Daniel Pouzzner
0264a518e1
wolfcrypt/src/ed25519.c: in ed25519_pairwise_consistency_test(), add casts to mollify -Wconversion.
2024-04-19 01:41:35 -05:00
Daniel Pouzzner
28480ec0ea
linuxkm/Kbuild: add SHA-2, SHA-3, ChaCha20, and poly1305, to kernel-safe vectorized-asm list.
2024-04-19 01:35:45 -05:00
Daniel Pouzzner
85f3fb9d07
Merge pull request #7409 from SparkiDev/asm_x64_rip_fix
...
SHA-256 x64 ASM - fix use of %rip
2024-04-19 02:33:47 -04:00
Sean Parkinson
d2b9a365f2
ChaCha20 and Poly1305 x64 ASM - fixu use of %rip
...
Get the address of the constants into a register at start instead of
calculating the address relative to the instruction pointer each time.
2024-04-19 09:59:54 +10:00
JacobBarthelmeh
fe671f72e1
Merge pull request #7435 from SparkiDev/ssl_misc_fixup
...
ssl_misc.c: wolfssl_file_len() protection
2024-04-18 14:36:38 -06:00
JacobBarthelmeh
ef153101b7
Merge pull request #7433 from SparkiDev/eddsa_fips_checks
...
EdDSA FIPS checks on public key
2024-04-18 14:34:31 -06:00
JacobBarthelmeh
9666e4d7e4
Merge pull request #7448 from douzzer/20240418-pq-hybrid-fixes
...
20240418-pq-hybrid-fixes
2024-04-18 14:31:27 -06:00
Daniel Pouzzner
e48f06bd53
fixes for WOLFSSL_DUAL_ALG_CERTS: "cannot take address of bit-field ‘altKeyType’" and "‘altPrivateKeyType’" in ProcessBufferTryDecode(), "‘heap’ undeclared" in ProcessBufferCertAltPublicKey(), "‘consumed’ undeclared" in ProcessFile(), "‘keySz’ undeclared" in wolfSSL_CTX_use_PrivateKey_Id().
2024-04-18 13:49:44 -05:00
kaleb-himes
0bd5967093
Adjust FIPS version and default configuration
2024-04-18 08:41:05 -06:00
Sean Parkinson
08b42b7c93
Merge pull request #7443 from douzzer/20240418-fix-aes_xts_128_test-DEBUG_VECTOR_REGISTER_ACCESS
...
20240418-fix-aes_xts_128_test-DEBUG_VECTOR_REGISTER_ACCESS
2024-04-18 21:10:40 +10:00
Daniel Pouzzner
436efb0078
wolfcrypt/test/test.c: in aes_xts_128_test(), change DEBUG_VECTOR_REGISTER_ACCESS gates to DEBUG_VECTOR_REGISTER_ACCESS_AESXTS (currently unused), after refactor of AES-XTS C fallback in 9f55dba2f2
. (per-call fallback is no longer supported for AES-XTS.)
2024-04-18 00:59:03 -05:00
JacobBarthelmeh
41f31f4635
Merge pull request #7440 from douzzer/20240417-fix-LoadSystemCaCertsWindows
...
20240417-fix-LoadSystemCaCertsWindows
2024-04-17 15:47:48 -06:00
JacobBarthelmeh
58167a2ebb
Merge pull request #7434 from douzzer/20240416-fips-v6-fixes
...
20240416-fips-v6-fixes
2024-04-17 13:52:35 -06:00
Daniel Pouzzner
6e3a9d5447
src/ssl_load.c: in LoadSystemCaCertsWindows(), fix flub introduced in 8e9810e87e
.
2024-04-17 13:24:26 -05:00
Sean Parkinson
593cb77e51
ssl_misc.c: wolfssl_file_len() protection
...
wolfssl_file_len is now used by wolfssl_read_file_static() which is
compiled in with less restrictions.
Fix #ifdef protection.
2024-04-17 22:44:13 +10:00
Sean Parkinson
c590fe514f
EdDSA FIPS checks on public key
...
Check that the Ed25519 and Ed448 public key is valid even without
private key.
Perform pairwise consistency test, only in FIPS, when making a key i
Ed25519 and Ed448.
2024-04-17 17:50:33 +10:00
Daniel Pouzzner
3df11e7eab
fixes for cppcheck uninitvar src/pk.c (false positives) and nullPointerRedundantCheck in src/ssl_load.c (true positive).
2024-04-17 01:00:41 -05:00
Daniel Pouzzner
fac834c80a
configure.ac: in setup for enable-all and enable-all-crypto with enable-32bit, fix inconsistency whereby SHAKE was enabled but SHA512 and SHA3 weren't; remove unneeded+unwanted ENABLED_32BIT conditional force-off of SHA512, SHA384, SHA3, ED25519 (harmonizes with FIPS v6).
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
d0edb3d0a9
scripts/aria-cmake-build-test.sh: fix masked exit value.
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
855175da47
wolfcrypt/src/fe_448.c: fix several out-of-order declarations in fe448_mul_8().
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
9f55dba2f2
wolfcrypt/src/aes.c: in AES-XTS AESNI, use cautious strategy as in AESGCM_STREAM for SAVE_VECTOR_REGISTERS, due to random failures seen with DEBUG_VECTOR_REGISTER_ACCESS_FUZZING using the old per-call fallback strategy.
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
b2f594e84b
fixes for --enable-32bit CFLAGS=-m32 --enable-fips=v6 (fixes "#error ED448 requires SHAKE256").
