Applying current changes
Signed-off-by: TRodziewicz <tomasz.rodziewicz@mobica.com>
This commit is contained in:
commit
85dfc4de20
341 changed files with 25642 additions and 20327 deletions
23
.github/issue_template.md
vendored
23
.github/issue_template.md
vendored
|
@ -1,7 +1,17 @@
|
||||||
Note: This is just a template, so feel free to use/remove the unnecessary things
|
_Note:_ this is a template, please remove the parts that are not
|
||||||
|
applicable (these initial notes, and the "Bug" section for a Feature request
|
||||||
|
and vice-versa).
|
||||||
|
|
||||||
|
**Note:** to report a security vulnerability, see
|
||||||
|
[SECURITY.md](../SECURITY.md). Please do not use github issues for
|
||||||
|
vulnerabilities.
|
||||||
|
|
||||||
|
_Note:_ to get support, see [SUPPORT.md](../SUPPORT.md). Please do not use
|
||||||
|
github issues for questions.
|
||||||
|
|
||||||
|
---------------------------------------------------------------
|
||||||
### Description
|
### Description
|
||||||
- Type: Bug | Enhancement\Feature Request
|
- Type: Bug | Enhancement / Feature Request
|
||||||
- Priority: Blocker | Major | Minor
|
- Priority: Blocker | Major | Minor
|
||||||
|
|
||||||
---------------------------------------------------------------
|
---------------------------------------------------------------
|
||||||
|
@ -28,14 +38,9 @@ Version:
|
||||||
**Steps to reproduce**
|
**Steps to reproduce**
|
||||||
|
|
||||||
----------------------------------------------------------------
|
----------------------------------------------------------------
|
||||||
## Enhancement\Feature Request
|
## Enhancement / Feature Request
|
||||||
|
|
||||||
**Justification - why does the library need this feature?**
|
|
||||||
|
|
||||||
**Suggested enhancement**
|
**Suggested enhancement**
|
||||||
|
|
||||||
-----------------------------------------------------------------
|
**Justification - why does the library need this feature?**
|
||||||
|
|
||||||
## Question
|
|
||||||
|
|
||||||
**Please first check for answers in the [Mbed TLS knowledge Base](https://tls.mbed.org/kb). If you can't find the answer you're looking for then please use the [Mbed TLS mailing list](https://lists.trustedfirmware.org/mailman/listinfo/mbed-tls)**
|
|
||||||
|
|
4
.mypy.ini
Normal file
4
.mypy.ini
Normal file
|
@ -0,0 +1,4 @@
|
||||||
|
[mypy]
|
||||||
|
mypy_path = scripts
|
||||||
|
namespace_packages = True
|
||||||
|
warn_unused_configs = True
|
|
@ -1,3 +1,6 @@
|
||||||
|
[MASTER]
|
||||||
|
init-hook='import sys; sys.path.append("scripts")'
|
||||||
|
|
||||||
[BASIC]
|
[BASIC]
|
||||||
# We're ok with short funtion argument names.
|
# We're ok with short funtion argument names.
|
||||||
# [invalid-name]
|
# [invalid-name]
|
||||||
|
@ -12,9 +15,9 @@ bad-functions=input
|
||||||
# [missing-docstring]
|
# [missing-docstring]
|
||||||
docstring-min-length=10
|
docstring-min-length=10
|
||||||
|
|
||||||
# Allow longer methods than the default.
|
# No upper limit on method names. Pylint <2.1.0 has an upper limit of 30.
|
||||||
# [invalid-name]
|
# [invalid-name]
|
||||||
method-rgx=[a-z_][a-z0-9_]{2,35}$
|
method-rgx=[a-z_][a-z0-9_]{2,}$
|
||||||
|
|
||||||
# Allow module names containing a dash (but no underscore or uppercase letter).
|
# Allow module names containing a dash (but no underscore or uppercase letter).
|
||||||
# They are whole programs, not meant to be included by another module.
|
# They are whole programs, not meant to be included by another module.
|
||||||
|
|
|
@ -17,7 +17,7 @@ jobs:
|
||||||
language: python # Needed to get pip for Python 3
|
language: python # Needed to get pip for Python 3
|
||||||
python: 3.5 # version from Ubuntu 16.04
|
python: 3.5 # version from Ubuntu 16.04
|
||||||
install:
|
install:
|
||||||
- pip install pylint==2.4.4
|
- pip install mypy==0.780 pylint==2.4.4
|
||||||
script:
|
script:
|
||||||
- tests/scripts/all.sh -k 'check_*'
|
- tests/scripts/all.sh -k 'check_*'
|
||||||
- tests/scripts/all.sh -k test_default_out_of_box
|
- tests/scripts/all.sh -k test_default_out_of_box
|
||||||
|
|
55
BRANCHES.md
Normal file
55
BRANCHES.md
Normal file
|
@ -0,0 +1,55 @@
|
||||||
|
# Maintained branches
|
||||||
|
|
||||||
|
At any point in time, we have a number of maintained branches consisting of:
|
||||||
|
|
||||||
|
- The [`master`](https://github.com/ARMmbed/mbedtls/tree/master) branch:
|
||||||
|
this always contains the latest release, including all publicly available
|
||||||
|
security fixes.
|
||||||
|
- The [`development`](https://github.com/ARMmbed/mbedtls/tree/development) branch:
|
||||||
|
this is where new features land,
|
||||||
|
as well as bug fixes and security fixes.
|
||||||
|
- One or more long-time support (LTS) branches:
|
||||||
|
these only get bug fixes and security fixes.
|
||||||
|
|
||||||
|
We use [Semantic Versioning](https://semver.org/). In particular, we maintain
|
||||||
|
API compatibility in the `master` branch between major version changes. We
|
||||||
|
also maintain ABI compatibility within LTS branches; see the next section for
|
||||||
|
details.
|
||||||
|
|
||||||
|
## Backwards Compatibility
|
||||||
|
|
||||||
|
We maintain API compatibility in released versions of Mbed TLS. If you have
|
||||||
|
code that's working and secure with Mbed TLS x.y.z and does not rely on
|
||||||
|
undocumented features, then you should be able to re-compile it without
|
||||||
|
modification with any later release x.y'.z' with the same major version
|
||||||
|
number, and your code will still build, be secure, and work.
|
||||||
|
|
||||||
|
There are rare exceptions: code that was relying on something that became
|
||||||
|
insecure in the meantime (for example, crypto that was found to be weak) may
|
||||||
|
need to be changed. In case security comes in conflict with backwards
|
||||||
|
compatibility, we will put security first, but always attempt to provide a
|
||||||
|
compatibility option.
|
||||||
|
|
||||||
|
For the LTS branches, additionally we try very hard to also maintain ABI
|
||||||
|
compatibility (same definition as API except with re-linking instead of
|
||||||
|
re-compiling) and to avoid any increase in code size or RAM usage, or in the
|
||||||
|
minimum version of tools needed to build the code. The only exception, as
|
||||||
|
before, is in case those goals would conflict with fixing a security issue, we
|
||||||
|
will put security first but provide a compatibility option. (So far we never
|
||||||
|
had to break ABI compatibility in an LTS branch, but we occasionally had to
|
||||||
|
increase code size for a security fix.)
|
||||||
|
|
||||||
|
For contributors, see the [Backwards Compatibility section of
|
||||||
|
CONTRIBUTING](CONTRIBUTING.md#cackwords-compatibility).
|
||||||
|
|
||||||
|
## Current Branches
|
||||||
|
|
||||||
|
The following branches are currently maintained:
|
||||||
|
|
||||||
|
- [master](https://github.com/ARMmbed/mbedtls/tree/master)
|
||||||
|
- [`development`](https://github.com/ARMmbed/mbedtls/)
|
||||||
|
- [`mbedtls-2.16`](https://github.com/ARMmbed/mbedtls/tree/mbedtls-2.16)
|
||||||
|
maintained until at least the end of 2021, see
|
||||||
|
<https://tls.mbed.org/tech-updates/blog/announcing-lts-branch-mbedtls-2.16>
|
||||||
|
|
||||||
|
Users are urged to always use the latest version of a maintained branch.
|
20
BUGS.md
Normal file
20
BUGS.md
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
## Known issues
|
||||||
|
|
||||||
|
Known issues in Mbed TLS are [tracked on GitHub](https://github.com/ARMmbed/mbedtls/issues).
|
||||||
|
|
||||||
|
## Reporting a bug
|
||||||
|
|
||||||
|
If you think you've found a bug in Mbed TLS, please follow these steps:
|
||||||
|
|
||||||
|
1. Make sure you're using the latest version of a
|
||||||
|
[maintained branch](BRANCHES.md): `master`, `development`,
|
||||||
|
or a long-time support branch.
|
||||||
|
2. Check [GitHub](https://github.com/ARMmbed/mbedtls/issues) to see if
|
||||||
|
your issue has already been reported. If not, …
|
||||||
|
3. If the issue is a security risk (for example: buffer overflow,
|
||||||
|
data leak), please report it confidentially as described in
|
||||||
|
[`SECURITY.md`](SECURITY.md). If not, …
|
||||||
|
4. Please [create an issue on on GitHub](https://github.com/ARMmbed/mbedtls/issues).
|
||||||
|
|
||||||
|
Please do not use GitHub for support questions. If you want to know
|
||||||
|
how to do something with Mbed TLS, please see [`SUPPORT.md`](SUPPORT.md) for available documentation and support channels.
|
|
@ -10,10 +10,6 @@
|
||||||
# directories. That way, a target linking to a library (using the
|
# directories. That way, a target linking to a library (using the
|
||||||
# target_link_librairies command) inherits from the library PUBLIC include
|
# target_link_librairies command) inherits from the library PUBLIC include
|
||||||
# directories and not from the PRIVATE ones.
|
# directories and not from the PRIVATE ones.
|
||||||
# + Note: there is currently one remaining include_directories command in the
|
|
||||||
# CMake files. It is related to ZLIB support which is planned to be removed.
|
|
||||||
# When the support is removed, the associated include_directories command
|
|
||||||
# will be removed as well as this note.
|
|
||||||
# - MBEDTLS_TARGET_PREFIX: CMake targets are designed to be alterable by calling
|
# - MBEDTLS_TARGET_PREFIX: CMake targets are designed to be alterable by calling
|
||||||
# CMake in order to avoid target name clashes, via the use of
|
# CMake in order to avoid target name clashes, via the use of
|
||||||
# MBEDTLS_TARGET_PREFIX. The value of this variable is prefixed to the
|
# MBEDTLS_TARGET_PREFIX. The value of this variable is prefixed to the
|
||||||
|
@ -42,9 +38,6 @@ endif()
|
||||||
# Set the project root directory.
|
# Set the project root directory.
|
||||||
set(MBEDTLS_DIR ${CMAKE_CURRENT_SOURCE_DIR})
|
set(MBEDTLS_DIR ${CMAKE_CURRENT_SOURCE_DIR})
|
||||||
|
|
||||||
option(USE_PKCS11_HELPER_LIBRARY "Build mbed TLS with the pkcs11-helper library." OFF)
|
|
||||||
option(ENABLE_ZLIB_SUPPORT "Build mbed TLS with zlib library." OFF)
|
|
||||||
|
|
||||||
option(ENABLE_PROGRAMS "Build mbed TLS programs." ON)
|
option(ENABLE_PROGRAMS "Build mbed TLS programs." ON)
|
||||||
|
|
||||||
option(UNSAFE_BUILD "Allow unsafe builds. These builds ARE NOT SECURE." OFF)
|
option(UNSAFE_BUILD "Allow unsafe builds. These builds ARE NOT SECURE." OFF)
|
||||||
|
@ -179,6 +172,9 @@ if(CMAKE_COMPILER_IS_GNU)
|
||||||
execute_process(COMMAND ${CMAKE_C_COMPILER} -dumpversion
|
execute_process(COMMAND ${CMAKE_C_COMPILER} -dumpversion
|
||||||
OUTPUT_VARIABLE GCC_VERSION)
|
OUTPUT_VARIABLE GCC_VERSION)
|
||||||
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings")
|
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings")
|
||||||
|
if (GCC_VERSION VERSION_GREATER 3.0 OR GCC_VERSION VERSION_EQUAL 3.0)
|
||||||
|
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wformat=2 -Wno-format-nonliteral")
|
||||||
|
endif()
|
||||||
if (GCC_VERSION VERSION_GREATER 4.3 OR GCC_VERSION VERSION_EQUAL 4.3)
|
if (GCC_VERSION VERSION_GREATER 4.3 OR GCC_VERSION VERSION_EQUAL 4.3)
|
||||||
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wvla")
|
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wvla")
|
||||||
endif()
|
endif()
|
||||||
|
@ -194,6 +190,9 @@ if(CMAKE_COMPILER_IS_GNU)
|
||||||
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wformat-signedness")
|
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wformat-signedness")
|
||||||
endif()
|
endif()
|
||||||
endif()
|
endif()
|
||||||
|
if (GCC_VERSION VERSION_GREATER 7.0 OR GCC_VERSION VERSION_EQUAL 7.0)
|
||||||
|
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wformat-overflow=2 -Wformat-truncation")
|
||||||
|
endif()
|
||||||
set(CMAKE_C_FLAGS_RELEASE "-O2")
|
set(CMAKE_C_FLAGS_RELEASE "-O2")
|
||||||
set(CMAKE_C_FLAGS_DEBUG "-O0 -g3")
|
set(CMAKE_C_FLAGS_DEBUG "-O0 -g3")
|
||||||
set(CMAKE_C_FLAGS_COVERAGE "-O0 -g3 --coverage")
|
set(CMAKE_C_FLAGS_COVERAGE "-O0 -g3 --coverage")
|
||||||
|
@ -204,7 +203,7 @@ if(CMAKE_COMPILER_IS_GNU)
|
||||||
endif(CMAKE_COMPILER_IS_GNU)
|
endif(CMAKE_COMPILER_IS_GNU)
|
||||||
|
|
||||||
if(CMAKE_COMPILER_IS_CLANG)
|
if(CMAKE_COMPILER_IS_CLANG)
|
||||||
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings -Wpointer-arith -Wimplicit-fallthrough -Wshadow -Wvla")
|
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wwrite-strings -Wpointer-arith -Wimplicit-fallthrough -Wshadow -Wvla -Wformat=2 -Wno-format-nonliteral")
|
||||||
set(CMAKE_C_FLAGS_RELEASE "-O2")
|
set(CMAKE_C_FLAGS_RELEASE "-O2")
|
||||||
set(CMAKE_C_FLAGS_DEBUG "-O0 -g3")
|
set(CMAKE_C_FLAGS_DEBUG "-O0 -g3")
|
||||||
set(CMAKE_C_FLAGS_COVERAGE "-O0 -g3 --coverage")
|
set(CMAKE_C_FLAGS_COVERAGE "-O0 -g3 --coverage")
|
||||||
|
@ -250,14 +249,6 @@ else()
|
||||||
set(LIB_INSTALL_DIR lib)
|
set(LIB_INSTALL_DIR lib)
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
if(ENABLE_ZLIB_SUPPORT)
|
|
||||||
find_package(ZLIB)
|
|
||||||
|
|
||||||
if(ZLIB_FOUND)
|
|
||||||
include_directories(${ZLIB_INCLUDE_DIR})
|
|
||||||
endif(ZLIB_FOUND)
|
|
||||||
endif(ENABLE_ZLIB_SUPPORT)
|
|
||||||
|
|
||||||
add_subdirectory(include)
|
add_subdirectory(include)
|
||||||
|
|
||||||
add_subdirectory(3rdparty)
|
add_subdirectory(3rdparty)
|
||||||
|
|
|
@ -22,9 +22,10 @@ Making a Contribution
|
||||||
1. All new files should include the [Apache-2.0](https://spdx.org/licenses/Apache-2.0.html) standard license header where possible.
|
1. All new files should include the [Apache-2.0](https://spdx.org/licenses/Apache-2.0.html) standard license header where possible.
|
||||||
1. Ensure that each commit has at least one `Signed-off-by:` line from the committer. If anyone else contributes to the commit, they should also add their own `Signed-off-by:` line. By adding this line, contributor(s) certify that the contribution is made under the terms of the [Developer Certificate of Origin](dco.txt). The contribution licensing is described in the [License section of the README](README.md#License).
|
1. Ensure that each commit has at least one `Signed-off-by:` line from the committer. If anyone else contributes to the commit, they should also add their own `Signed-off-by:` line. By adding this line, contributor(s) certify that the contribution is made under the terms of the [Developer Certificate of Origin](dco.txt). The contribution licensing is described in the [License section of the README](README.md#License).
|
||||||
|
|
||||||
API/ABI Compatibility
|
Backwards Compatibility
|
||||||
---------------------
|
-----------------------
|
||||||
The project aims to minimise the impact on users upgrading to newer versions of the library and it should not be necessary for a user to make any changes to their own code to work with a newer version of the library. Unless the user has made an active decision to use newer features, a newer generation of the library or a change has been necessary due to a security issue or other significant software defect, no modifications to their own code should be necessary. To achieve this, API compatibility is maintained between different versions of Mbed TLS on the main development branch and in LTS (Long Term Support) branches.
|
|
||||||
|
The project aims to minimise the impact on users upgrading to newer versions of the library and it should not be necessary for a user to make any changes to their own code to work with a newer version of the library. Unless the user has made an active decision to use newer features, a newer generation of the library or a change has been necessary due to a security issue or other significant software defect, no modifications to their own code should be necessary. To achieve this, API compatibility is maintained between different versions of Mbed TLS on the main development branch and in LTS (Long Term Support) branches, as described in [BRANCHES.md](BRANCHES.md).
|
||||||
|
|
||||||
To minimise such disruption to users, where a change to the interface is required, all changes to the ABI or API, even on the main development branch where new features are added, need to be justifiable by either being a significant enhancement, new feature or bug fix which is best resolved by an interface change.
|
To minimise such disruption to users, where a change to the interface is required, all changes to the ABI or API, even on the main development branch where new features are added, need to be justifiable by either being a significant enhancement, new feature or bug fix which is best resolved by an interface change.
|
||||||
|
|
||||||
|
@ -48,6 +49,9 @@ When backporting to these branches please observe the following rules:
|
||||||
|
|
||||||
It would be highly appreciated if contributions are backported to LTS branches in addition to the [development branch](https://github.com/ARMmbed/mbedtls/tree/development) by contributors.
|
It would be highly appreciated if contributions are backported to LTS branches in addition to the [development branch](https://github.com/ARMmbed/mbedtls/tree/development) by contributors.
|
||||||
|
|
||||||
|
The list of maintained branches can be found in the [Current Branches section
|
||||||
|
of BRANCHES.md](BRANCHES.md#current-branches).
|
||||||
|
|
||||||
Currently maintained LTS branches are:
|
Currently maintained LTS branches are:
|
||||||
1. [mbedtls-2.7](https://github.com/ARMmbed/mbedtls/tree/mbedtls-2.7)
|
1. [mbedtls-2.7](https://github.com/ARMmbed/mbedtls/tree/mbedtls-2.7)
|
||||||
1. [mbedtls-2.16](https://github.com/ARMmbed/mbedtls/tree/mbedtls-2.16)
|
1. [mbedtls-2.16](https://github.com/ARMmbed/mbedtls/tree/mbedtls-2.16)
|
||||||
|
|
113
ChangeLog
113
ChangeLog
|
@ -1,5 +1,116 @@
|
||||||
mbed TLS ChangeLog (Sorted per branch, date)
|
mbed TLS ChangeLog (Sorted per branch, date)
|
||||||
|
|
||||||
|
= mbed TLS 2.26.0 branch released 2021-03-08
|
||||||
|
|
||||||
|
API changes
|
||||||
|
* Renamed the PSA Crypto API output buffer size macros to bring them in line
|
||||||
|
with version 1.0.0 of the specification.
|
||||||
|
* The API glue function mbedtls_ecc_group_of_psa() now takes the curve size
|
||||||
|
in bits rather than bytes, with an additional flag to indicate if the
|
||||||
|
size may have been rounded up to a whole number of bytes.
|
||||||
|
* Renamed the PSA Crypto API AEAD tag length macros to bring them in line
|
||||||
|
with version 1.0.0 of the specification.
|
||||||
|
|
||||||
|
Default behavior changes
|
||||||
|
* In mbedtls_rsa_context objects, the ver field was formerly documented
|
||||||
|
as always 0. It is now reserved for internal purposes and may take
|
||||||
|
different values.
|
||||||
|
|
||||||
|
New deprecations
|
||||||
|
* PSA_KEY_EXPORT_MAX_SIZE, PSA_HASH_SIZE, PSA_MAC_FINAL_SIZE,
|
||||||
|
PSA_BLOCK_CIPHER_BLOCK_SIZE, PSA_MAX_BLOCK_CIPHER_BLOCK_SIZE and
|
||||||
|
PSA_ALG_TLS12_PSK_TO_MS_MAX_PSK_LEN have been renamed, and the old names
|
||||||
|
deprecated.
|
||||||
|
* PSA_ALG_AEAD_WITH_DEFAULT_TAG_LENGTH and PSA_ALG_AEAD_WITH_TAG_LENGTH
|
||||||
|
have been renamed, and the old names deprecated.
|
||||||
|
|
||||||
|
Features
|
||||||
|
* The PSA crypto subsystem can now use HMAC_DRBG instead of CTR_DRBG.
|
||||||
|
CTR_DRBG is used by default if it is available, but you can override
|
||||||
|
this choice by setting MBEDTLS_PSA_HMAC_DRBG_MD_TYPE at compile time.
|
||||||
|
Fix #3354.
|
||||||
|
* Automatic fallback to a software implementation of ECP when
|
||||||
|
MBEDTLS_ECP_xxx_ALT accelerator hooks are in use can now be turned off
|
||||||
|
through setting the new configuration flag MBEDTLS_ECP_NO_FALLBACK.
|
||||||
|
* The PSA crypto subsystem can now be configured to use less static RAM by
|
||||||
|
tweaking the setting for the maximum amount of keys simultaneously in RAM.
|
||||||
|
MBEDTLS_PSA_KEY_SLOT_COUNT sets the maximum number of volatile keys that
|
||||||
|
can exist simultaneously. It has a sensible default if not overridden.
|
||||||
|
* Partial implementation of the PSA crypto driver interface: Mbed TLS can
|
||||||
|
now use an external random generator instead of the library's own
|
||||||
|
entropy collection and DRBG code. Enable MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG
|
||||||
|
and see the documentation of mbedtls_psa_external_get_random() for details.
|
||||||
|
* Applications using both mbedtls_xxx and psa_xxx functions (for example,
|
||||||
|
applications using TLS and MBEDTLS_USE_PSA_CRYPTO) can now use the PSA
|
||||||
|
random generator with mbedtls_xxx functions. See the documentation of
|
||||||
|
mbedtls_psa_get_random() for details.
|
||||||
|
* In the PSA API, the policy for a MAC or AEAD algorithm can specify a
|
||||||
|
minimum MAC or tag length thanks to the new wildcards
|
||||||
|
PSA_ALG_AT_LEAST_THIS_LENGTH_MAC and
|
||||||
|
PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG.
|
||||||
|
|
||||||
|
Security
|
||||||
|
* Fix a security reduction in CTR_DRBG when the initial seeding obtained a
|
||||||
|
nonce from entropy. Applications were affected if they called
|
||||||
|
mbedtls_ctr_drbg_set_nonce_len(), if they called
|
||||||
|
mbedtls_ctr_drbg_set_entropy_len() with a size that was 3/2 times the key
|
||||||
|
length, or when the entropy module uses SHA-256 and CTR_DRBG uses AES-256.
|
||||||
|
In such cases, a random nonce was necessary to achieve the advertised
|
||||||
|
security strength, but the code incorrectly used a constant instead of
|
||||||
|
entropy from the nonce.
|
||||||
|
Found by John Stroebel in #3819 and fixed in #3973.
|
||||||
|
* Fix a buffer overflow in mbedtls_mpi_sub_abs() when calculating
|
||||||
|
|A| - |B| where |B| is larger than |A| and has more limbs (so the
|
||||||
|
function should return MBEDTLS_ERR_MPI_NEGATIVE_VALUE). Only
|
||||||
|
applications calling mbedtls_mpi_sub_abs() directly are affected:
|
||||||
|
all calls inside the library were safe since this function is
|
||||||
|
only called with |A| >= |B|. Reported by Guido Vranken in #4042.
|
||||||
|
* Fix an errorneous estimation for an internal buffer in
|
||||||
|
mbedtls_pk_write_key_pem(). If MBEDTLS_MPI_MAX_SIZE is set to an odd
|
||||||
|
value the function might fail to write a private RSA keys of the largest
|
||||||
|
supported size.
|
||||||
|
Found by Daniel Otte, reported in #4093 and fixed in #4094.
|
||||||
|
* Fix a stack buffer overflow with mbedtls_net_poll() and
|
||||||
|
mbedtls_net_recv_timeout() when given a file descriptor that is
|
||||||
|
beyond FD_SETSIZE. Reported by FigBug in #4169.
|
||||||
|
* Guard against strong local side channel attack against base64 tables by
|
||||||
|
making access aceess to them use constant flow code.
|
||||||
|
|
||||||
|
Bugfix
|
||||||
|
* Fix use-after-scope error in programs/ssl/ssl_client2.c and ssl_server2.c
|
||||||
|
* Fix memory leak that occured when calling psa_close_key() on a
|
||||||
|
wrapped key with MBEDTLS_PSA_CRYPTO_SE_C defined.
|
||||||
|
* Fix an incorrect error code if an RSA private operation glitched.
|
||||||
|
* Fix a memory leak in an error case in psa_generate_derived_key_internal().
|
||||||
|
* Fix a resource leak in CTR_DRBG and HMAC_DRBG when MBEDTLS_THREADING_C
|
||||||
|
is enabled, on platforms where initializing a mutex allocates resources.
|
||||||
|
This was a regression introduced in the previous release. Reported in
|
||||||
|
#4017, #4045 and #4071.
|
||||||
|
* Ensure that calling mbedtls_rsa_free() or mbedtls_entropy_free()
|
||||||
|
twice is safe. This happens for RSA when some Mbed TLS library functions
|
||||||
|
fail. Such a double-free was not safe when MBEDTLS_THREADING_C was
|
||||||
|
enabled on platforms where freeing a mutex twice is not safe.
|
||||||
|
* Fix a resource leak in a bad-arguments case of mbedtls_rsa_gen_key()
|
||||||
|
when MBEDTLS_THREADING_C is enabled on platforms where initializing
|
||||||
|
a mutex allocates resources.
|
||||||
|
* Fixes a bug where, if the library was configured to include support for
|
||||||
|
both the old SE interface and the new PSA driver interface, external keys were
|
||||||
|
not loaded from storage. This was fixed by #3996.
|
||||||
|
* This change makes 'mbedtls_x509write_crt_set_basic_constraints'
|
||||||
|
consistent with RFC 5280 4.2.1.9 which says: "Conforming CAs MUST
|
||||||
|
include this extension in all CA certificates that contain public keys
|
||||||
|
used to validate digital signatures on certificates and MUST mark the
|
||||||
|
extension as critical in such certificates." Previous to this change,
|
||||||
|
the extension was always marked as non-critical. This was fixed by
|
||||||
|
#3698.
|
||||||
|
|
||||||
|
Changes
|
||||||
|
* A new library C file psa_crypto_client.c has been created to contain
|
||||||
|
the PSA code needed by a PSA crypto client when the PSA crypto
|
||||||
|
implementation is not included into the library.
|
||||||
|
* On recent enough versions of FreeBSD and DragonFlyBSD, the entropy module
|
||||||
|
now uses the getrandom syscall instead of reading from /dev/urandom.
|
||||||
|
|
||||||
= mbed TLS 2.25.0 branch released 2020-12-11
|
= mbed TLS 2.25.0 branch released 2020-12-11
|
||||||
|
|
||||||
API changes
|
API changes
|
||||||
|
@ -20,7 +131,7 @@ Requirement changes
|
||||||
warning on CMake 3.19.0. #3801
|
warning on CMake 3.19.0. #3801
|
||||||
|
|
||||||
New deprecations
|
New deprecations
|
||||||
* PSA_KEY_TYPE_CHACHA20 and PSA_KEY_TYPE_ARC4 have been deprecated.
|
* PSA_ALG_CHACHA20 and PSA_ALG_ARC4 have been deprecated.
|
||||||
Use PSA_ALG_STREAM_CIPHER instead.
|
Use PSA_ALG_STREAM_CIPHER instead.
|
||||||
* The functions mbedtls_cipher_auth_encrypt() and
|
* The functions mbedtls_cipher_auth_encrypt() and
|
||||||
mbedtls_cipher_auth_decrypt() are deprecated in favour of the new
|
mbedtls_cipher_auth_decrypt() are deprecated in favour of the new
|
||||||
|
|
5
ChangeLog.d/bugfix_PR3616.txt
Normal file
5
ChangeLog.d/bugfix_PR3616.txt
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
Bugfix
|
||||||
|
* Fix premature fopen() call in mbedtls_entropy_write_seed_file which may
|
||||||
|
lead to the seed file corruption in case if the path to the seed file is
|
||||||
|
equal to MBEDTLS_PLATFORM_STD_NV_SEED_FILE. Contributed by Victor
|
||||||
|
Krasnoshchok in #3616.
|
2
ChangeLog.d/dtls_sample_use_read_timeout.txt
Normal file
2
ChangeLog.d/dtls_sample_use_read_timeout.txt
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
Changes
|
||||||
|
* Fix the setting of the read timeout in the DTLS sample programs.
|
5
ChangeLog.d/fix-invalid-id-error-code.txt
Normal file
5
ChangeLog.d/fix-invalid-id-error-code.txt
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
Bugfix
|
||||||
|
* PSA functions creating a key now return PSA_ERROR_INVALID_ARGUMENT rather
|
||||||
|
than PSA_ERROR_INVALID_HANDLE when the identifier specified for the key
|
||||||
|
to create is not valid, bringing them in line with version 1.0.0 of the
|
||||||
|
specification. Fix #4271.
|
10
ChangeLog.d/fix-printf-specifiers.txt
Normal file
10
ChangeLog.d/fix-printf-specifiers.txt
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
Bugfix
|
||||||
|
* Add printf function attributes to mbedtls_debug_print_msg to ensure we
|
||||||
|
get printf format specifier warnings.
|
||||||
|
Changes
|
||||||
|
* Add extra printf compiler warning flags to builds.
|
||||||
|
Requirement changes
|
||||||
|
* The library now uses the %zu format specifier with the printf() family of
|
||||||
|
functions, so requires a toolchain that supports it. This change does not
|
||||||
|
affect the maintained LTS branches, so when contributing changes please
|
||||||
|
bear this in mind and do not add them to backported code.
|
2
ChangeLog.d/fix_memsan_build_clang11.txt
Normal file
2
ChangeLog.d/fix_memsan_build_clang11.txt
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
Changes
|
||||||
|
* Fix memsan build false positive in x509_crt.c with clang 11
|
4
ChangeLog.d/fix_return_type_for_invalid_crypto_key.txt
Normal file
4
ChangeLog.d/fix_return_type_for_invalid_crypto_key.txt
Normal file
|
@ -0,0 +1,4 @@
|
||||||
|
Bugfix
|
||||||
|
* PSA functions other than psa_open_key now return PSA_ERROR_INVALID_HANDLE
|
||||||
|
rather than PSA_ERROR_DOES_NOT_EXIST for an invalid handle, bringing them
|
||||||
|
in line with version 1.0.0 of the specification. Fix #4162.
|
3
ChangeLog.d/issue1792.txt
Normal file
3
ChangeLog.d/issue1792.txt
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
Bugfix
|
||||||
|
* Fix a bug in ECDSA that would cause it to fail when the hash is all-bits
|
||||||
|
zero. Fixes #1792
|
|
@ -1,10 +0,0 @@
|
||||||
Security
|
|
||||||
* Fix a security reduction in CTR_DRBG when the initial seeding obtained a
|
|
||||||
nonce from entropy. Applications were affected if they called
|
|
||||||
mbedtls_ctr_drbg_set_nonce_len(), if they called
|
|
||||||
mbedtls_ctr_drbg_set_entropy_len() with a size that was 3/2 times the key
|
|
||||||
length, or when the entropy module uses SHA-256 and CTR_DRBG uses AES-256.
|
|
||||||
In such cases, a random nonce was necessary to achieve the advertised
|
|
||||||
security strength, but the code incorrectly used a constant instead of
|
|
||||||
entropy from the nonce.
|
|
||||||
Found by John Stroebel in #3819 and fixed in #3973.
|
|
2
ChangeLog.d/issue4280.txt
Normal file
2
ChangeLog.d/issue4280.txt
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
Removals
|
||||||
|
* Removed deprecated functions from hashing modules. Fixes #4280.
|
2
ChangeLog.d/issue4283.txt
Normal file
2
ChangeLog.d/issue4283.txt
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
Removals
|
||||||
|
* Remove deprecated error codes. Fix #4283
|
2
ChangeLog.d/issue4284.txt
Normal file
2
ChangeLog.d/issue4284.txt
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
Removals
|
||||||
|
* Removed deprecated things in psa/crypto_compat.h. Fixes #4284
|
7
ChangeLog.d/move_alt_helpers.txt
Normal file
7
ChangeLog.d/move_alt_helpers.txt
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
API changes
|
||||||
|
* Move alt helpers and definitions.
|
||||||
|
Various helpers and definitions available for use in alt implementations
|
||||||
|
have been moved out of the include/ directory and into the library/
|
||||||
|
directory. The files concerned are ecp_internal.h and rsa_internal.h
|
||||||
|
which have also been renamed to ecp_alt.h and rsa_alt_helpers.h
|
||||||
|
respectively.
|
6
ChangeLog.d/move_internal_headers.txt
Normal file
6
ChangeLog.d/move_internal_headers.txt
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
API changes
|
||||||
|
* Move internal headers.
|
||||||
|
Header files that were only meant for the library's internal use and
|
||||||
|
were not meant to be used in application code have been moved out of
|
||||||
|
the include/ directory. The headers concerned are bn_mul.h, aesni.h,
|
||||||
|
padlock.h, entropy_poll.h and *_internal.h.
|
3
ChangeLog.d/mpi_read_negative_zero.txt
Normal file
3
ChangeLog.d/mpi_read_negative_zero.txt
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
Bugfix
|
||||||
|
* mbedtls_mpi_read_string on "-0" produced an MPI object that was not treated
|
||||||
|
as equal to 0 in all cases. Fix it to produce the same object as "0".
|
5
ChangeLog.d/pkcs1_v21_sign_ext.txt
Normal file
5
ChangeLog.d/pkcs1_v21_sign_ext.txt
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
Features
|
||||||
|
* Add mbedtls_rsa_rsassa_pss_sign_ext() function allowing to generate a
|
||||||
|
signature with a specific salt length. This function allows to validate
|
||||||
|
test cases provided in the NIST's CAVP test suite. Contributed by Cédric
|
||||||
|
Meuter in PR #3183.
|
|
@ -1,2 +0,0 @@
|
||||||
Bugfix
|
|
||||||
* Fix use-after-scope error in programs/ssl/ssl_client2.c and ssl_server2.c
|
|
|
@ -1,5 +0,0 @@
|
||||||
Features
|
|
||||||
* The PSA crypto subsystem can now use HMAC_DRBG instead of CTR_DRBG.
|
|
||||||
CTR_DRBG is used by default if it is available, but you can override
|
|
||||||
this choice by setting MBEDTLS_PSA_HMAC_DRBG_MD_TYPE at compile time.
|
|
||||||
Fix #3354.
|
|
|
@ -1,3 +0,0 @@
|
||||||
Bugfix
|
|
||||||
* Fix memory leak that occured when calling psa_close_key() on a
|
|
||||||
wrapped key with MBEDTLS_PSA_CRYPTO_SE_C defined.
|
|
14
ChangeLog.d/remove_allow_sha1_in_certificates
Normal file
14
ChangeLog.d/remove_allow_sha1_in_certificates
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
Removals
|
||||||
|
* Remove the MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
|
||||||
|
compile-time option, which was off by default. Users should not trust
|
||||||
|
certificates signed with SHA-1 due to the known attacks against SHA-1.
|
||||||
|
If needed, SHA-1 cerificate can still be used by providing custom
|
||||||
|
verification profile to mbedtls_x509_crt_verify_with_profile function
|
||||||
|
in x509_crt.h, or mbedtls_ssl_conf_cert_profile function in ssl.h.
|
||||||
|
Example of custom verification profile, supporting SHA-1:
|
||||||
|
const mbedtls_x509_crt_profile mbedtls_x509_crt_custom = {
|
||||||
|
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA1 ),
|
||||||
|
0xFFFFFFF, /* Any PK alg */
|
||||||
|
0xFFFFFFF, /* Any curve */
|
||||||
|
2048
|
||||||
|
};
|
5
ChangeLog.d/remove_certs.txt
Normal file
5
ChangeLog.d/remove_certs.txt
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
API changes
|
||||||
|
* Remove certs module from the API.
|
||||||
|
Transfer keys and certificates embedded in the library to the test
|
||||||
|
component. This contributes to minimizing library API and discourages
|
||||||
|
users from using unsafe keys in production.
|
|
@ -1,7 +1,9 @@
|
||||||
API changes
|
API changes
|
||||||
* Remove HAVEGE module.
|
* Remove HAVEGE module.
|
||||||
The design of HAVEGE makes it unsuitable for microcontrollers. Platforms with a more complex
|
The design of HAVEGE makes it unsuitable for microcontrollers. Platforms
|
||||||
CPU usually have an operating system interface that provides better randomness.
|
with a more complex CPU usually have an operating system interface that
|
||||||
Instead of HAVEGE, declare OS or hardware RNG interfaces with mbedtls_entropy_add_source()
|
provides better randomness. Instead of HAVEGE, declare OS or hardware RNG
|
||||||
and/or use an entropy seed file created securely during device provisioning.
|
interfaces with mbedtls_entropy_add_source() and/or use an entropy seed
|
||||||
See https://tls.mbed.org/kb/how-to/add-entropy-sources-to-entropy-pool for more information.
|
file created securely during device provisioning. See
|
||||||
|
https://tls.mbed.org/kb/how-to/add-entropy-sources-to-entropy-pool for
|
||||||
|
more information.
|
||||||
|
|
10
ChangeLog.d/remove_obsolete_tls_features.txt
Normal file
10
ChangeLog.d/remove_obsolete_tls_features.txt
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
API changes
|
||||||
|
* Drop support for parsing SSLv2 ClientHello
|
||||||
|
(MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO).
|
||||||
|
* Drop support for SSLv3 (MBEDTLS_SSL_PROTO_SSL3).
|
||||||
|
* Drop support for compatibility with our own previous buggy
|
||||||
|
implementation of truncated HMAC (MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT).
|
||||||
|
* Drop support for TLS record-level compression (MBEDTLS_ZLIB_SUPPORT).
|
||||||
|
* Drop support for RC4 TLS ciphersuites.
|
||||||
|
* Drop support for single-DES ciphersuites.
|
||||||
|
* Drop support for MBEDTLS_SSL_HW_RECORD_ACCEL.
|
3
ChangeLog.d/remove_old_transition_helpers.txt
Normal file
3
ChangeLog.d/remove_old_transition_helpers.txt
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
API changes
|
||||||
|
* Remove helpers for the transition from Mbed TLS 1.3 to Mbed TLS 2.0: the
|
||||||
|
header compat-1.3.h and the script rename.pl.
|
6
ChangeLog.d/remove_pkcs11.txt
Normal file
6
ChangeLog.d/remove_pkcs11.txt
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
Removals
|
||||||
|
* Remove PKCS#11 library wrapper. PKCS#11 has limited functionality,
|
||||||
|
lacks automated tests and has scarce documentation. Also, PSA Crypto
|
||||||
|
provides a more flexible private key management.
|
||||||
|
More details on PCKS#11 wrapper removal can be found in the mailing list
|
||||||
|
https://lists.trustedfirmware.org/pipermail/mbed-tls/2020-April/000024.html
|
|
@ -1,2 +0,0 @@
|
||||||
Bugfix
|
|
||||||
* Fix an incorrect error code if an RSA private operation glitched.
