9bb7e6f4ce
Rename MBEDTLS_OPTIMIZE_ALWAYS
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-16 09:41:21 +01:00
48fd2ab5d5
Improve readability of unrolled AESCE code
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-16 09:36:50 +01:00
417ce2c574
Rename _USE to _BASIC
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-06-16 10:36:44 +02:00
f45a5a0ddd
Merge pull request #7700 from silabs-Kusumit/PBKDF2_output_bytes
...
PBKDF2: Output bytes
2023-06-16 10:08:02 +02:00
2dd15b3ab5
code style
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 20:27:53 +01:00
3650a60586
Update changelog
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 18:56:15 +01:00
660cd378e1
Use MBEDTLS_OPTIMIZE_ALWAYS for gcm
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 18:53:35 +01:00
9149c32192
Use MBEDTLS_OPTIMIZE_ALWAYS for ccm
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 18:50:21 +01:00
f88a68cf51
Use MBEDTLS_OPTIMIZE_ALWAYS in aesce
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 18:46:41 +01:00
6cfd9b54ae
use MBEDTLS_OPTIMIZE_ALWAYS in AES-XTS
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 18:46:23 +01:00
a0b166e11e
Use mbedtls_xor_no_simd from cmac and cbc
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 18:44:16 +01:00
03bb526c24
Add a non-NEON variant of mbedtls_xor
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 18:43:24 +01:00
b055f75c3d
Introduce MBEDTLS_OPTIMIZE_ALWAYS
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 18:42:59 +01:00
7fdfd70b19
Introduce MBEDTLS_COMPILER_IS_GCC
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 18:42:25 +01:00
8c2f18dac2
Merge pull request #7738 from davidhorstmann-arm/fix-iar-typo
...
Fix typo in CMakeList.txt in IAR compiler flags
2023-06-15 19:24:00 +02:00
637c049349
Move mbedtls_ecp_modulus_type out of the public headers
...
This is an internal detail of the ECC arithmetic implementation, only
exposed for the sake of the unit tests
Mbed TLS 3.4.0 was released with the type mbedtls_ecp_modulus_type defined
in a public header, but without Doxygen documentation, and without any
public function or data structure using it. So removing it is not an API
break.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-06-15 19:07:41 +02:00
246e51fd0b
Add cleanup for intermediate buffer
...
Signed-off-by: Kusumit Ghoderao <Kusumit.Ghoderao@silabs.com >
2023-06-15 22:15:43 +05:30
a2e48f751b
Split out mbedtls_ecp_mod_p448_raw()
...
Switch testing over to using the generic raw functions.
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-06-15 17:16:38 +01:00
b4df176610
Merge pull request #7637 from paul-elliott-arm/fixed_ecp_mod_p448
...
[Bignum] Fixed width for ecp mod p448
2023-06-15 17:12:02 +01:00
1c4451d089
Unroll aesce_decrypt_block
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 16:28:00 +01:00
96fdfb8e62
Unroll aesce_encrypt_block
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 16:26:20 +01:00
1f5c2ba495
Add missing ECDH dependencies in ssl-opt tests
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-15 17:07:16 +02:00
a05e9c1ec8
Fix selection of default FFDH group
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-15 17:07:16 +02:00
8c0a95374f
Adapt remaining guards to FFDH
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-15 17:07:10 +02:00
ce05f54283
Properly disable ECDH in only (psk) ephemeral ffdh key exchange components
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-15 16:44:08 +02:00
c6beb3a741
Rename NUL to null in x509 IP parsing description
...
Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com >
2023-06-15 09:54:37 -04:00
ff4b6a8d18
Reword changelog entry
...
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2023-06-15 14:08:19 +01:00
0fe0c0cf10
Merge pull request #7775 from daverodgman/version_features_codesize
...
Shorten encoding of version features
2023-06-15 14:56:00 +02:00
7c5e567813
Merge pull request #7778 from daverodgman/p256-m-copyright
2023-06-15 13:37:00 +01:00
2e7d57270e
Merge pull request #7624 from daverodgman/aes-perf
...
AES perf improvements
2023-06-15 12:10:06 +01:00
6edf8b8c7b
Merge pull request #7451 from yanrayw/7376_aes_128bit_only
...
Introduce config option of 128-bit key only in AES calculation
2023-06-15 10:35:32 +01:00
9866df96c6
Add copyright (as agreed with Manuel)
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-15 10:11:49 +01:00
8d645dcd77
Fix unintentional config reduction in prev commit
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-06-15 09:07:10 +02:00
d07761c19c
add return statement
...
Signed-off-by: Kusumit Ghoderao <Kusumit.Ghoderao@silabs.com >
2023-06-15 12:11:15 +05:30
55ef22c2cb
mbedtls_config.h: add description for CTR_DRBG about AES-128 only
...
Signed-off-by: Yanray Wang <yanray.wang@arm.com >
2023-06-15 10:05:27 +08:00
28a97acb3c
code style
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-14 20:15:15 +01:00
b28d1c3484
fix check-names failure
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-14 20:06:43 +01:00
a53dca125e
Limit number ffdh test cases (ffdhe2048, ffdhe8192)
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-14 20:53:09 +02:00
bed9ac7b2d
Optimise final 2 rounds
...
Final two rounds logic could be significantly simplified.
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-06-14 19:20:33 +01:00
d05e7f1ab3
Do not use NEON for AES-CBC on aarch64
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-14 18:58:48 +01:00
f75903503b
Merge pull request #7770 from valeriosetti/issue7341
...
gcc 11.3 fails when compiling ecjpake drivers
2023-06-14 19:22:46 +02:00
f22983bd1c
Merge pull request #7411 from mprse/extract-key-ids-test
...
Improve tests for parsing x509 SubjectKeyId and AuthorityKeyId
2023-06-14 19:16:29 +02:00
906c63cf35
Revert "improve cbc encrypt perf"
...
This reverts commit f1e396c427
.
Performance is slightly better with this reverted, especially
for AES-CBC 192.
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-14 17:55:41 +01:00
b8f7305b02
Replace sizeof(mbedtls_mpi_uint) with ciL define
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-06-14 17:52:42 +01:00
90dfc21f6b
Shorten encoding of version features
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-14 17:06:53 +01:00
b3eaf8c2ed
Use predefined serial numer in certificates
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-14 14:25:21 +02:00
15ddda9ff8
Remove PSA_TO_MD_ERR from ssl_tls.c
...
Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com >
2023-06-14 07:37:46 -04:00
257ea00199
Use output block as U_accumulator
...
Signed-off-by: Kusumit Ghoderao <Kusumit.Ghoderao@silabs.com >
2023-06-14 15:55:11 +05:30
1cae90bf50
Update PSA_WANT spec for new KEY_PAIR scheme
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2023-06-14 12:19:13 +02:00
0c23147456
Disable MBEDTLS_DHM_C in component_test_tls13_only_psk
...
For details see the following comment: https://github.com/Mbed-TLS/mbedtls/pull/7627#issuecomment-1590792002
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-06-14 11:12:45 +02:00