Sean Parkinson
c8e51112c3
Merge pull request #7372 from julek-wolfssl/zd/17435
...
Add secret logging callback to TLS <= 1.2
2024-04-26 09:41:58 +10:00
Sean Parkinson
5ee0e34d89
Merge pull request #7465 from julek-wolfssl/issue/7390
...
Clean up EVP usage in quic
2024-04-26 09:38:40 +10:00
Sean Parkinson
54022b146b
Merge pull request #7456 from mrdeep1/enable-dtls13
...
dtls1.3: Fix issues when --enable-dtls13 enabled
2024-04-26 09:24:01 +10:00
Sean Parkinson
7881f4e04c
Merge pull request #7471 from ColtonWilley/update-benchmark-rsa-size-parsing
...
Update benchmark to only parse rsa size if keygen is enabled
2024-04-26 09:11:32 +10:00
Sean Parkinson
e22ae7a1f8
Merge pull request #7469 from douzzer/20240424-fix-ports-whitespace
...
20240424-fix-ports-whitespace
2024-04-26 09:00:38 +10:00
Sean Parkinson
039fd26baf
Merge pull request #7467 from anhu/quick_fix
...
Get rid of some code with NO_OLD_TLS
2024-04-26 08:57:46 +10:00
Sean Parkinson
9ac918c0d4
Merge pull request #7462 from kaleb-himes/SRTP-KDF-HARNESSrev2
...
Srtp kdf harness rev2
2024-04-26 08:21:37 +10:00
Colton Willey
7485e9935d
Update benchmark to only parse rsa size if keygen is enabled, update keygen option help in configure.ac
2024-04-25 11:46:18 -07:00
Juliusz Sosinowicz
c62faa048c
Add secret logging callback to TLS <= 1.2
2024-04-25 17:11:07 +02:00
Juliusz Sosinowicz
d61fec5af9
Clean up EVP usage in quic
2024-04-25 16:34:38 +02:00
Daniel Pouzzner
e862c85db4
fix formatting infractions in the ports (hard tabs, trailing whitespace, C++ comments, stray Unicode including numerous homoglyphs).
2024-04-24 18:32:48 -05:00
Anthony Hu
329650fb4c
Get rid of some code with NO_OLD_TLS
2024-04-24 16:00:45 -04:00
kaleb-himes
24eed7de34
Remove debug printf and place comments inside gate
2024-04-24 10:55:13 -04:00
Jon Shallow
e36df36f84
dtls1.3: Fix issues when --enable-dtls13 enabled
...
Fixed issue reported by scan-build when DTLS13 is enabled.
Fix compile issue when WOLFSSL_DTLS_CH_FRAG is enabled.
Fix running of scripts/dtlscid.test by removing 'set -e' as bwrap
command may not be there.
2024-04-24 12:07:29 +01:00
Sean Parkinson
6e49aa7543
Merge pull request #7421 from philljj/update_lms_parms
...
Update enum wc_LmsParm for wolfboot support.
2024-04-24 16:39:10 +10:00
Sean Parkinson
c26f4041c6
Merge pull request #7463 from ColtonWilley/hmac-oversized-key-test-update
...
Update HMAC oversized key tests
2024-04-24 15:34:28 +10:00
Colton Willey
7f19be05bd
Modify HMAC oversized key tests to consistently use test vectors from RFC.
2024-04-23 15:23:51 -07:00
Sean Parkinson
9d7913508b
Merge pull request #7460 from douzzer/20240423-linuxkm-sha-2-3-asm-save-vector-regs
...
20240423-linuxkm-sha-2-3-asm-save-vector-regs
2024-04-24 07:33:05 +10:00
kaleb-himes
80d21f10c6
Remove excess empty line
2024-04-23 13:47:26 -04:00
kaleb-himes
690671d447
ECC allow keyVer of 192-bit (import OK, generate restricted)
2024-04-23 13:45:41 -04:00
jordan
094ddb62c2
Add wc_LmsKey_ExportPubRaw to wolfcrypt test.
2024-04-23 10:48:53 -05:00
András Fekete
a75c2befb5
Add CUDA support ( #7436 )
...
* Redirect the AesEncrypt_C call to device
* Fix function declarations
* Force CC=nvcc with CUDA
* Don't let C++ mangle function names
* Add larger parallelization
* Add in memory copy to device
* `nvcc` does not support '-Wall' nor '-Wno-unused'
* Add in README.md
* Clean up script to output color coded data
* Fix Asymmetric cipher comparisons
* Add in standard output parsing in addition to the CSV
* Add option to output results in a CSV
---------
Co-authored-by: Andras Fekete <andras@wolfssl.com>
2024-04-23 08:26:27 -07:00
jordan
bc00c95fe5
Update enum wc_LmsParm for wolfboot support.
2024-04-23 09:37:07 -05:00
Daniel Pouzzner
5d9154e8c6
wolfcrypt/src/sha{256,512,3}.c add SAVE_VECTOR_REGISTERS() for SHA-2 and SHA-3 vectorized implementations, and add WC_NO_INTERNAL_FUNCTION_POINTERS code paths to fix GOT relocations around implementation function pointers.
2024-04-23 01:31:43 -05:00
Sean Parkinson
c3d9fb61a8
Merge pull request #7444 from miyazakh/trackmem_exclusion
...
Exclusively tracking mem properties
2024-04-23 11:08:42 +10:00
Sean Parkinson
eb125851cd
Merge pull request #7447 from Naruto/feature/enable_sccache
...
add ENABLE_SCCACHE option
2024-04-23 11:05:43 +10:00
David Garske
3a89c452b3
Merge pull request #7454 from lealem47/stm32AesCtr
...
