Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Move some test helpers to framework repository #6

Open
wants to merge 793 commits into
base: main
Choose a base branch
from
This pull request is big! We’re only showing the most recent 250 commits.

Commits on Sep 5, 2023

  1. Rename parse_binary_string function

    Signed-off-by: Kusumit Ghoderao <[email protected]>
    silabs-Kusumit committed Sep 5, 2023
    Configuration menu
    Copy the full SHA
    4e10c08 View commit details
    Browse the repository at this point in the history
  2. Set input cost as 1 for psa_key_exercise test

    Signed-off-by: Kusumit Ghoderao <[email protected]>
    silabs-Kusumit committed Sep 5, 2023
    Configuration menu
    Copy the full SHA
    7c3faec View commit details
    Browse the repository at this point in the history

Commits on Sep 18, 2023

  1. Refactoring: create mbedtls_test_ssl_prepare_record_mac()

    No semantic change.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Sep 18, 2023
    Configuration menu
    Copy the full SHA
    119870c View commit details
    Browse the repository at this point in the history

Commits on Sep 19, 2023

  1. Introduce TEST_CALLOC_NONNULL

    Signed-off-by: Dave Rodgman <[email protected]>
    daverodgman committed Sep 19, 2023
    Configuration menu
    Copy the full SHA
    a688f80 View commit details
    Browse the repository at this point in the history
  2. Make TEST_CALLOC_NONNULL more robust

    Signed-off-by: Dave Rodgman <[email protected]>
    daverodgman committed Sep 19, 2023
    Configuration menu
    Copy the full SHA
    2a62008 View commit details
    Browse the repository at this point in the history

Commits on Sep 21, 2023

  1. Merge pull request #1073 from Mbed-TLS/better-ct-memcmp

    More consistent use of mbedtls_ct_memcmp
    gilles-peskine-arm authored Sep 21, 2023
    Configuration menu
    Copy the full SHA
    f1fb3e7 View commit details
    Browse the repository at this point in the history

Commits on Sep 22, 2023

  1. Merge pull request #1071 from gilles-peskine-arm/ssl_decrypt_stream_s…

    …hort_buffer
    
    Fix buffer overread in mbedtls_ssl_decrypt_buf with stream cipher
    gilles-peskine-arm authored Sep 22, 2023
    Configuration menu
    Copy the full SHA
    e63f93d View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    2dc11a7 View commit details
    Browse the repository at this point in the history

Commits on Sep 24, 2023

  1. Add SHA-3 support to libtestdriver1

    Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
    mpg committed Sep 24, 2023
    Configuration menu
    Copy the full SHA
    9b27b4a View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8240 from mpg/doc-driver-only-hashes

    Document driver only hashes (overdue)
    daverodgman authored Sep 24, 2023
    Configuration menu
    Copy the full SHA
    26d95e9 View commit details
    Browse the repository at this point in the history

Commits on Sep 25, 2023

  1. Merge remote-tracking branch 'upstream-public/development' into devel…

    …opment-restricted-merge-20230925
    
    Conflicts:
    * `include/mbedtls/build_info.h`: a new fragment to auto-enable
      `MBEDTLS_CIPHER_PADDING_PKCS7` was added in
      c9f4040 in `development-restricted`.
      In `development`, this section of the file has moved to
      `include/mbedtls/config_adjust_legacy_crypto.h`.
    * `library/bignum.c`: function name change in `development-restricted` vs
      comment change in development. The comment change in `development` is not
      really relevant, so just take the line from `development-restricted`.
    gilles-peskine-arm committed Sep 25, 2023
    Configuration menu
    Copy the full SHA
    a1ac4c9 View commit details
    Browse the repository at this point in the history

Commits on Oct 4, 2023

  1. Merge pull request #1090 from Mbed-TLS/mbedtls-3.5.0rc0-pr

    Mbedtls 3.5.0rc0 pr DO NOT MERGE
    minosgalanakis authored Oct 4, 2023
    Configuration menu
    Copy the full SHA
    54b0aa6 View commit details
    Browse the repository at this point in the history

Commits on Oct 11, 2023

  1. md: remove unnecessary inclusions of mbedtls/md.h

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Oct 11, 2023
    Configuration menu
    Copy the full SHA
    1bbaeba View commit details
    Browse the repository at this point in the history

Commits on Oct 12, 2023

  1. Add unit test for max_early_data_size of ticket

    Signed-off-by: Jerry Yu <[email protected]>
    yuhaoth committed Oct 12, 2023
    Configuration menu
    Copy the full SHA
    6e31f4c View commit details
    Browse the repository at this point in the history

Commits on Oct 19, 2023

  1. CMAC: accelerate CMAC in accel_cipher

    Signed-off-by: Yanray Wang <[email protected]>
    Yanray Wang committed Oct 19, 2023
    Configuration menu
    Copy the full SHA
    9e5eb13 View commit details
    Browse the repository at this point in the history

Commits on Oct 23, 2023

  1. libtestdriver1: fix acceleration for ALG_STREAM_CIPHER/ALG_ECB_NO_PAD…

    …DING
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Oct 23, 2023
    Configuration menu
    Copy the full SHA
    87cb0e6 View commit details
    Browse the repository at this point in the history

Commits on Oct 30, 2023

  1. test_driver_extension: manage curves' acceleration the same as other …

    …PSA_WANT symbols
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Oct 30, 2023
    Configuration menu
    Copy the full SHA
    610edbe View commit details
    Browse the repository at this point in the history
  2. ssl_helpers: allow mbedtls_test_ssl_build_transforms to work without …

    …CIPHER_C
    
    A new internal function is added to get cipher's info (mode, key bits and
    iv len) without relying on CIPHER_C. This function is basically a lookup
    table used only for test purposes.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Oct 30, 2023
    Configuration menu
    Copy the full SHA
    52a7566 View commit details
    Browse the repository at this point in the history
  3. ssl_helpers: remove CIPHER_C guards in mbedtls_test_ssl_build_transfo…

    …rms()
    
    Use !USE_PSA_CRYPTO instead.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Oct 30, 2023
    Configuration menu
    Copy the full SHA
    43a0e6d View commit details
    Browse the repository at this point in the history

Commits on Nov 2, 2023

  1. update headers

    Signed-off-by: Dave Rodgman <[email protected]>
    daverodgman committed Nov 2, 2023
    Configuration menu
    Copy the full SHA
    b8c8f52 View commit details
    Browse the repository at this point in the history

Commits on Nov 3, 2023

  1. Header updates

    Signed-off-by: Dave Rodgman <[email protected]>
    daverodgman committed Nov 3, 2023
    Configuration menu
    Copy the full SHA
    fc46638 View commit details
    Browse the repository at this point in the history

Commits on Nov 4, 2023

  1. Merge pull request #8443 from valeriosetti/issue8274

    Clean up curves handling in libtestdriver1 config
    gilles-peskine-arm authored Nov 4, 2023
    Configuration menu
    Copy the full SHA
    ff6ba5e View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8434 from valeriosetti/issue8407

    [G2] Make TLS work without Cipher
    gilles-peskine-arm authored Nov 4, 2023
    Configuration menu
    Copy the full SHA
    749bbe9 View commit details
    Browse the repository at this point in the history

Commits on Nov 8, 2023

  1. ssl_helper: fix missin initialization of cli_log_obj

    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 committed Nov 8, 2023
    Configuration menu
    Copy the full SHA
    9f63e13 View commit details
    Browse the repository at this point in the history
  2. ssl: use MBEDTLS_SSL_HAVE_* in tests

    Done by commands:
    
    ```
    sed -i "s/MBEDTLS_\(AES\|CAMELLIA\|ARIA\|CHACHAPOLY\)_C/MBEDTLS_SSL_HAVE_\1/g" tests/{suites,include,src}/**/*ssl*
    sed -i "s/MBEDTLS_\(GCM\|CCM\)_C/MBEDTLS_SSL_HAVE_\1/g" tests/{suites,include,src}/**/*ssl*
    sed -i "s/MBEDTLS_CIPHER_MODE_\(CBC\)/MBEDTLS_SSL_HAVE_\1/g" tests/{suites,include,src}/**/*ssl*
    ```
    
