Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Move mbedtls_dev to mbedtls_framework in the framework repo #15

Merged
merged 10,000 commits into from
May 27, 2024
This pull request is big! We’re only showing the most recent 250 commits.

Commits on Mar 15, 2024

  1. Configuration menu
    Copy the full SHA
    1987a7c View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8858 from waleed-elmelegy-arm/add_alpn_to_session

    Add ALPN information in session tickets
    ronald-cron-arm authored Mar 15, 2024
    Configuration menu
    Copy the full SHA
    6bee910 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8924 from Ryan-Everett-arm/threading-same-key-tests

    Add testing for concurrently loading/using/destroying the same key
    paul-elliott-arm authored Mar 15, 2024
    Configuration menu
    Copy the full SHA
    44ccc87 View commit details
    Browse the repository at this point in the history
  4. Update changelog

    Expand MSVC to Visual Studio and announce the moving of the solution
    files.
    
    Signed-off-by: Bence Szépkúti <[email protected]>
    bensze01 committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    a32546c View commit details
    Browse the repository at this point in the history
  5. Drop reference to Visual Studio 2013 from config

    All supported versions of Visual Studio support AESNI, so drop the
    version number.
    
    Signed-off-by: Bence Szépkúti <[email protected]>
    bensze01 committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    e05b542 View commit details
    Browse the repository at this point in the history
  6. Fix bug in ALPN negotiating

    Signed-off-by: Waleed Elmelegy <[email protected]>
    waleed-elmelegy-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    131b2ff View commit details
    Browse the repository at this point in the history
  7. Add ALPN checking when accepting early data

    Signed-off-by: Waleed Elmelegy <[email protected]>
    waleed-elmelegy-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    4dfb0e7 View commit details
    Browse the repository at this point in the history
  8. Merge pull request #8914 from ronald-cron-arm/resumption-early-data-c…

    …ompat-tests
    
    TLS 1.3: Resumption and early data compatibility tests
    ronald-cron-arm authored Mar 15, 2024
    Configuration menu
    Copy the full SHA
    0edef1c View commit details
    Browse the repository at this point in the history
  9. pk_import_into_psa: test persistent keys

    Test the behavior of mbedtls_pk_get_psa_attributes() and
    mbedtls_pk_import_into_psa() with respect to lifetime. In particular, test
    that they work with persistent keys as documented.
    
    Test cases generated by the following script:
    ```
    for old in [('transparent', '0:0:1'),
                ('opaque volatile [export]', '1:0:1'),
                ('opaque volatile [copy]', '1:0:0'),
                ('opaque persistent [export]', '1:1:1'),
                ('opaque persistent [copy]', '1:1:0')]:
        for to_public in [('pair', '0'),
                          ('public', '1')]:
            for to_persistent in [('volatile', '0'),
                                  ('persistent', '1')]:
                depends = ('\ndepends_on:MBEDTLS_USE_PSA_CRYPTO'
                           if old[0].startswith('opaque')
                           else '')
                print(f"""\
    PSA import into PSA: {old[0]} -> {to_persistent[0]} {to_public[0]}{depends}
    pk_import_into_psa_lifetime:{old[1]}:{to_public[1]}:{to_persistent[1]}
    """)
    ```
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    a69572b View commit details
    Browse the repository at this point in the history
  10. Merge pull request #8923 from bensze01/drop-old-compilers

    Drop Support for MSVC 2013, 2015 and Arm Compiler 5
    bensze01 authored Mar 15, 2024
    Configuration menu
    Copy the full SHA
    567591e View commit details
    Browse the repository at this point in the history
  11. Fix minor style issues

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    7827996 View commit details
    Browse the repository at this point in the history
  12. Remove experimental warnings related to early data

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    933aec8 View commit details
    Browse the repository at this point in the history
  13. Merge pull request #8918 from ronald-cron-arm/improve-tls-srv-version…

    …-nego-testing
    
    TLS: Improve server version negotiation testing
    mpg authored Mar 15, 2024
    Configuration menu
    Copy the full SHA
    62ac993 View commit details
    Browse the repository at this point in the history
  14. Improve the change log

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    582865f View commit details
    Browse the repository at this point in the history
  15. Fix documentation about anti-replay defenses

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    3996ebc View commit details
    Browse the repository at this point in the history
  16. Improve tls13-support.md

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    a9bdc8f View commit details
    Browse the repository at this point in the history
  17. Merge pull request #8911 from waleed-elmelegy-arm/check-alpn-when-rec…

    …eiving-early-data
    
    Check ALPN when receiving early data
    ronald-cron-arm authored Mar 15, 2024
    Configuration menu
    Copy the full SHA
    a457633 View commit details
    Browse the repository at this point in the history
  18. Start subsystem IDs at 1 instead of 0

    Catch potential invalid calls to init.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    0db6a90 View commit details
    Browse the repository at this point in the history
  19. Add comments about RNG mutex requirements

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    d35dce6 View commit details
    Browse the repository at this point in the history
  20. Add explanatory comment for init flags

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    b24e36d View commit details
    Browse the repository at this point in the history
  21. Merge pull request #8930 from ronald-cron-arm/tls13-doc-update

    TLS 1.3: Documentation update for 3.6 release
    mpg authored Mar 15, 2024
    Configuration menu
    Copy the full SHA
    c9db499 View commit details
    Browse the repository at this point in the history
  22. Update slot transition diagram

    Adds missing transition and italicises internal functions
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    c408ef4 View commit details
    Browse the repository at this point in the history
  23. Respond to feedback on psa-thread-safety.md

    A few typo fixes, extrapolations and extra details.
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    f266b51 View commit details
    Browse the repository at this point in the history
  24. Merge pull request #8901 from paul-elliott-arm/make_psa_global_data_safe

    Make PSA global_data thread safe
    paul-elliott-arm authored Mar 15, 2024
    Configuration menu
    Copy the full SHA
    78064ac View commit details
    Browse the repository at this point in the history

Commits on Mar 17, 2024

  1. Add changelog entry for threading MVP

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Mar 17, 2024
    Configuration menu
    Copy the full SHA
    7d8fd3f View commit details
    Browse the repository at this point in the history

Commits on Mar 18, 2024

  1. Merge pull request #8921 from gilles-peskine-arm/pk_import_into_psa-t…

    …est-lifetime
    
    pk_import_into_psa: test persistent keys
    mpg authored Mar 18, 2024
    Configuration menu
    Copy the full SHA
    1053da8 View commit details
    Browse the repository at this point in the history
  2. Update docs/architecture/psa-thread-safety/psa-thread-safety.md

    Co-authored-by: Paul Elliott <[email protected]>
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm and paul-elliott-arm authored Mar 18, 2024
    Configuration menu
    Copy the full SHA
    765b75f View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8934 from paul-elliott-arm/add_threading_changelog

    Add changelog entry for threading MVP
    mpg authored Mar 18, 2024
    Configuration menu
    Copy the full SHA
    47f8d0e View commit details
    Browse the repository at this point in the history
  4. Check file content to see if it looks auto-generated

    Signed-off-by: Dave Rodgman <[email protected]>
    daverodgman committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    2a9eb22 View commit details
    Browse the repository at this point in the history
  5. line length fix

    Signed-off-by: Dave Rodgman <[email protected]>
    daverodgman committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    4e4540d View commit details
    Browse the repository at this point in the history
  6. Merge pull request #8928 from Ryan-Everett-arm/update-psa-thread-safe…

    …ty-docs
    
    Update psa-thread-safety.md to reflect version 3.6 changes
    daverodgman authored Mar 18, 2024
    Configuration menu
    Copy the full SHA
    5ce1577 View commit details
    Browse the repository at this point in the history
  7. Enable TLS 1.3 by default

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    27eb68d View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    a3f385d View commit details
    Browse the repository at this point in the history
  9. all.sh: Adapt/Fix some components

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    46ac065 View commit details
    Browse the repository at this point in the history
  10. all.sh: Add TLS 1.2 only component

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    d2cb7f4 View commit details
    Browse the repository at this point in the history
  11. Minor relaxation to auto-gen regex

