10d756a7 | 19-Mar-2020 |
Richard Levitte |
EC: Refactor EVP_PKEY_CTX curve setting macros for param generation The macros are converted to functions, and are modified to support provider implementations. Reviewed-by: Mat
EC: Refactor EVP_PKEY_CTX curve setting macros for param generation The macros are converted to functions, and are modified to support provider implementations. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> (Merged from https://github.com/openssl/openssl/pull/11328)
show more ...
|
1f185f51 | 19-Mar-2020 |
Richard Levitte |
PROV: Implement EC param / key generation Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> (Merged from https://github.com/openssl/openssl/
PROV: Implement EC param / key generation Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> (Merged from https://github.com/openssl/openssl/pull/11328)
show more ...
|
2b9add69 | 19-Mar-2020 |
Richard Levitte |
KEYMGMT: Add functions to get param/key generation parameters Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> (Merged from https://github.
KEYMGMT: Add functions to get param/key generation parameters Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> (Merged from https://github.com/openssl/openssl/pull/11328)
show more ...
|
a5c864ce | 14-Apr-2020 |
Shane Lontis |
Fix Dynamic engine loading so that the call to ENGINE_load_builtin_engines() is performed. Fixes #11510 PR #11240 Added support for passing the libctx to the config loader. As p
Fix Dynamic engine loading so that the call to ENGINE_load_builtin_engines() is performed. Fixes #11510 PR #11240 Added support for passing the libctx to the config loader. As part of this work the call to OPENSSL_load_builtin_modules() + ENGINE_load_builtin_engines() was deferred until module_run() is called. The call to ENGINE_load_builtin_engines() has been added to ENGINE_by_id(). Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/11543)
show more ...
|
9bf475fc | 13-Apr-2020 |
Dr. Matthias St. Pierre |
mkerr: remove legacy guards from generated error headers In pull request #9333, legacy guards were added to the generated error headers, but the mkerr.pl script was not adjusted accordin
mkerr: remove legacy guards from generated error headers In pull request #9333, legacy guards were added to the generated error headers, but the mkerr.pl script was not adjusted accordingly. So the legacy guards were removed by subsequent `make update` calls. Fixing the mkerr.pl script properly was disproportionately complicated by the fact that adding legacy guards only made sense for files which already existed in version 1.1.1. To keep things simple, it was decided to drop the legacy guards from the generated headers entirely. Fixes #10569 Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11541)
show more ...
|
ff1f7cde | 07-Apr-2020 |
Aaron Thompson |
Add ex_data to EVP_PKEY. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/11515) |
0437435a | 09-Apr-2020 |
scott |
BIO_do_accept: correct error return value `BIO_do_accept` was returning incorrect values when unable to bind to a port. Fixes #7717 CLA: trivial Reviewed-by: Viktor Duk
BIO_do_accept: correct error return value `BIO_do_accept` was returning incorrect values when unable to bind to a port. Fixes #7717 CLA: trivial Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11505)
show more ...
|
b93e2ec2 | 06-Apr-2020 |
Richard Levitte |
Fix some errors in documentation Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11476) |
e32e00ab | 06-Apr-2020 |
Richard Levitte |
Initialize files that declare internal symbols util/other-internal.syms is like util/other.syms, but for internal symbols. Likewise, util/missingcrypto-internal.txt and util/missingssl-i
Initialize files that declare internal symbols util/other-internal.syms is like util/other.syms, but for internal symbols. Likewise, util/missingcrypto-internal.txt and util/missingssl-internal.txt are like util/missingcrypto.txt and util/missingssl.txt Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11476)
show more ...
|
8270c479 | 06-Apr-2020 |
Richard Levitte |
Rework util/find-doc-nits to distinguish internal documentation We didn't really distinguish internal and public documentation, or matched that with the state of the documented symbols.
