357e2734 | 28-Oct-2024 |
Frederik Wedel-Heinen |
Support DEFAULT keyword and '-' prefix in SSL_CTX_set1_groups_list() Fixes #25790 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (M
Support DEFAULT keyword and '-' prefix in SSL_CTX_set1_groups_list() Fixes #25790 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25813)
show more ...
|
1ee90614 | 29-Oct-2024 |
Dr. David von Oheimb |
APPS/pkeyutl: strengthen error message on too long sign/verify input Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https:
APPS/pkeyutl: strengthen error message on too long sign/verify input Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22910)
show more ...
|
50c0241d | 29-Oct-2024 |
Dr. David von Oheimb |
APPS/pkeyutl: -digest implies -rawin and can only be used with -sign and -verify Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged
APPS/pkeyutl: -digest implies -rawin and can only be used with -sign and -verify Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22910)
show more ...
|
c7764dac | 02-Dec-2023 |
Dr. David von Oheimb |
APPS/pkeyutl: improve -rawin usability (implied by Ed25519 and Ed448) and doc Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged fr
APPS/pkeyutl: improve -rawin usability (implied by Ed25519 and Ed448) and doc Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22910)
show more ...
|
70863325 | 28-Oct-2024 |
Dr. David von Oheimb |
CHANGES.md: re-word 'app' to 'command' and 'apps' to 'commands' for consistency Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged
CHANGES.md: re-word 'app' to 'command' and 'apps' to 'commands' for consistency Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22910)
show more ...
|
607a46d0 | 29-Oct-2024 |
Mohammed Alhabib |
apps/speed.c: Fix the benchmarking for AEAD ciphers Fixed the benchmarking for the evp aead interface for ccm, gcm, ocb, and siv, where decryption fails when executing `openssl speed
apps/speed.c: Fix the benchmarking for AEAD ciphers Fixed the benchmarking for the evp aead interface for ccm, gcm, ocb, and siv, where decryption fails when executing `openssl speed -evp aes-128-ccm -decrypt` and `openssl speed -evp aes-128-gcm -decrypt`. Related issues are [24686](https://github.com/openssl/openssl/issues/24686) and [24250](https://github.com/openssl/openssl/issues/24250). Now both encryption and decryption, with or without AAD, executes correctly without issues. Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25823)
show more ...
|
539b17b6 | 31-Oct-2024 |
Aditya |
apps: Change default cipher to aes-256-cbc for req, cms and smime apps Update `CHANGES.md` and `NEWS.md`; remove `no-des` guard from req, cms, and smime apps Update MAN pages fo
apps: Change default cipher to aes-256-cbc for req, cms and smime apps Update `CHANGES.md` and `NEWS.md`; remove `no-des` guard from req, cms, and smime apps Update MAN pages for default cipher; fix styling by removing braces around single statements Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25839)
show more ...
|
1d160dbf | 30-Oct-2024 |
Zheyu Shen |
Fix incorrect openssl-smime doc sample command for encrypt Original documented sample command causes error. PEM recipient cert argument needs to go last. CLA: trivial Revie
Fix incorrect openssl-smime doc sample command for encrypt Original documented sample command causes error. PEM recipient cert argument needs to go last. CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25829)
show more ...
|
59f5f6c7 | 29-Oct-2024 |
Tomas Mraz |
speed.c: Check for 0 block size Although this cannot really happen check for 0 block size to avoid division by 0. Fixes Coverity 1633936 Reviewed-by: Paul Dale <ppzgs1@
speed.c: Check for 0 block size Although this cannot really happen check for 0 block size to avoid division by 0. Fixes Coverity 1633936 Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Saša Nedvědický <sashan@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25822)
show more ...
|
8ff6edb9 | 27-Oct-2024 |
Niels Dossche |
Fix potential memory leak in OSSL_HPKE_CTX_new() ctx->propq is a duplicated string, but the error code does not free the duplicated string's memory. If e.g. EVP_CIPHER_fetch() fails then
Fix potential memory leak in OSSL_HPKE_CTX_new() ctx->propq is a duplicated string, but the error code does not free the duplicated string's memory. If e.g. EVP_CIPHER_fetch() fails then we can leak the string's memory. Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25812)
show more ...
|
7e3f7f1d | 28-Oct-2024 |
Aditya |
test: Add test cases for req -cipher option Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/open
test: Add test cases for req -cipher option Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25796)
show more ...
|
bca1bb29 | 24-Oct-2024 |
Aditya |
req: Add -cipher option to specify private key encryption cipher Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://gi
req: Add -cipher option to specify private key encryption cipher Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25796)
show more ...
|
43ba6017 | 28-Oct-2024 |
Neil Horman |
Remove sslkeylog file setup from quic-hq-interop Now that libcrypto supports the user of SSLKEYLOGFILE, the interop demo attempts to open the same file based on the same env variable.
