David Garske
978a29da0b
Merge pull request #8898 from cconlon/getpidOptionsH
...
Add HAVE_GETPID to options.h if getpid detected
2025-06-23 17:11:55 -07:00
JacobBarthelmeh
9ee212cacc
fix for free'ing memory with test case
2025-06-23 17:33:52 -06:00
David Garske
9b50708741
Fix to expose API to access "store" error code and error depth for cert failure callback (from set_verify). Useful for C# wrapper or clients that cannot directly dereference X509_STORE. Fixes for building with WOLFSSL_EXTRA and WOLFSSL_NO_CA_NAMES (and added new tests). Added example in CSharp TLS client for overriding a begin date error (useful if date is not set).
2025-06-19 14:49:00 -07:00
David Garske
7d77446964
Merge pull request #8882 from rizlik/dtls13_always_transmit_explicit_ack
...
dtls13: always send ACKs on detected retransmission
2025-06-17 11:35:07 -07:00
Josh Holtrop
3bd9b2e0bc
Add generation instructions for empty issuer cert and change expiry to 100 years
2025-06-16 11:39:01 -04:00
Marco Oliverio
b1b49c9ffb
dtls13: always send ACKs on detected retransmission
...
Otherwise the connection can stall due the indefinite delay of an explicit ACK,
for exapmle:
-> client sends the last Finished message
<- server sends the ACK, but the ACK is lost
-> client rentrasmit the Finished message
- server delay sending of the ACK until a fast timeout
-> client rentrasmit the Finished message quicker than the server timeout
- server resets the timeout, delaying sending the ACK
-> client rentrasmit the Finished...
2025-06-16 14:19:32 +02:00
Marco Oliverio
509491f554
dtls13: wolfSSL_is_init_finished true after last server ACK
...
Do not consider the handshake finished until the last server ACK.
This way the application knows where to switch from
wolfSSL_negotiate/wolfSSL_connect to wolfSSL_read/wolfSSL_write.
2025-06-16 14:19:31 +02:00
Josh Holtrop
8bde5e6982
Fix printing empty names in certificates
...
The empty-issuer-cert.pem certificate was created with:
wolfssl genkey rsa -size 2048 -out mykey -outform pem -output KEY
wolfssl req -new -days 3650 -key mykey.priv -out empty-issuer-cert.pem -x509
Prior to this fix this command would error printing the certificate:
wolfssl x509 -inform pem -in empty-issuer-cert.pem -text
2025-06-13 11:22:52 -04:00
David Garske
2fc1110a13
Merge pull request #8587 from lealem47/gh8574
...
Fix bug in ParseCRL_Extensions
2025-06-12 12:09:52 -07:00
David Garske
701e3ba64e
Merge pull request #8808 from rlm2002/coverity
...
Coverity: api.c fix
2025-06-12 12:03:14 -07:00
David Garske
6571f42cb9
Merge pull request #8867 from JacobBarthelmeh/rng
...
Improvements to RNG and compatibility layer
2025-06-11 14:31:53 -07:00
JacobBarthelmeh
8ee1f8f287
add macro guard on test case
2025-06-11 10:43:47 -06:00
JacobBarthelmeh
47cf634965
add a way to restore previous pid behavior
2025-06-10 16:12:09 -06:00
JacobBarthelmeh
4207affc72
adding additional RAND test cases
2025-06-10 16:01:52 -06:00
Ruby Martin
d0134f2212
coverity: address reuse after free, add NULL checks
2025-06-10 15:33:47 -06:00
Ruby Martin
a7a5062c7a
add api test for checking domain name
...
use SNI example.com in client ssl
2025-06-10 15:22:01 -06:00
JacobBarthelmeh
eb3c324ea4
Merge pull request #8852 from holtrop/reseed-drbg-in-rand-poll-test
...
Add additional compatibility layer RAND tests
2025-06-10 10:20:46 -06:00
JacobBarthelmeh
94f5948f20
Merge pull request #8858 from rizlik/dtls13_set_epoch_fix
...
dtls13: move Dtls13NewEpoch into DeriveTls13Keys
2025-06-10 09:48:58 -06:00
Josh Holtrop
1c6e3d729a
Check that fork() returns >= 0 in RAND_poll fork test
2025-06-10 06:23:06 -04:00
Josh Holtrop
133e238359
Wait on child process in RAND_poll fork test
2025-06-09 15:59:22 -04:00
Koji Takeda
0260ff789b
Clarify supported PKCS12 encryption algorithms
2025-06-09 12:03:47 +09:00
Marco Oliverio
c1c1929e55
dtls13: move Dtls13NewEpoch into DeriveTls13Keys
...
Dlts13NewEpoch saves the keys currently derived in the ssl object.
Moving Dtls13NewEpoch inside DeriveTls13Keys avoid the risk of using the wrong
keys when creating a new Epoch.
This fixes at least he following scenario:
- Client has encryption epoch != 2 in the handshake (eg. due to rtx)
- Client derives traffic0 keys after receiving server Finished message
- Client set encryption epoch to 2 again to send the Finished message, this
override the traffic key computed
- Client creates the new epoch with the wrong key
2025-06-09 02:35:29 +02:00
Josh Holtrop
10b3cc8dd2
Add fork test for RAND_poll()
2025-06-06 20:45:01 -04:00
JacobBarthelmeh
9ffca6b39c
Merge pull request #8822 from kojiws/support_cert_aes_cbc_on_pkcs12_export
...
