kaleb-himes
e04a7b5782
wolfEntropy Adaptive Proportion Fix 2025
2025-06-24 10:22:49 -06:00
Sean Parkinson
32c5acca22
Merge pull request #7566 from douzzer/20240521-fix-overshifts
...
20240521-fix-overshifts
2024-05-22 07:42:49 +10:00
Daniel Pouzzner
c5ce984966
wolfcrypt/src/wc_xmss_impl.c:wc_xmssmt_sign_next_idx(): use (XmssIdx)1, not (word32)1, for a shift-by-height operand;
...
src/ssl.c:set_curves_list(): don't attempt to enable curves that are out-of-range for word32 disabled.
2024-05-21 13:57:40 -05:00
David Garske
caaa9feb64
Merge pull request #7551 from gojimmypi/PR-DSA-SHA1
...
Add settings.h check: DSA needs SHA1
2024-05-21 08:47:10 -07:00
David Garske
603b5d1795
Merge pull request #7563 from josepho0918/mqx_v5
...
Always use old I/O for MQXv5
2024-05-21 08:19:15 -07:00
Sean Parkinson
87b71c429a
Merge pull request #7562 from gojimmypi/PR-ssl_load-correction
...
Correct warning message file name in ssl_load.c
2024-05-21 22:14:24 +10:00
Joseph Chen
ed321cd640
Always use old I/O for MQXv5
2024-05-21 10:00:40 +08:00
gojimmypi
543a746ddc
Add settings check to disable DSA when SHA-1 is disabled
2024-05-20 17:58:25 -07:00
gojimmypi
84032fa24c
Correct error message file name in ssl_load.c
2024-05-20 17:20:39 -07:00
Sean Parkinson
43b2c80862
Merge pull request #7552 from dgarske/ecies_own_salt
...
Add option for using a custom salt for ourselves
2024-05-21 09:19:12 +10:00
Sean Parkinson
095906f37a
Merge pull request #7561 from kaleb-himes/SRTP-KDF-MAINTENANCE
...
Address periodic CAST failures observed in unit.test by pre-empting CASTs
2024-05-21 09:16:23 +10:00
David Garske
7d4e601902
Merge pull request #6623 from bigbrett/FIPS-TLS-benchmark-CAST-fix
...
Fix benchmark failure on FIPS builds
2024-05-20 14:07:59 -07:00
kaleb-himes
a22956d881
Address periodic CAST failures observed in unit.test by pre-empting the CASTs
2024-05-20 16:35:50 -04:00
Brett Nicholas
c6db51b8a0
fixed formatting
2024-05-20 12:47:30 -06:00
David Garske
fc172e9abd
Merge pull request #7559 from gojimmypi/PR-PlatformIO-FreeRTOS
...
Update PlatformIO README and Examples
2024-05-20 09:36:23 -07:00
David Garske
0987bf4c1a
Merge pull request #7544 from josepho0918/iar
...
Expand supported attributes for IAR
2024-05-20 09:34:55 -07:00
David Garske
5a0594d257
Match wc_ecc_ctx_set_kdf_salt argument names between header and implementation.
2024-05-20 08:38:23 -07:00
Sean Parkinson
b8aec63e14
Merge pull request #7560 from douzzer/20240518-XtsAesStreamData
...
20240518-XtsAesStreamData
2024-05-20 08:33:41 +10:00
Daniel Pouzzner
d0e73783f1
wolfcrypt/src/aes.c and wolfssl/wolfcrypt/aes.h: add FIPS_AES_XTS_MAX_BYTES_PER_TWEAK and struct XtsAesStreamData, with improved error checking on streaming AES-XTS APIs;
...
wolfcrypt/test/test.c and linuxkm/lkcapi_glue.c: update AES-XTS streaming calls to use struct XtsAesStreamData;
linuxkm/lkcapi_glue.c: add handling for CONFIG_CRYPTO_MANAGER*.
2024-05-18 22:00:00 -05:00
Daniel Pouzzner
5c6218696b
wolfcrypt/src/misc.c: fix -Wconversions in CopyString();
...
src/ssl.c: fix missing semicolon in wolfSSL_CTX_check_private_key().
2024-05-18 02:31:58 -05:00
gojimmypi
22af731dd9
Update PlatformIO README and Examples
2024-05-17 16:47:07 -07:00
David Garske
2d5e8402e8
Merge pull request #7553 from JacobBarthelmeh/coexist
...
error out if conflicting OPENSSL compat macros are defined
2024-05-17 12:56:59 -07:00
David Garske
15af87af8f
Merge pull request #7555 from lealem47/forceSHA3
...
Force SHA3 on with FIPS V5
2024-05-17 12:30:20 -07:00
David Garske
16b39e8374
Merge pull request #7556 from gasbytes/patch
...
u_int16_t -> uint16_t
2024-05-17 12:29:54 -07:00
David Garske
391431c7d8
Merge pull request #7539 from bandi13/fixConversionPart2
...
Fix conversion part2
2024-05-17 12:29:46 -07:00
Lealem Amedie
54bf7fd5d9
Force SHA3 on with FIPS V5
2024-05-17 11:03:18 -06:00
gasbytes
a40dcd3cb3
u_int16_t -> uint16_t
2024-05-17 18:44:15 +02:00
JacobBarthelmeh
568ec43213
error out if conflicting OPENSSL compat macros are defined
2024-05-17 09:24:38 -06:00
David Garske
95095f5bc4
Add option for using a custom salt for ourselves. ZD 17988
2024-05-17 08:16:04 -07:00
Brett Nicholas
e823da99ae
declare loop variable at top of function body
2024-05-17 07:08:32 -07:00
Brett Nicholas
9fa838881c
fixed bug where tls_bench failed KATs for FIPS builds in a multithreaded environment
2024-05-17 07:08:32 -07:00
David Garske
7782f8eed2
Merge pull request #7528 from gojimmypi/PR-PlatformIO-FreeRTOS
...
Introduce IDE/PlatformIO; add wolfSSL Benchmark and Test Examples
2024-05-17 06:42:47 -07:00
Sean Parkinson
c0015cbda6
Merge pull request #7549 from douzzer/20240516-wc_AesXtsEnDecryptFinal
...
20240516-wc_AesXtsEnDecryptFinal
2024-05-17 09:43:26 +10:00
David Garske
219a338107
Merge pull request #7547 from philljj/spelling_cleanup
...
Used codespell and fixed some obvious typos.
2024-05-16 14:10:19 -07:00
David Garske
b866bf6b3d
Merge pull request #7548 from julek-wolfssl/grpc
...
Point grpc.yml to the wolfssl repo
2024-05-16 14:09:57 -07:00
Daniel Pouzzner
6d0f611ab5
AES-XTS: add wc_AesXtsEncryptFinal() and wc_AesXtsDecryptFinal() for API consistency, and add error-checking (block alignment check) to wc_AesXtsEncryptUpdate() and wc_AesXtsDecryptUpdate().
2024-05-16 15:20:37 -05:00
David Garske
a8dd736b1e
Merge pull request #7158 from JacobBarthelmeh/psk
...
warning fix for small PSK build
2024-05-16 12:57:08 -07:00
Juliusz Sosinowicz
e4f20aff8b
Point grpc.yml to the wolfssl repo
2024-05-16 21:32:04 +02:00
jordan
040e0c956a
Used codespell and fixed obvious typos.
2024-05-16 13:53:26 -05:00
David Garske
dd55542949
Merge pull request #7541 from kaleb-himes/wolfEntropy-first-checkin
...
Add a recipe for wolfEntropy checkout
2024-05-16 11:51:46 -07:00
David Garske
0aa8e2eee7
Merge pull request #7445 from julek-wolfssl/grpc
...
Add grpc support
2024-05-16 11:41:54 -07:00
gojimmypi
439d81e0c9
Add PlatformIO license headers
2024-05-16 10:50:02 -07:00
gojimmypi
74c0d9b9f6
Update example/configs list, sort order.
2024-05-16 10:48:14 -07:00
Juliusz Sosinowicz
76aba42bfa
Fix api signature
2024-05-16 18:20:53 +02:00
Juliusz Sosinowicz
c07f73b1c7
Fix typo
2024-05-16 18:20:53 +02:00
Juliusz Sosinowicz
12b9367598
test_wolfSSL_check_domain: doesn't work with WOLFSSL_HOSTNAME_VERIFY_ALT_NAME_ONLY
2024-05-16 18:20:53 +02:00
Juliusz Sosinowicz
d9a236ba1e
SSL_get_error does not return x509 errors
2024-05-16 18:20:53 +02:00
Juliusz Sosinowicz
fcb5c362f9
Add grpc testing
2024-05-16 18:20:53 +02:00
Juliusz Sosinowicz
d9f7629296
Add grpc support
...
- Fix BIO_BIO type
- Set retry flags correctly
- Add CRL callback
- Copy the alt names instead of trying to share a pointer
- Allow calling wolfSSL_get_servername on client side (to get the requested name)
- Return the chain in wolfSSL_X509_STORE_CTX_get_chain in the correct order
- Peer first, top CA last
- Fix leak in RebuildFullName
- Add CopyString helper function
- Implement
- X509_CRL_dup
- ASN1_UTCTIME_set
- X509_STORE_CTX_get0_param
- X509_STORE_get0_param
- X509_STORE_set_verify_cb
- X509_STORE_set_get_crl
- X509_set1_notAfter
- X509_set1_notBefore
2024-05-16 18:20:53 +02:00
JacobBarthelmeh
79595a3602
account for sp math which defines NO_BIG_INT but still allows mp_int types
2024-05-16 09:48:56 -06:00
JacobBarthelmeh
712ff0a58d
Merge pull request #7537 from dgarske/cleanups_20240515
...
Various typo and copy/paste cleanups
2024-05-16 09:38:38 -06:00
JacobBarthelmeh
21204244c5
Merge pull request #7394 from embhorn/zd17779
...
Add null check to wolfSSL_Free
2024-05-16 09:31:37 -06:00
David Garske
55ea3301b2
Merge pull request #7542 from gojimmypi/PR-Espressif-PlatformIO-semphr
...
Fix PlatformIO freertos semphr.h include
2024-05-16 08:28:12 -07:00
Daniel Pouzzner
fe7f92c2f1
Merge pull request #7545 from bandi13/reenableOpenVPNmasterTest
...
Reenable failing external project test
2024-05-16 11:26:04 -04:00
Andras Fekete
c0e372005b
Reenable failing external project test
2024-05-16 09:26:01 -04:00
Joseph Chen
931ca9524a
warn_used_result and unused __attribute__ on IAR
2024-05-16 14:53:31 +08:00
gojimmypi
7f1af2feb3
Fix PlatformIO freertos semphr.h include
2024-05-15 18:24:00 -07:00
gojimmypi
503bbbec8f
Update PlatformIO wolfssl/wolfssl@^5.7.0-rev.3c
2024-05-15 17:13:03 -07:00
David Garske
db38351919
Merge pull request #7470 from kaleb-himes/SRTP-KDF-OPTEST
...
Srtp kdf optest
2024-05-15 16:33:26 -07:00
Sean Parkinson
ca47d492d4
Merge pull request #7218 from anhu/gcmccm
...
Fixup places where it should be CCM instead of GCM.
2024-05-16 09:24:43 +10:00
Sean Parkinson
abd1e367a5
Merge pull request #7420 from anhu/cmp_name_case
...
When comparing subject names, do not worry about case.
2024-05-16 09:10:56 +10:00
David Garske
1d1800a3bd
Merge pull request #7380 from oltolm/yesno
...
make "yes;no" cmake options boolean instead of string
2024-05-15 15:18:42 -07:00
gojimmypi
51f814e6b7
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into PR-PlatformIO-FreeRTOS
2024-05-15 14:47:29 -07:00
Anthony Hu
1e2fb8f244
Fixup places where it should be CCM instead of GCM.
...
Fixes https://github.com/wolfSSL/wolfssl/issues/7216
2024-05-15 17:32:09 -04:00
kaleb-himes
42feca7028
Add a recipe for wolfEntropy checkout
2024-05-15 15:23:43 -06:00
Andras Fekete
412447ac41
Enable OPTION_CHECKING by default
...
This should halt `./configure` when an option is passed that is not recognized.
2024-05-15 16:54:55 -04:00
David Garske
287323ab4c
Merge pull request #6933 from kareem-wolfssl/zd16927
...
Add stub for wolfSSL_set_ecdh_auto.
2024-05-15 13:04:06 -07:00
David Garske
8ba96e6881
Merge pull request #7534 from ColtonWilley/deny_null_term_altnames
...
Do not match altnames with NULL terminators in the middle
2024-05-15 12:41:37 -07:00
kaleb-himes
76527c3eaa
Address a report from multi-test about 8-bit chars
2024-05-15 15:21:41 -04:00
Andras Fekete
0eb11ff466
Standard way to set defaults
2024-05-15 15:19:42 -04:00
Andras Fekete
b83d8f0cf6
Make sure MAX_ECC_BITS >= MIN_ECC_BITS
2024-05-15 15:19:13 -04:00
Andras Fekete
35ef7f4093
There is no default defined. Expected to be unset
2024-05-15 15:16:24 -04:00
Eric Blankenhorn
4e5a98e65d
Fix from rebase
2024-05-15 14:03:12 -05:00
kaleb-himes
fa08e2cb62
Fix a long line in pbkdf2 test
2024-05-15 14:02:44 -04:00
kaleb-himes
6719909f4e
Add logging.h header in pwdbased.c when DEBUG_WOLFSSL
2024-05-15 14:02:44 -04:00
kaleb-himes
7047991cda
Log when iterations LT 1000 but take no action
2024-05-15 14:02:44 -04:00
kaleb-himes
a9511e118a
Add SP800-132 112 bit minimum applicable after stretch/strengthen
2024-05-15 14:02:44 -04:00
kaleb-himes
a365d38762
After careful evaluation deciding not to include mem-zero check (for now)
2024-05-15 14:02:43 -04:00
kaleb-himes
82d9a7bbae
Initialize scratch buffer
2024-05-15 14:02:43 -04:00
kaleb-himes
673c5993a7
Make the memzero check default with FIPS, fix benchmark app
2024-05-15 14:02:43 -04:00
kaleb-himes
766c3b5ad8
Comments and further relaxing of some other hmac restrictions
2024-05-15 14:02:43 -04:00
kaleb-himes
49e9c06679
(Has dependency PR) API Service update HmacSizeByType
2024-05-15 14:02:43 -04:00
David Garske
fd4db1497f
Merge pull request #7536 from gasbytes/buffer_overflows_fix
...
added check that checks if the SEQ's length is > than the buff's length
2024-05-15 10:56:42 -07:00
David Garske
ac7aea9674
Merge pull request #7478 from JacobBarthelmeh/staticmemory
...
add global heap hint setter function
2024-05-15 10:43:15 -07:00
Kareem
4481f9b626
Add stub for wolfSSL_set_ecdh_auto.
2024-05-15 10:19:47 -07:00
David Garske
9166c1aa1c
Various typo and copy/paste cleanups.
2024-05-15 10:01:40 -07:00
Colton Willey
b156a51e82
Code cleanup per review comments
2024-05-15 09:51:00 -07:00
JacobBarthelmeh
9aeef1d857
add void and remove rebase issue
2024-05-15 10:28:39 -06:00
gasbytes
2f24b35ab1
added check that checks if the SEQ's length is > than the buff's length
2024-05-15 18:20:33 +02:00
Colton Willey
de0a492499
Remove trailing whitespace
2024-05-15 09:12:00 -07:00
David Garske
c73e4333bf
Merge pull request #7535 from gojimmypi/PR-fix-sha512-endianness
...
Fix Espressif SHA512 SW fallback endianness
2024-05-15 09:04:07 -07:00
David Garske
9c4c9234b1
Merge pull request #7532 from SparkiDev/wc_ecc_mulmod_zero
...
ECC: handle zero in wc_ecc_mulmod()
2024-05-15 09:02:02 -07:00
Colton Willey
d522feb1cd
Free X509 object
2024-05-15 08:37:39 -07:00
Colton Willey
958b5ac465
Clean up cast warning
2024-05-15 08:30:38 -07:00
Colton Willey
eb24bce93f
Add test case for bad alternative name
2024-05-15 08:22:11 -07:00
gojimmypi
b25a4f1082
Use zero, not Espressif macro for return code
2024-05-15 08:06:06 -07:00
gojimmypi
1024d7a809
Fix Espressif SHA512 SW fallback endianness
2024-05-15 07:36:10 -07:00
David Garske
92806a61c0
Merge pull request #7522 from douzzer/20240511-aes-xts-stream
...
20240511-aes-xts-stream
2024-05-15 06:22:20 -07:00
Daniel Pouzzner
1469aab109
linuxkm/lkcapi_glue.c: add native test coverage for WOLFSSL_AESXTS_STREAM.
...
wolfcrypt/test/test.c:
* add WOLFSSL_AESXTS_STREAM testing to the LARGE_XTS_SZ exercise in aes_xts_128_test().
* add the LARGE_XTS_SZ exercise to aes_xts_256_test().
* add aes_xts_192_test().
* fix -Werror=frame-larger-than=2048 in ed25519_test().
2024-05-15 00:45:51 -05:00
Daniel Pouzzner
4331bc092b
configure.ac: on armasm, disable ENABLED_AESXTS_STREAM by default (not implemented).
2024-05-14 19:24:27 -05:00
Daniel Pouzzner
2fe366cc74
wolfcrypt/test/test.c: add test coverage for WOLFSSL_AESXTS_STREAM.
...
linuxkm/lkcapi_glue.c: typographic cleanups, and failsafe error return constructs when skcipher_walk_virt() returns zero walk.nbytes.
wolfcrypt/src/aes.c: additional comments and inline documentation.
.github/workflows/openvpn.yml: disable test on master branch.
2024-05-14 19:11:39 -05:00
Daniel Pouzzner
8392748cda
wolfcrypt/src/aes.c: de-deduplicate code, AesXts{En,De}crypt_sw() vs AesXts{En,De}cryptUpdate_sw().
2024-05-14 19:11:39 -05:00
Daniel Pouzzner
4f1f7b3a4d
linuxkm/lkcapi_glue.c: update names of wc_AesXts{En,De}cryptInit().
...
wolfcrypt/src/aes.c: activate _AesXtsHelper() in AesXts{En,De}cryptUpdate_sw().
2024-05-14 19:11:39 -05:00
Sean Parkinson
643f472cfb
AES-XTS ASM x64: Add Intel x64 implementation of streaming
...
Changed APIs from wc_AesXts*Start -> wc_AesXts*Init.
Enabled ASM for x64 in aes.c.
AesXtsDecryptStart_sw same as AesXtsEncryptStart_sw so changed them to
AesXtsInit_sw.
2024-05-14 19:11:39 -05:00
Daniel Pouzzner
f874d8753d
AES-XTS-streaming: refactor API to eliminate caller-supplied tweak_block. instead, caller-supplied iv is used as a readwrite buffer.
2024-05-14 19:11:39 -05:00
Daniel Pouzzner
9e06524c6f
wolfcrypt/src/aes.c: add prototypes and linkages for AES_XTS_{encrypt,decrypt}_{start,update}_{avx1,aesni}.
2024-05-14 19:11:39 -05:00
Daniel Pouzzner
3ad5ec4e0a
make --enable-linuxkm-lkcapi-register require --enable-experimental, except for the known-good --enable-linuxkm-lkcapi-register="xts(aes)".
2024-05-14 19:11:39 -05:00
Daniel Pouzzner
70d7b6e48b
add WOLFSSL_AESXTS_STREAM, --enable-aesxts-stream, wc_AesXtsEncryptStart(), wc_AesXtsDecryptStart(), wc_AesXtsEncryptUpdate(), wc_AesXtsDecryptUpdate(), and implement fixes in linuxkm/lkcapi_glue.c to use the streaming API when needed. also added support for 2*192 bit AES-XTS, needed for Linux kernel.
2024-05-14 19:11:38 -05:00
Colton Willey
676dfb7edb
Do not allow NULL terminators in the middle of alt name for pattern matching. ZD 17987
2024-05-14 16:59:28 -07:00
Sean Parkinson
b63f308812
fixup
2024-05-15 09:07:04 +10:00
Sean Parkinson
36754683d6
ECC: handle zero in wc_ecc_mulmod()
...
Public API needs to handle multiplying by zero as the underlying code
doesn't and needn't.
2024-05-15 09:05:31 +10:00
Andras Fekete
6d1416d006
addressing PR comments
2024-05-14 16:02:56 -04:00
David Garske
28bd4ebeea
Merge pull request #7520 from bandi13/fixConversion
...
Fix conversion
2024-05-14 11:26:37 -07:00
David Garske
7526f527d1
Merge pull request #7526 from lealem47/addCast
...
Fix for type conversion error
2024-05-14 10:30:08 -07:00
Andras Fekete
a1797f0d0d
Fix casts depending on OS
2024-05-14 11:03:20 -04:00
Andras Fekete
a59a3d109f
Explicit cast
2024-05-14 11:03:20 -04:00
Andras Fekete
12768cdf57
Fix conversion tls13.c
2024-05-14 11:02:28 -04:00
Andras Fekete
bf92797cbc
Fix conversion error in client.c
2024-05-14 11:02:28 -04:00
Andras Fekete
0bf69e240a
Fix build failures
2024-05-14 11:02:28 -04:00
Andras Fekete
702b6c25d5
Fix conversion error in benchmark.c
2024-05-14 11:02:28 -04:00
Andras Fekete
692a7d55ff
Fix conversion error in wolfio.c
2024-05-14 11:02:28 -04:00
Andras Fekete
affd0a318e
Fix sign conversion errors
2024-05-14 11:02:28 -04:00
David Garske
0e2bb28ff3
Merge pull request #7529 from SparkiDev/aes_decrypt_fixes
...
AES: NO_AES_DECRYPT defined
2024-05-14 06:59:02 -07:00
David Garske
1ee315bbab
Merge pull request #7505 from gojimmypi/PR-Apple-Homekit-SRP-fix
...
Espressif updates to fix Apple Homekit SHA / SRP
2024-05-14 06:58:31 -07:00
Sean Parkinson
e1274013d8
AES: NO_AES_DECRYPT defined
...
Allow code to compile with NO_AES_DECRYPT with AES modes enabled and
disabled.
2024-05-14 16:27:36 +10:00
gojimmypi
fe5e5955bd
Introduce IDE/PlatformIO
2024-05-13 19:12:34 -07:00
David Garske
1c4479867e
Merge pull request #7416 from SparkiDev/ecc_blind_k
...
ECC: blind private key after use in signing
2024-05-13 18:56:44 -07:00
Sean Parkinson
a950e90215
Merge pull request #7527 from douzzer/20240513-test_wc_ecc_sm2_create_digest-clang-analyzer-optin.core.EnumCastOutOfRange
...
20240513-test_wc_ecc_sm2_create_digest-clang-analyzer-optin.core.EnumCastOutOfRange
2024-05-14 11:03:55 +10:00
Daniel Pouzzner
8ee7c36bb1
tests/api.c: add suppression for clang-analyzer-optin.core.EnumCastOutOfRange in "Bad hash type" subtest in test_wc_ecc_sm2_create_digest().
2024-05-13 19:06:54 -05:00
Sean Parkinson
b7eca574bb
SSL/TLS: blind private key DER
...
When WOLFSSL_BLIND_PRIVATE_KEY is defined, blind the private key DER
encoding so that stored private key data is always changing.
2024-05-14 09:47:51 +10:00
Sean Parkinson
f24ebdde25
ECC: blind private key after use in signing
...
Use a mask to blind the private key after use so that stored private key
is always changing.
2024-05-14 09:41:06 +10:00
Daniel Pouzzner
009ea6640b
Merge pull request #7493 from SparkiDev/sm3_benchmark_fix
...
Benchmark, SM3: fix full hash testing
2024-05-13 19:22:22 -04:00
Lealem Amedie
f4275d53c4
Fix for type conversion error
2024-05-13 16:32:12 -06:00
David Garske
6b79e5380d
Merge pull request #7525 from bandi13/fixCDTDisableOptionsTest
...
Unused variable error
2024-05-13 13:13:06 -07:00
gojimmypi
44ec470df0
Update esp32 sha uintptr_t types; ret (0/1 not TRUE/FALSE)
2024-05-13 12:36:35 -07:00
David Garske
7cce5684e6
Merge pull request #7468 from gojimmypi/PR-include-am
...
Cleanup & sort IDE include.am
2024-05-13 10:36:09 -07:00
David Garske
29f7578a61
Merge pull request #7446 from julek-wolfssl/hostap
...
hostap update
2024-05-13 10:35:01 -07:00
Andras Fekete
e5a0c0d5bf
Unused variable error
2024-05-13 13:18:20 -04:00
Daniel Pouzzner
4b81a99f91
Merge pull request #7424 from SparkiDev/aes_xts_x64_msvc
...
AES XTS asm x64 MSVC
2024-05-13 13:05:23 -04:00
David Garske
1be10fddba
Merge pull request #7509 from miyazakh/user_threading
...
Add user threading macro definition
2024-05-13 09:24:44 -07:00
David Garske
4eab5267f1
Merge pull request #7511 from julek-wolfssl/ec-meth
...
Stub EC_KEY_METHOD
2024-05-13 09:22:23 -07:00
David Garske
56129bd160
Merge pull request #7480 from gojimmypi/PR-cmake-liboqs-kyber
...
Introduce cmake SET_WOLFSSL_DEFINITIONS; Add Kyber and OQS
2024-05-13 09:21:23 -07:00
David Garske
a9164293c2
Merge pull request #7513 from julek-wolfssl/gh/7510
...
ed25519: check that the signature is smaller than the order
2024-05-13 09:16:17 -07:00
David Garske
568fda0e8b
Merge pull request #7517 from bandi13/bugFixes
...
Bug fixes
2024-05-13 09:01:00 -07:00
David Garske
d39ab765f6
Merge pull request #7519 from julek-wolfssl/gh/7516
...
Return length in wc_Curve448PublicKeyToDer with NULL output param
2024-05-13 09:00:33 -07:00
Sean Parkinson
81c22128e3
Merge pull request #7523 from douzzer/20240511-clang-analyzer-unix.Stream
...
20240511-clang-analyzer-unix.Stream
2024-05-13 21:53:13 +10:00
Sean Parkinson
0d996f4e5f
Merge pull request #7524 from douzzer/20240512-pkcs12_test-leak
...
20240512-pkcs12_test-leak
2024-05-13 09:06:04 +10:00
Daniel Pouzzner
1faa70c128
wolfcrypt/test/test.c:
...
* fix unconditional memory leak in pkcs12_test().
* refactor pkcs12_test() to fix error-conditional memory leaks.
* fix various old-style return codes in sm4_ccm_test(), pkcs12_test(), prf_test(), tls12_kdf_test(), xmss_test(), xmss_test_verify_only(), lms_test(), and lms_test_verify_only().
2024-05-12 14:13:06 -05:00
Daniel Pouzzner
9ac6bdd438
fixes and suppressions for defects reported by clang-analyzer-unix.Stream (new in llvm-19.0.0_pre20240504):
...
* added POSIX definitions for XFEOF(), XFERROR(), and XCLEARERR(), currently with no-op fallbacks for !POSIX.
* added missing file handle checks in testsuite/testsuite.c:file_test() and tests/utils.h:copy_file().
* added fixes and suppression around tests/api.c:test_wolfSSL_SMIME_read_PKCS7().
* added various fixes in examples/asn1/asn1.c and examples/pem/pem.c.
2024-05-11 15:24:54 -05:00
Andras Fekete
c5773f5f26
Make the function flow better
...
Will return 0 on failure.
2024-05-10 15:56:56 -04:00
Andras Fekete
f73a9f0d4f
Fix function logic
2024-05-10 15:03:17 -04:00
Juliusz Sosinowicz
239706615c
Return length in wc_Curve448PublicKeyToDer with NULL output param
2024-05-10 20:10:23 +02:00
JacobBarthelmeh
d68f3cf63c
add macro guard around test case
2024-05-10 11:08:45 -06:00
JacobBarthelmeh
98a19f9fdd
add debug log and adjust set global heap hint function
2024-05-10 11:08:43 -06:00
JacobBarthelmeh
de3d1a488d
add global heap hint setter function
2024-05-10 11:08:01 -06:00
Sean Parkinson
add7428d1c
TLS, SM2: fixes to get SM handshakes working
...
Pass around the algorithm id from the private key so that the WOLFSSL or
WOLFSSL_CTX get the correct key format set.
Use different verification context when self-signed certificate with SM2
and SM3 signature but public key OID is ECC.
2024-05-10 10:15:47 +10:00
Sean Parkinson
b87b521044
AES XTS asm x64 MSVC
...
Use assembly code for AES-XTS with MSVC for x64.
2024-05-10 09:10:36 +10:00
Daniel Pouzzner
cb689104d1
Merge pull request #7466 from julek-wolfssl/gh/7273
...
Mark all record sequence numbers before stateful parsing as read
2024-05-09 13:57:13 -04:00
Daniel Pouzzner
2335eb6bc6
Merge pull request #7488 from SparkiDev/asn_template_debug_fix
...
Asn template debug fix
2024-05-09 12:16:51 -04:00
philljj
2ed2da0a8f
Merge pull request #7515 from douzzer/20240509-fix-linuxkm-x86_vector_register_glue
...
20240509-fix-linuxkm-x86_vector_register_glue
2024-05-09 11:53:36 -04:00
Sean Parkinson
b62e8c1467
ASN template debug compile error
...
Variable is length instead of len.
2024-05-09 10:44:36 -05:00
Juliusz Sosinowicz
ab03324dc7
ed25519: put entire order into buffer for sanity check
2024-05-09 10:36:37 +02:00
Daniel Pouzzner
611a1642a1
linuxkm/include.am: add linuxkm/x86_vector_register_glue.c to EXTRA_DIST.
2024-05-09 02:03:16 -05:00
Daniel Pouzzner
f7e1e370a0
Merge pull request #7438 from julek-wolfssl/zephr-no-malloc
...
zephyr no malloc
2024-05-09 02:57:20 -04:00
Daniel Pouzzner
10b31cc481
Merge pull request #7507 from rizlik/update_err_code_cert
...
tls13: update error code to NO_CERT_ERROR when no cert is set
2024-05-09 01:38:26 -04:00
Daniel Pouzzner
af928faca7
Merge pull request #7489 from anhu/zero_len_hash
...
Allow for zero length hash. Its not an error.
2024-05-09 01:34:24 -04:00
Daniel Pouzzner
d53abc2e37
Merge pull request #7441 from kareem-wolfssl/zd17857
...
Allow using wolfSSL_CTX_set_default_verify_paths without WOLFSSL_SYS_CA_CERTS defined.
2024-05-09 00:38:04 -04:00
philljj
ac17616873
Merge pull request #7514 from douzzer/20240508-linuxkm-x86_vector_register_glue
...
20240508-linuxkm-x86_vector_register_glue
2024-05-08 21:45:39 -04:00
Daniel Pouzzner
5a784c818d
Merge pull request #7319 from SparkiDev/chacha_poly1305_asm_msvc
...
ChaCha20, Poly1305 ASM for MSVC
2024-05-08 19:03:56 -04:00
Daniel Pouzzner
76b302381b
Merge pull request #7484 from SparkiDev/mem_fail_fixes_1
...
Mem fail fix: ProcessingBuffer()
2024-05-08 18:36:45 -04:00
Hideki Miyazaki
5ceb992035
address review comments
2024-05-09 07:05:51 +09:00
Daniel Pouzzner
bc8664164b
linuxkm: move the *SAVE_VECTOR_REGISTERS* code from linuxkm/linuxkm_memory.c to linuxkm/x86_vector_register_glue.c, to move various fidgity/unstable kernel function calls outside the PIE wolfCrypt container.
2024-05-08 16:18:33 -05:00
Juliusz Sosinowicz
2508c9e1f4
ed25519: check that the signature is smaller than the order
2024-05-08 17:54:37 +02:00
Juliusz Sosinowicz
d6291522b9
fixup! Stub EC_KEY_METHOD
2024-05-08 16:41:00 +02:00
Juliusz Sosinowicz
0f06faf3d4
Stub EC_KEY_METHOD
2024-05-08 16:37:30 +02:00
Andras Fekete
8f9c8a1203
Fix infinite loop
...
'ret' could be set to non-zero inside the loop and the 'cmac->bufferSz' never gets reset causing 'add' to become 0 in the subsequent loop.
2024-05-08 09:52:37 -04:00
Juliusz Sosinowicz
df425b306f
Fix https://github.com/wolfSSL/wolfssl/issues/7391
2024-05-08 10:35:42 +02:00
Juliusz Sosinowicz
86c120a3f0
Increase hostap test timeout
2024-05-08 10:35:42 +02:00
Juliusz Sosinowicz
16ec3e52b7
Jenkins fixes
2024-05-08 10:35:42 +02:00
Juliusz Sosinowicz
433f3ae0b9
Add latest patch set to CI
2024-05-08 10:35:42 +02:00
Juliusz Sosinowicz
a987e76677
Use uml for hostap tests
...
Remove tests that fail with openssl
2024-05-08 10:33:30 +02:00
Juliusz Sosinowicz
6b47ebd66a
Expose *_set_groups for TLS < 1.3
...
- Add test to make sure we fail on curve mismatch
2024-05-08 10:33:20 +02:00
Juliusz Sosinowicz
020bcd0043
Advertise all supported sigalgs by default
2024-05-08 10:33:20 +02:00
Juliusz Sosinowicz
66f72a258f
Remove unused internal API
2024-05-08 10:33:20 +02:00
Juliusz Sosinowicz
77a7297c42
Filter cipher list on TLS version change
2024-05-08 10:33:20 +02:00
Juliusz Sosinowicz
06798ab8bf
EAP-FAST
...
Implement PACs for EAP-FAST
- wolfSSL_set_session_ticket_ext_cb
- server side wolfSSL_set_session_secret_cb (tls <=1.2 only)
2024-05-08 10:33:20 +02:00
Sean Parkinson
52861cbdbf
Merge pull request #7476 from per-allansson/one-crl-to-rule-them-all
...
An expired CRL should not override a successful match in other CRL
2024-05-08 09:47:22 +10:00
Hideki Miyazaki
95e9806e9e
add user threading macro definition
2024-05-08 06:56:43 +09:00
Daniel Pouzzner
97110700b2
Merge pull request #7430 from jpbland1/check-session-setup
...
Add `wolfSSL_SessionIsSetup`
2024-05-07 13:51:33 -04:00
András Fekete
33817747c4
Merge pull request #7506 from julek-wolfssl/gh/no-main
...
Don't use main.yml since it has a limit of 20 jobs
2024-05-07 09:22:56 -04:00
Juliusz Sosinowicz
14ce8ce198
Jenkins fixes
2024-05-07 11:46:36 +02:00
Marco Oliverio
b0c991eeb2
tls13: update error code to NO_CERT_ERROR when no cert is set
2024-05-07 10:55:48 +02:00
Juliusz Sosinowicz
589bdba256
Apply suggestions from code review
...
Co-authored-by: Bill Phipps <bill@wolfssl.com >
2024-05-07 10:38:01 +02:00
Juliusz Sosinowicz
77a6481d65
fixup! Add testing for zephyr no malloc
2024-05-07 10:38:01 +02:00
Juliusz Sosinowicz
d7361b3677
Increase zephyr thread sample memory
2024-05-07 10:38:01 +02:00
Juliusz Sosinowicz
8d8f4d4e1e
fixup! zephyr no malloc
2024-05-07 10:38:01 +02:00
Juliusz Sosinowicz
cbd490d1d7
fixup! zephyr no malloc
2024-05-07 10:38:01 +02:00
Juliusz Sosinowicz
550d9ad9a4
Add testing for zephyr no malloc
2024-05-07 10:38:01 +02:00
Juliusz Sosinowicz
7ed5e0b3ba
zephyr no malloc
...
- cert gen
- csr gen
- pkcs12
- Compiles for Zephyr 3.4.0 and 2.7.4
- Add support for CONFIG_POSIX_API
2024-05-07 10:38:01 +02:00
Juliusz Sosinowicz
2ffb5cc16c
Move haproxy.yml to disabled directory
2024-05-07 10:31:04 +02:00
Daniel Pouzzner
4e6a34504d
Merge pull request #7500 from SparkiDev/lms_xmss_move_wolfcrypt
...
LMS, XMSS: move code into wolfCrypt
2024-05-07 01:12:18 -04:00
Chris Conlon
95abc1074b
Merge pull request #7278 from JacobBarthelmeh/pkcs7-validate
...
add guard around public key validation on import
2024-05-06 13:51:29 -06:00
JacobBarthelmeh
7bc73d351f
Merge pull request #7504 from ejohnstown/generic-pool-fix
...
Generic Memory Pools Fix
2024-05-06 13:11:47 -06:00
Juliusz Sosinowicz
7206508329
Don't use main.yml since it has a limit of 20 jobs
2024-05-06 17:18:01 +02:00
gojimmypi
e90c6bcd24
Espressif updates to fix Apple Homekit SRP.
2024-05-04 14:33:23 -07:00
John Safranek
195bbcc315
Generic Memory Pools Fix
...
1. Add some expository comments describing the purpose of:
* WOLFMEM_MAX_BUCKETS
* WOLFMEM_DEF_BUCKETS
* WOLFMEM_BUCKETS
* WOLFMEM_DIST
2. Switch the API test for LoadStaticMemory() to named constants.
3. Delete redundant test case. Add a new test case.
4. In the wolfCrypt test for the memory constants, check the sizes of
the WOLFMEM_BUCKETS and WOLFMEM_DIST lists against
WOLFMEM_DEF_BUCKETS which should be their length. Check that
WOLFMEM_DEF_BUCKETS is not greater than WOLFMEM_MAX_BUCKETS.
5. Default for WOLFMEM_MAX_BUCKETS should be WOLFMEM_DEF_BUCKETS, set it
to what is specified. Add a warning if MAX is less than DEF.
6. Separate the definition of the constant LARGEST_MEM_BUCKET so it is
dependent on config and not if WOLFMEM_BUCKETS isn't set.
2024-05-03 16:15:38 -07:00
JacobBarthelmeh
081731be8b
Merge pull request #7392 from gojimmypi/PR-Espressif-wolfcrypt-test
...
Update Espressif Examples and Libraries
2024-05-03 15:31:23 -06:00
Anthony Hu
4ddba7ac8a
When comparing subject names, do not worry about case.
2024-05-03 15:03:07 -04:00
Sean Parkinson
e47f1d4190
LMS, XMSS: move code into wolfCrypt
...
Move implementations of LMS and XMSS into wolfCrypt and use by default.
2024-05-03 15:43:22 +10:00
Per Allansson
b88803cbb3
Fix formatting
2024-05-03 06:43:15 +02:00
philljj
d22991bb03
Merge pull request #7499 from douzzer/20240502-test_server_loop-double-close
...
20240502-test_server_loop-double-close
2024-05-02 23:53:04 -04:00
Daniel Pouzzner
0c1d583ab4
tests/api.c: fix double close in test_server_loop().
2024-05-02 19:07:36 -05:00
Sean Parkinson
51b85ee1e3
Merge pull request #7490 from dgarske/ecc_curvecache_nomalloc
...
Support for ECC_CACHE_CURVE with no malloc
2024-05-02 07:17:01 +10:00
Sean Parkinson
75b178f666
Merge pull request #7492 from JacobBarthelmeh/porting
...
remove assumption of struct layout
2024-05-02 07:14:06 +10:00
philljj
b61a6baf2b
Merge pull request #7497 from douzzer/20240501-fix-pqcrypto-private_key-callback-names
...
20240501-fix-pqcrypto-private_key-callback-names
2024-05-01 16:02:29 -04:00
András Fekete
ba89e0786d
Merge pull request #7498 from douzzer/20240501-openssl-sha3-sizeof-fix
...
20240501-openssl-sha3-sizeof-fix
2024-05-01 15:50:17 -04:00
Daniel Pouzzner
678038a077
wolfssl/openssl/sha3.h: use sizeof(wc_Sha3), not sizeof(struct wc_Sha3), for compatibility with afalg_hash.h and other ports that don't define a struct wc_Sha3.
2024-05-01 14:19:32 -05:00
Daniel Pouzzner
5905f9289d
fix namespace collision: rename types read_private_key_cb and write_private_key_cb to wc_{lms,xmss}_read_private_key_cb and wc_{lms,xmss}_write_private_key_cb.
2024-05-01 13:58:57 -05:00
András Fekete
866468ec2c
Merge pull request #7496 from douzzer/20240501-xilinx-wc_Sha3
...
20240501-xilinx-wc_Sha3
2024-05-01 14:51:56 -04:00
Daniel Pouzzner
a25644c379
Merge pull request #7495 from bandi13/fixWindowsNetdb_h
...
Fix windows 'gethostbyname' declaration
2024-05-01 14:16:45 -04:00
Daniel Pouzzner
7f6f824594
wolfssl/wolfcrypt/port/xilinx/xil-sha3.h: fix struct name -- struct wc_Sha3, not struct Sha3.
2024-05-01 12:47:23 -05:00
Andras Fekete
c3131b3234
Fix windows 'gethostbyname' declaration
2024-05-01 13:37:22 -04:00
David Garske
3afa420c31
Add option NO_ECC_CACHE_CURVE to allow disabling ECC curve cache with async.
2024-05-01 07:25:28 -07:00
Sean Parkinson
1ddc552828
TLS, SM2: fix ecc key type
...
Set the curve explicitly if it is SM2.
Set the key type to signature algorithm to handle SM2.
2024-05-01 17:56:49 +10:00
Sean Parkinson
e45686cce9
Merge pull request #7494 from douzzer/20240430-xmss-analyzer-cleanups
...
20240430-xmss-analyzer-cleanups
2024-05-01 14:36:46 +10:00
Sean Parkinson
840d1e9fac
Benchmark, SM2: initialize vars for small stack
...
Variables may not be initialized in benchmark test when building for
small stack.
2024-05-01 13:52:46 +10:00
Daniel Pouzzner
fa30d3ae0b
wolfcrypt/benchmark/benchmark.c: fixes for clang-analyzer-deadcode.DeadStores in bench_xmss_sign_verify();
...
wolfcrypt/test/test.c: fix for invalidPrintfArgType_sint in xmss_test_verify_only().
2024-04-30 22:48:48 -05:00
Sean Parkinson
aab97fe9e2
ChaCha20, Poly1305 ASM for MSVC
...
Make ChaCha20 and Poly1305 asm available for MSVC.
2024-05-01 13:44:25 +10:00
Sean Parkinson
db6b1388ce
Benchmark, SM3: fix full hash testing
...
Test now has an array of hashes.
Use only first hash when testing full digest operation.
2024-05-01 09:57:13 +10:00
Sean Parkinson
4594151588
Merge pull request #7418 from ejohnstown/generic-pool
...
Generic Memory Pools
2024-05-01 08:53:56 +10:00
Sean Parkinson
72d49964b9
Merge pull request #7379 from mrdeep1/enable-rpk
...
configure.ac: Add in --enable-rpk option
2024-05-01 08:44:08 +10:00
Sean Parkinson
2a125ad304
Merge pull request #7479 from gojimmypi/PR-cmake-update
...
Introduce cmake_policy CMP0128 NEW
2024-05-01 08:39:58 +10:00
Sean Parkinson
76e478ad8d
Merge pull request #7491 from bandi13/fixDTLStest
...
Make the DTLS tests a bit more resilient
2024-05-01 08:38:41 +10:00
JacobBarthelmeh
5aa39a6397
remove assumption of struct layout
2024-04-30 15:42:38 -06:00
Andras Fekete
256d81795a
Make the DTLS tests a bit more resilient
...
The assumption is that the wrong PIDs are getting killed. Better use the current shell's child processes (ie: 'jobs' command) than storing some calculated PID
2024-04-30 15:49:51 -04:00
John Safranek
6be55269db
Generic Memory Pools
...
1. Add API for function `wc_UnloadStaticMemory()` which frees the mutex
used by the static memory pool.
2. Update the `wc_LoadStaticMemory_ex()` test to free the static memory
pool's mutex on each successful test case.
2024-04-30 09:34:48 -07:00
John Safranek
f6ae432be1
Generic Memory Pools
...
1. Add API test for function `wc_LoadStaticMemory_ex()`.
2024-04-30 09:29:20 -07:00
gojimmypi
216925a946
Introduce cmake get/set_wolfssl_definitions; Add Kyber and OQS
2024-04-30 08:41:46 -07:00
David Garske
eaa5edb65b
Support for ECC_CACHE_CURVE with no malloc. ZD 17774
2024-04-30 08:22:56 -07:00
Anthony Hu
529b6a1eb9
Allow for zero length hash. Its not an error.
...
Fixes ZD17910
2024-04-30 11:06:30 -04:00
Sean Parkinson
f18633a000
Merge pull request #7474 from miyazakh/renesas_rz_rsip_update
...
Improve Renesas RZ support
2024-04-30 21:59:12 +10:00
Hideki Miyazaki
d4b265e84c
convert outLen type correctly
2024-04-30 17:19:11 +09:00
David Garske
6b1e6e3ef9
Spelling fixes.
2024-04-30 17:19:11 +09:00
Hideki Miyazaki
07de40e4bd
fix warnings
...
fix encrypted key use case
Update README
2024-04-30 17:19:11 +09:00
gojimmypi
980e26da63
Introduce cmake_policy CMP0128 NEW
2024-04-29 19:27:41 -07:00
Sean Parkinson
0d86137317
Merge pull request #7487 from bandi13/fixDockerfile
...
Fix dockerfile
2024-04-30 11:50:24 +10:00
Sean Parkinson
068a3b5e99
Merge pull request #7481 from douzzer/20240424-sha-C-dynamic-fallback
...
20240424-sha-C-dynamic-fallback
2024-04-30 09:00:57 +10:00
Sean Parkinson
5cc05956d5
Merge pull request #7485 from dgarske/pkcs11_async
...
Improved the prioritization of crypto callback vs async crypt in ECC …
2024-04-30 08:41:14 +10:00
Daniel Pouzzner
bb4c2cbad6
address peer review: typography in linuxkm/linuxkm_memory.c, typography, clarity, and efficiency in wolfcrypt/src/sha256.c and wolfcrypt/src/sha512.c.
2024-04-29 14:02:44 -05:00
David Garske
5af0b1e83b
Improved the prioritization of crypto callback vs async crypt in ECC and RSA. Resolves possible use of uninitialized value on ECC/RSA key when PKCS11 is enabled. See #7482
2024-04-29 10:34:01 -07:00
Andras Fekete
b90035d7b0
Remove 'dunfell' as its support ends in 3 days
2024-04-29 12:26:29 -04:00
Andras Fekete
13f83045a4
Add in 'langdale' and 'scarthgap' containers
2024-04-29 12:22:54 -04:00
Andras Fekete
aa1f253a8a
Force a rebuild using the latest sources
2024-04-29 12:21:47 -04:00
Sean Parkinson
41eaa8466d
Mem fail fix: ProcessingBuffer()
...
When ProcessBufferCertTypes() is not called, 'der' is not freed.
2024-04-29 23:05:29 +10:00
Per Allansson
e96a65a93d
An expired CRL should not override a successful match in other CRL
2024-04-29 09:35:28 +02:00
Sean Parkinson
bd9a27a39b
Merge pull request #7472 from ColtonWilley/remove-des3-guard-from-pkcs12-tests
...
Remove DES3 flag guard from pkcs12 tests
2024-04-29 10:54:39 +10:00
Daniel Pouzzner
393bf4a8e2
wolfssl/openssl/sha3.h: use sizeof(struct wc_Sha3) only ifdef WOLFSSL_SHA3.
2024-04-27 13:17:01 -05:00
Daniel Pouzzner
7260cc124c
smallstack refactors of wolfcrypt/src/evp.c:wolfssl_evp_digest_pk_final() and wolfcrypt/test/test.c:openssl_test().
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
885497ba5a
add missing gate around Sha256_SetTransform() declaration in wolfcrypt/src/sha256.c;
...
remove stray definitions of XTRANSFORM*() in wolfcrypt/src/sha512.c;
restore global intel_flags in the !WC_NO_INTERNAL_FUNCTION_POINTERS paths of sha256.c and sha512.c;
disable test_wolfSSL_dtls_compare_stateless() in tests/api.c when DEBUG_VECTOR_REGISTER_ACCESS_FUZZING (it depends on a stable SHA512 hash of the in-memory struct WOLFSSL image).
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
0566584191
implement full support for --enable-intelasm --enable-linuxkm. also add --enable-curve25519=noasm to allow use of the existing NO_CURVED25519_X64 code path by the linuxkm build (fe_x25519_asm.S is not kernel-compatible).
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
326fd87b4f
linuxkm/linuxkm_memory.c: fix circular dependency around wolfCrypt_Init(), allocate_wolfcrypt_linuxkm_fpu_states(), wc_linuxkm_fpu_state_assoc(), on FIPS.
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
3f8e33369c
implement WC_C_DYNAMIC_FALLBACK for SHA-3.
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
4184b0e4f3
implement WC_C_DYNAMIC_FALLBACK for SHA512.
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
65649b63d1
implement WC_C_DYNAMIC_FALLBACK for SHA256.
2024-04-27 12:35:23 -05:00
Daniel Pouzzner
4cc27fa58b
rename WC_AES_C_DYNAMIC_FALLBACK to WC_C_DYNAMIC_FALLBACK.
2024-04-27 12:35:23 -05:00
David Garske
2496cc0c21
Merge pull request #7477 from julek-wolfssl/issue/7390-2
...
Fix quic header protect cipher return
2024-04-27 07:10:18 -07:00
John Safranek
d23994862c
Generic Memory Pools
...
1. Added some extra parameter checking to wc_LoadStaticMemory_ex().
2. Added some extra parameter checking to wc_StaticBufferSz_ex().
3. Rename some parameters and add some logging prints.
4. Some static functions have some parameter checking and they are only
calling in one spot, remove it.
2024-04-26 15:08:17 -07:00
Kareem
c1f23cc505
Allow using wolfSSL_CTX_set_default_verify_paths without WOLFSSL_SYS_CA_CERTS defined.
2024-04-26 10:22:40 -07:00
Kareem
21058820fb
Fix NO_WOLFSSL_STUB typo.
2024-04-26 10:22:40 -07:00
Juliusz Sosinowicz
2328270222
Code review
2024-04-26 15:56:20 +02:00
Juliusz Sosinowicz
49952a97d7
Fix quic header protect cipher return
2024-04-26 14:18:40 +02:00
Sean Parkinson
e1bd4dd1ec
Merge pull request #7473 from douzzer/20240425-fixes
...
20240425-fixes
2024-04-26 15:52:05 +10:00
Sean Parkinson
e41454004e
Merge pull request #7475 from douzzer/20240425-master-for-jenkins
...
20240425-master-for-jenkins
2024-04-26 14:54:20 +10:00
Daniel Pouzzner
442d3f30cc
src/ssl.c: refactor fix in wolfSSL_RAND_bytes() for race on initGlobalRNG to retain the initial check on initGlobalRNG, and just recheck it, to avoid possible access to uninitialized globalRNGMutex.
2024-04-25 23:47:39 -05:00
Daniel Pouzzner
185f35287e
configure.ac: fix copyright year.
2024-04-25 22:44:28 -05:00
Daniel Pouzzner
59290cd066
src/quic.c: fix -Wunused-function for evp_cipher_eq().
2024-04-25 22:09:28 -05:00
Daniel Pouzzner
963e14a1fe
src/ssl.c: code style tweak from peer review.
2024-04-25 22:09:28 -05:00
Daniel Pouzzner
8e8e9bd0eb
src/ssl.c: fix races in wolfSSL_Init() and wolfSSL_RAND_bytes().
2024-04-25 22:09:28 -05:00
Daniel Pouzzner
460991a6f0
wolfcrypt/test/test.c: fix invalidPrintfArgType_sint in lms_test_verify_only().
2024-04-25 22:09:28 -05:00
Sean Parkinson
c8e51112c3
Merge pull request #7372 from julek-wolfssl/zd/17435
...
Add secret logging callback to TLS <= 1.2
2024-04-26 09:41:58 +10:00
Sean Parkinson
5ee0e34d89
Merge pull request #7465 from julek-wolfssl/issue/7390
...
Clean up EVP usage in quic
2024-04-26 09:38:40 +10:00
Sean Parkinson
54022b146b
Merge pull request #7456 from mrdeep1/enable-dtls13
...
dtls1.3: Fix issues when --enable-dtls13 enabled
2024-04-26 09:24:01 +10:00
Sean Parkinson
7881f4e04c
Merge pull request #7471 from ColtonWilley/update-benchmark-rsa-size-parsing
...
Update benchmark to only parse rsa size if keygen is enabled
2024-04-26 09:11:32 +10:00
Sean Parkinson
e22ae7a1f8
Merge pull request #7469 from douzzer/20240424-fix-ports-whitespace
...
20240424-fix-ports-whitespace
2024-04-26 09:00:38 +10:00
Sean Parkinson
039fd26baf
Merge pull request #7467 from anhu/quick_fix
...
Get rid of some code with NO_OLD_TLS
2024-04-26 08:57:46 +10:00
Sean Parkinson
9ac918c0d4
Merge pull request #7462 from kaleb-himes/SRTP-KDF-HARNESSrev2
...
Srtp kdf harness rev2
2024-04-26 08:21:37 +10:00
Colton Willey
2fb70b260b
Remove DES3 flag guard from pkcs12 tests that do not depend on DES3 code
2024-04-25 12:15:02 -07:00
Colton Willey
7485e9935d
Update benchmark to only parse rsa size if keygen is enabled, update keygen option help in configure.ac
2024-04-25 11:46:18 -07:00
Juliusz Sosinowicz
c62faa048c
Add secret logging callback to TLS <= 1.2
2024-04-25 17:11:07 +02:00
Juliusz Sosinowicz
d61fec5af9
Clean up EVP usage in quic
2024-04-25 16:34:38 +02:00
Juliusz Sosinowicz
7644d792b6
Mark all record sequence numbers before stateful parsing as read
...
Fixes https://github.com/wolfSSL/wolfssl/issues/7273
2024-04-25 16:23:41 +02:00
Daniel Pouzzner
e862c85db4
fix formatting infractions in the ports (hard tabs, trailing whitespace, C++ comments, stray Unicode including numerous homoglyphs).
2024-04-24 18:32:48 -05:00
gojimmypi
565058370f
Cleanup & sort IDE include.am
2024-04-24 15:36:15 -07:00
Anthony Hu
329650fb4c
Get rid of some code with NO_OLD_TLS
2024-04-24 16:00:45 -04:00
kaleb-himes
24eed7de34
Remove debug printf and place comments inside gate
2024-04-24 10:55:13 -04:00
Jon Shallow
e36df36f84
dtls1.3: Fix issues when --enable-dtls13 enabled
...
Fixed issue reported by scan-build when DTLS13 is enabled.
Fix compile issue when WOLFSSL_DTLS_CH_FRAG is enabled.
Fix running of scripts/dtlscid.test by removing 'set -e' as bwrap
command may not be there.
2024-04-24 12:07:29 +01:00
Sean Parkinson
6e49aa7543
Merge pull request #7421 from philljj/update_lms_parms
...
Update enum wc_LmsParm for wolfboot support.
2024-04-24 16:39:10 +10:00
Sean Parkinson
c26f4041c6
Merge pull request #7463 from ColtonWilley/hmac-oversized-key-test-update
...
Update HMAC oversized key tests
2024-04-24 15:34:28 +10:00
Colton Willey
7f19be05bd
Modify HMAC oversized key tests to consistently use test vectors from RFC.
2024-04-23 15:23:51 -07:00
Sean Parkinson
9d7913508b
Merge pull request #7460 from douzzer/20240423-linuxkm-sha-2-3-asm-save-vector-regs
...
20240423-linuxkm-sha-2-3-asm-save-vector-regs
2024-04-24 07:33:05 +10:00
Jon Shallow
4a1df83b6f
configure.ac: Add in --enable-rpk option
...
By default RPK (RFC7250) support is not enabled, but is enabled when
--enable-rpk, --enable-all or --enable-dist is used.
Makes use of the HAVE_RPK compile time option.
Fix clang issue reported in tests/api.c during test suites
2024-04-23 21:30:21 +01:00
kaleb-himes
80d21f10c6
Remove excess empty line
2024-04-23 13:47:26 -04:00
kaleb-himes
690671d447
ECC allow keyVer of 192-bit (import OK, generate restricted)
2024-04-23 13:45:41 -04:00
jordan
094ddb62c2
Add wc_LmsKey_ExportPubRaw to wolfcrypt test.
2024-04-23 10:48:53 -05:00
András Fekete
a75c2befb5
Add CUDA support ( #7436 )
...
* Redirect the AesEncrypt_C call to device
* Fix function declarations
* Force CC=nvcc with CUDA
* Don't let C++ mangle function names
* Add larger parallelization
* Add in memory copy to device
* `nvcc` does not support '-Wall' nor '-Wno-unused'
* Add in README.md
* Clean up script to output color coded data
* Fix Asymmetric cipher comparisons
* Add in standard output parsing in addition to the CSV
* Add option to output results in a CSV
---------
Co-authored-by: Andras Fekete <andras@wolfssl.com >
2024-04-23 08:26:27 -07:00
jordan
bc00c95fe5
Update enum wc_LmsParm for wolfboot support.
2024-04-23 09:37:07 -05:00
Daniel Pouzzner
5d9154e8c6
wolfcrypt/src/sha{256,512,3}.c add SAVE_VECTOR_REGISTERS() for SHA-2 and SHA-3 vectorized implementations, and add WC_NO_INTERNAL_FUNCTION_POINTERS code paths to fix GOT relocations around implementation function pointers.
2024-04-23 01:31:43 -05:00
Sean Parkinson
c3d9fb61a8
Merge pull request #7444 from miyazakh/trackmem_exclusion
...
Exclusively tracking mem properties
2024-04-23 11:08:42 +10:00
Sean Parkinson
eb125851cd
Merge pull request #7447 from Naruto/feature/enable_sccache
...
add ENABLE_SCCACHE option
2024-04-23 11:05:43 +10:00
David Garske
3a89c452b3
Merge pull request #7454 from lealem47/stm32AesCtr
...
Fix for AES CTR on STM32
2024-04-22 10:04:06 -07:00
John Safranek
0b5c83f589
Generic Memory Pools
...
1. Make the function wolfSSL_GetMemStats() public.
2024-04-22 08:54:40 -07:00
John Safranek
7a0bcb05fb
Generic Memory Pools
...
1. Add checks for listSz against WOLFMEM_MAX_BUCKETS.
2. Use WOLFMEM_DEF_BUCKETS for the size when using the default memory
descriptions.
3. Whitespace.
2024-04-22 08:54:40 -07:00
John Safranek
15a0ae4244
Generic Memory Pools
...
1. Add generic function wolfSSL_StaticBufferSz_ex() where one specifies
the memory bucket list sizes and distribution.
2. Rewrote wolfSSL_StaticBufferSz() in terms of the new function.
3. Changed the list pointers on wc_LoadStaticMemory_ex() and
wc_init_memory_heap() to be pointers to const.
2024-04-22 08:54:40 -07:00
John Safranek
7481644842
Generic Memory Pools
...
1. Add the function wc_LoadStaticMemory_ex(), which is a generic version
of wc_LoadStaticMemory().
2. Modify wc_LoadStaticMemory() to call wc_LoadStaticMemory_ex() with
the bucket lists.
3. Rename the function wolfSSL_load_static_memory() as
wc_partition_static_memory(), make it static, move it higher in the file.
2024-04-22 08:54:40 -07:00
John Safranek
2168b154b6
Generic Memory Pools
...
1. Modify wolfSSL_CTX_load_static_memory() to use wc_LoadStaticMemory()
instead of reimplementing it.
2. Initialize the pointers in wc_LoadStaticMemory() to null.
3. Whitespace changes.
2024-04-22 08:54:37 -07:00
Sean Parkinson
b17ad46b30
Merge pull request #7458 from douzzer/20240422-wc_SRTCP_KDF_ex-Wconversion
...
20240422-wc_SRTCP_KDF_ex-Wconversion
2024-04-22 21:30:14 +10:00
Daniel Pouzzner
44e8f392ae
wolfcrypt/src/kdf.c: fix -Wconversions in wc_SRTCP_KDF_ex().
2024-04-22 01:11:46 -05:00
Sean Parkinson
5bb22d8343
Merge pull request #7439 from JacobBarthelmeh/build_test
...
fix for WOLFSSL_NO_PEM build
2024-04-22 10:48:57 +10:00
Sean Parkinson
e1b66ca62d
Merge pull request #7407 from mrdeep1/key_share
...
Handle PSK-Only negotiation with key_share not being sent in Server Hello
2024-04-22 10:45:56 +10:00
Sean Parkinson
cfe645ca70
Merge pull request #7455 from kaleb-himes/SRTCP-48bit-indices
...
Srtcp 48bit indices
2024-04-22 10:43:07 +10:00
Sean Parkinson
eeadb2a7f3
Merge pull request #7457 from douzzer/20240420-wc_linuxkm_fpu_state_assoc-fixups
...
20240420-wc_linuxkm_fpu_state_assoc-fixups
2024-04-22 10:39:55 +10:00
Daniel Pouzzner
0a4eb1fbc7
linuxkm/linuxkm_memory.c: require kernel 5.4+ for AESNI/AVX, and add fixup code in wc_linuxkm_fpu_state_assoc_unlikely() to cope with migrations. in save_vector_registers_x86(), on kernel < 5.17, check test_thread_flag(TIF_NEED_FPU_LOAD) as a workaround for irq_fpu_usable() missing check for in_kernel_fpu.
2024-04-20 13:55:37 -05:00
Lealem Amedie
eafa425019
Engine doesn't need NO_OLD_RNG_NAME
2024-04-19 16:15:38 -06:00
JacobBarthelmeh
78670f5098
Merge pull request #7453 from douzzer/20240419-wolfSSL_CTX_SetTmpDH-double-free
...
20240419-wolfSSL_CTX_SetTmpDH-double-free
2024-04-19 13:48:37 -06:00
kaleb-himes
4b1edc78bb
Add test case
2024-04-19 13:16:19 -06:00
Lealem Amedie
acc6ff84d8
Move rng seed cb call to wolfcrypt_test
2024-04-19 12:36:20 -06:00
Lealem Amedie
9bc0e31a32
Fix for AES CTR on STM32
2024-04-19 12:35:33 -06:00
kaleb-himes
e835517633
SRTCP 32-bit indices default plus errata 48-bit indices
2024-04-19 12:31:08 -06:00
JacobBarthelmeh
69be7a7c54
Merge pull request #7431 from lealem47/aes_cfb
...
Fix for AES-CFB1 encrypt/decrypt on size (8*x-1) bits
2024-04-19 10:55:27 -06:00
JacobBarthelmeh
a63ff277ed
Merge pull request #7452 from douzzer/20240419-linuxkm-intelasm-expansion
...
20240419-linuxkm-intelasm-expansion
2024-04-19 10:46:11 -06:00
Daniel Pouzzner
39e2405e2f
src/ssl_load.c: fix double-free in wolfSSL_CTX_SetTmpDH().
2024-04-19 11:43:32 -05:00
JacobBarthelmeh
5f9ed54aaa
Merge pull request #7451 from SparkiDev/test_fixes_1
...
Fixes from configuration testing
2024-04-19 10:43:31 -06:00
JacobBarthelmeh
c7f852fbbd
Merge pull request #7450 from anhu/reneg_indic
...
check for conflicting secure renegotiation macros (settings.h)
2024-04-19 10:41:26 -06:00
JacobBarthelmeh
9242f611b2
Merge pull request #7449 from lealem47/nginx_stubs
...
Adding stubs required for latest nginx
2024-04-19 10:38:17 -06:00
Jon Shallow
7b22681287
Handle PSK-Only negotiation with key_share not being sent in Server Hello
...
The wrong cipher suite is potentially chosen if key_share is not seen by the client.
$ cat /tmp/test
Client_identitySHA256:0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
Server:
$ gnutls-serv --http --priority NORMAL:+ECDHE-PSK:+PSK:+ECDHE-ECDSA:+AES-128-CCM-8:+CTYPE-CLI-ALL:+CTYPE-SRV-ALL:+SHA256 --pskpasswd=/tmp/test
Client:
$ examples/client/client -vd -g -s -p 5556 2>&1| grep HTTP
2024-04-19 17:14:28 +01:00
Daniel Pouzzner
0264a518e1
wolfcrypt/src/ed25519.c: in ed25519_pairwise_consistency_test(), add casts to mollify -Wconversion.
2024-04-19 01:41:35 -05:00
Daniel Pouzzner
28480ec0ea
linuxkm/Kbuild: add SHA-2, SHA-3, ChaCha20, and poly1305, to kernel-safe vectorized-asm list.
2024-04-19 01:35:45 -05:00
Daniel Pouzzner
85f3fb9d07
Merge pull request #7409 from SparkiDev/asm_x64_rip_fix
...
SHA-256 x64 ASM - fix use of %rip
2024-04-19 02:33:47 -04:00
Sean Parkinson
d2b9a365f2
ChaCha20 and Poly1305 x64 ASM - fixu use of %rip
...
Get the address of the constants into a register at start instead of
calculating the address relative to the instruction pointer each time.
2024-04-19 09:59:54 +10:00
Sean Parkinson
97d560d9af
Fixes from configuration testing
...
asn1.c: Allow sample to build without coding (base64 decoding).
set_curves_list(): function for ECC, Ed25519, Ed448 but this block of
code is ECC only. Fixed #ifdef protection.
wolfSSL_CTX_set1_curves_list and wolfSSL_set1_curves_list also available
when Curve25519/Curve448 compiled in but not ECC.
2024-04-19 08:40:19 +10:00
Lealem Amedie
7a7af18887
Guard with OPENSSL_EXTRA instead of WOLFSSL_NGINX
2024-04-18 16:33:37 -06:00
Anthony Hu
85326da7fc
check for conflicting HAVE_RENEGOTIATION_INDICATION and HAVE_SECURE_RENEGOTIATION in settings.h
2024-04-18 17:51:33 -04:00
JacobBarthelmeh
fe671f72e1
Merge pull request #7435 from SparkiDev/ssl_misc_fixup
...
ssl_misc.c: wolfssl_file_len() protection
2024-04-18 14:36:38 -06:00
JacobBarthelmeh
ef153101b7
Merge pull request #7433 from SparkiDev/eddsa_fips_checks
...
EdDSA FIPS checks on public key
2024-04-18 14:34:31 -06:00
JacobBarthelmeh
9666e4d7e4
Merge pull request #7448 from douzzer/20240418-pq-hybrid-fixes
...
20240418-pq-hybrid-fixes
2024-04-18 14:31:27 -06:00
Daniel Pouzzner
e48f06bd53
fixes for WOLFSSL_DUAL_ALG_CERTS: "cannot take address of bit-field ‘altKeyType’" and "‘altPrivateKeyType’" in ProcessBufferTryDecode(), "‘heap’ undeclared" in ProcessBufferCertAltPublicKey(), "‘consumed’ undeclared" in ProcessFile(), "‘keySz’ undeclared" in wolfSSL_CTX_use_PrivateKey_Id().
2024-04-18 13:49:44 -05:00
Lealem Amedie
a1cf316630
Adding stubs required for latest nginx
2024-04-18 12:28:31 -06:00
Lealem Amedie
295033441c
Fix for AES-CFB1 encrypt/decrypt on size (8*x-1) bits
2024-04-18 11:31:28 -06:00
Naruto TAKAHASHI
38dc4f299c
add ENABLE_SCCACHE option
2024-04-19 00:40:57 +09:00
kaleb-himes
0bd5967093
Adjust FIPS version and default configuration
2024-04-18 08:41:05 -06:00
Sean Parkinson
08b42b7c93
Merge pull request #7443 from douzzer/20240418-fix-aes_xts_128_test-DEBUG_VECTOR_REGISTER_ACCESS
...
20240418-fix-aes_xts_128_test-DEBUG_VECTOR_REGISTER_ACCESS
2024-04-18 21:10:40 +10:00
Hideki Miyazaki
dab6726e58
fix tracking mem properties under multi-threads
2024-04-18 15:14:25 +09:00
Daniel Pouzzner
436efb0078
wolfcrypt/test/test.c: in aes_xts_128_test(), change DEBUG_VECTOR_REGISTER_ACCESS gates to DEBUG_VECTOR_REGISTER_ACCESS_AESXTS (currently unused), after refactor of AES-XTS C fallback in 9f55dba2f2. (per-call fallback is no longer supported for AES-XTS.)
2024-04-18 00:59:03 -05:00
JacobBarthelmeh
41f31f4635
Merge pull request #7440 from douzzer/20240417-fix-LoadSystemCaCertsWindows
...
20240417-fix-LoadSystemCaCertsWindows
2024-04-17 15:47:48 -06:00
JacobBarthelmeh
58167a2ebb
Merge pull request #7434 from douzzer/20240416-fips-v6-fixes
...
20240416-fips-v6-fixes
2024-04-17 13:52:35 -06:00
Daniel Pouzzner
6e3a9d5447
src/ssl_load.c: in LoadSystemCaCertsWindows(), fix flub introduced in 8e9810e87e.
2024-04-17 13:24:26 -05:00
JacobBarthelmeh
c2e60d523f
fix for WOLFSSL_NO_PEM build
2024-04-17 11:16:18 -06:00
Sean Parkinson
593cb77e51
ssl_misc.c: wolfssl_file_len() protection
...
wolfssl_file_len is now used by wolfssl_read_file_static() which is
compiled in with less restrictions.
Fix #ifdef protection.
2024-04-17 22:44:13 +10:00
John Bland
804cf1c3b7
re-add function to new file
2024-04-17 04:04:00 -04:00
John Bland
b184cdf7b5
add underscore to make it more consistient and readable
2024-04-17 03:56:07 -04:00
John Bland
c1dbbcc81e
add wolfSSLSessionIsSetup so the user can check if
...
a session ticket has been sent by the server
2024-04-17 03:54:51 -04:00
Sean Parkinson
c590fe514f
EdDSA FIPS checks on public key
...
Check that the Ed25519 and Ed448 public key is valid even without
private key.
Perform pairwise consistency test, only in FIPS, when making a key i
Ed25519 and Ed448.
2024-04-17 17:50:33 +10:00
Daniel Pouzzner
3df11e7eab
fixes for cppcheck uninitvar src/pk.c (false positives) and nullPointerRedundantCheck in src/ssl_load.c (true positive).
2024-04-17 01:00:41 -05:00
Daniel Pouzzner
fac834c80a
configure.ac: in setup for enable-all and enable-all-crypto with enable-32bit, fix inconsistency whereby SHAKE was enabled but SHA512 and SHA3 weren't; remove unneeded+unwanted ENABLED_32BIT conditional force-off of SHA512, SHA384, SHA3, ED25519 (harmonizes with FIPS v6).
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
d0edb3d0a9
scripts/aria-cmake-build-test.sh: fix masked exit value.
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
855175da47
wolfcrypt/src/fe_448.c: fix several out-of-order declarations in fe448_mul_8().
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
9f55dba2f2
wolfcrypt/src/aes.c: in AES-XTS AESNI, use cautious strategy as in AESGCM_STREAM for SAVE_VECTOR_REGISTERS, due to random failures seen with DEBUG_VECTOR_REGISTER_ACCESS_FUZZING using the old per-call fallback strategy.
2024-04-17 00:43:41 -05:00
Daniel Pouzzner
b2f594e84b
fixes for --enable-32bit CFLAGS=-m32 --enable-fips=v6 (fixes "#error ED448 requires SHAKE256").
2024-04-17 00:43:41 -05:00
JacobBarthelmeh
03ed52bd81
Merge pull request #7297 from SparkiDev/ssl_move_5
...
ssl.c: Move functions out to separate files
2024-04-16 17:56:55 -06:00
JacobBarthelmeh
1f61ed3536
Merge pull request #7397 from dalybrown/expose-dtsl-in-ada
...
Expose DTLS in Ada wrapper and update examples
2024-04-16 13:37:23 -06:00
András Fekete
73a85af9b9
Merge pull request #7429 from julek-wolfssl/hostap-cert-update
...
Update hostap certs ref
2024-04-16 12:43:28 -04:00
Juliusz Sosinowicz
52a593c883
Update hostap certs ref
2024-04-16 17:53:29 +02:00
Sean Parkinson
8e9810e87e
ssl.c: Move functions out to separate files
...
Moved E[CD][25519||448] APIs to pk.c
Move public key PEM APIs to pk.c.
Move wolfSSL loading and using of private keys and certificates to
ssl_load.c
Move PKCS#7 and PKCS#12 APIs to ssl_p7p12.c.
Move session and session cache APIs to ssl_sess.c.
Other minor fixes.
2024-04-16 10:30:59 +10:00
JacobBarthelmeh
9b92aea245
Merge pull request #7422 from douzzer/20240412-fips-v5-v6-linuxkm-fixes
...
20240412-fips-v5-v6-linuxkm-fixes
2024-04-15 17:32:53 -06:00
Daniel Pouzzner
281c2a431e
wolfcrypt/test/test.c: fix return code in pbkdf2_test(), add DEBUG_WOLFSSL gates on keysize report in ecc_test_curve(), and add missing PRIVATE_KEY_UNLOCK()s in cryptocb_test() for fips-dev coverage.
2024-04-15 14:11:21 -05:00
Daniel Pouzzner
6e0a90190f
fixes for v5 and v6+ FIPS builds, including linuxkm v6+ builds.
2024-04-15 14:11:21 -05:00
JacobBarthelmeh
be74cb7d94
Merge pull request #7419 from anhu/winpq
...
Add PQ Files for windows.
2024-04-15 10:21:47 -06:00
JacobBarthelmeh
1cb34a8bed
Merge pull request #7411 from douzzer/20240410-lock-free-wc_linuxkm_fpu_state_assoc
...
20240410-lock-free-wc_linuxkm_fpu_state_assoc
2024-04-15 10:20:39 -06:00
JacobBarthelmeh
3742c4dd57
Merge pull request #7413 from gojimmypi/PR-PlatformIO-FreeRTOS
...
Modify PlatformIO FreeRTOS include path, settings.h
2024-04-12 14:32:55 -06:00
JacobBarthelmeh
3113e6c855
Merge pull request #7393 from philljj/xmss_w64_settings
...
Adjust wc_xmss and wc_lms settings to support wolfboot.
2024-04-12 14:14:50 -06:00
JacobBarthelmeh
7d0ce39408
Merge pull request #7396 from miyazakh/renesas_rx72n
...
fix rx72n compile failure
2024-04-12 14:03:45 -06:00
JacobBarthelmeh
77bbb35830
Merge pull request #7415 from bandi13/addDockerCrossCompilerDependency
...
Add yet another cross compiling tool
2024-04-12 13:19:27 -06:00
Anthony Hu
85765b1a57
Add PQ Files for windows.
2024-04-12 15:05:29 -04:00
jordan
6ae99485a1
Additional changes to support wolfboot wc_lms.
2024-04-12 10:51:55 -05:00
Andras Fekete
5e85adee0f
Add yet another cross compiling tool
2024-04-11 23:14:16 -04:00
JacobBarthelmeh
8b656d5a5f
Merge pull request #7295 from kaleb-himes/SRTP-KDF-FS
...
SRTP-KDF FS Preview
2024-04-11 13:41:05 -06:00
kaleb-himes
73e5303718
Removed duplicate file from project
2024-04-11 12:16:21 -06:00
kaleb-himes
29a41d5ff9
Add new fips-ready dependencies to WIN10 project
2024-04-11 10:56:46 -06:00
gojimmypi
b1261f5471
Modify PlatformIO FreeRTOS include path, settings.h
2024-04-11 07:46:35 -07:00
Daniel Pouzzner
954005af9a
linuxkm/linuxkm_memory.c: refactor wc_linuxkm_fpu_state_assoc() as a lock-free O(1) mechanism with per-CPU rather than per-process state.
2024-04-11 00:06:28 -05:00
JacobBarthelmeh
ff09f418c0
Merge pull request #7408 from SparkiDev/asn_templ_rid
...
X.509 RID ASN template behaviour
2024-04-10 11:42:07 -06:00
kaleb-himes
264dcd4e15
Fix a file mode and more overlong lines
2024-04-10 10:18:49 -06:00
kaleb-himes
4a8443f0e4
Address new file item reported by Jenkins
2024-04-10 11:05:11 -04:00
Sean Parkinson
8b3fbe47e6
SHA-256 x64 ASM - fix use of %rip
...
Get the address of table K instead of using it directly each time a
value is required.
2024-04-10 15:02:19 +10:00
Sean Parkinson
36b47d1374
Merge pull request #7352 from JacobBarthelmeh/coverity4
...
Coverity Fixes
2024-04-10 10:46:54 +10:00
Sean Parkinson
b48b5c47f4
X.509 RID ASN template behaviour
...
Don't set the DNS entry for RID unless OPENSSL_ALL is defined to match
the behaviour of original ASN code.
2024-04-10 10:39:45 +10:00
kaleb-himes
2aae5eb0f5
Multi-test doesn't like over-long lines
2024-04-09 16:54:17 -06:00
kaleb-himes
55fc9c09e4
Set debugging off by default
2024-04-09 16:24:35 -06:00
kaleb-himes
455f1a6875
Addendum to windows support with OpenSSL Extra enabled
2024-04-09 16:19:48 -06:00
JacobBarthelmeh
a8415a7926
Merge pull request #7367 from mrdeep1/hello_verify_request
...
Support DTLS1.3 downgrade when using PSK
2024-04-09 16:17:59 -06:00
kaleb-himes
b8d31b042f
Windows support
2024-04-09 13:55:05 -06:00
kaleb-himes
71e83cdd19
Resolve armasm fips wrappers and sanity
2024-04-09 11:41:41 -06:00
kaleb-himes
0d83d0d199
Make wolfEntropy optional and bring settings.h in sync w/ master
2024-04-09 10:44:17 -06:00
kaleb-himes
e45867bbc3
WIN fips section refactor / wolfEntropy API syntax adjustment
2024-04-09 09:48:33 -06:00
kaleb-himes
a3413ad009
Address Jenkins caught item
2024-04-09 09:48:33 -06:00
kaleb-himes
ef2a636610
Expose additional features of opensslall in a compliant way
2024-04-09 09:48:33 -06:00
kaleb-himes
afeb3f5358
More peer feedback
2024-04-09 09:48:33 -06:00
kaleb-himes
d40700b93d
Fix offset (whitespace)
2024-04-09 09:48:33 -06:00
kaleb-himes
84e5ccece5
Implement peer review feedback
2024-04-09 09:48:33 -06:00
kaleb-himes
8485f88688
Bring fips-dev inline with fips-ready
2024-04-09 09:48:33 -06:00
kaleb-himes
2e63ae750d
Comments for SP800-38E TODO, wolfEntropy optional setup and remove forced errors api.c
2024-04-09 09:48:33 -06:00
kaleb-himes
8092104396
Address a flush-left in test.c and gt 80 column limit in settings.h
2024-04-09 09:48:33 -06:00
kaleb-himes
b7d88e0852
Cleanup duplicate forward dec logic with different macros
2024-04-09 09:48:33 -06:00
kaleb-himes
84f5b4e5bf
Touchup a few more edge cases caught by Jenkins
2024-04-09 09:48:33 -06:00
kaleb-himes
829d028d98
Add configure for wolfEngine with new module
2024-04-09 09:48:33 -06:00
kaleb-himes
4df091ae2a
Restore debug messages that were cluttering up logs
2024-04-09 09:48:33 -06:00
kaleb_himes
81f5ac7f6c
SRTP-KDF FS Preview
2024-04-09 09:48:33 -06:00
JacobBarthelmeh
dd79ca5d96
Merge pull request #7405 from SparkiDev/mismatch_cs_alert
...
No match cipher suite alert type change
2024-04-09 09:31:12 -06:00
JacobBarthelmeh
144ffdc713
Merge pull request #7400 from philljj/test_xmss_pubraw
...
Add wc_XmssKey_ExportPubRaw to wolfcrypt test.
2024-04-09 09:14:23 -06:00
jordan
4a069ee5c1
Small cleanup for review.
2024-04-08 21:41:33 -05:00
Daly Brown
707e60aa79
Address gnatprove issues in tls client
2024-04-08 19:40:06 -04:00
Sean Parkinson
d96e5ec589
No match cipher suite alert type change
...
TLS 1.0/1.1/1.2 specifications require the of a return a handshake
failure alert when no cipher suites match.
TLS 1.3 specification requires the return of a "handshake_failure" or
"insufficient_security" fatal alert.
Change alert sent from "illegal_parameter" to "handshake_failure".
2024-04-08 11:25:50 +10:00
Daniel Pouzzner
d1efccd259
Merge pull request #7381 from dgarske/netdb_ioctl
...
Restore `HAVE_NETDB_H` and `HAVE_SYS_IOCTL_H` checks in the wolfio.c.
2024-04-05 16:02:21 -04:00
Daniel Pouzzner
a518f493b5
Merge pull request #7388 from JacobBarthelmeh/x509_cases
...
check for critical policy extension when not supported
2024-04-05 15:59:03 -04:00
Daniel Pouzzner
7d66cc46ff
Merge pull request #7375 from mrdeep1/fix_rpk
...
RPK: Define Certificates correctly for (D)TLS1.2
2024-04-05 15:48:25 -04:00
Daniel Pouzzner
2ba12a89df
Merge pull request #7386 from anhu/reseed_public
...
Make wc_RNG_DRBG_Reseed() a wolfCrypt API.
2024-04-05 14:27:26 -04:00
Anthony Hu
cf2f58bfdf
Merge pull request #7395 from douzzer/20240403-RPK-cleanups
...
20240403-RPK-cleanups
2024-04-05 13:43:15 -04:00
Anthony Hu
3908bc34ed
Merge pull request #7399 from douzzer/20240405-tls-endian-fixes
...
20240405-tls-endian-fixes
2024-04-05 13:40:07 -04:00
jordan
d0802335a8
Add wc_XmssKey_ExportPubRaw to wolfcrypt test.
2024-04-05 12:09:04 -05:00
Daly Brown
97e731f27b
Address gnatprove warnings and errors
2024-04-05 12:09:11 -04:00
Daniel Pouzzner
cdf2504612
fixes for non-portable (endian-sensitive) code patterns around word16 in TLS layer.
2024-04-05 10:42:05 -05:00
Kaleb Himes
9d56484d33
Merge pull request #7398 from douzzer/20240404-fips-VERSION3
...
20240404-fips-VERSION3
2024-04-05 07:53:32 -06:00
gojimmypi
5cab707d8e
Update Espressif Examples and Libraries
2024-04-04 20:40:52 -07:00
Daniel Pouzzner
9542843874
wolfssl/wolfcrypt/settings.h: streamline definitions of WOLFSSL_FIPS_VERSION_CODE for the !HAVE_FIPS and !HAVE_FIPS_VERSION cases; add WOLFSSL_FIPS_VERSION2_CODE and fix the incumbent FIPS_VERSION_{LT,LE,EQ,GE,GT} definitions to use it.
2024-04-04 22:27:51 -05:00
kaleb-himes
ae2a92e449
add "VERSION3" variants of macros for testing and computing FIPS versions.
2024-04-04 17:39:07 -05:00
Daly Brown
42f7be20c8
Fix assertion that address length must be greater than zero
2024-04-04 16:19:44 -04:00
Daly Brown
63547d954a
Fix formatting issues and remove unused variable
2024-04-04 16:06:19 -04:00
Daly Brown
be72849d48
Expose DTLS in Ada wrapper and update examples
2024-04-04 15:52:14 -04:00
Hideki Miyazaki
6c029badcc
fix rx72n compile
2024-04-04 15:40:15 +09:00
Daniel Pouzzner
747755b3c4
fixes for analyzer carps around HAVE_RPK:
...
fix clang-analyzer-deadcode.DeadStores in src/tls.c TLSX_ClientCertificateType_GetSize();
fix clang-analyzer-deadcode.DeadStores in tests/api.c test_tls13_rpk_handshake();
fix null pointer to XMEMCPY() in src/internal.c CopyDecodedName().
2024-04-04 00:15:01 -05:00
jordan
0c22f1f048
wc_xmss_impl requires misc.c functions.
2024-04-03 14:52:05 -05:00
JacobBarthelmeh
8b587b563c
Merge pull request #7286 from Frauschi/hybrid_signatures
...
Improvements to dual algorithm certificates
2024-04-03 13:37:16 -06:00
Daniel Pouzzner
8511b2dc6b
ProcessBuffer(): in WOLFSSL_DUAL_ALG_CERTS code path, fall through without disrupting ret, if cert->sapkiOID and cert->sapkiLen are unset.
2024-04-03 13:54:57 -05:00
jordan
79abae8c3d
Only require WOLFSSL_W64_WRAPPER if WOLFSSL_XMSS_MAX_HEIGHT greater than 32.
2024-04-03 12:16:03 -05:00
David Garske
57603823e3
Merge pull request #7387 from JacobBarthelmeh/sm2
...
fix for oss-fuzz sm2 test build
2024-04-03 10:08:46 -07:00
JacobBarthelmeh
f6a24efe23
Merge pull request #7389 from dgarske/nxp_mmcau_sha256
...
Fix the NXP MMCAU HW acceleration for SHA2-256
2024-04-03 10:39:04 -06:00
Anthony Hu
9bfab33726
Address comments from Jacob.
2024-04-03 09:04:28 -04:00
David Garske
d7c6d7af44
Fix the NXP MMCAU HW acceleration for SHA2-256. Broken with LMS SHA2 refactor.
2024-04-02 19:32:41 -07:00
JacobBarthelmeh
c768f76d5a
Merge pull request #7315 from fabiankeil/disable-3des-ciphers
...
Allow to enable DES3 support without the DES3 ciphers
2024-04-02 17:48:01 -06:00
JacobBarthelmeh
75da69911c
Merge pull request #7369 from dgarske/infineon_modustoolbox
...
Support for Infineon Modus Toolbox with wolfSSL
2024-04-02 17:34:07 -06:00
JacobBarthelmeh
983616afa0
check for critical policy extension when not supported
2024-04-02 16:46:47 -06:00
JacobBarthelmeh
04ebc966d0
Merge pull request #7385 from philljj/spelling_cleanup
...
Used codespell and fixed obvious typos.
2024-04-02 14:35:51 -06:00
JacobBarthelmeh
d4f5825fd2
fix for sp build with ecc_map_ex
2024-04-02 11:40:53 -06:00
JacobBarthelmeh
ed4f052215
Merge pull request #7382 from bandi13/reEnableTest
...
Revert "Disable broken library"
2024-04-02 10:51:50 -06:00
JacobBarthelmeh
b334750bf2
Merge pull request #7383 from embhorn/zd17763
...
Fix build error with RECORD_SIZE defined
2024-04-02 10:51:11 -06:00
Anthony Hu
598a3bfdcd
Make wc_RNG_DRBG_Reseed() a wolfCrypt API.
2024-04-02 12:33:35 -04:00
jordan
b65e42bf4d
Used codespell and fixed obvious typos.
2024-04-02 10:19:39 -05:00
Eric Blankenhorn
e072677379
Fix build error with RECORD_SIZE defined
2024-04-02 10:02:35 -05:00
Fabian Keil
790129ee71
cmake: Add WOLFSSL_DES3_TLS_SUITES option
2024-04-02 16:27:11 +02:00
Daniel Pouzzner
092dba4593
wolfcrypt/src/asn.c: fix for benign identicalInnerCondition in ParseCertRelative().
2024-04-01 23:50:05 -05:00
Anthony Hu
10d210ce26
Parenthesis
2024-04-01 19:05:59 -04:00
Anthony Hu
2d532dd6b8
Clean up after another round of analyzer execution.
2024-04-01 18:56:44 -04:00
Andras Fekete
6524fbb43f
Revert "Disable broken library"
...
This reverts commit ce52a68c3d .
2024-04-01 18:11:42 -04:00
Anthony Hu
3a3a7c2a67
Forgot to clean up the preTBS.
2024-04-01 17:37:04 -04:00
Anthony Hu
6a4d4bf6f1
cks_order is used later; don't let it fall out of scope.
2024-04-01 17:37:03 -04:00
Anthony Hu
8f599defe0
Add check inspired by original implementation of asn.
2024-04-01 17:37:03 -04:00
Daniel Pouzzner
2f3495f286
src/tls13.c: remove unreachable break in DoTls13CertificateVerify().
...
tests/api.c: fix various use-after-frees of file in do_dual_alg_root_certgen() and do_dual_alg_server_certgen().
2024-04-01 17:37:03 -04:00
Anthony Hu
e4b7857e43
If WOLFSSL_TRUST_PEER_CERT is defined, the negative test is no longer negative.
2024-04-01 17:37:03 -04:00
Tobias Frauenschläger
136eaae4f1
Improvements to dual alg certificates
...
* Support for external keys (CryptoCb interface)
* Support for usage in mutual authentication
* better entity cert parsing
* Fix for Zephyr port to support the feature
* Check key support
* Proper validation of signatures in certificate chains
* Proper validation of peer cert with local issuer signature
(alt pub key is cached now)
* Support for ECC & RSA as alt keys with PQC as primary
* Support for PQC certificate generation
* Better support for hybrid signatures with variable length signatures
* Support for primary and alternative private keys in a single
file/buffer
* More API support for alternative private keys
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2024-04-01 17:37:03 -04:00
David Garske
da6a11d1d1
Restore HAVE_NETDB_H and HAVE_SYS_IOCTL_H checks in the wolfio.c.
2024-04-01 09:49:22 -07:00
oltolm
78b8ea3646
make "yes;no" cmake options boolean instead of string
2024-04-01 16:20:11 +02:00
Daniel Pouzzner
d930825a92
Merge pull request #7362 from jpbland1/rsa-make-key-no-malloc
...
fix wc_MakeRsaKey and wc_RsaKeyToDer to work with WOLFSSL_NO_MALLOC
2024-03-30 03:19:27 -04:00
John Bland
d8e9e90f9d
refactor rawLen to avoid unused warning
2024-03-30 02:12:32 -04:00
Daniel Pouzzner
03d7eac9c4
Merge pull request #7337 from gojimmypi/PR-test-certbuf-256
...
wolfcrypt tests: improve file system gating for USE_CERT_BUFFERS
2024-03-30 00:43:20 -04:00
David Garske
5c486cb7a6
Merge pull request #7371 from douzzer/20240327-tls-int-overflows
...
20240327-tls-int-overflows
2024-03-29 11:37:08 -07:00
Jon Shallow
a0f3933881
Support (D)TLS1.3 downgrade when using PSK
...
DTLS Server:
examples/server/server -v3 -u -s
DTLS Client:
examples/client/client -vd -g -u -s
TLS Server:
examples/server/server -v3 -s
TLS Client:
examples/client/client -vd -g -s
Support checking for DTLS1.2 Hello Verify Request when using PSK.
Unset options.tls1_3 when handling a DTLS1.2 Hello Verify Request.
Unset options.tls1_3 when handling a (D)TLS1.2 Server Hello to stop
checking of Encrypted Client Hello
Requires ./configure --enable-all --enable-dtls13
Add in tests for DTLS1.3 and TLS1.3 downgrade when using PSK.
2024-03-29 18:04:30 +00:00
Daniel Pouzzner
038be95a4a
wolfssl/wolfcrypt/types.h: add WC_SAFE_SUM_WORD32().
...
src/internal.c: mitigations for potential integer overflows in figuring allocation sizes.
2024-03-29 11:45:11 -05:00
Daniel Pouzzner
3f3dd4743a
Merge pull request #7365 from rizlik/ecc_cmp_param_cleanup
...
wc_ecc_cmp_param cleanup
2024-03-29 01:48:46 -04:00
Daniel Pouzzner
1caed2139b
Merge pull request #7374 from gojimmypi/PR-Kyber-Init
...
Initialize some Kyber client variables
2024-03-29 01:44:56 -04:00
Daniel Pouzzner
7e8c0156fe
Merge pull request #7325 from dgarske/zephyr
...
Improve Zephyr support
2024-03-29 00:57:55 -04:00
András Fekete
5b3772c5d2
Merge pull request #7377 from douzzer/20240328-multi-test-fixes
...
20240328-multi-test-fixes
2024-03-28 16:58:30 -04:00
David Garske
83dc3dfac1
Add support for the Infineon/Cypress HAL TRNG.
2024-03-28 13:57:26 -07:00
Daniel Pouzzner
58462840c1
src/ssl.c: add missing cast in wolfSSL_GetSessionFromCache().
2024-03-28 15:14:19 -05:00
Jon Shallow
f2e6f49721
RPK: Define Certificates correctly for (D)TLS1.2
...
As per https://datatracker.ietf.org/doc/html/rfc7250#section-3 Figure 1,
the RPK is a single ASN.1_subjectPublicKeyInfo, whereas X509 certificates
etc. are transmitted as a certificate list (even if there is only 1).
This is for (D)TLS1.2 transfers, and this PR fixes this.
As per https://datatracker.ietf.org/doc/html/rfc8446#section-4.4.2 all
certificates (both RPK and Z509) are transferred using a certificate list.
Update examples client to support RPK certificates.
For testing:-
Server:
$ gnutls-serv --http --x509fmtder --priority NORMAL:+CTYPE-CLI-RAWPK:+CTYPE-SRV-RAWPK --rawpkfile certs/server-keyPub.der --rawpkkeyfile certs/server-key.der
Client:
$ examples/client/client -g -p 5556 -c certs/client-keyPub.der -k certs/client-key.der --rpk --files-are-der
2024-03-28 17:58:02 +00:00
John Bland
7c0423eb65
reduce der buffer size
2024-03-28 12:56:26 -04:00
Daniel Pouzzner
7a283edd68
Merge pull request #7373 from bandi13/FixMultiTestWarning
...
Fix sanitizer complaint in multi-test script
2024-03-28 12:35:45 -04:00
gojimmypi
5bffbdb20c
Initialize some Kyber client variables
2024-03-28 09:14:53 -07:00
Andras Fekete
4cb176ffff
Fix sanitizer complaint
2024-03-28 11:44:12 -04:00
John Bland
6cc32e90b0
trim down buffer size
2024-03-28 03:01:46 -04:00
John Bland
254eb23443
add missing make call
2024-03-28 02:56:08 -04:00
John Bland
04db5baaa1
test wolfcrypt only
2024-03-28 02:56:08 -04:00
John Bland
6272465c44
use only one matrix index
2024-03-28 02:56:08 -04:00
John Bland
f63501f035
fix bad CFLAGS
2024-03-28 02:56:08 -04:00
John Bland
30189e5766
add autogen.sh to workflow
2024-03-28 02:56:08 -04:00
John Bland
71e52487bf
add no malloc to main workflows file
2024-03-28 02:55:31 -04:00
John Bland
76ac4fa7e3
add github workflow to test no malloc
2024-03-28 02:54:49 -04:00
John Bland
9cd614fcac
update rsa test to support no malloc
2024-03-28 02:54:49 -04:00
John Bland
4f51183b45
fix bad indenting
2024-03-28 02:54:49 -04:00
John Bland
305f87561d
break out of loop on failure instead of return
2024-03-28 02:54:49 -04:00
John Bland
fb784a2ac9
more changes from PR comments
2024-03-28 02:54:49 -04:00
John Bland
0bd8775eae
update based on PR comments
2024-03-28 02:54:49 -04:00
John Bland
d9d3f9a4f4
fix wc_MakeRsaKey and wc_RsaKeyToDer to work with
...
WOLFSSL_NO_MALLOC
2024-03-28 02:54:49 -04:00
Daniel Pouzzner
716870cbc2
Merge pull request #7370 from anhu/quickie
...
sizeof(oriType) ---> sizeof(asnDataOid)
2024-03-28 01:58:01 -04:00
Daniel Pouzzner
42a0cb23ac
Merge pull request #7364 from gojimmypi/PR-Kyber-Init
...
Initialize some Kyber variables
2024-03-28 00:13:43 -04:00
Daniel Pouzzner
2f17b756b2
Merge pull request #7360 from rizlik/curl-ticket-nonce-malloc
...
configure.ac: enable ticket_nonce_malloc when using enable-curl
2024-03-27 23:58:21 -04:00
Daniel Pouzzner
98c912c3a0
Merge pull request #7359 from SparkiDev/asn1_test_bad_certs
...
ASN.1 testing: add tests of bad DER encodings
2024-03-27 23:55:57 -04:00
Daniel Pouzzner
0f6670a437
Merge pull request #7357 from kareem-wolfssl/gh7349
...
Fix potential division by zero in example server.
2024-03-27 23:52:55 -04:00
Daniel Pouzzner
ad74fb79ac
Merge pull request #7354 from JacobBarthelmeh/ocsp-test
...
add ocsp test
2024-03-27 23:50:49 -04:00
Daniel Pouzzner
e8e3e9db43
Merge pull request #7285 from anhu/noMagic274
...
Get rid of magic number to size structs.
2024-03-27 23:43:28 -04:00
Daniel Pouzzner
f9b26d8c06
Merge pull request #7358 from bandi13/buildNewYoctoContainer
...
Build new yocto container
2024-03-27 23:41:46 -04:00
Daniel Pouzzner
708fd6003f
Merge pull request #7320 from bandi13/addExtraToolsToDocker
...
More application dependencies
2024-03-27 23:39:41 -04:00
David Garske
2d7f9d1874
Support for Infineon Modus Toolbox with wolfSSL.
2024-03-27 15:37:50 -07:00
Anthony Hu
28a88d1c7c
sizeof(oriType) ---> sizeof(asnDataOid)
2024-03-27 17:05:25 -04:00
Marco Oliverio
0a03940f5a
wolfcrypt: wc_ecc_cmp_param: check string len before strncmp
...
also return -1 on param mismatch.
2024-03-26 14:59:41 +01:00
gojimmypi
01ae240fe8
Initialize some Kyber variables
2024-03-25 14:08:47 -07:00
Andras Fekete
22766578fc
Add in powerpc cross compilation tools
2024-03-25 15:39:59 -04:00
gojimmypi
bf9775831f
Improve wolfcrypt test NO_FILESYSTEM checks
2024-03-22 13:00:25 -07:00
Marco Oliverio
91ab6cafe0
configure.ac: enable ticket_nonce_malloc when using enable-curl
...
To support new session ticket nonce longer than MAX_TICKET_NONCE_STATIC_SZ. If
`--disable-ticket-nonce-malloc` is explicitly specified, the feature is not
enabled even if `--enable-curl` is specified.
2024-03-22 11:46:22 +01:00
Sean Parkinson
d4b1995a2c
ASN.1 testing: add tests of bad DER encodings
...
Certificates with bad DER encoded ASN.1 added to testing.
Fix comment in asn.c.
2024-03-22 08:51:17 +10:00
Andras Fekete
0abb381497
Use official repo to build
2024-03-21 16:31:48 -04:00
Kareem
d867405ffb
Fix floating point comparison.
2024-03-20 16:03:43 -07:00
Kareem
4d4f4e3f30
Fix potential division by zero in example server.
2024-03-20 15:48:46 -07:00
David Garske
8970ff4c34
Merge pull request #7355 from JacobBarthelmeh/release
...
prepare for release 5.7.0
2024-03-20 14:39:57 -07:00
JacobBarthelmeh
85601311a2
rework library versioning
2024-03-21 04:02:28 +07:00
David Garske
b8bebd6196
Fixes for ARM/Intel ASM support.
2024-03-20 13:14:05 -07:00
JacobBarthelmeh
e20ddc35b0
update version for CMake
2024-03-21 03:05:34 +07:00
JacobBarthelmeh
e80deece82
adjust ChangeLog text
2024-03-21 00:18:44 +07:00
JacobBarthelmeh
e5914effab
prepare for release 5.7.0
2024-03-20 19:32:22 +07:00
JacobBarthelmeh
5884f75cbe
add ocsp test
2024-03-20 03:01:43 +07:00
JacobBarthelmeh
3129e29a19
Merge pull request #7353 from ejohnstown/ocsp-ext
...
OCSP Extension Encoding Fix
2024-03-20 03:00:27 +07:00
John Safranek
6462986bf2
OCSP Extension Encoding Fix
...
1. Removed redundant check for the output being NULL in
`EncodeOcspRequestExtensions()`. The chuck of code being protected
only cared about the value of ret, not the pointer. The code was
supposed to calculate the size of the data without writing it.
2024-03-19 09:13:28 -07:00
Andras Fekete
5e45bb4d25
Using PR version
2024-03-19 11:53:03 -04:00
David Garske
face8b6e43
Experimental support for Intel and ARM ASM with Zephyr. Related to issue #7116 .
2024-03-18 13:40:10 -07:00
Andras Fekete
9bddddb952
First test build on 2024-03-06
2024-03-18 16:32:24 -04:00
JacobBarthelmeh
489a79ad8b
CID 347893 set test cert manager to null after free
2024-03-19 02:59:06 +07:00
JacobBarthelmeh
228544c31e
CID 327280 use after free in test case
2024-03-19 02:44:45 +07:00
JacobBarthelmeh
1926e045f3
Merge pull request #7351 from douzzer/20240318-linuxkm-lkcapi-register-yes
...
20240318-linuxkm-lkcapi-register-yes
2024-03-19 02:33:12 +07:00
David Garske
790e39ec03
Merge pull request #7350 from JacobBarthelmeh/scan_build_fix
...
scan-build fixes for pkcs7
2024-03-18 12:31:00 -07:00
Daniel Pouzzner
a14edf3614
configure.ac: for --enable-linuxkm-lkcapi-register, remap "yes" to "all"; in output config summary, add ENABLED_LINUXKM_LKCAPI_REGISTER, and move ENABLED_EXPERIMENTAL and ENABLED_LINUXKM_BENCHMARKS to the "Features" section.
2024-03-18 13:52:06 -05:00
JacobBarthelmeh
d51bef3d43
fix for memory leak on error
2024-03-19 00:58:32 +07:00
JacobBarthelmeh
b9619c3f0b
Merge pull request #7343 from douzzer/20240315-pq-experimental
...
20240315-pq-experimental
2024-03-19 00:54:56 +07:00
David Garske
50b1044c2f
Merge pull request #7347 from JacobBarthelmeh/coverity2
...
Coverity Fixes QUIC
2024-03-18 09:04:09 -07:00
JacobBarthelmeh
4751af9b89
scan-build fixes for pkcs7
2024-03-18 22:55:51 +07:00
Andras Fekete
42091b8970
Normally these tests take 3 minutes, but sometimes they take much longer
2024-03-18 11:22:03 -04:00
Andras Fekete
74d7696e69
More application dependencies
2024-03-18 11:21:24 -04:00
David Garske
ffb43d0150
Merge pull request #7348 from JacobBarthelmeh/coverity3
...
Coverity fixes
2024-03-18 08:20:31 -07:00
David Garske
69bc5c1c19
Merge pull request #7345 from JacobBarthelmeh/coverity
...
Coverity fixes
2024-03-18 08:15:59 -07:00
David Garske
03e306a98f
Add include for project for cases when a custom user_settings.h file is used. Tested support with PSA.
2024-03-18 08:14:40 -07:00
David Garske
85c22abe4e
Fix for Zephyr TimeNowInMilliseconds. Resolves issue with TLS v1.3 server and session tickets time (uptime in sim < 1000 ms was being made 0).
2024-03-18 08:14:40 -07:00
David Garske
737fa53636
Improve Zephyr support. Cleanup user_settings.h mess. Add FIPS support.
2024-03-18 08:14:40 -07:00
JacobBarthelmeh
dd6db025e3
add parenthesis around define value
2024-03-18 21:13:42 +07:00
JacobBarthelmeh
36e67af0f8
Merge pull request #7331 from SparkiDev/asn1_templ_issuer_cn
...
ASN.1 template: store issuer common name
2024-03-18 20:27:04 +07:00
JacobBarthelmeh
d6b4b27cd1
CID 299893 out of bounds read with XMEMCMP
2024-03-18 16:42:15 +07:00
JacobBarthelmeh
44f3e4a3b7
CID 337219 allocation using untrusted size
2024-03-18 16:04:37 +07:00
JacobBarthelmeh
635d326812
CID 337232 sanity check on tainted scalar
2024-03-18 15:03:04 +07:00
JacobBarthelmeh
be233fc805
Merge pull request #7346 from SparkiDev/regression_fixes_11
...
Regression test fixes
2024-03-18 14:29:44 +07:00
Sean Parkinson
638d0b1a9f
Regression test fixes
...
pkcs7.c: pkcs7->stream must be restored or there will be a leak.
test.c: when compiled for compression, compiler warning about const
2024-03-18 09:57:22 +10:00
Sean Parkinson
84c42f4a4e
ASN.1 template: store issuer common name
...
Under certain configurations the certificate issuer's common name is
kept in a DecodedCert. Wasn't implemented in ASN.1 template code.
2024-03-18 07:06:32 +10:00
JacobBarthelmeh
763c4a074c
CID 315823 truncate on cast
2024-03-17 23:54:56 +07:00
JacobBarthelmeh
d71776aced
coverity CID 352930, fix for out of bounds write
2024-03-17 23:31:37 +07:00
David Garske
abd7449f27
Merge pull request #7340 from JacobBarthelmeh/github_tests
...
workaround for Ubuntu runner, high entropy + ASLR
2024-03-17 08:56:50 -07:00
JacobBarthelmeh
5106cb16e2
workaround for llvm version and ASLR issue
2024-03-17 22:22:16 +07:00
David Garske
99dd8a333d
Merge pull request #7342 from JacobBarthelmeh/testing1
...
revert null check in wc_Sha256Update
2024-03-15 14:24:45 -07:00
Daniel Pouzzner
924887b468
configure.ac and wolfssl/wolfcrypt/settings.h: implement --enable-experimental and add a WOLFSSL_EXPERIMENTAL_SETTINGS gate, and refactor "EXPERIMENTAL" features (all pq) to note and enforce requirement for --enable-experimental and WOLFSSL_EXPERIMENTAL_SETTINGS.
2024-03-15 16:15:26 -05:00
Daniel Pouzzner
3728cd3dc5
Kyber fixes:
...
wolfssl/wolfcrypt/wc_kyber.h: in definition of struct KyberKey, use correct type for devId;
wolfcrypt/src/wc_kyber_poly.c: numerous fixes for bugprone-macro-parentheses and readability-inconsistent-declaration-parameter-name;
tests/api.c: in test_tls13_apis(), add missing defined(HAVE_LIBOQS) gate on inclusion of ":P256_KYBER_LEVEL1" in groupList.
2024-03-15 16:06:32 -05:00
JacobBarthelmeh
5a5648a6ac
Merge pull request #7341 from dgarske/psk_openssl
...
Fix for PSK callback with OPENSSL_EXTRA to correctly handle the 0 length
2024-03-16 02:22:24 +07:00
JacobBarthelmeh
ab8f5f71a0
revert null check in wc_Sha256Update
2024-03-16 02:03:07 +07:00
JacobBarthelmeh
2f43cc1c7b
Merge pull request #7332 from SparkiDev/asn_templ_neg_int_check
...
ASN.1 parsing: check for badly encode negative INTEGER
2024-03-15 22:40:55 +07:00
David Garske
8d1714a307
Fix for PSK callback with OPENSSL_EXTRA to correctly handle the 0 length case. Thank you @miyazakh. Broken in #7302
2024-03-15 08:09:59 -07:00
JacobBarthelmeh
81c5cf794c
Merge pull request #7339 from SparkiDev/regression_fixes_10
...
Regression testing fixes
2024-03-15 19:29:26 +07:00
Sean Parkinson
d1b16f2c7b
Regression testing fixes
...
api.c: z and ret no longer only when !NO_ASN_TIME.
benchmark.c: rsaKey array type has changed and unusual code path needsed
updating.
cmac.c: Zeroization test failed when checkSz was zero as called function
didn't zero out cmac. checkSz is invalid.
test.c: rsaCaCertDerFile used even when NO_ASN_TIME.
test.h: --enable-sp-math only supports DH of 2048 bits and above. Change
default DH parameters to be 2048 bits.
2024-03-15 13:24:40 +10:00
Sean Parkinson
8684caa304
Merge pull request #7336 from douzzer/20240314-fix-armasm-sha256
...
20240314 -- fix -Wconversions in asn.c
2024-03-15 10:37:14 +10:00
Daniel Pouzzner
e3fc43c3d6
Merge pull request #7338 from SparkiDev/sha256_armv8_transform
...
SHA256 ARMv8: fix wc_Sha256Transform
2024-03-14 19:48:38 -04:00
Daniel Pouzzner
25efe6b66a
wolfcrypt/src/asn.c: fix -Wconversions in GetASN_BitString(), GetASN_UTF8String(), and GetASN_ObjectId().
2024-03-14 18:42:50 -05:00
Sean Parkinson
a0befd396f
SHA256 ARMv8: fix wc_Sha256Transform
...
wc_Sha256Transform() was passing in data to underlying transform
function even though byte reversed data was in sha256->buffer.
2024-03-15 09:27:15 +10:00
David Garske
b7b6752e2e
Merge pull request #7333 from gojimmypi/PR-tfm-mp_sqr
...
Enable TFM mp_sqr even when HAVE_ECC disabled
2024-03-14 12:45:09 -07:00
David Garske
36eec68571
Cleanup DES3 TLS descriptions and macro names.
2024-03-14 10:34:38 -07:00
David Garske
5dff8aa417
Merge pull request #7334 from SparkiDev/macosx_clang_15_asm_fix
...
MacOS X Intel ASM clang 15: fix asm to compile without warning
2024-03-14 10:10:42 -07:00
David Garske
8fd8548142
Merge pull request #7318 from SparkiDev/kyber_1
...
Kyber: Implementation in wolfSSL
2024-03-14 09:57:52 -07:00
JacobBarthelmeh
88370d8c3e
Merge pull request #7277 from embhorn/readme_folders
...
Add directory layout to readme.
2024-03-14 19:09:12 +07:00
Daniel Pouzzner
3fd6af0cd2
Merge pull request #7283 from SparkiDev/lms
...
LMS: initial implementation
2024-03-14 01:48:57 -04:00
Sean Parkinson
3ba5dd3e6d
MacOS X Intel ASM clang 15: fix asm to compile without warning
...
Don't use align when __APPLE__ is defined.
Make minimum alignment on variables in ASM 8 bytes (.p2align 3).
Fix x86 builds with ASM.
2024-03-14 11:42:12 +10:00
gojimmypi
bebfb120d7
Enable TFM mp_sqr even when HAVE_ECC disabled
2024-03-13 16:36:30 -07:00
Sean Parkinson
25b2c664f4
Kyber: Implementation in wolfSSL
...
Put Kyber implementation into wolfSSL.
2024-03-14 09:14:50 +10:00
Sean Parkinson
40681226aa
ASN.1 parsing: check for badly encode negative INTEGER
...
When encoding a negative number, when the first byte is 0xff then the
next byte can't have top bit set.
2024-03-14 09:01:22 +10:00
David Garske
448378ce90
Merge pull request #7306 from SparkiDev/asn1_validate_fix_1
...
ASN.1 template: validate UTF8STRING and OBJECT IDENTIFER data
2024-03-13 15:23:02 -07:00
David Garske
924c0fd911
Merge pull request #7329 from gojimmypi/PR-Arduino-Build
...
Ignore build file warnings for Arduino; Update examples
2024-03-13 14:59:07 -07:00
David Garske
6f65d6749a
Merge pull request #7321 from JacobBarthelmeh/vcpkg
...
fix for warning of no stdint.h include with uintptr_t
2024-03-13 14:43:47 -07:00
David Garske
c8bc74b232
Merge pull request #7324 from JacobBarthelmeh/sm2_bench
...
Sm2 benchmark build fix
2024-03-13 14:43:30 -07:00
gojimmypi
9057e8120d
Ignore build file warnings for Arduino, update examples
2024-03-13 12:24:00 -07:00
JacobBarthelmeh
9f240bb34c
fix for warning of no stdint.h include with uintptr_t
2024-03-14 00:38:02 +07:00
JacobBarthelmeh
ff14aa20a6
fix for benchmark build with sm4-gcm
2024-03-14 00:05:43 +07:00
JacobBarthelmeh
5c3b929d90
fix for benchmark build with sm2
2024-03-14 00:05:43 +07:00
JacobBarthelmeh
1e054b9613
Merge pull request #7302 from dgarske/pk_psk
...
Support for Public Key (PK) callbacks with PSK
2024-03-14 00:02:23 +07:00
David Garske
d2fd937075
Merge pull request #7328 from bandi13/disableLibSSH2Test
...
Disable broken library
2024-03-12 15:26:44 -07:00
Andras Fekete
ce52a68c3d
Disable broken library
...
The tests on the libssh2 repo are also failing for the same reason
2024-03-12 17:04:20 -04:00
Sean Parkinson
084338dde7
ASN Template: GetASN_UTF8String optional
...
Allow UTF8String checking to be disabled with WOLFSSL_NO_ASN_STRICT.
2024-03-12 09:59:51 +10:00
David Garske
5dba7d3975
Merge pull request #7280 from Frauschi/pqc_kyber_fix
...
Fix for PQC enabled handshake
2024-03-11 09:26:13 -07:00
David Garske
bd20640e58
Merge pull request #7312 from philljj/zd17621
...
Handle failed alloc in TLSX_Write.
2024-03-09 15:20:50 -08:00
Fabian Keil
5d418d67b0
Allow to enable DES3 support without the DES3 ciphers
...
DES3 support is required to use PBES2-3DES-CBC-encoded keys
but also enabling the DES3 ciphers may be undesirable.
When using Privoxy it results in a "Bad" rating at sites like
https://www.howsmyssl.com/ due to the Sweet32 attack.
2024-03-09 12:22:44 +01:00
jordan
0e15a2e83a
Handle failed alloc in TLSX_Write.
2024-03-08 22:56:27 -06:00
David Garske
0c40fb5c5f
Merge pull request #7299 from SparkiDev/siphash_asm_fix_2
...
Siphash: x64 asm fix
2024-03-08 13:15:44 -08:00
David Garske
9fadcb2edc
Merge pull request #7307 from bandi13/fixNightlyCrossworks
...
Fix nightly crossworks
2024-03-08 13:12:53 -08:00
David Garske
8298019a85
Merge pull request #7308 from bandi13/fixNightlySGX
...
Missing functions
2024-03-08 13:12:30 -08:00
David Garske
83cddc76ce
Merge pull request #7309 from bandi13/fixNightlyG++
...
Missing cast to avoid warning
2024-03-08 13:12:09 -08:00
David Garske
b5633f9cea
Merge pull request #7310 from gojimmypi/PR-Revert-Breadcrumbs
...
Revert some debug breadcrumbs in #7304
2024-03-08 13:06:41 -08:00
David Garske
11303ab796
Support for Public Key (PK) callbacks with PSK in TLS v1.2 and TLS v1.3 (client and server). ZD 17383
2024-03-08 12:21:06 -08:00
gojimmypi
56f3c93272
Revert per https://github.com/wolfSSL/wolfssl/pull/7304#pullrequestreview-1925571495
2024-03-08 12:05:54 -08:00
Andras Fekete
082397adda
Missing cast to avoid warning
2024-03-08 14:46:17 -05:00
Andras Fekete
b17db818ce
Missing functions
...
Compilation fails with "undefined reference to `sp_cmp'" etc.
2024-03-08 14:04:35 -05:00
Andras Fekete
98f8329bf2
Add indentation for legibility
2024-03-08 11:49:38 -05:00
Andras Fekete
8fcb007301
Missing gating for netdb.h includes
2024-03-08 11:46:49 -05:00
Sean Parkinson
5daf5fff86
Merge pull request #7272 from JacobBarthelmeh/pkcs7-enc
...
IO callbacks for content and output with PKCS7 bundle sign/encrypt
2024-03-08 07:18:11 +10:00
Sean Parkinson
28e8228744
Merge pull request #7304 from gojimmypi/PR-Arduino-Logging
...
Update Arduino examples: 32KB TLS Client/Server; Add wolfcrypt breadcrumbs.
2024-03-08 07:12:01 +10:00
JacobBarthelmeh
c24b187a88
fixes for clang-tidy warnings
2024-03-08 01:54:37 +07:00
JacobBarthelmeh
a07d92d3d3
refactoring and fixes for new PKCS7 stream code
2024-03-07 21:30:42 +07:00
Sean Parkinson
c568e3c092
Merge pull request #7067 from gojimmypi/PR-Espressif-Monitor-Keyword
...
Introduce WOLFSSL_ESPIDF_EXIT_MESSAGE macro
2024-03-07 21:57:19 +10:00
Sean Parkinson
77a77a9a9d
Merge pull request #7296 from JacobBarthelmeh/autosar
...
initial AutoSAR shim layer
2024-03-07 21:55:50 +10:00
gojimmypi
38d5eec445
Introduce WOLFSSL_ESPIDF_EXIT_MESSAGE macro (+code review edits)
2024-03-07 00:44:11 -08:00
Sean Parkinson
faea635ee2
ASN.1 template: validate UTF8STRING and OBJECT IDENTIFER data
...
Check the data of UTF8STRING and OBJECT IDENTIFIER to ensure it is
properly encoded.
2024-03-07 18:01:16 +10:00
Sean Parkinson
6c8df33191
LMS: initial implementation
...
Initial wolfSSL implementation of LMS.
Changed LMS benchmarking to time making a key and reloading.
SHA-256:
Added wc_Sha256HashBlock to make hashing a block fast.
Fixed assembly code to be able to hash a block from an external
buffer.
Simplified code were possible.
Moved byte reversal decision logic to one place instead of replicating
length checks.
2024-03-07 11:43:16 +10:00
Sean Parkinson
f011012d8e
Merge pull request #7300 from bandi13/codeSonarFixes
...
Code sonar fixes
2024-03-07 10:17:06 +10:00
Sean Parkinson
b7c36fa603
Merge pull request #7305 from embhorn/zd17629
...
Fix leak in wolfSSL_X509_STORE_CTX_get_chain
2024-03-07 10:16:44 +10:00
gojimmypi
e40eb3c774
Update Arduino examples; add wolfcrypt breadcrumbs.
2024-03-06 15:13:37 -08:00
Eric Blankenhorn
a0a9680325
Fix leak in wolfSSL_X509_STORE_CTX_get_chain
2024-03-06 15:13:38 -06:00
lealem47
39ad67607e
Merge pull request #7240 from gojimmypi/PR-wolfssl_client_ESP8266
...
Update TLS client example for Espressif ESP8266
2024-03-06 13:18:28 -07:00
David Garske
21b82a20d5
Merge pull request #7301 from SparkiDev/thumb2_aes_key_align_fix
...
Thumb2 AES ASM: don't assume alignment on key
2024-03-06 09:47:38 -08:00
JacobBarthelmeh
ea9dfecc79
make rng global and get version from LIBWOLFSSL_VERSION_HEX
2024-03-06 17:52:31 +07:00
Sean Parkinson
5408118582
Merge pull request #7298 from douzzer/20240304-wolfcrypttest-fixes
...
20240304-wolfcrypttest-fixes
2024-03-06 14:51:23 +10:00
Daniel Pouzzner
321a72c906
misc fixes:
...
wolfcrypt/test/test.c: fix gating for verify4 in scrypt_test(), and fix WOLFSSL_SMALL_STACK -Wframe-larger-than=2048 warnings in sha256_test() and sha512_test().
src/ssl.c: fix for true-but-benign nullPointerRedundantCheck in ProcessBufferTryDecodeEd25519().
tests/api.c: fix for -Wmaybe-uninitialized in test_wc_PKCS7_VerifySignedData_RSA() identified via cross-m68k-all-asm.
2024-03-05 17:44:33 -06:00
Sean Parkinson
d057f10d58
Thumb2 AES ASM: don't assume alignment on key
...
Fix AES_set_encrypt_key to not assume a word alignment on key.
2024-03-06 08:50:21 +10:00
Sean Parkinson
86b663d67e
Siphash: x64 asm fix
...
Make gcc-8 compiled code work.
2024-03-05 22:23:20 +10:00
JacobBarthelmeh
11c9035a62
misc fixes and correct name for test file
2024-03-05 18:31:42 +07:00
Sean Parkinson
ee39a8f17f
Merge pull request #7262 from gojimmypi/PR-SHA-Interleave
...
Introduce SHA256/SHA512 interleave testing, HAVE_DSA; revised ERROR_OUT
2024-03-05 10:13:10 +10:00
Sean Parkinson
39002d82b4
Merge pull request #7294 from douzzer/20240301-wolfSSL_Init-identicalInnerCondition
...
20240301-wolfSSL_Init-identicalInnerCondition
2024-03-05 09:01:51 +10:00
Sean Parkinson
61749a0171
Merge pull request #7287 from JacobBarthelmeh/pkcs7_verify_stream
...
PKCS7 checking trailing 0's on indef with verify
2024-03-05 08:20:16 +10:00
Sean Parkinson
30366a9c03
Merge pull request #7293 from douzzer/20240301-linuxkm-leak-and-small-stack-fixes
...
20240301-linuxkm-leak-and-small-stack-fixes
2024-03-05 08:17:51 +10:00
Sean Parkinson
ee3aff1258
Merge pull request #7291 from dgarske/armasm_thumb_gcmsmall
...
Thumb2 AES GCM support for GCM_SMALL
2024-03-05 06:58:47 +10:00
Andras Fekete
717a32808f
Fix missing include
2024-03-04 10:24:32 -05:00
JacobBarthelmeh
089e57371f
remove a hard tab
2024-03-04 08:10:41 -07:00
Jacob Barthelmeh
b42a8b6c5d
initial AutoSAR shim layer
2024-03-04 07:51:00 -07:00
Andras Fekete
d81a08a03b
Catch error return code and remove redundant condition
2024-03-04 09:48:31 -05:00
JacobBarthelmeh
2708062d39
add sanity check for null buffer after malloc in test case
2024-03-04 07:33:21 -07:00
JacobBarthelmeh
f05e47bc09
length of characters and extra sanity check on input
2024-03-04 07:05:07 -07:00
JacobBarthelmeh
66f419bd18
add user ctx to stream IO callbacks
2024-03-04 06:00:07 -07:00
Daniel Pouzzner
88f07773d2
Merge pull request #7224 from mpsuzuki/pkg-config-static-link
...
Add "Libs.private: -m" to wolfssl.pc.in for a static linking
2024-03-01 19:24:05 -05:00
Daniel Pouzzner
7fbb209684
ssl.c: in wolfSSL_Init(), fix cppcheck identicalInnerCondition warning on non-FIPS configurations.
2024-03-01 17:54:55 -06:00
Daniel Pouzzner
efda4b5435
Merge pull request #7290 from lealem47/define_ssleay_version
...
Define SSLEAY_VERSION in wolfssl/openssl/crypto.h
2024-03-01 18:44:24 -05:00
Daniel Pouzzner
a59080a858
Merge pull request #7288 from bandi13/fixNETDB_H
...
Move netdb.h and ioctl.h into wolfio.c
2024-03-01 18:36:18 -05:00
Eric Blankenhorn
cf733c306c
Merge pull request #7284 from douzzer/20240229-mutex-initializer-global-refactor
...
20240229-mutex-initializer-global-refactor
2024-03-01 16:43:10 -06:00
Zackery
4a167e9834
Merge pull request #7292 from bandi13/addMeta-WolfsslToBuild
...
This will force building of dependencies in the container
2024-03-01 15:14:24 -07:00
Daniel Pouzzner
b1edb08119
linuxkm/linuxkm_wc_port.h:
...
* fix WC_LINUXKM_ROUND_UP_P_OF_2() to not round up values that are already powers of 2, nor values larger than 8192.
linuxkm/lkcapi_glue.c:
* fix gating on km_AesSetKeyCommon().
* small stack refactors of Aes objects in self-test routines.
* change kmalloc/free to malloc/free in self-test routines.
* fix error-path "return"s to "goto exit"s in self-test routines.
* fix memory leak around large_input in aes_xts_128_test().
wolfcrypt/benchmark/benchmark.c:
* smallstack refactors in bench_chacha() and bench_chacha20_poly1305_aead().
* add error handling in bench_chacha().
wolfcrypt/src/chacha20_poly1305.c: smallstack refactor for wc_ChaCha20Poly1305_Encrypt() and wc_ChaCha20Poly1305_Decrypt().
2024-03-01 14:55:49 -06:00
Andras Fekete
4270f8cda3
This will force building of dependencies in the container
...
Fewer things to compile in subsequent tests
2024-03-01 15:21:46 -05:00
David Garske
7c836c8371
Thumb2 AES GCM support for GCM_SMALL. ZD 17225
2024-03-01 11:10:21 -08:00
Lealem Amedie
86966f62c7
Define SSLEAY_VERSION in wolfssl/openssl/crypto.h
2024-03-01 11:24:56 -07:00
JacobBarthelmeh
065bfb0172
add new test file to make dist
2024-03-02 00:12:01 +07:00
Andras Fekete
897a8419c1
Move netdb.h and ioctl.h into wolfio.c
2024-03-01 11:59:02 -05:00
JacobBarthelmeh
90b28b5cef
add test case for verify of stream signed PKCS7 bundle
2024-03-01 23:43:46 +07:00
JacobBarthelmeh
05138154a9
check trailing 0's in signeeds check case
2024-03-01 22:57:10 +07:00
JacobBarthelmeh
95eb17944c
Merge pull request #6961 from TakayukiMatsuo/pkcs7
...
Add streaming support for PKCS7_VerifySignedData.
2024-03-01 22:38:07 +07:00
JacobBarthelmeh
fbf1b783da
initialize value to resolve warning
2024-03-01 21:39:27 +07:00
JacobBarthelmeh
c32d9c826c
fix for check on hash with ECDSAk case
2024-03-01 21:14:15 +07:00
Daniel Pouzzner
52f003f5fc
Merge pull request #7281 from philljj/zd17416
...
Fix Coverity issues.
2024-03-01 02:41:48 -05:00
Daniel Pouzzner
67d4019058
Merge pull request #7270 from philljj/zd17560
...
Fix dataASN null pointer dereference in asn.c.
2024-03-01 01:53:55 -05:00
Daniel Pouzzner
d1e62b3ff2
Merge pull request #7282 from SparkiDev/pqcrypto_fix_1
...
ASN PQC: fix typo
2024-03-01 01:40:04 -05:00
Daniel Pouzzner
03f9b210d7
Merge pull request #7279 from SparkiDev/ssl_priv_load_fail
...
SSL: Loading bad private key
2024-03-01 01:35:50 -05:00
Anthony Hu
032a0405e4
Get rid of magic number to size structs.
2024-02-29 15:23:48 -05:00
jordan
b3c276bf0b
Fix wc_SetExtKeyUsageOID buffer warning: update size of oid.
2024-02-29 13:17:31 -06:00
Daniel Pouzzner
dfbde4514b
global refactor of static mutex initialization to use WOLFSSL_MUTEX_INITIALIZER, and adjustment of WOLFSSL_MUTEX_INITIALIZER macro to take an argument, for Linux kernel compatibility.
2024-02-29 02:11:32 -06:00
Sean Parkinson
90baf1aadc
ASN PQC: fix typo
...
Replace semicolon with comma.
2024-02-29 07:46:22 +10:00
jordan
c24add5da9
Fix dataASN null pointer dereference in asn.c.
2024-02-28 15:37:55 -06:00
Sean Parkinson
9addb3e45d
SSL: Change other ProcessBufferTryDecode*()
...
Ed448, Falcon and Dilithium changed to return 0 when key format is 0.
2024-02-29 07:37:41 +10:00
jordan
1768b03ecd
Fix wc_SetExtKeyUsageOID buffer warning.
2024-02-28 11:13:33 -06:00
Tobias Frauenschläger
403fcc5a4b
Fix for PQC enabled handshake
...
When PQC Kyber support is enabled, incoming KeyShare messages are tested
regarding the named group is a PQC Kyber group (pure or hybrid). The
boundaries of this test are way too loose (large gap between the pure
ones and the hybrid ones). This could result in failing handshakes in
case a client uses GREASE (Generate Random Extensions And Sustain
Extensibility), as there group numbers in the large gap are used.
The fix is just to make sure that the PQC test uses the two small
boundaries of the PQC named groups.
The lower bound for the hybrid groups has also been updated to reflect
the current OQS definition.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2024-02-28 17:52:38 +01:00
Sean Parkinson
b53cc0e98c
SSL: Loading bad private key
...
Fix ProcessBufferTryDecodeRsa and ProcessBufferTryDecodeEcc to only
clear error when key format isn't known.
2024-02-28 21:47:45 +10:00
JacobBarthelmeh
8a6c6ebfd5
add guard around public key validation on import
2024-02-28 13:48:58 +07:00
Daniel Pouzzner
6500444b26
Merge pull request #7072 from farazrbx/rbx
...
PlayStation compatibility
2024-02-28 00:52:01 -05:00
Daniel Pouzzner
daf43cd04f
Merge pull request #7260 from kosmas-valianos/missingConst
...
Add const in the list of wolfSSL_CTX_set1_groups_list() and wolfSSL_set1_groups_list()
2024-02-28 00:28:37 -05:00
Daniel Pouzzner
af31fbc840
Merge pull request #7271 from bigbrett/cryptocb-random-wctestfix
...
add full support to wolfcrypt tests for random.c cryptocbs
2024-02-27 19:57:46 -05:00
Daniel Pouzzner
e64a26d6ae
Merge pull request #7274 from SKlimaRA/SKlimaRA/fix-embos-heap-allocation-macros
...
fixed XMALLOC, XFREE and XREALLOC definitions for embOS
2024-02-27 17:29:10 -05:00
Faraz Fallahi
3c6651e1e2
PlayStation compatibility
2024-02-27 12:28:31 -08:00
Eric Blankenhorn
26c5c6f93c
Add directory layout to readme.
2024-02-27 12:07:28 -06:00
Brett Nicholas
55421a11b9
review: removed WOLFSSL_ABI from and refactored args for wc_rng_new_ex, updated tests
2024-02-27 10:17:24 -07:00
Stanislav Klima
c5a5acd26f
code review changes
2024-02-27 15:58:12 +01:00
Stanislav Klima
34b4066d2f
fixed XMALLOC, XFREE and XREALLOC definitions for embOS
2024-02-27 14:47:39 +01:00
TakayukiMatsuo
eeda0caeb9
Add streaming support for PKCS7_VerifySignedData.
2024-02-27 15:04:32 +09:00
JacobBarthelmeh
9eac8cb41f
add a test case
2024-02-26 09:44:23 -07:00
JacobBarthelmeh
2044d6b7dd
add callbacks for PKCS7 streaming input and output
2024-02-26 08:28:12 -07:00
JacobBarthelmeh
10740abf9b
warning fix for small PSK build
2024-02-26 15:28:28 +07:00
gojimmypi
0775baa2e1
Introduce SHA256/SHA512 interleave, HAVE_DSA; revised ERROR_OUT, cleanup
2024-02-23 17:52:20 -08:00
David Garske
a77c6d1fa0
Merge pull request #7269 from JacobBarthelmeh/cryptocb
...
add support for crypto cb only with ECC and CAAM
2024-02-23 13:19:32 -08:00
Brett Nicholas
1a5064cf8c
add full support to wolfcrypt tests for random.c cryptocbs
2024-02-23 13:02:05 -07:00
JacobBarthelmeh
2f6cd765f1
revert some macro guards for support with sp math
2024-02-24 01:07:05 +07:00
JacobBarthelmeh
aa444c1b2c
Merge pull request #7268 from dgarske/bench_fixes
...
Fixes for benchmark with small stack (RSA was being skipped)
2024-02-23 23:24:55 +07:00
JacobBarthelmeh
2364b699ff
add support for crypto cb only with ECC and CAAM
2024-02-23 08:09:19 -08:00
Daniel Pouzzner
06469a43bc
wolfcrypt/benchmark/benchmark.c:
...
* remove redundant nullness checks covered by WC_ALLOC_VAR() via WC_ALLOC_DO_ON_FAILURE();
* add "exit:" logic to bench_sm4_gcm();
* add missing WC_ALLOC_VAR() in bench_sm4_ccm();
* fix early return in bench_ed448KeySign().
2024-02-23 01:07:26 -06:00
David Garske
4055b0d832
Fix for some variable null checks that are not needed.
2024-02-22 16:28:15 -08:00
David Garske
cd0301fc66
Fixes for benchmark with small stack (RSA was being skipped). Added Thumb2 benchmarks for STM32H753.
2024-02-22 14:56:51 -08:00
JacobBarthelmeh
8a68e6aaa1
Merge pull request #7266 from bandi13/addYoctoDocker
...
Add in files for yocto build environment
2024-02-22 19:30:36 +07:00
JacobBarthelmeh
6f281d7e72
Merge pull request #7267 from douzzer/20240221-reproducible-build-tweaks
...
20240221-reproducible-build-tweaks
2024-02-22 19:28:12 +07:00
JacobBarthelmeh
162d4dc483
Merge pull request #7264 from bandi13/dockerFixes
...
Add in missing dependency for nightly-sp-test
2024-02-22 19:11:07 +07:00
Daniel Pouzzner
f1afa7eaff
Merge pull request #7265 from embhorn/zd17547
...
Fix order of check for OPENSSL_EXTRA
2024-02-21 20:25:54 -05:00
Daniel Pouzzner
9e4887bcf4
configure.ac: fix --enable-reproducible-build using -g0 -ffile-prefix-map=... -Wl,--build-id=none. these fixes stabilize the hash of libwolfssl with respect to source and build directory, previously broken for out-of-tree builds.
2024-02-21 16:36:29 -06:00
Andras Fekete
e74d3e126e
Add in files for yocto build environment
2024-02-21 16:49:35 -05:00
Andras Fekete
2ee47eac4d
Add in missing dependency for nightly-sp-test
2024-02-21 16:16:26 -05:00
Eric Blankenhorn
3ad836ab47
Fix order of check for OPENSSL_EXTRA
2024-02-21 15:09:13 -06:00
Sean Parkinson
d027b305ab
Merge pull request #7257 from philljj/zd17540
...
Fix unchecked ge448_scalarmult_base return value.
2024-02-22 07:05:09 +10:00
JacobBarthelmeh
88e7d47930
Merge pull request #7230 from anhu/tests_gating
...
Fixup some gating in the tests.
2024-02-22 01:24:55 +07:00
jordan
5aa06c26ff
Fix unchecked ge448_scalarmult_base return value.
2024-02-21 08:40:38 -06:00
Anthony Hu
00c3f5be2e
A fixup
2024-02-20 21:50:03 -05:00
JacobBarthelmeh
fd2b80ec22
Merge pull request #7245 from julek-wolfssl/transient-certs
...
Implement transient certs
2024-02-20 22:48:19 +07:00
Juliusz Sosinowicz
09de233fc0
Add dox for new API
2024-02-20 14:42:58 +01:00
Juliusz Sosinowicz
aa19d8221e
Add test forcing caTable cleanup during active connections
2024-02-20 14:33:36 +01:00
Juliusz Sosinowicz
4caef93346
Implement transient certs
...
Add wolfSSL_CertManagerUnloadIntermediateCerts API to clear intermediate certs added to store.
2024-02-20 14:33:36 +01:00
Kosmas Valianos
73a6935386
Add const in the list of wolfSSL_CTX_set1_groups_list() and wolfSSL_set1_groups_list()
...
aligning with the wolfSSL_CTX_set1_sigalgs_list()/wolfSSL_set1_sigalgs_list() API
2024-02-20 09:14:39 +01:00
Sean Parkinson
af2b2dddb4
Merge pull request #7253 from julek-wolfssl/zd/17507
...
wc_ecc_shared_secret_ssh fix
2024-02-20 06:56:28 +10:00
JacobBarthelmeh
757fcbcc25
Merge pull request #7236 from julek-wolfssl/get-sig-nid
...
Implement SSL_get_peer_signature_nid and SSL_get_peer_signature_type_nid
2024-02-20 02:46:37 +07:00
JacobBarthelmeh
565a4e6773
Merge pull request #7256 from douzzer/20240217-fixes
...
20240217-fixes
2024-02-20 01:54:32 +07:00
Daniel Pouzzner
8d894fb01b
wolfssl/wolfcrypt/types.h: add WC_ARRAY_ARG() and WC_HEAP_ARRAY_ARG() constructors, for passing arrays declared by WC_DECLARE_ARRAY() and WC_DECLARE_HEAP_ARRAY(). used this to refactor bench_rsa_helper() arg list, fixing a cppcheck argumentSize warning.
...
wolfcrypt/test/test.c: revert overeager constification of xmss_msg and xmss_sig.
2024-02-17 15:24:55 -06:00
David Garske
7f18338322
Merge pull request #7255 from ejohnstown/ocsp-date
...
OCSP Date Checks
2024-02-16 20:58:20 -08:00
John Safranek
52f4dcd7aa
OCSP Date Checks
...
When calling DecodeResponseData(), no matter the return value, if it is
not success, it is assigned to ASN_PARSE_E. This isn't the pattern for
other branch parsing. Return the value returned.
This is seen when decoding an OCSP response that is past the
next-available time.
2024-02-16 12:12:27 -08:00
David Garske
e4ea2651a3
Merge pull request #7252 from douzzer/20240215-benchmark-smallstack-refactors
...
20240215-benchmark-smallstack-refactors
2024-02-16 11:45:59 -08:00
Daniel Pouzzner
af620513f1
wolfssl/wolfcrypt/types.h: fix bugprone-macro-parentheses in smallstack WC_ALLOC_VAR().
2024-02-16 12:39:25 -06:00
David Garske
815c290293
Merge pull request #7231 from anhu/maxqrng
...
Use the MAXQ1065/1080 rng when available.
2024-02-16 09:43:46 -08:00
Daniel Pouzzner
3676dc02a6
wolfcrypt/benchmark/benchmark.c: mollify scan-build with XMEMSET()s in several false positives around WC_DECLARE_ARRAY().
2024-02-16 10:27:06 -06:00
Daniel Pouzzner
44e0ee1ecd
wolfssl/wolfcrypt/types.h:
...
* fix overallocation in WC_DECLARE_ARRAY() macro in the !WOLFSSL_SMALL_STACK path.
* rename WC_INIT_ARRAY() to WC_ALLOC_ARRAY() for clarity (it doesn't initialize any memory).
* rename WC_DECLARE_ARRAY_DYNAMIC_DEC(), WC_DECLARE_ARRAY_DYNAMIC_EXE(), and WC_FREE_ARRAY_DYNAMIC() to WC_DECLARE_HEAP_ARRAY(), WC_ALLOC_HEAP_ARRAY(), and WC_FREE_HEAP_ARRAY(), respectively, also for clarity, and refactor out the duplicate definitions.
* add WC_ALLOC_VAR(), and move the XMALLOC() in smallstack WC_DECLARE_VAR() into it. smallstack WC_DECLARE_VAR() now initializes the pointer to NULL, like smallstack WC_DECLARE_ARRAY(), assuring all pointers are valid upon shortcircuit to cleanup for a failed allocation (see WC_ALLOC_DO_ON_FAILURE below).
* add a new hook "WC_ALLOC_DO_ON_FAILURE" in WC_ALLOC_VAR(), WC_ALLOC_ARRAY(), and WC_DECLARE_ARRAY_DYNAMIC_EXE(), which is invoked when an allocation fails. by default the hook is defined to WC_DO_NOTHING.
* add basic safety to WC_*_HEAP_ARRAY() by recording/detecting allocation state via idx##VAR_NAME.
* add macros WC_ARRAY_OK() and WC_HEAP_ARRAY_OK() to test if allocation succeeded.
* add macros WC_CALLOC_ARRAY() and WC_CALLOC_HEAP_ARRAY() which zero the objects.
* add macro WC_CALLOC_VAR() which zeros the object.
ED448: smallstack refactor of ge448_scalarmult_base().
src/tls.c tests/api.c wolfcrypt/test/test.c: update WC_DECLARE_VAR()s with now-required matching WC_ALLOC_VAR()s.
wolfcrypt/benchmark/benchmark.c:
* no functional changes in default error-free behavior.
* add definition of WC_ALLOC_DO_ON_FAILURE() that prints error message, sets ret, and does goto exit.
* add BENCH_NTIMES and BENCH_AGREETIMES overrideeable macros, to allow fast sanitizer runs and slow high-precision runs.
* smallstack refactor of all declarations of stack arrays of the form foo[BENCH_MAX_PENDING], using WC_DECLARE_ARRAY() (35 in all).
* additional smallstack refactors, using WC_DECLARE_VAR(), for bench_aesxts(), bench_ed448KeyGen(), bench_eccsi*(), and bench_sakke*().
* fixes for various unhandled error conditions around malloc failures.
wolfcrypt/test/test.c: opportunistically constify several (42) static constants, moving them to the readonly data segment.
linuxkm/Makefile: if ENABLED_LINUXKM_BENCHMARKS, add wolfcrypt/benchmark/benchmark.o to WOLFSSL_OBJ_FILES.
linuxkm/Kbuild: enable FPU for benchmark.o, and remove enablement for module_hooks.o.
linuxkm/module_hooks.c: remove inline include of benchmark.c.
2024-02-16 10:26:21 -06:00
András Fekete
92b8196059
Merge pull request #7251 from miyazakh/ra6m4_jenkins
...
fix ra6m4 nightly jenkins failure
2024-02-16 09:09:12 -05:00
Juliusz Sosinowicz
469760e186
wc_ecc_shared_secret_ssh fix
...
- wc_ecc_shared_secret_ssh should either be declared or not. Having two different signatures for the same function is error prone.
- Don't use wc_ecc_shared_secret_ssh in our code. Use wc_ecc_shared_secret directly.
2024-02-16 13:38:35 +01:00
Juliusz Sosinowicz
44de6dfdd3
Return correct values in get_signature APIs and write tests
2024-02-16 11:32:22 +01:00
Juliusz Sosinowicz
98e328dafc
Enable master openvpn testing
...
Depends on https://github.com/wolfSSL/wolfssl/pull/7236
2024-02-16 11:32:04 +01:00
Juliusz Sosinowicz
6537c7163c
Implement SSL_get_peer_signature_nid and SSL_get_peer_signature_type_nid
2024-02-16 11:32:04 +01:00
Hideki Miyazaki
72d8acf5aa
fix ra6m4 nightly jenkins failure
2024-02-16 15:45:32 +09:00
David Garske
d34b254247
Merge pull request #7249 from bandi13/missingOpenVPNDependencies
...
Add in dependencies when compiling with OpenVPN
2024-02-15 15:38:07 -08:00
David Garske
f0a162c265
Merge pull request #7250 from lealem47/ecbAsync
...
Fix for AES-ECB benchmark livelock with Async
2024-02-15 15:37:46 -08:00
Marco Oliverio
c8f3a8f14b
fix: negotiate handshake until the end in wolfSSL_read/wolfSSL_write ( #7237 )
...
* tls: negotiate until hs is complete in wolfSSL_read/wolfSSL_write
Don't rely on ssl->options.handShakeSate == HANDSHAKE_DONE to check if
negotiation is needed. wolfSSL_Connect() or wolfSSL_Accept() job may not yet be
completed and/or some messages may be waiting in the buffer because of
non-blocking I/O.
* tests: test case for handshake with wolfSSL_read()/wolfSSL_write()
* doc: clarify wolfSSL_write()
* internal.c: rename: need_negotiate -> ssl_in_handshake
2024-02-15 13:48:19 -08:00
Lealem Amedie
4cc960787f
Fix for AES-ECB benchmark livelock with Async
2024-02-15 12:51:22 -07:00
Andras Fekete
71fd4782c0
Add in dependencies when compiling with OpenVPN
2024-02-15 13:48:33 -05:00
David Garske
585f0f1956
Merge pull request #7248 from lealem47/ARMASM_UnitTest
...
Fix unit test failure for FIPS 140-2 + WOLFSSL_ARMASM
2024-02-15 08:25:42 -08:00
Lealem Amedie
b87f544af6
Reviewer feedback
2024-02-14 16:43:01 -07:00
Lealem Amedie
152c8565b9
Fix unit test failure for FIPS 140-2 + WOLFSSL_ARMASM
2024-02-14 16:24:58 -07:00
David Garske
d39cf1e499
Merge pull request #7246 from kareem-wolfssl/zd17176
...
Only include CRL monitor definitions when building with HAVE_CRL_MONITOR.
2024-02-14 13:45:23 -08:00
Kareem
6dc6d58c04
Remove redundant ifdefs.
2024-02-14 11:22:32 -07:00
David Garske
375415d042
Merge pull request #7229 from kaleb-himes/win-code-up
...
Windows doesn't like code before variables
2024-02-14 09:50:34 -08:00
Kareem
c119826e75
Only include CRL monitor definitions when building with HAVE_CRL_MONITOR.
2024-02-13 15:37:36 -07:00
Sean Parkinson
3b6a7691c5
Merge pull request #7235 from julek-wolfssl/gh/7228
...
Send alert on bad psk binder
2024-02-14 07:24:52 +10:00
David Garske
6f88ed0901
Merge pull request #7177 from gojimmypi/PR-Arduino-Update
...
Improved Arduino Support: ESP32, Due
2024-02-13 09:43:42 -08:00
David Garske
c8d0bb0bd8
Merge pull request #7212 from SparkiDev/eddsa_check_priv
...
EdDsa: check private value after sign
2024-02-13 09:27:34 -08:00
Sean Parkinson
e28d6a7b71
EdDsa: check private value after sign
...
Check the private value hasn't changed during signing with EdDSA.
2024-02-13 22:11:48 +10:00
Sean Parkinson
94680991a9
Merge pull request #7243 from douzzer/20240213-aes256_test-leak
...
20240213-aes256_test-leak
2024-02-13 22:03:49 +10:00
gojimmypi
68fb183fa6
Update TLS client example for Espressif ESP8266
2024-02-13 03:01:40 -08:00
Daniel Pouzzner
9b7decada0
wolfcrypt/test/test.c: fix Aes init/free lifecycle in aes192_test() and aes256_test().
2024-02-13 01:23:11 -06:00
David Garske
2ebc897e31
Merge pull request #7241 from ejohnstown/ocsp-revoke-reason
...
Decode OCSP Revocation Reason
2024-02-12 15:11:26 -08:00
David Garske
2b9e9955c3
Merge pull request #7242 from SparkiDev/ct_valgrind_fixes_3
...
RSA ct test: force RsaFunctionCheckIn to not be inlined
2024-02-12 15:10:47 -08:00
Sean Parkinson
f031d034df
RSA ct test: force RsaFunctionCheckIn to not be inlined
...
In non-debug compilation, RsaFunctionCheckIn may be inlined.
The function operates on the input - value to exponentiate.
Constant time testing excludes all operations in this function.
2024-02-13 07:37:24 +10:00
John Safranek
c17fb7498b
OCSP Revocation Reason
...
1. The ASN.1 parser wasn't handling the OCSP response correctly when
there was a revocation reason included in the response. The encoded
reason value is constructed, and was getting marked as not
constructed in the parser. Changed the flag to mark it as
constructed.
2024-02-12 13:11:51 -08:00
David Garske
06f04def1b
Merge pull request #7222 from rizlik/early_data_fix
...
tls13: wolfSSL_read_early_data() set outSz to 0 if no early data and update doc
2024-02-12 11:38:46 -08:00
Marco Oliverio
7b0fefbceb
doc: update new wolfSSL_read_early_data() behavior
2024-02-12 17:20:15 +01:00
Marco Oliverio
e923d4c151
tls13: read_early_data: set outSz to 0 if no early data
...
If not data is read, set outSz to 0. This way the
caller can detect if no early data was read.
2024-02-12 17:20:15 +01:00
JacobBarthelmeh
83ae7245b0
Merge pull request #7151 from lealem47/pic24
...
MICROCHIP PIC24 support and example project
2024-02-12 23:15:10 +07:00
Juliusz Sosinowicz
9a08296fa0
Fix openssl client psk key so that psk actually works
2024-02-12 15:07:46 +01:00
Sean Parkinson
d5142d8553
Merge pull request #7234 from douzzer/20240208-test-config-and-linuxkm-tweaks
...
20240208-test-config-and-linuxkm-tweaks
2024-02-12 22:50:28 +10:00
Sean Parkinson
9f0aa38120
Merge pull request #7223 from gojimmypi/PR-debug-messages
...
Add wolfSSL debug messages
2024-02-12 07:35:50 +10:00
Daniel Pouzzner
2e970f53c5
Merge pull request #7232 from bandi13/moreDependencies
...
Add in dependencies of tests
2024-02-10 02:17:28 -05:00
Daniel Pouzzner
13021708d4
Merge pull request #7227 from julek-wolfssl/gh-retention-days
...
Increase retention days to make re-running easier
2024-02-10 02:16:34 -05:00
Daniel Pouzzner
c1931f78de
Merge pull request #7225 from bandi13/fixStaticAnalysisError
...
Static analyzers complain that a->size is never initialized
2024-02-10 02:15:37 -05:00
Daniel Pouzzner
63fe12efe3
wolfcrypt/src/aes.c: fix WOLFSSL_AESGCM_STREAM && WC_AES_C_DYNAMIC_FALLBACK: establish AESNI status dynamically at time of wc_AesGcmSetKey(), and stick to it (or return failure) until the next wc_AesGcmSetKey(). this matches the semantics of the Linux kernel in-tree implementation, allowing safe registration of the wolfCrypt AESNI implementation with the LKCAPI.
...
configure.ac: move enable_aesgcm_stream=yes clauses in enable-all and enable-all-crypto to the main section, from the !ENABLED_LINUXKM_DEFAULTS section, and in ENABLED_LINUXKM_LKCAPI_REGISTER setup, remove the !ENABLED_AESNI from the condition for forcing on ENABLED_AESGCM_STREAM.
linuxkm/lkcapi_glue.c:
* remove all special-casing for AES-GCM with AESNI.
* add support for a LINUXKM_LKCAPI_PRIORITY_ALLOW_MASKING macro.
wolfssl/wolfcrypt/memory.h: add missing definition of SAVE_VECTOR_REGISTERS2() when DEBUG_VECTOR_REGISTER_ACCESS_FUZZING && !DEBUG_VECTOR_REGISTER_ACCESS.
wolfcrypt/src/memory.c:
* define SAVE_VECTOR_REGISTERS2_fuzzer() if DEBUG_VECTOR_REGISTER_ACCESS_FUZZING, regardless of DEBUG_VECTOR_REGISTER_ACCESS.
* add a DEBUG_VECTOR_REGISTER_ACCESS clause to the !HAVE_THREAD_LS version of SAVE_VECTOR_REGISTERS2_fuzzer().
wolfcrypt/test/test.c: remove several errant wc_AesFree()s in aes256_test().
2024-02-10 01:09:15 -06:00
Juliusz Sosinowicz
bd32dfd282
Send alert on bad psk binder
...
Issue reported in https://github.com/wolfSSL/wolfssl/pull/7228
2024-02-09 16:12:04 +01:00
Juliusz Sosinowicz
d34cf39206
Increase retention days to make re-running easier
2024-02-09 11:36:55 +01:00
Daniel Pouzzner
6146485d2a
linuxkm/linuxkm_wc_port.h:
...
* add support for DEBUG_LINUXKM_FORTIFY_OVERLAY to allow KASAN analysis of the overlay without actually enabling CONFIG_FORTIFY_SOURCE (which is buggy in combination with KASAN).
* make SAVE_VECTOR_REGISTERS2 definition conditional on !defined(SAVE_VECTOR_REGISTERS2).
wolfssl/wolfcrypt/memory.h: fix the DEBUG_VECTOR_REGISTER_ACCESS definition for SAVE_VECTOR_REGISTERS to properly omit the on-success bookkeeping code even if the supplied fail_clause doesn't return.
wolfcrypt/src/rsa.c: in wc_MakeRsaKey() primality loop, invoke RESTORE_VECTOR_REGISTERS() SAVE_VECTOR_REGISTERS() to prevent lengthy kernel lockups.
wolfcrypt/src/dh.c: in wc_DhGenerateParams() primality loop, invoke RESTORE_VECTOR_REGISTERS() SAVE_VECTOR_REGISTERS() to prevent lengthy kernel lockups.
wolfcrypt/src/{curve25519.c,dh.c,dsa.c,ecc.c,eccsi.c,rsa.c,sakke.c,sp_int.c}: when WOLFSSL_LINUXKM, force {SAVE,RESTORE}_VECTOR_REGISTERS() to WC_DO_NOTHING if settings gate out applicable asm.
2024-02-09 00:47:23 -06:00
Daniel Pouzzner
91681f378f
configure.ac:
...
* add srtp to enable-all
* add srtp-kdf to enable-all-crypto
* fix typo in enable-all[-crypto] where ENABLED_FIPS was used when FIPS_VERSION was needed.
* in enable-all[-crypto], conditionalize aesxts on !FIPS || FIPS_VERSION == dev.
* move AES-XTS CFLAG setup after FIPS settings, to allow non-dev FIPS to force it off, and add clause to FIPS v5 setup to do that.
* in FIPS v5 setup, add AES-XTS to the list of modes that forces -DWOLFSSL_AES_DIRECT -DHAVE_AES_ECB.
wolfcrypt/src/kdf.c: fix several benign -Wconversions.
wolfcrypt/test/test.c: add aes_cfb_test() and aes_xts_test() as top-level tests with separate "pass" messages, for transparency that those modes have indeed been tested in builds that activate them.
2024-02-09 00:46:54 -06:00
suzuki toshiya
e4b1e54235
configure or cmake sets LIBM variable if required, and write it in wolfssl.pc.
2024-02-09 13:58:28 +09:00
gojimmypi
bf29066d70
Add wolfSSL debug messages
2024-02-08 17:22:36 -08:00
Andras Fekete
340e22a6e4
Add in dependencies of tests
2024-02-08 16:48:10 -05:00
Anthony Hu
d0fd0a287b
Fixup some gating in the tests.
...
Found with:
./configure --enable-wolfclu --enable-asn=template 'CFLAGS=-DNO_ASN_TIME -DWOLFSSL_CUSTOM_OID -DHAVE_OID_ENCODING'
2024-02-08 16:14:43 -05:00
kaleb-himes
f5670082b6
Windows doesn't like code before variables
2024-02-08 14:12:02 -07:00
Anthony Hu
16c74a31b2
Use the MAXQ1065/1080 rng when available.
2024-02-08 16:10:36 -05:00
Andras Fekete
16b40b2f75
Static analyzers complain that a->size is never initialized
2024-02-08 15:13:07 -05:00
Juliusz Sosinowicz
14830d0e09
Merge pull request #7226 from bandi13/disableOpenVPN_master
...
Temporarily disable OpenVPN-master test
2024-02-08 21:06:22 +01:00
Andras Fekete
de0d1ea1e7
Temporarily disable OpenVPN-master test
2024-02-08 13:52:32 -05:00
Daniel Pouzzner
7365c3c6ba
Merge pull request #7215 from julek-wolfssl/openssh-workflow-update
...
Point openssh workflow to wolf master
2024-02-08 12:43:53 -05:00
Sean Parkinson
5b5f0ff32c
Merge pull request #7194 from anhu/CerManUnExtCb
...
Adding unknown extension callback to CertManager
2024-02-08 22:10:32 +10:00
Sean Parkinson
9147a7254b
Merge pull request #7214 from julek-wolfssl/zd/17314
...
DTLS sequence number and cookie fixes
2024-02-08 22:08:37 +10:00
suzuki toshiya
24c30d90e7
Add "Libs.private: -m" to wolfssl.pc.in for a static linking
2024-02-08 13:04:36 +09:00
gojimmypi
e078e74011
Update Arduino IDE README.md
2024-02-07 13:52:18 -08:00
Anthony Hu
271462128d
Add a test
2024-02-07 16:49:46 -05:00
David Garske
7e142583c6
Merge pull request #7221 from SparkiDev/thumb2_inline_asm_iar_fix
...
Thumbs inline ASM IAR: fix register clobber list
2024-02-07 13:30:41 -08:00
David Garske
dec4caa98f
Merge pull request #7206 from julek-wolfssl/gh/7196
...
Fix write_dup with chacha-poly
2024-02-07 08:40:30 -08:00
Sean Parkinson
91e1fe4496
Merge pull request #7220 from gojimmypi/PR-ssl-session-cache
...
Introduce MICRO_SESSION_CACHE, update comments
2024-02-07 21:25:53 +10:00
gojimmypi
538ade105c
Correct C++-style comments in settings.h
2024-02-06 18:25:05 -08:00
Sean Parkinson
fff4effe31
Thumbs inline ASM IAR: fix register clobber list
...
Change register clobber list so that it reserves the same registers for
constants regardless of WOLFSSL_NO_VAR_ASSIGN_REG.
2024-02-07 10:28:01 +10:00
gojimmypi
10b5c375ef
introduce MICRO_SESSION_CACHE, update comments
2024-02-06 14:07:50 -08:00
David Garske
8853096290
Merge pull request #7217 from douzzer/20240206-cmake-install-rule-by-default
...
20240206-cmake-install-rule-by-default
2024-02-06 10:48:55 -08:00
Daniel Pouzzner
c69442375b
CMakeLists.txt: include the install rule by default, disabled with -DWOLFSSL_INSTALL=no, to restore status quo ante. see #7188
2024-02-06 12:08:57 -06:00
David Garske
735fbc7cee
Merge pull request #7195 from philljj/zd17406
...
Update IAR-EWARM project user-settings.h.
2024-02-06 09:20:54 -08:00
Juliusz Sosinowicz
4244fe9ff4
Run openssh tests on PR's
2024-02-06 13:30:25 +01:00
Juliusz Sosinowicz
bdc0b80ddb
Don't include unnecessary headers in public header file
2024-02-06 13:27:34 +01:00
Daniel Pouzzner
4d842f094e
Merge pull request #7199 from lealem47/defaultASN
...
Default to ASN TEMPLATE library
2024-02-05 22:32:57 -05:00
Sean Parkinson
86b1aae218
Merge pull request #7209 from philljj/zd17416
...
Coverity issues: fix MD5 and SHA buffer overrun.
2024-02-06 08:58:27 +10:00
Lealem Amedie
d36bd47a27
For cppcheck: Explicitly initialize some variables
2024-02-05 15:09:05 -07:00
Daniel Pouzzner
48e40b8d8e
Merge pull request #7201 from SparkiDev/sha256_aarch64_unaligned
...
SHA-256 Aarch64: fix alignments on loads and stores
2024-02-05 16:50:27 -05:00
Daniel Pouzzner
8665295573
Merge pull request #7198 from dgarske/tls12only
...
Template for TLS v1.2 only
2024-02-05 16:14:47 -05:00
Daniel Pouzzner
1356e079f1
Merge pull request #7207 from julek-wolfssl/update-actions
...
Update github actions
2024-02-05 16:11:39 -05:00
Daniel Pouzzner
2b33079d50
Merge pull request #7188 from innolectric/innolectric
...
Innolectric CMake changes
2024-02-05 16:08:58 -05:00
Sean Parkinson
9060da42a6
Merge pull request #7211 from douzzer/20240203-linuxkm-fixes
...
20240203-linuxkm-fixes
2024-02-06 07:08:40 +10:00
jordan
9ea52c3a51
Update IAR-EWARM project user-settings.h.
2024-02-05 15:01:07 -06:00
Daniel Pouzzner
5c421d0207
Merge pull request #7178 from anhu/OQS_MEM_LEAKS
...
Fixes that prevent memory leaks when using OQS.
2024-02-05 13:26:43 -05:00
Anthony Hu
9b697a5315
Missed gating
2024-02-05 12:38:25 -05:00
Juliusz Sosinowicz
54b562f501
Point openssh workflow to wolf master
2024-02-05 18:10:24 +01:00
Juliusz Sosinowicz
8bddeb10c7
DTLS sequence number and cookie fixes
...
- dtls: check that the cookie secret is not emtpy
- Dtls13DoDowngrade -> Dtls13ClientDoDowngrade
- dtls: generate both 1.2 and 1.3 cookie secrets in case we downgrade
- dtls: setup sequence numbers for downgrade
- add dtls downgrade sequence number check test
Fixes ZD17314
2024-02-05 16:09:03 +01:00
jordan
83169f91e9
Fix ShaFinal overrun.
2024-02-03 17:36:26 -06:00
Daniel Pouzzner
3a280e8295
linuxkm fixes:
...
linuxkm/linuxkm_wc_port.h: add fallback definition for static_assert() to support legacy kernels.
wolfcrypt/src/aes.c: fix AESNI runtime failure/fallback logic in wc_AesXtsSetKeyNoInit().
2024-02-03 13:46:45 -06:00
David Garske
ca726e97f8
Peer review fixes.
2024-02-03 10:43:46 -08:00
jordan
d111d7da1b
Fix MD5 and SHA buffer overrun.
2024-02-02 19:50:22 -06:00
Daniel Pouzzner
851f059023
Merge pull request #7203 from julek-wolfssl/openssh-9.6
...
openssh 9.6p1 fixes
2024-02-02 19:51:55 -05:00
Daniel Pouzzner
4ed197d487
Merge pull request #7205 from julek-wolfssl/fix-test_wolfSSL_OPENSSL_hexstr2buf
...
test_wolfSSL_OPENSSL_hexstr2buf: test was always skipped
2024-02-02 18:45:31 -05:00
Daniel Pouzzner
866992151b
Merge pull request #7208 from philljj/fix_ext_xmss_sigsleft
...
Fix ext_xmss sigsleft null deref.
2024-02-02 18:28:20 -05:00
Daniel Pouzzner
7823acbbde
Merge pull request #7184 from JacobBarthelmeh/pkcs7-enc
...
PKCS7 streaming with encode/sign
2024-02-02 18:00:12 -05:00
jordan
13e427433c
Fix ext_xmss sigsleft null deref.
2024-02-02 16:04:23 -06:00
JacobBarthelmeh
7592559fd3
rename argument, fix warnings on casts
2024-02-02 14:50:50 -07:00
Daniel Pouzzner
d1e0b37467
Merge pull request #7202 from julek-wolfssl/bio-include-ssl
...
If bio.h is included first then it can't include options.h on its own
2024-02-02 16:00:47 -05:00
Daniel Pouzzner
6230c29194
Merge pull request #7190 from SparkiDev/tls13_hrrcookie_fix
...
TLS 1.3, HRR Cookie: send cookie back in new ClientHello
2024-02-02 15:05:00 -05:00
Juliusz Sosinowicz
31bfac43ea
Update github actions
...
Many of these updates should also speed up some steps
2024-02-02 20:14:28 +01:00
David Garske
32aecf4c35
Merge pull request #7180 from douzzer/20240126-LINUXKM_LKCAPI_REGISTER
...
20240126-LINUXKM_LKCAPI_REGISTER
2024-02-02 11:12:35 -08:00
Juliusz Sosinowicz
5b5d6481de
Fix write_dup with chacha-poly
2024-02-02 19:47:25 +01:00
Juliusz Sosinowicz
188a69e649
test_wolfSSL_OPENSSL_hexstr2buf: test was always skipped
2024-02-02 18:29:15 +01:00
Juliusz Sosinowicz
be90fe073e
tfm and integer: skip whitespace at end in radix read
2024-02-02 14:38:40 +01:00
Juliusz Sosinowicz
7ebb8cd007
Update radix tests
2024-02-02 12:09:50 +01:00
Juliusz Sosinowicz
d3b0a26b3b
If bio.h is included first then it can't include options.h on its own
...
When EXTERNAL_OPTS_OPENVPN is defined, we should be including options.h internally. When bio.h is included first, we don't include options.h and we don't pass the `#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)` guard.
2024-02-02 11:02:39 +01:00
Sean Parkinson
c8b0aac144
SHA-256 Aarch64: fix alignments on loads and stores
...
Input buffer must be loaded with a byte alignment.
Fix other loads and stores to be consistent.
2024-02-02 12:41:12 +10:00
Daniel Pouzzner
10645de648
linuxkm: various tweaks:
...
* configure.ac: in linuxkm-lkcapi-register section, force ENABLED_AESGCM_STREAM=yes if ENABLED_AESGCM is yes and there is asm or FIPS in the picture.
* linuxkm/module_hooks.c: in updateFipsHash(), if DEBUG_LINUXKM_PIE_SUPPORT || WOLFSSL_LINUXKM_VERBOSE_DEBUG, print the base16 hash to the kernel log.
* linuxkm/lkcapi_glue.c:
* implement KATs for AES-CBC, AES-CFB, and AES-GCM.
* clean out extraneous code and macro usage inherited from test/test.c.
* add post-registration crypto_tfm_alg_driver_name() tests for AES-CBC, AES-CFB, and AES-GCM.
2024-02-01 19:04:02 -06:00
Lealem Amedie
63f7298be2
Default to ASN TEMPLATE library
2024-02-01 14:52:06 -07:00
JacobBarthelmeh
ed4b87eb37
fix for clang-tidy null dereference error
2024-02-01 14:26:13 -07:00
JacobBarthelmeh
5fbadbb215
fix warning with test case
2024-02-01 11:50:51 -07:00
JacobBarthelmeh
8d0dc7a568
fix asn original build, vs warning, and add test cases
2024-02-01 11:50:51 -07:00
JacobBarthelmeh
bf23357c8c
refactor streaming and additional comments
2024-02-01 11:50:51 -07:00
JacobBarthelmeh
c843064681
update macro guard
2024-02-01 11:50:51 -07:00
JacobBarthelmeh
75762d44b6
PKCS7 streaming with encode/sign
2024-02-01 11:50:51 -07:00
gojimmypi
ee0e25de5f
Improved Arduino Support, ESP32, Due; (+ code review x2)
2024-02-01 08:31:00 -08:00
Juliusz Sosinowicz
335c51987e
openssh 9.6p1 fixes
...
- wolfSSL_DSA_set0_key: allow setting just the public key
- radix16: allow skipping the end of line whitespace
- Add openssh action
2024-02-01 11:39:56 +01:00
Daniel Pouzzner
f9bf96d9ba
Merge pull request #7187 from SparkiDev/sha256_intel_instrs
...
SHA-256: Implementation using Intel instructions
2024-01-31 19:15:43 -05:00
Daniel Pouzzner
1fda249468
Merge pull request #7189 from philljj/fix_static_nomalloc_build
...
Fix WOLFSSL_NO_MALLOC build.
2024-01-31 18:46:48 -05:00
Sean Parkinson
f48eb638da
TLS 1.3, HRR Cookie: send cookie back in new ClientHello
...
Make it mandatory that the cookie is sent back in new ClientHello when
seen in a HelloRetryRequest.
2024-02-01 07:49:37 +10:00
Daniel Pouzzner
3064d725b9
Merge pull request #7193 from bandi13/fixOpenWRTTests
...
Snapshots disappear after a while. Versioned releases stay.
2024-01-31 16:38:55 -05:00
Anthony Hu
dfc10741a5
Adding unknown extension callback to CertManager
2024-01-31 16:27:07 -05:00
Andras Fekete
65902308e8
Snapshots disappear after a while. Versioned releases stay.
2024-01-31 16:02:41 -05:00
Daniel Pouzzner
75bd1af110
Merge pull request #7179 from philljj/fix_ext_xmss_sigsleft
...
Fix ext_xmss SigsLeft.
2024-01-31 14:33:18 -05:00
David Garske
9e47703402
Template for TLS v1.2 only.
2024-01-31 10:13:31 -08:00
Daniel Pouzzner
e1ee5e4421
linuxkm: spruce up arch-dependent CFLAGS setup in linuxkm/Kbuild; add "failed:" to error messages in km_AesGcmEncrypt() and km_AesGcmDecrypt().
2024-01-31 11:49:46 -06:00
Daniel Pouzzner
f228a85cee
AES-XTS: fix FIPS gating to use defined(HAVE_FIPS), not defined(HAVE_FIPS_VERSION).
2024-01-30 17:16:37 -06:00
jordan
7ddf20851d
Fix WOLFSSL_NO_MALLOC build.
2024-01-30 09:00:02 -06:00
Juliusz Sosinowicz
48b99b0f10
Merge pull request #7185 from JacobBarthelmeh/zephyr
...
only download parts of zephyr sdk needed for test
2024-01-30 14:46:57 +01:00
Sean Parkinson
492490f7e6
SHA-256: Implementation using Intel instructions
...
Detects Intel SHA-256 instructions available for CPU.
Preferences implementation using Intel instructions.
2024-01-30 23:17:05 +10:00
Sean Parkinson
f7507f14cb
Merge pull request #7186 from douzzer/20240129-fix-wc_RsaFunction_ex
...
20240129-fix-wc_RsaFunction_ex
2024-01-30 23:14:52 +10:00
Daniel Pouzzner
3d3c07944e
wolfcrypt/src/ecc.c: fix logic around WOLF_CRYPTO_CB_ONLY_ECC in wc_ecc_shared_secret(), _ecc_make_key_ex(), wc_ecc_sign_hash(), and wc_ecc_verify_hash() (defects reported by -Wreturn-type, -Wmaybe-uninitialized around err, and a failure of ecc_onlycb_test()).
2024-01-29 22:30:33 -06:00
Daniel Pouzzner
67bbe1e1bb
wolfcrypt/src/rsa.c: in wc_RsaFunction_ex(), if defined(WOLF_CRYPTO_CB_ONLY_RSA), add clause to return NO_VALID_DEVID if key->devId == INVALID_DEVID. fixes "control reaches end of non-void function" in PRB-single-flag.txt.