Remove sslkeylog file setup from quic-hq-interop Now that libcrypto supports the user of SSLKEYLOGFILE, the interop demo attempts to open the same file based on the same env variable. The hq-interop-demo code can just be removed, and it fixes the open failure when both libcrypto and hq-interop attempt to open and write the same file, which is causing the nightly failure Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25819)
show more ...
|
4c29044a | 27-Oct-2024 |
Richard Levitte |
fix: util/check-format-commit.sh - fix ending check Look at the end result instead of the file name it's stored in Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by:
fix: util/check-format-commit.sh - fix ending check Look at the end result instead of the file name it's stored in Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25810)
show more ...
|
280c1d0f | 27-Oct-2024 |
Michael Baentsch <57787676+baentsch@users.noreply.github.com> |
output negotiated TLS1.3 group Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25808) |
a3660729 | 24-Oct-2024 |
Tomas Mraz |
speed.c: Check block size before running EVP_Cipher_loop() Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tom Cosgrove <tom.
speed.c: Check block size before running EVP_Cipher_loop() Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/25792)
show more ...
|
c60a2b18 | 24-Oct-2024 |
Tomas Mraz |
test_speed: Explicitly test the crashing command line on sparc Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tom Cosgrove <
test_speed: Explicitly test the crashing command line on sparc Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/25792)
show more ...
|
27fa9d33 | 23-Oct-2024 |
Matt Caswell |
Fix builds on riscv64 using musl Some environments using musl are reported to have the hwprobe.h include file but not have the __NR_riscv_hwprobe define. Fixes #25772 R
Fix builds on riscv64 using musl Some environments using musl are reported to have the hwprobe.h include file but not have the __NR_riscv_hwprobe define. Fixes #25772 Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Ben Kaduk <kaduk@mit.edu> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/25787)
show more ...
|
f30d6ba4 | 24-Oct-2024 |
Bernd Edlinger |
Fix ambiguous output of Signature Algorithms Signature Algorithms are printed in a SIG+HASH format. In some cases this is ambiguous like brainpool and RSA-PSS. And the name of ed2551
Fix ambiguous output of Signature Algorithms Signature Algorithms are printed in a SIG+HASH format. In some cases this is ambiguous like brainpool and RSA-PSS. And the name of ed25519 and ed448 must be spelled in lower case, so that the output can be used as a -sigalgs parameter value. Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25797)
show more ...
|
80026e5d | 11-Oct-2024 |
Dr. David von Oheimb |
check-format-commit.sh: various improvements; check unstaged changes on empty commit range Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (M
check-format-commit.sh: various improvements; check unstaged changes on empty commit range Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/25666)
show more ...
|
380ea597 | 10-Oct-2024 |
Dr. David von Oheimb |
check-format-commit.sh: make awk patterns more robust for MacOS and certain flavors of Linux Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com>
check-format-commit.sh: make awk patterns more robust for MacOS and certain flavors of Linux Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/25666)
show more ...
|
06aa41a5 | 24-Oct-2024 |
dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> |
Dependabot update CLA: trivial (deps): Bump actions/setup-python Bumps [actions/setup-python](https://github.com/actions/setup-python) from 5.2.0 to 5.3.0. - [Release n
Dependabot update CLA: trivial (deps): Bump actions/setup-python Bumps [actions/setup-python](https://github.com/actions/setup-python) from 5.2.0 to 5.3.0. - [Release notes](https://github.com/actions/setup-python/releases) - [Commits](https://github.com/actions/setup-python/compare/v5.2.0...v5.3.0) --- updated-dependencies: - dependency-name: actions/setup-python dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25795)
show more ...
|
a08a145d | 22-Oct-2024 |
Dimitri John Ledkov |
github: add fips configuration, with legacy transitions turned off Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.c
github: add fips configuration, with legacy transitions turned off Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25762)
show more ...
|
9d70bba1 | 22-Oct-2024 |
Dimitri John Ledkov |
fips no-des: compile out TDES KAT FIPS provider correctly supports no-des build time option and doesn't advertise DES related algorithms. However KAT test for DES is still attempted
fips no-des: compile out TDES KAT FIPS provider correctly supports no-des build time option and doesn't advertise DES related algorithms. However KAT test for DES is still attempted to be executed and fails. This prevents configuring FIPS provider without legacy behaviour as defined in SP 800-131Arev2. Also see #25761 internal docs. Fix `enable-fips no-des` build option, and add a daily checker for "legacy-free" (as much as currently feasible) FIPS configuration. Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25762)
show more ...
|
fc0e7946 | 22-Oct-2024 |
Frederik Wedel-Heinen |
tls_common.c: Align the calculation of maximal alignment value In tls_setup_write_buffer() and tls_setup_read_buffer() the calculation is different. Make them the same. Fixes #2
tls_common.c: Align the calculation of maximal alignment value In tls_setup_write_buffer() and tls_setup_read_buffer() the calculation is different. Make them the same. Fixes #25746 Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25764)
show more ...
|