David Garske
3a89c452b3
Merge pull request #7454 from lealem47/stm32AesCtr
...
Fix for AES CTR on STM32
2024-04-22 10:04:06 -07:00
Daniel Pouzzner
44e8f392ae
wolfcrypt/src/kdf.c: fix -Wconversions in wc_SRTCP_KDF_ex().
2024-04-22 01:11:46 -05:00
Lealem Amedie
9bc0e31a32
Fix for AES CTR on STM32
2024-04-19 12:35:33 -06:00
kaleb-himes
e835517633
SRTCP 32-bit indices default plus errata 48-bit indices
2024-04-19 12:31:08 -06:00
JacobBarthelmeh
69be7a7c54
Merge pull request #7431 from lealem47/aes_cfb
...
Fix for AES-CFB1 encrypt/decrypt on size (8*x-1) bits
2024-04-19 10:55:27 -06:00
Daniel Pouzzner
0264a518e1
wolfcrypt/src/ed25519.c: in ed25519_pairwise_consistency_test(), add casts to mollify -Wconversion.
2024-04-19 01:41:35 -05:00
Daniel Pouzzner
85f3fb9d07
Merge pull request #7409 from SparkiDev/asm_x64_rip_fix
...
SHA-256 x64 ASM - fix use of %rip
2024-04-19 02:33:47 -04:00
Sean Parkinson
d2b9a365f2
ChaCha20 and Poly1305 x64 ASM - fixu use of %rip
...
Get the address of the constants into a register at start instead of
calculating the address relative to the instruction pointer each time.
2024-04-19 09:59:54 +10:00
JacobBarthelmeh
ef153101b7
Merge pull request #7433 from SparkiDev/eddsa_fips_checks
...
EdDSA FIPS checks on public key
2024-04-18 14:34:31 -06:00
Lealem Amedie
295033441c
Fix for AES-CFB1 encrypt/decrypt on size (8*x-1) bits
2024-04-18 11:31:28 -06:00
kaleb-himes
0bd5967093
Adjust FIPS version and default configuration
2024-04-18 08:41:05 -06:00
Sean Parkinson
c590fe514f
EdDSA FIPS checks on public key
...
Check that the Ed25519 and Ed448 public key is valid even without
private key.
Perform pairwise consistency test, only in FIPS, when making a key i
Ed25519 and Ed448.
2024-04-17 17:50:33 +10:00
Daniel Pouzzner
855175da47
wolfcrypt/src/fe_448.c: fix several out-of-order declarations in fe448_mul_8().
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
9f55dba2f2
wolfcrypt/src/aes.c: in AES-XTS AESNI, use cautious strategy as in AESGCM_STREAM for SAVE_VECTOR_REGISTERS, due to random failures seen with DEBUG_VECTOR_REGISTER_ACCESS_FUZZING using the old per-call fallback strategy.
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
b2f594e84b
fixes for --enable-32bit CFLAGS=-m32 --enable-fips=v6 (fixes "#error ED448 requires SHAKE256").
2024-04-17 00:43:41 -05:00
Sean Parkinson
8e9810e87e
ssl.c: Move functions out to separate files
...
Moved E[CD][25519||448] APIs to pk.c
Move public key PEM APIs to pk.c.
Move wolfSSL loading and using of private keys and certificates to
ssl_load.c
Move PKCS#7 and PKCS#12 APIs to ssl_p7p12.c.
Move session and session cache APIs to ssl_sess.c.
Other minor fixes.
2024-04-16 10:30:59 +10:00
Daniel Pouzzner
6e0a90190f
fixes for v5 and v6+ FIPS builds, including linuxkm v6+ builds.
2024-04-15 14:11:21 -05:00
JacobBarthelmeh
8b656d5a5f
Merge pull request #7295 from kaleb-himes/SRTP-KDF-FS
...
SRTP-KDF FS Preview
2024-04-11 13:41:05 -06:00
JacobBarthelmeh
ff09f418c0
Merge pull request #7408 from SparkiDev/asn_templ_rid
...
X.509 RID ASN template behaviour
2024-04-10 11:42:07 -06:00
kaleb-himes
264dcd4e15
Fix a file mode and more overlong lines
2024-04-10 10:18:49 -06:00
Sean Parkinson
8b3fbe47e6
SHA-256 x64 ASM - fix use of %rip
...
Get the address of table K instead of using it directly each time a
value is required.
2024-04-10 15:02:19 +10:00
Sean Parkinson
b48b5c47f4
X.509 RID ASN template behaviour
...
Don't set the DNS entry for RID unless OPENSSL_ALL is defined to match
the behaviour of original ASN code.
