5f820bd7 | 27-Feb-2023 |
slontis |
Fix potential infinite loops in ECDSA signing. Similiar checks to the DSA code have been added for ECDSA also. This should not be a problem when using named groups. Reviewed-by:
Fix potential infinite loops in ECDSA signing. Similiar checks to the DSA code have been added for ECDSA also. This should not be a problem when using named groups. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20384)
show more ...
|
3a4e09ab | 27-Feb-2023 |
slontis |
Fix infinite loops in DSA sign code. Fixes #20268 Values such as q=1 or priv=0 caused infinite loops when calling DSA_sign() without these changes. There are other case
Fix infinite loops in DSA sign code. Fixes #20268 Values such as q=1 or priv=0 caused infinite loops when calling DSA_sign() without these changes. There are other cases where bad domain parameters may have caused infinite loops where the retry counter has been added. The simpler case of priv=0 also hits this case. q=1 caused an infinite loop in the setup. The max retry value has been set to an arbitrary value of 8 (it is unlikely to ever do a single retry for valid values). The minimum q bits was set to an arbitrary value of 128 (160 is still used for legacy reasons when using 512 bit keys). Thanks @guidovranken for detecting this, and @davidben for his insightful analysis. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20384)
show more ...
|
a6d7093a | 26-Feb-2023 |
Robin Lee |
ec: Use .machine "any" explicitly in ecp_nistp521-ppc64 Since GCC commit e154242724b084380e3221df7c08fcdbd8460674 the flag "-many" is sometimes not passed to the assembler. Use .machine
ec: Use .machine "any" explicitly in ecp_nistp521-ppc64 Since GCC commit e154242724b084380e3221df7c08fcdbd8460674 the flag "-many" is sometimes not passed to the assembler. Use .machine "any" just like ecp_nistz256-ppc64 to prevent compile errors when built with some configurations of GCC. CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20378)
show more ...
|
0a81220a | 26-Feb-2023 |
Pauli |
Update FIPS provider documentation to note that fips=yes is mandatory This was in the notes section but an earlier comment about it not being mandatory was missed. Fixes #20376
Update FIPS provider documentation to note that fips=yes is mandatory This was in the notes section but an earlier comment about it not being mandatory was missed. Fixes #20376 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/20382)
show more ...
|
8195e599 | 09-Feb-2023 |
ndossche |
Fix incomplete error check on RSA_public_decrypt() According to the documentation and my analysis tool RSA_public_decrypt() can return -1 on error, but this is not checked. Fix it by cha
Fix incomplete error check on RSA_public_decrypt() According to the documentation and my analysis tool RSA_public_decrypt() can return -1 on error, but this is not checked. Fix it by changing the error condition. CLA: trivial Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20250)
show more ...
|
5df5032a | 09-Feb-2023 |
ndossche |
Fix incomplete error check on ASN1_item_i2d() According to the documentation and my analysis tool ASN1_item_i2d() can return a negative value on error, but this is not checked. Fix i
Fix incomplete error check on ASN1_item_i2d() According to the documentation and my analysis tool ASN1_item_i2d() can return a negative value on error, but this is not checked. Fix it by changing the error check condition. CLA: trivial Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20251)
show more ...
|
7066c57d | 22-Feb-2023 |
slontis |
Document the list of RAND algorithms in the default and fips providers. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul
Document the list of RAND algorithms in the default and fips providers. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20361)
show more ...
|
e798248c | 22-Feb-2023 |
slontis |
Add provider pre-fetching documentation Clearly document that implicit fetching is slower when using providers, and explain prefetching. Added to crypto.pod and migration_guide.pod l
Add provider pre-fetching documentation Clearly document that implicit fetching is slower when using providers, and explain prefetching. Added to crypto.pod and migration_guide.pod links to it. Add a link to EVP_default_properties_enable_fips() in crypto.pod. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20354)
show more ...
|
f7d76c3d | 22-Feb-2023 |
slontis |
Add documentation for "NULL" cipher and digest algorithms. Fixes #20340 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from
Add documentation for "NULL" cipher and digest algorithms. Fixes #20340 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20356)
show more ...
|
359d6a26 | 19-Feb-2023 |
Alex Gaynor |
Added a fuzzer for SMIME Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20332) |
9a2f78e1 | 24-Feb-2023 |
Dr. David von Oheimb |
util/find-doc-nits: improve error diagnostics on missing man section numbers in links Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Revi
util/find-doc-nits: improve error diagnostics on missing man section numbers in links Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/20369)
show more ...
|
e6657e58 | 24-Feb-2023 |
Dr. David von Oheimb |
CMS_add0_cert.pod: add missing man section numbers in recently added L<fun()> refs Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewe
CMS_add0_cert.pod: add missing man section numbers in recently added L<fun()> refs Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/20369)
show more ...
|
5e3b8450 | 08-Feb-2023 |
Ingo Franzki |
Add OSSL_FUNC_keymgmt_im/export_types function that gets the provider context The provider functions OSSL_FUNC_keymgmt_import_types() and OSSL_FUNC_keymgmt_export_types() do not get the
Add OSSL_FUNC_keymgmt_im/export_types function that gets the provider context The provider functions OSSL_FUNC_keymgmt_import_types() and OSSL_FUNC_keymgmt_export_types() do not get the provider context passed. This makes it difficult for providers to implement these functions unless its a static implementation returning a truly constant OSSL_PARAM array. Some providers may have a need to return an OSSL_PARAM array that is dependent on the provider configuration, or anything else that is contained in its provider context. Add extended variants of these functions that get the provider context passed. The functions should still return a static and constant OSSL_PARAM array, but may use the provider context to select the array to return dependent on its context. The returned array must be constant at least until the provider is unloaded. Providers can implement only the original functions, or only the extended functions, or both. Implementing at least one of those functions is required if also the respective OSSL_FUNC_keymgmt_import() or OSSL_FUNC_keymgmt_export() function is implemented. If an extended function is available, it is called by evp_keymgmt_import_types() or evp_keymgmt_export_types(), otherwise the original function is called. This makes the code backward compatible. Existing providers will only implement the original functions, so these functions will continued to be called. Newer providers can choose to implement the extended functions, and thus can benefit from the provider context being passed to the implementation. Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20255)
show more ...
|
65def9de | 12-Sep-2022 |
Dr. David von Oheimb |
CMS_add0_cert: if cert already present, do not throw error but ignore it Also add checks on failing cert/CRL up_ref calls; improve coding style. Reviewed-by: Tomas Mraz <tomas@opens
CMS_add0_cert: if cert already present, do not throw error but ignore it Also add checks on failing cert/CRL up_ref calls; improve coding style. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/19199)
show more ...
|
6f9e5310 | 10-Feb-2023 |
Dr. David von Oheimb |
CMS_add1_crl(): prevent double free on failure of CMS_add0_crl() Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: David von Oheimb
CMS_add1_crl(): prevent double free on failure of CMS_add0_crl() Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/19199)
show more ...
|
ee58915c | 26-Sep-2022 |
Michael Baentsch <57787676+baentsch@users.noreply.github.com> |
first cut at sigalg loading Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19312) |
1817dcaf | 18-Feb-2023 |
Richard Levitte |
test/recipes/01-test_symbol_presence.t: check for duplicate symbols in static libs This checks that all symbols are unique across all public static libraries. This includes a bit of refa
test/recipes/01-test_symbol_presence.t: check for duplicate symbols in static libs This checks that all symbols are unique across all public static libraries. This includes a bit of refacftoring to avoid repeating code too much. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20331)
show more ...
|
2c1ec72a | 15-Dec-2022 |
slontis |
Add help for pkeyopt values for the genpkey commandline app. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Todd Short <todd.shor
Add help for pkeyopt values for the genpkey commandline app. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/19931)
show more ...
|
1dc35d44 | 21-Feb-2023 |
olszomal |
Skip subdirectories in SSL_add_dir_cert_subjects_to_stack() Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.
Skip subdirectories in SSL_add_dir_cert_subjects_to_stack() Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20312)
show more ...
|
7fed5193 | 21-Feb-2023 |
Jeeban Sethi |
Fixes #20278: Fixed double free bug in crypto/http/http_client.c CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Rev
Fixes #20278: Fixed double free bug in crypto/http/http_client.c CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20351)
show more ...
|
0c9646ec | 26-Jan-2023 |
Matt Caswell |
Test that QUIC has the ciphersuites that we expect Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/o
Test that QUIC has the ciphersuites that we expect Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20148)
show more ...
|
d518854c | 26-Jan-2023 |
Matt Caswell |
Don't send ciphersuites twice in QUIC QUIC TLS was sending some ciphersuites twice in the ClientHello. This was due to us declaring some TLSv1.3 ciphersuites in the list intended to
Don't send ciphersuites twice in QUIC QUIC TLS was sending some ciphersuites twice in the ClientHello. This was due to us declaring some TLSv1.3 ciphersuites in the list intended to describe the TLSv1.2 ciphersuites supported by the SSL_METHOD. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20148)
show more ...
|
6de73f5d | 21-Feb-2023 |
Sam James |
CI: add Clang 16 Clang 16 will be released shortly (beginning of March). Signed-off-by: Sam James <sam@gentoo.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Review
CI: add Clang 16 Clang 16 will be released shortly (beginning of March). Signed-off-by: Sam James <sam@gentoo.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20346)
show more ...
|
ab5a172f | 15-Feb-2023 |
zhailiangliang |
Fix potential NULL pointer dereference in function evp_pkey_asn1_ctrl CLA: trivial Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org>
Fix potential NULL pointer dereference in function evp_pkey_asn1_ctrl CLA: trivial Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20294)
show more ...
|
45bb98bf | 06-Feb-2023 |
Matt Caswell |
Add const to some test tserver functions Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pu
Add const to some test tserver functions Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20030)
show more ...
|