toddouska
e6d9151f47
add user cert chain functionality at SSL level instead of just CTX
2014-06-20 10:49:21 -07:00
toddouska
6371b3c262
send ecdsa_sign for client cert request type is sig algo ecdsa
2014-06-20 09:22:40 -07:00
toddouska
9642902c07
fix disable rsa w/ opensslextra
2014-06-19 15:59:24 -07:00
toddouska
8350d91780
fix PemToDer encrypted key search start position for bundled files
2014-06-16 12:30:04 -07:00
John Safranek
acb3b1afb2
fix bug with DTLS and IO Pools
2014-06-15 17:26:18 -07:00
toddouska
0223708ac4
make crl monitor watch init -1
2014-06-12 16:01:34 -07:00
toddouska
ceafd298f3
fix linux crl monitor newer gcc warning
2014-06-12 15:56:44 -07:00
Moisés Guimarães
9c905b6519
fix on TLSX_SNI_GetFromBuffer - > should be >= so extensions of length 0 get inside the while.
...
added test to cover case.
2014-06-10 16:56:45 -03:00
Moisés Guimarães
ba36c24fc1
fix on TLSX_SNI_GetFromBuffer - undo last fix and return 0 when there is no SNI extension. Now the return is the same when there is no extensions at all.
2014-06-10 15:28:29 -03:00
Moisés Guimarães
064483035c
fix on TLSX_SNI_GetFromBuffer - set inOutSz value to zero when there is no SNI extension in the client hello buffer.
2014-06-09 17:31:32 -03:00
toddouska
e0c5c89bf6
add sanity check on send callback sent value
2014-06-09 12:55:17 -07:00
Chris Conlon
7e5287e578
update NTRU support, with help from thesourcerer8
2014-06-05 14:42:15 -06:00
toddouska
2494217a87
add sanity check on output buffer size for BuildMessage()
2014-06-04 09:58:15 -07:00
John Safranek
d301ab001c
fix Windows compile warnings
2014-06-03 23:11:18 -07:00
toddouska
24b556689f
fix psk define w/ opensslextra
2014-06-02 11:22:47 -07:00
John Safranek
b60a61fa94
DHE-PSK cipher suites
...
1. fixed the AES-CCM-16 suites
2. added DHE-PSK as a key-exchange algorithm type
3. Added infrastructure for new suites:
* TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
* TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
* TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
* TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
* TLS_DHE_PSK_WITH_NULL_SHA256
* TLS_DHE_PSK_WITH_NULL_SHA384
* TLS_DHE_PSK_WITH_AES_128_CCM
* TLS_DHE_PSK_WITH_AES_256_CCM
4. added test cases for new suites
5. set DHE parameters on test server when using PSK and a custom cipher
suite list
6. updated half premaster key size
2014-05-30 11:26:48 -07:00
toddouska
e11dd9803a
fix icc v14 warnings
2014-05-28 17:36:21 -07:00
Chris Conlon
7e13e414cb
rename port.c/.h to wc_port.c/.h to prevent FreeRTOS conflicts
2014-05-28 10:28:01 -06:00
John Safranek
12841e6093
fix integration bugs with new suites
2014-05-20 14:07:08 -07:00
John Safranek
74712b4e71
1. Added the following cipher suites:
...
* TLS_PSK_WITH_AES_128_GCM_SHA256
* TLS_PSK_WITH_AES_256_GCM_SHA384
* TLS_PSK_WITH_AES_256_CBC_SHA384
* TLS_PSK_WITH_NULL_SHA384
2. Fixed CyaSSL_CIPHER_get_name() for AES-CCM cipher suites.
2014-05-19 21:44:04 -07:00
John Safranek
da5b042d21
AEAD additional data for encrypt and decrypt should be AEAD_AUTH_DATA_SZ
2014-05-19 09:14:10 -07:00
John Safranek
4a511fe36d
Added epoch to sequence number for AES-GCM with DTLS encrypt/decrypt.
