e567367a | 07-Sep-2021 |
Richard Levitte |
Added a NEWS entry about the enhanced 'openssl list' Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16522) (cherry picked from
Added a NEWS entry about the enhanced 'openssl list' Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16522) (cherry picked from commit f43c1241c28526588f59e56c7f56422e0d23f411)
show more ...
|
02649104 | 07-Sep-2021 |
Richard Levitte |
Add missing OSSL_DECODER entry in NEWS.md and CHANGES.md The text in CHANGES.md got fleshed out a bit more as well. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from http
Add missing OSSL_DECODER entry in NEWS.md and CHANGES.md The text in CHANGES.md got fleshed out a bit more as well. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16522) (cherry picked from commit d1a786e99b162793a8f4a70fe12d2c4e6f5ee608)
show more ...
|
1e7479e8 | 07-Sep-2021 |
Richard Levitte |
Correct the "Out of memory" EVP tests This affects test/recipes/30-test_evp_data/evpkdf_scrypt.txt and test/recipes/30-test_evp_data/evppkey_kdf_scrypt.txt, where the "Out of memory"
Correct the "Out of memory" EVP tests This affects test/recipes/30-test_evp_data/evpkdf_scrypt.txt and test/recipes/30-test_evp_data/evppkey_kdf_scrypt.txt, where the "Out of memory" stanza weren't up to the task, as they didn't hit the default scrypt memory limit like they did in OpenSSL 1.1.1. We solve this by setting the |n| value to the next power of two, and correcting the expected result. Fixes #16519 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16521) (cherry picked from commit 437d4202212daae86b66ef776706d2e1a27a7953)
show more ...
|
3dd74e21 | 06-Sep-2021 |
Richard Levitte |
Fix a few tests that fail on VMS In one spot, files aren't properly closed, so the sub-process program that's supposed to read them can't, because it's locked out. In another sp
Fix a few tests that fail on VMS In one spot, files aren't properly closed, so the sub-process program that's supposed to read them can't, because it's locked out. In another spot, srctop_file() was used where srctop_dir() should be used to properly format a directory specification. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16518) (cherry picked from commit 7364545e0734ad25e08d7d5ad0e2c9dac85d2d0d)
show more ...
|
6929c8fb | 26-Jul-2021 |
Richard Levitte |
Configuration: support building for OpenVMS for x86_64 OpenVMS for x86_64 is currently out on a field test. Building programs for it is currently done with cross compilation on Itanium.
Configuration: support building for OpenVMS for x86_64 OpenVMS for x86_64 is currently out on a field test. Building programs for it is currently done with cross compilation on Itanium. The cross compilation tools are made available by running a script, which makes cross-compilation variants of most commands available, and adds the cross-compilation C compiler XCC. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16498)
show more ...
|
d4458e59f6 | 03-Sep-2021 |
Richard Levitte |
test/recipes/25-test_verify.t: Add a couple of tests of mixed PEM files Fixes #16224 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/
test/recipes/25-test_verify.t: Add a couple of tests of mixed PEM files Fixes #16224 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16466)
show more ...
|
0195cdd2 | 01-Sep-2021 |
Richard Levitte |
ENCODER PROV: Add encoders with EncryptedPrivateKeyInfo output Since EncryptedPrivateKeyInfo is a recognised structure, it's reasonable to think that someone might want to specify it.