Rework util/find-doc-nits to distinguish internal documentation We didn't really distinguish internal and public documentation, or matched that with the state of the documented symbols. we therefore needed to rework the logic to account for the state of each symbol. To simplify things, and make them consistent, we load all of util/*.num, util/*.syms and util/missing*.txt unconditionally. Also, we rework the reading of the manuals to happen only once (or well, not quite, Pod::Checker reads from file too, but at the very least, our script isn't reading the same file multiple times). Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11476)
show more ...
|
eacd30a7 | 30-Oct-2019 |
Jake Maynard |
Add manpage entry for X509_check_purpose() Fixes #10263 Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://githu
Add manpage entry for X509_check_purpose() Fixes #10263 Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10301)
show more ...
|
abfc73f3 | 09-Apr-2020 |
Patrick Steuer |
Fix EVP_DigestSign interface when used with DES CMAC DES implementations were missing the dup/copy ctx routines required by CMAC implementation. A regression test is added. Sign
Fix EVP_DigestSign interface when used with DES CMAC DES implementations were missing the dup/copy ctx routines required by CMAC implementation. A regression test is added. Signed-off-by: Patrick Steuer <patrick.steuer@de.ibm.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11498)
show more ...
|
cc572c25 | 09-Apr-2020 |
Richard Levitte |
EVP: legacy_ctrl_to_param() to handle provider side keys There was one spot where this function would look at ctx->pmeth directly to determine if it's for RSASSA-PSS, which fails when
EVP: legacy_ctrl_to_param() to handle provider side keys There was one spot where this function would look at ctx->pmeth directly to determine if it's for RSASSA-PSS, which fails when presented with an EVP_PKEY_CTX holding a provider side key. Switching to use EVP_PKEY_is_a() should make things better. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> (Merged from https://github.com/openssl/openssl/pull/11501)
show more ...
|
aec8de1a | 08-Apr-2020 |
Richard Levitte |
CMS KARI: Temporarly downgrade newly generated EVP_PKEYs to legacy The EVP_PKEY_ASN1_METHOD code used by CMS_RecipientInfo_kari_decrypt() and cms_RecipientInfo_kari_encrypt() is quite co
CMS KARI: Temporarly downgrade newly generated EVP_PKEYs to legacy The EVP_PKEY_ASN1_METHOD code used by CMS_RecipientInfo_kari_decrypt() and cms_RecipientInfo_kari_encrypt() is quite complex and needs more careful thought to work with provider side keys. Unfortunately, we need to get key generation in place, among others for ECC keys, so we add a temporary hack, similar to what's already done in TLS code, that downgrades a provider side EVP_PKEY to become EVP_PKEY_ASN1_METHOD / EVP_PKEY_METHOD based. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> (Merged from https://github.com/openssl/openssl/pull/11501)
show more ...
|
1ae56f2f | 04-Mar-2020 |
Rich Salz |
Don't compile commands if disabled Rather than wrapping whole files in "ifndef OPENSSL_NO_xxx" we handle the changes in build.info Reviewed-by: Paul Dale <paul.dale@oracle.com>
Don't compile commands if disabled Rather than wrapping whole files in "ifndef OPENSSL_NO_xxx" we handle the changes in build.info Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/11250)
show more ...
|
fa4d3fe4 | 08-Apr-2020 |
Benjamin Kaduk |
Fix krb5 external test Since commit c3845ceba84aab9ddeb43f043549238fd10de63b ("Build file templates: don't set OPENSSL_{ENGINES,MODULES}") the krb5 external test has been failing. T
Fix krb5 external test Since commit c3845ceba84aab9ddeb43f043549238fd10de63b ("Build file templates: don't set OPENSSL_{ENGINES,MODULES}") the krb5 external test has been failing. This is because it relied on OPENSSL_MODULES already being set -- even though it did assign to OPENSSL_MODULES itself (and thus got skipped by the cleanup pass in that commit), it was doing so only to canonicalize the existing value to an absolute path, not as a de novo assignment. Catch up to the rest of the tree and just set it directly as the "providers" path from the build top (but still canonicalized to an absolute path). [extended tests] Fixes: 11492 Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11499)
show more ...
|
09fafd06 | 09-Apr-2020 |
Richard Levitte |
Add common internal crypto/ modules in liblegacy.a Just as for the FIPS module, there's code in the legacy module that need this. Reviewed-by: Shane Lontis <shane.lontis@oracle.
