-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Switch generate_psa_test.py to automatic dependencies for negative test cases #157
Switch generate_psa_test.py to automatic dependencies for negative test cases #157
Conversation
af1f05f
to
99aa44c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks!
Fix psa_key_agreement_iop_setup() (and psa_key_agreement_iop_complete()) happily parsing key material as an ECC private key even when it is different (e.g. an ECC public key), and happily performing ECDH even when passed a different algorithm (e.g. FFDH), when nothing else goes wrong. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
…ible Detect a bad algorithm later, so that psa_key_agreement_iop_setup() returns the same error as psa_key_agreement() in more error cases. This simplifies testing, and in particular makes test_suite_psa_crypto pass without requiring changes in `psa_exercise_key.c`. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
137b577
99aa44c
to
137b577
Compare
I've rebased on top of the latest The CI still needs Mbed-TLS/mbedtls#9909 to pass. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
The CI has passed on Mbed-TLS/mbedtls#9909 at Mbed-TLS/mbedtls@13c418d, thus I'm merging. |
1bc29c9
into
Mbed-TLS:development
This completes the forward port of Mbed-TLS/mbedtls#9025. This is mostly happening in the framework, but a follow-up to #144 is also needed here.
The CI is expected to fail here due to needing an updated framework in mbedtls. The CI should pass in the consuming PR.
PR checklist