-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Server handshakes with mismatched public/private key pair #507
Labels
Comments
ARM Internal Ref: IOTSSL-821 |
simonbutcher
added a commit
that referenced
this issue
Sep 13, 2018
Update library version number to 2.1.15
@attilamolnar Thanks for your report, and sorry for taking so long to reply! We think the behaviour is as intended, since the check can be computationally expensive, which turned out to be a problem for some users depending on their workflow. So we're going to apply your suggestion and update the documentation to clarify that and reference |
mpg
added a commit
to mpg/mbedtls
that referenced
this issue
Oct 25, 2018
mpg
added a commit
to mpg/mbedtls
that referenced
this issue
Oct 29, 2018
mpg
added a commit
to mpg/mbedtls
that referenced
this issue
Oct 29, 2018
mpg
added a commit
to mpg/mbedtls
that referenced
this issue
Oct 29, 2018
mpg
added a commit
to mpg/mbedtls
that referenced
this issue
Oct 29, 2018
iameli
pushed a commit
to livepeer/mbedtls
that referenced
this issue
Dec 5, 2023
Add x86 SIMD optimizations to crypto datatypes
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
mbedTLS does not verify that the public/private key pair matches when doing a handshake, resulting in client side public key signature verification errors if they don't match. This was tested on 2.2.1.
If this is the desired behavior then the documentation of
mbedtls_ssl_conf_own_cert()
should be updated to mention this fact and also point tombedtls_pk_check_pair()
.The text was updated successfully, but these errors were encountered: