History log of /openssl/ (Results 10001 – 10025 of 36079)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
06a2027b07-May-2020 Matt Caswell

Update documentation following changes of various types

The previous commit changed the types of various objects passed between
the core and providers. Therefore the documentation needs

Update documentation following changes of various types

The previous commit changed the types of various objects passed between
the core and providers. Therefore the documentation needs to be updated
to reflect that.

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11758)

show more ...

d40b42ab06-May-2020 Matt Caswell

Maintain strict type discipline between the core and providers

A provider could be linked against a different version of libcrypto than
the version of libcrypto that loaded the provider.

Maintain strict type discipline between the core and providers

A provider could be linked against a different version of libcrypto than
the version of libcrypto that loaded the provider. Different versions of
libcrypto could define opaque types differently. It must never occur that
a type created in one libcrypto is used directly by the other libcrypto.
This will cause crashes.

We can "cheat" for "built-in" providers that are part of libcrypto itself,
because we know that the two libcrypto versions are the same - but not for
other providers.

To ensure this does not occur we use different types names for the handful
of opaque types that are passed between the core and providers.

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11758)

show more ...


crypto/initthread.c
crypto/provider_core.c
crypto/serializer/serializer_pkey.c
include/internal/cryptlib.h
include/openssl/bio.h
include/openssl/core.h
include/openssl/core_numbers.h
providers/common/bio_prov.c
providers/common/include/prov/bio.h
providers/common/include/prov/provider_ctx.h
providers/common/include/prov/providercommon.h
providers/common/provider_ctx.c
providers/defltprov.c
providers/fips/fipsprov.c
providers/fips/self_test.c
providers/implementations/serializers/serializer_common.c
providers/implementations/serializers/serializer_dh.c
providers/implementations/serializers/serializer_dh_param.c
providers/implementations/serializers/serializer_dh_priv.c
providers/implementations/serializers/serializer_dh_pub.c
providers/implementations/serializers/serializer_dsa.c
providers/implementations/serializers/serializer_dsa_param.c
providers/implementations/serializers/serializer_dsa_priv.c
providers/implementations/serializers/serializer_dsa_pub.c
providers/implementations/serializers/serializer_ec.c
providers/implementations/serializers/serializer_ec_param.c
providers/implementations/serializers/serializer_ec_priv.c
providers/implementations/serializers/serializer_ec_pub.c
providers/implementations/serializers/serializer_ecx.c
providers/implementations/serializers/serializer_ecx_priv.c
providers/implementations/serializers/serializer_ecx_pub.c
providers/implementations/serializers/serializer_ffc_params.c
providers/implementations/serializers/serializer_rsa.c
providers/implementations/serializers/serializer_rsa_priv.c
providers/implementations/serializers/serializer_rsa_pub.c
providers/legacyprov.c
providers/nullprov.c
test/p_test.c
827f04d515-May-2020 Richard Levitte

CORE: Fix a couple of bugs in algorithm_do_this()

The call of ossl_provider_query_operation() used |data->operation_id|,
when |cur_operation| should be used.

If any ossl_provide

CORE: Fix a couple of bugs in algorithm_do_this()

The call of ossl_provider_query_operation() used |data->operation_id|,
when |cur_operation| should be used.

If any ossl_provider_query_operation() call returned NULL, the loop
was stopped, when it should just continue on to the next operation.

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11837)

show more ...

0b2b0be910-May-2020 raja-ashok

Test TLSv1.3 out-of-band PSK with all 5 ciphersuites

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Ben Kaduk <kaduk@mit.

Test TLSv1.3 out-of-band PSK with all 5 ciphersuites

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/11785)

show more ...

2e1a4f6a08-May-2020 raja-ashok

Fix crash in early data send with out-of-band PSK using AES CCM

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Ben Kaduk

Fix crash in early data send with out-of-band PSK using AES CCM

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/11785)

show more ...

43a70f0213-May-2020 Rich Salz

Fix all MD036 (emphasis used instead of heading)

The main fixes were errors in itemized lists "*)" instead of "*"

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by:

Fix all MD036 (emphasis used instead of heading)

The main fixes were errors in itemized lists "*)" instead of "*"

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/11770)

show more ...

a51f225d08-May-2020 Rich Salz

Add "md-nits" make target

Also fix a nit in recent CHANGES.md update.

