Jaeden Amero
cb2c935a54
aes: Clarify IV requirements for OFB mode
...
Combine the two "must be unique" phrases into one for clarity. An IV
that is universally unique is also unique for each encryption operation.
2018-06-11 14:03:22 +01:00
Simon Butcher
5db13621ec
Clarify documentation for AES OFB
...
1. Changed reference/link to NIST SP800-38A
2. Clarified language around AES-OFB usage
2018-06-11 14:03:22 +01:00
Simon Butcher
33cb519cda
Add decrypt tests to AES OFB Cipher module
...
Adds additional tests for AES-128, AES-192, and AES-256, for OFB block mode, for
the cipher wrapper module.
2018-06-11 14:03:22 +01:00
Simon Butcher
b7836e1e8c
Change AES OFB tests to memset sizeof buffer
2018-06-11 14:03:22 +01:00
Simon Butcher
e416bf93d2
Reduce stack usage for AES OFB tests
...
Reduced the size of allocated buffers to the minimum for OFB tests.
2018-06-11 14:03:22 +01:00
Simon Butcher
968646c079
Clarify comments on use of AES OFB block mode
2018-06-11 14:03:22 +01:00
Simon Butcher
00131446be
Fix style and formatting for OFB feature
2018-06-11 14:03:22 +01:00
Simon Butcher
374bcd4255
Add to OFB cipher tests AES-192 and AES-256 OFB
2018-06-11 14:03:22 +01:00
Simon Butcher
dbe7fbf391
Remove unused variable in AES OFB test suite
...
Remove iv_len, an unused variable, in AES OFB test suite function, to fix gcc
compiler warning.
2018-06-11 14:03:22 +01:00
Simon Butcher
6873c845e8
Update cipher.h for OFB block mode documentation
...
Raises the doxygen comments for OFB to the same level as other block modes.
2018-06-11 14:03:22 +01:00
Simon Butcher
ad4e4938d1
Fix AES-OFB support for errors, tests and self-test
...
Adds error handling into mbedtls_aes_crypt_ofb for AES errors, a self-test
for the OFB mode using NIST SP 800-38A test vectors and adds a check to
potential return errors in setting the AES encryption key in the OFB test
suite.
2018-06-11 14:03:22 +01:00
Simon Butcher
7487c5b2c8
Add missing OFB entry to null ciphersuite
...
The OFB entry has been omitted from the the null cipher suite definition,
null_base_info.
2018-06-11 14:03:22 +01:00
Simon Butcher
8c0fd1e881
Add cipher abstraction and test cases for OFB block mode
...
Adds OFB as additional block mode in the cipher abstraction, and additional
test cases for that block mode.
2018-06-11 14:03:22 +01:00
Simon Butcher
0301884f00
Add test cases for AES OFB block mode
...
Adds test cases from NIST SP800-38A for OFB block mode to AES-128/192/256, for
the configuration of MBEDTLS_CIPHER_MODE_OFB.
2018-06-11 14:03:22 +01:00
Simon Butcher
76a5b22973
Add OFB block mode to AES-128/192/256
...
Adds a new configuration of MBEDTLS_CIPHER_MODE_OFB and OFB mode to AES.
2018-06-11 14:03:22 +01:00
Jaeden Amero
10e0e4d4ff
hkdf: Add negative tests
...
Test for the expected bad input parameter error when given specific sets of
bad input parameters.
2018-06-11 13:10:14 +01:00
Jaeden Amero
3618962cab
hkdf: Add tests for extract and expand
...
Add tests for mbedtls_hkdf_extract() and mbedtls_hkdf_expand() from the
test vectors in Appendix A of RFC 5869.
2018-06-11 13:10:14 +01:00
Jaeden Amero
798363e4dc
Add ChangeLog entry for HKDF
2018-06-11 13:10:14 +01:00
Thomas Fossati
656864b360
Add an HKDF (RFC 5869) implementation
2018-06-11 13:10:14 +01:00
Simon Butcher
fcfa4c21c1
Merge remote-tracking branch 'public/pr/1699' into development
2018-06-11 11:24:33 +01:00
Darryl Green
2a1edacb1b
Change symlink to hardlink to avoid permission issues
2018-06-08 10:07:32 +01:00
Gilles Peskine
0a0e08a618
mbedtls_gcm_crypt_and_tag: clarify what each mode does and doesn't do
2018-06-07 14:47:38 +02:00
Darryl Green
d75ee64c1f
Fix out-of-tree testing symlinks on Windows
2018-06-07 11:55:50 +01:00
Gilles Peskine
80f679b938
Correct and clarify the documentation of GCM whole-message functions
...
Clarify the roles of the buffer parameter and their sizes.
Remove a statement about input size restrictions that only applies to
mbedtls_gcm_update, not to the whole-message functions.
