 'if' branch.
2016-03-01 22:09:52 +00:00
Janos Follath
e5b26c107b
Add tests for the bug IOTSSL-619.
...
The main goal with these tests is to test the bug in question and
they are not meant to test the entire PKCS#1 v1.5 behaviour. To
achieve full test coverage, further test cases are needed.
2016-03-01 22:09:37 +00:00
Janos Follath
d936b04429
Add Changelog entry for current branch
2016-03-01 22:09:20 +00:00
Janos Follath
df5621c7f1
Length check added
2016-03-01 22:09:09 +00:00
Manuel Pégourié-Gonnard
f10f85f676
Add test for yotta debug build
2016-01-08 15:08:49 +01:00
Manuel Pégourié-Gonnard
5ae028550f
Make check-names.sh happy
2016-01-08 15:08:49 +01:00
Manuel Pégourié-Gonnard
7715e669f1
Avoid build errors with -O0 due to assembly
2016-01-08 14:52:55 +01:00
Manuel Pégourié-Gonnard
bb81b4a009
Make ar invocation more portable
...
armar doesn't understand the syntax without dash. OTOH, the syntax with dash
is the only one specified by POSIX, and it's accepted by GNU ar, BSD ar (as
bundled with OS X) and armar, so it looks like the most portable syntax.
fixes #386
2016-01-08 14:52:14 +01:00
Manuel Pégourié-Gonnard
96ec00dd3a
Update ChangeLog for latest PR merged
...
fixes #309
2016-01-08 14:51:51 +01:00
Janos Follath
79a1da6948
Improved on the previous fix and added a test case to cover both types
...
of carries.
2016-01-08 14:48:01 +01:00