David Garske
eaa5edb65b
Support for ECC_CACHE_CURVE with no malloc. ZD 17774
2024-04-30 08:22:56 -07:00
Hideki Miyazaki
d4b265e84c
convert outLen type correctly
2024-04-30 17:19:11 +09:00
Hideki Miyazaki
07de40e4bd
fix warnings
...
fix encrypted key use case
Update README
2024-04-30 17:19:11 +09:00
Sean Parkinson
068a3b5e99
Merge pull request #7481 from douzzer/20240424-sha-C-dynamic-fallback
...
20240424-sha-C-dynamic-fallback
2024-04-30 09:00:57 +10:00
Daniel Pouzzner
bb4c2cbad6
address peer review: typography in linuxkm/linuxkm_memory.c, typography, clarity, and efficiency in wolfcrypt/src/sha256.c and wolfcrypt/src/sha512.c.
2024-04-29 14:02:44 -05:00
David Garske
5af0b1e83b
Improved the prioritization of crypto callback vs async crypt in ECC and RSA. Resolves possible use of uninitialized value on ECC/RSA key when PKCS11 is enabled. See #7482
2024-04-29 10:34:01 -07:00
Daniel Pouzzner
7260cc124c
smallstack refactors of wolfcrypt/src/evp.c:wolfssl_evp_digest_pk_final() and wolfcrypt/test/test.c:openssl_test().
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
885497ba5a
add missing gate around Sha256_SetTransform() declaration in wolfcrypt/src/sha256.c;
...
remove stray definitions of XTRANSFORM*() in wolfcrypt/src/sha512.c;
restore global intel_flags in the !WC_NO_INTERNAL_FUNCTION_POINTERS paths of sha256.c and sha512.c;
disable test_wolfSSL_dtls_compare_stateless() in tests/api.c when DEBUG_VECTOR_REGISTER_ACCESS_FUZZING (it depends on a stable SHA512 hash of the in-memory struct WOLFSSL image).
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
3f8e33369c
implement WC_C_DYNAMIC_FALLBACK for SHA-3.
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
4184b0e4f3
implement WC_C_DYNAMIC_FALLBACK for SHA512.
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
65649b63d1
implement WC_C_DYNAMIC_FALLBACK for SHA256.
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
4cc27fa58b
rename WC_AES_C_DYNAMIC_FALLBACK to WC_C_DYNAMIC_FALLBACK.
2024-04-27 12:35:23 -05:00
Sean Parkinson
e22ae7a1f8
Merge pull request #7469 from douzzer/20240424-fix-ports-whitespace
...
20240424-fix-ports-whitespace
2024-04-26 09:00:38 +10:00
Sean Parkinson
9ac918c0d4
Merge pull request #7462 from kaleb-himes/SRTP-KDF-HARNESSrev2
...
Srtp kdf harness rev2
2024-04-26 08:21:37 +10:00
Daniel Pouzzner
e862c85db4
fix formatting infractions in the ports (hard tabs, trailing whitespace, C++ comments, stray Unicode including numerous homoglyphs).
2024-04-24 18:32:48 -05:00
kaleb-himes
24eed7de34
Remove debug printf and place comments inside gate
2024-04-24 10:55:13 -04:00
Sean Parkinson
6e49aa7543
Merge pull request #7421 from philljj/update_lms_parms
...
Update enum wc_LmsParm for wolfboot support.
2024-04-24 16:39:10 +10:00
Sean Parkinson
9d7913508b
Merge pull request #7460 from douzzer/20240423-linuxkm-sha-2-3-asm-save-vector-regs
...
20240423-linuxkm-sha-2-3-asm-save-vector-regs
2024-04-24 07:33:05 +10:00
kaleb-himes
80d21f10c6
Remove excess empty line
2024-04-23 13:47:26 -04:00
kaleb-himes
690671d447
ECC allow keyVer of 192-bit (import OK, generate restricted)
2024-04-23 13:45:41 -04:00
András Fekete
a75c2befb5
Add CUDA support ( #7436 )
...
* Redirect the AesEncrypt_C call to device
* Fix function declarations
* Force CC=nvcc with CUDA
* Don't let C++ mangle function names
* Add larger parallelization
* Add in memory copy to device
* `nvcc` does not support '-Wall' nor '-Wno-unused'
* Add in README.md
* Clean up script to output color coded data
* Fix Asymmetric cipher comparisons
* Add in standard output parsing in addition to the CSV
* Add option to output results in a CSV
---------
Co-authored-by: Andras Fekete <andras@wolfssl.com >
2024-04-23 08:26:27 -07:00
jordan
bc00c95fe5
Update enum wc_LmsParm for wolfboot support.
2024-04-23 09:37:07 -05:00
Daniel Pouzzner
5d9154e8c6
wolfcrypt/src/sha{256,512,3}.c add SAVE_VECTOR_REGISTERS() for SHA-2 and SHA-3 vectorized implementations, and add WC_NO_INTERNAL_FUNCTION_POINTERS code paths to fix GOT relocations around implementation function pointers.
2024-04-23 01:31:43 -05:00
David Garske
3a89c452b3
Merge pull request #7454 from lealem47/stm32AesCtr
...
