kaleb-himes
1b7cd5cb06
consolidate handling of dead assignment warnings
2016-04-11 13:39:44 -06:00
kaleb-himes
c6e9021732
scan-build warnings related to enable-psk, disable-asn,rsa,ecc
2016-04-11 11:13:26 -06:00
David Garske
993972162e
MinGW fixes, server port assigning cleanup and ping test cleanup. Fixes issue with visibility detection with MinGW. The visibility.m4 script was not actually trying to call the hidden function, which caused MinGW to detect improperly that visibility was supported. Fix for bogusFile on Windows build. Fixes to build warnings for unused variable 'res' and signed/unsigned comparison for sizeof min(). Cleanup of the server side port assignment to allow use with Windows/MinGW/Cygwin. If Windows uses new GetRandomPort() function in test.h to get port in in the 49152 - 65535 range. If *nix then uses the tcp_listen returned port. Otherwise uses the default wolfSSLPort. Refactor of the ping test code to use common file and properly handle ping count differences (Windows "-c" vs. *Nix style "-n"). Workaround for MinGW and cyassl/options.h getting file permissions error. Added non-fatal compile warning if using MinGW that "strtok_s" might be missing along with a link to public domain source that can be used.
2016-04-08 11:48:14 -06:00
Jacob Barthelmeh
85a9c55048
fix c89 build on windows
2016-04-06 11:16:40 -06:00
toddouska
63b1282e67
Merge pull request #335 from dgarske/asynccrypt
...
Asynchronous crypto and wolf event support
2016-03-30 20:12:41 -07:00
David Garske
4472152b18
Added new "wolfSSL_poll" which filters event queue by ssl object pointer. Changed wolfSSL_CTX_poll to support using WOLF_POLL_FLAG_PEEK flag to peek at events and return count. Removed "wolfssl_CTX_poll_peek". Switched the examples (test.h AsyncCryptPoll) to use just the WOLFSSL object and call new wolfSSL_poll. Added warning when using the "--enable-asynccrypt" option to make sure users know they need real async.c/.h files.
2016-03-30 15:15:38 -07:00
Jacob Barthelmeh
696169634e
check return value of wolfSSL_set_fd
2016-03-25 13:59:04 -06:00
Jacob Barthelmeh
e99a5b0483
prepare for release v3.9.0
2016-03-17 16:02:13 -06:00
David Garske
e1787fe160
Added "--enable-asynccrypt" option for enabling asynchronous crypto. This includes a refactor of SendServerKeyExchange and DoClientKeyExchange to support WC_PENDING_E on key generation, signing and verification. Currently uses async simulator (WOLFSSL_ASYNC_CRYPT_TEST) if cavium not enabled. All of the examples have been updated to support WC_PENDING_E on accept and connect. A generic WOLF_EVENT infrastructure has been added to support other types of future events and is enabled using "HAVE_WOLF_EVENT". Refactor the ASN OID type (ex: hashType/sigType) to use a more unique name. The real "async.c" and "async.h" files are in a private repo.
2016-03-17 13:31:03 -07:00
Jacob Barthelmeh
060e278559
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into Certs
2016-03-11 23:48:39 -07:00
David Garske
0ed26ad262
Updated build for "leantls" to support building only the client, by splitting BUILD_EXAMPLES into 3 parts (BUILD_EXAPLE_SERVERS, BUILD_EXAMPLE_CLIENTS and BUILD_TESTS). This allows the make check to perform the external tests to validate the client only "leantls" configuration option.
2016-03-08 08:35:28 -08:00
David Garske
2891939098
Remove NO_CERT and NO_CODING. Enable building of the client with leantls.
2016-03-08 08:35:28 -08:00
Jacob Barthelmeh
112cf1f0c9
fix example client help print out
2016-03-02 16:51:57 -07:00
Jacob Barthelmeh
aab44eb26b
adjest example server PSK plus flag
2016-03-02 15:43:17 -07:00
Jacob Barthelmeh
d969e2ba11
automated test for trusted peer certs
2016-03-02 11:42:00 -07:00
Jacob Barthelmeh
05d2cec7c1
addition to api tests and refactor location of trusted peer cert check
2016-03-02 11:35:03 -07:00
Jacob Barthelmeh
7df22ee210
Trusted peer certificate use
2016-03-02 11:22:34 -07:00
David Garske
953a3bd01d
Fixes build error with NO_FILESYSTEM and !NO_CERTS where the wolfssl/test.h load_buffer() function is passing non-existent enum value. Was renamed from CYASSL_ to WOLFSSL_.