|
|
4
Makefile
4
Makefile
|
@ -138,11 +138,11 @@ C_SOURCE_FILES = $(wildcard \
|
||||||
tests/suites/*.function \
|
tests/suites/*.function \
|
||||||
)
|
)
|
||||||
# Exuberant-ctags invocation. Other ctags implementations may require different options.
|
# Exuberant-ctags invocation. Other ctags implementations may require different options.
|
||||||
CTAGS = ctags --langmap=c:+.h.function -o
|
CTAGS = ctags --langmap=c:+.h.function --line-directives=no -o
|
||||||
tags: $(C_SOURCE_FILES)
|
tags: $(C_SOURCE_FILES)
|
||||||
$(CTAGS) $@ $(C_SOURCE_FILES)
|
$(CTAGS) $@ $(C_SOURCE_FILES)
|
||||||
TAGS: $(C_SOURCE_FILES)
|
TAGS: $(C_SOURCE_FILES)
|
||||||
etags -o $@ $(C_SOURCE_FILES)
|
etags --no-line-directive -o $@ $(C_SOURCE_FILES)
|
||||||
global: GPATH GRTAGS GSYMS GTAGS
|
global: GPATH GRTAGS GSYMS GTAGS
|
||||||
GPATH GRTAGS GSYMS GTAGS: $(C_SOURCE_FILES)
|
GPATH GRTAGS GSYMS GTAGS: $(C_SOURCE_FILES)
|
||||||
ls $(C_SOURCE_FILES) | gtags -f - --gtagsconf .globalrc
|
ls $(C_SOURCE_FILES) | gtags -f - --gtagsconf .globalrc
|
||||||
|
|
|
@ -25,6 +25,8 @@ To generate a local copy of the library documentation in HTML format, tailored t
|
||||||
1. Run `make apidoc`.
|
1. Run `make apidoc`.
|
||||||
1. Browse `apidoc/index.html` or `apidoc/modules.html`.
|
1. Browse `apidoc/index.html` or `apidoc/modules.html`.
|
||||||
|
|
||||||
|
For other sources of documentation, see the [SUPPORT](SUPPORT.md) document.
|
||||||
|
|
||||||
Compiling
|
Compiling
|
||||||
---------
|
---------
|
||||||
|
|
||||||
|
|
20
SECURITY.md
Normal file
20
SECURITY.md
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
## Reporting Vulneratibilities
|
||||||
|
|
||||||
|
If you think you have found an Mbed TLS security vulnerability, then please
|
||||||
|
send an email to the security team at
|
||||||
|
<mbed-tls-security@lists.trustedfirmware.org>.
|
||||||
|
|
||||||
|
## Security Incident Handling Process
|
||||||
|
|
||||||
|
Our security process is detailled in our
|
||||||
|
[security
|
||||||
|
center](https://developer.trustedfirmware.org/w/mbed-tls/security-center/).
|
||||||
|
|
||||||
|
Its primary goal is to ensure fixes are ready to be deployed when the issue
|
||||||
|
goes public.
|
||||||
|
|
||||||
|
## Maintained branches
|
||||||
|
|
||||||
|
Only the maintained branches, as listed in [`BRANCHES.md`](BRANCHES.md),
|
||||||
|
get security fixes.
|
||||||
|
Users are urged to always use the latest version of a maintained branch.
|
15
SUPPORT.md
Normal file
15
SUPPORT.md
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
## Documentation
|
||||||
|
|
||||||
|
Here are some useful sources of information about using Mbed TLS:
|
||||||
|
|
||||||
|
- API documentation, see the [Documentation section of the
|
||||||
|
README](README.md#License);
|
||||||
|
- the `docs` directory in the source tree;
|
||||||
|
- the [Mbed TLS knowledge Base](https://tls.mbed.org/kb);
|
||||||
|
- the [Mbed TLS mailing-list
|
||||||
|
archives](https://lists.trustedfirmware.org/pipermail/mbed-tls/).
|
||||||
|
|
||||||
|
## Asking Questions
|
||||||
|
|
||||||
|
If you can't find your answer in the above sources, please use the [Mbed TLS
|
||||||
|
mailing list](https://lists.trustedfirmware.org/mailman/listinfo/mbed-tls).
|
|
@ -65,7 +65,6 @@
|
||||||
|
|
||||||
/* For test certificates */
|
/* For test certificates */
|
||||||
#define MBEDTLS_BASE64_C
|
#define MBEDTLS_BASE64_C
|
||||||
#define MBEDTLS_CERTS_C
|
|
||||||
#define MBEDTLS_PEM_PARSE_C
|
#define MBEDTLS_PEM_PARSE_C
|
||||||
|
|
||||||
/* For testing with compat.sh */
|
/* For testing with compat.sh */
|
||||||
|
|
|
@ -39,7 +39,6 @@
|
||||||
/* mbed TLS feature support */
|
/* mbed TLS feature support */
|
||||||
#define MBEDTLS_CIPHER_MODE_CBC
|
#define MBEDTLS_CIPHER_MODE_CBC
|
||||||
#define MBEDTLS_CIPHER_PADDING_PKCS7
|
#define MBEDTLS_CIPHER_PADDING_PKCS7
|
||||||
#define MBEDTLS_REMOVE_ARC4_CIPHERSUITES
|
|
||||||
#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
||||||
#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
||||||
#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
|
#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
|
||||||
|
|
|
@ -48,7 +48,7 @@
|
||||||
* Used in:
|
* Used in:
|
||||||
* library/aria.c
|
* library/aria.c
|
||||||
* library/timing.c
|
* library/timing.c
|
||||||
* include/mbedtls/bn_mul.h
|
* library/bn_mul.h
|
||||||
*
|
*
|
||||||
* Required by:
|
* Required by:
|
||||||
* MBEDTLS_AESNI_C
|
* MBEDTLS_AESNI_C
|
||||||
|
@ -661,10 +661,6 @@
|
||||||
* Warning: Only do so when you know what you are doing. This allows for
|
* Warning: Only do so when you know what you are doing. This allows for
|
||||||
* channels with virtually no security at all!
|
* channels with virtually no security at all!
|
||||||
*
|
*
|
||||||
* This enables the following ciphersuites:
|
|
||||||
* MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA
|
|
||||||
* MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA
|
|
||||||
*
|
|
||||||
* Uncomment this macro to enable weak ciphersuites
|
* Uncomment this macro to enable weak ciphersuites
|
||||||
*
|
*
|
||||||
* \warning DES is considered a weak cipher and its use constitutes a
|
* \warning DES is considered a weak cipher and its use constitutes a
|
||||||
|
@ -672,19 +668,6 @@
|
||||||
*/
|
*/
|
||||||
//#define MBEDTLS_ENABLE_WEAK_CIPHERSUITES
|
//#define MBEDTLS_ENABLE_WEAK_CIPHERSUITES
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_REMOVE_ARC4_CIPHERSUITES
|
|
||||||
*
|
|
||||||
* Remove RC4 ciphersuites by default in SSL / TLS.
|
|
||||||
* This flag removes the ciphersuites based on RC4 from the default list as
|
|
||||||
* returned by mbedtls_ssl_list_ciphersuites(). However, it is still possible to
|
|
||||||
* enable (some of) them with mbedtls_ssl_conf_ciphersuites() by including them
|
|
||||||
* explicitly.
|
|
||||||
*
|
|
||||||
* Uncomment this macro to remove RC4 ciphersuites by default.
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_REMOVE_ARC4_CIPHERSUITES
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_ECP_DP_SECP192R1_ENABLED
|
* \def MBEDTLS_ECP_DP_SECP192R1_ENABLED
|
||||||
*
|
*
|
||||||
|
@ -774,7 +757,6 @@
|
||||||
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
||||||
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_PSK_WITH_RC4_128_SHA
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
||||||
|
|
||||||
|
@ -798,7 +780,6 @@
|
||||||
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
||||||
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA
|
|
||||||
*
|
*
|
||||||
* \warning Using DHE constitutes a security risk as it
|
* \warning Using DHE constitutes a security risk as it
|
||||||
* is not possible to validate custom DH parameters.
|
* is not possible to validate custom DH parameters.
|
||||||
|
@ -825,7 +806,6 @@
|
||||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
|
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
||||||
|
|
||||||
|
@ -850,7 +830,6 @@
|
||||||
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
||||||
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
|
||||||
|
|
||||||
|
@ -877,8 +856,6 @@
|
||||||
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
|
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
|
||||||
* MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_RSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_RSA_WITH_RC4_128_MD5
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
||||||
|
|
||||||
|
@ -936,7 +913,6 @@
|
||||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
|
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
|
||||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||||
|
|
||||||
|
@ -960,7 +936,6 @@
|
||||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
|
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
|
||||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||||
|
|
||||||
|
@ -973,7 +948,6 @@
|
||||||
*
|
*
|
||||||
* This enables the following ciphersuites (if other requisites are
|
* This enables the following ciphersuites (if other requisites are
|
||||||
* enabled as well):
|
* enabled as well):
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
|
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
|
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
|
||||||
|
@ -997,7 +971,6 @@
|
||||||
*
|
*
|
||||||
* This enables the following ciphersuites (if other requisites are
|
* This enables the following ciphersuites (if other requisites are
|
||||||
* enabled as well):
|
* enabled as well):
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
|
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
|
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
|
||||||
|
@ -1370,20 +1343,10 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_SSL_FALLBACK_SCSV
|
#define MBEDTLS_SSL_FALLBACK_SCSV
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_SSL_HW_RECORD_ACCEL
|
|
||||||
*
|
|
||||||
* Enable hooking functions in SSL module for hardware acceleration of
|
|
||||||
* individual records.
|
|
||||||
*
|
|
||||||
* Uncomment this macro to enable hooking functions.
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_SSL_HW_RECORD_ACCEL
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SSL_CBC_RECORD_SPLITTING
|
* \def MBEDTLS_SSL_CBC_RECORD_SPLITTING
|
||||||
*
|
*
|
||||||
* Enable 1/n-1 record splitting for CBC mode in SSLv3 and TLS 1.0.
|
* Enable 1/n-1 record splitting for CBC mode in TLS 1.0.
|
||||||
*
|
*
|
||||||
* This is a countermeasure to the BEAST attack, which also minimizes the risk
|
* This is a countermeasure to the BEAST attack, which also minimizes the risk
|
||||||
* of interoperability issues compared to sending 0-length records.
|
* of interoperability issues compared to sending 0-length records.
|
||||||
|
@ -1414,16 +1377,6 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_SSL_RENEGOTIATION
|
#define MBEDTLS_SSL_RENEGOTIATION
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
|
|
||||||
*
|
|
||||||
* Enable support for receiving and parsing SSLv2 Client Hello messages for the
|
|
||||||
* SSL Server module (MBEDTLS_SSL_SRV_C).
|
|
||||||
*
|
|
||||||
* Uncomment this macro to enable support for SSLv2 Client Hello messages.
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE
|
* \def MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE
|
||||||
*
|
*
|
||||||
|
@ -1443,18 +1396,6 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
|
#define MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_SSL_PROTO_SSL3
|
|
||||||
*
|
|
||||||
* Enable support for SSL 3.0.
|
|
||||||
*
|
|
||||||
* Requires: MBEDTLS_MD5_C
|
|
||||||
* MBEDTLS_SHA1_C
|
|
||||||
*
|
|
||||||
* Comment this macro to disable support for SSL 3.0
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_SSL_PROTO_SSL3
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SSL_PROTO_TLS1
|
* \def MBEDTLS_SSL_PROTO_TLS1
|
||||||
*
|
*
|
||||||
|
@ -1619,30 +1560,6 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_SSL_TRUNCATED_HMAC
|
#define MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT
|
|
||||||
*
|
|
||||||
* Fallback to old (pre-2.7), non-conforming implementation of the truncated
|
|
||||||
* HMAC extension which also truncates the HMAC key. Note that this option is
|
|
||||||
* only meant for a transitory upgrade period and is likely to be removed in
|
|
||||||
* a future version of the library.
|
|
||||||
*
|
|
||||||
* \warning The old implementation is non-compliant and has a security weakness
|
|
||||||
* (2^80 brute force attack on the HMAC key used for a single,
|
|
||||||
* uninterrupted connection). This should only be enabled temporarily
|
|
||||||
* when (1) the use of truncated HMAC is essential in order to save
|
|
||||||
* bandwidth, and (2) the peer is an Mbed TLS stack that doesn't use
|
|
||||||
* the fixed implementation yet (pre-2.7).
|
|
||||||
*
|
|
||||||
* \deprecated This option is deprecated and will likely be removed in a
|
|
||||||
* future version of Mbed TLS.
|
|
||||||
*
|
|
||||||
* Uncomment to fallback to old, non-compliant truncated HMAC implementation.
|
|
||||||
*
|
|
||||||
* Requires: MBEDTLS_SSL_TRUNCATED_HMAC
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_THREADING_ALT
|
* \def MBEDTLS_THREADING_ALT
|
||||||
*
|
*
|
||||||
|
@ -1754,31 +1671,6 @@
|
||||||
* Comment this macro to disallow using RSASSA-PSS in certificates.
|
* Comment this macro to disallow using RSASSA-PSS in certificates.
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
#define MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_ZLIB_SUPPORT
|
|
||||||
*
|
|
||||||
* If set, the SSL/TLS module uses ZLIB to support compression and
|
|
||||||
* decompression of packet data.
|
|
||||||
*
|
|
||||||
* \warning TLS-level compression MAY REDUCE SECURITY! See for example the
|
|
||||||
* CRIME attack. Before enabling this option, you should examine with care if
|
|
||||||
* CRIME or similar exploits may be applicable to your use case.
|
|
||||||
*
|
|
||||||
* \note Currently compression can't be used with DTLS.
|
|
||||||
*
|
|
||||||
* \deprecated This feature is deprecated and will be removed
|
|
||||||
* in the next major revision of the library.
|
|
||||||
*
|
|
||||||
* Used in: library/ssl_tls.c
|
|
||||||
* library/ssl_cli.c
|
|
||||||
* library/ssl_srv.c
|
|
||||||
*
|
|
||||||
* This feature requires zlib library and headers to be present.
|
|
||||||
*
|
|
||||||
* Uncomment to enable use of ZLIB
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_ZLIB_SUPPORT
|
|
||||||
/* \} name SECTION: mbed TLS feature support */
|
/* \} name SECTION: mbed TLS feature support */
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -1887,16 +1779,6 @@
|
||||||
*
|
*
|
||||||
* This module enables the following ciphersuites (if other requisites are
|
* This module enables the following ciphersuites (if other requisites are
|
||||||
* enabled as well):
|
* enabled as well):
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_RSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_RSA_WITH_RC4_128_MD5
|
|
||||||
* MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_PSK_WITH_RC4_128_SHA
|
|
||||||
*
|
*
|
||||||
* \warning ARC4 is considered a weak cipher and its use constitutes a
|
* \warning ARC4 is considered a weak cipher and its use constitutes a
|
||||||
* security risk. If possible, we recommend avoidng dependencies on
|
* security risk. If possible, we recommend avoidng dependencies on
|
||||||
|
@ -1955,7 +1837,7 @@
|
||||||
* library/ecp.c
|
* library/ecp.c
|
||||||
* library/ecdsa.c
|
* library/ecdsa.c
|
||||||
* library/rsa.c
|
* library/rsa.c
|
||||||
* library/rsa_internal.c
|
* library/rsa_alt_helpers.h
|
||||||
* library/ssl_tls.c
|
* library/ssl_tls.c
|
||||||
*
|
*
|
||||||
* This module is required for RSA, DHM and ECC (ECDH, ECDSA) support.
|
* This module is required for RSA, DHM and ECC (ECDH, ECDSA) support.
|
||||||
|
@ -2092,18 +1974,6 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_CCM_C
|
#define MBEDTLS_CCM_C
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_CERTS_C
|
|
||||||
*
|
|
||||||
* Enable the test certificates.
|
|
||||||
*
|
|
||||||
* Module: library/certs.c
|
|
||||||
* Caller:
|
|
||||||
*
|
|
||||||
* This module is used for testing (ssl_client/server).
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_CERTS_C
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_CHACHA20_C
|
* \def MBEDTLS_CHACHA20_C
|
||||||
*
|
*
|
||||||
|
@ -2607,21 +2477,6 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_PKCS5_C
|
#define MBEDTLS_PKCS5_C
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_PKCS11_C
|
|
||||||
*
|
|
||||||
* Enable wrapper for PKCS#11 smartcard support.
|
|
||||||
*
|
|
||||||
* Module: library/pkcs11.c
|
|
||||||
* Caller: library/pk.c
|
|
||||||
*
|
|
||||||
* Requires: MBEDTLS_PK_C
|
|
||||||
*
|
|
||||||
* This module enables SSL/TLS PKCS #11 smartcard support.
|
|
||||||
* Requires the presence of the PKCS#11 helper library (libpkcs11-helper)
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_PKCS11_C
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_PKCS12_C
|
* \def MBEDTLS_PKCS12_C
|
||||||
*
|
*
|
||||||
|
@ -2722,7 +2577,7 @@
|
||||||
* Enable the RSA public-key cryptosystem.
|
* Enable the RSA public-key cryptosystem.
|
||||||
*
|
*
|
||||||
* Module: library/rsa.c
|
* Module: library/rsa.c
|
||||||
* library/rsa_internal.c
|
* library/rsa_alt_helpers.h
|
||||||
* Caller: library/ssl_cli.c
|
* Caller: library/ssl_cli.c
|
||||||
* library/ssl_srv.c
|
* library/ssl_srv.c
|
||||||
* library/ssl_tls.c
|
* library/ssl_tls.c
|
||||||
|
@ -3237,7 +3092,6 @@
|
||||||
*/
|
*/
|
||||||
//#define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
|
//#define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
|
||||||
|
|
||||||
//#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400 /**< Lifetime of session tickets (if enabled) */
|
|
||||||
//#define MBEDTLS_PSK_MAX_LEN 32 /**< Max size of TLS pre-shared keys, in bytes (default 256 bits) */
|
//#define MBEDTLS_PSK_MAX_LEN 32 /**< Max size of TLS pre-shared keys, in bytes (default 256 bits) */
|
||||||
//#define MBEDTLS_SSL_COOKIE_TIMEOUT 60 /**< Default expiration delay of DTLS cookies, in seconds if HAVE_TIME, or in number of cookies issued */
|
//#define MBEDTLS_SSL_COOKIE_TIMEOUT 60 /**< Default expiration delay of DTLS cookies, in seconds if HAVE_TIME, or in number of cookies issued */
|
||||||
|
|
||||||
|
@ -3259,20 +3113,6 @@
|
||||||
//#define MBEDTLS_X509_MAX_INTERMEDIATE_CA 8 /**< Maximum number of intermediate CAs in a verification chain. */
|
//#define MBEDTLS_X509_MAX_INTERMEDIATE_CA 8 /**< Maximum number of intermediate CAs in a verification chain. */
|
||||||
//#define MBEDTLS_X509_MAX_FILE_PATH_LEN 512 /**< Maximum length of a path/filename string in bytes including the null terminator character ('\0'). */
|
//#define MBEDTLS_X509_MAX_FILE_PATH_LEN 512 /**< Maximum length of a path/filename string in bytes including the null terminator character ('\0'). */
|
||||||
|
|
||||||
/**
|
|
||||||
* Allow SHA-1 in the default TLS configuration for certificate signing.
|
|
||||||
* Without this build-time option, SHA-1 support must be activated explicitly
|
|
||||||
* through mbedtls_ssl_conf_cert_profile. Turning on this option is not
|
|
||||||
* recommended because of it is possible to generate SHA-1 collisions, however
|
|
||||||
* this may be safe for legacy infrastructure where additional controls apply.
|
|
||||||
*
|
|
||||||
* \warning SHA-1 is considered a weak message digest and its use constitutes
|
|
||||||
* a security risk. If possible, we recommend avoiding dependencies
|
|
||||||
* on it, and considering stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
// #define MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Allow SHA-1 in the default TLS configuration for TLS 1.2 handshake
|
* Allow SHA-1 in the default TLS configuration for TLS 1.2 handshake
|
||||||
* signature and ciphersuite selection. Without this build-time option, SHA-1
|
* signature and ciphersuite selection. Without this build-time option, SHA-1
|
||||||
|
|
|
@ -73,7 +73,6 @@
|
||||||
|
|
||||||
/* For test certificates */
|
/* For test certificates */
|
||||||
#define MBEDTLS_BASE64_C
|
#define MBEDTLS_BASE64_C
|
||||||
#define MBEDTLS_CERTS_C
|
|
||||||
#define MBEDTLS_PEM_PARSE_C
|
#define MBEDTLS_PEM_PARSE_C
|
||||||
|
|
||||||
/* Save RAM at the expense of ROM */
|
/* Save RAM at the expense of ROM */
|
||||||
|
|
73
docs/architecture/psa-crypto-implementation-structure.md
Normal file
73
docs/architecture/psa-crypto-implementation-structure.md
Normal file
|
@ -0,0 +1,73 @@
|
||||||
|
PSA Cryptograpy API implementation and PSA driver interface
|
||||||
|
===========================================================
|
||||||
|
|
||||||
|
## Introduction
|
||||||
|
|
||||||
|
The [PSA Cryptography API specification](https://armmbed.github.io/mbed-crypto/psa/#application-programming-interface) defines an interface to cryptographic operations for which the Mbed TLS library provides a reference implementation. The PSA Cryptography API specification is complemented by the PSA driver interface specification which defines an interface for cryptoprocessor drivers.
|
||||||
|
|
||||||
|
This document describes the high level organization of the Mbed TLS PSA Cryptography API implementation which is tightly related to the PSA driver interface.
|
||||||
|
|
||||||
|
## High level organization of the Mbed TLS PSA Cryptography API implementation
|
||||||
|
In one sentence, the Mbed TLS PSA Cryptography API implementation is made of a core and PSA drivers as defined in the PSA driver interface. The key point is that software cryptographic operations are organized as PSA drivers: they interact with the core through the PSA driver interface.
|
||||||
|
|
||||||
|
### Rationale
|
||||||
|
|
||||||
|
* Addressing software and hardware cryptographic implementations through the same C interface reduces the core code size and its call graph complexity. The core and its dispatching to software and hardware implementations are consequently easier to test and validate.
|
||||||
|
* The organization of the software cryptographic implementations in drivers promotes modularization of those implementations.
|
||||||
|
* As hardware capabilities, software cryptographic functionalities can be described by a JSON driver description file as defined in the PSA driver interface.
|
||||||
|
* Along with JSON driver description files, the PSA driver specification defines the deliverables for a driver to be included into the Mbed TLS PSA Cryptography implementation. This provides a natural framework to integrate third party or alternative software implementations of cryptographic operations.
|
||||||
|
|
||||||
|
## The Mbed TLS PSA Cryptography API implementation core
|
||||||
|
|
||||||
|
The core implements all the APIs as defined in the PSA Cryptography API specification but does not perform on its own any cryptographic operation. The core relies on PSA drivers to actually
|
||||||
|
perform the cryptographic operations. The core is responsible for:
|
||||||
|
|
||||||
|
* the key store.
|
||||||
|
* checking PSA API arguments and translating them into valid arguments for the necessary calls to the PSA driver interface.
|
||||||
|
* dispatching the cryptographic operations to the appropriate PSA drivers.
|
||||||
|
|
||||||
|
The sketch of an Mbed TLS PSA cryptographic API implementation is thus:
|
||||||
|
```C
|
||||||
|
psa_status_t psa_api( ... )
|
||||||
|
{
|
||||||
|
psa_status_t status;
|
||||||
|
|
||||||
|
/* Pre driver interface call processing: validation of arguments, building
|
||||||
|
* of arguments for the call to the driver interface, ... */
|
||||||
|
|
||||||
|
...
|
||||||
|
|
||||||
|
/* Call to the driver interface */
|
||||||
|
status = psa_driver_wrapper_<entry_point>( ... );
|
||||||
|
if( status != PSA_SUCCESS )
|
||||||
|
return( status );
|
||||||
|
|
||||||
|
/* Post driver interface call processing: validation of the values returned
|
||||||
|
* by the driver, finalization of the values to return to the caller,
|
||||||
|
* clean-up in case of error ... */
|
||||||
|
}
|
||||||
|
```
|
||||||
|
The code of most PSA APIs is expected to match precisely the above layout. However, it is likely that the code structure of some APIs will be more complicated with several calls to the driver interface, mainly to encompass a larger variety of hardware designs. For example, to encompass hardware accelerators that are capable of verifying a MAC and those that are only capable of computing a MAC, the psa_mac_verify() API could call first psa_driver_wrapper_mac_verify() and then fallback to psa_driver_wrapper_mac_compute().
|
||||||
|
|
||||||
|
The implementations of `psa_driver_wrapper_<entry_point>` functions are generated by the build system based on the JSON driver description files of the various PSA drivers making up the Mbed TLS PSA Cryptography API implementation. The implementations are generated in a psa_crypto_driver_wrappers.c C file and the function prototypes declared in a psa_crypto_driver_wrappers.h header file.
|
||||||
|
|
||||||
|
The psa_driver_wrapper_<entry_point>() functions dispatch cryptographic operations to accelerator drivers, secure element drivers as well as to the software implementations of cryptographic operations.
|
||||||
|
|
||||||
|
Note that the implementation allows to build the library with only a C compiler by shipping a generated file corresponding to a pure software implementation. The driver entry points and their code in this generated file are guarded by pre-processor directives based on PSA_WANT_xyz macros (see [Conditional inclusion of cryptographic mechanism through the PSA API in Mbed TLS](psa-conditional-inclusion-c.html). That way, it is possible to compile and include in the library only the desired cryptographic operations.
|
||||||
|
|
||||||
|
### Key creation
|
||||||
|
|
||||||
|
Key creation implementation in Mbed TLS PSA core is articulated around three internal functions: psa_start_key_creation(), psa_finish_key_creation() and psa_fail_key_creation(). Implementations of key creation PSA APIs, namely psa_import_key(), psa_generate_key(), psa_key_derivation_output_key() and psa_copy_key() go by the following sequence:
|
||||||
|
1. Check the input parameters.
|
||||||
|
2. Call psa_start_key_creation() that allocates a key slot, prepares it with the specified key attributes, and in case of a volatile key assign it a volatile key identifier.
|
||||||
|
3. Generate or copy the key material into the key slot. This entails the allocation of the buffer to store the key material.
|
||||||
|
4. Call psa_finish_key_creation() that mostly saves persistent keys into persistent storage.
|
||||||
|
|
||||||
|
In case of any error occuring at step 3 or 4, psa_fail_key_creation() is called. It wipes and cleans the slot especially the key material: reset to zero of the RAM memory that contained the key material, free the allocated buffer.
|
||||||
|
|
||||||
|
|
||||||
|
## Mbed TLS PSA Cryptography API implementation drivers
|
||||||
|
|
||||||
|
A driver of the Mbed TLS PSA Cryptography API implementation (Mbed TLS PSA driver in the following) is a driver in the sense that it is compliant with the PSA driver interface specification. But it is not an actual driver that drives some hardware. It implements cryptographic operations purely in software.
|
||||||
|
|
||||||
|
An Mbed TLS PSA driver C file is named psa_crypto_<driver_name>.c and its associated header file psa_crypto_<driver_name>.h. The functions implementing a driver entry point as defined in the PSA driver interface specification are named as mbedtls_psa_<driver name>_<entry point>(). As an example, the psa_crypto_rsa.c and psa_crypto_rsa.h are the files containing the Mbed TLS PSA driver implementing RSA cryptographic operations. This RSA driver implements among other entry points the "import_key" entry point. The function implementing this entry point is named mbedtls_psa_rsa_import_key().
|
|
@ -31,7 +31,7 @@ Do not add test-specific interfaces if there's a practical way of doing it anoth
|
||||||
|
|
||||||
### Reliance on internal details
|
### Reliance on internal details
|
||||||
|
|
||||||
In unit tests and in test programs, it's ok to include header files from `library/`. Do not define non-public interfaces in public headers (`include/mbedtls` has `*_internal.h` headers for legacy reasons, but this approach is deprecated). In contrast, sample programs must not include header files from `library/`.
|
In unit tests and in test programs, it's ok to include internal header files from `library/`. Do not define non-public interfaces in public headers. In contrast, sample programs must not include header files from `library/`.
|
||||||
|
|
||||||
Sometimes it makes sense to have unit tests on functions that aren't part of the public API. Declare such functions in `library/*.h` and include the corresponding header in the test code. If the function should be `static` for optimization but can't be `static` for testing, declare it as `MBEDTLS_STATIC_TESTABLE`, and make the tests that use it depend on `MBEDTLS_TEST_HOOKS` (see [“rules for compile-time options”](#rules-for-compile-time-options)).
|
Sometimes it makes sense to have unit tests on functions that aren't part of the public API. Declare such functions in `library/*.h` and include the corresponding header in the test code. If the function should be `static` for optimization but can't be `static` for testing, declare it as `MBEDTLS_STATIC_TESTABLE`, and make the tests that use it depend on `MBEDTLS_TEST_HOOKS` (see [“rules for compile-time options”](#rules-for-compile-time-options)).
|
||||||
|
|
||||||
|
|
|
@ -47,3 +47,22 @@ together with their level of testing:
|
||||||
Those functions are implemented in `library/ssl_tls13_keys.c` and
|
Those functions are implemented in `library/ssl_tls13_keys.c` and
|
||||||
tested in `test_suite_ssl` using test vectors from RFC 8448 and
|
tested in `test_suite_ssl` using test vectors from RFC 8448 and
|
||||||
https://tls13.ulfheim.net/.
|
https://tls13.ulfheim.net/.
|
||||||
|
|
||||||
|
- New TLS Message Processing Stack (MPS)
|
||||||
|
|
||||||
|
The TLS 1.3 prototype is developed alongside a rewrite of the TLS messaging layer,
|
||||||
|
encompassing low-level details such as record parsing, handshake reassembly, and
|
||||||
|
DTLS retransmission state machine.
|
||||||
|
|
||||||
|
MPS has the following components:
|
||||||
|
- Layer 1 (Datagram handling)
|
||||||
|
- Layer 2 (Record handling)
|
||||||
|
- Layer 3 (Message handling)
|
||||||
|
- Layer 4 (Retransmission State Machine)
|
||||||
|
- Reader (Abstracted pointer arithmetic and reassembly logic for incoming data)
|
||||||
|
- Writer (Abstracted pointer arithmetic and fragmentation logic for outgoing data)
|
||||||
|
|
||||||
|
Of those components, the following have been upstreamed
|
||||||
|
as part of `MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL`:
|
||||||
|
|
||||||
|
- Reader ([`library/mps_reader.h`](../../library/mps_reader.h))
|
||||||
|
|
|
@ -203,7 +203,7 @@ This example shows how to encrypt data using an AES (Advanced Encryption Standar
|
||||||
void encrypt_with_symmetric_ciphers(const uint8_t *key, size_t key_len)
|
void encrypt_with_symmetric_ciphers(const uint8_t *key, size_t key_len)
|
||||||
{
|
{
|
||||||
enum {
|
enum {
|
||||||
block_size = PSA_BLOCK_CIPHER_BLOCK_SIZE(PSA_KEY_TYPE_AES),
|
block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES),
|
||||||
};
|
};
|
||||||
psa_status_t status;
|
psa_status_t status;
|
||||||
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
|
@ -288,7 +288,7 @@ This example shows how to decrypt encrypted data using an AES key in CBC mode wi
|
||||||
void decrypt_with_symmetric_ciphers(const uint8_t *key, size_t key_len)
|
void decrypt_with_symmetric_ciphers(const uint8_t *key, size_t key_len)
|
||||||
{
|
{
|
||||||
enum {
|
enum {
|
||||||
block_size = PSA_BLOCK_CIPHER_BLOCK_SIZE(PSA_KEY_TYPE_AES),
|
block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES),
|
||||||
};
|
};
|
||||||
psa_status_t status;
|
psa_status_t status;
|
||||||
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
|
@ -445,7 +445,7 @@ This example shows how to verify the SHA-256 hash of a message:
|
||||||
0x5d, 0xae, 0x22, 0x23, 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c,
|
0x5d, 0xae, 0x22, 0x23, 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c,
|
||||||
0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad
|
0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad
|
||||||
};
|
};
|
||||||
size_t expected_hash_len = PSA_HASH_SIZE(alg);
|
size_t expected_hash_len = PSA_HASH_LENGTH(alg);
|
||||||
|
|
||||||
printf("Verify a hash...\t");
|
printf("Verify a hash...\t");
|
||||||
fflush(stdout);
|
fflush(stdout);
|
||||||
|
@ -482,7 +482,7 @@ This example shows how to verify the SHA-256 hash of a message:
|
||||||
mbedtls_psa_crypto_free();
|
mbedtls_psa_crypto_free();
|
||||||
```
|
```
|
||||||
|
|
||||||
The API provides the macro `PSA_HASH_SIZE`, which returns the expected hash length (in bytes) for the specified algorithm.
|
The API provides the macro `PSA_HASH_LENGTH`, which returns the expected hash length (in bytes) for the specified algorithm.
|
||||||
|
|
||||||
#### Handling hash operation contexts
|
#### Handling hash operation contexts
|
||||||
|
|
||||||
|
|
|
@ -5,8 +5,6 @@ This document is a proposed interface for deciding at build time which cryptogra
|
||||||
|
|
||||||
This is currently a proposal for Mbed TLS. It is not currently on track for standardization in PSA.
|
This is currently a proposal for Mbed TLS. It is not currently on track for standardization in PSA.
|
||||||
|
|
||||||
Time-stamp: "2020/11/26 09:30:50 GMT"
|
|
||||||
|
|
||||||
## Introduction
|
## Introduction
|
||||||
|
|
||||||
### Purpose of this specification
|
### Purpose of this specification
|
||||||
|
@ -86,9 +84,17 @@ For each constant or constructor macro of the form `PSA_KEY_TYPE_xxx`, the symbo
|
||||||
|
|
||||||
For asymmetric cryptography, `PSA_WANT_KEY_TYPE_xxx_KEY_PAIR` determines whether private-key operations are desired, and `PSA_WANT_KEY_TYPE_xxx_PUBLIC_KEY` determines whether public-key operations are desired. `PSA_WANT_KEY_TYPE_xxx_KEY_PAIR` implicitly enables `PSA_WANT_KEY_TYPE_xxx_PUBLIC_KEY`: there is no way to only include private-key operations (which typically saves little code).
|
For asymmetric cryptography, `PSA_WANT_KEY_TYPE_xxx_KEY_PAIR` determines whether private-key operations are desired, and `PSA_WANT_KEY_TYPE_xxx_PUBLIC_KEY` determines whether public-key operations are desired. `PSA_WANT_KEY_TYPE_xxx_KEY_PAIR` implicitly enables `PSA_WANT_KEY_TYPE_xxx_PUBLIC_KEY`: there is no way to only include private-key operations (which typically saves little code).
|
||||||
|
|
||||||
#### Configuration symbols for curves
|
#### Configuration symbols for elliptic curves
|
||||||
|
|
||||||
For elliptic curve key types, only the specified curves are included. To include a curve, include a symbol of the form **`PSA_WANT_ECC_family_size`**. For example: `PSA_WANT_ECC_SECP_R1_256` for secp256r1, `PSA_WANT_ECC_MONTGOMERY_CURVE25519`. It is an error to require an ECC key type but no curve, and Mbed TLS will reject this at compile time.
|
For elliptic curve key types, only the specified curves are included. To include a curve, include a symbol of the form **`PSA_WANT_ECC_family_size`**. For example: `PSA_WANT_ECC_SECP_R1_256` for secp256r1, `PSA_WANT_ECC_MONTGOMERY_255` for Curve25519. It is an error to require an ECC key type but no curve, and Mbed TLS will reject this at compile time.
|
||||||
|
|
||||||
|
Rationale: this is a deviation of the general principle that `PSA_ECC_FAMILY_xxx` would have a corresponding symbol `PSA_WANT_ECC_FAMILY_xxx`. This deviation is justified by the fact that it is very common to wish to include only certain curves in a family, and that can lead to a significant gain in code size.
|
||||||
|
|
||||||
|
#### Configuration symbols for Diffie-Hellman groups
|
||||||
|
|
||||||
|
There are no configuration symbols for Diffie-Hellman groups (`PSA_DH_GROUP_xxx`).
|
||||||
|
|
||||||
|
Rationale: Finite-field Diffie-Hellman code is usually not specialized for any particular group, so reducing the number of available groups at compile time only saves a little code space. Constrained implementations tend to omit FFDH anyway, so the small code size gain is not important.
|
||||||
|
|
||||||
#### Configuration symbols for algorithms
|
#### Configuration symbols for algorithms
|
||||||
|
|
||||||
|
@ -195,7 +201,7 @@ The boolean symbol mechanism proposed here can be translated to a list of JSON c
|
||||||
|
|
||||||
#### Naming of symbols
|
#### Naming of symbols
|
||||||
|
|
||||||
The names of [elliptic curve symbols](#configuration-symbols-for-curves) are a bit weird: `SECP_R1_256` instead of `SECP256R1`. Should we make them more classical, but less systematic?
|
The names of [elliptic curve symbols](#configuration-symbols-for-elliptic-curves) are a bit weird: `SECP_R1_256` instead of `SECP256R1`, `MONTGOMERY_255` instead of `CURVE25519`. Should we make them more classical, but less systematic?
|
||||||
|
|
||||||
#### Impossible combinations
|
#### Impossible combinations
|
||||||
|
|
||||||
|
|
|
@ -134,7 +134,7 @@ Example 2: the following capability declares that the driver can perform determ
|
||||||
"entry_points": ["sign_hash"],
|
"entry_points": ["sign_hash"],
|
||||||
"algorithms": ["PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_256)",
|
"algorithms": ["PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_256)",
|
||||||
"PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_384)"],
|
"PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_384)"],
|
||||||
"key_types": ["PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_CURVE_SECP_R1)"],
|
"key_types": ["PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1)"],
|
||||||
"key_sizes": [256, 384]
|
"key_sizes": [256, 384]
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
@ -164,7 +164,7 @@ The name `_` may be used instead of a curve or group to indicate that the capabi
|
||||||
Valid examples:
|
Valid examples:
|
||||||
```
|
```
|
||||||
PSA_KEY_TYPE_AES
|
PSA_KEY_TYPE_AES
|
||||||
PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_CURVE_SECP_R1)
|
PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1)
|
||||||
PSA_KEY_TYPE_ECC_KEY_PAIR(_)
|
PSA_KEY_TYPE_ECC_KEY_PAIR(_)
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -606,7 +606,8 @@ The `"key_context"` property in the [driver description](#driver-description-top
|
||||||
* `"public_key_size"` (integer or string, optional): this many bytes are included in every key context for a public key. If omitted, this value defaults to 0.
|
* `"public_key_size"` (integer or string, optional): this many bytes are included in every key context for a public key. If omitted, this value defaults to 0.
|
||||||
* `"symmetric_factor"` (integer or string, optional): every key context for a symmetric key includes this many times the key size. If omitted, this value defaults to 0.
|
* `"symmetric_factor"` (integer or string, optional): every key context for a symmetric key includes this many times the key size. If omitted, this value defaults to 0.
|
||||||
* `"store_public_key"` (boolean, optional): If specified and true, for a key pair, the key context includes space for the public key. If omitted or false, no additional space is added for the public key.
|
* `"store_public_key"` (boolean, optional): If specified and true, for a key pair, the key context includes space for the public key. If omitted or false, no additional space is added for the public key.
|
||||||
* `"size_function"` (string, optional): the name of a function that returns the number of bytes that the driver needs in a key context for a key. This may be a pointer to function. This must be a C identifier; more complex expressions are not permitted. If the core uses this function, it supersedes all the other properties.
|
* `"size_function"` (string, optional): the name of a function that returns the number of bytes that the driver needs in a key context for a key. This may be a pointer to function. This must be a C identifier; more complex expressions are not permitted. If the core uses this function, it supersedes all the other properties except for `"builtin_key_size"` (where applicable, if present).
|
||||||
|
* `"builtin_key_size"` (integer or string, optional): If specified, this overrides all other methods (including the `"size_function"` entry point) to determine the size of the key context for [built-in keys](#built-in-keys). This allows drivers to efficiently represent application keys as wrapped key material, but built-in keys by an internal identifier that takes up less space.
|
||||||
|
|
||||||
The integer properties must be C language constants. A typical value for `"base_size"` is `sizeof(acme_key_context_t)` where `acme_key_context_t` is a type defined in a driver header file.
|
The integer properties must be C language constants. A typical value for `"base_size"` is `sizeof(acme_key_context_t)` where `acme_key_context_t` is a type defined in a driver header file.
|
||||||
|
|
||||||
|
@ -662,6 +663,7 @@ Opaque drivers may provide the following key management entry points:
|
||||||
* `"generate_key"`: called by `psa_generate_key()`.
|
* `"generate_key"`: called by `psa_generate_key()`.
|
||||||
* `"key_derivation_output_key"`: called by `psa_key_derivation_output_key()`.
|
* `"key_derivation_output_key"`: called by `psa_key_derivation_output_key()`.
|
||||||
* `"copy_key"`: called by `psa_copy_key()` when copying a key within the same [location](#lifetimes-and-locations).
|
* `"copy_key"`: called by `psa_copy_key()` when copying a key within the same [location](#lifetimes-and-locations).
|
||||||
|
* `"get_builtin_key"`: called by functions that access a key to retrieve information about a [built-in key](#built-in-keys).
|
||||||
|
|
||||||
In addition, secure elements that store the key material internally must provide the following two entry points:
|
In addition, secure elements that store the key material internally must provide the following two entry points:
|
||||||
|
|
||||||
|
@ -792,6 +794,37 @@ The core will not update the persistent state in storage while an entry point is
|
||||||
|
|
||||||
In a multithreaded environment, the driver may only call these two functions from the thread that is executing the entry point.
|
In a multithreaded environment, the driver may only call these two functions from the thread that is executing the entry point.