Add common internal crypto/ modules in liblegacy.a Just as for the FIPS module, there's code in the legacy module that need this. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11504)
show more ...
|
5435044f | 07-Apr-2020 |
Matt Caswell |
Enable Ed25519 signing/verifying to use the libctx Ed25519 needs to fetch a digest and so needs to use the correct libctx. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Mer
Enable Ed25519 signing/verifying to use the libctx Ed25519 needs to fetch a digest and so needs to use the correct libctx. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11496)
show more ...
|
bbe3ed06 | 08-Apr-2020 |
Matt Caswell |
Add the auto generated der files to .gitignore Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/
Add the auto generated der files to .gitignore Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11495)
show more ...
|
aa233ef7 | 07-Apr-2020 |
Matt Caswell |
Document the new library context aware CT functions Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11483) |
1a37ee94 | 03-Apr-2020 |
Matt Caswell |
Ensure libssl uses the new library context aware CT code Ensure that when we create a CTLOG_STORE we use the new library context aware function. Also ensure that when we create
Ensure libssl uses the new library context aware CT code Ensure that when we create a CTLOG_STORE we use the new library context aware function. Also ensure that when we create a CT_POLICY_EVAL_CTX we associate it with the library context. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11483)
show more ...
|
d4b2bfba | 03-Apr-2020 |
Matt Caswell |
Make the CT code library context aware Add the new functions CTLOG_STORE_new_with_libctx(), CTLOG_new_with_libctx() and CTLOG_new_from_base64_with_libctx() to pass in the library con
Make the CT code library context aware Add the new functions CTLOG_STORE_new_with_libctx(), CTLOG_new_with_libctx() and CTLOG_new_from_base64_with_libctx() to pass in the library context/property query string to use a library context is to be used. We also add the function CT_POLICY_EVAL_CTX_new_with_libctx() to enable the creation of a CT_POLICY_EVAL_CTX to be associated with a libctx and property query string. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11483)
show more ...
|
76e23fc5 | 06-Apr-2020 |
Matt Caswell |
Enable export_to functions to have access to the libctx The EC export_to function calls EC_POINT_point2buf that can later generate a random number in some circumstances. Therefore we pas
Enable export_to functions to have access to the libctx The EC export_to function calls EC_POINT_point2buf that can later generate a random number in some circumstances. Therefore we pass in a BN_CTX associated with the library context. This means we have to change the export_to function signature to accept the library context. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11493)
show more ...
|
8519b244 | 09-Apr-2020 |
Richard Levitte |
OpenSSL::OID: Don't use List::Util It turns out that the pairwise functions of List::Util came into perl far later than 5.10.0. We can't use that under those conditions, so must rev
OpenSSL::OID: Don't use List::Util It turns out that the pairwise functions of List::Util came into perl far later than 5.10.0. We can't use that under those conditions, so must revert to a quick internal implementation of the functions we're after. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11503)
show more ...
|
ae325428 | 07-Apr-2020 |
Jim Newsome |
Update RAND_METHOD definition in man page The `add` and `seed` callbacks were changed to return `int` instead of `void` in b6dcdbfc94c482f6c15ba725754fc9e827e41851 (first included in
Update RAND_METHOD definition in man page The `add` and `seed` callbacks were changed to return `int` instead of `void` in b6dcdbfc94c482f6c15ba725754fc9e827e41851 (first included in tag OpenSSL_1_1_0-pre1). The `add` callback was changed to take a `double` instead of an `int` in 853f757ecea74a271a7c5cdee3f3b5fe0d3ae863. CLA: trivial Fixes: #10199 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Ben Kaduk <kaduk@mit.edu> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11486)
show more ...
|