Skip to content

Merge mbedtls/development-psa, mbedtls/development into development #51

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 629 commits into from
Feb 15, 2019
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
629 commits
Select commit Hold shift + click to select a range
541aa69
Implement parameter validation for Blowfish module
Dec 12, 2018
e38b4cd
Test parameter validation for Blowfish module
Dec 12, 2018
49acc64
Minor improvements to Blowfish documentation and tests
Dec 17, 2018
f947c0a
Move testing of mbedtls_blowfish_free() to separate test case
Dec 17, 2018
3d9a349
Improve Blowfish documentation
Dec 17, 2018
20376d6
Don't promise that passing NULL input to Blowfish works
Dec 18, 2018
1f19fa6
PK: Fix free(NULL) in library and tests
gilles-peskine-arm Dec 19, 2018
70ded36
Minor improvements to Camellia module and documentation
Dec 19, 2018
ed54128
Minor Blowfish documentation improvements
Dec 19, 2018
df4b596
Minor Camellia documentation improvements
Dec 19, 2018
159171b
PK parse/write: support keylen=0 correctly
gilles-peskine-arm Dec 19, 2018
cc274c2
Do run the valid parameters test function
gilles-peskine-arm Dec 19, 2018
998fbfb
Properly test pk_write with an empty output buffer
gilles-peskine-arm Dec 19, 2018
ee3cfec
PK sign/verify: hash=NULL is ok if md_alg=0 and hash_len=0
gilles-peskine-arm Dec 19, 2018
8ce11a3
Minor improvements to bignum module
Dec 19, 2018
8ffc92a
Add parameter validation for the GCM module
k-stachowiak Dec 12, 2018
5fccb3e
Add tests for valid NULL in gcm_free()
k-stachowiak Dec 12, 2018
2ae7ae5
Doxygen comments improvement
k-stachowiak Dec 13, 2018
9af22e4
Update change log
k-stachowiak Dec 13, 2018
21298a2
Improve parameter validation in mbedtls_gcm_free()
k-stachowiak Dec 13, 2018
6009ece
Increase strictness of NULL parameter validity in GCM's doxygen
k-stachowiak Dec 19, 2018
e0215d7
Add Cipher module parameter validation
Dec 17, 2018
a539070
Make all parameter validation tests optional
k-stachowiak Dec 17, 2018
d5913bc
Improve documentation of the parameter validation in the Cipher module
k-stachowiak Dec 18, 2018
c29d94c
Account for optional NULL buffer arguments in the Cipher module
k-stachowiak Dec 18, 2018
90b8d4a
Include static cipher functions in the parameter validation scheme
k-stachowiak Dec 18, 2018
5b01f8b
Add a new line at the end of the test data file
k-stachowiak Dec 18, 2018
d409285
Add a change log entry
k-stachowiak Dec 18, 2018
6df25e7
Increase strictness of NULL parameter validity in Cipher's doxygen
k-stachowiak Dec 19, 2018
95070a8
Make some cipher parameter validation unconditional
k-stachowiak Dec 19, 2018
e4b8d28
Remove imprecise clause from documenting comment
k-stachowiak Dec 19, 2018
1a9df6b
Improve style in the Cipher module
k-stachowiak Dec 19, 2018
516897a
Remove unnecessary parameter validation from the Cipher module
k-stachowiak Dec 19, 2018
d54b975
pk parse: the password is optional
gilles-peskine-arm Dec 19, 2018
8c71b3e
pk_parse*keyfile: explicitly validate path=NULL
gilles-peskine-arm Dec 19, 2018
f25ee7f
Fix parameter validation for mbedtls_mpi_lsb()
Dec 19, 2018
a85edd9
Split the unconditional and conditional parameter validation tests
k-stachowiak Dec 19, 2018
6af45ec
PK: document context validity requirements
gilles-peskine-arm Dec 19, 2018
fb54360
Prevent unused variable in some configurations
k-stachowiak Dec 19, 2018
26d365e
Add parameter validation for CCM
k-stachowiak Dec 11, 2018
438448e
Format NULL occurrences in CCM's Doxygen comments
k-stachowiak Dec 11, 2018
fd42d53
Explicitly allow NULL as an argument to mbedtls_ccm_free()
k-stachowiak Dec 11, 2018
ff8a098
Allow empty arguments in some CCM functions' parameter validation
k-stachowiak Dec 11, 2018
f712534
Add missing validation code in CCM
k-stachowiak Dec 11, 2018
12f0d5c
Improve the constraints definition in the doxygen comments in CCM
k-stachowiak Dec 11, 2018
508bcd9
Remove unneeded test for the CCM free function
k-stachowiak Dec 11, 2018
dd63359
Add tests for valid NULL in ccm_free()
k-stachowiak Dec 12, 2018
b92f933
Doxygen comments improvement
k-stachowiak Dec 13, 2018
270a125
Add a change log entry
k-stachowiak Dec 13, 2018
