Thomas Daubney 
							
						 
					 
					
						
						
							
						
						540324cd21 
					 
					
						
						
							
							Correct styling of Mbed TLS in documentation  
						
						... 
						
						
						
						Several bits of documentation were incorrectly styling Mbed TLS
as MbedTLS.
Signed-off-by: Thomas Daubney <thomas.daubney@arm.com > 
						
						
					 
					
						2023-10-06 17:07:24 +01:00 
						 
				 
			
				
					
						
							
							
								Paul Elliott 
							
						 
					 
					
						
						
							
						
						fd3360ebf4 
					 
					
						
						
							
							Remove unneeded setting of ret from ssl programs  
						
						... 
						
						
						
						Remove coverity warnings on unused values.
Signed-off-by: Paul Elliott <paul.elliott@arm.com > 
						
						
					 
					
						2023-09-15 17:41:25 +01:00 
						 
				 
			
				
					
						
							
							
								Gilles Peskine 
							
						 
					 
					
						
						
							
						
						e820c0abc8 
					 
					
						
						
							
							Update spelling "mbed TLS" to "Mbed TLS"  
						
						... 
						
						
						
						The official spelling of the trade mark changed from all-lowercase "mbed"
to normal proper noun capitalization "Mbed" a few years ago. We've been
using the new spelling in new text but still have the old spelling in a
lot of text. This commit updates most occurrences of "mbed TLS":
```
sed -i -e 's/mbed TLS/Mbed TLS/g' $(git ls-files ':!ChangeLog' ':!tests/data_files/**' ':!tests/suites/*.data' ':!programs/x509/*' ':!configs/tfm*')
```
Justification for the omissions:
* `ChangeLog`: historical text.
* `test/data_files/**`, `tests/suites/*.data`, `programs/x509/*`: many
  occurrences are significant names in certificates and such. Changing
  the spelling would invalidate many signatures and tests.
* `configs/tfm*`: this is an imported file. We'll follow the upstream
  updates.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com > 
						
						
					 
					
						2023-09-12 19:18:17 +02:00 
						 
				 
			
				
					
						
							
							
								Gowtham Suresh Kumar 
							
						 
					 
					
						
						
							
						
						186731b22a 
					 
					
						
						
							
							Fix warnings from clang-16  
						
						... 
						
						
						
						Running clang-16 on mbedtls reports warnings of type "-Wstrict-prototypes".
This patch fixes these warnings by adding void to functions with no
arguments. The generate_test_code.py is modified to insert void into test
functions with no arguments in *.function files.
Signed-off-by: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com > 
						
						
					 
					
						2023-07-26 17:11:51 +01:00 
						 
				 
			
				
					
						
							
							
								Manuel Pégourié-Gonnard 
							
						 
					 
					
						
						
							
						
						828b3acd6b 
					 
					
						
						
							
							Merge pull request  #7848  from valeriosetti/issue7749  
						
						... 
						
						
						
						driver-only ECC: EPCf.TLS testing 
						
						
					 
					
						2023-07-18 10:33:21 +02:00 
						 
				 
			
				
					
						
							
							
								Dave Rodgman 
							
						 
					 
					
						
						
							
						
						91d9daf2b3 
					 
					
						
						
							
							Merge pull request  #7925  from hasheddan/dtls-server-order  
						
						... 
						
						
						
						Fix order of steps in DTLS server example program 
						
						
					 
					
						2023-07-17 09:41:43 +01:00 
						 
				 
			
				
					
						
							
							
								Daniel Mangum 
							
						 
					 
					
						
						
							
						
						af2f7a6fcb 
					 
					
						
						
							
							Fix order of steps in DTLS server example program  
						
						... 
						
						
						
						Fixes the numbered order of steps in the DTLS server example program.
Signed-off-by: Daniel Mangum <georgedanielmangum@gmail.com > 
						
						
					 
					
						2023-07-14 12:00:33 -04:00 
						 
				 
			
				
					
						
							
							
								Valerio Setti 
							
						 
					 
					
						
						
							
						
						dda0019e2e 
					 
					
						
						
							
							ssl_test_lib: fix rebase error  
						
						... 
						
						
						
						Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no > 
						
						
					 
					
						2023-07-10 10:22:51 +02:00 
						 
				 
			
				
					
						
							
							
								Valerio Setti 
							
						 
					 
					
						
						
							
						
						5bdebb2004 
					 
					
						
						
							
							ssl_test_lib: fix variable naming for curve group  
						
						... 
						
