fbc6efbb | 03-Apr-2020 |
Tomas Mraz |
Travis build matrix adjustments - do not exclude all clang builds on Linux - exclude the constantly timeouting -fsanitize=address build on OS/X - drop some mostly duplicate builds
Travis build matrix adjustments - do not exclude all clang builds on Linux - exclude the constantly timeouting -fsanitize=address build on OS/X - drop some mostly duplicate builds - change the base linux distro to Bionic - drop sudo as that is no longer needed - always on - drop -D__NO_STRING_INLINES where not needed - memleak test is not working with old clang Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11468)
show more ...
|
7b4344ac | 08-Apr-2020 |
Pauli |
Add a null provider which implements no algorithms. By loading the null provider into the default context, it is possible to verify that it is not accidentally being used. Revie
Add a null provider which implements no algorithms. By loading the null provider into the default context, it is possible to verify that it is not accidentally being used. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11488)
show more ...
|
f5056577 | 09-Apr-2020 |
Shane Lontis |
Move legacy ciphers into the legacy provider DES, idea, seed, rc2, rc4, rc5, cast and blowfish have been moved out of the default provider. Code shared between desx and tdes has been mov
Move legacy ciphers into the legacy provider DES, idea, seed, rc2, rc4, rc5, cast and blowfish have been moved out of the default provider. Code shared between desx and tdes has been moved into a seperate file (cipher_tdes_common.c). 3 test recipes failed due to using app/openssl calls that used legacy ciphers. These calls have been updated to supply both the default and legacy providers. Fixed openssl app '-provider' memory leak Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11419)
show more ...
|
cc45a884 | 01-Apr-2020 |
Matt Caswell |
Document the new X509_STORE_CTX_new_with_libctx() function Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://g
Document the new X509_STORE_CTX_new_with_libctx() function Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11457)
show more ...
|
e66c37de | 01-Apr-2020 |
Matt Caswell |
Explicitly cache the X509v3_extensions in one more place in libssl Make sure we cache the extensions for a cert using the right libctx. Reviewed-by: Richard Levitte <levitte@openssl
Explicitly cache the X509v3_extensions in one more place in libssl Make sure we cache the extensions for a cert using the right libctx. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11457)
show more ...
|
0c56a648 | 01-Apr-2020 |
Matt Caswell |
Use the libctx and propq from the X509_STORE_CTX Now that X509_STORE_CTX contain a libctx we should use it in a couple of places where we cache the X509v3 extensions. Reviewed-b
Use the libctx and propq from the X509_STORE_CTX Now that X509_STORE_CTX contain a libctx we should use it in a couple of places where we cache the X509v3 extensions. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11457)
show more ...
|
a959b4fa | 01-Apr-2020 |
Matt Caswell |
Use X509_STORE_CTX_new_with_libctx() in libssl Libssl is OPENSSL_CTX aware so we should use it when creating an X509_STORE_CTX. Reviewed-by: Richard Levitte <levitte@openssl.org
Use X509_STORE_CTX_new_with_libctx() in libssl Libssl is OPENSSL_CTX aware so we should use it when creating an X509_STORE_CTX. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11457)
show more ...
|
1143c27b | 01-Apr-2020 |
Matt Caswell |
Add X509_STORE_CTX_new_with_libctx() Make it possible to create an X509_STORE_CTX with an associated libctx and propq. Reviewed-by: Richard Levitte <levitte@openssl.org> Rev
Add X509_STORE_CTX_new_with_libctx() Make it possible to create an X509_STORE_CTX with an associated libctx and propq. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11457)
show more ...
|
afce590b | 23-Mar-2020 |
Richard Levitte |
TLS: Temporarly downgrade newly generated EVP_PKEYs to legacy The transfer of TLS encodedpoint to backends isn't yet fully supported in provider implementations. This is a temporary mea
TLS: Temporarly downgrade newly generated EVP_PKEYs to legacy The transfer of TLS encodedpoint to backends isn't yet fully supported in provider implementations. This is a temporary measure so as not to get stuck in other development. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11358)
show more ...
