Commit Graph

  • 8a8274d403 Merge pull request #643 from dgarske/fix_hmac_224 Sean Parkinson 2016-11-23 13:28:37 +10:00
  • 50131b410d Added new "WOLFSSL_BUFFER_INFO" type to represent internal "buffer" type and the "WOLFSSL_X509_STORE_CTX" certs. Added "VERIFY_CALLBACK_SHOW_PEER_CERTS" to print peer certs pointer and length. David Garske 2016-11-22 19:24:54 -08:00
  • ff16ecda5e Merge pull request #642 from dgarske/ecc_custcurve_speedup toddouska 2016-11-22 16:05:57 -08:00
  • a540169b72 Merge pull request #638 from ejohnstown/dtls-window-update JacobBarthelmeh 2016-11-22 16:53:04 -07:00
  • 16907de633 Fix wc_HmacSizeByType for SHA224. David Garske 2016-11-22 14:45:10 -08:00
  • 13cf313001 ECC performance increase with custom curves enabled (WOLFSSL_CUSTOM_CURVES) when A param is 3. David Garske 2016-11-22 13:43:18 -08:00
  • 5b76a37234 Add the peer cert buffer and count to the X509_STORE_CTX used for the verify callback. Fixes #627. David Garske 2016-11-22 11:45:00 -08:00
  • 13bdcc518d Pulled in patches from Debian package. David Garske 2016-11-22 11:25:40 -08:00
  • 2d9d3aeb91 DTLS Window Update: fixes and changes John Safranek 2016-11-22 10:12:18 -08:00
  • b61e6e1219 Merge pull request #639 from moisesguimaraes/fixes-srp-priv-key-size Kaleb Himes 2016-11-21 15:59:32 -07:00
  • 64fc68920d fixes random keys size ('a' and 'b') Moisés Guimarães 2016-11-21 18:08:19 -03:00
  • ec6fec452d Update session export with the new sequence number windows. John Safranek 2016-11-21 09:16:53 -08:00
  • 2507c4da8a DTLS Sequence Window Tracking Update 1. Modify the DTLS sequence window to use an array of word32 instead of a word32 or word64 depending on the availability of word64. 2. One can change the array size to have a bigger window. John Safranek 2016-11-16 12:19:33 -08:00
  • b380eef3e2 Merge pull request #637 from JacobBarthelmeh/master toddouska 2016-11-18 11:03:57 -08:00
  • ac5436b462 PKCS12 : return on memory error Jacob Barthelmeh 2016-11-18 09:40:26 -07:00
  • 1289e66641 Merge pull request #636 from dgarske/fix-ti-hash-mem-leak toddouska 2016-11-17 16:19:37 -08:00
  • f167fe3d4a Merge pull request #625 from dgarske/tls_nosha256 toddouska 2016-11-17 16:14:28 -08:00
  • bfd0a1b405 Fix to allow SHA384 cipher suite with NO_SHA256 defined. Without this fix the BUILD_AESGCM wasn't getting defined. David Garske 2016-11-17 10:29:48 -08:00
  • b01952ea40 Cleanup the hash free in FreeHandshakeResources. David Garske 2016-11-17 09:34:31 -08:00
  • de1ee91863 Fix memory leak issue with WOLFSSL_SMALL_STACK defined and using TI hardware accelerated hashing. David Garske 2016-11-17 09:24:56 -08:00
  • f275331e44 Merge pull request #634 from toddouska/sha512-length dgarske 2016-11-16 15:06:20 -08:00
  • 5c3bd7e1a0 Merge pull request #635 from cconlon/pkcs7signed toddouska 2016-11-16 14:07:58 -08:00
  • 8cea6ad148 fix wc_PKCS7_EncodeSignedData when used with empty or no signed attributes Chris Conlon 2016-11-16 13:35:57 -07:00
