Publish a PSA client-server simulator (psasim), originally written inside Arm as a proof-of-concept for the PSA Firmware Framework specification. We are currently planning to use it to test support for MBEDTLS_PSA_CRYPTO_CLIENT, though this is still tentative and not scheduled.
Review target: reviewing the code for correctness is out of scope. We assume that the psasim code does what it claims. Reviewers must check that we are indeed taking the psasim code and the subsequent commits are correct.
Publish a PSA client-server simulator (psasim), originally written inside Arm as a proof-of-concept for the PSA Firmware Framework specification. We are currently planning to use it to test support for
MBEDTLS_PSA_CRYPTO_CLIENT
, though this is still tentative and not scheduled.Resolves https://github.com/Mbed-TLS/mbedtls/issues/8960
Review target: reviewing the code for correctness is out of scope. We assume that the psasim code does what it claims. Reviewers must check that we are indeed taking the psasim code and the subsequent commits are correct.
Moved from https://github.com/Mbed-TLS/mbedtls/pull/8311. Unfortunately, you can't run the checker scripts (
check_files.py
,code_style.py
, etc.) in the framework yet (https://github.com/Mbed-TLS/mbedtls-framework/issues/7), but they passed in the original.