7339547d | 26-Sep-2020 |
Shane Lontis |
Remove TODO comment from sskdf.c Fixes #12993 The implementation follows the standards/recommendations specified by https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800
Remove TODO comment from sskdf.c Fixes #12993 The implementation follows the standards/recommendations specified by https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12999)
show more ...
|
c57a59b1 | 25-Sep-2020 |
Pauli |
todo: remove fork protection todo comment, it isn't relevant to the FIPS provider Fixes #12984 Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/opens
todo: remove fork protection todo comment, it isn't relevant to the FIPS provider Fixes #12984 Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12997)
show more ...
|
d93bded6 | 26-Sep-2020 |
hklaas <71921312+hklaas@users.noreply.github.com> |
optimise ssl3_get_cipher_by_std_name() Return immediately on matched cipher. Without this patch the code only breaks out of the inner for loop, meaning for a matched TLS13 cipher the code wi
optimise ssl3_get_cipher_by_std_name() Return immediately on matched cipher. Without this patch the code only breaks out of the inner for loop, meaning for a matched TLS13 cipher the code will still loop through 160ish SSL3 ciphers. CLA: trivial Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/13000)
show more ...
|
8c27ee6e | 25-Sep-2020 |
Richard Levitte |
STORE: Clear a couple of TODOs that were there for the sake of SM2 We now have decoder support for SM2, so the cheats that were in place for the sake of lacking decoders aren't needed an
STORE: Clear a couple of TODOs that were there for the sake of SM2 We now have decoder support for SM2, so the cheats that were in place for the sake of lacking decoders aren't needed any more. Fixes #12982 Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12986)
show more ...
|
4ff993d7 | 22-Sep-2020 |
Dr. David von Oheimb |
Implement treatment of id-pkix-ocsp-no-check extension for OCSP_basic_verify() Fixes #7761 Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/open
Implement treatment of id-pkix-ocsp-no-check extension for OCSP_basic_verify() Fixes #7761 Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12947)
show more ...
|
cf61b97d | 23-Sep-2020 |
Tomas Mraz |
Generate a certificate with critical id-pkix-ocsp-nocheck extension Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/1294
Generate a certificate with critical id-pkix-ocsp-nocheck extension Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/12947)
show more ...
|
37326895 | 22-Sep-2020 |
Dr. David von Oheimb |
OCSP_resp_find_status.pod: Slightly improve the documentation of various flags Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/1294
OCSP_resp_find_status.pod: Slightly improve the documentation of various flags Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12947)
show more ...
|
7d5ea3fe | 22-Sep-2020 |
Dr. David von Oheimb |
OCSP_resp_find_status.pod: Replace function arg references B<...> by I<...> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12947) |
4f5b222b | 25-Sep-2020 |
Shane Lontis |
Fix bug in EDDSA speed test The pkey created in one loop was being fed into the keygen of the next loop - since it was not set to NULL after the free. This meant that the 2 EVP_MD_CTX ob
Fix bug in EDDSA speed test The pkey created in one loop was being fed into the keygen of the next loop - since it was not set to NULL after the free. This meant that the 2 EVP_MD_CTX objects that still had ref counts to this key were getting confused. All other tests clear the key after freeing the key if they loop (some do this by declaring/initing the pkey inside the loop). The offending code is a recent addition to the speed app. This was found using the -async_jobs option. Similar code was tried for an RSA key using 111 which resulted in the same issue. Found while trying to test issue #128867 (It is not known if this will fix that issue yet). Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12975)
show more ...
|
3786d748 | 24-Sep-2020 |
jwalch |
en EVP_PKEY_CTX_set_rsa_keygen_pubexp() BIGNUM management Fixes #12635 As discussed in the issue, supporting the set0-like semantics long-term is not necessarily desirable, although
en EVP_PKEY_CTX_set_rsa_keygen_pubexp() BIGNUM management Fixes #12635 As discussed in the issue, supporting the set0-like semantics long-term is not necessarily desirable, although necessary for short-term compatibility concerns. So I've deprecated the original method and added an equivalent that is explicitly labelled as set1. I tried to audit existing usages of the (now-deprecated) API and update them to use set1 if that appeared to align with their expectations. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12917)
show more ...
|
fa9e541d | 22-Sep-2020 |
Shane Lontis |
Remove openssl provider app Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12943) |
fc959d71 | 22-Sep-2020 |
Shane Lontis |
Update openssl list to support new provider objects. Added Keymanager, signatures, kem, asymciphers and keyexchange. Added -select option so that specific algorithms are easier to view w
Update openssl list to support new provider objects. Added Keymanager, signatures, kem, asymciphers and keyexchange. Added -select option so that specific algorithms are easier to view when using -verbose Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12943)
show more ...
