Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

KDF layer, ECIES, PKCS#8, ... #258

Closed

Conversation

SergeySeroshtan
Copy link

  1. Implement kdf1 and kdf2 algorithms
  2. Implement ECIES algoritm
  3. Add ability to save private keys in PKCS#8 encrypted format
  4. And other...

… assumes 2s complement for numbers, so the leftmost bit should be 0 for positive numbers and 1 for negative numbers.
…() it option to determine actual number of bytes written to the output buffer.
… it option to determine actual number of bytes written to the output buffer.
… allow write private keys to the PKCS#8 structure.
# Conflicts:
#	library/error.c
#	tests/Makefile
#	tests/suites/test_suite_pk.function
@miklis
Copy link

miklis commented Oct 29, 2015

Automatic CI verification build not done, please verify manually.

@SergeySeroshtan
Copy link
Author

Automatic CI verification build is done.

@SergeySeroshtan
Copy link
Author

For each feature will be created separate pull request.

@cfogelklou
Copy link

Hi, I would love to use ECIES on an embedded system. Any chance that these have been broken into pull requests yet, and merged soon?

@SergeySeroshtan
Copy link
Author

Hi, Chris. I can easily make PR to the main repository, but here is some issues:

  • ECIES algorithm is not standardized;
  • ECIES use algorithms that also missed in the MbedTLS: KDF1, KDF2.

Also our fork VirgilSecurity/mbedtls contains additional features, i.e. implementing internet draft and algorithms X25519 and Ed25519.

So ARM MbedTLS should first decide which features include to the main repository, and then I'll make correspond PR.

Patater pushed a commit to Patater/mbedtls that referenced this pull request Feb 10, 2020
The signature must have exactly the same length as the key, it can't
be longer. Fix Mbed-TLS#258

If the signature doesn't have the correct size, that's an invalid
signature, not a problem with an output buffer size. Fix the error code.

Add test cases.
hanno-becker pushed a commit to hanno-becker/mbedtls that referenced this pull request Jul 20, 2021
…84_CertificateVerify_Parsing

Fix for review of ssl_read_certificate_verify_parse
iameli pushed a commit to livepeer/mbedtls that referenced this pull request Dec 5, 2023
add AES-GCM to DTLS-SRTP Protection Profiles v2
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants