-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move some test helpers to framework repository #6
base: main
Are you sure you want to change the base?
Commits on Sep 5, 2023
-
Rename parse_binary_string function
Signed-off-by: Kusumit Ghoderao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4e10c08 - Browse repository at this point
Copy the full SHA 4e10c08View commit details -
Set input cost as 1 for psa_key_exercise test
Signed-off-by: Kusumit Ghoderao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7c3faec - Browse repository at this point
Copy the full SHA 7c3faecView commit details
Commits on Sep 18, 2023
-
Refactoring: create mbedtls_test_ssl_prepare_record_mac()
No semantic change. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 119870c - Browse repository at this point
Copy the full SHA 119870cView commit details
Commits on Sep 19, 2023
-
Signed-off-by: Dave Rodgman <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a688f80 - Browse repository at this point
Copy the full SHA a688f80View commit details -
Make TEST_CALLOC_NONNULL more robust
Signed-off-by: Dave Rodgman <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2a62008 - Browse repository at this point
Copy the full SHA 2a62008View commit details
Commits on Sep 21, 2023
-
Merge pull request #1073 from Mbed-TLS/better-ct-memcmp
More consistent use of mbedtls_ct_memcmp
Configuration menu - View commit details
-
Copy full SHA for f1fb3e7 - Browse repository at this point
Copy the full SHA f1fb3e7View commit details
Commits on Sep 22, 2023
-
Merge pull request #1071 from gilles-peskine-arm/ssl_decrypt_stream_s…
…hort_buffer Fix buffer overread in mbedtls_ssl_decrypt_buf with stream cipher
Configuration menu - View commit details
-
Copy full SHA for e63f93d - Browse repository at this point
Copy the full SHA e63f93dView commit details -
Merge pull request #8092 from silabs-Kusumit/PBKDF2_output_key
PBKDF2: test output_key
Configuration menu - View commit details
-
Copy full SHA for 2dc11a7 - Browse repository at this point
Copy the full SHA 2dc11a7View commit details
Commits on Sep 24, 2023
-
Add SHA-3 support to libtestdriver1
Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9b27b4a - Browse repository at this point
Copy the full SHA 9b27b4aView commit details -
Merge pull request #8240 from mpg/doc-driver-only-hashes
Document driver only hashes (overdue)
Configuration menu - View commit details
-
Copy full SHA for 26d95e9 - Browse repository at this point
Copy the full SHA 26d95e9View commit details
Commits on Sep 25, 2023
-
Merge remote-tracking branch 'upstream-public/development' into devel…
…opment-restricted-merge-20230925 Conflicts: * `include/mbedtls/build_info.h`: a new fragment to auto-enable `MBEDTLS_CIPHER_PADDING_PKCS7` was added in c9f4040 in `development-restricted`. In `development`, this section of the file has moved to `include/mbedtls/config_adjust_legacy_crypto.h`. * `library/bignum.c`: function name change in `development-restricted` vs comment change in development. The comment change in `development` is not really relevant, so just take the line from `development-restricted`.
Configuration menu - View commit details
-
Copy full SHA for a1ac4c9 - Browse repository at this point
Copy the full SHA a1ac4c9View commit details
Commits on Oct 4, 2023
-
Merge pull request #1090 from Mbed-TLS/mbedtls-3.5.0rc0-pr
Mbedtls 3.5.0rc0 pr DO NOT MERGE
Configuration menu - View commit details
-
Copy full SHA for 54b0aa6 - Browse repository at this point
Copy the full SHA 54b0aa6View commit details
Commits on Oct 11, 2023
-
md: remove unnecessary inclusions of mbedtls/md.h
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1bbaeba - Browse repository at this point
Copy the full SHA 1bbaebaView commit details
Commits on Oct 12, 2023
-
Add unit test for max_early_data_size of ticket
Signed-off-by: Jerry Yu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6e31f4c - Browse repository at this point
Copy the full SHA 6e31f4cView commit details
Commits on Oct 19, 2023
-
CMAC: accelerate CMAC in accel_cipher
Signed-off-by: Yanray Wang <[email protected]>
Yanray Wang committedOct 19, 2023 Configuration menu - View commit details
-
Copy full SHA for 9e5eb13 - Browse repository at this point
Copy the full SHA 9e5eb13View commit details
Commits on Oct 23, 2023
-
libtestdriver1: fix acceleration for ALG_STREAM_CIPHER/ALG_ECB_NO_PAD…
…DING Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 87cb0e6 - Browse repository at this point
Copy the full SHA 87cb0e6View commit details
Commits on Oct 30, 2023
-
test_driver_extension: manage curves' acceleration the same as other …
…PSA_WANT symbols Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 610edbe - Browse repository at this point
Copy the full SHA 610edbeView commit details -
ssl_helpers: allow mbedtls_test_ssl_build_transforms to work without …
…CIPHER_C A new internal function is added to get cipher's info (mode, key bits and iv len) without relying on CIPHER_C. This function is basically a lookup table used only for test purposes. Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 52a7566 - Browse repository at this point
Copy the full SHA 52a7566View commit details -
ssl_helpers: remove CIPHER_C guards in mbedtls_test_ssl_build_transfo…
…rms() Use !USE_PSA_CRYPTO instead. Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 43a0e6d - Browse repository at this point
Copy the full SHA 43a0e6dView commit details
Commits on Nov 2, 2023
-
Configuration menu - View commit details
-
Copy full SHA for b8c8f52 - Browse repository at this point
Copy the full SHA b8c8f52View commit details
Commits on Nov 3, 2023
-
Configuration menu - View commit details
-
Copy full SHA for fc46638 - Browse repository at this point
Copy the full SHA fc46638View commit details
Commits on Nov 4, 2023
-
Merge pull request #8443 from valeriosetti/issue8274
Clean up curves handling in libtestdriver1 config
Configuration menu - View commit details
-
Copy full SHA for ff6ba5e - Browse repository at this point
Copy the full SHA ff6ba5eView commit details -
Merge pull request #8434 from valeriosetti/issue8407
[G2] Make TLS work without Cipher
Configuration menu - View commit details
-
Copy full SHA for 749bbe9 - Browse repository at this point
Copy the full SHA 749bbe9View commit details
Commits on Nov 8, 2023
-
ssl_helper: fix missin initialization of cli_log_obj
Signed-off-by: Pengyu Lv <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9f63e13 - Browse repository at this point
Copy the full SHA 9f63e13View commit details -
ssl: use MBEDTLS_SSL_HAVE_* in tests
Done by commands: ``` sed -i "s/MBEDTLS_\(AES\|CAMELLIA\|ARIA\|CHACHAPOLY\)_C/MBEDTLS_SSL_HAVE_\1/g" tests/{suites,include,src}/**/*ssl* sed -i "s/MBEDTLS_\(GCM\|CCM\)_C/MBEDTLS_SSL_HAVE_\1/g" tests/{suites,include,src}/**/*ssl* sed -i "s/MBEDTLS_CIPHER_MODE_\(CBC\)/MBEDTLS_SSL_HAVE_\1/g" tests/{suites,include,src}/**/*ssl* ``` Signed-off-by: Pengyu Lv <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e72725c - Browse repository at this point
Copy the full SHA e72725cView commit details -
git revert v3.5.0..v3.5.1 git rebase to combine the resulting revert commits Signed-off-by: Dave Rodgman <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 081c32f - Browse repository at this point
Copy the full SHA 081c32fView commit details -
Merge remote-tracking branch 'origin/development' into mbedtls-3.5.1-pr
Signed-off-by: Dave Rodgman <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0c90b9c - Browse repository at this point
Copy the full SHA 0c90b9cView commit details -
test_driver_extension: use same def/undef pattern for all accelerated…
… symbols Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8dcc32b - Browse repository at this point
Copy the full SHA 8dcc32bView commit details
Commits on Nov 9, 2023
-
Merge pull request #8495 from lpy4105/issue/6322/driver-only-cipher_a…
…ead-tls [G3] Driver-only cipher+aead: TLS: main test suite
Configuration menu - View commit details
-
Copy full SHA for 467099d - Browse repository at this point
Copy the full SHA 467099dView commit details
Commits on Nov 15, 2023
-
Merge pull request #8499 from valeriosetti/issue8488
Clean up libtestdriver1 config: unconditonal removals
Configuration menu - View commit details
-
Copy full SHA for 7c1ffc4 - Browse repository at this point
Copy the full SHA 7c1ffc4View commit details -
test_driver_extension: fix acceleration support for CCM and CCM*
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 53d6e56 - Browse repository at this point
Copy the full SHA 53d6e56View commit details -
psa_exercise_key: replace legacy symbols with PSA_WANT ones
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9be008a - Browse repository at this point
Copy the full SHA 9be008aView commit details -
psa_exercise_key: add missing #else for KNOWN_SUPPORTED_BLOCK_CIPHER
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b9b37e1 - Browse repository at this point
Copy the full SHA b9b37e1View commit details
Commits on Nov 16, 2023
-
Move handling of mutex->is_valid into threading_helpers.c
This is now a field only used for testing. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for dce64df - Browse repository at this point
