Tom Cosgrove
c6d562815d
Merge pull request #8392 from lpy4105/backport-2.28/issue/support-cpuid-for-win32
...
Backport 2.28: Support cpuid for win32
2023-10-23 10:43:36 +00:00
Pengyu Lv
e6cbec8ea7
all.sh: build_mingw: test build default config without MBEDTLS_AESNI_C
...
Signed-off-by: Pengyu Lv <pengyu.lv@arm.com>
2023-10-20 09:54:41 +08:00
Gilles Peskine
7e36ad1f5c
Merge pull request #7983 from gilles-peskine-arm/sample-program-demos-2.28
...
Backport 2.28: Run sample program demo scripts in all.sh
2023-10-19 15:11:00 +00:00
Pengyu Lv
b2ca03251d
all.sh: build_mingw: test AESNI intrinsics
...
Signed-off-by: Pengyu Lv <pengyu.lv@arm.com>
2023-10-19 17:17:19 +08:00
Pengyu Lv
c5d9d2d67e
Reword the changelog entry
...
Signed-off-by: Pengyu Lv <pengyu.lv@arm.com>
2023-10-19 16:52:01 +08:00
Pengyu Lv
f24a85fd5e
Add a changelog entry
...
Signed-off-by: Pengyu Lv <pengyu.lv@arm.com>
2023-10-19 16:52:01 +08:00
Pengyu Lv
f3c6e2ee34
aesni: select __cpuid
impl based on compiler type
...
MinGW provides both kinds of implementations of `__cpuid`,
but since `cpuid.h` is provided by GNUC, so we should choose
the implementation by the compiler type instead of OS type.
Signed-off-by: Pengyu Lv <pengyu.lv@arm.com>
2023-10-19 16:45:37 +08:00
Pengyu Lv
79d7faf030
aesni: declare cpuinfo as int
...
Change the type of array that stores the cpuinfo
data to int[4] to match the signature of `__cpuinfo`
in `intrin.h` header file.
Signed-off-by: Pengyu Lv <pengyu.lv@arm.com>
2023-10-19 16:45:37 +08:00
Pengyu Lv
2856e076e6
aesni: support cpuid on WIN32
...
`__cpuid` has two kinds of signatures in different
headers depending on the target OS. We make it
consistent between the usages ang the included header.
Signed-off-by: Pengyu Lv <pengyu.lv@arm.com>
2023-10-19 16:45:36 +08:00
Manuel Pégourié-Gonnard
0ee9dacb4d
Merge pull request #8122 from gilles-peskine-arm/ssl-test-no-legacy-2.28
...
Backport 2.28: Remove GNUTLS_LEGACY and OPENSSL_LEGACY (partly)
2023-10-18 07:13:15 +00:00
Bence Szépkúti
01902779a3
Merge pull request #8162 from yanrayw/2.28-save_stack_usage_pkwrite
...
Backport 2.28: pkwrite: use heap to save stack usage for writing keys in PEM string
2023-10-13 14:27:18 +00:00
Dave Rodgman
3841af02f5
Merge pull request #8349 from kasjer/kasjer/mbedtls-2.28/aes-rcon-rename
...
[Backport 2.28] Rename local variable in aes.c
2023-10-12 14:56:07 +00:00
Jerzy Kasenberg
1222ae67d5
Rename local variable in aes.c
...
This changes local variable name RCON to round_constants.
RCON being definition in xc32 compiler headers for some PIC32 register.
Without this change mynewt project for PIC32 platform fails to build due to
macro redefinition.
This does not changes behavior of library in any way.
Signed-off-by: Jerzy Kasenberg <jerzy.kasenberg@codecoup.pl>
2023-10-12 09:16:34 +02:00
Tom Cosgrove
44af43639c
Merge pull request #8333 from yanrayw/2.28_aes_benchmark_cfb
...
Backport 2.28: Benchmark: add AES_CFB128 and AES_CFB8
2023-10-11 12:59:28 +00:00
Yanray Wang
c55060d42a
benchmark: improve code readability
...
