Richard Allen 
							
						 
					 
					
						
						
							
						
						f45c9f14c3 
					 
					
						
						
							
							change(mbedtls/port): optimize gcm_mult()  
						
						... 
						
						
						
						1) pre-shift GCM last4 to use 32-bit shift
On 32-bit architectures like Aarch32, RV32, Xtensa,
shifting a 64-bit variable by 32-bits is free,
since it changes the register representing half of the 64-bit var.
Pre-shift the last4 array to take advantage of this.
2) unroll first GCM iteration
The first loop of gcm_mult() is different from
the others. By unrolling it separately from the
others, the other iterations may take advantage
of the zero-overhead loop construct, in addition
to saving a conditional branch in the loop. 
						
						
					 
					
						2024-08-21 18:26:31 +05:30 
						 
				 
			
				
					
						
							
							
								harshal.patil 
							
						 
					 
					
						
						
							
						
						2c85399da0 
					 
					
						
						
							
							fix(mbedtls/gcm): Add support for software fallback for non-AES ciphers in a GCM operation  
						
						... 
						
						
						
						- Even if the config MBEDTLS_HARDWARE_AES is enabled, we now support fallback
to software implementation of GCM operations when non-AES ciphers are used. 
						
						
					 
					
						2024-03-12 13:35:49 +05:30 
						 
				 
			
				
					
						
							
							
								harshal.patil 
							
						 
					 
					
						
						
							
						
						85e18aa755 
					 
					
						
						
							
							fix(mbedtls/gcm): Avoid using GCM hardware when config MBEDTLS_HARDWARE_GCM is disabled  
						
						
						
						
					 
					
						2024-02-16 11:55:02 +05:30 
						 
				 
			
				
					
						
							
							
								harshal.patil 
							
						 
					 
					
						
						
							
						
						e8a5d9ef98 
					 
					
						
						
							
							fix(mbedtls/aes): fix AES interrupt allocation for AES-GCM operations  
						
						
						
						
					 
					
						2023-12-11 06:46:24 +00:00 
						 
				 
			
				
					
						
							
							
								harshal.patil 
							
						 
					 
					
						
						
							
						
						895d86621b 
					 
					
						
						
							
							fix(mbedtls): Fixed the transmission of return values of the esp-aes APIs  
						
						... 
						
						
						
						- Earlier, some intermediate return values were not stored and returned,
thus incorrect return values used to get transmitted to the upper layer of APIs.
- Also, zeroised the output buffer in case of error condition. 
						
						
					 
					
						2023-07-14 14:20:47 +05:30 
						 
				 
			
				
					
						
							
							
								harshal.patil 
							
						 
					 
					
						
						
							
						
						270ff95022 
					 
					
						
						
							
							mbedtls/port: refactor sanity checks and their return values  
						
						... 
						
						
						
						Refactored and returned correct error codes for sanity checks
present in port layer esp_aes.c and esp_aes_gcm.c 
						
						
					 
					
						2023-01-16 15:04:08 +05:30 
						 
				 
			
				
					
						
							
							
								LiPeng 
							
						 
					 
					
						
						
							
						
						5c93fe47cb 
					 
					
						
						
							
							mbedtls: GCM implementation is replaced with CTR-based calculation  
						
						... 
						
						
						
						- GCM operation in mbedtls used ECB, which calculated only 16 bytes of data each time.
	- Therefore, when processing a large amount of data, it is necessary to frequently set hardware acceleration calculations,
	- which could not make good use of the AES DMA function to improve efficiency.
	- Hence, GCM implementation is replaced with CTR-based calculation which utilizes AES DMA to improve efficiency. 
						
						
					 
					
						2022-12-28 12:14:29 +05:30 
						 
				 
			
				
					
						
							
							
								harshal.patil 
							
						 
					 
					
						
						
							
						
						f9f10c2590 
					 
					
						
						
							
							mbedtls: fix esp_aes_gcm_update_ad() API implementation  
						
						
						
						
					 
					
						2022-12-28 11:33:09 +05:30 
						 
				 
			
				
					
						
							
							
								harshal.patil 
							
						 
					 
					
						
						
							
						
						48840d04f0 
					 
					
						
						
							
							mbedtls: fix esp_aes_crypt_ctr writing to null stream block  
						
						
						
						
					 
					
						2022-12-28 11:33:09 +05:30 
						 
				 
			
				
					
						
							
							
								harshal.patil 
							
						 
					 
					
						
						
							
						
						06bb0ee077 
					 
					
						
						
							
							mbedtls: added SOC_AES_SUPPORT_AES_192 check in esp_aes_gcm_setkey()  
						
						
						
						
					 
					
						2022-12-28 11:33:09 +05:30 
						 
				 
			
				
					
						
							
							
								harshal.patil 
							
						 
					 
					
						
						
							
						
						c15b36b9c4 
					 
					
						
						
							
							mbedtls: populate mbedtls_gcm_update() output_length paramater  
						
						
						
						
					 
					
						2022-12-28 11:33:09 +05:30 
						 
				 
			
				
					
						
							
							
								Aditya Patwardhan 
							
						 
					 
					
						
						
							
						
						4582af75b8 
					 
					
						
						
							
							mbedtls: Update licenses of files updated in mbedtls-3.1 update  
						
						
						
						
					 
					
						2022-03-04 05:18:58 +00:00 
						 
				 
			
				
					
						
							
							
								Laukik Hase 
							
						 
					 
					
						
						
							
						
						3925365351 
					 
					
						
						
							
							ci: Fix pre-check stage failing tests  
						
						... 
						
						
						
						- Updated license headers
- Re-enabled public headers and static analysis checks
- Fix public header file check failure
Co-authored-by: Aditya Patwardhan <aditya.patwardhan@espressif.com > 
						
						
					 
					
						2022-03-03 01:37:10 +05:30 
						 
				 
			
				
					
						
							
							
								Aditya Patwardhan 
							
						 
					 
					
						
						
							
						
						3b71bd7326 
					 
					
						
						
							
							mbedtls-3.0: Fixed ESP32 build issues  
						
						... 
						
						
						
						- Added MBEDLTS_PRIVATE(...) wherever necessary
- For functions like mbedtls_pk_parse_key(...), it is necessary to pass the RNG function
  pointers as parameter. Solved for dependent components: wpa_supplicant & openSSL
- For libcoap, the SSLv2 ClientHello handshake method has been deprecated, need to handle this.
  Currently, corresponding snippet has been commented.
- Examples tested: hello-world | https_request | wifi_prov_mgr
mbedtls-3.0: Fixed ESP32-C3 & ESP32-S3 build issues
- Removed MBEDTLS_DEPRECATED_REMOVED macro from sha1 port
- DS peripheral: esp_ds_rsa_sign -> removed unsused 'mode' argument
- Added MBEDTLS_PRIVATE(...) wherever required
mbedtls-3.0: Fixed ESP32-S2 build issues
- Fixed outdated function prototypes and usage in mbedlts/port/aes/esp_aes_gcm.c due to changes in GCM module
mbedtls-3.0: Fixed ESP32-H2 build issues
ci: Fixing build stage
- Added MBEDTLS_PRIVATE(...) wherever required
- Added RNG function parameter
- Updated GCM Module changes
- Updated Copyright notices
- Tests:
- build_esp_idf_tests_cmake_esp32
- build_esp_idf_tests_cmake_esp32s2
- build_esp_idf_tests_cmake_esp32c3
- build_esp_idf_tests_cmake_esp32s3
ci: Fixing build stage (mbedtls-related changes)
- Added MBEDTLS_PRIVATE(...) wherever required
- Updated SHAXXX functions
- Updated esp_config according to mbedtls changes
- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3
ci: Fixing build stage (example-related changes)
- Added MBEDTLS_PRIVATE(...) wherever required
- Updated SHAXXX functions
- Updated esp_config according to mbedtls changes
- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3
ci: Fixing target_test stage
- Updated test SSL version to TLS_v1_2
- Tests:
- example_test_protocols 1/2
ci: Fixing build stage
- Added checks for MBEDTLS_DHM_C (disabled by default)
- Updated esp_cryptoauthlib submodule
- Updated factory partition size for legacy BLE provisioning example
- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3
Co-authored-by: Laukik Hase <laukik.hase@espressif.com > 
						
						
					 
					
						2022-03-03 01:37:10 +05:30 
						 
				 
			
				
					
						
							
							
								Marius Vikhammer 
							
						 
					 
					
						
						
							
						
						7fc7c49e5d 
					 
					
						
						
							
							crypto: allocate all DMA descriptors to DMA capable memory.  
						
						... 
						
						
						
						These were previously placed on the stack, but the stack could be placed in
RTC RAM which is not DMA capable. 
						
						
					 
					
						2021-12-08 12:09:01 +08:00 
						 
				 
			
				
					
						
							
							
								Marius Vikhammer 
							
						 
					 
					
						
						
							
						
						1cb07a1288 
					 
					
						
						
							
							aes: fix potential unaligned access in aes-gcm  
						
						
						
						
					 
					
						2021-11-03 14:10:11 +08:00 
						 
				 
			
				
					
						
							
							
								Marius Vikhammer 
							
						 
					 
					
						
						
							
						
						457ce080ae 
					 
					
						
						
							
							AES: refactor and add HAL layer  
						
						... 
						
						
						
						Refactor the AES driver and add HAL, LL and caps.
Add better support for running AES-GCM fully in hardware. 
						
						
					 
					
						2020-12-10 09:04:47 +00:00