David Garske
4eab5267f1
Merge pull request #7511 from julek-wolfssl/ec-meth
...
Stub EC_KEY_METHOD
2024-05-13 09:22:23 -07:00
David Garske
568fda0e8b
Merge pull request #7517 from bandi13/bugFixes
...
Bug fixes
2024-05-13 09:01:00 -07:00
Andras Fekete
c5773f5f26
Make the function flow better
...
Will return 0 on failure.
2024-05-10 15:56:56 -04:00
Andras Fekete
f73a9f0d4f
Fix function logic
2024-05-10 15:03:17 -04:00
Daniel Pouzzner
cb689104d1
Merge pull request #7466 from julek-wolfssl/gh/7273
...
Mark all record sequence numbers before stateful parsing as read
2024-05-09 13:57:13 -04:00
Daniel Pouzzner
f7e1e370a0
Merge pull request #7438 from julek-wolfssl/zephr-no-malloc
...
zephyr no malloc
2024-05-09 02:57:20 -04:00
Daniel Pouzzner
10b31cc481
Merge pull request #7507 from rizlik/update_err_code_cert
...
tls13: update error code to NO_CERT_ERROR when no cert is set
2024-05-09 01:38:26 -04:00
Daniel Pouzzner
d53abc2e37
Merge pull request #7441 from kareem-wolfssl/zd17857
...
Allow using wolfSSL_CTX_set_default_verify_paths without WOLFSSL_SYS_CA_CERTS defined.
2024-05-09 00:38:04 -04:00
Daniel Pouzzner
76b302381b
Merge pull request #7484 from SparkiDev/mem_fail_fixes_1
...
Mem fail fix: ProcessingBuffer()
2024-05-08 18:36:45 -04:00
Juliusz Sosinowicz
0f06faf3d4
Stub EC_KEY_METHOD
2024-05-08 16:37:30 +02:00
Sean Parkinson
52861cbdbf
Merge pull request #7476 from per-allansson/one-crl-to-rule-them-all
...
An expired CRL should not override a successful match in other CRL
2024-05-08 09:47:22 +10:00
Daniel Pouzzner
97110700b2
Merge pull request #7430 from jpbland1/check-session-setup
...
Add `wolfSSL_SessionIsSetup`
2024-05-07 13:51:33 -04:00
Juliusz Sosinowicz
14ce8ce198
Jenkins fixes
2024-05-07 11:46:36 +02:00
Marco Oliverio
b0c991eeb2
tls13: update error code to NO_CERT_ERROR when no cert is set
2024-05-07 10:55:48 +02:00
Juliusz Sosinowicz
cbd490d1d7
fixup! zephyr no malloc
2024-05-07 10:38:01 +02:00
Per Allansson
b88803cbb3
Fix formatting
2024-05-03 06:43:15 +02:00
Sean Parkinson
75b178f666
Merge pull request #7492 from JacobBarthelmeh/porting
...
remove assumption of struct layout
2024-05-02 07:14:06 +10:00
Sean Parkinson
4594151588
Merge pull request #7418 from ejohnstown/generic-pool
...
Generic Memory Pools
2024-05-01 08:53:56 +10:00
JacobBarthelmeh
5aa39a6397
remove assumption of struct layout
2024-04-30 15:42:38 -06:00
Sean Parkinson
41eaa8466d
Mem fail fix: ProcessingBuffer()
...
When ProcessBufferCertTypes() is not called, 'der' is not freed.
2024-04-29 23:05:29 +10:00
Per Allansson
e96a65a93d
An expired CRL should not override a successful match in other CRL
2024-04-29 09:35:28 +02:00
Daniel Pouzzner
0566584191
implement full support for --enable-intelasm --enable-linuxkm. also add --enable-curve25519=noasm to allow use of the existing NO_CURVED25519_X64 code path by the linuxkm build (fe_x25519_asm.S is not kernel-compatible).
2024-04-27 12:35:23 -05:00
Kareem
c1f23cc505
Allow using wolfSSL_CTX_set_default_verify_paths without WOLFSSL_SYS_CA_CERTS defined.
2024-04-26 10:22:40 -07:00
Kareem
21058820fb
Fix NO_WOLFSSL_STUB typo.
2024-04-26 10:22:40 -07:00
Juliusz Sosinowicz
2328270222
Code review
2024-04-26 15:56:20 +02:00
Juliusz Sosinowicz
49952a97d7
Fix quic header protect cipher return
2024-04-26 14:18:40 +02:00
Daniel Pouzzner
442d3f30cc
src/ssl.c: refactor fix in wolfSSL_RAND_bytes() for race on initGlobalRNG to retain the initial check on initGlobalRNG, and just recheck it, to avoid possible access to uninitialized globalRNGMutex.
2024-04-25 23:47:39 -05:00
Daniel Pouzzner
59290cd066
src/quic.c: fix -Wunused-function for evp_cipher_eq().
2024-04-25 22:09:28 -05:00
Daniel Pouzzner
963e14a1fe
src/ssl.c: code style tweak from peer review.
2024-04-25 22:09:28 -05:00
Daniel Pouzzner
8e8e9bd0eb
src/ssl.c: fix races in wolfSSL_Init() and wolfSSL_RAND_bytes().
2024-04-25 22:09:28 -05:00
Sean Parkinson
c8e51112c3
Merge pull request #7372 from julek-wolfssl/zd/17435
...
