90c31131 | 07-Nov-2021 |
Pauli |
prov: remove unused field `flag_fallback` and function `ossl_provider_set_fallback` These are legacy of older versions of the code and are currently not used anywhere. Reviewed-
prov: remove unused field `flag_fallback` and function `ossl_provider_set_fallback` These are legacy of older versions of the code and are currently not used anywhere. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16985)
show more ...
|
e7414634 | 03-Nov-2021 |
Xiaofei Bai |
Fix sigsize usage in apps/speed.c In a recent upstream change (43da9a14f0e73f42f28ae34219929b44df5d1a11) the parameter sigsize become a read/write input in EVP_PKEY_sign(), and a
Fix sigsize usage in apps/speed.c In a recent upstream change (43da9a14f0e73f42f28ae34219929b44df5d1a11) the parameter sigsize become a read/write input in EVP_PKEY_sign(), and after signing, sigsize will be overwritten with the actual size and used in the verify step. As the speed program calls EVP_PKEY_sign() on the same context repeatedly, sigsize value is no longer the initial available size, and may fail in later buffer size checks. This fix adds a new buflen member in struct loopargs (which is only used within apps/speed.c), to save available buffer size and to be used as sigsize input in EVP_PKEY_sign() calls. Sigsize still contains the signature size for the verify step. Signed-off-by: Xiaofei Bai <xiaofei.bai@arm.com> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16991)
show more ...
|
a18cdd28 | 08-Nov-2021 |
Pauli |
x509: remove dead call to strlen() The condition `userlen == -1` isn't possible because this is already checked on line 159 above and the subsequent strlen(3) call guarantees that it's v
x509: remove dead call to strlen() The condition `userlen == -1` isn't possible because this is already checked on line 159 above and the subsequent strlen(3) call guarantees that it's value is positive. Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (Merged from https://github.com/openssl/openssl/pull/16987)
show more ...
|
64c428c3 | 05-Nov-2021 |
PW Hu |
Fix: invoking X509_self_signed improperly Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/
Fix: invoking X509_self_signed improperly Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16976)
show more ...
|
7267769c | 08-Nov-2021 |
Pauli |
coverity: add a daily coverity build The weekly build got lost when we stopped using Travis. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org
coverity: add a daily coverity build The weekly build got lost when we stopped using Travis. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16988)
show more ...
|
2d495192 | 07-Nov-2021 |
Richard Levitte |
Fix DER encoder implementations for output structures "EC" and "SM2" These DER encoder implementations are supposed to be aliases for the "type-specific" output structure, but were made
Fix DER encoder implementations for output structures "EC" and "SM2" These DER encoder implementations are supposed to be aliases for the "type-specific" output structure, but were made different in so far that they would output a "type specific" public key, which turns out to be garbage (it called i2o_ECPublicKey()). The "type-specific" output structure doesn't support that, and shouldn't. Fixes #16977 Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16983) (cherry picked from commit 2cb802e16fff3fb2c57ae664baa7bd9ce3e33805)
show more ...
|
09235289 | 05-Nov-2021 |
PW Hu |
Fix: invoking x509_name_cannon improperly Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/
Fix: invoking x509_name_cannon improperly Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16974)
show more ...
|
ff3e4508 | 04-Nov-2021 |
Tianjia Zhang |
KTLS: use EVP_CIPHER_is_a instead of nid Signed-off-by: Tianjia Zhang <tianjia.zhang@linux.alibaba.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte
KTLS: use EVP_CIPHER_is_a instead of nid Signed-off-by: Tianjia Zhang <tianjia.zhang@linux.alibaba.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Yang <kaishen.yy@antfin.com> (Merged from https://github.com/openssl/openssl/pull/16963)
show more ...