Fix for AES CTR on STM32
2024-04-22 10:04:06 -07:00
Daniel Pouzzner
44e8f392ae
wolfcrypt/src/kdf.c: fix -Wconversions in wc_SRTCP_KDF_ex().
2024-04-22 01:11:46 -05:00
Lealem Amedie
9bc0e31a32
Fix for AES CTR on STM32
2024-04-19 12:35:33 -06:00
kaleb-himes
e835517633
SRTCP 32-bit indices default plus errata 48-bit indices
2024-04-19 12:31:08 -06:00
JacobBarthelmeh
69be7a7c54
Merge pull request #7431 from lealem47/aes_cfb
...
Fix for AES-CFB1 encrypt/decrypt on size (8*x-1) bits
2024-04-19 10:55:27 -06:00
Daniel Pouzzner
0264a518e1
wolfcrypt/src/ed25519.c: in ed25519_pairwise_consistency_test(), add casts to mollify -Wconversion.
2024-04-19 01:41:35 -05:00
Daniel Pouzzner
85f3fb9d07
Merge pull request #7409 from SparkiDev/asm_x64_rip_fix
...
SHA-256 x64 ASM - fix use of %rip
2024-04-19 02:33:47 -04:00
Sean Parkinson
d2b9a365f2
ChaCha20 and Poly1305 x64 ASM - fixu use of %rip
...
Get the address of the constants into a register at start instead of
calculating the address relative to the instruction pointer each time.
2024-04-19 09:59:54 +10:00
JacobBarthelmeh
ef153101b7
Merge pull request #7433 from SparkiDev/eddsa_fips_checks
...
EdDSA FIPS checks on public key
2024-04-18 14:34:31 -06:00
Lealem Amedie
295033441c
Fix for AES-CFB1 encrypt/decrypt on size (8*x-1) bits
2024-04-18 11:31:28 -06:00
kaleb-himes
0bd5967093
Adjust FIPS version and default configuration
2024-04-18 08:41:05 -06:00
Sean Parkinson
c590fe514f
EdDSA FIPS checks on public key
...
Check that the Ed25519 and Ed448 public key is valid even without
private key.
Perform pairwise consistency test, only in FIPS, when making a key i
Ed25519 and Ed448.
2024-04-17 17:50:33 +10:00
Daniel Pouzzner
855175da47
wolfcrypt/src/fe_448.c: fix several out-of-order declarations in fe448_mul_8().
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
9f55dba2f2
wolfcrypt/src/aes.c: in AES-XTS AESNI, use cautious strategy as in AESGCM_STREAM for SAVE_VECTOR_REGISTERS, due to random failures seen with DEBUG_VECTOR_REGISTER_ACCESS_FUZZING using the old per-call fallback strategy.
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
b2f594e84b
fixes for --enable-32bit CFLAGS=-m32 --enable-fips=v6 (fixes "#error ED448 requires SHAKE256").
2024-04-17 00:43:41 -05:00
Sean Parkinson
8e9810e87e
ssl.c: Move functions out to separate files
...
Moved E[CD][25519||448] APIs to pk.c
Move public key PEM APIs to pk.c.
Move wolfSSL loading and using of private keys and certificates to
ssl_load.c
Move PKCS#7 and PKCS#12 APIs to ssl_p7p12.c.
Move session and session cache APIs to ssl_sess.c.
Other minor fixes.
2024-04-16 10:30:59 +10:00
Daniel Pouzzner
6e0a90190f
fixes for v5 and v6+ FIPS builds, including linuxkm v6+ builds.
2024-04-15 14:11:21 -05:00
JacobBarthelmeh
8b656d5a5f
Merge pull request #7295 from kaleb-himes/SRTP-KDF-FS
...
SRTP-KDF FS Preview
2024-04-11 13:41:05 -06:00
JacobBarthelmeh
ff09f418c0
Merge pull request #7408 from SparkiDev/asn_templ_rid
...
X.509 RID ASN template behaviour
2024-04-10 11:42:07 -06:00
kaleb-himes
264dcd4e15
Fix a file mode and more overlong lines
2024-04-10 10:18:49 -06:00
Sean Parkinson
8b3fbe47e6
SHA-256 x64 ASM - fix use of %rip
...
Get the address of table K instead of using it directly each time a
value is required.
2024-04-10 15:02:19 +10:00
Sean Parkinson
b48b5c47f4
X.509 RID ASN template behaviour
...
Don't set the DNS entry for RID unless OPENSSL_ALL is defined to match
the behaviour of original ASN code.
2024-04-10 10:39:45 +10:00
kaleb-himes
b8d31b042f
Windows support
2024-04-09 13:55:05 -06:00
kaleb-himes
71e83cdd19
Resolve armasm fips wrappers and sanity
2024-04-09 11:41:41 -06:00
kaleb-himes
e45867bbc3
WIN fips section refactor / wolfEntropy API syntax adjustment
2024-04-09 09:48:33 -06:00
kaleb-himes
ef2a636610
Expose additional features of opensslall in a compliant way
2024-04-09 09:48:33 -06:00
kaleb-himes
2e63ae750d
Comments for SP800-38E TODO, wolfEntropy optional setup and remove forced errors api.c
2024-04-09 09:48:33 -06:00