Elena Uziunaite
414e59bcf4
Leave the spaces in psa-transition.md
...
Signed-off-by: Elena Uziunaite <elena.uziunaite@arm.com>
2024-08-27 19:22:08 +01:00
Elena Uziunaite
34fe4fddfd
Fix typo in psa-transition.md
...
Signed-off-by: Elena Uziunaite <elena.uziunaite@arm.com>
2024-08-27 16:07:09 +01:00
Gilles Peskine
59602d3929
The fully static key store will miss the 3.6.1 release
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-14 11:41:34 +02:00
Gilles Peskine
3c1d287f8d
Mention the option name for the dynamic key store
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-14 11:41:33 +02:00
Bence Szépkúti
88f3dd9f78
Merge pull request #9402 from tom-daubney-arm/remove_function_level_alt_interface
...
Remove function level alt interface
2024-08-09 17:59:51 +00:00
Thomas Daubney
ebcd49b961
Remove outdated documentation
...
Signed-off-by: Thomas Daubney <thomas.daubney@arm.com>
2024-08-06 15:20:06 +01:00
Gilles Peskine
e863f868ec
Documentation: point to key_custom instead of key_ext
...
Replace references to the deprecated functions `psa_generate_key_ext()` and
`psa_key_derivation_output_key_ext()` by their replacements
Implement `psa_generate_key_custom()` and
`psa_key_derivation_output_key_custom()`.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-05 15:49:22 +02:00
Gilles Peskine
343d040ab6
Miscellaneous clarifications
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-01 16:14:32 +02:00
Gilles Peskine
7fc3a50883
Expand on performance
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-01 16:14:32 +02:00
Gilles Peskine
2e0fc78d21
Discuss why we have so many variants
...
Explain that the hybrid key store is the historical implementation and
neither alternative is a drop-in replacement. Discuss how we could
potentially reduce the number of variants after the next major release.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-01 16:14:32 +02:00
Gilles Peskine
19afbc9568
Link to issue about freeing empty slices
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-01 16:14:32 +02:00
Gilles Peskine
ef94001222
Improve and fix explanation of next_free
...
In particular, fix an off-by-one error right after I explain how the number
is off by one from what you'd expect. State explicitly that the number can
be negative.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-01 16:14:32 +02:00
Gilles Peskine
5a040db142
Update macro name about the static key store
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-01 16:14:32 +02:00
Gilles Peskine
708c877da1
Typos and minor clarifications
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-01 16:14:32 +02:00
Gilles Peskine
c0037da514
psa_open_key does not lock the key in memory
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-01 16:14:32 +02:00
Gilles Peskine
d63a0cc49c
Document the key store design
...
Include the proposed dynamic and fully-static key stores that are
currently proposed in https://github.com/Mbed-TLS/mbedtls/pull/9240
and https://github.com/Mbed-TLS/mbedtls/pull/9302
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-01 16:14:32 +02:00
David Horstmann
f7fffbdd5c
Upgrade python dependencies in requirements file
...
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-07-15 16:31:02 +01:00
Ronald Cron
bdd8df852f
Adapt documentation
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-07-10 08:10:40 +02:00
Ronald Cron
f0481f562a
Merge pull request #9258 from tom-daubney-arm/drop_padlock_support
...
Drop support for VIA Padlock
2024-06-26 07:36:04 +00:00
Thomas Daubney
62af02c063
Drop support for VIA Padlock
...
Signed-off-by: Thomas Daubney <thomas.daubney@arm.com>
2024-06-14 10:37:13 +01:00
Ronald Cron
7e5d61c41a
Adjust more paths to PSA headers
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-06-13 09:51:20 +02:00
David Horstmann
f6f3bcae43
Update file paths for moved files
...
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-05-31 15:49:02 +01:00
Bence Szépkúti
e3abb6a148
Merge pull request #9094 from davidhorstmann-arm/move-mbedtls-dev-to-framework
...
Move `mbedtls_dev` to framework submodule
2024-05-28 15:50:47 +00:00
David Horstmann
cd84bb287b
Update references to mbedtls_dev
...
Change these to point to the new mbedtls_framework module in the
framework submodule.
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-05-13 14:43:29 +01:00
Gilles Peskine
ff3b8211ff
Driver-only FFDH is not good enough for DHE support in TLS 1.2
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-04-30 16:20:20 +02:00
Manuel Pégourié-Gonnard
4575d230bf
Add a note on hits usefulness
...
And fix a typo while at it.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-15 10:54:49 +02:00
Manuel Pégourié-Gonnard
432e3b4198
Misc fixes & improvements to driver testing doc
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:44:41 +02:00
Manuel Pégourié-Gonnard
a47a3c4e13
Rephrase description of the KDF situation
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:44:41 +02:00
Manuel Pégourié-Gonnard
ae22f04769
Refine paragraphs about incomplete entry points
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:44:41 +02:00
Manuel Pégourié-Gonnard
0ca2fd0e2b
Update libtestdriver1 vs internal
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:44:40 +02:00
Manuel Pégourié-Gonnard
dde1abd572
Update of opaque asymmetric encrypt/decrypt
...
https://github.com/Mbed-TLS/mbedtls/pull/8700 merged in the meantime.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:44:40 +02:00
Manuel Pégourié-Gonnard
6c45361a9c
Update for HMAC testing
...