  • 44a23b072f fix mcapi with size change toddouska 2016-11-16 09:39:21 -08:00
  • afc54c3dff change sha512 hi/loLen to 64bits toddouska 2016-11-16 09:30:35 -08:00
  • f922d3f2d6 Merge pull request #624 from SparkiDev/sha224 toddouska 2016-11-15 13:53:34 -08:00
  • 98b57e045a Merge pull request #629 from SparkiDev/rsa-crt toddouska 2016-11-15 13:36:32 -08:00
  • f27159f2db Merge pull request #633 from cconlon/renegotiation_info v3.9.10b toddouska 2016-11-15 11:11:17 -08:00
  • a10ec0ff91 adjust suiteSz and use SUITE_LEN in FindSuite() Chris Conlon 2016-11-14 16:45:35 -07:00
  • ee53853d2f Merge pull request #632 from toddouska/init_multi dgarske 2016-11-14 19:34:14 -08:00
  • cbb2ce6baf Merge pull request #626 from dgarske/fix_ecc_make_rngfail toddouska 2016-11-14 17:35:15 -08:00
  • 49978d1417 server side empty renegotiation_info support Chris Conlon 2016-11-14 15:33:36 -07:00
  • 1a7fe0d4c5 fix non ecc_make_key init_mulit potential problems toddouska 2016-11-14 12:49:42 -08:00
  • 82e8210208 Support for building without SHA256 with NO_OLD_TLS and SHA384/512. Although TLS 1.2 default digest for certs is SHA256 and our test cert signatures use SHA256, so make check will fail. Also requires disabling the P-RNG which uses SHA256. Added missing "wc_InitRng_ex" when using "CUSTOM_RAND_GENERATE_BLOCK". Cleanup of the BuildCertHashes, DoRounds, HashInput, HashOutput and HashOutputRaw return codes. David Garske 2016-11-14 12:47:24 -08:00
  • cee321323a Better handle "mp_init_multi" failure in "wc_ecc_make_key_ex". David Garske 2016-11-14 12:38:01 -08:00
  • fa816f0460 Merge pull request #631 from dgarske/ecc_privkey_import_oid toddouska 2016-11-14 11:52:48 -08:00
  • 047b6df1a2 Merge pull request #630 from JacobBarthelmeh/master toddouska 2016-11-14 11:51:15 -08:00
  • ecc5fccf07 Merge pull request #628 from JacobBarthelmeh/Testing toddouska 2016-11-14 11:50:35 -08:00
  • a2d29e4c71 Further improve the "wc_EccPrivateKeyDecode" to use the CheckCurve return code, which is the curve_id in the success case. Fixes scan-build warning. David Garske 2016-11-14 10:06:20 -08:00
  • 07efd88e4d Fix for "wc_EccPrivateKeyDecode" to handle custom curve OID. David Garske 2016-11-14 09:53:31 -08:00
  • dad628cb0d remove include of ec.h in ecc.c Jacob Barthelmeh 2016-11-14 10:03:19 -07:00
  • 2023b65f4c Make RSA CRT constant time Sean Parkinson 2016-11-14 08:57:28 +10:00
  • 6d5485b88f Fix to "mp_init_multi" so failure ensures a later "mp_clear" won't free on un-initialized pointer. Applies to !USE_FAST_MATH only. No measurable benchmark difference. David Garske 2016-11-11 20:03:58 -08:00
  • 9b0d53ba50 Fixes from review Sean Parkinson 2016-11-12 09:52:07 +10:00
  • 0b3d9cbccd revert AESNI padding and handle the case in aes.c Jacob Barthelmeh 2016-11-11 16:26:29 -07:00
  • cc303a3035 Merge pull request #623 from SparkiDev/ecc toddouska 2016-11-11 12:53:12 -08:00
  • 478f279b3c Fix logic Sean Parkinson 2016-11-11 16:38:28 +10:00
