d3b2f876 | 17-Mar-2020 |
Richard Levitte |
evp_test: the tests using MDC2 need the legacy provider This was always a potential, we just haven't seen this need before now. Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (M
evp_test: the tests using MDC2 need the legacy provider This was always a potential, we just haven't seen this need before now. Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (Merged from https://github.com/openssl/openssl/pull/11343)
show more ...
|
4b9e90f4 | 17-Mar-2020 |
Richard Levitte |
EVP: fetch the EVP_KEYMGMT earlier Instead of fetching the EVP_KEYMGMT in the init for every different operation, do it when creating the EVP_PKEY_CTX. This allows certain contr
EVP: fetch the EVP_KEYMGMT earlier Instead of fetching the EVP_KEYMGMT in the init for every different operation, do it when creating the EVP_PKEY_CTX. This allows certain control functions to be called between the creation of the EVP_PKEY_CTX and the call of the operation's init function. Use case: EVP_PKEY_CTX_set1_id(), which is allowed to be called very early with the legacy implementation, this should still be allowed with provider implementations. Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (Merged from https://github.com/openssl/openssl/pull/11343)
show more ...
|
9a1c170d | 12-Mar-2020 |
EasySec |
s_server: warn about NO PSK identity hint in TLSv1.3 There is NO PSK identity hint in TLSv1.3 so output a warning message when inconsistent PSK / TLS options are mixed. Reviewed
s_server: warn about NO PSK identity hint in TLSv1.3 There is NO PSK identity hint in TLSv1.3 so output a warning message when inconsistent PSK / TLS options are mixed. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11322)
show more ...
|
22e27978 | 20-Mar-2020 |
Shane Lontis |
Add support for passing the libctx to the config loader The self tests for the fips module are triggered on startup and they need to know the core's libctx in order to function correctly
Add support for passing the libctx to the config loader The self tests for the fips module are triggered on startup and they need to know the core's libctx in order to function correctly. As the provider can be autoloaded via configuration it then needs to propagate the callers libctx down to the provider via the config load. Note that OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CONFIG, ..) is still called, but will only load the default configuration if the OPENSSL_CONF environment variable is set. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11240)
show more ...
|
0f2deef5 | 12-Mar-2020 |
Matt Caswell |
Use RAND_bytes_ex in crypto/rsa At various points in crypto/rsa we need to get random numbers. We should ensure that we use the correct libctx when doing so. Reviewed-by: Tomas
Use RAND_bytes_ex in crypto/rsa At various points in crypto/rsa we need to get random numbers. We should ensure that we use the correct libctx when doing so. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11355)
show more ...
|
cb57f425 | 12-Mar-2020 |
Matt Caswell |
Make sure we use the libctx when fetching a MAC We were doing an EVP_MAC_fetch without using the correct libctx. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from
Make sure we use the libctx when fetching a MAC We were doing an EVP_MAC_fetch without using the correct libctx. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11354)
show more ...
|
a2b62316 | 12-Mar-2020 |
Matt Caswell |
Handle the case where there is no digest in an EVP_MD_CTX EVP_MD_CTX_ctrl assumes that a digest has always been set. However in a non-legacy EVP_DigestSign* operation this is not the cas
Handle the case where there is no digest in an EVP_MD_CTX EVP_MD_CTX_ctrl assumes that a digest has always been set. However in a non-legacy EVP_DigestSign* operation this is not the case because the digest is handled entirely by the underlying signature implementation. This fixes one of the travis failures on the master branch. [extended tests] Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11317)
show more ...
|
8658fedd | 17-Mar-2020 |
Dr. Matthias St. Pierre |
Update CHANGES and NEWS for 1.1.1e release Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11346) |
ad090d57 | 13-Feb-2020 |
David von Oheimb |
make err() message strings of find-doc-nits consistently start with uppercase letters Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/p
make err() message strings of find-doc-nits consistently start with uppercase letters Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11092)
show more ...
|
bc6ca4cb | 13-Feb-2020 |
David von Oheimb |
add line and file info to 'Malformed line' error msg on *.num files in make-doc-nits Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pu
add line and file info to 'Malformed line' error msg on *.num files in make-doc-nits Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11092)
show more ...
