Skip to content

Commit fb36f3f

Browse files
authored
Merge pull request #60 from tomi-font/bump_to_3.6.1
update to 3.6.1
2 parents 2f24831 + b9b26b7 commit fb36f3f

File tree

1,027 files changed

+18150
-36657
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,027 files changed

+18150
-36657
lines changed

.github/pull_request_template.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ Please write a few sentences describing the overall goals of the pull request's
99
Please tick as appropriate and edit the reasons (e.g.: "backport: not needed because this is a new feature")
1010

1111
- [ ] **changelog** provided, or not required
12-
- [ ] **backport** done, or not required
12+
- [ ] **3.6 backport** done, or not required
13+
- [ ] **2.28 backport** done, or not required
1314
- [ ] **tests** provided, or not required
1415

1516

.gitignore

+6
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,9 @@
22
seedfile
33
# MBEDTLS_PSA_INJECT_ENTROPY seed file created by the test framework
44
00000000ffffff52.psa_its
5+
# Log files created by all.sh to reduce the logs in case a component runs
6+
# successfully
7+
quiet-make.*
58

69
# CMake build artifacts:
710
CMakeCache.txt
@@ -67,3 +70,6 @@ massif-*
6770
compile_commands.json
6871
# clangd index files
6972
/.cache/clangd/index/
73+
74+
# VScode folder to store local debug files and configurations
75+
.vscode

3rdparty/p256-m/.gitignore

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Makefile

BRANCHES.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -107,9 +107,9 @@ The following branches are currently maintained:
107107
- [`development`](https://github.com/Mbed-TLS/mbedtls/)
108108
- [`mbedtls-3.6`](https://github.com/Mbed-TLS/mbedtls/tree/mbedtls-3.6)
109109
maintained until March 2027, see
110-
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0>.
110+
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.1>.
111111
- [`mbedtls-2.28`](https://github.com/Mbed-TLS/mbedtls/tree/mbedtls-2.28)
112112
maintained until the end of 2024, see
113-
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.8>.
113+
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.9>.
114114

115115
Users are urged to always use the latest version of a maintained branch.

CMakeLists.txt

+59-11
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,10 @@ cmake_minimum_required(VERSION 3.5.1)
2222

2323
include(CMakePackageConfigHelpers)
2424

25+
# Include convenience functions for printing properties and variables, like
26+
# cmake_print_properties(), cmake_print_variables().
27+
include(CMakePrintHelpers)
28+
2529
# https://cmake.org/cmake/help/latest/policy/CMP0011.html
2630
# Setting this policy is required in CMake >= 3.18.0, otherwise a warning is generated. The OLD
2731
# policy setting is deprecated, and will be removed in future versions.
@@ -36,12 +40,12 @@ cmake_policy(SET CMP0012 NEW)
3640
if(TEST_CPP)
3741
project("Mbed TLS"
3842
LANGUAGES C CXX
39-
VERSION 3.6.0
43+
VERSION 3.6.1
4044
)
4145
else()
4246
project("Mbed TLS"
4347
LANGUAGES C
44-
VERSION 3.6.0
48+
VERSION 3.6.1
4549
)
4650
endif()
4751

@@ -73,10 +77,16 @@ endif()
7377

7478
option(DISABLE_PACKAGE_CONFIG_AND_INSTALL "Disable package configuration, target export and installation" ${MBEDTLS_AS_SUBPROJECT})
7579

