Jaeden Amero
f0716542c4
Merge pull request #140 from yanesca/everest_integration
...
Everest integration
2019-08-29 16:02:49 +01:00
Jaeden Amero
98d5685b70
Merge pull request #232 from Patater/psa-crypto-api-1.0b3
...
Make fixes related to using Mbed Crypto as a service
2019-08-29 13:50:10 +01:00
Jaeden Amero
21db2a94a4
Merge pull request #229 from k-stachowiak/IOTCRYPT-791-remove-legacy-psa-key-derivation
...
Remove legacy psa key derivation
2019-08-29 11:31:23 +01:00
Jaeden Amero
6fa62a5b8f
psa: Use application key ID where necessary
...
Avoid compiler errors when MBEDTLS_PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER
is set by using the application ID type.
[Error] psa_crypto_slot_management.c@175,9: used type 'psa_key_id_t' (aka 'psa_key_file_id_t') where arithmetic or pointer type is required
2019-08-28 17:24:27 +01:00
Jaeden Amero
e3cdf284b2
psa: Adapt set_key_id() for when owner is included
2019-08-28 17:24:27 +01:00
Jaeden Amero
39f03fcf1a
psa: Add PSA_KEY_ID_INIT
...
A macro useful for initializing psa_key_id_t, whether
MBEDTLS_PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER is set or not. Without this
macro, it is necessary to know if
MBEDTLS_PSA_CRYPTO_KEY_FILE_ID_ENCODES_OWNER as with it the key ID is
non-scalar and needs to be initialized with {0, 0}, and 0 otherwise when
key ID is scalar.
2019-08-28 17:24:27 +01:00
Jaeden Amero
f89cc69660
psa: Don't duplicate policy initializer
...
Use the PSA_KEY_POLICY_INIT macro in the definition of
PSA_CORE_KEY_ATTRIBUTES_INIT in order to avoid duplicating the key
policy initializer.
2019-08-28 17:24:27 +01:00
Jaeden Amero
c7529c910b
crypto_extra: Use const seed for entropy injection
...
The crypto.c implementation of psa_inject_entropy() didn't match the
declaration in crypto_extra.h. Use a const seed in both files.
2019-08-28 17:24:27 +01:00
Jaeden Amero
884738a2d6
getting_started: Update for PSA Crypto API 1.0b3
2019-08-28 17:24:27 +01:00
Jaeden Amero
932e496ef5
Merge pull request #224 from tempesta-tech/development
...
Remove unused TG variable in mbedtls_mpi_gcd()
2019-08-27 12:05:21 +01:00
Jaeden Amero
85c78b48a9
Merge pull request #225 from RonEld/iotssl_2739
...
Remove a redundant function call
2019-08-23 17:43:58 +01:00
Jaeden Amero
b14a48baac
Merge pull request #235 from athoelke/at-key-handles
...
Clarify the documented behavior and lifetime of key handles [v2]
2019-08-23 17:31:01 +01:00
Andrew Thoelke
8824daec6f
Editorial fixes.
2019-08-22 15:52:32 +01:00
Andrew Thoelke
3c2b80377b
Cross reference 'key handles' from INVALID_HANDLE
2019-08-22 15:52:32 +01:00
Andrew Thoelke
07f16b78ff
Update documentation for psa_destroy_key
...
Define the affect on handles to the key and on active multipart
operations.
2019-08-22 15:52:32 +01:00
Andrew Thoelke
3daba812d7
Update documentation for psa_close_key
...
Adjust the wording to permit multiple handles to a single key - closing
a handle does not necessarily release volatile memory associated with
the key, that only occurs when the last handle is closed.
2019-08-22 15:52:32 +01:00
Andrew Thoelke
9741b11440
Update psa_open_key documentation
...
- Describe the implementation defined behavior for opening multiple
keys, and provide a reference to the relevant section.
- Describe the use of INSUFFICENT_MEMORY error to indicate additional
implementation resource constaints.
- Clarify the distinction between DOES_NOT_EXIST and INVALID_HANDLE
error conditions.
2019-08-22 15:52:32 +01:00
Andrew Thoelke
203491c65d
Remove duplicated information in psa_open_key
...
The information about implmementation keys is duplicated.
2019-08-22 15:52:31 +01:00
Jaeden Amero
de4453d960
Merge pull request #174 from dgreen-arm/psa-se-driver-hooks
...
Add mock tests for hooks for secure element drivers
2019-08-22 14:10:37 +01:00
Darryl Green
0892d0fbbf
Initialize key bits to max size + 1 in psa_import_key
...