2024-01-29 22:00:20 -06:00
Daniel Pouzzner
11e8a89f67
wolfcrypt/src/aes.c: coddle XCode (clang) to clear frivolous -Wparentheses-equality.
2024-01-29 17:58:13 -06:00
Daniel Pouzzner
6261108d49
linuxkm: fix line lengths throughout; in linuxkm/lkcapi_glue.c: fix/harmonize error catching, reporting, and error codes; further address peer review feedback.
2024-01-29 17:48:31 -06:00
David Garske
de91add3d9
Merge pull request #7182 from SparkiDev/armv8_32_align_chacha20_asm
...
ARMv8 32 bit ChaCha20 ASM: loading from in/out
2024-01-29 14:59:56 -08:00
JacobBarthelmeh
920abd8b46
only download parts of zephyr sdk needed for test
2024-01-29 15:02:58 -07:00
David Garske
de4a6f9e00
Merge pull request #7167 from SparkiDev/rsa_dec_check_d
...
RSA Decryption: check private value after decryption
2024-01-29 14:01:27 -08:00
Lealem Amedie
154841a083
MICROCHIP PIC24 support and example project
2024-01-29 12:50:00 -07:00
David Garske
a6326bd80a
Merge pull request #7183 from SparkiDev/regression_fixes_9
...
Regression testing fixes
2024-01-29 07:42:34 -08:00
David Garske
60de159707
Merge pull request #7176 from danielinux/iotsafe-sha384
...
IoT-Safe sha384+sha512 support
2024-01-29 07:35:50 -08:00
Sean Parkinson
13591dcae8
Regression testing fixes
...
internal.c: NO_CERT, privateKeySz not used.
./configure --disable-shared --disable-asn --disable-rsa --disable-ecc
--enable-psk
sp_int.c: fix when sp_gcm is available
./configure --disable-shared --disable-shared --disable-ecc
--disable-dh --disable-aes --disable-aesgcm --disable-sha512
--disable-sha384 --disable-sha --disable-poly1305 --disable-chacha
--disable-md5 --disable-sha3 --enable-cryptonly --disable-inline
--enable-rsavfy --disable-asn --disable-oaep --disable-rng
--disable-filesystem --enable-sp=rsa2048 --disable-sp-asm
--enable-sp-math
2024-01-29 23:05:46 +10:00
Daniel Pouzzner
856c9a9a7f
wolfcrypt/src/port/arm/armv8-aes.c: revert changes in a0415ce855.
2024-01-29 00:17:19 -06:00
Daniel Pouzzner
1fc67183a5
linuxkm: address peer review:
...
* support AES_ENCRYPTION_AND_DECRYPTION only if WC_AES_XTS_SUPPORT_SIMULTANEOUS_ENC_AND_DEC_KEYS is defined, and define it in linuxkm_wc_port.h if LINUXKM_LKCAPI_REGISTER.
* fix a typo in km_AesInitCommon().
* remove #if 0 code in lkcapi_glue.c.
2024-01-28 23:58:46 -06:00
Sean Parkinson
4585c6d508
ARMv8 32 bit ChaCha20 ASM: loading from in/out
...
Input and output buffers come from the application and are not
necessarily alighed.
Use instructions that allow unaligned access to these buffers.
2024-01-29 11:03:40 +10:00
Daniel Pouzzner
957fc7460c
linuxkm/lkcapi_glue.c: refactor AES-CBC, AES-CFB, and AES-GCM glue around struct km_AesCtx with separate aes_encrypt and aes_decrypt Aes pointers, and no cached key, to avoid AesSetKey operations at encrypt/decrypt time.
2024-01-27 23:16:02 -06:00
Daniel Pouzzner
8ae031a5ed
linuxkm/linuxkm_wc_port.h: improve my_memcpy(), my_memset(), and my_memmove() (CONFIG_FORTIFY_SOURCE workarounds) with copy-by-words codepaths.
2024-01-27 23:12:37 -06:00
Daniel Pouzzner
82d94dab68
linuxkm: move "#undef HAVE_PTHREAD" from linuxkm/module_hooks.c to wolfssl/wolfcrypt/settings.h.
2024-01-27 23:10:12 -06:00
Daniel Pouzzner
a0415ce855
wolfcrypt/src/port/arm/armv8-aes.c: fix for AesXts.aes_encrypt and AesXts.aes_decrypt.
2024-01-26 20:19:52 -06:00
Daniel Pouzzner
b1e5d0f9bb
linuxkm: completion and stabilization of LKCAPI integration for AES-CBC, AES-CFB, AES-GCM, and AES-XTS:
...
linuxkm/lkcapi_glue.c (added in earlier commit):
implement linuxkm_lkcapi_register() and linuxkm_lkcapi_unregister() with idempotency.
add AES-XTS algorithm glue and self-test implementations.
add per-algorithm gating: LINUXKM_LKCAPI_REGISTER_AESCBC, _AESCFB, _AESGCM, and _AESXTS.
carry forward philljj's implementations for AES-CBC, AES-CFB, and AES-GCM, with various cleanups.
linuxkm/module_hooks.c:
print the "wolfCrypt container hashes" message only if DEBUG_LINUXKM_PIE_SUPPORT is set.
render the FIPS version for the self-test success message using the HAVE_FIPS_VERSION* macros.
add a "skipping full wolfcrypt_test() ..." message for --disable-crypttests builds.
add CONFIG_FORTIFY_SOURCE gates.
configure.ac:
add support for --enable-linuxkm-lkcapi-register;
add AES-XTS to output config summary;
rename --enable-xts to --enable-aesxts (retaining old option for backward compatibility).
linuxkm/linuxkm_wc_port.h: add support for CONFIG_FORTIFY_SOURCE.
linuxkm/linuxkm_memory.c:
fix retvals in save_vector_registers_x86() (wc-style MEMORY_E, not sys-style ENOMEM).
add __my_fortify_panic() implementation.
linuxkm/Kbuild: for ENABLED_LINUXKM_PIE in rename-pie-text-and-data-sections recipe, create an .rodata.wolfcrypt section.
linuxkm/include.am: add linuxkm/lkcapi_glue.c to EXTRA_DIST.
wolfcrypt/test/test.c:
when defined(HAVE_FIPS_VERSION), inhibit a test clause in aes_xts_128_test() disallowed by FIPS ("FIPS AES-XTS main and tweak keys must differ").
fix out-of-order user message in ecc_test().
2024-01-26 20:01:19 -06:00
jordan
947528ee16
Fix ext_xmss SigsLeft.
2024-01-26 17:07:43 -06:00
Daniel Pouzzner
39c74a9bf8
AES-XTS:
...
split XtsAes.aes in two, XtsAes.aes_encrypt and XtsAes.aes_decrypt, and add AES_ENCRYPTION_AND_DECRYPTION option constant, to accommodate Linux kernel crypto API model.
in wc_AesXtsSetKeyNoInit(), add FIPS check that main and tweak keys differ, and allow setting encrypt and decrypt keys simultaneously using AES_ENCRYPTION_AND_DECRYPTION.
in wc_AesXtsEncrypt() and wc_AesXtsDecrypt(), error if the required subkey has not been set.
2024-01-26 15:22:34 -06:00
Daniel Pouzzner
ec60f91b4a
linuxkm: add linuxkm/lkcapi_glue.c.
2024-01-26 15:22:34 -06:00
Daniel Pouzzner
1f4cf4188d
linuxkm:
...
* LKCAPI integration tweaks for buildability and streamlining.
* add DEBUG_VECTOR_REGISTER_ACCESS_FUZZING && !DEBUG_VECTOR_REGISTER_ACCESS, with a kernel-compatible implementation of SAVE_VECTOR_REGISTERS2_fuzzer().
2024-01-26 15:22:34 -06:00
Daniel Pouzzner
6e559ed015
linuxkm: squash of philljj's POC work integrating libwolfssl.ko with crypto_register_skcipher/crypto_register_aead, start 2022-12-26, end 2023-01-14.
2024-01-26 15:22:34 -06:00
Anthony Hu
fe87f16114
Fixes that prevent memory leaks when using OQS.
...
Fixes ZD 17177.
2024-01-26 14:54:01 -05:00
JacobBarthelmeh
3db58af4f8
Merge pull request #7173 from gojimmypi/PR-Espressif-SHA-updates
...
Improved Espressif SHA HW/SW selection
2024-01-26 11:51:15 -07:00
Daniele Lacamera
72e34a829a
Fixed wrong define
2024-01-26 16:35:08 +01:00
JacobBarthelmeh
db3873ff40
Merge pull request #7172 from bandi13/fixUninitVar
...
Fix compilation errors about uninitialized variables
2024-01-26 08:32:41 -07:00
Daniele Lacamera
5b3ba8f4bb
Removed "256-bit hash" references from doxygen
2024-01-26 10:22:40 +01:00
Daniele Lacamera
6dab75368d
[IoT-Safe] Add support sha384 + sha512
2024-01-26 10:20:03 +01:00
gojimmypi
ac6181d7ae
Improved Espressif SHA HW/SW selection
2024-01-25 15:23:58 -08:00
JacobBarthelmeh
578735e06c
Merge pull request #7169 from julek-wolfssl/gh/7160
...
BIO_BIO: BIO_{write|read} on a BIO pair should wrap around ring buffer
2024-01-25 12:08:10 -08:00
lealem47
a13d107db4
Merge pull request #7171 from dgarske/stm32_cube_template
...
Improvements to the STM32Cube template
2024-01-25 10:58:46 -07:00
JacobBarthelmeh
4c7f038149
Merge pull request #7161 from SparkiDev/xmss
...
XMSS implementation
2024-01-25 08:41:13 -08:00
Andras Fekete
4971b9a567
Fix compilation errors about uninitialized variables
...
When compiling with '--enable-all CFLAGS=-Og' there were a ton of errors that needed fixing.
2024-01-25 09:49:30 -05:00
Juliusz Sosinowicz
4f1d777090
BIO_BIO: BIO_{write|read} on a BIO pair should wrap around ring buffer
...
- BIO_nread0 should return 0 when no data to read and -2 when not initialized
2024-01-25 13:46:45 +01:00
Sean Parkinson
a5961907b0
XMSS implementation
...
Supporting code for wolfSSL C implementation of XMSS.
2024-01-25 11:21:39 +10:00
David Garske
7305583f72
Improvements to the STM32Cube template. Fix defaults for ASN template and SNI. Disable Shake by default. Add comment about AES CFB.
2024-01-24 10:35:32 -08:00
JacobBarthelmeh
199a5476ec
Merge pull request #7166 from miyazakh/gcc5_strict-aliasing
...
fix strict-aliasing rules warning on gcc 5.x
2024-01-24 10:18:13 -08:00
Sean Parkinson
999f84518c
RSA Decryption: check private value after decryption
2024-01-24 16:09:15 +10:00
Hideki Miyazaki
00f4afb5ea
fix strict-aliasing rules warning
2024-01-24 12:37:16 +09:00
JacobBarthelmeh
478c0633e7
Merge pull request #7159 from dgarske/features_20240122
...
Add PK Callback CMake support. Document `wc_RsaDirect`
2024-01-23 13:08:03 -08:00
David Garske
fa87e227b4
Restore useful comments above wc_RsaDirect in the .c file.
2024-01-23 08:39:35 -08:00
JacobBarthelmeh
3cbffd33b1
Merge pull request #7162 from per-allansson/dtls13-fips-missing-return
...
Fix missing return in DTLS1.3 / FIPS code
2024-01-23 08:30:11 -08:00
JacobBarthelmeh
1574de1008
Merge pull request #7128 from embhorn/zd17251
...
XC32 compiler version 4.x compatibility
2024-01-23 08:20:39 -08:00
JacobBarthelmeh
938698ec6b
Merge pull request #7157 from philljj/fix_zephyr_benchmark_rsa
...
zephyr samples: fix wolfssl_benchmark RSA.
2024-01-23 08:17:10 -08:00
JacobBarthelmeh
78f7454043
Merge pull request #7154 from anhu/EccKeyParamCopy_error
...
Fix missing heap hint in `EccKeyParamCopy`
2024-01-23 08:11:35 -08:00
David Garske
3b20f49544
Merge pull request #7139 from douzzer/20230118-fix-_sp_mont_red-WOLFSSL_NO_CT_OPS
...
20230118-fix-_sp_mont_red-WOLFSSL_NO_CT_OPS
2024-01-23 07:18:25 -08:00
Per Allansson
92d7815b5c
Fix missing return in DTLS1.3 / FIPS code
2024-01-23 08:35:07 +01:00
David Garske
916c22e021
Add PK (public key) callback support to CMake.
2024-01-22 13:42:31 -08:00
David Garske
3d62896137
Add documentation for wc_RsaDirect.
2024-01-22 13:41:25 -08:00
David Garske
dcc946575b
Fix missing heap hint in EccKeyParamCopy. The XFREE is required or it will leak memory allocated in ASNToHexString. This only applies to WOLFSSL_CUSTOM_CURVES && !WOLFSSL_ASN_TEMPLATE.
2024-01-22 13:18:24 -08:00
Sean Parkinson
b0de0a1c95
Merge pull request #7143 from julek-wolfssl/zd/17303
...
EVP_Cipher: correct parameter checking
2024-01-23 07:15:20 +10:00
jordan
920aaebed7
zephyr samples: fix wolfssl_benchmark RSA.
2024-01-22 14:59:09 -06:00
JacobBarthelmeh
eb1fff3ad3
Merge pull request #7141 from julek-wolfssl/zd/17249
...
EarlySanityCheckMsgReceived: version_negotiated should always be checked
2024-01-22 12:18:57 -08:00
JacobBarthelmeh
f2a76a0630
Merge pull request #7156 from bandi13/checkNullInput
...
Check NULL input
2024-01-22 12:07:20 -08:00
Andras Fekete
5c75ca539e
Check NULL input
2024-01-22 12:45:42 -05:00
JacobBarthelmeh
0c150d2391
Merge pull request #7150 from dgarske/getenv
...
Fix build with `NO_STDIO_FILESYSTEM` and improve checks for `XGETENV`
2024-01-22 08:33:24 -08:00
JacobBarthelmeh
12dafec3aa
Merge pull request #7149 from dgarske/psa_cryptocb
...
Remove the PSA restriction to allow use with crypto callbacks
2024-01-22 08:24:51 -08:00
JacobBarthelmeh
2617669302
Merge pull request #7152 from douzzer/20240120-multi-test-fixes
...
20240120-multi-test-fixes
2024-01-22 08:19:23 -08:00
Anthony Hu
ccbb726859
Remove dead code in EccKeyParamCopy
...
Found with:
./configure --enable-ecccustcurves --enable-asn=original CFLAGS=-DWOLFSSL_ECC_CURVE_STATIC
2024-01-22 10:27:59 -05:00
Juliusz Sosinowicz
fc7143a8f4
Code review
2024-01-22 16:08:06 +01:00
Sean Parkinson
d2d653cfdc
Merge pull request #7145 from douzzer/20240119-DoTls13CertificateVerify-CreateSigData-error-handling
...
20240119-DoTls13CertificateVerify-CreateSigData-error-handling
2024-01-22 07:36:49 +10:00
Sean Parkinson
b0d64b419d
Merge pull request #7084 from julek-wolfssl/set-cipher-ssl
...
Allow SetCipherList to operate on SSL without modifying on SSL_CTX
2024-01-22 07:31:22 +10:00
Daniel Pouzzner
2edd18c49d
src/x509.c: fix nullPointerRedundantCheck in wolfSSL_X509V3_set_ctx(). also adds thorough WOLFSSL_MSG() coverage for failures.
2024-01-20 13:08:21 -06:00
David Garske
d043333bee
Merge pull request #7148 from gojimmypi/PR-fix-Espressif-cmake
...
Fix Espressif component cmake for environment variable source
2024-01-19 13:27:32 -08:00
David Garske
37fbb4fbae
Merge pull request #7146 from kareem-wolfssl/zd17295
...
Remove git ignored files from IAR-EWARM projects.
2024-01-19 13:13:06 -08:00
David Garske
76550465bd
Fixes build with NO_STDIO_FILESYSTEM defined.
2024-01-19 12:49:53 -08:00
David Garske
111f584d99
Remove the PSA restriction to allow use with crypto callbacks.
2024-01-19 12:15:40 -08:00
David Garske
a4affd9431
Improve use of XGETENV in wolfSSL_RAND_file_name to check for macro.
2024-01-19 12:13:19 -08:00
gojimmypi
92ab2eaca3
Fix Espressif component cmake for environment variable source
2024-01-19 11:54:10 -08:00
David Garske
6b8280f663
Merge pull request #7144 from bandi13/20240119-codesonar
...
20240119 codesonar
2024-01-19 09:35:02 -08:00
David Garske
a3a7012c81
Merge pull request #7136 from jpbland1/x509-new-ex
...
add heap hint support for a few of the x509 functions
2024-01-19 09:29:47 -08:00
Kareem
f1e833005b
Remove git ignored files from IAR-EWARM projects.
2024-01-19 10:24:50 -07:00
Daniel Pouzzner
9aa99c0c9a
src/tls13.c: in DoTls13CertificateVerify(), add missing error handling in several calls to CreateSigData().
2024-01-19 11:12:23 -06:00
John Bland
66f04958e3
use wolfSSL_CTX_new_ex for heap hint support
2024-01-19 11:20:50 -05:00
Andras Fekete
dbc209d8ea
Always initialize 'decryptedKey'
...
Warning 750167.5627928
2024-01-19 10:58:29 -05:00
Andras Fekete
7069a1805a
Avoid "Use after free"
...
Warning 544767.5627232
2024-01-19 10:47:38 -05:00
Andras Fekete
2c162ffb97
Make sure aes->rounds is initialized
...
Warning 684346.5627323
2024-01-19 10:39:33 -05:00
Andras Fekete
726e7026cb
Uninitialized variable because we don't check return value
...
Warning 544870.5627882
2024-01-19 10:31:20 -05:00
Juliusz Sosinowicz
1288d71132
Address code review
2024-01-19 15:59:22 +01:00
Juliusz Sosinowicz
f6ef146149
EarlySanityCheckMsgReceived: version_negotiated should always be checked
...
Multiple handshake messages in one record will fail the MsgCheckBoundary() check on the client side when the client is set to TLS 1.3 but allows downgrading.
--> ClientHello
<-- ServerHello + rest of TLS 1.2 flight
Client returns OUT_OF_ORDER_E because in TLS 1.3 the ServerHello has to be the last message in a record. In TLS 1.2 the ServerHello can be in the same record as the rest of the server's first flight.
2024-01-19 14:57:35 +01:00
Juliusz Sosinowicz
afd0e5af4e
Refactor haveAnon into useAnon
...
(ctx->|ssl->options.)useAnon means that the user has signalled that they want anonymous ciphersuites
2024-01-19 14:53:33 +01:00
Juliusz Sosinowicz
b8b847bbcf
Allow SetCipherList to operate on SSL without modifying on SSL_CTX
2024-01-19 14:53:28 +01:00
Juliusz Sosinowicz
67700a1d70
Add libssh2 test
2024-01-19 12:46:53 +01:00
Juliusz Sosinowicz
e438131a3b
EVP_Cipher: correct parameter checking
...
EVP_Cipher(ctx, NULL, NULL, 0) is a valid call for all algorithms. For none-AEAD it results in a no-op.
2024-01-19 12:32:17 +01:00
David Garske
ac81d9d29c
Merge pull request #7110 from Frauschi/pq_secure_element
...
PQC: add CryptoCb support for PQC algorithms
2024-01-18 13:29:28 -08:00
Anthony Hu
9be390250d
Adding support for dual key/signature certificates. ( #7112 )
...
Adding support for dual key/signature certificates with X9.146. Enabled with `--enable-dual-alg-certs` or `WOLFSSL_DUAL_ALG_CERTS`.
2024-01-18 13:20:57 -08:00
David Garske
8a45f43eb0
Merge pull request #7131 from bandi13/fips-check-upgrades
...
Fips check upgrades
2024-01-18 08:21:29 -08:00
David Garske
ec96fcdbae
Merge pull request #7138 from ejohnstown/crl-mon-test-fix
...
CRL Monitor Test Fix
2024-01-18 08:20:05 -08:00
Tobias Frauenschläger
68ea31c52a
Fix install step for liboqs port header
...
Make sure the header file of the liboqs port is properly installed
during a call to `make install`.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2024-01-18 17:07:39 +01:00
Tobias Frauenschläger
4d259da60a
PQC: CryptoCb support for KEM algorithm Kyber
...
Add support for crypto callback and device id for all three Kyber PQC KEM
function calls.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2024-01-18 17:02:49 +01:00
Tobias Frauenschläger
8e6d151403
PQC: CryptoCb support for signature algorithms
...
Add initial support of the crypto callback API to the two PQC signature
algorithms Dilithium and Falcon. This ultimatelly enables the usage of
external hardware modules (e.g. secure elements) for these algorithms.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2024-01-18 17:02:38 +01:00
Daniel Pouzzner
9d56de200e
wolfcrypt/src/sp_int.c: in _sp_mont_red(), gate calls to ctMaskIntGTE() on !WOLFSSL_NO_CT_OPS.
2024-01-18 00:36:52 -06:00
John Safranek
b66a108e97
CRL Monitor Test Fix
...
1. For Mach and FreeBsd builds, add the function link_file() which makes
a hard link for a file.
2. Add a macro STAGE_FILE that either calls copy_file or link_file
depending on doing a Mach or FreeBSD build or not.
This is to work around how the CRL Monitor is detecting file changes
made by the CRL monitor test in the testsuite. Linux and Windows are
detecting the file copies and deletes, and how macOS detects them.
kevent sees the link as a single change to the parent directory and
reads it. When you copy the file, kevent sees the new file getting
opened and triggering the file update.
2024-01-17 21:38:26 -08:00
John Bland
41ea1109ec
update uses of wolfSSL_X509_new and wolfSSL_X509_d2i
...
where heap doesn't require a new ex function or struct field to avoid size increase
2024-01-17 18:46:24 -05:00
David Garske
4f8fd98d0d
Merge pull request #7109 from Frauschi/falcon_compat
...
PQC: Update Falcon support to match OQS
2024-01-17 14:18:32 -08:00
Andras Fekete
41b70b8386
Giving up and reverting back to what it was.
2024-01-17 17:03:37 -05:00
David Garske
d5d279454b
Merge pull request #7137 from douzzer/20240117-nightly-fixes
...
20240117-nightly-fixes
2024-01-17 13:57:48 -08:00
David Garske
5ef6ed56dc
Merge pull request #7135 from lealem47/returnParity
...
Return correct error code in TEMPLATE DecodeECC_DSA_Sig_Ex
2024-01-17 12:34:52 -08:00
Andras Fekete
81aa495b51
Fix missing tags
2024-01-17 14:46:19 -05:00
Daniel Pouzzner
64667a5595
src/crl.c: fix "null pointer passed as argument 2" in new XMEMCPY() call in WC_RSA_PSS path of DupCRL_Entry(), added in b140f93b17, detected by gcc 14.0.0_pre20240107 p15 with sanitizers.
2024-01-17 13:38:05 -06:00
John Bland
03f32b623f
update based on PR comments
2024-01-17 13:22:58 -05:00
David Garske
0b167faa56
Merge pull request #7133 from miyazakh/arm_isb
...
fix unsupported arm instruction compile error
2024-01-17 09:44:49 -08:00
John Bland
d1a3646d5c
add heap hint support for a few of the x509 functions
2024-01-17 11:26:52 -05:00
Tobias Frauenschläger
b2888a9467
Update Falcon support to match OQS
...
Update the OIDs and related variables to match the current OQS values.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2024-01-17 16:54:26 +01:00
Lealem Amedie
cbc8e98876
Return correct error code in TEMPLATE DecodeECC_DSA_Sig_Ex
2024-01-17 08:49:09 -07:00
Hideki Miyazaki
b2f971555e
isb available > armv6
2024-01-17 13:39:48 +09:00
David Garske
089468fbf1
Merge pull request #7132 from ejohnstown/x25519-ecdhe-psk
...
ECDHE-PSK with x25519
2024-01-16 20:16:01 -08:00
David Garske
11029127df
Merge pull request #7119 from JacobBarthelmeh/crl
...
support for RSA-PSS signatures with CRL
2024-01-16 15:23:16 -08:00
Hideki Miyazaki
1af3502204
Merge pull request #7115 from TakayukiMatsuo/jpcmac
...
Update cmac-api documents
2024-01-17 08:18:11 +09:00
John Safranek
746ffac84a
ECDHE-PSK with x25519
...
1. Add missing assignment of the WOLFSSL object's ecdhCurveOid value. It
is set correctly in the previous cases, but got missed for ECDHE-PSK.
2. Add test cases to the unit testing.
2024-01-16 15:18:05 -08:00
JacobBarthelmeh
b140f93b17
refactor sigParams allocation and adjust test file name
2024-01-16 14:41:24 -07:00
TakayukiMatsuo
cdc46a7ddb
Update cmac-api documents
2024-01-17 06:21:03 +09:00
Andras Fekete
79272b5861
Only take the latest from the repo. Don't need old history.
2024-01-16 15:41:15 -05:00
David Garske
7a77d64d56
Merge pull request #7059 from bigbrett/cryptocb-oneshot-cmac
...
Add cryptoCb hook to one-shot CMAC functions
2024-01-16 12:17:05 -08:00
Andras Fekete
a51c8d54d2
Standardize script style
2024-01-16 11:58:34 -05:00
Andras Fekete
5fc32a1124
Add in 'make check' bypass
2024-01-16 11:58:10 -05:00
JacobBarthelmeh
114d11a8d8
adding RSA-PSS macro guard around CRL use
2024-01-15 15:33:01 -07:00
JacobBarthelmeh
b38e20a721
add crl_rsapss.pem to make dist
2024-01-15 15:19:04 -07:00
David Garske
d4272bb48d
Merge pull request #7129 from bandi13/configurePrintout
...
Print out how ./configure was called
2024-01-15 11:01:19 -08:00
Brett Nicholas
abbf9f2b77
Add cryptoCb hooks to one-shot CMAC functions; add CMAC coverage to cryptoCb tests; add context argument to CMAC generate_ex
2024-01-15 11:52:17 -07:00
Andras Fekete
b5015df35f
Print out how ./configure was called
...
This will make debugging and tracing back from logs much easier
2024-01-15 10:07:00 -05:00
JacobBarthelmeh
5fc71161e9
add crl rsa pss for asn=original
2024-01-11 16:50:16 -07:00
Sean Parkinson
49d258f01a
Merge pull request #7124 from SKlimaRA/SKlimaRA/tls13SessionTicketDoubleFree
...
fixed double free happening during EvictSessionFromCache
2024-01-12 09:09:29 +10:00
Sean Parkinson
9137ed671e
Merge pull request #7107 from ejohnstown/fips-script
...
FIPS Script
2024-01-12 05:07:04 +10:00
Stanislav Klima
909b437571
cleared ticket and ticketNonce
2024-01-11 19:59:12 +01:00
Stanislav Klima
e63c50b1f3
fixed double free happening during EvictSessionFromCache
2024-01-11 19:52:03 +01:00
Sean Parkinson
8c6de41eb9
Merge pull request #7051 from JacobBarthelmeh/mb
...
fix and enhancement for AES-GCM use with Xilsecure
2024-01-12 03:44:43 +10:00
Sean Parkinson
5e8fca420e
Merge pull request #7127 from dgarske/cryptocb_defhash
...
Fix for crypto callbacks to allow invalid devId for non _ex single shot hash functions
2024-01-11 11:22:26 +10:00
Eric Blankenhorn
535d507c16
XC32 compiler version 4.x compatibility
2024-01-10 16:34:40 -08:00
David Garske
340aed5498
Fix for crypto callbacks to allow invalid devId for non _ex single shot hash functions.
2024-01-10 15:33:10 -08:00
John Safranek
d9751aa103
FIPS Script
...
1. Update fips-check.sh for checking out v5.2.0.1 of the fips.c file.
2024-01-10 15:12:59 -08:00
Sean Parkinson
06d7b14af1
Merge pull request #7122 from julek-wolfssl/curl-deps
...
Add curl dependencies
2024-01-11 01:35:07 +10:00
David Garske
a2cfa35dc1
Merge pull request #7123 from bandi13/liberationFromGitHooks
...
Since no one uses this, we should remove commit hooks
2024-01-09 23:03:08 -08:00
David Garske
06a32d3437
Merge pull request #7097 from lealem47/removeUserCrypto
...
Remove user-crypto functionality and Intel IPP support
2024-01-09 17:33:28 -08:00
Andras Fekete
f3761ed28e
Since no one uses this, we should remove commit hooks
2024-01-09 20:31:44 -05:00
Juliusz Sosinowicz
cae231b557
Add curl dependencies
2024-01-09 22:47:59 +01:00
JacobBarthelmeh
cd07e32b13
update crl files and add in compat support for RSA-PSS
2024-01-08 16:38:11 -08:00
billphipps
5631bc9b2d
Merge pull request #7118 from douzzer/20240107-fix-linuxkm-commercial-POC
...
20240107-fix-linuxkm-commercial-POC
2024-01-07 14:33:06 -05:00
Daniel Pouzzner
d722276c50
linuxkm/module_hooks.c: add proper gating for my_fpregs_[un]lock().
2024-01-07 11:16:43 -06:00
Sean Parkinson
0ebf82474a
Merge pull request #7117 from douzzer/20240105-linuxkm-commercial-POC
...
20240105-linuxkm-commercial-POC
2024-01-07 15:15:56 +10:00
Sean Parkinson
08aa39f538
Merge pull request #7094 from dgarske/armasm_thumb_aes
...
Fixes for ARM ASM with Thumb
2024-01-07 15:10:16 +10:00
Daniel Pouzzner
9c36bb9073
linuxkm: add WOLFSSL_COMMERCIAL_LICENSE alternative to kernel_fpu_begin()/kernel_fpu_end() in save_vector_registers_x86()/restore_vector_registers_x86(): allocate wc_linuxkm_fpu_savebufs as a buffer for os_xsave()/os_xrstor(), and use fpregs_lock()/fpregs_unlock() to inhibit softirqs/preemption.
2024-01-05 23:21:24 -06:00
JacobBarthelmeh
d58acef895
add RSA-PSS CRL test case
2024-01-05 14:47:53 -08:00
JacobBarthelmeh
74f0625c89
add native asn template RSA-PSS support with CRL
2024-01-05 14:25:12 -08:00
Daniel Pouzzner
d5d476a3a1
Merge pull request #7113 from bandi13/codeSonarFixes
...
Leak
2024-01-05 12:38:17 -05:00
David Garske
8026aa44c8
Merge pull request #7114 from douzzer/20240104-with-liboqs-clang-tidy
...
20240104-with-liboqs-clang-tidy
2024-01-05 09:17:41 -08:00
David Garske
9e28d5010c
Fixes for ARM ASM with Thumb. Fix for AES ECB build with Thumb. Add alignment to thumb2 AES tables. Refactor alignment macros and expose generic alignment macro XALIGNED. The WOLFSSL_USE_ALIGN still controls alignment enablement in wolfSSL/wolfCrypt. ZD 17225 and ZD 17226
2024-01-05 08:16:02 -08:00
Andras Fekete
f84fa8dd8d
Uninitialized variable
...
Warning 581199.5810097
2024-01-04 17:13:28 -05:00
David Garske
77818d9c54
Merge pull request #6939 from danielinux/iotsafe_4B_ID
...
IoT-SAFE: allow for 4B ID fields
2024-01-04 13:57:26 -08:00
Daniel Pouzzner
7f53bcc4d0
fixes for clang-tidy reported defects and misstylings --with-liboqs:
...
* readability-named-parameter (style)
* bugprone-sizeof-expression (true bugs)
* clang-analyzer-deadcode.DeadStores (true bugs)
* clang-analyzer-core.NonNullParamChecker (true bug)
* clang-diagnostic-newline-eof (style)
* clang-diagnostic-shorten-64-to-32 (true but benign in practice)
fixes for sanitizer reported defects --with-liboqs: null pointer memcpy()s in TLSX_KeyShare_GenPqcKey() and server_generate_pqc_ciphertext().
fixes for silent crypto-critical failure in wolfSSL_liboqsGetRandomData(): refactor to accommodate oversize numOfBytes, and abort() if wc_RNG_GenerateBlock() returns failure.
2024-01-04 15:57:09 -06:00
Sean Parkinson
9e468a900b
Merge pull request #7096 from julek-wolfssl/zd/17219
...
Add fencing to ClientSessionToSession()
2024-01-05 07:24:00 +10:00
Sean Parkinson
a8c94cf22b
Merge pull request #7102 from julek-wolfssl/gh/7093
...
server: allow reading 0-RTT data after writing 0.5-RTT data
2024-01-05 07:20:53 +10:00
Sean Parkinson
32f3f7daab
Merge pull request #7111 from Frauschi/fix_implicit_conversion
...
Fix implicit type conversion
2024-01-05 07:17:31 +10:00
Daniele Lacamera
bda44eda4a
IoT-SAFE: allow for 4B ID fields
2024-01-04 19:18:40 +01:00
Tobias Frauenschläger
3fbbc7c1bb
Fix implicit conversion.
...
Fix implicit type conversion from size_t to word32 in liboqs.c source
file to make it build with clang.
Fixes #7108 .
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2024-01-04 16:55:19 +01:00
Juliusz Sosinowicz
0e1573accc
Code review
2024-01-04 13:49:47 +01:00
Juliusz Sosinowicz
14c812cdb7
Code review
...
Add server side check
2024-01-04 13:19:44 +01:00
Juliusz Sosinowicz
5bdcfaa5d0
server: allow reading 0-RTT data after writing 0.5-RTT data
2024-01-04 13:19:44 +01:00
Daniel Pouzzner
9db20774d8
Merge pull request #7099 from jpbland1/tls13-bounds-check
...
TLS13 padding bounds check
2024-01-04 01:09:36 -05:00
John Bland
b37716f5ce
refactor and remove word16 index
2024-01-03 19:19:13 -05:00
John Bland
245c87fe8f
clean up variable definitions
2024-01-03 17:39:20 -05:00
John Bland
e1435e96d2
do bounds check on full word32 size to match
...
inputBuffer length
2024-01-03 17:21:08 -05:00
JacobBarthelmeh
3f10496757
add weak source of entropy on microblaze to test with
2024-01-03 13:35:00 -08:00
Daniel Pouzzner
bcfaf0372c
Merge pull request #7026 from Frauschi/liboqs
...
Improve liboqs integration
2024-01-03 16:20:26 -05:00
Sean Parkinson
52db533d9b
Merge pull request #7106 from bandi13/20231114-codesonar-fixes
...
20231114 codesonar fixes
2024-01-04 07:16:33 +10:00
Sean Parkinson
100c2ecd6a
Merge pull request #7091 from JacobBarthelmeh/forcezero
...
SHA256 uses ForceZero now too
2024-01-04 07:06:44 +10:00
Daniel Pouzzner
7e60b029c2
Merge branch 'master' into liboqs
2024-01-03 15:56:05 -05:00
Andras Fekete
e5d8ce9983
Fix memset size
2024-01-03 11:09:20 -05:00
Andras Fekete
d164a6c543
Buffer Overrun
...
Warning 545843.5806721
2024-01-03 10:00:31 -05:00
Andras Fekete
b206e074fc
Uninitialized Variable
...
Warning 545067.3236517
2024-01-03 09:59:18 -05:00
Andras Fekete
f5c3fcfec4
Uninitialized variable
...
Warning 581107.3236416
2024-01-03 09:59:18 -05:00
Andras Fekete
c404df78b1
Uninitialized variable
...
Warning 581196.3236230
2024-01-03 09:59:18 -05:00
Andras Fekete
f00c5eb95d
Fix double free
...
Warning 546055.3229451
2024-01-03 09:59:18 -05:00
Daniel Pouzzner
461cf9ea71
Merge pull request #7103 from philljj/fix_infer_issues
...
Fix infer issues
2024-01-02 15:40:24 -05:00
jordan
e175004f85
Fix Infer Uninitialized Values.
2024-01-02 12:16:20 -06:00
JacobBarthelmeh
3901fa6a96
fix check on non aad use
2024-01-02 08:50:59 -08:00
JacobBarthelmeh
f8dbc7f15c
use of device key with AES-GCM and add way to avoid malloc for tag
2024-01-02 08:50:59 -08:00
JacobBarthelmeh
567243d257
touch up autoconf build with xilinx and sp macro guards
2024-01-02 08:50:59 -08:00
Daniel Pouzzner
c8188eaabd
Merge pull request #7100 from philljj/zd17237
...
Fix uninitialized keyUsage in DecodeKeyUsage.
2024-01-02 01:51:45 -05:00
Daniel Pouzzner
6de275111b
Merge pull request #7101 from miyazakh/ra_fsp3p5
...
fix include path for FSP 3.5 on Renesas RA6M4
2024-01-02 01:18:18 -05:00
David Garske
faeae02030
Merge pull request #7104 from douzzer/20231227-cppcheck-2v13v0
...
20231227-cppcheck-2v13v0
2023-12-28 18:03:26 -08:00
Daniel Pouzzner
b17ec3b4bc
cppcheck-2.13.0 mitigations peer review:
...
* add explanation in DoSessionTicket() re autoVariables.
* re-refactor ECC_KEY_MAX_BITS() in ecc.c to use two separate macros, ECC_KEY_MAX_BITS() with same definition as before, and ECC_KEY_MAX_BITS_NONULLCHECK().
* in rsip_vprintf() use XVSNPRINTF() not vsnprintf().
* in types.h, fix fallthrough definition of WC_INLINE macro in !NO_INLINE cascade to be WC_MAYBE_UNUSED as it is when NO_INLINE.
2023-12-28 16:38:47 -06:00
Daniel Pouzzner
44b18de704
fixes for cppcheck-2.13.0 --force:
...
* fix null pointer derefs in wc_InitRsaKey_Id() and wc_InitRsaKey_Label() (nullPointerRedundantCheck).
* fix use of wrong printf variant in rsip_vprintf() (wrongPrintfScanfArgNum).
* fix wrong printf format in bench_xmss_sign_verify() (invalidPrintfArgType_sint).
* add missing WOLFSSL_XFREE_NO_NULLNESS_CHECK variants of XFREE() (WOLFSSL_LINUXKM, FREESCALE_MQX, FREESCALE_KSDK_MQX).
* suppress false-positive uninitvar on "limit" in CheckTLS13AEADSendLimit().
* suppress true-but-benign-positive autoVariables in DoClientHello().
* in wolfcrypt/src/ecc.c, refactor ECC_KEY_MAX_BITS() as a local function to resolve true-but-benign-positive identicalInnerCondition.
* refactor flow in wc_ecc_sign_hash_ex() to resolve true-but-benign-positive identicalInnerCondition.
2023-12-28 15:06:21 -06:00
Hideki Miyazaki
e3346fe3c4
fix include path for FSP 3.5
2023-12-28 16:00:05 +09:00
jordan
46bf30ca77
Fix uninitialized keyUsage in DecodeKeyUsage.
2023-12-27 22:58:52 -06:00
Daniel Pouzzner
457188f55e
Merge pull request #7070 from dgarske/cryptocb_moreinfo
...
Fixes for TLS with crypto callbacks
2023-12-27 18:55:56 -05:00
David Garske
1c4d7285d3
Add documentation for HKDF functions. Improve param comments for devId.
2023-12-27 13:56:40 -08:00
lealem47
fc3977fc77
Merge pull request #7098 from dgarske/stm32_pka
...
Fixes for STM32 PKA
2023-12-27 14:36:53 -07:00
John Bland
e641c6b738
when removing the padding for the TLS13 verify message
...
step, check that the index doesn't wrap around due to a malformed packet
2023-12-27 16:06:40 -05:00
David Garske
cca6cc0495
Make new HDFK _ex functions public.
2023-12-27 11:40:29 -08:00
David Garske
c37edb09f7
Fix STM32 PKA V2 (STM32U5) point multiply missing order/coefB.
2023-12-27 11:37:16 -08:00
Lealem Amedie
837452b1ca
Remove user-crypto functionality and Intel IPP support
2023-12-27 12:24:19 -07:00
David Garske
be8000d5f7
Add useful information about single precision math and document options for enabling additional curves/key sizes.
2023-12-27 10:27:56 -08:00
David Garske
0d057099af
Fix line lengths.
2023-12-27 10:12:52 -08:00
David Garske
65ba8bd6ba
Improve detection of FP_MAX_BITS for RSA or DH.
2023-12-27 10:11:06 -08:00
David Garske
3a798e148b
Fix STM32 PKA ECC cast warning.
2023-12-27 09:57:40 -08:00
David Garske
b86dfffdbe
Improve the TLS v1.3 expand key label warning for possible use of uninitialized "hash".
2023-12-27 09:52:56 -08:00
Juliusz Sosinowicz
157753defe
Detect if using C99 and use correct inline asm notation
2023-12-27 18:02:13 +01:00
Juliusz Sosinowicz
4b21cf3efc
Add fencing to ClientSessionToSession()
...
Prevent memory access before clientSession->serverRow and clientSession->serverIdx are sanitized.
Fixes ZD17219
Co-authored-by: Daniele Lacamera <dan@danielinux.net >
2023-12-27 16:23:52 +01:00
David Garske
b8392ef659
Merge pull request #7092 from douzzer/20231224-clang-unreachable-code-aggressive
...
20231224-clang-unreachable-code-aggressive
2023-12-26 14:56:42 -08:00
Daniel Pouzzner
e68facd889
src/ssl.c: in wolfSSL_curve_is_disabled(), fix shiftTooManyBitsSigned.
2023-12-25 00:27:49 -06:00
Daniel Pouzzner
8a32e7f3f9
fixes for clang -Wunreachable-code-aggressive:
...
tests/suites.c: in SuiteTest(), swap order of (void)s and return.
wolfcrypt/src/chacha.c: gate out unreachable C wc_Chacha_encrypt_bytes() call in wc_Chacha_Process, and gate out unused implementations of wc_Chacha_wordtobyte() and wc_Chacha_encrypt_bytes(), when defined(USE_INTEL_CHACHA_SPEEDUP).
wolfcrypt/src/sha256.c and wolfcrypt/src/sha512.c: fix logic in Sha256_SetTransform() and Sha512_SetTransform() to make the AVX1_RORX implementations accessible. also add a missing Transform_Sha512_Len_p = NULL in the C path of Sha512_SetTransform().
wolfssl/internal.h: for the fallback definition of wolfSSL_curve_is_disabled, use an inline function instead of a compound-clause macro, because clang isn't smart enough to treat the compound expression as a bare constant zero, producing a lame-positive -Wunreachable-code.
2023-12-25 00:23:37 -06:00
JacobBarthelmeh
a97ee9d220
SHA256 uses ForceZero now too
2023-12-22 15:09:34 -08:00
David Garske
d9ac8b5422
Peer review fixes. Fix issues with Tls13HKDFExpandKeyLabel. Fix crypto callback line lengths.
2023-12-22 14:16:59 -08:00
JacobBarthelmeh
daf1d1728f
Merge pull request #7090 from douzzer/20231222-clang-unreachable-code-aggressive
...
20231222-clang-unreachable-code-aggressive
2023-12-22 14:51:20 -07:00
Daniel Pouzzner
e65e9f11c7
fixes for clang -Wunreachable-code-aggressive (-Wunreachable-code/clang-diagnostic-unreachable-code in src/ssl.c:wolfSSL_CTX_load_verify_buffer_ex() and -Wunreachable-code/clang-diagnostic-unreachable-code-return in api.c:myCEKwrapFunc()).
2023-12-22 14:12:13 -06:00
Daniel Pouzzner
59cdd5c70f
Merge pull request #7082 from bandi13/ARIA_Sign_fix
...
Aria sign fix
2023-12-21 19:01:54 -05:00
Sean Parkinson
f77f7c70d3
Merge pull request #7018 from dgarske/ti_aes
...
Fixes for TI AES and SHA
2023-12-22 07:55:00 +10:00
Sean Parkinson
f5ff72aa56
Merge pull request #7087 from dgarske/cryptocb_sha1
...
Allow crypto callbacks with SHA-1 HW
2023-12-22 07:54:50 +10:00
Andras Fekete
b5592c4571
Addressing PR comments
2023-12-21 16:48:15 -05:00
Sean Parkinson
00c9625ab8
Merge pull request #7081 from gojimmypi/PR-Espressif-ESP32-C2
...
Add wolfcrypt SHA support for ESP32-C2/ESP8684, other minor updates
2023-12-22 07:23:51 +10:00
Sean Parkinson
a5a2b3752d
Merge pull request #7077 from gojimmypi/PR-Espressif-threads
...
wolfSSL_NewThread() type update for Espressif FreeRTOS
2023-12-22 07:22:33 +10:00
David Garske
0d212d8055
Further cleanup for Hashes.sha when not required. Gate all TLS SHA-1 on either old TLS or WOLFSSL_ALLOW_TLS_SHA1.
2023-12-21 09:41:29 -08:00
Daniel Pouzzner
5b3aaf8bbd
Merge pull request #7086 from dgarske/rpm_spec
...
Remove obsolete mkdir call
2023-12-21 00:37:22 -05:00
David Garske
9311a961a0
Allow crypto callbacks with SHA-1 HW. Resolves build error in test.c with trying to use HW SHA-1 with crypto cb enabled. Note: sha.h changes are very small if ignoring whitespace.
2023-12-20 15:48:21 -08:00
David Garske
86f9171050
Remove obsolete mkdir call.
2023-12-20 14:52:08 -08:00
David Garske
a5464a9b51
Merge pull request #7083 from douzzer/20231219-clang-analyzer-optin.core.EnumCastOutOfRange
...
20231219-clang-analyzer-optin.core.EnumCastOutOfRange
2023-12-20 14:18:06 -08:00
Daniel Pouzzner
805c2d4487
Merge pull request #7085 from dgarske/async_v5.6.6
...
Fix for invalid `dh_ffdhe_test` test case using Intel QuickAssist
2023-12-20 15:31:58 -05:00
David Garske
00f196d497
Fix for invalid dh_ffdhe_test test with even P when using Intel QuickAssist.
2023-12-20 11:30:17 -08:00
Daniel Pouzzner
f2d573f01f
wolfssl/wolfcrypt/asn.h, src/ssl.c: add "ANONk" to enum Key_Sum, and use the new value in wolfSSL_get_sigalg_info(), fixing clang-analyzer-optin.core.EnumCastOutOfRange.
...
add suppressions in tests for expected clang-analyzer-optin.core.EnumCastOutOfRange's.
2023-12-19 18:14:29 -06:00
Andras Fekete
77e8a66ca3
Not cryptocb's job to sanity check input
...
Don't need to check parameters at every level
2023-12-19 15:55:38 -05:00
Andras Fekete
12192b7683
Set result to invalid as first step
2023-12-19 15:54:25 -05:00
Andras Fekete
f45ffd8802
Rename variable to keep the names similar across functions
2023-12-19 15:37:58 -05:00
Andras Fekete
9e974027a8
Fix ARIA signing
...
Used the wrong function to extract key
2023-12-19 15:33:28 -05:00
David Garske
41d4f4a972
Fix TLS v1.2 case where SHA-1 could be used uninitialized. Exclude the SHA1 struct from HS_Hashes when not needed. Fixes mix-match of the SHA-1 with NO_OLD_TLS and WOLFSSL_ALLOW_TLS_SHA1.
2023-12-19 12:30:53 -08:00
David Garske
fb5eab8f79
Fix one shot hash routines to attempt offloading to crypto callbacks. Fix random.c health test to use devId. Fix FIPS unused "ssl".
2023-12-19 11:20:56 -08:00
David Garske
2001d1c74b
Fixes for TLS v1.3 with crypto callbacks not offloading DeriveKeyMsg, KDF HMAC and ECH.
2023-12-19 08:15:58 -08:00
David Garske
66596ad9e1
Merge pull request #7075 from cconlon/v5.6.6-prep
...
5.6.6 version bump and README changes
2023-12-18 19:14:18 -08:00
gojimmypi
07a5566c52
Add wolfcrypt SHA support for ESP32-C2, other minor updates
2023-12-18 17:35:43 -08:00
David Garske
90748b5f61
Remove the SHA1-/SHA2-256 auto devId selection devId = wc_CryptoCb_GetDevIdAtIndex(0);
2023-12-18 17:14:58 -08:00
David Garske
8b203719d3
Add support for using devId with one-shot hash functions.
2023-12-18 17:14:43 -08:00
David Garske
d5e83310b6
Fix typo with HMAC determination of update/final.
2023-12-18 17:11:33 -08:00
David Garske
205403ebb2
Add more information in the DEBUG_CRYPTOCB.
2023-12-18 17:11:16 -08:00
Lealem Amedie
dd55cdbea8
Initialize variables to NULL
2023-12-18 16:51:51 -07:00
Chris Conlon
5046e577d3
update ChangeLog/README with 5.6.6 release information
2023-12-18 15:24:14 -07:00
Chris Conlon
a003338a88
bump version to 5.6.6
2023-12-18 12:16:34 -07:00
philljj
4e081960d3
Merge pull request #7078 from douzzer/20231218-AddSessionToClientCache-round-2
...
20231218-AddSessionToClientCache-round-2
2023-12-18 13:15:52 -06:00
Daniel Pouzzner
7eed28fbe0
src/ssl.c: in AddSessionToClientCache(), remove benign frivolous assignment, and fix so that ret is assigned only if no error.
2023-12-18 11:15:28 -06:00
Chris Conlon
3e483f32a4
Merge pull request #7076 from douzzer/20231216-client_usage_msg-array-length
...
20231216-client_usage_msg-array-length
2023-12-18 09:30:49 -07:00
gojimmypi
da644c7be3
wolfSSL_NewThread() type update for Espressif FreeRTOS
2023-12-17 11:59:42 -08:00
Daniel Pouzzner
ff9fee758e
examples/client/client.c: fix client_usage_msg undersized array dimension.
2023-12-16 13:22:22 -06:00
Tobias Frauenschläger
8a89470422
Fix for liboqs on zephyr
...
When using WolfSSL on zephyr, we need POSIX names for networking systems
calls. This can either be enabled with CONFIG_NET_SOCKETS_POSIX_NAMES or
with CONFIG_POSIX_API. This commit enables support for the latter.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2023-12-16 12:40:26 +01:00
Tobias Frauenschläger
0780fd9719
liboqs: add RNG support for sphincs
...
Added a RNG argument to the wc_sphincs_sign_msg method to properly
generate necessary random data using the desired WolfSSL RNG object.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2023-12-16 12:40:26 +01:00
Tobias Frauenschläger
85c40b1728
liboqs: add RNG support for falcon
...
Added a RNG argument to the wc_falcon_sign_msg method to properly
generate necessary random data using the desired WolfSSL RNG object.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2023-12-16 12:40:26 +01:00
Tobias Frauenschläger
ec86a86096
liboqs: add RNG support for dilithium
...
Added a RNG argument to the wc_dilithium_sign_msg method to properly
generate necessary random data using the desired WolfSSL RNG object.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2023-12-16 12:40:26 +01:00
Tobias Frauenschläger
755c385b1f
Liboqs: use WolfSSL RNG
...
Improve the interface to liboqs by properly configuring and using the
RNG provided by WolfSSL from within liboqs.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2023-12-16 12:40:25 +01:00
Tobias Frauenschläger
d31e2c3581
Added PQC support for the Zephyr port using liboqs
...
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2023-12-16 12:40:25 +01:00
Chris Conlon
64e48deb0e
Merge pull request #7074 from douzzer/20231215-srtp-cleanup
...
20231215-srtp-cleanup
2023-12-15 14:31:32 -07:00
Daniel Pouzzner
ef14176b7f
SRTP fixes:
...
* in wolfssl/ssl.h, add missing arg names to wolfSSL_CTX_set_tlsext_use_srtp(), wolfSSL_set_tlsext_use_srtp(), and wolfSSL_export_dtls_srtp_keying_material();
* in wolfcrypt/src/kdf.c, call wc_AesFree if and only if wc_AesInit() succeeded;
* in src/ssl.c:DtlsSrtpSelProfiles(), fix bugprone-inc-dec-in-conditions;
* in tests/suites.c:execute_test_case(), fix several -Wdeclaration-after-statement and -Wmissing-field-initializers;
* in wolfcrypt/test/test.c, fix a shiftTooManyBitsSigned warning in srtpkdf_test(), and fix a typo (kaSz/ksSz).
2023-12-15 14:06:36 -06:00
Daniel Pouzzner
8f2a48c676
Merge pull request #7073 from julek-wolfssl/move-mutex-init
...
Move the mutex initializer into the appropriate existing section
2023-12-15 12:17:37 -05:00
Chris Conlon
62b3ca5fb5
Merge pull request #7071 from douzzer/20231214-WOLF_CRYPTO_CB-not-WC_AESFREE_IS_MANDATORY
...
20231214-WOLF_CRYPTO_CB-not-WC_AESFREE_IS_MANDATORY
2023-12-15 09:25:48 -07:00
Juliusz Sosinowicz
57355f357e
Move the mutex initializer into the appropriate existing section
2023-12-15 10:03:06 +01:00
Daniel Pouzzner
7ebbb927f3
wolfssl/wolfcrypt/aes.h: don't set WC_AESFREE_IS_MANDATORY for WOLF_CRYPTO_CB -- free is only needed when callbacks are both installed and used.
2023-12-14 18:09:39 -06:00
Chris Conlon
2ffc818c28
Merge pull request #7069 from douzzer/20231213-misc-fixes
...
20231213-misc-fixes
2023-12-14 15:18:12 -07:00
David Garske
4b771a9b28
Document new macro and rename to: NO_TIME_SIGNEDNESS_CHECK
2023-12-14 13:58:29 -08:00
Chris Conlon
27c6ee4d05
Merge pull request #7068 from SparkiDev/srtp_kdf_label
...
SRTP/SRTCP KDF: add APIs that derives one key from a label
2023-12-14 14:54:58 -07:00
Chris Conlon
fb6b022f42
Merge pull request #7020 from SparkiDev/ecc_gen_k_by_reject
...
ECC: generate values in range of order by rejection
2023-12-14 14:54:39 -07:00
David Garske
8b048bc246
Disable the old TI workarounds. Enable support for CCM.
2023-12-14 13:50:03 -08:00
David Garske
f2e4360f8d
Spelling fixes.
2023-12-14 12:15:32 -08:00
David Garske
1cf87ce0c9
Spelling fix.
2023-12-14 12:14:30 -08:00
Chris Conlon
f6ef58dbc2
Merge pull request #7064 from philljj/fix_infer_issues
...
Fix issues from infer diff report.
2023-12-14 12:27:34 -07:00
Daniel Pouzzner
64e4796ed6
wolfssl/wolfcrypt/wc_port.h: add definition for WOLFSSL_MUTEX_INITIALIZER, currently only #ifdef WOLFSSL_PTHREADS.
...
src/ssl.c: refactor dynamics of count_mutex, count_mutex_valid, and initRefCount, to be intrinsically race-free on pthreads builds, and to be always race-free for callers that call wolfSSL_Init() first, then wait for return before any other wolfSSL calls, and call wolfSSL_Cleanup() at most as many times as wolfSSL_Init().
also, in AddSessionToClientCache(), move final access to ClientCache inside the lock-protected span, to mollify Coverity.
2023-12-14 13:22:27 -06:00
Daniel Pouzzner
16c6bd6846
examples/client/client.c and tests/api.c: add missing CloseSocket() calls.
2023-12-14 13:22:27 -06:00
Chris Conlon
1b76f6d56b
Merge pull request #7065 from miyazakh/fix_ra6m3
...
fix benchmark compile error
2023-12-14 09:15:32 -07:00
Sean Parkinson
659a245b27
SRTP/SRTCP KDF: add APIs that derives one key from a label
...
Added more generic APIs that derive a single key with a label.
Added defines for label values and index lengths.
2023-12-14 14:45:35 +10:00
Hideki Miyazaki
3af91c265b
remove tab
2023-12-14 11:16:36 +09:00
David Garske
0bc244962a
Fixes for TI AES GCM and GMAC.
2023-12-13 17:32:45 -08:00
David Garske
c021e3e85d
Merge pull request #7066 from cconlon/v5.6.6-fixes
...
Fixes from release prep testing, example certificate updates
2023-12-13 17:00:45 -08:00
Chris Conlon
d0aa80eb37
update example/test certs for end of year release
2023-12-13 16:41:59 -07:00
Chris Conlon
a14a1bf467
define WOLFSSL_AES_DIRECT in configure.ac with --enable-aes-bitsliced
2023-12-13 16:41:59 -07:00
Chris Conlon
f5d33cedeb
add variable name in wolfSSL_BIO_new() prototype
2023-12-13 16:41:59 -07:00
Chris Conlon
255086b7c8
fix API test warning, comparison of unsigned expression < 0 is always false
2023-12-13 16:41:59 -07:00
Chris Conlon
d36538c40a
Merge pull request #7063 from embhorn/13dec2023_cov_fixes
...
Fixes for release
2023-12-13 16:19:13 -07:00
jordan
a1b44b6214
Fix issues from infer diff report: init mp_digit to 0.
2023-12-13 17:17:49 -06:00
Hideki Miyazaki
f209120218
fix benchmark compile error
2023-12-14 07:35:32 +09:00
jordan
f222adf4c2
Fix issues from infer diff report.
2023-12-13 15:59:03 -06:00
Chris Conlon
a66137d2fe
Merge pull request #7062 from lealem47/leaks
...
Cleanup leaks in api.c and benchmark.c
2023-12-13 14:09:23 -07:00
Eric Blankenhorn
1d7fd42aa8
Fixes for release
2023-12-13 14:47:02 -06:00
Lealem Amedie
5fd0470f76
Cleanup leaks in api.c and benchmark.c
2023-12-13 13:00:52 -07:00
David Garske
8acee813cb
Merge pull request #7061 from gojimmypi/PR-Espressif-user_settings-fix
...
Fix missing closing comment on example Espressif user_settings.h
2023-12-13 10:44:20 -08:00
Chris Conlon
3d959b96c9
Merge pull request #7060 from dgarske/various_20231212
...
Fix for benchmark without filesystem unused globals
2023-12-13 11:29:28 -07:00
David Garske
56c7e5c675
Merge pull request #7054 from cconlon/sslAlpnSelectCb
...
Add wolfSSL_set_alpn_select_cb() for setting ALPN select callback on WOLFSSL session
2023-12-13 09:24:07 -08:00
gojimmypi
eeb024a30d
fix missing closing comment on example user_settings.h
2023-12-13 09:19:39 -08:00
Chris Conlon
269542ed96
add wolfSSL_set_alpn_select_cb() for WOLFSSL-level ALPN select callbacks
2023-12-13 09:16:44 -07:00
Sean Parkinson
b7b20ededd
Merge pull request #7058 from lealem47/zd17174
...
Check buffer length before XMEMCMP in GetOID
2023-12-13 14:36:23 +10:00
Sean Parkinson
cbd5341332
Merge pull request #7056 from douzzer/20231212-QUIC-WOLFSSL_CALLBACKS-error
...
20231212-QUIC-WOLFSSL_CALLBACKS-error
2023-12-13 14:34:19 +10:00
Sean Parkinson
d455196955
Merge pull request #7055 from dgarske/fix_rpmspec
...
Fixes for RPM Spec: Move the .so to devel files
2023-12-13 14:33:09 +10:00
Sean Parkinson
f12b61183b
Merge pull request #7029 from julek-wolfssl/zd/17108-fix
...
Additional TLS checks
2023-12-13 14:31:11 +10:00
David Garske
3b75a41006
Merge pull request #7057 from kaleb-himes/fix-fips-140-3-pr-failure
...
Address fips 140-3 failures with wolfEngine support enabled
2023-12-12 16:15:40 -08:00
kaleb-himes
ca5adfaecb
Add comments per peer review
2023-12-12 15:21:28 -07:00
kaleb-himes
db7f08e12f
Address fips 140-3 failures with wolfEngine support enabled
2023-12-12 15:14:51 -07:00
Lealem Amedie
2724edc257
Check buffer length before XMEMCMP in GetOID
2023-12-12 15:13:42 -07:00
Sean Parkinson
ce74a34154
Merge pull request #7019 from dgarske/armasm_mmcau
...
Patch to support NXP Kinetis MMCAU SHA2-256 with ARM ASM
2023-12-13 07:26:11 +10:00
Sean Parkinson
6e953e4d53
Merge pull request #7044 from julek-wolfssl/zd/17137
...
ocsp: don't error out if we can't verify our certificate
2023-12-13 07:23:46 +10:00
David Garske
3750ff5205
Fix for benchmark without filesystem and unused hash_input and cipher_input.
2023-12-12 13:22:17 -08:00
Daniel Pouzzner
1cc45b57d7
wolfssl/wolfcrypt/settings.h: add #if defined(WOLFSSL_QUIC) && defined(WOLFSSL_CALLBACKS) #error ("ERROR - tests/quic.c line 1027 failed").
2023-12-12 14:26:25 -06:00
Juliusz Sosinowicz
493bb1760d
Add option to remove early sanity checks
2023-12-12 17:31:48 +01:00
David Garske
573093ddf3
Move the .so to devel files. The pure *.so file is considered a dev file.
2023-12-12 08:15:05 -08:00
Juliusz Sosinowicz
51ba745214
ocsp: don't error out if we can't verify our certificate
...
We can omit either the CeritificateStatus message or the appropriate extension when we can not provide the OCSP staple that the peer is asking for. Let peer decide if it requires stapling and error out if we don't send it.
2023-12-12 14:49:52 +01:00
Juliusz Sosinowicz
627310d26a
Additional TLS checks
...
- double check which messages need to be encrypted
- check msgs that have to be last in a record
ZD17108
2023-12-12 13:57:12 +01:00
Sean Parkinson
21f53f37a1
ECC: generate values in range of order by rejection
...
When generating private key and nonce for ECDSA, use rejection sampling.
Note: SP uses this algorithm
2023-12-12 14:55:56 +10:00
Sean Parkinson
1aed438a21
Merge pull request #7053 from douzzer/20231208-asn-big-short-ints
...
20231208-asn-big-short-ints
2023-12-12 13:53:37 +10:00
Sean Parkinson
043dde18be
Merge pull request #7048 from anhu/PQ_uninit_key_free
...
Prevent freeing uninitialized keys
2023-12-12 13:47:30 +10:00
David Garske
058ffad657
Fix cast warnings on test with -1.
2023-12-11 16:25:47 -08:00
David Garske
8e44018baa
Fix TI AES return codes.
2023-12-11 16:10:48 -08:00
David Garske
68cfaa76fc
Fix for TI-RTOS time. Cleanup forced settings.h for WOLFSSL_TIRTOS. Compiler warning cleanups.
2023-12-11 15:57:26 -08:00
Kaleb Himes
00a1c68f97
Merge pull request #7052 from dgarske/stm32_fips
...
Fix to resolve collision between FIPS `RNG` in settings.h and STM32 HAL header
2023-12-11 16:12:07 -07:00
Daniel Pouzzner
c1b5135918
wolfcrypt/src/evp.c and wolfcrypt/test/test.c: in FIPS builds <5.3, gate out AES-XTS functionality that depends on new APIs added in #7031 ( b14aba48af and 931ac4e568) (AES-XTS is non-FIPS in FIPS <5.3).
2023-12-11 12:14:29 -06:00
Daniel Pouzzner
9c17d5d2fa
support ASN ShortInts up to 4 bytes (2^32-1):
...
* parameterize MAX_LENGTH_SZ using overrideable WOLFSSL_ASN_MAX_LENGTH_SZ, default value 5 (raised from 4).
* refactor other Misc_ASN constants to refer to MAX_LENGTH_SZ as appropriate.
* tweak BytePrecision() appropriately.
* refactor SetShortInt() to use BytePrecision() and include a length assert against MAX_SHORT_SZ to assure no buffer overruns with reduced WOLFSSL_ASN_MAX_LENGTH_SZ.
2023-12-11 12:14:29 -06:00
David Garske
f068bebb94
Fix to resolve collision between RNG in settings.h and the STM32 Cube HAL (ex: stm32h7xx.h). In STM32 platforms we use NO_OLD_RNGNAME (see https://github.com/wolfSSL/wolfssl/blob/master/examples/configs/user_settings_stm32.h#L616 )
2023-12-11 10:01:21 -08:00
David Garske
540012844b
Merge pull request #7049 from lealem47/ghIssue6983
...
Enable cURL and QUIC from CMake
2023-12-11 09:40:31 -08:00
David Garske
cb6676fa27
Merge pull request #7030 from julek-wolfssl/gh/7000
...
Store ssl->options.dtlsStateful when exporting DTLS session
2023-12-11 09:39:54 -08:00
David Garske
b5eb8995c9
Fix possible unused variable warning.
2023-12-11 09:22:47 -08:00
Juliusz Sosinowicz
4ce4dd7479
Use correct size for memset
2023-12-11 14:30:54 +01:00
Sean Parkinson
03a82711aa
Merge pull request #7036 from anhu/SCSV
...
Make sure to send SCSV when application sets ciphersuites
2023-12-11 07:15:23 +10:00
JacobBarthelmeh
ac447d1afb
Merge pull request #7031 from douzzer/20231201-openssl-compat-fixes
...
20231201-openssl-compat-fixes
2023-12-08 17:25:53 -07:00
JacobBarthelmeh
f708d42ef7
Merge pull request #7046 from dgarske/crl_cleanups
...
Various cleanups - CRL and comments - 20231207
2023-12-08 17:15:01 -07:00
JacobBarthelmeh
38eddd7f89
Merge pull request #7043 from gojimmypi/PR-Espressif-README
...
Espressif README files
2023-12-08 17:11:59 -07:00
David Garske
8a5a467543
Patch to support NXP Kinetis MMCAU SHA2-256 (FREESCALE_MMCAU_CLASSIC_SHA) with --enable-armasm.
2023-12-08 15:56:20 -08:00
Lealem Amedie
de4bd42de0
Enable cURL and QUIC from CMake
2023-12-08 15:57:29 -07:00
David Garske
b002c330c0
Fixes for TI AES and SHA.
2023-12-08 14:17:09 -08:00
David Garske
df954568be
Fix typos 2.
2023-12-08 14:17:09 -08:00
David Garske
842a60465a
Fix compiler error for missing Task_Handle. Fix typo.
2023-12-08 14:17:08 -08:00
David Garske
d17955f2d0
Cleanups for the ti-aes.c code to conform with coding standards.
2023-12-08 14:17:08 -08:00
kareem-wolfssl
0c9555b29e
Merge pull request #7045 from julek-wolfssl/memcached-retry
...
Retry memcached tests 3 times on error
2023-12-08 14:03:54 -07:00
JacobBarthelmeh
0ba3646f32
Merge pull request #7037 from gojimmypi/PR-Expressif-Benchmark
...
Espressif benchmark update
2023-12-08 13:51:44 -07:00
Juliusz Sosinowicz
1bf0d8c896
Use SIGKILL to actually kill the runner
2023-12-08 20:23:00 +01:00
Anthony Hu
40015a06c4
Prevent freeing uninitialized keys
2023-12-08 13:52:24 -05:00
gojimmypi
62c0910e15
sync w/upstream; resolve merge conflict
2023-12-08 09:06:10 -08:00
JacobBarthelmeh
448b83697a
Merge pull request #7035 from gojimmypi/PR-Espressif-wolfcrypt
...
Espressif wolfcrypt updates
2023-12-08 09:07:46 -07:00
JacobBarthelmeh
ae9632b14a
Merge pull request #7025 from bandi13/universalScriptSimplify
...
Massively simplify apple-universal script
2023-12-08 09:03:30 -07:00
Juliusz Sosinowicz
6c7b47e003
Store ssl->options.dtlsStateful when exporting DTLS session
2023-12-08 15:35:34 +01:00
Juliusz Sosinowicz
21381b939b
Retry memcached tests 3 times on error
2023-12-08 13:53:08 +01:00
gojimmypi
17c663b257
Espressif README files
2023-12-07 16:21:50 -08:00
David Garske
434526c345
Expand WOLFSSL_NO_CRL_DATE_CHECK to the process cert CRL next date check. Fix typo for DEBUG_CRYPTOCB. Add comments for wc_ValidateDate arguments. Improve linker script example for FIPS to put stdlib before FIPS and not force KEEP.
2023-12-07 14:45:16 -08:00
JacobBarthelmeh
c4b77adf48
Merge pull request #7007 from night1rider/ardunio-wolfssl
...
Ardunio Fixes relating to internal Intel Galileo Tests
2023-12-07 14:48:58 -07:00
Sean Parkinson
6c8bf7be55
Merge pull request #6963 from julek-wolfssl/dynamic-certs-n-ciphers
...
Add API to choose dynamic certs based on client ciphers/sigalgs
2023-12-08 07:45:36 +10:00
Sean Parkinson
61b0efce4f
Merge pull request #7039 from embhorn/zd17127
...
Check for neg size in fp_read_unsigned_bin
2023-12-08 07:44:09 +10:00
gojimmypi
5e5286d30d
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into PR-Expressif-Benchmark
2023-12-07 13:26:20 -08:00
Eric Blankenhorn
27e93276de
Check for neg size in fp_read_unsigned_bin
2023-12-07 14:26:12 -06:00
Anthony Hu
9fda21748a
for clients only
2023-12-07 14:05:33 -05:00
JacobBarthelmeh
5caa71ec6a
Merge pull request #7038 from SparkiDev/heapmath_mp_add_d
...
Heapmath mp_add_d: fix for when a and c same pointer
2023-12-07 10:04:13 -07:00
JacobBarthelmeh
9d0bb4c2bf
Merge pull request #7040 from dgarske/win_vs
...
Fixes for building wolfSSL in Visual Studio
2023-12-07 10:02:33 -07:00
Anthony Hu
3c5b402740
Make sure to send SCSV when application sets ciphersuites
2023-12-07 11:53:55 -05:00
Juliusz Sosinowicz
fbe79d7317
Code review
2023-12-07 11:13:16 +01:00
Daniel Pouzzner
803b17a8b3
src/ssl_crypto.c: in wolfSSL_CMAC_CTX_free(), gate wc_CmacFree() on !FIPS || FIPS>=5.3.
2023-12-06 23:04:52 -06:00
Daniel Pouzzner
106e39bd76
tests/api.c: in test_wc_CmacFinal(), don't use wc_CmacFinalNoFree() if FIPS <5.3.
2023-12-06 21:58:55 -06:00
Daniel Pouzzner
931ac4e568
add documentation for wc_AesXtsInit(), wc_AesXtsSetKeyNoInit(), wc_CmacFinalNoFree(), and wc_CmacFree();
...
rename wc_AesXtsSetKey_NoInit() to wc_AesXtsSetKeyNoInit() for morphological consistency;
refactor wc_AesXtsSetKey() to call wc_AesXtsSetKeyNoInit() and clean up on failure;
readability tweak in wolfSSL_EVP_CipherFinal().
2023-12-06 19:26:46 -06:00
Daniel Pouzzner
b14aba48af
wolfcrypt/src/cmac.c: add wc_CmacFree(), revert wc_CmacFinal(), rename wc_CmacFinal() as wc_CmacFinalNoFree() removing its deallocation clauses, and add new wc_CmacFinal() that calls wc_CmacFinalNoFree() then calls wc_CmacFree() unconditionally, for compatibility with legacy client code (some of which may have previously leaked).
...
tests/api.c: modify test_wc_CmacFinal() to use wc_CmacFinalNoFree() except for the final call.
wolfcrypt/src/aes.c:
* fix wc_AesEaxEncryptAuth() and wc_AesEaxDecryptAuth() to call wc_AesEaxFree() only if wc_AesEaxInit() succeeded.
* fix wc_AesEaxInit() to free all resources on failure.
* revert wc_AesEaxEncryptFinal() and wc_AesEaxDecryptFinal() changes, then change wc_CmacFinal() calls in them to wc_CmacFinalNoFree() calls.
* wc_AesEaxFree(): add wc_CmacFree() calls.
2023-12-06 16:55:57 -06:00
Sean Parkinson
c6d6100136
Merge pull request #7010 from julek-wolfssl/dtls13-0.5-rtt
...
dtls13: Add support for 0.5-RTT data
2023-12-07 08:41:42 +10:00
JacobBarthelmeh
0ffb586030
Merge pull request #7032 from SparkiDev/sp_int_neg_mont_red
...
SP int neg sp_mont_red_ex: disallow negative numbers
2023-12-06 15:04:46 -07:00
Sean Parkinson
226c631feb
Heapmath mp_add_d: fix for when a and c same pointer
...
When parameters a and c to mp_add_d are the same pointer, c->sign was
being set to zero/positive and then a->sign was being checked.
Set the c->sign at end as it will always be zero/positive through the
code and the sign of the result isn't otherwise used.
2023-12-07 07:51:43 +10:00
msi-debian
0ff02e59ba
Fixes relating to issues with internal testing with the Intel Galileo,
...
along with updating the file structure construction for the library.
2023-12-06 14:38:32 -07:00
gojimmypi
f3a9d4a56e
Espressif Benchmark ESP-IDF 4.4 fixes
2023-12-06 13:23:14 -08:00
David Garske
db14914951
Fixes for building wolfSSL in Visual Studio. Adds missing files. Fix for type cast warnings.
2023-12-06 13:20:27 -08:00
gojimmypi
4bd78e5e31
Espressif benchmark update
2023-12-06 12:43:42 -08:00
gojimmypi
7de5710a75
Espressif error not warning for legacy macros
2023-12-06 11:01:51 -08:00
gojimmypi
ca1eba0919
Espressif wolfcrypt updates
2023-12-06 10:05:31 -08:00
JacobBarthelmeh
2c9208b0c6
Merge pull request #6765 from kojo1/zd16462
...
Eliminate bad record mac alert
2023-12-06 09:15:41 -07:00
Sean Parkinson
cf8a6efaa5
SP int neg sp_mont_red_ex: disallow negative numbers
...
Don't support negative a or m with sp_mont_red_ex().
2023-12-06 08:59:54 +10:00
Daniel Pouzzner
689a82a622
fix AES-related code, in both crypto and TLS layers, for various uninitialized data and resource leak defects around wc_AesInit() and wc_AesFree():
...
* followup to https://github.com/wolfSSL/wolfssl/pull/7009 "20231128-misc-fixes" and https://github.com/wolfSSL/wolfssl/pull/7011 "Add missing wc_AesInit calls."
* adds WC_DEBUG_CIPHER_LIFECYCLE, which embeds asserts in low-level AES implementations for proper usage of wc_AesInit() and wc_AesFree().
* fixes native CMAC, AES-EAX, and AES-XTS implementations to assure resource release.
* adds missing wc_AesXtsInit() API, and adds a new wc_AesXtsSetKey_NoInit().
* fixes misspellings in EVP that unconditionally gated out AES-OFB and AES-XTS.
* fixes misspellings in EVP that unconditionally gated out AES-CBC and AES-CFB code in wolfSSL_EVP_CIPHER_CTX_cleanup_cipher().
* openssl compat AES low level cipher API has no counterpart to wc_AesFree(), so these compat APIs will now be gated out in configurations where they would otherwise leak memory or file descriptors (WOLFSSL_AFALG, WOLFSSL_DEVCRYPTO, WOLF_CRYPTO_CB, etc.). A new macro, WC_AESFREE_IS_MANDATORY, is defined in wolfcrypt/aes.h to streamline this dependency.
* fixes 40 missing EVP_CIPHER_CTX_cleanup()s and 11 wc_AesFree()s in src/ssl.c, src/ssl_crypto.c, tests/api.c, and wolfcrypt/test/test.c.
2023-12-05 15:58:09 -06:00
JacobBarthelmeh
7753e3db8a
Merge pull request #6844 from gojimmypi/Espressif-client-server-example
...
Espressif ESP32 Benchmark, Test, TLS 1.3 Client & Server Updates
2023-12-05 14:20:02 -07:00
JacobBarthelmeh
223d8c9a10
Merge pull request #7004 from julek-wolfssl/zd/17033
...
x509 AIA: store the first OCSP and CA Issuer URI's
2023-12-05 14:08:43 -07:00
gojimmypi
fb77319758
Espressif examples: polish & misc updates
2023-12-05 10:36:05 -08:00
JacobBarthelmeh
4c85a5a146
Merge pull request #7028 from ejohnstown/ocsp-err-ret
...
OCSP Error Return
2023-12-05 11:00:51 -07:00
David Garske
b92aa59bd8
Merge pull request #6692 from JacobBarthelmeh/tls13
...
fix setting ssl error with TLS 1.3 connect socket errors
2023-12-05 09:15:29 -08:00
gojimmypi
ce2c256544
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into Espressif-client-server-example
2023-12-05 08:02:31 -08:00
JacobBarthelmeh
1857648d7d
Merge pull request #6976 from embhorn/gh6974
...
Fix build errors with dtls1.3 and no tls1.2
2023-12-04 14:53:35 -07:00
John Safranek
52658c51a9
OCSP Error Return
...
1. In CheckOcspResponse(), remove the existing check for UNKNOWN
certificate status. Given the values of ret and ocsp->error, unknown
won't get checked.
2. Separated checks for UKNOWN and REJECTED for logging purposes. Return
that as an error.
3. Anything else should be a failure.
2023-12-04 11:31:04 -08:00
Jacob Barthelmeh
ef536f541f
fix setting ssh error with TLS 1.3 connect socket errors
2023-12-04 09:09:09 -07:00
Sean Parkinson
195c14ccaf
Merge pull request #6919 from JacobBarthelmeh/cert_dates
...
add self-sm2-cert.pem to certificate regen script
2023-12-04 09:05:37 +10:00
JacobBarthelmeh
5297cc74b4
Merge pull request #7016 from anhu/aes_init_docs
...
Add missing references to wc_AesInit in the API docs.
2023-12-01 16:59:49 -07:00
JacobBarthelmeh
adcc21b538
Merge pull request #6997 from cconlon/jniAlwaysVerifyCb
...
Update --enable-jni with WOLFSSL_ALWAYS_VERIFY_CB
2023-12-01 16:58:08 -07:00
JacobBarthelmeh
3ad0e1ef72
Merge pull request #7021 from res0nance/arm64-aes-gcm-clobber
...
AES GCM ARM64: Fix clobber lists
2023-12-01 16:52:14 -07:00
JacobBarthelmeh
c4ab1e6d47
Merge pull request #7017 from SparkiDev/asn_tmpl_ecc_raw_to_sig_fix
...
ASN template: StoreECC_DSA_Sig_Bin
2023-12-01 16:11:15 -07:00
JacobBarthelmeh
fa0362fd2b
Merge pull request #7022 from julek-wolfssl/faster-memcached-tests
...
Parallelised memcached tests
2023-12-01 16:05:17 -07:00
JacobBarthelmeh
44d52c599c
Merge pull request #7023 from SparkiDev/test_dsa_fix
...
Test DSA: fix unused variables
2023-12-01 15:53:08 -07:00
Chris Conlon
883d1a25be
add WOLFSSL_ALWAYS_VERIFY_CB to --enable-jni, used with JSSE X509ExtendedTrustManager hostname verification
2023-12-01 09:23:10 -07:00
Andras Fekete
822405a6d8
Massively simplify apple-universal script
2023-12-01 09:44:43 -05:00
Sean Parkinson
02f8735abf
Test DSA: fix unused variables
...
test.c: fix #if protection around unused variables
2023-12-01 11:04:53 +10:00
JacobBarthelmeh
abab390dd4
Merge pull request #7015 from lealem47/zd17088
...
Reworking MinGW mutex/threading
2023-11-30 17:00:19 -07:00
JacobBarthelmeh
a1e74d9974
Merge pull request #7014 from SparkiDev/ssl_free_tlsx_fixup
...
SSL_free, TLSX_Remove calls: fix #if protection
2023-11-30 16:56:46 -07:00
Sean Parkinson
8097ed74c3
Merge pull request #7012 from philljj/spelling_cleanup
...
Used codespell and fixed obvious typos.
2023-12-01 07:24:21 +10:00
Anthony Hu
cfa1b589c6
minor fix again
2023-11-30 15:26:42 -05:00
Anthony Hu
e6bd8dce6e
Minor fix.
2023-11-30 15:18:47 -05:00
jordan
9265142369
Used codespell and fixed obvious typos.
2023-11-30 13:09:55 -06:00
JacobBarthelmeh
cbe8309b3b
Merge pull request #7013 from SparkiDev/asm_arm_clobber_cc
...
ARM asm: add "cc" to all clobber lists
2023-11-30 11:05:03 -07:00
JacobBarthelmeh
a7e5c6c721
Merge pull request #7011 from philljj/add_missing_aesinit
...
Add missing wc_AesInit calls.
2023-11-30 11:01:02 -07:00
JacobBarthelmeh
cc65c3ec98
Merge pull request #7009 from douzzer/20231128-misc-fixes
...
20231128-misc-fixes
2023-11-30 10:59:42 -07:00
Daniel Pouzzner
cb381a2336
src/tls.c: fix misspelling in TLSX_KeyShare_ProcessPqc().
2023-11-30 10:12:17 -06:00
Juliusz Sosinowicz
52d6073c9c
Parallelised memcached tests
2023-11-30 16:02:13 +01:00
Sean Parkinson
21f662c7d1
ASN template: StoreECC_DSA_Sig_Bin
...
Strip leading zeros from R and S before encoding in ASN.1.
2023-11-30 20:31:29 +10:00
res0nance
14ba944f6c
AES GCM ARM64: Fix clobber lists
2023-11-30 12:33:42 +08:00
Daniel Pouzzner
44db4f3e5a
wolfssl/wolfcrypt/settings.h: add needed (void)s for unused args to several XMALLOC/XFREE/XREALLOC macros that were missing them.
2023-11-29 18:34:47 -06:00
jordan
8c1ab783a1
Add missing wc_AesInit calls: small cleanup.
2023-11-29 18:02:45 -06:00
Anthony Hu
ad1f709455
Add missing references to wc_AesInit in the API docs.
2023-11-29 18:47:26 -05:00
Lealem Amedie
e1ac56f2dd
Reworking MINGW mutex/threading
2023-11-29 16:45:06 -07:00
Sean Parkinson
7ebad05446
SSL_free, TLSX_Remove calls: fix #if protection
...
TLSX_Remove calls added to FreeHanshakeResources() for when TLSX_FreeAll
can't be called but TLSX still being used.
Fix #if protection to compile in TLSX_Remove calls when available.
2023-11-30 09:27:29 +10:00
JacobBarthelmeh
6125e595bb
Merge pull request #6989 from dgarske/stm32_bench
...
Updated STM32L4 (Cortex-M at 80MHz) benchmarks
2023-11-29 16:18:29 -07:00
Sean Parkinson
11e5544032
ARM asm: add "cc" to all clobber lists
...
Carry flags are more often than not affected by assembly code.
Carry wasn't in any inline assembly clobber list.
Always clobber "cc" to be safe.
2023-11-30 08:40:37 +10:00
Juliusz Sosinowicz
e891c721b8
fixup! dtls13: Add support for 0.5-RTT data
2023-11-29 23:22:38 +01:00
Juliusz Sosinowicz
3edfcfe162
Jenkins fixes
2023-11-29 23:17:10 +01:00
Juliusz Sosinowicz
9337cfbb16
Add wolfSSL_get_sigalg_info
2023-11-29 23:04:19 +01:00
Juliusz Sosinowicz
7c2344c389
Add API to get information about ciphersuites
2023-11-29 23:04:19 +01:00
Juliusz Sosinowicz
fbd8996949
Add API to choose dynamic certs based on client ciphers/sigalgs
2023-11-29 23:04:19 +01:00
Daniel Pouzzner
73ca6daf2b
wolfssl/wolfcrypt/types.h: add needed (void)s for unused args to several XMALLOC/XFREE/XREALLOC macros that were missing them.
...
src/quic.c: fix misspelled DYNAMIC_TYPE_TMP_BUFFER.
2023-11-29 16:02:39 -06:00
jordan
3158e04863
Add missing wc_AesInit calls.
2023-11-29 12:54:28 -06:00
Daniel Pouzzner
93ab397c56
wolfcrypt/test/test.c: fix memory leak in dsa_test().
2023-11-29 12:28:39 -06:00
Juliusz Sosinowicz
a7dce98797
Don't touch processReply state in DoApplicationData
2023-11-29 19:11:49 +01:00
Daniel Pouzzner
962bf88c9d
wolfcrypt/src/ecc.c: add missing semicolon in SAVE_VECTOR_REGISTERS() args.
2023-11-29 11:59:35 -06:00
Juliusz Sosinowicz
c87339e5c3
dtls13: Add support for 0.5-RTT data
2023-11-29 15:55:59 +01:00
Daniel Pouzzner
4642077146
src/ssl.c: remove frivolous (void)heap to clear -Wdeclaration-after-statement.
...
wolfcrypt/src/aes.c: add NEED_AES_TABLES gate around AesSetKey_C() implementations (fixes WOLFSSL_KCAPI_AES builds, probably among others).
wolfcrypt/src/sp_int.c: add missing casts to clear -Wconversions.
2023-11-28 23:25:31 -06:00
JacobBarthelmeh
12ee732fe2
Merge pull request #6981 from douzzer/20231102-vector-register-dynamic-fallback-aes
...
20231102-vector-register-dynamic-fallback-aes
2023-11-28 13:15:02 -07:00
JacobBarthelmeh
61a2d2de3d
Merge pull request #6955 from SparkiDev/rsa_dec_inv_blind_mul_mont
...
RSA private exponentiation: multiply blinding invert in Mont
2023-11-28 11:08:57 -07:00
JacobBarthelmeh
a111c5b27f
Merge pull request #6993 from SparkiDev/thumb2_iar_no_inline_fix_2
...
SP Thumb2: make function no-inline
2023-11-28 10:47:58 -07:00
JacobBarthelmeh
373fc537f1
Merge pull request #7003 from SparkiDev/ssl_make_x25519_key_temp
...
SSL: make temp X25519/X448 key failure
2023-11-28 10:46:51 -07:00
JacobBarthelmeh
0ac27eb039
Merge pull request #7005 from SparkiDev/memusage_fix_5
...
Memory usage fixes: nonce type and TLSX extension free
2023-11-28 10:42:04 -07:00
Sean Parkinson
09d2ba8bc8
Memory usage fixes: nonce type and TLSX extension free
...
Nonce ciphers other than AES. Free uses DYNAMIC_TYPE_CIPHER.
AES allocation must use DYNAMIC_TYPE_CIPHER too.
If not all TLSX extensions can be freed, then free the ones that can.
Update TLSX_free() to have a message for each case.
2023-11-28 12:56:06 +10:00
David Garske
4b74a2f006
Updated STM32L4 (Cortex-M at 80MHz) benchmarks with v5.6.4 using the new ARM ASM speedups.
2023-11-27 15:48:32 -08:00
JacobBarthelmeh
602bd3b506
Merge pull request #6996 from SparkiDev/armv8_aes_gcm_init_stream_iv
...
ARMv8 AES-GCM streaming: check size of IV before storing
2023-11-27 09:39:46 -07:00
JacobBarthelmeh
36015e9131
Merge pull request #6998 from SparkiDev/tls_pad_no_hash_raw_fix
...
TLS_hmac: when no raw hash, make sure maxSz is not neg
2023-11-27 09:37:57 -07:00
JacobBarthelmeh
9f06d337e3
Merge pull request #6992 from SparkiDev/heapmath_addmod_ct
...
Heap math: mp_add/submod_ct make work when c == d
2023-11-27 09:28:49 -07:00
Juliusz Sosinowicz
8ac891d902
x509 AIA: store the first OCSP and CA Issuer URI's
...
Solves ZD17033
2023-11-27 14:47:36 +01:00
Sean Parkinson
f65f8be176
SSL: make temp X25519/X448 key failure
...
On failure to make the temporary X25519/X448 key, free it as the type is
stored in eccTempKeyPresent which also indicates a valid key is present.
Otherwise on SSL free, it will default to freeing the key with ECC APIs.
2023-11-27 08:50:22 +10:00
JacobBarthelmeh
008d4958bf
Merge pull request #7001 from dgarske/testnb
...
Fix for TLS v1.3 in non-blocking loosing return code from `SendBuffered`
2023-11-24 12:34:57 -07:00
David Garske
09b6974ae9
Fix for TLS v1.3 in non-blocking loosing return code from SendBuffered. Example: SendBuffered returns WANT_WRITE (-327) and sets ssl->error, then below it was doing ssl->error = ret where ret = 0.
2023-11-24 09:30:09 -08:00
Sean Parkinson
d83a5a955c
SP Thumb2: make function no-inline
...
Lost changes that make function not inlined.
2023-11-24 15:38:11 +10:00
Sean Parkinson
bc36202087
TLS_hmac: when no raw hash, make sure maxSz is not neg
...
When padding byte is invalid, the maxSz can be negative.
Make maxSz 0 in this case so that blocks doesn't get very large and
cause delays.
2023-11-23 09:51:44 +10:00
JacobBarthelmeh
2e89e46c0b
Merge pull request #6990 from gojimmypi/PR-Espressif-C3-C6-S2-HW
...
Espressif ESP32-C3 ESP32-C6 ESP32-S2 Hardware Acceleration
2023-11-22 16:21:41 -07:00
JacobBarthelmeh
5b3f5496f8
Merge pull request #6430 from kareem-wolfssl/memcached
...
Add memcached support.
2023-11-22 16:20:28 -07:00
gojimmypi
98e8ee65dd
remove stray Espressif include.am entry
2023-11-22 15:10:09 -08:00
gojimmypi
967a0c9625
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into Espressif-client-server-example
2023-11-22 15:04:15 -08:00
JacobBarthelmeh
7036c8440b
Merge pull request #6995 from gojimmypi/PR-var-init
...
Initialize variables to appease Espressif compiler
2023-11-22 15:54:40 -07:00
Sean Parkinson
b242b44b2c
ARMv8 AES-GCM streaming: check size of IV before storing
...
Only store IV in Init function if it will fit in reg field of Aes
object.
2023-11-23 08:01:20 +10:00
JacobBarthelmeh
14e8ffcc18
remove locality from self-sm2-cert.pem
2023-11-22 14:30:27 -07:00
Sean Parkinson
416ce54276
Heap math: mp_add/submod_ct make work when c == d
...
mp_addmod_ct and mp_submod_ct expected c and d to be different pointers.
Change code to support this use case.
Fix whitespace.
2023-11-23 07:28:55 +10:00
gojimmypi
2da88115a6
Upstream merge + resolve conflict.
2023-11-22 13:17:14 -08:00
JacobBarthelmeh
e197d5f8a3
add self-sm2-cert.pem to certificate regen script
2023-11-22 14:14:07 -07:00
gojimmypi
6c41a6a374
Initialize variables to appease Espressif compiler
2023-11-22 13:02:51 -08:00
gojimmypi
5b01270205
Update all Expressif examples, ready for PR #6990
2023-11-22 12:37:15 -08:00
JacobBarthelmeh
0306d07c47
Merge pull request #6994 from embhorn/gh6988
...
Fix spelling warnings
2023-11-22 13:29:51 -07:00
Kareem
e175410b00
memcached: Revert wolfSSL_in_connect_init changes
2023-11-22 11:55:16 -07:00
Eric Blankenhorn
7223b5a708
Fix spelling warnings
2023-11-22 12:34:56 -06:00
JacobBarthelmeh
2f920b5cc4
Merge pull request #6892 from embhorn/gh6890
...
Add error reporting to loadX509orX509REQFromBuffer
2023-11-22 11:18:45 -07:00
JacobBarthelmeh
9810a8cd86
Merge pull request #6991 from lealem47/gh6983
...
Option to enable DTLS-SRTP in CMake
2023-11-22 11:09:30 -07:00
Kareem
72cbd9a44e
memcached: Code review feedback
2023-11-21 17:59:55 -07:00
gojimmypi
9227020f8e
code review updates for ESP32 C3/C6/S2 HW Acceleration
2023-11-21 16:22:49 -08:00
JacobBarthelmeh
dda72dc19c
Merge pull request #6979 from SparkiDev/sp_arm64_noinline
...
SP ARM64 P-256: mark functions as SP_NOINLINE
2023-11-21 09:48:08 -07:00
JacobBarthelmeh
60909d5cba
Merge pull request #6971 from SparkiDev/iar_thumb2_asm
...
IAR Thumb2 ASM: fixes
2023-11-21 09:46:31 -07:00
JacobBarthelmeh
ebbeb6c69e
Merge pull request #6984 from res0nance/pqc-crash-fix
...
tls: return immediately if kyber_id2type() fails
2023-11-21 09:35:22 -07:00
gojimmypi
7e69030df1
Espressif ESP32-C3 ESP32-C6 ESP32-S2 Hardware Acceleration
2023-11-20 18:05:18 -08:00
Sean Parkinson
9ac3083e5d
Thumb2 ASM fixes
...
Make a separate AES for IAR that has AES_encrypt_block and
AES_decrypt_block inlined. Default code is relying on compiler to use
specific registers and not modify others.
Improve performance of small SP ASM code for RSA.
2023-11-21 11:58:10 +10:00
Sean Parkinson
e97e1b5847
SP ARM64 P-256: mark functions as SP_NOINLINE
...
iOS device compilations are inlining functions and causing P-256 to
fail.
Add SP_NOINLINE to key P-256 functions.
Add "cc" to more clobber lists.
2023-11-21 10:43:38 +10:00
Lealem Amedie
846b91ea1b
Enable DTLS-SRTP in CMake
2023-11-20 15:58:59 -07:00
JacobBarthelmeh
665469f02a
Merge pull request #6986 from douzzer/20231119-all-cryptonly-opensslextra
...
20231119-all-cryptonly-opensslextra
2023-11-20 15:29:14 -07:00
JacobBarthelmeh
538ce14c62
Merge pull request #6953 from SKlimaRA/SKlimaRA/enable-ca-false
...
Enable encoding CA:FALSE with build flag
2023-11-20 15:03:14 -07:00
David Garske
14906df3ec
Merge pull request #6970 from anhu/AES_with_FREESCALE_MMCAU
...
Fix build errors when defining FREESCALE_MMCAU
2023-11-20 09:32:49 -08:00
Kareem
ca61034d22
Add memcached support.
...
memcached support: add required functions/defines.
Fix running unit test when defining DEBUG_WOLFSSL_VERBOSE without OPENSSL_EXTRA.
Break out session_id_context APIs into separate option WOLFSSL_SESSION_ID_CTX, so they can be used without OPENSSL_EXTRA.
Make wolfSSL_ERR_get_error and wolfSSL_CTX_set_mode available for memcached.
Add --enable-memcached.
Include required defines for memcached.
Revert unit test fix, no longer needed.
Add Github actions test for memcached. Stop defining DEBUG_WOLFSSL_VERBOSE for memcached.
Add auto retry to writes.
Memcached CI: correct libevent package name.
Memcached CI: Add pkgconfig path for Github CI wolfSSL prefix.
memcached: Fix WOLFSSL_OP_NO_RENEGOTIATION going outside of int bounds, add LD_LIBRARY_PATH for memcached CI test.
memcached CI: Use correct path for wolfSSL
memcached: Add required perl dependency for SSL tests
memcached: Update to 1.6.22
memcached: actually test tls
memcached: Update wolfSSL_SSL_in_before to be side agnostic.
2023-11-20 10:10:34 -07:00
JacobBarthelmeh
cbb270bc15
Merge pull request #6982 from julek-wolfssl/nginx-1.24.0-tests
...
Add nginx 1.24.0 testing
2023-11-20 10:08:06 -07:00
David Garske
7566328610
Implement proper wc_AesSetKeyLocal for NXP/Freescale MMCAU and LTC. This is required for AES CTR and AES Direct.
2023-11-20 08:15:50 -08:00
Anthony Hu
3fa612f49f
Fix build errors when defining FREESCALE_MMCAU
2023-11-20 08:15:45 -08:00
Daniel Pouzzner
7dedfe08ef
cryptonly and linuxkm fixes: fix --enable-all[-crypto] with --enable-opensslextra and --enable-cryptonly (build failures detected by multi-test linuxkm-all-asm-cryptonly-opensslextra-pie after merge of 54f2d56300 and e2bbacd548).
2023-11-19 17:22:46 -06:00
Sean Parkinson
9ed0018954
Merge pull request #6980 from gojimmypi/SM-cipher-type-PR
...
Fix evp SM cipherType check
2023-11-20 07:22:54 +10:00
res0nance
98789dc000
tls: return immediately if kyber_id2type() fails
...
This prevents a crash as ecc_key is not initialized but the
free function is still called.
2023-11-18 15:44:03 +08:00
Daniel Pouzzner
06dcc114c1
Merge pull request #6868 from lealem47/microsecond
...
Run benchmarks at microsecond level and record advanced stats
2023-11-17 20:09:07 -05:00
Lealem Amedie
64b98981de
Fix for g++
2023-11-17 16:44:24 -07:00
Daniel Pouzzner
efa61ade89
wolfcrypt/src/aes.c: add fallthrough no-op definitions for VECTOR_REGISTERS_{PUSH,POP} to cover WOLFSSL_TI_CRYPT || WOLFSSL_ARMASM.
2023-11-17 16:55:40 -06:00
Lealem Amedie
a95a7c7e08
One last missing cast
2023-11-17 13:55:49 -07:00
Lealem Amedie
ca195445a3
Add proper casts
2023-11-17 13:33:34 -07:00
Lealem Amedie
07d6d75d72
Fix for sanitizer finds
2023-11-17 13:28:30 -07:00
Daniel Pouzzner
347a17f7cf
wolfcrypt/src/aes_asm.asm: fix missed _AESNI suffixing.
2023-11-17 10:15:03 -06:00
gojimmypi
16dba37ae6
fix wolfSSL_EVP_CIPHER_CTX_ctrl() SM GCM/CCM type
2023-11-17 07:56:56 -08:00
Juliusz Sosinowicz
03f3e6c6af
Add nginx 1.24.0 testing
2023-11-17 10:48:46 +01:00
Daniel Pouzzner
a10260ca5f
refactor AESNI implementations and *VECTOR_REGISTERS* macros to allow dynamic as-needed fallback to pure C, via WC_AES_C_DYNAMIC_FALLBACK.
...
wolfssl/wolfcrypt/aes.h: add key_C_fallback[] to struct Aes, and remove comment that "AESNI needs key first, rounds 2nd, not sure why yet" now that AES_128_Key_Expansion_AESNI no longer writes rounds after the expanded key.
wolfcrypt/src/aes.c:
* add _AESNI or _aesni suffixes/infixes to AESNI implementations that were missing them: AES_CBC_encrypt(), AES_CBC_decrypt_by*(), AES_ECB_encrypt(), AES_*_Key_Expansion(), AES_set_encrypt_key(), AES_set_decrypt_key(), AES_GCM_encrypt(), AES_GCM_decrypt(), AES_XTS_encrypt(), and AES_XTS_decrypt().
* move key size check from to start of wc_AesSetKeyLocal().
* refactor pure-C AES setkey and cipher implementations to use aes->key_C_fallback when defined(WC_AES_C_DYNAMIC_FALLBACK).
* refactor wc_AesSetKeyLocal() to set up both AESNI and pure-C expanded keys when defined(WC_AES_C_DYNAMIC_FALLBACK).
* refactor all (haveAESNI && aes->use_aesni) conditions to just (aes->use_aesni).
* add macros VECTOR_REGISTERS_PUSH and VECTOR_REGISTERS_POP, which do nothing but push a brace level when !defined(WC_AES_C_DYNAMIC_FALLBACK), but when defined(WC_AES_C_DYNAMIC_FALLBACK), they call SAVE_VECTOR_REGISTERS2() and on failure, temporarily clear aes->use_aesni and restore at _POP().
* refactor all invocations of SAVE_VECTOR_REGISTERS() and RESTORE_VECTOR_REGISTERS() to VECTOR_REGISTERS_PUSH and VECTOR_REGISTERS_POP, except in wc_AesSetKeyLocal(), wc_AesXtsEncrypt(), and wc_AesXtsDecrypt(), which are refactored to use SAVE_VECTOR_REGISTERS2(), with graceful failure concealment if defined(WC_AES_C_DYNAMIC_FALLBACK).
* orthogonalize cleanup code in wc_AesCbcEncrypt(), wc_AesCcmEncrypt() and wc_AesCcmDecrypt().
* streamline fallthrough software definitions of wc_AesEncryptDirect() and wc_AesDecryptDirect(), and remove special-casing for defined(WOLFSSL_LINUXKM)&&defined(WOLFSSL_AESNI).
wolfcrypt/src/aes_asm.{S,asm}:
* remove errant "movl $10, 240(%rsi)" from AES_128_Key_Expansion_AESNI.
* add _AESNI suffixes/infixes to implementations that needed them.
wolfcrypt/src/{aes_gcm_asm.{S,asm},aes_xts_asm.S}: regenerate from revisions in scripts#357 -- adds _aesni suffixes to implementations that were missing them.
wolfssl/wolfcrypt/types.h: remove DEBUG_VECTOR_REGISTER_ACCESS macros, and add dummy fallthrough definitions for SAVE_VECTOR_REGISTERS2 and WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL.
wolfssl/wolfcrypt/memory.h: adopt DEBUG_VECTOR_REGISTER_ACCESS code from types.h, and add definitions for WC_DEBUG_VECTOR_REGISTERS_RETVAL_INITVAL and WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL.
linuxkm/linuxkm_wc_port.h: add arch-specific macro definitions for SAVE_VECTOR_REGISTERS2().
wolfcrypt/benchmark/benchmark.c: add missing gates around calls to RESTORE_VECTOR_REGISTERS().
configure.ac:
* cover various interdependencies in enable-all/enable-all-crypto, for better behavior in combination with --disable-aesgcm, --disable-ecc, --disable-ocsp, --disable-hmac, --disable-chacha, --disable-ed25519, and --disable-ed448.
* inhibit aesgcm_stream in enable-all/enable-all-crypto when ENABLED_LINUXKM_DEFAULTS, because it is currently incompatible with WC_AES_C_DYNAMIC_FALLBACK.
* add -DWC_AES_C_DYNAMIC_FALLBACK when ENABLED_LINUXKM_DEFAULTS.
* add 3 new interdependency checks: "ECCSI requires ECC.", "SAKKE requires ECC.", "WOLFSSH requires HMAC."
wolfcrypt/src/asn.c: tweak gating to accommodate defined(NO_RSA) && !defined(HAVE_ECC).
wolfcrypt/src/evp.c: tweak gating to accommodate defined(NO_HMAC).
wolfcrypt/src/logging.c: remove DEBUG_VECTOR_REGISTER_ACCESS code (moved to memory.c).
wolfcrypt/src/memory.c: change #include of settings.h to types.h; adopt DEBUG_VECTOR_REGISTER_ACCESS code from logging.c; add implementation of SAVE_VECTOR_REGISTERS2_fuzzer().
wolfcrypt/src/pwdbased.c: add explanatory #error scrypt requires HMAC.
wolfcrypt/test/test.c:
* add DEBUG_VECTOR_REGISTER_ACCESS clauses to aes_xts_128_test(), aesecb_test(), aesctr_test(), aes_test() CBC section, aes256_test() CBC section, and aesgcm_default_test_helper()
* remove duplicate wc_AesEcbDecrypt() in aesecb_test().
* add gating for pbkdf2_test().
* fix cleanup code in dsa_test().
* fix gating in pkcs7authenveloped_run_vectors() to accommodate !defined(HAVE_AESGCM).
* fix gating in cryptocb_test() to accommodate defined(NO_HMAC).
wolfssl/wolfcrypt/cryptocb.h: remove gates around "pk" sub-struct of struct wc_CryptoInfo -- wc_CryptoInfo.pk.type (an int) is used unconditionally when --enable-debug, and is used with DH.
wolfssl/wolfcrypt/error-crypt.h: fix whitespace.
2023-11-17 01:15:28 -06:00
Sean Parkinson
d3448e2c1a
RSA private exponentiation: multiply blinding invert in Mont
...
When blinding, multiply result of exponentiation my blinding invert in
Montgomery form to make code more constant time.
2023-11-17 15:19:51 +10:00
Daniel Pouzzner
e395aad84b
Merge pull request #6958 from embhorn/zd16866
...
Add XGMTIME validation
2023-11-16 21:28:27 -05:00
JacobBarthelmeh
957a0ce300
Merge pull request #6964 from lealem47/zd16470
...
Parse explicit parameters in StoreEccKey()
2023-11-16 15:59:21 -07:00
gojimmypi
4c6c2942b1
Fix evp SM cipherType
2023-11-16 13:38:39 -08:00
JacobBarthelmeh
6945093221
Merge pull request #6935 from SparkiDev/ssl_crypto_extract
...
ssl.c: Move out crypto compat APIs
2023-11-16 11:58:14 -07:00
David Garske
8e05b5a9ab
Merge pull request #6975 from lealem47/gh6969
...
Add STM32H725 to default_conf.ftl
2023-11-15 21:15:36 -08:00
Sean Parkinson
8c61b2cc5f
IAR Thumb2 ASM: fixes
...
Don't assign constants to registers with IAR.
Don't assume register usage in AES_set_encrypt_key.
2023-11-16 11:14:43 +10:00
JacobBarthelmeh
bb73c233fc
Merge pull request #6973 from douzzer/20231115-misc-fixits
...
20231115-misc-fixits
2023-11-15 15:27:25 -07:00
lealem47
3576db8976
Merge pull request #6977 from JacobBarthelmeh/cmake
...
add wolfcrypt test and unit test to ctest
2023-11-15 14:47:49 -07:00
JacobBarthelmeh
9fa5d8872c
Merge pull request #6948 from SparkiDev/ecc_curve_koblitz
...
ECC double point: SECP112R2 and SEC128R2 are Koblitz curves
2023-11-15 14:23:42 -07:00
Daniel Pouzzner
263973bde9
src/wolfio.c: fix stack allocations for cookie digests on NO_SHA builds;
...
configure.ac: fix dependencies for enable_dsa vs enable_sha in enable-all, enable-all-crypto, and ENABLED_DSA setup.
2023-11-15 14:43:23 -06:00
JacobBarthelmeh
ada085390b
add wolfcrypt test and unit test to ctest
2023-11-15 10:38:49 -07:00
Lealem Amedie
cd1e9e9974
Add STM32H725 to default_conf.ftl
2023-11-15 10:30:01 -07:00
Lealem Amedie
2c7248492f
Rename macro
2023-11-15 10:27:24 -07:00
Lealem Amedie
ac89c90afd
Add RESET_MULTI_VALUE_STATS_VARS macro
2023-11-15 10:26:03 -07:00
Eric Blankenhorn
7bbeadcf97
Fix build errors with dtls1.3 and no tls1.2
2023-11-15 10:37:09 -06:00
JacobBarthelmeh
7daac20d24
Merge pull request #6952 from julek-wolfssl/dtls13-pqc-tests
...
Add dtls 1.3 PQC suites tests
2023-11-15 09:34:36 -07:00
Daniel Pouzzner
eaa66dc117
configure.ac: in enable-all, enable QUIC only if !ENABLED_LINUXKM_DEFAULTS, and enable aesgcm_stream only if enable_aesgcm.
2023-11-15 01:47:46 -06:00
Daniel Pouzzner
748b058dde
wolfcrypt/src/aes.c: fix for -Wrestrict in wc_AesCbcDecrypt() when WOLFSSL_AESNI.
2023-11-15 00:51:21 -06:00
Sean Parkinson
26a9435f5c
ECC point double: when z ordinate is 0 point is infinity
...
Recognize z == 0 as infinity in result of double.
2023-11-15 16:43:06 +10:00
Daniel Pouzzner
7569cfdff8
src/internal.c,src/wolfio.c: fallback to SHA256 when NO_SHA, in LoadCertByIssuer(), MicriumGenerateCookie(), uIPGenerateCookie(), and GNRC_GenerateCookie();
...
tests/api.c: when NO_SHA, omit test_wolfSSL_CertManagerCheckOCSPResponse() and test_wolfSSL_CheckOCSPResponse() (both use static artifacts with SHA1 name and key hashes).
2023-11-15 00:09:22 -06:00
Daniel Pouzzner
6a3451ca54
wolfcrypt/test/test.c: add WC_MAYBE_UNUSED attribute to declaration of max_relative_stack, to accommodate compilation settings when subsumed within testsuite.
2023-11-15 00:09:22 -06:00
Daniel Pouzzner
7e99ccc782
wolfcrypt/src/wc_port.c, wolfssl/wolfcrypt/wc_port.h: refactor WOLFSSL_GMTIME gmtime() into gmtime_r(), and always define HAVE_GMTIME_R when defined(WOLFSSL_GMTIME).
2023-11-15 00:09:22 -06:00
Sean Parkinson
2213306386
ECC double point: SECP112R2 and SEC128R2 are Koblitz curves
...
SECP112r2 and SECP128R2 are Koblitz curves, so don't compile them in
unless HAVE_ECC_KOBLITZ is defined. This requires custom curves which
enables point doubling to support A != -3.
2023-11-15 13:30:45 +10:00
JacobBarthelmeh
8f7adb2c16
Merge pull request #6967 from SparkiDev/aes_gcm_aarch64_hw_crypto
...
AES GCM ARM64: Replace hardware crypto assembly with generated code
2023-11-14 13:55:43 -07:00
Sean Parkinson
c4677927bc
AES GCM ARM64: Replace hardware crypto assembly with generated code
...
Optimized assembly of AES GCM for ARM64 using hardware crypto
instructions.
Code replaced between "START..." and "END...".
2023-11-14 09:24:05 +10:00
Lealem Amedie
b464a277c1
Refactor logic to remove MAX_SAMPLE_RUNS
2023-11-13 13:40:07 -07:00
JacobBarthelmeh
1b55e20d5a
Merge pull request #6966 from SparkiDev/aes_bitsliced_armasm_fix
...
AES bitsliced, ARMASM: config needs WOLFSSL_AES_DIRECT defined
2023-11-13 10:09:08 -07:00
Sean Parkinson
7eaff41e61
AES bitsliced, ARMASM: config needs WOLFSSL_AES_DIRECT defined
...
AES bitsliced needs WOLFSSL_AES_DIRECT defined when compiling for ARMASM
as there are different APIs used.
2023-11-13 07:40:40 +10:00
David Garske
7c24b2d4bd
Merge pull request #6965 from ejohnstown/uint128-cmake
...
uint128 and CMake
2023-11-10 20:57:46 -08:00
JacobBarthelmeh
c903a8c4a6
Merge pull request #6854 from SparkiDev/aes_bit_sliced
...
AES bitsliced implementation added
2023-11-10 17:10:19 -07:00
Kaleb Himes
a04eb81e95
Merge pull request #6959 from SparkiDev/sp_c_rsa_pub_e_64bits
...
SP C: support e up to 64-bits
2023-11-10 16:33:12 -07:00
David Garske
12878fccae
Merge pull request #6957 from lealem47/expandDistro
...
Add --enable-quic to --enable-all
2023-11-10 15:32:05 -08:00
John Safranek
d34d77681a
uint128 and CMake
...
1. Add to the check for HAVE___UINT128_T adding it to the list of items
that get dumped into the options.h file.
2023-11-10 14:59:41 -08:00
Lealem Amedie
04ea4da6fd
Parse explicit parameters in StoreEccKey()
2023-11-10 15:11:08 -07:00
JacobBarthelmeh
63c27219a8
Merge pull request #6962 from julek-wolfssl/dtls13-no-hrr-docs
...
Add info on how to use WOLFSSL_DTLS13_NO_HRR_ON_RESUME
2023-11-10 14:26:46 -07:00
Juliusz Sosinowicz
b8d5ac83eb
Add info on how to use WOLFSSL_DTLS13_NO_HRR_ON_RESUME
2023-11-10 10:43:26 +01:00
Sean Parkinson
3ab0fc1ba4
SP C: support e up to 64-bits
...
SP C code only supported one digit worth of e which is less than 64 or
32.
Change is to support up to 64 bit of e using sp_uint64 to hold value.
2023-11-10 09:58:51 +10:00
Eric Blankenhorn
a4bf774e1c
Add XGMTIME validation
2023-11-09 16:06:37 -06:00
Lealem Amedie
e2bbacd548
Add QUIC to --enable-all
2023-11-09 14:44:02 -07:00
JacobBarthelmeh
49a219e0d1
Merge pull request #6930 from Frauschi/zephyr_fix
...
Fixes for the Zephyr port
2023-11-09 12:56:34 -07:00
JacobBarthelmeh
73d3277b74
Merge pull request #6947 from SparkiDev/sp_arm64_mont_red_4_fix
...
SP ARM64 asm: fix Montgomery reduction by 4
2023-11-09 08:39:52 -07:00
Juliusz Sosinowicz
a666c39b65
zephyr 3.5 github action
2023-11-09 10:41:54 +01:00
Tobias Frauenschläger
081b34919c
Zephyr: improve order of random seed sources
...
When using Zephyr, we also want to use the proper wc_GenerateSeed
method. However, if one of the defines is set (e.g., NO_STM32_RNG), the
Zephyr option is ignored, although it would work. Hence, we have to
change the order in which these settings for the source of a random seed
are evaluated.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2023-11-09 10:41:54 +01:00
Tobias Frauenschläger
182eaa0b63
Zephyr: add support for RTC time
...
For ASN date validation, the actual wall clock time is needed from an
RTC. This commit adds support to read the RTC time in case it is
available in the Zephyr system. If the RTC is not available or an error
occurs during the readout, we fallback to the old implementation which
only supports relative time since boot.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2023-11-09 10:41:54 +01:00
Tobias Frauenschläger
4d8bbd7091
Zephyr: fix POSIX time include
...
The sys/time.h header causes redefinition errors regarding the fd_set
type and the select call inside socket_select.h. We want to include the
regular time.h header anyway, as done in random.c.
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
tmp
2023-11-09 10:41:54 +01:00
Tobias Frauenschläger
9d880fe161
Zephyr: Fix deprecation warning for rand32.h
...
Signed-off-by: Tobias Frauenschläger <t.frauenschlaeger@me.com >
2023-11-09 10:41:54 +01:00
SKlimaRA
308346aa0d
one less memcpy
2023-11-09 09:40:58 +01:00
JacobBarthelmeh
2b1c61a013
Merge pull request #6949 from bigbrett/zd16925
...
fix WOLFSSL_CALLBACK memory error
2023-11-08 23:35:32 -07:00
JacobBarthelmeh
3332b036d5
Merge pull request #6950 from SparkiDev/srtp_kdf_fix
...
SRTP KDF: Don't use i outside loop
2023-11-08 23:13:40 -07:00
JacobBarthelmeh
04c1e94e29
Merge pull request #6954 from SparkiDev/sp_cortexm_iar_branch_long
...
SP Cortex-M: branch long explicitly for IAR
2023-11-08 23:01:45 -07:00
JacobBarthelmeh
68b6bc87c7
Merge pull request #6916 from philljj/add_EXTENDED_KEY_USAGE_free
...
Add EXTENDED_KEY_USAGE_free to OpenSSL compat layer.
2023-11-08 22:07:40 -07:00
Sean Parkinson
168747615c
SP Cortex-M: branch long explicitly for IAR
...
GCC doesn't like explicit wide branch instruction but will use
appropriate instruction implicitly.
IAR won't widen branch instruction unless explicitly told.
2023-11-09 08:27:42 +10:00
jordan
be24d68e5d
Add EXTENDED_KEY_USAGE_free to OpenSSL compat layer.
2023-11-08 15:26:24 -06:00
Lealem Amedie
138d699cc7
Apply changes to new srtp-kdf code
2023-11-08 11:09:00 -07:00
Lealem Amedie
c0f3fe4434
Benchmarks: use clock_gettime() for ns resolution
2023-11-08 10:45:51 -07:00
Lealem Amedie
2cde843093
Measure max & min durations within the confines of MAX_SAMPLE_RUNS
2023-11-08 10:45:51 -07:00
Lealem Amedie
1303c0512c
Extract some code blocks into macros
2023-11-08 10:45:51 -07:00
Lealem Amedie
46a5465c3f
Remove redundant macro
2023-11-08 10:45:51 -07:00
Lealem Amedie
16ecc9b5f8
Address feedback and don't print avg ms if mean is displayed
2023-11-08 10:45:51 -07:00
Lealem Amedie
86a2b050fe
Gate on NO_FILESYSTEM
2023-11-08 10:45:50 -07:00
Lealem Amedie
a40de50be2
Add ADVANCED_STATS in benchmark.c
2023-11-08 10:45:50 -07:00
Lealem Amedie
9006dd5edd
Document new macro
2023-11-08 10:45:50 -07:00
Lealem Amedie
2ea0c2cae8
Run benchmarks at microsecond level
2023-11-08 10:45:50 -07:00
Stanislav Klima
a137847894
removed isCaSet from decoded cert
2023-11-08 12:24:29 +01:00
Stanislav Klima
1562106899
micro fix
2023-11-08 11:18:58 +01:00
Stanislav Klima
76d89a0c15
unused variable
2023-11-08 11:09:05 +01:00
Stanislav Klima
f518a8f7d5
new build flag WOLFSSL_ALLOW_ENCODING_CA_FALSE
2023-11-08 10:51:25 +01:00
Sean Parkinson
54f2d56300
ssl.c: Move out crypto compat APIs
...
ssl_crypto.c contains OpenSSL compatibility APIS for:
- MD4, MD5, SHA/SHA-1, SHA2, SHA3
- HMAC, CMAC
- DES, DES3, AES, RC4
API implementations reworked.
Tests added for coverage.
TODOs for future enhancements.
2023-11-08 19:43:18 +10:00
Juliusz Sosinowicz
8bc79a0b43
Add dtls 1.3 PQC suites tests
2023-11-08 10:29:35 +01:00
Stanislav Klima
4bbb0e3876
drafted ca false
2023-11-08 10:23:46 +01:00
Mikhail Paulyshka
944c7e175b
cmake: add WOLFSSL_X86_64_BUILD_ASM option
2023-11-08 09:18:07 +01:00
Mikhail Paulyshka
fca2f14f48
cmake: guard installation with WOLFSSL_INSTALL option
2023-11-08 09:18:07 +01:00
Mikhail Paulyshka
7adddc5fb8
cmake/functions: do not try to build x86_64 assembler on non-AMD64 platforms
2023-11-08 09:18:07 +01:00
Mikhail Paulyshka
703cfded28
cmake: introduce WOLFSSL_X86_64_BUILD variable
2023-11-08 09:18:06 +01:00
Sean Parkinson
716cb450aa
SRTP KDF: Don't use i outside loop
...
When shifting index down, first XOR outside loop isn't meant to use i.
2023-11-08 15:04:46 +10:00
lealem47
1a3f3aa5f0
Merge pull request #6951 from douzzer/20231107-unit-test-regenerate-ocsp-reply
...
20231107-unit-test-regenerate-ocsp-reply
2023-11-07 20:09:32 -07:00
Daniel Pouzzner
9cb6243357
wolfcrypt/test/test.c: add all initializers in wolfcrypt_test_main() for args for C++ legality (C-style initializer added in e58fafcf3d).
2023-11-07 19:33:18 -06:00
Daniel Pouzzner
ca694938fd
tests/api.c: update response vector in test_wolfSSL_CertManagerCheckOCSPResponse(), reflecting regenerated keys in certs/ocsp/.
2023-11-07 19:25:52 -06:00
David Garske
0fa47e9e28
Merge pull request #6943 from SparkiDev/iar_inline_asm_no_register
...
Thumb2 inline ASM: IAR doesn't do register variables
2023-11-07 14:23:44 -08:00
JacobBarthelmeh
b6e5b36f35
Merge pull request #6946 from dgarske/nooldtls_v1.1
...
Turn off old TLS v1.1 by default
2023-11-07 13:30:03 -07:00
Brett Nicholas
ba37dc9933
Fixes bug where example server with WOLFSSL_CALLBACKS hangs when used with
...
-6 option (simulated WANT_WRITE errors) or with DTLS, causing make check
to fail
2023-11-07 11:44:20 -07:00
David Garske
a46b6221b4
Turn off old TLS v1.1 by default (unless SSL v3.0 or TLS v1.0 enabled).
2023-11-07 09:23:59 -08:00
JacobBarthelmeh
d751029c07
Merge pull request #6945 from gojimmypi/PR-goto-alternate
...
introduce WARNING_OUT, when goto is not a hard error during tests
2023-11-07 10:17:53 -07:00
JacobBarthelmeh
8921a720a1
Merge pull request #6888 from SparkiDev/srtp_kdf
...
SRTP/SRTCP KDF: add implementation
2023-11-07 10:11:43 -07:00
JacobBarthelmeh
a6de9cd06f
Merge pull request #6942 from SparkiDev/sp_int_sqr_volatile
...
SP int: ARM64 optimization issue
2023-11-07 10:09:25 -07:00
gojimmypi
e58fafcf3d
introduce WARNING_OUT, optional WOLFSSL_ESPIDF_ERROR_PAUSE
2023-11-07 08:52:34 +01:00
Sean Parkinson
cefe108cab
Thumb2 inline ASM: IAR doesn't do register variables
...
IAR doesn't parse register variable declarations with specified
registers. IAR doesn't even honor the register keyword.
Can use small negative but IAR doesn't like it.
Specify the positive value instead.
Add a small code size version of mont_reduce_full using umlal and umaal.
Make 'asm' usage in variables use keyword '__asm__'.
Explicitly don't inline some functions when compiling with IAR.
2023-11-07 16:12:07 +10:00
Sean Parkinson
01c3345c7a
SP ARM64 asm: fix Montgomery reduction by 4
...
Handle add overflow properly in generic Montgomery reduction for 4
words. Used when reducing back to order of P-256 curve.
2023-11-07 11:39:03 +10:00
Sean Parkinson
8c3e1dbf48
SRTP/SRTCP KDF: add implementation
...
Add implementation of SRTP KDF and SRTCP KDF.
One shot APIs compatible with SP 800-135 and ACVP testing.
Tests added to test.c.
Benchmarking added.
Doxygen added.
2023-11-07 10:33:14 +10:00
JacobBarthelmeh
c852347dfb
Merge pull request #6877 from gojimmypi/Espressif-cmake-update
...
Espressif Update wolfSSL component CMakeLists.txt
2023-11-06 13:43:07 -07:00
JacobBarthelmeh
c5e2f414ea
Merge pull request #6929 from julek-wolfssl/dtls13-early-data-server-side
...
dtls 1.3: allow to skip cookie exchange on resumption
2023-11-06 13:30:21 -07:00
JacobBarthelmeh
8ac291bbe1
Merge pull request #6944 from miyazakh/fix_qt_jenkins_failure
...
skip DATE check if flags is set when calling AddTrustedPeer
2023-11-06 11:35:22 -07:00
JacobBarthelmeh
c92d25816a
Merge pull request #6887 from julek-wolfssl/zd/16849
...
Implement untrusted certs in wolfSSL_X509_STORE_CTX_init
2023-11-06 10:13:43 -07:00
JacobBarthelmeh
8569e76a87
Merge pull request #6915 from bigbrett/typo-fix-DecodeBasicCAConstraint
...
fix typo in WOLFSSL_ENTER function name
2023-11-03 13:53:23 -06:00
JacobBarthelmeh
190b51ae6f
Merge pull request #6810 from bandi13/codeSonar_fixes
...
Fix 'negative character value'
2023-11-03 13:52:06 -06:00
Juliusz Sosinowicz
8c87920903
Address code review
2023-11-03 11:02:41 +01:00
Sean Parkinson
5b863dcb12
AES bitsliced implementation added
...
AES bitsliced implementation that is cache attack safe.
Configure with:
--enable-aes-bitslice
or define:
WC_AES_BITSLICE
HAVE_AES_ECB
HAVE_AES_DIRECT
Very slow for CBC, CFB, OFB and any mode that uses a previous encrypt
block to calculate current.
CTR, GCM, XTS can parallelize the data and be much faster.
Added AES-ECB test to test.c.
2023-11-03 14:19:58 +10:00
Hideki Miyazaki
49121b5c47
move declaration to the top of func
2023-11-03 11:45:33 +09:00
Hideki Miyazaki
8d9dc3d79f
skip DATE if flags is set when calling AddTrustedPeer
2023-11-03 09:38:23 +09:00
Sean Parkinson
b8ea978066
Merge pull request #6941 from douzzer/20231102-examples-asn1-double-fclose
...
20231102-examples-asn1-double-fclose
2023-11-03 08:50:13 +10:00
Sean Parkinson
cfb6560468
SP int: ARM64 optimization issue
...
Make variables volatile to avoid compiler optimization issues.
2023-11-03 08:08:29 +10:00
JacobBarthelmeh
c8af4edd74
Merge pull request #6940 from bandi13/takeInConstParameters
...
Can guarantee not to modify arguments of `mp_isodd` and `mp_iszero`
2023-11-02 15:45:51 -06:00
Daniel Pouzzner
d6f37d48d6
examples/asn1/asn1.c: remove now-redundant fclose(fp) in asn1App_ReadFile() (which also was incorrectly closing stdin). see #6905 .
2023-11-02 16:14:40 -05:00
Andras Fekete
49b9764c52
Can guarantee not to modify arguments of mp_isodd and mp_iszero
2023-11-02 16:00:57 -04:00
David Garske
8fc754515a
Merge pull request #6938 from SparkiDev/rsa_pss_salt_len_openssl_compat_fix
...
RSA PSS OpenSSL compatibility verification: support AUTO
2023-11-02 09:07:40 -07:00
JacobBarthelmeh
96977d1480
Merge pull request #6900 from julek-wolfssl/zd/16868
...
EVP_EncodeBlock should not append a newline
2023-11-02 09:20:39 -06:00
Sean Parkinson
4870435604
RSA PSS OpenSSL compatibility verification: support AUTO
...
When wolfSSL_RSA_verify_PKCS1_PSS() called with RSA_PSS_SALTLEN_AUTO
(RSA_PSS_SALTLEN_MAX_SIGN) it wasn't using RSA_PSS_SALT_LEN_DISCOVER
when available.
2023-11-02 11:24:18 +10:00
lealem47
2ee94023f9
Merge pull request #6937 from dgarske/stm32wl
...
Support for the STM32WL55 and PKA improvements for ECC parameters
2023-11-01 17:44:22 -06:00
David Garske
0dde07e282
Whitespace cleanups (appease multi-test "check-source-text").
2023-11-01 15:03:12 -07:00
David Garske
33e12e3537
Support for the STM32WL55 and PKA improvements for ECC parameters. Fixes #6386 and Fixes #6396 .
2023-11-01 13:55:31 -07:00
JacobBarthelmeh
9e34ed937e
Merge pull request #6927 from dgarske/crl_no_date
...
Add build option for disabling CRL date check
2023-11-01 14:48:28 -06:00
JacobBarthelmeh
21f34ef028
Merge pull request #6905 from bandi13/moreCodeSonarFixes
...
Don't nag about leaked resources
2023-11-01 14:46:02 -06:00
Brett Nicholas
9d632ccaa6
apply lateRL offset to memcpy dest, not src
2023-11-01 14:32:11 -06:00
JacobBarthelmeh
15fdf6eccc
Merge pull request #6910 from bigbrett/ios-ca-api
...
exercise --sys-ca-certs optionin external.test
2023-11-01 14:09:24 -06:00
Andras Fekete
bb9031da6e
Remove dead code
2023-11-01 13:30:40 -04:00
JacobBarthelmeh
c920337f2f
Merge pull request #6891 from julek-wolfssl/zd/16849-i2d_x509
...
Advance pointer in wolfSSL_i2d_X509
2023-11-01 11:02:44 -06:00
JacobBarthelmeh
026c4bcbc7
Merge pull request #6902 from dgarske/various_20231020
...
Fixes for PKCS w/out RSA and Cert/CSR signing with unknown OID
2023-11-01 10:58:10 -06:00
JacobBarthelmeh
a3ea84d8e8
Merge pull request #6917 from SparkiDev/sp_int_no_sp_digit
...
SP int: don't use sp_digit as the type is sp_int_digit
2023-11-01 10:57:07 -06:00
JacobBarthelmeh
98843798c2
Merge pull request #6934 from SparkiDev/regression_fixes_8
...
Regression test fixes
2023-11-01 10:55:41 -06:00
JacobBarthelmeh
59e947d3e6
Merge pull request #6936 from philljj/codespell_cleanup
...
Used codespell and fixed obvious typos.
2023-11-01 10:39:04 -06:00
jordan
34f349e510
Used codespell and fixed obvious typos.
2023-11-01 10:35:12 -05:00
Sean Parkinson
0eab70f806
Regression test fixes
...
Fixes for different configurations and memory allocation failure
testing.
2023-11-01 14:10:49 +10:00
Sean Parkinson
2e37ff4e45
SP int: don't use sp_digit as the type is sp_int_digit
...
Stop casting to the wrong type. SP int code use sp_int_digit and
sp_digit can be a different signedness.
2023-11-01 13:38:23 +10:00
JacobBarthelmeh
7435d235a6
Merge pull request #6931 from dgarske/async_v5.6.4
...
Async v5.6.4
2023-10-31 14:52:13 -06:00
David Garske
2ac0d47908
Fix for async edge case with Intel QuickAssist/Cavium Nitrox that was broken in PR #6783 . Was causing re-entry and multiple calls for some operations like DH KeyGen that don't advance state on completion. https://github.com/wolfSSL/wolfAsyncCrypt/pull/71
2023-10-31 12:43:12 -07:00
Juliusz Sosinowicz
aed715cb2c
dtls 1.3: allow to skip cookie exchange on resumption
...
tls 1.3: do cookie exchange when asked too even when found a matching cipher
2023-10-31 14:29:04 +01:00
David Garske
0455224439
Fix build errors in API unit test without IO dependencies.
2023-10-30 17:04:36 -07:00
David Garske
cdef51f537
Add build option for disabling CRL date check (WOLFSSL_NO_CRL_DATE_CHECK). ZD 16675
2023-10-30 15:45:33 -07:00
David Garske
37884f864d
Merge pull request #6926 from JacobBarthelmeh/release
...
prepare for release 5.6.4
2023-10-30 08:28:37 -07:00
JacobBarthelmeh
6cf75a7d42
prepare for release 5.6.4
2023-10-30 07:59:00 -06:00
David Garske
2c91ecb466
Merge pull request #6924 from JacobBarthelmeh/srtp
...
sanity check on length before ato16 with SRTP
2023-10-28 16:13:06 -07:00
JacobBarthelmeh
07c8c5c8ca
sanity check on length before ato16 with SRTP
2023-10-28 16:13:45 -06:00
David Garske
cc45b31470
Merge pull request #6922 from JacobBarthelmeh/coverity
...
clean up some coverity reports
2023-10-27 18:40:02 -07:00
JacobBarthelmeh
c3ed45d331
additional case for CID 330392 and 330401
2023-10-27 16:34:04 -06:00
JacobBarthelmeh
688b94cad2
fix typo and missing brackets
2023-10-27 16:11:18 -06:00
JacobBarthelmeh
7d5491994e
Fix for CID 299649 checking on if ctx is null
2023-10-27 15:28:42 -06:00
JacobBarthelmeh
29782449ec
Fix for CID 299637 make sure after free'ing pointer it is not re-used
2023-10-27 15:14:02 -06:00
JacobBarthelmeh
247bc151d9
Fix for CID 299627 memory leak on error case
2023-10-27 15:10:32 -06:00
JacobBarthelmeh
0ba406a52c
Fix for CID 299536 possible null dereference
2023-10-27 15:02:10 -06:00
JacobBarthelmeh
a2032dfb36
touch up negative value sanity check, fix CID 210741 sanity check
2023-10-27 14:50:13 -06:00
JacobBarthelmeh
33c4054cbb
Fix for CID 299748 memory leak in error case
2023-10-27 14:36:51 -06:00
JacobBarthelmeh
ef50cb3f02
Fix for CID 299759 be explicit on compare
2023-10-27 14:33:33 -06:00
JacobBarthelmeh
271fa83a15
Fix for CID 299778 memory leak on error case
2023-10-27 14:28:47 -06:00
JacobBarthelmeh
8760ad9473
Fix for CID 299847 memory leak on error case
2023-10-27 14:17:31 -06:00
JacobBarthelmeh
7b20a5597c
Fix for CID 330399 memory leak on error case
2023-10-27 14:11:21 -06:00
JacobBarthelmeh
c11176c276
Fixes CID 330401 and 330392 memory leak
2023-10-27 14:04:46 -06:00
Andras Fekete
42c241dbbf
Avoid use of uninitialized array
2023-10-27 15:38:46 -04:00
JacobBarthelmeh
8add411d9a
fix for CID 330412 wrong sizeof argument
2023-10-27 13:35:08 -06:00
Andras Fekete
2877b7be50
Fix possible memory leak
2023-10-27 15:31:28 -04:00
Andras Fekete
21d465cf9a
Fix possible double free
2023-10-27 15:31:28 -04:00
Andras Fekete
f8f080d7de
Don't nag about leaked resources
2023-10-27 15:31:28 -04:00
JacobBarthelmeh
16b842992d
fix for CID 330416 memory leak
2023-10-27 13:27:30 -06:00
JacobBarthelmeh
449fb9c581
Fix for report CID 330424 wrong sizeof argument
2023-10-27 13:20:50 -06:00
JacobBarthelmeh
1dd6888288
Merge pull request #6920 from embhorn/zd16909
...
Fix mem leak in TLSX_CA_Names_Parse
2023-10-27 10:45:54 -06:00
Eric Blankenhorn
6b0e28f840
Fix mem leak in TLSX_CA_Names_Parse
2023-10-27 07:58:50 -05:00
David Garske
a17d6ef751
Merge pull request #6918 from JacobBarthelmeh/readme
...
remove packaging status badge
2023-10-26 16:19:06 -07:00
JacobBarthelmeh
85fab2b4f7
remove packaging status badge
2023-10-26 15:15:36 -07:00
Brett Nicholas
5277065c3c
fix typo in WOLFSSL_ENTER function name
2023-10-26 13:01:05 -06:00
JacobBarthelmeh
45ba778692
Merge pull request #6911 from douzzer/20231025-sp_to_unsigned_bin_len_ct-Wconversion-cast
...
20231025-sp_to_unsigned_bin_len_ct-Wconversion-cast
2023-10-26 10:33:50 -06:00
Daniel Pouzzner
7821c48e65
wolfcrypt/src/sp_int.c: add cast in sp_to_unsigned_bin_len_ct() to mollify -Wconversion.
2023-10-25 23:40:21 -05:00
David Garske
fc858ec33b
Merge pull request #6908 from JacobBarthelmeh/static-analysis
...
minor warning fixes from static analysis tests
2023-10-25 17:28:54 -07:00
Brett
89d445a5a5
added --sys-ca-certs client connection to external test
2023-10-25 15:13:08 -06:00
Brett
60f75ea5a8
simplified apple header detection used in code
2023-10-25 15:13:06 -06:00
JacobBarthelmeh
6538ed1c39
coverity fix for CID 327268
2023-10-25 09:52:35 -06:00
JacobBarthelmeh
b46545315c
fix for possible null dereference warning
2023-10-25 08:44:11 -06:00
JacobBarthelmeh
d801dc1c85
Merge pull request #6906 from SparkiDev/pkcs8_info_free_fix
...
ProcessBuffer: fix free call
2023-10-25 08:38:56 -06:00
JacobBarthelmeh
6d8136c63e
Merge pull request #6896 from SparkiDev/rsa_to_bin_len_ct
...
RSA: convert to bin with length in constant time
2023-10-25 08:34:37 -06:00
Sean Parkinson
d87cd2cc05
ProcessBuffer: fix free call
...
'info' was freed before use when OPENSSL_EXTRA is defined.
2023-10-25 17:23:04 +10:00
András Fekete
5da7efacc9
Merge pull request #6894 from julek-wolfssl/fix-possible-hang
...
Fix static analyzer possible leak
2023-10-24 09:13:58 -04:00
András Fekete
a74228b5b0
Merge pull request #6904 from julek-wolfssl/suites-allocation
...
Don't try to allocate 0 size suites copy. Fixes `--enable-trackmemory --enable-smallstack CFLAGS="-DALT_ECC_SIZE" --enable-opensslextra` errors.
2023-10-24 09:07:42 -04:00
Juliusz Sosinowicz
dc5a246fdd
Do NULL check in FreeCRL
2023-10-24 10:31:17 +02:00
Juliusz Sosinowicz
8f60fb0053
Advance pointer in wolfSSL_i2d_X509
2023-10-24 10:25:06 +02:00
Juliusz Sosinowicz
4aad7589d6
Don't try to allocate 0 size suites copy
2023-10-24 10:10:08 +02:00
Sean Parkinson
13cadbbe55
Merge pull request #6903 from douzzer/20231021-fix-null-derefs
...
20231021-fix-null-derefs
2023-10-24 13:12:09 +10:00
JacobBarthelmeh
1de048826e
Merge pull request #6895 from bigbrett/ios-ca-api
...
Fix WOLFSSL_SYS_CA_CERTS bug on Apple devices
2023-10-23 07:57:08 -06:00
Juliusz Sosinowicz
3c5d3c0fa9
bwrap ocsp renew script
2023-10-23 15:53:42 +02:00
gojimmypi
1a113c5429
Espressif add TLS Client/Server local user_settings.h
2023-10-22 16:59:54 +02:00
gojimmypi
8eaf09d7a0
Update Espressif TLS Client/Server CMakeLists.txt
2023-10-22 16:53:56 +02:00
gojimmypi
9fe071fe73
Espressif remove pre-existing /include/user_settings.h during compile all.
2023-10-22 16:21:06 +02:00
Daniel Pouzzner
501299bc31
fix null pointer derefs in examples/pem/pem.c:pemApp_ReadFile() and tests/api.c:LoadPKCS7SignedDataCerts() detected by clang-tidy.
2023-10-21 13:34:04 -05:00
David Garske
cf1dcdf402
Fix for adding signature where OID is not found. Currently our AddSignature function will add without OID, which is invalid. For example RSA is disabled and CSR tries to use CTC_SHA256wRSA. The wc_SignCert_ex will succeed and report success, but the CSR/Cert will be invalid (missing sigType OID).
2023-10-20 16:29:59 -07:00
David Garske
6887281361
Fix for ./configure --enable-pkcs7 --disable-rsa && make check.
2023-10-20 16:27:54 -07:00
JacobBarthelmeh
9db828a099
Merge pull request #6898 from SparkiDev/ed25519_g++
...
Ed25519: add missing C++ directives for C functions
2023-10-20 15:52:12 -06:00
JacobBarthelmeh
5018d6c2bb
Merge pull request #6897 from SparkiDev/tls13_psk_one_id_var_decl
...
TLS 1.3: compiling with WOLFSSL_PSK_ONE_ID fix
2023-10-20 15:48:59 -06:00
JacobBarthelmeh
ca2a6d7daa
Merge pull request #6878 from SparkiDev/sha256_armv7a_vmov_fix
...
ARMv7a SHA256: explicit size on vmov
2023-10-20 15:46:58 -06:00
Brett
2387579880
added FIPS warning for Apple native cert validation
2023-10-20 15:40:49 -06:00
Brett
dd12e5a39e
Fix WOLFSSL_SYS_CA_CERTS bug that accepted intermediate CA certs with invalid
...
signatures. Also adds --sys-ca-certs to client in unit.test to detect
regressions
2023-10-20 15:40:44 -06:00
Andras Fekete
0925f8ab18
Use 'unsigned char'
2023-10-20 16:16:48 -04:00
Andras Fekete
ec0a2f2683
Fix 'negative character value'
...
In a number of libc implementations, isalpha()/isalnum() is implemented using lookup tables (arrays): passing in a negative value can result in a read underrun.
2023-10-20 16:16:48 -04:00
Juliusz Sosinowicz
8cd6cd175d
EVP_EncodeBlock should not append a newline
2023-10-20 13:20:11 +02:00
Sean Parkinson
fcf1406675
RSA: convert to bin with length in constant time
...
Add mp_to_unsigned_bin_len_ct() which puts a number into a buffer with
padding in constant time.
Call mp_to_unsigned_bin_len_ct() in RSA when encoding result of
exponentiation.
2023-10-20 14:04:36 +10:00
Sean Parkinson
c88dcac80e
Ed25519: add missing C++ directives for C functions
...
Assembly code has C function names.
Need to tell C++ that these are C function and not to mangle names.
2023-10-20 12:02:51 +10:00
Sean Parkinson
ce1e44d5e8
TLS 1.3: compiling with WOLFSSL_PSK_ONE_ID fix
...
Move use of 'suites' into non-WOLFSSL_PSK_ONE_ID path as variable
declared and used only in that case.
2023-10-20 10:32:45 +10:00
Sean Parkinson
4ac795961b
ARMv7a SHA256: explicit size on vmov
...
For SHA256 using NEON on ARM32, change vmov instruction that is moving
from scalar to general-purpose register to have explicit size (32 bits).
May be needed by some compilers.
2023-10-20 10:21:57 +10:00
JacobBarthelmeh
1abaa94120
Merge pull request #6889 from SparkiDev/sm2_priv_import_range
...
ECC SM2 import private key: check less than order-1
2023-10-19 17:12:07 -06:00
JacobBarthelmeh
22be42a161
Merge pull request #6885 from bigbrett/aes-eax
...
Move AesEax definition to aes.h
2023-10-19 16:49:10 -06:00
Juliusz Sosinowicz
d13d446c2e
Add missing guard
2023-10-19 20:05:59 +02:00
Juliusz Sosinowicz
2ccbdd3a7e
Log correct message
2023-10-19 19:07:45 +02:00
Juliusz Sosinowicz
cecc5f6b19
Call wc_UnLockRwLock only once
2023-10-19 17:04:41 +02:00
Juliusz Sosinowicz
8a8acbd55f
Add log about allocation failure
2023-10-19 17:00:49 +02:00
Juliusz Sosinowicz
2dd8e713f2
Fix static analyzer possible leak
...
crl would never be null there but clean up code to make sure newcrl->crlLock gets free'd
2023-10-19 16:58:28 +02:00
Eric Blankenhorn
962e35aa24
Add error reporting to loadX509orX509REQFromBuffer
2023-10-19 09:31:30 -05:00
Sean Parkinson
abd7bb3ac3
ECC SM2 import private key: check less than order-1
...
SM2 curves must have private key less than order-1 instead of order.
2023-10-19 17:29:25 +10:00
Juliusz Sosinowicz
1ae248018f
Implement untrusted certs in wolfSSL_X509_STORE_CTX_init
2023-10-18 22:24:19 +02:00
JacobBarthelmeh
a3bf7a66a4
Merge pull request #6886 from julek-wolfssl/openvpn-master-fix
...
Define SSL_get_peer_tmp_key
2023-10-18 13:17:15 -06:00
David Garske
22ab21749c
Merge pull request #6869 from bigbrett/ios-ca-api
...
Add support for new Apple trust APIs with WOLFSSL_SYS_CA_CERTS
2023-10-18 10:29:41 -07:00
Juliusz Sosinowicz
f99c7cbb21
Define SSL_get_peer_tmp_key
2023-10-18 19:24:11 +02:00
JacobBarthelmeh
269090353e
Merge pull request #6884 from kareem-wolfssl/zd16824
...
Add explicit break to switch statement in GetHmacLength
2023-10-18 11:20:55 -06:00
JacobBarthelmeh
b4724b515d
Merge pull request #6880 from SparkiDev/sm2_named_group_val_fix
...
SM2 named curve disabled: value outside of supported values
2023-10-18 10:51:02 -06:00
Brett
d805e06469
add AesEax struct to header for public use
2023-10-18 09:23:39 -06:00
Sean Parkinson
1e84d24c20
SM2 named curve disabled: value outside of supported values
...
SM2 named curve value is specified in specification.
Values 0-14 aren't used, so, those bits in disabledCurves are used for
values over 31.
Add range checks.
2023-10-18 10:51:37 +10:00
JacobBarthelmeh
3943852b79
Merge pull request #6882 from douzzer/20231017-wolfsentry-wolfssl_test-h
...
20231017-wolfsentry-wolfssl_test-h
2023-10-17 16:03:41 -06:00
David Garske
bc0643803d
Merge pull request #6873 from JacobBarthelmeh/coverity
...
Coverity scan touch up
2023-10-17 14:44:33 -07:00
JacobBarthelmeh
19870b2378
Merge pull request #6883 from bigbrett/cmake-aarch64-build-macro-fix
...
cmake aarch64 fix
2023-10-17 15:31:23 -06:00
Kareem
f59b22d3a0
Add explicit break to switch statement in GetHmacLength
2023-10-17 14:14:05 -07:00
JacobBarthelmeh
4f1b3fff73
Merge pull request #6879 from jpbland1/cmac-invalid-devId
...
correctly set invalid devId for when cryptoCb is on
2023-10-17 13:23:17 -06:00
Brett
a1d76849e6
added CMake support for new Apple native certificate verification
2023-10-17 13:17:42 -06:00
JacobBarthelmeh
dc7e044157
Merge pull request #6881 from lealem47/mingw_pthreads
...
Fix for pthreads on MSYS2 & MINGW
2023-10-17 13:10:05 -06:00
Brett
e976a7faeb
added CMake host processor check to appropriately set WOLFSSL_AARCH64_BUILD on M1 macs
2023-10-17 12:51:36 -06:00
Daniel Pouzzner
f0db681550
wolfssl/test.h: move wolfsentry logic out of wolfssl project and into header file in wolfsentry project.
2023-10-17 13:05:23 -05:00
Lealem Amedie
a810514f86
Get multi-test passing
2023-10-17 11:36:19 -06:00
John Bland
76b770d4ee
update comment based on PR advise
2023-10-17 13:01:00 -04:00
Lealem Amedie
286d551ad0
Use same mingw macro in codebase for consistency
2023-10-17 10:22:17 -06:00
JacobBarthelmeh
603b5bb573
Merge pull request #6875 from douzzer/20231016-sp-math-fix-redux
...
20231016-sp-math-fix-redux
2023-10-17 10:08:43 -06:00
Lealem Amedie
5bc2edd5ad
Allow override of XSNPRINTF for Windows
2023-10-17 09:37:50 -06:00
Lealem Amedie
b73a440205
Fix for pthreads on MSYS2 & MINGW
2023-10-17 09:16:41 -06:00
John Bland
92382602dd
fix bad placement
2023-10-17 01:39:34 -04:00
John Bland
53d80c0b7f
correctly set invalid devId for when cryptoCb is on
...
but the user has opted to use software, or cmac is not available on for their
device. currently a devId of 0 is set which causes CRYPTOCB_UNAVAILABLE
2023-10-17 01:33:06 -04:00
gojimmypi
f5d1cb5132
Update wolfSSL component CMakeLists.txt
2023-10-17 02:09:26 +02:00
Daniel Pouzzner
f1725b4962
fix to 3e9f8bc649: (void)h was a typo for correct (void)n.
2023-10-16 18:23:45 -05:00
JacobBarthelmeh
b7b0316ac9
free buffer on error case
2023-10-16 15:04:57 -06:00
Brett
0244c2a254
Add support for new Apple trust APIs with WOLFSSL_SYS_CA_CERTS
2023-10-16 14:37:21 -06:00
JacobBarthelmeh
ae3fdbec47
add free in error case CID 327286
2023-10-16 13:59:05 -06:00
JacobBarthelmeh
74b63b6409
fix for derefernce warning on debug message
2023-10-16 13:52:42 -06:00
JacobBarthelmeh
8be0e14bd2
add unlock in error case CID 327294
2023-10-16 13:46:18 -06:00
JacobBarthelmeh
bab01ca313
Merge pull request #6872 from douzzer/20231016-sp-math-aes-eax-fips-fixes
...
20231016-sp-math-aes-eax-fips-fixes
2023-10-16 13:43:26 -06:00
JacobBarthelmeh
99d46d9a6d
fix for derefernce warning CID 327296 & CID 327298
2023-10-16 13:36:24 -06:00
JacobBarthelmeh
3c23f39437
fix for out of bounds edge case CID 327299
2023-10-16 13:34:05 -06:00
JacobBarthelmeh
ed001829df
Fix for dereference CID 327300 & CID 327301
2023-10-16 13:33:15 -06:00
Daniel Pouzzner
3e9f8bc649
tests/api.c: gate test_wc_AesEaxVectors(), test_wc_AesEaxEncryptAuth(), and test_wc_AesEaxDecryptAuth(), on !FIPS || FIPS>=5.3.
...
wolfcrypt/src/eccsi.c: remove incorrect `(void)h` from eccsi_mulmod_base_add() in newly exposed WOLFSSL_SP_MATH code path.
2023-10-16 13:30:16 -05:00
JacobBarthelmeh
d35112064b
Merge pull request #6840 from philljj/xmss_hooks_support
...
Add XMSS/XMSSMT wolfCrypt hooks.
2023-10-16 10:58:12 -06:00
jordan
46b1a030a7
XMSS/XMSSMT hooks support: fix g++ warnings, and small cleanup for review.
2023-10-13 18:01:07 -05:00
JacobBarthelmeh
c23559a91c
Merge pull request #6866 from bigbrett/aes-eax
...
Add more extensive AES EAX tests to api.c
2023-10-13 16:09:30 -06:00
JacobBarthelmeh
7afd9810de
Merge pull request #6867 from cconlon/jniConfigExpand
...
Update "--enable-jni" to include additional defines
2023-10-13 15:13:32 -06:00
Brett
87cffc8229
Added more extensive AES EAX tests to api.c
2023-10-13 11:38:16 -06:00
JacobBarthelmeh
79a6e1eb04
Merge pull request #6808 from SparkiDev/sp_sm2
...
SP updates for SM2
2023-10-13 10:17:17 -06:00
Chris Conlon
8cd89884ce
update --enable-jni with KEEP_PEER_CERT, WOLFSSL_ALT_CERT_CHAINS, WOLFSSL_KEY_GEN
2023-10-13 10:07:04 -06:00
JacobBarthelmeh
f247e6b6f0
Merge pull request #6865 from per-allansson/wolfio-getaddrinfo-hints-a
...
wolfio: request only IPv4 addresses unless IPv6 support is enabled
2023-10-13 09:53:38 -06:00
JacobBarthelmeh
95137f91fa
Merge pull request #6856 from dgarske/fips_win32
...
Fixes for wolfCrypt FIPS DLL win32
2023-10-13 09:49:26 -06:00
JacobBarthelmeh
dd1459ec8e
Merge pull request #6859 from julek-wolfssl/curl-releases
...
Test curl releases
2023-10-13 08:57:11 -06:00
JacobBarthelmeh
4001734421
Merge pull request #6863 from lealem47/xcode_cyassl
...
Remove cyaSSL from XCODE proj and small fix in chacha.c
2023-10-13 08:54:11 -06:00
Per Allansson
5f20f1171d
wolfio: request only IPv4 addresses unless IPv6 support is enabled
2023-10-13 15:25:16 +02:00
Juliusz Sosinowicz
962c315447
Test curl releases too
2023-10-13 11:52:02 +02:00
JacobBarthelmeh
26cc785fbc
Merge pull request #6861 from douzzer/20231012-keylog-export-warning-fix
...
20231012-keylog-export-warning-fix
2023-10-12 17:04:39 -06:00
Sean Parkinson
0cc21a42f3
SP updates for SM2
...
Allow wolfSSL to build with SP implementations of SM2.
Updates to SP implementation of other code.
2023-10-13 08:14:15 +10:00
JacobBarthelmeh
38df4e2bd5
Merge pull request #6857 from kareem-wolfssl/zd16815
...
Update documentation for wc_Shake256_Final to match function signature.
2023-10-12 15:08:58 -06:00
JacobBarthelmeh
26ab3b109a
Merge pull request #6858 from anhu/FASCN_OID
...
Support FASCN OID in wolfssl_dns_entry_othername_to_gn()
2023-10-12 14:47:09 -06:00
JacobBarthelmeh
883fcfc11e
Merge pull request #6860 from douzzer/20231012-aes-xts-fixes
...
20231012-aes-xts-fixes
2023-10-12 14:41:17 -06:00
Lealem Amedie
0d53796284
Apply the same changes to FIPS project
2023-10-12 14:07:32 -06:00
Lealem Amedie
20cab7afe3
Remove cyaSSL from XCODE proj and small fix in chacha.c
2023-10-12 13:58:43 -06:00
David Garske
c05aea7c5a
Improvements to the wolfCrypt FIPS Visual Studio project link settings to resolve ASLR (Randomized Base Address) issue on some platforms. ZD 16615
2023-10-12 12:05:14 -07:00
David Garske
3cebf35b1b
Cleanups for IDE/WIN10 user_settings.h to allow for FIPS 140-2 3389 cert. Fixed compiler warning with possible use of uninitialized data.
2023-10-12 12:04:51 -07:00
Daniel Pouzzner
0549dba3db
configure.ac and src/tls.c: fix --enable-keylog-export to warn at configure time, then build cleanly.
2023-10-12 13:09:43 -05:00
Daniel Pouzzner
3a195563f7
wolfcrypt/src/aes.c: fix zerodivcond and -Wconversion in wc_AesXtsEncryptConsecutiveSectors() and wc_AesXtsDecryptConsecutiveSectors().
...
wolfcrypt/test/test.c: add missing FIPS gating around AES-XTS testing.
2023-10-12 12:08:16 -05:00
jordan
60fea5ee5c
XMSS/XMSSMT hooks support: small update for requested changes.
2023-10-11 21:29:45 -05:00
Anthony Hu
f332995131
Support FASCN OID in wolfssl_dns_entry_othername_to_gn()
2023-10-11 20:33:13 -04:00
Kareem
66f4101569
Update documentation for wc_Shake256_Final to match function signature.
2023-10-11 16:12:34 -07:00
JacobBarthelmeh
0e35e9cbbe
Merge pull request #6806 from lealem47/XTS
...
Add XTS API's required for VeraCrypt
2023-10-11 13:35:45 -06:00
JacobBarthelmeh
653e5b01b1
Merge pull request #6646 from embhorn/gh5636_5637
...
Fix RFC references and add WOLFSSL_ALLOW_CRIT_AIA
2023-10-11 13:30:42 -06:00
Lealem Amedie
e7eec645b0
Sanity checks and correct comment
2023-10-11 12:03:02 -06:00
JacobBarthelmeh
f0bfcc50d7
Merge pull request #6748 from julek-wolfssl/dtls13-frag-ch2
...
DTLS 1.3: allow fragmenting the second ClientHello message
2023-10-11 11:13:57 -06:00
JacobBarthelmeh
5e4baf898c
Merge pull request #6786 from SparkiDev/aes_gcm_align_arm_fix
...
AES GCM ARM32 alignment fix
2023-10-11 10:18:11 -06:00
Chris Conlon
7f562f8259
Merge pull request #6851 from miyazakh/rnd_gen_updates_rx
...
Update random generation on RX TSIP
2023-10-11 09:10:34 -06:00
TakayukiMatsuo
a4f9ae90d0
Merge pull request #6845 from kojo1/jp-doc
...
fix jp doc translations
2023-10-11 07:00:16 +09:00
Hideki Miyazaki
f8604da8e3
change to use a cutom random generation func for PRNG
2023-10-11 06:50:26 +09:00
Lealem Amedie
a27b49882d
Add XTS API's required for VeraCrypt
2023-10-10 15:09:35 -06:00
Juliusz Sosinowicz
ca73a311cf
Don't use /dev/null
2023-10-10 17:31:45 +02:00
Juliusz Sosinowicz
5372cd5026
Update openwrt script
2023-10-10 17:08:58 +02:00
Chris Conlon
210fff5569
Merge pull request #6849 from miyazakh/rnd_gen_updates
...
Update random generation on RZ RSIP
2023-10-10 08:52:22 -06:00
Juliusz Sosinowicz
53f14206d1
Increase curl timeout
2023-10-10 14:36:00 +02:00
Juliusz Sosinowicz
cb912219e4
Run only stable curl tests
2023-10-10 14:19:03 +02:00
Juliusz Sosinowicz
365fae8ac0
Add curl test dep
2023-10-10 11:37:48 +02:00
jordan
f32c6a0d25
XMSS/XMSSMT hooks support: fix build.
2023-10-09 10:13:32 -05:00
JacobBarthelmeh
d83f2fa126
Merge pull request #6850 from douzzer/20231008-Wconversion-and-Aes-Eax-FIPS-fixes
...
20231008-Wconversion-and-Aes-Eax-FIPS-fixes
2023-10-09 09:06:17 -06:00
Juliusz Sosinowicz
64ed7d57eb
Add comment
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
275c0a0838
Update window in one place only when stateful
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
8ac72750bc
Fix linting issues
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
948d7ae761
keyLog_callback: flush the descriptor to make sure it is written out
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
c1a49fef99
Fix unreachable code error
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
bec87e525f
PQC TLS 1.3: test setting pqc with wolfSSL_CTX_set_groups
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
3a881079d3
Fix async
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
2c6c52078a
test_dtls13_frag_ch_pq: make sure kyber5 is used
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
37c0d52fa8
Dump manual memio stream with WOLFSSL_DUMP_MEMIO_STREAM
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
c802193119
Simplify the pqc keyshare handling
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
0dbf97c867
fixup! Clear the keyshare instead of storing it
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
230f81712c
fixup! Clear the keyshare instead of storing it
2023-10-09 12:54:11 +02:00
Anthony Hu
f640fdf91f
Adding a post-quantum DTLS 1.3 test.
...
This exercises the fragmenting of ClientHello via large post-quantum key share.
./configure --enable-dtls-mtu --enable-dtls-frag-ch --enable-dtls \
--enable-dtls13 --with-liboqs
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
ada785e115
Address code review
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
8da863184c
Force DTLS 1.3 when accepting fragmented CH
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
df8ee69075
Clear the keyshare instead of storing it
2023-10-09 12:54:11 +02:00
Juliusz Sosinowicz
85a596e54a
DTLS 1.3: allow fragmenting the second ClientHello message
...
- DTLS 1.3 pqc support
- Add --enable-dtls-frag-ch option to enable CH fragmenting
- Send an alert when we get an empty keyshare with a cookie present to not allow for multiple HRR in one connection
- Only update the DTLS window when we have successfully processed or stored a message
- Call ssl->chGoodCb as soon as we have processed a verified full or fragmented ClientHello cookie
2023-10-09 12:54:11 +02:00
Daniel Pouzzner
61371d403a
minor fixes for AES-EAX implementation and test routines.
2023-10-08 18:02:52 -05:00
Sean Parkinson
832e0f3726
Merge pull request #6842 from kaleb-himes/fix-err-introduce-with-cm-move
...
Fix -4 return code when expected BAD_FUNC_ARG(-173)
2023-10-09 07:04:24 +10:00
Hideki Miyazaki
8d5df6fec2
change to use custom random generation func
2023-10-08 16:42:36 +09:00
JacobBarthelmeh
c082216661
Merge pull request #6836 from anhu/iar_ewarm_gitignore
...
Changes to what gets ignored by git for the IAR-EWARM IDE
2023-10-06 20:57:25 -06:00
JacobBarthelmeh
5cb80ea898
Merge pull request #6847 from embhorn/zd16767
...
Fix wolfSSL_set_verify_result to use correct value
2023-10-06 16:52:32 -06:00
Eric Blankenhorn
b329c0d5f4
Fix wolfSSL_set_verify_result to use correct value
2023-10-06 16:34:31 -05:00
Anthony Hu
52a9730f56
Changes to gitignore for IAR-EWARM IDE.
2023-10-06 17:02:22 -04:00
JacobBarthelmeh
fd2d098566
Merge pull request #6821 from bigbrett/aes-eax
...
AES EAX mode
2023-10-06 14:14:28 -06:00
Brett Nicholas
fafb9e81c0
Add support for AES EAX mode, as described in https://eprint.iacr.org/2003/069
2023-10-06 11:10:06 -06:00
JacobBarthelmeh
a7950a3739
Merge pull request #6846 from SparkiDev/aes_xts_arm_hw_crypto
...
Aarch64 and ARM32 AES XTS with crypto instructions
2023-10-06 09:58:38 -06:00
JacobBarthelmeh
a24d66939f
Merge pull request #6843 from embhorn/gh6760_take2
...
Fix RNG with writedup
2023-10-06 09:11:33 -06:00
Sean Parkinson
862a98abe0
Aarch64 and ARM32 AES XTS with crypto instructions
...
Optimised assembly of AES-XTS for Aarch64 and ARM32 using hardware
crypto instructions.
Aarch64 has loop unrolling.
Update aes.c to not have AES-XTS implementation when assembly
compilable.
Update test of AES-XTS to check expected cipher text of partial block
encryption.
2023-10-06 12:39:31 +10:00
Takashi Kojo
5fdc3d8dd5
fix jp doc translations
2023-10-06 09:16:41 +09:00
Takashi Kojo
97b6b00226
Merge branch 'master' of https://github.com/wolfssl/wolfssl
2023-10-06 09:15:10 +09:00
kaleb-himes
e51399ca0f
Do the success checkout out front
2023-10-05 17:05:36 -06:00
JacobBarthelmeh
5a5a8c9b47
Merge pull request #6841 from julek-wolfssl/fix-all-scr
...
Fixes for bugs exposed with SCR
2023-10-05 16:55:01 -06:00
JacobBarthelmeh
c26ad8d19a
Merge pull request #6828 from SparkiDev/mp_sqrtmod_prime_cust_curve
...
mp_sqrtmod_prime: bail early on the check for small values
2023-10-05 16:32:01 -06:00
JacobBarthelmeh
22b838c22b
Merge pull request #6799 from kojo1/no_malloc
...
fix NO_MALLOC guard in an error case
2023-10-05 16:23:54 -06:00
Eric Blankenhorn
a494d04f10
Fix RNG with writedup
2023-10-05 16:03:42 -05:00
kaleb-himes
4bb6c51d2d
Fix -4 return code when expected BAD_FUNC_ARG(-173)
2023-10-05 14:20:37 -06:00
JacobBarthelmeh
2c4556c797
Merge pull request #6835 from julek-wolfssl/no-ossl-defs-in-release
...
Add option to disable OPENSSL_COMPATIBLE_DEFAULTS
2023-10-05 10:47:50 -06:00
JacobBarthelmeh
1b4435d134
Merge pull request #6839 from julek-wolfssl/eol-repos
...
Remove unsupported distros from readme badge
2023-10-05 10:46:49 -06:00
JacobBarthelmeh
a333e775c7
Merge pull request #6837 from anhu/doc_corr
...
Minor correction to documentation
2023-10-05 10:46:12 -06:00
Chris Conlon
6968105984
Merge pull request #6831 from miyazakh/renesas_tsip_fix
...
fix compile error due to rz port change
2023-10-05 09:43:34 -06:00
Juliusz Sosinowicz
858c66de3c
Add configs that exposed this bug
2023-10-05 16:58:45 +02:00
Juliusz Sosinowicz
89946126f2
Remove dtls_expected_rx and use expected values directly
...
We should always read MTU + EXTRA so that we capture the entire message and are able to correctly decrypt the entire datagram. A smaller MTU also breaks larger handshake messages sent during a connection like secure renegotiation in DTLS 1.2 (confirmed) and post-handshake messages in DTLS 1.3 (suspected).
2023-10-05 16:58:45 +02:00
Juliusz Sosinowicz
80c8c62fb2
Proper initial_ctx clean up
...
- Call wolfSSL_CTX_free on ssl->initial_ctx so that it decrements the counter and free's the object
- Clean up where ssl->initial_ctx is free'd. It only needs to be free'd when the ssl object is being free'd
2023-10-05 16:58:45 +02:00
jordan
33d4b331fb
Add XMSS/XMSSMT wolfCrypt hooks.
2023-10-05 09:18:50 -05:00
Juliusz Sosinowicz
9abc611550
Update dtls in readme
2023-10-05 13:32:58 +02:00
Juliusz Sosinowicz
6b28a68e42
Add DTLS 1.3 to README
2023-10-05 13:26:35 +02:00
Juliusz Sosinowicz
c88fec1534
Remove unsupported distros from readme badge
2023-10-05 13:22:34 +02:00
Juliusz Sosinowicz
8ce8359bd7
Add option to disable OPENSSL_COMPATIBLE_DEFAULTS
2023-10-05 10:30:44 +02:00
Anthony Hu
630d75153f
Minor correction to documentation
2023-10-04 16:51:55 -04:00
JacobBarthelmeh
96205fc80d
Merge pull request #6820 from julek-wolfssl/zd/16550-int-crl
...
CRL verify the entire chain including loaded CA's
2023-10-04 14:37:50 -06:00
David Garske
4d81725438
Merge pull request #6832 from jpbland1/cryptocb-key-context
...
add devCtx to all keys for use in cryptoCb
2023-10-04 09:34:06 -07:00
JacobBarthelmeh
94043723c9
Merge pull request #6833 from douzzer/20231003-options-h-flag-order-etc
...
20231003-options-h-flag-order-etc
2023-10-04 09:01:58 -06:00
Daniel Pouzzner
45b613ee55
wolfcrypt/test/test.c: fix error codes in hpke_test_single(), hpke_test(), and ecc521_test_deterministic_k().
2023-10-03 22:44:11 -05:00
Daniel Pouzzner
71649388a0
configure.ac: in options.h generation, fix order of flags to match Makefile order.
2023-10-03 21:11:59 -05:00
John Bland
f4acc8f33d
add devCtx to all keys for use in cryptoCb
2023-10-03 19:29:36 -04:00
Hideki Miyazaki
f9fb966bb4
fix compile error due to rz port change
2023-10-04 06:47:12 +09:00
JacobBarthelmeh
88d25036a0
Merge pull request #6823 from rizlik/stale_suites_fix
...
fix: tls13: don't use stale suites pointers in CheckPreSharedKeys
2023-10-03 11:41:53 -06:00
Juliusz Sosinowicz
7baf151c37
CRL verify the entire chain including loaded CA's
...
- Regen CRL's as most of them are expired
- certs/crl/extra-crls/ca-int-cert-revoked.pem: CRL that revokes certs/intermediate/ca-int-cert.pem signed by certs/ca-cert.pem
- Add CheckCertCRL_ex API to not depend on DecodedCert
- CheckCertCRLList: accept raw serial or hashed version to work with Signers
- Add XELEM_CNT to simplify pre-proc element counting
2023-10-03 11:45:43 +02:00
Sean Parkinson
e55e6790dd
mp_sqrtmod_prime: bail early on the check for small values
...
When using custom curves, only use the first 22 values with the prime to
calculate Legendre symbol. The known curves work and defeats long running
times when non-prime values are passed in.
2023-10-03 16:48:34 +10:00
Daniel Pouzzner
5066771f10
Merge pull request #6824 from bandi13/PRB-fips-ready-config-issues
...
Fix issue created by 62c14e4d5b
2023-10-03 00:47:14 -04:00
JacobBarthelmeh
1a3bf5e932
Merge pull request #6822 from douzzer/20230930-aes-xts-test-gate
...
20230930-aes-xts-test-gate
2023-10-02 17:57:17 -06:00
Andras Fekete
47f0d5a5d0
Fix issue created by 62c14e4d5b
2023-10-02 12:34:33 -04:00
Chris Conlon
ecf666a121
Merge pull request #6819 from miyazakh/renesas_rz_opt
...
Update usage of sha acceleration on RSIP
2023-10-02 09:22:06 -06:00
Marco Oliverio
c70b3f297e
fix: tls13: don't use stale suites pointers in CheckPreSharedKeys
2023-10-02 15:03:55 +00:00
Daniel Pouzzner
3e7f4c5f2d
wolfcrypt/test/test.c: in aes_xts_128_test(), fix gate on LARGE_XTS_SZ test added in 3ea0fb30dd (disable for AF_ALG and pre-5.3 FIPS).
2023-09-30 12:07:56 -05:00
JacobBarthelmeh
369db531d2
Merge pull request #6817 from anhu/tls13_server_suppgroups
...
Allow the server to send supported groups extension in TLS 1.3
2023-09-29 13:53:37 -06:00
Anthony Hu
7c1cc5e8f9
Allow the server to send supported groups extension in TLS 1.3
2023-09-29 12:42:44 -04:00
JacobBarthelmeh
8a57936d7e
Merge pull request #6801 from julek-wolfssl/zephyr-fixes
...
Misc zephyr fixes
2023-09-29 09:50:19 -06:00
JacobBarthelmeh
53f729f959
Merge pull request #6815 from SparkiDev/aes_xts_x64
...
AES XTS x64 ASM: add AVX1 and AESNI implementations
2023-09-29 09:42:58 -06:00
Hideki Miyazaki
e092c57675
change sha h/w acceleration implementation
2023-09-29 16:22:16 +09:00
JacobBarthelmeh
aedebac649
Merge pull request #6818 from bandi13/containerReadme
...
Container readme
2023-09-28 15:21:23 -06:00
Sean Parkinson
3ea0fb30dd
AES XTS x64 ASM: add AVX1 and AESNI implementations
...
Adding AES-XTS AVX1 and AESNI implementations.
Fix name in comment at top of x64 assembly files.
2023-09-28 14:44:23 -05:00
Andras Fekete
005346d9ec
Fix entrypoint
2023-09-28 14:45:51 -04:00
Andras Fekete
93358f1402
Define WOLFSSL_DIR
2023-09-28 13:59:04 -04:00
Andras Fekete
5e1bd8174c
Push multi-platform wolfCLU to DockerHub
2023-09-28 13:55:38 -04:00
Andras Fekete
2ef83e142f
Update buildAndPush.sh and README.md
2023-09-28 13:27:07 -04:00
JacobBarthelmeh
0571040e36
Merge pull request #6816 from bandi13/fixContainers
...
