cd28d129 | 19-Apr-2021 |
Matt Caswell |
Avoid the need for Configure time 128-bit int detection We just detect this at compile time instead. This avoids cross-compilation problems where the host platform supports 128-
Avoid the need for Configure time 128-bit int detection We just detect this at compile time instead. This avoids cross-compilation problems where the host platform supports 128-bit ints, but the target platform does not (or vice versa). This was causing a problem on some platforms where, dependent on the CFLAGS, 128 bit ints were either supported or not. Fixes #14804 Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14941)
show more ...
|
af9fb19a | 14-Apr-2021 |
MichaM |
Fix typos CLA: trivial Signed-off-by: MichaM <contact-micha+github@posteo.de> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org>
Fix typos CLA: trivial Signed-off-by: MichaM <contact-micha+github@posteo.de> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14879)
show more ...
|
16df436d | 20-Apr-2021 |
Nicola Tuveri |
Add missing argname for keymgmt_gettable_params and keymgmt_settable_params prototypes For some reason `keymgmt_gettable_params` and `keymgmt_settable_params` seem to be the only prototy
Add missing argname for keymgmt_gettable_params and keymgmt_settable_params prototypes For some reason `keymgmt_gettable_params` and `keymgmt_settable_params` seem to be the only prototypes in `core_dispatch.h` without named arguments. This is annoying if `core_dispatch.h` is being parsed to extract information and also for developers who would like the header to be self-contained, without having to refer to the documentation every time to check what is supposed to be passed. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14950)
show more ...
|
3e73111d | 01-Mar-2021 |
Dr. David von Oheimb |
ASN.1: Add some sanity checks for input len <= 0; related coding improvements Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14357) |
db76a35e | 01-Mar-2021 |
Dr. David von Oheimb |
tasn_dec.c: Add checks for it == NULL arguments; improve coding style Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14357) |
c0e724fc | 20-Apr-2021 |
Dr. David von Oheimb |
DOC: Clarify EVP_MAC_init() params vs. EVP_MAC_CTX_set_params() Fixes #14855 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged f
DOC: Clarify EVP_MAC_init() params vs. EVP_MAC_CTX_set_params() Fixes #14855 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14937)
show more ...
|
5c42f7aa | 18-Apr-2021 |
Rich Salz |
Use build.info not file-wide ifndef If configured with no-cms, handle it in build.info like the other options. I guess I missed doing this file in PR #11250 Reviewed-by: Shane L
Use build.info not file-wide ifndef If configured with no-cms, handle it in build.info like the other options. I guess I missed doing this file in PR #11250 Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14918)
show more ...
|
1fbf7079 | 16-Apr-2021 |
Richard Levitte |
STORE: Discard the error report filter in crypto/store/store_result.c The error report filter was fragile, as it could potentially have to be updated when other parts of libcrypto got up
STORE: Discard the error report filter in crypto/store/store_result.c The error report filter was fragile, as it could potentially have to be updated when other parts of libcrypto got updated, making a goose chase and a maintenance problem. We change this to regard d2i errors as something we don't care so much about, since they are mainly part of the guessing mechanism. The success of the ossl_store_handle_load_result() call is based on whether an object was actually created or not anyway. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14834)
show more ...
|
7aef2000 | 16-Apr-2021 |
Richard Levitte |
TEST: Adapt the EVP test The EVP test didn't recognise ERR_R_UNSUPPORTED, now does Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pu
TEST: Adapt the EVP test The EVP test didn't recognise ERR_R_UNSUPPORTED, now does Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14834)
show more ...
|
9cc97ddf | 12-Apr-2021 |
Richard Levitte |
Adapt our decoder implementations to the new way to indicate succes / failure This includes the special decoder used in our STOREMGMT 'file:' implementation Reviewed-by: Tomas Mraz
Adapt our decoder implementations to the new way to indicate succes / failure This includes the special decoder used in our STOREMGMT 'file:' implementation Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14834)
show more ...
|
f9965953 | 12-Apr-2021 |
Richard Levitte |
ENCODER & DECODER: Allow decoder implementations to specify "carry on" So far, decoder implementations would return true (1) for a successful decode all the way, including what the callb
ENCODER & DECODER: Allow decoder implementations to specify "carry on" So far, decoder implementations would return true (1) for a successful decode all the way, including what the callback it called returned, and false (0) in all other cases. This construction didn't allow to stop to decoding process on fatal errors, nor to choose what to report in the provider code. This is now changed so that decoders implementations are made to return false only on errors that should stop the decoding process from carrying on with other implementations, and return true for all other cases, even if that didn't result in a constructed object (EVP_PKEY for example), essentially making it OK to return "empty handed". The success of the decoding process is now all about successfully constructing the final object, rather than about the return value of the decoding chain. If no construction is attempted, the central decoding processing code concludes that whatever the input consisted of, it's not supported by the available decoder implementations. Fixes #14423 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14834)
show more ...
