John Safranek
c0cbc97b06
add AES-CMAC
2016-05-23 17:50:36 -07:00
David Garske
15cd06b7ca
Fixed bug with "ecc_projective_add_point" that was not protecting the case where Q == R and using the R variable directly for the result. Now if Q == R then swap P and Q and using a local x,y,z, is only required when used with ALT_ECC_SIZE.
2016-05-22 17:31:36 -07:00
John Safranek
bae0fe9b63
MakeCertReq() was not checking return codes correctly for the SetFoo()
...
functions.
2016-05-18 15:14:23 -07:00
John Safranek
5c8daa0ac6
1. SetName() should return error if country code isn't 2 bytes.
...
2. MakeCert() was not checking return codes correctly for the SetFoo()
functions.
3. Added error code for invalid country code length.
2016-05-18 15:04:40 -07:00
John Safranek
03e6f7cca3
RFC 5280 Appendix A.1 states that the Country Name in a certificate
...
shall have a size of 2 octets. Restrict country name length to 2 or 0.
2016-05-18 10:39:18 -07:00
toddouska
1ea01a7ad8
Merge branch 'master' of https://github.com/NickolasLapp/wolfssl into dyntickets
2016-05-13 09:07:55 -07:00
David Garske
2ad9d41641
Performance improvement for fast math mp_clear to use fp_zero (memset) instead of fp_clear(ForceZero). Added new mp_forcezero function for clearing/free'ing sensitive private key data. Changed ECC and RSA to use mp_forcezero to explicitly handle private key clearing.
2016-05-12 11:50:34 -07:00
David Garske
440956f8d4
Fixed new issue with ecc_projective_add_point not free'ing the local x, y, z if fast math was disabled. Formatting cleanup in integer.c.
2016-05-11 08:47:30 -07:00
David Garske
d71d0f2cb4
Fix with fast math disabled so ecc_projective_add_point uses temp local variable for x,y,z result.
2016-05-09 13:29:25 -07:00
David Garske
880b2e454b
Refactor of the ecc_projective_add_point and ecc_projective_dbl_point functions to eliminate duplicate versions. Modified new single functions to work with normal, fast and alt_ecc_size math options. Careful use of mp_clear to retain original performance.
2016-05-09 09:51:11 -07:00
David Garske
1b602d783c
Fast math correction of "sizeof" to use (). Updates to tfm and ecc comments.
2016-05-09 09:51:11 -07:00
David Garske
5cbc4bdf29
Added new "WOLFSSL_DEBUG_MATH", which enables use of "mp_dump" to display information about an mp_int.
2016-05-09 09:51:11 -07:00
David Garske
a4782fcf01
Fix in fast math version of ecc_projective_dbl_point to use a local for x,y,z since ecc_point fp_int's are reduced size and cause math issues with ALT_ECC_SIZE enabled. Added local stack variable cleanups for ecc_projective_add_point.
2016-05-09 09:51:11 -07:00
David Garske
0ddbe0e60e
Enhancement to RSA math function "_fp_exptmod" (non timing resistant version) to support WOLFSSL_SMALL_STACK, which moves the allocation of the 64 fp_int's from the stack to the heap.
2016-05-09 09:51:11 -07:00
David Garske
a5d27853fa
Fixes to fp_mul and fp_div to clear any excess digits on the destination. Added compile-time check to confirm FP_SIZE is compatible with TFM_ acceleration defines enabled. Updated comments in other places where excess digits are cleared.
2016-05-09 09:51:11 -07:00
David Garske
7c3fbd7644
Fix for fp_copy() when used with ALT_ECC_SIZE so any excess digits on the destination that we didn't write to are set to zero.
2016-05-09 09:51:11 -07:00
David Garske
9001036e09
Fixes memory leak in the wc_RsaFunction if failure happens when using normal math (not fast math) and RSA_LOW_MEM is not defined.
2016-05-09 09:51:11 -07:00
Chris Conlon
8f3e1165a1
add Whitewood netRandom client library support
2016-05-05 15:31:25 -06:00
toddouska
ee21d33794
Merge pull request #407 from wolfSSL/embOS-port
...
embOS port
2016-05-05 13:27:27 -07:00
toddouska
f9f9546d0e
Merge pull request #408 from cconlon/header-fix
...
fix aes_asm.asm header format
2016-05-04 14:38:23 -07:00
David Garske
822d71431e
Moved mem_track.h into wolfssl/wolfcrypt. Added new WOLFSSL_DEBUG_MEMORY option. Added documentation for using mem_track and new debug memory option.
2016-05-04 10:04:38 -07:00
kaleb-himes
8176c74b3e
Merge branch 'embOS-port' of https://github.com/wolfssl/wolfssl into embOS-port
2016-05-04 08:57:06 -07:00
Chris Conlon
d91ec3ce77
fix aes_asm.asm header format
2016-05-04 09:02:50 -06:00
kaleb-himes
d184f8b1aa
wolfSSL embOS port Initialize
...
self-review complete
Removed autogenerated files
2016-05-03 17:09:55 -06:00
Jacob Barthelmeh
05e56b75f6
scan-build, valgrind issues and fix issue with ExtractDate, struct tm
2016-05-03 09:22:16 -06:00
Jacob Barthelmeh
f88d82375e
add function wolfSSL_ASN1_TIME_to_string
2016-05-03 09:22:15 -06:00
Chris Conlon
78e62eddd7
fix visual studio code analysis warnings
2016-04-28 13:08:50 -06:00
Nickolas Lapp
5f9c1ffca6
Initial support for deep copying of session
2016-04-25 11:00:42 -06:00
Chris Conlon
27814ca1df
omit NULL AlgorithmIdentifier parameter for ECDSA algoOID types in SetAlgoID
2016-04-21 14:32:28 -06:00
toddouska
86cbabf035
Merge pull request #392 from wolfSSL/aesni-update
...
AES-NI Update
2016-04-20 14:27:52 -07:00
Jacob Barthelmeh
659d6c0689
update oid value for secp160r1
2016-04-19 17:01:39 -06:00
Jacob Barthelmeh
e0a9b365cc
fix NID name in openssl compatibility
2016-04-19 13:17:32 -06:00
toddouska
0dbdc8eab0
Merge pull request #372 from dgarske/mingwfixes
...
MinGW fixes
2016-04-18 12:50:13 -07:00
John Safranek
4506839c6d
back out last commit. it was a pain to use.
2016-04-14 11:57:42 -07:00
John Safranek
526606e42f
added conditional assembly for the intel-format AES_NI decrypt procedures
2016-04-14 11:30:10 -07:00
John Safranek
5340ea0d79
fixed a missing operand swap in the AES-CBC decrypt by 6
2016-04-14 10:47:14 -07:00
Jacob Barthelmeh
f998851642
fix check on RSA key size
2016-04-14 09:33:25 -06:00
John Safranek
6f51c2a8f8
1. Fix bad opcode mnemonics in the intel-format source listing.
...
2. Update the aes.c file to call both format assembly routines the same
way.
2016-04-13 16:42:58 -07:00
John Safranek
c34944e389
added intel-format translations of new att-format AES-NI decrypt routines
2016-04-13 16:02:18 -07:00
John Safranek
9781fa3dc9
relabel jump points in new code with D (decrypt) mnemonics rather than E (encrypt)
2016-04-13 15:51:19 -07:00
John Safranek
13f002f186
only compile in the AES-CBC decrypt-by-size variant selected by define, default by 8 blocks at a time
2016-04-13 12:00:53 -07:00
John Safranek
451fd878f9
touching whitespace in assembly routines being touched right now
2016-04-13 11:48:25 -07:00
John Safranek
8524afc56a
1. Rename routine AES_CBC_decrypt_ex as AES_CBC_decrypt_by8
...
