Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
239 commits
Select commit Hold shift + click to select a range
3766a32
Use CMAKE_C_SIMULATE_ID when available to determine compiler
daantimmer Oct 18, 2023
c6d2df8
Guard configuration-specific code
gilles-peskine-arm Dec 18, 2023
9ac3e23
Fix NULL argument handling in mbedtls_xxx_free() functions
Troy-Butler Mar 22, 2024
da73abc
Fix NULL handling in mbedtls_ssl_config.free() function
Troy-Butler Apr 2, 2024
b8cbbe7
Modify component_test_tls1_2_default_stream_cipher_only_use_psa
tom-daubney-arm Apr 26, 2024
6258621
Modify component_test_tls1_2_deafult_cbc_legacy_cipher_only_use_psa
tom-daubney-arm Apr 26, 2024
ff33abd
Modify component_test_tls1_2_default_cbc_legacy_cbc_etm_cipher_only_u…
tom-daubney-arm Apr 26, 2024
30666d4
Add invalid `padding_len` check in `get_pkcs_padding`
andre-rosa May 1, 2024
d0a1691
Remove unnecessary cast
andre-rosa May 1, 2024
1ca1f3d
Restore Mbed TLS style AEAD options for now
tom-daubney-arm May 2, 2024
72b9800
Update framework submodule
ronald-cron-arm Apr 25, 2024
1e05deb
Extend basic checks of files to framework files
ronald-cron-arm Apr 25, 2024
043aa9e
Add check ensuring output is set to the least-harmful value in error …
andre-rosa May 2, 2024
62a908d
Extend C code style check to framework files
ronald-cron-arm Apr 25, 2024
7661aa0
Do not use --recurse-submodules
ronald-cron-arm May 3, 2024
67338c0
Restore toggling of MBEDTLS_CIPHER_MODE_CBC
tom-daubney-arm May 9, 2024
5f2595a
Remove non- _use_psa versions of components
tom-daubney-arm May 14, 2024
b7c624d
Remove _use_psa suffix from remaining components
tom-daubney-arm May 14, 2024
69ca57e
Fix typo
tom-daubney-arm May 14, 2024
5da4b7d
Silence gcc 12.2.0 warning
May 15, 2024
8f83ba0
Change the way CBC is set
tom-daubney-arm May 17, 2024
a8004f2
Add additional CCM unset
tom-daubney-arm May 17, 2024
27098b4
fix typo
ttytm May 18, 2024
39c5207
ssl-opt.sh, compat.sh: Error out if not executing any tests
gilles-peskine-arm May 17, 2024
a37ea26
adjust_legacy_crypto: enable CIPHER_C when PSA CMAC is builtin
valeriosetti May 24, 2024
680bee4
Update framework submodule to the merge of PR #15
ronald-cron-arm May 28, 2024
975e74c
Document check-config.h and *adjust*.h as internal headers
gilles-peskine-arm Apr 26, 2024
fef877f
Belated changelog entry for not including check_config.h
gilles-peskine-arm Apr 26, 2024
d33eb55
Macros to indicate the finalization level of the configuration
gilles-peskine-arm May 16, 2024
0b8ece6
Error out if *adjust* headers are included manually
gilles-peskine-arm May 16, 2024
690fb5e
Warn if mbedtls_config.h is included manually
gilles-peskine-arm May 16, 2024
d2f191a
Document that there is now an error for dangerous inclusions
gilles-peskine-arm May 16, 2024
9df7806
Tweak wording
gilles-peskine-arm May 29, 2024
c8d45cd
Error on unexpectedly defined symbols
gilles-peskine-arm May 29, 2024
2fc5687
Add PSA crypto sim serialisation functions for basic types
tom-cosgrove-arm May 29, 2024
e68fb72
Add PSA crypto sim serialisation functions for rest of types needed f…
tom-cosgrove-arm May 29, 2024
54b4ccd
Add PSA crypto sim client and server implementations of psa_hash_comp…
tom-cosgrove-arm May 29, 2024
a4952f9
The PSA sim logs aren't very many lines, so show them during tests
tom-cosgrove-arm May 29, 2024
3ebb880
Hook the new psa_sim_crypto_{client,server} into the build and tests
tom-cosgrove-arm May 29, 2024
39f8b09
Add PSA crypto sim serialisation functions needed for the remaining P…
tom-cosgrove-arm May 29, 2024
61ee59f
Add the rest of the psa_hash_xxx() functions to the simulator
tom-cosgrove-arm May 29, 2024
e2f0e30
Extend PSA crypto simulator tests to run psa_hash.c under the simulator
tom-cosgrove-arm May 29, 2024
ca0c147
Mark temporary PSA crypto sim Perl scripts as executable
tom-cosgrove-arm May 29, 2024
8bfb758
PSA crypto sim's server wrappers need to free deseraliased buffers wh…
tom-cosgrove-arm May 29, 2024
0ca70d5
Add missing licences
tom-cosgrove-arm May 30, 2024
f29bf87
Modify everest component for MBEDTLS_PSA_CRYPTO_CONFIG_ENABLED
tom-daubney-arm May 29, 2024
c15544e
Merge pull request #9088 from ronald-cron-arm/check-framework-files
gilles-peskine-arm May 30, 2024
8c60b16