Fix containers
2023-09-28 10:37:20 -06:00
Andras Fekete
9fdb3cf17a
Appease test scripts
2023-09-28 10:48:03 -04:00
Andras Fekete
b88754bb64
Add in clang-10 and clang-11 tests
2023-09-28 10:29:36 -04:00
Andras Fekete
5e3f00f6f7
Specify the OS version
...
'ubuntu-latest' doesn't have clang-12 in it anymore
2023-09-28 10:29:20 -04:00
Andras Fekete
0f4f677ea4
Show logs on test failure
2023-09-28 10:17:30 -04:00
JacobBarthelmeh
20f992af5e
Merge pull request #6809 from SparkiDev/static_rsa_len_check_fix
...
Static RSA length check
2023-09-27 15:09:08 -06:00
Andras Fekete
d95ce57eea
Fix script errors
2023-09-27 15:31:01 -04:00
JacobBarthelmeh
79a6cbc860
Merge pull request #6813 from anhu/elliptical
...
Fixup spelling: Elliptic
2023-09-26 17:11:12 -06:00
JacobBarthelmeh
a97e13f823
Merge pull request #6798 from gojimmypi/autogen-update-wsl-pr
...
no WSL/Windows git hooks from autogen.sh
2023-09-26 16:59:41 -06:00
Sean Parkinson
9acba6ee2d
Static RSA length check
...
Better length check on decrypted pre-master secret length.
2023-09-27 07:55:53 +10:00
Anthony Hu
b22c2971e3
Fixup spelling: Elliptic
...
Fixes https://github.com/wolfSSL/wolfssl/issues/6767
2023-09-26 16:18:02 -04:00
JacobBarthelmeh
60f30e994d
Merge pull request #6811 from gojimmypi/esp32-sha-revert-verbosity
...
ESP32 debug only: Mode REVERT to ESP32_SHA_SW
2023-09-26 13:34:43 -06:00
JacobBarthelmeh
f042863ddf
Merge pull request #6807 from kareem-wolfssl/zd16715
...
Prevent current handshake counter from underflowing.
2023-09-26 10:55:52 -06:00
gojimmypi
4ece466fca
ESP32 debug only: Mode REVERT to ESP32_SHA_SW
2023-09-26 08:32:23 -07:00
JacobBarthelmeh
237d10ab1e
Merge pull request #6803 from gojimmypi/esp32-example-time
...
ESP32 examples: update interim set_time() fixed value
2023-09-25 13:34:22 -06:00
gojimmypi
83117ae33f
ESP32 examples: interim set_time() fixed value
2023-09-23 17:16:19 -07:00
Kareem
df6a65e151
Prevent current handshake counter from underflowing.
2023-09-22 14:47:00 -07:00
JacobBarthelmeh
f9082c54e3
Merge pull request #6800 from DimitriPapadopoulos/codespell
...
More typos found by codespell
2023-09-22 14:12:34 -06:00
Andras Fekete
717249c0cc
Trust github.com in container, add in possible Jenkins userIDs
2023-09-22 16:01:54 -04:00
Andras Fekete
f0d0a87822
Add in working cross-compiler container and builder script
2023-09-22 14:55:30 -04:00
Andras Fekete
1141f9bee9
Use wolfssl/wolfssl-builder as the container name
2023-09-22 14:55:01 -04:00
Juliusz Sosinowicz
470e839b26
Misc zephyr fixes
...
- Need to call fs_file_t_init() before calling fs_open()
- 0 is a valid POSIX socket number
- Include stdio.h when needed to simplify macro logic
- Define Zephyr specific macros in CMakeLists.txt to make for a better user experience
2023-09-22 12:19:06 +02:00
Dimitri Papadopoulos
f7d7006e87
More typos found by codespell
2023-09-22 11:38:24 +02:00
Takashi Kojo
a9548b2f11
fix NO_MALLOC guard in an error case
2023-09-22 10:05:21 +09:00
Takashi Kojo
2fafa722c2
fix NO_MALLOC guard in an error case
2023-09-22 09:13:41 +09:00
gojimmypi
d5b6aa318c
no WSL/Windows git hooks copy for autogen.sh
2023-09-21 23:31:11 +02:00
Sean Parkinson
9442ec4b06
Merge pull request #6793 from danielinux/no_umaal_for_cortexm
...
Enforce WOLFSSL_SP_NO_UMAAL with _CORTEX_M_ASM
2023-09-21 22:29:32 +10:00
TakayukiMatsuo
4b1c29ce0c
Merge pull request #6796 from miyazakh/doxygen_j_typo
...
Fix weird Japanese words in doxygen
2023-09-21 16:59:12 +09:00
Hideki Miyazaki
88254d3709
fix weird Japanese words
2023-09-21 09:12:22 +09:00
David Garske
347394cc6b
Detect Cortex M3 (no UMAAL) and define WOLFSSL_SP_NO_UMAAL.
2023-09-20 17:10:27 -07:00
David Garske
16e6a8c150
Merge pull request #6795 from jpbland1/ech-double-free-fix
...
Fix ECH double free on rejection
2023-09-20 14:25:11 -07:00
David Garske
bc02006def
Merge pull request #6794 from res0nance/fix-memory-type
...
pqc: fix memory type for shared secret storage server side
2023-09-20 14:24:42 -07:00
John Bland
f71423d626
set ssl->hsHashesEch to NULL regardless of acceptance
...
to avoid double free, clean up style violations
2023-09-20 14:51:40 -04:00
David Garske
f7ca923b4b
Merge pull request #6783 from bandi13/more_async_cb
...
More async cb
2023-09-20 10:16:08 -07:00
Andras Fekete
9ed19cddfa
Need to increment state after the async task completes
2023-09-20 12:23:14 -04:00
Chris Conlon
e91b6230a8
Merge pull request #6792 from miyazakh/renesas_ra6m4_r
...
Fix ra6m4 port
2023-09-20 09:10:10 -06:00
res0nance
0983ea9a80
pqc: fix memory type for shared secret storage server side
...
This gets copied to preMasterSecret and freed in
TLSX_KeyShare_ProcessPqc with the SECRET type but is allocated
with the TLSX type.
2023-09-20 15:45:26 +08:00
Hideki Miyazaki
8f9c3716ed
fix ra6m4 port
2023-09-20 09:00:22 +09:00
Chris Conlon
5bc5b8a99b
Merge pull request #6768 from miyazakh/renesas_rz
...
Renesas RZN2L support
2023-09-19 14:38:03 -06:00
David Garske
1cda8430fd
Merge pull request #6709 from embhorn/zd16316
...
misc.h declarations for user defined functions with NO_INLINE disabled
2023-09-19 11:19:23 -07:00
David Garske
b72d02dd88
Merge pull request #6742 from embhorn/zd16187_2
...
Fixes for NO_FILESYSTEM and NO_BIO config
2023-09-19 11:19:07 -07:00
gojimmypi
5830f921fa
ARIA cipher cmake ( #6600 )
...
* ARIA Cipher CMake support
2023-09-19 10:57:02 -07:00
David Garske
de3c9f19ef
Merge pull request #6788 from bandi13/addCCacheDocker
...
Add CCache to the container to decrease compilation time
2023-09-19 10:39:51 -07:00
Andras Fekete
da39f66ff0
Remove accidental comment left in.
2023-09-19 13:10:16 -04:00
Andras Fekete
186d3c2eb4
Fixes to various Async issues
2023-09-19 13:10:16 -04:00
Andras Fekete
ad9779cdc1
Explicitly define code with WOLFCRYPT_ASYNC_CRYPT_SW
2023-09-19 13:10:16 -04:00
David Garske
763de1a685
Merge pull request #6790 from bandi13/codesonar
...
Clean up memory leaks
2023-09-19 09:48:22 -07:00
David Garske
eca28ea2f6
Merge pull request #6789 from bandi13/renameAsyncEnumPart2
...
Clean up double enum
2023-09-19 09:08:32 -07:00
David Garske
ba74c83f73
Merge pull request #6785 from embhorn/gh6760
...
Fix writedup rng leak
2023-09-19 08:23:41 -07:00
gojimmypi
9398fa0736
Espressif HW Improvements ( #6624 )
...
* Espressif HW Improvements
* revised AES HW/SW fallback logic for ESP32
2023-09-19 08:21:13 -07:00
Andras Fekete
2af5ae89a2
Rename enum to protect the innocent
...
WC_NO_PENDING_E indicates that there really isn't any asynchronous task that is pending.
2023-09-19 10:46:11 -04:00
Andras Fekete
c12bf79e56
Clean up double enum
...
This was necessary to have https://github.com/wolfSSL/wolfAsyncCrypt/pull/70 be able to merge
2023-09-19 10:30:04 -04:00
Andras Fekete
9472dd39e4
Add CCache to the container to decrease compilation time
2023-09-19 10:12:03 -04:00
Sean Parkinson
af6386732c
AES GCM ARM32 alignment fix
...
Don't use xorbufout in GMULT.
Force the table to be aligned.
2023-09-19 09:21:20 +10:00
Eric Blankenhorn
911c4519ef
Fix writedup rng leak
2023-09-18 16:19:22 -05:00
Andras Fekete
3bb0643cdd
Clean up memory leaks
2023-09-18 16:53:48 -04:00
David Garske
1149522357
Merge pull request #6784 from bandi13/renameAsyncEnum
...
Allow code to build during rename
2023-09-18 12:41:53 -07:00
Andras Fekete
164fc8c5cb
Allow code to build during rename
2023-09-18 14:47:35 -04:00
David Garske
1d7c6c94fe
Merge pull request #6780 from SparkiDev/sp_x64_uninit
...
SP x64 ASM: Initialize pointers in RSA functions
2023-09-18 09:49:22 -07:00
David Garske
623549ce90
Merge pull request #6781 from SparkiDev/sp_arm64_asm_fixup_1
...
SP ARM64 ASM: fix sp_256_mont_dbl_4
2023-09-18 09:49:06 -07:00
Sean Parkinson
ea8bc82f85
SP ARM64 ASM: fix sp_256_mont_dbl_4
...
In sp_256_mont_dbl_4, not all used registers were in asm clobber list.
2023-09-18 15:17:39 +10:00
Sean Parkinson
c0edb7b583
SP x64 ASM: Initialize pointers in RSA functions
...
Windows compiler complains about uninitialized variables in these
functions. Set the pointers to NULL to quiet the compiler.
2023-09-18 14:49:19 +10:00
Hideki Miyazaki
7735ea0ff3
fix rx build failure
2023-09-16 11:48:49 +09:00
JacobBarthelmeh
1f2ddb7554
Merge pull request #6778 from danielinux/writeable_pkcs11_tokens
...
Add compile-time option WOLFSSL_PKCS11_RW_TOKENS
2023-09-15 11:46:03 -06:00
JacobBarthelmeh
5654691f05
Merge pull request #6775 from kareem-wolfssl/zd16652
...
Add a build flag ASN_TEMPLATE_SKIP_ISCA_CHECK to optionally skip the isCa != false check.
2023-09-15 11:43:04 -06:00
JacobBarthelmeh
139fd5d208
Merge pull request #6776 from SparkiDev/sp_ecc_x64
...
SP ECC: x64 minor speed improvement
2023-09-15 08:23:51 -06:00
Daniele Lacamera
ca56b79209
Add compile-time option WOLFSSL_PKCS11_RW_TOKENS
...
By default, wolfcrypt PKCS11 interface accesses tokens in read-only
mode. In some cases, we might want to build the client with write
permissions, i.e. when initializing tokens via C_InitToken().
The WOLFSSL_PKCS11_RW_TOKENS option, if present, allows write access to
PKCS11 tokens.
2023-09-15 15:18:11 +02:00
Hideki Miyazaki
5e97b9fde8
addressed review comments
2023-09-15 13:22:35 +09:00
Sean Parkinson
e9f1489997
SP ECC: x64 minor speed improvement
...
ARM32/Thumb2: for safer code, do two reductions in mont triple after doing double part.
2023-09-15 09:48:32 +10:00
Kareem
8e40130003
Add a build flag ASN_TEMPLATE_SKIP_ISCA_CHECK to optionally skip the isCa != false check.
2023-09-14 15:44:47 -07:00
JacobBarthelmeh
7d85e390a9
Merge pull request #6769 from cconlon/pkcs7ContentType
...
Support PKCS#7 definition for ContentType content ANY
2023-09-14 15:44:35 -06:00
JacobBarthelmeh
6b6c9f9ae0
Merge pull request #6772 from bandi13/zd16449_more_fixes
...
Zd16449 more fixes
2023-09-14 09:35:01 -06:00
Anthony Hu
6bf716bd26
Merge pull request #6743 from JacobBarthelmeh/unit_tests
...
add test case for ignoring cert path error
2023-09-14 11:04:35 -04:00
JacobBarthelmeh
f23e2a62e6
Merge pull request #6773 from SparkiDev/sp_arm_arch
...
SP: WOLFSSL_SP_ARM_ARCH to WOLFSSL_ARM_ARCH
2023-09-14 08:57:02 -06:00
Sean Parkinson
6a25cdeb28
SP: WOLFSSL_SP_ARM_ARCH to WOLFSSL_ARM_ARCH and fix SAKKE on Thumb2/ARM32
...
WOLFSSL_SP_ARM_ARCH no longer used.
Using WOLFSSL_ARM_ARCH instead.
Change umaal check to only available with WOLFSSL_ARM_ARCH > 6.
SAKKE mont_reduce with umaal not using correct registers at end.
2023-09-14 13:04:49 +10:00
JacobBarthelmeh
3ae23ec926
Merge pull request #6745 from res0nance/windows-test
...
ci: run windows test
2023-09-13 16:16:13 -06:00
JacobBarthelmeh
3697219244
Merge pull request #6747 from res0nance/multi-arch-ci
...
ci: Add CI for different archs
2023-09-13 16:12:35 -06:00
JacobBarthelmeh
ba03677569
Merge pull request #6770 from SparkiDev/sp_asm_improvements_1
...
SP ASM: improve performance
2023-09-13 16:01:03 -06:00
JacobBarthelmeh
624cb5e2bb
Merge pull request #6744 from res0nance/windows-benchmark-config
...
windows: fix x64 benchmark release builds
2023-09-13 15:52:27 -06:00
Sean Parkinson
f5b96e7bde
Merge pull request #6735 from anhu/lteq_0
...
Propose to convert a less than 0 to less than or equal to 0
2023-09-14 07:08:22 +10:00
Andras Fekete
3d332a4fad
Remove accidental code change
2023-09-13 14:41:21 -04:00
Andras Fekete
2f63eb070e
Fix memory leak if the function is being called again because of a retry
2023-09-13 14:05:57 -04:00
JacobBarthelmeh
f32f220919
Merge pull request #6752 from SparkiDev/aes_gmult_table_align_32bit
...
AES GMULT: add table implementation using 32-bit types
2023-09-13 11:38:03 -06:00
JacobBarthelmeh
ff233ce3af
Merge pull request #6771 from res0nance/pqc-curvename
...
Fix wolfSSL_get_curve_name() returning NULL when using PQC groups
2023-09-13 10:54:58 -06:00
Sean Parkinson
114c8cc681
SP ASM: improve performance
...
Thumb2/ARM32: use umaal instruction to speed up mulitplication, squaring
and reduction. umaal not always available so use umlal instead.
Implementations for architectures less than 4 still kept - no umull.
Cleanup point arithmetic to not take shortcuts.
Make masking for constant time faster.
Add alternate asm for different compilers.
Get ARMv4 and ARMv6 compiling.
Remove whitespace at end of lines.
2023-09-13 21:13:53 +10:00
res0nance
825db397d7
Set namedGroup when generating pqc ciphertext
...
This fixes an issue where wolfSSL_get_curve_name() will
return NULL when using PQC groups.
2023-09-13 13:29:31 +08:00
Sean Parkinson
40c5048e38
AES GMULT: add table implementation using 32-bit types
...
32-bit ARM didn't load 64-bit pointers without alignment issues.
2023-09-13 13:44:17 +10:00
John Bland
eda3cd6a37
Merge pull request #6762 from jpbland1/ocsp-chain-count-retry
...
stop DoCertificate from reseting the cert chain
2023-09-12 21:42:09 -04:00
Hideki Miyazaki
1c9afb8b12
initial commit for RZN2L board Support
2023-09-13 09:22:55 +09:00
John Bland
6c8eaf26f5
update based on pr comments
2023-09-12 19:43:28 -04:00
John Bland
6e87fc7f90
switch to using ssl->error to check for previous error
2023-09-12 18:25:10 -04:00
Andras Fekete
971df19c5c
Missing fix
2023-09-12 17:06:54 -04:00
John Bland
14017bd67e
remove NULL check on non-pointer array
2023-09-12 14:42:33 -04:00
JacobBarthelmeh
86755dc7e4
Merge pull request #6766 from douzzer/20230911-linuxkm-my__show_free_areas-prototype
...
20230911-linuxkm-my__show_free_areas-prototype
2023-09-12 10:51:15 -06:00
David Garske
e4b211bee9
Merge pull request #6764 from bandi13/zd16449_async
...
Zd16449 async
2023-09-12 08:38:16 -07:00
Daniel Pouzzner
63e167e974
linuxkm/linuxkm_wc_port.h: add missing prototype for my__show_free_areas().
2023-09-11 21:27:25 -05:00
John Bland
937aa3415f
set last missing lastErr section
2023-09-11 18:24:37 -04:00
Takashi Kojo
1f7ccc4eff
Eliminate bad record mac alert
2023-09-12 07:17:04 +09:00
JacobBarthelmeh
61f48eb5a1
Merge pull request #6763 from DimitriPapadopoulos/codespell
...
Fix residual typos found by codespell
2023-09-11 15:55:34 -06:00
John Bland
b99b1d4cfd
fix bad error setting and instances where lastErr
...
wasn't set as it should have been
2023-09-11 17:52:07 -04:00
Andras Fekete
d25f4f06bf
clang-tidy is being super picky
2023-09-11 16:30:29 -04:00
Andras Fekete
c7f5043774
Fixes for the sanitizer
2023-09-11 15:57:20 -04:00
Andras Fekete
42985ebdfa
Revert "Add in ASYNC_CRYPTO_SW checks"
...
This reverts commit f5ef7b40db .
2023-09-11 15:10:32 -04:00
Andras Fekete
6cb1aef836
Clean up old comments
2023-09-11 14:54:42 -04:00
Andras Fekete
07e2f90fbb
Reorder and add async_* sources
2023-09-11 14:48:17 -04:00
Andras Fekete
b34348680a
New format
2023-09-11 14:33:19 -04:00
Andras Fekete
f5ef7b40db
Add in ASYNC_CRYPTO_SW checks
2023-09-11 13:12:09 -04:00
Andras Fekete
57e870e0d4
Add Async examples
2023-09-11 12:05:11 -04:00
JacobBarthelmeh
63477bcfdb
Merge pull request #6733 from gojimmypi/windows-gettime_secs
...
implement gettime_secs for Windows (_MSC_VER) in tests/api.c
2023-09-11 09:31:30 -06:00
Dimitri Papadopoulos
d532833af9
Fix residual typos found by codespell
2023-09-11 11:34:28 +02:00
John Bland
d0c2609ebb
stop ProcessPeerCerts from reseting the cert chain
...
count when an async error was returned
2023-09-11 01:56:58 -04:00
Chris Conlon
0bb9b85cd4
PKCS7: support PKCS#7 definition for ContentType eContent ANY, in addition to CMS OCTET_STRING definition
2023-09-08 16:32:15 -06:00
Andras Fekete
23ebace6b1
Fix event handling
2023-09-08 16:34:04 -04:00
JacobBarthelmeh
f9c2a86456
Merge pull request #6759 from kaleb-himes/SP_CACHE_UPDATE
...
Remove references to WOLFSSL_SP_CACHE_RESISTANT as it is always on
2023-09-08 14:27:38 -06:00
Andras Fekete
f9e5e4d08a
Clean up the 'async-check.sh' script
...
Far too many times I got burned by passing the wrong argument and things getting set up wrong.
2023-09-08 15:05:22 -04:00
JacobBarthelmeh
f8f66191e3
Merge pull request #6750 from SparkiDev/curve25519_thumb2_2
...
Curve25519/Ed25519: align buffers
2023-09-08 10:36:25 -06:00
Sean Parkinson
90467aa578
Curve25519/Ed25519: align buffers
...
Make data structures align buffers.
Align buffers in functions.
Add versions that don't use umaal
2023-09-08 15:23:15 +10:00
Sean Parkinson
00a08374df
Merge pull request #6707 from JacobBarthelmeh/xilinx
...
use flush instead of invalidate
2023-09-08 07:07:08 +10:00
Sean Parkinson
0e1706c3c7
Merge pull request #6756 from JacobBarthelmeh/docs
...
fix parameter typo in dox documentation
2023-09-08 07:03:39 +10:00
kaleb-himes
0fb514fa41
Remove references to WOLFSSL_SP_CACHE_RESISTANT as it is always on
2023-09-07 14:24:51 -06:00
David Garske
7ca6c129e5
Merge pull request #6755 from anhu/GetASNInt
...
Expose GetASNInt as part of WOLFSSL_ASN_API
2023-09-07 11:30:46 -07:00
gojimmypi
bba9add3a5
Merge branch 'master' of https://github.com/wolfssl/wolfssl into windows-gettime_secs
2023-09-07 08:54:42 -07:00
Anthony Hu
fddda8f582
Expose GetASNHeader in both template and original.
2023-09-07 09:52:27 -04:00
András Fekete
fc4e4f1238
Merge pull request #6757 from julek-wolfssl/zephyr-ci
...
Tie zephyr tests to a release
2023-09-07 08:49:10 -04:00
Juliusz Sosinowicz
ec7ecba0fe
Tie zephyr tests to a release
2023-09-07 13:21:24 +02:00
gojimmypi
e74b3ecdad
revert to only original gettime_secs changes per code review
2023-09-06 17:55:15 -07:00
JacobBarthelmeh
6e9c73eb12
fix parameter typo in dox documentation
2023-09-06 15:38:49 -07:00
Anthony Hu
6665f240e0
Expose GetASNInt as part of WOLFSSL_ASN_API
2023-09-06 18:17:42 -04:00
JacobBarthelmeh
755c39b5fc
Merge pull request #6751 from ejohnstown/merge-fips-builds
...
FIPS 140-3 Pilot Program Check-in
2023-09-06 16:07:41 -06:00
Daniel Pouzzner
344e1661e1
wolfcrypt/src/{hmac.c,sha256.c,sha512.c,kdf.c}: ForceZero() smallstack buffers before freeing them, and ForceZero() the Hmac, wc_Sha512, wc_Sha384, wc_Sha256, and wc_Sha224 structures at the end of their respective freeing routines. also, remove superseded ForceZero() calls in wc_HKDF_Expand(), wc_SSH_KDF(), and wc_HKDF_Extract().
2023-09-06 14:53:19 -05:00
JacobBarthelmeh
51cb80b865
Merge pull request #6753 from bandi13/disableZephyrTests
...
Temporarily disable until we can figure out the issue
2023-09-06 11:18:01 -06:00
Daniel Pouzzner
5540449315
wolfcrypt/src/port/arm/armv8-aes.c: add missing implementations of wc_AesCtrSetKey(), and add (void)dir in implementation to silence -Wunused.
2023-09-06 08:20:25 -07:00
Andras Fekete
f0743a70b4
Temporarily disable until we can figure out the issue
2023-09-06 09:24:34 -04:00
John Safranek
fb91f1c1fd
Update the ARM asm files with a missing initialization for SHA2-256 and
...
the AesCtrSetKey function for AES-CTR.
2023-09-05 17:07:08 -07:00
John Safranek
d866144fb1
Merge branch 'master' into merge-fips-builds
2023-09-05 16:52:36 -07:00
John Safranek
db858fd052
Merge tag 'v5.2.1-stable' into merge-fips-builds
...
Check-in FIPS 140-3 PILOT
2023-09-05 13:50:29 -07:00
JacobBarthelmeh
298b488bf1
Merge pull request #6749 from cconlon/jniCertReq
...
Add WOLFSSL_CERT_EXT to --enable-jni, minor CSR items
2023-09-01 16:15:10 -06:00
JacobBarthelmeh
0352b384a5
Merge pull request #6731 from SparkiDev/aes_arm32_thumb2
...
AES ARM32 and Thumb2 ASM: fixup ARM32 and add Thumb2
2023-09-01 15:56:12 -06:00
JacobBarthelmeh
cd02d5140f
Merge pull request #6738 from philljj/wolfcrypt_lms_verify_only
...
Wolfcrypt LMS verify-only support
2023-09-01 13:25:31 -06:00
Chris Conlon
a2e2a3e994
add --enable-certreq to --enable-jni, support extKeyUsage in X509_REQ_sign, add missing X509_REQ_print fields
2023-09-01 11:59:21 -06:00
Daniel Pouzzner
196f154c51
wolfcrypt/src/curve25519.c: use endian-conditional initializer for kCurve25519BasePoint.
2023-09-01 11:36:18 -05:00
res0nance
cf32bc362b
ci: Add CI for different archs
2023-09-01 16:40:37 +08:00
jordan
b36c312ef3
LMS verify-only support: fix clang warning, rename define.
2023-08-31 21:46:00 -05:00
David Garske
136cb98412
Force 32-bit alignment on kCurve25519BasePoint
2023-09-01 12:14:55 +10:00
JacobBarthelmeh
efd08eadb8
Merge pull request #6746 from douzzer/20230831-ge_p3_dbl
...
20230831-ge_p3_dbl
2023-08-31 15:06:17 -06:00
Daniel Pouzzner
dc2905ce80
wolfssl/wolfcrypt/ge_operations.h: fix for bugprone-macro-parentheses in ge_p3_dbl() found by multi-test clang-tidy-all-intelasm.
2023-08-31 13:22:53 -05:00
JacobBarthelmeh
ffd6c2b859
Merge pull request #6625 from TakayukiMatsuo/jp6352
...
Update Japanese API comments
2023-08-31 10:03:09 -06:00
res0nance
3dec8279a0
windows: fix x64 benchmark release builds
...
The linker should use the x64 option for 64-bit builds
2023-08-31 20:02:37 +08:00
res0nance
a99139574a
ci: run windows test
2023-08-31 19:59:05 +08:00
jordan
03088b2946
LMS verify-only support: tiny correction to INSTALL.
2023-08-30 21:02:50 -05:00
JacobBarthelmeh
927930c86e
Merge pull request #6740 from SparkiDev/ecies_kdf
...
ECIES: add support for other KDFs
2023-08-30 16:27:39 -06:00
Sean Parkinson
b546473495
Merge pull request #6739 from JacobBarthelmeh/fuzzing
...
additional sanity check with GetIntPositive
2023-08-31 07:11:05 +10:00
JacobBarthelmeh
e748e1be32
add test case for ignoring cert path error
2023-08-30 12:45:29 -07:00
JacobBarthelmeh
2aefdfe9d5
Merge pull request #6737 from anhu/ignoreBadPath
...
Add new feature macro WOLFSSL_IGNORE_BAD_CERT_PATH.
2023-08-30 13:37:56 -06:00
Eric Blankenhorn
7262a30074
Fixes for NO_FILESYSTEM config
2023-08-30 13:54:49 -05:00
JacobBarthelmeh
944db2c2e5
Merge pull request #6726 from julek-wolfssl/dropped-ccs
...
Server should not ignore plaintext packets as long as it has stuff to rtx
2023-08-30 09:40:14 -06:00
Eric Blankenhorn
4e86523624
Fix NO_BIO build error
2023-08-30 10:24:25 -05:00
Sean Parkinson
0638ec234b
AES ARM32 and Thumb2 ASM: fixup ARM32 and add Thumb2
...
Fix which functions and data are compiled in depending on defines.
Better handing of constants.
Also fix Aarch64 ed25519 inline assembly.
2023-08-30 20:34:51 +10:00
Sean Parkinson
41d6afcfa1
ECIES: add support for other KDFs
2023-08-30 10:37:57 +10:00
JacobBarthelmeh
1ada2e6a43
additional sanity check with GetIntPositive
2023-08-29 15:43:01 -07:00
jordan
bbf105f8dc
LMS verify-only support: update INSTALL.
2023-08-29 16:37:21 -05:00
jordan
8662312ecf
LMS verify only support.
2023-08-29 15:46:18 -05:00
Anthony Hu
d7bb5aa367
Add new feature macro WOLFSSL_IGNORE_BAD_CERT_PATH.
2023-08-29 10:28:02 -04:00
Kaleb Himes
70c362f680
Merge pull request #6736 from ejohnstown/fips-update
...
FIPS Update
2023-08-29 08:21:47 -06:00
JacobBarthelmeh
c47600c52c
update comment
2023-08-29 12:45:45 +02:00
Juliusz Sosinowicz
a0fef66c3b
Add test case for dropped ccs
2023-08-29 12:45:45 +02:00
Juliusz Sosinowicz
357c9a68f2
Only drop plaintext msgs when we don't have stuff to rtx
2023-08-29 12:45:13 +02:00
Juliusz Sosinowicz
6e3c3577f5
Refactor the crazy conditional in VerifyForDtlsMsgPoolSend
2023-08-29 12:45:13 +02:00
gojimmypi
d8fe8b9140
gettime_secs() in api.c now uses TimeNowInMilliseconds()
2023-08-28 18:14:29 -07:00
gojimmypi
e303f8709c
move TimeNowInMilliseconds from tls13.c to internal,c; now WOLFSSL_API
2023-08-28 18:13:24 -07:00
John Safranek
b13294623b
FIPS Update
...
1. Restore the linuxv5 option of fips-check.
2. Added option linuxv5.2.1 to fips-check.
2023-08-28 16:41:47 -07:00
John Safranek
2380086209
FIPS Update
...
1. Rename the error code for degraded mode so it matches what's in the
fips repo.
2. Update the tag used for linuxv5 builds in the fips-check script.
2023-08-28 15:11:13 -07:00
kaleb-himes
3a5e171636
Check-in fips_test.h changes to master as well
2023-08-28 14:22:37 -07:00
Anthony Hu
354b28eea0
Propose to convert a less than 0 to less than or equal to 0
2023-08-28 17:16:34 -04:00
gojimmypi
4058dbec7c
Merge branch 'master' of https://github.com/wolfssl/wolfssl into windows-gettime_secs
2023-08-28 11:40:51 -07:00
JacobBarthelmeh
c5c968aae3
Merge pull request #6722 from julek-wolfssl/zd/16550
...
ZD16550
2023-08-28 10:19:19 -06:00
JacobBarthelmeh
872551a5fc
Merge pull request #6734 from julek-wolfssl/curl-action-correct-name
...
Correct name in curl github action
2023-08-28 09:30:34 -06:00
Juliusz Sosinowicz
9bea33b598
Correct name in curl github action
2023-08-28 11:55:42 +02:00
Juliusz Sosinowicz
b02fe0853f
CI fixes
2023-08-28 10:52:36 +02:00
Juliusz Sosinowicz
57ce894393
CRL refactor
...
- CheckCertCRLList: check all entries in case a single issuer has multiple CRL's loaded
- test_multiple_crls_same_issuer: testing two different certificates forcing the client to check both CRL's from the same issuer
- CRL_Entry
- use a lock instead of a mutex to allow multiple threads to access the same list simultaneously
- add a verifyMutex when doing verification so that we don't have to release the crlLock
- Add allocation and free functions for CRL_Entry
- DupCRL_Entry: simplify copying by copying all static fields in one memcpy
2023-08-28 10:52:36 +02:00
Juliusz Sosinowicz
abfcda8750
Decode the key usage extension as LE not BE
2023-08-28 10:52:36 +02:00
Juliusz Sosinowicz
e85901c8e5
Only list supported sigalgs in certreq
2023-08-28 10:52:36 +02:00
gojimmypi
321f74869a
implement gettime_secs for Windows (_MSC_VER) in tests/api.c
2023-08-25 18:30:05 -07:00
JacobBarthelmeh
5b5e66b55f
Merge pull request #6732 from billphipps/correct_cryptocb_debug
...
Correct cryptocb cmd debug message
2023-08-25 13:57:32 -06:00
billphipps
7a6e851a82
Corrected print format string.
2023-08-25 13:59:23 -04:00
JacobBarthelmeh
2a5ed11f34
Merge pull request #6730 from gojimmypi/aria-no-openssl
...
ARIA no longer needs OpenSSL enabled
2023-08-25 11:48:11 -06:00
JacobBarthelmeh
b20c6c54d1
Merge pull request #6729 from ejohnstown/degraded-mode
...
FIPS Degraded Mode
2023-08-25 10:10:22 -06:00
JacobBarthelmeh
14deb7afda
Merge pull request #6700 from julek-wolfssl/dtls13-downgrade-acks
...
DTLS 1.3: do not send ACKs until we negotiate 1.3 (through SH)
2023-08-25 09:34:53 -06:00
billphipps
d7f8cc55d8
Update wolfcrypt/src/cryptocb.c
...
Correction
2023-08-25 11:24:47 -04:00
billphipps
27bc7219e5
Correct cryptocb cmd debug message
2023-08-25 11:16:15 -04:00
TakayukiMatsuo
0484f3e0f7
Update Japanese API comments to match PR6352
2023-08-25 10:32:10 +09:00
John Safranek
e48b7ef3d7
FIPS Degraded Mode
...
1. Add error code for entering FIPS degraded mode.
2. Add string for the error code.
2023-08-24 16:27:23 -07:00
gojimmypi
8803510375
ARIA no longer needs OpenSSL enabled
2023-08-24 15:57:14 -07:00
JacobBarthelmeh
c9e9e0fc72
Merge pull request #6704 from icing/session-copy-on-write
...
Updating a shared session objects needs to do copy on write
2023-08-24 16:52:17 -06:00
JacobBarthelmeh
2f2dddde25
Merge pull request #6727 from bigbrett/tls13-sniffer-keylogfile
...
TLS 1.3 sniffer keylog file support
2023-08-24 16:52:00 -06:00
kaleb-himes
c98ce0d18c
FIPS 140-3 Pilot Program Check-in
2023-08-24 14:29:32 -07:00
JacobBarthelmeh
a6257ca635
Merge pull request #6724 from julek-wolfssl/zd/16445
...
ZD16445
2023-08-24 13:46:49 -06:00
Brett Nicholas
f1027464e8
added tls13 keylog test, refactored diff test to only use app data output
2023-08-24 13:05:01 -06:00
Brett Nicholas
15918d8ee6
First pass at TLS1.3 keylog file working
2023-08-24 13:04:59 -06:00
JacobBarthelmeh
5f44a73f8e
Merge pull request #6725 from julek-wolfssl/zd/16598
...
TLSX_CA_Names_Parse: Include header in length check
2023-08-24 10:30:07 -06:00
JacobBarthelmeh
6b09b5c0cf
Merge pull request #6690 from julek-wolfssl/packaging
...
Init deb packaging
2023-08-24 10:28:24 -06:00
David Garske
88ad5ce6b0
Merge pull request #6607 from SparkiDev/curve25519_thumb2
...
Thumb2 ASM, Curve25519
2023-08-24 08:29:54 -07:00
Juliusz Sosinowicz
82c5170659
TLSX_CA_Names_Parse: Include header in length check
2023-08-24 15:23:37 +02:00
Juliusz Sosinowicz
8ce71cc19c
Call HaveUniqueSessionObj when we need to have a unique session object
2023-08-24 15:01:22 +02:00
Juliusz Sosinowicz
06d81f7f8f
Add a test case that negotiates tickets during another handshake
2023-08-24 15:01:22 +02:00
Juliusz Sosinowicz
b44d31df02
Jenkins fixes
2023-08-24 10:57:45 +02:00
Juliusz Sosinowicz
b771b6ebf5
ZD16445
...
- Use unions for type punning in xor API
- Initialise potentially uninitialised variables
- Use `LL` suffix to specify a larger integer type
- Don't use `max` as it can shadow other definitions
2023-08-24 10:53:26 +02:00
Sean Parkinson
36b92a4cef
Thumb2 ASM, Curve25519
...
Add support for compiling ASM for Thumb2
Add Curve25519 ASM for Thumb2
Limit assembly code compiled when Ed25519 not required.
Rework all assembly implementations to replace ge_*() functions instead
of having fe_ge_*() versions that take many parameters.
Get ARM32 inline asm working.
2023-08-24 17:43:03 +10:00
Juliusz Sosinowicz
a99954c0b0
Update dtls_expected_peer_handshake_number when downgrading
2023-08-23 23:20:51 +02:00
Juliusz Sosinowicz
9ca1738b7a
Fix newlines in async script
2023-08-23 23:20:51 +02:00
Juliusz Sosinowicz
5624b6e9d2
Update comment
2023-08-23 23:20:51 +02:00
Juliusz Sosinowicz
058dfca809
Use explicit field to signal that we received a unified hdr
2023-08-23 23:20:51 +02:00
Juliusz Sosinowicz
3cc473b1ec
Check that HVR and HRR don't appear in the same connection
2023-08-23 22:18:21 +02:00
Juliusz Sosinowicz
9427bea275
DTLS 1.3: do not send ACKs until we negotiate 1.3 (through SH)
2023-08-23 22:18:21 +02:00
Stefan Eissing
7b29362d90
Updating a shared session objects needs to do copy on write
2023-08-23 22:15:25 +02:00
JacobBarthelmeh
32a07a7f5a
Merge pull request #6723 from anhu/bench_sphincs_gating
...
More gating on HAVE_SPHINCS in benchmarks
2023-08-23 14:10:51 -06:00
Juliusz Sosinowicz
24cf794342
Increase timeout as macos build time are very variable (due to homebrew)
2023-08-23 22:01:12 +02:00
Juliusz Sosinowicz
7a12202675
Init deb packaging
...
- rpm: Simplify script and list wolfSSL as packager
- add packaging github action
2023-08-23 22:01:12 +02:00
Anthony Hu
1608cb8b45
More ating on HAVE_SPHINCS in benchmarks
2023-08-23 14:03:22 -04:00
Hideki Miyazaki
827287000c
Merge pull request #6720 from TakayukiMatsuo/jp6506
...
Apdate Japanese API comments to match them in PR6506
2023-08-23 09:48:05 +09:00
JacobBarthelmeh
3033371abc
Merge pull request #6717 from bigbrett/sniffer-keylogfile
...
sniffer keylog file support
2023-08-22 14:06:27 -06:00
JacobBarthelmeh
fd9c78d93f
Merge pull request #6721 from bandi13/udp_proxy-fixes
...
Udp proxy fixes
2023-08-22 13:13:57 -06:00
Brett Nicholas
66c53b0996
Decoupled keylogfile registration and sniffer server creation APIs
...
fixed (very old) use-after-free found by ASAN
Updated documentation
review comments (spelling and housekeeping)
2023-08-22 11:29:58 -06:00
Brett Nicholas
2ee6a01d91
Initial sniffer keylog file support for TLS 1.2
2023-08-22 11:23:46 -06:00
JacobBarthelmeh
205cdb1809
Merge pull request #6719 from anhu/MBSTRING_ASC
...
Support MBSTRING_ASC for cert encoding
2023-08-22 09:29:50 -06:00
Andras Fekete
c4f91cdc8d
Revert "Don't run script un-bwrapped"
...
This reverts commit d321ae2fd5 .
2023-08-22 10:00:00 -04:00
Andras Fekete
d54aa0dabd
Display test duration
2023-08-22 09:51:42 -04:00
Andras Fekete
d321ae2fd5
Don't run script un-bwrapped
2023-08-22 09:43:59 -04:00
Andras Fekete
c1821e9ed2
Decrease timeout to 1m. Most tests complete in seconds
2023-08-22 09:43:33 -04:00
Andras Fekete
79d831c712
Set customizable PCAP file name
2023-08-22 09:32:51 -04:00
Andras Fekete
88c32a510e
Wrap script in a bwrap environment
2023-08-22 09:30:51 -04:00
Andras Fekete
e487b73809
Reduce likelihood of two tests running and saving to the PCAP dump
2023-08-21 13:37:34 -04:00
JacobBarthelmeh
5339fe0d9f
Merge pull request #6715 from anhu/WOLFSSL_NO_SPHINCS
...
Allow easily disabling of SPHINCS+.
2023-08-21 09:26:16 -06:00
Andras Fekete
307ce9d623
Only drop the first Nth packet, not every
2023-08-21 09:55:23 -04:00
Andras Fekete
bf438c85e1
Add in a marker to the PCAP file
2023-08-21 09:55:23 -04:00
TakayukiMatsuo
174f0b2ebc
Apdate Japanese API comments to match them in PR6506
2023-08-20 15:25:33 +09:00
JacobBarthelmeh
928dd70213
Merge pull request #6716 from bandi13/dtls_test_cleanup
...
DTLS test cleanup
2023-08-18 16:48:21 -06:00
JacobBarthelmeh
9cc8cdcc30
Merge pull request #6712 from philljj/spelling_cleanup
...
Used codespell and fixed obvious typos.
2023-08-18 16:29:36 -06:00
Anthony Hu
7669f966f3
Support MBSTRING_ASC for cert encoding
2023-08-18 17:50:25 -04:00
Andras Fekete
dbd5d713e7
Add in a marker to the PCAP file
2023-08-18 14:10:47 -04:00
Andras Fekete
9a007604e4
Usage documentation
2023-08-18 14:05:07 -04:00
JacobBarthelmeh
65217cbc70
Merge pull request #6713 from ejohnstown/fips-check-exp-ver
...
FIPS Check Script with Explicit Versioning
2023-08-18 11:20:23 -06:00
Andras Fekete
bea1b6f89b
Use unique temp file names
2023-08-18 13:11:31 -04:00
Andras Fekete
3df434930e
Add in total test run count
2023-08-18 13:06:13 -04:00
Andras Fekete
883d4dc219
Clean up the script
2023-08-18 13:04:36 -04:00
JacobBarthelmeh
033b0785e3
Merge pull request #6714 from julek-wolfssl/rename-utils.c
...
Rename utils.c to utils.h
2023-08-18 10:37:00 -06:00
John Safranek
b9dbd86fab
FIPS Check Script with Explicit Versioning
...
1. Remove the case block deciding if to checkout the wolfcrypt files or
not, it is redundant. Things are set up now where we don't need it.
2. Comment reflow.
Changes due to peer review:
3. Change the check for the temp mytag branches to use a git command
that provides an exact match, rather than a foulable grep check.
4. Change the fips repo file checkout to work the same way as the
wolfcrypt files. Each file in the copy list is tagged with its
revision.
2023-08-18 09:27:53 -07:00
Andras Fekete
62bb434aa6
Remove debugging code
2023-08-18 11:14:50 -04:00
Andras Fekete
dfc4850e75
Add extra flags for DTLS1.3
2023-08-18 11:11:25 -04:00
Andras Fekete
e0b90a0463
Rename the script to be a bit more generic
2023-08-18 11:11:08 -04:00
Andras Fekete
8772d8b868
Able to adjust DTLS version globally
2023-08-18 11:05:36 -04:00
Andras Fekete
bad00ea9f7
Adding in tcpdump capture
2023-08-18 11:04:45 -04:00
Andras Fekete
f089b2c2f6
Clean up code
2023-08-18 10:21:44 -04:00
Andras Fekete
fea48e2505
Drop every i'th packet
2023-08-18 10:05:12 -04:00
Andras Fekete
49dc3a473b
Run through all the tests and give a tally for failed
2023-08-18 10:03:58 -04:00
Anthony Hu
a24f99fbf6
Allow easily disabling of SPHINCS+.
2023-08-18 10:00:47 -04:00
Andras Fekete
bc7c8af5de
Massively simplified the tests
2023-08-18 09:41:13 -04:00
Juliusz Sosinowicz
b32ff0b0b8
Rename utils.c to utils.h
...
This better signals that this file is meant to be included directly in testing programs and also plays better with my IDE.
2023-08-18 15:05:23 +02:00
Sean Parkinson
975047bd22
Merge pull request #6710 from JacobBarthelmeh/PKCS7
...
initialize kari decoded cert
2023-08-18 10:24:48 +10:00
John Safranek
3e93c5e253
FIPS Check Script with Explicit Versioning
...
1. Move the command line updatable variables to the beginning of the
script.
2. Reorder the OE names in the usage list.
3. Add the missing asm files.
4. Correct the regex for the fipsv2-OE-ready version name.
2023-08-17 14:37:48 -07:00
John Safranek
6724a3d005
FIPS Check Script with Explicit Versioning
...
1. Remove the demo OE.
2. Update all OEs with the new file lists.
3. Merge OEs with same files and tags, and add a check for the
difference to optionally update that. For example, solaris is the
same file list and tags as linuxv2, but uses gmake instead of make.
2023-08-17 14:35:45 -07:00
John Safranek
87695adc82
FIPS Check Script with Explicit Versioning
...
1. Remove the demo variable presets. Actually use them in testing.
2. FIPS_REPO can be set to a local file path to speed up testing.
3. Add files missing from the demo OE checkout.
4. Add the fips-read OE files.
5. Add the quiet option to grep.
2023-08-17 14:32:40 -07:00
John Safranek
98c50e05a3
FIPS Check Script with Explicit Versioning
...
1. Add an optional initialized variable for the KEEP option and default
it to 'yes' temporarily.
2. Comment out all the descriptions for all the OEs except the test OE.
3. Update the copy FIPS file list format to have the file path and add
the tag to use for copying as the first item.
4. Merge the branch-creation and file checkout into one function. Remove
the local path changing.
5. Update and simplify the FIPS file copying function.
6. Remove the old copying code.
7. When updating the fipsv2-OE-ready version string, also check that
fips.c is non-zero.
8. Use explicit paths for files.
2023-08-17 14:25:48 -07:00
John Safranek
0fd96be7f8
FIPS Check Script with Explicit Versioning
...
1. Add a test OE for trying out the new methods.
2. Add a temporary way to trigger using the new methods.
3. Add a function to check out different versions of files in the repo,
and only adding a new branch when needed.
4. Remove the old checkout code.
2023-08-17 14:23:13 -07:00
Sean Parkinson
b156e83990
Merge pull request #6711 from bandi13/mp_sqrtmod_prime-static
...
Set mp_sqrtmod_prime as static
2023-08-18 07:13:55 +10:00
jordan
d4ba2e50d4
Used codespell and fixed obvious typos.
2023-08-17 15:20:10 -05:00
Andras Fekete
c917eee70e
Set mp_sqrtmod_prime as static
...
This function is not in any header files, and wasn't meant to be exposed.
2023-08-17 13:52:17 -04:00
JacobBarthelmeh
cc4e327316
Merge pull request #6544 from TakayukiMatsuo/rpk
...
Add support for raw-public-key
2023-08-17 09:23:18 -06:00
JacobBarthelmeh
ba4842aded
Merge pull request #6703 from anhu/guard_sphincs
...
Guard sphincs away properly.
2023-08-16 14:40:11 -06:00
JacobBarthelmeh
d7b2626433
initialize kari decoded cert
2023-08-16 13:20:29 -07:00
Andras Fekete
7023f86e66
Remove unnecessary code
...
'bc' is not installed in VM images. Don't want to run 'killall' in Jenkins tests
2023-08-16 16:01:47 -04:00
Eric Blankenhorn
a78694e5bf
misc.h declarations for user defined functions with NO_INLINE disabled
2023-08-16 12:45:37 -05:00
JacobBarthelmeh
afd0d07d9a
Merge pull request #6706 from bandi13/ZD16551
...
Add in another clamp to prevent infinite loops
2023-08-16 11:03:44 -06:00
Chris Conlon
ac90fa8d60
Merge pull request #6701 from miyazakh/fspsm
...
generalize Renesas SCE Protected port
2023-08-16 09:38:18 -06:00
JacobBarthelmeh
ec818e5dbd
Merge pull request #6682 from gojimmypi/Espressif-template
...
Add Espressif ESP-IDF template project
2023-08-15 16:37:24 -06:00
JacobBarthelmeh
c3ebfd133b
use flush instead of invalidate
2023-08-15 15:05:47 -07:00
Hideki Miyazaki
0d8f68ef03
address review comments
2023-08-16 06:30:13 +09:00
Andras Fekete
437c2020bd
Add in another clamp to prevent infinite loops
...
M = i - 1 would make it 2^0. Anything above that would be negative powers which don't make sense.
2023-08-15 17:05:43 -04:00
JacobBarthelmeh
45bcb65dc0
Merge pull request #6659 from gojimmypi/ESP32_Info_link_change
...
updated comment links for Espressif examples
2023-08-15 14:58:06 -06:00
JacobBarthelmeh
a71114b4cb
Merge pull request #6702 from bandi13/ZD16572
...
Check the return value
2023-08-15 14:57:26 -06:00
Andras Fekete
f1b4387eca
Return a failure if the sizes don't match
2023-08-15 15:00:06 -04:00
Anthony Hu
9bb6c1b70e
Guard away properly; don't build sphincs code.
2023-08-14 21:31:28 -04:00
Chris Conlon
24f60cc435
Merge pull request #6699 from JacobBarthelmeh/PKCS7
...
init mp_int before use
2023-08-14 16:11:33 -06:00
JacobBarthelmeh
bbcd91b59a
Merge pull request #6621 from bandi13/addPKIXSSH
...
Add in PKIXSSH
2023-08-14 16:08:29 -06:00
Andras Fekete
b3a1badecf
Check the return value
2023-08-14 17:02:59 -04:00
Andras Fekete
300c183453
Update README
2023-08-14 11:21:12 -04:00
Andras Fekete
5002ef19b1
Give GDB permission to attach to processes as non-root
2023-08-14 11:21:00 -04:00
Hideki Miyazaki
47caa9b06d
generalize sce protect impl to fsp sm(secure module)
2023-08-13 09:23:03 +09:00
Hideki Miyazaki
d3d131d08d
Merge pull request #6663 from TakayukiMatsuo/jp6417
...
Update Japanese API comments
2023-08-12 08:05:41 +09:00
JacobBarthelmeh
bd14be8553
init mp_int before use
2023-08-11 10:04:17 -07:00
Andras Fekete
4167a51fe9
Add in 'udp-proxy'
2023-08-11 11:23:09 -04:00
JacobBarthelmeh
8bb8f64373
Merge pull request #6698 from anhu/compat_into_settings_h
...
Bring compat layer logic from configure.ac into settings.h
2023-08-11 09:23:03 -06:00
JacobBarthelmeh
46229bb167
Merge pull request #6693 from bandi13/ZD16551
...
Add in clamp for mp_sqrtmod_prime
2023-08-11 09:22:53 -06:00
Andras Fekete
568bf35555
Reduce image size
2023-08-11 11:22:08 -04:00
JacobBarthelmeh
a4152ab341
Merge pull request #6695 from philljj/fix_test_x509_guards
...
Fix define guards for X509 api tests.
2023-08-11 09:18:00 -06:00
JacobBarthelmeh
61761143e7
Merge pull request #6696 from philljj/small_benchmark_cleanup
...
Tiny cleanup to benchmark print usage.
2023-08-11 09:16:48 -06:00
JacobBarthelmeh
c29227dcbb
Merge pull request #6694 from kareem-wolfssl/gh6689
...
Change enum ecc_curve_load_mask into defines
2023-08-11 09:13:03 -06:00
Anthony Hu
507ec9f7d2
Bring compat layer logic from configure.ac into settings.h
2023-08-11 00:11:36 -04:00
TakayukiMatsuo
3a5739a8fa
Add support for raw-public-key
2023-08-11 11:29:15 +09:00
Andras Fekete
6b1513a769
Clean up garbage characters
2023-08-10 16:41:11 -04:00
Andras Fekete
66c529e610
Add in PKIXSSH
2023-08-10 16:41:11 -04:00
JacobBarthelmeh
65401cfd35
Merge pull request #6697 from julek-wolfssl/refactor-cond-again
...
Refactor conditional code again
2023-08-10 13:49:46 -06:00
JacobBarthelmeh
26fcdbf348
Merge pull request #6688 from kareem-wolfssl/gh6684
...
Update set1_groups/_list prototype conditions to match the functions' conditions. Fixes #6684 .
2023-08-10 13:35:49 -06:00
Juliusz Sosinowicz
c3fea8c930
fixup! client: resend data when didn't receive reply after timeout
2023-08-10 20:14:35 +02:00
Juliusz Sosinowicz
e96837aa34
cond: Add start and end API for mutex handling
2023-08-10 18:07:51 +02:00
Juliusz Sosinowicz
1b393199f4
client: resend data when didn't receive reply after timeout
2023-08-10 18:07:35 +02:00
jordan
779b87f03a
Tiny cleanup to benchmark print usage.
2023-08-10 09:47:07 -05:00
jordan
5255b02fbb
Fix define guards for X509 api tests.
2023-08-10 08:49:25 -05:00
Kareem
1bb0199a2b
Change enum ecc_curve_load_mask into defines
2023-08-09 17:35:01 -07:00
JacobBarthelmeh
6ea1e7d824
Merge pull request #6683 from dgarske/tpm_ecc
...
Enable math API's for wolfTPM
2023-08-09 17:11:33 -06:00
JacobBarthelmeh
12685d7713
Merge pull request #6686 from dgarske/fix_cond
...
Fixes for wolfSSL conditional porting
2023-08-09 12:08:05 -06:00
JacobBarthelmeh
35f4a1a09d
Merge pull request #6672 from anhu/cert_err_message
...
Add some OpenSSL compat error strings.
2023-08-09 09:28:51 -06:00
Juliusz Sosinowicz
737e12a1bd
fixup! Initialize BIO methods at compile time
2023-08-09 17:04:59 +02:00
Juliusz Sosinowicz
b86d2a3bff
Fix typo
2023-08-09 16:47:14 +02:00
Juliusz Sosinowicz
bc4c0df315
Update multi-compiler timeout
2023-08-09 16:47:03 +02:00
Andras Fekete
9b81b0b505
Add in clamp for mp_sqrtmod_prime
2023-08-09 10:44:59 -04:00
Juliusz Sosinowicz
d747df2ae4
Make sure no mutexes are held when cond API are called
2023-08-09 16:25:58 +02:00
Juliusz Sosinowicz
7ba00f3b84
Initialize BIO methods at compile time
2023-08-09 16:23:46 +02:00
Juliusz Sosinowicz
6fcdead112
Check error codes from pthread funcs
2023-08-09 14:20:29 +02:00
Juliusz Sosinowicz
27feb9b9e9
Simplify mac cond type
2023-08-09 14:18:32 +02:00
Kareem
9f577dc4d4
Update set1_groups/_list prototype conditions to match the functions' conditions. Fixes #6684 .
2023-08-08 17:56:56 -07:00
JacobBarthelmeh
e9e5d70aad
Merge pull request #6674 from ejohnstown/fips-check-update
...
FIPS Check Update
2023-08-08 15:42:28 -06:00
David Garske
c7b6fa2931
Return codes and missed srtp.
2023-08-08 13:58:38 -07:00
Anthony Hu
5daabe0801
Suggestion from Jacob to remove OPENSSL_EXTRA_X509_SMALL
2023-08-08 16:35:55 -04:00
David Garske
39f632d096
Remove lockCount.
2023-08-08 12:51:27 -07:00
David Garske
5b16586483
Fixes for wolfSSL conditional porting. Can cause deadlock in high usage situations. Added better signal support on MacOS. Issue created in PR #6437 .
2023-08-08 12:46:42 -07:00
JacobBarthelmeh
0dbc7d0b13
Merge pull request #6685 from anhu/sm4_disabled
...
SM4 disabled
2023-08-08 13:37:23 -06:00
Anthony Hu
958113c070
Correct configure defaults for SM4-GCM and SM4-CCM (disabled)
2023-08-08 13:06:00 -04:00
TakayukiMatsuo
9f6d48891a
Update Japanese API comments
2023-08-08 13:29:46 +09:00
gojimmypi
a957f0e2c3
config.h not needed for Espressif example
2023-08-07 15:09:20 -07:00
David Garske
75f81db084
New TPM ECC encrypt needs access to the mp_ math functions.
2023-08-07 15:06:58 -07:00
gojimmypi
69eeedbac3
Add Espressif ESP-IDF template project
2023-08-07 15:03:21 -07:00
JacobBarthelmeh
33e31ed41c
Merge pull request #6675 from douzzer/20230805-clang-18-tidy-fixes
...
20230805-clang-18-tidy-fixes
2023-08-07 14:55:15 -06:00
Daniel Pouzzner
e51ca7941f
fixes for code warned by clang-tidy:18 and cppcheck-2.11:
...
bugprone-inc-dec-in-conditions: examples/server/server.c:server_test(), src/internal.c:MatchDomainName(), src/x509.c:wolfSSL_X509_set_ext(), wolfcrypt/src/asn.c:MatchBaseName()
missingReturn: wolfcrypt/src/wc_port.c:mystrnstr()
bugprone-unused-return-value: wolfcrypt/src/wc_port.c:wolfSSL_NewThreadNoJoin()
clang-analyzer-deadcode.DeadStores: wolfssl/test.h:udp_accept()
2023-08-05 12:28:41 -05:00
John Safranek
0654ed3549
Fixed style warning from shellcheck re x in comparisons.
2023-08-04 16:41:39 -07:00
John Safranek
f3af4542e7
FIPS Check Update
...
1. Whitespace changes.
2. Deleted the stm32l4 build. The fips-check-2.0.sh script handles it.
3. Removed the CAVP_SELFTEST_* variables, used the FIPS_OPTIONS for it.
4. Removed the v1 style code checkout. The current method works for all
available cases.
5. Removed the FIPS_CONFLICTS case rename case.
2023-08-04 13:53:34 -07:00
JacobBarthelmeh
c9b72d7b61
Merge pull request #6673 from anhu/readfile
...
Change ReadFile instances to app-specific naming.
2023-08-04 13:48:49 -06:00
JacobBarthelmeh
65b515aec8
Merge pull request #6655 from julek-wolfssl/threading-testing
...
Port testing to wolfSSL threading interface
2023-08-04 13:46:14 -06:00
Anthony Hu
30fda7ad38
Change ReadFile instances to app-specific naming.
...
ReadFile conflicts with a windows API.
2023-08-04 13:50:46 -04:00
Anthony Hu
cec438a4e4
Add some OpenSSL compat error strings.
2023-08-04 13:26:28 -04:00
John Safranek
aa69b2fd62
Update the header comment.
2023-08-04 07:38:48 -07:00
Juliusz Sosinowicz
90a6a14878
Merge pull request #6446 from JacobBarthelmeh/session
2023-08-04 11:34:59 +02:00
Juliusz Sosinowicz
e04033ae3d
Adjust timeout to account for longer brew install
2023-08-04 10:49:39 +02:00
Juliusz Sosinowicz
decee67138
Use random port in crl test
2023-08-04 10:49:39 +02:00
Juliusz Sosinowicz
67d6d438c5
Port testing to wolfSSL threading interface
2023-08-04 10:49:39 +02:00
Hideki Miyazaki
ae90a9b2c0
Merge pull request #6665 from TakayukiMatsuo/jp6472
...
Update Japanese API comments
2023-08-04 14:37:33 +09:00
John Safranek
4e07ebf279
changes to the script fips-check.sh
2023-08-03 22:22:20 -07:00
JacobBarthelmeh
83de744dcf
Merge pull request #6671 from SparkiDev/sm_impl_redirect
...
SM Ciphers: Reference the GitHub repository to get implementation
2023-08-03 16:41:46 -06:00
JacobBarthelmeh
7f0cfcb27d
Merge pull request #6667 from bandi13/byebyeCyaSSL
...
Byebye cya ssl
2023-08-03 15:43:01 -06:00
Sean Parkinson
e7ae80493b
SM Ciphers: Reference the GitHub repository to get implementation
...
wolfsm is public and we can point people to repository.
2023-08-04 07:28:21 +10:00
Sean Parkinson
71f9162b99
Merge pull request #6668 from julek-wolfssl/zd/16515
...
DTLS downgrade bug fixes
2023-08-04 07:20:01 +10:00
JacobBarthelmeh
a60810cebe
Merge pull request #6664 from joakim-strandberg/ada_windows_support
...
Ada windows support
2023-08-03 14:40:34 -06:00
JacobBarthelmeh
0c39b8074e
Merge pull request #6654 from lealem47/zd16475
...
Fix of buffer overflow in GenerateDNSEntryRIDString()
2023-08-03 14:12:47 -06:00
JacobBarthelmeh
1da000b244
Merge pull request #6670 from anhu/080
...
Document that we integrate with liboqs 0.8.0
2023-08-03 13:29:32 -06:00
Andras Fekete
a6c850d7f9
Fix CAVP errors
2023-08-03 12:05:40 -04:00
Anthony Hu
54ab1b1113
Document that we integrate with liboqs 0.8.0
2023-08-03 10:23:12 -04:00
Juliusz Sosinowicz
8a9a363621
DTLS 1.3: move state machine forward when HVR received
2023-08-03 15:00:14 +02:00
Juliusz Sosinowicz
907a0201e7
Require HAVE_SECURE_RENEGOTIATION for API that perform SCR (not just indication)
2023-08-03 11:32:42 +02:00
Juliusz Sosinowicz
5a94dc961d
DtlsShouldDrop: don't ignore app data sent before a SCR handshake
2023-08-03 11:32:03 +02:00
Juliusz Sosinowicz
158402ab03
Add logging prefixes to api.c client and server
2023-08-03 11:31:47 +02:00
TakayukiMatsuo
f35173b1a6
Update Japanese API comments
2023-08-03 09:47:19 +09:00
Andras Fekete
b31e485dc9
Remove 'HAVE_FIPS_VERSION < 2' blocks
2023-08-02 17:08:03 -04:00
Andras Fekete
f5164d325b
Remove weird control char + copy/paste errors
2023-08-02 16:14:25 -04:00
Andras Fekete
de0048e5b2
Put back netbsd- and marvell-linux-selftest modes
2023-08-02 14:23:29 -04:00
JacobBarthelmeh
05b692d01c
Merge pull request #6661 from julek-wolfssl/zd/16477
...
Recover when the client sends a 0-length session ID when using tickets
2023-08-02 11:37:21 -06:00
Juliusz Sosinowicz
dee32247b9
Code review
2023-08-02 18:02:41 +02:00
Juliusz Sosinowicz
bfe7bc0fcc
Recover when the client sends a 0-length session ID when using tickets
...
Fixes ZD16477
2023-08-02 18:02:30 +02:00
JacobBarthelmeh
fbc6ed4fe4
Merge pull request #6662 from julek-wolfssl/zd/16504
...
DoHelloVerifyRequest: only do DTLS 1.3 version check
2023-08-02 09:22:05 -06:00
JacobBarthelmeh
a885a94b21
Merge pull request #6669 from douzzer/20230801-fips-nullcipher
...
20230801-fips-nullcipher
2023-08-02 08:59:46 -06:00
Juliusz Sosinowicz
6f4fabaac9
Adjust DER size
2023-08-02 10:30:12 +02:00
Juliusz Sosinowicz
724fe53379
DoHelloVerifyRequest: only do DTLS 1.3 version check
2023-08-02 10:30:12 +02:00
Andras Fekete
2a6956a954
Missing commit
2023-08-01 17:55:38 -04:00
Joakim Strandberg
8794e3f2f6
Updated the Ada wrapper README.md file and removed mention of the c_tls_client_main.c and c_tls_server_main.c files.
2023-08-01 23:08:52 +02:00
Joakim Strandberg
0e74213692
Fix display of SPARK tool output in README
2023-08-01 22:45:07 +02:00
Andras Fekete
a0668bd9ab
Remove FIPS-check for v1
2023-08-01 15:46:40 -04:00
Andras Fekete
25f542adb4
Clean up compile errors
2023-08-01 15:46:18 -04:00
Daniel Pouzzner
d250eb8327
configure.ac: in FIPS builds, remove nullcipher from enable-all and enable-all-crypto, and error on explicit --enable-nullcipher with FIPS unless fips=dev.
2023-08-01 12:24:50 -05:00
Chris Conlon
27a59761b9
Merge pull request #6520 from miyazakh/tsip_cryptonly
...
Support TSIP crypt only
2023-08-01 10:13:18 -06:00
Andras Fekete
6e33fe3b51
Remove cyassl reference
2023-08-01 10:57:19 -04:00
Andras Fekete
44b634a597
More cleanup
2023-08-01 10:29:03 -04:00
Andras Fekete
9eb339f9fd
Remove cyassl from example code
2023-08-01 10:17:38 -04:00
Andras Fekete
70e1ab7f0c
Remove cyassl from wolfcrypt
2023-08-01 10:17:11 -04:00
JacobBarthelmeh
1468d77e50
Merge pull request #6644 from julek-wolfssl/zd/16441
...
TLSX_CA_Names_Parse: Verify the length of the extension
2023-07-31 16:03:23 -06:00
Joakim Strandberg
278f395542
Made sure the relative paths for finding the certificates is correct.
2023-07-31 23:48:44 +02:00
Joakim Strandberg
6893123edf
Removed references to the c implementations of the client and server
2023-07-31 21:54:30 +02:00
Andras Fekete
ab953c3141
Update VS project files
2023-07-31 15:37:48 -04:00
Andras Fekete
2b2509c56c
Drop code support
2023-07-31 15:36:38 -04:00
Andras Fekete
66f04f8db5
Remove cyassl
2023-07-31 15:17:17 -04:00
Joakim Strandberg
b6a11b8b01
Updated the README.md and updated client.gpr
2023-07-31 17:53:01 +02:00
Joakim Strandberg
c76b0a0237
removed the C examples only keeping Ada code in the Ada wrapper example directory
2023-07-31 17:31:23 +02:00
JacobBarthelmeh
4b80dcf733
Merge pull request #6617 from SparkiDev/aes_gcm_win_asm_fix
...
AES-GCM x86_64 MSVC ASM: XMM6-15 are non-volatile
2023-07-31 09:15:42 -06:00
Juliusz Sosinowicz
854ae0dcdb
Code review
2023-07-31 15:16:59 +02:00
JacobBarthelmeh
106a065a41
Merge pull request #6660 from DimitriPapadopoulos/codespell
...
Fix residual typos found by codespell
2023-07-28 11:52:47 -06:00
Juliusz Sosinowicz
a495bb4e7f
TLSX_CA_Names_Parse: make sure to do cleanup when smallstack is on
2023-07-28 16:34:35 +02:00
Dimitri Papadopoulos
1b10fb5ca7
Fix typos(?) found by codespell
...
These typos could have been generated by some program, in which case
the program should be fixed instead. Yet the typos are inconcistent,
as if the output had been manually copied. Why is the output poorly
aligned?
Use seconds or s for seconds, consistently.
Use ops for operations, consistently. Unless you want the singular
op for operation, as the value is often < 2.
2023-07-28 10:03:27 +02:00
Dimitri Papadopoulos
52f91e4ab9
Fix residual typos found by codespell
2023-07-28 09:29:28 +02:00
JacobBarthelmeh
5043ecefc1
Merge pull request #6648 from DimitriPapadopoulos/codespell
...
Fix typos found by codespell
2023-07-27 17:07:30 -06:00
JacobBarthelmeh
a785c39a12
Merge pull request #6657 from kojo1/multibyte
...
multi-byte code
2023-07-27 16:35:22 -06:00
Dimitri Papadopoulos
6d9c85a762
Fix typos found by codespell
2023-07-27 23:38:44 +02:00
JacobBarthelmeh
3e63589664
Merge pull request #6605 from dgarske/ada
...
Ada Bindings for wolfSSL
2023-07-27 15:21:52 -06:00
billphipps
10adca1a45
Add CryptoCb features ( #6636 )
...
* Update to support invoking cryptocb during un/register.
2023-07-27 13:16:43 -07:00
gojimmypi
f89892a3cd
updated comment links
2023-07-27 09:44:57 -07:00
David Garske
c529b2f3aa
Merge pull request #6627 from jpbland1/ocsp-nonce-usage-fix
...
fix bad & statement that was setting ocspSendNonce
2023-07-27 09:22:08 -07:00
JacobBarthelmeh
d0abfd7686
Merge pull request #6658 from julek-wolfssl/krb5-action-update
...
Point krb5 action to master branch of osp repo
2023-07-27 10:19:06 -06:00
Juliusz Sosinowicz
ee9ecd9591
Point krb5 action to master branch of osp repo
2023-07-27 11:14:41 +02:00
Takashi Kojo
136738fd33
Avoid mult-byte code error
2023-07-27 17:04:41 +09:00
JacobBarthelmeh
daa54f3d31
adjust wait times so that test can happen before timed out
2023-07-26 16:14:24 -07:00
Jacob Barthelmeh
b16e7fd87b
use Expect with test
...
fix for session expire check
better name for test function
rewrite test case
make new session also timeout in 1 second
2023-07-26 15:10:22 -07:00
JacobBarthelmeh
9cd7e59e6a
add another session expire test case
2023-07-26 15:10:22 -07:00
David Garske
3510ea4fec
Merge pull request #6656 from JacobBarthelmeh/sanitizer
...
conversion warning flagged on Windows test builds
2023-07-26 14:48:19 -07:00
Sean Parkinson
67913b5800
Merge pull request #6603 from JacobBarthelmeh/xilinx
...
fix for AES-GCM use with petalinux
2023-07-27 07:38:03 +10:00
Hideki Miyazaki
02ec92a3b9
Support TSIP crypt only
...
- Aes, sha,
- rsa
MakeRsaKey, sign/verify
fix compile error when not enabled TSIP
2023-07-27 06:23:34 +09:00
JacobBarthelmeh
7c11c0f201
conversion warning flagged on Windows test builds
2023-07-26 13:48:33 -07:00
JacobBarthelmeh
8d77090ad9
Merge pull request #6650 from DimitriPapadopoulos/spaces
...
Fix tab/space inconsistencies
2023-07-26 14:17:31 -06:00
JacobBarthelmeh
3e5e16f1ff
Merge pull request #6641 from julek-wolfssl/gh/6555
...
Dtls13GetRnMask: Correctly get chacha counter on BE systems
2023-07-26 11:29:39 -06:00
JacobBarthelmeh
48434f7814
Merge pull request #6653 from julek-wolfssl/kerberos-update
...
Updates for Kerberos 5 1.21.1
2023-07-26 11:26:57 -06:00
Juliusz Sosinowicz
4a175ba280
Updates for Kerberos 5 1.21.1
...
- wolfssl_ec_point_mul: fix parameters being passed into ec_mul2add
- Compile in compressed ecc key parsing for OPENSSLALL
- Improve debugging around compat layer ecc operations
- wolfSSL_BN_div: dv can be NULL
- Add spake like computation test
- Add CI krb5 testing
- Add timeouts to CI
2023-07-26 16:40:38 +02:00
Juliusz Sosinowicz
5947c9ae8c
TLSX_CA_Names_Parse: Verify the length of the extension
2023-07-26 13:32:37 +02:00
Juliusz Sosinowicz
5cf42244f0
Add comment back in
2023-07-26 12:04:11 +02:00
JacobBarthelmeh
681a75da24
fix for AES-GCM use with petalinux
2023-07-25 22:08:20 -06:00
Sean Parkinson
d87bb14ac0
Merge pull request #6647 from gojimmypi/SM4_Hash_fix
...
WOLFSSL_NO_HASH_RAW Hmac_UpdateFinal() properties for SM3
2023-07-26 11:32:35 +10:00
gojimmypi
31dfdf8360
TLS SM2, SM3, SM4-CBC: hash details for SM3
2023-07-25 17:25:11 -07:00
Sean Parkinson
cfac603ee1
AES-GCM x86_64 MSVC ASM: XMM6-15 are non-volatile
...
Put XMM6-15, when used, on the stack at start of function and restore at
end of function.
2023-07-26 08:22:58 +10:00
JacobBarthelmeh
746802be89
Merge pull request #6652 from douzzer/20230724-cppcheck-2v11
...
20230724-cppcheck-2v11
2023-07-25 14:59:50 -06:00
Lealem Amedie
9cade8c9a4
Fix of buffer overflow in GenerateDNSEntryRIDString()
2023-07-25 14:33:05 -06:00
Daniel Pouzzner
cebb4da307
fixes and workarounds for cppcheck 2.11 with uninitvar checks reactivated, and legacyUninitvar suppressed globally (as before):
...
src/internal.c:wolfSSL_DtlsUpdateWindow(): shiftTooManyBitsSigned and integerOverflowCond (true positive, fixed);
src/ssl.c:wolfSSL_GetSessionFromCache(): autoVariables (true positive, intentional and now suppressed);
wolfcrypt/src/asn.c: several uninitvars in EccSpecifiedECDomainDecode(), wc_EccPrivateKeyDecode(), DecodeSingleResponse(), and DecodeResponseData() (false positives due to bug in cppcheck short circuit eval analysis, mitigated by refactoring && expressions to nested-if constructs that are semantically identical);
src/ssl.c:wolfSSL_GetSessionFromCache(): nullPointer (false positive due to bug in cppcheck value flow analysis, workarounded).
2023-07-25 11:31:01 -05:00
David Garske
c0b4cde6df
Merge pull request #6632 from jpbland1/ocsp-want-read-error
...
OCSP_WANT_READ mishandled re-run
2023-07-25 08:23:46 -07:00
John Bland
a9c9662124
fix bad & statement that was setting ocspSendNonce
...
to 1 when WOLFSSL_OCSP_NO_NONCE was selected
related to but doesn't solve zd 16377
2023-07-24 16:51:10 -04:00
Dimitri Papadopoulos
4ff99a6780
Fix tab/space inconsistencies
2023-07-24 20:10:57 +02:00
JacobBarthelmeh
1285ae7816
Merge pull request #6506 from DimitriPapadopoulos/codespell
...
Fix typos found by codespell
2023-07-24 10:34:29 -06:00
JacobBarthelmeh
1812d32258
Merge pull request #6635 from julek-wolfssl/zd/16403
...
Fix ClientHello parsing when no extensions are present
2023-07-24 09:49:28 -06:00
Eric Blankenhorn
a19a0537ee
Fix RFC references and add WOLFSSL_ALLOW_CRIT_AIA
2023-07-24 09:20:30 -05:00
Juliusz Sosinowicz
d3aa11bf87
Place manual memio helpers in utils.c and add macro for them
2023-07-24 09:14:21 +02:00
Juliusz Sosinowicz
ab560aa6b8
Fix ClientHello parsing when no extensions are present
2023-07-24 09:14:21 +02:00
Juliusz Sosinowicz
8ec2e23773
Rework curl action to use actions-build-autotools-project
2023-07-24 09:13:10 +02:00
Juliusz Sosinowicz
72d99d0ae0
Add timeouts to action tests
2023-07-24 09:13:10 +02:00
Juliusz Sosinowicz
56fc5bbf87
Dtls13GetRnMask: Correctly get chacha counter on BE systems
...
The issue was that BIG_ENDIAN is defined in endian.h (on linux). Our define is BIG_ENDIAN_ORDER.
2023-07-24 09:13:10 +02:00
JacobBarthelmeh
d3202600a4
Merge pull request #6525 from lealem47/san
...
Improve subjectAltName extension parsing and printing
2023-07-22 08:19:54 -06:00
Lealem Amedie
318c95a2c2
Remove leftover declaration in ssl.h
2023-07-21 17:13:28 -06:00
JacobBarthelmeh
2acc4a6dd5
Merge pull request #6561 from lealem47/zd16348
...
Fix for adding pkcs9 contentType entry name
2023-07-21 17:04:47 -06:00
JacobBarthelmeh
c2a3f5316d
Merge pull request #6591 from embhorn/zd16296
...
Add CRL_REPORT_LOAD_ERRORS option
2023-07-21 17:00:23 -06:00
JacobBarthelmeh
c09138cd3f
Merge pull request #6642 from kareem-wolfssl/zd16073
...
Fix wolfSSL_SMIME_write_PKCS7 not removing NULL characters between sections.
2023-07-21 16:52:38 -06:00
John Bland
2e4b651b87
update tls13 to handle an OCSP_WANT_READ, update
...
async client test to retry connect on OCSP_WANT_READ instead of timing out
2023-07-21 16:24:59 -04:00
Lealem Amedie
acac3fe479
Add testing and make jenkins happy
2023-07-21 13:57:45 -06:00
Lealem Amedie
0cd5a293ca
Fix for parsing pkcs9_contentType
2023-07-21 13:57:45 -06:00
Lealem Amedie
4821859bbc
Fix for adding pkcs9 contentType entry name
2023-07-21 13:57:45 -06:00
Kareem
4bb907522b
Fix wolfSSL_SMIME_write_PKCS7 not removing NULL characters between sections.
2023-07-21 11:08:15 -07:00
David Garske
1daaabf38a
Merge pull request #6640 from SparkiDev/sm3_asm_s_protection
...
SM3 ASM file: protect with check for WOLFSSL_SM3
2023-07-21 09:20:30 -07:00
Eric Blankenhorn
f9cb9560c4
Add CRL_REPORT_LOAD_ERRORS option
2023-07-21 10:06:35 -05:00
TakayukiMatsuo
477e65e07a
Merge pull request #6626 from TakayukiMatsuo/jp6414
...
Update Japanese API comments
2023-07-21 12:33:29 +09:00
Sean Parkinson
452f6a8898
Merge pull request #6639 from JacobBarthelmeh/vcpkg
...
add include to wolfio.h and replace cmake NAMESPACE
2023-07-21 10:43:13 +10:00
Sean Parkinson
9b2345dc8e
SM3 ASM file: protect with check for WOLFSSL_SM3
...
Protect sm3_asm.S with check for WOLFSSL_SM3.
Change configure.ac to define WOLFSSL_SM3 in ASM flags when SM3 enabled
and enabling intelasm.
2023-07-21 09:57:53 +10:00
JacobBarthelmeh
9bc6fc64de
add include to wolfio.h and replace cmake NAMESPACE
2023-07-20 16:12:56 -07:00
Lealem Amedie
ec49e6b44d
Avoid clash b/n two surname entries
2023-07-19 17:10:23 -06:00
Lealem Amedie
ec4527c789
address more feedback
2023-07-19 16:27:03 -06:00
JacobBarthelmeh
b7b4be8822
Merge pull request #6610 from bigbrett/apple-universal-lib
...
Apple "universal binary framework" build script and project example
2023-07-19 15:39:24 -06:00
Lealem Amedie
16058ce168
Address review comments
2023-07-19 12:01:01 -06:00
JacobBarthelmeh
acd819caa1
Merge pull request #6633 from SparkiDev/sm2_not_with_sp_math
...
SM2 and SP_MATH: don't enable SM2 with SP_MATH
2023-07-19 10:09:58 -06:00
Sean Parkinson
dceb7c0122
SM2 and SP_MATH: don't enable SM2 with SP_MATH
...
No implementation of SM2 with SP so can't use SM2 with SP MATH.
2023-07-19 12:39:59 +10:00
JacobBarthelmeh
8065ba18f9
Merge pull request #6620 from douzzer/20230714-WC_DO_NOTHING
...
20230714-WC_DO_NOTHING
2023-07-18 17:04:02 -06:00
Sean Parkinson
fd13d376a8
Merge pull request #6630 from JacobBarthelmeh/spelling
...
spelling fixes
2023-07-19 08:48:03 +10:00
John Bland
9ea681030f
change conditional compile to use WOLFSSL_NONBLOCK_OCSP
...
instead of HAVE_OCSP
2023-07-18 17:56:43 -04:00
John Bland
e12f1f44b4
make OCSP error entry conditional to cut down on size
2023-07-18 14:55:16 -04:00
John Bland
7ee38350c0
undo supressing the OCSP_WANT_READ error, instead
...
add it to the list of non-fatal errors so that a socket close alert wont be sent out but the caller still won't block and will instead get OCSP_WANT_READ as an error back from wolfSSL_connect
2023-07-18 14:05:16 -04:00
John Bland
80bc547853
in the event of a OCSP_WANT_READ, set the ssl->error
...
so that the re-run of DoHandShakeMsgType knows not to hash the certificate twice and won't send an alert to the server as it was when OCSP_WANT_READ instead of setting ret to 0
2023-07-18 13:00:53 -04:00
JacobBarthelmeh
58318f9528
Merge pull request #6628 from dgarske/stm32_date
...
Fix for STM32 `HAL_RTC_GetDate` year
2023-07-18 10:28:35 -06:00
JacobBarthelmeh
9f2dd21a91
Merge pull request #6629 from night1rider/wolfssl-documentation-fixes
...
Wolfssl documentation fixes
2023-07-18 10:14:04 -06:00
Brett
425cd2c6dc
added "-c" command line option to allow passing extra configure flags, removed curl and harden default options, updated documentation
2023-07-17 14:47:23 -06:00
JacobBarthelmeh
67d35ea48e
Merge pull request #6622 from philljj/zd16426
...
tfm fp_exptmod_nct: set result to zero when base is zero
2023-07-17 14:29:01 -06:00
JacobBarthelmeh
b74a7f8e87
spelling fixes
2023-07-17 13:21:44 -07:00
dell5060
56a34b0be2
Updated Documentation to Include support OS-dependant CA certfications stores it supports for the api: wolfSSL_CTX_load_system_CA_certs
2023-07-17 13:06:29 -06:00
Joakim Strandberg
58ac57861f
Updated the README.md file and made sure that using default.gpr to build the Ada TLS server application does not try to build the Ada TCL client application that makes use of the secondary stack.
2023-07-17 19:50:05 +02:00
David Garske
da9541551d
Fix for STM32 HAL_RTC_GetDate year. Fixes #6618 .
2023-07-17 10:30:47 -07:00
Brett
d1db78adb2
fixed typos in README
2023-07-17 11:10:02 -06:00
JacobBarthelmeh
31aac92635
Merge pull request #6614 from dgarske/silabs_aes
...
Fix for SiLabs HW acceleration unused function in aes.c
2023-07-17 10:53:20 -06:00
David Garske
37be7a4800
Merge pull request #6567 from JacobBarthelmeh/vcpkg
...
fix warning for build with vcpkg
2023-07-17 08:47:15 -07:00
TakayukiMatsuo
c55c1dd0e4
Update Japanese API comments
2023-07-17 18:28:42 +09:00
Joakim Strandberg
00b90adc97
Updated README.md file. Added description of subprograms in the specification file of the WolfSSL package. Made it possible to get error codes through the WolfSSL API.
2023-07-17 01:22:06 +02:00
jordan
df58c4dea7
tfm fp_exptmod_nct: handle special cases better
2023-07-15 10:00:50 -05:00
JacobBarthelmeh
a026d843cf
Merge pull request #6564 from philljj/add_lms_hooks
...
Add LMS/HSS wolfCrypt hooks.
2023-07-14 14:33:25 -06:00
Joakim Strandberg
71b28caa09
Added Initialize and Finalize functions to initialize and cleanup resources of the WolfSSL library. Removed definitions of exceptions.
2023-07-14 22:20:39 +02:00
JacobBarthelmeh
517138806a
Merge pull request #6613 from anhu/GENERAL_NAME_set0_value
...
Adding wolfSSL_GENERAL_NAME_set0_value() compat layer API.
2023-07-14 14:18:58 -06:00
JacobBarthelmeh
1fe8944363
Merge pull request #6545 from bigbrett/serverListening-include-guard
...
fix pthread macro protection in tls_bench
2023-07-14 14:14:18 -06:00
JacobBarthelmeh
ff38d8f018
revert portion of cmake for vcpkg build
2023-07-14 13:27:38 -06:00
jordan
1afc0df83d
tfm fp_exptmod_nct: set result to zero when base is zero
2023-07-14 13:57:29 -05:00
Anthony Hu
933dae393e
Make PRBs happy
2023-07-14 14:33:43 -04:00
Joakim Strandberg
f49ffc0353
The implementations of the tls client and server applications can now be formally verified by the SPARK tools.
2023-07-14 20:30:34 +02:00
Brett
707c1a44bc
added support for dist bundle
2023-07-14 12:27:10 -06:00
Brett
5d24d5114a
removed Preview Assets and disabled swiftUI preview, as it is not required and adds unused files to a make dist install
2023-07-14 12:14:19 -06:00
Anthony Hu
3b773db728
Clean up after myself
2023-07-14 13:43:57 -04:00
jordan
a747e7773c
LMS: comments, SMALL_STACK, cleanup, etc.
2023-07-14 11:27:59 -05:00
JacobBarthelmeh
20115f0e23
Merge pull request #6619 from douzzer/20230714-asn-DecodeAuthKeyId-Wconversion-fix
...
20230714-asn-DecodeAuthKeyId-Wconversion-fix
2023-07-14 10:11:46 -06:00
Anthony Hu
31a02f194e
Address review comments.
2023-07-14 12:09:14 -04:00
JacobBarthelmeh
7361332c87
Merge pull request #6616 from SparkiDev/sm2_sp_not_avail
...
ECC and SM2: SP implementation not available yet
2023-07-14 09:58:43 -06:00
Daniel Pouzzner
e2833f99a3
wolfcrypt/src/asn.c: fix merge conflict between 648f474d83 and 2c9609039d, re -Wconversion in DecodeAuthKeyId().
2023-07-14 09:53:54 -05:00
Daniel Pouzzner
f6f8d2eda3
add WC_DO_NOTHING macro to wolfssl/wolfcrypt/types.h, with default expansion "do {} while (0)", and globally refactor to use the macro where appropriate, annotating intended-null macros-with-args with "/* null expansion */";
...
tweak several #includes of settings.h to include types.h instead (all of these are for clarity, as types.h is indirectly included by later #includes), and add #include <wolfssl/wolfcrypt/types.h> where missing;
remove trailing semicolons from PRAGMA*() macro invocations as they are unneeded and can be harmful (inducing frivolous -Wdeclaration-after-statement etc.).
2023-07-14 09:50:01 -05:00
Sean Parkinson
a96983e6d3
Merge pull request #6612 from dgarske/entropy_memuse_win32
...
Add support for MemUse Entropy on Windows.
2023-07-14 10:54:51 +10:00
Sean Parkinson
40d0a14c09
Merge pull request #6615 from dgarske/various2
...
Fix for building ED25519 with no client auth
2023-07-14 10:52:24 +10:00
Brett
0d9252de9e
review: max line length changes
2023-07-13 16:30:25 -06:00
Brett
698bf7b423
fixed typo and added xcode version to overview
2023-07-13 16:24:30 -06:00
Sean Parkinson
377417e668
ECC and SM2: SP implementation not available yet
...
ecc.c: Keep code, but don't compile in until implementation for SM2
added to SP.
ssl.c: Fix warning for when ECC_MINSIZE is zero and sz is unsigned.
2023-07-14 08:04:00 +10:00
David Garske
4862b57415
Simplify Windows Entropy_TimeHiRes, which just needs a precision timer to differentiate, not specific time.
2023-07-13 14:30:58 -07:00
David Garske
4fd5d154a4
Merge pull request #6611 from bandi13/addLibLMS_Docker
...
Add dependency for liblms
2023-07-13 14:15:07 -07:00
Brett Nicholas
9bed65ad57
split up error message
...
split #if into multiple lines
2023-07-13 15:14:02 -06:00
Brett Nicholas
b02a22b5b3
added error reporting macro for invalid configuration
2023-07-13 15:14:02 -06:00
Brett Nicholas
44faddac6c
fix compiler error for targets that don't define HAVE_PTHREAD
2023-07-13 15:14:02 -06:00
David Garske
e3e0b4505c
Fix for building ED25519 with WOLFSSL_NO_CLIENT_AUTH or NO_ED25519_CLIENT_AUTH set:
...
```
/wolfssl/src/ssl.c:6744:33: error: 'Options' has no member named 'cacheMessages'
6744 | ssl->options.cacheMessages = 1;
|
```
2023-07-13 13:53:04 -07:00
David Garske
00add89deb
Fix for unused AesDecrypt in aes.c with SiLabs AES acceleration enabled (WOLFSSL_SILABS_SE_ACCEL). ZD15874
2023-07-13 13:50:15 -07:00
Anthony Hu
4ccd6dfbe1
Adding wolfSSL_GENERAL_NAME_set0_value() compat layer API.
2023-07-13 16:09:47 -04:00
David Garske
761a976d0c
Add support for MemUse Entropy on Windows.
2023-07-13 12:56:13 -07:00
JacobBarthelmeh
4bf642283c
Merge pull request #6597 from SparkiDev/mp_test_div_fix
...
test.c: fix protection around calling mp_test_div
2023-07-13 13:37:27 -06:00
JacobBarthelmeh
11d26797d2
Merge pull request #6601 from SparkiDev/type_conversion_fixes_2
...
Type conversion fixes: make explicit
2023-07-13 13:33:58 -06:00
Brett
9379a8a094
added standard license headers, switched to C-style comments
2023-07-13 12:58:38 -06:00
Andras Fekete
8cd06c64b2
Add dependency for liblms
...
Usage: './configure --enable-lms=yes --with-liblms=/opt/sources/hash-sigs'
2023-07-13 14:22:55 -04:00
Brett
c8209068c2
added apple univeresal binary framework build script and example
2023-07-13 12:02:12 -06:00
David Garske
90b32d7857
Merge pull request #6596 from bandi13/updateLibOQS
...
Use liboqs v0.8
2023-07-13 09:37:01 -07:00
Joakim Strandberg
45d8a5b04c
Ada version of TLS v1.3 client application implemented
2023-07-13 16:49:22 +02:00
JacobBarthelmeh
8c012b5df5
Merge pull request #6599 from SparkiDev/heapmath_mp_exptmod_fix
...
Heap Math exptmod: fixes for valid modulus checks
2023-07-12 16:57:51 -06:00
JacobBarthelmeh
cf15789c7f
Merge pull request #6598 from SparkiDev/sm_update_3
...
EVP SM3: fix cast
2023-07-12 16:56:35 -06:00
JacobBarthelmeh
b889b27b8c
Merge pull request #6585 from cconlon/x509Ext
...
Fixes for WOLFSSL_X509 cert gen, WOLFSSL_ALT_NAMES to --enable-jni
2023-07-12 16:55:08 -06:00
Sean Parkinson
2c9609039d
Type conversion fixes: make explicit
...
Changed to types and casting so that there are no implcit conversion
warnings (gcc -Wconversion) in these files.
2023-07-13 08:36:02 +10:00
JacobBarthelmeh
62c14e4d5b
Merge pull request #6604 from douzzer/20230711-linuxkm-fixes
...
20230711-linuxkm-fixes
2023-07-12 16:26:56 -06:00
Chris Conlon
a8ed78e012
define WOLFSSL_ALT_NAMES in --enable-jni build
2023-07-12 14:33:45 -06:00
Chris Conlon
ea7ea356a0
Fixes for WOLFSSL_X509 cert generation with key usage, extended key usage, and basic constraints
2023-07-12 14:33:42 -06:00
David Garske
d20a096ffa
Ada Bindings for wolfSSL. Credit Joakim Dahlgren Strandberg <joakimds@kth.se>
2023-07-12 12:37:52 -07:00
Daniel Pouzzner
648f474d83
configure.ac:
...
if ENABLED_LINUXKM_PIE, add -DWOLFSSL_NO_OCSP_ISSUER_CHECK to gate out backward dependency in asn.c;
if ENABLE_LINUXKM, don't error on FIPS without thread_ls_on;
for --enable-curl, set ENABLED_MD4="yes", and move --enable-md4 AC_ARG_ENABLE() clause up to a position adjacent to des3 handling;
scripts/sniffer-gen.sh: fix illegal exit code (SC2242);
src/internal.c: fix clang-analyzer-core.NonNullParamChecker in CreateTicket();
src/ocsp.c: fix readability-redundant-preprocessor;
src/tls.c: fix empty-body in TLSX_PskKeModes_Parse() and clang-diagnostic-unreachable-code-break in ALPN_Select();
tests/api.c: fix several clang-analyzer-core.NullDereference related to Expect*() refactor;
wolfcrypt/src/asn.c:
fix -Wconversions in DecodeAuthKeyId() and ParseCertRelative();
fix readability-redundant-declaration re GetCA() and GetCAByName();
gate inclusion of wolfssl/internal.h on !defined(WOLFCRYPT_ONLY);
wolfssl/internal.h: add macro-detection gating around GetCA() and GetCAByName() prototypes matching gates in wolfcrypt/src/asn.c;
tests/utils.c: in create_tmp_dir(), use one-arg variant of mkdir() if defined(__CYGWIN__) || defined(__MINGW32__).
2023-07-12 13:47:40 -05:00
Sean Parkinson
8e89e31f70
test.c: fix protection around calling mp_test_div
...
Caller of mp_test_div() had different #ifdef protection declaration.
Made them the same.
2023-07-12 10:55:50 +10:00
David Garske
b8119af455
Merge pull request #6594 from lealem47/curl
...
Fix for curl build
2023-07-11 17:13:59 -07:00
Sean Parkinson
b18bc86ef8
Heap Math exptmod: fixes for valid modulus checks
...
mp_exptmod_base_2() uses Montogmery method and does not support even
modulus. Added check.
mp_exptmod_fast() uses Montogmery method when odd not when dr > 0.
Comment updated at call.
Reduce value of zero doesn't work for mp_reduece_2k. Changed setup of
use to check for zero and won't use it. Other methods won't work either.
2023-07-12 09:20:11 +10:00
Sean Parkinson
96f745af6f
EVP SM3: fix cast
...
wc_Sm3Update takes a word32 for the size.
Others cases are using the OpenSSL compatibility API but SM3 APIs don't
exist in OpenSSL.
2023-07-12 08:05:03 +10:00
Sean Parkinson
d6a6cbb83e
Merge pull request #6595 from dgarske/various
...
Fix for no malloc with SP and fix defaultdhparams typo
2023-07-12 07:19:52 +10:00
JacobBarthelmeh
fd72b885b6
Merge pull request #6592 from embhorn/zd16415
...
Fix Micrium config and new examples with NO_FILESYSTEM
2023-07-11 15:01:18 -06:00
jordan
4c125ece77
LMS: cleanup INSTALL, and cap threads to 4.
2023-07-11 15:04:51 -05:00
Andras Fekete
6fa080642c
Use liboqs v0.8
2023-07-11 15:36:44 -04:00
Lealem Amedie
f30364a00d
Fix test
2023-07-11 13:27:37 -06:00
Lealem Amedie
e140a83fad
Add curl gh actions test
2023-07-11 13:27:37 -06:00
Lealem Amedie
5fbe319ce9
Remove references to config.h from test headers
2023-07-11 13:27:37 -06:00
Lealem Amedie
1329543b62
Other miscellaneous fixes
2023-07-11 13:27:37 -06:00
Lealem Amedie
bcbeef7647
Fix for curl build
2023-07-11 13:27:37 -06:00
Anthony Hu
0b18e250ed
Merge pull request #6576 from iyanmv/liboqs-1.8
...
Rename sphincs algs to follow upstream
2023-07-11 14:56:49 -04:00
David Garske
36c1d20bb2
If malloc is disabled make sure it is also disabled in SP math
2023-07-11 11:51:40 -07:00
David Garske
3e9bdb7671
Fix defaultdhparams typo fix logic.
2023-07-11 10:26:40 -07:00
David Garske
8f36f78e6c
Merge pull request #6400 from bandi13/ARIA-cipher
...
Aria cipher
2023-07-11 09:50:42 -07:00
Iyán Méndez Veiga
fd091a745c
Include all post-quantum algorithm files in cmake
...
GH-5407 already included falcon.c, but now we also add sphincs.c,
dilithium.c and ext_kyber.c to avoid undefined reference errors.
2023-07-11 17:57:00 +02:00
JacobBarthelmeh
ba4c96f727
Merge pull request #6593 from SparkiDev/sm_update_2
...
SM cipher suite: fix name
2023-07-11 09:28:24 -06:00
Andras Fekete
ecc138fc6e
Fixed g++ shortcomings
2023-07-11 09:26:39 -04:00
jordan
d7c3a176e2
LMS cleanup.
2023-07-10 23:43:07 -05:00
Sean Parkinson
9f61cb9f2a
Merge pull request #6590 from dgarske/sp_math_only
...
Fix for SP math only case to ensure fast math and heap math are disabled
2023-07-11 10:33:46 +10:00
David Garske
29edef1645
Fix for SP math only case to ensure fast math and heap math are disabled. Also fix build error for case where WOLFSSL_HAVE_SP_ECC is defined, but HAVE_ECC is not. ZD 16419
2023-07-10 15:12:38 -07:00
Eric Blankenhorn
d84adce608
Fix Micrium config and new examples with NO_FILESYSTEM
2023-07-10 17:12:12 -05:00
Sean Parkinson
f26b8bdf62
Merge pull request #6584 from julek-wolfssl/issue/6554
...
Always enable tls13MiddleBoxCompat with WOLFSSL_TLS13_MIDDLEBOX_COMPAT
2023-07-11 07:53:56 +10:00
Sean Parkinson
ce02ad7347
SM cipher suite: fix name
...
Fix name of TLSv1.3 CCM cipher suite.
2023-07-11 07:30:44 +10:00
Andras Fekete
a317ac280c
PR comments
2023-07-10 16:50:54 -04:00
Andras Fekete
27a95e7e82
CMake is on a TODO for later
2023-07-10 15:44:30 -04:00
David Garske
2299282fdd
Merge pull request #6235 from kareem-wolfssl/hitch
...
Hitch
2023-07-10 11:46:57 -07:00
David Garske
e4c9a73296
Merge pull request #6587 from gojimmypi/ESP32WROOM-refactor
...
Espressif refactor WROOM32 ESP32
2023-07-10 11:46:10 -07:00
Iyán Méndez Veiga
d64d73a13f
Fix format keys
2023-07-10 19:43:59 +02:00
Kareem
8906ee95fd
Hitch code review feedback.
2023-07-10 10:06:12 -07:00
Kareem
2d0cc65381
Fix hitch test make check.
2023-07-10 10:06:12 -07:00
Kareem
56328d845a
Hitch code review feedback.
2023-07-10 10:06:12 -07:00
Kareem
3bfa189286
Fix hitch Github action.
2023-07-10 10:06:12 -07:00
Kareem
e871b1c04d
Add hitch support to wolfSSL.
...
Add support for cipher aliases DHE, EDH and EECDH.
Add define SSL_CTRL_GET_CHAIN_CERTS to help hitch and other programs detect SSL_CTX_get0_chain_certs is supported.
Add wolfSSL_get_locking_callback.
Allow using ECDHE+RSA cipher suites when ECDHE alias is used while in OpenSSL compatibility mode.
Add more alerts for hitch.
SSL_CM should use the CTX's x509_store_pt if available.
Add support for SSL_CERT_FILE and SSL_CERT_DIR. Load default OpenSSL TLS 1.3 ciphers when using OPENSSL_COMPATIBLE_DEFAULTS.
Use wolfSSL_sk_X509_new_null to allocate WOLFSSL_STACK in wolfSSL_CTX_get_extra_chain_certs. Previous approach of malloc'ing without setting type/memsetting was leading to a segfault.
Add --enable-hitch.
hitch: Add unit tests for new APIs, fix a couple of issues uncovered by unit testing.
Correct behavior of wolfSSL_BIO_set_mem_buf for BIO_CLOSE/NOCLOSE and update unit test accordingly.
Add Github action test for hitch.
2023-07-10 10:06:10 -07:00
JacobBarthelmeh
9d18648dfb
Merge pull request #6589 from SparkiDev/aarch64_aes_opensslextra_fix
...
AES GCM stream: arm asm fix when --enable-opensslextra
2023-07-10 10:55:50 -06:00
Andras Fekete
0a02218ba3
Clean up allocated memory on failure
2023-07-10 12:37:07 -04:00
Iyán Méndez Veiga
7c14ea67ae
Rename sphincs algs to follow upstream
...
This also adds new keys for SPHINCS+. The reason is that SPHINCS+
was updated to 3.1 in liboqs (open-quantum-safe/liboqs/pull/1420),
and old keys are incompatible with the new implementation.
Keys were generated using the oqs-provider for OpenSSL 3
openssl genpkey \
-provider default -provider oqsprovider \
-algorithm sphincsshake128fsimple \
-outform der \
-out bench_sphincs_fast_level1_key.der
And certs_test.h was updated using xxd
xxd -i -c 10 -u bench_sphincs_fast_level1_key.der
This was repeated for the 6 variants of SPHINCS+ that wolfSSL supports.
2023-07-10 18:31:07 +02:00
Andras Fekete
299b4d8552
Make wc_BuildEccKeyDer non-static
2023-07-10 11:32:17 -04:00
JacobBarthelmeh
2426cf14ca
Merge pull request #6583 from SparkiDev/certman_split
...
Moved CertManager APIs into own file
2023-07-10 09:20:09 -06:00
Andras Fekete
0efdf966d0
addressing PR comments
2023-07-10 11:14:07 -04:00
Juliusz Sosinowicz
86fd570e8c
Remove MyKeyLog.txt
2023-07-10 13:23:35 +02:00
Juliusz Sosinowicz
d0b8b919df
Always enable tls13MiddleBoxCompat with WOLFSSL_TLS13_MIDDLEBOX_COMPAT
2023-07-10 11:40:51 +02:00
Sean Parkinson
9f6ef65e8f
Merge pull request #6557 from julek-wolfssl/zd/16332
...
Don't allow a resumption handshake inside of a SCR
2023-07-10 13:51:29 +10:00
Sean Parkinson
fa053be533
Merge pull request #6496 from JacobBarthelmeh/PKCS7
...
parse ASN1 only with SMIME_read_PKCS7
2023-07-10 10:16:20 +10:00
Sean Parkinson
360b61aff2
AES GCM stream: arm asm fix when --enable-opensslextra
...
aadLen is now in gcm field of Aes.
2023-07-10 10:13:26 +10:00
Sean Parkinson
52a3d591b5
Fix check of date to respect VERIFY_SKIP_DATE in ASN.1 template
...
DecodeCertInternal was not recognizing VERIFY_SKIP_DATE.
2023-07-10 10:05:59 +10:00
JacobBarthelmeh
9d3a95a287
account for error return in test case when building without pkcs7 streaming
2023-07-09 12:42:29 -07:00
JacobBarthelmeh
0e2749eeb4
adjust test case for asn=original
2023-07-08 07:37:26 -07:00
JacobBarthelmeh
7866a40d06
resolve kari decode without recipient certificate
2023-07-08 07:37:26 -07:00
JacobBarthelmeh
f0354b4cbe
parse ASN1 only with SMIME_read_PKCS7
2023-07-08 07:36:10 -07:00
gojimmypi
57546405c0
refactor WROOM32 ESP32
2023-07-07 15:47:00 -07:00
David Garske
770590a3be
Rebase fix to add back set_verify call in CertManagerLoadCA. Fix API tests for bad date check. Various spelling fixes.
2023-07-07 15:08:08 -07:00
Sean Parkinson
3af87f6f93
Moved CertManager APIs into own file
...
Split out certificate manager APIs into ssl_certman.c.
ssl.c includes ssl_certman.c
Better test coverage.
Minor fixes.
wolfSSL_X509_chain_up_ref calls XFREE with name->heap but name may be
NULL. Check for NULL first.
2023-07-07 15:08:08 -07:00
David Garske
f2809c5a24
Merge pull request #6586 from julek-wolfssl/zephyr-action
...
Add zephyr testing github action
2023-07-07 14:54:07 -07:00
jordan
55bbd5865c
LMS/HSS: cleanup, and safer write/read callbacks
2023-07-07 15:30:50 -05:00
Juliusz Sosinowicz
c4cbf0508b
Add zephyr action
2023-07-07 20:18:19 +02:00
JacobBarthelmeh
7213cb3cfb
Merge pull request #6463 from dgarske/silabs_erf32
...
Updated support for Silicon Labs Simplicity Studio and the ERF32 Gecko SDK
2023-07-07 11:42:00 -06:00
David Garske
91fb24161b
Merge pull request #6515 from julek-wolfssl/nginx-1.25.0
...
Add support for nginx-1.25.0
2023-07-07 09:29:23 -07:00
David Garske
9599ddd80a
Merge pull request #6575 from julek-wolfssl/zd/15258
...
Properly enforce the pathLenConstraint of the BasicConstraints extension
2023-07-07 08:58:28 -07:00
David Garske
abe1bce914
Fix silabs_ecc_export_public to set the signing only flag. Added tests cases for import of private and public only verify in the SiLabs example.
2023-07-07 08:25:46 -07:00
Juliusz Sosinowicz
0abaa89787
Add support for nginx-1.25.0
...
- nginx: add necessary defines and function
- Implement Certificate Authorities for TLS 1.3
- Implement secret logging for TLS 1.3. Can be used for example with:
./configure CPPFLAGS="-DWOLFSSL_SSLKEYLOGFILE -DSHOW_SECRETS -DHAVE_SECRET_CALLBACK -DWOLFSSL_SSLKEYLOGFILE_OUTPUT='\"/tmp/secrets\"'"
- Implement session context checking for tickets
- Check for authorized responder in OCSP basic response
- Fix handling call to ocsp->statusCb
- compat: Translate SOCKET_PEER_CLOSED_E to WOLFSSL_ERROR_SYSCALL
- Fix wolfSSL_CTX_set_session_cache_mode
- WOLFSSL_SESS_CACHE_OFF means nothing should be on
- WOLFSSL_SESS_CACHE_NO_INTERNAL turns off only the internal cache
- Respect ssl->options.internalCacheOff
- Implement SSL_SESSION_set_time
- wolfSSL_SSL_in_init: fix detection for TLS 1.3
- Fix handling call to ssl->alpnSelect
- SendTls13NewSessionTicket: always generate new ID
- When we send a new ticket for the same session (for example we resumed a connection and are sending a new ticket so that the client can resume in the future), we need to generate a new ID so that we don't overwrite the old session in the cache. Overwriting the session results in the `diff` calculation in `DoClientTicketCheck()` producing the wrong value and failing to resume.
Add nginx github action test
- Fix memory leaks
- wolfSSL_OCSP_basic_verify: implement OCSP_TRUSTOTHER flag
- AKID: implement matching on issuer name and serial number
- ocsp: check for a chain match for OCSP responder
- Split CreateTicket into CreateTicket and SetupTicket
- SendCertificateStatus: free response.buffer
- Use heap hint when allocating responseBuffer
- Remove responseBuffer from internal API's that don't use it anywhere
2023-07-07 11:22:58 +02:00
Sean Parkinson
52b5adb54a
Merge pull request #6581 from kareem-wolfssl/eccNullKCheck
...
Fixed crash in wc_ecc_free.
2023-07-07 10:54:18 +10:00
David Garske
4d25faafe2
Merge pull request #6582 from SparkiDev/aes_gcm_arm_fix
...
AES-GCM ARM asm: fixes from GCM changes
2023-07-06 17:12:08 -07:00
Sean Parkinson
f3bae3192a
Merge pull request #6580 from dgarske/sig_verify
...
Fix for `wc_SignatureGenerate_ex` calling verify twice
2023-07-07 08:40:39 +10:00
Sean Parkinson
af5b3b551a
AES-GCM ARM asm: fixes from GCM changes
...
GCM is now its own structure.
GMULT, GHASH, GenerateM0 made public and fixed here too.
2023-07-07 08:35:14 +10:00
Juliusz Sosinowicz
2248140bf3
Clear ssl->arrays->sessionIDSz at start of function
2023-07-06 15:13:56 -07:00
Juliusz Sosinowicz
57e53d1a43
Don't allow a resumption handshake inside of a SCR
2023-07-06 15:13:56 -07:00
Kareem
fb9e036d5b
Add NULL check in TFM's fp_forcezero.
2023-07-06 14:47:18 -07:00
Kareem
657679efda
Only check for ALT_ECC_SIZE case, otherwise key->k is an array which will never be NULL.
2023-07-06 21:15:37 -07:00
Kareem
e995568626
Fixed crash in wc_ecc_free.
2023-07-06 21:10:32 -07:00
Andras Fekete
4f9b5de802
File gating
2023-07-06 17:03:57 -04:00
Andras Fekete
8421b384fb
Settable 'keyAsn1' max length
2023-07-06 17:02:44 -04:00
Andras Fekete
ef9206f73f
Addressing PR comments
2023-07-06 16:42:12 -04:00
Andras Fekete
266307da6c
Add in ARIA wrappers
...
Address PR comments + other cleanup
Addressing PR comments
Minor change
Make sure the last line gets output as well
Add in ARIA SHA256 session to internal structure
Add in ARIA SHA384 session to internal structure
Add necessary function for ARIA to extract key
Fix unit tests
Rename HAVE_ARIAGCM to HAVE_ARIA
Move aria.* to wolfcrypt/port/aria
Separate out aria-crypt init functions
Adding in ECC+SHA callbacks
Avoid using AC_CHECK_FILE
Rename Aria to wc_Aria
Don't need special cases
Addressing PR comments
Code cleanup
C89 support
Remove TODO
Add documentation about buffer size
Clean up header files
Use ARIA_DEVID by default if available
Dummy update call to make MagicCrypto happy
Fix for detecting what algo type to use
Documentation
Use the appropriate sign/verify
Collect MagicCrypto functions together (and avoid leaks)
Fall back on other implementations on failure
Fix issue when compiling without CRYPTOCB
Addressing PR comments
Better cleanup
Addressing PR comments
Cleaner exit in case of error
2023-07-06 16:09:23 -04:00
Juliusz Sosinowicz
2cf916581d
Jenkins fixes
2023-07-06 19:55:54 +02:00
Juliusz Sosinowicz
c041863aaa
Code review
2023-07-06 19:00:11 +02:00
Juliusz Sosinowicz
d2642e329d
Properly enforce the pathLenConstraint of the BasicConstraints extension
...
- move the testsuite file helps into a new tests/utils.c file so that they can be used across all tests
- dump the raw TLS stream when WOLFSSL_DUMP_MEMIO_STREAM is defined so that it can be examined in Wireshark
2023-07-06 19:00:11 +02:00
David Garske
9ca53ac7f7
Fix for wc_SignatureGenerate_ex calling verify twice.
2023-07-06 09:34:03 -07:00
David Garske
fb0c769d6c
Merge pull request #6578 from douzzer/20230705-analyzer-fixes
...
20230705-analyzer-fixes
2023-07-06 09:04:39 -07:00
David Garske
e8f3afc85b
Merge pull request #6579 from julek-wolfssl/getsockopt-endianness
...
getsockopt needs to take in an int
2023-07-06 09:04:13 -07:00
David Garske
caa0e5aabf
Fix for silabs_ecc_export_public to set the type (curve).
2023-07-06 08:57:02 -07:00
jordan
67bef21185
Add LMS/HSS wolfCrypt hooks.
2023-07-06 10:55:53 -05:00
David Garske
794425c431
Merge pull request #6577 from SparkiDev/sm_update_1
...
SM tests: void in function declaration that is its prototype
2023-07-06 06:04:14 -07:00
Juliusz Sosinowicz
0b4e4287c9
getsockopt needs to take in an int
...
This caused an issue on big endian platforms
From the getsockopt man page:
Most socket-level options utilize an int argument for optval. For setsockopt(), the argument should be non‐
zero to enable a boolean option, or zero if the option is to be disabled.
2023-07-06 11:40:36 +02:00
Daniel Pouzzner
1912f1bc2a
fixes for clang-analyzer-core.NullDereference, clang-analyzer-core.NonNullParamChecker, clang-analyzer-deadcode.DeadStores, readability-redundant-preprocessor, clang-diagnostic-unreachable-code-break, -Werror=sign-conversion, bugprone-macro-parentheses, "Call to 'malloc' has an allocation size of 0 bytes", clang-diagnostic-declaration-after-statement re tests/unit.h:ExpectPtr() pragmas.
2023-07-06 00:53:37 -05:00
Sean Parkinson
7a73c9aac7
SM tests: void in function declaration that is its prototype
...
Need to have void in prototype of funtion.
2023-07-06 08:57:30 +10:00
David Garske
652c5491fe
Merge pull request #6571 from julek-wolfssl/dtls-mtu-interop
...
Always add DTLS_MTU_ADDITIONAL_READ_BUFFER for better MTU interop
2023-07-05 13:03:10 -07:00
Juliusz Sosinowicz
b0c2e29a2e
Always add DTLS_MTU_ADDITIONAL_READ_BUFFER for better MTU interop
2023-07-05 10:19:19 -07:00
David Garske
856b5c3f1b
Merge pull request #6566 from JacobBarthelmeh/soname
...
update soname to 40
2023-07-05 09:21:10 -07:00
David Garske
f00b5c3a1e
Merge pull request #6537 from SparkiDev/sm
...
SM2/SM3/SM4: Chinese cipher support
2023-07-04 10:03:37 -07:00
David Garske
b682c2c4bb
Merge pull request #6437 from julek-wolfssl/windows-crl-monitor
...
Implement CRL monitor for Windows
2023-07-04 10:03:14 -07:00
Juliusz Sosinowicz
7af1f0cf05
Add additional windows logging for DoMonitor
2023-07-04 14:12:38 +02:00
Juliusz Sosinowicz
f58539581d
Fix DoMonitor for Mac/BSD
2023-07-04 13:24:00 +02:00
Juliusz Sosinowicz
2feec88702
Add comment explaining threading usage
2023-07-04 11:18:44 +02:00
Juliusz Sosinowicz
713670dcc7
Use smaller buffer for copying
2023-07-04 11:18:44 +02:00
Juliusz Sosinowicz
3d2db844c1
Speed up waiting for file removal
2023-07-04 11:18:44 +02:00
Dimitri Papadopoulos
50752f5a2b
Fix typos found by codespell
2023-07-04 07:21:27 +02:00
Sean Parkinson
e2424e6744
SM2/SM3/SM4: Chinese cipher support
...
Add support for:
- SM2 elliptic curve and SM2 sign/verify
- SM3 digest
- SM4 cipher with modes ECB/CBC/CTR/GCM/CCM
Add APIs for SM3 and SM4.
Add SM2 sign and verify APIs.
Add support for SM3 in wc_Hash and wc_Hmac API.
Add support for SM3 and SM4 through EVP layer.
Add support for SM2-SM3 certificates. Support key ID and name hash being
with SHA-1/256 or SM3.
Add support for TLS 1.3 cipher suites: TLS-SM4-GCM-SM3, TLS-SM4-CCM-SM3
Add support for TLS 1.2 SM cipher suite: ECDHE-ECDSA-SM4-CBC-SM3
Add support for SM3 in wc_PRF_TLS.
Add SM2-SM3 certificates and keys. Generated with GmSSL-3.0.0 and
OpenSSL.
2023-07-04 13:36:28 +10:00
David Garske
6028dfd394
Merge pull request #6523 from gojimmypi/wc-memory-test
...
Add wolfcrypt test: R/O filesystem const memory pointer
2023-07-03 11:58:13 -07:00
David Garske
a921ab754d
Merge pull request #6569 from SparkiDev/pem_der_example
...
PEM example: new example for convert between PEM and DER
2023-07-03 11:31:36 -07:00
gojimmypi
573fedae2f
add const_byte_ptr_test for Xtensa -mforce-l32 check
2023-07-03 10:44:01 -07:00
David Garske
ad2621a7a0
Merge pull request #6572 from douzzer/20230703-clang-tidy-fixes
...
20230703-clang-tidy-fixes
2023-07-03 10:43:45 -07:00
David Garske
f72a6b705f
Minor spelling fixes.
2023-07-03 10:23:55 -07:00
Daniel Pouzzner
214f9f55c4
fixes for bugprone-suspicious-missing-comma, clang-analyzer-core.NullDereference, and readability-redundant-preprocessor.
2023-07-03 11:30:08 -05:00
David Garske
678a65822f
Merge pull request #6556 from StMartin81/Fix_compilation_of_wc_RsaFunctionNonBlock_if_WOLFSSL_RSA_PUBLIC_ONLY_is_defined
...
Fix compilation of wc_RsaFunctionNonBlock if WOLFSSL_RSA_PUBLIC_ONLY …
2023-07-03 08:55:36 -07:00
David Garske
732ef09da6
Merge pull request #6551 from SparkiDev/asn_no_certs
...
ASN: fix so that NO_CERTS configurations work
2023-07-03 08:55:14 -07:00
Juliusz Sosinowicz
3d68bcd6f7
Jenkins fixes
2023-07-03 14:02:51 +02:00
Juliusz Sosinowicz
ca77da92e5
Implement pthreads threading
2023-07-03 14:02:51 +02:00
Juliusz Sosinowicz
bff2cf5690
Add crl monitor unit testing
2023-07-03 14:02:51 +02:00
Juliusz Sosinowicz
8ab0050801
Init windows CRL monitor
2023-07-03 14:02:51 +02:00
Sean Parkinson
a39a04fc88
PEM example: new example for convert between PEM and DER
...
PEM example converts PEM to DER and DER to PEM.
Supports encrypting DER and writing out as PEM.
Added better support for 40-bit RC2-CBC PBE.
Added AES-128-CBC encryption support with PKCS#5v2.
Fixed handling of iterations to support writing 24-bit values.
Declared enum types for pass to PKCS#8 encryption APIs.
Add more DER and PEM files to certs directory.
Add testing of 'pem' with pem.test script.
2023-07-03 17:20:35 +10:00
Sean Parkinson
5be883a995
ASN: fix so that NO_CERTS configurations work
...
Moved code around and update #ifdefs so that --enable-cryptonly
CFLAGS=-DNO_CERTS compiles.
2023-07-03 09:16:44 +10:00
Sean Parkinson
da4424cd0c
Merge pull request #6559 from dgarske/sni_defaults
...
Turn on SNI by default on hosts with resources
2023-07-03 08:07:45 +10:00
JacobBarthelmeh
e2a1bc6e6a
fix warning for build with vcpkg
2023-06-30 15:53:46 -07:00
JacobBarthelmeh
a4c058649b
Merge pull request #6560 from dgarske/stm32_nuttx
...
Support for using the Nuttx STM RNG register definitions
2023-06-30 16:15:49 -06:00
JacobBarthelmeh
877979c5c2
update soname to 40
2023-06-30 14:40:26 -07:00
David Garske
052fba887c
Merge pull request #6563 from SKlimaRA/SKlimaRA/fix-funky-ifdef
...
fixed bug in ifdef logic caused in pull req 6277
2023-06-30 14:30:47 -07:00
Chris Conlon
e1cb74f24a
Merge pull request #6492 from night1rider/wolfssl-wolfcrypttest-statickeys
...
Added to cert buffer keys and updated testwolfcrypt
2023-06-30 14:21:40 -06:00
Lealem Amedie
5ba579397d
Make public wc_ api for EncodeObjectId
2023-06-30 14:14:27 -06:00
Stanislav Klima
c2726b4cbe
fixed bug in ifdef logic caused in pull req 6277
2023-06-30 13:08:07 -07:00
Martin Stolpe
81484ef74b
Fix compilation of wc_RsaFunctionNonBlock if WOLFSSL_RSA_PUBLIC_ONLY is defined
2023-06-30 13:05:21 -07:00
David Garske
6052e01879
Fixes for SNI test with static memory enabled. Fixes for other minor static memory build combinations.
2023-06-30 13:04:05 -07:00
David Garske
79a7d21932
Turn on SNI by default on hosts with resources.
2023-06-30 13:04:05 -07:00
David Garske
53c30f44a0
Support for using the Nuttx STM RNG register definitions, enabled with STM32_NUTTX_RNG. ZD 16315
2023-06-30 13:00:52 -07:00
David Garske
95675c7e34
Merge pull request #6455 from lealem47/INIT_SSL_NO_CTX_KEY
...
Allow option to create SSL without key/cert in ctx
2023-06-30 10:35:52 -07:00
David Garske
9fc68f4a80
Merge pull request #6558 from anhu/wolfSSL_X509_NAME_heap
...
Allocate WOLFSSL_X509_NAME with heap hint.
2023-06-30 10:35:08 -07:00
David Garske
1c33cefff7
Merge pull request #6562 from SparkiDev/wolfbot_fixes_1
...
wolfBot fixes
2023-06-29 19:13:17 -07:00
Sean Parkinson
a1939d22b9
wolfBot fixes
...
Importing an EC point ordinate with one being zero will result in
different errors based on different implementations. Check both known
error codes.
Benchmark usage fixed.
2023-06-30 09:07:46 +10:00
Lealem Amedie
7720dac545
Allow option to create SSL without key/cert in ctx
2023-06-29 13:57:40 -06:00
Anthony Hu
ed4774f606
Allocate WOLFSSL_X509_NAME with heap hint.
2023-06-29 12:04:32 -04:00
David Garske
048083cfe3
Merge pull request #6329 from tmael/crl_off
...
Add support for enabling and disabling CRLs.
2023-06-28 16:03:25 -07:00
Sean Parkinson
d029ba4d46
Merge pull request #6415 from julek-wolfssl/issue/6408
...
Ignore session ID's shorter than 32 bytes instead of erroring out
2023-06-29 08:20:48 +10:00
Lealem Amedie
c45f7c87b0
Make DecodeObjectId available for OPENSSL_ALL
2023-06-28 13:46:45 -06:00
Lealem Amedie
7251d564eb
Use new RID function in asn=original
2023-06-28 13:04:47 -06:00
Lealem Amedie
47350fa95c
Remove manual encoding of OID in txt2oidBuf
2023-06-28 12:53:34 -06:00
Lealem Amedie
ee63d73299
Restore nid2oid functionality to preserve expected behaviour
2023-06-28 12:53:34 -06:00
Lealem Amedie
1d83448df7
memcpy instead of strcpy
2023-06-28 12:53:34 -06:00
Lealem Amedie
48de458017
Add Obj_txt2oidBuf function
2023-06-28 12:53:34 -06:00
Lealem Amedie
2a539fe028
Cleanup
2023-06-28 12:53:34 -06:00
Lealem Amedie
fdc95f9ba6
Handle registeredID correctly
2023-06-28 12:53:34 -06:00
Lealem Amedie
90f5665318
Improve subjectAltName extension parsing and printing
2023-06-28 12:53:34 -06:00
David Garske
dcfa410540
Merge pull request #6289 from jpbland1/nuttx-hw-acel
...
Nuttx hw acel benchmark with STM32_HW_CLOCK_AUTO
2023-06-28 09:32:48 -07:00
Hideki Miyazaki
e0651e4eb3
Merge pull request #6434 from TakayukiMatsuo/fixtypo
...
Fixed some typos in Japanese help in examples/client
2023-06-28 11:20:42 +09:00
David Garske
8e3afbd6e3
Merge pull request #6547 from philljj/fix_cut_call
...
fix detection of cut tool in configure.ac
2023-06-27 16:19:52 -07:00
JacobBarthelmeh
78107b0f88
Merge pull request #6540 from dgarske/bench_fix
...
Fix for benchmark always using 4KB of memory for `gStats`
2023-06-27 16:18:29 -06:00
John Bland
c72d008a5c
add STM32_HW_CLOCK_AUTO which turns the stm32 hw
...
accleration clock on and off automatically
2023-06-27 17:16:46 -04:00
John Bland
fbadcf67da
add the STM32 peripheral clock enable and disable
...
calls to the benchmark program so the benchmark program can use hardware accleration
2023-06-27 17:16:46 -04:00
David Garske
d9d9c5cd3d
Merge pull request #6549 from gojimmypi/pthread_gate
...
Revert #6536 types.h one line HAVE_PTHREAD
2023-06-27 13:42:16 -07:00
David Garske
6b26b071e4
Merge pull request #6532 from embhorn/forum_topic2018
...
Fix WinCE XSEEK_SET
2023-06-27 13:26:18 -07:00
David Garske
0d0d2cf50c
Merge pull request #6531 from bandi13/extraCMakeOptions
...
Extra c make options
2023-06-27 13:26:03 -07:00
David Garske
b1fe15dc70
Further refactor of the benchmark stats tracking. Always use the allocated list (avoids using a stack pointer for ECC descriptions).
2023-06-27 13:05:04 -07:00
David Garske
e0fa25eedc
Merge pull request #6548 from lealem47/gplusplus
...
Fix for g++ builds
2023-06-27 13:02:50 -07:00
gojimmypi
8867f484e5
Revert #6536 types.h one line HAVE_PTHREAD
2023-06-27 12:36:53 -07:00
Lealem Amedie
91962a1a78
Fix for g++ builds
2023-06-27 12:50:56 -06:00
jordan
41d248461b
fix detection of cut tool in configure.ac
2023-06-27 13:18:25 -05:00
David Garske
51ca7bb8e3
Fix to support using -print with WC_BENCH_TRACK_STATS.
2023-06-27 10:25:48 -07:00
JacobBarthelmeh
9a4237ee88
Merge pull request #6457 from lealem47/gcc-arm-user-settings
...
Improve GCC-ARM user-settings.h FIPS configurability
2023-06-27 11:17:56 -06:00
David Garske
145ca4ae9d
Merge pull request #6542 from SparkiDev/api_fixes_1
...
Tests api.c: fixes
2023-06-27 10:00:07 -07:00
David Garske
500b66eb36
Add API for exporting a SiLabs SE ECC key to a wolf ECC key (silabs_ecc_export_public). Add API for supporting export of a vault's public key. Add an ECC signature example for SiLabs.
2023-06-27 09:36:41 -07:00
Tesfa Mael
26e6fd9a6f
update wolfSSL_X509_STORE_set_flags
2023-06-27 08:29:13 -07:00
Tesfa Mael
cb0e2c8b0f
Maintain existing behavor when not using OPENSSL_COMPATIBLE_DEFAULTS
2023-06-27 08:29:13 -07:00
Tesfa Mael
03e5d109c7
Add test_wolfSSL_dup_CA_list
2023-06-27 08:29:13 -07:00
Tesfa Mael
481ae20fcb
Maintain consistent behavior when activating CRL
2023-06-27 08:26:02 -07:00
Tesfa Mael
fd17fa3e9c
Implement the option to disable CRL check
...
Do leaf CRL check by default
Correct wolfSSL_sk_X509_NAME_push return check
Update OpenSSL compatibility errors for HAProxy
Change X509_V to literal constant values
Fix the compat layer with TLS session ticket reuse
Fix for tls1_2 session resume and cache miss
Save intitial wolfSSL ctx
Check for OpenSSL CRL error code 23
2023-06-27 08:26:02 -07:00
Juliusz Sosinowicz
291c538e5f
Ignore session ID's shorter than 32 bytes instead of erroring out
2023-06-27 14:51:46 +02:00
David Garske
23c60b7b9c
Merge pull request #6530 from SparkiDev/tests_api_expect_5
...
Test api.c: change more tests to use Expect instead of Assert
2023-06-26 16:10:52 -07:00
Sean Parkinson
578f56e60c
Test api.c: change more tests to use Expect instead of Assert
...
bio.c:
wolfSSL_BIO_flush(): check allocation to bio->ip succeeded.
internal.c:
InitSSL_Ctx(): set ctx->heap to heap if value passed in
ProcessPeerCerts(): check for error MEMORY_E too as a fatal parsing
error
ssl.c:
wolfSSL_shutdown(): SOCKET_ERROR_E is also an indication that the
socket is done, MEMORY_E is a fatal error
wolfSSL_Cleanup(): move free of memory fail couting to wolfSSL API
SessionTicketNoncePrealloc(): eror return must be non-zero
AddSessionToCache(): XFREE checks for NULL no need to do it before
call
wolfSSL_set_psk_use_session_callback(): ensure ssl is not NULL before
dereferencing
wolfSSL_SMIME_read_PKCS7(): check for error return from
wolfSSL_BIO_gets()
asn.c:
wc_MIME_parse_headers(): check allocation succeeded into nextHdr
compress.c:
wc_DeCompressDynamic(): free tmp on inflateInit2 failure
memory.c: rework where memory allocation failure counting code for when
WOFLSSL_STATIC_MEMORY is defined
wc_port.c:
wolfCrypt_Cleanup(): only call wc_MemFailCount_Free() when no
wolfSSL_Cleanup()
2023-06-27 08:01:33 +10:00
Sean Parkinson
17bc833bd3
Merge pull request #6543 from embhorn/gh6506
...
Spelling fixes in script generated files
2023-06-27 07:28:35 +10:00
Eric Blankenhorn
51ffe9691f
Spelling fixes in script generated files
2023-06-26 09:48:15 -05:00
gojimmypi
6b240fa41a
Refactor HAVE_PTHREAD and _POSIX_THREADS ( #6536 )
...
* HAVE_PTHREAD gate in test.h
* add config.h and settings.h to test.h
* added config.h and settings.h to other test.h in wolfcrypt/test
* settings #ifdef _POSIX_THREADS HAVE_PTHREAD
* cyassl settings _POSIX_THREADS HAVE_PTHREAD
* undo cyassl _POSIX_THREADS HAVE_PTHREAD
* move settings.h #include in both test.h
* add !defined(SINGLE_THREADED) logic
* refactor HAVE_PTHREAD, _POSIX_THREADS
2023-06-26 07:32:20 -07:00
Sean Parkinson
b7332e33c7
Tests api.c: fixes
...
NULL dereference.
Uninitialized variable use.
2023-06-26 16:04:24 +10:00
JacobBarthelmeh
18032cdc40
Merge pull request #6535 from dgarske/wpas_small
...
Fix for `--enable-wpas=small`
2023-06-23 16:19:31 -07:00
David Garske
514ea2d0b1
Merge pull request #6510 from mitchcapper/win32_better_socket_error_msg_pr
...
Added For TranslateIoError in debug mode use FormatMessage to get a better error message
2023-06-23 15:33:34 -07:00
David Garske
af0facad9f
Fix for --enable-wpas=small.
2023-06-23 14:25:39 -07:00
David Garske
48dc288b83
Fix for wc_ecc_import_raw_private using 0 for key size. Add check in silabs_ecc.
2023-06-23 14:22:46 -07:00
David Garske
cde4e8e13d
Fix for signing with vault to only use if private key is not supplied. Refactor the silabs ECC key import code. Added checks for all silabs_ecc return codes.
2023-06-23 14:22:45 -07:00
David Garske
fc153ff273
Support for Silicon Labs Gecko SDK v4. Changes SE Hash to use multipart API's. Gecko SDK v3 auto-detected or manually forced using WOLFSSL_SILABS_SE_ACCEL_3.
2023-06-23 14:22:44 -07:00
David Garske
83dca07421
Updated support for Silicon Labs Simplicity Studio and the ERF32 Gecko SDK. Fix ECC unused functions with HW crypto like SE. ZD 15874.
2023-06-23 14:20:40 -07:00
David Garske
00719182d5
Fix for benchmark always using 4KB of memory for gStats, even when not required. Added new WC_BENCH_TRACK_STATS to enable feature is needed. Code cleanups for line length and headers.
2023-06-23 14:17:22 -07:00
Mitch Capper
6185d66b01
For TranslateIoError use FormatMessage to get a better error message on win32
2023-06-23 14:05:38 -07:00
David Garske
033f56bfe9
Merge pull request #6534 from mitchcapper/basic_editorconfig_addition_pr
...
Basic editor config to avoid some whitespace issues
2023-06-23 11:49:27 -07:00
David Garske
102cb1114a
Merge pull request #6509 from douzzer/20230613-wc_test_ret_t
...
20230613-wc_test_ret_t
2023-06-23 11:47:20 -07:00
David Garske
ea68920b8b
Merge pull request #6539 from JacobBarthelmeh/caam
...
fix for keymod with rt1170 blobs
2023-06-23 11:47:04 -07:00
lealem47
06c1dd171a
Merge pull request #6466 from dgarske/keilmdk
...
Fixes and cleanups for Keil MDK examples
2023-06-23 08:41:04 -06:00
JacobBarthelmeh
2d87037e4b
fix for keymod with rt1170 blobs
2023-06-23 00:50:25 -07:00
David Garske
746ac3c9a3
Merge pull request #6533 from anhu/no_data_junk
...
make sure that when TLSX_ALPN_GetRequest() returns, data and dataSz...
2023-06-22 22:11:02 -07:00
Lealem Amedie
6f2831a252
Document inline build error & fix
2023-06-22 16:48:17 -06:00
David Garske
255aa774f2
Updated Keil MDK documentation to note RTOS and TCP default dependency. Fix for inline error due to tracking code being available too broadly. Use current branch for makedistsmall.sh.
2023-06-22 16:48:17 -06:00
David Garske
a56fe30c2c
Fixes and cleanups for Keil MDK examples. Combine duplicate user_settings.h. Use SP math all by default. Disable old/deprecated algorithms. Add CMSIS RTOS timer support for TLS and benchmark.
2023-06-22 16:48:17 -06:00
David Garske
2f44ece4d8
Merge pull request #6511 from JacobBarthelmeh/nightly
...
fix for nightly toolchain armv7 build warning
2023-06-22 15:25:57 -07:00
David Garske
33808c75f2
Merge pull request #6527 from philljj/zd16310
...
Fix ThreadSanitizer unlock of an unlocked mutex warning
2023-06-22 14:26:44 -07:00
Mitch Capper
20d706aad8
Basic editor config to avoid some whitespace issues
2023-06-22 14:06:46 -07:00
Anthony Hu
3e821c6f2b
make sure that when TLSX_ALPN_GetRequest() returns data and dataSz are not pointing to junk.
2023-06-22 15:01:11 -04:00
jordan
2be3bb4c56
Fix ThreadSanitizer unlock of an unlocked mutex warning
2023-06-22 13:23:08 -05:00
Eric Blankenhorn
c933f780ca
Fix WinCE XSEEK_SET
2023-06-22 11:14:34 -05:00
Andras Fekete
155ce9aecf
HKDF already defined
2023-06-22 11:17:34 -04:00
Andras Fekete
0ee198437a
Get around issue with 'uint8_t' undefined
2023-06-22 11:03:56 -04:00
Andras Fekete
f58ae30b50
Add in CMake flags 'HPKE', 'HKDF', 'ECH'
2023-06-22 11:03:36 -04:00
Andras Fekete
e1f2c0bb2e
Add 'Keying_material' option
2023-06-22 10:12:37 -04:00
David Garske
3cb0b4ab29
Merge pull request #6410 from embhorn/zd15856
...
Update EBSNET port
2023-06-21 21:35:19 -07:00
David Garske
6697181081
Merge pull request #6500 from SparkiDev/tests_api_expect_4
...
Test api.c: change more tests to use Expect instead of Assert
2023-06-21 17:17:37 -07:00
David Garske
fb35526b73
Merge pull request #6528 from kareem-wolfssl/trustedCaKeys
...
Fix trusted_ca_keys, refactor MAX_X509_SIZE
2023-06-21 17:07:55 -07:00
Kareem
e6017dc546
Refactor MAX_X509_SIZE into a define so it can be overriden in build settings.
2023-06-21 15:35:29 -07:00
Kareem
75c8d87353
Fix trusted_ca_keys extension allowed logic.
2023-06-21 15:35:29 -07:00
Sean Parkinson
e467112a93
Test api.c: change more tests to use Expect instead of Assert
...
Changed EXPECT_DECL to start of as TEST_SKIPPED.
Modified other EXPECT macros appropriately.
Change test functions to not use 'res' when EXPECT_DECL is used.
memory.c:
wc_MemFailCount_Init(): don't declare variable after a statement
conf.c:
wolfSSL_TXT_DB_read(): free the whole WOLFSSL_TXT_DB on failure
instead of just the memory
wolfSSL_CONF_add_string(): pop the value added into section->value
(sk) if it can't be pushed onto conf->data
wolfSSL_NCONF_load(): free the new value if it wasn't able to be added
ocsp.c:
wolfSSL_OCSP_cert_to_id():
free the decoded certificate if parsing failed (is freed after use
otherwise)
free the certificate id on failure and make it NULL and continue
freeing other variables
pk.c:
wolfSSL_RSA_set0_crt_params(): set dmp1, dmq1 and iqmp fields to NULL
if setting the internal failed - returns error and caller needs to free
the passed in BNs
wolfSSL_RSA_set0_factors(): set p and q fields to NULL if setting the
internal failed - returns error and caller needs to free the passed in
BNs
wolfSSL_RSA_set0_key(): set n, e abd d fields to NULL if setting the
internal failed - returns error and caller needs to free the passed in
BNs
x509.c:
wolfSSL_X509_set_serialNumber(): explicit NULL
checkwolfSSL_X509_REQ_add1_attr_by_NID(): check whether push succeeded
and on failure free attribute
asn.c:
ConfirmSignature(): for DSA, allocate separately to ensure no leak on
memory allocation failure.
dh.c:
wc_DhGenerateParams(): ensure tmp and tmp2 are able to be cleared on
error
evp.c:
wolfSSL_EVP_PKEY_CTX_add1_hkdf_info(): fix realloc use to no leak on
failure
wolfSSL_EVP_CIPHER_CTX_iv_length(): handle ctx being NULL.
2023-06-22 08:21:17 +10:00
Eric Blankenhorn
53fe93430e
Update EBSNET port
2023-06-21 15:52:42 -05:00
David Garske
8473275fc6
Merge pull request #6529 from kareem-wolfssl/openwrt21.02Fix
...
Workaround for removed kmods repo in OpenWRT 21.02.
2023-06-21 13:19:40 -07:00
JacobBarthelmeh
2d28b492b0
Merge pull request #6501 from dgarske/ecc_comp
...
Fix for SP math all and ECC with compressed keys (missing sp_add_d)
2023-06-21 12:01:06 -07:00
Kareem
9f24217e26
Workaround for removed kmods repo in OpenWRT 21.02.
2023-06-21 11:53:30 -07:00
David Garske
1bff338e37
Merge pull request #6507 from bandi13/fix_certs_ocsp_renewcerts
...
Fix certs ocsp renewcerts
2023-06-21 11:26:59 -07:00
David Garske
9204101e94
Merge pull request #6517 from douzzer/20230615-opensslextra-wolfSSL_ERR_reason_error_string
...
20230615-opensslextra-wolfSSL_ERR_reason_error_string
2023-06-21 11:06:51 -07:00
David Garske
aaf2408851
Merge pull request #6504 from SparkiDev/bench_embedded_scrypt
...
test.c, scrypt: bench embedded reduce heap usage
2023-06-21 11:06:26 -07:00
David Garske
0e2c32f726
Merge pull request #6505 from SparkiDev/alt_ecc_cryptocb
...
ECC, ALT_ECC_SIZE, CryptoCB: ensure err is 0 in _ecc_make_key_ex
2023-06-21 11:05:53 -07:00
David Garske
70c3e84735
Merge pull request #6503 from SparkiDev/mp_test_tfm_mips
...
TFM: fix big endian reading a zero length buffer
2023-06-21 11:05:40 -07:00
David Garske
3b3c175af0
Merge pull request #6521 from ejohnstown/readme
...
Update Readme
2023-06-18 21:16:56 -07:00
John Safranek
c322e1f7f8
update readme
2023-06-18 20:24:28 -07:00
David Garske
d967aae501
Merge pull request #6518 from ejohnstown/release-5.6.3
...
Release 5.6.3
2023-06-16 12:08:23 -07:00
John Safranek
42e934b251
Update read-me and change-log for the release.
2023-06-16 09:47:35 -07:00
David Garske
4741a0b696
Merge pull request #6508 from JacobBarthelmeh/fuzzing
...
sanity check on send fatal alert return
2023-06-15 20:13:49 -07:00
David Garske
78b78428e7
Merge pull request #6512 from SparkiDev/math_enc_mem_exptmod
...
Math, Encrypted Memory: mod exp fix
2023-06-15 19:52:41 -07:00
Sean Parkinson
e17f86d145
TFM: fix big endian reading a zero length buffer
...
Bail early as big endian implementation doesn't handle it.
2023-06-16 10:58:51 +10:00
Sean Parkinson
beef8b0014
outputBuffer - use idx field
...
dtls13.c:
Change end of outputBuffer data calculations to use function
GetOutputBuffer().
Use idx when calculating unused byte count of outputBuffer.
internal.c:
Change end of outputBuffer data calculations to use function
GetOutputBuffer().
Use GetOutputBuffer() to calculate end of data in outputBuffer.
GrowOutputBuffer():
Calculate new size to allocate to include already written data in
case of static buffer.
Copy all data including already written count (idx).
CheckAvailableSize():
Don't subtract idx from length when checking MTU size.
Do subtract idx from bufferSize to determine count of unused bytes
in outputBuffer.
2023-06-16 10:29:52 +10:00
Sean Parkinson
a1e8aa7269
test.c, scrypt: bench embedded reduce heap usage
...
Don't do scrypt test cases that allocate 1MB of memory when
BENCH_EMBEDDED is defined.
2023-06-16 10:16:34 +10:00
Daniel Pouzzner
970663f8a1
in wolfSSL_ERR_reason_error_string(), unconditionally convert positive error codes to negative, and in switch(), match against negated values of OpenSSL positive codes like WOLFSSL_ERROR_WANT_READ. fixes #6514
2023-06-15 17:42:03 -05:00
dell5060
7926ceb120
Updated Key gen to convert the keys located in /certs/statickeys to be used in buffers
2023-06-15 15:33:11 -06:00
Sean Parkinson
7153dd70a6
Math, Encrypted Memory: mod exp fix
...
The modular exponentiation implementations in sp_int.c and tfm.c are not
safe when using Encrypted Memory.
Cannot have two pieces of memory where one changes and the other doesn't
based on private value.
Use extra variable to hold the two new values and assign them both back
at the same time in a safe manner.
Alternative implementations used when WC_PROTECT_ENCRYPTED_MEM is
defined.
2023-06-16 07:28:47 +10:00
JacobBarthelmeh
5b81dc47d2
adjust location used for writing to output buffer
2023-06-14 21:01:12 -07:00
JacobBarthelmeh
8f29111aac
fix for nightly toolchain armv7 build warning
2023-06-14 14:13:59 -06:00
Daniel Pouzzner
902d47aaa1
wolfcrypt/test/test.c: fix scoping of hkdf_test();
...
wolfcrypt/test/test.h: include <wolfssl/wolfcrypt/types.h> to be sure sword32 is available.
2023-06-14 15:06:13 -05:00
JacobBarthelmeh
0a860c793f
adjust test case to handle error of peer closing down
2023-06-14 12:21:52 -07:00
JacobBarthelmeh
9e0c13bbdb
sanity check on send fatal alert return
2023-06-14 11:08:56 -07:00
Daniel Pouzzner
bb5e09c394
wolfssl/wolfcrypt/settings.h: refactor ssize_t setup to be more flexible, with NO_WC_SSIZE_TYPE and WC_SSIZE_TYPE override options, and no use of autotools-style HAVE_SSIZE_T.
2023-06-14 12:28:50 -05:00
Daniel Pouzzner
e843a7bd1e
wolfcrypt/test/test.{c,h}: add wc_test_ret_t, and 'L' long int suffixes on relevant numeric literals, to facilitate passing around 32 bit retvals in the WC_TEST_RET_*() system on 16 bit targets.
2023-06-14 12:28:50 -05:00
Daniel Pouzzner
131b7c2bcf
wolfcrypt/src/chacha20_poly1305.c: refactor ssize_t uses in wc_XChaCha20Poly1305_crypt_oneshot() as long int, for portability.
2023-06-14 12:28:50 -05:00
Andras Fekete
76cf3d61a0
Calling 'nc' makes the server unresponsive
2023-06-14 09:54:23 -04:00
Andras Fekete
20df12e5f7
This should add a check to make sure the server is up before connecting
2023-06-14 09:20:06 -04:00
Sean Parkinson
82cc988226
Merge pull request #6495 from JacobBarthelmeh/build
...
update check for stdatomic header file
2023-06-14 14:00:04 +10:00
Sean Parkinson
cdb3d6df40
Merge pull request #6502 from JacobBarthelmeh/release
...
prepare for 5.6.3
2023-06-14 13:59:41 +10:00
Sean Parkinson
0db49ef83a
ECC, ALT_ECC_SIZE, CryptoCB: ensure err is 0 in _ecc_make_key_ex
...
When CryptoCB is used and the key gen operation is not implemented, err
is CRYPTOCB_UNAVAILABLE and needs to be reset to 0.
2023-06-14 10:12:04 +10:00
JacobBarthelmeh
72536e0e10
prepare for 5.6.3
2023-06-13 14:47:06 -06:00
David Garske
fe7502a50e
Fix for SP math all and ECC with compressed keys (missing sp_add_d). Reproduce using: ./configure --disable-rsa --disable-dh --enable-compkey --disable-pkcs12 && make.
2023-06-13 11:39:24 -07:00
Eric Blankenhorn
58c1c0c31b
Merge pull request #6499 from douzzer/20230612-windows-fixes
...
20230612-windows-fixes
2023-06-13 12:32:01 -05:00
Daniel Pouzzner
03a6eed037
wolfcrypt/src/{aes.c,blake2b.c,siphash.c}: fix W64LIT() arguments to not have improper 'U' suffix;
...
wolfssl/wolfcrypt/types.h: add 'U' suffix to W64LIT() macro defs, and add SW64LIT() macro defs (not yet used anywhere);
wolfcrypt/src/asn.c: add !WOLFSSL_ECC_CURVE_STATIC gate around DataToHexStringAlloc() to resolve -Wunused;
wolfcrypt/src/ecc.c: guard against zero-valued "len" arg to wc_ecc_get_curve_id_from_oid();
wolfcrypt/src/wc_port.c: fix several argument implicit sign changes in USE_WINDOWS_API paths;
wolfssl/wolfcrypt/ecc.h: remove const attribute from inline buffers in WOLFSSL_ECC_CURVE_STATIC struct ecc_set_type.
2023-06-12 23:15:08 -05:00
JacobBarthelmeh
47036d0166
update check for stdatomic header file
2023-06-12 13:48:24 -06:00
JacobBarthelmeh
9ffa9faecd
Merge pull request #6491 from ejohnstown/fix-imp-conv
...
Implicit Type Conversion Fix
2023-06-09 13:19:18 -06:00
John Safranek
7b0283fa04
Implicit Type Conversion Fix
...
1. Typecast the return of strlen() to int for the variable used.
2023-06-09 11:13:44 -07:00
John Safranek
a56070cd70
Merge pull request #6490 from JacobBarthelmeh/release
...
Prepare for release 5.6.2
2023-06-09 11:00:10 -07:00
JacobBarthelmeh
353a2926b6
add check for stdatomic.h
2023-06-09 09:52:01 -07:00
JacobBarthelmeh
032ac405db
prepare for release 5.6.2
2023-06-09 05:51:18 -07:00
JacobBarthelmeh
c59cc92379
Merge pull request #6488 from douzzer/20230608-linuxkm-__is_constexpr
...
20230608-linuxkm-__is_constexpr
2023-06-08 14:48:19 -06:00
Daniel Pouzzner
e35cb5bc3d
linuxkm/linuxkm_wc_port.h: override definition of __is_constexpr() from /usr/src/linux/include/linux/const.h with warning-free __builtin_constant_p().
2023-06-08 14:43:05 -05:00
John Safranek
3f1dd32f4e
Merge pull request #6487 from JacobBarthelmeh/fuzzing
...
sanity check on socket return value for timeout with DTLS13
2023-06-08 10:41:41 -07:00
JacobBarthelmeh
0d591f1111
Merge pull request #6485 from SparkiDev/coverity_api_c_fixes
...
Coverity fixes: api.c
2023-06-08 09:25:08 -06:00
Sean Parkinson
897a865090
Merge pull request #6477 from JacobBarthelmeh/stm32
...
add sanity check on hash size with STM32 port
2023-06-08 22:21:19 +10:00
Sean Parkinson
e5bb09f281
Coverity fixes: api.c
...
Fixes from coverity scan in the file api.c.
2023-06-08 22:18:05 +10:00
JacobBarthelmeh
938a48d9b1
sanity check on socket return value for timeout with DTLS13
2023-06-08 02:37:21 -06:00
Sean Parkinson
66d222adfc
Merge pull request #6484 from JacobBarthelmeh/cov
...
coverity scan fixes
2023-06-08 10:06:18 +10:00
JacobBarthelmeh
4a4a769512
check on allocation of new node before dereferencing
2023-06-07 15:20:23 -06:00
JacobBarthelmeh
84979900a7
avoid use after free in error case
2023-06-07 15:13:13 -06:00
JacobBarthelmeh
14990ad92d
set return bio to null after free on error
2023-06-07 15:05:52 -06:00
JacobBarthelmeh
fb5413cea0
account for null terminator with SEP serail number
2023-06-07 14:59:07 -06:00
JacobBarthelmeh
ebc62f8d17
clear extension string and avoid potential double free
2023-06-07 14:41:47 -06:00
JacobBarthelmeh
d796aa12fc
free up memory with othername object on error
2023-06-07 13:29:41 -06:00
JacobBarthelmeh
c399fba4ce
set ext pointer to null after free'ing it
2023-06-07 13:23:43 -06:00
Jacob Barthelmeh
327645ff2a
add additional STM32 ECC sanity check to sign
2023-06-07 10:26:40 -07:00
Jacob Barthelmeh
2a0b244393
add sanity check on hash size with STM32 port
2023-06-07 10:26:40 -07:00
JacobBarthelmeh
c040b4a339
Merge pull request #6478 from SparkiDev/kyber_fixes_1
...
Kyber: allow compilation with limited sizes with liboqs
2023-06-07 11:24:08 -06:00
JacobBarthelmeh
8583cc65fa
Merge pull request #6471 from SparkiDev/tests_api_expect_3
...
Test api.c: change more tests to use Expect instead of Assert
2023-06-07 11:22:23 -06:00
JacobBarthelmeh
1445a6a832
Merge pull request #6482 from SparkiDev/regression_fixes_7
...
Regression testing fixes
2023-06-07 11:18:36 -06:00
JacobBarthelmeh
2b054e223b
Merge pull request #6483 from SparkiDev/cppcheck_fixes_10
...
cppcheck: fixes from scan
2023-06-07 11:13:53 -06:00
Chris Conlon
0752a9e4f4
Merge pull request #6481 from miyazakh/fix_androidb_2
...
fix un-initialized var
2023-06-07 09:39:00 -06:00
Sean Parkinson
ed01b14356
cppcheck: fixes from scan
...
wolfssl_sce_unit_test.c:
sce_crypt_Sha_AesCbcGcm_multitest(): duplicate condition
ssl_asn1.c:
wolfSSL_i2t_ASN1_OBJECT(): done is not needed
MonthStr(): fix bounds check on i
woolfcrypt_test.c, test_main.c, wolfssl_tsip_unit_test.c, devices.c,
aes.c, des3.c:
Variable not used.
asn.c:
DecodeSubjKeyId(): sz is unsigned - check for less than zero does
nothing
kcapi_rsa.c:
KcapiRsa_Decrypt(): fix ret check by using else
KcapiRsa_Encrypt(): make same change for consistency
kcapi_hash.c:
KcapiHashFinal(): move ret into #ifdef where it is needed
stm32.c:
wc_Stm32_Hash_GetDigest(): i redeclared with different type - use ii
instead
bio.c, conf.c:
XFREE checks for NULL
Reduce scope of varialbes.
Condition same.
2023-06-07 17:27:51 +10:00
John Safranek
d67ce722ff
Merge pull request #6476 from kareem-wolfssl/dtlsBlankCert
...
Send blank certificate message in DTLS when no client cert is loaded.
2023-06-06 22:43:01 -07:00
Sean Parkinson
b07c5d7ce8
Regression testing fixes
...
Fix: ./configure --disable-shared --enable-smallstack --enable-all
CFLAGS=-DNO_ASN_TIME
Don't compile mp_test when compiling for SP Math All and RSA
verification only - very few functions available.
ssl.c:
wolfSSL_Rehandshake(): wolfSSL_UseSessionTicket only available when
not NO_WOLFSSL_CLIENT
api.c:
test_wolfSSL_ticket_keys(): meant to be tested on server
2023-06-07 14:26:45 +10:00
Sean Parkinson
e542e51d9f
Test api.c: change more tests to use Expect instead of Assert
...
bio.c:
wolfSSL_BIO_push(): handles NULL for top and append.
crl.c:
InitCRL_Entry(): set toBeSigned to NULL after freeing when allocation
fails.
AddCRL(): free CRL entry properly on error.
wolfSSL_X509_STORE_add_crl(): check for NULL after
wolfSSL_X509_crl_new call.
ssl.c:
wolfSSL_CertManagerGetCerts(): free the certificate if it didn't get
pushed onto stack
wolfSSL_RAND_Init(): returns success if global already initialized.
ssl_asn1.c: wolfSSL_ASN1_TYPE_set now avaiable when OPENSSL_EXTRA
defined for function wolfssl_dns_entry_othername_to_gn().
x509.c:
Added support for creating a valid General Name of type GEN_OTHERNAME.
Extracted some code out into wolfssl_x509_alt_names_to_gn().
wolfSSL_X509_set_ext(): free data correctly on errors
wolfSSL_X509_PUBKEY_set(): free str if DSA parameters cannot be
retrieved; wolfSSL_OBJ_nid2obj() called separately to handle when
returning NULL.
wolfSSL_X509_NAME_copy(): check for failure when
wolfSSL_X509_NAME_add_entry() is called.
x509_str.c:
wolfSSL_X509_STORE_CTX_new(): check for error from calling
wolfSSL_X509_STORE_CTX_init().
wolfSSL_X509_STORE_get0_objects(): don't double free x509; free memory
correctly on error
2023-06-07 14:10:42 +10:00
Hideki Miyazaki
5624df95b5
fix uninit var
2023-06-07 07:43:02 +09:00
JacobBarthelmeh
ee289fdf89
Merge pull request #6429 from embhorn/zd16184
...
Allow wolfSSL_RAND_Init to pass if already initialized
2023-06-06 16:23:42 -06:00
JacobBarthelmeh
8390ab5847
Merge pull request #6480 from lealem47/xcode
...
XCODE project: install all headers
2023-06-06 16:19:21 -06:00
Sean Parkinson
cac42db53c
Merge pull request #6468 from philljj/zd16236
...
Fix fastmath and heapmath invmod to be consistent with sp-math.
2023-06-07 07:47:41 +10:00
JacobBarthelmeh
f42d57df87
Merge pull request #6472 from kaleb-himes/ZD16185-Doc-Update-Request
...
Update error return(s) for wc_RsaPSS_Verify
2023-06-06 15:16:40 -06:00
Lealem Amedie
9bb2ae4884
XCODE project: install all headers
2023-06-06 13:34:22 -06:00
Daniel Pouzzner
3b48bc97ed
Merge pull request #6381 from SparkiDev/type_conversion_fixes_1
...
Fix type conversion warnings by gcc
2023-06-06 11:25:31 -05:00
Sean Parkinson
9ca9c2ba6f
Kyber: allow compilation with limited sizes with liboqs
2023-06-06 14:26:06 +10:00
Sean Parkinson
3230d27700
Merge pull request #6436 from lealem47/sanitizer
...
Miscellaneous fixes for sanitizer
2023-06-06 11:55:52 +10:00
Lealem Amedie
32976d379f
Fix formatting
2023-06-05 16:47:11 -06:00
Sean Parkinson
c0e2752000
Merge pull request #6475 from rizlik/fix_dtls_nogroups_nocerts
...
fix: add guards to compile w !HAVE_SUPPORTED_CURVES && NO_CERTS
2023-06-06 07:55:08 +10:00
Kareem
ebac138e77
Send blank certificate message in DTLS when no client cert is loaded.
2023-06-05 10:49:42 -07:00
Marco Oliverio
e53453a7ed
fix: add guards to compile w !HAVE_SUPPORTED_CURVES && NO_CERTS
...
This configuration can be used to build a static PSK only build
2023-06-05 16:13:11 +00:00
kaleb-himes
6d85d09b0b
Update error return(s) for wc_RsaPSS_Verify
2023-06-05 09:22:08 -06:00
Sean Parkinson
ccd404e13d
Merge pull request #6470 from douzzer/20230603-unittest-maybe-uninited
...
20230603-unittest-maybe-uninited
2023-06-05 08:11:52 +10:00
Daniel Pouzzner
6c4cc2a931
tests/api.c: fix a likely-spurious maybe-uninitialized from gcc-11 -m32 (all-sp-m32) in test_wolfSSL_PEM_PrivateKey().
2023-06-03 10:41:15 -05:00
jordan
db28d38ea3
Fix fastmath and heapmath invmod to be consistent with sp-math.
2023-06-02 22:11:44 -05:00
JacobBarthelmeh
37aada0313
Merge pull request #6465 from lealem47/zd162152
...
Read and assign err return val from _sp_mulmod_tmp
2023-06-02 11:45:27 -06:00
JacobBarthelmeh
3ee31dca6b
Merge pull request #6464 from douzzer/20230602-analyzer-guided-fixes
...
20230602-analyzer-guided-fixes
2023-06-02 11:31:26 -06:00
Lealem Amedie
eaf27b1945
Read and assign err return val from _sp_mulmod_tmp
2023-06-02 10:09:12 -06:00
Daniel Pouzzner
291be53524
tests/api.c: fixes for clang-diagnostic-embedded-directive (also warned by gcc), clang-analyzer-core.UndefinedBinaryOperatorResult, and clang-analyzer-deadcode.DeadStores.
2023-06-02 11:06:16 -05:00
JacobBarthelmeh
bb78e1c7d8
Merge pull request #6462 from douzzer/20230601-fix-fips-XASM_LINK
...
20230601-fix-fips-XASM_LINK
2023-06-01 14:00:01 -06:00
JacobBarthelmeh
35e59a3569
Merge pull request #6456 from SparkiDev/tests_api_expect_2
...
Test api.c: change more tests to use Expect instead of Assert
2023-06-01 10:29:52 -06:00
Daniel Pouzzner
a435302415
wolfssl/wolfcrypt/types.h: conditionalize XASM_LINK() definition on !FIPS_VERSION_LT(5,3) and !WOLFSSL_NO_ASM.
2023-06-01 11:12:27 -05:00
Chris Conlon
806c75d28b
Merge pull request #6450 from miyazakh/fix_jenkins_android
...
fix to cast diff type, int and uint
2023-06-01 08:33:02 -06:00
Sean Parkinson
7259351a3f
Test api.c: change more tests to use Expect instead of Assert
...
Added a new version of 'nofail' handshaking that doesn't use threads.
More tests can be run in single threaded.
Changed tests over to use test_wolfSSL_client_server_nofail() or
test_wolfSSL_client_server_nofail_memio() to simplfy test cases.
Changed tests to use Expect.
CRL:
BufferLoadCRL wasn't freeing allocated data when currentEntry
couldn't be allocated.
ssl.c:
DecodeToX509(): Needs to call FreeDecodedCert even if
ParseCertRelative fails.
wolfSSL_PEM_read_PUBKEY(): Need to check result of
wolfSSL_d2i_PUBKEY is NULL rather than the passed in WOLFSSL_EVP_PKEY.
X509:
wolfSSL_X509_set_ext(): Must free allocated WOLFSSL_X509_EXTENSION
if not pushed on to stack regardless of stack being NULL.
wolfSSL_X509V3_EXT_i2d(): Don't free asn1str on error as it is the
data passed in.
wolfSSL_i2d_X509_NAME_canon(): free names and cano_data when call to
wolfSSL_ASN1_STRING_canon() fails.
PKCS7:
wc_PKCS7_InitWithCert(): Check memory allocation of cert for NULL.
2023-06-01 14:22:00 +10:00
Sean Parkinson
b62e0b7ceb
Fix type conversion warnings by gcc
2023-06-01 14:21:41 +10:00
Sean Parkinson
5ffee2dbe1
Merge pull request #6459 from douzzer/20230531-analyzer-guided-fixes
...
20230531-analyzer-guided-fixes
2023-06-01 10:55:48 +10:00
Daniel Pouzzner
c45efd79af
api.c: fix 3 missed EXPECT_RESULT() == WOLFSSL_SUCCESSes to use the succincter EXPECT_SUCCESS().
2023-05-31 18:26:27 -05:00
JacobBarthelmeh
42a5d0320b
Merge pull request #6445 from jpbland1/dsa_ex
...
add ex functions to use other digest algorithms with DSA
2023-05-31 14:50:05 -06:00
Daniel Pouzzner
59a7c0d7e4
move definitions of XASM_LINK() from wolfcrypt/src/aes.c, wolfcrypt/src/asm.c, and wolfcrypt/src/cpuid.c, to wolfssl/wolfcrypt/types.h, and use __asm__() instead of asm() if __GNUC__, for compatibility with -std=c99.
2023-05-31 15:48:52 -05:00
Daniel Pouzzner
64c9026c77
wolfssl/wolfcrypt/types.h: add PRAGMA_DIAG_PUSH, PRAGMA(), and PRAGMA_DIAG_POP(), using the gcc or clang variants as applicable, to facilitate pragmas to be used on both gcc and clang;
...
tests/unit.h: fix ExpectPtr() to inhibit pedantic warnings on both gcc and clang;
wolfssl/test.h: in myVerify(), explicitly check for nullness when printing issuer/subject, to avoid cppcheck null-deref warning;
tests/api.c: fixes for:
* myriad "embedding a directive within macro arguments is not portable"
* an "ISO C forbids conversion of object pointer to function pointer type"
* some "stringop-overflow"s
* a clang-analyzer-core.uninitialized.Assign
* a clang-analyzer-core.CallAndMessage "2nd function call argument is an uninitialized value"
* a nullPointerRedundantCheck
* several clang-diagnostic-declaration-after-statement
* a spurious gcc sanitizer maybe-uninitialized in test_wolfSSL_CheckOCSPResponse()
2023-05-31 15:19:15 -05:00
Daniel Pouzzner
109a17f3bd
wolfcrypt/src/memory.c: restore required linuxkm #define WOLFSSL_NEED_LINUX_CURRENT
2023-05-31 15:17:01 -05:00
JacobBarthelmeh
80311975ce
Merge pull request #6452 from anhu/no_rsa_sigalgs
...
For NO_RSA, don't advertise support for RSA.
2023-05-31 13:41:56 -06:00
Lealem Amedie
88c3d9a529
More improvements for GCC-ARM FIPS build
2023-05-31 11:23:50 -06:00
Lealem Amedie
c2e03689c0
Improve GCC-ARM user-settings.h FIPS configurability
2023-05-31 09:53:51 -06:00
Hideki Miyazaki
554e6472b5
addressed review comments
2023-05-31 06:54:14 +09:00
JacobBarthelmeh
5604033902
Merge pull request #6453 from kaleb-himes/OE52_OE54_CHECKIN
...
Checkin STARCORE project OE52_OE54_ACVP effort
2023-05-30 14:43:25 -06:00
JacobBarthelmeh
ca2ca4f739
Merge pull request #6454 from philljj/spelling_cleanup
...
Used codespell and fixed obvious typos in src and wolfssl.
2023-05-30 14:42:04 -06:00
Chris Conlon
769c488d18
Merge pull request #6444 from night1rider/wolfssl-Onboarding
...
added test case for wolfSSL_configure_args
2023-05-30 13:03:05 -06:00
jordan
1bdd1cb157
Used codespell and fixed obvious typos in src and wolfssl.
2023-05-30 11:36:43 -05:00
kaleb-himes
f51d4c4c30
Checkin STARCORE project OE52_OE54_ACVP effort
2023-05-30 10:36:01 -06:00
Anthony Hu
ea6155c924
For NO_RSA, don't advertise support for RSA.
2023-05-30 12:34:23 -04:00
JacobBarthelmeh
dbca65f028
Merge pull request #6447 from SparkiDev/tests_api_expect
...
Tests api.c: rework for malloc failure testing
2023-05-30 09:19:54 -06:00
Hideki Miyazaki
63a5fe3229
fix to cast diff type, int and uint
2023-05-30 17:32:42 +09:00
Sean Parkinson
541ea51ad5
Tests api.c: rework for malloc failure testing
...
Modified number of tests to not crash on failure and cleanup allocations
on failure.
Added memory fail count option to set which memory allocation to start
failing on.
Fix issues found from testing.
bio.c:
BIO_new() move ref count up so that calls to wolfSSL_BIO_free()
work.
internal.c:
ImportCipherSpecState wasn't checking SetKeySide for failure. Crash
when pointer is NULL and accessed directly.
ocsp.c:
wolfSSL_OCSP_response_get1_basic() doesn't need to free vs->source
as it is freed in WOLFSSL_OCSP_RESPONSE_free().
ssl.c:
ProcessBuffer() Don't strip PKCS#8 header if failed to create DER.
Crasged as directly accessing 'der' which was NULL.
ssl_asn.c:
wolfssl_asn1_integer_require_len was checking wrong variable to see
if allocation failed.
x509,c:
wolfSSL_X509_ALGOR_set0 needs to set aobj only when no failure
possible.
wolfSSL_X509_chain_up_ref needs to call cleanup to ensure everything
is freed.
2023-05-30 12:01:21 +10:00
Sean Parkinson
37c03e3f11
Merge pull request #6442 from embedded-specialties/int-sequence
...
ASN.1 Integer sequence
2023-05-30 09:37:55 +10:00
David Garske
4f8419c641
Merge pull request #6441 from SparkiDev/cryptocb_pkcs11_rsa_get_size
...
CryptoCb, PKCS#11: add RSA key size lookup
2023-05-29 16:09:33 -07:00
Joe Hamman
d340587035
Added valid ASN.1 integer value to test_asn1
2023-05-28 21:18:45 -04:00
Joe Hamman
8fb4e7813b
Added braces to support older compilers
2023-05-28 18:59:16 -04:00
dell5060
c0116d6026
added test case for wolfSSL_configure_args and added fix
...
new fix
removing redundant () in code
2023-05-26 16:45:13 -06:00
JacobBarthelmeh
5a49b8c436
Merge pull request #6449 from anhu/syn_err
...
Fix a syntax error.
2023-05-26 15:55:36 -06:00
Anthony Hu
87bbcbb96a
Fix a syntax error.
...
Tested with:
./configure --enable-debug --enable-all CFLAGS=-DDEBUG_WOLFSSL_VERBOSE
2023-05-26 16:12:14 -04:00
JacobBarthelmeh
569a498015
Merge pull request #6443 from SparkiDev/wolfssl_x509_name_entry_leak_2
...
X509 NAME Entry: fix get object to not leak
2023-05-25 16:15:12 -06:00
John Bland
566fa1179f
add ex functions to use other digest algorithms
2023-05-25 12:50:23 -04:00
JacobBarthelmeh
a05f4f4dd9
Merge pull request #6432 from SparkiDev/wolfssl_x509_name_entry_leak
...
X509 NAME ENTRY create: ensure existing object is not lost
2023-05-25 09:28:45 -06:00
JacobBarthelmeh
6b2fe61d95
Merge pull request #6439 from lealem47/asio_cmake
...
CMake: add option to enable asio
2023-05-25 09:26:06 -06:00
Sean Parkinson
cff8e8e6f7
X509 NAME Entry: fix get object to not leak
...
wolfSSL_X509_NAME_ENTRY_get_object
- object field was being reused if it existed but lost on error
- store object only on success, ie object is not NULL
- moved function into x509.c
2023-05-25 09:26:22 +10:00
David Garske
e3be76b238
Merge pull request #6435 from SparkiDev/sp_int_count_bits_cleanup
...
SP int: cleanup sp_count_bits
2023-05-24 15:11:12 -07:00
Joe Hamman
2c59bec72c
Fixed typo in comment
2023-05-24 17:37:51 -04:00
Joe Hamman
8bd3850e58
Added ASN.1 Integer sequencing
2023-05-24 17:28:53 -04:00
Lealem Amedie
98522fa39d
Only clear last ASN_PEM_NO_HEADER error
2023-05-24 14:17:46 -06:00
JacobBarthelmeh
1218cfb7f2
Merge pull request #6087 from rizlik/embed_recv_from_fix_peer
...
dtls: improve different peer recvfrom and better error reporting on ipv6
2023-05-24 13:54:40 -06:00
Lealem Amedie
34c12789c9
CMake: add option to enable asio
2023-05-24 12:46:11 -06:00
JacobBarthelmeh
188a99bd5a
Merge pull request #6438 from anhu/ext_cache
...
Without HAVE_EXT_CACHE session dup is not compiled in
2023-05-24 11:15:00 -06:00
Anthony Hu
87a7af05dd
Without HAVE_EXT_CACHE session dup is not compiled in
2023-05-24 12:14:02 -04:00
Sean Parkinson
e954110cc5
CryptoCb, PKCS#11: add RSA key size lookup
...
wc_RsaEncryptSize(): assumed a key size of 2048 when using hardware key.
Added callback to do lookup and implemented for PKCS#11.
If lookup not supported then assumes 2048 bits.
2023-05-24 11:42:52 +10:00
Lealem Amedie
5613109fae
Miscellaneous fixes for sanitizer
2023-05-23 13:51:46 -06:00
David Garske
9d01411857
Merge pull request #6433 from SparkiDev/memusage_7
...
Memory usage: reduce stack usage
2023-05-22 16:35:04 -07:00
Sean Parkinson
622375b47e
SP int: clenaup sp_count_bits
...
More explicitly handle used == 0 for static code analyser.
Make sp_count_bits clearer.
2023-05-23 09:20:22 +10:00
TakayukiMatsuo
c2c97c2b57
Fix typos in Japanese help.
2023-05-23 07:11:53 +09:00
David Garske
5a59807733
Merge pull request #6431 from douzzer/20230521-wolfsentry-mt-usage-fixes
...
