Jacob Barthelmeh
3ce64da44c
ChaCha20-Poly1305 PSK cipher suites
2016-02-04 09:50:29 -07:00
Jacob Barthelmeh
5a9175a758
add cipher suite ECDHE-PSK-AES128-SHA256 and adjustments to ECDHE-PSK
2016-02-04 09:39:34 -07:00
Jacob Barthelmeh
d04a7e802a
add ECDHE-PSK and cipher suite ECDHE-PSK-NULL-SHA256
2016-02-03 13:44:13 -07:00
Jacob Barthelmeh
93c54c07ea
cipher suite ECDHE-ECDSA-NULL-SHA
2016-02-01 14:43:17 -07:00
Jacob Barthelmeh
d0f8132cdc
forcing sensitive memory to be all zeros when done with it
2016-02-01 10:45:09 -07:00
Jacob Barthelmeh
7d71d756f3
update ChaCha20-Poly1305 to most recent RFCs
2016-01-27 14:03:05 -07:00
Moisés Guimarães
10df002ec5
fixes srp build without sha512
2016-01-12 15:42:58 -03:00
toddouska
157486ce0d
fix hint types for misuse of in_buffer and out_buffer
2015-12-29 16:13:09 -08:00
toddouska
22385f2b39
add random ports for all make check scripts, unique ready file
2015-12-22 14:35:34 -08:00
Chris Conlon
d2a80ba1bc
remove extra NULL check in SetTmpDH_buffer/file_wrapper, fix API tests
2015-11-30 10:25:55 -07:00
Chris Conlon
9c6b52876a
add SetTmpDH file/buffer functions to API tests
2015-11-20 13:32:44 -07:00
David Garske
f977caa492
Cleanup of the test code that looks for the WolfSSL root directory. Now it tries to open the certs/ntru-cert.pem file in each directory up (limited to 5) until it opens it.
2015-10-28 23:54:08 -07:00
Jacob Barthelmeh
c132f9887e
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-10-19 13:56:39 -06:00
Jacob Barthelmeh
ee5a11b8d9
Add Intel IPP crypto for RSA
...
add user-crypto makefile
update README for IPP crypto
place user crypto in wolfcrypt and use autotools
adjust distributed files
move openssl compatibility consumption
auto use IPP RSA -- IPP directory containing shared libraries local
return value of wolfSSL_BN and formating of debug
openssh testing
make sure IPP not built when fips is
ipp init to select correct optimizations -- static libraries on linux -- fast-rsa disabled by default
try to only set library once
only use static IPP if fast rsa is enabled
make print out for user crypto more pretty
2015-10-19 13:51:49 -06:00
Ludovic FLAMENT
9ef43910ed
Merge branch 'master' of https://github.com/wolfssl/wolfssl
2015-10-16 07:46:51 +02:00
Ludovic FLAMENT
d4f3419758
ALPN : add function to get in a server the list of supported protocols sent by the client.
2015-10-15 14:59:35 +02:00
Ludovic FLAMENT
10f5154389
ALPN : add option to continue in case of client/server protocol mismatch (like OpenSSL)
2015-10-13 09:38:40 +02:00
Ludovic FLAMENT
bf3b0a228d
add support for Application-Layer Protocol Name (RFC 7301) in the TLS extensions
2015-10-09 15:18:41 +02:00
toddouska
d669fc28c2
add idea benchmark, cleanup
2015-09-23 14:42:48 -07:00
Ludovic FLAMENT
f68400da40
add IDEA cipher (ECB and CBC mode)
...
add support of SSL_RSA_WITH_IDEA_CBC_SHA cipher suite (SSLv3, TLS v1.0 and TLSv1.1)
2015-09-23 16:16:39 +02:00
toddouska
049a4c6460
fix C++ mode warnings
2015-08-17 16:47:39 -07:00
toddouska
46e7e9acf9
disable SSLv3 by default
2015-08-12 16:39:13 -07:00
Moisés Guimarães
12b8445153
adds key generation function callback option.
