8b3facd7 | 18-Feb-2021 |
Pauli |
rand: note that locking needs to be explicitly enabled. Fixes #13912 Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/142
rand: note that locking needs to be explicitly enabled. Fixes #13912 Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14224)
show more ...
|
76e48c9d | 22-Feb-2021 |
Tomas Mraz |
Deprecated EVP_PKEY_CTX_get0_dh_kdf_ukm() and EVP_PKEY_CTX_get0_ecdh_kdf_ukm() The functions are not needed and require returning octet ptr parameters from providers that would like to s
Deprecated EVP_PKEY_CTX_get0_dh_kdf_ukm() and EVP_PKEY_CTX_get0_ecdh_kdf_ukm() The functions are not needed and require returning octet ptr parameters from providers that would like to support them which complicates provider implementations. Fixes #12985 Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14279)
show more ...
|
10315851 | 28-Jan-2021 |
Richard Levitte |
X509: Refactor X509_PUBKEY processing to include provider side keys When a SubjectPublicKeyInfo (SPKI) is decoded into an X509_PUBKEY structure, the corresponding EVP_PKEY is automatical
X509: Refactor X509_PUBKEY processing to include provider side keys When a SubjectPublicKeyInfo (SPKI) is decoded into an X509_PUBKEY structure, the corresponding EVP_PKEY is automatically added as well. This used to only support our built-in keytypes, and only in legacy form. This is now refactored by making The ASN1 implementation of the X509_PUBKEY an EXTERN_ASN1, resulting in a more manual implementation of the basic support routines. Specifically, the d2i routine will do what was done in the callback before, and try to interpret the input as an EVP_PKEY, first in legacy form, and then using OSSL_DECODER. Fixes #13893 Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14281)
show more ...
|
ce0b307e | 27-May-2020 |
Benjamin Kaduk |
Remove disabled TLS 1.3 ciphers from the SSL(_CTX) In ssl_create_cipher_list() we make a pass through the ciphers to remove those which are disabled in the current libctx. We are ca
Remove disabled TLS 1.3 ciphers from the SSL(_CTX) In ssl_create_cipher_list() we make a pass through the ciphers to remove those which are disabled in the current libctx. We are careful to not include such disabled TLS 1.3 ciphers in the final consolidated cipher list that we produce, but the disabled ciphers are still kept in the separate stack of TLS 1.3 ciphers associated with the SSL or SSL_CTX in question. This leads to confusing results where a cipher is present in the tls13_cipherlist but absent from the actual cipher list in use. Keep the books in order and remove the disabled ciphers from the 1.3 cipherlist at the same time we skip adding them to the active cipher list. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12037)
show more ...
|
6eb7c748 | 23-Feb-2021 |
Richard Levitte |
make update Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14292) |
51d058cd | 26-Nov-2020 |
Richard Levitte |
appveyor.yml: clarify conditions for building the plain configuration The "plain" configuration is only meant to be built for an '[extended tests]' commit, or on the master branch. This
appveyor.yml: clarify conditions for building the plain configuration The "plain" configuration is only meant to be built for an '[extended tests]' commit, or on the master branch. This isn't at all clear from the scripts, and furthermore, we "skip" the plain configuration by running the OpenSSL configuration script... and then nothing more. Instead, we use AppVeyor configuration issues to specify when and when not to build the "plain" configuration, and leave it to the scripts to do the right thing using only $env:EXTENDED_TESTS. Fixes #7958 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13537)
show more ...
|
4f6aeabd | 22-Feb-2021 |
Richard Levitte |
make update Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14269) |
7b9f8995 | 22-Feb-2021 |
Richard Levitte |
Generate doc/build.info with 'make update' rather than on the fly doc/build.info was essentially generated on the fly while running Configure, something that takes a huge amount of time
Generate doc/build.info with 'make update' rather than on the fly doc/build.info was essentially generated on the fly while running Configure, something that takes a huge amount of time on slower file systems (such as Windows). Instead, we generate it with 'make update', saving the user from having to wait for too long, at the small price for developers to have to run 'make update' whenever they write a new manual file. Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14269)
show more ...
|
12631540 | 20-Feb-2021 |
Pauli |
changes: note the deprecation of RAND_METHOD APIs Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652) |
299f5ff3 | 17-Feb-2021 |
Pauli |
provider: add option to load a provider without disabling the fallbacks. Add an argument to PROVIDER_try_load() that permits a provider to be loaded without changing the fallback status.