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-

Add "md-nits" make target

Also fix a nit in recent CHANGES.md update.

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/11770)

show more ...

538404d228-Aug-2017 David von Oheimb

Add 'methods' parameter to setup_engine() in apps.c for individual method defaults

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siem

Add 'methods' parameter to setup_engine() in apps.c for individual method defaults

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
(Merged from https://github.com/openssl/openssl/pull/4277)

show more ...

8c10e1b621-Apr-2020 Dr. David von Oheimb

Clean up macro definitions of openssl_fdset() in apps.h and sockets.h

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>

Clean up macro definitions of openssl_fdset() in apps.h and sockets.h

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
(Merged from https://github.com/openssl/openssl/pull/4277)

show more ...

6d382c7406-May-2020 Dr. David von Oheimb

Use OSSL_STORE for load_{,pub}key() and load_cert() in apps/lib/apps.c

This also adds the more flexible and general load_key_cert_crl()
as well as helper functions get_passwd(), cleanse(

Use OSSL_STORE for load_{,pub}key() and load_cert() in apps/lib/apps.c

This also adds the more flexible and general load_key_cert_crl()
as well as helper functions get_passwd(), cleanse(), and clear_free()
to be used also in apps/cmp.c etc.

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
(Merged from https://github.com/openssl/openssl/pull/11755)

show more ...

60d5331308-May-2020 Dr. David von Oheimb

Nit-fix: remove whitespace in doc/man3/EVP_PKEY_fromdata.pod causing warning

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.co

Nit-fix: remove whitespace in doc/man3/EVP_PKEY_fromdata.pod causing warning

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
(Merged from https://github.com/openssl/openssl/pull/11755)

show more ...

db71d31507-May-2020 Dr. David von Oheimb

Guard use of struct tms with #ifdef __TMS like done earlier in apps/lib/apps.c

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.

Guard use of struct tms with #ifdef __TMS like done earlier in apps/lib/apps.c

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
(Merged from https://github.com/openssl/openssl/pull/11755)

show more ...

c6601bd214-May-2020 Richard Levitte

Build: make apps/progs.c depend on configdata.pm

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/11824)

92dc275f14-May-2020 Richard Levitte

SSL: refactor ssl_cert_lookup_by_pkey() to work with provider side keys

Fixes #11720

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl

SSL: refactor ssl_cert_lookup_by_pkey() to work with provider side keys

Fixes #11720

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11828)

show more ...

8062724014-May-2020 Matt Caswell

Ignore some auto-generated DER files

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/ope

Ignore some auto-generated DER files

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11830)

show more ...

5d979e0415-May-2020 Matt Caswell

Prepare for 3.0 alpha 3

Reviewed-by: Richard Levitte <levitte@openssl.org>

9e8604b815-May-2020 Matt Caswell

Prepare for release of 3.0 alpha 2

Reviewed-by: Richard Levitte <levitte@openssl.org>

454afd9815-May-2020 Matt Caswell

Update copyright year

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11839)


