a149f750 | 01-Jul-2020 |
Dmitry Belyavskiy |
Replace hierogliphs with stub to pass tests Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9654) |
26930bd3 | 14-Oct-2019 |
Dmitry Belyavskiy |
Documentation for internal PUNYCODE-related functions Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9654) |
8a302080 | 18-Sep-2019 |
Dmitry Belyavskiy |
EAI test script and data Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9654) |
a0188e28 | 21-Aug-2019 |
Dmitry Belyavskiy |
RFC 8398: documentation Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9654) |
0bf093be | 21-Aug-2019 |
Dmitry Belyavskiy |
Add NID_id_on_SmtpUTF8Mailbox to table of X.509 attributes Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9654) |
90c9319d | 21-Aug-2019 |
Dmitry Belyavskiy |
RFC 8398: EAI comparison Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9654) |
69d92459 | 21-Aug-2019 |
Dmitry Belyavskiy |
RFC 8398: Name constraints validation Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9654) |
4650f2b5 | 21-Aug-2019 |
Dmitry Belyavskiy |
Punycode decoding implementation Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9654) |
eb800ef5 | 20-Aug-2020 |
Richard Levitte |
crypto/x509/v3_utl.c: Fix IPv6 output in ipaddr_to_asc() Fixes #12695 Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openss
crypto/x509/v3_utl.c: Fix IPv6 output in ipaddr_to_asc() Fixes #12695 Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/12696)
show more ...
|
9afa0748 | 23-Aug-2020 |
Richard Levitte |
TEST: Fix CMP tests so they load keys in the current library context Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/127
TEST: Fix CMP tests so they load keys in the current library context Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/12705)
show more ...
|
39d9be39 | 26-Jun-2020 |
Nicola Tuveri |
Add CLI tests in FIPS configuration Add positive and negative tests of CLI apps using configuration files via environment variables to force FIPS mode. Reviewed-by: Shane Lontis
Add CLI tests in FIPS configuration Add positive and negative tests of CLI apps using configuration files via environment variables to force FIPS mode. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12291)
show more ...
|
a8b7ea82 | 23-Jul-2020 |
Richard Levitte |
STORE: Change all error recording to use ERR_raise() / ERR_raise_data() Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12512) |
34b80d06 | 22-Jul-2020 |
Richard Levitte |
STORE: Modify to support loading with provider based loaders This adds the needed code to make the OSSL_STORE API functions handle provided STORE implementations. This also modi
STORE: Modify to support loading with provider based loaders This adds the needed code to make the OSSL_STORE API functions handle provided STORE implementations. This also modifies OSSL_STORE_attach() for have the URI, the library context and the properties in the same order as OSSL_STORE_open_with_libctx(). The most notable change, though, is how this creates a division of labor between libcrypto and any storemgmt implementation that wants to pass X.509, X.509 CRL, etc structures back to libcrypto. Since those structures aren't directly supported in the libcrypto <-> provider interface (asymmetric keys being the only exception so far), we resort to a libcrypto object callback that can handle passed data in DER form and does its part of figuring out what the DER content actually is. This also adds the internal x509_crl_set0_libctx(), which works just like x509_set0_libctx(), but for X509_CRL. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12512)
show more ...
|
4fd39782 | 02-Aug-2020 |
Richard Levitte |
DECODER: Add function to set an OSSL_PASSPHRASE_CALLBACK type callback This makes it possible to use OSSL_DECODER in functions that are passed a OSSL_PASSPHRASE_CALLBACK already.
DECODER: Add function to set an OSSL_PASSPHRASE_CALLBACK type callback This makes it possible to use OSSL_DECODER in functions that are passed a OSSL_PASSPHRASE_CALLBACK already. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12512)
show more ...
|
ab00ddb5 | 28-Jul-2020 |
Richard Levitte |
OSSL_PARAM: Add string pointer getters When some function receives an OSSL_PARAM array to pilfer for data, and there is a string of some sort, and all the code needs is to get the po
OSSL_PARAM: Add string pointer getters When some function receives an OSSL_PARAM array to pilfer for data, and there is a string of some sort, and all the code needs is to get the pointer to the data, rather than a copy, there is currently no other way than to use |param->data| directly. This is of course a valid method, but lacks any safety check (is |param->data_type| correct, for example?). OSSL_PARAM_get_utf8_string_ptr() and OSSL_PARAM_get_octet_string_ptr() helps the programmer with such things, by setting the argument pointer to |param->data|. Additionally, the handle the data types OSSL_PARAM_UTF8_PTR and OSSL_PARAM_OCTET_PTR as well. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12512)
show more ...
|
c4fc564d | 22-Jul-2020 |
Richard Levitte |
STORE: Add the base functions to support provider based loaders This includes fixing a bug that could only be discovered when no loaders were registered. Reviewed-by: Shane Lont
STORE: Add the base functions to support provider based loaders This includes fixing a bug that could only be discovered when no loaders were registered. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12512)
show more ...
