1
0
mirror of https://github.com/Mbed-TLS/mbedtls.git synced 2025-12-12 14:21:20 +03:00
Commit Graph

32241 Commits

Author SHA1 Message Date
Valerio Setti
a8ff9f76e9 changelog: add note about MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE improvements
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-10-16 16:47:01 +02:00
Valerio Setti
5306324015 psa: crypto_extra: update documentation of MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-10-16 16:36:50 +02:00
Valerio Setti
45574797e7 psa: crypto_extra: improve buffer size computation for static key slots
Take also MAC's key types into account when computing the size of the
buffer to store key material in static key slot configuration.

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-10-15 16:22:39 +02:00
minosgalanakis
46dc477c22 Merge pull request #10444 from gilles-peskine-arm/jpake-persistent-key-compat-3.6.5
Backport 3.6: PSA JPAKE: add storage test case and document limitations
2025-10-10 14:45:23 +00:00
Gilles Peskine
84a9b26b88 Be more precise about the user/peer ID limitation
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-10-10 12:08:21 +02:00
Gilles Peskine
42ae2ac6ec Merge pull request #10318 from keith-packard/gcc-14-3-array-bounds
Avoid invalid gcc 14.3 warning about array bounds in mbedtls_xor
2025-10-08 19:00:48 +00:00
Gilles Peskine
98a4029d51 Add storage format test case for JPAKE
The storage test generator doesn't support JPAKE at this time. So write a
test case manually.

The key is not exercised, since `psa_exercise_key()` doesn't support PAKE at
this time. But at least we can use this test case to ensure that we know how
the key is represented in storage.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-10-08 17:39:23 +02:00
Gilles Peskine
8ca2a5bf95 Document JPAKE limitations
Document limitations on the user ID, peer ID, primitive (elliptic curve) and
hash for `PSA_ALG_JPAKE`.

https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/502
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/503
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/504

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-10-08 17:39:23 +02:00
Keith Packard
292b96c0a6 Avoid invalid gcc 14.3 warning about array bounds in mbedtls_xor
The combination of the multi-byte loop with the single byte loop
confuses GCC 14.3's array bounds checker. When the loop size is
constant, check to see if it is a multiple of the multi-byte size and
bail early. As this will be evaluated at compile time, there should be
no run-time cost.

This change uses the __builtin_constant_p compile-time operation. To
check if that is supported, the change uses the existing
MBEDTLS_HAS_BUILTIN macro. That macro was defined later in
library/common.h than is needed for this change, so it was moved up to
join some other macros that looked similar.

Signed-off-by: Keith Packard <keithp@keithp.com>
2025-10-02 11:09:29 -07:00
Bence Szépkúti
299ce78166 Merge pull request #10417 from bensze01/abicheck-worktree-submodules-3.6
[3.6 backport] Use submodule work trees during ABI check
2025-09-30 09:41:11 +00:00
Manuel Pégourié-Gonnard
f2021e28c6 Merge pull request #10421 from gilles-peskine-arm/psa-transition-guide-20250630-3.6
Update PSA transition guide for 3.6.5
2025-09-30 09:21:13 +00:00
David Horstmann
3c5efcb61b Merge pull request #10427 from bjwtaylor/time_t-backport
Backport 3.6: Replace cases of time_t with mbedtls_time_t
2025-09-29 19:35:11 +00:00
Ben Taylor
6e73b2f2fd Backport time_t type conversions
Signed-off-by: Ben Taylor <ben.taylor@linaro.org>
2025-09-29 15:35:28 +01:00
Gilles Peskine
8701fddbc5 Remove sentence about 1.0 that should not have been backported
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-29 15:18:37 +02:00
Bence Szépkúti
616f9fde62 Fix comment too long for pylint
Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com>
2025-09-29 14:24:25 +02:00
Manuel Pégourié-Gonnard
02b7707b10 Merge pull request #10419 from mpg/fix-udp-proxy-3.6
[3.6] Fix includes in udp_proxy.c
2025-09-29 10:48:02 +00:00
Bence Szépkúti
e45e5046ba Prevent unnecessary submodule fetches
Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com>
2025-09-26 20:28:25 +02:00
Bence Szépkúti
d040427111 Eliminate use of git worktree prune
Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com>
2025-09-26 15:47:01 +02:00
Bence Szépkúti
99fa0abc75 Use f-string literal
This makes path-construction a bit more readable

Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com>
2025-09-26 15:47:01 +02:00
Gilles Peskine
1e9efcc1ab Update some references to the future
The future is now.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-26 15:15:13 +02:00
Gilles Peskine
106700481d Improve explanations of configuration translation
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-26 15:11:02 +02:00
Gilles Peskine
f6a7be0673 Copyediting
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-26 15:10:09 +02:00
Gilles Peskine
4f9d6e9451 update 1.0.0/4.0.0 release bullet point
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-26 15:05:17 +02:00
Gilles Peskine
b9eeace74a Update asymmetric cryptography
Minor clarifications also done in the TF-PSA-Crypto 1.0 update.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-26 15:02:22 +02:00
Gilles Peskine
223fd448ea Miscellaneous improvements
Partial backport of "Update all except "Asymmetric cryptography" for
TF-PSA-Crypto", including only clarifications and the extra information
about migrating to `MBEDTLS_PSA_CRYPTO_CONFIG` that are also relevant in
3.6.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-26 14:57:33 +02:00
Gilles Peskine
e7a9546dfa Fix section names
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-26 14:49:19 +02:00
Gilles Peskine
f7f3ec460a A few updates for 3.6
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-26 14:49:19 +02:00
Manuel Pégourié-Gonnard
be407038bf Fix includes in udp_proxy.c
The program uses atoi() unconditionally, so it should include stdlib.h
unconditionally. Previously this happened to be indirectly included by
some other header (via pk.h via ssl.h) but we should not rely on that.

Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-09-26 12:22:58 +02:00
Bence Szépkúti
cdd166274e Use worktrees instead of fetches for submodules
Signed-off-by: Bence Szépkúti <bence.szepkuti@arm.com>
2025-09-25 17:41:27 +02:00
Manuel Pégourié-Gonnard
5cbbca45dd Merge pull request #8197 from gilles-peskine-arm/readme-20230913
Backport 3.6: Update README about PSA
2025-09-24 08:01:44 +00:00
Gilles Peskine
b6bf893c70 Qualify "reference implementation" wording
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-17 14:04:10 +02:00
Gilles Peskine
263b6925a2 The PSA implementation is production-quality
This has been the case for a while, but we forgot to update the readme.

Don't prominently label it a "reference" implementation. That implies that
it's a complete implementation, but it isn't: we do not intend to implement
every mechanism that the PSA specification has an encoding for. That also
tends to imply that it's for demonstration purposes and not ready for
production, but Mbed TLS is intended to be used in production.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-17 14:04:10 +02:00
Gilles Peskine
c2b94d45d4 Merge pull request #10401 from gilles-peskine-arm/psa_can_do-declare-publicly-3.6
Backport 3.6: Declare psa_can_do_cipher() publicly
2025-09-15 12:02:50 +00:00
Janos Follath
753036edb3 Merge pull request #10336 from gilles-peskine-arm/generated-files-lib-build-3.6
Backport 3.6: fix `make lib GEN_FILES=` sometimes requiring python
2025-09-12 13:27:26 +00:00
Gilles Peskine
9a5444a3b8 Fix copypasta
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-12 11:27:11 +02:00
Gilles Peskine
6e1b66320a Improve documentation
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-12 11:27:09 +02:00
Gilles Peskine
447134b704 Announce psa_can_do_cipher()
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-12 11:27:08 +02:00
Gilles Peskine
3aee15b8e5 Declare psa_can_do_cipher() in a public header
Integrators in a client-server architecture need to provide this function on
the client side.

Fixes mbedtls/issues#10341.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-12 11:27:07 +02:00
David Horstmann
fb7eba06b0 Merge pull request #10387 from davidhorstmann-arm/upgrade-python-packages-3.6
[Backport 3.6] Upgrade packages in requirements.txt
2025-09-08 15:31:46 +00:00
Gilles Peskine
943c291f59 Merge pull request #10390 from gilles-peskine-arm/threading-3.6-alt-doc
Improve documentation of MBEDTLS_THREADING_ALT
2025-09-08 09:50:16 +00:00
Gilles Peskine
df13694ecd Improve documentation of MBEDTLS_THREADING_ALT
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-07 14:45:15 +02:00
Gilles Peskine
fe00817fe7 Improve documentation of mutex primitives
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-07 14:42:54 +02:00
Gilles Peskine
c056b64042 Merge pull request #10378 from gilles-peskine-arm/threading-1.0-condition-3.6
Smoke tests for threading
2025-09-05 15:52:01 +00:00
Gilles Peskine
4c40f08148 Update framework: support threading internal interface 4.0.0.0
3.6 is still using the threading internal interface 3.6.0.0 for now.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-05 11:27:13 +02:00
David Horstmann
7f231a634b Upgrade packages in requirements.txt
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2025-09-05 09:36:44 +01:00
Gilles Peskine
56c4dc12b8 Single-threaded test of nominal mutex usage
No negative tests since all forbidden usage has undefined behavior.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-09-01 00:28:15 +02:00
Manuel Pégourié-Gonnard
e0ef179ea7 Merge pull request #10375 from gilles-peskine-arm/threading_internal.h-3.6
Backport 3.6: Create threading_internal.h
2025-08-29 11:48:51 +00:00
Gilles Peskine
c2e9dac28f Expand on why and how we bypass the quiet wrapper
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-08-29 13:23:33 +02:00
Gilles Peskine
9f7ac0371f Fix code style
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-08-29 10:46:52 +02:00
Gilles Peskine
7e43145bac Typo
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-08-29 09:35:29 +02:00