kaleb-himes
04f24881cb
Fix for potential leak on err: Thanks to Chris H. for the report
2019-05-17 16:48:58 -06:00
David Garske
651087ab5a
Merge pull request #2241 from ejohnstown/sniffer
...
Sniffer Update
2019-05-15 18:52:44 -07:00
David Garske
7a671eb70b
Merge pull request #2243 from JacobBarthelmeh/Windows
...
custom ECC curves on Windows
2019-05-15 18:51:01 -07:00
JacobBarthelmeh
aca46f42fb
Merge pull request #2242 from ejohnstown/micrium
...
Micrium Updates
2019-05-15 15:43:37 -06:00
Jacob Barthelmeh
b2a5516c63
custom ECC curves on Windows
2019-05-15 11:31:26 -06:00
John Safranek
3b0a7e679a
Add an option for __inline w.r.t. using a GHC compiler.
2019-05-14 13:44:33 -07:00
John Safranek
5b658ebff5
Renamed #sslpro as #error.
2019-05-14 13:44:33 -07:00
John Safranek
0cdaf43a14
Rename the macro "STATIC" as "WC_STATIC" to prevent collisions.
2019-05-14 13:44:33 -07:00
John Safranek
a8b469eb7f
Sniffer
...
1. Refactor `ProcessClientKeyExchange()` so it can be expanded to handle ECC keys for ECDH support.
2. Add support to the sniffer for ECDH based cipher suites.
2019-05-14 13:33:52 -07:00
John Safranek
9d4d877919
Sniffer
...
1. Added the null-cipher to the list of supported bulk ciphers.
2019-05-13 11:29:14 -07:00
David Garske
f923409f1f
Merge pull request #2235 from kaleb-himes/ZD-5116
...
Check appropriate flag for private vs public - Thanks to: E.M.
2019-05-13 10:29:48 -07:00
toddouska
dbeb5d702f
Merge pull request #2231 from JacobBarthelmeh/Fuzzer
...
sanity check on buffer size
2019-05-10 16:46:38 -07:00
kaleb-himes
79bf578fd3
Check appropriate flag for private vs public - Thanks to: E.M.
2019-05-09 17:05:34 -06:00
JacobBarthelmeh
e43e03c30a
Merge pull request #2226 from tmael/defectEVP
...
Verify input parameters of EVP_CipherFinal
2019-05-09 14:35:16 -06:00
Tesfa Mael
1605ab86d2
Verify input arguments and handle incorrect length of a final block
2019-05-09 08:32:52 -07:00
Sean Parkinson
34dc41fe75
Merge pull request #2229 from JacobBarthelmeh/Testing
...
free any existing ke before updating
2019-05-09 11:48:59 +10:00
Jacob Barthelmeh
9205ee70f4
add null check on pointer before passing to XFREE
2019-05-08 16:04:20 -06:00
Jacob Barthelmeh
94d9ce1dfa
sanity check on buffer size
2019-05-08 09:33:35 -06:00
toddouska
ff5bf7aea1
Merge pull request #2230 from dgarske/bench_threads
...
Added benchmarking `-thread <num>` argument support
2019-05-07 11:21:29 -07:00
toddouska
dcd6e02de9
Merge pull request #2228 from JacobBarthelmeh/Fuzzer
...
sanity check on buffer size before copy
2019-05-07 11:20:35 -07:00
toddouska
a36296a959
Merge pull request #2227 from dgarske/eccsigsz
...
Fix issue with ECC signature size leaking memory with normal math
2019-05-07 11:17:12 -07:00
David Garske
891a645eaa
Added benchmarking -thread <num>
argument support for asynchronous crypto to allow run-time selection of thread count. ZD 4903.
2019-05-07 07:07:56 -07:00
Jacob Barthelmeh
a130ce2eed
free any existing ke before updating
2019-05-06 15:51:42 -06:00
Jacob Barthelmeh
b1442633dd
sanity check on buffer size before copy
2019-05-06 15:36:58 -06:00
David Garske
3c1569dff7
Fix for issue with new wc_ecc_get_curve_order_bit_count
function not free'ing memory when used with normal math. Started in https://github.com/wolfSSL/wolfssl/pull/2201
2019-05-06 11:41:50 -07:00
toddouska
683646e452
Merge pull request #2208 from SparkiDev/curve25519_arm
...
Curve25519 ARM64 assembly
2019-05-03 11:14:35 -07:00
toddouska
08531a0f31
Merge pull request #2225 from dgarske/unicode
...