20230521-wolfsentry-mt-usage-fixes
2023-05-22 10:05:52 -07:00
Marco Oliverio
5182fe3f7d
wolfio: cleaning: use WOLFSSL_IP6 define instead of AF_INET6
2023-05-22 15:33:06 +00:00
Marco Oliverio
f21c34b08d
tests: EmbedRecvFrom/EmbedSendTo error if ipv6 w/o ipv6 compiled in
2023-05-22 15:33:06 +00:00
Marco Oliverio
640f9cf967
wolfio: EmbedRecvFrom: check ipv6 peer on non-ipv6 version
2023-05-22 15:33:05 +00:00
Marco Oliverio
b4542ed270
tests: add dtls ignoring different peer test
2023-05-22 15:32:57 +00:00
Marco Oliverio
73f502e189
wolfio: dtls: retry instead of returning WANT_READ on different peer
...
If EmbedReceiveFrom() returns WANT_READ, a blocking socket will not know how to
deal with the error. Retry the recvfrom instead adjusting the timeout.
2023-05-22 15:31:58 +00:00
Marco Oliverio
5f293bf736
tests: add test_wolfssl_client_server_no_fail(_ex) to set client cb
2023-05-22 15:31:58 +00:00
Marco Oliverio
cff580b4f0
tests: api: error out on read error in test_server_nofail
2023-05-22 15:31:58 +00:00
Sean Parkinson
98a717e1d5
Memory usage: reduce stack usage
...
AES C impl: don't align to 32 bytes, align to 16 as buffer is 16 bytes
long.
SP int: Don't call _sp_mulmod but call sp_mul and _sp_div to do mod
operation. For RSA, fewer calls for mod operation means less stack used
at deepest point.
2023-05-22 16:57:07 +10:00
Sean Parkinson
403acadf1a
X509 NAME ENTRY create: ensure existing object is not lost
...
wolfSSL_X509_NAME_ENTRY_create_by_txt and
wolfSSL_X509_NAME_ENTRY_create_by_NID:
- object field was being reused if it existed but lost on error
- extracted common code
- store object only on success, ie object is not NULL
2023-05-22 10:52:51 +10:00
Sean Parkinson
d8e4c78960
Merge pull request #6426 from jpbland1/invariant-mp-size
...
add check to sp_invmod_mont_ct to make sure the
2023-05-22 08:14:39 +10:00
Daniel Pouzzner
3e14b34bdc
wolfssl/test.h: in wolfsentry_setup(), add lock-unlock wrap before wolfsentry_route_get_main_table() (enforced by wolfSentry 1.3+, and was always required for thread safety).
2023-05-21 10:51:24 -05:00
Eric Blankenhorn
3e95ad9549
Allow wolfSSL_RAND_Init to pass if already initialized
2023-05-19 17:08:44 -05:00
JacobBarthelmeh
a06bd777c0
Merge pull request #6423 from cconlon/pkcs7NoStream
...
Fix PKCS#7 build with NO_PKCS7_STREAM
2023-05-19 10:32:49 -06:00
JacobBarthelmeh
235dc95b27
Merge pull request #6420 from julek-wolfssl/atomic-use-macro
...
Implement atomic operations interface
2023-05-19 10:29:04 -06:00
David Garske
8b9e13865a
Merge pull request #6383 from philljj/zd16072
...
Fix session ticket leak in wolfSSL_Cleanup
2023-05-19 09:14:07 -07:00
JacobBarthelmeh
8f4524efa0
Merge pull request #6298 from rizlik/dtls13-null-cipher
...
dtls13: support Authentication and Integrity-Only Cipher Suites
2023-05-19 10:13:44 -06:00
David Garske
10b6105505
Merge pull request #6424 from SparkiDev/coverity_2
...
Coverity scan fixes
2023-05-19 09:13:26 -07:00
John Bland
7e3aafb60c
Fix for FIPS ECC integrity check with crypto callback set ( #6425 )
...
Skip ECC private key check when the TPM is used to generate the key, since it doesn't release the private part. this option needs to be used with a FIPS approved TPM for the end result to be FIPS approved
2023-05-19 09:12:44 -07:00
John Bland
344c3338a9
add check to sp_invmod_mont_ct to make sure the
...
result integer can hold the range of the modulus
2023-05-19 10:49:42 -04:00
András Fekete
f3b66a3e26
Merge pull request #6427 from SparkiDev/scan-build_fixes_1
...
scan-build fixes
2023-05-19 10:46:00 -04:00
Marco Oliverio
35185e1a59
tests: add dtls13 null cipher test
2023-05-19 08:10:26 +00:00
Sean Parkinson
45503972f8
scan-build fixes
...
sp_mulmod
- scan-build getting confused with size of result
- don't check result size as checked already
- split out implementation of sp_mulmod from check
StoreEccKey
- ensure pubKey is not NULL even though all uses will not be
GetCertKey
- ensure source is not NULL
- cert->source may be NULL in incorrect usages of APIs
2023-05-19 12:17:41 +10:00
Sean Parkinson
2c34210efb
Coverity scan fixes
...
DecodeRsaPssParams() assumed params is never NULL. Should never be
called with NULL but check saves a NULL dereference.
PrintObjectIdText() didn't check return of call to GetObjectId. 'oid'
will retain -1 value on error and work as normal on error return.
Cleaner to check for ASN_PARSE_E and handle - other error,
ASN_UNKNOWN_OID_E, is OK for printing.
2023-05-19 09:15:16 +10:00
Chris Conlon
6ef580ca59
fix PKCS#7 build when using NO_PKCS7_STREAM
2023-05-18 14:50:03 -06:00
JacobBarthelmeh
a595f10549
Merge pull request #6421 from ejohnstown/bp-conf-desc-fix
...
Configure Typo
2023-05-18 14:07:58 -06:00
John Safranek
f9dcab956e
Configure Typo
...
1. The description text for the brainpool enable option in configure was
using a shell variable that ended up in the output. Switched to the
description pattern used in other options.
2023-05-18 10:51:04 -07:00
Juliusz Sosinowicz
466636214f
Add MSVC atomics
2023-05-18 12:06:54 +02:00
Marco Oliverio
31ed2a2bbb
dtls13: support Authentication and Integrity-Only Cipher Suites
...
See RFC 9150. To enable the feature use HAVE_NULL_CIPHER compilation flag.
2023-05-18 10:03:03 +00:00
Sean Parkinson
5f1ce09dce
Merge pull request #6412 from JacobBarthelmeh/tls13
...
add tls extension sanity check
2023-05-18 09:33:49 +10:00
David Garske
0530ee774f
Merge pull request #6418 from douzzer/20230517-linuxkm-benchmarks
...
20230517-linuxkm-benchmarks
2023-05-17 15:00:49 -07:00
oltolm
90b858492f
CMake: improve build scripts ( #6331 )
...
* make wolfssl compile with Mingw-w64
* cmake: CMAKE_SYSTEM_PROCESSOR is AMD64 on Windows
* cmake: use target_compile_definitions instead of add_definitions
* cmake: change default value of WOLFSSL_BUILD_OUT_OF_TREE_DEFAULT to ON
* cmake: link crypt32.lib on Windows
* cmake: export wolfssl
* move Config.cmake.in to cmake directory
* revert changes to .gitignore
* add Config.cmake.in to include.am
2023-05-17 15:26:46 -06:00
jordan
9d05a4f2ed
Don't orphan ticBuff pointer in wolfSSL_DupSessionEx
2023-05-17 16:25:27 -04:00
JacobBarthelmeh
2bb3ade4ac
Merge pull request #6416 from embhorn/gh6413
...
Fix valgrind issue with memcpy
2023-05-17 13:46:49 -06:00
JacobBarthelmeh
a5106ecda0
Merge pull request #6417 from kareem-wolfssl/docUpdates
...
Update AES and Chacha documentation.
2023-05-17 13:43:15 -06:00
Daniel Pouzzner
fffff657de
cleanups: line length, WOLFSSL_SMALL_STACK_STATIC, and SAVE_VECTOR_REGISTERS() failure trap in benchmark.c, proper path to benchmark.c in linuxkm/module_hooks.c, and proper casting in aes.c. also harmonized semantics and prototype of bench_ripemd().
2023-05-17 13:00:46 -05:00
Juliusz Sosinowicz
dd9edfee24
Implement atomic operations interface
2023-05-17 16:33:11 +02:00
Daniel Pouzzner
37b716192b
wolfcrypt/benchmark/benchmark.c: fix typo in bench_stats_start().
2023-05-17 02:27:04 -05:00
Daniel Pouzzner
4f4842fce6
linuxkm/linuxkm_memory.c: refactor SAVE/RESTORE_VECTOR_REGISTERS() to be per-process rather than per-CPU, and add migrate_disable/enable() to kernel_fpu_begin/end() because preempt_disable() is just a barrier on _PREEMPT_VOLUNTARY kernels;
...
linuxkm/linuxkm_wc_port.h: activate SAVE/RESTORE_VECTOR_REGISTERS() whenever defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS) for benchmark.c support, independent of vector crypto features;
fix and optimize various alignment issues with stack and heap allocations;
fix macro definitions for XMALLOC/XREALLOC/XFREE to correctly use kvmalloc and friends when defined(HAVE_KVMALLOC), and to use wolfSSL_Malloc() and friends when defined(WOLFSSL_TRACK_MEMORY);
purge stale LINUXKM_SIMD_IRQ code.
2023-05-17 01:44:36 -05:00
Daniel Pouzzner
fc589d664e
wolfssl/wolfcrypt/mem_track.h: refactor for linuxkm compatibility, mainly by supporting NO_STDIO_FILESYSTEM.
2023-05-17 01:13:36 -05:00
Daniel Pouzzner
cc1ec8ace5
wolfssl/wolfcrypt/types.h: add missing do-while-0 nonstatments to WC_FREE_VAR() and WC_FREE_ARRAY() for pedantic semicolon swallowing.
2023-05-17 01:11:01 -05:00
Daniel Pouzzner
a18dc7f10a
wolfcrypt/src/aes.c: in wc_AesSetKeyLocal(), add an alignment check in the haveAESNI path for WOLFSSL_LINUXKM, because the failure mode is module crash.
2023-05-17 01:07:47 -05:00
Daniel Pouzzner
40b598289f
src/ssl_asn1.c: in wolfssl_asn1_time_to_tm(), initialize localTm with memset, not the zero initializer, for C++ compatibility.
2023-05-17 01:06:17 -05:00
Daniel Pouzzner
85e0bf337b
fix for benign sign clash in wc_RNG_GenerateBlock().
2023-05-17 01:05:33 -05:00
Daniel Pouzzner
5aceae1d1c
src/internal.c: fix for typo (identicalInnerCondition) in DoClientHello().
2023-05-17 01:05:14 -05:00
Daniel Pouzzner
3ad7e39dc4
refactor benchmark.c for linux kernel compatibility -- WOLFSSL_SMALL_STACK and WOLFSSL_NO_FLOAT_FMT codepaths, SAVE/RESTORE_VECTOR_REGISTERS, refactor of several stack array initializations that broke in the kernel, and replacement of an fputs() call with printf().
2023-05-17 01:04:40 -05:00
Daniel Pouzzner
42cce9d8e5
add --enable-linuxkm-benchmarks; add check for async.{c,h} when --enable-asynccrypt; update failure message for the opensslextra AC_CHECK_HEADER() test.
2023-05-17 01:03:26 -05:00
Kareem
6cb2c84f12
Update AES documentation to clarify block size requirement. Fix parameter ordering in wc_ChaCha20Poly1305_Decrypt documentation.
2023-05-16 14:31:51 -07:00
Eric Blankenhorn
0a5a5a65a2
Fix valgrind issue with memcpy
2023-05-16 14:38:51 -05:00
JacobBarthelmeh
5194a296e0
Merge pull request #6414 from embhorn/zd16166
...
Documentation for wolfSSL_CertManagerFreeCRL
2023-05-16 10:08:51 -06:00
JacobBarthelmeh
53ef26bf3a
Merge pull request #6392 from rizlik/dtls13-fix-ch-epoch
...
DTLS v1.3: fix epoch 0 check on plaintext message
2023-05-16 10:07:14 -06:00
JacobBarthelmeh
ae37fee134
Merge pull request #6411 from lealem47/6397
...
Fixes for wolfcrypt test without ECC SECP
2023-05-16 09:59:55 -06:00
Eric Blankenhorn
494febb3fb
Documentation for wolfSSL_CertManagerFreeCRL
2023-05-16 09:44:00 -05:00
JacobBarthelmeh
00f1eddee4
add tls extension sanity check
2023-05-15 15:49:44 -07:00
Lealem Amedie
1c3fa38821
Fix for conflicting types for HAL timer
2023-05-15 14:12:53 -06:00
Lealem Amedie
3f795f2f47
Fixes for wolfcrypt test without ECC SECP
2023-05-15 14:12:24 -06:00
David Garske
c2a7397425
Merge pull request #6406 from JacobBarthelmeh/fuzzing
...
check for socket errors on SendAlert
2023-05-15 09:16:20 -07:00
JacobBarthelmeh
c17cff7265
Merge pull request #6403 from kareem-wolfssl/gh6387
...
Fix wolfssl_asn1_time_to_tm setting unexpected fields in tm struct.
2023-05-12 16:37:17 -06:00
Chris Conlon
a474179cdf
Merge pull request #6301 from miyazakh/ra_cryptonly
...
Add Renesas SCE RSA Crypt Only support
2023-05-12 16:32:15 -06:00
Kareem
f1ad37919d
Add test case for ASN1_TIME_to_tm fix.
2023-05-12 14:30:55 -07:00
JacobBarthelmeh
1b6ab01d0b
Merge pull request #6407 from dgarske/stm32_cleanup
...
Remove STM AES always true check
2023-05-12 13:54:24 -06:00
JacobBarthelmeh
9cca571c1d
Merge pull request #6399 from bigbrett/zd16083-ocsp-double-free
...
fix double free in InitOCSPRequest
2023-05-12 13:50:54 -06:00
David Garske
bebf4f6e8b
Merge pull request #6405 from julek-wolfssl/zephyr-misc
...
Small fixes to build wolfSSL on zephyr without warnings
2023-05-12 12:33:01 -07:00
lealem47
79a5c49e47
Skip Async_DevCtxInit when using init rsa/ecc label/id api's ( #6393 )
...
* Skip Async_DevCtxInit when using init rsa/ecc label/id api's
---------
Co-authored-by: Lealem Amedie <lealem47@github.com >
2023-05-12 11:54:03 -07:00
JacobBarthelmeh
ea40176bee
check for socket errors on SendAlert
2023-05-12 09:52:01 -07:00
JacobBarthelmeh
56cd8c3dc1
Merge pull request #6401 from anhu/doc_ptr_fix
...
Doc Fix: TI no longer maintains the documentation; we do.
2023-05-12 09:20:37 -06:00
Juliusz Sosinowicz
62db14e676
Small fixes to build wolfSSL without warnings
2023-05-12 13:24:21 +02:00
David Garske
a68b0d8ecf
Merge pull request #6402 from lealem47/no_ecc_secp
...
Don't test SECP vectors when disabled in test.c
2023-05-11 17:25:42 -07:00
Kareem
6930179b8e
Fix wolfssl_asn1_time_to_tm setting unexpected fields in tm struct.
2023-05-11 15:15:46 -07:00
Lealem Amedie
9a2dc120c4
Don't test SECP vectors when disabled in test.c
2023-05-11 14:21:39 -06:00
Anthony Hu
ced8198737
Doc Fix: TI no longer maintains the documentation; we do.
2023-05-11 15:23:35 -04:00
Brett Nicholas
46dce4b33f
set pointer to null after freeing in InitOcspRequest() to prevent a subsequent double-free in FreeOcspRequest()
2023-05-11 12:59:25 -06:00
David Garske
dbb5ee3b1e
Merge pull request #6389 from JacobBarthelmeh/devid
...
always call crypto cb when compiled in
2023-05-11 11:48:30 -07:00
David Garske
6a48539309
Merge pull request #6398 from douzzer/20230511-analyzer-carps
...
20230511-analyzer-carps
2023-05-11 11:47:23 -07:00
David Garske
dfbd61cad9
Remove always true check.
2023-05-11 11:38:12 -07:00
Daniel Pouzzner
3c06638115
wolfcrypt/src/aes.c: fixes for bugprone-macro-parentheses;
...
wolfcrypt/src/ecc.c: fix for nullPointerRedundantCheck ("possible null pointer dereference").
2023-05-11 11:51:27 -05:00
JacobBarthelmeh
07c41c5498
add macro guard on test case
2023-05-10 15:51:39 -07:00
JacobBarthelmeh
bab35c4de2
add WOLF_CRYPTO_CB_FIND macro to guard find device ID callback
2023-05-10 15:28:19 -07:00
David Garske
870f7cc95b
Merge pull request #6394 from douzzer/20230509-THIS_MODULE-mem-and-more-Wconversion
...
20230509-THIS_MODULE-mem-and-more-Wconversion
2023-05-10 10:19:25 -07:00
JacobBarthelmeh
04e831fa63
Merge pull request #6309 from SparkiDev/aes_cache_touch_lines
...
AES: touch each cache line when getting offset from table
2023-05-10 09:56:27 -06:00
JacobBarthelmeh
c953716367
Merge pull request #6391 from rizlik/dtls13-label-fix
...
dtls13: fix: use correct label to derive resumption key
2023-05-10 08:06:27 -06:00
JacobBarthelmeh
c26a5f7514
Merge pull request #6390 from lealem47/no_asn_time
...
Fix for compiling with NO_ASN_TIME + doc fix
2023-05-10 08:02:45 -06:00
Marco Oliverio
5773252e33
test: add check that CH with epoch != 0 are ignored
2023-05-10 13:54:25 +00:00
Marco Oliverio
6c8811a737
dtls13: fix: check plaintext record header epoch is 0
...
In DTLS v1.3 the normal (plaintext) record header can be used only with
unprotected message (epoch == 0). Protected messages use the unified header.
Check this invariant using `IsAtLeastTLSv1_3` instead of `ssl->options.tls1_3`
because the latter is false before version negotiation.
In DTLSv1.2 the DTLS normal header is used for all the epoch, this check doesn't
interfere because:
1. the first CH's epoch must be zero in all DTLS versions
2. In case of downgrade after version negotiation `IsAtLeastTLSv1_3` is false
2023-05-10 13:54:25 +00:00
Hideki Miyazaki
a2776ad35e
addressed review comments
2023-05-10 13:55:34 +09:00
Daniel Pouzzner
f2c97d5d35
fixes for various wolfcrypt -Wconversions visible only on compilers that promote byte and word16 to signed int, then warn of a sign conflict when an intrinsically safe result is assigned back to the original type.
2023-05-09 23:55:08 -05:00
Daniel Pouzzner
ec9beaab41
linuxkm: add coverage for Linux 6.4+ module memory layout refactor; also, refactor WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS to make it settable independent of WOLFSSL_AESNI etc.
2023-05-09 23:53:49 -05:00
Sean Parkinson
158c0362e7
Merge pull request #6372 from rizlik/send_alert_fix
...
tls13: correctly propagatae SendAlert err message
2023-05-10 10:25:15 +10:00
Lealem Amedie
03f5ce03ff
Remove inaccurate STM32 documentation
2023-05-09 13:28:20 -06:00
Lealem Amedie
86064f9a04
Fix for compiling with NO_ASN_TIME
2023-05-09 13:26:19 -06:00
JacobBarthelmeh
71ca447b6b
resolve CB_ONLY cases
2023-05-09 09:08:32 -07:00
Marco Oliverio
e9303a5e77
dtls13: fix: use dtls label to derive ExportKey/Resumption secrets
2023-05-09 10:04:29 +00:00
JacobBarthelmeh
cdeba4e1b0
Merge pull request #6364 from anhu/compat_unknown_oid
...
Allow for unknown OIDs in extensions in wolfSSL_X509_set_ext()
2023-05-08 14:51:35 -06:00
JacobBarthelmeh
11512c7e89
Merge pull request #6388 from philljj/zd16114
...
Fix memory leak in TLSX_KeyShare_Setup
2023-05-08 14:47:00 -06:00
JacobBarthelmeh
03a566791e
fix for recursive issue in test case
2023-05-08 12:51:22 -07:00
Anthony Hu
730db6a841
Address Jacob's comment
2023-05-08 14:47:22 -04:00
JacobBarthelmeh
71cbc019d7
always call crypto cb when compiled in
2023-05-08 09:49:50 -07:00
jordan
8c792b836c
Fix memory leak in TLSX_KeyShare_Setup
2023-05-08 10:46:33 -05:00
David Garske
62a4329f8e
Merge pull request #6379 from SparkiDev/sp_int_gcd_fix
...
SP int; fix sp_gcd error checking
2023-05-07 12:11:29 -07:00
jordan
979b92deb8
Fix session ticket leak in wolfSSL_Cleanup
2023-05-04 22:21:55 -05:00
Daniel Pouzzner
ae844b4a0f
Merge pull request #6378 from SparkiDev/minor_fixes_2
...
Minor fixes
2023-05-04 20:20:33 -05:00
Sean Parkinson
d342e341d8
SP int; fix sp_gcd error checking
...
r can be as large as the smaller of a and b.
Fix sign check.
Add comments as to what GCD does.
2023-05-05 09:11:47 +10:00
Sean Parkinson
55a91c2b55
Minor fixes
...
configure.ac: Don't use == in test.
client.c: Merge string to one line.
asn.c/asn_public.h:
fix conversion warnings/errors.
wc_Asn1_Print no longer public and doesn't need to check for NULL.
wc_Asn1_PrintAll check all pointer parameters for NULL.
2023-05-05 08:43:50 +10:00
David Garske
c3e4da9f66
Merge pull request #6376 from lealem47/freeRTOS_thread
...
Define WOLFSSL_THREAD for FREERTOS case
2023-05-04 14:53:24 -07:00
Lealem Amedie
0af4e8d10a
Define WOLFSSL_THREAD for FREERTOS case
2023-05-04 14:26:12 -06:00
David Garske
6e572cc91d
Merge pull request #6352 from SparkiDev/asn1_print
...
ASN.1 print utility: asn1
2023-05-04 10:55:47 -07:00
Marco Oliverio
75390937bc
tls13: correctly propagatae SendAlert err message
2023-05-04 16:30:50 +00:00
David Garske
4cdf32e497
Merge pull request #6333 from SparkiDev/memusage_6
...
Memory usage improvements
2023-05-04 09:14:24 -07:00
gojimmypi
82e502d8a2
WOLFSSL_SP_INT_NEGATIVE declaration for all Espressif chipsets ( #6374 )
...
* WOLFSSL_SP_INT_NEGATIVE declaration for all Espressif chipsets
* correct naming for WOLFSSL_SHA384 on ESP32-C3
2023-05-04 08:04:25 -07:00
Sean Parkinson
9b404fcc5b
AES touch cache lines
...
Change implementation to get from each line of a table once for each 4
variables.
Only enable WOLFSSL_AES_TOUCH_LINES, by default, when RISC-V.
2023-05-04 16:34:42 +10:00
Sean Parkinson
d2afe9e5e0
Memory usage improvements
...
ECC: make private key field 'k' able to be smaller when ALT_ECC_SIZE is
defined.
WOLFSSL_SMALL_STACK_CACHE: allocate temps using new macros.
2023-05-04 10:26:57 +10:00
Sean Parkinson
9cdee20a7d
ASN.1 print: implementation to parse and print added
...
New API to parse and print DER/BER data from a buffer.
Add an example to parse DER, Base64 and PEM files and print out ASN.1 items.
2023-05-04 09:57:44 +10:00
John Bland
6369b1e9ec
Merge pull request #6371 from dgarske/lowres
...
Fixes and improvements for building with low footprint
2023-05-03 19:33:53 -04:00
David Garske
714ec82e91
Merge pull request #6369 from rizlik/dh-async-fix
...
async fixes: dh and tests
2023-05-03 07:50:23 -07:00
JacobBarthelmeh
f05543c9e5
Merge pull request #6370 from SparkiDev/sp_int_copy_change
...
SP int: _sp_copy don't check a == b, change calls to _sp_copy
2023-05-03 08:30:55 -06:00
David Garske
4b90afa37b
Provide way to disable ASN but have wc_RsaPublicKeyDecodeRaw, which doesn't need ASN.1 parsing.
2023-05-02 18:10:25 -07:00
David Garske
61dfbf5ef2
Fixes and improvements for building with low footprint. Fix for ASN template with RSA verify only (was missing mp_leading_bit). Fix to allow disabling DRBG with crypto callbacks enabled. Updated the wolfTPM user_settings.h template with low resource option.
2023-05-02 16:51:41 -07:00
Sean Parkinson
1a8f09d013
Merge pull request #6320 from JacobBarthelmeh/curl
...
smaller sized build with curl
2023-05-03 07:46:29 +10:00
Sean Parkinson
c3a8476b95
SP int: _sp_copy don't check a == b, change calls to _sp_copy
...
Simplify code to make it easier for software analysers.
Reduce work done by using _sp_copy instead of sp_copy where possible.
2023-05-03 07:44:28 +10:00
JacobBarthelmeh
11a77f7078
Merge pull request #6363 from dgarske/threadlocal
...
Add option to support disabling thread local storage
2023-05-02 15:12:13 -06:00
JacobBarthelmeh
58b996353b
Merge pull request #6266 from dgarske/zd15938_async_ecc
...
Fix for async ECC shared secret state
2023-05-02 12:01:31 -06:00
Anthony Hu
0ebe5819d0
Allow for unknown OIDs in extensions in wolfSSL_X509_set_ext()
...
...and add some testing to show we properly inserted the extensions.
2023-05-02 12:43:14 -04:00
Marco Oliverio
a5a2316aa4
async: fix overwrite of keylen params between calls
...
The `kse->pubKeyLen` parameter is used as an input parameter to `DhGenKeyPair`
to provide the size of the `pubKey` buffer (the same size as the prime p). After
that, `kse->pubKeyLen` is used to check that the public key generated is of the
same length as the prime p. If this is not the case, the public key is
padded. If the key generation is asynchronous, then `TLSX_KeyShare_GenDhKey` may
be invoked twice. The second time, the `kse->pubKeyLen` value, updated
asynchronously by the async code, is overwritten with the prime size at the
beginning of the function. When this happens, a wrong public key value is used,
and the shared secret computed is incorrect.
Similar reasoning can be applied to `kse->keyLen`
2023-05-02 16:34:15 +00:00
Marco Oliverio
3e4b95eb4b
test: fix test AEAD limit server set fds as nonblock
2023-05-02 16:34:01 +00:00
JacobBarthelmeh
bdd45350c5
Merge pull request #6361 from bandi13/minorContainerUpdates
...
Minor container updates
2023-05-01 17:05:36 -06:00
David Garske
ceeda82906
Add option to support disabling thread local --disable-threadlocal. Useful for cross-compile situation where thread local storage is not desired. ZD 16062
2023-05-01 15:51:22 -07:00
JacobBarthelmeh
06d5897233
Merge pull request #6362 from dgarske/stm32_hash
...
Improved fix for STM32 hashing on U5
2023-05-01 16:30:57 -06:00
David Garske
72ffa743a0
Fix for async ECC shared secret. ZD 15938
2023-05-01 15:30:03 -07:00
JacobBarthelmeh
ef955c620f
refactor evp.c to group all MD digest functions togther
2023-05-01 13:23:48 -07:00
David Garske
7576380635
Improved fix for STM32 hashing on U5
2023-05-01 13:13:00 -07:00
JacobBarthelmeh
c84abaf5b6
Merge pull request #6357 from kareem-wolfssl/gh6348
...
Fix wc_PeekErrorNodeLineData not unlocking error queue on error.
2023-05-01 13:59:35 -06:00
JacobBarthelmeh
45c8796f7c
Merge pull request #6355 from bandi13/minorBugfix
...
Should only move the index by the amount we wrote
2023-05-01 13:56:22 -06:00
Andras Fekete
931f665a9a
Missing 'tcpdump' utility
2023-05-01 15:30:12 -04:00
Andras Fekete
00fa00f875
Changes to make it possible to use a different base container
2023-05-01 15:28:39 -04:00
JacobBarthelmeh
73b3f9c01a
Merge pull request #6356 from lealem47/init_values
...
Fix uninitialized variable compiler warning
2023-05-01 09:18:48 -06:00
Kareem
f6cdcfcf9f
Fix wc_PeekErrorNodeLineData not unlocking error queue on error.
2023-04-28 16:35:49 -07:00
Lealem Amedie
99b4ee50ba
Fix uninitialized variable compiler warning
2023-04-28 13:58:29 -06:00
Andras Fekete
1522155892
Should only move the index by the amount we wrote
2023-04-28 14:08:15 -04:00
David Garske
52a20fc2b5
Merge pull request #6328 from julek-wolfssl/zd/16000
...
Allow cert callback to override skipAddCA
2023-04-28 10:25:13 -07:00
Juliusz Sosinowicz
13f4e178e5
Zephyr misc fixes for TLS ( #6353 )
...
* zephyr wolfssl_tls_sock: fix project name
* zephyr tls_sock.c: don't include options.h when using user settings
* zephyr: define XSTAT_TYPE for use with XSTAT
2023-04-28 10:00:24 -07:00
JacobBarthelmeh
6b2aca1418
Merge pull request #6347 from SparkiDev/sp_int_armv6_clz
...
SP int ARMv6: clz not available, correct #if
2023-04-28 09:43:58 -06:00
Juliusz Sosinowicz
36ac816cd1
Merge pull request #6342 from TakayukiMatsuo/unittest
2023-04-28 10:06:04 +02:00
Sean Parkinson
f8559b745e
Merge pull request #6351 from douzzer/20230427-linuxkm-simd-fixes
...
20230427-linuxkm-simd-fixes
2023-04-28 11:20:20 +10:00
Sean Parkinson
e4bf1a7c0b
Merge pull request #6350 from kareem-wolfssl/zd15670
...
Fix PowerPC inline assembly on old GNU toolchain.
2023-04-28 11:19:42 +10:00
Daniel Pouzzner
448f1ec9e7
linuxkm: in {save,restore}_vector_registers_x86(), check if vector register file has already been saved and invalidated, and if so, inhibit the kernel_fpu_{begin,end}() wrap and instead just use preempt_{disable,enable}() wraps.
2023-04-27 17:48:32 -05:00
Daniel Pouzzner
8a89303b49
wolfcrypt/test/test.c: add TEST_FAIL() macro (counterpart to incumbent TEST_PASS()), by default same as incumbent functionality, but #ifdef TEST_ALWAYS_RUN_TO_END, print errors as they occur but continue to end.
2023-04-27 17:46:56 -05:00
Daniel Pouzzner
3f60fa8c3b
configure.ac: escape backslashes when generating preprocessor directives for .build_params; delete backslashes and process parenthesized arguments correctly when generating options.h.
2023-04-27 17:38:29 -05:00
Hideki Miyazaki
dcd1428b7d
Merge pull request #6304 from TakayukiMatsuo/jpupdate
...
Update Japanese comments
2023-04-28 07:06:38 +09:00
Kareem
1172354664
Fix PowerPC inline assembly on old GNU as. It does not like an empty clobbered register line, so simply omit the line.
2023-04-27 14:54:51 -07:00
JacobBarthelmeh
7b52913451
Merge pull request #6345 from kareem-wolfssl/zd16035
...
Fix getting key size in stm32_ecc_sign_hash_ex.
2023-04-27 13:32:47 -06:00
JacobBarthelmeh
bbad64649b
Merge pull request #6340 from SparkiDev/minor_fixes_1
...
Minor fixes
2023-04-27 10:02:06 -06:00
TakayukiMatsuo
59472312a5
Fix example code in wolfSSL_get_chain_X509
2023-04-27 17:51:10 +09:00
Juliusz Sosinowicz
bf2c66a1cb
Allow cert callback to override skipAddCA
2023-04-27 10:07:04 +02:00
TakayukiMatsuo
4c47934562
Fix issues in test_wolfSSL_dtls_fragments
2023-04-27 17:00:29 +09:00
Sean Parkinson
d901433999
SP int ARMv6: clz not available, correct #if
...
Checking for architecture less than 7 to use clz instruction when clz is
only guaranteed to be available in 7 or more. Reverse logic.
2023-04-27 09:41:31 +10:00
JacobBarthelmeh
ca4a17ebf6
Merge pull request #6339 from SparkiDev/asn_orig_ocsp_fix
...
ASN original, OCSP: fix maximum size calc to GetDateInfo
2023-04-26 16:36:55 -06:00
Kareem
e7e2713bba
Fix getting key size in stm32_ecc_sign_hash_ex.
2023-04-26 15:00:59 -07:00
JacobBarthelmeh
ccb9bdd903
set dev ID with signature check ( #6318 )
...
* set dev ID with signature check
* refactor devId use and add API to set devId in WOLFSSL_CERT_MANAGER structure
* add api.c call to set devid with WOLFSSL_CERT_MANAGER
* resolving devID CRL issue and CM pointer
* add device find callback
* add simple test case
2023-04-26 11:19:00 -07:00
David Garske
3556b7adb7
Merge pull request #6338 from JacobBarthelmeh/certs
...
revert WOLFSSL_NO_ASN_STRICT macro guard
2023-04-26 11:16:04 -07:00
David Garske
b42d3566ab
Merge pull request #6336 from lealem47/useAfterFree
...
Remove XMEMSET after XFREE in sniffer.c
2023-04-26 10:50:00 -07:00
JacobBarthelmeh
32c6a66a4e
Merge pull request #6341 from douzzer/20230425-analyzer-coddling
...
20230425-analyzer-coddling
2023-04-26 11:22:23 -06:00
Chris Conlon
4526df6d78
Merge pull request #6199 from JacobBarthelmeh/PKCS7
...
add messageDigest attribute if adding any custom signed attributes
2023-04-26 09:23:22 -06:00
TakayukiMatsuo
ead8d9784b
Update Japanese comments
2023-04-26 18:20:51 +09:00
Daniel Pouzzner
5538d65a79
wolfcrypt/src/asn.c: add to DecodeCertInternal() a workaround for an apparent clang-tidy bug, gated on WOLFSSL_CLANG_TIDY, and add a missing cast to mollify -Wconversion;
...
wolfssl/wolfcrypt/sp_int.h: refactor MP_INT_SIZEOF() using sizeof(sp_int_minimal) and addition, rather than sizeof(sp_int) and subtraction, for clarity and analyzer mollification.
2023-04-26 00:05:37 -05:00
Sean Parkinson
5b0c017a94
ASN original, OCSP: fix maximum size calc to GetDateInfo
...
GetDateInfo called with a local index (reset to 0) but size is of
original buffer. Subtract the index into original buffer from size to
get size available for parsing.
2023-04-26 11:18:29 +10:00
Sean Parkinson
a5a4c71121
Minor fixes
...
EncryptContent() - id not initialized
sp_int.c: cast count to int to ensure same type comparison with i.
2023-04-26 11:05:07 +10:00
Sean Parkinson
c4233e7aec
Merge pull request #6288 from JacobBarthelmeh/Testing
...
avoid callback buffer overwrite with sha512_224 and remove min from w…
2023-04-26 08:36:20 +10:00
Sean Parkinson
7fb9540176
Merge pull request #6337 from JacobBarthelmeh/fuzzing
...
add sanity check on PKCS7 index value
2023-04-26 08:33:25 +10:00
JacobBarthelmeh
5c97dfbb4c
Merge pull request #6334 from SparkiDev/openssl_ec_set_priv_key_check
...
OpenSSL EC API: fix setting private key
2023-04-25 16:32:53 -06:00
Sean Parkinson
2641c493b3
Merge pull request #6335 from JacobBarthelmeh/RT1170
...
add guard for random with CAAM + MQX
2023-04-26 08:32:20 +10:00
JacobBarthelmeh
71f71074f8
revert WOLFSSL_NO_ASN_STRICT macro guard
2023-04-25 13:32:19 -07:00
Jacob Barthelmeh
bbe9c694a6
more specific naming for attribute types
2023-04-25 13:56:29 -06:00
JacobBarthelmeh
d701a0a06e
add sanity check on PKCS7 index value
2023-04-25 08:30:33 -07:00
Lealem Amedie
84ea15039f
Remove XMEMSET after XFREE in sniffer.c
2023-04-25 09:16:39 -06:00
JacobBarthelmeh
57de292d19
add guard for random with CAAM + MQX
2023-04-24 16:29:22 -07:00
JacobBarthelmeh
3e5c8af571
Merge pull request #6322 from lealem47/remove_shellscript
...
Fix for CMake with USER_SETTINGS on Windows
2023-04-24 17:01:57 -06:00
JacobBarthelmeh
a991ce1a6b
Merge pull request #6327 from SparkiDev/memusage_5
...
Memory usage improvements
2023-04-24 16:42:56 -06:00
lealem47
a10526d5f9
Async sniffer: don't retry if seeing non-pending error ( #6220 )
...
* Async sniffer: don't retry if seeing non-pending error
* Print error messages when decrypting from queue
* Zeroize the SessionTable in ssl_FreeSniffer()
---------
Co-authored-by: Lealem Amedie <lealem47@github.com >
2023-04-24 13:51:55 -07:00
David Garske
9b7ca65608
Merge pull request #6330 from douzzer/20230421-configure-fixes
...
20230421-configure-fixes
2023-04-24 09:35:48 -07:00
JacobBarthelmeh
e1d1bef085
Merge pull request #6321 from SparkiDev/sp_int_missing_brace
...
SP int: missing brace
2023-04-24 10:00:39 -06:00
JacobBarthelmeh
cfeb8b9aee
Merge pull request #6332 from SparkiDev/bn_to_asn1_fix
...
BN_to_ASN1_INTEGER: fix handling of padding
2023-04-24 09:58:12 -06:00
Sean Parkinson
673d72a2dc
OpenSSL EC API: fix setting private key
...
wolfSSL_EC_KEY_set_private_key() should fail on obvious bad private key
values.
2023-04-24 17:59:32 +10:00
Sean Parkinson
2d06718857
Memory usage improvements
...
TLS 1.3 Server: don't cache the messages for Ed25519/Ed448 when doing
TLS 1.3.
ASN DecodeCertInternal: Call GetCertName for issuer and subject after
freeing the dataASN.
2023-04-24 11:12:00 +10:00
Sean Parkinson
6634ec198e
BN_to_ASN1_INTEGER: fix handling of padding
...
Incorrect calculation of when padding byte needed and consequently
adding byte manually when properly handled by SetASNInt().
2023-04-24 09:30:38 +10:00
Sean Parkinson
865581704e
Merge pull request #6312 from philljj/zd15961
...
Fix out-of-bounds write in fp_mod_2d.
2023-04-24 08:03:02 +10:00
Daniel Pouzzner
800f4df7a3
fix typos in configure.ac (from shellcheck --severity=warning).
2023-04-21 16:05:43 -05:00
Daniel Pouzzner
32ff165d8b
remove buggy+bug-prone WOLFSSL_NO_XOR_OPS setup in settings.h.
2023-04-21 16:05:20 -05:00
JacobBarthelmeh
60d059fc9e
Merge pull request #6305 from SparkiDev/sp_radix_size_stack_fix
...
SP int: sp_radix_size when radix 10 fix temp size
2023-04-21 09:59:56 -06:00
JacobBarthelmeh
e194c90b3e
Merge pull request #6326 from SparkiDev/ecc_key_max_bits_fix
...
ECC: max bits for a key must handle order as well
2023-04-21 09:47:42 -06:00
JacobBarthelmeh
12cec5ec61
Merge pull request #6325 from SparkiDev/memusage_fix_4
...
Memory Usage fixes
2023-04-21 09:37:11 -06:00
tmael
1106e5ff0e
TLS v1.3: Support a stateful ticket and test HAVE_EXT_CACHE ( #5960 )
...
* Add TLSv1.3 stateful support
Fix internal and external session cache
* session cache fixes
* Refactor
- implement wolfSSL_CTX_flush_sessions
- use wolfSSL_CTX_flush_sessions to make test_wolfSSL_CTX_add_session_ext deterministic
- add dtls to test_wolfSSL_CTX_add_session_ext
- DoClientTicket_ex does not modify ssl object
- only call session remove callback on:
- timeout
- session is being overwritten/removed from the cache
* Session fixes
- restore bogus ID on session duplicate
- don't evict on overwrite
- use memmove instead on memcpy as `ssl->session == session` is possible
- ignore ClientSession parameter in AddSessionToCache on NO_SESSION_CACHE_REF
- use sessionID when altSessionID not present
* Session fixes
- DoClientTicketFinalize: always copy in the ID as teh altSessionID
- don't overwrite ex_data when overwriting cacheSession and cacheSession owns it
* Callback wants to retain a copy
* wolfSSL_GetSessionClient: ssl->ctx->get_sess_cb does not apply here
* test_wolfSSL_CTX_add_session_ext
gate expected results on WOLFSSL_DTLS_NO_HVR_ON_RESUME
* TlsSessionIdIsValid: copy return can't be ignored
* Silence unused parameter
* test_wolfSSL_CTX_add_session_ext: handle async case
* Gate wolfSSL_SSL_CTX_remove_session on NO_SESSION_CACHE
* ssl.c: style fixes
* Add twcase_get_sessionCb_cleanup to free external cache
* Remove hard tab
* Correct build error in wolfSSL_CTX_flush_sessions
* Jenkins fixes:
- altSessionID only available with WOLFSSL_TICKET_HAVE_ID
- slim out psk_sess_free_cb_ctx
* Stateful dtls case has 2 accesses. Stateless just one.
* Add version numbering to hostap logs
* Import internal.h for test_wolfSSL_SESSION_get_ex_new_index
* wolfSSL_SetSession: don't check SslSessionCacheOff for session setting
* wolfSSL_SetSession: fully set expired session for OpenSSL compatibility
* wolfSSL_SetSession: check if setting same object
* AddSession: always populate the session object to allow re-use
* Add logging to wolfSSL_NewSession and wolfSSL_FreeSession
* Always setup session object
* Check if session has been setup before setting it
* Print errors in async test
* Make SetupSession available outside NO_SESSION_CACHE
* Review comments
* Fix ticBuf leak and TlsSessionIdIsValid logic
* Fix unmatched curly brackets
* TlsSessionIdIsValid: always need to check copy var
* TlsResumptionIsValid: set resume to FALSE default
* wolfSSL_SetSession: remove now variable since only used in one place
* Move internalCacheLookupOff into HAVE_EXT_CACHE block
---------
Co-authored-by: Juliusz Sosinowicz <juliusz@wolfssl.com >
2023-04-21 06:46:08 -07:00
Sean Parkinson
9230d9cfe3
Merge pull request #6185 from lealem47/time_check
...
Adding NO_ASN_TIME_CHECK build option
2023-04-21 11:55:52 +10:00
Sean Parkinson
0cc50521b6
ECC: max bits for a key must handle order as well
...
The order may be 1 bit larger than prime for some curves.
Handle this in calculation of maximum size of curve.
SP int _sp_mont_red(): ensure m->used is never 0 when doing default
implementaion.
2023-04-21 11:23:47 +10:00
Sean Parkinson
d414ae9492
Memory Usage fixes
...
Ed25519CheckPubKey/Ed448CheckPubKey: get the public key from certificate
in a new function, wc_CertGetPubKey, that uses less memory.
Set the ENCRYPT_BASE_BITS to minimal values when Curve448/Curve25519 are
the largest public key algorithms.
2023-04-21 09:59:38 +10:00
Sean Parkinson
0bae919a9c
SP int: ensure declaration of sp_ints are with valid values
...
Move declaration of sp_ints until after checks of valid parameters.
In particular, whether used field of input/s are valid.
Pull implementations of algorithms out into separate functions as a
pattern to fix.
2023-04-21 08:48:38 +10:00
Sean Parkinson
8994aab0ed
SP int: sp_radix_size when radix 10 fix temp size
...
SP int should be able to calculate size of encoded number for a radix of
10 when mp_int has all digits used.
sp_radix_size declared a temporary mp_int of 1 greater than input. Don't
need it 1 greater. Stack declaration of maximum plus one caused address
sanitizer error.
Changed temporary mp_int to be same size as input mp_int.
2023-04-21 08:46:46 +10:00
Lealem Amedie
42be04f323
Remove duplicate line
2023-04-20 16:45:53 -06:00
Lealem Amedie
a963adc33d
Add more comments for alternatives and security risk
2023-04-20 14:36:22 -06:00
Lealem Amedie
b0c6a3ec75
Adding NO_ASN_TIME_CHECK build option
2023-04-20 14:16:00 -06:00
JacobBarthelmeh
d099fe34b5
Merge pull request #6324 from SparkiDev/sp_int_thumb_asm_r7
...
SP int: ARM Thumb ASM don't use r7 on debug
2023-04-20 10:51:19 -06:00
JacobBarthelmeh
ebff7f46b7
Merge pull request #6323 from SparkiDev/sp_c_to_bin_mp_fix
...
SP C: fix handling of oversized arrays
2023-04-20 09:24:06 -06:00
David Garske
c761f587f6
Merge pull request #6278 from julek-wolfssl/fix-zephyr
...
Zephyr port update
2023-04-20 06:48:02 -07:00
Hideki Miyazaki
4fd629d4e7
fix white spaces and overlong lines
2023-04-20 16:07:51 +09:00
Sean Parkinson
1d94521abe
SP int: ARM Thumb ASM don't use r7 on debug
...
When DEBUG is defined, use versions of assembly code that don't use
register r7.
2023-04-20 15:13:54 +10:00
Sean Parkinson
574d8c3f63
Merge pull request #6319 from douzzer/20230418-more-Wconversion-fixes
...
20230418-more-Wconversion-fixes
2023-04-20 13:19:07 +10:00
Sean Parkinson
32e2775d34
SP C: fix handling of oversized arrays
...
For mul and sqr implementation efficiency the fixed array has extra
digits beyond what is needed. When encoding, only put in the useful
digits.
2023-04-20 12:42:51 +10:00
Daniel Pouzzner
da9cda7eae
wolfcrypt/src/pkcs12.c: fix non-portable casts;
...
wolfcrypt/src/sp_int.c: use unsigned int, not word32, for sign variables, to match type in header file.
2023-04-19 21:22:34 -05:00
Lealem Amedie
fa914a0054
Let hashbang decide which shell to run with instead of default shell
2023-04-19 18:13:57 -06:00
Lealem Amedie
cc8b789545
Remove shellscript dependency from CMake with WOLFSSL_USER_SETTINGS
2023-04-19 17:20:33 -06:00
Sean Parkinson
4ec23571c6
SP int: missing brace
...
Missing a brace in sp_exptmod_ex().
2023-04-20 08:27:44 +10:00
Daniel Pouzzner
2a00b67056
revert change in wc_ShaFinal() capturing InitSha() retval, introduced in 510038022f, to (void)ed result.
2023-04-19 17:25:33 -05:00
JacobBarthelmeh
dc8f348bdf
smaller sized build with curl
2023-04-19 15:12:15 -07:00
Daniel Pouzzner
8f610bb156
fix for retval overwrite (warned by clang-analyzer-deadcode.DeadStores) in sha.c:wc_ShaFinal();
...
fix for benign clang-analyzer-deadcode.DeadStores in aes.c:wc_AesFeedbackEncrypt();
fix for cppcheck:selfAssignment in chacha.c:wc_Chacha_wordtobyte().
2023-04-19 15:53:48 -05:00
Daniel Pouzzner
f396989d20
more -Wconversion fixes, now covering everything inside the 140-3 boundary with default build options, everything in wolfcrypt with default build options, all modes of AES, builds with/without intelasm, all permutations of c89/c99 32/64 bit, and much of the crypto-all-cryptonly boundary;
...
also a gating fix for asn.c:SetShortInt().
2023-04-19 15:26:05 -05:00
JacobBarthelmeh
3865f943c3
Merge pull request #6203 from julek-wolfssl/xor-optim
...
Try to XOR as many words as possible in xorbuf APIs
2023-04-19 11:59:33 -06:00
JacobBarthelmeh
0e64972c86
Merge pull request #6316 from SparkiDev/memusage_fix_3
...
ASN.1 template: CheckCertSignature memory usage fix
2023-04-19 10:37:11 -06:00
JacobBarthelmeh
0186fb7114
Merge pull request #6313 from anhu/empty_stack
...
Should not be an error to call wolfSSL_X509_REQ_add_extensions with...
2023-04-19 10:32:06 -06:00
Juliusz Sosinowicz
c9d91c5e79
Zephyr port update
...
- Add CONFIG_PTHREAD_IPC when using threads
- Add logging config suggestions
- test.c: fix undefined `ret` error
- Increase stack size for samples
- Ignore ASN_BEFORE_DATE_E in examples
- wc_port.h: add missing posix thread includes
- wc_port.h: move definitions to relevant section
- benchmark.c: fix missing `arc` and `argv` errors
- benchmark.c: fflush does not work on stdout in Zephyr
- Update z_fs_open implementation to support flags
2023-04-19 18:18:00 +02:00
Juliusz Sosinowicz
81c9062973
sakke.c: use xorbuf
2023-04-19 17:06:25 +02:00
Juliusz Sosinowicz
bed99401a0
hpke.c: use xorbufout in wc_HpkeContextComputeNonce
2023-04-19 17:06:25 +02:00
Juliusz Sosinowicz
3c57228197
aes.c: Use xorbufout when possible
2023-04-19 17:06:25 +02:00
Juliusz Sosinowicz
6079b92e26
xorbuf: fix alignment when possible
2023-04-19 17:06:25 +02:00
Juliusz Sosinowicz
82e8eb2f70
rsa.c: Use xorbuf when possible
2023-04-19 17:06:25 +02:00
Juliusz Sosinowicz
e7ae64d9b5
pkcs12.c: Ignore param when heap not used
2023-04-19 17:05:03 +02:00
Juliusz Sosinowicz
7a0d6487b7
Simplify ctMaskCopy
2023-04-19 17:05:03 +02:00
Juliusz Sosinowicz
b91f3063ea
Use xorbuf in 3des for FREESCALE_MMCAU
2023-04-19 17:05:03 +02:00
Juliusz Sosinowicz
aeb4338085
Use xorbufout in chacha
2023-04-19 17:05:03 +02:00
Juliusz Sosinowicz
8fe321d5be
Try to XOR as many words as possible in xorbuf APIs
2023-04-19 17:05:03 +02:00
Chris Conlon
81ab16b105
Merge pull request #6314 from TakayukiMatsuo/vla2
2023-04-19 08:11:40 -06:00
gojimmypi
510038022f
Various Espressif HW crypto, SHA2, AES, MP updates. ( #6287 )
...
* various Espressif HW crypto, SHA2, AES, MP updates.
* code review updates & cleanup
* clean trailing whitespace
* cleanup per code review
* removed additional unused WOLFSSL_USE_ESP32C3_CRYPT_HASH_HW
* Code review updates; pack & order WC_ESP32SHA
* clean up TAG text for Espressif ESP_LOG()
2023-04-19 06:10:22 -07:00
Sean Parkinson
436c647acc
Memory Usage: reduce maximum in use
...
CheckCertSignature
Free the dataASN before calling ConfirmSignature.
dataASN not needed at this point and ConfirmSignature uses lots of
memory.
DecodeCertInternal:
Free the dataASN before calling DecodeCertExtensions,
dataASN not needed at this point and DecodeCertExtensions uses more
memory.
ecc_verify_hash:
v doesn't need to be a new allocated variable - reuse w.
v is the modular reduction of x-ordinate to prime calculated at end.
2023-04-19 16:44:34 +10:00
David Garske
70322f620d
Merge pull request #6303 from douzzer/20230414-yet-more-c89
...
20230414-yet-more-c89
2023-04-18 16:00:12 -07:00
David Garske
3a2bcf080b
Merge pull request #6276 from anhu/zephyr_stm32
...
Add in instructions for compiling with zephyr on STM32.
2023-04-18 14:50:53 -07:00
David Garske
243665fe37
Merge pull request #6315 from anhu/stm32_gpdma
...
Instructions for GPDMA configuration
2023-04-18 14:50:25 -07:00
JacobBarthelmeh
c67de7f914
Merge pull request #6308 from SparkiDev/sp_mod_err_check
...
SP int: sp_mod check sp_div error before adding and replacing error
2023-04-18 15:44:50 -06:00
JacobBarthelmeh
8b79248eab
Merge pull request #6307 from SparkiDev/decode_ecdsa_sig_inited
...
ECC, ASN.1: DecodeECC_DSA_Sig didn't handle r and s being initialized
2023-04-18 15:43:42 -06:00
JacobBarthelmeh
a525fa19f4
Merge pull request #6306 from SparkiDev/wc_ecc_is_point_check_args
...
ECC: wc_ecc_is_point - validate parameters
2023-04-18 15:37:22 -06:00
Anthony Hu
d59724a0f3
Instructions for GPDMA configuration
2023-04-18 16:52:57 -04:00
Anthony Hu
b3b26dd266
Add in instructions for compiling with zephyr on STM32.
2023-04-18 16:19:32 -04:00
Daniel Pouzzner
fe3099b08e
wolfssl/wolfcrypt/settings.h: add #ifdef _MSC_VER clause to define ssize_t, #ifndef HAVE_SSIZE_T.
2023-04-18 14:43:41 -05:00
TakayukiMatsuo
cc747f0094
Add WOLFSSL_SP_NO_DYN_STACK macro to avoid compilation error in CC-RX compiler
2023-04-19 04:39:49 +09:00
Daniel Pouzzner
f1a674eec9
wolfcrypt/src/wc_port.c: in wc_FileLoad(), use ssize_t for fileSz, not long int, for portability.
2023-04-18 14:30:38 -05:00
Daniel Pouzzner
b87c2fc621
fix null pointer deref (found by cppcheck:nullPointerRedundantCheck) in src/x509.c:wolfSSL_X509_EXTENSION_create_by_OBJ().
2023-04-18 14:29:13 -05:00
Daniel Pouzzner
4180a650c8
fix clang-analyzer-deadcode.DeadStores in wolfcrypt/src/asn.c:SetOthername().
2023-04-18 14:27:52 -05:00
Daniel Pouzzner
a4aef0e55d
refinements from peer review for #6303 .
2023-04-18 12:23:24 -05:00
Daniel Pouzzner
193919a276
add wc_strcasecmp() and wc_strncasecmp() to wc_port.c, and set up (USE_WOLF_STR[N]CASECMP) in types.h for targets lacking native implementations (including WOLF_C89);
...
define USE_WOLF_STRSEP if defined(WOLF_C89).
2023-04-18 12:23:24 -05:00
Daniel Pouzzner
4b9302cdb3
another batch of -Wconversion fixes.
2023-04-18 12:23:24 -05:00
Daniel Pouzzner
42bea705d9
fix several more C89 "comma at end of enumerator list" spots in 64-bit-only headers, missed in earlier passes; in tests/unit.h, add a WOLF_C89 definition of AssertPtr() without pragmas, to avoid a -Wdeclaration-after-statement.
2023-04-18 12:23:24 -05:00
Daniel Pouzzner
730890b8cc
wolfssl/wolfcrypt/sp_int.h: fix a missed bugprone-macro-parentheses in the C89 path.
2023-04-18 12:23:24 -05:00
Daniel Pouzzner
d91f0f82d8
wolfssl/wolfcrypt/misc.h: add missing argument names in NO_INLINE path.
2023-04-18 12:23:24 -05:00
Daniel Pouzzner
3d16ec8dc1
wolfssl/wolfcrypt/asn_public.h: fix version threshold for wc_RsaPrivateKeyValidate() prototype.
2023-04-18 12:23:24 -05:00
gojimmypi
98b718f91b
wolfcrypt polish: init, checks, corrections ( #6249 )
...
* wolfcrypt polish: init, checks, corrections
2023-04-18 09:41:42 -07:00
Anthony Hu
b0e90b6ffe
Should not be an error to call wolfSSL_X509_REQ_add_extensions with empty stack.
2023-04-18 12:27:54 -04:00
András Fekete
f7d7e4f30a
Merge pull request #6285 from gojimmypi/Espressif_VisualGDB
...
platform-specific VisualGDB test & benchmark projects
2023-04-18 11:52:29 -04:00
jordan
8254112c9b
Fix out-of-bounds write in fp_mod_2d.
2023-04-18 10:51:38 -05:00
JacobBarthelmeh
ca71907142
add function to control default pkcs7 signer attributes
2023-04-18 08:35:02 -07:00
Jacob Barthelmeh
ad13717644
add messageDigest attribute if adding any custom signed attributes
2023-04-18 08:35:02 -07:00
JacobBarthelmeh
ff13a7cdc8
Merge pull request #6250 from julek-wolfssl/fix-wolfSSL_DES_ede3_cbc_encrypt
...
Write next IV in wolfSSL_DES_ede3_cbc_encrypt
2023-04-18 09:33:10 -06:00
Sean Parkinson
a5c220d034
AES: touch each cache line when getting offset from table
2023-04-18 12:46:56 +10:00
Sean Parkinson
59c113d358
SP int: sp_mod check sp_div error before adding and replacing error
...
Fix to not overwrite error when sp_div fails in sp_mod.
2023-04-18 09:38:13 +10:00
Sean Parkinson
eddcf0c0ee
ECC, ASN.1: DecodeECC_DSA_Sig didn't handle r and s being initialized
...
New creation of mp_ints r and s to be minimal size must not be
re-initialized.
Changes to ASN.1 code to handle r and s being initialized and to not
initialize again.
2023-04-18 09:37:23 +10:00
Sean Parkinson
04ae676629
ECC: wc_ecc_is_point - validate parameters
...
Public API wc_ecc_is_point() needs to validate the parameters.
Ensure that the x and y are in range [0, p-1] and z is one (affine
ordinates).
Made the API a wrapper around existing calculation code.
When x-ordinate is a large negative, then it will spend large amounts of
time adding the prime to a large negative intermediate value.
2023-04-18 09:35:22 +10:00
JacobBarthelmeh
42b73ee326
Merge pull request #6277 from anhu/upnsid
...
Support UPN and SID.
2023-04-17 17:03:55 -06:00
Anthony Hu
120d1f0d1a
Support in the compatibility layer for UPN and SID.
2023-04-17 14:42:27 -04:00
David Garske
91a2c9f18e
Merge pull request #6310 from julek-wolfssl/hostap-certs-update-2023
...
hostap/hwsim: use a custom commit to update the expired certs
2023-04-17 11:36:59 -07:00
Juliusz Sosinowicz
aa47a38a9e
hostap/hwsim: use a custom commit to update the expired certs
...
- use 'theirs' merge strategy
2023-04-17 18:43:47 +02:00
David Garske
5938a40def
Merge pull request #6297 from JacobBarthelmeh/math
...
clean up NO_BIG_INT build, removing WOLFSSL_SP_MATH macro and heapmath compile
2023-04-17 07:44:20 -07:00
JacobBarthelmeh
ec78d1a4b8
Merge pull request #6293 from tim-weller-wolfssl/mynewt-updates
...
Update wolfCrypt porting layer for Mynewt OS to remove build warning.
2023-04-17 08:07:39 -06:00
Sean Parkinson
50e15dbb36
Merge pull request #6283 from cconlon/tls13resume12
...
In SendTls13ClientHello() only send Session ID for sessions being resumed (< TLS 1.3)
2023-04-17 12:21:11 +10:00
David Garske
6b12831dfb
Merge pull request #6302 from douzzer/20230413-more-wolfcrypt-c89
...
20230413-more-wolfcrypt-c89
2023-04-14 14:08:03 -07:00
Jacob Barthelmeh
cb9a121bd7
fix configure, compatibility layer needed big int. for BN use
2023-04-14 14:52:05 -06:00
Daniel Pouzzner
1bed740710
address peer review: make C89-compatible refactors in sakke_pairing() and sakke_modexp_loop(); add explanatory comment for WOLF_ENUM_DUMMY_LAST_ELEMENT() in types.h.
2023-04-14 15:07:05 -05:00
Eric Blankenhorn
39b81ce338
Merge pull request #6282 from dgarske/fix_heapmath
...
Fix for including integer.h when heap math is not used
2023-04-14 14:28:38 -05:00
Daniel Pouzzner
ac85cfa3d5
fix "comma at end of enumerator list" warnings in wolfcrypt for C89 compatibility, mostly by just snipping out unneeded comma, but several using WOLF_ENUM_DUMMY_LAST_ELEMENT() to preserve gated enum values as-is.
2023-04-14 13:48:03 -05:00
Daniel Pouzzner
2bcf6bd3ca
wolfssl/wolfcrypt/types.h: add WOLF_ENUM_DUMMY_LAST_ELEMENT() macro, and disable HAVE_ANONYMOUS_INLINE_AGGREGATES ifdef WOLF_C89.
2023-04-14 13:47:47 -05:00
Daniel Pouzzner
d5588af0a2
wolfcrypt/src/sakke.c: fixes for C89 "initializer element is not computable at load time".
2023-04-14 13:29:26 -05:00
Daniel Pouzzner
105714460c
wolfcrypt/src/fe_448.c: fix declaration-after-statement in fe448_mul_8().
2023-04-14 13:29:26 -05:00
Daniel Pouzzner
edf95dbcbd
add WOLF_C89 clauses to the W64LIT() definitions in wolfssl/wolfcrypt/types.h, and wrap several long long numeric literals with W64LIT() in wolfcrypt/src/{aes.c,blake2b.c,siphash.c};
...
add WOLF_C89 handling to SP_ULONG_BITS and SP_ULLONG_BITS setup in wolfssl/wolfcrypt/sp_int.h.
2023-04-14 13:29:26 -05:00
David Garske
bc3d070629
Merge pull request #6290 from embhorn/zd15969
...
Allow Micrium to use STM32_RNG
2023-04-14 10:59:50 -07:00
David Garske
deae28b9a3
Fix for building with heap math and including integer.h only. Fixes https://github.com/wolfSSL/wolfssl/issues/6280
...
```
./configure --enable-heapmath CFLAGS="-DWOLFSSL_PUBLIC_MP" && make && sudo make install
cd ../wolfssl-examples/ecc
make clean && make
```
2023-04-14 10:37:40 -07:00
JacobBarthelmeh
36a9b9944c
fix guard on ECC export
2023-04-13 16:12:08 -07:00
JacobBarthelmeh
00aa061d77
Merge pull request #6300 from douzzer/20230413-fixes
...
20230413-fixes
2023-04-13 15:41:51 -06:00
Hideki Miyazaki
35f6099d7c
Add SCE RSA Crypt Only feature
...
- RSA SSA 1024/2048 Sign/verify
- RSA ES 1024/2048 Enc/Dec
- Unit test for these RSA operation
2023-04-14 06:41:24 +09:00
JacobBarthelmeh
04ee247389
do not default to heapmath if no other math libraries found, add NO_BIG_INT as a math option in settings.h
2023-04-13 14:38:35 -07:00
David Garske
6040a6b5da
Merge pull request #6299 from JacobBarthelmeh/build
...
fix for wpas build with x509 small
2023-04-13 13:54:50 -07:00
Daniel Pouzzner
358af4ef05
fix for cppcheck/zerodivcond in wolfcrypt/src/pkcs7.c:wc_PKCS7_DecodeAuthEnvelopedData();
...
fixes for clang-tidy/bugprone-macro-parentheses in wolfssl/wolfcrypt/sp_int.{c,h} and wolfcrypt/src/ecc.c;
fix for clang-analyzer-deadcode.DeadStores in olfcrypt/src/asn.c.
2023-04-13 14:51:29 -05:00
David Garske
2307b36a65
Merge pull request #6296 from JacobBarthelmeh/RT1170
...
fix for creating options.h with cmake and WOLFSSL_USER_SETTINGS
2023-04-13 11:24:53 -07:00
JacobBarthelmeh
9a0934161d
fix for wpas build with x509 small
2023-04-13 10:38:12 -07:00
David Garske
419a1f0a01
Merge pull request #6294 from douzzer/20230412-WC_ASN_NAME_MAX-bump-for-MULTI_ATTRIB
...
20230412-WC_ASN_NAME_MAX-bump-for-MULTI_ATTRIB
2023-04-12 16:21:33 -07:00
JacobBarthelmeh
441b78e5a2
Merge pull request #6284 from douzzer/20230410-Wconversion-fixes
...
20230410-Wconversion-fixes
2023-04-12 17:07:24 -06:00
JacobBarthelmeh
d4b92cb65c
Merge pull request #6295 from dgarske/stm32_20230412
...
Fixes for STM32 U5/H5/H7 hash and PKA sign build error
2023-04-12 16:36:43 -06:00
JacobBarthelmeh
26a0142f51
add nomath option for builds without a math library
2023-04-12 15:33:59 -07:00
Daniel Pouzzner
c41030663e
wolfcrypt/src/pkcs7.c: correct fix for clang-analyzer-core.DivideZero in wc_PKCS7_DecodeAuthEnvelopedData().
2023-04-12 16:37:20 -05:00
David Garske
b7ff375ac6
Fix PKA build error with SP sign. Fix U5/H5/H7 hashing, which require a workaround to write an extra 32-bit to flush FIFO before save/restore.
2023-04-12 13:45:29 -07:00
David Garske
e1ca478356
Added STM32G0 benchmarks.
2023-04-12 13:45:28 -07:00
JacobBarthelmeh
2c26b068b2
Merge pull request #6239 from dgarske/stm32h5
...
Support for STM32H5
2023-04-12 14:33:25 -06:00
Daniel Pouzzner
97ffdfa9b8
wolfssl/wolfcrypt/asn.h: if defined(WOLFSSL_MULTI_ATTRIB), bump predefined WC_ASN_NAME_MAX, to fix rsa_certgen_test() with config --enable-testcert --enable-asn=original CPPFLAGS='-DWOLFSSL_CERT_GEN -DWOLFSSL_MULTI_ATTRIB'.
2023-04-12 13:48:03 -05:00
tim-weller-wolfssl
72fc023d38
Update wolfCrypt porting layer for Mynewt OS to provide declarations needed to remove build warning for time API used for XTIME
2023-04-12 12:30:42 -05:00
Daniel Pouzzner
4b59588cf3
more fixes for implicit casts, mostly asn=original.
2023-04-12 02:17:18 -05:00
Daniel Pouzzner
fe2acb53af
wolfcrypt/src/ecc.c:fix overstringent arg check in wc_ecc_gen_k().
2023-04-12 01:37:09 -05:00
Daniel Pouzzner
7155c5748e
fix overlong lines.
2023-04-12 01:37:09 -05:00
Daniel Pouzzner
99ffd7726f
wolfcrypt/src/pkcs7.c:wc_PKCS7_DecodeAuthEnvelopedData(): fix clang-analyzer-core.DivideZero (expBlockSz not properly set before use as a denominator in a mod op).
2023-04-12 01:37:09 -05:00
Daniel Pouzzner
bd8f97f315
Revert "Resolve issue with C89 compliance with "commas at the end of enumerator lists"."
...
This reverts commit 68acfd51dca1e0e11e2e7bd0e6ab956b8def6473.
2023-04-12 01:37:09 -05:00
Daniel Pouzzner
41818bf6f8
Revert "Fix enum KeyWrap_Sum impossible combinations (note: ugly code)."
...
This reverts commit 2bac48a290e5243337f661c70eb582e55ceb2c39.
2023-04-12 01:37:09 -05:00
Daniel Pouzzner
ed11669f3c
more fixes for implicit casts, including asn=template.
2023-04-12 01:37:09 -05:00
David Garske
ee50d95b0b
Fix enum KeyWrap_Sum impossible combinations (note: ugly code).
2023-04-12 01:37:09 -05:00
David Garske
72c6429276
Better fixes for pedantic to resolve (error: comparison of unsigned expression >= 0 is always true). Also overlong lines.
2023-04-12 01:37:09 -05:00
David Garske
f3eee4bc99
Resolve issue with C89 compliance with "commas at the end of enumerator lists".
...
Tested with `./configure --disable-asm --enable-32bit --enable-asn --enable-cryptonly CFLAGS="-Wall -ansi -pedantic-errors -Wshadow -g" && make`
2023-04-12 01:37:09 -05:00
David Garske
6418e3cbfe
Fixes for implicit casts.
...
Tested with `./configure --disable-asm --enable-32bit --enable-asn=original --enable-cryptonly CFLAGS="-Wconversion -pedantic" && make`. Some progress with ASN template, but not complete.
2023-04-12 01:37:09 -05:00
JacobBarthelmeh
1889549828
fix for creating options.h with cmake and WOLFSSL_USER_SETTINGS
2023-04-11 13:30:04 -07:00
Eric Blankenhorn
9465d32aea
Allow Micrium to use STM32_RNG
2023-04-11 15:12:58 -05:00
JacobBarthelmeh
edad8d1da8
avoid callback buffer overwrite with sha512_224 and remove min from wolfcaam_cmac
2023-04-11 09:06:39 -07:00
JacobBarthelmeh
6a89464176
Merge pull request #6231 from billphipps/15785-CorrectFreeDuringEarlyConnectFail
...
Track SetDigest usage to avoid invalid free under error conditions.
2023-04-11 09:49:51 -06:00
gojimmypi
9f257af989
platform-specific VisualGDB test & benchmark projects
2023-04-11 09:41:53 +02:00
Chris Conlon
18e0c28487
Only send session ID in resumed ClientHello from SendTls13ClientHello() if ssl->options.resuming
2023-04-10 15:43:31 -06:00
billphipps
0013be9027
15451 correct padding for pkcs7 ( #6260 )
...
* Update to ensure full blocks for crypto in En/DecodeAuthEnvelopedData.
* Corrected spacing and comments
* Set plain to NULL after free on non-error path.
2023-04-10 14:08:52 -07:00
David Garske
f2ae066797
Merge pull request #6281 from JacobBarthelmeh/ECC
...
- fix ECC performance regression
2023-04-10 14:08:43 -07:00
JacobBarthelmeh
8bb0b2ef3f
fix for ECC sign with nonblocking only
2023-04-10 12:53:40 -07:00
David Garske
6b862a1440
Merge pull request #6272 from gojimmypi/wolfcrypt-mpi-fix
...
mp_setneg(Z), not mpi
2023-04-10 11:58:04 -07:00
Bill Phipps
2430f2377f
Corrected spacing and comments
2023-04-10 17:15:22 +00:00
Jacob Barthelmeh
582d8a70f5
fix ECC performance regression
2023-04-09 00:08:01 -06:00
JacobBarthelmeh
12e285434b
Merge pull request #6275 from douzzer/20230406-XREWIND-fixes-contd
...
20230406-XREWIND-fixes-contd
2023-04-06 15:22:48 -06:00
Daniel Pouzzner
7c15131db5
wolfcrypt/src/asn.c: in wc_PemCertToDer_ex() and wc_PemPubKeyToDer_ex(), work around false positive -Wmaybe-uninitialized from scan-build.
2023-04-06 15:15:26 -05:00
JacobBarthelmeh
012f0e0779
Merge pull request #6262 from SparkiDev/mp_int_mem_usage
...
SP int: improve use of stack
2023-04-06 14:06:08 -06:00
Daniel Pouzzner
3468750bae
wolfcrypt/src/asn.c:
...
* refactor error-checking cascade in wc_PemCertToDer_ex() as in wc_PemPubKeyToDer_ex(),
* refactor staticBuffer gating/dynamics in wc_PemPubKeyToDer_ex() as in wc_PemCertToDer_ex(),
* and use IO_FAILED_E, not BUFFER_E, for I/O errors on the file handles, in both routines;
fix smallstack null pointer dereferences in src/pk.c:wolfSSL_RSA_GenAdd() and src/ssl.c:set_curves_list().
2023-04-06 14:31:53 -05:00
Chris Conlon
bd02b9c29c
Merge pull request #6254 from miyazakh/fix_favouriteDrink
2023-04-06 09:39:23 -06:00
Sean Parkinson
67624628c2
Merge pull request #6274 from douzzer/20230405-fixes
...
20230405-fixes
2023-04-06 14:27:37 +10:00
Daniel Pouzzner
dcc8b5d7d5
eliminate XREWIND() macro, add XSEEK_SET definitions, and refactor all XREWIND()s to XFSEEK()s, to fix clang-tidy-17 bugprone-unsafe-functions warning on rewind();
...
add BENCH_DEVID_COLUMN_HEADER in wolfcrypt/benchmark/benchmark.c:bench_stats_sym_finish() to resolve clang-diagnostic-embedded-directive.
2023-04-05 20:28:51 -05:00
Sean Parkinson
8065139050
SP int: improve use of stack
...
Minimize use of stack.
Make very large stack allocations dynamic memory allocations unless
WOLFSSL_SP_NO_MALLOC.
ProcessBufferTryDecode() split up into a function for each type.
ProcessBufferTryDecodeRsa() decodes the data and gets key size rather
than having or allocating an RsaKey.
Added wc_RsaPrivateKeyValidate() that only validates the encoding is an
RSA key and returns the key size in bytes.
For SP int, only create sp_ints of required size in RSA and ECC
implementation. For WOLFSSL_SMALL_STACK, memory is allocated to have
just enough bytes and size is set to maximum supported. Otherwise,
relies on dynamic stack variables.
For ECC, MAX_ECC_BITS_USE used when dynamic stack variables not
supported. Significantly reduces memory usage when RSA/DH is also built.
Add macros to sp_int.h, tfm.h and integer.h to support declaring,
allocating, initializing and freeing mp_ints.
For integer.h, mp_int is always static as size is no more than 32 bytes.
For tfm.h, WOLFSSL_SMALL_STACK has a full mp_int allocated, otherwise
the full mp_int is put on the stack.
For sp_int.h with new macros, dynamically allocate sp_int to minimal
size when WOLFSSL_SMALL_STACK, or when dynamic stack variables, declare
them to be of minimal size or otherwise declare with a fixed max.
Added mp_bitsused(), for all implementations, to get the number of bits
available based on used. Included for RSA to get the size of the
modulus.
SP int now always uses dynamic stack variables if possible rather than
for builds with WOLFSSL_SP_SMALL.
Moved code out into separate functions so that stack allocations don't
happen when not going down code path.
2023-04-06 10:04:39 +10:00
JacobBarthelmeh
8c0a20fc32
Merge pull request #6212 from embhorn/gh6211
...
RIOT-OS does support writev
2023-04-05 15:26:07 -06:00
JacobBarthelmeh
caf2749c8a
Merge pull request #6269 from julek-wolfssl/fix-test_wolfSSL_CTX_add_session
...
Fix intermittent failures in test_wolfSSL_CTX_add_session
2023-04-05 15:19:36 -06:00
JacobBarthelmeh
1bef3ec745
Merge pull request #6233 from embhorn/gh6209
...
Support HAVE_SESSION_TICKET without realloc
2023-04-05 15:17:58 -06:00
JacobBarthelmeh
3c90eb25c8
Merge pull request #6271 from anhu/XSTAT
...
Allow user to override XSTAT
2023-04-05 14:44:09 -06:00
JacobBarthelmeh
9c368d0a0e
Merge pull request #6273 from anhu/wolfSSL_get_chain_cert
...
Documentation fixup for wolfSSL_get_chain_cert();
2023-04-05 14:33:29 -06:00
billphipps
599cf9356f
Merge branch 'wolfSSL:master' into 15785-CorrectFreeDuringEarlyConnectFail
2023-04-05 15:24:30 -04:00
Anthony Hu
3e58e47856
Documentation fixup for wolfSSL_get_chain_cert();
2023-04-05 15:12:43 -04:00
Daniel Pouzzner
cf173e7b7d
Merge pull request #6270 from julek-wolfssl/fix-test_wolfSSL_dtls_stateless_HashWOLFSSL
...
Ignore staticBuffer in test_wolfSSL_dtls_stateless_HashWOLFSSL
2023-04-05 12:53:11 -05:00
Eric Blankenhorn
d9bf93b49f
Support HAVE_SESSION_TICKET without realloc
2023-04-05 11:33:06 -05:00
András Fekete
3b934b858e
Merge pull request #6268 from SparkiDev/asn1_test_0_len
...
ASN.1 testing: restore 0 length BIO failure tests
2023-04-05 11:14:50 -04:00
gojimmypi
bb32b6a927
mp_setneg(Z), not mpi
2023-04-05 17:10:37 +02:00
JacobBarthelmeh
6a52c727f6
Merge pull request #6267 from SparkiDev/openssl_cryptonly
...
OpenSSL API and cryptonly: fix to compile
2023-04-05 09:08:32 -06:00
Anthony Hu
c9e467b734
Allow user to override XSTAT
2023-04-05 10:39:16 -04:00
Juliusz Sosinowicz
171c217ae5
Add in-place support for DES_ede3_cbc_encrypt
2023-04-05 15:50:51 +02:00
Juliusz Sosinowicz
c5f03e43cf
Ignore staticBuffer in test_wolfSSL_dtls_stateless_HashWOLFSSL
2023-04-05 14:23:19 +02:00
Juliusz Sosinowicz
a51daf1bfa
Fix intermittent failures in test_wolfSSL_CTX_add_session
2023-04-05 13:57:10 +02:00
Sean Parkinson
9eac521521
ASN.1 testing: restore 0 length BIO failure tests
...
Create a fixed buffer BIO of length 1 and then write one byte into it so
that there is 0 length to write into.
Test cases removed as setting fixed buffer BIO to length 0 allocated 0
length buffer that is sometimes returning NULL.
2023-04-05 10:29:46 +10:00
Sean Parkinson
10c1009bbd
Merge pull request #6127 from JacobBarthelmeh/qnx
...
IMX6Q CAAM Port
2023-04-05 08:44:00 +10:00
Hideki Miyazaki
9eb3c4d31a
fix unitest failure
2023-04-05 07:25:25 +09:00
Sean Parkinson
b30c8b1fca
OpenSSL API and cryptonly: fix to compile
...
OBJ_nid2sn not available when compiling for cryptonly - don't compile in
call to it in test.h.
2023-04-05 08:02:20 +10:00
JacobBarthelmeh
b8e61a241b
Merge pull request #6257 from kareem-wolfssl/micriumFixes
...
Micrium settings fixes
2023-04-04 11:09:49 -06:00
JacobBarthelmeh
539c562ecd
Merge pull request #6263 from julek-wolfssl/fix-docs-wolfSSL_set_dtls_fd_connected
...
Add missing semicolon
2023-04-04 10:49:02 -06:00
JacobBarthelmeh
cb422bfaf7
Merge pull request #6242 from julek-wolfssl/harden-tls
...
Implement TLS recommendations from RFC 9325
2023-04-04 10:13:27 -06:00
Juliusz Sosinowicz
027c8ed926
Add missing semicolon
2023-04-04 16:59:28 +02:00
David Garske
a4a6a05f06
Merge pull request #6251 from PrinceOfPuppers/master
...
updated zephyr includes
2023-04-03 16:25:32 -07:00
JacobBarthelmeh
e4f75afe5f
update README
2023-04-03 16:41:09 -06:00
JacobBarthelmeh
f9f1347e8d
third optimization pass with aes-ctr
2023-04-03 16:41:09 -06:00
JacobBarthelmeh
14b0f422c8
optimization pass through 2
2023-04-03 16:41:08 -06:00
JacobBarthelmeh
5882b8f68a
cleanup user_settings example file
2023-04-03 16:41:08 -06:00
JacobBarthelmeh
30adcd58d8
IMX6Q CAAM Port
2023-04-03 16:41:08 -06:00
David Garske
b1e4d4922e
Merge pull request #6259 from SparkiDev/cppcheck_fixes_9
...
cppcheck fixes
2023-04-03 15:35:35 -07:00
David Garske
b6ab7a9d56
Merge pull request #6261 from douzzer/20230331-fixes
...
20230331-fixes
2023-04-03 14:56:16 -07:00
Daniel Pouzzner
c08878ac94
configure.ac: include both -I. and -I$srcdir for "circular dependency" test, so that ${build_pwd}/wolfssl/options.h is found in out-of-tree builds; streamline scripting that dynamically sets $TRIM;
...
linuxkm/module_exports.c.template: include wolfssl/wolfcrypt/wolfmath.h, to bring in wc_GetMathInfo() prototype;
src/ssl.c: move "Global pointer to constant BN on" to src/ssl_bn.c; and in wolfSSL_Cleanup(), call the new wolfSSL_BN_free_one() rather than using ad hoc cleanup logic;
src/ssl_bn.c: add bn_one and wolfSSL_BN_free_one();
src/ssl_asn1.c: fix bugprone-macro-parentheses in bufLenOrNull(); refactor wolfSSL_ASN1_TIME_diff() to avoid floating point math; use intermediate tm_year variable in wolfssl_asn1_time_to_tm() to avoid target-specific type conflicts on tm->tm_year; use "FALL_THROUGH", not "/* fall-through */", in wolfSSL_ASN1_TYPE_set (clang-diagnostic-implicit-fallthrough);
wolfcrypt/src/ecc.c: fix identicalInnerCondition in ecc_mul2add();
wolfcrypt/src/integer.c: refactor OPT_CAST()s in mp_grow() to unconditional casts as elsewhere, to mollify a confused cppcheck-all-intmath;
tests/api.c: reformat some overlong lines.
2023-04-03 15:49:39 -05:00
Juliusz Sosinowicz
505ab746c6
Tabs -> spaces
2023-04-03 18:24:01 +02:00
Sean Parkinson
8851065848
cppcheck fixes
...
Fix checking of negative with unsigned variables.
Check digestSz for 0 in wc_SSH_KDF() so that no possibility of dividing
by zero.
Change XMEMCPY to XMEMSET in renesas_sce_util.c.
Fix test.c to free prvTmp and pubTmp on read error.
Remove unused variables.
XFREE checks for NULL so don't check before call.
Move variable declarations to reduce scope.
2023-04-03 16:59:58 +10:00
Kareem
a64fba93cb
Micrium: Add missing XATOI/XSTRTOK definitions, update XMEMMOVE function.
2023-03-31 17:33:33 -07:00
David Garske
2ad0659fa4
Merge pull request #6255 from julek-wolfssl/fix-ssl_asn1
...
Add missing guards
2023-03-31 13:54:25 -07:00
Andras Fekete
c56e58db5b
Remove TODO+bad tests
2023-03-31 15:51:28 -04:00
Andras Fekete
18f4b45129
Fix object size
2023-03-31 15:44:25 -04:00
Andras Fekete
80a0fb548a
Zero buffer size test should be implemented another way
2023-03-31 15:44:13 -04:00
David Garske
753ad4c4c1
Merge pull request #6253 from JacobBarthelmeh/CAAM
...
resolve warning about uninitialized variable
2023-03-31 10:50:28 -07:00
JacobBarthelmeh
35611cad96
Merge pull request #6252 from julek-wolfssl/async-test-action
...
Initial async test with gh action
2023-03-31 11:33:32 -06:00
Andras Fekete
c8e1731cb7
Fix dependency issues
2023-03-31 13:21:13 -04:00
JacobBarthelmeh
74e6f0d337
Merge pull request #6243 from julek-wolfssl/reuse-wolfssl-builds
...
actions: Build wolfSSL in seperate job
2023-03-31 09:26:43 -06:00
Andras Fekete
7138b66b5e
Compiler error
2023-03-31 11:22:58 -04:00
Juliusz Sosinowicz
9f41ed8c72
Add missing guards
2023-03-31 16:11:58 +02:00
Juliusz Sosinowicz
8f8153220b
Remove trailing whitespace
2023-03-31 13:29:42 +02:00
Juliusz Sosinowicz
f1a93f524d
Tabs -> spaces
2023-03-31 11:51:49 +02:00
Juliusz Sosinowicz
ffcc66bb53
Add explicit casts
2023-03-31 11:48:18 +02:00
Juliusz Sosinowicz
4ddc975aca
Expand asyn-check script
2023-03-31 11:25:46 +02:00
Hideki Miyazaki
27f5f3a3e8
fix overwriting serialnum by favouriteDrink
2023-03-31 15:56:31 +09:00
David Garske
00e3dcfab5
Merge pull request #6226 from SparkiDev/asn1_move
...
Move ASN.1 APIs out to separate file: ssl_asn1.c
2023-03-30 18:22:13 -07:00
Sean Parkinson
8489095057
Move ASN.1 APIs out to separate file: ssl_asn1.c
...
Implementations of ASN.1 APIs reworked.
Added tests.
Added wolfssl_bn_set_neg for ASN.1 code.
Added wolfssl_sk_new_type() and wolfssl_sk_pop_type() to generically
handle creating and popping a stack of elements of a type.
No longer freeing pathlen field of ASN1 OBJECT in
wolfSSL_X509_EXTENSION_free(). This is happening in
wolfSSL_ASN1_OBJECT_free().
Stop wolfSSL_i2d_X509_NAME_canon from double freeing ASN.1 STRING's data
field.
Fixed up GetFormattedTime() to be better code.
Added ASN_CLASS_MASK to mask off the class part of an ASN.1 tag.
NO_ASN_TIME means no implementation to get the current time. Disable
features that won'r work without time.
2023-03-31 09:36:01 +10:00
Sean Parkinson
6bed0c5757
Merge pull request #6123 from dgarske/math_info
...
Add introspection for math build and math cleanups
2023-03-31 09:15:48 +10:00
Chris Conlon
7fae945ee6
Merge pull request #6214 from miyazakh/altname_next_reset
2023-03-30 16:58:09 -06:00
David Garske
22a5a5c45e
Add introspection for math build and math cleanups:
...
* Add introspection for math build.
* Raise build error if more than one multi-precision math library used.
* Fix ESP32 to support using any multi-precision math option.
* Refactor math headers to use `wolfmath.h`
* Refactor of the opaque math variable type `MATH_INT_T` used by crypto hardware (QuickAssist, SE050, ESP32 and STM32).
* Cleanups for building with `WOLFCRYPT_ONLY` and `NO_BIG_INT`.
* Stop forcing use of fast math by default for platforms in settings.h. Note: For users that still want to use fast math (tfm.c) they will need to add USE_FAST_MATH to their build settings.
Applies To:
```
WOLFSSL_ESPWROOM32
WOLFSSL_ESPWROOM32SE
MICROCHIP_PIC32
WOLFSSL_PICOTCP_DEMO
WOLFSSL_UTASKER
WOLFSSL_NRF5x
FREERTOS_TCP
WOLFSSL_TIRTOS
EBSNET
FREESCALE_COMMON
FREESCALE_KSDK_BM
WOLFSSL_DEOS
MICRIUM
WOLFSSL_SGX
```
2023-03-30 14:42:55 -07:00
David Garske
c7a76365f0
Fixes to support larger H5 save/restore and larger digest result (for SHA2-512).
2023-03-30 14:42:20 -07:00
David Garske
d99514a41c
Added benchmarks for STM32H563ZI.
2023-03-30 14:42:20 -07:00
David Garske
0201662094
Support for STM32H5
2023-03-30 14:42:20 -07:00
Jacob Barthelmeh
f7d3ce7843
resolve warning about uninitialized variable
2023-03-30 11:44:08 -06:00
Juliusz Sosinowicz
27794c4b7e
Initial async test with gh action
2023-03-30 19:33:54 +02:00
Juliusz Sosinowicz
de2f878781
Write next IV in wolfSSL_DES_ede3_cbc_encrypt
2023-03-30 18:47:53 +02:00
Juliusz Sosinowicz
9120712438
Address code review
2023-03-30 15:35:52 +02:00
Juliusz Sosinowicz
4338ed9b7b
Add missing define
2023-03-30 14:56:31 +02:00
Sean Parkinson
0210dcd98d
Merge pull request #6240 from kaleb-himes/wolfEntropy-work
...
Fix a typo in PP macro and add a ceiling to guard against implementation bugs
2023-03-30 12:33:01 +10:00
PrinceOfPuppers
9b1aed0c82
updated zephyr includes
2023-03-29 22:22:31 -04:00
David Garske
a8ca958855
Merge pull request #6248 from JacobBarthelmeh/fips
...
visibility is dependent on macros that could be set in user_settings.h
2023-03-29 16:32:29 -07:00
David Garske
5d1a914ebd
Merge pull request #6247 from JacobBarthelmeh/config
...
check if colrm is available for options.h creation
2023-03-29 15:19:14 -07:00
Jacob Barthelmeh
951b5bc77c
visibility is dependent on macros that could be set in user_settings.h
2023-03-29 16:14:54 -06:00
JacobBarthelmeh
e1730c760c
check if colrm is available for options.h creation
2023-03-29 14:11:56 -07:00
David Garske
68d6ce647d
Merge pull request #6227 from julek-wolfssl/hwsim-retry
...
Retry hwsim tests 3 times on fail
2023-03-29 12:34:19 -07:00
David Garske
8b34ad7c4d
Merge pull request #6245 from lealem47/asyncRelease
...
Fixes for the async release
2023-03-29 12:33:57 -07:00
Lealem Amedie
8e730534d5
Free in drbg test when appropriate
2023-03-29 10:26:59 -06:00
David Garske
3841b559ec
Merge pull request #6246 from SparkiDev/siphash_asm_fix
...
siphash: fix assembly so that no register is left behind
2023-03-29 09:23:38 -07:00
Lealem Amedie
047db19956
Disable SHA512/224 & SHA512/256 on QAT
2023-03-29 10:17:06 -06:00
Lealem Amedie
65f97482f3
Missed free's in api.c
2023-03-29 10:16:29 -06:00
David Garske
6a71c7d71a
Merge pull request #6228 from SparkiDev/sp_math_dh_test_param
...
SP math: 2048-bit DH parameters
2023-03-29 08:25:54 -07:00
David Garske
689b0f803a
Merge pull request #6237 from SparkiDev/benchmark_base10
...
Benchmark: fix reporting of base10
2023-03-29 08:25:29 -07:00
Juliusz Sosinowicz
4a75d78682
Add flags to disable certain checks
2023-03-29 14:22:31 +02:00
Juliusz Sosinowicz
43ca374cad
actions: Fix openwrt patch
2023-03-29 11:32:32 +02:00
Sean Parkinson
ca11b4e560
siphash: fix assembly so that no register is left behind
...
Change all assembly so that no register is used explicitly - all
variables.
2023-03-29 09:38:04 +10:00
David Garske
35111b29c1
Merge pull request #6244 from bandi13/consolidateVMdeps
...
Fix dependencies
2023-03-28 13:30:08 -07:00
Lealem Amedie
6824166cf9
Add QAT flags to logic checking for dependencies
2023-03-28 12:44:22 -06:00
Kaleb Himes
ba47562d18
Merge pull request #6238 from bandi13/fixRenewcerts.sh
...
Remove expectation for an argument to be passed
2023-03-28 11:24:51 -06:00
Juliusz Sosinowicz
415d6151ff
Use unique name in openwrt action
2023-03-28 18:10:01 +02:00
Andras Fekete
103f6e7520
Fix dependencies
2023-03-28 11:56:29 -04:00
Juliusz Sosinowicz
f5b0c406c0
use unique artifact names
2023-03-28 17:17:18 +02:00
JacobBarthelmeh
f1aa43dc48
Merge pull request #6230 from bandi13/zd15855
...
Fix for variable server startup time
2023-03-28 09:13:52 -06:00
JacobBarthelmeh
ba2b7af84a
Merge pull request #6241 from lealem47/strncmp
...
Fixes for sniffer with enable all
2023-03-28 09:13:11 -06:00
Juliusz Sosinowicz
1766a69152
actions: Build wolfSSL in seperate job
2023-03-28 17:00:51 +02:00
Andras Fekete
0a2201700d
Put the .rnd file in a local folder
2023-03-28 10:43:17 -04:00
Andras Fekete
1cf2d9ece3
Create files that the script depends on
2023-03-28 10:16:24 -04:00
Andras Fekete
610c45afb6
Don't need to store state anymore
2023-03-28 10:15:58 -04:00
Juliusz Sosinowicz
60501236cf
Add counter
2023-03-28 14:15:57 +02:00
Juliusz Sosinowicz
e73ae077dc
Retry hwsim tests 3 times on fail
2023-03-28 14:15:57 +02:00
Juliusz Sosinowicz
7116f1e005
Add comment.
2023-03-28 14:14:40 +02:00
Juliusz Sosinowicz
f0ad01f552
Send secure renegotiation extension by default
...
- Add test for terminating the connection
- Add ProcessReplyEx(ssl, 1) to wolfSSL_accept
2023-03-28 12:43:53 +02:00
Sean Parkinson
69199a30f9
SP math: 2048-bit DH parameters
...
Add 2048-bit DH parameters for testing when SP math with SP.
2023-03-28 09:24:56 +10:00
Lealem Amedie
591089664d
Fixes for sniffer with enable all
2023-03-27 16:37:14 -06:00
kaleb-himes
59107aeaa8
Fix a typo in PP macro and add a ceiling to guard against implementation bugs
2023-03-27 16:02:34 -06:00
Andras Fekete
1f6071df33
PR suggestions
2023-03-27 13:59:01 -04:00
Chris Conlon
496a15037b
Merge pull request #6166 from TakayukiMatsuo/tsip117
2023-03-27 11:49:18 -06:00
Andras Fekete
cadd2d9ab6
Remove expectation for an argument to be passed
...
Added in a failing return value to flush out tests/scripts that may be calling this script multiple times with various arguments
2023-03-27 13:30:12 -04:00
David Garske
85e82746c3
Merge pull request #6210 from rizlik/realloc_on_espressif
...
wolfcrypt/settings.h: use default realloc on EspressIf
2023-03-27 09:28:42 -07:00
Juliusz Sosinowicz
28fd14621a
Add harden config to testing
2023-03-27 17:20:16 +02:00
Juliusz Sosinowicz
c0b0c14a15
Allow user to choose between 112 and 128 bits of security
2023-03-27 15:42:19 +02:00
Juliusz Sosinowicz
3b759580b2
Require 128 bits of security for public keys
2023-03-27 10:27:57 +02:00
Sean Parkinson
5f2208e71d
Benchmark: fix reporting of base10
2023-03-27 16:29:47 +10:00
David Garske
979707380c
Merge pull request #6232 from JacobBarthelmeh/release
...
prepare for release 5.6.0
2023-03-24 10:14:19 -07:00
Juliusz Sosinowicz
40cbb32b23
Ciphersuite check
...
https://www.rfc-editor.org/rfc/rfc9325#section-4.1
2023-03-24 16:44:33 +01:00
Juliusz Sosinowicz
e465089798
No old TLS check
2023-03-24 16:44:01 +01:00
Juliusz Sosinowicz
94cf845c05
Truncated hmac check
2023-03-24 16:43:34 +01:00
Juliusz Sosinowicz
7791b8ff4d
Add config option
2023-03-24 16:42:56 +01:00
JacobBarthelmeh
877e026da4
prepare for release 5.6.0
2023-03-23 21:44:18 -07:00
billphipps
9f6388d272
Track SetDigest usage to avoid invalid free under error conditions.
2023-03-23 15:46:38 -04:00
Andras Fekete
d57d6d2b78
Fix for variable server startup time
2023-03-23 15:03:26 -04:00
JacobBarthelmeh
e0e590f126
Merge pull request #6223 from lealem47/misc_fixes
...
Async build typos and miscellaneous fixes
2023-03-23 23:55:20 +07:00
David Garske
aeffe6cfa7
Merge pull request #6222 from JacobBarthelmeh/alerts
...
don't try to send an alert to a disconnected peer
2023-03-23 09:49:15 -07:00
David Garske
3ef7db8e1b
Merge pull request #6229 from JacobBarthelmeh/Testing
...
fix for check on ecc public key size with FIPS and compressed keys
2023-03-23 08:25:31 -07:00
JacobBarthelmeh
e9214e07cf
Merge pull request #6219 from RSmatRA/RSmatRA/zeroing-input-buffer
...
Do not ForceZero the part of the buffer that has not been used.
2023-03-23 21:13:37 +07:00
JacobBarthelmeh
a121a5c270
Merge pull request #6225 from SparkiDev/memzero_check_fixes_1
...
MemZero check fixes
2023-03-23 21:04:39 +07:00
JacobBarthelmeh
25577ab96c
fix for check on ecc public key size with FIPS and compressed keys
2023-03-23 06:58:03 -07:00
Sean Parkinson
d1e4349661
MemZero check fixes
...
ForceZero the client and server secret regardless of whether TLS 1.3 as
it may change but have been copied in.
ForceZero the input buffer in wolfSSL_Clear() when encryption was on.
Changed wc_PRF_TLS to only check the parts of data used.
Changed where scatch is added for checking in wc_AesCtrEncrypt.
Change wc_MakeRsaKey to memset p, q, tmp1, tmp2 and tmp3 to all zeros so
that MemZero check works. Memset not needed otherwise.
Changes for new compiler - thinks uninitialized.
2023-03-23 12:27:38 +10:00
JacobBarthelmeh
6ad786abe4
Merge pull request #6224 from SparkiDev/quic_aes_gcm_stream
...
AES-GCM streaming: EVP needs to set IV with wc_AesGcmInit
2023-03-23 08:25:31 +07:00
Lealem Amedie
a31ca24bb0
Fix for async build with enable all
2023-03-22 17:30:38 -06:00
Lealem Amedie
c83e899b78
Fix for overlong string warning
2023-03-22 17:29:53 -06:00
Lealem Amedie
a5e7a20c93
Fix for logic gating strerror_r()
2023-03-22 17:29:13 -06:00
Sean Parkinson
1fa75a5503
AES-GCM streaming: EVP needs to set IV with wc_AesGcmInit
...
Store IV if it is small enough to fit in aes->reg - was a copy of the
aes->reg in the first place.
2023-03-23 09:28:22 +10:00
Sean Parkinson
df4081ea5a
Merge pull request #6215 from JacobBarthelmeh/static_analysis
...
fixes for static analysis reports
2023-03-23 08:37:08 +10:00
JacobBarthelmeh
7734588669
don't try to send an alert to a disconnected peer
2023-03-22 14:20:07 -07:00
David Garske
835e8a18c7
Merge pull request #6216 from JacobBarthelmeh/fuzzing
...
adjust sanity check for index into URI
2023-03-22 12:52:04 -07:00
JacobBarthelmeh
c11f5d0ee5
fixes for static analysis reports
2023-03-22 12:34:37 -07:00
David Garske
7c122cda6d
Merge pull request #6197 from JacobBarthelmeh/Testing
...
adjust location of Options typdef
2023-03-22 12:31:00 -07:00
JacobBarthelmeh
edca6b9d03
adjust location of Options typedef
2023-03-22 09:27:26 -07:00
JacobBarthelmeh
7e8d027a17
Merge pull request #6217 from douzzer/20230321-fixes
...
20230321-fixes
2023-03-22 10:23:07 -06:00
Radim Smat
e618bb9686
Do not ForceZero the part of the buffer that has not been used.
2023-03-22 14:48:18 +01:00
Daniel Pouzzner
49cd3ff872
wolfssl/internal.h: fixes for -Wpedantic "redefinition of typedef" around typedef ... TLSX and Options;
...
src/internal.c: fix for -Wdeclaration-after-statement and clang-diagnostic-unreachable-code-break;
tests/api.c: fix for -Wunused-variable and clang-analyzer-deadcode.DeadStores;
olfcrypt/src/pkcs12.c: fixes for cppcheck uselessAssignmentPtrArg and arrayIndexThenCheck, and clang-tidy clang-analyzer-deadcode.DeadStores and clang-analyzer-core.NonNullParamChecker;
wolfssl/src/tls.c: fix for clang-analyzer-deadcode.DeadStores;
wolfcrypt/src/tfm.c: fix for clang-diagnostic-newline-eof;
src/tls13.c: fix for clang-analyzer-core.NonNullParamChecker.
2023-03-21 22:52:56 -05:00
JacobBarthelmeh
180a20d535
adjust sanity check for index into URI
2023-03-21 20:19:08 -07:00
JacobBarthelmeh
147395476f
Merge pull request #6213 from SparkiDev/regression_fixes_6
...
Regression testing fixes
2023-03-21 20:17:30 -06:00
Hideki Miyazaki
51040b1f07
reset alt name list to head
2023-03-22 10:31:58 +09:00
Sean Parkinson
9ec742b11f
Regression testing fixes
...
HAVE_ECH only used by TLS 1.3 add protection around all code.
ssl->options.onlyPskDheKe only available when HAVE_SUPPORTED_CURVES.
CleanupClientTickets() defined when HAVE_SUPPORTED_CURVES.
TLSX_KeyShare_DeriveSecret only defined when HAVE_SUPPORTED_CURVES.
DecodeResponseData - initialize variable single.
New OpenSSL compatibility BN code requires mp_read_radix - turn on in
integer.c, sp_int.c when OPENSSL_EXTRA defined.
rsa.c:_CheckProbablePrime - make sure tmp1 and tmp2 are initialized
before error handling jumps to freeing them.
test_remove_hs_message uses 1024-bit DH key which is not supported when
using SP math with SP.
2023-03-22 08:57:20 +10:00
Sean Parkinson
1eeb54e981
Merge pull request #6208 from JacobBarthelmeh/fuzzing
...
handle failing RNG init when creating PKEY
2023-03-22 08:55:38 +10:00
JacobBarthelmeh
2af55903c5
Merge pull request #6187 from SparkiDev/tls13_server_id
...
Server ID - long id, TLS 1.3 - cache client session for tickets
2023-03-21 16:48:05 -06:00
JacobBarthelmeh
265a6c824f
Merge pull request #6164 from wolfSSL/gojimmypi-patch-zephyr-link
...
Update README link
2023-03-21 09:10:52 -06:00
Sean Parkinson
17e20b8c36
Server ID - long id, TLS 1.3 - cache client session for tickets
...
Long server IDs were being truncated. Hash long IDs instead.
TLS 1.3 session ticket on client side no longer added session to client
cache. Explicit call added.
2023-03-21 15:29:07 +10:00
John Safranek
74f549a0b4
Merge pull request #6206 from SparkiDev/aesgcm_armv6_asm
...
AES ARMASM <ARMV7: fix load order
2023-03-20 21:21:01 -07:00
TakayukiMatsuo
7d2a9136b6
Add support for TSIP v1.17
2023-03-21 11:28:07 +09:00
Sean Parkinson
4eeb792a05
AES ARMASM <ARMV7: fix load order
...
Loading from memory based on register that is overwritten in ldrd.
When ldrd split out for older processors, register overwritten before
second load.
Switch order of loads in this case.
2023-03-21 10:53:47 +10:00
Sean Parkinson
09dd9a0ca3
Merge pull request #6207 from rizlik/move_alerts_from_get_record_header
...
Move alerts from get record header
2023-03-21 08:20:22 +10:00
Eric Blankenhorn
cc4f6221e1
RIOT-OS does support writev
2023-03-20 16:07:29 -05:00
JacobBarthelmeh
5c7be2fa98
Merge pull request #6202 from philljj/zd15807
...
Fix out-of-bounds read in CRL parsing
2023-03-20 14:19:01 -06:00
Marco Oliverio
e281ef9ea9
wolfcrypt/settings.h: use default realloc on EspressIf
2023-03-20 17:26:46 +00:00
JacobBarthelmeh
72e53ca1a4
handle failing RNG init when creating PKEY
2023-03-20 07:17:25 -07:00
Marco Oliverio
84d8245e58
internal: move SendAlerts outside of GetRecordHeader
...
This will give a chance to DTLS logic to ignore an error.
2023-03-20 10:50:00 +00:00
Marco Oliverio
aabd665e73
SendAlert: propagate return error in non-fatal SendAlert
2023-03-20 10:50:00 +00:00
Sean Parkinson
c3b51af6cd
Merge pull request #6204 from JacobBarthelmeh/name
...
Fix for value of givenName and name
2023-03-20 10:59:47 +10:00
jordan
2fe473cf9f
Fix out-of-bounds read in CRL parsing
2023-03-17 22:33:35 -05:00
JacobBarthelmeh
327692b09f
Merge pull request #6200 from kareem-wolfssl/zd15324_2
...
Fix IAR warnings.
2023-03-17 15:04:35 -06:00
JacobBarthelmeh
9e331aa6d5
Merge pull request #6195 from embhorn/zd15836
...
Fix type conv error in logging
2023-03-17 14:46:54 -06:00
JacobBarthelmeh
9c3cfab328
Merge pull request #6196 from bandi13/zd15783
...
OCSP_CERT_UNKNOWN
2023-03-17 14:33:57 -06:00
JacobBarthelmeh
0e431c3eaa
add given name test case
2023-03-17 13:07:15 -07:00
JacobBarthelmeh
a917f380bb
fix values for givenName and name
2023-03-17 12:56:27 -07:00
Kareem
011385d4d4
Revert logging return code fixes, already fixed in another PR.
2023-03-17 12:39:04 -07:00
JacobBarthelmeh
06d970c999
Merge pull request #6181 from kareem-wolfssl/zd15767
...
Fix not ignoring date errors when VERIFY_SKIP_DATE is set
2023-03-17 10:53:41 -06:00
JacobBarthelmeh
042ceff08e
Merge pull request #6160 from lealem47/indefPKCS12
...
Adding support for indefinite length PKCS12
2023-03-17 10:45:46 -06:00
Kareem
5b08b016af
Add client-absolute-urn.pem to renewcerts.sh
2023-03-16 16:14:08 -07:00
Kareem
5126dc87e6
Fix IAR warnings.
2023-03-16 15:46:41 -07:00
Sean Parkinson
459058a645
Merge pull request #6194 from JacobBarthelmeh/string
...
cast on input of XISALNUM
2023-03-17 08:39:21 +10:00
Sean Parkinson
21c5ecc371
Merge pull request #6179 from tim-weller-wolfssl/zd14527-pemtoder-return-size
...
zd14527 - Update `PubKey` and `Key` PEM-to-DER APIs to support return of needed DER size
2023-03-17 08:37:51 +10:00
John Safranek
db166e5e5a
Merge pull request #6198 from kaleb-himes/140-3-iOS-early-stage
...
Add a base-line user_settings.h for use with FIPS 140-3 in xCode example app
2023-03-16 15:20:15 -07:00
Kareem
cc51b2d52e
Add additional fix for absolute URN issue from PR #5964 and add test.
2023-03-16 14:56:44 -07:00
Kareem
4c12c334cf
Allow alternative absolute URI syntax in certificate general name.
2023-03-16 14:25:42 -07:00
Kareem
28f39f6b3d
Fix unit test failure when building OPENSSL_EXTRA without HAVE_EXT_CACHE.
2023-03-16 14:25:42 -07:00
Kareem
2bb8eeae85
Fix not ignoring date errors when VERIFY_SKIP_DATE is set
2023-03-16 14:25:41 -07:00
kaleb-himes
e1d1f0790e
Fixup uninitialized warnings detected by xCode
2023-03-16 15:18:00 -06:00
Kaleb Himes
75149f71d2
Implement peer suggestions
2023-03-16 12:59:49 -06:00
JacobBarthelmeh
8ec339d11c
Merge pull request #6175 from tim-weller-wolfssl/zd15722-mem-leak
...
zd15722 - Prevent out-of-bound read in ASN parsing logic by erroring out.
2023-03-16 07:29:26 -06:00
tim-weller-wolfssl
5659bd6036
Prevent out-of-bound read in ASN parsing logic by erroring out.
2023-03-16 06:11:34 -05:00
JacobBarthelmeh
7f6811a731
Merge pull request #6146 from kareem-wolfssl/zd15324
...
Fixes various warnings
2023-03-15 16:59:00 -06:00
JacobBarthelmeh
fb6f2d1790
cast on input of XISALNUM
2023-03-15 15:43:28 -07:00
Kareem
aaad3980a0
Various warning fixes. ESP32S3 include and build fixes. Added optional slot support for STSAFE shared secret using WOLFSSL_STSAFE_TAKES_SLOT.
2023-03-15 13:34:02 -07:00
kaleb-himes
ea06d064b0
Add a base-line user_settings.h for use with FIPS 140-3 in xCode example app
2023-03-15 14:08:32 -06:00
JacobBarthelmeh
0486db8a2e
Merge pull request #6188 from SparkiDev/aes_gcm_streaming_long_nonce
...
AES-GCM streaming: fix IV caching
2023-03-15 11:39:37 -06:00
JacobBarthelmeh
8ba35a5f16
Merge pull request #6180 from julek-wolfssl/openvpn-test
...
Add libnl-genl-3-200 as dependency to openvpn test
2023-03-15 10:11:20 -06:00
Andras Fekete
69024d121f
Revert change
2023-03-15 10:16:34 -04:00
Andras Fekete
682354628b
Better return value
2023-03-15 09:58:39 -04:00
Eric Blankenhorn
7c918255b9
Fix type conv error in logging
2023-03-15 07:46:22 -05:00
Andras Fekete
1967375ea5
Pass up the error
2023-03-14 18:11:00 -04:00
Andras Fekete
c6e7ea685e
Add in CERT_UNKNOWN detection
2023-03-14 18:09:45 -04:00
Sean Parkinson
3b5310d186
AES-GCM streaming: fix IV caching
...
AES-GCM stremaing was caching IV even when larger than buffer copying
into.
Instead, require calls to wc_AesGcmSetIV() or wc_AesGcmSetExtIV() to
cache IV.
wc_AesGcmInit() now uses passed in IV or retrieves from cache.
2023-03-15 07:52:06 +10:00
Sean Parkinson
a268222167
Merge pull request #6169 from rizlik/wssl-alerts
...
Wssl alerts
2023-03-15 07:48:57 +10:00
JacobBarthelmeh
0355187f51
Merge pull request #6184 from bandi13/fixCRLTest
...
Fix possible timing issue with other tests copying the certs folder
2023-03-14 09:29:03 -06:00
Juliusz Sosinowicz
caad42291b
Merge pull request #6193 from JacobBarthelmeh/tls13
2023-03-14 14:54:00 +01:00
Marco Oliverio
94d983f94a
tests: add WOLFSSL_EXTRA_ALERTS tests
2023-03-14 13:27:40 +00:00
JacobBarthelmeh
c61d079905
Merge pull request #6186 from SparkiDev/asn_template_leading_zero
...
ASN template: compile option to allow leading zeros
2023-03-14 06:37:06 -06:00
tim-weller-wolfssl
52105a10c9
Add means to get size of DER buffer size needed for PEM-to-DER conversion to Key and PubKey APis
2023-03-14 06:33:12 -05:00
Marco Oliverio
898fed9a8b
tests: memio: allow NULL client and/or server ctx
2023-03-14 09:27:19 +00:00
Marco Oliverio
4227f763a8
ssl: send alert on bad psk
2023-03-14 09:27:19 +00:00
Marco Oliverio
7b53baea62
refactor: more centralized extra alerts
...
on handshake messages' errors:
- don't send alerts on WANT_READ, WANT_WRITE and WC_PENDING_E "errors"
- use return error code to decide which alert description
to send
- use alert description handshake_failure in the general case
- if a fatal alert was already sent, do not send any new alerts. This allow
a more specific alert description in case the exact description can't be
derived from the return code
2023-03-14 09:27:18 +00:00
Marco Oliverio
f666a7d4b7
internal.c: fix fall_through compilation issues
...
src/internal.c: In function 'SendCertificateVerify':
./wolfssl/wolfcrypt/types.h:345:40: error: attribute 'fallthrough' not preceding a case label or default label [-Werror]
345 | #define FALL_THROUGH ; __attribute__ ((fallthrough))
In file included from ./wolfssl/internal.h:27,
from src/internal.c:92:
src/internal.c: In function 'SendCertificateVerify':
./wolfssl/wolfcrypt/types.h:345:40: error: attribute 'fallthrough' not preceding a case label or default label [-Werror]
345 | #define FALL_THROUGH ; __attribute__ ((fallthrough))
2023-03-14 09:27:18 +00:00
Sean Parkinson
1d0b04bfb3
ASN template: compile option to allow leading zeros
...
DER/BER encoding requires positive numbers to not have leading zeros.
Sometimes customer's have examples that break the rules.
In those cases define: WOLFSSL_ASN_INT_LEAD_0_ANY
Define used in original ASN.1 implementation.
2023-03-14 09:23:15 +10:00
JacobBarthelmeh
19a1ec8c98
Merge pull request #6192 from kaleb-himes/aes-free-dox
...
Document use of wc_AesFree()
2023-03-13 16:03:13 -06:00
JacobBarthelmeh
d7cd7bc256
adjust guards around PreSharedKey structure for non tls13 builds
2023-03-13 14:47:25 -07:00
kaleb-himes
9c1adbd83b
Fix typo's in the code sample(s)
2023-03-13 14:56:46 -06:00
kaleb-himes
5bbdda6895
Document use of wc_AesFree()
2023-03-13 11:50:28 -06:00
JacobBarthelmeh
e8828574ea
Merge pull request #6190 from bandi13/ghActions
...
Let tests run to completion
2023-03-13 09:24:09 -06:00
JacobBarthelmeh
694b527e67
Merge pull request #5910 from julek-wolfssl/dtls13-stateless
...
DTLS 1.3 stateless server ClientHello parsing
2023-03-13 09:22:58 -06:00
Andras Fekete
c56c4ef7ce
Hacky workaround to be able to put/remove files in certs folder
2023-03-13 10:37:21 -04:00
Andras Fekete
f3e785b4c7
Let tests run to completion
2023-03-13 09:48:37 -04:00
JacobBarthelmeh
bcd6bce040
Merge pull request #6183 from ejohnstown/rng-tweak
...
RNG Tweak
2023-03-10 15:16:54 -07:00
András Fekete
f2a955d5eb
Merge pull request #6182 from julek-wolfssl/hostap-testing
...
Add initial testing for wpa_supplicant
2023-03-10 15:44:07 -05:00
Lealem Amedie
1c9fa5c5ae
Set some freed data to NULL
2023-03-10 13:40:25 -07:00
Andras Fekete
e2a1ab9e49
Fix possible timing issue with other tests copying the certs folder
2023-03-10 15:35:03 -05:00
John Safranek
907a29ab9e
RNG Tweak
...
1. Remove a redundant test. The duplicate data test is not required and
is checking for something that potentially can happen normally,
albeit rarely.
2023-03-10 11:08:35 -08:00
Juliusz Sosinowicz
a47cf08273
Add initial testing for wpa_supplicant
2023-03-10 17:12:56 +01:00
David Garske
90f1c26211
Merge pull request #6162 from gojimmypi/Espressif_fix_6148
...
compiler appeasement initialization
2023-03-09 20:08:24 -08:00
Juliusz Sosinowicz
9628eb0159
Add libnl-genl-3-200 as dependency to openvpn test
...
Looks like github actions removed libnl-genl-3-200 from the default image. Need to install manually.
2023-03-09 21:47:10 +01:00
Juliusz Sosinowicz
4c7aa5c8dd
Address code review
2023-03-09 19:00:25 +01:00
JacobBarthelmeh
2a15363033
Merge pull request #6176 from bandi13/addWolfCLUDocker
...
Add in wolfCLU Dockerfile
2023-03-09 10:39:56 -07:00
JacobBarthelmeh
4fe3cc60b0
Merge pull request #6177 from cconlon/asnTimeString
...
Fix GetAsnTimeString() to correctly increment internal data pointer
2023-03-09 09:36:59 -07:00
JacobBarthelmeh
a640418832
Merge pull request #6170 from julek-wolfssl/openvpn-test
...
Add fsanitize testing for openvpn
2023-03-09 09:25:43 -07:00
gojimmypi
30106d82ea
replace fp_init_copy to appease some compilers
2023-03-08 20:37:19 -08:00
Chris Conlon
d03347d79c
fix GetAsnTimeString() to correctly increment data_ptr, fixes PKCS#7 signedData signingTime attribute
2023-03-08 16:39:49 -07:00
Andras Fekete
ebf7fa585a
First attempt
2023-03-08 15:27:16 -05:00
Lealem Amedie
13867dab12
Fix leak and address more feedback
2023-03-08 13:14:16 -07:00
Juliusz Sosinowicz
e04a01dc4c
Add fsanitize testing for openvpn
2023-03-08 11:23:41 +01:00
Sean Parkinson
6e58ca3bc4
Merge pull request #6171 from JacobBarthelmeh/Testing
...
build checks on mp_read_radix
2023-03-08 10:36:19 +10:00
Jacob Barthelmeh
07a1725635
remove redundent check on mp_read_radix available
2023-03-07 16:08:37 -07:00
Sean Parkinson
842b22858b
Merge pull request #6168 from anhu/WOLFSSL_RELAXED_ASN_PARSING
...
Relaxed parsing of explicit ECC public key
2023-03-08 08:20:04 +10:00
Jacob Barthelmeh
eb0bf7cd03
build checks on mp_read_radix
2023-03-07 13:55:10 -07:00
Anthony Hu
f1757b1bae
WOLFSSL_NO_ASN_STRICT
2023-03-07 07:24:25 -05:00
Juliusz Sosinowicz
335722c586
Async fixes
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
f5f67f43d7
Reset DTLS sequence number
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
a432502a98
Refactor sequence number reset for DTLS into one function
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
db1f199a11
Add comment about keyshare negotiation
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
cbedae2f55
This path in TLSX_KeyShare_Choose should not be taken normally
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
06749144d5
Add RFC link to help understand constraints
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
f2032e8744
Clear decrypted ticket that failed checks in DoClientTicket_ex
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
b0d7656ad2
Rebase fixes
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
885cca67fe
Check for shared ctx in all configs
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
61c2059cd9
Differentiate between empty and missing extension
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
5f39c594aa
TLS 1.3: hold decrypted ticket to check which ciphersuite matches
...
DTLS 1.3: Move stateless ticket decoding to FindPskSuiteFromExt
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
8c08dbb6ce
Adding checks for SigAlgs, KeyShare, and Supported Groups
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
2bbdf6979a
Reuse ReadVector16
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
de6ed96feb
CopyExtensions -> CopySupportedGroup
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
5f65752414
Refactor alerts into one location
...
Remove previous stateless code. Now all DTLS 1.3 stateless handling is done in dtls.c
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
51a384eba5
Read cookie extension into separate field
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
5b0903a82d
Missing casts
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
b5e7761e58
For DTLS 1.3 use PSK for ticket
...
Resumption info is also necessary when WOLFSSL_DTLS_NO_HVR_ON_RESUME is not defined.
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
0264df1546
Definition was defined out in some configs
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
969c610ef7
Fix unused variable
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
57dccc4cf4
Calculate cookie in SendStatelessReplyDtls13()
...
Not touching ssl->hsHashes while in stateless mode
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
c15043b191
Refactor SendStatelessReply 1.3 branch into new function
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
2f31cdef69
Re-create hs header for hash
2023-03-07 12:04:54 +01:00
Juliusz Sosinowicz
aa9dcca624
Rebase and Jenkins fixes
2023-03-07 12:02:54 +01:00
Juliusz Sosinowicz
a999909969
Use PSK callback to get the ciphersuite to use
...
- Allocate additional byte in TLSX_PreSharedKey_New for null terminator
2023-03-07 12:02:54 +01:00
Juliusz Sosinowicz
6160f93f94
Fix Jenkins errors
2023-03-07 12:02:54 +01:00
Juliusz Sosinowicz
7dfa96a729
Define usePSK when ext is present
2023-03-07 12:02:54 +01:00
Juliusz Sosinowicz
984d709db0
dtls 1.3: Stateless ClientHello parsing
2023-03-07 12:02:54 +01:00
Anthony Hu
109063e427
Relaxed parsing of explicit ECC public key
2023-03-06 20:11:36 -05:00
Chris Conlon
9bc3b867e0
Merge pull request #6157 from miyazakh/add_favouriteDrinkNID
2023-03-06 16:45:14 -07:00
Sean Parkinson
fa8b253657
Merge pull request #6167 from douzzer/20230306-fix-header-loop-test
...
20230306-fix-header-loop-test
2023-03-07 08:47:41 +10:00
Daniel Pouzzner
3c107da2a9
wolfssl/openssl/bn.h: fix bugprone-macro-parentheses.
2023-03-06 15:23:14 -06:00
Daniel Pouzzner
0a90b2d354
configure.ac: further fix for header loop check -- construct header list while in $srcdir, so that -I${srcdir} works as expected. see earlier commits 7baddb04f8 a7d9ea7550 b3a1ac80dc .
2023-03-06 15:21:23 -06:00
Lealem Amedie
d9429185d8
Addressing some review feedback
2023-03-06 10:42:23 -07:00
David Garske
86e1b0d8ab
Merge pull request #6165 from SparkiDev/bn_move
...
BN compatibility API: move implementation out to separate API
2023-03-06 09:27:24 -08:00
David Garske
9f66a58afd
Merge pull request #6159 from philljj/zd15693
...
Fix ASN1_STRING leak in create_by_NID and create_by_txt
2023-03-06 09:25:37 -08:00
Sean Parkinson
e4c2386b61
BN compatibility API: move implementation out to separate API
...
BN APIs from ssl.c have been moved out to ssl_bn.c that is included in
ssl.c.
Added defines for BN_rand() and BN_pseudo_rand() to indicate which bits
are to be set.
'internal' field now always maps to the ;mpi' field that is a MP
integer.
SetIndividualInternal/External renamed to wolfssl_bn_get/set_value.
Fixed BN APIs to work as closely to OpenSSL as possible.
Added tests.
Moved wolfssl_make_rng out to ssl.c as BN APIs are using it now.
SP int and TFM now check trials are in a valid range for
mp_prime_is_prime_ex().
2023-03-06 14:32:10 +10:00
gojimmypi
9363b96947
Update README link
...
fix link that's currently 404
2023-03-05 15:26:48 -08:00
David Garske
487d46fd28
Merge pull request #6161 from douzzer/20230303-fix-c89-etc
...
20230303-fix-c89-etc
2023-03-05 14:24:33 -08:00
Daniel Pouzzner
b3a1ac80dc
configure.ac: don't check for opensslextra circular header dependencies if ENABLED_LINUXKM (handcrafted linuxkm/Makefile and linuxkm/Kbuild set up paths to correctly find dependencies like linux/mutex.h).
2023-03-04 12:12:08 -06:00
Hideki Miyazaki
05b0796361
add favourite drink pilot attibute type to get it from the encoding
2023-03-04 14:20:48 +09:00
Daniel Pouzzner
ab71f6fd4c
extend C89 build to whole codebase including examples:
...
configure.ac: remove implied --disable-examples when --disable-inline;
tests/api.c: always include wolfcrypt/src/misc.c;
wolfcrypt/src/misc.c: use WC_MISC_STATIC to designate staticness of the misc functions;
wolfssl/wolfcrypt/misc.h: define WC_MISC_STATIC to empty or static depending on #ifdef NO_INLINE or not (respectively);
wolfssl/wolfcrypt/types.h: #ifdef NO_INLINE, #define WC_INLINE WC_MAYBE_UNUSED, and move the definitions of WARN_UNUSED_RESULT and WC_MAYBE_UNUSED above the definition of WC_INLINE for clarity;
wolfssl/wolfcrypt/mem_track.h: always declare TrackMalloc() et al static (no functional change, because the state and callback bindings were and remain unconditionally static, but previously #ifdef NO_INLINE the functions were globals, leading to multiple definitions.
2023-03-03 22:30:08 -06:00
Daniel Pouzzner
e76d12f932
src/ssl.c: fix a couple suppressions to use C comment syntax, for C89 goodness.
2023-03-03 22:01:52 -06:00
Daniel Pouzzner
aecb37c032
linuxkm/module_hooks.c: wc_SetSeed_Cb(wc_GenerateSeed) in wolfssl_init() #ifdef WC_RNG_SEED, regardless of whether wolfcrypt_test() will be called.
2023-03-03 22:00:24 -06:00
Daniel Pouzzner
a7d9ea7550
configure.ac: fix openssl header circular dependency detector to work on out-of-tree builds.
2023-03-03 21:56:42 -06:00
Lealem Amedie
bb9c1bb253
Adding support for indefinite length PKCS12
2023-03-03 15:58:17 -07:00
David Garske
35b68fb23d
Merge pull request #5597 from Tathorack/add-renesas-rx64-rx72-sha-support
...
Add RX64/RX71 SHA hardware support
2023-03-03 13:14:32 -08:00
Rhys Hansen
4d81a06557
Update comment format and other minor changes
2023-03-03 13:57:44 -06:00
David Garske
d955ec8d54
Merge pull request #6156 from jpbland1/revert-zephyr-relocation
...
move the zephyr folder back to it's correct location
2023-03-03 11:19:35 -08:00
David Garske
9a597a098b
Merge pull request #6158 from miyazakh/initial_dec
...
fix init var in for-loop
2023-03-03 08:40:55 -08:00
jordan
51dbb44799
Fix ASN1_STRING leak in create_by_NID and create_by_txt
2023-03-03 08:22:35 -06:00
Hideki Miyazaki
0693b66c44
fix init var in for-loop
2023-03-03 17:51:34 +09:00
John Bland
b146830fe8
move the zephyr folder back to it's correct location
2023-03-02 23:40:12 -05:00
David Garske
4ebc896231
Merge pull request #6095 from SparkiDev/aes_gcm_win_asm
...
Aes gcm win asm
2023-03-02 15:02:55 -08:00
Sean Parkinson
a8723f71cb
Merge pull request #6154 from kaleb-himes/wolfmikey-w-fips-140-3
...
Allow building of sakke as external non-FIPS algorithm with wolfmikey product
2023-03-03 08:18:40 +10:00
David Garske
03948fd3ae
Merge pull request #6140 from JacobBarthelmeh/seco
...
Fix AES-ECB with SECO
2023-03-02 13:43:15 -08:00
David Garske
41a9b1148f
Merge pull request #6152 from philljj/spelling_cleanup
...
Used codespell and fixed obvious typos in src and wolfssl.
2023-03-02 11:39:45 -08:00
David Garske
871754b97c
Merge pull request #6153 from bandi13/fixZD15705
...
Fix memory leak
2023-03-02 11:39:03 -08:00
kaleb-himes
7ca4b1bc66
Allow building of sakke as external non-FIPS algorithm with wolfmikey product
2023-03-02 11:30:56 -07:00
Juliusz Sosinowicz
7baddb04f8
Check for circular dependencies in compatibility headers ( #6091 )
...
* Check for circular dependencies in compatibility headers
* Run header check only when ENABLED_OPENSSLEXTRA
* Add missing include
* Pedantic compilers don't like empty translation units
* Fix macro guards
2023-03-02 08:51:13 -08:00
Andras Fekete
406d8753be
Fix memory leak
2023-03-02 11:15:32 -05:00
jordan
409ed6232a
Used codespell and fixed obvious typos in src and wolfssl.
2023-03-02 09:52:07 -06:00
JacobBarthelmeh
9a54cea78b
Fix AES-ECB with SECO
2023-03-02 07:55:05 -07:00
JacobBarthelmeh
3f7109c18b
Merge pull request #6147 from dgarske/cpp17
...
Fixes for building with C++17
2023-03-02 07:46:35 -07:00
Sean Parkinson
126805183c
Merge pull request #6150 from douzzer/20230301-fix-async-and-mips-and-kcapi
...
20230301-fix-async-and-mips-and-kcapi
2023-03-02 13:10:26 +10:00
Daniel Pouzzner
98c1b152a0
wolfssl/openssl/sha.h: fix undersized WOLFSSL_SHA384_CTX to have same size as WOLFSSL_SHA512_CTX (fixes failed assert in fips-140-3-dev-kcapi-opensslextra-build).
2023-03-01 17:55:02 -06:00
Daniel Pouzzner
24a1c171ea
wolfssl/wolfcrypt/settings.h: define WOLFSSL_SP_INT_DIGIT_ALIGN when target is MIPS, to fix a crash in sp_read_unsigned_bin().
2023-03-01 17:52:46 -06:00
Daniel Pouzzner
51339edf47
wolfcrypt/src/asn.c: fix WOLFSSL_ASYNC_CRYPT codepath in SignCert() -- fall through to non-async certSignCtx_lcl for algs without async support.
2023-03-01 17:51:25 -06:00
Daniel Pouzzner
6a7674a146
wolfcrypt/test/test.c: improve strerror_r() flavor sensing (simpler gate randomly provoked cppcheck-all-async-quic).
2023-03-01 17:50:00 -06:00
David Garske
63b049814b
Merge pull request #6136 from SparkiDev/armv7_aes_no_reloc_text
...
ARMv7a AES asm: don't have relocatable text
2023-03-01 14:36:41 -08:00
David Garske
5de15fedee
Merge pull request #6132 from bandi13/moreContainerSupport
...
More container support
2023-03-01 13:57:04 -08:00
David Garske
17ad27c350
Fixes for building with C++17. Adds new USE_CPLUSPLUS_BYTE build option to use std::byte as byte to avoid redefinition issues when customer application sets default namespace to "std" or wants to use "byte".
...
Tested using `./configure CC="g++ -std=c++17" --enable-all && make check`.
2023-03-01 12:49:47 -08:00
David Garske
7d049aa90a
Merge pull request #6141 from SparkiDev/cert_name_enc_fix
...
Cert name encoding fix
2023-02-28 17:36:22 -08:00
Sean Parkinson
3aa1ef5907
ARMv7a AES asm: don't have relocatable text
...
For FIPS hash, don't have relocatable text in ARMv7's AES assembly code.
2023-03-01 11:32:00 +10:00
David Garske
91d77393b9
Merge pull request #6110 from SparkiDev/sp_small_stack
...
SP: WOLFSSL_SP_SMALL_STACK
2023-02-28 17:17:58 -08:00
David Garske
aa8d3df8dd
Merge pull request #6137 from SparkiDev/rsa_enc_no_pad
...
RSA padding - no pad length check fix
2023-02-28 17:17:05 -08:00
Sean Parkinson
d1b8386d36
Cert name encoding fix
...
Only include extra name entries once when encoding.
Fix certDefaultName to not have \0 on strings of extra names.
2023-03-01 10:01:54 +10:00
Sean Parkinson
2a33f24dc9
RSA padding - no pad length check fix
...
Perform correct length check of input bytes based on bits in key in
wc_RsaPad_ex when no padding to be done.
2023-03-01 09:42:39 +10:00
Sean Parkinson
cc8493668b
SP: WOLFSSL_SP_SMALL_STACK
...
Defined when WOLFSSL_SMALL_STACK and !WOLFSSL_SP_NO_MALLOC or on
configuration line as an option to --enable-sp: smallstack.
2023-03-01 09:35:05 +10:00
Daniel Pouzzner
47aad3fedb
Merge pull request #6138 from dgarske/pkcs7_async
...
Fix for PKCS7 with asynchronous crypto enabled
2023-02-28 17:24:56 -06:00
David Garske
2420d5d3b6
Merge pull request #6144 from kareem-wolfssl/zd15741Gh6142
...
Fix for PIC32 crypto HW and unused `TLSX_SetResponse`
2023-02-28 15:10:37 -08:00
David Garske
be6fb0c26f
Merge pull request #6145 from bandi13/x509_sign_test_fix
...
Fix `test_wolfSSL_X509_sign` expected size
2023-02-28 15:10:21 -08:00
Andras Fekete
aff4d4a7d3
The size of the packet could vary by up to 5 bytes
2023-02-28 17:04:40 -05:00
Kareem
08a3e2cb6e
Avoid building TLSX_SetResponse unless it is being used. Initialize PIC32 UPDPTR register in all cases.
2023-02-28 14:37:45 -07:00
David Garske
58236632ca
Fix for PKCS7 with asynchronous crypto enabled. The addition of the devId field will attempt to leverage crypto callbacks and async hardware, so convert WC_PENDING_E to blocking.
2023-02-28 13:22:39 -08:00
Daniel Pouzzner
b133f6bbf7
20230223-refactor-test-c-error-codes ( #6135 )
...
* wolfcrypt/test/test.{c,h}: refactor to capture and encode error retvals using WC_TEST_RET_*() macros (based on line numbers), and print line and return code in err_sys().
* wolfcrypt/test/test.h: cast back to int in WC_TEST_RET_ENC(), to fix MSVC warning.
* configure.ac: add shake128 and shake256 to enable-all and enable-all-crypto;
* wolfcrypt/benchmark/benchmark.c: fix gating for bench_shake128() from !defined(WOLFSSL_NO_SHAKE128) to defined(WOLFSSL_SHAKE128).
* wolfcrypt/test/test.h: add WC_TEST_RET_TAG_* and WC_TEST_RET_DEC_TAG(), and refactor WC_TEST_RET_{ENC,DEC}_*() macros to implement the tag mechanism;
* add render_error_message() with tag-specific rendering of error strings;
* wolfcrypt/test/test.c: smallstack refactor of shake128_test() and shake128_absorb_test();
* wolfcrypt/test/test.c: change gating around mp_test() and related routines from defined(HAVE_VALGRIND) to defined(WOLFSSL_PUBLIC_MP);
* smallstack refactor of mp_test();
* refactor a slew of WC_TEST_RET_ENC_NC associated with XFOPEN/XFREAD to be WC_TEST_RET_ENC_ERRNO, and add error detection for XFREAD (previously silently tolerating zero retvals).
* wolfcrypt/test/test.c: build mp_test() only if WOLFSSL_SP_MATH_ALL or USE_FAST_MATH (in addition to WOLFSSL_PUBLIC_MP), because many general purpose functions such as sp_mulmod() are gated out in SP builds without WOLFSSL_SP_MATH_ALL.
* wolfcrypt/test/test.c: fix array bounds flubs in shake128_test();
* don't print_fiducials() in wolfcrypt_test() header, but rather, after render_error_message() in err_sys().
* wolfcrypt/test/test.{c,h}: wrap some overlong lines, and fix an unused-variable warning in mp_test_set_is_bit().
* wolfcrypt/test/test.c: fixes for several misplaced and several missing WC_TEST_RET_ENC_EC()s.
2023-02-28 13:02:37 -08:00
Andras Fekete
41ce9afef4
Better dependency list
...
Need 32bit compilation support as well as ARM/AARCH64
2023-02-28 11:19:09 -05:00
Andras Fekete
7b96cd2220
Switch out gcc-multilib for more modern multiarch
2023-02-28 09:29:23 -05:00
Sean Parkinson
397537e691
AES-GCM: MSVC use generated assembly instead of inline
...
AES-GCM for MSVC was using inline assembly.
Add MSVC version of AES-GCM assembly and use it instead.
Removed inline assembly.
2023-02-28 14:56:29 +10:00
David Garske
79eaf10041
Merge pull request #6139 from bandi13/fixOpenVpn
...
Attempt to fix build error
2023-02-27 17:56:26 -08:00
Sean Parkinson
c7b4bb1b27
Merge pull request #6128 from tim-weller-wolfssl/zd15454-benchmark-windows-update
...
Update wolfCrypt benchmark windows build files to support x64 Platform
2023-02-28 08:28:20 +10:00
Andras Fekete
2cbf5435c6
Attempt to fix build error
2023-02-27 17:07:13 -05:00
David Garske
950e0d100a
Merge pull request #6133 from philljj/zd15662
...
Fix malloc of zero size in fast_s_mp_sqr and fast_s_mp_mul_digs.
2023-02-27 10:47:29 -08:00
David Garske
12ccd01127
Merge pull request #6131 from anhu/STM32_kyber
...
Changes that make kyber work on STM32
2023-02-27 08:14:02 -08:00
Anthony Hu
49ae7d4845
Make old compilers happy.
2023-02-24 17:13:47 -05:00
JacobBarthelmeh
041d9c4510
Merge pull request #6130 from gojimmypi/Espressif_OpenSSL_interim
...
fix WOLFSSL_SHA_CTX for OpenSSL w/Espressif HW hash
2023-02-24 14:58:08 -07:00
David Garske
f3f2f6ccb9
Merge pull request #6126 from tmael/rpm_fix
...
Fix RPM build
2023-02-24 13:35:52 -08:00
Tim Weller
fd3d8c407d
Update wolfCrypt benchmark Windows / Visual Studio build files to include x64 Configuration/Platform combinations (e.g. Debug-x64) and fixed compilation errors in benchmark.c related to conditional-compilation.
2023-02-24 11:53:01 -06:00
David Garske
469226f214
Merge pull request #6107 from anhu/ecc_pub
...
Fixes for encoding/decoding ecc public keys.
2023-02-24 08:36:15 -08:00
jordan
22b1857bee
Fix malloc of zero size in fast_s_mp_sqr and fast_s_mp_mul_digs.
2023-02-24 10:18:36 -06:00
Andras Fekete
392ddd1b4a
Remove conflicts
2023-02-24 10:38:35 -05:00
David Garske
b1f421d0a6
Improve the "adder" for compatibility layer SHA context when hardware acceleration is used.
2023-02-24 07:28:15 -08:00
gojimmypi
aef44ff029
fix WOLFSSL_SHA_CTX for OpenSSL w/Espressif HW hash
2023-02-24 07:20:55 -08:00
Andras Fekete
d98dd53f55
Add one more utility
2023-02-24 09:48:15 -05:00
Andras Fekete
62748ba451
One more liboqs flag
2023-02-24 09:47:47 -05:00
Andras Fekete
559db5f314
Build liboqs for distribution
...
This makes it possible to use the library on same architecture but different processor type.
2023-02-24 09:47:47 -05:00
Andras Fekete
2b96f4bd16
Add in liboqs
2023-02-24 09:47:47 -05:00
Andras Fekete
87b7988643
Add cross compilers
2023-02-24 09:47:24 -05:00
Anthony Hu
1fcff5b30d
Changes that make kyber work on STM32
...
(wolfcrypttest and benchmark)
2023-02-24 04:08:07 -05:00
David Garske
b2a6203ec0
Merge pull request #6129 from SparkiDev/ed25519_doc_fix
...
Ed25519 doxygen update
2023-02-23 19:53:41 -08:00
Sean Parkinson
695aa2e6a0
Ed25519 doxygen update
...
Fix return comments to match code.
2023-02-24 08:54:16 +10:00
Anthony Hu
c2daca1393
Fixes for encoding/decoding ecc public keys.
2023-02-23 13:56:48 -05:00
Anthony Hu
d85ee5c87f
Merge pull request #6124 from embhorn/zd15573
...
Fix NID conflict NID_givenName and NID_md5WithRSAEncryption
2023-02-23 18:15:28 +00:00
David Garske
69ceedbcff
Merge pull request #5938 from JacobBarthelmeh/RT1170
...
Port to RT1170 and expand CAAM driver
2023-02-22 20:11:58 -08:00
David Garske
ffa392cdb5
Merge pull request #6125 from embhorn/gh6007
...
Include sys/time.h for WOLFSSL_RIOT_OS
2023-02-22 16:06:10 -08:00
David Garske
434e869b1d
Merge pull request #6109 from nunojpg/master
...
Fix out of bound memset to 0
2023-02-22 15:43:09 -08:00
David Garske
a8b8092ff8
Merge pull request #6122 from anhu/WOLFSSL_HAVE_KYBER
...
HAVE_KYBER --> WOLFSSL_HAVE_KYBER
2023-02-22 14:55:29 -08:00
JacobBarthelmeh
121ee7a6df
fix spelling, refactor openssl extra struct, remove magic number, use static mutex
2023-02-22 14:31:16 -08:00
David Garske
2e7713f4c2
Merge pull request #6120 from embhorn/zd15698
...
Fix NULL dereference in TLSX_CSR_Parse
2023-02-22 13:43:43 -08:00
Eric Blankenhorn
3d71d3c388
Include sys/time.h for WOLFSSL_RIOT_OS
2023-02-22 15:36:50 -06:00
Eric Blankenhorn
b32036258d
Fix NID conflict NID_givenName and NID_md5WithRSAEncryption
2023-02-22 15:02:52 -06:00
Anthony Hu
bd3ae97603
HAVE_KYBER --> WOLFSSL_HAVE_KYBER
2023-02-22 15:05:47 -05:00
JacobBarthelmeh
b801a96f8c
Port to RT1170 and expand CAAM driver
2023-02-22 08:26:25 -08:00
Eric Blankenhorn
0a928208f2
Fix NULL dereference in TLSX_CSR_Parse
2023-02-22 08:19:11 -06:00
Sean Parkinson
b81759173a
Merge pull request #5840 from kareem-wolfssl/dynSessCache2
...
Add dynamic session cache which allocates sessions from the heap.
2023-02-22 15:14:38 +10:00
David Garske
74bad76707
Merge pull request #6117 from SparkiDev/priv_key_id_fix
...
Private Key ID: change to always set priv key type and size
2023-02-21 19:23:51 -08:00
Sean Parkinson
05365f6052
Merge pull request #6116 from dgarske/various2
...
Cleanup function logging
2023-02-22 12:27:26 +10:00
Tesfa Mael
bfcc615e44
Fix rpm build
2023-02-21 15:02:10 -08:00
Sean Parkinson
39cfd8e566
Private Key ID: change to always set priv key type and size
...
When a certificate is loaded then the private key type and size is set
based on the public key.
Always set, even if previously set.
Use case is setting an RSA certificate against ctx and then setting EC
certificate against ssl.
2023-02-22 08:07:27 +10:00
Rhys Hansen
fa41754b83
RX64/RX71 SHA hardware support updates
...
Made the following updates based on review feedback
Fixed mixed variable declaration and simplified cases by typedefing
wolfssl_RX64_HW_Hash to wc_Sha, wc_Sha224, & wc_Sha256
Added files to include.am so they are built when using make
Add WOLFSSL_RENESAS_RX64_HASH to settings.h and set WOLFSSL_NO_HASH_RAW
in settings.h based on value of WOLFSSL_RENESAS_RX64_HASH
Add and handle return value for rx64_hw_Open
Fix some minor formatting and comments
2023-02-21 15:46:25 -06:00
Rhys Hansen
e47633ad83
Add RX64/RX71 SHA hardware support
...
Adding support for SHA1, SHA224, and SHA256 hardware acceleration on
Renesas RX64 and RX71 microcontrollers.
This follows the a similar pattern as the Renesas TSIP support.
Speed comparison for hashing 64KB of data on a RX64M
| Hash Speed | SHA1 | SHA256 |
|:----------:|:----:|:------:|
| Hardware | 4ms | 4ms |
| Software | 11ms | 89ms |
Update define for RX64/RX71 SHA hardware support
This will allow for different hardware acceleration modules to be
enabled individually.
Init & Close for the RX64/RX71 SHA subsystem for WolfCrypt
This ensures that the SHA subsystem is ready for use when WolfCrypt
needs access to it.
Shorten the max line length, clean up comments
This wraps code and comments at 80 characters and adds some comments
2023-02-21 15:46:17 -06:00
David Garske
fc6d693dae
Update logging enter, exit, msg to match function names. Fix some typos and improper use of "enter". Fix internal uses of SSL_SUCCESS and SSL_FAILURE. Add WOLFSSL_DEBUG_NONBLOCK option to allow printing iterations without debug enabled.
2023-02-21 12:02:15 -08:00
JacobBarthelmeh
da04e0fb4c
Merge pull request #6115 from SKlimaRA/SKlimaRA/fix-decompress-dynamic
...
fixed heap corruption
2023-02-21 11:58:11 -07:00
Anthony Hu
a6114afb84
Merge pull request #6114 from dgarske/stm32_hash
...
Fix for STM32 hashing hardware
2023-02-21 18:37:03 +00:00
gojimmypi
821120e31c
Add SHA512/224 and SHA512/256 benchmarks ( #6113 )
2023-02-21 09:27:03 -08:00
Stanislav Klima
208056b2da
fixed heaap corruptions
2023-02-21 11:01:50 +01:00
Daniel Pouzzner
e0abb0e306
Merge pull request #6097 from gojimmypi/New_SHA512_Tests
...
Add new SHA-512/224 and SHA-512/256 tests
2023-02-21 01:39:38 -06:00
David Garske
6820fea5d3
Merge pull request #6111 from SparkiDev/sp_point_add_fix
...
SP: fix point_add_qz1
2023-02-20 17:05:21 -08:00
gojimmypi
136267d29c
Add new SHA-512/224 and SHA-512/256 tests
2023-02-20 16:55:38 -08:00
David Garske
5ec62c8d48
Merge pull request #6096 from SparkiDev/armv7a_neon_config
...
ARMv7a neon configure.ac
2023-02-20 15:22:20 -08:00
David Garske
39e72630ce
Proper fix for STM32 hashing. FIFO is always 32 bytes. The original U5/H7 proper fix is to make sure the hash is "done" before saving state.
2023-02-20 15:14:44 -08:00
András Fekete
c055740e6a
Merge pull request #6100 from julek-wolfssl/stunnel-github-action-test
...
Add OSP github action
2023-02-20 15:41:58 -05:00
Juliusz Sosinowicz
261054896c
Actions fix
...
Fix for `workflows must be defined at the top level of the .github/workflows/ directory` error.
2023-02-20 18:42:47 +01:00
Juliusz Sosinowicz
8b7ea9e820
Refactor os-check.yml
2023-02-20 18:42:47 +01:00
Juliusz Sosinowicz
04cc85b31e
Separate out into different files
2023-02-20 18:29:41 +01:00
Juliusz Sosinowicz
d3551acc2b
Code review
2023-02-20 18:29:41 +01:00
Juliusz Sosinowicz
36df1e1ae9
Add OSP github action
2023-02-20 18:29:41 +01:00
Sean Parkinson
9a7cd7367a
SP: fix point_add_qz1
...
Better detection of when add won't work and double needed.
Minor reorg of point operations.
2023-02-20 21:53:52 +10:00
Nuno Gonçalves
4e6bad1225
Fix out of bound memset to 0
...
In case buf size sz is too small it will get updated to the larger required value
and can't be used anymore to clear the buffer.
As the buffer is untouched don't need to clear it anyway.
Signed-off-by: Nuno Gonçalves <nunojpg@gmail.com >
2023-02-18 10:40:21 +00:00
Daniel Pouzzner
6cc5c1a428
Merge pull request #6102 from dgarske/non_const
...
Fix for "expression must have a constant value" in tls13.c
2023-02-17 21:07:27 -06:00
David Garske
1bae1ef63e
Merge pull request #6101 from kaleb-himes/invalid-pp-macro
...
Fix invalid PP macro logic, guard under same conditions as internal.h
2023-02-17 17:05:50 -08:00
Chris Conlon
588b694c7d
Merge pull request #5709 from TakayukiMatsuo/ccv
2023-02-17 17:02:04 -07:00
Kareem
8de2eba9ab
Fix allocating new sessions using the dynamic session cache.
2023-02-17 15:25:12 -07:00
David Garske
c476dd6e28
Merge pull request #6103 from SparkiDev/sp_ecdsa_sig_r0
...
SP ECC sign: reject random k when r is 0
2023-02-17 13:58:53 -08:00
David Garske
8a6483f13a
Merge pull request #6080 from tim-weller-wolfssl/zd15632-oob-in-cert-parsing
...
zd15632 - OSS-Fuzz #55810 : Out-of-bounds read in certificate parsing
2023-02-17 12:08:11 -08:00
David Garske
4edb7e26b9
Merge pull request #6104 from douzzer/20230216-readability-redundant-preprocessor
...
20230216-readability-redundant-preprocessor
2023-02-17 10:31:27 -08:00
David Garske
24fd561bf8
Merge pull request #6099 from bandi13/ocsp-cleanup
...
Be more aggressive in killing processes
2023-02-17 09:28:14 -08:00
Daniel Pouzzner
21645460cd
src/tls13.c: fix a readability-redundant-preprocessor in CheckPreSharedKeys().
2023-02-16 23:37:43 -06:00
Sean Parkinson
26b7052b3f
SP ECC sign: reject random k when r is 0
...
SP ECC signing code was generating signatures with r of 0.
This is not allowed by the algorithm description.
Retry sig gen when r is 0 like when s is 0.
2023-02-17 08:55:59 +10:00
David Garske
d488693f15
Allow #define HAVE_LIBZ support in user_settings.h.
2023-02-16 14:20:57 -08:00
David Garske
82d65481bb
Fix for "expression must have a constant value" in tls13.c with GreenHills compiler.
2023-02-16 13:58:48 -08:00
kaleb-himes
b2caa5c5ae
Fix invalid PP macro logic, guard under same conditions as internal.h
2023-02-16 14:40:43 -07:00
David Garske
0b31d5577c
Merge pull request #6098 from bandi13/moreDockerprograms
...
Some tests need these utilities
2023-02-16 13:28:02 -08:00
Andras Fekete
fdb0338473
Be more aggressive in killing processes
2023-02-16 09:55:52 -05:00
Andras Fekete
ff96150404
Some tests need these utilities
2023-02-16 09:51:46 -05:00
tim-weller-wolfssl
dea123f88e
Minimal changes to avoid Out-of-Bounds write in ASN.1 parsing logic. Add unit tests for ParseCert() API passing badly formed ASN data (should error out gracefully).
2023-02-16 07:49:08 -06:00
David Garske
0a6dedab03
Merge pull request #6094 from SparkiDev/aes_gcm_stream_bench
...
AES GCM benchmark: separate aes-gcm streaming runs
2023-02-15 21:10:48 -08:00
David Garske
464c2d19dc
Merge pull request #6006 from SparkiDev/tls13_only_psk_dhe_ke
...
TLS 1.3 PSK: add option to require only PSK with DHE
2023-02-15 21:10:27 -08:00
Daniel Pouzzner
859b1ff398
Merge pull request #6093 from dgarske/fix_async
...
Fix issue with async and `WOLFSSL_CHECK_ALERT_ON_ERR`
2023-02-15 19:49:56 -06:00
Sean Parkinson
aaed553311
Merge pull request #6092 from dgarske/various
...
Various cleanups (STM docs, include case, make dist small script)
2023-02-16 11:23:51 +10:00
Kareem
1167ad623b
Dynamic session cache: code review feedback
2023-02-15 17:38:14 -07:00
Sean Parkinson
85314e6ba5
ARMv7a neon configure.ac
...
Support other CPUs that start with armv7a.
2023-02-16 10:36:38 +10:00
Sean Parkinson
195ca1a20a
AES GCM benchmark: separate aes-gcm streaming runs
...
Always to AES-GCM one-shot benchmark.
When WOLFSSL_AESGCM_STREAM, always perform AES-GCM streaming benchmark.
2023-02-16 09:37:00 +10:00
Sean Parkinson
b624fc8377
TLS 1.3 PSK: add option to require only PSK with DHE
...
Can specify only PSK without DHE.
Add only PSK with DHE.
2023-02-16 09:21:29 +10:00
David Garske
18bee3142d
Fix to use the right cert/key in the API unit test if overridden.
2023-02-15 14:57:43 -08:00
David Garske
e8a26c673a
Fix for async with WOLFSSL_CHECK_ALERT_ON_ERR.
2023-02-15 14:57:34 -08:00
David Garske
47801107da
Fix to make sure API unit test always calls init/cleanup when not running all tests.
2023-02-15 14:24:22 -08:00
David Garske
5481a059c4
Fix wincrypt.h include header case when used with case sensitive file system.
2023-02-15 11:44:34 -08:00
David Garske
6ea3fe2f7a
Merge pull request #6089 from kaleb-himes/stunnel-5_67_support_fix
...
Fix unused variable warning when configuring with --enable-apachehttpd
2023-02-15 08:39:30 -08:00
Sean Parkinson
089ef86587
Merge pull request #6090 from douzzer/20230214-mollify-iso-c-pedantic
...
20230214-mollify-iso-c-pedantic
2023-02-15 17:04:07 +10:00
Daniel Pouzzner
ca87a99646
src/ssl.c and src/x509.c: use the customary function pointers (WOLFSSL_CRYPTO_EX_*()), not void *, in the arg lists of wolfSSL_CTX_get_ex_new_index() and wolfSSL_X509_get_ex_new_index(), to avoid "ISO C forbids passing argument ... between function pointer and ‘void *’";
...
move typedefs for WOLFSSL_CRYPTO_EX_*() from wolfssl/openssl/compat_types.h to wolfssl/wolfcrypt/types.h, grouped with the other EX_DATA-related typedefs, as they are needed whenever defined(HAVE_EX_DATA) regardless of openssl compatness;
properly gate wolfSSL_CTX_get_ex_new_index() and wolfSSL_X509_get_ex_new_index() prototypes on defined(HAVE_EX_DATA).
2023-02-14 19:28:40 -06:00
David Garske
7e582932f3
Improve documentation for STM32 PKA support.
2023-02-14 14:27:05 -08:00
David Garske
100ec1e7e6
Fix ./scripts/makedistsmall.sh for Docker and RTOS.
2023-02-14 14:25:40 -08:00
Kaleb Himes
dead56b3cb
Merge pull request #6086 from julek-wolfssl/explicit-rwlock
...
Make rwlock an explicit enable option
2023-02-14 15:04:13 -07:00
kaleb-himes
2719943ffd
Fix unused variable warning when configuring with --enable-apachehttpd
2023-02-14 14:25:57 -07:00
Juliusz Sosinowicz
0cedc4e1ac
stunnel 5.67 support ( #6020 )
...
* stunnel 5.67 support
- ssl->session->ticketAdd may be set when parsing a ticket before PSK
- PSK binders should be calculated based on ciphersuite associated with PSK
- Add option to prioritise PSK order instead of ciphersuite order
- Update ctx->method->version when using Set_CTX_max_proto_version API
- Simplify wolfSSL_parse_cipher_list
- Keep copy of old list and then add in the previous ciphersuites depending on whether we are doing only TLS 1.3 ciphersuites or not
- Specify CRL revocation in alert
- Match reason string to match OpenSSL
- Add support for external data callbacks for WOLFSSL_SESSION
* Upref the session for stunnel instead of duplicating it
* Add small stack option for wolfSSL_parse_cipher_list
2023-02-14 09:38:28 -08:00
tmael
c4fa013800
Fix for BIO_reset() ( #5887 )
...
* Fix for BIO_reset
* Introduced BIO_FLAGS_MEM_RDONLY
2023-02-14 08:54:25 -08:00
Juliusz Sosinowicz
bcfd5fb66b
Make rwlock an explicit enable option
2023-02-14 13:55:59 +01:00
Sean Parkinson
2fe34facba
Merge pull request #6084 from philljj/zd15607
...
Check keyLen matches cipher in wolfSSL_CMAC_Init.
2023-02-14 12:51:20 +10:00
David Garske
6e21b8c907
Merge pull request #6085 from anhu/env_shell
...
Invoke shell for shell scripts.
2023-02-13 14:53:47 -08:00
gojimmypi
ed79545a27
Espressif examples run with local wolfSSL (no setup!) ( #6018 )
...
* Espressif examples run with local wolfSSL (no setup!)
* include.am Espressif local no-setup component files
* cleanup Espressif Example CMakeLists.txt, use function
* multiple wolfSSL installs is now a fatal Espressif build error
* Examples no longer need setup
* CompileAll builds local examples, not IDF_PATH ones
* Espressif compileAllExamples both local & ESP-IDF components
* add wolfssl_test_idf test project
* move VisualGDB projects to subdirectories
* move VisualGDB wolfssl_server to subdirectory
* update include.am for moved VisualGDB project files
2023-02-13 14:37:56 -08:00
David Garske
6877c98d82
Merge pull request #6081 from douzzer/20230211-wolfcrypttest-fixes
...
20230211-wolfcrypttest-fixes
2023-02-13 14:28:43 -08:00
Anthony Hu
eedc8fa0b3
Invoke shell for shell scripts.
2023-02-13 15:58:15 -05:00
Daniel Pouzzner
a945017a88
wolfcrypt/test/test.c: around ecc_ctx_kdf_salt_test(): fix fips gating, fix length handling for "message", fix memory leaks;
...
in crypto_ecc_verify(), crypto_ecc_sign(), ecc_test_nonblock_dhe(), and ecc_test_nonblock_ecdsa(), add codepoint-specific retvals.
2023-02-13 14:21:50 -06:00
David Garske
405b98aaa4
Merge pull request #6078 from SparkiDev/rsapss_openssl_compat
...
X509 RSA PSS: fixes for OpenSSL compat layer
2023-02-13 08:43:10 -08:00
Daniel Pouzzner
295da3232a
Merge pull request #6082 from SparkiDev/asn_dsa_mp_int_leak
...
ASN template, DSA: Clear the mp_int before re-reading data
2023-02-12 22:28:11 -06:00
Sean Parkinson
0a8753d2b2
ASN template, DSA: Clear the mp_int before re-reading data
...
Make sure the mp_int is cleared so that any exisiting bigint is freed.
Tidy up api.c code.
2023-02-13 11:08:18 +10:00
jordan
909aa86d2d
Check keyLen matches cipher in wolfSSL_CMAC_Init.
...
Fixes ZD15607.
2023-02-12 18:26:40 -06:00
Kareem
5a77db3f20
Add dynamic session cache which allocates sessions from the heap.
2023-02-10 14:18:03 -07:00
tmael
55a7e24cfe
Support pthread_rwlock ( #5952 )
...
* Support rwlock
* Fix typo, ENABLE_SESSION_CACHE_ROW_LOCK with TITAN_SESSION_CACHE
* Implement read lock
- Use read lock for the SessionCache
- Don't copy the
* TLS 1.3: Don't push ticket to cache if we don't retrieve from it
* Detect rwlock support with PTHREAD_RWLOCK_INITIALIZER
* Implement explicit rwlocks
- Mutex's still necessary for signals. Implement explicit rwlocks and we can migrate critical mutexs to rwlocks when necessary.
* Remove WOLFSSL_USE_RWLOCK guard around mutex condLock
* condLock not necessary after all
* Use configure.ac to check for pthread_rwlock_destroy support
* Can't include config.h in wc_port.h as that breaks make distcheck
* Check for pthread_rwlock_t to determine if rwlock is available
* Code review
---------
Co-authored-by: Juliusz Sosinowicz <juliusz@wolfssl.com >
2023-02-10 10:42:38 -08:00
John Bland
338d8db274
Ecc ctx state fix ( #6077 )
...
* set the client state correctly when wc_ecc_ctx_set_kdf_salt is called
* add test that covers wc_ecc_ctx_set_kdf_salt
* use shared key and smallstack to reduce test stack usage
2023-02-10 10:05:52 -08:00
philljj
5b8fda1ac6
Fix overflow in fp_to_unsigned_bin_len length check. ( #6075 )
...
* Fix overflow in fp_to_unsigned_bin_len length check.
* Add a second check when i == a->used - 1.
2023-02-10 08:46:37 -08:00
TakayukiMatsuo
0c771a93dc
Improve TLS1.2 client authentication to use TSIP
2023-02-10 16:16:25 +09:00
Daniel Pouzzner
c2384674d8
Merge pull request #6079 from SparkiDev/aes-ecb-len-aesni
...
AES ECB/CTR/XTS: enable AES-NI usage
2023-02-09 21:17:50 -06:00
Sean Parkinson
b359dd27e4
AES ECB/CTR/XTS: enable AES-NI usage
...
Perform multiple blocks of encryption/decryption in assembly call with
ECB.
This improves performance of ECB, CTR and XTS on Intel x64.
2023-02-10 11:14:06 +10:00
Sean Parkinson
9750fc4485
X509 RSA PSS: fixes for OpenSSL compat layer
...
Add NIDs for RSA-PSS to OpenSSL compat layer.
Have wc_RsaPublicKeyDecode call wc_RsaPublicKeyDecode_ex where logic for
RSA-PSS handling is already done.
2023-02-10 10:25:49 +10:00
Hideki Miyazaki
d336e22b85
Allow reading ENC EC PRIVATE KEY as well via wolfSSL_PEM_read_bio_ECPrivateKey ( #6055 )
...
* fix qt qsslkey unit test
2023-02-09 14:48:52 -08:00
Sean Parkinson
7a6f7ff6b7
Merge pull request #6076 from dgarske/fix_async
...
Fix for possible uses of NULL with heap hint in pk.c
2023-02-10 08:26:44 +10:00
David Garske
8929b31b84
Fix for possible uses of NULL in heap hint. The api.c has expected "bad" test cases where the key is passed in as NULL and the XFREE tries to use it. Tested with: ./configure --enable-asynccrypt --with-intelqa=../QAT1.8 --enable-all && make && sudo ./tests/unit.test
2023-02-09 10:18:37 -08:00
David Garske
05f8abd524
Merge pull request #6064 from embhorn/gh6063
...
Add WOLFSSL_IP_ALT_NAME to --enable-curl; fix unused error in FindPsk
2023-02-09 08:38:38 -08:00
Sean Parkinson
644d92f28c
Merge pull request #6074 from douzzer/20230208-fixes
...
20230208-fixes
2023-02-09 16:18:35 +10:00
Daniel Pouzzner
9dd23fca25
wolfcrypt/src/pwdbased.c: refactor copy in scryptSalsa() as a memcpy(), for efficiency and to work around a bug in clang-17; also fix scratch buffer x in scryptBlockMix() to have correct alignment.
2023-02-08 21:31:56 -06:00
Daniel Pouzzner
63fdc4e843
src/ssl.c: fix PK object on stack in wolfSSL_i2d_PublicKey().
2023-02-08 21:30:50 -06:00
Daniel Pouzzner
ef0eda4091
cleaner fix for bugprone-signed-char-misuse first addressed in 38c057a084.
2023-02-08 21:28:34 -06:00
Sean Parkinson
49a500c2af
Merge pull request #6070 from bandi13/coverityFixes
...
Coverity fixes
2023-02-09 10:21:12 +10:00
Sean Parkinson
008d2962d7
Merge pull request #6072 from bandi13/dsaNoInit
...
Fix for calling 'mp_clear(tmp)' without having called 'mp_init(tmp)'
2023-02-09 10:18:51 +10:00
John Bland
e9aeb1a857
Add nuttx integration ( #6043 )
2023-02-08 16:04:53 -08:00
David Garske
619a587a7b
Merge pull request #6071 from bandi13/extraPackagesForDocker
...
Add in a few more utilities that we need
2023-02-08 14:53:20 -08:00
David Garske
7f9b764eb5
Merge pull request #6054 from anhu/d2i_publickey_fix
...
Ensure that i2d APIs for public keys gives appropriate data.
2023-02-08 14:44:29 -08:00
David Garske
1da392c297
Merge pull request #6069 from philljj/spelling_cleanup
...
Spelling cleanup: configure.ac, ssl.c, ssl.h
2023-02-08 14:40:03 -08:00
Sean Parkinson
7a30617b26
Merge pull request #6073 from dgarske/shake_bench
...
Fix for benchmarking shake with custom block size
2023-02-09 08:06:24 +10:00
Andras Fekete
767c282c1d
Addressing PR comments
2023-02-08 16:35:03 -05:00
Daniel Pouzzner
6a24cdaa42
Merge pull request #6067 from SparkiDev/sp_int_fixup_5
...
SP int: tidy up ifdef
2023-02-08 13:50:50 -06:00
David Garske
cefd55eb74
Fix for benchmarking shake with custom block size. Using ./benchmark -shake 1024 caused seg fault.
2023-02-08 11:25:53 -08:00
Andras Fekete
08c63d55dc
Addressing PR comments
2023-02-08 13:18:13 -05:00
Andras Fekete
38f2f43705
Fix for calling 'mp_clear(tmp)' without having called 'mp_init(tmp)'
2023-02-08 13:08:12 -05:00
Andras Fekete
06d6f2d4b6
One more app for debugging
2023-02-08 11:25:11 -05:00
Andras Fekete
94c01d9f4e
Add in a few more utilities that we need
2023-02-08 10:52:00 -05:00
Anthony Hu
7a6ed68f2d
Ensure that i2d APIs for public keys gives appropriate data.
2023-02-08 09:54:28 -05:00
jordan
cc791a7a53
Spelling cleanup: configure.ac, ssl.c, ssl.h
2023-02-07 21:45:06 -06:00
Sean Parkinson
3e82abd002
SP int: tidy up ifdef
2023-02-08 10:45:00 +10:00
Andras Fekete
62cfd8725a
Disable latest OpenWrt test
2023-02-07 18:17:39 -05:00
Sean Parkinson
1912aaf91b
EC OpenSSL compat: validate point after setting
...
wolfSSL_EC_POINT_set_affine_coordinates_GFp wasn't checking the point is
valid for the curve. Added call to check point when setting.
Made check available for opensslextra.
Fixed test to have valid ordinates to set.
2023-02-07 18:17:39 -05:00
Sean Parkinson
3e445b5ba0
SP int: sp_invmod_mont_ct check err before setting
...
Two places in sp_invmod_mont_ct were not checking err is set before
performing a new operation and setting err. Change to check error before
performing operation.
2023-02-07 18:17:39 -05:00
David Garske
ee12a5f0c6
Merge pull request #6048 from SparkiDev/asn1_template_def
...
ASN: make template default for configure
2023-02-07 14:15:57 -08:00
David Garske
299bee96d2
Merge pull request #6060 from SparkiDev/sp_int_fixes_4
...
SP int: fix sp_div_2 to use signed integer
2023-02-07 14:13:02 -08:00
David Garske
9f5ffe6bd7
Merge pull request #6066 from SparkiDev/int_fast_mont_red_oob
...
integer.c: fast mod reduce fix
2023-02-07 14:12:13 -08:00
Eric Blankenhorn
2539ba3f3d
Add WOLFSSL_IP_ALT_NAME to --enable-curl; fix unused error in FindPsk
2023-02-07 15:51:09 -06:00
David Garske
3ae8bac3b2
Merge pull request #6065 from SparkiDev/ec_point_cmp_jacobian
...
wolfSSL_EC_POINT_cmp: handle Jacobian ordinates
2023-02-07 10:04:37 -08:00
Sean Parkinson
20ae076b80
integer.c: fast mod reduce fix
...
When using small stack, not enough memory uas being allocated in
fast_mp_montgomery_reduce().
Allocate the required space and memset all used memory.
2023-02-07 11:29:53 +10:00
Sean Parkinson
92065b61b3
wolfSSL_EC_POINT_cmp: handle Jacobian ordinates
...
API support doesn't allow for a point to be in Jacobian ordinates.
wolfSSL_EC_POINT_add() has ordinates in Montgomery form.
When needed, compile with WOLFSSL_EC_POINT_CMP_JACOBIAN.
2023-02-07 11:02:50 +10:00
Sean Parkinson
ca0731616f
SP int: fix sp_div_2 to use signed integer
...
sp_div_2 no longer handled a->used of 0 and 1.
Rework to have have internal APIs that don't return errors and use them
where no error is expected.
2023-02-07 08:51:15 +10:00
Sean Parkinson
bd155389e2
ASN: make template default for configure
...
When loading DH private key, create the public key if not found.
Failures fixed.
2023-02-07 08:49:46 +10:00
David Garske
2448adf68b
Merge pull request #6051 from philljj/zd15531
...
Fix wolfSSL_ASN1_INTEGER_to_BN for negative values
2023-02-06 12:46:21 -08:00
David Garske
cc037447dd
Merge pull request #6062 from bandi13/disableOpenWrtSnapshot
...
Disable latest OpenWrt test
2023-02-06 08:06:31 -08:00
Andras Fekete
dc08ecf287
Disable latest OpenWrt test
2023-02-06 11:03:41 -05:00
David Garske
8a212ec351
Merge pull request #6042 from SparkiDev/ec_point_set
...
EC OpenSSL compat: validate point after setting
2023-02-06 07:14:19 -08:00
Sean Parkinson
c9fefe660f
EC OpenSSL compat: validate point after setting
...
wolfSSL_EC_POINT_set_affine_coordinates_GFp wasn't checking the point is
valid for the curve. Added call to check point when setting.
Made check available for opensslextra.
Fixed test to have valid ordinates to set.
2023-02-06 12:22:17 +10:00
David Garske
a8c2a9aeab
Merge pull request #6040 from SparkiDev/sp_invmod_mont_ct_err
...
SP int: sp_invmod_mont_ct check err before setting
2023-02-05 14:17:51 -08:00
David Garske
3cdda2adf0
Merge pull request #6056 from ejohnstown/ssh-kdf-inlines
...
Build Fixes
2023-02-04 10:37:16 -08:00
David Garske
a4ffe085a0
Merge pull request #6052 from rizlik/fix_ret_create
...
fix: propagate WOLFSSL_TICKET_RET_CREATE from DoDecryptTicket()
2023-02-03 17:32:26 -08:00
John Safranek
8e57ff08ab
Build Fixes
...
./configure --enable-wolfssh --enable-cryptonly \
--disable-asn --disable-rsa --disable-ecc
./configure --disable-asn --disable-rsa --disable-ecc --enable-psk
./configure --enable-cryptonly --disable-asn --disable-rsa --disable-ecc
1. Fails compiling the KDF file, can't find c32toa inline function.
2. In configure, move the check for ECC when ASN is disabled up to the
other ASN checks. It also needs to be checked with cryptonly is
disabled.
2023-02-03 16:09:27 -08:00
Marco Oliverio
a9ffbae7af
test: add test to check new ticket is created when resuming
2023-02-03 22:16:06 +00:00
David Garske
646b363e49
Merge pull request #6053 from JacobBarthelmeh/freebsd
...
fix DTLS test case for when able to read peers close notify alert
2023-02-03 14:10:33 -08:00
David Garske
c6018b837d
Merge pull request #6050 from JacobBarthelmeh/time
...
fix warning if ltime is unsigned
2023-02-03 11:06:17 -08:00
JacobBarthelmeh
f55f9bfd36
fix DTLS test case for when able to read peers close notify alert
2023-02-03 11:05:56 -08:00
David Garske
29c884eafd
Merge pull request #6045 from JacobBarthelmeh/PKCS7
...
add sequence around algo parameters with authenvelop
2023-02-03 10:29:19 -08:00
David Garske
1027c0667a
Merge pull request #6049 from SparkiDev/sp_int_used_size
...
SP int: make used and size fields unsigned
2023-02-03 09:38:40 -08:00
Marco Oliverio
a2bf82397a
fix: propagate WOLFSSL_TICKET_RET_CREATE from DoDecryptTicket()
2023-02-03 17:33:24 +00:00
jordan
f61dce8746
Fix wolfSSL_ASN1_INTEGER_to_BN for negative values
...
Added mp_setneg for ZD#15531.
2023-02-03 08:51:46 -06:00
Jacob Barthelmeh
d184a17644
fix warning if ltime is unsigned
2023-02-03 07:43:08 -07:00
Sean Parkinson
3455e726f9
SP int: make used and size fields unsigned
...
used and size have no reason to be negative - change type.
