Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update to 3.6.1 #60

Merged
merged 605 commits into from
Sep 4, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
605 commits
Select commit Hold shift + click to select a range
7d8abab
Update macro name about the static key store
gilles-peskine-arm Jul 30, 2024
ac6b610
Improve and fix explanation of next_free
gilles-peskine-arm Jul 30, 2024
dbd726b
Link to issue about freeing empty slices
gilles-peskine-arm Jul 30, 2024
7fb5007
Merge pull request #1259 from gilles-peskine-arm/ecdsa-conversion-ove…
mpg Jul 31, 2024
1a0107b
Discuss why we have so many variants
gilles-peskine-arm Jul 31, 2024
f13fdf8
Expand on performance
gilles-peskine-arm Jul 31, 2024
fd01bec
Miscellaneous clarifications
gilles-peskine-arm Jul 31, 2024
e55bc34
Merge pull request #1257 from gilles-peskine-arm/psa-drbg-no-hmac-doc…
gilles-peskine-arm Jul 31, 2024
ecb3936
Introduce project_name.txt
tom-daubney-arm Dec 5, 2023
2f55640
Add functions to detect project
tom-daubney-arm Jul 30, 2024
fef3cc3
Update framework
gabor-mezei-arm Jul 29, 2024
d289fa1
Merge pull request #9432 from gabor-mezei-arm/9158_bp36_update_framework
ronald-cron-arm Aug 1, 2024
7771119
Created placeholder component files.
minosgalanakis Jul 25, 2024
f1f086e
Applied consistent style.
minosgalanakis Jul 30, 2024
52992e5
Merge pull request #9395 from sezrab/mbedtls_test_ssl_message_queue_p…
bensze01 Aug 1, 2024
f7d1cb0
Separate all.sh from components.
minosgalanakis Jul 30, 2024
e431739
Extract basic-components into a separate file.
minosgalanakis Aug 1, 2024
2148e5c
Extract build-components into a separate file.
minosgalanakis Aug 1, 2024
3bd6c30
Extract compiler-components into a separate file.
minosgalanakis Aug 1, 2024
b298d1f
Extract compliance-components into a separate file.
minosgalanakis Aug 1, 2024
b49e884
Merge pull request #9309 from gilles-peskine-arm/psa-keystore-design-…
gilles-peskine-arm Aug 2, 2024
3ece57e
Extract configuration-crypto-components into a separate file.
minosgalanakis Aug 1, 2024
5b4386c
Extract configuration-platform components into a separate file.
minosgalanakis Aug 1, 2024
27968c1
Extract configuration-x509 components into a separate file.
minosgalanakis Aug 1, 2024
93a8c08
Extract configuration components into a separate file.
minosgalanakis Aug 1, 2024
f0cd95b
Extract platform components into a separate file.
minosgalanakis Aug 1, 2024
4a2a351
Extract sanitizer components into a separate file.
minosgalanakis Aug 1, 2024
85347d1
all.sh/components: Moved more components to configuration tls.
minosgalanakis Aug 1, 2024
4ca7b14
all.sh/components: Fixed a typo in configuration-tls.
minosgalanakis Aug 5, 2024
0c0c3e1
all.sh/components: Moved more components to configuration crypto.
minosgalanakis Aug 1, 2024
5f6d2e3
all.sh/components: Moved driver components to configuration crypto.
minosgalanakis Aug 1, 2024
bb42737
all.sh/components: Moved build_aes_via_padlock to platform component.
minosgalanakis Aug 1, 2024
bd6b98f
all.sh/components: Removed components.sh
minosgalanakis Aug 1, 2024
095cf69
Merge pull request #9444 from minosgalanakis/all-sh-separate-componen…
mpg Aug 6, 2024
c9184fe
Fix server mode only build of v3.6 with MBEDTLS_SSL_CLI_C unset (fixe…
misch7 May 27, 2024
5be4fd7
Fix build of v3.6 with unset MBEDTLS_DHM_C but MBEDTLS_USE_PSA_CRYPTO…
misch7 May 27, 2024
83222b8
Add -Wmissing-prototypes to component_build_no_ssl_srv and component_…
minosgalanakis Aug 6, 2024
b4d55bb
Add missing include in tests/src/asn1_helpers.c
misch7 May 29, 2024
3a4c431
Move print_buf into mbedtls_test_print_buf helper function in sample …
misch7 Jun 1, 2024
41a686b
Fix missing-prototype error in programs/fuzz by moving LLVMFuzzerTest…
misch7 Jun 1, 2024
6fa32fd
Fix missing-prototype errors in sample programs
misch7 Jun 1, 2024
82984bc
Adjust spacing in sample programs
misch7 Jun 11, 2024
8cc43f2
Fix unused-function error for ecjpake_operation_setup in test_suite_p…
misch7 Jun 3, 2024
b1e33fb
Fix missing-prototype errors in tests/suites
misch7 Jun 4, 2024
31b1cb8
Adjust spacing in tests/suites function sources
misch7 Jun 4, 2024
4d0d0ec
Move the -Wmissing-prototypes option from library/CMakeLists.txt to t…
misch7 Jun 4, 2024
6d6cae5
Fix tests build with MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS enabled
misch7 Jun 5, 2024
275b698
Use correct test case conditionals for helper functions in tests/suites
misch7 Jun 6, 2024
6a3573a
Fix Uncrustify errors in modified tests/suites to satisfy check_code_…
misch7 Jun 7, 2024
ab4951f
Add missing include in tests/src/psa_memory_poisoning_wrappers.c to f…
misch7 Jun 7, 2024
ff4d6ae
Use correct conditionals in programs/ssl (fix unused-function errors)
misch7 Jun 7, 2024
46a6e73
Fix format-pedantic error in programs/test/metatest.c
misch7 Jun 7, 2024
9bf1875
Revert commit 33af72df in order to not depend on test code
misch7 Jul 20, 2024
5830505
Fix missing-prototype error for the print_buf functions in sample pro…
misch7 Jul 20, 2024
f36d785
Implement psa_generate_key_custom
gilles-peskine-arm Jun 6, 2024
a8e39f2
Update PSA wrappers
gilles-peskine-arm Jun 7, 2024
603b5b8
Documentation: point to key_custom instead of key_ext
gilles-peskine-arm Jun 6, 2024
e65cca2
Document the key_ext functions as deprecated
gilles-peskine-arm Jun 6, 2024
14134e7
Remove some tests of psa_generate_key_ext
gilles-peskine-arm Jun 7, 2024
d865c42
Changelog entry for the move from key_ext to key_custom functions
gilles-peskine-arm Jun 6, 2024
f5db72b
Test cpp_dummy_build in pedantic mode
gilles-peskine-arm Jun 6, 2024
472c10f
key_custom: update analyze_outcomes.py
gilles-peskine-arm Jun 7, 2024
52504f8
Rename internal function psa_key_production_parameters_are_default
gilles-peskine-arm Jun 20, 2024
0d619b2
Documentation improvements
gilles-peskine-arm Jul 18, 2024
4a85ff3
Rename one more deprecated identifier
gilles-peskine-arm Jul 18, 2024
14b87f6
Match spacing in pointer types in documentation with the code style
gilles-peskine-arm Jul 29, 2024
5f0b64a
Move some proj detection code inside pre_check_environment
tom-daubney-arm Aug 6, 2024
7ee1a4e
Merge pull request #9235 from gilles-peskine-arm/psa_generate_key_cus…
gilles-peskine-arm Aug 6, 2024
a542420
Call in_mbedtls_repo
tom-daubney-arm Aug 6, 2024
4306a69
Merge pull request #9437 from tom-daubney-arm/bp_3-6_standardise_proj…
tom-cosgrove-arm Aug 7, 2024
5eca402
Fix inverted assertion message
gilles-peskine-arm Aug 7, 2024
a9083b7
PSA_DONE: account for MBEDTLS_TEST_PSA_INTERNAL_KEYS
gilles-peskine-arm Aug 7, 2024
1b240c7
Announce the main removals planned for 4.0
gilles-peskine-arm Aug 7, 2024
aada0c8
Mention the PSA transition guide
gilles-peskine-arm Aug 7, 2024
e217673
Merge remote-tracking branch 'public/mbedtls-3.6' into merge-3.6
mpg Aug 8, 2024
1e6ed52
Merge pull request #1261 from mpg/merge-3.6
mpg Aug 8, 2024
ee1715c
Test cert alert KEY_USAGE -> UNSUPPORTED_CERT
mpg Aug 5, 2024
36d1b4a
Rationalize ssl-opt tests for keyUsage
mpg Aug 6, 2024
ef41d8c
Fix 1.3 failure to update flags for (ext)KeyUsage
mpg Aug 8, 2024
013d079
Always print detailed cert errors in test programs
mpg Aug 8, 2024
52c0f5a
Rationalize keyUsage testing, round 2
mpg Aug 8, 2024
5e64de0
Fix missing bits in crypto mechanisms
gilles-peskine-arm Aug 8, 2024
086bc91
Improve mechanism grouping
gilles-peskine-arm Aug 8, 2024
6df289a
More relevant characterisation of PSA being from before 3.0
gilles-peskine-arm Aug 8, 2024
a11687e
Revised presentation of cipher suites
gilles-peskine-arm Aug 8, 2024
aaa9672
Improve documentation in some tests
gilles-peskine-arm Aug 7, 2024
3b41e1d
Merge pull request #9403 from gilles-peskine-arm/psa-keystore-dynamic…
gilles-peskine-arm Aug 9, 2024
2bfd749
Dynamic key store: new compilation option
gilles-peskine-arm May 31, 2024
5064af6
Dynamic key store: preparatory refactoring
gilles-peskine-arm Jun 7, 2024
b5891cc
Dynamic key store: disable full-key-store tests
gilles-peskine-arm Jul 16, 2024
47ad2f7
psa_key_slot_t: different fields in free vs occupied slots
gilles-peskine-arm Jun 10, 2024
e8199f5
Dynamic key store: implementation
gilles-peskine-arm Jun 10, 2024
a81282c
Microoptimizations when MBEDTLS_PSA_KEY_STORE_DYNAMIC is disabled
gilles-peskine-arm Jun 10, 2024
3bc9d2b
Dynamic key store: make full-key-store tests work effectively
gilles-peskine-arm Jun 20, 2024
9dc903a
Add test components with the PSA static key store
gilles-peskine-arm Jun 21, 2024
628ad38
Changelog entry for MBEDTLS_PSA_KEY_STORE_DYNAMIC
gilles-peskine-arm Jun 10, 2024
ac43de0
Make integer downsizing explicit
gilles-peskine-arm Jun 13, 2024
1dfb6b5
Clarify some internal documentation
gilles-peskine-arm Aug 9, 2024
81a438b
Remove MBEDTLS_PSA_UTIL_HAVE_ECDSA so that functions are only enabled…
sezrab Jul 12, 2024
6474d90
Changelog entry
sezrab Aug 7, 2024
3001e27
Update the submodule to the head of PR in the framework repository
misch7 Jul 24, 2024
ee73321
Mention interfaces replaced by PSA drivers
gilles-peskine-arm Aug 10, 2024
cdd5b07
Use P_CLI when O_CLI's status is not reliable
mpg Aug 12, 2024
ce629a6
entropy.h is also going away
gilles-peskine-arm Aug 12, 2024
47bf23f
PSA PAKE wasn't in 2.28
gilles-peskine-arm Aug 12, 2024
7f9470a
Merge pull request #9451 from minosgalanakis/fix-v3.6-issues-9186-and…
gilles-peskine-arm Aug 12, 2024
5435850
Merge pull request #9457 from gilles-peskine-arm/announce-4.0-removal…
yanesca Aug 12, 2024
e084964
Improve documentation of MBEDTLS_MPI_IS_PUBLIC
yanesca Aug 12, 2024
38ff70e
Make _optionally_safe functions internal
yanesca Aug 12, 2024
bb3f295
Move mixed security code to small local functions
yanesca Aug 12, 2024
90b4271
Move MBEDTLS_MPI_IS_* macros to bignum_core.h
yanesca Aug 12, 2024
0c292b2
Make MBEDTLS_MPI_IS_PUBLIC thumb friendly
yanesca Aug 12, 2024
a5fc8f3
Move _public parameters next to their target
yanesca Aug 12, 2024
020b9ab
Use actual exponent size for window calculation
yanesca Aug 13, 2024
e0842aa
Add tests for optionally safe codepaths
yanesca Aug 13, 2024
4d9981a
Update framework to the head of the main branch
gilles-peskine-arm Aug 13, 2024
7342656
Add tests for optionally unsafe code paths
yanesca Aug 13, 2024
e196c1a
Merge pull request #9475 from gilles-peskine-arm/framework-update-202…
mpg Aug 14, 2024
70658db
Merge pull request #9463 from sezrab/psa_util_in_builds_without_psa-3.6
mpg Aug 14, 2024
fc1b6f5
Mention the option name for the dynamic key store
gilles-peskine-arm Aug 14, 2024
39c2272
The fully static key store will miss the 3.6.1 release
gilles-peskine-arm Aug 14, 2024
68c0e3d
Fix Mbed-TLS build when WIN32_LEAN_AND_MEAN macro is defined globally
sergio-nsk Aug 14, 2024
28cdd11
Merge pull request #9479 from gilles-peskine-arm/psa-keystore-static-…
tom-cosgrove-arm Aug 15, 2024
e74c840
Rationalize extKeyUsage tests
eleuzi01 Aug 15, 2024
2c62441
Fix mpi_core_exp_mod documentation
yanesca Aug 15, 2024
9d72df8
Optimise public RSA operations
yanesca Aug 15, 2024
04db1fb
Add test cases for extKeyUsage
eleuzi01 Aug 16, 2024
c2ec6fa
Free allocated memory where methods were returning without freeing
gowthamsk-arm Aug 19, 2024
777e3e7
Update ChangeLog
eleuzi01 Aug 19, 2024
4a30cd2
Merge pull request #1274 from gowthamsk-arm/mem-alloc-cleanup-3.6
tom-cosgrove-arm Aug 19, 2024
a112691
Fix optionally safe hooks declarations
yanesca Aug 20, 2024
8786dd7
Disable optionally safe test hook in threading builds
yanesca Aug 20, 2024
afb2079
Clean up initialization in _core_exp_mod()
yanesca Aug 20, 2024
b0b71dc
Edit ChangeLog entry
eleuzi01 Aug 20, 2024
878af12
Fix memory corruption in exp_mod tests
yanesca Aug 20, 2024
060e284
Add test forcing TLS 1.2 for clearer coverage
mpg Aug 5, 2024
a3cf1a5
Fix ordering of a test case in ssl-opt.sh
mpg Aug 5, 2024
d6e2069
Test cert alert NOT_TRUSTED -> UNKNOWN_CA
mpg Aug 5, 2024
4192bba
Test cert alert REVOKED -> CERT_REVOKED
mpg Aug 5, 2024
96a0c5c
Clean up mbedtls_ssl_check_cert_usage()
mpg Aug 9, 2024
4938b69
Make mbedtls_ssl_check_cert_usage() work for 1.3
mpg Aug 9, 2024
8a14aaa
Simplify certificate curve check for 1.2
mpg Aug 9, 2024
85b864e
Rm translation code for unused flag
mpg Aug 9, 2024
4d4c0c7
Add comments about 1.3 server sending no cert
mpg Aug 12, 2024
e1cc926
Allow optional authentication of the server in 1.3
mpg Aug 14, 2024
a0a781e
Reorder some tests in ssl-opt.sh
mpg Aug 14, 2024
2b98a4e
Allow no authentication of the server in 1.3
mpg Aug 14, 2024
84442a3
ssl-opt.sh: Fix test case titles
ronald-cron-arm Apr 3, 2024
cb7f632
tls13: Add support for trusted certificate callback
ronald-cron-arm Apr 3, 2024
8d5da8f
ssl-opt.sh: Test trusted certificate callback in TLS 1.3
ronald-cron-arm Apr 3, 2024
523a7e4
Restrict the scope of a few variables
mpg Aug 14, 2024
e910ac8
Improve a variable's name
mpg Aug 14, 2024
dee6ffa
Add support for context f_vrfy callback in 1.3
mpg Aug 16, 2024
d37054c
Minor refactoring of generic SSL certificate verif
mpg Aug 16, 2024
ce60330
Merge 1.2 and 1.3 certificate verification
mpg Aug 16, 2024
f2aa65f
Improve some comments
mpg Aug 16, 2024
ff28e4c
Fix two dependency declarations in ssl-opt
mpg Aug 16, 2024
565da76
Fix typos in comments
mpg Aug 20, 2024
c32a4a2
Fix guards around function now used by 1.3 as well
mpg Aug 20, 2024
f4f3e92
Add a ChangeLog entry
mpg Aug 20, 2024
a8e13d7
Fix incorrect comments on slice numbering
davidhorstmann-arm Aug 21, 2024
4312491
Tweak macro check to allow 3 extra key slices
davidhorstmann-arm Aug 21, 2024
9183ba1
Add overflow check for maximum key slot length
davidhorstmann-arm Aug 21, 2024
7e551a2
Merge pull request #1263 from mpg/fix-tls13-optional-ku
mpg Aug 21, 2024
6298d73
Merge pull request #1265 from mpg/refactor-tls123-verif
mpg Aug 21, 2024
11cac75
Simplify and explain the overflow check for maximum slice length
gilles-peskine-arm Aug 21, 2024
7be977a
Merge pull request #9486 from sergio-nsk/sergio-nsk/3.6/lean_and_mean/1
minosgalanakis Aug 22, 2024
58da249
Changelog entry for the RSA memory leak
gilles-peskine-arm Aug 21, 2024
c3ed44c
Tiny fix in ChangeLog
eleuzi01 Aug 22, 2024
d2cb074
Tiny fix in ChangeLog pt 2
eleuzi01 Aug 22, 2024
6c20869
Add changelog
yanesca Aug 22, 2024
82976f3
Make mbedtls_mpi_exp_mod_unsafe internal
yanesca Aug 22, 2024
273d07b
Merge pull request #9240 from gilles-peskine-arm/psa-keystore-dynamic…
mpg Aug 22, 2024
5d16334
Improve ChangeLog
yanesca Aug 22, 2024
5f31697
Add header for mbedtls_mpi_exp_mod_unsafe()
yanesca Aug 22, 2024
d8d5353
Merge pull request #1279 from gilles-peskine-arm/memory_allocation_cl…
davidhorstmann-arm Aug 22, 2024
4c857c4
Fix Changelog formatting
yanesca Aug 22, 2024
41e0cdf
Fix issue in handling legacy_compression_methods in ssl_tls13_parse_c…
waleed-elmelegy-arm Jun 11, 2024
566ed54
Improve handling of legacy_compression_methods in ssl_tls13_parse_cli…
waleed-elmelegy-arm Jun 19, 2024
3918598
Correct a small typo in ssl_tls13_parse_client_hello()
waleed-elmelegy-arm Jun 25, 2024
a1c4f4c
Improve comments explaining legacy_methods_compression handling
waleed-elmelegy-arm Jun 25, 2024
790f3b1
Add regression testing to handling Legacy_compression_methods
waleed-elmelegy-arm Jul 4, 2024
38c8757
Improve legacy compression regression testing
waleed-elmelegy-arm Jul 15, 2024
1297309
Remove redundant legacy compression test
waleed-elmelegy-arm Jul 16, 2024
f669fef
Add chanelog entry for fixing legacy comprssion methods issue
waleed-elmelegy-arm Aug 22, 2024
5183e1a
Improve the changelog entry for fixing legacy compression issue
waleed-elmelegy-arm Aug 22, 2024
d930a3e
Reduce the wording in changelog entry
waleed-elmelegy-arm Aug 22, 2024
8ac9caf
Fix the capitalisation in the changelog entry
waleed-elmelegy-arm Aug 22, 2024
df0ef8a
Merge pull request #9281 from mpg/rsapub
gilles-peskine-arm Aug 22, 2024
86a4c25
Merge pull request #9499 from waleed-elmelegy-arm/fix-legacy-compress…
gilles-peskine-arm Aug 22, 2024
4002e6f
Merge remote-tracking branch 'mbedtls-3.6' into mbedtls-3.6-restricted
gilles-peskine-arm Aug 23, 2024
590bdcb
Call psa_crypto_init in the library when required for TLS 1.3: doc
gilles-peskine-arm Aug 25, 2024
5950301
Don't call psa_crypto_init in unit tests when not required for TLS 1.3
gilles-peskine-arm Aug 24, 2024
cd4da16
Don't call psa_crypto_init in test programs when not required for TLS…
gilles-peskine-arm Aug 23, 2024
069bccd
Call psa_crypto_init in the library when required for TLS 1.3
gilles-peskine-arm Aug 23, 2024
5047627
Error translation and init are needed in PSK-only builds as well
gilles-peskine-arm Aug 26, 2024
92e803e
Clarify "negotiating"
gilles-peskine-arm Aug 26, 2024
aa6ef7d
Changelog entry for psa_crypto_init potentially being called from TLS
gilles-peskine-arm Aug 26, 2024
57dbd69
TLS 1.3 server: move crypto_init after protocol negotiation
gilles-peskine-arm Aug 26, 2024
8b8228c
Merge pull request #1282 from gilles-peskine-arm/merge-3.6-restricted…
mpg Aug 26, 2024
7defa41
Merge pull request #9501 from gilles-peskine-arm/tls13-psa-init-auto-3.6
gilles-peskine-arm Aug 26, 2024
bedddd7
Add mbedtls_ssl_conf_enable_new_session_tickets() API
ronald-cron-arm Aug 27, 2024
b675b2b
TLS 1.3: Ignore tickets if disabled at runtime
ronald-cron-arm Aug 27, 2024
23303a4
Enable TLS 1.3 ticket handling in resumption tests
ronald-cron-arm Aug 27, 2024
0e5d4fd
Document MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET.
ronald-cron-arm Aug 27, 2024
9df0563
Improve MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET documentation
ronald-cron-arm Aug 27, 2024
e55659d
Document NewSessionTicket handling being disabled by default
ronald-cron-arm Aug 27, 2024
57ad182
ssl_client2: Fix new_session_tickets option parsing
ronald-cron-arm Aug 27, 2024
d67f801
Do not add a new field in the SSL config
ronald-cron-arm Aug 28, 2024
fc76718
Move MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET doc
ronald-cron-arm Aug 28, 2024
97dc583
Improve debug logs
ronald-cron-arm Aug 28, 2024
31b40b3
Add change logs
ronald-cron-arm Aug 28, 2024
ba45a44
Move session tickets getter functions to ssl_misc.h
ronald-cron-arm Aug 28, 2024
48a9f56
Improve documentation
ronald-cron-arm Aug 28, 2024
c9884b0
Fix change log
ronald-cron-arm Aug 28, 2024
9f44c88
Rename some "new_session_tickets" symbols
ronald-cron-arm Aug 28, 2024
c46edd4
Fix/Improve documentation
ronald-cron-arm Aug 28, 2024
72064b2
Merge pull request #9507 from ronald-cron-arm/disable-new-session-tic…
gilles-peskine-arm Aug 28, 2024
9f10979
Merge branch 'mbedtls-3.6-restricted' into mbedtls-3.6.1rc0-pr
davidhorstmann-arm Aug 28, 2024
204c4b4
Fix typos in make clean target for Windows
davidhorstmann-arm Aug 28, 2024
636367f
Don't clean test_keys.h and test_certs.h
davidhorstmann-arm Aug 28, 2024
9cf929d
Assemble ChangeLog
davidhorstmann-arm Aug 28, 2024
1d2dcfc
Bump version to 3.6.1
davidhorstmann-arm Aug 28, 2024
ea44fa7
Finalise ChangeLog
davidhorstmann-arm Aug 28, 2024
0d11176
Add generated files
davidhorstmann-arm Aug 28, 2024
18f3beb
Update BRANCHES.md
davidhorstmann-arm Aug 28, 2024
fedf9a2
Add CVE IDs to security ChangeLog
davidhorstmann-arm Aug 28, 2024
4c8ca72
Move some ChangeLog entries to a different section
davidhorstmann-arm Aug 28, 2024
71c569d
Merge pull request #1286 from Mbed-TLS/mbedtls-3.6.1rc0-pr
davidhorstmann-arm Aug 30, 2024
9dabbbf
Revert "md: fix guards for mbedtls_md_error_from_psa"
tomi-font Sep 2, 2024
5b86c71
Revert "Revert "Require framework directory to exist when building""
tomi-font Sep 2, 2024
95583ee
Revert "Revert "Show guidance if the framework is not found""
tomi-font Sep 2, 2024
3d56549
Revert "Enable sources when MCUBOOT_USE_PSA_CRYPTO and not MBEDTLS_PS…
tomi-font Sep 2, 2024
a9935fd
Revert "Enable psa_can_do_hash"
tomi-font Sep 2, 2024
fed851c
Revert "Hardcode CC3XX entry points"
tomi-font Sep 2, 2024
b6dcc26
Revert "Initialise driver wrappers as first step in psa_crypto_init()"
tomi-font Sep 2, 2024
ab9908e
Revert "Allow SE key to use key vendor id within PSA crypto"
tomi-font Sep 2, 2024
f741181
Revert "Enable crypto code sharing between independent binaries"
tomi-font Sep 2, 2024
079e65c
Revert "Add TF-M Builtin Key Loader driver entry points"
tomi-font Sep 2, 2024
bd3a26f
Merge tag 'v3.6.1' into HEAD
tomi-font Sep 2, 2024
08ca11e
Add TF-M Builtin Key Loader driver entry points
adeaarm Mar 21, 2024
7baa026
Enable crypto code sharing between independent binaries
tamasban Oct 27, 2020
fe8fb6d
Allow SE key to use key vendor id within PSA crypto
BenBaratte Feb 9, 2023
7285534
Initialise driver wrappers as first step in psa_crypto_init()
adeaarm Mar 21, 2024
e7779a8
Hardcode CC3XX entry points
adeaarm Mar 21, 2024
3947c84
Enable psa_can_do_hash
adeaarm Mar 21, 2024
d03fc39
Revert "Show guidance if the framework is not found"
tomi-font Apr 19, 2024
6d8b909
Revert "Require framework directory to exist when building"
tomi-font Apr 19, 2024
dd5801b
Enable sources when MCUBOOT_USE_PSA_CRYPTO and not MBEDTLS_PSA_CRYPTO_C
adeaarm Apr 9, 2024
b9b26b7
config_psa: include legacy module adjusting in MCUBOOT
valeriosetti Jul 25, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
3 changes: 2 additions & 1 deletion .github/pull_request_template.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,8 @@ Please write a few sentences describing the overall goals of the pull request's
Please tick as appropriate and edit the reasons (e.g.: "backport: not needed because this is a new feature")