76-
string(REGEX MATCH "Clang" CMAKE_COMPILER_IS_CLANG "${CMAKE_C_COMPILER_ID}")
77-
string(REGEX MATCH "GNU" CMAKE_COMPILER_IS_GNU "${CMAKE_C_COMPILER_ID}")
78-
string(REGEX MATCH "IAR" CMAKE_COMPILER_IS_IAR "${CMAKE_C_COMPILER_ID}")
79-
string(REGEX MATCH "MSVC" CMAKE_COMPILER_IS_MSVC "${CMAKE_C_COMPILER_ID}")
80+
if (CMAKE_C_SIMULATE_ID)
81+
set(COMPILER_ID ${CMAKE_C_SIMULATE_ID})
82+
else()
83+
set(COMPILER_ID ${CMAKE_C_COMPILER_ID})
84+
endif(CMAKE_C_SIMULATE_ID)
85+
86+
string(REGEX MATCH "Clang" CMAKE_COMPILER_IS_CLANG "${COMPILER_ID}")
87+
string(REGEX MATCH "GNU" CMAKE_COMPILER_IS_GNU "${COMPILER_ID}")
88+
string(REGEX MATCH "IAR" CMAKE_COMPILER_IS_IAR "${COMPILER_ID}")
89+
string(REGEX MATCH "MSVC" CMAKE_COMPILER_IS_MSVC "${COMPILER_ID}")
8090

8191
# the test suites currently have compile errors with MSVC
8292
if(CMAKE_COMPILER_IS_MSVC)
@@ -184,8 +194,6 @@ function(get_name_without_last_ext dest_var full_name)
184194
set(${dest_var} ${no_ext_name} PARENT_SCOPE)
185195
endfunction(get_name_without_last_ext)
186196

187-
string(REGEX MATCH "Clang" CMAKE_COMPILER_IS_CLANG "${CMAKE_C_COMPILER_ID}")
188-
189197
include(CheckCCompilerFlag)
190198

191199
set(CMAKE_C_EXTENSIONS OFF)
@@ -196,7 +204,7 @@ if(CMAKE_COMPILER_IS_GNU)
196204
# note: starting with CMake 2.8 we could use CMAKE_C_COMPILER_VERSION
197205
execute_process(COMMAND ${CMAKE_C_COMPILER} -dumpversion
198206
OUTPUT_VARIABLE GCC_VERSION)
199-
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings")
207+
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings -Wmissing-prototypes")
200208
if (GCC_VERSION VERSION_GREATER 3.0 OR GCC_VERSION VERSION_EQUAL 3.0)
201209
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wformat=2 -Wno-format-nonliteral")
202210
endif()
@@ -230,7 +238,7 @@ if(CMAKE_COMPILER_IS_GNU)
230238
endif(CMAKE_COMPILER_IS_GNU)
231239

232240
if(CMAKE_COMPILER_IS_CLANG)
233-
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings -Wpointer-arith -Wimplicit-fallthrough -Wshadow -Wvla -Wformat=2 -Wno-format-nonliteral")
241+
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings -Wmissing-prototypes -Wpointer-arith -Wimplicit-fallthrough -Wshadow -Wvla -Wformat=2 -Wno-format-nonliteral")
234242
set(CMAKE_C_FLAGS_RELEASE "-O2")
235243
set(CMAKE_C_FLAGS_DEBUG "-O0 -g3")
236244
set(CMAKE_C_FLAGS_COVERAGE "-O0 -g3 --coverage")
@@ -273,6 +281,15 @@ if(MBEDTLS_FATAL_WARNINGS)
273281
endif(CMAKE_COMPILER_IS_IAR)
274282
endif(MBEDTLS_FATAL_WARNINGS)
275283