Change code to match unsigned change. Mostly change variables to be
unsigned where possible.
integer.c: Only have mp_rand_prime available when needed and
mp_prime_is_prime_ex is available.
Fixes from regression testing.
2023-02-03 17:09:56 +10:00
David Garske
ef266d7e0b
Merge pull request #6047 from SparkiDev/refinc_ret_check
...
Ref counting: rework for static analysers
2023-02-02 18:46:34 -08:00
David Garske
8ecf6f3381
Merge pull request #6046 from ejohnstown/srtp-marshal
...
SRTP Marshaling
2023-02-02 18:03:31 -08:00
Sean Parkinson
f6da3a26ac
Ref counting: rework for static analysers
...
When always reference counting APIs always return 0 don't check return
value for error.
Reference decrement set isZero to false on error.
2023-02-03 10:13:32 +10:00
John Safranek
ca999f932c
SRTP Marshaling
...
1. Changed the loop over the SRTP setting bitfield when it is encoded
for the TLS extension.
2023-02-02 14:51:12 -08:00
JacobBarthelmeh
9e9315f480
add sequence around algo parameters with authenvelop
2023-02-02 10:54:38 -08:00
David Garske
a4f55b01d6
Merge pull request #6041 from JacobBarthelmeh/seco
...
Fix to mask the argument for enc/dec flag used with GCM/CCM in CAAM+SECO build
2023-02-02 08:32:48 -08:00
Sean Parkinson
447991a9c2
Merge pull request #5949 from JacobBarthelmeh/Testing
...
add pragram around sanity check for vcpkg build warning
2023-02-02 10:34:14 +10:00
Sean Parkinson
55d43a46b8
SP int: sp_invmod_mont_ct check err before setting
...
Two places in sp_invmod_mont_ct were not checking err is set before
performing a new operation and setting err. Change to check error before
performing operation.
2023-02-02 08:45:45 +10:00
JacobBarthelmeh
d76195c52a
add fix GCM use with CAAM SECO
2023-02-01 14:42:39 -08:00
David Garske
087e2dc22a
Merge pull request #6037 from douzzer/20230131-fixes-evp-af-alg
...
20230131-fixes-evp-af-alg
2023-02-01 07:09:02 -08:00
Daniel Pouzzner
a8a61fe6b7
evp.c: fix gating in wolfSSL_EVP_CIPHER_CTX_cleanup() to avoid switch-unreachable; also fix indentation.
2023-02-01 01:29:36 -06:00
Daniel Pouzzner
38c057a084
fix resource leak (missing calls to wc_AesFree()) in wolfSSL_EVP_CIPHER_CTX_cleanup();
...
fix file descriptor leaks in AF_ALG code, and fix return codes (WC_AFALG_SOCK_E, not -1) in afalg_aes.c;
fixes for sanitizer-detected forbidden null pointer args in AfalgHashUpdate() and AfalgHashCopy();
fixes for resource leaks in api.c test_wolfSSL_AES_cbc_encrypt() (missing wc_AesFree()s);
fixes for resource leaks in test.c openssl_test() (missing wolfSSL_EVP_CIPHER_CTX_cleanup());
also some local fixes for bugprone-signed-char-misuse, readability-redundant-preprocessor, and clang-diagnostic-strict-prototypes, in src/pk.c and src/ssl.c.
2023-02-01 00:49:34 -06:00
Anthony Hu
462f76c1ff
Merge pull request #6033 from dgarske/stm32_fixes
...
Fixes and cleanups for STM32
2023-01-31 12:13:13 -05:00
David Garske
9defb9a356
Merge pull request #6035 from gojimmypi/PK_SSL_init_vars
...
Initialize `OPENSSL_ALL` local size / length / type vars
2023-01-31 09:09:18 -08:00
David Garske
9b6e787071
Merge pull request #6034 from gojimmypi/Espressif_fix_6024
...
ESP32 SHA384 fixes
2023-01-31 09:08:54 -08:00
David Garske
934d8e274f
Merge pull request #5926 from SparkiDev/openssl_ec_api_rework
...
EC OpenSSL compat: rework EC API
2023-01-31 09:08:26 -08:00
gojimmypi
b10adae48f
Initialize OPENSSL_ALL local size / length / type vars
2023-01-30 17:30:56 -08:00
gojimmypi
53d6e79f89
ESP32 SHA384 fixes
2023-01-30 16:58:57 -08:00
David Garske
2d03a052e1
Fixes and cleanups for STM32:
...
* Fix for STM32 Hash peripherals (like on F437) with FIFO depth = 1.
* Cleanups for `XREALLOC` and new `WOLFSSL_NO_REALLOC` to force undef of `XREALLOC`.
* Change STM32 Cube to default to `NO_TLS_UART_TEST`.
2023-01-30 16:44:47 -08:00
Sean Parkinson
7691cd4b45
EC OpenSSL compat: rework EC API
...
Reworked the implementations of the EC APIs including:
wolfSSL_EC_curve, wolfSSL_EC_METHOD, wolfSSL_EC_GROUP,
wolfSSL_EC_POINT, wolfSSL_EC_KEY, wolfSSL_ECDSA_SIG, wolfSSL_ECDSA and
wolfSSL_ECDH.
Added support for EC parameters to PEM decoding.
EccEnumToNID() moved out of wolfCrypt - it maps NIDs defined in
wolfssl/openssl/ec.h to those in wolfssl/wolfcrypt/ecc.h.
Moved wc_OBJ_sn2nid() out of wolfCrypt - implementation uses
EccEnumToNID().
Changed reference counding to use wolfSSL_Ref.
Added tests to api.c that increase coverage of EC APIs.
2023-01-31 10:19:57 +10:00
David Garske
08538b69f3
Merge pull request #6016 from SparkiDev/sp_dh_agree_uinit
...
DH and SP: sp_DhExp_* called with uninitialized outLen
2023-01-30 15:56:46 -08:00
David Garske
66532ed052
Merge pull request #6032 from anhu/braces
...
Closing and opening scope around case statement.
2023-01-30 15:08:02 -08:00
David Garske
daa82e4653
Merge pull request #6030 from SparkiDev/sp_ecc_p256_arm64
...
SP Aarch64 ECC P256: mont reduce fix
2023-01-30 15:07:29 -08:00
Sean Parkinson
7cdf5c7956
SP Aarch64 ECC P256: mont reduce fix
...
For Montgomery Reduction of P256: Don't set x10 and x11 to words of mu
<< 32. x11 is needed later and there are plenty of registers.
2023-01-30 11:14:12 -08:00
David Garske
420f2f45c1
Merge pull request #6019 from SparkiDev/sp_arm64_cc
...
SP Aarch64: conditional changed in asm needs "cc"
2023-01-30 11:06:53 -08:00
Anthony Hu
242dcb0141
Closing and opening scope around case statement.
...
Related: ZD 15451
2023-01-30 13:45:03 -05:00
András Fekete
414c72adbc
Fix workflow concurrency ( #6031 )
...
* First test of the consolidated workflows
Co-authored-by: Andras Fekete <andras@wolfssl.com >
2023-01-30 10:10:54 -08:00
András Fekete
d72ea6101f
Merge pull request #6027 from SparkiDev/sp_int_div_small
...
SP int: div small static code analysis change
2023-01-30 10:34:05 -05:00
Sean Parkinson
0e16d2919f
Merge pull request #6022 from douzzer/20230127-fixes
...
20230127-fixes
2023-01-30 08:46:42 +10:00
Sean Parkinson
08afe6a404
SP int: div small static code analysis change
...
_sp_div_small: Make it explicit as possible that we only want the bottom
digit of the product subtracted from the bottom word of t. Top digit is
unnecessary and more cycles used if calculated.
2023-01-30 08:40:45 +10:00
David Garske
6e9d956a49
Merge pull request #6021 from kareem-wolfssl/zd15544
...
Fix for building with ASN template and `NO_ASN_TIME`
2023-01-27 18:19:19 -08:00
David Garske
ef8afa98a4
Merge pull request #6017 from cconlon/se050_tls_fixes
...
Fix SE050 RSA public key loading and RSA/ECC SE050 TLS Compatibility
2023-01-27 15:29:21 -08:00
Kareem
c70ca25282
Fix building NO_ASN_TIME with cert gen and OpenSSL Extra enabled.
2023-01-27 16:09:04 -07:00
Daniel Pouzzner
d077c39f42
wolfcrypt/test/test.c: in aes_xts_128_test(), gate in-place test on !HAVE_FIPS || FIPS_VERSION_GE(5,3); in hpke_test(), gate tests on availability of relevant ECC curve, not just on relevant digest.
2023-01-27 16:49:46 -06:00
Daniel Pouzzner
687bbeb712
wolfcrypt/src/port/arm/armv8-aes.c: harmonize arg validation in aarch64-armasm wc_AesCcm{En,De}crypt() with aes.c -- tolerate null in/out iff inSz==0.
2023-01-27 16:32:13 -06:00
Chris Conlon
f14c27f644
Fix SE050 RSA public key loading and RSA/ECC SE050 usage from TLS with WOLF_PRIVATE_KEY_ID
2023-01-27 14:28:47 -07:00
Kareem
4542eb0df1
Fix NO_ASN_TIME support for ASN template, also fix expired certificate unit tests with NO_ASN_TIME defined.
2023-01-27 12:39:53 -07:00
Sean Parkinson
f61938a882
SP Aarch64: conditional changed in asm needs "cc"
...
Add "cc" to asm that changes the conditional flags.
2023-01-27 16:33:06 +10:00
Sean Parkinson
134d4cca67
DH and SP: sp_DhExp_* called with uninitialized outLen
...
Fix for GeneratePublicDh was not right in #6002 .
sp_DhExp_* are called from multiple functions.
Sometimes outLen contains a value and sometimes not.
Check public key output size in GeneratePublicDh before calling SP.
2023-01-27 10:13:56 +10:00
David Garske
06509021ff
Merge pull request #6013 from douzzer/20230125-various-fixes
...
20230125-various-fixes
2023-01-26 15:10:18 -08:00
David Garske
58c2fe1c40
Merge pull request #6011 from SparkiDev/xts_in_place_enc_fix
...
AES XTS: encrypt not handling in-place properly
2023-01-26 14:04:58 -08:00
Andras Fekete
5b36d5235c
Always check to make sure 'sigCheckBuf' is within range
2023-01-26 16:23:39 -05:00
Andras Fekete
eaeff1e7c2
Avoid "use after free" error
2023-01-26 16:23:39 -05:00
Andras Fekete
3cfaa4c1ff
Handle return value
2023-01-26 16:23:39 -05:00
Daniel Pouzzner
f776371874
wolfcrypt/src/hpke.c: add PRIVATE_KEY_{UNLOCK,LOCK}() wrappers in wc_HpkeSealBase() and wc_HpkeOpenBase();
...
wolfcrypt/test/test.c: remove PRIVATE_KEY_{UNLOCK,LOCK}() wrappers from hpke_test_single(), and do a smallstack refactor.
2023-01-26 15:00:56 -06:00
Daniel Pouzzner
84a5bb67f2
tests/api.c: in test_tls13_apis(), conditionalize expected return value of wolfSSL_CTX_set_max_early_data() on WOLFSSL_ERROR_CODE_OPENSSL (only affects !OPENSSL_EXTRA paths).
2023-01-26 14:56:50 -06:00
Daniel Pouzzner
4b0e0b88fb
configure.ac: restore CPPFLAGS and CFLAGS to list of iterated options rendered into options.h; delete stale .build_params when ENABLED_REPRODUCIBLE_BUILD.
2023-01-26 14:53:56 -06:00
András Fekete
8eacd3acc9
Merge pull request #6015 from dgarske/wolf_products
...
Add user_settings.h template for wolfTPM
2023-01-26 15:33:54 -05:00
David Garske
10529e6199
Add user_settings.h template for wolfTPM
2023-01-26 10:40:59 -08:00
Daniel Pouzzner
c3a5698799
configure.ac/Makefile.am:
...
add support for EXTRA_CPPFLAGS, EXTRA_CCASFLAGS, and EXTRA_LDFLAGS;
fix typo in setup for CFLAG_VISIBILITY;
lightly refactor handling of CPPFLAGS/AM_CPPFLAGS in handlers for --with-liboqs, --with-wnr, and --with-cavium;
refactor+enhance options.h generation to handle -U directives.
2023-01-25 23:45:21 -06:00
Daniel Pouzzner
022d0e7c89
linuxkm/module_exports.c.template: include hpke.h if HAVE_HPKE.
2023-01-25 23:36:55 -06:00
Daniel Pouzzner
78cc2c5c3e
wolfcrypt/src/port/af_alg/afalg_aes.c: in wc_AesCbc{En,De}crypt(), handle WOLFSSL_AES_CBC_LENGTH_CHECKS as in wolfcrypt/aes.c; in wc_AesGcm{En,De}crypt(), truncate ivSz to WC_SYSTEM_AESGCM_IV if necessary.
2023-01-25 23:36:01 -06:00
Daniel Pouzzner
8f2ae77513
wolfcrypt/test/test.c: add missing PRIVATE_KEY_UNLOCK()/PRIVATE_KEY_LOCK() in hpke_test_single().
2023-01-25 23:32:55 -06:00
David Garske
584411f21a
Merge pull request #6012 from kareem-wolfssl/zd15524
...
Fix building FIPSv2 with WOLFSSL_ECDSA_SET_K defined.
2023-01-25 18:59:38 -08:00
András Fekete
8ecd906c23
Update open wrt test ( #6010 )
...
Adding in tests of various versions of OpenWrt. Also simplified the way to reproduce potential issues and added in breadcrumbs for debugging.
Co-authored-by: Andras Fekete <andras@wolfssl.com >
2023-01-25 13:58:52 -08:00
Kareem
c9125f9685
Fix building FIPSv2 with WOLFSSL_ECDSA_SET_K defined.
2023-01-25 14:49:05 -07:00
David Garske
7e1aecfe4c
Merge pull request #6001 from SparkiDev/dsa_sign_sig_size
...
DSA sign: use mp_to_unsigned_bin_len
2023-01-25 11:59:27 -08:00
David Garske
becedd41c9
Merge pull request #6000 from SparkiDev/dsa_force_zero
...
DSA: Don't force zero MPs on memory allocation failure
2023-01-25 11:59:13 -08:00
Sean Parkinson
214a6bd216
Merge pull request #6009 from douzzer/20230124-fix-HAVE_C___ATOMIC
...
20230124-fix-HAVE_C___ATOMIC
2023-01-25 15:34:30 +10:00
Sean Parkinson
e9af0136b9
AES XTS: encrypt not handling in-place properly
...
Fix AES XTS in-place encrypt to work when ciphertext stealing.
2023-01-25 09:32:37 +10:00
Daniel Pouzzner
b2c751a9ca
wolfcrypt/src/asn.c: fix a maybe-uninitialized found by clang --enable-asn=template.
2023-01-24 14:00:22 -06:00
Daniel Pouzzner
5e6005a1a3
m4/ax_atomic.m4: fix conflicting macro definition for HAVE_C___ATOMIC.
2023-01-24 12:08:35 -06:00
David Garske
a21c3a3c89
Merge pull request #6005 from SparkiDev/ecc_fp_alloc_fail_oob_1
...
ECC FP_ECC: zeroize when value set
2023-01-24 07:57:53 -08:00
David Garske
c9e1039a54
Merge pull request #6003 from SparkiDev/sp_math_ec_smul
...
EC scalar mult with SP Math: fix scalar length check
2023-01-24 07:54:02 -08:00
Sean Parkinson
a5adfcd5ca
ECC FP_ECC: zeroize when value set
...
accel_fp_mul was zeroizing an uninitialized MP - tk.
Add boolean, indicating to zeroize, that is set when a value is set.
2023-01-24 10:28:49 +10:00
Sean Parkinson
e34027ec76
SP EC ASM: mod_mul_norm fix
...
Handle corner case of overflow in last 32-bit word.
2023-01-24 10:12:32 +10:00
Sean Parkinson
4592f1a5b4
EC scalar mult with SP Math: fix scalar length check
...
The support curves in SP all have an order length the same as modulus
length. The scalar cannot be larger than the order and so fix the check.
2023-01-24 09:23:19 +10:00
David Garske
4b8ab2550d
Merge pull request #6004 from jpbland1/hpke-disable-harden
...
update hpke to not use rng with ecc when hardening is off
2023-01-23 15:09:30 -08:00
John Bland
44ca98f5b3
add missing NULL checks and remove rng pointer when not needed
2023-01-23 16:03:58 -05:00
David Garske
a24a1c8530
Merge pull request #5924 from SparkiDev/ref_cnt_update
...
Ref count: change to use wolfSSL_Ref
2023-01-23 08:33:37 -08:00
David Garske
9c1d214a61
Merge pull request #6002 from SparkiDev/sp_dh_exp_check_outlen
...
SP DH Exp: check output length for minimum
2023-01-23 08:32:12 -08:00
John Bland
a36276ca3a
update hpke to not use rng with ecc when hardening is off
2023-01-23 11:27:23 -05:00
Sean Parkinson
53dfcd00e2
Ref count: change to use wolfSSL_Ref
...
Data structures changed:
WOLFSSL_CERT_MANAGER, WOLFSSL_CTX, WOLFSSL_SESSION, WOLFSSL_X509,
WOLFSSL_X509, WOLFSSL_EVP_PKEY, WOLFSSL_BIO, WOLFSSL_X509_STORE
2023-01-23 16:29:12 +10:00
Sean Parkinson
1c4e1f8871
SP DH Exp: check output length for minimum
...
For DH Exp function in SP, don't assume output length has the minimum
length.
2023-01-23 09:43:58 +10:00
Sean Parkinson
90e24d8ba5
DSA sign: use mp_to_unsigned_bin_len
...
mp_to_unsigned_len checks length and front pads with zeros.
Return MP_VAL when length is too small in all implemenations.
Make TFM implementation check length.
Add test case.
2023-01-23 09:14:24 +10:00
Sean Parkinson
ffe302025e
DSA: Don't force zero MPs on memory allocation failure
...
When memory allocation fails, the MPs are not initialized and force zero
is using invalid values.
2023-01-23 08:33:09 +10:00
David Garske
a40da56f11
Merge pull request #5996 from douzzer/20230120-fixes
...
20230120-fixes
2023-01-21 08:32:14 -08:00
Daniel Pouzzner
aa776057ff
fixes: shellcheck gripes on Docker/OpenWrt/runTests.sh; null pointer derefs and duplicate tests and assigns in src/tls.c and wolfcrypt/src/hpke.c found by cppcheck (nullPointerRedundantCheck, identicalInnerCondition, duplicateAssignExpression).
2023-01-21 00:51:57 -06:00
Daniel Pouzzner
d711e4b9f8
Merge pull request #5995 from jpbland1/ech-no-recursion
...
stop ech from using a recursive function call
2023-01-20 23:47:22 -06:00
tmael
9d73c197e6
Move X509_V errors from enums to defines for HAProxy CLI ( #5901 )
...
* Move X509_V errors to openssl/ssl.h
* Have X509_V define errors in wolfssl/ssl.h
* Refactor X509_V errors
* Add wolfSSL_SESSION_set1_id_*
* Fix overlong line
2023-01-20 17:50:26 -08:00
András Fekete
b9a544920d
Add open wrt test ( #5985 )
...
* First test
* Don't forget to run autogen.sh!
* Add tools needed by automake
* Try additional platforms
* Add in qemu for other platforms
* No real support for arm containers
* Fix indentation
* Simplify container build with a testing script
* Simpler names for actions
* No need to distribute OpenWRT test files
* Better list to put ignore files onto
* Create an 'ignore_files' list after all
* Add in some documentation of how OpenWRT tests work
* Fix up naming of OpenWrt
Co-authored-by: Andras Fekete <andras@wolfssl.com >
2023-01-20 16:59:36 -08:00
David Garske
6206ad320c
Merge pull request #5992 from tim-weller-wolfssl/zd15423-accepts-large-ivs
...
Update AES-GCM stream decryption to allow long IVs (ZenDesk #15423 )
2023-01-20 16:10:13 -08:00
David Garske
d28bd08093
Merge pull request #5994 from bandi13/noAutoCancelActions
...
Don't auto-cancel GitHub Workflows
2023-01-20 16:09:56 -08:00
John Bland
d14d29e32a
stop ech from using a recursive function call
...
update bad return value for when retry_configs is returned, add locks around hkdf functions for private key use
2023-01-20 18:37:19 -05:00
Andras Fekete
7e87623973
Don't auto-cancel GitHub Workflows
2023-01-20 16:17:20 -05:00
tim-weller-wolfssl
cf9b865e33
Update AES-GCM stream decryption setup to allow long IV values (already allowed by encryption APIs)
2023-01-20 20:35:39 +00:00
David Garske
8c3cad3e95
Merge pull request #5984 from embhorn/zd15493
...
Fix Cmake to exclude libm when DH is not enabled
2023-01-20 11:21:09 -08:00
David Garske
8d89d4a168
Merge pull request #5927 from SparkiDev/sp_math_clz
...
SP math: use count leading zero instruction
2023-01-20 10:33:18 -08:00
David Garske
c1e0115092
Merge pull request #5993 from anhu/quic_doc_switcharoo
...
Move the wolfSSL Configuration section higher in QUIC.md
2023-01-20 09:32:40 -08:00
Anthony Hu
9be01633d1
Move the wolfSSL Configuration section higher in QUIC.md because it is the first step.
2023-01-20 09:49:18 -05:00
Eric Blankenhorn
9f7e82a081
Add WOLFSSL_DH_CONST option to Cmake
2023-01-20 08:42:48 -06:00
Sean Parkinson
9adea94274
SP math: use count leading zero instruction
...
To speed up counting bits, use the instruction that counts leading zeros
in a word.
Fix _sp_div_3 to use registers with 0 in them for multiplication result.
2023-01-20 11:56:07 +10:00
David Garske
cfe92aa330
Merge pull request #5983 from SparkiDev/sp_int_read_radix_neg
...
SP int negative: handle negative character properly with read radix
2023-01-19 17:51:07 -08:00
David Garske
e72ec4e876
Merge pull request #5976 from SparkiDev/eccsi_hash_check
...
ECCSI: hash function must have output size as curve size
2023-01-19 17:50:44 -08:00
András Fekete
f0c9f5f9f0
Multi compiler test ( #5991 )
...
* First attempt with GCC only
* Make the test run on every push temporarily
Also clean up the description of the workflow
* Fix invalid job name
* Missing hunks added
* Try out matrix actions
* Fix missing 'runs-on'
* Only needs to run on Ubuntu
* Use local installations of gcc/clang instead of containers
* Explicitly list out compilers to test
* Clean up names and concurrency group
* Only need to run on PRs and important branches
Co-authored-by: Andras Fekete <andras@wolfssl.com >
2023-01-19 14:56:16 -08:00
David Garske
f6ecc6ce4c
Merge pull request #5990 from philljj/gcmstream_kcapi_errmsg
...
Don't allow aesgcm-stream option with kcapi
2023-01-19 12:00:36 -08:00
David Garske
02178b9013
Merge pull request #5988 from bandi13/parallelOSBuilds
...
Parallel os builds
2023-01-19 09:59:07 -08:00
JacobBarthelmeh
fc19aed8c8
Merge pull request #5623 from dgarske/hpke
...
Adds support for TLS v1.3 Encrypted Client Hello (ECH) and HPKE (Hybrid Public Key Encryption)
2023-01-19 10:03:28 -07:00
jordan
04383bfb34
Don't allow aesgcm-stream option with kcapi
2023-01-19 10:54:48 -06:00
David Garske
f0212fef3e
Merge pull request #5986 from bandi13/fixNonStandarBaseImages
...
Fix when a base image leaves non-root user
2023-01-19 07:55:19 -08:00
Andras Fekete
2276fca0f4
Cancel runs on subsequent push to PR but not to branches
2023-01-19 10:12:08 -05:00
Andras Fekete
d955768744
Only run on important branches
2023-01-19 10:03:26 -05:00
Andras Fekete
ac8951c4e2
Fix typo
2023-01-19 09:54:20 -05:00
Andras Fekete
4d5dbe9b90
Give a better name to the workflow
2023-01-19 09:44:38 -05:00
Andras Fekete
b1f423be38
Kill off previous run if another commit happens
2023-01-19 09:41:18 -05:00
Andras Fekete
cb601bdf64
Combine ubuntu and macos tests to ensure the same thing is run
2023-01-19 09:33:26 -05:00
David Garske
e1d9b37f84
Merge pull request #5932 from julek-wolfssl/zd15346
...
ssl->suites: use ssl->ctx->suites when possible
2023-01-18 15:20:21 -08:00
Andras Fekete
283ebd5afe
Remove base job
2023-01-18 17:17:15 -05:00
Andras Fekete
bb88c8fbfa
Add in 'runs-on'
2023-01-18 17:13:08 -05:00
Andras Fekete
caa7c9e8b5
One more missing keyword
2023-01-18 17:07:36 -05:00
Andras Fekete
0d73074718
Missing keyword
2023-01-18 17:00:47 -05:00
Andras Fekete
ffee4edcf5
Fix dependency command
2023-01-18 16:22:06 -05:00
Andras Fekete
6ac09b5c66
Fix spacing
2023-01-18 16:12:54 -05:00
Andras Fekete
cd0b3b4eb9
Separate out steps to individual jobs
2023-01-18 16:10:58 -05:00
David Garske
6b6ad38e4f
Adds support for TLS v1.3 Encrypted Client Hello (ECH) draft-ietf-tls-esni) and HPKE (Hybrid Public Key Encryption) RFC9180.
2023-01-18 11:37:27 -08:00
David Garske
41c35b1249
Fix line length and whitespace issues. Fix macro argument missing parentheses.
2023-01-18 11:10:19 -08:00
Juliusz Sosinowicz
50cb3a7b8c
Address code review
2023-01-18 09:55:33 -08:00
Juliusz Sosinowicz
0e662dea6e
TLSX_SetSignatureAlgorithms: free sa when TLSX_Push fails
2023-01-18 09:55:33 -08:00
Juliusz Sosinowicz
281bb32edf
DtlsMsgCreateFragBucket: heap param might be unused
2023-01-18 09:55:33 -08:00
Juliusz Sosinowicz
a58e83847e
Don't allocate Suites object on renegotiation
2023-01-18 09:55:33 -08:00
Juliusz Sosinowicz
2f63fdc6ce
Allocate CTX->suites in InitSSL when not already allocated
2023-01-18 09:55:33 -08:00
Juliusz Sosinowicz
1cb4615435
Add SCR reconnect test
2023-01-18 09:55:32 -08:00
Juliusz Sosinowicz
5b8026899b
Refactor SigAlgs to use a custom struct that can override ssl->suites
2023-01-18 09:55:32 -08:00
Juliusz Sosinowicz
e431688ca6
ssl->suites: use ssl->ctx->suites when possible
...
- Allocate ssl->suites when necessary for the WOLFSSL object to have its own instance. Use AllocateSuites() to allocate the object.
- Move cipher negotiation options from Suites into Options
ZD15346
2023-01-18 09:55:32 -08:00
Eric Blankenhorn
68520e3f0b
Fix Cmake to exclude libm when DH is not enabled
2023-01-17 16:28:36 -06:00
Sean Parkinson
11ea6a10e8
ECCSI: hash function must have output size as curve size
2023-01-18 03:54:17 +10:00
JacobBarthelmeh
7120ae1961
Merge pull request #5978 from gojimmypi/Visual_Studio_Line_Endings
...
CRLF line endings, trailing spaces for C# Wrapper Projects (no code change)
2023-01-17 10:38:38 -07:00
Sean Parkinson
cdf2036454
SP int negative: handle negative character properly with read radix
...
SP int when compiled with negative was setting sign too early.
Get sign and set after absolute value read in.
2023-01-18 03:38:23 +10:00
David Garske
ea80e9e0ea
Add documentation for the CSharp wrapper.
2023-01-16 11:13:25 -08:00
Andras Fekete
e90ba67a4c
Fix when a base image leaves non-root user
2023-01-16 13:32:10 -05:00
Sean Parkinson
b15bc3d236
Merge pull request #5977 from dgarske/kcapi_opensslextra
...
Fixes for building KCAPI with opensslextra enabled
2023-01-17 02:13:50 +10:00
Juliusz Sosinowicz
b01e42a96c
Merge pull request #5970 from ejohnstown/dtls-seq
...
DTLS Handshake Sequence
2023-01-16 07:39:53 -08:00
David Garske
08a988f557
Merge pull request #5973 from philljj/zd15445
...
EVP_EncryptUpdate should update outl on empty input
2023-01-15 13:45:19 -08:00
jordan
4c35a22e0a
Cleanup input checks.
2023-01-14 23:04:29 -06:00
David Garske
acf761ea07
Merge pull request #5979 from SparkiDev/sp_int_arm_asm_cc
...
SP int ARM: Fix div word asm to indicate flags changed
2023-01-14 11:13:23 -08:00
David Garske
bf3673c0b2
Merge pull request #5974 from SparkiDev/aessiv_uninit_aes
...
AES SIV: Allocate memory for AES as late as possbile
2023-01-14 11:13:09 -08:00
Sean Parkinson
e6ef66a777
SP int ARM: Fix div word asm to indicate flags changed
...
"cc" needs to be set in assembly code as a modified register for div
word for ARM64 and ARM32.
2023-01-15 02:05:34 +10:00
David Garske
2d8c19ac42
Merge pull request #5972 from SparkiDev/sp_int_8bit_to_bin_len
...
SP int: fix 8-bit words and to binary length
2023-01-13 16:55:53 -08:00
David Garske
fec4fe6095
Fixes for building KCAPI with opensslextra enabled.
2023-01-13 16:33:55 -08:00
gojimmypi
91d2ff1fe9
no code change; CRLF line endings, trailing spaces
2023-01-13 16:29:19 -08:00
David Garske
46ace19111
Merge pull request #5975 from bandi13/cleanupContainers
...
No need to leave container artifacts around
2023-01-13 15:03:43 -08:00
Sean Parkinson
e6ed44322a
Merge pull request #5967 from dgarske/bench_help
...
Fixes for benchmark help `-alg` list and block format
2023-01-14 05:55:04 +10:00
Sean Parkinson
0a2ee6c530
AES SIV: Allocate memory for AES as late as possbile
...
AES will be initialized if memory allocation succeeded.
2023-01-14 05:41:24 +10:00
jordan
4f4819bd19
EVP_EncryptUpdate should update outl on empty input
2023-01-13 11:32:15 -06:00
Sean Parkinson
658d647339
SP int: fix 8-bit words and to binary length
2023-01-14 03:10:50 +10:00
John Safranek
af379f0a0f
DTLS Handshake Sequence
...
The DTLS server needs to save the message_seq number of the client
hello for use in both the hello verify request in the stateless start
and for the server hello. Move the stashing of the value earlier in
DoClientHello(). (Issue #5224 )
2023-01-12 20:43:05 -08:00
David Garske
5311a8e673
Merge pull request #5969 from SparkiDev/sp_int_to_bin_len
...
SP int: fail when buffer writing to is too small for number
2023-01-12 13:44:39 -08:00
David Garske
3151a5b12a
Merge pull request #5956 from gojimmypi/Espressif_S3_wolfcrypt_random
...
interim ESP32-S3 changes & diagnostics
2023-01-12 11:34:38 -08:00
David Garske
48a136a932
Fix for MB vs MiB printing. The base2 option was printing type backwards (base2=1 = 1024 bytes and base2=0 or -base10 means 1000 bytes).
2023-01-12 11:09:20 -08:00
Sean Parkinson
c22b89e935
SP int: fail when buffer writing to is too small for number
2023-01-13 02:12:03 +10:00
gojimmypi
24f89337f6
Espressif examples default partition params: large app
2023-01-11 17:46:44 -08:00
David Garske
5e1c7c3db2
Fix for benchmark help broken in PR #5871
2023-01-11 15:05:07 -08:00
gojimmypi
50820b64fb
update Espressif include.am, add sdkconfig.defaults
2023-01-11 12:26:19 -08:00
gojimmypi
0c263a4098
tidy up ESP32S3 detection. known-good sdkconfig defaults
2023-01-09 19:59:15 -08:00
David Garske
b2d8b1c2fd
Merge pull request #5954 from JacobBarthelmeh/Compatibility-Layer
...
very basic support for public key types in cipher list string with '+'
2023-01-09 15:46:50 -08:00
Andras Fekete
369c565368
No need to leave container artifacts around
2023-01-06 15:06:30 -05:00
John Safranek
86aa3cc836
Merge pull request #5942 from bandi13/evpaesccm
...
Evpaesccm
2023-01-06 11:25:37 -08:00
JacobBarthelmeh
9c2bbc2080
Merge pull request #5959 from douzzer/20230105-wolfsentry-fixes
...
20230105-wolfsentry-fixes
2023-01-06 11:04:16 -07:00
JacobBarthelmeh
26f9047079
Merge pull request #5958 from tatowicz/siphash-fix
...
Add fix for siphash cache and tests
2023-01-06 11:02:38 -07:00
JacobBarthelmeh
99a489dec3
improve test and handling of public key type cipher suite string
2023-01-06 09:53:51 -08:00
Andras Fekete
8436f82540
Adding in @ejohnstown's suggested patch for line lengths
2023-01-06 12:23:30 -05:00
Daniel Pouzzner
d44130d807
src/ssl.c: revert 2c2740d0dc, as it duplicates optimizer functionality, and produces bugprone-sizeof-expression on clang-tidy and sizeofwithnumericparameter on cppcheck.
2023-01-05 18:40:51 -06:00
Daniel Pouzzner
0b0b980784
fix an oversight in wolfSentry integration in examples/{client,server}.
2023-01-05 17:59:10 -06:00
Anthony Tatowicz
a08c853799
Add fix for siphash cache and tests
2023-01-05 16:56:07 -06:00
JacobBarthelmeh
10c324e9ad
Merge pull request #5953 from anhu/wolfSSL_CertManagerLoadCABuffer_ex
...
Add wolfSSL_CertManagerLoadCABuffer_ex()
2023-01-05 15:20:58 -07:00
JacobBarthelmeh
ab33788cdb
treat ECDHE,RSA cipher suite list as mixed TLS 1.3 and pre TLS 1.3
2023-01-05 13:48:34 -08:00
JacobBarthelmeh
636f4fc929
Merge pull request #5957 from douzzer/20230104-fixes
...
20230104-fixes
2023-01-05 13:58:21 -07:00
Anthony Hu
5de817b0c1
Add wolfSSL_CertManagerLoadCABuffer_ex()
...
Also add unit tests.
2023-01-05 15:34:13 -05:00
David Garske
404930036c
Merge pull request #5951 from tim-weller-wolfssl/zd14935-pointless-comparison
...
Avoid pointless-comparison warnings (Pa084) with IAR for ARM tools
2023-01-05 08:20:02 -08:00
Daniel Pouzzner
43265669c6
fix warnings around clang-diagnostic-embedded-directive and readability-uppercase-literal-suffix; update wolfSentry integration for upcoming release 0.8.0.
2023-01-05 00:13:17 -06:00
Andras Fekete
124c04b01a
A bit more consistent naming for structure variables
2023-01-04 21:04:58 -05:00
Andras Fekete
25ce553e8f
Shorten some line lengths
2023-01-04 20:32:04 -05:00
Andras Fekete
51f3386d60
Shorten variable names
2023-01-04 20:29:14 -05:00
JacobBarthelmeh
d5a7b56332
sp pragram around sanity check for vcpkg build warning
2023-01-04 16:19:27 -08:00
gojimmypi
b04d6ed56b
interim ESP32-S3 changes & diagnostics
2023-01-04 15:49:35 -08:00
tim-weller-wolfssl
2c2740d0dc
Update comparison of WOLFSSL_BN_ULONG value to MP_MASK to include check for potential type size differences which can lead to pointless-comparison warnings with IAR tools
2023-01-04 17:35:46 -06:00
Andras Fekete
af2c5cf18b
Remove the existence of WOLFSSL_AESCCM_STREAM
2023-01-04 14:17:36 -05:00
JacobBarthelmeh
a3e085f204
very basic support for public key types in cipher list string with '+'
2023-01-04 10:49:18 -08:00
András Fekete
adb406e1ee
Adding some developer utilities ( #5941 )
...
* Adding some developer utilities for Docker.
* Add support for `make test`
* Don't need to run the testsuite specifically
* Share .gitconfig and ssh keys with the container
Co-authored-by: Andras Fekete <andras@wolfssl.com >
2023-01-04 08:48:24 -08:00
JacobBarthelmeh
e42f6dbe4b
Merge pull request #5939 from dgarske/20221228_cleanups
...
Fixes for some build configuration variations
2023-01-04 08:32:20 -07:00
Andras Fekete
0ec0c05eda
Change variable names to protect the innocent
2023-01-04 10:23:42 -05:00
Andras Fekete
c21f5f3757
Fix unused variable error
2023-01-04 09:48:28 -05:00
Juliusz Sosinowicz
8d59f61b9b
Fix test_wolfSSL_dtls_stateless_resume test case
2023-01-04 13:04:45 +01:00
JacobBarthelmeh
114471d6cf
add pragram around sanity check for vcpkg build warning
2023-01-03 15:23:43 -08:00
Andras Fekete
914d3114de
Addressing PR comments
...
TODO should not have been in the changes
indentation of #ifdef moved in line with the 'if' conditional
2023-01-03 14:55:07 -05:00
David Garske
023db01aca
* Fixed some build configuration variations.
...
* Fixed `PEM_BUFSIZE` macro redefined when building with coexist.
* Updated the `user_settings_all.h` and `user_settings_wolfboot_keytools.h` to include latest options.
* Improved API unit test error case checking where `TEST_RES_CHECK` is not used.
* Changed `TEST_SKIPPED` to unique value.
* Added CI tests for enable-all, small stack, and user setting templates.
2023-01-03 10:59:59 -08:00
András Fekete
4f8edb312b
Add compilation to espressif ( #5947 )
...
* Refactor GitHub actions and add ESP tests.
* Add script for building all examples for ESP.
* Fixes for ESP-IDF v5.0
* Consolidating Espressif files into a single include.am
Co-authored-by: Andras Fekete <andras@wolfssl.com >
2023-01-03 09:50:38 -08:00
David Garske
bdcf6928a2
Merge pull request #5945 from JacobBarthelmeh/copyright
...
update copyright to 2023
2023-01-03 09:29:39 -08:00
youtai
4edae51095
Fix StartTLS_Init ( #5907 )
...
* Fix StartTLS_Init (contribution by Yota Nagaya)
2023-01-03 09:28:23 -08:00
Andras Fekete
dc6ffc790d
Need declaration of 'tmp' variable
2023-01-02 14:36:50 -05:00
Andras Fekete
ec9697999e
Use minimum size for NONCE
2023-01-02 08:51:13 -05:00
Jacob Barthelmeh
9dcc48c8f7
update copyright to 2023
2022-12-30 17:12:11 -07:00
Andras Fekete
df3c11ad82
Don't define a new default NONCE size, instead use existing MAX
2022-12-30 16:02:30 -05:00
Andras Fekete
f734f5037d
Add similar trick to GCM routines so our code is more uniform
2022-12-30 13:11:26 -05:00
Andras Fekete
a00abb0f88
Fix compilation issue when AESCCM is not enabled
2022-12-30 13:10:24 -05:00
John Safranek
c925223822
Merge pull request #5943 from JacobBarthelmeh/sessionExport
2022-12-30 09:58:47 -08:00
David Garske
b43852363e
Merge pull request #5944 from JacobBarthelmeh/Testing
...
fix for older selftest that returns bad padding instead of salt len e…
2022-12-30 08:37:02 -08:00
JacobBarthelmeh
4a23edd5fb
fix for older selftest that returns bad padding instead of salt len error
2022-12-30 06:31:09 -08:00
Jacob Barthelmeh
aab12fc14b
check DTLS method for test case
2022-12-29 15:49:46 -07:00
Andras Fekete
1132579dd1
Add in zero length test
2022-12-29 17:02:43 -05:00
Andras Fekete
1192d41f0e
First successful implementation of EVP_aes_*_ccm
2022-12-29 17:02:43 -05:00
Andras Fekete
27b5ac421e
Use the actual size of the structure
2022-12-29 17:02:43 -05:00
David Garske
251b89631e
Merge pull request #5940 from anhu/bench_ext_kyber
...
don't call external implemenation of kyber from benchmark anymore.
2022-12-29 11:00:59 -08:00
Anthony Hu
0787ab1131
don't call external implemenation of kyber from benchmark anymore.
2022-12-29 11:48:54 -05:00
David Garske
5e11fb19a4
Merge pull request #5937 from anhu/blinding_on
...
Change comment to reflect that RSA blind is enabled by default
2022-12-28 12:56:58 -08:00
David Garske
5c0abfd7ad
Merge pull request #5936 from embhorn/zd15400
...
Fix unguarded XFPRINTF calls
2022-12-28 12:47:19 -08:00
Eric Blankenhorn
004705b38f
Fix unguarded XFPRINTF calls
2022-12-28 12:23:40 -06:00
Anthony Hu
f9ccdd7ffc
Change comment to reflect that RSA blind is enabled by default
2022-12-28 13:09:59 -05:00
Chris Conlon
aadce3af9c
Merge pull request #5930 from miyazakh/subscript_has_char
2022-12-28 10:18:43 -07:00
Kaleb Himes
9b513fd6bf
Merge pull request #5934 from cconlon/jpdocfix
...
Remove incomplete doxygen in JP asn_public.h
2022-12-28 08:07:20 -07:00
David Garske
67fe575896
Merge pull request #5933 from anhu/purge_dilithium_aes
...
Purge the AES variant of Dilithium
2022-12-27 16:44:52 -08:00
Chris Conlon
a2b6c5dd1e
remove incomplete doxygen in JP asn_public.h
2022-12-27 14:46:38 -07:00
Anthony Hu
b3e99348cd
Purge the AES variant of Dilithium
2022-12-27 14:37:47 -05:00
David Garske
19033d82fe
Merge pull request #5931 from douzzer/20221226-minor-fixes
...
20221226-minor-fixes
2022-12-27 08:40:17 -08:00
David Garske
43f0830ad7
Merge pull request #5923 from JacobBarthelmeh/release
...
add quality of release statement
2022-12-27 08:39:41 -08:00
JacobBarthelmeh
11e44e746b
Merge pull request #5928 from dgarske/zd15388
...
Fixes SP math all build issue with small-stack and no hardening
2022-12-27 09:23:53 -07:00
Daniel Pouzzner
cb1b20dc8e
linuxkm/: accomodate refactoring in kernel 6.2+ of cpu_number to be an element of the pcpu_hot`structure.
2022-12-26 21:03:04 -06:00
Daniel Pouzzner
425d0b72c3
wolfcrypt/benchmark/benchmark.c: fix bench_stats_sym_finish() in GENERATE_MACHINE_PARSEABLE_REPORT mode to properly render "bytes_total" column in bytes, not the unit selected by WOLFSSL_BENCHMARK_FIXED_UNITS_*.
2022-12-26 20:25:05 -06:00
Daniel Pouzzner
9ac790a8ce
Docker/run.sh: mollify shellcheck, and prevent splitting on whitespace passing args through to configure.
2022-12-26 20:18:43 -06:00
Hideki Miyazaki
684646c8b9
fix shadows min and subscript by i486-netbsd-gcc
2022-12-25 07:20:04 +09:00
David Garske
dee01cfe9b
Fixes SP math all build issue with small-stack and no hardening. Fixes ZD15388
2022-12-23 13:22:40 -08:00
David Garske
d686f0a5de
Merge pull request #5925 from SparkiDev/sp_mod_3_perf
...
SP math: rework mod 3
2022-12-22 17:55:28 -08:00
David Garske
18e04d184e
Merge pull request #5895 from bandi13/addDocker
...
Add docker
2022-12-22 17:19:43 -08:00
David Garske
60037ead70
Merge pull request #5871 from gojimmypi/BenchmarkEnhancements
...
Benchmark Enhancements and Code Cleanup
2022-12-22 17:18:47 -08:00
David Garske
49d23cf60a
Merge pull request #5913 from douzzer/20221219-no-sha-1-all-crypto
...
20221219-no-sha-1-all-crypto
2022-12-22 17:02:58 -08:00
David Garske
1b18da7e87
Merge pull request #5920 from jpbland1/unrecognized-http-header
...
remove http header length check for CRL verification
2022-12-22 17:01:54 -08:00
David Garske
5c89719c51
Merge pull request #5916 from julek-wolfssl/dtls-srtp-keying-material
...
DTLS-SRTP: use wolfSSL_export_keying_material instead of wc_PRF_TLS
2022-12-22 17:01:37 -08:00
David Garske
135b9f0566
Merge pull request #5915 from julek-wolfssl/dtls-remove-realloc-dep
...
DtlsMsgCombineFragBuckets: Remove realloc dependency
2022-12-22 17:01:31 -08:00
David Garske
62e3835b0e
Merge pull request #5911 from julek-wolfssl/DtlsMsgPoolSend-sendSz
...
DtlsMsgPoolSend: Use correct sendSz
2022-12-22 17:01:19 -08:00
David Garske
29c46ce867
Merge pull request #5902 from bandi13/ESP-IDF_fixes
...
Esp idf v5 fixes
2022-12-22 17:01:09 -08:00
Sean Parkinson
162dca87c3
SP math: rework mod 3
...
Simplification when only calculating mod and modulus is 3.
2^(2*n) * x mod 3 = x mod 3.
Add all digits and calculate mod 3 of sum.
2022-12-23 09:21:13 +10:00
Chris Conlon
8e0f0d611f
Merge pull request #5914 from kojo1/ja
...
add Doxygen cmac.h, quic.h
2022-12-22 15:20:26 -07:00
John Safranek
9ce79c4de8
Merge pull request #5921 from cconlon/libsuffix
2022-12-22 11:37:28 -08:00
Jacob Barthelmeh
50aeb2f79e
add quality of release statement
2022-12-22 10:42:18 -07:00
gojimmypi
a20426b2b0
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into BenchmarkEnhancements
2022-12-22 08:47:25 -08:00
David Garske
709461e4aa
Merge pull request #5922 from JacobBarthelmeh/Testing
...
add crl test file to dist
2022-12-21 16:30:33 -08:00
Jacob Barthelmeh
db03994899
add crl test file to dist
2022-12-21 15:05:30 -07:00
Chris Conlon
9a7ff8773b
add --with-libsuffix support, append suffix to library artifact name
2022-12-21 13:31:07 -07:00
John Bland
b36d585335
remove http header length check for CRL verification
2022-12-21 13:01:58 -05:00
David Garske
4fbd4fd36a
Merge pull request #5917 from JacobBarthelmeh/release
...
prepare for release 5.5.4
2022-12-20 16:15:51 -08:00
JacobBarthelmeh
509ad07dbd
Merge pull request #5918 from kareem-wolfssl/zd15369
...
Fix length being passed into GetFormattedTime.
2022-12-20 17:12:13 -07:00
Kareem
eebe04b181
Fix length being passed into GetFormattedTime.
2022-12-20 15:42:02 -07:00
Jacob Barthelmeh
cca63a465d
prepare for release 5.5.4
2022-12-20 14:19:59 -07:00
Daniel Pouzzner
455e76873c
peer review fixes re: minor fixes to accommodate --disable-sha in combination with --enable-all-crypto.
2022-12-20 10:43:33 -06:00
Juliusz Sosinowicz
6a8be960ba
DTLS-SRTP: use wolfSSL_export_keying_material instead of wc_PRF_TLS
2022-12-20 16:42:28 +01:00
Juliusz Sosinowicz
2fe6555fcf
DtlsMsgCombineFragBuckets: Remove realloc dependency
2022-12-20 13:53:03 +01:00
Takashi Kojo
5ff8bec975
add Doxygen cmac.h, quic.h
2022-12-20 17:44:52 +09:00
Daniel Pouzzner
91869f6028
minor fixes to accommodate --disable-sha in combination with --enable-all-crypto.
2022-12-20 00:42:05 -06:00
David Garske
6f7d8d287d
Merge pull request #5905 from JacobBarthelmeh/cert_update
...
end of year certificate update
2022-12-19 09:52:53 -08:00
Andras Fekete
bc15f67d8d
Fixing indentation on preprocessor commands
2022-12-19 11:13:58 -05:00
András Fekete
11fcb790b1
Merge branch 'wolfSSL:master' into ESP-IDF_fixes
2022-12-19 11:11:55 -05:00
Juliusz Sosinowicz
53b2be06d3
DtlsMsgPoolSend: Use correct sendSz
...
pool->sz is the size without the record header. The handshake header is present already.
Reproducible with
./udp_proxy -p 12345 -s 127.0.0.1:11111 -x 1:3 -S server
or
./udp_proxy -p 12345 -s 127.0.0.1:11111 -x 1:3 -S server
and
./examples/server/server -l ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305 -u -i
./examples/client/client -l ECDHE-RSA-AES256-GCM-SHA384 -u -R -p 12345 -i
2022-12-19 17:07:37 +01:00
gojimmypi
64a7d511b8
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into BenchmarkEnhancements
2022-12-16 14:00:16 -08:00
JacobBarthelmeh
3d1775320b
Merge pull request #5900 from icing/tls12-no-tickets
...
WOLFSSL_OP_NO_TICKET fix for TLSv1.2
2022-12-16 14:42:50 -07:00
JacobBarthelmeh
91f8b5e58e
Merge pull request #5903 from douzzer/20221216-fix-benchmark
...
20221216-fix-benchmark
2022-12-16 14:35:12 -07:00
JacobBarthelmeh
c6aaa1310e
end of year certificate update
2022-12-16 13:32:37 -08:00
Kaleb Himes
b90c07900b
Merge pull request #5904 from anhu/FIPS_fix
...
ENABLED_FIPS doesn't hold the version; FIPS_VERSION does.
2022-12-16 14:16:47 -07:00
Andras Fekete
8d372b2c6f
Start an FAQ in the README.md
2022-12-16 15:45:29 -05:00
gojimmypi
c370529975
manual merge with upstream
2022-12-16 11:28:04 -08:00
Anthony Hu
24d7f85016
ENABLED_FIPS doesn't hold the version; FIPS_VERSION does.
...
Found with:
./configure --enable-engine=fips=v2
2022-12-16 14:06:43 -05:00
Daniel Pouzzner
04b31518ba
wolfcrypt/benchmark/benchmark.c: fix calculation of outer iteration constant in bench_aesecb_internal(); fix .c.h clash in argument name ("useDevId" vs "useDeviceID").
2022-12-16 12:55:37 -06:00
Andras Fekete
d0f0d66b80
Add in changes to wolfssl_server
2022-12-16 11:55:53 -05:00
Andras Fekete
814ad9fc38
Better fixes
2022-12-16 11:55:28 -05:00
Andras Fekete
b9e69f1795
Fixes for wolfssl_client example
2022-12-16 10:23:09 -05:00
David Garske
5c21e40bce
Merge pull request #5899 from SparkiDev/regression_fixes_5
...
Fixes from regression testing.
2022-12-16 06:54:26 -08:00
David Garske
07dcd5270e
Merge pull request #5898 from cconlon/androidSystemCa
...
Add Android CA certs path for wolfSSL_CTX_load_system_CA_certs()
2022-12-16 06:12:24 -08:00
Stefan Eissing
9d0b16097e
Fix builds without session tickets.
2022-12-16 09:40:51 +01:00
Stefan Eissing
dccabc60a5
Disabling TLSv1.2 session tickets when WOLFSSL_OP_NO_TICKET is being set.
...
There seems to have been a misunderstanding that WOLFSSL_OP_NO_TICKET would only disable tickets
for TLS version lower than 1.2. But it includes 1.2 as well.
2022-12-16 09:29:44 +01:00
Sean Parkinson
45e3c721b3
Fixes from regression testing.
...
Fix random prime generation for big endian to set low bits after
shifting top word.
Allow SP_MATH to be built without RSA, DH and ECC - needed for PKCS#12.
Add DH 2048 bit parameters to cert_test.c for test.c when NO_ASN and
WOLFSSL_SP_MATH.
2022-12-16 14:43:29 +10:00
David Garske
502fd843ec
Merge pull request #5897 from gojimmypi/gojimmypi-initialize-resp_length
...
initialize resp_length = 0 in tls.c
2022-12-15 17:23:48 -08:00
Chris Conlon
f9bd8f76de
add Android system CA certs path for to wolfSSL_CTX_load_system_CA_certs() usage
2022-12-15 16:39:48 -07:00
Sean Parkinson
4434d898a1
Merge pull request #5894 from kaleb-himes/fix-leak
...
Fix a quick leak in the test apps
2022-12-16 08:04:50 +10:00
JacobBarthelmeh
aa784397b0
Merge pull request #5896 from cconlon/atexitOSX
...
AC_CHECK_DECLS for atexit needs stdlib.h on OSX
2022-12-15 15:00:29 -07:00
Andras Fekete
b823da9bb9
Fix build issues with the latest ESP-IDF
2022-12-15 16:11:39 -05:00
gojimmypi
e0c9586b79
initialize resp_length = 0 in tls.c
2022-12-15 12:51:33 -08:00
Andras Fekete
3ba8c918f2
Use standard naming
2022-12-15 15:30:22 -05:00
Andras Fekete
6a2673f5f7
Adding Docker files to distribution
2022-12-15 15:11:14 -05:00
Andras Fekete
995e3bd009
Allow for existing group
2022-12-15 14:30:13 -05:00
kaleb-himes
b23db16ff8
Refactor the double-free fix
2022-12-15 12:21:08 -07:00
David Garske
668efea464
Merge pull request #5884 from icing/ssl-set-ssl-ctx
...
Fix wolfSSL_set_SSL_CTX() to be usable during handshake.
2022-12-15 10:59:54 -08:00
Chris Conlon
8c54bd0fb1
check for atexit needs stdlib.h on OSX, fixes configure sed error
2022-12-15 11:23:37 -07:00
David Garske
908744dc0f
Merge pull request #5646 from JacobBarthelmeh/caam
...
benchmark devid changes, CCM with SECO fix, set IV on AES import into SECO
2022-12-15 10:01:01 -08:00
Andras Fekete
c1cf8a8f34
Add in README.md
2022-12-15 12:54:21 -05:00
David Garske
d9ca5f6d3a
Merge pull request #5893 from kaleb-himes/mtu-with-static-mem
...
Add alt case for unsupported static memory API
2022-12-15 09:22:21 -08:00
Andras Fekete
9c135e59dc
Script can run from an arbitrary folder
2022-12-15 12:22:05 -05:00
David Garske
d46813953d
Merge pull request #5892 from tatowicz/decodealtnames-fuzz-fix
...
Add Overflow check to DecodeAltNames input buffer access
2022-12-15 09:21:37 -08:00
Andras Fekete
64d39dbd74
Cleaner base image
2022-12-15 12:10:48 -05:00
Andras Fekete
c1ad3457f3
Run as non-root local user
2022-12-15 12:10:25 -05:00
Andras Fekete
be1b3ec007
Fix issue with multiple command arguments
2022-12-15 11:25:43 -05:00
kaleb-himes
46c47e4adc
Fix a quick leak in the test apps
...
Fix a double-free scenario also
2022-12-15 09:13:45 -07:00
Stefan Eissing
78fd5d7dbc
Fix wolfSSL_set_SSL_CTX() to be usable during handshake.
...
This method requires some explanation. Its sibling is
int SetSSL_CTX(WOLFSSL* ssl, WOLFSSL_CTX* ctx, int writeDup)
which re-inits the WOLFSSL* with all settings in the new CTX.
That one is the right one to use *before* a handshake is started.
This method was added by OpenSSL to be used *during* the handshake, e.g.
when a server inspects the SNI in a ClientHello callback and
decides which set of certificates to use.
Since, at the time the SNI callback is run, some decisions on
Extensions or the ServerHello might already have been taken, this
method is very restricted in what it does:
- changing the server certificate(s)
- changing the server id for session handling
and everything else in WOLFSSL* needs to remain untouched.
2022-12-15 09:33:01 +01:00
gojimmypi
d8c9a5aa17
return benchmark to auto-scale units by default
2022-12-14 20:45:44 -08:00
gojimmypi
8831fbd22e
fix csv math, units/sec, PQ cycle header
2022-12-14 20:27:15 -08:00
JacobBarthelmeh
8924487f27
fix warning for builds using cmac and not devID
2022-12-14 15:38:08 -08:00
JacobBarthelmeh
89c993eff3
fix AES-CCM enc/dec for SECO (passes nonce directly)
2022-12-14 15:20:03 -08:00
JacobBarthelmeh
b79879d106
fix setting IV when importing AES key into SECO
2022-12-14 15:20:03 -08:00
JacobBarthelmeh
9f77210b0b
update benchmark for devID builds
2022-12-14 15:20:03 -08:00
kaleb-himes
ed17524793
Add alt case for unsupported static memory API
2022-12-14 16:02:35 -07:00
Sean Parkinson
a3f3c76faa
Merge pull request #5890 from anhu/fix_iv_size
...
Fix the wrong IV size.
2022-12-15 08:43:25 +10:00
Sean Parkinson
3d8f25ab7d
Merge pull request #5430 from dgarske/sniffer_multithread
...
Support for multi-threaded sniffer
2022-12-15 08:18:49 +10:00
David Garske
3fd2292d11
Merge pull request #5889 from anhu/dtls13_pqtests
...
Kyber with DTLS 1.3 tests
2022-12-14 13:20:32 -08:00
Anthony Tatowicz
370e0ce0f4
Add formatting fixes
2022-12-14 13:54:03 -06:00
Anthony Hu
c5ca20fe43
New files so add them to include.am
2022-12-14 13:28:20 -05:00
Andras Fekete
d55ef14cc7
First crack at creating a common Docker environment
2022-12-14 13:17:22 -05:00
Anthony Tatowicz
8580ac0377
Add Overflow check to DecodeAltNames input buffer access
2022-12-14 12:08:19 -06:00
Anthony Hu
472a31a801
Fix the wrong IV size.
2022-12-14 13:04:38 -05:00
Anthony Hu
ad6d6be620
Kyber with DTLS 1.3 tests
2022-12-14 12:46:24 -05:00
David Garske
6be0512728
Peer review cleanups.
2022-12-14 09:25:04 -08:00
David Garske
b2d25ece98
Merge pull request #5885 from anhu/pq_session_ticket
...
Allow session tickets to properly resume when using PQ KEMs.
2022-12-13 16:32:07 -08:00
David Garske
e33d59cd76
Review cleanups.
2022-12-13 10:55:22 -08:00
Anthony Hu
364835dc9e
Allow session tickets to properly resume when using PQ KEMs.
...
Found with:
```
./configure --with-liboqs --enable-session-ticket
./examples/server/server -v 4 -r --pqc P521_KYBER_LEVEL5
./examples/client/client -v 4 -r --pqc P521_KYBER_LEVEL5
```
2022-12-13 11:36:00 -05:00
Daniel Pouzzner
64ef6aedd6
Merge pull request #5882 from SparkiDev/sp_aarch64_be
...
SP: support aarch64 big endian
2022-12-12 22:06:38 -06:00
Sean Parkinson
a7a6d5b297
Merge pull request #5874 from JacobBarthelmeh/tls13
...
adjust post auth support with TLS 1.3
2022-12-13 09:39:31 +10:00
Sean Parkinson
bc3b723609
SP: support aarch64 big endian
2022-12-13 09:33:16 +10:00
David Garske
d0c9ec6681
Merge pull request #5854 from JacobBarthelmeh/Certs
...
fix other name san parsing and add RID cert to test parsing
2022-12-12 14:44:07 -08:00
David Garske
a1e883b43d
Merge pull request #5875 from JacobBarthelmeh/Compatibility-Layer
...
fix for handling DEFAULT:... cipher suite list
2022-12-12 14:43:50 -08:00
David Garske
334042d7f5
Merge pull request #5881 from anhu/warn_session_ticket
...
Warn that renegotiation in TLS 1.3 requires session ticket.
2022-12-12 13:51:28 -08:00
David Garske
36413a2c11
Merge pull request #5879 from SparkiDev/api_test_timing
...
API test: Report time taken to perform test
2022-12-12 12:31:06 -08:00
David Garske
f87859a00e
Whitespace cleanups. Use const for test_tls_ext_duplicate.
2022-12-12 08:59:53 -08:00
David Garske
78f495cdae
Merge pull request #5877 from SparkiDev/x509v3_d2i_aia
...
X509v3 EXT d2i: fix freeing of aia
2022-12-12 08:59:15 -08:00
David Garske
2a97862d26
Merge pull request #5878 from SparkiDev/benchmark_aesofb_fix
...
Benchmark AES-OFB: initialize and free AES object
2022-12-12 08:57:44 -08:00
Anthony Hu
b017795413
Remove changes around wolfSSL_set_session() as it breaks tests.
2022-12-12 11:44:27 -05:00
David Garske
de22dbe61d
Support for multi-threaded sniffer. Add support for atomic operations instead of mutex in wc_port.h.
2022-12-12 08:39:42 -08:00
Anthony Hu
fffd3adc30
Warn that renegotiation in TLS 1.3 requires session ticket.
2022-12-12 11:30:01 -05:00
David Garske
b871829833
Merge pull request #5811 from lealem47/zd15184
...
Async Sniffer: Fix for decryption after second handshake
2022-12-12 08:21:35 -08:00
Sean Parkinson
b4b1739783
API test: Report time taken to perform test
...
API test now displays timing taken to perform a test case to help
identify ones that are doing too much work.
2022-12-12 12:24:38 +10:00
David Garske
50c5d61998
Merge pull request #5872 from SparkiDev/tls_ext_no_dup
...
TLS: detect duplicate known extensions
2022-12-11 16:53:38 -08:00
Sean Parkinson
819d40a76f
Benchmark AES-OFB: initialize and free AES object
...
Device ID is not initialized unless wc_AesInit() is called.
Call wc_AesFree() for possible hardware implementations.
2022-12-12 10:45:21 +10:00
Sean Parkinson
7f3de91e25
X509v3 EXT d2i: fix freeing of aia
...
aia is a stack and must be pop freed rather than freed with XFREE.
Extract function that creates Authority Info Access stack.
Fix spelling issue raised by codespell.
2022-12-12 10:13:13 +10:00
Sean Parkinson
9ab8867b42
TLS: detect duplicate known extensions
...
TLS specification requires that there not be more than one extension of
the same type in a given extension block. E.g. ClientHello
2022-12-12 08:35:04 +10:00
JacobBarthelmeh
f974bd4ad6
move test function call into macro guard
2022-12-10 15:45:14 -08:00
JacobBarthelmeh
8b296877ab
fix for handling DEFAULT:... cipher suite list
2022-12-10 14:53:43 -08:00
JacobBarthelmeh
389cf6ed0a
adjust post auth support with TLS 1.3
2022-12-10 06:49:51 -08:00
gojimmypi
5e434e62fb
Support for WOLFSSL_BENCHMARK_FIXED_CSV, minor changes per #5871 feedback
2022-12-09 12:39:51 -08:00
Daniel Pouzzner
11c4a0e228
Merge pull request #5866 from dgarske/ecc_pub_import
...
Fix API test `test_wc_ecc_import_raw` with SP math
2022-12-09 14:00:57 -06:00
David Garske
793bd6620b
Fix unicode char in logging.c.
2022-12-09 10:36:35 -08:00
David Garske
52c6710783
Fix test_wc_ecc_import_raw to handle ECC_INF_E or MP_VAL on point failures. SP math returns MP_VAL in sp_256_ecc_is_point_4.
2022-12-09 10:32:46 -08:00
gojimmypi
9d98cd6e50
Merge branch 'BenchmarkEnhancements' of https://github.com/gojimmypi/wolfssl into BenchmarkEnhancements
2022-12-09 10:10:04 -08:00
gojimmypi
6c3e301006
Benchmark Consolidated Enhancements and Code Cleanup
2022-12-09 10:09:56 -08:00
Tesfa Mael
85dc7a61c5
Detect SIZEOF_LONG in armclang and diab
2022-12-09 09:29:25 +01:00
Sean Parkinson
c959d22b98
Merge pull request #5868 from dgarske/ecc_pub_math
...
Expose more ECC math functions and improve async shared secret
2022-12-09 08:37:26 +10:00
David Garske
f8484fb5f3
Merge pull request #5869 from anhu/NO_SERVER_fix
...
Add proper gating on !NO_WOLFSSL_SERVER
2022-12-08 14:30:23 -08:00
Sean Parkinson
5d9532b0ee
Merge pull request #5865 from dgarske/fix_-5864
...
Fix for implicit conversion with 32-bit in SP math
2022-12-09 08:24:04 +10:00
JacobBarthelmeh
ab6233a01b
Merge pull request #5870 from anhu/fix_sgx_stdout
...
stdout is undeclared
2022-12-08 15:22:30 -07:00
gojimmypi
374d6d368e
Benchmark Consolidated Enhancements and Code Cleanup
2022-12-08 13:38:06 -08:00
Anthony Hu
3aa74e3c8c
stdout is undeclared
2022-12-08 15:29:48 -05:00
Anthony Hu
cdaa4d8aa0
Add proper gating on !NO_WOLFSSL_SERVER
...
Found with the following configuration:
--enable-dtls --enable-dtls13 --enable-dtls-mtu CFLAGS="-DNO_WOLFSSL_SERVER"
2022-12-08 14:20:17 -05:00
David Garske
9cb19e36fe
Merge pull request #5867 from anhu/dont_make_broken_key
...
For compatibility `EC_KEY_new_by_curve_name` check that we found curve
2022-12-08 11:09:56 -08:00
David Garske
9ad4e3f9ba
Expose the safe version of point double/add and mulmod_ex with WOLFSSL_PUBLIC_ECC_ADD_DBL. Eliminate int wc_ecc_shared_secret_gen used by async/nb and improve async use of curve spec allocations.
2022-12-08 10:43:03 -08:00
Anthony Hu
937d247c7d
Don't create a key if we don't support the curve.
...
Found with the following configuration:
./configure --enable-tls13 --disable-oldtls --enable-static --enable-singlethreaded --enable-dtls --enable-dtls13 --enable-dtls-mtu --enable-sp=yes,4096 --disable-shared --disable-sha3 --disable-dh --enable-curve25519 --enable-secure-renegotiation --enable-debug --enable-opensslextra 'CFLAGS=-DWOLFSSL_DTLS_ALLOW_FUTURE -DWOLFSSL_MIN_RSA_BITS=2048 -DWOLFSSL_MIN_ECC_BITS=256 -DFP_MAX_BITS=8192 -fomit-frame-pointer'
2022-12-08 12:13:12 -05:00
David Garske
d264cbc899
Fix for implicit conversion with 32-bit in SP math.
...
Fixes `error: implicit conversion loses integer precision: sp_int64' (aka long long) to sp_digit (aka int)` building with `./configure CC="clang -m32" --enable-sp && make`
2022-12-08 08:31:02 -08:00
JacobBarthelmeh
eb69ccb22c
Merge pull request #5856 from icing/errq-improvements
...
Improvements in OpenSSL Compat ERR Queue handling.
2022-12-08 09:28:05 -07:00
Stefan Eissing
02094ebb2e
Updates after review by JacobBarthelmeh.
...
- fix err/ret rename leftover for python builds
- add documenetation to thread-local functions
- move generic queue functions up
2022-12-08 09:53:05 +01:00
David Garske
bdadbefb4c
Merge pull request #5862 from JacobBarthelmeh/Compatibility-Layer
...
map SSL_CTX_get_session_cache_mode compat API
2022-12-07 14:50:31 -08:00
Sean Parkinson
1f607ee560
Merge pull request #5860 from tmael/entropy_memuse
...
Increase RNG_SECURITY_STRENGTH for FIPS
2022-12-08 08:26:07 +10:00
David Garske
099135b2f9
Merge pull request #5861 from kosmas-valianos/FixTypo
...
Fix wrong function name in wolfSSL_X509_get_name_oneline()
2022-12-07 13:03:54 -08:00
Jacob Barthelmeh
94212e68e5
map SSL_CTX_get_session_cache_mode compat API
2022-12-07 11:35:48 -07:00
Stefan Eissing
45f9ef5dd9
Improvements in OpenSSL Compat ERR Queue handling.
...
Configuration
- thread-local storaoge is selected when available
- '--enable-error-queue-per-thread' and '--disable-error-queue-per-thread' can
be used as before to explicitly en-/disable the feature.
Implementation:
- with thread-local-storage, error queue is realized in one struct without
allocations. Queue size is restricted to 16 entries (per thread), which
is the same limit in OpenSSL 1.1.x.
- without thread-local-storage, all error queue operations are mutex locked
- wc_PeekErrorNodeLineData() and wc_GetErrorNodeErr() added for use by SSL
functions to allow locked queue iterations/manipulations.
2022-12-07 18:14:45 +01:00
Kosmas Valianos
11f9bd85ee
Fix wrong function name in wolfSSL_X509_get_name_oneline()
2022-12-07 16:00:05 +01:00
Tesfa Mael
1e0886180b
Adjust ENTROPY_SCALE_FACTOR for FIPS
2022-12-06 23:01:13 -08:00
David Garske
f6cb13b11b
Merge pull request #5851 from SparkiDev/sp_enable_asm_fix
...
SP: --enable-sp-asm now enables SP if not set
2022-12-06 17:37:15 -08:00
Sean Parkinson
1de30c6b67
SP: --enable-sp-asm now enables SP if not set
...
Enabling SP with ASM didn't enable SP or error out when SP wasn't
configured. Now enables SP when '' and errors when 'no'.
SAKKE modinv used large amounts of stack. Change to have more temporary
memory allocated increased to cover the usage.
ECC, SAKKE: sp_<bits>_ecc_mulmod_<cpu><words>() used large amounts of
stack. Allocate when WOLFSSL_SMALL_STACK.
wc_DhCheckKeyPair() not available when HAVE_SELFTEST.
Wasn't compiled in before as WOLFSSL_HAVE_SP_DH wasn't defined.
2022-12-07 09:01:53 +10:00
Sean Parkinson
e5d03cf5ad
Merge pull request #5848 from philljj/fix_mingw64_build
...
Fix mingw-w64 build issues on windows.
2022-12-07 08:57:07 +10:00
Tesfa Mael
5c020c6ad4
Increase RNG_SECURITY_STRENGTH for FIPS
2022-12-06 14:16:29 -08:00
David Garske
ec11c22fb7
Merge pull request #5859 from anhu/ws
...
whitespace
2022-12-06 14:08:10 -08:00
jordan
246ce8dbe1
Cleanup spaces.
2022-12-06 15:24:34 -06:00
Anthony Hu
754440e0f2
whitespace
2022-12-06 15:12:44 -05:00
David Garske
6bde6af973
Merge pull request #5858 from anhu/dtls13_fixups
...
Fixups for problems discovered while testing for DTLS 1.3
2022-12-06 10:44:26 -08:00
David Garske
9e181e8ecb
Merge pull request #5857 from gojimmypi/GitIgnore
...
gitignore old cmake, VisualGDB working & Espressif sdkconfig files
2022-12-06 10:44:05 -08:00
David Garske
824c280d12
Merge pull request #5807 from lealem47/sniffer_error
...
Improvement for sniffer error messages
2022-12-06 09:40:07 -08:00
David Garske
44a1ffa56e
Merge pull request #5855 from ejohnstown/rdrand-ok
...
DRBG OK
2022-12-06 08:53:07 -08:00
David Garske
a5f9e5c3c8
Merge pull request #5820 from SparkiDev/entropy_memuse
...
MemUse Entropy: enabled with HAVE_ENTROPY_MEMUSE
2022-12-06 08:52:45 -08:00
Anthony Hu
7935a11b3e
Fixups for problems discovered while testing for DTLS 1.3
2022-12-06 11:30:23 -05:00
gojimmypi
ef63a5287a
Ignore old cmake, VisualGDB working & Espressif sdkconfig files
2022-12-06 08:10:14 -08:00
David Garske
a6c98a11d9
Merge pull request #5845 from anhu/re-sign
...
Don't regenerate in wolfSSL_PEM_write_bio_X509().
2022-12-06 06:35:13 -08:00
Sean Parkinson
1f6a9d442b
MemUse Entropy: enabled with HAVE_ENTROPY_MEMUSE
...
--enable-entropy-memuse enables the software base entropy gatherer.
The entropy source uses difference in timing to read/write cache lines.
Random indeces into a buffer are updated with the high resolution timer
value which is fed into a hash to produce further random indeces.
The current time is added to the entropy samples at time of
conditioning.
2022-12-06 14:01:16 +10:00
David Garske
47b8caa0b7
Merge pull request #5849 from SparkiDev/sp_int_sp_ecc_fix
...
SP int: fix when ECC specific size code included
2022-12-05 17:15:04 -08:00
John Safranek
3891cd65d8
DRBG OK
...
When initializing the RNG and are using RDRAND, or one of the other
replacement random number generators that could fall back to the
Hash_DRBG if unavailable, set the status to DRBG_OK. This would fix a
problem if someone assumes the DRBG status is meaningful.
2022-12-05 16:09:45 -08:00
JacobBarthelmeh
f1daa2d356
fix other name san parsing and add RID cert to test parsing
2022-12-05 15:51:33 -08:00
Sean Parkinson
6db2ea0672
SP int: fix when ECC specific size code included
...
Was enabled when !SP and HAVE_ECC
Now enabled when !WOLFSSL_SP_MATH and HAVE_ECC
2022-12-06 09:44:05 +10:00
Sean Parkinson
f38c7303eb
Merge pull request #5853 from douzzer/20221205-sp-int-bugprone-macro-parentheses
...
20221205-sp-int-bugprone-macro-parentheses
2022-12-06 09:18:40 +10:00
Daniel Pouzzner
595f8a30d6
wolfcrypt/src/sp_int.c: fix bugprone-macro-parentheses in ALLOC_SP_INT() and ALLOC_SP_INT_ARRAY() introduced in aeca8cb17a.
2022-12-05 15:21:17 -06:00
David Garske
9d9549fbd3
Merge pull request #5836 from anhu/kyber_cleanup
...
Remove kyber-90s and route all kyber through wolfcrypt.
2022-12-05 13:18:44 -08:00
Anthony Hu
312b488582
Remove double free
2022-12-05 15:39:14 -05:00
David Garske
d3441545ef
Merge pull request #5852 from SparkiDev/sp_c_perf_2
...
SP C, SP int: improve performance
2022-12-05 11:51:28 -08:00
David Garske
5dee15d074
Merge pull request #5850 from SparkiDev/sp_exptmod_nct_err_fix
...
SP int: fix check of err in _sp_exptmod_nct
2022-12-05 11:24:12 -08:00
David Garske
304f287a7e
Merge pull request #5828 from SparkiDev/sp_int_static_size
...
SP int: check size required when using sp_int on stack
2022-12-05 11:23:25 -08:00
Anthony Hu
65a5ea7cae
Make sure certs are identical in tests.
2022-12-05 13:57:53 -05:00
Sean Parkinson
22141faf16
SP C, SP int: improve performance
...
In SP C: Improve performance of large digit mul and sqr.
In SP int: include optimized 16 digit mul and sqr when compiling SAKKE.
2022-12-05 14:17:09 +10:00
Sean Parkinson
4601a57ff2
SP int: fix check of err in _sp_exptmod_nct
2022-12-05 09:36:28 +10:00
jordan
87113cc88d
Fix mingw-w64 build issues on windows.
2022-12-03 17:00:44 -06:00
David Garske
b99f5e5041
Merge pull request #5847 from douzzer/20221203-sp-int-missing-const
...
20221203-sp-int-missing-const
2022-12-03 12:39:33 -08:00
Daniel Pouzzner
cd1a61288b
wolfcrypt/src/sp_int.c: in _sp_mont_red(), add missing const in SP_WORD_SIZE == 32 codepath.
2022-12-03 10:14:15 -06:00
David Garske
ea2d79338c
Merge pull request #5846 from douzzer/20221202-dtls-crypt-only-gating
...
20221202-dtls-crypt-only-gating
2022-12-03 07:21:55 -08:00
Anthony Hu
57a5c9701d
Missed a free of der
2022-12-02 17:23:47 -05:00
Anthony Hu
42c37b6831
eliminate need for --enable-kyber
2022-12-02 17:16:41 -05:00
Anthony Hu
f58f3bd986
Don't regenerate in test_wolfSSL_PEM_write_bio_X509(). We don't have the private key.
2022-12-02 16:41:24 -05:00
Lealem Amedie
c506812cf0
Improvement for some sniffer error messages
2022-12-02 13:27:29 -08:00
Daniel Pouzzner
3ea8dd2f67
src/dtls.c: add WOLFCRYPT_ONLY gating.
2022-12-02 15:13:31 -06:00
Lealem Amedie
dd89fe269e
Fix logic in GetSnifferServer
2022-12-02 13:13:16 -08:00
Lealem Amedie
ed69bb33a6
Async Sniffer: Fix for decryption after second handshake
2022-12-02 13:11:23 -08:00
David Garske
efd194ea74
Merge pull request #5842 from SparkiDev/sp_int_clang_tidy
...
SP int: fixes for static analyser clang-tidy
2022-12-02 07:42:00 -08:00
Sean Parkinson
3239ff5b0e
SP int: fixes for static analyser clang-tidy
...
Const poison sp_int.c to allow static analysers to work better.
sp_prime_is_prime_ex() checks whether a->used is negative to avoid bad
behavior.
2022-12-02 13:57:32 +10:00
David Garske
c079455d3e
Merge pull request #5839 from SparkiDev/sp_int_pub_apis
...
SP int: fix which APIs are public available wiht WOLFSSL_SP_MATH
2022-12-01 19:33:11 -08:00
Sean Parkinson
39716737c1
SP int: fix which APIs are public available wiht WOLFSSL_SP_MATH
...
Make sp_rshd not available when WOLFSSL_SP_MATH in header.
sp_rshd is not required by any wolfCrypt code.
Fix sp_rshd comment on #endif
Make sp_div publicly available in some WOLFSSL_SP_MATH builds.
Delare sp_div for some WOLFSSL_SP_MATH builds.
Fix test.c to compile with WOLFSL_SP_MATH and HAVE_VALGRIND.
2022-12-02 09:11:35 +10:00
David Garske
5f410b47b7
Merge pull request #5829 from SparkiDev/sp_invmod_fixes
...
SP int: fix error checks when modulus even
2022-12-01 15:05:22 -08:00
Sean Parkinson
c59d6c36e4
Merge pull request #5838 from douzzer/20221201-fix-kcapi
...
20221201-fix-kcapi
2022-12-02 08:24:14 +10:00
David Garske
8fb92a283a
Merge pull request #5716 from rizlik/dtls_cookie_stateless
...
dtls: allow for stateless client hello parsing
2022-12-01 13:47:33 -08:00
Daniel Pouzzner
1c7826b199
wolfcrypt/src/port/kcapi/kcapi_aes.c: fix error checking on KCAPI wc_AesGcmEncrypt() and wc_AesGcmDecrypt().
2022-12-01 12:54:57 -06:00
David Garske
d1e6ce064f
Merge pull request #5832 from JacobBarthelmeh/fuzzing
...
free signer if malloc cases fail
2022-12-01 10:35:15 -08:00
JacobBarthelmeh
1e8ecd3d71
Merge pull request #5830 from SparkiDev/sp_int_no64bit
...
SP int: check NO_64BIT before speculative using long long
2022-12-01 11:10:33 -07:00
Marco Oliverio
fc4b008912
dtls: fix heap hint in XFREE
2022-12-01 16:47:37 +00:00
Marco Oliverio
abbba4815e
tests: add tests for stateless dtls v1.2 cookie
2022-12-01 16:47:37 +00:00
Marco Oliverio
af00c89f18
dtls v1.2: stateless support WOLFSSL_DTLS_NO_HVR_ON_RESUME
2022-12-01 16:30:54 +00:00
Marco Oliverio
cc7dad3ee6
dtls v1.2: support stateless client hello processing
2022-12-01 16:30:54 +00:00
Marco Oliverio
5bc86b8c2c
fix: dtls: always use version DTLS 1.0 in HelloVerifyRequest
...
see rfc6347 section 4.2.1
2022-12-01 16:30:54 +00:00
Marco Oliverio
4fa1b9dd0a
fix: AddRecordHeader: use correct minor when using DTLS
2022-12-01 16:30:54 +00:00
Marco Oliverio
aff01121a2
fix: dtls v1.2: reset window when invoking DtlsResetState
2022-12-01 16:30:54 +00:00
Marco Oliverio
173208728a
fix: tls13: hash using right version when downgrading
2022-12-01 16:30:54 +00:00
Marco Oliverio
2c35d7f9d2
fix: formatting and typos
...
dtls: fix debug message when downgrading
internal.c: fix typo
2022-12-01 16:30:53 +00:00
David Garske
1388e66059
Merge pull request #5706 from icing/ha-quic
...
Set of QUIC related changes for HAProxy integration.
2022-12-01 06:11:14 -08:00
Stefan Eissing
e5cfd96609
QUIC API support in OpenSSL compat layer, as needed by HAProxy integration.
...
- adding patch for HAProxy, see dod/QUIC.md, based on current master.
For documentaton purposes, since HAProxy does not accept PRs. To be
removed once forwarded to the project.
2022-12-01 10:12:35 +01:00
Sean Parkinson
aeca8cb17a
SP int: check size required when using sp_int on stack
...
SP int can be configured to declare temporary sp_ints.
Check that the requested number of digits is not larger than the max
supported (SP_INT_DIGITS).
Also check arrays of sp_ints too.
2022-12-01 12:53:52 +10:00
David Garske
2d88fd3b75
Merge pull request #5835 from lealem47/zd15262
...
Making CTC_MAX_CRLINFO_SZ a compile-time option
2022-11-30 17:35:11 -08:00
Sean Parkinson
e83e0693b9
SP int: check NO_64BIT before speculative using long long
...
ULLONG_MAX is not defined for old versions of C compiler.
An unsigned long long type may still be available though.
Don't use unsigned long long for a 64-bit type when NO_64BIT is defined.
2022-12-01 10:25:13 +10:00
David Garske
c6a7afee74
Merge pull request #5834 from anhu/http
...
Correction to a webpage link.
2022-11-30 15:14:35 -08:00
Lealem Amedie
eba6a6d9f6
Making CTC_MAX_CRLINFO_SZ a compile-time option
2022-11-30 14:24:23 -08:00
Anthony Hu
a2fb4c0788
Remove kyber-90s and route all kyber through wolfcrypt.
2022-11-30 17:17:28 -05:00
Anthony Hu
3b00c9abee
Correction to a webpage link.
2022-11-30 16:27:50 -05:00
JacobBarthelmeh
01833a369e
free signer if malloc cases fail
2022-11-30 10:02:33 -08:00
gojimmypi
fec7469c19
Tidy up Espressif ESP32 test and benchmark examples ( #5800 )
...
Tidy up Espressif ESP32 test and benchmark examples:
* add VisualGDB project and solution files for server and client
* "hardware in use revert to software" is now verbose level message
* Remove (void) TAG; - not needed to appease compiler
* include esp_log.h lib with defined(WOLFSSL_ESPIDF)
* large ESP32 default stack size
* check for max number of arguments assembled into array
* cleanup & comments per code review
* wolfssl_test VisualGDB updates
* Espressif wolfssl_test default stack 55,000 bytes
2022-11-30 10:01:46 -08:00
Sean Parkinson
c7c80be15e
SP int: sp_invmod_div check div result before proceeding
2022-11-30 18:33:35 +10:00
Sean Parkinson
faf848a915
SP int: fix error checks when modulus even
2022-11-30 18:15:30 +10:00
Daniel Pouzzner
973de0e954
Merge pull request #5831 from SparkiDev/sp_int_div_clear_fix
...
SP int: don't call sp_clear unless no longer using sp_int
2022-11-30 02:15:19 -06:00
Sean Parkinson
61c2fd9a2b
SP int: don't call sp_clear unless no longer using sp_int
...
Put in casts to be sure no compiler complains.
Tidy up other parts of the code.
2022-11-30 16:36:48 +10:00
David Garske
24cc8e7145
Merge pull request #5827 from douzzer/20221129-ecb-benchmark-throughput
...
20221129-ecb-benchmark-throughput
2022-11-29 18:12:23 -08:00
David Garske
63051f3826
Merge pull request #5825 from SparkiDev/api_test_sep
...
Unit test: rework to be able to run API tests individually
2022-11-29 18:11:57 -08:00
Sean Parkinson
fed3f53969
Merge pull request #5826 from kaleb-himes/gcc-11-12-fixes
...
Initialize variable causing failures with gcc-11 and gcc-12
2022-11-30 10:40:17 +10:00
Daniel Pouzzner
4bacc25e22
examples/benchmark/tls_bench.c: fix for clang-analyzer-deadcode.DeadStores in bench_tls().
2022-11-29 17:09:05 -06:00
David Garske
b2f9838af4
Fix DSA public decode to allow extra buffer (in case private key is passed in). Fixes for clang-tidy "value stored never read". Allow showing line number and conditional with DEBUG_WOLFSSL_VERBOSE on TEST_RES_CHECK.
2022-11-29 14:58:52 -08:00
kaleb-himes
4d2b893fb3
Initialize variable causing failures with gcc-11 and gcc-12
2022-11-29 14:59:53 -07:00
Daniel Pouzzner
a9b28c1562
wolfcrypt/benchmark/benchmark.c: make iteration increment in bench_aesecb_internal() even lumpier (by a factor of 10) to further reduce false positives from iteration overhead.
2022-11-29 14:39:44 -06:00
David Garske
7310eb102f
Whitespace and line length cleanups.
2022-11-29 09:52:11 -08:00
Sean Parkinson
e4e53ab7ca
Unit test: rework to be able to run API tests individually
...
Change API test cases to return a result.
Test success is now TEST_SUCCESS (1).
Test result can be returned with use of macro TEST_RES_CHECK().
Always print the id, name of the test and the result (skipped or
otherwise) before and after running the test case.
Changed test case output to go to stderr.
Fixed some formatting.
Add option to take index and/or name of test case to run.
Added option to list all API tests.
Added option to only run API tests.
Added options to show usage.
2022-11-29 12:37:20 +10:00
David Garske
7aa796bdbd
Merge pull request #5824 from SparkiDev/pkcs11_init_rv
...
PKCS#11: add initialization API that returns PKCS#11 return value
2022-11-28 14:31:03 -08:00
David Garske
3046899966
Merge pull request #5821 from anhu/ntru_saber_purge
...
Purge NTRU and SABER. Not going to be standardized.
2022-11-28 08:28:11 -08:00
David Garske
7697337703
Merge pull request #5816 from SparkiDev/sp_int_rework
...
SP int: Comment and rework some code
2022-11-28 08:26:58 -08:00
David Garske
0c2f713ca3
Merge pull request #5823 from SparkiDev/arm32-ldrd-fixes
...
ARM32 ASM: don't use ldrd on user data
2022-11-28 08:25:23 -08:00
Sean Parkinson
7005d416ce
SP int: Comment and rework some code
...
Improvements to sp_int.c that make it slightly quicker and documented.
2022-11-28 18:06:09 +10:00
Sean Parkinson
2d424f7d06
PKCS#11: add initialization API that returns PKCS#11 return value
2022-11-28 16:40:29 +10:00
Sean Parkinson
847c478c45
ARM32 ASM: don't use ldrd on user data
...
Alignment fixes.
Regeneration of ARM32 has config.h included.
2022-11-28 12:59:58 +10:00
Anthony Hu
7c576de914
Fixes from testing
2022-11-25 16:00:09 -05:00
Anthony Hu
0bfa5c9836
Purge NTRU and SABER. Not going to be standardized.
2022-11-25 14:54:08 -05:00
Sean Parkinson
ee91f4415d
Merge pull request #5819 from miyazakh/enable_sp_math_conf
...
must have SP enabled with SP math
2022-11-25 21:16:29 +10:00
Hideki Miyazaki
3597034a42
must have SP enabled with SP math
2022-11-25 08:41:11 +09:00
Sean Parkinson
ba3022c32a
Merge pull request #5818 from anhu/remove_WOLFSSL_HAVE_KYBER
...
Remove some unnecessary guarding. Preventing build on STM32.
2022-11-25 08:00:31 +10:00
Sean Parkinson
558343dd2b
Merge pull request #5817 from douzzer/20221124-wc_GetCurrentIdx-prototype
...
20221124-wc_GetCurrentIdx-prototype
2022-11-25 07:58:26 +10:00
Anthony Hu
5e191b7218
Remove some unnecessary guarding. Preventing build on STM32.
2022-11-24 11:49:12 -05:00
Daniel Pouzzner
466b625b5d
wolfcrypt/src/logging.c: add missing void arg list to definition of wc_GetCurrentIdx().
2022-11-24 09:32:58 -06:00
Sean Parkinson
d0fb9a0b30
Merge pull request #5809 from tmael/sp_static_mem
...
Support static memory with sp-math
2022-11-24 12:42:42 +10:00
Sean Parkinson
cf8ea5c606
Merge pull request #5812 from ejohnstown/crl-ocsp
...
OCSP/CRL
2022-11-24 12:42:17 +10:00
John Safranek
88f3570fe4
OCSP/CRL
...
Added comments for the usage of OCSP_WANT_READ used with the CRL I/O
callback.
2022-11-23 16:35:10 -08:00
David Garske
0a38553909
Merge pull request #5798 from JacobBarthelmeh/python
...
account for 'pulled' error nodes
2022-11-23 14:57:03 -08:00
David Garske
a482ab367a
Merge pull request #5781 from anhu/maxq10xx
...
Support for Analog Devices MAXQ1080 and MAXQ1065
2022-11-23 13:31:22 -08:00
John Safranek
909fd726cd
OCSP/CRL
...
Fixing issue #3070 . When the OCSP responder returns an unknown exception,
continue through to checking the CRL. Before, it was setting the flag
to check CRL, then clearing it because of the exception.
2022-11-23 10:50:12 -08:00
Anthony Hu
f3546b50fd
Conform to pre-existing pattern.
2022-11-23 17:58:12 +00:00
Anthony Hu
6190666108
Support for Analog Devices MAXQ1080 and MAXQ1065
2022-11-23 11:57:31 -05:00
Sean Parkinson
54466b670a
Merge pull request #5810 from Uriah-wolfSSL/haproxy-integration
...
Added required config option and return value for HaProxy
2022-11-23 10:01:17 +10:00
Tesfa Mael
4c95f64b77
Check NO_BIG_INT with static memory
2022-11-22 15:32:34 -08:00
Jacob Barthelmeh
b6ae17804a
update comments and check error case
2022-11-22 11:22:38 -07:00
Uriah Pollock
d373c0856a
Added required config option and return value for HaProxy
2022-11-22 10:42:05 -06:00
Tesfa Mael
5c7127ff24
Support static memory with sp-math
2022-11-22 08:17:27 -08:00
Juliusz Sosinowicz
50f19ec225
Merge pull request #5806 from embhorn/zd15177
...
Fix X509_get1_ocsp to set num of elements in stack
2022-11-22 12:00:08 +01:00
Sean Parkinson
55718d214c
Merge pull request #5801 from philljj/zd15172
...
Fix leak in wolfSSL_X509_NAME_ENTRY_get_object.
2022-11-22 15:11:18 +10:00
Eric Blankenhorn
dee73887b8
Fix X509_get1_ocsp to set num of elements in stack
2022-11-21 08:25:46 -06:00
Sean Parkinson
73ecd604bd
Merge pull request #5803 from douzzer/20221120-enable-brainpool
...
20221120-enable-brainpool
2022-11-21 10:08:50 +10:00
Daniel Pouzzner
0da2a0a524
configure.ac: add --enable-brainpool, default on unless disable-ecccustcurves, and use it to enable brainpool in enable-all and enable-all-crypto, subject to override.
2022-11-20 11:00:50 -06:00
David Garske
ba8731dc69
Merge pull request #5802 from douzzer/20221118-minor-fixes
...
20221118-minor-fixes
2022-11-19 08:11:53 -08:00
Daniel Pouzzner
2fa206dec0
wolfcrypt/src/siphash.c: fix bugprone-macro-parentheses, and in wc_SipHash(), fix clang-diagnostic-overlength-strings around inline asm.
2022-11-18 22:43:13 -06:00
Daniel Pouzzner
6f98a5b271
src/internal.c: in VerifyServerSuite(), narrow condition and fix return value in error check added in 647ce794dd.
2022-11-18 22:21:08 -06:00
Daniel Pouzzner
39ee267a31
configure.ac: mutually harmonize --enable-all and --enable-all-crypto: add enable-siphash to enable-all, and add Brainpool to enable-all-crypto.
2022-11-18 22:13:22 -06:00
kareem-wolfssl
9f36d9e530
Merge pull request #5799 from tim-weller-wolfssl/gh5754-mips64-abi32
...
Add check for 64-bit ABI on MIPS64 before declaring a 64-bit CPU
2022-11-18 13:19:39 -07:00
jordan
153ab82ad8
Fix leak in wolfSSL_X509_NAME_ENTRY_get_object.
2022-11-18 11:23:15 -06:00
tim-weller-wolfssl
f586183d1e
Add check for 64-bit ABI on MIPS64 before declaring a 64-bit CPU
2022-11-18 07:12:04 -06:00
JacobBarthelmeh
34f8fa797e
Merge pull request #5695 from embhorn/gh5693
...
Fix --enable-devcrypto build error for sys without u_int8_t type
2022-11-17 16:01:35 -07:00
JacobBarthelmeh
143dac64a3
account for 'pulled' error nodes
2022-11-17 14:51:37 -08:00
David Garske
bd7b442df3
Merge pull request #5796 from tmael/mem_err
...
Propagate malloc returning NULL up the call stack
2022-11-16 12:45:42 -08:00
Tesfa Mael
2a2cf5671e
Move error check in CompareSuites
2022-11-16 09:29:24 -08:00
Tesfa Mael
647ce794dd
unmask malloc returning NULL
2022-11-16 09:25:25 -08:00
Kaleb Himes
38b511f297
Merge pull request #5651 from haydenroche5/engine_pss_fips_v5
...
Add RSA PSS salt defines to engine builds if not FIPS v2.
2022-11-15 16:30:45 -07:00
David Garske
7d046e0eb8
Merge pull request #5793 from philljj/zd15041
...
Support ASN1/DER CRLs in LoadCertByIssuer.
2022-11-15 14:05:10 -08:00
jordan
17105606b1
Cleanup format and typos, and use WOLFSSL_FILETYPE.
2022-11-15 11:45:11 -06:00
Eric Blankenhorn
dc9f46a3be
Fix --enable-devcrypto build error for sys without u_int8_t type
2022-11-11 15:40:12 -06:00
David Garske
9036c098b0
Merge pull request #5760 from cconlon/se050
...
NXP SE050: feature expansion and fixes
2022-11-11 13:31:05 -08:00
jordan
81ed2a60b4
Support ASN1/DER CRLs in LoadCertByIssuer.
...
This fixes hash based dir lookup of ASN1/DER CRLs in OpenSSL
compatible API. The function wolfSSL_X509_load_crl_file is
called with entry->dir_type, rather than hardcoded filetype.
A new test crl was added, and existing crl 0fdb2da4.r0 was
reorganized to a new dir.
Also, completes the stub wolfSSL_X509_LOOKUP_add_dir. A new
test function test_X509_LOOKUP_add_dir was added to tests/api.c
2022-11-11 15:13:00 -06:00
David Garske
cb7f73d0a3
Merge pull request #5792 from JacobBarthelmeh/Testing
...
allow for cpuid public functions with non-intel build
2022-11-11 12:28:06 -08:00
Chris Conlon
45bf793b5a
SE050 expansion: add RSA support, allow for larger key IDs, get/set key ID from ecc_key/RsaKey, fixes for SE050 hashing, remove XREALLOC dependency, API to store/get binary object, API to erase object, test.c compatibility
2022-11-11 12:14:14 -07:00
David Garske
9c569b950a
Merge pull request #5791 from douzzer/20221110-wc_DhAgree_Sync-uninited-use
...
20221110-wc_DhAgree_Sync-uninited-use
2022-11-11 09:01:52 -08:00
Jacob Barthelmeh
c78b669b42
allow for cpuid public functions with non-intel build
2022-11-11 09:42:02 -07:00
Daniel Pouzzner
3bfff3bfc5
wolfcrypt/src/dh.c: fix benign uses of uninited var in wc_DhAgree_Sync(), introduced in #5782 -- see oss-fuzz #53177 .
2022-11-11 08:51:17 -06:00
JacobBarthelmeh
7887576032
Merge pull request #5788 from dgarske/small_build
...
Fix for misc `HashObject` to be excluded for `WOLFCRYPT_ONLY`
2022-11-10 16:03:25 -07:00
David Garske
f4621a6807
Merge pull request #5786 from philljj/zd15125
...
Fix incorrect self signed error return.
2022-11-10 14:13:38 -08:00
jordan
5ad6ff23d5
Use local int lastErr instead of args->lastErr.
2022-11-10 13:46:51 -06:00
David Garske
77ffacf6d1
Fix for build error with SHA2-256 disabled.
2022-11-10 11:38:08 -08:00
JacobBarthelmeh
95a3fea947
Merge pull request #5789 from dgarske/aesccm256
...
Added AES CCM 256-bit test
2022-11-10 10:54:00 -07:00
JacobBarthelmeh
154378220d
Merge pull request #5790 from per-allansson/xcode-project-fixes
...
Xcode project fixes
2022-11-10 10:46:31 -07:00
David Garske
3b23a49a5f
Merge pull request #5761 from tim-weller-wolfssl/zd15084-x509-crl-fail
...
Link newly created x509 store's certificate manager to self by default
2022-11-10 06:10:18 -08:00
Per Allansson
0e4621a794
IDE/XCODE: include armv8-xxx in projects
2022-11-10 09:44:56 +01:00
Per Allansson
364b2ddc8f
IDE/XCODE: include dtls.c/dtls13.c/tls13.c/quic.c/kdf.c in projects
2022-11-10 09:44:01 +01:00
David Garske
c573ba9864
Merge pull request #5758 from per-allansson/dtls13-fips
...
Allow DTLS 1.3 to compile when FIPS is enabled
2022-11-09 18:18:06 -08:00
David Garske
90d37f9786
Add AES CCM 256-bit test.
2022-11-09 17:46:07 -08:00
Sean Parkinson
5d2124e70d
Merge pull request #5787 from dgarske/fixes_minor
...
Fix for `test_wolfSSL_sk_CIPHER_description` incorrectly failing
2022-11-10 09:22:08 +10:00
tim-weller-wolfssl
3bc3ec25b8
Add link of newly created x509 store's certificate manager to self by default
2022-11-09 17:17:30 -06:00
David Garske
35ccd880ed
Fix for misc HashObject to be excluded for WOLFCRYPT_ONLY.
2022-11-09 15:07:36 -08:00
Sean Parkinson
922771bf05
Merge pull request #5785 from miyazakh/undef_gcc4p8
...
fix compile error due to Werro=undef on gcc-4.8
2022-11-10 08:05:56 +10:00
David Garske
57ae840f39
Fix for test_wolfSSL_sk_CIPHER_description incorrectly failing with TLS v1.3 NULL cipher.
2022-11-09 12:05:16 -08:00
jordan
961c696436
Fix incorrect self signed error return.
...
ASN_SELF_SIGNED_E was being overwritten with ASN_NO_SIGNER_E when
compiled with certreq and certgen.
2022-11-09 10:27:31 -06:00
David Garske
231a4098fa
Merge pull request #5783 from SparkiDev/sp_small_p521_fix
...
SP P521 small HAVE_COMP_KEY: sp_521_mont_sqr_n*
2022-11-09 06:07:12 -08:00
Hideki Miyazaki
454cd02627
fix compile error due to Werro=undef on gcc-4.8
2022-11-09 14:00:50 +09:00
Daniel Pouzzner
1938b117c2
Merge pull request #5782 from SparkiDev/dh_sp_agree_0_1_fix
...
DH: fix when using SP
2022-11-08 22:41:08 -06:00
Sean Parkinson
3e58c63647
SP P521 small HAVE_COMP_KEY: sp_521_mont_sqr_n*
...
Specific compress key code for P521 doesn't need a n square function.
Fixing generation of x86_64 ASM scripts resulted in adding carriage
return to chacha_asm.S.
2022-11-09 11:43:13 +10:00
Sean Parkinson
2d757eadd0
DH: fix when using SP
...
The agreed secret must not be 0 or 1 by SP800-56A, 5.7.1.1.
Check done when not using SP.
Add check to SP calling code.
2022-11-09 09:55:16 +10:00
David Garske
eac3b4e189
Merge pull request #5752 from julek-wolfssl/alt-name-str-type
...
Set alt name type to V_ASN1_IA5STRING
2022-11-08 15:42:39 -08:00
Sean Parkinson
dfa997a6fd
Merge pull request #5780 from douzzer/20221105-benchmark-determinism-fixes
...
20221105-benchmark-determinism-fixes
2022-11-09 08:44:08 +10:00
Sean Parkinson
72a4a8a377
Merge pull request #5599 from embhorn/gh5580
...
Fix casts in evp.c and build issue in ParseCRL
2022-11-09 08:40:31 +10:00
Daniel Pouzzner
48ba365fd6
fixes for defects:
...
clang-analyzer-deadcode.DeadStores in examples/server/server.c;
-Werror=use-after-free and LeakSanitizer Direct leak in tests/api.c;
nullPointerRedundantCheck in src/pk.c which identified a semantically consequential flub.
2022-11-08 14:04:16 -06:00
Daniel Pouzzner
ca1ca24bc9
wolfcrypt/benchmark/benchmark.c: fix formatting (column alignment) in asym tests; fix typo in asym_pq section.
2022-11-08 12:31:04 -06:00
Eric Blankenhorn
4b30f47e9b
Fix casts in evp.c and build issue in ParseCRL
2022-11-08 10:59:18 -06:00
Sean Parkinson
bd83345c02
Merge pull request #5773 from dgarske/async_v5.5.3
...
Fixes for various tests that do not properly handle `WC_PENDING_E`
2022-11-08 14:47:23 +10:00
Sean Parkinson
3d228415f4
Merge pull request #5734 from dgarske/zd15017
...
Fixes for async sniffer handling of packets with multiple TLS messages
2022-11-08 14:46:40 +10:00
David Garske
d42f8e0834
Merge pull request #5600 from embhorn/zd14858
...
Add reference to wc_AesInit in Gmac API doc
2022-11-07 17:44:35 -08:00
David Garske
826dfd8a23
Merge pull request #5766 from SparkiDev/x509_subj_dir_attr_fix
...
ASN X509 subject directory attribute: fix ASN template parsing
2022-11-07 17:41:27 -08:00
David Garske
44e66fd7c7
Merge pull request #5762 from SparkiDev/pkcs11_find_no_class_type
...
PKCS#11: compile time check in finding keys
2022-11-07 17:40:50 -08:00
David Garske
9c645cf5ce
Merge pull request #5747 from SparkiDev/pkcs11_nullptr_user_pin
...
PKCS#11: User PIN can be NULL_PTR
2022-11-07 17:40:38 -08:00
David Garske
2e362a193e
Merge pull request #5742 from SparkiDev/sp_int_64bit_type
...
SP int: guess 64-bit type
2022-11-07 17:40:14 -08:00
David Garske
20913a4201
Fix for sniffer with async to not terminate processing until all pending items have been processed.
2022-11-07 15:45:50 -08:00
David Garske
887b4bd9f0
Merge pull request #5767 from haydenroche5/load_system_root_certs
...
Improve logic for enabling system CA certs on Apple devices.
2022-11-07 15:15:13 -08:00
Sean Parkinson
829fd71714
Merge pull request #5779 from dgarske/compat_heap
...
Fixes for compatibility layer building with heap hint and OSSL callbacks
2022-11-08 08:59:26 +10:00
David Garske
6ca8336c52
Fix for asynchronous sniffer edge case for back to back sessions where new session was created while still pending.
2022-11-07 13:52:40 -08:00
David Garske
0fc303e1fc
Do not throw warning when disabling feature automatically.
2022-11-07 13:10:19 -08:00
David Garske
d2fe30349a
Merge pull request #5778 from kaleb-himes/fix-azsphere-nightly-test
...
Update azsphere support to prevent compilation of file included inline
2022-11-07 12:48:31 -08:00
David Garske
583940ee30
Merge pull request #5776 from SparkiDev/sp_int_mingw64_fix
...
SP int: support mingw64 again
2022-11-07 11:39:12 -08:00
David Garske
59774ae576
Fixes for building with use of heap hint and compatibility layer. Fix for invalid OSSL callback function errors.
2022-11-07 11:33:39 -08:00
kaleb-himes
b052ef46ba
Add new setting per peer review feedback
2022-11-07 11:25:01 -07:00
kaleb-himes
0a97aa83b6
Update azsphere support to prevent compilation of file included inline
2022-11-07 10:36:24 -07:00
Sean Parkinson
b845c8bfc8
SP int: support mingw64 again
...
Check for _MSC_VER to determine that we are compiling for MSVC.
2022-11-07 16:34:26 +10:00
David Garske
1ee3a78e4a
Fixes for various tests that do not properly handle WC_PENDING_E.
2022-11-04 14:56:40 -07:00
Hayden Roche
d0f33f62f4
Fix missing config.h include in some ARMv8 files.
2022-11-04 13:53:22 -07:00
Hayden Roche
d7cbd8cd17
Improve logic for enabling system CA certs on Apple devices.
...
In configure.ac and CMakeLists.txt, check for the header
Security/SecTrustSettings.h. If this header is found, enable the feature. If
it isn't, disable it. For non-configure/non-CMake builds, require the user to
explicitly define HAVE_SECURITY_SECTRUSTSETTINGS_H if they want to use system
CA certs (handled in settings.h).
2022-11-04 13:52:45 -07:00
Hayden Roche
5d70f3efce
Merge pull request #5730 from philljj/zd15040
2022-11-04 13:32:48 -07:00
Hayden Roche
4a917219f7
Merge pull request #5608 from SparkiDev/pk_c_rework_2
2022-11-04 13:32:36 -07:00
Hayden Roche
1ce5951f0d
Merge pull request #5722 from dgarske/stm32
2022-11-04 13:32:11 -07:00
Hayden Roche
7cc2336af7
Merge pull request #5737 from SparkiDev/ecc_cofactor
2022-11-04 13:31:24 -07:00
Hayden Roche
e3621d5bb1
Merge pull request #5771 from dgarske/revert-5622-sniffer_sequence
2022-11-04 13:25:48 -07:00
Chris Conlon
dce1fc4766
Merge pull request #5703 from miyazakh/renesas_rx72n_simple
2022-11-04 11:43:08 -06:00
John Safranek
5f4cf53d87
Merge pull request #5772 from JacobBarthelmeh/OCSP
2022-11-04 09:46:42 -07:00
JacobBarthelmeh
8225d3642b
save next status with OCSP response verify
2022-11-03 22:39:47 -07:00
Hayden Roche
cbbe6fec94
Merge pull request #5763 from douzzer/20221031-benchmark-determinism
2022-11-03 14:52:59 -07:00
David Garske
f610df59a9
Whitespace cleanups.
2022-11-03 14:38:43 -07:00
Hayden Roche
fbc4af8701
Merge pull request #5739 from anhu/no_WOLFSSL_DYN_CERT
2022-11-03 14:24:34 -07:00
Hayden Roche
7414dd7ea5
Merge pull request #5768 from kareem-wolfssl/maxCertpolSz
2022-11-03 14:23:17 -07:00
Kareem
48bddc6d07
Update max Cert Policy size based on RFC 5280.
2022-11-03 11:49:15 -07:00
Daniel Pouzzner
b140abd1fd
wolfcrypt/benchmark/benchmark.c: add check_for_excessive_stime() and remove double declaration of base_rusage and cur_rusage.
2022-11-03 13:48:51 -05:00
David Garske
1adc06d181
Fix for Intel QAT handling of sign R when cofactor is not 1. ZD 15017
2022-11-03 10:00:07 -07:00
Sean Parkinson
4766a978cf
ECC cofactor: fix check scalar bits
...
For shared secrets, when a curve has a cofactor, the private key (in
range of order) is multiplied by the cofactor before use.
If there is a cofactor involved, check bit size of scalar against
modulus instead of order.
2022-11-03 10:00:07 -07:00
David Garske
1ec2b14922
Revert "Fix for sniffer to decode out of order packets"
2022-11-03 09:50:15 -07:00
Sean Parkinson
336bef666a
ASN X509 subject directory attribute: fix ASN template parsing
...
Support multiple attributes.
When Country of Citizenship, pull out PRINTABLE_STRING explicitly.
Each type of attribute has a different format.
2022-11-03 09:24:59 +10:00
David Garske
a7635da9e6
Merge pull request #5765 from JacobBarthelmeh/release
...
update for version 5.5.3
2022-11-02 15:46:10 -07:00
JacobBarthelmeh
9b895b74bf
update for version 5.5.3
2022-11-02 13:58:37 -07:00
Sean Parkinson
ae22babf8b
PKCS#11: compile time check in finding keys
...
When WC_PKCS11_FIND_WITH_ID_ONLY defined, don't add key class and
type to attributes of search for by Id.
2022-11-01 17:38:46 +10:00
Daniel Pouzzner
4ab41caf40
make static flags sym_header_printed, asym_header_printed, and pqasym_header_printed, local to the routines that use them (fixes an -Wunused-variable in -UBENCH_ASYM builds).
2022-11-01 01:12:17 -05:00
Daniel Pouzzner
89182b829f
wolfcrypt/benchmark/benchmark.c: add GENERATE_MACHINE_PARSEABLE_REPORT and LINUX_RUSAGE_UTIME codepaths;
...
fflush stdout after each scenario for line-buffered pipelining;
refactor csv_header_count into sym_header_printed, asym_header_printed, and pqasym_header_printed;
move SAKKE tests to precede PQ tests;
rename bench_stats_sym_check() to bench_stats_check();
add bench_stats_asym_finish_ex() accepting a "desc_extra" arg, and use it to disambiguate otherwise-homonymous SAKKE runs;
fix bench_aesecb_internal() to not check time (syscall) for every 3 blocks processed.
2022-11-01 00:15:37 -05:00
JacobBarthelmeh
502a395723
Merge pull request #5757 from SparkiDev/enc_err_forcezero_fix
...
ForceZero fix: encryption fail and not EtM
2022-10-31 11:43:48 -06:00
Per Allansson
0a88bb9779
Allow DTLS 1.3 to compile when FIPS is enabled
2022-10-31 08:42:13 +01:00
Sean Parkinson
4efba8f437
ForceZero fix: encryption fail and not EtM
...
Zeroizing of plaintext on encryption failure will use wrong size when
not using Encrypt-then-MAC. Size may go negative and cast to unsigned.
2022-10-31 09:14:16 +10:00
Juliusz Sosinowicz
8bbbdfa3f9
Set alt name type to V_ASN1_IA5STRING
2022-10-28 19:58:01 +02:00
Anthony Hu
0158c82487
Keep WOLFSSL_DYN_CERT
2022-10-28 13:37:55 -04:00
David Garske
0ea0b887a5
Merge pull request #5749 from JacobBarthelmeh/release
...
update version to 5.5.2
2022-10-28 09:22:50 -07:00
JacobBarthelmeh
8fd5a4061c
Merge pull request #5748 from SparkiDev/arm32_asm_lr_fixup
...
ARM32 ASM: fix asm saving and restoring of registers
2022-10-28 07:37:02 -06:00
JacobBarthelmeh
eb52083afd
update version to 5.5.2
2022-10-28 06:25:33 -07:00
jordan
c4e758dda5
Fix X509 subject and issuer name_hash mismatch
...
Fix logging message and g++ invalid conversion error.
2022-10-27 19:31:30 -05:00
Sean Parkinson
7bd8ced7af
ARM32 ASM: fix asm saving and restoring of registers
...
Fix push and pop generated at beginning and end of function.
2022-10-28 09:51:32 +10:00
Sean Parkinson
4b648e7e08
PKCS#11: User PIN can be NULL_PTR
...
Allow TokenInit to store NULL for User Pin.
New APIs to handle not setting User PIN.
2022-10-28 08:52:18 +10:00
jordan
822f11d1a1
Fix X509 subject and issuer name_hash mismatch
...
Refactor duplicate code a bit more.
2022-10-27 15:15:55 -05:00
JacobBarthelmeh
319901a85c
Merge pull request #5743 from SparkiDev/tls_perf_fix_forcezero
...
TLS performance fix: ForceZero minimization
2022-10-27 13:43:17 -06:00
JacobBarthelmeh
7366a9edbd
Merge pull request #5744 from SparkiDev/regression_fixes_4
...
Regresssion testing fixes
2022-10-27 11:49:52 -06:00
Hideki Miyazaki
e9d37b9bd1
addressed code review
2022-10-27 16:52:04 +09:00
Sean Parkinson
fd7544ca19
Regresssion testing fixes
...
Ed25519 and Ed448 need to enable certs.
If no system CA certs can't be parsed,
wolfSSL_CTX_load_system_CA_certs() will fail. Don't try test if RSA and
ECC are not enabled.
Fix benchmark.c so that e is defined when WOLFSSL_BENCHMARK_ALL defined.
MAX_LENGTH_SZ is 4 and supports lengths up to 2^24 - one byte for length
and 3 bytes of length.
(new gcc compiler fix)
2022-10-27 17:47:48 +10:00
Sean Parkinson
b1e37377a1
TLS performance fix: ForceZero minimization
...
Don't ForceZero the output buffer before free.
ForceZero it when encryption fails.
ShrinkInputBuffer needs to zeroize input buffer even if not currently
encrypting as it may be using the buffer on wolfSSL object reuse.
Fix SP to zeroize the whole buffer.
Fix DH to check cBuf when WOLFSSL_CHECK_MEM_ZERO defined.
2022-10-27 17:00:42 +10:00
JacobBarthelmeh
1c09a67f6a
Merge pull request #5735 from SparkiDev/aes_gcm_c_dec_auth
...
AES GCM decrypt C: don't decrypt when auth tag invalid
2022-10-26 22:41:25 -06:00
Sean Parkinson
7a4657c881
Fixes from review 3
2022-10-27 11:25:27 +10:00
Sean Parkinson
8519988d57
SP int: guess 64-bit type
...
When ULLONG_MAX not defined and long is the 32-bit type, speculatively
use long long as the 64-bit type.
2022-10-27 10:19:21 +10:00
Hayden Roche
294a26ba0c
Merge pull request #5708 from JacobBarthelmeh/OCSP
2022-10-26 15:43:15 -07:00
David Garske
fe28702891
Fixes for async sniffer handling of packets with multiple TLS messages. Other minor cleanups for spelling and CheckPreRecord SnifferSession deference.
2022-10-26 15:28:02 -07:00
David Garske
e26d4f84fc
Improvements for AES GCM on STM32. Cleanups for STM32 example.
2022-10-26 14:10:19 -07:00
JacobBarthelmeh
8f2d35bb84
Merge pull request #5741 from douzzer/20221026-fixes-QUIC-and-ALPN
...
20221026-fixes-QUIC-and-ALPN
2022-10-26 15:03:28 -06:00
Hayden Roche
b477804462
Merge pull request #5725 from julek-wolfssl/rpm-pkg
2022-10-26 13:33:16 -07:00
jordan
b31567e752
Fix X509 subject and issuer name_hash mismatch
...
Refactor duplicate code, and better error messages.
2022-10-26 15:27:15 -05:00
JacobBarthelmeh
d08c204466
remove extra memset
2022-10-26 12:54:17 -07:00
Daniel Pouzzner
1608037c6b
Merge pull request #5740 from JacobBarthelmeh/release
...
minor warning fixes
2022-10-26 14:09:01 -05:00
Eric Blankenhorn
4d36d494b2
Merge pull request #5738 from SKlimaRA/SKlimaRA/fix-backslash-random-c
...
removed backslash
2022-10-26 12:42:49 -05:00
JacobBarthelmeh
33617588fc
fix setting dynamic flag with ocsp and asn template
2022-10-26 10:31:50 -07:00
Jacob Barthelmeh
8d6ee0b26a
minor warning fixes
2022-10-26 10:48:51 -06:00
David Garske
0c79ca1de1
Fix for STM32 PKA with coefSign for non 256-bit curves. Don't check point for STM PKA. ZD14928
2022-10-26 09:44:58 -07:00
Daniel Pouzzner
dfa603e502
fixes for warnings and defects around QUIC and ALPN -- fixes for clang-diagnostic-gnu-zero-variadic-macro-arguments, clang-analyzer-deadcode.DeadStores, clang-analyzer-core.UndefinedBinaryOperatorResult, clang-analyzer-security.insecureAPI.strcpy, and an overrun prevention assert in wolfSSL_ALPN_GetPeerProtocol().
2022-10-26 11:32:06 -05:00
JacobBarthelmeh
a26b89f66b
fix leak with multiple entries
2022-10-26 09:29:06 -07:00
Anthony Hu
9486721bb8
Prevent WOLFSSL_NO_MALLOC from breaking RSA certificate verfication
2022-10-26 12:11:55 -04:00
jordan
be07401856
Fix X509 subject and issuer name_hash mismatch
...
Use WOLFSSL_ERROR_MSG for errors, don't leak canonName, and better
error handling and comments.
2022-10-26 10:25:05 -05:00
Stanislav Klima
6fa43a3d84
removed backslash
2022-10-26 15:03:31 +02:00
Sean Parkinson
5db2d53d54
Fixes from review part 2
2022-10-26 16:04:05 +10:00
Sean Parkinson
2d19f00dd5
Merge pull request #5736 from douzzer/20221025-fixes-wolfsentry-and-armv7a
...
20221025-fixes-wolfsentry-and-armv7a
2022-10-26 12:38:01 +10:00
Sean Parkinson
e68c7bb74d
Move file and BIO reading out to ssl_misc.c
2022-10-26 10:28:20 +10:00
Sean Parkinson
e477571168
Fixes from review part 1
2022-10-26 10:28:20 +10:00
Sean Parkinson
dad62fc182
pk.c: rework DH API and improve PEM read/write
...
Reorganized the DH APIs into groups.
Reworked all DH APIs.
Improved testing of DH API.
Implemented wolfSSL_PEM_read_RSAPublicKey() and
wolfSSL_PEM_write_RSA_PUBKEY().
Fix public key PEM write implementations to use the correct
header/footer names.
Added support for "RSA PUBLIC KEY" in header and footer in DerToPemEx().
Reworked PEM read/write APIs to be independent. No longer create an EVP
to use common function - common functionality refectored out.
Similarly file APIs don't create a BIO and call the partner APIs.
Improved testing of PEM read/write APIs.
Generic read BIO from memory BIO now returns the buffer instead of
allocating memory and reading.
No longer reading chunks when a file BIO.
Added wolfssl_make_rng() to create or get get global random. All RSA and
DH APIs now use this. DH_generate_parameters() creates a random object
and use global on error rather than just using global random.
Changed implementations to use BIO_new_fp() instead of create a new BIO
and setting file pointer.
2022-10-26 10:28:20 +10:00
Sean Parkinson
8d8371ac5a
Merge pull request #5717 from icing/sni-alpn-order
...
Changing ALPN selection to a deterministic point in the handshake.
2022-10-26 09:47:23 +10:00
JacobBarthelmeh
0f9279ce52
Merge pull request #5684 from SparkiDev/ssl_sess_version_check
...
SSL session retrieval: check protocol version
2022-10-25 17:29:54 -06:00
Sean Parkinson
55ab33a4a4
AES GCM decrypt C: don't decrypt when auth tag invalid
2022-10-26 09:25:28 +10:00
Daniel Pouzzner
baa19c1092
tests/api.c: fix 3 clang-analyzer-deadcode.DeadStores.
2022-10-25 18:17:22 -05:00
JacobBarthelmeh
29a5c04c2e
add test case
2022-10-25 15:35:37 -07:00
JacobBarthelmeh
7381846edb
fix case of copying over status to existing struct
2022-10-25 15:33:17 -07:00
Daniel Pouzzner
2575047ea2
wolfcrypt/src/port/arm/armv8-aes.c: define FIPS_NO_WRAPPERS, rather than undefine HAVE_FIPS, to fix FIPS builds.
2022-10-25 17:24:34 -05:00
Daniel Pouzzner
e464d374c0
fix whitespace.
2022-10-25 17:24:34 -05:00
Daniel Pouzzner
263123e7b4
wolfssl/test.h: add unsigned attribute to type of buffer passed to wolfsentry_config_json_feed() (sync with wolfsentry e22878b666).
2022-10-25 17:24:34 -05:00
Daniel Pouzzner
084fabc733
Merge pull request #5731 from SparkiDev/armv7a_aes_fixup
...
AES-CBC decrypt ARMv8 no hw crypto: fixes
2022-10-25 17:23:45 -05:00
Hayden Roche
5c3b3e6ede
Merge pull request #5733 from ejohnstown/assert-whitespace
2022-10-25 13:45:54 -07:00
John Safranek
e803e5916c
Assert Consistency
...
1. Make whitespace in asserts consistent.
2. Added typecasting of the string inputs for AssertStr.
2022-10-25 11:42:51 -07:00
jordan
8b7668f771
Fix X509 subject and issuer name_hash mismatch
...
Fix api test and cleanup.
2022-10-25 13:00:22 -05:00
Hayden Roche
e7a121325b
Merge pull request #5720 from julek-wolfssl/nid-defines
2022-10-25 10:34:59 -07:00
David Garske
d052feeff2
Merge pull request #5675 from embhorn/zd14968
...
Fix coverity issues
2022-10-25 10:08:40 -07:00
Hayden Roche
2b72a50688
Merge pull request #5662 from Uriah-wolfSSL/haproxy-update-2.6.0
2022-10-25 07:47:54 -07:00
Juliusz Sosinowicz
2ae815e2ee
Use WOLFSSL_ERROR_MSG for error logs
2022-10-25 13:13:44 +02:00
Juliusz Sosinowicz
55091c6464
Add small test
2022-10-25 13:13:14 +02:00
David Garske
370b9f4d40
Merge pull request #5729 from JacobBarthelmeh/Benchmark
...
fix for define guards in benchmark app
2022-10-24 19:54:35 -07:00
Sean Parkinson
e9a7c36c7b
AES-CBC decrypt ARMv8 no hw crypto: fixes
...
Handle in and out buffer being the same.
2022-10-25 11:32:47 +10:00
Sean Parkinson
9d1ed9c5d1
Merge pull request #5728 from douzzer/20221024-armv7a-enable-all
...
20221024-armv7a-enable-all
2022-10-25 11:28:31 +10:00
jordan
e3153f3997
Fix X509 subject and issuer name_hash mismatch
2022-10-24 18:09:44 -05:00
Jacob Barthelmeh
65d7d43497
use a check for if defined rather than value of macro
2022-10-24 16:32:19 -06:00
Daniel Pouzzner
3677253b55
fixes and comments for buildability, warnings, and clarity, re WOLFSSL_ARMASM_NO_HW_CRYPTO, in configure.ac, wolfcrypt/src/port/arm/armv8-aes.c, and wolfcrypt/test/test.c.
2022-10-24 17:31:48 -05:00
Jacob Barthelmeh
eb4c3e06eb
revert NO_MAIN_DRIVER behavior in benchmark app
2022-10-24 16:27:23 -06:00
Uriah Pollock
19e30b081f
Resolved sanitizer issue.
2022-10-24 16:27:18 -05:00
Hayden Roche
010fb64f74
Merge pull request #5718 from kareem-wolfssl/fpMaxBits
2022-10-24 12:27:59 -07:00
Stefan Eissing
879f788bb9
Setting ssl->alpn_peer_requested_length to 0 when freeing ssl->alpn_peer_requested.
2022-10-24 10:27:16 +02:00
Stefan Eissing
a1203917c5
Update after review by haydenroche5.
2022-10-24 10:17:29 +02:00
David Garske
53bc10eb76
Merge pull request #5723 from Anthony-Tatowicz/ECC384-benchmark
...
Add SECP384 and SECP521 to bench
2022-10-22 11:03:26 -07:00
David Garske
3aec9a15ce
Merge pull request #5726 from ejohnstown/nucleus-thread
...
Nucleus Thread Types
2022-10-21 20:22:39 -07:00
Anthony Tatowicz
1f82e90dbf
Add SECP384 and SECP521 to bench
2022-10-21 18:50:59 -05:00
Hayden Roche
4859a00c2a
Merge pull request #5698 from SparkiDev/aes_arm32_no_hw
2022-10-21 12:34:22 -07:00
Hayden Roche
a60a15d544
Merge pull request #5721 from philljj/zd15011
2022-10-21 12:32:03 -07:00
John Safranek
7c8dafab2f
Nucleus Thread Types
...
Add a type block for Nucleus RTOS's thread types.
2022-10-21 11:40:59 -07:00
Uriah Pollock
6aff27c5c8
Resolved valgrind issue. Updated ASN1_TIME usage per feedback.
...
Refactored wolfSSL_d2i_OCSP_CERTID per feedback.
2022-10-21 13:16:32 -05:00
jordan
e409acc0f7
cite RFC 5280 in DIST_POINT_NAME comment
2022-10-21 12:38:04 -05:00
David Garske
378d475c5f
Merge pull request #5724 from Anthony-Tatowicz/doc-fixes
...
Doc Example Typo Fix
2022-10-21 09:27:01 -07:00
Juliusz Sosinowicz
3ddc766b38
rpmbuild: update with fixes
...
- Pass in the build configuration to the output rpm package
- Compiler test fails in %configure step in %prep due to missing linker script (injected by rpmbuild). Moving to %build section.
- .la files not wanted in rpm package and delete .la file after install step
- Compiler test fails due to missing linker script (injected by rpmbuild)
https://fedoraproject.org/wiki/Changes/RemoveLaFiles#Upgrade.2Fcompatibility_impact
- Conditional include sp_int.h
- FIPS header and hash update
2022-10-21 14:22:08 +02:00
Anthony Tatowicz
92c7faafb7
Doc typo fix
2022-10-20 17:17:24 -05:00
Hayden Roche
1bde7b3d47
Merge pull request #5665 from SparkiDev/sp_msvc_x64_asm_fix
2022-10-20 15:09:29 -07:00
Hayden Roche
fdffdd241f
Merge pull request #5711 from philljj/add_SSL_set1_host
2022-10-20 15:02:24 -07:00
jordan
bfe8b9b76c
correct DIST_POINT_NAME type value
2022-10-20 15:10:36 -05:00
Hayden Roche
3591ce773c
Merge pull request #5719 from ejohnstown/dh-test-key2
2022-10-20 10:29:26 -07:00
Juliusz Sosinowicz
3339443260
Change NID_* from enum to #define
2022-10-20 17:07:32 +02:00
Stefan Eissing
02d37f08fc
Do not direclty return but goto exit label for cleanup of allocated resources in case ALPN selection or SNI callback fails.
2022-10-20 12:33:08 +02:00
Stefan Eissing
057fdd30d3
Properly check the defined() combinations that make ALPN and SNI available for testing.
2022-10-20 09:21:36 +02:00
John Safranek
31222618b9
DH Test Keys
...
1. Add a flag to the DH test to indicate that the second key is initted.
2. Add a flag to the DH test to indicate that the RNG is initted.
Fixes an issue where the DH wolfCrypt test can crash or lock up when
the DH parameters file is missing. Localized to the test only.
2022-10-19 16:15:53 -07:00
Kareem
5892655ab0
Don't override user-set FP_MAX_BITS when building FIPSv2.
2022-10-19 11:51:07 -07:00
Hayden Roche
86605c92ce
Merge pull request #5714 from ejohnstown/inline-guard
2022-10-19 08:33:07 -07:00
Stefan Eissing
f1cf96846a
Changing ALPN selection to a deterministic point in the handshake.
2022-10-19 15:25:52 +02:00
jordan
90eefc2824
fix unit test when RSA disabled
2022-10-18 21:03:41 -05:00
Kaleb Himes
930604f195
Merge pull request #5712 from haydenroche5/user_settings_asm
...
Make some improvements to user_settings_asm.h.
2022-10-18 17:10:39 -06:00
JacobBarthelmeh
7399f72fb3
Merge pull request #5715 from douzzer/20221018-linux6v1-and-WOLFSSL_CALLBACKS-fixes
...
20221018-linux6v1-and-WOLFSSL_CALLBACKS-fixes
2022-10-18 15:30:05 -06:00
Hayden Roche
44eb6e447e
Merge pull request #5713 from kaleb-himes/fix-fipsv2-win10
2022-10-18 13:02:59 -07:00
Daniel Pouzzner
895a2e1ac5
WOLFSSL_CALLBACKS codepaths: fixes for bugprone-unused-return-value, bugprone-macro-parentheses, readability-named-parameter, and clang-analyzer-deadcode.DeadStores
2022-10-18 13:34:42 -05:00
Daniel Pouzzner
c8c107a09e
linuxkm/: fixes to deal with kernel 6.1+ show_free_areas() mess.
2022-10-18 13:34:24 -05:00
John Safranek
353a8a0275
Inline Function Guard
...
Fixed an inline function aes.c that was included, but never used. Added
similar preprocessor guard around it as when it is used.
2022-10-18 10:51:51 -07:00
kaleb-himes
c25e9d9994
FIPSv2 builds on win10 adjust for new fastmath default in settings.h
2022-10-18 10:50:01 -06:00
Hayden Roche
e3ced9f9ae
Make some improvements to user_settings_asm.h.
...
For the CMake and autotools flows, enabling user_settings.h will define the
macro WOLFSSL_USER_SETTINGS_ASM. This will cause the generated
user_settings_asm.h to be included in the .S assembly files. If the user is
building without autotools or CMake, these files will include user_settings.h
directly, unless WOLFSSL_USER_SETTINGS_ASM is defined.
2022-10-18 09:20:06 -07:00
JacobBarthelmeh
af518f8c86
adjust saving new OCSP cert
2022-10-18 08:33:13 -07:00
Hayden Roche
b7c4ddba72
Merge pull request #5663 from lealem47/scan_build
2022-10-18 08:10:33 -07:00
Hayden Roche
c5df62e647
Merge pull request #5705 from icing/earlydata-client
2022-10-18 07:26:46 -07:00
Stefan Eissing
9726d1f6eb
Allowing use of SSL/CTX_set_max_early_data() for client side.
...
- updating english doc and test cases
2022-10-18 10:40:18 +02:00
Sean Parkinson
591101fd8b
AES for ARM32 without using crypto hardware instructions
...
AES-ECB, AES-CBC, AES-CTR, AES-GCM, AES-CCM
Fix ldrd and strd to use even first first register and have
second register be next after first.
2022-10-18 08:31:53 +10:00
Lealem Amedie
327b66d3ed
Miscellaneous fixes from scan-build and KDF refactor & small build fixes
2022-10-17 14:34:08 -07:00
jordan
7e35919cc0
Add SSL_set1_host
2022-10-17 16:23:38 -05:00
David Garske
a272731d45
Merge pull request #5707 from JacobBarthelmeh/Testing
...
free PKCS7 in test case
2022-10-17 11:21:48 -07:00
JacobBarthelmeh
bc1c087701
free PKCS7 in test case
2022-10-17 08:24:38 -07:00
Hideki Miyazaki
60aac9039d
remove aesccm
2022-10-15 11:05:25 +09:00
Hideki Miyazaki
60a8f6dff9
Add simple example working on Rx72n
...
Use T4-Tiny IP stack
2022-10-15 10:01:21 +09:00
Uriah Pollock
f48b736ec3
Changed some WOLFSSL_ASN1_TIME handling and other fixes.
2022-10-14 17:09:35 -05:00
JacobBarthelmeh
6f1db6c03a
Merge pull request #5697 from cconlon/pkcs7SignedCertSet
...
PKCS#7: Fix SignedData verification when signer cert is not first in SET
2022-10-14 16:05:40 -06:00
David Garske
2c503a5b34
Merge pull request #5682 from JacobBarthelmeh/Testing
...
additional sanity checks on debug callback
2022-10-14 09:25:14 -07:00
Hayden Roche
a1de8655da
Merge pull request #5699 from SparkiDev/sp_cortexm_iccarm
2022-10-14 09:00:50 -07:00
Hayden Roche
b54eca4cfe
Merge pull request #5700 from kaleb-himes/macOS-C++-proj-settings-rev2
2022-10-14 08:06:22 -07:00
David Garske
6685ce7a10
Merge pull request #5702 from haydenroche5/ecc_nb_shared_secret_fix
...
Fix output length bug in SP non-blocking ECC shared secret gen.
2022-10-13 18:15:54 -07:00
Hayden Roche
40f1ba7e33
Fix output length bug in SP non-blocking ECC shared secret gen.
...
This was incorrectly being set to 32 for P-384/521 due to a bug in the SP gen
script.
2022-10-13 16:18:20 -07:00
Hayden Roche
6829c956b7
Merge pull request #5701 from dgarske/20221013_fixes
2022-10-13 14:59:41 -07:00
Hayden Roche
757549dd1b
Merge pull request #5674 from rizlik/hrr_size_fix
2022-10-13 12:57:35 -07:00
Hayden Roche
843ea32dc7
Merge pull request #5694 from philljj/fix_enable-fastmath_disable-rsa_build
2022-10-13 12:49:25 -07:00
David Garske
e2566bab21
Various build fixes:
...
* Fix api.c build error with `NO_FILESYSTEM` and `WOLFSSL_CERT_EXT`.
* Fix for building tests/suites.c with static memory (missing `LARGEST_MEM_BUCKET`).
* Always expose `wc_ecc_set_rng` for compatibility.
2022-10-13 12:49:06 -07:00
Chris Conlon
1b0171fe3e
fix PKCS7 SignedData verification when signer cert is not first in SET
2022-10-13 11:03:13 -06:00
Marco Oliverio
2fa2f8e88d
fix: wrong size using DTLSv1.3 in RestartHandshakeHashWithCookie
...
HRR_MAX_HS_HEADER_SZ does not consider DTLS handshake extra fields.
2022-10-13 17:42:58 +02:00
jordan
656ad8959d
Fix enable-fastmath with disable-rsa build.
...
Consistently guard WOLFSSL_MAX_RSA_BITS with both defines.
2022-10-13 10:10:10 -05:00
kaleb-himes
e47a213ea3
Fix settings following testing
2022-10-13 08:32:29 -04:00
Sean Parkinson
47e3ffade6
SP Cortex-M: suport for ICCARM
...
Change ifdefs to use GNUC form for conditional branch for ICCARM.
2022-10-13 14:26:43 +10:00
Hayden Roche
4fa0deadda
Merge pull request #5696 from ejohnstown/wc_only
2022-10-12 17:11:06 -07:00
John Safranek
b838d65a72
wincrypt.h requires windows.h, which isn't included in internal.h when WOLFCRYPT_ONLY set
2022-10-12 15:33:23 -07:00
Uriah Pollock
dc8997d4b6
Added more APIs for HaProxy integration.
2022-10-12 15:45:09 -05:00
Uriah Pollock
478b0cd4aa
Added more APIs for HaProxy integration.
2022-10-12 15:27:31 -05:00
jordan
248952648d
Fix enable-fastmath with disable-rsa build.
...
WOLFSSL_MAX_RSA_BITS was being checked against ENCRYPT_BASE_BITS
even though RSA is disabled.
2022-10-12 15:26:05 -05:00
Uriah Pollock
3c7f01d853
Added WOLFSSL_ASN1_TIME to CRL
2022-10-12 15:10:29 -05:00
Uriah Pollock
0f0496ae8f
Added WOLFSSL_ASN1_TIME to CRL
2022-10-12 14:30:26 -05:00
Uriah Pollock
5cbb099dc9
Updated per PR comments.
2022-10-12 14:06:57 -05:00
Uriah Pollock
9117f8b51b
Added more APIs for HaProxy integration.
2022-10-12 14:06:57 -05:00
Uriah Pollock
b798c5f3a0
Added wolfSSL_X509_REVOKED_get_revocationDate()
2022-10-12 14:06:56 -05:00
Hayden Roche
72839d05f5
Merge pull request #5692 from douzzer/20221012-fix-file-modes-and-tweak-user_settings_asm.sh
2022-10-12 11:39:17 -07:00
Hayden Roche
46ecd909e9
Merge pull request #5691 from philljj/fix_lowresource_build
2022-10-12 09:35:48 -07:00
Daniel Pouzzner
67c194edf8
scripts/user_settings_asm.sh: give priority to user_settings.h found via the supplied search path arguments, and fall back to current directory; use POSIX sh variable expansions for prefix trimming and variable existence testing; trim trailing slash from supplied search path arguments; direct error messages to stderr.
2022-10-12 11:20:56 -05:00
Daniel Pouzzner
e05d044cf9
fix file modes.
2022-10-12 11:16:20 -05:00
jordan
06511a0f2e
tiny fix for broken lowresource build option
2022-10-11 17:54:42 -05:00
JacobBarthelmeh
927f4c445d
additional sanity checks on debug callback
2022-10-11 13:14:59 -07:00
David Garske
4d37e8d687
Merge pull request #5680 from embhorn/gh5679
...
Fix tirtos build
2022-10-11 11:31:41 -07:00
David Garske
0a36091afd
Merge pull request #5687 from danielinux/forcezero-fastmath
...
ForceZero enabled with USE_FAST_MATH
2022-10-11 11:23:05 -07:00
Daniele Lacamera
c9336865d0
ForceZero enabled with USE_FAST_MATH
2022-10-11 17:38:58 +02:00
David Garske
3b33c962c4
Merge pull request #5660 from haydenroche5/load_system_root_certs
...
Add support for wolfSSL_CTX_load_system_CA_certs on Windows and Mac.
2022-10-11 08:38:57 -07:00
Hayden Roche
80b826b510
Merge pull request #5647 from kaleb-himes/macOS-C++-proj-settings
2022-10-11 08:00:52 -07:00
Hayden Roche
5f0d85adb5
Merge pull request #5666 from per-allansson/windows-wolfio-connect-timeout-bug
2022-10-11 07:42:46 -07:00
Sean Parkinson
43809b5f97
SSL session retrieval: check protocol version
...
When looking up the session by ID on the server, check that the protocol
version of the SSL and session match on TLS 1.3 or not.
TLS 1.3 sessions don't work with TLS 1.2 handshakes and vice-versa.
2022-10-11 11:07:05 +10:00
David Garske
b7f74962ad
Merge pull request #5683 from douzzer/20221010-fixes-missing-field-initializers-etc
...
20221010-fixes-missing-field-initializers-etc
2022-10-10 16:29:27 -07:00
David Garske
4d9aacbe87
Merge pull request #5678 from SparkiDev/curve448_32bit_fix
...
Curve448 32-bit C code: handle corner case
2022-10-10 16:28:43 -07:00
Daniel Pouzzner
af4987628f
wolfssl/test.h: fix bugprone-macro-parentheses.
2022-10-10 17:08:51 -05:00
Daniel Pouzzner
1bca5d80a1
configure.ac: fix hard tab.
2022-10-10 16:51:19 -05:00
Daniel Pouzzner
e48e406def
CMakeLists.txt: add handling for WARNING_C_FLAGS in setup for CMAKE_C_FLAGS, to allow override warning config, e.g. without -Werror.
2022-10-10 16:48:49 -05:00
Daniel Pouzzner
02863d2e81
configure.ac: when FIPS 140-3, disable AES-GCM streaming API, unless "dev".
2022-10-10 16:37:38 -05:00
Daniel Pouzzner
6456b244d3
tests/api.c: refactor struct initializer using XMEMCPY() to mollify -Werror=missing-field-initializers in C++ builds.
2022-10-10 16:18:33 -05:00
Eric Blankenhorn
ea5e814dfa
Fix tirtos build
2022-10-10 11:36:40 -05:00
Juliusz Sosinowicz
b1f97c6bc0
Merge pull request #5652 from rizlik/send_alert_on_version_mismatch
2022-10-10 11:16:11 +02:00
Sean Parkinson
46091b7c7d
Curve448 32-bit C code: handle corner case
...
For sqr and mul (28/32 bits) the sums of products can exceed maximum
64-bit signed value. Handle last sum value, that may cause overflow,
separately.
Fix formatting of overflow last line.
2022-10-10 11:33:46 +10:00
Hayden Roche
12bfa24ecc
Merge pull request #5559 from tmael/crl_bs_p
2022-10-09 09:45:49 -07:00
Hayden Roche
47ccd924c2
Merge pull request #5657 from julek-wolfssl/dtls-1.2-stateless
2022-10-09 09:31:07 -07:00
David Garske
018204f904
Merge pull request #5677 from kaleb-himes/small-stack-refactor-fix
...
Fix: test.c not printing out status of tests
2022-10-08 11:26:36 -07:00
Kaleb Himes
65c872e910
Merge pull request #5670 from dgarske/smallstack_fixes2
...
Fix for Linux kernel module and stdio.h
2022-10-08 09:08:13 -06:00
kaleb-himes
7a265dcd2f
Fix: test.c not printing out status of tests
2022-10-08 08:34:34 -06:00
Eric Blankenhorn
b4e0137d37
Fix coverity issues
2022-10-07 14:49:05 -05:00
Hayden Roche
98ac4a6f9c
Add ability to toggle system CA certs support.
2022-10-07 12:34:00 -07:00
Tesfa Mael
5704c83f78
Unused param
2022-10-07 12:24:52 -07:00
Tesfa Mael
e4da4f60d9
Implemented suggested changes
2022-10-07 11:24:09 -07:00
Tesfa Mael
a738927846
Add CRL binary search, CRL_STATIC_REVOKED_LIST
2022-10-07 11:24:09 -07:00
Hayden Roche
82fbb7920a
Merge pull request #5624 from julek-wolfssl/dtlscid-prb
2022-10-07 09:48:19 -07:00
John Safranek
b4e5ee3f6b
Merge pull request #5672 from SparkiDev/kyber_inc_fix
...
Kyber: only include source when not FIPS
2022-10-07 08:39:54 -07:00
Eric Blankenhorn
aaea77bce3
Merge pull request #5669 from JacobBarthelmeh/Docs
...
update changelog notes
2022-10-07 08:29:19 -05:00
Juliusz Sosinowicz
b45ab0ae15
Add dtlscid.test to make check testing
2022-10-07 10:44:42 +02:00
Hayden Roche
5c85c8e128
Merge pull request #5658 from philljj/fix_wolfSSL_sk_X509_new
2022-10-06 17:18:03 -07:00
Hayden Roche
82bee5d6f1
Merge pull request #5671 from SparkiDev/aes_x86_asm_fix
2022-10-06 17:14:28 -07:00
Hayden Roche
b50a786cb2
Add support for wolfSSL_CTX_load_system_CA_certs on Windows and Mac.
...
Additionally, fix CMake build to add WOLFSSL_X86_64_BUILD when building for
x86_64.
2022-10-06 17:12:21 -07:00
Sean Parkinson
be41af6527
Kyber: only include source when not FIPS
2022-10-07 08:33:05 +10:00
Sean Parkinson
34a03f6646
AES-GCM x86: fix for AESNI implementation
...
Jump to non-inplace decrypt update when pointers are different.
2022-10-07 08:16:08 +10:00
David Garske
bc78ecfa6c
Fix for linuxkm and stdio.h.
2022-10-06 14:36:09 -07:00
Hayden Roche
af7c0e9b74
Merge pull request #5668 from dgarske/smallstack_fixes
2022-10-06 14:29:41 -07:00
Jacob Barthelmeh
e720d4ab3b
update changelog notes
2022-10-06 14:31:25 -06:00
jordan
8ff6dc2a9a
clean up wolfSSL_sk_X509_new
2022-10-06 14:13:30 -05:00
David Garske
0eb4a7807b
Fixes from small stack refactor ( #5631 ). Resolves these multi-test errors:
...
```
wolfssl/wolfcrypt/mem_track.h:700:9: error: Memory leak: shim_args [memleak]
return ret;
^
wolfssl/wolfssl/wolfcrypt/types.h:1248:17: error: unknown type name ‘pthread_t’
1248 | typedef pthread_t THREAD_TYPE;
```
2022-10-06 11:32:27 -07:00
Hayden Roche
4962134ff5
Merge pull request #5667 from tim-weller-wolfssl/wolfssl-strongswan-update
2022-10-06 09:56:01 -07:00
Juliusz Sosinowicz
7f42792616
DTLS 1.2: Test stateless server connection
2022-10-06 18:53:13 +02:00
Hayden Roche
d2f672db96
Merge pull request #5661 from kaleb-himes/aes_asm_FIPS_checkouts
2022-10-06 08:52:41 -07:00
tim-weller-wolfssl
474bc6ee1a
Remove unused ASN1_GENERALIZEDTIME enum value (conflicts with strongSwan ASN enum and wolfSSL OpenSSL compatibility layer)
2022-10-06 09:23:56 -05:00
Per Allansson
68dc01e7b7
fix bug with wolfIO_TcpConnect not working with timeout
...
- non-blocking connect() on Windows returns SOCKET_ERROR + WSAEWOULDBLOCK
- the check for fd against FD_SETSIZE is wrong (and not needed) on Windows
2022-10-06 14:14:33 +02:00
Sean Parkinson
800830187b
Fixes for SP and x86_64 with MSVC
...
Add inline implementations of assembly snippets for MSVC.
Missing multiplier when index memory address.
2022-10-06 15:35:50 +10:00
Hayden Roche
18b54f2ae7
Merge pull request #5664 from kaleb-himes/SGX_FIXUP
2022-10-05 15:18:55 -07:00
jordan
2bd3814953
fix failed Visual Studio Build Test
2022-10-05 15:08:08 -05:00
kaleb-himes
6178b3e365
Fixup builds using WOLFSSL_LOG_PRINTF (SGX test exposed)
2022-10-05 13:54:22 -06:00
Marco Oliverio
ebb378096a
test: DTLSv1.2: send alert when version negotiation fails
2022-10-05 20:29:23 +02:00
Marco Oliverio
84748757b0
tests: refactor ticket-nonce-test callbacks to re-use code
2022-10-05 20:29:23 +02:00
Marco Oliverio
a7a7a25ab0
ssl: move wolfSSL_GetSide outside ATOMIC_USER guard
2022-10-05 20:29:23 +02:00
Marco Oliverio
de6187f599
tls: send protocol_version fatal alert on version mismatch
...
see rfc5246 Appendix E
2022-10-05 20:29:23 +02:00
kaleb-himes
1e2397aa5a
Implement peer review feedback and enhance PAA settings
2022-10-05 10:52:12 -06:00
kaleb-himes
a2b48aac53
Update v5 checkout for sha256_asm and sha512_asm
2022-10-05 10:00:47 -06:00
kaleb-himes
df5fd87f0b
Modify checkout of aes_asm.S (and .asm) given commit 6f4af15
2022-10-05 09:12:47 -06:00
David Garske
cb5828235b
Merge pull request #5653 from haydenroche5/load_system_root_certs
...
Add --sys-ca-certs option to example client.
2022-10-04 18:25:50 -07:00
Hayden Roche
6f4af1581b
Merge pull request #5650 from SparkiDev/aes_x86_asm
2022-10-04 16:40:02 -07:00
Sean Parkinson
c989dd9590
Merge pull request #5641 from haydenroche5/user_settings_asm
...
Generate an assembler-safe user_settings.h in configure.ac and CMakeLists.txt.
2022-10-05 07:51:56 +10:00
Hayden Roche
79d9bc376f
Merge pull request #5631 from dgarske/smallstack
2022-10-04 14:39:17 -07:00
Sean Parkinson
66ce7635b9
AES x86 ASM: new assembly
...
Added new x86 assembly for AES.
AES-CBC decrypt only 4 blocks at a time (not 6 or 8) due to reduces
register count.
GCM implementation for AVX2, AVX1 and AESNI only.
Disabled looking for other assembly files for x86.
2022-10-05 07:34:42 +10:00
jordan
984649eeac
Correct wolfSSL_sk_X509_new in OpenSSL compatible API
2022-10-04 15:20:32 -05:00
David Garske
0006d1f91c
Fix benchmark with small stack and WOLFSSL_RSA_VERIFY_ONLY.
2022-10-04 08:39:42 -07:00
Juliusz Sosinowicz
354cd2ed50
DTLS 1.2: Reset state when sending HelloVerifyRequest
2022-10-04 16:22:59 +02:00
Hayden Roche
3bcd4b45df
Generate an assembler-safe user_settings.h in configure.ac and CMakeLists.txt.
...
For user_settings.h builds, .S assembly files need to include user_settings.h
in order to get the defines used by the build. However, a user_settings.h may
contain code only understood by a C compiler and not the assembler (e.g. a
typedef). This commit makes it so our autotools and CMake builds produce a file
user_settings_asm.h when doing a user_settings.h build. This generated header
contains only the preprocessor directives from the user_settings.h. As a result,
it can be safely included by our assembly code files.
2022-10-03 16:00:32 -07:00
Hayden Roche
58d482428e
Merge pull request #5649 from philljj/zd14898
2022-10-03 14:00:45 -07:00
Hayden Roche
bfa13376fa
Merge pull request #5642 from lealem47/WIN_snifftest
2022-10-03 13:49:06 -07:00
David Garske
09f4a94b24
Fixes for small stack in TLS v1.3, HKDF and SHA2. Add new WC_ASN_HASH_SHA256 build option to allow forcing SHA2-256 for the internal certificate calculations. Fixes for integer.c with small stack (allocate only the size needed, not the max).
2022-10-03 12:52:11 -07:00
Lealem Amedie
b91e48d770
Add snifftest vcxproj file and documentation
2022-10-03 10:22:53 -07:00
David Garske
8101800cd9
Merge pull request #5656 from douzzer/20220930-wolfsentry-API-update
...
20220930-wolfsentry-API-update
2022-10-03 09:12:16 -07:00
Hayden Roche
898ddac159
Add --sys-ca-certs option to example client.
...
Using this option will call wolfSSL_CTX_load_system_CA_certs on the client ctx.
2022-10-03 09:05:23 -07:00
Daniel Pouzzner
d0540adac2
wolfssl/test.h: update wolfSentry calls for API changes in wolfSentry-0.6.0.
2022-09-30 22:28:21 -05:00
David Garske
db6ffae376
Merge pull request #5655 from lealem47/api_test_leak
...
Fix for EVP_PKEY_DH memory leak
2022-09-30 17:26:30 -07:00
Lealem Amedie
e77c3849a0
Fix for evp key leak in unit tests
2022-09-30 16:02:07 -07:00
David Garske
f9506dc05a
Add small stack to DoClientHello Suites (360 bytes). Add small stack for DRBG health test. Refactor of the small stack into its own header, to allow easier use in other files. Minor build fixes.
2022-09-30 14:06:31 -07:00
kaleb-himes
f02fe73eb4
Correct default setting
2022-09-30 14:02:07 -06:00
David Garske
6506c45918
Merge pull request #5654 from douzzer/20220930-fixes-smallstack-shellcheck-etc
...
20220930-fixes-smallstack-shellcheck-etc
2022-09-30 12:13:00 -07:00
Daniel Pouzzner
acb35029a0
wolfssl/ssl.h: remove redundant prototype for wolfSSL_CTX_set_default_verify_paths().
2022-09-30 12:06:31 -05:00
Daniel Pouzzner
548d432df3
wolfcrypt/test/test.c: fix gating, and smallstack refactors, for ecc_test_deterministic_k(), ecc384_test_deterministic_k(), and ecc521_test_deterministic_k().
2022-09-30 12:06:15 -05:00
Daniel Pouzzner
ddad526e64
wolfcrypt/benchmark/benchmark.c: fix clang-tidy complaints around ungrouped string continuation and unparenthesized macro args.
2022-09-30 12:05:57 -05:00
Daniel Pouzzner
e9520fe131
shellcheck-guided fixes in IDE/XilinxSDK/bench.sh, IDE/XilinxSDK/combine.sh, IDE/XilinxSDK/graph.sh, and scripts/bench/bench_functions.sh.
2022-09-30 12:05:40 -05:00
jordan
eccba1401f
fix valgrind leak in new unit test
2022-09-30 11:24:54 -05:00
Hayden Roche
08009e73fc
Add RSA PSS salt defines to engine builds if not FIPS v2.
...
WOLFSSL_PSS_LONG_SALT and WOLFSSL_PSS_SALT_LEN_DISCOVER are supported in our
latest FIPS module (v5). These should be defined for engine builds as long as
the FIPS version isn't v2.
2022-09-30 08:21:15 -07:00
Hayden Roche
5070994ae2
Merge pull request #5644 from tim-weller-wolfssl/crossworks-test-update
2022-09-30 08:00:01 -07:00
jordan
0f66c90b54
implement sk_X509_shift for zd 14898
2022-09-29 23:04:31 -05:00
kaleb-himes
8ae08d594e
Add user_settings.h for Intel/M1 FIPSv2 macOS C++ projects
2022-09-29 16:06:08 -06:00
David Garske
bba3193f9c
Merge pull request #5595 from haydenroche5/async_ticket_dec_fix
...
Handle WC_PENDING_E from ticketEncCb in DoClientTicket properly.
2022-09-29 14:41:35 -07:00
Hayden Roche
591d1ada94
Merge pull request #5615 from JacobBarthelmeh/RSAPSS
2022-09-29 14:39:05 -07:00
David Garske
5524500e85
Merge pull request #5166 from sjaeckel/versal-bringup
...
Versal bringup
2022-09-29 13:27:13 -07:00
David Garske
26f01168b5
Merge pull request #5645 from rizlik/fix_bad_heap_hint
...
fix: tls13: fix wrong heap hint argument of XFREE
2022-09-29 13:06:31 -07:00
David Garske
ab44c89ab4
Merge pull request #5626 from haydenroche5/load_system_root_certs
...
Add a function to load system CA certs into a WOLFSSL_CTX.
2022-09-29 11:03:26 -07:00
David Garske
a5a9ab96e6
Merge pull request #5524 from rizlik/protocol_version_alerts
...
Dtls13: improvements
2022-09-29 10:59:06 -07:00
David Garske
d0bf083050
Merge pull request #5643 from SparkiDev/gen_arm32_fixup
...
ARM32 assembly code: fixed scripts
2022-09-29 10:20:06 -07:00
Jacob Barthelmeh
e971bd7315
add FreeRTOS example to include.am
2022-09-29 09:57:23 -06:00
Marco Oliverio
32eca32c97
fix: tls13: fix wrong heap hint argument of XFREE
2022-09-29 17:56:59 +02:00
Steffen Jaeckel
0e57e9858f
Integrate Xilinx Versal
...
* add Versal specific glue
The same structure of an "XSecure client" is used throughout the API's,
therefor define it once and re-use in all clients.
* integrate Versal AES-GCM engine
* integrate Versal SHA3-384 engine
* add versal support to tests
- There's no intermediate-hash API for Versal.
* add specific test with large AAD
Test only with `n*16 byte` wide chunks of AAD, so it gets processed in the
hardware engine.
* add specific test with misaligned AES-GCM arguments
* integrate Versal RSA engine
* disable failing RSA test-case when Xilinx Crypto is enabled
* introduce define `WOLFSSL_XILINX_CRYPT_VERSAL`
* integrate Versal TRNG engine
* allow using Versal TRNG w/o wolfcrypt DRBG
Versal TRNG already provides a HRNG mode which does the same as the
wolfcrypt DRBG implementation.
* add support for user-supplied nonce to Versal TRNG
* add `wc_XsecureErrorToString()` to map PLM error codes to messages.
* integrate Versal EcDSA engine
* update tests to work with Versal EcDSA
If deterministic K is enabled, the tests failed here since the Versal
EcDSA engine doesn't support the SECP256R1 curve yet.
* Xilinx crypto engines like aligned memory very much
Make this a default choice, not via the user configuration.
* add Xilinx-specific `WOLFSSL_MSG()` equivalent
`WOLFSSL_XIL_MSG()` does the same as `WOLFSSL_MSG()` besides waiting for
1 second before printing to stdout, since the PLM maybe prints to same and
outputs would be mixed up.
This waiting can be disabled by defining `WOLFSSL_XIL_MSG_NO_SLEEP`.
* add option to enable DPA CounterMeasures in AES-GCM crypto engine
* add "command mode" to Xilinx bare-metal example
* update Xilinx default user settings
* add script to execute benchmarks
* add scripts to create graphics
* add Vitis 2022.1 example projects
Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de >
2022-09-29 09:39:57 -06:00
Steffen Jaeckel
f24cf38f01
Update benchmarks
...
* add option to run benchmarks with and w/o AAD
This adds the possibility to benchmark AES-GCM and AES-CCM both with and
w/o AAD, with the option to also run both.
The default behavior when wolfSSL provides the `main()` function is
unchanged.
The default behavior when wolfSSL doesn't provide the `main()` function has
been changed to "run both benchmarks - with and w/o ADD".
* add option to run benchmarks against 4096bit RSA&DH keys
* remove `BENCH_SIZE` macro from benchmark.c
* pre-define benchmark sizes in a single place, before it had to be done in two places
* improve `benchmark_static_init()`
- static variable doesn't need to be in global scope
- add option to force re-init
- add more static variables to be reset
* add `-blocks` option to benchmarks
* expose benchmark `main()` as `wolfcrypt_benchmark_main()`
* fix benchmark `-?` output
* use correct SI/Binary prefix in benchmarks
* use a separate column per detail in CSV output of benchmark
* add `-aad_size` option to benchmark
* don't always print symmetric CSV headers
* always use M[i]B/s when output format is CSV
* Versal specific patches for benchmarks
This also removes the default define for `COUNTS_PER_SECOND` for Xilinx
targets, since I prefer to have a build failure over wrongly calculated
output.
Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de >
2022-09-29 09:39:57 -06:00
Steffen Jaeckel
f4e258d196
Generic changes
...
* fix compilation warning
* adjust SHA3-384 test error-codes
The way the codes were constructed before, they were not unique.
* unify code
Instead of having `ifdef`'s in the code, define our own wrapper around
the keysource as required.
* add CMake option for help-text in wolfCrypt tests
* expose test `main()` as `wolfcrypt_test_main()`
* Don't overwrite previously set errors
* add FreeRTOS support for Xilinx demo
* move `fp_reverse` from `tfm.c` to `wolfmath.c` and rename to
`mp_reverse`.
Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de >
2022-09-29 09:39:57 -06:00
tim-weller-wolfssl
14b776c9a4
Adding C library support furnction to write a buffer (always to UART)
2022-09-29 10:34:16 -05:00
Sean Parkinson
5a55ec6968
ARM32 assembly code: fixed scripts
...
Generation scripts fixed for ARM32.
Regenerated output inlcudes:
- support for ARM32 architectures less than 7
- SP code also ensures parameters are in specific registers
2022-09-29 09:04:05 +10:00
Sean Parkinson
754d274d8c
Merge pull request #5593 from rizlik/ticket_nonce_size
...
tls13: support ticketNonce with size bigger than MAX_TICKET_NONCE_SZ
2022-09-29 08:11:22 +10:00
Sean Parkinson
cec6341e23
Merge pull request #5640 from kaleb-himes/ARMv8-FIPSv2-MOD-TEST
...
Do not perform IV Wrap test when using cert3389 inlined armasm
2022-09-29 08:01:54 +10:00
Marco Oliverio
ae4228f928
tests: add WOLFSSL_TICKE_NONCE_MALLOC tests
2022-09-28 19:54:14 +02:00
Marco Oliverio
c508ff3da9
internal.h: allow customization of MAX_TICKET_NONCE_STATIC_SZ
2022-09-28 19:54:14 +02:00
Marco Oliverio
56d6087749
tls13: support ticketNonce bigger than MAX_TICKET_NONCE_SZ
...
to enable it, use WOLFSSL_TICKET_NONCE_MALLOC define
2022-09-28 19:54:14 +02:00
Marco Oliverio
aa5d074d23
dtls13: abide g++ compiler errors
...
```
src/tls13.c:5330:72: error: invalid conversion from 'void*' to 'const byte*' {aka 'const unsigned char*'} [-fpermissive]
5330 | ret = wc_HmacUpdate(&cookieHmac, ssl->buffers.dtlsCtx.peer.sa,
| ~~~~~~~~~~~~~~~~~~~~~~~~~~^~
| |
| void*
./wolfssl/wolfcrypt/hmac.h:191:55: note: initializing argument 2 of 'int wc_HmacUpdate(Hmac*, const byte*, word32)'
191 | WOLFSSL_API int wc_HmacUpdate(Hmac* hmac, const byte* in, word32 sz);
```
2022-09-28 18:42:39 +02:00
Juliusz Sosinowicz
d8e10d8ef4
DTLS 1.3: Always reset state on HRR
2022-09-28 18:42:39 +02:00
Juliusz Sosinowicz
c72d315325
DTLS 1.3: Don't add HRR to ssl->dtls13Rtx
...
Signed-off-by: Marco Oliverio <marco@wolfssl.com >
2022-09-28 18:42:38 +02:00
Juliusz Sosinowicz
145086f776
DTLS 1.3: Clear ssl->dtls13SendingAckOrRtx in ssl.c
2022-09-28 18:42:38 +02:00
Marco Oliverio
3c60926bfa
tests: silently dropping bad records after handshake in DTLS
2022-09-28 18:42:38 +02:00
Marco Oliverio
6e4a3ecdbd
tests: add negative version negotation tests
2022-09-28 18:42:38 +02:00
Marco Oliverio
b3ecdd2ecb
dtls13: support stateless cookie exchange on blocking socket
2022-09-28 18:42:38 +02:00
Marco Oliverio
0b525a52c4
tls13: send protocol_version alert on failed version negotiation
2022-09-28 18:42:38 +02:00
Marco Oliverio
88ec118e89
dtls13: drop unencrypted messages after epoch 1
2022-09-28 18:42:38 +02:00
Marco Oliverio
400671dc7c
dtls: drop non-handshake messages before cookie exchange
2022-09-28 18:42:38 +02:00
Hayden Roche
8cae05348c
Add a function to load system CA certs into a WOLFSSL_CTX.
...
This new function, wolfSSL_CTX_load_system_CA_certs, currently only supports
Linux-based OS's. It searches through conventional CA directories and once it
finds one, attempts to load CA certs from it. After the first directory is
found, we don't check the others.
This commit also adds a function wolfSSL_get_system_CA_dirs, which returns a
pointer to an array of directories where wolfSSL_CTX_load_system_CA_certs will
look for CA certs. This is used in a unit test, where we only want to expect
success if one of these directories actually exists on the test system.
Finally, this commit adds support for SSL_CTX_set_default_verify_paths to the
compatibility layer. It doesn't model the exact behavior of its OpenSSL
counterpart; it's mostly a wrapper around wolfSSL_CTX_load_system_CA_certs,
manipulating the return value of that function to conform to OpenSSL's
conventions.
2022-09-28 08:50:46 -07:00
David Garske
2d1f22c35a
Merge pull request #5639 from Anthony-Tatowicz/master
...
Add Irq install for Aruix example
2022-09-28 06:55:56 -04:00
kaleb-himes
d61656d5e7
Do not perform IV Wrap test when using cert3389 inlined armasm
2022-09-27 17:15:19 -06:00
Hayden Roche
f1e2165c59
Merge pull request #5638 from JacobBarthelmeh/release
2022-09-27 14:21:19 -07:00
Jacob Barthelmeh
eb5076bb89
update changelog for release 5.5.1
2022-09-27 13:40:00 -06:00
JacobBarthelmeh
ffe052e845
Merge pull request #5634 from douzzer/20220926-fixes
...
20220926-fixes
2022-09-27 11:49:20 -06:00
Anthony Tatowicz
13d53b5297
Add Irq install for Aruix example
2022-09-27 12:04:27 -05:00
JacobBarthelmeh
dde5ef558b
Merge pull request #5633 from SparkiDev/sp_mod_fix
...
SP int all: sp_mod
2022-09-27 10:23:03 -06:00
Daniel Pouzzner
cc03e3fdab
wolfcrypt/src/misc.c ByteReverseWords(): mollify MSVC re C4311.
2022-09-27 10:05:07 -05:00
Daniel Pouzzner
cfe0278d35
wolfcrypt/src/misc.c ByteReverseWords(): fix misaligned word accesses under armv7a-asm.
2022-09-27 02:02:31 -05:00
Daniel Pouzzner
1ffe4275ae
fix whitespace
2022-09-26 23:32:59 -05:00
Sean Parkinson
34fd412fd6
SP int all: sp_mod
...
sp_mod wasn't checking return of sp_init_size.
Add _sp_init_size change and change calls.
2022-09-27 10:05:13 +10:00
Sean Parkinson
8617de86c1
Merge pull request #5632 from JacobBarthelmeh/Testing
...
Misc. testing items
2022-09-27 08:25:18 +10:00
JacobBarthelmeh
1e348eb7bd
sanity check on return value
2022-09-26 10:40:41 -07:00
JacobBarthelmeh
cc4e8df56d
cast to fix warning in test case
2022-09-26 10:13:06 -07:00
John Safranek
9d9fa0132e
Merge pull request #5622 from lealem47/sniffer_sequence
...
Fix for sniffer to decode out of order packets
2022-09-26 07:53:00 -07:00
John Safranek
b4077d80c9
Merge pull request #5620 from JacobBarthelmeh/Certs
...
fix for return value of x509 print
2022-09-25 19:32:52 -07:00
Sean Parkinson
b1a69f6469
Merge pull request #5630 from dgarske/deos_cleanups
...
Support for DEOS RTEMS and minor build fixes
2022-09-26 09:06:49 +10:00
David Garske
55a0f6d97b
Support for RTEMS in the DEOS user_settings.h template and time. Fix for bio.c and OPENSSL_EXTRA which needs XATOI. Fix for SP math ECC with 384-bit and 521-bit curves enabled.
2022-09-25 10:41:05 -07:00
Daniel Pouzzner
f80fb7f1aa
Merge pull request #5625 from dgarske/esp32_cleanups
...
Fixes for various build configurations
2022-09-23 20:46:44 -05:00
David Garske
221fd275fd
Fixes for building without SHAKE.
2022-09-23 14:50:16 -07:00
David Garske
2421727b1c
Merge pull request #5441 from kareem-wolfssl/quietShutdown
...
Make wolfSSL quiet_shutdown functions available when using OPENSSL_EXTRA_X509_SMALL.
2022-09-23 14:40:29 -07:00
David Garske
606f58a851
Spelling and whitespace cleanups.
2022-09-23 13:58:58 -07:00
David Garske
b42631c721
Fix for ESP32 wolfcrypt_test entry point.
2022-09-23 13:58:49 -07:00
David Garske
792eac9484
Fixes for building the API unit test without filesystem NO_FILESYSTEM.
2022-09-23 13:58:17 -07:00
David Garske
7a69415e79
Fix for possible memory leak on failure in RSA/DH public key decode with heap based math.
2022-09-23 13:53:16 -07:00
David Garske
c29e602ea5
Fix for building with WOLFSSL_ASN_TEMPLATE and IGNORE_NAME_CONSTRAINTS.
2022-09-23 13:52:55 -07:00
David Garske
7970d5d794
Merge pull request #5152 from SparkiDev/armv7a_neon_asm
...
ARM ASM: ARMv7a with NEON instructions
2022-09-23 08:46:03 -07:00
John Safranek
62670d9263
Merge pull request #5619 from kaleb-himes/AZURE-fix2
...
Fix undesirable kyber dependencies when not building kyber (#2 )
2022-09-22 19:55:50 -07:00
Sean Parkinson
1b9656f72d
ARM ASM: add fpu directive to assembly files
2022-09-23 12:31:39 +10:00
Sean Parkinson
aa1a95e70b
Merge pull request #5621 from tmael/sp_1024_sakke
...
Wrap 1024 single precision math with WOLFCRYPT_HAVE_SAKKE
2022-09-23 08:52:05 +10:00
Lealem Amedie
a322e09150
Fix for sniffer to decode out of order packets
2022-09-22 15:12:51 -07:00
Tesfa Mael
7805ffeee0
Fix enable-sp=1024
2022-09-22 14:03:40 -07:00
John Safranek
f113e92495
Merge pull request #5612 from kareem-wolfssl/base16Ending
...
Update Base16_Encode so the ending null terminator is optional.
2022-09-22 13:24:19 -07:00
kaleb-himes
938ab16907
Also address assembly file
2022-09-22 14:15:46 -06:00
Jacob Barthelmeh
39815a53fa
fix for return value of x509 print
2022-09-22 14:09:50 -06:00
kaleb-himes
77676537f6
Fix undesirable kyber dependencies when not building kyber ( #2 )
2022-09-22 10:43:03 -06:00
David Garske
7ca9e4f084
Merge pull request #5616 from julek-wolfssl/dtls13.test-proxy-path
...
dtls13.test: Allow setting UDP_PROXY_PATH in env
2022-09-22 09:15:32 -07:00
John Safranek
13555bebcd
Merge pull request #5617 from kaleb-himes/FIX-AZURE-TEST
...
Fix undesirable kyber dependencies when not building kyber
2022-09-22 09:04:35 -07:00
John Safranek
f271bef7b5
Merge pull request #5618 from lealem47/dc
...
Fix for incorrect DN NID and confusion with DC
2022-09-21 15:00:25 -07:00
John Safranek
216d4afaad
Merge pull request #5611 from tim-weller-wolfssl/zd14815-updates
...