|
9bf1061c | 27-Aug-2021 |
Dr. David von Oheimb |
APPS/x509: Fix generation of AKID via v2i_AUTHORITY_KEYID() Fixes #16300 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16442) |
03ee2e5b | 03-Nov-2021 |
Dr. David von Oheimb |
APPS/cmp: make the -sans option support email addresses (type rfc822Name) Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16960) |
4ce64ed7 | 05-Nov-2021 |
Matt Caswell |
Fix errors in EVP_PKEY_fromdata examples The EVP_PKEY_fromdata man page has some code examples with various errors in them. This fixes those errors. Reviewed-by: Tomas Mraz <tom
Fix errors in EVP_PKEY_fromdata examples The EVP_PKEY_fromdata man page has some code examples with various errors in them. This fixes those errors. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16973)
show more ...
|
e6a10b07 | 05-Nov-2021 |
Pauli |
Fix data race setting `default_DSO_meth` The global variable `default_DSO_meth` was potentially set multiple times by different threads. It turns out that it could only be set to a sing
Fix data race setting `default_DSO_meth` The global variable `default_DSO_meth` was potentially set multiple times by different threads. It turns out that it could only be set to a single value so the race is harmless but still better avoided. The fix here simply removes the global and accesses the value it was set to via the `DSO_METHOD_openssl()` call. Problem discovered via #16970, but this does not resolve that issue because there are other concerns. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16972)
show more ...
|
1b4d9967 | 04-Nov-2021 |
Pauli |
Address Coverity 1493362 resource leak Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16962) |
fe412538 | 04-Nov-2021 |
Pauli |
Address coverity 1493382 argument cannot be negative Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16962) |
182cc644 | 04-Nov-2021 |
Pauli |
Address Coverity 1493387 Logically dead code Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16962) |
73a815de | 04-Nov-2021 |
Pauli |
Fix coverity 1493364 & 1493375: unchecked return value Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16962) |
098f2627 | 01-Nov-2021 |
PW Hu |
Fix incorrect return check of BN_bn2binpad Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1
Fix incorrect return check of BN_bn2binpad Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16942)
show more ...
|
ab547fc0 | 03-Nov-2021 |
Pauli |
avoid a NULL dereference when getting digest Fixes #16961 Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> (Merged from https://github.com/openssl/openssl/pull/16
avoid a NULL dereference when getting digest Fixes #16961 Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> (Merged from https://github.com/openssl/openssl/pull/16969)
show more ...
|
884400d7 | 11-Oct-2021 |
slontis |
Fix tests to check for negative results when calling EVP_PKEY_fromdata_init Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16801) |
09d91264 | 27-Oct-2021 |
Phil Mesnier |
Fix for a segv interrupt that occurs when fix_dh_rfc5114 is called with ctx->p2 being a null pointer. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openss
Fix for a segv interrupt that occurs when fix_dh_rfc5114 is called with ctx->p2 being a null pointer. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16913) (cherry picked from commit 07e6c857364770f6e986b5d8ceb9fbe296f3c6d0)
show more ...
|
cc350c88 | 03-Nov-2021 |
Pauli |
Add unit tests for weak key and key parity checks Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/16953) |
8db9d075 | 03-Nov-2021 |
Pauli |
Convert the weak key and key parity tests to be constant time. Fixes #16944 Fixes #16859 Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.
Convert the weak key and key parity tests to be constant time. Fixes #16944 Fixes #16859 Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/16953)
show more ...
|
10cf46c4 | 02-Nov-2021 |
Pauli |
Remove redundant tests Removed the three checks of type against NULL since type cannot be NULL for any of them. Moved a check of ->engine inside a CPP guard for engines.
Remove redundant tests Removed the three checks of type against NULL since type cannot be NULL for any of them. Moved a check of ->engine inside a CPP guard for engines. Didn't address the teardown and rebuild of the provider context. Partially fixes #16947 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16952)
show more ...
|
3a069c1b | 03-Nov-2021 |
Bernd Edlinger |
Fix a memory leak in ssl_create_cipher_list Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pu
Fix a memory leak in ssl_create_cipher_list Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16954)
show more ...
|
b3c34401 | 03-Nov-2021 |
Bernd Edlinger |
Fix a memory leak in tls_parse_stoc_key_share Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/
Fix a memory leak in tls_parse_stoc_key_share Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16956)
show more ...
|