David Garske
5b3a72d482
Cleanup of stdlib function calls in the wolfSSL library to use our cross-platform "X*" style macros in types.h.
2016-06-29 11:11:25 -07:00
toddouska
ac6635593b
Revert "Bio"
2016-06-27 10:53:34 -07:00
Jacob Barthelmeh
f6bbe845f5
Merge https://github.com/wolfSSL/wolfssl into bio
2016-06-22 09:14:53 -06:00
Jacob Barthelmeh
ea71814518
Merge https://github.com/wolfSSL/wolfssl
2016-06-17 13:58:53 -06:00
John Safranek
2f9c9b9a22
Add cipher suite ECDHE-ECDSA-AES128-CCM
...
1. Added the usual cipher suite changes for the new suite.
2. Added a build option, WOLFSSL_ALT_TEST_STRINGS, for testing
against GnuTLS. It wants to receive strings with newlines.
3. Updated the test configs for the new suite.
Tested against GnuTLS's client and server using the options:
$ gnutls-cli --priority "NONE:+VERS-TLS-ALL:+AEAD:+ECDHE-ECDSA:+AES-128-CCM:+SIGN-ALL:+COMP-NULL:+CURVE-ALL:+CTYPE-X509" --x509cafile=./certs/server-ecc.pem --no-ca-verification -p 11111 localhost
$ gnutls-serv --echo --x509keyfile=./certs/ecc-key.pem --x509certfile=./certs/server-ecc.pem --port=11111 -a --priority "NONE:+VERS-TLS-ALL:+AEAD:+ECDHE-ECDSA:+AES-128-CCM:+SIGN-ALL:+COMP-NULL:+CURVE-ALL:+CTYPE-X509"
To talk to GnuTLS, wolfSSL also needed the supported curves option
enabled.
2016-06-13 14:39:41 -07:00
Jacob Barthelmeh
8be5409bc5
static method func / ocsp callbacks / heap test / alpn free func / remove timing resistant constraint
2016-06-09 11:36:31 -06:00
Jacob Barthelmeh
2feee8856e
revise static memory and update heap hint
2016-06-04 19:03:48 -06:00
Ludovic FLAMENT
5d67bb881e
fix memory leaks
2016-05-25 17:44:31 +02:00
Ludovic FLAMENT
99b5aa587f
Fix errors (jenkins)
2016-05-23 11:11:57 +02:00
Ludovic FLAMENT
ed4f67058a
Merge branch 'master' of https://github.com/wolfssl/wolfssl
2016-05-20 21:51:13 +02:00
toddouska
b8c0802e3c
Merge pull request #414 from JacobBarthelmeh/DTLS-MultiCore
...
Dtls multi core
2016-05-17 17:39:18 -07:00
Ludovic FLAMENT
9fe6ca3130
remove XSNPRINTF
...
add a full BIO client/server test
2016-05-17 17:49:30 +02:00
Jacob Barthelmeh
1b278edfd0
fix unused functions, make WOLFSSL first parameter, add comments
2016-05-16 23:48:26 -06:00
Ludovic FLAMENT
4017e0f8dd
fix BIO issues :
...
- remove unrequited tests
- fix compilations for lighty, stunned, openssh
- wc_BioGetAcceptSocket IPv4 / IPv6 support
- remove <stdio.h> from bio.h
- add NO_STDIO_FILESYSTEM for BIO_printf
- memset -> XMEMSET
- strlen -> XSTRLEN
2016-05-15 20:22:19 +02:00
Jacob Barthelmeh
c8576566cc
add public wolfSSL_dtls_export and api tests
2016-05-14 12:49:09 -06:00
Jacob Barthelmeh
8c45cb1938
add DTLS session export option
2016-05-10 13:27:45 -06:00
Chris Conlon
8f3e1165a1
add Whitewood netRandom client library support
2016-05-05 15:31:25 -06:00
Ludovic FLAMENT
5d1de3bb33
One file for all BIO functions in wolfcrypt
...