2. Added routine AES_CBC_decrypt_by6 that does six at a time.
3. Setting HAVE_AES_DECRYPT_BY6 or _BY8 (or not setting it) selects
the 6, 8, or 4 way version of the assembly routine.
4. Modified AES-NI decrypt test to loop checking against the test
bolus from 1 AES block to the whole 24 blocks.
2016-04-12 10:10:55 -07:00
toddouska
85505b99b9
Merge pull request #380 from cconlon/utasker
...
uTasker Port
2016-04-08 15:08:39 -07:00
John Safranek
b75dc127f3
1. Attempting to perform 8 AES-CBC decrypt operations simultaneously.
...
2. Added code to test large AES-CBC decrypts.
2016-04-08 11:53:40 -07:00
David Garske
993972162e
MinGW fixes, server port assigning cleanup and ping test cleanup. Fixes issue with visibility detection with MinGW. The visibility.m4 script was not actually trying to call the hidden function, which caused MinGW to detect improperly that visibility was supported. Fix for bogusFile on Windows build. Fixes to build warnings for unused variable 'res' and signed/unsigned comparison for sizeof min(). Cleanup of the server side port assignment to allow use with Windows/MinGW/Cygwin. If Windows uses new GetRandomPort() function in test.h to get port in in the 49152 - 65535 range. If *nix then uses the tcp_listen returned port. Otherwise uses the default wolfSSLPort. Refactor of the ping test code to use common file and properly handle ping count differences (Windows "-c" vs. *Nix style "-n"). Workaround for MinGW and cyassl/options.h getting file permissions error. Added non-fatal compile warning if using MinGW that "strtok_s" might be missing along with a link to public domain source that can be used.
2016-04-08 11:48:14 -06:00
David Garske
2aab090c8b
Fixes when using the STM32 with STM32F2_HASH defined.
2016-04-08 11:39:15 -06:00
Chris Conlon
8d040ad41f
uTasker: add initial port, WOLFSSL_UTASKER
2016-04-08 11:12:17 -06:00
Jacob Barthelmeh
665fb3076c
add trailing zero enum and correct call for export key size
2016-04-06 15:15:56 -06:00
Jacob Barthelmeh
4f8fffbc37
add wc_EccPublicKeyToDer function
2016-04-06 15:15:56 -06:00
toddouska
63b1282e67
Merge pull request #335 from dgarske/asynccrypt
...
Asynchronous crypto and wolf event support
2016-03-30 20:12:41 -07:00
toddouska
6e5b23e102
Merge pull request #370 from dgarske/stm_aes_gcm_ccm
...
Enhancement to the STM32F2_CRYPTO port to support AES GCM, AES CCM an…
2016-03-30 13:39:35 -07:00
Jacob Barthelmeh
e60adfc9da
better naming of macro and alter misc.c check
2016-03-29 13:42:40 -06:00
Jacob Barthelmeh
7e90e2e540
misc.c compile warning accounts for FIPS
2016-03-28 17:22:39 -06:00
Jacob Barthelmeh
2665db73a4
check for compiling misc.c when not needed
2016-03-28 16:03:15 -06:00
John Safranek
190d30f336
Merge pull request #362 from dgarske/bench_rng
...
Added benchmark for the RNG.
2016-03-25 12:12:20 -07:00
David Garske
f539a60a40
Adjusted the RNG benchmark to split into smaller requests of max allowed RNG size.
2016-03-25 06:59:35 -07:00
David Garske
3796fc1322
Enhancement to the STM32F2_CRYPTO port to support AES GCM, AES CCM and AES-Direct (for encrypt only) using combination of software and AES HW acceleration.
2016-03-24 07:08:42 -07:00
Chris Conlon
20285bec01
fix wc_ecc_import_raw comment, public key instead of base point
2016-03-23 15:33:53 -06:00
toddouska
2dfc7faa73
Merge pull request #355 from dgarske/EccTestCleanup
...
wolfCrypt ECC test improvements and code cleanup
2016-03-23 12:18:42 -07:00
toddouska
18961e5620
Merge pull request #351 from dgarske/ChaChaRefactor
...
Refactor of the ChaCha hard coded variables
2016-03-23 12:17:23 -07:00
John Safranek
d8fb4b6ee7
Merge pull request #352 from dgarske/DRBGSmallStack
...
Fix to reduce stack usage in the hash-based random number generator h…
2016-03-21 12:20:48 -07:00
David Garske
0fc5575b8b
Fixed typo with WOLFSSL_VALIDATE_ECC_IMPORT defined. Disable ECC-224 bit compressed key test since it isn't working. Cleanup in accel_fp_mul for KB_SIZE.
2016-03-18 15:41:03 -07:00
Jacob Barthelmeh
e99a5b0483
prepare for release v3.9.0
2016-03-17 16:02:13 -06:00
David Garske
e1787fe160
Added "--enable-asynccrypt" option for enabling asynchronous crypto. This includes a refactor of SendServerKeyExchange and DoClientKeyExchange to support WC_PENDING_E on key generation, signing and verification. Currently uses async simulator (WOLFSSL_ASYNC_CRYPT_TEST) if cavium not enabled. All of the examples have been updated to support WC_PENDING_E on accept and connect. A generic WOLF_EVENT infrastructure has been added to support other types of future events and is enabled using "HAVE_WOLF_EVENT". Refactor the ASN OID type (ex: hashType/sigType) to use a more unique name. The real "async.c" and "async.h" files are in a private repo.
2016-03-17 13:31:03 -07:00
toddouska
10e74f7200
Merge pull request #353 from dgarske/EccUnsignedSizeCheckFix
...
Fixed bug where mp_unsigned_bin_size returning 0 could produce a UINT…
2016-03-17 10:50:01 -07:00
David Garske
19967dd264
Fixed bug where mp_unsigned_bin_size returning 0 could produce a UINT_MAX (based on -1) resulting in invalid index to an array. Added test case for this if FP_ECC is defined.
2016-03-17 09:39:10 -07:00
David Garske
bda69decc1
Fix to reduce stack usage in the hash-based random number generator health tests when WOLFSSL_SMALL_STACK is defined.
2016-03-16 17:04:07 -07:00
toddouska
46a01c29d8
Merge pull request #350 from JacobBarthelmeh/master
...
check for invalid RSA OAEP with SHA512 test case
2016-03-16 16:25:13 -07:00
Jacob Barthelmeh
2dd5efd969
sanity check for RSA key size and hash digest size
2016-03-16 15:25:52 -06:00
Jacob Barthelmeh
4c3ddac23c
catch invalid test case of RSA-OAEP and fix cast
2016-03-16 14:51:25 -06:00
David Garske
473ea567bd
Refactor of the ChaCha hard coded variables.
2016-03-16 13:36:44 -07:00
David Garske
0683ecb727
Fixed FreeCRL issue with strdup memory. Added additional checks for WOLF_AES_CBC and WOLF_AES_COUNTER. Disabled memory tracker by default for wolfCrypt test and benchmark. Updated README to better document Linux Binutils LD bug workaround.
2016-03-16 09:41:19 -07:00
David Garske
f0ea9d747f
Fix possible positive return value for random_rng_test. Removed reference to nrf51_aes_decrypt, which is not supported, and added compile error for it. Corrected ecc_test_raw_vector return code checking. Cleanup in InitMemoryTracker.
2016-03-15 18:33:24 -07:00
David Garske
bf058ef1b9
Fixed Jenkins error reports for mem_track msg, incorrect #ifdef in aes_test and ecc_test_raw_vector response code checking. Fixed C89 compliance with wc_AesSetKey. Fixed nrf_drv_rng_init response checks in RNG code. Reverted comment change in AES. Fixed nRF51 AES CBC Encrypt support. Added response code checking for nrf51_aes_set_key.