2015-08-04 13:36:58 -03:00
Moisés Guimarães
53224281d2
adds proof getter and verifier for both sides.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
490d063dec
adds key computation.
...
removes unnecessary fields from the srp struct.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
6ee788277f
adds tests to SrpSetPassword(), SrpSetVerifier(), SrpGetVerifier();
...
adds SrpGenPublic() and SrpSetPrivate() with unit tests;
fixes k with left pad at g;
adds new error SRP_CALL_ORDER_E to force the functions to be called in the right order.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
6d5efccc55
finishes SrpSetPassword(), SrpSetVerifier(), SrpGetVerifier();
...
updates client_proof during SrpSetParams();
2015-08-04 01:07:24 -03:00
Moisés Guimarães
119dd0250e
fixes field types in SRP structure;
...
adds new memory allocation type (DYNAMIC_TYPE_SRP);
improves wc_SrpInit;
adds wc_SrpTerm(), wc_SrpSetUsername(), wc_SrpSetParams(), wc_SrpSetPassword();
2015-08-04 01:07:24 -03:00
Moisés Guimarães
dfa956d227
adds wc_SrpInit() with unit tests.
2015-08-04 01:07:24 -03:00
kaleb-himes
273a0dd4d5
re-format test-psk-no-id.conf add README
2015-08-03 11:04:18 -06:00
toddouska
37ba6aeee7
fix psk no identify hint example logic
2015-08-03 09:32:51 -07:00
kaleb-himes
303fb2bb62
Option for no PSK Id Hint and test cases
...
update comment file reference
2015-07-31 22:00:28 -06:00
Jacob Barthelmeh
e7dd5c4b8f
add setting client cipher list
2015-07-21 16:55:42 -06:00
Jacob Barthelmeh
df8b48cd0f
NTRU suites from earlier code
2015-07-11 12:52:22 -06:00
Jacob Barthelmeh
14723b7e65
QSH (quantum-safe handshake) extension
2015-07-07 09:55:58 -06:00
Moisés Guimarães
ca01cebd28
adds SNI abort option to turn SNI mandatory for WebSocket (RFC6455 page 17).
...
@see WOLFSSL_SNI_ABORT_ON_ABSENCE and the xxxSNI_SetOptions() functions for further details.
2015-07-01 19:21:18 -03:00
John Safranek
d6047736e9
added GPL headers to the unit test driver files
2015-07-01 11:12:54 -07:00
Moisés Guimarães
61c50b26d0
makes wolfSSL_SNI_GetFromBuffer() return SNI_UNSUPPORTED instead of BUFFER_ERROR for SSL v2.0 client hello buffers.
2015-06-25 12:48:11 -03:00
toddouska
86f2b9a98f
turn off DTLSv1 functions for disable old tls
2015-04-08 13:29:25 -07:00
toddouska
9ba62a2c52
allow examples build if no-sha but psk is on
2015-03-28 14:58:17 -07:00
toddouska
f7c99cec3e
obey user ecc choices at TLS layer
2015-03-18 14:12:23 -07:00
toddouska
ac979d49ab
fix sni yassl tests
2015-02-25 20:34:50 -08:00
toddouska
473a120ba2
remove more stale cyassl headers
2015-02-25 13:34:29 -08:00
kaleb-himes
c516c42c9a
reduce footprint size removing compatibility layer where no longer needed
2015-02-17 14:20:10 -07:00
kaleb-himes
878c1889b3
Merge branch 'master' of https://github.com/kaleb-himes/cyassl
2015-01-08 09:40:17 -07:00
kaleb-himes
a389620a29
Copyright (C) updates
2015-01-08 09:39:04 -07:00
Jacob Barthelmeh
0721d575f6
correction on rename of struct
2015-01-07 15:56:02 -07:00
