David Garske
d147968aed
Merge pull request #8125 from philljj/fix_acert_test_defined_not_used
...
tests api: fix inconsistent do_acert_verify_test guards.
2024-10-30 15:21:04 -07:00
David Garske
fc56060873
Merge pull request #8102 from embhorn/topic2203
...
Fix docs for invalid hash requirements.
2024-10-30 15:15:19 -07:00
jordan
90648b1e79
tests api: fix inconsistent do_acert_verify_test guards.
2024-10-30 11:06:54 -05:00
David Garske
72306b9a67
Merge pull request #7973 from bandi13/fixSniffer
...
Fix sniffer
2024-10-29 15:21:41 -07:00
David Garske
b982314ac6
Merge pull request #8101 from miyazakh/tsip_ca_add
...
Check Root CA by TSIP before adding it to ca-table
2024-10-29 14:23:47 -07:00
JacobBarthelmeh
2b8d43cef2
Merge pull request #8119 from dgarske/async_20241028
...
Fixes for asynchronous release - SHA3/HMAC devId
2024-10-29 15:11:43 -06:00
Andras Fekete
2cdecd85a2
If we have a capture on device 'any', then we need to handle the offset
...
Detect reading of packet errors
--enable-all and --enable-sniffer exposed this issue
Don't need variable
Rework argument parsing
Need a way to allow arguments to be supplied more granularly. Partucilarly, I needed a "-tracefile" argument without requiring the use of a PCAP file
Fix error prints to STDERR
Fix setting of port filtering
Fix 80 char limit
Not actually a bad packet when there are no more packets
Fix strcat size
Allow the sniffer to print the trace to STDOUT
Fix indexing
Take out superfluous error which is handled later
Set default port to 11111
Single return point
Combine chain to one contiguous memory block
Fix return
Add in error handling for XMALLOC
Add in debugging output when --enable-debug
It makes no sense to allocate a ton of small buffers to process chains
Ultimately, the code is slower because of the several small memcpy instead of a single large contiguous memcpy
Pass in a device name
Fix unused variable
Fix cast
Addressing PR comments
Add new flags to --help
2024-10-29 16:55:20 -04:00
Daniel Pouzzner
0ded8ba0c7
Merge pull request #8074 from bandi13/revertGithubFix
...
Revert "Merge pull request #8072 from rizlik/github-fix"
2024-10-29 15:17:50 -05:00
Daniel Pouzzner
5b07d47e7b
Merge pull request #8095 from embhorn/coverity-workflow
...
Add more configs to Coverity scan schedule.
2024-10-29 15:02:15 -05:00
Daniel Pouzzner
57a5895d0e
Merge pull request #8110 from philljj/fix_infer
...
infer: fix uninit values in pkcs8_encode.
2024-10-29 01:16:04 -05:00
Sean Parkinson
202822c655
Merge pull request #8114 from douzzer/20241025-fixes
...
20241025-fixes
2024-10-29 09:55:03 +10:00
David Garske
ea35b98005
Fixed SHA3 issue with possible uninitialized devId when building with async. Fixed HMAC set key issue with devId/heap getting lost.
2024-10-28 11:30:05 -07:00
Daniel Pouzzner
6f87f57d7a
fixes for gating and ARM32 alignment defects:
...
wolfcrypt/src/port/arm/armv8-aes.c: in the WOLFSSL_ARMASM_NO_HW_CRYPTO version of wc_AesSetKey(), copy the supplied userKey to a properly aligned buffer if necessary before calling AES_set_encrypt_key();
src/dtls13.c: in Dtls13GetRnMask(), if defined(WOLFSSL_LINUXKM)), return retval of wc_AesEncryptDirect();
wolfcrypt/src/misc.c: add readUnalignedWord32(), writeUnalignedWord32(), readUnalignedWords32(), and writeUnalignedWords32();
wolfcrypt/src/siphash.c: use readUnalignedWord64(), readUnalignedWord32(), and writeUnalignedWord64(), to avoid unaligned access faults, and fix cast in byte-reversing version of GET_U32().
2024-10-25 23:52:32 -05:00
Daniel Pouzzner
bdd62314f0
Merge pull request #8111 from JacobBarthelmeh/release
...
prepare for release 5.7.4
v5.7.4-stable
2024-10-24 16:00:03 -05:00
JacobBarthelmeh
dd2b191c36
update version listed in wolfssl-fips.rc and Ada wrapper
2024-10-24 14:19:17 -06:00
JacobBarthelmeh
8c5e188dd4
remove trailing white space in README
2024-10-24 13:04:00 -06:00
JacobBarthelmeh
8604024b95
prepare for release 5.7.4
2024-10-24 11:32:33 -06:00
Daniel Pouzzner
3f651a8dd0
Merge pull request #8109 from JacobBarthelmeh/coverity
...
Recent coverity warnings
2024-10-23 21:18:44 -05:00
jordan
ce31b15608
infer: fix uninit values in pkcs8_encode.