    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 committed Nov 8, 2023
    Configuration menu
    Copy the full SHA
    e72725c View commit details
    Browse the repository at this point in the history
  3. Revert back to v3.5.0

    git revert v3.5.0..v3.5.1
    git rebase to combine the resulting revert commits
    
    Signed-off-by: Dave Rodgman <[email protected]>
    daverodgman committed Nov 8, 2023
    Configuration menu
    Copy the full SHA
    081c32f View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    0c90b9c View commit details
    Browse the repository at this point in the history
  5. test_driver_extension: use same def/undef pattern for all accelerated…

    … symbols
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Nov 8, 2023
    Configuration menu
    Copy the full SHA
    8dcc32b View commit details
    Browse the repository at this point in the history

Commits on Nov 9, 2023

  1. Merge pull request #8495 from lpy4105/issue/6322/driver-only-cipher_a…

    …ead-tls
    
    [G3] Driver-only cipher+aead: TLS: main test suite
    mpg authored Nov 9, 2023
    Configuration menu
    Copy the full SHA
    467099d View commit details
    Browse the repository at this point in the history

Commits on Nov 15, 2023

  1. Merge pull request #8499 from valeriosetti/issue8488

    Clean up libtestdriver1 config: unconditonal removals
    mpg authored Nov 15, 2023
    Configuration menu
    Copy the full SHA
    7c1ffc4 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    53d6e56 View commit details
    Browse the repository at this point in the history
  3. psa_exercise_key: replace legacy symbols with PSA_WANT ones

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Nov 15, 2023
    Configuration menu
    Copy the full SHA
    9be008a View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    b9b37e1 View commit details
    Browse the repository at this point in the history

Commits on Nov 16, 2023

  1. Move handling of mutex->is_valid into threading_helpers.c

    This is now a field only used for testing.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Nov 16, 2023
    Configuration menu
    Copy the full SHA
    dce64df View commit details
    Browse the repository at this point in the history
  2. Make threading helpers tests thread safe

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Nov 16, 2023
    Configuration menu
    Copy the full SHA
    6d48487 View commit details
    Browse the repository at this point in the history
  3. Rename mutex->is_valid to mutex->state

    Rename struct member to make it more representative of its current use.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Nov 16, 2023
    Configuration menu
    Copy the full SHA
    68ed0de View commit details
    Browse the repository at this point in the history

Commits on Nov 20, 2023

  1. Merge pull request #7071 from yuhaoth/pr/tls13-ticket-add-max_early_d…

    …ata_size-field
    
    TLS 1.3 EarlyData: add `max_early_data_size` field for ticket
    ronald-cron-arm authored Nov 20, 2023
    Configuration menu
    Copy the full SHA
    855881e View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8489 from valeriosetti/issue8482

    Make CCM* and CCM independent
    gilles-peskine-arm authored Nov 20, 2023
    Configuration menu
    Copy the full SHA
    b37570d View commit details
    Browse the repository at this point in the history

Commits on Nov 21, 2023

  1. update tests

    Signed-off-by: Jerry Yu <[email protected]>
    yuhaoth committed Nov 21, 2023
    Configuration menu
    Copy the full SHA
    611665f View commit details
    Browse the repository at this point in the history
  2. rename ticket_creation to ticket_creation_time

    Signed-off-by: Jerry Yu <[email protected]>
    yuhaoth committed Nov 21, 2023
    Configuration menu
    Copy the full SHA
    12bd28b View commit details
    Browse the repository at this point in the history
  3. rename ticket received

    Signed-off-by: Jerry Yu <[email protected]>
    yuhaoth committed Nov 21, 2023
    Configuration menu
    Copy the full SHA
    1d12938 View commit details
    Browse the repository at this point in the history
  4. fix build failure

    Signed-off-by: Jerry Yu <[email protected]>
    yuhaoth committed Nov 21, 2023
    Configuration menu
    Copy the full SHA
    2c75308 View commit details
    Browse the repository at this point in the history
  5. Merge pull request #6788 from yuhaoth/pr/fix-gnutls_anti_replay_fail

    TLS 1.3: Fix anti replay fail from GnuTLS
    ronald-cron-arm authored Nov 21, 2023
    Configuration menu
    Copy the full SHA
    93afaeb View commit details
    Browse the repository at this point in the history
  6. Merge pull request #1122 from gilles-peskine-arm/development-restrict…

    …ed-merge-20231120
    
    Merge development on 2023-11-20
    gilles-peskine-arm authored Nov 21, 2023
    Configuration menu
    Copy the full SHA
    22b717a View commit details
    Browse the repository at this point in the history

Commits on Nov 22, 2023

  1. Detect enabled GCC/Clang sanitizers

    Occasionally we want tests to take advantage of sanitizers, or work around
    them.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Nov 22, 2023
    Configuration menu
    Copy the full SHA
    638ce23 View commit details
    Browse the repository at this point in the history

Commits on Nov 23, 2023

  1. Ensure mutex test mutex gets free'd

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Nov 23, 2023
    Configuration menu
    Copy the full SHA
    5f7f6e3 View commit details
    Browse the repository at this point in the history

Commits on Nov 24, 2023

  1. Add better documentation for mbedtls_test_mutex_mutex

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Nov 24, 2023
    Configuration menu
    Copy the full SHA
    3805f11 View commit details
    Browse the repository at this point in the history

Commits on Nov 28, 2023

  1. Merge pull request #8286 from gilles-peskine-arm/check_mbedtls_calloc…

    …_overallocation-disable_with_asan
    
    Fix test_suite_platform failure with Asan on modern Clang
    daverodgman authored Nov 28, 2023
    Configuration menu
    Copy the full SHA
    abc1978 View commit details
    Browse the repository at this point in the history

Commits on Nov 29, 2023

  1. Merge pull request #8534 from paul-elliott-arm/fix_mutex_abstraction

    Make mutex abstraction and tests thread safe
    yanesca authored Nov 29, 2023
    Configuration menu
    Copy the full SHA
    85efe19 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    0269b02 View commit details
    Browse the repository at this point in the history
  3. New files for memory-related test functions

    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Nov 29, 2023
    Configuration menu
    Copy the full SHA
    582c233 View commit details
    Browse the repository at this point in the history
  4. Add memory poisoning framework

    While an area of memory is poisoned, reading or writing from it triggers a
    sanitizer violation.
    
    Implemented for ASan.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Nov 29, 2023
    Configuration menu
    Copy the full SHA
    24138fd View commit details
    Browse the repository at this point in the history
  5. Fix memory poisoning with Asan on arbitrary byte boundaries

    Asan poisons memory with an 8-byte granularity. We want to make sure that
    the whole specified region is poisoned (our typical use case is a
    heap-allocated object, and we want to poison the whole object, and we don't
    care about the bytes after the end of the object and up to the beginning of
    the next object). So align the start and end of the region to (un)poison to
    an 8-byte boundary.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Nov 29, 2023
    Configuration menu
    Copy the full SHA
    34ea221 View commit details
    Browse the repository at this point in the history
  6. Use the existing definition of MBEDTLS_TEST_HAVE_ASAN

    A definition now exists in tests/helpers.h, which is a better place.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Nov 29, 2023
    Configuration menu
    Copy the full SHA
    5dbd9d1 View commit details
    Browse the repository at this point in the history
  7. Avoid unused variable warnings in some plausible usage

    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Nov 29, 2023
    Configuration menu
    Copy the full SHA
    660dee3 View commit details
    Browse the repository at this point in the history

Commits on Dec 4, 2023

  1. ssl_helpers: make rng_get available for other test cases

    This is a pre-step to configure random number generator in some
    TLS tests.
    
    Signed-off-by: Yanray Wang <[email protected]>
    Yanray Wang committed Dec 4, 2023
    Configuration menu
    Copy the full SHA
    a3df575 View commit details
    Browse the repository at this point in the history
  2. ssl_helpers: remove guard for rng_get()

    After adding a check in ssl_conf_check(), we have configured RNG via
    mbedtls_ssl_conf_rng() for TLS tests in both test_suite_ssl.function
    and test_suite_debug.function. As a result, rng_get() is not only
    available when MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED enabled.
    Therefore, we remove the guard for rng_get() to make it accessible for
    TLS tests which have call for mbedtls_ssl_setup().
    