373a660
Fix a documentation typo
k-stachowiak Dec 13, 2018
9da5d7c
Adjust mbedtls_ccm_free() documentation
k-stachowiak Dec 13, 2018
6adb057
Improve details of CCM parameter validation and documentation
k-stachowiak Dec 18, 2018
247a782
Increase strictness of NULL parameter validity in CCM's doxygen
k-stachowiak Dec 19, 2018
73b7984
Remove parameter validation for deprecated function in ECDSA module
Dec 20, 2018
b3c7023
Move SHA1_VALIDATE[_RET] outside of MBEDTLS_SHA1_ALT guard
Dec 20, 2018
c756049
Move SHA512_VALIDATE[_RET] outside of MBEDTLS_SHA512_ALT guard
Dec 20, 2018
2f6de42
Move SHA256_VALIDATE[_RET] outside of MBEDTLS_SHA256_ALT guard
Dec 20, 2018
01d4b76
Remove faulty cipher_finish calls from nist_kw
mpg Dec 20, 2018
d602711
Fix dependencies on MBEDTLS_FS_IO
gilles-peskine-arm Dec 20, 2018
88ca3a2
Avoid unused-variable warnings in some configurations
gilles-peskine-arm Dec 20, 2018
743e398
Avoid unused-variable warnings for str as well
gilles-peskine-arm Dec 20, 2018
2a8d32c
Merge remote-tracking branch 'public/pr/2287' into development
simonbutcher Dec 20, 2018
ccafd14
Merge remote-tracking branch 'public/pr/2276' into development
simonbutcher Dec 20, 2018
dac513e
Merge remote-tracking branch 'public/pr/2282' into development
simonbutcher Dec 20, 2018
6be67a6
Merge remote-tracking branch 'public/pr/2281' into development
simonbutcher Dec 20, 2018
962b7b1
Merge remote-tracking branch 'public/pr/2273' into development
simonbutcher Dec 20, 2018
0bbf7f4
Merge remote-tracking branch 'public/pr/2279' into development
simonbutcher Dec 20, 2018
ad2e0da
Merge remote-tracking branch 'public/pr/2283' into development
simonbutcher Dec 20, 2018
65ce5dc
Merge remote-tracking branch 'public/pr/2290' into development
simonbutcher Dec 20, 2018
decf2f5
Merge remote-tracking branch 'public/pr/2291' into development
simonbutcher Dec 20, 2018
003c0e0
Merge remote-tracking branch 'public/pr/2292' into development
simonbutcher Dec 20, 2018
70935a4
Merge remote-tracking branch 'public/pr/2299' into development
simonbutcher Dec 20, 2018
a033633
Merge remote-tracking branch 'public/pr/2269' into development
simonbutcher Dec 20, 2018
032c037
Merge remote-tracking branch 'public/pr/2270' into development
simonbutcher Dec 20, 2018
780cf18
Merge remote-tracking branch 'public/pr/2271' into development
simonbutcher Dec 20, 2018
5aa7809
Merge remote-tracking branch 'public/pr/2275' into development
simonbutcher Dec 20, 2018
1efda39
Merge remote-tracking branch 'public/pr/2297' into development
simonbutcher Dec 20, 2018
c831193
Merge remote-tracking branch 'public/pr/2302' into development
simonbutcher Dec 20, 2018
12b4240
Merge remote-tracking branch 'public/pr/2288' into development
simonbutcher Dec 20, 2018
ad7c210
Merge remote-tracking branch 'public/pr/2274' into development
simonbutcher Dec 20, 2018
88d45a8
Merge remote-tracking branch 'public/pr/2171' into development-restri…
simonbutcher Dec 20, 2018
6df8c53
Merge remote-tracking branch 'public/pr/2134' into development-restri…
simonbutcher Dec 20, 2018
428d00d
Merge remote-tracking branch 'public/pr/2209' into development-restri…
simonbutcher Dec 20, 2018
fed19be
Merge remote-tracking branch 'public/pr/2126' into development-restri…
simonbutcher Dec 20, 2018
b6cdf98
Merge remote-tracking branch 'public/pr/1721' into development-restri…
simonbutcher Dec 20, 2018
e046053
Clarify ChangeLog old versions and param validations
simonbutcher Dec 20, 2018
6c164e7
Update the version of the library to 2.16.0
simonbutcher Dec 21, 2018
fb1972d
Merge pull request #544 from ARMmbed/version-2.16
simonbutcher Dec 21, 2018
983acb7
Fix include file path
amisare Dec 28, 2018
f7e742d
Update ChangeLog
amisare Dec 28, 2018
a306979
Fix ChangeLog formate
amisare Dec 28, 2018
f81f41a
Fix ChangeLog formate
amisare Dec 28, 2018
0caddf7
Update the LTS branch list in the contributing doc
Jan 2, 2019
da1655a
Remove temporary stack-buffer from mbedtls_mpi_fill_random()
Oct 18, 2017
2be8a55
Change signature of mpi_bigendian_to_host() to reflect usage
Oct 25, 2018
8116ef7
Adapt ChangeLog
Oct 25, 2018
f872007
Optimize mpi_bigendian_to_host() for speed and size
Nov 8, 2018
5d91c0b