|
1c52bf3c | 22-Sep-2020 |
Shane Lontis |
Add EVP_ASYM_CIPHER_gettable_ctx_params() and EVP_ASYM_CIPHER_settable_ctx_params() Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pul
Add EVP_ASYM_CIPHER_gettable_ctx_params() and EVP_ASYM_CIPHER_settable_ctx_params() Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12943)
show more ...
|
5a950048 | 22-Sep-2020 |
Shane Lontis |
Add EVP_KEM_gettable_ctx_params() and EVP_KEM_settable_ctx_params() Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12943) |
d3edef83 | 24-Sep-2020 |
Randall S. Becker |
Modified rand_cpu_x86.c to support builtin hardware randomizer on HPE NonStop. CLA: Permission is granted by the author to the OpenSSL team to use these modifications. Fixes #12903
Modified rand_cpu_x86.c to support builtin hardware randomizer on HPE NonStop. CLA: Permission is granted by the author to the OpenSSL team to use these modifications. Fixes #12903 Signed-off-by: Randall S. Becker <rsbecker@nexbridge.com> Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12923)
show more ...
|
a48309cb | 18-Sep-2020 |
Matt Caswell |
Document the provider side SM2 Asymmetric Cipher support Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12913) |
bfb56a97 | 18-Sep-2020 |
Matt Caswell |
Extend the SM2 asym cipher test Ensure we test getting and setting ctx params Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl
Extend the SM2 asym cipher test Ensure we test getting and setting ctx params Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12913)
show more ...
|
98968422 | 18-Sep-2020 |
Matt Caswell |
Remove some dead SM2 code Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12913) |
fb2a6954 | 18-Sep-2020 |
Matt Caswell |
Clean up some SM2 related TODOs in the tests Now that we have full SM2 support, we can remove some TODOs from the tests. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Mer
Clean up some SM2 related TODOs in the tests Now that we have full SM2 support, we can remove some TODOs from the tests. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12913)
show more ...
|
ce64d3ee | 18-Sep-2020 |
Matt Caswell |
Move SM2 asymmetric encryption to be available in the default provider Fixes #12908 Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/o
Move SM2 asymmetric encryption to be available in the default provider Fixes #12908 Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12913)
show more ...
|
7a032be7 | 23-Sep-2020 |
Richard Levitte |
Build: Make NonStop shared libraries only export selected symbols We can now re-enable test/recipes/01-test_symbol_presence.t for NonStop. Reviewed-by: Shane Lontis <shane.lontis@or
Build: Make NonStop shared libraries only export selected symbols We can now re-enable test/recipes/01-test_symbol_presence.t for NonStop. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12962)
show more ...
|
8a288609 | 23-Sep-2020 |
Richard Levitte |
TEST: Remove use of EVP_PKEY_set_alias_type() in test/evp_extra_test.c We already test EVP_PKEY_set_alias_type() quite thoroughly in test/ecdsatest.c, that should be enough. Rev
TEST: Remove use of EVP_PKEY_set_alias_type() in test/evp_extra_test.c We already test EVP_PKEY_set_alias_type() quite thoroughly in test/ecdsatest.c, that should be enough. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12920)
show more ...
|
14711fff | 18-Sep-2020 |
Richard Levitte |
EVP: Enforce that EVP_PKEY_set_alias_type() only works with legacy keys This also deprecates the function, as it is not necessary any more, and should fall out of use. Reviewed-
EVP: Enforce that EVP_PKEY_set_alias_type() only works with legacy keys This also deprecates the function, as it is not necessary any more, and should fall out of use. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12920)
show more ...
|
294e3802 | 23-Sep-2020 |
Richard Levitte |
Configuration: Don't have shared libraries depend on themselves The NonStop config attributes mean that there's no separate "simple" and "full" shared library name, they are the same. B
Configuration: Don't have shared libraries depend on themselves The NonStop config attributes mean that there's no separate "simple" and "full" shared library name, they are the same. Because we assumed that they would always differ, we ended up with this dependency: libcrypto.so: libcrypto.so A simple fix was all that was needed to clear that. Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12960)
show more ...
|
e07a7892 | 23-Sep-2020 |
Richard Levitte |
Configuration: Make it possible to have an argument file Some compilers / linkers allow arguments to be given in a file instead of on the command line. We make it possible to specify th
Configuration: Make it possible to have an argument file Some compilers / linkers allow arguments to be given in a file instead of on the command line. We make it possible to specify this by giving the compiler / linker flag for it, using the config attribute 'shared_argfileflag'. This currently only impacts the build of shared libraries, as those are potentially made up of a massive amount of object files, which has been reported to overwhelm the command line on some platforms. Fixes #12797 Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12960)
show more ...
|