- [ ] **changelog** provided, or not required
- [ ] **backport** done, or not required
- [ ] **3.6 backport** done, or not required
- [ ] **2.28 backport** done, or not required
- [ ] **tests** provided, or not required


Expand Down
6 changes: 6 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,9 @@
seedfile
# MBEDTLS_PSA_INJECT_ENTROPY seed file created by the test framework
00000000ffffff52.psa_its
# Log files created by all.sh to reduce the logs in case a component runs
# successfully
quiet-make.*

# CMake build artifacts:
CMakeCache.txt
Expand Down Expand Up @@ -67,3 +70,6 @@ massif-*
compile_commands.json
# clangd index files
/.cache/clangd/index/

# VScode folder to store local debug files and configurations
.vscode
1 change: 1 addition & 0 deletions 3rdparty/p256-m/.gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Makefile
4 changes: 2 additions & 2 deletions BRANCHES.md
Original file line number Diff line number Diff line change
Expand Up @@ -107,9 +107,9 @@ The following branches are currently maintained:
- [`development`](https://github.com/Mbed-TLS/mbedtls/)
- [`mbedtls-3.6`](https://github.com/Mbed-TLS/mbedtls/tree/mbedtls-3.6)
maintained until March 2027, see
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0>.
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.1>.
- [`mbedtls-2.28`](https://github.com/Mbed-TLS/mbedtls/tree/mbedtls-2.28)
maintained until the end of 2024, see
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.8>.
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.9>.

Users are urged to always use the latest version of a maintained branch.
70 changes: 59 additions & 11 deletions CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,10 @@ cmake_minimum_required(VERSION 3.5.1)

include(CMakePackageConfigHelpers)

# Include convenience functions for printing properties and variables, like
# cmake_print_properties(), cmake_print_variables().
include(CMakePrintHelpers)

# https://cmake.org/cmake/help/latest/policy/CMP0011.html
# Setting this policy is required in CMake >= 3.18.0, otherwise a warning is generated. The OLD
# policy setting is deprecated, and will be removed in future versions.
Expand All @@ -36,12 +40,12 @@ cmake_policy(SET CMP0012 NEW)
if(TEST_CPP)
project("Mbed TLS"
LANGUAGES C CXX
VERSION 3.6.0
VERSION 3.6.1
)
else()
project("Mbed TLS"
LANGUAGES C
VERSION 3.6.0
VERSION 3.6.1
)
endif()