2016-02-19 13:52:06 -08:00
kaleb-himes
46b34c19d0
wolfssl.com and google.com now differ in pre-reqs for external test
2016-02-15 13:30:11 -07:00
toddouska
d7d2a6f565
Merge pull request #307 from JacobBarthelmeh/PSK
...
New fail with no peer cert behavior and allow RSA signed ECC key certs
2016-02-12 15:27:18 -08:00
kaleb-himes
ffe7b38409
correct logic to allow for static RSA if ECC and no Curves
...
use same coding standards as the rest of the libraries
2016-02-10 13:39:59 -07:00
Jacob Barthelmeh
ff7a9d9f78
option for fail on no peer cert except PSK suites
2016-02-10 13:26:03 -07:00
kaleb-himes
bf4d6454b1
if connection to google.com and using ECC need supported curves
2016-02-09 17:06:06 -07:00
Kaleb Joseph Himes
62a2efdacc
Merge pull request #298 from kaleb-himes/master
...
Avoid unnecessary assignments in client example
2016-02-09 09:54:55 -08:00
Kaleb Joseph Himes
2e88785358
Merge pull request #282 from dgarske/WinUserSettings
...
Refactor of Visual Studio projects to centralize preprocessors into IDE/WIN/user_settings.h
2016-02-09 09:27:32 -08:00
David Garske
2af9fb91b3
Use += approach to detect "done" in example client for external tests. Cleaner and code is smaller to accomplish same thing.
2016-02-08 19:54:22 -08:00
kaleb-himes
c920e6dd30
Avoid unnecessary assignments in client example
2016-02-07 08:27:01 -07:00
David Garske
2db6246abc
Fixed typo with testsuite preprocessor. Added missing chacha.c, chacha20_poly1305.c, pkcs7.c and poly1305.c. Also added the IDE/WIN/user_settings.h to the project so its easy to find.
2016-02-04 11:19:51 -08:00
David Garske
ebd14a657d
Added signature.c to Visual Studio project files. Added new "IDE/WIN/user_settings.h" which contains all the defines for the various Windows Visual Studio projects. Moved the settings into this new file and added the WOLFSSL_USER_SETTINGS and CYASSL_USER_SETTINGS macros and include path to IDE/WIN to all project files. This allows the settings (defines) to be adjusted in a single place for Win VS.
2016-01-29 14:29:31 -08:00
Jacob Barthelmeh
611e37b3e8
naming for AEAD macros and TLSX with chacha-poly
2016-01-29 09:38:13 -07:00
Jacob Barthelmeh
7d71d756f3
update ChaCha20-Poly1305 to most recent RFCs
2016-01-27 14:03:05 -07:00
toddouska
1d473ab7b5
resolve issue #255 , no sha284 with wolfssl cert chain and external test
2016-01-14 20:25:50 -08:00
kaleb-himes
84ae9a9ae5
Also account for 32-bit users
2015-12-31 12:05:45 -07:00
kaleb-himes
a973eca4b8
accounts for assumptions with external ocsp stapling test
2015-12-29 17:05:51 -07:00
Moisés Guimarães
ec9d23a9c3
Merge branch 'csr'
2015-12-28 19:38:04 -03:00
toddouska
2d33380abc
Merge pull request #225 from JacobBarthelmeh/master
...
help message to use NTRU key in example server
2015-12-28 11:56:13 -08:00
John Safranek
92cb8eee61
revise the comments about port 0 use in the example client and server
2015-12-24 15:42:52 -08:00
John Safranek
4b836f8476
added note to client and server regarding port 0
2015-12-23 12:20:53 -08:00
John Safranek
d17549f848
update example client ShowVersions() to not show disabled old-tls versions
2015-12-23 12:12:41 -08:00
toddouska
22385f2b39
add random ports for all make check scripts, unique ready file
2015-12-22 14:35:34 -08:00
Jacob Barthelmeh
41f50b7a73
NTRU suites considered part of static RSA suites group
2015-12-22 15:19:11 -07:00
Jacob Barthelmeh
0721b79282
help message to use NTRU key in example server
2015-12-22 11:51:26 -07:00
John Safranek
917edc5f18
Merge pull request #218 from toddouska/ssl3-aes256
...
