Commit Graph

  • 92d1ec6567 Change path for the files only exits in parse_input Jerry Yu 2023-06-27 16:53:25 +08:00
  • 8c5fae2610 Add explanatory comment Dave Rodgman 2023-06-27 09:43:55 +01:00
  • 54e8632ae6 copy command for parse_input/* when it exists in data_files Jerry Yu 2023-06-27 16:40:00 +08:00
  • 9e868be13a Fix clang warning from -Wasm-operand-widths Dave Rodgman 2023-06-27 09:27:27 +01:00
  • 39a0a76fcc SSL programs: improve command-line error reporting Manuel Pégourié-Gonnard 2023-06-27 09:28:24 +02:00
  • cbfe333c2b add test case for zero input cost Kusumit Ghoderao 2023-06-27 11:19:12 +05:30
  • 42b02b9fe9 Add test and test case for input cost greater than vendor maximum Kusumit Ghoderao 2023-06-06 16:48:46 +05:30
  • 93baf39095 test_suite_ecp.data: Added test cases for modulo-1 in coordinate representation. Minos Galanakis 2023-06-26 20:02:48 +01:00
  • 53a16b3fb5 bignum_mod_raw: Updated documentation for mpi_mod_raw_mul Minos Galanakis 2023-06-26 17:05:53 +01:00
  • 47a2ac1c25 Fix incorrectly named macro Dave Rodgman 2023-06-26 18:39:42 +01:00
  • 5734bb99cc Fix PSA_HMAC_MAX_HASH_BLOCK_SIZE and PSA_HASH_MAX_SIZE definitions Dave Rodgman 2023-06-26 18:23:08 +01:00
  • e2d0614571 Support compilation using CLang on Windows SlugFiller 2023-06-23 06:24:49 +03:00
  • 76669458af Adapt guards in ssl_write_client_hello_body Przemek Stekiel 2023-06-26 17:34:36 +02:00
  • 8bfe897ab0 Add ssl-opt functions to check openssl with ffdh support and openssl ephemeral key exchange Przemek Stekiel 2023-06-26 12:59:45 +02:00
  • 98d79335d1 Update guards for supported groups Przemek Stekiel 2023-06-26 12:44:33 +02:00
  • 603271ce3d test: solve disparities in driver coverage analysis for no_ecp_at_all() Valerio Setti 2023-06-26 16:02:47 +02:00
  • 8c3404f3e0 x509: update ECP_LIGHT dependencies to PK_HAVE_ECC_KEYS Valerio Setti 2023-06-26 15:49:48 +02:00
  • aafe90033c test: enable X509 testing in no_ecp_at_all() components Valerio Setti 2023-06-26 15:23:44 +02:00
  • 16985d5f98 Fix test dependencies Dave Rodgman 2023-06-26 11:28:33 +01:00
  • 12cd44b9b3 Fix test dependencies Dave Rodgman 2023-06-26 11:27:37 +01:00
  • 09822a35f5 code style Dave Rodgman 2023-06-26 11:11:23 +01:00
  • f66cd61daa Use more standard PSA macro names Dave Rodgman 2023-06-26 11:02:12 +01:00
  • 3eea9a461c SSL programs: allow invoking without arguments Manuel Pégourié-Gonnard 2023-06-26 11:29:35 +02:00
  • 0b74434e2a SSL programs: group options processing in 1 place Manuel Pégourié-Gonnard 2023-06-26 11:28:00 +02:00
  • 8eb6104256 bignum_mod_raw: Fixed a documentation typo. Minos Galanakis 2023-06-26 10:03:19 +01:00
  • 717a83164e Merge pull request #7807 from gilles-peskine-arm/mbedtls_ssl_protocol_version_str-no_array Gilles Peskine 2023-06-26 09:36:53 +02:00
  • e0c329b0cf test_suite_ecp.data: Limb aligned inputs Minos Galanakis 2023-06-25 23:33:28 +01:00
  • e43076700e Add PSA SHA-3 tests Dave Rodgman 2023-06-25 23:27:53 +01:00
  • 98083c6a17 Add support for SHA-3 in PSA Dave Rodgman 2023-06-25 23:27:45 +01:00
  • 163ec4090e Handle deleted files correctly Gilles Peskine 2023-06-25 22:18:40 +02:00
  • c7408a432e bignum_mod_raw: Adjusted OPT_RED limb size requirements for mod_raw_mul(). Minos Galanakis 2023-06-25 20:56:59 +01:00
  • a984d77f3a ecp_curves: Added dataset for SECP224K1 Coordinate Modulus. Minos Galanakis 2023-06-23 20:37:07 +01:00
  • 25d998b3b9 ecp_curves: Fixed modp pointers on mbedtls_ecp_modulus_setup. Minos Galanakis 2023-06-23 14:26:00 +01:00
  • e8e1e157cb Fix empty union when TLS is disabled Gilles Peskine 2023-06-25 21:41:58 +02:00
  • 6d00c67d89 Allow second run for ffdhe8192 ssl-opt tests Przemek Stekiel 2023-06-25 21:14:39 +02:00
  • 471a975942 aesce: do not specify an arch version when enabling crypto instructions Beniamin Sandu 2023-06-25 20:16:16 +03:00
  • 25d77cb9a7 Drop not-used items from the base look-up table Dave Rodgman 2023-06-24 22:58:51 +01:00
  • 4f8d2efec9 Improve docs Dave Rodgman 2023-06-24 18:40:29 +01:00
  • d30eed4d55 More struct re-ordering Dave Rodgman 2023-06-24 18:35:42 +01:00
  • 92cf6e52d3 Adjust stuct order for better packing / smaller accessor code size Dave Rodgman 2023-06-24 18:06:45 +01:00
  • 1b8a3b16c4 Add casts for enums in cipher.c Dave Rodgman 2023-06-24 17:32:43 +01:00
  • 2e8f6aabc2 Fix direct use of cipher_info->type Dave Rodgman 2023-06-24 17:32:18 +01:00
  • ef2f3697ec Fix direct reference to cipher_info->key_bitlen Dave Rodgman 2023-06-24 17:31:08 +01:00
  • e59b9d44b1 Fix some compiler type warnings Dave Rodgman 2023-06-24 16:53:13 +01:00
  • a2e2fce60d Fix accidental mis-named field Dave Rodgman 2023-06-24 14:44:27 +01:00
  • 77049b8b6c Dependency fixes Dave Rodgman 2023-06-24 14:39:47 +01:00
  • eb65fec023 Fix use of enum in a bitfield Dave Rodgman 2023-06-24 14:29:25 +01:00
  • 85a88133aa Use fewer bits for block_size Dave Rodgman 2023-06-24 11:41:50 +01:00
  • 3b46b77cf1 code style Dave Rodgman 2023-06-24 13:25:06 +01:00
  • de3de773e6 Use look-up table for base Dave Rodgman 2023-06-24 12:51:06 +01:00
  • 0ffb68ee3f Use fewer bits for iv_size Dave Rodgman 2023-06-24 11:30:45 +01:00
  • bb521fdbc9 Don't directly access iv_size Dave Rodgman 2023-06-24 11:21:25 +01:00
  • 6c6c84212e Use fewer bits for key_bitlen Dave Rodgman 2023-06-24 11:14:34 +01:00
  • 9282d4f13a Don't directly access key_bitlen Dave Rodgman 2023-06-24 11:03:04 +01:00
  • 3319ae9679 Re-order mbedtls_cipher_info_t Dave Rodgman 2023-06-24 10:55:04 +01:00
  • 48d13c5143 Use bit-fields Dave Rodgman 2023-06-24 10:53:37 +01:00
  • de33278e43 Unify ssl_calc_finished_tls_sha{256,384} Manuel Pégourié-Gonnard 2023-06-24 10:13:41 +02:00
  • 74970664a9 Unify ssl_calc_verify_sha{256,384} Manuel Pégourié-Gonnard 2023-06-24 09:43:26 +02:00
  • 0e93877b66 Reword the description of mbedtls_net_free() David Horstmann 2023-06-23 23:19:40 +01:00
  • 07c22c6708 Reword the description of mbedtls_net_free() David Horstmann 2023-06-23 23:19:40 +01:00
  • 9d7b24fb26 Fix extra character in debug string Gilles Peskine 2023-06-23 21:11:46 +02:00
  • f9c9c92a40 Change types in mbedtls_cipher_info_t Dave Rodgman 2023-06-23 16:22:26 +01:00
  • 4e5c63d652 Improve documentation in bn_mul.h Dave Rodgman 2023-06-23 15:17:37 +01:00
  • 43838b8a24 Add --since option to check files modified since a given commit Gilles Peskine 2023-06-22 20:29:41 +02:00
  • 22eb82cb8d Clean up subprocess invocation in get_src_files Gilles Peskine 2023-06-22 19:45:01 +02:00
  • 9a3a1a6ee7 Simplify directory name comparison in tests David Horstmann 2023-06-22 16:59:09 +01:00
  • 7b1093240c bignum_mod_raw: Updated documentation for mbedtls_mpi_mod_raw_mul Minos Galanakis 2023-06-16 14:28:36 +01:00
  • fee70a5342 test_suite_ecp: Extended ecp_mul_inv tests for optimised reduction. Minos Galanakis 2023-06-16 11:31:57 +01:00
  • 2ed8fb7e4f ecp_mod_raw: Enabled fast reduction. Minos Galanakis 2023-06-14 16:01:47 +01:00
  • 3048c8c906 Merge pull request #7725 from minosgalanakis/ecp/7268_add_optimised_reduction_setup_3 Paul Elliott 2023-06-22 16:30:39 +01:00
  • a5f7de1df2 Refactor injecting errors in the second round David Horstmann 2023-06-21 15:58:05 +01:00
  • 57727cd3fc Explain the sequence of mbedtls_psa_pake_ calls David Horstmann 2023-06-20 19:40:57 +01:00
  • 25c907071f Test extra inputs and outputs at the end of J-PAKE David Horstmann 2023-06-20 19:10:25 +01:00
  • a62d712cf8 Add testing for extra calls during a round David Horstmann 2023-06-15 17:46:56 +01:00
  • 88d25f0075 Remove unnecessary checks in psa_jpake_prologue() David Horstmann 2023-06-20 18:21:44 +01:00
  • e5b374adaf Remove comment explaining the state machine David Horstmann 2023-06-14 19:02:00 +01:00
  • 74a3d8c99c Simplify logic of driver step conversion David Horstmann 2023-06-14 18:28:19 +01:00
  • 5d878f6c5f Tweak wording for clarity David Horstmann 2023-06-14 18:09:43 +01:00
  • 1b54faed67 Remove unnecessary initialization of state David Horstmann 2023-06-14 18:05:52 +01:00
  • 16f0151887 Use memset for initialization David Horstmann 2023-06-14 17:21:07 +01:00
  • 279d227971 Add "completed" clarification to struct comments David Horstmann 2023-06-14 17:13:56 +01:00
  • 096093bac5 Remove redundant structures from previous design David Horstmann 2023-06-14 17:06:07 +01:00
  • 024e5c5f2e Rename struct member mode to io_mode David Horstmann 2023-06-14 15:48:21 +01:00
  • 00ad6bfabe Rename function_mode to io_mode David Horstmann 2023-06-14 15:44:24 +01:00
  • 5da9560178 Properly namespace enum values within PSA_JPAKE_ David Horstmann 2023-06-08 15:37:12 +01:00
  • e7f21e65b6 Change J-PAKE internal state machine David Horstmann 2023-05-12 18:17:21 +01:00
  • e25c43bd66 Merge pull request #7791 from valeriosetti/issue7406 Manuel Pégourié-Gonnard 2023-06-22 11:13:44 +02:00
  • 2a03fd3b7b bignum_mod: Added a typedef for OPT_RED function pointer. Minos Galanakis 2023-06-21 15:23:29 +01:00
  • 2fb9d00f6d Merge pull request #7682 from valeriosetti/issue7453 Manuel Pégourié-Gonnard 2023-06-22 09:45:57 +02:00
  • 6835b4a6ed tls: always zeroize buffer on exit Valerio Setti 2023-06-22 09:06:31 +02:00
  • 3589a4c644 tls: keep buffer declaration in a single line Valerio Setti 2023-06-22 09:02:44 +02:00
  • e6c9996d04 Work around updating pointers from ILP32 Dave Rodgman 2023-06-21 21:16:23 +01:00
  • 5b5dd011d1 code style Dave Rodgman 2023-06-21 16:36:47 +01:00
  • b5b6939fc2 Remove redundant checks in constant_time.c Dave Rodgman 2023-06-21 16:36:42 +01:00
  • 0400ae2f9b Fix pointer constraint in bn_mul.h Dave Rodgman 2023-06-21 16:14:46 +01:00
  • c54f25e26c code style Dave Rodgman 2023-06-21 13:39:30 +01:00
  • 140fa15a7f Improve changelog Dave Rodgman 2023-06-21 12:36:52 +01:00
  • 63e89b46f8 Use UINTPTR_MAX not SIZE_MAX Dave Rodgman 2023-06-21 11:55:17 +01:00
  • 63b50b56cd Merge pull request #7753 from lpy4105/backport-2.28/issue/renew_cert_2024-01-01 Gilles Peskine 2023-06-21 12:29:12 +02:00
  • 85842b8edb Be strict about pointer size in mbedtls_get_unaligned_volatile_uint32 Dave Rodgman 2023-06-21 11:22:09 +01:00