    Signed-off-by: Dave Rodgman <[email protected]>
    daverodgman committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    1bd787a View commit details
    Browse the repository at this point in the history
  12. Clarify design decision in light of actions

    We were successful in adding transparent memory-poisoning testing, so
    simplify to the real design decision we made.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    331b2cf View commit details
    Browse the repository at this point in the history
  13. Rename mbedtls_psa_core_poison_memory()

    The actual functions were called mbedtls_test_memory_poison()
    and mbedtls_test_memory_unpoison(). Update the design section to
    reflect this.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    3f2dcdd View commit details
    Browse the repository at this point in the history
  14. Abstractify example in design exploration

    Since this is just an example, remove specific-sounding references to
    mbedtls_psa_core_poison_memory() and replace with more abstract and
    generic-sounding memory_poison_hook() and memory_unpoison_hook().
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    1c3b227 View commit details
    Browse the repository at this point in the history
  15. Add issues fixed to changelog entry

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    f5f4854 View commit details
    Browse the repository at this point in the history
  16. Add discussion of copying conveience macros

    Namely LOCAL_INPUT_DECLARE() and friends
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    5ea99af View commit details
    Browse the repository at this point in the history
  17. Merge pull request #8939 from daverodgman/codestyle-autogen

    Codestyle autogen fix
    daverodgman authored Mar 18, 2024
    Configuration menu
    Copy the full SHA
    3747042 View commit details
    Browse the repository at this point in the history
  18. Update BRANCHES

    Signed-off-by: Dave Rodgman <[email protected]>
    daverodgman committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    1fdf9d0 View commit details
    Browse the repository at this point in the history
  19. Discuss test wrappers and updating them

    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    12b35bf View commit details
    Browse the repository at this point in the history
  20. Mention MBEDTLS_TEST_MEMORY_CAN_POISON

    The configuration of memory poisoning is now performed via
    compile-time detection setting MBEDTLS_MEMORY_CAN_POISON. Update
    the design to take account of this.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    872ee6e View commit details
    Browse the repository at this point in the history
  21. Mention metatest.c

    Add a note that validation of validation was implemented in metatest.c
    and explain briefly what that program is for.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    4d01066 View commit details
    Browse the repository at this point in the history
  22. test_suite_pk: extend pk_psa_wrap_sign_ext()

    Try to perform verify_ext() using the opaque context when the
    key type is MBEDTLS_PK_RSASSA_PSS. This currently leads to a
    crash while running the test suite and this will be fixed by
    the next commit.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    d59caf4 View commit details
    Browse the repository at this point in the history
  23. pk: check PK context type in mbedtls_pk_verify_ext() before trying RS…

    …A PSS
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    07500fd View commit details
    Browse the repository at this point in the history
  24. Replace reference to master

    Signed-off-by: Dave Rodgman <[email protected]>
    daverodgman committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    0da8c51 View commit details
    Browse the repository at this point in the history
  25. Merge pull request #8940 from paul-elliott-arm/add_fixes_to_threading…

    …_changelog
    
    Add issues fixed to threading MVP changelog entry
    paul-elliott-arm authored Mar 18, 2024
    Configuration menu
    Copy the full SHA
    92152dc View commit details
    Browse the repository at this point in the history
  26. Remove 'Question' line around testing

    This question has been resolved, as we know that we can test
    transparently.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    0ea8071 View commit details
    Browse the repository at this point in the history
  27. Mention MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS

    Explain this option and the way it relates to the copying macros.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    3147034 View commit details
    Browse the repository at this point in the history
  28. add changelog

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    8ad5be0 View commit details
    Browse the repository at this point in the history
  29. Merge pull request #1202 from davidhorstmann-arm/update-buffer-sharin…

    …g-design-doc
    
    Rewrite PSA shared memory design document
    davidhorstmann-arm authored Mar 18, 2024
    Configuration menu
    Copy the full SHA
    720c72b View commit details
    Browse the repository at this point in the history
  30. ssl_mail_client: Fix code style issue

    Signed-off-by: Mingjie Shen <[email protected]>
    szsam committed Mar 18, 2024
    Configuration menu
    Copy the full SHA
    d97b96f View commit details
    Browse the repository at this point in the history

Commits on Mar 19, 2024

  1. test_suite_pk: always test verify_ext with opaque keys in pk_psa_wrap…

    …_sign_ext()
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    da47518 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8932 from ronald-cron-arm/enable-tls13-by-default

    Enable TLS 1.3 by default
    mpg authored Mar 19, 2024
    Configuration menu
    Copy the full SHA
    af14b89 View commit details
    Browse the repository at this point in the history
  3. Check C/C++ compilers separately for AppleClang ranlib

    Signed-off-by: Steven WdV <[email protected]>
    stevenwdv committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    9f0858d View commit details
    Browse the repository at this point in the history
  4. Merge pull request #8942 from valeriosetti/fix-null-dereference

    [Bugfix] Fix null dereference in `mbedtls_pk_verify_ext()`
    gilles-peskine-arm authored Mar 19, 2024
    Configuration menu
    Copy the full SHA
    b2b9068 View commit details
    Browse the repository at this point in the history
  5. tls13: srv: Fix potential stack buffer overread

    Fix potential stack buffer overread when
    checking PSK binders.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    a5c5c58 View commit details
    Browse the repository at this point in the history
  6. test_suite_pk: reshape pk_psa_sign()

    The behavior of the functions is kept intact. Changes concern:
    - generate the initial PK context using PSA parameters only; this
      allows to remove 1 input parameter for the test function.
    - add/fix comments.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    d38480b View commit details
    Browse the repository at this point in the history
  7. test_suite_pk: rename some variables in pk_psa_sign()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    c262561 View commit details
    Browse the repository at this point in the history
  8. test_suite_pk: fix RSA issue in pk_psa_sign() when !PK_[PARSE|WRITE]_…

    …C are defined
    
    This bug was not found until now because:
    - !PK_[WRITE|PARSE]_C is only tested in component_full_no_pkparse_pkwrite()
    - the test only case concerning RSA key had MBEDTLS_PK_WRITE_C as dependency
      so it was not executed in that component.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    d971b78 View commit details
    Browse the repository at this point in the history
  9. pk_wrap: fix algorithm selection in rsa_opaque_sign_wrap()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    4f3262d View commit details
    Browse the repository at this point in the history
  10. Merge pull request #1207 from ronald-cron-arm/binder-overread

    tls13: srv: Fix potential stack buffer overread
    gilles-peskine-arm authored Mar 19, 2024
    Configuration menu
    Copy the full SHA
    4fc5b71 View commit details
    Browse the repository at this point in the history
  11. test_suite_pk: test also RSA keys with PKCS1 v2.1 padding mode in pk_…

    …psa_sign()
    
    Previously only only PKCS1 v1.5 was tested.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    aa9cc49 View commit details
    Browse the repository at this point in the history
  12. Configuration menu
    Copy the full SHA
    f71c060 View commit details
    Browse the repository at this point in the history
  13. Merge branch 'development' into 'development-restricted'

    Signed-off-by: Minos Galanakis <[email protected]>
    minosgalanakis committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    b70f0fd View commit details
    Browse the repository at this point in the history

Commits on Mar 20, 2024

  1. test_suite_pk: simplify pk_copy_from_psa_success()

    Use mbedtls_test_key_consistency_psa_pk() to verify that the
    generated PK contexts match with the original PSA keys instead
    of doing sign/verify and encrypt/decrypt.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 20, 2024
    Configuration menu
    Copy the full SHA
    237424b View commit details
    Browse the repository at this point in the history
  2. test_suite_pk: fix guards in pk_psa_sign()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 20, 2024
    Configuration menu
    Copy the full SHA
    480dfc7 View commit details
    Browse the repository at this point in the history
  3. pk_wrap: fix algorithm selection in rsa_opaque_decrypt()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 20, 2024
    Configuration menu
    Copy the full SHA
    d45836a View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    1b533ab View commit details
    Browse the repository at this point in the history
  5. test_suite_pk: fix guards in pk_psa_sign()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 20, 2024
    Configuration menu
    Copy the full SHA
    6fb2586 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    027796c View commit details
    Browse the repository at this point in the history
  7. pkwrite: add new internal symbol for the max supported public key DER…