284+
if(CMAKE_BUILD_TYPE STREQUAL "Check" AND TEST_CPP)
285+
set(CMAKE_CXX_STANDARD 11)
286+
set(CMAKE_CXX_STANDARD_REQUIRED ON)
287+
set(CMAKE_CXX_EXTENSIONS OFF)
288+
if(CMAKE_COMPILER_IS_CLANG OR CMAKE_COMPILER_IS_GNU)
289+
set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -pedantic")
290+
endif()
291+
endif()
292+
276293
if(CMAKE_BUILD_TYPE STREQUAL "Coverage")
277294
if(CMAKE_COMPILER_IS_GNU OR CMAKE_COMPILER_IS_CLANG)
278295
set(CMAKE_SHARED_LINKER_FLAGS "--coverage")
@@ -310,6 +327,37 @@ if(ENABLE_TESTING OR ENABLE_PROGRAMS)
310327
${CMAKE_CURRENT_SOURCE_DIR}/tests/src/*.c
311328
${CMAKE_CURRENT_SOURCE_DIR}/tests/src/drivers/*.c)
312329
add_library(mbedtls_test OBJECT ${MBEDTLS_TEST_FILES})
330+
if(GEN_FILES)
331+
add_custom_command(
332+
OUTPUT
333+
${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_keys.h
334+
WORKING_DIRECTORY
335+
${CMAKE_CURRENT_SOURCE_DIR}/tests
336+
COMMAND
337+
"${MBEDTLS_PYTHON_EXECUTABLE}"
338+
"${CMAKE_CURRENT_SOURCE_DIR}/framework/scripts/generate_test_keys.py"
339+
"--output"
340+
"${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_keys.h"
341+
DEPENDS
342+
${CMAKE_CURRENT_SOURCE_DIR}/framework/scripts/generate_test_keys.py
343+
)
344+
add_custom_target(test_keys_header DEPENDS ${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_keys.h)
345+
add_custom_command(
346+
OUTPUT
347+
${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_certs.h
348+
WORKING_DIRECTORY
349+
${CMAKE_CURRENT_SOURCE_DIR}/tests
350+
COMMAND
351+
"${MBEDTLS_PYTHON_EXECUTABLE}"
352+
"${CMAKE_CURRENT_SOURCE_DIR}/framework/scripts/generate_test_cert_macros.py"
353+
"--output"
354+
"${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_certs.h"
355+
DEPENDS
356+
${CMAKE_CURRENT_SOURCE_DIR}/framework/scripts/generate_test_cert_macros.py
357+
)
358+
add_custom_target(test_certs_header DEPENDS ${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_certs.h)
359+
add_dependencies(mbedtls_test test_keys_header test_certs_header)
360+
endif()
313361
target_include_directories(mbedtls_test
314362
PRIVATE ${CMAKE_CURRENT_SOURCE_DIR}/tests/include
315363
PRIVATE ${CMAKE_CURRENT_SOURCE_DIR}/include
@@ -396,7 +444,7 @@ if(NOT DISABLE_PACKAGE_CONFIG_AND_INSTALL)
396444
write_basic_package_version_file(
397445
"cmake/MbedTLSConfigVersion.cmake"
398446
COMPATIBILITY SameMajorVersion
399-
VERSION 3.6.0)
447+
VERSION 3.6.1)
400448

401449
install(
402450
FILES "${CMAKE_CURRENT_BINARY_DIR}/cmake/MbedTLSConfig.cmake"

ChangeLog

+184
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,188 @@
11
Mbed TLS ChangeLog (Sorted per branch, date)
22

