{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":48137806,"defaultBranch":"master","name":"wolfssl","ownerLogin":"ejohnstown","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2015-12-16T22:04:55.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/896278?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1727194885.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"17261467a63d71ffff47ccc35cce526130bc7cdc","ref":"refs/heads/revert-small-stack-fp","pushedAt":"2024-09-24T16:21:25.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Revert \"FP SmallStack Fix\"\n\nThis reverts commit 47e51400bb04571ed0d2848029253518969313fb.\n\nTurns out we don't want to put those fp_ints on the stack unless\nabsolutely necessary.","shortMessageHtmlLink":"Revert \"FP SmallStack Fix\""}},{"before":"9781c1fea4c8b2dfe6a20c30fc88b9707282875c","after":"bc6881974d9a0e66118715812e7e10e9609a62cb","ref":"refs/heads/master","pushedAt":"2024-09-21T04:02:18.000Z","pushType":"push","commitsCount":18,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #8001 from ejohnstown/ecc-test-fix\n\nECC Test Fix","shortMessageHtmlLink":"Merge pull request wolfSSL#8001 from ejohnstown/ecc-test-fix"}},{"before":"735c0f6b3ae4c8e1684770edec65da68237fbd4c","after":null,"ref":"refs/heads/ecc-test-fix","pushedAt":"2024-09-21T02:31:35.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"}},{"before":null,"after":"735c0f6b3ae4c8e1684770edec65da68237fbd4c","ref":"refs/heads/ecc-test-fix","pushedAt":"2024-09-21T00:27:33.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"ECC Test Fix\n\nThe ECC key generation test was failing due not using large enough of a\nbuffer. Fixed to use a better size.\n\n1. Set the shared digest/sig buffer size in\n _ecc_pairwise_consistency_test() to the maximum possible based on the\n math in wc_ecc_sig_sz().","shortMessageHtmlLink":"ECC Test Fix"}},{"before":"b9908409d44ee2b155a1fd711865fec1d4a94ee0","after":"9781c1fea4c8b2dfe6a20c30fc88b9707282875c","ref":"refs/heads/master","pushedAt":"2024-09-20T23:02:25.000Z","pushType":"push","commitsCount":23,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7999 from douzzer/20240920-fixes\n\n20240920-fixes","shortMessageHtmlLink":"Merge pull request wolfSSL#7999 from douzzer/20240920-fixes"}},{"before":"a81efc0f6f2d9a9d90aff878a4e212fc81a176cd","after":null,"ref":"refs/heads/ecc-pct-ss","pushedAt":"2024-09-20T16:02:51.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"}},{"before":"74981c9707e8b53dc631ad0829b120fa85a89da0","after":"a81efc0f6f2d9a9d90aff878a4e212fc81a176cd","ref":"refs/heads/ecc-pct-ss","pushedAt":"2024-09-18T23:20:12.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Small Stack ECC Pairwise Consistency Test\n\n1. Update the ECC PCT to use the key's heap to allocate any buffers for\n the test. This is similar to how RSA does it.\n2. Put the buffers on the stack if not using small stack option.","shortMessageHtmlLink":"Small Stack ECC Pairwise Consistency Test"}},{"before":"a81efc0f6f2d9a9d90aff878a4e212fc81a176cd","after":"74981c9707e8b53dc631ad0829b120fa85a89da0","ref":"refs/heads/ecc-pct-ss","pushedAt":"2024-09-18T22:34:20.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"ECC Pairwise Consistency Test\n\n1. Update the ECC PCT to use the key's heap to allocate any buffers for\n the test. This is similar to how RSA does it.","shortMessageHtmlLink":"ECC Pairwise Consistency Test"}},{"before":"2f8f3f46c904190e0bddcddad5dafd8e41829c7c","after":"a81efc0f6f2d9a9d90aff878a4e212fc81a176cd","ref":"refs/heads/ecc-pct-ss","pushedAt":"2024-09-18T22:14:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Small Stack ECC Pairwise Consistency Test\n\n1. Update the ECC PCT to use the key's heap to allocate any buffers for\n the test. This is similar to how RSA does it.