ec279ac2 | 22-Jul-2022 |
Hugo Landau |
QUIC Demuxer and Record Layer (RX Side) Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/18
QUIC Demuxer and Record Layer (RX Side) Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/18949)
show more ...
|
fc2be2d0 | 31-Aug-2022 |
Tomas Mraz |
Document the return value of OSSL_LIB_CTX_load_config() Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openss
Document the return value of OSSL_LIB_CTX_load_config() Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19101)
show more ...
|
d4ffdc42 | 29-Aug-2022 |
Tobias Brunner |
Fix documented max. length for info buffer in HKDF This limit was increased with 20c2876f24d0 ("Increase HKDF_MAXBUF from 1024 to 2048"). CLA: trivial Reviewed-by: Paul
Fix documented max. length for info buffer in HKDF This limit was increased with 20c2876f24d0 ("Increase HKDF_MAXBUF from 1024 to 2048"). CLA: trivial Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19085)
show more ...
|
2b445654 | 30-Jul-2022 |
Dr. David von Oheimb |
PKCS7_dataVerify(): fix missing use of CRLs in PKCS#7 message Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: David von Oheimb <da
PKCS7_dataVerify(): fix missing use of CRLs in PKCS#7 message Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/18913)
show more ...
|
3d623896 | 29-Aug-2022 |
Tomas Mraz |
Remove unused dtls1_bitmap.c Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19088) |
664e096c | 09-May-2022 |
Hugo Landau |
BIO_dgram support for BIO_sendmmsg/BIO_recvmmsg Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openss
BIO_dgram support for BIO_sendmmsg/BIO_recvmmsg Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/18270)
show more ...
|
3f42f41a | 19-Jul-2022 |
Daniel Hu |
Improve chacha20 perfomance on aarch64 by interleaving scalar with SVE/SVE2 The patch will process one extra block by scalar in addition to blocks by SVE/SVE2 in parallel. This is esp. h
Improve chacha20 perfomance on aarch64 by interleaving scalar with SVE/SVE2 The patch will process one extra block by scalar in addition to blocks by SVE/SVE2 in parallel. This is esp. helpful in the scenario where we only have 128-bit vector length. The actual uplift to performance is complicated, depending on the vector length and input data size. SVE/SVE2 implementation don't always perform better than Neon, but it should prevail in most cases On a CPU with 256-bit SVE/SVE2, interleaved processing can handle 9 blocks in parallel (8 blocks by SVE and 1 by Scalar). on 128-bit SVE/SVE2 it is 5 blocks. Input size that is a multiple of 9/5 blocks on respective CPU can be typically handled at maximum speed. Here are test data for 256-bit and 128-bit SVE/SVE2 by running "openssl speed -evp chacha20 -bytes 576" (and other size) ----------------------------------+--------------------------------- 256-bit SVE | 128-bit SVE2 ----------------------------------|--------------------------------- Input 576 bytes 512 bytes | 320 bytes 256 bytes ----------------------------------|--------------------------------- SVE 1716361.91k 1556699.18k | 1615789.06k 1302864.40k ----------------------------------|--------------------------------- Neon 1262643.44k 1509044.05k | 680075.67k 1060532.31k ----------------------------------+--------------------------------- If the input size gets very large, the advantage of SVE/SVE2 over Neon will fade out. Signed-off-by: Daniel Hu <Daniel.Hu@arm.com> Change-Id: Ieedfcb767b9c08280d7c8c9a8648919c69728fab Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/18901)
show more ...
