Commit Graph

  • 9d65f0ef12 pk_wrap: simplify prototype of eckey_check_pair_psa() Valerio Setti 2023-04-07 08:53:17 +02:00
  • aad6306212 pkparse: fix guards position Valerio Setti 2023-04-04 12:58:15 +02:00
  • 3fddf250dc test: use proper macros for PSA init/done Valerio Setti 2023-04-04 10:49:28 +02:00
  • 4bf73ad83f pkparse: use proper sizing for buffer Valerio Setti 2023-04-04 10:48:57 +02:00
  • 34f6755b34 pkparse: add new function for deriving public key from private using PSA Valerio Setti 2023-04-03 15:19:18 +02:00
  • f286664069 pk_wrap: minor code optimizations Valerio Setti 2023-04-06 16:49:54 +02:00
  • 0a325b6767 ecp.py: Set test-dependencies as attributes. Minos Galanakis 2023-04-06 16:33:10 +01:00
  • 92278dc407 test_suite_ecp: Updated dependency macros for ecp_raw_generic. Minos Galanakis 2023-03-29 11:41:21 +01:00
  • 1358648f77 test_suite_ecp: Introduced ecp_mod_p_generic_raw Minos Galanakis 2023-03-21 12:08:37 +00:00
  • 0b3de6fcec Merge pull request #7288 from ronald-cron-arm/tls13-server-version-negotiation Dave Rodgman 2023-04-06 16:26:19 +01:00
  • 3615be65f8 Merge pull request #7342 from gabor-mezei-arm/6679_prevent_mpi_mod_write_from_corrupting_the_input Janos Follath 2023-04-06 15:56:28 +01:00
  • 44c6694be7 Merge pull request #7351 from gabor-mezei-arm/7109_ecp_fast_reduction_testing Janos Follath 2023-04-06 15:55:19 +01:00
  • 02326d5083 Test key_derivation_input_integer function Kusumit Ghoderao 2023-04-06 17:47:59 +05:30
  • 50e0e11213 Add key_derivation_input_integer function Kusumit Ghoderao 2023-04-06 17:47:25 +05:30
  • 0e03f4c119 Remove unnecessary include Andrzej Kurek 2023-04-06 07:55:25 -04:00
  • 8c1ce223eb tests: ssl: Restore !MBEDTLS_SSL_PROTO_TLS1_3 dependency Ronald Cron 2023-04-06 13:14:57 +02:00
  • dad02b2bec tls13: srv: Fix comment Ronald Cron 2023-04-06 09:57:52 +02:00
  • fe01ec2d57 tls12: srv: Use sizeof() instead of constant Ronald Cron 2023-04-06 09:56:53 +02:00
  • c564938180 Add downgrade protection mechanism Ronald Cron 2023-04-04 15:33:42 +02:00
  • e45afd760d Use specific pointer to loop over proposed cipher suites Ronald Cron 2023-04-04 15:10:06 +02:00
  • 1a353ea4b8 ssl-opt.sh: Improve description of server negotiation tests Ronald Cron 2023-04-04 14:55:57 +02:00
  • eff5673e09 Improve and align variable names for supported versions data Ronald Cron 2023-04-03 17:36:31 +02:00
  • 3bd2b02486 Check for TLS 1.3 version first Ronald Cron 2023-04-03 16:45:39 +02:00
  • b828c7d3de Fix, improve and add comments Ronald Cron 2023-04-03 16:37:22 +02:00
  • 4d31496294 Update TLS 1.3 documentation and add change log Ronald Cron 2023-03-14 16:46:22 +01:00
  • d120bd646c ssl-opt.sh: Add version selection by the server tests Ronald Cron 2023-03-14 15:43:17 +01:00
  • 50ae84ed97 ssl-opt.sh: Remove some unnecessary forcing of TLS 1.3 Ronald Cron 2023-03-14 08:59:56 +01:00
  • 097ba146e7 tls: srv: Set hybrid TLS 1.2/1.3 as default configuration Ronald Cron 2023-03-08 16:18:00 +01:00
  • 43263c045a tests: ssl: Extend move to handshake state tests Ronald Cron 2023-03-09 16:48:10 +01:00
  • 3b35455a69 tls: srv: Allow server hybrid TLS 1.2 and 1.3 configuration Ronald Cron 2023-03-08 15:59:41 +01:00
  • 6291b23080 tls: Add logic in handshake step to enable server version negotiation Ronald Cron 2023-03-08 15:51:25 +01:00
  • 8a12aeec93 tls: Initialize SSL context tls_version in mbedtls_ssl_setup() Ronald Cron 2023-03-08 15:30:43 +01:00
  • 5af4c7f0e2 tls13: srv: Add detection to negotiate TLS 1.2 Ronald Cron 2023-03-07 20:46:59 +01:00
  • 8c527d0be8 tls13: srv: Parse supported versions extension early Ronald Cron 2023-03-07 15:47:47 +01:00
  • 2f16b4ec66 tls13: srv: Postpone cipher suite selection Ronald Cron 2023-03-07 10:07:32 +01:00
  • cada410365 tls13: srv: Postpone legacy session id copy Ronald Cron 2023-03-07 09:51:39 +01:00
  • d540d995b2 tls13: srv: Postpone client random copy Ronald Cron 2023-03-07 09:41:48 +01:00
  • 6458239b36 tls13: srv: Move TLS version setting Ronald Cron 2023-03-07 09:21:40 +01:00
  • 47dce630f4 tls13: Add function to search for a supported_versions extension Ronald Cron 2023-02-08 17:38:29 +01:00
  • f95d169d60 ssl-opt.sh: Force TLS 1.2 on TLS 1.2 specific tests Ronald Cron 2023-03-14 17:19:42 +01:00
  • fd4c6afcb4 ssl-opt.sh: Force TLS 1.2 version Ronald Cron 2023-03-11 10:46:01 +01:00
  • 92dca39196 ssl-opt.sh: Extend scope of some tests to TLS 1.3 Ronald Cron 2023-03-10 16:11:15 +01:00
  • 0aa1b8843f ssl-opt.sh: Remove unnecessary explicit MBEDTLS_SSL_PROTO_TLS1_2 dep Ronald Cron 2023-03-10 14:00:52 +01:00
  • 65f9029741 ssl-opt.sh: Remove unnecessary TLS 1.3 forcing on client side Ronald Cron 2023-03-13 17:38:12 +01:00
  • c341ad717e ssl-opt.sh: Remove dummy TLS 1.3 kex modes tests Ronald Cron 2023-03-10 14:02:07 +01:00
  • ea8a1ea17a tests: ssl: Add some missing dependencies Ronald Cron 2023-03-17 09:13:27 +01:00
  • a697a71a14 tests: ssl: Move min/max TLS version setting to endpoint init Ronald Cron 2023-03-09 17:47:42 +01:00
  • bcf2f66a11 Merge pull request #7324 from minosgalanakis/bignum/remove-scaffolding Janos Follath 2023-04-06 09:21:55 +01:00
  • 468a99ed0b Add a changelog entry Andrzej Kurek 2023-04-05 17:50:43 -04:00
  • 45e32033db cert_audit: Support audit on test suite data files Pengyu Lv 2023-04-06 14:33:41 +08:00
  • 7f6933a227 cert_audit: Initial script for auditing expiry date Pengyu Lv 2023-04-04 16:05:54 +08:00
  • 316b7dd19c Add a justification for early md.h include in programs Andrzej Kurek 2023-04-05 14:44:38 -04:00
  • da86e2e5bd Revert to using MBEDTLS_SHA_1_C when mbedtls_sha1 is called directly Andrzej Kurek 2023-04-05 14:39:22 -04:00
  • eaea30d30e Remove duplicated md.h includes Andrzej Kurek 2023-04-05 14:36:51 -04:00
  • 00bd8925a7 bignum: Removed merge scaffolding. Minos Galanakis 2023-03-21 10:04:12 +00:00
  • 36c66a87d7 Clarify LTS lifetime Janos Follath 2023-03-30 14:59:31 +01:00
  • 725688b143 Fix code style Przemek Stekiel 2023-04-04 22:49:44 +02:00
  • 294ec1274d Remove redundant memory relase for authorityCertIssuer Przemek Stekiel 2023-04-03 10:20:08 +02:00
  • 39dbe23845 Release memory for subject alt name in test Przemek Stekiel 2023-04-03 10:19:22 +02:00
  • 79354c3c4d Use MBEDTLS_MD_CAN_SHA1 macro as test dependency Przemek Stekiel 2023-03-31 09:31:22 +02:00
  • 21903ec860 Fix after rebase Przemek Stekiel 2023-02-21 08:32:37 +01:00
  • 09720e2228 Remove redundant test cases Przemek Stekiel 2023-02-09 09:49:35 +01:00
  • 019842119d Adapt test for authority_key_id (parsing subject alt name) Przemek Stekiel 2023-02-09 09:29:34 +01:00
  • 4f3e7b934e Fix parsing of authorityCertIssuer Przemek Stekiel 2023-02-03 15:03:59 +01:00
  • 75653b1df0 Add indication of extension error while parsing authority/subject key id Przemek Stekiel 2023-02-01 11:31:32 +01:00
  • 6ec839a1f9 x509_get_authority_key_id: add length check + test Przemek Stekiel 2023-02-01 11:06:08 +01:00
  • 8661fed943 Fix tests dependencies Przemek Stekiel 2023-01-31 08:30:06 +01:00
  • 3520fe6fda Use MBEDTLS_ERROR_ADD() and tag macros Przemek Stekiel 2023-01-30 14:38:18 +01:00
  • 8a13866f65 Remove parsing of rfc822Name Przemek Stekiel 2023-01-30 12:29:11 +01:00
  • a2939e8728 Remove duplicated function Przemek Stekiel 2023-01-03 13:35:54 +01:00
  • 240cbe4040 Remove generation of authorityKeyId_subjectKeyId.crt from makefile Przemek Stekiel 2023-01-03 10:35:51 +01:00
  • 9a511c5bdf Rename back mbedtls_x509_parse_general_name->mbedtls_x509_parse_subject_alt_name Przemek Stekiel 2023-01-03 10:23:13 +01:00
  • db323aa241 Fix Subject Key Identifier, Authority Key Identifier entries in oid_x509_ext Przemek Stekiel 2023-01-03 09:45:13 +01:00
  • 62d8f84be2 Adapt mbedtls_x509_crt_free after rebase Przemek Stekiel 2023-01-03 09:37:47 +01:00
  • 9232e0ad84 Adding some comments for easier understand toth92g 2021-05-11 12:55:58 +02:00
  • 9085cff438 Removing obsolete test after merging and correcting missing macro toth92g 2021-05-11 10:46:54 +02:00
  • 8d435a0c8b Renaming x509_get_subject_alt_name to x509_get_general_names and mbedtls_x509_parse_subject_alt_name to mbedtls_x509_parse_general_name so they can be used not only to collect subject alt name, but the V3 authority cert issuer that is also GeneralName type. Also updated the x509_get_general_names function to be able to parse rfc822Names toth92g 2021-05-10 15:16:33 +02:00
  • 5042b104c2 - Removing obsolete test files (DER strings are used instead of them to minimize resource usage) - Renaming test functions to match the naming conventions toth92g 2021-05-06 08:22:17 +02:00
  • 357b297b16 Correcting tests: - Wrong condition was checked (ref_ret != 0 instead of ref_ret == 0) - tags were not checked (nor lengths) - Using ASSERT_COMPARE where possible toth92g 2021-05-04 15:41:35 +02:00
  • 2d2fb3a5a7 Correting findings: Using DER format instead of PEM while testing to minimize the resource usage. Comparation of byte arrays in test are now done via the dedicated ASSERT_COMPARE test macro for better understanding toth92g 2021-05-04 11:12:56 +02:00
  • d96027acd2 Correcting documentation issues: - Changelog entry is Feature instead of API Change - Correcting whitespaces around braces - Also adding defensive mechanism to x509_get_subject_key_id to avoid malfunction in case of trailing garbage toth92g 2021-04-27 15:41:25 +02:00
  • 0e2e2d6841 x509parse tests used only last 16 bits of the return values. They are updated to check the whole 32 bit value toth92g 2021-03-11 10:51:06 +01:00
  • 3c2243c6d5 Replacing hard-coded literals with macros of the library in the new x509parse tests toth92g 2021-03-10 13:48:53 +01:00
  • 27f9e7815c Adding openssl configuration file and command to Makefile to be able to reproduce the certificate for testing Authority and Subject Key Id fields Increasing heap memory size of SSL_Client2 and SSL_Server2, because the original value is not enough to handle some certificates. The AuthorityKeyId and SubjectKeyId are also parsed now increasing the size of some certificates toth92g 2021-02-22 13:17:32 +01:00
  • a41954d0cf Extracting SubjectKeyId and AuthorityKeyId in case of x509 V3 extensions. Updating mbedtls_x509_crt_free function to also free the new dynamic elements (issuer field of AuthorityKeyId). A few tests are also added which test the feature with a correct certificate and multiple ones with erroneous ASN1 tags. toth92g 2021-02-12 16:11:17 +01:00
  • 56f59d749c Merge pull request #7394 from mprse/fix_pkcs7_test_alloc Dave Rodgman 2023-04-04 15:46:59 +01:00
  • 1b75e5f784 Add missing md.h includes Andrzej Kurek 2023-04-04 09:55:06 -04:00
  • 13c73de6de Merge pull request #6233 from tom-cosgrove-arm/issue-6226-core-mul Janos Follath 2023-04-04 13:36:22 +01:00
  • 219f978097 Merge pull request #7059 from ronald-cron-arm/psa-crypto-misc Ronald Cron 2023-04-04 10:54:03 +02:00
  • 98680fc2ed ecp: revert changes to ECP module and test suite Valerio Setti 2023-04-04 10:22:59 +02:00
  • 8eb552647f pk_wrap: fix sizing for private key buffer Valerio Setti 2023-04-04 10:20:53 +02:00
  • 9735be5ef3 Fix memory allocations in pkcs7_verify test Przemek Stekiel 2023-04-04 09:07:10 +02:00
  • d62605126d Fix documentation Gabor Mezei 2023-04-03 17:32:55 +02:00
  • b0f013784f Multplication is simmetric so only generate unique combinations Gabor Mezei 2023-04-03 17:26:44 +02:00
  • 86d5d4bf31 Merge pull request #7103 from valeriosetti/issue6622 Manuel Pégourié-Gonnard 2023-04-03 16:23:27 +02:00
  • f3dc4a1a21 fixed guard position for doxygen Valerio Setti 2023-04-03 15:37:53 +02:00
  • 0fe1ee27e5 pk: add an alternative function for checking private/public key pairs Valerio Setti 2023-04-03 14:42:22 +02:00
  • f8b55d6358 Fix code style issues Gabor Mezei 2023-04-03 14:13:46 +02:00
  • 3a3a756431 adding missing newline at the end of changelog file Valerio Setti 2023-04-03 10:55:29 +02:00
  • 384e84849d Update BRANCHES.md Janos Follath 2023-04-03 09:46:33 +01:00