Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[nrf noup] Add dependency checks for PRNG #14

Open
wants to merge 29 commits into
base: main
Choose a base branch
from
Open
Changes from 1 commit
Commits
Show all changes
29 commits
Select commit Hold shift + click to select a range
e35b082
[nrf noup] Check if ECP_MAX_BITS is set in ecp.h
Vge0rge Nov 28, 2023
632a466
[nrf noup] Remove redefinition ECC_MAX_CURVE_BITS
Vge0rge Nov 28, 2023
04610fe
[nrf noup] Remove build warnings
Vge0rge Jan 24, 2024
d021005
[nrf noup] Add missing brainpool key sizes
Vge0rge Feb 5, 2024
4b19e01
[nrf noup] Remove oberon_config.h inclusion
Vge0rge Feb 6, 2024
dcfee9f
[nrf toup] Change key_id for derivation_verify_key
Vge0rge Feb 6, 2024
88eedc3
[nrf noup] Make Oberon PSA hash operation static
Vge0rge Feb 9, 2024
6558c62
[nrf toup] Minor whitespace fixes
Vge0rge Feb 14, 2024
cd08531
[nrf toup] Allow PAKE to use 0 user/peer_id_len
Vge0rge Feb 16, 2024
6259e47
[nrf noup] Add a client view of the multipart contexts
vlilleboe Feb 27, 2024
de20342
[nrf noup] Bring in special Nordic release 1.2.1.1 as a commit
frkv Feb 20, 2024
075f984
[nrf toup] Fix building issue with key_id
Vge0rge Feb 22, 2024
d72e62b
[nrf noup] Turn the repo into a Zephyr module
SebastianBoe Mar 8, 2024
c39cf8b
[nrf noup] ext: oberon: Remove duplicate mbedtls header files
SebastianBoe Mar 12, 2024
5028cb6
[nrf noup] Add code to build_info.h to make it match mbedtls
SebastianBoe Mar 12, 2024
c6f564e
[nrf toup] Support builtin keys with CMAC KDF
vlilleboe Apr 8, 2024
7f14cea
[nrf noup] Add support for legacy and PSA
Vge0rge Apr 12, 2024
9cc43fa
[nrf noup] Fix client view for PAKE operations
vlilleboe Apr 19, 2024
6382c82
[nrf fromlist] keys: Add plausibility checks for ECC keys
mswarowsky Mar 19, 2024
da48bd8
[nrf fromlist]library: psa_crypto_storage.c error
Vge0rge Apr 17, 2024
51af9c4
testspec: Add test spec to run crypto and TF-M tests
stephen-nordic Mar 8, 2024
27b3960
[nrf noup] Temporarily adding a missing PSA to legacy helper function
frkv Apr 24, 2024
1fbc5fc
[nrf noup] Adding PSA crypto client support for PSA util APIs.
frkv Apr 24, 2024
d83d1e7
[nrf noup] Adjust range for builtin keys
vlilleboe Apr 19, 2024
e0800ec
[nrf noup] Allow import and destroy of builtin keys
vlilleboe Apr 3, 2024
f640341
[nrf noup] Add nRF54L15 support for legacy and PSA
Vge0rge Jul 15, 2024
11ddaea
[nrf toup] Add missing defined oberon_key_derivation.c
Vge0rge Jul 17, 2024
61ce2ee
[nrf noup] Don't ignore error code
vlilleboe Jun 14, 2024
f7dd975
[nrf noup] Add dependency checks for PRNG
juhaylinen Aug 20, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
[nrf toup] Allow PAKE to use 0 user/peer_id_len
In Matter they use user/peer with id_len set to 0 and this made the
Oberon PSA core to fail because our mbedtls_calloc returns a NULL
pointer.

tracked:
oberon-microsystems/oberon-psa-crypto-nrf#10

Signed-off-by: Georgios Vasilakis <georgios.vasilakis@nordicsemi.no>
Vge0rge authored and SebastianBoe committed Mar 8, 2024
commit cd08531f7914be3108f349a949c89d6bad5eb206
5 changes: 5 additions & 0 deletions library/psa_crypto.c
Original file line number Diff line number Diff line change
@@ -4433,12 +4433,14 @@ psa_status_t psa_pake_set_user(psa_pake_operation_t *operation,
}
#endif

if(user_id_len != 0) {
operation->inputs.user = mbedtls_calloc(1, user_id_len);
if (operation->inputs.user == NULL) {
status = PSA_ERROR_INSUFFICIENT_MEMORY;
goto exit;
}
memcpy(operation->inputs.user, user_id, user_id_len);
}
operation->inputs.user_len = user_id_len;
operation->user_set = 1;
return PSA_SUCCESS;
@@ -4483,12 +4485,15 @@ psa_status_t psa_pake_set_peer(psa_pake_operation_t *operation,
}
#endif

if(peer_id_len != 0) {
operation->inputs.peer = mbedtls_calloc(1, peer_id_len);
if (operation->inputs.peer == NULL) {
status = PSA_ERROR_INSUFFICIENT_MEMORY;
goto exit;
}
memcpy(operation->inputs.peer, peer_id, peer_id_len);
}

operation->inputs.peer_len = peer_id_len;
operation->peer_set = 1;
return PSA_SUCCESS;