Jacob Barthelmeh
|
5b4f17545b
|
autoconf checks on some builds that break, macro for no server, and user rsa
|
2016-04-06 15:36:50 -06:00 |
|
David Garske
|
dd28d53cfb
|
Fix build issues with new async changes. Fixed issue with unused args preSigSz and preSigIdx with PSK enabled and ECC + RSA disabled. Fixed issue with missing qsSz variable in DoClientKeyExchange. Fixed missing DhAgree and DhKeyGen with NO_CERTS and PSK enabled. Fixed a couple scan-build warnings with "Value stored to '' is never read".
|
2016-04-01 09:23:46 -07:00 |
|
toddouska
|
63b1282e67
|
Merge pull request #335 from dgarske/asynccrypt
Asynchronous crypto and wolf event support
|
2016-03-30 20:12:41 -07:00 |
|
toddouska
|
6e5b23e102
|
Merge pull request #370 from dgarske/stm_aes_gcm_ccm
Enhancement to the STM32F2_CRYPTO port to support AES GCM, AES CCM an…
|
2016-03-30 13:39:35 -07:00 |
|
toddouska
|
d30f410768
|
Merge pull request #368 from JacobBarthelmeh/master
Check for compile of misc.c and fix disable inline
|
2016-03-29 17:26:55 -07:00 |
|
Jacob Barthelmeh
|
e60adfc9da
|
better naming of macro and alter misc.c check
|
2016-03-29 13:42:40 -06:00 |
|
Jacob Barthelmeh
|
7e90e2e540
|
misc.c compile warning accounts for FIPS
|
2016-03-28 17:22:39 -06:00 |
|
Jacob Barthelmeh
|
2665db73a4
|
check for compiling misc.c when not needed
|
2016-03-28 16:03:15 -06:00 |
|
John Safranek
|
59a84b40c7
|
Merge pull request #364 from toddouska/ecc-test-free
Fixes to cleanup unnecessary ECC make key, check key and free in ECC vector item test.
|
2016-03-28 13:15:20 -07:00 |
|
David Garske
|
03765ecca7
|
Fixes to cleanup unnecessary ECC make key, check key and free in ECC vector item test.
|
2016-03-25 13:22:31 -07:00 |
|
John Safranek
|
190d30f336
|
Merge pull request #362 from dgarske/bench_rng
Added benchmark for the RNG.
|
2016-03-25 12:12:20 -07:00 |
|
toddouska
|
1649af37be
|
fix ecc curve test in normal math mode, free is needed
|
2016-03-25 11:33:35 -07:00 |
|
David Garske
|
f539a60a40
|
Adjusted the RNG benchmark to split into smaller requests of max allowed RNG size.
|
2016-03-25 06:59:35 -07:00 |
|
David Garske
|
27e041246f
|
Added benchmark for the RNG.
|
2016-03-24 08:42:19 -07:00 |
|
David Garske
|
3796fc1322
|
Enhancement to the STM32F2_CRYPTO port to support AES GCM, AES CCM and AES-Direct (for encrypt only) using combination of software and AES HW acceleration.
|
2016-03-24 07:08:42 -07:00 |
|
Chris Conlon
|
20285bec01
|
fix wc_ecc_import_raw comment, public key instead of base point
|
2016-03-23 15:33:53 -06:00 |
|
toddouska
|
2dfc7faa73
|
Merge pull request #355 from dgarske/EccTestCleanup
wolfCrypt ECC test improvements and code cleanup
|
2016-03-23 12:18:42 -07:00 |
|
toddouska
|
18961e5620
|
Merge pull request #351 from dgarske/ChaChaRefactor
Refactor of the ChaCha hard coded variables
|
2016-03-23 12:17:23 -07:00 |
|
John Safranek
|
d8fb4b6ee7
|
Merge pull request #352 from dgarske/DRBGSmallStack
Fix to reduce stack usage in the hash-based random number generator h…
|
2016-03-21 12:20:48 -07:00 |
|
David Garske
|
0fc5575b8b
|
Fixed typo with WOLFSSL_VALIDATE_ECC_IMPORT defined. Disable ECC-224 bit compressed key test since it isn't working. Cleanup in accel_fp_mul for KB_SIZE.