|
6b5c7ef7 | 19-Aug-2022 |
Juergen Christ |
Fix memory leak with TLS1.2 compression Leak sanitizer reports following leak for ssl-test-new subtest 4-tlsv1_2-both-compress: ==335733==ERROR: LeakSanitizer: detected memory l
Fix memory leak with TLS1.2 compression Leak sanitizer reports following leak for ssl-test-new subtest 4-tlsv1_2-both-compress: ==335733==ERROR: LeakSanitizer: detected memory leaks Direct leak of 17728 byte(s) in 1 object(s) allocated from: #0 0x3ff9fbba251 in malloc (/usr/lib64/libasan.so.8+0xba251) #1 0x3ff9f71744f in tls_do_uncompress ssl/record/methods/tls_common.c:868 #2 0x3ff9f7175bd in tls_default_post_process_record ssl/record/methods/tls_common.c:896 #3 0x3ff9f715ee7 in tls_get_more_records ssl/record/methods/tls_common.c:773 #4 0x3ff9f712209 in tls_read_record ssl/record/methods/tls_common.c:958 #5 0x3ff9f6ef73f in ssl3_read_bytes ssl/record/rec_layer_s3.c:1235 #6 0x3ff9f776165 in tls_get_message_header ssl/statem/statem_lib.c:1198 #7 0x3ff9f74709b in read_state_machine ssl/statem/statem.c:624 #8 0x3ff9f74709b in state_machine ssl/statem/statem.c:478 #9 0x3ff9f662e61 in SSL_do_handshake ssl/ssl_lib.c:4430 #10 0x100c55d in do_handshake_step test/helpers/handshake.c:775 #11 0x100c55d in do_connect_step test/helpers/handshake.c:1134 #12 0x100e85b in do_handshake_internal test/helpers/handshake.c:1544 #13 0x1011715 in do_handshake test/helpers/handshake.c:1738 #14 0x101d1a7 in test_handshake test/ssl_test.c:543 #15 0x1027875 in run_tests test/testutil/driver.c:370 #16 0x1008393 in main test/testutil/main.c:30 #17 0x3ff9cc2b871 in __libc_start_call_main (/usr/lib64/libc.so.6+0x2b871) #18 0x3ff9cc2b94f in __libc_start_main_alias_2 (/usr/lib64/libc.so.6+0x2b94f) #19 0x100864f (/code/openssl/test/ssl_test+0x100864f) Direct leak of 17728 byte(s) in 1 object(s) allocated from: #0 0x3ff9fbba251 in malloc (/usr/lib64/libasan.so.8+0xba251) #1 0x3ff9f71744f in tls_do_uncompress ssl/record/methods/tls_common.c:868 #2 0x3ff9f7175bd in tls_default_post_process_record ssl/record/methods/tls_common.c:896 #3 0x3ff9f715ee7 in tls_get_more_records ssl/record/methods/tls_common.c:773 #4 0x3ff9f712209 in tls_read_record ssl/record/methods/tls_common.c:958 #5 0x3ff9f6ef73f in ssl3_read_bytes ssl/record/rec_layer_s3.c:1235 #6 0x3ff9f776165 in tls_get_message_header ssl/statem/statem_lib.c:1198 #7 0x3ff9f74709b in read_state_machine ssl/statem/statem.c:624 #8 0x3ff9f74709b in state_machine ssl/statem/statem.c:478 #9 0x3ff9f662e61 in SSL_do_handshake ssl/ssl_lib.c:4430 #10 0x100c55d in do_handshake_step test/helpers/handshake.c:775 #11 0x100c55d in do_connect_step test/helpers/handshake.c:1134 #12 0x1010b09 in do_handshake_internal test/helpers/handshake.c:1550 #13 0x1011715 in do_handshake test/helpers/handshake.c:1738 #14 0x101d1a7 in test_handshake test/ssl_test.c:543 #15 0x1027875 in run_tests test/testutil/driver.c:370 #16 0x1008393 in main test/testutil/main.c:30 #17 0x3ff9cc2b871 in __libc_start_call_main (/usr/lib64/libc.so.6+0x2b871) #18 0x3ff9cc2b94f in __libc_start_main_alias_2 (/usr/lib64/libc.so.6+0x2b94f) #19 0x100864f (/code/openssl/test/ssl_test+0x100864f) SUMMARY: AddressSanitizer: 35456 byte(s) leaked in 2 allocation(s). Fix this by freeing the SSL3_RECORD structure inside the OSSL_RECORD_LAYER. Signed-off-by: Juergen Christ <jchrist@linux.ibm.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19030)
show more ...
|
56233ba8 | 29-Aug-2022 |
Juergen Christ |
apps/speed.c: Wait for generated children In multi-mode, speed fork()s off several children but does not wait for them. On Linux, this leads to wrong accounting information of getrusage
apps/speed.c: Wait for generated children In multi-mode, speed fork()s off several children but does not wait for them. On Linux, this leads to wrong accounting information of getrusage used by tools to extract running time and page faults. Wait for every children and check the return code and termination signal. Signed-off-by: Juergen Christ <jchrist@linux.ibm.com> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19093)
show more ...
|
d9aca2dd | 27-Aug-2022 |
Stefanos Harhalakis |
Fix man page to indicate SHA256 MAC for PKCS12 CLA: trivial Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas
Fix man page to indicate SHA256 MAC for PKCS12 CLA: trivial Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19079)
show more ...
|
723844d3 | 24-Aug-2022 |
Matt Caswell |
Test that we ignore a bad record version in a plaintext TLSv1.3 record The RFC requires us to ignore this field in plaintext records - so even if it is set incorrectly we should tolerate
Test that we ignore a bad record version in a plaintext TLSv1.3 record The RFC requires us to ignore this field in plaintext records - so even if it is set incorrectly we should tolerate it. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19058)
show more ...
