Jacob Barthelmeh
511f41b0e4
fix C++ compiler warnings for distro build
2016-12-27 14:38:14 -07:00
Jacob Barthelmeh
54c51ec4a0
static analysis : Fix warnings with wc_AesCcmSetKey
2016-10-12 10:02:53 -06:00
toddouska
67a112773e
fix secure renegotiation
2016-09-19 17:31:20 -07:00
toddouska
21726d5ae4
64bit sequence tls proof of concept, dlts needs some work
2016-09-19 16:02:27 -07:00
David Garske
17a34c5899
Added asynchronous wolfCrypt RSA, TLS client and Cavium Nitrox V support. Asynchronous wolfSSL client support for "DoServerKeyExchange", "SendClientKeyExchange", "SendCertificateVerify" and "DoCertificateVerify". Fixes for async DTLS. Refactor of the wolf event and async handling for use in wolfCrypt. Refactor of the async device support so its hardware agnostic. Added Cavium Nitrox V support (Nitrox tested using SDK v0.2 CNN55XX-SDK with new configure "--with-cavium-v=/dir" option). Moved Nitrox specific functions to new port file "port/cavium/cavium_nitrox.c". RSA refactor to handle async with states. RSA optimization for using dpraw for private key decode. Use double linked list in wolf event for faster/cleaner code. Use typedef for wolf event flag. Cleanup of the async error codes. wolfCrypt test and benchmark support for async RSA. Asynchronous mode enabled using "./configure --enable-asynccrypt". If no async hardware is defined then the internal async simulator (WOLFSSL_ASYNC_CRYPT_TEST) is used. Note: Using async mode requires async.c/h files from wolfSSL. If interested in using asynchronous mode please send email to info@wolfssl.com.
2016-08-15 13:59:41 -06:00
John Safranek
2f9c9b9a22
Add cipher suite ECDHE-ECDSA-AES128-CCM
...
1. Added the usual cipher suite changes for the new suite.
2. Added a build option, WOLFSSL_ALT_TEST_STRINGS, for testing
against GnuTLS. It wants to receive strings with newlines.
3. Updated the test configs for the new suite.
Tested against GnuTLS's client and server using the options:
$ gnutls-cli --priority "NONE:+VERS-TLS-ALL:+AEAD:+ECDHE-ECDSA:+AES-128-CCM:+SIGN-ALL:+COMP-NULL:+CURVE-ALL:+CTYPE-X509" --x509cafile=./certs/server-ecc.pem --no-ca-verification -p 11111 localhost
$ gnutls-serv --echo --x509keyfile=./certs/ecc-key.pem --x509certfile=./certs/server-ecc.pem --port=11111 -a --priority "NONE:+VERS-TLS-ALL:+AEAD:+ECDHE-ECDSA:+AES-128-CCM:+SIGN-ALL:+COMP-NULL:+CURVE-ALL:+CTYPE-X509"
To talk to GnuTLS, wolfSSL also needed the supported curves option
enabled.
2016-06-13 14:39:41 -07:00
Jacob Barthelmeh
38bbd41f99
add EDH-RSA-AES256-SHA, used in one mysql test
2016-05-03 09:22:16 -06:00
Jacob Barthelmeh
e99a5b0483
prepare for release v3.9.0
2016-03-17 16:02:13 -06:00
Jacob Barthelmeh
49b547db08
make QSH debug compile for C89
2016-03-09 17:15:28 -07:00
Jacob Barthelmeh
3ce64da44c
ChaCha20-Poly1305 PSK cipher suites
2016-02-04 09:50:29 -07:00
Jacob Barthelmeh
5a9175a758
add cipher suite ECDHE-PSK-AES128-SHA256 and adjustments to ECDHE-PSK
2016-02-04 09:39:34 -07:00
Jacob Barthelmeh
d04a7e802a
add ECDHE-PSK and cipher suite ECDHE-PSK-NULL-SHA256
2016-02-03 13:44:13 -07:00
Jacob Barthelmeh
93c54c07ea
cipher suite ECDHE-ECDSA-NULL-SHA
2016-02-01 14:43:17 -07:00
Jacob Barthelmeh
611e37b3e8
naming for AEAD macros and TLSX with chacha-poly
2016-01-29 09:38:13 -07:00
Jacob Barthelmeh
7d71d756f3
update ChaCha20-Poly1305 to most recent RFCs
2016-01-27 14:03:05 -07:00
Chris Conlon
0801eeac8d
update support for Freescale KSDK 1.3.0
2016-01-25 10:41:26 -07:00
toddouska
eed40eb690
add aes256 key derivation to ssl3
2015-12-15 11:54:03 -08:00
toddouska
ca7956b50d
update cavium nitrox port to wolfssl
2015-11-16 13:20:19 -08:00
Ludovic FLAMENT
f68400da40
add IDEA cipher (ECB and CBC mode)
...
