Jacob Barthelmeh
|
d90e66da80
|
remove restriction on max key size with wolfSSL_DH_generate_key
|
2018-12-04 16:20:31 -07:00 |
|
toddouska
|
8c0a55d43b
|
Merge pull request #1939 from cconlon/selftestfix
exclude wolfSSL_EC_POINT_point2hex() in CAVP selftest build
|
2018-11-28 13:13:25 -08:00 |
|
Sean Parkinson
|
918c769284
|
Return ToTraditional API to original signature
|
2018-11-28 12:27:57 +10:00 |
|
Chris Conlon
|
a5e3b18252
|
exclude wolfSSL_EC_POINT_point2hex() in CAVP selftest build
|
2018-11-27 09:12:55 -08:00 |
|
toddouska
|
55bbffe3c6
|
Merge pull request #1932 from dgarske/maxfrag_reconf
Post-handshake max fragment size adjustment
|
2018-11-26 13:27:26 -08:00 |
|
David Garske
|
7a24d4e46f
|
Adds new WOLFSSL_ALLOW_MAX_FRAGMENT_ADJUST macro around non-standard feature. This allows for adjustment of the maximum fragment size post handshake.
|
2018-11-21 10:30:24 -08:00 |
|
Sean Parkinson
|
95bd340de5
|
Add support for more OpenSSL APIs
Add support for PEM_read and PEM_write
Add OpenSSL PKCS#7 signed data support
Add OpenSSL PKCS#8 Private key APIs
Add X509_REQ OpenSSL APIs
|
2018-11-20 07:54:24 +10:00 |
|
David Garske
|
e81436ffe9
|
Add support for altering the max-fragment size post-handshake using existing API wolfSSL_UseMaxFragment.
|
2018-11-19 13:26:48 -08:00 |
|
Jacob Barthelmeh
|
c307fd7af4
|
additional macro guards for disabling aescbc with opensslextra
|
2018-11-15 13:40:04 -07:00 |
|
David Garske
|
fcb40570e2
|
Fixes for warnings with possible use of uninitialized variable in async with DES3 and AES.
|
2018-11-08 15:39:52 -08:00 |
|
David Garske
|
6e4ab91ccf
|
Merge pull request #1915 from JacobBarthelmeh/Testing
fix side init for set connect/accept functions
|
2018-11-07 09:24:44 -08:00 |
|
toddouska
|
24e2a2b228
|
Merge pull request #1912 from dgarske/fix_BN_bn2hex
Fixes for compatibility function `BN_bn2hex`
|
2018-11-07 08:35:15 -08:00 |
|
toddouska
|
5d8f4351ff
|
Merge pull request #1903 from dgarske/dhkeycheck
Speed improvements for DH public key prime checking
|
2018-11-06 16:35:27 -08:00 |
|
Jacob Barthelmeh
|
7a2a66743b
|
fix side init for set connect/accept functions
|
2018-11-06 16:48:06 -07:00 |
|
toddouska
|
2c7ff56a3e
|
Merge pull request #1907 from JacobBarthelmeh/Testing
infer and g++ build fixes
|
2018-11-06 08:48:28 -08:00 |
|
David Garske
|
efb1efcc0d
|
Fixes and additional tests for compatibility function BN_bn2hex. In the DEBUG_WOLFSSL case it was returning a (char*)"", which was trying to be free'd. We cannot return const char* here, since its assumed to be an allocated pointer. Fix the dynamic type for XMALLOC/XFREE to match, since OPENSSL_free is used to free returned value. Fix to add room for null term. Added missing API unit test for BN_print_fp. Exposed these functions for OPENSSL_EXTRA.
|
2018-11-06 05:55:25 -08:00 |
|
Eric Blankenhorn
|
d61ae3a02a
|
Handle incomplete shutdown
|
2018-11-05 10:30:48 -06:00 |
|
John Safranek
|
c1ca1f1b78
|
Remove DH prime check on selftest/fips builds.
|
2018-11-02 12:55:07 -07:00 |
|
John Safranek
|
cfafbd9659
|
Added the prime check to the functions wolfSSL_SetTmpDh() and wolfSSL_CTX_SetTmpDh().
|
2018-11-02 11:01:39 -07:00 |
|
Jacob Barthelmeh
|
a953a3141e
|
infer and g++ build fixes
|
2018-11-01 09:59:35 -06:00 |
|
Chris Conlon
|
def7a91e70
|
fix CAVP selftest build errors
|
2018-10-30 16:35:45 -06:00 |
|
David Garske
|
86758f9640
|
Fixes for key size detection when using PK callbacks (HSM) and no private key has been loaded (affects HAVE_PK_CALLBACKS on server side only when no dummy private key is loaded). Fix for possible leak during ECC min key size failure with small stack. Added new API wc_RsaPublicKeyDecode_ex for parsing an RSA public key for the modulus and exponent. Changed wolfSSL_CTX_SetTmpEC_DHE_Sz to support a size == 0 for using the long-term private key's size. Changed ECDHE_SIZE so it can be overridden and build-time. Added tests for wolfSSL_CTX_SetTmpEC_DHE_Sz and wolfSSL_SetTmpEC_DHE_Sz.