add aes256 key derivation to ssl3
2015-12-17 18:30:23 -08:00
Chris Conlon
b89354880f
switch pragma once uses, causes warnings on some compilers
2015-12-17 13:19:17 -07:00
toddouska
e503b89ca1
allow sniffer build with -v 0 examples to work
2015-12-17 12:10:22 -08:00
Takashi Kojo
4217ef5475
fixed mdk4 macro control in example server/client, echoserver/client
2015-11-27 11:31:12 +09:00
John Safranek
02411ccced
add F back into the client command line options scanning
2015-11-25 10:36:51 -08:00
toddouska
32b2d7f9e4
have calling thread wait for crl monitor thread to setup for simpler cleanup
2015-11-23 14:15:12 -08:00
toddouska
806a2748bf
Merge pull request #189 from lchristina26/master
...
Updates for Wind River WORKBENCH/ VxWorks Compatibility
2015-11-12 13:33:27 -08:00
lchristina26
db6920d372
updates for vxworks compatibility
2015-11-12 13:33:47 -07:00
kaleb-himes
e9348635a0
SAFESEH:NO in DLL Debug|Win32
2015-11-09 15:11:58 -07:00
Moisés Guimarães
dccbc1cdd4
fixes ocsp nonce extension decoding;
...
enables use of ocsp nonce extension in the client example.
2015-11-05 11:45:42 -03:00
toddouska
fbd4f8a6ed
fix merge conflict
2015-11-02 13:26:46 -08:00
Moisés Guimarães
21d70636dc
Merge branch csr into 'master'
2015-11-02 15:51:01 -03:00
toddouska
e76f95465d
Merge pull request #170 from dgarske/master
...
Fixes initialization of the Crypto HW protection, which could leak a …
2015-10-29 13:56:18 -07:00
lchristina26
723fc3761b
Example client/server compatible with VxWorks
2015-10-29 13:39:02 -06:00
David Garske
f977caa492
Cleanup of the test code that looks for the WolfSSL root directory. Now it tries to open the certs/ntru-cert.pem file in each directory up (limited to 5) until it opens it.
2015-10-28 23:54:08 -07:00
toddouska
542b59d90a
Merge pull request #150 from JacobBarthelmeh/master
...
Intel RSA IPP plug in
2015-10-27 16:57:32 -07:00
Nickolas Lapp
b7848481a3
Fixed gcc variable-mayble-uninitialized warning
2015-10-27 16:42:19 -06:00
Jacob Barthelmeh
c132f9887e
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-10-19 13:56:39 -06:00
Jacob Barthelmeh
ee5a11b8d9
Add Intel IPP crypto for RSA
...
add user-crypto makefile
update README for IPP crypto
place user crypto in wolfcrypt and use autotools
adjust distributed files
move openssl compatibility consumption
auto use IPP RSA -- IPP directory containing shared libraries local
return value of wolfSSL_BN and formating of debug
openssh testing
make sure IPP not built when fips is
ipp init to select correct optimizations -- static libraries on linux -- fast-rsa disabled by default
try to only set library once
only use static IPP if fast rsa is enabled
make print out for user crypto more pretty
2015-10-19 13:51:49 -06:00
toddouska
c93c6c9bf4
add wolfSSL_new() pointer return check on all calls in example client
2015-10-16 14:12:38 -07:00
toddouska
4141ea8f83
example server to use cstd free for all build options
2015-10-16 14:05:37 -07:00
Ludovic FLAMENT
9ef43910ed
Merge branch 'master' of https://github.com/wolfssl/wolfssl
2015-10-16 07:46:51 +02:00
Ludovic FLAMENT
d4f3419758
ALPN : add function to get in a server the list of supported protocols sent by the client.