    … length
    
    This is also used in pk_psa_sign() to properly size buffers holding
    the public key.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 20, 2024
    Configuration menu
    Copy the full SHA
    144c27b View commit details
    Browse the repository at this point in the history
  8. add changelog

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 20, 2024
    Configuration menu
    Copy the full SHA
    ea01efa View commit details
    Browse the repository at this point in the history
  9. Merge pull request #1208 from Mbed-TLS/origin/dev/minosgalanakis/deve…

    …lopment-restricted-merge-19032024
    
     Merge development on restricted 10/03/2024
    minosgalanakis authored Mar 20, 2024
    Configuration menu
    Copy the full SHA
    e331dde View commit details
    Browse the repository at this point in the history

Commits on Mar 21, 2024

  1. test_suite_pk: fix guards in pk_psa_sign()

    If the public key is exported with mbedtls_pk_write_pubkey_der()
    it should be re-imported with mbedtls_pk_parse_public_key().
    Alternative options (when PK_WRITE is not defined), i.e.
    mbedtls_ecp_point_write_binary() and mbedtls_rsa_write_pubkey(),
    export the key in a different format which cannot be parsed by
    pk_parse module so mbedtls_ecp_point_read_binary() and
    mbedtls_rsa_parse_pubkey() should be used respectively in this
    case.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 21, 2024
    Configuration menu
    Copy the full SHA
    2833050 View commit details
    Browse the repository at this point in the history
  2. ssl-opt.sh: Improve version selection test titles

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 21, 2024
    Configuration menu
    Copy the full SHA
    35884a4 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8951 from valeriosetti/issue8938

    mbedtls_pk_setup_opaque always uses PKCS#1v1.5 for RSA keys
    mpg authored Mar 21, 2024
    Configuration menu
    Copy the full SHA
    32a96d6 View commit details
    Browse the repository at this point in the history
  4. Merge pull request #8941 from daverodgman/branches-3.6lts

    Update BRANCHES for 3.6
    minosgalanakis authored Mar 21, 2024
    Configuration menu
    Copy the full SHA
    5a9020f View commit details
    Browse the repository at this point in the history
  5. Merge pull request #8586 from lpy4105/issue/fix-fake-case-listed-in-c…

    …ompat_sh
    
    Fix fake cases listed of compat.sh
    mpg authored Mar 21, 2024
    Configuration menu
    Copy the full SHA
    2107feb View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    d9d6435 View commit details
    Browse the repository at this point in the history
  7. pk: fix documentation for mbedtls_pk_setup_opaque()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 21, 2024
    Configuration menu
    Copy the full SHA
    f5a6e22 View commit details
    Browse the repository at this point in the history
  8. pk: improve documentation of mbedtls_pk_setup_opaque()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 21, 2024
    Configuration menu
    Copy the full SHA
    622f905 View commit details
    Browse the repository at this point in the history
  9. pk: fix documentation for mbedtls_pk_setup_opaque()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 21, 2024
    Configuration menu
    Copy the full SHA
    55ed91e View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    18702d9 View commit details
    Browse the repository at this point in the history
  11. pk: fix description of mbedtls_pk_setup_opaque()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 21, 2024
    Configuration menu
    Copy the full SHA
    80cd479 View commit details
    Browse the repository at this point in the history
  12. Configuration menu
    Copy the full SHA
    fc6b22c View commit details
    Browse the repository at this point in the history
  13. Configuration menu
    Copy the full SHA
    42a3954 View commit details
    Browse the repository at this point in the history

Commits on Mar 22, 2024

  1. Merge pull request #8967 from ronald-cron-arm/improve-version-selecti…

    …on-tests-titles
    
    ssl-opt.sh: Improve version selection test titles
    mpg authored Mar 22, 2024
    Configuration menu
    Copy the full SHA
    e2925ef View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8957 from valeriosetti/issue8836

    Unify consistency tests for mbedtls_pk_import_into_psa and mbedtls_pk_copy_from_psa
    mpg authored Mar 22, 2024
    Configuration menu
    Copy the full SHA
    611f899 View commit details
    Browse the repository at this point in the history
  3. Fix #ifdef guard in driver wrapper template

    The #ifdef guard in the get_builtin_key() should be
    PSA_CRYPTO_ACCELERATOR_DRIVER_PRESENT to allow for
    multiple drivers to be plugged into the wrapper.
    
    Signed-off-by: Antonio de Angelis <[email protected]>
    adeaarm authored and minosgalanakis committed Mar 22, 2024
    Configuration menu
    Copy the full SHA
    700632e View commit details
    Browse the repository at this point in the history
  4. Merge pull request #8980 from adeaarm/fix_jinja_template

    Signed-off-by: Minos Galanakis <[email protected]>
    minosgalanakis committed Mar 22, 2024
    Configuration menu
    Copy the full SHA
    96948e9 View commit details
    Browse the repository at this point in the history
  5. Assemble Changelog

    Signed-off-by: Minos Galanakis <[email protected]>
    minosgalanakis committed Mar 22, 2024
    Configuration menu
    Copy the full SHA
    2c1daef View commit details
    Browse the repository at this point in the history
  6. Version Bump for 3.6.0

    ./scripts/bump_version.sh --version 3.6.0 --so-crypto 16 --so-x509 7  --so-tls 21
    
    Signed-off-by: Minos Galanakis <[email protected]>
    minosgalanakis committed Mar 22, 2024
    Configuration menu
    Copy the full SHA
    4492dbd View commit details
    Browse the repository at this point in the history
  7. pk: simplify mbedtls_pk_sign_ext()

    In case of opaque keys skip the check of the supported primary/enrollment
    algorithms. Just try to perfom the signature and if the wrapped key
    does not support RSA PSS the operation will fail automatically.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 22, 2024
    Configuration menu
    Copy the full SHA
    afa6d51 View commit details
    Browse the repository at this point in the history
  8. test_suite_pk: add failing check for sign_ext() in pk_psa_wrap_sign_e…

    …xt()
    
    If the wrapped key has a PKCS1 v1.5 signature algorithm, then try
    to call sign_ext() to perform PSA RSS. Of course this will fail
    because it's not supported by the wrapped key.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 22, 2024
    Configuration menu
    Copy the full SHA
    f0d4c9a View commit details
    Browse the repository at this point in the history
  9. pk: add check_pair info to mbedtls_pk_setup_opaque() documentation

    This also updates use-psa-crypto.md accordingly.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 22, 2024
    Configuration menu
    Copy the full SHA
    ac81e23 View commit details
    Browse the repository at this point in the history
  10. Fix some Changelog typos

    Signed-off-by: Minos Galanakis <[email protected]>
    minosgalanakis committed Mar 22, 2024
    Configuration menu
    Copy the full SHA
    8d94aec View commit details
    Browse the repository at this point in the history
  11. Autogenerated files for 3.6.0

    Signed-off-by: Minos Galanakis <[email protected]>
    minosgalanakis committed Mar 22, 2024
    Configuration menu
    Copy the full SHA
    e8a6833 View commit details
    Browse the repository at this point in the history
  12. Merge pull request #1213 from Mbed-TLS/mbedtls-3.6.0rc0-pr

    Mbedtls 3.6.0 Release Candidate
    minosgalanakis authored Mar 22, 2024
    Configuration menu
    Copy the full SHA
    7424296 View commit details
    Browse the repository at this point in the history

Commits on Mar 25, 2024

  1. pk: fix typos in description of mbedtls_pk_setup_opaque()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 25, 2024
    Configuration menu
    Copy the full SHA
    f9f63ed View commit details
    Browse the repository at this point in the history
  2. test_suite_pk: test check_pair() also with opaque RSA keys

    check_pair() is not supported by opaque RSA keys, but we want
    to be sure that calling this functions fails nicely instead
    for crashing.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 25, 2024
    Configuration menu
    Copy the full SHA
    ec2cfb0 View commit details
    Browse the repository at this point in the history