Merge pull request #8643 from gilles-peskine-arm/tls12_server-pk_opaq…
gilles-peskine-arm May 30, 2024
d961929
Merge pull request #9155 from ttytm/fix-typo
gilles-peskine-arm May 30, 2024
ea297e5
Merge pull request #9061 from gilles-peskine-arm/config-headers-do-no…
gilles-peskine-arm May 31, 2024
30a9b6f
Merge pull request #9198 from tom-cosgrove-arm/psa-sim-hashing
tom-cosgrove-arm May 31, 2024
7e2ce99
changelog: add changelog for PSA CMAC fix
valeriosetti May 31, 2024
b8360cf
Make abi_check.py look in both locations
davidhorstmann-arm May 31, 2024
a7b0bb4
Move some test generation files to framework
davidhorstmann-arm May 29, 2024
f6f3bca
Update file paths for moved files
davidhorstmann-arm May 29, 2024
ce7af04
Update framework submodule
davidhorstmann-arm May 29, 2024
351efa0
crypto.h: fix documentation for some functions
valeriosetti Jun 3, 2024
e2add3a
Merge pull request #9220 from valeriosetti/fix-psa-doc
tom-cosgrove-arm Jun 3, 2024
98ffc8e
Merge pull request #9178 from valeriosetti/fix-psa-cmac
tom-cosgrove-arm Jun 3, 2024
fd59a06
Update to latest framework
davidhorstmann-arm Jun 3, 2024
a9d4ef0
Fix uint32_t printed as unsigned int
gilles-peskine-arm Jun 3, 2024
c085cc7
Merge pull request #9200 from davidhorstmann-arm/move-test-generation…
bensze01 Jun 4, 2024
69770aa
Use unsigned long rather than size_t for format string readability
gilles-peskine-arm Jun 4, 2024
330680e
Allow code_style.py to work from a git hook
davidhorstmann-arm Jun 6, 2024
f8bbc2d
Remove multi-type variable
davidhorstmann-arm Jun 6, 2024
8493452
Extend python checks to framework scripts
davidhorstmann-arm Jun 4, 2024
4ac0182
Merge pull request #9233 from davidhorstmann-arm/make-code-style-work…
ronald-cron-arm Jun 7, 2024
2bceec8
Merge pull request #9227 from davidhorstmann-arm/check-framework-pyth…
bensze01 Jun 10, 2024
d28534c
Merge pull request #9062 from tom-daubney-arm/crypto_config-tls1_2_de…
bensze01 Jun 10, 2024
e7a2230
Correctly build client-side code that's to be run under the PSA crypt…
tom-cosgrove-arm Jun 10, 2024
d6048a4
We want the PSA hash code if MBEDTLS_PSA_CRYPTO_CLIENT && !MBEDTLS_PS…
tom-cosgrove-arm Jun 10, 2024
517f4a1
Store operation_ts on PSA sim server side; only send handle to client
tom-cosgrove-arm Jun 10, 2024
9ab1969
Make psa_sim_generate.pl output the new type of server wrapper we want
tom-cosgrove-arm Jun 10, 2024
0d0415e
Move the comment block in psa_sim_serialise.c back to where it belongs
tom-cosgrove-arm Jun 10, 2024
db87a44
psa_sim_serialise.pl now creates the updated .h file
tom-cosgrove-arm Jun 10, 2024
f252f61
psa_sim_serialise.pl now creates the updated .c file
tom-cosgrove-arm Jun 10, 2024
c9ab367
Merge pull request #9225 from gilles-peskine-arm/tls13-debug-print-ui…
tom-cosgrove-arm Jun 10, 2024
54adeab
set psk to null in ssl_psk_remove
lhuang04 Jun 10, 2024
5ddd659
Revert "Correctly build client-side code that's to be run under the P…
tom-cosgrove-arm Jun 11, 2024
51b2c86
Use our own copy of programs/psa/psa_hash.c in the PSA simulator tests
tom-cosgrove-arm Jun 11, 2024
75129e2
psa_sim_crypto_[client/server]: check if CRYPTO_C is enabled
valeriosetti Jun 10, 2024
f98635c
psasim: build server library and binary before client's ones
valeriosetti Jun 10, 2024
3504c88
Fix incorrect array length in function prototype
Jun 11, 2024
0133d84
Merge pull request #9199 from tom-daubney-arm/modify_test_everest_cur…
ronald-cron-arm Jun 11, 2024
797991d
Merge pull request #9149 from gilles-peskine-arm/ssl-test-no-skip-all
gilles-peskine-arm Jun 11, 2024
b923b47
Have PSA sim client wrappers say which call fails, if one does
tom-cosgrove-arm Jun 11, 2024
9876012
Make it possible to pass arguments to PSA sim psa_client
tom-cosgrove-arm Jun 11, 2024
0fe5b8d
Add support for and run (a copy of) the PSA aead_demo program under P…
tom-cosgrove-arm Jun 11, 2024
a0cfe01
Merge pull request #9241 from lhuang04/official_development_psk_null2
tom-cosgrove-arm Jun 12, 2024
5cdc22b
all.sh: Fix clean-up of Makefiles generated by CMake
ronald-cron-arm Jun 12, 2024
28ce238
Add and update some .gitignore files
ronald-cron-arm Jun 12, 2024
d80134b
Move PSA headers
ronald-cron-arm Jun 10, 2024
c7e9e36
Adjust build systems
ronald-cron-arm Jun 10, 2024
ebd153e
Adapt make apidoc
ronald-cron-arm Jun 10, 2024
db9d518
Adapt make cscope
ronald-cron-arm Jun 10, 2024
2581d91
Adapt libraries installation
ronald-cron-arm Jun 10, 2024
1451a76
Adapt libtestdriver1 build
ronald-cron-arm Jun 10, 2024
7e5d61c
Adjust more paths to PSA headers
ronald-cron-arm Jun 10, 2024
36c3ae9
Adapt check files
ronald-cron-arm Jun 10, 2024
30ea2b9
all.sh: Update clean-up of Makefiles generated by CMake
ronald-cron-arm Jun 11, 2024
f412720
Merge pull request #9242 from sezrab/fix-function-parameter
tom-cosgrove-arm Jun 13, 2024
7e47fdb
Fix compiler warnings in test_suite_pk.function
eleuzi01 Jun 13, 2024
7c52100
Merge pull request #9238 from tom-cosgrove-arm/psasim_update_for_oper…
tom-cosgrove-arm Jun 13, 2024
5bc887c
Update `full_no_cipher_no_psa_crypto` test component
gabor-mezei-arm Jun 13, 2024
118d040
Code style fix
eleuzi01 Jun 13, 2024
df59c63
Update `config-no-entropy.h` for 'PSA_WANT' macros
gabor-mezei-arm Jun 13, 2024
62af02c
Drop support for VIA Padlock
tom-daubney-arm Jun 14, 2024
a8efd81
Add ChangeLog entry
tom-daubney-arm Jun 14, 2024
bc93515
Fix ChangeLog formatting
tom-daubney-arm Jun 14, 2024
0c0e418
config_psa: do not update legacy symbols in client-only PSA build
valeriosetti May 15, 2024
24f81cb
Improve ChangeLog entry
tom-daubney-arm Jun 17, 2024
4d9fb8b
Add ChangeLog
eleuzi01 Jun 17, 2024
2687e47
psa_sim: make server ping time much faster
valeriosetti Jun 17, 2024
2fd9572
psasim-server: add function to reset operations slots
valeriosetti Jun 17, 2024
4cfee21
Changelog Fix
eleuzi01 Jun 18, 2024
a2447d1
Update framework submodule to the merge of PR26
ronald-cron-arm Jun 18, 2024
aaf7e85
Have psa_sim_generate.pl add psa_crypto_close() to psa_sim_crypto_ser…
tom-cosgrove-arm Jun 18, 2024
2468896
Have psa_sim_serialise.pl generate psa_sim_serialize_reset()
tom-cosgrove-arm Jun 18, 2024
2eb8cc7
psa_sim: improve log prints
valeriosetti Jun 17, 2024
3761002
Update psa_sim_generate.pl to create the psa_sim_crypto_client.c we want
tom-cosgrove-arm Jun 18, 2024
a60d922
Update psa_sim_serialise.pl to create the psa_sim_serialise.c we want
tom-cosgrove-arm Jun 18, 2024
2e3b11f
Merge pull request #9279 from valeriosetti/reduce-psasim-ping-interval
minosgalanakis Jun 18, 2024
95589c5
Further padlock removals from all.sh
tom-daubney-arm Jun 18, 2024
13db410
Revert "Update `config-no-entropy.h` for 'PSA_WANT' macros"
gabor-mezei-arm Jun 18, 2024
eafefb7
Revert "Update `full_no_cipher_no_psa_crypto` test component"
gabor-mezei-arm Jun 18, 2024
1b646c2
Remove `config-no-entropy.h`
gabor-mezei-arm Jun 17, 2024
de0d7e6
Merge pull request #9247 from ronald-cron-arm/move-psa-headers
ronald-cron-arm Jun 18, 2024
a67f1be
Adapt test_crypto_full_md_light_only
ronald-cron-arm May 23, 2024
8dbea48
Adapt test_full_no_cipher_ components
ronald-cron-arm May 23, 2024
7062d3d
tests: src: Fix PSA test wrappers for PAKE
ronald-cron-arm May 24, 2024
cfce75f
Remove component_test_full_no_bignum
ronald-cron-arm May 24, 2024
cd33cd6
test_when_no_ciphersuites_have_mac: Fix logs
ronald-cron-arm May 27, 2024
0417a2c
Adapt component_test_when_no_ciphersuites_have_mac
ronald-cron-arm May 24, 2024
125440d
Merge pull request #9278 from valeriosetti/fix-psasim-logs
tom-cosgrove-arm Jun 19, 2024
150b88c
Merge pull request #9280 from valeriosetti/psasim-reset-slots-on-disc…
tom-cosgrove-arm Jun 19, 2024
390dba6
Update framework submodule to the merge of PR22
ronald-cron-arm Jun 19, 2024
b876a0a
Merge pull request #9185 from ronald-cron-arm/adapt-components-with-p…
ronald-cron-arm Jun 19, 2024
2a674bd
Merge pull request #9251 from gabor-mezei-arm/update_test_full_no_cip…
mpg Jun 20, 2024
19efa3d
changelog: add changelog
valeriosetti Jun 18, 2024
9ba9c21
Recognize that a double-inclusion guard is not a config setting
gilles-peskine-arm May 23, 2024
b0aa75e
Clean up generated files enumeration
gilles-peskine-arm May 23, 2024
ada30fe
New test suite to report configuration options
gilles-peskine-arm May 23, 2024
e154e6f
Generate config test cases for single options
gilles-peskine-arm May 23, 2024
a7469d3
Driver vs referenee: ignore relevant configuration differences
gilles-peskine-arm May 24, 2024
8637058
Anchor relative paths
gilles-peskine-arm May 28, 2024
