Ronald Cron
89d8a27d00
Rework overview of section changes
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-27 17:03:09 +02:00
Ronald Cron
be352633ae
Re-organize "Mbed TLS modules" and "Module configuration options"
...
Re-organize "Mbed TLS modules" and "Module configuration options"
into "X.509 feature selection" and "TLS feature selection" for
better alignment with tf_psa_crypto_config.h.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-27 17:03:07 +02:00
Ronald Cron
b992bc8aa7
Re-order mbedtls_config.h sections
...
Re-order mbedtls_config.h sections for
the order to be more aligned with the
tf_psa_crypto_config.h one.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-27 17:00:49 +02:00
Ronald Cron
3c7b3be34e
No subsection
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-27 16:59:39 +02:00
Ronald Cron
2c152fdc4e
Add links to section descriptions
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-27 16:59:33 +02:00
Ronald Cron
294b5e06b1
Improve alphabetic ordering in sections
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-27 16:32:02 +02:00
Ronald Cron
4162c3a24a
Fix/Improve wording
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-19 11:05:56 +02:00
Ronald Cron
a5a46d0322
Fix md rendering
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-10 09:40:59 +02:00
Ronald Cron
f50ae4273f
Sort macros alphabetically in sections
...
Do not mix boolean and non boolean options
though.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-09 17:29:21 +02:00
Ronald Cron
2589ee3952
Move CIPHER, DRBG and TIME options
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-09 16:22:56 +02:00
Ronald Cron
075c742cb0
Add backticks around file names
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-09 15:43:38 +02:00
Ronald Cron
5e29260544
Rework first sections
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 09:12:10 +02:00
Ronald Cron
a25e9dbdeb
Move MBEDTLS_VERSION_* back to mbedtls_config.h
...
We will add TF-PSA-Crypto specific ones when
we add support for querying version and version
features in TF-PSA-Crypto.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:55:07 +02:00
Ronald Cron
8e1b463e34
Reorder sections
...
Move "Cryptographic mechanism selection (extended API)"
and "Data format support" just after section
Cryptographic mechanism selection (PSA API)"
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:35:34 +02:00
Ronald Cron
e5d0f8c906
Move MBEDTLS_*_RETURN config options
...
Move MBEDTLS_*_RETURN config options
in the same section as
MBEDTLS_CHECK_RETURN_WARNING.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:35:34 +02:00
Ronald Cron
34a4086901
Move MBEDTLS_NET_C config option
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:35:34 +02:00
Ronald Cron
717663bcbc
Move MBEDTLS_SELF_TEST option
...
Move MBEDTLS_SELF_TEST option to
the "General and test configuration options"
section as MBEDTLS_VERSION_C.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:35:34 +02:00
Ronald Cron
42c30e6a6e
Move DRBG options
...
Move DRBG options to the
"Cryptographic mechanism selection (extended API)"
section.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:35:34 +02:00
Ronald Cron
61391063b6
No config renaming
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:35:34 +02:00
Ronald Cron
ca99203bc3
Remove module and function _ALT config option
...
These options have been removed now.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:35:34 +02:00
Ronald Cron
ad62dce86f
Keep legacy crypto config options
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:35:34 +02:00
Ronald Cron
5c46496dd2
Improve section names
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:35:34 +02:00
Ronald Cron
4f4a30c2e7
Remove question marks triplets
...
The associated config options are at the
right place.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:35:34 +02:00
Ronald Cron
a3f3fca492
Remove trailing spaces
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-09-04 08:33:58 +02:00
Ronald Cron
8793d9cee8
Configuration file split proposal
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2024-06-06 18:27:31 +02:00
Tom Cosgrove
6dcb63bc6d
Fix broken link to psa-driver-example-and-guide in psa-driver-wrappers-codegen-migration-guide.md
...
Fixes #8453
Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com>
2023-10-31 15:39:25 +00:00
Xiaokang Qian
76e55a20dd
Change the documenti about psa_crypto_driver_wrappers.c{h}
...
Signed-off-by: Xiaokang Qian <xiaokang.qian@arm.com>
2023-09-26 09:09:20 +00:00
Manuel Pégourié-Gonnard
0b6d021069
Adjust presence of warning/link.