Updates to remove build warnings and test/example code update to avoid memory leak
2022-09-21 14:33:37 -07:00
Lealem Amedie
f177d9364a
Fix for incorrect DN NID and confusion with DC
2022-09-21 13:11:12 -07:00
tim-weller-wolfssl
62766b0758
Updates to remove warnings and build issues found with IAR tools. Update test function / example to avoid memory leak. Update to pass error codes along rather than mask them at lower levels.
...
Make logic to avoid masking return error conditionally compiled based on STSAFE configuration
Update logic at second crypto-callback location to return error code rather than mask it
2022-09-21 14:16:49 -05:00
John Safranek
913bbc8f79
Merge pull request #5613 from kareem-wolfssl/staticEccFix
...
Fix bad casts in wc_EccPublicKeyDecode when using WOLFSSL_ECC_CURVE_STATIC with custom curves.
2022-09-21 11:38:06 -07:00
Daniel Pouzzner
38d4df0c0f
Merge pull request #5610 from kareem-wolfssl/v5Fips
...
Restore v5-dev/v5-ready configure options.
2022-09-21 12:56:27 -05:00
David Garske
680182cab5
Merge pull request #5614 from rizlik/oobread
...
Fix: parsing oob read in dtls1.3
2022-09-21 10:08:32 -07:00
kaleb-himes
d672f10f7e
Fix undesirable kyber dependencies when not building kyber
2022-09-21 09:58:38 -06:00
JacobBarthelmeh
2bf583aa57
Merge pull request #5526 from miyazakh/qt_jenkins_fix
...
Fix qt nightly test failure
2022-09-21 09:38:45 -06:00
Juliusz Sosinowicz
f9b2ef47c9
dtls13.test: Allow setting UDP_PROXY_PATH in env
2022-09-21 16:49:53 +02:00
Jacob Barthelmeh
dc0b2553fc
handle certificates with RSA-PSS signature that have RSAk public keys
2022-09-21 08:24:09 -06:00
Marco Oliverio
400d3c6963
dtls13: Dtls13ParseUnifiedRecordLayer: add overflow check
2022-09-21 16:01:35 +02:00
Marco Oliverio
804081e7c2
fix: GetDtls13RecordHeader:requires correct minimum size
2022-09-21 16:01:35 +02:00
David Garske
a36604079b
Merge pull request #5609 from philljj/master
...
Fixes DTLS 1.3 client use-after-free error
2022-09-21 06:38:09 -07:00
Marco Oliverio
1a983b4a8f
session: use plain buffer to store ticket nonce in ticket
2022-09-21 14:51:07 +02:00
Sean Parkinson
2578f2c8f2
ARMv8 32 Inline ASM: fixes
...
Force parameters to use specific registers.
Shift/rotate amount must have '#' prepended.
2022-09-21 10:45:50 +10:00
Sean Parkinson
ca392fb200
ARM32 ASM Inline: fix SHA-256 inline asm to compile
2022-09-21 09:58:16 +10:00
Kareem
c6bd297bd2
Fix bad casts in wc_EccPublicKeyDecode when using WOLFSSL_ECC_CURVE_STATIC with custom curves.
2022-09-20 15:37:12 -07:00
Kareem
c146fcf581
Update Base16_Encode so the ending null terminator is optional.
2022-09-20 14:44:01 -07:00
Kareem
76afcc1da4
Restore v5-dev/v5-ready configure options as customers are currently using them.
2022-09-20 14:26:15 -07:00
David Garske
90c9363af8
Merge pull request #5538 from satoshiyamaguchi/trial5
...
Add wolfSSL_EVP_PKEY_new_CMAC_key to OpenSSL compatible API
2022-09-20 13:01:52 -07:00
jordan
427383233d
Fix formatting, add check to not support plain HTTP requests in DTLS
2022-09-20 14:41:11 -05:00
David Garske
624aca80dc
Merge pull request #5606 from julek-wolfssl/zd14813-cont
...
0 len sz is allowed
2022-09-20 09:49:17 -07:00
jordan
8336dbf366
Fixes DTLS 1.3 client use-after-free error
2022-09-20 09:17:08 -05:00
Satoshi Yamaguchi
c6ea68a118
Fix two not freed WOLFSSL_CMAC_CTX.
2022-09-20 23:10:22 +09:00
Marco Oliverio
05b6cb5279
internal: drops bad DTLS records on established connection
2022-09-20 11:18:30 +02:00
Marco Oliverio
655ac3e822
refactor: new define to remove some preprocessor directives
2022-09-20 11:18:26 +02:00
Kaleb Himes
43715d1bb5
Merge pull request #5607 from haydenroche5/140_3_version_fixes
...
Clean up some FIPS versioning logic in configure.ac and WIN10 user_settings.h.
2022-09-19 20:48:25 -06:00
Hayden Roche
d212974d5e
Clean up some FIPS versioning logic in configure.ac and WIN10 user_settings.h.
...
configure.ac: Get rid of v5-RC8, v5-RC9, v5-RC10, v5-RC11, v5-ready, and v5-dev.
v5-ready is now just ready and v5-dev just dev.
IDE/WIN10/user_settings.h: Make the FIPS blocks define HAVE_FIPS. Change WCv5.0
block to WCv5.0-RC12. Change FIPS Ready block to use HAVE_FIPS_VERSION_MINOR 3
instead of HAVE_FIPS_VERSION_MINOR 2.
2022-09-19 15:26:06 -07:00
David Garske
73dbc873bd
Merge pull request #5586 from julek-wolfssl/dtls-misc-security
...
Add missing minor security checks
2022-09-19 09:47:00 -07:00
David Garske
cf3d9df443
Merge pull request #5605 from julek-wolfssl/gitignore
...
Add async and fips test folders to gitignore
2022-09-19 09:36:06 -07:00
David Garske
0b81a584cc
Merge pull request #5604 from SparkiDev/mp_init_size_fizes_2
...
SP int: mp_init_size fixes when SP_WORD_SIZE == 8
2022-09-19 06:50:26 -07:00
Juliusz Sosinowicz
8ca4a6086e
0 len sz is allowed
...
In async mode, we always store all handshake messages before processing them. The server hello done message has a length of 0 but we still need to store it to process it.
2022-09-19 14:00:13 +02:00
Juliusz Sosinowicz
9eac8bf5a9
Add async and fips test folders to gitignore
2022-09-19 11:42:45 +02:00
Juliusz Sosinowicz
23e9cf2dc1
Test AEAD limits only without WOLFSSL_TLS13_IGNORE_AEAD_LIMITS
2022-09-19 10:30:29 +02:00
Sean Parkinson
dd32f30306
Merge pull request #5601 from douzzer/20220917-fixes
...
20220917-fixes
2022-09-19 13:50:25 +10:00
Sean Parkinson
e7dba670d6
SP int: mp_init_size fix for sp_mont_norm
...
sp_mont_norm should check wrong parameter when determining whether the
calculation values will fit.
2022-09-19 10:04:30 +10:00
Sean Parkinson
02e51953fd
SP int: mp_init_size fixes when SP_WORD_SIZE == 8
...
Setting an integer may have a value larger than one word being set.
Check size of SP int in this case.
2022-09-19 09:26:47 +10:00
Sean Parkinson
e43a7843b6
Merge pull request #5603 from kaleb-himes/scripts-update
...
Address Issue pointed out in (now deleted) comment on an old merge
2022-09-19 09:06:39 +10:00
kaleb-himes
9a193a3e02
Address Issue pointed out in (now deleted) comment on an old merge
2022-09-18 08:45:18 -06:00
Hideki Miyazaki
001592a8a3
fix qt nightly test
2022-09-18 13:56:55 +09:00
Daniel Pouzzner
ac0d7f4d84
src/internal.c:
...
in DtlsMsgNew(), iff WOLFSSL_ASYNC_CRYPT, allow sz==0 allocation, to fix infinite loop in ProcessReplyEx() around DoDtlsHandShakeMsg();
in DtlsMsgAssembleCompleteMessage() restore fix from 0603031362 for pointerOutOfBounds (undefined behavior) construct;
in ProcessReplyEx(), in WOLFSSL_DTLS13 case ack, check and propagate error from DoDtls13Ack() (fix from @guidovranken).
2022-09-17 13:02:51 -05:00
Daniel Pouzzner
0fc80f5f85
wolfcrypt/src/sp_int.c: catch and propagate errors from sp_init_size() in sp_invmod() and sp_gcd() to fix clang-analyzer-core.UndefinedBinaryOperatorResult.
2022-09-17 12:55:48 -05:00
Daniel Pouzzner
02cc7bf82e
fix whitespace/linelength/indentation.
2022-09-17 12:53:37 -05:00
Satoshi Yamaguchi
64f2a0cafe
Extend wolfSSL_EVP_PKEY_free for freing EVP_PKEY of CMAC.
...
Fix EVP_PKEY not freed in unit test (test_wolfSSL_EVP_PKEY_new_CMAC_key).
2022-09-17 14:44:45 +09:00
Chris Conlon
e6bd6a94a0
Merge pull request #5521 from TakayukiMatsuo/clientverify
2022-09-16 16:55:38 -06:00
JacobBarthelmeh
7a728c0c48
Merge pull request #5569 from SparkiDev/kyber
...
Kyber: Add option to build Kyber API
2022-09-16 14:56:02 -06:00
Eric Blankenhorn
fa30ab37b3
Add reference to wc_AesInit in Gmac API doc
2022-09-16 15:54:32 -05:00
JacobBarthelmeh
c6f6086b15
Merge pull request #5576 from julek-wolfssl/dtls-windows
...
Fix build errors and warnings for MSVC with DTLS 1.3
2022-09-16 11:11:46 -06:00
JacobBarthelmeh
b780ad6da0
Merge pull request #5594 from julek-wolfssl/zd14813
...
Do not allow 0 size DtlsMsg
2022-09-16 10:21:54 -06:00
John Safranek
43b16f67b9
Merge pull request #5596 from SparkiDev/mac_m1_arm_sha256_fix
...
Aarch64 SHA-256 Mac M1 fix
2022-09-16 09:13:23 -07:00
David Garske
24d0112d2c
Merge pull request #5581 from SparkiDev/sp_int_size_fix
...
SP int: mp_init_size() fix
2022-09-16 08:29:06 -07:00
Hideki Miyazaki
a948c78ac7
addressed review comments. remove Qt case guard
2022-09-16 21:25:42 +09:00
Juliusz Sosinowicz
9ef10b5435
Check return of DtlsMsgCreateFragBucket()
2022-09-16 12:13:12 +02:00
Juliusz Sosinowicz
bf4be901e4
Add prototypes for w64wrapper functions
2022-09-16 11:28:29 +02:00
Sean Parkinson
4b3718543e
Aarch64 SHA-256 Mac M1 fix
...
Inline assembly is told K when finished is not important but K is
changing. Take a local copy of K and mark as a changing value.
2022-09-16 13:20:48 +10:00
Sean Parkinson
7062ed0a2c
ChaCha ARM 32-bit: get debug working
...
r7 is needed for debug.
Needed to use stack explicitly rather than let compiler use r7.
2022-09-16 11:29:30 +10:00
Sean Parkinson
e52730d008
SP int: mp_init_size() and check size fixes
...
Check size passed to mp_init_size() 1..SP_INT_DIGITS.
More checks of parameters to SP int functions to ensure result is big
enough to hold value calculated.
2022-09-16 10:13:33 +10:00
Hideki Miyazaki
a98cda3516
fix qsscertificate test failure
2022-09-16 07:48:05 +09:00
Sean Parkinson
523c16130d
Merge pull request #5579 from douzzer/20220911-fixes-re-multi-test
...
20220911-fixes-re-multi-test
2022-09-16 08:29:41 +10:00
Daniel Pouzzner
d18a654f74
wolfcrypt/src/sp_int.c: address peer review around _sp_zero(), sp_init(), and sp_init_size(), re sp_int_minimal.
2022-09-15 14:33:45 -05:00
Hayden Roche
4591e5635b
Handle WC_PENDING_E from ticketEncCb in DoClientTicket properly.
...
ticketEncCb can return WC_PENDING_E. If it does in DoClientTicket, we need to
propagate this up to the calling function (e.g. DoPreSharedKeys), rather than
treating it as a failure.
I tested this by running the following experiment
./examples/server/server -v 4 -r &
./examples/client/client -v 4 -r
and adding the following async simulation code to wc_ChaCha20Poly1305_Decrypt:
#ifdef WOLFSSL_ASYNC_CRYPT
static int testAsync = 0;
if ((testAsync++ % 2) == 0) {
return WC_PENDING_E;
}
#endif
Prior to these changes, you can see that the WC_PENDING_E will not be handled
properly in DoClientTicket (using gdb). A full TLS handshake proceeds from
there. With this commit, running the same experiment shows the pending error
being handled properly.
2022-09-15 11:35:51 -07:00
Daniel Pouzzner
5d2610c96d
wolfssl/wolfcrypt/sp_int.h and wolfcrypt/src/sp_int.c: add struct sp_int_minimal, with same structure as struct sp_int but only one digit, to allow error-free access to sp_ints allocated with ALLOC_SP_INT() with fewer than SP_INT_DIGITS digits, and use the new type in _sp_zero() and sp_init_size() to eliminate -Werror=array-bounds on _sp_zero() under gcc-13.
2022-09-15 13:16:27 -05:00
Daniel Pouzzner
23b16c09d7
linuxkm/Makefile: add support for $KBUILD_EXTRA_FLAGS.
2022-09-15 13:16:27 -05:00
David Garske
2a96d62e43
Merge pull request #5573 from embhorn/zd14802
...
Add WOLFSSL_ATECC_TFLXTLS for Atmel port
2022-09-15 08:59:40 -07:00
Juliusz Sosinowicz
4b3f6ada8a
Do not allow 0 size DtlsMsg
2022-09-15 16:18:24 +02:00
Juliusz Sosinowicz
1941fb2b35
Keep a separate drop counter for each epoch
2022-09-15 15:49:05 +02:00
Juliusz Sosinowicz
67473bac28
Code review fixes
...
- Mark old epochs as invalid so we don't attempt to decrypt with them
- Return a non-zero value if possible in unit tests
- Move Dtls13CheckAEADFailLimit to dtls13.c
- Reset state in processreply
2022-09-15 14:39:33 +02:00
Juliusz Sosinowicz
63ba2f7b8f
TLS 1.3: Check maximum records encrypted with one key set
2022-09-15 12:17:46 +02:00
Juliusz Sosinowicz
4e9106c355
Enforce maximum amount of failed decryptions in DTLS 1.3
2022-09-15 12:17:46 +02:00
TakayukiMatsuo
c7de58ebaf
Add code to fallback to S/W if TSIP cannot handle
2022-09-15 11:16:37 +09:00
Sean Parkinson
ad39e8f77d
Kyber: fix OQS memory leak
2022-09-15 09:18:47 +10:00
JacobBarthelmeh
37adf0ff06
Merge pull request #5592 from douzzer/20220914-fix-quic-test-default-build
...
20220914-fix-quic-test-default-build
2022-09-14 14:15:46 -06:00
JacobBarthelmeh
f21b021bb6
Merge pull request #5590 from SparkiDev/tlsx_symbol_fix
...
TLSX: function not used
2022-09-14 09:10:56 -06:00
JacobBarthelmeh
8b641df116
Merge pull request #5588 from SparkiDev/tls13_cs_fixes
...
TLSv1.3 cipher suites: fixes
2022-09-14 09:06:31 -06:00
Daniel Pouzzner
eef67478e9
tests/quic.c: gate QuicConversation_fail() definition to avoid -Wunused-function.
2022-09-14 09:46:07 -05:00
Juliusz Sosinowicz
17df33cef8
Fix TLS 1.3 testsuite for wolfssl64.sln solution
2022-09-14 11:39:27 +02:00
Sean Parkinson
e8d5cf9662
TLSX: function not used
2022-09-14 09:52:26 +10:00
Sean Parkinson
79d85f6c13
TLS cipher suite: improvements
...
wolfSSL_clear: check return from InitSSL_Suites() call.
TLS13: check ClientHello cipher suite length is even.
Silently remove duplicate cipher suites from user input.
Add tests of duplicate cipher suite removal.
2022-09-14 09:26:00 +10:00
JacobBarthelmeh
3cafde2519
Merge pull request #5589 from SparkiDev/sp_mac_m1_asm
...
SP; Mac M1 failure fix
2022-09-13 16:35:57 -06:00
John Safranek
fa8c158f3c
Merge pull request #5587 from tim-weller-wolfssl/dev-win-build-fips-update
...
Remove FIPS preprocessor defines from Windows build options
2022-09-13 13:47:51 -07:00
JacobBarthelmeh
12ec2272d6
Merge pull request #5585 from icing/groups-key-share
...
wolfSSL_set1_curves_list(), wolfSSL_CTX_set1_curves_list() improvements.
2022-09-13 10:36:25 -06:00
Eric Blankenhorn
1a0073b558
Add WOLFSSL_ATECC_TFLXTLS for Atmel port
2022-09-13 11:04:58 -05:00
Anthony Hu
7f2659bb9b
add test-tls13-pq-2.conf to include.am
2022-09-13 10:51:07 -04:00
Sean Parkinson
62c415fd50
Kyber: fixes
...
Don't define WOLFSSL_HAVE_KYBER unless configured.
Only compile code in ext_kyber.c when WOLFSSL_HAVE_KYBER defined.
Include config.h and settings in ext_kyber.c. This allowed
HAVE_VISIBILITY to be defined.
Cleanup kyber.h.
2022-09-13 10:07:28 -04:00
Anthony Hu
bcf4dbe697
Changes inspired by Feedback from Sean.
...
Define WOLFSSL_HAVE_KYBER when HAVE_LIBOQS is defined.
Fix some misleading debug output.
Fix benchmarking logic.
2022-09-13 10:07:28 -04:00
Anthony Hu
a2635be9e6
wolfCrypt support for external Kyber implementations (liboqs and pqm4)
2022-09-13 10:07:28 -04:00
Sean Parkinson
8c1e2c52e7
Kyber: Add option to build Kyber API
...
wolfSSL Kyber implementation not included.
Added tests and benchmarking.
2022-09-13 10:07:27 -04:00
Stefan Eissing
531f125925
Fix build without TLS13.
2022-09-13 11:18:27 +02:00
Stefan Eissing
bebb686217
Fixes for different build scenarios:
...
- fix the type cast in SMALL_STACK builds
- only use new behviour when wolfSSL_set_groups() is available
2022-09-13 11:10:59 +02:00
Juliusz Sosinowicz
112fc540bb
Fix build errors and warnings for MSVC with DTLS 1.3
2022-09-13 10:13:44 +02:00
Sean Parkinson
5e945f94b4
TLSv1.3 cipher suites: fixes
...
Handle multiple instances of the same cipher suite being in the server's
list.
Fix client order negotiation of cipher suite when doing pre-shared keys.
2022-09-13 17:25:11 +10:00
Sean Parkinson
38418b31f1
Merge pull request #5197 from JacobBarthelmeh/OCSP
...
RSA-PSS with OCSP and add simple OCSP response der verify test case
2022-09-13 15:10:00 +10:00
Sean Parkinson
99d60a0781
SP; Mac M1 failure fix
...
Give the compiler a hint that mask needs special attention.
2022-09-13 13:54:06 +10:00
JacobBarthelmeh
e867f0d312
Merge pull request #5574 from haydenroche5/ecc_nb_tls
...
Add support for non-blocking ECDHE/ECDSA in TLS/DTLS layer.
2022-09-12 16:24:00 -06:00
tim-weller-wolfssl
ba12d72e7a
Remove FIPS preprocessor defines from Windows build command-line options (values specified via user_settings.h)
2022-09-12 15:54:36 -05:00
JacobBarthelmeh
2eee35ef8f
Merge pull request #5582 from SparkiDev/small_stack_cache_fix
...
Small Stack Cache: make work again
2022-09-12 09:53:10 -06:00
JacobBarthelmeh
ba5aeb3501
Merge pull request #5583 from SparkiDev/psk_only_tls_fix
...
PSK only TLS: fix ENCRYPT_LEN
2022-09-12 09:26:28 -06:00
JacobBarthelmeh
be72549388
Merge pull request #5584 from SparkiDev/tls13_midbox_fix
...
TLS 1.3 Middle-Box compat: fix missing brace
2022-09-12 09:15:10 -06:00
Stefan Eissing
c6c4134542
wolfSSL_set1_curves_list(), wolfSSL_CTX_set1_curves_list() improvements.
...
- Use wolfSSL API wolfSSL_set_groups() and wolfSSL_CTX_set_groups()
to configure curves list
- This sets ssl->groups and ctx->groups accordingly and makes
TLSX_KEY_SHARE generation respect the selection and precedence.
- Add tests in quic to assert the order of selections.
2022-09-12 14:31:58 +02:00
Sean Parkinson
375b9c1a59
TLS 1.3 Middle-Box compat: fix missing brace
2022-09-12 13:11:49 +10:00
Sean Parkinson
005f77180b
PSK only TLS: fix ENCRYPT_LEN
...
Allow no PK algorithms and TLS to build and test.
Use PSK cipher suite with GCM if AES-CBC not available.
2022-09-12 11:21:01 +10:00
Sean Parkinson
e0a47ca6c1
Small Stack Cache: make work again
...
Fix Small Stack Cache option so that it works with various options
including ALT_ECC_SIZE.
Allow ALT_ECC_SIZE when SP math all or SP math is compiled in.
2022-09-12 10:52:34 +10:00
Sean Parkinson
2c4c7ba6da
ARM v7a ASM: 128-bit registers not supported
...
Cortex-A5 - Cortex-A9 only support 64-bit wide NEON.
Remove use of WOLFSSL_ARM_ARCH_NO_VREV.
Use WOLFSSL_ARM_ARCH_NEON_64BIT to indicate to use 64-bit NEON registers
and not 128-bit NEON registers.
2022-09-12 10:00:18 +10:00
JacobBarthelmeh
fa6bc79f8b
Merge pull request #5578 from douzzer/20220909-fixes
...
20220909-fixes
2022-09-09 16:37:35 -06:00
JacobBarthelmeh
460b6f1ecc
Merge pull request #5577 from tmael/vx_entropy
...
Improves entropy with VxWorks
2022-09-09 15:51:24 -06:00
JacobBarthelmeh
6c71777ca6
no verify on renewing ocsp response
2022-09-09 13:58:43 -07:00
Daniel Pouzzner
0603031362
fix whitespace in wolfssl/wolfcrypt/settings.h;
...
fix bugprone-macro-parentheses in wolfssl/ssl.h;
fix pointerOutOfBounds and declaration-after-statement in src/internal.c DtlsMsgAssembleCompleteMessage().
2022-09-09 15:25:06 -05:00
Tesfa Mael
82781043c4
Add entropy to VxWorks
2022-09-09 12:44:56 -07:00
JacobBarthelmeh
757a18ab7e
Merge pull request #5496 from SKlimaRA/SKlimaRA/SetCipherListBytes
...
Support for setting cipher list with bytes
2022-09-09 13:42:51 -06:00
David Garske
23ba1e7e98
Minor cleanups. Gate these API's on OPENSSL_EXTRA or WOLFSSL_SET_CIPHER_BYTES to keep code size reduced.
2022-09-09 10:49:49 -07:00
JacobBarthelmeh
6526ffc5f8
Merge pull request #5567 from haydenroche5/hmac_sha1_fix
...
Fix HMAC compat layer function for SHA-1.
2022-09-09 09:45:21 -06:00
Daniel Pouzzner
3bd91c6ab8
wolfcrypt/src/pkcs7.c: revert 57a7430b6a, which broke SCEP use case, and redo using a simple stack variable initialization approach.
2022-09-09 10:09:14 -05:00
Juliusz Sosinowicz
7418ddcae6
Refactor nofail tests into test_wolfSSL_client_server_nofail
2022-09-09 16:04:30 +02:00
Juliusz Sosinowicz
0a1332c4df
Additional checks for secure renegotiation
2022-09-09 15:33:27 +02:00
David Garske
f7c31dbf64
Merge pull request #5575 from SparkiDev/sp_int_no_64
...
SP int: default to 16 bit word size when NO_64BIT defined
2022-09-08 18:30:30 -07:00
Sean Parkinson
0db0032b31
ARM32 ASM: vrev not always available
...
Provide alternative assembly instructions to vrev when
WOLFSSL_ARM_ARCH_NO_VREV is defined.
2022-09-09 10:19:17 +10:00
Sean Parkinson
3b8f3a0897
SP int: default to 16 bit word size when NO_64BIT defined
2022-09-09 08:33:30 +10:00
Hayden Roche
14a521ca25
Make --enable-asynccrypt-sw imply --enable-asynccrypt.
...
Simplifies configuration.
2022-09-08 15:23:22 -07:00
JacobBarthelmeh
200ca9db4b
Merge pull request #5572 from tim-weller-wolfssl/zd14615-config-updates
...
Configuration consistency fixes for RSA keys and way to force disable of private keys
2022-09-08 13:19:11 -06:00
Hayden Roche
226a8b676d
Add support for non-blocking ECDHE/ECDSA in TLS/DTLS layer.
...
This requires the async code.
2022-09-08 11:34:59 -07:00
David Garske
e49efbc101
Merge pull request #5544 from haydenroche5/async_sw
...
Migrate async names from "test" to "software."
2022-09-08 10:18:26 -07:00
JacobBarthelmeh
f49d84e17a
fix typo and pipe ocsp response creation to /dev/null
2022-09-08 09:02:31 -07:00
David Garske
52653c654d
Merge pull request #5571 from julek-wolfssl/sk-cmp-param-fix
...
Set correct types in wolfSSL_sk_*_new functions
2022-09-08 08:47:20 -07:00
David Garske
7c153a49ec
Merge pull request #5570 from SparkiDev/sp_noasm
...
SP: config option to force no asm
2022-09-08 07:49:24 -07:00
David Garske
64376d4d9e
Merge pull request #5555 from julek-wolfssl/dtls-fragment-buckets
...
Don't over-allocate memory for DTLS fragments
2022-09-08 07:46:04 -07:00
Tim Weller
1b90d4fad2
Configuration consistency fixes and addition of new config option to disable private key
...
Add way to disable private keys in wolfcrypt (settings). Make RSA integer usage match structure configuration.
2022-09-08 09:36:18 -05:00
Juliusz Sosinowicz
28af88788a
Set correct types in wolfSSL_sk_*_new functions
...
- Use WOLF_SK_COMPARE_CB() to generate the correct types instead of using void* for the callback parameters.
- Remove WOLFSSL_STACK.comp entirely since it is not used anywhere. Ignore input parameters that used to set this member.
2022-09-08 11:55:32 +02:00
Sean Parkinson
81321fc10e
SP: config option to force no asm
...
Added to configure.ac the option to specify SP to be built with ASM as
x64 defaults to with asm.
2022-09-08 16:20:15 +10:00
Hayden Roche
4deae6dcc6
Remove duplicate defines for EVP_get_cipherbyname and EVP_get_digestbyname.
2022-09-07 16:32:25 -07:00
JacobBarthelmeh
9d6e157fc5
add asn template version
2022-09-07 16:15:19 -07:00
David Garske
4066568315
Merge pull request #5564 from douzzer/20220907-fixes
...
20220907-fixes
2022-09-07 16:03:37 -07:00
Sean Parkinson
5dc1732036
Fix define name
...
WOLFSSL_ARMASM_NO_CRYPTO -> WOLFSSL_ARMASM_NO_HW_CRYPTO
2022-09-08 08:39:00 +10:00
Hayden Roche
18450eb94b
Fix HMAC compat layer function for SHA-1.
...
This function would only accept the string "SHA" for SHA-1-based HMAC, but it
should also accept "SHA1." This is similar to how wolfSSL_EVP_get_digestbyname
allows both "SHA" and "SHA1." We didn't have a test for this in api.c. I added
one, and it failed before my fix here.
2022-09-07 15:25:31 -07:00
David Garske
d1ffe30f13
Merge pull request #5566 from kaleb-himes/OE40-45-support
...
Proposed changes based on customer report(s) under consideration by t…
2022-09-07 13:45:06 -07:00
David Garske
ac1a0293e2
Merge pull request #5565 from tmael/workbench_doc
...
Improve Workbench docs
2022-09-07 13:41:37 -07:00
Daniel Pouzzner
ef7377d64c
fix whitespace and line length.
2022-09-07 15:30:32 -05:00
Daniel Pouzzner
57a7430b6a
wolfcrypt/src/pkcs7.c: in wc_PKCS7_DecryptKtri(), refactor handling of OAEP keys to fix uninited value access detected by clang-analyzer-core.UndefinedBinaryOperatorResult; fix whitespace.
2022-09-07 15:14:26 -05:00
JacobBarthelmeh
28a82237d9
RSA-PSS signed OCSP responses
2022-09-07 13:12:43 -07:00
David Garske
9c88d8ac2c
Merge pull request #5547 from JacobBarthelmeh/mcux
...
Port to RT685 with FreeRTOS
2022-09-07 12:54:54 -07:00
Juliusz Sosinowicz
b2a80cbe65
Disable warning for MSVC
2022-09-07 12:05:29 -07:00
kaleb-himes
3ac985c2f1
Proposed changes based on customer report(s) under consideration by the team
2022-09-07 11:34:27 -06:00
Tesfa Mael
0f0aae72c2
Improve Workbench docs
2022-09-07 09:58:23 -07:00
Jacob Barthelmeh
22bad7b06b
fix spelling
2022-09-07 09:57:34 -06:00
David Garske
d75bb2de62
Merge pull request #5561 from SparkiDev/sp_math_openssl_fix
...
SP math: fix build configuration with opensslall
2022-09-07 07:12:13 -07:00
David Garske
bc1fca8c85
Merge pull request #5562 from SparkiDev/sp_int_521_fix
...
SP int: fix for SP_INT_DIGITS calc
2022-09-07 07:12:01 -07:00
Juliusz Sosinowicz
1d2cd7af0f
Expose API for src/api.c
2022-09-07 13:04:33 +02:00
Juliusz Sosinowicz
28895ed0cd
Use a union and struct for padding in DtlsFragBucket
...
Zero length arrays are not allowed so `byte padding[0]` is not a valid member. Changed to use a union and struct instead.
2022-09-07 13:04:26 +02:00
Juliusz Sosinowicz
8bf3e0829e
Don't over-allocate memory for DTLS fragments
...
Don't reserve the full message length of memory. Instead we only allocate memory for the fragments that we have already received. We also dynamically combine memory fragments when we receive overlap.
2022-09-07 13:04:06 +02:00
Sean Parkinson
1fe9f2d894
SP int: fix for SP_INT_DIGITS calc
...
Implementation of sp_mont_red needs words * 2 + 1.
2022-09-07 17:22:22 +10:00
Sean Parkinson
05634e286d
SP math: fix build configuration with opensslall
...
./configure '--disable-shared' '--enable-keygen' '--enable-certgen'
'--enable-certreq' '--enable-certext' '--enable-ocsp' '--enable-crl'
'--enable-pwdbased' '--enable-opensslall' '--enable-pkcs7'
'--enable-pkcs12' '--enable-sp' '--enable-sp-math' '--disable-rsa'
'--disable-dh' '--enable-ecc'
2022-09-07 15:42:33 +10:00
David Garske
12680a967a
Merge pull request #5560 from douzzer/20220906-fixes
...
20220906-fixes
2022-09-06 17:56:33 -07:00
Sean Parkinson
7d67ffac69
Fixup assembly to compile with ARMv7a
2022-09-07 09:30:06 +10:00
Sean Parkinson
805b0eb606
ARM ASM: ARMv7a with NEON instructions
...
Change to build assembly code for ARMv7a with NEON instruction set.
./configure -host=armv7a --enable-armasm
Added ARM32 SHA-256 NEON only implementation.
2022-09-07 09:29:56 +10:00
David Garske
602116c3f2
Merge pull request #5558 from embhorn/zd14776
...
Fix warning in DecodeAltNames
2022-09-06 16:00:02 -07:00
Chris Conlon
761fde31ad
Merge pull request #5478 from miyazakh/rsaesoaep
2022-09-06 15:45:40 -06:00
Daniel Pouzzner
bf29d6b2c7
wolfcrypt/test/test.c: refactor shake256_absorb_test() and shake256_test() to use a single buffer for "large_input", malloc()ed when WOLFSSL_SMALL_STACK, to stay within stack limits of all-max-func-stack-2k; move a couple declarations in openssl_test() to resolve declaration-after-statement.
2022-09-06 13:28:57 -05:00
Daniel Pouzzner
14082ceeb9
CMakeLists.txt: add SHAKE128 coverage.
2022-09-06 13:28:45 -05:00
David Garske
d72b401e8e
Merge pull request #5545 from icing/evp_chacha
...
Add ChaCha20 as available cipher in the EVP API.
2022-09-06 10:42:54 -07:00
Eric Blankenhorn
dcf215d52c
Fix warning in DecodeAltNames
2022-09-06 11:33:30 -05:00
David Garske
e2de8f3b6c
Merge pull request #5554 from rizlik/dtls_cid_fix
...
fix: dtls13: do not negotiate ConnectionID in HelloRetryRequest
2022-09-06 09:28:25 -07:00
David Garske
7b0128f9ac
Merge pull request #5541 from SparkiDev/ecc_sign_k_nondyn
...
ECC sign_k: don't have it dynamically allocated
2022-09-06 07:52:45 -07:00
David Garske
1a3c34ea99
Merge pull request #5557 from SparkiDev/sp_rsa_max_fix
...
RSA max and SP_INT_BITS: disabled RSA fix
2022-09-06 07:52:18 -07:00
Juliusz Sosinowicz
a33368f314
Merge pull request #5516 from embhorn/zd14732
2022-09-06 13:51:58 +02:00
Stefan Eissing
5927c4063a
Removing FIXME comments after the fixing has been done. doh.
2022-09-06 10:06:02 +02:00
Stefan Eissing
9b319b3782
Remove dependency on POLY1305 on testing CHACHA20 only.
2022-09-06 10:06:02 +02:00
Stefan Eissing
9f47999002
Add ChaCha20 as available cipher in the EVP API.
...
- wire the wc_ChaCha_* implementation into the EVP API
as `wolfSSL_EVP_chacha20`
- follow IV conversions of OpenSSL
- add test case
- have QUIC support use this for header protection when
CHACHA20_POLY1305 has been negotiated in the handshake.
2022-09-06 10:06:02 +02:00
Sean Parkinson
4b12d2f4ec
RSA max and SP_INT_BITS: disabled RSA fix
...
Checking WOLFSSL_MAX_RSA_BITS against SP_INT_BITS even though RSA is
disabled.
/configure --disable-shared --enable-sp --enable-sp-math --disable-rsa
--disable-dh --enable-ecc
2022-09-06 17:15:22 +10:00
David Garske
483d7189c7
Merge pull request #5512 from SparkiDev/tls13_64bit_milli
...
Make time in milliseconds 64-bits
2022-09-05 16:19:03 -07:00
David Garske
31b8edd192
Merge pull request #5552 from SparkiDev/ed_make_key_fixes
...
Ed make public key wasn't checking whether private key set
2022-09-05 16:13:41 -07:00
Sean Parkinson
e7dbb5b375
Merge pull request #5548 from dgarske/whitespace
...
Whitespace cleanup
2022-09-06 07:54:29 +10:00
Marco Oliverio
aee81764f2
fix: dtls13: do not negotiate ConnectionID in HelloRetryRequest
2022-09-05 17:00:09 +02:00
Stanislav Klima
38781bd7cf
added testing for wolfSSL_set_cipher_list_bytes()
2022-09-05 16:57:07 +02:00
Kaleb Himes
e76361d544
Merge pull request #5551 from SparkiDev/sha3_asm_fix
...
SHA-3: check BMI1 availablity for ASM
2022-09-05 05:03:52 -06:00
Sean Parkinson
f153e65102
SHA-3: check BMI1 availablity for ASM
...
Added benchmarking of SHAKE128 and SHAK256.
2022-09-05 14:11:02 +10:00
Sean Parkinson
f807c70637
Ed make public key wasn't checking whether private key set
...
Ed25519 and Ed448 make public key APIs now check whether the private key
was set.
The private key and public key flags setting and clearing also updated.
Testing of unset private key and calling make public key added for
Ed25519 and Ed448.
2022-09-05 12:21:51 +10:00
kaleb-himes
49065373aa
Merge branch 'fix_sha256_debug' of github.com:gojimmypi/wolfssl
2022-09-04 19:26:38 -06:00
Sean Parkinson
4ac113d135
ECDSA sign_k allocated when not WOLFSSL_NO_MALLOC
...
Fix up other WOLFSSL_NO_MALLOC issues.
2022-09-05 10:56:17 +10:00
Sean Parkinson
b95df7529c
Improve usage of 64-bit implementation of TimeNowInMilli
...
Change to use 64-bits for types stored - use WOLFSSL_32BIT_MILLI_TIME if
a 64-bit type is not available.
TimeNowInMill() returns 0 on error instead of GETTIME_ERROR.
2022-09-05 10:47:25 +10:00
Satoshi Yamaguchi
69ed2b56d4
Replace a variable of AES-128 key size to the constant AES_128_KEY_SIZE
2022-09-04 13:31:24 +09:00
Satoshi Yamaguchi
b52d193ee3
Fix an implicit type conversion
2022-09-03 23:56:54 +09:00
David Garske
aa036b6ea4
Merge pull request #5532 from anhu/sphincs
...
Add sphincs to wolfCrypt.
2022-09-02 11:56:11 -07:00
David Garske
232a750cc2
Whitespace cleanup.
2022-09-02 09:54:17 -07:00
David Garske
4a8a11315b
Merge pull request #5536 from SparkiDev/sha3_x64
...
SHA-3 improvements
2022-09-02 09:46:14 -07:00
JacobBarthelmeh
8ca63b93a4
Merge pull request #5539 from dgarske/ocsp_async
...
Fix for async with OCSP non-blocking in `ProcessPeerCerts`
2022-09-02 10:42:09 -06:00
David Garske
11bb8b3dc4
Merge pull request #5543 from SparkiDev/rsa_max_size_fix
...
RSA max key size checks
2022-09-02 09:26:19 -07:00
Anthony Hu
10ce703d71
Add sphincs to wolfCrypt.
...
Note that we will not support sphincs in TLS so nothing above wolfcrypt changes.
2022-09-02 11:53:55 -04:00
Sean Parkinson
daadd4a1b7
Merge pull request #5540 from dgarske/socksz
...
Fixes for building with 32-bit and socket size sign/unsigned mismatch
2022-09-02 16:33:41 +10:00
Hayden Roche
959386422e
Migrate async names from "test" to "software."
...
See async PR 52.
2022-09-01 17:53:18 -07:00
Sean Parkinson
3bf6baf596
RSA max key size checks
...
Detect when certificate's RSA public key size is too big and fail on
loading of certificate.
Fix unit test to only attempt to use 3072 bit RSA-PSS keys when
RSA_MAX_SIZE supports it.
2022-09-02 10:37:12 +10:00
Sean Parkinson
cef590131a
ECC sign_k: don't have it dynamically allocated
2022-09-02 09:18:42 +10:00
Sean Parkinson
23fd6456c2
Merge pull request #5534 from dgarske/zd14420
...
Fix for async session tickets
2022-09-02 08:50:35 +10:00
Sean Parkinson
ef451d316c
Make time in milliseconds 64-bits
...
Allow for longer session ticket lives.
2022-09-02 08:45:07 +10:00
David Garske
f530101ef1
Fix for async with OCSP non-blocking in ProcessPeerCerts. ZD 14754.
2022-09-01 14:39:52 -07:00
Stefan Eissing
65ca72c5a2
Improve EVP support for CHACHA20_POLY1305 ( #5527 )
...
* Add test case for OpenSSLs capability to init a evp context partially in several calls.
* EVP handling of CHACHA20_POLY1305 improvment
- save key at ctx for Init()s without IV
- reuse stored key for Init()s with new IV, reusing ctx
- free and zero key on ctx clenaup
* Adding type cast to XMALLOC to force compiler compatibility.
* EVP: using same DYNAMIC_TYPE in alloc and free of chacha20_poly1305 key.
Co-authored-by: Stefan Eissing <stefan.eissing@greenbytes.de >
2022-09-01 13:23:42 -07:00
David Garske
2695f36642
Fixes for building with 32-bit and socket size sign/unsigned mismatch.
...
Tested with: `./configure --enable-all CFLAGS="-m32 -DXSOCKLENT=int" LDFLAGS="-m32" && make`
2022-09-01 11:39:34 -07:00
David Garske
ba8ffc765d
Merge pull request #5513 from rizlik/hrr_default
...
DTLSv1.3: Do HRR Cookie exchange by default
2022-09-01 07:45:18 -07:00
David Garske
0222833f7e
Merge pull request #5535 from douzzer/20220831-analyzer-coddling
...
20220831-analyzer-coddling
2022-09-01 07:40:11 -07:00
Daniel Pouzzner
8ccef9f0d3
Merge pull request #5531 from embhorn/zd14665
...
Check return from call to wc_Time
2022-09-01 09:35:49 -05:00
Satoshi Yamaguchi
85776f0069
Add wolfSSL_EVP_PKEY_new_CMAC_key to OpenSSL compatible API
2022-09-01 18:00:43 +09:00
Marco Oliverio
08b89fbef9
server: add optional argument to -J disable hrr cookie
2022-09-01 09:37:35 +02:00
Marco Oliverio
401cfbd8e4
dtls13: enable hrr cookie by default
2022-09-01 09:37:35 +02:00
Marco Oliverio
edd723cc84
ssl: add new wolfSSL_disable_hrr_cookie() API to disable hrr cookie
...
Add a way to disable hrr cookie so it can be enabled by default for DTLS
connections.
2022-09-01 09:37:34 +02:00
Sean Parkinson
ce8959ea77
SHA-3 improvements
...
Add x86_64 assembly code:
- BMI2
- AVX2 (using ymm, slower than BMI2)
- AVX2 of 4 similtaneous hashes
Add SHAKE128 functions and tests.
Add Absorb and Squeeze functions for SHAKE128 and SHAK256 and tests.
Add doxygen for SHA-3 and SHAKE functions.
Update other generated x86_64 assembly files to include settings.h.
2022-09-01 17:11:58 +10:00
Daniel Pouzzner
ea3959f2f6
analyzer coddling:
...
in api.c test_wolfSSL_dtls12_fragments_spammer(), inhibit clang-analyzer-deadcode.DeadStores;
in asn.c ParseCRL_Extensions() old (!WOLFSSL_ASN_TEMPLATE) version, fix bounds check to prevent overshift;
in misc.c ctMaskCopy(), use `*(x + i)`, not x[i], to tiptoe around cppcheck-2.9 objectIndex bug.
2022-08-31 22:56:08 -05:00
David Garske
db6d69143e
Merge pull request #5533 from lealem47/crlPrintFix
...
Add missing DN nid to work with PrintName()
2022-08-31 18:32:55 -07:00
David Garske
fe583faf32
Merge pull request #5501 from haydenroche5/ecc_non_block
...
Add support for non-blocking ECC key gen and shared secret gen for P-256/384/521.
2022-08-31 18:31:28 -07:00
David Garske
96ab26e6e9
Fix for async session tickets. ZD14420
...
```
./configure --enable-all --enable-asynccrypt CFLAGS="-DWOLFSSL_NO_DEF_TICKET_ENC_CB" && make
./examples/server/server -v 4 -r &
./examples/client/client -v 4 -r
```
2022-08-31 15:28:49 -07:00
Lealem Amedie
2df1c25263
Add missing DN nid to work with PrintName()
2022-08-31 15:18:12 -07:00
Hayden Roche
41207f5d9b
Add support for non-blocking ECC key gen and shared secret gen for
...
P-256/384/521.
New functions:
- sp_ecc_make_key_256_nb
- sp_ecc_make_key_384_nb
- sp_ecc_make_key_521_nb
- sp_ecc_secret_gen_256_nb
- sp_ecc_secret_gen_384_nb
- sp_ecc_secret_gen_521_nb
This commit also tweaks the testing for ECDSA testing in test.c. Instead of
testing with one of P-256/384/521, we test with all that are available.
2022-08-31 14:34:26 -07:00
David Garske
38e4ecc27c
Merge pull request #5529 from anhu/wextra
...
Fix Windows CMakeList compiler options
2022-08-31 14:04:24 -07:00
Eric Blankenhorn
5a25525b2e
Check return from call to wc_Time
2022-08-31 15:20:07 -05:00
David Garske
9531552795
Merge pull request #5522 from tim-weller-wolfssl/update-ide-win10-build
...
Update ide win10 build files to add missing sp source files
2022-08-31 12:45:17 -07:00
David Garske
b1301d9dc4
Merge pull request #5518 from CallumMcLoughlin/master
...
Allow Post Quantum Keyshare for DTLS 1.3
2022-08-31 12:29:08 -07:00
David Garske
f0812fa21f
Added vcpkg instructions to the INSTALL file.
2022-08-31 11:41:43 -07:00
David Garske
8722a46d52
Merge pull request #5503 from julek-wolfssl/dtls-fragments
...
DTLS limit fragments
2022-08-31 09:53:09 -07:00
David Garske
3b8d230223
Merge pull request #5515 from anhu/custExtDoc
...
Improve `wc_SetCustomExtension` documentation
2022-08-31 08:35:04 -07:00
Anthony Hu
f7482d96e6
Windows cl.exe does not support -Wextra other flags
2022-08-31 10:32:55 -04:00
Tim Weller
1d9d8bdefb
Removed sp_c64.c due to reliance on 128-bit type, replaced with sp_x86_64.c and _asm.asm.
2022-08-31 07:15:05 -07:00
Tim Weller
71b1aca373
Merge branch 'master' into update-ide-win10-build
2022-08-31 06:32:20 -07:00
Juliusz Sosinowicz
54bd786707
DTLS limit fragments
...
- Limit the amount of fragments we store per a DTLS connection
- Error out when we reach the DTLS fragment connection limit
2022-08-31 14:24:20 +02:00
David Garske
44f81f8bc0
Merge pull request #5525 from JacobBarthelmeh/release
...
Release version 5.5.0
2022-08-30 10:35:13 -07:00
JacobBarthelmeh
4ce1cf1d7c
update RPM build
2022-08-30 08:50:41 -07:00
Jacob Barthelmeh
d75ce08d75
update readme for release 5.5.0
2022-08-30 09:31:28 -06:00
CallumMcLoughlin
43388186bb
Tidy up TLS 1.3 and DTLS 1.3 check
2022-08-30 19:59:36 +12:00
CallumMcLoughlin
565d1b33e5
Update examples to allow post quantum KEM within DTLS 1.3
2022-08-30 18:39:57 +12:00
gojimmypi
1afc92dd7b
internal.c: WC_SHA256_DIGEST_SIZE for wc_Sha256GetHash when WOLFSSL_DEBUG_TLS
2022-08-29 17:06:52 -07:00
JacobBarthelmeh
29f2dee991
handeling DER to internal of an OCSP response with no optional certificates
2022-08-29 15:25:50 -07:00
JacobBarthelmeh
ac3cdb42b7
free structure in test case and return 0 from ocsp renew script
2022-08-29 15:25:50 -07:00
JacobBarthelmeh
5b5f673c51
add simple ocsp response der verify test case
2022-08-29 15:25:50 -07:00
Tim Weller
69d60f5099
Merge branch 'master' into update-ide-win10-build
2022-08-29 09:13:51 -07:00
David Garske
a7f86f9473
Merge pull request #5517 from JacobBarthelmeh/Testing
...
misc. testing items from static analysis tools
2022-08-29 08:48:51 -07:00
JacobBarthelmeh
11c553ea1d
Merge pull request #5520 from julek-wolfssl/sni-tls-1.2
...
SNI can appear in ServerHello for TLS 1.2
2022-08-29 09:36:53 -06:00
Juliusz Sosinowicz
88deaf9b5c
SNI can appear in ServerHello for TLS 1.2
...
Co-authored-by: Eric Blankenhorn <eric@wolfssl.com >
2022-08-29 14:22:10 +02:00
CallumMcLoughlin
91d3cd7111
Allow Post Quantum Keyshare for DTLS 1.3
2022-08-28 17:35:28 +12:00
JacobBarthelmeh
1e673aee3b
scan-build warning fix
2022-08-26 16:29:11 -07:00
JacobBarthelmeh
ad0fd15a0d
static analysis fix from infer
2022-08-26 14:55:42 -07:00
JacobBarthelmeh
ce2cf3439d
subject info. acc. should contain a CA repo entry not OCSP
2022-08-26 14:39:20 -07:00
Eric Blankenhorn
1c83438eb3
Add compatibility layer macros
2022-08-26 14:56:35 -05:00
Anthony Hu
b1e9cc320b
Add documentation telling the user not to modify a buffer.
2022-08-26 14:27:27 -04:00
David Garske
e88bd66501
Merge pull request #5514 from julek-wolfssl/wolfSSL_EVP_MD_CTX_copy_ex-leak
...
Cleanup output object in wolfSSL_EVP_MD_CTX_copy_ex before copy
2022-08-26 11:08:17 -07:00
JacobBarthelmeh
1bf441de4d
add MCUXpresso IDE projects
2022-08-26 10:51:10 -07:00
JacobBarthelmeh
b3fa6f654e
no realloc, adjustable static test size, fsl RTC
2022-08-26 09:15:33 -06:00
David Garske
d84bfd511d
Merge pull request #5511 from SparkiDev/sp_submod_neg_fix
...
SP math: don't modify sign in sp_div
2022-08-26 08:07:37 -07:00
Juliusz Sosinowicz
2fb3f58c03
Cleanup output object in wolfSSL_EVP_MD_CTX_copy_ex before copy
2022-08-26 13:07:45 +02:00
Sean Parkinson
8b2719cc83
SP math: don't modify sign in sp_div
...
Not need to modify sign of a and d in sp_div().
Signs cached at start and used to calculate sign result.
2022-08-26 08:47:49 +10:00
David Garske
1976601811
Merge pull request #5505 from julek-wolfssl/dtls-plaintext
...
Ignore plaintext on established connections
2022-08-25 07:25:03 -07:00
David Garske
b9cee17b01
Merge pull request #5508 from SparkiDev/aes_ctr_arm32_neon_fix2
...
AES-CTR ARM32 ASM: Fix 128-bit counter increment
2022-08-25 07:04:48 -07:00
Sean Parkinson
bd13fcc92a
AES-CTR ARM32 ASM: Fix 128-bit counter increment
...
Include hash.h to sp_int.h for when no public key algorithms compiled in
- need WC_MAX_DIGEST_SIZE.
2022-08-25 14:54:00 +10:00
David Garske
842d415de0
Merge pull request #5507 from haydenroche5/general_names_leak
...
Fix wolfSSL_GENERAL_NAMES_free memory leak.
2022-08-24 21:05:53 -07:00
Sean Parkinson
2c829f19d3
Merge pull request #5506 from dgarske/dtlscid
...
Fixes for build warnings and string macros for DTLS CID
2022-08-25 13:52:55 +10:00
Hayden Roche
9f39ffdba7
Fix wolfSSL_GENERAL_NAMES_free memory leak.
...
This function was just freeing the stack object itself of GENERAL_NAMES with
wolfSSL_sk_free, but this doesn't free the data in the items of the stack. The
fix is to replace wolfSSL_sk_free with wolfSSL_sk_GENERAL_NAME_free.
2022-08-24 18:42:30 -07:00
David Garske
a0448155d5
Fix for type warnings in example for DTLS CID ./configure --enable-dtls --enable-dtlscid --enable-dtls13.
2022-08-24 16:02:05 -07:00
David Garske
8268214297
Merge pull request #5504 from ejohnstown/ppc-warn
...
API Test Fixes for GCC/PowerPC Warnings
2022-08-24 15:19:53 -07:00
Juliusz Sosinowicz
159a3c8b03
Ignore plaintext on established connections
2022-08-24 21:40:19 +02:00
Stanislav Klima
c4a61af311
drafted test case
2022-08-24 20:45:54 +02:00
Stanislav Klima
a668953f70
cr fix
2022-08-24 20:35:56 +02:00
John Safranek
9b65f5819c
API Test Fixes for GCC/PowerPC Warnings
...
1. In api.c, change the name of the devId global to testDevId.
2. In api.c, for the SNI test, some of the pointers were multiply
typecast eventually to `void **`. An older compiler didn't like
that. Just use void pointer.
2022-08-24 11:30:56 -07:00
Uriah-wolfSSL
7ea904c873
Added CertNew() and CertFree() info. ( #5502 )
...
* Updated wc_CertNew() dox for the return value listings, small changes to
description and add some detail to the example per peer review.
2022-08-24 13:09:50 -04:00
David Garske
9b12011d71
Merge pull request #5499 from SparkiDev/aes_ctr_arm32_asm
...
AES-CTR ARM32 crypto ASM fix
2022-08-24 09:59:49 -07:00
David Garske
53b74e2d32
Merge pull request #5498 from SparkiDev/tls_ecc_sig_fault
...
Check ECC signature in TLS
2022-08-24 09:59:06 -07:00
David Garske
124cff60f1
Merge pull request #5500 from SparkiDev/sp_int_div_ss_rework
...
Rework sp_div to work around static analysis error
2022-08-24 09:58:13 -07:00
Sean Parkinson
d087cbea1b
Rework sp_div to work around static analysis error
...
Fix _sp_exptmod_mont_ext() to handle when number of bits in exponent is
a multiple of the window size.
2022-08-24 12:31:21 +10:00
Sean Parkinson
9228354d29
AES-CTR ARM32 crypto ASM fix
...
Fix handling of counter to support incrementing across all bytes in
ARM32 crypto asm.
Added test cases for wrapping of counter when 2 blocks are being
encrypted to check assembly alternative path.
2022-08-24 10:51:56 +10:00
Sean Parkinson
2571f65e85
Check ECC signature in TLS
...
Verifying gnerated ECC signature in TLS handshake code to mitigate when
an attacker can gain knowledge of the private key through fault
injection in the signing process.
Requires WOLFSSL_CHECK_SIG_FAULTS to be defined.
2022-08-24 09:01:18 +10:00
David Garske
3b6124cf34
Merge pull request #5497 from douzzer/20220823-fixits
...
20220823-fixits
2022-08-23 13:45:02 -07:00
Daniel Pouzzner
8f70f98640
wolfcrypt/src/asn.c: refactor _SMALL_STACK code path in ParseCRL_Extensions() to fix memory leaks and heap-use-after-free.
2022-08-23 13:52:42 -05:00
Daniel Pouzzner
dcebd0d349
wolfssl/wolfcrypt/logging.h: when !WOLFSSL_VERBOSE_ERRORS, define WOLFSSL_ERROR_VERBOSE(e) as (void)(e) to avert clang-analyzer-deadcode.DeadStores, and avert bare semicolons.
2022-08-23 13:50:56 -05:00
David Garske
769fb7cbee
Merge pull request #5453 from rizlik/dtls_cid
...
Support ConnectionID Extension DTLS Negotiation
2022-08-23 11:29:25 -07:00
David Garske
cab6ecd130
Merge pull request #5404 from JacobBarthelmeh/PKCS7
...
fix for not having default pkcs7 signed attributes
2022-08-23 11:04:17 -07:00
David Garske
5c65974170
Fix for dynamic type macro typo.
2022-08-23 09:32:11 -07:00
David Garske
9d5305ad07
Merge pull request #5495 from julek-wolfssl/ticket-alignment
...
Remove WOLFSSL_GENERAL_ALIGNMENT from WOLFSSL_TICKET_ENC_SZ calculation
2022-08-23 08:13:42 -07:00
Marco Oliverio
3a8e6f2280
fix: add explicit cast to abide g++ compiler
2022-08-23 16:58:24 +02:00
Marco Oliverio
f3262005e4
add basic ConnectionID DTLS tests
2022-08-23 16:58:24 +02:00
Marco Oliverio
90fcd95f9b
server/client: add --cid option to use ConnectionID extension
2022-08-23 16:58:24 +02:00
Marco Oliverio
cfbd061625
add initial support for ConnectionID DTLS extension
2022-08-23 16:58:24 +02:00
Stanislav Klima
83fad7bb45
drafted setting cipher list with bytes api
2022-08-23 14:16:43 +02:00
Juliusz Sosinowicz
ae049706c6
Remove WOLFSSL_GENERAL_ALIGNMENT from WOLFSSL_TICKET_ENC_SZ calculation
2022-08-23 11:57:41 +02:00
Marco Oliverio
171af05e96
tlsx: expose TLSX_Push
...
To be able to implement extension in separate compilation unit
2022-08-23 10:00:06 +02:00
David Garske
bf9f4b88e4
Merge pull request #5494 from douzzer/20220822-bugprone-macro-parentheses
...
20220822-bugprone-macro-parentheses
2022-08-22 17:16:48 -07:00
David Garske
48463f6d54
Merge pull request #5388 from lealem47/crlPrint
...
Adding X509_CRL_print() function
2022-08-22 17:16:19 -07:00
Lealem Amedie
f9ca944106
Addressing some more feedback
2022-08-22 14:47:11 -07:00
Daniel Pouzzner
1063090e38
fix bugprone-macro-parentheses in WOLFSSL_CRYPTO_EX_DATA_IGNORE_PARAMS() added in 8b2fcd0643.
2022-08-22 16:34:28 -05:00
JacobBarthelmeh
bd49d37aaf
Merge pull request #5492 from embhorn/zd14694
...
Fix for AddPacketInfo with WOLFSSL_CALLBACKS
2022-08-22 14:59:29 -06:00
Lealem Amedie
91a7b8067c
Addressing some PR feedback
2022-08-22 12:04:15 -07:00
David Garske
c7c6fd98d7
Merge pull request #5491 from icing/quic-doc-update
...
Update of the QUIC documentation
2022-08-22 12:00:12 -07:00
David Garske
b9d9dc02bb
Merge pull request #5476 from julek-wolfssl/session-buffers
...
Remove WOLFSSL_SESSION_TYPE_REF buffers from WOLFSSL_SESSION
2022-08-22 11:59:39 -07:00
David Garske
c0815b3bc6
Merge pull request #5493 from kaleb-himes/openssl3_0_testing_supplemental
...
Supplemental fix in addition to #5470
2022-08-22 11:14:49 -07:00
David Garske
36facf52c9
Merge pull request #5490 from TakayukiMatsuo/no_rsa
...
Fixed build errors raised when NO_RSA is defined
2022-08-22 10:07:39 -07:00
David Garske
d50e740c97
Merge pull request #5488 from julek-wolfssl/get_ex_new_index-docs
...
Add documentation explaining get_ex_new_index API limitations
2022-08-22 09:51:36 -07:00
David Garske
a7e318a7ad
Merge pull request #5484 from lealem47/allocators
...
Adding allocator funcs for dtls peer (for wrappers)
2022-08-22 09:29:54 -07:00
David Garske
ce5a749fcb
Merge pull request #5489 from SparkiDev/aes_ctr_arm_asm
...
AES-CTR ARM crypto ASM fix
2022-08-22 09:28:22 -07:00
David Garske
1e5de8255e
Merge pull request #5472 from satoshiyamaguchi/trial3
...
Add/Extend PEM_read compatibility API's
2022-08-22 09:24:39 -07:00
Lealem Amedie
8f4b467f47
Fixing line lengths and SMALL_STACK code path
2022-08-22 09:17:23 -07:00
David Garske
689d45eb59
Merge pull request #5425 from SparkiDev/ecc_sp_uncomp_ret
...
ECC SP uncompress: use error return
2022-08-22 09:00:52 -07:00
Tim Weller
f98d8c5024
Update Windows 10 Visual Studio FIPS build file to include single-precision (sp) files to resolve missing symbols during link
2022-08-22 08:40:45 -07:00
kaleb-himes
77dec16b3b
Supplemental fix in addition to #5470
2022-08-22 08:00:40 -06:00
Eric Blankenhorn
22c44bd762
Fix for AddPacketInfo with WOLFSSL_CALLBACKS
2022-08-22 08:01:21 -05:00
Stefan Eissing
240c261772
Update of the QUIC documentation
...
- explain what the QUIC support is
- examples of ngtcp2 use
- what is needed for HTTP/3
2022-08-22 14:36:14 +02:00
Juliusz Sosinowicz
0dbd0ffb4e
Merge pull request #5483 from embhorn/zd14659
2022-08-22 14:28:29 +02:00
Juliusz Sosinowicz
e565d0d7de
Refactor and code review
...
- Refactor object hashing into one function
- Allow multiple WOLFSSL_ASSERT_SIZEOF_GE in one function
2022-08-22 14:19:48 +02:00
Juliusz Sosinowicz
8b2fcd0643
Add documentation explaining get_ex_new_index API limitations
2022-08-22 12:16:51 +02:00
Sean Parkinson
c7d28e3bb9
ECC SP uncompress: use error return
2022-08-22 16:21:30 +10:00
TakayukiMatsuo
48e7035af8
Fix build error when NO_RSA is defined
2022-08-22 14:03:19 +09:00
Sean Parkinson
f7a8d4a44a
AES-CTR ARM crypto ASM fix
...
Fix handling of counter to support incrementing across all bytes in ARM
crypto asm.
Added test cases for wrapping of counter.
Extracted ARM ASM for AES-CTR.
Use ASM to created encrypted temporary block.
2022-08-22 10:36:48 +10:00
Sean Parkinson
26c61f8e0f
Merge pull request #5473 from icing/quic-hello-retry
...
Respect disabled curves on HelloRetryRequests
2022-08-22 08:32:30 +10:00
Lealem Amedie
2059d05b7a
checking some ret values, fix trailing whitespace
2022-08-19 12:40:42 -07:00
Lealem Amedie
2a65220527
Adding X509_CRL_print() function
2022-08-19 12:21:35 -07:00
Lealem Amedie
da136e0c49
Adding allocator funcs for dtls peer (for wrappers)
2022-08-19 10:59:55 -07:00
David Garske
b417f94435
Merge pull request #5485 from SparkiDev/tls13_state_string_long
...
wolfSSL_state_string_long - update for TLS 1.3 and DTLS 1.3
2022-08-19 10:09:09 -07:00
David Garske
f3b9cfa71c
Merge pull request #5487 from icing/tls13_early_nr
...
Improved EarlyData Indicator reply fix based on PR #5486
2022-08-19 09:54:17 -07:00
Stefan Eissing
a7c0c4649e
Fixing Handshake Hash update when Preshared Keys offered by client,
...
but none of them was accepted.
- This applies to TLSv1.3 and QUIC
- QUIC test case to trigger the bug enabled
2022-08-19 15:56:20 +02:00
David Garske
1d0e83bd1a
Merge pull request #5474 from julek-wolfssl/zd14644-2
...
Match OpenSSL self signed error return.
2022-08-19 06:46:26 -07:00
Eric Blankenhorn
3d8562f07b
Fixes for build and runtime issues
2022-08-19 08:12:04 -05:00
Stefan Eissing
6cb0caa0a0
Adding disabledCurves as a member of WOLFSSL in the OPENSSL_EXTRA case.
...
- inheriting from WOLFSSL_CTX on creation
- enabling on WOLFSSL only when wolfSSL_set1_curves_list() is called
2022-08-19 11:03:23 +02:00
Stefan Eissing
7a5170b6e1
Improved EarlyData Indicator reply fix based on PR #5486
...
- PR #5486 had test failures in tls13.test and quit unit.test
- the extension was no longer added in SessionTicket messages
- added extra parameter to clarify how the TLSX is used
2022-08-19 10:07:06 +02:00
Stefan Eissing
a66516d3a5
Extending quic resumption tests.
2022-08-19 09:02:28 +02:00
Satoshi Yamaguchi
61c7003520
Fix whitespace
2022-08-19 12:38:07 +09:00
Sean Parkinson
4b8cd6c62b
wolfSSL_state_string_long - update for TLS 1.3 and DTLS 1.3
2022-08-19 09:41:01 +10:00
Juliusz Sosinowicz
06022e85a3
Fix avoidSysCalls logic
2022-08-18 19:43:40 +02:00
Daniel Pouzzner
969ad96dee
examples/{client,server}/{client,server}.c: remove spurious commas in --pqc help strings, and mollify clang-tidy bugprone-suspicious-missing-comma re --force-curve help strings. ( #5480 )
2022-08-18 13:32:58 -04:00
Juliusz Sosinowicz
4d0ea62857
Refactor ticket size to not accidentally go over WOLFSSL_TICKET_ENC_SZ
...
- Optimize memory usage. Write directly to ssl->session->ticket in CreateTicket() and use a hash to make sure the InternalTicket was encrypted.
- DoClientTicket does not fatally error out anymore. Errors in the ticket result in the ticket being rejected instead.
2022-08-18 19:08:43 +02:00
Stefan Eissing
6316e26bdc
Adding the forgotten wolfSSL_CTX_free() at the end of the new test_quic_key_share case.
2022-08-18 10:24:18 +02:00
Chris Conlon
e830a0f613
Merge pull request #5434 from satoshiyamaguchi/trial4
2022-08-17 17:04:36 -06:00
Peter Torelli
aa812c8aa9
Added support for P384 pre-share in server ( #5442 )
...
Added support for new server `--force-curve` option.
2022-08-17 15:30:48 -07:00
Chris Conlon
91a49da4b8
Merge pull request #5468 from SparkiDev/wolfssl_clear
2022-08-17 15:51:25 -06:00
Hideki Miyazaki
d494894268
Add to parse RSA ES OAEP Oid
2022-08-18 06:43:31 +09:00
David Garske
91d1bbbd44
Merge pull request #5477 from douzzer/20220817-make-quic-optional
...
20220817-make-quic-optional
2022-08-17 14:34:12 -07:00
Daniel Pouzzner
5b260ac52e
configure.ac: remove enable-quic from enable-all feature set;
...
remove ENABLED_QUIC="yes" from "$ENABLED_CURL" = "yes" setup section;
add ENABLED_CURVE25519=yes if $ENABLED_QUIC = yes;
tests/unit.c: move QuicTest() and SrpTest() before SuiteTest().
2022-08-17 14:25:38 -05:00
Juliusz Sosinowicz
68f71d0d96
Remove WOLFSSL_SESSION_TYPE_REF buffers from WOLFSSL_SESSION
2022-08-17 19:29:07 +02:00
Daniel Pouzzner
be378a346e
Merge pull request #5475 from dgarske/rsa_pss_async
...
Fixes for RSA PSS with `--enable-asynccrypt` in `ConfirmSignature`
2022-08-17 12:04:05 -05:00
David Garske
b9c9ad0339
Fixes for RSA PSS with --enable-asynccrypt in ConfirmSignature.
2022-08-17 08:20:06 -07:00
Stefan Eissing
3918a2e29a
Renaming the named_curve parameter to curve_id to avoid shadowing.
2022-08-17 17:01:18 +02:00
Juliusz Sosinowicz
008e947fec
Match OpenSSL self signed error return.
...
OpenSSL compat expects ASN_SELF_SIGNED_E when a self signed cert can't be verified. This is useful when translating the error with GetX509Error into a X509_V_ERR_* error.
2022-08-17 12:40:16 +02:00
Stefan Eissing
d6548b6b88
Small refactoring of named group handling for readability and de-duplicating of code.
...
- add wolfSSL_CTX_curve_is_disabled() and wolfSSL_curve_is_disabled()
to have common checks on wether a curve has been disabled by user
- add macros returning 0 for above function when OPENSSL_EXTRA is not
defined, enabling use without #fidef check
- add macros for checking if named groups are in a certain range
WOLFSSL_NAMED_GROUP_IS_FFHDE()
WOLFSSL_NAMED_GROUP_IS_PQC()
Fixed QuicTransportParam_free() use without case when compiling
with c++.
2022-08-17 11:46:48 +02:00
Satoshi Yamaguchi
f5a257c383
Add WOLFSSL_LEAVE to wolfSSL_PEM_read_RSA_PUBKEY and wolfSSL_PEM_read_PUBKEY
2022-08-17 14:23:50 +09:00
Sean Parkinson
7435402c30
Fixes to better handle re-use of a WOLFSSL object via wolfSSL_clear.
2022-08-16 15:44:05 -07:00
David Garske
3f7d56d957
Merge pull request #5471 from icing/quic-mem-leak
...
Fix memory leak in QUIC transport parameters extension
2022-08-16 13:22:20 -07:00
John Safranek
be2a6cbeb9
Merge pull request #5420 from Uriah-wolfSSL/ms_abi
...
Ms abi
2022-08-16 09:21:14 -07:00
Stefan Eissing
3434210b13
Fix memory leak in QUIC transport parameters extension
2022-08-16 18:13:25 +02:00
Satoshi Yamaguchi
091fc71c74
Fix EVP_PKEY not freed and FILE pointer not closed
2022-08-17 01:03:09 +09:00
Satoshi Yamaguchi
e1b3f14d35
Fix FILE pointer not closed in tests/api.c
2022-08-17 00:11:29 +09:00
Satoshi Yamaguchi
524f9ebd32
Add argument check and error message to wolfSSL_PEM_read_RSA_PUBKEY
2022-08-16 17:35:51 +09:00
David Garske
55eb460d1a
Merge pull request #5403 from SparkiDev/ecc_import_priv_order
...
ECC import priv: validate priv is less than order
2022-08-15 21:36:46 -07:00
David Garske
a954cf82e3
Merge pull request #5469 from anhu/init_CertName
...
Initialize the Enc memberss of CertName struct.
2022-08-15 20:42:26 -07:00
Sean Parkinson
8aa2bde3c2
Merge pull request #5470 from kaleb-himes/openssl3_0_testing
...
Allow for renegotiation testing with openssl 3.0 installed on jenkins…
2022-08-16 11:02:22 +10:00
kaleb-himes
1dd318741d
Allow for renegotiation testing with openssl 3.0 installed on jenkins slaves (also tested with openssl 1.1)
2022-08-15 16:33:06 -06:00
Anthony Hu
52ed047a44
Fix a mismatched decl and impl
2022-08-15 12:13:05 -04:00
Sean Parkinson
23a01b3276
SP: CT from_mp when sp_digit bits equal mp_digit bits.
...
Made constant time copy of values from an mp_int int array of sp_digit.
Stops OOB writes when mp_int is bigger than it should be.
2022-08-15 09:02:24 -07:00
Anthony Hu
5e7cff71fd
Initialize the Enc memberss of CertName struct.
...
Tested by reproducing the problem in an example and confirming fix makes problem
go away.
2022-08-15 11:43:33 -04:00
David Garske
e56a2355ca
Merge pull request #5464 from julek-wolfssl/zd14644
...
Translate the verify callback error to an X509_V_ERR_* value when OPENSSL_COMPATIBLE_DEFAULTS is defined
2022-08-15 06:30:36 -07:00
Uriah Pollock
7e00b32c71
Corrected line spacing incorrect arg passings.
2022-08-14 20:16:42 -05:00
David Garske
28f22859bb
Merge pull request #5451 from embhorn/zd14428
...
Fix TSIP ret value in TLSX_KeyShare_ProcessEcc
2022-08-14 11:27:20 -07:00
David Garske
dfb3616d50
Merge pull request #5465 from douzzer/20220812-fixes
...
20220812-fixes
2022-08-14 08:03:40 -07:00
Satoshi Yamaguchi
fba534dce0
Add wolfSSL_PEM_read_RSA_PUBKEY to OpenSSL compatible API
2022-08-14 16:08:22 +09:00
Derzsi Dániel
f515916f68
Add liboqs integration to CMake build system ( #5407 )
...
* Add liboqs integration to CMake build system
* Rephrase WOLFSSL_OQS option
* Add new FindOQS.cmake file to cmake/include.am
Co-authored-by: Disyer <denialmc1@gmail.com >
2022-08-12 16:23:24 -04:00
Daniel Pouzzner
e382905311
CMakeLists.txt: synchronize CMAKE_C_FLAGS with diagnostic flags set in autotools-generated Makefile (-Wall -Wextra -Wno-unused -Werror), and fix WOLFSSL_RSA_PSS to add -DWOLFSSL_PSS_LONG_SALT as needed by changes to test_wolfSSL_CertRsaPss() in fb531dacc2 (gating of those changes is also added in this commit).
2022-08-12 15:18:41 -05:00
Daniel Pouzzner
b4f1b6d04d
fix whitespace and C++-style comments.
2022-08-12 15:18:27 -05:00
David Garske
60437bba6e
Merge pull request #5378 from anhu/dilithium
...
Initial commit to add Dilithium NIST PQC winner.
2022-08-12 09:29:42 -07:00
Anthony Hu
0d78bd2127
Merge pull request #5459 from dgarske/docs
...
Improve documentation for CMAC
2022-08-12 10:37:07 -04:00
Juliusz Sosinowicz
551acd2b19
Translate verify callback error with compat layer
2022-08-12 16:27:31 +02:00
Juliusz Sosinowicz
126a570a37
Add HAVE_WOLFSSL_MSG_EX define when WOLFSSL_MSG_EX is available
2022-08-12 16:27:31 +02:00
David Garske
90c65bd50b
Merge pull request #5458 from icing/quic-earlydata
...
QUIC fixes for handling of early data
2022-08-11 17:52:29 -07:00
Chris Conlon
c66a21c40a
Add Zephyr support for nRF5340 with CryptoCell-312, PSA Crypto fixes ( #5418 )
...
* PSA: set AES key bits, define PSA_ALG_NONE/PSA_KEY_ID_NULL if needed
* Zephyr: add TimeNowInMilliseconds() for tls13.c, clock_settime() for test.c, update CMakeLists.txt
* Skip including unistd.h for Zephyr in benchmark.c
* Zephyr: update README, add nRF5340dk support to wolfssl_test sample app
* Zephyr: add wolfCrypt benchmark sample app
* Zephyr: add nRF5340 support to tls_thread sample app
* PSA: use specific hash algo with psa_sign/verify_hash()
* Zephyr: add support for PSA Crypto API with PK callbacks to wolfssl_tls_threaded sample app
* Zephyr: add new files to zephyr/include.am
2022-08-11 17:42:05 -07:00
David Garske
3f4b3605a6
Merge pull request #5460 from douzzer/20220811-quic-fixes-and-OLD-TLS-gating
...
20220811-quic-fixes-and-OLD-TLS-gating
2022-08-11 17:36:06 -07:00
Sean Parkinson
d4646696ed
Merge pull request #5448 from julek-wolfssl/ext-msg-check
...
Validate that extensions appear in correct messages
2022-08-12 08:39:42 +10:00
Sean Parkinson
2b38ba0300
Merge pull request #5455 from dgarske/zd14420
...
Fix for handling `WC_PENDING_E` from decrypt session ticket callback
2022-08-12 08:20:57 +10:00
Daniel Pouzzner
017c4e7a41
fix gating and unused-variable warnings in src/quic.c wolfSSL_quic_aead_is_{gcm,ccm,chacha20}();
...
fix TLS version gating in tests/quic.c;
fix gating in src/ssl.c for wolfSSLv2_client_method() and wolfSSLv2_server_method();
reorganize prototypes in wolfssl/ssl.h for wolf*_method*() to group systematically by protocol version and gate correctly on support for that version in the build.
2022-08-11 14:58:59 -05:00
David Garske
5445b183ed
Adding CMAC documentation. Fixes ZD14601.
2022-08-11 12:00:19 -07:00
Stefan Eissing
b3de591c6f
Rename of buffer to tmpbuffer to avoid collision with customer setup test.
2022-08-11 20:06:46 +02:00
David Garske
499b9c4f35
Merge pull request #5456 from SparkiDev/ssl_set1_curve_fix
...
wolfSSL_CTX_set1_curves_list: X25519 and X448 defines
2022-08-11 09:19:25 -07:00
Stefan Eissing
53fd4b37f2
QUIC fixes for handling of early data
...
- new internal field for keeping early data enabled status,
as QUIC does not call SSL_write_early_data() itself.
- using read_/write_early_data() methods in QUIC handshake
when early data is enabled. This triggers the internals
that emit the proper early data indication handlings.
2022-08-11 18:08:37 +02:00
David Garske
fef84e2c4c
Fixes for asn_public.h documentation. Fix spelling error.
2022-08-11 08:58:32 -07:00
Anthony Hu
82a900b438
Initial commit to add Dilithium NIST PQC winner.
...
Also:
* added HAVE_FALCON guards as needed.
* corrected minor falcon bugs as I found them.
* handling OID sum collision between DILITHIUM_LEVEL5 and DILITHIUM_AES_LEVEL3
Tested with the following commands:
examples/server/server -v 4 -l TLS_AES_256_GCM_SHA384 \
-c ~/tmp/dilithium_aes_level5_entity_cert.pem \
-k ~/tmp/dilithium_aes_level5_entity_key.pem \
-A ~/tmp/dilithium_aes_level5_root_cert.pem --pqc P521_KYBER_LEVEL5
examples/client/client -v 4 -l TLS_AES_256_GCM_SHA384 \
-c ~/tmp/dilithium_aes_level5_entity_cert.pem \
-k ~/tmp/dilithium_aes_level5_entity_key.pem \
-A ~/tmp/dilithium_aes_level5_root_cert.pem --pqc P521_KYBER_LEVEL5
with permutations of SHAKE,AES variants and levels 2,3,5
2022-08-11 11:38:31 -04:00
David Garske
5e6c45a6fb
Merge pull request #5397 from SparkiDev/cert_rsa_pss
...
Certs with RSA-PSS sig
2022-08-11 08:19:12 -07:00
David Garske
66644c2e31
Merge pull request #5457 from kaleb-himes/openssl-test-stuck-fix
...
Fix a very frequent stuck scenario with the openssl.test script
2022-08-11 07:43:23 -07:00
kaleb-himes
8efc8b0819
Fix up other test scripts using the same logic
2022-08-11 06:26:43 -06:00
Juliusz Sosinowicz
a317126509
Validate that extensions appear in correct messages
2022-08-11 10:53:10 +02:00
Sean Parkinson
dd2a6410d1
Merge pull request #5454 from dgarske/docs_hashtype
...
Improve the documentation for HMAC hash types
2022-08-11 16:50:55 +10:00
David Garske
87d96c9c96
Merge pull request #5452 from icing/quic-resume
...
QUIC session resumption and early data handshake handling.
2022-08-10 22:33:13 -07:00
David Garske
995100eed1
Fix for handling WC_PENDING_E from decrypt session ticket callback. ZD14420
2022-08-10 22:20:49 -07:00
David Garske
9ec61d4ce4
Merge pull request #5449 from douzzer/20220809-quic-fixes
...
20220809-quic-fixes
2022-08-10 21:56:45 -07:00
Sean Parkinson
4d8a713783
wolfSSL_CTX_set1_curves_list: X25519 and X448 defines
...
Support wolfSSL_CTX_set1_curves_list being available when X25519 and/or
X448 only defined.
Don't recognize X25519 or X448 if corresponding define is not set.
Enable test in api.c.
2022-08-11 14:13:04 +10:00
Sean Parkinson
fb531dacc2
Certs with RSA-PSS sig
...
Add support for parsing and verifying certificates with RSA-PSS
signatures. Including check PSS parameters in key with those in
signature algorithm.
Add support for parsing private RSA PSS key.
Add support for parsing public RSA PSS key.
2022-08-11 09:43:01 +10:00
kaleb-himes
a0e1c2567e
Fix a very frequent stuck scenario with the openssl.test script
2022-08-10 17:41:54 -06:00
Uriah Pollock
5ef47cc86f
Addressed code review.
2022-08-10 17:18:38 -05:00
Daniel Pouzzner
8197f958a9
address peer review on PR #5449 .
2022-08-10 13:33:57 -05:00
Daniel Pouzzner
f771181e1a
fixes for issues introduced in #5384 :
...
added numerous missing _SMALL_STACK code paths (PK objects on the stack);
in settings.h, enable WOLFSSL_SMALL_STACK_STATIC by default when WOLFSSL_SMALL_STACK is defined (NO_WOLFSSL_SMALL_STACK_STATIC to override);
fixes for unsafe strcat()s in tests/quic.c;
fix for unsafe macro WOLFSSL_IS_QUIC();
fix to exclude quic from enable-all when enable-linuxkm (quic needs opensslextra, and opensslextra currently only works in-kernel in cryptonly builds);
fix for signed/unsigned clash in wolfSSL_quic_receive().
2022-08-10 13:33:56 -05:00
David Garske
c707186b9f
Improve the documentation for HMAC hash types.
2022-08-10 09:23:01 -07:00
JacobBarthelmeh
b46693f8c8
Merge pull request #5445 from douzzer/20220808-fixes
...
20220808-fixes (unchecked snprintf() retvals)
2022-08-10 10:21:07 -06:00
Stefan Eissing
ea04ffc99f
QUIC session resumption and early data handshake handling.
...
In test with ngtcp2 example client using openssl, session resumption
against a QUIC wolfssl server failed. The error was tracked down to
wolfSSL believing EaryData needs to be handled and returning SUCCESS
from wolfSSL_SSL_do_handshake() after the server Finished had been
sent.
However the handshake was not complete and ngtcp2 invoked the
post_handshake processing for new data arriving from the client.
This failed a check in post processing that the ssl->handShakeState
actually was HANDSHAKE_DONE.
The workaround in this PR repeats do_handshake until the ssl
state acually says it is complete. This way, session resumption works.
Either this alternative do_handshake() is merged for QUIC protocol
hanlders. Or we need to fix the 'normal' do_handshake() to no return
SUCCESS when early data is expected on a QUIC WOLFSSL.
2022-08-10 15:17:30 +02:00
Eric Blankenhorn
bcb9f3f70d
Fix TSIP ret value in TLSX_KeyShare_ProcessEcc
2022-08-10 08:15:24 -05:00
Daniel Pouzzner
c07d0fe4b4
address peer review:
...
use camel case not underscores in variable names;
restore use of const int variables for buffer sizes in several spots (for ease of smallstack code paths should they be needed);
use more MISRAish flow control in X509PrintSignature().
also, capture the retval from several more snprintf()s to pass directly to wolfSSL_BIO_write(), avoiding frivolous strlen()s.
2022-08-09 23:23:11 -05:00
David Garske
eceee6ac95
Merge pull request #5444 from anhu/PQ_get_curve_name
...
Bugfix: wolfSSL_get_curve_name() will now print post-quantum group names.
2022-08-09 16:53:55 -07:00
Anthony Hu
57dc263d05
Make clang happy.
2022-08-09 14:35:59 -04:00
David Garske
fa97923005
Merge pull request #5384 from icing/quic
...
QUIC support for wolfSSL
2022-08-09 10:13:29 -07:00
Uriah Pollock
5049b16325
Param correction.
2022-08-08 19:43:54 -05:00
Daniel Pouzzner
371fbc698c
src/x509.c: mollify bugprone-unused-return-value warnings around XSNPRINTF();
...
fix various possible buffer overruns;
fix various runtime-error-driven memory leaks;
various refactors for efficiency, clarity, and safety, including refactors to eliminate unsafe XSTRNCAT() calls.
2022-08-08 18:55:38 -05:00
Uriah Pollock
f8c9393235
Added ABI tags for certs, wc_CertNew(), wc_CertFree()
...
wc_CertNew() and wc_CertFree() is for use by ABI type aplications, and
others, for having wolfCrypt perform the new/free of the certification
structure w/o the application needing too, and more importantly, needing
to contain knowledge of the structure.
2022-08-08 18:12:06 -05:00
Anthony Hu
ae0faa40cf
Bugfix: wolfSSL_get_curve_name() will now print post-quantum group names.
2022-08-08 17:51:45 -04:00
Chris Conlon
e3310984b6
Merge pull request #5443 from TakayukiMatsuo/doalert
2022-08-08 15:22:18 -06:00
Chris Conlon
039bf721c4
Merge pull request #5440 from miyazakh/sce_compile_failure
2022-08-08 10:36:15 -06:00
Uriah Pollock
b0aaf4a23d
Minor ABI updates.
2022-08-08 10:16:05 -05:00
Uriah Pollock
c9c19c82b3
Added next set of ABI for ECC APIs
2022-08-08 09:08:24 -05:00
Uriah Pollock
65d402d8d7
Revert "Revert "Removed duplicate WOLFSSL_ABI tag.""
...
This reverts commit e5c51b2638a374aa987c30be8598a78e3f370c7a.
2022-08-08 09:08:24 -05:00
Uriah Pollock
d283510aa9
Revert "Removed duplicate WOLFSSL_ABI tag."
...
This reverts commit d17021bc4e8e3f12b0c0406f7fe400ed4c0bc2cd.
2022-08-08 09:08:23 -05:00
Uriah Pollock
f2677c29ec
Removed duplicate WOLFSSL_ABI tag.
2022-08-08 09:08:23 -05:00
Uriah Pollock
cc8fb1f978
git push origin ms_abi
2022-08-08 09:08:23 -05:00
Uriah Pollock
b200d65a6a
Added new ABI reference hooks. This is round two, more to come.
2022-08-08 09:08:23 -05:00
Uriah Pollock
46f423b8b9
Added ABI macros for managing interface changes
2022-08-08 09:08:23 -05:00
Stefan Eissing
4431438fb2
add QUIC support.
2022-08-08 13:24:00 +02:00
David Garske
7004157869
Merge pull request #5387 from TakayukiMatsuo/tk14445
...
Suppress build errors when defining some disable macros
2022-08-07 20:09:41 -07:00
TakayukiMatsuo
9fd56c9c5c
Changes in response to other PRs
2022-08-08 02:10:14 +09:00
TakayukiMatsuo
79fb1783c4
Suppress build errors when defining some disable macros
2022-08-07 17:11:22 +09:00
David Garske
2d2c55f1c1
Merge pull request #5431 from haydenroche5/wolfssl_error
...
Expand error queue usage with new macro WOLFSSL_ERROR_VERBOSE.
2022-08-05 15:14:44 -07:00
David Garske
96fcc129ec
Merge pull request #5213 from JacobBarthelmeh/req
...
expand functions included in opensslextra and add REQ print out
2022-08-05 13:20:21 -07:00
Kareem
2288082d9a
Make wolfSSL quiet_shutdown functions available when using OPENSSL_EXTRA_X509_SMALL.
2022-08-05 11:51:34 -07:00
Hayden Roche
3bf21b5a05
Expand error queue usage with new macro WOLFSSL_ERROR_VERBOSE.
...
We have users who need to debug errors coming out of libwolfssl in production,
where --enable-debug isn't an option. Our error queue implementation is the
solution, but our usage of WOLFSSL_ERROR isn't consistent. This commit greatly
expands our usage of WOLFSSL_ERROR. There are too many error cases to tackle
all at once, and not all error cases are particularly meaningful or likely to be
hit in regular operation of the library. I've tried to focus on errors that
users are likely to hit, and I've chosen to ignore things like the mountain of
BUFFER_E and BAD_FUNC_ARG cases (for the most part). I've also tried to expand
WOLFSSL_ERROR usage in files where we haven't been using it historically
(e.g. aes.c), so the pattern is now there for other developers to follow. In
order to prevent these additions from exploding the size of libwolfssl, they're
all behind a new macro, WOLFSSL_ERROR_VERBOSE. If WOLFSSL_VERBOSE_ERRORS is
defined, WOLFSSL_ERROR_VERBOSE just maps to WOLFSSL_ERROR.
2022-08-05 10:32:18 -07:00
JacobBarthelmeh
d6c895d19d
use or with all/extra macro guard
2022-08-05 09:31:42 -07:00
JacobBarthelmeh
83f1ade1fc
use extension free function with opensslextra and remove debug printf
2022-08-05 09:15:35 -07:00
Satoshi Yamaguchi
cedfe9938a
Fix the comment about the argument of wolfSSL_PEM_read_RSAPrivateKey.
2022-08-06 00:15:49 +09:00
Satoshi Yamaguchi
4f181576ef
Fix the position of wolfSSL_PEM_read_RSAPrivateKey definition in pem.h
2022-08-06 00:14:30 +09:00
Juliusz Sosinowicz
192f081833
Merge pull request #5439 from SparkiDev/tls13_ext_msgs
2022-08-05 10:49:13 +02:00
Hideki Miyazaki
f30b3f1163
fix compile error
2022-08-05 16:00:09 +09:00
Sean Parkinson
c35b47f265
TLS !.3: restrict extension validity by message
...
Extensions ServerName, SupportedGroups and ALPN must not appear in
server_hello.
Removed server_hello from the valid checks.
2022-08-05 08:26:09 +10:00
Sean Parkinson
56be09005f
Merge pull request #5427 from julek-wolfssl/dtls-timeout-and-closed-socket
...
DTLS socket and timeout fixes
2022-08-05 08:13:14 +10:00
JacobBarthelmeh
ff512a34c6
adjust temporary buffer size and memory free'ing
2022-08-04 15:11:24 -07:00
David Garske
7465691c70
Merge pull request #5437 from douzzer/20220804-fixes
...
20220804 fixes
2022-08-04 13:55:03 -07:00
Daniel Pouzzner
9d5e633a96
wolfcrypt/src/pkcs12.c: add WOLFSSL_SMALL_STACK path in freeDecCertList().
2022-08-04 11:16:47 -05:00
Daniel Pouzzner
d7e33b3293
wolfcrypt/src/asn.c: fix null pointer deref in SetReqAttribSingle() (clang-analyzer-core.NonNullParamChecker).
2022-08-04 11:12:09 -05:00
David Garske
99dad91344
Merge pull request #5435 from douzzer/20220803-gcc-12-ASAN
...
20220803-gcc-12-ASAN
2022-08-04 08:41:26 -07:00
Juliusz Sosinowicz
6d4f0146ca
Refactor sending alert on decryption failure
...
Take sending of the alert outside of DecryptTls() and DecryptTls13(). The alert is now sent in ProcessReplyEx().
2022-08-04 12:06:26 +02:00
Juliusz Sosinowicz
ebcfa31993
Refactor checking socket type into a function
2022-08-04 11:35:27 +02:00
Juliusz Sosinowicz
3278210e1c
Silently discard DTLS msgs that fail decryption
...
Don't send alerts when decryption fails inside a DTLS connection.
TLS should always send a bad_record_mac when decryption fails.
2022-08-04 11:27:45 +02:00
Juliusz Sosinowicz
fd1e8c49eb
Reset timeout when reading a valid DTLS message
...
- Increment the DTLS 1.3 timeout on a long timeout
2022-08-04 11:27:45 +02:00
Juliusz Sosinowicz
67d518544b
EmbedReceiveFrom: fix when using a TCP socket
...
- recvfrom() returns 0 on a closed TCP socket
- TCP sockets set WOLFSSL_CBIO_ERR_ISR on a timeout
2022-08-04 11:27:45 +02:00
Sean Parkinson
9ea3e173d0
Merge pull request #5277 from JacobBarthelmeh/req_attr
...
expand subject name and req attribute support
2022-08-04 14:32:14 +10:00
David Garske
2c2a7750a4
Merge pull request #5414 from darktohka/feature/chacha20-poly1305-evp
...
Integrate chacha20-poly1305 into the EVP interface
2022-08-03 18:21:17 -07:00
Sean Parkinson
1dc848d8e3
Merge pull request #5429 from dgarske/sniffer_async2
...
Fix for sniffer to ensure the session was polled before trying to reprocess it
2022-08-04 08:18:55 +10:00
Sean Parkinson
e32cfb79e5
Merge pull request #5419 from dgarske/aurix
...
Support for Infineon AURIX IDE and minor compiler warnings.
2022-08-04 08:01:57 +10:00
David Garske
3f07900c1b
Merge pull request #5432 from embhorn/zd14172
...
Fix dead code warnings and build error
2022-08-03 15:01:20 -07:00
David Garske
791250c6c0
Merge pull request #5428 from TakayukiMatsuo/rx65n_fix
...
Fix build error and update manuals for Renesas RX boards
2022-08-03 11:04:25 -07:00
Daniel Pouzzner
6e8417e631
wolfssl/wolfcrypt/blake2-int.h: remove alignment specs on __blake2s_state and __blake2b_state, as they are unneeded, and are not honored by gcc-12+ in stack allocations, leading to (true positive) misaligned-access errors from ASAN.
2022-08-03 12:30:45 -05:00
Daniel Pouzzner
a7f0c92c0d
src/internal.c: in GetCipherKeaStr(), when gcc-12 or higher and __SANITIZE_ADDRESS__, wrap in a pragma to ignore -Wstringop-overread, due to false positives.
2022-08-03 12:30:29 -05:00
David Garske
664fe390d6
Merge pull request #5382 from icing/announce-pskkem-plain
...
Announce TLSX_PSK_KEY_EXCHANGE_MODES in non-resuming ClientHello
2022-08-03 07:40:24 -07:00
David Garske
0c1add08e3
Merge pull request #5416 from darktohka/feature/chacha20-outl-bytes
...
Ensure ChaCha20 updates out length during cipher update
2022-08-03 07:26:02 -07:00
David Garske
4937557ddc
Merge pull request #5422 from julek-wolfssl/dtls-async-fix
...
Fix dtls + async multi-test misc errors
2022-08-03 07:24:58 -07:00
Eric Blankenhorn
ecdccb6180
Fix build error with WOLFSSL_AES_DIRECT
2022-08-03 09:09:28 -05:00
Eric Blankenhorn
f713c75a73
Fix dead code warnings in evpCipherBlock and wc_CryptKey
2022-08-03 08:08:00 -05:00
David Garske
53e0483e47
Support for Infineon AURIX IDE. Fixes for Aurix compiler warnings.
2022-08-02 16:53:47 -07:00
Juliusz Sosinowicz
72b0f15075
Merge pull request #5424 from anhu/curl_ftps_fix
2022-08-02 23:22:11 +02:00
David Garske
9d2ed67a5c
Fix for sniffer to ensure the session was polled before trying to reprocess it.
2022-08-02 08:11:21 -07:00
Satoshi Yamaguchi
013ad0d564
Add wolfSSL_PEM_read_RSAPrivateKey to OpenSSL compatible API
2022-08-03 00:02:40 +09:00
Anthony Hu
fd412ed298
Fix so curl can do FTPS on TLS 1.3 with session resumption.
2022-08-02 10:51:14 -04:00
TakayukiMatsuo
3c51d872ea
Fix build error and update manuals
2022-08-02 16:45:37 +09:00
Sean Parkinson
9db4ae64b9
Merge pull request #5423 from douzzer/20220729-fixes
...
20220729-fixes
2022-08-02 08:03:53 +10:00
JacobBarthelmeh
99ed727179
add WOLFSSL_CERT_NAME_ALL macro guard and new values to set subject
2022-08-01 10:52:09 -07:00
Jacob Barthelmeh
52b80ea52a
expand functions included in opensslextra and add REQ print out
2022-08-01 09:21:43 -07:00
David Garske
4602e6d892
Merge pull request #5426 from rizlik/epoch_bits_fix
...
fix: dtls13: use correct buffer index to get epoch bits
2022-08-01 07:41:44 -07:00
Marco Oliverio
8878922f95
fix: dtls13: use correct buffer index to get epoch bits
...
Fixes: d079662765
2022-08-01 14:24:20 +02:00
Daniel Pouzzner
791508220f
wolfssl/internal.h: fix spurious assert failure on jumbo RSA key configurations (> 8192 bits); mollify bugprone-macro-parentheses.
2022-07-29 09:33:14 -05:00
Juliusz Sosinowicz
fb2feee9b6
Fix dtls + async multi-test misc errors
...
DTLS uses DtlsMsgStore() to process messages when using async crypto. A check was skipping the storing straight to DtlsMsgDrain().
2022-07-29 15:49:49 +02:00
Stefan Eissing
a943de7969
Changes after PR review.
...
- removed additions to REAME.md
- changed coding style of conditional PSKKEM announce
as requested.
2022-07-29 11:26:08 +02:00
Stefan Eissing
1db8013566
Update README with note about change in TLSX_PSK_KEY_EXCHANGE_MODES use.
2022-07-29 11:18:56 +02:00
Stefan Eissing
c8008e29b9
Announce TLSX_PSK_KEY_EXCHANGE_MODES in non-resuming ClientHello.
...
- can be reverted to previous style by defining NO_TLSX_PSKKEM_PLAIN_ANNOUNCE
- QUIC interop testing reveals that at least QUIC stacks refrain from
issuing session tickets unless the ClientHello shows this extension.
2022-07-29 11:18:56 +02:00
David Garske
da422eb422
Merge pull request #5406 from SparkiDev/mp_int_size
...
Maths bit size: ensure size is right
2022-07-28 15:36:58 -07:00
David Garske
d568e8c893
Merge pull request #5413 from SparkiDev/x509_san_crit
...
ASN template: allow SAN to be critical
2022-07-28 15:14:23 -07:00
David Garske
ac85000a02
Merge pull request #5415 from douzzer/20220728-fixes
...
20220728-fixes
2022-07-28 12:48:40 -07:00
David Garske
fde2097503
Merge pull request #5405 from SparkiDev/clang-x86
...
TFM: change inline x86 asm code to compile with clang
2022-07-28 08:42:17 -07:00
Disyer
e599bb5048
Mark chacha20-poly1305 as an AEAD cipher
2022-07-28 18:36:52 +03:00
Disyer
e3dd7677c8
Add tests for chacha20-poly1305 EVP integration
2022-07-28 18:21:12 +03:00
Disyer
e8febaf414
Ensure ChaCha20 updates out length during cipher update
2022-07-28 18:06:41 +03:00
Daniel Pouzzner
545ba58cc0
sp_int.c sp_div(): add missing (err == MP_OKAY) clause to fix null ptr deref.
2022-07-28 09:28:36 -05:00
Daniel Pouzzner
3ac04fa3ee
wolfcrypt/benchmark/benchmark.c: fix gating for #include <unistd.h>.
2022-07-28 09:28:36 -05:00
Disyer
52cc73a6a4
Integrate chacha20-poly1305 into the EVP interface
2022-07-28 13:01:35 +03:00
Sean Parkinson
70c38f2183
Cert: SAN extension critical
...
Add field to Cert to indicate SAN extension is critical.
Handle the field being set when encoding.
2022-07-28 14:16:56 +10:00
David Garske
824d44b705
Merge pull request #5412 from douzzer/20220726-multi-test-fixes
...
20220726-multi-test-fixes
2022-07-27 20:44:46 -07:00
David Garske
7b65a1f1c2
Merge pull request #5411 from anhu/selfsigned_template
...
Fix ASN template to use the subject as issuer if cert is selfsigned
2022-07-27 16:02:14 -07:00
David Garske
6ecf2c0a5e
Merge pull request #5399 from SparkiDev/sp_exptmod_reduce
...
SP int: exptmod ensure base is less than modulus
2022-07-27 15:43:16 -07:00
Anthony Hu
58cc326621
Calcuate ---> Calculate
2022-07-27 16:56:45 -04:00
Anthony Hu
33579045f2
Fix ASN template code to use the subject as issuer if cert is selfsigned.
2022-07-27 16:38:17 -04:00
Daniel Pouzzner
9256d6aa7c
src/internal.c: fixes for redundant assignments and preprocessor typo.
2022-07-27 14:42:00 -05:00
Daniel Pouzzner
c63e22701f
src/pk.c: fix type mismatch in return value.
2022-07-27 14:42:00 -05:00
Daniel Pouzzner
ed449d5b20
wolfsentry integration: avoid redundant and frivolous dispatches (ssl.c wolfSSL_connect(), wolfSSL_negotiate(), wolfSSL_accept(); tls13.c wolfSSL_connect_TLSv13(), wolfSSL_accept_TLSv13()).
2022-07-27 14:42:00 -05:00
Daniel Pouzzner
feb911c612
Merge pull request #5398 from dgarske/make_dist_small
...
Script to produce a small source/header only package
2022-07-27 14:33:59 -05:00
David Garske
a56d25d58e
Merge pull request #5408 from julek-wolfssl/FreeAsyncCtx-location
...
FreeAsyncCtx should only be called when advancing state
2022-07-27 09:59:28 -07:00
David Garske
0f0b7c553c
Keep .i files needed for fast math. Use test_paths.h from .in to remove user path info.
2022-07-27 08:33:27 -07:00
David Garske
6f282c2c57
Merge pull request #5402 from rizlik/dke_rsa
...
doClientKeyExchange improvements
2022-07-27 08:01:16 -07:00
Juliusz Sosinowicz
e9b3b5936f
FreeAsyncCtx should only be called when advancing state
...
The call to FreeAsyncCtx after SendBuffered was added to clean up state when we are ready to advance state. If we do not advance state, then clean up should be handled in the relevant state.
2022-07-27 14:14:22 +02:00
Sean Parkinson
460845ba49
Maths bit size: ensure size is right
...
Ensure WOLFSSL_MAX_RSA_BITS works.
Fix SP math size defines.
Regression testing maths implementations.
2022-07-27 18:58:30 +10:00
Sean Parkinson
788348dce2
TFM: change inline x86 asm code to compile with clang
2022-07-27 14:05:37 +10:00
Sean Parkinson
01aad13c38
Rework
2022-07-27 12:02:15 +10:00
JacobBarthelmeh
f31c8223f2
fix for not having default pkcs7 signed attributes
2022-07-26 16:45:44 -07:00
Sean Parkinson
9ac3c9ec05
ECC import priv: validate priv is less than order
...
Valid private key must be less than order.
Check on import when WOLFSSL_VALIDATE_ECC_IMPORT defined.
2022-07-27 09:29:07 +10:00
David Garske
9c480ece66
Fix to use the new outTmp.
2022-07-26 15:48:58 -07:00
Sean Parkinson
c2476e3858
SP int: exptmod ensure base is less than modulus
...
Ensure sp_div uses rem only when rem is big enough.
2022-07-27 08:48:28 +10:00
Hayden Roche
5f47adba3c
Merge pull request #5401 from dgarske/cmake_install_spmathall
2022-07-26 15:02:42 -07:00
Marco Oliverio
856ea2ffc8
internal.c: RsaDec improvements
2022-07-26 20:59:01 +02:00
Marco Oliverio
1727efbc2c
internal.c: rsa decription buffer handling
2022-07-26 20:59:01 +02:00
Marco Oliverio
2e1e8d2789
misc.c: introduce ctMaskCopy()
2022-07-26 20:59:01 +02:00
David Garske
344ad48f03
Fix for CMake not installing sp_int.h for SP math all.
2022-07-26 11:29:21 -07:00
David Garske
1003dfeefc
Merge pull request #5392 from JacobBarthelmeh/caam
...
more macro guards with CAAM builds
2022-07-26 09:41:21 -07:00
David Garske
9e213cab19
Fixes for the script (from Douzzer).
2022-07-26 08:50:27 -07:00
Chris Conlon
a5b1838d8f
Merge pull request #5393 from TakayukiMatsuo/leakfix
2022-07-26 09:44:19 -06:00
Chris Conlon
a05b38059e
Merge pull request #5385 from miyazakh/sce_jenkins_fail
2022-07-26 09:41:46 -06:00
David Garske
48016adf52
Script to produce a small source/header only package (with CMake support)
2022-07-25 17:08:13 -07:00
David Garske
a98642ba61
Merge pull request #5383 from julek-wolfssl/negating-ciphersuites
...
Expand SetCipherList()
2022-07-25 08:26:47 -07:00
David Garske
97970d87a5
Merge pull request #5350 from SparkiDev/sp_math_fixes_1
...
SP math
2022-07-25 08:18:55 -07:00
David Garske
7174e6766b
Merge pull request #5391 from embhorn/gh5366
...
Fix to copy TLS version with wolfSSL_write_dup
2022-07-25 07:56:14 -07:00
David Garske
cceb35abe2
Merge pull request #5394 from SparkiDev/pathlen_set_0
...
Cert path length: add flag to indicate path length set
2022-07-25 07:54:30 -07:00
David Garske
ec565250ed
Merge pull request #5395 from SparkiDev/encrypt_len_fix
...
ENCRYPT_LEN fix
2022-07-25 07:53:50 -07:00
TakayukiMatsuo
5a0afc512e
Fix memory leak in ECDHE with TSIP
2022-07-25 19:43:32 +09:00
Juliusz Sosinowicz
e7cd1562b4
Expand SetCipherList()
...
- support disabling ciphersuites starting from the default list
2022-07-25 11:14:16 +02:00
Sean Parkinson
8e20a5900c
ENCRYPT_LEN fix
...
Fix check for WOLFSSL_SP_MATH_ALL and WOLFSSL_SP_MATH instead of
WOLFSSL_SP_MATH twice.
2022-07-25 09:35:43 +10:00
Sean Parkinson
8fa2449a63
Cert path length: add flag to indicate path length set
...
A path length is allowed to be 0.
Can't check path len for 0 to determine when value is set.
Added flag to indicate path length is set.
2022-07-25 09:07:14 +10:00
Sean Parkinson
56bec875b4
Merge pull request #5390 from kareem-wolfssl/bnGenPrimeRsa
...
Update sp_rand_prime's preprocessor gating to match wolfSSL_BN_generate_prime_ex's.
2022-07-25 08:10:06 +10:00
JacobBarthelmeh
35d40f263e
more macro guards with CAAM builds
2022-07-22 16:19:55 -07:00
Eric Blankenhorn
4369873540
Fix to copy TLS version with wolfSSL_write_dup
2022-07-22 15:09:35 -05:00
Kareem
dc92ec2aa9
Update sp_rand_prime's preprocessor gating to match wolfSSL_BN_generate_prime_ex's.
2022-07-22 11:07:46 -07:00
Juliusz Sosinowicz
6f2889c07d
BIO_eof returns 1 when no more data remains in the BIO
2022-07-22 13:24:32 +02:00
Hideki Miyazaki
491ebb7a3d
fixed compile error due to degression
...
fixed memory leak in wc_SCE_EccVerify
2022-07-22 08:29:05 +09:00
Sean Parkinson
dc8b796d1d
Merge pull request #5347 from dgarske/async_sess_tick
...
Support for asynchronous session ticket callback
2022-07-22 08:04:48 +10:00
Daniel Pouzzner
02e512142c
Merge pull request #5359 from haydenroche5/unit_test_refactor
...
Begin refactor of api.c.
2022-07-21 15:52:40 -05:00
David Garske
281825db20
Merge pull request #5353 from rizlik/dtls13_async_fixes
...
Dtls13 async fixes
2022-07-21 13:24:35 -07:00
David Garske
69e2f5243c
Merge pull request #5326 from gojimmypi/ESP32_HW_Update_PR
...
Espressif ESP32 Hardware Acceleration Update and Cleanup
2022-07-21 12:09:09 -07:00
Marco Oliverio
163acb89af
dtls13: consider certificate_request processed on WC_PENDING_E
...
The error is due to the message triggered by the processing of the
message (Connect()->SendTls13Certificate/SendTls13CertificateVerify/SendTls13Verify). Consider
the message processed to avoid double processing.
2022-07-21 12:00:18 -07:00
Marco Oliverio
aca83b42d7
fix: dtls13: send immediately post-handshake certificate request
2022-07-21 12:00:18 -07:00
Marco Oliverio
53dde1dafe
dtls12: async: store the message only if async is really used
2022-07-21 12:00:18 -07:00
David Garske
964ea85d3d
Fix typos for dynamic types in dtls13.c.
2022-07-21 12:00:18 -07:00
Marco Oliverio
dce63fdfb3
async: fix issue with DTLSv1.3
2022-07-21 12:00:16 -07:00
Marco Oliverio
07afc594a8
dtls13: aesthetic only changes
2022-07-21 11:55:50 -07:00
David Garske
b5ce0b021e
Merge pull request #5381 from rizlik/async_fix
...
fix: async: don't rewind index if post-handshake connect() fails
2022-07-21 11:53:15 -07:00
David Garske
c5e7ccca2c
Merge pull request #5380 from danielinux/typo-doc
...
Fixed typo in dox_comments
2022-07-21 11:52:56 -07:00
Hayden Roche
daf5135642
Begin refactor of api.c.
...
- Modify all existing tests to return an int. This moves us in the direction of
being able to return error/success from a test rather than just calling abort
when something fails. Also, all tests now have the same signature, so they can
easily be members of an array of test cases.
- Wrap each test in a TEST_CASE struct, which just stores a pointer to the test
function and the name of the test, for now. In the future, other metadata can
be added (e.g. should this test be run/skipped) to TEST_CASE, if desired.
- Modify all tests to return 0 on success. Right now, this doesn't do us much
good because the failure mechanism isn't returning some value != 0, it's
abort.
- Add TestSetup and TestCleanup functions that run before and after each test,
respectively. The former does nothing right now, and the latter clears the
error queue, if the error queue is compiled in.
2022-07-21 10:12:26 -07:00
JacobBarthelmeh
1281d97b1e
Merge pull request #5373 from haydenroche5/error_queue_fix
...
Fix backwards behavior for various wolfSSL_ERR* functions.
2022-07-21 09:35:21 -06:00
Marco Oliverio
a235de25fe
fix: async: don't rewind index if post-handshake connect() fails
...
During post-handshake authentication async code mistakes connect() error code
with the error code of DoTls13CertificateRequest and wrongly rewinds the buffer.
The bug was never triggered because of side effects of ShrinkBuffer (removed in
40cb6e0853 )
2022-07-21 16:35:43 +02:00
Daniele Lacamera
a18b1939ac
Fixed typo in dox_comments
2022-07-21 10:19:51 +02:00
gojimmypi
c60fae8731
wc_Sha256Free checks lockDepth for Espressif RTOS
2022-07-21 09:08:10 +02:00
gojimmypi
bd28b52aaa
#include "wolfssl/wolfcrypt/settings.h"
2022-07-21 09:06:01 +02:00
gojimmypi
9da0ff0f31
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into ESP32_HW_Update_PR
2022-07-21 08:21:17 +02:00
gojimmypi
58aec606c6
wolfSSL license, not wolfSSH
2022-07-21 08:12:54 +02:00
gojimmypi
6937062b9a
wolfSSL license, not wolfSSH
2022-07-21 08:09:19 +02:00
JacobBarthelmeh
a4e3dc9638
Merge pull request #5379 from douzzer/20220720-fixes
...
20220720-fixes
2022-07-20 21:34:08 -06:00
David Garske
8605195709
Support for asynchronous session ticket callback (can return WC_PENDING_E). Requires wolfAsyncCrypt support. ZD 14420.
2022-07-20 16:43:17 -07:00
Daniel Pouzzner
542c53f3ac
snip out errant "#/" strings added to various text files by copyright boilerplate update in 8eaa85e412.
2022-07-20 18:23:28 -05:00
Daniel Pouzzner
a3fd714501
configure.ac: allow --enable-opensslextra with --enable-linuxkm if --enable-cryptonly is also given.
2022-07-20 18:21:29 -05:00
Daniel Pouzzner
3842889649
src/tls13.c: in SendTls13ClientHello(), move nullness check on WOLFSSL* ssl back to the start of the function.
2022-07-20 18:19:58 -05:00
David Garske
706ab6aac0
Merge pull request #5377 from kareem-wolfssl/rsaKeyEncipher
...
Don't require digital signature bit for static RSA cipher suites. Make wolfSSL_CTX_clear_options available without OPENSSL_EXTRA.
2022-07-20 15:28:55 -07:00
Sean Parkinson
bd2b510487
Merge pull request #5376 from dgarske/sniff_tlsv12_sessticket
...
Fixes for sniffer session ticket resumption with TLS v1.2
2022-07-21 08:22:33 +10:00
David Garske
9450fa1412
Merge pull request #5375 from LinuxJedi/se050-private-key-add
...
Add ECC private key insertion for SE050
2022-07-20 12:42:13 -07:00
Kareem
741d61574b
Make wolfSSL_CTX_clear_options available without OPENSSL_EXTRA.
2022-07-20 12:24:47 -07:00
Kareem
873890316c
Don't require digital signature bit for static RSA cipher suites.
2022-07-20 12:08:20 -07:00
David Garske
564f79c91a
Merge pull request #5371 from douzzer/20220719-linuxkm-get_thread_size-no-thunks
...
linuxkm: inhibit thunk generation in get_thread_size.
2022-07-20 11:48:48 -07:00
David Garske
1c7f64cce9
Fixes for sniffer session ticket resumption with TLS v1.2. ZD14531.
2022-07-20 11:18:19 -07:00
David Garske
b46a308544
Merge pull request #5361 from embhorn/zd14491
...
Fix for build with NO_TLS
2022-07-20 09:28:23 -07:00
Hayden Roche
e6da540fb3
Fix backwards behavior for various wolfSSL_ERR* functions.
...
wolfSSL_ERR_get_error and wolfSSL_ERR_peek_error_line_data should return the
earliest error in the queue (i.e. the error at the front), but prior to this
commit, they returned the latest/most recent one instead.
In DoAlert, we were adding an error to the queue for all alerts. However, a
close_notify isn't really an error. This commit makes it so DoAlert only adds
errors to the queue for non-close_notify alerts. In ReceiveData, similarly, we
were adding an error to the queue when the peer sent a close_notify, as
determined by ssl->error == ZERO_RETURN. Now, we don't add an error in this
case.
2022-07-20 08:56:48 -07:00
Andrew Hutchings
07d2940757
Fix issue caused by undo in IDE
2022-07-20 16:42:09 +01:00
David Garske
ab60865178
Merge pull request #5374 from julek-wolfssl/dtls-multiple-msgs
...
ShrinkInputBuffer should not be called in the middle of ProcessReply
2022-07-20 08:27:56 -07:00
Andrew Hutchings
d7b4abfa0b
Fixups to the SE050 ECC pkey insert function
2022-07-20 16:25:39 +01:00
David Garske
719e814841
Merge pull request #5370 from rizlik/dtls13_partial_read_fixes
...
dtlsv1.3 fixes
2022-07-20 08:03:29 -07:00
David Garske
e4c1e71b38
Merge pull request #5364 from embhorn/zd14519
...
Fix wolfSSL_Init error handling
2022-07-20 08:03:08 -07:00
David Garske
f4191a102b
Merge pull request #5304 from SKlimaRA/SKlimaRA/cert-pathlen
...
drafted pathlen for cert struct
2022-07-20 07:54:13 -07:00
David Garske
aab2459d1f
Merge pull request #5372 from JacobBarthelmeh/copyright
...
update copyright year to 2022
2022-07-20 07:52:05 -07:00
David Garske
c029b23043
Merge pull request #5308 from SparkiDev/ecies_gen_iv
...
ECIES: Google Pay generates IV and places it before msg
2022-07-20 06:46:14 -07:00
Marco Oliverio
2e0d53a07d
fix: dtls13: use correct handshaketype on hello retry request
2022-07-20 15:25:50 +02:00
Marco Oliverio
3850e6b554
fix: dtls13: use aes for record numbers encryption if using aes-ccm
2022-07-20 15:25:50 +02:00
Marco Oliverio
066f17faad
fix: dtls13: hello_retry_request type isn't an encrypted message
2022-07-20 15:25:50 +02:00
Marco Oliverio
c0fc87342c
tls13: avoid spurious state advances in connect/accept state machine
2022-07-20 15:25:50 +02:00
Marco Oliverio
11dfb713e9
openssl_compatible_default: use DTLSv1.0 as minDowngrade in DTLS
2022-07-20 15:25:46 +02:00
Marco Oliverio
6711756b03
dtls13: support stream-based medium
...
Don't assume that the underlying medium of DTLS provides the full message in a
single operation. This is usually true for message-based socket (eg. using UDP)
and false for stream-based socket (eg. using TCP).
Commit changes:
- Do not error out if we don't have the full message while parsing the header.
- Do not assume that the record header is still in the buffer when decrypting
the message.
- Try to get more data if we didn't read the full DTLS header.
2022-07-20 14:53:07 +02:00
Juliusz Sosinowicz
40cb6e0853
ShrinkInputBuffer should not be called in the middle of ProcessReply
2022-07-20 11:57:48 +02:00
Andrew Hutchings
ea34fb1643
Add ECC private key insertion for SE050
...
This adds a utility function which allows an ECC private key to be
inserted into the SE050's permanent storage.
2022-07-20 10:45:26 +01:00
Stanislav Klima
66c5a947fd
XSTRNCPY, fixed typos
2022-07-20 08:56:59 +02:00
Sean Parkinson
09bba3510f
ECIES: Google Pay ECIES
...
Generates IV and places it before msg
Uses 12 byte IV with AES-CTR
Add API to explicitly set KDF salt.
2022-07-20 09:30:47 +10:00
Jacob Barthelmeh
8eaa85e412
update copyright year to 2022
2022-07-19 10:44:31 -06:00
Eric Blankenhorn
8b904e9082
Fix for build with NO_TLS
2022-07-19 11:12:18 -05:00
Daniel Pouzzner
0dac3ec022
linuxkm: inhibit thunk generation in get_thread_size.
2022-07-19 10:20:04 -05:00
Stanislav Klima
1a44bad8cc
drafted test case for path len
2022-07-19 15:34:20 +02:00
Stanislav Klima
3d721bd533
more WOLFSSL_CERT_EXT
2022-07-19 11:00:36 +02:00
Stanislav Klima
6ce5f645f3
added ASN template code and WOLFSSL_CERT_EXT, still missing testcase
2022-07-19 10:38:47 +02:00
David Garske
9a3efb67b8
Merge pull request #5368 from lealem47/disableAes
...
Fix for --disable-aes without --disable-aesgcm
2022-07-18 15:05:59 -07:00
David Garske
feb3f889af
Merge pull request #5369 from embhorn/zd14522
...
Fix var init in wc_ecc_shared_secret
2022-07-18 14:17:53 -07:00
Lealem Amedie
cee9f9a871
Fix for --disable-aes without --disable-aesgcm
2022-07-18 10:26:20 -07:00
Chris Conlon
c63abe398f
Merge pull request #5321 from miyazakh/tsip_add_usecase
2022-07-18 09:35:43 -06:00
Eric Blankenhorn
f55fe7fccd
Fix var init in wc_ecc_shared_secret
2022-07-18 09:13:07 -05:00
David Garske
218ab7e396
Merge pull request #5362 from haydenroche5/ssl_set_options_public
...
Make wolfSSL_(get|set)_options available outside compat layer.
2022-07-15 10:36:29 -07:00
Eric Blankenhorn
e7303d697b
Fix wolfSSL_Init error handling
2022-07-15 09:30:30 -05:00
Andrew Hutchings
8a757ef7cf
Merge pull request #5363 from dgarske/se050_curve25519
...
Fixes for SE050 Curve25519 endianness
2022-07-15 08:49:27 +01:00
Hideki Miyazaki
15725400a7
addressed review comments 5
2022-07-15 13:46:30 +09:00
Hayden Roche
a1b7c29309
Make wolfSSL_(get|set)_options available outside compat layer.
...
Also make wolfSSL_CTX_get_options available.
2022-07-14 16:03:58 -07:00
David Garske
dec8a7fd93
Fixes for SE050 Curve25519 endianness (SDK assumes little endian). Fix for ECC se050_ecc_shared_secret use of wrong pointer on error handle free.
2022-07-14 15:34:50 -07:00
David Garske
6cc2665a81
Merge pull request #5358 from SparkiDev/sp_int_armv6
...
SP int ARM32: replace clz instruction when not supported
2022-07-14 15:32:00 -07:00
Chris Conlon
350ff552c4
Merge pull request #5351 from kojo1/renesas-csp
2022-07-14 16:10:34 -06:00
JacobBarthelmeh
abba59f735
order of array of names for asn template build
2022-07-14 13:15:59 -07:00
JacobBarthelmeh
8862e1f8cf
resolve name conflict
2022-07-14 09:41:36 -07:00
David Garske
e3c65d86d6
Merge pull request #5360 from LinuxJedi/se050-sign-fix-b
...
Missed a small part of my original SE050 sign fix
2022-07-14 06:39:11 -07:00
Hideki Miyazaki
fd885d89eb
Added multi thread use case
...
Improve not to use forward declaration struct definition
- include ssl.h rather than forward declaration struct to resolve struct name
- to include ssl.h, it needs to avoid cyclic reference for crypt structure. therefore, Sha and Aes definitions are moved to another header file
2022-07-14 17:25:21 +09:00
Andrew Hutchings
3f390efb24
Missed a small part of my original SE050 sign fix
...
Empty keyId handling now exists so we shouldn't return `BAD_FUNC_ARG`.
2022-07-14 07:47:33 +01:00
Andrew Hutchings
c211b90aab
Merge pull request #5357 from dgarske/se050_fixes
...
Fixes for SE050 ED25519 private key loading and Curve25519/ECC handle leak
2022-07-14 07:14:54 +01:00
Andrew Hutchings
5098cdcd76
Merge pull request #5356 from dgarske/asn_rfc8410
...
Fixes for ED25519/ED448 private key with public key export (RFC8410)
2022-07-14 07:11:03 +01:00
Jacob Barthelmeh
f6c4e295b1
add more subject name support and expande REQ attributes creation support
2022-07-13 22:02:49 -07:00
Jacob Barthelmeh
5dcb1ba21f
remove carriage return from CONF strings
2022-07-13 22:02:49 -07:00
Sean Parkinson
b69af856de
Ed ASN template: change for IMPLICIT public key in private key
...
Fix KATs in test.c to match new expected format.
2022-07-14 10:19:43 +10:00
Sean Parkinson
33b3ebb1e9
SP int ARM32: replace clz instruction when not supported
2022-07-14 09:37:28 +10:00
David Garske
2d5bc72c9b
Fixes for ED25519/ED448 private key with public key export (RFC8410). Added length only support.
2022-07-13 16:17:08 -07:00
David Garske
586ae71dac
Fixes for SE050 ECC and Curve25519 with TLS.
2022-07-13 10:50:10 -07:00
David Garske
a2b7b44163
Merge pull request #5342 from Uriah-wolfSSL/dtls_for_win
...
Example DTLS v1.3 build settings for Windows Visual Studio
2022-07-13 09:27:46 -07:00
David Garske
065991bab5
Merge pull request #5348 from douzzer/20220707-attend-return-values
...
20220707-attend-return-values
2022-07-13 08:50:29 -07:00
Stanislav Klima
1b6ce6150e
unsigned pathlen
2022-07-13 09:07:02 +02:00
Sean Parkinson
96fe356dd8
SP math
...
Enable ForceZero for SP math and all RSA.
Disable use of 128-bit type in SP unless WOLFSSL_UINT128_T_DEFINED is
defined.
2022-07-13 14:54:34 +10:00
Takashi Kojo
69bf0345c4
Renesas cs+ project. Remove depreciated algorithms
2022-07-13 10:24:44 +09:00
Daniel Pouzzner
dc231dc099
peer review: add explanatory comment for printf() macro in test.c; rearrange test.h to avoid awkward forward declaration and add some topical grouping.
2022-07-12 18:19:52 -05:00
Uriah-wolfSSL
a4e452ec6a
New file for adding needed configuration options to enable DTLS including DTLS version 1.3. This is an example file to be used for testing, eval, demos, etc.
2022-07-12 15:53:21 -05:00
Uriah-wolfSSL
357ace8408
* Updated README.txt w/ how to use user_settings_dtls.h.
...
* Added dtls13.c to build project files.
* Added user_settiings.dtls.h to include.am.
2022-07-12 15:53:21 -05:00
Daniel Pouzzner
b64949d564
wolfcrypt/benchmark/benchmark.c: fix gating for #include <errno.h>, and add #include <unistd.h> for _exit().
2022-07-11 23:15:43 -05:00
Daniel Pouzzner
ccc5952369
global fixup to check or explicitly ignore return values from failable library/system calls that weren't already being checked;
...
add wolfCrypt error codes IO_FAILED_E "Input/output failure" and SYSLIB_FAILED_E "System/library call failed";
tests/api.c and tests/unit.c: flush stdout for error message in Fail() macro, add fflush(stdout) after printf()s, print success message at end of unit_test(), and send several error messages to stderr instead of stdout;
wolfcrypt/test/test.c: add fallthrough macro definition of printf() that pairs it with fflush(stdout);
unit.h: in definition of macro AssertPtr(), add PRAGMA_GCC("GCC diagnostic ignored \"-Wpedantic\"");
sp_int.c: refactor several lingering instances of "if (0) { ... }" code pattern to #if 0 ... #endif.
2022-07-11 22:28:09 -05:00
David Garske
e30899b676
Merge pull request #5334 from LinuxJedi/se050-fixes
...
Fixes to SE050 port
2022-07-11 16:15:08 -07:00
JacobBarthelmeh
22c3a1fc6f
Merge pull request #5346 from dgarske/async_rel_v5.4.0
...
Async release v5.4.0 patches
2022-07-11 17:11:06 -06:00
David Garske
34c576d2a7
Fixes for possible NULL dereference for heap hint in pk.c Fix typo in api.c test for dynamic type.
2022-07-11 14:41:11 -07:00
David Garske
57aac1c50b
Merge pull request #5345 from JacobBarthelmeh/release
...
Release version 5.4.0
2022-07-11 11:10:10 -07:00
JacobBarthelmeh
a48129eb99
update README for release
2022-07-11 07:28:15 -07:00
JacobBarthelmeh
032d59b077
adjust sizeof type for getsockopt argument
2022-07-11 07:10:11 -07:00
JacobBarthelmeh
86662bca2f
update library version to 5.4.0
2022-07-08 16:04:26 -07:00
JacobBarthelmeh
7379e377ab
cast for g++ warning
2022-07-08 15:11:29 -07:00
JacobBarthelmeh
983b9fc5fb
Merge pull request #5343 from dgarske/ecc_oid_coding
...
Fixes for ECC OID encoding/decoding
2022-07-08 15:38:47 -06:00
David Garske
4892435004
Fix for wc_ecc_get_curve_id_from_oid with combinations of HAVE_OID_ENCODING and HAVE_OID_DECODING. Fix in SetCurve for unused outSz with HAVE_OID_ENCODING.
2022-07-08 13:00:09 -07:00
JacobBarthelmeh
66aed8193a
Merge pull request #5341 from dgarske/various_20220708
...
Various fixes and cleanups
2022-07-08 13:56:51 -06:00
David Garske
56325143f1
Merge pull request #5340 from anhu/micrium_alt_ecc_size
...
Gate ALT_ECC_SIZE on NO_MALLOC and STATIC_MEMORY since they conflict.
2022-07-08 09:53:07 -07:00
David Garske
720030b5a9
Improvements to error handling for AddSessionToClientCache.
2022-07-08 09:06:51 -07:00
David Garske
03a32250da
Fix for KCAPI HMAC forcing use of software for HKDF.
2022-07-08 09:06:30 -07:00
David Garske
3d124c093e
Fix PK function name in log. Remove the ECC logging (spams benchmark with --enable-debug).
2022-07-08 09:06:08 -07:00
David Garske
905f71d80d
Fix with macro redefinition error if building with NO_WOLFSSL_ALLOC_ALIGN.
2022-07-08 09:05:29 -07:00
JacobBarthelmeh
f7595cc77d
Merge pull request #5338 from julek-wolfssl/tcp-sendto
...
sendto can't specify addr on a TCP socket
2022-07-08 09:39:39 -06:00
Anthony Hu
2d6b6d62b2
Gate ALT_ECC_SIZE on NO_MALLOC and STATIC_MEMORY since they conflict.
2022-07-08 10:52:01 -04:00
David Garske
a2b75e313a
Merge pull request #5339 from douzzer/20220708-DUW_TEST-bugprone-macro-parentheses
...
tests/api.c: fix bugprone-macro-parentheses in DUW_TEST().
2022-07-08 07:46:20 -07:00
Daniel Pouzzner
48d3cf593e
tests/api.c: fix bugprone-macro-parentheses in DUW_TEST().
2022-07-08 07:57:29 -05:00
Juliusz Sosinowicz
251642a44a
sendto can't specify addr on a TCP socket
...
From the man page
If sendto() is used on a connection-mode (SOCK_STREAM, SOCK_SEQPACKET) socket, the arguments dest_addr and
addrlen are ignored (and the error EISCONN may be returned when they are not NULL and 0), and the error
ENOTCONN is returned when the socket was not actually connected.
2022-07-08 12:14:23 +02:00
David Garske
58cb91602d
Merge pull request #5337 from douzzer/20220707-DtlsUpdateWindowGTSeq-overshift
...
20220707-DtlsUpdateWindowGTSeq-overshift
2022-07-07 21:53:26 -07:00
David Garske
c9e9a421e9
Merge pull request #5336 from SparkiDev/aes_ctr_opt
...
AES-CTR: improve performance when multiple blocks
2022-07-07 21:51:08 -07:00
Daniel Pouzzner
91438c1087
wolfssl/wolfcrypt/settings.h: refactor Math Library Selection for clarity, and to include WOLFSSL_SP_MATH as an available math back end.
2022-07-07 21:02:16 -05:00
David Garske
49d292ec4f
Merge pull request #5335 from SparkiDev/ecc_imp_exp_fix
...
ECC import and export fixes
2022-07-07 17:52:20 -07:00
Daniel Pouzzner
b952c2f777
src/internal.c: add codepath in _DtlsUpdateWindowGTSeq() to avoid a word32 overshift.
2022-07-07 19:36:20 -05:00
Sean Parkinson
2bfac42d65
AES-CTR: improve performance when multiple blocks
...
When in and out aren't the same pointer, for multiples of block size
input:
- generate the counters into the output buffer
- encrypt output buffer
- XOR in the input
Faster than encrypting a block at a time.
2022-07-08 09:56:20 +10:00
Sean Parkinson
70b9833e98
ECC import and export fixes
...
On raw import, don't import ordinates that are larger than the curve
size.
On export of compressed point, don't export ordinate if it is larger
than the curve size.
2022-07-08 08:54:53 +10:00
David Garske
4e1e1e922a
Merge pull request #5278 from ejohnstown/dtls-seq
...
Refactor DTLS Window Update (Fix #5211 )
2022-07-07 10:22:21 -07:00
Chris Conlon
5e453ad932
Merge pull request #5323 from SparkiDev/sha512_arm32_asm_align
2022-07-07 09:47:37 -06:00
Juliusz Sosinowicz
e295328436
Fix window handling around word32 boundary
2022-07-07 17:37:10 +02:00
Andrew Hutchings
34d897e433
Fixes to SE050 port
...
This fixes the following things:
* Memory leaks in SE050 SHA messages
* Add key to SE050 for ECC sign hash function
* Remove circular include
* Correct prototype for `se050_hash_final`
* A few defined check fixes
2022-07-07 16:11:54 +01:00
David Garske
a771baf551
Merge pull request #5332 from SparkiDev/memusage_fix_2
...
SP math: fix configure.ac to allow its use
2022-07-07 07:40:13 -07:00
David Garske
738d79c5d5
Merge pull request #5330 from SparkiDev/aesni_no_sse4
...
AESNI: fix configure to use minimal compiler flags
2022-07-06 20:44:40 -07:00
Daniel Pouzzner
2111d6b179
Merge pull request #5322 from SparkiDev/sp_math_all_arm32_div_word_fix
...
SP math all: fix div word for ARM32
2022-07-06 22:18:07 -05:00
Sean Parkinson
74baa0dafa
SP math: fix configure.ac to allow its use
...
Choosing SP and SP math was resulting in only integer.c being used.
Fixed now.
Reorder realloc calls for memory logging to ensure scripts can match
allocate and free calls.
2022-07-07 12:16:12 +10:00
David Garske
644050a736
Merge pull request #5329 from douzzer/20220706-fips-and-aarch64-fixes
...
20220706-fips-and-aarch64-fixes
2022-07-06 18:39:38 -07:00
David Garske
cb6fa921a4
Merge pull request #5328 from haydenroche5/cmake_sp_math_all_default
...
Make changes to CMake to support SP math default.
2022-07-06 18:39:30 -07:00
John Safranek
8f3449ffea
Refactor DTLS Window Update ( Fix #5211 )
...
1. Rename _DtlsUpdateWindow() as wolfSSL_Dtls_UpdateWindow() and make
it public so it may be tested.
2. Rename the internal functions DtlsWindowUpdate(), DtlsWindowCheck(),
and DtlsUpdateWindowGTSeq() as _DtlsWindowUpdate() and
_DtlsWindowCheck(), and _DtlsUpdateWindowGTSeq().
3. When updating the DTLS sequence window, and the next sequence
number (lo) wraps to zero, increment the next sequence number (hi)
by 1.
4. Fix an off-by-one error that wrapped around when saving the
packet sequence number in the bit-field window.
5. Adding a test for wolfSSL_DtlsUpdateWindow() function. With many test
cases. It is set up in a table format with running check values.
6. Change location of incrementing the difference when calculating the
location for setting the bit.
7. Updated the check of the sequence difference in the GT scenario.
8. In the DTLS window update functions remove newDiff and just use diff.
9. Handle the cases where the DTLS window crosses the high order word
sequence number change.
10. Add a debug option to print out the state of the DTLS sequence number
window.
2022-07-06 18:20:06 -07:00
David Garske
90c2f4ad00
Merge pull request #5327 from kareem-wolfssl/connectRetFix
...
Fix storage of SendBuffered's return code in wolfSSL_Connect.
2022-07-06 17:53:04 -07:00
Sean Parkinson
9ba77300f9
AESNI: fix configure to use minimal compiler flags
2022-07-07 09:30:48 +10:00
Sean Parkinson
992c7b3b6f
SP math all: fix div word for ARM32
...
Fixup sp_mulmod NULL access.
2022-07-07 08:56:31 +10:00
Daniel Pouzzner
82b1dc0cd0
wolfcrypt/src/asn.c: move final return in DecodeECC_DSA_Sig() outside the NO_STRICT_ECDSA_LEN gate, to avoid no-return-from-non-void.
2022-07-06 17:39:59 -05:00
Daniel Pouzzner
eff4fe398b
src/include.am: fix gating around sha* and BUILD_ARMASM, to avoid empty-translation-unit warnings for sha{256,512}.c on armasm builds.
2022-07-06 17:37:43 -05:00
Daniel Pouzzner
7c49449a79
wolfcrypt/src/port/arm/armv8-sha512.c: gate out Sha512_Family_GetHash() in builds that have 224 and 256 bit hashes gated out, to fix unused function warning.
2022-07-06 17:35:15 -05:00
Daniel Pouzzner
6b6abfac54
examples/client/client.c: remove break after err_sys() to mollify clang-tidy unreachable-break sensor.
2022-07-06 17:32:26 -05:00
Daniel Pouzzner
19106a9510
configure.ac and tests/api.c: lock out compkey on FIPS 140-3 RC12 and ready, and add backward-compat code in test_wc_ecc_export_x963_ex() to allow RC12 compkey builds to pass unit.test.
2022-07-06 17:31:56 -05:00
Hayden Roche
d9bf39ffaa
Make changes to CMake to support SP math default.
...
We recently made SP math the default big integer math library. Some changes to
the CMake code are needed for this to work.
2022-07-06 14:14:12 -07:00
Kareem
44a49aeefa
Fix potentially uninitialized variables in Dtls13SetRecordNumberKeys.
2022-07-06 13:45:15 -07:00
Kareem
c8f5bd3d61
Fix storage of SendBuffered's return code in wolfSSL_Connect. Store in ret initially, only store in ssl->error if there's an error. This matches the logic in wolfSSL_accept.
2022-07-06 12:09:47 -07:00
David Garske
b2d1bf96ed
Merge pull request #5276 from rizlik/dtls13_client_downgrade
...
Dtls: improve version negotiation
2022-07-06 11:57:53 -07:00
David Garske
a7fa7875e4
Merge pull request #5244 from julek-wolfssl/wpas-dpp
...
Support for new DPP and EAP-TEAP/EAP-FAST in wpa_supplicant
2022-07-06 11:35:52 -07:00
David Garske
e92034cf6f
Merge pull request #5274 from JacobBarthelmeh/Certs
...
remove subject/issuer email from altEmailNames list
2022-07-06 10:48:21 -07:00
gojimmypi
e2484a97f2
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into ESP32_HW_Update_PR
2022-07-06 09:32:07 -07:00
gojimmypi
8bb6ff8dbb
Espressif HW acceleration update & cleanup
2022-07-06 09:30:49 -07:00
Jacob Barthelmeh
711b2bb17a
add a test case
2022-07-06 09:39:03 -06:00
David Garske
a171bebba4
Fix the wc_EccPublicKeyToDer_ex doxy.
2022-07-06 07:58:18 -07:00
Marco Oliverio
3abffc3a3c
doc: add documentation for wolfDTLS[v1_3]_*_method()
2022-07-06 16:18:44 +02:00
Marco Oliverio
683adb5917
tests: add dtls downgrade tests
2022-07-06 16:18:44 +02:00
Marco Oliverio
fd4836772b
examples: support DTLS version downgrading
2022-07-06 16:18:44 +02:00
Marco Oliverio
df7e81d187
dtls: support version negotiation
2022-07-06 16:18:44 +02:00
Marco Oliverio
8fe3f51ecb
dtls13: client: recompute transcript hash on downgrade
...
If a lower version is negotiated, the transcript hash must be recomputed using
the <= v1.2 rules.
2022-07-06 16:18:44 +02:00
Marco Oliverio
5d74c49ecb
dtls13: allow processing of HelloVerifyRequest to support downgrade
...
HelloVerifyRequest is used in DTLSv1.2 to perform a return routability check, so
it can be the legitim reply from a DTLSv1.2 server to a ClientHello.
2022-07-06 16:18:44 +02:00
David Garske
ec8149cd69
Merge pull request #5324 from julek-wolfssl/dtls13-hrr-fix
...
TLSX_COOKIE is only defined with WOLFSSL_SEND_HRR_COOKIE
2022-07-06 06:56:25 -07:00
Juliusz Sosinowicz
9b085a44be
sessionSecretCb should only be called when a ticket is present
2022-07-06 15:08:57 +02:00
Juliusz Sosinowicz
63b4c475d4
wolfSSL_set_session_secret_cb: fix for NULL input
2022-07-06 14:23:08 +02:00
Juliusz Sosinowicz
39e53c2b7c
Add wc_EccPublicKeyToDer_ex doxygen entry
2022-07-06 11:59:29 +02:00
Juliusz Sosinowicz
ef73409fd4
TLSX_COOKIE is only defined with WOLFSSL_SEND_HRR_COOKIE
2022-07-06 10:04:15 +02:00
Sean Parkinson
8b73feb8ef
SHA-512 ARM NEON: ensure data being hashed is 64-bit aligned
2022-07-06 16:18:18 +10:00
Jacob Barthelmeh
ff6edbff94
refactor name constraint checks
2022-07-05 17:20:50 -06:00
David Garske
9a256ca002
Merge pull request #5288 from haydenroche5/openldap
...
Add --enable-openldap option to configure.ac.
2022-07-05 16:04:51 -07:00
David Garske
4376ade9c8
Merge pull request #5123 from fabiankeil/configure-amd64-support
...
configure: Improve defaults for 64-bit BSDs
2022-07-05 13:52:02 -07:00
David Garske
08488b0fae
Merge pull request #5318 from embhorn/gh5314
...
Fix typos and bad macro names
2022-07-05 12:34:35 -07:00
Hayden Roche
f5a5d4ada5
Enhance OpenLDAP support.
...
- Add --enable-openldap to configure.ac
- Fix some issues around subject alt names and the WOLFSSL_GENERAL_NAME struct.
2022-07-05 10:40:07 -07:00
Fabian Keil
eb9a9ceef8
configure: Improve defaults for 64-bit BSDs
...
... by consistently treating host cpu "amd64" like host cpu "x86_64".
Tested on ElectroBSD amd64.
2022-07-05 19:37:31 +02:00
John Safranek
ded3f4e9b6
Merge pull request #5284 from julek-wolfssl/dtls-good-ch-cb
...
DTLS 1.3: additions for event driven server in wolfssl-examples
2022-07-05 10:14:59 -07:00
David Garske
1c009e8f91
Merge pull request #5311 from SparkiDev/ed_check_pubkey
...
Ed25519/Ed448: assume public key is not trusted
2022-07-05 09:25:50 -07:00
Eric Blankenhorn
394f36a0d7
Fix typos and bad macro names
2022-07-05 10:31:11 -05:00
Juliusz Sosinowicz
4caffee590
ForceZero the private key on import error
2022-07-05 13:44:31 +02:00
Juliusz Sosinowicz
20e5c98b2c
Error out when server indicates resumption but does full handshake
2022-07-05 09:42:39 +02:00
Juliusz Sosinowicz
fd7bf8d04d
Do resuming check as soon as we get a non-resumption msg
2022-07-05 08:49:00 +02:00
Juliusz Sosinowicz
144f2612e4
wc_ecc_export_x963_ex returns LENGTH_ONLY_E on a NULL output
2022-07-05 08:49:00 +02:00
Juliusz Sosinowicz
8e84560f71
CSR: confirm the signature when verify == VERIFY
2022-07-05 08:49:00 +02:00
Juliusz Sosinowicz
afaf41823c
wpa_supplicant uses larger challenge passwords for x509 requests
2022-07-05 08:49:00 +02:00
Juliusz Sosinowicz
5179741ddb
wpas: validate ecc points are on the curve
2022-07-05 08:48:37 +02:00
Juliusz Sosinowicz
ee3636f2e7
wc_EccPublicKeyToDer_ex: exporting the public key in compressed form
2022-07-05 08:48:18 +02:00
Juliusz Sosinowicz
448cde5a4b
Support for new DPP in wpa_supplicant
...
- Add null check to asn template code in MakeCertReq and test
- ENABLED_ECCCUSTCURVES can also be "all"
2022-07-05 08:48:18 +02:00
Sean Parkinson
4a962b7fb2
Ed25519/448: improvements
...
Check lengths of buffers in import functions.
priv/pub key set flag set on success only.
2022-07-05 09:02:05 +10:00
David Garske
1b64b82a6f
Merge pull request #5316 from LinuxJedi/fix-embos-mutex
...
Use the correct mutex type for embOS
2022-07-04 11:51:20 -07:00
David Garske
07b8f45d35
Merge pull request #5315 from rizlik/dtls_doDtls_fix
...
fix: examples/server: dtls mode checking
2022-07-04 10:20:20 -07:00
Andrew Hutchings
f8c67345d6
Use the correct mutex type for embOS
...
OS_MUTEX_Lock() is acutally a non-blocking mutex lock, for
wc_LockMutex() we need a blocking mutex. Switch to this.
2022-07-04 15:59:36 +01:00
Juliusz Sosinowicz
9dc2c27e3d
Expand wolfDTLS_SetChGoodCb() docs
2022-07-04 14:31:24 +02:00
Juliusz Sosinowicz
10c8a1668e
Reset cookie when resetting DTLS 1.3 state
2022-07-04 12:52:25 +02:00
Juliusz Sosinowicz
a8adde66c8
Use wc_HmacInit and wc_HmacFree in cookie logic
2022-07-04 12:51:50 +02:00
David Garske
00391a5ace
Rename callback to wolfDTLS_SetChGoodCb and add doxygen for it. Clarify DTLS_CTX.connected. Fix build errors for ./configure --enable-dtls --enable-dtls13 --disable-examples CFLAGS="-DNO_WOLFSSL_SERVER".
2022-07-04 11:08:39 +02:00
Juliusz Sosinowicz
7ea13bf5bf
Apply connected to sendto and address code review
2022-07-04 11:08:39 +02:00
Juliusz Sosinowicz
dd7073740b
DTLS 1.3: tie cookie to peer address
2022-07-04 11:08:39 +02:00
Juliusz Sosinowicz
e605cfeccb
Add docs for new features
2022-07-04 11:08:39 +02:00
Juliusz Sosinowicz
afdd5648aa
Address code review
2022-07-04 11:08:39 +02:00
Juliusz Sosinowicz
d72edd03b8
dtls: wolfSSL_set_dtls_fd_connected
...
wolfSSL_set_dtls_fd_connected sets the connected socket file descriptor. This descriptor should be called without addr and addr_len.
2022-07-04 11:08:39 +02:00
Juliusz Sosinowicz
c6aa4fc526
DTLS 1.3: allow the server to operate without maintaining state
2022-07-04 11:08:39 +02:00
Juliusz Sosinowicz
8fb48464e3
Add callback when we parse a verified ClientHello
2022-07-04 11:08:39 +02:00
Marco Oliverio
80f3db6e1d
fix: examples/server: dtls mode checking
...
This fixes using ssl to check if we are using dtls or not, when ssl is not yet
valid.
Fix: 060dfe1a69
2022-07-04 10:21:11 +02:00
Sean Parkinson
1077829f9d
Merge pull request #5313 from douzzer/20220701-sp_div-deadstore
...
fix clang-analyzer-deadcode.DeadStores in sp_div().
2022-07-04 08:32:50 +10:00
Sean Parkinson
7b9c214b3c
Merge pull request #4985 from kareem-wolfssl/iarWarningsFix
...
Fix compilation warnings from IAR.
2022-07-04 08:23:26 +10:00
Daniel Pouzzner
b16c2a2aef
fix clang-analyzer-deadcode.DeadStores in sp_div().
2022-07-01 23:49:58 -05:00
Daniel Pouzzner
5819332f89
Merge pull request #5312 from dgarske/fips_v5dev
...
FIPS in core hash using SHA2-256 and SHA2-384
2022-07-01 23:25:52 -05:00
David Garske
6c7db7318e
Merge pull request #5309 from kareem-wolfssl/arrayBoundFix
...
Pass in and check output length in SetCurve.
2022-07-01 18:58:42 -07:00
David Garske
b9be5c2c24
Update to FIPS v5-ready will use latest master. Support for FIPS in core hash using SHA2-256 and SHA2-384 in fips_test.h. Fixes for MATH_INT_T. Fix error: ‘tls13_kdf_test’ declared ‘static’ but never defined.
2022-07-01 15:40:21 -07:00
David Garske
bb68766bda
For ED255219 and ED448 if importing private only and public key is already set then check it.
2022-07-01 14:13:45 -07:00
Kareem
90749b7f88
Don't declare tls13_kdf_test if TLS 1.3 is not enabled, to avoid unused function warning.
2022-07-01 13:22:16 -07:00
Kareem
96aedc2f47
Fix SetCurve max sizes. Add fix for potentially uninitialized type in ProcessReplyEx.
2022-07-01 13:18:33 -07:00
Kareem
7a7d8d170d
Pass in and check output length in SetCurve.
2022-07-01 13:18:33 -07:00
David Garske
bd75e1d6a4
Merge pull request #5307 from kareem-wolfssl/miscfixes2
...
Fix a couple of STM32 bugs, and add some missing mutex frees.
2022-07-01 09:46:22 -07:00
David Garske
0459e83a59
Merge pull request #5310 from SparkiDev/memusage_fix_1
...
TLS memusage: reduce usage
2022-07-01 09:13:05 -07:00
Sean Parkinson
2c943282f0
Ed25519/Ed448: assume public key is not trusted
...
In defense against attack, assume the imported public key is not trusted
and check it matches the private key if set.
Added APIs that allow application to explicitly trust public key.
Original APIs default to not trusting public key.
2022-07-01 09:05:43 -07:00
Sean Parkinson
b9a8f18a97
Merge pull request #5300 from douzzer/20220629-multi-test-fixes
...
20220629-multi-test-fixes
2022-07-01 16:22:05 +10:00
Sean Parkinson
7d58dc5678
TLS memusage: reduce usage
...
Reduce the amount allocated to reduce maximum overall dynamic memory
usage.
Rework ServerKeyExchange by extracting the handling of the signed data.
2022-07-01 14:24:59 +10:00
Kareem
b2e7f4a8eb
Fix cast spacing. Don't cast in wolfSSL_X509_set_version, check is valid as is.
2022-06-30 16:26:43 -07:00
Kareem
7555cd0685
Fix a couple of STM32 bugs, and add some missing mutex frees.
2022-06-30 16:11:16 -07:00
David Garske
402a4dafd4
Merge pull request #5306 from kareem-wolfssl/ltc_ed235519
...
Fix missing return checks in KSDK ED25519 code.
2022-06-30 16:06:45 -07:00
Daniel Pouzzner
fc5f1f5eca
Merge pull request #5305 from dgarske/cryptonly
...
Improvements to configure.ac cryptonly and math selection
2022-06-30 17:55:27 -05:00
Daniel Pouzzner
2bdcbcc8be
src/tls13.c: fix whitespace.
2022-06-30 17:17:50 -05:00
Daniel Pouzzner
4f6527353b
src/{pk.c,x509.c}: style/clarity cleanups from dgarske.
2022-06-30 17:07:35 -05:00
Daniel Pouzzner
1a9388b935
src/pk.c: fix misuses around snprintf().
2022-06-30 17:07:35 -05:00
Daniel Pouzzner
28213ad198
src/x509.c: fix wolfSSL_X509_signature_print() to print raw signature algorithm as hex digits, not as an (unprintable) string; fix printed-null bug in wolfSSL_X509_NAME_print_ex() (relates particularly to calls from wolfSSL_X509_NAME_print_ex_fp()).
2022-06-30 17:07:35 -05:00
Daniel Pouzzner
5bd8288b37
fix printed-null bug in wolfssl_print_number().
2022-06-30 17:07:35 -05:00
Daniel Pouzzner
b7ec529f61
wolfcrypt/src/siphash.c: in wc_SipHash(), use FALL_THROUGH macro, not /* fall-through */.
2022-06-30 17:07:35 -05:00
Chris Conlon
867a1f7afa
Merge pull request #5289 from TakayukiMatsuo/tls13
2022-06-30 15:49:53 -06:00
Kareem
e09bbb1989
Fix compilation warnings from IAR.
2022-06-30 14:30:06 -07:00
Kareem
13beadbfc3
Fix missing return checks in KSDK ED25519 code.
2022-06-30 13:35:00 -07:00
David Garske
2f1e236305
Improvements to --enable-cryptonly in configure.ac output. Improvement to math select order in configure.ac and stray heap math=yes.
2022-06-30 12:42:55 -07:00
David Garske
ed1fdc410e
Merge pull request #5303 from SparkiDev/match_dyn_type_fix_1
...
Fix mismatched dynamic types
2022-06-30 08:56:43 -07:00
Stanislav Klima
26a62b4b9e
drafted pathlen for cert struct
2022-06-30 17:16:10 +02:00
TakayukiMatsuo
ba19737627
Add support for TLS1.3
2022-06-30 23:00:05 +09:00
David Garske
e8e35c9a92
Merge pull request #5301 from SparkiDev/aes_gcm_word_ct
...
AES-GCM: make word implementation of GMULT constant time
2022-06-29 20:26:33 -07:00
Sean Parkinson
1ba9ea9759
Fix mismatched dynamic types
2022-06-30 13:00:57 +10:00
David Garske
9cc928cb29
Merge pull request #5299 from SparkiDev/sp_submod_fix
...
SP int math; submod fix
2022-06-29 18:52:15 -07:00
Sean Parkinson
8b93d4510d
AES-GCM: make word implementation of GMULT constant time
...
If performance is impacted then define: AES_GCM_GMULT_NCT
2022-06-30 09:29:04 +10:00
Sean Parkinson
0159f17692
SP int math; submod fix
...
Fix for sp_submod() to reduce by modulus when a or b are equal to
modulus as well as when greater.
2022-06-30 08:53:25 +10:00
Sean Parkinson
f2acaa8ee9
Merge pull request #5242 from SKlimaRA/SKlimaRA/strict-verification
...
zd14249
2022-06-30 08:19:42 +10:00
David Garske
28d149a103
Merge pull request #5297 from ejohnstown/esp-build
...
ESP-IDF Build Cleanup
2022-06-29 14:03:02 -07:00
Daniel Pouzzner
e941a729a7
Merge pull request #5290 from embhorn/gh5270
...
Add support for aligned data with clang llvm
2022-06-29 12:14:42 -05:00
Kaleb Himes
2257030792
Merge pull request #5296 from dgarske/sniffer
...
Sniffer fixes (async TLS v1.3, async removal of `WC_HW_WAIT_E` and sanitize leak)
2022-06-29 09:16:54 -07:00
David Garske
999d3b3ab7
Merge pull request #5298 from douzzer/20220628-multi-test-and-crossbuild-fixes
...
20220628-multi-test-and-crossbuild-fixes
2022-06-29 09:14:59 -07:00
Daniel Pouzzner
5adf7e4eb7
wolfcrypt/src/asn.c wc_BuildEccKeyDer(): fix for clang-analyzer-deadcode.DeadStores.
2022-06-28 19:14:58 -05:00
Daniel Pouzzner
90aaeb283e
wolfcrypt/src/siphash.c: add missing !WOLFSSL_NO_ASM clause in gate around inline asm.
2022-06-28 18:19:58 -05:00
Daniel Pouzzner
ce61653a9a
wolfcrypt/src/asn.c: fixes for ARM portability (GetASN_Items()), unintended fallthrough (OidFromId()), and uninitialized variable (DecodeSubjInfoAcc()).
2022-06-28 18:18:42 -05:00
Daniel Pouzzner
17659ed48c
configure.ac: when --enable-fips=disabled, don't touch DEF_SP_MATH/DEF_FAST_MATH;
...
don't enable sp-math-all asm gates when !ENABLED_ASM;
add --with-arm-target to allow selecting thumb or cortex in conjunction with a full --host tuple (e.g. --host=armv6zk-softfloat-linux-gnueabi --with-arm-target=thumb).
2022-06-28 18:15:28 -05:00
David Garske
d76c46a96f
Fix for sniffer async issue with TLS v1.3.
2022-06-28 16:01:06 -07:00
David Garske
f51c29d3ca
Merge pull request #5293 from SparkiDev/asnt_setecc
...
ASN template: Handle HAVE_OID_ENCODING
2022-06-28 15:45:13 -07:00
John Safranek
e56394a2ab
ESP-IDF Build Cleanup
...
1. Update the list of files to leave out of the build. They are ones
that are included into ssl.c automatically.
2022-06-28 15:38:58 -07:00
Sean Parkinson
092b37f709
Merge pull request #5287 from haydenroche5/aes_ctr_clear_left_on_iv_set
...
Clear the leftover byte count in Aes struct when setting IV.
2022-06-29 08:30:01 +10:00
Sean Parkinson
28df62921a
Merge pull request #5292 from dgarske/freertos_memtrack
...
Fix for using track memory feature with FreeRTOS.
2022-06-29 08:00:36 +10:00
David Garske
e49f07694e
Fix for sniffer possible malloc of zero size causing a -fsanitize=address leak report.
2022-06-28 12:54:25 -07:00
David Garske
5ade360d9e
Fix to avoid using WC_HW_WAIT_E for sniffer. ZD14398
2022-06-28 12:38:57 -07:00
David Garske
b87b255d52
Merge pull request #5295 from rizlik/dtls13_bugfix
...
server: fix wrong minVersion setting when non in dtls
2022-06-28 09:35:23 -07:00
David Garske
741393e84f
Merge pull request #5291 from kaleb-himes/FRDM-K64-Fixes
...
Add necessary includes for cross-builds
2022-06-28 09:35:06 -07:00
Chris Conlon
14c65e0117
Merge pull request #5281 from miyazakh/example_japanese_translate
2022-06-28 10:08:06 -06:00
Chris Conlon
cb80ffc1b5
Merge pull request #5251 from kojo1/ja
2022-06-28 09:51:21 -06:00
David Garske
d4d7e2e5f2
Merge pull request #5294 from SparkiDev/sp_math_all_no_128bit
...
SP math all: don't use sp_int_word when SQR_MUL_ASM available
2022-06-28 07:38:42 -07:00
Marco Oliverio
060dfe1a69
server: fix wrong minVersion setting when non in dtls
2022-06-28 12:10:18 +02:00
Sean Parkinson
22336d30e5
SP math all: don't use sp_int_word when SQR_MUL_ASM available
...
1. _WIN64 doesn't have 128-bit type but now can use 64-bit sp_int_digit
when assembly code snippets are being used.
2. Fix sp_div() to support values closer to maximum size.
3. Fix builds to work for more configurations.
4. Have ECC uncompressed code keep intermediate values in range of
maximum (x^3 calculation fixed).
5. Fix configuation.ac's check of FIPS for using signed SP Math All.
Default now not signed as intended.
2022-06-28 15:51:53 +10:00
Sean Parkinson
3c3a90c988
ASN template: Handle HAVE_OID_ENCODING
...
When HAVE_OID_ENCODING is defined, the named curve OID is encoded rather
than the full OID.
Use SetCurve to get the OID encoding in ASN template implemenation.
2022-06-28 09:04:42 +10:00
David Garske
31498de7a9
Fix for using track memory feature with FreeRTOS.
2022-06-27 14:08:45 -07:00
kaleb-himes
9d11e9092f
Add necessary includes for cross-builds
2022-06-27 13:50:27 -06:00
David Garske
94e7eacc5f
Merge pull request #5072 from JacobBarthelmeh/Compatibility-Layer
...
add support for importing private only EC key to a WOLFSSL_EVP_PKEY s…
2022-06-27 12:34:00 -07:00
David Garske
456e463640
Merge pull request #5283 from SparkiDev/sp_arm32_asm_rework
...
SP ASM ARM32: reworked generation using common asm ruby code
2022-06-27 09:17:20 -07:00
David Garske
b84b808b1b
Merge pull request #5167 from ejohnstown/cac-ext
...
Add support for some FPKI certificate cases, UUID, FASC-N, PIV extension
2022-06-27 09:06:15 -07:00
Sean Parkinson
999fa8394e
SP ASM ARM32: reworked generation using common asm ruby code
...
Add support for ARMv6 and ARMv3.
2022-06-27 11:19:50 +10:00
Hayden Roche
10dfd8d129
Clear the leftover byte count in Aes struct when setting IV.
...
Setting the key already does this. The same needs to be done when setting the
IV.
2022-06-26 15:56:05 +04:00
David Garske
55414290df
Merge pull request #5286 from douzzer/20220624-multi-test-fixes-sp-math-default
...
20220624-multi-test-fixes-sp-math-default
2022-06-24 19:26:49 -07:00
Daniel Pouzzner
9211825121
sp_int.c: fix refactor of undefined-semantics shift in _sp_mul().
2022-06-24 18:04:51 -05:00
Daniel Pouzzner
790584113f
configure.ac: WOLFSSL_WPAS[_SMALL] requires OPENSSL_EXTRA.
2022-06-24 16:38:56 -05:00
Jacob Barthelmeh
49740c5543
initialize variables
2022-06-24 15:21:20 -06:00
Daniel Pouzzner
9a29dfc8cb
fix whitespace.
2022-06-24 16:08:38 -05:00
Daniel Pouzzner
047c662af8
fix math errors unmasked by change to sp-math-all as default math back end.
2022-06-24 15:56:54 -05:00
Daniel Pouzzner
940d0140f9
configure.ac fixes related to change in default math back end (to sp-math-all): wolfRand doesn't use fastmath;
...
FIPS v5-dev follows the non-FIPS default (now sp-math-all);
add -DWC_NO_CACHE_RESISTANT to AM_CFLAGS when $ENABLED_HARDEN != yes;
add ENABLED_BIGNUM sensor and use it in linuxkm math back end assert;
add configuration callout for "Side-channel Hardening" reporting value of $ENABLED_HARDEN.
2022-06-24 15:55:08 -05:00
Jacob Barthelmeh
1977a13754
improve comment for FPKI additions
2022-06-24 12:04:26 -06:00
JacobBarthelmeh
8dfcc76f50
Merge pull request #5279 from embhorn/gh5273
...
Fix config with WOLFSSL_WPAS_SMALL
2022-06-24 11:22:58 -06:00
David Garske
5ef507c78d
Merge pull request #5280 from douzzer/20220623-enable-dh-const
...
--enable-dh=const
2022-06-24 08:29:35 -07:00
Stanislav Klima
ce977e8c0b
requested review changes 2
2022-06-24 15:37:10 +02:00
David Garske
00b82888bc
Merge pull request #4759 from dgarske/sp_math_default
...
Enable wolfSSL SP Math all (sp_int.c) by default
2022-06-23 16:14:54 -07:00
Hideki Miyazaki
c34c32f621
translated Japanese messages
2022-06-24 08:09:28 +09:00
Jacob Barthelmeh
43e11ec756
improve comments for subject name email matching
2022-06-23 15:52:28 -06:00
JacobBarthelmeh
4de90efbe2
clear out PKEY when setting new key
2022-06-23 14:21:53 -07:00
Daniel Pouzzner
a5250482ce
examples/: refactor a couple help strings to avoid hitting clang-tidy bugprone-suspicious-missing-comma.
2022-06-23 15:25:23 -05:00
Daniel Pouzzner
768737d21e
configure.ac: support --enable-dh=const, and link with libm ("LT_LIB_M") only if ENABLED_DH = yes.
2022-06-23 15:00:59 -05:00
Jacob Barthelmeh
79ea30a957
memory free on failure, spelling, better function name
2022-06-23 13:40:45 -06:00
Eric Blankenhorn
02dde373d1
Add support for aligned data with clang llvm
2022-06-23 13:26:11 -05:00
David Garske
78d3284c3c
Fix for FIPS 140-2 and older ACVP math selection. Fix for building with "--disable-sp-math-all --disable-fastmath". Fix for building SAKKE with HAVE_WOLF_BIGINT.
2022-06-23 11:10:44 -07:00
David Garske
e2ad62b3d1
Merge pull request #5266 from rizlik/udp_help
...
examples: update usage() with DTLSv1.3 version
2022-06-23 09:27:53 -07:00
Eric Blankenhorn
7fb17e0584
Fix build error with --enable-opensslextra=x509small --enable-debug
2022-06-23 11:26:57 -05:00
Eric Blankenhorn
1cdc81546d
Fix config with WOLFSSL_WPAS_SMALL
2022-06-23 09:19:14 -05:00
Sean Parkinson
ee12c12e98
Fixes required to make SP Math default
...
fasthugemath means turn on fastmath
Use sp_int_digit and not sp_digit in sp_int.c.
test.c needs to use large static buffer when SP Math used like fastmath.
When building static memroy, SP math all without WOLFSSL_SP_NO_MALLOC is
a valid configuration.
Fix freeing of bigint in sp_int.c.
Cast x to a signed value to negate and then back to unsigned. (For
Windows builds.)
Remove warning about empty file on Windows about integer.obj.
Allow RSA verify only and RSA public only to be used with other public
key algorithms.
If building for FIPS, then older versions of RSA and ECC require SP Math
to support negative numbers.
Get old FIPS files building with SP int.
Disallow --enable-sp-math and --enable-sp-math-all.
When just --enable-sp-math on configuration line then disable SP Math
all.
2022-06-23 14:15:54 +10:00
Sean Parkinson
8d804f6378
Merge pull request #5260 from dgarske/sp_ecc_nb_hash
...
Fix for SP math ECC non-blocking to always check `hashLen`
2022-06-23 07:59:28 +10:00
Marco Oliverio
fdc4cdf5ec
examples: update usage() with DTLSv1.3 version
2022-06-22 18:50:18 +02:00
Sean Parkinson
acc9f3701a
Merge pull request #5261 from dgarske/sha3_shake_flags
...
Configure fixes for SHA3 and SHAKE256
2022-06-22 11:50:28 +10:00
Jacob Barthelmeh
40dda7e80f
fix XMALLOC in test and add filesystem macro guard
2022-06-21 17:24:14 -06:00
David Garske
deb0c3e6fa
Merge pull request #5272 from lealem47/skip
...
Display SKIP instead of PASS when tests skipped for make check
2022-06-21 16:06:58 -07:00
David Garske
4db7732d78
Fixes for --enable-sha3 reproducibility with small. Fixes for shake256 typo and making sure WOLFSSL_NO_SHAKE256 gets set when disabled. Replaces PR #4225 .
2022-06-21 16:02:42 -07:00
Jacob Barthelmeh
7d62fd09e4
remove subject/issuer email from altEmailNames list
2022-06-21 16:59:36 -06:00
David Garske
74d692d6d5
Fix for SP math ECC non-blocking to always check hashLen. ZD14141
2022-06-21 15:54:01 -07:00
Chris Conlon
9e1ecf3fb5
Merge pull request #5194 from TakayukiMatsuo/heaphint
2022-06-21 16:39:07 -06:00
Chris Conlon
7dbf1a5154
Merge pull request #5262 from miyazakh/qt_unit_failure
2022-06-21 16:35:37 -06:00
Chris Conlon
bd536d3c9d
Merge pull request #5229 from miyazakh/sce_example_update
2022-06-21 16:33:54 -06:00
Lealem Amedie
40d9473e6a
Display SKIP instead of PASS when tests skipped for make check
2022-06-21 13:11:08 -07:00
David Garske
b8cff49044
Merge pull request #5268 from anhu/micrium_dtls_guard
...
Fix missing WOLFSSL_DTLS guard in Micrium build
2022-06-21 12:01:47 -07:00
Anthony Hu
099afe4419
errant if
2022-06-21 11:33:08 -04:00
Anthony Hu
beddc777d4
milliseconds not only for DTLS13
2022-06-21 11:07:19 -04:00
Anthony Hu
f05bcb30e0
div by 4 in milliseconds
2022-06-21 10:48:48 -04:00
Anthony Hu
ff4eabb17f
same fix to MicriumReceive
2022-06-21 10:42:20 -04:00
Anthony Hu
1e84d1eb67
Change inspired by Rizlik review comments.
2022-06-21 10:22:44 -04:00
David Garske
d41745cd28
Merge pull request #5269 from anhu/micrium_xstr
...
Fixup XSTR processing for MICRIUM
2022-06-20 16:23:06 -07:00
Anthony Hu
0b0518bd55
Fixup XSTR processing for MICRIUM
2022-06-20 17:00:24 -04:00
Anthony Hu
73435389ed
Fix missing WOLFSSL_DTLS in Micrium build
2022-06-20 16:33:04 -04:00
David Garske
38ac96aefb
Merge pull request #5267 from douzzer/20220620-multi-test-fixes
...
20220620-multi-test-fixes
2022-06-20 12:13:39 -07:00
Daniel Pouzzner
69ca1d37c0
fixes for defects identified by wolfssl-multi-test: whitespace, missing void in arg lists, and -Wunused-but-set-variable found by clang-15 (prerelease).
2022-06-20 10:54:55 -05:00
Stanislav Klima
7c827d3a82
requested review changes
2022-06-20 11:27:09 +02:00
David Garske
db6c14e7f9
Merge pull request #5265 from SparkiDev/dh_api_names
...
DH: Fix names wolSSL_* -> wolfSSL_*
2022-06-19 20:24:12 -07:00
Sean Parkinson
fab05f2527
DH: Fix names wolSSL_* -> wolfSSL_*
2022-06-20 08:58:35 +10:00
Sean Parkinson
59e19cfd6c
Merge pull request #5258 from dgarske/stm32u5_bench
...
Fixes for STM32 Hash/PKA and additional benchmark
2022-06-20 08:33:25 +10:00
Hideki Miyazaki
b5cac49be9
fix qt_unit_test_failure
...
add/remove spaces and line-feed to be the same as before
2022-06-18 10:04:10 +09:00
David Garske
390908bccc
Merge pull request #5236 from SparkiDev/mem_zero
...
Check memory is zeroized
2022-06-17 12:01:34 -07:00
David Garske
92fcea39db
Fix for DES3 with STM32 and STM32_CRYPTO_AES_ONLY (broken in #5223 ) . Add U5 PKA support and benchmarks. Fix MD5 with OPENSSL_EXTRA and HAVE_MD5_CUST_API.
2022-06-17 11:50:29 -07:00
David Garske
9c5821569f
For STM32 hashing to wait for hash done on block size + 1 word. Updated the STM32U5 benchmarks. Added note about new GCM_TABLE_4BIT.
2022-06-17 09:07:45 -07:00
David Garske
2f6b5a97a4
Merge pull request #5257 from SparkiDev/i2d_RSA_fix
...
i2d AIPs move pointer on when a pointer to a buffer is passed in
2022-06-16 21:44:23 -07:00
Sean Parkinson
6a0682d422
i2d AIPs move pointer on when a pointer to a buffer is passed in
...
Restore behaviour to be compatible with OpenSSL.
Replace comparison of DER data using AsserStrEQ to use memcmp.
2022-06-17 12:36:06 +10:00
Sean Parkinson
66775d90d4
Merge pull request #5250 from dgarske/rsa_public
...
Fix to expose the RSA public DER export functions with certgen
2022-06-17 12:25:19 +10:00
Sean Parkinson
4fc709d2af
Merge pull request #5256 from dgarske/cert_chain_der
...
Fixes for loading a DER/ASN.1 certificate chain
2022-06-17 11:55:49 +10:00
David Garske
6795e1bf21
Attempt to fix issue with duplicate prototype wc_RsaKeyToPublicDer with FIPS v2 selftest.
2022-06-16 16:51:51 -07:00
David Garske
e34dda9383
Fix to expose the RSA public DER export function with certgen. The core function SetRsaPublicKey was being compiled, but the wrappers wc_RsaKeyToPublicDer and wc_RsaKeyToPublicDer_ex were not included.
2022-06-16 16:36:17 -07:00
David Garske
128ebf54e9
Fix for loading certificate DER chain longer than 2 deep. Fix to properly trap BUFFER_E in ProcessUserChain. ZD14048.
2022-06-16 16:19:37 -07:00
Hideki Miyazaki
fe8169c830
Add multi thread use case for RA6M4
...
fix devId conflict while using multi threads
update README
Fix TSIP examples bcause of updating user context
2022-06-17 07:44:12 +09:00
Sean Parkinson
2834c22ce0
Merge pull request #5204 from lealem47/basicConst
...
Encoding the X509 Basic Constraint when CA:FALSE
2022-06-17 08:33:57 +10:00
David Garske
f2abf1892c
Merge pull request #5255 from lealem47/i2d_RSA
...
Call RSA_To_Der instead of RSA_To_Der_ex in i2dd_RSA key funcs
2022-06-16 14:43:58 -07:00
David Garske
1322c1a0b2
Merge pull request #5248 from lealem47/no_aes
...