Copy the full SHA dce64dfView commit details -
Make threading helpers tests thread safe
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6d48487 - Browse repository at this point
Copy the full SHA 6d48487View commit details -
Rename mutex->is_valid to mutex->state
Rename struct member to make it more representative of its current use. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 68ed0de - Browse repository at this point
Copy the full SHA 68ed0deView commit details
Commits on Nov 20, 2023
-
Merge pull request #7071 from yuhaoth/pr/tls13-ticket-add-max_early_d…
…ata_size-field TLS 1.3 EarlyData: add `max_early_data_size` field for ticket
Configuration menu - View commit details
-
Copy full SHA for 855881e - Browse repository at this point
Copy the full SHA 855881eView commit details -
Merge pull request #8489 from valeriosetti/issue8482
Make CCM* and CCM independent
Configuration menu - View commit details
-
Copy full SHA for b37570d - Browse repository at this point
Copy the full SHA b37570dView commit details
Commits on Nov 21, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 611665f - Browse repository at this point
Copy the full SHA 611665fView commit details -
rename
ticket_creation
toticket_creation_time
Signed-off-by: Jerry Yu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 12bd28b - Browse repository at this point
Copy the full SHA 12bd28bView commit details -
Configuration menu - View commit details
-
Copy full SHA for 1d12938 - Browse repository at this point
Copy the full SHA 1d12938View commit details -
Configuration menu - View commit details
-
Copy full SHA for 2c75308 - Browse repository at this point
Copy the full SHA 2c75308View commit details -
Merge pull request #6788 from yuhaoth/pr/fix-gnutls_anti_replay_fail
TLS 1.3: Fix anti replay fail from GnuTLS
Configuration menu - View commit details
-
Copy full SHA for 93afaeb - Browse repository at this point
Copy the full SHA 93afaebView commit details -
Merge pull request #1122 from gilles-peskine-arm/development-restrict…
…ed-merge-20231120 Merge development on 2023-11-20
Configuration menu - View commit details
-
Copy full SHA for 22b717a - Browse repository at this point
Copy the full SHA 22b717aView commit details
Commits on Nov 22, 2023
-
Detect enabled GCC/Clang sanitizers
Occasionally we want tests to take advantage of sanitizers, or work around them. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 638ce23 - Browse repository at this point
Copy the full SHA 638ce23View commit details
Commits on Nov 23, 2023
-
Ensure mutex test mutex gets free'd
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5f7f6e3 - Browse repository at this point
Copy the full SHA 5f7f6e3View commit details
Commits on Nov 24, 2023
-
Add better documentation for mbedtls_test_mutex_mutex
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3805f11 - Browse repository at this point
Copy the full SHA 3805f11View commit details
Commits on Nov 28, 2023
-
Merge pull request #8286 from gilles-peskine-arm/check_mbedtls_calloc…
…_overallocation-disable_with_asan Fix test_suite_platform failure with Asan on modern Clang
Configuration menu - View commit details
-
Copy full SHA for abc1978 - Browse repository at this point
Copy the full SHA abc1978View commit details
Commits on Nov 29, 2023
-
Merge pull request #8534 from paul-elliott-arm/fix_mutex_abstraction
Make mutex abstraction and tests thread safe
Configuration menu - View commit details
-
Copy full SHA for 85efe19 - Browse repository at this point
Copy the full SHA 85efe19View commit details -
Configuration menu - View commit details
-
Copy full SHA for 0269b02 - Browse repository at this point
Copy the full SHA 0269b02View commit details -
New files for memory-related test functions
Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 582c233 - Browse repository at this point
Copy the full SHA 582c233View commit details -
Add memory poisoning framework
While an area of memory is poisoned, reading or writing from it triggers a sanitizer violation. Implemented for ASan. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 24138fd - Browse repository at this point
Copy the full SHA 24138fdView commit details -
Fix memory poisoning with Asan on arbitrary byte boundaries
Asan poisons memory with an 8-byte granularity. We want to make sure that the whole specified region is poisoned (our typical use case is a heap-allocated object, and we want to poison the whole object, and we don't care about the bytes after the end of the object and up to the beginning of the next object). So align the start and end of the region to (un)poison to an 8-byte boundary. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 34ea221 - Browse repository at this point
Copy the full SHA 34ea221View commit details -
Use the existing definition of MBEDTLS_TEST_HAVE_ASAN
A definition now exists in tests/helpers.h, which is a better place. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5dbd9d1 - Browse repository at this point
Copy the full SHA 5dbd9d1View commit details -
Avoid unused variable warnings in some plausible usage
Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 660dee3 - Browse repository at this point
Copy the full SHA 660dee3View commit details
Commits on Dec 4, 2023
-
ssl_helpers: make rng_get available for other test cases
This is a pre-step to configure random number generator in some TLS tests. Signed-off-by: Yanray Wang <[email protected]>
Yanray Wang committedDec 4, 2023 Configuration menu - View commit details
-
Copy full SHA for a3df575 - Browse repository at this point
Copy the full SHA a3df575View commit details -
ssl_helpers: remove guard for rng_get()
After adding a check in ssl_conf_check(), we have configured RNG via mbedtls_ssl_conf_rng() for TLS tests in both test_suite_ssl.function and test_suite_debug.function. As a result, rng_get() is not only available when MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED enabled. Therefore, we remove the guard for rng_get() to make it accessible for TLS tests which have call for mbedtls_ssl_setup(). Signed-off-by: Yanray Wang <[email protected]>
Yanray Wang committedDec 4, 2023 Configuration menu - View commit details
-
Copy full SHA for ea3933d - Browse repository at this point
Copy the full SHA ea3933dView commit details -
psa: free RNG implementation before checking for remaining open key s…
…lots Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 84b575e - Browse repository at this point
Copy the full SHA 84b575eView commit details -
test_suite_[ctr_drbg/random]: initialize/close PSA in tests
This commit also adds AES_PSA_[INIT/DONE] in "psa_crypto_helpers.h". Its scope is to call PSA_[INIT/DONE] only when AES_C is not defined (which is when PSA is effectively required for CTR_DRBG). Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1b8322f - Browse repository at this point
Copy the full SHA 1b8322fView commit details -
test_suite_psa_crypto_driver_wrappers: improving driver access counters
When AES_C is not defined CTR_DRBG relies on PSA to get AES-ECB. This means that, when AES-ECB is accelerated, each random operation goes through driver access as well. This might result in unexpectedly increased counters for driver's access. We add extra counters in test_driver_[cipher/key_management].c to be more specific on which driver functions are accessed and ignore extra accesses due to CTR_DRBG. Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for aab9a62 - Browse repository at this point
Copy the full SHA aab9a62View commit details -
test_suite_psa_crypto_driver_wrappers: add counter for cipher_update()
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6df615f - Browse repository at this point
Copy the full SHA 6df615fView commit details -
test_suite_psa_crypto_slot_management: modify check on open key slots
This commit - Reverts changes previously done to psa_crypto_helpers.[c,h] - Implements a new check for open key slots in mbedtls_test_helper_is_psa_leaking(): - when CTR_DRBG does not use AES_C or PSA does not have an external RNG, then we allow 1 key slot (it's the one holding the AES key) - when the above conditions are not met, then we fallback to the usual check for "no open key slots remaining" Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9097552 - Browse repository at this point
Copy the full SHA 9097552View commit details -
test_suite_psa_crypto_driver_wrappers: add counter for failing psa_ci…
…pher_update() Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7675a4e - Browse repository at this point
Copy the full SHA 7675a4eView commit details -
test_driver_cipher: add forced return status for encrypt and set_iv
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a76301a - Browse repository at this point
Copy the full SHA a76301aView commit details -
test_driver_key_management: rename counter for export_public_key() hits
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0472af3 - Browse repository at this point
Copy the full SHA 0472af3View commit details
Commits on Dec 7, 2023
-
Correctly use asymmetric encrypt/decrypt driver
