Commit Graph

  • 10e3963aa4 Add comparison of accel_ecdsa against reference Manuel Pégourié-Gonnard 2022-12-29 12:29:09 +01:00
  • 171c45feda Add component accel_ecdsa_use_psa Manuel Pégourié-Gonnard 2022-12-29 11:31:35 +01:00
  • 6d7db93bbb Enable TLS 1.3 in accelerated ECDSA test Manuel Pégourié-Gonnard 2022-12-28 09:48:01 +01:00
  • 200fd0f099 Add comments to accel_ecdsa component Manuel Pégourié-Gonnard 2022-12-27 13:03:10 +01:00
  • 462e3a9931 all.sh: restore config_test_driver.h automatically Manuel Pégourié-Gonnard 2022-12-27 12:35:11 +01:00
  • 242df48cab Fix pylint warnings about comparison to True David Horstmann 2023-01-05 10:02:09 +00:00
  • fa69def8e3 Fix incorrect typing of function in code_style.py David Horstmann 2023-01-05 09:59:35 +00:00
  • 78d566b216 Fix pylint warnings about comparison to True David Horstmann 2023-01-05 10:02:09 +00:00
  • 8d1d6edb0b Fix incorrect typing of function in code_style.py David Horstmann 2023-01-05 09:59:35 +00:00
  • 2ccd77ac83 Don't restyle end of file David Horstmann 2023-01-05 09:50:47 +00:00
  • 6d08dba4f6 Fix test function derive_key_exercise() Manuel Pégourié-Gonnard 2023-01-04 13:16:53 +01:00
  • bec95320ba Don't restyle end of file David Horstmann 2023-01-05 09:50:47 +00:00
  • 8e45cdd440 fix wrong dependency for X509_TRUSTED_CERTIFICATE_CALLBACK Valerio Setti 2023-01-05 09:32:29 +01:00
  • 8841d6b2f6 add missing dependency documentation for SSL_ASYNC_PRIVATE Valerio Setti 2023-01-05 08:40:24 +01:00
  • a651607b37 Skip restyling of PSA macros also defined in psa-arch-tests Gilles Peskine 2023-01-04 19:52:38 +01:00
  • 45873ceba3 Skip restyling of PSA error code definitions Gilles Peskine 2023-01-04 19:50:27 +01:00
  • b92d30f987 Check Uncrustify returncode in code_style.py David Horstmann 2023-01-04 18:33:25 +00:00
  • c571c5b1f0 Check Uncrustify returncode in code_style.py David Horstmann 2023-01-04 18:33:25 +00:00
  • d6818e3f94 Disable code style correction for bignum assembly David Horstmann 2023-01-04 17:50:08 +00:00
  • cb3b6ae580 Disable code style correction for bignum assembly David Horstmann 2023-01-04 17:50:08 +00:00
  • 67419f0e11 tls: fix + save code size when DEBUG_C is not enabled Valerio Setti 2023-01-04 16:12:42 +01:00
  • 40d9ca907b tls: remove useless legacy function Valerio Setti 2023-01-04 16:08:04 +01:00
  • e54f565d96 Stop testing Aria archive/new-code-style/test/rename-delete/old archive/new-code-style/test/old/rename-delete archive/new-code-style/test/good/old/rename-delete David Horstmann 2023-01-04 14:08:01 +00:00
  • 03c80b0ed5 Rename "cipher_xyz" files to "cypher_xyz" David Horstmann 2023-01-04 14:06:31 +00:00
  • ac41bf54ca test: verify that TLS and X509 are independent from mbedtls_ecp_curve functions archive/new-code-style/test/6863/new Valerio Setti 2022-12-30 17:45:05 +01:00
  • 5f10bedfb9 tls: remove dependency from mbedtls_ecp_curve functions Valerio Setti 2022-12-30 17:44:24 +01:00
  • 9502b56192 Fix test function derive_key_exercise() Manuel Pégourié-Gonnard 2023-01-04 13:16:53 +01:00
  • ab895c8c5e Remove duplicated function archive/new-code-style/test/good/new/6866 Przemek Stekiel 2023-01-03 13:35:54 +01:00
  • 2a4f744468 Remove generation of authorityKeyId_subjectKeyId.crt from makefile Przemek Stekiel 2023-01-03 10:35:51 +01:00
  • d32960b326 Rename back mbedtls_x509_parse_general_name->mbedtls_x509_parse_subject_alt_name Przemek Stekiel 2023-01-03 10:23:13 +01:00
  • 20082be063 Fix Subject Key Identifier, Authority Key Identifier entries in oid_x509_ext Przemek Stekiel 2023-01-03 09:45:13 +01:00
  • b80bbfca37 Adapt mbedtls_x509_crt_free after rebase Przemek Stekiel 2023-01-03 09:37:47 +01:00
  • c0f013f657 Adding missing ending of comment toth92g 2021-05-11 13:04:25 +02:00
  • 7dbc47e8e6 Adding some comments for easier understand toth92g 2021-05-11 12:55:58 +02:00
  • 58b1ec7db2 Removing whitespaces (to meet sanity checks) toth92g 2021-05-11 11:24:54 +02:00
  • d51d1c00c8 Removing obsolete test after merging and correcting missing macro toth92g 2021-05-11 10:46:54 +02:00
  • 3062d1f66c Renaming x509_get_subject_alt_name to x509_get_general_names and mbedtls_x509_parse_subject_alt_name to mbedtls_x509_parse_general_name so they can be used not only to collect subject alt name, but the V3 authority cert issuer that is also GeneralName type. Also updated the x509_get_general_names function to be able to parse rfc822Names toth92g 2021-05-10 15:16:33 +02:00
  • ef074c3624 - Removing obsolete test files (DER strings are used instead of them to minimize resource usage) - Renaming test functions to match the naming conventions toth92g 2021-05-06 08:22:17 +02:00
  • 4fa2b759c1 Correcting tests: - Wrong condition was checked (ref_ret != 0 instead of ref_ret == 0) - tags were not checked (nor lengths) - Using ASSERT_COMPARE where possible toth92g 2021-05-04 15:41:35 +02:00
  • e95bd6e264 Replacing tabs with spaces toth92g 2021-05-04 11:31:03 +02:00
  • f1eac715ed Correting findings: Using DER format instead of PEM while testing to minimize the resource usage. Comparation of byte arrays in test are now done via the dedicated ASSERT_COMPARE test macro for better understanding toth92g 2021-05-04 11:12:56 +02:00
  • 0d4cdffebc Correcting documentation issues: - Changelog entry is Feature instead of API Change - Correcting whitespaces around braces - Also adding defensive mechanism to x509_get_subject_key_id to avoid malfunction in case of trailing garbage toth92g 2021-04-27 15:41:25 +02:00
  • de503386cb Updating the new code parts based on the coding standards: adding missing whitespaces to brackets toth92g 2021-04-08 10:15:47 +02:00
  • d2bba1ad86 Updating the new code parts based on the coding standards: adding missing whitespaces to brackets toth92g 2021-04-08 10:12:52 +02:00
  • 67c6806055 x509parse tests used only last 16 bits of the return values. They are updated to check the whole 32 bit value toth92g 2021-03-11 10:51:06 +01:00
  • b81008b43d Replacing hard-coded literals with macros of the library in the new x509parse tests toth92g 2021-03-10 13:48:53 +01:00
  • 29ff62eee3 Adding openssl configuration file and command to Makefile to be able to reproduce the certificate for testing Authority and Subject Key Id fields Increasing heap memory size of SSL_Client2 and SSL_Server2, because the original value is not enough to handle some certificates. The AuthorityKeyId and SubjectKeyId are also parsed now increasing the size of some certificates toth92g 2021-02-22 13:17:32 +01:00
  • f7b9b78c9f Extracting SubjectKeyId and AuthorityKeyId in case of x509 V3 extensions. Updating mbedtls_x509_crt_free function to also free the new dynamic elements (issuer field of AuthorityKeyId). A few tests are also added which test the feature with a correct certificate and multiple ones with erroneous ASN1 tags. toth92g 2021-02-12 16:11:17 +01:00
  • 262851df1c Merge pull request #6868 from davidhorstmann-arm/workaround-uncrustify-asm-defines Gilles Peskine 2023-01-04 10:38:06 +01:00
  • d1a96b6b99 Merge pull request #6869 from davidhorstmann-arm/2.28-workaround-uncrustify-asm-defines Gilles Peskine 2023-01-04 10:37:55 +01:00
  • a4bb0fabea check_config: add missing dependencies for the build without BIGNUM Valerio Setti 2023-01-03 15:36:25 +01:00
  • e1655b8132 test: add test for building without BIGNUM_C Valerio Setti 2023-01-03 15:35:25 +01:00
  • 73260b6e65 test: extend test_suite_ssl for testing new functions Valerio Setti 2023-01-03 12:53:28 +01:00
  • acea8a11e9 Switch code style check to enforcement mode archive/new-code-style/test/6863/target Gilles Peskine 2022-12-09 12:23:35 +01:00
  • 71159f45ab Switch to the new code style David Horstmann 2023-01-03 12:51:59 +00:00
  • ff7d7c3a9a Remove duplicated function archive/new-code-style/test/good/old/6866 archive/new-code-style/test/6866/old Przemek Stekiel 2023-01-03 13:35:54 +01:00
  • 3322f611e6 test: verify that TLS and X509 are independent from mbedtls_ecp_curve functions Valerio Setti 2022-12-30 17:45:05 +01:00
  • 18c9fed857 tls: remove dependency from mbedtls_ecp_curve functions Valerio Setti 2022-12-30 17:44:24 +01:00
  • b6bf5f5533 Workaround Uncrustify parsing of "asm" David Horstmann 2023-01-03 11:07:09 +00:00
  • e3d8f31ba1 Workaround Uncrustify parsing of "asm" David Horstmann 2023-01-03 11:07:09 +00:00
  • 4664dc25d1 Remove generation of authorityKeyId_subjectKeyId.crt from makefile Przemek Stekiel 2023-01-03 10:35:51 +01:00
  • 23be8f74d5 Rename back mbedtls_x509_parse_general_name->mbedtls_x509_parse_subject_alt_name Przemek Stekiel 2023-01-03 10:23:13 +01:00
  • 2d182cff71 Fix Subject Key Identifier, Authority Key Identifier entries in oid_x509_ext Przemek Stekiel 2023-01-03 09:45:13 +01:00
  • 7cc28053e5 Adapt mbedtls_x509_crt_free after rebase Przemek Stekiel 2023-01-03 09:37:47 +01:00
  • 7a389ddc84 Merge pull request #6784 from valeriosetti/issue6702 Manuel Pégourié-Gonnard 2023-01-03 09:36:58 +01:00
  • 0e095673a3 Adding missing ending of comment toth92g 2021-05-11 13:04:25 +02:00
  • 93e4f76a3e Adding some comments for easier understand toth92g 2021-05-11 12:55:58 +02:00
  • 7e7f606ac7 Removing whitespaces (to meet sanity checks) toth92g 2021-05-11 11:24:54 +02:00
  • 1ad84156a8 Removing obsolete test after merging and correcting missing macro toth92g 2021-05-11 10:46:54 +02:00
  • d2df7ec050 Renaming x509_get_subject_alt_name to x509_get_general_names and mbedtls_x509_parse_subject_alt_name to mbedtls_x509_parse_general_name so they can be used not only to collect subject alt name, but the V3 authority cert issuer that is also GeneralName type. Also updated the x509_get_general_names function to be able to parse rfc822Names toth92g 2021-05-10 15:16:33 +02:00
  • 1b0c2e2c16 - Removing obsolete test files (DER strings are used instead of them to minimize resource usage) - Renaming test functions to match the naming conventions toth92g 2021-05-06 08:22:17 +02:00
  • a52ebe8376 Correcting tests: - Wrong condition was checked (ref_ret != 0 instead of ref_ret == 0) - tags were not checked (nor lengths) - Using ASSERT_COMPARE where possible toth92g 2021-05-04 15:41:35 +02:00
  • bf2dae1516 Replacing tabs with spaces toth92g 2021-05-04 11:31:03 +02:00
  • e763098b42 Correting findings: Using DER format instead of PEM while testing to minimize the resource usage. Comparation of byte arrays in test are now done via the dedicated ASSERT_COMPARE test macro for better understanding toth92g 2021-05-04 11:12:56 +02:00
  • 98fa4c9d0c Correcting documentation issues: - Changelog entry is Feature instead of API Change - Correcting whitespaces around braces - Also adding defensive mechanism to x509_get_subject_key_id to avoid malfunction in case of trailing garbage toth92g 2021-04-27 15:41:25 +02:00
  • fcdd0297b8 Updating the new code parts based on the coding standards: adding missing whitespaces to brackets toth92g 2021-04-08 10:15:47 +02:00
  • dd12390801 Updating the new code parts based on the coding standards: adding missing whitespaces to brackets toth92g 2021-04-08 10:12:52 +02:00
  • cdfdc680c0 x509parse tests used only last 16 bits of the return values. They are updated to check the whole 32 bit value toth92g 2021-03-11 10:51:06 +01:00
  • 8ff83052a3 Replacing hard-coded literals with macros of the library in the new x509parse tests toth92g 2021-03-10 13:48:53 +01:00
  • 434143976c Adding openssl configuration file and command to Makefile to be able to reproduce the certificate for testing Authority and Subject Key Id fields Increasing heap memory size of SSL_Client2 and SSL_Server2, because the original value is not enough to handle some certificates. The AuthorityKeyId and SubjectKeyId are also parsed now increasing the size of some certificates toth92g 2021-02-22 13:17:32 +01:00
  • 1bbc2fe986 Extracting SubjectKeyId and AuthorityKeyId in case of x509 V3 extensions. Updating mbedtls_x509_crt_free function to also free the new dynamic elements (issuer field of AuthorityKeyId). A few tests are also added which test the feature with a correct certificate and multiple ones with erroneous ASN1 tags. toth92g 2021-02-12 16:11:17 +01:00
  • e79fb03b7c test: verify that TLS and X509 are independent from mbedtls_ecp_curve functions archive/new-code-style/test/good/old/6863 archive/new-code-style/test/6863/old Valerio Setti 2022-12-30 17:45:05 +01:00
  • 6eca7b475d tls: remove dependency from mbedtls_ecp_curve functions Valerio Setti 2022-12-30 17:44:24 +01:00
  • 66edfe45f5 Use grep -E instead of egrep Ville Skyttä 2023-01-01 18:19:49 +02:00
  • b4b0bb737d Merge pull request #5907 from mpg/use-psa-rsa-pss Janos Follath 2022-12-30 12:33:50 +00:00
  • 4511ca063a Use PSS-signed CRL for PSS tests Manuel Pégourié-Gonnard 2022-12-30 10:13:41 +01:00
  • ea8c88fcbb test: fix some descriptions Valerio Setti 2022-12-29 11:08:35 +01:00
  • 6ea0a8d883 Disable 'wrong salt len' PK test with USE_PSA Manuel Pégourié-Gonnard 2022-12-29 10:07:08 +01:00
  • 62e1ebbbc7 changelog: fix text error Valerio Setti 2022-12-28 13:28:42 +01:00
  • c963bb11c7 test: remove SHA224 from default test driver config Valerio Setti 2022-12-28 12:58:14 +01:00
  • 3f93012bf1 Use config.py as a module in depends.py Andrzej Kurek 2022-10-26 08:08:26 -04:00
  • 1efe7fd988 Fix documentation archive/new-code-style/test/6844/old Gilles Peskine 2022-12-15 23:03:19 +01:00
  • 7f7630c0fe Refactoring: new method Algorithm.is_valid_for_operation Gilles Peskine 2022-12-15 22:41:34 +01:00
  • 4fa76bdc68 NotSupported is specifically about key types Gilles Peskine 2022-12-15 22:14:28 +01:00
  • b402e4bde1 Merge pull request #6595 from mfischer/lms_heap Gilles Peskine 2022-12-23 18:29:04 +01:00
  • 8eee21e3b3 Merge pull request #6836 from gilles-peskine-arm/code-style-more-kr-20221222 Gilles Peskine 2022-12-23 18:23:37 +01:00
  • a6ad7f4702 Merge pull request #6837 from gilles-peskine-arm/code-style-more-kr-20221222-2.28 Gilles Peskine 2022-12-23 18:23:24 +01:00
  • 7528986f97 Documentation improvements Gilles Peskine 2022-12-23 18:15:19 +01:00
  • 9d34cf3f0b Documentation improvements Gilles Peskine 2022-12-23 18:15:19 +01:00
  • 326cf46764 test: improved readability in sha self tests Valerio Setti 2022-12-23 14:57:18 +01:00