5ac7ee4d | 02-Aug-2023 |
Frederik Wedel-Heinen |
Resolves some magic values that has a hello_retry_request enum type. CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
Resolves some magic values that has a hello_retry_request enum type. CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21636)
show more ...
|
1e7cc86b | 03-Aug-2023 |
Hugo Landau |
QUIC: Fix incompatible merges causing CI breakage Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/
QUIC: Fix incompatible merges causing CI breakage Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/21641)
show more ...
|
2c8d9f19 | 27-Jul-2023 |
Dr. David von Oheimb |
crypto/cmp: fix clash of OSSL_CMP_CERTREQID_NONE with error result of ossl_cmp_asn1_get_int() Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> R
crypto/cmp: fix clash of OSSL_CMP_CERTREQID_NONE with error result of ossl_cmp_asn1_get_int() Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/21579)
show more ...
|
bdb1f6b7 | 01-Aug-2023 |
Wo'O Ideafarm |
formatting: shift one space to right per request. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@open
formatting: shift one space to right per request. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21595)
show more ...
|
fafb7d30 | 28-Jul-2023 |
Wo'O Ideafarm |
trivial change: optionally suppress include lines CLA: trivial Code that includes applink.c can now define APPLINK_NO_INCLUDES to suppress the include preprocessor lines in that fil
trivial change: optionally suppress include lines CLA: trivial Code that includes applink.c can now define APPLINK_NO_INCLUDES to suppress the include preprocessor lines in that file. This might be needed if, for example, applink.c is being included into a source file that will be compiled to reference a C library built using different calling conventions. (Example: Open Watcom.) This pull request is intended to replace an identical pull request that I screwed up. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21595)
show more ...
|
38c70a16 | 01-Aug-2023 |
Tianjia Zhang |
Fix typo in function name Signed-off-by: Tianjia Zhang <tianjia.zhang@linux.alibaba.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org>
Fix typo in function name Signed-off-by: Tianjia Zhang <tianjia.zhang@linux.alibaba.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21608)
show more ...
|
c9fb65b8 | 01-Aug-2023 |
Matt Caswell |
Add support into qtest_shutdown for blocking mode Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/o
Add support into qtest_shutdown for blocking mode Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21591)
show more ...
|
cf355bd6 | 28-Jul-2023 |
Matt Caswell |
Extend the test_quic_write_read() test to include resumption We add an additional loop around test_quic_write_read() to repeat the test but using a session obtained from the initial iter
Extend the test_quic_write_read() test to include resumption We add an additional loop around test_quic_write_read() to repeat the test but using a session obtained from the initial iteration to confirm that we can successfully resume the session. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21591)
show more ...
|
f219abef | 28-Jul-2023 |
Matt Caswell |
Ensure the QUIC TLS SSL object is marked as shutdown If we shutdown the QUIC connection then we should mark the underlying TLS SSL object as shutdown as well. Otherwise any sessions are
Ensure the QUIC TLS SSL object is marked as shutdown If we shutdown the QUIC connection then we should mark the underlying TLS SSL object as shutdown as well. Otherwise any sessions are considered unusable for resumption. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21591)
show more ...
|
829eec9f | 28-Jul-2023 |
Matt Caswell |
Add the ability for tserver to use a pre-existing SSL_CTX Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/o
Add the ability for tserver to use a pre-existing SSL_CTX Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21591)
show more ...
|
f85d3432 | 27-Jul-2023 |
Matt Caswell |
Keep doing ossl_quic_tls_tick() even after handshake completion There may be post-handshake messages to process so make sure we keep ticking things even if the handshake has finished. We
Keep doing ossl_quic_tls_tick() even after handshake completion There may be post-handshake messages to process so make sure we keep ticking things even if the handshake has finished. We do this simply by calling SSL_read(). There should never be app data to read but we will process any handshake records we encounter. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21591)
show more ...
|
747b51f4 | 27-Jul-2023 |
Matt Caswell |
Correctly keep track of where we are in the quicserver request buffer If the request comes in in multiple chunks properly keep tract of where we are. Reviewed-by: Tomas Mraz <to
Correctly keep track of where we are in the quicserver request buffer If the request comes in in multiple chunks properly keep tract of where we are. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21578)
show more ...
|
c31f0612 | 27-Jul-2023 |
Matt Caswell |
Ensure SSL_has_pending() always works even before a connection s_client calls SSL_has_pending() even before the connection has been established. We expect it to return 0 in this case and
Ensure SSL_has_pending() always works even before a connection s_client calls SSL_has_pending() even before the connection has been established. We expect it to return 0 in this case and not put any errors on the stack. We change things so that SSL_has_pending() always returns 0 if there is no stream available. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21578)
show more ...
|
33f6ad17 | 27-Jul-2023 |
Matt Caswell |
Still advance handshake even on an empty write A call to SSL_write() with a zero length buffer should still advance the handshake. Applications (including s_client) may rely on this.