    Signed-off-by: Yanray Wang <[email protected]>
    Yanray Wang committed Dec 4, 2023
    Configuration menu
    Copy the full SHA
    ea3933d View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    84b575e View commit details
    Browse the repository at this point in the history
  4. test_suite_[ctr_drbg/random]: initialize/close PSA in tests

    This commit also adds AES_PSA_[INIT/DONE] in "psa_crypto_helpers.h". Its
    scope is to call PSA_[INIT/DONE] only when AES_C is not defined (which is
    when PSA is effectively required for CTR_DRBG).
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Dec 4, 2023
    Configuration menu
    Copy the full SHA
    1b8322f View commit details
    Browse the repository at this point in the history
  5. test_suite_psa_crypto_driver_wrappers: improving driver access counters

    When AES_C is not defined CTR_DRBG relies on PSA to get AES-ECB. This
    means that, when AES-ECB is accelerated, each random operation goes through
    driver access as well. This might result in unexpectedly increased
    counters for driver's access.
    We add extra counters in test_driver_[cipher/key_management].c to be
    more specific on which driver functions are accessed and ignore
    extra accesses due to CTR_DRBG.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Dec 4, 2023
    Configuration menu
    Copy the full SHA
    aab9a62 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    6df615f View commit details
    Browse the repository at this point in the history
  7. test_suite_psa_crypto_slot_management: modify check on open key slots

    This commit
    - Reverts changes previously done to psa_crypto_helpers.[c,h]
    - Implements a new check for open key slots in
      mbedtls_test_helper_is_psa_leaking():
       - when CTR_DRBG does not use AES_C or PSA does not have an external
         RNG, then we allow 1 key slot (it's the one holding the AES key)
       - when the above conditions are not met, then we fallback to the
         usual check for "no open key slots remaining"
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Dec 4, 2023
    Configuration menu
    Copy the full SHA
    9097552 View commit details
    Browse the repository at this point in the history
  8. test_suite_psa_crypto_driver_wrappers: add counter for failing psa_ci…

    …pher_update()
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Dec 4, 2023
    Configuration menu
    Copy the full SHA
    7675a4e View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    a76301a View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    0472af3 View commit details
    Browse the repository at this point in the history

Commits on Dec 7, 2023

  1. Correctly use asymmetric encrypt/decrypt driver

    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 committed Dec 7, 2023
    Configuration menu
    Copy the full SHA
    693fa6d View commit details
    Browse the repository at this point in the history

Commits on Dec 11, 2023

  1. Merge pull request #1121 from gilles-peskine-arm/psa-buffers-test-poison

    Memory poisoning function for Asan
    davidhorstmann-arm authored Dec 11, 2023
    Configuration menu
    Copy the full SHA
    4979327 View commit details
    Browse the repository at this point in the history
  2. Create memory poisoning wrapper for cipher encrypt

    Use the preprocessor to wrap psa_cipher_encrypt in a wrapper that
    poisons the input and output buffers.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 11, 2023
    Configuration menu
    Copy the full SHA
    ce64ce8 View commit details
    Browse the repository at this point in the history
  3. Change to use test-hook-based approach

    Since we are applying hooks transparently to all tests, we cannot setup
    and teardown test hooks in the tests. Instead we must do this in the
    test wrappers which are used to pre-poison and unpoison memory.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 11, 2023
    Configuration menu
    Copy the full SHA
    015f979 View commit details
    Browse the repository at this point in the history
  4. Add missing license header

    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 11, 2023
    Configuration menu
    Copy the full SHA
    7126ccb View commit details
    Browse the repository at this point in the history
  5. Add comment explaining the purpose of header

    Explain why we have the wrappers in psa_memory_poisoning_wrappers.h
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 11, 2023
    Configuration menu
    Copy the full SHA
    3a3a7ca View commit details
    Browse the repository at this point in the history

Commits on Dec 14, 2023

  1. Merge pull request #8616 from lpy4105/issue/8553/test-driver-only-rsa

    Add test for driver-only RSA (crypto only)
    mpg authored Dec 14, 2023
    Configuration menu
    Copy the full SHA
    0080cb5 View commit details
    Browse the repository at this point in the history
  2. Move test hook setup functions into a C file

    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 14, 2023
    Configuration menu
    Copy the full SHA
    978c08e View commit details
    Browse the repository at this point in the history
  3. Move test hook setup and teardown to helpers.c

    Setup and teardown test hooks during full test platform setup.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 14, 2023
    Configuration menu
    Copy the full SHA
    155d534 View commit details
    Browse the repository at this point in the history
  4. Move wrapper include to psa_crypto_helpers.h

    This makes memory poisoning wrappers available to (almost) all tests.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 14, 2023
    Configuration menu
    Copy the full SHA
    5e32dba View commit details
    Browse the repository at this point in the history
  5. tests: add PSA_INIT/PSA_DONE to CCM and GCM test suites

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Dec 14, 2023
    Configuration menu
    Copy the full SHA
    713031c View commit details
    Browse the repository at this point in the history
  6. Add missing newline at end of file

    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 14, 2023
    Configuration menu
    Copy the full SHA
    24157cf View commit details
    Browse the repository at this point in the history

Commits on Dec 15, 2023

  1. Improve guards around memory poisoning setup

    We should not setup or teardown test hooks when we do not have
    MBEDTLS_PSA_CRYPTO_C.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 15, 2023
    Configuration menu
    Copy the full SHA
    a41e3ce View commit details
    Browse the repository at this point in the history

Commits on Dec 18, 2023

  1. Add extra MBEDTLS_PSA_CRYPTO_C guard for header

    Do not include psa_memory_poisoning_wrappers.h unless
    MBEDTLS_PSA_CRYPTO_C is set.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 18, 2023
    Configuration menu
    Copy the full SHA
    c62ece8 View commit details
    Browse the repository at this point in the history
  2. Add missing newline at end of file

    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 18, 2023
    Configuration menu
    Copy the full SHA
    2602db9 View commit details
    Browse the repository at this point in the history

Commits on Dec 20, 2023

  1. Only poison memory when buffer copying is enabled

    Make sure that we don't enable memory poisoning when
    MBEDTLS_PSA_COPY_CALLER_BUFFERS is disabled.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Dec 20, 2023
    Configuration menu
    Copy the full SHA
    e73af47 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #1127 from davidhorstmann-arm/prototype-single-fn-…

    …copytesting
    
    Prototype poisoning testing with a single function
    davidhorstmann-arm authored Dec 20, 2023
    Configuration menu
    Copy the full SHA
    62946ba View commit details
    Browse the repository at this point in the history
  3. Refactor record size limit extension handling

    Signed-off-by: Waleed Elmelegy <[email protected]>
    waleed-elmelegy-arm committed Dec 20, 2023
    Configuration menu
    Copy the full SHA
    1f3d336 View commit details
    Browse the repository at this point in the history

Commits on Jan 2, 2024

  1. library/tests: replace md_psa.h with psa_util.h as include file for M…

    …D conversion
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Jan 2, 2024
    Configuration menu
    Copy the full SHA
    4b055ad View commit details
    Browse the repository at this point in the history

Commits on Jan 5, 2024

  1. Add accessor helpers for mbedtls_test_info

    Step one of being able to control access to mbedtls_test_info with
    a mutex.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 5, 2024
    Configuration menu
    Copy the full SHA
    c074b60 View commit details
    Browse the repository at this point in the history
  2. Use mbedtls_test_info accessors internally as well

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 5, 2024
    Configuration menu
    Copy the full SHA
    cac2eb8 View commit details
    Browse the repository at this point in the history
  3. Migrate to threading_helpers.h

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 5, 2024
    Configuration menu
    Copy the full SHA
    8287a7f View commit details
    Browse the repository at this point in the history
  4. Add test thread create/join abstraction

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 5, 2024
    Configuration menu
    Copy the full SHA
    a37895b View commit details
    Browse the repository at this point in the history

Commits on Jan 9, 2024

  1. Merge pull request #7455 from KloolK/record-size-limit/comply-with-limit

    Comply with the received Record Size Limit extension
    tom-cosgrove-arm authored Jan 9, 2024
    Configuration menu
    Copy the full SHA
    7e05cf8 View commit details
    Browse the repository at this point in the history
  2. Move bignum flag for negative zero into test_info

    Add accessors ready for protection with test_info mutex.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 9, 2024
    Configuration menu
    Copy the full SHA
    43b1bb6 View commit details
    Browse the repository at this point in the history
  3. Protect test info access with mutex