ef822c1
Add some missing handling for generated test_suite_config.*.data
gilles-peskine-arm May 28, 2024
7f90069
Update generate_config_tests.py
gilles-peskine-arm Jun 12, 2024
1b6fb21
Replace MBEDTLS_MD_CAN_RIPEMD160 with PSA_WANT_ALG_RIPEMD160
eleuzi01 May 10, 2024
6a758fc
Add guarding to aes_maybe_realign
tom-daubney-arm Jun 20, 2024
0d915a9
Remove final references to padlock
tom-daubney-arm Jun 20, 2024
baace2f
psasim: add support for psa_generate_random()
tom-cosgrove-arm Jun 21, 2024
853ca0c
psasim: add support for psa_mac_xxx() functions
tom-cosgrove-arm Jun 21, 2024
a4eac4a
psasim: add support for psa_cipher_xxx() functions
tom-cosgrove-arm Jun 21, 2024
55b62da
psasim: skip some functions; see _SKIP_FUNCTIONS in generate_psa_wrap…
tom-cosgrove-arm Jun 21, 2024
c6d2e76
psasim: use ser_params and ser_result variable names in client; 'para…
tom-cosgrove-arm Jun 21, 2024
a2d81c9
psasim: psa_key_derivation_verify_bytes() doesn't follow the naming c…
tom-cosgrove-arm Jun 21, 2024
623fcb3
psasim: add the ability to serialise psa_key_production_parameters_t
tom-cosgrove-arm Jun 21, 2024
c3236b8
psasim: add support for psa_key_derivation_xxx() and psa_raw_key_agre…
tom-cosgrove-arm Jun 21, 2024
5d4b9cb
psasim: add support for psa_generate_key*() to the simulator
tom-cosgrove-arm Jun 21, 2024
6add43a
psasim: add support for psa_{sign,verify}_{message,hash}() to the sim…
tom-cosgrove-arm Jun 21, 2024
8f1c913
psasim: add support for psa_asymmetric_{encrypt,decrypt}() to the sim…
tom-cosgrove-arm Jun 21, 2024
1a8b805
psasim: add support for key functions that don't need psa_key_attribu…
tom-cosgrove-arm Jun 21, 2024
9b10cf7
psasim: add support for PSA functions that return uint32_t or void
tom-cosgrove-arm Jun 21, 2024
05c99e1
psasim: add support for psa_{sign,verify}_hash_xxx() and get/set max ops
tom-cosgrove-arm Jun 21, 2024
feb0216
psasim: add support for psa_copy_key()
tom-cosgrove-arm Jun 21, 2024
4d8d556
psasim: add support for psa_reset_key_attributes()
tom-cosgrove-arm Jun 21, 2024
d32fac2
psasim: have the generator script check for type = "void" rather than…
tom-cosgrove-arm Jun 21, 2024
82658eb
Merge pull request #9138 from valeriosetti/issue9126
mpg Jun 24, 2024
d9392f0
Merge pull request #9250 from eleuzi01/bug-9029
paul-elliott-arm Jun 24, 2024
dd48f0f
Merge pull request #8389 from daantimmer/patch-1
tom-cosgrove-arm Jun 24, 2024
1d08e2f
Change guard implementation
tom-daubney-arm Jun 25, 2024
5beb236
psasim: merge all AUT programs into a single executable
valeriosetti Jun 24, 2024
25afdc1
psasim: add AUT for psa_generate_random()
valeriosetti Jun 24, 2024
f79e17a
psasim: add AUT for MAC
valeriosetti Jun 24, 2024
6d6fe8b
psasim: add AUT for key generation and raw key agreement
valeriosetti Jun 24, 2024
bb1502b
psasim: add AUT for PSA sign and verify
valeriosetti Jun 24, 2024
a06b22d
psasim: add AUT for symmetric encryption/decryption
valeriosetti Jun 24, 2024
87be9db
psasim: add AUT for key derivation
valeriosetti Jun 24, 2024
e9829e5
psasim: add AUT for cipher encryption/decryption
valeriosetti Jun 24, 2024
9dc9289
psasim: add AUT for asymmetric encryption/decryption
valeriosetti Jun 24, 2024
4848f9d
psasim: fix max line length in generated files
valeriosetti Jun 25, 2024
197536d
Improve ChangeLog wording
tom-daubney-arm Jun 25, 2024
4e5d183
Correct pluralisation errors in comments
tom-daubney-arm Jun 25, 2024
f57a352
Remove superfluous brackets
tom-daubney-arm Jun 25, 2024
e92adaf
Remove mention of driver from ChangeLog
tom-daubney-arm Jun 25, 2024
f0481f5
Merge pull request #9258 from tom-daubney-arm/drop_padlock_support
ronald-cron-arm Jun 26, 2024
7b6ddfc
psa_cipher_decrypt CCM*: fix rejection of messages shorter than 3 bytes
gilles-peskine-arm Jun 26, 2024
c4dfc08
Merge pull request #9310 from valeriosetti/psasim_more_aut_tests
tom-cosgrove-arm Jun 26, 2024
550a18d
Move Mbed TLS crypto headers
ronald-cron-arm Jun 13, 2024
3d817ad
Adjust build systems
ronald-cron-arm Jun 14, 2024
09de583
Adapt make apidoc
ronald-cron-arm Jun 17, 2024
d6d7f3c
Adapt make cscope
ronald-cron-arm Jun 17, 2024
05ba912
Adapt libraries installation
ronald-cron-arm Jun 17, 2024
52cc858
Adapt libtestdriver1 build
ronald-cron-arm Jun 17, 2024
f4606d4