						
						
						Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no > 
						
						
					 
					
						2023-07-10 09:13:57 +02:00 
						 
				 
			
				
					
						
							
							
								Valerio Setti 
							
						 
					 
					
						
						
							
						
						fb6356f003 
					 
					
						
						
							
							ssl_test_lib: simplify function which prints supported curves  
						
						... 
						
						
						
						Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no > 
						
						
					 
					
						2023-07-10 09:13:57 +02:00 
						 
				 
			
				
					
						
							
							
								Valerio Setti 
							
						 
					 
					
						
						
							
						
						deb676442d 
					 
					
						
						
							
							ssl_test_lib: manage FFDH keys the same way as ECC ones  
						
						... 
						
						
						
						Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no > 
						
						
					 
					
						2023-07-10 09:13:57 +02:00 
						 
				 
			
				
					
						
							
							
								Valerio Setti 
							
						 
					 
					
						
						
							
						
						acd32c005f 
					 
					
						
						
							
							programs: add helper functions for supported EC curves  
						
						... 
						
						
						
						- get full list, or
- get TLS ID from name
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no > 
						
						
					 
					
						2023-07-10 09:13:57 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						68e7544de8 
					 
					
						
						
							
							parse_groups: curve -> group adaptations  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-07-06 12:16:44 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						45255e4c71 
					 
					
						
						
							
							Adapt names (curves -> groups)  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-07-05 09:26:26 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						7d42c0d0e5 
					 
					
						
						
							
							Code cleanup  #2  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-06-13 12:30:40 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						75a5a9c205 
					 
					
						
						
							
							Code cleanup  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-06-13 09:57:23 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						ff9fcbcace 
					 
					
						
						
							
							ssl_client2, ssl_server2: code optimization + guards adaptation  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-06-06 12:53:40 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						da4fba64b8 
					 
					
						
						
							
							Further code optimizations  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-06-06 12:31:09 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						316c19ef93 
					 
					
						
						
							
							Adapt guards, dependencies + optimizations  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-06-06 12:31:09 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						e7db09bede 
					 
					
						
						
							
							Move FFDH helper functions and macros to more suitable locations  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-06-06 12:31:08 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						6d7da5ee1e 
					 
					
						
						
							
							Add FFDH support in client2, server2 applications  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-06-06 12:31:08 +02:00 
						 
				 
			
				
					
						
							
							
								Gilles Peskine 
							
						 
					 
					
						
						
							
						
						97edeb4fb8 
					 
					
						
						
							
							Merge pull request  #6866  from mprse/extract-key-ids  
						
						... 
						
						
						
						Extracting SubjectKeyId and AuthorityKeyId in case of x509 V3 extensions v.2 
						
						
					 
					
						2023-05-08 20:38:29 +02:00 
						 
				 
			
				
					
						
							
							
								Gilles Peskine 
							
						 
					 
					
						
						
							
						
						53a9ac576d 
					 
					
						
						
							
							Merge pull request  #7443  from mprse/psa_init_in_programs  
						
						... 
						
						
						
						Init PSA in ssl and x509 programs 
						
						
					 
					
						2023-04-28 12:49:11 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						94cf710edc 
					 
					
						
						
							
							Revert increase of MEMORY_HEAP_SIZE in ssl_client2  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-04-24 16:35:40 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						758aef60c5 
					 
					
						
						
							
							Add guards for mbedtls_psa_crypto_free()  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-04-24 08:10:01 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						a8c560a799 
					 
					
						
						
							
							Free psa crypto at the end of programs when initialized  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-04-19 10:15:26 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						e296868b25 
					 
					
						
						
							
							Remove print from mini_client  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-04-17 11:11:01 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						a0a1c1eab5 
					 
					
						
						
							
							Move psa_crypto_init() after other init calls  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-04-17 11:10:05 +02:00 
						 
				 
			
				
					
						
							
							
								Przemek Stekiel 
							
						 
					 
					
						
						
							
						
						89c636e6cf 
					 
					
						
						
							
							Init PSA in ssl and x509 programs  
						
						... 
						
						
						
						Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com > 
						
						
					 
					
						2023-04-16 22:41:52 +02:00 
						 
				 
			
				
					
						
							
							
								Valerio Setti 
							
						 
					 
					
						
						
							
						
						d49cbc1493 
					 
					
						
						
							
							test: fix remaining failures in test due to the ECP_LIGHT symbol  
						
						... 
						