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 9, 2024
    Configuration menu
    Copy the full SHA
    71c38c2 View commit details
    Browse the repository at this point in the history
  4. Add ability to exclude mutex from tests

    We need to be able to exclude mbedtls_test_info_mutex() from the normal
    tests, as this mutex has to be locked to report mutex errors, and also
    reports as leaked, due to where it is initialised / free'd.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 9, 2024
    Configuration menu
    Copy the full SHA
    6d9118b View commit details
    Browse the repository at this point in the history

Commits on Jan 10, 2024

  1. Add hkdf_extract, hkdf_expand and ecjpake_to_pms cases

    Signed-off-by: Kusumit Ghoderao <[email protected]>
    silabs-Kusumit committed Jan 10, 2024
    Configuration menu
    Copy the full SHA
    c324dba View commit details
    Browse the repository at this point in the history

Commits on Jan 12, 2024

  1. Use thread-local flag to enable memory poisoning

    Allow memory poisoning to be enabled and disabled at runtime using a
    thread-local flag. This allows poisoning to be disabled whenever a PSA
    function is called but not through the test wrappers, removing false
    positive use-after-poisons.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Jan 12, 2024
    Configuration menu
    Copy the full SHA
    c1b3b45 View commit details
    Browse the repository at this point in the history

Commits on Jan 15, 2024

  1. Add endpoint in TLS 1.2 session serialization data

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Jan 15, 2024
    Configuration menu
    Copy the full SHA
    6ab03eb View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    f5c119d View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    93a5db5 View commit details
    Browse the repository at this point in the history
  4. test_driver_asymmetric_encryption: implement opaque [en/de]cryption f…

    …unctions
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Jan 15, 2024
    Configuration menu
    Copy the full SHA
    aae7db2 View commit details
    Browse the repository at this point in the history
  5. Commit generated PSA wrappers

    Commit files generated by `tests/scripts/generate_psa_wrappers.py`. As of
    this commit, the new code is neither useful (the wrappers just call the
    underlying functions) nor used (the wrapper functions are not called from
    anywhere). This will change in subsequent commits.
    
    This is a deviation from our normal practice of generating
    configuration-independent platform-independent files as part of the build in
    the development branch. The PSA test wrappers will be committed to the
    repository for some time for two reasons:
    
    * In the short term, we will review the generated code but not fully review
      the generator script.
    * The build scripts cannot yet accommodate a generated header file.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Jan 15, 2024
    Configuration menu
    Copy the full SHA
    8aa0e56 View commit details
    Browse the repository at this point in the history
  6. Enable generated PSA wrappers

    Code in unit tests (`tests/suites/*.function`) and in test support
    code (`tests/src/**.c`) will now go through the wrapper functions when they
    call a PSA API function and `MBEDTLS_TEST_HOOKS` is enabled.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Jan 15, 2024
    Configuration menu
    Copy the full SHA
    e106e87 View commit details
    Browse the repository at this point in the history
  7. Update generated PSA wrappers

    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Jan 15, 2024
    Configuration menu
    Copy the full SHA
    1539fb2 View commit details
    Browse the repository at this point in the history
  8. Remove the manually written poisoning wrapper

    This fixes the build with ASan + MBEDTLS_TEST_HOOKS.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Jan 15, 2024
    Configuration menu
    Copy the full SHA
    f438c61 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    0da9436 View commit details
    Browse the repository at this point in the history
  10. Disable PSA wrappers psa_collect_statuses builds

    `psa_collect_statuses.py` runs `make RECORD_PSA_STATUS_COVERAGE_LOG=1`,
    which builds with `RECORD_PSA_STATUS_COVERAGE_LOG`. In this mode, the build
    includes wrappers for PSA functions, which conflict with the newly
    introduced wrappers that are enabled whenever `MBEDTLS_TEST_HOOKS` is
    enabled. In the future, the collect-statuses mechanism should use the new
    generic wrapper mechanism. For the time being, keep the old wrappers and
    avoid the new wrappers when doing the collect-statuses build.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Jan 15, 2024
    Configuration menu
    Copy the full SHA
    1636b34 View commit details
    Browse the repository at this point in the history

Commits on Jan 17, 2024

  1. Change memory poisoning flag to a count

    This allows unusually-nested memory poisoning to work correctly, since
    it keeps track of whether any buffers are still poisoned, rather than
    just disabling poisoning at the first call to the UNPOISON() macro.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Jan 17, 2024
    Configuration menu
    Copy the full SHA
    a984c04 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    2376257 View commit details
    Browse the repository at this point in the history
  3. Add underflow check to UNPOISON counter decrement

    Make sure that extra UNPOISON calls do not cause the poisoning counter
    to underflow and wrap around.
    
    Memory that is unpoisoned multiple times should remain unpoisoned.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Jan 17, 2024
    Configuration menu
    Copy the full SHA
    0c7b149 View commit details
    Browse the repository at this point in the history

Commits on Jan 18, 2024

  1. test_driver_key_management: keep mbedtls_test_opaque_wrap_key() private

    Only mbedtls_test_opaque_unwrap_key() is actually needed by other
    test drivers to deal with opaque keys. mbedtls_test_opaque_wrap_key()
    can be kept private to test_driver_key_management.c.
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Jan 18, 2024
    Configuration menu
    Copy the full SHA
    6157ba5 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8666 from valeriosetti/issue8340

    Export the mbedtls_md_psa_alg_from_type function
    gilles-peskine-arm authored Jan 18, 2024
    Configuration menu
    Copy the full SHA
    ddbeb9e View commit details
    Browse the repository at this point in the history

Commits on Jan 19, 2024

  1. Fix documentation typos.

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 19, 2024
    Configuration menu
    Copy the full SHA
    78bcb65 View commit details
    Browse the repository at this point in the history
  2. Make test data static now it has accessors

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 19, 2024
    Configuration menu
    Copy the full SHA
    17fd81c View commit details
    Browse the repository at this point in the history
  3. Access the test data mutex via accessor

    Remove the use of extern and instead use an accessor to get the address
    of the test info mutex (defined only if MBEDTLS_TEST_MUTEX_USAGE is
    defined, to hopefully stop more general usage)
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 19, 2024
    Configuration menu
    Copy the full SHA
    e2ce364 View commit details
    Browse the repository at this point in the history

Commits on Jan 22, 2024

  1. ssl_helpers.c: Add ticket write/parse test functions

    Add ticket write/parse test functions as defined
    by mbedtls_ssl_ticket_write/parse_t. They are
    intended to be used in negative testing
    involving tickets.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Jan 22, 2024
    Configuration menu
    Copy the full SHA
    138bd9b View commit details
    Browse the repository at this point in the history
  2. tests: ssl: Move setting of debug callback

    Move the setting of the debug callback to
    the endpoint initialization function. That
    way, no need to repeat it in various testing
    scenarios.
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Jan 22, 2024
    Configuration menu
    Copy the full SHA
    cb40166 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8700 from valeriosetti/issue8461

    psa_asymmetric_encrypt() doesn't work with opaque driver
    mpg authored Jan 22, 2024
    Configuration menu
    Copy the full SHA
    03ce6aa View commit details
    Browse the repository at this point in the history

Commits on Jan 24, 2024

  1. Merge pull request #1141 from davidhorstmann-arm/memory-poisoning-run…

    …time-enable
    
    Enable and disable memory poisoning at runtime
    davidhorstmann-arm authored Jan 24, 2024
    Configuration menu
    Copy the full SHA
    f2df4b7 View commit details
    Browse the repository at this point in the history
  2. Generate poisoning in PAKE test wrappers

    Enable memory poisoning for all functions whose names start with
    'psa_pake'. Regenerate the wrappers and commit the result.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Jan 24, 2024
    Configuration menu
    Copy the full SHA
    1ec0fde View commit details
    Browse the repository at this point in the history

Commits on Jan 25, 2024

  1. tests: fix calloc() argument list (gcc-14 fix)

    `gcc-14` added a new `-Wcalloc-transposed-args` warning recently. It
    detected minor infelicity in `calloc()` API usage in `mbedtls`:
    
        In file included from /build/mbedtls/tests/include/test/ssl_helpers.h:19,
                         from /build/mbedtls/tests/src/test_helpers/ssl_helpers.c:11:
        /build/mbedtls/tests/src/test_helpers/ssl_helpers.c: In function 'mbedtls_test_init_handshake_options':
        /build/mbedtls/tests/include/test/macros.h:128:46:
          error: 'calloc' sizes specified with 'sizeof' in the earlier argument
            and not in the later argument [-Werror=calloc-transposed-args]
          128 |             (pointer) = mbedtls_calloc(sizeof(*(pointer)),  \
              |                                              ^
    
