77c8d6d7 | 03-Feb-2023 |
Viktor Dukhovni |
Fix typo in Ordinals.pm from PR #14074 Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> Reviewed-by: Paul Dale <pauli@opens
Fix typo in Ordinals.pm from PR #14074 Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20201)
show more ...
|
323c4753 | 27-Jan-2023 |
Dr. David von Oheimb |
APPS/{storeutl,gendsa}: give error on extra arguments, improve doc Point out that options must be given before the final file/URI arg. Reviewed-by: Paul Dale <pauli@openssl.org>
APPS/{storeutl,gendsa}: give error on extra arguments, improve doc Point out that options must be given before the final file/URI arg. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20156)
show more ...
|
fedab100 | 16-Jan-2023 |
Dr. David von Oheimb |
APPS load_key_certs_crls(): improve diagnostics on not finding expected types of contents Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merg
APPS load_key_certs_crls(): improve diagnostics on not finding expected types of contents Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20156)
show more ...
|
c007203b | 18-Jan-2023 |
Xu Yizhou |
SM4 AESE optimization for ARMv8 Signed-off-by: Xu Yizhou <xuyizhou1@huawei.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merge
SM4 AESE optimization for ARMv8 Signed-off-by: Xu Yizhou <xuyizhou1@huawei.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19914)
show more ...
|
e3663717 | 31-Jan-2023 |
ndossche |
Fix incomplete check on EVP_CIPHER_param_to_asn1() That function is a wrapper around evp_cipher_param_to_asn1_ex() which can return 0 as an error value via its ret <= 0 check [1]. Fu
Fix incomplete check on EVP_CIPHER_param_to_asn1() That function is a wrapper around evp_cipher_param_to_asn1_ex() which can return 0 as an error value via its ret <= 0 check [1]. Furthermore, all other callers of this function check against <= 0 instead of < 0 and this is also in line with what the documentation tells us. Fix the incomplete check by changing it to <= 0 as well. CLA: trivial [1] https://github.com/openssl/openssl/blob/114d99b46bfb212ffc510865df317ca2c1542623/crypto/evp/evp_lib.c#L164-L165 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20180)
show more ...
|
aa2d7e0e | 30-Jan-2023 |
Richard Levitte |
Use $config{build_file} instead of $target{build_file} If the user specifies an alternative build file than the default, this alternative is recorded in $config{build_file}, not $target{
Use $config{build_file} instead of $target{build_file} If the user specifies an alternative build file than the default, this alternative is recorded in $config{build_file}, not $target{build_file}. Therefore, the former should be used, leaving the latter as a mere default. This is a bug. While fixing it, document it better too. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20173)
show more ...
|
e788c772 | 29-Jan-2023 |
Ruili Fang |
Fix a potential memory leak in crypto/provider_child.c Fix issue #20063. CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org
Fix a potential memory leak in crypto/provider_child.c Fix issue #20063. CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20163)
show more ...
|
04148998 | 30-Jan-2023 |
Andrea Pappacoda |
BIO_read.pod: fix small typo Add missing `I` to `<b>` CLA: trivial Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merge
BIO_read.pod: fix small typo Add missing `I` to `<b>` CLA: trivial Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20169)
show more ...
|
55ff8fb4 | 09-Dec-2022 |
Matt Caswell |
Design for the Fault Injector Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19877) |
aea9b0e4 | 27-Jan-2023 |
Tomas Mraz |
Do not include sparse_array.o in libssl with no-shared Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl
Do not include sparse_array.o in libssl with no-shared Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20137)
show more ...
|
f6a6f7b6 | 25-Jan-2023 |
Tomas Mraz |
Avoid duplicating symbols in legacy.a with some build options If no-module or no-shared is used, the symbols from libcrypto should not be duplicated in legacy.a Also the BIGNUM
Avoid duplicating symbols in legacy.a with some build options If no-module or no-shared is used, the symbols from libcrypto should not be duplicated in legacy.a Also the BIGNUM functions are currently not needed in legacy.a at all. Fixes #20124 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20137)
show more ...
|
f66c1272 | 13-Dec-2022 |
Nicola Tuveri |
[doc] Sync documentation now that 3.0 honors OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT https://github.com/openssl/openssl/pull/19901 backported the "Honor OSSL_PKEY_PARAM_EC_POINT_CONVE
[doc] Sync documentation now that 3.0 honors OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT https://github.com/openssl/openssl/pull/19901 backported the "Honor OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT as set and default to UNCOMPRESSED" changeset to 3.0. This commit updates: - the HISTORY notes of the relevant documentation to mark the change happened since 3.0.8. - the `CHANGES.md file` to sync up with the tip of the `openssl-3.0` branch Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20003)
show more ...
|
ecd44546 | 27-Jan-2023 |
ndossche |
Fix incomplete check on X509V3_add1_i2d() X509V3_add1_i2d() can return both -1 and 0 as an error code. This check only checked for 0. Change it into <= 0 to also catch the -1 error code.