|
||||||
|
|
||||||
|
#### Built-in keys
|
||||||
|
|
||||||
|
Opaque drivers may declare built-in keys. Built-in keys can be accessed, but not created, through the PSA Cryptography API.
|
||||||
|
|
||||||
|
A built-in key is identified by its location and its **slot number**. Drivers that support built-in keys must provide a `"get_builtin_key"` entry point to retrieve the key data and metadata. The core calls this entry point when it needs to access the key, typically because the application requested an operation on the key. The core may keep information about the key in cache, and successive calls to access the same slot number should return the same data. This entry point has the following prototype:
|
||||||
|
|
||||||
|
```
|
||||||
|
psa_status_t acme_get_builtin_key(psa_drv_slot_number_t slot_number,
|
||||||
|
psa_key_attributes_t *attributes,
|
||||||
|
uint8_t *key_buffer,
|
||||||
|
size_t key_buffer_size,
|
||||||
|
size_t *key_buffer_length);
|
||||||
|
```
|
||||||
|
|
||||||
|
If this function returns `PSA_SUCCESS` or `PSA_ERROR_BUFFER_TOO_SMALL`, it must fill `attributes` with the attributes of the key (except for the key identifier). On success, this function must also fill `key_buffer` with the key context.
|
||||||
|
|
||||||
|
On entry, `psa_get_key_lifetime(attributes)` is the location at which the driver was declared and the persistence level `#PSA_KEY_LIFETIME_PERSISTENT`. The driver entry point may change the lifetime to one with the same location but a different persistence level. The standard attributes other than the key identifier and lifetime have the value conveyed by `PSA_KEY_ATTRIBUTES_INIT`.
|
||||||
|
|
||||||
|
The output parameter `key_buffer` points to a writable buffer of `key_buffer_size` bytes. If the driver has a [`"builtin_key_size"` property](#key-format-for-opaque-drivers) property, `key_buffer_size` has this value, otherwise `key_buffer_size` has the value determined from the key type and size.
|
||||||
|
|
||||||
|
Typically, for a built-in key, the key context is a reference to key material that is kept inside the secure element, similar to the format returned by [`"allocate_key"`](#key-management-in-a-secure-element-with-storage). A driver may have built-in keys even if it doesn't have an `"allocate_key"` entry point.
|
||||||
|
|
||||||
|
This entry point may return the following status values:
|
||||||
|
|
||||||
|
* `PSA_SUCCESS`: the requested key exists, and the output parameters `attributes` and `key_buffer` contain the key metadata and key context respectively, and `*key_buffer_length` contains the length of the data written to `key_buffer`.
|
||||||
|
* `PSA_ERROR_BUFFER_TOO_SMALL`: `key_buffer_size` is insufficient. In this case, the driver must pass the key's attributes in `*attributes`. In particular, `get_builtin_key(slot_number, &attributes, NULL, 0)` is a way for the core to obtain the key's attributes.
|
||||||
|
* `PSA_ERROR_DOES_NOT_EXIST`: the requested key does not exist.
|
||||||
|
* Other error codes such as `PSA_ERROR_COMMUNICATION_FAILURE` or `PSA_ERROR_HARDWARE_FAILURE` indicate a transient or permanent error.
|
||||||
|
|
||||||
|
The core will pass authorized requests to destroy a built-in key to the [`"destroy_key"`](#key-management-in-a-secure-element-with-storage) entry point if there is one. If built-in keys must not be destroyed, it is up to the driver to reject such requests.
|
||||||
|
|
||||||
## How to use drivers from an application
|
## How to use drivers from an application
|
||||||
|
|
||||||
### Using transparent drivers
|
### Using transparent drivers
|
||||||
|
@ -807,7 +840,7 @@ For example, the following snippet creates an AES-GCM key which is only accessib
|
||||||
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
psa_set_key_lifetime(&attributes, PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(
|
psa_set_key_lifetime(&attributes, PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION(
|
||||||
PSA_KEY_PERSISTENCE_DEFAULT, PSA_KEY_LOCATION_acme));
|
PSA_KEY_PERSISTENCE_DEFAULT, PSA_KEY_LOCATION_acme));
|
||||||
psa_set_key_identifer(&attributes, 42);
|
psa_set_key_identifier(&attributes, 42);
|
||||||
psa_set_key_type(&attributes, PSA_KEY_TYPE_AES);
|
psa_set_key_type(&attributes, PSA_KEY_TYPE_AES);
|
||||||
psa_set_key_size(&attributes, 128);
|
psa_set_key_size(&attributes, 128);
|
||||||
psa_set_key_algorithm(&attributes, PSA_ALG_GCM);
|
psa_set_key_algorithm(&attributes, PSA_ALG_GCM);
|
||||||
|
|
|
@ -22,7 +22,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @mainpage mbed TLS v2.25.0 source code documentation
|
* @mainpage mbed TLS v2.26.0 source code documentation
|
||||||
*
|
*
|
||||||
* This documentation describes the internal structure of mbed TLS. It was
|
* This documentation describes the internal structure of mbed TLS. It was
|
||||||
* automatically generated from specially formatted comment blocks in
|
* automatically generated from specially formatted comment blocks in
|
||||||
|
@ -38,7 +38,7 @@
|
||||||
*
|
*
|
||||||
* @section mainpage_modules Modules
|
* @section mainpage_modules Modules
|
||||||
*
|
*
|
||||||
* mbed TLS supports SSLv3 up to TLSv1.2 communication by providing the
|
* mbed TLS supports TLSv1.0 up to TLSv1.2 communication by providing the
|
||||||
* following:
|
* following:
|
||||||
* - TCP/IP communication functions: listen, connect, accept, read/write.
|
* - TCP/IP communication functions: listen, connect, accept, read/write.
|
||||||
* - SSL/TLS communication functions: init, handshake, read/write.
|
* - SSL/TLS communication functions: init, handshake, read/write.
|
||||||
|
|
|
@ -28,7 +28,7 @@ DOXYFILE_ENCODING = UTF-8
|
||||||
# identify the project. Note that if you do not use Doxywizard you need
|
# identify the project. Note that if you do not use Doxywizard you need
|
||||||
# to put quotes around the project name if it contains spaces.
|
# to put quotes around the project name if it contains spaces.
|
||||||
|
|
||||||
PROJECT_NAME = "mbed TLS v2.25.0"
|
PROJECT_NAME = "mbed TLS v2.26.0"
|
||||||
|
|
||||||
# The PROJECT_NUMBER tag can be used to enter a project or revision number.
|
# The PROJECT_NUMBER tag can be used to enter a project or revision number.
|
||||||
# This could be handy for archiving the generated documentation or
|
# This could be handy for archiving the generated documentation or
|
||||||
|
@ -710,7 +710,7 @@ EXCLUDE_SYMLINKS = YES
|
||||||
# against the file with absolute path, so to exclude all test directories
|
# against the file with absolute path, so to exclude all test directories
|
||||||
# for example use the pattern */test/*
|
# for example use the pattern */test/*
|
||||||
|
|
||||||
EXCLUDE_PATTERNS = *_internal.h *_wrap.h
|
EXCLUDE_PATTERNS =
|
||||||
|
|
||||||
# The EXCLUDE_SYMBOLS tag can be used to specify one or more symbol names
|
# The EXCLUDE_SYMBOLS tag can be used to specify one or more symbol names
|
||||||
# (namespaces, classes, functions, etc.) that should be excluded from the
|
# (namespaces, classes, functions, etc.) that should be excluded from the
|
||||||
|
|
|
@ -60,12 +60,6 @@
|
||||||
/* Error codes in range 0x0021-0x0025 */
|
/* Error codes in range 0x0021-0x0025 */
|
||||||
#define MBEDTLS_ERR_AES_BAD_INPUT_DATA -0x0021 /**< Invalid input data. */
|
#define MBEDTLS_ERR_AES_BAD_INPUT_DATA -0x0021 /**< Invalid input data. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_AES_FEATURE_UNAVAILABLE is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_AES_FEATURE_UNAVAILABLE -0x0023 /**< Feature not available. For example, an unsupported AES key size. */
|
|
||||||
|
|
||||||
/* MBEDTLS_ERR_AES_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_AES_HW_ACCEL_FAILED -0x0025 /**< AES hardware accelerator failed. */
|
|
||||||
|
|
||||||
#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \
|
#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \
|
||||||
!defined(inline) && !defined(__cplusplus)
|
!defined(inline) && !defined(__cplusplus)
|
||||||
#define inline __inline
|
#define inline __inline
|
||||||
|
|
|
@ -34,9 +34,6 @@
|
||||||
|
|
||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
|
|
||||||
/* MBEDTLS_ERR_ARC4_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_ARC4_HW_ACCEL_FAILED -0x0019 /**< ARC4 hardware accelerator failed. */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -47,20 +47,10 @@
|
||||||
#define MBEDTLS_ARIA_MAX_ROUNDS 16 /**< Maxiumum number of rounds in ARIA. */
|
#define MBEDTLS_ARIA_MAX_ROUNDS 16 /**< Maxiumum number of rounds in ARIA. */
|
||||||
#define MBEDTLS_ARIA_MAX_KEYSIZE 32 /**< Maximum size of an ARIA key in bytes. */
|
#define MBEDTLS_ARIA_MAX_KEYSIZE 32 /**< Maximum size of an ARIA key in bytes. */
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#define MBEDTLS_ERR_ARIA_INVALID_KEY_LENGTH MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( -0x005C )
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
#define MBEDTLS_ERR_ARIA_BAD_INPUT_DATA -0x005C /**< Bad input data. */
|
#define MBEDTLS_ERR_ARIA_BAD_INPUT_DATA -0x005C /**< Bad input data. */
|
||||||
|
|
||||||
#define MBEDTLS_ERR_ARIA_INVALID_INPUT_LENGTH -0x005E /**< Invalid data input length. */
|
#define MBEDTLS_ERR_ARIA_INVALID_INPUT_LENGTH -0x005E /**< Invalid data input length. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_ARIA_FEATURE_UNAVAILABLE is deprecated and should not be used.
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_ERR_ARIA_FEATURE_UNAVAILABLE -0x005A /**< Feature not available. For example, an unsupported ARIA key size. */
|
|
||||||
|
|
||||||
/* MBEDTLS_ERR_ARIA_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_ARIA_HW_ACCEL_FAILED -0x0058 /**< ARIA hardware accelerator failed. */
|
|
||||||
|
|
||||||
#if !defined(MBEDTLS_ARIA_ALT)
|
#if !defined(MBEDTLS_ARIA_ALT)
|
||||||
// Regular implementation
|
// Regular implementation
|
||||||
//
|
//
|
||||||
|
|
|
@ -40,17 +40,10 @@
|
||||||
#define MBEDTLS_BLOWFISH_ROUNDS 16 /**< Rounds to use. When increasing this value, make sure to extend the initialisation vectors */
|
#define MBEDTLS_BLOWFISH_ROUNDS 16 /**< Rounds to use. When increasing this value, make sure to extend the initialisation vectors */
|
||||||
#define MBEDTLS_BLOWFISH_BLOCKSIZE 8 /* Blowfish uses 64 bit blocks */
|
#define MBEDTLS_BLOWFISH_BLOCKSIZE 8 /* Blowfish uses 64 bit blocks */
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#define MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( -0x0016 )
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
#define MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA -0x0016 /**< Bad input data. */
|
#define MBEDTLS_ERR_BLOWFISH_BAD_INPUT_DATA -0x0016 /**< Bad input data. */
|
||||||
|
|
||||||
#define MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH -0x0018 /**< Invalid data input length. */
|
#define MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH -0x0018 /**< Invalid data input length. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_BLOWFISH_HW_ACCEL_FAILED is deprecated and should not be used.
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_ERR_BLOWFISH_HW_ACCEL_FAILED -0x0017 /**< Blowfish hardware accelerator failed. */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -36,17 +36,10 @@
|
||||||
#define MBEDTLS_CAMELLIA_ENCRYPT 1
|
#define MBEDTLS_CAMELLIA_ENCRYPT 1
|
||||||
#define MBEDTLS_CAMELLIA_DECRYPT 0
|
#define MBEDTLS_CAMELLIA_DECRYPT 0
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#define MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( -0x0024 )
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
#define MBEDTLS_ERR_CAMELLIA_BAD_INPUT_DATA -0x0024 /**< Bad input data. */
|
#define MBEDTLS_ERR_CAMELLIA_BAD_INPUT_DATA -0x0024 /**< Bad input data. */
|
||||||
|
|
||||||
#define MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH -0x0026 /**< Invalid data input length. */
|
#define MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH -0x0026 /**< Invalid data input length. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_CAMELLIA_HW_ACCEL_FAILED is deprecated and should not be used.
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_ERR_CAMELLIA_HW_ACCEL_FAILED -0x0027 /**< Camellia hardware accelerator failed. */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -58,9 +58,6 @@
|
||||||
#define MBEDTLS_ERR_CCM_BAD_INPUT -0x000D /**< Bad input parameters to the function. */
|
#define MBEDTLS_ERR_CCM_BAD_INPUT -0x000D /**< Bad input parameters to the function. */
|
||||||
#define MBEDTLS_ERR_CCM_AUTH_FAILED -0x000F /**< Authenticated decryption failed. */
|
#define MBEDTLS_ERR_CCM_AUTH_FAILED -0x000F /**< Authenticated decryption failed. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_CCM_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_CCM_HW_ACCEL_FAILED -0x0011 /**< CCM hardware accelerator failed. */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -43,14 +43,6 @@
|
||||||
|
|
||||||
#define MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA -0x0051 /**< Invalid input parameter(s). */
|
#define MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA -0x0051 /**< Invalid input parameter(s). */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_CHACHA20_FEATURE_UNAVAILABLE is deprecated and should not be
|
|
||||||
* used. */
|
|
||||||
#define MBEDTLS_ERR_CHACHA20_FEATURE_UNAVAILABLE -0x0053 /**< Feature not available. For example, s part of the API is not implemented. */
|
|
||||||
|
|
||||||
/* MBEDTLS_ERR_CHACHA20_HW_ACCEL_FAILED is deprecated and should not be used.
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_ERR_CHACHA20_HW_ACCEL_FAILED -0x0055 /**< Chacha20 hardware accelerator failed. */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -81,10 +81,6 @@
|
||||||
#error "MBEDTLS_DHM_C defined, but not all prerequisites"
|
#error "MBEDTLS_DHM_C defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT) && !defined(MBEDTLS_SSL_TRUNCATED_HMAC)
|
|
||||||
#error "MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT defined, but not all prerequisites"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_CMAC_C) && \
|
#if defined(MBEDTLS_CMAC_C) && \
|
||||||
!defined(MBEDTLS_AES_C) && !defined(MBEDTLS_DES_C)
|
!defined(MBEDTLS_AES_C) && !defined(MBEDTLS_DES_C)
|
||||||
#error "MBEDTLS_CMAC_C defined, but not all prerequisites"
|
#error "MBEDTLS_CMAC_C defined, but not all prerequisites"
|
||||||
|
@ -251,6 +247,10 @@
|
||||||
#error "MBEDTLS_ECP_NORMALIZE_MXZ_ALT defined, but not all prerequisites"
|
#error "MBEDTLS_ECP_NORMALIZE_MXZ_ALT defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_NO_FALLBACK) && !defined(MBEDTLS_ECP_INTERNAL_ALT)
|
||||||
|
#error "MBEDTLS_ECP_NO_FALLBACK defined, but no alternative implementation enabled"
|
||||||
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_HKDF_C) && !defined(MBEDTLS_MD_C)
|
#if defined(MBEDTLS_HKDF_C) && !defined(MBEDTLS_MD_C)
|
||||||
#error "MBEDTLS_HKDF_C defined, but not all prerequisites"
|
#error "MBEDTLS_HKDF_C defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
@ -362,18 +362,6 @@
|
||||||
#error "MBEDTLS_PK_WRITE_C defined, but not all prerequisites"
|
#error "MBEDTLS_PK_WRITE_C defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_PKCS11_C) && !defined(MBEDTLS_PK_C)
|
|
||||||
#error "MBEDTLS_PKCS11_C defined, but not all prerequisites"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_PKCS11_C)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#error "MBEDTLS_PKCS11_C is deprecated and will be removed in a future version of Mbed TLS"
|
|
||||||
#elif defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#warning "MBEDTLS_PKCS11_C is deprecated and will be removed in a future version of Mbed TLS"
|
|
||||||
#endif
|
|
||||||
#endif /* MBEDTLS_PKCS11_C */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_PLATFORM_EXIT_ALT) && !defined(MBEDTLS_PLATFORM_C)
|
#if defined(MBEDTLS_PLATFORM_EXIT_ALT) && !defined(MBEDTLS_PLATFORM_C)
|
||||||
#error "MBEDTLS_PLATFORM_EXIT_ALT defined, but not all prerequisites"
|
#error "MBEDTLS_PLATFORM_EXIT_ALT defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
@ -634,11 +622,6 @@
|
||||||
#error "MBEDTLS_SHA512_NO_SHA384 defined without MBEDTLS_SHA512_C"
|
#error "MBEDTLS_SHA512_NO_SHA384 defined without MBEDTLS_SHA512_C"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_SSL3) && ( !defined(MBEDTLS_MD5_C) || \
|
|
||||||
!defined(MBEDTLS_SHA1_C) )
|
|
||||||
#error "MBEDTLS_SSL_PROTO_SSL3 defined, but not all prerequisites"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1) && ( !defined(MBEDTLS_MD5_C) || \
|
#if defined(MBEDTLS_SSL_PROTO_TLS1) && ( !defined(MBEDTLS_MD5_C) || \
|
||||||
!defined(MBEDTLS_SHA1_C) )
|
!defined(MBEDTLS_SHA1_C) )
|
||||||
#error "MBEDTLS_SSL_PROTO_TLS1 defined, but not all prerequisites"
|
#error "MBEDTLS_SSL_PROTO_TLS1 defined, but not all prerequisites"
|
||||||
|
@ -659,8 +642,8 @@
|
||||||
#error "MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL defined, but not all prerequisites"
|
#error "MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if (defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \
|
#if (defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) ||\
|
||||||
defined(MBEDTLS_SSL_PROTO_TLS1_1) || defined(MBEDTLS_SSL_PROTO_TLS1_2)) && \
|
defined(MBEDTLS_SSL_PROTO_TLS1_2)) && \
|
||||||
!(defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
|
!(defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
|
defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
||||||
|
@ -695,28 +678,16 @@
|
||||||
#error "MBEDTLS_SSL_SRV_C defined, but not all prerequisites"
|
#error "MBEDTLS_SSL_SRV_C defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_TLS_C) && (!defined(MBEDTLS_SSL_PROTO_SSL3) && \
|
#if defined(MBEDTLS_SSL_TLS_C) && (!defined(MBEDTLS_SSL_PROTO_TLS1) && \
|
||||||
!defined(MBEDTLS_SSL_PROTO_TLS1) && !defined(MBEDTLS_SSL_PROTO_TLS1_1) && \
|
!defined(MBEDTLS_SSL_PROTO_TLS1_1) && !defined(MBEDTLS_SSL_PROTO_TLS1_2))
|
||||||
!defined(MBEDTLS_SSL_PROTO_TLS1_2))
|
|
||||||
#error "MBEDTLS_SSL_TLS_C defined, but no protocols are active"
|
#error "MBEDTLS_SSL_TLS_C defined, but no protocols are active"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_TLS_C) && (defined(MBEDTLS_SSL_PROTO_SSL3) && \
|
|
||||||
defined(MBEDTLS_SSL_PROTO_TLS1_1) && !defined(MBEDTLS_SSL_PROTO_TLS1))
|
|
||||||
#error "Illegal protocol selection"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_TLS_C) && (defined(MBEDTLS_SSL_PROTO_TLS1) && \
|
#if defined(MBEDTLS_SSL_TLS_C) && (defined(MBEDTLS_SSL_PROTO_TLS1) && \
|
||||||
defined(MBEDTLS_SSL_PROTO_TLS1_2) && !defined(MBEDTLS_SSL_PROTO_TLS1_1))
|
defined(MBEDTLS_SSL_PROTO_TLS1_2) && !defined(MBEDTLS_SSL_PROTO_TLS1_1))
|
||||||
#error "Illegal protocol selection"
|
#error "Illegal protocol selection"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_TLS_C) && (defined(MBEDTLS_SSL_PROTO_SSL3) && \
|
|
||||||
defined(MBEDTLS_SSL_PROTO_TLS1_2) && (!defined(MBEDTLS_SSL_PROTO_TLS1) || \
|
|
||||||
!defined(MBEDTLS_SSL_PROTO_TLS1_1)))
|
|
||||||
#error "Illegal protocol selection"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && !defined(MBEDTLS_SSL_PROTO_DTLS)
|
#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && !defined(MBEDTLS_SSL_PROTO_DTLS)
|
||||||
#error "MBEDTLS_SSL_DTLS_HELLO_VERIFY defined, but not all prerequisites"
|
#error "MBEDTLS_SSL_DTLS_HELLO_VERIFY defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
@ -771,8 +742,7 @@
|
||||||
#error "MBEDTLS_SSL_TICKET_C defined, but not all prerequisites"
|
#error "MBEDTLS_SSL_TICKET_C defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING) && \
|
#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING) && !defined(MBEDTLS_SSL_PROTO_TLS1)
|
||||||
!defined(MBEDTLS_SSL_PROTO_SSL3) && !defined(MBEDTLS_SSL_PROTO_TLS1)
|
|
||||||
#error "MBEDTLS_SSL_CBC_RECORD_SPLITTING defined, but not all prerequisites"
|
#error "MBEDTLS_SSL_CBC_RECORD_SPLITTING defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@ -820,10 +790,6 @@
|
||||||
#error "MBEDTLS_X509_CREATE_C defined, but not all prerequisites"
|
#error "MBEDTLS_X509_CREATE_C defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_CERTS_C) && !defined(MBEDTLS_X509_USE_C)
|
|
||||||
#error "MBEDTLS_CERTS_C defined, but not all prerequisites"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && ( !defined(MBEDTLS_X509_USE_C) )
|
#if defined(MBEDTLS_X509_CRT_PARSE_C) && ( !defined(MBEDTLS_X509_USE_C) )
|
||||||
#error "MBEDTLS_X509_CRT_PARSE_C defined, but not all prerequisites"
|
#error "MBEDTLS_X509_CRT_PARSE_C defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
@ -853,30 +819,6 @@
|
||||||
#error "MBEDTLS_HAVE_INT32/MBEDTLS_HAVE_INT64 and MBEDTLS_HAVE_ASM cannot be defined simultaneously"
|
#error "MBEDTLS_HAVE_INT32/MBEDTLS_HAVE_INT64 and MBEDTLS_HAVE_ASM cannot be defined simultaneously"
|
||||||
#endif /* (MBEDTLS_HAVE_INT32 || MBEDTLS_HAVE_INT64) && MBEDTLS_HAVE_ASM */
|
#endif /* (MBEDTLS_HAVE_INT32 || MBEDTLS_HAVE_INT64) && MBEDTLS_HAVE_ASM */
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_SSL3)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#error "MBEDTLS_SSL_PROTO_SSL3 is deprecated and will be removed in a future version of Mbed TLS"
|
|
||||||
#elif defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#warning "MBEDTLS_SSL_PROTO_SSL3 is deprecated and will be removed in a future version of Mbed TLS"
|
|
||||||
#endif
|
|
||||||
#endif /* MBEDTLS_SSL_PROTO_SSL3 */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#error "MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO is deprecated and will be removed in a future version of Mbed TLS"
|
|
||||||
#elif defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#warning "MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO is deprecated and will be removed in a future version of Mbed TLS"
|
|
||||||
#endif
|
|
||||||
#endif /* MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_HW_RECORD_ACCEL)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#error "MBEDTLS_SSL_HW_RECORD_ACCEL is deprecated and will be removed in a future version of Mbed TLS"
|
|
||||||
#elif defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#warning "MBEDTLS_SSL_HW_RECORD_ACCEL is deprecated and will be removed in a future version of Mbed TLS"
|
|
||||||
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
#endif /* MBEDTLS_SSL_HW_RECORD_ACCEL */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_DTLS_SRTP) && ( !defined(MBEDTLS_SSL_PROTO_DTLS) )
|
#if defined(MBEDTLS_SSL_DTLS_SRTP) && ( !defined(MBEDTLS_SSL_PROTO_DTLS) )
|
||||||
#error "MBEDTLS_SSL_DTLS_SRTP defined, but not all prerequisites"
|
#error "MBEDTLS_SSL_DTLS_SRTP defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
@ -885,6 +827,40 @@
|
||||||
#error "MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH defined, but not all prerequisites"
|
#error "MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/* Reject attempts to enable options that have been removed and that could
|
||||||
|
* cause a build to succeed but with features removed. */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_HAVEGE_C) //no-check-names
|
||||||
|
#error "MBEDTLS_HAVEGE_C was removed in Mbed TLS 3.0. See https://github.com/ARMmbed/mbedtls/issues/2599"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_SSL_HW_RECORD_ACCEL) //no-check-names
|
||||||
|
#error "MBEDTLS_SSL_HW_RECORD_ACCEL was removed in Mbed TLS 3.0. See https://github.com/ARMmbed/mbedtls/issues/4031"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_SSL_PROTO_SSL3) //no-check-names
|
||||||
|
#error "MBEDTLS_SSL_PROTO_SSL3 (SSL v3.0 support) was removed in Mbed TLS 3.0. See https://github.com/ARMmbed/mbedtls/issues/4031"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO) //no-check-names
|
||||||
|
#error "MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO (SSL v2 ClientHello support) was removed in Mbed TLS 3.0. See https://github.com/ARMmbed/mbedtls/issues/4031"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT) //no-check-names
|
||||||
|
#error "MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT (compatibility with the buggy implementation of truncated HMAC in Mbed TLS up to 2.7) was removed in Mbed TLS 3.0. See https://github.com/ARMmbed/mbedtls/issues/4031"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES) //no-check-names
|
||||||
|
#error "MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES was removed in Mbed TLS 3.0. See the ChangeLog entry if you really need SHA-1-signed certificates."
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ZLIB_SUPPORT) //no-check-names
|
||||||
|
#error "MBEDTLS_ZLIB_SUPPORT was removed in Mbed TLS 3.0. See https://github.com/ARMmbed/mbedtls/issues/4031"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Avoid warning from -pedantic. This is a convenient place for this
|
* Avoid warning from -pedantic. This is a convenient place for this
|
||||||
* workaround since this is included by every single file before the
|
* workaround since this is included by every single file before the
|
||||||
|
|
|
@ -62,9 +62,6 @@
|
||||||
#define MBEDTLS_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes). */
|
#define MBEDTLS_ERR_CIPHER_AUTH_FAILED -0x6300 /**< Authentication failed (for AEAD modes). */
|
||||||
#define MBEDTLS_ERR_CIPHER_INVALID_CONTEXT -0x6380 /**< The context is invalid. For example, because it was freed. */
|
#define MBEDTLS_ERR_CIPHER_INVALID_CONTEXT -0x6380 /**< The context is invalid. For example, because it was freed. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_CIPHER_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_CIPHER_HW_ACCEL_FAILED -0x6400 /**< Cipher hardware accelerator failed. */
|
|
||||||
|
|
||||||
#define MBEDTLS_CIPHER_VARIABLE_IV_LEN 0x01 /**< Cipher accepts IVs of variable length. */
|
#define MBEDTLS_CIPHER_VARIABLE_IV_LEN 0x01 /**< Cipher accepts IVs of variable length. */
|
||||||
#define MBEDTLS_CIPHER_VARIABLE_KEY_LEN 0x02 /**< Cipher accepts keys of variable length. */
|
#define MBEDTLS_CIPHER_VARIABLE_KEY_LEN 0x02 /**< Cipher accepts keys of variable length. */
|
||||||
|
|
||||||
|
@ -229,13 +226,13 @@ enum {
|
||||||
/** Maximum length of any IV, in Bytes. */
|
/** Maximum length of any IV, in Bytes. */
|
||||||
/* This should ideally be derived automatically from list of ciphers.
|
/* This should ideally be derived automatically from list of ciphers.
|
||||||
* This should be kept in sync with MBEDTLS_SSL_MAX_IV_LENGTH defined
|
* This should be kept in sync with MBEDTLS_SSL_MAX_IV_LENGTH defined
|
||||||
* in ssl_internal.h. */
|
* in library/ssl_misc.h. */
|
||||||
#define MBEDTLS_MAX_IV_LENGTH 16
|
#define MBEDTLS_MAX_IV_LENGTH 16
|
||||||
|
|
||||||
/** Maximum block size of any cipher, in Bytes. */
|
/** Maximum block size of any cipher, in Bytes. */
|
||||||
/* This should ideally be derived automatically from list of ciphers.
|
/* This should ideally be derived automatically from list of ciphers.
|
||||||
* This should be kept in sync with MBEDTLS_SSL_MAX_BLOCK_LENGTH defined
|
* This should be kept in sync with MBEDTLS_SSL_MAX_BLOCK_LENGTH defined
|
||||||
* in ssl_internal.h. */
|
* in library/ssl_misc.h. */
|
||||||
#define MBEDTLS_MAX_BLOCK_LENGTH 16
|
#define MBEDTLS_MAX_BLOCK_LENGTH 16
|
||||||
|
|
||||||
/** Maximum key length, in Bytes. */
|
/** Maximum key length, in Bytes. */
|
||||||
|
@ -243,7 +240,7 @@ enum {
|
||||||
* For now, only check whether XTS is enabled which uses 64 Byte keys,
|
* For now, only check whether XTS is enabled which uses 64 Byte keys,
|
||||||
* and use 32 Bytes as an upper bound for the maximum key length otherwise.
|
* and use 32 Bytes as an upper bound for the maximum key length otherwise.
|
||||||
* This should be kept in sync with MBEDTLS_SSL_MAX_BLOCK_LENGTH defined
|
* This should be kept in sync with MBEDTLS_SSL_MAX_BLOCK_LENGTH defined
|
||||||
* in ssl_internal.h, which however deliberately ignores the case of XTS
|
* in library/ssl_misc.h, which however deliberately ignores the case of XTS
|
||||||
* since the latter isn't used in SSL/TLS. */
|
* since the latter isn't used in SSL/TLS. */
|
||||||
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
||||||
#define MBEDTLS_MAX_KEY_LENGTH 64
|
#define MBEDTLS_MAX_KEY_LENGTH 64
|
||||||
|
|
|
@ -38,9 +38,6 @@
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/* MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED -0x007A /**< CMAC hardware accelerator failed. */
|
|
||||||
|
|
||||||
#define MBEDTLS_AES_BLOCK_SIZE 16
|
#define MBEDTLS_AES_BLOCK_SIZE 16
|
||||||
#define MBEDTLS_DES3_BLOCK_SIZE 8
|
#define MBEDTLS_DES3_BLOCK_SIZE 8
|
||||||
|
|
||||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -48,7 +48,7 @@
|
||||||
* Used in:
|
* Used in:
|
||||||
* library/aria.c
|
* library/aria.c
|
||||||
* library/timing.c
|
* library/timing.c
|
||||||
* include/mbedtls/bn_mul.h
|
* library/bn_mul.h
|
||||||
*
|
*
|
||||||
* Required by:
|
* Required by:
|
||||||
* MBEDTLS_AESNI_C
|
* MBEDTLS_AESNI_C
|
||||||
|
@ -484,6 +484,11 @@
|
||||||
* is still present and it is used for group structures not supported by the
|
* is still present and it is used for group structures not supported by the
|
||||||
* alternative.
|
* alternative.
|
||||||
*
|
*
|
||||||
|
* The original implementation can in addition be removed by setting the
|
||||||
|
* MBEDTLS_ECP_NO_FALLBACK option, in which case any function for which the
|
||||||
|
* corresponding MBEDTLS_ECP__FUNCTION_NAME__ALT macro is defined will not be
|
||||||
|
* able to fallback to curves not supported by the alternative implementation.
|
||||||
|
*
|
||||||
* Any of these options become available by defining MBEDTLS_ECP_INTERNAL_ALT
|
* Any of these options become available by defining MBEDTLS_ECP_INTERNAL_ALT
|
||||||
* and implementing the following functions:
|
* and implementing the following functions:
|
||||||
* unsigned char mbedtls_internal_ecp_grp_capable(
|
* unsigned char mbedtls_internal_ecp_grp_capable(
|
||||||
|
@ -497,21 +502,28 @@
|
||||||
* called before and after each point operation and provide an opportunity to
|
* called before and after each point operation and provide an opportunity to
|
||||||
* implement optimized set up and tear down instructions.
|
* implement optimized set up and tear down instructions.
|
||||||
*
|
*
|
||||||
* Example: In case you uncomment MBEDTLS_ECP_INTERNAL_ALT and
|
* Example: In case you set MBEDTLS_ECP_INTERNAL_ALT and
|
||||||
* MBEDTLS_ECP_DOUBLE_JAC_ALT, mbed TLS will still provide the ecp_double_jac
|
* MBEDTLS_ECP_DOUBLE_JAC_ALT, mbed TLS will still provide the ecp_double_jac()
|
||||||
* function, but will use your mbedtls_internal_ecp_double_jac if the group is
|
* function, but will use your mbedtls_internal_ecp_double_jac() if the group
|
||||||
* supported (your mbedtls_internal_ecp_grp_capable function returns 1 when
|
* for the operation is supported by your implementation (i.e. your
|
||||||
* receives it as an argument). If the group is not supported then the original
|
* mbedtls_internal_ecp_grp_capable() function returns 1 for this group). If the
|
||||||
* implementation is used. The other functions and the definition of
|
* group is not supported by your implementation, then the original mbed TLS
|
||||||
* mbedtls_ecp_group and mbedtls_ecp_point will not change, so your
|
* implementation of ecp_double_jac() is used instead, unless this fallback
|
||||||
* implementation of mbedtls_internal_ecp_double_jac and
|
* behaviour is disabled by setting MBEDTLS_ECP_NO_FALLBACK (in which case
|
||||||
* mbedtls_internal_ecp_grp_capable must be compatible with this definition.
|
* ecp_double_jac() will return MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE).
|
||||||
|
*
|
||||||
|
* The function prototypes and the definition of mbedtls_ecp_group and
|
||||||
|
* mbedtls_ecp_point will not change based on MBEDTLS_ECP_INTERNAL_ALT, so your
|
||||||
|
* implementation of mbedtls_internal_ecp__function_name__ must be compatible
|
||||||
|
* with their definitions.
|
||||||
*
|
*
|
||||||
* Uncomment a macro to enable alternate implementation of the corresponding
|
* Uncomment a macro to enable alternate implementation of the corresponding
|
||||||
* function.
|
* function.
|
||||||
*/
|
*/
|
||||||
/* Required for all the functions in this section */
|
/* Required for all the functions in this section */
|
||||||
//#define MBEDTLS_ECP_INTERNAL_ALT
|
//#define MBEDTLS_ECP_INTERNAL_ALT
|
||||||
|
/* Turn off software fallback for curves not supported in hardware */
|
||||||
|
//#define MBEDTLS_ECP_NO_FALLBACK
|
||||||
/* Support for Weierstrass curves with Jacobi representation */
|
/* Support for Weierstrass curves with Jacobi representation */
|
||||||
//#define MBEDTLS_ECP_RANDOMIZE_JAC_ALT
|
//#define MBEDTLS_ECP_RANDOMIZE_JAC_ALT
|
||||||
//#define MBEDTLS_ECP_ADD_MIXED_ALT
|
//#define MBEDTLS_ECP_ADD_MIXED_ALT
|
||||||
|
@ -547,7 +559,8 @@
|
||||||
* hardware entropy collector.
|
* hardware entropy collector.
|
||||||
*
|
*
|
||||||
* Your function must be called \c mbedtls_hardware_poll(), have the same
|
* Your function must be called \c mbedtls_hardware_poll(), have the same
|
||||||
* prototype as declared in entropy_poll.h, and accept NULL as first argument.
|
* prototype as declared in library/entropy_poll.h, and accept NULL as first
|
||||||
|
* argument.
|
||||||
*
|
*
|
||||||
* Uncomment to use your own hardware entropy collector.
|
* Uncomment to use your own hardware entropy collector.
|
||||||
*/
|
*/
|
||||||
|
@ -702,10 +715,6 @@
|
||||||
* Warning: Only do so when you know what you are doing. This allows for
|
* Warning: Only do so when you know what you are doing. This allows for
|
||||||
* channels with virtually no security at all!
|
* channels with virtually no security at all!
|
||||||
*
|
*
|
||||||
* This enables the following ciphersuites:
|
|
||||||
* MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA
|
|
||||||
* MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA
|
|
||||||
*
|
|
||||||
* Uncomment this macro to enable weak ciphersuites
|
* Uncomment this macro to enable weak ciphersuites
|
||||||
*
|
*
|
||||||
* \warning DES is considered a weak cipher and its use constitutes a
|
* \warning DES is considered a weak cipher and its use constitutes a
|
||||||
|
@ -713,19 +722,6 @@
|
||||||
*/
|
*/
|
||||||
//#define MBEDTLS_ENABLE_WEAK_CIPHERSUITES
|
//#define MBEDTLS_ENABLE_WEAK_CIPHERSUITES
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_REMOVE_ARC4_CIPHERSUITES
|
|
||||||
*
|
|
||||||
* Remove RC4 ciphersuites by default in SSL / TLS.
|
|
||||||
* This flag removes the ciphersuites based on RC4 from the default list as
|
|
||||||
* returned by mbedtls_ssl_list_ciphersuites(). However, it is still possible to
|
|
||||||
* enable (some of) them with mbedtls_ssl_conf_ciphersuites() by including them
|
|
||||||
* explicitly.
|
|
||||||
*
|
|
||||||
* Uncomment this macro to remove RC4 ciphersuites by default.
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_REMOVE_ARC4_CIPHERSUITES
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_REMOVE_3DES_CIPHERSUITES
|
* \def MBEDTLS_REMOVE_3DES_CIPHERSUITES
|
||||||
*
|
*
|
||||||
|
@ -888,7 +884,6 @@
|
||||||
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
||||||
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_PSK_WITH_RC4_128_SHA
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
||||||
|
|
||||||
|
@ -912,7 +907,6 @@
|
||||||
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
||||||
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA
|
|
||||||
*
|
*
|
||||||
* \warning Using DHE constitutes a security risk as it
|
* \warning Using DHE constitutes a security risk as it
|
||||||
* is not possible to validate custom DH parameters.
|
* is not possible to validate custom DH parameters.
|
||||||
|
@ -939,7 +933,6 @@
|
||||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
|
* MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
||||||
|
|
||||||
|
@ -964,7 +957,6 @@
|
||||||
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256
|
||||||
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED
|
||||||
|
|
||||||
|
@ -991,8 +983,6 @@
|
||||||
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
|
* MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
|
||||||
* MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_RSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_RSA_WITH_RC4_128_MD5
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
||||||
|
|
||||||
|
@ -1050,7 +1040,6 @@
|
||||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
|
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256
|
||||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||||
|
|
||||||
|
@ -1074,7 +1063,6 @@
|
||||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
|
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
|
||||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
|
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
|
||||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
|
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||||
|
|
||||||
|
@ -1087,7 +1075,6 @@
|
||||||
*
|
*
|
||||||
* This enables the following ciphersuites (if other requisites are
|
* This enables the following ciphersuites (if other requisites are
|
||||||
* enabled as well):
|
* enabled as well):
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
|
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
|
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
|
||||||
|
@ -1111,7 +1098,6 @@
|
||||||
*
|
*
|
||||||
* This enables the following ciphersuites (if other requisites are
|
* This enables the following ciphersuites (if other requisites are
|
||||||
* enabled as well):
|
* enabled as well):
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
|
* MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
|
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
|
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
|
||||||
|
@ -1326,6 +1312,22 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_PKCS1_V21
|
#define MBEDTLS_PKCS1_V21
|
||||||
|
|
||||||
|
/** \def MBEDTLS_PSA_CRYPTO_CLIENT
|
||||||
|
*
|
||||||
|
* Enable support for PSA crypto client.
|
||||||
|
*
|
||||||
|
* \note This option allows to include the code necessary for a PSA
|
||||||
|
* crypto client when the PSA crypto implementation is not included in
|
||||||
|
* the library (MBEDTLS_PSA_CRYPTO_C disabled). The code included is the
|
||||||
|
* code to set and get PSA key attributes.
|
||||||
|
* The development of PSA drivers partially relying on the library to
|
||||||
|
* fulfill the hardware gaps is another possible usage of this option.
|
||||||
|
*
|
||||||
|
* \warning This interface is experimental and may change or be removed
|
||||||
|
* without notice.
|
||||||
|
*/
|
||||||
|
//#define MBEDTLS_PSA_CRYPTO_CLIENT
|
||||||
|
|
||||||
/** \def MBEDTLS_PSA_CRYPTO_DRIVERS
|
/** \def MBEDTLS_PSA_CRYPTO_DRIVERS
|
||||||
*
|
*
|
||||||
* Enable support for the experimental PSA crypto driver interface.
|
* Enable support for the experimental PSA crypto driver interface.
|
||||||
|
@ -1644,23 +1646,10 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_SSL_KEEP_PEER_CERTIFICATE
|
#define MBEDTLS_SSL_KEEP_PEER_CERTIFICATE
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_SSL_HW_RECORD_ACCEL
|
|
||||||
*
|
|
||||||
* Enable hooking functions in SSL module for hardware acceleration of
|
|
||||||
* individual records.
|
|
||||||
*
|
|
||||||
* \deprecated This option is deprecated and will be removed in a future
|
|
||||||
* version of Mbed TLS.
|
|
||||||
*
|
|
||||||
* Uncomment this macro to enable hooking functions.