2016-03-15 17:18:03 -07:00
David Garske
a38183b816
Port for Nordic nRF51 RNG, RTC and AES. Added RNG test for wc_RNG_GenerateBlock 0's check even if HAVE_HASHDRBG is enabled. Added NIST test vectors for ECC P-256, P-384 and P-521. Added helpful debug message in ECC import if issue finding ecc_sets[] for curve. Moved memory tracker into separate file and added support for it to wolfcrypt test and benchmark. Added Ed255519/Curve25519 options for granular control of sign, verify, shared secret, import and export. Added AES options for max key size (AES_MAX_KEY_SIZE), no decrypt (NO_AES_DECRYPT) and no CBC (NO_AES_CBC).
2016-03-15 13:58:51 -07:00
Jacob Barthelmeh
db758dc98b
update test script, fall back to cert name search, fix der free
2016-03-12 09:37:32 -07:00
Jacob Barthelmeh
060e278559
Merge branch 'master' of https://github.com/wolfSSL/wolfssl into Certs
2016-03-11 23:48:39 -07:00
Jacob Barthelmeh
3976a3e2f2
K64F RNGA register
2016-03-10 14:35:55 -07:00
David Garske
8e8ee45828
LeanTLS: Fixed issue with GetCA, GetCAByName and PickHashSigAlgo with HAVE_ECC, NO_RSA and NO_CERTS defined. Added new "--enable-leantls" option, which enables TLS 1.2 client only with ECC256, AES128 and SHA256 (no RSA, DH, DSA, MD4, MD5, SHA, PSK, PWD, CERTS, DES3, Error Strings, ARC4, Coding, Memory or File System).
2016-03-08 08:35:28 -08:00
David Garske
b549c81337
Fix the WOLFSSL_SEP (--enable-sep) build scenario where extCertPoliciesNb is not available.
2016-03-07 14:49:24 -08:00
David Garske
05fb648747
Remove white-space.
2016-03-07 14:33:22 -08:00
David Garske
9b79d8643e
Added checks for total length and the cert policy OID len to make sure they don't exceed buffer.
2016-03-07 14:20:37 -08:00
David Garske
dee3645c4e
Fixed bug with ASN.1 X509V3 Certificate Policy extension parsing. Bug had to do with parsing when OID contains multiple items such as example 2 below. The wolfssl.com server key now contains a URL in the certificate policy " https://secure.comodo.com/CPS0 ", which wasn't being parsed over correctly. Also cleanup to use loop instead of duplicate code.
...
Example 1:
30 12
30 06 06 04 55 1D 20 00
30 08 06 06 67 81 0C 01 02 01
Result:
2.5.29.32.0
2.23.140.1.2.1
Example 2:
30 46
30 3A 06 0B 2B 06 01 04 01 B2 31 01 02 02 07
30 2B 30 29 06 08 2B 06 01 05 05 07 02 01 16 1D 68 74 74 70 73 3A 2F 2F 73 65 63 75 72 65 2E 63 6F 6D 6F 64 6F 2E 63 6F 6D 2F 43 50 53
30 08 06 06 67 81 0C 01 02 01
Result:
1.3.6.1.4.1.6449.1.2.2.7
2.23.140.1.2.1
2016-03-07 13:40:25 -08:00
Jacob Barthelmeh
05d2cec7c1
addition to api tests and refactor location of trusted peer cert check
2016-03-02 11:35:03 -07:00
Jacob Barthelmeh
7df22ee210
Trusted peer certificate use
2016-03-02 11:22:34 -07:00
toddouska
0c45a7a028
Merge pull request #317 from dgarske/DerBufferRefactor
...
Refactor of the DER buffer handling
2016-02-25 09:35:50 -08:00
kaleb-himes
16dac5597f
prevent buffer overflows if sigSz > MAX_ENCODED_SIG_SZ
2016-02-24 16:08:54 -07:00
kaleb-himes
4858a65984
Always execute wc_InitRsaKey if we are always going to execute wc_FreeRsaKey
2016-02-24 14:42:07 -07:00
David Garske
3fe5ee1a7c
Refactor of the DER buffer handling. Added new DerBuffer struct that includes the type and heap ptr. Added new InitDer, AllocDer and FreeDer functions. Cleanup of some missing "heap" args on XMALLOC/XFREE. In FreeDer uses ForceZero if type is private key.
2016-02-18 22:42:15 -08:00
toddouska
3d8f91d418
Merge pull request #302 from dgarske/EccOnlyNoSignVerify
...
New ECC and ASN build options for reduce build size options
2016-02-15 12:13:43 -08:00
JacobBarthelmeh
7de352a0e9
Merge pull request #311 from dgarske/FixSkipObjectIdWarn
...
Fixes warning with SkipObjectId defined but not used.
2016-02-12 15:04:04 -07:00
David Garske
a969dd8efd
Fixed "error: unused function 'StoreRsaKey'" with NO_ASN_TIME and RSA enabled.
2016-02-12 13:19:58 -08:00
David Garske
aeaac15682
Fixed compile errors in signature.c if ECC on but ECC sign/verify disabled. Added new NO_ASN_TIME option to reduce ASN size for space constrained or missing RTC. Added check to make sure ASN is enabled if ECC sign/verify is enabled.
2016-02-12 13:16:39 -08:00
David Garske
f328c6bdf7
Fixes warning with SkipObjectId defined but not used.
2016-02-12 12:34:22 -08:00
David Garske
08c663a4ac
Added new CUSTOM_RAND_GENERATE_BLOCK option that allows override and disabling of the HASHDRBG for customers who have a HW RNG they would like to use instead.
...
Examples:
"./configure --disable-hashdrbg CFLAGS="-DCUSTOM_RAND_GENERATE_BLOCK= custom_rand_generate_block".
OR
/* RNG */
//#define HAVE_HASHDRBG
extern int custom_rand_generate_block(unsigned char* output, unsigned int sz);
2016-02-12 11:59:51 -08:00
David Garske
4872f2bc33
Added the following ECC optional config defines: HAVE_ECC_SIGN, HAVE_ECC_VERIFY, HAVE_ECC_DHE, HAVE_ECC_KEY_IMPORT and HAVE_ECC_KEY_EXPORT. Still working through issues with using ECC sign/verify with ASN disabled. Added documentation to top of ecc.c for all the ECC define options.
2016-02-12 11:07:50 -08:00
David Garske
8d0d5a3f90
Fixes so ECC only build works. Fixes so ECC enabled with ASN disabled works and will prevent ECC sign/verify.
2016-02-10 08:53:09 -08:00
toddouska
014740eda0
Merge pull request #289 from dgarske/SigHashFixes
...
Fixes/improvements to the signature and hash wrappers:
2016-02-09 09:23:18 -08:00
David Garske
09615c01cc
Updated the naming for the new encoding DER signature enum and function.
2016-02-08 12:04:38 -08:00
David Garske
cb3a9cc348
Removed the execute bit on all .c, .h, and .cs files.
2016-02-08 09:45:31 -08:00
David Garske
d5f410523a
Fixed possible memory leak on signature wrapper ASN encode and corrected the maximum header size. Added new MAX_ENCODED_HEADER_SZ which is the maximum encoded ASN header size and update asn.c to use it. Added comment about key size sanity check. Renamed wc_SignatureRsaEncode to wc_SignatureAsnEncode.
2016-02-05 16:01:42 -08:00
David Garske
e031d2fa06
Removed the execute bit on all .c files. These were inadvertently set in PR #293 due to editing files through Windows VMWare shared folder.
2016-02-05 14:25:43 -08:00
JacobBarthelmeh
a4f1138e5b
Merge pull request #293 from dgarske/WinWarnFixes
...
Fixes several warnings that were seeing building with Visual Studio 2…
2016-02-05 13:20:22 -07:00
JacobBarthelmeh
25959bfb62
Merge pull request #279 from dgarske/CustRandGenSeed_OSArg
...
Added new CUSTOM_RAND_GENERATE_SEED_OS macro
2016-02-05 11:18:18 -07:00
David Garske
be99fcff43
Fixed typo in wc_SignatureGetSize causing error.
2016-02-05 07:32:47 -08:00
toddouska
ae19b7a272
Merge pull request #290 from dgarske/PemPubKey_CertExt_Fixes
...
Public key PEM to DER fixes
2016-02-04 15:19:15 -08:00
David Garske
faf590eb22
Fix for "warning: Value stored to 'ret' is never read". Now explicitly set SIG_TYPE_E in each case. Fixed wc_SignatureGetSize so it will return SIG_TYPE_E for unsupported type scenario.
2016-02-04 12:49:39 -08:00
David Garske
bc059e12c2
Cleanup to remove trailing whitespace and convert tabs to spaces.
2016-02-04 12:31:08 -08:00
David Garske
2257c1dcef
Fixes several warnings that were seeing building with Visual Studio 2015. Also noticed issue with "struct Options" in internal.h for the bit flags that was causing split due to type difference (byte vs. word16).
2016-02-04 11:30:48 -08:00
toddouska
d39c6a6e13
Merge pull request #287 from JacobBarthelmeh/fast-rsa
...
Force Zero of data when done
2016-02-04 10:59:21 -08:00
Jacob Barthelmeh
42219a327a
refactor ForceZero of memory to gain performance
2016-02-04 10:31:05 -07:00
David Garske
f3399b6578
Fixes/improvements to the signature and hash wrappers:
...
Fixed output buffer to wc_RsaSSL_Verify so its min size is the key size (needed for inline operations).
Fixed the signature wrapper return codes when using RSA so 0 indicates success.
Fixed signature wrappers use of wc_HashGetDigestSize to return the error code result.
Changed enum wc_HashType and enum wc_SignatureType so all values always exist.
Added new "wc_HashGetOID" which returns the OID for an enum wc_HashType.
Added new "WC_SIGNATURE_TYPE_RSA_W_ENC", that adds the encoded ASN header to the digest using wc_EncodeSignature for RSA signatures.
Added new SIG_TYPE_E and HASH_TYPE_E error types for explicit reporting of sig/hash type not available.
2016-02-03 15:07:56 -08:00
David Garske
a6b7c00c9c
Fix so WOLFSSL_CERT_EXT can be defined without WOLFSSL_CERT_GEN. Added new WOLFSSL_PUB_PEM_TO_DER to allow the public key PEM to DER functions to be available without CERT_GEN or CERT_EXT. Fix to add NO_FILESYSTEM check around wolfSSL_PemPubKeyToDer in ssl.h. Cleanup in coding.h for the #if check.
2016-02-03 14:58:46 -08:00
toddouska
8edf38632b
Merge pull request #284 from JacobBarthelmeh/DH
...
fixed point DH operations
2016-02-02 08:31:30 -08:00
Jacob Barthelmeh
cad6a08f10
comment for clarifying table of DH sizes
2016-02-01 17:11:01 -07:00
Jacob Barthelmeh
d0f8132cdc
forcing sensitive memory to be all zeros when done with it
2016-02-01 10:45:09 -07:00
John Safranek
b6017c59ba
Merge pull request #275 from dgarske/WolfErrorTypo
...
Fixed spelling errors
2016-02-01 09:00:10 -08:00
John Safranek
6fd5579130
Merge pull request #281 from toddouska/math-rsa-fix
...
fix normal math off by one loop error in fast_s_mp_mul_high_digs
2016-01-29 16:59:36 -08:00
David Garske
f8876854f4
Spelling fixes in comments and error strings (ALGO_ID_E, ASN_TIME_E and WOLFSSL_ERROR function).
2016-01-29 16:13:09 -08:00
toddouska
3f87d28190
Merge pull request #280 from JacobBarthelmeh/master
...
Update ChaCha20-Poly1305 cipher suites
2016-01-29 14:12:53 -08:00
toddouska
fa25e5d09d
fix normal math off by one loop error in fast_s_mp_mul_high_digs
2016-01-29 13:54:41 -08:00
Jacob Barthelmeh
9a5ad356a6
fixed point DH operations
2016-01-29 10:31:49 -07:00
David Garske
2bc0ae05b5
Added new CUSTOM_RAND_GENERATE_SEED_OS macro to allow custom random generation, which includes the OS_Seed. Opted to create new macro instead of modifying existing CUSTOM_RAND_GENERATE_SEED.
2016-01-28 09:31:36 -08:00
David Garske
fa64abd83e
Fix for deleted USER_TIME gmtime forward declaration. Fix to make sure XGMTIME maps to gmtime just as previous code did.
2016-01-27 13:20:06 -08:00
Jacob Barthelmeh
7d71d756f3
update ChaCha20-Poly1305 to most recent RFCs
2016-01-27 14:03:05 -07:00
David Garske
fadd97de3a
Moved the forward declarations until after the struct tm and time_t have been defined.
2016-01-27 11:17:54 -08:00
David Garske
5c4a3462ee
Cleanup of the time macros in asn.c to allow expanded use of wolf "struct tm", "time_t" and "gmtime". Cleanup of the io.c socket includes for clarity. Cleanup trailing spaces in io.c and asn.c.
2016-01-26 13:47:01 -08:00
Chris Conlon
0801eeac8d
update support for Freescale KSDK 1.3.0
2016-01-25 10:41:26 -07:00
Jacob Barthelmeh
63d1f81fb1
cast XMALLOC to byte pointer
2016-01-21 09:05:19 -07:00
Jacob Barthelmeh
197f25f135
use type enum wc_HashType rather than int
2016-01-20 15:31:08 -07:00
Chris Conlon
04a1bf0086
Merge pull request #265 from toddouska/cov-tfm
...
fix coverity report for fp_mont reduce where m is half max size, not …
2016-01-19 10:30:09 -07:00
toddouska
33a71fb456
Merge pull request #264 from JacobBarthelmeh/OAEP
...
help out clang static analyzer
2016-01-18 15:31:18 -08:00
toddouska
8e97145682
fix coverity report for fp_mont reduce where m is half max size, not currently called that big but let's allow
2016-01-18 13:53:01 -08:00
John Safranek
93e454f09a
Merge pull request #259 from dgarske/UnusedParamError
...
Fixes unused argument build error seen on CrossWorks (Issue #255 ).
2016-01-18 09:40:30 -08:00
Jacob Barthelmeh
268515018d
help out clang static analyzer
2016-01-18 10:22:12 -07:00
toddouska
81d26b83c3
Merge pull request #246 from JacobBarthelmeh/OAEP
...
RSA OAEP padding
2016-01-15 11:34:37 -08:00
Jacob Barthelmeh
476355b5bf
fix potential memory leak on fail
2016-01-14 23:58:30 -07:00
David Garske
07c79f9dc3
Fixes unused argument build error seen on CrossWorks (Issue #255 ).
2016-01-14 21:09:01 -08:00
Jacob Barthelmeh
008612ec70
OAEP w/ smallstack and fixs
2016-01-14 14:26:17 -07:00
Moisés Guimarães
10df002ec5
fixes srp build without sha512
2016-01-12 15:42:58 -03:00
lchristina26
ae92a41512
Update fork to upstream: Merge https://github.com/wolfSSL/wolfssl
2016-01-08 11:59:35 -07:00
lchristina26
efae688120
add entropy steps for VxWorks
2016-01-08 11:43:05 -07:00
kaleb-himes
38392ce56a
safeguards to avoid de-referencing a null pointer
2016-01-06 10:12:52 -07:00
John Safranek
ef95000236
Merge pull request #243 from kaleb-himes/scan-build-fixes2
...