Signed-off-by: Pengyu Lv <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 693fa6d - Browse repository at this point
Copy the full SHA 693fa6dView commit details
Commits on Dec 11, 2023
-
Merge pull request #1121 from gilles-peskine-arm/psa-buffers-test-poison
Memory poisoning function for Asan
Configuration menu - View commit details
-
Copy full SHA for 4979327 - Browse repository at this point
Copy the full SHA 4979327View commit details -
Create memory poisoning wrapper for cipher encrypt
Use the preprocessor to wrap psa_cipher_encrypt in a wrapper that poisons the input and output buffers. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ce64ce8 - Browse repository at this point
Copy the full SHA ce64ce8View commit details -
Change to use test-hook-based approach
Since we are applying hooks transparently to all tests, we cannot setup and teardown test hooks in the tests. Instead we must do this in the test wrappers which are used to pre-poison and unpoison memory. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 015f979 - Browse repository at this point
Copy the full SHA 015f979View commit details -
Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7126ccb - Browse repository at this point
Copy the full SHA 7126ccbView commit details -
Add comment explaining the purpose of header
Explain why we have the wrappers in psa_memory_poisoning_wrappers.h Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3a3a7ca - Browse repository at this point
Copy the full SHA 3a3a7caView commit details
Commits on Dec 14, 2023
-
Merge pull request #8616 from lpy4105/issue/8553/test-driver-only-rsa
Add test for driver-only RSA (crypto only)
Configuration menu - View commit details
-
Copy full SHA for 0080cb5 - Browse repository at this point
Copy the full SHA 0080cb5View commit details -
Move test hook setup functions into a C file
Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 978c08e - Browse repository at this point
Copy the full SHA 978c08eView commit details -
Move test hook setup and teardown to helpers.c
Setup and teardown test hooks during full test platform setup. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 155d534 - Browse repository at this point
Copy the full SHA 155d534View commit details -
Move wrapper include to psa_crypto_helpers.h
This makes memory poisoning wrappers available to (almost) all tests. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5e32dba - Browse repository at this point
Copy the full SHA 5e32dbaView commit details -
tests: add PSA_INIT/PSA_DONE to CCM and GCM test suites
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 713031c - Browse repository at this point
Copy the full SHA 713031cView commit details -
Add missing newline at end of file
Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 24157cf - Browse repository at this point
Copy the full SHA 24157cfView commit details
Commits on Dec 15, 2023
-
Improve guards around memory poisoning setup
We should not setup or teardown test hooks when we do not have MBEDTLS_PSA_CRYPTO_C. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a41e3ce - Browse repository at this point
Copy the full SHA a41e3ceView commit details
Commits on Dec 18, 2023
-
Add extra MBEDTLS_PSA_CRYPTO_C guard for header
Do not include psa_memory_poisoning_wrappers.h unless MBEDTLS_PSA_CRYPTO_C is set. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c62ece8 - Browse repository at this point
Copy the full SHA c62ece8View commit details -
Add missing newline at end of file
Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2602db9 - Browse repository at this point
Copy the full SHA 2602db9View commit details
Commits on Dec 20, 2023
-
Only poison memory when buffer copying is enabled
Make sure that we don't enable memory poisoning when MBEDTLS_PSA_COPY_CALLER_BUFFERS is disabled. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e73af47 - Browse repository at this point
Copy the full SHA e73af47View commit details -
Merge pull request #1127 from davidhorstmann-arm/prototype-single-fn-…
…copytesting Prototype poisoning testing with a single function
Configuration menu - View commit details
-
Copy full SHA for 62946ba - Browse repository at this point
Copy the full SHA 62946baView commit details -
Refactor record size limit extension handling
Signed-off-by: Waleed Elmelegy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1f3d336 - Browse repository at this point
Copy the full SHA 1f3d336View commit details
Commits on Jan 2, 2024
-
library/tests: replace md_psa.h with psa_util.h as include file for M…
…D conversion Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4b055ad - Browse repository at this point
Copy the full SHA 4b055adView commit details
Commits on Jan 5, 2024
-
Add accessor helpers for mbedtls_test_info
Step one of being able to control access to mbedtls_test_info with a mutex. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c074b60 - Browse repository at this point
Copy the full SHA c074b60View commit details -
Use mbedtls_test_info accessors internally as well
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cac2eb8 - Browse repository at this point
Copy the full SHA cac2eb8View commit details -
Migrate to threading_helpers.h
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8287a7f - Browse repository at this point
Copy the full SHA 8287a7fView commit details -
Add test thread create/join abstraction
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a37895b - Browse repository at this point
Copy the full SHA a37895bView commit details
Commits on Jan 9, 2024
-
Merge pull request #7455 from KloolK/record-size-limit/comply-with-limit
Comply with the received Record Size Limit extension
Configuration menu - View commit details
-
Copy full SHA for 7e05cf8 - Browse repository at this point
Copy the full SHA 7e05cf8View commit details -
Move bignum flag for negative zero into test_info
Add accessors ready for protection with test_info mutex. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 43b1bb6 - Browse repository at this point
Copy the full SHA 43b1bb6View commit details -
Protect test info access with mutex
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 71c38c2 - Browse repository at this point
Copy the full SHA 71c38c2View commit details -
Add ability to exclude mutex from tests
We need to be able to exclude mbedtls_test_info_mutex() from the normal tests, as this mutex has to be locked to report mutex errors, and also reports as leaked, due to where it is initialised / free'd. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6d9118b - Browse repository at this point
Copy the full SHA 6d9118bView commit details
Commits on Jan 10, 2024
-
Add hkdf_extract, hkdf_expand and ecjpake_to_pms cases
Signed-off-by: Kusumit Ghoderao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c324dba - Browse repository at this point
Copy the full SHA c324dbaView commit details
Commits on Jan 12, 2024
-
Use thread-local flag to enable memory poisoning
Allow memory poisoning to be enabled and disabled at runtime using a thread-local flag. This allows poisoning to be disabled whenever a PSA function is called but not through the test wrappers, removing false positive use-after-poisons. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c1b3b45 - Browse repository at this point
Copy the full SHA c1b3b45View commit details
Commits on Jan 15, 2024
-
Add endpoint in TLS 1.2 session serialization data
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6ab03eb - Browse repository at this point
Copy the full SHA 6ab03ebView commit details -
Add ticket creation time to TLS 1.2 session serialization
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f5c119d - Browse repository at this point
Copy the full SHA f5c119dView commit details -
test_driver_key_management: make opaque [un]wrapping functions public
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 93a5db5 - Browse repository at this point
Copy the full SHA 93a5db5View commit details -
test_driver_asymmetric_encryption: implement opaque [en/de]cryption f…
…unctions Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for aae7db2 - Browse repository at this point
Copy the full SHA aae7db2View commit details -
Commit files generated by `tests/scripts/generate_psa_wrappers.py`. As of this commit, the new code is neither useful (the wrappers just call the underlying functions) nor used (the wrapper functions are not called from anywhere). This will change in subsequent commits. This is a deviation from our normal practice of generating configuration-independent platform-independent files as part of the build in the development branch. The PSA test wrappers will be committed to the repository for some time for two reasons: * In the short term, we will review the generated code but not fully review the generator script. * The build scripts cannot yet accommodate a generated header file. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8aa0e56 - Browse repository at this point
Copy the full SHA 8aa0e56View commit details -
Code in unit tests (`tests/suites/*.function`) and in test support code (`tests/src/**.c`) will now go through the wrapper functions when they call a PSA API function and `MBEDTLS_TEST_HOOKS` is enabled. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e106e87 - Browse repository at this point
