Takashi Kojo
7767d802b7
arg_obj check has done before
2018-09-25 15:39:55 +09:00
Takashi Kojo
c673884cbb
#ifdef HAVE_ECC to OBJ_nid2obj, and its test in api.c
2018-09-25 15:39:55 +09:00
Takashi Kojo
4d03b55fef
XBADFILE in bio.c
2018-09-25 15:39:55 +09:00
Go Hosohara
fd634141bd
wolfSSL_get_rbio,wolfSSL_get_wbio.
...
fix to check XBADFILE in wolfSSL_BIO_write_file.
2018-09-25 15:39:55 +09:00
Go Hosohara
fd01659baa
Obj_obj2nid
2018-09-25 15:39:55 +09:00
Go Hosohara
19c1a3a3f9
Fix i2d_RSAPublicKey() memory leak issue.
2018-09-25 15:39:55 +09:00
Go Hosohara
3f993c280c
Change buffer variable name for preventing from conflict with debug option.
2018-09-25 15:39:54 +09:00
Go Hosohara
3f82fb62a0
SSL_get_peer_cert_chain() count value check in api.c
2018-09-25 15:39:54 +09:00
Takashi Kojo
259d3b5720
WOLFSSL_USER_FILESYSTEM option
2018-09-25 15:39:54 +09:00
Takashi Kojo
1e87eae3b7
i2d_RSAPublicKey(rsa, NULL)
2018-09-25 15:39:54 +09:00
Takashi Kojo
52cee17668
use XSEEK_END
2018-09-25 15:39:54 +09:00
Takashi Kojo
e6612b34f7
use XFILE, BADFILE, XFxxxx
2018-09-25 15:39:54 +09:00
Takashi Kojo
787fa5d49a
get name in X509_NAME_get_entry
2018-09-25 15:39:54 +09:00
Go Hosohara
3bf776baf4
wolfSSL_ASN1_TIME_get_data() changed
2018-09-25 15:39:54 +09:00
Go Hosohara
29d3303995
Add tests for d2i_PKCS12_fp,i2d_RSAPublicKey,RSA_verify and X509_print
2018-09-25 15:39:54 +09:00
Go Hosohara
b588e6ab29
ERR_peek_last_error() and SSL_get_SSL_CTX reference error on opensslextra.
...
Implemented wolfSSL_X509_get_version().
2018-09-25 15:39:54 +09:00
Go Hosohara
e79cdefcde
X509_NAME_ENTRY_get_object
2018-09-25 15:39:54 +09:00
Go Hosohara
2922a93bf7
PEM_read_X509_CRL
2018-09-25 15:39:54 +09:00
Go Hosohara
050fa2f8f8
wolfSSL_X509_CA_num()
2018-09-25 15:39:54 +09:00
Go Hosohara
aaa26f3f41
wolfSSL_ASN1_TIME_get_data()
2018-09-25 15:39:54 +09:00
Go Hosohara
a002a6715f
wolfSSL_ASN1_TIME_get_length()
2018-09-25 15:39:54 +09:00
Go Hosohara
98ae3bb7fd
Add define for OpenSSL API.
2018-09-25 15:39:54 +09:00
Sean Parkinson
c4e1cdf335
Merge pull request #1845 from dgarske/tls_curve_order
...
TLS supported curve selection fixes
2018-09-25 08:26:14 +10:00
Jacob Barthelmeh
27aaedf37c
add -rsa-sz which benches any RSA key size
2018-09-24 16:21:13 -06:00
JacobBarthelmeh
4855246fc6
Merge pull request #1847 from kaleb-himes/ASN_T_LONG
...
Address a potential out of bounds write
2018-09-24 10:51:49 -06:00
JacobBarthelmeh
3be25441fa
Merge pull request #1843 from dgarske/async_fixes
...
Fixes for wolfCrypt async use with TLS
2018-09-24 09:51:19 -06:00
JacobBarthelmeh
0efc637d2d
Merge pull request #1834 from SparkiDev/pkcs11
...