Add missing macro existence check in byte swapping code in bignum.c
Jan 2, 2019
6dab620
Fix typo after rebase
Jan 2, 2019
9f6d16a
Fix preprocessor macro existence check in bignum.c
Jan 2, 2019
608953e
Back up and restore config.h systematically
gilles-peskine-arm Jan 2, 2019
fbda612
Remove duplicate #include
masap Dec 27, 2018
b28636b
Merge tag 'mbedtls-2.16.0' into all_sh-2.14
gilles-peskine-arm Jan 2, 2019
0e810b9
Don't call memcpy with NULL pointer in mbedtls_mpi_read_binary()
Jan 3, 2019
4896c6b
Update ChangeLog
Jan 3, 2019
5c0b5b5
Update ChangeLog
amisare Jan 4, 2019
a49a94a
Updating PSA submodule to commit 9e0feff
AndrzejKurek Jan 4, 2019
a7064c3
Move ecp_restartable definitions out of the MBEDTLS_ECP_ALT guards
dgreen-arm Jan 4, 2019
eb7f1b5
Add ChangeLog entry
dgreen-arm Jan 7, 2019
6b5ef48
Add a configuration fix for vsnprintf for non-conforming platforms
k-stachowiak Jan 7, 2019
2349c4d
Adapt to the new key allocation mechanism
AndrzejKurek Jan 8, 2019
d4548ae
Merge remote-tracking branch 'public/pr/2334' into development
simonbutcher Jan 8, 2019
2fac661
Merge remote-tracking branch 'public/pr/2321' into development
simonbutcher Jan 8, 2019
012a06c
Merge remote-tracking branch 'public/pr/2228' into development
simonbutcher Jan 8, 2019
6944e05
Merge remote-tracking branch 'public/pr/2232' into development
simonbutcher Jan 8, 2019
8de0501
Merge remote-tracking branch 'public/pr/2128' into development
simonbutcher Jan 8, 2019
62ec2dd
Merge remote-tracking branch 'public/pr/975' into development
simonbutcher Jan 8, 2019
55f7c94
Fix inconsistent indentation
gilles-peskine-arm Jan 9, 2019
5fa32a7
Use CMAKE_BUILD_TYPE to do Asan builds
gilles-peskine-arm Jan 6, 2019
4976e82
Gdb script: improve portability of ASLR disabling disabling
gilles-peskine-arm Jan 6, 2019
a16c2b1
all.sh: don't insist on Linux; always run Valgrind
gilles-peskine-arm Jan 6, 2019
a1fc4b5
all.sh: fix MAKEFLAGS setting
gilles-peskine-arm Jan 6, 2019
adb5234
Return error code of underlying function.
Dec 17, 2018
a81f3bd
Add entry describing the bug fix
Dec 17, 2018
783f9c3
Fix signed-to-unsigned integer conversion warning in X.509 module
Nov 20, 2018
a9375b3
Avoid MSVC compiler warning
Jan 10, 2019
1b6d2b2
Adapt ChangeLog
Jan 10, 2019
02b453e
Update crypto submodule for PSA PR#229
simonbutcher Jan 10, 2019
878cf60
all.sh: list components automatically
gilles-peskine-arm Jan 6, 2019
beb3a81
all.sh: Always build the list of components to run
gilles-peskine-arm Jan 6, 2019
5331c6e
all.sh: only look for armcc if it is used
gilles-peskine-arm Jan 6, 2019
8796426
all.sh: only check tools that are going to be used
gilles-peskine-arm Jan 6, 2019
cc9f0b9
Merge the code to call output_env.sh into pre_check_tools
gilles-peskine-arm Jan 6, 2019
c70637a
all.sh: Update the maintainer documentation
gilles-peskine-arm Jan 9, 2019
d1174cf
Fix sometimes-spurious warning about changed config.h
gilles-peskine-arm Jan 9, 2019
53190e6
Delete $OUT_OF_SOURCE_DIR under --force
gilles-peskine-arm Jan 9, 2019
a28db92
Support wildcard patterns with a positive list of components to run
gilles-peskine-arm Jan 9, 2019
69f190e
Rename test_memcheck to test_valgrind
gilles-peskine-arm Jan 9, 2019
a62a58e
cipher: fixed key ownership scope
AndrzejKurek Jan 14, 2019
93a38a3
pk: wrap curve_id before passing it to PSA
AndrzejKurek Jan 14, 2019
62594a8
pk_wrap: pass curve size instead of a larger size of the exported key
AndrzejKurek Jan 14, 2019
2f70e4b
add hints for mips registers that may need restore
jmartin-tech Aug 14, 2018
a661be3
Add fix of #1722 to ChangLog
jmartin-tech Jan 14, 2019
d25fd8d
MIPS register hints without `$` for compatibility
jmartin-tech Jan 15, 2019
c0a1be0
Fix indentation of documentation
AndrzejKurek Jan 15, 2019
e57c1ea
Switch to the public crypto submodule url
AndrzejKurek Jan 15, 2019
d20a0e2
update ChangLog per comments
jmartin-tech Jan 15, 2019
801217e
update ChangLog credit
jmartin-tech Jan 16, 2019
7deba18
Remove unnecessary "#" sign from PSA macros
AndrzejKurek Jan 22, 2019
c847d9f
Change PSA submodule url
AndrzejKurek Jan 22, 2019
d253bb4
Merge remote-tracking branch 'public/pr/2352' into development-psa
simonbutcher Jan 23, 2019