|
ae8483d2 | 11-Mar-2020 |
Dr. David von Oheimb |
Rename OSSL_{d2i,i2d}_CMP_MSG_bio to {d2i,id2}_OSSL_CMP_MSG_bio Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from
Rename OSSL_{d2i,i2d}_CMP_MSG_bio to {d2i,id2}_OSSL_CMP_MSG_bio Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/11307)
show more ...
|
90a7c905 | 10-Mar-2020 |
Dr. David von Oheimb |
fix false positive of check-format.pl regarding '#if' on preceding line; extend negative tests Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: David von Oheimb <david.von
fix false positive of check-format.pl regarding '#if' on preceding line; extend negative tests Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/11285)
show more ...
|
aed723f1 | 09-Mar-2020 |
Dr. David von Oheimb |
make util/check-format.pl script executable Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://githu
make util/check-format.pl script executable Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/11285)
show more ...
|
38e49781 | 09-Mar-2020 |
Dr. David von Oheimb |
fix false positive of check-format.pl reporting '{1 stmt}' after multi-line 'if(expr)' Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@
fix false positive of check-format.pl reporting '{1 stmt}' after multi-line 'if(expr)' Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/11285)
show more ...
|
cde63b73 | 11-Mar-2020 |
Rich Salz |
Extend Travis build time-out - Add travis_wait to the build command - And travis_retry to some apt-get commands. - Use `make _tests` instead of `make test` Reviewed-by: Rich
Extend Travis build time-out - Add travis_wait to the build command - And travis_retry to some apt-get commands. - Use `make _tests` instead of `make test` Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> (Merged from https://github.com/openssl/openssl/pull/11319)
show more ...
|
244bc297 | 17-Mar-2020 |
Matt Caswell |
Implement serializers for ED25519 and ED448 This is largely based on the existing X25519 and X448 serializers - but a few adjustments were necessary so that we can identify what type of
Implement serializers for ED25519 and ED448 This is largely based on the existing X25519 and X448 serializers - but a few adjustments were necessary so that we can identify what type of key we are using. Previously we used the keylen for this but X25519 and ED25519 have the same keylen. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11272)
show more ...
|
b3e6d666 | 16-Mar-2020 |
Ben Kaduk |
sslapitest: don't leak the SSL_CTX pair We have no need for a new set of SSL_CTXs in test_ccs_change_cipher(), so just keep using the original ones. Also, fix a typo in a comment.
sslapitest: don't leak the SSL_CTX pair We have no need for a new set of SSL_CTXs in test_ccs_change_cipher(), so just keep using the original ones. Also, fix a typo in a comment. [extended tests] Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11336)
show more ...
|
0acaa795 | 11-Mar-2020 |
Xiaokang Qian |
Fix the compile error once enabled Werror On 32 bit operating system,size_t is defined as unsigned int, this is the return type of strlen(), but it isn't aligned with the %ld, when c
Fix the compile error once enabled Werror On 32 bit operating system,size_t is defined as unsigned int, this is the return type of strlen(), but it isn't aligned with the %ld, when compiling, warning will be reported. Change the type to %zu to avoid the warning. Change-Id: I2943d0dfba88ef42892f14230242008473d6263b Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11325)
show more ...
|
074a6e86 | 20-Nov-2019 |
John Baldwin |
Use a flag in SSL3_BUFFER to track when an application buffer is reused. With KTLS, writes to an SSL connection store the application buffer pointer directly in the 'buf' member instead
Use a flag in SSL3_BUFFER to track when an application buffer is reused. With KTLS, writes to an SSL connection store the application buffer pointer directly in the 'buf' member instead of allocating a separate buffer to hold the encrypted data. As a result, ssl3_release_write_buffer() has to avoid freeing these 'buf' pointers. Previously, ssl3_release_write_buffer() checked for KTLS being enabled on the write BIO to determine if a buffer should be freed. However, a buffer can outlive a BIO. For example, 'openssl s_time' creates new write BIOs when reusing sessions. Since the new BIO did not have KTLS enabled at the start of a connection, ssl3_release_write_buffer() would incorrectly try to free the 'buf' pointer from the previous KTLS connection. To fix, track the state of 'buf' explicitly in SSL3_BUFFER to determine if the 'buf' should be freed or simply cleared. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10489)
show more ...