Remove leading unicode UTF-8 BOM characters
2019-05-03 11:12:06 -07:00
David Garske
1a76f0cd26
Remove leading unicode UTF-8[a] BOM characters (EF BB BF). Searched through repo and atmel.c was only one.
2019-05-02 13:21:43 -07:00
John Safranek
78c6ad4d84
Merge pull request #2217 from tmael/maintenanceOcspResponse
...
Fix for an OCSP Response signed by issuer
2019-05-02 10:14:01 -07:00
toddouska
0dd3305f06
Merge pull request #2221 from SparkiDev/rfc8032
...
Support Ed25519ctx and Ed25519ph sign/verify algorithms
2019-05-01 15:45:03 -07:00
toddouska
5e343b8e7e
Merge pull request #2201 from dgarske/siglen
...
Improvements to the maximum ECC signature calculations
2019-05-01 15:42:12 -07:00
toddouska
814c5776fd
Merge pull request #2051 from dgarske/build_fixups
...
Fixes for various build issues
2019-05-01 15:41:14 -07:00
Sean Parkinson
b25177ca6c
Include new ARMv8 curve25519 C file in distribution
2019-05-01 13:23:06 +10:00
Sean Parkinson
dc98832757
Add more tests for Ed25519ctx and Ed25519ph
2019-05-01 09:24:08 +10:00
toddouska
dc313ccf6e
Merge pull request #2222 from dgarske/win_dir
...
Fix for read directory functions with Windows
2019-04-30 15:19:34 -07:00
Kaleb Himes
e00ba1c66a
Merge pull request #2090 from vaintroub/fix_clang_cl
...
Disable MP_64BIT when compiling with clang-cl on Windows.
2019-04-30 13:36:39 -06:00
Chris Conlon
7cdda4d595
Merge pull request #2218 from abrahamsonn/iar
...
IAR-EWARM warning removal/formatting
2019-04-30 11:55:29 -07:00
David Garske
86101468fc
Fixes for know wolfSSL build issues in the following cases:
...
* Fixes for building wolfSSL from GitHub sources download, where .git does exist. The autogen.sh still needs to "touch" files for the build to work.
* Fix for FIPS case where `wc_RsaSetRNG` is not available.
* Added new `./configure --enable-usersettings` option to not populate the Makefile with build options and instead define `WOLFSSL_USER_SETTINGS` and expect a user provided `user_settings.h` file.
* Fix for `HAVE___UINT128_T` to match config.h generated value to eliminate warning.
2019-04-30 11:45:48 -07:00
David Garske
443fef6a6a
Further optimization of the ECC signature size calculation.
2019-04-30 08:50:19 -07:00
Sean Parkinson
9d736898cc
Support Ed25519 sign/verify algorithms ctx and ph
2019-04-30 16:57:20 +10:00
David Garske
8aacd7b802
Fix for read directory functions with Windows (wc_ReadDirFirst
and wc_ReadDirNext
). Fix to use bit-mask check instead of equality.
2019-04-29 20:47:52 -07:00
abrahamsonn
b68253c180
Merge branch 'iar' of https://github.com/abrahamsonn/wolfssl into iar
2019-04-26 15:41:27 -06:00
abrahamsonn
ef29aa94ea
Added build option checks to tls.c and tls13.c
...
Set tls.c and tls13.c to abort if the library is built with TLS 1.3 and not
HAVE_TLS_EXTENSIONS
2019-04-26 15:32:38 -06:00
abrahamsonn
ea797fd98e
Building with just bare TLS 1.3 settings
...
will produce the error that the wolfSSL struct doesn't have extensions.
2019-04-26 14:08:20 -06:00
abrahamsonn
bbb72946b7
initialized var.
2019-04-26 11:35:50 -06:00
abrahamsonn
1830a0a74c
Removed trailing whitespaces
2019-04-25 15:50:02 -06:00
Tesfa Mael
45703a8d72
handle OCSP verified certificate which is already loaded as CA
2019-04-25 10:55:12 -07:00
Chris Conlon
fdabe614f8
Merge pull request #2215 from miyazakh/Renesas_IDE
...
Clean up user_settings for CS+
2019-04-24 15:55:01 -07:00
toddouska
12a7c32530
Merge pull request #2170 from tmael/nRF52840CryptoCell
...
Initial CryptoCell-310 support on nRF52840
2019-04-24 11:09:46 -07:00
toddouska
547c09e1d7
Merge pull request #2210 from JacobBarthelmeh/Compatibility-Layer-Part2
...
JSSE additions
2019-04-24 11:04:05 -07:00