Copy the full SHA e106e87View commit details -
Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1539fb2 - Browse repository at this point
Copy the full SHA 1539fb2View commit details -
Remove the manually written poisoning wrapper
This fixes the build with ASan + MBEDTLS_TEST_HOOKS. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f438c61 - Browse repository at this point
Copy the full SHA f438c61View commit details -
PSA wrappers: don't poison buffers when buffer copying is disabled
Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0da9436 - Browse repository at this point
Copy the full SHA 0da9436View commit details -
Disable PSA wrappers psa_collect_statuses builds
`psa_collect_statuses.py` runs `make RECORD_PSA_STATUS_COVERAGE_LOG=1`, which builds with `RECORD_PSA_STATUS_COVERAGE_LOG`. In this mode, the build includes wrappers for PSA functions, which conflict with the newly introduced wrappers that are enabled whenever `MBEDTLS_TEST_HOOKS` is enabled. In the future, the collect-statuses mechanism should use the new generic wrapper mechanism. For the time being, keep the old wrappers and avoid the new wrappers when doing the collect-statuses build. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1636b34 - Browse repository at this point
Copy the full SHA 1636b34View commit details
Commits on Jan 17, 2024
-
Change memory poisoning flag to a count
This allows unusually-nested memory poisoning to work correctly, since it keeps track of whether any buffers are still poisoned, rather than just disabling poisoning at the first call to the UNPOISON() macro. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a984c04 - Browse repository at this point
Copy the full SHA a984c04View commit details -
crypto_config_test_driver_extension: support accelaration of DH groups
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2376257 - Browse repository at this point
Copy the full SHA 2376257View commit details -
Add underflow check to UNPOISON counter decrement
Make sure that extra UNPOISON calls do not cause the poisoning counter to underflow and wrap around. Memory that is unpoisoned multiple times should remain unpoisoned. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0c7b149 - Browse repository at this point
Copy the full SHA 0c7b149View commit details
Commits on Jan 18, 2024
-
test_driver_key_management: keep mbedtls_test_opaque_wrap_key() private
Only mbedtls_test_opaque_unwrap_key() is actually needed by other test drivers to deal with opaque keys. mbedtls_test_opaque_wrap_key() can be kept private to test_driver_key_management.c. Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6157ba5 - Browse repository at this point
Copy the full SHA 6157ba5View commit details -
Merge pull request #8666 from valeriosetti/issue8340
Export the mbedtls_md_psa_alg_from_type function
Configuration menu - View commit details
-
Copy full SHA for ddbeb9e - Browse repository at this point
Copy the full SHA ddbeb9eView commit details
Commits on Jan 19, 2024
-
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 78bcb65 - Browse repository at this point
Copy the full SHA 78bcb65View commit details -
Make test data static now it has accessors
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 17fd81c - Browse repository at this point
Copy the full SHA 17fd81cView commit details -
Access the test data mutex via accessor
Remove the use of extern and instead use an accessor to get the address of the test info mutex (defined only if MBEDTLS_TEST_MUTEX_USAGE is defined, to hopefully stop more general usage) Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e2ce364 - Browse repository at this point
Copy the full SHA e2ce364View commit details
Commits on Jan 22, 2024
-
ssl_helpers.c: Add ticket write/parse test functions
Add ticket write/parse test functions as defined by mbedtls_ssl_ticket_write/parse_t. They are intended to be used in negative testing involving tickets. Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 138bd9b - Browse repository at this point
Copy the full SHA 138bd9bView commit details -
tests: ssl: Move setting of debug callback
Move the setting of the debug callback to the endpoint initialization function. That way, no need to repeat it in various testing scenarios. Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cb40166 - Browse repository at this point
Copy the full SHA cb40166View commit details -
Merge pull request #8700 from valeriosetti/issue8461
psa_asymmetric_encrypt() doesn't work with opaque driver
Configuration menu - View commit details
-
Copy full SHA for 03ce6aa - Browse repository at this point
Copy the full SHA 03ce6aaView commit details
Commits on Jan 24, 2024
-
Merge pull request #1141 from davidhorstmann-arm/memory-poisoning-run…
…time-enable Enable and disable memory poisoning at runtime
Configuration menu - View commit details
-
Copy full SHA for f2df4b7 - Browse repository at this point
Copy the full SHA f2df4b7View commit details -
Generate poisoning in PAKE test wrappers
Enable memory poisoning for all functions whose names start with 'psa_pake'. Regenerate the wrappers and commit the result. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1ec0fde - Browse repository at this point
Copy the full SHA 1ec0fdeView commit details
Commits on Jan 25, 2024
-
tests: fix
calloc()
argument list (gcc-14
fix)`gcc-14` added a new `-Wcalloc-transposed-args` warning recently. It detected minor infelicity in `calloc()` API usage in `mbedtls`: In file included from /build/mbedtls/tests/include/test/ssl_helpers.h:19, from /build/mbedtls/tests/src/test_helpers/ssl_helpers.c:11: /build/mbedtls/tests/src/test_helpers/ssl_helpers.c: In function 'mbedtls_test_init_handshake_options': /build/mbedtls/tests/include/test/macros.h:128:46: error: 'calloc' sizes specified with 'sizeof' in the earlier argument and not in the later argument [-Werror=calloc-transposed-args] 128 | (pointer) = mbedtls_calloc(sizeof(*(pointer)), \ | ^ Signed-off-by: Sergei Trofimovich <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6be3981 - Browse repository at this point
Copy the full SHA 6be3981View commit details
Commits on Jan 26, 2024
-
Merge remote-tracking branch 'restricted/development-restricted' into…
… update-development-r Conflicts: programs/Makefile tests/scripts/check-generated-files.sh
Configuration menu - View commit details
-
Copy full SHA for 72c8ee1 - Browse repository at this point
Copy the full SHA 72c8ee1View commit details
Commits on Jan 30, 2024
-
Signed-off-by: Thomas Daubney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0c8b658 - Browse repository at this point
Copy the full SHA 0c8b658View commit details -
Fix race condition with test comparison functions
Make sure we hold the mutex whilst making several changes at the same time, to prevent race condition on writing connected bits of data. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 034d872 - Browse repository at this point
Copy the full SHA 034d872View commit details
Commits on Jan 31, 2024
-
Explain purpose of test specific write/parse ticket functions
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 86832d5 - Browse repository at this point
Copy the full SHA 86832d5View commit details -
Disable poisoning with PSA_CRYPTO_DRIVER_TEST
This option causes nested calls to PSA functions, so is not compatible with memory poisoning as it currently stands. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5f18b3f - Browse repository at this point
Copy the full SHA 5f18b3fView commit details -
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9d2397e - Browse repository at this point
Copy the full SHA 9d2397eView commit details
Commits on Feb 1, 2024
-
Refactor to help future other implementations
Improve the definition of mbedtls_test_thread_t to assist adding future threading implementations, when they happen. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b77ec28 - Browse repository at this point
Copy the full SHA b77ec28View commit details -
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2dff047 - Browse repository at this point
Copy the full SHA 2dff047View commit details -
Merge pull request #8711 from ronald-cron-arm/tls13-ticket-and-early-…
…data-unit-test Add TLS 1.3 ticket and early data unit tests
Configuration menu - View commit details
-
Copy full SHA for db3e72b - Browse repository at this point
Copy the full SHA db3e72bView commit details -
Fix accidental copy paste mistake
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 04f41d5 - Browse repository at this point
Copy the full SHA 04f41d5View commit details
Commits on Feb 2, 2024
-
Merge pull request #1151 from tom-daubney-arm/asymmetric_sign_buffer_…
…protection Implement safe buffer copying in asymmetric signature API
Configuration menu - View commit details
-
Copy full SHA for 5fbe21e - Browse repository at this point
Copy the full SHA 5fbe21eView commit details -
Generate test wrappers for key management
Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 039ee99 - Browse repository at this point