Avoid unused variable warnings with dead store in AES_GCM_decrypt
2016-01-05 12:30:32 -08:00
Jacob Barthelmeh
d815affe83
RSA OAEP padding
2016-01-05 10:56:15 -07:00
kaleb-himes
e4c4c5a73a
white space change removed
2016-01-05 07:37:31 -07:00
kaleb-himes
699597bb21
execute undef before checking and return
2016-01-05 07:35:28 -07:00
kaleb-himes
fcfef59c43
check err after set
2016-01-04 17:04:10 -07:00
kaleb-himes
023052eaf1
Avoid unused variable warnings with dead store in AES_GCM_decrypt
2016-01-04 15:40:10 -07:00
lchristina26
4834e2d5cf
updates for VxWorks simulator entropy
2016-01-04 14:33:30 -07:00
toddouska
99539b8875
fix aesni 192bit key expansion over read of 64bits
2015-12-31 11:19:47 -08:00
Moisés Guimarães
ec9d23a9c3
Merge branch 'csr'
2015-12-28 19:38:04 -03:00
Chris Conlon
b153ac002c
fix Visual Studio warnings
2015-12-21 16:11:02 -07:00
toddouska
ed8a50ce69
Merge pull request #211 from lchristina26/master
...
GenerateSeed() Function for VxWorks compatibility
2015-12-15 15:59:20 -08:00
lchristina26
3113c8db9b
update VXWORKS GenerateSeed() - no printf, error return
2015-12-15 16:52:21 -07:00
lchristina26
6ab9c87f13
add comment to VXWORKS GenerateSeed()
2015-12-11 13:41:05 -07:00
lchristina26
e2456214f4
update random.c for better entropy with VXWORKS
2015-12-11 13:22:33 -07:00
dgarske
af4eb590a6
Merge pull request #214 from aburks/IS-213-AESFailsWithFreescaleCAU
...
Issue #213 : AES fails with Freescale (mm)CAU
2015-12-10 17:08:52 -08:00
Andrew Burks
03a643cc35
Issue #215 : Signature module uses old RNG. Use the new WC_RNG construct instead in order to prevent conflicts with board support packages.
2015-12-10 17:04:48 -08:00
Andrew Burks
bc54b18cad
Issue #213 : AES fails with Freescale (mm)CAU.
2015-12-10 16:55:49 -08:00
David Garske
89518ad445
Cleanup of the leading zero detection in wc_RsaKeyToDer and wc_DsaKeyToDer to use existing mp_leading_bit function.
2015-12-10 10:48:50 -08:00
lchristina26
cb73064c10
format changes to VXWORKS GenerateSeed()
2015-12-09 13:22:13 -07:00
lchristina26
38ac17864e
added entropy, wc_GenerateSeed() for VxWorks
2015-12-09 13:18:42 -07:00
John Safranek
6c70e3233d
fix bug where unknown OIDs were treated as parsing errors rather than ignored
2015-12-05 13:14:29 -08:00
David Garske
89a65b0aa0
Fixed compile error in signature.c with g++. Corrected comment.
2015-12-04 15:22:06 -08:00
Jacob Barthelmeh
fea769816c
ed25519 verify function return descriptive error value
2015-12-02 15:55:40 -07:00
toddouska
e08fa67a32
fix clang --disable-memory issues
2015-12-02 14:40:32 -08:00
Jacob Barthelmeh
f7fac88e8b
Don't error out when calling ippInit to find optimized IPP library, just fall back to use standard
2015-11-24 17:28:43 -07:00
Jacob Barthelmeh
da127dfb17
warrning for unused function in user-crypto / fast-rsa mode
2015-11-24 13:18:39 -07:00
toddouska
91b7cddb7c
better error checking on condition variable operations, cleanup
2015-11-23 15:13:36 -08:00
John Safranek
d248a7660c
ASN: when getting OID from stream, check the summed value; added utility to skip OID; setting OID uses same strings as getting, separated NULL tag from the OID
2015-11-21 12:00:34 -08:00
toddouska
2698736aaf
fix missing XMALLOC/FREE types
2015-11-19 10:20:28 -08:00
David Garske
cdc830c1cc
Fixes for build errors with new signature and hash wrapping functions. Disabled MD2/4 hash wrapping.
2015-11-17 10:15:36 -08:00
toddouska
5e80bf46bf
Merge branch 'master' of github.com:wolfssl/wolfssl
2015-11-16 13:20:26 -08:00
toddouska
ca7956b50d
update cavium nitrox port to wolfssl
2015-11-16 13:20:19 -08:00
toddouska
4e7935f5f5
Merge pull request #188 from dgarske/HashSignVerifyWrappers
...
New hash and signature wrapper functions:
2015-11-16 12:16:55 -08:00
David Garske
103f984421
Cleanup of the signature wrapper error cases to be more explicit.
2015-11-16 11:54:23 -08:00
David Garske
b870bad63e
Added new "SIG_VERIFY_E" type for "wc_SignatureVerify" failure. Added argument checking on new signature wrapper functions. Added new "NO_SIG_WRAPPER" to optionally disable wrappers to reduce code size.
2015-11-13 12:22:32 -08:00
toddouska
5c96be4d19
fix idea conversion warnings
2015-11-12 15:14:00 -08:00
toddouska
261fedd906
idea_mult() now works on 16,32, AND 64bit systems
2015-11-12 10:32:35 -08:00
toddouska
d9cb1cfbe1
fix idea_mult() for 16 and 32bit systems
2015-11-12 10:22:31 -08:00
David Garske
f692c8cefb
New hash and signature wrapper functions:
...
1. Added new hash wrapper function "wc_Hash". Hash functions support Md# and SHA# using "enum wc_HashType". Added new "wc_HashGetDigestSize" function to get hash size (returns 0 if not supported).
2. Added new signature wrapper functions "wc_SignatureGenerate" and "wc_SignatureVerify" to perform hash then sign/verify of bytes. Signature functions support ECC and RSA using "enum wc_SignatureType". Added new "wc_SignatureGetSize" function to get the signature size using the key (returns 0 if not supported).
2015-11-12 09:36:14 -08:00
Takashi Kojo
302fd05edd
Change "//" to "/* */" comment. Removed unreferred functions.
2015-11-12 15:31:58 +09:00
kaleb-himes
c3a249009f
allow openssl extra tests if configuration supports
2015-11-10 15:29:05 -07:00
toddouska
906be9fb20
add printf to logger w/o callbacks w/ WOLFSSL_LOG_PRINTF
2015-11-09 14:55:09 -08:00
toddouska
417f85da86
use gmtime_r if there
2015-11-09 14:48:39 -08:00
David Garske
05f4c83b98
Optimizations to improve random number generation performance and provide additional ways to implement custom versions of custom random handlers. Added new "CUSTOM_RAND_TYPE" to define the datatype for the "CUSTOM_RAND_GENERATE" function. Added new "CUSTOM_RAND_GENERATE_SEED" option for anyone who wants to implement their own equivalent "wc_GenerateSeed()" function. Added generic FREESCALE_RNGA and FREESCALE_RNGB options.
2015-11-05 22:20:11 -08:00
Moisés Guimarães
dccbc1cdd4
fixes ocsp nonce extension decoding;
...
enables use of ocsp nonce extension in the client example.
2015-11-05 11:45:42 -03:00
Moisés Guimarães
62210186c7
fix code logic to single if
2015-11-05 11:45:41 -03:00
toddouska
17c9494a2d
fix gfmul intel calling convention
2015-11-04 13:26:38 -08:00
toddouska
124f1f8ce7
switch gfmul to intel syntax in aes_asm.asm
2015-11-04 11:55:04 -08:00
John Safranek
23ba31cbdd
1. Fixed bug where AES-GCM IVs had to only be 12 bytes. Now
...
accepts any length.
