Gilles Peskine
84a9b26b88
Be more precise about the user/peer ID limitation
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-10-10 12:08:21 +02:00
Gilles Peskine
98a4029d51
Add storage format test case for JPAKE
...
The storage test generator doesn't support JPAKE at this time. So write a
test case manually.
The key is not exercised, since `psa_exercise_key()` doesn't support PAKE at
this time. But at least we can use this test case to ensure that we know how
the key is represented in storage.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-10-08 17:39:23 +02:00
Gilles Peskine
8ca2a5bf95
Document JPAKE limitations
...
Document limitations on the user ID, peer ID, primitive (elliptic curve) and
hash for `PSA_ALG_JPAKE`.
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/502
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/503
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/504
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-10-08 17:39:23 +02:00
Bence Szépkúti
299ce78166
Merge pull request #10417 from bensze01/abicheck-worktree-submodules-3.6
...
[3.6 backport] Use submodule work trees during ABI check
2025-09-30 09:41:11 +00:00
Manuel Pégourié-Gonnard
f2021e28c6
Merge pull request #10421 from gilles-peskine-arm/psa-transition-guide-20250630-3.6
...
Update PSA transition guide for 3.6.5
2025-09-30 09:21:13 +00:00
David Horstmann
3c5efcb61b
Merge pull request #10427 from bjwtaylor/time_t-backport
...
Backport 3.6: Replace cases of time_t with mbedtls_time_t
2025-09-29 19:35:11 +00:00
Ben Taylor
6e73b2f2fd
Backport time_t type conversions
...
Signed-off-by: Ben Taylor <ben.taylor@linaro.org >
2025-09-29 15:35:28 +01:00
Gilles Peskine
8701fddbc5
Remove sentence about 1.0 that should not have been backported
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-29 15:18:37 +02:00
Bence Szépkúti
616f9fde62
Fix comment too long for pylint
...
Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com >
2025-09-29 14:24:25 +02:00
Manuel Pégourié-Gonnard
02b7707b10
Merge pull request #10419 from mpg/fix-udp-proxy-3.6
...
[3.6] Fix includes in udp_proxy.c
2025-09-29 10:48:02 +00:00
Bence Szépkúti
e45e5046ba
Prevent unnecessary submodule fetches
...
Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com >
2025-09-26 20:28:25 +02:00
Bence Szépkúti
d040427111
Eliminate use of git worktree prune
...
Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com >
2025-09-26 15:47:01 +02:00
Bence Szépkúti
99fa0abc75
Use f-string literal
...
This makes path-construction a bit more readable
Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com >
2025-09-26 15:47:01 +02:00
Gilles Peskine
1e9efcc1ab
Update some references to the future
...
The future is now.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-26 15:15:13 +02:00
Gilles Peskine
106700481d
Improve explanations of configuration translation
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-26 15:11:02 +02:00
Gilles Peskine
f6a7be0673
Copyediting
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-26 15:10:09 +02:00
Gilles Peskine
4f9d6e9451
update 1.0.0/4.0.0 release bullet point
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-26 15:05:17 +02:00
Gilles Peskine
b9eeace74a
Update asymmetric cryptography
...
Minor clarifications also done in the TF-PSA-Crypto 1.0 update.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-26 15:02:22 +02:00
Gilles Peskine
223fd448ea
Miscellaneous improvements
...
Partial backport of "Update all except "Asymmetric cryptography" for
TF-PSA-Crypto", including only clarifications and the extra information
about migrating to `MBEDTLS_PSA_CRYPTO_CONFIG` that are also relevant in
3.6.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-26 14:57:33 +02:00
Gilles Peskine
e7a9546dfa
Fix section names
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-26 14:49:19 +02:00
Gilles Peskine
f7f3ec460a
A few updates for 3.6
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-26 14:49:19 +02:00
Manuel Pégourié-Gonnard
be407038bf
Fix includes in udp_proxy.c
...
The program uses atoi() unconditionally, so it should include stdlib.h
unconditionally. Previously this happened to be indirectly included by
some other header (via pk.h via ssl.h) but we should not rely on that.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-09-26 12:22:58 +02:00
Bence Szépkúti
cdd166274e
Use worktrees instead of fetches for submodules
...
Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com >
2025-09-25 17:41:27 +02:00
Manuel Pégourié-Gonnard
5cbbca45dd
Merge pull request #8197 from gilles-peskine-arm/readme-20230913
...
Backport 3.6: Update README about PSA
2025-09-24 08:01:44 +00:00
Gilles Peskine
b6bf893c70
Qualify "reference implementation" wording
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-17 14:04:10 +02:00
Gilles Peskine
263b6925a2
The PSA implementation is production-quality
...
This has been the case for a while, but we forgot to update the readme.