Document the possible error codes.
Warn that mbedtls_gcm_crypt_and_tag in decrypt mode does not
authenticate the data and recommend using mbedtls_gcm_auth_decrypt
instead.
2018-06-06 16:55:41 +02:00
Simon Butcher
c041435fcf
Merge remote-tracking branch 'public/pr/1694' into development
2018-06-06 15:17:03 +01:00
Simon Butcher
d5a09f1e68
Updated version number to 2.10.0 for release
2018-06-06 14:52:00 +01:00
Simon Butcher
390641e0d3
Merge remote-tracking branch 'public/pr/1693' into development
2018-06-06 14:39:42 +01:00
Krzysztof Stachowiak
ab72727da4
Add a disabled CMAC define in the no-entropy configuration
2018-06-06 13:55:05 +02:00
Azim Khan
1a8ef0772c
Fix coverity defects
2018-06-06 03:44:03 +01:00
Simon Butcher
33dd3236de
Merge remote-tracking branch 'public/pr/1690' into development
2018-06-05 18:24:10 +01:00
Simon Butcher
d08a2f7245
Adapt the ARIA test cases for new ECB function
...
Commit 08c337d058
"Remove useless parameter from function" removed the
parameter mode from the functions mbedtls_aria_crypt_ecb() which broke their
respective test suite.
This commit fixes those test cases.
2018-06-05 15:53:06 +01:00
Simon Butcher
10438e17fc
Merge remote-tracking branch 'public/pr/1683' into development
2018-06-05 11:43:10 +01:00
Simon Butcher
6e962b2762
Fix file permissions for ssl.h
...
Correct the file permissions for ssl.h which were inadvertently made executable
in PR#1402
2018-06-05 10:25:04 +01:00
Simon Butcher
eb6ed719e3
Merge remote-tracking branch 'public/pr/1267' into development
2018-06-01 19:28:18 +01:00
Simon Butcher
2041a31ca8
Merge remote-tracking branch 'public/pr/1402' into development
2018-06-01 19:27:23 +01:00
Simon Butcher
246cb05a92
Merge remote-tracking branch 'public/pr/1410' into development
2018-06-01 19:25:56 +01:00
Simon Butcher
b02f7893f6
Merge remote-tracking branch 'public/pr/1470' into development
2018-06-01 19:20:25 +01:00
Simon Butcher
ba9199458d
Merge remote-tracking branch 'public/pr/1604' into development
2018-06-01 19:15:40 +01:00
Simon Butcher
d72700a8ed
Add ChangeLog entry for PR#1651
2018-06-01 19:11:55 +01:00
Simon Butcher
8edf2a37f7
Merge remote-tracking branch 'public/pr/1654' into development
2018-06-01 19:06:00 +01:00
Gilles Peskine
02b9329f2b
Fix MSan build without MBEDTLS_TIMING_C
...
When MBEDTLS_TIMING_C was not defined in config.h, but the MemSan
memory sanitizer was activated, entropy_poll.c used memset without
declaring it. Fix this by including string.h unconditionally.
2018-06-01 18:19:59 +02:00
Darryl Green
0daf4caaf8
Add test vectors for CCM*
2018-05-31 10:05:35 +01:00
Janos Follath
4c579391b1
CCM*: Remove superfluous braces
2018-05-30 13:58:38 +01:00
Janos Follath
143b319773
CCM*: Make documentation consistent
2018-05-30 13:57:29 +01:00
Janos Follath
997e85c049
CCM*: Remove nested if
2018-05-29 11:59:22 +01:00
Janos Follath
6b4bd3dcc4
CCM*: Improve documentation
2018-05-29 11:59:22 +01:00
Janos Follath
95ab93d417
CCM*: Add minimal tests
2018-05-29 11:59:22 +01:00
Janos Follath
b5734a28d9
CCM*: Add implementation
2018-05-29 11:59:22 +01:00
Janos Follath
5dc8cfa8f1
CCM*: Add public API
...
Interface for CCM* (described in IEEE Std 802.15.4.).
2018-05-29 11:59:22 +01:00
Azim Khan
45b79cf12b
Treat warnings as errors for IAR
...
Fix IAR compiler warnings
Two warnings have been fixed:
1. code 'if( len <= 0xFFFFFFFF )' gave warning 'pointless integer comparison'.
This was fixed by wraping the condition in '#if SIZE_MAX > 0xFFFFFFFF'.
2. code 'diff |= A[i] ^ B[i];' gave warning 'the order of volatile accesses is undefined in'.
This was fixed by read the volatile data in temporary variables before the computation.
Explain IAR warning on volatile access
Consistent use of CMAKE_C_COMPILER_ID
2018-05-25 14:54:14 +01:00