3+
= Mbed TLS 3.6.1 branch released 2024-08-30
4+
5+
API changes
6+
* The experimental functions psa_generate_key_ext() and
7+
psa_key_derivation_output_key_ext() are no longer declared when compiling
8+
in C++. This resolves a build failure under C++ compilers that do not
9+
support flexible array members (a C99 feature not adopted by C++).
10+
Fixes #9020.
11+
12+
Default behavior changes
13+
* In a PSA-client-only build (i.e. MBEDTLS_PSA_CRYPTO_CLIENT &&
14+
!MBEDTLS_PSA_CRYPTO_C), do not automatically enable local crypto when the
15+
corresponding PSA mechanism is enabled, since the server provides the
16+
crypto. Fixes #9126.
17+
* A TLS handshake may now call psa_crypto_init() if TLS 1.3 is enabled.
18+
This can happen even if TLS 1.3 is offered but eventually not selected
19+
in the protocol version negotiation.
20+
* By default, the handling of TLS 1.3 tickets by the Mbed TLS client is now
21+
disabled at runtime. Applications that were using TLS 1.3 tickets
22+
signalled by MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET return values now
23+
need to enable the handling of TLS 1.3 tickets through the new
24+
mbedtls_ssl_conf_tls13_enable_signal_new_session_tickets() API.
25+
26+
New deprecations
27+
* The experimental functions psa_generate_key_ext() and
28+
psa_key_derivation_output_key_ext() are deprecated in favor of
29+
psa_generate_key_custom() and psa_key_derivation_output_key_custom().
30+
They have almost exactly the same interface, but the variable-length
31+
data is passed in a separate parameter instead of a flexible array
32+
member.
33+
* The following cryptographic mechanisms are planned to be removed
34+
in Mbed TLS 4.0:
35+
- DES (including 3DES).
36+
- PKCS#1v1.5 encryption/decryption (RSAES-PKCS1-v1_5).
37+
(OAEP, PSS, and PKCS#1v1.5 signature are staying.)
38+
- Finite-field Diffie-Hellman with custom groups.
39+
(RFC 7919 groups remain supported.)
40+
- Elliptic curves of size 225 bits or less.
41+
* The following cipher suites are planned to be removed from (D)TLS 1.2
42+
in Mbed TLS 4.0:
43+
- TLS_RSA_* (including TLS_RSA_PSK_*), i.e. cipher suites using
44+
RSA decryption.
45+
(RSA signatures, i.e. TLS_ECDHE_RSA_*, are staying.)
46+
- TLS_ECDH_*, i.e. cipher suites using static ECDH.
47+
(Ephemeral ECDH, i.e. TLS_ECDHE_*, is staying.)
48+
- TLS_DHE_*, i.e. cipher suites using finite-field Diffie-Hellman.
49+
(Ephemeral ECDH, i.e. TLS_ECDHE_*, is staying.)
50+
- TLS_*CBC*, i.e. all cipher suites using CBC.
51+
* The following low-level application interfaces are planned to be removed
52+
from the public API in Mbed TLS 4.0:
53+
- Hashes: hkdf.h, md5.h, ripemd160.h, sha1.h, sha3.h, sha256.h, sha512.h;
54+
- Random generation: ctr_drbg.h, hmac_drbg.h, entropy.h;
55+
- Ciphers and modes: aes.h, aria.h, camellia.h, chacha20.h, chachapoly.h,
56+
cipher.h, cmac.h, gcm.h, poly1305.h;
57+
- Private key encryption mechanisms: pkcs5.h, pkcs12.h.
58+
- Asymmetric cryptography: bignum.h, dhm.h, ecdh.h, ecdsa.h, ecjpake.h,
59+
ecp.h, rsa.h.
60+
The cryptographic mechanisms remain present, but they will only be
61+
accessible via the PSA API (psa_xxx functions introduced gradually
62+
starting with Mbed TLS 2.17) and, where relevant, `pk.h`.
63+
For guidance on migrating application code to the PSA API, please consult
64+
the PSA transition guide (docs/psa-transition.md).
65+
* The following integration interfaces are planned to be removed
66+
in Mbed TLS 4.0:
67+
- MBEDTLS_xxx_ALT replacement of cryptographic modules and functions.
68+
Use PSA transparent drivers instead.
69+
- MBEDTLS_PK_RSA_ALT and MBEDTLS_PSA_CRYPTO_SE_C.
70+
Use PSA opaque drivers instead.
71+
72+
Features
73+
* When the new compilation option MBEDTLS_PSA_KEY_STORE_DYNAMIC is enabled,
74+
the number of volatile PSA keys is virtually unlimited, at the expense
75+
of increased code size. This option is off by default, but enabled in
76+
the default mbedtls_config.h. Fixes #9216.
77+
78+
Security
79+
* Unlike previously documented, enabling MBEDTLS_PSA_HMAC_DRBG_MD_TYPE does
80+
not cause the PSA subsystem to use HMAC_DRBG: it uses HMAC_DRBG only when
81+
MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG and MBEDTLS_CTR_DRBG_C are disabled.
82+
CVE-2024-45157
83+
* Fix a stack buffer overflow in mbedtls_ecdsa_der_to_raw() and
84+
mbedtls_ecdsa_raw_to_der() when the bits parameter is larger than the
85+
largest supported curve. In some configurations with PSA disabled,
86+
all values of bits are affected. This never happens in internal library
87+
calls, but can affect applications that call these functions directly.
88+
CVE-2024-45158
89+
* With TLS 1.3, when a server enables optional authentication of the
90+
client, if the client-provided certificate does not have appropriate values
91+
in keyUsage or extKeyUsage extensions, then the return value of
92+
mbedtls_ssl_get_verify_result() would incorrectly have the
93+
MBEDTLS_X509_BADCERT_KEY_USAGE and MBEDTLS_X509_BADCERT_EXT_KEY_USAGE bits
94+
clear. As a result, an attacker that had a certificate valid for uses other
95+
than TLS client authentication could be able to use it for TLS client
96+
authentication anyway. Only TLS 1.3 servers were affected, and only with
97+