Copy the full SHA 039ee99View commit details -
Re-add cipher_encrypt to test wrapper script
Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d6a9179 - Browse repository at this point
Copy the full SHA d6a9179View commit details -
Remove unnecessary dependencies from psa_crypto_helpers.h
The psa_test_wrappers.h inclusion was breaking the examples in programs/ on functions with poisoning added Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 075b111 - Browse repository at this point
Copy the full SHA 075b111View commit details -
Merge pull request #1137 from Ryan-Everett-arm/key-management-buffer-…
…protection Add buffer copying to the Key Management API
Configuration menu - View commit details
-
Copy full SHA for 000c171 - Browse repository at this point
Copy the full SHA 000c171View commit details -
Restore mutex lock for mbedtls_test_set_step()
This function is called externally from several tests, so still requires a mutex lock. Add an internal function to reset the step, for use in functions where the mutex is already held. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for be8e24f - Browse repository at this point
Copy the full SHA be8e24fView commit details -
Revert accidental formatting change
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0758142 - Browse repository at this point
Copy the full SHA 0758142View commit details -
Merge branch 'development-restricted' into update-development-r
Signed-off-by: Dave Rodgman <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d5ea096 - Browse repository at this point
Copy the full SHA d5ea096View commit details -
Configuration menu - View commit details
-
Copy full SHA for a34b9de - Browse repository at this point
Copy the full SHA a34b9deView commit details
Commits on Feb 6, 2024
-
Fix missed case for removing accessor
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ab6b278 - Browse repository at this point
Copy the full SHA ab6b278View commit details -
Generate poisoning wrappers for AEAD
Modify wrapper generation script to generate poisoning calls and regenerate wrappers. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for da3051d - Browse repository at this point
Copy the full SHA da3051dView commit details -
Add comment to set/increment step functions
These functions are thread safe, but using them from within multiple threads at the same time may not have the intended effect, given order cannot be guaranteed. Also, standardise header comment formatting. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e458fda - Browse repository at this point
Copy the full SHA e458fdaView commit details -
tests: ssl: Move group list to options
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 444f393 - Browse repository at this point
Copy the full SHA 444f393View commit details -
tests: ssl: First reset to all zeroes options in init
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 17c3145 - Browse repository at this point
Copy the full SHA 17c3145View commit details -
tests: ssl: Add early data handshake option
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4ad1907 - Browse repository at this point
Copy the full SHA 4ad1907View commit details -
tests: ssl: Add helper function to get a TLS 1.3 ticket
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5d95b0b - Browse repository at this point
Copy the full SHA 5d95b0bView commit details -
Merge pull request #8198 from silabs-Kusumit/kdf_incorrect_initial_ca…
…pacity KDF incorrect initial capacity
Configuration menu - View commit details
-
Copy full SHA for 861d497 - Browse repository at this point
Copy the full SHA 861d497View commit details -
Stop platform test failures with GCC and TSAN
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 44b8e62 - Browse repository at this point
Copy the full SHA 44b8e62View commit details
Commits on Feb 7, 2024
-
Merge pull request #8717 from valeriosetti/issue8030
PSA FFDH: feature macros for parameters
Configuration menu - View commit details
-
Copy full SHA for 6f97a38 - Browse repository at this point
Copy the full SHA 6f97a38View commit details -
Merge pull request #8789 from paul-elliott-arm/fix_tsan_gcc
Stop platform test failures with GCC and TSAN
Configuration menu - View commit details
-
Copy full SHA for c1c58da - Browse repository at this point
Copy the full SHA c1c58daView commit details -
Generate test wrappers for key derivation
Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 06275bb - Browse repository at this point
Copy the full SHA 06275bbView commit details
Commits on Feb 8, 2024
-
Merge pull request #8636 from paul-elliott-arm/new_test_thread_interface
New test thread interface
Configuration menu - View commit details
-
Copy full SHA for c4493c9 - Browse repository at this point
Copy the full SHA c4493c9View commit details
Commits on Feb 9, 2024
-
tests: ssl: Improve test parameter sanity check
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8eaecd1 - Browse repository at this point
Copy the full SHA 8eaecd1View commit details -
Configuration menu - View commit details
-
Copy full SHA for 7e91651 - Browse repository at this point
Copy the full SHA 7e91651View commit details -
Fix typo / improve documentation for test step fns
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 63022a8 - Browse repository at this point
Copy the full SHA 63022a8View commit details -
Merge pull request #8689 from paul-elliott-arm/make_tests_thread_safe
Make test data thread safe
Configuration menu - View commit details
-
Copy full SHA for 1b84170 - Browse repository at this point
Copy the full SHA 1b84170View commit details
Commits on Feb 12, 2024
-
Generate test wrappers for hash functions
Signed-off-by: Thomas Daubney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for fec3ee1 - Browse repository at this point
Copy the full SHA fec3ee1View commit details -
Generate test wrappers for mac functions
Signed-off-by: Thomas Daubney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 72a123c - Browse repository at this point
Copy the full SHA 72a123cView commit details -
Signed-off-by: Thomas Daubney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3b14880 - Browse repository at this point
Copy the full SHA 3b14880View commit details -
One was missed due to a typo Signed-off-by: Thomas Daubney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8eee3a3 - Browse repository at this point
Copy the full SHA 8eee3a3View commit details -
exercise_key: allow SIGN_MESSAGE/VERIFY_MESSAGE with PSA_ALG_ANY_HASH
There was already code to instantiate the wildcard for sign/verify-hash. Make that work with sign/verify-message as well. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for bc7d47b - Browse repository at this point
Copy the full SHA bc7d47bView commit details -
exercise_key: fix asymmetric encrypt/decrypt with >2028-bit RSA
Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d011028 - Browse repository at this point
Copy the full SHA d011028View commit details -
Don't exercise if the algorithm is not supported
Parsing a key and importing it into PSA may result in a policy that specifies an algorithm that is not included in the build. This happens if the key type is supported, but not the algorithm, e.g. in a build with MBEDTLS_ECP_C but not MBEDTLS_ECDSA_C. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ec47c96 - Browse repository at this point
Copy the full SHA ec47c96View commit details -
Prioritize SHA2 over MD5 for KNOWN_SUPPORTED_HASH_ALG
This fixes the ability to exercise keys in configurations where MD5 is supported for direct use, but not inside some accelerated algorithms. This is the case in `all.sh test_psa_crypto_config_accel_ecc_ecp_light_only` and some other accelerated-ECC components of `all.sh`, where the driver is built without MD5 support but built-in MD5 remains enabled. This is only a hack, not a theoretically correct fix, but a correct fix is out of scope of my current work. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6a330ad - Browse repository at this point
Copy the full SHA 6a330adView commit details
Commits on Feb 13, 2024
-
Fix deadlock with test failures
Calling mbedtls_test_fail() attempts to lock the test data mutex. Unfortunately we were calling this from places where we already held this mutex, and this mutex is not recursive, so this deadlocks. Split out mbedtls_test_fail() into mbedtls_test_fail_internal() in order to address this. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b847664 - Browse repository at this point
Copy the full SHA b847664View commit details -
Merge pull request #1142 from tom-daubney-arm/hash_buffer_protection
Add secure buffer copying to PSA Hash API
Configuration menu - View commit details
-
Copy full SHA for 92203e7 - Browse repository at this point
Copy the full SHA 92203e7View commit details -
Merge pull request #8755 from ronald-cron-arm/tls13-client-early-data…
…-status TLS 1.3: Refine and test client early data status
Configuration menu - View commit details
-
Copy full SHA for 4af9f79 - Browse repository at this point
Copy the full SHA 4af9f79View commit details
Commits on Feb 14, 2024
-
Make internal test info accessor functions static.
