b594a227 | 28-Apr-2021 |
Tomas Mraz |
SM2 signatures work correctly only with SM3 digests Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15074) |
2c181ac5 | 28-Apr-2021 |
Tomas Mraz |
sm2: Cleanup handling of DIGEST and DIGEST_SIZE parameters Fixes #14873 Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15074) |
c230e938 | 28-Apr-2021 |
Richard Levitte |
CORE: Rework the pre-population of the namemap The pre-population of names has become more thorough. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/
CORE: Rework the pre-population of the namemap The pre-population of names has become more thorough. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15066)
show more ...
|
e73fc813 | 28-Apr-2021 |
Richard Levitte |
STORE: Use the 'expect' param to limit the amount of decoders used In the provider file: scheme loader implementation, the OSSL_DECODER_CTX was set up with all sorts of implementations,
STORE: Use the 'expect' param to limit the amount of decoders used In the provider file: scheme loader implementation, the OSSL_DECODER_CTX was set up with all sorts of implementations, even if the caller has declared a limited expectation on what should be loaded, which means that even though a certificate is expected, all the diverse decoders to produce an EVP_PKEY are added to the decoding change. This optimization looks more closely at the expected type, and only adds the EVP_PKEY related decoder implementations to the chain if there is no expectation, or if the expectation is one of OSSL_STORE_INFO_PARAMS, OSSL_STORE_INFO_PUBKEY, OSSL_STORE_INFO_PKEY. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15066)
show more ...
|
38230e30 | 29-Apr-2021 |
Pauli |
acvp: fix the no-acvp_test build A pair of the disabled string checks were incorrect. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.
acvp: fix the no-acvp_test build A pair of the disabled string checks were incorrect. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/15082)
show more ...
|
455f2542 | 28-Apr-2021 |
Shane Lontis |
Update OSSL_STORE_attach() documentation to indicate it increases the ref_count of the passed in bio Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org
Update OSSL_STORE_attach() documentation to indicate it increases the ref_count of the passed in bio Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15058)
show more ...
|
857c223b | 28-Apr-2021 |
Shane Lontis |
Fix memory leak in load_key_certs_crls() when using stdin. A newly created BIO object within this function calls OSSL_STORE_attach() which increases the ref count to 2. OSSL_STORE_cl
Fix memory leak in load_key_certs_crls() when using stdin. A newly created BIO object within this function calls OSSL_STORE_attach() which increases the ref count to 2. OSSL_STORE_close() then decrements the ref count by 1, so the BIO still remains. The following new test was picking up this leak using.. > valgrind openssl crl -hash -noout < test/testcrl.pem Not quite sure why the existing tests were not picking this up since they appear to run through a similiar path.. such as > valgrind openssl pkey < test-runs/test_rsa/rsa-pkcs8-ff.dd Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15058)
show more ...
|
e9d62da6 | 28-Apr-2021 |
Shane Lontis |
Fix CRL app so that stdin works. Fixes #15031 The maybe_stdin needed to be passed to load_key_certs_crls(). Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Pau
Fix CRL app so that stdin works. Fixes #15031 The maybe_stdin needed to be passed to load_key_certs_crls(). Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15058)
show more ...
|
9ac653d8 | 28-Apr-2021 |
Tomas Mraz |
Document the API breaking constification changes The EVP_PKEY_asn1_set_public and EVP_PKEY_meth_set_copy have some API breaking constification changes in 3.0. Fixes #9296
Document the API breaking constification changes The EVP_PKEY_asn1_set_public and EVP_PKEY_meth_set_copy have some API breaking constification changes in 3.0. Fixes #9296 Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15068)
show more ...
|
0b31c367 | 28-Apr-2021 |
Eric Curtin |
Remove dated term and fixed typo anther Just something I noticed while reading this code. This was probably committed a very long time ago. Fixed typo anther -> another. Rev
Remove dated term and fixed typo anther Just something I noticed while reading this code. This was probably committed a very long time ago. Fixed typo anther -> another. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15078)
show more ...
|
c7d848e2 | 29-Apr-2021 |
Pauli |
remove end of line whitespace Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14434) |
b536880c | 17-Feb-2021 |
Jon Spillett |
Add library context and property query support into the PKCS12 API Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.
Add library context and property query support into the PKCS12 API Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14434)
show more ...
|
d77ba503 | 27-Apr-2021 |
Matt Caswell |
Adjust ssl_test_new for SHA1 security level SHA1 is now in security level 0. SHA1 is required for DTLSv1.1. Therefore ssl_test_new needed some adjustments in the event that DTLSv1.2 is d
Adjust ssl_test_new for SHA1 security level SHA1 is now in security level 0. SHA1 is required for DTLSv1.1. Therefore ssl_test_new needed some adjustments in the event that DTLSv1.2 is disabled. There are also adjustments required if using the FIPS module and DTLSv1.2 is disabled. The only DTLS version supported by the FIPS module is DTLSv1.2. Fixes #14956 Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15047)
show more ...
|
8ce390e1 | 27-Apr-2021 |
Matt Caswell |
Adjust sslapitest for SHA1 security level SHA1 is now in security level 0. SHA1 is required for DTLSv1.1. Therefore sslapitest needed some adjustments in the event that DTLSv1.2 is disab
Adjust sslapitest for SHA1 security level SHA1 is now in security level 0. SHA1 is required for DTLSv1.1. Therefore sslapitest needed some adjustments in the event that DTLSv1.2 is disabled. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15047)
show more ...
|
fdf31270 | 27-Apr-2021 |
Matt Caswell |
Adjust dtlstest for SHA1 security level SHA1 is now in security level 0. SHA1 is required for DTLSv1.1. Therefore dtlstest needed some adjustments in the event that DTLSv1.2 is disabled.