|
2018-10-25 09:15:23 -07:00 |
|
David Garske
|
095337b1cf
|
Merge pull request #1878 from kaleb-himes/TEST_COVERAGE_3
Test coverage 3
|
2018-10-17 13:47:10 -07:00 |
|
kaleb-himes
|
5ca822b1e9
|
Peer review changes requested
|
2018-10-17 10:46:45 -06:00 |
|
toddouska
|
0b78b75530
|
Merge pull request #1860 from dgarske/tls_either_side
Methods cleanup and new DTLS "either" side methods
|
2018-10-12 07:35:17 -07:00 |
|
David Garske
|
1fd791da21
|
Fix to check response code on InitSSL_Side calls.
|
2018-10-11 15:50:22 -07:00 |
|
kaleb-himes
|
23797ab4cb
|
wolfSSL_AES_cbc_encrypt unit tests, TODO: Decrypt
|
2018-10-10 15:59:10 -04:00 |
|
David Garske
|
0293686990
|
Added example client/server support for loading certificate and private key into WOLFSSL object using -H loadSSL. Added load_ssl_buffer function to load buffers into WOLFSSL objects. Changed wolfSSL_get_SSL_CTX API to always be exposed. Added TEST_LOAD_BUFFER build option to use the load_buffer and load_ssl_buffer calls for example client/server.
|
2018-10-09 12:54:41 -07:00 |
|
David Garske
|
1ed50a40e7
|
Fix for wolfSSL_i2d_RSAPublicKey leak.
|
2018-10-05 14:09:12 -07:00 |
|
David Garske
|
cec61ac3c9
|
Fix for leak in wolfSSL_X509_print, where the RsaKey is not free'd. Cleanup of formatting.
|
2018-10-04 16:51:51 -07:00 |
|
David Garske
|
bbdb17975c
|
Adds build option WOLFSSL_EITHER_SIDE for deferring the "side" of the TLS session until first connect or accept. Added the DTLS generic v1.0 and v1.2 methods for "either" side. Added "either" methods unit tests. Added "either" -v e support to example client/server. Fix to expose wolfSSL_use_certificate_file and wolfSSL_use_PrivateKey_file without OPENSSL_EXTRA. Cleanup of the methods for (void)heap and log messages. Spelling fixes.
|
2018-10-04 15:47:50 -07:00 |
|
David Garske
|
f19f803098
|
Fix for possible leak with openssl comatibility API wolfSSL_d2i_ECDSA_SIG when fast math is disabled.
|
2018-09-27 11:39:30 -07:00 |
|
Chris Conlon
|
8ccd715f31
|
Merge branch 'master' into openssl_compat201805
|
2018-09-26 11:06:26 -06:00 |
|
John Safranek
|
18a27cfe75
|
Changed the DecodedCert's der pointer to be a pointer to const. The
DecodedCert doesn't own the der value, so it should be const. Had to
make many other changes downstream of this.
|
2018-09-25 12:55:52 -07:00 |
|
Go Hosohara
|
ff5506faf2
|
define wolfSSL_OPENSSL_add_all_alogrithms_noconf alias for wolfSSL_OpenSSL_add_all_algorithms_noconf and some fixes
|
2018-09-25 15:39:56 +09:00 |
|
Takashi Kojo
|
71863c462e
|
(void) for unused in NO_RSA case
|
2018-09-25 15:39:56 +09:00 |
|
Go Hosohara
|
cfa99c567b
|
merge PR #1820 Porting aid
|
2018-09-25 15:39:56 +09:00 |
|
Go Hosohara
|
c7cfa74577
|
Fix some flaws caused by rebase
|
2018-09-25 15:39:55 +09:00 |
|
Takashi Kojo
|
3c93d4e638
|
KEEP_STORE_CERTS release elimination, limited to FreeX509 in X509_STORE_CTX
|
2018-09-25 15:39:55 +09:00 |
|
Takashi Kojo
|
226bc54b57
|
ctx->ourCert keeps duplicated x509
|
2018-09-25 15:39:55 +09:00 |
|
Takashi Kojo
|
8a046b0bac
|
WOLFSSL_KEEP_STORE_CERTS for wolfSSL_X509_free
|
2018-09-25 15:39:55 +09:00 |
|
Takashi Kojo
|
59beba6338
|
WOLFSSL_CIPHER_INTERNALNAME option
|
2018-09-25 15:39:55 +09:00 |
|
Takashi Kojo
|
93e1221894
|
WOLFSSL_KEEP_STORE_CERTS for X509_STOREmake
|
2018-09-25 15:39:55 +09:00 |
|
Takashi Kojo
|
89dcbd6693
|
set dynamic flag when wolfSSL_ASN1_OBJECT_new()
|
2018-09-25 15:39:55 +09:00 |
|
Takashi Kojo
|
511b59cf73
|
set dynamic flag in ASN1_OBJECT_new
|
2018-09-25 15:39:55 +09:00 |
|
Takashi Kojo
|
9ae3ccb3ba
|
OBJ_sn2nid with OPENSSL_EXTRA_X509_SMALL
|
2018-09-25 15:39:55 +09:00 |
|
Takashi Kojo
|
7d2a03f8c9
|
OBJ_obj2nid memory leak
|
2018-09-25 15:39:55 +09:00 |
|
Go Hosohara
|
2669b80943
|
Fix crashed issue if you call X509_free() after X509_STOER_CTX_free()
|
2018-09-25 15:39:55 +09:00 |
|
Go Hosohara
|
1c627430c7
|
increase wolfcrypt test program memory size along to WOLFSSL structure modificaiton.
rebase with master branch
|
2018-09-25 15:39:55 +09:00 |
|
Takashi Kojo
|
7767d802b7
|
arg_obj check has done before
|
2018-09-25 15:39:55 +09:00 |
|