mbedtls/yotta/data
2015-10-22 10:48:47 +02:00
..
example-authcrypt Fix warnings about locations of header files 2015-10-21 17:59:05 +02:00
example-benchmark Fix warnings about locations of header files 2015-10-21 17:59:05 +02:00
example-hashing Fix warnings about locations of header files 2015-10-21 17:59:05 +02:00
example-selftest Fix warnings about locations of header files 2015-10-21 17:59:05 +02:00
adjust-config.sh No FS_IO in the yotta module 2015-08-06 09:57:54 +02:00
entropy_hardware_poll.c Change main license to Apache 2.0 2015-09-04 14:21:07 +02:00
module.json Remove TLS Client example, see mbed-tls-sockets 2015-10-21 17:54:11 +02:00
README.md Further update Redmes regarding the two editions 2015-10-22 10:48:47 +02:00
target_config.h Change main license to Apache 2.0 2015-09-04 14:21:07 +02:00

mbed TLS

mbed TLS (formerly known as PolarSSL) makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their embedded products, with a minimal code footprint. It offers an SSL library with an intuitive API and readable source code.

The Beta release of mbed TLS integrates the mbed TLS library into mbed OS, mbed SDK and yotta. This is a preview release intended for evaluation only and is not recommended for deployment. It currently implements no secure source of random numbers, weakening its security.

Currently the only supported yotta targets are:

  • frdm-k64f-gcc and frdm-k64f-armcc
  • x86-linux-native and x86-osx-native

Sample programs

This release includes the following examples:

  1. Self test: found in test/example-selftest. Tests different basic functions in the mbed TLS library.

  2. Benchmark: found in test/example-benchmark. Measures the time taken to perform basic cryptographic functions used in the library.

  3. Hashing: found in test/example-hashing. Demonstrates the various APIs for computes hashes of data (also known as message digests) with SHA-256.

  4. Authenticated encrypted: found in test/example-authcrypt. Demonstrates usage of the Cipher API for encrypting and authenticating data with AES-CCM.

These examples are integrated as yotta tests, so that they are built automatically when you build mbed TLS. Each of them comes with complete usage instructions as a Readme file in its directory.

Performing TLS and DTLS connections

A high-level API for performing TLS and DTLS connections with mbed TLS in mbed OS is provided in a separate yotta module: mbed-tls-sockets. It is the recommended API for TLS and DTLS connections. It is very similar to the API provided by the sockets module for unencrypted TCP and UDP connections.

The mbed-tls-sockets module includes a complete example TLS client with usage instructions.

Configuring mbed TLS features

mbed TLS makes it easy to disable any feature during compilation that isn't required for a particular project. The default configuration enables all modern and widely-used features, which should meet the needs of new projects, and disables all features that are older or less common, to minimize the code footprint.

The list of available compilation flags is presented in the fully documented config.h file, present in the mbedtls directory of the yotta module.

If you need to adjust those flags, you can provide your own configuration-adjustment file with suitable #define and #undef statements. These will be included between the default definitions and the sanity checks. Your configuration file should be in your application's include directory, and can be named freely; you just need to let mbed TLS know the file's name. To do that, use yotta's configuration system. The file's name should be in your config.json file, under mbedtls, as the key user-config-file.

For example, in an application called myapp, if you want to enable the EC J-PAKE key exchange and disable the CBC cipher mode, you can create a file named for example mbedtls-config-changes.h in the myapp directory containing the following lines:

#define MBEDTLS_ECJPAKE_C
#define MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED

#undef MBEDTLS_CIPHER_MODE_CBC

and then create a file named config.json at the root of your application with the following contents:

{
   "mbedtls": {
      "user-config-file": "\"myapp/mbedtls-config-changes.h\""
   }
}

Please note: you need to provide the exact name that will be used in the #include directive, including the <> or quotes around the name.

Getting mbed TLS from GitHub

Like most components of mbed OS, mbed TLS is developed in the open and its source can be found on GitHub: ARMmbed/mbedtls. Unlike most other mbed OS components however, you cannot just clone the repository and run yotta build from its root. This is because mbed TLS also exists as an independent component, so its repository includes things that are not relevant for mbed OS, as well as other build systems.

The way to use mbed TLS from a clone of the GitHub repository is to run the following commands from the root of a checkout:

yotta/create-module.sh
cd yotta/module

You can then run any yotta command you would normally run, such as yotta build or yotta link.

Differences between the standalone and mbed OS editions

While the two editions share the same code base, there are still a number of differences, mainly in configuration and in integration. You should keep in mind those differences when reading some articles of our knowledge base, as currently the articles are about the standalone edition.

  • The mbed OS edition has a smaller set of features enabled by default in config.h, in order to reduce footprint. While the default configuration of the standalone edition puts more emphasize on maintaining interoperability with old peers, the mbed OS edition only enables the most modern ciphers and the latest version of (D)TLS.
  • The following components of mbed TLS are not enabled in the mbed OS edition as mbed OS already includes equivalent facilities: net.c and timing.c.
  • The mbed OS edition comes with a fully integrated API for (D)TLS connections in a companion module: mbed-tls-sockets, see "Performing TLS and DTLS connections" above.

Contributing

We gratefully accept bug reports and contributions from the community. There are some requirements we need to fulfill in order to be able to integrate contributions:

  • Simple bug fixes to existing code do not contain copyright themselves and we can integrate without issue. The same is true of trivial contributions.

  • For larger contributions, such as a new feature, the code can possibly fall under copyright law. We then need your consent to share in the ownership of the copyright. We have a form for this, which we will send to you in case you submit a contribution or pull request that we deem this necessary for.

To contribute, please:

  • Check for open issues or start a discussion around a feature idea or a bug.

  • Fork the mbed TLS repository on GitHub to start making your changes. As a general rule, you should use the "development" branch as a basis.

  • Write a test that shows that the bug was fixed or that the feature works as expected.

  • Send a pull request and bug us until it gets merged and published. We will include your name in the ChangeLog :)