Hi,
Mbed TLS 2.7 is no longer supported on any platform. We strongly recommend against using unmaintained versions of Mbed TLS, as they have unpatched publicly known security vulnerabilities, and will only have more of them as time passes.
Currently the only maintained version of Mbed TLS are the latest 2.16.x release (though note it's EOL at the end of the calendar year), the latest 2.x.y release, and the latest 3.x.y release. See https://github.com/ARMmbed/mbedtls/blob/development/BRANCHES.md
Regards,
Manuel.
From: mbed-tls <mbed-tls-bounces@lists.trustedfirmware.org> on behalf of lekshmi g via mbed-tls <mbed-tls@lists.trustedfirmware.org>
Sent: 16 September 2021 07:40
To: mbed-tls@lists.trustedfirmware.org <mbed-tls@lists.trustedfirmware.org>
Subject: [mbed-tls] Doubt in mbedtls version support for libiec61850-1.5When we are using the version mbedtls-2.16.6 with libiec61850-1.5, the TLS connection is established successfully. But when we use the 2.7.19, the connection fails(we renamed mbedtls 2.7.19 as mbedtls 2.16 and put in the folder third_party\mbedtls ).
We had occurred following error during the execution of client- server example programs tls_server_example and tls_client_example using 2.7.19 version.
During handshaking process till CASE " MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC " it worked as expected.
But In CASE "MBEDTLS_SSL_CLIENT_FINISHED" the return value should be zero.
But we got in function mbedtls_ssl_safer_memcmpmac_peer==41155316
mac_expect==41155356
diff=255 (this value has to be 0 for connection establishment)
But we are getting 255 constantly in all runnings.Kindly help us to resolve the issue. If this issue is due to the non supporting of mbedtls version ?.Thanks in advance.
Please let us know the supporting versions of mbedtls for libiec61850-1.5 .