Juliusz Sosinowicz
2ae815e2ee
Use WOLFSSL_ERROR_MSG for error logs
2022-10-25 13:13:44 +02:00
Juliusz Sosinowicz
3339443260
Change NID_* from enum to #define
2022-10-20 17:07:32 +02:00
Lealem Amedie
e77c3849a0
Fix for evp key leak in unit tests
2022-09-30 16:02:07 -07:00
David Garske
606f58a851
Spelling and whitespace cleanups.
2022-09-23 13:58:58 -07:00
JacobBarthelmeh
2bf583aa57
Merge pull request #5526 from miyazakh/qt_jenkins_fix
...
Fix qt nightly test failure
2022-09-21 09:38:45 -06:00
David Garske
90c9363af8
Merge pull request #5538 from satoshiyamaguchi/trial5
...
Add wolfSSL_EVP_PKEY_new_CMAC_key to OpenSSL compatible API
2022-09-20 13:01:52 -07:00
Satoshi Yamaguchi
c6ea68a118
Fix two not freed WOLFSSL_CMAC_CTX.
2022-09-20 23:10:22 +09:00
Hideki Miyazaki
001592a8a3
fix qt nightly test
2022-09-18 13:56:55 +09:00
Satoshi Yamaguchi
64f2a0cafe
Extend wolfSSL_EVP_PKEY_free for freing EVP_PKEY of CMAC.
...
Fix EVP_PKEY not freed in unit test (test_wolfSSL_EVP_PKEY_new_CMAC_key).
2022-09-17 14:44:45 +09:00
Hideki Miyazaki
a948c78ac7
addressed review comments. remove Qt case guard
2022-09-16 21:25:42 +09:00
Hideki Miyazaki
a98cda3516
fix qsscertificate test failure
2022-09-16 07:48:05 +09:00
Daniel Pouzzner
ef7377d64c
fix whitespace and line length.
2022-09-07 15:30:32 -05:00
David Garske
9c88d8ac2c
Merge pull request #5547 from JacobBarthelmeh/mcux
...
Port to RT685 with FreeRTOS
2022-09-07 12:54:54 -07:00
Stefan Eissing
5927c4063a
Removing FIXME comments after the fixing has been done. doh.
2022-09-06 10:06:02 +02:00
Stefan Eissing
9f47999002
Add ChaCha20 as available cipher in the EVP API.
...
- wire the wc_ChaCha_* implementation into the EVP API
as `wolfSSL_EVP_chacha20`
- follow IV conversions of OpenSSL
- add test case
- have QUIC support use this for header protection when
CHACHA20_POLY1305 has been negotiated in the handshake.
2022-09-06 10:06:02 +02:00
Sean Parkinson
f153e65102
SHA-3: check BMI1 availablity for ASM
...
Added benchmarking of SHAKE128 and SHAK256.
2022-09-05 14:11:02 +10:00
Satoshi Yamaguchi
b52d193ee3
Fix an implicit type conversion
2022-09-03 23:56:54 +09:00
David Garske
4a8a11315b
Merge pull request #5536 from SparkiDev/sha3_x64
...
SHA-3 improvements
2022-09-02 09:46:14 -07:00
Stefan Eissing
65ca72c5a2
Improve EVP support for CHACHA20_POLY1305 ( #5527 )
...
* Add test case for OpenSSLs capability to init a evp context partially in several calls.
* EVP handling of CHACHA20_POLY1305 improvment
- save key at ctx for Init()s without IV
- reuse stored key for Init()s with new IV, reusing ctx
- free and zero key on ctx clenaup
* Adding type cast to XMALLOC to force compiler compatibility.
* EVP: using same DYNAMIC_TYPE in alloc and free of chacha20_poly1305 key.
Co-authored-by: Stefan Eissing <stefan.eissing@greenbytes.de >
2022-09-01 13:23:42 -07:00
Satoshi Yamaguchi
85776f0069
Add wolfSSL_EVP_PKEY_new_CMAC_key to OpenSSL compatible API
2022-09-01 18:00:43 +09:00
Sean Parkinson
ce8959ea77
SHA-3 improvements
...
Add x86_64 assembly code:
- BMI2
- AVX2 (using ymm, slower than BMI2)
- AVX2 of 4 similtaneous hashes
Add SHAKE128 functions and tests.
Add Absorb and Squeeze functions for SHAKE128 and SHAK256 and tests.
Add doxygen for SHA-3 and SHAKE functions.
Update other generated x86_64 assembly files to include settings.h.
2022-09-01 17:11:58 +10:00
JacobBarthelmeh
b3fa6f654e
no realloc, adjustable static test size, fsl RTC
2022-08-26 09:15:33 -06:00
Juliusz Sosinowicz
2fb3f58c03
Cleanup output object in wolfSSL_EVP_MD_CTX_copy_ex before copy
2022-08-26 13:07:45 +02:00
David Garske
2c2a7750a4
Merge pull request #5414 from darktohka/feature/chacha20-poly1305-evp
...
Integrate chacha20-poly1305 into the EVP interface
2022-08-03 18:21:17 -07:00
David Garske
3f07900c1b
Merge pull request #5432 from embhorn/zd14172
...
