3974058a | 12-Dec-2024 |
Jonathan M. Wilbur |
doc: the attributeMappings X.509v3 extension Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openss
doc: the attributeMappings X.509v3 extension Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26157)
show more ...
|
1e307e65 | 12-Dec-2024 |
Jonathan M. Wilbur |
test: the attributeMappings X.509v3 extension Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/opens
test: the attributeMappings X.509v3 extension Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26157)
show more ...
|
93b5275f | 12-Dec-2024 |
Jonathan M. Wilbur |
feat: support the attributeMappings X.509v3 extension Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/opens
feat: support the attributeMappings X.509v3 extension Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26157)
show more ...
|
b3bb2147 | 18-Dec-2024 |
Dmitry Belyavskiy |
Take into account no_store when pushing algorithm When we put algorithm to the store, we have a fallback to the OSSL_LIB_CTX level store when store is NULL. Reviewed-by: Matt Ca
Take into account no_store when pushing algorithm When we put algorithm to the store, we have a fallback to the OSSL_LIB_CTX level store when store is NULL. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26197)
show more ...
|
f6097c7c | 17-Dec-2024 |
Dmitry Belyavskiy |
This is a test for nocache provider behavior A follow-up to #26038 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from http
This is a test for nocache provider behavior A follow-up to #26038 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26197)
show more ...
|
bf2dea0e | 26-Nov-2024 |
Andrey Tsygunka |
ossl_i2c_ASN1_BIT_STRING(): Fix a possible heap buffer overflow When data contains only zero values a buffer overflow happens. CLA: trivial Signed-off-by: Andrey Tsygunka <
ossl_i2c_ASN1_BIT_STRING(): Fix a possible heap buffer overflow When data contains only zero values a buffer overflow happens. CLA: trivial Signed-off-by: Andrey Tsygunka <aitsygunka@yandex.ru> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26190)
show more ...
|
53b34561 | 18-Dec-2024 |
Kalavakolanu, Hema Anmisha |
safe_math.h: Check if __GNUC__ is defined REF:https://bugzilla.tianocore.org/show_bug.cgi?id=4880 Facing the below issue after openssl is upgraded Edk2\CryptoPkg\Library\Op
safe_math.h: Check if __GNUC__ is defined REF:https://bugzilla.tianocore.org/show_bug.cgi?id=4880 Facing the below issue after openssl is upgraded Edk2\CryptoPkg\Library\OpensslLib\openssl\include\internal/safe_math.h(19): warning C4668: '__GNUC__' is not defined as a preprocessor macro, replacing with '0' for '#if/#elif' CLA: trivial Reviewed-by: Gerd Hoffmann <kraxel@redhat.com> Signed-off-by: Kalavakolanu Hema Anmisha <hema.anmisha.kalavakolanu@intel.com> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26204)
show more ...
|
009fa4f9 | 18-Dec-2024 |
Tomas Mraz |
test_evp_cipher_pipeline(): Fix memory leaks on errors Fixes Coverity 1636844, 1636845 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
test_evp_cipher_pipeline(): Fix memory leaks on errors Fixes Coverity 1636844, 1636845 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Saša Nedvědický <sashan@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26206)
show more ...
|
982a9b8b | 17-Dec-2024 |
Patrick J. LoPresti |
doc: Correctly reflect parameter constraints in EVP_DecryptUpdate() Fixes #26169 CLA: trivial Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@o
doc: Correctly reflect parameter constraints in EVP_DecryptUpdate() Fixes #26169 CLA: trivial Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26202)
show more ...
|
50ef944c | 16-Dec-2024 |
Michael Baentsch <57787676+baentsch@users.noreply.github.com> |
Fix missing HISTORY doc entries Also add a check to find-doc-nits for HISTORY sections. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org>
Fix missing HISTORY doc entries Also add a check to find-doc-nits for HISTORY sections. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26188)
show more ...
|
e0ea913f | 14-Dec-2024 |
Neil Horman |
Add amplification limit test to interop quic testing Because this ci job only runs from the master branch, we need to add the test here to validate that our server respects amplification
Add amplification limit test to interop quic testing Because this ci job only runs from the master branch, we need to add the test here to validate that our server respects amplification limits in our ci runs. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Saša Nedvědický <sashan@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26181)
show more ...
|
82e7a113 | 13-Dec-2024 |
otherddn1978 |
Check whether ctx->pctx != NULL If it is NULL, ctx->pctx->pmeth dereference will cause a crash. Found by Linux Verification Center (linuxtesting.org) with SVACE. Reviewed-b
Check whether ctx->pctx != NULL If it is NULL, ctx->pctx->pmeth dereference will cause a crash. Found by Linux Verification Center (linuxtesting.org) with SVACE. Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26176)
show more ...