\n2. Put the buffers on the stack if not using small stack option.","shortMessageHtmlLink":"Small Stack ECC Pairwise Consistency Test"}},{"before":null,"after":"2f8f3f46c904190e0bddcddad5dafd8e41829c7c","ref":"refs/heads/ecc-pct-ss","pushedAt":"2024-09-18T21:35:16.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Small Stack ECC Pairwise Consistency Test\n\n1. Update the ECC PCT to use the key's heap to allocate any buffers for\n the test. This is similar to how RSA does it.\n2. Put the buffers on the stack if not using small stack option.","shortMessageHtmlLink":"Small Stack ECC Pairwise Consistency Test"}},{"before":"c3900470aaff38f46fca225aec7b572c5ecda02d","after":"b9908409d44ee2b155a1fd711865fec1d4a94ee0","ref":"refs/heads/master","pushedAt":"2024-09-18T21:31:21.000Z","pushType":"push","commitsCount":21,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7987 from bandi13/betterEngineFlagsFix\n\nFIPS defines RSA_MIN_SIZE and users may want to override","shortMessageHtmlLink":"Merge pull request wolfSSL#7987 from bandi13/betterEngineFlagsFix"}},{"before":"5ef617a75a5e2e673238690847b0e66502d36aba","after":"c3900470aaff38f46fca225aec7b572c5ecda02d","ref":"refs/heads/master","pushedAt":"2024-09-18T15:19:29.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7982 from bandi13/fixEngineFlags\n\nEngine needs to have a RSA_MIN_SIZE=1024","shortMessageHtmlLink":"Merge pull request wolfSSL#7982 from bandi13/fixEngineFlags"}},{"before":"47e51400bb04571ed0d2848029253518969313fb","after":null,"ref":"refs/heads/small-stack-fp","pushedAt":"2024-09-17T22:33:36.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"}},{"before":"a6c810e36bedacd245cc6caa5b31f93fa6c33d08","after":"47e51400bb04571ed0d2848029253518969313fb","ref":"refs/heads/small-stack-fp","pushedAt":"2024-09-17T17:58:08.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"FP SmallStack Fix\n\nThe function _fp_exptmod_nct() is using WOLFSSL_NO_MALLOC to guard\nusing stack allocation vs malloc. It's twin function _fp_exptmod_ct()\nis using WOLFSSL_SMALL_STACK for this. This is causing inappropriate use\nof malloc() in a small stack environment. The no-malloc case will also\nbe kept so static memory and no-malloc fix still works.\n\n1. Change the guards for `#ifndef WOLFSSL_NO_MALLOC` in the function\n `_fp_exptmod_nct()` to `#if defined(WOLFSSL_SMALL_STACK) &&\n !defined(WOLFSSL_NO_MALLOC)`.","shortMessageHtmlLink":"FP SmallStack Fix"}},{"before":null,"after":"a6c810e36bedacd245cc6caa5b31f93fa6c33d08","ref":"refs/heads/small-stack-fp","pushedAt":"2024-09-17T17:05:13.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"FP SmallStack Fix\n\nThe function _fp_exptmod_nct() is using WOLFSSL_NO_MALLOC to guard\nusing stack allocation vs malloc. It's twin function _fp_exptmod_ct()\nis using WOLFSSL_SMALL_STACK for this. This is causing inappropriate use\nof malloc() in a small stack environment.\n\n1. Change the guards for `#ifndef WOLFSSL_NO_MALLOC` in the function\n `_fp_exptmod_nct()` to `#ifdef WOLFSSL_SMALL_STACK`.","shortMessageHtmlLink":"FP SmallStack Fix"}},{"before":"9e2a7b36537ce6bc713405f4f08f8f50843bca87","after":"5ef617a75a5e2e673238690847b0e66502d36aba","ref":"refs/heads/master","pushedAt":"2024-09-17T16:50:31.000Z","pushType":"push","commitsCount":54,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7978 from douzzer/20240916-wc_DhAgree_ct-sp-math\n\n20240916-wc_DhAgree_ct-sp-math","shortMessageHtmlLink":"Merge pull request wolfSSL#7978 from douzzer/20240916-wc_DhAgree_ct-s…"}},{"before":"213ac1ac0a496fd4025b21b20dea98da05f74c63","after":"9e2a7b36537ce6bc713405f4f08f8f50843bca87","ref":"refs/heads/master","pushedAt":"2024-09-12T17:15:51.000Z","pushType":"push","commitsCount":9,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Feature/multiple aes siv ads (#7911)\n\n* Proposed new interface for AesSivEncrypt with number of ADs != 1.