2024-04-10 10:39:45 +10:00
kaleb-himes
b8d31b042f
Windows support
2024-04-09 13:55:05 -06:00
kaleb-himes
71e83cdd19
Resolve armasm fips wrappers and sanity
2024-04-09 11:41:41 -06:00
kaleb-himes
e45867bbc3
WIN fips section refactor / wolfEntropy API syntax adjustment
2024-04-09 09:48:33 -06:00
kaleb-himes
ef2a636610
Expose additional features of opensslall in a compliant way
2024-04-09 09:48:33 -06:00
kaleb-himes
2e63ae750d
Comments for SP800-38E TODO, wolfEntropy optional setup and remove forced errors api.c
2024-04-09 09:48:33 -06:00
kaleb-himes
4df091ae2a
Restore debug messages that were cluttering up logs
2024-04-09 09:48:33 -06:00
kaleb_himes
81f5ac7f6c
SRTP-KDF FS Preview
2024-04-09 09:48:33 -06:00
Daniel Pouzzner
a518f493b5
Merge pull request #7388 from JacobBarthelmeh/x509_cases
...
check for critical policy extension when not supported
2024-04-05 15:59:03 -04:00
JacobBarthelmeh
8b587b563c
Merge pull request #7286 from Frauschi/hybrid_signatures
...
Improvements to dual algorithm certificates
2024-04-03 13:37:16 -06:00
David Garske
57603823e3
Merge pull request #7387 from JacobBarthelmeh/sm2
...
fix for oss-fuzz sm2 test build
2024-04-03 10:08:46 -07:00
JacobBarthelmeh
f6a24efe23
Merge pull request #7389 from dgarske/nxp_mmcau_sha256
...
Fix the NXP MMCAU HW acceleration for SHA2-256
2024-04-03 10:39:04 -06:00
David Garske
d7c6d7af44
Fix the NXP MMCAU HW acceleration for SHA2-256. Broken with LMS SHA2 refactor.
2024-04-02 19:32:41 -07:00
JacobBarthelmeh
75da69911c
Merge pull request #7369 from dgarske/infineon_modustoolbox
...
Support for Infineon Modus Toolbox with wolfSSL
2024-04-02 17:34:07 -06:00
JacobBarthelmeh
983616afa0
check for critical policy extension when not supported
2024-04-02 16:46:47 -06:00
JacobBarthelmeh
d4f5825fd2
fix for sp build with ecc_map_ex
2024-04-02 11:40:53 -06:00
jordan
b65e42bf4d
Used codespell and fixed obvious typos.
2024-04-02 10:19:39 -05:00
Daniel Pouzzner
092dba4593
wolfcrypt/src/asn.c: fix for benign identicalInnerCondition in ParseCertRelative().
2024-04-01 23:50:05 -05:00
Anthony Hu
10d210ce26
Parenthesis
2024-04-01 19:05:59 -04:00
Anthony Hu
2d532dd6b8
Clean up after another round of analyzer execution.
2024-04-01 18:56:44 -04:00
Anthony Hu
8f599defe0
Add check inspired by original implementation of asn.
2024-04-01 17:37:03 -04:00
Tobias Frauenschläger
136eaae4f1
Improvements to dual alg certificates
...
* Support for external keys (CryptoCb interface)
* Support for usage in mutual authentication
* better entity cert parsing
* Fix for Zephyr port to support the feature
* Check key support
* Proper validation of signatures in certificate chains
* Proper validation of peer cert with local issuer signature
(alt pub key is cached now)
* Support for ECC & RSA as alt keys with PQC as primary
* Support for PQC certificate generation
* Better support for hybrid signatures with variable length signatures
* Support for primary and alternative private keys in a single
file/buffer
* More API support for alternative private keys
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2024-04-01 17:37:03 -04:00
Daniel Pouzzner
d930825a92
Merge pull request #7362 from jpbland1/rsa-make-key-no-malloc
...
fix wc_MakeRsaKey and wc_RsaKeyToDer to work with WOLFSSL_NO_MALLOC
2024-03-30 03:19:27 -04:00
John Bland
d8e9e90f9d
refactor rawLen to avoid unused warning
2024-03-30 02:12:32 -04:00
Daniel Pouzzner
3f3dd4743a
Merge pull request #7365 from rizlik/ecc_cmp_param_cleanup
...
wc_ecc_cmp_param cleanup
2024-03-29 01:48:46 -04:00
David Garske
83dc3dfac1
Add support for the Infineon/Cypress HAL TRNG.
2024-03-28 13:57:26 -07:00
gojimmypi
5bffbdb20c
Initialize some Kyber client variables
2024-03-28 09:14:53 -07:00
John Bland
4f51183b45
fix bad indenting
2024-03-28 02:54:49 -04:00
John Bland
305f87561d
break out of loop on failure instead of return
2024-03-28 02:54:49 -04:00