Skip to content

Test merge of development and TLS PR 2028 #73

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 79 commits into from
Feb 27, 2019

Conversation

Patater
Copy link
Contributor

@Patater Patater commented Feb 27, 2019

For testing:

Merge the current Mbed TLS development branch.

Merge Mbed-TLS/mbedtls#2028

If testing goes well, we'll push this already reviewed and tested code from Mbed TLS into Mbed Crypto development, as Mbed TLS requires the new function mbedtls_asn1_write_named_bitstring() present in the crypto submodule in order to pass their tests and be able to merge Mbed-TLS/mbedtls#2028 into Mbed TLS development.

Andres Amaya Garcia and others added 30 commits January 16, 2019 10:35
Add a new function mbedtls_asn1_write_named_bitstring() that removes
trailing 0s at the end of DER encoded bitstrings. The function is
implemented according to Hanno Becker's suggestions.

This commit also changes the functions x509write_crt_set_ns_cert_type
and crt_set_key_usage to call the new function as the use named
bitstrings instead of the regular bitstrings.
When all.sh invokes check_headers_in_cpp, a backup config.h exists. This
causes a stray difference vs cpp_dummy_build.cpp. Fix by only collecting
the *.h files in include/mbedtls.

Change-Id: Ifd415027e856858579a6699538f06fc49c793570
Hanno Becker and others added 25 commits February 18, 2019 16:42
- Populate the ECDH private key slot with a fresh private EC key
  designated for the correct algorithm.
- Export the public part of the ECDH private key from PSA and
  reformat it to suite the format of the ClientKeyExchange message.
- Perform the PSA-based ECDH key agreement and store the result
  as the premaster secret for the connection.
It is now required to initialize PSA Crypto operation contexts before
calling psa_*_setup(). Otherwise, one gets a PSA_ERROR_BAD_STATE error.
Restartable ECC isn't supported in PSA yet.
Additional work done as part of merge:
    - Run ./tests/scripts/check-generated-files.sh and check in the
      resulting changes to programs/ssl/query_config.c
Additional work done as part of merge:
    - Run ./tests/scripts/check-generated-files.sh and check in the
      resulting changes to programs/ssl/query_config.c
@Patater Patater added the DO NOT MERGE The PR is not intended to be merged (yet). Usually used for a review of worked in progress. label Feb 27, 2019
@Patater Patater changed the title Dev/patater/dev 2028 merge Test merge of development and TLS PR 2028 Feb 27, 2019
@Patater Patater merged commit a78c958 into development Feb 27, 2019
@Patater
Copy link
Contributor Author

Patater commented Feb 27, 2019

Testing went well. Manually pushed to development branch. Code landing was already reviewed by TLS team (coming from the TLS development branch) and additionally in Mbed-TLS/mbedtls#2028 (for the code from there)

gilles-peskine-arm pushed a commit to gilles-peskine-arm/mbed-crypto that referenced this pull request May 22, 2019
The fact that self-signed end-entity certs can be explicitly trusted by
putting them in the CA list even if they don't have the CA bit was not
documented though it's intentional, and tested by "Certificate verification ARMmbed#73
(selfsigned trusted without CA bit)" in test_suite_x509parse.data

It is unclear to me whether the restriction that explicitly trusted end-entity
certs must be self-signed is a good one. However, it seems intentional as it is
tested in tests ARMmbed#42 and ARMmbed#43, so I'm not touching it for now.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
DO NOT MERGE The PR is not intended to be merged (yet). Usually used for a review of worked in progress.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants