Go Hosohara
29d3303995
Add tests for d2i_PKCS12_fp,i2d_RSAPublicKey,RSA_verify and X509_print
2018-09-25 15:39:54 +09:00
Go Hosohara
b588e6ab29
ERR_peek_last_error() and SSL_get_SSL_CTX reference error on opensslextra.
...
Implemented wolfSSL_X509_get_version().
2018-09-25 15:39:54 +09:00
Go Hosohara
e79cdefcde
X509_NAME_ENTRY_get_object
2018-09-25 15:39:54 +09:00
Go Hosohara
2922a93bf7
PEM_read_X509_CRL
2018-09-25 15:39:54 +09:00
Go Hosohara
050fa2f8f8
wolfSSL_X509_CA_num()
2018-09-25 15:39:54 +09:00
Go Hosohara
aaa26f3f41
wolfSSL_ASN1_TIME_get_data()
2018-09-25 15:39:54 +09:00
Go Hosohara
a002a6715f
wolfSSL_ASN1_TIME_get_length()
2018-09-25 15:39:54 +09:00
Go Hosohara
98ae3bb7fd
Add define for OpenSSL API.
2018-09-25 15:39:54 +09:00
Sean Parkinson
741301bb2c
Single Precision: ARM Thumb assembly implementation
...
Remove AVX2 code from platform specific code that doesn't support it.
Fix sp_lshd to memmove correct amount.
2018-09-25 09:10:45 +10:00
Sean Parkinson
c4e1cdf335
Merge pull request #1845 from dgarske/tls_curve_order
...
TLS supported curve selection fixes
2018-09-25 08:26:14 +10:00
Jacob Barthelmeh
27aaedf37c
add -rsa-sz which benches any RSA key size
2018-09-24 16:21:13 -06:00
JacobBarthelmeh
4855246fc6
Merge pull request #1847 from kaleb-himes/ASN_T_LONG
...
Address a potential out of bounds write
2018-09-24 10:51:49 -06:00
JacobBarthelmeh
3be25441fa
Merge pull request #1843 from dgarske/async_fixes
...
Fixes for wolfCrypt async use with TLS
2018-09-24 09:51:19 -06:00
JacobBarthelmeh
0efc637d2d
Merge pull request #1834 from SparkiDev/pkcs11
...
Support for PKCS#11
2018-09-24 09:41:45 -06:00
David Garske
038b5e8a66
Fix comment spelling error.
2018-09-24 07:23:54 -07:00
Sean Parkinson
d273d1dc81
Fixes from review
2018-09-24 08:44:31 +10:00
Sean Parkinson
3a72cf7996
Fixes from review
2018-09-24 08:41:25 +10:00
Sean Parkinson
f7f158cbd9
Fix encode and decoding of EC signature
2018-09-24 08:41:25 +10:00
Sean Parkinson
77a81057be
Casting fixes
2018-09-24 08:41:25 +10:00
Sean Parkinson
5744e4227d
Rewrote the public pkcs11 headers
...
Fixed file name in comment.
2018-09-24 08:41:25 +10:00
Sean Parkinson
8a5a03ea35
Support for PKCS#11
...
Support for RSA, ECDSA and AES-GCM operations.
2018-09-24 08:41:25 +10:00
David Garske
dfec7f2263
Fix for TLS v1.3 async case with cipher suite TLS_AES_128_GCM_SHA256 and RSA key type. Fix for issue with long cipher suite name test for TLS 1.3.
2018-09-21 16:30:05 -07:00
kaleb-himes
29d60ec7e9
Changed to MAX over LONG based on peer review
2018-09-21 17:09:37 -06:00
kaleb-himes
fc77590c4e
Address a potential out of bounds write
2018-09-21 17:02:56 -06:00
David Garske
b2575b0b60
Fix to only skip early key free if async pending.
2018-09-21 15:13:15 -07:00
David Garske
e07e8a6a6e
Merge pull request #1846 from cconlon/validity
...
fix daysValid seconds calculation
2018-09-21 12:02:11 -07:00
Chris Conlon
0591b18339
fix daysValid seconds calculation
2018-09-21 11:04:39 -06:00
David Garske
a643aeac41
* Fixes for async with TLS where keys are being free'd too soon.
...
* Fix for possible NULL RNG case in mp_rand.
* Fix for memory macros to handle expression for `HEAP`.
* Fix for possible unknown uint32_t type with mem track.
* Fix for double Alloc/Free print when using track and debug memory at same time.
