Chris Conlon
|
33e840b01b
|
add AES key wrap support, RFC 3394
|
2016-12-09 09:30:56 -07:00 |
|
toddouska
|
d2ed611757
|
fix nxp distcheck filename typo
|
2016-12-08 16:52:12 -08:00 |
|
toddouska
|
6cfb8e30b2
|
Merge pull request #591 from dgarske/STM32_CUBEMX
STM32 F2/F4 CubeMX and Std Peripheral Library hardware crypto support
|
2016-12-08 16:36:43 -08:00 |
|
toddouska
|
ab7849be0d
|
Merge pull request #655 from JacobBarthelmeh/ARMv8
ARMv8
|
2016-12-08 16:34:19 -08:00 |
|
Chris Conlon
|
2db7bf0dc0
|
use static digest for X9.63 KDF, add smallstack support
|
2016-12-08 17:28:53 -07:00 |
|
Chris Conlon
|
a5b267087f
|
add ANSI-X9.63-KDF support [SEC1]
|
2016-12-07 20:26:09 -07:00 |
|
toddouska
|
3dec222969
|
Merge pull request #523 from dgarske/atmel_pr
Support for Atmel ATECC508A
|
2016-12-07 15:01:08 -08:00 |
|
kaleb-himes
|
da4a46ddf6
|
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into RIOT_OS
|
2016-12-07 14:16:34 -07:00 |
|
Nickolas Lapp
|
82c12fb7be
|
Fix DES3 on STM32 CUBEMX
|
2016-12-07 10:20:46 -07:00 |
|
David Garske
|
eaca90db28
|
New Atmel support (WOLFSSL_ATMEL) and port for ATECC508A (WOLFSSL_ATECC508A). Adds wolfCrypt support for ECC Hardware acceleration using the ATECC508A. Adds new PK callback for ECC shared secret. Fixed missing "wc_InitRng_ex" when using "CUSTOM_RAND_GENERATE_BLOCK". Added ATECC508A RNG block function for P-RNG bypass ability. Added internal "wolfSSL_GetEccPrivateKey" function for getting reference to private key for ECC shared secret (used in test.h for testing PK_CALLBACK mode). Added README.md for using the Atmel ATECC508A port.
|
2016-12-07 07:57:55 -08:00 |
|
Jacob Barthelmeh
|
944e5fba03
|
ARMv8 : load pointer to AES key and counter into a register along with pointer to SHA256 K table to handle tight optimized loops on function call with -flto
|
2016-12-06 21:42:15 +00:00 |
|
David Garske
|
c0e006d42c
|
Fixes for build with small stack enabled.
|
2016-12-06 12:38:05 -08:00 |
|
David Garske
|
932199c5e9
|
Fix build warning about unused static functions wc_AesEncrypt and wc_AesDecrypt with STM32.
|
2016-12-05 14:22:59 -08:00 |
|
David Garske
|
4a7651a09a
|
STM32 F2/F4 CubeMX and Std Peripheral Library hardware crypto support for RNG, AES, SHA1, DES3 and MD5. Adds new WOLFSSL_STM32_CUBEMX and WOLFSSL_STM32F4 defines. Tested on STM32F437II.
|
2016-12-05 14:22:59 -08:00 |
|
David Garske
|
1d14ac5ff3
|
Fixes to include.am and sha256.c after master rebase. Retested on NXP K82 with and without HW accel (all tests/benchmarks pass).
|
2016-12-05 09:15:58 -08:00 |
|
Martin Latal
|
877ea7011c
|
Fix for LTC RSA-4096. Use original wolfSSL code for RSA operation, reduce in LTC port layer.
|
2016-12-05 09:01:59 -08:00 |
|
David Garske
|
0611c45869
|
Attempt to fix sha.c error with older visual studio compiler.
|
2016-12-05 09:01:59 -08:00 |
|
David Garske
|
ae75842021
|
Fix build issues with rebase for ECC and RSA. Changed user_settings.h example when LTC is enabled to disable Shamir and ECC-521. Cleanup to add USE_NXP_MMCAU and USE_NXP_LTC for the example user_settings.h, so the project file can automatically configure.
|
2016-12-05 09:01:59 -08:00 |
|
David Garske
|
a6b96b17ff
|
Fixes to include path for NXP ksdk_port. Fixes for time USER/OVERRIDES so their #ifdef's are checked first. Fix to initialize LTC via new "ksdk_port_init" function. Cleanup of the ksdk_port.c for formatting, macros, statics and line length. Cleanup of the AES code for key size. Cleanup of the wolfCrypt sha.c for readability. Added support for the KSDK bare metal drivers to the IDE Rowley CrossWorks example. Updated the settings.h to allow for overrides in Freescale section. Updated README with info for using LTC.
|
2016-12-05 09:01:59 -08:00 |
|
David Garske
|
8e64d564dc
|
NXP/Freescale K8X MMCAU / LTC core support for RSA, ECC, Ed/Curve25519, AES, DSA, DES3, MD5, RNG, SHA and SHA2.
|
2016-12-05 09:01:59 -08:00 |
|
kaleb-himes
|
162294e3e5
|
added benchmark app for RIOT and updated test error handling
|
2016-12-02 14:39:37 -07:00 |
|
kaleb-himes
|
684f9bad22
|
RIOT OS build and test scripts, build instructions
|
2016-12-02 13:53:05 -07:00 |
|
Chris Conlon
|
a9936cf3ee
|
correct MEMORY_E returns in asn.c
|
2016-11-28 10:39:07 -07:00 |
|
Jacob Barthelmeh
|
2cbc6ed673
|
ARMv8 : handle aggressive optimizers
|
2016-11-23 15:44:53 -07:00 |
|
Sean Parkinson
|
8a8274d403
|
Merge pull request #643 from dgarske/fix_hmac_224
Fix wc_HmacSizeByType for SHA224.
|
2016-11-23 13:28:37 +10:00 |
|
David Garske
|
16907de633
|
Fix wc_HmacSizeByType for SHA224.
|
2016-11-22 14:45:10 -08:00 |
|
David Garske
|
13cf313001
|
ECC performance increase with custom curves enabled (WOLFSSL_CUSTOM_CURVES) when A param is 3.
|
2016-11-22 13:43:18 -08:00 |
|
David Garske
|
13bdcc518d
|
Pulled in patches from Debian package.
|
2016-11-22 11:25:40 -08:00 |
|
Moisés Guimarães
|
64fc68920d
|
fixes random keys size ('a' and 'b')
|
2016-11-21 18:08:19 -03:00 |
|
toddouska
|
b380eef3e2
|
Merge pull request #637 from JacobBarthelmeh/master
PKCS12 : return on memory error
|
2016-11-18 11:03:57 -08:00 |
|
Jacob Barthelmeh
|
ac5436b462
|
PKCS12 : return on memory error
|
2016-11-18 09:40:26 -07:00 |
|
toddouska
|
1289e66641
|
Merge pull request #636 from dgarske/fix-ti-hash-mem-leak
Fix memory leak issue in ti-hash.c with small stack
|
2016-11-17 16:19:37 -08:00 |
|
toddouska
|
f167fe3d4a
|
Merge pull request #625 from dgarske/tls_nosha256
Fix to allow TLS with NO_SHA256
|
2016-11-17 16:14:28 -08:00 |
|
David Garske
|
de1ee91863
|
Fix memory leak issue with WOLFSSL_SMALL_STACK defined and using TI hardware accelerated hashing.
|
2016-11-17 09:24:56 -08:00 |
|
dgarske
|
f275331e44
|
Merge pull request #634 from toddouska/sha512-length
Sha512 length
|
2016-11-16 15:06:20 -08:00 |
|
Chris Conlon
|
8cea6ad148
|
fix wc_PKCS7_EncodeSignedData when used with empty or no signed attributes
|
2016-11-16 13:35:57 -07:00 |
|
toddouska
|
afc54c3dff
|
change sha512 hi/loLen to 64bits
|
2016-11-16 09:30:35 -08:00 |
|
toddouska
|
f922d3f2d6
|
Merge pull request #624 from SparkiDev/sha224
SHA224 implementation added
|
2016-11-15 13:53:34 -08:00 |
|
toddouska
|
98b57e045a
|
Merge pull request #629 from SparkiDev/rsa-crt
Make RSA CRT constant time
|
2016-11-15 13:36:32 -08:00 |
|
dgarske
|
ee53853d2f
|
Merge pull request #632 from toddouska/init_multi
fix non ecc_make_key init_mulit potential problems
|
2016-11-14 19:34:14 -08:00 |
|
toddouska
|
cbb2ce6baf
|
Merge pull request #626 from dgarske/fix_ecc_make_rngfail
Fix for "wc_ecc_make_key_ex" if call to rng fails
|
2016-11-14 17:35:15 -08:00 |
|
toddouska
|
1a7fe0d4c5
|
fix non ecc_make_key init_mulit potential problems
|
2016-11-14 12:49:42 -08:00 |
|
David Garske
|
82e8210208
|
Support for building without SHA256 with NO_OLD_TLS and SHA384/512. Although TLS 1.2 default digest for certs is SHA256 and our test cert signatures use SHA256, so make check will fail. Also requires disabling the P-RNG which uses SHA256. Added missing "wc_InitRng_ex" when using "CUSTOM_RAND_GENERATE_BLOCK". Cleanup of the BuildCertHashes, DoRounds, HashInput, HashOutput and HashOutputRaw return codes.
|
2016-11-14 12:47:24 -08:00 |
|
David Garske
|
cee321323a
|
Better handle "mp_init_multi" failure in "wc_ecc_make_key_ex".
|
2016-11-14 12:38:01 -08:00 |
|
toddouska
|
fa816f0460
|
Merge pull request #631 from dgarske/ecc_privkey_import_oid
Fix for "wc_EccPrivateKeyDecode" to handle custom curve OID.
|
2016-11-14 11:52:48 -08:00 |
|
toddouska
|
047b6df1a2
|
Merge pull request #630 from JacobBarthelmeh/master
remove include of ec.h in ecc.c
|
2016-11-14 11:51:15 -08:00 |
|
David Garske
|
a2d29e4c71
|
Further improve the "wc_EccPrivateKeyDecode" to use the CheckCurve return code, which is the curve_id in the success case. Fixes scan-build warning.
|
2016-11-14 10:06:20 -08:00 |
|
David Garske
|
07efd88e4d
|
Fix for "wc_EccPrivateKeyDecode" to handle custom curve OID.
|
2016-11-14 09:53:31 -08:00 |
|
Jacob Barthelmeh
|
dad628cb0d
|
remove include of ec.h in ecc.c
|
2016-11-14 10:03:19 -07:00 |
|
Sean Parkinson
|
2023b65f4c
|
Make RSA CRT constant time
Identifying which part of the CRT failed, through timing, reveals
information useful to an attacker.
|
2016-11-14 08:57:28 +10:00 |
|