2015-10-15 14:59:35 +02:00
Ludovic FLAMENT
ee8537fb6d
Merge branch 'master' of https://github.com/wolfssl/wolfssl
2015-10-14 20:53:30 +02:00
Ludovic FLAMENT
10f5154389
ALPN : add option to continue in case of client/server protocol mismatch (like OpenSSL)
2015-10-13 09:38:40 +02:00
Ludovic FLAMENT
bf3b0a228d
add support for Application-Layer Protocol Name (RFC 7301) in the TLS extensions
2015-10-09 15:18:41 +02:00
toddouska
b1c5f3b299
add show every cipher suite to examples/client
2015-10-02 16:26:20 -07:00
toddouska
a8b5c57dd2
make sure external tests have a valid cipher
2015-09-28 09:47:59 -07:00
toddouska
42d94a0f7f
wolfssl.com now requires ECDHE or static RSA
2015-09-24 12:19:38 -07:00
toddouska
465622d4e0
wolfssl.com now uses old chacha-poly, detect for external test
2015-09-24 12:13:01 -07:00
John Safranek
329e6a6207
update the example server and echoserver to correctly generate the DTLS cookie
2015-09-15 17:23:52 -07:00
toddouska
09b2da799f
Merge pull request #125 from kojo1/MDK4
...
MDK4 name change
2015-08-14 14:59:25 -07:00
toddouska
a4cbc3b943
fix google external test w/o ecdhe
2015-08-14 12:58:00 -07:00
toddouska
7fa4302a80
disable static PSK cipher suites by default
2015-08-14 12:49:30 -07:00
toddouska
46e7e9acf9
disable SSLv3 by default
2015-08-12 16:39:13 -07:00
Takashi Kojo
30f6bc1e27
MDK4, wolfSSL name change
2015-08-12 16:45:40 +09:00
toddouska
37ba6aeee7
fix psk no identify hint example logic
2015-08-03 09:32:51 -07:00
kaleb-himes
303fb2bb62
Option for no PSK Id Hint and test cases
...
update comment file reference
2015-07-31 22:00:28 -06:00
Jacob Barthelmeh
df8b48cd0f
NTRU suites from earlier code
2015-07-11 12:52:22 -06:00
Jacob Barthelmeh
14723b7e65
QSH (quantum-safe handshake) extension
2015-07-07 09:55:58 -06:00
toddouska
6cad1949b4
if NO_SHA don't run external script tests
2015-06-18 11:12:35 -07:00
toddouska
53bf8ed7cb
fix scan-build warnings
2015-06-10 15:24:24 -07:00
John Safranek
64602d1969
added check for allowed minimum DH key size
2015-05-21 10:11:21 -07:00
toddouska
8ff17b66f3
add session tickets to echoserver example too
2015-05-18 09:13:34 -07:00
toddouska
74cc2274fa
add tiket key cleanup to help valgrind
2015-05-15 15:30:29 -07:00
toddouska
2212381925
add session ticket key returns for reject and use but create
2015-05-15 14:58:16 -07:00
toddouska
f6d12bfc37
initial server side session ticket support
2015-05-15 12:51:44 -07:00
toddouska
dde4b29462
add handshake done callback with ability to end connection
2015-05-09 11:04:47 -07:00
toddouska
4fe04c6bed
detect build cases where external script test case doesn't make sense
2015-05-07 12:50:27 -07:00
toddouska
08b6e66ea8
add external site script test to make check
2015-05-07 10:02:43 -07:00
toddouska
ada5ff876a
allow example client to do resume with scr
2015-04-29 17:06:57 -07:00
toddouska
c04de5ba82
add resume to example client benchmarking
2015-04-28 18:04:11 -07:00
toddouska
d927aa4334
add resume test to example server and script test
2015-04-28 12:21:54 -07:00
toddouska
1f8701540d
change SESSION_STATS to PRINT_SESSION_STATS, will add WOLFSSL_SESSION_STATS
2015-04-14 12:35:24 -07:00
toddouska
86f2b9a98f
turn off DTLSv1 functions for disable old tls
2015-04-08 13:29:25 -07:00
Chris Conlon
4e6f619302
Merge pull request #46 from jay/add-dll-config-to-vcxproj
...
build: Add DLL configurations to wolfssl64.sln and all vcxproj files
2015-04-06 09:05:06 -06:00
toddouska
869aeee6cb
allow sniffer play nice in ecc build
2015-04-01 12:14:48 -07:00
toddouska
cc804b110f
allow example client to talk with echoserver in ecc mode w/o switch
2015-04-01 12:03:27 -07:00
Jay Satiro
b8b13ad9e9
build: Revert using MSBuild property files to auto-detect platform toolset
...