|
2016-03-18 15:41:03 -07:00 |
|
David Garske
|
369930238a
|
Cleanup of the ecc_test functions to break areas into separate functions providing WC_RNG and key size. Added ECC tests by key size for all enabled curves. Added actual key size on wc_ecc_make_key for the NIST test vectors. Added ECC testing of wc_ecc_verify_hash with digests having 0's and sequence (1,2,3,...) and made sure it runs verify twice.
|
2016-03-17 15:31:45 -07:00 |
|
Jacob Barthelmeh
|
e99a5b0483
|
prepare for release v3.9.0
|
2016-03-17 16:02:13 -06:00 |
|
David Garske
|
e1787fe160
|
Added "--enable-asynccrypt" option for enabling asynchronous crypto. This includes a refactor of SendServerKeyExchange and DoClientKeyExchange to support WC_PENDING_E on key generation, signing and verification. Currently uses async simulator (WOLFSSL_ASYNC_CRYPT_TEST) if cavium not enabled. All of the examples have been updated to support WC_PENDING_E on accept and connect. A generic WOLF_EVENT infrastructure has been added to support other types of future events and is enabled using "HAVE_WOLF_EVENT". Refactor the ASN OID type (ex: hashType/sigType) to use a more unique name. The real "async.c" and "async.h" files are in a private repo.
|
2016-03-17 13:31:03 -07:00 |
|
toddouska
|
10e74f7200
|
Merge pull request #353 from dgarske/EccUnsignedSizeCheckFix
Fixed bug where mp_unsigned_bin_size returning 0 could produce a UINT…
|
2016-03-17 10:50:01 -07:00 |
|
David Garske
|
19967dd264
|
Fixed bug where mp_unsigned_bin_size returning 0 could produce a UINT_MAX (based on -1) resulting in invalid index to an array. Added test case for this if FP_ECC is defined.
|
2016-03-17 09:39:10 -07:00 |
|
David Garske
|
bda69decc1
|
Fix to reduce stack usage in the hash-based random number generator health tests when WOLFSSL_SMALL_STACK is defined.
|
2016-03-16 17:04:07 -07:00 |
|
toddouska
|
46a01c29d8
|
Merge pull request #350 from JacobBarthelmeh/master
check for invalid RSA OAEP with SHA512 test case
|
2016-03-16 16:25:13 -07:00 |
|
Jacob Barthelmeh
|
2dd5efd969
|
sanity check for RSA key size and hash digest size
|
2016-03-16 15:25:52 -06:00 |
|
Jacob Barthelmeh
|
4c3ddac23c
|
catch invalid test case of RSA-OAEP and fix cast
|
2016-03-16 14:51:25 -06:00 |
|
David Garske
|
473ea567bd
|
Refactor of the ChaCha hard coded variables.
|
2016-03-16 13:36:44 -07:00 |
|
David Garske
|
0683ecb727
|
Fixed FreeCRL issue with strdup memory. Added additional checks for WOLF_AES_CBC and WOLF_AES_COUNTER. Disabled memory tracker by default for wolfCrypt test and benchmark. Updated README to better document Linux Binutils LD bug workaround.
|
2016-03-16 09:41:19 -07:00 |
|
David Garske
|
f0ea9d747f
|
Fix possible positive return value for random_rng_test. Removed reference to nrf51_aes_decrypt, which is not supported, and added compile error for it. Corrected ecc_test_raw_vector return code checking. Cleanup in InitMemoryTracker.
|
2016-03-15 18:33:24 -07:00 |
|
David Garske
|
bf058ef1b9
|
Fixed Jenkins error reports for mem_track msg, incorrect #ifdef in aes_test and ecc_test_raw_vector response code checking. Fixed C89 compliance with wc_AesSetKey. Fixed nrf_drv_rng_init response checks in RNG code. Reverted comment change in AES. Fixed nRF51 AES CBC Encrypt support. Added response code checking for nrf51_aes_set_key.
|
2016-03-15 17:18:03 -07:00 |
|
David Garske
|
a38183b816
|
Port for Nordic nRF51 RNG, RTC and AES. Added RNG test for wc_RNG_GenerateBlock 0's check even if HAVE_HASHDRBG is enabled. Added NIST test vectors for ECC P-256, P-384 and P-521. Added helpful debug message in ECC import if issue finding ecc_sets[] for curve. Moved memory tracker into separate file and added support for it to wolfcrypt test and benchmark. Added Ed255519/Curve25519 options for granular control of sign, verify, shared secret, import and export. Added AES options for max key size (AES_MAX_KEY_SIZE), no decrypt (NO_AES_DECRYPT) and no CBC (NO_AES_CBC).