2014-05-19 09:14:10 -07:00
John Safranek
628e7b4d72
adjust SendData() output buffer check for DTLS header size
2014-05-15 15:55:32 -07:00
toddouska
ce39ef62ef
update const error strings for newly added ones
2014-05-14 15:05:20 -07:00
toddouska
519820133d
Merge branch 'const_errorstrings' of https://github.com/rofl0r/cyassl into errstr
2014-05-14 14:51:40 -07:00
toddouska
8c9c257921
Merge pull request #79 from kojo1/IAR
...
sample projects for IAR EWARM
Why is SINGLE_THREADED assumed for IAR with ARM?
2014-05-12 13:28:02 -07:00
toddouska
e57d5d1d2f
Merge branch 'master' of github.com:cyassl/cyassl
2014-05-08 10:27:54 -07:00
toddouska
abbfcde0dc
add fips in core first/last files for code/data hashing
2014-05-08 10:26:31 -07:00
John Safranek
d6b98c1fab
moved OCSP config code outside NO_FILESYSTEM fence
2014-05-05 16:13:08 -07:00
John Safranek
ec13f65ef0
made OCSP callback not dependent on stdio
2014-05-05 16:11:02 -07:00
toddouska
4104b74c40
fix resource leak on bad user cert chain big buffer
2014-05-02 10:30:07 -07:00
toddouska
3e62da0bc9
add linux crl monitor clean shutdown
2014-05-02 10:14:40 -07:00
Takashi Kojo
35d5b66d2c
Merge remote-tracking branch 'CyaSSL-master/master' into IAR
2014-05-02 09:32:55 +09:00
toddouska
912ec25a0f
fix linux crl monitor build
2014-05-01 09:34:16 -07:00
toddouska
14c978ca67
remove space
2014-05-01 09:30:17 -07:00
toddouska
5ff0336491
add custom kqueue event for crl monitor shutdown
2014-05-01 09:28:33 -07:00
Takashi Kojo
f225714e75
io.c, #include
2014-05-01 17:09:28 +09:00
John Safranek
fb5200aa95
1. Added more options to the full commit test.
...
2. Cleanups from static analysis.
2014-04-30 15:01:10 -07:00
John Safranek
85d453f2d1
fix const issue with PK callbacks
2014-04-30 10:15:15 -07:00
John Safranek
09a7a087a2
fix static analysis warnings
2014-04-29 14:52:42 -07:00
John Safranek
618d282d94
Decodes the Name Constraints certificate extension on the CA cert
...
and checks the names on the peer cert, rejecting it if invalid
based on the name.
2014-04-28 11:03:24 -07:00
Moisés Guimarães
8d8fca67c3
SHA256, SHA384 and SHA512 error propagation. Major impact on random functions with error propagation.
2014-04-14 21:39:14 -03:00
Moisés Guimarães
32e2d7016f
SHA256, SHA384 and SHA512 error propagation. Major impact on Hmac functions with error propagation.
2014-04-14 21:36:04 -03:00
Moisés Guimarães
644bb9c524
SHA256, SHA384 and SHA512 error propagation. Minor impact on some of internal.c static functions.
2014-04-14 21:28:23 -03:00
Moisés Guimarães
41cc5f06e4
camellia_setup128 and camellia_setup256 refactory to reduce stack usage:
...
--- subL and subR variables moved to the heap;
--- return type changed to int, returning 0 for success;
--- chain of dependency updated to propagate the error in CamelliaSetKey function.
2014-04-14 21:28:22 -03:00
John Safranek
d7eff191ce
Merge branch 'master' of github.com:cyassl/cyassl
2014-04-14 10:35:39 -07:00
John Safranek
ede2aa9c91
allow key use extension errors to be overriden with verify callback
2014-04-14 10:29:29 -07:00
Chris Conlon
be65f5d518
update FSF address, wolfSSL copyright
2014-04-11 15:58:58 -06:00
John Safranek
421c08fc61
Merge branch 'frankencert'
2014-04-11 10:01:03 -07:00
John Safranek
603192f153
Removed an incorrect key use check.
2014-04-10 23:31:43 -07:00