David Horstmann
dcc78eee1f
Fix typos in make clean target for Windows
...
Signed-off-by: David Horstmann <david.horstmann@arm.com>
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2024-08-29 11:01:10 +02:00
Gilles Peskine
ab0af45d11
Merge pull request #9464 from gilles-peskine-arm/psa-keystore-dynamic-development
...
dynamically sized key store
2024-08-26 10:47:00 +00:00
Gilles Peskine
805ac15e2d
Merge pull request #9244 from waleed-elmelegy-arm/fix-tls13_parse_client_hello-issue
...
Fix issue in handling legacy_compression_methods in ssl_tls13_parse_client_hello()
2024-08-22 18:56:27 +00:00
Waleed Elmelegy
344f79bde6
Reduce the wording in changelog entry
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
2024-08-22 16:33:17 +00:00
Waleed Elmelegy
65e73c88bd
Improve the changelog entry for fixing legacy compression issue
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
2024-08-22 16:27:27 +00:00
Waleed Elmelegy
b5df9d8b65
Add chanelog entry for fixing legacy comprssion methods issue
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
2024-08-22 16:10:10 +00:00
Gilles Peskine
4c9fccff5a
Simplify and explain the overflow check for maximum slice length
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-22 10:56:19 +02:00
minosgalanakis
d65f4b83f0
Merge pull request #9485 from sergio-nsk/sergio-nsk/lean_and_mean/1
...
Fix Mbed-TLS build when WIN32_LEAN_AND_MEAN macro is defined globally
2024-08-22 08:01:07 +00:00
David Horstmann
0b2bd071f8
Add overflow check for maximum key slot length
...
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-08-21 21:49:17 +02:00
David Horstmann
68a4b7453f
Tweak macro check to allow 3 extra key slices
...
We are technically allowed to use all possible values of key slice index
that will fit into the bit width we have allocated, so allow all values.
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-08-21 21:49:16 +02:00
David Horstmann
fdcc47c426
Fix incorrect comments on slice numbering
...
The persistent key cache slice is the last slice (not the first as
previously stated). Update the numbering-related comments accordingly.
Signed-off-by: David Horstmann <david.horstmann@arm.com>
2024-08-21 21:49:14 +02:00
Janos Follath
ddc080073c
Merge pull request #9462 from waleed-elmelegy-arm/add-psa_key_agreement
...
Add psa_key_agreement() API
2024-08-19 08:05:15 +00:00
Waleed Elmelegy
e25cb1bcda
Fix formatting issue in psa_key_agreement() documentation
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
2024-08-16 14:37:46 +01:00
Waleed Elmelegy
d1562407c3
Fix possible issues in testing and implementation of psa_key_agreement()
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
2024-08-16 14:37:46 +01:00
Waleed Elmelegy
8faeee24ae
Improve documentation of psa_key_agreement()
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
2024-08-16 14:37:46 +01:00
Waleed Elmelegy
cb0ed88df1
Add change log entry for adding psa_key_agreement() API
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
2024-08-16 14:37:46 +01:00
Waleed Elmelegy
bdf2c98a27
Add psa_key_agreement() API
...
Add psa_key_agreement() API and basic testing.
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
2024-08-16 14:36:47 +01:00
Janos Follath
659f9e78fd
Merge pull request #9441 from paul-elliott-arm/add_docs_iop_key_generation
...
Add documentation for interruptible ECC key generation
2024-08-16 08:34:24 +00:00
Janos Follath
9e088847ae
Clarify IOP key generation restriction
...
Public keys can't be generated.
Co-authored-by: Gilles Peskine <gilles.peskine@arm.com>
Signed-off-by: Janos Follath <janos.follath@arm.com>
2024-08-15 13:51:05 +01:00
Janos Follath
9f48917b88
Improve IOP documentation
...
Signed-off-by: Janos Follath <janos.follath@arm.com>
2024-08-15 13:51:05 +01:00
Janos Follath
7311600fd5
Constrain interruptible key generation to key-pairs
...
Erroring on a symmetric-key type would actually be an extra line of
code.
In theory we could try to save that one line of code, but it is
premature optimisation at this point. Also, this is a predominantly
asymmetric crypto feature, it is less confusing/more user friendly if we
don't allow symmetric keys here.
Signed-off-by: Janos Follath <janos.follath@arm.com>
2024-08-15 13:51:05 +01:00
Janos Follath
211ebb51da
Don't return success on a stub
...
We shouldn't return PSA_SUCCESS from a function that isn't implemented.
PSA_ERROR_NOT_SUPPORTED seems like the most appropriate return status
for a function that isn't implemented.
Signed-off-by: Janos Follath <janos.follath@arm.com>
2024-08-15 13:51:05 +01:00
Paul Elliott
2dc5fa3a19
Add generated files for new iop key generation funcs
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com>
2024-08-15 13:51:05 +01:00
Paul Elliott
0c1aa4af38
Add psa_generate_key_iop_abort() documentation
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com>
2024-08-15 13:51:04 +01:00
Paul Elliott
08afb00a9b
Add psa_generate_key_iop_complete() documentation
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com>
2024-08-15 13:51:04 +01:00
Paul Elliott
6044f3e444
Add psa_generate_key_iop_setup() documentation
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com>
2024-08-15 13:51:04 +01:00
Paul Elliott
f712452a0e
Add psa_generate_key_iop_get_num_ops() docs
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com>
2024-08-15 13:51:04 +01:00
Paul Elliott
9e143a73ea
Add psa_generate_key_iop_t structs and docs
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com>
Signed-off-by: Janos Follath <janos.follath@arm.com>
2024-08-15 13:50:52 +01:00
Tom Cosgrove
2bb83bd885
Merge pull request #9480 from gilles-peskine-arm/psa-keystore-static-release-update-development
...