Support for PKCS#11
2018-09-24 09:41:45 -06:00
David Garske
038b5e8a66
Fix comment spelling error.
2018-09-24 07:23:54 -07:00
Sean Parkinson
d273d1dc81
Fixes from review
2018-09-24 08:44:31 +10:00
Sean Parkinson
3a72cf7996
Fixes from review
2018-09-24 08:41:25 +10:00
Sean Parkinson
f7f158cbd9
Fix encode and decoding of EC signature
2018-09-24 08:41:25 +10:00
Sean Parkinson
77a81057be
Casting fixes
2018-09-24 08:41:25 +10:00
Sean Parkinson
5744e4227d
Rewrote the public pkcs11 headers
...
Fixed file name in comment.
2018-09-24 08:41:25 +10:00
Sean Parkinson
8a5a03ea35
Support for PKCS#11
...
Support for RSA, ECDSA and AES-GCM operations.
2018-09-24 08:41:25 +10:00
David Garske
dfec7f2263
Fix for TLS v1.3 async case with cipher suite `TLS_AES_128_GCM_SHA256` and RSA key type. Fix for issue with long cipher suite name test for TLS 1.3.
2018-09-21 16:30:05 -07:00
kaleb-himes
29d60ec7e9
Changed to MAX over LONG based on peer review
2018-09-21 17:09:37 -06:00
kaleb-himes
fc77590c4e
Address a potential out of bounds write
2018-09-21 17:02:56 -06:00
David Garske
b2575b0b60
Fix to only skip early key free if async pending.
2018-09-21 15:13:15 -07:00
David Garske
e07e8a6a6e
Merge pull request #1846 from cconlon/validity
...
fix daysValid seconds calculation
2018-09-21 12:02:11 -07:00
Chris Conlon
0591b18339
fix daysValid seconds calculation
2018-09-21 11:04:39 -06:00
David Garske
a643aeac41
* Fixes for async with TLS where keys are being free'd too soon.
...
* Fix for possible NULL RNG case in mp_rand.
* Fix for memory macros to handle expression for `HEAP`.
* Fix for possible unknown uint32_t type with mem track.
* Fix for double Alloc/Free print when using track and debug memory at same time.
* Fix for building with `./configure CFLAGS="-DECC_USER_CURVES -DNO_ECC256 -DHAVE_ECC160"`
* Performance improvements for cases with `WC_ASYNC_NO_HASH` and `WC_ASYNC_ENABLE_SHA256`.
2018-09-21 09:33:40 -07:00
David Garske
24f9f12844
Fix for the curve logic to pick the hightest strength, not just the default 256-bit. Added test for setting user curve. `./examples -H useSupCurve`.
2018-09-21 09:27:48 -07:00
David Garske
39019c2418
Re-order the default supported curve groups by strength. Some TLS servers pick the top choice instead of the strongest.
2018-09-21 08:54:32 -07:00
David Garske
a5fffdbbb7
Merge pull request #1844 from kaleb-himes/CERT_UPDATE_FIX
...
Cert update fix
2018-09-20 18:06:16 -07:00
David Garske
dfb9db2b8d
Merge pull request #1832 from JacobBarthelmeh/HardwareAcc
...
Linux /dev/crypto SHA256 and AES
2018-09-20 18:05:35 -07:00
kaleb-himes
dc942bf9cb
Remove unnecessary duplicate revocation
2018-09-20 16:54:35 -06:00
kaleb-himes
ea06a3e8cb
Resolve some persistent error report when conf not passed to req
2018-09-20 16:50:02 -06:00
Jacob Barthelmeh
fe2f9d4aa4
minor adjustments and add README
2018-09-20 15:59:29 -06:00
David Garske
427c62e04a
Merge pull request #1841 from kaleb-himes/CERT_UPDATE_REFACTOR
...
Cert update refactor
2018-09-20 14:24:06 -07:00
kaleb-himes
54e04dd312
posix compliance enhancements for portability
2018-09-20 10:30:11 -06:00