Been merged in the meantime.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:44:40 +02:00
Manuel Pégourié-Gonnard
98f8da1b1a
Update names of components renamed in the meantime
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:44:40 +02:00
Manuel Pégourié-Gonnard
f2089dab5e
Update status of RSA testing
...
Improved by https://github.com/Mbed-TLS/mbedtls/pull/8616/ - closing
8553.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:40:01 +02:00
Manuel Pégourié-Gonnard
b18bc80133
Add note about fallback to other entry points
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:40:01 +02:00
Manuel Pégourié-Gonnard
6a96f42051
Document driver wrapper suite & tested configs
...
The coverage data for the test drivers was generated using the following
patch:
diff --git a/scripts/lcov.sh b/scripts/lcov.sh
index 9258ba788874..1ef071a65c06 100755
--- a/scripts/lcov.sh
+++ b/scripts/lcov.sh
@@ -63,8 +63,8 @@ if [ $# -gt 0 ] && [ "$1" = "--help" ]; then
fi
if in_mbedtls_build_dir; then
- library_dir='library'
- title='Mbed TLS'
+ library_dir='tests/src/drivers'
+ title='Mbed TLS test drivers'
else
library_dir='core'
title='TF-PSA-Crypto'
diff --git a/tests/scripts/all.sh b/tests/scripts/all.sh
index 734d8323ca73..f6b17ca5692b 100755
--- a/tests/scripts/all.sh
+++ b/tests/scripts/all.sh
@@ -4795,14 +4795,17 @@ component_test_psa_crypto_drivers () {
msg "build: full + test drivers dispatching to builtins"
scripts/config.py full
scripts/config.py unset MBEDTLS_PSA_CRYPTO_CONFIG
- loc_cflags="$ASAN_CFLAGS -DPSA_CRYPTO_DRIVER_TEST_ALL"
+ loc_cflags="--coverage -DPSA_CRYPTO_DRIVER_TEST_ALL"
loc_cflags="${loc_cflags} '-DMBEDTLS_USER_CONFIG_FILE=\"../tests/configs/user-config-for-test.h\"'"
- loc_cflags="${loc_cflags} -I../tests/include -O2"
+ loc_cflags="${loc_cflags} -I../tests/include -Og -g3"
- make CC=gcc CFLAGS="${loc_cflags}" LDFLAGS="$ASAN_CFLAGS"
+ make CC=gcc CFLAGS="${loc_cflags}" LDFLAGS="--coverage" -C tests test_suite_psa_crypto_driver_wrappers
msg "test: full + test drivers dispatching to builtins"
- make test
+ (cd tests && ./test_suite_psa_crypto_driver_wrappers --verbose)
+ #make test
+
+ scripts/lcov.sh
}
component_test_make_shared () {
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:40:01 +02:00
Manuel Pégourié-Gonnard
b66f9dba11
Document test-driver status per family
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:40:00 +02:00
Manuel Pégourié-Gonnard
1a827a3422
Start documenting test-driver framework.
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-04-12 12:40:00 +02:00
Bence Szépkúti
a376f84eb1
Merge pull request #8937 from valeriosetti/issue8712
...
Clarify the documentation of mbedtls_pk_setup_opaque
2024-04-04 13:40:57 +00:00
Valerio Setti
ac81e23c33
pk: add check_pair info to mbedtls_pk_setup_opaque() documentation
...
This also updates use-psa-crypto.md accordingly.
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2024-03-22 14:36:41 +01:00
Minos Galanakis
b70f0fd9a9
Merge branch 'development' into 'development-restricted'
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
2024-03-19 22:24:40 +00:00
David Horstmann
3147034457
Mention MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS
...
Explain this option and the way it relates to the copying macros.
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-03-18 15:59:03 +00:00
David Horstmann
0ea8071bda
Remove 'Question' line around testing
...
This question has been resolved, as we know that we can test
transparently.
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-03-18 15:51:03 +00:00
David Horstmann
4d01066311
Mention metatest.c
...
Add a note that validation of validation was implemented in metatest.c
and explain briefly what that program is for.
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-03-18 15:02:08 +00:00
David Horstmann
872ee6ece0
Mention MBEDTLS_TEST_MEMORY_CAN_POISON
...
The configuration of memory poisoning is now performed via
compile-time detection setting MBEDTLS_MEMORY_CAN_POISON. Update
the design to take account of this.
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-03-18 15:00:08 +00:00
David Horstmann
12b35bf3c2
Discuss test wrappers and updating them
...
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-03-18 14:48:52 +00:00
David Horstmann
5ea99af0f2
Add discussion of copying conveience macros
...
Namely LOCAL_INPUT_DECLARE() and friends
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-03-18 14:12:12 +00:00
David Horstmann
1c3b227065
Abstractify example in design exploration
...
Since this is just an example, remove specific-sounding references to
mbedtls_psa_core_poison_memory() and replace with more abstract and
generic-sounding memory_poison_hook() and memory_unpoison_hook().
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-03-18 13:37:59 +00:00
David Horstmann
3f2dcdd142
Rename mbedtls_psa_core_poison_memory()
...
The actual functions were called mbedtls_test_memory_poison()
and mbedtls_test_memory_unpoison(). Update the design section to
reflect this.
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-03-18 13:32:57 +00:00
David Horstmann
331b2cfb31
Clarify design decision in light of actions
...
We were successful in adding transparent memory-poisoning testing, so
simplify to the real design decision we made.
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-03-18 13:17:25 +00:00