1
0
mirror of https://github.com/Mbed-TLS/mbedtls.git synced 2025-12-12 14:21:20 +03:00
Commit Graph

34053 Commits

Author SHA1 Message Date
Manuel Pégourié-Gonnard
abb0b22954 Merge pull request #10505 from valeriosetti/issue10453
Remove use of `pk_can_do()`
2025-12-10 11:56:13 +00:00
Valerio Setti
c0ac4a6933 library: ssl: specify hash algorithm when checking signature in ssl_parse_certificate_verify
Since the hash algorithm is known, this can be used when calling
"mbedtls_pk_can_do_psa()" to get a more accurate answer.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-09 16:18:11 +01:00
Valerio Setti
5ad2bfa6c8 library: ssl: adjust return type of mbedtls_psa_alg_from_pk_sigalg()
The correct return type should have been "psa_algorithm_t" since the
beginning because this is what the function really returns and this is
what the returned value is then used for in the calling functions.

Change also the returned value in the default case from
MBEDTLS_PK_SIGALG_NONE to PSA_ALG_NONE in order to return the same type
as in other cases of the switch case.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-09 16:15:48 +01:00
Valerio Setti
d8f0b37d1a ssl: replace remaining occurrence of pk_can_do with pk_get_key_type
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-05 15:57:39 +01:00
Valerio Setti
e5ba96c5c6 Merge pull request #10528 from mpg/prep-rm-ecdh
Avoid references to ecdh.o
2025-12-05 11:17:41 +00:00
Manuel Pégourié-Gonnard
1c479f88d0 Avoid references to ecdh.o
We're going to remove ecdh.c soon, so use another way of testing whether
builtin ECDH is included in the build.

Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-05 09:23:39 +01:00
Valerio Setti
e7b035eeb7 Merge pull request #10532 from gilles-peskine-arm/race-condition-in-makefile-4.0
Fix race condition in makefile affecting test_sha3_variations
2025-12-04 21:42:15 +00:00
Pengyu Lv
d86c4ae1d2 Fix dependencies in programs/Makefile
Make fuzz depend on MBEDLIBS to avoid multiple instances for
generation the library files.

Signed-off-by: Pengyu Lv <pengyu.lv@arm.com>
2025-12-04 17:07:05 +01:00
Pengyu Lv
8b364c7436 Fix the commands to build library
In `scripts/common.make`, used by `tests/Makefile` and `programs/Makefile`,
we have the following rules to build the library:

  ```
  $(MBEDLIBS):
      $(MAKE) -C ../library
  ```

$(MBEDLIBS) contains three library files but the command is for all
the 3 files instead of single target generation. This would cause a
race when doing parallel build. This commit fixes command so that
the recipe could generate a single library file.

Fix https://github.com/Mbed-TLS/mbedtls/issues/8229

Signed-off-by: Pengyu Lv <pengyu.lv@arm.com>
Signed-off-by: Gilles Peskine <gilles.peskine@arm.com>
2025-12-04 17:07:05 +01:00
Valerio Setti
9eb5b2a146 x509: replace usage of mbedtls_pk_can_do() with mbedtls_pk_get_key_type()
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-04 16:28:44 +01:00
Valerio Setti
902467d62f ssl: replace usage of mbedtls_pk_can_do() with mbedtls_pk_get_key_type()
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-04 16:28:44 +01:00
Valerio Setti
1de094fb32 library: x509: replace mbedtls_pk_can_do() with mbedtls_pk_can_do_psa()
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-04 16:28:44 +01:00
Valerio Setti
9d1fa1a8d8 library: x509: change order of checks in x509_crt_check_signature()
Checking that parent PK type is OK is definitely faster than computing
an hash, so invert the checks.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-04 16:28:44 +01:00
Valerio Setti
81a5a0914c library: ssl: replace mbedtls_pk_can_do() with mbedtls_pk_can_do_psa()
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-04 16:28:44 +01:00
Valerio Setti
92926ff4dc library: common: add helper to get PSA algorithm from PK sigalg
Add a simple helper to convert from PK sigalg to PSA algorithm. This is
handy when calling mbedtls_pk_can_do_psa() knowing the PK sigalg and the
used MD type.

This is being added in a separate file because it's meant to be consumed
by both ssl and x509 modules. It was not added to tf-psa-crypto because
this is only needed on the mbedtls repo and doing so reduce interdependencies
between the repos.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-04 16:28:44 +01:00
Valerio Setti
024c3aeb9e library: ssl: remove duplicate check in ssl_parse_server_key_exchange()
The check being removed is already done few lines above so there is no
need to repeat it twice.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-04 16:28:44 +01:00
David Horstmann
8f66d59d83 Merge pull request #10522 from valeriosetti/issue568-mbedtls-part2
[mbedtls] Remove support for secp192[k|r]1 curves (part 2)
2025-12-03 15:26:46 +00:00
Valerio Setti
d36ed4a84d tf-psa-crypto: update reference
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-03 13:03:08 +01:00
Valerio Setti
35d90d15c7 framework: update reference
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-03 13:03:08 +01:00
Valerio Setti
725e3f1daa tests: x509parse: replace certificates using secp192 with those using secp256
This replacement is either:
- "server5-rsa-signed.crt": if a generic secp256r1 EC key is enough, i.e.
	any EC key is fine as it's not secp192 since this support is being
	removed from TF-PSA-Crypto.
- "server11-rsa-signed.crt": if an EC key which does not belong to "suite-b"
	is required. For this case "secp256r1" wouldn't be good, so we use
	a "secp256k1" key.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-12-03 13:03:07 +01:00
Valerio Setti
d262352601 Merge pull request #10523 from mpg/rm-ecdh
Remove some useless private includes
2025-12-02 15:21:24 +00:00
Manuel Pégourié-Gonnard
5341c86877 Add comments for remaining internal includes
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-02 12:35:20 +01:00
Manuel Pégourié-Gonnard
ea5718721f Remove two more useless internal includes
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-02 12:06:39 +01:00
Manuel Pégourié-Gonnard
3e6455d50e Remove useless includes of psa_util_internal
Those in SSL modules were redundant because it's already included from
ssl_misc.h.

Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-02 12:00:34 +01:00
Manuel Pégourié-Gonnard
d6551eaaa6 Add comment about internal crypto include
Besides using an internal crypto header, error.h is arguably the wrong
place: this file's docstring says it's about "Error to string
translation", quite unrelated to the things we use from error_common.h.
This is not surprising given the history, but no longer makes sense
today.

Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-01 11:06:02 +01:00
Manuel Pégourié-Gonnard
411282d126 x509: rm useless private include in C file
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-01 11:06:02 +01:00
Manuel Pégourié-Gonnard
eab6d3276b ssl: rm useless private include in C file
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-01 10:26:28 +01:00
Manuel Pégourié-Gonnard
c53c43c296 x509: rm useless private includes in internal headers
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-01 10:24:50 +01:00
Manuel Pégourié-Gonnard
4b663abecc ssl: rm useless private includes in internal headers
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-01 10:24:41 +01:00
Manuel Pégourié-Gonnard
53c511578a x509: rm useless private include in public header
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-01 10:04:11 +01:00
Manuel Pégourié-Gonnard
59c9ebfaae ssl: rm useless private includes in public headers
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-12-01 10:04:06 +01:00
Valerio Setti
5ae6c62247 tests: x509parse: transition tests based on secp192 curves to secp256
After some analysis search it was determined that previous test data seem
not to belong to the "framework/data_files" certificate files. Therefore
new test data has been generated from scratch.

The improvement compared to the previous situation is that comments has
been added on top of each test in order to explain how to recreate new test
data.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-11-27 14:38:22 +01:00
David Horstmann
caaa93884c Merge pull request #10519 from valeriosetti/issue568-mbedtls
[mbedtls] Remove support for secp192[k|r]1 curves
2025-11-24 11:17:18 +00:00
Valerio Setti
65ec4cc771 tests: scripts: make enabling of secp192 curves fault tolerant in test_psa_crypto_without_heap
This is temporary but still required in order to have this commit merged
before the crypto#570, where these curves are really removed.
These lines will be removed in a follow-up PR once crypto#570 is merged.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-11-20 13:20:40 +01:00
Valerio Setti
caf73f885a library: check_config: remove references to secp192 curves
Support for these curves is being removed from tf-psa-crypto, so we need
to remove all the references also in this repo.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-11-20 13:01:18 +01:00
Valerio Setti
3057ea0288 Merge pull request #10509 from gilles-peskine-arm/config_checks_generator-fix-windows-path-mbedtls
Changelog entry for fix #10502
2025-11-20 11:49:36 +00:00
Gilles Peskine
6116d8feea Update framework with fix of Mbed-TLS/mbedtls#10502
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-11-20 10:28:52 +01:00
Gilles Peskine
28f745515e Changelog entry for fix #10502
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-11-20 10:28:30 +01:00
Manuel Pégourié-Gonnard
3a0868b8ff Merge pull request #10496 from JuhaPekkaa/juke/change-loglevel
Update log level for mbedtls_ssl_check_record and PSA-based ECDH computation
2025-11-12 09:33:39 +00:00
Manuel Pégourié-Gonnard
148bc1120a Merge pull request #10498 from valeriosetti/issue435-part2-mbedtls
[mbedtls] tests: migrate tests using secp192[k|r]1 toward secp256[r|k]1 --> EC [2/3]
2025-11-12 08:38:54 +00:00
Valerio Setti
1f2f6fc9cb framework: update reference
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-11-06 23:48:36 +01:00
Manuel Pégourié-Gonnard
a6e59a955b Merge pull request #10450 from bjwtaylor/move-lcov
Remove lcov.sh as this will be moved to the framework
2025-11-06 11:11:59 +00:00
Juha-Pekka Kesonen
5f4cbcd336 ssl_tls12: change log level for ECDH computation
Signed-off-by: Juha-Pekka <juha-pekka.kesonen@nordicsemi.no>
2025-11-05 14:10:52 +02:00
Juha-Pekka Kesonen
666fa2da3d ssl_msg.c: change log level for record checking
Signed-off-by: Juha-Pekka <juha-pekka.kesonen@nordicsemi.no>
2025-11-05 14:08:46 +02:00
Ronald Cron
5dae44848d Merge pull request #10462 from minosgalanakis/bugfix/update_prepare_release
Update `prepare_release.sh`
2025-11-04 16:10:38 +00:00
Valerio Setti
00d579e953 Merge pull request #10439 from bjwtaylor/remove-all-non-ext-apis
Remove all non ext apis
2025-11-04 09:53:34 +00:00
Gilles Peskine
18f2661c65 Merge pull request #10491 from valeriosetti/issue10229
Remove temporary fixes introduced in #10213
2025-11-04 08:59:16 +00:00
Valerio Setti
910bf4bbc6 tests: suite_x509parse: remove temporary fixes
Removes the temporary fixes that were introduced in order to allow crypto#308
to be merged.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-11-03 10:27:24 +01:00
Valerio Setti
a35e332bbb library: debug: remove temporary fixes for RSA key handling
Since crypto#308 has been merged:
- replace MBEDTLS_PK_USE_PSA_RSA_DATA with PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY
- remove "no-check-names"

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-11-03 10:25:15 +01:00
Ben Taylor
4b8d9d41ee Update tf-psa-crypto submodule to include new framework
Signed-off-by: Ben Taylor <ben.taylor@linaro.org>
2025-10-31 14:41:31 +00:00