JacobBarthelmeh
629c5b4cf6
updating license from GPLv2 to GPLv3
2025-07-10 16:11:36 -06:00
David Garske
4c6279c6c7
Good feedback about adding wolfCrypt error codes to .cs layer. Partially added useful ones.
2025-06-20 09:41:35 -07:00
David Garske
9b50708741
Fix to expose API to access "store" error code and error depth for cert failure callback (from set_verify). Useful for C# wrapper or clients that cannot directly dereference X509_STORE. Fixes for building with WOLFSSL_EXTRA and WOLFSSL_NO_CA_NAMES (and added new tests). Added example in CSharp TLS client for overriding a begin date error (useful if date is not set).
2025-06-19 14:49:00 -07:00
JacobBarthelmeh
ecb8cb744e
Merge pull request #8799 from dgarske/csharp_wince_unicode
...
Fix issue with CSharp and Windows CE with conversion of ASCII and Unicode
2025-06-02 10:39:23 -06:00
David Garske
18aab1a883
Further improvements to MultiByte and WideChar conversions.
2025-05-28 15:35:10 -07:00
Takashi Kojo
7b8f30bb25
fix Release build
2025-05-24 14:03:55 +09:00
David Garske
db0b0e28d2
Fix issue with CSharp and Windows CE with conversion of ASCII->Unicode and Unicode->ASCII with odd length and extra null terminator.
2025-05-22 16:34:54 -07:00
JacobBarthelmeh
3f9fe491cc
adjust C# test and set rng with hpke case
2025-05-07 14:33:15 -06:00
mgrojo
e6e64515c7
Ada: prepare inclusion of v5.8.0 in Alire index
2025-04-25 20:56:06 +02:00
David Garske
42644a55fb
Fixes for building with .NET 3.5 (new WindowsCE macro). Fix for build error with NO_WOLFSSL_MSG_EX. Fix for ECC TFM option (only set with TFM).
2025-04-14 16:07:03 -07:00
JacobBarthelmeh
3ff4e5e303
Merge pull request #8606 from mgrojo/feature/alire-usability
...
Ada: preparation for Alire index and fixes detected by GNATprove
2025-04-04 11:07:29 -06:00
mgrojo
e6f09b8372
Ada: fixes for the No_Secondary_Stack restriction
...
- Align README.md and GPR files with the fact that the server no longer compiles with the No_Secondary_Stack restriction.
- Fix include.am to reference the new name for the adc file.
2025-03-31 23:27:31 +02:00
mgrojo
98eda78857
Ada: fix issues in tls_server.adb detected by gnatprove
...
Checked with:
```
gnatprove -Pdefault.gpr --level=4 -j12
```
2025-03-28 19:33:42 +01:00
mgrojo
bf5009b544
Ada: fix initialization issue in examples
...
Detected by
```
gnatprove -Pclient.gpr --level=4 -j12
```
2025-03-28 18:38:22 +01:00
mgrojo
db4ebfb77e
Allow use of the library with an Alire pin
...
- Allow enabling WOLFSSL_STATIC_PSK via an Alire configuration variable
- `gnat.adc` applies unconditionally when using the library through Alire, so it has been renamed and used only in the default project file.
- Clean-up of the Alire project file `wolfssl.gpr`.
2025-03-28 18:16:06 +01:00
Sean Parkinson
a7690ca24b
ML-KEM/Kyber: finish name change
2025-03-10 08:37:14 +10:00
JacobBarthelmeh
2c24291ed5
update copyright date
2025-01-21 09:55:03 -07:00
mgrojo
8122181e45
Ada binding: add support for the PSK server callbacks
...
Plus fix location of the certificate files in the examples.
Tested with both Ada examples:
```
obj/tls_server_main --psk
obj/tls_client_main 127.0.0.1 --psk
```
2025-01-09 00:11:01 +01:00
mgrojo
815f99d0c2
Ada binding: improve comments and arguments in the PSK case
...
- Add comments for the PSK value in the example.
- Add runtime argument for executing the PSK test.
- Warn user that their callback implementation can't be in the SPARK subset.
2025-01-07 23:12:14 +01:00
mgrojo
11a40a610e
Ada binding: add support for PSK client callback
...
Tested with:
`wolfSSL/wolfssl-examples/psk/server-psk.c`
after changing `DTLSv1_3_Client_Method` to `DTLSv1_2_Client_Method` to comply with the server example.
2025-01-04 20:03:04 +01:00
JacobBarthelmeh
70e41d1ed1
prepare for release 5.7.6
2024-12-31 08:27:53 -07:00
Andrew Hutchings
158d62591f
Fix broken verify on Ada wrapper
...
The Ada wrapper had an `&` operator for the verification mode. This
effectively caused the verification mode to equal `0`.
The operator has been switched to `or` now, in addition, a getter has
been added to the API. This allows for the test I've added to the server
code to verify that it is being set correctly.
`OPENSSL_ALL` flag added to Ada so that the verify mode getter function
is compiled in.
