-
Notifications
You must be signed in to change notification settings - Fork 2.8k
Remove MD2, MD4, RC4, Blowfish and XTEA #4588
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove MD2, MD4, RC4, Blowfish and XTEA #4588
Conversation
|
Please remove the merge commit and rebase on top of |
a7dcd33 to
4f6c032
Compare
4f6c032 to
9b830e1
Compare
Signed-off-by: TRodziewicz <[email protected]>
Signed-off-by: TRodziewicz <[email protected]>
Signed-off-by: TRodziewicz <[email protected]>
8ff1223 to
8f91c72
Compare
Reverting some deleted tests and changing the deprecated algo Deleting deprecated headers from /alt-dummy dir Corrections to the comments Removal of deleted functions from compat-2.x.h Corrections to tests/data_files/Makefile Signed-off-by: TRodziewicz <[email protected]>
646424e to
75628d5
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks pretty good to me, except a few more files that could be removed, and one test case that could be restored.
Also, some of the previous migration guide entries mention MD2 and MD4 - can you edit them in order to remove those references? It makes little sense to keep tell people about md2_starts_ret() being renamed now that it's actually entirely removed :) See docs/3.0-migration-guide.d/rename_the__ret_functions.md and docs/3.0-migration-guide.md
Signed-off-by: TRodziewicz <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just one minor issue remaining.
| depends_on:MBEDTLS_ARC4_C:MBEDTLS_CIPHER_MODE_CTR | ||
| # Either INVALID_ARGUMENT or NOT_SUPPORTED would be reasonable here | ||
| cipher_setup:PSA_KEY_TYPE_ARC4:"000102030405060708090a0b0c0d0e0f":PSA_ALG_CTR:PSA_ERROR_NOT_SUPPORTED | ||
| cipher_setup:PSA_KEY_TYPE_CHACHA20:"000102030405060708090a0b0c0d0e0f":PSA_ALG_CTR:PSA_ERROR_NOT_SUPPORTED |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is not a good test case because it has two bad things: the key type is incompatible with the algorithm, and the key size is wrong for the key type. So if psa_cipher_setup returns an error code, we don't know if it's for the reason we want. Please change the key data to be 32 bytes instead of 16.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
| depends_on:MBEDTLS_ARC4_C:MBEDTLS_CIPHER_MODE_CTR | ||
| # Either INVALID_ARGUMENT or NOT_SUPPORTED would be reasonable here | ||
| cipher_setup:PSA_KEY_TYPE_CHACHA20:"000102030405060708090a0b0c0d0e0f":PSA_ALG_CTR:PSA_ERROR_NOT_SUPPORTED | ||
| cipher_setup:PSA_KEY_TYPE_CHACHA20:"000102030405060708090a0b0c0d0e0f1011121314151617":PSA_ALG_CTR:PSA_ERROR_NOT_SUPPORTED |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is 24 bytes, not 32
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ooops! True! 1 sec....
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK, should be better now.
Signed-off-by: TRodziewicz <[email protected]>
69f3486 to
4a28ade
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for addressing our feedback. Looks all good to me now.
Signed-off-by: TRodziewicz [email protected]
Description
Remove the obsolete and niche cryptographic primitives from Mbed TLS 3.0, namely MD2, MD4, RC4, Blowfish and XTEA.
Fixes: #4084
Status
IN DEVELOPMENT
Requires Backporting
NO
Todos