Prior to this change I had added a .props file for each .vcxproj to
use MSBuild's $(DefaultPlatformToolset) as the the default for
$(PlatformToolset). Typically that configuration allows for the
appropriate toolset to be used no matter which version of VS2010+
the wolfssl64.sln and project files are opened in. Problem is when an
MSBuild was used from the command line to build the solution it got the
$(DefaultPlatformToolset) from a property file based on the solution
header (currently "Format Version 12.00" which maps to Visual Studio
2012) instead. Another side effect was it set the VisualStudioVersion
to 11.0 (n - 1; n in this case 12.0) which was incorrect.
To remedy the above this change reverts back to the old PlatformToolset
method where the v110 toolset (Visual Studio 2012) is specified in every
configuration in every vcxproj. The user will have to specify explicitly
a different toolset to override it (either via command line or the GUI)
if they are not using VS2012.
VS2010 example:
msbuild -p:Configuration="Debug" wolfssl64.sln -p:PlatformToolset=v100
2015-04-01 02:05:15 -04:00
toddouska
c9a0c9a797
fix some psk warnings
2015-03-27 19:20:31 -07:00
toddouska
495fbe087e
allow dh to be used w/o certs and asn
2015-03-27 14:28:05 -07:00
Jay Satiro
6e14362940
build: Add DLL configurations to wolfssl64.sln and all vcxproj files
...
- Remove extern from declspec in WOLFSSL_API macro.
- Add a property file to *.vcxproj so that $(DefaultPlatformToolset) is
available.
- Remove the specified platform toolset (VS 2012) in *.vcxproj.
This change allows the projects to use $(DefaultPlatformToolset) so that
they will be built using the default platform toolset for whatever
version of Visual Studio 2010+ that loads them.
- Add DLL Release and DLL Debug configurations to *.vcxproj except for
sslSniffer.vcxproj.
The sniffer uses internal library components that aren't exposed in the
wolfSSL DLL so it can only be built by linking to CyaSSL's static lib.
- Change intermediate output directory of obj files to
<current-dir-setting>\obj\.
The purpose of this change is to separate the output files from the
intermediate files because sometimes they can end up in the same dir.
2015-03-23 02:12:01 -04:00
toddouska
64d83c39a0
Merge https://github.com/kaleb-himes/wolfssl into kaleb-master
2015-03-18 14:25:31 -07:00
kaleb-himes
fd772bb434
MSVS warning fixes for all solutions
2015-03-18 10:42:10 -06:00
toddouska
b7b655b8bf
fix example server memory tracker
2015-03-07 12:00:27 -08:00
toddouska
473a120ba2
remove more stale cyassl headers
2015-02-25 13:34:29 -08:00
kaleb-himes
40d51f13ce
ntru neo.lib -> NtruEncrypt_DLL.lib
2015-02-24 13:44:15 -07:00
kaleb-himes
de2115b140
shutdown shadows global in sys/socket.h line 576 renamed wc_shutdown
2015-02-18 08:00:25 -07:00
toddouska
5f3b1d90b6
fix shutdown returns
2015-02-16 14:23:33 -08:00
lchristina26
db5a95b370
add option for bidirectional shutdown
2015-01-30 08:41:34 -07:00
kaleb-himes
b0e88e32ff
Error printouts name changed
2015-01-20 12:36:20 -07:00
kaleb-himes
53d65de105
visual studio project paths updated
2015-01-13 15:30:57 -07:00
Jacob Barthelmeh
492bae7afe
Merge branch 'master' of https://github.com/kaleb-himes/cyassl
2015-01-08 10:44:00 -07:00
Jacob Barthelmeh
d366599285
adding comment to header and _fips to c files
2015-01-08 10:42:01 -07:00
kaleb-himes
48fd041c40
no longer user compatibility layer
2015-01-08 10:02:07 -07:00
kaleb-himes
a389620a29
Copyright (C) updates
2015-01-08 09:39:04 -07:00
kaleb-himes
369a5f04a9
library wide licence update
2015-01-06 12:14:15 -07:00
kaleb-himes
a4ce557263
Licencing update
2015-01-05 14:54:43 -07:00
lchristina26
3cbed90cb9
name change for client.c
2015-01-05 14:48:43 -07:00
kaleb-himes
edf53a1ed0
new changes
2014-12-29 10:27:03 -07:00
Kaleb Himes
2ab4f6e2f0
echoclient, server, libwolfssl updates
2014-12-22 09:01:53 -07:00
Kaleb Himes
a37fb63c0c
examples
2014-12-19 16:53:49 -07:00
Jacob Barthelmeh
5107c6c12b
debugging linking error
2014-12-19 15:30:07 -07:00
Jacob Barthelmeh
d958a2f3d6
close to build test with --disable-examples option
2014-12-18 15:40:09 -07:00
John Safranek
1742e0ddb6
Merge in the ADH-AES128-SHA changes and add a check for it during the
...