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_SSL_HW_RECORD_ACCEL
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SSL_CBC_RECORD_SPLITTING
|
* \def MBEDTLS_SSL_CBC_RECORD_SPLITTING
|
||||||
*
|
*
|
||||||
* Enable 1/n-1 record splitting for CBC mode in SSLv3 and TLS 1.0.
|
* Enable 1/n-1 record splitting for CBC mode in TLS 1.0.
|
||||||
*
|
*
|
||||||
* This is a countermeasure to the BEAST attack, which also minimizes the risk
|
* This is a countermeasure to the BEAST attack, which also minimizes the risk
|
||||||
* of interoperability issues compared to sending 0-length records.
|
* of interoperability issues compared to sending 0-length records.
|
||||||
|
@ -1691,19 +1680,6 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_SSL_RENEGOTIATION
|
#define MBEDTLS_SSL_RENEGOTIATION
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
|
|
||||||
*
|
|
||||||
* Enable support for receiving and parsing SSLv2 Client Hello messages for the
|
|
||||||
* SSL Server module (MBEDTLS_SSL_SRV_C).
|
|
||||||
*
|
|
||||||
* \deprecated This option is deprecated and will be removed in a future
|
|
||||||
* version of Mbed TLS.
|
|
||||||
*
|
|
||||||
* Uncomment this macro to enable support for SSLv2 Client Hello messages.
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE
|
* \def MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE
|
||||||
*
|
*
|
||||||
|
@ -1723,21 +1699,6 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
|
#define MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_SSL_PROTO_SSL3
|
|
||||||
*
|
|
||||||
* Enable support for SSL 3.0.
|
|
||||||
*
|
|
||||||
* Requires: MBEDTLS_MD5_C
|
|
||||||
* MBEDTLS_SHA1_C
|
|
||||||
*
|
|
||||||
* \deprecated This option is deprecated and will be removed in a future
|
|
||||||
* version of Mbed TLS.
|
|
||||||
*
|
|
||||||
* Comment this macro to disable support for SSL 3.0
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_SSL_PROTO_SSL3
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SSL_PROTO_TLS1
|
* \def MBEDTLS_SSL_PROTO_TLS1
|
||||||
*
|
*
|
||||||
|
@ -1952,30 +1913,6 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_SSL_TRUNCATED_HMAC
|
#define MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT
|
|
||||||
*
|
|
||||||
* Fallback to old (pre-2.7), non-conforming implementation of the truncated
|
|
||||||
* HMAC extension which also truncates the HMAC key. Note that this option is
|
|
||||||
* only meant for a transitory upgrade period and will be removed in a future
|
|
||||||
* version of the library.
|
|
||||||
*
|
|
||||||
* \warning The old implementation is non-compliant and has a security weakness
|
|
||||||
* (2^80 brute force attack on the HMAC key used for a single,
|
|
||||||
* uninterrupted connection). This should only be enabled temporarily
|
|
||||||
* when (1) the use of truncated HMAC is essential in order to save
|
|
||||||
* bandwidth, and (2) the peer is an Mbed TLS stack that doesn't use
|
|
||||||
* the fixed implementation yet (pre-2.7).
|
|
||||||
*
|
|
||||||
* \deprecated This option is deprecated and will be removed in a
|
|
||||||
* future version of Mbed TLS.
|
|
||||||
*
|
|
||||||
* Uncomment to fallback to old, non-compliant truncated HMAC implementation.
|
|
||||||
*
|
|
||||||
* Requires: MBEDTLS_SSL_TRUNCATED_HMAC
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH
|
* \def MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH
|
||||||
*
|
*
|
||||||
|
@ -2199,31 +2136,6 @@
|
||||||
* Comment this macro to disallow using RSASSA-PSS in certificates.
|
* Comment this macro to disallow using RSASSA-PSS in certificates.
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
#define MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_ZLIB_SUPPORT
|
|
||||||
*
|
|
||||||
* If set, the SSL/TLS module uses ZLIB to support compression and
|
|
||||||
* decompression of packet data.
|
|
||||||
*
|
|
||||||
* \warning TLS-level compression MAY REDUCE SECURITY! See for example the
|
|
||||||
* CRIME attack. Before enabling this option, you should examine with care if
|
|
||||||
* CRIME or similar exploits may be applicable to your use case.
|
|
||||||
*
|
|
||||||
* \note Currently compression can't be used with DTLS.
|
|
||||||
*
|
|
||||||
* \deprecated This feature is deprecated and will be removed
|
|
||||||
* in the next major revision of the library.
|
|
||||||
*
|
|
||||||
* Used in: library/ssl_tls.c
|
|
||||||
* library/ssl_cli.c
|
|
||||||
* library/ssl_srv.c
|
|
||||||
*
|
|
||||||
* This feature requires zlib library and headers to be present.
|
|
||||||
*
|
|
||||||
* Uncomment to enable use of ZLIB
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_ZLIB_SUPPORT
|
|
||||||
/* \} name SECTION: mbed TLS feature support */
|
/* \} name SECTION: mbed TLS feature support */
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -2332,16 +2244,6 @@
|
||||||
*
|
*
|
||||||
* This module enables the following ciphersuites (if other requisites are
|
* This module enables the following ciphersuites (if other requisites are
|
||||||
* enabled as well):
|
* enabled as well):
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_RSA_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_RSA_WITH_RC4_128_MD5
|
|
||||||
* MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA
|
|
||||||
* MBEDTLS_TLS_PSK_WITH_RC4_128_SHA
|
|
||||||
*
|
*
|
||||||
* \warning ARC4 is considered a weak cipher and its use constitutes a
|
* \warning ARC4 is considered a weak cipher and its use constitutes a
|
||||||
* security risk. If possible, we recommend avoidng dependencies on
|
* security risk. If possible, we recommend avoidng dependencies on
|
||||||
|
@ -2400,7 +2302,7 @@
|
||||||
* library/ecp.c
|
* library/ecp.c
|
||||||
* library/ecdsa.c
|
* library/ecdsa.c
|
||||||
* library/rsa.c
|
* library/rsa.c
|
||||||
* library/rsa_internal.c
|
* library/rsa_alt_helpers.c
|
||||||
* library/ssl_tls.c
|
* library/ssl_tls.c
|
||||||
*
|
*
|
||||||
* This module is required for RSA, DHM and ECC (ECDH, ECDSA) support.
|
* This module is required for RSA, DHM and ECC (ECDH, ECDSA) support.
|
||||||
|
@ -2537,18 +2439,6 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_CCM_C
|
#define MBEDTLS_CCM_C
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_CERTS_C
|
|
||||||
*
|
|
||||||
* Enable the test certificates.
|
|
||||||
*
|
|
||||||
* Module: library/certs.c
|
|
||||||
* Caller:
|
|
||||||
*
|
|
||||||
* This module is used for testing (ssl_client/server).
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_CERTS_C
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_CHACHA20_C
|
* \def MBEDTLS_CHACHA20_C
|
||||||
*
|
*
|
||||||
|
@ -3058,24 +2948,6 @@
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_PKCS5_C
|
#define MBEDTLS_PKCS5_C
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_PKCS11_C
|
|
||||||
*
|
|
||||||
* Enable wrapper for PKCS#11 smartcard support via the pkcs11-helper library.
|
|
||||||
*
|
|
||||||
* \deprecated This option is deprecated and will be removed in a future
|
|
||||||
* version of Mbed TLS.
|
|
||||||
*
|
|
||||||
* Module: library/pkcs11.c
|
|
||||||
* Caller: library/pk.c
|
|
||||||
*
|
|
||||||
* Requires: MBEDTLS_PK_C
|
|
||||||
*
|
|
||||||
* This module enables SSL/TLS PKCS #11 smartcard support.
|
|
||||||
* Requires the presence of the PKCS#11 helper library (libpkcs11-helper)
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_PKCS11_C
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_PKCS12_C
|
* \def MBEDTLS_PKCS12_C
|
||||||
*
|
*
|
||||||
|
@ -3198,7 +3070,7 @@
|
||||||
* Enable the RSA public-key cryptosystem.
|
* Enable the RSA public-key cryptosystem.
|
||||||
*
|
*
|
||||||
* Module: library/rsa.c
|
* Module: library/rsa.c
|
||||||
* library/rsa_internal.c
|
* library/rsa_alt_helpers.c
|
||||||
* Caller: library/ssl_cli.c
|
* Caller: library/ssl_cli.c
|
||||||
* library/ssl_srv.c
|
* library/ssl_srv.c
|
||||||
* library/ssl_tls.c
|
* library/ssl_tls.c
|
||||||
|
@ -3633,6 +3505,17 @@
|
||||||
*/
|
*/
|
||||||
//#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
|
//#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
|
||||||
|
|
||||||
|
/** \def MBEDTLS_PSA_KEY_SLOT_COUNT
|
||||||
|
* Restrict the PSA library to supporting a maximum amount of simultaneously
|
||||||
|
* loaded keys. A loaded key is a key stored by the PSA Crypto core as a
|
||||||
|
* volatile key, or a persistent key which is loaded temporarily by the
|
||||||
|
* library as part of a crypto operation in flight.
|
||||||
|
*
|
||||||
|
* If this option is unset, the library will fall back to a default value of
|
||||||
|
* 32 keys.
|
||||||
|
*/
|
||||||
|
//#define MBEDTLS_PSA_KEY_SLOT_COUNT 32
|
||||||
|
|
||||||
/* SSL Cache options */
|
/* SSL Cache options */
|
||||||
//#define MBEDTLS_SSL_CACHE_DEFAULT_TIMEOUT 86400 /**< 1 day */
|
//#define MBEDTLS_SSL_CACHE_DEFAULT_TIMEOUT 86400 /**< 1 day */
|
||||||
//#define MBEDTLS_SSL_CACHE_DEFAULT_MAX_ENTRIES 50 /**< Maximum entries in cache */
|
//#define MBEDTLS_SSL_CACHE_DEFAULT_MAX_ENTRIES 50 /**< Maximum entries in cache */
|
||||||
|
@ -3778,7 +3661,6 @@
|
||||||
*/
|
*/
|
||||||
//#define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
|
//#define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
|
||||||
|
|
||||||
//#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400 /**< Lifetime of session tickets (if enabled) */
|
|
||||||
//#define MBEDTLS_PSK_MAX_LEN 32 /**< Max size of TLS pre-shared keys, in bytes (default 256 bits) */
|
//#define MBEDTLS_PSK_MAX_LEN 32 /**< Max size of TLS pre-shared keys, in bytes (default 256 bits) */
|
||||||
//#define MBEDTLS_SSL_COOKIE_TIMEOUT 60 /**< Default expiration delay of DTLS cookies, in seconds if HAVE_TIME, or in number of cookies issued */
|
//#define MBEDTLS_SSL_COOKIE_TIMEOUT 60 /**< Default expiration delay of DTLS cookies, in seconds if HAVE_TIME, or in number of cookies issued */
|
||||||
|
|
||||||
|
@ -3800,20 +3682,6 @@
|
||||||
//#define MBEDTLS_X509_MAX_INTERMEDIATE_CA 8 /**< Maximum number of intermediate CAs in a verification chain. */
|
//#define MBEDTLS_X509_MAX_INTERMEDIATE_CA 8 /**< Maximum number of intermediate CAs in a verification chain. */
|
||||||
//#define MBEDTLS_X509_MAX_FILE_PATH_LEN 512 /**< Maximum length of a path/filename string in bytes including the null terminator character ('\0'). */
|
//#define MBEDTLS_X509_MAX_FILE_PATH_LEN 512 /**< Maximum length of a path/filename string in bytes including the null terminator character ('\0'). */
|
||||||
|
|
||||||
/**
|
|
||||||
* Allow SHA-1 in the default TLS configuration for certificate signing.
|
|
||||||
* Without this build-time option, SHA-1 support must be activated explicitly
|
|
||||||
* through mbedtls_ssl_conf_cert_profile. Turning on this option is not
|
|
||||||
* recommended because of it is possible to generate SHA-1 collisions, however
|
|
||||||
* this may be safe for legacy infrastructure where additional controls apply.
|
|
||||||
*
|
|
||||||
* \warning SHA-1 is considered a weak message digest and its use constitutes
|
|
||||||
* a security risk. If possible, we recommend avoiding dependencies
|
|
||||||
* on it, and considering stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
//#define MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Allow SHA-1 in the default TLS configuration for TLS 1.2 handshake
|
* Allow SHA-1 in the default TLS configuration for TLS 1.2 handshake
|
||||||
* signature and ciphersuite selection. Without this build-time option, SHA-1
|
* signature and ciphersuite selection. Without this build-time option, SHA-1
|
||||||
|
|
|
@ -220,6 +220,283 @@ extern "C" {
|
||||||
#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
|
#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_RSA_PUBLIC_KEY */
|
||||||
#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
|
#endif /* PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY */
|
||||||
|
|
||||||
|
/* If any of the block modes are requested that don't have an
|
||||||
|
* associated HW assist, define PSA_HAVE_SOFT_BLOCK_MODE for checking
|
||||||
|
* in the block cipher key types. */
|
||||||
|
#if (defined(PSA_WANT_ALG_CTR) && !defined(MBEDTLS_PSA_ACCEL_ALG_CTR)) || \
|
||||||
|
(defined(PSA_WANT_ALG_CFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_CFB)) || \
|
||||||
|
(defined(PSA_WANT_ALG_OFB) && !defined(MBEDTLS_PSA_ACCEL_ALG_OFB)) || \
|
||||||
|
(defined(PSA_WANT_ALG_XTS) && !defined(MBEDTLS_PSA_ACCEL_ALG_XTS)) || \
|
||||||
|
defined(PSA_WANT_ALG_ECB_NO_PADDING) || \
|
||||||
|
(defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
|
||||||
|
!defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING)) || \
|
||||||
|
(defined(PSA_WANT_ALG_CBC_PKCS7) && \
|
||||||
|
!defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7)) || \
|
||||||
|
(defined(PSA_WANT_ALG_CMAC) && !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC))
|
||||||
|
#define PSA_HAVE_SOFT_BLOCK_MODE 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if (defined(PSA_WANT_ALG_GCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_GCM)) || \
|
||||||
|
(defined(PSA_WANT_ALG_CCM) && !defined(MBEDTLS_PSA_ACCEL_ALG_CCM))
|
||||||
|
#define PSA_HAVE_SOFT_BLOCK_AEAD 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_KEY_TYPE_AES)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_AES)
|
||||||
|
#define PSA_HAVE_SOFT_KEY_TYPE_AES 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_AES */
|
||||||
|
#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_AEAD)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
|
||||||
|
#define MBEDTLS_AES_C
|
||||||
|
#endif /* PSA_HAVE_SOFT_KEY_TYPE_AES || PSA_HAVE_SOFT_BLOCK_MODE */
|
||||||
|
#endif /* PSA_WANT_KEY_TYPE_AES */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_KEY_TYPE_ARC4)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARC4 1
|
||||||
|
#define MBEDTLS_ARC4_C
|
||||||
|
#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_ARC4 */
|
||||||
|
#endif /* PSA_WANT_KEY_TYPE_ARC4 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA)
|
||||||
|
#define PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_CAMELLIA */
|
||||||
|
#if defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_MODE) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_AEAD)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
|
||||||
|
#define MBEDTLS_CAMELLIA_C
|
||||||
|
#endif /* PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA || PSA_HAVE_SOFT_BLOCK_MODE */
|
||||||
|
#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_KEY_TYPE_DES)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_DES)
|
||||||
|
#define PSA_HAVE_SOFT_KEY_TYPE_DES 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_KEY_TYPE_DES */
|
||||||
|
#if defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_MODE)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
|
||||||
|
#define MBEDTLS_DES_C
|
||||||
|
#endif /*PSA_HAVE_SOFT_KEY_TYPE_DES || PSA_HAVE_SOFT_BLOCK_MODE */
|
||||||
|
#endif /* PSA_WANT_KEY_TYPE_DES */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
|
||||||
|
#define MBEDTLS_CHACHA20_C
|
||||||
|
#endif /*!MBEDTLS_PSA_ACCEL_KEY_TYPE_CHACHA20 */
|
||||||
|
#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
|
||||||
|
|
||||||
|
/* If any of the software block ciphers are selected, define
|
||||||
|
* PSA_HAVE_SOFT_BLOCK_CIPHER, which can be used in any of these
|
||||||
|
* situations. */
|
||||||
|
#if defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
|
||||||
|
defined(PSA_HAVE_SOFT_KEY_TYPE_DES) || \
|
||||||
|
defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
|
||||||
|
#define PSA_HAVE_SOFT_BLOCK_CIPHER 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_STREAM_CIPHER)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
|
||||||
|
#endif /* PSA_WANT_ALG_STREAM_CIPHER */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_CBC_MAC)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_MAC)
|
||||||
|
#error "CBC-MAC is not yet supported via the PSA API in Mbed TLS."
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CBC_MAC 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_CBC_MAC */
|
||||||
|
#endif /* PSA_WANT_ALG_CBC_MAC */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_CMAC)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_CMAC) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
|
||||||
|
#define MBEDTLS_CMAC_C
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ALG_CMAC */
|
||||||
|
#endif /* PSA_WANT_ALG_CMAC */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_CTR)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_CTR) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
|
||||||
|
#define MBEDTLS_CIPHER_MODE_CTR
|
||||||
|
#endif
|
||||||
|
#endif /* PSA_WANT_ALG_CTR */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_CFB)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_CFB) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
|
||||||
|
#define MBEDTLS_CIPHER_MODE_CFB
|
||||||
|
#endif
|
||||||
|
#endif /* PSA_WANT_ALG_CFB */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_OFB)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_OFB) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
|
||||||
|
#define MBEDTLS_CIPHER_MODE_OFB
|
||||||
|
#endif
|
||||||
|
#endif /* PSA_WANT_ALG_OFB */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_XTS)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_XTS) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
|
||||||
|
#define MBEDTLS_CIPHER_MODE_XTS
|
||||||
|
#endif
|
||||||
|
#endif /* PSA_WANT_ALG_XTS */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_ECB_NO_PADDING)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_NO_PADDING) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
|
||||||
|
#define MBEDTLS_CIPHER_MODE_CBC
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
|
||||||
|
#endif
|
||||||
|
#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_CBC_PKCS7)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_CBC_PKCS7) || \
|
||||||
|
defined(PSA_HAVE_SOFT_BLOCK_CIPHER)
|
||||||
|
#define MBEDTLS_CIPHER_MODE_CBC
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
|
||||||
|
#define MBEDTLS_CIPHER_PADDING_PKCS7
|
||||||
|
#endif
|
||||||
|
#endif /* PSA_WANT_ALG_CBC_PKCS7 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_CCM)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_CCM) || \
|
||||||
|
defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
|
||||||
|
defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
|
||||||
|
#define MBEDTLS_CCM_C
|
||||||
|
#endif
|
||||||
|
#endif /* PSA_WANT_ALG_CCM */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_GCM)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ALG_GCM) || \
|
||||||
|
defined(PSA_HAVE_SOFT_KEY_TYPE_AES) || \
|
||||||
|
defined(PSA_HAVE_SOFT_KEY_TYPE_CAMELLIA)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
|
||||||
|
#define MBEDTLS_GCM_C
|
||||||
|
#endif
|
||||||
|
#endif /* PSA_WANT_ALG_GCM */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ALG_CHACHA20_POLY1305)
|
||||||
|
#if defined(PSA_WANT_KEY_TYPE_CHACHA20)
|
||||||
|
#define MBEDTLS_CHACHAPOLY_C
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
|
||||||
|
#endif /* PSA_WANT_KEY_TYPE_CHACHA20 */
|
||||||
|
#endif /* PSA_WANT_ALG_CHACHA20_POLY1305 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256)
|
||||||
|
#define MBEDTLS_ECP_DP_BP256R1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_256 */
|
||||||
|
#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_256 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384)
|
||||||
|
#define MBEDTLS_ECP_DP_BP384R1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_384 */
|
||||||
|
#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_384 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512)
|
||||||
|
#define MBEDTLS_ECP_DP_BP512R1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_BRAINPOOL_P_R1_512 */
|
||||||
|
#endif /* PSA_WANT_ECC_BRAINPOOL_P_R1_512 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_MONTGOMERY_255)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255)
|
||||||
|
#define MBEDTLS_ECP_DP_CURVE25519_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_255 */
|
||||||
|
#endif /* PSA_WANT_ECC_MONTGOMERY_255 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_MONTGOMERY_448)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448)
|
||||||
|
/*
|
||||||
|
* Curve448 is not yet supported via the PSA API in Mbed TLS
|
||||||
|
* (https://github.com/ARMmbed/mbedtls/issues/4249).
|
||||||
|
*/
|
||||||
|
#error "Curve448 is not yet supported via the PSA API in Mbed TLS."
|
||||||
|
#define MBEDTLS_ECP_DP_CURVE448_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_MONTGOMERY_448 */
|
||||||
|
#endif /* PSA_WANT_ECC_MONTGOMERY_448 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_SECP_R1_192)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192)
|
||||||
|
#define MBEDTLS_ECP_DP_SECP192R1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_192 */
|
||||||
|
#endif /* PSA_WANT_ECC_SECP_R1_192 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_SECP_R1_224)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224)
|
||||||
|
#define MBEDTLS_ECP_DP_SECP224R1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_224 */
|
||||||
|
#endif /* PSA_WANT_ECC_SECP_R1_224 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_SECP_R1_256)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256)
|
||||||
|
#define MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_256 */
|
||||||
|
#endif /* PSA_WANT_ECC_SECP_R1_256 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_SECP_R1_384)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384)
|
||||||
|
#define MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_384 */
|
||||||
|
#endif /* PSA_WANT_ECC_SECP_R1_384 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_SECP_R1_521)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521)
|
||||||
|
#define MBEDTLS_ECP_DP_SECP521R1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_R1_521 */
|
||||||
|
#endif /* PSA_WANT_ECC_SECP_R1_521 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_SECP_K1_192)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192)
|
||||||
|
#define MBEDTLS_ECP_DP_SECP192K1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_192 */
|
||||||
|
#endif /* PSA_WANT_ECC_SECP_K1_192 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_SECP_K1_224)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224)
|
||||||
|
/*
|
||||||
|
* SECP224K1 is buggy via the PSA API in Mbed TLS
|
||||||
|
* (https://github.com/ARMmbed/mbedtls/issues/3541).
|
||||||
|
*/
|
||||||
|
#error "SECP224K1 is buggy via the PSA API in Mbed TLS."
|
||||||
|
#define MBEDTLS_ECP_DP_SECP224K1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_224 */
|
||||||
|
#endif /* PSA_WANT_ECC_SECP_K1_224 */
|
||||||
|
|
||||||
|
#if defined(PSA_WANT_ECC_SECP_K1_256)
|
||||||
|
#if !defined(MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256)
|
||||||
|
#define MBEDTLS_ECP_DP_SECP256K1_ENABLED
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
|
||||||
|
#endif /* !MBEDTLS_PSA_ACCEL_ECC_SECP_K1_256 */
|
||||||
|
#endif /* PSA_WANT_ECC_SECP_K1_256 */
|
||||||
|
|
||||||
#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
|
#else /* MBEDTLS_PSA_CRYPTO_CONFIG */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -227,6 +504,16 @@ extern "C" {
|
||||||
* is not defined
|
* is not defined
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CCM_C)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CCM 1
|
||||||
|
#define PSA_WANT_ALG_CCM 1
|
||||||
|
#endif /* MBEDTLS_CCM_C */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CMAC_C)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CMAC 1
|
||||||
|
#define PSA_WANT_ALG_CMAC 1
|
||||||
|
#endif /* MBEDTLS_CMAC_C */
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECDH_C)
|
#if defined(MBEDTLS_ECDH_C)
|
||||||
#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
|
#define MBEDTLS_PSA_BUILTIN_ALG_ECDH 1
|
||||||
#define PSA_WANT_ALG_ECDH 1
|
#define PSA_WANT_ALG_ECDH 1
|
||||||
|
@ -251,6 +538,11 @@ extern "C" {
|
||||||
#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
|
#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
|
||||||
#endif /* MBEDTLS_ECP_C */
|
#endif /* MBEDTLS_ECP_C */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_GCM_C)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_GCM 1
|
||||||
|
#define PSA_WANT_ALG_GCM 1
|
||||||
|
#endif /* MBEDTLS_GCM_C */
|
||||||
|
|
||||||
#if defined(MBEDTLS_HKDF_C)
|
#if defined(MBEDTLS_HKDF_C)
|
||||||
#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
|
#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
|
||||||
#define PSA_WANT_ALG_HMAC 1
|
#define PSA_WANT_ALG_HMAC 1
|
||||||
|
@ -261,6 +553,7 @@ extern "C" {
|
||||||
#if defined(MBEDTLS_MD_C)
|
#if defined(MBEDTLS_MD_C)
|
||||||
#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
|
#define MBEDTLS_PSA_BUILTIN_ALG_HMAC 1
|
||||||
#define PSA_WANT_ALG_HMAC 1
|
#define PSA_WANT_ALG_HMAC 1
|
||||||
|
#define PSA_WANT_KEY_TYPE_HMAC
|
||||||
#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
|
#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PRF 1
|
||||||
#define PSA_WANT_ALG_TLS12_PRF 1
|
#define PSA_WANT_ALG_TLS12_PRF 1
|
||||||
#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
|
#define MBEDTLS_PSA_BUILTIN_ALG_TLS12_PSK_TO_MS 1
|
||||||
|
@ -314,6 +607,7 @@ extern "C" {
|
||||||
#if defined(MBEDTLS_SHA256_C)
|
#if defined(MBEDTLS_SHA256_C)
|
||||||
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_224 1
|
||||||
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
|
#define MBEDTLS_PSA_BUILTIN_ALG_SHA_256 1
|
||||||
|
#define PSA_WANT_ALG_SHA_224 1
|
||||||
#define PSA_WANT_ALG_SHA_256 1
|
#define PSA_WANT_ALG_SHA_256 1
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@ -326,8 +620,147 @@ extern "C" {
|
||||||
#define PSA_WANT_ALG_SHA_512 1
|
#define PSA_WANT_ALG_SHA_512 1
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_AES_C)
|
||||||
|
#define PSA_WANT_KEY_TYPE_AES 1
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_AES 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ARC4_C)
|
||||||
|
#define PSA_WANT_KEY_TYPE_ARC4 1
|
||||||
|
#define PSA_WANT_ALG_STREAM_CIPHER 1
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_ARC4 1
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CAMELLIA_C)
|
||||||
|
#define PSA_WANT_KEY_TYPE_CAMELLIA 1
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CAMELLIA 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_DES_C)
|
||||||
|
#define PSA_WANT_KEY_TYPE_DES 1
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_DES 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CHACHA20_C)
|
||||||
|
#define PSA_WANT_KEY_TYPE_CHACHA20 1
|
||||||
|
#define PSA_WANT_ALG_STREAM_CIPHER 1
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_KEY_TYPE_CHACHA20 1
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER 1
|
||||||
|
#if defined(MBEDTLS_CHACHAPOLY_C)
|
||||||
|
#define PSA_WANT_ALG_CHACHA20_POLY1305 1
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CHACHA20_POLY1305 1
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CIPHER_MODE_CBC)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING 1
|
||||||
|
#define PSA_WANT_ALG_CBC_NO_PADDING 1
|
||||||
|
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7 1
|
||||||
|
#define PSA_WANT_ALG_CBC_PKCS7 1
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) || \
|
||||||
|
defined(MBEDTLS_CAMELLIA_C)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING 1
|
||||||
|
#define PSA_WANT_ALG_ECB_NO_PADDING 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CIPHER_MODE_CFB)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CFB 1
|
||||||
|
#define PSA_WANT_ALG_CFB 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CIPHER_MODE_CTR)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_CTR 1
|
||||||
|
#define PSA_WANT_ALG_CTR 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CIPHER_MODE_OFB)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_OFB 1
|
||||||
|
#define PSA_WANT_ALG_OFB 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CIPHER_MODE_XTS)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ALG_XTS 1
|
||||||
|
#define PSA_WANT_ALG_XTS 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_256 1
|
||||||
|
#define PSA_WANT_ECC_BRAINPOOL_P_R1_256
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_384 1
|
||||||
|
#define PSA_WANT_ECC_BRAINPOOL_P_R1_384
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_BRAINPOOL_P_R1_512 1
|
||||||
|
#define PSA_WANT_ECC_BRAINPOOL_P_R1_512
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_CURVE25519_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_255 1
|
||||||
|
#define PSA_WANT_ECC_MONTGOMERY_255
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/* Curve448 is not yet supported via the PSA API (https://github.com/ARMmbed/mbedtls/issues/4249) */
|
||||||
|
#if 0 && defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_MONTGOMERY_448 1
|
||||||
|
#define PSA_WANT_ECC_MONTGOMERY_448
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_192 1
|
||||||
|
#define PSA_WANT_ECC_SECP_R1_192
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_224 1
|
||||||
|
#define PSA_WANT_ECC_SECP_R1_224
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_256 1
|
||||||
|
#define PSA_WANT_ECC_SECP_R1_256
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_384 1
|
||||||
|
#define PSA_WANT_ECC_SECP_R1_384
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_R1_521 1
|
||||||
|
#define PSA_WANT_ECC_SECP_R1_521
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_192 1
|
||||||
|
#define PSA_WANT_ECC_SECP_K1_192
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/* SECP224K1 is buggy via the PSA API (https://github.com/ARMmbed/mbedtls/issues/3541) */
|
||||||
|
#if 0 && defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_224 1
|
||||||
|
#define PSA_WANT_ECC_SECP_K1_224
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_ECC_SECP_K1_256 1
|
||||||
|
#define PSA_WANT_ECC_SECP_K1_256
|
||||||
|
#endif
|
||||||
|
|
||||||
#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
|
#endif /* MBEDTLS_PSA_CRYPTO_CONFIG */
|
||||||
|
|
||||||
|
/* These features are always enabled. */
|
||||||
|
#define PSA_WANT_KEY_TYPE_DERIVE 1
|
||||||
|
#define PSA_WANT_KEY_TYPE_RAW_DATA 1
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -200,6 +200,13 @@ typedef struct mbedtls_ctr_drbg_context
|
||||||
void *p_entropy; /*!< The context for the entropy function. */
|
void *p_entropy; /*!< The context for the entropy function. */
|
||||||
|
|
||||||
#if defined(MBEDTLS_THREADING_C)
|
#if defined(MBEDTLS_THREADING_C)
|
||||||
|
/* Invariant: the mutex is initialized if and only if f_entropy != NULL.
|
||||||
|
* This means that the mutex is initialized during the initial seeding
|
||||||
|
* in mbedtls_ctr_drbg_seed() and freed in mbedtls_ctr_drbg_free().
|
||||||
|
*
|
||||||
|
* Note that this invariant may change without notice. Do not rely on it
|
||||||
|
* and do not access the mutex directly in application code.
|
||||||
|
*/
|
||||||
mbedtls_threading_mutex_t mutex;
|
mbedtls_threading_mutex_t mutex;
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
@ -264,6 +271,15 @@ void mbedtls_ctr_drbg_init( mbedtls_ctr_drbg_context *ctx );
|
||||||
* make a second call to \p f_entropy.
|
* make a second call to \p f_entropy.
|
||||||
*/
|
*/
|
||||||
#endif
|
#endif
|
||||||
|
#if defined(MBEDTLS_THREADING_C)
|
||||||
|
/**
|
||||||
|
* \note When Mbed TLS is built with threading support,
|
||||||
|
* after this function returns successfully,
|
||||||
|
* it is safe to call mbedtls_ctr_drbg_random()
|
||||||
|
* from multiple threads. Other operations, including
|
||||||
|
* reseeding, are not thread-safe.
|
||||||
|
*/
|
||||||
|
#endif /* MBEDTLS_THREADING_C */
|
||||||
/**
|
/**
|
||||||
* - The \p custom string.
|
* - The \p custom string.
|
||||||
*
|
*
|
||||||
|
@ -290,6 +306,8 @@ void mbedtls_ctr_drbg_init( mbedtls_ctr_drbg_context *ctx );
|
||||||
* the same context unless you call
|
* the same context unless you call
|
||||||
* mbedtls_ctr_drbg_free() and mbedtls_ctr_drbg_init()
|
* mbedtls_ctr_drbg_free() and mbedtls_ctr_drbg_init()
|
||||||
* again first.
|
* again first.
|
||||||
|
* After a failed call to mbedtls_ctr_drbg_seed(),
|
||||||
|
* you must call mbedtls_ctr_drbg_free().
|
||||||
* \param f_entropy The entropy callback, taking as arguments the
|
* \param f_entropy The entropy callback, taking as arguments the
|
||||||
* \p p_entropy context, the buffer to fill, and the
|
* \p p_entropy context, the buffer to fill, and the
|
||||||
* length of the buffer.
|
* length of the buffer.
|
||||||
|
@ -405,6 +423,11 @@ void mbedtls_ctr_drbg_set_reseed_interval( mbedtls_ctr_drbg_context *ctx,
|
||||||
* \brief This function reseeds the CTR_DRBG context, that is
|
* \brief This function reseeds the CTR_DRBG context, that is
|
||||||
* extracts data from the entropy source.
|
* extracts data from the entropy source.
|
||||||
*
|
*
|
||||||
|
* \note This function is not thread-safe. It is not safe
|
||||||
|
* to call this function if another thread might be
|
||||||
|
* concurrently obtaining random numbers from the same
|
||||||
|
* context or updating or reseeding the same context.
|
||||||
|
*
|
||||||
* \param ctx The CTR_DRBG context.
|
* \param ctx The CTR_DRBG context.
|
||||||
* \param additional Additional data to add to the state. Can be \c NULL.
|
* \param additional Additional data to add to the state. Can be \c NULL.
|
||||||
* \param len The length of the additional data.
|
* \param len The length of the additional data.
|
||||||
|
@ -422,6 +445,11 @@ int mbedtls_ctr_drbg_reseed( mbedtls_ctr_drbg_context *ctx,
|
||||||
/**
|
/**
|
||||||
* \brief This function updates the state of the CTR_DRBG context.
|
* \brief This function updates the state of the CTR_DRBG context.
|
||||||
*
|
*
|
||||||
|
* \note This function is not thread-safe. It is not safe
|
||||||
|
* to call this function if another thread might be
|
||||||
|
* concurrently obtaining random numbers from the same
|
||||||
|
* context or updating or reseeding the same context.
|
||||||
|
*
|
||||||
* \param ctx The CTR_DRBG context.
|
* \param ctx The CTR_DRBG context.
|
||||||
* \param additional The data to update the state with. This must not be
|
* \param additional The data to update the state with. This must not be
|
||||||
* \c NULL unless \p add_len is \c 0.
|
* \c NULL unless \p add_len is \c 0.
|
||||||
|
@ -445,6 +473,11 @@ int mbedtls_ctr_drbg_update_ret( mbedtls_ctr_drbg_context *ctx,
|
||||||
* This function automatically reseeds if the reseed counter is exceeded
|
* This function automatically reseeds if the reseed counter is exceeded
|
||||||
* or prediction resistance is enabled.
|
* or prediction resistance is enabled.
|
||||||
*
|
*
|
||||||
|
* \note This function is not thread-safe. It is not safe
|
||||||
|
* to call this function if another thread might be
|
||||||
|
* concurrently obtaining random numbers from the same
|
||||||
|
* context or updating or reseeding the same context.
|
||||||
|
*
|
||||||
* \param p_rng The CTR_DRBG context. This must be a pointer to a
|
* \param p_rng The CTR_DRBG context. This must be a pointer to a
|
||||||
* #mbedtls_ctr_drbg_context structure.
|
* #mbedtls_ctr_drbg_context structure.
|
||||||
* \param output The buffer to fill.
|
* \param output The buffer to fill.
|
||||||
|
@ -473,8 +506,16 @@ int mbedtls_ctr_drbg_random_with_add( void *p_rng,
|
||||||
*
|
*
|
||||||
* This function automatically reseeds if the reseed counter is exceeded
|
* This function automatically reseeds if the reseed counter is exceeded
|
||||||
* or prediction resistance is enabled.
|
* or prediction resistance is enabled.
|
||||||
*
|
*/
|
||||||
*
|
#if defined(MBEDTLS_THREADING_C)
|
||||||
|
/**
|
||||||
|
* \note When Mbed TLS is built with threading support,
|
||||||
|
* it is safe to call mbedtls_ctr_drbg_random()
|
||||||
|
* from multiple threads. Other operations, including
|
||||||
|
* reseeding, are not thread-safe.
|
||||||
|
*/
|
||||||
|
#endif /* MBEDTLS_THREADING_C */
|
||||||
|
/**
|
||||||
* \param p_rng The CTR_DRBG context. This must be a pointer to a
|
* \param p_rng The CTR_DRBG context. This must be a pointer to a
|
||||||
* #mbedtls_ctr_drbg_context structure.
|
* #mbedtls_ctr_drbg_context structure.
|
||||||
* \param output The buffer to fill.
|
* \param output The buffer to fill.
|
||||||
|
|
|
@ -80,6 +80,50 @@
|
||||||
|
|
||||||
#endif /* MBEDTLS_DEBUG_C */
|
#endif /* MBEDTLS_DEBUG_C */
|
||||||
|
|
||||||
|
/**
|
||||||
|
* \def MBEDTLS_PRINTF_ATTRIBUTE
|
||||||
|
*
|
||||||
|
* Mark a function as having printf attributes, and thus enable checking
|
||||||
|
* via -wFormat and other flags. This does nothing on builds with compilers
|
||||||
|
* that do not support the format attribute
|
||||||
|
*
|
||||||
|
* Module: library/debug.c
|
||||||
|
* Caller:
|
||||||
|
*
|
||||||
|
* This module provides debugging functions.
|
||||||
|
*/
|
||||||
|
#if defined(__has_attribute)
|
||||||
|
#if __has_attribute(format)
|
||||||
|
#define MBEDTLS_PRINTF_ATTRIBUTE(string_index, first_to_check) \
|
||||||
|
__attribute__((format (printf, string_index, first_to_check)))
|
||||||
|
#else /* __has_attribute(format) */
|
||||||
|
#define MBEDTLS_PRINTF_ATTRIBUTE(string_index, first_to_check)
|
||||||
|
#endif /* __has_attribute(format) */
|
||||||
|
#else /* defined(__has_attribute) */
|
||||||
|
#define MBEDTLS_PRINTF_ATTRIBUTE(string_index, first_to_check)
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/**
|
||||||
|
* \def MBEDTLS_PRINTF_SIZET
|
||||||
|
*
|
||||||
|
* MBEDTLS_PRINTF_xxx: Due to issues with older window compilers
|
||||||
|
* and MinGW we need to define the printf specifier for size_t
|
||||||
|
* and long long per platform.
|
||||||
|
*
|
||||||
|
* Module: library/debug.c
|
||||||
|
* Caller:
|
||||||
|
*
|
||||||
|
* This module provides debugging functions.
