Waleed Elmelegy
dffb1e3d66
Improve mbedtls_pkcs5_pbes2_ext changelog description
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com >
2023-09-04 17:57:23 +01:00
Waleed Elmelegy
7aeb6e7610
Add changelog entry for new mbedtls_pkcs5_pbe2_ext function
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com >
2023-09-04 17:52:15 +01:00
Dave Rodgman
45b93ec621
Merge pull request #1037 from daverodgman/cmac-blocksize-2.28
2023-07-13 19:32:58 +01:00
Dave Rodgman
a3e4e229ef
Change value of MBEDTLS_CIPHER_BLKSIZE_MAX if ARIA or Camellia present
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-07-13 15:41:04 +01:00
David Horstmann
63b06a8889
Add ChangeLog entry for CMake config defines
...
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2023-07-07 11:29:23 +01:00
Dave Rodgman
08efc3d768
Merge pull request #7854 from daverodgman/fix-unused-aes-2.28
...
Fix AES dependencies - build TF-M config cleanly - backport 2.28
2023-07-03 16:48:39 +01:00
Dave Rodgman
a3fc295559
Merge pull request #7823 from SlugFiller/mbedtls-2.28
...
Support compilation using CLang on Windows
2023-07-03 09:52:03 +01:00
Tom Cosgrove
fbcb5d469b
Merge pull request #7850 from davidhorstmann-arm/2.28-fix-string-to-names-retcode
...
[Backport 2.28] Fix false success return code in `mbedtls_x509_string_to_names()`
2023-06-30 14:28:38 +01:00
Dave Rodgman
3fb807c064
Merge pull request #7761 from waleed-elmelegy-arm/crypt_and_hash-decrypt-fix_backport
...
Backport 2.28: Fix crypt_and_hash decrypt issue when used with stream cipher
2023-06-30 11:42:19 +01:00
Dave Rodgman
c62e5c4885
Update changelog for 2.28
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-28 11:33:07 +01:00
Dave Rodgman
c34bea20d6
fix trailing whitespace
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-28 11:31:57 +01:00
Dave Rodgman
aac022dab4
Changelog
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-06-28 11:31:53 +01:00
David Horstmann
1e8086bd21
Add ChangeLog entry for string_to_names() fix
...
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2023-06-27 17:34:58 +01:00
SlugFiller
e2d0614571
Support compilation using CLang on Windows
...
Signed-off-by: SlugFiller <5435495+SlugFiller@users.noreply.github.com >
2023-06-26 19:19:56 +03:00
David Horstmann
7435651068
Reword changelog entry
...
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2023-06-15 14:09:05 +01:00
Waleed Elmelegy
558bdc3f42
Add crypt_and_hash decrypt issue to Changelog
...
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com >
2023-06-13 12:15:30 +01:00
Robin Kastberg
45bbf16262
Create bugfix_iar_typo.txt
...
Changelog entry
Signed-off-by: Robin Kastberg <robin.kastberg@iar.com >
2023-06-12 14:16:42 +01:00
Dave Rodgman
763c8b96cc
Fix armclang compile fail
...
Signed-off-by: Dave Rodgman <dave.rodgman@gmail.com >
2023-06-05 21:24:57 -04:00
Przemek Stekiel
9dd2167ea4
Add changelog entry (PSA initialization in sample programs)
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-04-25 11:41:16 +02:00
Paul Elliott
f18db1f631
Assemble changelog for 2.28.3 release
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-03-23 11:26:53 +00:00
Paul Elliott
0e4a4c570e
Fix changelog formatting
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-03-23 11:21:38 +00:00
Paul Elliott
f10eb92751
Rename misnamed changelog entries
...
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-03-23 11:18:17 +00:00
Tom Cosgrove
9bf344fddd
Add security entry to ChangeLog for AES-NI
...
Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com >
2023-03-23 11:14:27 +00:00
Gilles Peskine
9a8bf9f85d
Announce the expanded AESNI support
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-03-17 16:32:03 +00:00
Demi Marie Obenour
6b8e8ff079
Fix segfault in mbedtls_oid_get_numeric_string
...
When passed an empty OID, mbedtls_oid_get_numeric_string would read one
byte from the zero-sized buffer and return an error code that depends on
its value. This is demonstrated by the test suite changes, which
check that an OID with length zero and an invalid buffer pointer does
not cause Mbed TLS to segfault.
Also check that second and subsequent subidentifiers are terminated, and
add a test case for that. Furthermore, stop relying on integer division
by 40, use the same loop for both the first and subsequent
subidentifiers, and add additional tests.
Signed-off-by: Demi Marie Obenour <demiobenour@gmail.com >
2023-03-16 01:07:35 -04:00
Dave Rodgman
39987ebde7
Merge pull request #7172 from daverodgman/fix_UB_in_ssl_read-2.28
...
Backport 2.28: Fix undefined behavior in ssl_read if buf parameter is NULL
2023-03-13 10:46:24 +00:00
Dave Rodgman
7a5168e90d
Merge pull request #7170 from AndrzejKurek/mpi-window-size-2.28
...
[Backport 2.28] Reduce the default MBEDTLS_ECP_WINDOW_SIZE value to 2
2023-02-27 17:12:29 +00:00
Dave Rodgman
fb07c37cb1
Improve changelog
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-02-24 16:02:26 +00:00
Ashley Duncan
13938b84e9
Added changelog entry.
...
Signed-off-by: Ashley Duncan <ashley.duncan@evnex.com >
2023-02-24 16:02:26 +00:00
Andrzej Kurek
6e9385b832
Reduce the default MBEDTLS_ECP_WINDOW_SIZE value to 2
...
As tested in https://github.com/Mbed-TLS/mbedtls/issues/6790 ,
after introducing side-channel counter-measures to bignum,
the performance of RSA decryption in correlation to the
MBEDTLS_ECP_WINDOW_SIZE has changed.
The default value of 2 has been chosen as it provides best
or close-to-best results for tests on Cortex-M4 and Intel i7.
Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com >
2023-02-24 08:05:18 -05:00
Gilles Peskine
d784833a1b
Silence a warning from Clang >=15 about an unused local variable
...
The assembly code uses t only on some architectures. Fixes #7166 .
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-02-24 12:08:57 +01:00
Gilles Peskine
44fe5ea532
Changelog entry for pacifying clang -Wdocumentation about \retval
...
Fixes #6960
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-02-24 11:41:55 +01:00
David Horstmann
b91ba4b7bf
Add ChangeLog for OID-to-string fixes
...
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2023-02-20 14:44:18 +00:00
Paul Elliott
fc820d96e0
Fix IAR warnings
...
IAR was warning that conditional execution could bypass initialisation of
variables, although those same variables were not used uninitialised. Fix
this along with some other IAR warnings.
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-02-13 15:07:44 +00:00
Gilles Peskine
a4c10abaf9
Merge pull request #7063 from AndrzejKurek/2.28_x508_san_parsing_testing
...
[2.28 Backport] X.509: Fix bug in SAN parsing and enhance negative testin
2023-02-10 15:05:30 +01:00
Gilles Peskine
b5e9cd37a0
Announce coding style change in the changelog
...
It doesn't affect users, but it affects some other external consumers of the
library.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-02-08 19:45:41 +01:00
Hanno Becker
3818fd9d58
Add a ChangeLog entry
...
Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com >
2023-02-08 09:19:09 -05:00
Gilles Peskine
d6bb16a5b8
Merge pull request #6976 from davidhorstmann-arm/2.28-c-build-helper-improvements
...
[Backport 2.28] Minor improvements to `c_build_helper.py`
2023-02-07 10:26:03 +01:00
Dave Rodgman
b028531a3b
Merge pull request #7013 from gilles-peskine-arm/build-without-certs-2.28.2
...
2.28 only: Fix the build without MBEDTLS_CERTS_C
2023-02-06 11:39:01 +00:00
Aditya Deshpande
e87ed421be
Amend changelog entry
...
Signed-off-by: Aditya Deshpande <aditya.deshpande@arm.com >
2023-02-02 12:07:07 +00:00
Aditya Deshpande
a7d879185e
Add changelog entry
...
Signed-off-by: Aditya Deshpande <aditya.deshpande@arm.com >
2023-02-02 12:07:06 +00:00
Gilles Peskine
4d483a1814
Fix misplaced #endif in test program
...
This broke the build when MBEDTLS_CERTS_C is undefined. Fixes #6243 .
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com >
2023-02-01 18:19:23 +01:00
David Horstmann
5e29196561
Fix near-tautological repetition in ChangeLog
...
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2023-02-01 13:41:34 +00:00
Aaron M. Ucko
78b823ab0e
mbedtls_mpi_sub_abs: Skip memcpy when redundant ( #6701 ).
...
In some contexts, the output pointer may equal the first input
pointer, in which case copying is not only superfluous but results in
"Source and destination overlap in memcpy" errors from Valgrind (as I
observed in the context of ecp_double_jac) and a diagnostic message
from TrustInSoft Analyzer (as Pascal Cuoq reported in the context of
other ECP functions called by cert-app with a suitable certificate).
Signed-off-by: Aaron M. Ucko <ucko@ncbi.nlm.nih.gov >
2023-01-31 15:45:44 -05:00
Manuel Pégourié-Gonnard
4b7cb8c737
Merge pull request #6919 from valeriosetti/issue6843-backport
...
Backport: Improve X.509 cert writing serial number management
2023-01-30 13:09:09 +01:00
David Horstmann
41fbc3ad3a
Add ChangeLog for c_build_helper improvements
...
Signed-off-by: David Horstmann <david.horstmann@arm.com >
2023-01-27 19:56:49 +00:00
Gilles Peskine
f57f3db920
Merge pull request #6931 from AndrzejKurek/timeless-selftest-waz-bad
...
[2.28] Enable the timing.c selftest with MBEDTLS_TIMING_ALT
2023-01-26 21:55:44 +01:00
Andrzej Kurek
26d383998d
Be consistent with self-test naming
...
Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com >
2023-01-26 04:38:37 -05:00
Dave Rodgman
6b8d42444d
Add Changelog
...
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com >
2023-01-20 11:43:01 +00:00
Andrzej Kurek
4136a9ec5a
Shorten lines of changelog entry
...
Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com >
2023-01-17 06:09:37 -05:00