\r\n\r\n* Implement AES SIV S2V computation with a number of ADs not equal to 1.\r\n\r\n* Add Example A.1 from RFC5297 to AES SIV test vectors.\r\n\r\n* Add tests for new AES SIV interface, and add test vectors for examples given in RFC5297.\r\n\r\n* Include the nonce in count of maximum number of ADs.\r\n\r\n* Addressing review comments.\r\n\r\n* Addressing review comments: Use uppercase 'U' suffix on unsigned constant.\r\n\r\n* Rename local variables named 'ad0' to 'ad', since the zero makes no sense, especially since in the RFC 5297 document they're actually counting the ADs from 1.","shortMessageHtmlLink":"Feature/multiple aes siv ads (wolfSSL#7911)"}},{"before":"fb8681825157e0b251562abfdefec169024c1dfb","after":"213ac1ac0a496fd4025b21b20dea98da05f74c63","ref":"refs/heads/master","pushedAt":"2024-09-10T17:13:42.000Z","pushType":"push","commitsCount":51,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7959 from billphipps/sgx_c99_fix\n\nUpdate to use C99 instead of C11 because of lack of SGX support","shortMessageHtmlLink":"Merge pull request wolfSSL#7959 from billphipps/sgx_c99_fix"}},{"before":"ec6c7051a8f236a3b56685d99ec309ef9ba16079","after":"fb8681825157e0b251562abfdefec169024c1dfb","ref":"refs/heads/master","pushedAt":"2024-09-04T17:27:22.000Z","pushType":"push","commitsCount":12,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7930 from mpsuzuki/fix-ocsp-test\n\n[scripts/ocsp.test] Remove ${SCRIPT_DIR} from the pathname to ca-google-root.pem.","shortMessageHtmlLink":"Merge pull request wolfSSL#7930 from mpsuzuki/fix-ocsp-test"}},{"before":"2505a59daead2fb049e8dcc9828711b2d525e306","after":"ec6c7051a8f236a3b56685d99ec309ef9ba16079","ref":"refs/heads/master","pushedAt":"2024-09-03T22:49:55.000Z","pushType":"push","commitsCount":84,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7928 from dgarske/riscv_fixes\n\nFixes for building on RISC-V","shortMessageHtmlLink":"Merge pull request wolfSSL#7928 from dgarske/riscv_fixes"}},{"before":"4f4fb4bd0a06179e7e284611a10399b36196adc2","after":"2505a59daead2fb049e8dcc9828711b2d525e306","ref":"refs/heads/master","pushedAt":"2024-08-21T16:31:38.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7886 from douzzer/20240819-shebang-bash-env\n\n20240819-shebang-bash-env","shortMessageHtmlLink":"Merge pull request wolfSSL#7886 from douzzer/20240819-shebang-bash-env"}},{"before":"e562a1c4d179ab307581adc52e1569e407c15885","after":"4f4fb4bd0a06179e7e284611a10399b36196adc2","ref":"refs/heads/master","pushedAt":"2024-08-20T21:53:10.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7888 from douzzer/20240820-configure-silent\n\n20240820-configure-silent","shortMessageHtmlLink":"Merge pull request wolfSSL#7888 from douzzer/20240820-configure-silent"}},{"before":"9f9e89082f648ac2fd3def86931aa74dda097f89","after":"e562a1c4d179ab307581adc52e1569e407c15885","ref":"refs/heads/master","pushedAt":"2024-08-19T03:26:44.000Z","pushType":"push","commitsCount":47,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7867 from ColtonWilley/cert_copy_option\n\nAdd new option to always copy cert buffer for each SSL object","shortMessageHtmlLink":"Merge pull request wolfSSL#7867 from ColtonWilley/cert_copy_option"}},{"before":"f660299de0ad71b7777d29f74c2a452fdd7b53ac","after":"9f9e89082f648ac2fd3def86931aa74dda097f89","ref":"refs/heads/master","pushedAt":"2024-08-12T22:15:15.