a8055c70 | 26-Feb-2020 |
Rich Salz |
Add some missing env var documentation Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl
Add some missing env var documentation Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11189)
show more ...
|
888e2a9b | 02-Mar-2020 |
Vladimir Panteleev |
.gitignore: Add /apps/progs.{c,h} These files were removed from the source tree in fe909ee4aeb6eb64f6f31a1544c5d3c81c5fe1f1. CLA: trivial Reviewed-by: Richard Levitte <
.gitignore: Add /apps/progs.{c,h} These files were removed from the source tree in fe909ee4aeb6eb64f6f31a1544c5d3c81c5fe1f1. CLA: trivial Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11222)
show more ...
|
f552d900 | 16-Feb-2020 |
Shane Lontis |
Add Serializers for EC Provide EC serializers for text, pem and der. EC parameters use ANS1 'CHOICE' - which means they are more embedded than other parameters used by other KEY
Add Serializers for EC Provide EC serializers for text, pem and der. EC parameters use ANS1 'CHOICE' - which means they are more embedded than other parameters used by other KEY types (which normally have a SEQUENCE at the top level). For this reason the ANS1_STRING type that was being passed around has been changed to a void so that the code can still be shared with EC. The EC serializer only supports named curves currently. NOTE the serializer code assumes PKCS8 format - if the older encode methods are needed they will need to be added in another PR. (Probably when deserialization is considered). EVP_PKEY_key_fromdata_init was changed from using a keypair selection to all bits of a key. A side effect of this was that the very restrictive checks in the ecx code needed to be relaxed as it was assuming all selection flags were non optional. As this is not the case for any other key the code has been modified. Fixed a bug in legacy_ctrl_str_to_params() - "ecdh_cofactor_mode" was being incorrectly converted to the wrong keyname. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11107)
show more ...
|
4a98ad08 | 03-Mar-2020 |
Tomas Mraz |
Correct two small documentation issues The find-doc-nits complains about non-zero word and about missing line before =head1 which causes build failure. Reviewed-by: Dmitry Belya
Correct two small documentation issues The find-doc-nits complains about non-zero word and about missing line before =head1 which causes build failure. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11231)
show more ...
|
34890077 | 21-Jan-2020 |
Dmitry Belyavskiy |
Documenting newly added CMS modification Documented CMS-related API functions. Documented flags added to openssl-cms command Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Documenting newly added CMS modification Documented CMS-related API functions. Documented flags added to openssl-cms command Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/10904)
show more ...
|
71434aed | 20-Jan-2020 |
Dmitry Belyavskiy |
Implementation of Russian GOST CMS Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/p
Implementation of Russian GOST CMS Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/10904)
show more ...
|
88398d2a | 01-Mar-2020 |
Dr. Matthias St. Pierre |
doc: document that 'openssl rand' is cryptographically secure Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11213) |
a24e62f5 | 02-Mar-2020 |
Philippe Antoine |
Fix build with clang assembler Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11
Fix build with clang assembler Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11219)
show more ...
|
47c239c6 | 03-Mar-2020 |
Shane Lontis |
Add pairwise consistency self tests to asym keygenerators Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10952) |
97ace6c2 | 27-Feb-2020 |
Richard Levitte |
.travis.yml: Remove NOUPDATE support It was a temporary measure to deal with the fact that util/progs.pl didn't work right at all times, but that has now been fixed. Reviewed-by
.travis.yml: Remove NOUPDATE support It was a temporary measure to deal with the fact that util/progs.pl didn't work right at all times, but that has now been fixed. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11185)
show more ...
|
fe909ee4 | 26-Feb-2020 |
Richard Levitte |
Remove apps/progs.c and apps/progs.h Since they are generated in build time, there's not need to keep them in the source tree. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Remove apps/progs.c and apps/progs.h Since they are generated in build time, there's not need to keep them in the source tree. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11185)
show more ...
|
19cf4404 | 26-Feb-2020 |
Richard Levitte |
Configure: Diverse cleanups There were some remaining old code and comments that don't serve a purpose any longer. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged
Configure: Diverse cleanups There were some remaining old code and comments that don't serve a purpose any longer. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11185)
show more ...
|
a3f1fc25 | 26-Feb-2020 |
Richard Levitte |
Build: Generate apps/progs.c and apps/progs.h in build time util/progs.pl depends on the build tree (on configdata.pm, specifically), so it needs to be run from the build tree. But why
Build: Generate apps/progs.c and apps/progs.h in build time util/progs.pl depends on the build tree (on configdata.pm, specifically), so it needs to be run from the build tree. But why stop there? We might as well generate apps/progs.c and apps/progs.h when building. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11185)
show more ...