packet order sanity checking.
2014-12-01 11:44:32 -08:00
toddouska
1f8d84553c
add server_ready file to externally monitor example server for ready to accept, -r option
2014-11-26 12:13:47 -08:00
toddouska
322f79f521
allow user to set minimum downgrade version with v23 methods()
2014-11-03 15:12:48 -08:00
John Safranek
35bcc98948
Added a callback when receiving a NewSessionTicket handshake message.
2014-10-20 09:25:14 -07:00
Moisés Guimarães
a937040087
Adds Session Ticket TLS Extension handling.
...
New Session Ticket Handshake Message handling is still needed for Session Tickets to work.
2014-09-30 09:30:23 -03:00
toddouska
f81f22799a
separate allow scr and force client scr in example client
2014-09-29 15:32:41 -07:00
toddouska
95585e93df
scr session resumption example
2014-09-26 10:47:57 -07:00
toddouska
0c20584ed3
add client side initiated secure r, same specs
2014-09-24 18:48:23 -07:00
toddouska
6175a2a20c
cleanup fp cache on examples with thread local storage
2014-09-09 10:14:32 -07:00
toddouska
2c595139db
fix tirtos merge
2014-09-08 19:40:03 -07:00
toddouska
a73a160aaf
Merge branch 'master' into ti
2014-07-21 16:26:39 -07:00
toddouska
3bfd0bbf3b
fixup some chacah-poly suite things including a valgrind error
2014-07-21 16:20:17 -07:00
JacobBarthelmeh
726cc3e3a4
sanity check and recent cyassl release
2014-07-18 14:42:45 -06:00
JacobBarthelmeh
b77a1fdbbb
refactoring
2014-07-17 15:00:40 -06:00
JacobBarthelmeh
c322cb05ad
uses most recent version of cyassl
2014-07-10 11:18:49 -06:00
toddouska
61e989ed99
Merge branch 'master' into ti
2014-07-03 11:34:15 -07:00
toddouska
2d63c559cc
dh now disabled by default but can be enabled w/o opensslextra
2014-07-03 11:32:24 -07:00
toddouska
6817e3cd2e
Merge branch 'master' into ti
2014-07-02 16:31:55 -07:00
toddouska
be402277e0
add override cert date example for bad clock testing
2014-07-02 12:07:25 -07:00
toddouska
a920795665
Merge branch 'master' into ti
2014-05-30 16:57:15 -07:00
John Safranek
b60a61fa94
DHE-PSK cipher suites
...