d4e327c
Merge remote-tracking branch 'public/pr/2345' into development
simonbutcher Jan 23, 2019
0999ca3
Merge remote-tracking branch 'public/pr/2326' into development
simonbutcher Jan 23, 2019
38cb940
Merge remote-tracking branch 'public/pr/2231' into development
simonbutcher Jan 23, 2019
a3c821d
Merge remote-tracking branch 'public/pr/2319' into development
simonbutcher Jan 23, 2019
442ca57
Merge remote-tracking branch 'public/pr/1375' into development
simonbutcher Jan 23, 2019
8e76332
Merge remote-tracking branch 'public/pr/2040' into development
simonbutcher Jan 23, 2019
dae1768
Update .gitmodules file to point to a sibling branch in mbed-crypto
AndrzejKurek Jan 23, 2019
36e89b5
Fix #2370, minor typos and spelling mistakes
MisterDA Jan 23, 2019
4687ea0
Revert .gitmodules update - point back to development
AndrzejKurek Jan 25, 2019
4b56865
Update crypto version to use new key allocation
AndrzejKurek Jan 25, 2019
4a2949b
Update crypto submodule
Jan 25, 2019
353295a
PSA: Adapt PK test suite to modified key slot allocation mechanism
Jan 25, 2019
8d865df
PSA: Adapt PK test suite to new key policy initialization API
Jan 25, 2019
37519ea
PSA: Adapt ssl_client2 to modified key slot allocation API
Jan 25, 2019
1387124
PSA: Adapt ssl_client2 to new key policy initialization API
Jan 25, 2019
9bd8842
PSA: Adapt ssl_server2 to hew key policy initialization API
Jan 25, 2019
32809e8
PSA: Adapt ssl_server2 to modified key allocation API
Jan 25, 2019
e34f636
PSA: Adapt cipher.c, pk.c, pk_wrap.c to new key slot allocation API
Jan 25, 2019
f99c2ec
PSA: Adapt pk.c, pk_wrap.c, cipher.c to new key policy init API
Jan 25, 2019
2192c27
Update crypto submodule to sibling PR
Jan 25, 2019
a985111
Adapt ecdsa_verify_wrap() to new EC public key format
Jan 25, 2019
af01b4b
Update crypto submodule to sibling commit
Jan 28, 2019
d6db9be
Adapt mbedtls_ssl_get_key_exchange_md_tls1_2 to PSA hashing
AndrzejKurek Jan 10, 2019
814feff
Whitespace, logging and documentation fixes
AndrzejKurek Jan 14, 2019
e85414e
ssl-opt: add a check for PSA computation of digest of ServerKeyExchange
AndrzejKurek Jan 15, 2019
5615dab
ssl_tls: remove line breaks from a debug message
AndrzejKurek Jan 16, 2019
7b9575c
Merge remote-tracking branch 'origin/pr/2376' into development-psa
Patater Jan 28, 2019
c929a82
Implement tls_prf_generic using the PSA API
AndrzejKurek Jan 14, 2019
70737ca
ssl_tls: add key destruction upon generator failure
AndrzejKurek Jan 14, 2019
3317126
ssl_tls: add missing return brackets
AndrzejKurek Jan 15, 2019
ac5dc34
Fix key allocation for tls_prf_generic
AndrzejKurek Jan 23, 2019
2f76075
ssl_tls: adjust to the new key policy initialization and key allocation
AndrzejKurek Jan 28, 2019
2d4faa6
ssl_tls: remove redundant status check
AndrzejKurek Jan 29, 2019
ccf574e
Fix outdated comment in ecdsa_verify_wrap()
Jan 29, 2019
62efb9c
Update crypto submodule to merge commit of sibling PR
Jan 29, 2019
eb34224
ssl_tls: use PSA to compute running handshake hash for TLS 1.2
AndrzejKurek Jan 29, 2019
972fba5
ssl_tls: rename sha_512_psa to sha_384_psa
AndrzejKurek Jan 30, 2019
2ad2297
ssl_tls: add psa_hash_abort when reseting checksum
AndrzejKurek Jan 30, 2019
683d77e
ssl_opt: check client and server output for PSA calc verify in PSA tests
AndrzejKurek Jan 30, 2019
92dd4d0
ssl-opt.sh: add a test for "calc PSA finished" log to the PSA tests
AndrzejKurek Jan 30, 2019
730ecdf
Merge remote-tracking branch 'origin/pr/2371' into development
Patater Jan 30, 2019
ad88be0
Add ChangeLog entry for #2371
Patater Jan 30, 2019
e6e2686
Merge remote-tracking branch 'origin/pr/2055' into development
Patater Jan 30, 2019
dac9f45
Merge remote-tracking branch 'origin/pr/1551' into development
Patater Jan 30, 2019
c42dd60
Merge remote-tracking branch 'origin/pr/1949' into development
Patater Jan 30, 2019
6f4a8ef
Merge remote-tracking branch 'origin/pr/2137' into development
Patater Jan 30, 2019
b182397
Merge remote-tracking branch 'origin/pr/2191' into development
Patater Jan 30, 2019
c89148b
Merge remote-tracking branch 'origin/pr/2207' into development
Patater Jan 30, 2019
14eca24
Merge remote-tracking branch 'origin/pr/2213' into development