|
2016-03-15 13:58:51 -07:00 |
|
Jacob Barthelmeh
|
db758dc98b
|
update test script, fall back to cert name search, fix der free
|
2016-03-12 09:37:32 -07:00 |
|
Jacob Barthelmeh
|
060e278559
|
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into Certs
|
2016-03-11 23:48:39 -07:00 |
|
Jacob Barthelmeh
|
3976a3e2f2
|
K64F RNGA register
|
2016-03-10 14:35:55 -07:00 |
|
Jacob Barthelmeh
|
6e1c5b3801
|
disable CERT_EXT policies check when SEP is used instead
|
2016-03-09 17:22:38 -07:00 |
|
David Garske
|
8e8ee45828
|
LeanTLS: Fixed issue with GetCA, GetCAByName and PickHashSigAlgo with HAVE_ECC, NO_RSA and NO_CERTS defined. Added new "--enable-leantls" option, which enables TLS 1.2 client only with ECC256, AES128 and SHA256 (no RSA, DH, DSA, MD4, MD5, SHA, PSK, PWD, CERTS, DES3, Error Strings, ARC4, Coding, Memory or File System).
|
2016-03-08 08:35:28 -08:00 |
|
David Garske
|
b549c81337
|
Fix the WOLFSSL_SEP (--enable-sep) build scenario where extCertPoliciesNb is not available.
|
2016-03-07 14:49:24 -08:00 |
|
David Garske
|
05fb648747
|
Remove white-space.
|
2016-03-07 14:33:22 -08:00 |
|
David Garske
|
9b79d8643e
|
Added checks for total length and the cert policy OID len to make sure they don't exceed buffer.
|
2016-03-07 14:20:37 -08:00 |
|
David Garske
|
dee3645c4e
|
Fixed bug with ASN.1 X509V3 Certificate Policy extension parsing. Bug had to do with parsing when OID contains multiple items such as example 2 below. The wolfssl.com server key now contains a URL in the certificate policy "https://secure.comodo.com/CPS0", which wasn't being parsed over correctly. Also cleanup to use loop instead of duplicate code.
Example 1:
30 12
30 06 06 04 55 1D 20 00
30 08 06 06 67 81 0C 01 02 01
Result:
2.5.29.32.0
2.23.140.1.2.1
Example 2:
30 46
30 3A 06 0B 2B 06 01 04 01 B2 31 01 02 02 07
30 2B 30 29 06 08 2B 06 01 05 05 07 02 01 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65 2E 63 6F 6D 6F 64 6F 2E 63 6F 6D 2F 43 50 53
30 08 06 06 67 81 0C 01 02 01
Result:
1.3.6.1.4.1.6449.1.2.2.7
2.23.140.1.2.1
|
2016-03-07 13:40:25 -08:00 |
|
Jacob Barthelmeh
|
05d2cec7c1
|
addition to api tests and refactor location of trusted peer cert check
|
2016-03-02 11:35:03 -07:00 |
|
Jacob Barthelmeh
|
7df22ee210
|
Trusted peer certificate use
|
2016-03-02 11:22:34 -07:00 |
|
toddouska
|
0c45a7a028
|
Merge pull request #317 from dgarske/DerBufferRefactor
Refactor of the DER buffer handling
|
2016-02-25 09:35:50 -08:00 |
|
kaleb-himes
|
16dac5597f
|
prevent buffer overflows if sigSz > MAX_ENCODED_SIG_SZ
|
2016-02-24 16:08:54 -07:00 |
|
kaleb-himes
|
4858a65984
|
Always execute wc_InitRsaKey if we are always going to execute wc_FreeRsaKey
|
2016-02-24 14:42:07 -07:00 |
|
David Garske
|
731e13ecf2
|
Fixes issue with building crypt benchmark with only ED/Curve25519 enabled with static rng missing.
|
2016-02-22 16:46:13 +01:00 |
|
David Garske
|
3fe5ee1a7c
|
Refactor of the DER buffer handling. Added new DerBuffer struct that includes the type and heap ptr. Added new InitDer, AllocDer and FreeDer functions. Cleanup of some missing "heap" args on XMALLOC/XFREE. In FreeDer uses ForceZero if type is private key.
|
2016-02-18 22:42:15 -08:00 |
|