...
- the codegen migration document is already a migration document, so
doesn't need the extra warning about work in progress;
- the driver interface can use a link to the more practical guide too.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2023-08-08 09:37:11 +02:00
Manuel Pégourié-Gonnard
de24ba6cfd
Add link to examples in relevant places
...
Some documents about driver describe a state of things that is ahead of
the reality. They already contain a warning about it, but no way to know
that the current reality is; add a pointer to a document that describes
it.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2023-08-07 11:36:14 +02:00
Manuel Pégourié-Gonnard
417ce2c574
Rename _USE to _BASIC
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2023-06-16 10:36:44 +02:00
Manuel Pégourié-Gonnard
1cae90bf50
Update PSA_WANT spec for new KEY_PAIR scheme
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2023-06-14 12:19:13 +02:00
Gilles Peskine
265ce7c1da
Merge pull request #5451 from gilles-peskine-arm/psa-driver-kdf-spec
...
PSA drivers: specification for key derivation
2023-06-06 11:37:28 +02:00
Gilles Peskine
f4ba0013e2
Clarify when key derivation entry points are mandatory/permitted
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-06-05 14:24:14 +02:00
Gilles Peskine
8dd1e623e1
Copyediting
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-06-05 14:14:41 +02:00
Gilles Peskine
7df8ba6a10
Rework the description of key derivation output/verify key
...
Some of the fallback mechanisms between the entry points were not described
corrrectly.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-06-02 18:16:02 +02:00
Gilles Peskine
dcaf104eef
Note that we may want to rename derive_key
...
... if we think of a better name
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-06-02 18:02:41 +02:00
Gilles Peskine
f96a18edc7
Probably resolve concern about the input size for derive_key
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-06-02 18:02:15 +02:00
Gilles Peskine
1414bc34b9
Minor copyediting
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-06-02 17:54:32 +02:00
Gilles Peskine
24f52296f1
Key agreement needs an attribute structure for our key
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-05-31 00:44:04 +02:00
Gilles Peskine
e52bff994c
Note possible issue with derive_key: who should choose the input length?
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-05-31 00:43:29 +02:00
Gilles Peskine
b319ed69c4
State explicitly that cooked key derivation uses the export format
...
This is the case for all key creation in a secure element, but state it
explicitly where relevant.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-05-31 00:42:45 +02:00
Gilles Peskine
f787879a14
Clarify sequencing of long inputs
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-05-31 00:42:29 +02:00
Gilles Peskine
d2fe1d5498
Rationale on key derivation inputs and buffer ownership
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-05-31 00:42:17 +02:00
Gilles Peskine
4e94fead86
Key derivation dispatch doesn't depend on the key type
...
At least for all currently specified algorithms.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-05-31 00:40:56 +02:00
Gilles Peskine
66b96e2d87
Copyediting
...
Fix some typos and copypasta. Some very minor wording improvements.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-05-31 00:40:27 +02:00
Gilles Peskine
d3ca5e5897
Merge pull request #7328 from mprse/ec-jpake-fix1
...
Fix the JPAKE driver interface for user+peer
2023-05-02 20:42:25 +02:00
Paul Elliott
4359badbb2
Merge pull request #7331 from mprse/ec-jpake-fix2
...
PSA PAKE: Check input_length against PSA_PAKE_INPUT_SIZE() in psa_pake_input
2023-04-17 16:31:09 +01:00
Ronald Cron
e6e6b75ad3
psa: Remove MBEDTLS_PSA_CRYPTO_DRIVERS configuration option
...
The support for the PSA crypto driver interface
is not optional anymore as the implementation of
the PSA cryptography interface has been restructured
around the PSA crypto driver interface (see
psa-crypto-implementation-structure.md). There is
thus no purpose for the configuration options
MBEDTLS_PSA_CRYPTO_DRIVERS anymore.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2023-03-31 09:07:54 +02:00
Przemek Stekiel
b175b146a2
Remove driver_pake_get_role function
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
2023-03-23 13:37:18 +01:00
Przemek Stekiel
fa1754e9ef
Update documentation of psa_pake_input
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
2023-03-23 08:06:09 +01:00