Patater Jan 30, 2019
91af329
Merge remote-tracking branch 'origin/pr/2214' into development
Patater Jan 30, 2019
c4cc251
Merge remote-tracking branch 'origin/pr/2325' into development
Patater Jan 30, 2019
f352f75
Merge remote-tracking branch 'origin/pr/2332' into development
Patater Jan 30, 2019
c470b6b
Merge development commit 8e76332 into development-psa
AndrzejKurek Jan 31, 2019
f093a3d
Use ecdh_setup instead of ecp_group_load
AndrzejKurek Feb 1, 2019
409fdae
test_suite_ctr_drbg: use ctr_drbg_update_ret instead of ctr_drbg_update
AndrzejKurek Feb 1, 2019
4fb8db2
Update pointer in PSA-based mbedtls_pk_write_pubkey()
Feb 1, 2019
812e124
Add function to find OID for PSA ECC curve identifiers
Feb 1, 2019
493c171
Adapt mbedtls_pk_write_pubkey_der() to the new PSA public key format
Feb 1, 2019
3945653
Update submodule version to 3a181009
AndrzejKurek Feb 1, 2019
56104ea
Adapt test in test_suite_pk to work with new PSA public key format
Feb 1, 2019
65935d9
Add missing include to library/pkwrite.c
Feb 1, 2019
de5a007
Merge development commit f352f7 into development-psa
AndrzejKurek Feb 1, 2019
70fc655
Update Crypto submodule to merge of sibling PR
Feb 1, 2019
1359a8f
Update submodule version to point to fixed, forked repository
AndrzejKurek Feb 4, 2019
d4a31d3
Merge remote-tracking branch 'origin/pr/2350' into development-psa
Patater Feb 4, 2019
65408c5
Merge remote-tracking branch 'origin/pr/2355' into development-psa
Patater Feb 4, 2019
d18b264
Merge remote-tracking branch 'origin/pr/2382' into development-psa
Patater Feb 4, 2019
80b5662
Merge remote-tracking branch 'origin/pr/2386' into development-psa
Patater Feb 4, 2019
246cc86
cipher: fix indentation
AndrzejKurek Feb 5, 2019
8764ccc
ChangeLog: rearrange misplaced sections.
AndrzejKurek Feb 5, 2019
fd0381a
all.sh: change test_submodule to test_use_psa_crypto
AndrzejKurek Feb 5, 2019
b274f27
Documentation fixes
AndrzejKurek Feb 5, 2019
efed323
pk: restructure precondition check
AndrzejKurek Feb 5, 2019
d142856
cipher: remove unnecessary precondition
AndrzejKurek Feb 5, 2019
c690523
Merge PSA config and check-config changes
AndrzejKurek Feb 5, 2019
e9c3b81
all.sh: move crypto submodule check to pre_check_git
AndrzejKurek Feb 5, 2019
8a2e97c
Merge development-psa commit 80b5662 into development-psa-merged branch
AndrzejKurek Feb 5, 2019
1767e40
all.sh: fix submodule test names
AndrzejKurek Feb 5, 2019
70d8a5b
Update crypto submodule version to 94a3abcd
AndrzejKurek Feb 7, 2019
d3643ef
Add PSA defines to config.pl exclude list
AndrzejKurek Feb 7, 2019
1724574
Add MBEDTLS_PSA_HAS_ITS_IO to config.pl exclude list
AndrzejKurek Feb 7, 2019
85ac0ae
Update submodule version to include parameter validation for rsa.c
AndrzejKurek Feb 7, 2019
3c2b15d
Update version_features file
AndrzejKurek Feb 8, 2019
57f04e5
Adjust documentation of mbedtls_cipher_update_ad
AndrzejKurek Feb 8, 2019
02f39ac
Adjust documentation of mbedtls_cipher_update_ad
AndrzejKurek Feb 8, 2019
fb23673
Revert "Forbid passing NULL input buffers to RSA encryption routines"
Patater Feb 8, 2019
004f87b
RSA encryption: accept input=NULL if ilen=0
gilles-peskine-arm Jul 6, 2018
6f7703d
rsa: Enable use of zero-length null output
Patater Feb 6, 2019
08b807a
Update crypto submodule version to commit f54597144874
AndrzejKurek Feb 11, 2019
3ea2687
psa: Initialize crypto in tests that need to
Patater Feb 13, 2019
c058773
Update submodule pointer to dea02cc8b
AndrzejKurek Feb 14, 2019
eb50871
all.sh: add a seedfile generation step
AndrzejKurek Feb 14, 2019
67ea2c5
Merge branch 'development-psa-proposed' into development
Patater Feb 11, 2019
e820662
Update config-default.h to the latest from Mbed TLS
Patater Feb 8, 2019
06b161a
psa: Add latest PSA Crypto config.h
Patater Feb 8, 2019
1fe81d4
psa_utils: Make fallthrough clear for compilers
Patater Feb 11, 2019
892cd6d
psa: Use new generic error codes
Patater Feb 11, 2019
44a59ab
psa: Enable use of PSA examples with CHECK_PARAMS
Patater Feb 11, 2019
db29ab5
psa: Fix builds without MBEDTLS_PLATFORM_C
Patater Feb 12, 2019
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,15 +50,15 @@ When backporting to these branches please observe the following rules:

2. All bug fixes that correct a defect that is also present in an LTS branch must be backported to that LTS branch. If a bug fix introduces a change to the API such as a new function, the fix should be reworked to avoid the API change. API changes without very strong justification are unlikely to be accepted.

3. If a contribution is a new feature or enhancement, no backporting is required. Exceptions to this may be addtional test cases or quality improvements such as changes to build or test scripts.
3. If a contribution is a new feature or enhancement, no backporting is required. Exceptions to this may be additional test cases or quality improvements such as changes to build or test scripts.

It would be highly appreciated if contributions are backported to LTS branches in addition to the [development branch](https://github.com/ARMmbed/mbedtls/tree/development) by contributors.

Currently maintained LTS branches are:

1. [mbedtls-2.1](https://github.com/ARMmbed/mbedtls/tree/mbedtls-2.1)
1. [mbedtls-2.7](https://github.com/ARMmbed/mbedtls/tree/mbedtls-2.7)

2. [mbedtls-2.7](https://github.com/ARMmbed/mbedtls/tree/mbedtls-2.7)
1. [mbedtls-2.16](https://github.com/ARMmbed/mbedtls/tree/mbedtls-2.16)


Tests
Expand Down
140 changes: 111 additions & 29 deletions ChangeLog
Original file line number Diff line number Diff line change
@@ -1,32 +1,52 @@
mbed TLS ChangeLog (Sorted per branch, date)

= mbed TLS 2.xx.x branch released xxxx-xx-xx
= mbed TLS 2.x.x branch released xxxx-xx-xx

Changes
* Add unit tests for AES-GCM when called through mbedtls_cipher_auth_xxx()
from the cipher abstraction layer. Fixes #2198.
Bugfix
* Fix a compilation issue with mbedtls_ecp_restart_ctx not being defined
when MBEDTLS_ECP_ALT is defined. Reported by jwhui. Fixes #2242.
* Run the AD too long test only if MBEDTLS_CCM_ALT is not defined.
Raised as a comment in #1996.
* Reduce the stack consumption of mbedtls_mpi_fill_random() which could
previously lead to a stack overflow on constrained targets.
* Add `MBEDTLS_SELF_TEST` for the mbedtls_self_test functions
in the header files, which missed the precompilation check. #971
* Fix returning the value 1 when mbedtls_ecdsa_genkey failed.
* Remove a duplicate #include in a sample program. Fixed by Masashi Honma #2326.
* Remove the mbedtls namespacing from the header file, to fix a "file not found"
build error. Fixed by Haijun Gu #2319.
* Fix signed-to-unsigned integer conversion warning
in X.509 module. Fixes #2212.
* Reduce stack usage of `mpi_write_hlp()` by eliminating recursion.
Fixes #2190.