In psa_import_key, the key bits value was uninitialized before
calling the secure element driver import function. There is a
potential issue if the driver returns PSA_SUCCESS without setting
the key bits. This shouldn't happen, but shouldn't be discounted
either, so we initialize the key bits to an invalid issue.
2019-08-21 16:56:16 +01:00
Darryl Green
74c932e596
Parametrize key bits in import mock test
2019-08-21 16:56:16 +01:00
Jaeden Amero
4abb40cab3
Clean up core storage between tests
2019-08-21 16:56:16 +01:00
Unknown
f740b0abbb
crypto_se_driver: add verification mock test
2019-08-21 16:56:16 +01:00
Unknown
b7656a8a85
crypto_se_driver: add signing mock test
2019-08-21 16:56:16 +01:00
Unknown
136901c24c
crypto_se_driver: add public key exporting test
2019-08-21 16:56:16 +01:00
Unknown
903b5da51c
crypto_se_driver: add an error injection mechanism to the mocks
2019-08-21 16:56:16 +01:00
Unknown
9fd6b0cb6f
crypto_se_driver: add key generation mock and test
2019-08-21 16:56:16 +01:00
Unknown
c9ad5910aa
crypto_se_driver: add mock tests
...
Mock key importing and exporting
2019-08-21 16:56:16 +01:00
Janos Follath
71dcefbb8a
Remove Mbed Crypto headers from everest_inc
...
At this point Mbed TLS and Mbed Crypto headers with the same name,
including the Mbed Crypto headers in `everest_inc` breaks Mbed TLS
builds.
2019-08-21 13:01:18 +01:00
Jaeden Amero
8013f44e1a
Make crypto_struct C++ compatible
...
Avoid an error with differing linkages being expressed for
psa_set_key_domain_parameters() between crypto_extra.h and
crypto_struct.h in C++ builds.
[Error] crypto_extra.h@456,14: conflicting declaration of 'psa_status_t psa_set_key_domain_parameters(psa_key_attributes_t*, psa_key_type_t, const uint8_t *, size_t)' with 'C' linkage
2019-08-21 12:24:40 +01:00
Jaeden Amero
b090d5dc2a
Merge pull request #231 from dgreen-arm/api-to-development
...
Merge psa api branch into development
2019-08-21 11:50:57 +01:00
Darryl Green
ecfd050633
Merge pull request #230 from AndrzejKurek/remove-double-underscore
...
Remove double underscores from macro and add a check for it
2019-08-21 11:23:32 +01:00
Darryl Green
572a16e694
Merge branch 'psa-api-1.0-beta' into api-to-development
2019-08-21 10:31:12 +01:00
Unknown
712f7a804e
Add a check for double underscores in identifiers in check-names.sh
2019-08-21 03:34:00 -04:00
Unknown
e2e19959d7
Rename AEAD macro to not use double underscores
...
This pattern (identifiers containing a double underscore anywhere in them)
is reserved.
2019-08-21 03:33:04 -04:00
Janos Follath
20082cb488
Correct 3rdparty include path for Mbed TLS
2019-08-20 15:18:19 +01:00
Christoph M. Wintersteiger
c25df6848b
Fix code style
2019-08-19 13:37:46 +01:00
Gilles Peskine
09a24b3dda
Add Everest components to all.sh
...
Test a native build and a 32-bit build. For variety, the native build
is with CMake and clang, and the 32-bit build is with GNU make and
gcc.
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
0969eeecbc
3rdparty: Fix Everest's mbedtls_x25519_get_params
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
19d5c80c33
3rdparty: Added config checks for Everest
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
6212617097
Fix macros in benchmark.c
...
#2124 may suffer from the same problem.
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
f8d4c883a7
Update generated files
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
7b747fcdc9
3rdparty: fix inclusion order of CMakeLists.txt
...
This is so that third-party modules pick up the INSTALL_MBEDTLS_HEADERS variable.
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
d64e1e1e1c
3rdparty: Fix Everest header installation
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
ec70771a71
3rdparty: fix paths in Everest build scripts
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
26b98e12c5
3rdparty: Fix newlines and trailing whitespace
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
6e0cac1f57
3rdparty: Fix Everest build to not depend on build-time macros
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
2c69d10bac
3rdparty: Adjust use of Everest in ecp_supported_curves
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
7ec367ffc1
3rdparty: don't claim armcc support in Everest Readme.md
2019-08-19 13:37:46 +01:00
Christoph M. Wintersteiger
cf5603f712
ECDH: Fix inclusion of platform.h for proper use of MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED
2019-08-19 13:37:46 +01:00