Adjust more paths to Mbed TLS crypto headers
ronald-cron-arm Jun 17, 2024
71609eb
Adapt check_names.py
ronald-cron-arm Jun 19, 2024
b50d30f
Adapt cipher.h path in depends.py
ronald-cron-arm Jun 21, 2024
fb3e159
Adapt include dir paths in test_psa_compliance.py
ronald-cron-arm Jun 21, 2024
fa7e15d
Fix typo
ronald-cron-arm Jul 1, 2024
af73295
Update framework submodule to the merge of PR30
ronald-cron-arm Jul 1, 2024
3bf375c
Update framework after merge of #28
gilles-peskine-arm Jul 1, 2024
76ac620
Merge pull request #9299 from ronald-cron-arm/move-mbedtls-crypto-hea…
ronald-cron-arm Jul 1, 2024
7fe75ba
psasim: minor fixes to the core
valeriosetti Jun 27, 2024
7cdb1dd
psasim: invalidate operations on abort+finish
tom-cosgrove-arm Jun 29, 2024
6271004
psasim: remove sleep on server side to make test as fast as possible
valeriosetti Jul 1, 2024
fcc9afa
Replace MBEDTLS_MD_CAN_SHA224 with PSA_WANT_ALG_SHA_224
eleuzi01 May 23, 2024
6244882
Replace MBEDTLS_MD_CAN_SHA224 in md.h
eleuzi01 Jun 26, 2024
a7e6479
Merge pull request #9328 from valeriosetti/psasim-improvements
tom-cosgrove-arm Jul 2, 2024
1b22dd8
Merge remote-tracking branch 'dev' into test_suite_config-booleans
gilles-peskine-arm Jul 2, 2024
0917265
makefile: allow to build and link test suites against psasim
valeriosetti Jun 27, 2024
9022f71
all.sh: add new component to run test suites with psasim
valeriosetti Jun 27, 2024
f67ded3
psasim: update bash scripts
valeriosetti Jun 27, 2024
e134d09
all.sh: remove old tests components on CRYPTO_CLIENT
valeriosetti Jun 27, 2024
8473390
tests: fix guards in test suites to allow testing with PSASIM
valeriosetti Jun 27, 2024
caee58f
psasim: add a bit of white-box testing to hash operations
tom-cosgrove-arm Jun 29, 2024
1a49383
all.sh: exclude some extra slow test suites from psasim testing
valeriosetti Jul 1, 2024
d8b5937
all.sh: psasim helper functions renaming
valeriosetti Jul 2, 2024
fb2da6f
Merge pull request #9237 from valeriosetti/issue8968
tom-cosgrove-arm Jul 2, 2024
b476d4b
Replace MBEDTLS_MD_CAN_SHA384 with PSA_WANT_ALG_SHA_384
eleuzi01 May 23, 2024
cf5e3dd
Replace MBEDTLS_MD_CAN_SHA384 in md.h and ssl.h
eleuzi01 Jun 26, 2024
5e3c529
Merge pull request #9172 from gilles-peskine-arm/test_suite_config-bo…
ronald-cron-arm Jul 3, 2024
94f0768
Merge pull request #9082 from andre-rosa/check-overflow-when-reading-…
gilles-peskine-arm Jul 3, 2024
4a17523
Merge pull request #9170 from eleuzi01/replace-mbedtls-md-can-sha224
gilles-peskine-arm Jul 3, 2024
3a994b7
tests_suite_debug: fix psa initialization
valeriosetti Jul 3, 2024
45aa4d5
Merge pull request #9125 from eleuzi01/replace-mbedtls-md-can-ripemd160
ronald-cron-arm Jul 4, 2024
97e0028
Merge pull request #9345 from valeriosetti/fix-coverity
tom-cosgrove-arm Jul 4, 2024
2cf41a2
Merge pull request #9171 from eleuzi01/replace-mbedtls-md-can-sha384
ronald-cron-arm Jul 4, 2024
e8cd45c
Replace MBEDTLS_MD_CAN_SHA3_512 with PSA_WANT_ALG_SHA3_512
eleuzi01 May 31, 2024
9567fd1
Replace MBEDTLS_MD_CAN_SHA3_512 in md.h
eleuzi01 Jun 26, 2024
cd90695
Merge pull request #9214 from eleuzi01/replace-mbedtls-md-can-sha3-512
ronald-cron-arm Jul 4, 2024
c971d80
Merge pull request #9315 from gilles-peskine-arm/psa_cipher_decrypt-c…
gilles-peskine-arm Jul 4, 2024
e290234
Merge pull request #9139 from bluerise/silence
gilles-peskine-arm Jul 4, 2024
4efd164
Merge pull request #8983 from Troy-Butler/handle-null-args
gilles-peskine-arm Jul 4, 2024
2fbe012
Replace MBEDTLS_MD_CAN_SHA3_256 with PSA_WANT_ALG_SHA3_256
eleuzi01 May 31, 2024
583c933
Replace MBEDTLS_MD_CAN_SHA3_256 in md.h
eleuzi01 Jun 26, 2024
675e150
Merge pull request #9212 from eleuzi01/replace-mbedtls-md-can-sha3-256
gilles-peskine-arm Jul 5, 2024
7fee5fb
Move some files to framework repository
davidhorstmann-arm Jul 5, 2024
cb7dfe8
Merge branch 'tmp-branch-move-files-to-framework' into dev/davidhorst…
davidhorstmann-arm Jul 5, 2024
1b173ae
Update paths in generate_test_cert_macros.py
davidhorstmann-arm Jun 12, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
3 changes: 3 additions & 0 deletions data_files/.gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
cli-rsa.csr
server2-rsa.csr
test-ca.csr
2,167 changes: 2,167 additions & 0 deletions data_files/Makefile