						
						
						Changes in test_suite_psa_crypto are to enforce the dependency
on ECP_C which is mandatory for some key's derivation.
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no > 
						
						
					 
					
						2023-04-11 11:33:50 +02:00 
						 
				 
			
				
					
						
							
							
								Gilles Peskine 
							
						 
					 
					
						
						
							
						
						c9e8a65d06 
					 
					
						
						
							
							Merge pull request  #7298  from lpy4105/issue/6840/add-cache-entry-removal-api  
						
						... 
						
						
						
						ssl_cache: misc improvements 
						
						
					 
					
						2023-04-11 09:30:40 +02:00 
						 
				 
			
				
					
						
							
							
								toth92g 
							
						 
					 
					
						
						
							
						
						27f9e7815c 
					 
					
						
						
							
							Adding openssl configuration file and command to Makefile to be able to reproduce the certificate for testing Authority and Subject Key Id fields  
						
						... 
						
						
						
						Increasing heap memory size of SSL_Client2 and SSL_Server2, because the original value is not enough to handle some certificates. The AuthorityKeyId and SubjectKeyId are also parsed now increasing the size of some certificates
Signed-off-by: toth92g <toth92g@gmail.com > 
						
						
					 
					
						2023-04-04 17:48:27 +02:00 
						 
				 
			
				
					
						
							
							
								Manuel Pégourié-Gonnard 
							
						 
					 
					
						
						
							
						
						23fc437037 
					 
					
						
						
							
							SSL: fix test failures  
						
						... 
						
						
						
						1. Change USE_PSA_CRYPTO_INIT/DONE to MD_OR_USE.
2. Add missing occurrences - some of these were already necessary in
principle (in one form or another) but where missing and this was not
detected so far as `psa_hash` doesn't complain in case of a missing
init, but now MD makes it visible.
3. Add missing include in ssl_test_lib.h.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com > 
						
						
					 
					
						2023-03-21 16:29:31 +01:00 
						 
				 
			
				
					
						
							
							
								Manuel Pégourié-Gonnard 
							
						 
					 
					
						
						
							
						
						bef824d394 
					 
					
						
						
							
							SSL: use MD_CAN macros  
						
						... 
						
						
						
						Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com > 
						
						
					 
					
						2023-03-21 16:29:31 +01:00 
						 
				 
			
				
					
						
							
							
								Pengyu Lv 
							
						 
					 
					
						
						
							
						
						b1895899f1 
					 
					
						
						
							
							ssl_cache: Improve some comments  
						
						... 
						
						
						
						Signed-off-by: Pengyu Lv <pengyu.lv@arm.com > 
						
						
					 
					
						2023-03-16 14:33:28 +08:00 
						 
				 
			
				
					
						
							
							
								Gilles Peskine 
							
						 
					 
					
						
						
							
						
						2a44ac245f 
					 
					
						
						
							
							Merge pull request  #7217  from lpy4105/issue/6840/add-cache-entry-removal-api  
						
						... 
						
						
						
						ssl_cache: Add cache entry removal api 
						
						
					 
					
						2023-03-15 15:38:06 +01:00 
						 
				 
			
				
					
						
							
							
								Pengyu Lv 
							
						 
					 
					
						
						
							
						
						f30488f5cd 
					 
					
						
						
							
							Move the usage string of cache_remove to USAGE_CACHE  
						
						... 
						
						
						
						Signed-off-by: Pengyu Lv <pengyu.lv@arm.com > 
						
						
					 
					
						2023-03-15 09:53:45 +08:00 
						 
				 
			
				
					
						
							
							
								Pengyu Lv 
							
						 
					 
					
						
						
							
						
						753d02ffd4 
					 
					
						
						
							
							ssl_server2: Add options to support cache removal  
						
						... 
						
						
						
						Signed-off-by: Pengyu Lv <pengyu.lv@arm.com > 
						
						
					 
					
						2023-03-13 09:28:17 +08:00 
						 
				 
			
				
					
						
							
							
								Dave Rodgman 
							
						 
					 
					
						
						
							
						
						5e5aa4a4e6 
					 
					
						
						
							
							Merge pull request  #7218  from tom-cosgrove-arm/fix-typos-230307  
						
						... 
						
						
						
						Fix typos in development prior to release 
						
						
					 
					
						2023-03-08 17:19:59 +00:00 
						 
				 
			
				
					
						
							
							
								Tom Cosgrove 
							
						 
					 
					
						
						
							
						
						5c8505f061 
					 
					
						
						
							
							Fix typos  
						
						... 
						