1. fixed the AES-CCM-16 suites
2. added DHE-PSK as a key-exchange algorithm type
3. Added infrastructure for new suites:
* TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
* TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
* TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
* TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
* TLS_DHE_PSK_WITH_NULL_SHA256
* TLS_DHE_PSK_WITH_NULL_SHA384
* TLS_DHE_PSK_WITH_AES_128_CCM
* TLS_DHE_PSK_WITH_AES_256_CCM
4. added test cases for new suites
5. set DHE parameters on test server when using PSK and a custom cipher
suite list
6. updated half premaster key size
2014-05-30 11:26:48 -07:00
toddouska
71a5aeeb81
Merge branch 'master' into ti
2014-05-28 17:37:48 -07:00
toddouska
e11dd9803a
fix icc v14 warnings
2014-05-28 17:36:21 -07:00
toddouska
fc084e9978
Merge branch 'master' into ti
2014-05-20 13:46:27 -07:00
toddouska
3d803653c6
add visual studio 64 project files to autoconf, fix distclcean
2014-05-20 13:45:11 -07:00
toddouska
744590c868
add visual studio 64bit solution for vs2012+ with custom build step for aesni
2014-05-20 13:27:03 -07:00
toddouska
28b6c5b998
Merge branch 'master' into ti
2014-05-12 14:02:22 -07:00
toddouska
34f2e51415
remove extra spaces from ti cyassl proper files
2014-05-09 11:55:59 -07:00
Vikram Adiga
f643ca5f48
Added TI-RTOS support for CyaSSL tests
2014-05-08 15:52:20 -07:00
Takashi Kojo
eeb2e28f54
Sync with 3.0.0
2014-05-05 09:45:25 +09:00
Chris Conlon
be65f5d518
update FSF address, wolfSSL copyright
2014-04-11 15:58:58 -06:00
Takashi Kojo
b712380a60
Sync MDK5 Software Pack with 2.9.4
2014-04-11 16:20:12 +09:00
toddouska
f1597c86b1
fix clang -Wconversion except -Wsign-conversion
2014-03-03 16:46:48 -08:00
toddouska
c39cdbea54
make sure enable-webserver (HAVE_WEBSERVER) can handle password callbacks as well as opensslextra unless NO_PWDBASED defined
2014-03-03 12:18:26 -08:00
Moisés Guimarães
c03263ae70
fixing HAVE_MAX_FRAGMENT ifdef
2014-02-24 11:10:54 -03:00
Moisés Guimarães
5616450a4b
fixed return codes
...
added protection for missing HAVE_TLS_EXTENSIONS
2014-01-31 16:52:15 -03:00
John Safranek
d46c68ba10
Moved OCSP into the CertManager like the CRL.
2013-12-27 12:11:47 -08:00
toddouska
0ee34c961e
make sure passwd_cb called before load private key in server example
2013-12-23 11:19:21 -08:00
toddouska
dff54942a2
xcode5 paths for examples
2013-12-19 15:23:57 -08:00
John Safranek
4ffc92a4d6
Use OCSP override URL enable in both example client and server.
2013-12-18 12:34:40 -08:00
John Safranek
003446a5cd
Using OCSP override URL should enable OCSP url overriding.
2013-12-17 18:26:29 -08:00
toddouska
f3f80bd66e
add Rsa Sign/Verify callbacks, client/server examples
2013-08-26 16:27:29 -07:00
toddouska
e98f5f95c2
add public key callbacks for ecc sign/verify, examples
2013-08-22 18:19:39 -07:00
toddouska
65f0e9f6b9
add atomic user macencrypt cb
2013-08-09 17:27:15 -07:00
toddouska
5c5cee0789
use external CYASSL_MAX_ERROR_SZ for buffer size
2013-08-06 11:48:00 -07:00
Moisés Guimarães
55401c13dd
Truncated HMAC first part (protocol). Extension processing will be coded later.
2013-07-23 15:42:43 -03:00
John Safranek
7fd3b8a993
Fixed error string for example server private key file failure.
2013-06-25 13:14:24 -07:00
John Safranek
0c34ecb451
OCSP Updates
...
1. Add option to example server and client to check the OCSP responder.
2. Add option to example server and client to override the URL to use
when checking the OCSP responder.
3. Copy the certificate serial number correctly into OCSP request.
Add leading zero only if MS bit is set.
4. Fix responder address used when Auth Info extension is present.
5. Update EmbedOcspLookup callback to better handle the HTTP
response and obtain the complete OCSP response.
2013-06-24 10:47:24 -07:00
toddouska
33a7d7481d
Merge branch 'master' of github.com:cyassl/cyassl
2013-06-03 14:57:40 -07:00
toddouska
ae84982777
add STACK_TRAP to track stack use on client, will seqfault if exceed limit to see where use is too high, doesn't work with pthread_create()
2013-06-03 14:56:37 -07:00
Moisés Guimarães
cb2082edee
changed CYASSL_SNI_ABORT_ON_MISMATCH to CYASSL_SNI_CONTINUE_ON_MISMATCH
2013-06-03 10:04:49 -03:00
Moisés Guimarães
5c665fe614
Added options to SNI (now it is possible to choose whether or not to abort on a SNI Host Name mismatch)
...
