22094d11 | 02-Nov-2022 |
Matt Caswell |
Rename SSL3_RECORD to TLS_RL_RECORD The SSL3 prefix no longer seems appropriate. We choose TLS_RL_RECORD instead of TLS_RECORD because that type already exists elsewhere. Review
Rename SSL3_RECORD to TLS_RL_RECORD The SSL3 prefix no longer seems appropriate. We choose TLS_RL_RECORD instead of TLS_RECORD because that type already exists elsewhere. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19586)
show more ...
|
e9189cc4 | 02-Nov-2022 |
Matt Caswell |
Rename SSL3_BUFFER to TLS_BUFFER The SSL3 prefix no longer seems appropriate. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Mer
Rename SSL3_BUFFER to TLS_BUFFER The SSL3 prefix no longer seems appropriate. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19586)
show more ...
|
23c57f00 | 02-Nov-2022 |
Matt Caswell |
Move declarations out of record.h and record_local.h We move many of the declarations in record.h and record_local.h into locations inside ssl/record/methods instead. Also many declarati
Move declarations out of record.h and record_local.h We move many of the declarations in record.h and record_local.h into locations inside ssl/record/methods instead. Also many declarations were no longer required and could be removed completely. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19586)
show more ...
|
c89c21f8 | 01-Nov-2022 |
Matt Caswell |
Move tls_pad.c into ssl/record/methods This file is used by libssl record layer methods and therefore should now be in the methods subdir Reviewed-by: Hugo Landau <hlandau@opens
Move tls_pad.c into ssl/record/methods This file is used by libssl record layer methods and therefore should now be in the methods subdir Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19586)
show more ...
|
1e42708e | 01-Nov-2022 |
Matt Caswell |
Remove references to read_mac_secret and write_mac_secret They are no longer used and can be removed. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tom
Remove references to read_mac_secret and write_mac_secret They are no longer used and can be removed. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19586)
show more ...
|
b83eac48 | 31-Oct-2022 |
Matt Caswell |
Remove the read_iv/write_iv fields from SSL_CONNECTION These fields are instead held in the new record layer code and are therefore no longer needed. Reviewed-by: Hugo Landau <h
Remove the read_iv/write_iv fields from SSL_CONNECTION These fields are instead held in the new record layer code and are therefore no longer needed. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19586)
show more ...
|
6d814fd6 | 31-Oct-2022 |
Matt Caswell |
Remove compress/expand fields from SSL_CONNECTION They are no longer needed. The new record layer handles this. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas
Remove compress/expand fields from SSL_CONNECTION They are no longer needed. The new record layer handles this. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19586)
show more ...
|
f471f60a | 31-Oct-2022 |
Matt Caswell |
Remove remaining refs to enc_(write|read)_ctx/(read|write)_hash Those fields are no longer used. Their previous function is now in the new record layer. Reviewed-by: Hugo Landau
Remove remaining refs to enc_(write|read)_ctx/(read|write)_hash Those fields are no longer used. Their previous function is now in the new record layer. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19586)
show more ...
|
1e065a15 | 10-Nov-2022 |
J.W. Jagersma |
use OSSL_PARAM_construct_uint32 for max_early_data Otherwise, this causes a warning on platforms where 'uint32_t' is defined as 'unsigned long int' instead of 'unsigned int'. Re
use OSSL_PARAM_construct_uint32 for max_early_data Otherwise, this causes a warning on platforms where 'uint32_t' is defined as 'unsigned long int' instead of 'unsigned int'. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19322)
show more ...
|
b9179ae5 | 01-Oct-2022 |
J.W. Jagersma |
djgpp: Fix unused-but-set-variable warning I chose to just hide this behind '#ifndef __DJGPP__', instead of listing all the macro combinations where it *is* used. That would make quite
djgpp: Fix unused-but-set-variable warning I chose to just hide this behind '#ifndef __DJGPP__', instead of listing all the macro combinations where it *is* used. That would make quite a mess. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19322)
show more ...
|
d8bcd641 | 01-Oct-2022 |
J.W. Jagersma |
djgpp: Skip check for negative timeval This causes a warning since tv_sec is unsigned. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org>
djgpp: Skip check for negative timeval This causes a warning since tv_sec is unsigned. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19322)
show more ...
|
523e54c1 | 01-Oct-2022 |
J.W. Jagersma |
Define threads_lib.c functions only for OPENSSL_SYS_UNIX This matches the declaration in <openssl/crypto.h>. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mr
Define threads_lib.c functions only for OPENSSL_SYS_UNIX This matches the declaration in <openssl/crypto.h>. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19322)
show more ...