Support PBE_AES(256|128)_CBC certificate encryptions on wc_PKCS12_create()
2025-06-06 11:35:13 -06:00
JacobBarthelmeh
45306e9378
Merge pull request #8845 from rlm2002/coverityTests
...
Coverity: test adjustments and variable checks
2025-06-06 11:29:56 -06:00
JacobBarthelmeh
570c1fc390
Merge pull request #8824 from JeremiahM37/tlsCurveFix
...
tls fix for set_groups
2025-06-06 10:47:06 -06:00
JacobBarthelmeh
bfc55d9016
Merge pull request #8848 from julek-wolfssl/gh/8841
...
dtlsProcessPendingPeer: correctly set the current peer
2025-06-06 09:52:35 -06:00
JacobBarthelmeh
3ecc58cc0e
Merge pull request #8842 from julek-wolfssl/zd/19966
...
ALT_NAMES_OID: Mark IP address as WOLFSSL_V_ASN1_OCTET_STRING
2025-06-05 17:07:47 -06:00
Juliusz Sosinowicz
736a5e1f89
dtlsProcessPendingPeer: correctly set the current peer
2025-06-06 00:12:38 +02:00
Juliusz Sosinowicz
0ac6ca3cf7
Fix hard tabs and c++ style comments
2025-06-05 22:04:50 +02:00
Juliusz Sosinowicz
761f0f1d1f
Simplify TLSX_SupportedCurve_Parse
...
Server only uses curves that are supported by both the client and the server. If no common groups are found, the connection will fail in TLS 1.2 and below. In TLS 1.3, HRR may still be used to resolve the group mismatch.
2025-06-05 22:04:49 +02:00
JeremiahM37
9d342bae83
unit tests for set_groups curve fix
2025-06-05 22:04:49 +02:00
Ruby Martin
a413be1984
remove null assignment, add null check
2025-06-05 12:25:50 -06:00
Juliusz Sosinowicz
f2584fd5fa
ALT_NAMES_OID: Mark IP address as WOLFSSL_V_ASN1_OCTET_STRING
2025-06-05 19:17:00 +02:00
Chris Conlon
e51702043f
Merge pull request #8837 from BridgerVoss/code_cov
...
Unit test for Dh.c code coverage
2025-06-05 09:37:42 -06:00
Chris Conlon
a17b3b4985
Merge pull request #8831 from JeremiahM37/UnitTest
...
Unit test for wolfcrypt pkcs12 file to improve code coverage
2025-06-05 09:30:48 -06:00
Koji Takeda
1f78923590
Add a test for mixture of algorithms
2025-06-05 09:26:44 +09:00
JeremiahM37
a6580d3916
Unit test for wolfcrypt pkcs12 file to improve code coverage
2025-06-04 16:01:35 -06:00
Bridger Voss
80c6ac141a
Unit test for Dh.c wc_DhSetNamedKey code coverage
2025-06-04 15:48:52 -06:00
Sebastian Carpenter
a29d12fd3f
WOLFSSL_ASN_ALLOW_0_SERIAL not handled in make check
...
test_MakeCertWith0Ser needed an extra #define check for WOLFSSL_ASN_ALLOW_0_SERIAL. Previously, it was validating that a 0 serial should not work -> now it validates that a 0 serial does work.
2025-06-04 12:21:41 -06:00
Lealem Amedie
02a49693e2
Fix bug in ParseCRL_Extensions
2025-06-04 10:23:53 -06:00
Koji Takeda
7c33096398
Support PBE_AES256_CBC and PBE_AES128_CBC cert encryption on wc_PKCS12_create()
2025-06-04 16:43:30 +09:00
Sean Parkinson
8ea01056c3
Merge pull request #8788 from julek-wolfssl/gh/8765
...
tls13: handle malformed CCS and CCS before CH
2025-05-28 09:45:09 +10:00
Ruby Martin
2eddc32eed
coverity: fix use after free, improper use of negative value, initialize src variable
2025-05-27 09:43:44 -06:00
Juliusz Sosinowicz
2ec6b92b41
tls13: handle malformed CCS and CCS before CH
...
- fix incorrect alert type being sent
- error out when we receive a CCS before a CH
- error out when we receive an encrypted CCS
2025-05-23 15:04:22 +02:00
Sean Parkinson
999641d9b1
Merge pull request #8642 from rizlik/dtls_no_span_records
...
DTLS: drop records that span datagrams
2025-05-23 14:57:24 +10:00
Daniel Pouzzner
b06a921697
tests/api.c: add missing NO_SHA gates in test_wc_PKCS12_create().
2025-05-22 14:56:31 -05:00
Sean Parkinson
85a4e34705
Merge pull request #8782 from kojiws/support_aes_cbc_pkcs12_export
...
Support PBE_AES(256|128)_CBC key encryptions on wc_PKCS12_create()
2025-05-22 08:39:11 +10:00
Ruby Martin
a170624118
coverity: init dgst variable test_sha3.c
...
improper use of neg val api.c
copy-paste error in test_wolfSSL_PEM_read_bio_ECPKParameters
2025-05-21 08:29:44 -06:00
Koji Takeda
3666851589
Support PBE_AES256_CBC and PBE_AES128_CBC key encryption on wc_PKCS12_create()
2025-05-19 22:26:46 +09:00