Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Only for CI - Don't review #27

Closed
wants to merge 95 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
95 commits
Select commit Hold shift + click to select a range
f6d3c44
[nrf noup] Undef PSA crypto client in crypto_types
frkv Nov 29, 2021
92a84d6
[nrf noup] Remove redefinition ECC_MAX_CURVE_BITS
Vge0rge Dec 13, 2021
d3eb208
[nrf noup] Check if ECP_MAX_BITS is set in ecp.h
Vge0rge Jan 20, 2022
8ffbcc1
[nrf noup] Check if GCM_C is defined in gcm.h
Vge0rge Jan 20, 2022
f1f21d2
[nrf noup] Add driver_wrapper call for derivation
Vge0rge Jan 30, 2022
ca1e6b2
[nrf noup] Enable use of SNI without x509.
plskeggs Feb 5, 2022
dbbe35f
[nrf noup] Enable auto-generation of additional TLS/DTLS docs
plskeggs Feb 14, 2022
a9d5a5a
[nrf toup] pk_wrap: Add missing MD description for ECDSA verify
frkv Mar 10, 2022
3da802b
[nrf noup] Disable reporting ecjpake kkpp extension for PSK
frkv Apr 5, 2022
24c4ec1
[nrf noup] Fix PSA MAC for CMAC key types
frkv Apr 5, 2022
f6ff46f
[nrf_noup] Add opaque oberon context for hash
Vge0rge Apr 10, 2022
2863179
[nrf noup] Fix unset key bits for nrf_cc3xx v0.9.14
frkv May 12, 2022
c56a2ae
[nrf noup] Zeroize the Mbedtls entropy mutex
Vge0rge Sep 13, 2022
7322ffa
[nrf noup] Constant size for psa_core_key_attributes_t struct
mswarowsky Sep 30, 2022
45374c0
[nrf toup] Fix RSA dependency on PK write when enabling PSA crypto
joerchan Feb 17, 2023
a58396e
[nrf fromlist] library: psa_crypto: Fix compilation error in psa_key_…
joerchan Feb 17, 2023
829e3ed
[nrf fromlist] psa_crypto: Fix psa_key_derivation_output_key ECC with…
joerchan Mar 1, 2023
b573773
[nrf_noup] mbedtls: Circumvent ECJPAKE API inconsistency for OpenThread
maciejbaczmanski Sep 15, 2023
2d81092
[nrf noup] Fix buffer overflow in TLS 1.2 ClientKeyExchange parsing
frkv Oct 16, 2023
4a204f2
[nrf noup] Fix buffer overflow in TLS 1.3 ECDH public key parsing
frkv Oct 16, 2023
acea48f
[nrf noup] Fix buffer overread with stream cipher
frkv Oct 17, 2023
8498c9f
Revert "[nrf noup] Fix buffer overread with stream cipher"
mswarowsky Jan 12, 2024
6e08692
Revert "[nrf noup] Fix buffer overflow in TLS 1.3 ECDH public key par…
mswarowsky Jan 12, 2024
64abfc0
Revert "[nrf noup] Fix buffer overflow in TLS 1.2 ClientKeyExchange p…
mswarowsky Jan 12, 2024
94bc3d7
Revert "[nrf_noup] mbedtls: Circumvent ECJPAKE API inconsistency for …
mswarowsky Jan 12, 2024
f020b43
Revert "[nrf fromlist] psa_crypto: Fix psa_key_derivation_output_key …
mswarowsky Jan 12, 2024
2b48fe9
Revert "[nrf fromlist] library: psa_crypto: Fix compilation error in …
mswarowsky Jan 12, 2024
ae1ae38
Revert "[nrf toup] Fix RSA dependency on PK write when enabling PSA c…
mswarowsky Jan 12, 2024
60bc532
Revert "[nrf noup] Constant size for psa_core_key_attributes_t struct"
mswarowsky Jan 12, 2024
6e88908
Revert "[nrf noup] Zeroize the Mbedtls entropy mutex"
mswarowsky Jan 12, 2024
e1661e0
Revert "[nrf noup] Fix unset key bits for nrf_cc3xx v0.9.14"
mswarowsky Jan 12, 2024
43f777c
Revert "[nrf_noup] Add opaque oberon context for hash"
mswarowsky Jan 12, 2024
dac43ce
Revert "[nrf noup] Fix PSA MAC for CMAC key types"
mswarowsky Jan 12, 2024
f8d188b
Revert "[nrf noup] Disable reporting ecjpake kkpp extension for PSK"
mswarowsky Jan 12, 2024
f2baa28
Revert "[nrf toup] pk_wrap: Add missing MD description for ECDSA verify"
mswarowsky Jan 12, 2024
c61fab1
Revert "[nrf noup] Enable auto-generation of additional TLS/DTLS docs"
mswarowsky Jan 12, 2024
3abceed
Revert "[nrf noup] Enable use of SNI without x509."
mswarowsky Jan 12, 2024
8e9eb2c
Revert "[nrf noup] Add driver_wrapper call for derivation"
mswarowsky Jan 12, 2024
3416f60
Revert "[nrf noup] Check if GCM_C is defined in gcm.h"
mswarowsky Jan 12, 2024
03ba4c5
Revert "[nrf noup] Check if ECP_MAX_BITS is set in ecp.h"
mswarowsky Jan 12, 2024
5cf3577
Revert "[nrf noup] Remove redefinition ECC_MAX_CURVE_BITS"
mswarowsky Jan 12, 2024
39c6149
Revert "[nrf noup] Undef PSA crypto client in crypto_types"
mswarowsky Jan 12, 2024
dfffe95
[nrf merge] Merge tag mbed TLS 3.5.0
mswarowsky Jan 17, 2024
4ff237c
[nrf noup] Remove redefinition ECC_MAX_CURVE_BITS
Vge0rge Dec 13, 2021
e6a448e
[nrf noup] Check if ECP_MAX_BITS is set in ecp.h