Fix build failure caused by missing NO_AES macro guard
2022-06-16 13:18:09 -07:00
Lealem Amedie
911f361285
Call RSA_To_Der instead of RSA_To_Der_ex in i2d_RSA key funcs
2022-06-16 12:26:47 -07:00
David Garske
8c0157c035
Merge pull request #5253 from rizlik/clang_uninit
...
kdf: fix clang uninitialized.Assign
2022-06-16 11:06:43 -07:00
John Safranek
8f7db87f01
Merge pull request #5249 from dgarske/rsa_ifc
...
Cleanup the RSA consistency check
2022-06-16 09:14:08 -07:00
Lealem Amedie
5e63740c6c
Ensuring that X509 Basic Constraint is set when CA:FALSE
2022-06-16 08:46:52 -07:00
David Garske
7560199f18
Merge pull request #5254 from rizlik/nigthly_fixes
...
dtls: abide deadstore static analyzer warnings
2022-06-16 07:42:38 -07:00
David Garske
8f0da12824
Merge pull request #5252 from SparkiDev/mod_zero
...
TFM: mp_exptmod_ex didn't handle exceptional cases
2022-06-16 07:42:17 -07:00
Marco Oliverio
6a0c6049ce
dtls: abide deadstore static analyzer warnings
2022-06-16 14:02:09 +02:00
Marco Oliverio
621f4f14af
kdf: fix clang uninitialized.Assign
...
commit f1ce0cc95d tigger static analyzer warnings
about unitialized assign.
2022-06-16 13:55:46 +02:00
David Garske
6d2a41b9fd
Enable wolfSSL SP Math all (sp_int.c) by default. If --enable-fastmath or USE_FAST_MATH is set the older tfm.c fast math will be used. To use the old integer.c heap math use --enable-heapmath or USE_INTEGER_HEAP_MATH.
2022-06-16 10:57:30 +10:00
Sean Parkinson
8145ee6cef
TFM: mp_exptmod_ex didn't handle exceptional cases
...
fp_exptmod_ex() changed to match execptional case handling in
fp_exptmod().
2022-06-16 10:47:00 +10:00
Sean Parkinson
1b29f7353a
Check memory is zeroized
...
Add a define WOLFSSL_CHECK_MEM_ZERO to turn on code that checks that
memory that must be zeroized before going out of use is zero.
Everytime sensitive data is put into a allocated buffer or stack buffer;
the address, its length and a name is stored to be checked later.
Where the stack buffer is about to go out of use, a call is added to
check that the required parts are zero.
wc_MemZero_Add() adds an address with length and name to a table of
addressed to be checked later.
wc_MemZero_Check() checks that the memory associated with the address is
zeroized where required.
mp_memzero_add() adds mp_int's data pointer with length and name to
table.
mp_memzero_check() checks that the data pointer is zeroized where
required.
Freeing memory will check the address. The length was prepended on
allocation.
Realloction was changed for WOLFSSL_CHECK_MEM_ZERO to perform an
allocate, check, copy, free.
2022-06-16 10:22:32 +10:00
Takashi Kojo
8f68e32ef1
initial tranlation of API headers in JA
2022-06-16 08:24:18 +09:00
David Garske
7e1549c684
Cleanup the RSA consistency check. Should only be enabled for FIPS v2 (3389), FIPS v5 or later. Can be forcefully enabled for non-FIPS using WOLFSSL_RSA_KEY_CHECK. The existing WOLFSSL_NO_RSA_KEY_CHECK macro will also disable it. This change was introduced in PR #4359 .
2022-06-15 14:46:23 -07:00
David Garske
fb704774a0
Merge pull request #4907 from rizlik/dtls13
...
DTLSv1.3 support
2022-06-15 13:57:02 -07:00
Lealem Amedie
9bcbd645d6
Fix build failure caused by missing NO_AES macro guard
2022-06-15 13:30:56 -07:00
David Garske
dab0d5a7b0
Merge pull request #5240 from SparkiDev/sp_armv6
...
SP ARM32: support for arch with no ldrd/strd and clz
2022-06-15 11:28:30 -07:00
David Garske
d9d8b7e2d8
Merge pull request #5245 from SparkiDev/force_zero
...
Memory zeroization fixes
2022-06-15 11:16:04 -07:00
David Garske
aa8df1af78
Fixes for building without DTLS v1.2 and TLS v1.2. Fixes for explicit cast warnings.
2022-06-15 10:49:18 -07:00
Marco Oliverio
3a9176bcc9
scripts: test for dtls13 retransmission
...
Co-authored-by: Juliusz Sosinowicz <juliusz@wolfssl.com >
2022-06-15 10:46:43 -07:00
Marco Oliverio
25cf98a417
test: add DTLSv1.3 test suites
2022-06-15 10:46:43 -07:00
Marco Oliverio
12a3efeca8
client/server: tolerate WANT_WRITE errors
2022-06-15 10:46:43 -07:00
Marco Oliverio
4e112419f5
examples: client/server: support DTLSv1.3 (-u -v4)
...
This commits add some new options to examples/[server,client] to support testing
of DTLS v1.3.
client: add waitTicket option
If this option is used, the client will wait until it receives a sessionTicket
from the server. This is useful when testing DTLS retransmission.
client: add waitKeyUpdate option
When this option is set, the client waits until the UpdateKey message is
acknowledged by the server. This is useful to test DTLS retransmission logic
2022-06-15 10:46:43 -07:00
Marco Oliverio
c1dc90d9b0
server: request cert only once if doing post-handshake auth
2022-06-15 10:46:43 -07:00
Marco Oliverio
ca05ad2dc0
dtls13: introduce wolfSSL_dtls_13_has_pending_msg() API
2022-06-15 10:46:43 -07:00
Marco Oliverio
e2abdf23a7
internal: return from wolfSSL_Peek() with sz 0 if we don't have data
...
This way we can use wolfSSL_Peek() invoked with sz == 0 to process pending
records and, if none of this records is an application data record, we will not
block.
2022-06-15 10:46:43 -07:00
Marco Oliverio
dfc9873c0f
dtls13: support KeyUpdate messages
2022-06-15 10:46:43 -07:00
Marco Oliverio
d1924928c0
dtls13: support retransmission
...
Introduce ACK and retransmission logic, encapsulated in a Dtls13RtxFsm
object. The retransmission or the sending of an ACK is scheduled by setting the
appropriate flag inside the Dtls13RtxFSM object but the actual writing on the
socket is deferred and done in wolfSSL_Accept/Connect.
* Retransmission
Each sent message is encapsulated in a Dtl13RtxRecord and saved on a list. If we
receive an ACK for at record, we remove it from the list so it will be not
retransmitted further, then we will retransmit the remaining
ones. Retransmission is throttled: beside link congestion, this also avoid too
many sequence numbers bounded with a record.
* ACK
For each received record we save the record sequence number, so we can send an
ACK if needed. We send an ACK either if explicitly needed by the flight or if we
detect a disruption.
Co-authored-by: Juliusz Sosinowicz <juliusz@wolfssl.com >
2022-06-15 10:46:43 -07:00
Marco Oliverio
d079662765
dtls13: support fragmentation, sending and receiving
...
This commit implements the core of the header parsing, building, and the sending
and receiving routines that handle fragmentation and defragmentation.
* In DTLSv1.3 the header used for protected messages is a variable-length header,
and it is described RFC9147 Section 4.
* Fragmentation happens after building the full message, if necessary. If the
underlying I/O can't send a fragment because of a WANT_WRITE error, the sending
of fragments will continue in the next invocation of
wolfSSL_connect/wolfSSL_accept/wolfSSL_write. In this case the message is saved
in a buffer inside the WolfSSL object.
* Defragmentation works like DTLSv1.2 defragmentation, and re-use
most of the same code.
* The Dtls13AddHeaders() function does not add the record layer header, but it
lefts space for it. It is eventually placed by BuildTls13Message() to allow
easier management of sequence numbers.
2022-06-15 10:46:43 -07:00
Marco Oliverio
173077b142
dtls: refactor DtlsUpdateWindow() window
...
split the DtlsUpdateWindow() function, so part of the code can be reused by
DTLSv1.3 code.
2022-06-15 10:46:43 -07:00
Marco Oliverio
30fb664163
internal.c: add runProcessingOneRecord section
...
DTLSv1.3 needs to do some operation per-record, this commit adds an appropriate
section to ProcessReplyEx.
2022-06-15 10:46:43 -07:00
Marco Oliverio
2696c3cdd3
dtls13: change encryption keys dynamically based on the epoch
...
In DTLSv1.3, because of retransmission and reordering, we may need to encrypt or
decrypt records with older keys. As an example, if the server finished message
is lost, the server will need to retransmit that message using handshake traffic
keys, even if he already used the traffic0 ones (as, for example, to send
NewSessionTicket just after the finished message).
This commit implements a way to save the key bound to a DTLS epoch and setting
the right key/epoch when needed.
2022-06-15 10:46:43 -07:00
Marco Oliverio
de04973051
dtls13: record number encryption and decryption
2022-06-15 10:46:43 -07:00
Marco Oliverio
60834ba516
dtls13: new methods and version negotiation
2022-06-15 10:46:42 -07:00
Marco Oliverio
9d22e11776
misc.c: introduce w64wrapper to handle 64bit numbers
...
as word64 is not always available, introduce an abstract type and companion
operations. They use a word64 if available and fallback on word32[2] otherwise.
2022-06-15 10:46:42 -07:00
Marco Oliverio
7586851734
dtls13: export functions
...
They will be used by DTLSv1.3 code
2022-06-15 10:46:42 -07:00
Marco Oliverio
d8ac35579c
dtls13: add autotools, cmake build options and vstudio paths
2022-06-15 10:46:42 -07:00
John Safranek
d51ba35ff9
Merge pull request #5246 from rizlik/dtls_header_fixes
...
dtls: handshake header parsing fixes
2022-06-15 09:33:41 -07:00
Marco Oliverio
6630a83182
dtls: handshake header parsing fixes
2022-06-15 12:00:26 +02:00
Sean Parkinson
e073500e8e
SP ARM32 ASM: Improve performance of P-256 mont mul/sqr
2022-06-15 16:39:13 +10:00
Sean Parkinson
af4fff80db
SP ARM32: support for arch with no ldrd/strd and clz
...
Defined WOLFSSL_SP_ARM_ARCH to be less than 7 to use alternative
instructions.
2022-06-15 12:07:49 +10:00
Sean Parkinson
f1ce0cc95d
Memory zeroization fixes
...
Zeroize secrets in stack buffers and allocated memory.
mp_forcezero to ensure private MP integers are zeroized.
Fix whitespace and add some comments.
2022-06-15 11:26:11 +10:00
Sean Parkinson
9656963f61
Merge pull request #5231 from dgarske/glitch_harden
...
Added sanity check on TLS encrypt to trap against glitching
2022-06-15 09:48:18 +10:00
Sean Parkinson
ed5470c991
Merge pull request #5239 from dgarske/asn_decode_ext
...
Fix for ASN template parsing of extended key usage
2022-06-15 09:29:44 +10:00
David Garske
0cac6cef39
Merge pull request #5237 from anhu/bench_psk
...
Support psk ciphersuites in benchmarks.
2022-06-14 16:12:15 -07:00
David Garske
ed6c9639d6
Merge pull request #5243 from douzzer/20220614-multi-test-fixups
...
20220614-multi-test-fixups
2022-06-14 16:11:44 -07:00
Daniel Pouzzner
f414e65d4b
linuxkm: eliminate duplicative WOLFSSL_KTHREADS macro (just use WOLFSSL_LINUXKM).
2022-06-14 12:45:30 -05:00
David Garske
2f4864cab2
Added sanity check on TLS encrypt to trap against glitching.
2022-06-14 09:37:44 -07:00
David Garske
7a25b9cd85
Merge pull request #5241 from SparkiDev/wycheproof_sp_arm64_asm
...
SP ASM: fixes for Wycheproof tests
2022-06-14 09:08:15 -07:00
Anthony Hu
22eee3206d
Fixups from review by dgarske
2022-06-14 11:13:28 -04:00
Daniel Pouzzner
a22da10956
linuxkm: tweak setup of wolfSSL_Mutex to assure complete type availability in applications (client modules).
2022-06-14 09:45:33 -05:00
Daniel Pouzzner
5a8c130040
fix whitespace
2022-06-14 09:43:05 -05:00
Stanislav Klima
a0dd92234b
draft
2022-06-14 13:37:49 +02:00
David Garske
fb10c90935
Fix for Cube HAL v2 back-to-back DES/DES3. Whitespace. Enable the new FIFO 16 block logic for all hardware that supports it.
2022-06-14 11:48:51 +02:00
David Garske
c52c2e5dfb
Fixes for STM32H7 hash and crypto.
2022-06-14 11:48:51 +02:00
David Garske
ad3f7e1de2
The STM32U5 does not support DES3 or AES 192-bit (only 128/256 bit)
2022-06-14 11:48:51 +02:00
David Garske
502cbc3847
Fix for STM32U5 hash/crypto support. ZD 14305.
2022-06-14 11:48:51 +02:00
Sean Parkinson
013066ca06
SP ASM: fixes for Wycheproof tests
...
ARM64 ASM: Fix P256 Montogomery Reduce.
Fix div to handle large dividend word.
2022-06-14 16:11:46 +10:00
David Garske
c0f49b57e1
Fix for ASN template parsing of DecodeExtKeyUsage. ZD 14344.
2022-06-13 16:50:20 -07:00
David Garske
af3a55a94c
Merge pull request #5220 from kaleb-himes/ZD14318
...
Resolves inter-library API conflict reported in ZD14318
2022-06-13 14:28:13 -07:00
David Garske
f401a3b53d
Merge pull request #5232 from cconlon/june10
...
test/benchmark.c: rename Android tag, reset vars in memcb_test()
2022-06-13 14:24:17 -07:00
Anthony Hu
4d4ee3b2db
Support psk ciphersuites in benchmarks.
...
Also fixed some small errors during shutdown in benchmarks.
Tested with:
./configure --enable-psk CFLAGS=-DWOLFSSL_STATIC_PSK
make all check
./examples/benchmark/tls_bench
2022-06-13 13:33:51 -04:00
Chris Conlon
364bf482eb
adjust wolfCrypt test/benchmark Android log TAG name, reset malloc/free counts in memcb_test()
2022-06-13 09:42:02 -06:00
David Garske
0b78961111
Merge pull request #5186 from SparkiDev/pk_c_rework_1
...
pk.c: rework
2022-06-13 08:35:09 -07:00
David Garske
5018da7f9f
Merge pull request #5234 from gojimmypi/PR_Espressif_Version_README
...
Add note regarding ESP-IDF Version
2022-06-13 08:34:25 -07:00
David Garske
9ee1833bd2
Merge pull request #5235 from SparkiDev/sess_sec_cb_fixup
...
Improve SessionSecret_callback code.
2022-06-13 08:21:45 -07:00
Sean Parkinson
1de54ed8d7
Improve SessionSecret_callback code.
2022-06-13 10:43:09 +10:00
Sean Parkinson
8899112456
Merge pull request #5230 from dgarske/tls_bench
...
Fix for TLS v1.1 length sanity check for large messages
2022-06-13 09:38:03 +10:00
gojimmypi
f35eb20954
Add note regarding ESP-IDF Version
2022-06-12 12:39:04 -07:00
David Garske
d5791d5c74
Fixes for TLS benchmarking app (tls_bench) for shutdown and formatting brace cleanups.
2022-06-10 13:48:46 -07:00
David Garske
cafe5646b6
Fix for TLS v1.1 length sanity check for large messages.
2022-06-10 13:35:06 -07:00
David Garske
afc63a3bfa
Merge pull request #5199 from embhorn/zd12999
...
Add doc for wolfSSL_dtls_retransmit
2022-06-10 10:57:17 -07:00
David Garske
d600a4b887
Spelling and Whitespace cleanups. Fix issue with trying to build pk.c directly and always getting warn even with WOLFSSL_IGNORE_FILE_WARN.
2022-06-10 09:06:55 -07:00
David Garske
ba3991af5e
Merge pull request #5228 from haydenroche5/strongswan
...
Add an --enable-strongswan option to configure.ac.
2022-06-10 08:19:32 -07:00
David Garske
49008b169c
Merge pull request #5087 from haydenroche5/x509_print
...
Add support for more extensions to wolfSSL_X509_print_ex.
2022-06-10 08:19:23 -07:00
Jacob Barthelmeh
c59ec54713
initialize variable to fix warning
2022-06-10 06:22:54 -06:00
Jacob Barthelmeh
ba20f54b5b
add UPN other name parsing and updating skip
2022-06-09 21:32:55 -06:00
Sean Parkinson
890abfbefc
pk.c: rework
...
Re-order RSA functions.
Add comments to RSA functions.
Rework RSA function implementations.
2022-06-10 09:54:32 +10:00
David Garske
df673b987e
Merge pull request #5227 from LinuxJedi/embOS-emNET
...
Support for SEGGER embOS and emNET
2022-06-09 08:04:29 -07:00
David Garske
9954afa538
Merge pull request #5222 from tmael/rsa_sanity
...
Add a sanity check in RsaPad_OAEP
2022-06-09 08:04:16 -07:00
Hayden Roche
f479600066
Add support for more extensions to wolfSSL_X509_print_ex.
...
- Key usage
- Extended key usage
- Subject alt name
Additionally, print out the criticality of the extensions.
2022-06-09 16:50:10 +02:00
Hayden Roche
df87eb5508
Add an --enable-strongswan option to configure.ac.
...
Also, clean up some repetition around adding `-DHAVE_OCSP`.
2022-06-09 16:24:41 +02:00
Andrew Hutchings
190476dafe
Support for SEGGER embOS and emNET
...
Adds support for embOS memory and mutex functions. Also adds support for
emNET's error codes, it uses a BSD compatible TCP/IP stack for network
functions.
There is no easy native way to detect that you are compiling with emNET
or embOS so these require the user to define WOLFSSL_EMBOS /
WOLFSSL_EMNET.
2022-06-09 11:34:55 +01:00
Tesfa Mael
2748bfc737
Add a check in RsaPad_OAEP
2022-06-08 10:07:26 -07:00
David Garske
9fb1143eba
Merge pull request #5218 from gojimmypi/PR_zepher_legacy_link
...
add link to new location for old zephyr references
2022-06-07 16:40:14 -07:00
kaleb-himes
37ee5e2540
Resolves inter-library API conflict reported in ZD14318
2022-06-07 14:48:27 -06:00
David Garske
85e18b2f06
Merge pull request #5219 from douzzer/20220607-strlcpy
...
use XSTRLCPY() and XSTRLCAT() in EncryptDerKey()
2022-06-07 09:34:40 -07:00
Daniel Pouzzner
088d378ba4
ssl.c:EncryptDerKey(): use XSTRLCPY() and XSTRLCAT() to build up cipherInfo, and remove XSTRCPY() macro from wolfssl/wolfcrypt/types.h (clang-tidy hates on it, albeit frivolously).
2022-06-07 08:22:48 -05:00
gojimmypi
047ed8ef61
minor change for commit author update
2022-06-06 16:47:40 -07:00
David Garske
fbb6faaa2f
Merge pull request #5191 from SparkiDev/sp_win_asm_xmm_nv
...
SP Winx64 ASM: XMM6-15 are non-volatile
2022-06-06 15:58:10 -07:00
David Garske
3c634e1f59
Merge pull request #5217 from SparkiDev/pk_enc_mem_2
...
ECC, DH: improve encrypted memory implementations
2022-06-06 15:27:10 -07:00
Daniel Pouzzner
711a900ff7
Merge pull request #5214 from lealem47/ghostFunc
...
Removing ghosts and updating defines in openssl/buffer.h
2022-06-06 17:05:33 -05:00
JacobBarthelmeh
4ffa63c938
Merge pull request #5216 from kojo1/static-mem
...
wc_MakeRsKey with Static memory pool
2022-06-06 14:42:32 -07:00
JacobBarthelmeh
86023378f8
free decoded cert in test case and x509
2022-06-06 14:31:41 -07:00
gojimmypi
8e69b1fa0e
add include.am
2022-06-06 13:10:37 -07:00
Lealem Amedie
07e0a6fa8e
Removing ghost functions and fixing overflow warning in ssl.c
2022-06-06 11:33:26 -07:00
David Garske
86312be79e
Merge pull request #5210 from kaleb-himes/new-azsphere-rev3
...
New azsphere example for CI testing
2022-06-06 10:00:43 -07:00
JacobBarthelmeh
2cd9ca0c8f
add support for asn template build
2022-06-06 09:42:03 -07:00
gojimmypi
927ee21752
add link to new location for old references
2022-06-06 08:39:40 -07:00
Sean Parkinson
0bcd38f7d8
ECC, DH: improve encrypted memory implementations
2022-06-06 08:40:09 +10:00
Takashi Kojo
7bfe6aa127
Extend HEAP_HINT to all InitRsaKey in api.c
2022-06-05 09:12:49 +09:00
David Garske
eb28d38fa8
Merge pull request #5212 from kaleb-himes/various-warnings
...
Fix various warnings and an uninitialized XFILE
2022-06-04 17:10:17 -07:00
Takashi Kojo
1b9f922ec3
wc_MakeRsKey with static mem pool
2022-06-05 09:04:42 +09:00
TakayukiMatsuo
dbfa207344
Merge pull request #5116 from embhorn/zd14172
...
Fix TSIP build with NO_AES_CBC
2022-06-04 17:51:16 +09:00
David Garske
802e3127c0
Merge pull request #5145 from JacobBarthelmeh/caam
...
CAAM support with QNX i.MX8, add AES-CTR crypto callback
2022-06-03 15:24:10 -07:00
kaleb-himes
873b2169f9
Add readme to include.am
2022-06-03 13:33:12 -06:00
David Garske
2af09a7151
Merge pull request #5205 from haydenroche5/evp_cipher_aes_gcm
...
Fix another AES-GCM EVP control command issue.
2022-06-03 11:47:57 -07:00
kaleb-himes
30d836dc90
Implement peer review feedback
2022-06-03 11:34:02 -06:00
kaleb-himes
96d5814bfe
Implement peer review feedback
2022-06-03 11:06:46 -06:00
David Garske
debb598499
Merge pull request #5008 from tmael/vx_6x
...
Add support for VxWorks 6.x
2022-06-03 09:40:39 -07:00
David Garske
1bb2a35164
Merge pull request #5207 from anhu/longer_sigalg_list
...
For inter-op with OQS's OpenSSL fork, support longer sigalg list.
2022-06-03 09:24:38 -07:00
JacobBarthelmeh
fdaf418fe0
fix spelling and remove dead else statement
2022-06-03 09:21:27 -07:00
kaleb-himes
3bcdef1972
Fix various warnings and an uninitialized XFILE
2022-06-03 09:52:53 -06:00
Chris Conlon
8fbd4d70e6
Merge pull request #5209 from TakayukiMatsuo/fix14172
2022-06-03 09:07:01 -06:00
kaleb-himes
e30ae359a4
Fix build err missing XSTRNCASECMP
2022-06-03 08:17:39 -06:00
kaleb-himes
55f3b7c277
New azsphere example for CI testing
2022-06-03 08:04:50 -06:00
TakayukiMatsuo
42754ce98b
Exclude calling some funcs when WOLFSSL_AEAD_ONLY is defined
2022-06-03 14:47:41 +09:00
Sean Parkinson
64eaf74e83
Merge pull request #5206 from dgarske/user_settings
...
Fixes for user settings with SP ASM and ED/Curve25519 small
2022-06-03 09:25:17 +10:00
Sean Parkinson
ee78e63b87
Merge pull request #5203 from dgarske/zd14289
...
Fix the supported version extension to always check minDowngrade
2022-06-03 08:31:36 +10:00
David Garske
8307a55429
Fixes --enable-usersettings with SP ASM and ED/Curve25519 small CURVED25519_SMALL.
2022-06-02 14:17:25 -07:00
David Garske
a6465c2bd0
Merge pull request #5202 from julek-wolfssl/wolfssl-multi-test/send-alert-refactor
...
wolfssl-multi-test fixes
2022-06-02 14:08:46 -07:00
Anthony Hu
0cda12d446
For inter-op with OQS's OpenSSL fork, support longer sigalg list.
2022-06-02 16:52:35 -04:00
Hayden Roche
fb3c611275
Fix another AES-GCM EVP control command issue.
...
With PR 5170, I added logic that requires a EVP_CTRL_GCM_SET_IV_FIXED command be
issued before a EVP_CTRL_GCM_IV_GEN command. This matches OpenSSL's behavior.
However, OpenSSL also clears the flag enabling EVP_CTRL_GCM_IV_GEN after
EVP_CTRL_GCM_SET_IV_FIXED if EVP_CipherInit is called with a NULL key.
Otherwise, the flag retains its value. We didn't mirror this logic, and that
caused problems in OpenSSH unit testing. This commit aligns our logic with
OpenSSL's and adds a regression test to test_evp_cipher_aes_gcm for this case.
2022-06-02 12:32:59 -07:00
David Garske
2dd27c8d4a
Fix the supported version extension to check the ssl->options.minDowngrade always.
2022-06-02 11:17:25 -07:00
Tesfa Mael
cd008aac6a
Add support for VxWorks 6.x
...
Use rand_r and define SEM_ID_NULL
Fix redefinition of typedef 'SOCKADDR'
2022-06-02 09:54:27 -07:00
David Garske
56c48b31ad
Merge pull request #5105 from tmael/rsa_oaep_nomalloc
...
Support RSA OAEP with nomalloc
2022-06-02 08:45:01 -07:00
Daniel Pouzzner
2e307e1cd3
tls13.c: fix null pointer deref in FreeDcv13Args().
2022-06-02 10:32:05 -05:00
Juliusz Sosinowicz
3d71956b48
wolfssl-multi-test fixes:
...
- Remove RetrySendAlert and SendAlert recursion
- args possible NULL dereference
2022-06-02 16:08:25 +02:00
Sean Parkinson
fb9f90b98b
Merge pull request #5200 from dgarske/qat_fsanitize
...
Fixes for buffers when testing with Intel QAT hardware
2022-06-02 08:35:24 +10:00
Juliusz Sosinowicz
9f2e3a2405
Merge pull request #5198 from dgarske/qat_ecc_marker
2022-06-01 21:35:47 +02:00
David Garske
5672e2a885
Fixes for buffers when testing with Intel QAT hardware and fsanitize=address:
...
* PKCS7 should use allocated buffer for RSA.
* PKCS7 small stack typo for `keyAlgArray` size in `wc_PKCS7_AddRecipient_KTRI`.
* Fix for use of `free`, which should be `XFREE` in api.c.
* Cleanup old RSA benchmarking MDK5/WINCE code no longer needed with `WC_DECLARE_ARRAY_DYNAMIC_DEC` and `WC_DECLARE_ARRAY_DYNAMIC_EXE`.
2022-06-01 12:07:57 -07:00
Hayden Roche
8b9d2ad657
Merge pull request #5196 from douzzer/20220601-multi-test-fixes
2022-06-01 11:41:26 -07:00
David Garske
9cfcdfc7aa
Merge pull request #5149 from julek-wolfssl/store-frags-v2
...
Re-use async to support WANT_WRITE while sending fragments
2022-06-01 10:52:54 -07:00
Eric Blankenhorn
2543970419
Add doc for wolfSSL_dtls_retransmit
2022-06-01 12:03:36 -05:00
David Garske
cced5bd700
Merge pull request #5195 from LinuxJedi/ULL-fix
...
Fix 64bit postfix for constants
2022-06-01 09:40:26 -07:00
David Garske
19c51dac45
Fix for QAT ECC to gate use of HW based on marker. Introduced in PR #4997 .
2022-06-01 09:36:21 -07:00
David Garske
494a9fe41a
Merge pull request #5193 from SparkiDev/tls13_send_ticket
...
TLS 1.3: send ticket
2022-06-01 08:37:52 -07:00
Daniel Pouzzner
b212853bce
evp.c: in EvpCipherAesGCM(), make sure ctx->gcmAuthIn is non-null before clearing it; fix whitespace.
2022-06-01 10:29:40 -05:00
Juliusz Sosinowicz
d29c656d4f
SendAlert: clear output buffer to try and send the alert now
2022-06-01 16:48:57 +02:00
Andrew Hutchings
11a7756527
Fix 64bit postfix for constants
...
GCC 4.0.4 PowerPC 32bit cross-compiler complains when `UL` is used
instead of `ULL` for 64bit constants.
2022-06-01 15:04:29 +01:00
Juliusz Sosinowicz
df10e1fad2
Store RetrySendAlert error in ssl->error
2022-06-01 14:59:10 +02:00
TakayukiMatsuo
13135e72db
Add a global variable for heap-hint, mainly in case heap info cannot be referenced by TSIP
2022-06-01 10:24:03 +09:00
Sean Parkinson
be743b2204
TLS 1.3: send ticket
...
Can send a new session ticket any time after handshake is complete with
TLS v1.3.
Added API for server application to do this.
Added tests.
2022-06-01 10:36:01 +10:00
Sean Parkinson
3944a8737a
WIN64: compiling with __clang__ _udiv128 not defined
2022-06-01 08:54:57 +10:00
Sean Parkinson
dd0b9fb871
SP Winx64 ASM: XMM6-15 are non-volatile
...
Put the used non-volatile XMM registers on the stack at the start and
get them off again at the end.
2022-06-01 08:46:27 +10:00
Sean Parkinson
81cd1e652e
Merge pull request #5170 from haydenroche5/evp_cipher_aes_gcm
...
Fix EVP_CTRL_GCM_IV_GEN with AES-GCM.
2022-06-01 08:20:33 +10:00
Juliusz Sosinowicz
c74315f1ef
Save pending alerts when using async io
...
- Don't overwrite ssl->error
- Clear the error in ssl->error because the return of SendBuffered is now stored in ret instead
2022-05-31 18:17:11 +02:00
Chris Conlon
0554b02215
Merge pull request #5177 from JacobBarthelmeh/PKCS7
2022-05-31 09:46:14 -06:00
Chris Conlon
da91578bc7
Merge pull request #5180 from miyazakh/tsipv_up
2022-05-31 09:41:47 -06:00
David Garske
2ed85926d5
Merge pull request #5187 from kareem-wolfssl/hsHashesNull
...
Confirm ssl->hsHashes is not NULL before attempting to dereference it.
2022-05-30 10:41:35 -07:00
Juliusz Sosinowicz
8aa2da532c
Combine preproc check into one statement
2022-05-30 15:27:36 +02:00
Daniel Pouzzner
c83120d8c8
Merge pull request #5097 from tmael/c89_fixes
...
Fix for c89, use WOLF_C89
2022-05-28 08:29:42 -05:00
David Garske
baaff96045
Merge pull request #5188 from kaleb-himes/PR5174-SUPPLEMENT
...
Supplement to @julek-wolfssl's fantastic find, just allow for proper expansion
2022-05-27 20:36:20 -07:00
Juliusz Sosinowicz
6245395f34
Simulate WANT_WRITE only with async I/O support
2022-05-27 23:23:18 +02:00
David Garske
a91a2482e7
Merge pull request #5158 from anhu/ECDHE_PSK
...
Add TLS 1.2 ciphersuite ECDHE_PSK_WITH_AES_128_GCM_SHA256 from RFC 8442
2022-05-27 13:25:48 -07:00
Kareem
e061bc23f4
Fix asn1.h NOLINT comments.
2022-05-27 13:05:56 -07:00
kaleb-himes
f5bbad185f
Supplement to @julek-wolfssl's fantastic find, just allow for proper expansion
2022-05-27 13:52:26 -06:00
Juliusz Sosinowicz
8cb4819b53
Fix curve group matching on secure renegotiation
2022-05-27 21:26:55 +02:00
Juliusz Sosinowicz
84bca63b2e
Add WOLFSSL_NO_ASYNC_IO to low resource build
2022-05-27 21:26:55 +02:00
Juliusz Sosinowicz
50c0b3d2a2
Add testing/docs for blocking write
...
- Fix case where message grouping can make CheckAvailableSize return a WANT_WRITE
- CheckAvailableSize in tls13.c will not return a WANT_WRITE since it only does so for DTLS <=1.2
2022-05-27 21:26:55 +02:00
Daniel Pouzzner
decf9972bb
fix whitespace.
2022-05-27 14:22:22 -05:00
Daniel Pouzzner
8c10c3776d
wolfcrypt/src/asn.c: in C89 codepath of GetFormattedTime(), add buffer size checks before calls to sprintf().
2022-05-27 14:20:38 -05:00
Tesfa Mael
aca199cb05
Fix to compile with c89
...
strncasecmp and snprintf are unavailable in C89
use // static analyzer suppressions
2022-05-27 14:20:37 -05:00
Kareem
6e6c4500d6
Fix comments in asn1.h to use ANSI C style.
2022-05-27 11:01:29 -07:00
Kareem
98ec442b37
Confirm ssl->hsHashes is not NULL before attempting to dereference it.
2022-05-27 10:57:23 -07:00
Anthony Hu
df06db114d
Add TLS 1.2 ciphersuite ECDHE_PSK_WITH_AES_128_GCM_SHA256 from RFC 8442
...
Testing:
./autogen.sh
./configure --enable-psk
make all check
$ ./examples/server/server -j -l ECDHE-PSK-AES128-GCM-SHA256
SSL version is TLSv1.2
SSL cipher suite is TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256
SSL curve name is SECP256R1
Client message: hello wolfssl!
$ ./examples/client/client -s -l ECDHE-PSK-AES128-GCM-SHA256
SSL version is TLSv1.2
SSL cipher suite is TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256
SSL curve name is SECP256R1
I hear you fa shizzle!
2022-05-27 11:05:55 -04:00
Hideki Miyazaki
81ad463026
fix a compile error by clang
2022-05-27 11:37:26 +09:00
Juliusz Sosinowicz
4e8c362152
Allocate ssl->async seperately to the SSL object
2022-05-26 23:08:48 +02:00
Juliusz Sosinowicz
733fe1a8d3
Use WOLFSSL_ASYNC_IO for WOLFSSL_NONBLOCK_OCSP
...
- Enable ssl->async to store function arguments for non-blocking OCSP
- Remove ssl->nonblockarg
2022-05-26 23:08:48 +02:00
Juliusz Sosinowicz
c151dcec50
Re-use async to support WANT_WRITE while sending fragments
...
- Async I/O can be turned off with WOLFSSL_NO_ASYNC_IO
- WOLFSSL_ASYNC_IO functionality enabled in SendCertificateVerify() and SendServerKeyExchange() to allow safe re-entry into SendHandshakeMsg()
- Testing size of structs is refactored int WOLFSSL_ASSERT_SIZEOF_GE()
2022-05-26 23:08:48 +02:00
David Garske
f93b23b524
Merge pull request #5169 from kareem-wolfssl/miscFixes
...
Misc. fixes
2022-05-26 12:52:39 -07:00
David Garske
0b6f7c1533
Merge pull request #5176 from embhorn/zd14227
...
Fix to move wolfSSL_ERR_clear_error outside gate for OPENSSL_EXTRA
2022-05-26 08:33:52 -07:00
David Garske
ea895e99b7
Merge pull request #5184 from SparkiDev/asn_templ_make_cert_ext
...
ASN template: properly handle WOLFSSL_CERT_EXT
2022-05-26 06:53:10 -07:00
Eric Blankenhorn
2800d00bb4
Fix to move wolfSSL_ERR_clear_error outside gate for OPENSSL_EXTRA
2022-05-26 06:11:45 -05:00
Sean Parkinson
cacf5aeb7e
ASN template: properly handle WOLFSSL_CERT_EXT
...
Encoding extensions didn't properly handle WOLFSSL_CERT_EXT not being
defined.
2022-05-26 10:01:59 +10:00
Hideki Miyazaki
a5fa98e5f0
addressed code review
...
update Copyright year
2022-05-26 08:50:02 +09:00
JacobBarthelmeh
ad49aea17d
fix for setting AES-CCM decrypt nonce with crypto callback
2022-05-25 13:59:56 -07:00
David Garske
fa80aa6505
Merge pull request #5132 from JacobBarthelmeh/req
...
Add support for additional CSR attributes
2022-05-25 13:35:46 -07:00
David Garske
e8d779ab78
Merge pull request #5077 from gojimmypi/ESP8266_Development
...
Add ESP-IDF WOLFSSL_ESP8266 setting for ESP8266 devices
2022-05-25 12:46:10 -07:00
David Garske
17d7098bf6
Merge pull request #5168 from rizlik/dtls_resume
...
internal.c: dtls: HelloVerifyRequest on resumption
2022-05-25 11:23:08 -07:00
David Garske
2d8cc055f0
Merge pull request #5179 from SparkiDev/sp_armv6_fix_1
...
SP ARM32 ASM: moving large immediate value
2022-05-25 09:59:47 -07:00
David Garske
da1cbfda46
Merge pull request #5178 from cconlon/nounaligned
...
Add define to skip SHA-512 unaligned memory test in test.c
2022-05-25 09:55:29 -07:00
Hayden Roche
3cf636163b
Fix EVP_CTRL_GCM_IV_GEN with AES-GCM.
...
Discovered the AES-GCM flow using this command didn't work in our OpenSSH port.
This commit makes the behavior match OpenSSL and adds testing using known
OpenSSL-generated test vectors to prevent regressions. This was one of those
problems where two ends of a connection would work fine if they were both using
wolfSSL but not if one was using OpenSSL (i.e. OpenSSH interop with AES-GCM
was broken).
2022-05-25 07:00:15 -07:00
Daniel Pouzzner
c3e4c6b6bc
Merge pull request #5174 from julek-wolfssl/ocsp-typo
...
Typo in testing script
2022-05-25 08:16:58 -05:00
Juliusz Sosinowicz
b664cea735
Typo in testing script
2022-05-25 12:10:27 +02:00
Hideki Miyazaki
0d59d36a80
update TSIP VER to 1.15 for RX65N and RX72N
...
fix -140 error when enabling -O2
fix no_crypto_hash
2022-05-25 18:31:23 +09:00
Marco Oliverio
6c0b65d655
internal.c: dtls: HelloVerifyRequest on resumption
2022-05-25 10:38:32 +02:00
Sean Parkinson
d2cb0278f6
SP ARM32 ASM: moving large immediate value
...
ARMv6 and early doesn't support moving an immediate value larger than 8
bits. Compiler doesn't have enough spare registers to handle it.
2022-05-25 10:58:32 +10:00
JacobBarthelmeh
a1fb385450
free recipent list in error cases
2022-05-24 15:12:39 -07:00
David Garske
5aea58d1e8
Merge pull request #5175 from douzzer/20220524-shellcheck-warnings
...
20220524-shellcheck-warnings
2022-05-24 14:21:49 -07:00
David Garske
a5225af1c7
Merge pull request #4973 from JacobBarthelmeh/CSharp
...
add example C# PSK client
2022-05-24 13:37:14 -07:00
Kareem
bcb5ff5ed9
Increase MAX_ECC_STRING to include the trailing \0 for longer order strings (in eg. SECP160R1). Note that this now matches the check in wc_EccPublicKeyDecode.
2022-05-24 13:20:52 -07:00
Kareem
03e086a139
Code review feedback.
2022-05-24 13:12:59 -07:00
David Garske
74cbd08ff5
Merge pull request #5164 from cconlon/x509date
...
Remove WOLFSSL_ALT_NAMES restriction on notBefore/notAfter use in Cert struct
2022-05-24 12:41:00 -07:00
Chris Conlon
321d404d6b
add define to skip unaligned memory tests in test.c
2022-05-24 11:55:21 -06:00
Daniel Pouzzner
5c14bef6a8
global fixes for shellcheck warnings SC2027, SC2069, SC2154, SC2141, SC3014, SC3037 (all true positives). note, does not fix SC2057 in ocsp-stapling.test, which is addressed by PR #5174 .
2022-05-24 12:13:14 -05:00
Daniel Pouzzner
b66fa1680a
fix whitespace.
2022-05-24 12:13:14 -05:00
Chris Conlon
6a26dab73a
X.509 cert validity for CertFromX509() and EncodeCert() shouldn't be protected by WOLFSSL_ALT_NAMES
2022-05-24 10:28:46 -06:00
David Garske
5f148c3dcc
Merge pull request #5172 from SparkiDev/jenkins_fixes_5
...
benchmark.c: fix Jenkins failure where byte, word32 not defined
2022-05-24 08:09:47 -07:00
Sean Parkinson
fab9e29513
benchmark.c: fix Jenkins failure where byte, word32 not defined
2022-05-24 12:10:01 +10:00
Kareem
350f1d6496
Only use __builtin_offsetof on GCC 4+. It is not supported in GCC 3 or earlier.
2022-05-23 14:44:56 -07:00
Kareem
26a92977f0
Remove MCAPI project's dependency on zlib version.
2022-05-23 14:29:44 -07:00
Kareem
b329a16832
Update Zephyr fs.h path.
2022-05-23 13:45:30 -07:00
kareem-wolfssl
465a6ceb64
Merge pull request #4920 from SparkiDev/old_timing_pad_verify
...
Make old less secure TimingPadVerify implementation available
2022-05-23 13:43:59 -07:00
David Garske
6424af120c
Merge pull request #5161 from SparkiDev/sp_armv7a
...
SP ARM 32: Fixes to get building for armv7-a
2022-05-23 10:01:49 -07:00
JacobBarthelmeh
36db5ef929
add test case for UUID and FASC-N
2022-05-23 09:17:42 -07:00
JacobBarthelmeh
cdfdefe9af
improve checking on UUID getter function
2022-05-22 17:18:20 -07:00
JacobBarthelmeh
9e4de4bfc8
add FASC-N and UUID alt. name support
2022-05-22 17:18:20 -07:00
John Safranek
62cb2b4ca9
ASN.1 Additions for FPKI/CAC
...
1. Add some OIDs used in the Federal PKI Policy Authority standard.
2. Added the SubjectDirectoryAttributes extension to certificate
parsing. (limited to country of citizenship)
3. Rename constant label SUBJECT_INFO_ACCESS to SUBJ_INFO_ACC_OID
4. Added the SubjectInfoAccess extension to certificate parsing.
(limited to one URL)
5. Add the SSH extended key usage flags.
6. Use some of the template changes on the new certificate items.
2022-05-22 17:18:20 -07:00
David Garske
b5d65b9579
Merge pull request #5159 from kareem-wolfssl/fipsv3HmacMd5
...
Allow using 3DES and MD5 with FIPS 140-3, as they fall outside of the FIPS boundary.
2022-05-20 18:40:29 -07:00
David Garske
9a74745246
Merge pull request #5163 from haydenroche5/evp_pkey_derive_guard
...
Remove unneeded FIPS guard on wolfSSL_EVP_PKEY_derive.
2022-05-20 17:12:24 -07:00
Chris Conlon
ec39ee2cb6
Merge pull request #5070 from miyazakh/crypto_only_flwup
2022-05-20 17:08:29 -06:00
David Garske
d80b282fdd
Merge pull request #5156 from anhu/HAVE_AES_GCM
...
Rename HAVE_AES_GCM guard to HAVE_AESGCM in the tests.
2022-05-20 15:03:57 -07:00
David Garske
04ddd0abe4
Merge pull request #5095 from haydenroche5/decoded_cert_crit_fields
...
Make the critical extension flags in DecodedCert always available.
2022-05-20 15:03:39 -07:00
David Garske
2fc129e236
Merge pull request #5162 from rliebscher/master
...
Remove unused warning in ecc.c
2022-05-20 11:42:39 -07:00
Hayden Roche
a6b948ae59
Remove unneeded FIPS guard on wolfSSL_EVP_PKEY_derive.
2022-05-20 11:29:01 -07:00
Jacob Barthelmeh
f19b426a3f
fix for files included in make dist
2022-05-20 09:26:53 -06:00
René Liebscher
a8024a32c5
Remove unused warning in ecc.c
...
When WOLFSSL_ECIES_OLD is defined you get an unused warning
in ecc.c / wc_ecc_encrypt_ex().
Just suppress it by "using" the parameter.
2022-05-20 16:05:10 +02:00
David Garske
9427ebc5be
Merge pull request #5160 from haydenroche5/tls_unique
...
Provide access to "Finished" messages outside the compat layer.
2022-05-19 21:30:30 -07:00
Sean Parkinson
b6290f1590
Merge pull request #5157 from douzzer/20220519-multi-test-fixes
...
20220519-multi-test-fixes
2022-05-20 13:47:09 +10:00
Sean Parkinson
bc5262a5d0
SP ARM 32: Fixes to get building for armv7-a
...
Change ldrd to either have even first register or change over to ldm
with even first register.
Ensure shift value in ORR instruction has a hash before it.
Don't index loads and stores by 256 or more - make them post-index.
div2 for P521 simplified.
2022-05-20 12:15:58 +10:00
Hayden Roche
6d9fbf7ab3
Provide access to "Finished" messages outside the compat layer.
...
Prior to this commit, if you wanted access to the Finished messages from a
handshake, you needed to turn on the compatibility layer, via one of
OPENSSL_ALL, WOLFSSL_HAPROXY, or WOLFSSL_WPAS. With this commit, defining any
of these causes WOLFSSL_HAVE_TLS_UNIQUE to be defined (a reference to the
tls-unique channel binding which these messages are used for) in settings.h.
This allows a user to define WOLFSSL_HAVE_TLS_UNIQUE to access the Finished
messages without bringing in the whole compat layer.
2022-05-19 16:34:13 -07:00
Daniel Pouzzner
efc8d36aa5
configure.ac: add whitespace separators to "((" groupings to mollify shellcheck SC1105 "Shells disambiguate (( differently or not at all. For subshell, add spaces around ( . For ((, fix parsing errors."
2022-05-19 18:19:11 -05:00
Daniel Pouzzner
6984cf83b2
scripts/ocsp-stapling.test: fix whitespace.
2022-05-19 16:45:50 -05:00
JacobBarthelmeh
e35c1e5a61
setup of default build config
2022-05-19 14:54:22 -06:00
JacobBarthelmeh
8de3765af9
clean up namespace and remove settings files
2022-05-19 14:28:23 -06:00
JacobBarthelmeh
d8817266be
trim down sln
2022-05-19 13:54:07 -06:00
JacobBarthelmeh
6dc47580ce
fixing dependency for new project
2022-05-19 13:45:09 -06:00
Kareem
832a7a40a6
Allow using 3DES and MD5 with FIPS 140-3, as they fall outside of the FIPS boundary.
2022-05-19 12:06:20 -07:00
JacobBarthelmeh
249afbbfc9
update output directory and add psk client example
2022-05-19 12:11:00 -06:00
Daniel Pouzzner
5988f35593
src/wolfio.c: in EmbedReceiveFrom((), clear peer before recvfrom() to fix clang-analyzer-core.UndefinedBinaryOperatorResult; add DTLS_ prefix to macros SENDTO_FUNCTION and RECVFROM_FUNCTION, and gate their definitions on their being undefined to allow overrides.
2022-05-19 11:31:24 -05:00
Daniel Pouzzner
f2e9f5349f
wolfcrypt/src/asn.c: refactor DecodeBasicOcspResponse() to keep DecodedCert off the stack in WOLFSSL_SMALL_STACK builds.
2022-05-19 11:28:34 -05:00
Daniel Pouzzner
368854b243
scripts/: refactor TLS version support tests to use -V, rather than -v (which makes frivolous connection attempts).
2022-05-19 11:18:34 -05:00
Anthony Hu
cf81ae79e4
HAVE_AESGCM
2022-05-19 11:30:58 -04:00
Anthony Hu
9c2903c176
Remove HAVE_AES_GCM guard as it is never defined.
2022-05-19 01:20:55 -04:00
David Garske
4a3ff40eb3
Merge pull request #5138 from haydenroche5/issuer_names
...
Add ability to store issuer name components when parsing a certificate.
2022-05-18 16:56:55 -07:00
Sean Parkinson
cd41c8beaf
Merge pull request #5147 from rizlik/do_alert_reset
...
internal.c:reset input/processReply state if exiting after DoAlert()
2022-05-19 09:36:44 +10:00
Daniel Pouzzner
b53484be10
Merge pull request #5155 from cconlon/configFix
...
Fix --enable-openssh FIPS detection syntax in configure.ac
2022-05-18 17:34:43 -05:00
Chris Conlon
628a34a43d
fix --enable-openssh FIPS detection syntax in configure.ac
2022-05-18 12:52:07 -06:00
Chris Conlon
1026c7141e
Merge pull request #5148 from JacobBarthelmeh/PKCS7
2022-05-18 11:44:20 -06:00
Marco Oliverio
be172af3cd
internal.c: check that we have data before processing messages
...
We should never encounter this bug under normal circumstances. But if we enter
processReplyEx with a wrongly `ssl->options.processReply` set to
`runProcessingOneMessage` we check that we have some data.
2022-05-18 18:49:33 +02:00
Marco Oliverio
6940a5eaae
internal.c:reset input/processReply state if exiting after DoAlert()
2022-05-18 18:35:29 +02:00
John Safranek
40063f7487
Merge pull request #5109 from rizlik/dtls_peer_matching_fix
...
wolfio: dtls: fix incorrect peer matching check
2022-05-18 09:12:26 -07:00
Hideki Miyazaki
5de9c45161
resolve merge and conflict
2022-05-18 11:37:22 +09:00
David Garske
ac3fc89df9
Merge pull request #5151 from SparkiDev/tls13_premaster
...
TLS 1.3: pre-master secret zeroizing
2022-05-17 19:18:43 -07:00
Hideki Miyazaki
54a96cef06
add test case
2022-05-18 11:16:10 +09:00
Hideki Miyazaki
88abc9f3c1
addressed review comments
...
add to call wc_ecc_rs_to_sig and wc_ecc_verify_has
2022-05-18 11:16:07 +09:00
Hideki Miyazaki
c1f117413f
get crypto only compiled with openssl extra
2022-05-18 11:16:03 +09:00
Sean Parkinson
1765e2c482
Merge pull request #5150 from haydenroche5/benchmark_main_void
...
Fix main signature in benchmark.c.
2022-05-18 10:10:07 +10:00
Hayden Roche
04ff6afbad
Add ability to store issuer name components when parsing a certificate.
...
This is turned on when `WOLFSSL_HAVE_ISSUER_NAMES` is defined. This allows the
user to inspect various issuer name components (e.g. locality, organization,
etc.) by using these new fields in a `DecodedCert`.
2022-05-17 16:29:52 -07:00
Sean Parkinson
2f91028f2d
TLS 1.3: pre-master secret zeroizing
2022-05-18 08:52:38 +10:00
Hayden Roche
fd535242a0
Fix main signature in benchmark.c.
...
If `NO_CRYPT_BENCHMARK` is defined, the main function is `int main()`, but it
should be `int main(void)`.
2022-05-17 14:28:43 -07:00
Jacob Barthelmeh
8b46c95f06
macro guard for build with disable ecc
2022-05-17 11:36:09 -06:00
Tesfa Mael
d6935ed3be
Review comments
2022-05-17 09:21:20 -07:00
David Garske
c9ae021427
Merge pull request #5143 from julek-wolfssl/x509-ret-empty-name
...
Return subject and issuer X509_NAME obj even when not set
2022-05-17 09:16:54 -07:00
David Garske
50cc6d0422
Merge pull request #5139 from cconlon/opensshfips
...
Modify --enable-openssh to not enable non-FIPS algos for FIPS builds
2022-05-17 09:16:21 -07:00
Marco Oliverio
6df65c0162
wolfio: dtls: fix incorrect peer matching check
...
Ignore packet if coming from a peer of a different size *or* from a different
peer. Avoid whole memcmp of sockaddr_in[6] struct because is not portable (there
are optional fields in struct sockaddr_in).
2022-05-17 11:01:55 +02:00
Sean Parkinson
fc12c68601
Merge pull request #5146 from dgarske/kcapi_keywrap
...
Fix to allow enabling AES key wrap (direct) with KCAPI
2022-05-17 08:16:00 +10:00
Jacob Barthelmeh
1dc5e4cee5
add padding for variable ecc signature size
2022-05-16 15:26:29 -06:00
David Garske
ec619e3f35
Merge pull request #5107 from julek-wolfssl/wpas-ex-data-leak
...
Call ctx->rem_sess_cb when a session is about to be invalid
2022-05-16 13:27:08 -07:00
David Garske
579a37bdf0
Merge pull request #5117 from cconlon/getrandom
...
add support for Linux getrandom() with WOLFSSL_GETRANDOM
2022-05-16 12:36:30 -07:00
Chris Conlon
0ef4707859
Merge pull request #5137 from JacobBarthelmeh/docs
2022-05-16 12:18:14 -06:00
Juliusz Sosinowicz
7f8f0dcffe
Refactor cache ex_data update/retrieve into one function
...
- Add explicit pointer cast
2022-05-16 13:01:05 +02:00
Juliusz Sosinowicz
d996086a6d
Return subject and issuer X509_NAME obj even when not set
...
This allows the user to set the attributes of the subject and issuer name by calling X509_REQ_get_subject_name and adding attributes to it.
2022-05-16 12:49:34 +02:00
JacobBarthelmeh
fb9b96d498
fix for index increment and change test case expected return values
2022-05-13 14:07:29 -07:00
David Garske
6b1e3003fb
Merge pull request #5142 from SparkiDev/ssl_move_pk
...
ssl.c rework
2022-05-13 12:56:14 -07:00
Jacob Barthelmeh
3a4feddf75
update code for continued support with i.MX6
2022-05-13 13:21:45 -06:00
David Garske
643cd78ea2
Fix to allow enabling AES key wrap (direct) with KCAPI.
2022-05-13 11:15:32 -07:00
David Garske
1a57e3065a
Small cleanups. Missing (void), spelling and formatting. Also fixes for variations of 25519/448 build.
2022-05-13 09:24:59 -07:00
John Safranek
7305616452
Merge pull request #5080 from JacobBarthelmeh/DH
...
with WOLFSSL_NO_DH186 restriction allow odd DH param size generations
2022-05-13 08:57:33 -07:00
David Garske
50f53f9576
Merge pull request #5129 from LinuxJedi/remove-python-wrappers
...
Remove the Python wrappers from wolfSSL source
2022-05-13 08:36:33 -07:00
David Garske
630c5ef364
Merge pull request #5140 from SparkiDev/sp_fixes_7
...
SP fixes
2022-05-12 21:57:48 -07:00
Sean Parkinson
852d5169d4
ssl.c rework
...
Move the public key APIs out of ssl.c and into pk.c.
(RSA, DSA, DH and EC)
2022-05-13 11:12:44 +10:00
Sean Parkinson
eea537e5ea
Merge pull request #5124 from kaleb-himes/WIN_MULTICONFIG
...
Address issues ID'd by new windows multi-config test
2022-05-13 09:39:15 +10:00
Sean Parkinson
e8160f049e
SP fixes
...
Fix div_word without using div.
Fix ARM32 and Cortex-M builds to work for 4096 again.
2022-05-13 09:37:24 +10:00
Chris Conlon
c3a79f50d8
modify --enable-openssh to not enable non-FIPS algos for FIPS builds
2022-05-12 16:53:57 -06:00
Chris Conlon
e6ce735ed8
add support for Linux getrandom() with WOLFSSL_GETRANDOM
2022-05-12 16:51:38 -06:00
Sean Parkinson
6aaee73585
Merge pull request #5133 from rizlik/cookie_keyshare_fix
...
tls13: fix cookie has keyShare information check
2022-05-13 08:01:59 +10:00
Sean Parkinson
d1308fcdfc
Merge pull request #5122 from rizlik/tls13_pad_calc
...
internal.c: fix pad-size when more records are received at once
2022-05-13 07:59:36 +10:00
Sean Parkinson
52fc3844a6
Merge pull request #5127 from rizlik/wolfss_msg_fix
...
wolfcrypt: logging: use do{}while(0) to disable WOLFSSL_MSG* macro
2022-05-13 07:55:18 +10:00
JacobBarthelmeh
988236ca70
remove port print out
2022-05-12 13:07:04 -07:00
JacobBarthelmeh
8124368319
Merge pull request #5136 from douzzer/20220512-stderr
...
print errors to stderr, not stdout
2022-05-12 13:59:41 -06:00
Daniel Pouzzner
c4920021d8
print errors to stderr, not stdout;
...
fix whitespace in internal.c;
add missing error handling in examples/server/server.c around recvfrom().
2022-05-12 13:07:32 -05:00
Daniel Pouzzner
60864f19da
Merge pull request #5130 from JacobBarthelmeh/examples
...
print out test errors to stderr instead of stdout
2022-05-12 12:44:45 -05:00
John Safranek
2cf87a8049
Merge pull request #5084 from julek-wolfssl/zd14101-dtls-want-write
...
DTLS fixes with WANT_WRITE simulations
2022-05-12 09:36:40 -07:00
Andrew Hutchings
7316a275ae
Add EXTRA_DIST entry for include.am
2022-05-12 17:00:02 +01:00
Andrew Hutchings
c3d4c3086e
Add README to point to the new Python locations
2022-05-12 16:55:26 +01:00
David Garske
05ce8329c9
Merge pull request #5067 from miyazakh/compat_altcertchain
...
"veify ok" if alternate cert chain mode is used
2022-05-12 08:54:51 -07:00
David Garske
7a95be1a97
Merge pull request #5126 from JacobBarthelmeh/crl
...
do not error out on CRL next date if using NO_VERIFY
2022-05-12 08:44:29 -07:00
Kaleb Himes
9ca1206bf3
Merge pull request #5131 from SparkiDev/sp_win_fixes_1
...
SP: Windows build fixes
2022-05-12 09:56:27 -05:00
Juliusz Sosinowicz
44be4e1cc8
Reset ret in client and server after wolfSSL_dtls_got_timeout()
...
- Do UDP connect only with simulateWantWrite to accommodate macOS that doesn't like sendto being called on connected UDP sockets
- Call wolfSSL_dtls_get_current_timeout only on a DTLS connection
2022-05-12 16:48:04 +02:00
Juliusz Sosinowicz
9914da3046
Fix resumption failure and use range in connect state logic
2022-05-12 15:46:08 +02:00
Juliusz Sosinowicz
a31b76878f
DTLS fixes with WANT_WRITE simulations
...
- WANT_WRITE could be returned in unexpected places. This patch takes care of that.
- Change state after SendBuffered only if in a sending state to begin with.
- Adapt client and server to simulate WANT_WRITE with DTLS
2022-05-12 15:46:08 +02:00
Marco Oliverio
829e9f5277
tls13: fix cookie has keyShare information check
...
Fix the check to see if the cookie has key_share information or not (needed to
reconstruct the HelloRetryRequest). At the moment, it looks like we never send a
cookie without KeyShare extension. Indeed the HelloRetryRequest is sent only
because the client didn't provide a good KeyShareEntry in the first
ClientHello. When we will support DTLSv1.3, the HelloRetryRequest will be used
as a return-routability check and it may be sent without the KeyShare extension.
2022-05-12 12:10:58 +02:00
Marco Oliverio
8e3d7fc6f4
wolfcrypt: logging: use do{}while(0) to disable WOLFSSL_MSG* macro
...
otherwise statement of the type:
if (condtion)
WOLFSSL_MSG("");
after preprocessing will become:
if (condition)
;
The empty body emits a warning from the compiler.
2022-05-12 09:59:27 +02:00
JacobBarthelmeh
36739bca62
cleanup memory on structure free
2022-05-11 21:57:13 -07:00
Jacob Barthelmeh
818ac2b8dd
add more REQ attribute support
2022-05-11 22:27:48 -06:00
John Safranek
798d81723b
Merge pull request #5128 from rizlik/dtls_bidrectional_shutdown
...
Support DTLS bidirectional shutdown in the examples
2022-05-11 17:00:44 -07:00
Sean Parkinson
f5b0d3c0b4
SP: Windows build fixes
2022-05-12 08:25:46 +10:00
Sean Parkinson
36575ff480
Merge pull request #5125 from douzzer/20220510-strncmp-misuse
...
s/strncmp/strcmp/g
2022-05-12 08:22:00 +10:00
Hideki Miyazaki
5d93a48ddf
veify ok if alternate cert chain mode for verifyCallback
2022-05-12 06:15:18 +09:00
Jacob Barthelmeh
5caef7eaba
avoid dead store with test case
2022-05-11 11:53:17 -06:00
Jacob Barthelmeh
9bee0281cb
print out test errors to stderr instead of stdout
2022-05-11 11:40:54 -06:00
Andrew Hutchings
fd9e1e21ed
Remove the Python wrappers from wolfSSL source
...
The wolfCrypt and wolfSSL Python wrappers are maintained in the
wolfCrypt-py and wolfSSL-py trees respectively. The duplicates in this
tree are stale. The content has been checked and any important changes
have been ported over to their respective trees.
2022-05-11 15:02:51 +01:00
kaleb-himes
eb6f9152db
Revert modifications addressed by wolfSSL/scripts PR #235
2022-05-11 07:27:16 -06:00
Marco Oliverio
761ab6b17a
tests: add bidirectional shutdown UDP tests
2022-05-11 13:27:37 +02:00
Juliusz Sosinowicz
257c55a311
examples: allow bidirectional shutdown in UDP
...
This commit allows the examples to perform a bidirectional shutdown also when
using UDP. It is useful to test DTLS retransmission.
Signed-off-by: Marco Oliverio <marco@wolfssl.com >
2022-05-11 13:27:24 +02:00
Marco Oliverio
27e73818c5
tests: run test_wolfSSL_dtls_export() over UDP instead of TCP
2022-05-11 12:20:15 +02:00
Marco Oliverio
692a01238e
tests: support udp in test_server_nofail()
2022-05-11 12:19:09 +02:00
Sean Parkinson
dca71d36f6
SP: Script changed, generated result update
2022-05-11 10:51:19 +10:00
Daniel Pouzzner
d90a89898c
wolfssl/test.h:OCSPRespFreeCb(): fix non-void return of and from void function.
2022-05-10 15:14:21 -05:00
Daniel Pouzzner
9fbb4a923f
src/internal.c:GetCipherKeaStr(): allow "ECDH" (in addition to "ECDHE") as a suite clause that maps to KEA "ECDH".
2022-05-10 15:12:00 -05:00
Daniel Pouzzner
77fa0ccb82
src/tls.c:BuildTlsFinished(): work around false positive -Wmaybe-uninitialized.
2022-05-10 15:10:23 -05:00
Jacob Barthelmeh
531120131a
do not error out on CRL next date if using NO_VERIFY
2022-05-10 14:00:21 -06:00
Daniel Pouzzner
26673a0f28
where appropriate, use strcmp/strcasecmp, not strncmp/strncasecmp;
...
add macro XSTRCASECMP();
update XSTRNCASECMP() for XC32 >= 1.00 to use strncasecmp.
2022-05-10 12:20:12 -05:00
kaleb-himes
cb6a138caf
Implement peer review feedback
2022-05-10 08:43:18 -06:00
Marco Oliverio
f06ac9965c
internal.c: fix: plaintext check account for the current record only
2022-05-10 13:12:09 +02:00
Marco Oliverio
db23d8a0cf
internal.c: don't skip records if we don't process early-data
...
If we don't process early data, we want to skip only the current record and not
all the received data
2022-05-10 13:04:43 +02:00
Marco Oliverio
445c1e6ceb
internal.c: don't check TLS13 plaintext limit twice
...
Plaintext size is checked before decryption in TLS 1.3
2022-05-10 12:51:50 +02:00
Sean Parkinson
0747a16893
Merge pull request #5119 from JacobBarthelmeh/fuzzing
...
adjust setting of input pointer with BER pkcs7 edge case
2022-05-10 09:40:51 +10:00
kaleb-himes
d5f7beefd4
Address issues ID'd by new windows multi-config test
2022-05-09 16:50:56 -06:00
Chris Conlon
063e757f6b
Merge pull request #5121 from miyazakh/sce_example_update2
2022-05-09 14:15:13 -06:00
Marco Oliverio
d133fa6143
server: check that the first packet of udp connection is clientHello
...
Used to allow for bi-directional shutdown tests with UDP and DTLS
2022-05-09 13:45:27 +02:00
Marco Oliverio
0c7e9a0104
internal.c: fix pad-size when more records are received at once
...
don't consider the end of the record the end of received data as more records
may be read at once when DTLS will be supported.
2022-05-09 11:00:31 +02:00
Sean Parkinson
59fdf05155
Merge pull request #5111 from kaleb-himes/ABI-check-test-rev2
...
Refactor wolfSSL_ASN1_TIME_adj to use GetFormattedTimeString (new API)
2022-05-09 09:15:57 +10:00
Sean Parkinson
d95b2e69b5
Merge pull request #5112 from JacobBarthelmeh/Testing
...
fix for indef buffer check with pkcs7
2022-05-09 09:03:10 +10:00
Chris Conlon
b76c70d969
Merge pull request #5120 from dgarske/v5.3.0_cubepack
2022-05-08 07:50:20 -06:00
Hideki Miyazaki
75d90aaf2f
update key data and add fixes
...
Fix Aes gcm memory curruption
- fix delta size calculation
- add logging SEGGER printf for RA6M4
- update client example
Added test cases
- Fixed aes buffer overflow
- Fixed usable
- Fixed sce - no-sce use case
- Add logging SEGGER printf for RA6M4
2022-05-07 10:43:43 +09:00
David Garske
421f54e60a
Merge pull request #5118 from douzzer/20220405-declaration-after-statement
...
20220405 declaration after statement
2022-05-06 16:16:52 -07:00
Tesfa Mael
74b3df4f6c
Refactor tmpF in RsaMGF1
2022-05-06 16:14:47 -07:00
David Garske
bc877dab2a
Changes to support v5.3.0 cube pack for ST.
2022-05-06 15:49:11 -07:00
David Garske
1e1a722332
Merge pull request #5113 from JacobBarthelmeh/docs
...
fix markdown in readme notes
2022-05-06 14:20:16 -07:00
Jacob Barthelmeh
576f0aa045
adjust setting of input pointer with BER pkcs7 edge case
2022-05-06 14:22:53 -06:00
Daniel Pouzzner
6be3dae6d3
Merge pull request #5104 from tmael/32_bit_ssize
...
Fix for stack and heap measurements of a 32-bit build
2022-05-06 14:32:06 -05:00
Tesfa Mael
ad2119b2f8
Review comments
2022-05-06 12:00:32 -07:00
David Garske
36877d78b4
Merge pull request #5078 from julek-wolfssl/wpas-tls13
...
Clean up wolfSSL_clear() and add some more logging
2022-05-06 11:45:43 -07:00
Daniel Pouzzner
b59ac022c9
fix comment explaining ConstantCompare() in AES_GCM_decrypt_C().
2022-05-06 13:36:54 -05:00
Daniel Pouzzner
ccc9b1535d
fix whitespace.
2022-05-06 13:34:32 -05:00
Daniel Pouzzner
99b44f15ef
fix various -Wdeclaration-after-statement, with and without --enable-smallstack.
2022-05-06 13:34:32 -05:00
David Garske
3e774be88c
Minor text and formatting cleanups.
2022-05-06 11:01:40 -07:00
David Garske
e1aefc08ac
Merge pull request #5110 from douzzer/20220405-NETWORK_UNSHARE_HELPER
...
$NETWORK_UNSHARE_HELPER
2022-05-06 09:46:36 -07:00
David Garske
88443dea8c
Merge pull request #5114 from SparkiDev/ct_fixes_2
...
SP: Div fixes for constant time
2022-05-06 09:44:11 -07:00
Juliusz Sosinowicz
b6b007de3c
Call ctx->rem_sess_cb when a session is about to be invalid
...
Allow the user to register a session remove callback with wolfSSL_CTX_sess_set_remove_cb() that will be called when the session is about to be free'd or evicted from cache.
2022-05-06 16:34:28 +02:00
kaleb-himes
ef89e2e637
Rename utc_str[_buf] -> time_str[_buf] (semantic change)
2022-05-06 08:18:14 -06:00
kaleb-himes
3e1ba5d4d4
Implement peer review feedback and leave some breadcrumbs in the event of future updates
2022-05-06 07:50:39 -06:00
Eric Blankenhorn
b19f70d182
Fix TSIP build with NO_AES_CBC
2022-05-06 07:31:13 -05:00
Juliusz Sosinowicz
7e9896d162
Only clear session when we didn't complete a handshake
...
- Allow overriding buffer size with `WOLFSSL_MSG_EX_BUF_SZ`
- Allow disabling `WOLFSSL_MSG_EX` by defining `NO_WOLFSSL_MSG_EX`
2022-05-06 12:35:49 +02:00
Sean Parkinson
9ffc300641
SP: Div fixes for constant time
...
Implement div words for different platforms.
Use implementation not using a divide instruction unless
SP_DIV_WORD_USE_DIV or we know there is a div instruction.
Fix Thumb implementation of div word.
2022-05-06 16:02:18 +10:00
Jacob Barthelmeh
a9c7bc9d00
fix markdown in readme notes
2022-05-05 17:12:55 -06:00
Jacob Barthelmeh
853db0841f
fix for indef buffer check with pkcs7
2022-05-05 16:25:28 -06:00
kaleb-himes
ecf449dfe0
Refactor wolfSSL_ASN1_TIME_adj to use GetUnformattedTimeString (new API)
2022-05-05 16:25:25 -06:00
Sean Parkinson
a4eaa31b5e
Merge pull request #5101 from dgarske/sniffer_async_test
...
Improve the sniffer asynchronous test case to support multiple concurrent streams
2022-05-06 08:14:32 +10:00
Daniel Pouzzner
4d4145e6a0
add support for $NETWORK_UNSHARE_HELPER to the relevant scripts/.
2022-05-05 15:59:11 -05:00
Daniel Pouzzner
19e8bb05f3
wolfcrypt/src/aes.c: fix shiftTooManyBitsSigned in AES_GCM_decrypt_C().
2022-05-05 15:54:31 -05:00
Tesfa Mael
ffe5599013
Fix testsuite 32-bit build
2022-05-05 08:08:09 -07:00
David Garske
6e880495dc
Merge pull request #5102 from SparkiDev/ct_valgrind_fixes_1
...
Constant time changes
2022-05-05 07:43:00 -07:00
Sean Parkinson
189c9ab234
Constant time changes
...
GCM: make borrow constant time.
AES-GCM decrypt: compare at end and constant time.
Random: array_add touchs all elements every time.
RSA-OAEP: look for padding byte in constant time (look at every byte in
array).
SP
- reduce conditional use (make them bit ops)
- Fix point adds to not use double when adding infinity to infinity
- Implement signed div as __divi3 is not constant time.
- Move check sof input variables to API.
2022-05-05 12:26:57 +10:00
David Garske
e81670a3c0
Merge pull request #5106 from douzzer/20220504-linuxkm-wc-port-h
...
linuxkm_wc_port.h: move several more definitions outside the BUILDING_WOLFSSL gate
2022-05-04 13:09:19 -07:00
David Garske
9767631ebe
Merge pull request #5100 from anhu/enable-wolfssh
...
For consistency, add --enable-wolfssh
2022-05-04 13:02:54 -07:00
Daniel Pouzzner
af8865d13e
linuxkm_wc_port.h: move several more definitions outside the BUILDING_WOLFSSL gate, as they are needed for applications to include various wolfssl headers.
2022-05-04 13:16:45 -05:00
Tesfa Mael
bdd6072ede
Check nomalloc with verify inline
2022-05-04 09:33:38 -07:00
JacobBarthelmeh
f12fd6ab8b
fix spelling
2022-05-04 09:11:12 -07:00
David Garske
af8f18b634
Merge pull request #5103 from danielinux/rsa-encryptsize
...
wc_RsaEncryptSize needed in verify only and no-PSS builds
2022-05-04 07:53:06 -07:00
Anthony Hu
fff3402ed4
WOLFSSL ---> WOLFSSH
2022-05-04 09:28:08 -04:00
Daniele Lacamera
e606cccb10
wc_RsaEncryptSize needed in verify only and no-PSS builds
2022-05-04 14:20:44 +02:00
Tesfa Mael
97f54e8e0a
Support RSA OAEP with no malloc
2022-05-03 22:57:47 -07:00
Tesfa Mael
ca955032a0
Fix 32-bit enable-trackmemory build
2022-05-03 20:48:38 -07:00
Tesfa Mael
a9d28da7ce
Fix 32-bit enable-stacksize build
2022-05-03 20:16:56 -07:00
David Garske
5f539b3921
Improve the sniffer asynchronous test case to support multiple concurrent streams.
2022-05-03 16:43:15 -07:00
Anthony Hu
cb929e1247
For consistency, add a --enable-wolfssl; keep --enable-ssl for backwards compat.
2022-05-03 12:08:13 -04:00
Sean Parkinson
e722c15be8
Merge pull request #5098 from JacobBarthelmeh/Release
...
- prep for release 5.3.0
2022-05-03 10:48:53 +10:00
David Garske
628a91efda
Fix for size calculation for encrypt then mac without openssl extra enabled. Fix for cast warning.
2022-05-02 17:11:48 -06:00
JacobBarthelmeh
6f5be32d3a
update rpm spec
2022-05-02 17:08:38 -06:00
Jacob Barthelmeh
94e34d7a98
use NO_SESSION_CACHE_REF with titan cache due to session rows too big error
2022-05-02 17:08:38 -06:00
Jacob Barthelmeh
29401334d3
prepare for release 5.3.0
2022-05-02 17:08:38 -06:00
David Garske
48cb185ce9
Merge pull request #5096 from JacobBarthelmeh/Testing
...
- static analysis test fixes
2022-05-02 10:05:08 -07:00
JacobBarthelmeh
14ff3d1f0f
fix for macro guard with test case building with trusted peer certs
2022-04-29 14:46:35 -07:00
JacobBarthelmeh
35f46018a5
Merge pull request #5094 from SparkiDev/mrg_armv8_old_c_2
...
Move delaration to before code statements.
2022-04-29 11:02:32 -06:00
Jacob Barthelmeh
9d7a02b28e
remove uint from test case and put variable declaration at top of scope
2022-04-29 10:40:44 -06:00
Jacob Barthelmeh
38c01b9d9f
fix for infer diff report
2022-04-29 10:34:38 -06:00
Hayden Roche
895522aa18
Make the critical extension flags in DecodedCert always available.
...
Prior to this commit, these were guarded by OPENSSL_EXTRA ||
OPENSSL_EXTRA_X509_SMALL. Adding them into the struct for non-compatibility
layer builds only increases memory usage slightly and is useful for the user.
2022-04-28 15:46:16 -07:00
Sean Parkinson
ef4d484f85
Move delaration to before code statements.
2022-04-29 08:13:20 +10:00
JacobBarthelmeh
ea8e9ee699
Merge pull request #5063 from kaleb-himes/ZD13349
...
Ensure supported curves and curve size(s) WIN FIPS
2022-04-28 11:50:19 -06:00
JacobBarthelmeh
df4dd7d5b3
Merge pull request #5088 from dgarske/sniffer_async_2
...
Fix to properly trap errors in sniffer (broken after async additions)
2022-04-28 09:47:05 -06:00
Kaleb Himes
2ec7951de6
Merge pull request #4803 from danielinux/tirtos-update-202201
...
Update TIRTOS support
2022-04-28 10:12:32 -05:00
Kaleb Himes
9970b68e45
Add HAVE_TLS_EXTENSIONS
2022-04-28 09:10:13 -06:00
David Garske
881b9e5b07
Merge pull request #5093 from SparkiDev/rsa_fermat_fix
...
Fix use of WC_RSA_NO_FERMAT_CHECK
2022-04-28 06:40:08 -07:00
Sean Parkinson
f91936944d
Fix use of WC_RSA_NO_FERMAT_CHECK
2022-04-28 16:29:48 +10:00
Sean Parkinson
67838e099d
Merge pull request #5092 from ejohnstown/cert-ext-gen-test
...
Certificate Extension Generation Test
2022-04-28 10:25:28 +10:00
JacobBarthelmeh
8b39f863e6
fix for buffer size and key cover
2022-04-27 13:14:22 -07:00
John Safranek
3294a3f8f8
Certificate Extension Generation Test
...
The test for certificate extensions requires both the test certs option
and the certificate generation option to run. The certs for the test are
generated by wolfCrypt. This disables the extensions test if
certificate generation is disabled.
2022-04-27 13:08:28 -07:00
Kaleb Himes
22802604c0
Merge pull request #5090 from dgarske/public_dh
...
Fix for DH public FFDHE incorrectly getting enabled
2022-04-27 13:08:46 -05:00
David Garske
277d6dc5dd
Fix minor clang-tidy warnings for async.
2022-04-27 10:22:19 -07:00
David Garske
93e8133453
Merge pull request #4896 from elms/compat/const_casting_fun
...
Casting away `const` for improved compatibility
2022-04-27 09:35:58 -07:00
David Garske
7e803f346d
Merge pull request #5076 from JacobBarthelmeh/fuzzing
...
fix for sanity check on PKCS7 indef read
2022-04-27 09:34:34 -07:00
David Garske
8bf228d346
Merge pull request #5083 from SparkiDev/d2i_ecpriv_der
...
d2i_ECPrivateKey() takes DER encoded data
2022-04-27 09:32:04 -07:00
David Garske
1d64c735ce
Merge pull request #5086 from elms/cmake/ocsp_crl
...
cmake: Add CRL, OCSP, and OCSP stapling options
2022-04-27 09:31:51 -07:00
David Garske
ad68bb9a7a
Merge pull request #5091 from SparkiDev/mrg_armv8_old_c
...
Can't declare variables in for statements
2022-04-27 09:31:19 -07:00
gojimmypi
83f4f9e5ef
Espressif notes for user_settings.h preference
2022-04-27 08:41:33 -07:00
David Garske
fbc2ccca1e
Fix to properly trap errors in sniffer SetupKeys after async changes. Fix minor scan-build warnings.
2022-04-27 08:28:36 -07:00
Kaleb Himes
11bdb8550e
Correction
2022-04-27 08:33:56 -06:00
JacobBarthelmeh
c0d7f3b2e6
add support for i.MX8 with QNX CAAM
2022-04-27 02:27:05 -07:00
Sean Parkinson
ac48438bd0
Can't declare variables in for statements
2022-04-27 11:10:53 +10:00
gojimmypi
7233732159
move ESP8266-specific to separate section
2022-04-26 17:58:14 -07:00
Sean Parkinson
f86f4a8ca0
d2i_ECPrivateKey() takes DER encoded data
...
Code was incorrectly using data as a private key instead of DER
decoding.
Fixed i2d_EcPrivateKey() to output DER encoded data.
2022-04-27 09:39:50 +10:00
elms
ec38048711
cmake: Add CRL, OCSP, and OCSP stapling options
2022-04-26 16:23:46 -07:00
David Garske
25e8bd6b45
Merge pull request #5044 from SparkiDev/sp_read_radix_10_oob
...
SP Math
2022-04-26 16:21:11 -07:00
David Garske
67029dc4e7
Fix to make sure the old public DH API's are not enabled unless FIPS v2 or older. Broken in PR #5018 .
2022-04-26 15:39:54 -07:00
elms
321e44226a
Casting away const for improved compatibility
...
This is appears to be an existing pattern.
Fixes #4893
2022-04-26 14:31:40 -07:00
Chris Conlon
a6d019ecf9
Merge pull request #5073 from JacobBarthelmeh/PKCS7
2022-04-26 14:41:13 -06:00
David Garske
cbc27f7de4
Merge pull request #5085 from douzzer/20220426-multi-test
...
20220426 multi-test fixups
2022-04-26 11:15:59 -07:00
John Safranek
7436a41bc7
Merge pull request #5046 from SparkiDev/cppcheck_fixes_8
...
cppcheck: fixes
2022-04-26 10:37:42 -07:00
John Safranek
7e8598f75b
Merge pull request #5081 from dgarske/sniffer_decrypt
...
Restore sniffer internal decrypt function. This allows decrypting TLS…
2022-04-26 09:37:32 -07:00
David Garske
67a3326e6d
Merge pull request #5082 from SparkiDev/sp_c++
...
CPP protection for extern references to asm code
2022-04-26 08:33:15 -07:00
Daniel Pouzzner
4e02d7e404
fix clang-tidy-Customer-CFG-7 readability-redundant-preprocessor.
2022-04-26 10:20:26 -05:00
David Garske
704a18d103
Merge pull request #5079 from tmael/rsa_vfg
...
Fix no malloc RSA test
2022-04-26 08:11:44 -07:00
Daniel Pouzzner
e6d267ef16
src/ssl.c wolSSL_DH_new_by_nid(): fix cppcheck nullPointer report.
2022-04-26 09:58:07 -05:00
Daniel Pouzzner
5e1a358dff
wolfcrypt/src/evp.c wolfSSL_EVP_PKEY_free(): fix clang-diagnostic-implicit-fallthrough.
2022-04-26 09:57:54 -05:00
Daniel Pouzzner
2c5db7b64c
fix whitespace.
2022-04-26 09:57:25 -05:00
Sean Parkinson
0be79a8629
CPP protection for extern references to asm code
2022-04-26 10:17:25 +10:00
Sean Parkinson
8737d46bb1
Merge pull request #5018 from haydenroche5/libspdm
...
Make changes to compatibility layer to support libspdm.
2022-04-26 09:55:22 +10:00
Sean Parkinson
d362b6dd08
Merge pull request #5033 from haydenroche5/ec_key_print_fp
...
Add wolfSSL_EC_KEY_print_fp to compat layer.
2022-04-26 09:51:37 +10:00
David Garske
273ed1df76
Restore sniffer internal decrypt function. This allows decrypting TLS v1.2 traffic ignoring AEAD errors.
2022-04-25 16:28:09 -07:00
Sean Parkinson
20e5e654a3
cppcheck: fixes
...
CBIORecv/Send are only assigned once.
IOCB_ReadCtx/WriteCtx only assigned once.
BuildMessage checks output and input wiht sizeOnly every call - state
machine doesn't cache these.
Renamed alias_tbl variables to something unique.
Other cppcheck fixes.
Also reworked pem_read_bio_key().
2022-04-26 09:26:41 +10:00
JacobBarthelmeh
1181081c38
Merge pull request #5075 from dgarske/cryptocb
...
Fix for PKCS7 with Crypto Callbacks
2022-04-25 17:23:28 -06:00
Masashi Honma
3ab5ccd04f
Add support for EVP_PKEY_sign/verify functionality ( #5056 )
...
* Fix wolfSSL_RSA_public_decrypt() return value to match Openssl
* Add support for EVP_PKEY_verify_init() and EVP_PKEY_verify()
* wpa_supplicant SAE public key functionality requires this function.
* Add DSA support for EVP_PKEY_sign/verify()
* Add ECDSA support for EVP_PKEY_sign/verify()
* Add tests for EVP_PKEY_sign_verify()
* Fix "siglen = keySz" at error cases
* Fix wolfSSL_DSA_do_sign() usage
1. Check wolfSSL_BN_num_bytes() return value
2. Check siglen size
3. Double the siglen
* Check return code of wolfSSL_i2d_ECDSA_SIG() in wolfSSL_EVP_DigestSignFinal()
* Add size calculations to `wolfSSL_EVP_PKEY_sign`
* Add size checks to wolfSSL_EVP_PKEY_sign before writing out signature
* Use wc_ecc_sig_size() to calculate ECC signature size
Signed-off-by: Masashi Honma <masashi.honma@gmail.com >
Co-authored-by: Juliusz Sosinowicz <juliusz@wolfssl.com >
2022-04-25 14:19:56 -07:00
Jacob Barthelmeh
9bf4a94796
with WOLFSSL_NO_DH186 restriction allow odd DH param size generations
2022-04-25 15:13:24 -06:00
John Safranek
bfd24cfa23
Merge pull request #5071 from dgarske/scan-build
...
Fixes for various nightly scan-build errors and warnings
2022-04-25 13:30:43 -07:00
Tesfa Mael
85ef91ce6d
Move up local variable at the beginning
2022-04-25 12:40:31 -07:00
David Garske
34d541109d
Additional scan-build warning fixes.
2022-04-25 09:55:36 -07:00
Tesfa Mael
18a6a7c4a7
Fix RSA nomalloc test
2022-04-25 09:50:50 -07:00
Jacob Barthelmeh
cd2c7e1438
guard on test case for ecc curves
2022-04-25 09:01:24 -06:00
Juliusz Sosinowicz
4013f83e4f
Add some missing logs and implement WOLFSSL_MSG_EX()
...
WOLFSSL_MSG_EX() uses XVSNPRINTF to allow for formatted strings to be printed. It uses a 100 byte internal stack buffer to format the log message.
2022-04-25 15:59:07 +02:00
gojimmypi
15a48e411d
Add WOLFSSL_ESP8266 for ESP-IDF
2022-04-23 12:30:34 -07:00
David Garske
70ad19467c
Merge pull request #5068 from cconlon/jniPKCallbacks
...
Don't enable PK Callbacks with JNI FIPS builds
2022-04-22 16:08:29 -07:00
David Garske
4ecf3545d7
Improve scan-build fix for ProcessPeerCertParse checking of empty dCert. With WOLFSSL_SMALL_CERT_VERIFY it is NULL.
2022-04-22 16:07:24 -07:00
David Garske
e9b80e53fa
Fix issue with InitX509Name.
2022-04-22 16:02:54 -07:00
David Garske
74cd2fd910
Fix for integer.c possible uses of mp_int input with DP NULL.
2022-04-22 16:02:54 -07:00
David Garske
ea2841fa7a
Make sure ASN1 isDynamic is always set to 0. SK Cipher doesn't have free (data is contained in the SK).
2022-04-22 16:02:54 -07:00
David Garske
84a33183a6
Various scan-build fixes.
2022-04-22 16:02:54 -07:00
David Garske
3755b88a02
Fix InitX509Name to set dynamicName on init.
2022-04-22 16:02:53 -07:00
David Garske
c41b1b1b9b
Fix to ensure args->dCert is set for ProcessPeerCertParse.
2022-04-22 16:02:53 -07:00
David Garske
a6a89d3316
Fix for integer.c s_mp_add output to make sure it grows if not set.
2022-04-22 16:02:53 -07:00
David Garske
5a75e0f6c6
Fix for MCAPI CRYPT_AES_CTX size with ./configure --enable-pkcallbacks --enable-mcapi --enable-ecc --enable-sha512 --with-libz --enable-opensslextra.
2022-04-22 16:02:53 -07:00
David Garske
293d7e1241
Fix for report of Use of memory after it is freed. Force the dataIsAlloc set to 0.
2022-04-22 16:02:53 -07:00
David Garske
8fb1bb8781
Merge pull request #5074 from embhorn/zd14105
...
Fix for mingw builds
2022-04-22 15:27:58 -07:00
David Garske
9cbf92df01
Fix for PKCS7 sign to allow providing a public key only if using crypto callback w/devId. ZD13949.
2022-04-22 14:29:43 -07:00
Jacob Barthelmeh
d96bd30398
fix for sanity check on PKCS7 indef read
2022-04-22 15:28:03 -06:00
Eric Blankenhorn
b543aa0148
Fix for mingw builds
2022-04-22 14:35:46 -05:00
John Safranek
bf16696d8c
Merge pull request #5036 from dgarske/sniffer
...
Fixes for minor sniffer and async issues
2022-04-22 12:24:33 -07:00
David Garske
ed58cfdc0f
Add DEBUG_CRYPTOCB and wc_CryptoCb_InfoString to help with debugging crypto callbacks.
2022-04-22 12:20:55 -07:00
Jacob Barthelmeh
d5927a58dd
add store of PKCS7 cert used for verify
2022-04-22 11:26:34 -06:00
Jacob Barthelmeh
8ea953f8c0
add support for importing private only EC key to a WOLFSSL_EVP_PKEY struct
2022-04-22 10:20:42 -06:00
David Garske
cb1dbb75f8
Fixes for sniffer-gen.sh.
2022-04-22 08:25:00 -07:00
Juliusz Sosinowicz
8c4887c166
Free session in wolfSSL_clear
...
- Define `NO_SESSION_CACHE_REF` in wpa build
2022-04-22 15:54:04 +02:00
David Garske
6606984101
Fix for building sniffer without ECC while Curve25519 is enabled.
2022-04-21 16:54:11 -07:00
David Garske
2fa1e19fe7
Fix for ./configure --enable-sniffer --enable-session-ticket --disable-ecc && make.
2022-04-21 13:28:38 -07:00
Chris Conlon
cfa338314d
do not enable PK Callbacks with JNI in FIPS mode
2022-04-21 11:06:54 -06:00
Daniel Pouzzner
4a4b019e30
tests/api.c: in test_wc_ecc_verify_hash_ex(), check that passing zero r and/or s to wc_ecc_verify_hash_ex() returns MP_ZERO_E.
2022-04-21 07:21:42 +02:00
Hayden Roche
cfab451328
Merge pull request #5024 from dgarske/zd13538
2022-04-20 13:08:13 -07:00
Hayden Roche
7964fa4195
Merge pull request #5055 from elms/cmake/out_of_src
2022-04-20 11:16:50 -07:00
David Garske
f9acaab6fe
Fix memory leak with pcap bpf_program not calling pcap_freecode.
2022-04-19 16:45:49 -07:00
David Garske
ec76f79e9d
Fixes for sniffer decrypt broken in PR #4875 . The TLS v1.2 sniffer decrypt did not have ssl->curRL set for proper auth tag calculation and was placing the data at offset + 8 to leave room for explicit IV.
2022-04-19 16:31:27 -07:00
David Garske
49f510544a
Merge pull request #5057 from haydenroche5/pem_write_ec_rsa_pub
...
Add wolfSSL_PEM_write_RSAPublicKey and wolfSSL_PEM_write_EC_PUBKEY.
2022-04-19 16:19:38 -07:00
kaleb-himes
696c5eed25
Ensure supported curves and curve size(s) WIN FIPS
2022-04-19 16:16:15 -06:00
elms
29392ac6b3
spell fix: OSCP -> OCSP
2022-04-19 15:11:08 -07:00
Elms
d4e8922dfd
cmake: fixup install lib structure for windows
2022-04-19 15:11:08 -07:00
Elms
a7cc438c9c
cmake: out of source support
...
Add `WOLFSSL_BUILD_OUT_OF_TREE` option to force not changing the
source tree. Also defaults to `CMAKE_DISABLE_SOURCE_CHANGES` to avoid
failures
2022-04-19 15:11:08 -07:00
Daniel Pouzzner
5d0654ee56
Merge pull request #5062 from dgarske/clang_str
...
Fix for issue with `error: format string is not a string literal`
2022-04-19 14:27:36 -05:00
Hayden Roche
d7085069d6
Add wolfSSL_PEM_write_RSAPublicKey and wolfSSL_PEM_write_EC_PUBKEY.
...
These were compatibility layer stubs before.
2022-04-19 09:42:10 -07:00
David Garske
95a85d16d2
Fix for issue with error: format string is not a string literal.
2022-04-19 08:49:05 -07:00
David Garske
70a0983bbc
Fix for minor warning with chain input enabled and async disabled.
2022-04-18 16:17:37 -07:00
John Safranek
52b176b6a1
Merge pull request #5060 from cconlon/ecFipsReady
...
ECDH_compute_key: allow setting of globalRNG with FIPS 140-3 / Ready
2022-04-18 16:15:14 -07:00
David Garske
710f49795f
Fix for session cache locking with session stats in get_locked_session_stats.
2022-04-18 14:29:42 -07:00
David Garske
659d33fdaf
Fixes for minor sniffer and async issues:
...
* Sniffer: Remove old restrictions for max strength, encrypt-then-mac and forcing openssl-extra.
* Fix bound warning with strncpy in sniffer.c.
* Fix for async DH issue.
* Fix for SP math all not initializing raw big int.
* Fix for array bounds warning with "-O3" on SetEccPublicKey.
* Fix a sniffer async edge case with TLS v1.2 static RSA and extended master.
* Improved the sniffer test script detection of features.
* Disable ECC custom curve test with Intel QuickAssist.
2022-04-18 11:46:40 -07:00
David Garske
9172abc969
Merge pull request #5059 from julek-wolfssl/missing-XFCLOSE
...
Add missing XFCLOSE()
2022-04-18 14:16:36 -04:00
Chris Conlon
567ae7ca55
Merge pull request #5061 from miyazakh/sce_keydata_update
2022-04-18 09:14:34 -06:00
Hideki Miyazaki
6e70cdf3b5
Update key data for sce example
2022-04-17 14:29:44 +09:00
John Safranek
e89b4cce4c
Merge pull request #5045 from SparkiDev/wycheproof_armasm
...
Wycheproof testing of Aarch64 ASM
2022-04-15 11:23:45 -07:00
John Safranek
8eed940e3a
Merge pull request #5040 from SparkiDev/wycheproof_intelasm
...
Wycheproof fixes
2022-04-15 11:19:57 -07:00
John Safranek
3ab87ba2ed
Merge pull request #5039 from SparkiDev/ecc_pub_api
...
ECC: make public APIS for add and double points
2022-04-15 11:09:37 -07:00
Chris Conlon
35cb3c8a79
ECDH_compute_key: allow setting of globalRNG with FIPS 140-3 / Ready
2022-04-15 09:36:14 -06:00
Chris Conlon
6c16b9c0b5
Merge pull request #5054 from miyazakh/tsipV1p15_grose
...
Update Renesas TSIP version to 1.15 on GR-ROSE
2022-04-15 09:34:09 -06:00
Eric Blankenhorn
a70e188758
Merge pull request #5058 from douzzer/20220414-clang-tidy-intmath
...
20220414-clang-tidy-intmath
2022-04-15 10:17:27 -05:00
Juliusz Sosinowicz
a6319fc2a9
Add missing XFCLOSE()
2022-04-15 16:26:31 +02:00
Daniel Pouzzner
607a24b499
fixes for clang-tidy and sanitizer hygiene with --disable-fastmath.
2022-04-14 21:06:04 -05:00
Daniel Pouzzner
096889927d
wolfcrypt/src/port/devcrypto/devcrypto_aes.c: remove redundant "int ret" in wc_AesCtrEncrypt() (supersedes #5052 ).
2022-04-14 20:23:31 -05:00
Eric Blankenhorn
2e3ebd7d8c
Merge pull request #5053 from kaleb-himes/CLOUD_PORTING_A
...
Change void cast(s) to be non-conditional and consolidate condition l…
2022-04-14 14:21:42 -05:00
Hideki Miyazaki
2fbe030e5e
update tsip version to 1.15
2022-04-14 06:42:11 +09:00
kaleb-himes
d706e2be32
Change void cast(s) to be non-conditional and consolidate condition logic
2022-04-13 10:25:43 -06:00
Chris Conlon
947c72937f
Merge pull request #5049 from miyazakh/unused_param
2022-04-13 09:02:26 -06:00
Chris Conlon
6cd87d56d4
Merge pull request #5042 from TakayukiMatsuo/certupdate
2022-04-13 09:00:10 -06:00
Daniel Pouzzner
26b5d032b7
Merge pull request #5050 from SparkiDev/ecc_import_fail
...
ECC: fix import failure return
2022-04-13 08:02:27 -05:00
Sean Parkinson
824b7a3f3f
ECC: fix import failure return
...
Passing in x=0 and y=0 meant to return ECC_INF_E.
Passing in x=0, y=not 0 or x=not 0, y=0 now checks whether the point is
valid and forces a return of BAD_FUNC_ARG when IS_POINT_E is returned
from check.
2022-04-13 14:03:13 +10:00
Hideki Miyazaki
c5056f408f
fix unused parameter when using CRYPTO_CB_ONLY_RSA
2022-04-13 07:48:18 +09:00
Sean Parkinson
55e13d40b3
SP Math
...
sp_read_radix_10: check _sp_add_d doesn't error due to overflow
_sp_add_d: Don't change value of used for result until it is known to be
valid.
2022-04-13 08:33:30 +10:00
Sean Parkinson
6cc91c8f9b
Wycheproof testing of Aarch64 ASM
...
Fix which bytes are incremented for AES-GCM - only 4 bytes are counter.
Fix Curve25519 to reduce to below modulus at end.
2022-04-12 11:45:14 +10:00
Hayden Roche
0ef7435580
Make changes to compatibility layer to support libspdm.
...
- Add support for ASN1_TIME_compare, DH_new_by_nid, OBJ_length, OBJ_get0_data,
and ChaCha20-Poly1305 and HKDF in the EVP layer.
- Map EC_POINT_get_affine_coordinates to
wolfSSL_EC_POINT_get_affine_coordinates_GFp and EC_POINT_set_affine_coordinates
to wolfSSL_EC_POINT_set_affine_coordinates_GFp.
- Add kdf.h compatibility header.
2022-04-11 15:07:27 -07:00
Hayden Roche
0717135e49
Add wolfSSL_EC_KEY_print_fp to compat layer.
2022-04-11 13:02:38 -07:00
TakayukiMatsuo
830db63bcf
Update certificate signature data for TSIP in response to /certs update
2022-04-12 02:55:58 +09:00
John Safranek
e87ded85b4
Merge pull request #5041 from embhorn/zd13969
...
Add ability to set ECC Sign userCTX using WOLFSSL_CTX
2022-04-11 09:38:52 -07:00
Eric Blankenhorn
ab6dc8d669
Add ability to set ECC Sign userCTX using WOLFSSL_CTX
2022-04-11 08:41:27 -05:00
Sean Parkinson
2995c96f11
Wycheproof fixes
...
Curve25519: reduce to less than mod at end of curve25519, optimize to
not use imulq when andq can be used instead.
x86_64 Karatsuba Mul: Don't put add carry into overflow and then
continue adding zero. Overflow is lost.
2022-04-11 15:09:40 +10:00
Sean Parkinson
b6db087a62
ECC: make public APIS for add and double points
...
Use internal API internally.
2022-04-11 09:19:23 +10:00
Sean Parkinson
0298a29a6f
Merge pull request #5037 from JacobBarthelmeh/hsm
...
fix for function rename
2022-04-11 08:48:28 +10:00
JacobBarthelmeh
cd1344bbed
Merge pull request #5032 from kaleb-himes/ZD13946
...
Add logic equivalent to configure.ac in settings.h for poly1305
2022-04-08 15:13:16 -06:00
Jacob Barthelmeh
83ad0b7010
fix for function rename
2022-04-08 15:05:08 -06:00
David Garske
79e2b2b4ce
Merge pull request #5030 from LinuxJedi/add-iar-msp430
...
Add IAR MSP430 example
2022-04-08 13:15:42 -07:00
kaleb-himes
5d46d10933
Address peer feedback
2022-04-08 10:12:24 -06:00
David Garske
c84c465fc6
Merge pull request #5035 from douzzer/20220408-fuzz-6262033210802176
...
oss-fuzz 6262033210802176
2022-04-08 08:34:16 -07:00
Andrew Hutchings
50bc20e340
Fix include.am for MSP430
2022-04-08 16:26:48 +01:00
David Garske
6a21a90f41
Merge pull request #5034 from SparkiDev/sp_wycheproof_fixes
...
SP fixes from Whycheproof tests
2022-04-08 08:20:56 -07:00
Andrew Hutchings
997feecd6e
Remove unused header from MSP430 example
2022-04-08 15:42:38 +01:00
Andrew Hutchings
676fe19e2f
Fixes to the MSP430 example
...
* Fix include.am missing line
* Fix macros
* Add "static" keyword where needed
* Make compatible with MSP430 GCC
* Add MSP430 GCC Makefile
* Fix watchdog issue with GCC, also fixes IAR when large data model is
used
* Fix comment style
* Fix typo in RNG (makes it ever so slightly more random)
* Add example output to README
2022-04-08 15:08:55 +01:00
Daniel Pouzzner
1c570fae3b
wolfcrypt/src/asn.c GetLength_ex(): test for overlong length spec before using length as shift operand.
2022-04-08 08:15:02 -05:00
Sean Parkinson
ed7e1f9770
SP fixes from Whycheproof tests
...
EC point add is a double if affine ordinates are the same.
Fix AVX2 implementation of mod inv to do conversion from 26 bits in
32-bit registers to 64 bits in 64-bit registers. Also handle negative
value.
RSA OAEP: loop down to last byte. Must have a separator.
Div for x86_64: fix to have all 1s when high word equals divisor.
2022-04-08 15:01:06 +10:00
Chris Conlon
9859492222
Merge pull request #5029 from haydenroche5/asn1_time_diff_2038
2022-04-07 16:45:11 -06:00
David Garske
5ea38b059e
For improved compatibility populate the extension value for NID_subject_alt_name.
2022-04-07 11:10:03 -07:00
David Garske
5231dc63fa
Merge pull request #5031 from douzzer/20220407-clang-tidy
...
20220407 clang-tidy
2022-04-07 09:03:56 -07:00
kaleb-himes
c1421b1be8
Add logic equivalent to configure.ac in settings.h for poly1305
2022-04-07 09:00:26 -06:00
Andrew Hutchings
be742cabda
Add missing include.am
2022-04-07 15:39:32 +01:00
Daniel Pouzzner
288fdbcc3e
fix readability-named-parameter.
2022-04-07 08:02:24 -05:00
Daniel Pouzzner
28cefb0d1a
fix clang-analyzer-core.NonNullParamChecker.
2022-04-07 08:01:00 -05:00
Daniel Pouzzner
4efd06fdc1
fix readability-inconsistent-declaration-parameter-name.
2022-04-07 07:59:59 -05:00
Daniel Pouzzner
0083afc279
fix whitespace.
2022-04-07 07:59:07 -05:00
Andrew Hutchings
2663f5abaf
Add IAR MSP430 example
...
A basic MSP430 example for IAR IDE.
2022-04-07 11:07:27 +01:00
Hayden Roche
161d74879a
Change time2epoch to TimeToUnixTime.
2022-04-06 21:38:24 -07:00
Sean Parkinson
284ebacc57
Merge pull request #4916 from JacobBarthelmeh/hsm
...
Add SECO use and expand cryptodev
2022-04-07 10:21:32 +10:00
David Garske
80766566fc
Fixes for X509_add_ext and new test case.
2022-04-06 16:35:53 -07:00
Sean Parkinson
87dc197284
Merge pull request #5028 from douzzer/20220406-cppcheck
...
fixes to mollify cppcheck (sizeofDivisionMemfunc, zerodivcond, shiftTooManyBits, signConversionCond)
2022-04-07 08:45:24 +10:00
Jacob Barthelmeh
e9aae8b571
use hash grow function with cmac
2022-04-06 15:08:19 -06:00
David Garske
f6f6d91ae1
Merge pull request #5027 from LinuxJedi/fix-dox
...
Minor documentation cleanup
2022-04-06 14:01:08 -07:00
Daniel Pouzzner
9b2d927de7
Merge pull request #5026 from danielinux/fix_unititialized_var
...
Fixed unused variable in asn.c
2022-04-06 13:03:47 -05:00
David Garske
1b5af2fdd9
Merge pull request #5022 from SparkiDev/wycheproof_fixes
...
Wycheproof fixes/changes
2022-04-06 10:29:17 -07:00
David Garske
49e72633b8
Merge pull request #5025 from SparkiDev/ssl_move_x509
...
ssl.c break out
2022-04-06 10:10:18 -07:00
JacobBarthelmeh
2a0b726c15
add AES init functions to ECB test case
2022-04-06 09:42:38 -07:00
Daniel Pouzzner
4e8c180290
fixes to mollify cppcheck (sizeofDivisionMemfunc, zerodivcond, shiftTooManyBits, signConversionCond).
2022-04-06 11:36:01 -05:00
Andrew Hutchings
5ea9d11295
Minor documentation cleanup
...
Fixes two things across all the Doxygen:
1. Remove WOLFSSL_API from each definition
2. Add missing parameter names from functions
2022-04-06 16:17:36 +01:00
JacobBarthelmeh
91d883d99f
macro guard on ECB test case and use realloc for hash
2022-04-06 07:04:17 -07:00
Daniele Lacamera
3d9a1647d4
Fixed unused variable in asn.c
2022-04-06 15:35:28 +02:00
Sean Parkinson
25aa0af260
ssl.c break out
...
Move the X509 API out of ssl.c into x509.c
2022-04-06 17:25:26 +10:00
Sean Parkinson
e9187f5f00
Wycheproof fixes/changes
...
Allow Chachac20-Poly1305 to take an empty msg.
Allow AES-SIV to have an empty nonce.
Don't allow the length to be malleable. Must use the smallest number of
bytes to represent value.
ECDSA and DSA signature values are positive.
Add Sha512-224 and Sha512-256 OIDs.
ASN template - ensure the ECDSA/DSA signature uses all data.
Curve25519/Curve448 - WOLFSSL_ECDHX_SHARED_NOT_ZERO means shared secret
can't be 0.
Curve25519/Curve448 - check public value is less than order.
ECC - x or y may be zero but not both.
Ed25519/Ed448 - check S is less than order.
Ed448 - ge_p3_dbl can be simplified for ASM.
Prime check (integer.c/tfm.c/sp_int.c): Don't allow negative values and
make sure random candidate doesn't have bits higher than those in a set
when bits not a multiple of 8.
RSA: support Sha512-224 and Sha512-256.
RSA: Fix check for invalid in decryption. Affects plaintexts 256 bytes
and longer.
RSA: Don't allow base be larger than modulus.
RSA: Check small ciphertext (1 or 0) on decrypt when not using OAEP.
RSA: WOLFSSL_RSA_DECRYPT_TO_0_LEN allows decrypted value to be 0.
SP math all: fix div to handle large a and d when checking size of
remainder.
SP math all: set sign of result in sp_mod_2d()
2022-04-06 15:35:01 +10:00
JacobBarthelmeh
a338b4c933
refactor SHA grew function, revert benchmark devid, increase SHA_CTX size, add AES ECB cryptocb test
2022-04-05 14:45:18 -07:00
David Garske
4f5aa81031
Merge pull request #5000 from ejohnstown/tls13-wctest
...
Add TLSv1.3 KDF to wolfCrypt Test
2022-04-05 10:45:35 -07:00
David Garske
6a3f98627e
Merge pull request #5013 from anhu/wc_CheckCertSigPubKey
...
Add new public API wc_CheckCertSigPubKey()
2022-04-05 09:48:08 -07:00
David Garske
99fbd6f160
Merge pull request #4963 from SparkiDev/tls13_psk_multi_id
...
TLS 1.3 PSK: multiple ids for a cipher suite
2022-04-05 09:47:14 -07:00
David Garske
e9a238ca86
Merge pull request #5021 from JacobBarthelmeh/certs
...
allow up to and including CTC_MAX_SKID_SIZE (32 byte hash)
2022-04-05 09:46:34 -07:00
David Garske
97b85552e8
Merge pull request #5023 from douzzer/20220405-strict-aliasing
...
enforce strict aliasing rules
2022-04-05 09:46:12 -07:00
John Safranek
eefc0f2f57
Add TLSv1.3 KDF to wolfCrypt Test
...
Added a test for the TLSv1.3 KDF to the wolfcrypt test. It uses 6
different test cases from the CAVP tests. A set of 8 session keys are
generated using multiple exporters.
2022-04-05 08:56:15 -07:00
Daniel Pouzzner
328de3ed63
remove -Wno-strict-aliasing from AX_HARDEN_CC_COMPILER_FLAGS and AX_HARDEN_CXX_COMPILER_FLAGS in m4/ax_harden_compiler_flags.m4, and fix strict aliasing infractions in api.c.
2022-04-05 08:10:16 -05:00
Daniel Pouzzner
e3409a40a5
configure.ac: when $ENABLED_LINUXKM_DEFAULTS, set -DWOLFSSL_OLD_PRIME_CHECK only if $ENABLED_FIPS == no.
2022-04-05 08:10:03 -05:00
Daniel Pouzzner
b2a2a8af4a
fix whitespace.
2022-04-05 08:09:48 -05:00
Sean Parkinson
df9335ee0a
Merge pull request #4988 from tmael/sp_loop
...
Fixes for Diab C89 and armclang
2022-04-05 08:20:47 +10:00
Sean Parkinson
8dd07bbb73
Merge pull request #5011 from dgarske/ecc_key_decode
...
Fix to check if `wc_EccPublicKeyToDer` has enough output buffer space
2022-04-05 08:03:03 +10:00
Sean Parkinson
77485d987e
Merge pull request #5010 from haydenroche5/asn1_time_diff_2038
...
Fix year 2038 problem in wolfSSL_ASN1_TIME_diff.
2022-04-05 07:58:36 +10:00
Sean Parkinson
c3a9520eb5
Merge pull request #5016 from dgarske/async_fixes
...
Fixes for async in wolfCrypt test
2022-04-05 07:56:08 +10:00
Anthony Hu
fc6e10ff42
Another test fixup.
2022-04-04 17:42:25 -04:00
Jacob Barthelmeh
68ebb051e5
allow up to and including CTC_MAX_SKID_SIZE (32 byte hash)
2022-04-04 15:19:17 -06:00
Hayden Roche
f39bd5e02b
Merge pull request #5014 from dgarske/kcapi_ecc_import
2022-04-04 14:08:29 -07:00
David Garske
829a8a4039
Merge pull request #5009 from embhorn/zd13980
...
Fix build errors for NO_WOLFSSL_SERVER and NO_WOLFSSL_CLIENT
2022-04-04 12:43:49 -07:00
David Garske
6513e2ce8f
Merge pull request #5019 from douzzer/20220404-linux5v18-etc
...
20220404 linux5v18 etc
2022-04-04 11:08:18 -07:00
David Garske
bb4698a9e8
Merge pull request #5020 from douzzer/20220402-fips-linuxkm-pie-only-on-linuxkm
...
--enable-fips=v5 --disable-linuxkm-pie
2022-04-04 11:08:06 -07:00
Hayden Roche
9c1e2a83d1
Fix year 2038 problem in wolfSSL_ASN1_TIME_diff.
...
Prior to this commit, this function used XMKTIME (mktime) to convert the
passed in WOLFSSL_ASN1_TIMEs to Unix timestamps. On platforms where time_t is
32 bits long, times after the year 2038 can't be represented with this type. To
fix this, we need to not use XMKTIME. With this commit, the static function
time2epoch is added to ssl.c, which uses the date time information to compute
seconds since the Unix epoch without the use of mktime. It returns the seconds
as a long long. This is sufficient to make the function work for years > 2038 on
the platform of the user who discovered this problem in the first place (Yocto
Linux on ARMv7).
2022-04-04 11:01:21 -07:00
Anthony Hu
400c7238ef
Test fixup.
2022-04-04 13:43:06 -04:00
Anthony Hu
ae9926cc42
Missing flag in unit test.
2022-04-04 12:39:10 -04:00
David Garske
9b5ad6f218
Merge pull request #4968 from miyazakh/cryptonly
...
add WOLF_CRYPTO_CB_ONLY_RSA and WOLF_CRYPTO_CB_ONLY_ECC
2022-04-04 08:31:41 -07:00
David Garske
757c93c6d5
Merge pull request #4945 from kaleb-himes/ZD13795
...
Fix for ZD13795 and also remove all-caps parameter
2022-04-04 08:25:10 -07:00
Daniel Pouzzner
04385f8557
configure.ac: fips 140-3: don't insist on linuxkm-pie unless configuring an actual linuxkm build.
2022-04-04 10:14:22 -05:00
Daniel Pouzzner
0d6c283f7a
fixes for -Werror=declaration-after-statement in debug builds.
2022-04-04 09:29:26 -05:00
Daniel Pouzzner
492704992a
wolfssl/wolfcrypt/settings.h: #ifdef WOLFSSL_LINUXKM, make sure config.h is included only once, before masking out inapplicable autodetected features.
2022-04-04 09:28:06 -05:00
Sean Parkinson
0fba16a394
Merge pull request #4998 from haydenroche5/get_conv_form
...
Add wolfSSL_EC_KEY_get_conv_form to compatibility layer.
2022-04-04 08:47:14 +10:00
Hayden Roche
880afe0d89
Add wolfSSL_EC_KEY_get_conv_form to compatibility layer.
2022-04-02 13:57:33 -07:00
David Garske
54aa211fee
Merge pull request #5015 from douzzer/20220401-Wvla-Wdeclaration-after-statement
...
fix codebase for -Wvla -Wdeclaration-after-statement
2022-04-01 18:48:00 -07:00
Hideki Miyazaki
8e4abb0011
addressed code review comment
2022-04-02 09:18:28 +09:00
Anthony Hu
c522baa75e
Unit tests.
2022-04-01 18:34:21 -04:00
Daniel Pouzzner
ae3996fd0e
fix codebase for -Wvla -Wdeclaration-after-statement; fix some whitespace.
2022-04-01 14:44:10 -05:00
Anthony Hu
211007fb44
WOLFSSL_ASN_API ---> WOLFSSL_API
2022-04-01 15:24:40 -04:00
David Garske
bd0e222fec
Merge pull request #5012 from julek-wolfssl/evp-enc-dec-block
...
Implement `EVP_EncodeBlock` and `EVP_DecodeBlock`
2022-04-01 12:24:23 -07:00
David Garske
6ec0c22a28
Fixes for async in wolfCrypt test.
2022-04-01 12:04:31 -07:00
David Garske
ded168f238
Add check for buffer space in wc_EccPublicKeyToDer. Refactor SetEccPublicKey to put public key directly into output buffer and eliminate small stack. Fixes ZD 13904.
2022-04-01 11:46:27 -07:00
David Garske
9c572efa40
Disable the public key check in import private key for KCAPI. Fix type warning in KCAPI AES.
2022-04-01 11:27:17 -07:00
David Garske
e1965094ad
Add check for ULONG_MAX in SP math to detect if pre-processor correctly handles 64-bit types.
2022-04-01 09:24:46 -07:00
Anthony Hu
edea6428d9
Add new public API wc_CheckCertSigPubKey()
2022-04-01 11:40:25 -04:00
Eric Blankenhorn
ef16ce806c
Fix build errors for NO_WOLFSSL_SERVER and NO_WOLFSSL_CLIENT
2022-04-01 08:04:41 -05:00
Juliusz Sosinowicz
6dffa8a13d
Implement EVP_EncodeBlock and EVP_DecodeBlock
2022-04-01 13:29:40 +02:00
Tesfa Mael
4db45cea4e
Fixes to build with diab and armclang
2022-03-31 20:48:28 -07:00
David Garske
99af84f1e2
Whitespace cleanups.
2022-04-01 09:36:53 +09:00
Hideki Miyazaki
d3a379adac
add WOLF_CRYPTO_CB_ONLY_RSA and WOLF_CRYPTO_CB_ONLY_ECC
2022-04-01 09:36:52 +09:00
Chris Conlon
b45cd921b6
Merge pull request #5005 from dgarske/renesas_spell
2022-03-31 17:44:04 -06:00
Sean Parkinson
7b21cd8cf0
Merge pull request #5001 from dgarske/kcapi_ecc
...
KCAPI ECC/AES optimizations to further reduce page memory use
2022-04-01 08:36:23 +10:00
Sean Parkinson
79444fdb56
Merge pull request #4997 from dgarske/qat_eckg
...
Support for Intel QuickAssist ECC KeyGen acceleration
2022-04-01 08:32:21 +10:00
Sean Parkinson
1add8703e2
Merge pull request #4996 from haydenroche5/bn_rand
...
Improve wolfSSL_BN_rand.
2022-04-01 08:12:22 +10:00
Anthony Hu
5a8fc919ef
Merge pull request #5006 from dgarske/mcapi_test
2022-03-31 18:06:13 -04:00
David Garske
33d2f2687f
Merge pull request #5007 from douzzer/20220331-ignore-readability-avoid-const-params-in-decls
...
20220331-ignore-readability-avoid-const-params-in-decls
2022-03-31 15:05:22 -07:00
Daniel Pouzzner
01f9f7df5f
Merge pull request #5002 from JacobBarthelmeh/Compatibility-Layer
...
sanity check before copy with new memory bio
2022-03-31 15:08:26 -05:00
David Garske
0f0fdea7ff
Merge pull request #5004 from julek-wolfssl/apache-enable-etm
...
Allow encrypt then mac with apache
2022-03-31 12:08:50 -07:00
Daniel Pouzzner
773170464e
undo changes to header files (see b7cecbacb) made to mollify clang-tidy's overly pedantic readability-avoid-const-params-in-decls -- keep declarations and definitions fully aligned, to mollify broken compilers.
2022-03-31 14:02:08 -05:00
David Garske
acb04bec0c
Fix mcapi_test.c to include the settings.h before crypto.h.
2022-03-31 10:54:53 -07:00
David Garske
61f6b5e29c
Peer review feedback.
2022-03-31 10:04:23 -07:00
David Garske
064888bb2a
Add KCAPI ECC support for using a private key id.
2022-03-31 09:05:03 -07:00
David Garske
f8007b2d8f
Further KCAPI AES/ECC memory optimizations. Adds KCAPI_USE_XMALLOC option for AES and ECC to reduce page memory use in certain KCAPI cases that allow it.
2022-03-31 08:58:22 -07:00
David Garske
1993851274
Renesas spelling, code formatting and whitespace fixes.
2022-03-31 08:02:00 -07:00
David Garske
90fe2ab894
Merge pull request #4999 from embhorn/zd13969
...
Add wolfSSL_CTX_SetCertCbCtx to set user context for CB
2022-03-31 07:43:47 -07:00
Juliusz Sosinowicz
4b5649edc9
Allow encrypt then mac with apache
2022-03-31 15:55:57 +02:00
Hayden Roche
3f03f4e40a
Handle case where bits is 0 properly.
2022-03-30 16:56:53 -07:00
David Garske
1de5165dcc
KCAPI ECC optimization to further reduce page memory use.
2022-03-30 15:01:01 -07:00
JacobBarthelmeh
8136c55a39
sanity check before copy with new memory bio
2022-03-30 14:02:03 -07:00
Hayden Roche
a914d782c0
Merge pull request #4810 from anhu/engine_fla
2022-03-30 13:43:09 -07:00
David Garske
c905c613e9
Support for Intel QuickAssist ECC KeyGen acceleration.
2022-03-30 13:07:47 -07:00
Eric Blankenhorn
ea38e1aab5
Add wolfSSL_CTX_SetCertCbCtx to set user context for CB
2022-03-30 12:27:11 -05:00
David Garske
366f159fbb
Merge pull request #4991 from gojimmypi/patch-2
...
Overhaul Espressif ESP-IDF wolfSSL setup_win.bat
2022-03-30 06:56:49 -07:00
David Garske
2029bf0a0b
Merge pull request #4992 from JacobBarthelmeh/Compatibility-Layer
...
support creating new mem bio of length 0
2022-03-30 06:55:53 -07:00
Sean Parkinson
d9df00cdfb
Merge pull request #4994 from dgarske/kcapi
...
KCAPI ECC memory optimizations and KCAPI AES build fix
2022-03-30 11:50:39 +10:00
Hayden Roche
2077690bf0
Improve wolfSSL_BN_rand.
...
- Previously, this function would round up the requested bits to the next
multiple of 8. With this commit, the function returns a number of exactly the
number of bits requested, which is the same behavior as OpenSSL. This problem
was discovered by a user using the compatibility layer with OpenSSH's ssh-keygen
utility.
- This function now respects the top and bottom parameters.
- Improved unit testing.
2022-03-29 18:08:21 -07:00
gojimmypi
409a0acb88
fine tuning on wolfcrypt\test\test_paths.h
2022-03-29 16:07:10 -07:00
gojimmypi
d72d28ac60
copy errors are now only warnings
2022-03-29 15:39:09 -07:00
Kaleb Himes
1dc3808aae
Merge pull request #4986 from cconlon/sslFipsReady
...
Fix FIPS defines in wolfSSL_RSA_sign_generic_padding() / RSA_verify_ex()
2022-03-29 16:02:17 -05:00
gojimmypi
d287863a35
Update setup_win.bat
...
more copy error checking. remove trailing whitespace.
2022-03-29 12:52:50 -07:00
David Garske
d10e72bc98
Fix for KCAPI AES with WOLFSSL_NO_KCAPI_AES_CBC.
2022-03-29 12:50:28 -07:00
Chris Conlon
4ad2f68071
fix defines for FIPS around RSA-PSS in wolfSSL_RSA_sign_generic_padding() and wolfSSL_RSA_verify_ex()
2022-03-29 10:03:16 -06:00
David Garske
0989a14395
Merge pull request #4995 from douzzer/20220328-multi-test-fixes
...
fix reproducible-build for libtool 2.4.7
2022-03-29 08:00:45 -07:00
Daniel Pouzzner
e9b941e16e
configure.ac: fix --enable-reproducible-build to cope with update from libtool-2.4.6 to -2.4.7.
2022-03-29 07:53:43 -05:00
Daniel Pouzzner
8edf237f75
Merge pull request #4993 from SparkiDev/sakke_gen_table_tmp_size_fix
...
SP: fix number of temps alloced in sp_ecc_gen_table
2022-03-28 21:32:35 -05:00
Sean Parkinson
194138f0b8
Merge pull request #4990 from dgarske/async_fix
...
Fixes for async ECC
2022-03-29 10:30:38 +10:00
David Garske
9a8be82653
Merge pull request #4987 from julek-wolfssl/ffmpeg
...
Add support for `--enable-ffmpeg`
2022-03-28 16:33:20 -07:00
Sean Parkinson
f50514b228
SP: fix number of temps alloced in sp_ecc_gen_table
...
Ony affects SAKKE and as a result of point add changes.
2022-03-29 09:11:45 +10:00
David Garske
1abcd4b035
Reduce KCAPI ECC page memory allocation sizes.
2022-03-28 15:40:07 -07:00
David Garske
05f377011b
Fix for building with KCAPI AES enabled.
2022-03-28 15:05:58 -07:00
Jacob Barthelmeh
f7f94cede0
support creating new mem bio of length 0
2022-03-28 15:52:42 -06:00
Anthony Hu
0627437048
Suggestions from haydenroche5
2022-03-28 17:44:00 -04:00
David Garske
12349f39e6
Merge pull request #4974 from kareem-wolfssl/iotsafe
...
IOTSafe workarounds
2022-03-28 13:49:44 -07:00
gojimmypi
b203726623
Overhaul Espressif ESP-IDF wolfSSL setup_win.bat
...
# Description
This is a replacement to https://github.com/wolfSSL/wolfssl/pull/4989 , per the [comment](https://github.com/wolfSSL/wolfssl/pull/4989#issuecomment-1080998040 )
Overhauled `win_setup.bat` for more robust and flexible install of wolfSSL to ESP-IDF `component` directory.
Functionally, there are no significant changes. However this version:
- more verbose output
- show directories used
- more error checking
- check for existing wolfSSL component; prompt to purge or update
- save and optionally re-use `config.h` and `user_settings.h`
- optionally target an alternate ESP-IDF path (useful for VisualGDB)
- offer tips and reminders upon completion
# Testing
Tested on Windows 10 with both ESP-IDF command prompt and stand-alone DOS prompt (e.g. for VisualGDB)
# Checklist
- [ ] added tests
- [ ] updated/added doxygen
- [ ] updated appropriate READMEs
- [ ] Updated manual and documentation
cc: @dgarske
2022-03-28 11:54:50 -07:00
David Garske
5b0735cdb4
Fixes for async ECC broke in PR #4982 .
2022-03-28 11:29:33 -07:00
Kareem
52902f1d37
IoTSafe: Add SP_RSA to user_settings.h template.
2022-03-28 10:25:05 -07:00
Juliusz Sosinowicz
6dc86e7df1
Add support for --enable-ffmpeg
2022-03-28 12:47:19 +02:00
Kareem
be938ed197
IoTSafe Workarounds: Address code review feedback.
2022-03-25 16:17:53 -07:00
JacobBarthelmeh
25d5a624d2
Merge pull request #4975 from cconlon/smallStack
...
smallstack cleanup for OpenSSL Compatibility Functions
2022-03-25 17:06:59 -06:00
John Safranek
0ee01f08bc
Merge pull request #4984 from douzzer/20220325-multi-test-cleanup
...
20220325 multi-test fixes
2022-03-25 15:06:34 -07:00
David Garske
3af3274dcd
Merge pull request #4982 from SparkiDev/sp_x64_improvements
...
SP ASM improvements
2022-03-25 13:04:01 -07:00
David Garske
07f9ca60ac
Fix for async without threading. ./configure --enable-asynccrypt --enable-all CFLAGS="-DWC_NO_ASYNC_THREADING".
2022-03-25 12:43:04 -07:00
David Garske
0930086fa1
Fix for increased mcapi (used by Microchip) ctx sizes if PK callbacks is enabled due to key id/label.
2022-03-25 12:36:07 -07:00
Daniel Pouzzner
008c8509c6
multi-test fixes: whitespace in wolfcrypt/src/random.c and wolfcrypt/test/test.c, bugprone-macro-parentheses and -Wenum-compare in WS_RETURN_CODE() (wolfssl/ssl.h), and clang-analyzer-deadcode.DeadStores in api.c.
2022-03-25 13:26:41 -05:00
David Garske
04e2b6c62a
Merge pull request #4983 from douzzer/20220324-gcc-12-fixes
...
fixups for warnings from gcc-12
2022-03-24 19:16:27 -07:00
Sean Parkinson
7eb95674ee
Merge pull request #4966 from dgarske/kcapi
...
Fixes for KCAPI AES GCM and ECC
2022-03-25 10:18:16 +10:00
Sean Parkinson
fd66f6bcec
SP ASM improvements
...
Change Karatsuba implementations for x86_64.
Fix ECC code to better handle corner cases.
Add 'lower' versions of functions wehn an input is known to be less than m.
Add mont_add/dbl/tpl/sub for P384.
Change ECC point add to be cache-attack resistant.
Change mod_exp to be cache-attack resistant.
2022-03-25 10:04:25 +10:00
John Safranek
14522f25ff
Merge pull request #4904 from kaleb-himes/OE22_NS9210_FIX
...
Fix up random.h conflicts with cert 3389 releases and some NETOS issues
2022-03-24 16:07:23 -07:00
Sean Parkinson
feb58a8455
Merge pull request #4956 from julek-wolfssl/bind-9.18.0
...
bind 9.18.0 fixes
2022-03-25 08:27:34 +10:00
Daniel Pouzzner
12776b3772
fixups for warnings from gcc-12:
...
src/internal.c: use XMEMCMP(), not ==, to compare array elements (fixes conflict of 74408e3ee3 vs 617eda9d44 );
fix spelling of NAMEDGROUP_LEN (was NAMEDGREOUP_LEN);
src/ssl.c: in CheckcipherList() and wolfSSL_parse_cipher_list(), use XMEMCPY(), not XSTRNCPY(), to avoid (benign) -Wstringop-truncation;
scripts/sniffer-tls13-gen.sh: fix for shellcheck SC2242 (exit 1, not -1).
2022-03-24 16:33:36 -05:00
David Garske
b509e174bb
Whitespace fix.
2022-03-24 10:19:28 -07:00
Anthony Hu
ceae169a34
Merge pull request #4969 from dgarske/pk_pubkey
2022-03-24 12:40:03 -04:00
David Garske
624f1499f0
Merge pull request #4978 from julek-wolfssl/issue/4970
...
Prefer status_request_v2 over status_request when both are present
2022-03-24 08:30:12 -07:00
David Garske
5a0d794e88
Merge pull request #4980 from anhu/iv_docs
...
Correction about AES using IV in docs
2022-03-24 08:29:55 -07:00
Juliusz Sosinowicz
29c0c9bf48
Rebase fixes
2022-03-24 13:41:50 +01:00
Juliusz Sosinowicz
850b8c5c3b
OpenSSL compatible API
...
`WOLFSSL_ERROR_CODE_OPENSSL` breaks ABI compatiblity due to changing the expected return code. Let's only do this when building with the full compatibility layer.
2022-03-24 12:16:59 +01:00
Juliusz Sosinowicz
88d5059c36
Jenkins fixes
...
`WS_RETURN_CODE` was not functioning properly in master
2022-03-24 12:16:59 +01:00
Juliusz Sosinowicz
98bc8402db
Refactor memory BIO
...
- use the `WOLFSSL_BUF_MEM` struct to resize the internal memory buffer
- add a `WOLFSSL_BIO_RESIZE_THRESHOLD` define that will be used to determine how often to shrink the internal buffer. This should cut down on the number of free/malloc calls made significantly. This should help with our inefficient 1 byte reads in `loadX509orX509REQFromPemBio`.
- implement `wolfSSL_BUF_MEM_resize` which allows bi-directional buffer size manipulation
2022-03-24 12:16:59 +01:00
Juliusz Sosinowicz
ae9b01c5b8
bind 9.18.0 fixes
...
- return `1` from `wolfSSL_BIO_set_mem_eof_return` instead of `0` for success
- bind requires ALPN
- `OPENSSL_COMPATIBLE_DEFAULT` defined for bind
- `WOLFSSL_ERROR_CODE_OPENSSL` defined when using compatibility layer
- return `bio->eof` on no pending data to read in memory BIO (defaults to `WOLFSSL_BIO_ERROR`)
- `flags` is no longer an input parameter in `wolfSSL_ERR_get_error_line_data`
- allow lazy parameter loading in `wolfSSL_DH_set0_key`
- implement reference counter in `WOLFSSL_EC_KEY`
- load serial number from `x509->serialNumber` if `x509->serial` is empty
2022-03-24 12:16:59 +01:00
Anthony Hu
f71a85d5f9
Merge pull request #4979 from dgarske/sniffer_tidy
2022-03-23 15:13:20 -04:00
Anthony Hu
1bc71da1df
Correction about AES using IV in docs
2022-03-23 13:35:13 -04:00
David Garske
6e550c8d75
Fix for KCAPI ECC KeyGen. Disable ECC consistency checks with KCAPI. Allow public AddSignature (used to be public). Fix KCAPI ECC SharedSecret output size.
2022-03-23 09:37:50 -07:00
David Garske
8bafa7f601
Fix for KCAPI ECC sign (was not returning the signature, since ret always 0).
2022-03-23 09:37:50 -07:00
David Garske
c9e3094cb0
Fixes for KCAPI ECC verify. Cleanup of the pubkey_raw. Fix KCAPI AES possible used uninitialized.
2022-03-23 09:37:50 -07:00
David Garske
8d695f97c9
Fix for KCAPI KcapiEcc_LoadKey parameter to kcapi_kpp_keygen. Added option to release handle on load. Fixes for KCAPI sign output length. Added additional argument checking.
2022-03-23 09:37:50 -07:00
David Garske
318350f63b
Fix for ecc_check_privkey_gen with KCAPI. Fix KCAPI ECDSA to ensure we don't leak handle for multiple sign/verify calls.
2022-03-23 09:37:50 -07:00
David Garske
9f2dc408a0
Fixes for KCAPI AES GCM. Add guards for algorithm macros on KCAPI.
2022-03-23 09:37:50 -07:00
David Garske
1b0e5f4806
Allow disabling DRBG with KCAPI. Add KCAPI /dev/hwrng support.
2022-03-23 09:37:50 -07:00
David Garske
5fe6f1c875
For KCAPI do not force enable ECC curves, set K or seed callback, disable AES GCM tests with non standard IV.
2022-03-23 09:37:50 -07:00
David Garske
b04954dc98
Merge pull request #4977 from SparkiDev/ssl_move_x509_store
...
ssl.c: move out X509 store APIs to new file
2022-03-23 09:36:33 -07:00
David Garske
f129c32273
Fixes for whitespace, script bug and bit-field type.
2022-03-23 09:31:04 -07:00
Anthony Hu
b6e590836d
initialize ENABLE_FIPS
2022-03-23 10:29:59 -04:00
Juliusz Sosinowicz
4412496adb
Prefer status_request_v2 over status_request when both are present
...
Reported in https://github.com/wolfSSL/wolfssl/issues/4970
2022-03-23 11:20:22 +01:00
Sean Parkinson
90f53aed34
ssl.c: move out X509 store APIs to new file
2022-03-23 13:59:54 +10:00
Anthony Hu
3dd2219548
Don't over-write ENABLED_FIPS with no if user didn't specify anything.
2022-03-22 20:33:27 -04:00
Daniel Pouzzner
d864fc9a3f
Merge pull request #4972 from julek-wolfssl/asn-time-tz-diff
...
`mktime` may return a negative due to timezones around the unix epoch
2022-03-22 14:03:59 -05:00
David Garske
cf0e4a0e3d
Merge pull request #4976 from anhu/kill_tabs
...
Get rid of tabs I added previously.
2022-03-22 11:35:00 -07:00
Chris Conlon
906ea4ad03
smallstack reduction for wolfSSL_EC_POINT_invert
2022-03-22 10:00:17 -06:00
Chris Conlon
64a309e245
smallstack reduction for wolfSSL_ASN1_INTEGER_to_BN
2022-03-22 10:00:17 -06:00
Chris Conlon
ddc1899d48
smallstack reduction for wolfSSL_EC_POINT_get_affine_coordinates_GFp
2022-03-22 10:00:17 -06:00
Chris Conlon
94e1b87ae0
smallstack reduction for wolfSSL_X509_set_ext, wolfSSL_EC_POINT_mul, wolfSSL_ECDSA_do_sign, wolfSSL_i2d_X509_NAME, wolfSSL_X509_REQ_sign
2022-03-22 10:00:13 -06:00
Anthony Hu
c41bef6486
Get rid of tabs I added previously.
2022-03-22 11:56:15 -04:00
David Garske
aa38d99538
Fix for TLS PK callback issue with Ed25519/Ed448 and public key not being set.
2022-03-22 08:33:54 -07:00
JacobBarthelmeh
c377a709e1
Merge pull request #4953 from cconlon/apiVersionDiff
...
More checks on OPENSSL_VERSION_NUMBER for API prototype differences
2022-03-21 16:59:06 -06:00
Anthony Hu
2babac6cb5
Merge pull request #4875 from dgarske/sniffer_async
2022-03-21 16:47:23 -04:00
Chris Conlon
210eb6283c
smallstack reduction for wc_ecc_import_x963_ex, mp_jacobi
2022-03-21 14:43:43 -06:00
Chris Conlon
851ff9e661
smallstack reduction for PrintPubKeyRSA, PrintPubKeyDSA, PrintPubKeyDH
2022-03-21 14:43:43 -06:00
Chris Conlon
339e44bd87
smallstack reduction for wc_ecc_import_point_der_ex()
2022-03-21 14:43:43 -06:00
David Garske
59665a44b5
Fixes for allowing server to have a public key set when using external key with PK callbacks.
2022-03-21 13:14:24 -07:00
David Garske
29c120356e
Sniffer asynchronous support.
...
* Adds stateful handling of DH shared secret computation in `SetupKeys`.
* Improved the decrypt handling to use internal functions and avoid generating alerts on failures.
* Fix for sniffer resume due to missing `sessionIDSz` broken in #4807 .
* Fix sniffer test cases to split resume (session_ticket) tests.
* Add `snifftest` list of build features so test script can gate running resume test.
2022-03-21 12:05:08 -07:00
Kareem
af70edb99d
Strip trailing zeroes from cert buffer when using IOTSAFE_NO_GETDATA.
2022-03-21 10:53:36 -07:00
Jacob Barthelmeh
4951646c91
touch up class name and function comments
2022-03-21 10:56:09 -06:00
Jacob Barthelmeh
fb3d38c3e8
add example C# PSK client
2022-03-21 10:19:45 -06:00
David Garske
c213c725d7
Merge pull request #4971 from SparkiDev/fp_div2_mod_ct_oob
...
TFM fp_div_2_ct: rework to avoid overflow
2022-03-21 09:11:41 -07:00
David Garske
8bf14ba1d3
Merge pull request #4957 from JacobBarthelmeh/Compatibility-Layer
...
alter return value and add error string
2022-03-21 09:10:04 -07:00
David Garske
08d6474878
Merge pull request #4954 from SparkiDev/rsa_fermat
...
RSA: check for small difference between p and q
2022-03-21 09:09:38 -07:00
David Garske
b90df0a6aa
Merge pull request #4951 from ejohnstown/wolfrand
...
wolfRand for AMD
2022-03-21 09:09:19 -07:00
Juliusz Sosinowicz
d7037da0b5
mktime may return a negative due to timezones around the unix epoch
2022-03-21 17:07:13 +01:00
Juliusz Sosinowicz
9763030675
Merge pull request #4845 from cconlon/pkcs7compat
2022-03-21 15:26:37 +01:00
Sean Parkinson
8dbd8b0ad6
RSA: check for small difference between p and q
2022-03-21 10:58:14 +10:00
Sean Parkinson
aa14607a6f
TFM fp_div_2_ct: rework to avoid overflow
...
Don't set the overflow word. Instead integrate the div by 2 into the
function so that the overflow word doesn't need to be stored.
2022-03-21 10:43:06 +10:00
Sean Parkinson
2f52d3cd20
Merge pull request #4965 from dgarske/aes_win_clang
...
Fixes for Windows AESNI with clang
2022-03-21 08:24:21 +10:00
Hayden Roche
dcaa218ed8
Merge pull request #4927 from cconlon/upRef
2022-03-18 18:10:36 -07:00
Hayden Roche
7ea6b73c7b
Merge pull request #4928 from cconlon/compatCleanups
2022-03-18 16:23:56 -07:00
Hayden Roche
2637e5e361
Merge pull request #4926 from cconlon/namePrintRFC5523
2022-03-18 15:53:07 -07:00
Chris Conlon
c491a6c829
EVP_PKEY_copy_parameters: correctly mark inner struct owned
2022-03-18 16:37:45 -06:00
David Garske
a79daa5ea8
Merge pull request #4959 from haydenroche5/asn1_time_diff_bug
...
Fix bug in wolfSSL_ASN1_TIME_diff.
2022-03-18 14:28:23 -07:00
Chris Conlon
582f0d82e4
address review feedback for PKCS7 compat additions
2022-03-18 12:07:44 -06:00
JacobBarthelmeh
bfee3dffc6
Merge pull request #4967 from dgarske/pubkey_size
...
Fix for `wc_EccPublicKeyToDer` incorrectly requiring too much buffer
2022-03-18 09:22:52 -06:00
David Garske
bcce015496
Merge pull request #4964 from julek-wolfssl/wolfSSL_get_session-docs
...
Update `wolfSSL_get_session` docs
2022-03-18 06:51:27 -07:00
David Garske
bb27fa4555
Fix for wc_EccPublicKeyToDer incorrectly requiring too much buffer. Merge error included old ASN code and incorrectly excluded ASN template. ZD13904.
2022-03-17 18:51:37 -07:00
Sean Parkinson
ef66a12a24
Merge pull request #4961 from dgarske/cust_fixups
...
Various portability improvements (Time, DTLS epoch size, IV alloc)
2022-03-18 11:38:57 +10:00
Sean Parkinson
f117308135
Merge pull request #4921 from dgarske/private_keyid
...
Added private key id/label support - improve PK callback public key use
2022-03-18 11:36:28 +10:00
David Garske
b546b2a5ec
Improve logic around private key id/label. Adds WOLF_PRIVATE_KEY_ID.
2022-03-17 14:48:30 -07:00
David Garske
f954aef973
Fixes for Windows AESNI with clang. Improve 32-bit support.
2022-03-17 14:05:24 -07:00
David Garske
ae25a48509
Improve the build message to not always allocate the IV (16 byte) (use fixed buffer if <= 16 bytes).
2022-03-17 14:01:57 -07:00
David Garske
3fba5d17c3
Various portability improvements:
...
* Change DTLS epoch size word16.
* Allow override of the `RECORD_SIZE` and `STATIC_BUFFER_LEN`.
* Remove endianness force from game build.
* Add `gmtime_s` option.
* Fix for macro conflict with `MAX_KEY_SIZE`.
* Expose functions `wolfSSL_X509_notBefore`, `wolfSSL_X509_notAfter`, `wolfSSL_X509_version` without `OPENSSL_EXTRA`.
2022-03-17 14:00:55 -07:00
JacobBarthelmeh
54477d1bea
improvements around keystore key update
2022-03-17 12:04:52 -06:00
Jacob Barthelmeh
40c79b1134
add macro guards to handle build with QNX CAAM
2022-03-17 12:04:52 -06:00
Jacob Barthelmeh
9bf2962852
default to strict NVM operations with key generation
2022-03-17 12:04:52 -06:00
Jacob Barthelmeh
090932b65c
FIPS benchmark of cmac and ecb
2022-03-17 12:04:52 -06:00
JacobBarthelmeh
55b42dd85a
Add SECO use and expand cryptodev
2022-03-17 12:04:52 -06:00
Juliusz Sosinowicz
1fd090d094
Update wolfSSL_get_session docs
...
Recommend using `wolfSSL_get1_session` and `NO_SESSION_CACHE_REF` for session resumption purposes. `wolfSSL_get_session` should not be used unless to inspect the current session object.
2022-03-17 12:56:28 +01:00
Sean Parkinson
f76105a93b
TLS 1.3 PSK: multiple ids for a cipher suite
...
When WOLFSSL_PSK_MULTI_ID_PER_CS is defined, multiple identities can be
returned for a cipher suite.
The first byte of the identity is the count of identites that have been
seen so far for the cipher suite.
2022-03-17 09:31:25 +10:00
David Garske
aa8e5a29d4
Merge pull request #4947 from cconlon/compatSmallStack
...
Stack/smallstack cleanup for OpenSSL compatibility functions
2022-03-15 16:47:23 -07:00
Chris Conlon
a52539c489
Merge pull request #4958 from TakayukiMatsuo/example
2022-03-15 17:39:07 -06:00
David Garske
5b268c0852
Merge pull request #4960 from anhu/stm32_pq_bench
...
Add Post-quantum KEM benchmark for STM32
2022-03-15 16:36:08 -07:00
John Safranek
f80faebfe5
wolfRand for AMD
...
1. Add configure option to enable AMD's RDSEED.
2. Add seed parameters when building specifically for AMD using RDSEED.
3. Update the wolfCrypt test to play nice with the larger seed size.
2022-03-15 15:20:08 -07:00
Anthony Hu
fbfb1fee91
Add Post-quantum KEM benchmark for STM32
2022-03-15 14:49:40 -04:00
Hayden Roche
6e6aa5b0c1
Fix bug in wolfSSL_ASN1_TIME_diff.
...
This function should not error out if one of the passed in times is the Unix
epoch. This amounts to erroring out when the XMKTIME returns < 0, rather than
<= 0.
2022-03-15 10:52:05 -07:00
JacobBarthelmeh
d0e83be596
alter return value and add error string
2022-03-15 10:26:59 -07:00
TakayukiMatsuo
365a4de154
Fix settings and removed warnings
2022-03-16 02:12:45 +09:00
Daniel Pouzzner
d531e21f34
Merge pull request #4946 from dgarske/async_earlydata
...
Fixes for TLS v1.3 early data with async
2022-03-15 12:12:09 -05:00
David Garske
9c29102c43
Merge pull request #4948 from SparkiDev/tls12_pa_failsafe
...
TLS: add peer authentication failsafe for TLS 1.2 and below
2022-03-15 09:42:56 -07:00
Chris Conlon
6762cd90da
add tests for PKCS7_sign(), PKCS7_final(), SMIME_write_PKCS7()
2022-03-15 10:21:22 -06:00
Chris Conlon
ce514e6fc5
add PKCS7_sign, PKCS7_final, SMIME_write_PKCS7. add signer cert verify support to PKCS7_verify, support for PKCS7_TEXT, PKCS7_DETACHED, PKCS7_STREAM
2022-03-15 10:21:22 -06:00
Chris Conlon
ba4f3379ba
remove unimplemented wc_MIME_* prototypes in asn.h
2022-03-15 10:21:22 -06:00
Chris Conlon
a7d5e6400d
add support for PKCS7_TEXT flag to PKCS7_verify()
2022-03-15 10:21:22 -06:00
David Garske
2febed01a5
Merge pull request #4949 from SparkiDev/ssl_move_conf
...
ssl.c: move TXT and CONF APIs out into conf.c
2022-03-15 09:02:42 -07:00
Chris Conlon
f7c5c9f713
extra checks for OPENSSL_VERSION_NUMBER for API prototype differences
2022-03-15 09:41:51 -06:00
Chris Conlon
7c63dd6245
smallstack reduction for wolfSSL_set_accept_state()
2022-03-15 09:40:51 -06:00
Chris Conlon
062003916c
stack/smallstack reduction for wolfssl_x509_make_der(), d2iGenericKey(), PrintPubKeyEC(), wolfSSL_EC_POINT_add()
2022-03-15 09:40:48 -06:00
Sean Parkinson
343e8bccdd
ssl.c: move TXT and CONF APIs out into conf.c
2022-03-15 12:09:24 +10:00
David Garske
4ec49d2189
Merge pull request #4943 from SparkiDev/sp_arm64_perf_1
...
SP ASM performance improvements
2022-03-14 18:40:51 -07:00
David Garske
e3276ca683
Merge pull request #4939 from SparkiDev/aes_gcm_align
...
AES-GCM: stack alignment issues
2022-03-14 18:37:11 -07:00
Sean Parkinson
9ed061cc96
TLS: add peer authentication failsafe for TLS 1.2 and below
...
Tightened the TLS 1.3 failsafe checks too.
2022-03-15 08:51:44 +10:00
Sean Parkinson
eeb7f72a07
AES-GCM: stack alignment issues
...
Don't expect stack to be aligned.
vmovdqu is no longer slower than vmovdqa.
2022-03-15 08:49:43 +10:00
Anthony Hu
b3319bd952
Undo the logic around enable sha as its enabled by default already.
2022-03-14 16:29:13 -04:00
David Garske
34e491f39f
Merge pull request #4950 from SparkiDev/regression_fixes_3
...
TLS 1.3 script test: wait for server to write file
2022-03-14 13:24:06 -07:00
Anthony Hu
821e293ed4
Fix to add test where needed.
2022-03-14 15:54:39 -04:00
Anthony Hu
b3e28fab67
Make the code simpler.
2022-03-14 13:51:05 -04:00
Anthony Hu
ea500bd1c8
--enable-engine=fips-v2,fips-readyetc., etc.
2022-03-14 13:51:05 -04:00
Anthony Hu
07ee2bcecf
Created new --enable-engine and --enable-engine-witout-fips flags
2022-03-14 13:51:05 -04:00
Sean Parkinson
2c1ecacbfc
TLS 1.3 script test: wait for server to write file
...
Also fixes for:
./configure --enable-psk --disable-rsa --disable-ecc --disable-dh
C_EXTRA_FLAGS=-DWOLFSSL_STATIC_PSK
./configure --disable-shared --enable-curve448 --enable-ed448
--disable-rsa --disable-dh --enable-tls13 --disable-ecc --enable-certgen
--enable-keygen
2022-03-14 14:42:47 +10:00
Daniel Pouzzner
4966eb7897
Merge pull request #4944 from douzzer/20220310-asn-template-EncodeExtensions-overrun
...
wolfcrypt/src/asn.c: fix buffer underrun in EncodeExtensions() and leak in ParseCRL_Extensions()
2022-03-13 21:21:07 -05:00
Sean Parkinson
cdb45b12c5
Merge pull request #4884 from haydenroche5/i2d_x509_name_fix
...
Improve wolfSSL_i2d_X509_name.
2022-03-14 11:57:07 +10:00
Sean Parkinson
20562b3f78
DecodeNameConstraints (ASN Template): free ASNGetData
2022-03-14 09:14:19 +10:00
David Garske
a816f329cc
Merge pull request #4856 from anhu/stm32u5
...
Enable support for STM32U585 and PQC for STM32
2022-03-11 14:49:46 -08:00
Daniel Pouzzner
fb0c9b2a66
ssl.c: use InitHandshakeHashes(), not FreeHandshakeHashes(), to reset ssl->hsHashes.
2022-03-11 16:26:24 -06:00
David Garske
dd8fb41f66
Fixes for TLS v1.3 early data with async.
2022-03-11 14:03:46 -08:00
Daniel Pouzzner
830431ccdf
scripts/tls13.test: fix whitespace.
2022-03-11 13:54:50 -06:00
Daniel Pouzzner
82ab7bf32c
ssl.c: fix hash state memory leaks in wolfSSL_clear() and wolfSSL_TicketKeyCb().
2022-03-11 13:40:01 -06:00
Anthony Hu
8cba961bac
Comment fixups, bad braces, and stray &.
2022-03-11 12:14:02 -05:00
Chris Conlon
9fff321e3e
address PR review feedback on EVP_PKEY changes
2022-03-11 10:11:02 -07:00
Chris Conlon
82c6f58eb0
define BIO_CTRL_SET, BIO_CTRL_GET
2022-03-11 09:53:56 -07:00
Chris Conlon
6e6108bb98
remove duplicate BIO_CLOSE/BIO_NOCLOSE definition, already in openssl/bio.h
2022-03-11 09:53:56 -07:00
Chris Conlon
238072c84d
map BIO_s_accept to BIO_s_socket for basic use
2022-03-11 09:53:56 -07:00
Chris Conlon
2639c5e268
X509V3_set_ctx arg check fix, debug log cleanup
2022-03-11 09:53:51 -07:00
Daniel Pouzzner
385ece92d8
ECCSI and SAKKE: fix smallstackcache memory leaks in library, and blue-moon undefined behavior bugs in test.c eccsi_test(() and sakke_test().
2022-03-11 10:06:18 -06:00
kaleb-himes
fc92584bd2
Address the one that was missed
2022-03-11 08:36:36 -07:00
Daniel Pouzzner
64953299cf
scripts/tls13.test: retries (up to 10) for early data scenarios, to mitigate race noted in #4918 .
2022-03-11 08:18:14 -06:00
Daniel Pouzzner
7602eef98f
src/ssl.c: use strlcpy(), not strncpy(), to make string_fortified happy (else "error: ‘__builtin_strncpy’ specified bound 46 equals destination size").
2022-03-11 08:15:44 -06:00
Daniel Pouzzner
b2ae7f4230
wolfssl/openssl/asn1.h: in ASN1_SIMPLE(), use OFFSETOF() macro.
2022-03-11 07:59:08 -06:00
Sean Parkinson
c3eab0dcdd
Fixes from sanitizer build
...
Fix OID index in SetNameRdnItems for multi attributes.
Stop warning about strncpy to small.
Fix casting in ASN1_SIMPLE to use consistent type.
2022-03-11 14:27:50 +10:00
David Garske
cf030de48a
Merge pull request #4930 from SparkiDev/tfm_alloc_fails
...
TFM: handle more alloc failure cases gracefully
2022-03-10 15:42:21 -08:00
Sean Parkinson
3ea5e56c26
SP ASM performance improvements
...
Mostly improving Aarch64 assembly.
Change Karatsuba implementations.
Specialised code for exponentiating to 0x10001 for RSA.
2022-03-11 08:42:46 +10:00
David Garske
570daa6a7f
Enable support for STM32U585 and PQ on M4
2022-03-10 14:19:01 -05:00
kaleb-himes
0eef90f951
Fix for ZD13795 and also remove all-caps parameter
2022-03-10 11:40:32 -07:00
Daniel Pouzzner
c78bfa4db8
scripts/tls13.test: when $early_data = yes, print the matching line counts.
2022-03-10 11:56:20 -06:00
Daniel Pouzzner
227804f034
wolfcrypt/src/asn.c: in ParseCRL_Extensions(), add missing FREE_ASNGETDATA().
2022-03-10 11:45:37 -06:00
Daniel Pouzzner
170b125b39
wolfcrypt/src/asn.c: fix buffer underrun in EncodeExtensions(), due to faulty iteration limit calculation, when smallstack build.
2022-03-10 09:38:19 -06:00
Sean Parkinson
6b7f0d4ee7
Merge pull request #4905 from anhu/custom_ext_parse
...
Injection and parsing of custom extensions in X.509 certificates.
2022-03-10 10:39:05 +10:00
David Garske
b30ada1608
Merge pull request #4940 from ejohnstown/wolfrand
...
Fix wolfRand Build
2022-03-09 15:42:19 -08:00
Sean Parkinson
47895fe78d
Merge pull request #4942 from dgarske/sp_math_opensslextra
...
Fixes to support building opensslextra with SP math
2022-03-10 08:53:21 +10:00
Sean Parkinson
b4df909df0
Merge pull request #4934 from haydenroche5/x509_v_err_sync
...
Sync up X509_V_ERR codes with OpenSSL.
2022-03-10 08:37:10 +10:00
Anthony Hu
98f733767b
Use MAX_OID_SZ
2022-03-09 17:20:50 -05:00
Chris Conlon
e1da313b91
EVP_PKEY_copy_parameters: add support for EVP_PKEY_DH
2022-03-09 14:34:09 -07:00
David Garske
141cf822f2
Merge pull request #4941 from douzzer/20220309-script-cleanup
...
20220309 script cleanup
2022-03-09 13:30:50 -08:00
Chris Conlon
bcfe8bf2e2
Merge pull request #4933 from haydenroche5/x509_set_ext_ext_key_usage
2022-03-09 13:22:49 -07:00
David Garske
3a62857dbd
Fixes to support building opensslextra with SP math. Disables some of the compatibility layer BN and ECC point handling.
2022-03-09 11:53:56 -08:00
Anthony Hu
b043225dbd
Fixes inspired by review by SparkiDev.
2022-03-09 13:39:53 -05:00
John Safranek
d6fb454063
Fix wolfRand Build
...
1. Remove the v3 FIPS build from configure and automake. This was for
the old FIPS Ready build, which is now fixed to the certificate 3389
configuration.
2. Remove AES-GCM, PKCS12, and SHA-3 from wolfRand build. They were
getting reenabled later in the configure.
2022-03-09 10:35:39 -08:00
Daniel Pouzzner
abfc788389
script cleanup: use #!/bin/bash on all scripts that use "echo -e" (/bin/sh is sometimes a non-Bourne/non-POSIX shell, e.g. dash/ash, with no support for "echo -e"); fix whitespace.
2022-03-09 12:28:22 -06:00
Daniel Pouzzner
67cc8ed482
tests/api.c: fix test_wolfSSL_BIO_Qt_usecase() "function declaration isn’t a prototype".
2022-03-09 12:27:19 -06:00
David Garske
4ff82e22e6
Merge pull request #4938 from douzzer/20220308-shellcheck-errors
...
fixes for shell script errors detected by shellcheck --severity=error.
2022-03-08 12:51:11 -08:00
Chris Conlon
70857f7b3c
Merge pull request #4923 from miyazakh/set_bio
...
Set bio read/write flag obviously
2022-03-08 13:08:33 -07:00
David Garske
c256d8ca92
Merge pull request #4936 from julek-wolfssl/no-force-ecc-ca
...
Don't force a ECC CA when a custom CA is passed with `-A`
2022-03-08 10:58:35 -08:00
Daniel Pouzzner
c9a7393923
fixes for shell script errors detected by shellcheck --severity=error.
2022-03-08 12:51:48 -06:00
David Garske
a4229c6cf8
Merge pull request #4932 from SparkiDev/tls_hmac_fix
...
TLS HMAC: fix number of blocks to not process
2022-03-08 10:06:11 -08:00
David Garske
4a912f29d1
Merge pull request #4843 from tmael/sp_diab
...
Support (no)inline with Wind River Diab compiler
2022-03-08 10:00:16 -08:00
Juliusz Sosinowicz
3c64731c4f
Don't force a ECC CA when a custom CA is passed with -A
...
The following config would fail `../configure --enable-opensslall CFLAGS="-DOPENSSL_COMPATIBLE_DEFAULTS" && make -j check`. This is because `test-fails.conf` `ECC no signer error` test expects a failure while the ECC CA was being added as a trusted cert due to `OPENSSL_COMPATIBLE_DEFAULTS`.
2022-03-08 15:02:43 +01:00
Daniel Pouzzner
031c97f835
Merge pull request #4931 from douzzer/20220307-early-data-and-c99-fixes
...
enable-earlydata vs enable-fips/enable-asynccrypt
2022-03-08 07:34:58 -06:00
Hideki Miyazaki
f71be0546c
addressed review comments
2022-03-08 18:20:30 +09:00
Hayden Roche
31736307fd
Sync up X509_V_ERR codes with OpenSSL.
...
We defined these codes to values that didn't match those in OpenSSL. This is a
problem if a user is porting code from OpenSSL to wolfSSL that uses hardcoded
versions of these values. While the user's code should be fixed to not use
hardcoded values, we can make the port smoother by syncing the values up.
2022-03-07 15:58:46 -08:00
Anthony Hu
2cbe28fcf9
Sequences are constructed
2022-03-07 18:50:38 -05:00
David Garske
872ed28882
Merge pull request #4925 from kareem-wolfssl/nullSslMethod
...
Add SSL_R_NULL_SSL_METHOD_PASSED.
2022-03-07 15:36:56 -08:00
Chris Conlon
f49983b3b3
EVP_PKEY_keygen: add DH keygen support, fixes to EVP_PKEY_set1/get1_DH
2022-03-07 16:32:23 -07:00
Chris Conlon
939ce713df
EVP_PKEY_derive: set internal DH key if needed
2022-03-07 16:32:22 -07:00
Chris Conlon
f3f0d49fce
EVP_PKEY_CTX_new: set curve NID from pkey if available
2022-03-07 16:32:22 -07:00
Chris Conlon
85f85cc76a
add DH_up_ref() and unit test
2022-03-07 16:32:22 -07:00
Chris Conlon
8e0f5f9289
EVP_PKEY_get1/set1_EC_KEY: modify for EC_KEY_up_ref support
2022-03-07 16:31:09 -07:00
Chris Conlon
76014260f6
add EC_KEY_up_ref() and unit test
2022-03-07 16:31:09 -07:00
David Garske
9b808bde20
Fixes for building with HAVE_EX_DATA no compat layer.
2022-03-07 17:20:58 -06:00
Hayden Roche
39d975a3c3
Add extended key usage support to wolfSSL_X509_set_ext.
2022-03-07 15:20:01 -08:00
Daniel Pouzzner
0231304607
fixes for make check with --enable-all (now including --enable-earlydata) with fips or asynccrypt:
...
in scripts/tls13.test, use fips-compatible server-side cipher suite for "TLS v1.3 cipher suite mismatch" test, and modernize some syntax;
in configure.ac, omit earlydata from enable-all when asynccrypt, pending fix;
also in configure.ac, fix AC_CHECK_DECLS()-overriding-AC_CHECK_FUNCS() kludge, to fix CPPFLAGS=-std=c99 builds.
2022-03-07 17:19:31 -06:00
Sean Parkinson
0a91d42f2c
TLS HMAC: fix number of blocks to not process
...
Change made to line for static analysis.
Change was made incorrectly due to bracketting.
This fixes it.
2022-03-08 08:10:52 +10:00
Hayden Roche
a9cc1ca877
Merge pull request #4924 from dgarske/coexist_fixes
2022-03-07 13:00:22 -08:00
Anthony Hu
d77d9b93dc
This fixes a make check error.
...
The flags activated code that didn't account for the new oid encoding. This
code fixes that.
2022-03-07 15:47:47 -05:00
John Safranek
0e0ac14bbf
Merge pull request #4901 from SparkiDev/kcapi_ecdh_fixes
...
Fixes for KCAPI ECDH/DH and page alignment
2022-03-07 11:01:16 -08:00
David Garske
e7041d2315
Merge pull request #4929 from SparkiDev/siphash_clang
...
SipHash: Replace gcc specific ASM instruction with generic
2022-03-07 10:34:13 -08:00
Sean Parkinson
3b4ba669d4
Merge pull request #4922 from dgarske/async_disable_fixes
...
Fixes for async disables around the DevCopy calls
2022-03-07 13:51:09 +10:00
Sean Parkinson
1ca35f6cca
TFM: handle more alloc failure cases gracefully
2022-03-07 13:20:39 +10:00
Sean Parkinson
d5989dc15e
SipHash: Replace gcc specific ASM instruction with generic
...
clang would not compile movxzb.
Replaced with movzbq.
2022-03-07 08:49:28 +10:00
Sean Parkinson
a68261cd82
Merge pull request #4757 from kareem-wolfssl/xstatstruct
...
Add separate "struct stat" definition XSTAT_TYPE to make overriding XSTAT easier.
2022-03-07 08:32:05 +10:00
Sean Parkinson
7006efe97f
Merge pull request #4861 from JacobBarthelmeh/ECC
...
Deterministic ECDSA: fix for larger curve sizes
2022-03-07 08:26:35 +10:00
Sean Parkinson
84beb5ed7b
Merge pull request #4918 from miyazakh/enableall_earlydata
...
enable early data when specifying `--enable-all` option
2022-03-07 08:05:36 +10:00
Hideki Miyazaki
6bc3b7fc9d
addressed jenkins failure
2022-03-06 07:41:37 +09:00
Hideki Miyazaki
a572c19268
set bio flag obviously
...
fix nightly Qt test
2022-03-06 07:41:36 +09:00
Daniel Pouzzner
9be0633ce3
Merge pull request #4824 from dgarske/fips_ready_user
...
User settings template for FIPS v5 ready
2022-03-05 07:52:03 -06:00
Chris Conlon
2fc47fedee
Merge pull request #4900 from miyazakh/esp_waituntil
...
Fix wait-until-done in rsa hw primitive acceleration of ESP-IDF port
2022-03-04 17:32:06 -07:00
Chris Conlon
930a3d85e1
add support to X509_NAME_print_ex() for RFC5523 basic escape
2022-03-04 17:19:33 -07:00
David Garske
0c3b9c733f
Fixes for KCAPI ECDH/DH and page alignment. ZD 13763
2022-03-04 15:06:16 -08:00
Kareem
f162d7f530
Add SSL_R_NULL_SSL_METHOD_PASSED.
2022-03-04 15:11:09 -07:00
Kareem
719ed213d5
Add separate "struct stat" definition XSTAT_TYPE to make overriding XSTAT easier.
2022-03-04 14:54:56 -07:00
Anthony Hu
0a1c052c40
doxygen for wc_SetCustomExtension()
2022-03-04 16:24:27 -05:00
Kareem
e6189a638c
IOTSafe workarounds: Allow reading files with no GetSize command available, allow sign command response with no padding.
2022-03-04 14:03:47 -07:00
Anthony Hu
806cd4fbba
doxygen for myUnknownExtCallback()
2022-03-04 15:32:11 -05:00
David Garske
3839b0e675
Fixes for building wolfSSL along side openssl.
2022-03-04 12:06:24 -08:00
David Garske
ce8ef8f7c6
Merge pull request #4913 from kareem-wolfssl/makeClean
...
Allow disabling forced 'make clean' at the end of ./configure.
2022-03-04 12:02:08 -08:00
Chris Conlon
e1829e614d
Merge pull request #4820 from haydenroche5/evp_pkey_paramgen
...
Add wolfSSL_EVP_PKEY_paramgen to the compatibility layer.
2022-03-04 11:49:21 -07:00
Jacob Barthelmeh
a4a4bdc20f
fix typo, add macro guard, remove dead code path
2022-03-04 10:49:11 -07:00
Hideki Miyazaki
90355df4b0
disable early data for --enable-distro
...
addressed jenkins failure
2022-03-04 17:00:29 +09:00
David Garske
e91f0f173b
Fixes for async disables around the DevCopy calls. ZD13824
2022-03-03 16:33:18 -08:00
Kareem
09e7b7150f
Allow overriding make command used for make clean with make.
2022-03-03 15:51:26 -07:00
Hayden Roche
9ec30f02a6
Merge pull request #4898 from kaleb-himes/140-2-ready
2022-03-03 14:43:02 -08:00
Anthony Hu
3ad94c63f5
Pass the tests!
2022-03-03 17:02:26 -05:00
Anthony Hu
7ec61dfe05
Make jenkins happy
2022-03-03 15:44:00 -05:00
Kaleb Himes
0e8066dda0
Fix typo
2022-03-03 11:45:42 -07:00
Jacob Barthelmeh
d1212f9247
add P521 test case and fix for k generation
2022-03-03 10:44:24 -07:00
David Garske
2567cd5e5a
Merge pull request #4912 from julek-wolfssl/ZD13742
...
Check `input` size in `DecodeNsCertType`
2022-03-03 08:22:49 -08:00
David Garske
3a5f78b55a
Merge pull request #4919 from julek-wolfssl/ZD13737
...
Reported in ZD13737
2022-03-03 08:22:11 -08:00
Anthony Hu
949f8b5be1
Revert back to word16 API.
2022-03-03 10:41:05 -05:00
Sean Parkinson
63e4ba5854
Merge pull request #4906 from julek-wolfssl/ZD13606-master
...
Fix issues reported in ZD13606
2022-03-03 21:27:22 +10:00
Sean Parkinson
85fc2bb7fa
Make old less secure TimingPadVerify implementation available
...
For customers that don't need full side channel security.
2022-03-03 21:17:25 +10:00
Juliusz Sosinowicz
bdb7399398
Reported in ZD13737
...
Implement `wolfSSL_BIO_eof` support for most available BIO's
2022-03-03 10:25:09 +01:00
Juliusz Sosinowicz
c7c3ee00bb
Address code review
...
- Use functions instead of accessing `BIO` members
- Add `wolfSSL_BIO_method_type`
2022-03-03 10:09:41 +01:00
Hideki Miyazaki
b45bbdc078
enable early data when enabled all
2022-03-03 16:36:03 +09:00
David Garske
dad2332a95
Merge pull request #4917 from kaleb-himes/TIRTOS_KDF_ADD
...
Add the new kdf.c file to the TIRTOS build
2022-03-02 17:02:47 -08:00
Jacob Barthelmeh
56de8cd622
add check on hash size passed in
2022-03-02 16:52:04 -07:00
Anthony Hu
a54045113a
fixes from review by dgarske
2022-03-02 17:39:15 -05:00
David Garske
5d0614c630
Merge pull request #4911 from SparkiDev/enc_pem_cbc_padding
...
ASN PemToDer: remove padding when AES_CBC encrypted
2022-03-02 14:32:45 -08:00
Sean Parkinson
59970d94f5
Merge pull request #4908 from dgarske/tick_pad
...
Fix for padding in session tickets
2022-03-03 08:20:35 +10:00
kaleb-himes
25556dea8d
Add the new kdf.c file to the TIRTOS build
2022-03-02 14:56:46 -07:00
David Garske
d86122a5e7
Merge pull request #4909 from JacobBarthelmeh/PKCS12
...
refactor PKCS12 parse key creation
2022-03-02 12:37:06 -08:00
Kareem
deea6261e9
Allow disabling forced 'make clean' at the end of ./configure.
2022-03-02 13:20:22 -07:00
Anthony Hu
0053bd3af1
Now we can inject as wellgit checkout custom_ext_parse
2022-03-02 15:16:39 -05:00
Jacob Barthelmeh
aa18209c99
free buffer since pkey struct makes its own copy
2022-03-02 09:59:21 -07:00
Juliusz Sosinowicz
f846aceee2
Check input size in DecodeNsCertType
2022-03-02 17:17:17 +01:00
Sean Parkinson
8b24be04e8
ASN PemToDer: remove padding when AES_CBC encrypted
2022-03-02 11:33:44 +10:00
David Garske
119f2d2651
Fix for padding in session tickets. Adds padding based on WOLFSSL_GENERAL_ALIGNMENT. Increases enc_len to 32-bit. Related to PR #4887
2022-03-01 15:40:57 -08:00
Sean Parkinson
d1ba82d5e5
Merge pull request #4903 from julek-wolfssl/psk-resuming-certs
...
OpenSSL considers PSK resuming
2022-03-02 08:57:40 +10:00
Jacob Barthelmeh
b03233a35e
handle free'ing up items in fail case
2022-03-01 15:24:53 -07:00
Hideki Miyazaki
c3e7ff0e61
addressed code review
2022-03-02 07:09:33 +09:00
Jacob Barthelmeh
45ff8af026
refactor PKCS12 parse key creation
2022-03-01 14:49:59 -07:00
David Garske
b21036947c
Merge pull request #4894 from SparkiDev/sp_p521_hashlen_fix
...
SP P521: hash len needs special attention when 521 bits
2022-03-01 12:04:51 -08:00
David Garske
71056f6591
Merge pull request #4902 from SparkiDev/tlsx_usc_leak
...
TLSX: supported groups in temporary not always freed
2022-03-01 12:04:35 -08:00
Juliusz Sosinowicz
a104cf887e
Ticket failure should result in a regular handshake
2022-03-01 10:34:43 +01:00
Juliusz Sosinowicz
645f385031
Fix BioReceive for closed connection
...
The pending check was forcing a `WOLFSSL_CBIO_ERR_WANT_WRITE` return even though the underlying socket was closed and `WOLFSSL_BIO_FLAG_READ|WOLFSSL_BIO_FLAG_RETRY` was not set. The `wolfSSL_BIO_ctrl_pending(ssl->biord) == 0` is old and I can't find a reason to keep checking it. I left it just in the case where there is output data pending.
2022-03-01 10:34:20 +01:00
Juliusz Sosinowicz
5aef687414
OpenSSL considers PSK resuming
...
- `SSL_VERIFY_FAIL_IF_NO_PEER_CERT` check passes on a TLS 1.3 PSK connection that isn't a ticket
2022-03-01 10:09:24 +01:00
Sean Parkinson
605d701113
SP P521: hash len needs special attention when 521 bits
...
Need to right shift number down when hash is more than 521 bits.
Previously handled at a byte level and now at bit level.
Always return err from sp_*_ecc_mulmod_add_only_*().
When ECC add and double points are public and only have SP
implementation, check that the point ordinates are the right size.
2022-03-01 09:56:22 +10:00
Sean Parkinson
1aff4399d1
Merge pull request #4899 from dgarske/kcapi
...
