79c7acc5 | 12-Jan-2022 |
Dmitry Belyavskiy |
Cleansing all the temporary data for s390x Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull
Cleansing all the temporary data for s390x Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17486)
show more ...
|
3bfb7239 | 12-Jan-2022 |
Tomas Mraz |
test_gendhparam: Drop expected error output Otherwise it sometimes confuses the TAP parser. Fixes #17480 Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged
test_gendhparam: Drop expected error output Otherwise it sometimes confuses the TAP parser. Fixes #17480 Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/17481)
show more ...
|
8086b267 | 11-Jan-2022 |
Matt Caswell |
Clear md_data only when necessary PR #17255 fixed a bug in EVP_DigestInit_ex(). While backporting the PR to 1.1.1 (see #17472) I spotted an error in the original patch. This fixes it
Clear md_data only when necessary PR #17255 fixed a bug in EVP_DigestInit_ex(). While backporting the PR to 1.1.1 (see #17472) I spotted an error in the original patch. This fixes it. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17473)
show more ...
|
3d4d5305 | 12-Jan-2022 |
Pauli |
threadstest: use locking for tsan operations if required Not all platforms support tsan operations, those that don't need to have an alternative locking path. Fixes #17447
threadstest: use locking for tsan operations if required Not all platforms support tsan operations, those that don't need to have an alternative locking path. Fixes #17447 Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/17479)
show more ...
|
8ff861dc | 12-Jan-2022 |
Pauli |
drbg: add handling for cases where TSAN isn't available Most of the DRGB code is run under lock from the EVP layer. This is relied on to make the majority of TSAN operations safe. Howe
drbg: add handling for cases where TSAN isn't available Most of the DRGB code is run under lock from the EVP layer. This is relied on to make the majority of TSAN operations safe. However, it is still necessary to enable locking for all DRBGs created. Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/17479)
show more ...
|
43f13277 | 12-Jan-2022 |
Pauli |
lhash: use lock when TSAN not available for statistics gathering Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/17479) |
5c41cee2 | 12-Jan-2022 |
Pauli |
mem: do not produce usage counts when tsan is unavailable. Doing the tsan operations under lock would be difficult to arrange here (locks require memory allocation). Reviewed-by
mem: do not produce usage counts when tsan is unavailable. Doing the tsan operations under lock would be difficult to arrange here (locks require memory allocation). Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/17479)
show more ...
|
e6b8f359 | 12-Jan-2022 |
Pauli |
object: use updated tsan lock detection capabilities Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/17479) |
d8ed9e4a | 12-Jan-2022 |
Pauli |
core namemap: use updated tsan lock detection capabilities Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/17479) |
e22cbe5e | 12-Jan-2022 |
Pauli |
tsan: make detecting the need for locking when using tsan easier Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/17479) |
1fc97807 | 12-Jan-2022 |
Pauli |
threadstest: add write check to lock checking Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/17479) |
9c5d1451 | 12-Jan-2022 |
Pauli |
Avoid using a macro expansion in a macro when statically initialising Circumvents a problem with ancient PA-RISC compilers on HP/UX. Fixes #17477 Reviewed-by: Tomas Mraz <t
Avoid using a macro expansion in a macro when statically initialising Circumvents a problem with ancient PA-RISC compilers on HP/UX. Fixes #17477 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17478)
show more ...
|
64a64453 | 11-Jan-2022 |
Gerd Hoffmann |
drop unused callback variable Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merg
drop unused callback variable Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17471)
show more ...
|
a4e01187 | 10-Jan-2022 |
Tomas Mraz |
EVP_DigestSignFinal: *siglen should not be read if sigret == NULL This fixes small regression from #16962. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <p
EVP_DigestSignFinal: *siglen should not be read if sigret == NULL This fixes small regression from #16962. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17460)
show more ...
|
a10a5760 | 10-Jan-2022 |
Pauli |
param dup: add errors to failure returns Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17440) |
3ee3a2bd | 10-Jan-2022 |
Pauli |
param build set: add errors to failure returns Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17440) |
3831351d | 10-Jan-2022 |
Pauli |
param build: add errors to failure returns Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17440) |
291c5b3e | 10-Jan-2022 |
Pauli |
test: check for properly raised errors during param conversion Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17440) |
ac1082f0 | 07-Jan-2022 |
Pauli |
params: add error messages for built in param conversions Specifically: * out of range * unsigned negatives * inexact reals * bad param types * buffers that are too small
params: add error messages for built in param conversions Specifically: * out of range * unsigned negatives * inexact reals * bad param types * buffers that are too small * null function arguments * unknown sizes of real Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17440)
show more ...
|
826da145 | 07-Jan-2022 |
Pauli |
err: add additional errors Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17440) |
b82fd89d | 10-Jan-2022 |
Tomas Mraz |
pkeyutl: Fix regression with -kdflen option Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17461) |
f5e97b37 | 10-Jan-2022 |
Matt Caswell |
Ensure we test fetching encoder/decoder/store loader with a query string Although we had a test for fetching an encoder/decoder/store loader it did not use a query string. The issue high
Ensure we test fetching encoder/decoder/store loader with a query string Although we had a test for fetching an encoder/decoder/store loader it did not use a query string. The issue highlighted by #17456 only occurs if a query string is used. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17459)
show more ...
|
cd1981a0 | 10-Jan-2022 |
Matt Caswell |
Fix Decoder, Encoder and Store loader fetching Attempting to fetch one of the above and providing a query string was failing with an internal assertion error. We must ensure that we give
Fix Decoder, Encoder and Store loader fetching Attempting to fetch one of the above and providing a query string was failing with an internal assertion error. We must ensure that we give the provider when calling ossl_method_store_cache_set() Fixes #17456 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17459)
show more ...
|
254217a4 | 07-Jan-2022 |
Matt Caswell |
Clarify the int param getter documentation OSSL_PARAMs that are of type OSSL_PARAM_INTEGER or OSSL_PARAM_UNSIGNED_INTEGER can be obtained using any of the functions EVP_PKEY_get_int_
Clarify the int param getter documentation OSSL_PARAMs that are of type OSSL_PARAM_INTEGER or OSSL_PARAM_UNSIGNED_INTEGER can be obtained using any of the functions EVP_PKEY_get_int_param(), EVP_PKEY_get_size_t_param() or EVP_PKEY_get_bn_param(). The former two will fail if the parameter is too large to fit into the C variable. We clarify this in the documentation. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17445)
show more ...
|
e5fb4b14 | 09-Jan-2022 |
Dmitry Belyavskiy |
Don't run TLSFuzzer tests when it is not properly set Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.
Don't run TLSFuzzer tests when it is not properly set Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17448)
show more ...
|