Hideki Miyazaki
30612ad3ed
addressed review comments
2018-12-28 11:48:39 +09:00
Hideki Miyazaki
965c68abdf
Chaged to match filename and standard in file header
2018-12-28 08:39:19 +09:00
Hideki Miyazaki
913fe6ea2b
addressed review comments
2018-12-28 08:39:19 +09:00
Hideki Miyazaki
9d2294b967
Support AES and SHA hw acceleration on esp32-wroom-32
...
Removed unnecessary codes
Added README
Some clean up for maintenancebility
Removed unused methods
Removed unused methods
2018-12-28 08:39:19 +09:00
David Garske
2351047409
Fixes for various scan-build reports.
2018-12-27 11:08:30 -08:00
David Garske
5cb5b510ab
Added blocking support for PKCS 7 with async. Fix for RSA async key gen in wolfCryp test.
2018-12-27 11:07:07 -08:00
Jacob Barthelmeh
66442c4bd5
add initialization value for af_alg
2018-12-26 16:57:24 -07:00
toddouska
697c99a9ec
Merge pull request #1934 from dgarske/fix_alt_chain
...
Fixes and cleanups for processing peer certificates
2018-12-26 15:09:42 -08:00
toddouska
9c88218b62
Merge pull request #1998 from dgarske/async_fix_smallstack
...
Fix double free with async and small stack
2018-12-26 14:35:57 -08:00
toddouska
3eff20904a
Merge pull request #1991 from dgarske/rsa_nb_time
...
Adds RSA non-blocking time support
2018-12-21 15:58:54 -08:00
David Garske
61757c83eb
Fix double free with ./configure --enable-asynccrypt --enable-smallstack
.
2018-12-21 15:45:33 -08:00
Jacob Barthelmeh
6191cb1927
free internal OCSP buffers
2018-12-21 12:30:49 -07:00
David Garske
9733076fe0
Fixes and cleanups for processing peer certificates:
...
* Fix with `WOLFSSL_ALT_CERT_CHAINS` to resolve issue with using a trusted intermediate to validate a partial chain. With the alt cert chain enabled a CA may fail with only `ASN_NO_SIGNER_E` and the connection is allowed if the peer's certificate validates to a trusted CA. Eliminates overly complex 1 deep error alternate chain detection logic. Resolves ZD 4525.
* Refactor and cleanup of ProcessPeerPerts to combine duplicate code and improve code commenting.
* Fix for CA path len check in `ParseCertRelative` to always check for self-signed case (was previously only in NO_SKID case).
* Improvement to include self-signed flag in the DecodedCert struct.
2018-12-21 08:20:04 -08:00
Jacob Barthelmeh
164a762088
fix afalg/cryptodev + opensslextra build
2018-12-20 10:52:17 -07:00
Jacob Barthelmeh
48c267dda8
fix warning with secure-renegotiation build and error with ntru build
2018-12-19 15:47:43 -07:00
Jacob Barthelmeh
165a80d02d
fix for build with cryptonly + rsapub
2018-12-19 15:30:22 -07:00
Jacob Barthelmeh
92d59c7df4
fix for cryptonly + rsavfy build
2018-12-19 14:36:32 -07:00
David Garske
413506f2b5
Adds new wc_RsaSetNonblockTime
API and WC_RSA_NONBLOCK_TIME
build option. This new function configures the maximum amount of blocking time in microseconds. It uses a pre-computed table along with the CPU speed in megahertz to determine if the next operation can be completed within the maximum blocking time provided.
2018-12-19 13:15:41 -08:00
Jacob Barthelmeh
fc926d3c61
fixes from infer testing
2018-12-19 11:56:29 -07:00
toddouska
986b5d3951
Merge pull request #1988 from JacobBarthelmeh/ARMv8
...
add -mstrict-align flag with armasm
2018-12-18 15:51:32 -08:00
toddouska
58a2f518e8
Merge pull request #1981 from dgarske/qat_features
...
Added RSA Key Gen and SHA-3 support for Intel QuickAssist
2018-12-18 15:39:38 -08:00
toddouska
f1c62f191d
Merge pull request #1941 from ejohnstown/rekey
...
Server Side Secure Renegotiation
2018-12-18 15:38:16 -08:00
Jacob Barthelmeh
c41d02e72f
fix for Aarch32 aesgcm sanity checks
2018-12-18 10:35:53 -07:00
David Garske
cbbe63ec62
Added QAT SHA3 support. Fix for SHA512/SHA384 with QAT and Intel ASM enabled.
2018-12-17 12:54:33 -08:00
David Garske
c23489e6ed
Added support for QAT RSA Key Generation.
2018-12-17 12:54:33 -08:00
toddouska
122114b840
Merge pull request #1969 from dgarske/atecc508a_fixes
...