2. Added test case for AES-GCM using an 60 byte IV.
3. AesGcmSetKey doesn't calculate H value in AES-NI mode.
2015-11-03 16:47:42 -08:00
toddouska
44165371bc
timediff fixup
2015-11-03 14:15:15 -08:00
toddouska
69d5f2e43c
Merge branch 'DateFormat' of https://github.com/kojo1/wolfssl into timediff
2015-11-03 14:04:14 -08:00
toddouska
8d4d9ebe12
fix jenkins ec 56
2015-11-03 11:30:56 -08:00
toddouska
54a0a3370a
fix wolfSSL_Init to only call new wolfCrypt_Init() once
2015-11-02 12:35:43 -08:00
toddouska
a1d1155b0c
add missing error strings
2015-11-02 12:18:12 -08:00
Moisés Guimarães
21d70636dc
Merge branch csr into 'master'
2015-11-02 15:51:01 -03:00
John Safranek
f8aeac608c
1. Add C NI-intrinsic AES-GCM encrypt and decrypt.
...
2. Fix error string for wolfcrypt test of GMAC.
3. Add AES-GCM Decrypt to benchmark.
2015-10-30 16:03:26 -07:00
Takashi Kojo
d741d4cddc
Adding UTC Time Differential in ValidateDate
2015-10-30 11:26:54 +09:00
David Garske
d31cec0df0
Fixes initialization of the Crypto HW protection, which could leak a mutex if two calls to "wolfSSL_CryptHwMutexLock()" occurred at the same time prior to calling "wolfSSL_CryptHwMutexInit()". Fixes #164 .
2015-10-28 23:07:52 -07:00
Jacob Barthelmeh
dc31b9238f
wolfcrypt init
2015-10-23 11:55:17 -06:00
Jacob Barthelmeh
c132f9887e
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-10-19 13:56:39 -06:00
Jacob Barthelmeh
ee5a11b8d9
Add Intel IPP crypto for RSA
...
add user-crypto makefile
update README for IPP crypto
place user crypto in wolfcrypt and use autotools
adjust distributed files
move openssl compatibility consumption
auto use IPP RSA -- IPP directory containing shared libraries local
return value of wolfSSL_BN and formating of debug
openssh testing
make sure IPP not built when fips is
ipp init to select correct optimizations -- static libraries on linux -- fast-rsa disabled by default
try to only set library once
only use static IPP if fast rsa is enabled
make print out for user crypto more pretty
2015-10-19 13:51:49 -06:00
toddouska
56af895c68
make sure pubkey in ecc private key has size
2015-10-14 10:48:37 -07:00
David Garske
67861bb222
Added crypto hardware mutex capabilities to wolfcrypt/wc_port. Added optional define "WOLFSSL_CRYPT_HW_MUTEX" to override use of hardware mutex. Enabled hardware mutex protection for Freescale MMCAU. Cleanup of the AES FREESCALE_MMCAU implementation to use wc_AesEncrypt/wc_AesDecrypt wrappers. Fixes #154 .
2015-10-13 12:36:24 -07:00
David Garske
16ba3138a1
Added support for the Rowley CrossWorks for ARM IDE. Added new "WOLFSSL_ROWLEY_ARM" setting define. Added a sample solution (wolfssl.hzp) for building the WolfSSL library and sample test/benchmark applications. The sample applications are written for the Freescale Kinetis K64, but easily be customized for any Kinetis or further extended to support other ARM micro-controllers.
2015-10-06 10:45:46 -07:00
toddouska
ad51d4ba09
make sure fast invmod lowers result in too big case
2015-10-02 15:38:22 -07:00
Jacob Barthelmeh
10276944d3
return value on AES CCM encrypt
2015-10-02 11:40:47 -06:00
Jacob Barthelmeh
dd262fe939
fix on AES CCM nonce size
2015-10-01 17:42:03 -06:00
toddouska
b403036c77
Merge branch 'FreeRTOS_TCP' of https://github.com/kojo1/wolfssl into freertos-tcp
2015-09-28 16:13:21 -07:00
toddouska
28912621ec
switch idea invmod too big to subtraction
2015-09-28 15:24:32 -07:00
toddouska
292e05dc75
switch memset / memcpy to XMEM in src and wolfcrypt/src proper
2015-09-28 11:37:00 -07:00
toddouska
cab37ef24e
Merge https://github.com/lfcrypto/wolfssl into idea
2015-09-28 09:32:55 -07:00
Ludovic FLAMENT
c7193672a5
fix IDEA modular inverse, add CBC tests with random values
2015-09-27 15:05:01 +02:00
Takashi Kojo
0a530c1b70
#pragma worning for Visual Studio
2015-09-26 08:49:03 +09:00
Takashi Kojo
f450ac0684
settings.h: GenSeed for test only option
2015-09-26 08:03:49 +09:00
toddouska
8c01c8d8e1
Merge branch 'master' of https://github.com/lfcrypto/wolfssl into idea
2015-09-25 15:42:31 -07:00
Ludovic FLAMENT
71576aef14
fix bad computed values
2015-09-25 23:52:08 +02:00
Takashi Kojo
0c95a5e940
Adding FreeRTOS TCP support, FREERTOS_TCP option
2015-09-25 10:51:35 +09:00
Ludovic FLAMENT
ae6b4be135
fix idea_mult
...
move reg and tmp buffer to word32
2015-09-24 22:55:11 +02:00
toddouska
d669fc28c2
add idea benchmark, cleanup
2015-09-23 14:42:48 -07:00
toddouska
c4e1bdcb29
Merge branch 'master' of https://github.com/lfcrypto/wolfssl into idea
2015-09-23 12:03:58 -07:00
toddouska
31439e2baa
remove unneeded tmp from plain DES cbc decrypt
2015-09-23 11:01:22 -07:00
Ludovic FLAMENT
f68400da40
add IDEA cipher (ECB and CBC mode)
...
add support of SSL_RSA_WITH_IDEA_CBC_SHA cipher suite (SSLv3, TLS v1.0 and TLSv1.1)
2015-09-23 16:16:39 +02:00
toddouska
91fdc67571
fix cert_ext statics not used with sep
2015-09-14 13:25:15 -07:00
Ludovic FLAMENT
08d1f33d30
remove snprintf
...
use strtok thread safe version
add output size for sanity checks in some functions
2015-09-12 23:17:53 +02:00
toddouska
de64092a70
Merge branch 'master' of github.com:wolfssl/wolfssl
2015-09-11 15:53:26 -07:00
toddouska
989f5ffb24
handle gmtime failures
2015-09-11 15:49:55 -07:00
toddouska
5654d4beee
fix no_filesystem with certext
2015-09-11 14:04:40 -07:00
toddouska
21cf0e437e
add --enable-cryptonly build option
2015-09-10 16:24:25 -07:00
toddouska
108679970a
allow cert_ext to work w/o openssl extra
2015-09-08 16:44:13 -07:00
Ludovic FLAMENT
25f24ed34f
fix to build on Fedora 32bits and Windows
2015-09-08 08:49:29 +02:00
Ludovic FLAMENT
b685dfb2e7
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-09-07 10:23:46 +02:00
Ludovic FLAMENT
d2ea6f7ef0
Add support for :
...
- PEM public key loading
- set/get KeyUsage in CSR and X.509
- set/get SKID in CSR and X.509
- set/get AKID in X.509
- set/get two Certificate Policies OID in X.509
2015-09-07 09:51:21 +02:00
Moisés Guimarães
12bf9b4430
fixes conflict with reserver names used as variable names;
...
adds NOT_COMPILED_IN error when trying to use SRP with a hash not compiled in.
