a998ec0e | 22-Feb-2020 |
Pauli |
secmem: ignore small minsize arguments to CRYPTO_secure_malloc_init(). If the user specifies a minimum allocation size that is smaller than the free list structure (or zero), calculate t
secmem: ignore small minsize arguments to CRYPTO_secure_malloc_init(). If the user specifies a minimum allocation size that is smaller than the free list structure (or zero), calculate the minimum possible size rather than failing. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11149)
show more ...
|
50e0402c | 22-Feb-2020 |
Pauli |
sec_mem: add note about the minimum size parameter. Add a note indicating that the minimum size parameter to CRYPTO_secure_malloc_init() should be small. Reviewed-by: Viktor Duk
sec_mem: add note about the minimum size parameter. Add a note indicating that the minimum size parameter to CRYPTO_secure_malloc_init() should be small. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11149)
show more ...
|
d27fd991 | 26-Feb-2020 |
Davide Galassi |
Mem-sec small code adjustment Conditional code readability improvement. Remove unused macro Commit #11042 has introduced a new, unused, CRYPTO_EX_INDEX macro. Remove be
Mem-sec small code adjustment Conditional code readability improvement. Remove unused macro Commit #11042 has introduced a new, unused, CRYPTO_EX_INDEX macro. Remove before version release. Reviewed-by: Paul Yang <kaishen.yy@antfin.com> Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11103)
show more ...
|
2c702ef2 | 26-Feb-2020 |
H.J. Lu |
x86_64: Replace .asciz "GNU" with .byte Replace .asciz "GNU" with .byte since .asciz isn't supported on Solaris. Fixes https://github.com/openssl/openssl/issues/11132 Reviewed-b
x86_64: Replace .asciz "GNU" with .byte Replace .asciz "GNU" with .byte since .asciz isn't supported on Solaris. Fixes https://github.com/openssl/openssl/issues/11132 Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11137)
show more ...
|
e7045215 | 17-Feb-2020 |
Dr. Matthias St. Pierre |
Check that the DRBG's internal state has been zeroized after uninstantiation Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11111) |
75ff4f74 | 17-Feb-2020 |
Dr. Matthias St. Pierre |
DRBG: delay initialization of DRBG method until instantiation Previously, the initialization was done immediately in RAND_DRBG_set(), which is also called in RAND_DRBG_uninstantiate().
DRBG: delay initialization of DRBG method until instantiation Previously, the initialization was done immediately in RAND_DRBG_set(), which is also called in RAND_DRBG_uninstantiate(). This made it difficult for the FIPS DRBG self test to verify that the internal state had been zeroized, because it had the side effect that the drbg->data structure was reinitialized immediately. To solve the problem, RAND_DRBG_set() has been split in two parts static int rand_drbg_set(RAND_DRBG *drbg, int type, unsigned int flags); static int rand_drbg_init_method(RAND_DRBG *drbg); and only the first part is called from RAND_DRBG_uninstantiate(). Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11111)
show more ...
|
19ded1a7 | 18-Feb-2020 |
Matt Turner |
config: Drop linux-alpha-gcc+bwx Its entry in Configuration/10-main.conf was dropped in commit 7ead0c89185c ("Configure: fold related configurations more aggressively and clean-up.")
config: Drop linux-alpha-gcc+bwx Its entry in Configuration/10-main.conf was dropped in commit 7ead0c89185c ("Configure: fold related configurations more aggressively and clean-up.") probably because all but one of its bn_ops were removed (RC4_CHAR remained). Benchmarks on an Alpha EV7 indicate that RC4_INT is better than RC4_CHAR so rather than restoring the configuation, remove it from config. CLA: trivial Bug: https://bugs.gentoo.org/697840 Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11130)
show more ...
|
e1182bdb | 22-Feb-2020 |
Richard Levitte |
Fix default provider merge glitch Property "default" no longer exists, replace "default=yes" with "provider=default" Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged fr
Fix default provider merge glitch Property "default" no longer exists, replace "default=yes" with "provider=default" Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11150)
show more ...
|
3f7ce7f1 | 12-Feb-2020 |
Richard Levitte |
Refactor evp_pkey_make_provided() to do legacy to provider export Previously, evp-keymgmt_util_export_to_provider() took care of all kinds of exports of EVP_PKEYs to provider side keys,
Refactor evp_pkey_make_provided() to do legacy to provider export Previously, evp-keymgmt_util_export_to_provider() took care of all kinds of exports of EVP_PKEYs to provider side keys, be it from its legacy key or from another provider side key. This works most of the times, but there may be cases where the caller wants to be a bit more in control of what sort of export happens when. Also, when it's time to remove all legacy stuff, that job will be much easier if we have a better separation between legacy support and support of provided stuff, as far as we can take it. This changes moves the support of legacy key to provider side key export from evp-keymgmt_util_export_to_provider() to evp_pkey_make_provided(), and makes sure the latter is called from all EVP_PKEY functions that handle legacy stuff. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11074)
show more ...
|
8e90e3d5 | 30-Jan-2020 |
Richard Levitte |
DSA: More conforming names in crypto/dsa/dsa_aid.c Made macro names that refer to a known base OID, an commented accordingly. Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
DSA: More conforming names in crypto/dsa/dsa_aid.c Made macro names that refer to a known base OID, an commented accordingly. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10557)
show more ...