Jacob Barthelmeh
1c4b4a2d1e
ripemd in function call fixed
2015-01-07 15:26:09 -07:00
Jacob Barthelmeh
e3826d26c5
refactor settings_comp to respective .h files
2015-01-07 15:03:54 -07:00
kaleb-himes
7e9c8028b2
more macros, fips test passes
2015-01-07 13:33:10 -07:00
kaleb-himes
639637278d
CYASSL -> WOLFSSL macros
2015-01-07 13:17:57 -07:00
kaleb-himes
ce65bef5a8
enable-fpecc enable-ecc
2015-01-06 13:42:02 -07:00
kaleb-himes
369a5f04a9
library wide licence update
2015-01-06 12:14:15 -07:00
kaleb-himes
0dbdb35222
enable-md4, enable-hkdf, disable-memory
2015-01-06 10:41:47 -07:00
Jacob Barthelmeh
f64d76257e
readjust c files, autoconf, and some header files
2015-01-02 14:56:58 -07:00
kaleb-himes
1c75a6e74f
tests/api.c updated
2014-12-30 12:41:26 -07:00
kaleb-himes
adfa2348ba
cleanup
2014-12-29 17:06:45 -07:00
kaleb-himes
64d06580c1
examples not seeing WOLFSSL_API
2014-12-29 16:30:26 -07:00
kaleb-himes
edf53a1ed0
new changes
2014-12-29 10:27:03 -07:00
Kaleb Himes
53057f0b0d
name changes kaleb push
2014-12-17 10:00:17 -07:00
Moisés Guimarães
513ea4d38a
add SNI_UNSUPPORTED for better handling SSL 3.0 buffers on CyaSSL_SNI_GetFromBuffer()
2014-12-08 17:31:37 -03:00
John Safranek
1742e0ddb6
Merge in the ADH-AES128-SHA changes and add a check for it during the
...
packet order sanity checking.
2014-12-01 11:44:32 -08:00
toddouska
1f8d84553c
add server_ready file to externally monitor example server for ready to accept, -r option
2014-11-26 12:13:47 -08:00
toddouska
6175a2a20c
cleanup fp cache on examples with thread local storage
2014-09-09 10:14:32 -07:00
toddouska
2c595139db
fix tirtos merge
2014-09-08 19:40:03 -07:00
Moisés Guimarães
ffd7dd3555
fix github issue #126
...
api tests refectory with ifdef and prototypes cleaning + use of asserts. Now, if the tests fails, it will point the line error and expected behavior like this:
ERROR - tests/api.c line 715 failed with:
test: server_args.return_code is true
result: server_args.return_code => FALSE
2014-09-04 14:17:55 -03:00
toddouska
a73a160aaf
Merge branch 'master' into ti
2014-07-21 16:26:39 -07:00
JacobBarthelmeh
b77a1fdbbb
refactoring
2014-07-17 15:00:40 -06:00
JacobBarthelmeh
5b08cb35d7
updated sequence number in AD and unit tests
2014-07-14 16:13:24 -06:00
JacobBarthelmeh
4250955003
arg error checking and CHACHA_AEAD_TEST update
2014-07-11 16:06:29 -06:00
JacobBarthelmeh
c322cb05ad
uses most recent version of cyassl
2014-07-10 11:18:49 -06:00
toddouska
61e989ed99
Merge branch 'master' into ti
2014-07-03 11:34:15 -07:00
toddouska
2d63c559cc
dh now disabled by default but can be enabled w/o opensslextra
2014-07-03 11:32:24 -07:00
toddouska
00abb2d90e
Merge branch 'master' into ti
2014-06-17 09:17:17 -07:00
Moisés Guimarães
8eae068000
fix error codes checking to use enum value from error-ssl.h
2014-06-16 17:57:47 -03:00
toddouska
9a180b0ec8
Merge branch 'master' into ti
2014-06-16 11:05:20 -07:00
Moisés Guimarães
a3687a200a
fix tests based on Wolfcrypt error codes.