Key store spec: update release target for the static key store
2024-08-15 11:09:54 +01:00
Sergey Markelov
4ed0fded12
Fix Mbed-TLS build when WIN32_LEAN_AND_MEAN macro is defined globally
...
Signed-off-by: Sergey Markelov <sergey@solidstatenetworks.com>
2024-08-14 15:15:14 -07:00
Gilles Peskine
59602d3929
The fully static key store will miss the 3.6.1 release
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-14 11:41:34 +02:00
Gilles Peskine
3c1d287f8d
Mention the option name for the dynamic key store
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-14 11:41:33 +02:00
Manuel Pégourié-Gonnard
8067879c1f
Merge pull request #9313 from sezrab/psa_util_in_builds_without_psa-development
...
psa_util.c included in builds without PSA, which can break the build
2024-08-14 07:16:21 +00:00
Manuel Pégourié-Gonnard
a7b0e55efc
Merge pull request #9474 from gilles-peskine-arm/framework-update-20240813-development
...
Update framework to the head of the main branch
2024-08-14 07:11:29 +00:00
Gilles Peskine
d11025027b
Merge pull request #9362 from eleuzi01/replace-key-camellia
...
Replace MBEDTLS_SSL_HAVE_CAMELLIA with PSA_WANT_KEY_TYPE_CAMELLIA
2024-08-13 13:55:34 +00:00
Sam Berry
26769f190b
Changelog entry
...
Signed-off-by: Sam Berry <sam.berry@arm.com>
2024-08-13 14:40:22 +01:00
Janos Follath
1176e6f90e
Merge pull request #9410 from paul-elliott-arm/add_docs_iop_key_agreement
...
Add IOP Key agreement Documentation
2024-08-13 13:25:22 +00:00
Gilles Peskine
2ae2f451a9
Update framework to the head of the main branch
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-13 11:45:07 +02:00
Elena Uziunaite
da41b60cef
Replace MBEDTLS_SSL_HAVE_CAMELLIA with PSA_WANT_KEY_TYPE_CAMELLIA
...
Signed-off-by: Elena Uziunaite <elena.uziunaite@arm.com>
2024-08-13 09:58:00 +01:00
Gilles Peskine
b8457fff9f
Merge pull request #9353 from eleuzi01/replace-ecp-have-secp384r1
...
Replace MBEDTLS_ECP_HAVE_SECP384R1 with PSA_WANT_ECC_SECP_R1_384
2024-08-12 14:37:10 +00:00
Gilles Peskine
0858fdca38
Merge pull request #9189 from misch7/fix-v3.6-issues-9186-and-9188
...
Fix build of v3.6 (issues #9186 and #9188 )
2024-08-12 09:34:17 +00:00
Michael Schuster
b77c419add
Update the submodule to the head of PR in the framework repository
...
See Mbed-TLS/mbedtls-framework#23
Signed-off-by: Michael Schuster <michael@schuster.ms>
2024-08-09 20:39:28 +02:00
Bence Szépkúti
88f3dd9f78
Merge pull request #9402 from tom-daubney-arm/remove_function_level_alt_interface
...
Remove function level alt interface
2024-08-09 17:59:51 +00:00
Michael Schuster
a52952dcb1
Update the submodule to the head of PR in the framework repository
...
See Mbed-TLS/mbedtls-framework#23
Signed-off-by: Michael Schuster <michael@schuster.ms>
2024-08-09 14:58:54 +01:00
Gilles Peskine
d339aefd91
Clarify some internal documentation
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-09 15:41:11 +02:00
Gilles Peskine
5abeb8c77b
Make integer downsizing explicit
...
Reassure both humans and compilers that the places where we assign an
integer to a smaller type are safe.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-09 15:41:11 +02:00
Gilles Peskine
75fd2401e5
Changelog entry for MBEDTLS_PSA_KEY_STORE_DYNAMIC
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-09 15:41:11 +02:00
Gilles Peskine
a9dda7e3d0
Add test components with the PSA static key store
...
We were only testing the static key store (MBEDTLS_PSA_KEY_STORE_DYNAMIC
disabled) with configs/*.h. Add a component with the static key store and
everything else (including built-in keys), and a component with the static
key store and CTR_DBRG using PSA for AES (which means PSA uses a volatile
key internally).
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-09 15:41:11 +02:00
Gilles Peskine
75071066f2
Dynamic key store: make full-key-store tests work effectively
...
Add a practical way to fill the dynamic key store by artificially limiting
the slice length through a test hook.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-09 15:41:11 +02:00
Gilles Peskine
aadeeb3e76
Microoptimizations when MBEDTLS_PSA_KEY_STORE_DYNAMIC is disabled
...
Compensate some of the code size increase from implementing dynamic key slots.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2024-08-09 15:41:11 +02:00