Historial de Commits

Autor SHA1 Mensaje Fecha
  Jacob Barthelmeh 9dcc48c8f7 update copyright to 2023 hace 1 año
  Sean Parkinson e4e53ab7ca Unit test: rework to be able to run API tests individually hace 1 año
  Daniel Pouzzner 5b260ac52e configure.ac: remove enable-quic from enable-all feature set; hace 2 años
  Stefan Eissing 4431438fb2 add QUIC support. hace 2 años
  Jacob Barthelmeh 8eaa85e412 update copyright year to 2022 hace 2 años
  Daniel Pouzzner ccc5952369 global fixup to check or explicitly ignore return values from failable library/system calls that weren't already being checked; hace 2 años
  Marco Oliverio 9d22e11776 misc.c: introduce w64wrapper to handle 64bit numbers hace 2 años
  kaleb-himes 7cccaa98b7 The minimal changes needed to add KCAPI support with fips-ready hace 2 años
  Juliusz Sosinowicz 894303be59 Make the `wolfSSL_GetMaxFragSize` parameter meaning consistent hace 3 años
  John Safranek 9bf36f329a Add sign/verify PCT to RSA key gen. hace 3 años
  John Safranek f49a09749e When building for FIPS, the unit test will run all the CASTs up front. hace 3 años
  John Safranek 976402e04b RNG Update hace 3 años
  Sean Parkinson 142c7a9892 cppcheck fixes and a config fix hace 3 años
  Daniel Pouzzner 05128968f6 fixes for null pointer accesses detected by clang sanitizer. also, gate SuiteTest() on !NO_WOLFSSL_CIPHER_SUITE_TEST in tests/unit.c, greatly reducing time to completion when not debugging cipher suites. hace 3 años
  Jacob Barthelmeh c729318ddd update copyright date hace 3 años
  Chris Conlon 45c5a2d39c update copyright to 2020 hace 4 años
  John Safranek 246c444b93 Updates for v4.0.0 hace 5 años
  David Garske 59a3b4a110 New tests for cert chains, alternate cert chains, trusted peer certs and DH prime cleanup: hace 5 años
  David Garske 2c3475c1d6 Added new build option `--enable-memtest` or `WOLFSSL_FORCE_MALLOC_FAIL_TEST` which enables random malloc failures for testing. This test supresses the `abort()` calls to detect seg faults. A new script `./scripts/memtest.sh` starts the test. If an issue is found it can be reviewed with the `./scripts/memtest.txt` log and reproduced using the seed printed at top of unit test as `--- RNG MALLOC FAIL AT 295---` and rerun using `./tests/unit.test 295`. hace 6 años
  Sean Parkinson a03c15e598 Allow NO_WOLFSSL_CLIENT/SERVER to compile and pass tests hace 6 años
  David Garske 911b6f95f8 Release v3.12.2 (lib 14.0.0). Updated copywright. hace 7 años
  David Garske c1640e8a3d Intel QuickAssist (QAT) support and async enhancements/fixes: hace 7 años
  David Garske da5825b94d Normal math speed-up to not allocate on mp_int and defer until mp_grow. Added memory tracker support to ./tests/unit.test. Fix memory leak with curve cache enabled, by adding to wolfSSL_Cleanup. hace 7 años
  David Garske 17a34c5899 Added asynchronous wolfCrypt RSA, TLS client and Cavium Nitrox V support. Asynchronous wolfSSL client support for "DoServerKeyExchange", "SendClientKeyExchange", "SendCertificateVerify" and "DoCertificateVerify". Fixes for async DTLS. Refactor of the wolf event and async handling for use in wolfCrypt. Refactor of the async device support so its hardware agnostic. Added Cavium Nitrox V support (Nitrox tested using SDK v0.2 CNN55XX-SDK with new configure "--with-cavium-v=/dir" option). Moved Nitrox specific functions to new port file "port/cavium/cavium_nitrox.c". RSA refactor to handle async with states. RSA optimization for using dpraw for private key decode. Use double linked list in wolf event for faster/cleaner code. Use typedef for wolf event flag. Cleanup of the async error codes. wolfCrypt test and benchmark support for async RSA. Asynchronous mode enabled using "./configure --enable-asynccrypt". If no async hardware is defined then the internal async simulator (WOLFSSL_ASYNC_CRYPT_TEST) is used. Note: Using async mode requires async.c/h files from wolfSSL. If interested in using asynchronous mode please send email to info@wolfssl.com. hace 8 años
  Chris Conlon 8f3e1165a1 add Whitewood netRandom client library support hace 8 años
  David Garske 993972162e MinGW fixes, server port assigning cleanup and ping test cleanup. Fixes issue with visibility detection with MinGW. The visibility.m4 script was not actually trying to call the hidden function, which caused MinGW to detect improperly that visibility was supported. Fix for bogusFile on Windows build. Fixes to build warnings for unused variable 'res' and signed/unsigned comparison for sizeof min(). Cleanup of the server side port assignment to allow use with Windows/MinGW/Cygwin. If Windows uses new GetRandomPort() function in test.h to get port in in the 49152 - 65535 range. If *nix then uses the tcp_listen returned port. Otherwise uses the default wolfSSLPort. Refactor of the ping test code to use common file and properly handle ping count differences (Windows "-c" vs. *Nix style "-n"). Workaround for MinGW and cyassl/options.h getting file permissions error. Added non-fatal compile warning if using MinGW that "strtok_s" might be missing along with a link to public domain source that can be used. hace 8 años
  Jacob Barthelmeh e99a5b0483 prepare for release v3.9.0 hace 8 años
  toddouska 22385f2b39 add random ports for all make check scripts, unique ready file hace 9 años
  David Garske f977caa492 Cleanup of the test code that looks for the WolfSSL root directory. Now it tries to open the certs/ntru-cert.pem file in each directory up (limited to 5) until it opens it. hace 9 años
  toddouska d669fc28c2 add idea benchmark, cleanup hace 9 años