|
8704b6bf | 22-Jul-2020 |
Richard Levitte |
STORE for providers: define libcrypto <-> provider interface Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12512) |
faa64bca | 26-Jul-2020 |
Richard Levitte |
STORE: Add missing function OSSL_STORE_LOADER_set_open_with_libctx() Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12512) |
a517edec | 02-Aug-2020 |
Richard Levitte |
CORE: Generalise internal pass phrase prompter The pass phrase prompter that's part of OSSL_ENCODER and OSSL_DECODER is really a passphrase callback bridge between the diverse forms of
CORE: Generalise internal pass phrase prompter The pass phrase prompter that's part of OSSL_ENCODER and OSSL_DECODER is really a passphrase callback bridge between the diverse forms of prompters that exist within OpenSSL: pem_password_cb, ui_method and OSSL_PASSPHRASE_CALLBACK. This can be generalised, to be re-used by other parts of OpenSSL, and to thereby allow the users to specify whatever form of pass phrase callback they need, while being able to pass that on to other APIs that are called internally, in the form that those APIs demand. Additionally, we throw in the possibility to cache pass phrases during a "session" (we leave it to each API to define what a "session" is). This is useful for any API that implements discovery and therefore may need to get the same password more than once, such as OSSL_DECODER and OSSL_STORE. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12512)
show more ...
|
14c8a3d1 | 22-Jul-2020 |
Richard Levitte |
CORE: Define provider-native abstract objects This is placed as CORE because the core of libcrypto is the authority for what is possible to do and what's required to make these abstract
CORE: Define provider-native abstract objects This is placed as CORE because the core of libcrypto is the authority for what is possible to do and what's required to make these abstract objects work. In essence, an abstract object is an OSSL_PARAM array with well defined parameter keys and values: - an object type, which is a number indicating what kind of libcrypto structure the object in question can be used with. The currently possible numbers are defined in <openssl/core_object.h>. - an object data type, which is a string that indicates more closely what the contents of the object are. - the object data, an octet string. The exact encoding used depends on the context in which it's used. For example, the decoder sub-system accepts any encoding, as long as there is a decoder implementation that takes that as input. If central code is to handle the data directly, DER encoding is assumed. (*) - an object reference, also an octet string. This octet string is not the object contents, just a mere reference to a provider-native object. (**) - an object description, which is a human readable text string that can be displayed if some software desires to do so. The intent is that certain provider-native operations (called X here) are able to return any sort of object that belong with other operations, or an object that has no provider support otherwise. (*) A future extension might be to be able to specify encoding. (**) The possible mechanisms for dealing with object references are: - An object loading function in the target operation. The exact target operation is determined by the object type (for example, OSSL_OBJECT_PKEY implies that the target operation is a KEYMGMT) and the implementation to be fetched by its object data type (for an OSSL_OBJECT_PKEY, that's the KEYMGMT keytype to be fetched). This loading function is only useful for this if the implementations that are involved (X and KEYMGMT, for example) are from the same provider. - An object exporter function in the operation X implementation. That exporter function can be used to export the object data in OSSL_PARAM form that can be imported by a target operation's import function. This can be used when it's not possible to fetch the target operation implementation from the same provider. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12512)
show more ...
|
bc8c3e1c | 11-Aug-2020 |
Shane Lontis |
Fix coverity CID #1452770 - Dereference before NULL check in CRYPTO_siv128_init() Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/1
Fix coverity CID #1452770 - Dereference before NULL check in CRYPTO_siv128_init() Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12628)
show more ...
|
4bec3f6d | 11-Aug-2020 |
Shane Lontis |
Fix coverity CID #1452773 - Dereference before NULL check in EVP_DigestFinal_ex() Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/1
Fix coverity CID #1452773 - Dereference before NULL check in EVP_DigestFinal_ex() Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12628)
show more ...
|
1f9ad4f9 | 11-Aug-2020 |
Shane Lontis |
Fix coverity CID #1452775 & #1452772- Dereference before NULL check in evp_lib.c Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12
Fix coverity CID #1452775 & #1452772- Dereference before NULL check in evp_lib.c Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12628)
show more ...
|
825ccf51 | 11-Aug-2020 |
Shane Lontis |
Fix coverity CID #1454638 - Dereference after NULL check in EVP_MD_CTX_gettable_params() Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl
Fix coverity CID #1454638 - Dereference after NULL check in EVP_MD_CTX_gettable_params() Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12628)
show more ...
|
10ead938 | 11-Aug-2020 |
Shane Lontis |
Fix coverity CID #1455335 - Dereference after NULL check in fromdata_init() Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12628) |