JacobBarthelmeh
98a5a4c201
Merge pull request #7660 from julek-wolfssl/zd/18188
...
wolfSSL_get_SSL_CTX: Make parameter const
2024-06-28 16:40:06 -06:00
JacobBarthelmeh
80d4f71eb9
Merge pull request #7683 from SparkiDev/def_ticket_cb_inlen
...
SSL default ticket encryption callback: check in len on decrypt
2024-06-28 16:04:58 -06:00
Sean Parkinson
864a9d0598
Dilithium: fixes
...
TLS uses DER API now and needs to be protected with the right #ifdefs.
Do the right check of size in wc_Dilithium_PrivateKeyDecode().
Don't require public key when doing private DER.
2024-06-28 10:55:16 +10:00
JacobBarthelmeh
c047e55b92
Merge pull request #7687 from douzzer/20240626-EvictSessionFromCache-ticketNonce-data-leak
...
20240626-EvictSessionFromCache-ticketNonce-data-leak
2024-06-27 09:41:42 -06:00
Juliusz Sosinowicz
f66e5a52bd
wolfSSL_get_SSL_CTX: Make parameter const
2024-06-27 15:48:46 +02:00
Sean Parkinson
4d56cc1790
Regression testing: memory allocation failure
...
Fixes from memory allocation failure testing.
Also:
fix asn.c to have ifdef protection around code compiled in with dual
algorithm certificates.
fix test_tls13_rpk_handshake() to support no TLS 1.2 or no TLS 1.3.
fix wc_xmss_sigsleft() to initialize the index to avoid compilation
error.
2024-06-27 17:17:53 +10:00
Daniel Pouzzner
4d43dbf83b
src/ssl_sess.c: in EvictSessionFromCache(), free session->ticketNonce.data if it was dynamically allocated. fixes memory leak via wolfSSL_Cleanup().
2024-06-26 14:15:42 -05:00
Takashi Kojo
3d7583e743
Merge pull request #7684 from kojo1/pk-fix
...
Fix in pk.c
2024-06-26 11:33:38 +09:00
Takashi Kojo
72b6074b93
Fixes in pk.c
2024-06-26 08:47:41 +09:00
Sean Parkinson
6d0dc7f2e7
SSL default ticket encryption callback: check in len on decrypt
...
Make sure that the length of the data to decrypt is correct for the
default ticket encryption implementation.
2024-06-26 08:21:17 +10:00
JacobBarthelmeh
38335f4947
Merge pull request #7678 from bandi13/fixReturnType
...
ret will be set to 1 (WOLFSSL_SUCCESS), the rest checks for 'ret == 0'
2024-06-25 10:53:03 -06:00
Andras Fekete
773451a5dc
ret will be set to 1 (WOLFSSL_SUCCESS), the rest checks for 'ret == 0'
...
Need to use another type of return code
2024-06-24 12:11:57 -04:00
Tobias Frauenschläger
7cd610bc45
Fixes for WolfSSL ML-DSA implementation
...
* Update OIDs etc. to match OQS ML-DSA values (old ones were Dilithium
Round 3 values)
* Make sure private key files/buffers containing both the private and
the public key are parsed correctly
Signed-off-by: Tobias Frauenschläger
<tobias.frauenschlaeger@oth-regensburg.de >
2024-06-24 15:00:44 +02:00
David Garske
2312cb4563
Merge pull request #7667 from SparkiDev/sha3_thumb2_arm32_asm
...
SHA-3 Thumb2, ARM32 ASM: Add assembly implemention
2024-06-23 20:16:32 -07:00
JacobBarthelmeh
7405ea8162
Merge pull request #7671 from miyazakh/dtls_ocsp
...
Fix ocsp response message build for DTLS
2024-06-21 14:43:29 -06:00
kaleb-himes
610af43d03
XCODE support for v5.2.3 of the FIPS module
2024-06-21 10:36:57 -06:00
Sean Parkinson
8734f1251d
SHA-3 Thumb2, ARM32 ASM: Add assembly implemention
...
Add SHA-3 assembly implementation for Thumb2 and ARM32.
2024-06-21 14:38:51 +10:00
Hideki Miyazaki
30eb558d58
fix ocsp response when using DTLS
2024-06-21 09:57:59 +09:00
JacobBarthelmeh
63f666a599
Merge pull request #7659 from embhorn/zd18179
...
Fixes in ASN1 and X509
2024-06-20 13:10:40 -06:00
David Garske
d545253df7
Merge pull request #7594 from JacobBarthelmeh/socat
...
Updating socat version support
2024-06-20 09:17:41 -07:00
Anthony Hu
32ca92bd97
Der --> Len. Copy paste typo.
2024-06-19 17:25:54 -04:00
Daniel Pouzzner
38c7327660
Merge pull request #7622 from SparkiDev/ml-dsa
...
Dilithium/ML-DSA: Implementation of ML-DSA-44/65/87
2024-06-19 13:32:35 -04:00
Sean Parkinson
3e3a00dafd
Dilithium/ML-DSA: Implementation of ML-DSA-44/65/87
...
Impemented FIPS 204 (Draft) Module-Lattice-Based Signature Standard.
Implementation include making a key, signing and verification.
Make key API added.
Updated liboqs calls to use ML-DSA implementation instead of Dilithium.