2024-10-23 20:11:51 -05:00
Hideki Miyazaki
a14d7db58c
move trailing space
2024-10-24 09:31:00 +09:00
JacobBarthelmeh
52ba700eb3
CID 426426 code maintainability warning, stored NULL value overwritten before used
2024-10-23 18:05:12 -06:00
JacobBarthelmeh
077b070132
CID 426427 remove duplicate null checks
2024-10-23 17:57:14 -06:00
JacobBarthelmeh
9af8716e85
Merge pull request #8087 from ColtonWilley/x509_store_rewrite
...
Initial rewrite of X509 STORE to replicate openssl behavior
2024-10-23 17:14:40 -06:00
Daniel Pouzzner
e7e20532eb
Merge pull request #8097 from julek-wolfssl/zd/18822
...
Fix TLS v1.2 session resumption edge cases
2024-10-23 18:01:35 -05:00
JacobBarthelmeh
830c5dace6
Merge pull request #8106 from douzzer/20241023-fixes
...
20241023-fixes
2024-10-23 16:44:09 -06:00
David Garske
25e32c2539
Fix for TLS v1.2 session resumption with tickets where the server decides to do a full handshake. The wrong sessionIDSz was being checked and should be the arrays one since it get set from the server_hello.
2024-10-23 15:14:05 -07:00
Daniel Pouzzner
cab20fbdd2
add and use WOLFSSL_PARTIAL_CHAIN as native bitmask macro for compat layer X509_V_FLAG_PARTIAL_CHAIN;
...
in src/x509_str.c, fix several C++ "invalid conversion" errors in X509StoreFreeObjList() and wolfSSL_X509_STORE_get0_objects().
2024-10-23 16:57:58 -05:00
Colton Willey
6f0bcac737
Address review comments, rename WOLFSSL_INTER_CA, use up_ref for get issuer
2024-10-23 16:55:34 -05:00
Colton Willey
ee4e1b6262
Properly omit self signed CA from untrusted intermediates, handle memory leak for SSL case with proper flow
2024-10-23 16:55:34 -05:00
Colton Willey
95f8d74202
Fix loop to decrement
2024-10-23 16:55:34 -05:00
Colton Willey
96138e70f8
Restore proper error code handling for self signed CA in non-trusted intermediates
2024-10-23 16:55:34 -05:00
Colton Willey
4c63668295
Small changes per review comments
2024-10-23 16:55:34 -05:00
Colton Willey
3fc3a84a6b
Move X509_STORE_CTX_set_flags under OPENSSL_EXTRA
2024-10-23 16:55:34 -05:00
Colton Willey
1ddb2ce435
Properly implement set flags for X509_V_FLAG_PARTIAL_CHAIN
2024-10-23 16:55:34 -05:00
Colton Willey
87ce96527a
Changes for various failing build configs
2024-10-23 16:55:34 -05:00
Colton Willey
1afbf55a80
Fix new build error after refactor
2024-10-23 16:55:34 -05:00
Colton Willey
6607314dc6
Address code comments, rewrite get issuer internals, use better internal names, get rid of all lines over 80 chars
2024-10-23 16:55:34 -05:00
Colton Willey
f0fae6506f
Fix windows warnings
2024-10-23 16:55:34 -05:00
Colton Willey
98eb6b398c
Fix for windows builds
2024-10-23 16:55:34 -05:00
Colton Willey
f7bfa71d9f
Implement support for verify flag X509_V_FLAG_PARTIAL_CHAIN
2024-10-23 16:55:34 -05:00
Colton Willey
12f4f69fb4
Allow intermediate CA certs without keycertsign when added through X509 STORE
2024-10-23 16:55:34 -05:00
Colton Willey
38c7de1707
Fixes for CI build errors
2024-10-23 16:55:34 -05:00
Colton Willey
17c9e92b7f
Initial rewrite of X509 STORE to replicate openssl behavior
2024-10-23 16:55:34 -05:00
Daniel Pouzzner
82273094e0
Merge pull request #8107 from JacobBarthelmeh/aesgcm
...
fix for state of aes.gcm.H on re-use
2024-10-23 16:52:42 -05:00
JacobBarthelmeh
1d25e0f89b
Merge pull request #8104 from gojimmypi/pr-vs2022-wolfssl-name
...
Name VS2022 binary output wolfssl via project name
2024-10-23 15:36:55 -06:00
JacobBarthelmeh
8fbf6a59bc
Merge pull request #8105 from kareem-wolfssl/zd18825
...
Fix 256-bit ECC conditional in ecc_map_ex.
2024-10-23 15:19:50 -06:00
JacobBarthelmeh
d0f5778429
fix for state of aes.gcm.H on re-use
2024-10-23 15:04:06 -06:00
Andras Fekete
7cee9faa73
Addressing PR comments
2024-10-23 16:53:10 -04:00
Andras Fekete
19d738cecf
Revert "Don't need to upload/download artifacts"
...
This reverts commit b215398bd4 .
2024-10-23 14:28:24 -04:00
Kareem
8986a9dae0
Fix 256-bit ECC conditional in ecc_map_ex.
2024-10-23 11:12:48 -07:00