|
||||||
|
*/
|
||||||
|
#if defined(__MINGW32__) || (defined(_MSC_VER) && _MSC_VER < 1800)
|
||||||
|
#include <inttypes.h>
|
||||||
|
#define MBEDTLS_PRINTF_SIZET PRIuPTR
|
||||||
|
#define MBEDTLS_PRINTF_LONGLONG "I64d"
|
||||||
|
#else /* defined(__MINGW32__) || (defined(_MSC_VER) && _MSC_VER < 1800) */
|
||||||
|
#define MBEDTLS_PRINTF_SIZET "zu"
|
||||||
|
#define MBEDTLS_PRINTF_LONGLONG "lld"
|
||||||
|
#endif /* defined(__MINGW32__) || (defined(_MSC_VER) && _MSC_VER < 1800) */
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
@ -118,7 +162,7 @@ void mbedtls_debug_set_threshold( int threshold );
|
||||||
*/
|
*/
|
||||||
void mbedtls_debug_print_msg( const mbedtls_ssl_context *ssl, int level,
|
void mbedtls_debug_print_msg( const mbedtls_ssl_context *ssl, int level,
|
||||||
const char *file, int line,
|
const char *file, int line,
|
||||||
const char *format, ... );
|
const char *format, ... ) MBEDTLS_PRINTF_ATTRIBUTE(5, 6);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Print the return value of a function to the debug output. This
|
* \brief Print the return value of a function to the debug output. This
|
||||||
|
|
|
@ -41,9 +41,6 @@
|
||||||
|
|
||||||
#define MBEDTLS_ERR_DES_INVALID_INPUT_LENGTH -0x0032 /**< The data input has an invalid length. */
|
#define MBEDTLS_ERR_DES_INVALID_INPUT_LENGTH -0x0032 /**< The data input has an invalid length. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_DES_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_DES_HW_ACCEL_FAILED -0x0033 /**< DES hardware accelerator failed. */
|
|
||||||
|
|
||||||
#define MBEDTLS_DES_KEY_SIZE 8
|
#define MBEDTLS_DES_KEY_SIZE 8
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
|
|
|
@ -82,10 +82,6 @@
|
||||||
#define MBEDTLS_ERR_DHM_INVALID_FORMAT -0x3380 /**< The ASN.1 data is not formatted correctly. */
|
#define MBEDTLS_ERR_DHM_INVALID_FORMAT -0x3380 /**< The ASN.1 data is not formatted correctly. */
|
||||||
#define MBEDTLS_ERR_DHM_ALLOC_FAILED -0x3400 /**< Allocation of memory failed. */
|
#define MBEDTLS_ERR_DHM_ALLOC_FAILED -0x3400 /**< Allocation of memory failed. */
|
||||||
#define MBEDTLS_ERR_DHM_FILE_IO_ERROR -0x3480 /**< Read or write of file failed. */
|
#define MBEDTLS_ERR_DHM_FILE_IO_ERROR -0x3480 /**< Read or write of file failed. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_DHM_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_DHM_HW_ACCEL_FAILED -0x3500 /**< DHM hardware accelerator failed. */
|
|
||||||
|
|
||||||
#define MBEDTLS_ERR_DHM_SET_GROUP_FAILED -0x3580 /**< Setting the modulus and generator failed. */
|
#define MBEDTLS_ERR_DHM_SET_GROUP_FAILED -0x3580 /**< Setting the modulus and generator failed. */
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
|
|
|
@ -53,10 +53,6 @@
|
||||||
#define MBEDTLS_ERR_ECP_RANDOM_FAILED -0x4D00 /**< Generation of random value, such as ephemeral key, failed. */
|
#define MBEDTLS_ERR_ECP_RANDOM_FAILED -0x4D00 /**< Generation of random value, such as ephemeral key, failed. */
|
||||||
#define MBEDTLS_ERR_ECP_INVALID_KEY -0x4C80 /**< Invalid private or public key. */
|
#define MBEDTLS_ERR_ECP_INVALID_KEY -0x4C80 /**< Invalid private or public key. */
|
||||||
#define MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH -0x4C00 /**< The buffer contains a valid signature followed by more data. */
|
#define MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH -0x4C00 /**< The buffer contains a valid signature followed by more data. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_ECP_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_ECP_HW_ACCEL_FAILED -0x4B80 /**< The ECP hardware accelerator failed. */
|
|
||||||
|
|
||||||
#define MBEDTLS_ERR_ECP_IN_PROGRESS -0x4B00 /**< Operation in progress, call again with the same parameters to continue. */
|
#define MBEDTLS_ERR_ECP_IN_PROGRESS -0x4B00 /**< Operation in progress, call again with the same parameters to continue. */
|
||||||
|
|
||||||
/* Flags indicating whether to include code that is specific to certain
|
/* Flags indicating whether to include code that is specific to certain
|
||||||
|
|
|
@ -117,13 +117,15 @@ mbedtls_entropy_source_state;
|
||||||
*/
|
*/
|
||||||
typedef struct mbedtls_entropy_context
|
typedef struct mbedtls_entropy_context
|
||||||
{
|
{
|
||||||
int accumulator_started;
|
int accumulator_started; /* 0 after init.
|
||||||
|
* 1 after the first update.
|
||||||
|
* -1 after free. */
|
||||||
#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
|
#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
|
||||||
mbedtls_sha512_context accumulator;
|
mbedtls_sha512_context accumulator;
|
||||||
#else
|
#else
|
||||||
mbedtls_sha256_context accumulator;
|
mbedtls_sha256_context accumulator;
|
||||||
#endif
|
#endif
|
||||||
int source_count;
|
int source_count; /* Number of entries used in source. */
|
||||||
mbedtls_entropy_source_state source[MBEDTLS_ENTROPY_MAX_SOURCES];
|
mbedtls_entropy_source_state source[MBEDTLS_ENTROPY_MAX_SOURCES];
|
||||||
#if defined(MBEDTLS_THREADING_C)
|
#if defined(MBEDTLS_THREADING_C)
|
||||||
mbedtls_threading_mutex_t mutex; /*!< mutex */
|
mbedtls_threading_mutex_t mutex; /*!< mutex */
|
||||||
|
@ -134,6 +136,14 @@ typedef struct mbedtls_entropy_context
|
||||||
}
|
}
|
||||||
mbedtls_entropy_context;
|
mbedtls_entropy_context;
|
||||||
|
|
||||||
|
#if !defined(MBEDTLS_NO_PLATFORM_ENTROPY)
|
||||||
|
/**
|
||||||
|
* \brief Platform-specific entropy poll callback
|
||||||
|
*/
|
||||||
|
int mbedtls_platform_entropy_poll( void *data,
|
||||||
|
unsigned char *output, size_t len, size_t *olen );
|
||||||
|
#endif
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Initialize the context
|
* \brief Initialize the context
|
||||||
*
|
*
|
||||||
|
|
|
@ -114,6 +114,9 @@ extern "C" {
|
||||||
#define MBEDTLS_ERR_ERROR_GENERIC_ERROR -0x0001 /**< Generic error */
|
#define MBEDTLS_ERR_ERROR_GENERIC_ERROR -0x0001 /**< Generic error */
|
||||||
#define MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED -0x006E /**< This is a bug in the library */
|
#define MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED -0x006E /**< This is a bug in the library */
|
||||||
|
|
||||||
|
#define MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED -0x0070 /**< Hardware accelerator failed */
|
||||||
|
#define MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED -0x0072 /**< The requested feature is not supported by the platform */
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Translate a mbed TLS error code into a string representation,
|
* \brief Translate a mbed TLS error code into a string representation,
|
||||||
* Result is truncated if necessary and always includes a terminating
|
* Result is truncated if necessary and always includes a terminating
|
||||||
|
|
|
@ -45,10 +45,6 @@
|
||||||
#define MBEDTLS_GCM_DECRYPT 0
|
#define MBEDTLS_GCM_DECRYPT 0
|
||||||
|
|
||||||
#define MBEDTLS_ERR_GCM_AUTH_FAILED -0x0012 /**< Authenticated decryption failed. */
|
#define MBEDTLS_ERR_GCM_AUTH_FAILED -0x0012 /**< Authenticated decryption failed. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_GCM_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_GCM_HW_ACCEL_FAILED -0x0013 /**< GCM hardware accelerator failed. */
|
|
||||||
|
|
||||||
#define MBEDTLS_ERR_GCM_BAD_INPUT -0x0014 /**< Bad input parameters to function. */
|
#define MBEDTLS_ERR_GCM_BAD_INPUT -0x0014 /**< Bad input parameters to function. */
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
|
|
|
@ -101,6 +101,14 @@ typedef struct mbedtls_hmac_drbg_context
|
||||||
void *p_entropy; /*!< context for the entropy function */
|
void *p_entropy; /*!< context for the entropy function */
|
||||||
|
|
||||||
#if defined(MBEDTLS_THREADING_C)
|
#if defined(MBEDTLS_THREADING_C)
|
||||||
|
/* Invariant: the mutex is initialized if and only if
|
||||||
|
* md_ctx->md_info != NULL. This means that the mutex is initialized
|
||||||
|
* during the initial seeding in mbedtls_hmac_drbg_seed() or
|
||||||
|
* mbedtls_hmac_drbg_seed_buf() and freed in mbedtls_ctr_drbg_free().
|
||||||
|
*
|
||||||
|
* Note that this invariant may change without notice. Do not rely on it
|
||||||
|
* and do not access the mutex directly in application code.
|
||||||
|
*/
|
||||||
mbedtls_threading_mutex_t mutex;
|
mbedtls_threading_mutex_t mutex;
|
||||||
#endif
|
#endif
|
||||||
} mbedtls_hmac_drbg_context;
|
} mbedtls_hmac_drbg_context;
|
||||||
|
@ -150,7 +158,17 @@ void mbedtls_hmac_drbg_init( mbedtls_hmac_drbg_context *ctx );
|
||||||
* \note During the initial seeding, this function calls
|
* \note During the initial seeding, this function calls
|
||||||
* the entropy source to obtain a nonce
|
* the entropy source to obtain a nonce
|
||||||
* whose length is half the entropy length.
|
* whose length is half the entropy length.
|
||||||
*
|
*/
|
||||||
|
#if defined(MBEDTLS_THREADING_C)
|
||||||
|
/**
|
||||||
|
* \note When Mbed TLS is built with threading support,
|
||||||
|
* after this function returns successfully,
|
||||||
|
* it is safe to call mbedtls_hmac_drbg_random()
|
||||||
|
* from multiple threads. Other operations, including
|
||||||
|
* reseeding, are not thread-safe.
|
||||||
|
*/
|
||||||
|
#endif /* MBEDTLS_THREADING_C */
|
||||||
|
/**
|
||||||
* \param ctx HMAC_DRBG context to be seeded.
|
* \param ctx HMAC_DRBG context to be seeded.
|
||||||
* \param md_info MD algorithm to use for HMAC_DRBG.
|
* \param md_info MD algorithm to use for HMAC_DRBG.
|
||||||
* \param f_entropy The entropy callback, taking as arguments the
|
* \param f_entropy The entropy callback, taking as arguments the
|
||||||
|
@ -189,7 +207,17 @@ int mbedtls_hmac_drbg_seed( mbedtls_hmac_drbg_context *ctx,
|
||||||
*
|
*
|
||||||
* This function is meant for use in algorithms that need a pseudorandom
|
* This function is meant for use in algorithms that need a pseudorandom
|
||||||
* input such as deterministic ECDSA.
|
* input such as deterministic ECDSA.
|
||||||
*
|
*/
|
||||||
|
#if defined(MBEDTLS_THREADING_C)
|
||||||
|
/**
|
||||||
|
* \note When Mbed TLS is built with threading support,
|
||||||
|
* after this function returns successfully,
|
||||||
|
* it is safe to call mbedtls_hmac_drbg_random()
|
||||||
|
* from multiple threads. Other operations, including
|
||||||
|
* reseeding, are not thread-safe.
|
||||||
|
*/
|
||||||
|
#endif /* MBEDTLS_THREADING_C */
|
||||||
|
/**
|
||||||
* \param ctx HMAC_DRBG context to be initialised.
|
* \param ctx HMAC_DRBG context to be initialised.
|
||||||
* \param md_info MD algorithm to use for HMAC_DRBG.
|
* \param md_info MD algorithm to use for HMAC_DRBG.
|
||||||
* \param data Concatenation of the initial entropy string and
|
* \param data Concatenation of the initial entropy string and
|
||||||
|
@ -252,6 +280,11 @@ void mbedtls_hmac_drbg_set_reseed_interval( mbedtls_hmac_drbg_context *ctx,
|
||||||
/**
|
/**
|
||||||
* \brief This function updates the state of the HMAC_DRBG context.
|
* \brief This function updates the state of the HMAC_DRBG context.
|
||||||
*
|
*
|
||||||
|
* \note This function is not thread-safe. It is not safe
|
||||||
|
* to call this function if another thread might be
|
||||||
|
* concurrently obtaining random numbers from the same
|
||||||
|
* context or updating or reseeding the same context.
|
||||||
|
*
|
||||||
* \param ctx The HMAC_DRBG context.
|
* \param ctx The HMAC_DRBG context.
|
||||||
* \param additional The data to update the state with.
|
* \param additional The data to update the state with.
|
||||||
* If this is \c NULL, there is no additional data.
|
* If this is \c NULL, there is no additional data.
|
||||||
|
@ -268,6 +301,11 @@ int mbedtls_hmac_drbg_update_ret( mbedtls_hmac_drbg_context *ctx,
|
||||||
* \brief This function reseeds the HMAC_DRBG context, that is
|
* \brief This function reseeds the HMAC_DRBG context, that is
|
||||||
* extracts data from the entropy source.
|
* extracts data from the entropy source.
|
||||||
*
|
*
|
||||||
|
* \note This function is not thread-safe. It is not safe
|
||||||
|
* to call this function if another thread might be
|
||||||
|
* concurrently obtaining random numbers from the same
|
||||||
|
* context or updating or reseeding the same context.
|
||||||
|
*
|
||||||
* \param ctx The HMAC_DRBG context.
|
* \param ctx The HMAC_DRBG context.
|
||||||
* \param additional Additional data to add to the state.
|
* \param additional Additional data to add to the state.
|
||||||
* If this is \c NULL, there is no additional data
|
* If this is \c NULL, there is no additional data
|
||||||
|
@ -293,6 +331,11 @@ int mbedtls_hmac_drbg_reseed( mbedtls_hmac_drbg_context *ctx,
|
||||||
* This function automatically reseeds if the reseed counter is exceeded
|
* This function automatically reseeds if the reseed counter is exceeded
|
||||||
* or prediction resistance is enabled.
|
* or prediction resistance is enabled.
|
||||||
*
|
*
|
||||||
|
* \note This function is not thread-safe. It is not safe
|
||||||
|
* to call this function if another thread might be
|
||||||
|
* concurrently obtaining random numbers from the same
|
||||||
|
* context or updating or reseeding the same context.
|
||||||
|
*
|
||||||
* \param p_rng The HMAC_DRBG context. This must be a pointer to a
|
* \param p_rng The HMAC_DRBG context. This must be a pointer to a
|
||||||
* #mbedtls_hmac_drbg_context structure.
|
* #mbedtls_hmac_drbg_context structure.
|
||||||
* \param output The buffer to fill.
|
* \param output The buffer to fill.
|
||||||
|
@ -322,7 +365,16 @@ int mbedtls_hmac_drbg_random_with_add( void *p_rng,
|
||||||
*
|
*
|
||||||
* This function automatically reseeds if the reseed counter is exceeded
|
* This function automatically reseeds if the reseed counter is exceeded
|
||||||
* or prediction resistance is enabled.
|
* or prediction resistance is enabled.
|
||||||
*
|
*/
|
||||||
|
#if defined(MBEDTLS_THREADING_C)
|
||||||
|
/**
|
||||||
|
* \note When Mbed TLS is built with threading support,
|
||||||
|
* it is safe to call mbedtls_ctr_drbg_random()
|
||||||
|
* from multiple threads. Other operations, including
|
||||||
|
* reseeding, are not thread-safe.
|
||||||
|
*/
|
||||||
|
#endif /* MBEDTLS_THREADING_C */
|
||||||
|
/**
|
||||||
* \param p_rng The HMAC_DRBG context. This must be a pointer to a
|
* \param p_rng The HMAC_DRBG context. This must be a pointer to a
|
||||||
* #mbedtls_hmac_drbg_context structure.
|
* #mbedtls_hmac_drbg_context structure.
|
||||||
* \param output The buffer to fill.
|
* \param output The buffer to fill.
|
||||||
|
|
|
@ -38,9 +38,6 @@
|
||||||
#define MBEDTLS_ERR_MD_ALLOC_FAILED -0x5180 /**< Failed to allocate memory. */
|
#define MBEDTLS_ERR_MD_ALLOC_FAILED -0x5180 /**< Failed to allocate memory. */
|
||||||
#define MBEDTLS_ERR_MD_FILE_IO_ERROR -0x5200 /**< Opening or reading of file failed. */
|
#define MBEDTLS_ERR_MD_FILE_IO_ERROR -0x5200 /**< Opening or reading of file failed. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_MD_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_MD_HW_ACCEL_FAILED -0x5280 /**< MD hardware accelerator failed. */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
@ -79,8 +76,15 @@ typedef enum {
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Opaque struct defined in md_internal.h.
|
* Opaque struct.
|
||||||
|
*
|
||||||
|
* Constructed using either #mbedtls_md_info_from_string or
|
||||||
|
* #mbedtls_md_info_from_type.
|
||||||
|
*
|
||||||
|
* Fields can be accessed with #mbedtls_md_get_size,
|
||||||
|
* #mbedtls_md_get_type and #mbedtls_md_get_name.
|
||||||
*/
|
*/
|
||||||
|
/* Defined internally in library/md_wrap.h. */
|
||||||
typedef struct mbedtls_md_info_t mbedtls_md_info_t;
|
typedef struct mbedtls_md_info_t mbedtls_md_info_t;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -158,33 +162,6 @@ void mbedtls_md_init( mbedtls_md_context_t *ctx );
|
||||||
*/
|
*/
|
||||||
void mbedtls_md_free( mbedtls_md_context_t *ctx );
|
void mbedtls_md_free( mbedtls_md_context_t *ctx );
|
||||||
|
|
||||||
#if ! defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief This function selects the message digest algorithm to use,
|
|
||||||
* and allocates internal structures.
|
|
||||||
*
|
|
||||||
* It should be called after mbedtls_md_init() or mbedtls_md_free().
|
|
||||||
* Makes it necessary to call mbedtls_md_free() later.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md_setup() in 2.0.0
|
|
||||||
*
|
|
||||||
* \param ctx The context to set up.
|
|
||||||
* \param md_info The information structure of the message-digest algorithm
|
|
||||||
* to use.
|
|
||||||
*
|
|
||||||
* \return \c 0 on success.
|
|
||||||
* \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter-verification
|
|
||||||
* failure.
|
|
||||||
* \return #MBEDTLS_ERR_MD_ALLOC_FAILED on memory-allocation failure.
|
|
||||||
*/
|
|
||||||
int mbedtls_md_init_ctx( mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info ) MBEDTLS_DEPRECATED;
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief This function selects the message digest algorithm to use,
|
* \brief This function selects the message digest algorithm to use,
|
||||||
|
|
|
@ -35,9 +35,6 @@
|
||||||
|
|
||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
|
|
||||||
/* MBEDTLS_ERR_MD2_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_MD2_HW_ACCEL_FAILED -0x002B /**< MD2 hardware accelerator failed */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
@ -167,77 +164,6 @@ int mbedtls_md2_finish_ret( mbedtls_md2_context *ctx,
|
||||||
*/
|
*/
|
||||||
int mbedtls_internal_md2_process( mbedtls_md2_context *ctx );
|
int mbedtls_internal_md2_process( mbedtls_md2_context *ctx );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief MD2 context setup
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md2_starts_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx context to be initialized
|
|
||||||
*
|
|
||||||
* \warning MD2 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md2_starts( mbedtls_md2_context *ctx );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief MD2 process buffer
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md2_update_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx MD2 context
|
|
||||||
* \param input buffer holding the data
|
|
||||||
* \param ilen length of the input data
|
|
||||||
*
|
|
||||||
* \warning MD2 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md2_update( mbedtls_md2_context *ctx,
|
|
||||||
const unsigned char *input,
|
|
||||||
size_t ilen );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief MD2 final digest
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md2_finish_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx MD2 context
|
|
||||||
* \param output MD2 checksum result
|
|
||||||
*
|
|
||||||
* \warning MD2 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md2_finish( mbedtls_md2_context *ctx,
|
|
||||||
unsigned char output[16] );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief MD2 process data block (internal use only)
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_internal_md2_process() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx MD2 context
|
|
||||||
*
|
|
||||||
* \warning MD2 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md2_process( mbedtls_md2_context *ctx );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Output = MD2( input buffer )
|
* \brief Output = MD2( input buffer )
|
||||||
*
|
*
|
||||||
|
@ -254,33 +180,6 @@ int mbedtls_md2_ret( const unsigned char *input,
|
||||||
size_t ilen,
|
size_t ilen,
|
||||||
unsigned char output[16] );
|
unsigned char output[16] );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief Output = MD2( input buffer )
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md2_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param input buffer holding the data
|
|
||||||
* \param ilen length of the input data
|
|
||||||
* \param output MD2 checksum result
|
|
||||||
*
|
|
||||||
* \warning MD2 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md2( const unsigned char *input,
|
|
||||||
size_t ilen,
|
|
||||||
unsigned char output[16] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SELF_TEST)
|
#if defined(MBEDTLS_SELF_TEST)
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -36,9 +36,6 @@
|
||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
|
|
||||||
/* MBEDTLS_ERR_MD4_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_MD4_HW_ACCEL_FAILED -0x002D /**< MD4 hardware accelerator failed */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
@ -168,79 +165,6 @@ int mbedtls_md4_finish_ret( mbedtls_md4_context *ctx,
|
||||||
int mbedtls_internal_md4_process( mbedtls_md4_context *ctx,
|
int mbedtls_internal_md4_process( mbedtls_md4_context *ctx,
|
||||||
const unsigned char data[64] );
|
const unsigned char data[64] );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief MD4 context setup
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md4_starts_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx context to be initialized
|
|
||||||
*
|
|
||||||
* \warning MD4 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md4_starts( mbedtls_md4_context *ctx );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief MD4 process buffer
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md4_update_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx MD4 context
|
|
||||||
* \param input buffer holding the data
|
|
||||||
* \param ilen length of the input data
|
|
||||||
*
|
|
||||||
* \warning MD4 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md4_update( mbedtls_md4_context *ctx,
|
|
||||||
const unsigned char *input,
|
|
||||||
size_t ilen );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief MD4 final digest
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md4_finish_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx MD4 context
|
|
||||||
* \param output MD4 checksum result
|
|
||||||
*
|
|
||||||
* \warning MD4 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md4_finish( mbedtls_md4_context *ctx,
|
|
||||||
unsigned char output[16] );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief MD4 process data block (internal use only)
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_internal_md4_process() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx MD4 context
|
|
||||||
* \param data buffer holding one block of data
|
|
||||||
*
|
|
||||||
* \warning MD4 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md4_process( mbedtls_md4_context *ctx,
|
|
||||||
const unsigned char data[64] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Output = MD4( input buffer )
|
* \brief Output = MD4( input buffer )
|
||||||
*
|
*
|
||||||
|
@ -259,33 +183,6 @@ int mbedtls_md4_ret( const unsigned char *input,
|
||||||
size_t ilen,
|
size_t ilen,
|
||||||
unsigned char output[16] );
|
unsigned char output[16] );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief Output = MD4( input buffer )
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md4_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param input buffer holding the data
|
|
||||||
* \param ilen length of the input data
|
|
||||||
* \param output MD4 checksum result
|
|
||||||
*
|
|
||||||
* \warning MD4 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md4( const unsigned char *input,
|
|
||||||
size_t ilen,
|
|
||||||
unsigned char output[16] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SELF_TEST)
|
#if defined(MBEDTLS_SELF_TEST)
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -35,9 +35,6 @@
|
||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
|
|
||||||
/* MBEDTLS_ERR_MD5_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_MD5_HW_ACCEL_FAILED -0x002F /**< MD5 hardware accelerator failed */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
@ -168,79 +165,6 @@ int mbedtls_md5_finish_ret( mbedtls_md5_context *ctx,
|
||||||
int mbedtls_internal_md5_process( mbedtls_md5_context *ctx,
|
int mbedtls_internal_md5_process( mbedtls_md5_context *ctx,
|
||||||
const unsigned char data[64] );
|
const unsigned char data[64] );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief MD5 context setup
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md5_starts_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx context to be initialized
|
|
||||||
*
|
|
||||||
* \warning MD5 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md5_starts( mbedtls_md5_context *ctx );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief MD5 process buffer
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md5_update_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx MD5 context
|
|
||||||
* \param input buffer holding the data
|
|
||||||
* \param ilen length of the input data
|
|
||||||
*
|
|
||||||
* \warning MD5 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md5_update( mbedtls_md5_context *ctx,
|
|
||||||
const unsigned char *input,
|
|
||||||
size_t ilen );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief MD5 final digest
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md5_finish_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx MD5 context
|
|
||||||
* \param output MD5 checksum result
|
|
||||||
*
|
|
||||||
* \warning MD5 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md5_finish( mbedtls_md5_context *ctx,
|
|
||||||
unsigned char output[16] );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief MD5 process data block (internal use only)
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_internal_md5_process() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx MD5 context
|
|
||||||
* \param data buffer holding one block of data
|
|
||||||
*
|
|
||||||
* \warning MD5 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md5_process( mbedtls_md5_context *ctx,
|
|
||||||
const unsigned char data[64] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Output = MD5( input buffer )
|
* \brief Output = MD5( input buffer )
|
||||||
*
|
*
|
||||||
|
@ -259,33 +183,6 @@ int mbedtls_md5_ret( const unsigned char *input,
|
||||||
size_t ilen,
|
size_t ilen,
|
||||||
unsigned char output[16] );
|
unsigned char output[16] );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief Output = MD5( input buffer )
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_md5_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param input buffer holding the data
|
|
||||||
* \param ilen length of the input data
|
|
||||||
* \param output MD5 checksum result
|
|
||||||
*
|
|
||||||
* \warning MD5 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_md5( const unsigned char *input,
|
|
||||||
size_t ilen,
|
|
||||||
unsigned char output[16] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SELF_TEST)
|
#if defined(MBEDTLS_SELF_TEST)
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -124,6 +124,7 @@ int mbedtls_net_connect( mbedtls_net_context *ctx, const char *host, const char
|
||||||
*
|
*
|
||||||
* \return 0 if successful, or one of:
|
* \return 0 if successful, or one of:
|
||||||
* MBEDTLS_ERR_NET_SOCKET_FAILED,
|
* MBEDTLS_ERR_NET_SOCKET_FAILED,
|
||||||
|
* MBEDTLS_ERR_NET_UNKNOWN_HOST,
|
||||||
* MBEDTLS_ERR_NET_BIND_FAILED,
|
* MBEDTLS_ERR_NET_BIND_FAILED,
|
||||||
* MBEDTLS_ERR_NET_LISTEN_FAILED
|
* MBEDTLS_ERR_NET_LISTEN_FAILED
|
||||||
*
|
*
|
||||||
|
@ -143,6 +144,8 @@ int mbedtls_net_bind( mbedtls_net_context *ctx, const char *bind_ip, const char
|
||||||
* can be NULL if client_ip is null
|
* can be NULL if client_ip is null
|
||||||
*
|
*
|
||||||
* \return 0 if successful, or
|
* \return 0 if successful, or
|
||||||
|
* MBEDTLS_ERR_NET_SOCKET_FAILED,
|
||||||
|
* MBEDTLS_ERR_NET_BIND_FAILED,
|
||||||
* MBEDTLS_ERR_NET_ACCEPT_FAILED, or
|
* MBEDTLS_ERR_NET_ACCEPT_FAILED, or
|
||||||
* MBEDTLS_ERR_NET_BUFFER_TOO_SMALL if buf_size is too small,
|
* MBEDTLS_ERR_NET_BUFFER_TOO_SMALL if buf_size is too small,
|
||||||
* MBEDTLS_ERR_SSL_WANT_READ if bind_fd was set to
|
* MBEDTLS_ERR_SSL_WANT_READ if bind_fd was set to
|
||||||
|
@ -155,6 +158,10 @@ int mbedtls_net_accept( mbedtls_net_context *bind_ctx,
|
||||||
/**
|
/**
|
||||||
* \brief Check and wait for the context to be ready for read/write
|
* \brief Check and wait for the context to be ready for read/write
|
||||||
*
|
*
|
||||||
|
* \note The current implementation of this function uses
|
||||||
|
* select() and returns an error if the file descriptor
|
||||||
|
* is \c FD_SETSIZE or greater.
|
||||||
|
*
|
||||||
* \param ctx Socket to check
|
* \param ctx Socket to check
|
||||||
* \param rw Bitflag composed of MBEDTLS_NET_POLL_READ and
|
* \param rw Bitflag composed of MBEDTLS_NET_POLL_READ and
|
||||||
* MBEDTLS_NET_POLL_WRITE specifying the events
|
* MBEDTLS_NET_POLL_WRITE specifying the events
|
||||||
|
@ -236,16 +243,21 @@ int mbedtls_net_send( void *ctx, const unsigned char *buf, size_t len );
|
||||||
* 'timeout' seconds. If no error occurs, the actual amount
|
* 'timeout' seconds. If no error occurs, the actual amount
|
||||||
* read is returned.
|
* read is returned.
|
||||||
*
|
*
|
||||||
|
* \note The current implementation of this function uses
|
||||||
|
* select() and returns an error if the file descriptor
|
||||||
|
* is \c FD_SETSIZE or greater.
|
||||||
|
*
|
||||||
* \param ctx Socket
|
* \param ctx Socket
|
||||||
* \param buf The buffer to write to
|
* \param buf The buffer to write to
|
||||||
* \param len Maximum length of the buffer
|
* \param len Maximum length of the buffer
|
||||||
* \param timeout Maximum number of milliseconds to wait for data
|
* \param timeout Maximum number of milliseconds to wait for data
|
||||||
* 0 means no timeout (wait forever)
|
* 0 means no timeout (wait forever)
|
||||||
*
|
*
|
||||||
* \return the number of bytes received,
|
* \return The number of bytes received if successful.
|
||||||
* or a non-zero error code:
|
* MBEDTLS_ERR_SSL_TIMEOUT if the operation timed out.
|
||||||
* MBEDTLS_ERR_SSL_TIMEOUT if the operation timed out,
|
|
||||||
* MBEDTLS_ERR_SSL_WANT_READ if interrupted by a signal.
|
* MBEDTLS_ERR_SSL_WANT_READ if interrupted by a signal.
|
||||||
|
* Another negative error code (MBEDTLS_ERR_NET_xxx)
|
||||||
|
* for other failures.
|
||||||
*
|
*
|
||||||
* \note This function will block (until data becomes available or
|
* \note This function will block (until data becomes available or
|
||||||
* timeout is reached) even if the socket is set to
|
* timeout is reached) even if the socket is set to
|
||||||
|
|
|
@ -67,9 +67,6 @@
|
||||||
#define MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE -0x3980 /**< Unavailable feature, e.g. RSA disabled for RSA key. */
|
#define MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE -0x3980 /**< Unavailable feature, e.g. RSA disabled for RSA key. */
|
||||||
#define MBEDTLS_ERR_PK_SIG_LEN_MISMATCH -0x3900 /**< The buffer contains a valid signature followed by more data. */
|
#define MBEDTLS_ERR_PK_SIG_LEN_MISMATCH -0x3900 /**< The buffer contains a valid signature followed by more data. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_PK_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_PK_HW_ACCEL_FAILED -0x3880 /**< PK hardware accelerator failed. */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
@ -118,7 +115,7 @@ typedef struct mbedtls_pk_rsassa_pss_options
|
||||||
/* For RSA, the signature can be as large as the bignum module allows.
|
/* For RSA, the signature can be as large as the bignum module allows.
|
||||||
* For RSA_ALT, the signature size is not necessarily tied to what the
|
* For RSA_ALT, the signature size is not necessarily tied to what the
|
||||||
* bignum module can do, but in the absence of any specific setting,
|
* bignum module can do, but in the absence of any specific setting,
|
||||||
* we use that (rsa_alt_sign_wrap in pk_wrap will check). */
|
* we use that (rsa_alt_sign_wrap in library/pk_wrap.h will check). */
|
||||||
#undef MBEDTLS_PK_SIGNATURE_MAX_SIZE
|
#undef MBEDTLS_PK_SIGNATURE_MAX_SIZE
|
||||||
#define MBEDTLS_PK_SIGNATURE_MAX_SIZE MBEDTLS_MPI_MAX_SIZE
|
#define MBEDTLS_PK_SIGNATURE_MAX_SIZE MBEDTLS_MPI_MAX_SIZE
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -1,246 +0,0 @@
|
||||||
/**
|
|
||||||
* \file pkcs11.h
|
|
||||||
*
|
|
||||||
* \brief Wrapper for PKCS#11 library libpkcs11-helper
|
|
||||||
*
|
|
||||||
* \author Adriaan de Jong <dejong@fox-it.com>
|
|
||||||
*/
|
|
||||||
/*
|
|
||||||
* Copyright The Mbed TLS Contributors
|
|
||||||
* SPDX-License-Identifier: Apache-2.0
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
||||||
* not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
||||||
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
#ifndef MBEDTLS_PKCS11_H
|
|
||||||
#define MBEDTLS_PKCS11_H
|
|
||||||
|
|
||||||
#if !defined(MBEDTLS_CONFIG_FILE)
|
|
||||||
#include "mbedtls/config.h"
|
|
||||||
#else
|
|
||||||
#include MBEDTLS_CONFIG_FILE
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_PKCS11_C)
|
|
||||||
|
|
||||||
#include "mbedtls/x509_crt.h"
|
|
||||||
|
|
||||||
#include <pkcs11-helper-1.0/pkcs11h-certificate.h>
|
|
||||||
|
|
||||||
#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \
|
|
||||||
!defined(inline) && !defined(__cplusplus)
|
|
||||||
#define inline __inline
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
|
||||||
extern "C" {
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Context for PKCS #11 private keys.
|
|
||||||
*/
|
|
||||||
typedef struct mbedtls_pkcs11_context
|
|
||||||
{
|
|
||||||
pkcs11h_certificate_t pkcs11h_cert;
|
|
||||||
int len;
|
|
||||||
} mbedtls_pkcs11_context;
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Initialize a mbedtls_pkcs11_context.
|
|
||||||
* (Just making memory references valid.)
|
|
||||||
*
|
|
||||||
* \deprecated This function is deprecated and will be removed in a
|
|
||||||
* future version of the library.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_pkcs11_init( mbedtls_pkcs11_context *ctx );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Fill in a mbed TLS certificate, based on the given PKCS11 helper certificate.
|
|
||||||
*
|
|
||||||
* \deprecated This function is deprecated and will be removed in a
|
|
||||||
* future version of the library.
|
|
||||||
*
|
|
||||||
* \param cert X.509 certificate to fill
|
|
||||||
* \param pkcs11h_cert PKCS #11 helper certificate
|
|
||||||
*
|
|
||||||
* \return 0 on success.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED int mbedtls_pkcs11_x509_cert_bind( mbedtls_x509_crt *cert,
|
|
||||||
pkcs11h_certificate_t pkcs11h_cert );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set up a mbedtls_pkcs11_context storing the given certificate. Note that the
|
|
||||||
* mbedtls_pkcs11_context will take over control of the certificate, freeing it when
|
|
||||||
* done.
|
|
||||||
*
|
|
||||||
* \deprecated This function is deprecated and will be removed in a
|
|
||||||
* future version of the library.
|
|
||||||
*
|
|
||||||
* \param priv_key Private key structure to fill.
|
|
||||||
* \param pkcs11_cert PKCS #11 helper certificate
|
|
||||||
*
|
|
||||||
* \return 0 on success
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED int mbedtls_pkcs11_priv_key_bind(
|
|
||||||
mbedtls_pkcs11_context *priv_key,
|
|
||||||
pkcs11h_certificate_t pkcs11_cert );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Free the contents of the given private key context. Note that the structure
|
|
||||||
* itself is not freed.
|
|
||||||
*
|
|
||||||
* \deprecated This function is deprecated and will be removed in a
|
|
||||||
* future version of the library.
|
|
||||||
*
|
|
||||||
* \param priv_key Private key structure to cleanup
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_pkcs11_priv_key_free(
|
|
||||||
mbedtls_pkcs11_context *priv_key );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief Do an RSA private key decrypt, then remove the message
|
|
||||||
* padding
|
|
||||||
*
|
|
||||||
* \deprecated This function is deprecated and will be removed in a future
|
|
||||||
* version of the library.
|
|
||||||
*
|
|
||||||
* \param ctx PKCS #11 context
|
|
||||||
* \param mode must be MBEDTLS_RSA_PRIVATE, for compatibility with rsa.c's signature
|
|
||||||
* \param input buffer holding the encrypted data
|
|
||||||
* \param output buffer that will hold the plaintext
|
|
||||||
* \param olen will contain the plaintext length
|
|
||||||
* \param output_max_len maximum length of the output buffer
|
|
||||||
*
|
|
||||||
* \return 0 if successful, or an MBEDTLS_ERR_RSA_XXX error code
|
|
||||||
*
|
|
||||||
* \note The output buffer must be as large as the size
|
|
||||||
* of ctx->N (eg. 128 bytes if RSA-1024 is used) otherwise
|
|
||||||
* an error is thrown.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED int mbedtls_pkcs11_decrypt( mbedtls_pkcs11_context *ctx,
|
|
||||||
int mode, size_t *olen,
|
|
||||||
const unsigned char *input,
|
|
||||||
unsigned char *output,
|
|
||||||
size_t output_max_len );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief Do a private RSA to sign a message digest
|
|
||||||
*
|
|
||||||
* \deprecated This function is deprecated and will be removed in a future
|
|
||||||
* version of the library.
|
|
||||||
*
|
|
||||||
* \param ctx PKCS #11 context
|
|
||||||
* \param mode must be MBEDTLS_RSA_PRIVATE, for compatibility with rsa.c's signature
|
|
||||||
* \param md_alg a MBEDTLS_MD_XXX (use MBEDTLS_MD_NONE for signing raw data)
|
|
||||||
* \param hashlen message digest length (for MBEDTLS_MD_NONE only)
|
|
||||||
* \param hash buffer holding the message digest
|
|
||||||
* \param sig buffer that will hold the ciphertext
|
|
||||||
*
|
|
||||||
* \return 0 if the signing operation was successful,
|
|
||||||
* or an MBEDTLS_ERR_RSA_XXX error code
|
|
||||||
*
|
|
||||||
* \note The "sig" buffer must be as large as the size
|
|
||||||
* of ctx->N (eg. 128 bytes if RSA-1024 is used).
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED int mbedtls_pkcs11_sign( mbedtls_pkcs11_context *ctx,
|
|
||||||
int mode,
|
|
||||||
mbedtls_md_type_t md_alg,
|
|
||||||
unsigned int hashlen,
|
|
||||||
const unsigned char *hash,
|
|
||||||
unsigned char *sig );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* SSL/TLS wrappers for PKCS#11 functions
|
|
||||||
*
|
|
||||||
* \deprecated This function is deprecated and will be removed in a future
|
|
||||||
* version of the library.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED static inline int mbedtls_ssl_pkcs11_decrypt( void *ctx,
|
|
||||||
int mode, size_t *olen,
|
|
||||||
const unsigned char *input, unsigned char *output,
|
|
||||||
size_t output_max_len )
|
|
||||||
{
|
|
||||||
return mbedtls_pkcs11_decrypt( (mbedtls_pkcs11_context *) ctx, mode, olen, input, output,
|
|
||||||
output_max_len );
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function signs a message digest using RSA.
|
|
||||||
*
|
|
||||||
* \deprecated This function is deprecated and will be removed in a future
|
|
||||||
* version of the library.
|
|
||||||
*
|
|
||||||
* \param ctx The PKCS #11 context.
|
|
||||||
* \param f_rng The RNG function. This parameter is unused.
|
|
||||||
* \param p_rng The RNG context. This parameter is unused.
|
|
||||||
* \param mode The operation to run. This must be set to
|
|
||||||
* MBEDTLS_RSA_PRIVATE, for compatibility with rsa.c's
|
|
||||||
* signature.
|
|
||||||
* \param md_alg The message digest algorithm. One of the MBEDTLS_MD_XXX
|
|
||||||
* must be passed to this function and MBEDTLS_MD_NONE can be
|
|
||||||
* used for signing raw data.
|
|
||||||
* \param hashlen The message digest length (for MBEDTLS_MD_NONE only).
|
|
||||||
* \param hash The buffer holding the message digest.
|
|
||||||
* \param sig The buffer that will hold the ciphertext.
|
|
||||||
*
|
|
||||||
* \return \c 0 if the signing operation was successful.
|
|
||||||
* \return A non-zero error code on failure.
|
|
||||||
*
|
|
||||||
* \note The \p sig buffer must be as large as the size of
|
|
||||||
* <code>ctx->N</code>. For example, 128 bytes if RSA-1024 is
|
|
||||||
* used.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED static inline int mbedtls_ssl_pkcs11_sign( void *ctx,
|
|
||||||
int (*f_rng)(void *, unsigned char *, size_t), void *p_rng,
|
|
||||||
int mode, mbedtls_md_type_t md_alg, unsigned int hashlen,
|
|
||||||
const unsigned char *hash, unsigned char *sig )
|
|
||||||
{
|
|
||||||
((void) f_rng);
|
|
||||||
((void) p_rng);
|
|
||||||
return mbedtls_pkcs11_sign( (mbedtls_pkcs11_context *) ctx, mode, md_alg,
|
|
||||||
hashlen, hash, sig );
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This function gets the length of the private key.
|
|
||||||
*
|
|
||||||
* \deprecated This function is deprecated and will be removed in a future
|
|
||||||
* version of the library.
|
|
||||||
*
|
|
||||||
* \param ctx The PKCS #11 context.
|
|
||||||
*
|
|
||||||
* \return The length of the private key.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED static inline size_t mbedtls_ssl_pkcs11_key_len( void *ctx )
|
|
||||||
{
|
|
||||||
return ( (mbedtls_pkcs11_context *) ctx )->len;
|
|
||||||
}
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
|
|
||||||
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#endif /* MBEDTLS_PKCS11_C */
|
|
||||||
|
|
||||||
#endif /* MBEDTLS_PKCS11_H */
|
|
|
@ -41,9 +41,6 @@
|
||||||
#include "mbedtls/platform_time.h"
|
#include "mbedtls/platform_time.h"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED -0x0070 /**< Hardware accelerator failed */
|
|
||||||
#define MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED -0x0072 /**< The requested feature is not supported by the platform */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -43,14 +43,6 @@
|
||||||
|
|
||||||
#define MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA -0x0057 /**< Invalid input parameter(s). */
|
#define MBEDTLS_ERR_POLY1305_BAD_INPUT_DATA -0x0057 /**< Invalid input parameter(s). */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_POLY1305_FEATURE_UNAVAILABLE is deprecated and should not be
|
|
||||||
* used. */
|
|
||||||
#define MBEDTLS_ERR_POLY1305_FEATURE_UNAVAILABLE -0x0059 /**< Feature not available. For example, s part of the API is not implemented. */
|
|
||||||
|
|
||||||
/* MBEDTLS_ERR_POLY1305_HW_ACCEL_FAILED is deprecated and should not be used.
