History log of /openssl/ (Results 5726 – 5750 of 36070)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
722fe8ed01-Jul-2021 Pauli

kdf: Add PVK KDF to providers.

Add PIN Verification Key key derevation function to providers.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl

kdf: Add PVK KDF to providers.

Add PIN Verification Key key derevation function to providers.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15968)

show more ...

8ba65c3506-Sep-2021 Mingjun.Yang

Add sm2 encryption test case from GM/T 0003.5-2012

Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/o

Add sm2 encryption test case from GM/T 0003.5-2012

Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16511)

show more ...

29a8456725-Sep-2021 Mattias Ellert

Fix variable name mis-match in example code

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/open

Fix variable name mis-match in example code

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16676)

show more ...

ce0502ce25-Sep-2021 Mattias Ellert

EVP_PKEY_keygen_init has no argument named pkey

int EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx);

So it should not mention it in the man page description.

Reviewed-by: Richard L

EVP_PKEY_keygen_init has no argument named pkey

int EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx);

So it should not mention it in the man page description.

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16675)

show more ...

8b6a7da324-Sep-2021 Tianjia Zhang

ssl: Correct filename in README

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged

ssl: Correct filename in README

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16671)

show more ...

a16ba5f324-Sep-2021 Pauli

ci: add additional operating system specific builds

These are an attempt to cover off on older OS versions that the main CIs
do not cover.

Reviewed-by: Tomas Mraz <tomas@openssl

ci: add additional operating system specific builds

These are an attempt to cover off on older OS versions that the main CIs
do not cover.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16669)

show more ...

63d0f4d225-Sep-2021 Pauli

Add changes entry indicating that the OBJ_* calls are now thread safe

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15713)

0855591e14-Jun-2021 Pauli

test: add threading test for object creation

In addition, rework the multi tests to use common code.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/

test: add threading test for object creation

In addition, rework the multi tests to use common code.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15713)

show more ...

b66b024c11-Jun-2021 Pauli

doc: add note to indicate that the OBJ_ functions were not thread safe in 3.0

Also remove OBJ_thread from the list of non-threadsafe functions.

Reviewed-by: Tomas Mraz <tomas@openss

doc: add note to indicate that the OBJ_ functions were not thread safe in 3.0

Also remove OBJ_thread from the list of non-threadsafe functions.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15713)

show more ...

06394a6c24-Jun-2021 Pauli

doc: Document that the OBJ creation functions are now thread safe.

With the OBJ_ thread locking in place, these documentation changes are not
required.

This reverts commit 0218b

doc: Document that the OBJ creation functions are now thread safe.

With the OBJ_ thread locking in place, these documentation changes are not
required.

This reverts commit 0218bcdd3feab456135207c140998305df73ab7b.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15713)

show more ...

c568900c17-Jun-2021 Pauli

obj: add locking to the OBJ sigid calls

This is done using a single global lock. The premise for this is that new
objects will most frequently be added at start up and never added subse

obj: add locking to the OBJ sigid calls

This is done using a single global lock. The premise for this is that new
objects will most frequently be added at start up and never added subsequently.
Thus, the locking will be for read most of the time.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15713)

show more ...

29c80c6017-Jun-2021 Pauli

obj: make new NIDs use tsan if possible

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15713)

397065c611-Jun-2021 Pauli

obj: make the OBJ_ calls thread safe

This is done using a single global lock. The premise for this is that new
objects will most frequently be added at start up and never added subseque

obj: make the OBJ_ calls thread safe

This is done using a single global lock. The premise for this is that new
objects will most frequently be added at start up and never added subsequently.
Thus, the locking will be for read most of the time.

This does, however, introduce the overhead of taking an uncontested read lock
when accessing the object database.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15713)

show more ...

b0b456f817-Jun-2021 Pauli

tsan: add an addition macro

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15713)

75cce8dd12-Jul-2021 Dr. David von Oheimb

80-test_cmp_http.t: Remove -certout option where not needed

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16052)

574246ae12-Jul-2021 Dr. David von Oheimb

cmp_client_test.c: Remove needless dependency on NDEBUG

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16052)

a5d8a2f822-Sep-2021 Dmitry Belyavskiy

FIPS and KTLS may interfere

New Linux kernels (>= 5.11) enable KTLS CHACHA which is not
FIPS-suitable.

Fixes #16657

Reviewed-by: Paul Dale <pauli@openssl.org>
(Merg

FIPS and KTLS may interfere

New Linux kernels (>= 5.11) enable KTLS CHACHA which is not
FIPS-suitable.

Fixes #16657

Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16658)

show more ...

aa58071e22-Sep-2021 Dominic Letz

Update 15-ios.conf

CLA: trivial

I assume this has been an error in the initial ios conf file. In order to build for ios the shared engine library, needs to be disabled because iOS d

Update 15-ios.conf

CLA: trivial

I assume this has been an error in the initial ios conf file. In order to build for ios the shared engine library, needs to be disabled because iOS doesn't have the concept of shared libraries. But instead of only disabling `dynamic-engine` (or like in this commit disabled the `shared`) option the previous config did disable `engine` and with that the `static-engine` compilation as well. This restores the `static-engine` option being enabled by default, but keeping compilation going on iOS.

Cheers!

Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/16659)

show more ...

e071022223-Sep-2021 Pauli

tls/ccm8: reduce the cipher strength for CCM8 ciphers to 64 bits

This is the length of the tag they use and should be considered an upper bound
on their strength.

This lowers th

tls/ccm8: reduce the cipher strength for CCM8 ciphers to 64 bits

This is the length of the tag they use and should be considered an upper bound
on their strength.

