f3f3f86a | 13-Jun-2023 |
Michael Baentsch <57787676+baentsch@users.noreply.github.com> |
updated (lib+)oqsprovider to latest releases Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.o
updated (lib+)oqsprovider to latest releases Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21194)
show more ...
|
ca711651 | 12-Jun-2023 |
Matt Caswell |
Only take note of the ack deadline if we can actually issue an ack When determining the next tick deadline we cannot actually issue an ack if the CC will not let us, or the enc_level is
Only take note of the ack deadline if we can actually issue an ack When determining the next tick deadline we cannot actually issue an ack if the CC will not let us, or the enc_level is not yet provisioned. This avoids a bug where we can end up in a busy loop because the next event deadline is reported as "now" because we want to send an ack, but we can't actually send anything yet. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21181)
show more ...
|
fbff5b57 | 12-Jun-2023 |
Tomas Mraz |
cmactest.c: Fix no-des and no-sm4 build failures Also use OSSL_NELEM instead of hardcoding array size. Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Paul Dale <p
cmactest.c: Fix no-des and no-sm4 build failures Also use OSSL_NELEM instead of hardcoding array size. Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21183)
show more ...
|
8e9ca334 | 13-Jun-2023 |
Pauli |
fips: use memory ordering rather than locks The FIPS provider accesses it's current state under lock. This is overkill, little or no synchronisation is actually required in practice
fips: use memory ordering rather than locks The FIPS provider accesses it's current state under lock. This is overkill, little or no synchronisation is actually required in practice (because it's essentially a read only setting). Switch to using TSAN operations in preference. Fixes #21179 Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21187)
show more ...
|
edd5b9d7 | 07-Jun-2023 |
Matt Caswell |
Fix minor issues in the demo/man pages for TLS client/blocking Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://githu
Fix minor issues in the demo/man pages for TLS client/blocking Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21133)
show more ...
|
2df71d61 | 07-Jun-2023 |
Matt Caswell |
Split the blocking TLS client guide page into two We split the page into two: one covering basic TLS introductory material that applies to both clients and servers, and one with the spec
Split the blocking TLS client guide page into two We split the page into two: one covering basic TLS introductory material that applies to both clients and servers, and one with the specific material on writing a blocking TLS client. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21133)
show more ...
|
a2b6865b | 07-Jun-2023 |
Matt Caswell |
Allow man7 pages to not have a DESCRIPTION section For tutorial type pages it doesn't make any sense to have a DESCRIPTION section. Reviewed-by: Viktor Dukhovni <viktor@openssl.
Allow man7 pages to not have a DESCRIPTION section For tutorial type pages it doesn't make any sense to have a DESCRIPTION section. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21133)
show more ...
|
f7b04ae8 | 02-Jun-2023 |
Matt Caswell |
Add a tutorial on writing a simple blocking TLS client Provide guidance on the steps needed to write a very simple blocking TLS client. Reviewed-by: Viktor Dukhovni <viktor@open
Add a tutorial on writing a simple blocking TLS client Provide guidance on the steps needed to write a very simple blocking TLS client. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21133)
show more ...
|
a5a0c6a3 | 02-Jun-2023 |
Matt Caswell |
Add a very simple blocking TLS client demo This blocking client is intended to be used to explain how to implement a simple client in the documentation. Reviewed-by: Viktor Dukh
Add a very simple blocking TLS client demo This blocking client is intended to be used to explain how to implement a simple client in the documentation. Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21133)
show more ...
|
4032cd9a | 17-Apr-2023 |
Yi Li |
configure: introduce no-ecx to remove ECX related feature This can effectively reduce the binary size for platforms that don't need ECX feature(~100KB). Signed-off-by: Yi Li <yi
configure: introduce no-ecx to remove ECX related feature This can effectively reduce the binary size for platforms that don't need ECX feature(~100KB). Signed-off-by: Yi Li <yi1.li@intel.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20781)
show more ...
|
cc343d04 | 09-Jun-2023 |
Mike Kasick |
rand_lib: RAND_poll: Reseed in non-"no-deprecated" builds. In a non-"no-deprecated" libcrypto build with a default configuration, RAND_get_rand_method() == RAND_OpenSSL() and so needs to
rand_lib: RAND_poll: Reseed in non-"no-deprecated" builds. In a non-"no-deprecated" libcrypto build with a default configuration, RAND_get_rand_method() == RAND_OpenSSL() and so needs to fall through to the RAND_seed call (used in "no-deprecated" builds) to perform a reseed. CLA: trivial Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21167)
show more ...
|
050dddb0 | 23-Sep-2022 |
Jiasheng Jiang |
crypto/sm2/sm2_sign.c: Add BN_CTX_end To match the BN_CTX_start, it should be better to add BN_CTX_end in the end of the function. Signed-off-by: Jiasheng Jiang <jiasheng@iscas.
crypto/sm2/sm2_sign.c: Add BN_CTX_end To match the BN_CTX_start, it should be better to add BN_CTX_end in the end of the function. Signed-off-by: Jiasheng Jiang <jiasheng@iscas.ac.cn> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19266)
show more ...
|
ec597528 | 08-Jun-2023 |
Wim Decroix |
X509_NAME_cmp fix for empty name CLA: trivial Fixes #21156 Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from http
X509_NAME_cmp fix for empty name CLA: trivial Fixes #21156 Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21155)
show more ...