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 337dcd2 - Browse repository at this point
Copy the full SHA 337dcd2View commit details
Commits on Feb 15, 2024
-
Merge pull request #1156 from Ryan-Everett-arm/key-derivation-buffer-…
…protection Add buffer copying to the Key Derivation API
Configuration menu - View commit details
-
Copy full SHA for 17b6152 - Browse repository at this point
Copy the full SHA 17b6152View commit details -
The values are the same for all supported mechanisms (RSA-based), so no semantic change. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f0817be - Browse repository at this point
Copy the full SHA f0817beView commit details -
Rename internal test info data accessors
Rename internal test info data accessors by adding _internal to mark them as obviously internal. Add to the intial comment block to further explain the mutex locking policy. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1f37bfb - Browse repository at this point
Copy the full SHA 1f37bfbView commit details -
Fix missing mutex lock for mutex usage error
Although this can only be read in a situation where threads should have already stopped, best to fix this as its public. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 963c26e - Browse repository at this point
Copy the full SHA 963c26eView commit details -
Lock test mutex before doing mutex usage check
Although this again should only happen post all threads stopping, guard this just in case things change. Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for fc47457 - Browse repository at this point
Copy the full SHA fc47457View commit details -
Signed-off-by: Thomas Daubney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cf16573 - Browse repository at this point
Copy the full SHA cf16573View commit details -
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6cc6a90 - Browse repository at this point
Copy the full SHA 6cc6a90View commit details -
New test helper: mbedtls_test_key_consistency_psa_pk
Test that a PK key and a PSA key are consistent, i.e. that they have the same type (or are a key pair and the corresponding public key) and that they have the same public key. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 826741d - Browse repository at this point
Copy the full SHA 826741dView commit details
Commits on Feb 20, 2024
-
Merge pull request #1132 from davidhorstmann-arm/copying-aead
Copy buffers in AEAD
Configuration menu - View commit details
-
Copy full SHA for 22b3f3b - Browse repository at this point
Copy the full SHA 22b3f3bView commit details
Commits on Feb 21, 2024
-
Merge pull request #8574 from ronald-cron-arm/ssl-tickets
Fix and align ticket age check in ssl_ticket.c for TLS 1.2 and TLS 1.3
Configuration menu - View commit details
-
Copy full SHA for 6117f80 - Browse repository at this point
Copy the full SHA 6117f80View commit details -
Merge remote-tracking branch 'development' into pk_import_into_psa-im…
…plement_import Conflicts: * tests/suites/test_suite_pk.function: consecutive changes to the depends_on line of pk_sign_verify and its argument list.
Configuration menu - View commit details
-
Copy full SHA for bd416a0 - Browse repository at this point
Copy the full SHA bd416a0View commit details -
Merge pull request #8807 from gilles-peskine-arm/pk_import_into_psa-i…
…mplement_import Implement mbedtls_pk_import_into_psa
Configuration menu - View commit details
-
Copy full SHA for a2876c6 - Browse repository at this point
Copy the full SHA a2876c6View commit details
Commits on Feb 22, 2024
-
Merge branch 'development-restricted' into mac_buffer_protection
Signed-off-by: tom-daubney-arm <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8dd174a - Browse repository at this point
Copy the full SHA 8dd174aView commit details
Commits on Feb 24, 2024
-
Improve documentation / comments
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 407d4b0 - Browse repository at this point
Copy the full SHA 407d4b0View commit details
Commits on Feb 26, 2024
-
Ignore domain parameters in RSA key generation
Remove the ability to select a custom public exponent via domain parameters in RSA key generation. The only way to select a custom public exponent is now to pass custom production parameters to psa_generate_key_ext(). A subsequent commit will remove domain parameters altogether from the API, thus this commit does not bother to update the documentation. Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 684e26b - Browse repository at this point
Copy the full SHA 684e26bView commit details -
Merge pull request #8838 from paul-elliott-arm/improve_test_data_acce…
…ssors Improve test info data accessors
Configuration menu - View commit details
-
Copy full SHA for af3ff20 - Browse repository at this point
Copy the full SHA af3ff20View commit details -
Generate test wrappers for psa_generate_random()
Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ecfc973 - Browse repository at this point
Copy the full SHA ecfc973View commit details -
Merge pull request #1149 from tom-daubney-arm/mac_buffer_protection
Implement safe buffer copying in MAC API
Configuration menu - View commit details
-
Copy full SHA for 5684c51 - Browse repository at this point
Copy the full SHA 5684c51View commit details
Commits on Feb 27, 2024
-
test: remove usage of mbedtls_pk_wrap_as_opaque() from tests
This is replaced with: mbedtls_pk_get_psa_attributes() + mbedtls_pk_import_into_psa() + mbedtls_pk_setup_opaque(). Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 000fe48 - Browse repository at this point
Copy the full SHA 000fe48View commit details -
Merge pull request #8840 from gilles-peskine-arm/domain_parameters-re…
…move Remove domain parameters
Configuration menu - View commit details
-
Copy full SHA for 0129b7e - Browse repository at this point
Copy the full SHA 0129b7eView commit details -
ssl_helpers: minor fix in mbedtls_test_ssl_endpoint_certificate_init()
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for fe45695 - Browse repository at this point
Copy the full SHA fe45695View commit details
Commits on Feb 28, 2024
-
Don't access psa_key_attributes_t.core
Access the fields of `psa_key_attributes_t` directly rather than through the `core` field. This makes the `core` field obsolete. This commit is fully automated: ``` git ls-files '*.h' '*.c' '*.function' '*.jinja' | xargs perl -l -i -pe '$core = qr/\b(core\b|MBEDTLS_PRIVATE\(core\))/; s/->$core\./->/g; s/&(\w+)\.$core\./&$1./g; s/(\w+)\.$core/$1/g' ``` Signed-off-by: Gilles Peskine <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3318f39 - Browse repository at this point
Copy the full SHA 3318f39View commit details -
Add test wrapper functions for cipher buffer protection
Signed-off-by: Gabor Mezei <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2540a4e - Browse repository at this point
Copy the full SHA 2540a4eView commit details -
Update test wrapper functions for ciper buffer protection
Signed-off-by: Gabor Mezei <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 14fdcb7 - Browse repository at this point
Copy the full SHA 14fdcb7View commit details -
Merge branch 'development-restricted' into asymmetric_encrypt_buffer_…
…protection Signed-off-by: tom-daubney-arm <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f894dfd - Browse repository at this point
Copy the full SHA f894dfdView commit details
Commits on Feb 29, 2024
-
Merge pull request #1153 from tom-daubney-arm/asymmetric_encrypt_buff…
…er_protection Implement safe buffer copying in asymmetric encryption
Configuration menu - View commit details
-
Copy full SHA for 9f1962b - Browse repository at this point
Copy the full SHA 9f1962bView commit details -
Merge branch 'development-restricted' into generate-random-buffer-pro…