2024-06-19 21:27:01 +10:00
Eric Blankenhorn
d4a90e8a71
Fix wolfSSL_ASN1_TIME_to_generalizedtime with UTC time
2024-06-18 15:08:01 -05:00
Eric Blankenhorn
5efa82a239
Check for null sig in wolfSSL_X509_CRL_get_signature
2024-06-18 14:47:01 -05:00
Eric Blankenhorn
95cd9c81c8
Add attr to get_dn_attr_by_nid
2024-06-18 14:41:58 -05:00
Takashi Kojo
2f379ed322
alloc a buff for NULL pointer
2024-06-18 09:41:11 +09:00
Daniel Pouzzner
385a097646
Merge pull request #7638 from gasbytes/patch
...
added check if the buf is at least RECORD_HEADER_SZ
2024-06-13 14:27:40 -04:00
gasbytes
88527a3d6e
word32 -> sword32
2024-06-13 13:44:50 +02:00
Daniel Pouzzner
d2f4cc9e28
Merge pull request #7616 from embhorn/zd17762
...
Static analysis fixes
2024-06-12 17:07:02 -04:00
gasbytes
845e2f752c
added check if the buf is at least RECORD_HEADER_SZ
...
when adding the record headers through quic
2024-06-11 22:10:18 +02:00
JacobBarthelmeh
b9e5c0252d
remove extra asign and use ExpectIntEQ test directly
2024-06-10 16:19:27 -06:00
Daniel Pouzzner
1b907d05ed
WOLFSSL_DEBUG_TRACE_ERROR_CODES: restore several initializations, one because needed (in wolfSSL_UseSecureRenegotiation()), the rest in an abundance of caution, and rearrange wolfSSL_CryptHwMutexInit() and wolfSSL_CryptHwMutexUnLock() in a similar abundance of caution.
2024-06-10 13:44:03 -05:00
Daniel Pouzzner
b3e8f0ad24
add --enable-debug-trace-errcodes, WOLFSSL_DEBUG_TRACE_ERROR_CODES, WC_ERR_TRACE(), WC_NO_ERR_TRACE(), support/gen-debug-trace-error-codes.sh. also add numerous deployments of WC_NO_ERR_TRACE() to inhibit frivolous/misleading errcode traces when -DWOLFSSL_DEBUG_TRACE_ERROR_CODES.
2024-06-08 16:39:53 -05:00
JacobBarthelmeh
f7bc78cad0
Merge pull request #7602 from night1rider/Parsing-bug
...
Send BUFFER_ERROR if size does not meet minimum Requirements
2024-06-07 13:54:03 -06:00
night1rider
ebca3376ef
Send BUFFER_ERROR if size does not meet minimum reqs for the extension
2024-06-07 10:26:30 -06:00
Sean Parkinson
1c51465584
Merge pull request #7627 from douzzer/20240606-clang-tidy-and-mingw-fixes
...
20240606-clang-tidy-and-mingw-fixes
2024-06-07 10:08:55 +10:00
JacobBarthelmeh
3d33c78e9d
use unsigned char instead of uint8_t
2024-06-06 16:30:40 -06:00
Daniel Pouzzner
ac5cabaac9
fixes for USE_WINDOWS_API && !NO_FILESYSTEM && !NO_WOLFSSL_DIR:
...
* in wc_port.h, add XWRITE and XREAD definitions and include <io.h>;
* in wolfSSL_BIO_read(), implement Windows support for XREAD and XWRITE;
* in wolfSSL_BIO_write_filename(), add 'b' flag to XFOPEN flags;
* in wolfSSL_RAND_file_name(), add support for XALTHOMEVARNAME, and add Windows definition for it to wc_port.h alongside XWRITE and XREAD.
fixes test_wolfSSL_BIO, test_wolfSSL_X509_print, test_wolfSSL_RAND, test_wolfSSL_RSA_print in cross-mingw-all-crypto scenario.
2024-06-06 17:14:12 -05:00
Lealem Amedie
5a1ac2742c
Reviewer feedback
2024-06-06 16:08:39 -06:00
Lealem Amedie
3de358ef06
Ensure extensions are only parsed once
2024-06-06 14:10:56 -06:00
Lealem Amedie
f3061359d8
Improved fix for TLS1.3 to TLS1.2 client downgrade
2024-06-06 12:22:50 -06:00
David Garske
b69482ffac
Merge pull request #7569 from SparkiDev/riscv_aes_asm
...
AES RISC-V 64-bit ASM: ECB/CBC/CTR/GCM/CCM
2024-06-06 08:11:31 -07:00
JacobBarthelmeh
7ce9ebde15
Merge pull request #7618 from julek-wolfssl/jwt-cpp
...
Fixes for jwt-cpp
2024-06-06 08:57:46 -06:00
Sean Parkinson
acd604db3d
AES RISC-V 64-bit ASM: ECB/CBC/CTR/GCM/CCM
...
Add implementations of AES for ECB/CBC/CTR/GCM/CCM for RISC-V using
assembly.
Assembly with standard/scalar cryptography/vector cryptographt
instructions.
2024-06-06 13:16:00 +10:00
Sean Parkinson
162dffb463
Merge pull request #7619 from lealem47/zd18074
...
Fix for TLS1.3 to 1.2 downgrade
2024-06-06 09:39:32 +10:00
Lealem Amedie
d20ac2ce42
Fix for TLS1.3 to 1.2 downgrade
2024-06-05 11:26:10 -06:00
JacobBarthelmeh
18526152fe
Merge pull request #7610 from gasbytes/sni-wrappers
...
CSharp Wrapper SNI Support
2024-06-05 10:27:42 -06:00
Juliusz Sosinowicz
72243300bf
HMAC: fix signature
2024-06-05 13:43:57 +02:00
JacobBarthelmeh
119d2a5da1
do session conversion dance
2024-06-04 14:41:01 -06:00