Ivan Grokhotkov
71b5ce55d3
Merge branch 'feature/mbedtls_2_13_1' into 'master'
...
mbedtls: update to 2.13.1
See merge request idf/esp-idf!3301
2018-09-27 14:15:25 +08:00
Angus Gratton
96cd3b75cd
Merge branch 'feature/mbedtls_mem_alloc_options' into 'master'
...
mbedtls: configurable options for controlling dynamic memory allocations
See merge request idf/esp-idf!3343
2018-09-25 08:24:29 +08:00
Sagar Bijwe
48fccbf5dd
nvs_flash: Add support for nvs encryption
2018-09-24 11:25:21 +05:30
Mahavir Jain
54382277b6
mbedtls: configurable options for controlling dynamic memory allocations
...
Modifies https://github.com/espressif/esp-idf/pull/2237
2018-09-24 11:17:48 +05:30
Ivan Grokhotkov
9188cb066a
mbedtls: update to 2.13.1
...
See release notes:
https://github.com/ARMmbed/mbedtls/releases/tag/mbedtls-2.13.0
2018-09-20 04:35:45 +00:00
Sagar Bijwe
112244bac4
wpa_supplicant: Implement BIGNUM and ECC crypto wrapper apis for ESP using mbedtls
2018-09-19 11:10:28 +05:30
Renz Christian Bagaporo
d9939cedd9
cmake: make main a component again
2018-09-11 09:44:12 +08:00
Angus Gratton
b355854d4d
Merge branch 'master' into feature/cmake
2018-09-05 10:35:04 +08:00
Angus Gratton
83a179abb0
esp32: Add esp_fill_random() function
...
Convenience function to fill a buffer with random bytes.
Add some unit tests (only sanity checks, really.)
2018-09-03 04:39:45 +00:00
Angus Gratton
a9c4ed7139
Merge branch 'master' into feature/cmake
2018-08-30 18:51:01 +08:00
Angus Gratton
961f59ff57
mbedtls: Don't unnecessarily grow the result of a hardware bignum operation
...
Avoids growing the result of hardware bignum operations
(particularly for multiplication)
Fixes bugs where some Elliptic Curve operations fail or corrupt memory,
as they assume length of the number is never greater than the number of
non-zero limbs.
Includes some general refactoring to standardize terminology.
Closes https://github.com/espressif/esp-idf/issues/1556
Fixes TW12984
Adds test cases for both these issues.
2018-08-28 09:08:43 +00:00
Angus Gratton
ff2404a272
Merge branch 'master' into feature/cmake
2018-08-16 17:14:17 +10:00
Ivan Grokhotkov
98255f4225
Merge branch 'feature/mbedtls_2_12_0' into 'master'
...
mbedtls: update to 2.12.0
See merge request idf/esp-idf!2879
2018-08-01 14:56:50 +08:00
Jason von Nieda
d7a17ac941
Adds a Kconfig option for mbedtls' MBEDTLS_PLATFORM_MEMORY define. This makes it possible to override the mbedtls allocator with your own.
...
Merges https://github.com/espressif/esp-idf/pull/2237
2018-08-01 11:28:28 +10:00
Ivan Grokhotkov
5b9feaa1fd
mbedtls: update to 2.12.0
2018-07-30 09:11:16 +03:00
Alexey Gerenkov
c2dc09304c
gcc8_newlib3: Compilation warnings and errors not specific to newlib v3
2018-07-09 13:22:24 +03:00
Angus Gratton
6b9784cc45
Merge branch 'master' into feature/cmake_update
2018-05-31 14:46:23 +10:00
Angus Gratton
f4f305bdbd
Merge branch 'bugfix/mbedtls_submodule' into 'master'
...
mbedtls: Add submodule check at build time
See merge request idf/esp-idf!2395
2018-05-16 19:52:45 +08:00
Konstantin Kondrashov
8f80cc733d
soc: Change DPORT access
...
When two CPUs read the area of the DPORT and the area of the APB, the result is corrupted for the CPU that read the APB area.
And another CPU has valid data.
The method of eliminating this error.
Before reading the registers of the DPORT, make a preliminary reading of the APB register.
In this case, the joint access of the two CPUs to the registers of the APB and the DPORT is successful.
2018-05-14 17:54:57 +05:00
Angus Gratton
c94a5ecfdd
mbedtls: Add mbedtls submodule check to build system
2018-05-14 16:07:18 +08:00
Ivan Grokhotkov
7dada45d60
mbedtls: enable deprecation warnings when building unit tests
2018-05-09 23:15:28 +08:00
Ivan Grokhotkov
dbc919eff5
mbedtls: update usage of mbedtls_aes_encrypt/decrypt
2018-05-09 23:15:28 +08:00
Ivan Grokhotkov
aad51ea8a0
mbedtls/port: don’t re-declare mbedtls_shaX functions
...
ALT header files for sha1, sha256, sha512 are only supposed to declare
mbedtls_sha1_context data structure. Function prototypes should come
from original header files.
2018-05-09 23:15:28 +08:00
Ivan Grokhotkov
254e29aca4
mbedtls: update usage of deprecated mbedtls_shaX APIs
...
The following mbedTLS APIs have been deprecated and replaced with the
new ones which return error codes:
mbedtls_shaX_starts -> mbedtls_shaX_starts_ret
mbedtls_shaX_update -> mbedtls_shaX_update_ret
mbedtls_shaX_finish -> mbedtls_shaX_finish_ret
mbedtls_shaX_process -> mbedtls_shaX_internal_process
Update hardware implementations of SHA functions, and other IDF
components which used above functions, to use new versions.
2018-05-09 23:15:28 +08:00
Ivan Grokhotkov
e9cbf96bd1
mbedtls: re-add version 2.9.0 as a submodule
2018-05-09 23:15:28 +08:00
Angus Gratton
1cb5712463
cmake: Add component dependency support
...
Components should set the COMPONENT_REQUIRES & COMPONENT_PRIVATE_REQUIRES variables to define their
requirements.
2018-04-30 09:59:20 +10:00
Angus Gratton
88df8fd293
cmake: Use cmake_lint project, tidy up all CMake source files
2018-04-30 09:59:20 +10:00
Angus Gratton
ce6748873d
cmake: Add embedding files in components support
...
Add subscribe_publish AWS example and fixes to allow it to build.
2018-04-30 09:59:20 +10:00
Angus Gratton
c671a0c3eb
build system: Initial cmake support, work in progress
2018-04-30 09:59:20 +10:00
Paul Reimer
8a47679d04
Add #include guards and __cplusplus guards to esp_debug.h
...
Merges https://github.com/espressif/esp-idf/pull/1358
2017-12-07 10:25:57 +11:00
Ivan Grokhotkov
744896bde2
Merge branch 'bugfix/hardware_mpi_sign' into 'master'
...
hwcrypto mpi: Fix losing sign when multiplying by -1 (github PR)
Contribution from github: https://github.com/espressif/esp-idf/pull/1181/
See merge request !1471
2017-11-07 19:30:31 +08:00
Alexey Skalozub
5405255928
Fix losing sign when multiplying by -1
2017-10-28 03:47:00 +03:00
Andreas Pokorny
2a1906cf50
Ensure that C++ and C compilers get the same preprocessor setup
...
CPPFLAGS is applied for both languages while CFLAGS only for C
Signed-off-by: Andreas Pokorny <andreas.pokorny@siemens.com>
2017-10-26 13:04:41 +02:00
Angus Gratton
c503a01388
mbedtls: Rename net to net_sockets (in line with 2.4.0 API change)
2017-09-07 18:02:39 +10:00
Angus Gratton
3a08ec7b3d
mbedtls: Re-apply: MBEDTLS_SHA512_ALT also replaces mbedtls_sha512_process()
...
