JacobBarthelmeh
da04e0fb4c
Merge pull request #6115 from SKlimaRA/SKlimaRA/fix-decompress-dynamic
...
fixed heap corruption
2023-02-21 11:58:11 -07:00
Anthony Hu
a6114afb84
Merge pull request #6114 from dgarske/stm32_hash
...
Fix for STM32 hashing hardware
2023-02-21 18:37:03 +00:00
gojimmypi
821120e31c
Add SHA512/224 and SHA512/256 benchmarks ( #6113 )
2023-02-21 09:27:03 -08:00
Stanislav Klima
208056b2da
fixed heaap corruptions
2023-02-21 11:01:50 +01:00
Daniel Pouzzner
e0abb0e306
Merge pull request #6097 from gojimmypi/New_SHA512_Tests
...
Add new SHA-512/224 and SHA-512/256 tests
2023-02-21 01:39:38 -06:00
David Garske
6820fea5d3
Merge pull request #6111 from SparkiDev/sp_point_add_fix
...
SP: fix point_add_qz1
2023-02-20 17:05:21 -08:00
gojimmypi
136267d29c
Add new SHA-512/224 and SHA-512/256 tests
2023-02-20 16:55:38 -08:00
David Garske
5ec62c8d48
Merge pull request #6096 from SparkiDev/armv7a_neon_config
...
ARMv7a neon configure.ac
2023-02-20 15:22:20 -08:00
David Garske
39e72630ce
Proper fix for STM32 hashing. FIFO is always 32 bytes. The original U5/H7 proper fix is to make sure the hash is "done" before saving state.
2023-02-20 15:14:44 -08:00
András Fekete
c055740e6a
Merge pull request #6100 from julek-wolfssl/stunnel-github-action-test
...
Add OSP github action
2023-02-20 15:41:58 -05:00
Juliusz Sosinowicz
261054896c
Actions fix
...
Fix for `workflows must be defined at the top level of the .github/workflows/ directory` error.
2023-02-20 18:42:47 +01:00
Juliusz Sosinowicz
8b7ea9e820
Refactor os-check.yml
2023-02-20 18:42:47 +01:00
Juliusz Sosinowicz
04cc85b31e
Separate out into different files
2023-02-20 18:29:41 +01:00
Juliusz Sosinowicz
d3551acc2b
Code review
2023-02-20 18:29:41 +01:00
Juliusz Sosinowicz
36df1e1ae9
Add OSP github action
2023-02-20 18:29:41 +01:00
Sean Parkinson
9a7cd7367a
SP: fix point_add_qz1
...
Better detection of when add won't work and double needed.
Minor reorg of point operations.
2023-02-20 21:53:52 +10:00
Nuno Gonçalves
4e6bad1225
Fix out of bound memset to 0
...
In case buf size sz is too small it will get updated to the larger required value
and can't be used anymore to clear the buffer.
As the buffer is untouched don't need to clear it anyway.
Signed-off-by: Nuno Gonçalves <nunojpg@gmail.com>
2023-02-18 10:40:21 +00:00
Daniel Pouzzner
6cc5c1a428
Merge pull request #6102 from dgarske/non_const
...
Fix for "expression must have a constant value" in tls13.c
2023-02-17 21:07:27 -06:00
David Garske
1bae1ef63e
Merge pull request #6101 from kaleb-himes/invalid-pp-macro
...
Fix invalid PP macro logic, guard under same conditions as internal.h
2023-02-17 17:05:50 -08:00
Chris Conlon
588b694c7d
Merge pull request #5709 from TakayukiMatsuo/ccv
2023-02-17 17:02:04 -07:00
Kareem
8de2eba9ab
Fix allocating new sessions using the dynamic session cache.
2023-02-17 15:25:12 -07:00
David Garske
c476dd6e28
Merge pull request #6103 from SparkiDev/sp_ecdsa_sig_r0
...
SP ECC sign: reject random k when r is 0
2023-02-17 13:58:53 -08:00
David Garske
8a6483f13a
Merge pull request #6080 from tim-weller-wolfssl/zd15632-oob-in-cert-parsing
...
zd15632 - OSS-Fuzz #55810 : Out-of-bounds read in certificate parsing
2023-02-17 12:08:11 -08:00
David Garske
4edb7e26b9
Merge pull request #6104 from douzzer/20230216-readability-redundant-preprocessor
...
20230216-readability-redundant-preprocessor
2023-02-17 10:31:27 -08:00
David Garske
24fd561bf8
Merge pull request #6099 from bandi13/ocsp-cleanup
...
Be more aggressive in killing processes
2023-02-17 09:28:14 -08:00
Daniel Pouzzner
21645460cd
src/tls13.c: fix a readability-redundant-preprocessor in CheckPreSharedKeys().
2023-02-16 23:37:43 -06:00
Sean Parkinson
26b7052b3f
SP ECC sign: reject random k when r is 0
...
SP ECC signing code was generating signatures with r of 0.