|
20934288 | 24-Aug-2022 |
Matt Caswell |
Tolerate a bad record version in TLSv1.3 plaintext records When a server responds to a second TLSv1.3 ClientHello it is required to set the legacy_record_version to 0x0303 (TLSv1.2). The
Tolerate a bad record version in TLSv1.3 plaintext records When a server responds to a second TLSv1.3 ClientHello it is required to set the legacy_record_version to 0x0303 (TLSv1.2). The client is required to ignore that field even if it is wrong. The recent changes to the read record layer in PR #18132 made the record layer stricter and it was checking that the legacy_record_version was the correct value. This caused connection failures when talking to buggy servers that set the wrong legacy_record_version value. We make us more tolerant again. Fixes #19051 Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19058)
show more ...
|
6347b867 | 05-May-2022 |
Tomas Mraz |
Add design requirements for QUIC packet demuxer Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/open
Add design requirements for QUIC packet demuxer Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/18249)
show more ...
|
5639ee79 | 12-Apr-2021 |
Dr. David von Oheimb |
ERR: Make CRYPTO_malloc() and friends report ERR_R_MALLOC_FAILURE Fixes #6251 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed
ERR: Make CRYPTO_malloc() and friends report ERR_R_MALLOC_FAILURE Fixes #6251 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/14833)
show more ...
|
555dd939 | 24-May-2022 |
Daniel Fiala |
Convert serverinfo in SSL_CTX_use_serverinfo() to v2. Fixes openssl#18183. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged fr
Convert serverinfo in SSL_CTX_use_serverinfo() to v2. Fixes openssl#18183. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/18614)
show more ...
|
3c1f8fb1 | 24-Aug-2022 |
Pauli |
Add missing ')' to command help Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19049) |
200d9521 | 24-Aug-2022 |
Matt Caswell |
Drop the optimisation level for ppc64le cross-compile The default cross compiler (gcc 9.4.0) for ppc64le on Ubunut 20.04 seems buggy and causes a seg fault in sslapitest. This doesn't im
Drop the optimisation level for ppc64le cross-compile The default cross compiler (gcc 9.4.0) for ppc64le on Ubunut 20.04 seems buggy and causes a seg fault in sslapitest. This doesn't impact any other CI cross compile platforms and does not seem to impact the gcc 10.3.0 cross compiler. We just drop the optimisation level on that platform. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19056)
show more ...
|
4d32f533 | 15-Aug-2022 |
Hugo Landau |
Updates for OSSL_TIME changes Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1867
Updates for OSSL_TIME changes Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/18676)
show more ...
|
fa4e92a7 | 28-Jun-2022 |
Hugo Landau |
QUIC ACK Manager, Statistics Manager and Congestion Control API This is the initial implementation of the ACK Manager for OpenSSL's QUIC support, with supporting design documentation and
QUIC ACK Manager, Statistics Manager and Congestion Control API This is the initial implementation of the ACK Manager for OpenSSL's QUIC support, with supporting design documentation and tests. Because the ACK Manager also depends on the Statistics Manager, it is also implemented here. The Statistics Manager is quite simple, so this does not amount to a large amount of extra code. Because the ACK Manager depends on a congestion controller, it adds a no-op congestion controller, which uses the previously workshopped congestion control API. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/18676)
show more ...
|
7af110f9 | 01-Aug-2022 |
Dr. David von Oheimb |
CMP: correct handling of fallback subject in OSSL_CMP_CTX_setup_CRM() and its doc Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by
CMP: correct handling of fallback subject in OSSL_CMP_CTX_setup_CRM() and its doc Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/18929)
show more ...
|
aeadd298 | 01-Aug-2022 |
Dr. David von Oheimb |
CMP: fix crash in check_transactionID_or_nonce() on 'actual' being NULL Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David vo
CMP: fix crash in check_transactionID_or_nonce() on 'actual' being NULL Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/18929)
show more ...
|
293ab820 | 01-Aug-2022 |
Dr. David von Oheimb |
CRMF: make create_popo_signature() check that pubkey and pkey match Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: David
CRMF: make create_popo_signature() check that pubkey and pkey match Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/18930)
show more ...
|
c0f6792b | 01-Aug-2022 |
Dr. David von Oheimb |
add missing CRMF API function OSSL_CRMF_CERTTEMPLATE_get0_publicKey() Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Davi
add missing CRMF API function OSSL_CRMF_CERTTEMPLATE_get0_publicKey() Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/18930)
show more ...
|
aaabe580 | 01-Aug-2022 |
Dr. David von Oheimb |
X509: clean up doc and implementation of X509{,_REQ}_check_private_key() Also constify X509_REQ_get0_pubkey() and X509_REQ_check_private_key(). Reviewed-by: Tomas Mraz <tomas@openss
X509: clean up doc and implementation of X509{,_REQ}_check_private_key() Also constify X509_REQ_get0_pubkey() and X509_REQ_check_private_key(). Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/18930)
show more ...
|
ba9e3721 | 01-Aug-2022 |
Dr. David von Oheimb |
x509_att.c: improve error checking and reporting and coding style Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Ohei
x509_att.c: improve error checking and reporting and coding style Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/18931)
show more ...
|