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_ERR_POLY1305_HW_ACCEL_FAILED -0x005B /**< Poly1305 hardware accelerator failed. */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -40,6 +40,7 @@
|
||||||
#include "mbedtls/md.h"
|
#include "mbedtls/md.h"
|
||||||
#include "mbedtls/pk.h"
|
#include "mbedtls/pk.h"
|
||||||
#include "mbedtls/oid.h"
|
#include "mbedtls/oid.h"
|
||||||
|
#include "mbedtls/error.h"
|
||||||
|
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
|
@ -86,14 +87,14 @@ static inline psa_algorithm_t mbedtls_psa_translate_cipher_mode(
|
||||||
case MBEDTLS_MODE_ECB:
|
case MBEDTLS_MODE_ECB:
|
||||||
return( PSA_ALG_ECB_NO_PADDING );
|
return( PSA_ALG_ECB_NO_PADDING );
|
||||||
case MBEDTLS_MODE_GCM:
|
case MBEDTLS_MODE_GCM:
|
||||||
return( PSA_ALG_AEAD_WITH_TAG_LENGTH( PSA_ALG_GCM, taglen ) );
|
return( PSA_ALG_AEAD_WITH_SHORTENED_TAG( PSA_ALG_GCM, taglen ) );
|
||||||
case MBEDTLS_MODE_CCM:
|
case MBEDTLS_MODE_CCM:
|
||||||
return( PSA_ALG_AEAD_WITH_TAG_LENGTH( PSA_ALG_CCM, taglen ) );
|
return( PSA_ALG_AEAD_WITH_SHORTENED_TAG( PSA_ALG_CCM, taglen ) );
|
||||||
case MBEDTLS_MODE_CBC:
|
case MBEDTLS_MODE_CBC:
|
||||||
if( taglen == 0 )
|
if( taglen == 0 )
|
||||||
return( PSA_ALG_CBC_NO_PADDING );
|
return( PSA_ALG_CBC_NO_PADDING );
|
||||||
/* Intentional fallthrough for taglen != 0 */
|
else
|
||||||
/* fallthrough */
|
return( 0 );
|
||||||
default:
|
default:
|
||||||
return( 0 );
|
return( 0 );
|
||||||
}
|
}
|
||||||
|
@ -151,7 +152,8 @@ static inline psa_algorithm_t mbedtls_psa_translate_md( mbedtls_md_type_t md_alg
|
||||||
case MBEDTLS_MD_RIPEMD160:
|
case MBEDTLS_MD_RIPEMD160:
|
||||||
return( PSA_ALG_RIPEMD160 );
|
return( PSA_ALG_RIPEMD160 );
|
||||||
#endif
|
#endif
|
||||||
case MBEDTLS_MD_NONE: /* Intentional fallthrough */
|
case MBEDTLS_MD_NONE:
|
||||||
|
return( 0 );
|
||||||
default:
|
default:
|
||||||
return( 0 );
|
return( 0 );
|
||||||
}
|
}
|
||||||
|
@ -352,11 +354,11 @@ static inline int mbedtls_psa_err_translate_pk( psa_status_t status )
|
||||||
case PSA_ERROR_COMMUNICATION_FAILURE:
|
case PSA_ERROR_COMMUNICATION_FAILURE:
|
||||||
case PSA_ERROR_HARDWARE_FAILURE:
|
case PSA_ERROR_HARDWARE_FAILURE:
|
||||||
case PSA_ERROR_CORRUPTION_DETECTED:
|
case PSA_ERROR_CORRUPTION_DETECTED:
|
||||||
return( MBEDTLS_ERR_PK_HW_ACCEL_FAILED );
|
return( MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED );
|
||||||
default: /* We return the same as for the 'other failures',
|
default: /* We return the same as for the 'other failures',
|
||||||
* but list them separately nonetheless to indicate
|
* but list them separately nonetheless to indicate
|
||||||
* which failure conditions we have considered. */
|
* which failure conditions we have considered. */
|
||||||
return( MBEDTLS_ERR_PK_HW_ACCEL_FAILED );
|
return( MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -419,4 +421,90 @@ static inline int mbedtls_psa_tls_ecpoint_to_psa_ec( unsigned char const *src,
|
||||||
|
|
||||||
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
||||||
|
|
||||||
|
/* Expose whatever RNG the PSA subsystem uses to applications using the
|
||||||
|
* mbedtls_xxx API. The declarations and definitions here need to be
|
||||||
|
* consistent with the implementation in library/psa_crypto_random_impl.h.
|
||||||
|
* See that file for implementation documentation. */
|
||||||
|
#if defined(MBEDTLS_PSA_CRYPTO_C)
|
||||||
|
|
||||||
|
/* The type of a `f_rng` random generator function that many library functions
|
||||||
|
* take.
|
||||||
|
*
|
||||||
|
* This type name is not part of the Mbed TLS stable API. It may be renamed
|
||||||
|
* or moved without warning.
|
||||||
|
*/
|
||||||
|
typedef int mbedtls_f_rng_t( void *p_rng, unsigned char *output, size_t output_size );
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
|
||||||
|
|
||||||
|
/** The random generator function for the PSA subsystem.
|
||||||
|
*
|
||||||
|
* This function is suitable as the `f_rng` random generator function
|
||||||
|
* parameter of many `mbedtls_xxx` functions. Use #MBEDTLS_PSA_RANDOM_STATE
|
||||||
|
* to obtain the \p p_rng parameter.
|
||||||
|
*
|
||||||
|
* The implementation of this function depends on the configuration of the
|
||||||
|
* library.
|
||||||
|
*
|
||||||
|
* \note Depending on the configuration, this may be a function or
|
||||||
|
* a pointer to a function.
|
||||||
|
*
|
||||||
|
* \note This function may only be used if the PSA crypto subsystem is active.
|
||||||
|
* This means that you must call psa_crypto_init() before any call to
|
||||||
|
* this function, and you must not call this function after calling
|
||||||
|
* mbedtls_psa_crypto_free().
|
||||||
|
*
|
||||||
|
* \param p_rng The random generator context. This must be
|
||||||
|
* #MBEDTLS_PSA_RANDOM_STATE. No other state is
|
||||||
|
* supported.
|
||||||
|
* \param output The buffer to fill. It must have room for
|
||||||
|
* \c output_size bytes.
|
||||||
|
* \param output_size The number of bytes to write to \p output.
|
||||||
|
* This function may fail if \p output_size is too
|
||||||
|
* large. It is guaranteed to accept any output size
|
||||||
|
* requested by Mbed TLS library functions. The
|
||||||
|
* maximum request size depends on the library
|
||||||
|
* configuration.
|
||||||
|
*
|
||||||
|
* \return \c 0 on success.
|
||||||
|
* \return An `MBEDTLS_ERR_ENTROPY_xxx`,
|
||||||
|
* `MBEDTLS_ERR_PLATFORM_xxx,
|
||||||
|
* `MBEDTLS_ERR_CTR_DRBG_xxx` or
|
||||||
|
* `MBEDTLS_ERR_HMAC_DRBG_xxx` on error.
|
||||||
|
*/
|
||||||
|
int mbedtls_psa_get_random( void *p_rng,
|
||||||
|
unsigned char *output,
|
||||||
|
size_t output_size );
|
||||||
|
|
||||||
|
/** The random generator state for the PSA subsystem.
|
||||||
|
*
|
||||||
|
* This macro expands to an expression which is suitable as the `p_rng`
|
||||||
|
* random generator state parameter of many `mbedtls_xxx` functions.
|
||||||
|
* It must be used in combination with the random generator function
|
||||||
|
* mbedtls_psa_get_random().
|
||||||
|
*
|
||||||
|
* The implementation of this macro depends on the configuration of the
|
||||||
|
* library. Do not make any assumption on its nature.
|
||||||
|
*/
|
||||||
|
#define MBEDTLS_PSA_RANDOM_STATE NULL
|
||||||
|
|
||||||
|
#else /* !defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG) */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_CTR_DRBG_C)
|
||||||
|
#include "mbedtls/ctr_drbg.h"
|
||||||
|
typedef mbedtls_ctr_drbg_context mbedtls_psa_drbg_context_t;
|
||||||
|
static mbedtls_f_rng_t *const mbedtls_psa_get_random = mbedtls_ctr_drbg_random;
|
||||||
|
#elif defined(MBEDTLS_HMAC_DRBG_C)
|
||||||
|
#include "mbedtls/hmac_drbg.h"
|
||||||
|
typedef mbedtls_hmac_drbg_context mbedtls_psa_drbg_context_t;
|
||||||
|
static mbedtls_f_rng_t *const mbedtls_psa_get_random = mbedtls_hmac_drbg_random;
|
||||||
|
#endif
|
||||||
|
extern mbedtls_psa_drbg_context_t *const mbedtls_psa_random_state;
|
||||||
|
|
||||||
|
#define MBEDTLS_PSA_RANDOM_STATE mbedtls_psa_random_state
|
||||||
|
|
||||||
|
#endif /* !defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG) */
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_PSA_CRYPTO_C */
|
||||||
|
|
||||||
#endif /* MBEDTLS_PSA_UTIL_H */
|
#endif /* MBEDTLS_PSA_UTIL_H */
|
||||||
|
|
|
@ -31,10 +31,6 @@
|
||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
|
|
||||||
/* MBEDTLS_ERR_RIPEMD160_HW_ACCEL_FAILED is deprecated and should not be used.
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_ERR_RIPEMD160_HW_ACCEL_FAILED -0x0031 /**< RIPEMD160 hardware accelerator failed */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
@ -125,63 +121,6 @@ int mbedtls_ripemd160_finish_ret( mbedtls_ripemd160_context *ctx,
|
||||||
int mbedtls_internal_ripemd160_process( mbedtls_ripemd160_context *ctx,
|
int mbedtls_internal_ripemd160_process( mbedtls_ripemd160_context *ctx,
|
||||||
const unsigned char data[64] );
|
const unsigned char data[64] );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief RIPEMD-160 context setup
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_ripemd160_starts_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx context to be initialized
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_ripemd160_starts(
|
|
||||||
mbedtls_ripemd160_context *ctx );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief RIPEMD-160 process buffer
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_ripemd160_update_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx RIPEMD-160 context
|
|
||||||
* \param input buffer holding the data
|
|
||||||
* \param ilen length of the input data
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_ripemd160_update(
|
|
||||||
mbedtls_ripemd160_context *ctx,
|
|
||||||
const unsigned char *input,
|
|
||||||
size_t ilen );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief RIPEMD-160 final digest
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_ripemd160_finish_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx RIPEMD-160 context
|
|
||||||
* \param output RIPEMD-160 checksum result
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_ripemd160_finish(
|
|
||||||
mbedtls_ripemd160_context *ctx,
|
|
||||||
unsigned char output[20] );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief RIPEMD-160 process data block (internal use only)
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_internal_ripemd160_process() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx RIPEMD-160 context
|
|
||||||
* \param data buffer holding one block of data
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_ripemd160_process(
|
|
||||||
mbedtls_ripemd160_context *ctx,
|
|
||||||
const unsigned char data[64] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Output = RIPEMD-160( input buffer )
|
* \brief Output = RIPEMD-160( input buffer )
|
||||||
*
|
*
|
||||||
|
@ -195,28 +134,6 @@ int mbedtls_ripemd160_ret( const unsigned char *input,
|
||||||
size_t ilen,
|
size_t ilen,
|
||||||
unsigned char output[20] );
|
unsigned char output[20] );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief Output = RIPEMD-160( input buffer )
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_ripemd160_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param input buffer holding the data
|
|
||||||
* \param ilen length of the input data
|
|
||||||
* \param output RIPEMD-160 checksum result
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_ripemd160( const unsigned char *input,
|
|
||||||
size_t ilen,
|
|
||||||
unsigned char output[20] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SELF_TEST)
|
#if defined(MBEDTLS_SELF_TEST)
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -54,13 +54,6 @@
|
||||||
#define MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE -0x4400 /**< The output buffer for decryption is not large enough. */
|
#define MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE -0x4400 /**< The output buffer for decryption is not large enough. */
|
||||||
#define MBEDTLS_ERR_RSA_RNG_FAILED -0x4480 /**< The random generator failed to generate non-zeros. */
|
#define MBEDTLS_ERR_RSA_RNG_FAILED -0x4480 /**< The random generator failed to generate non-zeros. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION is deprecated and should not be used.
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION -0x4500 /**< The implementation does not offer the requested operation, for example, because of security violations or lack of functionality. */
|
|
||||||
|
|
||||||
/* MBEDTLS_ERR_RSA_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_RSA_HW_ACCEL_FAILED -0x4580 /**< RSA hardware accelerator failed. */
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* RSA constants
|
* RSA constants
|
||||||
*/
|
*/
|
||||||
|
@ -97,7 +90,10 @@ extern "C" {
|
||||||
*/
|
*/
|
||||||
typedef struct mbedtls_rsa_context
|
typedef struct mbedtls_rsa_context
|
||||||
{
|
{
|
||||||
int ver; /*!< Always 0.*/
|
int ver; /*!< Reserved for internal purposes.
|
||||||
|
* Do not set this field in application
|
||||||
|
* code. Its meaning might change without
|
||||||
|
* notice. */
|
||||||
size_t len; /*!< The size of \p N in Bytes. */
|
size_t len; /*!< The size of \p N in Bytes. */
|
||||||
|
|
||||||
mbedtls_mpi N; /*!< The public modulus. */
|
mbedtls_mpi N; /*!< The public modulus. */
|
||||||
|
@ -127,6 +123,7 @@ typedef struct mbedtls_rsa_context
|
||||||
mask generating function used in the
|
mask generating function used in the
|
||||||
EME-OAEP and EMSA-PSS encodings. */
|
EME-OAEP and EMSA-PSS encodings. */
|
||||||
#if defined(MBEDTLS_THREADING_C)
|
#if defined(MBEDTLS_THREADING_C)
|
||||||
|
/* Invariant: the mutex is initialized iff ver != 0. */
|
||||||
mbedtls_threading_mutex_t mutex; /*!< Thread-safety mutex. */
|
mbedtls_threading_mutex_t mutex; /*!< Thread-safety mutex. */
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
@ -968,6 +965,59 @@ int mbedtls_rsa_rsassa_pkcs1_v15_sign( mbedtls_rsa_context *ctx,
|
||||||
const unsigned char *hash,
|
const unsigned char *hash,
|
||||||
unsigned char *sig );
|
unsigned char *sig );
|
||||||
|
|
||||||
|
/**
|
||||||
|
* \brief This function performs a PKCS#1 v2.1 PSS signature
|
||||||
|
* operation (RSASSA-PSS-SIGN).
|
||||||
|
*
|
||||||
|
* \note The \p hash_id in the RSA context is the one used for the
|
||||||
|
* encoding. \p md_alg in the function call is the type of hash
|
||||||
|
* that is encoded. According to <em>RFC-3447: Public-Key
|
||||||
|
* Cryptography Standards (PKCS) #1 v2.1: RSA Cryptography
|
||||||
|
* Specifications</em> it is advised to keep both hashes the
|
||||||
|
* same.
|
||||||
|
*
|
||||||
|
* \note This function enforces that the provided salt length complies
|
||||||
|
* with FIPS 186-4 §5.5 (e) and RFC 8017 (PKCS#1 v2.2) §9.1.1
|
||||||
|
* step 3. The constraint is that the hash length plus the salt
|
||||||
|
* length plus 2 bytes must be at most the key length. If this
|
||||||
|
* constraint is not met, this function returns
|
||||||
|
* #MBEDTLS_ERR_RSA_BAD_INPUT_DATA.
|
||||||
|
*
|
||||||
|
* \param ctx The initialized RSA context to use.
|
||||||
|
* \param f_rng The RNG function. It must not be \c NULL.
|
||||||
|
* \param p_rng The RNG context to be passed to \p f_rng. This may be \c NULL
|
||||||
|
* if \p f_rng doesn't need a context argument.
|
||||||
|
* \param md_alg The message-digest algorithm used to hash the original data.
|
||||||
|
* Use #MBEDTLS_MD_NONE for signing raw data.
|
||||||
|
* \param hashlen The length of the message digest.
|
||||||
|
* Ths is only used if \p md_alg is #MBEDTLS_MD_NONE.
|
||||||
|
* \param hash The buffer holding the message digest or raw data.
|
||||||
|
* If \p md_alg is #MBEDTLS_MD_NONE, this must be a readable
|
||||||
|
* buffer of length \p hashlen Bytes. If \p md_alg is not
|
||||||
|
* #MBEDTLS_MD_NONE, it must be a readable buffer of length
|
||||||
|
* the size of the hash corresponding to \p md_alg.
|
||||||
|
* \param saltlen The length of the salt that should be used.
|
||||||
|
* If passed #MBEDTLS_RSA_SALT_LEN_ANY, the function will use
|
||||||
|
* the largest possible salt length up to the hash length,
|
||||||
|
* which is the largest permitted by some standards including
|
||||||
|
* FIPS 186-4 §5.5.
|
||||||
|
* \param sig The buffer to hold the signature. This must be a writable
|
||||||
|
* buffer of length \c ctx->len Bytes. For example, \c 256 Bytes
|
||||||
|
* for an 2048-bit RSA modulus. A buffer length of
|
||||||
|
* #MBEDTLS_MPI_MAX_SIZE is always safe.
|
||||||
|
*
|
||||||
|
* \return \c 0 if the signing operation was successful.
|
||||||
|
* \return An \c MBEDTLS_ERR_RSA_XXX error code on failure.
|
||||||
|
*/
|
||||||
|
int mbedtls_rsa_rsassa_pss_sign_ext( mbedtls_rsa_context *ctx,
|
||||||
|
int (*f_rng)(void *, unsigned char *, size_t),
|
||||||
|
void *p_rng,
|
||||||
|
mbedtls_md_type_t md_alg,
|
||||||
|
unsigned int hashlen,
|
||||||
|
const unsigned char *hash,
|
||||||
|
int saltlen,
|
||||||
|
unsigned char *sig );
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief This function performs a PKCS#1 v2.1 PSS signature
|
* \brief This function performs a PKCS#1 v2.1 PSS signature
|
||||||
* operation (RSASSA-PSS-SIGN).
|
* operation (RSASSA-PSS-SIGN).
|
||||||
|
|
|
@ -38,8 +38,6 @@
|
||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
|
|
||||||
/* MBEDTLS_ERR_SHA1_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_SHA1_HW_ACCEL_FAILED -0x0035 /**< SHA-1 hardware accelerator failed */
|
|
||||||
#define MBEDTLS_ERR_SHA1_BAD_INPUT_DATA -0x0073 /**< SHA-1 input data was malformed. */
|
#define MBEDTLS_ERR_SHA1_BAD_INPUT_DATA -0x0073 /**< SHA-1 input data was malformed. */
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
|
@ -185,85 +183,6 @@ int mbedtls_sha1_finish_ret( mbedtls_sha1_context *ctx,
|
||||||
int mbedtls_internal_sha1_process( mbedtls_sha1_context *ctx,
|
int mbedtls_internal_sha1_process( mbedtls_sha1_context *ctx,
|
||||||
const unsigned char data[64] );
|
const unsigned char data[64] );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief This function starts a SHA-1 checksum calculation.
|
|
||||||
*
|
|
||||||
* \warning SHA-1 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha1_starts_ret() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-1 context to initialize. This must be initialized.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha1_starts( mbedtls_sha1_context *ctx );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function feeds an input buffer into an ongoing SHA-1
|
|
||||||
* checksum calculation.
|
|
||||||
*
|
|
||||||
* \warning SHA-1 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha1_update_ret() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-1 context. This must be initialized and
|
|
||||||
* have a hash operation started.
|
|
||||||
* \param input The buffer holding the input data.
|
|
||||||
* This must be a readable buffer of length \p ilen Bytes.
|
|
||||||
* \param ilen The length of the input data \p input in Bytes.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha1_update( mbedtls_sha1_context *ctx,
|
|
||||||
const unsigned char *input,
|
|
||||||
size_t ilen );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function finishes the SHA-1 operation, and writes
|
|
||||||
* the result to the output buffer.
|
|
||||||
*
|
|
||||||
* \warning SHA-1 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha1_finish_ret() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-1 context. This must be initialized and
|
|
||||||
* have a hash operation started.
|
|
||||||
* \param output The SHA-1 checksum result.
|
|
||||||
* This must be a writable buffer of length \c 20 Bytes.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha1_finish( mbedtls_sha1_context *ctx,
|
|
||||||
unsigned char output[20] );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief SHA-1 process data block (internal use only).
|
|
||||||
*
|
|
||||||
* \warning SHA-1 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_internal_sha1_process() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-1 context. This must be initialized.
|
|
||||||
* \param data The data block being processed.
|
|
||||||
* This must be a readable buffer of length \c 64 bytes.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha1_process( mbedtls_sha1_context *ctx,
|
|
||||||
const unsigned char data[64] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief This function calculates the SHA-1 checksum of a buffer.
|
* \brief This function calculates the SHA-1 checksum of a buffer.
|
||||||
*
|
*
|
||||||
|
@ -291,41 +210,6 @@ int mbedtls_sha1_ret( const unsigned char *input,
|
||||||
size_t ilen,
|
size_t ilen,
|
||||||
unsigned char output[20] );
|
unsigned char output[20] );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief This function calculates the SHA-1 checksum of a buffer.
|
|
||||||
*
|
|
||||||
* The function allocates the context, performs the
|
|
||||||
* calculation, and frees the context.
|
|
||||||
*
|
|
||||||
* The SHA-1 result is calculated as
|
|
||||||
* output = SHA-1(input buffer).
|
|
||||||
*
|
|
||||||
* \warning SHA-1 is considered a weak message digest and its use
|
|
||||||
* constitutes a security risk. We recommend considering
|
|
||||||
* stronger message digests instead.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha1_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param input The buffer holding the input data.
|
|
||||||
* This must be a readable buffer of length \p ilen Bytes.
|
|
||||||
* \param ilen The length of the input data \p input in Bytes.
|
|
||||||
* \param output The SHA-1 checksum result. This must be a writable
|
|
||||||
* buffer of size \c 20 Bytes.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha1( const unsigned char *input,
|
|
||||||
size_t ilen,
|
|
||||||
unsigned char output[20] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SELF_TEST)
|
#if defined(MBEDTLS_SELF_TEST)
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -34,8 +34,6 @@
|
||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
|
|
||||||
/* MBEDTLS_ERR_SHA256_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_SHA256_HW_ACCEL_FAILED -0x0037 /**< SHA-256 hardware accelerator failed */
|
|
||||||
#define MBEDTLS_ERR_SHA256_BAD_INPUT_DATA -0x0074 /**< SHA-256 input data was malformed. */
|
#define MBEDTLS_ERR_SHA256_BAD_INPUT_DATA -0x0074 /**< SHA-256 input data was malformed. */
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
|
@ -152,72 +150,6 @@ int mbedtls_sha256_finish_ret( mbedtls_sha256_context *ctx,
|
||||||
int mbedtls_internal_sha256_process( mbedtls_sha256_context *ctx,
|
int mbedtls_internal_sha256_process( mbedtls_sha256_context *ctx,
|
||||||
const unsigned char data[64] );
|
const unsigned char data[64] );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief This function starts a SHA-224 or SHA-256 checksum
|
|
||||||
* calculation.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha256_starts_ret() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The context to use. This must be initialized.
|
|
||||||
* \param is224 Determines which function to use. This must be
|
|
||||||
* either \c 0 for SHA-256, or \c 1 for SHA-224.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha256_starts( mbedtls_sha256_context *ctx,
|
|
||||||
int is224 );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function feeds an input buffer into an ongoing
|
|
||||||
* SHA-256 checksum calculation.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha256_update_ret() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-256 context to use. This must be
|
|
||||||
* initialized and have a hash operation started.
|
|
||||||
* \param input The buffer holding the data. This must be a readable
|
|
||||||
* buffer of length \p ilen Bytes.
|
|
||||||
* \param ilen The length of the input data in Bytes.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha256_update( mbedtls_sha256_context *ctx,
|
|
||||||
const unsigned char *input,
|
|
||||||
size_t ilen );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function finishes the SHA-256 operation, and writes
|
|
||||||
* the result to the output buffer.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha256_finish_ret() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-256 context. This must be initialized and
|
|
||||||
* have a hash operation started.
|
|
||||||
* \param output The SHA-224 or SHA-256 checksum result. This must be
|
|
||||||
* a writable buffer of length \c 32 Bytes.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha256_finish( mbedtls_sha256_context *ctx,
|
|
||||||
unsigned char output[32] );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function processes a single data block within
|
|
||||||
* the ongoing SHA-256 computation. This function is for
|
|
||||||
* internal use only.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_internal_sha256_process() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-256 context. This must be initialized.
|
|
||||||
* \param data The buffer holding one block of data. This must be
|
|
||||||
* a readable buffer of size \c 64 Bytes.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha256_process( mbedtls_sha256_context *ctx,
|
|
||||||
const unsigned char data[64] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief This function calculates the SHA-224 or SHA-256
|
* \brief This function calculates the SHA-224 or SHA-256
|
||||||
* checksum of a buffer.
|
* checksum of a buffer.
|
||||||
|
@ -241,41 +173,6 @@ int mbedtls_sha256_ret( const unsigned char *input,
|
||||||
unsigned char output[32],
|
unsigned char output[32],
|
||||||
int is224 );
|
int is224 );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function calculates the SHA-224 or SHA-256 checksum
|
|
||||||
* of a buffer.
|
|
||||||
*
|
|
||||||
* The function allocates the context, performs the
|
|
||||||
* calculation, and frees the context.
|
|
||||||
*
|
|
||||||
* The SHA-256 result is calculated as
|
|
||||||
* output = SHA-256(input buffer).
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha256_ret() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param input The buffer holding the data. This must be a readable
|
|
||||||
* buffer of length \p ilen Bytes.
|
|
||||||
* \param ilen The length of the input data in Bytes.
|
|
||||||
* \param output The SHA-224 or SHA-256 checksum result. This must be
|
|
||||||
* a writable buffer of length \c 32 Bytes.
|
|
||||||
* \param is224 Determines which function to use. This must be either
|
|
||||||
* \c 0 for SHA-256, or \c 1 for SHA-224.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha256( const unsigned char *input,
|
|
||||||
size_t ilen,
|
|
||||||
unsigned char output[32],
|
|
||||||
int is224 );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SELF_TEST)
|
#if defined(MBEDTLS_SELF_TEST)
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -33,8 +33,6 @@
|
||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
|
|
||||||
/* MBEDTLS_ERR_SHA512_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_SHA512_HW_ACCEL_FAILED -0x0039 /**< SHA-512 hardware accelerator failed */
|
|
||||||
#define MBEDTLS_ERR_SHA512_BAD_INPUT_DATA -0x0075 /**< SHA-512 input data was malformed. */
|
#define MBEDTLS_ERR_SHA512_BAD_INPUT_DATA -0x0075 /**< SHA-512 input data was malformed. */
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
|
@ -158,75 +156,6 @@ int mbedtls_sha512_finish_ret( mbedtls_sha512_context *ctx,
|
||||||
*/
|
*/
|
||||||
int mbedtls_internal_sha512_process( mbedtls_sha512_context *ctx,
|
int mbedtls_internal_sha512_process( mbedtls_sha512_context *ctx,
|
||||||
const unsigned char data[128] );
|
const unsigned char data[128] );
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
/**
|
|
||||||
* \brief This function starts a SHA-384 or SHA-512 checksum
|
|
||||||
* calculation.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha512_starts_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-512 context to use. This must be initialized.
|
|
||||||
* \param is384 Determines which function to use. This must be either
|
|
||||||
* \c 0 for SHA-512 or \c 1 for SHA-384.
|
|
||||||
*
|
|
||||||
* \note When \c MBEDTLS_SHA512_NO_SHA384 is defined, \p is384 must
|
|
||||||
* be \c 0, or the function will fail to work.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha512_starts( mbedtls_sha512_context *ctx,
|
|
||||||
int is384 );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function feeds an input buffer into an ongoing
|
|
||||||
* SHA-512 checksum calculation.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha512_update_ret() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-512 context. This must be initialized
|
|
||||||
* and have a hash operation started.
|
|
||||||
* \param input The buffer holding the data. This must be a readable
|
|
||||||
* buffer of length \p ilen Bytes.
|
|
||||||
* \param ilen The length of the input data in Bytes.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha512_update( mbedtls_sha512_context *ctx,
|
|
||||||
const unsigned char *input,
|
|
||||||
size_t ilen );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function finishes the SHA-512 operation, and writes
|
|
||||||
* the result to the output buffer.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha512_finish_ret() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-512 context. This must be initialized
|
|
||||||
* and have a hash operation started.
|
|
||||||
* \param output The SHA-384 or SHA-512 checksum result. This must
|
|
||||||
* be a writable buffer of size \c 64 Bytes.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha512_finish( mbedtls_sha512_context *ctx,
|
|
||||||
unsigned char output[64] );
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function processes a single data block within
|
|
||||||
* the ongoing SHA-512 computation. This function is for
|
|
||||||
* internal use only.
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_internal_sha512_process() in 2.7.0.
|
|
||||||
*
|
|
||||||
* \param ctx The SHA-512 context. This must be initialized.
|
|
||||||
* \param data The buffer holding one block of data. This must be
|
|
||||||
* a readable buffer of length \c 128 Bytes.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha512_process(
|
|
||||||
mbedtls_sha512_context *ctx,
|
|
||||||
const unsigned char data[128] );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief This function calculates the SHA-512 or SHA-384
|
* \brief This function calculates the SHA-512 or SHA-384
|
||||||
|
@ -258,44 +187,6 @@ int mbedtls_sha512_ret( const unsigned char *input,
|
||||||
unsigned char output[64],
|
unsigned char output[64],
|
||||||
int is384 );
|
int is384 );
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief This function calculates the SHA-512 or SHA-384
|
|
||||||
* checksum of a buffer.
|
|
||||||
*
|
|
||||||
* The function allocates the context, performs the
|
|
||||||
* calculation, and frees the context.
|
|
||||||
*
|
|
||||||
* The SHA-512 result is calculated as
|
|
||||||
* output = SHA-512(input buffer).
|
|
||||||
*
|
|
||||||
* \deprecated Superseded by mbedtls_sha512_ret() in 2.7.0
|
|
||||||
*
|
|
||||||
* \param input The buffer holding the data. This must be a
|
|
||||||
* readable buffer of length \p ilen Bytes.
|
|
||||||
* \param ilen The length of the input data in Bytes.
|
|
||||||
* \param output The SHA-384 or SHA-512 checksum result. This must
|
|
||||||
* be a writable buffer of length \c 64 Bytes.
|
|
||||||
* \param is384 Determines which function to use. This must be either
|
|
||||||
* \c 0 for SHA-512, or \c 1 for SHA-384.
|
|
||||||
*
|
|
||||||
* \note When \c MBEDTLS_SHA512_NO_SHA384 is defined, \p is384 must
|
|
||||||
* be \c 0, or the function will fail to work.
|
|
||||||
*/
|
|
||||||
MBEDTLS_DEPRECATED void mbedtls_sha512( const unsigned char *input,
|
|
||||||
size_t ilen,
|
|
||||||
unsigned char output[64],
|
|
||||||
int is384 );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SELF_TEST)
|
#if defined(MBEDTLS_SELF_TEST)
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -51,19 +51,6 @@
|
||||||
#include "mbedtls/ecdh.h"
|
#include "mbedtls/ecdh.h"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_ZLIB_SUPPORT)
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#warning "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and will be removed in the next major revision of the library"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
#error "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and cannot be used if MBEDTLS_DEPRECATED_REMOVED is set"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#include "zlib.h"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_HAVE_TIME)
|
#if defined(MBEDTLS_HAVE_TIME)
|
||||||
#include "mbedtls/platform_time.h"
|
#include "mbedtls/platform_time.h"
|
||||||
#endif
|
#endif
|
||||||
|
@ -107,7 +94,6 @@
|
||||||
#define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00 /**< Memory allocation failed */
|
#define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00 /**< Memory allocation failed */
|
||||||
#define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80 /**< Hardware acceleration function returned with error */
|
#define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80 /**< Hardware acceleration function returned with error */
|
||||||
#define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80 /**< Hardware acceleration function skipped / left alone data */
|
#define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80 /**< Hardware acceleration function skipped / left alone data */
|
||||||
#define MBEDTLS_ERR_SSL_COMPRESSION_FAILED -0x6F00 /**< Processing of the compression / decompression failed */
|
|
||||||
#define MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION -0x6E80 /**< Handshake protocol not within min/max boundaries */
|
#define MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION -0x6E80 /**< Handshake protocol not within min/max boundaries */
|
||||||
#define MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET -0x6E00 /**< Processing of the NewSessionTicket handshake message failed. */
|
#define MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET -0x6E00 /**< Processing of the NewSessionTicket handshake message failed. */
|
||||||
#define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80 /**< Session ticket has expired. */
|
#define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80 /**< Session ticket has expired. */
|
||||||
|
@ -137,8 +123,14 @@
|
||||||
/*
|
/*
|
||||||
* Various constants
|
* Various constants
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
/* These are the high an low bytes of ProtocolVersion as defined by:
|
||||||
|
* - RFC 2246: ProtocolVersion version = { 3, 1 }; // TLS v1.0
|
||||||
|
* - RFC 4346: ProtocolVersion version = { 3, 2 }; // TLS v1.1
|
||||||
|
* - RFC 5246: ProtocolVersion version = { 3, 3 }; // TLS v1.2
|
||||||
|
* - RFC 8446: see section 4.2.1
|
||||||
|
*/
|
||||||
#define MBEDTLS_SSL_MAJOR_VERSION_3 3
|
#define MBEDTLS_SSL_MAJOR_VERSION_3 3
|
||||||
#define MBEDTLS_SSL_MINOR_VERSION_0 0 /*!< SSL v3.0 */
|
|
||||||
#define MBEDTLS_SSL_MINOR_VERSION_1 1 /*!< TLS v1.0 */
|
#define MBEDTLS_SSL_MINOR_VERSION_1 1 /*!< TLS v1.0 */
|
||||||
#define MBEDTLS_SSL_MINOR_VERSION_2 2 /*!< TLS v1.1 */
|
#define MBEDTLS_SSL_MINOR_VERSION_2 2 /*!< TLS v1.1 */
|
||||||
#define MBEDTLS_SSL_MINOR_VERSION_3 3 /*!< TLS v1.2 */
|
#define MBEDTLS_SSL_MINOR_VERSION_3 3 /*!< TLS v1.2 */
|
||||||
|
@ -177,7 +169,6 @@
|
||||||
#define MBEDTLS_SSL_ETM_ENABLED 1
|
#define MBEDTLS_SSL_ETM_ENABLED 1
|
||||||
|
|
||||||
#define MBEDTLS_SSL_COMPRESS_NULL 0
|
#define MBEDTLS_SSL_COMPRESS_NULL 0
|
||||||
#define MBEDTLS_SSL_COMPRESS_DEFLATE 1
|
|
||||||
|
|
||||||
#define MBEDTLS_SSL_VERIFY_NONE 0
|
#define MBEDTLS_SSL_VERIFY_NONE 0
|
||||||
#define MBEDTLS_SSL_VERIFY_OPTIONAL 1
|
#define MBEDTLS_SSL_VERIFY_OPTIONAL 1
|
||||||
|
@ -210,9 +201,6 @@
|
||||||
#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED 0
|
#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED 0
|
||||||
#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED 1
|
#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED 1
|
||||||
|
|
||||||
#define MBEDTLS_SSL_ARC4_ENABLED 0
|
|
||||||
#define MBEDTLS_SSL_ARC4_DISABLED 1
|
|
||||||
|
|
||||||
#define MBEDTLS_SSL_PRESET_DEFAULT 0
|
#define MBEDTLS_SSL_PRESET_DEFAULT 0
|
||||||
#define MBEDTLS_SSL_PRESET_SUITEB 2
|
#define MBEDTLS_SSL_PRESET_SUITEB 2
|
||||||
|
|
||||||
|
@ -237,10 +225,6 @@
|
||||||
* \{
|
* \{
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#if !defined(MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME)
|
|
||||||
#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400 /**< Lifetime of session tickets (if enabled) */
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Maximum fragment length in bytes,
|
* Maximum fragment length in bytes,
|
||||||
* determines the size of each of the two internal I/O buffers.
|
* determines the size of each of the two internal I/O buffers.
