Anthony Hu
|
82a900b438
Initial commit to add Dilithium NIST PQC winner.
|
1 year ago |
Stefan Eissing
|
4431438fb2
add QUIC support.
|
1 year ago |
Jacob Barthelmeh
|
8eaa85e412
update copyright year to 2022
|
1 year ago |
Anthony Hu
|
81def76b18
The NIST round 3 Falcon Signature Scheme integration.
|
2 years ago |
John Safranek
|
98b1e93429
Merge pull request #4402 from JacobBarthelmeh/Compatibility-Layer
|
2 years ago |
Anthony Hu
|
33cb823148
Remove legacy NTRU and OQS (#4418)
|
2 years ago |
JacobBarthelmeh
|
60aa7b9a62
compat layer adjustments, pseudo rand update, fix for peek with ASN1_R_HEADER_TOO_LONG
|
2 years ago |
David Garske
|
700b1c56c1
Improve CRL error codes. Add `--enable-crl=io` option. ZD 12791
|
2 years ago |
Daniel Pouzzner
|
1cbe696716
checkpoint: fully functioning demo via examples/server/ and unit.test (which produces a "filtered" error on a subtest when built --enable-wolfsentry).
|
3 years ago |
Jacob Barthelmeh
|
c729318ddd
update copyright date
|
3 years ago |
Hideki Miyazaki
|
e39477c531
initial implement SSL_get_early_data_status
|
3 years ago |
Juliusz Sosinowicz
|
8b934624f5
DTLS non-blocking scrwith example
|
3 years ago |
Sean Parkinson
|
76a35f2a77
TLS 1.3: Client with no certificate an error with define
|
3 years ago |
John Safranek
|
5d5aa129ca
When attempting to send a message with DTLS, if it is too large, return an error rather than splitting it across records. (ZD 10602)
|
3 years ago |
Sean Parkinson
|
614e675a00
Call secret callback when TLS 1.3 secrets generated
|
4 years ago |
Chris Conlon
|
45c5a2d39c
update copyright to 2020
|
4 years ago |
Eric Blankenhorn
|
b83804cb9d
Correct misspellings and typos from codespell tool
|
4 years ago |
Eric Blankenhorn
|
51d5abd63f
Clarify wolfSSL_shutdown error on subsequent calls
|
4 years ago |
Eric Blankenhorn
|
8c6c4e2432
Add unique error codes to verify failures
|
4 years ago |
cariepointer
|
2dafd2102c
Add Apache HTTP Server compatibility and --enable-apachehttpd option (#2466)
|
4 years ago |
Hideki Miyazaki
|
a37b604da9
addressed review comments
|
4 years ago |
John Safranek
|
246c444b93
Updates for v4.0.0
|
5 years ago |
John Safranek
|
b7663a940e
Trusted CA Key Indication Extension
|
5 years ago |
toddouska
|
6e1b05316d
Merge pull request #2104 from ejohnstown/renegotiation-testing
|
5 years ago |
John Safranek
|
65c72ddfe1
Reverted an earlier change to the renegotiation resumption. Still need
|
5 years ago |
John Safranek
|
7389553bd6
1. For secure renegotiation, remove the check of the peer certificate's
|
5 years ago |
Sean Parkinson
|
7aa5cd6f10
Support FFDHE in TLS 1.2 and below. Better TLS 1.3 version support.
|
5 years ago |
John Safranek
|
63f6c1d280
DTLS Nonblocking Updates
|
5 years ago |
Eric Blankenhorn
|
02ff19a6c4
Moving PRF to wolfcrypt
|
5 years ago |
David Garske
|
680a863054
Added support for building with certificate parsing only. `./configure --enable-asn=nocrypt`. Added new API for parsing PIV format certificates `wc_ParseCertPIV` with `WOLFSSL_CERT_PIV` build option. Added `wc_DeCompress_ex` with ability to decompress GZIP. Moved the ZLIB error codes into wolfCrypt.
|
5 years ago |