…tection Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 98a2344 - Browse repository at this point
Copy the full SHA 98a2344View commit details -
Merge pull request #8760 from ronald-cron-arm/tls13-write-early-data
TLS 1.3: Add mbedtls_ssl_write_early_data() API
Configuration menu - View commit details
-
Copy full SHA for 937f449 - Browse repository at this point
Copy the full SHA 937f449View commit details -
psa_util: change guard for mbedtls_psa_get_random() to CRYPTO_CLIENT
This commit also: - updates changelog - add a stub function to be used in component_test_psa_crypto_client() test Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a2c7de5 - Browse repository at this point
Copy the full SHA a2c7de5View commit details
Commits on Mar 1, 2024
-
tests: ssl: Add max_early_data_size option
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 63281a4 - Browse repository at this point
Copy the full SHA 63281a4View commit details -
tests: ssl: Add max_early_data_size option
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 523b1d2 - Browse repository at this point
Copy the full SHA 523b1d2View commit details -
Merge pull request #8864 from valeriosetti/issue8848
Deprecate or remove mbedtls_pk_wrap_as_opaque
Configuration menu - View commit details
-
Copy full SHA for b18e2e4 - Browse repository at this point
Copy the full SHA b18e2e4View commit details -
tests: ssl_helpers: Rename rng_get to mbedtls_test_random
mbedtls_test_ as the prefix for test APIs _random like in mbedtls_ctr/hmac_drbg_random Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for dbac76f - Browse repository at this point
Copy the full SHA dbac76fView commit details -
psa_crypto_stubs/changelog: fix typos
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 64609f6 - Browse repository at this point
Copy the full SHA 64609f6View commit details
Commits on Mar 4, 2024
-
ssl_helpers: Restore rng_seed incrementation
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2b76c6c - Browse repository at this point
Copy the full SHA 2b76c6cView commit details -
Merge pull request #1172 from davidhorstmann-arm/generate-random-buff…
…er-protection Add secure buffer copying to `psa_generate_random()`
Configuration menu - View commit details
-
Copy full SHA for b471e41 - Browse repository at this point
Copy the full SHA b471e41View commit details -
Merge branch 'development-restricted' into buffer_protection_for_cipher
Signed-off-by: Gábor Mezei <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for dff4a8e - Browse repository at this point
Copy the full SHA dff4a8eView commit details
Commits on Mar 5, 2024
-
Merge pull request #8867 from gilles-peskine-arm/psa_key_attributes-r…
…emove_core Merge psa_core_key_attributes_t back into psa_key_attributes_t
Configuration menu - View commit details
-
Copy full SHA for c98b918 - Browse repository at this point
Copy the full SHA c98b918View commit details -
Ensure drivers have threading enabled if required
Signed-off-by: Paul Elliott <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 70644d1 - Browse repository at this point
Copy the full SHA 70644d1View commit details -
Merge pull request #1167 from gabor-mezei-arm/buffer_protection_for_c…
…ipher Buffer protection for cipher functions
Configuration menu - View commit details
-
Copy full SHA for 6404576 - Browse repository at this point
Copy the full SHA 6404576View commit details
Commits on Mar 6, 2024
-
Merge branch 'development-restricted' into copying-pake
Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1927e0f - Browse repository at this point
Copy the full SHA 1927e0fView commit details -
Merge branch 'development-restricted' into key_agreement_buffer_prote…
…ction Signed-off-by: tom-daubney-arm <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a94af45 - Browse repository at this point
Copy the full SHA a94af45View commit details
Commits on Mar 8, 2024
-
Merge pull request #8587 from yanrayw/issue/4911/ssl_setup-check-RNG-…
…configuration TLS: check RNG when calling mbedtls_ssl_setup()
Configuration menu - View commit details
-
Copy full SHA for 1211f7c - Browse repository at this point
Copy the full SHA 1211f7cView commit details -
Merge pull request #1160 from davidhorstmann-arm/copying-pake
Add secure buffer copying to PAKE
Configuration menu - View commit details
-
Copy full SHA for bf6dfcb - Browse repository at this point
Copy the full SHA bf6dfcbView commit details
Commits on Mar 9, 2024
-
Merge pull request #8854 from ronald-cron-arm/tls13-srv-max-early-dat…
…a-size TLS 1.3: Enforce max_early_data_size on server
Configuration menu - View commit details
-
Copy full SHA for b99748a - Browse repository at this point
Copy the full SHA b99748aView commit details
Commits on Mar 10, 2024
-
Merge remote-tracking branch 'mbedtls/development' into tls13-cli-max…
…-early-data-size
Configuration menu - View commit details
-
Copy full SHA for a415422 - Browse repository at this point
Copy the full SHA a415422View commit details -
Merge pull request #8862 from valeriosetti/issue8825
Improve support of mbedtls_psa_get_random in client-only builds
Configuration menu - View commit details
-
Copy full SHA for 873539c - Browse repository at this point
Copy the full SHA 873539cView commit details
Commits on Mar 11, 2024
-
Merge pull request #1181 from tom-daubney-arm/key_agreement_buffer_pr…
…otection Implement safe buffer copying in key agreement
Configuration menu - View commit details
-
Copy full SHA for 8661346 - Browse repository at this point
Copy the full SHA 8661346View commit details -
Generate memory poisoning in wrappers
Generate memory poisoning code in test wrappers for: * psa_sign_hash_start() * psa_sign_hash_complete() * psa_verify_hash_start() Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 40af74b - Browse repository at this point
Copy the full SHA 40af74bView commit details
Commits on Mar 12, 2024
-
Merge pull request #8857 from ronald-cron-arm/tls13-cli-max-early-dat…
…a-size TLS 1.3: Enforce max_early_data_size on client
Configuration menu - View commit details
-
Copy full SHA for f8d87b5 - Browse repository at this point
Copy the full SHA f8d87b5View commit details -
Configuration menu - View commit details
-
Copy full SHA for 36f35d0 - Browse repository at this point
Copy the full SHA 36f35d0View commit details -
Add key_destroyable parameter to mbedtls_test_psa_exercise_key
This will allow us to use this smoke test to ensure that key slot content reads are only performed when we are registered to read a full slot. We will destroy the key on another thread while the key is being exercised, and fail the test if an unexpected error code is hit. Future commits will incrementally implement this new parameter. All current usages of this function have this parameter set to 0, in which case the new behaviour must be the same as the old behaviour Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 002f809 - Browse repository at this point
Copy the full SHA 002f809View commit details -
Add key_destroyable parameter to check_key_attributes_sanity
This function is currently only used in the exercise_key smoke test. Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 233382e - Browse repository at this point
Copy the full SHA 233382eView commit details -
Add key_destroyable parameter to exercise_mac_key
If the key has been destroyed (and the new parameter is 1) then we test that psa_mac_abort succeeds in this scenario. Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c13895a - Browse repository at this point
Copy the full SHA c13895aView commit details -
Add key_destroyable parameter to psa_exercise_cipher_key
If the key has been destroyed (and the new parameter is 1), we test that psa_cipher_abort succeeds in this scenario. Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6049968 - Browse repository at this point