Add secret logging callback to TLS <= 1.2
2024-04-26 09:41:58 +10:00
Sean Parkinson
5ee0e34d89
Merge pull request #7465 from julek-wolfssl/issue/7390
...
Clean up EVP usage in quic
2024-04-26 09:38:40 +10:00
Sean Parkinson
54022b146b
Merge pull request #7456 from mrdeep1/enable-dtls13
...
dtls1.3: Fix issues when --enable-dtls13 enabled
2024-04-26 09:24:01 +10:00
Juliusz Sosinowicz
c62faa048c
Add secret logging callback to TLS <= 1.2
2024-04-25 17:11:07 +02:00
Juliusz Sosinowicz
d61fec5af9
Clean up EVP usage in quic
2024-04-25 16:34:38 +02:00
Juliusz Sosinowicz
7644d792b6
Mark all record sequence numbers before stateful parsing as read
...
Fixes https://github.com/wolfSSL/wolfssl/issues/7273
2024-04-25 16:23:41 +02:00
Anthony Hu
329650fb4c
Get rid of some code with NO_OLD_TLS
2024-04-24 16:00:45 -04:00
Jon Shallow
e36df36f84
dtls1.3: Fix issues when --enable-dtls13 enabled
...
Fixed issue reported by scan-build when DTLS13 is enabled.
Fix compile issue when WOLFSSL_DTLS_CH_FRAG is enabled.
Fix running of scripts/dtlscid.test by removing 'set -e' as bwrap
command may not be there.
2024-04-24 12:07:29 +01:00
András Fekete
a75c2befb5
Add CUDA support ( #7436 )
...
* Redirect the AesEncrypt_C call to device
* Fix function declarations
* Force CC=nvcc with CUDA
* Don't let C++ mangle function names
* Add larger parallelization
* Add in memory copy to device
* `nvcc` does not support '-Wall' nor '-Wno-unused'
* Add in README.md
* Clean up script to output color coded data
* Fix Asymmetric cipher comparisons
* Add in standard output parsing in addition to the CSV
* Add option to output results in a CSV
---------
Co-authored-by: Andras Fekete <andras@wolfssl.com >
2024-04-23 08:26:27 -07:00
John Safranek
2168b154b6
Generic Memory Pools
...
1. Modify wolfSSL_CTX_load_static_memory() to use wc_LoadStaticMemory()
instead of reimplementing it.
2. Initialize the pointers in wc_LoadStaticMemory() to null.
3. Whitespace changes.
2024-04-22 08:54:37 -07:00
Sean Parkinson
5bb22d8343
Merge pull request #7439 from JacobBarthelmeh/build_test
...
fix for WOLFSSL_NO_PEM build
2024-04-22 10:48:57 +10:00
Sean Parkinson
e1b66ca62d
Merge pull request #7407 from mrdeep1/key_share
...
Handle PSK-Only negotiation with key_share not being sent in Server Hello
2024-04-22 10:45:56 +10:00
JacobBarthelmeh
78670f5098
Merge pull request #7453 from douzzer/20240419-wolfSSL_CTX_SetTmpDH-double-free
...
20240419-wolfSSL_CTX_SetTmpDH-double-free
2024-04-19 13:48:37 -06:00
Daniel Pouzzner
39e2405e2f
src/ssl_load.c: fix double-free in wolfSSL_CTX_SetTmpDH().
2024-04-19 11:43:32 -05:00
JacobBarthelmeh
5f9ed54aaa
Merge pull request #7451 from SparkiDev/test_fixes_1
...
Fixes from configuration testing
2024-04-19 10:43:31 -06:00
JacobBarthelmeh
9242f611b2
Merge pull request #7449 from lealem47/nginx_stubs
...
Adding stubs required for latest nginx
2024-04-19 10:38:17 -06:00
Jon Shallow
7b22681287
Handle PSK-Only negotiation with key_share not being sent in Server Hello
...
The wrong cipher suite is potentially chosen if key_share is not seen by the client.
$ cat /tmp/test
Client_identitySHA256:0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
Server:
$ gnutls-serv --http --priority NORMAL:+ECDHE-PSK:+PSK:+ECDHE-ECDSA:+AES-128-CCM-8:+CTYPE-CLI-ALL:+CTYPE-SRV-ALL:+SHA256 --pskpasswd=/tmp/test
Client:
$ examples/client/client -vd -g -s -p 5556 2>&1| grep HTTP
2024-04-19 17:14:28 +01:00
Sean Parkinson
97d560d9af
Fixes from configuration testing
...
asn1.c: Allow sample to build without coding (base64 decoding).
set_curves_list(): function for ECC, Ed25519, Ed448 but this block of
code is ECC only. Fixed #ifdef protection.
wolfSSL_CTX_set1_curves_list and wolfSSL_set1_curves_list also available
when Curve25519/Curve448 compiled in but not ECC.
2024-04-19 08:40:19 +10:00
Lealem Amedie
7a7af18887
Guard with OPENSSL_EXTRA instead of WOLFSSL_NGINX
2024-04-18 16:33:37 -06:00
JacobBarthelmeh
fe671f72e1
Merge pull request #7435 from SparkiDev/ssl_misc_fixup
...
ssl_misc.c: wolfssl_file_len() protection
2024-04-18 14:36:38 -06:00