Commit History

Author SHA1 Message Date
  kaleb-himes a22956d881 Address periodic CAST failures observed in unit.test by pre-empting the CASTs 3 weeks ago
  Juliusz Sosinowicz 67d6d438c5 Port testing to wolfSSL threading interface 10 months ago
  Juliusz Sosinowicz 3d68bcd6f7 Jenkins fixes 1 year ago
  Juliusz Sosinowicz ca77da92e5 Implement pthreads threading 1 year ago
  gojimmypi 6b240fa41a Refactor HAVE_PTHREAD and _POSIX_THREADS (#6536) 11 months ago
  Sean Parkinson 541ea51ad5 Tests api.c: rework for malloc failure testing 1 year ago
  Jacob Barthelmeh 9dcc48c8f7 update copyright to 2023 1 year ago
  Sean Parkinson e4e53ab7ca Unit test: rework to be able to run API tests individually 1 year ago
  Daniel Pouzzner 5b260ac52e configure.ac: remove enable-quic from enable-all feature set; 1 year ago
  Stefan Eissing 4431438fb2 add QUIC support. 1 year ago
  Jacob Barthelmeh 8eaa85e412 update copyright year to 2022 1 year ago
  Daniel Pouzzner ccc5952369 global fixup to check or explicitly ignore return values from failable library/system calls that weren't already being checked; 1 year ago
  Marco Oliverio 9d22e11776 misc.c: introduce w64wrapper to handle 64bit numbers 2 years ago
  kaleb-himes 7cccaa98b7 The minimal changes needed to add KCAPI support with fips-ready 2 years ago
  Juliusz Sosinowicz 894303be59 Make the `wolfSSL_GetMaxFragSize` parameter meaning consistent 2 years ago
  John Safranek 9bf36f329a Add sign/verify PCT to RSA key gen. 3 years ago
  John Safranek f49a09749e When building for FIPS, the unit test will run all the CASTs up front. 3 years ago
  John Safranek 976402e04b RNG Update 3 years ago
  Sean Parkinson 142c7a9892 cppcheck fixes and a config fix 2 years ago
  Daniel Pouzzner 05128968f6 fixes for null pointer accesses detected by clang sanitizer. also, gate SuiteTest() on !NO_WOLFSSL_CIPHER_SUITE_TEST in tests/unit.c, greatly reducing time to completion when not debugging cipher suites. 2 years ago
  Jacob Barthelmeh c729318ddd update copyright date 3 years ago
  Chris Conlon 45c5a2d39c update copyright to 2020 4 years ago
  John Safranek 246c444b93 Updates for v4.0.0 5 years ago
  David Garske 59a3b4a110 New tests for cert chains, alternate cert chains, trusted peer certs and DH prime cleanup: 5 years ago
  David Garske 2c3475c1d6 Added new build option `--enable-memtest` or `WOLFSSL_FORCE_MALLOC_FAIL_TEST` which enables random malloc failures for testing. This test supresses the `abort()` calls to detect seg faults. A new script `./scripts/memtest.sh` starts the test. If an issue is found it can be reviewed with the `./scripts/memtest.txt` log and reproduced using the seed printed at top of unit test as `--- RNG MALLOC FAIL AT 295---` and rerun using `./tests/unit.test 295`. 5 years ago
  Sean Parkinson a03c15e598 Allow NO_WOLFSSL_CLIENT/SERVER to compile and pass tests 6 years ago
  David Garske 911b6f95f8 Release v3.12.2 (lib 14.0.0). Updated copywright. 6 years ago
  David Garske c1640e8a3d Intel QuickAssist (QAT) support and async enhancements/fixes: 7 years ago
  David Garske da5825b94d Normal math speed-up to not allocate on mp_int and defer until mp_grow. Added memory tracker support to ./tests/unit.test. Fix memory leak with curve cache enabled, by adding to wolfSSL_Cleanup. 7 years ago
  David Garske 17a34c5899 Added asynchronous wolfCrypt RSA, TLS client and Cavium Nitrox V support. Asynchronous wolfSSL client support for "DoServerKeyExchange", "SendClientKeyExchange", "SendCertificateVerify" and "DoCertificateVerify". Fixes for async DTLS. Refactor of the wolf event and async handling for use in wolfCrypt. Refactor of the async device support so its hardware agnostic. Added Cavium Nitrox V support (Nitrox tested using SDK v0.2 CNN55XX-SDK with new configure "--with-cavium-v=/dir" option). Moved Nitrox specific functions to new port file "port/cavium/cavium_nitrox.c". RSA refactor to handle async with states. RSA optimization for using dpraw for private key decode. Use double linked list in wolf event for faster/cleaner code. Use typedef for wolf event flag. Cleanup of the async error codes. wolfCrypt test and benchmark support for async RSA. Asynchronous mode enabled using "./configure --enable-asynccrypt". If no async hardware is defined then the internal async simulator (WOLFSSL_ASYNC_CRYPT_TEST) is used. Note: Using async mode requires async.c/h files from wolfSSL. If interested in using asynchronous mode please send email to info@wolfssl.com. 7 years ago