722fe8ed | 01-Jul-2021 |
Pauli |
kdf: Add PVK KDF to providers. Add PIN Verification Key key derevation function to providers. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl
kdf: Add PVK KDF to providers. Add PIN Verification Key key derevation function to providers. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15968)
show more ...
|
8ba65c35 | 06-Sep-2021 |
Mingjun.Yang |
Add sm2 encryption test case from GM/T 0003.5-2012 Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/o
Add sm2 encryption test case from GM/T 0003.5-2012 Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16511)
show more ...
|
29a84567 | 25-Sep-2021 |
Mattias Ellert |
Fix variable name mis-match in example code Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/open
Fix variable name mis-match in example code Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16676)
show more ...
|
ce0502ce | 25-Sep-2021 |
Mattias Ellert |
EVP_PKEY_keygen_init has no argument named pkey int EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx); So it should not mention it in the man page description. Reviewed-by: Richard L
EVP_PKEY_keygen_init has no argument named pkey int EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx); So it should not mention it in the man page description. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16675)
show more ...
|
8b6a7da3 | 24-Sep-2021 |
Tianjia Zhang |
ssl: Correct filename in README Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged
ssl: Correct filename in README Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16671)
show more ...
|
a16ba5f3 | 24-Sep-2021 |
Pauli |
ci: add additional operating system specific builds These are an attempt to cover off on older OS versions that the main CIs do not cover. Reviewed-by: Tomas Mraz <tomas@openssl
ci: add additional operating system specific builds These are an attempt to cover off on older OS versions that the main CIs do not cover. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16669)
show more ...
|
63d0f4d2 | 25-Sep-2021 |
Pauli |
Add changes entry indicating that the OBJ_* calls are now thread safe Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15713) |
0855591e | 14-Jun-2021 |
Pauli |
test: add threading test for object creation In addition, rework the multi tests to use common code. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/
test: add threading test for object creation In addition, rework the multi tests to use common code. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15713)
show more ...
|
b66b024c | 11-Jun-2021 |
Pauli |
doc: add note to indicate that the OBJ_ functions were not thread safe in 3.0 Also remove OBJ_thread from the list of non-threadsafe functions. Reviewed-by: Tomas Mraz <tomas@openss
doc: add note to indicate that the OBJ_ functions were not thread safe in 3.0 Also remove OBJ_thread from the list of non-threadsafe functions. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15713)
show more ...
|
06394a6c | 24-Jun-2021 |
Pauli |
doc: Document that the OBJ creation functions are now thread safe. With the OBJ_ thread locking in place, these documentation changes are not required. This reverts commit 0218b
doc: Document that the OBJ creation functions are now thread safe. With the OBJ_ thread locking in place, these documentation changes are not required. This reverts commit 0218bcdd3feab456135207c140998305df73ab7b. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15713)
show more ...
|
c568900c | 17-Jun-2021 |
Pauli |
obj: add locking to the OBJ sigid calls This is done using a single global lock. The premise for this is that new objects will most frequently be added at start up and never added subse
obj: add locking to the OBJ sigid calls This is done using a single global lock. The premise for this is that new objects will most frequently be added at start up and never added subsequently. Thus, the locking will be for read most of the time. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15713)
show more ...
|
29c80c60 | 17-Jun-2021 |
Pauli |
obj: make new NIDs use tsan if possible Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15713) |
397065c6 | 11-Jun-2021 |
Pauli |
obj: make the OBJ_ calls thread safe This is done using a single global lock. The premise for this is that new objects will most frequently be added at start up and never added subseque
obj: make the OBJ_ calls thread safe This is done using a single global lock. The premise for this is that new objects will most frequently be added at start up and never added subsequently. Thus, the locking will be for read most of the time. This does, however, introduce the overhead of taking an uncontested read lock when accessing the object database. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15713)
show more ...
|
b0b456f8 | 17-Jun-2021 |
Pauli |
tsan: add an addition macro Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15713) |
75cce8dd | 12-Jul-2021 |
Dr. David von Oheimb |
80-test_cmp_http.t: Remove -certout option where not needed Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16052) |
574246ae | 12-Jul-2021 |
Dr. David von Oheimb |
cmp_client_test.c: Remove needless dependency on NDEBUG Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16052) |
a5d8a2f8 | 22-Sep-2021 |
Dmitry Belyavskiy |
FIPS and KTLS may interfere New Linux kernels (>= 5.11) enable KTLS CHACHA which is not FIPS-suitable. Fixes #16657 Reviewed-by: Paul Dale <pauli@openssl.org> (Merg
FIPS and KTLS may interfere New Linux kernels (>= 5.11) enable KTLS CHACHA which is not FIPS-suitable. Fixes #16657 Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16658)
show more ...
|
aa58071e | 22-Sep-2021 |
Dominic Letz |
Update 15-ios.conf CLA: trivial I assume this has been an error in the initial ios conf file. In order to build for ios the shared engine library, needs to be disabled because iOS d
Update 15-ios.conf CLA: trivial I assume this has been an error in the initial ios conf file. In order to build for ios the shared engine library, needs to be disabled because iOS doesn't have the concept of shared libraries. But instead of only disabling `dynamic-engine` (or like in this commit disabled the `shared`) option the previous config did disable `engine` and with that the `static-engine` compilation as well. This restores the `static-engine` option being enabled by default, but keeping compilation going on iOS. Cheers! Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/16659)
show more ...
|
e0710222 | 23-Sep-2021 |
Pauli |
tls/ccm8: reduce the cipher strength for CCM8 ciphers to 64 bits This is the length of the tag they use and should be considered an upper bound on their strength. This lowers th
tls/ccm8: reduce the cipher strength for CCM8 ciphers to 64 bits This is the length of the tag they use and should be considered an upper bound on their strength. This lowers their security strength to level 0. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16652)
show more ...
|
56ffcce4 | 22-Sep-2021 |
Pauli |
doc: document the change to the security level of CCM8 cipher suites Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://git
doc: document the change to the security level of CCM8 cipher suites Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16652)
show more ...
|
1a473d1c | 22-Sep-2021 |
Pauli |
tls: reduce the strength of CCM_8 ciphers due to their short IV. Fixes #16154 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merge
tls: reduce the strength of CCM_8 ciphers due to their short IV. Fixes #16154 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16652)
show more ...
|
c3b5fa4a | 22-Sep-2021 |
slontis |
Change TLS RC4 cipher strength check to be data driven. This is a same pattern as used in PR #16652 Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@ope
Change TLS RC4 cipher strength check to be data driven. This is a same pattern as used in PR #16652 Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16656)
show more ...
|
eeb61202 | 14-Sep-2021 |
Kelvin Lee |
Explicitly #include <synchapi.h> is unnecessary The header is already included by <windows.h> for WinSDK 8 or later. Actually this causes problem for WinSDK 7.1 (defaults for VS2010) tha
Explicitly #include <synchapi.h> is unnecessary The header is already included by <windows.h> for WinSDK 8 or later. Actually this causes problem for WinSDK 7.1 (defaults for VS2010) that it does not have this header while SRW Locks do exist for Windows 7. CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16603)
show more ...
|
415e6ac8 | 21-Sep-2021 |
Tavis Ormandy |
increase x509 code coverage metrics Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1665
increase x509 code coverage metrics Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16651)
show more ...
|
524f1261 | 13-Sep-2021 |
Ulrich Müller |
Add default provider support for Keccak 224, 256, 384 and 512 Fixes issue openssl#13033 Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org>
Add default provider support for Keccak 224, 256, 384 and 512 Fixes issue openssl#13033 Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16594)
show more ...
|