Valerio Setti
4d25a8d48a
test: renaming component testing accelerated EC
...
References in analyze_outcomes.py are updated accordingly.
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 16:03:46 +02:00
Gilles Peskine
5760bf77c7
Merge pull request #7641 from valeriosetti/issue7614
...
Define PSA_WANT_KEY_TYPE_xxx_KEY_PAIR_yyy (step 1)
2023-06-16 16:00:17 +02:00
Minos Galanakis
450abfd922
test_suite_ecp: Added MBEDTLS_ECP_NIST_OPTIM define guards.
...
This patch updates `ecp_mod_p_generic_raw` and corresponding
curve test methods, that depend on the NIST optimisation
parameter to not run when it is not included.
The following curves are affected:
* SECP192R1
* SECP224R1
* SECP256R1
* SECP384R1
* SECP521R1
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-06-16 13:48:47 +01:00
Minos Galanakis
effff764e1
test_suite_ecp: Updated ecp_mod_p_generic_raw for optimised reduction.
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-06-16 13:48:47 +01:00
Minos Galanakis
0f718c9ed0
bignum_mod: Fixed code-style
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-06-16 13:48:47 +01:00
Minos Galanakis
88e16dfa2a
bignum_mod: Refactored mbedtls_mpi_mod_modulus_setup()
...
This patch removes the `int_rep` input parameter for modular
setup, aiming to align it with the optred variant.
Test and test-suite helper functions have been updated
accordingly.
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-06-16 13:48:47 +01:00
Minos Galanakis
67ebaaf8a0
test_suite_bignum: Removed test_read_modulus().
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-06-16 13:48:47 +01:00
Paul Elliott
680233dc3f
Merge pull request #7680 from paul-elliott-arm/raw_ecp_mod_p448
...
[Bignum] Split out raw ECP mod p448
2023-06-16 13:46:25 +01:00
Dave Rodgman
838dc46a7b
Test asm and intrinsics from all.sh
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-16 13:19:05 +01:00
Valerio Setti
01cc88a46b
config_psa: replace USE symbols with BASIC one for all KEY_PAIRs
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:27:02 +02:00
Valerio Setti
4590bc2933
test: run all the test suite in the temporary component and grep outcome file
...
The file is temporary generate if none is specified on the command line.
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:26:26 +02:00
Valerio Setti
a1a0b1b348
test: add a temporary test for checking conversion for new symbols
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:26:26 +02:00
Valerio Setti
ecbc9c77ea
test_driver_extension: manage public and private keys the same way
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:26:26 +02:00
Valerio Setti
92214c7af3
crypto_config_test_driver_extension: remove leftover comment
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:26:26 +02:00
Valerio Setti
b7ef51a193
crypto: move legacy symbols support to a dedicated header file
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:26:26 +02:00
Valerio Setti
602ee2ed98
config_psa: remove support for PSA_WANT_KEY_TYPE_DH_KEY_PAIR_DERIVE
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:26:26 +02:00
Valerio Setti
323ad1c416
psa: fixing psa_crypto_generate_key.generated
...
This is a temporary fix for not excluding tests which depend on
MBEDTLS_PSA_WANT_KEY_TYPE_[RSA/ECC]_KEY_PAIR_LEGACY. This fix
can be reverted as soon as those _LEGACY symbols will be removed
from the code.
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:26:26 +02:00
Valerio Setti
64f790f662
test: fix python script for PSA test generation
...
This is a temporary fix for replacing
PSA_WANT_KEY_TYPE_[RSA/ECC]_KEY_PAIR
with the temporary symbols
MBEDTLS_PSA_WANT_KEY_TYPE_[RSA/ECC]_KEY_PAIR_LEGACY.
Once new PSA_WANT_KEY_TYPE_[RSA/ECC]_KEY_PAIR_yyy will be used
both in library's code and tests, then this fix will be removed.
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:26:26 +02:00
Valerio Setti
ff7f861761
tests: replace deprecated symbols with temporary _LEGACY ones
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:26:26 +02:00
Valerio Setti
67a3e3eb7b
crypto_config: introducing new definitions for PSA_WANT KEY_PAIRs
...
- deprecate legacy PSA_WANT_KEY_TYPE_xxx_KEY_PAIR
- introduce new PSA_WANT_KEY_TYPE_xxx_KEY_PAIR_yyy where
- xxx is either RSA, DH or ECC
- yyy can be USE, IMPORT, EXPORT, GENERATE, DERIVE
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-16 12:23:55 +02:00
Manuel Pégourié-Gonnard
24f467668e
Merge pull request #7672 from mpg/libtestdriver1-helpers
...
Libtestdriver1 helpers
2023-06-16 11:43:40 +02:00
Gilles Peskine
f45a5a0ddd
Merge pull request #7700 from silabs-Kusumit/PBKDF2_output_bytes
...
PBKDF2: Output bytes
2023-06-16 10:08:02 +02:00
Paul Elliott
a2e48f751b
Split out mbedtls_ecp_mod_p448_raw()
...
Switch testing over to using the generic raw functions.