|
71faab72 | 01-Oct-2022 |
J.W. Jagersma |
Cast socklen_t to size_t in assert comparison This causes a warning otherwise when socklen_t is signed (Watt32). Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Toma
Cast socklen_t to size_t in assert comparison This causes a warning otherwise when socklen_t is signed (Watt32). Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19322)
show more ...
|
1555c86e | 01-Oct-2022 |
J.W. Jagersma |
Cast values to match printf format strings. For some reason djgpp uses '(unsigned) long int' for (u)int32_t. This causes errors with -Werror=format, even though these types are in p
Cast values to match printf format strings. For some reason djgpp uses '(unsigned) long int' for (u)int32_t. This causes errors with -Werror=format, even though these types are in practice identical. Obvious solution: cast to the types indicated by the format string. For asn1_time_test.c I changed the format string to %lli since time_t may be 'long long' some platforms. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19322)
show more ...
|
43086b1b | 10-Nov-2022 |
Bernd Edlinger |
Resign test/certs/rootCA.pem to expire in 100 years Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl
Resign test/certs/rootCA.pem to expire in 100 years Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19654)
show more ...
|
42f91743 | 10-Nov-2022 |
Bernd Edlinger |
Update the validity period of ed25519 cerificates Note: The private key is test/certs/root-ed25519.privkey.pem Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas
Update the validity period of ed25519 cerificates Note: The private key is test/certs/root-ed25519.privkey.pem Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19654)
show more ...
|
a0783b83 | 12-Oct-2022 |
Tomas Mraz |
test_CMAC_keygen(): Avoid using ECB cipher with CMAC Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/ope
test_CMAC_keygen(): Avoid using ECB cipher with CMAC Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19401)
show more ...
|
94976a1e | 12-Oct-2022 |
Tomas Mraz |
cmac_set_ctx_params(): Fail if cipher mode is not CBC Also add negative test cases for CMAC and GMAC using a cipher with wrong mode. Reviewed-by: Dmitry Belyavskiy <beldmit@gmai
cmac_set_ctx_params(): Fail if cipher mode is not CBC Also add negative test cases for CMAC and GMAC using a cipher with wrong mode. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19401)
show more ...
|
9270f670 | 12-Oct-2022 |
Tomas Mraz |
demos/mac/cmac-aes256: Clarify the cipher algorithm used The currently used cipher is aes256 which is an alias to AES-256-CBC, so the demo is correct. However it might be misleading
demos/mac/cmac-aes256: Clarify the cipher algorithm used The currently used cipher is aes256 which is an alias to AES-256-CBC, so the demo is correct. However it might be misleading so make it clear the CBC mode cipher is used. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19401)
show more ...
|
10119e74 | 09-Nov-2022 |
Tomas Mraz |
Add test for generating safeprime DH parameters Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openss
Add test for generating safeprime DH parameters Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19635)
show more ...
|
990d280d | 09-Nov-2022 |
Tomas Mraz |
Use libctx when generating DH parameters Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/opens
Use libctx when generating DH parameters Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19635)
show more ...
|
8aa82b33 | 03-Nov-2022 |
Pauli |
fuzz: add punycode decoder fuzz test Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pu
fuzz: add punycode decoder fuzz test Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/19591)
show more ...
|
905ba924 | 03-Nov-2022 |
Pauli |
punycode: update to use WPACKET instead of using custom range checking Add test for `.' overflows, remove the output size argument from ossl_a2ulabel() since it was never used and greatl
punycode: update to use WPACKET instead of using custom range checking Add test for `.' overflows, remove the output size argument from ossl_a2ulabel() since it was never used and greatly complicated the code. Convert ossl_a2ulabel() to use WPACKET for building the output string. Update the documentation to match the new definition of ossl_a2ulabel(). x509: let punycode handle the '\0' string termination. Saves a memset(3) and some size fiddling. Also update to deal with the modified parameters. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/19591)
show more ...
|
373d9012 | 29-Oct-2022 |
Milan Broz |
pem: avoid segfault if PKEY is NULL in PEM_write_bio_PrivateKey Make the code more robust and correctly handle EVP_PKEY set to NULL instead of dereferencing null pointer. Signed
pem: avoid segfault if PKEY is NULL in PEM_write_bio_PrivateKey Make the code more robust and correctly handle EVP_PKEY set to NULL instead of dereferencing null pointer. Signed-off-by: Milan Broz <gmazyland@gmail.com> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19536)
show more ...
|
608aca8e | 29-Oct-2022 |
Milan Broz |
pem: fix a memory leak in PEM_write_bio_PrivateKey_traditional The copy of PKEY should be released on the error path. Easily reproduced with "ED448" context. Signed-off-by: Mila
pem: fix a memory leak in PEM_write_bio_PrivateKey_traditional The copy of PKEY should be released on the error path. Easily reproduced with "ED448" context. Signed-off-by: Milan Broz <gmazyland@gmail.com> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19536)
show more ...
|