669967fd | 21-May-2021 |
Matt Caswell |
Don't try the same decoder multiple times The function collect_decoder decides whether a given decoder should be tried or not. It loops through all the names for matching keymgmts to
Don't try the same decoder multiple times The function collect_decoder decides whether a given decoder should be tried or not. It loops through all the names for matching keymgmts to see if any are a match or not. If there is a match then the decoder gets added. However, each keymgmt may have multiple aliases and a decoder was being added for each one. For example DHX has 4 alias names, and therefore 4 instances of the DHX decoder were added and being tried. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15404)
show more ...
|
69d8cf70 | 21-May-2021 |
Tomas Mraz |
Windows CI: use nasm on 32bit and 64bit shared builds Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15349) |
d7c18395 | 19-May-2021 |
Tomas Mraz |
Add some basic Windows builds to the Windows CI workflow Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15349) |
09428755 | 19-May-2021 |
Jon Spillett |
Add a test for PKCS5_PBE_keyivgen() Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pul
Add a test for PKCS5_PBE_keyivgen() Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14326)
show more ...
|
8bb6fdfc | 06-May-2021 |
Jon Spillett |
Added PKCS5_PBE_keyivgen_ex() to allow PBKDF1 algorithms to be fetched for a specific library context Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <pauli@op
Added PKCS5_PBE_keyivgen_ex() to allow PBKDF1 algorithms to be fetched for a specific library context Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14326)
show more ...
|
0f183675 | 26-Feb-2021 |
Jon Spillett |
Add PBKDF1 to the legacy provider Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/
Add PBKDF1 to the legacy provider Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14326)
show more ...
|
d136db21 | 20-May-2021 |
Matt Caswell |
Remove some perl 5.14 use from rsaz-avx512.pl The non-destructive substitution syntax (s///r), was introduced in perl 5.14. We need to support 5.10 and above. Fixes #15378
Remove some perl 5.14 use from rsaz-avx512.pl The non-destructive substitution syntax (s///r), was introduced in perl 5.14. We need to support 5.10 and above. Fixes #15378 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15379)
show more ...
|
7c14d0c1 | 14-May-2021 |
Shane Lontis |
Rename the field 'provctx and data' to 'algctx' inside some objects containing pointers to provider size algorithm contexts. Fixes #14284 The gettable_ctx_params methods were co
Rename the field 'provctx and data' to 'algctx' inside some objects containing pointers to provider size algorithm contexts. Fixes #14284 The gettable_ctx_params methods were confusingly passing a 'provctx' and a provider context which are completely different objects. Some objects such as EVP_KDF used 'data' while others such as EVP_MD used 'provctx'. For libcrypto this 'ctx' is an opaque ptr returned when a providers algorithm implementation creates an internal context using a new_ctx() method. Hence the new name 'algctx'. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15275)
show more ...
|
c45df330 | 18-May-2021 |
Pauli |
fips: default to running self tests when starting the fips provider Also add a C++ constructor as per note 7 of IG 9.10 if no DEP is available and C++ is being used. Fixes #1532
fips: default to running self tests when starting the fips provider Also add a C++ constructor as per note 7 of IG 9.10 if no DEP is available and C++ is being used. Fixes #15322 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15324)
show more ...
|
bca0ffe8 | 20-May-2021 |
Pauli |
doc: update core_thread_start() documentation It is now passed an arugment to pass to the callback Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/o
doc: update core_thread_start() documentation It is now passed an arugment to pass to the callback Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15278)
show more ...
|
c9732f09 | 20-May-2021 |
Matt Caswell |
Fix a memleak in the FIPS provider If the DRBG is used within the scope of the FIPS OSSL_provider_init function then it attempts to register a thread callback via c_thread_start. How
Fix a memleak in the FIPS provider If the DRBG is used within the scope of the FIPS OSSL_provider_init function then it attempts to register a thread callback via c_thread_start. However the implementation of c_thread_start assumed that the provider's provctx was already present. However because OSSL_provider_init is still running it was actually NULL. This means the thread callback fail to work correctly and a memory leak resulted. Instead of having c_thread_start use the provctx as the callback argument we change the definition of c_thread_start to have an explicit callback argument to use. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15278)
show more ...
|
b3135f56 | 17-May-2021 |
Pauli |
test: fix typo in comment in threadstest.c Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15278) |
ec91f1ae | 18-May-2021 |
Pauli |
core: condition out more in FIPS builds Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15278) |
235776b2 | 14-May-2021 |
Pauli |
test: add test case to reliably reproduce RAND leak during POST The FIPS provider leaks a RAND if the POST is run at initialisation time. This test case reliably reproduces this event.
test: add test case to reliably reproduce RAND leak during POST The FIPS provider leaks a RAND if the POST is run at initialisation time. This test case reliably reproduces this event. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15278)
show more ...
|
b6f0f050 | 21-May-2021 |
Dr. David von Oheimb |
80-test_cmp_http: Invert and correct the logic of success vs. failure exit This makes the logic more intuitive and corrects the interpretation for NonStop. Fixes #15386 Reviewed
80-test_cmp_http: Invert and correct the logic of success vs. failure exit This makes the logic more intuitive and corrects the interpretation for NonStop. Fixes #15386 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15402)
show more ...
|
5771017d | 19-May-2021 |
Dr. David von Oheimb |
apps/cms.c: Correct -sign output and -verify input with -binary Also add related warnings on irrelevant use of -nodetach and -content options. Fixes #15347 Reviewed-by: Tom
apps/cms.c: Correct -sign output and -verify input with -binary Also add related warnings on irrelevant use of -nodetach and -content options. Fixes #15347 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15358)
show more ...
|
d0ccefdb | 17-May-2021 |
Richard Levitte |
Disable loader_attic by default on VMS The reason is that it currently doesn't build properly, due to the of pvkfmt.c, causing multiply defined symbols since libcrypto exports them a
Disable loader_attic by default on VMS The reason is that it currently doesn't build properly, due to the of pvkfmt.c, causing multiply defined symbols since libcrypto exports them as well. At the same time, it can't do without that source file, or it won't have access to certain internal symbols from there. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15320)
show more ...
|
4b2981f1 | 17-May-2021 |
Richard Levitte |
Make it possible to disable the loader_attic engine Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15320) |
b4810b70 | 21-May-2021 |
Richard Levitte |
VMS: Fix run of generic generator programs in descrip.mms.tmpl For a generic program, always go through the MCR utility. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from
VMS: Fix run of generic generator programs in descrip.mms.tmpl For a generic program, always go through the MCR utility. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15397)
show more ...
|
1b77f00a | 19-May-2021 |
Richard Levitte |
Configurations/descrip.mms.tmpl: rework the inclusion hacks Because VMS C has some trouble with recursive inclusion of header files, we have had to help it out for object files where the
Configurations/descrip.mms.tmpl: rework the inclusion hacks Because VMS C has some trouble with recursive inclusion of header files, we have had to help it out for object files where there is such an inclusion structure. Previously, we did so with temporary logical names that were the same as the first directory in an inclusion, so for example, to enable this inclusion (found in ssl/ssl_local.h), we created the logical name "record" when building any of the object files in the ssl/ subdirectories: #include "record/record.h" However, there is another way with the VMS C compiler, to selectively specify extra include directories in Unix form directly to the compiler. The logic is that from the directory where the source file to compile is located, the specified inclusion directory merged with the inclusion string should be able to access to specified header file. So for example, when a file in ssl/record/ is compiled, the following inclusion is found: #include "../ssl_local.h" So far so good, VMS C handles it properly. However, the recursive inclusion of "record/record.h" fails. However, if the compiler is helped out a little bit, with the following extra qualifier, then it works: /INCLUDE="../" The reason is that the compiler merges "../" and "record/record.h" into "../record/record.h", which is the correct path to that header file from the directory of the source file being compiled. All that remained was to figure out all places where this trouble may occur, and specify extra Unix formatted inclusion directories to specify on per object file basis. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15369)
show more ...
|
84faea44 | 19-May-2021 |
Robbie Harwood |
Fix upgrading docs for RSA_private_encrypt/RSA_public_decrypt Despite the name, these functions manipulate signatures, which means that their replacements are the EVP_PKEY_sign/EVP_PKEY_
Fix upgrading docs for RSA_private_encrypt/RSA_public_decrypt Despite the name, these functions manipulate signatures, which means that their replacements are the EVP_PKEY_sign/EVP_PKEY_verify family. Signed-off-by: Robbie Harwood <rharwood@redhat.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/15359)
show more ...
|
56c98a7d | 03-Apr-2021 |
Dr. David von Oheimb |
apps/cms: Simplify handling of encerts; add warning if they are ignored Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14843) |
06621ba3 | 21-May-2021 |
Pauli |
configurations: update template makefiles to install documentation images Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15399) |
d594d2e1 | 21-May-2021 |
Pauli |
configure: build list of image files Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15399) |
f90040f8 | 21-May-2021 |
Pauli |
doc: process images when installing Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15399) |