Vge0rge Jan 20, 2022
06ac954
[nrf noup] Check if GCM_C is defined in gcm.h
Vge0rge Jan 20, 2022
9afc312
[nrf noup] Enable use of SNI without x509.
plskeggs Feb 5, 2022
39f9908
[nrf noup] Enable auto-generation of additional TLS/DTLS docs
plskeggs Feb 14, 2022
978da1c
[nrf noup] Disable reporting ecjpake kkpp extension for PSK
frkv Apr 5, 2022
7906442
[nrf noup] Fix unset key bits for nrf_cc3xx v0.9.14
frkv May 12, 2022
0a3cb16
[nrf noup] Zeroize the Mbedtls entropy mutex
Vge0rge Sep 13, 2022
0f7b3cb
[nrf noup] Constant size for psa_core_key_attributes_t struct
mswarowsky Sep 30, 2022
784de74
[nrf fromtree] Header updates
daverodgman Nov 3, 2023
5454754
[nrf fromtree] Fix some non-standard headers
daverodgman Nov 3, 2023
229789b
[nrf fromtree] Update documentation
daverodgman Nov 2, 2023
6d627b5
[nrf fromtree] Add Changelog for license
daverodgman Nov 2, 2023
0ad7499
[nrf fromtree] Update license for p256-m
daverodgman Nov 3, 2023
e27d559
[nrf fromtree] README improvements to 3rdparty section
daverodgman Nov 3, 2023
37f90c1
[nrf fromtree] assemble Changelog
daverodgman Nov 3, 2023
4f0acc9
[nrf fromtree] Fix 3rdparty target names for custom config
davidhorstmann-arm Oct 6, 2023
63fafdc
[nrf fromtree] Fix typos in changelog
daverodgman Nov 3, 2023
79abf8f
[nrf fromtree] Bump version
daverodgman Nov 3, 2023
7987246
[nrf fromtree] Update BRANCHES
daverodgman Nov 6, 2023
22737a1
[nrf fromtree] Update Changelog with bugfix entry
daverodgman Nov 7, 2023
7f6821f
[nrf fromtree] Add docs re Everest license
daverodgman Nov 8, 2023
1cc2c06
[nrf fromtree] Add tests for Issue #8687
jwinzig-at-hilscher Jan 9, 2024
72aaa38
[nrf fromtree] Fix Issue #8687
jwinzig-at-hilscher Jan 9, 2024
bb7c897
[nrf fromtree] Update fix to be more platform-independent
jwinzig-at-hilscher Jan 9, 2024
5766e46
[nrf fromtree] Add missing newline at the end of test_suite_x509write…
jwinzig-at-hilscher Jan 9, 2024
f7522b5
[nrf fromtree] Update test-data to use SIZE_MAX
jwinzig-at-hilscher Jan 9, 2024
21fe075
[nrf fromtree] Remove unneeded testcase
jwinzig-at-hilscher Jan 9, 2024
2acac90
[nrf fromtree] Add required dependency to the testcase
jwinzig-at-hilscher Jan 9, 2024
3b9790a
[nrf fromtree] Add Changelog for #8687
paul-elliott-arm Jan 16, 2024
5dc1873
[nrf fromtree] Make RSA unblinding constant flow
yanesca Nov 21, 2023
91e3e12
[nrf fromtree] Extend blinding to RSA result check
yanesca Nov 21, 2023
1f48d32
[nrf fromtree] Add Changelog for the Marvin attack fix
yanesca Nov 21, 2023
1277547
[nrf fromtree] Make local function static
yanesca Nov 21, 2023
5c48f0d
[nrf fromtree] Fix style
yanesca Nov 21, 2023
0743b86
[nrf fromtree] RSA: document Montgomery trick in unblind
yanesca Dec 27, 2023
4ce0182
[nrf fromtree] RSA: remove unneeded temporaries
yanesca Dec 27, 2023
8a3e748
[nrf fromtree] RSA: improve readability
yanesca Dec 27, 2023
7ddd0a3
[nrf fromtree] Fix typo
yanesca Dec 27, 2023
cc5e0b5
[nrf fromtree] Add warning for PKCS 1.5 decryption
yanesca Dec 29, 2023
1d0b027
[nrf fromtree] Update Marvin fix Changelog entry
yanesca Jan 11, 2024
34d9c01
[nrf fromtree] Assemble Changelog
daverodgman Jan 22, 2024
447df7e
[nrf fromtree] Bump version
daverodgman Jan 22, 2024
1df682a
[nrf fromtree] Update BRANCHES.md
daverodgman Jan 24, 2024
46194ab
[nrf fromtree] Bug Fix: mbedtls_ecdsa_verify_restartable fails with E…
JonathanWitthoeft Apr 26, 2023
e9437e6
[nrf noup] Use psa_crypto_core.h from Oberon PSA
Vge0rge Jan 31, 2024
b1eb50a
[nrf noup] Add the driver wrappers from Oberon
Vge0rge Feb 1, 2024
e0bec90
[nrf noup] Replace MBEDTLS_ACCEL->PSA_WANT in md.h
Vge0rge Feb 7, 2024
1e7c847
[nrf noup] Make the md contexts fixed size
Vge0rge Feb 7, 2024
19c482f
fixup! [nrf noup] Make the md contexts fixed size
Vge0rge Feb 9, 2024
7cfbbb4
Revert "[nrf noup] Add the driver wrappers from Oberon"
Vge0rge Feb 12, 2024
c8d07f2
Move headers
Vge0rge Feb 12, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
14 changes: 1 addition & 13 deletions .uncrustify.cfg
Original file line number Diff line number Diff line change
Expand Up @@ -4,19 +4,7 @@
# to Mbed TLS.
#
# Copyright The Mbed TLS Contributors
# SPDX-License-Identifier: Apache-2.0
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later