Signed-off-by: Yanray Wang <yanray.wang@arm.com>
2023-10-10 10:49:32 +08:00
Yanray Wang
c96db3bf25
benchmark: add AES_CFB8
...
Signed-off-by: Yanray Wang <yanray.wang@arm.com>
2023-10-10 10:49:32 +08:00
Yanray Wang
b382c2b0e7
benchmark: add AES_CFB128
...
Signed-off-by: Yanray Wang <yanray.wang@arm.com>
2023-10-10 10:49:32 +08:00
Dave Rodgman
e0be6bfafa
Merge pull request #8324 from tom-daubney-arm/fix_mbedtls_styling_docs_228
...
Backport 2.28: Correct styling of Mbed TLS in documentation
2023-10-06 20:07:40 +00:00
Thomas Daubney
0814a22490
Correct styling of Mbed TLS in documentation
...
Several bits of documentation were incorrectly styling Mbed TLS
as MbedTLS.
Signed-off-by: Thomas Daubney <thomas.daubney@arm.com>
2023-10-06 17:37:01 +01:00
Dave Rodgman
360320a660
Merge pull request #8293 from daverodgman/check-changelog-exts-2.28
...
2.28 backport - Check changelog extensions
2023-10-05 17:22:45 +00:00
minosgalanakis
064e732640
Merge pull request #1102 from Mbed-TLS/mbedtls-2.28.5_mergeback
...
Mbedtls 2.28.5 mergeback
2023-10-05 17:33:08 +01:00
Paul Elliott
36a4ea5c01
Merge pull request #8302 from davidhorstmann-arm/cmake-fix-3rdparty-custom-config-2.28
...
[Backport 2.28] CMake: fix build with 3rdparty module enabled through a custom config
2023-10-04 22:59:43 +00:00
minosgalanakis
47e8cc9db2
Merge pull request #1092 from Mbed-TLS/mbedtls-2.28.5rc0-pr
...
Mbedtls 2.28.5rc0 pr
v2.28.5
mbedtls-2.28.5
2023-10-04 23:11:08 +01:00
Minos Galanakis
e18540886c
Updated BRANCHES.md
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
2023-10-04 21:05:17 +01:00
Gilles Peskine
66a868b6af
CMake: fix build with 3rdparty module enabled through a custom config
...
Fixes #8165
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-10-04 15:11:10 +02:00
Minos Galanakis
468d6e8e0e
ChangeLog: Set release date
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
2023-10-03 22:28:07 +01:00
Minos Galanakis
7de3eed636
Prepare ChangeLog for 2.28.5 release
...
```
./scripts/assemble_changelog.py
```
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
2023-10-03 22:26:03 +01:00
Minos Galanakis
c7a8ea998d
Bump version to 2.28.5
...
```
./scripts/bump_version.sh --version 2.28.5
```
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
2023-10-03 22:24:04 +01:00
Minos Galanakis
6d169947e9
Merge branch 'mbedtls-2.28-restricted' into mbedtls-2.28.5rc0-pr
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
2023-10-03 22:22:36 +01:00
Dave Rodgman
3c6b7c8efc
Move check into list_files_to_merge
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
2023-10-02 17:20:08 +01:00
Dave Rodgman
68cb9359a6
Check for incorrect changelog extensions
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
2023-10-02 17:03:47 +01:00
Dave Rodgman
da635ab657
Merge pull request #8280 from gilles-peskine-arm/ssl_cache-negative_errors-2.28
...
Backport 2.28: ssl_cache: misc improvements
2023-09-29 17:58:10 +00:00
Dave Rodgman
8c28032537
Merge pull request #8279 from gilles-peskine-arm/mbedtls_ecdsa_can_do
...