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7854 from embhorn/rsa_min_1024\n\nUpdate default RSA min to 1024","shortMessageHtmlLink":"Merge pull request wolfSSL#7854 from embhorn/rsa_min_1024"}},{"before":"9aa0742baa410fe6a180a11df59f74dd24730ee5","after":"f660299de0ad71b7777d29f74c2a452fdd7b53ac","ref":"refs/heads/master","pushedAt":"2024-08-11T19:41:54.000Z","pushType":"push","commitsCount":79,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7856 from douzzer/20240809-fips-dev-feature-unlock\n\n20240809-fips-dev-feature-unlock","shortMessageHtmlLink":"Merge pull request wolfSSL#7856 from douzzer/20240809-fips-dev-featur…"}},{"before":"b1765ca6b4c03427d652cc932e58fd6d57a2eb87","after":"9aa0742baa410fe6a180a11df59f74dd24730ee5","ref":"refs/heads/master","pushedAt":"2024-08-03T17:16:32.000Z","pushType":"push","commitsCount":64,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7798 from dgarske/asn_macros\n\nASN macro simplification\r\n\r\nmerged with github CI tests failing due to unrelated upstream changes (same tests all previously succeeded on this PR, with only 25d14f19371 added in the meantime).\r\n\r\nsupplementary testing with `wolfssl-multi-test.sh ... super-quick-check` after rebase on then-current `master` 15e99c8eff919b.","shortMessageHtmlLink":"Merge pull request wolfSSL#7798 from dgarske/asn_macros"}},{"before":"d087288b2d787beeb4ee793977199017023fcdd1","after":"a9bc1f85374e7df80507faa07454b962030bd29f","ref":"refs/heads/ssh-kdf-ex","pushedAt":"2024-07-29T16:37:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"SSH KDF NoPad\n\n1. Change wc_SSH_KDF to wc_SSH_KDF_ex with a new parameter to enable\n padding the k value or not.\n2. Add new wc_SSH_KDF function that calls wc_SSH_KDF_ex with the k pad\n switch set to 1\n3. Add new wc_SSH_KDF_NoPad function that calls wc_SSH_KDF_ex with the k pad\n switch set to 0.\n4. Change the padding to treat the k pad switch as a boolean and always\n hash in the pad byte, as length 1 or 0.\n5. Revise the comments for the SSH_KDF test to better indicate the\n source of the test vectors.\n6. Add a set of test cases using a value for K that would require\n padding if padding is enabled.\n7. Rework the test case setup to use macro composition.\n8. Test both wc_SSH_KDF and wc_SSH_KDF_NoPad as appropriate for padding.","shortMessageHtmlLink":"SSH KDF NoPad"}},{"before":"ab628744ae3adfdabe9f55f32c0dd96e31273c73","after":"d087288b2d787beeb4ee793977199017023fcdd1","ref":"refs/heads/ssh-kdf-ex","pushedAt":"2024-07-27T05:42:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"SSH KDF ex\n\n1. Revise the comments for the SSH_KDF test to better indicate the\n source of the test vectors.\n2. Add a set of test cases using a value for K that would require\n padding if padding is enabled.\n3. Rework the test case setup to use macro composition.\n4. Test both wc_SSH_KDF and wc_SSH_KDF_ex as appropriate for padding.","shortMessageHtmlLink":"SSH KDF ex"}},{"before":"92f1c6e339e3b77258f70b4dee89da0f690210d0","after":"b1765ca6b4c03427d652cc932e58fd6d57a2eb87","ref":"refs/heads/master","pushedAt":"2024-07-27T05:41:45.000Z","pushType":"push","commitsCount":11,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"Merge pull request #7785 from dgarske/asn_original\n\nFixes for ASN original","shortMessageHtmlLink":"Merge pull request wolfSSL#7785 from dgarske/asn_original"}},{"before":"a78f20e87285a514388b953343c052591e9962e6","after":"ab628744ae3adfdabe9f55f32c0dd96e31273c73","ref":"refs/heads/ssh-kdf-ex","pushedAt":"2024-07-27T05:40:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ejohnstown","name":"John Safranek","path":"/ejohnstown","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/896278?s=80&v=4"},"commit":{"message":"SSH KDF ex\n\n1. Revise the comments for the SSH_KDF test to better indicate the\n source of the test vectors.\n2. Add a set of test cases using a value for K that would require\n padding if padding is enabled.\n3. Rework the test case setup to use macro composition.\n4. Test both wc_SSH_KDF and wc_SSH_KDF_ex as appropriate for padding.","shortMessageHtmlLink":"SSH KDF ex"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yNFQxNjoyMToyNS4wMDAwMDBazwAAAAS_Yp4K","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wNy0yN1QwNTo0MDoyMi4wMDAwMDBazwAAAASKk5Vq"}},"title":"Activity · ejohnstown/wolfssl"}