|
b1f79e7c | 19-Nov-2019 |
John Baldwin |
Support KTLS on connections using BIO_TYPE_CONNECT. This requires duplicating the KTLS changes from bss_sock.c in bss_conn.c. One difference from BIO_TYPE_SOCKET is that the call to
Support KTLS on connections using BIO_TYPE_CONNECT. This requires duplicating the KTLS changes from bss_sock.c in bss_conn.c. One difference from BIO_TYPE_SOCKET is that the call to ktls_enable is performed after the socket is created in BIO_socket rather than BIO_new_connect. Some applications such as 'openssl s_time' use connect BIOs instead of socket BIOs. Note that the new connections created for accept BIOs use BIO_TYPE_SOCKET via BIO_new_socket, so bss_acpt.c does not require changes. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10489)
show more ...
|
fda127be | 10-Mar-2020 |
Richard Levitte |
TEST: Adapt all applicable tests to the new distinguishing ID Fixes #11293 Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (Merged from https://github.com/openssl/openssl/pull/11
TEST: Adapt all applicable tests to the new distinguishing ID Fixes #11293 Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (Merged from https://github.com/openssl/openssl/pull/11302)
show more ...
|
2292c8e1 | 10-Mar-2020 |
Richard Levitte |
APPS: Remove all traces of special SM2 treatment. SM2 IDs are now passed entirely as '-pkeyopt', '-sigopt' or '-vfyopt' values, just like any other valid option. Fixes #11293
APPS: Remove all traces of special SM2 treatment. SM2 IDs are now passed entirely as '-pkeyopt', '-sigopt' or '-vfyopt' values, just like any other valid option. Fixes #11293 Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (Merged from https://github.com/openssl/openssl/pull/11302)
show more ...
|
aba9bca3 | 10-Mar-2020 |
Richard Levitte |
APPS: Add ctrl_str()-like functionality for X509 and X509_REQ This should really be part of libcrypto, but since this looks like added legacy support, it's preferable to keep it in apps
APPS: Add ctrl_str()-like functionality for X509 and X509_REQ This should really be part of libcrypto, but since this looks like added legacy support, it's preferable to keep it in apps for now. This allows to build functions that add user given verification options to X509 and X509_REQ structures. Fixes #11293 Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (Merged from https://github.com/openssl/openssl/pull/11302)
show more ...
|
123c2fef | 10-Mar-2020 |
Richard Levitte |
SM2: Make the EVP_PKEY_METHOD ctrl_str function listen to distid Because we start using Distinguished ID, we also define the key name "distid", possibly prefixed with "hex", but keep "sm
SM2: Make the EVP_PKEY_METHOD ctrl_str function listen to distid Because we start using Distinguished ID, we also define the key name "distid", possibly prefixed with "hex", but keep "sm2_id" and "sm2_hex_id" for compatibility with GmSSL. Fixes #11293 Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (Merged from https://github.com/openssl/openssl/pull/11302)
show more ...
|
70a7dd6f | 10-Mar-2020 |
Richard Levitte |
X509: Rename X509_set0_sm2_id() and friends - X509_set0_sm2_id() -> X509_set0_distinguishing_id() - X509_get0_sm2_id() -> X509_get0_distinguishing_id() - X509_REQ_set0_sm2_id -> X509
X509: Rename X509_set0_sm2_id() and friends - X509_set0_sm2_id() -> X509_set0_distinguishing_id() - X509_get0_sm2_id() -> X509_get0_distinguishing_id() - X509_REQ_set0_sm2_id -> X509_REQ_set0_distinguishing_id() - X509_REQ_get0_sm2_id -> X509_REQ_get0_distinguishing_id() The reason for this rename is that the SM2 ID isn't really a unique SM2 data item, but rather a re-use of the Distinguished that is defined in ISO/IEC 15946-3 as well as in FIPS 196, with no special attribution toward any algorithm in particular. Fixes #11293 Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (Merged from https://github.com/openssl/openssl/pull/11302)
show more ...
|