Stanislav Klima
3fcbcbf42a
Revert "Logically dead code."
...
This reverts commit 2db62f744a .
2020-03-09 17:45:15 +01:00
Stanislav Klima
d4a9279a6c
Revert "Resource leak." to resolve the conflict (this fix is unapplicable, because the leaking code was removed).
...
This reverts commit 451d0a470a .
2020-02-20 15:12:02 +01:00
Stanislav Klima
109173d756
Fix two resource leaks.
2020-02-12 12:57:40 +01:00
Stanislav Klima
da3df4f9c6
Changing logic to remove dead code section.
2020-02-05 19:36:37 +01:00
Stanislav Klima
0964272dc6
Resource leak fix.
2020-02-05 18:28:50 +01:00
Stanislav Klima
c938cb35ca
Logically dead code.
2020-01-29 17:35:15 +01:00
Stanislav Klima
ed88e8d1c5
Logically dead code.
2020-01-29 17:34:58 +01:00
Stanislav Klima
2db62f744a
Logically dead code.
2020-01-29 17:34:40 +01:00
Stanislav Klima
37386f5fb5
NULL dereference.
2020-01-29 17:34:19 +01:00
Stanislav Klima
670ba75ea4
Missing varargs cleanup.
2020-01-29 17:33:59 +01:00
Stanislav Klima
2d36624d84
NULL dereference.
2020-01-29 17:33:38 +01:00
Stanislav Klima
df0b0a6e91
NULL dereference.
2020-01-29 17:31:14 +01:00
Stanislav Klima
70cb97c116
NULL dereference.
2020-01-29 17:30:57 +01:00
Stanislav Klima
972790fb86
Resource leak.
2020-01-29 17:30:35 +01:00
Stanislav Klima
451d0a470a
Resource leak.
2020-01-29 17:30:14 +01:00
Stanislav Klima
96d1593735
Possible use after free.
2020-01-29 17:29:52 +01:00
JacobBarthelmeh
695b126a1c
Merge pull request #2739 from dgarske/pkcs8_ed25519
...
Added PKCS8 support for ED25519
2020-01-24 10:56:40 -08:00
Chris Conlon
d1e39668aa
Merge pull request #2740 from aaronjense/compatibility-fixes
...
Compatibility Layer Fixes
2020-01-23 08:25:40 -08:00
David Garske
2cd3474e9d
Improve "keyFormat" to always set based on "algId" and let the later key parsing code produce failure.
2020-01-20 20:49:55 -08:00
David Garske
0489cc97a8
Fix for ProcessBuffer with PEM private keys, where PemToDer call was only setting eccKey. Cleanup to use "keyFormat" OID sum.
2020-01-20 20:49:55 -08:00
David Garske
40c8562dc2
Added PKCS8 support for ED25519.
2020-01-20 20:47:47 -08:00
David Garske
7707234901
Merge pull request #2743 from JacobBarthelmeh/Compatibility-Layer
...
adjust set1 curves list function for TLS extension sent
2020-01-20 16:19:55 -08:00
Jacob Barthelmeh
c581c56999
update return value of local GetCurveByOID
2020-01-20 10:40:56 -07:00
toddouska
66daac4c94
Merge pull request #2709 from JacobBarthelmeh/Testing
...
set chacha20 similar to aes-ctr when handling leftover stream and add…
2020-01-17 15:05:24 -08:00
Jacob Barthelmeh
356636e88d
fix typo
2020-01-17 15:13:52 -07:00
Jacob Barthelmeh
c5932a9874
account for leantls and selftest builds
2020-01-17 13:32:59 -07:00
Jacob Barthelmeh
bd4a9c69dd
convert name to oidsum to curve type for setting supported curves
2020-01-17 11:56:46 -07:00
Jacob Barthelmeh
d8c5353466
adjust set1 curves list function for TLS extension sent
2020-01-16 13:21:14 -07:00
Aaron Jense
3db7b44be4
Compatibility Layer Fixes
2020-01-15 13:49:47 -07:00
John Safranek
c69bd5169f
Switch strncpy to memcpy in the altname store function.
2020-01-10 20:34:14 -08:00
John Safranek
8d1b20706c
Maintenance: X509
...
1. Add a test for the new alt name handling.
2. Added an API to set altnames in a WOLFSSL_X509 struct. Just adds
DNS_entries.
3. Removed the "static" from a bunch of constant byte arrays used inside
some of the ASN.1 code.
2020-01-10 20:26:35 -08:00
John Safranek
5dcffa6b40
Maintenance: X509
...
1. Fix for issue #2724 . When making a certificate out of an X.509
structure, the subject alt names weren't getting correctly copied.
2. Added a function to flatten the DNS_entries into a sequence of
GeneralNames.
3. Put the proper certificate extension wrapping around the flattened
general names.
2020-01-10 20:26:35 -08:00
John Safranek
7571fbdbfb
Maintenance: X509
...
1. Fix for issue #2718 . Added a flag to the X509 structure when someone
sets the issuer name.
2. When making a certificate out of the X509, if the issuer name is set
clear the self-signed flag in the cert.
3. Propigate the flat X509_NAMEs to the string the cert building code
uses.
2020-01-10 20:25:43 -08:00
JacobBarthelmeh
6b4551c012
Merge pull request #2654 from cariepointer/qt-512-513
...
Add Qt 5.12 and 5.13 support
2020-01-10 17:34:23 -07:00
David Garske
1f104e52a3
Merge pull request #2715 from ejohnstown/maint-dtls
...
Maintentance: DTLS
2020-01-10 14:43:15 -08:00
Carie Pointer
544ff3f9ac
Fix length in wolfSSL_sk_CIPHER_description
2020-01-10 11:26:57 -07:00
Carie Pointer
ef99086aee
Fix valgrind errors
2020-01-10 10:08:39 -07:00
Carie Pointer
de3536a067
More fixes from review
2020-01-09 17:28:20 -07:00
Jacob Barthelmeh
a1944c477a
set chacha20 counter in TLS AEAD use
2020-01-09 16:39:48 -07:00
cariepointer
a9cf16cc2b
Merge branch 'master' into apache-fixes
2020-01-09 16:33:35 -07:00
toddouska
f3b2815e1f
Merge pull request #2708 from julek-wolfssl/nginx-fix
...
Nginx fix
2020-01-09 15:00:59 -08:00
Carie Pointer
0938cdde52
Remove dup->dynamicName = 1 call
2020-01-09 14:09:38 -08:00
Carie Pointer
47040f1dae
EC_KEY_dup fixes
2020-01-09 14:35:57 -07:00
John Safranek
1f0f3eb97d
Maintenance: Secure Renegotiation
...
Allow sending application data during the secure renegotiation.
2020-01-08 11:50:18 -08:00
Carie Pointer
b9c99709f7
Fixes from review
2020-01-08 12:48:01 -07:00
Carie Pointer
f13cee2689
Add comments above functions
2020-01-07 17:30:25 -07:00
Carie Pointer
28cf563c76
Fixes from PR review: styling and formatting, remove duplicate code
2020-01-07 17:01:53 -07:00
toddouska
d257003341
Merge pull request #2711 from cconlon/copyright2020
...
update copyright to 2020
2020-01-07 08:40:15 -08:00
Carie Pointer
9e4836a863
Fix for jenkins test failure
2020-01-07 08:11:05 -08:00
Carie Pointer
681ecf0e58
Fixes for wolfSSL_CTX_load_verify_locations_ex
2020-01-06 14:32:32 -08:00