Fixes for ATECC508A/ATECC608A and latest CryptoAuthLib
2018-12-12 14:53:12 -08:00
toddouska
2ef8be2718
Merge pull request #1968 from dgarske/fixes_stm32cube_aes
...
Fixes for STM32 AES GCM crypto hardware acceleration
2018-12-12 14:52:35 -08:00
toddouska
bdf447cec9
Merge pull request #1966 from cconlon/wctestbench
...
add define to use test/benchmark.h without path prefix
2018-12-12 14:50:32 -08:00
toddouska
3f7ced3ed5
Merge pull request #1960 from SparkiDev/sp_rsavfy
...
Allow a very small build based on SHA-256 and RSA verify
2018-12-12 14:49:42 -08:00
Eric Blankenhorn
cbc8f4ce38
Fix failing nightly tests
2018-12-12 09:48:34 -06:00
Eric Blankenhorn
59bfead3c8
Fixes from review
2018-12-11 11:30:13 -06:00
Eric Blankenhorn
1c0fa6fb58
Code coverage tests and fixes - default config
2018-12-11 08:56:21 -06:00
David Garske
a936c609f3
Fixes for ATECC508A/608A CryptoAuthLib demo.
2018-12-10 11:40:37 -08:00
David Garske
7e0e512a5c
Minor build fixes for CryptoAuthLib with ATECC508A or ATECC608A.
2018-12-10 11:40:37 -08:00
David Garske
6552455968
Minor improvements to the STM32 CubeMX AES-GCM logic.
2018-12-10 11:40:06 -08:00
John Safranek
70d345eda0
VxWorks Update
...
1. Remove pthreads enable from VxWorks build.
2. Add mutex wrappers for native VxWorks mutex semaphores.
2018-12-10 11:28:32 -08:00
Sean Parkinson
2208514c98
Merge pull request #1962 from dgarske/fix_fe25519_noavx2
...
Fix for Intel Speedups with no AVX2 (part 2)
2018-12-10 17:17:42 +10:00
Sean Parkinson
fb41510f12
Fixup for compiling verify only inline for PPC using GCC
2018-12-10 11:52:10 +10:00
Sean Parkinson
c122f6082f
Allow a very small build based on SHA-256 and RSA verify
2018-12-10 08:48:01 +10:00
David Garske
e4f60dc894
Merge pull request #1967 from kojo1/ShadowGlobal
...
Shadowed global: min in misc.c
2018-12-08 09:20:56 -08:00
David Garske
0a725f4d56
Fixes for AES with STM32 crypto hardware:
...
* Fixes to ensure the "const" input buffer is not modified for AES GCM calls with STM32 hardware crypto.
* Improvements to allow AES GCM hardware acceleration for inputs that are not a multiple of AES block size.
* Switched the wolfCrypt test for STM32_CRYPTO to use the standard AES GCM tests with 12-byte IV and less than 16-byte auth data.
* Fixes for building with the standard peripheral library.
* Fixes for building with `NO_AES_DECRYPT`.
`./configure --enable-debug --disable-shared --enable-cryptonly CFLAGS="-DNO_AES_DECRYPT"`
2018-12-07 17:23:38 -08:00
Takashi Kojo
8f3b05dd33
Shadowed global: min in misc.c
2018-12-08 09:40:31 +09:00
Chris Conlon
d662291b3d
add define to use test/benchmark.h without path prefix
2018-12-07 10:27:51 -07:00
Sean Parkinson
fe8080ce4a
GCC ARM compiler requires explicit signed declaration
2018-12-07 15:01:18 +10:00
David Garske
14c43959f0
Fixes for Curve25519 FE math build error with Intel Speedups enabled and no AVX2. These changes should have been part of PR #1958 and were missed.
2018-12-06 12:40:06 -08:00
David Garske
d6ebd2d832
Merge pull request #1950 from SparkiDev/rsa_unpad
...
Make RsaUnPad constant time when Block Type 2 message
2018-12-06 06:08:15 -08:00
Sean Parkinson
f468e7f0b6
Merge pull request #1958 from dgarske/fix_fe25519_noavx2
...
Fix for Intel Speedups with no AVX2
2018-12-06 10:44:12 +10:00
Sean Parkinson
8aa54e5453
Merge pull request #1956 from cconlon/selftestfix
...
CAVP selftest fix for wc_RsaPSS_CheckPadding_ex() in test.c
2018-12-06 09:12:59 +10:00
Sean Parkinson
ab03f9291b
Make RsaUnPad constant time when Block Type 2 message
2018-12-06 08:36:49 +10:00
John Safranek
d168d60ade
Server Side Secure Renegotiation
...
1. Add enables to the example server for turning on secure renegotiation.
2. Add encryption assists to the handhshake message handler functions.
3. Add a hello request message function. Includes handshake timing pre/postambles.
2018-12-05 13:08:24 -08:00