cc2314a9 | 25-Feb-2021 |
Pauli |
evp: updates for the new additional MAC_init arguments Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14310) |
1dc28e74 | 25-Feb-2021 |
Pauli |
crmf: updates for the new additional MAC_init arguments Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14310) |
4a5d8c0c | 25-Feb-2021 |
Pauli |
apps: updates for the new additional MAC_init arguments Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14310) |
2211bf6b | 25-Feb-2021 |
Pauli |
apps: update mac to work with additional MAC_init arguments. This doesn't include the creation of new 'key' arguments. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from h
apps: update mac to work with additional MAC_init arguments. This doesn't include the creation of new 'key' arguments. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14310)
show more ...
|
ebf8274c | 25-Feb-2021 |
Pauli |
apps: update fipsinstall to work with additional MAC_init arguments Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14310) |
2524ec1a | 25-Feb-2021 |
Pauli |
prov kdf: update to use the extra MAC init arguments Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14310) |
8f5d64b1 | 25-Feb-2021 |
Pauli |
prov: update SipHash to new init function Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14310) |
ae7d90a1 | 24-Feb-2021 |
Pauli |
siphash: Add the C and D round parameters for SipHash. This represents a gap in functionality from the low level APIs. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merge
siphash: Add the C and D round parameters for SipHash. This represents a gap in functionality from the low level APIs. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14310)
show more ...
|
7dc13cc6 | 27-Feb-2021 |
ekinhbayar |
Merge branch 'master' of https://github.com/openssl/openssl
|
1d73e2ad | 23-Feb-2021 |
Richard Levitte |
crypto/asn1/i2d_evp.c: Fix i2d_provided() to return a proper length Fixes #14258 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Ben Kaduk <kaduk@mit.edu> (Merged f
crypto/asn1/i2d_evp.c: Fix i2d_provided() to return a proper length Fixes #14258 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Ben Kaduk <kaduk@mit.edu> (Merged from https://github.com/openssl/openssl/pull/14291)
show more ...
|
c8182743 | 23-Feb-2021 |
Richard Levitte |
PROV: Implement an EC key -> blob encoder, to get the public key Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Ben Kaduk <kaduk@mit.edu> (Merged from https://github.com/op
PROV: Implement an EC key -> blob encoder, to get the public key Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Ben Kaduk <kaduk@mit.edu> (Merged from https://github.com/openssl/openssl/pull/14291)
show more ...
|
8ab9c4dd | 23-Feb-2021 |
Richard Levitte |
Modify i2d_PublicKey() so it can get an EC public key as a blob This introduces the encoder output type "blob", to be used for anything that outputs an unstructured blob of data.
Modify i2d_PublicKey() so it can get an EC public key as a blob This introduces the encoder output type "blob", to be used for anything that outputs an unstructured blob of data. Fixes #14258 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Ben Kaduk <kaduk@mit.edu> (Merged from https://github.com/openssl/openssl/pull/14291)
show more ...
|
3d364726 | 19-Feb-2021 |
Benjamin Kaduk |
test_ecpub: test that we can decode the DER we encoded We should be able to round-trip through the encoded DER form of the EC public key and get back something that compares as equal to
test_ecpub: test that we can decode the DER we encoded We should be able to round-trip through the encoded DER form of the EC public key and get back something that compares as equal to the original key. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14291)
show more ...
|
ad7cb0bf | 19-Feb-2021 |
Benjamin Kaduk |
test_ecpub: verify returned length after encoding Save the length we got from querying how much space was needed, and check that the actual encoding call returned the same length.
test_ecpub: verify returned length after encoding Save the length we got from querying how much space was needed, and check that the actual encoding call returned the same length. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14291)
show more ...
|
c0ff1932 | 25-Jan-2021 |
Benjamin Kaduk |
Add test for EC pubkey export/import There seems to be an issue with i2d_provided() in i2d_evp.c that causes us to fail to construct a valid chain of encoders for the "type-specific"
Add test for EC pubkey export/import There seems to be an issue with i2d_provided() in i2d_evp.c that causes us to fail to construct a valid chain of encoders for the "type-specific" output when it's an EC pubkey. This test is designed to exercise that codepath for a variety of curves. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14291)
show more ...
|
b7d9284d | 27-Feb-2021 |
ekinhbayar |
Merge branch 'master' of https://github.com/openssl/openssl
|
4ef70dbc | 26-Feb-2021 |
Dr. David von Oheimb |
Code cleanup mostly in crypto/x509/v3_purp.c Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14328) |
84039555 | 27-Feb-2021 |
ekinhbayar |
Merge branch 'master' of https://github.com/openssl/openssl
|
90b4247c | 24-Feb-2021 |
Benjamin Kaduk |
Check ASN1_item_ndef_i2d() return value. Return an error instead of trying to malloc a negative number. The other usage in this file already had a similar check, and the caller shoul
Check ASN1_item_ndef_i2d() return value. Return an error instead of trying to malloc a negative number. The other usage in this file already had a similar check, and the caller should have put an entry on the error stack already. Note that we only check the initial calls to obtain the encoded length, and assume that the follow-up call to actually encode to the allocated storage will succeed if the first one did. Fixes: #14177 Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14308)
show more ...
|
9561f14b | 26-Feb-2021 |
ekinhbayar |
Merge branch 'master' of https://github.com/openssl/openssl
|
d2ccfb9c | 25-Feb-2021 |
Tomas Mraz |
evp_pkey_provided_test: Improve diagnostic output Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14316) |
4519ea90 | 25-Feb-2021 |
Tomas Mraz |
tests: Always print errors before test verdict Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14316) |
b6b14575 | 26-Feb-2021 |
Dr. David von Oheimb |
apps/x509.c: Fix mem leaks in processing of -next_serial in print loop |
d6b78c78 | 26-Feb-2021 |
Dr. David von Oheimb |
apps/x509.c: Improve print_name() and coding style of large print loop in x509_main() |
619632af | 26-Feb-2021 |
Dr. David von Oheimb |
apps/x509.c: Improve indentation of the large print loop in x509_main() |