|
e3be0f43 | 23-Mar-2020 |
Richard Levitte |
Fix export of provided EC keys The exporter freed a buffer too soon, and there were attempts to use its data later, which was overwritten by something else at that point. Re
Fix export of provided EC keys The exporter freed a buffer too soon, and there were attempts to use its data later, which was overwritten by something else at that point. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11358)
show more ...
|
c2041da8 | 18-Mar-2020 |
Richard Levitte |
EVP & TLS: Add necessary EC_KEY data extraction functions, and use them libssl code uses EVP_PKEY_get0_EC_KEY() to extract certain basic data from the EC_KEY. We replace that with inter
EVP & TLS: Add necessary EC_KEY data extraction functions, and use them libssl code uses EVP_PKEY_get0_EC_KEY() to extract certain basic data from the EC_KEY. We replace that with internal EVP_PKEY functions. This may or may not be refactored later on. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11358)
show more ...
|
4f76d62f | 16-Mar-2020 |
Richard Levitte |
EVP: add EVP_PKEY_is_a() and EVP_PKEY_can_sign() EVP_PKEY_is_a() is the provider side key checking function corresponding to checking EVP_PKEY_id() or an EVP_PKEY against macros like EVP
EVP: add EVP_PKEY_is_a() and EVP_PKEY_can_sign() EVP_PKEY_is_a() is the provider side key checking function corresponding to checking EVP_PKEY_id() or an EVP_PKEY against macros like EVP_PKEY_EC. It also works with legacy internal keys. We also add a warning indoc/man3/EVP_PKEY_set1_RSA.pod regarding the reliability of certain functions that only understand legacy keys. Finally, we take the opportunity to clean up doc/man3/EVP_PKEY_set1_RSA.pod to better conform with man-page layout norms, see man-pages(7) on Linux. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11358)
show more ...
|
82e1fc1b | 07-Apr-2020 |
Pauli |
params: add a warning about the PTR types. The warning is deter the unsure -- if in doubt the PTR type is almost certainly NOT what you should be using. Reviewed-by: Tomas Mraz
params: add a warning about the PTR types. The warning is deter the unsure -- if in doubt the PTR type is almost certainly NOT what you should be using. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11480)
show more ...
|
069165d1 | 22-Feb-2020 |
Patrick Steuer |
AES CTR-DRGB: do not leak timing information Signed-off-by: Patrick Steuer <patrick.steuer@de.ibm.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> Reviewed-by: Paul Dale <
AES CTR-DRGB: do not leak timing information Signed-off-by: Patrick Steuer <patrick.steuer@de.ibm.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11147)
show more ...
|
96218269 | 05-Apr-2020 |
Pauli |
Integer overflow in ASN1_STRING_set. Addressing a potential integer overflow condition. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl
Integer overflow in ASN1_STRING_set. Addressing a potential integer overflow condition. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11473)
show more ...
|
86f32187 | 06-Apr-2020 |
Pauli |
params: avoid a core dump with a null pointer and a get string call Previous a get string (UTF8 or octet) params call would memcpy(2) from a NULL pointer if the OSSL_PARAM didn't have it
params: avoid a core dump with a null pointer and a get string call Previous a get string (UTF8 or octet) params call would memcpy(2) from a NULL pointer if the OSSL_PARAM didn't have its data field set. This change makes the operation fail rather than core dump and it returns to param size (if set). Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11474)
show more ...
|
c61ced5e | 01-Apr-2020 |
Billy Brumley |
[crypto/ec] blind coordinates in ec_wNAF_mul for robustness Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> Reviewed-by: Nicola Tuveri <nicola.tuveri@ibm.com> (Merged from ht
[crypto/ec] blind coordinates in ec_wNAF_mul for robustness Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> Reviewed-by: Nicola Tuveri <nicola.tuveri@ibm.com> (Merged from https://github.com/openssl/openssl/pull/11439)
show more ...