optional authentication (required would abort the handshake with a fatal
98+
alert).
99+
CVE-2024-45159
100+
101+
Bugfix
102+
* Fix TLS 1.3 client build and runtime when support for session tickets is
103+
disabled (MBEDTLS_SSL_SESSION_TICKETS configuration option). Fixes #6395.
104+
* Fix compilation error when memcpy() is a function-like macros. Fixes #8994.
105+
* MBEDTLS_ASN1_PARSE_C and MBEDTLS_ASN1_WRITE_C are now automatically enabled
106+
as soon as MBEDTLS_RSA_C is enabled. Fixes #9041.
107+
* Fix undefined behaviour (incrementing a NULL pointer by zero length) when
108+
passing in zero length additional data to multipart AEAD.
109+
* Fix rare concurrent access bug where attempting to operate on a
110+
non-existent key while concurrently creating a new key could potentially
111+
corrupt the key store.
112+
* Fix error handling when creating a key in a dynamic secure element
113+
(feature enabled by MBEDTLS_PSA_CRYPTO_SE_C). In a low memory condition,
114+
the creation could return PSA_SUCCESS but using or destroying the key
115+
would not work. Fixes #8537.
116+
* Fix issue of redefinition warning messages for _GNU_SOURCE in
117+
entropy_poll.c and sha_256.c. There was a build warning during
118+
building for linux platform.
119+
Resolves #9026
120+
* Fix a compilation warning in pk.c when PSA is enabled and RSA is disabled.
121+
* Fix the build when MBEDTLS_PSA_CRYPTO_CONFIG is enabled and the built-in
122+
CMAC is enabled, but no built-in unauthenticated cipher is enabled.
123+
Fixes #9209.
124+
* Fix redefinition warnings when SECP192R1 and/or SECP192K1 are disabled.
125+
Fixes #9029.
126+
* Fix psa_cipher_decrypt() with CCM* rejecting messages less than 3 bytes
127+
long. Credit to Cryptofuzz. Fixes #9314.
128+
* Fix interference between PSA volatile keys and built-in keys
129+
when MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS is enabled and
130+
MBEDTLS_PSA_KEY_SLOT_COUNT is more than 4096.
131+
* Document and enforce the limitation of mbedtls_psa_register_se_key()
132+
to persistent keys. Resolves #9253.
133+
* Fix Clang compilation error when MBEDTLS_USE_PSA_CRYPTO is enabled
134+
but MBEDTLS_DHM_C is disabled. Reported by Michael Schuster in #9188.
135+
* Fix server mode only build when MBEDTLS_SSL_SRV_C is enabled but
136+
MBEDTLS_SSL_CLI_C is disabled. Reported by M-Bab on GitHub in #9186.
137+
* When MBEDTLS_PSA_CRYPTO_C was disabled and MBEDTLS_ECDSA_C enabled,
138+
some code was defining 0-size arrays, resulting in compilation errors.
139+
Fixed by disabling the offending code in configurations without PSA
140+
Crypto, where it never worked. Fixes #9311.
141+
* Fix unintended performance regression when using short RSA public keys.
142+
Fixes #9232.
143+
* Fixes an issue where some TLS 1.2 clients could not connect to an
144+
Mbed TLS 3.6.0 server, due to incorrect handling of
145+
legacy_compression_methods in the ClientHello.
146+
Fixes #8995, #9243.
147+
* Fix TLS connections failing when the handshake selects TLS 1.3
148+
in an application that does not call psa_crypto_init().
149+
Fixes #9072.
150+
* Fix TLS connection failure in applications using an Mbed TLS client in
151+
the default configuration connecting to a TLS 1.3 server sending tickets.
152+
See the documentation of
153+
mbedtls_ssl_conf_tls13_enable_signal_new_session_tickets() for more
154+
information.
155+
Fixes #8749.
156+
* Fix a memory leak that could occur when failing to process an RSA
157+
key through some PSA functions due to low memory conditions.
158+
* Fixed a regression introduced in 3.6.0 where the CA callback set with
159+
mbedtls_ssl_conf_ca_cb() would stop working when connections were
160+
upgraded to TLS 1.3. Fixed by adding support for the CA callback with TLS
161+
1.3.
162+
* Fixed a regression introduced in 3.6.0 where clients that relied on
163+
optional/none authentication mode, by calling mbedtls_ssl_conf_authmode()
164+
with MBEDTLS_SSL_VERIFY_OPTIONAL or MBEDTLS_SSL_VERIFY_NONE, would stop
165+
working when connections were upgraded to TLS 1.3. Fixed by adding
166+
support for optional/none with TLS 1.3 as well. Note that the TLS 1.3
167+
standard makes server authentication mandatory; users are advised not to
168+
use authmode none, and to carefully check the results when using optional
169+
mode.
170+
* Fixed a regression introduced in 3.6.0 where context-specific certificate
171+
verify callbacks, set with mbedtls_ssl_set_verify() as opposed to
172+
mbedtls_ssl_conf_verify(), would stop working when connections were
173+
upgraded to TLS 1.3. Fixed by adding support for context-specific verify
174+
callback in TLS 1.3.
175+
176+
Changes
177+
* Warn if mbedtls/check_config.h is included manually, as this can
178+
lead to spurious errors. Error if a *adjust*.h header is included
179+
manually, as this can lead to silently inconsistent configurations,
180+
potentially resulting in buffer overflows.
181+
When migrating from Mbed TLS 2.x, if you had a custom config.h that
182+
included check_config.h, remove this inclusion from the Mbed TLS 3.x
183+
configuration file (renamed to mbedtls_config.h). This change was made
184+
in Mbed TLS 3.0, but was not announced in a changelog entry at the time.
185+
3186
= Mbed TLS 3.6.0 branch released 2024-03-28
4187