IDF-specific patch.
2017-09-07 18:02:26 +10:00
Angus Gratton
3142997830
mbedtls: Re-apply ECP memory leak fix
...
Fix not yet submitted upstream.
(Previously applied in ffefeef5ea
)
2017-09-07 18:02:26 +10:00
Angus Gratton
736db688a8
mbedtls: Re-apply MBEDTLS_BIGNUM_ALT & related macros for custom bignum functions
...
(IDF-specific patch.)
2017-09-07 18:02:26 +10:00
Angus Gratton
ae382b3bfa
mbedtls: Update to 2.6.0 release (without IDF-specific patches)
2017-09-07 18:02:26 +10:00
Angus Gratton
8ce09c2c1c
mbedtls: Don't assign ctx->fd until connect() or bind() has succeeded
...
Avoid leaking closed file descriptors via ctx->fd
Reported: https://esp32.com/viewtopic.php?f=13&t=2910&sid=8568b1fd93a4c8d5760628a638efc48b#p13620
2017-09-05 11:08:35 +10:00
Angus Gratton
0ea4cd67dd
mbedtls: Remove "unsafe" warning, enable AES by default & make SHA/MPI optional
2017-08-25 16:08:03 +10:00
Angus Gratton
2624e10055
esp32 hwcrypto: Use AES registers directly
2017-08-25 16:08:03 +10:00
Angus Gratton
99c663a6e9
mbedtls tests: utility tests for APB corruption
...
Used when running mbedTLS self-tests to verify DPORT protection is working correctly.
2017-08-25 16:08:03 +10:00
Angus Gratton
7be002ec0f
hwcrypto bignum/MPI: Batch safe DPORT reads to improve performance
2017-08-25 16:08:02 +10:00
Ivan Grokhotkov
08287852ab
esp32: add protection for DPORT registers of RSA
2017-08-25 16:08:02 +10:00
Ivan Grokhotkov
87a0ec77b5
Merge branch 'bugfix/mbedtls_config_mismatch' into 'master'
...
mbedtls: Add a shim header to account for including "mbedtls/config.h" directly in program
See merge request !1125
2017-08-24 14:40:39 +08:00
Ivan Grokhotkov
08e787dc4d
mbedtls: remove duplicate Kconfig options
2017-08-22 15:12:35 +08:00
Angus Gratton
2c0ff0c1e1
mbedtls: Add a shim header to account for including "mbedtls/config.h" directly in program
...
Previously this resulted in a config mismatch between default config and esp_config.h
Closes https://github.com/espressif/esp-idf/issues/711
2017-08-21 12:37:53 +10:00
Angus Gratton
66ad84d318
mbedtls: Add more config options to disable Elliptic Curve features
...
Can save up to an additional 20KB when not using EC in TLS, or disable
unwanted features as needed.
2017-08-18 17:44:33 +10:00
Angus Gratton
c0f65f6680
mbedtls: Expose compile-time config, disable some things by default
...
* Disables 3DES, Camellia, Blowfish, RC4, RIPEMD160, SSLv3, TLS-PSK modes, DTLS by default
* Saves about 40KB from the default TLS client code size
* Defaults no longer get "Bad" howsmyssl.com rating (no more vulnerable 3DES)
(ping https://github.com/espressif/arduino-esp32/issues/575 )
* Allows up to another 20-30KB code size to be trimmed without security
implications if using DER formatted certificates, RSA ciphersuites only,
etc.
* Can save up to another 8KB by setting the TLS Role to Server or Client only.
2017-08-18 17:15:08 +10:00
Angus Gratton
ffefeef5ea
mbedtls: Fix memory leak in initial ECDH exchange if OOM/failure occurs
...
In ecp_mul_comb(), if (!p_eq_g && grp->T == NULL) and ecp_precompute_comb() fails (which can happen due to OOM), then the new array of points T was leaked.
2017-07-12 16:34:26 +08:00