2014-06-13 15:30:30 -03:00
toddouska
e30e1c40f7
Merge branch 'master' into ti
2014-06-11 11:57:11 -07:00
toddouska
aad204428f
fips mode hmac min key length for 2014 requirements
2014-06-11 11:43:17 -07:00
toddouska
8237319d80
merge with master
2014-06-10 15:19:45 -07:00
Moisés Guimarães
9c905b6519
fix on TLSX_SNI_GetFromBuffer - > should be >= so extensions of length 0 get inside the while.
...
added test to cover case.
2014-06-10 16:56:45 -03:00
Moisés Guimarães
ba36c24fc1
fix on TLSX_SNI_GetFromBuffer - undo last fix and return 0 when there is no SNI extension. Now the return is the same when there is no extensions at all.
2014-06-10 15:28:29 -03:00
Moisés Guimarães
064483035c
fix on TLSX_SNI_GetFromBuffer - set inOutSz value to zero when there is no SNI extension in the client hello buffer.
2014-06-09 17:31:32 -03:00
toddouska
a920795665
Merge branch 'master' into ti
2014-05-30 16:57:15 -07:00
John Safranek
b60a61fa94
DHE-PSK cipher suites
...
1. fixed the AES-CCM-16 suites
2. added DHE-PSK as a key-exchange algorithm type
3. Added infrastructure for new suites:
* TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
* TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
* TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
* TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
* TLS_DHE_PSK_WITH_NULL_SHA256
* TLS_DHE_PSK_WITH_NULL_SHA384
* TLS_DHE_PSK_WITH_AES_128_CCM
* TLS_DHE_PSK_WITH_AES_256_CCM
4. added test cases for new suites
5. set DHE parameters on test server when using PSK and a custom cipher
suite list
6. updated half premaster key size
2014-05-30 11:26:48 -07:00
toddouska
e373b083bf
Merge branch 'master' into ti
2014-05-20 14:33:14 -07:00
John Safranek
74712b4e71
1. Added the following cipher suites:
...
* TLS_PSK_WITH_AES_128_GCM_SHA256
* TLS_PSK_WITH_AES_256_GCM_SHA384
* TLS_PSK_WITH_AES_256_CBC_SHA384
* TLS_PSK_WITH_NULL_SHA384
2. Fixed CyaSSL_CIPHER_get_name() for AES-CCM cipher suites.
2014-05-19 21:44:04 -07:00
toddouska
34f2e51415
remove extra spaces from ti cyassl proper files
2014-05-09 11:55:59 -07:00
Vikram Adiga
f643ca5f48
Added TI-RTOS support for CyaSSL tests
2014-05-08 15:52:20 -07:00
Moisés Guimarães
32e2d7016f
SHA256, SHA384 and SHA512 error propagation. Major impact on Hmac functions with error propagation.
2014-04-14 21:36:04 -03:00
Moisés Guimarães
45f9f3cdc2
SHA256, SHA384 and SHA512 error verification on test files.
2014-04-14 21:28:22 -03:00
Chris Conlon
be65f5d518
update FSF address, wolfSSL copyright
2014-04-11 15:58:58 -06:00
toddouska
05b132ce1c
HMAC fips mode
2014-03-27 15:43:54 -07:00
toddouska
7dd265cf2e
SHA384 fips mode
2014-03-27 14:37:37 -07:00
toddouska
e873d7998b
SHA512 fips mode
2014-03-27 14:03:12 -07:00
toddouska
d5be4c4663
SHA-256 fips mode
2014-03-25 17:11:15 -07:00
toddouska
3607db9077
add SHA1 fips mode
2014-03-25 16:01:17 -07:00
John Safranek
ceb4a8f568
port 0 hack for the API unit test
2014-03-09 15:08:18 -07:00
John Safranek
18f60966f4
force make tests to run serially
2014-03-06 21:34:33 -08:00
toddouska
1fd6245600
fix all clang warnings except Wpadded (diagnostic), Wconversion which inludes Wsign-conversion (implicit conversions part of standard)
2014-03-03 13:27:52 -08:00