    Signed-off-by: Sergei Trofimovich <[email protected]>
    trofi committed Jan 25, 2024
    Configuration menu
    Copy the full SHA
    6be3981 View commit details
    Browse the repository at this point in the history

Commits on Jan 26, 2024

  1. Merge remote-tracking branch 'restricted/development-restricted' into…

    … update-development-r
    
    Conflicts:
    	programs/Makefile
    	tests/scripts/check-generated-files.sh
    daverodgman committed Jan 26, 2024
    Configuration menu
    Copy the full SHA
    72c8ee1 View commit details
    Browse the repository at this point in the history

Commits on Jan 30, 2024

  1. Generate test wrappers

    Signed-off-by: Thomas Daubney <[email protected]>
    tom-daubney-arm committed Jan 30, 2024
    Configuration menu
    Copy the full SHA
    0c8b658 View commit details
    Browse the repository at this point in the history
  2. Fix race condition with test comparison functions

    Make sure we hold the mutex whilst making several changes at the same
    time, to prevent race condition on writing connected bits of data.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 30, 2024
    Configuration menu
    Copy the full SHA
    034d872 View commit details
    Browse the repository at this point in the history

Commits on Jan 31, 2024

  1. Configuration menu
    Copy the full SHA
    86832d5 View commit details
    Browse the repository at this point in the history
  2. Disable poisoning with PSA_CRYPTO_DRIVER_TEST

    This option causes nested calls to PSA functions, so is not compatible
    with memory poisoning as it currently stands.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Jan 31, 2024
    Configuration menu
    Copy the full SHA
    5f18b3f View commit details
    Browse the repository at this point in the history
  3. Fix code style issues

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Jan 31, 2024
    Configuration menu
    Copy the full SHA
    9d2397e View commit details
    Browse the repository at this point in the history

Commits on Feb 1, 2024

  1. Refactor to help future other implementations

    Improve the definition of mbedtls_test_thread_t to assist adding future
    threading implementations, when they happen.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 1, 2024
    Configuration menu
    Copy the full SHA
    b77ec28 View commit details
    Browse the repository at this point in the history
  2. Fix style issues

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 1, 2024
    Configuration menu
    Copy the full SHA
    2dff047 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8711 from ronald-cron-arm/tls13-ticket-and-early-…

    …data-unit-test
    
    Add TLS 1.3 ticket and early data unit tests
    ronald-cron-arm authored Feb 1, 2024
    Configuration menu
    Copy the full SHA
    db3e72b View commit details
    Browse the repository at this point in the history
  4. Fix accidental copy paste mistake

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 1, 2024
    Configuration menu
    Copy the full SHA
    04f41d5 View commit details
    Browse the repository at this point in the history

Commits on Feb 2, 2024

  1. Merge pull request #1151 from tom-daubney-arm/asymmetric_sign_buffer_…

    …protection
    
    Implement safe buffer copying in asymmetric signature API
    davidhorstmann-arm authored Feb 2, 2024
    Configuration menu
    Copy the full SHA
    5fbe21e View commit details
    Browse the repository at this point in the history
  2. Generate test wrappers for key management

    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Feb 2, 2024
    Configuration menu
    Copy the full SHA
    039ee99 View commit details
    Browse the repository at this point in the history
  3. Re-add cipher_encrypt to test wrapper script

    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Feb 2, 2024
    Configuration menu
    Copy the full SHA
    d6a9179 View commit details
    Browse the repository at this point in the history
  4. Remove unnecessary dependencies from psa_crypto_helpers.h

    The psa_test_wrappers.h inclusion was breaking the examples in programs/
    on functions with poisoning added
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Feb 2, 2024
    Configuration menu
    Copy the full SHA
    075b111 View commit details
    Browse the repository at this point in the history
  5. Merge pull request #1137 from Ryan-Everett-arm/key-management-buffer-…

    …protection
    
    Add buffer copying to the Key Management API
    davidhorstmann-arm authored Feb 2, 2024
    Configuration menu
    Copy the full SHA
    000c171 View commit details
    Browse the repository at this point in the history
  6. Restore mutex lock for mbedtls_test_set_step()

    This function is called externally from several tests, so still requires
    a mutex lock. Add an internal function to reset the step, for use in
    functions where the mutex is already held.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 2, 2024
    Configuration menu
    Copy the full SHA
    be8e24f View commit details
    Browse the repository at this point in the history
  7. Revert accidental formatting change

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 2, 2024
    Configuration menu
    Copy the full SHA
    0758142 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    d5ea096 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    a34b9de View commit details
    Browse the repository at this point in the history

Commits on Feb 6, 2024

  1. Fix missed case for removing accessor

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 6, 2024
    Configuration menu
    Copy the full SHA
    ab6b278 View commit details
    Browse the repository at this point in the history
  2. Generate poisoning wrappers for AEAD

    Modify wrapper generation script to generate poisoning calls and
    regenerate wrappers.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Feb 6, 2024
    Configuration menu
    Copy the full SHA
    da3051d View commit details
    Browse the repository at this point in the history
  3. Add comment to set/increment step functions

    These functions are thread safe, but using them from within multiple
    threads at the same time may not have the intended effect, given order
    cannot be guaranteed. Also, standardise header comment formatting.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 6, 2024
    Configuration menu
    Copy the full SHA
    e458fda View commit details
    Browse the repository at this point in the history
  4. tests: ssl: Move group list to options

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Feb 6, 2024
    Configuration menu
    Copy the full SHA
    444f393 View commit details
    Browse the repository at this point in the history
  5. tests: ssl: First reset to all zeroes options in init

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Feb 6, 2024
    Configuration menu
    Copy the full SHA
    17c3145 View commit details
    Browse the repository at this point in the history
  6. tests: ssl: Add early data handshake option

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Feb 6, 2024
    Configuration menu
    Copy the full SHA
    4ad1907 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    5d95b0b View commit details
    Browse the repository at this point in the history
  8. Merge pull request #8198 from silabs-Kusumit/kdf_incorrect_initial_ca…

    …pacity
    
    KDF incorrect initial capacity
    gilles-peskine-arm authored Feb 6, 2024
    Configuration menu
    Copy the full SHA
    861d497 View commit details
    Browse the repository at this point in the history
  9. Stop platform test failures with GCC and TSAN

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 6, 2024
    Configuration menu
    Copy the full SHA
    44b8e62 View commit details
    Browse the repository at this point in the history

Commits on Feb 7, 2024

  1. Merge pull request #8717 from valeriosetti/issue8030

    PSA FFDH: feature macros for parameters
    mpg authored Feb 7, 2024
    Configuration menu
    Copy the full SHA
    6f97a38 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8789 from paul-elliott-arm/fix_tsan_gcc

    Stop platform test failures with GCC and TSAN
    paul-elliott-arm authored Feb 7, 2024
    Configuration menu
    Copy the full SHA
    c1c58da View commit details
    Browse the repository at this point in the history
  3. Generate test wrappers for key derivation

    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Feb 7, 2024
    Configuration menu
    Copy the full SHA
    06275bb View commit details
    Browse the repository at this point in the history

Commits on Feb 8, 2024

  1. Configuration menu
    Copy the full SHA
    c4493c9 View commit details
    Browse the repository at this point in the history

Commits on Feb 9, 2024

  1. tests: ssl: Improve test parameter sanity check

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Feb 9, 2024
    Configuration menu
    Copy the full SHA
    8eaecd1 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    7e91651 View commit details
    Browse the repository at this point in the history
  3. Fix typo / improve documentation for test step fns

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 9, 2024
    Configuration menu
    Copy the full SHA
    63022a8 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    1b84170 View commit details
    Browse the repository at this point in the history

Commits on Feb 12, 2024

  1. Generate test wrappers for hash functions

    Signed-off-by: Thomas Daubney <[email protected]>
    tom-daubney-arm committed Feb 12, 2024
    Configuration menu
    Copy the full SHA
    fec3ee1 View commit details
    Browse the repository at this point in the history
  2. Generate test wrappers for mac functions

