-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS1.3: p11prov_DeriveKey:Host out of memory #437
Comments
Hi @simo5 Are you planning to merge this commit simo5@75cc2c3 to main branch? |
@kshitizvars I guess I should eventually, I had forgotten I written that code ... |
Hi @simo5 FYI, I have tested simo5@75cc2c3 patch after running TLS1.2 & TLS1.3. |
Hi @simo5
We are able to run ECDH key exchange operations on tls1.2, but facing some issues in tls1.3.
On further debugging, it is because of wrong client public key point (EC_POINT) and its length:-
TLS1.3 logs
TLS1.2 logs
Do you have any comments?
Debug logs:-
debug_tls1_2.log
debug_tls1_3.log
A clear and concise description of what the bug is.
To Reproduce
Steps to reproduce the behavior:
$ openssl s_server -key "pkcs11:model=OP-TEE%20TA;manufacturer=Linaro;serial=0000000000000001;token=token0;id=%01;object=ecc-key-256;type=private?pin-value=1234" -cert server.crt -accept 443
#Client side command:-
$ openssl s_client -connect <server ip>:443 -tls1_3 -ciphersuites 'TLS_AES_256_GCM_SHA384' -curves secp256r1
Expected behavior
TLS1.3 connection should work fine with key exchange operation.
Operating environment (please complete the following information):
Does this mean, we haven't tested ECDH derive with provider in TLS1.3?
The text was updated successfully, but these errors were encountered: