Valerio Setti
653a86dc2a
CMakeLists: prepare for Everest headers relocation
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-06-17 09:09:47 +02:00
Ronald Cron
a3b562aa17
programs: test: Let zeroize be an Mbed TLS test program
...
In TF-PSA-Crypto there is the crypto specific one.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2025-06-16 15:55:05 +02:00
Ronald Cron
0815c67ce1
programs: pkey: Use tf-psa-crypto/build_info.h
...
pkey programs are crypto programs (only linked to
the TF-PSA-Crypto library) thus use the TF-PSA-Crypto
build-time configuration info file
tf-psa-crypto/build_info.h instead of the Mbed TLS one.
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
2025-06-16 15:54:49 +02:00
Valerio Setti
3de417fce2
scripts: generate_visualc_files.pl: prepare for Everest headers relocation
...
This change allows the Perl script to manage Everest headers in
tf-psa-crypto repo both before and after psa#235. Once psa#235 will be
merged this commit can be simplified, i.e. it will be returned to its
original state with paths of Everest headers updated.
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-06-16 15:04:27 +02:00
Manuel Pégourié-Gonnard
48552b620d
Merge pull request #10187 from valeriosetti/ecp-restartable-development
...
[development] Always enable MBEDTLS_PK_USE_PSA_EC_DATA + use PSA interruptible operations as backend for PK restartable ones
2025-06-16 07:24:50 +00:00
David Horstmann
d177e3f5fc
Merge pull request #1356 from Mbed-TLS/bugfix_1351_1352_1353_lms_drivers
...
Bugfix: lms/lmots driver hardening.
2025-06-13 15:48:29 +01:00
Manuel Pégourié-Gonnard
3a21cdfa5c
Merge pull request #1354 from mpg/fix-asn1-store-named-data-null-deref-dev
...
Fix asn1 store named data null deref dev
2025-06-13 09:57:24 +02:00
Ronald Cron
b1d3e2e4e0
Merge pull request #9634 from gabor-mezei-arm/9144_update_depends.py_hashes_domain
...
Update the `hashes` domain to use PSA macros in `depends.py`
2025-06-13 07:25:04 +00:00
Manuel Pégourié-Gonnard
f5a63d1456
Fix invalid test data by aligning with 3.6
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-06-12 09:42:03 +02:00
Manuel Pégourié-Gonnard
dc82fa67c5
Keep only the X.509 part from the Changelog
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-06-12 09:42:03 +02:00
Manuel Pégourié-Gonnard
5f6310b65f
Add ChangeLog entry
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-06-12 09:42:03 +02:00
Manuel Pégourié-Gonnard
d2262f2304
Uncomment tests now that crypto is fixed
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-06-12 09:42:03 +02:00
Manuel Pégourié-Gonnard
d1090d70ff
Update crypto submodule
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
2025-06-12 09:42:03 +02:00
Valerio Setti
d7d0acbeb6
tf-psa-crypto: update reference
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-06-12 06:40:35 +02:00
Valerio Setti
a81d6dfb05
tests|programs: remove usage of mbedtls_ecp_set_max_ops()
...
PK restartable operations are now implemented using PSA interruptible
ones, so mbedtls_ecp_set_max_ops() can be removed in favor of
psa_interruptible_set_max_ops().
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-06-12 06:39:18 +02:00
Valerio Setti
eaf578978e
library: remove ECDSA_C dependency from ECP_RESTARTABLE
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-06-12 06:37:29 +02:00
Valerio Setti
c394fd0ebc
library: debug: replace MBEDTLS_PK_USE_PSA_EC_DATA with PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY
...
MBEDTLS_PK_USE_PSA_EC_DATA is a legacy symbol that is used in 3.6 LTS
branch, but now it is assumed to be always true. It's only kept for
legacy reasons so it's better to replace it with
PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY instead.
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-06-12 06:35:45 +02:00
Valerio Setti
ae89dcc4be
library: tls12: remove usage of MBEDTLS_PK_USE_PSA_EC_DATA
...
PK module will now always use PSA storing pattern when working with
EC keys therefore MBEDTLS_PK_USE_PSA_EC_DATA is assumed to be always
enabled.
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
2025-06-12 06:21:30 +02:00
Ari Weiler-Ofek
6ee4d9220e
Fixed the same typo in ssl-opt.sh
...
Signed-off-by: Ari Weiler-Ofek <ari.weiler-ofek@arm.com>
2025-06-11 17:40:42 +01:00
Gilles Peskine
c2b7f85747
Merge pull request #10206 from felixc-arm/doxygen-doxyfile-public-only
...
Doxygen: Only render public files
2025-06-11 16:01:07 +00:00
Felix Conway
035247d46f
Re-add doxygen/input to INPUT variable
...
Signed-off-by: Felix Conway <felix.conway@arm.com>
2025-06-11 11:07:10 +01:00
Minos Galanakis
67f63821a5
Updated tf-psa-crypto pointer
...
Signed-off-by: Minos Galanakis <minos.galaanakis@arm.com>
2025-06-11 10:38:44 +01:00
Felix Conway
1704578f2f
Update tf-psa-crypto pointer to bring in doxygen pre-work
...
Signed-off-by: Felix Conway <felix.conway@arm.com>
2025-06-11 10:22:55 +01:00
Felix Conway
4f94ae8baa
Doxygen: only render public files
...
Signed-off-by: Felix Conway <felix.conway@arm.com>
2025-06-11 10:22:55 +01:00
Felix Conway
c6654fc1b0
Replace MBEDTLS_ERR_ECP_IN_PROGRESS with alias PSA_OPERATION_INCOMPLETE in documentation
...
Signed-off-by: Felix Conway <felix.conway@arm.com>
2025-06-11 10:22:55 +01:00
Gilles Peskine
96e17e8b36
Merge pull request #10204 from felixc-arm/remove-mbedtlsplatformc-requirements
...
Remove requirment on MBEDTLS_PLATFORM_C in configs
2025-06-11 08:22:43 +00:00
Ari Weiler-Ofek
67aa959ea1
Fixed some minor typos in comments.
...
Signed-off-by: Ari Weiler-Ofek <ari.weiler-ofek@arm.com>
2025-06-10 16:59:44 +01:00
Gabor Mezei
3795f8ab74
Remove temporary component created for SHA3 testing
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
2025-06-10 15:40:53 +02:00
Gabor Mezei
ef013a6970
Use PSA macros for the hashes
domain
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
2025-06-10 15:40:41 +02:00
Felix Conway
c54da23c76
Update tf-psa-crypto pointer
...
Signed-off-by: Felix Conway <felix.conway@arm.com>
2025-06-10 13:45:34 +01:00
Felix Conway
43c891ae98
Remove requirement on MBEDTLS_PLATFORM_C from configs
...
Signed-off-by: Felix Conway <felix.conway@arm.com>
2025-06-10 13:45:34 +01:00
Manuel Pégourié-Gonnard
cdd91da1af
Merge pull request #10145 from gabor-mezei-arm/remove_sha3_config_option
...
Remove `MBEDTLS_SHA3_C` config option
2025-06-10 09:57:22 +00:00
Gabor Mezei
2649800f7c
Do not disable PSA_WANT_SHA3
macros when driver accel is used
...
The SW implementation is guarded with the `MBEDTLS_PSA_BUILTIN_ALG_SHA3`
macros and not enabled when driver accelaration is set. So disabling
the `PSA_WANT` macros is not needed.
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
2025-06-05 14:01:30 +02:00
Gabor Mezei
c45f3d6a1d
Update PSA repo
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
2025-06-05 14:01:25 +02:00
Ben Taylor
83e5a7bf75
update framework submodule to pull in everest changes
...
Signed-off-by: Ben Taylor <ben.taylor@linaro.org>
2025-06-05 11:26:51 +01:00
Ben Taylor
de864e7a1c
Remove ChangeLog as it is not required
...
Signed-off-by: Ben Taylor <ben.taylor@linaro.org>
2025-06-05 11:26:51 +01:00
Ben Taylor
40bc348963
corrected ChangeLog
...
Signed-off-by: Ben Taylor <ben.taylor@linaro.org>
2025-06-05 11:26:51 +01:00
Ben Taylor
142347383f
Add ChangeLog for removal of everest headers
...
Signed-off-by: Ben Taylor <ben.taylor@linaro.org>
2025-06-05 11:26:51 +01:00
Ben Taylor
243b54f386
update further everest paths
...
Signed-off-by: Ben Taylor <ben.taylor@linaro.org>
2025-06-05 11:26:51 +01:00
Ben Taylor
2d6374a0f9
adjust everest header paths in generate_visualc_files.pl
...
Signed-off-by: Ben Taylor <ben.taylor@linaro.org>
2025-06-05 11:26:51 +01:00
Gilles Peskine
b4cbc156ef
Merge pull request #10192 from valeriosetti/fixes-for-ecp-restartable-part2
...
[development] Some pre-requisites for psa#299
2025-06-05 07:50:53 +00:00
Manuel Pégourié-Gonnard
e8061342a2
Merge pull request #10173 from gilles-peskine-arm/oid-split-x509
...
OID: make X.509 independent from crypto
2025-06-04 08:26:59 +00:00
Gabor Mezei
72cc7bb706
Start the generation at the beginning of the line
...
The markers for the generated code need to indented due to the code style check.
During the replacement remove the spaces along with the markers.
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
2025-06-03 17:49:23 +02:00
Gabor Mezei
588769cc65
Update error generation
...
Adapt the `generate_errors.pl` to handle `PSA_WANT` macros and
update to handle SHA3 macros.
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
2025-06-03 17:49:23 +02:00
Gabor Mezei
4aa974f7c7
Remove MBEDTLS_SHA3_C
config option
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
2025-06-03 17:49:23 +02:00
Gilles Peskine
7e7dc6fdda
Align endif comments with auxiliary macros
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-06-03 15:51:34 +02:00
Gilles Peskine
9e147f264c
Exclude crypto's oid.h now that it is in mbedtls
...
Otherwise Doxygen complains about two `\file` with the same name.
This is a temporary exclusion which can be removed once crypto no longer has
an oid.h.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-06-03 15:51:34 +02:00
Gilles Peskine
53e11cb5d5
Changelog entry for the OID module in Mbed TLS 4.0
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-06-03 15:51:34 +02:00
Gilles Peskine
dcd43fcc45
Move oid_xxx_numeric_string back to oid.h
...
The header `mbedtls/oid.h` now belongs to the X.509 library. Move the
declarations of `mbedtls_oid_get_numeric_string()` and
`mbedtls_oid_from_numeric_string()` back to this header, which is where they
were in all previous releases of Mbed TLS. This avoids gratuitously breaking
backward compatibility.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-06-03 15:51:34 +02:00
Gilles Peskine
b828820f7a
Declare oid_xxx_numeric_string only when they are defined
...
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-06-03 15:51:34 +02:00