Large diffs are not rendered by default.

135 changes: 135 additions & 0 deletions data_files/Readme-x509.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,135 @@
This documents the X.509 CAs, certificates, and CRLS used for testing.

Certification authorities
-------------------------

There are two main CAs for use as trusted roots:
- test-ca.crt aka "C=NL, O=PolarSSL, CN=PolarSSL Test CA"
uses a RSA-2048 key
test-ca-sha1.crt and test-ca-sha256.crt use the same key, signed with
different hashes.
- test-ca2*.crt aka "C=NL, O=PolarSSL, CN=Polarssl Test EC CA"
uses an EC key with NIST P-384 (aka secp384r1)
variants used to test the keyUsage extension
The files test-ca_cat12 and test-ca_cat21 contain them concatenated both ways.

Two intermediate CAs are signed by them:
- test-int-ca.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate CA"
uses RSA-4096, signed by test-ca2
- test-int-ca-exp.crt is a copy that is expired
- test-int-ca2.crt "C=NL, O=PolarSSL, CN=PolarSSL Test Intermediate EC CA"
uses an EC key with NIST P-384, signed by test-ca

A third intermediate CA is signed by test-int-ca2.crt:
- test-int-ca3.crt "C=UK, O=mbed TLS, CN=mbed TLS Test intermediate CA 3"
uses an EC key with NIST P-256, signed by test-int-ca2

Finally, other CAs for specific purposes:
- enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert
enco-cert-utf8str.pem has its issuer's CN encoded as a UTF-8 string.
- test-ca-v1.crt: v1 "CA", signs
server1-v1.crt: v1 "intermediate CA", signs
server2-v1*.crt: EE cert (without of with chain in same file)
- keyUsage.decipherOnly.crt: has the decipherOnly keyUsage bit set

End-entity certificates
-----------------------

Short information fields:

- name or pattern
- issuing CA: 1 -> test-ca.crt
2 -> test-ca2.crt
I1 -> test-int-ca.crt
I2 -> test-int-ca2.crt
I3 -> test-int-ca3.crt
O -> other
- key type: R -> RSA, E -> EC
- C -> there is a CRL revoking this cert (see below)
- L -> CN=localhost (useful for local test servers)
- P1, P2 if the file includes parent (resp. parent + grandparent)
- free-form comments

List of certificates:

- cert_example_multi*.crt: 1/O R: subjectAltName
- cert_example_wildcard.crt: 1 R: wildcard in subject's CN
- cert_md*.crt, cert_sha*.crt: 1 R: signature hash
- cert_v1_with_ext.crt: 1 R: v1 with extensions (illegal)
- cli2.crt: 2 E: basic
- cli-rsa.key, cli-rsa-*.crt: RSA key used for test clients, signed by
the RSA test CA.
- enco-cert-utf8str.pem: see enco-ca-prstr.pem above
- server1*.crt: 1* R C* P1*: misc *(server1-v1 see test-ca-v1.crt above)
*CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt
P1 only for _ca.crt
- server2-v1*.crt: O R: see test-ca-v1.crt above
- server2*.crt: 1 R L: misc
- server3.crt: 1 E L: EC cert signed by RSA CA
- server4.crt: 2 R L: RSA cert signed by EC CA
- server5*.crt: 2* E L: misc *(except -selfsigned and -ss-*)
-sha*: hashes
.eku*: extendeKeyUsage (cli/srv = www client/server, cs = codesign, etc)
.ku*: keyUsage (ds = signatures, ke/ka = key exchange/agreement)
.req*: CSR, not certificate
-der*: trailing bytes in der (?)
-badsign.crt: S5 with corrupted signature
-expired.crt: S5 with "not after" date in the past
-future.crt: S5 with "not before" date in the future
-non-compliant.crt: S5, RFC non-compliant
(with forbidden EC algorithm identifier NULL parameter)
generated by (before fix):
cert_write subject_key=server5.key subject_name="CN=Test EC RFC non-compliant" issuer_crt=test-ca2.crt issuer_key=test-ca2.key
-selfsigned.crt: Self-signed cert with S5 key
-ss-expired.crt: Self-signed cert with S5 key, expired
-ss-forgeca.crt: Copy of test-int-ca3 self-signed with S5 key
- server6-ss-child.crt: O E: "child" of non-CA server5-selfsigned
- server6.crt, server6.pem: 2 E L C: revoked
- server7.crt: I1 E L P1(usually): EC signed by RSA signed by EC
-badsign.crt: S7 with corrupted signature + I1
-expired.crt: S7 with "not after" date in the past + I1
-future.crt: S7 with "not before" date in the future + I1
_int-ca-exp.crt: S7 + expired I1
_int-ca.crt: S7 + I1
_int-ca_ca2.crt: S7 + I1 + 2
_all_space.crt: S7 + I1 both with misplaced spaces (invalid PEM)
_pem_space.crt: S7 with misplaced space (invalid PEM) + I1
_trailing_space.crt: S7 + I1 both with trailing space (valid PEM)
_spurious_int-ca.crt: S7 + I2(spurious) + I1
- server8*.crt: I2 R L: RSA signed by EC signed by RSA (P1 for _int-ca2)
- server9*.crt: 1 R C* L P1*: signed using RSASSA-PSS
*CRL for: 9.crt, -badsign, -with-ca (P1)
- server10.crt: I3 E L
-badsign.crt: S10 with corrupted signature
-bs_int3.pem: S10-badsign + I3
_int3-bs.pem: S10 + I3-badsign
_int3_int-ca2.crt: S10 + I3 + I2
_int3_int-ca2_ca.crt: S10 + I3 + I2 + 1
_int3_spurious_int-ca2.crt: S10 + I3 + I1(spurious) + I2

Certificate revocation lists
----------------------------

Signing CA in parentheses (same meaning as certificates).

- crl-ec-sha*.pem: (2) server6.crt
- crl-future.pem: (2) server6.crt + unknown
- crl-rsa-pss-*.pem: (1) server9{,badsign,with-ca}.crt + cert_sha384.crt + unknown
- crl.pem, crl-futureRevocationDate.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.crt + unknown
- crl_md*.pem: crl_sha*.pem: (1) same as crl.pem
- crt_cat_*.pem: (1+2) concatenations in various orders:
ec = crl-ec-sha256.pem, ecfut = crl-future.pem
rsa = crl.pem, rsabadpem = same with pem error, rsaexp = crl_expired.pem

Note: crl_future would revoke server9 and cert_sha384.crt if signed by CA 1
crl-rsa-pss* would revoke server6.crt if signed by CA 2

Generation
----------

Newer test files have been generated through commands in the Makefile. The
resulting files are committed to the repository so that the tests can
run without having to re-do the generation and so that the output is the
same for everyone (the generation process is randomized).