Fix dead code warnings and build error
2022-08-03 15:01:20 -07:00
Eric Blankenhorn
ecdccb6180
Fix build error with WOLFSSL_AES_DIRECT
2022-08-03 09:09:28 -05:00
Eric Blankenhorn
f713c75a73
Fix dead code warnings in evpCipherBlock and wc_CryptKey
2022-08-03 08:08:00 -05:00
Disyer
e599bb5048
Mark chacha20-poly1305 as an AEAD cipher
2022-07-28 18:36:52 +03:00
Disyer
e8febaf414
Ensure ChaCha20 updates out length during cipher update
2022-07-28 18:06:41 +03:00
Disyer
52cc73a6a4
Integrate chacha20-poly1305 into the EVP interface
2022-07-28 13:01:35 +03:00
Jacob Barthelmeh
8eaa85e412
update copyright year to 2022
2022-07-19 10:44:31 -06:00
Eric Blankenhorn
394f36a0d7
Fix typos and bad macro names
2022-07-05 10:31:11 -05:00
David Garske
94e7eacc5f
Merge pull request #5072 from JacobBarthelmeh/Compatibility-Layer
...
add support for importing private only EC key to a WOLFSSL_EVP_PKEY s…
2022-06-27 12:34:00 -07:00
JacobBarthelmeh
4de90efbe2
clear out PKEY when setting new key
2022-06-23 14:21:53 -07:00
Daniel Pouzzner
69ca1d37c0
fixes for defects identified by wolfssl-multi-test: whitespace, missing void in arg lists, and -Wunused-but-set-variable found by clang-15 (prerelease).
2022-06-20 10:54:55 -05:00
Sean Parkinson
890abfbefc
pk.c: rework
...
Re-order RSA functions.
Add comments to RSA functions.
Rework RSA function implementations.
2022-06-10 09:54:32 +10:00
Hayden Roche
fb3c611275
Fix another AES-GCM EVP control command issue.
...
With PR 5170, I added logic that requires a EVP_CTRL_GCM_SET_IV_FIXED command be
issued before a EVP_CTRL_GCM_IV_GEN command. This matches OpenSSL's behavior.
However, OpenSSL also clears the flag enabling EVP_CTRL_GCM_IV_GEN after
EVP_CTRL_GCM_SET_IV_FIXED if EVP_CipherInit is called with a NULL key.
Otherwise, the flag retains its value. We didn't mirror this logic, and that
caused problems in OpenSSH unit testing. This commit aligns our logic with
OpenSSL's and adds a regression test to test_evp_cipher_aes_gcm for this case.
2022-06-02 12:32:59 -07:00
Daniel Pouzzner
b212853bce
evp.c: in EvpCipherAesGCM(), make sure ctx->gcmAuthIn is non-null before clearing it; fix whitespace.
2022-06-01 10:29:40 -05:00
Hayden Roche
3cf636163b
Fix EVP_CTRL_GCM_IV_GEN with AES-GCM.
...
Discovered the AES-GCM flow using this command didn't work in our OpenSSH port.
This commit makes the behavior match OpenSSL and adds testing using known
OpenSSL-generated test vectors to prevent regressions. This was one of those
problems where two ends of a connection would work fine if they were both using
wolfSSL but not if one was using OpenSSL (i.e. OpenSSH interop with AES-GCM
was broken).
2022-05-25 07:00:15 -07:00
David Garske
9a74745246
Merge pull request #5163 from haydenroche5/evp_pkey_derive_guard
...
Remove unneeded FIPS guard on wolfSSL_EVP_PKEY_derive.
2022-05-20 17:12:24 -07:00
Hayden Roche
a6b948ae59
Remove unneeded FIPS guard on wolfSSL_EVP_PKEY_derive.
2022-05-20 11:29:01 -07:00
Hideki Miyazaki
c1f117413f
get crypto only compiled with openssl extra
2022-05-18 11:16:03 +09:00
David Garske
6b1e3003fb
Merge pull request #5142 from SparkiDev/ssl_move_pk
...
ssl.c rework
2022-05-13 12:56:14 -07:00
David Garske
1a57e3065a
Small cleanups. Missing (void), spelling and formatting. Also fixes for variations of 25519/448 build.
2022-05-13 09:24:59 -07:00
Sean Parkinson
eea537e5ea
Merge pull request #5124 from kaleb-himes/WIN_MULTICONFIG
...
Address issues ID'd by new windows multi-config test
2022-05-13 09:39:15 +10:00
Daniel Pouzzner
26673a0f28
where appropriate, use strcmp/strcasecmp, not strncmp/strncasecmp;
...
add macro XSTRCASECMP();
update XSTRNCASECMP() for XC32 >= 1.00 to use strncasecmp.
2022-05-10 12:20:12 -05:00
kaleb-himes
d5f7beefd4
Address issues ID'd by new windows multi-config test
2022-05-09 16:50:56 -06:00
David Garske
cbc27f7de4
Merge pull request #5085 from douzzer/20220426-multi-test
...
20220426 multi-test fixups
2022-04-26 11:15:59 -07:00
John Safranek
7436a41bc7
Merge pull request #5046 from SparkiDev/cppcheck_fixes_8
...
cppcheck: fixes
2022-04-26 10:37:42 -07:00
Daniel Pouzzner
5e1a358dff
wolfcrypt/src/evp.c wolfSSL_EVP_PKEY_free(): fix clang-diagnostic-implicit-fallthrough.
2022-04-26 09:57:54 -05:00