-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: return error when verify empty cert chain #308
fix: return error when verify empty cert chain #308
Conversation
bors r+ |
Timed out. |
bors r=[raoulstrackx] |
This PR was included in a batch that successfully built, but then failed to merge into master. It will not be retried. Additional information: Response status code: 422
{"message":"This branch must not contain merge commits.","documentation_url":"https://docs.github.com/articles/about-protected-branches"} |
bors r+ |
bors r+ |
Already running a review |
835d85a
to
aa0425e
Compare
Canceled. |
Hi @raoulstrackx , could you please approve the PR instead of using bors? |
aa0425e
to
e282c66
Compare
bors ping |
pong |
bors r+ |
308: fix: return error when verify empty cert chain r=Taowyoo a=Taowyoo For #307 on master. Several back-port PRs needed for older versions. Only return X509BadInputData error when candidate certificate chain is empty because: - underlying `mbedtls` does not have null pointer check on it. - underlying `mbedtls` has null pointer check on `trust_ca` chain during the process of finding parent certificate in the chain. Co-authored-by: Yuxiang Cao <yuxiang.cao@fortanix.com>
bors merge |
Already running a review |
bors cancel |
Canceled. |
bors r+ |
Build succeeded! The publicly hosted instance of bors-ng is deprecated and will go away soon. If you want to self-host your own instance, instructions are here. If you want to switch to GitHub's built-in merge queue, visit their help page.
|
For #307 on master.
Several back-port PRs needed for older versions.
Only return X509BadInputData error when candidate certificate chain is empty because:
mbedtls
does not have null pointer check on it.mbedtls
has null pointer check ontrust_ca
chain during the process of finding parent certificate in the chain.