mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-11-11 05:22:30 +03:00
And use it in the non-PSA version of mbedtls_pk_sign_ext() to bypass checks that didn't succeed when used by TLS 1.3. That is because in the failing scenarios the padding of the RSA context is not set to PKCS_V21. See the discussion on PR #7930 for more details. Signed-off-by: Tomi Fontanilles <129057597+tomi-font@users.noreply.github.com>
8.1 KiB
8.1 KiB