Commits on Mar 26, 2024

  1. Record size limit support is released, so remove warning about only f…

    …or testing
    
    Signed-off-by: Tom Cosgrove <[email protected]>
    tom-cosgrove-arm authored and minosgalanakis committed Mar 26, 2024
    Configuration menu
    Copy the full SHA
    1b3b174 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    f02c6ef View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8989 from tom-cosgrove-arm:fix-typo-in-psa_key_pr…

    …oduction_parameters_t-doc
    
    Signed-off-by: Minos Galanakis <[email protected]>
    minosgalanakis committed Mar 26, 2024
    Configuration menu
    Copy the full SHA
    a11b9d6 View commit details
    Browse the repository at this point in the history
  4. Merge pull request #8990 from tom-cosgrove-arm:record-size-limit-supp…

    …ort-is-now-released
    
    Signed-off-by: Minos Galanakis <[email protected]>
    minosgalanakis committed Mar 26, 2024
    Configuration menu
    Copy the full SHA
    078f823 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    2ca6c28 View commit details
    Browse the repository at this point in the history

Commits on Mar 27, 2024

  1. Guard ticket specific TLS 1.3 function with macro

    Guard ssl_tls13_write_new_session_ticket_coordinate with
    MBEDTLS_SSL_SESSION_TICKETS macro.
    
    Signed-off-by: Norbert Fabritius <[email protected]>
    Norbert Fabritius authored and ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    96eed72 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    1f045f3 View commit details
    Browse the repository at this point in the history
  3. Unconditionally define session variable

    Signed-off-by: Norbert Fabritius <[email protected]>
    Norbert Fabritius authored and ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    d60aef0 View commit details
    Browse the repository at this point in the history
  4. Enable ssl_tls13_get_ciphersuite_hash_alg only if macro is active

    Signed-off-by: Norbert Fabritius <[email protected]>
    Norbert Fabritius authored and ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    8ceeff9 View commit details
    Browse the repository at this point in the history
  5. Constify parameter of ssl_tls13_session_load

    Signed-off-by: Norbert Fabritius <[email protected]>
    Norbert Fabritius authored and ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    d36913a View commit details
    Browse the repository at this point in the history
  6. tests: ssl: Fix session field guards

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    18b92a1 View commit details
    Browse the repository at this point in the history
  7. tests: ssl: Remove redundant test

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    ad0ee1a View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    8d15e01 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    161e14f View commit details
    Browse the repository at this point in the history
  10. all.sh: Add component testing default minus session tickets

    Signed-off-by: Norbert Fabritius <[email protected]>
    Signed-off-by: Ronald Cron <[email protected]>
    Norbert Fabritius authored and ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    d30e911 View commit details
    Browse the repository at this point in the history
  11. ssl-opt.sh: Add missing MBEDTLS_SSL_SESSION_TICKETS dependencies

    Signed-off-by: Norbert Fabritius <[email protected]>
    Signed-off-by: Jerry Yu <[email protected]>
    Signed-off-by: Ronald Cron <[email protected]>
    Norbert Fabritius authored and ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    4f1c927 View commit details
    Browse the repository at this point in the history
  12. tls13: cli: Ignore tickets if not supported

    If a TLS 1.3 client receives a ticket and
    the feature is not enabled, ignore it.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    7df18bc View commit details
    Browse the repository at this point in the history
  13. ssl-opt.sh: Add tests where tickets are ignored

    Add tests where we explicitely check that
    tickets are ignored on client side when
    the support is not enabled.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    ceae4f8 View commit details
    Browse the repository at this point in the history
  14. test-data: add predefined RSA and EC keys

    Automatically generated with the following bash script:
    
    ```
    LIST="secp521r1 brainpoolP512r1 secp384r1 brainpoolP384r1 secp256r1 secp256k1
        brainpoolP256r1 secp224r1 secp224k1 secp192r1 secp192k1 x25519 x448"
    
    for item in $LIST; do
        ./programs/pkey/gen_key type=ec ec_curve=$item filename="tests/data_files/ec_$item.der" format=der
    done
    
    LIST="1024 1026 1028 1030 2048 4096"
    
    for item in $LIST; do
        ./programs/pkey/gen_key type=rsa rsa_keysize=$item filename="tests/data_files/rsa_$item.der" format=der
    done
    ```
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    561e29e View commit details
    Browse the repository at this point in the history
  15. Configuration menu
    Copy the full SHA
    414daf1 View commit details
    Browse the repository at this point in the history
  16. Configuration menu
    Copy the full SHA
    c43a7a5 View commit details
    Browse the repository at this point in the history
  17. test_suite_pk: modify pk_psa_genkey() in order to use predefined keys

    Use predefined keys instead of generating them at runtime as already
    done for pk_genkey().
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    d44f99a View commit details
    Browse the repository at this point in the history
  18. test_suite_pk: remove PSA_WANT_KEY_TYPE_[ECC/RSA]_KEY_PAIR_GENERATE d…

    …ependencies
    
    EC and RSA keys are now loaded from a file so there is no need
    to generate them at runtime.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    5b94a02 View commit details
    Browse the repository at this point in the history
  19. Revert "Autogenerated files for 3.6.0"

    This reverts commit e8a6833.
    
    Signed-off-by: Minos Galanakis <[email protected]>
    minosgalanakis committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    9860056 View commit details
    Browse the repository at this point in the history

Commits on Mar 28, 2024

  1. Merge pull request #1216 from Mbed-TLS/mbedtls-3.6.0_mergeback

    Mbedtls 3.6.0 mergeback
    minosgalanakis authored Mar 28, 2024
    Configuration menu
    Copy the full SHA
    e146940 View commit details
    Browse the repository at this point in the history
  2. test_suite_pk: use look-up table instead of file for the predefined keys

    This helps dropping dependency on FS_IO.
    This commit also removes DER files that were previusly added and which
    are not more needed/used.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 28, 2024
    Configuration menu
    Copy the full SHA
    5670813 View commit details
    Browse the repository at this point in the history
  3. test_suite_pk: fix key_id initialization value

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 28, 2024
    Configuration menu
    Copy the full SHA
    fdef82c View commit details
    Browse the repository at this point in the history

Commits on Mar 29, 2024

  1. test_suite_pk: simplify pk_genkey()

    Add pk_info parameter in order to ease the requirements on the provided
    PK context. Now it can simply be initialized, but not setup.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    d8896d6 View commit details
    Browse the repository at this point in the history
  2. test_suite_pk: simplify pk_psa_genkey()

    Instead of using PK module to import/export the key in a PSA friendly
    format:
    
    - for RSA keys we use the DER input data directly;
    - for EC keys we extract the private key manually.
    
    This helps avoiding dependencies from PK_WRITE and PK_PARSE.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 29, 2024
    Configuration menu
    Copy the full SHA
    28c41ad View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8874 from stevenwdv/development

    Fix compilation on macOS without apple-clang
    paul-elliott-arm authored Mar 29, 2024
    Configuration menu
    Copy the full SHA
    30978ec View commit details
    Browse the repository at this point in the history

Commits on Apr 2, 2024

  1. test_suite_pk: add python script to generate predefined keys

    This commit adds "generate_test_keys.py" script to generate
    predefined keys used in test_suite_pk. Keys are generated with
    "programs/pkey/gen_key" tool and converted to C array using
    the python script.
    
    tests/src/test_keys.h is automatically generated using the
    above mentioned script.
    
    test_suite_pk is updated in order to use the new format.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    7126ba5 View commit details
    Browse the repository at this point in the history
  2. pk: fix unused variable in copy_from_psa()

    key_bits is unused when neither MBEDTLS_RSA_C or MBEDTLS_PK_HAVE_ECC_KEYS
    are defined.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    390f276 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    d64fcee View commit details
    Browse the repository at this point in the history
  4. Add RSA key certificates

