Historique des commits

Auteur SHA1 Message Date
  kaleb-himes b8d31b042f Windows support il y a 7 mois
  kaleb-himes e45867bbc3 WIN fips section refactor / wolfEntropy API syntax adjustment il y a 7 mois
  kaleb_himes 81f5ac7f6c SRTP-KDF FS Preview il y a 8 mois
  David Garske c8d0bb0bd8 Merge pull request #7212 from SparkiDev/eddsa_check_priv il y a 9 mois
  Sean Parkinson e28d6a7b71 EdDsa: check private value after sign il y a 9 mois
  Juliusz Sosinowicz bdc0b80ddb Don't include unnecessary headers in public header file il y a 9 mois
  Sean Parkinson 90467aa578 Curve25519/Ed25519: align buffers il y a 1 an
  Sean Parkinson 36b92a4cef Thumb2 ASM, Curve25519 il y a 1 an
  gojimmypi 98b718f91b wolfcrypt polish: init, checks, corrections (#6249) il y a 1 an
  Jacob Barthelmeh 9dcc48c8f7 update copyright to 2023 il y a 1 an
  Chris Conlon 45bf793b5a SE050 expansion: add RSA support, allow for larger key IDs, get/set key ID from ecc_key/RsaKey, fixes for SE050 hashing, remove XREALLOC dependency, API to store/get binary object, API to erase object, test.c compatibility il y a 2 ans
  Sean Parkinson f807c70637 Ed make public key wasn't checking whether private key set il y a 2 ans
  Jacob Barthelmeh 8eaa85e412 update copyright year to 2022 il y a 2 ans
  Juliusz Sosinowicz 4caffee590 ForceZero the private key on import error il y a 2 ans
  Sean Parkinson 4a962b7fb2 Ed25519/448: improvements il y a 2 ans
  David Garske bb68766bda For ED255219 and ED448 if importing private only and public key is already set then check it. il y a 2 ans
  Sean Parkinson 2c943282f0 Ed25519/Ed448: assume public key is not trusted il y a 2 ans
  Kareem 13beadbfc3 Fix missing return checks in KSDK ED25519 code. il y a 2 ans
  Sean Parkinson 1b29f7353a Check memory is zeroized il y a 2 ans
  Sean Parkinson f1ce0cc95d Memory zeroization fixes il y a 2 ans
  Sean Parkinson e9187f5f00 Wycheproof fixes/changes il y a 2 ans
  David Garske 7396a0cb3a Resolves all peer review comments. Fixes to get Curve25519 working on real hardware. Regression testing fixes for ECC. il y a 3 ans
  David Garske 29f051e585 Fixes and cleanups for NXP SE050 support. il y a 3 ans
  Ethan 3f76a76c46 SE050 port with support for RNG, SHA, AES, ECC (sign/verify/shared secret) and ED25519 il y a 3 ans
  Sean Parkinson dc19ba2aa7 Memory allocation: fixes from memory usage generation il y a 3 ans
  Daniel Pouzzner 5e8da2348f ED: add --enable-ed25519-stream and --enable-ed448-stream to configure.ac, disabled by default, and add them to --enable-all and --enable-all-crypto lists, along with --enable-aesgcm-stream; report AES-GCM and ED* streaming API options in feature summary rendered at end; il y a 3 ans
  Daniel Pouzzner 9b43e57ccf ED: add streaming API to the ED verify routines: wc_ed*_verify_msg_init(), wc_ed*_verify_msg_update(), wc_ed*_verify_msg_final(); il y a 3 ans
  Jacob Barthelmeh ae00b5acd0 some minor changes for unintialized and null infer reports il y a 3 ans
  David Garske 0fc9c33f84 Wire up Ed25519 SHA512 to use devId. il y a 3 ans
  David Garske 15d761a0c2 Added ED25519 and Curve25519 crypto callback support. il y a 3 ans