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-06-15 17:16:38 +01:00
Przemek Stekiel
1f5c2ba495
Add missing ECDH dependencies in ssl-opt tests
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-15 17:07:16 +02:00
Przemek Stekiel
ce05f54283
Properly disable ECDH in only (psk) ephemeral ffdh key exchange components
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-15 16:44:08 +02:00
Dave Rodgman
2e7d57270e
Merge pull request #7624 from daverodgman/aes-perf
...
AES perf improvements
2023-06-15 12:10:06 +01:00
Tom Cosgrove
6edf8b8c7b
Merge pull request #7451 from yanrayw/7376_aes_128bit_only
...
Introduce config option of 128-bit key only in AES calculation
2023-06-15 10:35:32 +01:00
Manuel Pégourié-Gonnard
8d645dcd77
Fix unintentional config reduction in prev commit
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-06-15 09:07:10 +02:00
Przemek Stekiel
a53dca125e
Limit number ffdh test cases (ffdhe2048, ffdhe8192)
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-14 20:53:09 +02:00
Gilles Peskine
f75903503b
Merge pull request #7770 from valeriosetti/issue7341
...
gcc 11.3 fails when compiling ecjpake drivers
2023-06-14 19:22:46 +02:00
Gilles Peskine
f22983bd1c
Merge pull request #7411 from mprse/extract-key-ids-test
...
Improve tests for parsing x509 SubjectKeyId and AuthorityKeyId
2023-06-14 19:16:29 +02:00
Gilles Peskine
c453e2e7e8
Officially deprecate MBEDTLS_CIPHER_BLKSIZE_MAX
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-06-14 18:00:37 +02:00
Gilles Peskine
9e930e2887
Rename MBEDTLS_CIPHER_BLKSIZE_MAX internally
...
Replace all occurrences of MBEDTLS_CIPHER_BLKSIZE_MAX by the new name with
the same semantics MBEDTLS_CMAC_MAX_BLOCK_SIZE, except when defining or
testing the old name.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-06-14 18:00:37 +02:00
Gilles Peskine
7282a9e1a0
Replacement for MBEDTLS_CIPHER_BLKSIZE_MAX
...
Prepare to rename this constant by MBEDTLS_CMAC_MAX_BLOCK_SIZE. The old name
was misleading since it looked like it covered all cipher support, not just
CMAC support, but CMAC doesn't support Camellia or ARIA so the two are
different.
This commit introduces the new constant. Subsequent commits will replace
internal uses of MBEDTLS_CIPHER_BLKSIZE_MAX and deprecate it.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-06-14 18:00:37 +02:00
Gilles Peskine
9d1689bbbe
Add not-supported test case for ARIA and for other Camellia key sizes
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-06-14 18:00:37 +02:00
Gilles Peskine
4f4d4b2c40
Test consistency of cipher max-size macros
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-06-14 18:00:37 +02:00
Przemek Stekiel
b3eaf8c2ed
Use predefined serial numer in certificates
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-14 14:25:21 +02:00
Przemek Stekiel
0c23147456
Disable MBEDTLS_DHM_C in component_test_tls13_only_psk
...
For details see the following comment: https://github.com/Mbed-TLS/mbedtls/pull/7627#issuecomment-1590792002
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-14 11:12:45 +02:00
Yanray Wang
4292441a42
all.sh: use clang for one test of AES_ONLY_128_BIT_KEY_LENGTH
...
Signed-off-by: Yanray Wang <yanray.wang@arm.com >
2023-06-14 17:10:15 +08:00
Przemek Stekiel
422ab1f835
Add FFDH tests to ssl-opt
...
Add FFDH support to the test case generator script: generate_tls13_compat_tests.py.
Add dependency for openssl as FFDH is supported from version 3.0.
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-14 11:04:28 +02:00
Valerio Setti
6ff271e3e9
pake: fixed warning for casting between different types
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2023-06-14 10:26:51 +02:00
Przemek Stekiel
ae3209c1e4
Add ffdh support yo generate_tls13_compat_tests.py
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-13 15:09:03 +02:00
Andrzej Kurek
f1b659ed62
Move an include
...
ARRAY_LENGTH macro was previously present
in macros.h, so move the include there.
Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com >
2023-06-13 05:46:47 -04:00
Andrzej Kurek
b22b9778c7
Move the ARRAY_LENGTH definition to common.h
...
Reuse it in the library and tests.
Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com >
2023-06-13 05:46:47 -04:00
Dave Rodgman
855f72bb4c
Fix ecp test
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-13 10:36:56 +01:00
Dave Rodgman
c216d94560
Merge remote-tracking branch 'origin/development' into safer-ct5
2023-06-13 10:36:37 +01:00
Przemek Stekiel
a01c24227f
Add test components: only PSK ephemeral ffdh, only ephemeral ffdh key exchange
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-13 10:46:48 +02:00
Przemek Stekiel
75a5a9c205
Code cleanup
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-13 09:57:23 +02:00
Manuel Pégourié-Gonnard
f8930e2c80
Fix special-case with all curves except one.
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-06-13 09:51:32 +02:00
Manuel Pégourié-Gonnard
aed1d7875a
Remove references to non-existing options
...
We no longer support TLS 1.0, TLS 1.1 or CBC record splitting since 3.0,
but those where still referenced here.
While at it, group things in a more logical way in this component.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-06-12 17:22:24 +02:00