|
e8dc77f8 | 12-Jun-2023 |
fisher.yu |
Update CMAC test cases. 1. Update cmac test cases, fullfilling test data by short string instead of using long string directly. 2. Modify the wording of comments in cm
Update CMAC test cases. 1. Update cmac test cases, fullfilling test data by short string instead of using long string directly. 2. Modify the wording of comments in cmac.c Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21177)
show more ...
|
ce451fb8 | 17-May-2023 |
Matthias St. Pierre |
INSTALL: document shared library pinning for static builds The libcrypto library uses shared library pinning to prevent its cleanup handlers from crashing at program termination because
INSTALL: document shared library pinning for static builds The libcrypto library uses shared library pinning to prevent its cleanup handlers from crashing at program termination because of a premature unloading of the shared library. However, shared library pinning is enabled also for static builds, which may lead to surpising behaviour if libcrypto is linked statically to a shared third-party library, because in this case the third-party library gets pinned. This surprising behaviour is caused by the fact that the `no-shared` configure option does not imply `no-pinshared`. Since this quirk can't be changed without potentially breaking existing code, we just document it here and provide a workaround. Fixes #20977 Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20985)
show more ...
|
959c150a | 10-Jun-2023 |
Theo Buehler |
Fix incorrect ERR_raise() calls A few ERR_raise() calls in v3_purp.c use the wrong library. For example, in OpenSSL 3.1.1 we get 00000000:error:0580009E:x509 certificate routine
Fix incorrect ERR_raise() calls A few ERR_raise() calls in v3_purp.c use the wrong library. For example, in OpenSSL 3.1.1 we get 00000000:error:0580009E:x509 certificate routines:ossl_x509v3_cache_extensions:reason(158):crypto/x509/v3_purp.c:635: instead of 00000000:error:1100009E:X509 V3 routines:ossl_x509v3_cache_extensions:invalid certificate:crypto/x509/v3_purp.c:635: Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21168)
show more ...
|
e3b01eb6 | 04-Jun-2023 |
Michael Baentsch <57787676+baentsch@users.noreply.github.com> |
add cygwin CI Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21006) |
9b9c42db | 20-May-2023 |
Michael Baentsch <57787676+baentsch@users.noreply.github.com> |
Fix build on cygwin Fixes #19531 Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull
Fix build on cygwin Fixes #19531 Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21006)
show more ...
|
78634e8a | 06-May-2023 |
James Knight |
Introduce [HAVE_/NO_]MADVISE defines Toolchains that target a non-MMU architecture may not have the `madvise` function available, even if the `sys/mman.h` header provides a define fo
Introduce [HAVE_/NO_]MADVISE defines Toolchains that target a non-MMU architecture may not have the `madvise` function available, even if the `sys/mman.h` header provides a define for `MADV_DONTDUMP` (e.g. when targeting ARMv7-M with uClibc). The following tweaks the implementation to use `HAVE_MADVISE`/`NO_MADVISE` defines to help indicate when to attempt to use `madvise`. This change operates in the same manner as the original implementation (i.e. relies on `MADV_DONTDUMP` to indicate if `madvise` can be used); however, this change now allows a builder to override the internal detection by explicitly providing the `HAVE_MADVISE` define at compile time. This should give flexibility for environments which do not have `madvise` when there is no easy logic to set `NO_MADVISE`. Signed-off-by: James Knight <james.d.knight@live.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/20851)
show more ...
|
6181a333 | 22-May-2023 |
Heiko Stuebner |
riscv: aes: dual-license under Apache + 2-clause BSD To allow re-use of the already reviewed openSSL crypto code for RISC-V in other projects - like the Linux kernel, add a second licens
riscv: aes: dual-license under Apache + 2-clause BSD To allow re-use of the already reviewed openSSL crypto code for RISC-V in other projects - like the Linux kernel, add a second license (2-clause BSD) to the 32+64bit aes implementations using the Zkn extension. Signed-off-by: Heiko Stuebner <heiko.stuebner@vrull.eu> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/21018)
show more ...
|
33523d6d | 30-Mar-2023 |
Heiko Stuebner |
riscv: GCM: dual-license under Apache + 2-clause BSD To allow re-use of the already reviewed openSSL crypto code for RISC-V in other projects - like the Linux kernel, add a second licens
riscv: GCM: dual-license under Apache + 2-clause BSD To allow re-use of the already reviewed openSSL crypto code for RISC-V in other projects - like the Linux kernel, add a second license (2-clause BSD) to the recently added GCM ghash functions. Signed-off-by: Heiko Stuebner <heiko.stuebner@vrull.eu> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/20649)
show more ...
|
ade969e2 | 07-Jun-2023 |
Tomas Mraz |
Coverity 1528485: Remove unused assignment of wvalue wvalue is always initialized at the beginning of each cycle and used only within the cycle Reviewed-by: Matt Caswell <matt@o
Coverity 1528485: Remove unused assignment of wvalue wvalue is always initialized at the beginning of each cycle and used only within the cycle Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/21145)
show more ...
|
ef1ed411 | 07-Jun-2023 |
Tomas Mraz |
Coverity 1528486: Avoid assignment of unused value of bags It is used only within the loop and always initialized |
265920f2 | 07-Jun-2023 |
Tomas Mraz |
Coverity 1528487: Avoid assignment of unused value of i |
c71b72ac | 07-Jun-2023 |
Tomas Mraz |
Coverity 1528488: Avoid assignment of unused value rctx Also some move redirection_url inside loop where it is only used. |