# Wrap lines at 100 characters
Expand Down
4 changes: 2 additions & 2 deletions 3rdparty/everest/CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -18,11 +18,11 @@ target_include_directories(${everest_target}
# everest is not directly linked against any mbedtls targets
# so does not inherit the compile definitions.
if(MBEDTLS_CONFIG_FILE)
target_compile_definitions(everest
target_compile_definitions(${everest_target}
PUBLIC MBEDTLS_CONFIG_FILE="${MBEDTLS_CONFIG_FILE}")
endif()
if(MBEDTLS_USER_CONFIG_FILE)
target_compile_definitions(everest
target_compile_definitions(${everest_target}
PUBLIC MBEDTLS_USER_CONFIG_FILE="${MBEDTLS_USER_CONFIG_FILE}")
endif()

Expand Down
4 changes: 2 additions & 2 deletions 3rdparty/p256-m/CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -16,11 +16,11 @@ target_include_directories(${p256m_target}
# p256m is not directly linked against any mbedtls targets
# so does not inherit the compile definitions.
if(MBEDTLS_CONFIG_FILE)
target_compile_definitions(p256m
target_compile_definitions(${p256m_target}
PUBLIC MBEDTLS_CONFIG_FILE="${MBEDTLS_CONFIG_FILE}")
endif()
if(MBEDTLS_USER_CONFIG_FILE)
target_compile_definitions(p256m
target_compile_definitions(${p256m_target}
PUBLIC MBEDTLS_USER_CONFIG_FILE="${MBEDTLS_USER_CONFIG_FILE}")
endif()

Expand Down
4 changes: 2 additions & 2 deletions 3rdparty/p256-m/README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
The files within the `p256-m/` subdirectory originate from the [p256-m GitHub repository](https://github.com/mpg/p256-m), which is distributed under the Apache 2.0 license. They are authored by Manuel Pégourié-Gonnard. p256-m is a minimalistic implementation of ECDH and ECDSA on NIST P-256, especially suited to constrained 32-bit environments. Mbed TLS documentation for integrating drivers uses p256-m as an example of a software accelerator, and describes how it can be integrated alongside Mbed TLS. It should be noted that p256-m files in the Mbed TLS repo will not be updated regularly, so they may not have fixes and improvements present in the upstream project.
The files within the `p256-m/` subdirectory originate from the [p256-m GitHub repository](https://github.com/mpg/p256-m). They are distributed here under a dual Apache-2.0 OR GPL-2.0-or-later license. They are authored by Manuel Pégourié-Gonnard. p256-m is a minimalistic implementation of ECDH and ECDSA on NIST P-256, especially suited to constrained 32-bit environments. Mbed TLS documentation for integrating drivers uses p256-m as an example of a software accelerator, and describes how it can be integrated alongside Mbed TLS. It should be noted that p256-m files in the Mbed TLS repo will not be updated regularly, so they may not have fixes and improvements present in the upstream project.

The files `p256-m.c` and `.h`, along with the license, have been taken from the `p256-m` repository.
The files `p256-m.c`, `p256-m.h` and `README.md` have been taken from the `p256-m` repository.
It should be noted that p256-m deliberately does not supply its own cryptographically secure RNG function. As a result, the PSA RNG is used, with `p256_generate_random()` wrapping `psa_generate_random()`.
202 changes: 0 additions & 202 deletions 3rdparty/p256-m/p256-m/LICENSE

This file was deleted.

2 changes: 1 addition & 1 deletion 3rdparty/p256-m/p256-m/p256-m.c
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
*
* Copyright The Mbed TLS Contributors
* Author: Manuel Pégourié-Gonnard.
* SPDX-License-Identifier: Apache-2.0
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
*/

#include "p256-m.h"
Expand Down
2 changes: 1 addition & 1 deletion 3rdparty/p256-m/p256-m/p256-m.h
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
*
* Copyright The Mbed TLS Contributors
* Author: Manuel Pégourié-Gonnard.
* SPDX-License-Identifier: Apache-2.0
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
*/
#ifndef P256_M_H
#define P256_M_H
Expand Down
14 changes: 1 addition & 13 deletions 3rdparty/p256-m/p256-m_driver_entrypoints.c
Original file line number Diff line number Diff line change
Expand Up @@ -3,19 +3,7 @@
*/
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
*/

#include "mbedtls/platform.h"
Expand Down
14 changes: 1 addition & 13 deletions 3rdparty/p256-m/p256-m_driver_entrypoints.h
Original file line number Diff line number Diff line change
Expand Up @@ -3,19 +3,7 @@
*/
/*
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
*/

#ifndef P256M_DRIVER_ENTRYPOINTS_H
Expand Down
2 changes: 1 addition & 1 deletion BRANCHES.md
Original file line number Diff line number Diff line change
Expand Up @@ -106,6 +106,6 @@ The following branches are currently maintained:
- [`development`](https://github.com/Mbed-TLS/mbedtls/)
- [`mbedtls-2.28`](https://github.com/Mbed-TLS/mbedtls/tree/mbedtls-2.28)
maintained until at least the end of 2024, see
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.5>.
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.7>.

Users are urged to always use the latest version of a maintained branch.
2 changes: 1 addition & 1 deletion CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -377,7 +377,7 @@ if(NOT DISABLE_PACKAGE_CONFIG_AND_INSTALL)
write_basic_package_version_file(
"cmake/MbedTLSConfigVersion.cmake"
COMPATIBILITY SameMajorVersion
VERSION 3.5.0)
VERSION 3.5.2)

install(
FILES "${CMAKE_CURRENT_BINARY_DIR}/cmake/MbedTLSConfig.cmake"
Expand Down
4 changes: 2 additions & 2 deletions CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,11 +84,11 @@ Mbed TLS is well documented, but if you think documentation is needed, speak out
License and Copyright
---------------------

Unless specifically indicated otherwise in a file, Mbed TLS files are provided under the [Apache-2.0](https://spdx.org/licenses/Apache-2.0.html) license. See the [LICENSE](LICENSE) file for the full text of this license.
Unless specifically indicated otherwise in a file, Mbed TLS files are provided under a dual [Apache-2.0](https://spdx.org/licenses/Apache-2.0.html) OR [GPL-2.0-or-later](https://spdx.org/licenses/GPL-2.0-or-later.html) license. See the [LICENSE](LICENSE) file for the full text of these licenses. This means that users may choose which of these licenses they take the code under.

Contributors must accept that their contributions are made under both the Apache-2.0 AND [GPL-2.0-or-later](https://spdx.org/licenses/GPL-2.0-or-later.html) licenses. This enables LTS (Long Term Support) branches of the software to be provided under either the Apache-2.0 or GPL-2.0-or-later licenses.

All new files should include the [Apache-2.0](https://spdx.org/licenses/Apache-2.0.html) standard license header where possible.
All new files should include the standard SPDX license identifier where possible, i.e. "SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later".

The copyright on contributions is retained by the original authors of the code. Where possible for new files, this should be noted in a comment at the top of the file in the form: "Copyright The Mbed TLS Contributors".

Expand Down
Loading