* Fix for building with `./configure CFLAGS="-DECC_USER_CURVES -DNO_ECC256 -DHAVE_ECC160"`
* Performance improvements for cases with `WC_ASYNC_NO_HASH` and `WC_ASYNC_ENABLE_SHA256`.
2018-09-21 09:33:40 -07:00
David Garske
24f9f12844
Fix for the curve logic to pick the hightest strength, not just the default 256-bit. Added test for setting user curve. ./examples -H useSupCurve.
2018-09-21 09:27:48 -07:00
David Garske
39019c2418
Re-order the default supported curve groups by strength. Some TLS servers pick the top choice instead of the strongest.
2018-09-21 08:54:32 -07:00
David Garske
a5fffdbbb7
Merge pull request #1844 from kaleb-himes/CERT_UPDATE_FIX
...
Cert update fix
2018-09-20 18:06:16 -07:00
David Garske
dfb9db2b8d
Merge pull request #1832 from JacobBarthelmeh/HardwareAcc
...
Linux /dev/crypto SHA256 and AES
2018-09-20 18:05:35 -07:00
kaleb-himes
dc942bf9cb
Remove unnecessary duplicate revocation
2018-09-20 16:54:35 -06:00
kaleb-himes
ea06a3e8cb
Resolve some persistent error report when conf not passed to req
2018-09-20 16:50:02 -06:00
Jacob Barthelmeh
fe2f9d4aa4
minor adjustments and add README
2018-09-20 15:59:29 -06:00
David Garske
427c62e04a
Merge pull request #1841 from kaleb-himes/CERT_UPDATE_REFACTOR
...
Cert update refactor
2018-09-20 14:24:06 -07:00
kaleb-himes
54e04dd312
posix compliance enhancements for portability
2018-09-20 10:30:11 -06:00
toddouska
4177c2f316
Merge pull request #1839 from ejohnstown/rng
...
RNG Update
WCv4-rng-stable
2018-09-20 08:49:39 -07:00
David Garske
c225b45364
Merge pull request #1842 from kaleb-himes/NO_SHA_CRL_ON_BUILD_FAILURE
...
Update certs to address nightly failure with disable sha enable crl
2018-09-20 06:09:29 -07:00
kaleb-himes
17ebb0ea49
Update certs to address nightly failure with disable sha enable crl
2018-09-19 15:22:08 -06:00
Kaleb Himes
afcdfd70fe
Merge pull request #1840 from embhorn/fix_renewcerts
...
Revert addition of OIDs to cnf
2018-09-19 15:11:20 -06:00
kaleb-himes
f3fd67c54b
White space updates and revert cnf changes in lieu of PR #1734
2018-09-19 14:54:19 -06:00
kaleb-himes
4f6ee556dc
Refactor the cert renewal scripts with error handling
...
Portability updates
2018-09-19 14:47:21 -06:00
Jacob Barthelmeh
96a7e366bc
testing with valgrind and static analysis tools
2018-09-19 14:29:33 -06:00
Jacob Barthelmeh
2e88151cfd
crypto only sha256 cryptodev
...
formating and refactoring
update configure for devcrypto
add AES algorithms to cyrptodev port
increase structure size for compatibility AES with cryptodev
add wc_devcrypto.h to install path
2018-09-19 10:41:29 -06:00
John Safranek
951bd5a01a
FIPSv2: RNG Update
...
1. Put the SeedTest function in the HASH_DRBG scope.
WCv4.0-RC9
2018-09-19 07:22:04 -07:00
Eric Blankenhorn
b1b7093a1d
Revert addition of OIDs to cnf
2018-09-19 08:01:40 -05:00
John Safranek
8972867ada
FIPSv2: RNG Update
...
1. Updated the IDE/WIN10 user settings to enable RDSEED by default.
2. Updated the Windows GenerateSeed() function to take into account the
RDSEED enabled setting.
3. Exclude the TestSeed() function check for the "selftest" build as
well as old FIPS.
WCv4.0-RC8
2018-09-18 16:08:35 -07:00
John Safranek
582cf3182e
FIPSv2: RNG Update
...
1. Update the SEED_BLOCK_SZ to 4 for non-FIPS builds.
2. Change fips-check.sh to skip copying over the random.{c,h} files for
now. Need the tagged versions of the other files and the new random for
now.
2018-09-18 14:36:43 -07:00
John Safranek
4aa85f956f
FIPSv2: RNG Update
...
1. The wolfcrypt test shouldn't check TestSeed() for old FIPS builds.
2018-09-18 14:36:42 -07:00