Configurations/shared-info.pl
apps/asn1pars.c
apps/cmp.c
apps/include/apps_ui.h
apps/include/fmt.h
apps/include/s_apps.h
apps/lib/apps_ui.c
apps/lib/fmt.c
apps/lib/names.c
apps/lib/s_socket.c
apps/provider.c
crypto/asn1/a_strnid.c
crypto/asn1/asn1_gen.c
crypto/asn1/asn_moid.c
crypto/asn1/asn_mstbl.c
crypto/asn1/tasn_dec.c
crypto/asn1/tasn_fre.c
crypto/asn1/tasn_new.c
crypto/bn/bn_conv.c
crypto/bn/bn_ctx.c
crypto/bn/bn_prime.c
crypto/bn/bn_rsa_fips186_4.c
crypto/cms/cms_ess.c
crypto/cms/cms_pwri.c
crypto/cms/cms_sd.c
crypto/conf/conf_api.c
crypto/conf/conf_def.c
crypto/conf/conf_ssl.c
crypto/ct/ct_oct.c
crypto/ct/ct_prn.c
crypto/ct/ct_x509v3.c
crypto/dso/dso_dlfcn.c
crypto/dso/dso_lib.c
crypto/dso/dso_win32.c
crypto/engine/eng_cnf.c
crypto/engine/eng_dyn.c
crypto/evp/evp_cnf.c
crypto/include/internal/pem_int.h
crypto/modes/siv128.c
crypto/ocsp/ocsp_prn.c
crypto/ocsp/v3_ocsp.c
crypto/pem/pem_lib.c
crypto/perlasm/s390x.pm
crypto/pkcs12/p12_kiss.c
crypto/pkcs12/p12_npas.c
crypto/pkcs7/pk7_attr.c
crypto/pkcs7/pk7_doit.c
crypto/pkcs7/pk7_lib.c
crypto/pkcs7/pk7_smime.c
crypto/ppccap.c
crypto/property/property.c
crypto/rand/rand_win.c
crypto/store/store_register.c
crypto/threads_pthread.c
crypto/ts/ts_conf.c
crypto/ts/ts_req_utils.c
crypto/ts/ts_rsp_print.c
crypto/ts/ts_rsp_sign.c
crypto/ts/ts_rsp_utils.c
crypto/ts/ts_verify_ctx.c
crypto/x509/by_file.c
crypto/x509/pcy_cache.c
crypto/x509/pcy_data.c
crypto/x509/pcy_map.c
crypto/x509/pcy_node.c
crypto/x509/pcy_tree.c
crypto/x509/t_crl.c
crypto/x509/t_req.c
crypto/x509/v3_addr.c
crypto/x509/v3_admis.c
crypto/x509/v3_akey.c
crypto/x509/v3_alt.c
crypto/x509/v3_asid.c
crypto/x509/v3_bcons.c
crypto/x509/v3_bitst.c
crypto/x509/v3_conf.c
crypto/x509/v3_cpols.c
crypto/x509/v3_extku.c
crypto/x509/v3_info.c
crypto/x509/v3_lib.c
crypto/x509/v3_pci.c
crypto/x509/v3_pcons.c
crypto/x509/v3_pmaps.c
crypto/x509/v3_prn.c
crypto/x509/v3_sxnet.c
crypto/x509/v3_tlsf.c
crypto/x509/x509_att.c
crypto/x509/x509_obj.c
crypto/x509/x509_v3.c
crypto/x509/x_attrib.c
crypto/x509/x_x509a.c
doc/man1/openssl-cmp.pod.in
doc/man3/DEFINE_STACK_OF.pod
doc/man3/OSSL_STORE_LOADER.pod
doc/man3/SSL_CTX_config.pod
doc/man3/SSL_CTX_set_num_tickets.pod
doc/man3/SSL_set_async_callback.pod
doc/man3/SSL_shutdown.pod
doc/man7/EVP_KDF-SSHKDF.pod
engines/e_capi.c
fuzz/client.c
fuzz/server.c
include/internal/thread_once.h
include/openssl/ess.h
include/openssl/opensslv.h.in
include/openssl/pkcs12.h
include/openssl/pkcs7.h
include/openssl/safestack.h
include/openssl/store.h
include/openssl/ts.h
providers/common/include/prov/provider_ctx.h
providers/implementations/kdfs/pbkdf2_fips.c
providers/implementations/kdfs/sshkdf.c
providers/implementations/macs/kmac_prov.c
ssl/bio_ssl.c
ssl/d1_srtp.c
test/aesgcmtest.c
test/bio_memleak_test.c
test/bn_internal_test.c
test/cipherbytes_test.c
test/cipherlist_test.c
test/confdump.c
test/crltest.c
test/drbg_cavs_test.c
test/dtls_mtu_test.c
test/property_test.c
test/recipes/03-test_internal_bn.t
test/recipes/03-test_internal_rsa_sp800_56b.t
test/recipes/04-test_pem.t
test/recipes/20-test_kdf.t
test/recipes/20-test_mac.t
test/recipes/30-test_afalg.t
test/recipes/30-test_evp_data/evpaessiv.txt
test/recipes/90-test_bio_memleak.t
test/rsa_sp800_56b_test.c
test/run_tests.pl
test/ssl_ctx_test.c
test/ssl_test_ctx.c
test/testutil/test_options.c
test/v3nametest.c
util/mkrc.pl
util/perl/OpenSSL/ParseC.pm
11d7d90305-Mar-2020 Nicolas Vigier

If SOURCE_DATE_EPOCH is defined, use it for copyright year

Using the date from SOURCE_DATE_EPOCH instead of the current date makes
it possible to reproduce a build that was built on a di