Expand Down Expand Up @@ -73,10 +77,16 @@ endif()

option(DISABLE_PACKAGE_CONFIG_AND_INSTALL "Disable package configuration, target export and installation" ${MBEDTLS_AS_SUBPROJECT})

string(REGEX MATCH "Clang" CMAKE_COMPILER_IS_CLANG "${CMAKE_C_COMPILER_ID}")
string(REGEX MATCH "GNU" CMAKE_COMPILER_IS_GNU "${CMAKE_C_COMPILER_ID}")
string(REGEX MATCH "IAR" CMAKE_COMPILER_IS_IAR "${CMAKE_C_COMPILER_ID}")
string(REGEX MATCH "MSVC" CMAKE_COMPILER_IS_MSVC "${CMAKE_C_COMPILER_ID}")
if (CMAKE_C_SIMULATE_ID)
set(COMPILER_ID ${CMAKE_C_SIMULATE_ID})
else()
set(COMPILER_ID ${CMAKE_C_COMPILER_ID})
endif(CMAKE_C_SIMULATE_ID)

string(REGEX MATCH "Clang" CMAKE_COMPILER_IS_CLANG "${COMPILER_ID}")
string(REGEX MATCH "GNU" CMAKE_COMPILER_IS_GNU "${COMPILER_ID}")
string(REGEX MATCH "IAR" CMAKE_COMPILER_IS_IAR "${COMPILER_ID}")
string(REGEX MATCH "MSVC" CMAKE_COMPILER_IS_MSVC "${COMPILER_ID}")

# the test suites currently have compile errors with MSVC
if(CMAKE_COMPILER_IS_MSVC)
Expand Down Expand Up @@ -184,8 +194,6 @@ function(get_name_without_last_ext dest_var full_name)
set(${dest_var} ${no_ext_name} PARENT_SCOPE)
endfunction(get_name_without_last_ext)

string(REGEX MATCH "Clang" CMAKE_COMPILER_IS_CLANG "${CMAKE_C_COMPILER_ID}")

include(CheckCCompilerFlag)

set(CMAKE_C_EXTENSIONS OFF)
Expand All @@ -196,7 +204,7 @@ if(CMAKE_COMPILER_IS_GNU)
# note: starting with CMake 2.8 we could use CMAKE_C_COMPILER_VERSION
execute_process(COMMAND ${CMAKE_C_COMPILER} -dumpversion
OUTPUT_VARIABLE GCC_VERSION)
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings")
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings -Wmissing-prototypes")
if (GCC_VERSION VERSION_GREATER 3.0 OR GCC_VERSION VERSION_EQUAL 3.0)
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wformat=2 -Wno-format-nonliteral")
endif()
Expand Down Expand Up @@ -230,7 +238,7 @@ if(CMAKE_COMPILER_IS_GNU)
endif(CMAKE_COMPILER_IS_GNU)

if(CMAKE_COMPILER_IS_CLANG)
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings -Wpointer-arith -Wimplicit-fallthrough -Wshadow -Wvla -Wformat=2 -Wno-format-nonliteral")
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings -Wmissing-prototypes -Wpointer-arith -Wimplicit-fallthrough -Wshadow -Wvla -Wformat=2 -Wno-format-nonliteral")
set(CMAKE_C_FLAGS_RELEASE "-O2")
set(CMAKE_C_FLAGS_DEBUG "-O0 -g3")
set(CMAKE_C_FLAGS_COVERAGE "-O0 -g3 --coverage")
Expand Down Expand Up @@ -273,6 +281,15 @@ if(MBEDTLS_FATAL_WARNINGS)
endif(CMAKE_COMPILER_IS_IAR)
endif(MBEDTLS_FATAL_WARNINGS)

if(CMAKE_BUILD_TYPE STREQUAL "Check" AND TEST_CPP)
set(CMAKE_CXX_STANDARD 11)
set(CMAKE_CXX_STANDARD_REQUIRED ON)
set(CMAKE_CXX_EXTENSIONS OFF)
if(CMAKE_COMPILER_IS_CLANG OR CMAKE_COMPILER_IS_GNU)
set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -pedantic")
endif()
endif()

if(CMAKE_BUILD_TYPE STREQUAL "Coverage")
if(CMAKE_COMPILER_IS_GNU OR CMAKE_COMPILER_IS_CLANG)
set(CMAKE_SHARED_LINKER_FLAGS "--coverage")
Expand Down Expand Up @@ -310,6 +327,37 @@ if(ENABLE_TESTING OR ENABLE_PROGRAMS)
${CMAKE_CURRENT_SOURCE_DIR}/tests/src/*.c
${CMAKE_CURRENT_SOURCE_DIR}/tests/src/drivers/*.c)
add_library(mbedtls_test OBJECT ${MBEDTLS_TEST_FILES})
if(GEN_FILES)
add_custom_command(
OUTPUT
${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_keys.h
WORKING_DIRECTORY
${CMAKE_CURRENT_SOURCE_DIR}/tests
COMMAND
"${MBEDTLS_PYTHON_EXECUTABLE}"
"${CMAKE_CURRENT_SOURCE_DIR}/framework/scripts/generate_test_keys.py"
"--output"
"${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_keys.h"
DEPENDS
${CMAKE_CURRENT_SOURCE_DIR}/framework/scripts/generate_test_keys.py
)
add_custom_target(test_keys_header DEPENDS ${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_keys.h)
add_custom_command(
OUTPUT
${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_certs.h
WORKING_DIRECTORY
${CMAKE_CURRENT_SOURCE_DIR}/tests
COMMAND
"${MBEDTLS_PYTHON_EXECUTABLE}"
"${CMAKE_CURRENT_SOURCE_DIR}/framework/scripts/generate_test_cert_macros.py"
"--output"
"${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_certs.h"
DEPENDS
${CMAKE_CURRENT_SOURCE_DIR}/framework/scripts/generate_test_cert_macros.py
)
add_custom_target(test_certs_header DEPENDS ${CMAKE_CURRENT_SOURCE_DIR}/tests/src/test_certs.h)
add_dependencies(mbedtls_test test_keys_header test_certs_header)
endif()
target_include_directories(mbedtls_test
PRIVATE ${CMAKE_CURRENT_SOURCE_DIR}/tests/include
PRIVATE ${CMAKE_CURRENT_SOURCE_DIR}/include
Expand Down Expand Up @@ -396,7 +444,7 @@ if(NOT DISABLE_PACKAGE_CONFIG_AND_INSTALL)
write_basic_package_version_file(
"cmake/MbedTLSConfigVersion.cmake"
COMPATIBILITY SameMajorVersion
VERSION 3.6.0)
VERSION 3.6.1)

install(
FILES "${CMAKE_CURRENT_BINARY_DIR}/cmake/MbedTLSConfig.cmake"
Expand Down
184 changes: 184 additions & 0 deletions ChangeLog
Original file line number Diff line number Diff line change
@@ -1,5 +1,188 @@
Mbed TLS ChangeLog (Sorted per branch, date)

= Mbed TLS 3.6.1 branch released 2024-08-30

API changes
* The experimental functions psa_generate_key_ext() and
psa_key_derivation_output_key_ext() are no longer declared when compiling
in C++. This resolves a build failure under C++ compilers that do not
support flexible array members (a C99 feature not adopted by C++).
Fixes #9020.

Default behavior changes
* In a PSA-client-only build (i.e. MBEDTLS_PSA_CRYPTO_CLIENT &&
!MBEDTLS_PSA_CRYPTO_C), do not automatically enable local crypto when the
corresponding PSA mechanism is enabled, since the server provides the
crypto. Fixes #9126.
* A TLS handshake may now call psa_crypto_init() if TLS 1.3 is enabled.
This can happen even if TLS 1.3 is offered but eventually not selected
in the protocol version negotiation.
* By default, the handling of TLS 1.3 tickets by the Mbed TLS client is now
disabled at runtime. Applications that were using TLS 1.3 tickets
signalled by MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET return values now
need to enable the handling of TLS 1.3 tickets through the new
mbedtls_ssl_conf_tls13_enable_signal_new_session_tickets() API.

New deprecations
* The experimental functions psa_generate_key_ext() and
psa_key_derivation_output_key_ext() are deprecated in favor of
psa_generate_key_custom() and psa_key_derivation_output_key_custom().
They have almost exactly the same interface, but the variable-length
data is passed in a separate parameter instead of a flexible array
member.
* The following cryptographic mechanisms are planned to be removed
in Mbed TLS 4.0:
- DES (including 3DES).
- PKCS#1v1.5 encryption/decryption (RSAES-PKCS1-v1_5).
(OAEP, PSS, and PKCS#1v1.5 signature are staying.)
- Finite-field Diffie-Hellman with custom groups.
(RFC 7919 groups remain supported.)
- Elliptic curves of size 225 bits or less.
* The following cipher suites are planned to be removed from (D)TLS 1.2
in Mbed TLS 4.0:
- TLS_RSA_* (including TLS_RSA_PSK_*), i.e. cipher suites using
RSA decryption.
(RSA signatures, i.e. TLS_ECDHE_RSA_*, are staying.)
- TLS_ECDH_*, i.e. cipher suites using static ECDH.
(Ephemeral ECDH, i.e. TLS_ECDHE_*, is staying.)
- TLS_DHE_*, i.e. cipher suites using finite-field Diffie-Hellman.
(Ephemeral ECDH, i.e. TLS_ECDHE_*, is staying.)
- TLS_*CBC*, i.e. all cipher suites using CBC.
* The following low-level application interfaces are planned to be removed
from the public API in Mbed TLS 4.0:
- Hashes: hkdf.h, md5.h, ripemd160.h, sha1.h, sha3.h, sha256.h, sha512.h;
- Random generation: ctr_drbg.h, hmac_drbg.h, entropy.h;
- Ciphers and modes: aes.h, aria.h, camellia.h, chacha20.h, chachapoly.h,
cipher.h, cmac.h, gcm.h, poly1305.h;
- Private key encryption mechanisms: pkcs5.h, pkcs12.h.
- Asymmetric cryptography: bignum.h, dhm.h, ecdh.h, ecdsa.h, ecjpake.h,
ecp.h, rsa.h.
The cryptographic mechanisms remain present, but they will only be
accessible via the PSA API (psa_xxx functions introduced gradually
starting with Mbed TLS 2.17) and, where relevant, `pk.h`.
For guidance on migrating application code to the PSA API, please consult
the PSA transition guide (docs/psa-transition.md).
* The following integration interfaces are planned to be removed
in Mbed TLS 4.0:
- MBEDTLS_xxx_ALT replacement of cryptographic modules and functions.
Use PSA transparent drivers instead.
- MBEDTLS_PK_RSA_ALT and MBEDTLS_PSA_CRYPTO_SE_C.
Use PSA opaque drivers instead.

Features
* When the new compilation option MBEDTLS_PSA_KEY_STORE_DYNAMIC is enabled,
the number of volatile PSA keys is virtually unlimited, at the expense
of increased code size. This option is off by default, but enabled in
the default mbedtls_config.h. Fixes #9216.

Security
* Unlike previously documented, enabling MBEDTLS_PSA_HMAC_DRBG_MD_TYPE does
not cause the PSA subsystem to use HMAC_DRBG: it uses HMAC_DRBG only when
MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG and MBEDTLS_CTR_DRBG_C are disabled.
CVE-2024-45157
* Fix a stack buffer overflow in mbedtls_ecdsa_der_to_raw() and
mbedtls_ecdsa_raw_to_der() when the bits parameter is larger than the
largest supported curve. In some configurations with PSA disabled,
all values of bits are affected. This never happens in internal library
calls, but can affect applications that call these functions directly.
CVE-2024-45158
* With TLS 1.3, when a server enables optional authentication of the
client, if the client-provided certificate does not have appropriate values
in keyUsage or extKeyUsage extensions, then the return value of
mbedtls_ssl_get_verify_result() would incorrectly have the
MBEDTLS_X509_BADCERT_KEY_USAGE and MBEDTLS_X509_BADCERT_EXT_KEY_USAGE bits
clear. As a result, an attacker that had a certificate valid for uses other
than TLS client authentication could be able to use it for TLS client
authentication anyway. Only TLS 1.3 servers were affected, and only with
optional authentication (required would abort the handshake with a fatal
alert).
CVE-2024-45159

Bugfix
* Fix TLS 1.3 client build and runtime when support for session tickets is
disabled (MBEDTLS_SSL_SESSION_TICKETS configuration option). Fixes #6395.
* Fix compilation error when memcpy() is a function-like macros. Fixes #8994.
* MBEDTLS_ASN1_PARSE_C and MBEDTLS_ASN1_WRITE_C are now automatically enabled
as soon as MBEDTLS_RSA_C is enabled. Fixes #9041.
* Fix undefined behaviour (incrementing a NULL pointer by zero length) when
passing in zero length additional data to multipart AEAD.
* Fix rare concurrent access bug where attempting to operate on a
non-existent key while concurrently creating a new key could potentially
corrupt the key store.
* Fix error handling when creating a key in a dynamic secure element
(feature enabled by MBEDTLS_PSA_CRYPTO_SE_C). In a low memory condition,
the creation could return PSA_SUCCESS but using or destroying the key
would not work. Fixes #8537.
* Fix issue of redefinition warning messages for _GNU_SOURCE in
entropy_poll.c and sha_256.c. There was a build warning during
building for linux platform.
Resolves #9026
* Fix a compilation warning in pk.c when PSA is enabled and RSA is disabled.
* Fix the build when MBEDTLS_PSA_CRYPTO_CONFIG is enabled and the built-in
CMAC is enabled, but no built-in unauthenticated cipher is enabled.
Fixes #9209.
* Fix redefinition warnings when SECP192R1 and/or SECP192K1 are disabled.
Fixes #9029.
* Fix psa_cipher_decrypt() with CCM* rejecting messages less than 3 bytes
long. Credit to Cryptofuzz. Fixes #9314.
* Fix interference between PSA volatile keys and built-in keys
when MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS is enabled and
MBEDTLS_PSA_KEY_SLOT_COUNT is more than 4096.
* Document and enforce the limitation of mbedtls_psa_register_se_key()
to persistent keys. Resolves #9253.
* Fix Clang compilation error when MBEDTLS_USE_PSA_CRYPTO is enabled
but MBEDTLS_DHM_C is disabled. Reported by Michael Schuster in #9188.
* Fix server mode only build when MBEDTLS_SSL_SRV_C is enabled but
MBEDTLS_SSL_CLI_C is disabled. Reported by M-Bab on GitHub in #9186.
* When MBEDTLS_PSA_CRYPTO_C was disabled and MBEDTLS_ECDSA_C enabled,
some code was defining 0-size arrays, resulting in compilation errors.
Fixed by disabling the offending code in configurations without PSA
Crypto, where it never worked. Fixes #9311.
* Fix unintended performance regression when using short RSA public keys.
Fixes #9232.
* Fixes an issue where some TLS 1.2 clients could not connect to an
Mbed TLS 3.6.0 server, due to incorrect handling of
legacy_compression_methods in the ClientHello.
Fixes #8995, #9243.
* Fix TLS connections failing when the handshake selects TLS 1.3
in an application that does not call psa_crypto_init().
Fixes #9072.
* Fix TLS connection failure in applications using an Mbed TLS client in
the default configuration connecting to a TLS 1.3 server sending tickets.
See the documentation of
mbedtls_ssl_conf_tls13_enable_signal_new_session_tickets() for more
information.
Fixes #8749.
* Fix a memory leak that could occur when failing to process an RSA
key through some PSA functions due to low memory conditions.
* Fixed a regression introduced in 3.6.0 where the CA callback set with
mbedtls_ssl_conf_ca_cb() would stop working when connections were
upgraded to TLS 1.3. Fixed by adding support for the CA callback with TLS
1.3.
* Fixed a regression introduced in 3.6.0 where clients that relied on
optional/none authentication mode, by calling mbedtls_ssl_conf_authmode()
with MBEDTLS_SSL_VERIFY_OPTIONAL or MBEDTLS_SSL_VERIFY_NONE, would stop
working when connections were upgraded to TLS 1.3. Fixed by adding
support for optional/none with TLS 1.3 as well. Note that the TLS 1.3
standard makes server authentication mandatory; users are advised not to
use authmode none, and to carefully check the results when using optional
mode.
* Fixed a regression introduced in 3.6.0 where context-specific certificate
verify callbacks, set with mbedtls_ssl_set_verify() as opposed to
mbedtls_ssl_conf_verify(), would stop working when connections were
upgraded to TLS 1.3. Fixed by adding support for context-specific verify
callback in TLS 1.3.

Changes
* Warn if mbedtls/check_config.h is included manually, as this can
lead to spurious errors. Error if a *adjust*.h header is included
manually, as this can lead to silently inconsistent configurations,
potentially resulting in buffer overflows.
When migrating from Mbed TLS 2.x, if you had a custom config.h that
included check_config.h, remove this inclusion from the Mbed TLS 3.x
configuration file (renamed to mbedtls_config.h). This change was made
in Mbed TLS 3.0, but was not announced in a changelog entry at the time.

= Mbed TLS 3.6.0 branch released 2024-03-28

API changes
Expand Down Expand Up @@ -144,6 +327,7 @@ Security
* Fix a stack buffer overread (less than 256 bytes) when parsing a TLS 1.3
ClientHello in a TLS 1.3 server supporting some PSK key exchange mode. A
malicious client could cause information disclosure or a denial of service.
Fixes CVE-2024-30166.
* Passing buffers that are stored in untrusted memory as arguments
to PSA functions is now secure by default.
The PSA core now protects against modification of inputs or exposure
Expand Down
4 changes: 1 addition & 3 deletions configs/config-symmetric-only.h
Original file line number Diff line number Diff line change
Expand Up @@ -65,13 +65,11 @@
#define MBEDTLS_PSA_ITS_FILE_C
#define MBEDTLS_RIPEMD160_C
#define MBEDTLS_SHA1_C
/* The library does not currently support enabling SHA-224 without SHA-256.
* A future version of the library will have this option disabled
* by default. */
#define MBEDTLS_SHA224_C
#define MBEDTLS_SHA256_C
#define MBEDTLS_SHA384_C
#define MBEDTLS_SHA512_C
#define MBEDTLS_SHA3_C
//#define MBEDTLS_THREADING_C
#define MBEDTLS_TIMING_C
#define MBEDTLS_VERSION_C
Loading