Fix incomplete check on X509V3_add1_i2d() X509V3_add1_i2d() can return both -1 and 0 as an error code. This check only checked for 0. Change it into <= 0 to also catch the -1 error code. CLA: trivial Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20157)
show more ...
|
8bb55680 | 06-Dec-2022 |
Tomas Mraz |
Workaround crash in atexit on NonStop platforms We cannot dynamically load the legacy provider into an application that is linked statically to libcrypto as this causes a double load
Workaround crash in atexit on NonStop platforms We cannot dynamically load the legacy provider into an application that is linked statically to libcrypto as this causes a double loading of libcrypto (one static and one dynamic) and on NonStop this leads to a segfault in atexit(). Fixes #17537 Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19844)
show more ...
|
a0115237 | 27-Jan-2023 |
slontis |
ChaCha20-Poly1305 no longer supports truncated IV's. Fixes #20084 In the 3.0 provider implementation the generic code that handles IV's only allows a 12 byte IV. Older code inte
ChaCha20-Poly1305 no longer supports truncated IV's. Fixes #20084 In the 3.0 provider implementation the generic code that handles IV's only allows a 12 byte IV. Older code intentionally added the ability for the IV to be truncated. As this truncation is unsafe, the documentation has been updated to state that this in no longer allowed. The code has been updated to produce an error when the iv length is set to any value other than 12. NOTE: It appears that this additional padding may have originated from the code which uses a 12 byte IV, that is then passed to CHACHA which zero pads it to 16 bytes. Note that legacy behaviour in e_chacha20_poly1305.c has not been updated. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20151)
show more ...
|
2477e99f | 26-Jan-2023 |
Hugo Landau |
QUIC Probes Support: Minor tweaks Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19925) |
fee8f48e | 16-Dec-2022 |
Hugo Landau |
QUIC TXP: Allow TXP to generate probes Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1
QUIC TXP: Allow TXP to generate probes Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19925)
show more ...
|
e2212b20 | 16-Dec-2022 |
Hugo Landau |
QUIC ACKM: Rework probe reporting to allow use for bookkeeping Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.co
QUIC ACKM: Rework probe reporting to allow use for bookkeeping Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19925)
show more ...
|
8ca3baa9 | 16-Dec-2022 |
Hugo Landau |
QUIC ACKM: Clarify probe types Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19925) |
51cf0344 | 19-Jan-2023 |
Steffen Nurpmeso |
SSL_conf_cmd: add support for IgnoreUnexpectedEOF CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://
SSL_conf_cmd: add support for IgnoreUnexpectedEOF CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20089)
show more ...
|
d79bb531 | 25-Jan-2023 |
Tom Cosgrove |
Enable AES optimisation on Apple Silicon M2-based systems Gives a performance enhancement of 16-38%, similar to the M1. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by:
Enable AES optimisation on Apple Silicon M2-based systems Gives a performance enhancement of 16-38%, similar to the M1. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20141)
show more ...
|
a4347a9a | 25-Jan-2023 |
Pauli |
coverity 1520506: error handling Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/
coverity 1520506: error handling Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/20132)
show more ...
|
00407fbf | 25-Jan-2023 |
Pauli |
coverity 1520505: error handling Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/
coverity 1520505: error handling Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/20132)
show more ...
|
6a945357 | 16-Jan-2023 |
Tomas Mraz |
compute_pqueue_growth(): Fix the return type Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/opens
compute_pqueue_growth(): Fix the return type Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20012)
show more ...
|
3a857b95 | 09-Jan-2023 |
Tomas Mraz |
Implement BIO_s_dgram_mem() reusing the BIO_s_dgram_pair() code Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://githu
Implement BIO_s_dgram_mem() reusing the BIO_s_dgram_pair() code Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20012)
show more ...
|