80a8156314
Prepare ChangeLog for 3.5.0 release
...
```
./scripts/assemble_changelog.py
```
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-10-03 22:08:39 +01:00
31ca313efa
Bump version to 3.5.0
...
```
./scripts/bump_version.sh --version 3.5.0
```
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-10-03 22:02:18 +01:00
1a3ad265cc
Merge branch 'development-restricted' into mbedtls-3.5.0rc0-pr
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-10-03 21:57:51 +01:00
3406564b01
Merge pull request #8291 from minosgalanakis/bugfix/updated_check_generated_files
2023-10-03 21:18:57 +01:00
cc5bf4946f
Make SHA256 depend on Armv8, not aarch64
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-10-03 18:02:56 +01:00
5ed7b2dec2
Introduce MBEDTLS_ARCH_IS_ARMV8
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-10-03 18:02:31 +01:00
3cde6a2be2
Improve naming
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-10-03 16:02:56 +01:00
4243610c15
Use make to generate the test command
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-10-03 15:47:05 +01:00
3fb93a8223
Merge pull request #8295 from minosgalanakis/changelog/renamed_psa_crypto_driver_wrappers
...
Changelog: Added entry for psa_crypto_driver_wrappers rename
2023-10-03 14:05:56 +01:00
130938a804
Merge pull request #1088 from gilles-peskine-arm/tls13_read_public_xxdhe_share-overflow
...
Fix buffer overflow in TLS 1.3 and USE_PSA_CRYPTO ClientHello ECDH/FFDH parsers
2023-10-03 12:28:38 +01:00
3974b17631
check-generated-files: Added psa_crypto_driver_wrappers_no_static.c file
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-10-03 11:47:03 +01:00
466286a14a
Remove redundant test component
...
In the full configuration MBEDTLS_TEST_HOOKS is
enabled thus the configurations in
test_full_cmake_gcc_asan_new_bignum and
test_full_cmake_gcc_asan_new_bignum_test_hooks
are the same. Keep the component that runs more
tests.
Signed-off-by: Ronald Cron <ronald.cron@arm.com >
2023-10-03 12:44:15 +02:00
76b709dd44
Changelog: Added entry for psa_crypto_driver_wrappers rename
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-10-03 11:14:41 +01:00
61ea46d5d4
Merge remote-tracking branch 'origin/development' into check-changelog-exts
2023-10-03 09:32:13 +01:00
ff3e9e1eb0
Merge pull request #8292 from minosgalanakis/bugfix/changelog_extensions
...
ChangeLog: Added .txt extension to log entries.
2023-10-03 09:29:39 +01:00
3713bee34c
Remove leftover local debug line
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-02 18:43:18 +02:00
65d8ec1444
Move check into list_files_to_merge
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-10-02 17:19:51 +01:00
43a5ce8c7f
rename function
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-10-02 17:09:37 +01:00
08707ecbfe
ChangeLog: Added .txt extension to log entries.
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-10-02 16:55:00 +01:00
3901e2ef92
Check for incorrect changelog extensions
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-10-02 16:44:09 +01:00
7910cdd47f
Avoid compiler warning about size comparison
...
GCC warns about comparing uint8_t to a size that may be >255.
Strangely, casting the uint8_t to a size_t in the comparison expression
doesn't avoid the warning. So change the type of the variable.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-02 16:11:05 +02:00
530c423ad2
Improve some debug messages and error codes
...
On a parsing error in TLS, return MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE, not a
crypto error code.
On error paths, emit a level-1 debug message. Report the offending sizes.
Downgrade an informational message's level to 3.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-02 15:42:11 +02:00
6dd5b9a60c
In TLS 1.2, only servers are affected
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-02 15:38:51 +02:00
b782415e1b
Changelog entry for xxdh_psa_peerkey size validation
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-02 15:08:37 +02:00
c29df535ee
Improve robustness of ECDH public key length validation
...
In client-side code with MBEDTLS_USE_PSA_CRYPTO, use the buffer size to
validate what is written in handshake->xxdh_psa_peerkey. The previous code
was correct, but a little fragile to misconfiguration or maintenance.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-02 15:02:39 +02:00
c8df898204
Fix buffer overflow in TLS 1.2 ClientKeyExchange parsing
...
Fix a buffer overflow in TLS 1.2 ClientKeyExchange parsing. When
MBEDTLS_USE_PSA_CRYPTO is enabled, the length of the public key in an ECDH
or ECDHE key exchange was not validated. This could result in an overflow of
handshake->xxdh_psa_peerkey, overwriting further data in the handshake
structure or further on the heap.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-02 15:02:33 +02:00
12c5aaae57
Fix buffer overflow in TLS 1.3 ECDH public key parsing
...
Fix a buffer overflow in TLS 1.3 ServerHello and ClientHello parsing. The
length of the public key in an ECDH- or FFDH-based key exchange was not
validated. This could result in an overflow of handshake->xxdh_psa_peerkey,
overwriting further data in the handshake structure or further on the heap.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-10-02 15:02:10 +02:00
bf66b752b4
Add custom config logic to 3rdparty modules
...
These do not link directly against Mbed TLS so need their own
propagation of the custom config values through CMake.
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2023-10-02 11:07:35 +01:00
920343aaf7
Separate out a resuable option cross-product test function
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-10-01 19:06:09 +01:00
184c0af06e
Remove not-needed edge-case
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-10-01 13:43:02 +01:00
8a64fb82a8
Simplify makefile generation; don't use -j
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-10-01 13:31:31 +01:00
86cc70871c
fix make issue
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 22:32:04 +01:00
a06d45ec4a
Code style
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 18:59:34 +01:00
aea01c9455
Use make to parellise tests
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 18:54:49 +01:00
9728562192
Improve test speed
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 18:27:04 +01:00
0673ed2e93
Merge pull request #8278 from gilles-peskine-arm/7298-changelog
...
Changelog entry for 7298
2023-09-29 15:56:30 +00:00
53307b794d
CMake: fix build with 3rdparty module enabled through a custom config
...
Fixes #8165
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-09-29 17:37:55 +02:00
573dfc167a
Add testing for MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 16:27:29 +01:00
450c1ff353
Fix some more incorrect guards in aes.c
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 16:23:37 +01:00
745af9f47b
Extend testing of aes.o options
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 16:22:23 +01:00
673fec0c8c
Merge pull request #8277 from mpg/cl-ffdh-psa
...
Fix ChangeLog entry for FFDH in PSA
2023-09-29 13:17:53 +00:00
16e9256fe8
Merge pull request #8272 from daverodgman/iar-warnings
...
Fix IAR warnings
2023-09-29 13:11:03 +00:00
e81a632257
Restore missing #if
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 13:54:27 +01:00
782df03553
Improve AES hardware-only check
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 13:04:36 +01:00
d39edead25
Changelog entry for #7298
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-09-29 13:07:01 +02:00
f7baf7bfb3
Merge pull request #8271 from daverodgman/fix-numops
...
Fix error handling in psa_driver_wrapper_xxx_hash_get_num_ops
2023-09-29 10:46:50 +00:00
ef89fb80d7
Fix ChangeLog entry for FFDH in PSA
...
It was jumping directly to "driver support" and omitting the first step
of "PSA support".
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-29 12:26:47 +02:00
9ac0e72386
Undo not-needed change
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 10:39:31 +01:00
ed9c22d533
Remove redundant code
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-29 10:33:49 +01:00
3572bde9c9
Assume get_num_ops cannot fail
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-28 19:33:15 +01:00