Copy the full SHA 6049968View commit details -
Add key_destroyable parameter to exercise_aead_key
Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e0cfa29 - Browse repository at this point
Copy the full SHA e0cfa29View commit details -
Add key_destroyable parameter to exercise_signature_key
Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 33fba7c - Browse repository at this point
Copy the full SHA 33fba7cView commit details -
Add key_destroyable parameter to exercise_asymmetric_encryption_key
Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0032477 - Browse repository at this point
Copy the full SHA 0032477View commit details -
Add key_destroyable parameter to key derivation smoke tests
All current usages have this parameter set to 0 (in this case the behaviour of the test is unchanged) Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 051d298 - Browse repository at this point
Copy the full SHA 051d298View commit details -
Add key_destroyable parameter to raw key agreement smoke tests
All current usages have this parameter set to 0 (meaning the behaviour of these tests hasn't changed). We also now return the actual error code, not GENERIC_ERROR Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f7ba175 - Browse repository at this point
Copy the full SHA f7ba175View commit details -
Regenerate PSA wrappers for new PSA functions
Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a0010d1 - Browse repository at this point
Copy the full SHA a0010d1View commit details
Commits on Mar 13, 2024
-
psa_crypto_stubs: extend stub functions for the CRYPTO_CLIENT tests
Signed-off-by: Valerio Setti <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1290451 - Browse repository at this point
Copy the full SHA 1290451View commit details -
Add key_destroyable parameter to non-raw key agreement smoke tests
All current usages have this parameter set to 0 (this means the tests are unchanged). Remove the GENERIC_ERROR return behaviour, in favour of returning the actual status. Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f89b216 - Browse repository at this point
Copy the full SHA f89b216View commit details -
Add key_destroyable parameter to key export smoke tests
These are only called from mbedtls_test_psa_exercise_key Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3823662 - Browse repository at this point
Copy the full SHA 3823662View commit details -
Add ALPN information in session tickets
Signed-off-by: Waleed Elmelegy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for bfdaaf7 - Browse repository at this point
Copy the full SHA bfdaaf7View commit details -
Add mbedtls_ssl_session_set_alpn() function
Signed-off-by: Waleed Elmelegy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f4bd241 - Browse repository at this point
Copy the full SHA f4bd241View commit details -
Add code improvments and refactoring in dealing with ALPN
Signed-off-by: Waleed Elmelegy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e98de40 - Browse repository at this point
Copy the full SHA e98de40View commit details
Commits on Mar 14, 2024
-
Invert and rename config option
Replace MBEDTLS_PSA_COPY_CALLER_BUFFERS with inverse: !MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS. This ensures that buffer protection is enabled by default without any change to the Mbed TLS config file. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7cd6992 - Browse repository at this point
Copy the full SHA 7cd6992View commit details -
Update wrapper generation script and regenerate
Update the guards generated by the wrapper generation script to use !MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS and regenerate the PSA test wrappers. Signed-off-by: David Horstmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 34beef6 - Browse repository at this point
Copy the full SHA 34beef6View commit details -
Merge pull request #1199 from davidhorstmann-arm/invert-buffer-protec…
…tion-option Invert and rename buffer protection config option
Configuration menu - View commit details
-
Copy full SHA for 0369e2e - Browse repository at this point
Copy the full SHA 0369e2eView commit details -
Add missing PSA_ASSERT in mbedtls_test_psa_raw_key_agreement_with_self
Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8302c74 - Browse repository at this point
Copy the full SHA 8302c74View commit details -
Document unsupported concurrency scenario in psa_exercise_key
Signed-off-by: Ryan Everett <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e519cc6 - Browse repository at this point
Copy the full SHA e519cc6View commit details
Commits on Mar 15, 2024
-
Merge pull request #8858 from waleed-elmelegy-arm/add_alpn_to_session
Add ALPN information in session tickets
Configuration menu - View commit details
-
Copy full SHA for 0a58628 - Browse repository at this point
Copy the full SHA 0a58628View commit details -
Merge pull request #8924 from Ryan-Everett-arm/threading-same-key-tests
Add testing for concurrently loading/using/destroying the same key
Configuration menu - View commit details
-
Copy full SHA for 97062dc - Browse repository at this point
Copy the full SHA 97062dcView commit details -
Add ALPN checking when accepting early data
Signed-off-by: Waleed Elmelegy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 84523d7 - Browse repository at this point
Copy the full SHA 84523d7View commit details
Commits on Mar 19, 2024
-
Merge branch 'development' into 'development-restricted'
Signed-off-by: Minos Galanakis <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c268bab - Browse repository at this point
Copy the full SHA c268babView commit details
Commits on Mar 20, 2024
-
Merge pull request #1208 from Mbed-TLS/origin/dev/minosgalanakis/deve…
…lopment-restricted-merge-19032024 Merge development on restricted 10/03/2024
Configuration menu - View commit details
-
Copy full SHA for a8a0c7f - Browse repository at this point
Copy the full SHA a8a0c7fView commit details
Commits on Mar 22, 2024
-
Merge pull request #1213 from Mbed-TLS/mbedtls-3.6.0rc0-pr
Mbedtls 3.6.0 Release Candidate
Configuration menu - View commit details
-
Copy full SHA for ba6bb47 - Browse repository at this point
Copy the full SHA ba6bb47View commit details
Commits on Mar 27, 2024
-
tests: ssl: Fix session field guards
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for edf2e9a - Browse repository at this point
Copy the full SHA edf2e9aView commit details -
tests: ssl: Add hostname checks in session serialization tests
Signed-off-by: Ronald Cron <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b3d9153 - Browse repository at this point
Copy the full SHA b3d9153View commit details
Commits on Apr 8, 2024
-
Merge pull request #6955 from inorick/nofa_no_session_tickets
Guard ticket specific TLS 1.3 function with macro
Configuration menu - View commit details
-
Copy full SHA for 3336a01 - Browse repository at this point
Copy the full SHA 3336a01View commit details
Commits on Apr 9, 2024
-
Fix failures in psa_cryto_driver_wrappers suite
- "in-driver" test should depend on the present of a driver. - add new counter in key manangement driver test hook which counts the calls of generate_key. - We only care about the hits when processing `psa_generate_key`. Signed-off-by: Pengyu Lv <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d64072d - Browse repository at this point
Copy the full SHA d64072dView commit details -
Merge pull request #8997 from mpg/fix-wrong-dep-test-case
Fix wrong dependencies in test cases
Configuration menu - View commit details
-
Copy full SHA for 0de9ec6 - Browse repository at this point
Copy the full SHA 0de9ec6View commit details -
Configuration menu - View commit details
-
Copy full SHA for 60fb60c - Browse repository at this point
Copy the full SHA 60fb60cView commit details