    Signed-off-by: Thomas Daubney <[email protected]>
    tom-daubney-arm committed Feb 12, 2024
    Configuration menu
    Copy the full SHA
    72a123c View commit details
    Browse the repository at this point in the history
  3. Generate test wrappers

    Signed-off-by: Thomas Daubney <[email protected]>
    tom-daubney-arm committed Feb 12, 2024
    Configuration menu
    Copy the full SHA
    3b14880 View commit details
    Browse the repository at this point in the history
  4. Generate all test wrappers

    One was missed due to a typo
    
    Signed-off-by: Thomas Daubney <[email protected]>
    tom-daubney-arm committed Feb 12, 2024
    Configuration menu
    Copy the full SHA
    8eee3a3 View commit details
    Browse the repository at this point in the history
  5. exercise_key: allow SIGN_MESSAGE/VERIFY_MESSAGE with PSA_ALG_ANY_HASH

    There was already code to instantiate the wildcard for sign/verify-hash.
    Make that work with sign/verify-message as well.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Feb 12, 2024
    Configuration menu
    Copy the full SHA
    bc7d47b View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    d011028 View commit details
    Browse the repository at this point in the history
  7. Don't exercise if the algorithm is not supported

    Parsing a key and importing it into PSA may result in a policy that
    specifies an algorithm that is not included in the build. This happens if
    the key type is supported, but not the algorithm, e.g. in a build with
    MBEDTLS_ECP_C but not MBEDTLS_ECDSA_C.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Feb 12, 2024
    Configuration menu
    Copy the full SHA
    ec47c96 View commit details
    Browse the repository at this point in the history
  8. Prioritize SHA2 over MD5 for KNOWN_SUPPORTED_HASH_ALG

    This fixes the ability to exercise keys in configurations where MD5 is
    supported for direct use, but not inside some accelerated algorithms. This
    is the case in `all.sh test_psa_crypto_config_accel_ecc_ecp_light_only` and
    some other accelerated-ECC components of `all.sh`, where the driver is built
    without MD5 support but built-in MD5 remains enabled.
    
    This is only a hack, not a theoretically correct fix, but a correct fix is
    out of scope of my current work.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Feb 12, 2024
    Configuration menu
    Copy the full SHA
    6a330ad View commit details
    Browse the repository at this point in the history

Commits on Feb 13, 2024

  1. Fix deadlock with test failures

    Calling mbedtls_test_fail() attempts to lock the test data mutex.
    Unfortunately we were calling this from places where we already held
    this mutex, and this mutex is not recursive, so this deadlocks. Split
    out mbedtls_test_fail() into mbedtls_test_fail_internal() in order to
    address this.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 13, 2024
    Configuration menu
    Copy the full SHA
    b847664 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #1142 from tom-daubney-arm/hash_buffer_protection

    Add secure buffer copying to PSA Hash API
    davidhorstmann-arm authored Feb 13, 2024
    Configuration menu
    Copy the full SHA
    92203e7 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8755 from ronald-cron-arm/tls13-client-early-data…

    …-status
    
    TLS 1.3: Refine and test client early data status
    mpg authored Feb 13, 2024
    Configuration menu
    Copy the full SHA
    4af9f79 View commit details
    Browse the repository at this point in the history

Commits on Feb 14, 2024

  1. Make internal test info accessor functions static.

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 14, 2024
    Configuration menu
    Copy the full SHA
    337dcd2 View commit details
    Browse the repository at this point in the history

Commits on Feb 15, 2024

  1. Merge pull request #1156 from Ryan-Everett-arm/key-derivation-buffer-…

    …protection
    
    Add buffer copying to the Key Derivation API
    davidhorstmann-arm authored Feb 15, 2024
    Configuration menu
    Copy the full SHA
    17b6152 View commit details
    Browse the repository at this point in the history
  2. Fix encrypt/decrypt confusion

    The values are the same for all supported mechanisms (RSA-based), so no
    semantic change.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Feb 15, 2024
    Configuration menu
    Copy the full SHA
    f0817be View commit details
    Browse the repository at this point in the history
  3. Rename internal test info data accessors

    Rename internal test info data accessors by adding _internal to mark
    them as obviously internal. Add to the intial comment block to further
    explain the mutex locking policy.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 15, 2024
    Configuration menu
    Copy the full SHA
    1f37bfb View commit details
    Browse the repository at this point in the history
  4. Fix missing mutex lock for mutex usage error

    Although this can only be read in a situation where threads should have
    already stopped, best to fix this as its public.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 15, 2024
    Configuration menu
    Copy the full SHA
    963c26e View commit details
    Browse the repository at this point in the history
  5. Lock test mutex before doing mutex usage check

    Although this again should only happen post all threads stopping, guard
    this just in case things change.
    
    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 15, 2024
    Configuration menu
    Copy the full SHA
    fc47457 View commit details
    Browse the repository at this point in the history
  6. Generate test wrappers

    Signed-off-by: Thomas Daubney <[email protected]>
    tom-daubney-arm committed Feb 15, 2024
    Configuration menu
    Copy the full SHA
    cf16573 View commit details
    Browse the repository at this point in the history
  7. tls13: Fix/Improve comments

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Feb 15, 2024
    Configuration menu
    Copy the full SHA
    6cc6a90 View commit details
    Browse the repository at this point in the history
  8. New test helper: mbedtls_test_key_consistency_psa_pk

    Test that a PK key and a PSA key are consistent, i.e. that they have the
    same type (or are a key pair and the corresponding public key) and that
    they have the same public key.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Feb 15, 2024
    Configuration menu
    Copy the full SHA
    826741d View commit details
    Browse the repository at this point in the history

Commits on Feb 20, 2024

  1. Configuration menu
    Copy the full SHA
    22b3f3b View commit details
    Browse the repository at this point in the history

Commits on Feb 21, 2024

  1. Merge pull request #8574 from ronald-cron-arm/ssl-tickets

    Fix and align ticket age check in ssl_ticket.c for TLS 1.2 and TLS 1.3
    mpg authored Feb 21, 2024
    Configuration menu
    Copy the full SHA
    6117f80 View commit details
    Browse the repository at this point in the history
  2. Merge remote-tracking branch 'development' into pk_import_into_psa-im…

    …plement_import
    
    Conflicts:
    * tests/suites/test_suite_pk.function: consecutive changes to the
      depends_on line of pk_sign_verify and its argument list.
    gilles-peskine-arm committed Feb 21, 2024
    Configuration menu
    Copy the full SHA
    bd416a0 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8807 from gilles-peskine-arm/pk_import_into_psa-i…

    …mplement_import
    
    Implement mbedtls_pk_import_into_psa
    gilles-peskine-arm authored Feb 21, 2024
    Configuration menu
    Copy the full SHA
    a2876c6 View commit details
    Browse the repository at this point in the history

Commits on Feb 22, 2024

  1. Configuration menu
    Copy the full SHA
    8dd174a View commit details
    Browse the repository at this point in the history

Commits on Feb 24, 2024

  1. Improve documentation / comments

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Feb 24, 2024
    Configuration menu
    Copy the full SHA
    407d4b0 View commit details
    Browse the repository at this point in the history

Commits on Feb 26, 2024

  1. Ignore domain parameters in RSA key generation

    Remove the ability to select a custom public exponent via domain parameters
    in RSA key generation. The only way to select a custom public exponent is
    now to pass custom production parameters to psa_generate_key_ext().
    
    A subsequent commit will remove domain parameters altogether from the API,
    thus this commit does not bother to update the documentation.
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Feb 26, 2024
    Configuration menu
    Copy the full SHA
    684e26b View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8838 from paul-elliott-arm/improve_test_data_acce…

    …ssors
    
    Improve test info data accessors
    tom-cosgrove-arm authored Feb 26, 2024
    Configuration menu
    Copy the full SHA
    af3ff20 View commit details
    Browse the repository at this point in the history
  3. Generate test wrappers for psa_generate_random()

    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Feb 26, 2024
    Configuration menu
    Copy the full SHA
    ecfc973 View commit details
    Browse the repository at this point in the history
  4. Merge pull request #1149 from tom-daubney-arm/mac_buffer_protection

    Implement safe buffer copying in MAC API
    davidhorstmann-arm authored Feb 26, 2024
    Configuration menu
    Copy the full SHA
    5684c51 View commit details
    Browse the repository at this point in the history

Commits on Feb 27, 2024

  1. test: remove usage of mbedtls_pk_wrap_as_opaque() from tests

    This is replaced with: mbedtls_pk_get_psa_attributes() +
    mbedtls_pk_import_into_psa() + mbedtls_pk_setup_opaque().
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Feb 27, 2024
    Configuration menu
    Copy the full SHA
    000fe48 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8840 from gilles-peskine-arm/domain_parameters-re…

    …move
    
    Remove domain parameters
    tom-cosgrove-arm authored Feb 27, 2024
    Configuration menu
    Copy the full SHA
    0129b7e View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    fe45695 View commit details
    Browse the repository at this point in the history

Commits on Feb 28, 2024

  1. Don't access psa_key_attributes_t.core

    Access the fields of `psa_key_attributes_t` directly rather than through the
    `core` field. This makes the `core` field obsolete.
    