|
||||||
|
@ -296,11 +280,7 @@
|
||||||
/*
|
/*
|
||||||
* Length of the verify data for secure renegotiation
|
* Length of the verify data for secure renegotiation
|
||||||
*/
|
*/
|
||||||
#if defined(MBEDTLS_SSL_PROTO_SSL3)
|
|
||||||
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 36
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
|
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
|
||||||
#endif
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Signaling ciphersuite values (SCSV)
|
* Signaling ciphersuite values (SCSV)
|
||||||
|
@ -499,7 +479,6 @@ mbedtls_ssl_states;
|
||||||
typedef enum
|
typedef enum
|
||||||
{
|
{
|
||||||
MBEDTLS_SSL_TLS_PRF_NONE,
|
MBEDTLS_SSL_TLS_PRF_NONE,
|
||||||
MBEDTLS_SSL_TLS_PRF_SSL3,
|
|
||||||
MBEDTLS_SSL_TLS_PRF_TLS1,
|
MBEDTLS_SSL_TLS_PRF_TLS1,
|
||||||
MBEDTLS_SSL_TLS_PRF_SHA384,
|
MBEDTLS_SSL_TLS_PRF_SHA384,
|
||||||
MBEDTLS_SSL_TLS_PRF_SHA256
|
MBEDTLS_SSL_TLS_PRF_SHA256
|
||||||
|
@ -619,7 +598,7 @@ typedef struct mbedtls_ssl_session mbedtls_ssl_session;
|
||||||
typedef struct mbedtls_ssl_context mbedtls_ssl_context;
|
typedef struct mbedtls_ssl_context mbedtls_ssl_context;
|
||||||
typedef struct mbedtls_ssl_config mbedtls_ssl_config;
|
typedef struct mbedtls_ssl_config mbedtls_ssl_config;
|
||||||
|
|
||||||
/* Defined in ssl_internal.h */
|
/* Defined in library/ssl_misc.h */
|
||||||
typedef struct mbedtls_ssl_transform mbedtls_ssl_transform;
|
typedef struct mbedtls_ssl_transform mbedtls_ssl_transform;
|
||||||
typedef struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params;
|
typedef struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params;
|
||||||
typedef struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t;
|
typedef struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t;
|
||||||
|
@ -961,7 +940,10 @@ struct mbedtls_ssl_config
|
||||||
* Pointers
|
* Pointers
|
||||||
*/
|
*/
|
||||||
|
|
||||||
const int *ciphersuite_list[4]; /*!< allowed ciphersuites per version */
|
/** Allowed ciphersuites per version. To access list's elements, please use
|
||||||
|
* \c mbedtls_ssl_get_protocol_version_ciphersuites
|
||||||
|
*/
|
||||||
|
const int *ciphersuite_list[3];
|
||||||
|
|
||||||
/** Callback for printing debug output */
|
/** Callback for printing debug output */
|
||||||
void (*f_dbg)(void *, int, const char *, int, const char *);
|
void (*f_dbg)(void *, int, const char *, int, const char *);
|
||||||
|
@ -1151,9 +1133,6 @@ struct mbedtls_ssl_config
|
||||||
unsigned int authmode : 2; /*!< MBEDTLS_SSL_VERIFY_XXX */
|
unsigned int authmode : 2; /*!< MBEDTLS_SSL_VERIFY_XXX */
|
||||||
/* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
|
/* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
|
||||||
unsigned int allow_legacy_renegotiation : 2 ; /*!< MBEDTLS_LEGACY_XXX */
|
unsigned int allow_legacy_renegotiation : 2 ; /*!< MBEDTLS_LEGACY_XXX */
|
||||||
#if defined(MBEDTLS_ARC4_C)
|
|
||||||
unsigned int arc4_disabled : 1; /*!< blacklist RC4 ciphersuites? */
|
|
||||||
#endif
|
|
||||||
#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
|
#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
|
||||||
unsigned int mfl_code : 3; /*!< desired fragment length */
|
unsigned int mfl_code : 3; /*!< desired fragment length */
|
||||||
#endif
|
#endif
|
||||||
|
@ -1212,7 +1191,7 @@ struct mbedtls_ssl_context
|
||||||
#endif /* MBEDTLS_SSL_RENEGOTIATION */
|
#endif /* MBEDTLS_SSL_RENEGOTIATION */
|
||||||
|
|
||||||
int major_ver; /*!< equal to MBEDTLS_SSL_MAJOR_VERSION_3 */
|
int major_ver; /*!< equal to MBEDTLS_SSL_MAJOR_VERSION_3 */
|
||||||
int minor_ver; /*!< either 0 (SSL3) or 1 (TLS1.0) */
|
int minor_ver; /*!< one of MBEDTLS_SSL_MINOR_VERSION_x macros */
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
|
#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
|
||||||
unsigned badmac_seen; /*!< records with a bad MAC received */
|
unsigned badmac_seen; /*!< records with a bad MAC received */
|
||||||
|
@ -1330,9 +1309,6 @@ struct mbedtls_ssl_context
|
||||||
uint16_t mtu; /*!< path mtu, used to fragment outgoing messages */
|
uint16_t mtu; /*!< path mtu, used to fragment outgoing messages */
|
||||||
#endif /* MBEDTLS_SSL_PROTO_DTLS */
|
#endif /* MBEDTLS_SSL_PROTO_DTLS */
|
||||||
|
|
||||||
#if defined(MBEDTLS_ZLIB_SUPPORT)
|
|
||||||
unsigned char *compress_buf; /*!< zlib data buffer */
|
|
||||||
#endif /* MBEDTLS_ZLIB_SUPPORT */
|
|
||||||
#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
|
#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
|
||||||
signed char split_done; /*!< current record already splitted? */
|
signed char split_done; /*!< current record already splitted? */
|
||||||
#endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
|
#endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
|
||||||
|
@ -1397,44 +1373,6 @@ struct mbedtls_ssl_context
|
||||||
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
|
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
|
||||||
};
|
};
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_HW_RECORD_ACCEL)
|
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
|
|
||||||
#define MBEDTLS_SSL_CHANNEL_OUTBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( 0 )
|
|
||||||
#define MBEDTLS_SSL_CHANNEL_INBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( 1 )
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING)
|
|
||||||
#define MBEDTLS_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_DEPRECATED
|
|
||||||
#endif /* MBEDTLS_DEPRECATED_WARNING */
|
|
||||||
|
|
||||||
MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_init)(
|
|
||||||
mbedtls_ssl_context *ssl,
|
|
||||||
const unsigned char *key_enc, const unsigned char *key_dec,
|
|
||||||
size_t keylen,
|
|
||||||
const unsigned char *iv_enc, const unsigned char *iv_dec,
|
|
||||||
size_t ivlen,
|
|
||||||
const unsigned char *mac_enc, const unsigned char *mac_dec,
|
|
||||||
size_t maclen);
|
|
||||||
MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_activate)(
|
|
||||||
mbedtls_ssl_context *ssl,
|
|
||||||
int direction );
|
|
||||||
MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_reset)(
|
|
||||||
mbedtls_ssl_context *ssl );
|
|
||||||
MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_write)(
|
|
||||||
mbedtls_ssl_context *ssl );
|
|
||||||
MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_read)(
|
|
||||||
mbedtls_ssl_context *ssl );
|
|
||||||
MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_finish)(
|
|
||||||
mbedtls_ssl_context *ssl );
|
|
||||||
|
|
||||||
#undef MBEDTLS_DEPRECATED
|
|
||||||
#endif /* !MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
#endif /* MBEDTLS_SSL_HW_RECORD_ACCEL */
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Return the name of the ciphersuite associated with the
|
* \brief Return the name of the ciphersuite associated with the
|
||||||
* given ID
|
* given ID
|
||||||
|
@ -1493,9 +1431,8 @@ int mbedtls_ssl_setup( mbedtls_ssl_context *ssl,
|
||||||
* pointers and data.
|
* pointers and data.
|
||||||
*
|
*
|
||||||
* \param ssl SSL context
|
* \param ssl SSL context
|
||||||
* \return 0 if successful, or MBEDTLS_ERR_SSL_ALLOC_FAILED,
|
* \return 0 if successful, or MBEDTLS_ERR_SSL_ALLOC_FAILED or
|
||||||
MBEDTLS_ERR_SSL_HW_ACCEL_FAILED or
|
MBEDTLS_ERR_SSL_HW_ACCEL_FAILED
|
||||||
* MBEDTLS_ERR_SSL_COMPRESSION_FAILED
|
|
||||||
*/
|
*/
|
||||||
int mbedtls_ssl_session_reset( mbedtls_ssl_context *ssl );
|
int mbedtls_ssl_session_reset( mbedtls_ssl_context *ssl );
|
||||||
|
|
||||||
|
@ -1810,9 +1747,6 @@ int mbedtls_ssl_get_peer_cid( mbedtls_ssl_context *ssl,
|
||||||
* \note Values lower than the current record layer expansion will
|
* \note Values lower than the current record layer expansion will
|
||||||
* result in an error when trying to send data.
|
* result in an error when trying to send data.
|
||||||
*
|
*
|
||||||
* \note Using record compression together with a non-zero MTU value
|
|
||||||
* will result in an error when trying to send data.
|
|
||||||
*
|
|
||||||
* \param ssl SSL context
|
* \param ssl SSL context
|
||||||
* \param mtu Value of the path MTU in bytes
|
* \param mtu Value of the path MTU in bytes
|
||||||
*/
|
*/
|
||||||
|
@ -2557,6 +2491,17 @@ const mbedtls_ssl_session *mbedtls_ssl_get_session_pointer( const mbedtls_ssl_co
|
||||||
void mbedtls_ssl_conf_ciphersuites( mbedtls_ssl_config *conf,
|
void mbedtls_ssl_conf_ciphersuites( mbedtls_ssl_config *conf,
|
||||||
const int *ciphersuites );
|
const int *ciphersuites );
|
||||||
|
|
||||||
|
/**
|
||||||
|
* \brief Get ciphersuite for given protocol's minor version.
|
||||||
|
*
|
||||||
|
* \param conf The SSL configuration.
|
||||||
|
* \param prot_version Protocol version. One of MBEDTLS_SSL_MINOR_VERSION_x macros.
|
||||||
|
* \return Ciphersuites pointer if succesful.
|
||||||
|
* \return \c NULL if no ciphersuites where found.
|
||||||
|
*/
|
||||||
|
const int *mbedtls_ssl_get_protocol_version_ciphersuites(
|
||||||
|
const mbedtls_ssl_config *conf, int prot_version );
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
|
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
|
||||||
#define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
|
#define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
|
||||||
#define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
|
#define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
|
||||||
|
@ -2608,8 +2553,8 @@ int mbedtls_ssl_conf_cid( mbedtls_ssl_config *conf, size_t len,
|
||||||
* \param ciphersuites 0-terminated list of allowed ciphersuites
|
* \param ciphersuites 0-terminated list of allowed ciphersuites
|
||||||
* \param major Major version number (only MBEDTLS_SSL_MAJOR_VERSION_3
|
* \param major Major version number (only MBEDTLS_SSL_MAJOR_VERSION_3
|
||||||
* supported)
|
* supported)
|
||||||
* \param minor Minor version number (MBEDTLS_SSL_MINOR_VERSION_0,
|
* \param minor Minor version number (MBEDTLS_SSL_MINOR_VERSION_1,
|
||||||
* MBEDTLS_SSL_MINOR_VERSION_1 and MBEDTLS_SSL_MINOR_VERSION_2,
|
* MBEDTLS_SSL_MINOR_VERSION_2,
|
||||||
* MBEDTLS_SSL_MINOR_VERSION_3 supported)
|
* MBEDTLS_SSL_MINOR_VERSION_3 supported)
|
||||||
*
|
*
|
||||||
* \note With DTLS, use MBEDTLS_SSL_MINOR_VERSION_2 for DTLS 1.0
|
* \note With DTLS, use MBEDTLS_SSL_MINOR_VERSION_2 for DTLS 1.0
|
||||||
|
@ -3268,8 +3213,7 @@ void mbedtls_ssl_get_dtls_srtp_negotiation_result( const mbedtls_ssl_context *ss
|
||||||
*
|
*
|
||||||
* \param conf SSL configuration
|
* \param conf SSL configuration
|
||||||
* \param major Major version number (only MBEDTLS_SSL_MAJOR_VERSION_3 supported)
|
* \param major Major version number (only MBEDTLS_SSL_MAJOR_VERSION_3 supported)
|
||||||
* \param minor Minor version number (MBEDTLS_SSL_MINOR_VERSION_0,
|
* \param minor Minor version number (MBEDTLS_SSL_MINOR_VERSION_1 and MBEDTLS_SSL_MINOR_VERSION_2,
|
||||||
* MBEDTLS_SSL_MINOR_VERSION_1 and MBEDTLS_SSL_MINOR_VERSION_2,
|
|
||||||
* MBEDTLS_SSL_MINOR_VERSION_3 supported)
|
* MBEDTLS_SSL_MINOR_VERSION_3 supported)
|
||||||
*/
|
*/
|
||||||
void mbedtls_ssl_conf_max_version( mbedtls_ssl_config *conf, int major, int minor );
|
void mbedtls_ssl_conf_max_version( mbedtls_ssl_config *conf, int major, int minor );
|
||||||
|
@ -3281,15 +3225,13 @@ void mbedtls_ssl_conf_max_version( mbedtls_ssl_config *conf, int major, int mino
|
||||||
* \note Input outside of the SSL_MAX_XXXXX_VERSION and
|
* \note Input outside of the SSL_MAX_XXXXX_VERSION and
|
||||||
* SSL_MIN_XXXXX_VERSION range is ignored.
|
* SSL_MIN_XXXXX_VERSION range is ignored.
|
||||||
*
|
*
|
||||||
* \note MBEDTLS_SSL_MINOR_VERSION_0 (SSL v3) should be avoided.
|
|
||||||
*
|
|
||||||
* \note With DTLS, use MBEDTLS_SSL_MINOR_VERSION_2 for DTLS 1.0 and
|
* \note With DTLS, use MBEDTLS_SSL_MINOR_VERSION_2 for DTLS 1.0 and
|
||||||
* MBEDTLS_SSL_MINOR_VERSION_3 for DTLS 1.2
|
* MBEDTLS_SSL_MINOR_VERSION_3 for DTLS 1.2
|
||||||
*
|
*
|
||||||
* \param conf SSL configuration
|
* \param conf SSL configuration
|
||||||
* \param major Major version number (only MBEDTLS_SSL_MAJOR_VERSION_3 supported)
|
* \param major Major version number (only MBEDTLS_SSL_MAJOR_VERSION_3 supported)
|
||||||
* \param minor Minor version number (MBEDTLS_SSL_MINOR_VERSION_0,
|
* \param minor Minor version number (MBEDTLS_SSL_MINOR_VERSION_1,
|
||||||
* MBEDTLS_SSL_MINOR_VERSION_1 and MBEDTLS_SSL_MINOR_VERSION_2,
|
* MBEDTLS_SSL_MINOR_VERSION_2,
|
||||||
* MBEDTLS_SSL_MINOR_VERSION_3 supported)
|
* MBEDTLS_SSL_MINOR_VERSION_3 supported)
|
||||||
*/
|
*/
|
||||||
void mbedtls_ssl_conf_min_version( mbedtls_ssl_config *conf, int major, int minor );
|
void mbedtls_ssl_conf_min_version( mbedtls_ssl_config *conf, int major, int minor );
|
||||||
|
@ -3347,25 +3289,6 @@ void mbedtls_ssl_conf_encrypt_then_mac( mbedtls_ssl_config *conf, char etm );
|
||||||
void mbedtls_ssl_conf_extended_master_secret( mbedtls_ssl_config *conf, char ems );
|
void mbedtls_ssl_conf_extended_master_secret( mbedtls_ssl_config *conf, char ems );
|
||||||
#endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
|
#endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
|
||||||
|
|
||||||
#if defined(MBEDTLS_ARC4_C)
|
|
||||||
/**
|
|
||||||
* \brief Disable or enable support for RC4
|
|
||||||
* (Default: MBEDTLS_SSL_ARC4_DISABLED)
|
|
||||||
*
|
|
||||||
* \warning Use of RC4 in DTLS/TLS has been prohibited by RFC 7465
|
|
||||||
* for security reasons. Use at your own risk.
|
|
||||||
*
|
|
||||||
* \note This function is deprecated and will be removed in
|
|
||||||
* a future version of the library.
|
|
||||||
* RC4 is disabled by default at compile time and needs to be
|
|
||||||
* actively enabled for use with legacy systems.
|
|
||||||
*
|
|
||||||
* \param conf SSL configuration
|
|
||||||
* \param arc4 MBEDTLS_SSL_ARC4_ENABLED or MBEDTLS_SSL_ARC4_DISABLED
|
|
||||||
*/
|
|
||||||
void mbedtls_ssl_conf_arc4_support( mbedtls_ssl_config *conf, char arc4 );
|
|
||||||
#endif /* MBEDTLS_ARC4_C */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_SRV_C)
|
#if defined(MBEDTLS_SSL_SRV_C)
|
||||||
/**
|
/**
|
||||||
* \brief Whether to send a list of acceptable CAs in
|
* \brief Whether to send a list of acceptable CAs in
|
||||||
|
@ -3435,7 +3358,7 @@ void mbedtls_ssl_conf_truncated_hmac( mbedtls_ssl_config *conf, int truncate );
|
||||||
* \brief Enable / Disable 1/n-1 record splitting
|
* \brief Enable / Disable 1/n-1 record splitting
|
||||||
* (Default: MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED)
|
* (Default: MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED)
|
||||||
*
|
*
|
||||||
* \note Only affects SSLv3 and TLS 1.0, not higher versions.
|
* \note Only affects TLS 1.0, not higher versions.
|
||||||
* Does not affect non-CBC ciphersuites in any version.
|
* Does not affect non-CBC ciphersuites in any version.
|
||||||
*
|
*
|
||||||
* \param conf SSL configuration
|
* \param conf SSL configuration
|
||||||
|
@ -3659,11 +3582,11 @@ uint32_t mbedtls_ssl_get_verify_result( const mbedtls_ssl_context *ssl );
|
||||||
const char *mbedtls_ssl_get_ciphersuite( const mbedtls_ssl_context *ssl );
|
const char *mbedtls_ssl_get_ciphersuite( const mbedtls_ssl_context *ssl );
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Return the current SSL version (SSLv3/TLSv1/etc)
|
* \brief Return the current TLS version
|
||||||
*
|
*
|
||||||
* \param ssl SSL context
|
* \param ssl SSL context
|
||||||
*
|
*
|
||||||
* \return a string containing the SSL version
|
* \return a string containing the TLS version
|
||||||
*/
|
*/
|
||||||
const char *mbedtls_ssl_get_version( const mbedtls_ssl_context *ssl );
|
const char *mbedtls_ssl_get_version( const mbedtls_ssl_context *ssl );
|
||||||
|
|
||||||
|
@ -3671,14 +3594,9 @@ const char *mbedtls_ssl_get_version( const mbedtls_ssl_context *ssl );
|
||||||
* \brief Return the (maximum) number of bytes added by the record
|
* \brief Return the (maximum) number of bytes added by the record
|
||||||
* layer: header + encryption/MAC overhead (inc. padding)
|
* layer: header + encryption/MAC overhead (inc. padding)
|
||||||
*
|
*
|
||||||
* \note This function is not available (always returns an error)
|
|
||||||
* when record compression is enabled.
|
|
||||||
*
|
|
||||||
* \param ssl SSL context
|
* \param ssl SSL context
|
||||||
*
|
*
|
||||||
* \return Current maximum record expansion in bytes, or
|
* \return Current maximum record expansion in bytes
|
||||||
* MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE if compression is
|
|
||||||
* enabled, which makes expansion much less predictable
|
|
||||||
*/
|
*/
|
||||||
int mbedtls_ssl_get_record_expansion( const mbedtls_ssl_context *ssl );
|
int mbedtls_ssl_get_record_expansion( const mbedtls_ssl_context *ssl );
|
||||||
|
|
||||||
|
@ -3729,9 +3647,6 @@ size_t mbedtls_ssl_get_input_max_frag_len( const mbedtls_ssl_context *ssl );
|
||||||
* to the caller to call \c mbedtls_ssl_write() again in
|
* to the caller to call \c mbedtls_ssl_write() again in
|
||||||
* order to send the remaining bytes if any.
|
* order to send the remaining bytes if any.
|
||||||
*
|
*
|
||||||
* \note This function is not available (always returns an error)
|
|
||||||
* when record compression is enabled.
|
|
||||||
*
|
|
||||||
* \sa mbedtls_ssl_set_mtu()
|
* \sa mbedtls_ssl_set_mtu()
|
||||||
* \sa mbedtls_ssl_get_output_max_frag_len()
|
* \sa mbedtls_ssl_get_output_max_frag_len()
|
||||||
* \sa mbedtls_ssl_get_input_max_frag_len()
|
* \sa mbedtls_ssl_get_input_max_frag_len()
|
||||||
|
|
|
@ -42,13 +42,8 @@ extern "C" {
|
||||||
#define MBEDTLS_TLS_RSA_WITH_NULL_MD5 0x01 /**< Weak! */
|
#define MBEDTLS_TLS_RSA_WITH_NULL_MD5 0x01 /**< Weak! */
|
||||||
#define MBEDTLS_TLS_RSA_WITH_NULL_SHA 0x02 /**< Weak! */
|
#define MBEDTLS_TLS_RSA_WITH_NULL_SHA 0x02 /**< Weak! */
|
||||||
|
|
||||||
#define MBEDTLS_TLS_RSA_WITH_RC4_128_MD5 0x04
|
|
||||||
#define MBEDTLS_TLS_RSA_WITH_RC4_128_SHA 0x05
|
|
||||||
#define MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA 0x09 /**< Weak! Not in TLS 1.2 */
|
|
||||||
|
|
||||||
#define MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA 0x0A
|
#define MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA 0x0A
|
||||||
|
|
||||||
#define MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA 0x15 /**< Weak! Not in TLS 1.2 */
|
|
||||||
#define MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 0x16
|
#define MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 0x16
|
||||||
|
|
||||||
#define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C /**< Weak! */
|
#define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C /**< Weak! */
|
||||||
|
@ -73,17 +68,14 @@ extern "C" {
|
||||||
#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x84
|
#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x84
|
||||||
#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x88
|
#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x88
|
||||||
|
|
||||||
#define MBEDTLS_TLS_PSK_WITH_RC4_128_SHA 0x8A
|
|
||||||
#define MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA 0x8B
|
#define MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA 0x8B
|
||||||
#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C
|
#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C
|
||||||
#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D
|
#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D
|
||||||
|
|
||||||
#define MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA 0x8E
|
|
||||||
#define MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA 0x8F
|
#define MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA 0x8F
|
||||||
#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x90
|
#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x90
|
||||||
#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x91
|
#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x91
|
||||||
|
|
||||||
#define MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA 0x92
|
|
||||||
#define MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA 0x93
|
#define MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA 0x93
|
||||||
#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA 0x94
|
#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA 0x94
|
||||||
#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA 0x95
|
#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA 0x95
|
||||||
|
@ -122,28 +114,24 @@ extern "C" {
|
||||||
#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4 /**< TLS 1.2 */
|
#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4 /**< TLS 1.2 */
|
||||||
|
|
||||||
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 /**< Weak! */
|
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 /**< Weak! */
|
||||||
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA 0xC002 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC003
|
||||||
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC003 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004
|
||||||
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005
|
||||||
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005 /**< Not in SSL3! */
|
|
||||||
|
|
||||||
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 /**< Weak! */
|
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 /**< Weak! */
|
||||||
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA 0xC007 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC008
|
||||||
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC008 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009
|
||||||
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A
|
||||||
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A /**< Not in SSL3! */
|
|
||||||
|
|
||||||
#define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA 0xC00B /**< Weak! */
|
#define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA 0xC00B /**< Weak! */
|
||||||
#define MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA 0xC00C /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA 0xC00D
|
||||||
#define MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA 0xC00D /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E
|
||||||
#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F
|
||||||
#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F /**< Not in SSL3! */
|
|
||||||
|
|
||||||
#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 /**< Weak! */
|
#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 /**< Weak! */
|
||||||
#define MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA 0xC011 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 0xC012
|
||||||
#define MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 0xC012 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013
|
||||||
#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014
|
||||||
#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014 /**< Not in SSL3! */
|
|
||||||
|
|
||||||
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /**< TLS 1.2 */
|
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /**< TLS 1.2 */
|
||||||
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /**< TLS 1.2 */
|
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /**< TLS 1.2 */
|
||||||
|
@ -163,15 +151,14 @@ extern "C" {
|
||||||
#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 /**< TLS 1.2 */
|
#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 /**< TLS 1.2 */
|
||||||
#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 /**< TLS 1.2 */
|
#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 /**< TLS 1.2 */
|
||||||
|
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA 0xC033 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA 0xC034
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA 0xC034 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039 /**< Weak! No SSL3! */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A /**< Weak! No SSL3! */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B /**< Weak! No SSL3! */
|
|
||||||
|
|
||||||
#define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256 0xC03C /**< TLS 1.2 */
|
#define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256 0xC03C /**< TLS 1.2 */
|
||||||
#define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384 0xC03D /**< TLS 1.2 */
|
#define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384 0xC03D /**< TLS 1.2 */
|
||||||
|
@ -212,14 +199,14 @@ extern "C" {
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 /**< TLS 1.2 */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 /**< TLS 1.2 */
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 /**< TLS 1.2 */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 /**< TLS 1.2 */
|
||||||
|
|
||||||
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072
|
||||||
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073
|
||||||
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC074 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC074
|
||||||
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC075 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC075
|
||||||
#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076
|
||||||
#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077
|
||||||
#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC078 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC078
|
||||||
#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC079 /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC079
|
||||||
|
|
||||||
#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07A /**< TLS 1.2 */
|
#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07A /**< TLS 1.2 */
|
||||||
#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07B /**< TLS 1.2 */
|
#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07B /**< TLS 1.2 */
|
||||||
|
@ -247,8 +234,8 @@ extern "C" {
|
||||||
#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC097
|
#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC097
|
||||||
#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC098
|
#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC098
|
||||||
#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC099
|
#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC099
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A
|
||||||
#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B /**< Not in SSL3! */
|
#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B
|
||||||
|
|
||||||
#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM 0xC09C /**< TLS 1.2 */
|
#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM 0xC09C /**< TLS 1.2 */
|
||||||
#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM 0xC09D /**< TLS 1.2 */
|
#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM 0xC09D /**< TLS 1.2 */
|
||||||
|
|
|
@ -34,10 +34,6 @@
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/* MBEDTLS_ERR_THREADING_FEATURE_UNAVAILABLE is deprecated and should not be
|
|
||||||
* used. */
|
|
||||||
#define MBEDTLS_ERR_THREADING_FEATURE_UNAVAILABLE -0x001A /**< The selected feature is not available. */
|
|
||||||
|
|
||||||
#define MBEDTLS_ERR_THREADING_BAD_INPUT_DATA -0x001C /**< Bad input parameters to function. */
|
#define MBEDTLS_ERR_THREADING_BAD_INPUT_DATA -0x001C /**< Bad input parameters to function. */
|
||||||
#define MBEDTLS_ERR_THREADING_MUTEX_ERROR -0x001E /**< Locking / unlocking / free failed with error code. */
|
#define MBEDTLS_ERR_THREADING_MUTEX_ERROR -0x001E /**< Locking / unlocking / free failed with error code. */
|
||||||
|
|
||||||
|
@ -46,6 +42,9 @@ extern "C" {
|
||||||
typedef struct mbedtls_threading_mutex_t
|
typedef struct mbedtls_threading_mutex_t
|
||||||
{
|
{
|
||||||
pthread_mutex_t mutex;
|
pthread_mutex_t mutex;
|
||||||
|
/* is_valid is 0 after a failed init or a free, and nonzero after a
|
||||||
|
* successful init. This field is not considered part of the public
|
||||||
|
* API of Mbed TLS and may change without notice. */
|
||||||
char is_valid;
|
char is_valid;
|
||||||
} mbedtls_threading_mutex_t;
|
} mbedtls_threading_mutex_t;
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -37,7 +37,7 @@
|
||||||
* Major, Minor, Patchlevel
|
* Major, Minor, Patchlevel
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_VERSION_MAJOR 2
|
#define MBEDTLS_VERSION_MAJOR 2
|
||||||
#define MBEDTLS_VERSION_MINOR 25
|
#define MBEDTLS_VERSION_MINOR 26
|
||||||
#define MBEDTLS_VERSION_PATCH 0
|
#define MBEDTLS_VERSION_PATCH 0
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -45,9 +45,9 @@
|
||||||
* MMNNPP00
|
* MMNNPP00
|
||||||
* Major version | Minor version | Patch version
|
* Major version | Minor version | Patch version
|
||||||
*/
|
*/
|
||||||
#define MBEDTLS_VERSION_NUMBER 0x02190000
|
#define MBEDTLS_VERSION_NUMBER 0x021A0000
|
||||||
#define MBEDTLS_VERSION_STRING "2.25.0"
|
#define MBEDTLS_VERSION_STRING "2.26.0"
|
||||||
#define MBEDTLS_VERSION_STRING_FULL "mbed TLS 2.25.0"
|
#define MBEDTLS_VERSION_STRING_FULL "mbed TLS 2.26.0"
|
||||||
|
|
||||||
#if defined(MBEDTLS_VERSION_C)
|
#if defined(MBEDTLS_VERSION_C)
|
||||||
|
|
||||||
|
|
|
@ -291,17 +291,6 @@ int mbedtls_x509_time_is_past( const mbedtls_x509_time *to );
|
||||||
*/
|
*/
|
||||||
int mbedtls_x509_time_is_future( const mbedtls_x509_time *from );
|
int mbedtls_x509_time_is_future( const mbedtls_x509_time *from );
|
||||||
|
|
||||||
#if defined(MBEDTLS_SELF_TEST)
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief Checkup routine
|
|
||||||
*
|
|
||||||
* \return 0 if successful, or 1 if the test failed
|
|
||||||
*/
|
|
||||||
int mbedtls_x509_self_test( int verbose );
|
|
||||||
|
|
||||||
#endif /* MBEDTLS_SELF_TEST */
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Internal module functions. You probably do not want to use these unless you
|
* Internal module functions. You probably do not want to use these unless you
|
||||||
* know you do.
|
* know you do.
|
||||||
|
|
|
@ -36,9 +36,6 @@
|
||||||
|
|
||||||
#define MBEDTLS_ERR_XTEA_INVALID_INPUT_LENGTH -0x0028 /**< The data input has an invalid length. */
|
#define MBEDTLS_ERR_XTEA_INVALID_INPUT_LENGTH -0x0028 /**< The data input has an invalid length. */
|
||||||
|
|
||||||
/* MBEDTLS_ERR_XTEA_HW_ACCEL_FAILED is deprecated and should not be used. */
|
|
||||||
#define MBEDTLS_ERR_XTEA_HW_ACCEL_FAILED -0x0029 /**< XTEA hardware accelerator failed. */
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -90,10 +90,14 @@ extern "C" {
|
||||||
*
|
*
|
||||||
* \retval #PSA_SUCCESS
|
* \retval #PSA_SUCCESS
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
||||||
|
* \retval #PSA_ERROR_INSUFFICIENT_STORAGE
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_ENTROPY
|
* \retval #PSA_ERROR_INSUFFICIENT_ENTROPY
|
||||||
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
||||||
|
* \retval #PSA_ERROR_DATA_INVALID
|
||||||
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
||||||
*/
|
*/
|
||||||
psa_status_t psa_crypto_init(void);
|
psa_status_t psa_crypto_init(void);
|
||||||
|
|
||||||
|
@ -260,6 +264,14 @@ static psa_key_usage_t psa_get_key_usage_flags(
|
||||||
* - An algorithm value permits this particular algorithm.
|
* - An algorithm value permits this particular algorithm.
|
||||||
* - An algorithm wildcard built from #PSA_ALG_ANY_HASH allows the specified
|
* - An algorithm wildcard built from #PSA_ALG_ANY_HASH allows the specified
|
||||||
* signature scheme with any hash algorithm.
|
* signature scheme with any hash algorithm.
|
||||||
|
* - An algorithm built from #PSA_ALG_AT_LEAST_THIS_LENGTH_MAC allows
|
||||||
|
* any MAC algorithm from the same base class (e.g. CMAC) which
|
||||||
|
* generates/verifies a MAC length greater than or equal to the length
|
||||||
|
* encoded in the wildcard algorithm.
|
||||||
|
* - An algorithm built from #PSA_ALG_AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG
|
||||||
|
* allows any AEAD algorithm from the same base class (e.g. CCM) which
|
||||||
|
* generates/verifies a tag length greater than or equal to the length
|
||||||
|
* encoded in the wildcard algorithm.
|
||||||
*
|
*
|
||||||
* This function overwrites any algorithm policy
|
* This function overwrites any algorithm policy
|
||||||
* previously set in \p attributes.
|
* previously set in \p attributes.
|
||||||
|
@ -368,6 +380,8 @@ static size_t psa_get_key_bits(const psa_key_attributes_t *attributes);
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
||||||
* \retval #PSA_ERROR_STORAGE_FAILURE
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
||||||
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
||||||
|
* \retval #PSA_ERROR_DATA_INVALID
|
||||||
* \retval #PSA_ERROR_BAD_STATE
|
* \retval #PSA_ERROR_BAD_STATE
|
||||||
* The library has not been previously initialized by psa_crypto_init().
|
* The library has not been previously initialized by psa_crypto_init().
|
||||||
* It is implementation-dependent whether a failure to initialize
|
* It is implementation-dependent whether a failure to initialize
|
||||||
|
@ -501,6 +515,8 @@ psa_status_t psa_purge_key(mbedtls_svc_key_id_t key);
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_STORAGE
|
* \retval #PSA_ERROR_INSUFFICIENT_STORAGE
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
||||||
|
* \retval #PSA_ERROR_DATA_INVALID
|
||||||
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
||||||
* \retval #PSA_ERROR_STORAGE_FAILURE
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
||||||
* \retval #PSA_ERROR_BAD_STATE
|
* \retval #PSA_ERROR_BAD_STATE
|
||||||
|
@ -540,6 +556,10 @@ psa_status_t psa_copy_key(mbedtls_svc_key_id_t source_key,
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
* There was an failure in communication with the cryptoprocessor.
|
* There was an failure in communication with the cryptoprocessor.
|
||||||
* The key material may still be present in the cryptoprocessor.
|
* The key material may still be present in the cryptoprocessor.
|
||||||
|
* \retval #PSA_ERROR_DATA_INVALID
|
||||||
|
* This error is typically a result of either storage corruption on a
|
||||||
|
* cleartext storage backend, or an attempt to read data that was
|
||||||
|
* written by an incompatible version of the library.
|
||||||
* \retval #PSA_ERROR_STORAGE_FAILURE
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
||||||
* The storage is corrupted. Implementations shall make a best effort
|
* The storage is corrupted. Implementations shall make a best effort
|
||||||
* to erase key material even in this stage, however applications
|
* to erase key material even in this stage, however applications
|
||||||
|
@ -625,6 +645,8 @@ psa_status_t psa_destroy_key(mbedtls_svc_key_id_t key);
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_STORAGE
|
* \retval #PSA_ERROR_INSUFFICIENT_STORAGE
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
||||||
|
* \retval #PSA_ERROR_DATA_INVALID
|
||||||
* \retval #PSA_ERROR_STORAGE_FAILURE
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
||||||
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
||||||
|
@ -687,6 +709,8 @@ psa_status_t psa_import_key(const psa_key_attributes_t *attributes,
|
||||||
* For Weierstrass curves, this is the content of the `privateKey` field of
|
* For Weierstrass curves, this is the content of the `privateKey` field of
|
||||||
* the `ECPrivateKey` format defined by RFC 5915. For Montgomery curves,
|
* the `ECPrivateKey` format defined by RFC 5915. For Montgomery curves,
|
||||||
* the format is defined by RFC 7748, and output is masked according to §5.
|
* the format is defined by RFC 7748, and output is masked according to §5.
|
||||||
|
* For twisted Edwards curves, the private key is as defined by RFC 8032
|
||||||
|
* (a 32-byte string for Edwards25519, a 57-byte string for Edwards448).
|
||||||
* - For Diffie-Hellman key exchange key pairs (key types for which
|
* - For Diffie-Hellman key exchange key pairs (key types for which
|
||||||
* #PSA_KEY_TYPE_IS_DH_KEY_PAIR is true), the
|
* #PSA_KEY_TYPE_IS_DH_KEY_PAIR is true), the
|
||||||
* format is the representation of the private key `x` as a big-endian byte
|
* format is the representation of the private key `x` as a big-endian byte
|
||||||
|
@ -713,7 +737,7 @@ psa_status_t psa_import_key(const psa_key_attributes_t *attributes,
|
||||||
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
||||||
* The size of the \p data buffer is too small. You can determine a
|
* The size of the \p data buffer is too small. You can determine a
|
||||||
* sufficient buffer size by calling
|
* sufficient buffer size by calling
|
||||||
* #PSA_KEY_EXPORT_MAX_SIZE(\c type, \c bits)
|
* #PSA_EXPORT_KEY_OUTPUT_SIZE(\c type, \c bits)
|
||||||
* where \c type is the key type
|
* where \c type is the key type
|
||||||
* and \c bits is the key size in bits.
|
* and \c bits is the key size in bits.
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
|
@ -752,7 +776,12 @@ psa_status_t psa_export_key(mbedtls_svc_key_id_t key,
|
||||||
* modulus INTEGER, -- n
|
* modulus INTEGER, -- n
|
||||||
* publicExponent INTEGER } -- e
|
* publicExponent INTEGER } -- e
|
||||||
* ```
|
* ```
|
||||||
* - For elliptic curve public keys (key types for which
|
* - For elliptic curve keys on a twisted Edwards curve (key types for which
|
||||||
|
* #PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY is true and #PSA_KEY_TYPE_ECC_GET_FAMILY
|
||||||
|
* returns #PSA_ECC_FAMILY_TWISTED_EDWARDS), the public key is as defined
|
||||||
|
* by RFC 8032
|
||||||
|
* (a 32-byte string for Edwards25519, a 57-byte string for Edwards448).
|
||||||
|
* - For other elliptic curve public keys (key types for which
|
||||||
* #PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY is true), the format is the uncompressed
|
* #PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY is true), the format is the uncompressed
|
||||||
* representation defined by SEC1 §2.3.3 as the content of an ECPoint.
|
* representation defined by SEC1 §2.3.3 as the content of an ECPoint.
|
||||||
* Let `m` be the bit size associated with the curve, i.e. the bit size of
|
* Let `m` be the bit size associated with the curve, i.e. the bit size of
|
||||||
|
@ -783,7 +812,7 @@ psa_status_t psa_export_key(mbedtls_svc_key_id_t key,
|
||||||
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
||||||
* The size of the \p data buffer is too small. You can determine a
|
* The size of the \p data buffer is too small. You can determine a
|
||||||
* sufficient buffer size by calling
|
* sufficient buffer size by calling
|
||||||
* #PSA_KEY_EXPORT_MAX_SIZE(#PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(\c type), \c bits)
|
* #PSA_EXPORT_KEY_OUTPUT_SIZE(#PSA_KEY_TYPE_PUBLIC_KEY_OF_KEY_PAIR(\c type), \c bits)
|
||||||
* where \c type is the key type
|
* where \c type is the key type
|
||||||
* and \c bits is the key size in bits.
|
* and \c bits is the key size in bits.
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
|
@ -822,7 +851,7 @@ psa_status_t psa_export_public_key(mbedtls_svc_key_id_t key,
|
||||||
* \param hash_size Size of the \p hash buffer in bytes.
|
* \param hash_size Size of the \p hash buffer in bytes.
|
||||||
* \param[out] hash_length On success, the number of bytes
|
* \param[out] hash_length On success, the number of bytes
|
||||||
* that make up the hash value. This is always
|
* that make up the hash value. This is always
|
||||||
* #PSA_HASH_SIZE(\p alg).
|
* #PSA_HASH_LENGTH(\p alg).
|
||||||
*
|
*
|
||||||
* \retval #PSA_SUCCESS
|
* \retval #PSA_SUCCESS
|
||||||
* Success.
|
* Success.
|
||||||
|
@ -1032,7 +1061,7 @@ psa_status_t psa_hash_update(psa_hash_operation_t *operation,
|
||||||
* \param hash_size Size of the \p hash buffer in bytes.
|
* \param hash_size Size of the \p hash buffer in bytes.
|
||||||
* \param[out] hash_length On success, the number of bytes
|
* \param[out] hash_length On success, the number of bytes
|
||||||
* that make up the hash value. This is always
|
* that make up the hash value. This is always
|
||||||
* #PSA_HASH_SIZE(\c alg) where \c alg is the
|
* #PSA_HASH_LENGTH(\c alg) where \c alg is the
|
||||||
* hash algorithm that is calculated.
|
* hash algorithm that is calculated.
|
||||||
*
|
*
|
||||||
* \retval #PSA_SUCCESS
|
* \retval #PSA_SUCCESS
|
||||||
|
@ -1041,7 +1070,7 @@ psa_status_t psa_hash_update(psa_hash_operation_t *operation,
|
||||||
* The operation state is not valid (it must be active).
|
* The operation state is not valid (it must be active).
|
||||||
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
||||||
* The size of the \p hash buffer is too small. You can determine a
|
* The size of the \p hash buffer is too small. You can determine a
|
||||||
* sufficient buffer size by calling #PSA_HASH_SIZE(\c alg)
|
* sufficient buffer size by calling #PSA_HASH_LENGTH(\c alg)
|
||||||
* where \c alg is the hash algorithm that is calculated.
|
* where \c alg is the hash algorithm that is calculated.
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
|
@ -1479,7 +1508,7 @@ psa_status_t psa_mac_update(psa_mac_operation_t *operation,
|
||||||
* \param mac_size Size of the \p mac buffer in bytes.
|
* \param mac_size Size of the \p mac buffer in bytes.
|
||||||
* \param[out] mac_length On success, the number of bytes
|
* \param[out] mac_length On success, the number of bytes
|
||||||
* that make up the MAC value. This is always
|
* that make up the MAC value. This is always
|
||||||
* #PSA_MAC_FINAL_SIZE(\c key_type, \c key_bits, \c alg)
|
* #PSA_MAC_LENGTH(\c key_type, \c key_bits, \c alg)
|
||||||
* where \c key_type and \c key_bits are the type and
|
* where \c key_type and \c key_bits are the type and
|
||||||
* bit-size respectively of the key and \c alg is the
|
* bit-size respectively of the key and \c alg is the
|
||||||
* MAC algorithm that is calculated.
|
* MAC algorithm that is calculated.
|
||||||
|
@ -1491,7 +1520,7 @@ psa_status_t psa_mac_update(psa_mac_operation_t *operation,
|
||||||
* operation).
|
* operation).
|
||||||
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
* \retval #PSA_ERROR_BUFFER_TOO_SMALL
|
||||||
* The size of the \p mac buffer is too small. You can determine a
|
* The size of the \p mac buffer is too small. You can determine a
|
||||||
* sufficient buffer size by calling PSA_MAC_FINAL_SIZE().
|
* sufficient buffer size by calling PSA_MAC_LENGTH().