5188
API changes
@@ -144,6 +327,7 @@ Security
144327
* Fix a stack buffer overread (less than 256 bytes) when parsing a TLS 1.3
145328
ClientHello in a TLS 1.3 server supporting some PSK key exchange mode. A
146329
malicious client could cause information disclosure or a denial of service.
330+
Fixes CVE-2024-30166.
147331
* Passing buffers that are stored in untrusted memory as arguments
148332
to PSA functions is now secure by default.
149333
The PSA core now protects against modification of inputs or exposure

configs/config-symmetric-only.h

+1-3
Original file line numberDiff line numberDiff line change
@@ -65,13 +65,11 @@
6565
#define MBEDTLS_PSA_ITS_FILE_C
6666
#define MBEDTLS_RIPEMD160_C
6767
#define MBEDTLS_SHA1_C
68-
/* The library does not currently support enabling SHA-224 without SHA-256.
69-
* A future version of the library will have this option disabled
70-
* by default. */
7168
#define MBEDTLS_SHA224_C
7269
#define MBEDTLS_SHA256_C
7370
#define MBEDTLS_SHA384_C
7471
#define MBEDTLS_SHA512_C
72+
#define MBEDTLS_SHA3_C
7573
//#define MBEDTLS_THREADING_C
7674
#define MBEDTLS_TIMING_C
7775
#define MBEDTLS_VERSION_C

0 commit comments

Comments
 (0)