Daniel Pouzzner
59cdd5c70f
Merge pull request #7082 from bandi13/ARIA_Sign_fix
...
Aria sign fix
2023-12-21 19:01:54 -05:00
Sean Parkinson
f77f7c70d3
Merge pull request #7018 from dgarske/ti_aes
...
Fixes for TI AES and SHA
2023-12-22 07:55:00 +10:00
Andras Fekete
b5592c4571
Addressing PR comments
2023-12-21 16:48:15 -05:00
Sean Parkinson
00c9625ab8
Merge pull request #7081 from gojimmypi/PR-Espressif-ESP32-C2
...
Add wolfcrypt SHA support for ESP32-C2/ESP8684, other minor updates
2023-12-22 07:23:51 +10:00
Sean Parkinson
a5a2b3752d
Merge pull request #7077 from gojimmypi/PR-Espressif-threads
...
wolfSSL_NewThread() type update for Espressif FreeRTOS
2023-12-22 07:22:33 +10:00
David Garske
00f196d497
Fix for invalid dh_ffdhe_test test with even P when using Intel QuickAssist.
2023-12-20 11:30:17 -08:00
Andras Fekete
77e8a66ca3
Not cryptocb's job to sanity check input
...
Don't need to check parameters at every level
2023-12-19 15:55:38 -05:00
Andras Fekete
12192b7683
Set result to invalid as first step
2023-12-19 15:54:25 -05:00
Andras Fekete
f45ffd8802
Rename variable to keep the names similar across functions
2023-12-19 15:37:58 -05:00
Andras Fekete
9e974027a8
Fix ARIA signing
...
Used the wrong function to extract key
2023-12-19 15:33:28 -05:00
gojimmypi
07a5566c52
Add wolfcrypt SHA support for ESP32-C2, other minor updates
2023-12-18 17:35:43 -08:00
gojimmypi
da644c7be3
wolfSSL_NewThread() type update for Espressif FreeRTOS
2023-12-17 11:59:42 -08:00
Daniel Pouzzner
ef14176b7f
SRTP fixes:
...
* in wolfssl/ssl.h, add missing arg names to wolfSSL_CTX_set_tlsext_use_srtp(), wolfSSL_set_tlsext_use_srtp(), and wolfSSL_export_dtls_srtp_keying_material();
* in wolfcrypt/src/kdf.c, call wc_AesFree if and only if wc_AesInit() succeeded;
* in src/ssl.c:DtlsSrtpSelProfiles(), fix bugprone-inc-dec-in-conditions;
* in tests/suites.c:execute_test_case(), fix several -Wdeclaration-after-statement and -Wmissing-field-initializers;
* in wolfcrypt/test/test.c, fix a shiftTooManyBitsSigned warning in srtpkdf_test(), and fix a typo (kaSz/ksSz).
2023-12-15 14:06:36 -06:00
David Garske
4b771a9b28
Document new macro and rename to: NO_TIME_SIGNEDNESS_CHECK
2023-12-14 13:58:29 -08:00
Chris Conlon
27c6ee4d05
Merge pull request #7068 from SparkiDev/srtp_kdf_label
...
SRTP/SRTCP KDF: add APIs that derives one key from a label
2023-12-14 14:54:58 -07:00
Chris Conlon
fb6b022f42
Merge pull request #7020 from SparkiDev/ecc_gen_k_by_reject
...
ECC: generate values in range of order by rejection
2023-12-14 14:54:39 -07:00
David Garske
8b048bc246
Disable the old TI workarounds. Enable support for CCM.
2023-12-14 13:50:03 -08:00
David Garske
1cf87ce0c9
Spelling fix.
2023-12-14 12:14:30 -08:00
Chris Conlon
f6ef58dbc2
Merge pull request #7064 from philljj/fix_infer_issues
...
Fix issues from infer diff report.
2023-12-14 12:27:34 -07:00
Chris Conlon
1b76f6d56b
Merge pull request #7065 from miyazakh/fix_ra6m3
...
fix benchmark compile error
2023-12-14 09:15:32 -07:00
Sean Parkinson
659a245b27
SRTP/SRTCP KDF: add APIs that derives one key from a label
...
Added more generic APIs that derive a single key with a label.
Added defines for label values and index lengths.
2023-12-14 14:45:35 +10:00
Hideki Miyazaki
3af91c265b
remove tab
2023-12-14 11:16:36 +09:00
David Garske
0bc244962a
Fixes for TI AES GCM and GMAC.
2023-12-13 17:32:45 -08:00
Chris Conlon
d36538c40a
Merge pull request #7063 from embhorn/13dec2023_cov_fixes
...
Fixes for release
2023-12-13 16:19:13 -07:00
jordan
a1b44b6214
Fix issues from infer diff report: init mp_digit to 0.