Improvements to KCAPI support
2022-03-01 08:52:55 +10:00
Anthony Hu
cb95aed41b
Parsing of custom extensions in X.509 certificates.
2022-02-28 16:35:19 -05:00
David Garske
9644a04db2
Peer review fix.
2022-02-28 11:32:12 -08:00
kaleb-himes
ac7bd0aae8
Fix up random.h conflicts with cert 3389 releases and some NETOS issues
2022-02-28 12:09:50 -07:00
Chris Conlon
c22282a8aa
Merge pull request #4864 from TakayukiMatsuo/rsk65n
2022-02-28 09:12:24 -07:00
Juliusz Sosinowicz
92bd5a4076
Merge pull request #4891 from dgarske/multi_test
2022-02-28 15:28:39 +01:00
David Garske
1cb7342f61
Merge pull request #4895 from SparkiDev/benchmark_threaded
...
Benchmark: support multi-threaded testing
2022-02-27 21:41:07 -08:00
Sean Parkinson
350881b1bb
TLSX: supported groups in temporary not always freed
...
Fix handling of errors so that temporary is always freed.
2022-02-28 11:40:58 +10:00
Sean Parkinson
f3df4400d5
Merge pull request #4886 from dgarske/zd13745
...
Adds CSR userId support in subject name
2022-02-28 10:15:41 +10:00
Hideki Miyazaki
4f4a509e8c
fix wait until in rsa primitive
2022-02-26 09:52:14 +09:00
David Garske
9bdef1577b
Fixes for hmac.
2022-02-25 15:19:52 -08:00
David Garske
cc2eb0ab71
KCAPI Testing fixes.
2022-02-25 15:16:55 -08:00
Chris Conlon
870ff5b352
Merge pull request #4890 from miyazakh/objinfo
...
fix to use EXT_KEY_USAGE_OID in object_info
2022-02-25 16:02:48 -07:00
David Garske
ce6b6951d2
Fix issue with missing OID's for ASN template.
2022-02-25 14:23:01 -08:00
David Garske
ae1072afad
Cleanup mess of ASN_NAME_MAX.
2022-02-25 14:23:01 -08:00
David Garske
a2381ba954
Adds CSR userId support in subject name. Minor build fixes for ASN template.
2022-02-25 14:22:59 -08:00
David Garske
08d1e5cb60
Merge pull request #4897 from anhu/bad_macro
...
Correct bad macros
2022-02-25 14:18:57 -08:00
David Garske
3fdb6f0a4a
Only use pthreads if supported in config.
2022-02-25 13:05:04 -08:00
kaleb-himes
27c445235c
Add a cert 3389 ready option
2022-02-25 13:50:06 -07:00
David Garske
821fd3c898
Peer review fixes. Check idSz and add comment about session variable use.
2022-02-25 11:38:05 -08:00
Anthony Hu
1a9faa1f7e
fix suggested by dgarske
2022-02-25 14:00:07 -05:00
David Garske
e3e1426b91
Improve benchmark threading macros and text output. Thread protections on variables. Fixes for testing with async.
2022-02-25 10:51:19 -08:00
Anthony Hu
997a3aabc6
Correct bad macros
2022-02-25 13:19:35 -05:00
David Garske
a39a1c1d87
More fixups from cppcheck and clang-tidy.
2022-02-25 10:03:17 -08:00
Sean Parkinson
56adf831a3
Benchmark: support multi-threaded testing
2022-02-25 14:12:03 +10:00
John Safranek
5859b90ad8
Merge pull request #4841 from haydenroche5/vs_resource_file_update
...
Update Visual Studio resource files.
2022-02-24 15:29:46 -08:00
Hayden Roche
c33ae4c245
Improve wolfSSL_i2d_X509_NAME and wolfSSL_i2d_X509_NAME_canon.
...
Like other i2d functions, these functions should be able to take a NULL output
parameter and return the necessary output buffer size. This commit adds this
ability. This commit also removes some redundant code in wolfSSL_i2d_X509_NAME.
2022-02-24 14:48:52 -08:00
David Garske
269ab86002
Fixes for DoClientTicket changes.
2022-02-24 14:28:50 -08:00
David Garske
c2987a9ef9
Fix for IPv6 sockaddr_len set but not read.
2022-02-24 14:09:08 -08:00
David Garske
6dd7a289e7
Fix for "set but not used".
2022-02-24 13:43:56 -08:00
David Garske
6e24e21d5a
Fix for heap pointer in wolfSSL_DupSession.
2022-02-24 12:56:39 -08:00
David Garske
2b794f03c1
Fixes for multi-test pass. Breaks from PR #4807 .
2022-02-24 11:48:40 -08:00
Anthony Hu
07fdca1d62
Merge pull request #4885 from SparkiDev/asn_templ_bad_name
2022-02-24 12:44:27 -05:00
David Garske
86e08525cb
Merge pull request #4852 from elms/fix/more_oot
...
automake: fix fips touch and cleanup
2022-02-24 09:04:05 -08:00
David Garske
5fdc339e34
Merge pull request #4889 from SparkiDev/sp_int_iar
...
SP math all: IAR doesn't accept comment lines in assembly
2022-02-24 08:37:51 -08:00
Hideki Miyazaki
de81447b2d
fix to use EXT_KEY_USAGE_OID in object_info
2022-02-24 15:18:32 +09:00
Sean Parkinson
3d5b933f3c
SP math all: IAR doesn't accept comment lines in assembly
...
Replace assembly comment lines with C comment lines.
2022-02-24 16:06:31 +10:00
Sean Parkinson
bb50777f1a
ASN template: handle short OIDs
...
cert_asn1_test was constructing a BER encoding of a certificate that
didn't have all the components. It was trying to test putting in a bad
OID in the certificate name.
The original ASN.1 parsing code stopped at the bad name. ASN.1 template
code does the whole structure and then digs into the name.
A complete certificate should have always been used.
2022-02-24 15:36:56 +10:00
Sean Parkinson
b13826a3a5
Merge pull request #4840 from haydenroche5/visual_studio_cleanup
...
Clean up Visual Studio output and intermediate directories.
2022-02-24 15:07:13 +10:00
Hayden Roche
25407e955b
Update Visual Studio resource files.
...
- Add a resource file for the wolfSSL FIPS VS solution.
- Update copyright year in existing wolfssl.rc.
2022-02-23 16:53:26 -08:00
elms
d1895e5679
automake: fix fips touch and cleanup
...
This fixes an issue with yocto that only occurs when using `devtool`
which builds out of tree.
2022-02-23 14:11:31 -08:00
Hayden Roche
51d66877f7
Add wolfSSL_EVP_PKEY_paramgen to the compatibility layer.
...
Currently, it only supports ECC, which is all we need it for for the OpenSplice
port we're working on. In the ECC case, all it needs to do is set the group
appropriately. The logic is very similar to `wolfSSL_EVP_PKEY_keygen`, minus
the final step of actually generating the key.
2022-02-23 13:59:15 -08:00
Hayden Roche
666cf508a2
Merge pull request #4874 from dgarske/ocsp_ipv6
2022-02-23 13:37:16 -08:00
David Garske
fbc7d5a6b2
Minor textual fixes. Thanks Hayden.
2022-02-23 09:43:10 -08:00
David Garske
0824a64c92
Merge pull request #4807 from julek-wolfssl/stunnel-5.61
...
stunnel 5.61 support
2022-02-23 09:41:51 -08:00
David Garske
b84086a482
Merge pull request #4883 from SparkiDev/ssl_bio_move
...
BIO: move APIs out of ssl.c
2022-02-23 09:38:54 -08:00
David Garske
0afc5e2cf1
Merge pull request #4881 from SparkiDev/sp_asm_shift_fix
...
SP asm: fix for modexp corner case
2022-02-23 09:37:25 -08:00
David Garske
8623b0c089
Merge pull request #4849 from SparkiDev/sp_p521
...
SP: Add support for P521
2022-02-23 09:33:49 -08:00
David Garske
3a34a4cd1d
Merge pull request #4882 from SparkiDev/even_mod_check
...
RSA/DH: check for even modulus
2022-02-23 09:33:12 -08:00
Juliusz Sosinowicz
2c978a96b2
Prevent possibility of an infinite retry loop and resource exhaution
...
Reported in ZD13606
2022-02-23 10:07:21 +01:00
Juliusz Sosinowicz
fb943a2f23
Rebase and make wolfSSL_CTX_up_ref always available
...
`wolfSSL_CTX_up_ref` is a small and potentially useful API for users so it doesn't need to be restricted only to the compatibility layer. The reference counting mechanisms are always available anyway. This just exposes the functionality to the user.
2022-02-23 09:55:52 +01:00
Juliusz Sosinowicz
d1f53055e9
Peeking can't return a WOLFSSL_ERROR_WANT_READ in compatibility mode
2022-02-23 09:47:34 +01:00
Juliusz Sosinowicz
617eda9d44
Fix misc memory issues
...
- Make `InternalTicket` memory alignment independent
2022-02-23 09:47:34 +01:00
Juliusz Sosinowicz
b402102e58
Add backwards compatibility for wolfSSL_get_session
...
Before this pull request, `wolfSSL_get_session` always returned a pointer to the internal session cache. The user can't tell if the underlying session hasn't changed before it calls `wolfSSL_set_session` on it. This PR adds a define `NO_SESSION_CACHE_REF` (for now only defined with `OPENSSL_COMPATIBLE_DEFAULTS`) that makes wolfSSL only return a pointer to `ssl->session`. The issue is that this makes the pointer returned non-persistent ie: it gets free'd with the `WOLFSSL` object. This commit leverages the lightweight `ClientCache` to "increase" the size of the session cache. The hash of the session ID is checked to make sure that the underlying session hasn't changed.
2022-02-23 09:47:34 +01:00
Juliusz Sosinowicz
ceff401269
Fixes for Jenkins tests
...
- Move test to `HAVE_IO_TESTS_DEPENDENCIES`
- Implement `wolfSSL_trust_peer_cert`
- have{cipher} options weren't being set with only RSA enabled
2022-02-23 09:47:34 +01:00
Juliusz Sosinowicz
91b08fb691
Allocate ssl->session separately on the heap
...
- Refactor session cache access into `AddSessionToCache` and `wolfSSL_GetSessionFromCache`
2022-02-23 09:47:34 +01:00
Juliusz Sosinowicz
1d712d47ba
Access to session cache is now atomic
...
- Adding and getting sessions to and from the local cache is now atomic.
- The new internal `wolfSSL_GetSessionFromCache` requires a destination object to be supplied when retrieving from the cache so that items can be retrieved independently from the cache. For most existing calls, the destination is `ssl->session`.
-`PREALLOC_SESSION_TICKET_LEN` defines how much memory is temporarily allocated for the ticket if it doesn't fit in the static session buffer.
2022-02-23 09:47:34 +01:00
Juliusz Sosinowicz
afca455cda
stunnel 5.61 support
...
- New/Implemented API
- `SSL_has_pending`
- `wolfSSL_CertManagerLoadCRLFile`
- `wolfSSL_LoadCRLFile`
- `wolfSSL_CTX_LoadCRLFile`
- `wolfSSL_CTX_add_session`
- Calling chain certificate API (for example `wolfSSL_CTX_use_certificate_chain_file`) no longer requires an actual chain certificate PEM file to be passed in as input. `ProcessUserChain` error in `ProcessBuffer` is ignored if it returns that it didn't find a chain.
- Add `WOLFSSL_TICKET_HAVE_ID` macro. When defined tickets will include the original session ID that can be used to lookup the session in internal cache. This is useful for fetching information about the peer that doesn't get sent in a resumption (such as the peer's certificate chain).
- Add `ssl->ticketSessionID` field because `ssl->session.sessionID` is used to return the "bogus" session ID sent by the client in TLS 1.3
- `OPENSSL_COMPATIBLE_DEFAULTS` changes
- Define `WOLFSSL_TRUST_PEER_CERT` and certificates added as CA's will also be loaded as trusted peer certificates
- Define `WOLFSSL_TLS13_MIDDLEBOX_COMPAT`
- Seperate `internalCacheOff` and `internalCacheLookupOff` options to govern session addition and lookup
- `VerifyServerSuite` now determines if RSA is available by checking for it directly and not assuming it as the default if static ECC is not available
- `WOLFSSL_SESSION` changes
- `ssl->extSession` added to return a dynamic session when internalCacheOff is set
- `ssl->session.refPtr` made dynamic and gets free'd in `SSL_ResourceFree`
- If `SSL_MODE_AUTO_RETRY` is set then retry should only occur during a handshake
- `WOLFSSL_TRUST_PEER_CERT` code now always uses `cert->subjectHash` for the `cm->tpTable` table row selection
- Change some error message names to line up with OpenSSL equivalents
- Run `MatchSuite` again if certificate setup callback installed and successful
- Refactor clearing `ASN_NO_PEM_HEADER` off the error queue into a macro
- `wolfSSL_get_peer_certificate` now returns a duplicated object meaning that the caller needs to free the returned object
- Allign `wolfSSL_CRYPTO_set_mem_functions` callbacks with OpenSSL API
- `wolfSSL_d2i_PKCS12_bio` now consumes the input BIO. It now supports all supported BIO's instead of only memory BIO.
- stunnel specific
- Always return a session object even if we don't have a session in cache. This allows stunnel to save information in the session external data that will be transfered to new connections if the session is reused
- When allocating a dynamic session, always do `wolfSSL_SESSION_set_ex_data(session, 0, (void *)(-1)`. This is to mimic the new index callback set in `SSL_SESSION_get_ex_new_index`.
- Fix comment in `wolfSSL_AES_cbc_encrypt`
- Trusted peer certificate suite tests need to have CRL disabled since we don't have the issuer certificate in the CA store if the certificates are only added as trusted peer certificates.
tested
2022-02-23 09:47:34 +01:00
Sean Parkinson
2eb044dc60
SP: Add support for P521
2022-02-23 14:51:47 +10:00
Sean Parkinson
d33b787993
BIO: move APIs out of ssl.c
...
Get configuration working: --enable-all CFLAGS=-DNO_BIO
2022-02-23 14:11:30 +10:00
Sean Parkinson
b5ed5c9b99
RSA/DH: check for even modulus
2022-02-23 09:51:15 +10:00
David Garske
194466c35a
Peer review fixes.
2022-02-22 15:22:27 -08:00
Sean Parkinson
5b6130889e
SP asm: fix for modexp corner case
...
When exponent bit length is a multiple of the window size and the top
word has only window bits in it, then n is shifted down by an undefined
value (size of a word). The n value is not used after this.
Check for this condition and don't attempt to shift n.
2022-02-23 09:17:08 +10:00
David Garske
2beb27972b
OCSP IPv6 support with --enable-ipv6 or WOLFSSL_IPV6. Improve the logic around C99 and getaddrinfo.
2022-02-22 15:07:05 -08:00
David Garske
fef8a57eb2
Merge pull request #4880 from julek-wolfssl/plain-alert
...
Detect if we are processing a plaintext alert
2022-02-22 10:11:08 -08:00
David Garske
e8c9a413ca
Merge pull request #4878 from SparkiDev/sp_x64_oob_write_fix_1
...
ECC with SP math: OOB write
2022-02-22 09:53:32 -08:00
David Garske
b40226099d
Merge pull request #4877 from SparkiDev/sp_x64_asm_fix_1
...
SP asm: fix map function to use p not point
2022-02-22 09:50:53 -08:00
Sean Parkinson
d10900e124
ECC with SP math: OOB write
...
Don't let input points ordinates be greater than modulus in length.
2022-02-22 17:00:23 +10:00
Sean Parkinson
78f116b27f
SP asm: fix map function to use p not point
2022-02-22 16:33:24 +10:00
Sean Parkinson
2a750acf03
Merge pull request #4873 from dgarske/async_v5.2.0
...
Asynchronous Release v5.2.0: TLS 1.3 HelloRetryRequest
2022-02-22 10:35:17 +10:00
David Garske
250a06f759
Merge pull request #4865 from SparkiDev/sp_int_mont_red
...
SP int: Montgomery Reduction
2022-02-21 16:20:17 -08:00
David Garske
31abc99f6f
Fix for async handling of TLS v1.3 hello retry broken in #4863 .
2022-02-21 14:14:20 -08:00
David Garske
6a81cc976e
Merge pull request #4872 from SparkiDev/tls13_empty_cert_cli
...
TLS 1.3: fail immediately if server sends empty certificate message
2022-02-21 14:10:40 -08:00
David Garske
38d4da56ab
Merge pull request #4857 from julek-wolfssl/ZD13631
...
Reported in ZD13631
2022-02-21 14:01:51 -08:00
David Garske
d834c50c85
Merge pull request #4858 from julek-wolfssl/ZD13611
...
Reported in ZD13611
2022-02-21 14:01:42 -08:00
David Garske
e6c07a296d
Merge pull request #4866 from ejohnstown/release
...
Prepare for release 5.2.0
2022-02-21 09:09:58 -08:00
Sean Parkinson
9263e6ead3
TLS 1.3: fail immediately if server sends empty certificate message
2022-02-21 21:34:13 +10:00
TakayukiMatsuo
eb9220a0b5
Modify example app to work with FreeRTOS+IoT
2022-02-21 12:46:43 +09:00
John Safranek
ad8bf40b5e
Update readme for release.
2022-02-20 13:05:04 -08:00
John Safranek
bb8af1cac5
Prepare for release 5.2.0
...
1. Update versions as appropriate.
2. Modify FreeAtomicUser() to only free the Aes data in the callback
contexts if the contexts exist.
2022-02-18 13:55:22 -08:00
David Garske
ffb4ae07df
Merge pull request #4871 from wolfSSL/small-leak
...
Fix Small Memory Leaks
2022-02-18 13:53:56 -08:00
John Safranek
041d300b2b
Fix Small Memory Leaks
...
Found with the configuration running the unit test through valgrind.
% ./configure CFLAGS=-DNO_WOLFSSL_CIPHER_SUITE_TEST \
--enable-all --disable-fastmath --enable-debug --disable-shared
1. ssl.c: In wolfSSL_DSA_generate_key(), we initialize (and allocate)
all the parameters in the key (p, q, g, x, y), and then we generate a
key, initializes (and allocates) x and y, again. mp_clear them
first.
2. evp.c: When printing public keys, the temporary mp_int wasn't getting
correctly freed.
3. evp.c: When printing public keys, modified the utility functions to
return once with a do-while-0 loop.
2022-02-18 10:01:49 -08:00
John Safranek
4b0c8c07f4
Merge pull request #4870 from elms/fix/tls13_renegotiation_info_ext
...
tls13: fix not including RENEGOTIATION_INFO ext
2022-02-17 13:09:02 -08:00
elms
208c457348
tls13: fix to not send RENEGOTIATION_INFO ext
...
Introduced in PR #4742 to enable sending of extension in TLS1.2
without fully supporting secure renegotiation in accordance with
RFC 5746 4.3 https://datatracker.ietf.org/doc/html/rfc5746#section-4.3
2022-02-17 11:22:17 -08:00
David Garske
95ae242550
Merge pull request #4869 from wolfSSL/silabs-aes
...
SILABS port: fix sizeof
2022-02-17 10:45:47 -08:00
David Garske
b343c2691b
Merge pull request #4867 from maximevince/master
...
Fix WOLFSSL_NO_TLS12 for Async dev
2022-02-17 10:18:18 -08:00
John Safranek
4361d1bdd2
SILABS port: fix sizeof
...
A sizeof wasn't dereferencing a pointer using the sizeof the pointer and
not the actual struct. This is limited to setting the key for an AES
operation only when using SILABS SE2 acceleration.
2022-02-17 08:52:46 -08:00
Maxime Vincent
111ae9da84
Fix WOLFSSL_NO_TLS12 for Async dev
2022-02-17 08:10:19 +01:00
Juliusz Sosinowicz
c5875cfc5a
Detect if we are processing a plaintext alert
2022-02-16 10:50:44 +01:00
David Garske
df0b516c68
Merge pull request #4863 from SparkiDev/tls13_auth
...
TLS 1.3: improved checks on received message type
2022-02-15 11:33:34 -08:00
Jacob Barthelmeh
a5ce2a33eb
add macro guard around test case
2022-02-15 11:58:59 -07:00
Juliusz Sosinowicz
15d0dd258a
Add cert test for UID name component
2022-02-15 14:05:46 +01:00
Sean Parkinson
ea5785f6fd
SP int: Montgomery Reduction
...
Improve performance for ECC curves when all bits in words are used (mask
is 0).
On 64-bit platforms, improves performance for 256 and 384 bit curves.
On 32-bit platforms, improves performance for 224, 256, 384 bit curves.
2022-02-15 17:19:57 +10:00
Sean Parkinson
94c03a77f5
TLS 1.3: improved checks on received message type
...
pskNegotiated field added to indicate Session Ticket or PSK negotiated.
peerAuthGood field added to indicate that any require peer
authentication (certificate, if required, or PSK) have been performed.
2022-02-15 13:25:16 +10:00
Sean Parkinson
9906c9c55e
Merge pull request #4862 from dgarske/no_server
...
Fix typo for no server
2022-02-15 10:31:12 +10:00
David Garske
07045083a9
Merge pull request #4859 from SparkiDev/sp_int_thumb_small
...
SP int: fixup ARM Thumb asm for small builds
2022-02-14 16:07:50 -08:00
Sean Parkinson
6571151d17
SP int: fixup ARM Thumb asm for small builds
...
Small builds or arm Thumb can't use r7.
2022-02-15 08:34:21 +10:00
David Garske
c992ddbfc0
Merge pull request #4853 from SparkiDev/curve448_128bit_perf
...
Curve448: inline Karatsuba in sqr and mul for 128-bit impl
2022-02-14 12:04:57 -08:00
David Garske
16566f329e
Fix typo for no server. Should be NO_WOLFSSL_SERVER.
2022-02-14 10:37:34 -08:00
David Garske
ff4ee20f05
Merge pull request #4860 from SparkiDev/disable_hmac
...
Configure HMAC: define NO_HMAC when HMAC disabled
2022-02-14 10:08:32 -08:00
Jacob Barthelmeh
f0a0cd1078
fix for larger curve sizes with deterministic ECC sign
2022-02-14 09:55:38 -07:00
Juliusz Sosinowicz
445ed2f234
Reported in ZD13631
...
`ssl->peerVerifyRet` wasn't being cleared when retrying with an alternative cert chain
2022-02-14 11:01:59 +01:00
Sean Parkinson
f02296a4e6
Configure HMAC: define NO_HMAC when HMAC disabled
2022-02-14 17:22:10 +10:00
Sean Parkinson
38653510eb
Curve448: inline Karatsuba in sqr and mul for 128-bit impl
2022-02-14 09:09:57 +10:00
Juliusz Sosinowicz
4e5380668c
Reported in ZD13611
...
The `UID` name component could not be parsed if it appears in a subject or issuer name
2022-02-12 00:36:07 +01:00
David Garske
40b171124f
Fixes to resolve a few make check issues.
2022-02-11 15:20:25 -08:00
David Garske
2fa542eb28
Merge pull request #4846 from haydenroche5/fips_mode_compat
...
Implement FIPS_mode and FIPS_mode_set in the compat layer.
2022-02-11 12:50:30 -08:00
David Garske
88f202aa22
Merge pull request #4855 from julek-wolfssl/issue-4854
...
wolfSSL_get_error may return SSL_ERROR_NONE on ret <= 0
2022-02-11 09:01:16 -08:00
Juliusz Sosinowicz
4f8ffc4586
wolfSSL_get_error may return SSL_ERROR_NONE on ret <= 0
...
Fix docs mismatch reported in https://github.com/wolfSSL/wolfssl/issues/4854
2022-02-11 12:37:12 +01:00
Daniel Pouzzner
34b6102816
Merge pull request #4847 from douzzer/20220209_clang-Os
...
fixes for clang -Os on clang >= 12.0.0
2022-02-10 21:31:01 -06:00
Chris Conlon
7da3b8458a
Merge pull request #4851 from miyazakh/update_RA6M3_rmunsrc
2022-02-10 18:14:09 -07:00
Daniel Pouzzner
fbf38fff07
wolfcrypt/src/sp_int.c: fix comment around clang-12+ -Os.
2022-02-10 16:43:17 -06:00
Daniel Pouzzner
5c9510d92e
fips_check.sh: for linuxv2 add COPY_DIRECT with wolfcrypt/src/{aes_asm.S,aes_asm.asm}; for linuxv5 add wolfcrypt/src/aes_gcm_asm.S to COPY_DIRECT; fix whitespace.
2022-02-10 16:01:08 -06:00
Daniel Pouzzner
cbc253d713
wolfcrypt/test/test.c: gate ecc_encrypt_e2e_test() on !HAVE_FIPS || FIPS_VERSION_GE(5,3).
2022-02-10 16:00:52 -06:00
Daniel Pouzzner
c581e13380
bwrap tweaks:
...
in scripts/ocsp.test, don't call ping.test when $AM_BWRAPPED = yes (ping is setuid, so fails under bwrap);
in scripts/unit.test.in, don't bwrap if $AM_BWRAPPED = yes (double-bwrapping always fails);
in testsuite/testsuite.c testsuite_test(), build tempName using tempDir, and try to assign tempDir from XGETENV("TMPDIR"), fallback to hardcoded "/tmp".
2022-02-10 15:54:39 -06:00
Daniel Pouzzner
91578df19d
fixes for clang -Os on clang >= 12.0.0; fixes for bugs in blake2s.
2022-02-10 15:54:10 -06:00
Hayden Roche
562fcd3916
Implement FIPS_mode and FIPS_mode_set in the compat layer.
2022-02-10 13:14:05 -08:00
David Garske
34c87b83e2
Merge pull request #4848 from SparkiDev/sp_int_div_word_2
...
SP int, cortex, thumb div_word: fix to work
2022-02-10 07:42:00 -08:00
Anthony Hu
a1198549dd
Merge pull request #4844 from dgarske/bench_cleanups
2022-02-10 10:24:55 -05:00
David Garske
d1267b5203
Merge pull request #4805 from SparkiDev/ecies_aes_ctr
...
ECIES: add support for more encryption algorithms
2022-02-10 07:04:24 -08:00
Hideki Miyazaki
e351f1a7e7
rm unused src links
2022-02-10 22:21:24 +09:00
Sean Parkinson
e8fb17f7b5
SP int, cortex, thumb div_word: fix to work
...
Cortex builds needed # before number. Arm32 works with or without.
Thumb div_word needed to shift up if divisor too small (like other ARM
implementations).
2022-02-10 12:07:11 +10:00
Sean Parkinson
e50f661639
ECIES: add support for more encryption algorithms
...
Add support to ECIES for AES-256-CBC, AES-128-CTR, AES-256-CTR.
Added new API wc_ecc_ctx_set_algo() that sets the encryption, KDF and
MAC algorithms.
Cleanup formatting of ECIES code.
2022-02-10 09:54:22 +10:00
David Garske
4f1aa9a475
Fix benchmark input/output arguments. Cleanup line length and whitespace.
2022-02-09 13:13:42 -08:00
David Garske
cba262440a
Merge pull request #4842 from SparkiDev/sha3_arm_fixup
...
ARMASM, SHA-3: fixup when not using crypto instructions
2022-02-09 10:20:46 -08:00
Chris Conlon
bee025842e
Merge pull request #4828 from TakayukiMatsuo/rtos
2022-02-09 09:37:47 -07:00
tmael
0d5edfadcb
Merge pull request #4837 from SparkiDev/sp_c_config
...
SP C: when sp_c32.c ad sp_c64.c are included in build changed
2022-02-09 07:51:20 -08:00
Eric Blankenhorn
c472b3582e
Merge pull request #4839 from douzzer/20220207-clang-tidy-15
...
20220208 clang-tidy-15 fixes etc.
2022-02-09 08:36:18 -06:00
Sean Parkinson
343cb0da23
SP C: when sp_c32.c ad sp_c64.c are included in build changed
...
When compiling with the CFLAG -m32, sp_c32.c is used and not sp_c64.c.
The build system cannot detect that this is a 32-bit platform and to use
sp_c32.c.
The SP code detects which implementaiton to use and sets defines that
enable the code in sp_c32.c or sp_c64.c.
ENABLED_64BIT, 64-bit platform, was on by default, which is not always
true.
By making ENABLED_64BIT not default then the decision of which SP C
files to include in the build had to change to not being the other.
That is, sp_c64.c is not included when the configuration line explicitly
enables 32bit and sp_c32.c is not include when the configuration line
explicitly enables 64bit.
2022-02-09 15:56:57 +10:00
Tesfa Mael
f49b7107a0
Add __inline__ for Diab compiler
2022-02-08 19:54:26 -08:00
Tesfa Mael
32c80781bf
Prevent diab compiler from inlining functions
2022-02-08 19:25:13 -08:00
Sean Parkinson
b436262cdf
ARMASM, SHA-3: fixup when not using crypto instructions
2022-02-09 09:36:00 +10:00
John Safranek
49defbd2cc
Merge pull request #4836 from embhorn/zd13634
...
Remove deprecated VS solution
2022-02-08 15:18:21 -08:00
Sean Parkinson
67b2a1be40
Merge pull request #4831 from dgarske/zd13571_2
...
Improve the client certificate checking logic
2022-02-09 08:27:03 +10:00
TakayukiMatsuo
1bd4cb4eee
Modify example app to work with FreeRTOS+IoT
2022-02-09 07:18:39 +09:00
Chris Conlon
34946c2440
Merge pull request #4832 from TakayukiMatsuo/rose
2022-02-08 14:54:47 -07:00
Daniel Pouzzner
74408e3ee3
fixes for whitespace, C++ warnings, and LLVM 15 clang-tidy defects/carps:
...
* whitespace in src/ssl.c, tests/api.c, wolfssl/openssl/fips_rand.h.
* clang-analyzer-core.StackAddressEscape from llvm-15 clang-tidy, in tests/suites.c:execute_test_case().
* bugprone-suspicious-memory-comparison from llvm-15 clang-tidy, in src/internal.c:DoSessionTicket() and src/ssl.c:wolfSSL_sk_push().
2022-02-08 15:20:22 -06:00
David Garske
ed1fc9fc51
Merge pull request #4833 from SparkiDev/sha3_arm_crypto
...
SHA-3, ARM64: add assembly support for crypto instructions
2022-02-08 11:05:35 -08:00
David Garske
7ec1e69dba
Fixes for supporting the openssl compatibility layer. Adds ChaCha/Poly, DH extra and verify callbacks.
2022-02-08 10:18:41 -08:00
Hayden Roche
6930cc0b21
Clean up Visual Studio output and intermediate directories.
...
Currently, wolfssl.vcxproj and IDE/WIN10/wolfssl-fips.vcxproj do not use the
same scheme for their output and intermediate directories. Further, across
configuration/platform combinations, wolfssl.vcxproj isn't consistent, either.
For example:
```
Release|x64
OutDir: $(SolutionDir)$(Platform)\$(Configuration)\
IntDir: $(Platform)\$(Configuration)\obj\
Release|Win32
OutDir: $(SolutionDir)$(Configuration)\
IntDir: $(Configuration)\obj\
```
This commit makes every configuration/platform combo for all Visual Studio
projects follow the same pattern:
```
OutDir: $(SolutionDir)$(Platform)\$(Configuration)\
IntDir: $(Configuration)\$(Platform)\$(ProjectName)_obj\
```
The `$(ProjectName)_obj` piece gets rid of a Visual Studio warning about not
mingling the intermediate objects of disparate builds.
2022-02-08 09:23:27 -08:00
Daniel Pouzzner
3ee6e93590
Merge pull request #4838 from SparkiDev/g++_fix_4
...
Rework functions to avoid warning with g++
2022-02-08 10:20:58 -06:00
Daniel Pouzzner
1f69c52ce8
Merge pull request #4830 from dgarske/no_hmac
...
Fixes for building without HMAC
2022-02-07 22:26:38 -06:00
Sean Parkinson
d2307186d9
Rework functions to avoid warning with g++
2022-02-08 12:36:36 +10:00
Sean Parkinson
0042a2594c
SHA-3, ARM64: add assembly support for crypto instructions
...
Add ability to compile ARM assembly from inline C code.
2022-02-08 12:21:38 +10:00
David Garske
b60d2dccce
Include the havePeerCert argument in the check.
2022-02-07 16:31:50 -08:00
David Garske
5169a3cf89
Improve header comments and logic. Remove NO_PWDBASED and added CRL.
2022-02-07 15:58:10 -08:00
Eric Blankenhorn
5e5a389afb
Remove deprecated VS solution
2022-02-07 17:14:41 -06:00
David Garske
d0246a280d
Merge pull request #4834 from anhu/guard_wc_PKCS7_SetPassword
...
Fix tests to properly gate on ! NO_PWDBASED && ! NO_SHA
2022-02-07 15:12:22 -08:00
David Garske
56c562a516
Fixes for building with ./configure --enable-opensslextra --enable-cryptonly CFLAGS="-DNO_HMAC" && make. Found this testing a customers configuration with latest. Also fixes some trailing whitespace.
2022-02-07 15:10:21 -08:00
David Garske
d085984103
Merge pull request #4829 from kosmas-valianos/kTLS
...
Expose Sequence Numbers so that Linux TLS (kTLS) can be configured
2022-02-07 14:55:07 -08:00
TakayukiMatsuo
5361c0bda0
Update signature as the certificate is renewed
2022-02-08 07:31:50 +09:00
Anthony Hu
e47dd675af
Fix tests to properly gate on ! NO_PWDBASED && ! NO_SHA
2022-02-07 14:44:26 -05:00
David Garske
dd2e0064b2
Merge pull request #4827 from SparkiDev/sp_int_dw_asm
...
SP math, Aarch64, ARM32: div word asm fixup
2022-02-07 11:32:14 -08:00
David Garske
54e7db0a9a
Merge pull request #4739 from rizlik/psa
...
support Platform Security Architecture (PSA) API
2022-02-07 10:40:21 -08:00
Chris Conlon
4c8f0709fc
Merge pull request #4720 from dgarske/fips_compat
2022-02-07 09:56:24 -07:00
David Garske
3cdb1c639d
Improve the client certificate checking logic. Make sure calling wolfSSL_CTX_mutual_auth is also checked.
2022-02-07 08:09:38 -08:00
David Garske
3d85a9690f
Merge pull request #4819 from lealem47/hashMismatch
...
Fix for OpenSSL x509_NAME_hash mismatch
2022-02-07 08:08:49 -08:00
Kosmas Valianos
30b35acd39
Expose Sequence Numbers so that Linux TLS (kTLS) can be configured
2022-02-07 09:30:59 +01:00
Sean Parkinson
f6d79ff598
Merge pull request #4813 from dgarske/zd13571
...
Fix for mutual authentication to prevent mismatch of certificate and sigalgo
2022-02-07 11:00:04 +10:00
Lealem Amedie
f9ff551992
Fix for OpenSSL x509_NAME_hash mismatch
2022-02-04 16:59:51 -08:00
David Garske
1f8ff7d9fe
Merge pull request #4822 from embhorn/zd13613
...
Fix warnings in VS
2022-02-04 15:37:31 -08:00
Marco Oliverio
2077184953
psa: add compile-time error if builded with crypto cb
2022-02-04 21:45:38 +01:00
Marco Oliverio
b8635efda7
psa: add README.md and doxygen header
2022-02-04 21:45:38 +01:00
Marco Oliverio
0cb2cc1705
psa: support pk callbacks for ECDSA, ECDH, HKDF
2022-02-04 21:45:38 +01:00
Marco Oliverio
630b244cee
psa: introduce global lock
2022-02-04 21:45:38 +01:00
Marco Oliverio
a7165907da
psa: support AES
2022-02-04 21:45:38 +01:00
Marco Oliverio
9ccfc81f26
psa: support PSA SHA1/SHA256/SHA224
2022-02-04 21:45:38 +01:00
Marco Oliverio
06915b6fa3
psa: support PSA random generator
2022-02-04 21:45:38 +01:00
David Garske
08047b2d95
Add checking to make sure key is present in all cases. Explicitly set validSigAlgo to zero with comment to clarify the default assumption.
2022-02-04 11:47:06 -08:00
David Garske
2d184348fb
Merge pull request #4825 from embhorn/gh4815
...
Fix wolfSSL_PEM_X509_INFO_read with NO_FILESYSTEM
2022-02-04 10:42:40 -08:00
David Garske
327e35fc25
Merge pull request #4826 from haydenroche5/evp_aes_gcm_iv_bug
...
Fix IV length bug in EVP AES-GCM code.
2022-02-04 10:38:02 -08:00
Hayden Roche
d1ca8fc673
Merge pull request #4821 from elms/cmake/help_cleanup
2022-02-04 09:37:39 -08:00
Marco Oliverio
08fbcf5eae
autoconf: add PSA options
2022-02-04 12:12:04 +01:00
Sean Parkinson
bd1b58dd7f
SP math, Aarch64, ARM32: div word asm fixup
...
ASM code is dividing by top half of divisor. If this value is very small
then bad results are calculated.
Moved the divisor up by a quarter of the width if top quarter of divisor
is 0.
2022-02-04 11:59:31 +10:00
Hayden Roche
b850cc89b0
Fix IV length bug in EVP AES-GCM code.
...
In `wolfSSL_EVP_CipherInit`, `ctx`'s `ivSz` field isn't being accounted for.
A common OpenSSL EVP AES-GCM flow looks like this:
- `EVP_CIPHER_CTX_new`
- `EVP_EncryptInit_ex`
- `EVP_CIPHER_CTX_ctrl` with command `EVP_CTRL_GCM_SET_IVLEN` to set the IV
length to 16 (AES block size) instead of the default 12
- `EVP_EncryptInit_ex` again to set the key and IV
- `EVP_EncryptUpdate` however many times
- `EVP_EncryptFinal`
In fact, we test this flow in our unit test `test_wolfssl_EVP_aes_gcm`. However,
in our implementation, the second call to `EVP_EncryptInit_ex` unconditionally
resets the IV length back to 12. This doesn't cause a test failure because
decryption has the same problem, so both sides of the equation have the same
wrong view of the IV.
The solution is to preserve the IV length in wolfSSL_EVP_CipherInit if ctx->ivSz
is non-zero. Otherwise, use the default of 12 (`GCM_NONCE_MID_SZ`).
This was discovered by a user migrating to the compatibility layer. As I
mentioned, it isn't exposed by our testing. It is exposed if you try to use the
same key and IV with OpenSSL and compare the resulting ciphertext with wolfSSL.
They won't be the same and thus won't interoperate.
2022-02-03 17:40:26 -08:00
David Garske
50700c3c28
Make sure Rabbit and HC128 are disabled when building FIPS against older wolfSSL.
2022-02-03 14:53:11 -08:00
Eric Blankenhorn
a0444bf72f
Fix wolfSSL_PEM_X509_INFO_read with NO_FILESYSTEM
2022-02-03 16:52:08 -06:00
Eric Blankenhorn
7b2e457d04
Fix VS unreachable code warning
2022-02-03 15:53:35 -06:00
David Garske
db6d924d4b
User settings template for FIPS v5.
2022-02-03 13:35:13 -08:00
David Garske
53e64b55e1
Merge pull request #4823 from haydenroche5/alpn_bug
...
Fix bug in TLSX_ALPN_ParseAndSet when using ALPN select callback.
2022-02-03 13:16:13 -08:00
Hayden Roche
fab2e99bff
Fix bug in TLSX_ALPN_ParseAndSet when using ALPN select callback.
...
At the start of this function, it attempts to find an ALPN extension in the
ssl object's extensions with `TLSX_Find`. If an ALPN select callback has been
set (i.e. via `wolfSSL_CTX_set_alpn_select_cb`), that gets called next. If that
callback finds a match, it removes all existing ALPN extensions found in the
ssl object. It then uses the new protocol name like this:
```
if (TLSX_UseALPN(&ssl->extensions, (char*)out, outLen, 0, ssl->heap)
== WOLFSSL_SUCCESS) {
if (extension == NULL) {
extension = TLSX_Find(ssl->extensions,
TLSX_APPLICATION_LAYER_PROTOCOL);
}
}
```
The bug is exposed if `extension` is not NULL, i.e. it was found on that initial
`TLSX_Find` call. `extension` is not NULL but it now points to garbage because
all the old ALPN extensions were just removed. It won't have it's value assigned
to the new extension that just got pushed via `TLSX_UseALPN` because of this
NULL check. This results in a segfault later in the function.
The solution is to remove the NULL check and always update `extension` after the
`TLSX_UseALPN` call.
This bug was discovered by a customer when using nginx + wolfSSL. I was able to
reproduce locally with curl acting as the client
2022-02-03 09:36:18 -08:00
Eric Blankenhorn
f0b953ce0c
Fix warnings in VS
2022-02-03 07:19:43 -06:00
Elms
fab8eca2fd
cmake: Check for valid voerride values
...
Also remove trailing whitespace
2022-02-02 16:32:00 -08:00
Elms
9b4289c751
cmake: Add KEYGEN option. Cleanup help messages.
...
Add `WOLFSSL_KEYGEN` option and override enable when `WOLFTPM` is
enabled
Also major reduction of variables for help messages. Override only
updates `VALUE`
2022-02-02 16:15:47 -08:00
David Garske
d3e3f57b77
Merge pull request #4818 from julek-wolfssl/guido-13454
...
`object` and `value` need to be `free`'ed
2022-02-02 16:04:39 -08:00
David Garske
17eee2ba0c
Merge pull request #4817 from julek-wolfssl/ZD13495
...
ZD13495
2022-02-02 15:54:08 -08:00
Juliusz Sosinowicz
97dd974a94
object and value need to be free'ed
2022-02-02 23:13:59 +01:00
David Garske
e13861bcde
Fix for mutual authentication to prevent mismatch of certificate and sig algo. Work from Sean P. ZD 13571
2022-02-02 12:20:02 -08:00
David Garske
28d3292a16
Merge pull request #4811 from haydenroche5/dh_get_2048_256
...
Add DH_get_2048_256 to compatibility layer.
2022-02-02 12:12:34 -08:00
David Garske
0618b69b6d
Merge pull request #4816 from julek-wolfssl/ok-error
...
For `0` OpenSSL prints "ok"
2022-02-02 12:10:35 -08:00
David Garske
9efb791abc
Merge pull request #4814 from SparkiDev/bio_dump_iter
...
wolfSSL_BIO_dump: fix output format and make iterative
2022-02-02 12:02:07 -08:00
Juliusz Sosinowicz
d5b294edc4
ZD13495
...
- `wolfSSLeay_version` now returns the version of wolfSSL
- `wolfssl/openssl/crypto.h` was not enveloped in a `extern "C"` wrapper
2022-02-02 17:38:36 +01:00
Hayden Roche
c629c3fcaa
Add DH_get_2048_256 to compatibility layer.
2022-02-02 07:59:17 -08:00
Juliusz Sosinowicz
1552e89810
For 0 OpenSSL prints "ok"
2022-02-02 15:54:21 +01:00
Marco Oliverio
cebb127ac3
test: don't free AesXts struct in-between tests that reuse the key
2022-02-02 10:46:40 +01:00
Sean Parkinson
641576390d
wolfSSL_BIO_dump() and wolfSSL_OBJ_obj2txt() rework
...
wolfSSL_BIO_dump(): fix output format and make iterative
wolfSSL_OBJ_obj2txt(): make iterative, test and rework.
2022-02-02 12:43:06 +10:00
Chris Conlon
59ea65bad3
Merge pull request #4809 from haydenroche5/asn1_int
2022-02-01 13:44:32 -07:00
David Garske
99799a3e3e
Merge pull request #4806 from anhu/kill_idea
...
Purge IDEA cipher
2022-02-01 12:27:55 -08:00
Hayden Roche
24a2ed7e9e
Merge pull request #4780 from dgarske/ipsec_racoon
2022-01-31 15:10:58 -08:00
David Garske
df85ea7e87
Merge pull request #4800 from SparkiDev/sp_c_smul
...
SP C: multiplication of two signed types with overflow is undefined in C
2022-01-31 14:29:18 -08:00
David Garske
13c759cc10
Merge pull request #4812 from douzzer/20220131-camellia-clang-tidy
...
wolfcrypt/src/camellia.c: clang-tidy fixes (bugprone-macro-parentheses).
2022-01-31 14:13:23 -08:00
Anthony Hu
a742c33c0c
Mention IDEA removal in README.md.
2022-01-31 16:18:39 -05:00
Anthony Hu
9ea40f3a9c
Purge IDEA cipher
2022-01-31 15:29:25 -05:00
Daniel Pouzzner
a7de880745
wolfcrypt/src/camellia.c: clang-tidy fixes (bugprone-macro-parentheses).
2022-01-31 14:21:54 -06:00
David Garske
ecb3f215b5
Merge pull request #4808 from lealem47/certreq
...
Fix for certreq and certgen options with openssl compatability
2022-01-31 10:16:22 -08:00
David Garske
5bdaf44354
Merge pull request #4774 from anhu/kill_rabbit
...
Purge Rabbit cipher
2022-01-31 09:17:23 -08:00
Hayden Roche
6b71289ae1
Add new ASN1_INTEGER compatibility functions.
...
This commit adds:
- wolfSSL_i2d_ASN1_INTEGER
- wolfSSL_d2i_ASN1_INTEGER
- wolfSSL_ASN1_INTEGER_cmp
2022-01-29 17:01:16 -08:00
David Garske
e58ff9e765
Merge pull request #4795 from wolfSSL/cmake/wolftpm
...
cmake: Add options to support wolfTPM
2022-01-28 14:52:53 -08:00
Anthony Hu
f509dafd6c
README.md addition
2022-01-28 17:20:25 -05:00
Lealem Amedie
f608b1a731
macro logic fix
2022-01-28 13:54:13 -08:00
Lealem Amedie
e135ea7338
Fix for certreq and certgen options with openssl compatability
2022-01-28 12:39:00 -08:00
David Garske
40fff86807
Merge pull request #4801 from tmael/cert_rr
...
cert subset improvements
2022-01-28 11:00:55 -08:00
Anthony Hu
b957a6e872
Purge Rabbit cipher
2022-01-28 13:13:53 -05:00
Elms
6e76f21f9e
cmake: Add options to support wolfTPM
...
* certgen
* certgencache
* certreq
* certext
* cryptocb
* pkcs7
* X9.63 KDF
* AES-CFB
2022-01-28 09:44:09 -08:00
David Garske
c69010adef
Peer review feedback.
2022-01-28 09:21:03 -08:00
David Garske
6615f019f5
Improved HMAC_Init error logging and code comment for FIPS failure on wc_HmacSetKey call.
2022-01-28 09:21:03 -08:00
David Garske
80ae237852
Fixes for building with ipsec-tools/racoon and openvpn:
...
* Fix for `EVP_CIPHER_CTX_flags`, which mapped to a missing function (broke openvpn)
* Added stack of name entries for ipsec/racoon support.
* Added `X509_STORE_CTX_set_flags` stub.
* Added PKCS7 NID types.
* Improved FIPS "SHA" logic in `test_wolfSSL_SHA`
* Added some uncommon NID type definitions.
* Expose the DH `DH_set_length` and `DH_set0_pqg` with OPENSSL_ALL
2022-01-28 09:21:03 -08:00
John Safranek
46f25ea3e0
Merge pull request #4804 from douzzer/20220127-clang-tidy-fips_test_h
...
clang-tidy hygiene for fips_test.h
2022-01-28 09:00:03 -08:00
Hayden Roche
cd72b4652b
Merge pull request #4798 from lealem47/cmake
2022-01-28 08:42:29 -08:00
Daniel Pouzzner
30b2073228
test.c: fix gating on wc_ecc_encrypt_ex() for FIPS <5.3 --enable-all.
2022-01-27 19:54:07 -06:00
Daniel Pouzzner
19042023f4
MD5 vs. FIPS 140-3: fix gating so that unit.test succeeds when --enable-fips=v5 --enable-md5 (HMAC-MD5 is non-FIPS in 140-3, but even in a FIPS 140-3 build, the non-FIPS API can be accessed directly by #undef'ing wc_Hmac*()).
2022-01-27 18:37:29 -06:00
Daniel Pouzzner
d9073f39e1
fips_test.h: add arg names to prototypes, and delete obsolete+unused DoIntegrityTest() prototype.
2022-01-27 18:37:29 -06:00
John Safranek
1465f99b12
Merge pull request #4734 from haydenroche5/fips_v5_des3
...
Allow DES3 with FIPS v5-dev.
2022-01-27 15:07:22 -08:00
David Garske
667009007b
Merge pull request #4799 from SparkiDev/file_gen_fixes
...
Generated files: fixes
2022-01-27 14:21:34 -08:00
David Garske
77a64d0087
Merge pull request #4802 from SparkiDev/ecies_compressed
...
ECIES: allow compressed public keys
2022-01-27 14:21:12 -08:00
Lealem Amedie
1c12490c98
Adding some CMake options
2022-01-27 11:52:37 -08:00
Daniele Lacamera
f323964e8a
Update TIRTOS module
...
Use SP_MATH by default. Added missing object files.
2022-01-27 16:23:23 +01:00
Sean Parkinson
b890a2f15d
ECIES: allow compressed public keys
...
ECIES messages have a public key/point at start of the data.
It can be either uncompressed or compressed.
Adding support for decrypting and encrypting of compressed point.
2022-01-27 12:10:59 +10:00
Tesfa Mael
a37e17084d
Use mp_iszero
2022-01-26 17:33:42 -08:00
Tesfa Mael
1c1bd413e0
cert subset SHA2-256, ecc-256, cert gen, cryptocb
2022-01-26 17:11:00 -08:00
Sean Parkinson
91b1e541c5
SP C: multiplication of two signed types with overflow is undefined in C
...
Montgomery Reduction: cast variables to be unsigned where signed
multiplication with overflow is performed.
2022-01-27 10:25:02 +10:00
Sean Parkinson
a242424abe
Generated files: fixes
...
Fixups from updating scripts that generate the files.
Include settings.h for ARM32 assembly.
ARM32 SHA-512 ASM has only one function, Transform_Sha512_Len(). The
implementation is dependent on defines.
2022-01-27 10:05:45 +10:00
David Garske
9bbc5e07e6
Merge pull request #4733 from JacobBarthelmeh/ECC
...
include hmac for deterministic ecc sign build
2022-01-26 10:01:46 -08:00
David Garske
25c6417f03
Merge pull request #4797 from douzzer/20220124-clang-tidy
...
clang-tidying headers
2022-01-26 10:01:00 -08:00
Daniel Pouzzner
b7cecbacb2
update headers to resolve clang-tidy carping (mostly bugprone-macro-parentheses and readability-named-parameter). also disables MSC C4028 because incompatible with readability-avoid-const-params-in-decls.
2022-01-26 02:06:37 -06:00
Daniel Pouzzner
9250edc2ea
wolfcrypt/src/fe_x25519_128.i: harmonize argument names in fe_cswap() and fe_cmov() with those used in fe_operations.c.
2022-01-26 02:05:26 -06:00
Daniel Pouzzner
85da17bcf8
src/ssl.c: fix argument name in openssl compat layer wrappers of hash final funcs in ssl.c (use "output", not "input").
2022-01-26 00:27:45 -06:00
Daniel Pouzzner
1e3516d924
src/ssl.c: implement wolfSSL_SHA512_224_Transform() and wolfSSL_SHA512_256_Transform().
2022-01-26 00:27:07 -06:00
Daniel Pouzzner
7c9f4911c3
src/wolfio.c: protect __GLIBC__ comparison with defined(__GLIBC__).
2022-01-26 00:22:13 -06:00
David Garske
cfc7337bda
Merge pull request #4794 from rizlik/openssl_srtp_script_fix
...
dtls-srtp: don't run openssl_srtp.test on make check
2022-01-25 16:31:29 -08:00
David Garske
d0dbdd374d
Merge pull request #4775 from elms/cmake/asm_user_settings
...
cmake: enable ASM and fix thread with usersettings
2022-01-25 16:25:16 -08:00
Marco Oliverio
38558d7fd1
dtls-srtp: don't run openssl_srtp.test on make check
2022-01-25 21:51:56 +01:00
David Garske
588f4a11c9
Merge pull request #4785 from douzzer/20220120-aes-internal-error-handling
...
20220120-aes-internal-error-handling
2022-01-24 20:45:53 -08:00
Hayden Roche
58789991f9
Allow DES3 with FIPS v5-dev.
2022-01-24 15:18:44 -08:00
David Garske
50e3565df6
Merge pull request #4779 from SparkiDev/dyn_cert
...
Cert: allow allocation of fields even with WOLFSSL_NO_MALLOC
2022-01-24 14:17:41 -08:00
Daniel Pouzzner
746c05ca44
AES: peer review: remove gating around sanity checks on aes->rounds in software wc_AesEncrypt() and wc_AesDecrypt();
...
use local variable crypto_cb_ret around WOLF_CRYPTO_CB calls for clarity;
fix line length.
2022-01-24 15:47:23 -06:00
Daniel Pouzzner
f0041852b5
aes.c: add error catching and percolation for wc_AesGetKeySize() on FREESCALE_LTC in wc_AesEncrypt(), wc_AesDecrypt(), and wc_AesCtrEncrypt().
2022-01-24 13:34:22 -06:00
Daniel Pouzzner
5ff1d98306
AES: fix linebreaks in newly overlong lines in aes.c and aes.h; add missing return code in armv8-aes.c wc_AesDecryptDirect(); add missing RESTORE_VECTOR_REGISTERS() in software wc_AesXtsEncrypt() (all pursuant to peer review in #4785 from Sean).
2022-01-24 12:32:25 -06:00
Daniel Pouzzner
565a7b0aab
aes.c: in linuxkm clause of WOLFSSL_AES_DIRECT section, gate on WOLFSSL_LINUXKM && WOLFSSL_AESNI (with no-asm falling through to the generic definition), and use wolfssl-idiomatic WARN_UNUSED_RESULT, not linux-kernel-idiomatic __must_check. (thanks to John S peer review)
2022-01-24 11:44:16 -06:00
Daniel Pouzzner
a718637c6f
AES: harmonize wc_Aes{Encrypt,Decrypt} and wc_Aes{Encrypt,Decrypt}Direct implementations to return int; add return values to all static void functions in aes.c that can fail; add WARN_UNUSED_RESULT to all static functions in aes.c with return values; implement missing error percolation around AES block cipher implementations; bump FIPS version for v5-ready and v5-dev to 5.3 (v5-RC12 is 5.2).
2022-01-24 11:44:16 -06:00
David Garske
dee66cfe9e
Merge pull request #4789 from SparkiDev/sp_invmod_oob
...
SP int: sp_modinv fixes for sizes
2022-01-24 09:08:08 -08:00
John Safranek
93404361ff
Merge pull request #4783 from SparkiDev/mac_sha512_def
...
SHA-512 ASM: For Mac computers default to using SHA512 instructions
2022-01-24 09:03:08 -08:00
David Garske
44c0a5f9f8
Merge pull request #4790 from SparkiDev/decodesubtree_oobr
...
ParseCert: check index in DecodeSubtree before accessing tag
2022-01-24 08:36:52 -08:00
Sean Parkinson
3d63e41653
SP int: sp_modinv fixes for sizes
...
sp_invmod with even modulus requires a multiplication by modulus. Don't
let modulus overflow result variable 'r'.
Fix allocation of temporary sp_ints to be correct size.
Add test for maximum modulus size in test.c.
Remove leading spaces on functions so git correctly determines which
function has changed.
Put in Thumb code for more sizes of _sp_mul_*().
2022-01-24 15:18:20 +10:00
Sean Parkinson
1dd213db76
ParseCert: check index in DecodeSubtree before accessing tag
2022-01-24 12:30:48 +10:00
David Garske
198843aa34
Merge pull request #4787 from douzzer/20220121-fixits-20220118-clang-tidy
...
cleanup re #4772
2022-01-21 12:46:07 -08:00
Daniel Pouzzner
2955d7339e
remove a debugging printf, fix whitespace/indentation, and add a comment re gethostbyname_r buffer size.
2022-01-21 13:00:22 -06:00
David Garske
7a36d57e8f
Merge pull request #4784 from SparkiDev/sp_int_modinv_perf
...
SP int: minor improvements to sp_invmod
2022-01-21 10:30:09 -08:00
David Garske
869246609a
Merge pull request #4772 from douzzer/20220118-clang-tidy
...
clang-tidy fixes/cleanups
2022-01-21 10:29:26 -08:00
Daniel Pouzzner
4f9d0b7ea7
fix whitespace.
2022-01-21 01:26:44 -06:00
Daniel Pouzzner
bfada558bd
remove extraneous build gates and fix whitespace justification in a comment (peer review re PR #4772 ).
2022-01-21 01:26:44 -06:00
Daniel Pouzzner
386aac9694
AES-SIV:
...
in configure.ac, enable SIV only if !ENABLED_FIPS or if building FIPS v5-dev;
in cmac.{c,h}, remove !HAVE_FIPS gating on ShiftAndXorRb().
2022-01-21 01:26:33 -06:00
Daniel Pouzzner
84f7d812d3
linuxkm/module_exports.c.template: include siphash.h.
2022-01-21 01:25:48 -06:00
Daniel Pouzzner
10b8f56fec
wolfio.c: in wolfIO_TcpConnect(), test for usability of gethostbyname_r by (__GLIBC__ >= 2) && defined(__USE_MISC), not defined(__GNUC__).
2022-01-21 01:25:48 -06:00
Daniel Pouzzner
5e33da8147
fix whitespace.
2022-01-21 01:25:48 -06:00
Daniel Pouzzner
bb07d0a490
wolfio.c: refactor wolfIO_TcpConnect(() to use gethostbyname_r() if GNUC && !SINGLE_THREADED, for thread safety.
2022-01-21 01:25:48 -06:00
Daniel Pouzzner
6a56d3e131
jumbo patch of fixes for clang-tidy gripes (with some bug fixes).
...
defect/gripe statistics:
configured --enable-all --enable-sp-math-all --enable-intelasm
with LLVM 13 clang-tidy -checks=readability-*,bugprone-*,misc-no-recursion,misc-misplaced-const,misc-redundant-expression,misc-unused-parameters,misc-unused-using-decls,-clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling,-clang-analyzer-optin.performance.Padding,-readability-braces-around-statements,-readability-function-size,-readability-function-cognitive-complexity,-bugprone-suspicious-include,-bugprone-easily-swappable-parameters,-readability-isolate-declaration,-readability-magic-numbers,-readability-else-after-return,-bugprone-reserved-identifier,-readability-suspicious-call-argument,-bugprone-suspicious-string-compare,-bugprone-branch-clone,-misc-redundant-expression,-readability-non-const-parameter,-readability-redundant-control-flow,-readability-misleading-indentation,-bugprone-narrowing-conversions,-bugprone-implicit-widening-of-multiplication-result
[note these figures don't reflect additional defects fixed in this commit for --enable-smallstack, --enable-fips, --enable-async, --enable-asn=template, and --enable-fastmath, and --disable-fastmath]
pre-patch warning count per file, with suppressions:
clang-analyzer-security.insecureAPI.strcpy 6 wolfssl/tests/suites.c
clang-analyzer-security.insecureAPI.strcpy 2 wolfssl/testsuite/testsuite.c
bugprone-suspicious-missing-comma 3 wolfssl/examples/server/server.c
bugprone-suspicious-missing-comma 3 wolfssl/examples/client/client.c
readability-redundant-preprocessor 2 wolfssl/wolfcrypt/src/asn.c
readability-redundant-preprocessor 1 wolfssl/wolfcrypt/src/rsa.c
readability-redundant-preprocessor 9 wolfssl/src/ssl.c
readability-redundant-preprocessor 2 wolfssl/src/tls13.c
readability-redundant-preprocessor 18 wolfssl/tests/api.c
readability-redundant-preprocessor 3 wolfssl/src/internal.c
readability-redundant-preprocessor 10 wolfssl/wolfcrypt/test/test.c
readability-named-parameter 1 wolfssl/wolfcrypt/benchmark/benchmark.c
readability-named-parameter 7 wolfssl/src/internal.c
readability-named-parameter 1 wolfssl/wolfcrypt/src/ecc.c
readability-named-parameter 1 wolfssl/testsuite/testsuite.c
readability-named-parameter 11 wolfssl/wolfcrypt/src/ge_operations.c
misc-no-recursion 3 wolfssl/src/ssl.c
readability-uppercase-literal-suffix 4 wolfssl/wolfcrypt/src/asn.c
readability-uppercase-literal-suffix 1 wolfssl/src/ssl.c
readability-uppercase-literal-suffix 13 wolfssl/wolfcrypt/benchmark/benchmark.c
bugprone-too-small-loop-variable 1 wolfssl/wolfcrypt/src/rsa.c
bugprone-too-small-loop-variable 2 wolfssl/wolfcrypt/src/sha3.c
bugprone-too-small-loop-variable 4 wolfssl/wolfcrypt/src/idea.c
bugprone-signed-char-misuse 2 wolfssl/src/ssl.c
bugprone-signed-char-misuse 3 wolfssl/wolfcrypt/src/sp_int.c
bugprone-signed-char-misuse 3 wolfssl/examples/client/client.c
bugprone-macro-parentheses 19 wolfssl/wolfcrypt/src/aes.c
bugprone-macro-parentheses 109 wolfssl/wolfcrypt/src/camellia.c
bugprone-macro-parentheses 1 wolfssl/src/tls.c
bugprone-macro-parentheses 3 wolfssl/wolfcrypt/src/md4.c
bugprone-macro-parentheses 2 wolfssl/wolfcrypt/src/asn.c
bugprone-macro-parentheses 26 wolfssl/wolfcrypt/src/blake2b.c
bugprone-macro-parentheses 257 wolfssl/wolfcrypt/src/sha3.c
bugprone-macro-parentheses 15 wolfssl/src/ssl.c
bugprone-macro-parentheses 1 wolfssl/wolfcrypt/src/sha.c
bugprone-macro-parentheses 8 wolfssl/tests/api.c
bugprone-macro-parentheses 4 wolfssl/wolfcrypt/src/sp_int.c
bugprone-macro-parentheses 6 wolfssl/wolfcrypt/benchmark/benchmark.c
bugprone-macro-parentheses 38 wolfssl/wolfcrypt/src/hc128.c
bugprone-macro-parentheses 12 wolfssl/wolfcrypt/src/md5.c
bugprone-macro-parentheses 10 wolfssl/wolfcrypt/src/sha256.c
bugprone-macro-parentheses 4 wolfssl/wolfcrypt/test/test.c
bugprone-macro-parentheses 3 wolfssl/wolfcrypt/src/ecc.c
bugprone-macro-parentheses 2 wolfssl/tests/suites.c
bugprone-macro-parentheses 4 wolfssl/wolfcrypt/src/cpuid.c
bugprone-macro-parentheses 26 wolfssl/wolfcrypt/src/blake2s.c
bugprone-macro-parentheses 24 wolfssl/wolfcrypt/src/sha512.c
bugprone-macro-parentheses 3 wolfssl/wolfcrypt/src/poly1305.c
bugprone-macro-parentheses 24 wolfssl/wolfcrypt/src/ripemd.c
readability-inconsistent-declaration-parameter-name 1 wolfssl/src/internal.c
readability-inconsistent-declaration-parameter-name 1 wolfssl/testsuite/testsuite.c
pre-patch warning count summaries, with suppressions:
clang-analyzer-security.insecureAPI.strcpy 8
bugprone-suspicious-missing-comma 6
readability-redundant-preprocessor 45
readability-named-parameter 21
misc-no-recursion 3
readability-uppercase-literal-suffix 18
bugprone-too-small-loop-variable 7
bugprone-signed-char-misuse 8
bugprone-macro-parentheses 601
readability-inconsistent-declaration-parameter-name 2
pre-patch warning count summaries, without suppressions:
clang-analyzer-security.insecureAPI.strcpy 8
bugprone-branch-clone 152
readability-non-const-parameter 118
bugprone-suspicious-missing-comma 6
bugprone-suspicious-include 52
readability-magic-numbers 22423
readability-redundant-preprocessor 45
readability-named-parameter 21
readability-function-cognitive-complexity 845
readability-else-after-return 398
bugprone-implicit-widening-of-multiplication-result 595
readability-function-size 21
readability-isolate-declaration 1090
misc-redundant-expression 2
bugprone-narrowing-conversions 994
misc-no-recursion 3
readability-uppercase-literal-suffix 18
bugprone-reserved-identifier 56
readability-suspicious-call-argument 74
bugprone-too-small-loop-variable 7
bugprone-easily-swappable-parameters 437
bugprone-signed-char-misuse 8
readability-misleading-indentation 94
bugprone-macro-parentheses 601
readability-inconsistent-declaration-parameter-name 2
bugprone-suspicious-string-compare 495
readability-redundant-control-flow 20
readability-braces-around-statements 11483
clang-analyzer-valist.Uninitialized 1
clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling 3502
2022-01-21 01:25:48 -06:00
Sean Parkinson
b75fe633ad
SP int: minor improvements to sp_invmod
2022-01-21 16:47:59 +10:00
Sean Parkinson
8a2cab8702
SHA-512 ASM: For Mac computers default to using SHA512 instructions
2022-01-21 16:40:35 +10:00
Sean Parkinson
30e9d2813e
Merge pull request #4782 from haydenroche5/aes_siv_gpp
...
Fix AES-SIV test with g++.
2022-01-21 15:37:12 +10:00
Hayden Roche
888bd2b304
Fix AES-SIV test with g++.
...
The string initializers for the AES-SIV test vector fields needed an extra byte
for the null terminator expected by g++.
2022-01-20 19:22:25 -08:00
Sean Parkinson
848f5eeb0c
Merge pull request #4755 from dgarske/dtls_srtp
...
DTLS SRTP (RFC5764) support (adds `--enable-srtp`)
2022-01-21 10:43:47 +10:00
David Garske
d1a23a3285
Merge pull request #4758 from kareem-wolfssl/asioOldTls
...
Fix building ASIO with Old TLS disabled.
2022-01-20 10:44:41 -08:00
David Garske
427b67d51b
Merge pull request #4756 from kareem-wolfssl/noBio
...
Fix building with OPENSSL_EXTRA and NO_BIO defined.
2022-01-20 10:41:22 -08:00
David Garske
5ea23d389c
Merge pull request #4778 from haydenroche5/chrony
...
Add --enable-chrony configure option.
2022-01-20 08:46:00 -08:00
Marco Oliverio
40f573df72
dtls-srtp: NIT: fix EKM size in comments
2022-01-20 16:55:44 +01:00
Marco Oliverio
46c0809f5a
dtls-srtp: add script to test interop with OpenSSL
2022-01-20 16:55:44 +01:00
Marco Oliverio
d5aa76b161
dtsl-srtp: use PRF according to the DTLS version used
...
RFC 5764 sec 4.1.2
2022-01-20 16:55:30 +01:00
Marco Oliverio
cdb2936244
dtls-srtp: PRF: fix correct order of client/server random in seed
...
see RFC 5705 Section 4
2022-01-20 16:12:04 +01:00
Marco Oliverio
231a0bbb84
dtls-srtp: no ekm cross check on single threaded/no pthread conf
2022-01-20 16:12:04 +01:00
Sean Parkinson
1af3ea56c8
Cert: allow allocation of fields even with WOLFSSL_NO_MALLOC
...
subjectCN and publicKey in a DecodedCert are needed by the certificate
store in some cases. For embedded, allow them to be allocated even with
WOLFSSL_NO_MALLOC defined.
2022-01-20 16:16:09 +10:00
David Garske
d728a7f0e6
Merge pull request #4777 from SparkiDev/sp_modinv_even_fix
...
SP int: fix rework of sp_invmod
2022-01-19 20:32:48 -08:00
Hayden Roche
a05b1b012f
Add --enable-chrony configure option.
...
This turns on the necessary features for using the chrony NTP package with
wolfSSL.
2022-01-19 19:13:34 -08:00
David Garske
95efdccd7f
Merge pull request #4751 from SparkiDev/sp_int_thumb_asm
...
SP int: ARM Thumb asm snippets
2022-01-19 18:52:02 -08:00
David Garske
609d6442b1
Merge pull request #4753 from SparkiDev/siphash
...
Add SipHash algorithm
2022-01-19 18:51:44 -08:00
David Garske
fcce4f7a92
Merge pull request #4765 from haydenroche5/aes_siv
...
Add AES-SIV (RFC 5297).
2022-01-19 18:51:12 -08:00
Jacob Barthelmeh
29513e1ec8
include hmac for deterministic ecc sign build
2022-01-20 09:25:32 +07:00
Sean Parkinson
b767857abb
SP int: fix rework of sp_invmod
...
Simplify code and check for m mod a == 0 which means there is no
inverse.
2022-01-20 10:37:31 +10:00
Sean Parkinson
a6485a228d
Add SipHash algorithm
2022-01-20 09:41:18 +10:00
Sean Parkinson
a1185adf2c
SP int: ARM Thumb asm snippets
2022-01-20 09:16:45 +10:00
Hayden Roche
62b07d8806
Add AES-SIV (RFC 5297).
...
This commit adds functions to encrypt and decrypt data using AES in SIV mode, as
described in RFC 5297. This was added in the process of porting chrony to
wolfSSL. chrony is an NTP implementation that can use NTS (network time
security), which requires AES-SIV.
2022-01-19 14:32:33 -08:00
David Garske
d668037541
Merge pull request #4746 from elms/gh/templates
...
github: Initial templates
2022-01-19 14:04:21 -08:00
elms
c6fdb34daa
cmake: enable ASM and fix thread with usersettings
...
* Assembly files were not being compiled.
* With When `-DWOLFSSL_USER_SETTINGS` `HAVE_PTHREAD` was not
propagating to `config.h`
2022-01-19 13:34:25 -08:00
David Garske
7adbf59f22
Merge pull request #4767 from anhu/kill_hc128
...
Get rid of HC-128
2022-01-19 12:20:18 -08:00
David Garske
c5d3581ac2
Merge pull request #4771 from SparkiDev/sp_c_mont_red
...
SP C: fix corner case of P256 and P384 mont red
2022-01-19 11:32:49 -08:00
David Garske
0175013604
Merge pull request #4770 from anhu/cve
...
CVE-2022-23408
2022-01-19 11:31:24 -08:00
elms
0f50ffb2ef
github: Initial templates
2022-01-19 10:36:01 -08:00
David Garske
8e0ece920b
Test cleanups. Fix possible leak in TLSX_UseSRTP.
2022-01-19 09:22:02 -08:00
Anthony Hu
af71aec77e
Mention removal of HC-128 in README.md
2022-01-19 09:49:25 -05:00
Marco Oliverio
86ba0ef643
tests: support test for SRTP
...
the test will check that the same Exported Keying Material is generated between
client and server
2022-01-19 13:35:29 +01:00
Marco Oliverio
9b69f693e4
dtls-srtp: check that length of strings matched before memcomparing
...
otherwise if profile_str_len is > strlen(gSrtpProfiles[i].name) we end up
comparing memory past gSrtpProfiles[i].name. -fsanitize=address catches this:
```
==100159==ERROR: AddressSanitizer: global-buffer-overflow on address 0x7f40d8d533b2 at pc 0x7f40d8eb014f bp 0x7f40d50fe240 sp 0x7f40d50fd9e8
READ of size 21 at 0x7f40d8d533b2 thread T107
#0 0x7f40d8eb014e in MemcmpInterceptorCommon(void*, int (*)(void const*, void const*, unsigned long), void const*, void const*, unsigned long) /build/gcc/src/gcc/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:860
#1 0x7f40d8eb06e6 in __interceptor_memcmp /build/gcc/src/gcc/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:892
#2 0x7f40d8eb06e6 in __interceptor_memcmp /build/gcc/src/gcc/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:887
#3 0x7f40d8c2e830 in DtlsSrtpFindProfile src/ssl.c:1310
#4 0x7f40d8c2e9ed in DtlsSrtpSelProfiles src/ssl.c:1347
#5 0x7f40d8c2eada in wolfSSL_CTX_set_tlsext_use_srtp src/ssl.c:1359
#6 0x563bf381b4c5 in server_test examples/server/server.c:2278
#7 0x7f40d88f0258 in start_thread (/usr/lib/libpthread.so.0+0x9258)
#8 0x7f40d88195e2 in __GI___clone (/usr/lib/libc.so.6+0xfe5e2)
```
2022-01-19 13:14:58 +01:00
Sean Parkinson
c06ba390cd
SP C: fix corner case of P256 and P384 mont red
2022-01-19 14:22:04 +10:00
Chris Conlon
4c05d35452
Merge pull request #4743 from miyazakh/tls_bench_onlymode
2022-01-18 15:41:48 -07:00
Daniel Pouzzner
2984cb5abf
Merge pull request #4768 from SparkiDev/sp_invmod_nr
...
SP math: sp_invmod changed to not call itself
2022-01-18 16:20:37 -06:00
David Garske
65d1d32972
Merge pull request #4769 from SparkiDev/sp_mont_red_neg
...
SP math neg: Mont Reduce fix
2022-01-18 14:12:09 -08:00
Anthony Hu
884b8634af
CVE-2022-23408
2022-01-18 16:06:08 -05:00
Anthony Hu
e6466f92b7
Counting properly
2022-01-18 15:41:16 -05:00
Anthony Hu
ff128c07a1
Remove extra references to Guid no longer required. Note that other count gaps exist so this should be fine.
2022-01-18 15:23:08 -05:00
David Garske
ba589955f7
Improve the DTLS SRTP client side parsing.
2022-01-18 11:23:13 -08:00
Sean Parkinson
e745de657f
Merge pull request #4761 from haydenroche5/time_cb
...
Add time callback functionality.
2022-01-18 16:49:19 +10:00
Sean Parkinson
53a4903e2f
SP math neg: Mont Reduce fix
...
Compare the absolute value for negatives.
2022-01-18 16:22:38 +10:00
JacobBarthelmeh
e11d484746
Merge pull request #4752 from LinuxJedi/fix-ber-der
...
Fix buffer overflows in BERtoDER
2022-01-17 21:05:39 -07:00
JacobBarthelmeh
84b06ac1b6
Merge pull request #4730 from embhorn/zd13475
...
Document wc_AesCfbEncrypt and wc_AesCfbDecrypt
2022-01-17 19:45:45 -07:00
Hayden Roche
1b0926a3b8
Add time callback functionality.
...
This commit adds `wolfSSL_SetTimeCb` and `wolfSSL_time`. The former allows the
user to override the function wolfSSL uses to get the current time,
`wolfSSL_time`. If set, `wolfSSL_time` uses that function. If not set,
`wolfSSL_time` uses the `XTIME` macro by default. This functionality is needed
for the port of chrony to wolfSSL. chrony is an NTP implementation that uses
GnuTLS by default. For TLS, chrony uses the time it computes in place of the
default system time function.
2022-01-17 17:49:51 -08:00
Sean Parkinson
fc861f3d6d
SP math: sp_invmod changed to not call itself
...
When the modulus is even, calculate m^-1 mod a instead and fixup after.
Don't call self to do inverse.
2022-01-18 10:45:57 +10:00
David Garske
f3f5b0f53b
Peer review fixes. Improve profile not found handling or errors. Improve inline function.
2022-01-17 15:52:40 -08:00
Anthony Hu
c2860cb311
Get rid of HC-128
2022-01-17 18:11:54 -05:00
David Garske
ec44747029
Merge pull request #4764 from SparkiDev/evp_cbn_casecmp
...
wolfSSL_EVP_get_cipherbyname: case compare
2022-01-17 14:11:07 -08:00
David Garske
d38c5003d0
Merge pull request #4762 from ejohnstown/old-gcc
...
Old Compiler Warning Cleanup (GCC 4.0.2)
2022-01-17 09:44:44 -08:00
Chris Conlon
989a4f096e
Merge pull request #4728 from miyazakh/sce_aes128_cryonly
2022-01-17 10:28:57 -07:00
Chris Conlon
e953707258
Merge pull request #4754 from miyazakh/update_espidfport
2022-01-17 10:27:28 -07:00
Eric Blankenhorn
6197853f37
Document wc_AesCfbEncrypt and wc_AesCfbDecrypt
2022-01-17 11:27:19 -06:00
John Safranek
d06cf97d73
Old Compiler Warning Cleanup (GCC 4.0.2)
...
test.c:
1. Removed pragma disabling the warning for unused functions.
2. Fixed the guards around the function that wasn't getting removed from
the build. And matched the guards to the call of the function. The
issue is a test that fails only in a cert 3389 build using Arm
assembly single-precision public keys.
3. Fixed the guards around a couple other functions.
2022-01-16 22:08:35 -08:00
Sean Parkinson
1b5d0c75b8
wolfSSL_EVP_get_cipherbyname: case compare
...
Accept any case alternatives to name or alias.
Remove case only different aliases.
Tidy up formatting in function.
2022-01-17 09:39:16 +10:00
John Safranek
b68b14b499
Merge pull request #4724 from embhorn/zd13462
...
Improve param checks of enc
2022-01-16 15:35:54 -08:00
John Safranek
815527be6b
Merge pull request #4745 from SparkiDev/m1_sha512
...
Aarch64 SHA512: fixup to work on Apple M1
2022-01-16 15:29:01 -08:00
Sean Parkinson
15f501358d
Merge pull request #4716 from julek-wolfssl/issue-4592
...
Verification: Domain check should only be performed on leaf certs
2022-01-17 08:40:14 +10:00
John Safranek
001469589b
Old Compiler Warning Cleanup (GCC 4.0.2)
...
Fixed a lot of shadowed global values. Some were prototype and function
declaration parameter name conflicts. Some conflicted with typenames.
Some conflicted with globals in libc.
2022-01-14 17:43:21 -08:00
John Safranek
5ddf4392df
Old Compiler Warning Cleanup (GCC 4.0.2)
...
pwdbased.c: Simplified some arithmetic to fix a variable promotion
warning.
2022-01-14 17:36:12 -08:00
John Safranek
2cf21a3f69
Old Compiler Warning Cleanup (GCC 4.0.2)
...
ecc.c,api.c: Initialize some variables to fix warning for possible
uninitialized variable use.
2022-01-14 17:33:49 -08:00
John Safranek
e724622506
Old Compiler Warning Cleanup (GCC 4.0.2)
...
ge_operations.c: Added the keyword `inline` to several function
prototypes for functions declared `inline`.
2022-01-14 17:19:01 -08:00
John Safranek
2085624a29
Old Compiler Warning Cleanup (GCC 4.0.2)
...
1. Removed pragma disabling the warning for non-literal format strings
on `printf()`.
2. Switched the `printf()` into two printf calls.
2022-01-14 17:11:55 -08:00
John Safranek
153b9abc31
Old Compiler Warning Cleanup (GCC 4.0.2)
...
ssl.c: Fix a couple of checks on hashType enum that were using a `< 0`
for the lower bound on an unsigned.
2022-01-14 16:32:18 -08:00
Kareem
021f9171c5
Fix building ASIO with Old TLS disabled.
2022-01-14 15:00:02 -07:00
David Garske
eade8ecdf1
DTLS SRTP improvements. Added support for client to send list of profiles. Added support for more SRTP profiles.
2022-01-14 13:43:29 -08:00
Kareem
1ed152daeb
Fix building with OPENSSL_EXTRA and NO_BIO defined.
2022-01-14 11:19:01 -07:00
Juliusz Sosinowicz
31e84d82b8
Domain check should only be performed on leaf certs
...
- Refactor `*_set_verify` functions into common logic
- NULL protect `wolfSSL_X509_VERIFY_PARAM_set1_host` and add debug info
2022-01-14 18:16:42 +01:00
David Garske
6ccbd8776f
DTLS SRTP (RFC5764) support (adds --enable-srtp). Used with WebRTC to agree on profile for new real-time session keys.
2022-01-14 07:35:45 -08:00
Hideki Miyazaki
a33d901409
update ESP-IDF port to fix failure
2022-01-14 15:35:28 +09:00
David Garske
f81e15f342
Merge pull request #4750 from SparkiDev/etm-disable
...
TLS EncryptThenMac; fix when extension response sent
2022-01-13 13:33:57 -08:00
David Garske
8d7059497e
Merge pull request #4742 from elms/fix/secure_renegotiate_compat
...
TLS: Default secure renegotiation compatibility
2022-01-13 10:23:27 -08:00
Andrew Hutchings
1a4bc322f7
Fix buffer overflow in PKCS7_VerifySignedData
...
wc_PKCS7_AddDataToStream() was called the first time prior to BERtoDER
conversion, subsequent times afterwards which meant the stream idx
pointer was incorrect. This patch restarts the stream after conversion.
Fixes ZD13476
2022-01-13 14:49:31 +00:00
Andrew Hutchings
92d01611ff
Fix buffer overflow in GetOID
...
When converting BER to DER we switched the pointer for pkiMsg to the DER
but not the size which could cause buffer overflow.
Fixes ZD13471
2022-01-13 13:26:32 +00:00
Sean Parkinson
70b169e3f2
TLS EncryptThenMac; fix when extension response sent
...
Only respond with the extension when negotiated a block cipher.
2022-01-13 12:46:21 +10:00
elms
ba579753ba
Merge pull request #4749 from ejohnstown/vpath-fix
2022-01-12 17:06:37 -08:00
John Safranek
15c5ac880e
PKCS7 Test Output
...
When running the test with PKCS7 enabled, there's an additional option
that will save to disk the generated PKCS7 blobs for by-hand review.
(PKCS7_OUTPUT_TEST_BUNDLES) Fixed a couple compile errors that were
missed with that option enabled.
2022-01-12 14:51:11 -08:00
John Safranek
33f0e2eda5
In the wolfCrypt test, fix a few filenames to use the VPATH versions.
2022-01-12 14:50:43 -08:00
Sean Parkinson
0acf8d0e75
Merge pull request #4732 from embhorn/zd13375
...
SP int, TFM: Init vars for static analysis
2022-01-13 07:06:19 +10:00
Sean Parkinson
3ddfb0f189
Aarch64 SHA512: fixup to work on Apple M1
...
Directive needed on Apple to indicate SHA3 extensions available.
Fixup C file as well - remove unused constants not avaiable and
prototype function that is extern elsewhere.
2022-01-12 12:56:39 +10:00
elms
336e595ebb
Remove some lingering oldname return values
2022-01-11 17:09:52 -08:00
Hideki Miyazaki
723cfb2d0b
make server/client only work
2022-01-12 09:23:23 +09:00
elms
efe2cea8d1
TLS: Default secure renegotiation compatability
...
By default this change will have servers send the renegotiation info
extension, but not allow renegotiation. This is accordance with RFC 5746
From to RFC 5746:
> In order to enable clients to probe, even servers that do not support
> renegotiation MUST implement the minimal version of the extension
> described in this document for initial handshakes, thus signaling
> that they have been upgraded.
With openSSL 3.0 the default it not allow connections to servers
without secure renegotiation extension. See
https://github.com/openssl/openssl/pull/15127
2022-01-11 15:56:35 -08:00
David Garske
abc9b7197d
Merge pull request #4676 from ThalesGroup/iotsafe-hkdf-extract
...
Iotsafe hkdf extract
2022-01-11 07:37:30 -08:00
Hideki Miyazaki
f0f65f41b7
addressed review comments
2022-01-11 19:53:54 +09:00
Sean Parkinson
c7b0b7003e
Merge pull request #4700 from dgarske/pkcs11_id
...
Improved the PKCS11 init to support slotId or tokenName
2022-01-11 14:25:37 +10:00
Saksik Remy
30777bb5ee
nit minor changes
2022-01-11 10:08:52 +08:00
David Garske
9a4981a5a8
Improved the PKCS11 init to support slotId or tokenName. Adds new wc_Pkcs11Token_InitName and alters existing wc_Pkcs11Token_Init to allow NULL tokenName. ZD13348
2022-01-10 16:53:01 -08:00
David Garske
5910ada93d
Merge pull request #4736 from douzzer/20220107-cppcheck-hygiene
...
cppcheck sweep
2022-01-10 12:52:22 -08:00
Eric Blankenhorn
6a02826bbf
Merge pull request #4740 from dgarske/sess_names_docs
...
Session doc and naming cleanups
2022-01-10 14:38:47 -06:00
David Garske
5392190807
Merge pull request #4741 from danielinux/psoc6-sha512-fix
...
PsoC6 hw crypto: added missing wc_InitSha512_ex()
2022-01-10 12:32:13 -08:00
Daniele Lacamera
814e7c91e0
PsoC6 hw crypto: added missing wc_InitSha512_ex()
2022-01-10 18:30:53 +01:00
Chris Conlon
f72d198778
Merge pull request #4723 from dgarske/se050
2022-01-10 10:11:49 -07:00
David Garske
43bbc5d2e5
Merge pull request #4738 from SparkiDev/sp_int_div_arm_2
...
SP int: ARM64/32 sp_div_word changes
2022-01-10 07:58:28 -08:00
David Garske
6ce248e2f9
Improve documentation for wolfSSL_get1_session. Add wolfSSL specific naming on the internal session functions to avoid possible user conflicts. ZD13363 and ZD13487.
2022-01-10 07:47:19 -08:00
Eric Blankenhorn
5cce1926bb
Init vars for static analysis
2022-01-10 08:24:29 -06:00
Sean Parkinson
6398087d5b
SP int: ARM64/32 sp_div_word changes
...
Fixup up formatting.
Fix comments.
Aarch64: don't use variable r when hi can be used.
ARM 32-bit: Add a version that uses udiv - not available on all chips
and can be slower anyway.
2022-01-10 16:27:39 +10:00
Saksik Remy
1a291870a3
minor fixes
2022-01-10 10:28:14 +08:00
David Garske
4bbf90d604
Merge pull request #4702 from SparkiDev/sp_int_div_arm
...
SP int: transplant the div_word from SP into SP int for ARM64 and ARM32
2022-01-09 17:54:39 -08:00
Daniel Pouzzner
355b5821b2
WOLFSSL_SESSION_EXPORT: fixes for scan-build complaints (deadcode.DeadStores) building --enable-all --enable-sessionexport.
2022-01-08 11:43:56 -06:00
Daniel Pouzzner
c50964cc35
src/internal.c: fix flubbed edit in wolfSSL_session_import_internal().
2022-01-08 11:08:57 -06:00
Daniel Pouzzner
49fc54ef1f
linuxkm/linuxkm_wc_port.h: move XMALLOC/XREALLOC/XFREE definitions outside BUILDING_WOLFSSL gate as-was, for back-compat.
2022-01-08 02:41:02 -06:00
Daniel Pouzzner
56c28ff307
src/ssl.c: in wolfSSL_SESSION_has_ticket(), add (void)sess if !defined(HAVE_SESSION_TICKET), to fix -Wunused-parameter.
2022-01-08 02:39:50 -06:00
Daniel Pouzzner
ff0eb5a41e
wolfcrypt/test/test.c: in wolfcrypt_test(), tweak formatting of CheckRunTimeSettings() to resolve invalidPrintfArgType_uint from cppcheck --force.
2022-01-08 01:35:46 -06:00
Daniel Pouzzner
a4444e6c3e
wolfcrypt/test/test.c: in rsa_oaep_padding_test(), remove accidentally repeated MEMORY_E check.
2022-01-08 01:10:02 -06:00
Daniel Pouzzner
7341b54a20
wolfssl/wolfcrypt/tfm.h: fixes for cppcheck complaints: preprocessorErrorDirective[division/modulo by zero]
2022-01-08 00:34:33 -06:00
Daniel Pouzzner
cb86da71fa
wolfssl/wolfcrypt/ecc.h: fixes for cppcheck complaints: preprocessorErrorDirective[division/modulo by zero]
2022-01-08 00:34:22 -06:00
Daniel Pouzzner
fdb6a2d87d
wolfssl/test.h: fixes for cppcheck complaints: nullPointerRedundantCheck invalidScanfArgType_int
2022-01-08 00:34:09 -06:00
Daniel Pouzzner
29fcbb0b19
wolfcrypt/test/test.c: fixes for cppcheck complaints: memleakOnRealloc nullPointerRedundantCheck uninitvar invalidPrintfArgType_uint
2022-01-08 00:33:54 -06:00
Daniel Pouzzner
70ab36f81c
wolfcrypt/src/wc_port.c: fixes for cppcheck complaints: uninitvar nullPointer
2022-01-08 00:33:33 -06:00
Daniel Pouzzner
8aa1100508
wolfcrypt/src/wc_pkcs11.c: fixes for cppcheck complaints: uninitvar
2022-01-08 00:32:48 -06:00
Daniel Pouzzner
71b0b89e95
wolfcrypt/src/srp.c: fixes for cppcheck complaints: identicalInnerCondition
2022-01-08 00:32:37 -06:00
Daniel Pouzzner
82b508b917
wolfcrypt/src/sha512.c: fixes for cppcheck complaints: nullPointerRedundantCheck
2022-01-08 00:32:26 -06:00
Daniel Pouzzner
6e763825ed
wolfcrypt/src/sha.c: fixes for cppcheck complaints: bufferAccessOutOfBounds
2022-01-08 00:32:14 -06:00
Daniel Pouzzner
094d89bfb9
wolfcrypt/src/rsa.c: fixes for cppcheck complaints: identicalInnerCondition
2022-01-08 00:32:03 -06:00
Daniel Pouzzner
24bb007d3c
wolfcrypt/src/random.c: fixes for cppcheck complaints: uninitvar
2022-01-08 00:31:51 -06:00
Daniel Pouzzner
1488e28ea3
wolfcrypt/src/port/ti/ti-aes.c: fixes for cppcheck complaints: missingReturn[false positive]
2022-01-08 00:31:36 -06:00
Daniel Pouzzner
9e76ec8855
wolfcrypt/src/pkcs7.c: fixes for cppcheck complaints: nullPointerArithmeticRedundantCheck
2022-01-08 00:31:07 -06:00
Daniel Pouzzner
dc98f4dd30
wolfcrypt/src/pkcs12.c: fixes for cppcheck complaints: uselessAssignmentPtrArg
2022-01-08 00:30:52 -06:00
Daniel Pouzzner
67de528d91
wolfcrypt/src/logging.c: fixes for cppcheck complaints: invalidPrintfArgType_sint
2022-01-08 00:30:32 -06:00
Daniel Pouzzner
f126e6add5
wolfcrypt/src/integer.c: fixes for cppcheck complaints: nullPointerRedundantCheck[false positive; added suppression]
2022-01-08 00:30:20 -06:00
Daniel Pouzzner
1eb5537e34
wolfcrypt/src/fe_low_mem.c: fixes for cppcheck complaints: funcArgOrderDifferent
2022-01-08 00:30:00 -06:00
Daniel Pouzzner
d4aa6bd1fc
wolfcrypt/src/evp.c: fixes for cppcheck complaints: bufferAccessOutOfBounds nullPointerRedundantCheck
2022-01-08 00:29:47 -06:00
Daniel Pouzzner
c557a74953
wolfcrypt/src/ecc.c: fixes for cppcheck complaints: invalidPrintfArgType_sint identicalInnerCondition
2022-01-08 00:29:35 -06:00
Daniel Pouzzner
d36a1be74b
wolfcrypt/src/dh.c: fixes for cppcheck complaints: identicalInnerCondition
2022-01-08 00:29:18 -06:00
Daniel Pouzzner
11f72877a2
wolfcrypt/src/asn.c: fixes for cppcheck complaints: invalidPrintfArgType_uint nullPointerRedundantCheck
2022-01-08 00:29:09 -06:00
Daniel Pouzzner
8ba6027073
src/wolfio.c: fixes for cppcheck complaints: nullPointer uninitvar
2022-01-08 00:28:35 -06:00
Daniel Pouzzner
bb727d2ef2
src/ssl.c: fixes for cppcheck complaints: uselessAssignmentPtrArg autoVariables[not a defect; added suppression] invalidPrintfArgType_sint nullPointerRedundantCheck pointerSize
2022-01-08 00:28:09 -06:00
Daniel Pouzzner
4d3dfc451d
src/sniffer.c: fixes for cppcheck complaints: negativeIndex
2022-01-08 00:27:59 -06:00
Daniel Pouzzner
b69dc00bd7
src/internal.c: fixes for cppcheck complaints: nullPointerRedundantCheck uninitvar
2022-01-08 00:27:47 -06:00
Daniel Pouzzner
ff4c6e5d7b
linuxkm: relocate WOLFSSL_LINUXKM code in wolfssl/wolfcrypt/wc_port.h and wolfcrypt/src/memory.c to linuxkm/{linuxkm_wc_port.h,linuxkm_memory.c}, and gate SIMD in IRQ handlers on -DLINUXKM_SIMD_IRQ in prep for Linux 5.16;
...
linuxkm: when -DWOLFCRYPT_ONLY, don't include ssl.h in module_exports.c.template and module_hooks.c, and fix gating to work right with that;
wolfssl/wolfcrypt/types.h: add support for a WOLFSSL_XFREE_NO_NULLNESS_CHECK gate (used in cppcheck analysis).
2022-01-07 22:39:38 -06:00
Daniel Pouzzner
a14982b079
configure.ac: add ENABLED_WPAS to the config summary.
2022-01-07 21:36:24 -06:00
David Garske
b4da751076
Fixes for SE050 Ed25519/Curve25519.
2022-01-07 12:54:54 -08:00
Daniel Pouzzner
bbc9bc5e2c
wolfcrypt/src/port/kcapi/kcapi_hmac.c: fix memory leak in wc_HmacSetKey() ( fixes #4731 ).
2022-01-07 12:40:31 -06:00
David Garske
b97894c617
Merge pull request #4729 from anhu/STM32U575xx
...
Add support for STM32U575xx boards.
2022-01-06 16:34:28 -08:00
Anthony Hu
f3e1e8c155
Add support for STM32U575xx boards.
2022-01-06 15:40:45 -05:00
David Garske
d21105b3ca
Merge pull request #4725 from elms/cmake/min_ver_3.16
...
cmake: Increase minimum version to 3.16 and fix HomeBrew build
2022-01-06 08:09:44 -08:00
Eric Blankenhorn
f74831a7da
Improve param checks of enc
2022-01-06 09:12:18 -06:00
Hideki Miyazaki
0e6ba492e5
update signed ca
...
fix aes128-gcm crypt only usecase
2022-01-06 15:18:16 +09:00
David Garske
252e2b6a99
Merge pull request #4726 from ejohnstown/typos
...
Fix a couple typos in asn.c
2022-01-05 14:51:50 -08:00
Anthony Hu
1e903a20a5
Merge pull request #4722 from dgarske/minor
2022-01-05 15:03:44 -05:00
David Garske
32223b9c3a
Merge pull request #4697 from LinuxJedi/isotp
...
Add ISO-TP support to wolfio
2022-01-05 10:34:43 -08:00
John Safranek
66ade8006b
Fix a couple typos in asn.c
2022-01-05 10:24:25 -08:00
elms
cc2b69573c
cmake: Increase minimum version to 3.16 and fix HomeBrew build
...
Increasing cmake version required to allow use of more recent
additions in the future.
Reported issue is that Homebrew use different compiler than AppleClang
(from XCode). Correctly test for AppleClang to set xcode specific `ar`
and `ranlib` flags. It may also be appropraite to use for ANDROID as
well see
7d057b2738 (diff-6f7a068f87ca22bd0105fef2143b0960e4993854863fd20c9416c677ee33a737R61-R67)
2022-01-05 09:29:27 -08:00
Andrew Hutchings
e847bf7301
ISO-TP buffer fixes
...
* Flow control failed on wrap around when there is going to be no more
flow control packets.
* If ISOTP_Send is provided more than 4095 bytes, limit it to 4095 bytes
as wolfSSL will retry with the rest.
* Set the default receive size to the max ISO-TP data size.
* A few other cleanups.
2022-01-05 11:37:15 +00:00
David Garske
84df7a50dc
Minor build warning fixes. Possible benchmark unused bench_pq_asym_algs. Fix if RSA enabled and WOLFSSL_SP_MATH set and WOLFSSL_HAVE_SP_RSA is not.
2022-01-04 15:38:35 -08:00
David Garske
96e1f77c32
Adds compatibility FIPS DRBG API's and test cases.
2022-01-04 15:13:06 -08:00
JacobBarthelmeh
35847c1371
Merge pull request #4717 from embhorn/zd13452
...
Fix heap-buffer-overflow in GetBerHeader
2022-01-04 16:11:03 -07:00
David Garske
be69412e27
Merge pull request #4682 from JacobBarthelmeh/qnx
...
add check on mutex lock return value with qnx CAAM
2022-01-04 14:36:40 -08:00
David Garske
db1bb9ea6a
Merge pull request #4694 from anhu/with-curl
...
Add a --enable-curl build option
2022-01-04 13:39:07 -08:00
David Garske
cf29badd52
Merge pull request #4721 from anhu/lighty
...
lighttpd requires WOLFSSL_KEY_GEN…
2022-01-04 12:37:41 -08:00
Anthony Hu
038a9d8fa9
lighttpd requires WOLFSSL_KEY_GEN. Without it, a call to wolfSSL_CTX_use_PrivateKey fails.
2022-01-04 13:09:13 -05:00
David Garske
58d8f52107
Merge pull request #4719 from JacobBarthelmeh/release
...
bump version for dev and update year in readme
2022-01-04 08:40:06 -08:00
Andrew Hutchings
247cbdeef7
Cleanups for ISO-TP in wolfio
...
* Add Doxygen comments
* Make ISOTP_Send, ISOTP_Receive and wolfSSL_SetIO_ISOTP safer
* Reorder isotp_wolfssl_ctx
* Other minor cleanups
2022-01-04 12:57:11 +00:00
Saksik Remy
12d3f94c98
update build and update NULL salt usecase
2022-01-04 13:18:39 +08:00
Jacob Barthelmeh
7dd50a1beb
bump version for dev and update year in readme
2022-01-03 16:02:10 -07:00
Eric Blankenhorn
3134bd2e71
Fix heap-buffer-overflow in GetBerHeader
2022-01-03 14:51:47 -06:00
David Garske
a0b9e2bead
Merge pull request #4715 from JacobBarthelmeh/release
...
update README for release v5.1.1
2022-01-03 10:51:51 -08:00
JacobBarthelmeh
5f16a826dd
update README for release v5.1.1
2022-01-03 09:39:16 -07:00
David Garske
70ca57790c
Merge pull request #4713 from ejohnstown/fips-RC12
...
FIPS RC12
2021-12-30 17:16:03 -08:00
John Safranek
68e58bb321
Update configure and fips-check.sh for FIPS RC12.
2021-12-30 15:21:44 -08:00
David Garske
7ad7821193
Merge pull request #4712 from rizlik/aes_free_fix
...
Fix potential resources leaks
2021-12-30 13:57:04 -08:00
Marco Oliverio
ea5374c62d
wolfcrypt: aes: gcm: streaming api: add missing wc_AesFree()
2021-12-30 20:33:23 +01:00
Marco Oliverio
4907696ed4
wolfssl: keys: add missing wc_AesFree() when setting new keys
2021-12-30 20:30:36 +01:00
Marco Oliverio
2679c386ae
wolfcrypt: wc_encrypt: add missing wc_AesFree()
2021-12-30 20:30:36 +01:00
Marco Oliverio
933065d696
wolfcrypt: cmac: add missing wc_AesFree()
2021-12-30 20:30:36 +01:00
Marco Oliverio
7edc916057
wolfcrypt/wolfssl: tests: adding missing wc_Aes*Free()
...
In some Aes implementation this may leak resources
2021-12-30 20:30:33 +01:00
JacobBarthelmeh
67b27f64d0
Merge pull request #4708 from dgarske/async_v5.1.0
...
Fixes for wolfSSL Async v5.1.0
2021-12-29 13:30:41 -07:00
David Garske
ff68ab8eea
Merge pull request #4707 from JacobBarthelmeh/release
...
bump version by .1 for developing on
2021-12-29 12:09:43 -08:00
David Garske
c4f51931c9
Merge pull request #4710 from JacobBarthelmeh/sessionExport
...
fix for location of xmemset
2021-12-29 11:52:08 -08:00
Anthony Hu
69733e87c5
SNI and ALT_CERT_CHAINS
2021-12-29 12:50:50 -05:00
Jacob Barthelmeh
73b4cc9476
fix for location of xmemset
2021-12-29 10:48:06 -07:00
Chris Conlon
bc6690c584
Merge pull request #4709 from miyazakh/Update_fspv3p5_RA6M3
2021-12-29 09:10:18 -07:00
Saksik Remy
d11e88298a
Add Make file and fix identation
2021-12-29 11:45:32 +08:00
Remy saksik
4fc2891d5a
Merge branch 'wolfSSL:master' into iotsafe-hkdf-extract
2021-12-29 11:15:13 +08:00
Hideki Miyazaki
f5df363cdd
remove configure.xml from include.am
2021-12-29 11:16:14 +09:00
Hideki Miyazaki
1d107d0403
update RA6M3 projects to the latest e2studio and FSP v3.5.0
2021-12-29 11:06:48 +09:00
David Garske
930cad649e
Fix to resolve possible memory leak with DSA wc_DsaPublicKeyDecode in API unit test when used with HAVE_WOLF_BIGINT.
2021-12-28 16:34:54 -08:00
JacobBarthelmeh
0f9550d80a
increase version for rpm build
2021-12-28 15:35:14 -08:00
Jacob Barthelmeh
616026880e
bump version by .1 for dev
2021-12-28 16:25:05 -07:00
David Garske
2b670c026d
Merge pull request #4705 from JacobBarthelmeh/DTLS
...
account for DTLS extra header size when reading msg from pool
2021-12-27 19:16:26 -08:00
JacobBarthelmeh
a07673ad07
Merge pull request #4706 from douzzer/20211227-fix-null-pointer-wolfSSL_EVP_CIPHER_CTX_ctrl
...
wolfcrypt/src/evp.c: fix wolfSSL_EVP_CIPHER_CTX_ctrl() null pointer…
2021-12-27 20:08:43 -07:00
Daniel Pouzzner
aa05eb2879
wolfcrypt/src/evp.c: fix wolfSSL_EVP_CIPHER_CTX_ctrl() null pointer passed to XMEMCPY(), found by sanitizers under gcc-11.2.1.
2021-12-27 17:59:28 -06:00
Jacob Barthelmeh
05a19c852b
account for DTLS extra header size when reading msg from pool
2021-12-27 16:52:09 -07:00
David Garske
930cc053d5
Merge pull request #4704 from JacobBarthelmeh/release
...
prepare for release 5.1.0
2021-12-27 12:35:49 -08:00
JacobBarthelmeh
d1b03eb8b9
add missing header files for rpm build
2021-12-27 09:49:47 -08:00
Jacob Barthelmeh
816718ecd3
prepare for release 5.1.0
2021-12-27 10:34:09 -07:00
Jacob Barthelmeh
cbab5bb6cb
add kdf.c to MYSQL cmake build
2021-12-27 10:10:35 -07:00
Jacob Barthelmeh
5a4e59c09d
fix warning about NULL compare
2021-12-27 10:02:16 -07:00
David Garske
4e1c39b4c6
Merge pull request #4701 from SparkiDev/asn_templ_fix_1
...
ASN template: get compiling
2021-12-24 07:42:56 -08:00
David Garske
fd31c017e1
Merge pull request #4703 from douzzer/20211224-fixits
...
20211224 ssl.c fixes
2021-12-24 07:42:00 -08:00
Andrew Hutchings
7c2a2229c5
Use XMEMCPY and defined constannts for ISOTP
2021-12-24 11:56:16 +00:00
Daniel Pouzzner
54e9076c45
src/ssl.c: fix whitespace and heap reference in FreeSession() (re 569c066fab).
2021-12-24 01:16:32 -06:00
Sean Parkinson
9d49884274
Merge pull request #4690 from dgarske/resume
...
Fixes for session resumption edge cases
2021-12-24 15:28:06 +10:00
David Garske
02186dbd23
Fix for TLS v1.3 client session ticket resumption where the server opts to do a new handshake. Fix to make sure preMasterSz is valid.
2021-12-23 18:45:52 -08:00
David Garske
a92fb0eb42
Fix for session resumption to ensure use of the right cipher suite. ZD13297
2021-12-23 18:42:41 -08:00
Sean Parkinson
80a4793201
SP int: transplant the div_word from SP into SP int for ARM64 and ARM32
2021-12-24 12:26:19 +10:00
Sean Parkinson
f1f15f411f
Merge pull request #4688 from embhorn/gh4684
...
Fix missing include ws2tcpip.h for VS build
2021-12-24 11:58:12 +10:00
Sean Parkinson
929174be6b
Merge pull request #4667 from dgarske/zd13363
...
Improve TLS client side session cache references
2021-12-24 11:23:06 +10:00
Sean Parkinson
4c6af465c4
ASN template: get compiling
2021-12-24 11:21:18 +10:00
David Garske
a75e152b93
Merge pull request #4698 from JacobBarthelmeh/Jenkins
...
fix for user_settings_all.h build on 'VS' and build with libz + pkcs7 test
2021-12-23 16:54:40 -08:00
Hayden Roche
37925e0b6a
Merge pull request #4699 from douzzer/ssl-wolfCrypt_SetPrivateKeyReadEnable_fips
2021-12-23 16:42:06 -08:00
David Garske
1e4b13dfac
Only include ws2tcpip.h if not user IO.
2021-12-23 15:25:25 -08:00
Anthony Hu
8eea17d92a
More stuff, probably not complete yet
2021-12-23 17:28:24 -05:00
David Garske
569c066fab
Improve TLS client side session cache references to provide option for not returning an internal session cache pointer. Now use wolfSSL_get1_sesson for reference logic, that requires calling wolfSSL_SESSION_free. To disable this feature use NO_SESSION_CACHE_REF.
2021-12-23 14:25:45 -08:00
Daniel Pouzzner
7b5b1f5a4d
src/ssl.c: refine integration of wolfCrypt_SetPrivateKeyReadEnable_fips(), started by 52754123d9: depend on fips 5.1+, and call as matched pair in wolfSSL_Init() and wolfSSL_Cleanup().
2021-12-23 16:05:25 -06:00
David Garske
f950f24b1a
Merge pull request #4691 from JacobBarthelmeh/sessionExport
...
retain same size for exported session
2021-12-23 14:03:11 -08:00
David Garske
21c8b19fc2
Merge pull request #4696 from JacobBarthelmeh/build_tests
...
fix for a couple reports from build_tests
2021-12-23 13:42:06 -08:00
JacobBarthelmeh
801c0c7efd
Merge pull request #4549 from elms/cmake/ac_catchup
...
cmake/configure consistency
2021-12-23 13:49:44 -07:00
David Garske
57d2555ac8
Merge pull request #4695 from douzzer/20211222-fips-config-update-and-fix-test_RsaDecryptBoundsCheck
...
fips config update and test-driven cleanup
2021-12-23 10:38:36 -08:00
Andrew Hutchings
bb8d38c2a1
Add ISO-TP support to wolfio
...
ISO-TP is a commonly used simple transport layer for CAN bus which
allows larger than the 1-8 bytes payload than the CAN bus protocol
allows.
This implements our own ISO-TP transport layer for wolfSSL when compiled
with `WOLFSSL_ISOTP`.
2021-12-23 18:27:34 +00:00
JacobBarthelmeh
f9c9f4c840
refactor IP macro defines
2021-12-23 09:59:05 -08:00
JacobBarthelmeh
c4e50ef086
fix for libz test with pkcs7
2021-12-23 09:37:09 -08:00
David Garske
a8605309c6
Merge pull request #4692 from haydenroche5/wolfssl_init_fipsv5
...
Call wc_SetSeed_Cb and wolfCrypt_SetPrivateKeyReadEnable_fips in wolfSSL_Init.
2021-12-23 09:28:36 -08:00
Chris Conlon
9892f1f2d5
Merge pull request #4679 from dgarske/fips_ecc_pct
2021-12-23 10:27:51 -07:00
elms
dc073f9c1d
cmake: add back de-duplication and fix formatting
2021-12-23 09:22:47 -08:00
elms
37eec1ed19
cmake: reduce port includes
...
TESTING:
```
./autogen.sh && ./configure --enable-reproducible-build --prefix=$PWD/ac_repro && make install
cmake -B b2 -DWOLFSSL_REPRODUCIBLE_BUILD=yes -DCMAKE_INSTALL_PREFIX:PATH=$PWD/cmake_repro && cmake --build b2 && cmake --install b2
diff -rq ac_repro cmake_repro
```
2021-12-23 09:22:47 -08:00
elms
6ff1e0b037
cmake: correct libtool version, default to shared library, generate pkgconfig
2021-12-23 09:22:47 -08:00
elms
c89b7d5f79
configure and cmake: Closing gap on options and output
...
cmake:
* 32-bit and 16-bit mode flags
* Add 4bit to AESGCM
* Add align data
* Encrypted Keys option
* PKC12 option
* Header installation cleanup
configure:
* Add comment for `v5-RC9`
* update CFLAGS to always be appended instead of mix of prepend and append
* removed duplicate `ARC4` logic
2021-12-23 09:22:47 -08:00
JacobBarthelmeh
63df8f0836
add fe_low_mem.c to wolfssl vs project and fix a couple warnings
2021-12-23 16:55:51 +00:00
David Garske
40d5bd052f
Merge pull request #4693 from embhorn/zd13433
...
Fix to init ctx in wc_Des3_SetKey
2021-12-23 07:41:13 -08:00
Sean Parkinson
86e51b97e9
Merge pull request #4689 from haydenroche5/wolfengine_compression_fix
...
Fix usage of SSL_OP_NO_COMPRESSION that was breaking wolfEngine.
2021-12-23 10:47:30 +10:00
Daniel Pouzzner
a5b3daf216
fix whitespace.
2021-12-22 17:34:06 -06:00
Daniel Pouzzner
951eb72ecb
fips-check.sh: update+streamline flavors -- add linuxv5-dev (checks out fips master same as old linuxv5-ready) , drop linuxv5-RC8, linuxv5-RC9, linuxv5-RC10, and the desupported/unbuildable fips-v3-ready; update linuxv5 and linuxv5-ready to use WCv5.0-RC11; use the term "flavor" consistently for the fips key (versus "version" or "platform"); cleanup to satisfy shellcheck.
2021-12-22 17:32:36 -06:00
Daniel Pouzzner
a6ed5dc92d
configure.ac: update fips with RC11.
2021-12-22 17:32:36 -06:00
Daniel Pouzzner
b0a5b16068
api.c: fix logic in test_RsaDecryptBoundsCheck().
2021-12-22 17:32:36 -06:00
Eric Blankenhorn
29c18a110b
Fix to init ctx in wc_Des3_SetKey
2021-12-22 17:05:58 -06:00
David Garske
11e8d729c2
Merge pull request #4685 from SparkiDev/sp_gen_fix_1
...
SP gen: Regenerate
2021-12-22 15:02:03 -08:00
Anthony Hu
991ddaadfc
Add a --enable-curl build option
2021-12-22 17:34:58 -05:00
Hayden Roche
52754123d9
Call wc_SetSeed_Cb and wolfCrypt_SetPrivateKeyReadEnable_fips in wolfSSL_Init.
...
Additionally, remove wc_SetSeed_Cb calls applications (e.g. example client and
server), since they are now redundant.
2021-12-22 14:21:06 -08:00
Chris Conlon
8670e33baf
Merge pull request #4651 from TakayukiMatsuo/tsip_sce
2021-12-22 15:00:32 -07:00
Jacob Barthelmeh
fd39197e4b
retain same size for exported session
2021-12-22 14:28:42 -07:00
Hayden Roche
646ceb259a
Fix usage of SSL_OP_NO_COMPRESSION that was breaking wolfEngine.
...
Replace instances of SSL_OP_NO_COMPRESSION with WOLFSSL_OP_NO_COMPRESSION in
ssl.c. Only define SSL_OP_NO_COMPRESSION when using the compatibility layer.
Before these changes, wolfEngine builds were failing due to
SSL_OP_NO_COMPRESSION being defined in both wolfSSL and OpenSSL headers.
2021-12-22 10:23:51 -08:00
David Garske
38214bd083
Disable the FIPS consistency checks in ECC and DH for key generation by default.
2021-12-22 10:06:19 -08:00
David Garske
8d4c22abda
Merge pull request #4687 from julek-wolfssl/asn-template-var-init
...
`items` needs to be initialized as the compiler complains
2021-12-22 08:58:54 -08:00
David Garske
9d137668c7
Merge pull request #4675 from julek-wolfssl/openssh-8.8
...
Fix macro name conflicts with openssh
2021-12-22 08:31:36 -08:00
Eric Blankenhorn
713c4afcb4
Fix missing include ws2tcpip.h for VS build
2021-12-22 09:26:22 -06:00
Juliusz Sosinowicz
8435eb4644
Add WC_ namespace to variable handling defines
2021-12-22 12:16:02 +01:00
Juliusz Sosinowicz
618599656f
items needs to be initialized as the compiler complains
2021-12-22 10:42:48 +01:00
Saksik Remy
81cf1ae38a
fix alignment
2021-12-22 15:16:08 +08:00
Saksik Remy
c7fc0fac05
revert changes + spelling/comments
2021-12-22 15:11:50 +08:00
Remy saksik
9091cbde5f
Merge branch 'wolfSSL:master' into iotsafe-hkdf-extract
2021-12-22 14:46:28 +08:00
David Garske
ea432f45cd
Merge pull request #4686 from SparkiDev/fe448_cast
...
Curve448: add casts for Windows
2021-12-21 22:21:25 -08:00
TakayukiMatsuo
cd96330f2a
Integrate Renesas TSIP specific code into Renesas common logics
2021-12-22 13:18:32 +09:00
Remy saksik
140cf8955d
Merge branch 'wolfSSL:master' into iotsafe-hkdf-extract
2021-12-22 12:01:11 +08:00
Sean Parkinson
80e291fcd1
Curve448: add casts for Windows
2021-12-22 12:57:15 +10:00
Juliusz Sosinowicz
dd9b1afb72
Remove magic numbers from WOLFSSL_ASN_TEMPLATE code ( #4582 )
...
* pkcs8KeyASN and other misc asn fixes
- Test fixes for testing with `USE_CERT_BUFFERS_1024`
* intASN
* bitStringASN
* objectIdASN
* algoIdASN
* rsaKeyASN
* pbes2ParamsASN
* pbes1ParamsASN
* pkcs8DecASN
* p8EncPbes1ASN
* rsaPublicKeyASN
* dhParamASN
* dhKeyPkcs8ASN
* dsaKeyASN
* dsaPubKeyASN
- Add `wc_SetDsaPublicKey` without header testing
* dsaKeyOctASN
* rsaCertKeyASN
* eccCertKeyASN
* rdnASN
* certNameASN
* digestInfoASN
* otherNameASN
* altNameASN
* basicConsASN
* crlDistASN
* accessDescASN
* authKeyIdASN
* keyUsageASN
* keyPurposeIdASN
* subTreeASN
* nameConstraintsASN
* policyInfoASN
* certExtHdrASN
* certExtASN
* x509CertASN
* reqAttrASN
* strAttrASN
* certReqASN
* eccPublicKeyASN
* edPubKeyASN
* ekuASN
* nameASN
* certExtsASN
* sigASN
* certReqBodyASN_IDX_EXT_BODY
* dsaSigASN
* eccSpecifiedASN
* eccKeyASN
* edKeyASN
* singleResponseASN
* respExtHdrASN
* ocspRespDataASN
* ocspBasicRespASN
* ocspResponseASN
* ocspNonceExtASN
* ocspRequestASN
* revokedASN
* crlASN
* pivASN
* pivCertASN
* dateASN
* `wc_SetDsaPublicKey` was not including `y` in the sequence length
* All index names changed to uppercase
* Shorten names in comments
* Make sure extensions have sequence header when in cert gen
* Fix/refactor size calc in `SetNameEx`
* Pad blocks for encryption
* Add casting for increased enum portability
* Use stack for small ASN types
2021-12-22 11:28:01 +10:00
David Garske
af0bcef0ef
Merge pull request #4648 from embhorn/zd13365
...
Fix - wolfSSL_init should cleanup on failure of a component
2021-12-21 17:17:16 -08:00
David Garske
bf612c075b
Merge pull request #4668 from ejohnstown/kcapi-ecdsa
...
KCAPI ECDSA Memory
2021-12-21 15:32:33 -08:00
Sean Parkinson
bf37845e2d
Merge pull request #4680 from JacobBarthelmeh/certs
...
update certificate expiration dates and fix autorenew
2021-12-22 08:48:35 +10:00
Sean Parkinson
395c5815bd
SP gen: Regenerate
...
Put back in fix for SAKKE.
2021-12-22 08:24:33 +10:00
David Garske
a6a071771b
Merge pull request #4681 from SparkiDev/sp_arm64_p384_mr
...
SP ARM64: P-384 prime specific Montogmery Reduction
2021-12-21 13:50:33 -08:00
JacobBarthelmeh
bbfcd0cac8
fix build warning with af_alg
2021-12-21 10:20:34 -08:00
JacobBarthelmeh
d29cdd3537
fix for --enable-ip-alt-name build
2021-12-21 09:53:58 -08:00
JacobBarthelmeh
d28cb70735
fix for ed25519 client cert generation
2021-12-21 09:03:54 -08:00
Saksik Remy
78a419fdf5
spelling
2021-12-21 15:57:19 +08:00
Saksik Remy
ebff24353a
fix Spelling
2021-12-21 15:53:57 +08:00
Saksik Remy
f1bbfa5a24
revert change on Derive Master secret
2021-12-21 15:51:32 +08:00
Saksik Remy
31cf4f305c
fixing comments and spelling; fallback hkdf imp + signature header
2021-12-21 15:41:43 +08:00
Jacob Barthelmeh
343cfb32f2
add check on mutex lock return value with qnx CAAM
2021-12-20 17:41:06 -07:00
Sean Parkinson
9f2419246e
SP ARM64: P-384 prime specific Montogmery Reduction
...
Improves performance
2021-12-21 10:18:12 +10:00
JacobBarthelmeh
c0f8fd5f5d
update certificate dates and fix autorenew
2021-12-20 16:04:05 -08:00
David Garske
6b47954d58
Merge pull request #4670 from julek-wolfssl/krb5-missing-api
...
Missing config for krb5 1.16.1
2021-12-20 15:54:41 -08:00
David Garske
3644d97dd8
Merge pull request #4613 from SparkiDev/sp_div_max
...
SP math all: div handling of length of dividend
2021-12-20 15:10:35 -08:00
David Garske
360a513696
Merge pull request #4553 from SparkiDev/sp_mont_inv_order_fix
...
SP: fix when mont_mul_order is defined
2021-12-20 15:09:08 -08:00
Sean Parkinson
463d050d3d
Merge pull request #4678 from dgarske/nightly
...
Nightly fixes: PK with no AES and OCSP test with DTLS
2021-12-21 09:00:22 +10:00
David Garske
0ce9703768
Merge pull request #4666 from SparkiDev/ecc_enc_mem
...
ECC: better protection when using encrypted memory
2021-12-20 14:48:13 -08:00
Sean Parkinson
bb306d14b7
Merge pull request #4643 from kareem-wolfssl/zd13328
...
Fix building with OPENSSL_EXTRA defined and NO_WOLFSSL_STUB not defined.
2021-12-21 08:02:17 +10:00
David Garske
d588437504
Merge pull request #4677 from anhu/oqs_to_pqc
...
--with-liboqs now defines HAVE_LIBOQS and HAVE_PQC
2021-12-20 13:00:30 -08:00
David Garske
d8b58b8b05
Put both DigiCert Global Root CA and GlobalSign Root CA into the Google CA list. Fixes --enable-dtls --enable-ocsp ./scripts/ocsp.test`.
2021-12-20 11:47:34 -08:00
David Garske
ebc64db7d0
Fix for --enable-pkcallbacks --disable-aes --disable-aesgcm.
2021-12-20 10:17:50 -08:00
David Garske
b290e8089c
Merge pull request #4672 from SparkiDev/sp_c_mont_red
...
SP C: specific Montgomery reduction code for P256 and P384
2021-12-20 09:50:54 -08:00
Anthony Hu
79f6301521
Add error for case of user defining HAVE_PQC without HAVE_LIBOQS.
2021-12-20 12:42:09 -05:00
Anthony Hu
7d4c13b9a4
--with-liboqs now defines HAVE_LIBOQS and HAVE_PQC
...
AKA: The Great Rename of December 2021
2021-12-20 11:48:03 -05:00
Saksik Remy
93712fcfbd
fallback in software imp if callback not supporting operation ie: NULL salt
2021-12-20 17:34:27 +08:00
Saksik Remy
d1f850273f
add hkdf-extract to iotsafe implementation + sample application
2021-12-20 17:33:24 +08:00
Sean Parkinson
6d2da74c21
Merge pull request #4625 from dgarske/zd13208
...
Fix for PKCS7 verify to handle content type OID with indef BER encoding
2021-12-20 14:49:59 +10:00
David Garske
ce4f436d0f
Merge pull request #4587 from SparkiDev/dis_algs_fix_1
...
Disable algorithms: fixes
2021-12-19 20:12:30 -08:00
David Garske
2477574a69
Fix for PKCS7 verify to handle pkcs7-data content type OID with indef BER encoding. ZD13208
2021-12-17 14:24:35 -08:00
David Garske
ab9eda636a
Merge pull request #4671 from lealem47/remove-n
...
Removing extra \n from WOLFSSL_LEAVE and WOLFSSL_ENTER
2021-12-17 14:04:42 -08:00
John Safranek
b45f1ed761
KCAPI ECDSA Memory
...
Use page aligned memory when using ECDSA signing and verify.
2021-12-17 11:11:16 -08:00
David Garske
97830b81d6
Merge pull request #4674 from anhu/uninitialized
...
Fix unitialized usage
2021-12-17 10:51:43 -08:00
John Safranek
771647615a
Merge pull request #4669 from douzzer/rehab-configure-fips
...
FIPS configure cleanup
2021-12-17 08:58:44 -08:00
Anthony Hu
9cc1624023
Fix unitialized usage
2021-12-17 11:55:08 -05:00
Kaleb Himes
2f0b451545
Merge pull request #4673 from julek-wolfssl/should-retry-fix
...
Fix `test_wolfSSL_BIO_should_retry` test
2021-12-17 08:16:16 -07:00
Juliusz Sosinowicz
21a5a571e8
Fix test_wolfSSL_BIO_should_retry test
...
When `OPENSSL_COMPATIBLE_DEFAULTS` is defined then `SSL_MODE_AUTO_RETRY` is set on context creation. For this test we need to clear this mode so that the `WOLFSSL_CBIO_ERR_WANT_READ` can propagate up to the user.
2021-12-17 12:32:25 +01:00
David Garske
bd515cd3a6
Merge pull request #4637 from SparkiDev/sp_c32_rsa
...
SP C RSA: normalize tmpa after conditionally adding p
2021-12-16 18:54:28 -08:00
Sean Parkinson
6cac0ea5a9
SP C: specific Montgomery reduction code for P256 and P384
...
Improves performance of 32-bit and 64-bit SP C code.
2021-12-17 12:00:16 +10:00
Daniel Pouzzner
5c6bd8c2c9
configure.ac: in fips v5 setup, consider HAVE_AES{CCM,CTR,GCM,OFB}_PORT when auto-setting -DWOLFSSL_AES_DIRECT -DHAVE_AES_ECB; refactor KCAPI options for readability and correctness.
2021-12-16 17:03:01 -06:00
Sean Parkinson
0b2b218de7
ECC: better protection when using encrypted memory
...
Added new ECC scalar multiplication implementation.
2021-12-17 08:30:45 +10:00
Lealem Amedie
a79440b95a
Removing extra \n from WOLFSSL_LEAVE and WOLFSSL_ENTER
2021-12-16 13:30:43 -07:00
Daniel Pouzzner
f889916fae
ssl.c: fix C++ invalid conversion in wolfSSL_sk_X509_INFO_value().
2021-12-16 13:29:17 -06:00
Daniel Pouzzner
e35c3c0d71
wolfcrypt/src/wc_port.c: fix whitespace.
2021-12-16 13:01:01 -06:00
Daniel Pouzzner
cf16480c85
configure.ac: fix hard tabs, and fix fips "v5-ready" that should have been "v5-dev".
2021-12-16 13:00:10 -06:00
Daniel Pouzzner
b7307e0ca5
ecc.c: small stack refactor for mp_int on the stack in wc_ecc_gen_deterministic_k().
2021-12-16 13:00:10 -06:00
Daniel Pouzzner
fed5eb1d94
ecc.c: fix a deadcode.DeadStores warning in wc_ecc_gen_deterministic_k().
2021-12-16 13:00:10 -06:00
Daniel Pouzzner
b6b12fe946
configure.ac: fips cleanup: drop flavor keys "v5-REL" (confusing); drop "v3" aka "v3-ready" (no longer buildable); add flavor "v5-dev" aka "dev"; refactor the "v5*" case of the FIPS setup switch to impose feature locks for v5 and v5-ready, but allow feature overrides with the new v5-dev; fix a debugging echo in the v2 case added in 1c27654300.
2021-12-16 13:00:10 -06:00
David Garske
dec78169bf
Merge pull request #4658 from julek-wolfssl/apache-2.4.51
...
Add Apache 2.4.51 support
2021-12-16 08:52:10 -08:00
David Garske
ea2245c4d1
Merge pull request #4656 from JacobBarthelmeh/SanityChecks
...
sanity check before reading policy constraint
2021-12-16 08:42:19 -08:00
David Garske
424bd2d73d
Merge pull request #4599 from julek-wolfssl/issue-4593
...
Add WOLFSSL_FORCE_AUTO_RETRY option: force retrying of network reads
2021-12-16 08:42:07 -08:00
Chris Conlon
3bd737b9ef
Merge pull request #4665 from miyazakh/sce_fsp_update_v3p5
2021-12-16 09:39:13 -07:00
David Garske
7699d92935
Merge pull request #4664 from anhu/Fix_ENCRYPT_LEN
...
Do not let anything override HAVE_LIBOQS when setting ENCRYPT_LEN
2021-12-16 07:51:32 -08:00
Eric Blankenhorn
44cc9e4824
Fix - wolfSSL_init should cleanup on failure of a component
2021-12-16 09:50:50 -06:00
Juliusz Sosinowicz
afa6237f56
Add WOLFSSL_FORCE_AUTO_RETRY option: force retrying of network reads
2021-12-16 15:33:30 +01:00
Juliusz Sosinowicz
d5783d1eaa
Missing config for krb5 1.16.1
2021-12-16 14:35:39 +01:00
Juliusz Sosinowicz
017d6cf464
Simplify error queue macros
2021-12-16 12:39:58 +01:00
Juliusz Sosinowicz
e78f7f734e
Add Apache 2.4.51 support
...
- Define `OPENSSL_COMPATIBLE_DEFAULTS` and `WOLFSSL_NO_OCSP_ISSUER_CHECK` for Apache config
- Fix `SSL_set_timeout` to match OpenSSL signature
- Implement `pkey` in `X509_INFO`
- Detect attempt to connect with plain HTTP
- Implement `wolfSSL_OCSP_request_add1_nonce`
- Set `ssl->cipher.bits` when calling `wolfSSL_get_current_cipher`
- Use custom flush method in `wolfSSL_BIO_flush` when set in BIO method
- Set the TLS version options in the `ssl->options` at the end of ClientHello parsing
- Don't modify the `ssl->version` when in a handshake (`ssl->msgsReceived.got_client_hello` is set)
- `wolfSSL_get_shutdown` returns a full bidirectional return when the SSL object is cleared. `wolfSSL_get_shutdown` calls `wolfSSL_clear` on a successful shutdown so if we detect a cleared SSL object, assume full shutdown was performed.
2021-12-16 12:39:38 +01:00
Marco Oliverio
fa913f797a
Merge pull request #4657 from SparkiDev/sakke_cond_add
...
SAKKE: fixup cond add to use all words
2021-12-16 07:40:13 +01:00
Hideki Miyazaki
63ade421c1
fix redundat #ifdef
2021-12-16 09:30:21 +09:00
Sean Parkinson
bd7e19b8fe
Merge pull request #4639 from JacobBarthelmeh/ECC
...
deterministic ECC sign edge case fix and add variant
2021-12-16 08:48:37 +10:00
David Garske
abe8696852
Merge pull request #4642 from cconlon/pubKeyDerFromX509
...
Add wc_GetPubKeyDerFromCert()
2021-12-15 14:30:58 -08:00
Anthony Hu
7975ead1af
Do not let anything override HAVE_LIBOQS when setting ENCRYPT_LEN because oqs wants biggest value.
2021-12-15 14:48:50 -05:00
John Safranek
e1cee463b6
Merge pull request #4662 from douzzer/20211214-fixits
...
20211214 fixits
2021-12-15 10:47:50 -08:00
Daniel Pouzzner
463118005f
Merge pull request #4663 from ejohnstown/revert-pr
...
Revert configure.ac PR
2021-12-15 12:33:19 -06:00
John Safranek
8688bd43f1
Revert "Swap v5-ready (exception) and v5, add the wildcard back in for all non-ready cases"
...
This reverts commit 23fbf2e786 .
2021-12-15 10:24:05 -08:00
John Safranek
1b6e0c45d0
Merge pull request #4660 from kaleb-himes/FIPS_READY_KCAPI_FOLLOWUP
...
Swap v5-ready (exception) and v5, add the wildcard back in for all non-ready cases
2021-12-15 10:16:33 -08:00
Chris Conlon
5172130287
add wc_GetPubKeyDerFromCert(), get pub key DER from DecodedCert
2021-12-15 11:04:52 -07:00
Hideki Miyazaki
9af9d96cc7
Update README for FSP v3.5.0
...
fix tyo
2021-12-15 15:46:16 +09:00
Daniel Pouzzner
a773cdfd5d
pkcs12.c wc_d2i_PKCS12_fp(): mollify Visual Studio (false positives C4701 and C4703).
2021-12-14 18:33:24 -06:00
Daniel Pouzzner
242eb2dcf1
wolfcrypt/src/pkcs12.c: fix scan-build deadcode.DeadStores gripe.
2021-12-14 18:08:54 -06:00
Daniel Pouzzner
eb032e0266
configure.ac: refactor changes of 7cccaa98b7 around FIPS v5*.
2021-12-14 18:08:12 -06:00
kaleb-himes
23fbf2e786
Swap v5-ready (exception) and v5, add the wildcard back in for all non-ready cases
2021-12-14 13:28:35 -07:00
David Garske
a6c7d56c32
Merge pull request #4655 from haydenroche5/wc_pkcs12_from_file
...
Add wc_d2i_PKCS12_fp to parse a PKCS #12 file directly in wolfCrypt.
2021-12-14 08:58:57 -08:00
Sean Parkinson
994e370db3
SAKKE: fixup cond add to use all words
2021-12-14 12:02:59 +10:00
John Safranek
2359045b28
Merge pull request #4649 from kaleb-himes/KCAPI_FIPS_READY
...
The minimal changes needed to add KCAPI support with fips-ready
2021-12-13 17:33:03 -08:00
Hayden Roche
92d207a1cd
Add wc_d2i_PKCS12_fp to parse a PKCS #12 file directly in wolfCrypt.
2021-12-13 15:28:34 -08:00
JacobBarthelmeh
a2cf234100
sanity check before reading policy constraint
2021-12-13 14:32:46 -08:00
Sean Parkinson
f5cd61e4f9
Merge pull request #4654 from embhorn/zd13375
...
Fix _sp_exptmod_base_2 to init vars.
2021-12-14 07:38:20 +10:00
David Garske
7fd1b7aa51
Merge pull request #4650 from anhu/changelog
...
Mention falcon in the changelog
2021-12-13 10:37:07 -08:00
kareem-wolfssl
638d00f593
Merge pull request #4634 from danielinux/iotsafe-16bit-id
...
IoT-SAFE module: improvements and bug fixes
2021-12-13 11:33:19 -07:00
David Garske
caf9024984
Merge pull request #4652 from douzzer/no-rsa-no-dh-no-dsa
...
WOLFSSL_ECC_NO_SMALL_STACK etc
2021-12-13 10:12:14 -08:00
David Garske
9a85638ac3
Merge pull request #4647 from anhu/evp_pkey_dummy_falcon
...
In d2iGenericKey(), if a falcon key is encountered, make a dummy pkey.
2021-12-13 10:12:07 -08:00
Eric Blankenhorn
53eb5d2e5a
Fix _sp_exptmod_base_2 to init vars.
2021-12-13 10:16:55 -06:00
Daniel Pouzzner
355b779a3e
feature gating tweaks to better support --disable-rsa --disable-dh --disable-dsa. also a whitespace fix in ssl.c.
2021-12-11 14:08:04 -06:00
Daniel Pouzzner
2193df1d62
add WOLFSSL_ECC_NO_SMALL_STACK.
2021-12-10 23:57:14 -06:00
David Garske
41d4aafa3f
Merge pull request #4645 from haydenroche5/parse_cert_public
...
Make wolfCrypt ASN cert parsing functionality public.
2021-12-10 18:27:18 -08:00
Anthony Hu
eec9649049
Mention falcon in the changelog
2021-12-10 16:54:13 -05:00
kaleb-himes
7cccaa98b7
The minimal changes needed to add KCAPI support with fips-ready
2021-12-10 14:44:20 -07:00
Anthony Hu
4c12f0be95
Only one call to wc_falcon_init() and comment on 300.
2021-12-10 16:40:41 -05:00
Anthony Hu
1d8ff70900
In d2iGenericKey(), if a falcon key is encountered, make a dummy pkey.
...
This allows apache-httpd to work without PQ-specific patch along with a previous
pull request.
2021-12-10 14:18:42 -05:00
Hayden Roche
6764e7c15f
Make wolfCrypt ASN cert parsing functionality public.
...
Currently, the `ParseCert` function is only available if `WOLFSSL_ASN_API` is
defined to `WOLFSSL_API`. The only way to achieve this without enabling the
compatibility layer is to define `WOLFSSL_TEST_CERT`. There are users defining
this so that they can parse certs with wolfCrypt, even though this doesn't seem
to be the original intent of the define. This commit adds the function
`wc_ParseCert` to the public wolfCrypt API. It's simply a wrapper around
`ParseCert`. Similarly, this commit adds `wc_InitDecodedCert` and
`wc_FreeDecodedCert` to the public API, which are wrappers around
`InitDecodedCert` and `FreeDecodedCert`, respectively.
2021-12-10 10:43:28 -08:00
David Garske
dde8cd9039
Merge pull request #4646 from julek-wolfssl/SSL_OP_NO_COMPRESSION-redef-error
...
Fix redefinition error of `WOLFSSL_OP_NO_COMPRESSION`
2021-12-10 08:46:43 -08:00
David Garske
65a0b71994
Merge pull request #4641 from anhu/priv_key_check
...
Actually do a private/public key check for FALCON.
2021-12-10 06:53:35 -08:00
Juliusz Sosinowicz
e40ba00ece
Fix redefinition error of WOLFSSL_OP_NO_COMPRESSION
2021-12-10 15:11:11 +01:00
Anthony Hu
6b5fa9d0ae
remove consistency check; let it fail elsewhere.
2021-12-09 17:12:42 -05:00
David Garske
b921161309
Merge pull request #4633 from SparkiDev/tls13_expired
...
TLS13: Skip if expired rather than turning off resuming
2021-12-09 14:10:42 -08:00
David Garske
dd0e3d6ebf
Merge pull request #4644 from kareem-wolfssl/iotsafe_class
...
Fix compiling Iotsafe with C++ by avoiding reserved keyword 'class'.
2021-12-09 09:10:24 -08:00
Anthony Hu
494abde3eb
Better casting.
2021-12-09 09:45:28 -05:00
Daniele Lacamera
f02763b088
Fixes after review comments
2021-12-09 11:23:44 +01:00
David Garske
4764c4d6fa
Merge pull request #4636 from JacobBarthelmeh/client
...
print out PEM of peer cert with example client
2021-12-08 20:04:57 -08:00
Sean Parkinson
32014c69fd
TLS 13 session ticket timeout: fixup checks
...
Check difference between now and ticket seen from encrypted ticket
against timeout.
2021-12-09 12:43:30 +10:00
Sean Parkinson
6da0cc1ced
Merge pull request #4600 from dgarske/cust_oid
...
Support for Custom OID in subject and CSR request extension
2021-12-09 11:24:30 +10:00
Kareem
4200cf1b4d
Fix compiling Iotsafe with C++ by avoiding reserved keyword 'class'.
2021-12-08 17:17:58 -07:00
Kareem
376be0f66a
Fix building with OPENSSL_EXTRA defined and NO_WOLFSSL_STUB not defined.
2021-12-08 16:51:51 -07:00
Anthony Hu
7022eb6f89
Actually do a private/public key check for FALCON.
2021-12-08 18:04:11 -05:00
David Garske
dac0c21989
Merge pull request #4640 from anhu/prevent_stack_corruption
...
Pass in pointer to a local size_t var, not word32 var to prevent stack corruption
2021-12-08 14:44:07 -08:00
Sean Parkinson
cf0d3263ac
Merge pull request #4628 from julek-wolfssl/issue-4623
...
Handle an `EPIPE` error from the socket
2021-12-09 08:08:56 +10:00
Anthony Hu
74442605fa
Pass in pointer to a local size_t var, not word32 var to prevent stack corruption.
2021-12-08 16:01:52 -05:00
Jacob Barthelmeh
ad078a7358
adjust macro guard in example client
2021-12-08 13:45:37 -07:00
Jacob Barthelmeh
0446d93285
add deterministic k variant for ECC to enable all
2021-12-08 10:49:17 -07:00
Jacob Barthelmeh
dfce101b5b
deterministic ECC sign edge case fix and add variant
2021-12-08 09:54:47 -07:00
Chris Conlon
dd0e1226b7
Merge pull request #4638 from miyazakh/sce_protect_iar_compiler
2021-12-08 09:50:16 -07:00
Hideki Miyazaki
081d28f556
better handling for global index
...
fix function proto type definition
2021-12-08 11:42:23 +09:00
Sean Parkinson
3b65a4876f
SP C RSA: normalize tmpa after conditionally adding p
...
Numbers in a word get too big for fast mul implementation when not
normalized.
Only affects RSA keys where p < q.
2021-12-08 11:25:20 +10:00
Jacob Barthelmeh
9a07b3af9b
print out PEM of peer cert with example client
2021-12-07 14:07:47 -07:00
Kaleb Himes
8609d98122
Merge pull request #4635 from julek-wolfssl/PrintPubKeyEC-wrong-free
...
Return early on failed `key` init
2021-12-07 13:28:53 -07:00
Juliusz Sosinowicz
223f25149b
Return early on failed key init
2021-12-07 18:11:19 +01:00
Kaleb Himes
96daf2bede
Merge pull request #4632 from julek-wolfssl/PrintPubKeyEC-leak
...
`a` and `key` were not being freed => leak in `PrintPubKeyEC`
2021-12-07 07:20:05 -07:00
Daniele Lacamera
1cb8b34fba
IoT-SAFE: minor fixes + doxygen for new API calls
2021-12-07 14:11:14 +01:00
Daniele Lacamera
9e73c324a4
iot-safe: Fixed debug printf, updated slot number for 16-bit demo
2021-12-07 14:11:14 +01:00
Daniele Lacamera
23982e4fb3
Fixed wolfIoT_ecc_keygen when key is stored during generation
2021-12-07 14:11:14 +01:00
Daniele Lacamera
b23d51ab78
Avoid looping on uart read after applet initialization fails
2021-12-07 14:11:14 +01:00
Daniele Lacamera
5da89c6275
Clear meaning for the return value of iotsafe_gen_keypair
2021-12-07 14:11:14 +01:00
Kareem
4d483b0a28
iotsafe: allow init to continue with empty response
2021-12-07 14:11:13 +01:00
Daniele Lacamera
29e20eeadc
Fix to rebase branch on current master
2021-12-07 14:11:13 +01:00
Daniele Lacamera
e551f439f4
Reworked expect_tok to fix NULL dereferences
2021-12-07 14:11:13 +01:00
Daniele Lacamera
0c0f36d67d
IoT-SAFE: Minor fixes
...
- reverted length change in put public operation
- Loading CA from IoT-SAFE file slot in 16bit demo
2021-12-07 14:11:13 +01:00
Daniele Lacamera
2646747f2a
Fixed 8bit variable overflow/useless code
2021-12-07 14:11:13 +01:00
Daniele Lacamera
0621ba061b
Multiple fixes for IoT-SAFE
...
- Tested with a different SIM:
- 16bit IDs
- Directly retrieving public key from keygen function
- larger response buffers (up to 256 bytes in ReadFile)
- Fixed hardcoded length in ID buffers
2021-12-07 14:11:13 +01:00
Daniele Lacamera
2f17a7e626
Support longer-than-8bit IDs for IoTSAFE key/file slots
2021-12-07 14:11:13 +01:00
Juliusz Sosinowicz
574d171357
Fix leak when mp_int = 0 in integer.c
2021-12-07 12:46:24 +01:00
Sean Parkinson
85ec6054c6
TLS13: Skip if expired rather than turning off resuming
2021-12-07 13:58:38 +10:00
Sean Parkinson
9f6aa36866
Merge pull request #4629 from dgarske/zd13337
...
Additional checking for side on TLS messages
2021-12-07 10:13:44 +10:00
David Garske
e1b7363647
Fixes from peer review.
2021-12-06 16:12:07 -08:00
John Safranek
261d305b32
Merge pull request #4627 from cconlon/fipsOsSeed
2021-12-06 16:06:46 -08:00
Sean Parkinson
d5c27fca7d
Merge pull request #4626 from JacobBarthelmeh/certs
...
add human readable string of IP
2021-12-07 08:23:31 +10:00
David Garske
579056a2f3
Subject raw should be populated with WOLFSSL_CERT_EXT.
2021-12-06 14:19:32 -08:00
Chris Conlon
e45c33a771
Merge pull request #4624 from miyazakh/jenkins_qt_failure
2021-12-06 09:53:34 -07:00
David Garske
5107f6b752
Merge pull request #4630 from douzzer/20211204-nits
...
20211204 nits
2021-12-06 08:24:17 -08:00
Juliusz Sosinowicz
96b8b11fba
a and key were not being freed => leak in PrintPubKeyEC
2021-12-06 12:03:02 +01:00
Daniel Pouzzner
30b68060fb
configure.ac: fix whitespace; client.c: make gcc 5.4.0 -Wmaybe-uninitialized happy.
2021-12-04 00:57:49 -06:00
David Garske
54c3e0ac73
Additional checking for side on TLS messages. ZD13337
2021-12-03 11:49:08 -08:00
Juliusz Sosinowicz
e4bd5d9046
Handle an EPIPE error from the socket
...
Issue reported in https://github.com/wolfSSL/wolfssl/issues/4623
2021-12-03 17:44:53 +01:00
Chris Conlon
9eabf16ed8
fix redefinition of OS_Seed error with FIPS Ready on some compilers
2021-12-02 17:01:11 -07:00
Jacob Barthelmeh
1ec86ee4cc
add human readable string of IP
2021-12-02 16:04:58 -07:00
David Garske
b4c6140b64
Merge pull request #4442 from julek-wolfssl/kerberos
...
Add Kerberos 5 support
2021-12-02 09:07:34 -08:00
Daniele Lacamera
baee7bace4
Merge pull request #4584 from ethanlooney/nxp_se050_curve25519
...
Added curve25519 support for NXP SE050
2021-12-02 02:47:36 -08:00
Hideki Miyazaki
a5bd6cde8d
fix nigtly jenkins Qt Job failure
2021-12-02 16:37:48 +09:00
David Garske
48b15b0dfb
Merge pull request #4616 from SparkiDev/sp_int_mips32
...
SP math all: MIPS asm fix
2021-12-01 16:16:14 -08:00
David Garske
9f611e8b80
Merge pull request #4589 from JacobBarthelmeh/native-lwip
...
Native LwIP support update
2021-12-01 10:37:13 -08:00
David Garske
5c172ca955
Merge pull request #4622 from douzzer/fix-wolfsentry-build
...
wolfsentry fixes re HAVE_EX_DATA and wolfsentry_sockaddr
2021-12-01 08:16:07 -08:00
Sean Parkinson
d06ada2ccc
Merge pull request #4610 from julek-wolfssl/nginx-1.21.4
...
Add support for Nginx 1.21.4
2021-12-01 22:27:12 +10:00
Juliusz Sosinowicz
aac1b406df
Add support for Nginx 1.21.4
...
- Add KEYGEN to Nginx config
- Check for name length in `wolfSSL_X509_get_subject_name`
- Refactor `wolfSSL_CONF_cmd`
- Implement `wolfSSL_CONF_cmd_value_type`
- Don't forecfully overwrite side
- `issuerName` should be `NULL` since the name is empty
2021-12-01 09:49:52 +01:00
Daniel Pouzzner
32db20143c
wolfssl/test.h: fix --enable-wolfsentry CFLAGS=-pedantic.
2021-11-30 23:40:30 -06:00
Daniel Pouzzner
3f65916f3a
HAVE_EX_DATA: fix wolfssl/ssl.h and tests/api.c to build -DHAVE_EX_DATA but -UOPENSSL_EXTRA.
2021-11-30 23:39:16 -06:00
Hayden Roche
7b5b4015f6
Merge pull request #4621 from dgarske/zd13303
2021-11-30 21:04:41 -06:00
JacobBarthelmeh
43ac0d3684
adjust test file for pritnf and test_pass
2021-11-30 16:41:02 -07:00
JacobBarthelmeh
b69a1c860c
Merge pull request #3996 from cconlon/pkcs7_detachedhash
...
adjust PKCS7_VerifySignedData to correctly verify precomputed content hash with detached signature
2021-11-30 12:46:46 -08:00
David Garske
a0300f7ab0
Fixes for ECDSA_Size. If group is unknown set to -1, otherwise defaults to first ECC index. Fix the signature size calculation to use our existing enum and calculation logic. ZD13303
2021-11-30 12:33:49 -08:00
David Garske
1e74c6f38d
Merge pull request #4620 from JacobBarthelmeh/Testing
...
do not load example CA if not verifying peer
2021-11-30 12:17:58 -08:00
David Garske
29517fd617
Merge pull request #4609 from danielinux/tls13_hkdf_callback
...
TLS 1.3: Add HKDF extract callback
2021-11-30 10:59:44 -08:00
David Garske
6d4c067b72
Merge pull request #4607 from anhu/wolfcrypt_pq_benchmarks
...
Use wolfCrypt's benchmarking app to run the PQ algorithms.
2021-11-30 10:09:48 -08:00
Jacob Barthelmeh
0340b49ff9
do not load example CA if not verifying peer
2021-11-30 10:44:05 -07:00
David Garske
d32f26de64
Merge pull request #4619 from kojo1/early_data
...
OpneSSL compat for SSL_read/write_early_data
2021-11-30 08:36:14 -08:00
David Garske
d3d73f7a4e
Merge pull request #4614 from SparkiDev/sp_exp_nct
...
SP math all: fix exponent bit count
2021-11-30 08:26:41 -08:00
David Garske
37df78b082
Merge pull request #4615 from SparkiDev/mp_mulx
...
TFM: fix Intel MULX multiply
2021-11-30 08:26:17 -08:00
David Garske
5a55baddad
Merge pull request #4617 from SparkiDev/ecc_point_on_curve
...
ECC wc_ecc_point_is_on_curve: validate oridinates against prime
2021-11-30 08:25:47 -08:00
David Garske
7a41089b12
Merge pull request #4618 from douzzer/wc-port-h-linuxkm-XSNPRINTF-XATOI
...
linuxkm wc_port.h macro scoping fix
2021-11-30 08:25:06 -08:00
David Garske
78f4c84ee0
Merge pull request #4586 from SparkiDev/sp_gen_ecc_order
...
SP: fix range of k to be 1..n-1
2021-11-30 08:23:46 -08:00
Daniele Lacamera
c3b1d9f9e7
Cosmetic and prototypes changes after reviewer's comments
2021-11-30 10:06:54 +01:00
Takashi Kojo
6af38a9f5b
OpneSSL compat for SSL_read/write_early_data
2021-11-30 17:38:01 +09:00
Daniel Pouzzner
a33ae21801
whitespace cleanups and portability/pedantic fixes
2021-11-29 23:58:39 -06:00
Daniel Pouzzner
5fbdd2a2c0
wc_port.h: for linuxkm, move definitions of XSNPRINTF and XATOI macros outside the defined(BUILDING_WOLFSSL) gate, to prevent inclusion of stdio.h and stdlib.h from types.h when building application code.
2021-11-29 23:23:23 -06:00
Sean Parkinson
567cd155ea
ECC wc_ecc_point_is_on_curve: validate oridinates against prime
2021-11-30 14:17:41 +10:00
Sean Parkinson
a7d538a82f
SP math all: MIPS asm fix
...
Names $lo and $hi in register list are not supported with old GCC
compiler. Newer compiler also supports %lo and %hi.
2021-11-30 12:56:08 +10:00
Sean Parkinson
9f6fd6abf9
TFM: fix Intel MULX multiply
...
Carry wasn't being handled properly.
2021-11-30 12:07:44 +10:00
Sean Parkinson
e5e280b175
SP math all: fix exponent bit count
...
Only when using non-constant time implementation and modulus even.
2021-11-30 10:28:42 +10:00
Sean Parkinson
a3d46bee32
SP math all: div handling of length of dividend
...
Fail when dividend is maximum size as we may be shifting left and
overflow when divisor is not on a word boundary.
2021-11-30 09:46:11 +10:00
Jacob Barthelmeh
f7c34d22e6
add calls to user callback and adjust formating
2021-11-29 15:56:00 -07:00
Chris Conlon
7221e06ff7
Merge pull request #4588 from miyazakh/sce_protect_mode_e2studio
2021-11-29 15:32:48 -07:00
Chris Conlon
9e2e0c06dc
Merge pull request #4608 from miyazakh/esp_idf
...
Fix compile error on the latest ESP-IDF
2021-11-29 14:13:13 -07:00
David Garske
80c16745c4
Merge pull request #4602 from embhorn/zd13296
...
Initialize global in TSIP port
2021-11-29 13:01:03 -08:00
Anthony Hu
8a2945fe66
More braces.
2021-11-29 15:56:44 -05:00
Anthony Hu
5aa8bc2983
Drop a brace.
2021-11-29 15:47:53 -05:00
David Garske
c104ab2206
Merge pull request #4572 from SparkiDev/ecc_pub_decode
...
mp_sqrt: TonelliShanks algorithm doesn't handle zero
2021-11-29 12:27:36 -08:00
David Garske
c78256702d
Merge pull request #4604 from tmael/fix_cc_ecc
...
Fix Cryptocell ecc build
2021-11-29 11:01:33 -08:00
Daniele Lacamera
57fb5453cb
Support for HKDF Extract callback
2021-11-29 14:51:13 +01:00
Hideki Miyazaki
f6893789b9
add dummy_test_paths.h to include.am
2021-11-27 14:34:23 +09:00
Hideki Miyazaki
a25c338007
fix build failures
...
update README to follow the latest ESP-IDF
2021-11-27 13:14:36 +09:00
Anthony Hu
fea438d07f
Use wolfCrypt's benchmarking app to run the PQ algorithms.
2021-11-26 15:15:23 -05:00
Hideki Miyazaki
fb4e39f00a
addressed review comments prt1
2021-11-26 16:03:42 +09:00
Tesfa Mael
b2c0bacb06
Fix Cryptocell ecc
2021-11-24 19:22:40 -08:00
kareem-wolfssl
ae0cefc48d
Merge pull request #4603 from anhu/stop_OPENSSLEXTRA
...
Stop needlessly enabling ENABLED_OPENSSLEXTRA when enabling liboqs.
2021-11-24 13:46:31 -07:00
Anthony Hu
ffe7a84e3d
Stop needlessly enabling ENABLED_OPENSSLEXTRA when enabling liboqs.
2021-11-24 14:09:19 -05:00
Eric Blankenhorn
6d7e50d2ae
Initialize global in TSIP port
2021-11-24 09:22:14 -06:00
David Garske
be870e742d
Edge case build fixes (cert gen only).
2021-11-23 15:12:48 -08:00
David Garske
7396a0cb3a
Resolves all peer review comments. Fixes to get Curve25519 working on real hardware. Regression testing fixes for ECC.
2021-11-23 15:03:53 -08:00
David Garske
7524ededd3
Support for Custom OID in subject and CSR request extension:
...
* Adds new build option `WOLFSSL_CUSTOM_OID` for supplying a custom OID in a CSR
* Fixes in ASN template CSR generation.
* Fix to allow calling `wc_Ed25519PublicKeyToDer` and `wc_Ed448PublicKeyToDer` with NULL output buffer to get length only.
* Refactor of the certificate subject name encoding.
* Refactor of the OID's to consolidate.
* Improvements to the Domain Component API unit test.
ZD 12943
2021-11-23 09:51:13 -08:00
David Garske
dcc2a2852c
Merge pull request #4590 from JacobBarthelmeh/fuzzing
...
sanity check on pem size
2021-11-22 16:09:13 -08:00
David Garske
f5239cc57e
Merge pull request #4597 from cconlon/removeSwig
...
Remove swig wrapper
2021-11-22 15:31:40 -08:00
David Garske
23e722be27
Merge pull request #4595 from masap/fix-linuxkm
...
Fix failure of make distclean when linuxkm is enabled
2021-11-22 12:01:21 -08:00
Chris Conlon
84be329ffb
remove swig wrapper, now that we have dedicated Java and Python wrappers
2021-11-22 11:32:37 -07:00
Hideki Miyazaki
89ed811e23
fix compile error when disabled SCEPROTECT
2021-11-22 21:36:02 +09:00
Juliusz Sosinowicz
0de4136ad6
Rebase fixes
2021-11-22 13:10:55 +01:00
Juliusz Sosinowicz
5fc2dadde1
Fix issue in wolfSSL_BN_rand_range causing random errors
2021-11-22 11:48:31 +01:00
Juliusz Sosinowicz
1d7b2de074
Code review changes
2021-11-22 11:48:31 +01:00
Juliusz Sosinowicz
3da810cb1b
Implement OpenSSL API's
...
- `OBJ_DUP`
- `i2d_PKCS7`
- `BN_rshift1
- `BN_rshift` testing
- Add `--enable-krb`
2021-11-22 11:47:58 +01:00
Juliusz Sosinowicz
e7c5f137be
Implement BN_rand_range
2021-11-22 11:45:27 +01:00
Juliusz Sosinowicz
82a9f74476
Compat updates
...
- implement `wolfSSL_PEM_X509_INFO_read`
- `wolfSSL_EVP_CipherUpdate` no-ops on `NULL` input
- add md4 support to `wolfSSL_EVP_MD_block_size` and `wolfSSL_EVP_MD_size`
2021-11-22 11:45:27 +01:00
Juliusz Sosinowicz
ccbe184434
Implement CTS
...
Ciphertext stealing on top of CBC is implemented with `wolfSSL_CRYPTO_cts128_encrypt` and `wolfSSL_CRYPTO_cts128_decrypt` APIs
2021-11-22 11:45:27 +01:00
Juliusz Sosinowicz
fa662c2ab1
AES_cbc_encrypt enc parameter flipped. 1 = encrypt 0 = decrypt
...
This change makes the `enc` parameter of `AES_cbc_encrypt` consistent with OpenSSL. This commit flips the meaning of this parameter now.
2021-11-22 11:45:27 +01:00
Masashi Honma
ace5d444a4
Fix failure of make distclean when linuxkm is enabled
...
$ make distclean
Making distclean in linuxkm
make[1]: Entering directory '/home/honma/git/wolfssl/linuxkm'
make[1]: *** No rule to make target 'distclean'. Stop.
make[1]: Leaving directory '/home/honma/git/wolfssl/linuxkm'
make: *** [Makefile:6431: distclean-recursive] Error 1
Signed-off-by: Masashi Honma <masashi.honma@gmail.com >
2021-11-22 05:50:38 +09:00
Masashi Honma
30a01a0758
Fix failure of check at commiting when linuxkm is enabled
...
Making check in linuxkm
make[2]: Entering directory '/home/honma/git/wolfssl/linuxkm'
make[2]: warning: -j13 forced in submake: resetting jobserver mode.
make[2]: *** No rule to make target 'check'. Stop.
make[2]: Leaving directory '/home/honma/git/wolfssl/linuxkm'
make[1]: *** [Makefile:6431: check-recursive] Error 1
make[1]: Leaving directory '/home/honma/git/wolfssl'
make: *** [Makefile:6901: check] Error 2
Signed-off-by: Masashi Honma <masashi.honma@gmail.com >
2021-11-22 05:50:38 +09:00
Hideki Miyazaki
82eb23b300
addressed jenkins failures
2021-11-20 10:15:57 +09:00
David Garske
5182e2a8c8
Merge pull request #4580 from kareem-wolfssl/minor_fixes
...
Check ssl->arrays in SendClientHello to avoid null dereference. Allow building with fallthrough defined.
2021-11-19 16:55:01 -08:00
Hideki Miyazaki
d00c7641ae
addressed jenkins failure
2021-11-20 09:14:21 +09:00
David Garske
f6c48bf7dc
Merge pull request #4560 from kaleb-himes/OE30-OE31-non-fips-changes
...
OE30 and OE31 changes external to FIPS module for NetBSD builds
2021-11-19 15:49:30 -08:00
David Garske
34346bab4f
Merge pull request #4579 from JacobBarthelmeh/PKCS7
...
BER size adjustment with PKCS7
2021-11-19 14:49:03 -08:00
Kareem
8de281c1d4
Fix minimum clang version for FALL_THROUGH. Not working properly before clang 11.
2021-11-19 15:16:56 -07:00
David Garske
617668b9aa
Merge pull request #4585 from kareem-wolfssl/encryptMacFix
...
Fix building Import/ExportOptions with HAVE_ENCRYPT_THEN_MAC undefined.
2021-11-19 13:45:16 -08:00
Kareem
fd6d479888
Rework ssl and ssl->arrays NULL checks, and add to SendTls13ClientHello as well.
2021-11-19 14:19:27 -07:00
Kareem
72d4dcce0f
Fix updated FALL_THROUGH macro. Fix a couple of case statements and remove a trailing whitespace.
2021-11-19 14:13:02 -07:00
Kareem
0772635972
Rework FALL_THROUGH definition to use fallthrough if defined.
2021-11-19 14:06:54 -07:00
Kareem
930e1ac473
Check ssl->arrays in SendClientHello to avoid null dereference. Allow building with fallthrough defined.
2021-11-19 14:06:54 -07:00
Jacob Barthelmeh
5d49847147
sanity check on pem size
2021-11-19 13:55:03 -07:00
Chris Conlon
c3500fa24e
Merge pull request #4581 from miyazakh/max_earlydata
...
add get_max_eraly_data
2021-11-19 09:42:01 -07:00
Sean Parkinson
5a72fee3df
Disable algorithms: fixes
...
WOLFSSL_PUBLIC_MP and disable algorithms didn't work because of api.c.
- mp_cond_copy not available unless ECC compiled in
- wc_export_int not available unless ECC compiled in
Enabling only DH and using SP with SP Math didn't work as the DH
parameters were too small.
sp_cmp is needed when only DH.
mp_set_int is was not available in SP math when RSA is not defined.
mp_set is close enough for the use cases.
Configure with SP and SP math but not RSA, DH and ECC didn't configure -
now default to small maths.
2021-11-19 16:56:33 +10:00
Hideki Miyazaki
9a331d7072
update Readme
2021-11-19 15:35:06 +09:00
JacobBarthelmeh
7e2fab6f4a
warning with keil build and native lwip want read case
2021-11-18 22:58:50 -07:00
Hideki Miyazaki
c84194ffc8
include renesas_cmn.h to am file
2021-11-19 14:44:45 +09:00
Hideki Miyazaki
f50fcd918e
support Renesas RA SCE protect mode on RA6M4 evaluation board
2021-11-19 14:22:16 +09:00
Sean Parkinson
7e81372131
Merge pull request #4583 from dgarske/zd13242
...
Improve `ret` handling in the `ProcessPeerCerts` verify step.
2021-11-19 10:22:08 +10:00
Sean Parkinson
af097401f2
SP: fix range of k to be 1..n-1
...
Was checking less than order - 2 then adding one.
i.e. 0..order-3 => 1..order-2
2021-11-19 09:40:26 +10:00
Kareem
757f3b8105
Fix building Import/ExportOptions with HAVE_ENCRYPT_THEN_MAC undefined.
2021-11-18 16:06:22 -07:00
David Garske
3054f20c6a
Improve ret handling in the ProcessPeerCerts verify step.
2021-11-18 14:51:09 -08:00
David Garske
2841b5c93b
Merge pull request #3010 from kaleb-himes/ZD10203
...
Consistency in PP checking on use of WOLFSSL_CRYPTO_EX_DATA
2021-11-18 14:47:25 -08:00
Hideki Miyazaki
9bc159a5ec
addressed review comment
2021-11-19 07:24:46 +09:00
kaleb-himes
4324cf8f0a
Correct cast from uint to uchar
2021-11-18 10:18:25 -07:00
Ethan
5a85d63543
Added curve25519 support for NXP SE050
...
Reverted commented out lines from se050_port.h
2021-11-18 09:23:59 -07:00
David Garske
e33156d0dc
Merge pull request #4578 from kaleb-himes/OE33_NON_FIPS_CHANGES
...
OE33: Fix issues found by XCODE and add user_settings.h
2021-11-18 06:59:43 -08:00
David Garske
d02e819e4c
Merge pull request #4575 from SparkiDev/dh_enc_fix_2
...
ASN: DH private key encoding
2021-11-18 06:57:40 -08:00
Sean Parkinson
618b9619c5
Merge pull request #4571 from anhu/init_sig_algs
...
Uninitialized var.
2021-11-18 22:46:37 +10:00
Sean Parkinson
db3c0f7829
Merge pull request #4574 from masap/fix-asn1-integer-get
...
Fix invalid return value of ASN1_INTEGER_get()
2021-11-18 17:20:15 +10:00
Hideki Miyazaki
483be08b1f
add definition for early_data_status compat
2021-11-18 14:21:47 +09:00
Daniel Pouzzner
6ba00f66cd
Merge pull request #4573 from ejohnstown/fips-check-fix
...
Fix FIPS Check Script
2021-11-17 21:30:45 -06:00
JacobBarthelmeh
b42a0d9712
native lwip update
2021-11-17 17:36:44 -07:00
Hideki Miyazaki
7da0d524ff
add get_max_eraly_data
...
support set/get_max_eraly_data compatibility layer
2021-11-18 09:07:32 +09:00
Sean Parkinson
370570d19b
ASN: DH private key encoding
...
Proper fix for sequence length when small keys.
2021-11-18 08:28:49 +10:00
Masashi Honma
4800db1f9d
Enable max/min int test even when non 64bit platform
...
Signed-off-by: Masashi Honma <masashi.honma@gmail.com >
2021-11-18 06:58:21 +09:00
Masashi Honma
cb3fc0c7ce
Fix invalid return value of ASN1_INTEGER_get()
...
When DIGIT_BIT is less than SIZEOF_LONG * CHAR_BIT, ASN1_INTEGER_get() can
return invalid value. For example, with trailing program, ASN1_INTEGER_get()
unexpectedly returns -268435449 (0xf0000007) on i386.
On the i386 platform (DIGIT_BIT=28), the input value 0x7fffffff is separated
into 0xfffffff and 0x7 and stored in the dp array of mp_int. Previously,
wolfSSL_BN_get_word_1() returned 0xfffffff shifted by 28 bits plus 0x7, so this
patch fixed it to return 0xfffffff plus 0x7 shifted by 28 bits.
int main(void)
{
ASN1_INTEGER *a;
long val;
int ret;
a = ASN1_INTEGER_new();
val = 0x7fffffff;
ret = ASN1_INTEGER_set(a, val);
if (ret != 1) {
printf("ret=%d\n", ret);
}
if (ASN1_INTEGER_get(a) != val) {
printf("ASN1_INTEGER_get=%ld\n", ASN1_INTEGER_get(a));
}
ASN1_INTEGER_free(a);
return 0;
}
Signed-off-by: Masashi Honma <masashi.honma@gmail.com >
2021-11-18 06:58:21 +09:00
Anthony Hu
ab0654bb64
remove something that slipped in
2021-11-17 16:38:30 -05:00
Anthony Hu
39edf8d206
pulled up a line.
2021-11-17 16:38:30 -05:00
Anthony Hu
49c7abb875
Changes suggested by SparkiDev.
2021-11-17 16:38:30 -05:00
Anthony Hu
5c48e74c7f
0xFF
2021-11-17 16:38:30 -05:00
Anthony Hu
0ae0b31509
The following config:
...
./configure --with-liboqs --enable-all --disable-psk --enable-intelasm --enable-aesni --enable-sp-math-all --enable-sp-asm CFLAGS="-O3"
Yeilds the following erorr:
src/internal.c: In function ‘DoServerKeyExchange’:
src/internal.c:24487:28: error: ‘sigAlgo’ may be used uninitialized in this function [-Werror=maybe-uninitialized]
24487 | if (sigAlgo == ed448_sa_algo &&
| ^
This fixes it.
2021-11-17 16:38:30 -05:00
kaleb-himes
38ec0bb31f
Merge branch 'master' of github.com:wolfssl/wolfssl into OE33_NON_FIPS_CHANGES
2021-11-17 14:02:56 -07:00
David Garske
995ef60ff1
Merge pull request #4577 from kaleb-himes/WINDOWS_AES_OFB_ON
...
Turn on AES-OFB mode in windows for FIPS=v5
2021-11-17 12:20:19 -08:00
kaleb-himes
37db5a9ab3
Add include.am(s) for new file(s)
2021-11-17 12:05:05 -07:00
Jacob Barthelmeh
ddf06b8161
BER size adjustment with PKCS7
2021-11-17 12:03:32 -07:00
kaleb-himes
f638df3575
Fix issues found by XCODE and add user_settings.h
...
Disable internal test settings by default
2021-11-17 11:00:56 -07:00
John Safranek
ef62fab4ea
Update
...
1. WIN10 FIPS build should use version 5,2 now.
2. Update the v5-ready build ot use version 5,2.
3. Remove eol-whitespace from the benchmark source.
2021-11-17 09:19:34 -08:00
Kaleb Himes
c7c682ba2a
Move up to avoid breaking the patch applied for windows
2021-11-17 09:37:26 -07:00
kaleb-himes
dc6ec2b849
Turn on AES-OFB mode in windows for FIPS=v5
2021-11-17 09:22:58 -07:00
John Safranek
158ebcaa0a
Add v5-RC10 to the list of allowed versions
2021-11-16 16:36:38 -08:00
Sean Parkinson
a5e581506e
Merge pull request #4570 from dgarske/android_keystore
...
Fixes for building wolfSSL with Android WPA Supplicant and KeyStore
2021-11-17 08:30:01 +10:00
David Garske
e8e0bc0d49
Merge pull request #4552 from SparkiDev/sp_mod_exp_zero
...
SP: mod_exp with exponent of 0 is invalid
2021-11-16 08:29:13 -08:00
David Garske
2b3ab855dd
Fixes for building wolfSSL with Android WPA Supplicant and KeyStore.
2021-11-16 08:27:30 -08:00
Sean Parkinson
33a6b8c779
Merge pull request #4531 from dgarske/cryptocb_aesccm
...
Added crypto callback support for AES CCM
2021-11-16 22:45:11 +10:00
Sean Parkinson
8606788198
SP: mod_exp with exponent of 0 is invalid
...
Don't allow exponenetiation by 0 as it is cryptographically invalid and
not supported by the implementation.
Also check for even modulus in mod_exp.
2021-11-16 11:27:26 +10:00
David Garske
1559e92dca
Add crypto callback AES CCM test case.
2021-11-15 16:22:10 -08:00
Sean Parkinson
d3fc8c229a
mp_sqrt: TonelliShanks algorithm doesn't handle zero
...
(0 * 0) mod p = 0.
Modular reduce n and shortcut when 0.
2021-11-16 09:23:07 +10:00
kaleb-himes
6547bcb44c
Consistency in PP checking on use of WOLFSSL_CRYPTO_EX_DATA
2021-11-11 17:47:17 -07:00
kaleb-himes
6bb86cf4da
OE30 and OE31 changes external to FIPS module for NetBSD builds
2021-11-10 15:16:21 -07:00
Sean Parkinson
ff3179012d
SP: fix when mont_mul_order is defined
...
Customer configuration that failed:
./configure --enable-cryptonly --enable-ecc --enable-sp=yes,asm
--disable-rsa --disable-dh --disable-sha3 --disable-sha224 --disable-md5
--disable-sha --disable-pkcs12 --disable-memory --disable-chacha
--disable-poly1305 --disable-sha512 --disable-sha384 --disable-aesgcm
--disable-aescbc --disable-aes --disable-rng CFLAGS="-DNO_SIG_WRAPPER
-DWOLFSSL_PUBLIC_MP -DECC_USER_CURVES -DNO_ECC_SIGN -DNO_ECC_DHE
-DNO_ECC_KEY_EXPORT"
2021-11-09 17:50:21 +10:00
David Garske
82c106be80
Added crypto callback support for AES CCM.
2021-11-02 09:53:55 -07:00
Chris Conlon
a8b6304e19
add unit test for wc_PKCS7_VerifySignedData_ex() with detached signature and content digest only
2021-10-25 15:52:19 -06:00
Chris Conlon
322cb05852
adjust PKCS7_VerifySignedData to correctly verify precomputed content hash with detached signature
2021-10-25 14:46:10 -06:00