Backport 2.28: Bug Fix: mbedtls_ecdsa_verify_restartable fails with ECDSA_SIGN_ALT
2023-09-29 13:11:43 +00:00
Gilles Peskine
5856fd32dd
Changelog entry for mbedtls_ssl_cache error code fixes
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-09-29 13:42:47 +02:00
Gilles Peskine
fe4d93ad4d
ssl_cache: return error codes on error
...
mbedtls_ssl_cache_get() and mbedtls_ssl_cache_set() returned 1 on many error
conditions. Change this to returning a negative MBEDTLS_ERR_xxx error code.
Completeness: after this commit, there are no longer any occurrences of
`return 1` or `ret = 1`.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-09-29 13:40:33 +02:00
Gilles Peskine
917dd8bd81
Add new error code for SSL cache entry not found
...
There was no good error to return in this case.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-09-29 13:39:49 +02:00
JonathanWitthoeft
3ead877b68
Adjust ChangeLog
...
Signed-off-by: JonathanWitthoeft <jonw@gridconnect.com>
2023-09-29 13:31:49 +02:00
JonathanWitthoeft
930679a1d7
Make mbedtls_ecdsa_can_do definition unconditional
...
Signed-off-by: JonathanWitthoeft <jonw@gridconnect.com>
2023-09-29 13:31:48 +02:00
JonathanWitthoeft
bfb0b39460
Bug Fix: mbedtls_ecdsa_verify_restartable fails with ECDSA_SIGN_ALT
...
When ECDSA_SIGN_ALT but not ECDSA_VERIFY_ALT, mbedtls_ecdsa_can_do was not being defined causing mbedtls_ecdsa_verify_restartable to always fail
Signed-off-by: JonathanWitthoeft <jonw@gridconnect.com>
2023-09-29 13:31:47 +02:00
Dave Rodgman
ba1d63e36f
Merge pull request #1085 from daverodgman/update-ct-changelog-2.28
...
Backport 2.28: Update padding const-time fix changelog
2023-09-28 11:34:03 +01:00
Dave Rodgman
0ea272d110
Update padding const-time fix changelog
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
2023-09-27 16:31:33 +01:00
Dave Rodgman
dce82cd914
Merge pull request #8254 from paul-elliott-arm/fix_travis_coverity_build_2_28
...
[Backport 2.28] Re-add python install of requirements to Travis CI.
2023-09-26 16:56:17 +00:00
Dave Rodgman
7a8ec0f56c
Merge pull request #8209 from lpy4105/issue/8168/2.28_fix-aesni-selection
...
2.28: Fix AESNI selection
2023-09-26 16:55:28 +00:00
Paul Elliott
13481f0439
Re-add python install of requirements to Travis CI.
...
Also correct 'distro to 'dist' and update ubuntu to jammy and python
to 3.10 to hopefully fend off future issues. Too much got removed
when disabling travis and the Coverity scan build was failing on 'make
generated-files', due to lack of installed python dependencies
Signed-off-by: Paul Elliott <paul.elliott@arm.com>
2023-09-26 16:04:44 +01:00
Pengyu Lv
8068b0835b
Fix comment
...
Signed-off-by: Pengyu Lv <pengyu.lv@arm.com>
2023-09-26 09:27:04 +08:00
Gilles Peskine
9fe480a5f6
Merge pull request #1081 from waleed-elmelegy-arm/backport_check-set_padding-is-called
...
Backport 2.28: Check set_padding has been called in mbedtls_cipher_finish
2023-09-25 17:12:41 +02:00
Waleed Elmelegy
916ed7b8db
restore internal comment in cipher.h due to LTS
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
2023-09-25 15:18:48 +01:00
Waleed Elmelegy
8ce42ebd87
Remove invalid comments from cipher.h
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
2023-09-25 14:21:49 +01:00
Manuel Pégourié-Gonnard
e4138e3279
Fix a typo
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2023-09-25 14:13:24 +01:00
Manuel Pégourié-Gonnard
8013e685f5
Clarify calling sequence in the Cipher layer
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2023-09-25 14:12:08 +01:00