3898f10fed
Fix #8372 - Error compiling AESNI in Mbed-TLS with clang on Windows
...
It can successfully compile w/ the clang options -maes -mpclmul.
Signed-off-by: Sergey Markelov <sergey@solidstatenetworks.com >
2023-10-18 20:24:39 -07:00
bb4f63cbb2
all.sh: build_mingw: test default config without MBEDTLS_AESNI_C
...
Signed-off-by: Pengyu Lv <pengyu.lv@arm.com >
2023-10-19 10:42:36 +08:00
154982719a
fix wrong typo
...
Signed-off-by: Jerry Yu <jerry.h.yu@arm.com >
2023-10-19 10:29:07 +08:00
8733b4cc76
Merge pull request #8388 from paul-elliott-arm/fix_check_set_padding
...
Move initialisation in test to before first test
2023-10-18 20:31:41 +00:00
f2574206e5
Fix code style
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-18 17:39:48 +02:00
6407f8fc54
Merge pull request #8322 from valeriosetti/issue8257
...
Improve location of MD_CAN macros
2023-10-18 14:31:28 +00:00
3bda79ba9f
Move initialisation in test to before first test
...
Calling mbedtls_cipher_free() on a context that was not initialised
is dangerous, and this could happen if the first test in
check_set_padding() failed.
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-10-18 15:09:09 +01:00
2cff82069e
analyze_outcomes: add new_section() method to the Results class
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-18 14:36:47 +02:00
39d4b9d15b
analyze_outcomes: fix format interpolation errors
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-18 14:30:03 +02:00
ab4082290e
Added parameters to add callback function to handle unsupported extensions. Similar to how the callback functions work when parsing certificates. Also added new test cases.
...
Signed-off-by: Matthias Schulz <mschulz@hilscher.com >
2023-10-18 13:20:59 +02:00
0ea1b8fe8c
Merge pull request #7982 from gilles-peskine-arm/sample_program_demo_scripts-3.4
...
Run sample program demo scripts in all.sh
2023-10-18 10:03:52 +00:00
f6f4695824
Merge pull request #8320 from valeriosetti/issue8263
...
Fix dependencies of mbedtls_pk_ec_ro and mbedtls_pk_ec_rw
2023-10-18 10:03:46 +00:00
62418dd20b
Merge pull request #8350 from waleed-elmelegy-arm/fix-null-dereference-in-x509-cert-write
...
Fix possible NULL dereference issue in X509 cert_write program
2023-10-18 10:03:36 +00:00
ed5e4e86a5
Merge branch 'development' into issue/6935/ticket_flags-kex-mode-determination
2023-10-18 18:03:07 +08:00
d44ee9e6d1
Merge pull request #8351 from waleed-elmelegy-arm/fix-null-dereference-in-x509-cert-req
...
Fix possible NULL dereference issue in X509 cert_req program
2023-10-18 09:01:31 +00:00
b47b2990d6
fix various issues
...
- fix wrong typo
- remove redundant check
- remove psk mode tests
Signed-off-by: Jerry Yu <jerry.h.yu@arm.com >
2023-10-18 15:50:35 +08:00
c6d633ffbc
Merge pull request #8297 from valeriosetti/issue8064
...
Change accel_aead component to full config
2023-10-18 07:15:59 +00:00
2e37d7b238
Merge pull request #8121 from gilles-peskine-arm/ssl-test-no-legacy
...
Remove GNUTLS_LEGACY and OPENSSL_LEGACY
2023-10-18 07:13:12 +00:00
2f3f968033
fix wrong typo and indent issue
...
Signed-off-by: Jerry Yu <jerry.h.yu@arm.com >
2023-10-18 15:07:10 +08:00
ca3790d653
Add server9-bad-saltlen generate command
...
Signed-off-by: Jerry Yu <jerry.h.yu@arm.com >
2023-10-18 15:07:09 +08:00
09977e2307
Add asn1crypto to python maintainer requirements
...
Signed-off-by: Jerry Yu <jerry.h.yu@arm.com >
2023-10-18 15:07:09 +08:00
a3d911b0ae
add script for server9_bad_saltlen
...