|
a2502862 | 17-Apr-2021 |
Petr Gotthard |
Fix memory leak in X509_REQ The propq is strdup'ed in X509_REQ_new_ex, but never freed. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tomas@openss
Fix memory leak in X509_REQ The propq is strdup'ed in X509_REQ_new_ex, but never freed. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14907)
show more ...
|
4e030ed4 | 19-Apr-2021 |
Dr. David von Oheimb |
apps/cmp.c: Fix double free on OSSL_CMP_CTX_set1_p10CSR() failure Fixes #14910 Also slightly improve further error handling of setup_request_ctx(). Reviewed-by: Tomas Mraz <toma
apps/cmp.c: Fix double free on OSSL_CMP_CTX_set1_p10CSR() failure Fixes #14910 Also slightly improve further error handling of setup_request_ctx(). Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14929)
show more ...
|
2ec64916 | 15-Apr-2021 |
Pauli |
asn1: fix indentation Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14881) |
c4685815 | 14-Apr-2021 |
Pauli |
dsa: remove unused macro Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14881) |
42e7d043 | 15-Apr-2021 |
Pauli |
srp: remove references to EVP_sha1() Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14881) |
3f700d4b | 15-Apr-2021 |
Pauli |
pem: remove references to EVP_sha1() Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14881) |
e27fea46 | 15-Apr-2021 |
Pauli |
ocsp: remove references to EVP_sha1() Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14881) |
27344bb8 | 15-Apr-2021 |
Pauli |
cms: remove most references to EVP_sha1() Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14881) |
192d5008 | 15-Apr-2021 |
Pauli |
x509: remove most references to EVP_sha1() Fixes #14387 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14881) |
6bcbc369 | 18-Apr-2021 |
Pauli |
test: fix double free problems. In function test_EVP_PKEY_ffc_priv_pub, params is freed via OSSL_PARAM_free() at line 577. If the condition at line 581 is true, the execution will goto e
test: fix double free problems. In function test_EVP_PKEY_ffc_priv_pub, params is freed via OSSL_PARAM_free() at line 577. If the condition at line 581 is true, the execution will goto err, and params will be freed again at line 630. The same problem also happens at line 593 and line 609, which causes two double free bugs. Bugs reported by @Yunlongs Fixes 14916 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14921)
show more ...
|
efe8d69d | 18-Apr-2021 |
Pauli |
engine: fix double free on error path. In function try_decode_PKCS8Encrypted, p8 is freed via X509_SIG_free() at line 481. If function new_EMBEDDED() returns a null pointer at line 483,
engine: fix double free on error path. In function try_decode_PKCS8Encrypted, p8 is freed via X509_SIG_free() at line 481. If function new_EMBEDDED() returns a null pointer at line 483, the execution will goto nop8. In the nop8 branch, p8 is freed again at line 491. Bug reported by @Yunlongs Fixes #14915 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14921)
show more ...
|
db78c84e | 18-Apr-2021 |
Pauli |
ts: fix double free on error path. In function int_ts_RESP_verify_token, if (flags & TS_VFY_DATA) is true, function ts_compute_imprint() will be called at line 299. In the implementation
ts: fix double free on error path. In function int_ts_RESP_verify_token, if (flags & TS_VFY_DATA) is true, function ts_compute_imprint() will be called at line 299. In the implementation of ts_compute_imprint, it allocates md_alg at line 406. But after the allocation, if the execution goto err, then md_alg will be freed in the first time by X509_ALGOR_free at line 439. After that, ts_compute_imprint returns 0 and the execution goto err branch of int_ts_RESP_verify_token. In the err branch, md_alg will be freed in the second time at line 320. Bug reported by @Yunlongs Fixes #14914 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14921)
show more ...
|
b06450bc | 18-Apr-2021 |
Pauli |
srp: fix double free, In function SRP_create_verifier_ex, it calls SRP_create_verifier_BN_ex(..., &v, ..) at line 653. In the implementation of SRP_create_verifier_BN_ex(), *verify (whic
srp: fix double free, In function SRP_create_verifier_ex, it calls SRP_create_verifier_BN_ex(..., &v, ..) at line 653. In the implementation of SRP_create_verifier_BN_ex(), *verify (which is the paremeter of v) is allocated a pointer via BN_new() at line 738. And *verify is freed via BN_clear_free() at line 743, and return 0. Then the execution continues up to goto err at line 655, and the freed v is freed again at line 687. Bug reported by @Yunlongs Fixes #14913 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14921)
show more ...
|
4ecb19d1 | 18-Apr-2021 |
Pauli |
params_dup: fix off by one error that allows array overreach. The end of loop test allows the index to go one step too far to be able to terminate the param array but the end of list rec
params_dup: fix off by one error that allows array overreach. The end of loop test allows the index to go one step too far to be able to terminate the param array but the end of list record is still added. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14922)
show more ...
|