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
||||||
|
@ -2818,7 +2847,8 @@ psa_status_t psa_aead_abort(psa_aead_operation_t *operation);
|
||||||
*
|
*
|
||||||
* Note that to perform a hash-and-sign signature algorithm, you must
|
* Note that to perform a hash-and-sign signature algorithm, you must
|
||||||
* first calculate the hash by calling psa_hash_setup(), psa_hash_update()
|
* first calculate the hash by calling psa_hash_setup(), psa_hash_update()
|
||||||
* and psa_hash_finish(). Then pass the resulting hash as the \p hash
|
* and psa_hash_finish(), or alternatively by calling psa_hash_compute().
|
||||||
|
* Then pass the resulting hash as the \p hash
|
||||||
* parameter to this function. You can use #PSA_ALG_SIGN_GET_HASH(\p alg)
|
* parameter to this function. You can use #PSA_ALG_SIGN_GET_HASH(\p alg)
|
||||||
* to determine the hash algorithm to use.
|
* to determine the hash algorithm to use.
|
||||||
*
|
*
|
||||||
|
@ -2869,7 +2899,8 @@ psa_status_t psa_sign_hash(mbedtls_svc_key_id_t key,
|
||||||
*
|
*
|
||||||
* Note that to perform a hash-and-sign signature algorithm, you must
|
* Note that to perform a hash-and-sign signature algorithm, you must
|
||||||
* first calculate the hash by calling psa_hash_setup(), psa_hash_update()
|
* first calculate the hash by calling psa_hash_setup(), psa_hash_update()
|
||||||
* and psa_hash_finish(). Then pass the resulting hash as the \p hash
|
* and psa_hash_finish(), or alternatively by calling psa_hash_compute().
|
||||||
|
* Then pass the resulting hash as the \p hash
|
||||||
* parameter to this function. You can use #PSA_ALG_SIGN_GET_HASH(\p alg)
|
* parameter to this function. You can use #PSA_ALG_SIGN_GET_HASH(\p alg)
|
||||||
* to determine the hash algorithm to use.
|
* to determine the hash algorithm to use.
|
||||||
*
|
*
|
||||||
|
@ -3443,7 +3474,8 @@ psa_status_t psa_key_derivation_output_bytes(
|
||||||
* state and must be aborted by calling psa_key_derivation_abort().
|
* state and must be aborted by calling psa_key_derivation_abort().
|
||||||
*
|
*
|
||||||
* How much output is produced and consumed from the operation, and how
|
* How much output is produced and consumed from the operation, and how
|
||||||
* the key is derived, depends on the key type:
|
* the key is derived, depends on the key type and on the key size
|
||||||
|
* (denoted \c bits below):
|
||||||
*
|
*
|
||||||
* - For key types for which the key is an arbitrary sequence of bytes
|
* - For key types for which the key is an arbitrary sequence of bytes
|
||||||
* of a given size, this function is functionally equivalent to
|
* of a given size, this function is functionally equivalent to
|
||||||
|
@ -3453,7 +3485,7 @@ psa_status_t psa_key_derivation_output_bytes(
|
||||||
* if the implementation provides an isolation boundary then
|
* if the implementation provides an isolation boundary then
|
||||||
* the key material is not exposed outside the isolation boundary.
|
* the key material is not exposed outside the isolation boundary.
|
||||||
* As a consequence, for these key types, this function always consumes
|
* As a consequence, for these key types, this function always consumes
|
||||||
* exactly (\p bits / 8) bytes from the operation.
|
* exactly (\c bits / 8) bytes from the operation.
|
||||||
* The following key types defined in this specification follow this scheme:
|
* The following key types defined in this specification follow this scheme:
|
||||||
*
|
*
|
||||||
* - #PSA_KEY_TYPE_AES;
|
* - #PSA_KEY_TYPE_AES;
|
||||||
|
@ -3474,8 +3506,8 @@ psa_status_t psa_key_derivation_output_bytes(
|
||||||
* string and process it as specified in RFC 7748 §5.
|
* string and process it as specified in RFC 7748 §5.
|
||||||
*
|
*
|
||||||
* - For key types for which the key is represented by a single sequence of
|
* - For key types for which the key is represented by a single sequence of
|
||||||
* \p bits bits with constraints as to which bit sequences are acceptable,
|
* \c bits bits with constraints as to which bit sequences are acceptable,
|
||||||
* this function draws a byte string of length (\p bits / 8) bytes rounded
|
* this function draws a byte string of length (\c bits / 8) bytes rounded
|
||||||
* up to the nearest whole number of bytes. If the resulting byte string
|
* up to the nearest whole number of bytes. If the resulting byte string
|
||||||
* is acceptable, it becomes the key, otherwise the drawn bytes are discarded.
|
* is acceptable, it becomes the key, otherwise the drawn bytes are discarded.
|
||||||
* This process is repeated until an acceptable byte string is drawn.
|
* This process is repeated until an acceptable byte string is drawn.
|
||||||
|
@ -3556,6 +3588,8 @@ psa_status_t psa_key_derivation_output_bytes(
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
||||||
|
* \retval #PSA_ERROR_DATA_INVALID
|
||||||
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
||||||
* \retval #PSA_ERROR_STORAGE_FAILURE
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
||||||
* \retval #PSA_ERROR_BAD_STATE
|
* \retval #PSA_ERROR_BAD_STATE
|
||||||
* The library has not been previously initialized by psa_crypto_init().
|
* The library has not been previously initialized by psa_crypto_init().
|
||||||
|
@ -3721,6 +3755,8 @@ psa_status_t psa_generate_random(uint8_t *output,
|
||||||
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_STORAGE
|
* \retval #PSA_ERROR_INSUFFICIENT_STORAGE
|
||||||
|
* \retval #PSA_ERROR_DATA_INVALID
|
||||||
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
||||||
* \retval #PSA_ERROR_STORAGE_FAILURE
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
||||||
* \retval #PSA_ERROR_BAD_STATE
|
* \retval #PSA_ERROR_BAD_STATE
|
||||||
* The library has not been previously initialized by psa_crypto_init().
|
* The library has not been previously initialized by psa_crypto_init().
|
||||||
|
|
144
include/psa/crypto_builtin.h
Normal file
144
include/psa/crypto_builtin.h
Normal file
|
@ -0,0 +1,144 @@
|
||||||
|
/*
|
||||||
|
* Context structure declaration of the Mbed TLS software-based PSA drivers
|
||||||
|
* called through the PSA Crypto driver dispatch layer.
|
||||||
|
*
|
||||||
|
* \note This file may not be included directly. Applications must
|
||||||
|
* include psa/crypto.h.
|
||||||
|
*
|
||||||
|
* \note This header and its content is not part of the Mbed TLS API and
|
||||||
|
* applications must not depend on it. Its main purpose is to define the
|
||||||
|
* multi-part state objects of the Mbed TLS software-based PSA drivers. The
|
||||||
|
* definition of these objects are then used by crypto_struct.h to define the
|
||||||
|
* implementation-defined types of PSA multi-part state objects.
|
||||||
|
*/
|
||||||
|
/*
|
||||||
|
* Copyright The Mbed TLS Contributors
|
||||||
|
* SPDX-License-Identifier: Apache-2.0
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
* not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef PSA_CRYPTO_BUILTIN_H
|
||||||
|
#define PSA_CRYPTO_BUILTIN_H
|
||||||
|
|
||||||
|
#include <psa/crypto_driver_common.h>
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Hash multi-part operation definitions.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "mbedtls/md2.h"
|
||||||
|
#include "mbedtls/md4.h"
|
||||||
|
#include "mbedtls/md5.h"
|
||||||
|
#include "mbedtls/ripemd160.h"
|
||||||
|
#include "mbedtls/sha1.h"
|
||||||
|
#include "mbedtls/sha256.h"
|
||||||
|
#include "mbedtls/sha512.h"
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_PSA_BUILTIN_ALG_MD2) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_MD4) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_MD5) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_RIPEMD160) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_1) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_224) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_256) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_384) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_SHA_512)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_HASH
|
||||||
|
#endif
|
||||||
|
|
||||||
|
typedef struct
|
||||||
|
{
|
||||||
|
psa_algorithm_t alg;
|
||||||
|
union
|
||||||
|
{
|
||||||
|
unsigned dummy; /* Make the union non-empty even with no supported algorithms. */
|
||||||
|
#if defined(MBEDTLS_MD2_C)
|
||||||
|
mbedtls_md2_context md2;
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_MD4_C)
|
||||||
|
mbedtls_md4_context md4;
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_MD5_C)
|
||||||
|
mbedtls_md5_context md5;
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_RIPEMD160_C)
|
||||||
|
mbedtls_ripemd160_context ripemd160;
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_SHA1_C)
|
||||||
|
mbedtls_sha1_context sha1;
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_SHA256_C)
|
||||||
|
mbedtls_sha256_context sha256;
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_SHA512_C)
|
||||||
|
mbedtls_sha512_context sha512;
|
||||||
|
#endif
|
||||||
|
} ctx;
|
||||||
|
} mbedtls_psa_hash_operation_t;
|
||||||
|
|
||||||
|
#define MBEDTLS_PSA_HASH_OPERATION_INIT {0, {0}}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Cipher multi-part operation definitions.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "mbedtls/cipher.h"
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_PSA_BUILTIN_ALG_STREAM_CIPHER) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_CTR) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_CFB) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_OFB) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_XTS) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_ECB_NO_PADDING) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_CBC_NO_PADDING) || \
|
||||||
|
defined(MBEDTLS_PSA_BUILTIN_ALG_CBC_PKCS7)
|
||||||
|
#define MBEDTLS_PSA_BUILTIN_CIPHER 1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
typedef struct {
|
||||||
|
/* Context structure for the Mbed TLS cipher implementation. */
|
||||||
|
psa_algorithm_t alg;
|
||||||
|
uint8_t iv_length;
|
||||||
|
uint8_t block_length;
|
||||||
|
mbedtls_cipher_context_t cipher;
|
||||||
|
} mbedtls_psa_cipher_operation_t;
|
||||||
|
|
||||||
|
#define MBEDTLS_PSA_CIPHER_OPERATION_INIT {0, 0, 0, {0}}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* BEYOND THIS POINT, TEST DRIVER DECLARATIONS ONLY.
|
||||||
|
*/
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
|
||||||
|
typedef mbedtls_psa_hash_operation_t mbedtls_transparent_test_driver_hash_operation_t;
|
||||||
|
|
||||||
|
#define MBEDTLS_TRANSPARENT_TEST_DRIVER_HASH_OPERATION_INIT MBEDTLS_PSA_HASH_OPERATION_INIT
|
||||||
|
|
||||||
|
typedef mbedtls_psa_cipher_operation_t
|
||||||
|
mbedtls_transparent_test_driver_cipher_operation_t;
|
||||||
|
|
||||||
|
typedef struct {
|
||||||
|
unsigned int initialised : 1;
|
||||||
|
mbedtls_transparent_test_driver_cipher_operation_t ctx;
|
||||||
|
} mbedtls_opaque_test_driver_cipher_operation_t;
|
||||||
|
|
||||||
|
#define MBEDTLS_TRANSPARENT_TEST_DRIVER_CIPHER_OPERATION_INIT \
|
||||||
|
MBEDTLS_PSA_CIPHER_OPERATION_INIT
|
||||||
|
|
||||||
|
#define MBEDTLS_OPAQUE_TEST_DRIVER_CIPHER_OPERATION_INIT \
|
||||||
|
{ 0, MBEDTLS_TRANSPARENT_TEST_DRIVER_CIPHER_OPERATION_INIT }
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_TEST */
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_BUILTIN_H */
|
|
@ -55,202 +55,6 @@ static inline int psa_key_handle_is_null( psa_key_handle_t handle )
|
||||||
return( mbedtls_svc_key_id_is_null( handle ) );
|
return( mbedtls_svc_key_id_is_null( handle ) );
|
||||||
}
|
}
|
||||||
|
|
||||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Mechanism for declaring deprecated values
|
|
||||||
*/
|
|
||||||
#if defined(MBEDTLS_DEPRECATED_WARNING) && !defined(MBEDTLS_PSA_DEPRECATED)
|
|
||||||
#define MBEDTLS_PSA_DEPRECATED __attribute__((deprecated))
|
|
||||||
#else
|
|
||||||
#define MBEDTLS_PSA_DEPRECATED
|
|
||||||
#endif
|
|
||||||
|
|
||||||
typedef MBEDTLS_PSA_DEPRECATED size_t mbedtls_deprecated_size_t;
|
|
||||||
typedef MBEDTLS_PSA_DEPRECATED psa_status_t mbedtls_deprecated_psa_status_t;
|
|
||||||
typedef MBEDTLS_PSA_DEPRECATED psa_key_usage_t mbedtls_deprecated_psa_key_usage_t;
|
|
||||||
typedef MBEDTLS_PSA_DEPRECATED psa_ecc_family_t mbedtls_deprecated_psa_ecc_family_t;
|
|
||||||
typedef MBEDTLS_PSA_DEPRECATED psa_dh_family_t mbedtls_deprecated_psa_dh_family_t;
|
|
||||||
typedef MBEDTLS_PSA_DEPRECATED psa_ecc_family_t psa_ecc_curve_t;
|
|
||||||
typedef MBEDTLS_PSA_DEPRECATED psa_dh_family_t psa_dh_group_t;
|
|
||||||
typedef MBEDTLS_PSA_DEPRECATED psa_algorithm_t mbedtls_deprecated_psa_algorithm_t;
|
|
||||||
|
|
||||||
#define PSA_KEY_TYPE_GET_CURVE PSA_KEY_TYPE_ECC_GET_FAMILY
|
|
||||||
#define PSA_KEY_TYPE_GET_GROUP PSA_KEY_TYPE_DH_GET_FAMILY
|
|
||||||
|
|
||||||
#define MBEDTLS_DEPRECATED_CONSTANT( type, value ) \
|
|
||||||
( (mbedtls_deprecated_##type) ( value ) )
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Deprecated PSA Crypto error code definitions (PSA Crypto API <= 1.0 beta2)
|
|
||||||
*/
|
|
||||||
#define PSA_ERROR_UNKNOWN_ERROR \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_status_t, PSA_ERROR_GENERIC_ERROR )
|
|
||||||
#define PSA_ERROR_OCCUPIED_SLOT \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_status_t, PSA_ERROR_ALREADY_EXISTS )
|
|
||||||
#define PSA_ERROR_EMPTY_SLOT \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_status_t, PSA_ERROR_DOES_NOT_EXIST )
|
|
||||||
#define PSA_ERROR_INSUFFICIENT_CAPACITY \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_status_t, PSA_ERROR_INSUFFICIENT_DATA )
|
|
||||||
#define PSA_ERROR_TAMPERING_DETECTED \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_status_t, PSA_ERROR_CORRUPTION_DETECTED )
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Deprecated PSA Crypto numerical encodings (PSA Crypto API <= 1.0 beta3)
|
|
||||||
*/
|
|
||||||
#define PSA_KEY_USAGE_SIGN \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_key_usage_t, PSA_KEY_USAGE_SIGN_HASH )
|
|
||||||
#define PSA_KEY_USAGE_VERIFY \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_key_usage_t, PSA_KEY_USAGE_VERIFY_HASH )
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Deprecated PSA Crypto size calculation macros (PSA Crypto API <= 1.0 beta3)
|
|
||||||
*/
|
|
||||||
#define PSA_ASYMMETRIC_SIGNATURE_MAX_SIZE \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( size_t, PSA_SIGNATURE_MAX_SIZE )
|
|
||||||
#define PSA_ASYMMETRIC_SIGN_OUTPUT_SIZE( key_type, key_bits, alg ) \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( size_t, PSA_SIGN_OUTPUT_SIZE( key_type, key_bits, alg ) )
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Deprecated PSA Crypto function names (PSA Crypto API <= 1.0 beta3)
|
|
||||||
*/
|
|
||||||
MBEDTLS_PSA_DEPRECATED static inline psa_status_t psa_asymmetric_sign( psa_key_handle_t key,
|
|
||||||
psa_algorithm_t alg,
|
|
||||||
const uint8_t *hash,
|
|
||||||
size_t hash_length,
|
|
||||||
uint8_t *signature,
|
|
||||||
size_t signature_size,
|
|
||||||
size_t *signature_length )
|
|
||||||
{
|
|
||||||
return psa_sign_hash( key, alg, hash, hash_length, signature, signature_size, signature_length );
|
|
||||||
}
|
|
||||||
|
|
||||||
MBEDTLS_PSA_DEPRECATED static inline psa_status_t psa_asymmetric_verify( psa_key_handle_t key,
|
|
||||||
psa_algorithm_t alg,
|
|
||||||
const uint8_t *hash,
|
|
||||||
size_t hash_length,
|
|
||||||
const uint8_t *signature,
|
|
||||||
size_t signature_length )
|
|
||||||
{
|
|
||||||
return psa_verify_hash( key, alg, hash, hash_length, signature, signature_length );
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Size-specific elliptic curve families.
|
|
||||||
*/
|
|
||||||
#define PSA_ECC_CURVE_SECP160K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP192K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP224K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP256K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP160R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP192R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP224R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP256R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP384R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP521R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP160R2 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_R2 )
|
|
||||||
#define PSA_ECC_CURVE_SECT163K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT233K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT239K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT283K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT409K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT571K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT163R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT193R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT233R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT283R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT409R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT571R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT163R2 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_R2 )
|
|
||||||
#define PSA_ECC_CURVE_SECT193R2 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_R2 )
|
|
||||||
#define PSA_ECC_CURVE_BRAINPOOL_P256R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_BRAINPOOL_P_R1 )
|
|
||||||
#define PSA_ECC_CURVE_BRAINPOOL_P384R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_BRAINPOOL_P_R1 )
|
|
||||||
#define PSA_ECC_CURVE_BRAINPOOL_P512R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_BRAINPOOL_P_R1 )
|
|
||||||
#define PSA_ECC_CURVE_CURVE25519 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_MONTGOMERY )
|
|
||||||
#define PSA_ECC_CURVE_CURVE448 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_MONTGOMERY )
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Curves that changed name due to PSA specification.
|
|
||||||
*/
|
|
||||||
#define PSA_ECC_CURVE_SECP_K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP_R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECP_R2 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECP_R2 )
|
|
||||||
#define PSA_ECC_CURVE_SECT_K1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_K1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT_R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_R1 )
|
|
||||||
#define PSA_ECC_CURVE_SECT_R2 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_SECT_R2 )
|
|
||||||
#define PSA_ECC_CURVE_BRAINPOOL_P_R1 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_BRAINPOOL_P_R1 )
|
|
||||||
#define PSA_ECC_CURVE_MONTGOMERY \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_ecc_family_t, PSA_ECC_FAMILY_MONTGOMERY )
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Finite-field Diffie-Hellman families.
|
|
||||||
*/
|
|
||||||
#define PSA_DH_GROUP_FFDHE2048 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_dh_family_t, PSA_DH_FAMILY_RFC7919 )
|
|
||||||
#define PSA_DH_GROUP_FFDHE3072 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_dh_family_t, PSA_DH_FAMILY_RFC7919 )
|
|
||||||
#define PSA_DH_GROUP_FFDHE4096 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_dh_family_t, PSA_DH_FAMILY_RFC7919 )
|
|
||||||
#define PSA_DH_GROUP_FFDHE6144 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_dh_family_t, PSA_DH_FAMILY_RFC7919 )
|
|
||||||
#define PSA_DH_GROUP_FFDHE8192 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_dh_family_t, PSA_DH_FAMILY_RFC7919 )
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Diffie-Hellman families that changed name due to PSA specification.
|
|
||||||
*/
|
|
||||||
#define PSA_DH_GROUP_RFC7919 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_dh_family_t, PSA_DH_FAMILY_RFC7919 )
|
|
||||||
#define PSA_DH_GROUP_CUSTOM \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_dh_family_t, PSA_DH_FAMILY_CUSTOM )
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Deprecated PSA Crypto stream cipher algorithms (PSA Crypto API <= 1.0 beta3)
|
|
||||||
*/
|
|
||||||
#define PSA_ALG_ARC4 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_algorithm_t, PSA_ALG_STREAM_CIPHER )
|
|
||||||
#define PSA_ALG_CHACHA20 \
|
|
||||||
MBEDTLS_DEPRECATED_CONSTANT( psa_algorithm_t, PSA_ALG_STREAM_CIPHER )
|
|
||||||
|
|
||||||
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
|
||||||
|
|
||||||
/** Open a handle to an existing persistent key.
|
/** Open a handle to an existing persistent key.
|
||||||
*
|
*
|
||||||
* Open a handle to a persistent key. A key is persistent if it was created
|
* Open a handle to a persistent key. A key is persistent if it was created
|
||||||
|
@ -293,9 +97,9 @@ MBEDTLS_PSA_DEPRECATED static inline psa_status_t psa_asymmetric_verify( psa_key
|
||||||
* number of open keys, the number of open key handles, or available
|
* number of open keys, the number of open key handles, or available
|
||||||
* memory.
|
* memory.
|
||||||
* \retval #PSA_ERROR_DOES_NOT_EXIST
|
* \retval #PSA_ERROR_DOES_NOT_EXIST
|
||||||
* There is no persistent key with key identifier \p id.
|
* There is no persistent key with key identifier \p key.
|
||||||
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
||||||
* \p id is not a valid persistent key identifier.
|
* \p key is not a valid persistent key identifier.
|
||||||
* \retval #PSA_ERROR_NOT_PERMITTED
|
* \retval #PSA_ERROR_NOT_PERMITTED
|
||||||
* The specified key exists, but the application does not have the
|
* The specified key exists, but the application does not have the
|
||||||
* permission to access it. Note that this specification does not
|
* permission to access it. Note that this specification does not
|
||||||
|
@ -304,6 +108,8 @@ MBEDTLS_PSA_DEPRECATED static inline psa_status_t psa_asymmetric_verify( psa_key
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
||||||
* \retval #PSA_ERROR_STORAGE_FAILURE
|
* \retval #PSA_ERROR_STORAGE_FAILURE
|
||||||
|
* \retval #PSA_ERROR_DATA_INVALID
|
||||||
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
||||||
* \retval #PSA_ERROR_BAD_STATE
|
* \retval #PSA_ERROR_BAD_STATE
|
||||||
* The library has not been previously initialized by psa_crypto_init().
|
* The library has not been previously initialized by psa_crypto_init().
|
||||||
* It is implementation-dependent whether a failure to initialize
|
* It is implementation-dependent whether a failure to initialize
|
||||||
|
|
|
@ -50,14 +50,28 @@
|
||||||
#ifndef PSA_CRYPTO_CONFIG_H
|
#ifndef PSA_CRYPTO_CONFIG_H
|
||||||
#define PSA_CRYPTO_CONFIG_H
|
#define PSA_CRYPTO_CONFIG_H
|
||||||
|
|
||||||
|
/*
|
||||||
|
* CBC-MAC is not yet supported via the PSA API in Mbed TLS.
|
||||||
|
*/
|
||||||
|
//#define PSA_WANT_ALG_CBC_MAC 1
|
||||||
|
#define PSA_WANT_ALG_CBC_NO_PADDING 1
|
||||||
|
#define PSA_WANT_ALG_CBC_PKCS7 1
|
||||||
|
#define PSA_WANT_ALG_CCM 1
|
||||||
|
#define PSA_WANT_ALG_CFB 1
|
||||||
|
#define PSA_WANT_ALG_CHACHA20_POLY1305 1
|
||||||
|
#define PSA_WANT_ALG_CMAC 1
|
||||||
|
#define PSA_WANT_ALG_CTR 1
|
||||||
#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
|
#define PSA_WANT_ALG_DETERMINISTIC_ECDSA 1
|
||||||
|
#define PSA_WANT_ALG_ECB_NO_PADDING 1
|
||||||
#define PSA_WANT_ALG_ECDH 1
|
#define PSA_WANT_ALG_ECDH 1
|
||||||
#define PSA_WANT_ALG_ECDSA 1
|
#define PSA_WANT_ALG_ECDSA 1
|
||||||
|
#define PSA_WANT_ALG_GCM 1
|
||||||
#define PSA_WANT_ALG_HKDF 1
|
#define PSA_WANT_ALG_HKDF 1
|
||||||
#define PSA_WANT_ALG_HMAC 1
|
#define PSA_WANT_ALG_HMAC 1
|
||||||
#define PSA_WANT_ALG_MD2 1
|
#define PSA_WANT_ALG_MD2 1
|
||||||
#define PSA_WANT_ALG_MD4 1
|
#define PSA_WANT_ALG_MD4 1
|
||||||
#define PSA_WANT_ALG_MD5 1
|
#define PSA_WANT_ALG_MD5 1
|
||||||
|
#define PSA_WANT_ALG_OFB 1
|
||||||
#define PSA_WANT_ALG_RIPEMD160 1
|
#define PSA_WANT_ALG_RIPEMD160 1
|
||||||
#define PSA_WANT_ALG_RSA_OAEP 1
|
#define PSA_WANT_ALG_RSA_OAEP 1
|
||||||
#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
|
#define PSA_WANT_ALG_RSA_PKCS1V15_CRYPT 1
|
||||||
|
@ -68,10 +82,45 @@
|
||||||
#define PSA_WANT_ALG_SHA_256 1
|
#define PSA_WANT_ALG_SHA_256 1
|
||||||
#define PSA_WANT_ALG_SHA_384 1
|
#define PSA_WANT_ALG_SHA_384 1
|
||||||
#define PSA_WANT_ALG_SHA_512 1
|
#define PSA_WANT_ALG_SHA_512 1
|
||||||
|
#define PSA_WANT_ALG_STREAM_CIPHER 1
|
||||||
#define PSA_WANT_ALG_TLS12_PRF 1
|
#define PSA_WANT_ALG_TLS12_PRF 1
|
||||||
#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
|
#define PSA_WANT_ALG_TLS12_PSK_TO_MS 1
|
||||||
|
#define PSA_WANT_ALG_XTS 1
|
||||||
|
|
||||||
|
#define PSA_WANT_ECC_BRAINPOOL_P_R1_256 1
|
||||||
|
#define PSA_WANT_ECC_BRAINPOOL_P_R1_384 1
|
||||||
|
#define PSA_WANT_ECC_BRAINPOOL_P_R1_512 1
|
||||||
|
#define PSA_WANT_ECC_MONTGOMERY_255 1
|
||||||
|
/*
|
||||||
|
* Curve448 is not yet supported via the PSA API in Mbed TLS
|
||||||
|
* (https://github.com/ARMmbed/mbedtls/issues/4249). Thus, do not enable it by
|
||||||
|
* default.
|
||||||
|
*/
|
||||||
|
//#define PSA_WANT_ECC_MONTGOMERY_448 1
|
||||||
|
#define PSA_WANT_ECC_SECP_K1_192 1
|
||||||
|
/*
|
||||||
|
* SECP224K1 is buggy via the PSA API in Mbed TLS
|
||||||
|
* (https://github.com/ARMmbed/mbedtls/issues/3541). Thus, do not enable it by
|
||||||
|
* default.
|
||||||
|
*/
|
||||||
|
//#define PSA_WANT_ECC_SECP_K1_224 1
|
||||||
|
#define PSA_WANT_ECC_SECP_K1_256 1
|
||||||
|
#define PSA_WANT_ECC_SECP_R1_192 1
|
||||||
|
#define PSA_WANT_ECC_SECP_R1_224 1
|
||||||
|
#define PSA_WANT_ECC_SECP_R1_256 1
|
||||||
|
#define PSA_WANT_ECC_SECP_R1_384 1
|
||||||
|
#define PSA_WANT_ECC_SECP_R1_521 1
|
||||||
|
|
||||||
|
#define PSA_WANT_KEY_TYPE_DERIVE 1
|
||||||
|
#define PSA_WANT_KEY_TYPE_HMAC 1
|
||||||
|
#define PSA_WANT_KEY_TYPE_AES 1
|
||||||
|
#define PSA_WANT_KEY_TYPE_ARC4 1
|
||||||
|
#define PSA_WANT_KEY_TYPE_CAMELLIA 1
|
||||||
|
#define PSA_WANT_KEY_TYPE_CHACHA20 1
|
||||||
|
#define PSA_WANT_KEY_TYPE_DES 1
|
||||||
#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
|
#define PSA_WANT_KEY_TYPE_ECC_KEY_PAIR 1
|
||||||
#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
|
#define PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY 1
|
||||||
|
#define PSA_WANT_KEY_TYPE_RAW_DATA 1
|
||||||
#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
|
#define PSA_WANT_KEY_TYPE_RSA_KEY_PAIR 1
|
||||||
#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
|
#define PSA_WANT_KEY_TYPE_RSA_PUBLIC_KEY 1
|
||||||
|
|
||||||
|
|
69
include/psa/crypto_driver_contexts.h
Normal file
69
include/psa/crypto_driver_contexts.h
Normal file
|
@ -0,0 +1,69 @@
|
||||||
|
/*
|
||||||
|
* Declaration of context structures for use with the PSA driver wrapper
|
||||||
|
* interface.
|
||||||
|
*
|
||||||
|
* Warning: This file will be auto-generated in the future.
|
||||||
|
*
|
||||||
|
* \note This file may not be included directly. Applications must
|
||||||
|
* include psa/crypto.h.
|
||||||
|
*
|
||||||
|
* \note This header and its content is not part of the Mbed TLS API and
|
||||||
|
* applications must not depend on it. Its main purpose is to define the
|
||||||
|
* multi-part state objects of the PSA drivers included in the cryptographic
|
||||||
|
* library. The definition of these objects are then used by crypto_struct.h
|
||||||
|
* to define the implementation-defined types of PSA multi-part state objects.
|
||||||
|
*/
|
||||||
|
/* Copyright The Mbed TLS Contributors
|
||||||
|
* SPDX-License-Identifier: Apache-2.0
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
* not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef PSA_CRYPTO_DRIVER_CONTEXTS_H
|
||||||
|
#define PSA_CRYPTO_DRIVER_CONTEXTS_H
|
||||||
|
|
||||||
|
#include "psa/crypto.h"
|
||||||
|
#include "psa/crypto_driver_common.h"
|
||||||
|
|
||||||
|
/* Include the context structure definitions for those drivers that were
|
||||||
|
* declared during the autogeneration process. */
|
||||||
|
|
||||||
|
/* Include the context structure definitions for the Mbed TLS software drivers */
|
||||||
|
#include "psa/crypto_builtin.h"
|
||||||
|
|
||||||
|
/* Define the context to be used for an operation that is executed through the
|
||||||
|
* PSA Driver wrapper layer as the union of all possible driver's contexts.
|
||||||
|
*
|
||||||
|
* The union members are the driver's context structures, and the member names
|
||||||
|
* are formatted as `'drivername'_ctx`. This allows for procedural generation
|
||||||
|
* of both this file and the content of psa_crypto_driver_wrappers.c */
|
||||||
|
|
||||||
|
typedef union {
|
||||||
|
unsigned dummy; /* Make sure this union is always non-empty */
|
||||||
|
mbedtls_psa_hash_operation_t mbedtls_ctx;
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
mbedtls_transparent_test_driver_hash_operation_t test_driver_ctx;
|
||||||
|
#endif
|
||||||
|
} psa_driver_hash_context_t;
|
||||||
|
|
||||||
|
typedef union {
|
||||||
|
unsigned dummy; /* Make sure this union is always non-empty */
|
||||||
|
mbedtls_psa_cipher_operation_t mbedtls_ctx;
|
||||||
|
#if defined(PSA_CRYPTO_DRIVER_TEST)
|
||||||
|
mbedtls_transparent_test_driver_cipher_operation_t transparent_test_driver_ctx;
|
||||||
|
mbedtls_opaque_test_driver_cipher_operation_t opaque_test_driver_ctx;
|
||||||
|
#endif
|
||||||
|
} psa_driver_cipher_context_t;
|
||||||
|
|
||||||
|
#endif /* PSA_CRYPTO_DRIVER_CONTEXTS_H */
|
||||||
|
/* End of automatically generated file. */
|
|
@ -39,6 +39,10 @@ extern "C" {
|
||||||
/* UID for secure storage seed */
|
/* UID for secure storage seed */
|
||||||
#define PSA_CRYPTO_ITS_RANDOM_SEED_UID 0xFFFFFF52
|
#define PSA_CRYPTO_ITS_RANDOM_SEED_UID 0xFFFFFF52
|
||||||
|
|
||||||
|
/* See config.h for definition */
|
||||||
|
#if !defined(MBEDTLS_PSA_KEY_SLOT_COUNT)
|
||||||
|
#define MBEDTLS_PSA_KEY_SLOT_COUNT 32
|
||||||
|
#endif
|
||||||
|
|
||||||
/** \addtogroup attributes
|
/** \addtogroup attributes
|
||||||
* @{
|
* @{
|
||||||
|
@ -175,6 +179,9 @@ static inline void psa_clear_key_slot_number(
|
||||||
* The secure element driver for the specified lifetime does not
|
* The secure element driver for the specified lifetime does not
|
||||||
* support registering a key.
|
* support registering a key.
|
||||||
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
* The identifier in \p attributes is invalid, namely the identifier is
|
||||||
|
* not in the user range.
|
||||||
|
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
||||||
* \p attributes specifies a lifetime which is not located
|
* \p attributes specifies a lifetime which is not located
|
||||||
* in a secure element.
|
* in a secure element.
|
||||||
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
* \retval #PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
@ -183,8 +190,10 @@ static inline void psa_clear_key_slot_number(
|
||||||
* \retval #PSA_ERROR_NOT_PERMITTED
|
* \retval #PSA_ERROR_NOT_PERMITTED
|
||||||
* The caller is not authorized to register the specified key slot.
|
* The caller is not authorized to register the specified key slot.
|
||||||
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \retval #PSA_ERROR_INSUFFICIENT_MEMORY
|
||||||
|
* \retval #PSA_ERROR_INSUFFICIENT_STORAGE
|
||||||
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
* \retval #PSA_ERROR_COMMUNICATION_FAILURE
|
||||||
* \retval #PSA_ERROR_HARDWARE_FAILURE
|
* \retval #PSA_ERROR_DATA_INVALID
|
||||||
|
* \retval #PSA_ERROR_DATA_CORRUPT
|
||||||
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
* \retval #PSA_ERROR_CORRUPTION_DETECTED
|
||||||
* \retval #PSA_ERROR_BAD_STATE
|
* \retval #PSA_ERROR_BAD_STATE
|
||||||
* The library has not been previously initialized by psa_crypto_init().
|
* The library has not been previously initialized by psa_crypto_init().
|
||||||
|
@ -297,8 +306,10 @@ void mbedtls_psa_get_stats( mbedtls_psa_stats_t *stats );
|
||||||
* \param[in] seed Buffer containing the seed value to inject.
|
* \param[in] seed Buffer containing the seed value to inject.
|
||||||
* \param[in] seed_size Size of the \p seed buffer.
|
* \param[in] seed_size Size of the \p seed buffer.
|
||||||
* The size of the seed in bytes must be greater
|
* The size of the seed in bytes must be greater
|
||||||
* or equal to both #MBEDTLS_ENTROPY_MIN_PLATFORM
|
* or equal to both #MBEDTLS_ENTROPY_BLOCK_SIZE
|
||||||
* and #MBEDTLS_ENTROPY_BLOCK_SIZE.
|
* and the value of \c MBEDTLS_ENTROPY_MIN_PLATFORM
|
||||||
|
* in `library/entropy_poll.h` in the Mbed TLS source
|
||||||
|
* code.
|
||||||
* It must be less or equal to
|
* It must be less or equal to
|
||||||
* #MBEDTLS_ENTROPY_MAX_SEED_SIZE.
|
* #MBEDTLS_ENTROPY_MAX_SEED_SIZE.
|
||||||
*
|
*
|
||||||
|
@ -401,10 +412,9 @@ psa_status_t mbedtls_psa_inject_entropy(const uint8_t *seed,
|
||||||
|
|
||||||
/* We need to expand the sample definition of this macro from
|
/* We need to expand the sample definition of this macro from
|
||||||
* the API definition. */
|
* the API definition. */
|
||||||
#undef PSA_ALG_IS_HASH_AND_SIGN
|
#undef PSA_ALG_IS_VENDOR_HASH_AND_SIGN
|
||||||
#define PSA_ALG_IS_HASH_AND_SIGN(alg) \
|
#define PSA_ALG_IS_VENDOR_HASH_AND_SIGN(alg) \
|
||||||
(PSA_ALG_IS_RSA_PSS(alg) || PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) || \
|
PSA_ALG_IS_DSA(alg)
|
||||||
PSA_ALG_IS_DSA(alg) || PSA_ALG_IS_ECDSA(alg))
|
|
||||||
|
|
||||||
/**@}*/
|
/**@}*/
|
||||||
|
|
||||||
|
@ -635,16 +645,21 @@ static inline psa_ecc_family_t mbedtls_ecc_group_to_psa( mbedtls_ecp_group_id gr
|
||||||
*
|
*
|
||||||
* \param curve A PSA elliptic curve identifier
|
* \param curve A PSA elliptic curve identifier
|
||||||
* (`PSA_ECC_FAMILY_xxx`).
|
* (`PSA_ECC_FAMILY_xxx`).
|
||||||
* \param byte_length The byte-length of a private key on \p curve.
|
* \param bits The bit-length of a private key on \p curve.
|
||||||
|
* \param bits_is_sloppy If true, \p bits may be the bit-length rounded up
|
||||||
|
* to the nearest multiple of 8. This allows the caller
|
||||||
|
* to infer the exact curve from the length of a key
|
||||||
|
* which is supplied as a byte string.
|
||||||
*
|
*
|
||||||
* \return The corresponding Mbed TLS elliptic curve identifier
|
* \return The corresponding Mbed TLS elliptic curve identifier
|
||||||
* (`MBEDTLS_ECP_DP_xxx`).
|
* (`MBEDTLS_ECP_DP_xxx`).
|
||||||
* \return #MBEDTLS_ECP_DP_NONE if \c curve is not recognized.
|
* \return #MBEDTLS_ECP_DP_NONE if \c curve is not recognized.
|
||||||
* \return #MBEDTLS_ECP_DP_NONE if \p byte_length is not
|
* \return #MBEDTLS_ECP_DP_NONE if \p bits is not
|
||||||
* correct for \p curve.
|
* correct for \p curve.
|
||||||
*/
|
*/
|
||||||
mbedtls_ecp_group_id mbedtls_ecc_group_of_psa( psa_ecc_family_t curve,
|
mbedtls_ecp_group_id mbedtls_ecc_group_of_psa( psa_ecc_family_t curve,
|
||||||
size_t byte_length );
|
size_t bits,
|
||||||
|
int bits_is_sloppy );
|
||||||
#endif /* MBEDTLS_ECP_C */
|
#endif /* MBEDTLS_ECP_C */
|
||||||
|
|
||||||
/**@}*/
|
/**@}*/
|
||||||
|
|
|
@ -1061,7 +1061,8 @@ typedef psa_status_t (*psa_drv_se_export_key_t)(psa_drv_se_context_t *drv_contex
|
||||||
* \brief A function that generates a symmetric or asymmetric key on a secure
|
* \brief A function that generates a symmetric or asymmetric key on a secure
|
||||||
* element
|
* element
|
||||||
*
|
*
|
||||||
* If \p type is asymmetric (#PSA_KEY_TYPE_IS_ASYMMETRIC(\p type) = 1),
|
* If the key type \c type recorded in \p attributes
|
||||||
|
* is asymmetric (#PSA_KEY_TYPE_IS_ASYMMETRIC(\c type) = 1),
|
||||||
* the driver may export the public key at the time of generation,
|
* the driver may export the public key at the time of generation,
|
||||||
* in the format documented for psa_export_public_key() by writing it
|
* in the format documented for psa_export_public_key() by writing it
|
||||||
* to the \p pubkey buffer.
|
* to the \p pubkey buffer.
|
||||||
|
@ -1364,20 +1365,22 @@ typedef struct {
|
||||||
*
|
*
|
||||||
* \return #PSA_SUCCESS
|
* \return #PSA_SUCCESS
|
||||||
* The driver was successfully registered. Applications can now
|
* The driver was successfully registered. Applications can now
|
||||||
* use \p lifetime to access keys through the methods passed to
|
* use \p location to access keys through the methods passed to
|
||||||
* this function.
|
* this function.
|
||||||
* \return #PSA_ERROR_BAD_STATE
|
* \return #PSA_ERROR_BAD_STATE
|
||||||
* This function was called after the initialization of the
|
* This function was called after the initialization of the
|
||||||
* cryptography module, and this implementation does not support
|
* cryptography module, and this implementation does not support
|
||||||
* driver registration at this stage.
|
* driver registration at this stage.
|
||||||
* \return #PSA_ERROR_ALREADY_EXISTS
|
* \return #PSA_ERROR_ALREADY_EXISTS
|
||||||
* There is already a registered driver for this value of \p lifetime.
|
* There is already a registered driver for this value of \p location.
|
||||||
* \return #PSA_ERROR_INVALID_ARGUMENT
|
* \return #PSA_ERROR_INVALID_ARGUMENT
|
||||||
* \p lifetime is a reserved value.
|
* \p location is a reserved value.
|
||||||
* \return #PSA_ERROR_NOT_SUPPORTED
|
* \return #PSA_ERROR_NOT_SUPPORTED
|
||||||
* `methods->hal_version` is not supported by this implementation.
|
* `methods->hal_version` is not supported by this implementation.
|
||||||
* \return #PSA_ERROR_INSUFFICIENT_MEMORY
|
* \return #PSA_ERROR_INSUFFICIENT_MEMORY
|
||||||
* \return #PSA_ERROR_NOT_PERMITTED
|
* \return #PSA_ERROR_NOT_PERMITTED
|
||||||
|
* \return #PSA_ERROR_STORAGE_FAILURE
|
||||||
|
* \return #PSA_ERROR_DATA_CORRUPT
|
||||||
*/
|
*/
|
||||||
psa_status_t psa_register_se_driver(
|
psa_status_t psa_register_se_driver(
|
||||||
psa_key_location_t location,
|
psa_key_location_t location,
|
||||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue