lists.trustedfirmware.org
Sign In
Sign Up
Sign In
Sign Up
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
List overview
Download
Mbed-tls-announce
July 2024
----- 2024 -----
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
mbed-tls-announce@lists.trustedfirmware.org
1 participants
1 discussions
Start a n
N
ew thread
Requests for feedback about Mbed TLS 4: summary
by Gilles Peskine
Hello, In the past few weeks, we have sent a number of requests for feedback on the mbed-tls mailing list about the next major release of Mbed TLS (TF-PSA-Crypto 1.0 + Mbed TLS 4.0). Most are about features that we may remove because we think they are not used much and are not worth maintaining. This message is a summary of the requests. If you have concerns about any of these topics, please reply on the GitHub issue (preferred), or on the mbed-tls mailing list, or by private email. (If you reply privately, we will anonymize before sharing outside Arm.) Please reply before 31 July so that we have time to plan 4.0 preparation. While we won't ignore later replies, they will be harder to accommodate. List archive:
https://lists.trustedfirmware.org/archives/search?count=25&q=feedback&page=…
GitHub links — cryptographic mechanisms
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/102
— Custom ECC mechanisms
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/104
— Custom RSA mechanisms
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/105
— Import of incomplete RSA private keys
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/107
— Direct access to CTR_DRBG and HMAC_DRBG
https://github.com/Mbed-TLS/mbedtls/issues/8459
— RSA PKCS#1v1.5 encryption
https://github.com/Mbed-TLS/mbedtls/issues/9164
— DES (including 3DES) GitHub links — cryptography implementations
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/103
— Partial ECC acceleration
https://github.com/Mbed-TLS/mbedtls/issues/8151
— Dynamically registered secure element drivers GitHub links — TLS 1.2
https://github.com/Mbed-TLS/mbedtls/issues/5278
— FFDH in TLS 1.2
https://github.com/Mbed-TLS/mbedtls/issues/8170
— RSA decryption cipher suites (RSA without DH/ECDH)
https://github.com/Mbed-TLS/mbedtls/issues/9201
— Static ECDH cipher suites
https://github.com/Mbed-TLS/mbedtls/issues/9202
— CBC cipher suites <
https://github.com/Mbed-TLS/mbedtls/issues/9201
> GitHub links — platform
https://github.com/Mbed-TLS/mbedtls/issues/8108
— Platform interface redesign
https://github.com/Mbed-TLS/TF-PSA-Crypto/issues/106
— Building with plain make or CMake
https://github.com/Mbed-TLS/mbedtls/issues/8231
— x86_64: AESNI without compiler intrinsics
https://github.com/Mbed-TLS/mbedtls/issues/9307
— Support for %zu in printf If you have an opinion on a topic where we haven't requested feedback, you can find our (rapidly evolving) planning board at
https://github.com/orgs/Mbed-TLS/projects/15/views/1
. As a reminder, the main focus of the release will be that all cryptography goes through PSA APIs. Low-level legacy cryptography APIs (bignum.h, rsa.h, aes.h, etc.) will no longer be public. Except as indicated here, we generally intend feature parity, but it's possible that we've missed some unusual scenario, so please let us know if you have concerns. Best regards, -- Gilles Peskine Mbed TLS developer IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
5 months, 1 week
1
0
0
0
← Newer
1
Older →
Jump to page:
1
Results per page:
10
25
50
100
200