harshal.patil 
							
						 
					 
					
						
						
							
						
						9c3a6c4f53 
					 
					
						
						
							
							mbedtls: replace low-level sha apis with md apis in esp_ssl_tls  
						
						
						
						
					 
					
						2023-04-17 12:50:15 +05:30 
						 
				 
			
				
					
						
							
							
								Laukik Hase 
							
						 
					 
					
						
						
							
						
						1e4493e592 
					 
					
						
						
							
							mbedtls: Fix build with dynamic buffers feature  
						
						
						
						
					 
					
						2023-01-09 15:41:36 +05:30 
						 
				 
			
				
					
						
							
							
								Laukik Hase 
							
						 
					 
					
						
						
							
						
						9b290e3668 
					 
					
						
						
							
							mbedtls/port: Fix dynamic buffers feature for v3.2.1  
						
						... 
						
						
						
						Co-authored-by: Li Jingyi <lijingyi@espressif.com > 
						
						
					 
					
						2022-08-24 11:59:34 +05:30 
						 
				 
			
				
					
						
							
							
								Aditya Patwardhan 
							
						 
					 
					
						
						
							
						
						3b71bd7326 
					 
					
						
						
							
							mbedtls-3.0: Fixed ESP32 build issues  
						
						... 
						
						
						
						- Added MBEDLTS_PRIVATE(...) wherever necessary
- For functions like mbedtls_pk_parse_key(...), it is necessary to pass the RNG function
  pointers as parameter. Solved for dependent components: wpa_supplicant & openSSL
- For libcoap, the SSLv2 ClientHello handshake method has been deprecated, need to handle this.
  Currently, corresponding snippet has been commented.
- Examples tested: hello-world | https_request | wifi_prov_mgr
mbedtls-3.0: Fixed ESP32-C3 & ESP32-S3 build issues
- Removed MBEDTLS_DEPRECATED_REMOVED macro from sha1 port
- DS peripheral: esp_ds_rsa_sign -> removed unsused 'mode' argument
- Added MBEDTLS_PRIVATE(...) wherever required
mbedtls-3.0: Fixed ESP32-S2 build issues
- Fixed outdated function prototypes and usage in mbedlts/port/aes/esp_aes_gcm.c due to changes in GCM module
mbedtls-3.0: Fixed ESP32-H2 build issues
ci: Fixing build stage
- Added MBEDTLS_PRIVATE(...) wherever required
- Added RNG function parameter
- Updated GCM Module changes
- Updated Copyright notices
- Tests:
- build_esp_idf_tests_cmake_esp32
- build_esp_idf_tests_cmake_esp32s2
- build_esp_idf_tests_cmake_esp32c3
- build_esp_idf_tests_cmake_esp32s3
ci: Fixing build stage (mbedtls-related changes)
- Added MBEDTLS_PRIVATE(...) wherever required
- Updated SHAXXX functions
- Updated esp_config according to mbedtls changes
- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3
ci: Fixing build stage (example-related changes)
- Added MBEDTLS_PRIVATE(...) wherever required
- Updated SHAXXX functions
- Updated esp_config according to mbedtls changes
- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3
ci: Fixing target_test stage
- Updated test SSL version to TLS_v1_2
- Tests:
- example_test_protocols 1/2
ci: Fixing build stage
- Added checks for MBEDTLS_DHM_C (disabled by default)
- Updated esp_cryptoauthlib submodule
- Updated factory partition size for legacy BLE provisioning example
- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3
Co-authored-by: Laukik Hase <laukik.hase@espressif.com > 
						
						
					 
					
						2022-03-03 01:37:10 +05:30 
						 
				 
			
				
					
						
							
							
								Aditya Patwardhan 
							
						 
					 
					
						
						
							
						
						45122533e0 
					 
					
						
						
							
							mbedtls-3 update:  
						
						... 
						
						
						
						1) Fix build issue in mbedtls
2) skip the public headers check in IDF
3)Update Kconfig Macros
4)Remove deprecated config options
5) Update the sha API according to new nomenclature
6) Update mbedtls_rsa_init usage
7) Include mbedtls/build_info.h instead of mbedtls/config.h
8) Dont include check_config.h
9) Add additional error message in esp_blufi_api.h 
						
						
					 
					
						2022-03-03 01:37:10 +05:30 
						 
				 
			
				
					
						
							
							
								Laukik Hase 
							
						 
					 
					
						
						
							
						
						424c45df91 
					 
					
						
						
							
							ci: Fix issues for build stage  
						
						... 
						
						
						
						- Fixed logs expecting different format specifier
- Updated ignore list for check_public_header test
- Updated functions ported from mbedTLS 
						
						
					 
					
						2022-01-25 10:51:27 +05:30 
						 
				 
			
				
					
						
							
							
								Li Jingyi 
							
						 
					 
					
						
						
							
						
						2b1402890d 
					 
					
						
						
							
							fix(mbedtls): fix compiling error when open MBEDTLS_SSL_PROTO_DTLS and disable MBEDTLS_SSL_PROTO_DTLS when open MBEDTLS_DYNAMIC_BUFFER  
						
						
						
						
					 
					
						2021-12-21 16:11:03 +08:00 
						 
				 
			
				
					
						
							
							
								Li Jingyi 
							
						 
					 
					
						
						
							
						
						981ef057c4 
					 
					
						
						
							
							feat(mbedtls): modify __wrap_mbedtls_ssl_setup to decrease SSL peak heap cost  
						
						
						
						
					 
					
						2021-12-01 17:15:25 +08:00 
						 
				 
			
				
					
						
							
							
								yuanjm 
							
						 
					 
					
						
						
							
						
						93604b1a11 
					 
					
						
						
							
							mbedtls: Fix mbedtls_ssl_send_alert_message crash due to ssl->out_iv is NULL  
						
						
						
						
					 
					
						2021-04-22 09:33:59 +00:00 
						 
				 
			
				
					
						
							
							
								Dong Heng 
							
						 
					 
					
						
						
							
						
						1c9592efc4 
					 
					
						
						
							
							fix(mbedtls): fix mbedtls dynamic resource memory leaks and RSA cert drop earlier  
						
						... 
						
						
						
						RX process caches the session information in "ssl->in_ctr" not in "ssl->in_buf".
So when freeing the SSL, can't free the "ssl->in_ctr", because the "ssl->in_buf"
is empty.
Make the RX process like TX process, and cache the session information in
"ssl->in_buf", so that the cache buffer can be freed when freeing the SSL.
Closes https://github.com/espressif/esp-idf/issues/6104  
						
						
					 
					
						2020-11-19 07:31:50 +00:00 
						 
				 
			
				
					
						
							
							
								Angus Gratton 
							
						 
					 
					
						
						
							
						
						66fb5a29bb 
					 
					
						
						
							
							Whitespace: Automated whitespace fixes (large commit)  
						
						... 
						
						
						
						Apply the pre-commit hook whitespace fixes to all files in the repo.
(Line endings, blank lines at end of file, trailing whitespace) 
						
						
					 
					
						2020-11-11 07:36:35 +00:00 
						 
				 
			
				
					
						
							
							
								Dong Heng 
							
						 
					 
					
						
						
							
						
						3d57bf30a2 
					 
					
						
						
							
							feat(mbedtls): add dynamic buffer and local resource managment to decrease SSL heap cost  
						
						
						
						
					 
					
						2020-05-14 11:45:09 +00:00