Still advance handshake even on an empty write A call to SSL_write() with a zero length buffer should still advance the handshake. Applications (including s_client) may rely on this. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21578)
show more ...
|
a1c87f64 | 05-Jul-2023 |
Matt Caswell |
Add a QUIC test for back pressure Check that if one endpoint is sending data faster than its peer can handle then we eventually see back pressure. Reviewed-by: Hugo Landau <hlan
Add a QUIC test for back pressure Check that if one endpoint is sending data faster than its peer can handle then we eventually see back pressure. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21368)
show more ...
|
df3d6090 | 31-Jul-2023 |
Matt Caswell |
Add a test for PEM_read_bio_Parameters() We must not ask for a password when attempting to read parameters. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <to
Add a test for PEM_read_bio_Parameters() We must not ask for a password when attempting to read parameters. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21603)
show more ...
|
0d0791ee | 31-Jul-2023 |
Matt Caswell |
The PEM_read_bio_Parameters() function should not ask for a password The PEM_read_bio_Parameters[_ex] function does not have the capability of specifying a password callback. We should n
The PEM_read_bio_Parameters() function should not ask for a password The PEM_read_bio_Parameters[_ex] function does not have the capability of specifying a password callback. We should not use the fallback password callback in this case because it will attempt to send a prompt for the password which might not be the correct thing to do. We should just not use a password in that case. Fixes #21588 Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21603)
show more ...
|
564e5b75 | 31-Jul-2023 |
Matt Caswell |
Always add a suitable error if we fail to decode We're always supposed to add the fallback "unsupported" error if we don't have anything better. However in some cases this wasn't happeni
Always add a suitable error if we fail to decode We're always supposed to add the fallback "unsupported" error if we don't have anything better. However in some cases this wasn't happening because we were incorrectly setting "flag_construct_called" - even though the construct function had failed. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21603)
show more ...
|
6207f2b6 | 31-Jul-2023 |
Matt Caswell |
Don't add the msblob/pvk decoders if they're not suitable msblob only decodes public/private keys (not just params). pvk only decodes private keys. If the requested selection do
Don't add the msblob/pvk decoders if they're not suitable msblob only decodes public/private keys (not just params). pvk only decodes private keys. If the requested selection doesn't intersect with the above then don't consider those decoders. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21603)
show more ...
|
780ce384 | 24-Jul-2023 |
zhuchen |
Fixed incorrect usage of vshuf.b instruction In the definition of the latest revised LoongArch64 vector instruction manual, it is clearly pointed out that the undefined upper three bits
Fixed incorrect usage of vshuf.b instruction In the definition of the latest revised LoongArch64 vector instruction manual, it is clearly pointed out that the undefined upper three bits of each byte in the control register of the vshuf.b instruction should not be used, otherwise uncertain results may be obtained. Therefore, it is necessary to correct the use of the vshuf.b instruction in the existing vpaes-loongarch64.pl code to avoid erroneous calculation results in future LoongArch64 processors. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21530)
show more ...
|
160f4894 | 20-Jul-2023 |
Xi Ruoyao |
Add system guessing for linux64-loongarch64 target Now the default is linux-generic32, it's not good for loongarch64. We can also test if the assembler supports vector instructions
Add system guessing for linux64-loongarch64 target Now the default is linux-generic32, it's not good for loongarch64. We can also test if the assembler supports vector instructions here and disable asm if not. Closes #21340. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21510)
show more ...
|
eb2ff04c | 19-Jul-2023 |
Ingo Franzki |
speed: Unify output messages regarding number of ops per time Always report "<algo> ops in <time>", instead of "<algo>'s in <time>" or similar. Avoid the use of apostrophes and/or plural
speed: Unify output messages regarding number of ops per time Always report "<algo> ops in <time>", instead of "<algo>'s in <time>" or similar. Avoid the use of apostrophes and/or plural with algorithm names. Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21383)
show more ...
|
0195df8b | 20-Jun-2023 |
Ingo Franzki |
speed: Also measure RSA encrypt/decrypt, not only RSA sign/verify While RSA encrypt/decrypt and sign/verify are basically the same mod-expo operations, the speed of the operation may sti
speed: Also measure RSA encrypt/decrypt, not only RSA sign/verify While RSA encrypt/decrypt and sign/verify are basically the same mod-expo operations, the speed of the operation may still differ, due to different padding, as well as the use of implicit rejection for RSA decrypt. Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21383)
show more ...
|
e3d897d3 | 27-Jul-2023 |
Matt Caswell |
Fix a regression in X509_VERIFY_PARAM_add0_policy() Also fixes a similar regression in X509_VERIFY_PARAM_add0_table(). Commit 38ebfc3 introduced a regression in 3.0.6 that changed t
Fix a regression in X509_VERIFY_PARAM_add0_policy() Also fixes a similar regression in X509_VERIFY_PARAM_add0_table(). Commit 38ebfc3 introduced a regression in 3.0.6 that changed the return value of the two functions above from 1 on success to the number of entries in the stack. If there are more than one entry then this is a change in behaviour which should not have been introduced into a stable release. This reverts the behaviour back to what it was prior to the change. The code is slightly different to the original code in that we also handle a possible -1 return value from the stack push function. This should never happen in reality because we never pass a NULL stack as a parameter - but for the sake of robustness we handle it anyway. Note that the changed behaviour exists in all versions of 3.1 (it never had the original version). But 3.1 should be fully backwards compatible with 3.0 so we should change it there too. Fixes #21570 Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/21576)
show more ...
|
63fac76c | 24-Jul-2023 |
Hugo Landau |
QUIC: Automatically drain non-concluded streams, bugfixes Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/ope
QUIC: Automatically drain non-concluded streams, bugfixes Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21484)
show more ...
|