b95e92cd41
Merge pull request #8076 from valeriosetti/issue8005
...
Test with ECC and FFDH accelerated and no bignum
2023-09-14 09:12:35 +00:00
7732ced037
cipher_wrap: remove 192- and 256-bit for AES_ONLY_128_BIT_KEY_LENGTH
...
Signed-off-by: Yanray Wang <yanray.wang@arm.com >
2023-09-14 14:35:44 +08:00
d9f22804ea
Fixes log level for got supported group message
...
Signed-off-by: mcagriaksoy <mcagriaksoy@yandex.com >
2023-09-13 22:43:38 +02:00
0ddffb6de2
Merge pull request #7210 from sergio-nsk/patch-2
...
Fix llvm error: variable 'default_iv_length' and other may be used uninitialized
2023-09-13 16:38:55 +02:00
3d0bffb257
Improve statement in driver-only-builds.md
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-09-13 15:15:37 +01:00
528ec901ab
Add a changelog entry for p256-m
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-09-13 15:41:23 +02:00
6f784dff49
Reflect the fact p256-m has been integrated into Mbed TLS
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-09-13 15:32:30 +02:00
0684965f5a
Modify changelog entry to add pkcs12 pbe functions
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com >
2023-09-13 13:35:16 +01:00
016db89107
Update p256-m to state that it's ready for production
...
Add some guidance as to whether and how to enable it.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-09-13 14:34:40 +02:00
9b5d7d7801
Merge pull request #8195 from daverodgman/improve_sslmsg
...
Improve use of ct interface in mbedtls_ssl_decrypt_buf
2023-09-13 12:32:12 +00:00
3cea3efc25
Merge pull request #8025 from AgathiyanB/accept-numericoid-hexstring-x509
...
Accept numericoid hexstring x509
2023-09-13 08:54:33 +00:00
f22999e99f
Merge pull request #8093 from yuhaoth/pr/add-target-architecture-macros
...
Add architecture detection macros
2023-09-13 08:53:47 +00:00
da0bb9fae8
Merge pull request #8034 from gilles-peskine-arm/bump_version-doc_mainpage
...
Update capitalization of "Mbed" and fix bump_version.sh
2023-09-13 08:41:20 +00:00
0934b2007c
Merge pull request #8190 from paul-elliott-arm/update_cmake_min_ver
...
Update CMake minimum version(s) to match main CMakeLists.txt
2023-09-13 08:39:50 +00:00
7d52f2a0d9
Improve use of ct interface in mbedtls_ssl_decrypt_buf
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-13 09:30:03 +01:00
31beb2d449
Merge pull request #8166 from gilles-peskine-arm/p256-m-zeroize
...
p256-m: Use the zeroize function from Mbed TLS
2023-09-12 21:33:03 +00:00
4923640574
Merge pull request #8189 from tom-cosgrove-arm/fix-ct-error-padlen-correct
...
Use the correct variable when tracking padding length
2023-09-12 17:31:06 +00:00
2e38a0d603
More spelling corrections
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-09-12 19:19:31 +02:00
e820c0abc8
Update spelling "mbed TLS" to "Mbed TLS"
...
The official spelling of the trade mark changed from all-lowercase "mbed"
to normal proper noun capitalization "Mbed" a few years ago. We've been
using the new spelling in new text but still have the old spelling in a
lot of text. This commit updates most occurrences of "mbed TLS":
```
sed -i -e 's/mbed TLS/Mbed TLS/g' $(git ls-files ':!ChangeLog' ':!tests/data_files/**' ':!tests/suites/*.data' ':!programs/x509/*' ':!configs/tfm*')
```
Justification for the omissions:
* `ChangeLog`: historical text.
* `test/data_files/**`, `tests/suites/*.data`, `programs/x509/*`: many
occurrences are significant names in certificates and such. Changing
the spelling would invalidate many signatures and tests.
* `configs/tfm*`: this is an imported file. We'll follow the upstream
updates.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-09-12 19:18:17 +02:00
4843278237
Allow "Mbed TLS" as the project name in Doxygen
...
Previously the code only recognized the old spelling "mbed TLS", so it
missed doxygen/input/doc_mainpage.h.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-09-12 19:16:17 +02:00
a72ea814d8
Remove double blank line in x509_create.c
...
Signed-off-by: Agathiyan Bragadeesh <agathiyan.bragadeesh2@arm.com >
2023-09-12 17:57:09 +01:00
c7959b22c6
Remove magic number in x509.c
...
Signed-off-by: Agathiyan Bragadeesh <agathiyan.bragadeesh2@arm.com >
2023-09-12 17:56:58 +01:00
bc519a59d0
Merge pull request #8188 from paul-elliott-arm/fix_pkcs7_use_uninit
...
Prevent potential use of uninitialised data in pkcs7 tests
2023-09-12 17:51:21 +01:00
a722d0a415
Update CMake minimum version(s) to match main CMakeLists.txt
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-09-12 16:42:14 +01:00
2b143c67a4
Add changelog entry for checking set_padding() before cipher_finish()
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com >
2023-09-12 16:20:35 +01:00
9b1ae3d7c8
Merge pull request #1059 from daverodgman/ct_memcmp_fix
...
Constant time memcmp check for 16-bit int
2023-09-12 16:13:03 +01:00
9d8a7d62f5
Use the correct variable when tracking padding length
...
Fixes an error introduced in a81373f80
Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com >
2023-09-12 16:01:52 +01:00
1d9e8f1a07
Merge pull request #7797 from gilles-peskine-arm/python-cryptography-on-windows
...
Revert "Install cryptography only on linux platform"
2023-09-12 13:58:10 +00:00
57d09b72ef
Return back to modifying input parameters in pkcs12_parse_pbe_params
...
Return back to modifying input parameters in pkcs12_parse_pbe_params
to avoid change in behaviour.
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com >
2023-09-12 14:05:10 +01:00
a7d206fce6
Check set_padding has been called in mbedtls_cipher_finish
...
Check set_padding has been called in mbedtls_cipher_finish
in modes that require padding.
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com >
2023-09-12 13:39:36 +01:00
bd58944252
Avoid implementation defined behaviour
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-12 12:38:53 +01:00
45b6e5e69f
Prevent potential use of uninitialised data in pkcs7 tests
...
Move the initialisation of the pkcs7 object to before the first possible
test failure, otherwise failure in those tests could result in an
uninitialised pointer being free'd. Found by coverity.
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-09-12 11:58:21 +01:00
49d7223036
Fix test under memsan
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-12 11:03:23 +01:00
1a1b03bfb4
Merge pull request #1024 from daverodgman/safer-ct-changelog
...
Changelog for safer constant-time
2023-09-12 10:59:14 +01:00
2b0d53a2a8
Merge pull request #7590 from daverodgman/ct-x86-asm
...
Constant time asm for x86 and x86-64
2023-09-12 09:58:44 +00:00
50b0a35494
Test INT_MAX rather than UINT_MAX
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-12 09:30:44 +01:00
98926d5fb1
Update comment, and replace bit-twiddling with #error
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-12 09:29:33 +01:00
70e022b024
code style
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-09-12 09:29:13 +01:00
022b9a1ca0
benchmark: add AES_CFB8
...
Signed-off-by: Yanray Wang <yanray.wang@arm.com >
2023-09-12 16:28:37 +08:00
55aba195de
benchmark: add AES_CFB128
...
Signed-off-by: Yanray Wang <yanray.wang@arm.com >
2023-09-12 16:24:27 +08:00
ba63e0ce34
Use macros for sizes in p256-m driver
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-12 09:50:18 +02:00
138bdb6b17
Add comment to p256-m driver JSON file
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-12 09:50:18 +02:00
e9d97976b2
Update list of ignored tests
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-12 09:50:17 +02:00
96839e7450
Move common things to common function
...
These should be shared between ref and accel, for meaningful coverage
comparison.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-12 09:50:17 +02:00
0509b5878c
Fix INVALID vs NOT_SUPPORTED issue in test suite
...
This fixes the last remaining failure.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-12 09:50:17 +02:00
f0251e0824
Improve error codes in p256-m driver
...
Fix 19 out of 20 errors in test_suite_psa_crypto mentioned in the
previous commit. The remaining error will be fix in the next commit.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-12 09:50:16 +02:00
25b45db3d8
Disable ECP_C in component with p256-m driver
...
Builds, but 20 test cases failing in test_suite_psa_crypto, to be
addressed in future commits.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-12 09:50:16 +02:00
92a386f24c
Add JSON file for p256-m driver
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-12 09:50:16 +02:00
18d7142efd
Add export_public_key entry point to p256-m driver
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-12 09:50:15 +02:00
5424cf2e40
Add import_key entry point to p256-m driver
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-09-12 09:50:15 +02:00