move required functions from wolfssl to wolfcrypt
add client/server tests for BIO
2016-05-05 12:58:21 +02:00
Jacob Barthelmeh
05e56b75f6
scan-build, valgrind issues and fix issue with ExtractDate, struct tm
2016-05-03 09:22:16 -06:00
Jacob Barthelmeh
38bbd41f99
add EDH-RSA-AES256-SHA, used in one mysql test
2016-05-03 09:22:16 -06:00
Jacob Barthelmeh
f19541ffe5
update to MYSQL compatibility
2016-05-03 09:22:15 -06:00
David Garske
993972162e
MinGW fixes, server port assigning cleanup and ping test cleanup. Fixes issue with visibility detection with MinGW. The visibility.m4 script was not actually trying to call the hidden function, which caused MinGW to detect improperly that visibility was supported. Fix for bogusFile on Windows build. Fixes to build warnings for unused variable 'res' and signed/unsigned comparison for sizeof min(). Cleanup of the server side port assignment to allow use with Windows/MinGW/Cygwin. If Windows uses new GetRandomPort() function in test.h to get port in in the 49152 - 65535 range. If *nix then uses the tcp_listen returned port. Otherwise uses the default wolfSSLPort. Refactor of the ping test code to use common file and properly handle ping count differences (Windows "-c" vs. *Nix style "-n"). Workaround for MinGW and cyassl/options.h getting file permissions error. Added non-fatal compile warning if using MinGW that "strtok_s" might be missing along with a link to public domain source that can be used.
2016-04-08 11:48:14 -06:00
Jacob Barthelmeh
696169634e
check return value of wolfSSL_set_fd
2016-03-25 13:59:04 -06:00
Jacob Barthelmeh
e99a5b0483
prepare for release v3.9.0
2016-03-17 16:02:13 -06:00
Jacob Barthelmeh
060e278559
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into Certs
2016-03-11 23:48:39 -07:00
David Garske
0ed26ad262
Updated build for "leantls" to support building only the client, by splitting BUILD_EXAMPLES into 3 parts (BUILD_EXAPLE_SERVERS, BUILD_EXAMPLE_CLIENTS and BUILD_TESTS). This allows the make check to perform the external tests to validate the client only "leantls" configuration option.
2016-03-08 08:35:28 -08:00
Jacob Barthelmeh
267dc48d95
fixs after testing : hash table, using NO_SKID, sanity check, and freeing dCert
2016-03-02 15:23:50 -07:00
Jacob Barthelmeh
05d2cec7c1
addition to api tests and refactor location of trusted peer cert check
2016-03-02 11:35:03 -07:00
Jacob Barthelmeh
dcfec3d2fa
check for RSA and ECC before testing RSA signed ECC cert
2016-02-23 17:03:52 -07:00
Jacob Barthelmeh
8073024ee7
fix formatting of .conf file so ephemeral port is used
2016-02-12 13:41:30 -07:00
Jacob Barthelmeh
3e860107f3
remove extra cert and key, plus add new test
2016-02-11 13:49:07 -07:00
toddouska
f30ef33d8b
Merge pull request #295 from JacobBarthelmeh/master
...
ECDHE-PSK and added cipher suites
2016-02-09 09:40:13 -08:00
David Garske
4ea76b8ac8
Fixes for warnings found using MinGW. Fixes for WOLFSSL_SOCKET_IS_INVALID and WOLFSSL_SOCKET_INVALID to use the SOCKET_T.
2016-02-08 15:44:22 -08:00
Jacob Barthelmeh
3ce64da44c
ChaCha20-Poly1305 PSK cipher suites
2016-02-04 09:50:29 -07:00
Jacob Barthelmeh
5a9175a758
add cipher suite ECDHE-PSK-AES128-SHA256 and adjustments to ECDHE-PSK
2016-02-04 09:39:34 -07:00
Jacob Barthelmeh
d04a7e802a
add ECDHE-PSK and cipher suite ECDHE-PSK-NULL-SHA256
2016-02-03 13:44:13 -07:00
Jacob Barthelmeh
93c54c07ea
cipher suite ECDHE-ECDSA-NULL-SHA
2016-02-01 14:43:17 -07:00
Jacob Barthelmeh
d0f8132cdc
forcing sensitive memory to be all zeros when done with it
2016-02-01 10:45:09 -07:00
Jacob Barthelmeh
7d71d756f3
update ChaCha20-Poly1305 to most recent RFCs
2016-01-27 14:03:05 -07:00
Moisés Guimarães
10df002ec5
fixes srp build without sha512
2016-01-12 15:42:58 -03:00
toddouska
157486ce0d
fix hint types for misuse of in_buffer and out_buffer
2015-12-29 16:13:09 -08:00
toddouska
22385f2b39
add random ports for all make check scripts, unique ready file
2015-12-22 14:35:34 -08:00
Chris Conlon
d2a80ba1bc
remove extra NULL check in SetTmpDH_buffer/file_wrapper, fix API tests
2015-11-30 10:25:55 -07:00
Chris Conlon
9c6b52876a
add SetTmpDH file/buffer functions to API tests
2015-11-20 13:32:44 -07:00
David Garske
f977caa492
Cleanup of the test code that looks for the WolfSSL root directory. Now it tries to open the certs/ntru-cert.pem file in each directory up (limited to 5) until it opens it.
