toddouska
cac799f683
add optional ecc ctx info
2014-07-02 16:59:45 -07:00
toddouska
be402277e0
add override cert date example for bad clock testing
2014-07-02 12:07:25 -07:00
toddouska
4eebba8162
Merge branch 'master' of github.com:cyassl/cyassl
2014-07-01 09:28:40 -07:00
toddouska
c957e9a909
make default I/O callbacks external for user to base/wrap if desired
2014-07-01 09:27:31 -07:00
Chris Conlon
ee0d989c24
add sizeof ints back to certs_test.h, fix cert buffer usage in benchmark.c
2014-07-01 09:38:12 -06:00
Chris Conlon
3ea0f7b4ab
add key/cert buffers for CA cert, server key/cert
2014-07-01 08:58:47 -06:00
Moisés Guimarães
9339d7d5b1
add support to TLS extensions in DTLS
2014-06-25 13:26:42 -03:00
toddouska
e6d9151f47
add user cert chain functionality at SSL level instead of just CTX
2014-06-20 10:49:21 -07:00
toddouska
6371b3c262
send ecdsa_sign for client cert request type is sig algo ecdsa
2014-06-20 09:22:40 -07:00
John Safranek
33fb679334
fix small config bug between AES-GCM and AES-CCM
2014-06-15 13:59:33 -07:00
toddouska
ddf5924b3b
add error code for hmac min key len in new error range
2014-06-11 11:56:17 -07:00
toddouska
b3abbbb0ce
make more room for wolfCrypt error range
2014-06-11 11:50:14 -07:00
toddouska
aad204428f
fips mode hmac min key length for 2014 requirements
2014-06-11 11:43:17 -07:00
toddouska
e0c5c89bf6
add sanity check on send callback sent value
2014-06-09 12:55:17 -07:00
Chris Conlon
7e5287e578
update NTRU support, with help from thesourcerer8
2014-06-05 14:42:15 -06:00
Joseph Spadavecchia
3d94a41740
Increased max AltName buffer size (for cert generation)
2014-06-03 10:58:22 +01:00
toddouska
66eb3caac5
bump dev version
2014-05-30 17:02:30 -07:00
toddouska
5b7a5fe0bb
Merge branch 'master' of github.com:cyassl/cyassl
2014-05-30 16:56:28 -07:00
toddouska
0f311adb2c
if icc doesn't have 128bit type on x64 don't use it
2014-05-30 16:54:09 -07:00
John Safranek
b60a61fa94
DHE-PSK cipher suites
...
1. fixed the AES-CCM-16 suites
2. added DHE-PSK as a key-exchange algorithm type
3. Added infrastructure for new suites:
* TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
* TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
* TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
* TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
* TLS_DHE_PSK_WITH_NULL_SHA256
* TLS_DHE_PSK_WITH_NULL_SHA384
* TLS_DHE_PSK_WITH_AES_128_CCM
* TLS_DHE_PSK_WITH_AES_256_CCM
4. added test cases for new suites
5. set DHE parameters on test server when using PSK and a custom cipher
suite list
6. updated half premaster key size
2014-05-30 11:26:48 -07:00
toddouska
e11dd9803a
fix icc v14 warnings
2014-05-28 17:36:21 -07:00
Chris Conlon
7e13e414cb
rename port.c/.h to wc_port.c/.h to prevent FreeRTOS conflicts
2014-05-28 10:28:01 -06:00
Moisés Guimarães
263d3439d9
DecodedCert:
...
* add structure fields to persist encoding format of subject parts;
* set default encoding formats at InitDecodedCert;
* retrieve encoding format from buffer at GetName;
* copy encoding format from DecodedCert to CertName at SetNameFromCert.
2014-05-23 15:48:50 -03:00
Moisés Guimarães
e517459f89
CertName:
...
* add structure fields to persist encoding format;
* set default encoding formats at InitCert;
* add function to retrieve encoding format of a specific field based on it's id.
