d5e8d260 | 02-Dec-2020 |
Matt Caswell |
Don't load the legacy provider in test_evp_libctx unnecessarily We don't need the legacy provider, so don't load it. This avoids problems in a no-legacy build Reviewed-by: Richa
Don't load the legacy provider in test_evp_libctx unnecessarily We don't need the legacy provider, so don't load it. This avoids problems in a no-legacy build Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13595)
show more ...
|
f2130201 | 02-Dec-2020 |
Matt Caswell |
Don't load the legacy provider if not available in test_enc_more If the legacy provider isn't available then we shouldn't attempt to load or use it. Reviewed-by: Richard Levitte
Don't load the legacy provider if not available in test_enc_more If the legacy provider isn't available then we shouldn't attempt to load or use it. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13595)
show more ...
|
81959b26 | 02-Dec-2020 |
Matt Caswell |
Skip testing ciphers in the legacy provider if no legacy test_enc should not test ciphers that are not available due to a lack of the legacy provider Reviewed-by: Richard Levitt
Skip testing ciphers in the legacy provider if no legacy test_enc should not test ciphers that are not available due to a lack of the legacy provider Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13595)
show more ...
|
39e3daee | 02-Dec-2020 |
Matt Caswell |
Don't load the legacy provider in endecoder_legacy_test In spite of the name the endecoder_legacy_test does not need the legacy provider. Therefore we avoid loading it so that no-legacy
Don't load the legacy provider in endecoder_legacy_test In spite of the name the endecoder_legacy_test does not need the legacy provider. Therefore we avoid loading it so that no-legacy builds still run the test successfully. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13595)
show more ...
|
49da54b9 | 02-Dec-2020 |
Matt Caswell |
Don't use legacy provider if not available in test_ssl_old If we've been configured with no-legacy then we should not attempt to load the legacy provider. Reviewed-by: Richard L
Don't use legacy provider if not available in test_ssl_old If we've been configured with no-legacy then we should not attempt to load the legacy provider. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13595)
show more ...
|
5ae54dba | 02-Dec-2020 |
Matt Caswell |
Fix sslapitest.c if built with no-legacy We skip a test that uses the no-legacy option. Unfortuantely there is no OPENSSL_NO_LEGACY to test, so we just check whether we were successful
Fix sslapitest.c if built with no-legacy We skip a test that uses the no-legacy option. Unfortuantely there is no OPENSSL_NO_LEGACY to test, so we just check whether we were successful in loading the legacy provider - and if not we skip the test. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13595)
show more ...
|
3a43b30e | 02-Dec-2020 |
Matt Caswell |
Skip evp_test cases where we need the legacy prov and its not available Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13595) |
a67c7010 | 03-Dec-2020 |
Matt Caswell |
Don't use no-asm in the Github CIs no-asm has proven to be too slow, therefore we don't use it in the Github CI builds and instead rely on it being covered by run-checker. Revie
Don't use no-asm in the Github CIs no-asm has proven to be too slow, therefore we don't use it in the Github CI builds and instead rely on it being covered by run-checker. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/13607)
show more ...
|
acd3e548 | 23-Nov-2020 |
Shane Lontis |
Add fips self tests for all included kdf Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13480) |
f0591559 | 20-Nov-2020 |
Shane Lontis |
Add validate method to ECX keymanager Fixes #11619 Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13459) |
1a683b80 | 07-Dec-2020 |
Dr. David von Oheimb |
apps/{ca,req,x509}.c: Improve diag and doc mostly on X.509 extensions, fix multiple instances This includes a general correction in the code (now using the X509V3_CTX_REPLACE flag) and a
apps/{ca,req,x509}.c: Improve diag and doc mostly on X.509 extensions, fix multiple instances This includes a general correction in the code (now using the X509V3_CTX_REPLACE flag) and adding a prominent clarification in the documentation: If multiple entries are processed for the same extension name, later entries override earlier ones with the same name. This is due to an RFC 5280 requirement - the intro of its section 4.2 says: A certificate MUST NOT include more than one instance of a particular extension. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13614)
show more ...
|
98ba251f | 07-Dec-2020 |
Dr. David von Oheimb |
openssl_hexstr2buf_sep(): Prevent misleading 'malloc failure' errors on short input Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull
openssl_hexstr2buf_sep(): Prevent misleading 'malloc failure' errors on short input Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13614)
show more ...