Fixes #7461
Thanks to @dalybrown for reporting it.
2024-12-06 12:44:15 +00:00
Andras Fekete
e14abbdc79
Cleanup spelling
2024-11-01 12:59:01 -04:00
JacobBarthelmeh
dd2b191c36
update version listed in wolfssl-fips.rc and Ada wrapper
2024-10-24 14:19:17 -06:00
Daniel Pouzzner
996986d0c1
refactor wc_AesDelete, wc_curve25519_delete, wc_ed25519_delete, wc_HashDelete, and wc_DeleteRsaKey to take two arguments, the first a required pointer to the object, the second an optional pointer to the pointer to be zeroed upon successful deletion, for the benefit of calling from C# without unsafe code.
...
wrapper/CSharp/wolfSSL_CSharp/wolfCrypt.cs: update for new calling conventions around wc_AesNew, wc_curve25519_new, wc_ed25519_new, wc_HashNew, and wc_NewRsaKey, and the corresponding delete functions.
2024-10-18 21:13:38 -05:00
Aidan Garske
e10c943bf3
wolfCrypt CSharp Wrapper:
...
* Adds RNG, ECC(ECIES and ECDHE), RSA, ED25519/Curve25519, AES-GCM, and Hashing to the CSharp wrapper.
* Adds GitHub action for building the CSharp wrapper solution and running wolfCrypt test and a TLS server/client example.
* Adds "new" API's for wolfCrypt for platforms that cannot tolerate the structs directly.
* Fixes for several scan-build warnings.
2024-10-05 11:44:58 -07:00
Daniel Pouzzner
a3fb5029f8
clean up trailing whitespace and misplaced CRLFs, add missing final newlines, remove stray UTF8 nonprintables (BOMs) and ASCIIfy stray homoglyphs (spaces and apostrophes), guided by expanded coverage in wolfssl-multi-test check-source-text.
2024-09-05 14:52:18 -05:00
Irvise
2a96981dbe
Ada binding: correct Alire manifest and fix build
2024-09-04 09:42:24 +02:00
Daniel Pouzzner
4d837e74c4
Merge pull request #7303 from Irvise/master
...
[Ada] Initial library support
2024-08-31 00:26:29 -05:00
Fernando Oleo Blanco
5ea22effcc
Update documentation
2024-08-13 10:56:25 +02:00
David Garske
537827ebde
Add missing config.h on some .c files.
2024-08-12 09:29:07 -07:00
Fernando Oleo Blanco
bec3cd8b6f
Document Alire use
2024-08-11 18:36:54 +02:00
Fernando Oleo Blanco
ae7e7e716a
Update upstream
2024-08-10 13:56:14 +02:00
JacobBarthelmeh
31a6a2bf59
update copyright to 2024
2024-07-19 13:15:05 -06:00
gasbytes
91cad98d67
1023 <- 1024, changed buffer to textmate
2024-06-27 17:35:43 +02:00
gasbytes
97adb4be6e
fixed wolfSSL_SNI_GetFromBuffer
2024-06-27 17:03:05 +02:00
gasbytes
6dd43caae9
wolfSSL_SNI_GetRequest working, fixing up wolfSSL_SNI_GetFromBuffer
2024-06-27 15:05:02 +02:00
gasbytes
453e2fadc1
dh2048Pem -> dhparam
2024-06-05 17:45:34 +02:00
gasbytes
2ab709c89a
- Platform specific function to correctly set the path for the certificates;
...
- Updated all the examples with it;
2024-06-05 13:28:30 +02:00
gasbytes
6cb97a7262
fixed windows build path problem
2024-06-04 23:12:16 +02:00
gasbytes
f231c7be03
updated the README & haveSNI function
2024-06-04 23:08:56 +02:00
gasbytes
70fc5c97fb
made the workflow to compile & executes easier, updated the readme also
2024-06-04 19:13:51 +02:00
gasbytes
983610ed68
- Applied David's patch to get access to the missing sni callback (arg)
...
- removed tlsext callback (since it's a compatibility one)
- updated testing examples and wrapper
2024-06-04 18:26:01 +02:00
gasbytes
5d0b7e0d18
updated readme & sni function
2024-06-04 17:54:21 +02:00
gasbytes
b2e7707f18
removed sniHostName no longer used
2024-06-03 21:33:55 +02:00
gasbytes
c04c7685b1
added callback example: setting sni cb & arg server side, and passing the name client side via -S flag
2024-06-03 21:24:54 +02:00
gasbytes
c325de993d
removed WOLFSSL_SNI_HOST_NAME_OUTER && minor fix (missing sniHostName got lost during editing)
2024-06-03 20:05:00 +02:00
gasbytes
6f567b58bc
completed the examples
2024-06-02 00:01:51 +02:00
gasbytes
15ac366bf9
added missing wrappers for sni setup & frees
2024-06-01 17:46:17 +02:00
gasbytes
52f1caf699
minor changes to the prototypes and actual implementation
2024-05-30 16:44:34 +02:00