Exposed SNI Type at ssl.h
2013-05-30 15:26:41 -03:00
kojo
4b9c3d3512
Merge remote-tracking branch 'cyassl/master' into STM.LPC
...
Conflicts:
IDE/MDK-ARM/MDK-ARM/CyaSSL/config-FS.h
IDE/MDK-ARM/MDK-ARM/CyaSSL/config-RTX-TCP-FS.h
IDE/MDK-ARM/MDK-ARM/CyaSSL/cyassl_MDK_ARM.c
IDE/MDK-ARM/MDK-ARM/CyaSSL/cyassl_MDK_ARM.h
IDE/MDK-ARM/MDK-ARM/CyaSSL/main.c
IDE/MDK-ARM/MDK-ARM/CyaSSL/shell.c
IDE/MDK-ARM/MDK-ARM/CyaSSL/ssl-dummy.c
IDE/MDK-ARM/MDK-ARM/config/File_Config.c
IDE/MDK-ARM/MDK-ARM/config/RTX_Conf_CM.c
IDE/MDK-ARM/Projects/MDK-ARM-STM32F2xx.uvopt
IDE/MDK-ARM/Projects/MDK-ARM-STM32F2xx.uvproj
ctaocrypt/src/random.c
src/internal.c
2013-05-26 09:27:06 +09:00
toddouska
8df0e43384
fix merge differences from this week
2013-05-22 15:50:13 -07:00
toddouska
d2003bb8b7
merge in sni
2013-05-21 14:37:50 -07:00
toddouska
fd5937b599
MDK-ARM updates
2013-05-20 17:56:27 -07:00
takashikojo
b430a14032
make up for MDK-ARM release
2013-05-19 10:33:32 +09:00
takashikojo
55763ef318
Commit 2.6.2
2013-05-19 10:02:13 +09:00
toddouska
cfdfa7b2b3
pull in Kojo MDK-ARM projects, changes
2013-05-16 09:47:27 -07:00
toddouska
d7e74d0383
allow sniffer to sniff known testsuite, no port 0
2013-05-09 18:42:24 -07:00
toddouska
47b468d14f
add dtls recv timeout max user setting too
2013-05-08 12:49:55 -07:00
Chris Conlon
864f0468aa
Cygwin/Mingw64 fixes
2013-05-01 14:17:11 -06:00
toddouska
702c1b044d
add fewerPacket/group messages to example client/server and disalbe client cert/key load
2013-04-19 13:10:19 -07:00
toddouska
ba3e089596
add USE_ANY_ADDR for bind to any with echoserver
2013-04-11 21:51:17 -07:00
toddouska
12f00a7acc
change ipv6 tests to use getaddrinfo for better scope id % handling, inet_pton doesn't always work depending on system
2013-04-11 12:30:09 -07:00
toddouska
f535e5428e
make sure all tests/examples *.c use settings.h correctly
2013-04-10 12:17:23 -07:00
John Safranek
b0dca8ea69
updated SHOW_SIZES, opionally adds sizes as available, added flag to example client to print sizes
2013-04-08 16:01:52 -07:00
John Safranek
9b0ffa0249
brought CYASSL_CALLBACK code up to current standard
2013-04-08 15:34:54 -07:00
toddouska
f8848aaa1b
lower example client/server stack buffer sizes
2013-03-29 14:06:36 -07:00
toddouska
ee0595f543
add --enable-stacksize to print out stack use info with pthreads for example client/server
2013-03-28 11:28:38 -07:00
John Safranek
7d287a6ba9
modified test port number to allow concurrent testing
2013-03-26 22:00:39 -07:00
toddouska
ae63878700
fix unused memory tracker warning is disable-memory
2013-03-15 13:22:35 -07:00
toddouska
543108bdcc
add memory tracker to example client and server if using default memory cbs
2013-03-15 13:17:05 -07:00
toddouska
dd4be2496a
client example shouldn't use set_verify w/ no certs
2013-03-14 17:13:11 -07:00