This lowers their security strength to level 0.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16652)

show more ...

56ffcce422-Sep-2021 Pauli

doc: document the change to the security level of CCM8 cipher suites

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://git

doc: document the change to the security level of CCM8 cipher suites

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16652)

show more ...

1a473d1c22-Sep-2021 Pauli

tls: reduce the strength of CCM_8 ciphers due to their short IV.

Fixes #16154

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merge

tls: reduce the strength of CCM_8 ciphers due to their short IV.

Fixes #16154

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16652)

show more ...

c3b5fa4a22-Sep-2021 slontis

Change TLS RC4 cipher strength check to be data driven.

This is a same pattern as used in PR #16652

Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tomas Mraz <tomas@ope

Change TLS RC4 cipher strength check to be data driven.

This is a same pattern as used in PR #16652

Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16656)

show more ...

eeb6120214-Sep-2021 Kelvin Lee

Explicitly #include <synchapi.h> is unnecessary

The header is already included by <windows.h> for WinSDK 8 or later.
Actually this causes problem for WinSDK 7.1 (defaults for VS2010) tha

Explicitly #include <synchapi.h> is unnecessary

The header is already included by <windows.h> for WinSDK 8 or later.
Actually this causes problem for WinSDK 7.1 (defaults for VS2010) that
it does not have this header while SRW Locks do exist for Windows 7.

CLA: trivial

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16603)

show more ...

415e6ac821-Sep-2021 Tavis Ormandy

increase x509 code coverage metrics

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/1665

increase x509 code coverage metrics

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16651)

show more ...


fuzz/corpora/x509/21c8004279f4b57fd8f904382cf138effd089b25
fuzz/corpora/x509/2bd8a58cc944497f08ea233d69443d6696c9fb3f
fuzz/corpora/x509/2fe700400bc899b9e7f30d66be5b19271ac47c64
fuzz/corpora/x509/31305f3b3ee0a5510918efdad62d29da23c1d057
fuzz/corpora/x509/382c9ce318e5d7abe889c3b2e9ace063d9ef5344
fuzz/corpora/x509/39cf74c117b5dba51828cff51a27790c737045d7
fuzz/corpora/x509/57927e05973120e02ca3e0af582a70d3398f085f
fuzz/corpora/x509/5dbc640a493e76958fdb2c73c9da4d9101f30061
fuzz/corpora/x509/6a1cee93d3b815669b0c65bde8e391c614a29ea3
fuzz/corpora/x509/6dcc554810035cc46962eac88c1883623f3e69c6
fuzz/corpora/x509/76b8ba06006375c9c47466dacf3a53021672df12
fuzz/corpora/x509/8b5fc9262d78c8c87d100ead207dc93df6361295
fuzz/corpora/x509/9900db635402ea32ef26249b5f811a0d85a56385
fuzz/corpora/x509/aa0e6c5373568c9d7f48dc627d19400208baed83
fuzz/corpora/x509/b1259bf4ca791b0f46887d9a959598e3ed5b6d33
fuzz/corpora/x509/b73532123cb6a663e8cf7334de9c9771ecb432f7
fuzz/corpora/x509/ce89063b8353b1880cb86f73f618a4008d83532a
fuzz/corpora/x509/d056ac458b78c0344a83c0383f76a20dbb4dcdbc
fuzz/corpora/x509/d57f9f790ec3895b7e11969a0b319bf274284be3
fuzz/corpora/x509/d60a803dc64c2f98c732660fb006b944df9f9270
fuzz/corpora/x509/e690741d65108fc3e8ce0af814e6b6967cfad51c
fuzz/corpora/x509/e7c6f4d50fb62030e2259c94f3a423e0d1c0fa16
fuzz/corpora/x509/e8ff454fe20035d1ee1c6fbb50cda330e8a48d47
fuzz/corpora/x509/ea973eb22df5eedd5f52639e1ad0950118c76b2e
fuzz/corpora/x509/ebabb2852689b7bedc46cc38d10deb4a4be8c8f7
fuzz/corpora/x509/ec16dacfbdb34e2a1f0909ec9c59f9e6fa7d5ab3
fuzz/corpora/x509/ee7a250cc7b123f8f3000fa2b0c045efd080f752
fuzz/corpora/x509/f11550062adba3ac78fccf835a882a68e1bffab2
fuzz/corpora/x509/f11f61828aa0a0fecaf44cbc155d7e174d814eb6
fuzz/corpora/x509/f1506975d926f6e98be686ea147854951d8fefcc
fuzz/corpora/x509/f3aebf0d2a2db39f8e4917e5b6a0e5fb0e0ce806
fuzz/corpora/x509/f5f0426c6dafa100b79a8675f15aca90a68d9e16
fuzz/corpora/x509/f6735b84d4c704f3674a50e6475c83bc2a3d6f1f
fuzz/corpora/x509/fa4768c5efcb1b5c8ecda30b263f5e9ca4320718
fuzz/corpora/x509/fae428be68618af3fc3fb89ab79d92f9d1a9b1b9
fuzz/corpora/x509/fb92fed0a0bc2235437683e655533d84b64a59c0
fuzz/corpora/x509/fc48a26e3e5e2a9229452819e8605b1cbfdd9892
fuzz/corpora/x509/fe543a8d7e09109a9a08114323eefec802ad79e2
524f126113-Sep-2021 Ulrich Müller

Add default provider support for Keccak 224, 256, 384 and 512

Fixes issue openssl#13033

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>

Add default provider support for Keccak 224, 256, 384 and 512

Fixes issue openssl#13033

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16594)

show more ...

1...<<221222223224225226227228229230>>...1443