Adjust dtlstest for SHA1 security level SHA1 is now in security level 0. SHA1 is required for DTLSv1.1. Therefore dtlstest needed some adjustments in the event that DTLSv1.2 is disabled. Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15047)
show more ...
|
0f077b5f | 23-Apr-2021 |
Scott McPeak |
asn1_lib.c: ASN1_put_object: Remove comment about "class 0". ASN1_put_object() was preceded by the nonsensical comment: /* * class 0 is constructed constructed == 2 for ind
asn1_lib.c: ASN1_put_object: Remove comment about "class 0". ASN1_put_object() was preceded by the nonsensical comment: /* * class 0 is constructed constructed == 2 for indefinite length constructed */ This is the result of concatenating two sentences in 0f113f3ee4d by automated reformatting. The first sentence, "class 0 is constructed", goes back to d02b48c63a, the import of SSLeay 0.8.1b. Even in that context, it made little sense; class 0 means "universal", not constructed, and there is no special significance to class 0 in this function in any case. Therefore I have simply removed that first sentence. CLA: trivial Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/14998)
show more ...
|
c404e4fa | 27-Apr-2021 |
Tomas Mraz |
Add test case for openssl crl -noout -hash output Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/open
Add test case for openssl crl -noout -hash output Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15044)
show more ...
|
872b7979 | 27-Apr-2021 |
Tomas Mraz |
crl: noout is not an output item Fixes #15034 Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com
crl: noout is not an output item Fixes #15034 Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15044)
show more ...
|
3b9e4769 | 26-Apr-2021 |
Dr. Matthias St. Pierre |
CHANGES: document the FIPS provider configuration and installation Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13684) |
f2ea01d9 | 08-Apr-2021 |
Dr. Matthias St. Pierre |
README-FIPS: document the installation of the FIPS provider Note that configuration and installation procedure has changed: - The FIPS provider is now disabled by default and needs
README-FIPS: document the installation of the FIPS provider Note that configuration and installation procedure has changed: - The FIPS provider is now disabled by default and needs to be enabled by configuring with `enable-fips`. - If the FIPS provider is enabled, it gets installed automatically. There is no extra installation step required anymore. This is more natural and coincides with the expectation of the user, namely "what's configured, gets installed". Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13684)
show more ...
|
b2d8c7b6 | 25-Apr-2021 |
Dr. Matthias St. Pierre |
Configure: disable fips mode by default Building the fips provider in addition to the default provider effectively doubles the build time. Since many users will not need fips support
Configure: disable fips mode by default Building the fips provider in addition to the default provider effectively doubles the build time. Since many users will not need fips support, it is now disabled by default. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13684)
show more ...
|
afa0a13c | 25-Apr-2021 |
Dr. Matthias St. Pierre |
Configure: sort the disablables alphabetically Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13684) |
d9ce2681 | 14-Apr-2021 |
Dr. Matthias St. Pierre |
build.info: add the Perl wrapper to build generator programs on Windows Pull request #14320 introduced the ability to use compiled programs as generators in GENERATE rules of build.info
build.info: add the Perl wrapper to build generator programs on Windows Pull request #14320 introduced the ability to use compiled programs as generators in GENERATE rules of build.info files. Those generator calls were wrapped by the Perl wrapper (wrap.pl) in the Unix makefile template, but not on Windows. This commit adds the missing wrapper for Windows, because for the `fipsmodule.cnf` target it is essential that the `openssl fipsinstall` command does not load any preinstalled openssl configuration file. Fixes #13680 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13684)
show more ...
|
18da9fc3 | 25-Apr-2021 |
Dr. Matthias St. Pierre |
Configure/Makefile: install the fips provider if it was configured To follow the principle "what you configure is what you install", the `make install` target now includes the installati
Configure/Makefile: install the fips provider if it was configured To follow the principle "what you configure is what you install", the `make install` target now includes the installation of the fips provider (`make install_fips`) if (and only if) OpenSSL was configured with fips support (`enable-fips`). The `make install_fips` target exists as well and can be used to install just the fips provider. It requires `enable-fips` and issues an error message if `no-fips` was configured. The anologue holds for the 'uninstall_fips' target. Fixes #13693 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13684)
show more ...
|
4e282708 | 14-Apr-2021 |
Dr. Matthias St. Pierre |
Configure/Makefile: don't generate a fresh fipsmodule.cnf when installing it There is already a `providers/fipsmodule.cnf` target which is required by the tests. Instead of creating anot
Configure/Makefile: don't generate a fresh fipsmodule.cnf when installing it There is already a `providers/fipsmodule.cnf` target which is required by the tests. Instead of creating another fipsmodule.cnf, the `install_fips` target simply copies that configuration file to its final destination. This commit also restores the minimal dependencies to build the `install_fips` target immediately after configuring, which was broken after the removal of the `install_sw` dependency. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13684)
show more ...
|