add support of SSL_RSA_WITH_IDEA_CBC_SHA cipher suite (SSLv3, TLS v1.0 and TLSv1.1)
2015-09-23 16:16:39 +02:00
toddouska
21cf0e437e
add --enable-cryptonly build option
2015-09-10 16:24:25 -07:00
Chris Conlon
0cd893a51b
Freescale: Use new I/O where applicable
2015-08-07 16:22:31 -06:00
Jacob Barthelmeh
df8b48cd0f
NTRU suites from earlier code
2015-07-11 12:52:22 -06:00
Jacob Barthelmeh
14723b7e65
QSH (quantum-safe handshake) extension
2015-07-07 09:55:58 -06:00
toddouska
d67a031132
fix scr gcm mode
2015-04-05 09:13:11 -07:00
toddouska
3ca0bc0d66
fix windows warning
2015-03-29 14:31:09 -07:00
toddouska
32c9f00189
only alloc poly auth size if cipher suite needs it
2015-03-27 15:38:01 -07:00
toddouska
43918fa0dc
Merge branch 'pic32mz' of https://github.com/kojo1/wolfssl into kojo-pic32
2015-02-19 17:58:21 -08:00
toddouska
d5b249754b
make sure poly1305 and chacha defined for chacha-poly aead mode
2015-02-19 14:33:21 -08:00
kaleb-himes
c516c42c9a
reduce footprint size removing compatibility layer where no longer needed
2015-02-17 14:20:10 -07:00
kaleb-himes
81b6c7ff7a
encrypt shadowing global in unistd.h fix
2015-01-28 11:18:13 -07:00
Jacob Barthelmeh
2d3c607acd
handel poly1305 warning and clean up commented out compatibility layer includes
2015-01-08 15:33:44 -07:00
kaleb-himes
a389620a29
Copyright (C) updates
2015-01-08 09:39:04 -07:00
Jacob Barthelmeh
f64d76257e
readjust c files, autoconf, and some header files
2015-01-02 14:56:58 -07:00
Jacob Barthelmeh
5365bdb06c
debugging on name change
2015-01-01 07:33:07 -07:00
Jacob Barthelmeh
f81ee9e4d3
addition to aes and alteration to md files
2014-12-31 13:54:57 -07:00
kaleb-himes
c57609acc3
wc_ udates in src/ directory
2014-12-30 14:13:57 -07:00
Jacob Barthelmeh
5eef118ff5
test and debug of poly-chacha suites
2014-12-30 10:30:54 -07:00
Kaleb Himes
8212f5df46
src and compatability layer updates
2014-12-19 12:50:30 -07:00
Kaleb Himes
c97db6ba6e
src updated, CTaoCrypt -> wc_
2014-12-19 11:27:01 -07:00
Jacob Barthelmeh
e6a629118c
api calls to crypt library in portibality layer
2014-12-18 14:23:33 -07:00
Kaleb Himes
a073730c38
compatibility layer includes
2014-12-18 14:06:27 -07:00
Jacob Barthelmeh
813ad2e102
name change progress
2014-12-17 09:58:11 -07:00
John Safranek
1742e0ddb6
Merge in the ADH-AES128-SHA changes and add a check for it during the
...
packet order sanity checking.
2014-12-01 11:44:32 -08:00
toddouska
c982dd2281
allow aes gcm fips wrappers, no void returns
2014-10-27 15:52:22 -07:00
Jacob Barthelmeh
f5a95a9f62
struct for one time authentication ciphers
2014-09-25 16:19:50 -06:00
toddouska
0c20584ed3
add client side initiated secure r, same specs
2014-09-24 18:48:23 -07:00
toddouska
21f46373f3
delay SetKeys() with SetKeysSide() until last possible moment, needed for scr
2014-09-24 11:27:13 -07:00
toddouska
ed1beafdfc
allow SetKeys() to be called with encrypt or decrypt, or both
2014-09-24 10:12:22 -07:00
Moisés Guimarães
1a8d06a0e3
keys: fixing DeriveKeys:
...
--- variables md5InputSz, shaInputSz and keyDataSz removed
keys: refactoring MakeSslMasterSecret to reduce stack usage:
--- variable shaOutput moved to the heap (20 bytes saved)
--- variable md5Input moved to the heap (532 bytes saved)
--- variable shaInput moved to the heap (579 bytes saved)
--- variable md5 moved to the heap (sizeof(Md5) saved)
--- variable sha moved to the heap (sizeof(Sha) saved)
2014-08-11 14:17:44 -07:00
Moisés Guimarães
39c167710f
keys: refactoring DeriveKeys to reduce stack usage:
...
--- variable shaOutput moved to the heap (20 bytes saved)
--- variable md5Input moved to the heap (68 bytes saved)
--- variable shaInput moved to the heap (119 bytes saved)
--- variable keyData moved to the heap (112 bytes saved)
--- variable md5 moved to the heap (sizeof(Md5) saved)
--- variable sha moved to the heap (sizeof(Sha) saved)
2014-08-05 15:28:30 -07:00