2015-10-28 23:54:08 -07:00
Jacob Barthelmeh
c132f9887e
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-10-19 13:56:39 -06:00
Jacob Barthelmeh
ee5a11b8d9
Add Intel IPP crypto for RSA
...
add user-crypto makefile
update README for IPP crypto
place user crypto in wolfcrypt and use autotools
adjust distributed files
move openssl compatibility consumption
auto use IPP RSA -- IPP directory containing shared libraries local
return value of wolfSSL_BN and formating of debug
openssh testing
make sure IPP not built when fips is
ipp init to select correct optimizations -- static libraries on linux -- fast-rsa disabled by default
try to only set library once
only use static IPP if fast rsa is enabled
make print out for user crypto more pretty
2015-10-19 13:51:49 -06:00
Ludovic FLAMENT
9ef43910ed
Merge branch 'master' of https://github.com/wolfssl/wolfssl
2015-10-16 07:46:51 +02:00
Ludovic FLAMENT
d4f3419758
ALPN : add function to get in a server the list of supported protocols sent by the client.
2015-10-15 14:59:35 +02:00
Ludovic FLAMENT
10f5154389
ALPN : add option to continue in case of client/server protocol mismatch (like OpenSSL)
2015-10-13 09:38:40 +02:00
Ludovic FLAMENT
bf3b0a228d
add support for Application-Layer Protocol Name (RFC 7301) in the TLS extensions
2015-10-09 15:18:41 +02:00
toddouska
d669fc28c2
add idea benchmark, cleanup
2015-09-23 14:42:48 -07:00
Ludovic FLAMENT
f68400da40
add IDEA cipher (ECB and CBC mode)
...
add support of SSL_RSA_WITH_IDEA_CBC_SHA cipher suite (SSLv3, TLS v1.0 and TLSv1.1)
2015-09-23 16:16:39 +02:00
toddouska
049a4c6460
fix C++ mode warnings
2015-08-17 16:47:39 -07:00
toddouska
46e7e9acf9
disable SSLv3 by default
2015-08-12 16:39:13 -07:00
Moisés Guimarães
12b8445153
adds key generation function callback option.
2015-08-04 13:36:58 -03:00
Moisés Guimarães
53224281d2
adds proof getter and verifier for both sides.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
490d063dec
adds key computation.
...
removes unnecessary fields from the srp struct.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
6ee788277f
adds tests to SrpSetPassword(), SrpSetVerifier(), SrpGetVerifier();
...
adds SrpGenPublic() and SrpSetPrivate() with unit tests;
fixes k with left pad at g;
adds new error SRP_CALL_ORDER_E to force the functions to be called in the right order.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
6d5efccc55
finishes SrpSetPassword(), SrpSetVerifier(), SrpGetVerifier();
...
updates client_proof during SrpSetParams();
2015-08-04 01:07:24 -03:00
Moisés Guimarães
119dd0250e
fixes field types in SRP structure;
...
adds new memory allocation type (DYNAMIC_TYPE_SRP);
improves wc_SrpInit;
adds wc_SrpTerm(), wc_SrpSetUsername(), wc_SrpSetParams(), wc_SrpSetPassword();
2015-08-04 01:07:24 -03:00
Moisés Guimarães
dfa956d227
adds wc_SrpInit() with unit tests.
2015-08-04 01:07:24 -03:00
kaleb-himes
273a0dd4d5
re-format test-psk-no-id.conf add README
2015-08-03 11:04:18 -06:00
toddouska
37ba6aeee7
fix psk no identify hint example logic
2015-08-03 09:32:51 -07:00
kaleb-himes
303fb2bb62
Option for no PSK Id Hint and test cases
...
update comment file reference
2015-07-31 22:00:28 -06:00
Jacob Barthelmeh
e7dd5c4b8f
add setting client cipher list
2015-07-21 16:55:42 -06:00
Jacob Barthelmeh
df8b48cd0f
NTRU suites from earlier code
2015-07-11 12:52:22 -06:00
Jacob Barthelmeh
14723b7e65
QSH (quantum-safe handshake) extension
2015-07-07 09:55:58 -06:00
Moisés Guimarães
ca01cebd28
adds SNI abort option to turn SNI mandatory for WebSocket (RFC6455 page 17).