  • abcd6af512 Disable SHA-224 in FIPS Sean Parkinson 2016-11-11 16:29:34 +10:00
  • 9e81261f1e Fixes Sean Parkinson 2016-11-11 16:11:16 +10:00
  • 8a7bb3fad4 Z will be 0 not 1 Sean Parkinson 2016-11-11 12:53:48 +10:00
  • 71259113b2 ECC improvements/fixes Sean Parkinson 2016-11-10 15:37:19 +10:00
  • 45983c3b32 Fix SHA224 enum in HMAC code Sean Parkinson 2016-11-11 12:17:32 +10:00
  • a0ee159fa5 Merge pull request #617 from JacobBarthelmeh/Compatibility-Layer toddouska 2016-11-10 11:47:42 -08:00
  • 1aca9a6079 Fix for "wc_ecc_make_key_ex" if call to rng fails. Issue only applies to !USE_FAST_MATH case on failure response from call to "wc_RNG_GenerateBlock". David Garske 2016-11-10 11:39:29 -08:00
  • eb0de32aa2 Merge pull request #621 from JacobBarthelmeh/Testing John Safranek 2016-11-10 10:00:54 -08:00
  • fdfc177254 SHA224 implementation added Sean Parkinson 2016-11-10 15:52:26 +10:00
  • 55401fceb8 adjust alignment of arrays used for case with AESNI Jacob Barthelmeh 2016-11-09 15:03:26 -07:00
  • af44b2527a Merge pull request #620 from JacobBarthelmeh/PKCS12 Chris Conlon 2016-11-09 08:59:31 -07:00
  • e9cda7b93f Merge pull request #619 from JacobBarthelmeh/ARMv8 toddouska 2016-11-08 16:21:01 -08:00
  • fa48bca262 PKCS12 : visibility of structs and guards Jacob Barthelmeh 2016-11-08 16:49:09 -07:00
  • c122558810 COMPAT. LAYER : fix missing return value and alignment Jacob Barthelmeh 2016-11-08 14:16:02 -07:00
  • 208f747a47 ARMv8 : add armv8-aes.c to EXTRA_DIST Jacob Barthelmeh 2016-11-08 10:28:01 -07:00
  • d4b45c4299 Merge pull request #616 from moisesguimaraes/fixes-wolfcrypt-py John Safranek 2016-11-08 09:07:21 -08:00
  • 5f6cf282b1 fixes include.am comments Moisés Guimarães 2016-11-07 21:15:23 -03:00
  • 88df983251 moves include.am into wolfcrypt-py folder Moisés Guimarães 2016-11-07 21:09:08 -03:00
  • 46dee9e792 ARMv8 : clang 32 bit build JacobBarthelmeh 2016-11-07 15:48:06 -08:00
  • 668af9b32f POLY1305 : clang 32 bit warning about macros JacobBarthelmeh 2016-11-07 15:28:30 -08:00
  • f7a951709f COMPAT. LAYER : get SSL client random bytes Jacob Barthelmeh 2016-11-07 10:15:04 -07:00
  • f06a392764 COMPAT. LAYER : DES set key and malloc/free Jacob Barthelmeh 2016-11-04 17:08:58 -06:00
  • b50914f2c7 Drops 3DES and adds int wc_RsaSetRNG(RsaKey* key, WC_RNG* rng); for RSA blinding Moisés Guimarães 2016-09-21 13:03:11 -03:00
  • 08f6d23e84 moves wolfcrypt-py implementation to wrapper/python/wolfcrypt Moisés Guimarães 2016-08-16 10:18:20 -03:00
  • 68c43e4344 Merge pull request #615 from ejohnstown/dtls-verify-retry-fix toddouska 2016-11-04 15:52:13 -07:00
  • 70b227011d Merge pull request #604 from JacobBarthelmeh/PKCS12 toddouska 2016-11-04 15:50:50 -07:00
  • c271806936 Merge pull request #614 from toddouska/scr-verify John Safranek 2016-11-04 10:11:05 -07:00
  • ada2573009 Increment the expected handshake number if the call to the handhsake message processing function is successful, but not if the handshake message is the client_hello. Process client hello clears that counter and incrementing it breaks the handshake. Fixes issue #612. John Safranek 2016-11-03 14:49:21 -07:00