2014-05-23 11:11:46 -03:00
toddouska
15d3d3f790
fix visual studio 64 warnings
2014-05-20 14:31:26 -07:00
John Safranek
b46b8516ae
Merge branch 'master' of github.com:cyassl/cyassl
2014-05-20 14:11:58 -07:00
John Safranek
12841e6093
fix integration bugs with new suites
2014-05-20 14:07:08 -07:00
toddouska
3d803653c6
add visual studio 64 project files to autoconf, fix distclcean
2014-05-20 13:45:11 -07:00
John Safranek
74712b4e71
1. Added the following cipher suites:
...
* TLS_PSK_WITH_AES_128_GCM_SHA256
* TLS_PSK_WITH_AES_256_GCM_SHA384
* TLS_PSK_WITH_AES_256_CBC_SHA384
* TLS_PSK_WITH_NULL_SHA384
2. Fixed CyaSSL_CIPHER_get_name() for AES-CCM cipher suites.
2014-05-19 21:44:04 -07:00
John Safranek
5ab2ccfa96
Added FIPS wrappers for the DRBG and improved CTaoCrypt test.
2014-05-14 15:25:55 -07:00
toddouska
ce39ef62ef
update const error strings for newly added ones
2014-05-14 15:05:20 -07:00
toddouska
519820133d
Merge branch 'const_errorstrings' of https://github.com/rofl0r/cyassl into errstr
2014-05-14 14:51:40 -07:00
toddouska
aa5234ae0e
fix des return values for ecb and plain cbc, allow errors
2014-05-13 16:04:52 -07:00
toddouska
0a8804b3f8
add freescale mmcau hardware crypto alignment requirement, error out if not met
2014-05-13 15:51:35 -07:00
toddouska
7f938f3bdf
Merge pull request #80 from kojo1/MDK5
...
MDK5 sw pack 3.0.0
2014-05-12 14:01:42 -07:00
toddouska
8c9c257921
Merge pull request #79 from kojo1/IAR
...
sample projects for IAR EWARM
Why is SINGLE_THREADED assumed for IAR with ARM?
2014-05-12 13:28:02 -07:00
toddouska
7fcaa03436
Merge pull request #75 from kojo1/ColdFire
...
ColdFire SEC, PIC32 updates
2014-05-09 14:41:40 -07:00
John Safranek
72e9ea8e4b
added Hash DRBG as configure option
2014-05-07 11:54:12 -07:00
Takashi Kojo
eeb2e28f54
Sync with 3.0.0
2014-05-05 09:45:25 +09:00
John Safranek
fd707ebafb
Hash_DRBG refactoring
...
1. Renamed everything that had DBRG with the correct DRBG
2. Changed word64 reseed_ctr to word32 reseedCtr
3. Changed reseed interval to 0xFFFFFFFF
2014-05-02 15:35:10 -07:00
Takashi Kojo
35d5b66d2c
Merge remote-tracking branch 'CyaSSL-master/master' into IAR
2014-05-02 09:32:55 +09:00
Takashi Kojo
b680e62832
set up Simulator
2014-05-02 09:31:22 +09:00
toddouska
5ff0336491
add custom kqueue event for crl monitor shutdown
2014-05-01 09:28:33 -07:00
Takashi Kojo
fb00110b77
CyaSSL library project and README
2014-05-01 17:03:01 +09:00
Takashi Kojo
3de36b106e
Merge remote-tracking branch 'CyaSSL-master/master' into IAR
2014-05-01 14:33:49 +09:00
Takashi Kojo
169c0eee20
IAR EWARM project: test, benchmark
2014-05-01 14:29:09 +09:00
John Safranek
838d9ea780
bump dev version, update README for v3.0.0
2014-04-29 10:45:01 -07:00
John Safranek
70dee7e190
Added the directoryName comparison to the name constraint checks.
2014-04-28 13:29:44 -07:00
John Safranek
618d282d94
Decodes the Name Constraints certificate extension on the CA cert
...
and checks the names on the peer cert, rejecting it if invalid
based on the name.
2014-04-28 11:03:24 -07:00
Takashi Kojo
6e3bbd135e
des3.h
2014-04-25 14:21:28 +09:00