...
@see WOLFSSL_SNI_ABORT_ON_ABSENCE and the xxxSNI_SetOptions() functions for further details.
2015-07-01 19:21:18 -03:00
John Safranek
d6047736e9
added GPL headers to the unit test driver files
2015-07-01 11:12:54 -07:00
Moisés Guimarães
61c50b26d0
makes wolfSSL_SNI_GetFromBuffer() return SNI_UNSUPPORTED instead of BUFFER_ERROR for SSL v2.0 client hello buffers.
2015-06-25 12:48:11 -03:00
toddouska
86f2b9a98f
turn off DTLSv1 functions for disable old tls
2015-04-08 13:29:25 -07:00
toddouska
9ba62a2c52
allow examples build if no-sha but psk is on
2015-03-28 14:58:17 -07:00
toddouska
f7c99cec3e
obey user ecc choices at TLS layer
2015-03-18 14:12:23 -07:00
toddouska
ac979d49ab
fix sni yassl tests
2015-02-25 20:34:50 -08:00
toddouska
473a120ba2
remove more stale cyassl headers
2015-02-25 13:34:29 -08:00
kaleb-himes
c516c42c9a
reduce footprint size removing compatibility layer where no longer needed
2015-02-17 14:20:10 -07:00
kaleb-himes
878c1889b3
Merge branch 'master' of https://github.com/kaleb-himes/cyassl
2015-01-08 09:40:17 -07:00
kaleb-himes
a389620a29
Copyright (C) updates
2015-01-08 09:39:04 -07:00
Jacob Barthelmeh
0721d575f6
correction on rename of struct
2015-01-07 15:56:02 -07:00
Jacob Barthelmeh
1c4b4a2d1e
ripemd in function call fixed
2015-01-07 15:26:09 -07:00
Jacob Barthelmeh
e3826d26c5
refactor settings_comp to respective .h files
2015-01-07 15:03:54 -07:00
kaleb-himes
7e9c8028b2
more macros, fips test passes
2015-01-07 13:33:10 -07:00
kaleb-himes
639637278d
CYASSL -> WOLFSSL macros
2015-01-07 13:17:57 -07:00
kaleb-himes
ce65bef5a8
enable-fpecc enable-ecc
2015-01-06 13:42:02 -07:00
kaleb-himes
369a5f04a9
library wide licence update
2015-01-06 12:14:15 -07:00
kaleb-himes
0dbdb35222
enable-md4, enable-hkdf, disable-memory
2015-01-06 10:41:47 -07:00
Jacob Barthelmeh
f64d76257e
readjust c files, autoconf, and some header files
2015-01-02 14:56:58 -07:00
kaleb-himes
1c75a6e74f
tests/api.c updated
2014-12-30 12:41:26 -07:00
kaleb-himes
adfa2348ba
cleanup
2014-12-29 17:06:45 -07:00
kaleb-himes
64d06580c1
examples not seeing WOLFSSL_API
2014-12-29 16:30:26 -07:00
kaleb-himes
edf53a1ed0
new changes
2014-12-29 10:27:03 -07:00
Kaleb Himes
53057f0b0d
name changes kaleb push
2014-12-17 10:00:17 -07:00
Moisés Guimarães
513ea4d38a
add SNI_UNSUPPORTED for better handling SSL 3.0 buffers on CyaSSL_SNI_GetFromBuffer()
2014-12-08 17:31:37 -03:00
John Safranek
1742e0ddb6
Merge in the ADH-AES128-SHA changes and add a check for it during the
...
packet order sanity checking.
2014-12-01 11:44:32 -08:00
toddouska
1f8d84553c
add server_ready file to externally monitor example server for ready to accept, -r option
2014-11-26 12:13:47 -08:00
toddouska
6175a2a20c
cleanup fp cache on examples with thread local storage
2014-09-09 10:14:32 -07:00
toddouska
2c595139db
fix tirtos merge
2014-09-08 19:40:03 -07:00
Moisés Guimarães
ffd7dd3555
fix github issue #126
...
api tests refectory with ifdef and prototypes cleaning + use of asserts. Now, if the tests fails, it will point the line error and expected behavior like this:
ERROR - tests/api.c line 715 failed with:
test: server_args.return_code is true
result: server_args.return_code => FALSE
2014-09-04 14:17:55 -03:00
toddouska
a73a160aaf
Merge branch 'master' into ti
2014-07-21 16:26:39 -07:00