|
e4292179 | 26-Feb-2020 |
Richard Levitte |
build.info: Implement simply substitutions in variable values Use case: having a variable with multiple source files in its value, and wanting to refer to the corresponding object file.
build.info: Implement simply substitutions in variable values Use case: having a variable with multiple source files in its value, and wanting to refer to the corresponding object file. $SRCS=foo.c bar.c SOURCE[program]=$SRCS DEPEND[${SRCS/.c/.o}]=prog.h GENERATE[prog.h]=... Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11185)
show more ...
|
ad5be194 | 26-Feb-2020 |
Richard Levitte |
build.info: Make it possible to have more than one item in KEYWORD[] So far, the "index" part of KEYWORD[whatever] could only handle one item. There are cases, however, where we want to
build.info: Make it possible to have more than one item in KEYWORD[] So far, the "index" part of KEYWORD[whatever] could only handle one item. There are cases, however, where we want to add the exact same value to multiple items. This is especially helpful if a variable that may have multi-item values are used in the "index" part. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11185)
show more ...
|
2888fc15 | 06-Feb-2020 |
Richard Levitte |
PROV: Add a OP_keymgmt_match() function to our DH, DSA, RSA and EC_KEY impl Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11158) |
ff3b59e1 | 05-Feb-2020 |
Richard Levitte |
EVP: Add support for copying provided EVP_PKEYs This adds evp_keymgmt_util_copy() and affects EVP_PKEY_copy_parameters() Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Mer
EVP: Add support for copying provided EVP_PKEYs This adds evp_keymgmt_util_copy() and affects EVP_PKEY_copy_parameters() Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11158)
show more ...
|
13697f1c | 05-Feb-2020 |
Richard Levitte |
KEYMGMT: Add a keydata copy function Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11158) |
1e9101c4 | 05-Feb-2020 |
Richard Levitte |
EVP: Add support for comparing provided EVP_PKEYs This adds evp_keymgmt_util_match() and affects EVP_PKEY_cmp() and EVP_PKEY_cmp_parameters(). The word 'match' was used for the
EVP: Add support for comparing provided EVP_PKEYs This adds evp_keymgmt_util_match() and affects EVP_PKEY_cmp() and EVP_PKEY_cmp_parameters(). The word 'match' was used for the new routines because many associate 'cmp' with comparison functions that allows sorting, i.e. return -1, 0 or 1 depending on the order in which the two compared elements should be sorted. EVP_PKEY_cmp() and EVP_PKEY_cmp_parameters() don't quite do that. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11158)
show more ...
|
bee5d6cd | 05-Feb-2020 |
Richard Levitte |
KEYMGMT: Add a keydata matching function Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11158) |
157ded39 | 05-Feb-2020 |
Richard Levitte |
EVP: Adapt EVP_PKEY_missing_parameters() for provider keys Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11158) |
ccceeb48 | 27-Feb-2020 |
Richard Levitte |
crypto/perlasm/x86_64-xlate.pl: detect GNU as to deal with quirks It turns out that GNU as and Solaris as don't have compatible ideas on the .section syntax, so we need to check if we're
crypto/perlasm/x86_64-xlate.pl: detect GNU as to deal with quirks It turns out that GNU as and Solaris as don't have compatible ideas on the .section syntax, so we need to check if we're using GNU as or another assembler and adapt this .section syntax accordingly. Fixes #11132 Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11191)
show more ...
|
15e5b969 | 29-Feb-2020 |
André Klitzing |
Fix drop of const qualifier The parameter got "const" in 9fdcc21fdc9 but that was not added to cast. So this throws a -Wcast-qual in user code. error: cast from 'const DUMMY *'
Fix drop of const qualifier The parameter got "const" in 9fdcc21fdc9 but that was not added to cast. So this throws a -Wcast-qual in user code. error: cast from 'const DUMMY *' to 'ASN1_VALUE_st *' drops const qualifier [-Werror,-Wcast-qual] CLA: trivial Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11210)
show more ...
|
e32c608e | 24-Feb-2020 |
Richard Levitte |
DOCS: Add and modify docs for internal EVP_KEYMGMT utility functions Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11148) |
e33b132a | 24-Feb-2020 |
Richard Levitte |
DOCS: Add internal docs for EVP_PKEY and the export functions Functions covered: - evp_pkey_export_to_provider() - evp_pkey_upgrade_to_provider() Reviewed-by: Shane Lon
DOCS: Add internal docs for EVP_PKEY and the export functions Functions covered: - evp_pkey_export_to_provider() - evp_pkey_upgrade_to_provider() Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11148)
show more ...
|