    This commit is fully automated:
    ```
    git ls-files '*.h' '*.c' '*.function' '*.jinja' | xargs perl -l -i -pe '$core = qr/\b(core\b|MBEDTLS_PRIVATE\(core\))/; s/->$core\./->/g; s/&(\w+)\.$core\./&$1./g; s/(\w+)\.$core/$1/g'
    ```
    
    Signed-off-by: Gilles Peskine <[email protected]>
    gilles-peskine-arm committed Feb 28, 2024
    Configuration menu
    Copy the full SHA
    3318f39 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    2540a4e View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    14fdcb7 View commit details
    Browse the repository at this point in the history
  4. Merge branch 'development-restricted' into asymmetric_encrypt_buffer_…

    …protection
    
    Signed-off-by: tom-daubney-arm <[email protected]>
    tom-daubney-arm authored Feb 28, 2024
    Configuration menu
    Copy the full SHA
    f894dfd View commit details
    Browse the repository at this point in the history

Commits on Feb 29, 2024

  1. Merge pull request #1153 from tom-daubney-arm/asymmetric_encrypt_buff…

    …er_protection
    
    Implement safe buffer copying in asymmetric encryption
    davidhorstmann-arm authored Feb 29, 2024
    Configuration menu
    Copy the full SHA
    9f1962b View commit details
    Browse the repository at this point in the history
  2. Merge branch 'development-restricted' into generate-random-buffer-pro…

    …tection
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm authored Feb 29, 2024
    Configuration menu
    Copy the full SHA
    98a2344 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8760 from ronald-cron-arm/tls13-write-early-data

    TLS 1.3: Add mbedtls_ssl_write_early_data() API
    ronald-cron-arm authored Feb 29, 2024
    Configuration menu
    Copy the full SHA
    937f449 View commit details
    Browse the repository at this point in the history
  4. psa_util: change guard for mbedtls_psa_get_random() to CRYPTO_CLIENT

    This commit also:
    - updates changelog
    - add a stub function to be used in component_test_psa_crypto_client()
      test
    
    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Feb 29, 2024
    Configuration menu
    Copy the full SHA
    a2c7de5 View commit details
    Browse the repository at this point in the history

Commits on Mar 1, 2024

  1. tests: ssl: Add max_early_data_size option

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 1, 2024
    Configuration menu
    Copy the full SHA
    63281a4 View commit details
    Browse the repository at this point in the history
  2. tests: ssl: Add max_early_data_size option

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 1, 2024
    Configuration menu
    Copy the full SHA
    523b1d2 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #8864 from valeriosetti/issue8848

    Deprecate or remove mbedtls_pk_wrap_as_opaque
    mpg authored Mar 1, 2024
    Configuration menu
    Copy the full SHA
    b18e2e4 View commit details
    Browse the repository at this point in the history
  4. tests: ssl_helpers: Rename rng_get to mbedtls_test_random

    mbedtls_test_ as the prefix for test APIs
    _random like in mbedtls_ctr/hmac_drbg_random
    
    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 1, 2024
    Configuration menu
    Copy the full SHA
    dbac76f View commit details
    Browse the repository at this point in the history
  5. psa_crypto_stubs/changelog: fix typos

    Signed-off-by: Valerio Setti <[email protected]>
    valeriosetti committed Mar 1, 2024
    Configuration menu
    Copy the full SHA
    64609f6 View commit details
    Browse the repository at this point in the history

Commits on Mar 4, 2024

  1. ssl_helpers: Restore rng_seed incrementation

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 4, 2024
    Configuration menu
    Copy the full SHA
    2b76c6c View commit details
    Browse the repository at this point in the history
  2. Merge pull request #1172 from davidhorstmann-arm/generate-random-buff…

    …er-protection
    
    Add secure buffer copying to `psa_generate_random()`
    davidhorstmann-arm authored Mar 4, 2024
    Configuration menu
    Copy the full SHA
    b471e41 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    dff4a8e View commit details
    Browse the repository at this point in the history

Commits on Mar 5, 2024

  1. Merge pull request #8867 from gilles-peskine-arm/psa_key_attributes-r…

    …emove_core
    
    Merge psa_core_key_attributes_t back into psa_key_attributes_t
    gilles-peskine-arm authored Mar 5, 2024
    Configuration menu
    Copy the full SHA
    c98b918 View commit details
    Browse the repository at this point in the history
  2. Ensure drivers have threading enabled if required

    Signed-off-by: Paul Elliott <[email protected]>
    paul-elliott-arm committed Mar 5, 2024
    Configuration menu
    Copy the full SHA
    70644d1 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #1167 from gabor-mezei-arm/buffer_protection_for_c…

    …ipher
    
    Buffer protection for cipher functions
    davidhorstmann-arm authored Mar 5, 2024
    Configuration menu
    Copy the full SHA
    6404576 View commit details
    Browse the repository at this point in the history

Commits on Mar 6, 2024

  1. Configuration menu
    Copy the full SHA
    1927e0f View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    a94af45 View commit details
    Browse the repository at this point in the history

Commits on Mar 8, 2024

  1. Merge pull request #8587 from yanrayw/issue/4911/ssl_setup-check-RNG-…

    …configuration
    
    TLS: check RNG when calling mbedtls_ssl_setup()
    ronald-cron-arm authored Mar 8, 2024
    Configuration menu
    Copy the full SHA
    1211f7c View commit details
    Browse the repository at this point in the history
  2. Merge pull request #1160 from davidhorstmann-arm/copying-pake

    Add secure buffer copying to PAKE
    davidhorstmann-arm authored Mar 8, 2024
    Configuration menu
    Copy the full SHA
    bf6dfcb View commit details
    Browse the repository at this point in the history

Commits on Mar 9, 2024

  1. Merge pull request #8854 from ronald-cron-arm/tls13-srv-max-early-dat…

    …a-size
    
    TLS 1.3: Enforce max_early_data_size on server
    ronald-cron-arm authored Mar 9, 2024
    Configuration menu
    Copy the full SHA
    b99748a View commit details
    Browse the repository at this point in the history

Commits on Mar 10, 2024

  1. Configuration menu
    Copy the full SHA
    a415422 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8862 from valeriosetti/issue8825

    Improve support of mbedtls_psa_get_random in client-only builds
    mpg authored Mar 10, 2024
    Configuration menu
    Copy the full SHA
    873539c View commit details
    Browse the repository at this point in the history

Commits on Mar 11, 2024

  1. Merge pull request #1181 from tom-daubney-arm/key_agreement_buffer_pr…

    …otection
    
    Implement safe buffer copying in key agreement
    davidhorstmann-arm authored Mar 11, 2024
    Configuration menu
    Copy the full SHA
    8661346 View commit details
    Browse the repository at this point in the history
  2. Generate memory poisoning in wrappers

    Generate memory poisoning code in test wrappers for:
    * psa_sign_hash_start()
    * psa_sign_hash_complete()
    * psa_verify_hash_start()
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 11, 2024
    Configuration menu
    Copy the full SHA
    40af74b View commit details
    Browse the repository at this point in the history

Commits on Mar 12, 2024

  1. Merge pull request #8857 from ronald-cron-arm/tls13-cli-max-early-dat…

    …a-size
    
    TLS 1.3: Enforce max_early_data_size on client
    ronald-cron-arm authored Mar 12, 2024
    Configuration menu
    Copy the full SHA
    f8d87b5 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    36f35d0 View commit details
    Browse the repository at this point in the history
  3. Add key_destroyable parameter to mbedtls_test_psa_exercise_key

    This will allow us to use this smoke test to ensure that key slot content reads are
    only performed when we are registered to read a full slot. We will destroy the key
    on another thread while the key is being exercised, and fail the test if an unexpected
    error code is hit. Future commits will incrementally implement this new parameter.
    
