Commit History

Author SHA1 Message Date
  David Garske 6b3ff9bae2 Merge pull request #4459 from julek-wolfssl/missing-ext 2 years ago
  David Garske 0a26335243 Merge pull request #4446 from ejohnstown/dtls-sizing 2 years ago
  Juliusz Sosinowicz a6be157628 Gate new AKID functionality on `WOLFSSL_AKID_NAME` 2 years ago
  Juliusz Sosinowicz c162196b27 Add x509 name attributes and extensions to DER parsing and generation 2 years ago
  Juliusz Sosinowicz 894303be59 Make the `wolfSSL_GetMaxFragSize` parameter meaning consistent 2 years ago
  John Safranek 7cbfb27fa0 When adding cipherExtraData(), also account for TLSv1.3. 2 years ago
  John Safranek 9f3f9c53fd Remove debugging printfs. Added some guards around DTLS and AEAD only things. 2 years ago
  Juliusz Sosinowicz be3b6b47ef DTLS MTU fixes 2 years ago
  John Safranek 77ebd11781 Updating based on MTU. Debugging prints. 2 years ago
  John Safranek be2e7e25ac Change the calculation for the extra data size in a DTLS message when checking to see if it'll fit in an MTU. (ZD12983) 2 years ago
  David Garske c16f0db1b5 Fixes for handling `WC_PENDING_E` async responses in API unit test and examples. Resolves all issues with `--enable-all --enable-asynccrypt --with-intelqa=`. 2 years ago
  David Garske eb56b652ca Fix for async TLS v1.3 with multiple `WC_PENDING_E` on client_hello and server_hello processing. Fix for not aligned NUMA. 2 years ago
  John Safranek 75df6508e6 Add a read enable for private keys when in FIPS mode. 2 years ago
  Daniel Pouzzner e61d88657d WOLFSSL_ASYNC_CRYPT: in EccSharedSecret(), don't try to wolfSSL_AsyncInit() if there's no priv_key to supply an asyncDev; in RSA _ifc_pairwise_consistency_test(), disable async to force blocking crypto. 2 years ago
  Daniel Pouzzner e4d075de20 src/internal.c: FreeX509(): remove redundant free of x509->CRLInfo. 2 years ago
  Daniel Pouzzner 32349749a6 internal.c: SendServerKeyExchange(): check retval from wc_DhGetNamedKeyParamSize(). 2 years ago
  Daniel Pouzzner b93a18b34e src/internal.c: in SendServerKeyExchange() case diffie_hellman_kea, #ifdef HAVE_SECURE_RENEGOTIATION, enlarge buffers.serverDH_Pub.buffer to accomodate larger new key replacing smaller old key, whether or not ssl->namedGroup is set (copy-paste of existing in !ssl->namedGroup path). 2 years ago
  John Safranek f53a4db4e7 Unwind a few changes adding guards so it'll build with old FIPS. 3 years ago
  John Safranek 04ffd2ab45 Fixes: 3 years ago
  John Safranek 908ec9b14a Modify ffdhe to not return addresses. 3 years ago
  John Safranek df859d30f3 FIPS 140-3 3 years ago
  Juliusz Sosinowicz 57b9170ac0 Make NID's consistent 2 years ago
  John Safranek a0c7c079b8 Revert "Make NID's consistent" 2 years ago
  Sean Parkinson cdf72facbf Merge pull request #4429 from julek-wolfssl/fix-nids 2 years ago
  Sean Parkinson 6070981366 Merge pull request #4490 from dgarske/static_mem_unittest 2 years ago
  David Garske c027fffa92 Fix for CTX free heap hint issue. With openssl extra the `param` and `x509_store.lookup.dirs` are allocated at CTX init and if heap or static pool was used depends on `ctx->onHeapHint`. Added test case for this and inline code comment. 2 years ago
  David Garske f17187aad9 Fixes for static memory testing. Fix clang memory sanitizer warnings. 2 years ago
  Juliusz Sosinowicz 44d8ab20e1 #456 2 years ago
  Juliusz Sosinowicz 74cf332a8b #37 2 years ago
  Juliusz Sosinowicz 20473ba563 Make NID's consistent 2 years ago