Fix for AES CTR on STM32
2024-04-22 10:04:06 -07:00
Sean Parkinson
b17ad46b30
Merge pull request #7458 from douzzer/20240422-wc_SRTCP_KDF_ex-Wconversion
...
20240422-wc_SRTCP_KDF_ex-Wconversion
2024-04-22 21:30:14 +10:00
Daniel Pouzzner
44e8f392ae
wolfcrypt/src/kdf.c: fix -Wconversions in wc_SRTCP_KDF_ex().
2024-04-22 01:11:46 -05:00
Sean Parkinson
5bb22d8343
Merge pull request #7439 from JacobBarthelmeh/build_test
...
fix for WOLFSSL_NO_PEM build
2024-04-22 10:48:57 +10:00
Sean Parkinson
e1b66ca62d
Merge pull request #7407 from mrdeep1/key_share
...
Handle PSK-Only negotiation with key_share not being sent in Server Hello
2024-04-22 10:45:56 +10:00
Sean Parkinson
cfe645ca70
Merge pull request #7455 from kaleb-himes/SRTCP-48bit-indices
...
Srtcp 48bit indices
2024-04-22 10:43:07 +10:00
Sean Parkinson
eeadb2a7f3
Merge pull request #7457 from douzzer/20240420-wc_linuxkm_fpu_state_assoc-fixups
...
20240420-wc_linuxkm_fpu_state_assoc-fixups
2024-04-22 10:39:55 +10:00
Daniel Pouzzner
0a4eb1fbc7
linuxkm/linuxkm_memory.c: require kernel 5.4+ for AESNI/AVX, and add fixup code in wc_linuxkm_fpu_state_assoc_unlikely() to cope with migrations. in save_vector_registers_x86(), on kernel < 5.17, check test_thread_flag(TIF_NEED_FPU_LOAD) as a workaround for irq_fpu_usable() missing check for in_kernel_fpu.
2024-04-20 13:55:37 -05:00
Lealem Amedie
eafa425019
Engine doesn't need NO_OLD_RNG_NAME
2024-04-19 16:15:38 -06:00
JacobBarthelmeh
78670f5098
Merge pull request #7453 from douzzer/20240419-wolfSSL_CTX_SetTmpDH-double-free
...
20240419-wolfSSL_CTX_SetTmpDH-double-free
2024-04-19 13:48:37 -06:00
kaleb-himes
4b1edc78bb
Add test case
2024-04-19 13:16:19 -06:00
Lealem Amedie
acc6ff84d8
Move rng seed cb call to wolfcrypt_test
2024-04-19 12:36:20 -06:00
Lealem Amedie
9bc0e31a32
Fix for AES CTR on STM32
2024-04-19 12:35:33 -06:00
kaleb-himes
e835517633
SRTCP 32-bit indices default plus errata 48-bit indices
2024-04-19 12:31:08 -06:00
JacobBarthelmeh
69be7a7c54
Merge pull request #7431 from lealem47/aes_cfb
...
Fix for AES-CFB1 encrypt/decrypt on size (8*x-1) bits
2024-04-19 10:55:27 -06:00
JacobBarthelmeh
a63ff277ed
Merge pull request #7452 from douzzer/20240419-linuxkm-intelasm-expansion
...
20240419-linuxkm-intelasm-expansion
2024-04-19 10:46:11 -06:00
Daniel Pouzzner
39e2405e2f
src/ssl_load.c: fix double-free in wolfSSL_CTX_SetTmpDH().
2024-04-19 11:43:32 -05:00
JacobBarthelmeh
5f9ed54aaa
Merge pull request #7451 from SparkiDev/test_fixes_1
...
Fixes from configuration testing
2024-04-19 10:43:31 -06:00
JacobBarthelmeh
c7f852fbbd
Merge pull request #7450 from anhu/reneg_indic
...
check for conflicting secure renegotiation macros (settings.h)
2024-04-19 10:41:26 -06:00
JacobBarthelmeh
9242f611b2
Merge pull request #7449 from lealem47/nginx_stubs
...
Adding stubs required for latest nginx
2024-04-19 10:38:17 -06:00
Jon Shallow
7b22681287
Handle PSK-Only negotiation with key_share not being sent in Server Hello
...
The wrong cipher suite is potentially chosen if key_share is not seen by the client.
$ cat /tmp/test
Client_identitySHA256:0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
Server:
$ gnutls-serv --http --priority NORMAL:+ECDHE-PSK:+PSK:+ECDHE-ECDSA:+AES-128-CCM-8:+CTYPE-CLI-ALL:+CTYPE-SRV-ALL:+SHA256 --pskpasswd=/tmp/test
Client:
$ examples/client/client -vd -g -s -p 5556 2>&1| grep HTTP
2024-04-19 17:14:28 +01:00
Daniel Pouzzner
0264a518e1
wolfcrypt/src/ed25519.c: in ed25519_pairwise_consistency_test(), add casts to mollify -Wconversion.
2024-04-19 01:41:35 -05:00
Daniel Pouzzner
28480ec0ea
linuxkm/Kbuild: add SHA-2, SHA-3, ChaCha20, and poly1305, to kernel-safe vectorized-asm list.
2024-04-19 01:35:45 -05:00
Daniel Pouzzner
85f3fb9d07
Merge pull request #7409 from SparkiDev/asm_x64_rip_fix
...
SHA-256 x64 ASM - fix use of %rip
2024-04-19 02:33:47 -04:00