    Add RSA key certificates using SHA256
    instead of SHA1 for the signature
    algorithm. Those are needed for some
    TLS 1.3 compatibility tests with OpenSSL 3
    to avoid having to enable in OpenSSL 3
    the support for the deprecated SHA-1 based
    signature algorithms.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    9785cf1 View commit details
    Browse the repository at this point in the history
  5. ssl-opt.sh: Adapt tests to OpenSSL 3

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    ceea3e2 View commit details
    Browse the repository at this point in the history
  6. Use latest installed OpenSSL 3 as OPENSSL_NEXT

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    c5e81d2 View commit details
    Browse the repository at this point in the history
  7. test_suite_pk: fix guards

    Now that key generation has been replaced with parsing predefined
    keys, guards for MBEDTLS_PK_PARSE_C need to be added in test
    code.
    This commits also removes remaining usage of GENPRIME.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    26bc9c2 View commit details
    Browse the repository at this point in the history
  8. Fix compilation of ssl_tls13_generic.c when memcpy() is a function-li…

    …ke macro
    
    Fixes #8994
    
    Signed-off-by: Tom Cosgrove <[email protected]>
    tom-cosgrove-arm committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    a2c45dc View commit details
    Browse the repository at this point in the history
  9. ssl-opt.sh: Fix some test dependencies

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Apr 2, 2024
    Configuration menu
    Copy the full SHA
    3d0f182 View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    dd96c0a View commit details
    Browse the repository at this point in the history
  11. Configuration menu
    Copy the full SHA
    cf47a15 View commit details
    Browse the repository at this point in the history

Commits on Apr 3, 2024

  1. generate_test_keys.py: minor improvements

    - remove BEGIN_FILE/END_FILE lines from output header file.
    - add single disclaimer at the beginning of the file instead
      of having it repeated for every array.
    - improved exception message for missing key generation program.
    
    This commits also regenerates "test_keys.h" in order to fully
    comply with the new format.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 3, 2024
    Configuration menu
    Copy the full SHA
    3e22bf2 View commit details
    Browse the repository at this point in the history
  2. test_suite_pk: minor code fixes and comments improvements

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 3, 2024
    Configuration menu
    Copy the full SHA
    ab38fc7 View commit details
    Browse the repository at this point in the history

Commits on Apr 4, 2024

  1. pk: fix documentation of mbedtls_pk_setup_opaque()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    1c7f5de View commit details
    Browse the repository at this point in the history
  2. We now have two LTS branches to backport to.

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    b76573c View commit details
    Browse the repository at this point in the history
  3. Merge pull request #9007 from mpg/checkbox-3.6

    Add 3.6 backport checkbox to the PR template
    tom-cosgrove-arm authored Apr 4, 2024
    Configuration menu
    Copy the full SHA
    387aaff View commit details
    Browse the repository at this point in the history
  4. tls: Fix doc of mbedtls_ssl_session_save()

    Fix documentation of mbedtls_ssl_session_save()
    regarding its dependency on MBEDTLS_SSL_SESSION_TICKETS
    in TLS 1.3 session case.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    9314df6 View commit details
    Browse the repository at this point in the history
  5. tls13: Fix doc of mbedtls_ssl_session_get() - 1

    The API has eventually not been changed to
    return multiple tickets through multiple
    subsequent call to it.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    81bb589 View commit details
    Browse the repository at this point in the history
  6. tls13: Fix doc of mbedtls_ssl_session_get() - 2

    Fix documentation of mbedtls_ssl_session_get()
    regarding its interaction with session
    ticket enablement.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    66a206c View commit details
    Browse the repository at this point in the history
  7. tls13: Fix doc of mbedtls_ssl_session_set() - 1

    It was eventually decided to not support multiple
    tickets in TLS 1.3 ClientHello messages thus
    removing the parts in mbedtls_ssl_session_set()
    documentation that were anticipating that.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    d85eeae View commit details
    Browse the repository at this point in the history
  8. Merge pull request #8937 from valeriosetti/issue8712

    Clarify the documentation of mbedtls_pk_setup_opaque
    bensze01 authored Apr 4, 2024
    Configuration menu
    Copy the full SHA
    a376f84 View commit details
    Browse the repository at this point in the history
  9. Merge pull request #8987 from valeriosetti/issue8903

    Test gap: mbedtls_pk_check_pair with MBEDTLS_PK_OPAQUE
    bensze01 authored Apr 4, 2024
    Configuration menu
    Copy the full SHA
    e4d9013 View commit details
    Browse the repository at this point in the history
  10. tls13: Fix doc of mbedtls_ssl_session_set() - 2

    Fix documentation of mbedtls_ssl_session_set()
    regarding its dependency on MBEDTLS_SSL_SESSION_TICKETS
    in TLS 1.3 case.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Apr 4, 2024
    Configuration menu
    Copy the full SHA
    fe15d90 View commit details
    Browse the repository at this point in the history
  11. Configuration menu
    Copy the full SHA
    233fcaa View commit details
    Browse the repository at this point in the history

Commits on Apr 5, 2024

  1. Add change log

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Apr 5, 2024
    Configuration menu
    Copy the full SHA
    527a2eb View commit details
    Browse the repository at this point in the history

Commits on Apr 8, 2024

  1. Merge pull request #6955 from inorick/nofa_no_session_tickets

    Guard ticket specific TLS 1.3 function with macro
    mpg authored Apr 8, 2024
    Configuration menu
    Copy the full SHA
    a4b773d View commit details
    Browse the repository at this point in the history

Commits on Apr 9, 2024

  1. Correct dependancy on MBEDTLS_X509_INFO for x509parse

    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 authored and mpg committed Apr 9, 2024
    Configuration menu
    Copy the full SHA
    e2776d1 View commit details
    Browse the repository at this point in the history
  2. Fix typo in ssl test suite

    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 authored and mpg committed Apr 9, 2024
    Configuration menu
    Copy the full SHA
    7ee2833 View commit details
    Browse the repository at this point in the history
  3. Fix wrong dependency in psa_crypto_pake suite

    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 authored and mpg committed Apr 9, 2024
    Configuration menu
    Copy the full SHA
    b482a47 View commit details
    Browse the repository at this point in the history
  4. Fix wrong dependency in psa_crypto_driver_wrappers suite

    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 authored and mpg committed Apr 9, 2024
    Configuration menu
    Copy the full SHA
    7cca290 View commit details
    Browse the repository at this point in the history
  5. Add missing definition of AT_LEAST_ONE_BUILTIN_KDF

    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 authored and mpg committed Apr 9, 2024
    Configuration menu
    Copy the full SHA
    03fe253 View commit details
    Browse the repository at this point in the history
  6. Add missing dependency of fallback test in driver wrappers suite

    To pass a fallback test, we need a dependency on built-in
    implementation.
    
    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 authored and mpg committed Apr 9, 2024
    Configuration menu
    Copy the full SHA
    057ceb2 View commit details
    Browse the repository at this point in the history
  7. Fix failures in psa_cryto_driver_wrappers suite

    - "in-driver" test should depend on the present
      of a driver.
    - add new counter in key manangement driver test
      hook which counts the calls of generate_key.
    - We only care about the hits when processing
      `psa_generate_key`.
    
    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 authored and mpg committed Apr 9, 2024
    Configuration menu
    Copy the full SHA
    ebdca79 View commit details
    Browse the repository at this point in the history
  8. Fix style of preprocessor expression

    We use logical '&&' everywhere, let's be consistent.
    
    (Unless I'm mistaken, binary '&' happens to give the same results for
    booleans so this wasn't an actual bug, just style/readability issue.)
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 9, 2024
    Configuration menu
    Copy the full SHA
    0a4ffa4 View commit details
    Browse the repository at this point in the history
  9. Fix closing comment to match opening guard

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 9, 2024
    Configuration menu
    Copy the full SHA
    f53112e View commit details
    Browse the repository at this point in the history
  10. Merge pull request #8997 from mpg/fix-wrong-dep-test-case

    Fix wrong dependencies in test cases
    gilles-peskine-arm authored Apr 9, 2024
    Configuration menu
    Copy the full SHA
    32e26ef View commit details
    Browse the repository at this point in the history
  11. Merge pull request #8999 from tom-cosgrove-arm/fix-compilation-when-m…

    …emcpy-is-function-like-macro
    
    Fix compilation when memcpy() is a function-like macro
    gilles-peskine-arm authored Apr 9, 2024
    Configuration menu
    Copy the full SHA
    bee9656 View commit details
    Browse the repository at this point in the history

Commits on Apr 10, 2024

  1. generate_test_keys: use keys from asymmetric_key_data.py

    asymmetric_key_data.py already provides EC/RSA key pair values that
    are suitable for generate_test_keys.py. So instead of re-generating
    the keys using gen_key program, we use those keys.
    