|
c44066bb | 10-Nov-2024 |
Ramkumar |
docs: update man3 and man7 with cipher pipeline APIs Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/
docs: update man3 and man7 with cipher pipeline APIs Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24636)
show more ...
|
a0551546 | 31-Aug-2024 |
Ramkumar |
test: add evp_extra_test case for cipher pipeline API with fake pipeline provider Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged fro
test: add evp_extra_test case for cipher pipeline API with fake pipeline provider Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24636)
show more ...
|
ef7967d0 | 09-Sep-2024 |
Ramkumar |
feat: add EVP APIs for cipher pipelining Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull
feat: add EVP APIs for cipher pipelining Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24636)
show more ...
|
81af0b04 | 07-Aug-2024 |
Ramkumar |
docs: EVP pipeline API design document Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2
docs: EVP pipeline API design document Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24636)
show more ...
|
0f77b6f1 | 12-Dec-2024 |
Michael Baentsch <57787676+baentsch@users.noreply.github.com> |
Update HISTORY sections of libssl functions > 3.0.0 Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/open
Update HISTORY sections of libssl functions > 3.0.0 Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26158)
show more ...
|
79c9cbbe | 10-Dec-2024 |
Tomas Mraz |
Fix breakage on arm64_32 platforms We just avoid the special handling needed for Apple M1. Fixes #26135 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Saša N
Fix breakage on arm64_32 platforms We just avoid the special handling needed for Apple M1. Fixes #26135 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/26145)
show more ...
|
ffa1cf69 | 06-Dec-2024 |
Ryan Farley |
openssl-dgst: Document that xoflen is required for shake With b911fef216d1386210ec24e201d54d709528abb4, there is no longer a default xoflen for shake algorithms. Update the manual to ref
openssl-dgst: Document that xoflen is required for shake With b911fef216d1386210ec24e201d54d709528abb4, there is no longer a default xoflen for shake algorithms. Update the manual to reflect this. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26129)
show more ...
|
acc26552 | 04-Dec-2024 |
Elizarova, Alina |
Extension of OPENSSL_ia32cap to accommodate additional CPUID bits bits 128 - 191 CPUID.(EAX=07H,ECX=0H).EDX and CPUID.(EAX=07H,ECX=1H).EAX bits 192 - 255 CPUID.(EAX=07H,ECX=1H).EDX and C
Extension of OPENSSL_ia32cap to accommodate additional CPUID bits bits 128 - 191 CPUID.(EAX=07H,ECX=0H).EDX and CPUID.(EAX=07H,ECX=1H).EAX bits 192 - 255 CPUID.(EAX=07H,ECX=1H).EDX and CPUID.(EAX=07H,ECX=1H).EBX bits 256 - 319 CPUID.(EAX=07H,ECX=1H).ECX and CPUID.(EAX=24H,ECX=0H).EBX Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25709)
show more ...
|
1b3b5a01 | 11-Dec-2024 |
Sasha Romijn |
Fix typo in SSL_get_shared_sigalgs docs psighash -> psignhash CLA: trivial Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Me
Fix typo in SSL_get_shared_sigalgs docs psighash -> psignhash CLA: trivial Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26151)
show more ...
|
005721e1 | 06-Dec-2024 |
Neil Horman |
Limit tests with non-openssl clients Several quic interop implementations have a server implementation, but not a client implementation. Don't bother trying to run those Review
Limit tests with non-openssl clients Several quic interop implementations have a server implementation, but not a client implementation. Don't bother trying to run those Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26130)
show more ...
|
8cbe6e5a | 10-Dec-2024 |
Michael Baentsch <57787676+baentsch@users.noreply.github.com> |
Add HISTORY to BIO_s_mem documentation Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged
Add HISTORY to BIO_s_mem documentation Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26146)
show more ...
|
c5257fd8 | 11-Dec-2024 |
Tomas Mraz |
Fix leak of a RAND_POOL in error condition Fixes Coverity 1636676 Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tim H
Fix leak of a RAND_POOL in error condition Fixes Coverity 1636676 Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26154)
show more ...
|
a82c2bf5 | 09-Dec-2024 |
Dr. David von Oheimb |
X509: document non-standard behavior checking EKU extensions in CA and TA certs Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from htt
X509: document non-standard behavior checking EKU extensions in CA and TA certs Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/26142)
show more ...
|