2015-09-03 12:06:56 -03:00
Takashi Kojo
aaaebf6213
pkcs7 rolling back static values to auto
2015-09-02 08:59:04 +09:00
Chris Conlon
be5ac590b7
Freescale: Add KSDK FreeRTOS build, using fastmath
2015-09-01 15:37:11 -06:00
toddouska
ebea6145f6
change generice define to more specific for pkcs7 digest size
2015-09-01 13:33:26 -07:00
toddouska
31500d0d12
Merge branch 'MDK5' of https://github.com/kojo1/wolfssl into kojo-mdk5
2015-09-01 11:35:58 -07:00
toddouska
928d2b7caa
add build optional skip crl next date if missing
2015-08-31 17:02:15 -07:00
toddouska
a56a8a22e5
add idrect dev time
2015-08-31 15:02:41 -07:00
toddouska
f8445193a4
add idirect generate seed
2015-08-31 13:55:56 -07:00
toddouska
1368ae1fb1
add SHA512 signature creation
2015-08-31 13:51:52 -07:00
toddouska
756cff4cb4
add Rsa Public Key To Der, non FIPS mode
2015-08-31 13:29:22 -07:00
Takashi Kojo
18383d286a
fixed uITRON, uTKernel option
2015-08-30 10:25:09 +09:00
Takashi Kojo
dc68832dba
TIRTOS Semaphore_create error check
2015-08-30 08:36:33 +09:00
Takashi Kojo
122b2e9753
pkcs7: rolling back to static values
2015-08-29 22:02:23 +09:00
Takashi Kojo
f5ee6d616c
Merge remote-tracking branch 'origin/MDK5' into MDK5
2015-08-29 21:24:44 +09:00
Takashi Kojo
cf80a6f639
pkcs7: avoid initial value of pointer to auto value for embedded compilers
2015-08-29 21:22:30 +09:00
Takashi Kojo
572a8cfc11
hmac.c: fixed warning, statement is unreachable
2015-08-29 18:04:57 +09:00
Takashi Kojo
6ff9f96809
inline to INLINE
2015-08-29 14:07:55 +09:00
Takashi Kojo
539bc81682
blake2b: declaration after execution statements, for embedded compiler
2015-08-29 12:30:40 +09:00
Takashi Kojo
2a141f6a82
ed25519: fixed initial data to auto values for embedded compilers
2015-08-29 12:08:52 +09:00
Takashi Kojo
df2216d092
Fixed file access mode
2015-08-29 11:32:30 +09:00
Takashi Kojo
e459bb2e23
Fixed file access mode
2015-08-29 11:08:07 +09:00
toddouska
30067d4f59
Merge branch 'master' of github.com:wolfssl/wolfssl
2015-08-27 11:36:43 -07:00
toddouska
5e26a5c8fc
fix alt_ecc_size exptmod with negative numbers
2015-08-27 11:18:06 -07:00
Chris Conlon
5e95740d93
Freescale: Add KSDK Bare Metal build, TRNG support
2015-08-27 11:45:40 -06:00
toddouska
3814871f71
merge pull request #82 , suite b ecc key-gen
2015-08-27 10:31:22 -07:00
toddouska
3c614b5ba7
manual merge pull request #83 , ALT_ECC_SIZE fix
2015-08-27 10:18:00 -07:00
Ludovic FLAMENT
d49499df4c
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-08-20 13:40:12 +02:00
Ludovic FLAMENT
66e91beb2d
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-08-20 13:22:30 +02:00
Ludovic FLAMENT
c6ef29ac4c
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-08-19 08:18:05 +02:00
Ludovic FLAMENT
33595a0b3c
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-08-19 08:08:49 +02:00
toddouska
15995d1b2c
Merge branch 'TI_hash' of https://github.com/kojo1/wolfssl into kojo-ti
2015-08-18 12:27:57 -07:00
Takashi Kojo
82aaff9e43
Eliminate hash free in DoRound with non-TI case
2015-08-18 11:22:51 +09:00
toddouska
049a4c6460
fix C++ mode warnings
2015-08-17 16:47:39 -07:00
toddouska
c812379924
fix shadow decl in DsaKeyToDer()
2015-08-17 14:39:40 -07:00
Takashi Kojo
6376736129
HashFree for TI hash memory leak
2015-08-15 16:51:23 +09:00
toddouska
09b2da799f
Merge pull request #125 from kojo1/MDK4
...
MDK4 name change
2015-08-14 14:59:25 -07:00
Chris Conlon
34ac1a33f3
Freescale: Add support for KSDK (FREESCALE_KSDK_MQX)
2015-08-14 15:21:23 -06:00
Jacob Barthelmeh
0f9f4ea7e0
add macro blocks to make it easier on embedded devices and fix declaration after executable code
2015-08-14 09:58:44 -06:00
Ludovic FLAMENT
838a873cf1
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-08-13 10:20:47 +02:00
Takashi Kojo
6b1e351d4d
Merge branch 'master' into MDK4
2015-08-12 17:30:47 +09:00
Takashi Kojo
30f6bc1e27
MDK4, wolfSSL name change
2015-08-12 16:45:40 +09:00
toddouska
4cf78a2dab
Merge pull request #124 from jay/fix-mixed-declarations
...
fix mixed declarations by moving them to their block start
2015-08-10 14:31:05 -07:00
Chris Conlon
4b74e96542
remove stdio.h from dsa.c
2015-08-10 09:34:16 -06:00
Jay Satiro
e179da07d0
fix mixed declarations by moving them to their block start
...
In Visual Studio <= 2012 C99 mixed declarations aren't supported.
2015-08-10 01:54:25 -04:00
Chris Conlon
0cd893a51b
Freescale: Use new I/O where applicable
2015-08-07 16:22:31 -06:00
Chris Conlon
5d40c5f566
Rename RNG to WC_RNG for Freescale, add NO_OLD_RNGNAME define to completely remove RNG type usage
2015-08-07 11:53:19 -06:00
toddouska
ca41d52f68
Merge pull request #123 from lchristina26/master
...
move MBED GenerateSeed() due to duplicated code
2015-08-07 09:52:19 -07:00
toddouska
d3c8ff3488
Merge branch 'master' of github.com:wolfssl/wolfssl
2015-08-07 09:42:07 -07:00
toddouska
0a037d39ff
fix srp request; forcezero, check mp_init(), no leaks
2015-08-07 09:37:22 -07:00
lchristina26
9397b9e10f
move MBED GenerateSeed() due to duplicated code
2015-08-06 16:40:36 -06:00
Jacob Barthelmeh
590f3e1ca0
Merge pull request #113 from lfcrypto/wolfssl
...
add check of ret value
2015-08-06 09:01:12 -07:00
Ludovic FLAMENT
d050c10581
add support for curve 25519 and Ed25519 in OpenSSH
...
refactor curve25519 and Ed25519 code
fix warning in PEM_xxx_mem_xxx functions
2015-08-06 08:51:41 -07:00
toddouska
ba83b54616
Merge branch 'master' into srp
2015-08-04 15:49:04 -07:00
kaleb-himes
121a24ba15
update logic for ECC FASTMATH KEY-GEN and COMP-KEY
2015-08-04 15:11:01 -06:00
Moisés Guimarães
690cb14746
makes sure random values are safe.
2015-08-04 15:31:18 -03:00
Moisés Guimarães
12b8445153
adds key generation function callback option.
2015-08-04 13:36:58 -03:00
Moisés Guimarães
f31c32bea2
adds docs using doxygen style.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
1d99bd3339
removes u from srp struct.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
53224281d2
adds proof getter and verifier for both sides.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
490d063dec
adds key computation.