ENCODER PROV: Add encoders with EncryptedPrivateKeyInfo output Since EncryptedPrivateKeyInfo is a recognised structure, it's reasonable to think that someone might want to specify it. To be noted is that if someone specifies the structure PrivateKeyInfo but has also passed a passphrase callback, the result will still become a EncryptedPrivateKeyInfo structure. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16466)
show more ...
|
602bfb8b | 01-Sep-2021 |
Richard Levitte |
Adjust test/endecoder_test.c The protected tests need to specify the structure EncryptedPrivateKeyInfo rather than PrivateKeyInfo, since that's the outermost structure. Reviewed
Adjust test/endecoder_test.c The protected tests need to specify the structure EncryptedPrivateKeyInfo rather than PrivateKeyInfo, since that's the outermost structure. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16466)
show more ...
|
821b3956 | 30-Aug-2021 |
Richard Levitte |
OSSL_STORE 'file:' scheme: Set input structure for certificates and CRLs When the user expects to load a certificate or a CRL through the OSSL_STORE loading function, the 'file:' impleme
OSSL_STORE 'file:' scheme: Set input structure for certificates and CRLs When the user expects to load a certificate or a CRL through the OSSL_STORE loading function, the 'file:' implementation sets the corresponding structure names in the internal decoder context. This is especially geared for PEM files, which often contain a mix of objects, and password prompting should be avoided for objects that need them, but aren't what the caller is looking for. Fixes #16224 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16466)
show more ...
|
98408852 | 30-Aug-2021 |
Richard Levitte |
PEM to DER decoder: Specify object type and data structure more consistently The data structure wasn't given for recognised certificates or CRLs. It's better, though, to specify it for t
PEM to DER decoder: Specify object type and data structure more consistently The data structure wasn't given for recognised certificates or CRLs. It's better, though, to specify it for those objects as well, so they can be used to filter what actually gets decoded, which will be helpful for our OSSL_STORE 'file:' scheme implementation. Fixes #16224 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16466)
show more ...
|
73dd5d67 | 30-Aug-2021 |
Richard Levitte |
DECODER: check the first decoded structure name against user given structure In a chain of decoders, the first that specifies an input structure gets it compared with the structure speci
DECODER: check the first decoded structure name against user given structure In a chain of decoders, the first that specifies an input structure gets it compared with the structure specified by the user, if there is one. If they aren't the same, that decoder is skipped. Because the first structure can appear anywhere along a chain of decoders, not just the decoders associated with the resulting OpenSSL type, the code that checked the structure name when building up the chain of decoders is removed. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16466)
show more ...
|
d7b5f06e | 02-Sep-2021 |
slontis |
Add KEM dupctx test Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16495) |
21a0d9f3 | 02-Sep-2021 |
slontis |
Fix dh dupctx refcount error Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16495) |
85407b77 | 02-Sep-2021 |
slontis |
Fix double free in EVP_PKEY_CTX_dup() If the internal operations dupctx() fails then a free is done (e.g. EVP_KEYEXCH_free()). If this is not set to NULL the EVP_PKEY_CTX_free() will do a do
Fix double free in EVP_PKEY_CTX_dup() If the internal operations dupctx() fails then a free is done (e.g. EVP_KEYEXCH_free()). If this is not set to NULL the EVP_PKEY_CTX_free() will do a double free. This was found by testing kdf_dupctx() in kdf_exch.c (Note this always fails since the internal KDF's do not have a dup method). Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16495)
show more ...
|
6f2f5994 | 02-Sep-2021 |
PW Hu |
EVP_PKEY_gettable_params.pod: Update argument names CLA: trivial Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: T
EVP_PKEY_gettable_params.pod: Update argument names CLA: trivial Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16494)
show more ...
|
9150ca60 | 02-Sep-2021 |
Richard Levitte |
VMS: Compensate for x86_64 cross compiler type incompatibility The x86_64 cross compiler says that 'unsigned long long' isn't the same as 'unsigned __int64'. Sure, and considering that
VMS: Compensate for x86_64 cross compiler type incompatibility The x86_64 cross compiler says that 'unsigned long long' isn't the same as 'unsigned __int64'. Sure, and considering that providers/implementations/rands/seeding/rand_vms.c is specific VMS only code, it's easy to just change the type to the exact same as what's specified in the system headers. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16497) (cherry picked from commit 1ef526ef421febe50a105bb140d7e3a70bd76b61)
show more ...