= mbed TLS 2.14.0+01b34fb316a5 branch released xxxx-xx-xx
Changes
* Include configuration file in all header files that use configuration,
instead of relying on other header files that they include.
Inserted as an enhancement for #1371
* Add support for alternative CSR headers, as used by Microsoft and defined
in RFC 7468. Found by Michael Ernst. Fixes #767.
* Correct many misspellings. Fixed by MisterDA #2371.
* Provide an abstraction of vsnprintf to allow alternative implementations
for platforms that don't provide it. Based on contributions by Joris Aerts
and Nathaniel Wesley Filardo.
* Fix clobber list in MIPS assembly for large integer multiplication.
Previously, this could lead to functionally incorrect assembly being
produced by some optimizing compilers, showing up as failures in
e.g. RSA or ECC signature operations. Reported in #1722, fix suggested
by Aurelien Jarno and submitted by Jeffrey Martin.

= mbed TLS 2.16.0 branch released 2018-12-21

Security
* Fix timing variations and memory access variations in RSA PKCS#1 v1.5
decryption that could lead to a Bleichenbacher-style padding oracle
attack. In TLS, this affects servers that accept ciphersuites based on
RSA decryption (i.e. ciphersuites whose name contains RSA but not
(EC)DH(E)). Discovered by Eyal Ronen (Weizmann Institute), Robert Gillham
(University of Adelaide), Daniel Genkin (University of Michigan),
Adi Shamir (Weizmann Institute), David Wong (NCC Group), and Yuval Yarom
(University of Adelaide, Data61). The attack is described in more detail
in the paper available here: http://cat.eyalro.net/cat.pdf CVE-2018-19608
* In mbedtls_mpi_write_binary(), don't leak the exact size of the number
via branching and memory access patterns. An attacker who could submit
a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
of the decryption and not its result could nonetheless decrypt RSA
plaintexts and forge RSA signatures. Other asymmetric algorithms may
have been similarly vulnerable. Reported by Eyal Ronen, Robert Gillham,
Daniel Genkin, Adi Shamir, David Wong and Yuval Yarom.
* Wipe sensitive buffers on the stack in the CTR_DRBG and HMAC_DRBG
modules.
Features
* Add a new config.h option of MBEDTLS_CHECK_PARAMS that enables validation
of parameters in the API. This allows detection of obvious misuses of the
API, such as passing NULL pointers. The API of existing functions hasn't
changed, but requirements on parameters have been made more explicit in
the documentation. See the corresponding API documentation for each
function to see for which parameter values it is defined. This feature is
disabled by default. See its API documentation in config.h for additional
steps you have to take when enabling it.

API Changes
* The following functions in the random generator modules have been
Expand All @@ -37,6 +57,19 @@ API Changes
mbedtls_ctr_drbg_update() -> mbedtls_ctr_drbg_update_ret()
mbedtls_hmac_drbg_update() -> mbedtls_hmac_drbg_update_ret()
* Extend ECDH interface to enable alternative implementations.
* Deprecate error codes of the form MBEDTLS_ERR_xxx_INVALID_KEY_LENGTH for
ARIA, CAMELLIA and Blowfish. These error codes will be replaced by
the more generic per-module error codes MBEDTLS_ERR_xxx_BAD_INPUT_DATA.
* Additional parameter validation checks have been added for the following
modules - AES, ARIA, Blowfish, CAMELLIA, CCM, GCM, DHM, ECP, ECDSA, ECDH,
ECJPAKE, SHA, Chacha20 and Poly1305, cipher, pk, RSA, and MPI.
Where modules have had parameter validation added, existing parameter
checks may have changed. Some modules, such as Chacha20 had existing
parameter validation whereas other modules had little. This has now been
changed so that the same level of validation is present in all modules, and
that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default
is off. That means that checks which were previously present by default
will no longer be.

New deprecations
* Deprecate mbedtls_ctr_drbg_update and mbedtls_hmac_drbg_update
Expand All @@ -57,6 +90,55 @@ Bugfix
on some toolchains. Reported by phoenixmcallister. Fixes #2170.
* Fix double initialization of ECC hardware that made some accelerators
hang.
* Clarify documentation of mbedtls_ssl_set_own_cert() regarding the absence
of check for certificate/key matching. Reported by Attila Molnar, #507.

= mbed TLS 2.15.1 branch released 2018-11-30

Changes
* Update the Mbed Crypto submodule to version 0.1.0b2.

= mbed TLS 2.15.0 branch released 2018-11-23

Features
* Add an experimental build option, USE_CRYPTO_SUBMODULE, to enable use of
Mbed Crypto as the source of the cryptography implementation.
* Add an experimental configuration option, MBEDTLS_PSA_CRYPTO_C, to enable
the PSA Crypto API from Mbed Crypto when additionally used with the
USE_CRYPTO_SUBMODULE build option.

Changes
* Add unit tests for AES-GCM when called through mbedtls_cipher_auth_xxx()
from the cipher abstraction layer. Fixes #2198.

= mbed TLS 2.14.1 branch released 2018-11-30

Security
* Fix timing variations and memory access variations in RSA PKCS#1 v1.5
decryption that could lead to a Bleichenbacher-style padding oracle
attack. In TLS, this affects servers that accept ciphersuites based on
RSA decryption (i.e. ciphersuites whose name contains RSA but not
(EC)DH(E)). Discovered by Eyal Ronen (Weizmann Institute), Robert Gillham
(University of Adelaide), Daniel Genkin (University of Michigan),
Adi Shamir (Weizmann Institute), David Wong (NCC Group), and Yuval Yarom
(University of Adelaide, Data61). The attack is described in more detail
in the paper available here: http://cat.eyalro.net/cat.pdf CVE-2018-19608
* In mbedtls_mpi_write_binary(), don't leak the exact size of the number
via branching and memory access patterns. An attacker who could submit
a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
of the decryption and not its result could nonetheless decrypt RSA
plaintexts and forge RSA signatures. Other asymmetric algorithms may
have been similarly vulnerable. Reported by Eyal Ronen, Robert Gillham,
Daniel Genkin, Adi Shamir, David Wong and Yuval Yarom.
* Wipe sensitive buffers on the stack in the CTR_DRBG and HMAC_DRBG
modules.

API Changes
* The new functions mbedtls_ctr_drbg_update_ret() and
mbedtls_hmac_drbg_update_ret() are similar to mbedtls_ctr_drbg_update()
and mbedtls_hmac_drbg_update() respectively, but the new functions
report errors whereas the old functions return void. We recommend that
applications use the new functions.

= mbed TLS 2.14.0 branch released 2018-11-19

Expand Down Expand Up @@ -281,7 +363,7 @@ Security
1.2, that allowed a local attacker, able to execute code on the local
machine as well as manipulate network packets, to partially recover the
plaintext of messages under some conditions by using a cache attack
targetting an internal MD/SHA buffer. With TLS or if
targeting an internal MD/SHA buffer. With TLS or if
mbedtls_ssl_conf_dtls_badmac_limit() was used, the attack only worked if
the same secret (for example a HTTP Cookie) has been repeatedly sent over
connections manipulated by the attacker. Connections using GCM or CCM
Expand Down Expand Up @@ -1167,7 +1249,7 @@ Bugfix
* Fix potential build failures related to the 'apidoc' target, introduced
in the previous patch release. Found by Robert Scheck. #390 #391
* Fix issue in Makefile that prevented building using armar. #386
* Fix memory leak that occured only when ECJPAKE was enabled and ECDHE and
* Fix memory leak that occurred only when ECJPAKE was enabled and ECDHE and
ECDSA was disabled in config.h . The leak didn't occur by default.
* Fix an issue that caused valid certificates to be rejected whenever an
expired or not yet valid certificate was parsed before a valid certificate
Expand Down Expand Up @@ -1409,7 +1491,7 @@ API Changes
You now need to link to all of them if you use TLS for example.
* All public identifiers moved to the mbedtls_* or MBEDTLS_* namespace.
Some names have been further changed to make them more consistent.
Migration helpers scripts/rename.pl and include/mbedlts/compat-1.3.h are
Migration helpers scripts/rename.pl and include/mbedtls/compat-1.3.h are
provided. Full list of renamings in scripts/data_files/rename-1.3-2.0.txt
* Renamings of fields inside structures, not covered by the previous list:
mbedtls_cipher_info_t.key_length -> key_bitlen
Expand Down Expand Up @@ -1464,7 +1546,7 @@ API Changes
* net_accept() gained new arguments for the size of the client_ip buffer.
* In the threading layer, mbedtls_mutex_init() and mbedtls_mutex_free() now
return void.
* ecdsa_write_signature() gained an addtional md_alg argument and
* ecdsa_write_signature() gained an additional md_alg argument and
ecdsa_write_signature_det() was deprecated.
* pk_sign() no longer accepts md_alg == POLARSSL_MD_NONE with ECDSA.
* Last argument of x509_crt_check_key_usage() and
Expand Down Expand Up @@ -2999,7 +3081,7 @@ XySSL ChangeLog
not swapped on PadLock; also fixed compilation on older versions
of gcc (bug reported by David Barrett)
* Correctly handle the case in padlock_xcryptcbc() when input or
ouput data is non-aligned by falling back to the software
output data is non-aligned by falling back to the software
implementation, as VIA Nehemiah cannot handle non-aligned buffers
* Fixed a memory leak in x509parse_crt() which was reported by Greg
Robson-Garth; some x509write.c fixes by Pascal Vizeli, thanks to
Expand Down
Loading