|
e72467d3 | 12-Dec-2019 |
Richard Levitte |
doc/man3/EVP_PKEY_CTX_ctrl.pod: cleanup Clean up a manual we've touched, according to conventions found in Linux' man-pages(7); function arguments in descriptions should be in italic
doc/man3/EVP_PKEY_CTX_ctrl.pod: cleanup Clean up a manual we've touched, according to conventions found in Linux' man-pages(7); function arguments in descriptions should be in italics, and types, macros and similar should be in bold, with the exception for NULL. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10557)
show more ...
|
1b6ea308 | 04-Dec-2019 |
Richard Levitte |
PROV: Avoid MDC2 in the RSA signature implementation in the FIPS module Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged
PROV: Avoid MDC2 in the RSA signature implementation in the FIPS module Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10557)
show more ...
|
ae9e0698 | 03-Dec-2019 |
Richard Levitte |
test/recipes/30-test_evp_data/evppkey.txt Tests that go through provider cannot recognise PKEY_CTRL_INVALID from PKEY_CTRL_ERROR any more, because provided implementations' param set
test/recipes/30-test_evp_data/evppkey.txt Tests that go through provider cannot recognise PKEY_CTRL_INVALID from PKEY_CTRL_ERROR any more, because provided implementations' param setting functions return 0 or 1. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10557)
show more ...
|
f54a4101 | 02-Dec-2019 |
Richard Levitte |
test/evp_extra_test.c: adapt for RSA signature tests Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github
test/evp_extra_test.c: adapt for RSA signature tests Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10557)
show more ...
|
a9127c1d | 02-Dec-2019 |
Richard Levitte |
rsa_get0_all_params(): Allow zero CRT params Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/ope
rsa_get0_all_params(): Allow zero CRT params Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10557)
show more ...
|
6f4b7663 | 01-Dec-2019 |
Richard Levitte |
PROV: add RSA signature implementation This includes legacy PSS controls to params conversion, and an attempt to generalise the parameter names when they are suitable for more than o
PROV: add RSA signature implementation This includes legacy PSS controls to params conversion, and an attempt to generalise the parameter names when they are suitable for more than one operation. Also added crypto/rsa/rsa_aid.c, containing proper AlgorithmIdentifiers for known RSA+hash function combinations. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10557)
show more ...
|
e8d0819d | 21-Feb-2020 |
Dr. David von Oheimb |
Don't exclude quite so much in a no-sock build We were excluding more code than we needed to in the OCSP/HTTP code in the event of no-sock. We should also not assume that a BIO passed to
Don't exclude quite so much in a no-sock build We were excluding more code than we needed to in the OCSP/HTTP code in the event of no-sock. We should also not assume that a BIO passed to our API is socket based. This fixes the no-sock build Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/11134)
show more ...
|
745fc918 | 14-Feb-2020 |
Matt Caswell |
Introduce the provider property Replace the properties default, fips and legacy with a single property called "provider". So, for example, instead of writing "default=yes" to get alg
Introduce the provider property Replace the properties default, fips and legacy with a single property called "provider". So, for example, instead of writing "default=yes" to get algorithms from the default provider you would instead write "provider=default". We also have a new "fips" property to indicate that an algorithm is compatible with FIPS mode. This applies to all the algorithms in the FIPS provider, as well as any non-cryptographic algorithms (currently only serializers). Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11097)
show more ...
|
980a880e | 30-Jan-2020 |
Shane Lontis |
Add DRBG self tests Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> (Merged from https://github.com/openssl/openssl/pull/11010) |
92fee421 | 18-Feb-2020 |
Pauli |
pkey: additional EC related options Add options to change the parameter encoding and point conversions for EC public and private keys. These options are present in the deprecated 'ec'
pkey: additional EC related options Add options to change the parameter encoding and point conversions for EC public and private keys. These options are present in the deprecated 'ec' utility. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/11113)
show more ...
|
35eb4588 | 17-Feb-2020 |
Pauli |
pkey: update command line tool examples in light of deprecations. Specifically, refer from the deprecated tools to the pkey equivalents. Reviewed-by: Dmitry Belyavskiy <beldmit@gmai
pkey: update command line tool examples in light of deprecations. Specifically, refer from the deprecated tools to the pkey equivalents. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/11113)
show more ...
|
e1dcac22 | 10-Feb-2020 |
Pauli |
apps: distinguish between a parameter error and an unknown parameter. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11049) |
292c8bdc | 10-Feb-2020 |
Pauli |
pmeth_lib: detect unsupported OSSL_PARAM. When converting legacy controls to OSSL_PARAMs, return the unsupported -2 value correctly. Reviewed-by: Tomas Mraz <tmraz@fedoraproject
pmeth_lib: detect unsupported OSSL_PARAM. When converting legacy controls to OSSL_PARAMs, return the unsupported -2 value correctly. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11049)
show more ...
|
2ee0dfa6 | 10-Feb-2020 |
Pauli |
Params: add argument to the _from_text calls to indicate if the param exists. The extra argument is a integer pointer and is optional. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.o
Params: add argument to the _from_text calls to indicate if the param exists. The extra argument is a integer pointer and is optional. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11049)
show more ...
|
7b5108df | 18-Feb-2020 |
Matt Caswell |
Add *.d.tmp files to .gitignore These are temporary files generated by the build process that should not be checked in. Reviewed-by: Richard Levitte <levitte@openssl.org> (M
Add *.d.tmp files to .gitignore These are temporary files generated by the build process that should not be checked in. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11122)
show more ...
|