|
27272657 | 31-Aug-2021 |
Richard Levitte |
Prepare for 3.1 Because we now have an openssl-3.0 branch, master is moved to be the next potential minor version. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: P
Prepare for 3.1 Because we now have an openssl-3.0 branch, master is moved to be the next potential minor version. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16484)
show more ...
|
305c77aa | 30-Aug-2021 |
Viktor Dukhovni |
Test for DANE cross cert fix Reviewed-by: Tomáš Mráz <tomas@openssl.org> |
661de442 | 30-Aug-2021 |
Viktor Dukhovni |
Prioritise DANE TLSA issuer certs over peer certs When building the certificate chain, prioritise any Cert(0) Full(0) certificates from TLSA records over certificates received from the p
Prioritise DANE TLSA issuer certs over peer certs When building the certificate chain, prioritise any Cert(0) Full(0) certificates from TLSA records over certificates received from the peer. This is important when the server sends a cross cert, but TLSA records include the underlying root CA cert. We want to construct a chain with the issuer from the TLSA record, which can then match the TLSA records (while the associated cross cert may not). Reviewed-by: Tomáš Mráz <tomas@openssl.org>
show more ...
|
505d44c6 | 26-Jul-2021 |
Pauli |
rand: avoid using the derivation function for the public and private DRBGs There is no point using it becuase they are getting full quality entropy from the primary DRBG (which remains u
rand: avoid using the derivation function for the public and private DRBGs There is no point using it becuase they are getting full quality entropy from the primary DRBG (which remains using the d.f.). Also cleaned up the parameter passing to the DRBGs to not pass parameters that are unknown. Fixes #16117 Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16156)
show more ...
|
1b9e4678 | 01-Sep-2021 |
Daniel Bevenius |
Fix indentation of tls13_hkdf_expand parameters Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openss
Fix indentation of tls13_hkdf_expand parameters Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16489)
show more ...
|
f92bfddc | 27-Aug-2021 |
Pauli |
CI: add last run-checker fuzzing CIs to Actions Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16438) |
473664aa | 19-Aug-2021 |
a1346054 <36859588+a1346054@users.noreply.github.com> |
always use the same perl in $PATH Different tests may use unexpectedly different versions of perl, depending on whether they hardcode the path to the perl executable or if they resol
always use the same perl in $PATH Different tests may use unexpectedly different versions of perl, depending on whether they hardcode the path to the perl executable or if they resolve the path from the environment. This fixes it so that the same perl is always used. Fix some trailing whitespace and spelling mistakes as well. CLA: trivial Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16362)
show more ...
|
3a1fa011 | 31-Aug-2021 |
Mattias Ellert |
Openssl fails to compile on Debian with kfreebsd kernels (kfreebsd-amd64, kfreebsd-i386). The error reported by the compiler is: ../crypto/uid.c: In function 'OPENSSL_issetugid':
Openssl fails to compile on Debian with kfreebsd kernels (kfreebsd-amd64, kfreebsd-i386). The error reported by the compiler is: ../crypto/uid.c: In function 'OPENSSL_issetugid': ../crypto/uid.c:50:22: error: 'AT_SECURE' undeclared (first use in this function) 50 | return getauxval(AT_SECURE) != 0; | ^~~~~~~~~ This commit changes the code to use the freebsd code in this case. This fixes the compilation. CLA: trivial Reviewed-by: Ben Kaduk <kaduk@mit.edu> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16477)
show more ...
|
8e706c8a | 31-Aug-2021 |
Richard Levitte |
dev/release.sh: Adjust release branch names to votes The OTC voted today that the release branch for OpenSSL 3.0 should be openssl-3.0 rather than openssl-3.0.x. The release script is c
dev/release.sh: Adjust release branch names to votes The OTC voted today that the release branch for OpenSSL 3.0 should be openssl-3.0 rather than openssl-3.0.x. The release script is changed accordingly. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16481)
show more ...
|