|
8ca661ab | 07-Dec-2020 |
Dr. David von Oheimb |
v2i_AUTHORITY_KEYID(): Correct out-of-memory behavior and avoid mem leaks Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13614) |
f902716f | 07-Dec-2020 |
Dr. David von Oheimb |
X509V3_EXT_add_nconf_sk(): Improve description and use of 'sk' arg, which may be NULL Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pu
X509V3_EXT_add_nconf_sk(): Improve description and use of 'sk' arg, which may be NULL Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13614)
show more ...
|
374f72ce | 07-Dec-2020 |
Dr. David von Oheimb |
openssl-ca.pod.in: Clarify the -extensions/-crlexts options vs. x509_extensions/crl_extensions Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/o
openssl-ca.pod.in: Clarify the -extensions/-crlexts options vs. x509_extensions/crl_extensions Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13614)
show more ...
|
9c3a52f2 | 04-Dec-2020 |
Dr. David von Oheimb |
apps/x509.c: Factor out common aspects of X509 signing Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13614) |
6c9515b7 | 04-Dec-2020 |
Dr. David von Oheimb |
apps/{req,x509,ca}.c: Cleanup: move shared X509{,_REQ,_CRL} code to apps/lib/apps.c Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull
apps/{req,x509,ca}.c: Cleanup: move shared X509{,_REQ,_CRL} code to apps/lib/apps.c Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13614)
show more ...
|
d858e743 | 04-Dec-2020 |
Dr. David von Oheimb |
apps/{req,x509,ca}.c: Clean up code setting X.509 cert version v3 Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13614) |
e9701a01 | 04-Dec-2020 |
Dr. David von Oheimb |
x509v3_config.pod: Clarify semantics of subjectKeyIdentifier and authorityKeyIdentifier Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/
x509v3_config.pod: Clarify semantics of subjectKeyIdentifier and authorityKeyIdentifier Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13614)
show more ...
|
7c051ecc | 03-Dec-2020 |
Dr. David von Oheimb |
apps/req.c: Improve diagnostics on multiple/overriding X.509 extensions defined via -reqext option Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/opens
apps/req.c: Improve diagnostics on multiple/overriding X.509 extensions defined via -reqext option Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13614)
show more ...
|
bca7ad6e | 26-Sep-2020 |
Dr. David von Oheimb |
Use adapted test_get_libctx() for simpler test setup and better error reporting Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/13001) |
5ea64b45 | 28-Apr-2020 |
Fangming.Fang |
Read MIDR_EL1 system register on aarch64 MIDR_EL1 system register exposes microarchitecture information so that people can make micro-arch related optimization such as exposing as mu
Read MIDR_EL1 system register on aarch64 MIDR_EL1 system register exposes microarchitecture information so that people can make micro-arch related optimization such as exposing as much instruction level parallelism as possible. MIDR_EL1 register can be read only if HWCAP_CPUID feature is supported. Change-Id: Iabb8a36c5d31b184dba6399f378598058d394d4e Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/11744)
show more ...
|
6582661f | 03-Nov-2020 |
Matt Caswell |
Test that we can negotiate TLSv1.3 if we have an SNI callback If an SNI callback has been set then we may have no certificuates suitable for TLSv1.3 use configured for the current SSL_CT
Test that we can negotiate TLSv1.3 if we have an SNI callback If an SNI callback has been set then we may have no certificuates suitable for TLSv1.3 use configured for the current SSL_CTX. This should not prevent us from negotiating TLSv1.3, since we may change the SSL_CTX by the time we need a suitable certificate. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13304)
show more ...
|
ebda646d | 03-Nov-2020 |
Matt Caswell |
Modify is_tls13_capable() to take account of the servername cb A servername cb may change the available certificates, so if we have one set then we cannot rely on the configured certific
Modify is_tls13_capable() to take account of the servername cb A servername cb may change the available certificates, so if we have one set then we cannot rely on the configured certificates to determine if we are capable of negotiating TLSv1.3 or not. Fixes #13291 Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13304)
show more ...
|
7eea331e | 08-Dec-2020 |
Tomas Mraz |
v3nametest: Make the gennames structure static Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/13635) |