    All current usages of this function have this parameter set to 0, in which case
    the new behaviour must be the same as the old behaviour
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 12, 2024
    Configuration menu
    Copy the full SHA
    002f809 View commit details
    Browse the repository at this point in the history
  4. Add key_destroyable parameter to check_key_attributes_sanity

    This function is currently only used in the exercise_key smoke test.
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 12, 2024
    Configuration menu
    Copy the full SHA
    233382e View commit details
    Browse the repository at this point in the history
  5. Add key_destroyable parameter to exercise_mac_key

    If the key has been destroyed (and the new parameter is 1) then we test that
    psa_mac_abort succeeds in this scenario.
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 12, 2024
    Configuration menu
    Copy the full SHA
    c13895a View commit details
    Browse the repository at this point in the history
  6. Add key_destroyable parameter to psa_exercise_cipher_key

    If the key has been destroyed (and the new parameter is 1), we test that
    psa_cipher_abort succeeds in this scenario.
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 12, 2024
    Configuration menu
    Copy the full SHA
    6049968 View commit details
    Browse the repository at this point in the history
  7. Add key_destroyable parameter to exercise_aead_key

    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 12, 2024
    Configuration menu
    Copy the full SHA
    e0cfa29 View commit details
    Browse the repository at this point in the history
  8. Add key_destroyable parameter to exercise_signature_key

    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 12, 2024
    Configuration menu
    Copy the full SHA
    33fba7c View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    0032477 View commit details
    Browse the repository at this point in the history
  10. Add key_destroyable parameter to key derivation smoke tests

    All current usages have this parameter set to 0 (in this case the behaviour of
    the test is unchanged)
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 12, 2024
    Configuration menu
    Copy the full SHA
    051d298 View commit details
    Browse the repository at this point in the history
  11. Add key_destroyable parameter to raw key agreement smoke tests

    All current usages have this parameter set to 0 (meaning the behaviour
    of these tests hasn't changed). We also now return the actual error code, not GENERIC_ERROR
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 12, 2024
    Configuration menu
    Copy the full SHA
    f7ba175 View commit details
    Browse the repository at this point in the history
  12. Regenerate PSA wrappers for new PSA functions

    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 12, 2024
    Configuration menu
    Copy the full SHA
    a0010d1 View commit details
    Browse the repository at this point in the history

Commits on Mar 13, 2024

  1. Configuration menu
    Copy the full SHA
    1290451 View commit details
    Browse the repository at this point in the history
  2. Add key_destroyable parameter to non-raw key agreement smoke tests

    All current usages have this parameter set to 0 (this means the tests are unchanged).
    Remove the GENERIC_ERROR return behaviour, in favour of returning the actual status.
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 13, 2024
    Configuration menu
    Copy the full SHA
    f89b216 View commit details
    Browse the repository at this point in the history
  3. Add key_destroyable parameter to key export smoke tests

    These are only called from mbedtls_test_psa_exercise_key
    
    Signed-off-by: Ryan Everett <[email protected]>
    Ryan-Everett-arm committed Mar 13, 2024
    Configuration menu
    Copy the full SHA
    3823662 View commit details
    Browse the repository at this point in the history
  4. Add ALPN information in session tickets

    Signed-off-by: Waleed Elmelegy <[email protected]>
    waleed-elmelegy-arm committed Mar 13, 2024
    Configuration menu
    Copy the full SHA
    bfdaaf7 View commit details
    Browse the repository at this point in the history
  5. Add mbedtls_ssl_session_set_alpn() function

    Signed-off-by: Waleed Elmelegy <[email protected]>
    waleed-elmelegy-arm committed Mar 13, 2024
    Configuration menu
    Copy the full SHA
    f4bd241 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    e98de40 View commit details
    Browse the repository at this point in the history

Commits on Mar 14, 2024

  1. Invert and rename config option

    Replace MBEDTLS_PSA_COPY_CALLER_BUFFERS with inverse:
    !MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS. This ensures that buffer
    protection is enabled by default without any change to the Mbed TLS
    config file.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 14, 2024
    Configuration menu
    Copy the full SHA
    7cd6992 View commit details
    Browse the repository at this point in the history
  2. Update wrapper generation script and regenerate

    Update the guards generated by the wrapper generation script to use
    !MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS and regenerate the PSA test
    wrappers.
    
    Signed-off-by: David Horstmann <[email protected]>
    davidhorstmann-arm committed Mar 14, 2024
    Configuration menu
    Copy the full SHA
    34beef6 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #1199 from davidhorstmann-arm/invert-buffer-protec…

    …tion-option
    
    Invert and rename buffer protection config option
    davidhorstmann-arm authored Mar 14, 2024
    Configuration menu
    Copy the full SHA
    0369e2e View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    8302c74 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    e519cc6 View commit details
    Browse the repository at this point in the history

Commits on Mar 15, 2024

  1. Merge pull request #8858 from waleed-elmelegy-arm/add_alpn_to_session

    Add ALPN information in session tickets
    ronald-cron-arm authored Mar 15, 2024
    Configuration menu
    Copy the full SHA
    0a58628 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8924 from Ryan-Everett-arm/threading-same-key-tests

    Add testing for concurrently loading/using/destroying the same key
    paul-elliott-arm authored Mar 15, 2024
    Configuration menu
    Copy the full SHA
    97062dc View commit details
    Browse the repository at this point in the history
  3. Add ALPN checking when accepting early data

    Signed-off-by: Waleed Elmelegy <[email protected]>
    waleed-elmelegy-arm committed Mar 15, 2024
    Configuration menu
    Copy the full SHA
    84523d7 View commit details
    Browse the repository at this point in the history

Commits on Mar 19, 2024

  1. Merge branch 'development' into 'development-restricted'

    Signed-off-by: Minos Galanakis <[email protected]>
    minosgalanakis committed Mar 19, 2024
    Configuration menu
    Copy the full SHA
    c268bab View commit details
    Browse the repository at this point in the history

Commits on Mar 20, 2024

  1. Merge pull request #1208 from Mbed-TLS/origin/dev/minosgalanakis/deve…

    …lopment-restricted-merge-19032024
    
     Merge development on restricted 10/03/2024
    minosgalanakis authored Mar 20, 2024
    Configuration menu
    Copy the full SHA
    a8a0c7f View commit details
    Browse the repository at this point in the history

Commits on Mar 22, 2024

  1. Merge pull request #1213 from Mbed-TLS/mbedtls-3.6.0rc0-pr

    Mbedtls 3.6.0 Release Candidate
    minosgalanakis authored Mar 22, 2024
    Configuration menu
    Copy the full SHA
    ba6bb47 View commit details
    Browse the repository at this point in the history

Commits on Mar 27, 2024

  1. tests: ssl: Fix session field guards

    Signed-off-by: Ronald Cron <[email protected]>
    ronald-cron-arm committed Mar 27, 2024
    Configuration menu
    Copy the full SHA
    edf2e9a View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    b3d9153 View commit details
    Browse the repository at this point in the history

Commits on Apr 8, 2024

  1. Merge pull request #6955 from inorick/nofa_no_session_tickets

    Guard ticket specific TLS 1.3 function with macro
    mpg authored Apr 8, 2024
    Configuration menu
    Copy the full SHA
    3336a01 View commit details
    Browse the repository at this point in the history

Commits on Apr 9, 2024

  1. Fix failures in psa_cryto_driver_wrappers suite

    - "in-driver" test should depend on the present
      of a driver.
    - add new counter in key manangement driver test
      hook which counts the calls of generate_key.
    - We only care about the hits when processing
      `psa_generate_key`.
    
    Signed-off-by: Pengyu Lv <[email protected]>
    lpy4105 authored and mpg committed Apr 9, 2024
    Configuration menu
    Copy the full SHA
    d64072d View commit details
    Browse the repository at this point in the history
  2. Merge pull request #8997 from mpg/fix-wrong-dep-test-case

    Fix wrong dependencies in test cases
    gilles-peskine-arm authored Apr 9, 2024
    Configuration menu
    Copy the full SHA
    0de9ec6 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    60fb60c View commit details
    Browse the repository at this point in the history