    This commit also:
    - extends asymmetric_key_data.py to introduce
    RSA bit sizes that are used in test_suite_pk but were missing from
    asymmetric_key_data.py.
    - updates test_keys.h with new keys.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 10, 2024
    Configuration menu
    Copy the full SHA
    6bda5f5 View commit details
    Browse the repository at this point in the history

Commits on Apr 11, 2024

  1. compat.sh: properly report skipped tests

    Don't just silently continue.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 11, 2024
    Configuration menu
    Copy the full SHA
    0dd6ca4 View commit details
    Browse the repository at this point in the history
  2. compat.sh: properly skip unsupported DTLS 1.2

    Skipping DTLS 1.2 with old versions was already done, but now properly
    test support only once and use the results.
    
    Note that historically, this script's policy was that it's the user's
    job to find the right value of -e (EXCLUDE) for their version for
    OpenSSL & config. Now it's a weird mix of that and the script doing some
    detection and skipping.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 11, 2024
    Configuration menu
    Copy the full SHA
    cb42409 View commit details
    Browse the repository at this point in the history

Commits on Apr 12, 2024

  1. Start documenting test-driver framework.

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    1a827a3 View commit details
    Browse the repository at this point in the history
  2. Document test-driver status per family

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    b66f9db View commit details
    Browse the repository at this point in the history
  3. all.sh: group helper functions in sections

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    733a67b View commit details
    Browse the repository at this point in the history
  4. Update user-config-for-tests

    Was missing several key types and algs. Also, list those that are not
    implemented, but comment them out, to make it clearer what's not
    implemented yet.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    3dbd236 View commit details
    Browse the repository at this point in the history
  5. Document driver wrapper suite & tested configs

    The coverage data for the test drivers was generated using the following
    patch:
    
    diff --git a/scripts/lcov.sh b/scripts/lcov.sh
    index 9258ba788874..1ef071a65c06 100755
    --- a/scripts/lcov.sh
    +++ b/scripts/lcov.sh
    @@ -63,8 +63,8 @@ if [ $# -gt 0 ] && [ "$1" = "--help" ]; then
     fi
    
     if in_mbedtls_build_dir; then
    -    library_dir='library'
    -    title='Mbed TLS'
    +    library_dir='tests/src/drivers'
    +    title='Mbed TLS test drivers'
     else
         library_dir='core'
         title='TF-PSA-Crypto'
    diff --git a/tests/scripts/all.sh b/tests/scripts/all.sh
    index 734d8323ca73..f6b17ca5692b 100755
    --- a/tests/scripts/all.sh
    +++ b/tests/scripts/all.sh
    @@ -4795,14 +4795,17 @@ component_test_psa_crypto_drivers () {
         msg "build: full + test drivers dispatching to builtins"
         scripts/config.py full
         scripts/config.py unset MBEDTLS_PSA_CRYPTO_CONFIG
    -    loc_cflags="$ASAN_CFLAGS -DPSA_CRYPTO_DRIVER_TEST_ALL"
    +    loc_cflags="--coverage -DPSA_CRYPTO_DRIVER_TEST_ALL"
         loc_cflags="${loc_cflags} '-DMBEDTLS_USER_CONFIG_FILE=\"../tests/configs/user-config-for-test.h\"'"
    -    loc_cflags="${loc_cflags} -I../tests/include -O2"
    +    loc_cflags="${loc_cflags} -I../tests/include -Og -g3"
    
    -    make CC=gcc CFLAGS="${loc_cflags}" LDFLAGS="$ASAN_CFLAGS"
    +    make CC=gcc CFLAGS="${loc_cflags}" LDFLAGS="--coverage" -C tests test_suite_psa_crypto_driver_wrappers
    
         msg "test: full + test drivers dispatching to builtins"
    -    make test
    +    (cd tests && ./test_suite_psa_crypto_driver_wrappers --verbose)
    +    #make test
    +
    +    scripts/lcov.sh
     }
    
     component_test_make_shared () {
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    6a96f42 View commit details
    Browse the repository at this point in the history
  6. Rm redundant driver+built-in all.sh component

    As the comment says, this component's only goal was to make sure the
    legacy+driver test cases in test_suite_md.psa were executed.
    
    But actually these are already executed in
    component_test_psa_crypto_drivers which tests with everything having
    both a driver and the built-in, as can be seen in the outcomes file.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    1ad29c8 View commit details
    Browse the repository at this point in the history
  7. all.s: Rm redundant build-only accel components

    Most of them (2 exceptions, see below) are of the "driver + built-in"
    type, so they're all a subset of test_psa_crypto_driver which tests
    everything with driver + built-in at once.
    
    Furthermore, all those components were build-only, while
    test_psa_crypto_driver runs the test suites.
    
    Special cases: two of the components looked like they were trying to go for
    driver-only (ecdh disabling ECDH_C and hkdf disabling HKDF_C).
    
    For ECDH, built-in would actually be re-enabled because not enough was
    accelerated: you also need ECC key types and curves - see
    component_test_psa_crypto_config_accel_ecdh which does this correctly.
    
    For HKDF, we don't have test driver support for key derivation yet. I
    guess that shows how little testing value these build-only components
    really had.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    1f4c905 View commit details
    Browse the repository at this point in the history
  8. Add note about fallback to other entry points

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    b18bc80 View commit details
    Browse the repository at this point in the history
  9. Fix copy-pasta in top-of-file comment

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    4c81c34 View commit details
    Browse the repository at this point in the history
  10. Improve comment in a header file

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    70cd911 View commit details
    Browse the repository at this point in the history
  11. Update status of RSA testing

    Improved by Mbed-TLS/mbedtls#8616 - closing
    8553.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    f2089da View commit details
    Browse the repository at this point in the history
  12. Fix a typo in a comment

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    45fe86d View commit details
    Browse the repository at this point in the history
  13. Update names of components renamed in the meantime

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    98f8da1 View commit details
    Browse the repository at this point in the history
  14. Update for HMAC testing

    Been merged in the meantime.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    6c45361 View commit details
    Browse the repository at this point in the history
  15. Update of opaque asymmetric encrypt/decrypt

    Mbed-TLS/mbedtls#8700 merged in the meantime.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    dde1abd View commit details
    Browse the repository at this point in the history
  16. Update libtestdriver1 vs internal

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    0ca2fd0 View commit details
    Browse the repository at this point in the history
  17. Refine paragraphs about incomplete entry points

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    ae22f04 View commit details
    Browse the repository at this point in the history
  18. Rephrase description of the KDF situation

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    a47a3c4 View commit details
    Browse the repository at this point in the history
  19. Misc fixes & improvements to driver testing doc

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 12, 2024
    Configuration menu
    Copy the full SHA
    432e3b4 View commit details
    Browse the repository at this point in the history

Commits on Apr 15, 2024

  1. Merge pull request #8998 from ronald-cron-arm/openssl3

    Use latest installed OpenSSL 3 as OPENSSL_NEXT
    mpg authored Apr 15, 2024
    Configuration menu
    Copy the full SHA
    1fb4750 View commit details
    Browse the repository at this point in the history
  2. Add a note on hits usefulness

    And fix a typo while at it.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 15, 2024
    Configuration menu
    Copy the full SHA
    4575d23 View commit details
    Browse the repository at this point in the history
  3. generate_test_keys: fix mypy issue for imported path

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 15, 2024
    Configuration menu
    Copy the full SHA
    8f40460 View commit details
    Browse the repository at this point in the history
  4. asymmetric_key_data: fix public RSA-2048 key