Signed-off-by: Jerry Yu <jerry.h.yu@arm.com >
2023-10-18 15:07:09 +08:00
735794c745
analyze_outcomes: fix missing format for args/kwargs
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-18 08:05:15 +02:00
bbd92917d8
Close file on error path
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-17 18:12:31 +02:00
d681ffdb54
Use modern macros for calloc in test code
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-17 18:12:31 +02:00
bb7d92c4b2
Remove redundant null check
...
crl_file is a test argument and can't be null. Besides the code above
already assumes that it's non-null.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-17 17:26:44 +02:00
21e46b39cc
Fix missing initializations on some error paths
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-17 17:09:28 +02:00
a0e810de4b
Convey that it's ok for mbedtls_ssl_session_save to fail
...
mbedtls_ssl_session_save() always outputs the output length, even on error.
Here, we're only calling it to get the needed output length, so it's ok to
ignore the return value. Convey this to linters.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-17 16:04:27 +02:00
873a202d18
Now handling critical extensions similarly to how its done in x509_get_crt_ext just without the callback function to handle unknown extensions.
...
Signed-off-by: Matthias Schulz <mschulz@hilscher.com >
2023-10-17 16:02:20 +02:00
9534dfd15b
Reword error message on format of SAN arguments
...
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2023-10-17 14:59:31 +01:00
4a493b267f
Reword error message on format of SAN arguments
...
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2023-10-17 14:57:23 +01:00
d7a39ae21e
Add plan for 3.6 to threading design
...
Signed-off-by: Janos Follath <janos.follath@arm.com >
2023-10-17 14:34:26 +01:00
574100bb0d
Add clarifications to thread safety design
...
Signed-off-by: Janos Follath <janos.follath@arm.com >
2023-10-17 12:50:28 +01:00
811a954383
Add reentrancy section to thread safety design
...
Signed-off-by: Janos Follath <janos.follath@arm.com >
2023-10-17 12:50:21 +01:00
0ca58e3c10
Added testcase with certificate that contains extensions with critical fields.
...
Signed-off-by: Matthias Schulz <mschulz@hilscher.com >
2023-10-17 13:12:32 +02:00
781c23416e
analyze_oucomes: do not return Results instance passed as parameter
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-17 13:07:10 +02:00
9726aea88b
Merge pull request #8376 from mpg/ecp-light-check-config
...
Fix check_config for ECP_LIGHT
2023-10-17 10:54:49 +00:00
8070dbec6b
analyze_outcomes: keep print_line() method non-static
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-17 12:40:42 +02:00
cc923f307e
Added missing like between variables and function body.
...
Signed-off-by: Matthias Schulz <mschulz@hilscher.com >
2023-10-17 12:36:56 +02:00
f6f64cfd81
analyze_outcomes: code style improvement
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-17 12:28:26 +02:00
8d178be66e
analyze_outcomes: fix return value in case of test failure
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-17 12:23:55 +02:00
adb3cc4d43
Fixes #8377 .
...
Signed-off-by: Matthias Schulz <mschulz@hilscher.com >
2023-10-17 11:57:10 +02:00
2f00b7a5da
cipher: reset MBEDTLS_CIPHER_HAVE_AEAD to MBEDTLS_CIPHER_MODE_AEAD
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-17 11:43:34 +02:00
9a4273099c
all.sh: fix comment
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-17 11:40:42 +02:00
40314fcc75
analyze_outcomes: fix newlines
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-17 11:34:31 +02:00
f075e47bc1
analyze_outcomes: reset name of TestLog to Results
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-17 11:33:21 +02:00
3f33989762
analyze_outcomes: use a single TestLog instance and do not delay output
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-17 11:32:23 +02:00
fb2750e98e
analyze_outcomes: exit immediately in case of invalid task
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-10-17 10:57:53 +02:00
745ec5d75e
Fix static initializer warning
...
In a hypothetical build with no curves, or in the future when we add a
new curve type and possibly forget updating this function with a new
block for the new type, we write to `ret` at the beginning or the
function then immediately overwrite it with MPI_CHK(check_privkey),
which static analyzers understandably find questionable.
Use `ret` here and check the key only if it was actually set.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-10-17 10:13:45 +02:00
6d42921633
Require at least on curve for ECP_LIGHT
...
ECP_LIGHT is not usable without any curve, just the same as ECP_C.
We forgot to update this check when introducing the ECP_LIGHT subset.
Note: the message doesn't mention ECP_LIGHT as that's not a public
config knob, hence the message with "ECP_C or a subset" (that's how it's
referred to in user-facing documentation such as
docs/driver-only-builds.md).
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-10-17 10:01:33 +02:00