provider: add option to load a provider without disabling the fallbacks. Add an argument to PROVIDER_try_load() that permits a provider to be loaded without changing the fallback status. This is useful when an additional provider needs to be loaded without perturbing any other setup. E.g. adding mock providers as part of unit testing. Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652)
show more ...
|
332a245c | 17-Feb-2021 |
Pauli |
test: update tests to use the fake random number generator Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652) |
d994ce12 | 17-Feb-2021 |
Pauli |
test: make the DRBG test work without RAND_METHOD support. Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652) |
b3ab537b | 17-Feb-2021 |
Pauli |
test: add framework for generic fake random number generator Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652) |
9c6ee563 | 16-Feb-2021 |
Pauli |
rand: add DRBG/seed setting functions Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652) |
f626c3ff | 21-Feb-2021 |
Pauli |
rand: allow lock/unlock functions to be absent Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652) |
786b13fa | 10-Dec-2020 |
Pauli |
RAND_METHOD deprecation: code changes Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652) |
de2ea978 | 10-Dec-2020 |
Pauli |
RAND_METHOD deprecation: fuzzer Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652) |
0a89ae97 | 10-Dec-2020 |
Pauli |
RAND_METHOD deprecation: tests Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652) |
ac60c84f | 10-Dec-2020 |
Pauli |
RAND_METHOD deprecation: documentation Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13652) |
f5b00834 | 10-Feb-2021 |
Richard Levitte |
EVP: Adapt the EC_KEY specific EVP_PKEY_CTX setter / getter functions Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://gith
EVP: Adapt the EC_KEY specific EVP_PKEY_CTX setter / getter functions Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13913)
show more ...
|
bbf4dc96 | 10-Feb-2021 |
Richard Levitte |
EVP: Make checks in evp_pkey_ctx_store_cached_data() more restricted It would check the keytype and optype before determining if it even supported the ctrl command number. This turned o
EVP: Make checks in evp_pkey_ctx_store_cached_data() more restricted It would check the keytype and optype before determining if it even supported the ctrl command number. This turned out to be disruptive, so we make it check that it supports the request ctrl command number first. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13913)
show more ...
|
13f91a72 | 25-Jan-2021 |
Richard Levitte |
EVP: Adapt the RSA specific EVP_PKEY_CTX setter / getter functions Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.
EVP: Adapt the RSA specific EVP_PKEY_CTX setter / getter functions Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13913)
show more ...
|
df4592cb | 25-Jan-2021 |
Richard Levitte |
EVP: Adapt the DH specific EVP_PKEY_CTX setter / getter functions Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.c
EVP: Adapt the DH specific EVP_PKEY_CTX setter / getter functions Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13913)
show more ...
|
5524580b | 20-Jan-2021 |
Richard Levitte |
EVP: Adapt the EVP_PKEY_CTX ctrl functions legacy_ctrl_to_param() and legacy_ctrl_str_to_param() are now replaced with calls to evp_pkey_ctx_ctrl_to_param() and evp_pkey_ctx_ctrl_str
EVP: Adapt the EVP_PKEY_CTX ctrl functions legacy_ctrl_to_param() and legacy_ctrl_str_to_param() are now replaced with calls to evp_pkey_ctx_ctrl_to_param() and evp_pkey_ctx_ctrl_str_to_param(). Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13913)
show more ...
|
6fcd92d3 | 20-Jan-2021 |
Richard Levitte |
EVP: Adapt diverse OSSL_PARAM setters and getters EVP_PKEY_get_group_name() now simply calls EVP_PKEY_get_utf8_string_param(). EVP_PKEY_CTX_set_group_name() now simply calls EVP_PKEY_CTX
EVP: Adapt diverse OSSL_PARAM setters and getters EVP_PKEY_get_group_name() now simply calls EVP_PKEY_get_utf8_string_param(). EVP_PKEY_CTX_set_group_name() now simply calls EVP_PKEY_CTX_set_params(). EVP_PKEY_get_bn_param(), EVP_PKEY_get_octet_string_param(), EVP_PKEY_get_utf8_string_param() and EVP_PKEY_get_int_param() can now handle legacy EVP_PKEYs by calling evp_pkey_get_params_to_ctrl(). EVP_PKEY_CTX_get_params() can now handle a legacy backed EVP_PKEY_CTX by calling evp_pkey_ctx_get_params_to_ctrl(). Note: EVP_PKEY_CTX_set_params() doesn't call the translator yet. Should it ever? Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13913)
show more ...
|