If SOURCE_DATE_EPOCH is defined, use it for copyright year

Using the date from SOURCE_DATE_EPOCH instead of the current date makes
it possible to reproduce a build that was built on a different year:
https://reproducible-builds.org/specs/source-date-epoch/

This is fixing an issue we had while building Tor Browser:
https://trac.torproject.org/projects/tor/ticket/33535

CLA: trivial

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/11296)

show more ...

d30ef63908-May-2020 Matt Caswell

Correct alignment calculation in ssl3_setup_write

The alignment calculation in ssl3_setup_write incorrectly results in an
alignment allowance of
(-SSL3_RT_HEADER_LENGTH) & (SSL3_ALIG

Correct alignment calculation in ssl3_setup_write

The alignment calculation in ssl3_setup_write incorrectly results in an
alignment allowance of
(-SSL3_RT_HEADER_LENGTH) & (SSL3_ALIGN_PAYLOAD - 1) bytes. This equals 3
in almost all cases. The maximum alignment actually used in do_ssl3_write
is (SSL3_ALIGN_PAYLOAD - 1). This equals 7 bytes in almost all cases. So
there is a potential to overrun the buffer by up to 4 bytes.

Fortunately, the encryption overhead allowed for is 80 bytes which
consists of 16 bytes for the cipher block size and 64 bytes for the MAC
output. However the biggest MAC that we ever produce is HMAC-384 which is
48 bytes - so we have a headroom of 16 bytes (i.e. more than the 4 bytes
of potential overrun).

Thanks to Nagesh Hegde for reporting this.

Fixes #11766

Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/11768)

show more ...

7689926424-Feb-2020 Orgad Shaneh

Configure: Avoid SIXTY_FOUR_BIT for linux-mips64

This is a 32-bit ABI build (as opposed to linux64-mips64).
Setting SIXTY_FOUR_BIT breaks hardware optimizations, at least on
octeon p

Configure: Avoid SIXTY_FOUR_BIT for linux-mips64

This is a 32-bit ABI build (as opposed to linux64-mips64).
Setting SIXTY_FOUR_BIT breaks hardware optimizations, at least on
octeon processors.

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11725)

show more ...

64af3aec24-Apr-2020 Richard Levitte

dev/release.sh: Add --reviewer to set reviewers

Doing this is kind of contrary to how we normally do things, as this
constitutes a kind of pre-approval. However, without this, the norma

dev/release.sh: Add --reviewer to set reviewers

Doing this is kind of contrary to how we normally do things, as this
constitutes a kind of pre-approval. However, without this, the normal
review process will modify the reviewed commits, and render the
annotated release tag invalid, which forces the person doing the
release to re-tag manually.

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11630)

show more ...

6c3cbc9313-May-2020 Thomas Dwyer III

Pass "-z defs" to the linker via "-Wl,-z,defs" rather than with gcc's -z
flag (which is not supported by older compilers).

CLA: trivial

Reviewed-by: Richard Levitte <levitte@ope

Pass "-z defs" to the linker via "-Wl,-z,defs" rather than with gcc's -z
flag (which is not supported by older compilers).

CLA: trivial

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11815)

show more ...

fab8fde314-May-2020 Richard Levitte

test/evp_extra_test.c: Add OPENSSL_NO_CMAC around CMAC test

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github

test/evp_extra_test.c: Add OPENSSL_NO_CMAC around CMAC test

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/11833)

show more ...

90ad284f12-May-2020 Richard Levitte

PROV: make some DER AID arrays non-static, to avoid clang complaints

The problem encountered is that some arrays were deemed unnecessary by
clang, for example:

providers/com

PROV: make some DER AID arrays non-static, to avoid clang complaints

The problem encountered is that some arrays were deemed unnecessary by
clang, for example:

providers/common/der/der_rsa.c:424:28: error: variable 'der_aid_sha224Identifier' is not needed and will not be emitted [-Werror,-Wunneeded-internal-declaration]
static const unsigned char der_aid_sha224Identifier[] = {
^

However, these arrays are used in sizeof() expressions in other parts
of the code that's actually used, making that warning-turned-error a
practical problem. We solve this by making the array non-static,
which guarantees that the arrays will be emitted, even though
unnecessarily. Fortunately, they are very small.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/11710)

show more ...

1...<<401402403404405406407408409410>>...1444