The origin of older certificates has not been recorded.
Binary file added data_files/authorityKeyId_no_authorityKeyId.crt.der
Binary file not shown.
Binary file added data_files/authorityKeyId_no_issuer.crt.der
Binary file not shown.
Binary file added data_files/authorityKeyId_no_keyid.crt.der
Binary file not shown.
19 changes: 19 additions & 0 deletions data_files/authorityKeyId_subjectKeyId.conf
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
[req]
distinguished_name = req_distinguished_name
x509_extensions = v3_req
prompt = no
[req_distinguished_name]
countryName = NL
organizationalUnitName = PolarSSL
commonName = PolarSSL Test CA
[v3_req]
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid:always,issuer:always
[v3_req_authorityKeyId_no_keyid]
subjectKeyIdentifier = hash
authorityKeyIdentifier = issuer:always
[v3_req_authorityKeyId_no_issuer]
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid:always
[v3_req_no_authorityKeyId]
subjectKeyIdentifier = hash
Binary file added data_files/authorityKeyId_subjectKeyId.crt.der
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
2 changes: 2 additions & 0 deletions data_files/base64/cli_cid.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
// Client, CID 0xBEEF
AhUAAH8AAA8AAAQ8AAAAAF6MZUPMqAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABh7h8/aprLN1fS0KwLkZzKcsa5LNtDW7sYu7d1z7fNetuRjLJpX/A1mTSqeBY7li8AAAAAAAM7MIIDNzCCAh+gAwIBAgIBAjANBgkqhkiG9w0BAQsFADA7MQswCQYDVQQGEwJOTDERMA8GA1UECgwIUG9sYXJTU0wxGTAXBgNVBAMMEFBvbGFyU1NMIFRlc3QgQ0EwHhcNMTkwMjEwMTQ0NDA2WhcNMjkwMjEwMTQ0NDA2WjA0MQswCQYDVQQGEwJOTDERMA8GA1UECgwIUG9sYXJTU0wxEjAQBgNVBAMMCWxvY2FsaG9zdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMFNo93nzR3RBNdJcriZrA545Do8Ss86ExbQWuTNowCIp+4ea5anUrSQ7y1yej4kmvy2NKwk9XfgJmSMnLAofaHa6ozmyRyWvP7BBFKzNtSj+uGxdtiQwWG0ZlI2oiZTqqt0Xgd9GYLbKtgfoNkNHC1JZvdbJXNG6AuKT2kMtQCQ4dqCEGZ9rlQri2V5kaHiYcPNQEkI7mgM8YuG0ka/0LiqEQMef1aoGh5EGA8PhYvai0Re4hjGYi/HZo36Xdh98yeJKQHFkA4/J/EwyEoO79bex8cna8cFPXrEAjyaHT4P6DSYW8tzS1KW2BGiLICIaTla0w+w3lkvEcf36hIBMJcCAwEAAaNNMEswCQYDVR0TBAIwADAdBgNVHQ4EFgQUpQXoZLjc32APUBJNYKhkr02LQ5MwHwYDVR0jBBgwFoAUtFrkpbPe0lL2udWmlQ/rPrzH/f8wDQYJKoZIhvcNAQELBQADggEBAC465FJhPqel7zJngHIHJrqj/wVAxGAFOTF396XKATGAp+HRCqJ81Ry60CNK1jDzk8dv6M6UHoS7RIFiM/9rXQCbJfiPD5xMTejZp5n5UYHAmxsxDaazfA5FuBhkfokKK6jD4Eq91C94xGKb6X4/VkaPF7cqoBBw/bHxawXc0UEPjqayiBpCYU/rJoVZgLqFVP7Px3sva1nOrNx8rPPI1hJ+ZOg8maiPTxHZnBVLakSSLQy/sWeWyazO1RnrbxjrbgQtYKz0e3nwGpu1w13vfckFmUSBhHXH7AAS/HpKC4IH7G2GAk3+n8iSSN71sZzpxonQwVbopMZqLmbBm/7WPLcAAJRZtK1pHRuu/Uw+Y91KCaqMAHKWeVJvuqjiTaElrahsx+HYoZ1+8i5BMY1NOL/y4TR9qZdxY+7NvNrEdEoFgcI/DqUN0aKs0zAIPmk92pFnjnbro5LxWRm3JbtIFcG6PdN+9aAbISrewt6EERIPhS45aH+Si08NLrvM+CcEBfqBBqOD+4LCZqT8nDBtALJyRqiykibsAAFRgAAAAF6MZUNak74BhbcgvZ2M8WhZKjQyCix7GJzRs4SqnD7iXoxlQ7YXjsVI0K/xyMOJPkT9ZcPEi/2jHGIte1ZduW4Cvu8C3q0AAAAAAAAAAAAAAAIAAAAAAAAABwAAAQAAAAAAAwAAAA==
2 changes: 2 additions & 0 deletions data_files/base64/cli_ciphersuite.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
// TLS-RSA-WITH-AES-256-CCM-8
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
2 changes: 2 additions & 0 deletions data_files/base64/cli_def.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
// Client context with default MbedTLS configuration
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
2 changes: 2 additions & 0 deletions data_files/base64/cli_min_cfg.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
// Minimal configuration
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
3 changes: 3 additions & 0 deletions data_files/base64/cli_no_alpn.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
// Without MBEDTLS_SSL_ALPN
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

2 changes: 2 additions & 0 deletions data_files/base64/cli_no_keep_cert.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
// Without MBEDTLS_SSL_KEEP_PEER_CERTIFICATE
AhUAAAMAAAAAAACCAAAAAF6MKhTMqAAgSKCqXrcrmjqOBpxsGO3itQB09YgsSJwXmZB12QlB+wwhiof0mzAN0hupkLxu4Yyc9SgyFoEDPKJk8TiRo8bO2rkEfPItB5lUFkJwzdeuGVMAAAAABiCAy8MWqlj4vnIv0mswJvB35hyCOYWZ+fcZ6t5LzZgXPl6MKhRs69b+psiGUAo8OK3fU4HKOHNdi36tk22+ScctXowqFEyvzGcvbtI0VfWLKlOlDv+SwC08ZdCNa+RBZ/AAAAEAAAAAAAIAAA==
2 changes: 2 additions & 0 deletions data_files/base64/cli_no_mfl.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
// Without MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
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
2 changes: 2 additions & 0 deletions data_files/base64/cli_no_packing.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
// Without DTLS packing
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
5 changes: 5 additions & 0 deletions data_files/base64/def_b64_ff.bin
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
// Ensure that the b64 parser continues after encountering a 0xFF
// character. Note that this byte is invalid UTF-8, making this
// entire file invalid UTF-8. Use care when editing.
// -> � <-
AhUAAH8AAA4AAABtAAAAAF6HQx3MqAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACG2QbHbUj8eGpdx5KVIebiwk0jvRj9/3m6BOSzpA7qBXeEunhqr3D11NE7ciGjeHMAAACAAAAAAAAAAAAAAAAAAV6HQx248L77RH0Z973tSYNQ8zBsz861CZG5/T09TJz3XodDHe/iJ+cgXb5An3zTdnTBtw3EWAb68T+gCE33GN8AAAAAAAAAAAAAAAEAAAAAAAAAAwAAAQAAAAAAAgAAAA==
Loading