  • 87e3f45f52 add SCR client and server verify data check toddouska 2016-11-03 14:45:24 -07:00
  • 356c3a37aa Merge pull request #613 from JacobBarthelmeh/Testing toddouska 2016-11-03 13:16:59 -07:00
  • 0839925797 PKCS12 : visibility, check on key match, sanity check on malloc Jacob Barthelmeh 2016-11-03 11:14:29 -06:00
  • 668e9a8e08 MODE : change source file mode back to 644 Jacob Barthelmeh 2016-11-03 10:08:13 -06:00
  • 3780f452e8 Merge pull request #609 from JacobBarthelmeh/ARMv8 toddouska 2016-11-03 09:02:20 -07:00
  • 8e0ab18924 Merge pull request #611 from cconlon/pkcs7 toddouska 2016-11-03 09:00:46 -07:00
  • 9a735fc873 allow PKCS#7 to be compiled with AES disabled Chris Conlon 2016-11-02 12:18:45 -06:00
  • d4b8320226 Merge pull request #606 from ejohnstown/dtls-pool toddouska 2016-11-02 10:54:53 -07:00
  • a3ea8378ec Cap the size of the transmit and receive DTLS message lists at 255. John Safranek 2016-11-01 18:10:35 -07:00
  • 6f06b60bc0 ARMv8 : clang build with ARMv8 JacobBarthelmeh 2016-11-01 13:38:01 -07:00
  • 624ec3d492 Merge pull request #607 from cconlon/pkcs7 toddouska 2016-11-01 12:03:24 -07:00
  • 22c5e22698 Merge pull request #608 from JacobBarthelmeh/master dgarske 2016-11-01 11:53:53 -07:00
  • ffe905afbf Moved the checks for the new session ticket and certificate verify messages from the change cipher spec handler to the sanity check handshake message function. It provides support for DTLS missing and duplicate messages. John Safranek 2016-10-31 12:49:09 -07:00
  • 3075269326 Replace the DTLS MsgPool for saving transmit handshake messages with the DTLS MsgList. John Safranek 2016-10-28 10:58:49 -07:00
  • 3065bb2178 Merge pull request #588 from steweg/fix_dtls_retranmission John Safranek 2016-11-01 09:29:30 -07:00
  • 70e7e34c87 RNG : change to --disable-rng, non-autoconf scenario, help msg Jacob Barthelmeh 2016-11-01 10:21:29 -06:00
  • 09c32de412 RNG : option to not use RNG Jacob Barthelmeh 2016-10-31 16:51:02 -06:00
  • 50464d4aef gitignore PKCS#7 test files, delete on make clean Chris Conlon 2016-10-31 11:36:23 -06:00
  • fa9a9175d0 add AES-256-CBC to PKCS#7 Encode/DecodeEnvelopedData Chris Conlon 2016-10-31 11:31:15 -06:00
  • 8c23c3cdd0 add AES-192-CBC to PKCS#7 Encode/DecodeEnvelopedData Chris Conlon 2016-10-31 11:22:49 -06:00
  • 17c184e720 add AES-128-CBC to PKCS#7 Encode/DecodeEnvelopedData Chris Conlon 2016-10-31 11:06:06 -06:00
  • b686deecbe PKCS12 : Add PKCS12 parsing Jacob Barthelmeh 2016-10-29 13:12:26 -06:00
  • 79cba75925 Merge pull request #603 from ejohnstown/aes-ctr JacobBarthelmeh 2016-10-28 13:52:50 -06:00
  • 849ae72d3a expand the AES-CTR test to 4 blocks for 192 and 256 bit cases John Safranek 2016-10-27 15:54:22 -07:00
  • 7ef037af0f Merge pull request #602 from kaleb-himes/forums-support-case-user-sp dgarske 2016-10-26 20:04:02 -07:00