Closed
Description
After a call to connect
- WiFiSecureClient corrupts/truncates/overwrites the client cert (buffer passed into it). (This can be seen by adding a print of the certificate before and after the connect call).
This obviously renders subsequent calls to "connect" inoperable, as the cert is no longer valid, and possibly points to wider memory corruption.
I have traced the source corruption to the rmbedtls_pk_parse_key
call within start_ssl_client
.
I have no mbedtls source, so I don't know if it's a problem with the function, or if ssl_client->client_cert
is of insufficient size to hold the parsed cert...
Metadata
Metadata
Assignees
Labels
No labels