2023-12-13 17:17:49 -06:00
Hideki Miyazaki
f209120218
fix benchmark compile error
2023-12-14 07:35:32 +09:00
Chris Conlon
a66137d2fe
Merge pull request #7062 from lealem47/leaks
...
Cleanup leaks in api.c and benchmark.c
2023-12-13 14:09:23 -07:00
Eric Blankenhorn
1d7fd42aa8
Fixes for release
2023-12-13 14:47:02 -06:00
Lealem Amedie
5fd0470f76
Cleanup leaks in api.c and benchmark.c
2023-12-13 13:00:52 -07:00
Chris Conlon
3d959b96c9
Merge pull request #7060 from dgarske/various_20231212
...
Fix for benchmark without filesystem unused globals
2023-12-13 11:29:28 -07:00
Sean Parkinson
b7b20ededd
Merge pull request #7058 from lealem47/zd17174
...
Check buffer length before XMEMCMP in GetOID
2023-12-13 14:36:23 +10:00
Lealem Amedie
2724edc257
Check buffer length before XMEMCMP in GetOID
2023-12-12 15:13:42 -07:00
Sean Parkinson
ce74a34154
Merge pull request #7019 from dgarske/armasm_mmcau
...
Patch to support NXP Kinetis MMCAU SHA2-256 with ARM ASM
2023-12-13 07:26:11 +10:00
David Garske
3750ff5205
Fix for benchmark without filesystem and unused hash_input and cipher_input.
2023-12-12 13:22:17 -08:00
Sean Parkinson
21f53f37a1
ECC: generate values in range of order by rejection
...
When generating private key and nonce for ECDSA, use rejection sampling.
Note: SP uses this algorithm
2023-12-12 14:55:56 +10:00
David Garske
058ffad657
Fix cast warnings on test with -1.
2023-12-11 16:25:47 -08:00
David Garske
8e44018baa
Fix TI AES return codes.
2023-12-11 16:10:48 -08:00
David Garske
68cfaa76fc
Fix for TI-RTOS time. Cleanup forced settings.h for WOLFSSL_TIRTOS. Compiler warning cleanups.
2023-12-11 15:57:26 -08:00
Daniel Pouzzner
c1b5135918
wolfcrypt/src/evp.c and wolfcrypt/test/test.c: in FIPS builds <5.3, gate out AES-XTS functionality that depends on new APIs added in #7031 ( b14aba48af and 931ac4e568) (AES-XTS is non-FIPS in FIPS <5.3).
2023-12-11 12:14:29 -06:00
Daniel Pouzzner
9c17d5d2fa
support ASN ShortInts up to 4 bytes (2^32-1):
...
* parameterize MAX_LENGTH_SZ using overrideable WOLFSSL_ASN_MAX_LENGTH_SZ, default value 5 (raised from 4).
* refactor other Misc_ASN constants to refer to MAX_LENGTH_SZ as appropriate.
* tweak BytePrecision() appropriately.
* refactor SetShortInt() to use BytePrecision() and include a length assert against MAX_SHORT_SZ to assure no buffer overruns with reduced WOLFSSL_ASN_MAX_LENGTH_SZ.
2023-12-11 12:14:29 -06:00
David Garske
b5eb8995c9
Fix possible unused variable warning.
2023-12-11 09:22:47 -08:00
JacobBarthelmeh
ac447d1afb
Merge pull request #7031 from douzzer/20231201-openssl-compat-fixes
...
20231201-openssl-compat-fixes
2023-12-08 17:25:53 -07:00
JacobBarthelmeh
f708d42ef7
Merge pull request #7046 from dgarske/crl_cleanups
...
Various cleanups - CRL and comments - 20231207
2023-12-08 17:15:01 -07:00
David Garske
8a5a467543
Patch to support NXP Kinetis MMCAU SHA2-256 (FREESCALE_MMCAU_CLASSIC_SHA) with --enable-armasm.
2023-12-08 15:56:20 -08:00
David Garske
b002c330c0
Fixes for TI AES and SHA.
2023-12-08 14:17:09 -08:00
David Garske
df954568be
Fix typos 2.
2023-12-08 14:17:09 -08:00
David Garske
842a60465a
Fix compiler error for missing Task_Handle. Fix typo.
2023-12-08 14:17:08 -08:00
David Garske
d17955f2d0
Cleanups for the ti-aes.c code to conform with coding standards.
2023-12-08 14:17:08 -08:00
gojimmypi
62c0910e15
sync w/upstream; resolve merge conflict
2023-12-08 09:06:10 -08:00
JacobBarthelmeh
448b83697a
Merge pull request #7035 from gojimmypi/PR-Espressif-wolfcrypt
...
Espressif wolfcrypt updates
2023-12-08 09:07:46 -07:00