toddouska
e7de654b61
Merge pull request #1558 from dgarske/fsanitize
...
Fixes for fsanitize reports
2018-05-21 14:18:07 -06:00
toddouska
2d88e2efe7
Merge pull request #1567 from SparkiDev/intel_64_align
...
ForceZero - align 64-bit access on Intel 64-bit
2018-05-21 14:16:36 -06:00
MJSPollard
fb247a5d8d
added null check for key
2018-05-21 13:59:15 -06:00
Chris Conlon
6e13bfcfce
Merge pull request #1571 from aaronjense/unit-test-curve25519
...
Added unit-test for wc_curve25519_init and wc_curve25519_free
2018-05-21 13:42:11 -06:00
MJSPollard
2b49f69f1b
updated unit test
2018-05-21 12:44:59 -06:00
Aaron Jense
f214dbc3dd
Removed unneeded call on test_wc_curve25519_init
2018-05-21 11:50:52 -06:00
Aaron Jense
8197d9ec36
Added unit-test for wc_curve25519_init and wc_curve25519_free in tests/api.c
2018-05-21 10:59:02 -06:00
MJSPollard
f447fe22b0
added Poly1305SetKey Unit Test
2018-05-21 10:55:56 -06:00
Sean Parkinson
3a27d85c4e
Use sizeof instead of constant value
2018-05-21 21:26:25 +10:00
Takashi Kojo
22078d6811
wc_Sha512 type
2018-05-20 15:50:16 +09:00
Takashi Kojo
da8452ab29
Removed redundant #defines
2018-05-20 14:29:40 +09:00
Takashi Kojo
d347f5ca77
#define SHA384/512 WC_SHA384/512 -> wolfSSL_SHA384/512
2018-05-20 13:55:47 +09:00
Takashi Kojo
d10f0911a4
sHA384, SHA512 conflict with openSSL
2018-05-20 13:55:47 +09:00
Takashi Kojo
874022d938
fix #if conditions and others
2018-05-20 13:55:47 +09:00
Takashi Kojo
153bcb5297
d2i_X509_fp
2018-05-20 13:55:47 +09:00
Takashi Kojo
460becf739
SHA256, SHA384, SHA512
2018-05-20 13:55:47 +09:00
Takashi Kojo
c275dfc5ab
X509_STORE_add_crl
2018-05-20 13:55:46 +09:00
Takashi Kojo
4efe8740ad
Eliminate d2i_RSAPublicKey test when HAVE_FAST_RSA is enabled
2018-05-20 13:55:46 +09:00
Takashi Kojo
98ef7f43e1
use wolfSSL_X509_CRL_free instead of XFREE
2018-05-20 13:55:46 +09:00
Takashi Kojo
c26bcdd199
Enable RSA_LoadDer with HAVE_FAST_RSA
2018-05-20 13:55:45 +09:00
Takashi Kojo
03d68812a9
Fix #if condition for test
2018-05-20 13:55:45 +09:00
Takashi Kojo
ad71f44f3c
suppress i2d_RSAPublicKey with HAVE_FAST_RSA
2018-05-20 13:55:45 +09:00
Takashi Kojo
6cef2e5d31
memory leak in d2i_X509_CRL
2018-05-20 13:55:45 +09:00
Takashi Kojo
76686c9e20
fix error return, i2d_RSAPublicKey
2018-05-20 13:55:44 +09:00
Takashi Kojo
6580a1fefa
enable SetBitString, SetASNInt, SetASNIntMP with OPENSSL_EXTRA
2018-05-20 13:55:44 +09:00
Takashi Kojo
5d4c0c582e
skip d2i_X509_CRL_fp test. Done locally.
2018-05-20 13:55:44 +09:00
Takashi Kojo
2e4884b6f9
PEM_read_X509_CRL only with HAVE_CRL
2018-05-20 13:55:44 +09:00
Takashi Kojo
f56fd5db00
eliminate dupricated func prototypes
2018-05-20 13:55:44 +09:00
Takashi Kojo
138f9f8f66
add wc_RsaKeyToPublicDer in asn.c when OPENSSL_EXTRA, fix wolfSSL_i2d_RSAPublicKey
2018-05-20 13:55:43 +09:00
Takashi Kojo
03846b2d2d
d2i_RSAPublicKey, d2i_X509_CRL, d2i_X509_CRL_fp, X509_CRL_free, PEM_read_X509_CRL
2018-05-20 13:55:43 +09:00
David Garske
cf70b1a013
Revert ForceZero changes in favor of PR #1567 .
2018-05-18 05:29:09 -07:00
Sean Parkinson
d63da10c96
ForceZero - align 64-bit access on Intel 64-bit
...
Test added to ensure ForceZero works.
2018-05-18 10:38:21 +10:00
Jacob Barthelmeh
f67046f485
better bounds checking
2018-05-17 16:55:59 -06:00
John Safranek
d8c33c5551
Fix TCP with Timeout
...
1. Take out DTLS support from EmbedReceive(). DTLS uses EmbedReceiveFrom().
2. Modify EmbedReceive() to return TIMEOUT if the session is set to blocking mode.
2018-05-17 15:53:38 -07:00
David Garske
096456f466
Merge pull request #1565 from embhorn/zd3883
...
wolfSSL_HMAC_Final parameter len should be optional
2018-05-17 13:19:19 -07:00
David Garske
b973d6e8b1
Fix to handle `NO_ERROR_STRINGS` case in unit test. The IANA names are disabled when `NO_ERROR_STRINGS` is defined.
2018-05-17 10:24:02 -07:00
Jacob Barthelmeh
b6a92a97ce
convert to byte to fix warning
2018-05-17 08:55:07 -06:00
Eric Blankenhorn
5cbb9e8341
wolfSSL_HMAC_Final parameter len should be optional
2018-05-17 08:53:21 -05:00
Jacob Barthelmeh
e1745428ac
add set short int helper function
2018-05-16 20:16:40 -06:00
David Garske
8163225180
Refactor of the cipher suite names to use single array, which contains internal name, IANA name and cipher suite bytes.
2018-05-16 15:29:27 -07:00
David Garske
dad574edb8
Fix to use proper type (`size_t`) for alignment check.
2018-05-16 14:34:16 -07:00
David Garske
52b66edf72
Fixes for a few more fsanitize issues. Added alignment for ForceZero. Added word32 aligned acceleration for ForceZeero. Added 'NO_ALIGNED_FORCEZERO' define to allow disabling aligned ForceZero acceleration. We cast the 24 left-shifts to word32 because compiler assumes signed int type, and a runtime value with MSB set results into runtime fsanitize error.
2018-05-16 13:27:13 -07:00
Jacob Barthelmeh
d373844a18
fix sequence with pkcs12 shrouded keybag creation
2018-05-16 10:16:15 -06:00
toddouska
8ff328cb39
Merge pull request #1551 from dgarske/asynccheck
...
Added new `async-check.sh` script
2018-05-16 08:02:11 -07:00
toddouska
b5e0499022
Merge pull request #1550 from dgarske/rsaverify
...
Check returned size matches signature size for RSA verify in openssl compatibility
2018-05-16 08:00:31 -07:00
toddouska
bbc178a704
Merge pull request #1548 from JacobBarthelmeh/Testing
...
fix ecc public key print with X509 print function
2018-05-16 07:59:19 -07:00
toddouska
8619062ae7
Merge pull request #1522 from dgarske/mbedtls_compat
...
Port for using AWS FreeRTOS
2018-05-16 07:57:55 -07:00
toddouska
1be8a6e4ef
Merge pull request #1502 from ejohnstown/update-m4
...
Update M4 Autoconf Files
2018-05-16 07:57:13 -07:00
Jacob Barthelmeh
566bb4cefe
version for PBE SHA1 DES oid
2018-05-16 08:38:50 -06:00
Jacob Barthelmeh
1ca62ee0a1
add error return for unsuported version
2018-05-15 22:51:11 -06:00