|
1eb9b54a | 06-Apr-2020 |
Bernd Edlinger |
Fix the error handling in EC_POINTs_mul This was pointed out by a false-positive -fsanitizer warning ;-) However from the cryptographical POV the code is wrong: A point
Fix the error handling in EC_POINTs_mul This was pointed out by a false-positive -fsanitizer warning ;-) However from the cryptographical POV the code is wrong: A point R^0 on the wrong curve is infinity on the wrong curve. [extended tests] Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> (Merged from https://github.com/openssl/openssl/pull/11475)
show more ...
|
d8039304 | 31-Mar-2020 |
Dr. David von Oheimb |
Fix misleading error msg for PBM check w/o secret in OSSL_CMP_validate_msg() Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Fix misleading error msg for PBM check w/o secret in OSSL_CMP_validate_msg() Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/11448)
show more ...
|
99d680e6 | 31-Mar-2020 |
Dr. David von Oheimb |
Fix error reporting glitch in X509_STORE_CTX_print_verify_cb() in t_x509.c Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (
Fix error reporting glitch in X509_STORE_CTX_print_verify_cb() in t_x509.c Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/11448)
show more ...
|
a1e4c8ef | 30-Mar-2020 |
Dr. David von Oheimb |
Fix bugs in 3GPP exception checking and improve diagnostics in crypt/cmp/cmp_vfy.c Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.co
Fix bugs in 3GPP exception checking and improve diagnostics in crypt/cmp/cmp_vfy.c Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/11448)
show more ...
|
2d956b32 | 31-Mar-2020 |
Richard Levitte |
PROV: Add DERlib support for ECDSA and EC keys This replaces crypto/ec/ecdsa_aid.c with new code and generated OIDs Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from htt
PROV: Add DERlib support for ECDSA and EC keys This replaces crypto/ec/ecdsa_aid.c with new code and generated OIDs Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11450)
show more ...
|
8c555803 | 31-Mar-2020 |
Richard Levitte |
PROV: Add DERlib support for DSA This replaces crypto/dsa/dsa_aid.c with new code and generated OIDs Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com
PROV: Add DERlib support for DSA This replaces crypto/dsa/dsa_aid.c with new code and generated OIDs Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11450)
show more ...
|
6f5837dc | 31-Mar-2020 |
Richard Levitte |
PROV: Add DERlib support for RSA This replaces crypto/rsa/rsa_aid.c with new code and generated OIDs Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com
PROV: Add DERlib support for RSA This replaces crypto/rsa/rsa_aid.c with new code and generated OIDs Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11450)
show more ...
|
1d39620b | 31-Mar-2020 |
Richard Levitte |
PROV: Add the beginning of a DER writing library This library is meant to be small and quick. It's based on WPACKET, which was extended to support DER writing. The way it's used is a
PROV: Add the beginning of a DER writing library This library is meant to be small and quick. It's based on WPACKET, which was extended to support DER writing. The way it's used is a bit unusual, as it's used to write the structures backward into a given buffer. A typical quick call looks like this: /* * Fill in this structure: * * something ::= SEQUENCE { * id OBJECT IDENTIFIER, * x [0] INTEGER OPTIONAL, * y [1] BOOLEAN OPTIONAL, * n INTEGER * } */ unsigned char buf[nnnn], *p = NULL; size_t encoded_len = 0; WPACKET pkt; int ok; ok = WPACKET_init_der(&pkt, buf, sizeof(buf) && DER_w_start_sequence(&pkt, -1) && DER_w_bn(&pkt, -1, bn) && DER_w_boolean(&pkt, 1, bool) && DER_w_precompiled(&pkt, -1, OID, sizeof(OID)) && DER_w_end_sequence(&pkt, -1) && WPACKET_finish(&pkt) && WPACKET_get_total_written(&pkt, &encoded_len) && (p = WPACKET_get_curr(&pkt)) != NULL; Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11450)
show more ...
|