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 15, 2024
    Configuration menu
    Copy the full SHA
    776dce5 View commit details
    Browse the repository at this point in the history
  5. generate_test_keys: minor improvements

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 15, 2024
    Configuration menu
    Copy the full SHA
    862d14e View commit details
    Browse the repository at this point in the history
  6. generate_test_keys: generate also RSA public key arrays

    This is to manage RSA and EC keys in the same way in order to
    prepare for the following commits.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 15, 2024
    Configuration menu
    Copy the full SHA
    59c614b View commit details
    Browse the repository at this point in the history

Commits on Apr 16, 2024

  1. generate_test_keys: generate arrays for all keys in asymmetric_key_da…

    …ta.py
    
    Only unused (from test_suite_pk point of view) EC curves are skipped.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 16, 2024
    Configuration menu
    Copy the full SHA
    7031a4e View commit details
    Browse the repository at this point in the history
  2. generate_test_keys: generate also look-up table in script

    Remove static declaration of look-up table from test_suite_pk
    and generate it automatically with Python.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 16, 2024
    Configuration menu
    Copy the full SHA
    9aa4fa9 View commit details
    Browse the repository at this point in the history
  3. test_suite_pk: fix get_predefined_key_data() return value

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 16, 2024
    Configuration menu
    Copy the full SHA
    91fdff0 View commit details
    Browse the repository at this point in the history
  4. test_suite_pk: rename pk_genkey() and pk_psa_genkey()

    - pk_genkey -> pk_setup
    - pk_psa_genkey -> pk_psa_setup
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 16, 2024
    Configuration menu
    Copy the full SHA
    1f6dab7 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    4d14581 View commit details
    Browse the repository at this point in the history
  6. test_suite_pk: use pk_setup() instead of mbedtls_rsa_gen_key() in pk_…

    …psa_wrap_sign_ext()
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 16, 2024
    Configuration menu
    Copy the full SHA
    42f2e21 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    186f458 View commit details
    Browse the repository at this point in the history
  8. test_suite_pk: remove RSA key generation/size dependencies

    - MBEDTLS_GENPRIME is removed because now we rely on predefined
      RSA keys.
    - MBEDTLS_RSA_GEN_KEY_MIN_BITS is replaced with RSA_KEY_SIZE which
      is set on top of test_suite_pk to a value which is supported
      in the predefined_keys[] array.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 16, 2024
    Configuration menu
    Copy the full SHA
    50e5979 View commit details
    Browse the repository at this point in the history
  9. test_suite_pk: remove PK_PARSE_C unnecessary dependencies

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 16, 2024
    Configuration menu
    Copy the full SHA
    57d23e2 View commit details
    Browse the repository at this point in the history

Commits on Apr 17, 2024

  1. test_suite_pk: fix guards for pk_psa_setup()

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 17, 2024
    Configuration menu
    Copy the full SHA
    37bc93c View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8566 from mpg/driver-status

    Document driver testing status
    mpg authored Apr 17, 2024
    Configuration menu
    Copy the full SHA
    68deadd View commit details
    Browse the repository at this point in the history
  3. Simplify full invocation of compat.sh

    We actually only need two invocations.
    
    This also moves all the default tests to OPENSSL_NEXT, which is good
    because OPENSSL is ancient.
    
    I have no idea why NULL doesn't work with OPENSSL_NEXT (1.1.1a) server,
    because according to the manpage [1], "ALL,COMPLEMENTOFALL" (which is
    what we are using) should do it, and indeed
    
        $OPENSSL_NEXT ciphers "ALL,COMPLEMENTOFALL" | tr ':' '\n'
    
    lists NULL ciphersuites, and also they work client-side with
    OPENSSL_NEXT...
    
    [1] https://www.openssl.org/docs/man1.1.1/man1/ciphers.html
    
    Also, while at it, remove partial invocation (only non-default) from one
    component, as we already have a full invocation in the same config (plus
    ASan) in another component.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 17, 2024
    Configuration menu
    Copy the full SHA
    62d0bb8 View commit details
    Browse the repository at this point in the history
  4. generate_test_keys: minor improvements

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 17, 2024
    Configuration menu
    Copy the full SHA
    ee74339 View commit details
    Browse the repository at this point in the history
  5. test_suite_pk: fix some descriptions in data file

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 17, 2024
    Configuration menu
    Copy the full SHA
    40eaf12 View commit details
    Browse the repository at this point in the history
  6. generate_test_keys: split group_id and key bitsize in the generated s…

    …tructure
    
    - group_id is only used for EC keys;
    - key bitsize only for RSA.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 17, 2024
    Configuration menu
    Copy the full SHA
    3618821 View commit details
    Browse the repository at this point in the history

Commits on Apr 18, 2024

  1. Update component_test_psa_crypto_rsa_no_genprime

    Prepare this component for PSA_CRYPTO_CONFIG to be on by default.
    Rename it so that the name is still accurate when we remove legacy symbols
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Apr 18, 2024
    Configuration menu
    Copy the full SHA
    daa322a View commit details
    Browse the repository at this point in the history
  2. adjust_legacy_crypto: enable ASN1_[PARSE|WRITE]_C when RSA_C

    RSA needs ASN1 functions to parse/write private and public keys,
    but there is no guards in the code for that. So we need to enable
    ASN1 support whenever RSA is enabled.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 18, 2024
    Configuration menu
    Copy the full SHA
    89f5af8 View commit details
    Browse the repository at this point in the history

Commits on Apr 19, 2024

  1. add changelog

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 19, 2024
    Configuration menu
    Copy the full SHA
    ce86865 View commit details
    Browse the repository at this point in the history
  2. changelog: fix text

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 19, 2024
    Configuration menu
    Copy the full SHA
    ec3b90f View commit details
    Browse the repository at this point in the history

Commits on Apr 22, 2024

  1. Merge pull request #9035 from valeriosetti/asn1-missing-guard-in-rsa

    Auto-enable ASN1 when RSA is enabled
    mpg authored Apr 22, 2024
    Configuration menu
    Copy the full SHA
    3caada6 View commit details
    Browse the repository at this point in the history
  2. Fix full invocation of ssl-opt.sh

    The previous commit had:
    - one obvious mistake (-f NULL with default -e runs nothing)
    - one unforeseen issue: OPENSSL_NEXT skips static ECDH
    - arguably scope creep: the stated goal was to simplify the full
    invocation (in particular, make it obvious that everything is run
    without having to remember the default value of EXCLUDE), but it also
    made an unrelated change: running most tests with OPENSSL_NEXT (hence
    the previous point).
    
    This commit should fix all this, in particular it switches back to
    running most tests with OPENSSL and using OPENSSL_NEXT only when needed.
    
    Hopefully in the future we'll do the opposite: most tests will run with
    a recent OpenSSL, and only those that need an older one will use
    something older. But that will be another PR.
    
    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Apr 22, 2024
    Configuration menu
    Copy the full SHA
    eb86b90 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    fcd744f View commit details
    Browse the repository at this point in the history
  4. Remove redundant dependency

    In the test data, remove a dependency that is already present on the function.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Apr 22, 2024
    Configuration menu
    Copy the full SHA
    57a0b91 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    6b3a9ee View commit details
    Browse the repository at this point in the history
  6. Fix misspelled dependency: there is no MBEDTLS_PEM_C

    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Apr 22, 2024
    Configuration menu
    Copy the full SHA
    1f4e039 View commit details
    Browse the repository at this point in the history

Commits on Apr 23, 2024

  1. Merge pull request #9040 from Ryan-Everett-arm/crypto-config-psa_cryp…

    …to_rsa_no_genprime
    
    Make component_test_psa_crypto_rsa_no_genprime work with PSA_CRYPTO_CONFIG set
    ronald-cron-arm authored Apr 23, 2024
    Configuration menu
    Copy the full SHA
    87a6d27 View commit details
    Browse the repository at this point in the history

Commits on Apr 24, 2024

  1. Merge pull request #9022 from mpg/compat-fixes-dev

    [dev] Small fixes to compat.sh (partial forward-port)
    mpg authored Apr 24, 2024
    Configuration menu
    Copy the full SHA
    771fd7d View commit details
    Browse the repository at this point in the history
  2. Cleartext RSA keys: also make DER formats available

    We can use DER keys in builds without PEM, so it's good to have them around.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Apr 24, 2024
    Configuration menu
    Copy the full SHA
    b612f9f View commit details
    Browse the repository at this point in the history
  3. Add some test RSA keys of sizes 768 and up

    These are sufficiently large for PKCS#1v1.5 signature with SHA-512 or
    SHA3-512. Cover some non-word-aligned sizes.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Apr 24, 2024
    Configuration menu
    Copy the full SHA
    9c3ebe3 View commit details
    Browse the repository at this point in the history
  4. Use large enough keys when testing parsing of non-word-aligned RSA sizes

    When PSA is available, we exercise the parsed RSA key with PKCS#1v1.5
    signature, which requires the modulus size in bytes to be at least
    tLen + 11 (per RFC 8017 §9.2) where tLen = hLen + oidLen + 6 and
    hLen = 32, oidLen = 9 for SHA-512 or SHA3-512. 10 is the DER overhead
    (3 ASN.1 type-length headers with lengths <128). Replace 512-bit test
    cases (good enough for SHA-256 but not SHA-384 and up) by 768-bit and
    up (good enough for SHA-512).
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Apr 24, 2024
    Configuration menu
    Copy the full SHA
    cbb4507 View commit details
    Browse the repository at this point in the history

Commits on Apr 25, 2024

  1. Fix rsa_pkcs1_*_clear.der to actually be PKCS#1 files

    With OpenSSL 3.0.2 (which I used to generate the previous set of "pkcs1" DER
    files), the output of `openssl rsa -outform DER` is actually a
    PKCS#8-encoded key, despite what the documentation says. This is a change
    from OpenSSL 1.x, where the output is a PKCS#1-encoded key. OpenSSL 3.0.8
    documents the output as PKCS#8.
    
    Change to `openssl pkey`, which seems more reliable. The documentation
    states that the output is PKCS#8, but the output is actually consistently
    PKCS#1 at least from 1.0.2g to 3.3.0.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Apr 25, 2024
    Configuration menu
    Copy the full SHA
    0652b62 View commit details
    Browse the repository at this point in the history

Commits on Apr 26, 2024

  1. Convert recent RSA key files in PEM format from PKCS8 to PKCS1

    Like `openssl rsa`, `openssl genrsa` changed its output format from PKCS8 to
    PKCS1 in OpenSSL 3.0. Note that the makefile instructions assume older
    OpenSSL. Convert the files that were generated with OpenSSL 3.x and hence
    were not in the intended format. The files are converted, not regenerated,
    so the key material is the same.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Apr 26, 2024
    Configuration menu
    Copy the full SHA
    014a63b View commit details
    Browse the repository at this point in the history
  2. Add early exit if zero length AEAD AD passed in.

    With multipart AEAD, if we attempt to add zero length additional data,
    then with the buffer sharing fixes this can now lead to undefined
    behaviour when using gcm. Fix this by returning early, as there is
    nothing to do if the input length is zero.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Apr 26, 2024
    Configuration menu
    Copy the full SHA
    a3daff4 View commit details
    Browse the repository at this point in the history
  3. Add Changelog entry

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Apr 26, 2024
    Configuration menu
    Copy the full SHA
    0f37a15 View commit details
    Browse the repository at this point in the history

Commits on Apr 29, 2024

  1. Merge pull request #8986 from valeriosetti/issue8871

    Improve test key generation in test_suite_pk
    mpg authored Apr 29, 2024
    Configuration menu
    Copy the full SHA
    024d3da View commit details
    Browse the repository at this point in the history
  2. Fix potential non-NULL slot return on failure

    If psa_get_and_lock_key_slot fails, the slot must be wiped.
    This fixes a bug where a pointer to some valid key slot can
    be incorrectly returned
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Apr 29, 2024
    Configuration menu
    Copy the full SHA
    dd90507 View commit details
    Browse the repository at this point in the history
  3. Explicitly document return behaviour

    A bug existed previously where this guarantee was not met,
    causing some issues in multi-threaded code.
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Apr 29, 2024
    Configuration menu
    Copy the full SHA
    04e2b04 View commit details
    Browse the repository at this point in the history
  4. Clarify psa_get_and_lock_key_slot return behaviour

    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Apr 29, 2024
    Configuration menu
    Copy the full SHA
    925b2d7 View commit details
    Browse the repository at this point in the history

Commits on Apr 30, 2024

  1. md: fix guards for mbedtls_md_error_from_psa()

    This should be CRYPTO_CLIENT and not CRYPTO_C as this function
    can be used even when CRYPTO_C is not defined.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Apr 30, 2024
    Configuration menu
    Copy the full SHA
    28cc31c View commit details
    Browse the repository at this point in the history
  2. Merge pull request #9065 from paul-elliott-arm/fix_ubsan_mp_aead_gcm

    Add early exit if zero length AEAD additional data passed in.
    gilles-peskine-arm authored Apr 30, 2024
    Configuration menu
    Copy the full SHA
    489688c View commit details
    Browse the repository at this point in the history
  3. Add changelog

    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Apr 30, 2024
    Configuration menu
    Copy the full SHA
    c51e948 View commit details
    Browse the repository at this point in the history

Commits on May 2, 2024

  1. Merge pull request #9049 from gilles-peskine-arm/test-dependencies-20…

    …240314-development
    
    Fix some test case dependencies (PEM_C)
    mpg authored May 2, 2024
    Configuration menu
    Copy the full SHA
    898066b View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    93b660b View commit details
    Browse the repository at this point in the history
  3. Merge pull request #9087 from ronald-cron-arm/add-cve-2024-30166-ref

    ChangeLog: Add missing reference to CVE in security entry
    gilles-peskine-arm authored May 2, 2024
    Configuration menu
    Copy the full SHA
    cedb011 View commit details
    Browse the repository at this point in the history
  4. Merge pull request #9069 from Ryan-Everett-arm/fix-get-and-lock-key-s…

    …lot-threading-bug
    
    Wipe the returned slot pointer upon failure in `psa_get_and_lock_key_slot`
    gilles-peskine-arm authored May 2, 2024
    Configuration menu
    Copy the full SHA
    fa8fc27 View commit details
    Browse the repository at this point in the history
  5. Merge pull request #8538 from Ryan-Everett-arm/8537-fix-error-handlin…

    …g-for-secure-element-keys-in-psa_start_key_creation
    
    Fix error handling for secure element keys in `psa_start_key_creation`
    gilles-peskine-arm authored May 2, 2024
    Configuration menu
    Copy the full SHA
    9791ee9 View commit details
    Browse the repository at this point in the history
  6. Merge pull request #8897 from IVOES/cpp/unbounded-write

    ssl_mail_client: Fix unbounded write of sprintf()
    gilles-peskine-arm authored May 2, 2024
    Configuration menu
    Copy the full SHA
    aa82464 View commit details
    Browse the repository at this point in the history

Commits on May 3, 2024

  1. Merge pull request #9073 from valeriosetti/issue9068

    Undefined reference to mbedtls_md_error_from_psa() function
    mpg authored May 3, 2024
    Configuration menu
    Copy the full SHA
    61734ec View commit details
    Browse the repository at this point in the history
  2. Move some files to framework repository

    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed May 3, 2024
    Configuration menu
    Copy the full SHA
    7554102 View commit details
    Browse the repository at this point in the history
  3. Merge branch 'tmp-branch-move-files-to-framework' into dev/davidhorst…

    …mann-arm/add-mbedtls-framework-module
    davidhorstmann-arm committed May 3, 2024
    Configuration menu
    Copy the full SHA
    6cca5c5 View commit details
    Browse the repository at this point in the history
  4. Update reference to (previously) mbedtls_dev

    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed May 3, 2024
    Configuration menu
    Copy the full SHA
    7c58bc6 View commit details
    Browse the repository at this point in the history