Don't prominently label it a "reference" implementation. That implies that
it's a complete implementation, but it isn't: we do not intend to implement
every mechanism that the PSA specification has an encoding for. That also
tends to imply that it's for demonstration purposes and not ready for
production, but Mbed TLS is intended to be used in production.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-17 14:04:10 +02:00
Gilles Peskine
c2b94d45d4
Merge pull request #10401 from gilles-peskine-arm/psa_can_do-declare-publicly-3.6
...
Backport 3.6: Declare psa_can_do_cipher() publicly
2025-09-15 12:02:50 +00:00
Janos Follath
753036edb3
Merge pull request #10336 from gilles-peskine-arm/generated-files-lib-build-3.6
...
Backport 3.6: fix `make lib GEN_FILES=` sometimes requiring python
2025-09-12 13:27:26 +00:00
Gilles Peskine
9a5444a3b8
Fix copypasta
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-12 11:27:11 +02:00
Gilles Peskine
6e1b66320a
Improve documentation
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-12 11:27:09 +02:00
Gilles Peskine
447134b704
Announce psa_can_do_cipher()
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-12 11:27:08 +02:00
Gilles Peskine
3aee15b8e5
Declare psa_can_do_cipher() in a public header
...
Integrators in a client-server architecture need to provide this function on
the client side.
Fixes mbedtls/issues#10341 .
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-12 11:27:07 +02:00
David Horstmann
fb7eba06b0
Merge pull request #10387 from davidhorstmann-arm/upgrade-python-packages-3.6
...
[Backport 3.6] Upgrade packages in requirements.txt
2025-09-08 15:31:46 +00:00
Gilles Peskine
943c291f59
Merge pull request #10390 from gilles-peskine-arm/threading-3.6-alt-doc
...
Improve documentation of MBEDTLS_THREADING_ALT
2025-09-08 09:50:16 +00:00
Gilles Peskine
df13694ecd
Improve documentation of MBEDTLS_THREADING_ALT
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-07 14:45:15 +02:00
Gilles Peskine
fe00817fe7
Improve documentation of mutex primitives
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-07 14:42:54 +02:00
Gilles Peskine
c056b64042
Merge pull request #10378 from gilles-peskine-arm/threading-1.0-condition-3.6
...
Smoke tests for threading
2025-09-05 15:52:01 +00:00
Gilles Peskine
4c40f08148
Update framework: support threading internal interface 4.0.0.0
...
3.6 is still using the threading internal interface 3.6.0.0 for now.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-05 11:27:13 +02:00
David Horstmann
7f231a634b
Upgrade packages in requirements.txt
...
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2025-09-05 09:36:44 +01:00
Gilles Peskine
56c4dc12b8
Single-threaded test of nominal mutex usage
...
No negative tests since all forbidden usage has undefined behavior.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-09-01 00:28:15 +02:00
Manuel Pégourié-Gonnard
e0ef179ea7
Merge pull request #10375 from gilles-peskine-arm/threading_internal.h-3.6
...
Backport 3.6: Create threading_internal.h
2025-08-29 11:48:51 +00:00
Gilles Peskine
c2e9dac28f
Expand on why and how we bypass the quiet wrapper
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-08-29 13:23:33 +02:00
Gilles Peskine
9f7ac0371f
Fix code style
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-08-29 10:46:52 +02:00
Gilles Peskine
7e43145bac
Typo
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-08-29 09:35:29 +02:00
Gilles Peskine
2324a02602
Create threading_internal.h
...
This is meant to hold threading-related definitions that are not public, but
are used in the test framework.
To be populated later.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2025-08-29 08:59:27 +02:00
David Horstmann
54bf8addd7
Merge pull request #10366 from davidhorstmann-arm/clarify-file-generation-cc-3.6
...
[Backport 3.6] Clarify use of `CC` and friends for file generation
2025-08-20 09:48:26 +00:00
David Horstmann
8281e6a13b
Clarify use of CC and friends for file generation
...
Add more detail around how generation of configuration-independent files
chooses a C compiler. Mention that setting HOSTCC or CC is recommended
where there are multiple toolchains.
Mention that the fallback location is the cc executable, which may help
users troubleshooting when the file generation picks up the wrong
toolchain (as in Mbed-TLS/mbedtls#10360 ).
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2025-08-19 18:14:30 +01:00
minosgalanakis
a53d8c5a33
Merge pull request #10350 from ariwo17/backport/add-pbes2-aes-testdata
...
[BACKPORT] Issue #398 : Add AES-CBC PBES2 test cases to match 3DES variants
2025-08-11 15:04:24 +00:00
Ari Weiler-Ofek
45c781976c
Update framework submodule pointer to merged Framework PR#194
...
Signed-off-by: Ari Weiler-Ofek <ari.weiler-ofek@arm.com >
2025-08-07 19:01:10 +01:00
Ari Weiler-Ofek
afe7e54e3a
Backport: add AES PBES2 test cases matching 3DES (including wrong and missing password)
...
Signed-off-by: Ari Weiler-Ofek <ari.weiler-ofek@arm.com >
2025-08-07 19:01:06 +01:00