2024-04-17 00:43:41 -05:00
JacobBarthelmeh
03ed52bd81
Merge pull request #7297 from SparkiDev/ssl_move_5
...
ssl.c: Move functions out to separate files
2024-04-16 17:56:55 -06:00
JacobBarthelmeh
1f61ed3536
Merge pull request #7397 from dalybrown/expose-dtsl-in-ada
...
Expose DTLS in Ada wrapper and update examples
2024-04-16 13:37:23 -06:00
András Fekete
73a85af9b9
Merge pull request #7429 from julek-wolfssl/hostap-cert-update
...
Update hostap certs ref
2024-04-16 12:43:28 -04:00
Juliusz Sosinowicz
52a593c883
Update hostap certs ref
2024-04-16 17:53:29 +02:00
Sean Parkinson
8e9810e87e
ssl.c: Move functions out to separate files
...
Moved E[CD][25519||448] APIs to pk.c
Move public key PEM APIs to pk.c.
Move wolfSSL loading and using of private keys and certificates to
ssl_load.c
Move PKCS#7 and PKCS#12 APIs to ssl_p7p12.c.
Move session and session cache APIs to ssl_sess.c.
Other minor fixes.
2024-04-16 10:30:59 +10:00
JacobBarthelmeh
9b92aea245
Merge pull request #7422 from douzzer/20240412-fips-v5-v6-linuxkm-fixes
...
20240412-fips-v5-v6-linuxkm-fixes
2024-04-15 17:32:53 -06:00
Daniel Pouzzner
281c2a431e
wolfcrypt/test/test.c: fix return code in pbkdf2_test(), add DEBUG_WOLFSSL gates on keysize report in ecc_test_curve(), and add missing PRIVATE_KEY_UNLOCK()s in cryptocb_test() for fips-dev coverage.
2024-04-15 14:11:21 -05:00
Daniel Pouzzner
6e0a90190f
fixes for v5 and v6+ FIPS builds, including linuxkm v6+ builds.
2024-04-15 14:11:21 -05:00
JacobBarthelmeh
be74cb7d94
Merge pull request #7419 from anhu/winpq
...
Add PQ Files for windows.
2024-04-15 10:21:47 -06:00
JacobBarthelmeh
1cb34a8bed
Merge pull request #7411 from douzzer/20240410-lock-free-wc_linuxkm_fpu_state_assoc
...
20240410-lock-free-wc_linuxkm_fpu_state_assoc
2024-04-15 10:20:39 -06:00
JacobBarthelmeh
3742c4dd57
Merge pull request #7413 from gojimmypi/PR-PlatformIO-FreeRTOS
...
Modify PlatformIO FreeRTOS include path, settings.h
2024-04-12 14:32:55 -06:00
JacobBarthelmeh
3113e6c855
Merge pull request #7393 from philljj/xmss_w64_settings
...
Adjust wc_xmss and wc_lms settings to support wolfboot.
2024-04-12 14:14:50 -06:00
JacobBarthelmeh
7d0ce39408
Merge pull request #7396 from miyazakh/renesas_rx72n
...
fix rx72n compile failure
2024-04-12 14:03:45 -06:00
JacobBarthelmeh
77bbb35830
Merge pull request #7415 from bandi13/addDockerCrossCompilerDependency
...
Add yet another cross compiling tool
2024-04-12 13:19:27 -06:00
Anthony Hu
85765b1a57
Add PQ Files for windows.
2024-04-12 15:05:29 -04:00
jordan
6ae99485a1
Additional changes to support wolfboot wc_lms.
2024-04-12 10:51:55 -05:00
Andras Fekete
5e85adee0f
Add yet another cross compiling tool
2024-04-11 23:14:16 -04:00
JacobBarthelmeh
8b656d5a5f
Merge pull request #7295 from kaleb-himes/SRTP-KDF-FS
...
SRTP-KDF FS Preview
2024-04-11 13:41:05 -06:00
kaleb-himes
73e5303718
Removed duplicate file from project
2024-04-11 12:16:21 -06:00
kaleb-himes
29a41d5ff9
Add new fips-ready dependencies to WIN10 project
2024-04-11 10:56:46 -06:00
gojimmypi
b1261f5471
Modify PlatformIO FreeRTOS include path, settings.h
2024-04-11 07:46:35 -07:00
Daniel Pouzzner
954005af9a
linuxkm/linuxkm_memory.c: refactor wc_linuxkm_fpu_state_assoc() as a lock-free O(1) mechanism with per-CPU rather than per-process state.
2024-04-11 00:06:28 -05:00
JacobBarthelmeh
ff09f418c0
Merge pull request #7408 from SparkiDev/asn_templ_rid
...
X.509 RID ASN template behaviour
2024-04-10 11:42:07 -06:00
kaleb-himes
264dcd4e15
Fix a file mode and more overlong lines
2024-04-10 10:18:49 -06:00
kaleb-himes
4a8443f0e4
Address new file item reported by Jenkins
2024-04-10 11:05:11 -04:00
Sean Parkinson
8b3fbe47e6
SHA-256 x64 ASM - fix use of %rip
...
Get the address of table K instead of using it directly each time a
value is required.
2024-04-10 15:02:19 +10:00
Sean Parkinson
36b47d1374
Merge pull request #7352 from JacobBarthelmeh/coverity4
...
Coverity Fixes
2024-04-10 10:46:54 +10:00
Sean Parkinson
b48b5c47f4
X.509 RID ASN template behaviour
...
Don't set the DNS entry for RID unless OPENSSL_ALL is defined to match
the behaviour of original ASN code.
2024-04-10 10:39:45 +10:00