-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Misc #325
Merged
Merged
Misc #325
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Getting a lot of questions about how to use it. This will hopefully get people started.
fixes #310 Actually all key exchanges that use a certificate use signatures too, and there is no key exchange that uses signatures but no cert, so merge those two flags.
Reviewed and merged. |
gilles-peskine-arm
added a commit
to gilles-peskine-arm/mbedtls
that referenced
this pull request
Dec 6, 2019
* Mbed-TLS#292: Make psa_close_key(0) and psa_destroy_key(0) succeed * Mbed-TLS#299: Allow xxx_drbg_set_entropy_len before xxx_drbg_seed * Mbed-TLS#304: Make sure Asan failures are detected in 'make test' * Mbed-TLS#259: Check `len` against buffers size upper bound in PSA tests * Mbed-TLS#288: Add ECDSA tests with hash and key of different lengths * Mbed-TLS#305: CTR_DRBG: grab a nonce from the entropy source if needed * Mbed-TLS#316: Stop transactions from being reentrant * Mbed-TLS#317: getting_started: Make it clear that keys are passed in * Mbed-TLS#314: Fix pk_write with EC key to use a constant size for the private value * Mbed-TLS#298: Test a build without any asymmetric cryptography * Mbed-TLS#284: Fix some possibly-undefined variable warnings * Mbed-TLS#315: Define MBEDTLS_PK_SIGNATURE_MAX_SIZE * Mbed-TLS#318: Finish side-porting commits from mbedtls-restricted that missed the split * Mbed-TLS#321: Replace config.pl by config.py * Mbed-TLS#322: Update Mbed Crypto with latest Mbed TLS changes as of 2019-11-15 * Mbed-TLS#308: Small performance improvement of mbedtls_mpi_div_mpi() * Mbed-TLS#324: test_psa_constant_names: support key agreement, better code structure * Mbed-TLS#320: Link to the PSA crypto portal page from README.md * Mbed-TLS#293: Always gather MBEDTLS_ENTROPY_BLOCK_SIZE bytes of entropy * Mbed-TLS#310: Clarify test descriptions in test_suite_memory_buffer_alloc * Mbed-TLS#307: Add ASN.1 ENUMERATED tag support * Mbed-TLS#328: Remove dependency of crypto_values.h on crypto_extra.h * Mbed-TLS#325: Rename psa_asymmetric_{sign_verify} to psa_{sign,verify}_hash
gilles-peskine-arm
added a commit
to gilles-peskine-arm/mbedtls
that referenced
this pull request
Dec 6, 2019
* Mbed-TLS#321: Replace config.pl by config.py * Mbed-TLS#322: Update Mbed Crypto with latest Mbed TLS changes as of 2019-11-15 * Mbed-TLS#308: Small performance improvement of mbedtls_mpi_div_mpi() * Mbed-TLS#324: test_psa_constant_names: support key agreement, better code structure * Mbed-TLS#320: Link to the PSA crypto portal page from README.md * Mbed-TLS#293: Always gather MBEDTLS_ENTROPY_BLOCK_SIZE bytes of entropy * Mbed-TLS#310: Clarify test descriptions in test_suite_memory_buffer_alloc * Mbed-TLS#307: Add ASN.1 ENUMERATED tag support * Mbed-TLS#328: Remove dependency of crypto_values.h on crypto_extra.h * Mbed-TLS#325: Rename psa_asymmetric_{sign_verify} to psa_{sign,verify}_hash Missed listing in the previous submodule update: * Mbed-TLS#304: Make sure Asan failures are detected in 'make test'
gilles-peskine-arm
added a commit
to gilles-peskine-arm/mbedtls
that referenced
this pull request
Dec 19, 2019
* Mbed-TLS#321: Replace config.pl by config.py * Mbed-TLS#322: Update Mbed Crypto with latest Mbed TLS changes as of 2019-11-15 * Mbed-TLS#308: Small performance improvement of mbedtls_mpi_div_mpi() * Mbed-TLS#324: test_psa_constant_names: support key agreement, better code structure * Mbed-TLS#320: Link to the PSA crypto portal page from README.md * Mbed-TLS#293: Always gather MBEDTLS_ENTROPY_BLOCK_SIZE bytes of entropy * Mbed-TLS#310: Clarify test descriptions in test_suite_memory_buffer_alloc * Mbed-TLS#307: Add ASN.1 ENUMERATED tag support * Mbed-TLS#328: Remove dependency of crypto_values.h on crypto_extra.h * Mbed-TLS#325: Rename psa_asymmetric_{sign_verify} to psa_{sign,verify}_hash * Mbed-TLS#333: Streamline PSA key type encodings: prepare * Mbed-TLS#323: Initialise return values to an error * Mbed-TLS#330: Streamline PSA key type encodings
Patater
pushed a commit
to Patater/mbedtls
that referenced
this pull request
Feb 10, 2020
Rename psa_asymmetric_{sign_verify} to psa_{sign,verify}_hash
hanno-becker
pushed a commit
to hanno-becker/mbedtls
that referenced
this pull request
Jul 30, 2021
MPS: Remove extended reader/writer from MPS, part 2
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Contains fixes for two similar major issues (build failures in some configurations) plus a new test script that would have detected both of them.
Also contains an completely unrelated (sorry) example program that answers a support question that has been asked many times since we added partial support for Curve25519.