...
removes unnecessary fields from the srp struct.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
ba0c75011b
adds secret computation.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
6ee788277f
adds tests to SrpSetPassword(), SrpSetVerifier(), SrpGetVerifier();
...
adds SrpGenPublic() and SrpSetPrivate() with unit tests;
fixes k with left pad at g;
adds new error SRP_CALL_ORDER_E to force the functions to be called in the right order.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
6d5efccc55
finishes SrpSetPassword(), SrpSetVerifier(), SrpGetVerifier();
...
updates client_proof during SrpSetParams();
2015-08-04 01:07:24 -03:00
Moisés Guimarães
8b23b86659
Adds hash type directly inside SrpHash and removes temp hash from Srp struct.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
119dd0250e
fixes field types in SRP structure;
...
adds new memory allocation type (DYNAMIC_TYPE_SRP);
improves wc_SrpInit;
adds wc_SrpTerm(), wc_SrpSetUsername(), wc_SrpSetParams(), wc_SrpSetPassword();
2015-08-04 01:07:24 -03:00
Moisés Guimarães
dfa956d227
adds wc_SrpInit() with unit tests.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
6d7b5bd2f8
adds srp files to build process.
2015-08-04 01:07:24 -03:00
Moisés Guimarães
daf01977a1
adds SRP client and server structures.
2015-08-04 01:07:24 -03:00
toddouska
08959624f2
fix ed25519 with external hash functions
2015-08-03 15:30:07 -07:00
Ludovic FLAMENT
409126a97c
add support for curve 25519 and Ed25519 in OpenSSH
...
refactor curve25519 and Ed25519 code
fix warning in PEM_xxx_mem_xxx functions
2015-08-01 18:28:18 +02:00
toddouska
16b0120028
fix build 267, base 1361 fp ecc w/ no memory
2015-07-31 11:57:35 -07:00
toddouska
c14398cb7a
fix build 267 case 1197, pwdbases -des3 warning
2015-07-31 11:40:14 -07:00
John Safranek
27371263b7
move variable declaration to beginning of block
2015-07-30 14:47:52 -07:00
toddouska
78cc76b3cd
move DES oneshot APIs out of des.[hc]
2015-07-30 12:51:33 -07:00
toddouska
011fdc1103
move AES oneshot calls out of aes.[hc]
2015-07-30 12:42:25 -07:00
toddouska
12ffa1b778
fix small stack with hash changes
2015-07-29 10:43:54 -07:00
toddouska
b8fac462cd
No oneshot Hash() in FIPS c files anymore
2015-07-28 16:55:58 -07:00
toddouska
e97a60c647
move wc_Sha512/384 Hash() outside of sha512.[hc]
2015-07-28 16:41:32 -07:00
toddouska
9d2b711796
add wc_Sha256Hash() outside of sha256.[hc]
2015-07-28 16:34:23 -07:00
toddouska
2f3b7b05ba
move wc_ShaHash() outside of sha.[hc]
2015-07-28 16:30:10 -07:00
toddouska
388d023df6
put rsa non public enums back into c file for FIPS
2015-07-28 09:29:47 -07:00
toddouska
8ff692b772
Merge pull request #109 from NickolasLapp/master
...
Fixed bug when getting PEM encoded sz of cert chain. Add idx check
2015-07-27 15:05:39 -07:00
toddouska
38fb8caec8
restore FIPS des3 build w/o opensslextra
2015-07-27 14:56:26 -07:00
Nickolas Lapp
b85637e06b
Fixed bug when getting PEM encoded sz. Add idx check
2015-07-27 10:43:49 -06:00
toddouska
4ba57a609c
Merge branch 'ludovic'
2015-07-24 15:39:54 -07:00
toddouska
0a975eaff9
fix valgrind warning mp_add_d
2015-07-24 15:34:56 -07:00
Nickolas Lapp
5780f4d5f7
stub notices. edited b64 encode size. err cert depth/sn
2015-07-24 16:30:16 -06:00
toddouska
45ef61e46f
fix warnings
2015-07-24 12:43:26 -07:00
Ludovic FLAMENT
9c2a85d9f6
fix compilation for 32 bits OS
2015-07-24 11:17:06 +02:00
Ludovic FLAMENT
8d7d803e58
add wc_DerToPemEx to restore compatibility API with wc_DerToPem
2015-07-24 07:50:29 +02:00
Ludovic FLAMENT
0054fe4a25
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
2015-07-23 14:37:58 +02:00
Ludovic FLAMENT
8951d72f03
Merge branch 'master' of https://github.com/wolfSSL/wolfssl
...
Fix DSA key generation
2015-07-23 13:24:20 +02:00
John Safranek
4cdece20fb
change SetCurve return type to int, as used
2015-07-22 11:52:42 -07:00
John Safranek
c169a113ae
for Windows build, clean up warnings and a couple variable declarations
2015-07-22 11:20:45 -07:00
Ludovic FLAMENT
349edd40c2
Add support for OpenSSH ssh-keygen tools
...
refactor existing code
2015-07-22 14:18:07 +02:00
toddouska
922df2cfb3
allow bigger rsa key gen w/o sanity check error on invmod()
2015-07-20 16:08:55 -07:00
JacobBarthelmeh
7d44ed3989
Merge pull request #97 from jschanck-si/libntruencrypt
...
Use updated drbg ntru functions from stable libntruencrypt api
2015-07-17 14:18:27 -06:00
toddouska
9b81e41856
merge pull request 96
2015-07-16 16:46:37 -07:00
John M. Schanck
53fb9188e7
Use ntru functions from stable libntruencrypt api
...
ntru_crypto_external_drbg_instantiate has been renamed
to ntru_crypto_drbg_external_instantiate in the 1.0.0
release of libntruencrypt. Made various other small changes
to build against libntruencrypt.
2015-07-16 15:43:50 -04:00
toddouska
5a00e4b72b
use full ivSz with ecc encrypt
2015-07-16 10:18:08 -07:00
Nickolas Lapp
96cf16848c
Stunnel Base Commit
2015-07-14 14:56:26 -06:00
toddouska
acdeb3d536
Merge https://github.com/lfcrypto/wolfssl into ludovic
2015-07-06 17:09:41 -07:00
Jacob Barthelmeh
304982a597
Big Endian System ChaCha20 counter, auto tests added for ChaCha20 counter
2015-07-06 15:29:53 -06:00
Ludovic FLAMENT
702dbcf570
align return code, coding style (tab-> space, line with 80 char), curve_idx validity
2015-07-05 20:10:43 +02:00
toddouska
1a853d277d
fix opensslextra w/o ecc ssh
2015-07-03 09:58:42 -07:00
toddouska
9b0c1499c3
fix opensslextra w/ dsa additions
2015-07-03 09:53:48 -07:00
toddouska
b183bdc009
fix ALT_ECC_SIZE in ssh mode
2015-07-02 13:48:58 -07:00
toddouska
9452d6cfb4
don't leak on bad verify decoding with extended API
2015-07-01 13:28:10 -07:00
toddouska
e164173562
fix null deference potential on new API
2015-07-01 12:51:19 -07:00
toddouska
1d663d3bff
merge conflict
2015-07-01 12:24:11 -07:00
John Safranek
8b324b94e9
removed some unused code due to an always true comparison
2015-06-25 11:21:33 -06:00
Takashi Kojo
309aadd3f3
TI-des3.c, type mismatch
2015-06-24 14:12:40 +09:00
Takashi Kojo
1feac72b62
check InitMutex
2015-06-24 11:47:58 +09:00
Takashi Kojo
a910daa886
fixed arm-none-eabi-gcc type check on AESIVSet, AESKey1Set
2015-06-24 11:06:38 +09:00