This is not allowed by the algorithm description.
Retry sig gen when r is 0 like when s is 0.
2023-02-17 08:55:59 +10:00
David Garske
d488693f15
Allow #define HAVE_LIBZ
support in user_settings.h
.
2023-02-16 14:20:57 -08:00
David Garske
82d65481bb
Fix for "expression must have a constant value" in tls13.c with GreenHills compiler.
2023-02-16 13:58:48 -08:00
kaleb-himes
b2caa5c5ae
Fix invalid PP macro logic, guard under same conditions as internal.h
2023-02-16 14:40:43 -07:00
David Garske
0b31d5577c
Merge pull request #6098 from bandi13/moreDockerprograms
...
Some tests need these utilities
2023-02-16 13:28:02 -08:00
Andras Fekete
fdb0338473
Be more aggressive in killing processes
2023-02-16 09:55:52 -05:00
Andras Fekete
ff96150404
Some tests need these utilities
2023-02-16 09:51:46 -05:00
tim-weller-wolfssl
dea123f88e
Minimal changes to avoid Out-of-Bounds write in ASN.1 parsing logic. Add unit tests for ParseCert() API passing badly formed ASN data (should error out gracefully).
2023-02-16 07:49:08 -06:00
David Garske
0a6dedab03
Merge pull request #6094 from SparkiDev/aes_gcm_stream_bench
...
AES GCM benchmark: separate aes-gcm streaming runs
2023-02-15 21:10:48 -08:00
David Garske
464c2d19dc
Merge pull request #6006 from SparkiDev/tls13_only_psk_dhe_ke
...
TLS 1.3 PSK: add option to require only PSK with DHE
2023-02-15 21:10:27 -08:00
Daniel Pouzzner
859b1ff398
Merge pull request #6093 from dgarske/fix_async
...
Fix issue with async and `WOLFSSL_CHECK_ALERT_ON_ERR`
2023-02-15 19:49:56 -06:00
Sean Parkinson
aaed553311
Merge pull request #6092 from dgarske/various
...
Various cleanups (STM docs, include case, make dist small script)
2023-02-16 11:23:51 +10:00
Kareem
1167ad623b
Dynamic session cache: code review feedback
2023-02-15 17:38:14 -07:00
Sean Parkinson
85314e6ba5
ARMv7a neon configure.ac
...
Support other CPUs that start with armv7a.
2023-02-16 10:36:38 +10:00
Sean Parkinson
195ca1a20a
AES GCM benchmark: separate aes-gcm streaming runs
...
Always to AES-GCM one-shot benchmark.
When WOLFSSL_AESGCM_STREAM, always perform AES-GCM streaming benchmark.
2023-02-16 09:37:00 +10:00
Sean Parkinson
b624fc8377
TLS 1.3 PSK: add option to require only PSK with DHE
...
Can specify only PSK without DHE.
Add only PSK with DHE.
2023-02-16 09:21:29 +10:00
David Garske
18bee3142d
Fix to use the right cert/key in the API unit test if overridden.
2023-02-15 14:57:43 -08:00
David Garske
e8a26c673a
Fix for async with WOLFSSL_CHECK_ALERT_ON_ERR
.
2023-02-15 14:57:34 -08:00
David Garske
47801107da
Fix to make sure API unit test always calls init/cleanup when not running all tests.
2023-02-15 14:24:22 -08:00
David Garske
5481a059c4
Fix wincrypt.h
include header case when used with case sensitive file system.
2023-02-15 11:44:34 -08:00
David Garske
6ea3fe2f7a
Merge pull request #6089 from kaleb-himes/stunnel-5_67_support_fix
...
Fix unused variable warning when configuring with --enable-apachehttpd
2023-02-15 08:39:30 -08:00
Sean Parkinson
089ef86587
Merge pull request #6090 from douzzer/20230214-mollify-iso-c-pedantic
...
20230214-mollify-iso-c-pedantic
2023-02-15 17:04:07 +10:00
Daniel Pouzzner
ca87a99646
src/ssl.c and src/x509.c: use the customary function pointers (WOLFSSL_CRYPTO_EX_*()), not void *, in the arg lists of wolfSSL_CTX_get_ex_new_index() and wolfSSL_X509_get_ex_new_index(), to avoid "ISO C forbids passing argument ... between function pointer and ‘void *’";
...
move typedefs for WOLFSSL_CRYPTO_EX_*() from wolfssl/openssl/compat_types.h to wolfssl/wolfcrypt/types.h, grouped with the other EX_DATA-related typedefs, as they are needed whenever defined(HAVE_EX_DATA) regardless of openssl compatness;
properly gate wolfSSL_CTX_get_ex_new_index() and wolfSSL_X509_get_ex_new_index() prototypes on defined(HAVE_EX_DATA).
2023-02-14 19:28:40 -06:00
David Garske
7e582932f3
Improve documentation for STM32 PKA support.
2023-02-14 14:27:05 -08:00