Closed skelsec closed 2 years ago
Additional info: I'm using the pip packaged version here. I tried to compile it myself on my Ubuntu 20.04 machine. Compilation was done without errors, but when importing the mbedtls
package I got segfault.
I expect to get a WantReadError or a WantWriteError and be able to obtain the initial handshake bytes
Yes, I am aware of that and it is partly fixed on master. I am still working on it, however. The changes required are not trivial.
but when importing the mbedtls package I got segfault
The bindings only support the latest mbedtls 2.6 (I have 2.16.12 on my own machine now). You should probably set LD_LIBRARY_PATH
or use auditwheel
on Linux or delocate
on MacOS. I would recommend using the scripts under scripts
, such as scripts/download*
and scripts/install-pymbedtls*
.
Awesome project, thank you for it!
Thank you!
I have added a comprehensive test on master with a full handshake using the wrapped buffer. I checked that calling do_handshake()
on the wrong end raises WantReadError
or WantWriteError
but I have no test for that yet. I have to think how to organise the code better.
NOTE: Please use stackoverflow for support questions. This repository's issues are reserved for feature requests and bug reports.
I am submitting a …
Description
I'm trying to set up a client context and inspect the handshake messages without using sockets.
# _pep543.TLSWrappedBuffer
Current behavior
When invoking
do_handshake()
I getmbedtls.exceptions.TLSError: TLSError([0x7100] 'SSL - Bad input parameters to function')
Expected behavior
I expect to get a
WantReadError
or aWantWriteError
and be able to obtain the initial handshake bytesSteps to reproduce
This should produce
WantWriteError
Minimal demo of the problem
Other information
Awesome project, thank you for it!