Commit Graph

  • 1d3e332986 ecp_curves: Updated input argument for mbedtls_ecp_modulus_setup. Minos Galanakis 2023-06-09 14:53:30 +01:00
  • be1bf15f76 bignum_mod: Updated optred_modulus_setup to use function input. Minos Galanakis 2023-06-09 14:47:55 +01:00
  • c6e68ed85d bignum_mod: Added mbedtls_mpi_opt_red_struct structure. Minos Galanakis 2023-06-09 14:43:55 +01:00
  • 0f718c9ed0 bignum_mod: Fixed code-style Minos Galanakis 2023-05-19 14:22:06 +01:00
  • f055ad61dc bignum_mod: Added static standard_modulus_setup(). Minos Galanakis 2023-05-09 15:44:46 +01:00
  • 88e16dfa2a bignum_mod: Refactored mbedtls_mpi_mod_modulus_setup() Minos Galanakis 2023-05-09 14:11:43 +01:00
  • 67ebaaf8a0 test_suite_bignum: Removed test_read_modulus(). Minos Galanakis 2023-05-09 14:26:26 +01:00
  • bbe9db4b29 binum_mod: Added mbedtls_mpi_mod_optred_modulus_setup(). Minos Galanakis 2023-05-09 10:37:21 +01:00
  • 680233dc3f Merge pull request #7680 from paul-elliott-arm/raw_ecp_mod_p448 Paul Elliott 2023-06-16 13:46:25 +01:00
  • eb0f18acbc Don't use inet_pton() before Windows Vista Steve Lhomme 2023-06-16 14:12:19 +02:00
  • d50a8cc77c Don't force the default windows version down Steve Lhomme 2023-06-16 13:36:25 +02:00
  • 954553f5b1 Don't call wincrypt on builds older than Windows XP Steve Lhomme 2023-06-16 13:41:48 +02:00
  • e07c670e47 Allow all.sh to override intrinsics vs asm selection Dave Rodgman 2023-06-16 13:21:28 +01:00
  • 838dc46a7b Test asm and intrinsics from all.sh Dave Rodgman 2023-06-16 13:18:19 +01:00
  • b46217d5c1 tls: never destroy a priavte key that is not owned/created by TLS module Valerio Setti 2023-06-16 13:18:52 +02:00
  • 01cc88a46b config_psa: replace USE symbols with BASIC one for all KEY_PAIRs Valerio Setti 2023-06-15 11:53:08 +02:00
  • 4590bc2933 test: run all the test suite in the temporary component and grep outcome file Valerio Setti 2023-06-13 15:39:23 +02:00
  • a1a0b1b348 test: add a temporary test for checking conversion for new symbols Valerio Setti 2023-06-13 14:19:03 +02:00
  • 4520a8f312 config_psa: only KEY_PAIR_USE includes PUBLIC_KEY Valerio Setti 2023-06-13 12:34:12 +02:00
  • aac957b493 config_psa: always enable PUBLIC_KEY when any KEY_PAIR is enabled Valerio Setti 2023-06-09 16:59:00 +02:00
  • ecbc9c77ea test_driver_extension: manage public and private keys the same way Valerio Setti 2023-06-09 16:24:48 +02:00
  • f4d7ede72c config_psa: fix logic for updating legacy symbols Valerio Setti 2023-06-09 12:10:33 +02:00
  • 38a3e8d10c config_psa: ECP_C do not enable ECC_KEY_PAIR_DERIVE Valerio Setti 2023-06-09 12:03:17 +02:00
  • 92214c7af3 crypto_config_test_driver_extension: remove leftover comment Valerio Setti 2023-06-09 12:00:07 +02:00
  • b0d9aaee1c psa: move PSA_WANT checks to check_crypto_config Valerio Setti 2023-06-09 11:58:29 +02:00
  • c51cba92a3 config_psa: avoid repetitions when including MBEDTLS symbols Valerio Setti 2023-06-09 11:41:03 +02:00
  • 01951f01ad changelog: added entries for explaining changes of this PR Valerio Setti 2023-06-08 15:59:03 +02:00
  • b7ef51a193 crypto: move legacy symbols support to a dedicated header file Valerio Setti 2023-06-06 14:32:58 +02:00
  • ddb577626d config_psa: add missing BUILTIN symbols when ECP_C is defined Valerio Setti 2023-06-06 14:17:15 +02:00
  • 89cb1444a5 config_psa: fix comment for LEGACY symbols Valerio Setti 2023-06-06 14:12:17 +02:00
  • 602ee2ed98 config_psa: remove support for PSA_WANT_KEY_TYPE_DH_KEY_PAIR_DERIVE Valerio Setti 2023-06-06 14:10:15 +02:00
  • a801b56600 config_psa: remove GENPRIME from enabled symbols of PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_USE Valerio Setti 2023-06-06 14:05:22 +02:00
  • 36befce51a config_psa: remove leftover comment on ECC derivation valerio 2023-05-31 14:43:06 +02:00
  • 323ad1c416 psa: fixing psa_crypto_generate_key.generated Valerio Setti 2023-05-26 17:47:55 +02:00
  • 64f790f662 test: fix python script for PSA test generation Valerio Setti 2023-05-26 13:50:20 +02:00
  • ff7f861761 tests: replace deprecated symbols with temporary _LEGACY ones Valerio Setti 2023-05-26 13:49:33 +02:00
  • 8bb5763a85 library: replace deprecated symbols with temporary _LEGACY ones Valerio Setti 2023-05-26 13:48:07 +02:00
  • f87b505511 config_psa: replace legacy symbols with new ones Valerio Setti 2023-05-26 13:47:09 +02:00
  • 8d6e98c170 psa: add support for legacy symbols Valerio Setti 2023-05-26 13:46:13 +02:00
  • 67a3e3eb7b crypto_config: introducing new definitions for PSA_WANT KEY_PAIRs Valerio Setti 2023-05-26 13:37:26 +02:00
  • 0813b6f28d tls: optimize code in ssl_get_ecdh_params_from_cert() Valerio Setti 2023-06-16 12:18:53 +02:00
  • a426dc31cc Merge pull request #7782 from gilles-peskine-arm/mbedtls_ecp_modulus_type-move Janos Follath 2023-06-16 11:12:57 +01:00
  • 24f467668e Merge pull request #7672 from mpg/libtestdriver1-helpers Manuel Pégourié-Gonnard 2023-06-16 11:43:40 +02:00
  • 9bb7e6f4ce Rename MBEDTLS_OPTIMIZE_ALWAYS Dave Rodgman 2023-06-16 09:41:21 +01:00
  • 48fd2ab5d5 Improve readability of unrolled AESCE code Dave Rodgman 2023-06-16 09:36:50 +01:00
  • 417ce2c574 Rename _USE to _BASIC Manuel Pégourié-Gonnard 2023-06-16 10:36:44 +02:00
  • f45a5a0ddd Merge pull request #7700 from silabs-Kusumit/PBKDF2_output_bytes Gilles Peskine 2023-06-16 10:08:02 +02:00
  • 2dd15b3ab5 code style Dave Rodgman 2023-06-15 20:27:53 +01:00
  • 379ff8754d Cover ecp.h Gilles Peskine 2023-06-15 21:15:21 +02:00
  • 3650a60586 Update changelog Dave Rodgman 2023-06-15 18:56:15 +01:00
  • 660cd378e1 Use MBEDTLS_OPTIMIZE_ALWAYS for gcm Dave Rodgman 2023-06-15 18:53:35 +01:00
  • 9149c32192 Use MBEDTLS_OPTIMIZE_ALWAYS for ccm Dave Rodgman 2023-06-15 18:50:21 +01:00
  • f88a68cf51 Use MBEDTLS_OPTIMIZE_ALWAYS in aesce Dave Rodgman 2023-06-15 18:46:41 +01:00
  • 6cfd9b54ae use MBEDTLS_OPTIMIZE_ALWAYS in AES-XTS Dave Rodgman 2023-06-15 18:46:23 +01:00
  • a0b166e11e Use mbedtls_xor_no_simd from cmac and cbc Dave Rodgman 2023-06-15 18:44:16 +01:00
  • 03bb526c24 Add a non-NEON variant of mbedtls_xor Dave Rodgman 2023-06-15 18:43:24 +01:00
  • b055f75c3d Introduce MBEDTLS_OPTIMIZE_ALWAYS Dave Rodgman 2023-06-15 18:42:59 +01:00
  • 7fdfd70b19 Introduce MBEDTLS_COMPILER_IS_GCC Dave Rodgman 2023-06-15 18:42:25 +01:00
  • 8c2f18dac2 Merge pull request #7738 from davidhorstmann-arm/fix-iar-typo Gilles Peskine 2023-06-15 19:24:00 +02:00
  • d5f4039227 Merge pull request #7739 from davidhorstmann-arm/2.28-fix-iar-typo Gilles Peskine 2023-06-15 19:23:56 +02:00
  • 637c049349 Move mbedtls_ecp_modulus_type out of the public headers Gilles Peskine 2023-06-15 19:07:41 +02:00
  • 246e51fd0b Add cleanup for intermediate buffer Kusumit Ghoderao 2023-06-15 22:15:43 +05:30
  • f75e65d90b Rename PSA_WANT_KEY_TYPE_xxx_KEY_PAIR_USE to ..._BASIC Gilles Peskine 2023-06-15 18:39:14 +02:00
  • 5bd4f17e4e Cover ECDH and DHM Gilles Peskine 2023-06-15 18:33:30 +02:00
  • b33d0ac532 Mention self-tests Gilles Peskine 2023-06-15 18:33:15 +02:00
  • a2e48f751b Split out mbedtls_ecp_mod_p448_raw() Paul Elliott 2023-06-02 16:00:05 +01:00
  • b4df176610 Merge pull request #7637 from paul-elliott-arm/fixed_ecp_mod_p448 Paul Elliott 2023-06-15 17:12:02 +01:00
  • 1c4451d089 Unroll aesce_decrypt_block Dave Rodgman 2023-06-15 16:28:00 +01:00
  • 96fdfb8e62 Unroll aesce_encrypt_block Dave Rodgman 2023-06-15 16:21:31 +01:00
  • 1f5c2ba495 Add missing ECDH dependencies in ssl-opt tests Przemek Stekiel 2023-06-15 17:04:44 +02:00
  • a05e9c1ec8 Fix selection of default FFDH group Przemek Stekiel 2023-06-15 16:58:51 +02:00
  • 8c0a95374f Adapt remaining guards to FFDH Przemek Stekiel 2023-06-15 16:48:19 +02:00
  • ce05f54283 Properly disable ECDH in only (psk) ephemeral ffdh key exchange components Przemek Stekiel 2023-06-15 16:44:08 +02:00
  • c6beb3a741 Rename NUL to null in x509 IP parsing description Andrzej Kurek 2023-06-15 09:54:37 -04:00
  • 7435651068 Reword changelog entry David Horstmann 2023-06-15 14:08:19 +01:00
  • ff4b6a8d18 Reword changelog entry David Horstmann 2023-06-15 14:08:19 +01:00
  • 0fe0c0cf10 Merge pull request #7775 from daverodgman/version_features_codesize Gilles Peskine 2023-06-15 14:56:00 +02:00
  • 7c5e567813 Merge pull request #7778 from daverodgman/p256-m-copyright Dave Rodgman 2023-06-15 13:37:00 +01:00
  • 2e7d57270e Merge pull request #7624 from daverodgman/aes-perf Dave Rodgman 2023-06-15 12:10:06 +01:00
  • 6edf8b8c7b Merge pull request #7451 from yanrayw/7376_aes_128bit_only Tom Cosgrove 2023-06-15 10:35:32 +01:00
  • 9866df96c6 Add copyright (as agreed with Manuel) Dave Rodgman 2023-06-15 10:11:49 +01:00
  • 41bb446d12 Update TEST_CA_CRT_EC_PEM and TEST_CA_CRT_EC_DER Pengyu Lv 2023-06-15 13:09:53 +08:00
  • 8d645dcd77 Fix unintentional config reduction in prev commit Manuel Pégourié-Gonnard 2023-06-15 09:07:10 +02:00
  • d07761c19c add return statement Kusumit Ghoderao 2023-06-15 12:11:15 +05:30
  • 04da85f0f4 Update TEST_SRV_CRT_EC_PEM and TEST_SRV_CRT_EC_DER Pengyu Lv 2023-06-15 13:01:35 +08:00
  • 55ef22c2cb mbedtls_config.h: add description for CTR_DRBG about AES-128 only Yanray Wang 2023-06-15 09:57:06 +08:00
  • 28a97acb3c code style Dave Rodgman 2023-06-14 20:15:15 +01:00
  • b28d1c3484 fix check-names failure Dave Rodgman 2023-06-14 20:05:01 +01:00
  • a53dca125e Limit number ffdh test cases (ffdhe2048, ffdhe8192) Przemek Stekiel 2023-06-14 20:53:09 +02:00
  • bed9ac7b2d Optimise final 2 rounds Paul Elliott 2023-06-14 19:20:33 +01:00
  • d05e7f1ab3 Do not use NEON for AES-CBC on aarch64 Dave Rodgman 2023-06-14 18:58:48 +01:00
  • f75903503b Merge pull request #7770 from valeriosetti/issue7341 Gilles Peskine 2023-06-14 19:22:46 +02:00
  • f22983bd1c Merge pull request #7411 from mprse/extract-key-ids-test Gilles Peskine 2023-06-14 19:16:29 +02:00
  • 906c63cf35 Revert "improve cbc encrypt perf" Dave Rodgman 2023-06-14 17:53:51 +01:00
  • b8f7305b02 Replace sizeof(mbedtls_mpi_uint) with ciL define Paul Elliott 2023-06-14 17:52:42 +01:00
  • 90dfc21f6b Shorten encoding of version features Dave Rodgman 2023-06-14 17:06:53 +01:00
  • 6966141561 Changelog entry for the MBEDTLS_CIPHER_BLKSIZE_MAX deprecation Gilles Peskine 2023-06-14 17:59:48 +02:00
  • c453e2e7e8 Officially deprecate MBEDTLS_CIPHER_BLKSIZE_MAX Gilles Peskine 2023-06-14 17:54:38 +02:00
  • 9e930e2887 Rename MBEDTLS_CIPHER_BLKSIZE_MAX internally Gilles Peskine 2023-06-14 17:52:54 +02:00
  • 7282a9e1a0 Replacement for MBEDTLS_CIPHER_BLKSIZE_MAX Gilles Peskine 2023-06-14 17:49:02 +02:00