						
						
						Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com > 
						
						
					 
					
						2023-03-07 11:39:52 +00:00 
						 
				 
			
				
					
						
							
							
								Valerio Setti 
							
						 
					 
					
						
						
							
						
						5ba1d5eb2c 
					 
					
						
						
							
							programs: use proper macro for ECDSA capabilities in ssl_sever2  
						
						... 
						
						
						
						Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no > 
						
						
					 
					
						2023-02-23 08:15:17 +01:00 
						 
				 
			
				
					
						
							
							
								Dave Rodgman 
							
						 
					 
					
						
						
							
						
						f31c9e441b 
					 
					
						
						
							
							Merge pull request  #7019  from tom-cosgrove-arm/dont-use-cast-assignment-in-ssl_server2.c  
						
						... 
						
						
						
						Don't use cast-assignment in ssl_server.c 
						
						
					 
					
						2023-02-06 12:13:08 +00:00 
						 
				 
			
				
					
						
							
							
								Tom Cosgrove 
							
						 
					 
					
						
						
							
						
						de85725507 
					 
					
						
						
							
							Don't use cast-assignment in ssl_server.c  
						
						... 
						
						
						
						Would have used mbedtls_put_unaligned_uint32(), but alignment.h is in library/.
Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com > 
						
						
					 
					
						2023-02-03 16:38:05 +00:00 
						 
				 
			
				
					
						
							
							
								Aditya Deshpande 
							
						 
					 
					
						
						
							
						
						644a5c0b2b 
					 
					
						
						
							
							Fix bugs in example programs: change argc == 0 to argc < 2  
						
						... 
						
						
						
						Signed-off-by: Aditya Deshpande <aditya.deshpande@arm.com > 
						
						
					 
					
						2023-01-30 16:48:13 +00:00 
						 
				 
			
				
					
						
							
							
								Pengyu Lv 
							
						 
					 
					
						
						
							
						
						e2f1dbf5ae 
					 
					
						
						
							
							update docs of ssl_client2 and improve code format  
						
						... 
						
						
						
						Signed-off-by: Pengyu Lv <pengyu.lv@arm.com > 
						
						
					 
					
						2023-01-16 12:38:12 +08:00 
						 
				 
			
				
					
						
							
							
								Pengyu Lv 
							
						 
					 
					
						
						
							
						
						302feb3955 
					 
					
						
						
							
							add cases to test session resumption with different ticket_flags  
						
						... 
						
						
						
						This commit add test cases to test if the check of kex change mode
in SessionTicket works well.
Signed-off-by: Pengyu Lv <pengyu.lv@arm.com > 
						
						
					 
					
						2023-01-13 11:05:56 +08:00 
						 
				 
			
				
					
						
							
							
								Gilles Peskine 
							
						 
					 
					
						
						
							
						
						449bd8303e 
					 
					
						
						
							
							Switch to the new code style  
						
						... 
						
						
						
						Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com > 
						
						
					 
					
						2023-01-11 14:50:10 +01:00 
						 
				 
			
				
					
						
							
							
								Jerry Yu 
							
						 
					 
					
						
						
							
						
						a15af37867 
					 
					
						
						
							
							Change time resolution of reco_delay from second to millionseconds  
						
						... 
						
						
						
						Per gnutls anti replay issue, it needs millionsecond time delay for
improve the fail rate.
From test result of #6712 , this can improve the fail rate from 4%
to 92%.
Signed-off-by: Jerry Yu <jerry.h.yu@arm.com > 
						
						
					 
					
						2023-01-07 13:01:42 +08:00 
						 
				 
			
				
					
						
							
							
								Manuel Pégourié-Gonnard 
							
						 
					 
					
						
						
							
						
						c98624af3c 
					 
					
						
						
							
							Merge pull request  #6680  from valeriosetti/issue6599  
						
						... 
						
						
						
						Allow isolation of EC J-PAKE password when used in TLS 
						
						
					 
					
						2022-12-14 11:04:33 +01:00 
						 
				 
			
				
					
						
							
							
								Valerio Setti 
							
						 
					 
					
						
						
							
						
						d75c5c4405 
					 
					
						
						
							
							test: pake: fail in case the opaque key is destroyed unexpectedly  
						
						... 
						
						
						
						Signed-off-by: Valerio Setti <vsetti@baylibre.com > 
						
						
					 
					
						2022-12-13 11:51:32 +01:00